throbber
7/12/2016
`
`EE Times - ADSL Technology Explained, Part 1: The Physical Layer
`
`I
`
`EE |
`
`Connecting the Global
`
`Electronics Community
`
`‘WIRELESS 3.: NET"WOR_KINC
`
`Design How-To
`
`ADSL Technology Explained, Part 1: The Physical
`Layer
`Louis Litwin, Michael Pugel, Rob
`Rhodes, and John Richardson
`3/1/2001 04:35 PM EST
`Posta comment
`
`ljlfli
`
`ADSL Technology Explained, Part 1: The Physical Layer
`For residential and commercial users with an ongoing need for broadband data access, but
`who do not send out correspondingly large data streams, asymmetric digital subscriber line
`(ADSL) services work well. This service is so named because the data rate sent to the user
`(downstream) is much greater than the data rate sent from the user (upstream). This
`asymmetric model is based on typical Internet usage patterns.
`
`For example, a user sends a Web page request (small amount of upstream data) and
`receives the HTML for the Web page with graphics and sound (large amount of
`downstream data). Various services, such as cable modems, satellite services, and DSL
`exist to provide such access.
`
`An ADSL system uses existing telephone wire to allow bidirectional data communications
`between a user and the telephone company's central office (CO). Some other popular
`services, such as an ISDN line or a standard dial-up modem, also use the phone lines to
`communicate. However, those services prevent the simultaneous operation of standard
`analog phone service on the same phone line. An important advantage of ADSL is that it
`allows the plain old telephone system (POTS) signal to co-exist with the ADSL data signal.
`
`We begin our tour of the ADSL system architecture with a look at the physical layer (PHY).
`Topics covered at the PHY will include ADSL's multicarrier modulation technique, common
`impairments, and phone-line characteristics.
`
`Spectrum allocation
`
`The ADSL PHY was designed so that it could peacefully co-exist with the standard POTS
`spectrum. The two services can co-exist because the ADSL spectrum only uses the
`frequencies above POTS. The POTS spectrum goes from near DC to approximately 4 kHz.
`A frequency guard band is placed between the POTS spectrum and the ADSL spectrum to
`help avoid interference. The ADSL spectrum starts above the POTS band and extends up
`to approximately 1.1 MHz. The lower part of the ADSL spectrum is for upstream
`transmission (from the customer to the CO) and the upper part of the spectrum is
`fordownstream transmission. There are actually two different ways that the upstream and
`downstream spectra can be arranged (see Figure 1).
`
`In a frequency division multiplexed (FDM) system, the upstream and downstream spectra
`use separate frequency ranges. They can vary for different implementations, but typically
`the upstream band is from 25 to 200 kHz and the downstream band is from 200 kHz to 1.1
`
`http://www.eeti m es.com/docum ent.asp?doc_id= 1277268&pri nt=yes
`
`Dish
`Exhibit 1035, Page 1
`
`

`
`7/12/2016
`
`EE Times - ADSL Technology Explained, Part 1: The Physical Layer
`
`MHz. Other divisions are also permitted within the ADSL standard. This system is free from
`the occurrence of a type of interference called self-crosstalk. One drawback, however, is
`that the downstream bandwidth is reduced in comparison to an echo-cancelled system.
`
`An echo-cancelled system allows the downstream band to overlap with the upstream band.
`The upstream band still uses the frequencies from 25 to 200kHz, but the downstream band
`can now extend over the upstream band. The main advantage of this system is that it
`significantly extends the available downstream bandwidth. However, it does require echo-
`canceling circuitry due to the full-duplex transmission. In addition, the presence of self-
`crosstalk causes additional interference.
`
`The DMT approach
`
`The PHY of ADSL uses a multicarrier modulation technique known as discrete multitone
`(DMT). A DMT system transmits data on multiple subcarriers in a manner very similar to
`the orthogonal FDM (OFDM) technique that is used in many wireless applications. A DMT
`modulator takes in N data symbols in parallel and transmits the symbols on N subcarriers.
`
`The data rate on each subcarrier is 1/N the original data rate.
`
`Reducing the data rate results in a DMT symbol period that is N times as long as the
`original symbol period. Increasing the symbol period can make the symbol longer than the
`time span of the channel. This situation can make it easier to combat the effects of
`intersymbol interference.
`
`The DMT signal is formed by using an Inverse Fast Fourier Trans-form (IFFT) to generate
`orthogonal subcarriers at the transmitter. The data symbols at the transmitter are treated
`as being in the frequency domain and act as complex weights for the basis functions
`(orthogonal sinusoids at different frequencies) of the IFFT. The IFFT then converts the
`data symbols into a time-domain "sum of sinusoids" signal.
`
`The block of IFFT output samples is known as a DMT symbol. This time-domain signal is
`transmitted across the channel, and an FFT is used at the receiver to bring the signal back
`into the frequency domain. A block diagram of a typical ADSL transmitter/receiver pair is
`shown in Figure 2.
`
`A 2N-point IFFT is used to generate the DMT symbol, and the N negative-frequency IFFT
`bins are the complex conjugate of the N positive-frequency bins. This symmetric spectrum
`results in a real time-domain signal. The DMT signal is centered at DC with the subcarriers
`around DC zeroed out (not used) to create a hole in the DMT spectrum in order to make
`room for the POTS spectrum. DMT is thus a true baseband system.
`
`DMT supports inclusion of a cyclic prefix. A cyclic prefix is a block of samples with a length,
`Lp, that is a replica of the last Lp samples of the DMT symbol. The prefix is then
`
`transmitted first, followed by the 2N samples of the DMT symbol. The length Lp is chosen
`
`such that it will be longer than the length of the channel response. The cyclic prefix
`contains redundant information. However, the DMT receiver exploits the presence of the
`prefix in order to mitigate the effects of the channel. The use of the cyclic prefix will be
`described in further detail in the Impairments section.
`
`The dynamic bit allocation technique allows DMT to make efficient use of the available
`channel capacity. This technique enables the system to vary the number of bits per symbol
`for each subcarrier based on the subcarrier's signal-to-noise ratio (SNR). Subcarriers with
`a low SNR transmit binary phase-shift keying (BPSK) or quadrature PSK (QPSK) because
`they are robust modulation formats. If the subcarrier's SNR is very low, that subcarrier will
`not be used to transmit data at all. Subcarriers with a higher SNR transmit higher-order
`quadrature amplitude modulation (QAM) in order to achieve an increased throughput.
`
`Impairments
`
`http:/lwww.eetimes.com/document.asp?docJd=1277268&print=yes
`
`Dish
`Exhibit 1035, Page 2
`
`

`
`7/12/2016
`
`EE Times - ADSL Technology Explained, Part 1: The Physical Layer
`
`There are several significant types of impairments encountered in an ADSL system:
`additive white Gaussian noise (AWGN), crosstalk, impulse noise, bridged taps, and radio
`noise.
`
`AWGN is the thermal noise that is common to all communication systems. In a digital
`system such as ADSL, AWGN can cause symbol errors to occur at the receiver when noise
`pushes the received sample beyond a decision boundary. Like many other digital
`communication systems, ADSL employs error-control coding to help mitigate the effect of
`AWGN. Coding adds redundancy to the transmitted signal and exploits the redundancy at
`the receiver to detect and correct errors.
`
`ADSL uses three layers of coding. The innermost code in the PHY is a convolutional code.
`These codes get their name because the encoding process can be viewed as the
`convolution of the message with the code's impulse response. The Viterbi algorithm is used
`at the receiver to decode the received sequence.
`
`Convolutional codes
`
`Convolutional codes are good at correcting random errors. However, the nature of the
`decoding algorithm is such that the decoder can cause burst errors to occur if errors are
`made during the decoding process.
`
`A Reed-Solomon block code is used on top of the convolutional code. Reed-Solomon
`codes are powerful codes that are good at detecting and correcting burst errors, such as
`those generated by the Viterbi decoder. The ADSL specification allows Reed-Solomon
`code-word lengths of up to 255 bytes with the addition of up to 16 parity bytes for each
`code word. The outermost code is a cyclic redundancy check (CRC) code. The CRC can
`detect errors, but it cannot correct them. The CRC code is used as a top-level error-
`detection mechanism in order to detect any errors that remain after Viterbi and Reed-
`Solomon decoding.
`
`Because bundled telephone cable contains many wires for many different users, crosstalk
`is a common impairment. These wires radiate electromagnetically and can induce currents
`in other wires in the cable. This interference effect is known as crosstalk. There are two
`
`basic types of crosstalk and they both appear at the receiver as additive noise.
`
`Near-end crosstalk (NEXT) occurs when a transmitter interferes with a receiver located on
`the same end of the cable. Far-end crosstalk (FEXT) occurs when the transmitter
`interferes with a receiver on the opposite end of the cable. The effect of NEXT is more
`severe than FEXT since the FEXT interference travels the entire length of the cable and is
`attenuated by the time it reaches the receiver.
`
`Crosstalk can be further subdivided into self-crosstalk and foreign crosstalk. Self-crosstalk
`is interference from another ADSL system using the same spectrum allocation. Foreign
`crosstalk is interference from an ADSL system using a different spectrum allocation or from
`a completely different type of system (such as ISDN). One way to reduce the effects of
`crosstalk is with spectrum allocation.
`
`In echo-cancelled ADSL, the upstream and downstream channels overlap (see Figure 1).
`Since the same frequency band is being used for transmission and reception, the system
`will suffer from self- and foreign crosstalk. However, in FDM ADSL the upstream and
`downstream channels use separate frequency bands. This system will not suffer from self-
`crosstalk, although foreign crosstalk will still be present.
`
`Interference that is short in duration but of a large magnitude is known as impulse noise.
`Impulse noise can be caused by lightning or by a motor turning on and creating a power
`surge. ADSL systems use a combination of interleaving and coding to correct the errors
`caused by impulse noise. The interleaving process rearranges data so that those samples
`that were located contiguously in time are spaced far apart. Impulse noise can cause a
`
`http:/lwww.eetimes.com/document.asp?docJd=1277268&print=yes
`
`Dish
`Exhibit 1035, Page 3
`
`

`
`7/12/2016
`
`EE Times - ADSL Technology Explained, Part 1: The Physical Layer
`
`burst of errors that is hard for the decoders to correct. The use of interleaving combined
`with coding spreads out these errors in time to improve decoding performance.
`
`An additional impairment
`
`Bridged taps are an additional impairment type found in ADSL systems. A bridged tap is a
`section of wire connected to the loop at one end and unterminated at the other end.
`Examples of bridged taps are unterminated wires that are laid out in areas where housing
`is still being built. When a transmitted signal arrives at a bridged tap, the signal divides.
`Part of the energy continues to the receiver and the rest of the energy reflects off of the
`unterminated end. This reflection causes delayed versions of the signal to arrive at the
`receiver, and these reflections distort the received signal. The effect is very similar to the
`interference that occurs with a multipath channel in a wireless communication system.
`
`Bridged taps cause two problems. The first is intersymbol interference where a received
`DMT symbol is distorted due to delayed versions of the previous DMT symbol. The effect
`of intersymbol interference is removed by discarding the cyclic prefix at the receiver. The
`cyclic prefix contains redundant information, and so it is not needed at the receiver. The
`length of the prefix is chosen such that the delayed versions of the previous symbol only
`distort the cyclic prefix and not the actual data part of the DMT symbol. The ability to
`remove the effect of intersymbol interference by discarding the cyclic prefix is one of the
`advantages of having a long symbol period.
`
`The second problem is the intrasymbol interference that is caused when delayed versions
`of a DMT symbol cause the symbol to interfere with itself. The effect of intrasymbol
`interference in the frequency domain is a shaping of the received-signal spectrum. The
`received spectrum is essentially a multiplication of the transmitted spectrum and the
`channel's frequency response. The distortion due to intrasymbol interference is removed
`by using a frequency-domain equalizer.
`
`And finally, radio noise is interference due to a wireless source. The copper phone lines act
`as antennae and pick up this interference. The most common source of radio noise comes
`from AM radio since its spectrum overlaps with the ADSL spectrum. Coding can help
`correct the errors caused by radio noise, and adaptive RF cancellation filters can also be
`used. The previously mentioned technique of dynamic bit allocation can be used to turn off
`subcarriers near frequencies of interference.
`
`ADSL in the physical plant
`
`ADSL operates within the existing POTS plant structure. The phone company has been in
`existence for nearly 100 years and despite modernization, the structure today remains
`much as it did years ago. There are more than 700 million phone lines in the world with
`two-thirds in the US alone. Figure 3 illustrates the basic structure that is utilized in many US
`phone-service deployments.
`
`Mainline routes shown on the left side of Figure 3 are connected by fiber between toll
`offices (TOs). These TOs provide the interface between local exchanges and long-haul
`fiber runs for long-distance service. The TOs also connect COs that control local exchange
`service. The CO houses the main switching equipment for the home and also serves as the
`location for the head-end DSL equipment.
`
`Multiple interconnects are often made between several COS and TOs for operational
`reliability. From the CO, the network is further subdivided into customer service areas
`(CSAs) that are serviced by remote terminals (RTs). This region represents the last several
`miles before the home, such as a large neighborhood or small city.
`
`The CSA is then further subdivided into a distribution area (DA) that is initiated at a feeder
`distribution interface (FDI) serving up to 500 phone lines. The FDI represents the last point
`where the phone lines are still bundled together. The phone wires take separate routes to
`
`http:/lwww.eetimes.com/document.asp?docJd=1277268&print=yes
`
`Dish
`Exhibit 1035, Page 4
`
`

`
`7/12/2016
`
`EE Times - ADSL Technology Explained, Part 1: The Physical Layer
`
`each home and typically cover the last mile of service routing.
`
`Standard copper twisted pair is the primary medium for routing between the CO and RT,
`and then on to the home residence. Fiber deployment through these regions is technically
`possible but economically unjustifiable, especially for points past the FDI. Fiber routing will
`eventually be used for routes between the CO and RT. This upgrade will support
`improvements in ADSL service as well.
`
`The ability to supply phone service over a very long distance of wire, often called reach, is
`limited by the ability of the phone switching equipment at the CO to function correctly. The
`network switch can operate with a maximum DC load resistance of approximately 1,500 9.
`Most of this resistance is found in the copper lines running between the CO and home.
`
`The distance at which this resistance is reached is known as the revised resistance design
`(RRD) distance. Voice quality over the phone often suffers prior to reaching the RRD
`distance, which can extend to more than 3 miles. The phone company employs tricks to
`improve quality, including thicker wire and load coils. ADSL performance is also a function
`of the distance from the CO and service is often extremely limited or impossible on these
`long reaches.
`
`Plain old copper
`
`The copper pair wire that runs between the CO and the home residence has the greatest
`impact on ADSL system performance. The wire provides simultaneous signal routing of
`bidirectional voice communications, which will occupy the spectrum up to approximately 4
`kHz. Above this frequency, the ADSL signals are inserted. The wire is best modeled as a
`lossy transmission line. Most plants employ one of four copper wire gauges ranging from
`19 to 26 gauge.
`
`Thinner wire (higher gauge number) is typically used close to the CO to allow smaller
`bundles to be formed. Thicker wire is used close to the residence to extend the reach from
`
`the CO to home while keeping within the resistance limits required for proper voice
`switching.
`
`The transmission-line model contains a shunt capacitance in parallel with a shunt
`resistance (due to dielectric losses) along with a series resistance and series inductance.
`The cable specifications dictate that the capacitance (per mile) is constant for all wire
`gauges. As a result, the nominal line impedance is typically around 120 SE. The series
`resistance changes by approximately 20% over the possible wire gauges and increases
`logarithmically with frequency. Typical loss through the wire is 3 to 6 dB per mile in the
`voice band, depending on wire gauge, and also increases logarithmically with frequency.
`
`Most system impairments are created by, or enter the system through, the copper wire.
`The wire, through its lossy nature, accounts for degradation in SNR. Reflections are
`created in the system due to unterminated lines such as bridged taps and wire splices.
`These reflections create self-interference. Reflections cause energy cancellation at certain
`frequencies as discussed in the Impairments section. The wire is typically unshielded from
`the FDI (point of fanout) to the home location and is susceptible to ingress (pickup of
`external signals in the frequency range of interest).
`
`Part two of this article will complete the discussion of PHY equipment and move on to
`discuss the link layer. Other elements of the PHY plant will be introduced with a focus on
`the equipment at the home. Link layer topics include ADSL modem initialization and packet
`framing. ATM and IP will be covered in the network-layer section. Finally, the application
`layer will address some new services such as voice over DSL (VoDSL) and video
`streaming.
`
`http://www.eetimes.com/document.asp?docJd=1277268&print=yes
`
`Dish
`Exhibit 1035, Page 5
`
`

`
`7/12/2016
`
`EE Times - ADSL Technology Explained, Part 1: The Physical Layer
`
`Rob Rhodes is manager of the Communications Design group at Thomson Multimedia
`(Indianapolis, IN). The group is responsible for the development of the PHYinterfaces for
`satellite, cable, and DTV communications. He can be reached at rhodesr@tce.com.
`
`Mike Pugel is a principal member of the technical staff at Thomson Multimedia
`(Indianapolis, IN). He is currently working on advanced communication receiver concepts.
`He can be reached at pugelm@tce.com.
`
`Louis Litwin is a member of the technical staff at Thomson Multimedia (Princeton, NJ).
`His focus is the development of wireless communication devices used for digital home
`networking and mobility applications. He can be reached at litwinl@tce.com.
`
`John Richardson is a member of the technical staff at Thomson Multimedia (Princeton,
`NJ). He is primarily involved in the areas of digital home networking and ADSL system
`development. He can be reached at richardsonj@tce.com.
`
`EMAILTHIS PRINT COMMENT
`
`More Related Links
`
`Virtual Nets Pave Road to Acceleration
`
`iPhone 7 Photos Leak, Show Revamped Antenna Placement
`
`Take the Fact Check Challenge
`
`Why Networks Need ASlCs
`Brexit Threatens London's Data Center Market
`
`Copyright© 2016 UBM Electronics, A UBM company, All rights reserved. Privacy Policy | Terms of Service
`
`http://www.eeti m es.com/docum ent.asp?doc_id= 1277268&pri nt=yes
`
`Dish
`Exhibit 1035, Page 6

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket