throbber
United States Patent
`
`[19]
`
`[11] Patent Number:
`
`6,134,274
`
`Sankaranarayanan et al.
`
`[45] Date of Patent:
`
`Oct. 17, 2000
`
`USUUGI34-274A
`
`[54] METHOD AND APPARATUS FOR
`ALLOCATING DATA FOR TRANSMISSION
`VIA DISCRETE MULTIPLE TONES
`
`[75]
`
`lI1V611t0rSI Lillltllfl Sankaranarayanan,
`Bedmlmlef; Rania“ V- Senalkal‘,
`N Oflh C/alClW€ll, bolh Of NJ.
`
`[73] Assign“? AT&T C0rP> New York NY
`
`[21] Appl. No: 08/997,167
`
`[22]
`
`].71']Cd;
`
`[)ec_ 23, 1997
`
`Int. Cl.
`[51]
`[52] U.S. Cl.
`
`H04L 27/04
`375/295; 375/296; 375/260;
`375/2549 704/2294 704/200
`[58] Field Of Search ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~ 375/396, 360,
`375/347, 244, 254, 241, 295; 704/229,
`200, 500, 205
`
`[56]
`
`References Cited
`US. PATENT DOCUMENTS
`
`.......................
`
`375/254
`704/200
`I
`,
`375/260
`
`5,206,884
`4/1993 Bhaskar
`5335571
`8/1993 MQZOF
`1;/£2;
`1]:.fi3l’§ka“’a ct “ '
`,
`,
`/
`,
`,
`ie er
`..... ..
`$822,374 10/1998 Levin .........................N
`OTHER PUBLICATIONS
`.
`g
`.
`.
`Lake at 31:’ A Maxlmum Rate Loadmg Algomhm for D15"
`Crete Multitone Modulatiom IEEE’ Pp 1514”1518’ Aug
`1997'
`Fischer et al. A New Loading Algorithm for Discrete Mul-
`titone Transmission, IEEE, p. 724728, May 1996.
`
`Chow et al., A Practical Discrete Multitone Tranceiver
`Loading Algorithm for Data Transmission over Spectrally
`Shaped Channel, IEEE, p. 773775, Feb. 1995.
`American National Standards Institite, Standards Docu-
`ment—’I‘1.413—1995; “Network and Customer Installation
`Interfaces—Asymmetric Digital Subscriber Line (ADSL)
`Metallic Interface”; Approved Aug. 18, 1995, pages: cover
`page; two inside sheets; i—vi; 1-115.
`“Multicarrier Modulation for Data Transmission: an Idea
`whose Times Has Come”, author: John A.C. Bingham, IEEE
`Communications magazine, May 1990, pp. 5-14.
`
`Primary Examiner—Steplien Chin
`Assistant Examiner—Shuwang Liu
`[57]
`ABSTRACT
`
`A method of allocating bits to discrete frequencies in a
`discrctc multitonc modulator comprises the steps of allocat-
`ing bits to frequencies on a per frequency basis such that the
`bits are successively allocated until a niaxiniuin power level
`for that frequency is exceeded. Then, a total power level for
`bits allocated to a plurality of transmit frequencies is cal-
`culated to see if a maximum permissible total power level is
`exceeded. If the maximum permissible total power level is
`not exceeded, then the process is complete. If the maximum
`total power level is exceeded, successive bits are removed
`until the total power level is no longer exceeded. In one bit
`~
`~
`removal method, bits are removed in order oftthe amount of
`power the bit would consume of the transmit power spec-
`trum. The algorithm may be implemented in the combina-
`tion of transmitter elements including tone ordering
`circuitry, gain scaling circuitry and the inverse discrete
`Fourier transform modulator of the discrete multitone data
`transmitter.
