throbber
Ee
`
`7
`
`DIGITAL
`COMMUNICATIONS
`Fundamentals and Applications
`
`BERNARD SKLAR
`The Aerospace Corporation, E/ Segundo, California
`dan
`University of California, Los Angeles
`
`P T R Prentice Hall
`Englewood Cliffs, New Jersey 07632
`
`
`
`HTC/ZTE Exhibit 1015
`
`

`

`
`
`
`
`
`
`Library of Congress Cataloging-in-Publication Data
`
`Skvar, Bernarp (date)
`Digital communications.
`
`Bibliography: p.
`Includes index.
`[. Title.
`1. Digital communications.
`TK5103.7.555
`1988
`621.38'0413
`ISBN 0-13-211939-@
`
`87-1316
`
`
`
`Editorial/production supervision and
`interior design: Reynold Rieger
`Cover design: Wanda Lubelska Design
`Manufacturing buyers: Gordon Osbourne and Paula Benevento
`
`= © 1988 by P T R Prentice-Hall, Inc.
`= A Simon & Schuster Company
`Englewood Cliffs, New Jersey 07632
`
`All rights reserved. No part of this book may be
`reproduced, in any form or by any means,
`without permission in writing from the publisher,
`
`Printed in the United States of America
`
`10
`
`ISBN O-135-211939-0
`
`O25
`
`Prentice-Hall International (UK) Limited, London
`Prentice-Hall of Australia Pty. Limited, Sydney
`Prentice-Hall Canada Inc., Toronto
`Prentice-Hall Hispanoamericana, $.A., Mexico
`Prentice-Hall of India Private Limited, New Delhi
`Prentice-Hall of Japan, Inc., Tokyo
`Simon & Schuster Asia Pte. Ltd., Singapore
`Editora Prentice-Hall do Brasil, Ltda,, Rio de Janeiro
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`HTC/ZTE Exhibit 1015-2
`
`HTC/ZTE Exhibit 1015-2
`
`

`

`
`
`Contents :
`
`PREFACE
`
`1
`
`SIGNALS AND SPECTRA
`
`1.1
`
`1.2
`
`1.3.
`
`1.5
`
`Digital Communication Signal Processing,
`Lid) Why Digital?,
`3
`i.d.2
`Typical Block Diagram and Transformations, 4
`14.3 Basic Digital Communication Nomenclature,
`9
`14.4 Digital versus Analog Performance Criteria,
`11
`Classification of Signals,
`11
`121 Deterministic and Random Signals,
`1.2.2
`Periodic and Nonperiodic Signals,
`1.2.3 Analog and Discrete Signals,
`12
`124
`Energy and Power Signals,
`12.5
`The Unit Impulse Function,
`Spectral Density,
`14
`13.1
`Energy Spectral Density,
`13.2
`Power Spectral Density,
`1.4 Autocorrelation,
`17
`17
`1.4.1 Autocorrelation of an Energy Signal,
`£4.2 Autocorrelation of a Periodic (Power) Signal,
`Random Signals,
`18
`135.1
`Random Variables,
`15.2 Random Processes,
`
`3
`
`11
`12
`
`17
`
`12
`13
`
`14
`15
`
`18
`20
`
`xxi
`
`1
`
`vii
`
`HTC/ZTE Exhibit 1015-3
`
`HTC/ZTE Exhibit 1015-3
`
`

`

`
`
`
`
`
`|
`
`
`
`1.7
`
`1.8
`
`38
`
`43
`
`
`22
`Time Averaging and Ergodicity,
`1.5.3
`
`23
`Power Spectral Density of a Random Process,
`134
`
`L5,.5|Noise in Communication Systems, 27
`
`
`1.6
`Signal Transmission through Linear Systems,
`30
`1.6.2
`Impulse Response,
`31
`
`
`31
`1.6.2
`Frequency Transfer Function,
`
`32
`1.6.3 Distortionless Transmission,
`
`1.6.4
`Signals, Circuits, and Spectra,
`
`Bandwidth of Digital Data,
`41
`‘
`i.7,1
`Baseband versus Bandpass,
`41
`
`
`1.7.2
`The Bandwidth Dilemma,
`
`Conclusion,
`46
`References,
`46
`
`Problems,
`47
`
`2 FORMATTING AND BASEBAND TRANSMISSION
`
`51
`
`55
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Contents HTC/ZTE Exhibit 1015-4
`
`54
`Baseband Systems,
`2.1
`Formatting Textual Data (Character Coding),
`2.2
`2.3 Messages, Characters, and Symbols,
`55
`2.3.1
`Example of Messages, Characters, and
`Symbols,
`55
`Formatting Analog Information,
`24.1
`The Sampling Theorem,
`24,2
` Aliasing,
`66
`2.4.3
`Signal Interface for a Digital System,
`Sources of Corruption,
`70
`2.5.1
`Sampling and Quantizing Effects,
`2.5.2
`Channel Effects,
`71
`2.5.3
`Signal-to-Noise Ratio for Quantized Pulses,
`Pulse Code Modulation,
`73
`2.6
`2.7 Uniform and Nonuniform Quantization,
`2.7.1
`Statistics of Speech Amplitudes,
`74
`2.7.2 Nonuniform Quantization,
`76
`2.7.3
`Companding Characteristics,
`Baseband Transmission,
`78
`2.8.1 Waveform Representation of Binary Digits,
`2.8.2
`PCM Waveform Types,
`78
`82
`2.8.3
`Spectral Attributes of PCM Waveforms,
`2.9 Detection of Binary Signals in Gaussian Noise,
`2.9.1 Maximum Likelihood Receiver Structure,
`2.9.2.)
`The Matched Filter,
`88
`2.9.3
`Correlation Realization of the Matched Filter,
`2.9.4 Application of the Matched Filter,
`91
`2.9.5
`Error Probability Performance of Binary
`Signaling,
`92
`
`2.4
`
`2.5
`
`2.8
`
`59
`
`59
`
`69
`
`70
`
`74
`
`77
`
`72
`
`78
`
`83
`
`85
`
`90
`
`HTC/ZTE Exhibit 1015-4
`
`

`

`2.11
`
`2.10 Multilevel Baseband Transmission,
`2.10.1 PCM Word Size,
`97
`98
`Intersymbol Interference,
`2411 Pulse Shaping to Reduce ISI,
`2.41.2 Equalization,
`104
`2.12 Partial Response Signaling,
`2.12.1 Duobinary Signaling,
`2.12.2 Duobinary Decoding,
`2.12.3 Precoding,
`108
`2.12.4 Duobinary Equivalent Transfer Function,
`2.12.5 Comparison ofBinary with Duobinary
`Signaling,
`[11
`2.12.6 Polybinary Signaling,
`2.13 Conclusion,
`112
`References,
`113
`Problems,
`113
`
`95
`
`100
`
`106
`106
`107
`
`112
`
`109
`
`51
`
`3
`
`BANDPASS MODULATION AND DEMODULATION
`
`117
`
`3.3
`
`3.5
`
`118
`3.1 Why Modulate?,
`119
`3.2
`Signals and Noise,
`119
`3.2.1 Noise in Radio Communication Systems,
`120
`3.2.2.
`A Geometric View of Signals and Noise,
`Digital Bandpass Modulation Techniques,
`127
`33.1
`Phase Shift Keying,
`130
`130
`3.3.2
`Frequency Shift Keying,
`131
`3.3.3 Amplitude Shift Keying,
`131
`3.3.4 Amplitude Phase Keying,
`3.3.5 Waveform Amplitude Coefficient,
`3.4 Detection of Signals in Gaussian Noise,
`34.1 Decision Regions,
`132
`3.4.2
`Correlation Receiver,
`Coherent Detection,
`138
`138
`3.5.1
`Coherent Detection of PSK,
`3.5.2
`Sampled Matched Filter,
`139
`3.5.3
`Coherent Detection of Multiple Phase Shift
`Keying,
`142
`Coherent Detection of FSK,
`3.5.4
`3.6 Noncoherent Detection,
`146
`146
`3.6.1 Detection of Differential PSK,
`148
`3.6.2 Binary Differential PSK Example,
`150
`3.6.3 Noncoherent Detection of FSK,
`3.64 Minimum Required Tone Spacing for Noncoherent
`Orthogonal FSK Signaling, 52
`
`132
`132
`
`133
`
`145
`
`Contents
`
`Contents
`
`ix
`
`HTC/ZTE Exhibit 1015-5
`
`HTC/ZTE Exhibit 1015-5
`
`

`

`
`
`176
`
`3.7.2
`
`3.7.3
`
`3.7.4
`
`3.7.5
`3.7.6
`
`3.7.
`
`3.9
`
`155
`Error Performance for Binary Systems,
`3.7.1. Probability of Bit Error for Coherently Detected
`BPSK,
`155
`Probability ofBit Error for Coherently Detected
`Differentially Encoded PSK,
`160
`Probability ofBit Error for Coherently Detected
`FSK,
`161
`Probability of Bit Error for Noncoherently Detected
`FSK,
`i162
`‘
`164
`Probability of Bit Error for DPSK,
`Comparison ofBit Error Performance for Various
`Modulation Types,
`166
`167
`3.8 M-ary Signaling and Performance,
`3.8.1
`Ideal Probability of Bit Error Performance,
`3.8.2 M-ary Signaling,
`167
`170
`3.8.3
` Vectorial View ofMPSK Signaling,
`3.84 BPSK and QPSK Have the Same Bit Error
`Probability,
`171
`3.8.5
`Vectorial View ofMFSK Signaling,
`172
`Symbol Error Performance for M-ary Systems (M > 2),
`3.9.1
`Probability of Symbol Error for MPSK,
`176
`3.9.2
`Probability of Symbol Error for MFSK,
`177
`3.9.3 Bit Error Probability versus Symbol Error Probability
`Jor Orthogonal Signals,
`180
`Bit Error Probability versus Symbol Error Probability
`3.9.4
`for Multiple Phase Signaling,
`181
`Effects of Intersymbol Interference,
`182
`3.9.5
`3.10 Conclusion,
`182
`References,
`182
`Problems,
`183
`
`167
`
`4 COMMUNICATIONSLINK ANALYSIS
`
`187
`
`|
`
`
`
`:
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`What the System Link Budget Tells the System
`188
`Engineer,
`The Channei,
`189
`4.24
`189
`The Concept of Free Space,
`4.2.2
`Signal-to-Noise Ratio Degradation,
`4.2.3
`Sources of Signal Loss and Noise,
`Received Signal Power and Noise Power,
`4.31
`The Range Equation,
`195
`4.3.2
`Received Signal Power as a Function of
`Frequency,
`199
`Path Loss Is Frequency Dependent,
`Thermal Noise Power,
`202
`
`190
`196
`
`195
`
`200
`
`Contents HTC/ZTE Exhibit 1015-6
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`4.1
`
`4.2
`
`4,3
`
`4.3.3
`4.3.4
`
`HTC/ZTE Exhibit 1015-6
`
`

`

`4.4
`
`4.5
`
`4.6
`
`4.7
`
`4.8
`4.9
`
`207
`
`215
`
`4
`
`204
`Link Budget Analysis,
`205
`44.1
`Two E,/No Values of Interest,
`44.2
`Link Budgets Are Typically Catculated in
`Decibels,
`206
`4.43 How Much Link Margin Is Enough?,
`4.44
`Link Availability,
`209
`Noise Figure, Noise Temperature, and System
`Temperature,
`213
`213
`4.5.1 Noise Figure,
`4.5.2. Noise Temperature,
`4.5.3
`Line Loss,
`216
`4.5.4
`Composite Noise Figure and Composite Noise
`Temperature,
`218
`System Effective Temperature,
`4.5.5
`Sky Noise Temperature,
`224
`4.5.6
`Sample Link Analysis,
`228
`228
`4.6.1
`Link Budget Details,
`4.6.2
`Receiver Figure-of-Merit,
`4.6.3
`Received Isotropic Power,
`Satellite Repeaters,
`232
`232
`4.7.1 Nonregenerative Repeaters,
`4.7.2 Nonlinear Repeater Amplifiers,
`System Trade-Offs,
`238
`Conclusion,
`239
`References,
`239
`Problems,
`240
`
`220
`
`236
`
`230
`231
`
`5) CHANNEL CODING: PART 1
`
`245
`
`246
`5.1 Waveform Coding,
`5.1.1 Antipodal and Orthogonal Signals,
`5.1.2 M-ary Signaling,
`249
`5.1.3 Waveform Coding with Correlation Detection,
`5.1.4 Orthogonal Codes,
`251
`5.1.5 Biorthogonal Codes,
`255
`5.1.6
`Transorthogonal (Simplex) Codes,
`Types of Error Control,
`258
`258
`5.2.1
`Terminal Connectivity,
`5.2.2 Automatic Repeat Request,
`Structured Sequences,
`260
`5.3.1
`Channel Models,
`261
`5.3.2
`Code Rate and Redundancy,
`5.3.3.
`Parity-Check Codes,
`263
`5.34
`Coding Gain,
`266
`
`247
`
`257
`
`249
`
`259
`
`263
`
`5.2
`
`5.3.
`
`176
`
`187
`
`Contents
`
`Contents
`
`xi
`
`,
`
`
`
`
`
`HTC/ZTE Exhibit 1015-7
`
`HTC/ZTE Exhibit 1015-7
`
`

`

`‘
`i
`:
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`6.1.
`6.2
`
`6.3
`
`317
`
`;
`322
`
`327
`
`315
`Convolutional Encoding,
`Convolutional Encoder Representation,
`6.2.1
`Connection Representation,
`318
`6.2.2
`State Representation and the State Diagram,
`6.2.3
`The Tree Diagram,
`324
`6.2.4
`The Trellis Diagram,
`326
`Formulation of the Convolutional Decoding Problem,
`6.3.1 Maximum Likelihood Decoding,
`327
`6.3.2
`Channel Models: Hard versus Soft Decisions,
`6.3.3
`The Viterbi Convolutional Decoding Algorithm,
`
`5.4
`
`5.5
`
`5.6
`
`5.8
`
`269
`Linear Block Codes,
`269
`5.4.1
`Vector Spaces,
`270
`5.4.2
`Vector Subspaces,
`3.4.3
`A (6, 3) Linear Block Code Example,
`3.4.4 Generator Matrix,
`272
`5.4.5
`Systematic Linear Block Codes,
`5.4.6
`Parity-Check Matrix,
`275
`5.4.7
`Syndrome Testing,
`276
`5.4.8
`Error Correction,
`277
`‘
`Coding Strength,
`280
`280
`5.3.1 Weight and Distance of Binary Vectors,
`5.5.2 Minimum Distance of a Linear Code,
`281
`5.5.3
`Error Detection and Correction,
`281
`5.5.4
`Visualization of a 6-Tuple Space,
`285
`3.I.5
`Erasure Correction,
`287
`Cyclic Codes,
`288
`3.6.1 Algebraic Structure of Cyclic Codes,
`53.6.2
`Binary Cyclic Code Properties,
`290
`3.6.3
`Encoding in Systematic Form,
`290
`53.6.4
`Circuit for Dividing Polynomials,
`292
`3.6.5
`Systematic Encoding with an (n — k)-Stage Shift
`Register,
`294
`Error Detection with an (n — k)-Stage Shift
`Register,
`296
`5.7 Well-Known Block Codes,
`5.7.1 Hamming Codes,
`298
`5.7.2
`Extended Golay Code,
`5.7.3
`BCH Codes,
`301
`5.7.4 Reed-Solomon Codes,
`Conclusion,
`308
`References,
`308
`Problems,
`309
`
`271
`
`273
`
`288
`
`5.6.6
`
`298
`
`301
`
`304
`
`6 CHANNEL CODING: PART 2
`
`314
`
`
`
`
`
`
`
`
`
`
`Contents
`
`329
`333
`
`HTC/ZTE Exhibit 1015-8
`
`HTC/ZTE Exhibit 1015-8
`
`

`

`6.3.4 An Example of Viterbi Convolutional
`Decoding,
`333
`Path Memory and Synchronization,
`6.3.5
`Properties of Convolutional Codes,
`338
`6.4.1 Distance Properties of Convolutional Codes,
`6.4.2
`Systematic and Nonsystematic Convolutional
`Cades,
`342
`Catastrophic Error Propagation in Convolutional
`Codes,
`342
`Performance Bounds for Convolutional Codes,
`6.4.4
`Coding Gain,
`345
`‘
`6.4.5
`6.4.6 Best Known Convolutional Codes,
`6.4.7
`Convolutional Cade Rate Trade-Off,
`6.5 Other Convolutional Decoding Algorithms,
`6.5.1
`Sequential Decoding,
`350
`6.5.2
`Comparisons and Limitations of Viterbi and
`Sequential Decoding,
`354
`Feedback Decoding,
`355
`6.5.3
`Interleaving and Concatenated Codes,
`6.6.1
`Block Interleaving,
`360
`6.6.2
`Convolutional Interleaving,
`6.6.3.
`Concatenated Codes,
`365
`Coding and Interleaving Applied to the Compact Disc Digital
`Audio System,
`366
`367
`6.7.1
`CIRC Encoding,
`369
`6.7.2
`CIRC Decoding,
`6.7.3
`Interpolation and Muting,
`Conclusion,
`374
`References,
`374
`Problems,
`376
`
`6.4.3
`
`6.4
`
`6.6
`
`6.7
`
`6.8
`
`338
`
`344
`
`337
`
`347
`348
`350
`
`357
`
`362
`
`371
`
`7 MODULATION AND CODING TRADE-OFFS
`
`381
`
`314
`
`327
`
`.
`
`Goals of the Communications System Designer,
`7.1.
`Exror Probability Plane,
`383
`7.2
`385
`7.3. Nyquist Minimum Bandwidth,
`7.4
`Shannon-Hartley Capacity Theorem,
`7.4.1
`Shannon Limit,
`387
`7.4.2
`Entropy,
`389
`7.4.3
`Equivocation and Effective Transmission Rate,
` Bandwidth-Efficiency Plane,
`393
`7.5.2
`Bandwidth Efficiency of MPSK and MFSK
`Modulation,
`395
`7.5.2 Analogies between Bandwidth-Efficiency and Error
`Probability Planes,
`396
`Power-Limited Systems,
`396
`
`385
`
`382
`
`391
`
`7.5
`
`7.6
`
`Contents
`
`Contents
`
`xii
`
`HTC/ZTE Exhibit 1015-9
`
`HTC/ZTE Exhibit 1015-9
`
`

`

`
`
`|
`
`429
`
`410
`
`412
`
`434
`
`465
`468
`
`399
`
`417
`420
`
`i 7
`
`.9
`
`7.10
`
`7Al
`
`SYNCHRONIZATION
`Maurice A. King,Jr.
`
`8.1
`
`8.2
`
`8.3:
`
`8.4
`
`Synchronization in the Context of Digital
`Communications,
`430
`430
`8.1.4 What It Means to Be Synchronized,
`8.1.2
`Costs versus Benefits af Synchronization
`Levels,
`432
`434
`Receiver Synchronization,
`8.2.1
`Coherent Systems: Phase-Locked Loops,
`8.2.2
`Symbol Synchronization,
`453
`8.2.3.
`Frame Synchronization,
`460
`Network Synchronization,
`464
`8.3.1
`Open-Loop Transmitter Synchronization,
`8.3.2.
`Closed-Loop Transmitter Synchronization,
`Conclusion,
`470
`References,
`471
`Problems,
`472
`
`9
`
`MULTIPLEXING AND MULTIPLE ACCESS
`
`475
`
`9.1
`
`Allocation of the Communications Resource,
`94.
`Frequency-Division Multipiexing/Muttiple
`Access,
`478
`
`4761
`
`Contents
`
`HTC/ZTE Exhibit 1015-10
`
`397
`Bandwidth-Limited Systems,
`397
`Modulation and Coding Trade-Offs,
`399
`Bandwidth-Efficient Modulations,
`7.9.1
`QPSK and Offset OPSK Signaling,
`7.9.2 Minimum Shift Keying,
`403
`7.9.3. Quadrature Amplitude Modulation, 407
`Modulation and Coding for Bandlimited Channels,
`7.10.1 Commercial Telephone Modems,
`411
`7.10.2 Signal Constellation Boundaries, 412
`7.10.3 Higher-Dimensional Signal Constellations,
`7.10.4 Higher-Density Lattice Structures,
`415
`7.10.5 Combined-Gain: N-Sphere Mapping and Dense
`Lattice,
`416
`7.40.6 Trellis-Coded Modulation,
`7.10.7 Trellis-Coding Example,
`Conclusion,
`424
`References,
`425
`Problems,
`426
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`HTC/ZTE Exhibit 1015-10
`
`

`

`9.1.2
`9.1.3
`9.1.4
`
`9.1.5
`9.1.6
`
`9.6
`
`Time-Division Multiplexing/Multiple Access,
`Communications Resource Channelization,
`Performance Comparison of FDMA and
`TDMA,
`‘488
`491
`Code-Division Multiple Access,
`Space-Division and Polarization-Division Multiple
`Access,
`493
`9.2 Multiple Access Communications System and
`Architecture,
`495
`.
`, 496
`9.2.1 Multiple Access Information Flow,
`9.2.2 Demand-Assignment Multiple Access,
`497
`9.3 Access Algorithms,
`498
`9.3.1 ALOHA,
`498
`500
`9.3.2
`Slotted ALOHA,
`502
`9.3.3
`Reservation-ALOHA,
`93.4
`Performance Comparison of S-ALOHA
`and R-ALOHA,
`503
`305
`Polling Techniques,
`9.3.5
`9.4 Multiple Access Techniques Employed with
`INTELSAT,
`507
`94.1
` Preassigned FDMIFM/IFDMA or MCPC
`Operation,
`508
`9.4.22 MCPC Moades of Accessing an INTELSAT
`Satellite,
`510
`SPADE Operation, 5il
`9.4.3.
`TDMA in INTELSAT,
`S516
`944
`523
` Satellite-Switched TDMA in INTELSAT,
`94.5
`9.5 Multiple Access Techniques for Local Area Networks,
`9.5.1
` Carrier-Sense Multiple Access Networks,
`526
`9.5.2
`Token-Ring Networks,
`528
`9.5.3
`Performance Comparison of CSMAICD
`and Token-Ring Networks,
`530
`Conclusion,
`331
`References,
`532
`Problems,
`333
`
`484
`487
`
`526
`
`429
`
`475°
`
`10 SPREAD-SPECTRUM TECHNIQUES
`
`536
`
`10.1
`
`537
`Spread-Spectrum Overview,
`10.1.1
`The Beneficial Attributes of Spread-Spectrum
`Systems,
`538
`10.1.2 Model for Spread-Spectrum Interference
`Rejection,
`542
`10.1.3 A Catalog of Spreading Techniques,
`10.1.4 Historical Background,
`544
`
`543
`
`Contents
`
`Contents
`
`xv
`
`HTC/ZTE Exhibit 1015-11
`
`HTC/ZTE Exhibit 1015-11
`
`

`

`
`
`549
`
`552
`
`559
`560
`
`571
`
`579
`579
`581
`
`586
`
`10.2
`
`10.4
`
`10.5
`
`10.6
`
`10.7.
`
`10.8
`
`546
`Pseudonoise Sequences,
`546
`10.2.1
`Randomness Properties,
`547
`10.2.2
`Shift Register Sequences,
`548
`10.2.3
`PN Autocorrelation Function,
`10.3 Direct-Sequence Spread-Spectrum Systems,
`10.3.1
`Example of Direct Sequencing,
`550
`10.3.2
`Processing Gain and Performance,
`Frequency Hopping Systems,
`555
`10.4.1
`Frequency Hopping Example,’ 557
`10.4.2
`Robustness,
`558
`‘
`10.4.3
`Frequency Hopping with Diversity,
`10.4.4
`Fast Hopping versus Slow Hopping,
`10.4.5
`FFHIMFSK Demodulator,
`562
`Synchronization,
`562
`10.5.1 Acquisition,
`563
`10.5.2
`Tracking,
`568
`571
`Spread-Spectrum Applications,
`10.6.1
`Code-Division Multiple Access,
`10.6.2 Multipath Channels,
`573
`10.6.3
`The Jamming Game,
`574
`Further Jamming Considerations,
`10.7.1
`Broadband Noise Jamming,
`10.7.2
`Partial-Band Neise Jamming,
`10.7.3 Multiple-Tone Jamming,
`583
`10.7.4
`Puise Jamming,
`584
`10.7.5 Repeat-Back Jamming,
`10.7.6 BLADES System,
`588
`Conclusion,
`589
`References,
`589
`Problems,
`591
`
`| || |
`
`595
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`|
`
`
`
`
`
`
`
`
`
`
`
`
`
`|
`I:
`
`Li
`,
`
` Contents
`
`HTC/ZTE Exhibit 1015-12
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`11 SOURCE CODING
`Fredric J. Harris
`
`11,1
`
`11.2
`
`11.3
`
`596
`601
`
`596
`Sources,
`did. Discrete Sources,
`11.1.2 Waveform Sources,
`Amplitude Quantizing,
`603
`11.2.1
`Quantizing Noise,
`605
`11.2.2
`Uniform Quantizing,
`608
`1.2.3
`Saturation,
`611
`I1.2.4 Dithering,
`614
`617
`112.5 Nonuniform Quantizing,
`Differential Pulse Code Modulation,
`41.3.1
`One-Tap Prediction,
`630
`11.3.2
`N-Tap Prediction,
`631
`
`627
`
`.
`
`HTC/ZTE Exhibit 1015-12
`
`

`

`664
`
`11.4
`
`11.5
`
`11.6
`
`11.7
`
`13.3 Delta Modulation,
`11.3.4 Adaptive Prediction,
`Block Coding,
`643
`643
`14d
`Vector Quantizing,
`645
`11.4.2
`Transform Coding,
`114.3
`Quantization for Transform Coding,
`11.4.4
`Subband Coding,
`647
` Synthesis/Analysis Coding,
`ii.5.1
` Vocoders,
`650
`{1.5.2
`Linear Predictive Coding,
`Redundancy-Reducing Coding,
`ii.6.1
`Properties of Codes,
`655
`11.6.2 Huffman Code,
`657
`116.3
` Run-Length Codes,
`Conclusion,
`663
`References,
`663
`Problems,
`
`633
`639
`
`649
`
`660
`
`653
`653
`
`‘
`
`:
`
`,
`
`647
`
`
`
`595
`
`12 ENCRYPTION AND DECRYPTION
`
`_ 668
`
`669
`12.1 Models, Goals, and Early Cipher Systems,
`I2.1.1
`A Modelof the Encryption and Decryption
`Process,
`669
`671
`System Goals,
`12.1.2
`671
`Classic Threats,
`12.1.3
`672
`Classic Ciphers,
`12,14
`The Secrecy of a Cipher System,
`12.2.1
`Perfect Secrecy,
`675
`678
`12.2.2.
`Entropy and Equivocation,
`12.2.3
`Rate of a Language and Redundancy,
`12.2.4
`Unicity Distance and Ideal Secrecy,
`Practical Security,
`683
`12.3.1
`Confusion and Diffusion,
`12.3.2
`Substitution,
`683
`12.3.3
`Permutation,
`685
`686
`12.34
`Product Cipher System,
`12.3.5
`The Data Encryption Standard,
`Stream Encryption,
`694
`12.4.1
`Example of Key Generation Using a Linear
`Feedback Shift Register,
`694
`Vulnerabilities of Linear Feedback Shift
`Registers,
`695
`Synchronous and Self-Synchronous Stream
`Encryption Systems,
`697
`
`12.2.
`
`12.3
`
`12.4
`
`12.4.2.
`
`12.4.3
`
`675
`
`683
`
`680
`680
`
`687
`
`Contents
`
`Contents
`
`xvii
`
`HTC/ZTE Exhibit 1015-13
`
`HTC/ZTE Exhibit 1015-13
`
`

`

`Puolic Key Cryptosystems,
`
`2.5
`
`698
`
`12.5.2.
`12.53
`I2.5.4
`12.5.5
`
`Signature Authentication Using a Public Key
`Cryptosystem,
`699
`700
`A Trapdoor One-Way Function,
`The Rivest-Shamir—Adelman Scheme,
`The Knapsack Problem,
`703
`A Public Key Cryptosystem Based on a Trapdoor
`Knapsack,
`705
`Conclusion,
`707
`References,
`707
`Problems,
`708
`
`7601
`
`Or4
`
`