`
`9 Claims, 5 Drawing Sheets
`
`11:1. 351 um, AND hm,"
`
`L sk =|
`*"'G HI
`/3P,mosl<kgk
`‘W
`M «
`I
`»,
`bk=MlN (Lmaskk, hmux)
`
`swnz INDICES or THE ARRAY Ark"
`CORRESPONDING TO THE om IN ARRAY um‘,
`mm ARRAY lNDEX(k). som ARRAY om? IN
`uzscauumc own INTO mm nzik sum
`[N uzcwumc om, KEEPING TRACK OF am
`
`DE1"=°E1"/2- bindexlt
`mam THE NEW mus or mm? mm THE
`APPNOPRIAIE LOCATION IN ARRAY DEIF TO
`MAINTAIN mt DESCENDING ORDER. MOVE THE
`VALUE or lNDEX(1) mm ARRAY INDEX (1),
`CORRESPONDING TO THE NEW POSITION OF DE R
`
`Dish
`Exhibit 1015, Page 1
`
`

`
`U.S. Patent
`
`0002771LC0
`
`Sheet 1 of 5
`
`6,134,274
`
`E232$N65%
`
`
`
`A|*::+c3+".5+“.Kt.E+o.53=.+omt.3+“.io
`
`Dish
`Exhibit 1015, Page 2
`
`

`
`U.S. Patent
`
`Oct. 17,2000
`
`Sheet 2 of 5
`
`6,134,274
`
`ozzsmas
`
`225528
`e:E8:ozwfixo
`
`
`
`E»:E3
`
`
`
`5%E85m_2<E<53”=..<~_.._<55E2cu.zocsfimzs5&8H:x2:
`
`E><H._._~_Ez_
`
`Qm<éz§BZEE“fl______
`
`011 )|>JOM1I-IN 'lV1IOI(] 01
`
`Dish
`Exhibit 1015, Page 3
`
`

`
`U.S. Patent
`
`Oct. 17, 2000
`
`Sheet 3 of 5
`
`6,134,274
`
`gs:<53
`
`5%E85.“_:<~_.._£2E2EzozsémzsV32o<_2z§52%;.
`
`
`
`5><E=z2~_m%.<A~__%mo
`
`225928M22s;m>s_§
`
`
`
`seam22¢.5528
`
`H...0
`
`..1_8OWGIAUII.V_|N3I.M03VA
`
`Dish
`Exhibit 1015, Page 4
`
`

`
`U.S. Patent
`
`Oct. 17, 2000
`
`Sheet 4 of 5
`
`6,134,274
`
`FIG. 3
`
`1<=1, SET hm AND bmin
`
`b_maskk=|092
`
`3P_maskk k
`
`I
`bmax)
`
`Gc+1>]
`
`Etota|>Pbudet 7
`
`STORE INDICES OF THE ARRAY AEkR
`CORRESPONDING TO THE ORDER IN ARRAY DE;R.
`INTO ARRAY INDEX(k). SORT ARRAY DEkR IN
`DESCENDING ORDER INTO ARRAY DEiR SORT
`IN DECENDING ORDER, KEEPING TRACK OF BIN
`
`Etotu|=Etota|'DE1R
`DE1R=DE1R/2' Pindex 1
`‘P index 1 "1
`
`INSERT THE NEW VALUE OF DE1R INTO THE
`APPROPRIATE LOCATION IN ARRAY DEiR T0
`MAINTAIN THE DESCENDING ORDER. MOVE THE
`
`INTO ARRAY INDEX (k),
`VALUE OF INDEX(1)
`CORRESPONDING TO THE NEW POSITION OF DE1R
`
`EtotaI>Pbudet ?
`NO
`
`Dish
`Exhibit 1015, Page 5
`
`

`
`U.S. Patent
`
`0002771LC0
`
`Sheet 5 of 5
`
`N_.:5%3,:
`
`K+oat.33St.5..N+o
`
`Dish
`Exhibit 1015, Page 6
`
`

`
`6,134,274
`
`1
`METHOD AND APPARATUS FOR
`ALLOCATING DATA FOR TRANSMISSION
`VIA DISCRETE MULTIPLE TONES
`
`BACKGROUND OF THE INVENTION
`
`1. Technical Field
`This invention relates to the field of data transmission via
`discrete multi-tone modulation and, more particularly,
`to
`method and apparatus for allocating data for modulation via
`discrete multiple tones.
`2. Description of the Related Arts
`In a typical discrete multi-tone modulator, for example, a
`modulator described by A.N.S.I. Standard T1413-1995, a
`plurality of discrete tones are utilized for carrying data
`modulated thereon. Aproblem with this approach is that the
`particular carrier frequencies selected for data modulation
`may be likewise utilized for, for example, AM radio broad-
`casts or may already be used by modulators transmitting
`data on other adjacent cable pairs and the like. Thus,
`time—varying far end crosstalk and near end crosstalk or
`cable ingress of noise from external sources can interfere
`with data transmission of discrete multitone data modula-
`tors. For example, in the discrete multi-tone modulation
`approach, carrier frequencies are spaced approximately
`every four kilohertz across a broad spectrum of frequencies
`(for example, from (P1 megahertz) for data transmission.
`There may be an AM radio broadcast or a data transmission
`on an adjacent cable pair at 530 kilohertz that may interfere
`with a data transmission at approximately the same fre-
`quency. The interfering signal creates noise which precludes
`data transmission at a higher bit carrying capacity than
`would have been achievable without the presence of the
`noisy 530 kilohertz interfering signal.
`Noise from carrier channels using the same frequencies
`can thus detract from bit-carrying capacity on those chan-
`nels. Some tones on the same cable pair can carry more data
`than other tones (depending on what adjacent cable pairs are
`carrying and the amount of noise ingress from external
`sources among other factors). When one views the entire
`power spectrum, and without any power constraint on the
`system, one may allocate bits to frequencies freely to fill or
`pour bits into the power spectrum like water into the peaks
`and valleys of the spectrum until all frequencies are equally
`f11ll.
`In a typical modulator of the multi-tone variety, a .
`channel signal to noise ratio estimation phase is employed.
`The transmitter sends a known pseudo-random noise
`sequence to a receiver and the receiver computes the
`received signal to noise ratio by computing the coherence
`between the received signal and its stored replica. The _
`characteristics are computed in the form of a ratio of the
`channel gain to noise for each channel or tone. Let us denote
`this quantity by gain-to-noise ratio GNR.
`Referring briefly to FIG. 1, there is shown such GNR for
`a series noise spectrum for a series of discrete tones, a+f,
`a+2f, a+3f .
`.
`.
`, where a represents a displacement frequency
`from 0 Hertz and f the carrier or tone spacing, for example,
`approximately 4000 Hz. The GNR plot resembles a “terrain”
`with peaks and valleys. Some frequencies such as a+f are
`noisier than other frequencies such as a+6f. Once the GNR
`is determined, bits are poured into the spectrum (terrain)
`until a maximum total power level (water level) P is reached.
`Two power levels, P1 and P2, are shown by way of example.
`Where a is the initial frequency and f is the tone spacing,
`then bits are poured on each possible tone until a total power
`level P is reached above the terrain GNR. For example, for
`power level P2, bits are poured on or allocated to frequen-
`
`2
`cies: a+2f, a+3f, a+4f, and a+6f. For power level P1, a higher
`power level, bits may be allocated to all tones except a+7f.
`This technique is described by Mr. John A. C. Bingham in
`his paper “Multicarrier Modulation for Data Transmission:
`An Idea Whose Time Has Come,” I.E.E.E. Cumrmmicatiorzs,
`May, 1990, pp. 5-14, incorporated by reference as to its
`entire contents.
`
`Bingham goes on to describe a ‘water filling’ bit alloca-
`tion process that we describe more accurately by the analogy
`of ‘ice cube filling’. Bingham’s algorithm adds bits one bit
`a time according to selecting a bit for addition to a bin that
`is the least expensive in additional power needed. Because
`the bit added represents a chunk of power, we prefer to call
`the technique “ice cube filling” instead of a more smooth
`“water pouring” analogy used by Bingham. The “waterfall,”
`bit “pouring,” or even the “ice cube filling” technique for
`allocating bits to tones of a tone or frequency power spec-
`trum has been practiced for years to advantage. Total power
`is the primary constraint considered in allocating bits to
`tones in these approaches. However, as these types of
`techniques have become more predominant, problems have
`evolved. For example, these approaches do not take into
`consideration the allocation of a maximum or minimum
`number of bits to each tone or frequency bin as will be
`further described herein or consideration of a power mask
`for each tone as will be defined herein. These additional
`constraints can be design imposed or imposed by the stan-
`dard under which the techniques must operate (such as
`A.N.S.I. standard T1.413-1995) Thus, there has been felt a
`need to develop other methods for allocating bits to a power
`spectrum.
`
`SUMMARY OF THE INVENTION
`
`In accordance with the principles of the present invention,
`bits are allocated to tones by calculating the maximum
`number of bits per each tone. Then bits are allocated on a
`tone by tone basis depending on the maximum power at
`which each tone can be transmitted. Once the bits are
`allocated, then, the total maximum power level for the tone
`power spectrum is calculated. If that power level is not
`exceeded, then, the bit allocation process is complete and the
`bits may be transmitted. On the other hand, if the total power
`level has been exceeded, bits are selectively removed from
`tone or frequency bins until the total power level is no longer
`exceeded. The first bit that is removed according to one bit
`removal alternative is that bit that saves the most amount of
`power. For example and referring to FIG. 1, it may be a bit
`at the tone, a+3f, or one at the tone, a+6f, depending on
`which of these saves the greater amount of power. If the total
`power level is now no longer exceeded, the process of bit
`removal ends. On the other hand, if the total power level is
`still exceeded, another bit is removed, likewise having the
`greatest remaining power savings and so on until the total
`power level is no longer exceeded.
`In an alternative bit removal process, a bit for removal is
`searched for whose power level value just decreases the total
`power level to be just less than the maximum total power
`level for the total
`tone spectrum. While the transmitted
`power level will be a maximum and so somewhat more
`efficient than the first alternative approach to bit removal, it
`is believed that determining which bit to remove becomes a
`more computationally intensive process and is thus less
`preferable than the first alternative discussed above at
`present.
`In summary, the algorithm briefly described above for
`allocating bits in a multi-tone modulation process permits
`
`Dish
`Exhibit 1015, Page 7
`
`

`
`6,134,274
`
`3
`the consideration of additional constraints, operates faster
`and generally requires fewer computations than the water
`pouring or ice cube filling approaches of the prior art.
`These and other features of the present invention will be
`better understood through reference to the drawings and the
`following detailed description.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`FIG. 1 is a drawing for describing the prior art technique
`of bit allocation in a multi-tone modulator of “pouring” bits
`on tones or into frequency bins until a maximum power level
`P (P1 or P2) for the entire spectrum (analogously, a water
`level) is exceeded.
`FIG. 2A is a functional block diagram of a typical discrete
`multi-tone modulator or transmitter according to the prior art
`(taken from T1.413-1995) in which, to practice the present
`invention, the tone ordering, gain scaling and IDFT modu-
`latio11 blocks are modified to practice the present invention
`and FIG. 2B is a functional block diagram taken from the
`same reference of a typical receiver/demodulator.
`FIG. 3 is a flowchart of the algorithm of the present
`invention, showing a method of allocating bits first to fill up
`each channel according to a maximum number of bits and a
`maximum power per channel and then, if a total power level
`(power budget) for the entire spectmm is exceeded, remov-
`ing bits one at a time until the total power level permitted is
`no longer exceeded.
`FIG. 4 shows the application of the present invention to
`a typical power mask and tone or bin arrangement with
`increasing frequency versus power where 7>< represents the
`power for three bits at frequency a+f.
`
`DETAILED DESCRIPTION
`
`The present invention will now be described with refer-
`ence to FIGS. 2—4. Referring to FIG. 2A, there is shown
`respectively an ATU-C transmitter whose reference diagram
`is taken from A.N.S.I. standard Tl .413-1995. ATU-C refers
`
`to an Asymmetric Digital Subscriber Line (ADSL) Trans-
`mitter Unit at a Central ofiice. A corresponding remote or
`subscriber unit (ATU-R) would have similar oomponents
`and is not shown or described herein. The ATU-C typically
`is utilized on non-loaded high capacity twisted pair cables
`which may be utilized for transmitting several megahertz of ,
`spectral bandwidth. In FIG. 2A, there is shown an expanded
`functional block diagram of the transmitter portion. FIG. 2B
`provides a functional block diagram of a receiver portion. A
`multiplexer/sync control unit 200 provides the interface to
`the digital network 110. Various high speed data rate links _
`ASO, AS], AS2 and AS3 at multiples of 1 .536 Mbits/sec are
`provided toward digital network 110. In particular, each AS
`link represents an independent downstream simplex
`(unidirectional downstream) bearer of data traffic. Lower
`speed data services are also shown and represented by LSO
`(16 or 64 kbits/sec), LS1 (160 kbits/see) and LS2 (384 or
`576 kbits/sec). Each LS link may represent a duplex bearer
`(bi—directional) carrying both downstream and upstream
`traffic or, in the alternative, a unidirectional simplex bearer.
`For a more thorough understanding of the Figure, the reader
`is encourged to study ANSI T1.413—1995, incorporated by
`reference as to any subject matter deemed essential to an
`understanding of the present invention.
`CRC 205 and CRC 210 represent cyclic redundancy
`check in each direction of transmission. Scrambler and
`forward error correction 215, 220 represent scrambling and
`forward error correction in each direction of transmission.
`
`4
`Interleaver 225 provides a data interleaving function as is
`further described in A.N.S.I. T1413-1995,
`incorporated
`herein by reference as necessary. Tone ordering function 230
`provides tone selection and control functions as are also
`described by A.N.S.I. T1.413—1995. Constellation encoder
`(if used) and gain scaling functions are represented by block
`235. The inverse discrete Fourier transform (IDFT) function
`applied for data modulation is represented by block 240.
`Two data directions are shown coupling IDFT 240 and
`output parallel to serial buffer 245 where a cyclic prefix is
`added to each data frame. Finally, a digital
`to analog
`converter and analog signal processing function are repre-
`sented by block 250 which interfaces the subscriber facility
`125, as indicated above, typically a high capacity twisted
`wire cable pair.
`invention is preferably implemented at a
`The present
`controller (not shown) for the blocks entitled tone orderer
`230, gain sealer 235 and IDFT 240 or as a component
`alogirthm or hardware implementtion within one or more of
`those blocks in combinaiton. Within a controller of these
`blocks, typically the decision has been made in the past to
`allocate bits to tones according to the prior art techniques
`described above known variously as water pouring,
`waterfalling, ice cube filling and the like. The decision has
`been made as described above with respect to the discussion
`of FIG.
`1
`in the Description of the Related Arts section.
`According to the present invention, the following con-
`straints are considered first:
`the maximum number of bits
`allowed in each tone or frequency bin for transmission and
`the maximum power to be transmitted in each bin (or power
`mask). Then, the total power constraint (power budget) is
`applied and, if necessary, bits are removed according to a bit
`removal process.
`The maximum number of bits per bin is calculated first
`according to prior art techniques (FIG. 1) and depending
`_ only on the power mask constraint. First the gain—to—noise
`ratio, GNR,
`is calculated in an initialization period or
`periodically as will be further described below. Then, the
`maximum number of bits that can be allocated to each bin
`is calculated. This computation is done from a relationship
`between the number of bits (bk) to be transmitted in a bin k
`and the power needed to transmit that many bits (bk) in bin
`number k. For this calculation, the power mask value in bin
`k is used as the amount of power available in bin k. The
`overall power constraint comprises two components, an
`overall constraint
`that establishes a total constraint, for
`example, of 100 milliwatts on the cable pair, but, more
`importantly at this point in the algorithm, a total power limit
`calculated for each tone or frequency. For example,
`the
`power limit for frequencies or tones between 0 and 200
`kilohertz must be less than 40 dBm/Hz (a power level
`referenced to one milliwatt over 1 Hz bandwidth). Above
`200 kHz (to frequencies in the megahertz of spectrum), the
`constraint may be -34 dBm/Hz. This power mask may be
`dictated by the standard used in a particular country irnple-
`menting the standard (such as A.N.S.I. standard T1 .413-
`1995). The power mask may also be a design constraint
`intentionally imposed by a modem designer for some other
`reason. For example, a designer may intentionally impose a
`constraint that no more than n bits are to be transmitted on
`transmit channel frequency, a+10f Similarly, the designer
`may impose a constraint that a minimum (or maximum)
`number of bits (or no bits) must be transmitted on a
`particular tone or frequency. The individual
`tone or fre-
`quency constraint
`is applied first,
`then,
`the total power
`constraint (the power budget) is applied.
`Once all the transmit frequency or tone bins are filled with
`bits and may be overflowing from following the constraint
`
`Dish
`Exhibit 1015, Page 8
`
`

`
`6,134,274
`
`6
`ing one bit in each frequency bin at step 350. Algorithm
`efficiency can be achieved by employing a partial sorting
`technique that finds the array eleme11t with the maximun1
`power saved without resorting to further sorting the array.
`The algorithm calculates the cost of the last bit (in terms of
`power saved by removing one bit) in each bin and then
`removes the bit from the bin that is the most expensive in
`terms of the additional power. This process 355, 360, 365 is
`continued until the total power level consumed is no greater
`than the total power budget, for example, of I00 milliwatts
`at step 365. Finally at step 375, the algorithm is done (the
`allocated bits may be transmitted).
`The process of allocating bits to frequency bins (per FIG.
`3) should be repeated periodically during the day as condi-
`tions change. Traffic, for example, slows in the early morn-
`ing hours, so noise decreases and data transmission ca11
`reach maximum levels. The character of traflic on a given
`cable pair may change from, for example, voice traffic to
`data traffic. Even if data traffic is assumed, the data carrying
`demand may change, for example, in an available bit rate or
`variable bit rate kind of data scenario. Thus, it is recom-
`mended that the bit allocation process be performed at least
`twice a day, and, it may be advantageous to perform the bit
`allocation procedure as frequently as every minute to take
`advantage of predictable, periodic changes in traflic patterns.
`A review of the following will assist in understanding the
`bit-by-bit allocation and bit removal process briefly
`described above from reference to FIG. 3. The relationship
`between the number of bits in a frequency bin and the power
`needed to transmit that number of bits by uncoded quadra-
`ture amplitude modulation (QAM), for a specified bit error
`rate (BER) at a receiver, for which
`
`3 N
`
`k
`
`is the measured profile, where g is the channel gain and N
`is the noise at frequency k is given by the following
`expression:
`
`KNk
`
`= 2" -1
`<
`k
`
`Ek
`
`> mac
`
`where:
`
`bk is the number of bits carried in frequency bin k, Ek is the
`power required in bin k to transmit the bk bits, g,/N,, is the
`measured gain to noise ratio in bin k.
`K is given by:
`
`where Pg is the error probability given by:
`
`P-41
`K’
`[
`
`1
`2
`-V/2T_1Q51\JTC‘-,
`
`Nk=Noise Power
`In the above equations, PE is the bit error rate (BER), N8 is
`the number of nearest neighbors, and the Q—function, Q(x) is
`defined as the partial integral of the normal distribution
`function as follows:
`
`5
`of filling the bins until their individual power level is met,
`the total power constraint (or power budget for all tones), for
`example, of 1(l0 milliwatts is applied. This 100 milliwatt
`total maximum power constraint
`is the total maximum
`power level for bit
`transmission on all
`the frequencies
`utilized where the 100 milliwatts parameter is dictated by
`the A.N.S.I. standard. Following another standard, the maxi-
`mum total power level (or power budget) may be different.
`If the total maximum power is not exceeded,
`then,
`the
`algorithm is complete. On the other hand, if the total power
`lin1it is exceeded, then a bit removal process follows.
`According to a presently preferred bit removal process,
`bits are removed according to the most power saved by its
`removal. The first bit removed then is the bit from the
`frequency bin with the most power saved in comparison
`with the bits of all other frequencies or frequency bins, anc
`the corresponding power saved is subtracted from the tota
`power. If the total power constraint is still exceeded after
`removal of the first bit, the next most power consuming bi
`is removed. VVith each bit removed, the comparison with the
`total power constraint (or power budget) is made until the
`power constraint is no longer exceeded and the algorithm is
`done. Referring to FIG. 1, if a power level P1 is the presen
`power level, one may select the bit from bin a+3f as the mos
`power consuming bit. After that bit is removed, and if the
`total power level is still exceeded, the next bit that may be
`removed may be a bit from the bin a+6f Since the approach
`to bit removal suggested here removes chunks of power, i
`may come to be called an ice cube removal technique.
`Having briefly described the algorithm of the presen
`invention, the algorithm will be further explained in con-
`siderable detail with reference to FIGS. 3 and 4. The
`example power mask of -40 dBn1/Hz changing to -34
`dBm/Hz at 200 kilohertz is shown at top. Aone dimensiona
`matrix for N frequencies where N is typically around 255
`different frequencies (for A.N.S.I. T1.413-1995) is formec
`and stored in memory. Each entry in the matrix is the
`maximum number of bits for that frequency. The algorithm
`of the present invention first computes the bit distribution (or
`allocation) within the constraints of the power spectrum
`mask shown in FIG. 4 and the maximum number of bits in
`a bin, but without
`the total power constraint (or power
`budget). Initialization step 300 to final bin step 335 of FIG.
`3 comprise the initial steps of allocating bits to frequencies.
`The bit allocation steps for allocating bits to a particular
`frequency bin 300-335 take into consideration constraints of
`1) the maximum number of bits allowed in each bin and 2)
`the maximum power level permitted for that frequency (for
`example, by calculating a power level from the constraint
`-40 dB1n/Hz for frequencies less than 200 kilohertz and -34 I
`dBm/Hz for frequencies greater than 200 kilohertz). The first
`constraint may be set by a modulator designer divorced from
`a standard. It may be set as a minimun1 or maximum number
`of bits per frequency or both (i.e. a range of permissible
`number of bits).
`Then, the total power needed to transmit the number of
`bits is calculated at step 340. If the total power required is
`less than the power budget (for example, 100 milliwatts),
`then the bit allocation function is necessarily completed. If
`the total power is greater than the budgeted power at step
`345,
`then the algorithm needs to reduce the bits to be
`transmitted in order to operate within the power budget
`constraints by following steps 350-365.
`In order to achieve the objective of reducing the bits
`transmitted to satisfy the maximum total power constraint,
`the algorithm first sorts the array of power saved by remov-
`
`Dish
`Exhibit 1015, Page 9
`
`

`
`6,134,274
`
`Ql:x,I:r [L-2
`x
`«/1171
`
`Now consider a code gain value of G6 to apply an effective
`amphfication factor in Eq. 1.
`
`The above equation can be inverted to express the power in
`terms of the number of bits as follows:
`
`E, [bkbizs] = ab‘ -1)-[
`
`KM
`35’/(G,
`
`]A(-22»; _ Uwk
`
`Eq. 3
`
`The power needed to transmit one additional bit in bin k, that
`already contains bk bits, for the K determined by the desired
`P, ca11 be derived to be:
`
`AF? : F_'k[(l;k + l)/zirs] — Fk U7k]IifS]
`
`= [(2% —1;»—<2”* — mm
`
`Eq_ 4
`
`This quantity is also the power that would be saved if the
`number of bits in bin k is reduced from bk+1 bits to bk bits.
`In other words, if the bin contains b,, bits, then the power
`saved by removing one bit from that bin is equal to the
`following:
`
`AE,f = wk -2“: -1
`
`Eq- 5
`
`’
`
`.
`
`This relationship leads to two different bit allocation
`algorithms:
`1. Each additional bit in a particular bin requires twice the
`amount of power needed as for the last bit that was added to
`the bin (briefly refer to FIG. 4 for seeing how each new bit
`at a given frequency costs twice the previous power). That
`is, from equation 4 above, if bk is increased by 1 to (bk+1),
`then AEA, is doubled. Therefore, one version of a bit alloca-
`tion algorithm is to calculate the power needed to add one
`more bit to each of the bins, then add a bit to that bin which
`requires the least amount of incremental power for the
`additional bit. The bit added is the least expensive bit in
`terms of incremental power needed. Then, one n1ust recal-
`culatc the power needed to add one more bit to this bin and
`then continue adding the least expensive bits to bins at each
`incremental stage, until the budgeted power is used up or
`any one of the constraints, maximum number of bits or
`maximum power spectrum mask is met. An algorithm fol-
`lowing this strategy is suggested by Bingham except that
`Bingham does not consider the additional constraints of
`transmit power spectrum mask and the maximum/minimum
`number of bits to be transmitted in one frequency channel.
`2. The second version of the algorithm is based upon
`removing bits. First, fill each frequency bin with the lesser
`of either the maximum allowable number of bits in one bin
`or the number of bits in one bin that corresponds to trans-
`mitting the maximum allowable power as prescribed by the
`power mask. Perform this bit allocation without any con-
`sideration for the total power budget (steps 300-335). Then
`sum the power required over all the bins (step 340). If the
`
`8
`total power is greater than the budgeted power, then remove
`bits one at a time until the power budget is met (steps
`350-365). For example, remove bits one at a time in an order
`that corresponds to removing the most expensive bit in terms
`of power saved.
`The algorithm that is a subject of the present invention is
`in accordance with the second approach. The steps in this
`algorithm again are as follows:
`1 . Steps 305-315. For each k and according to equation 2,
`compute the maximum number of bits that can be transmit-
`ted within that bin subject to the two constraints that the
`power in the bin must be no greater than P_maskk and that
`the number of bits can be no greater than bmax. This is
`achieved by substituting P_maskk for Ek in Eq. 2 to calcu-
`late b_m askk and using the smaller of bum, and b_maskk as
`the number of bits in bin k. If bk is less thanbmm, then use
`b,,=0, where bmm is the minimum number of bits (other than
`0 bits) to be transmitted in any bin.
`bk=MIl\'(b_mask,(, bmwc)
`
`Eq. 6
`
`,, to the sum of
`
`2. Steps 330-335. Calculate the value of Ek for all k
`according to equation 3.
`mm
`3. Step 340. Set the total power used, E
`all values of E,_,.
`then bit allocation as
`4. Step 345. If E,O,,,,<P_budget,
`calculated above is complete and go to step 12. On the other
`hand, if E,o,,,,<P_budget, then go to step 5.
`5. Step 350. Compute the array of 66 Ek for all k
`according to Eq. 5, using the value of bk in bin k, as
`calculated in step 1.
`6. Step 350. Sort the array of AE., in descending order so
`that the bin element with index=1 corresponds to the bin that
`would yield the largest savings in power if one bit from that
`bin is removed. The sorting operation needs to be performed
`only initially. For subsequent steps, only the value of one bin
`changes and the bin that changes value will be pushed into
`the appropriate new position in the array in step 10, below.
`In the following steps, the subscripts refer to the sorted
`array.
`7. Step 350. Reduce the number of bits in bin index=1 by
`one.
`
`8. Step 355. Reduce the value of EM“, by AE1.
`9. Step 355. Calculate the new value of AE1 as per Eq. 5
`using the value of bl reduced by 1. Note that the new value
`of AE1 is half the old value of AE.
`10. Step 355. Insert element 1 (the first element in the
`array) to the appropriate new position in the array of
`descending values of incremental power as determined by
`the new and smaller by half value of AE1. After this insertion
`in the array, the first element in the array again refers to
`another bin that would save the largest amount of power by
`the removal of one bit from that frequency bin. Note that the
`first element even after being reduced by the factor of 2 in
`step 6 may still remain in the first position, even after
`re-ordering, if the original value of AEl was greater than
`twice the value of the second element in the array.)
`11. Step 365. Go to step 5.
`12. Step 375. Exit algorithm. Depending on the environ-
`ment and circumstances, the bit allocation algorithm should
`be periodically performed within a twenty—four hour day.
`Conditions such as amount and type of telecommunications
`traffic change during the day as do external noise influences
`such as radio broadcast stations and the like.
`The algorithm detailed above will determine the maxi-
`mum number of bits that can be transmitted in one DMT
`
`symbol (for example, 8 bits) since the algorithm expends
`power in the most efficient way. Moreover, the algorithm
`
`Dish
`Exhibit 1015, Page 10
`
`

`
`6,134,274
`
`9
`also applies the constraints that ought to be applied in a
`practical implementation of the ADSL modem using DMT
`modulation technology. That is, the constraints consisting of
`power spectrum mask, the limits on the minimum or maxi-
`mum r1un1ber of bits or range of bits to be transmitted in one
`frequency bin and the discrete levels of power required to
`transmit integer bits.
`FIG. 4 is a graph of signal power and the individua
`frequency power constraint mask. At left, an exemplary bi
`allocation for the frequency bin a+f is shown whereby the
`first bit has a power level x, but with the addition of the nex
`bit, twice the power level is added or 2x. With the third bit,
`twice the cumulative power level is added again or 3>< more
`for a total of six times the power witl1 three bits added. A
`the top of the graph is shown the power mask constraint tha
`no power level on any given frequency below 200 kilohertz
`should exceed -40 dBm (where n1 is one milliwatt). No
`power level on frequencies above 200 kilohertz shoulc
`exceed -34 dBm per A.N.S.I. standard T1.413-1995.
`Thus there l1as been shown and described a method an:
`apparatus for allocating b

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket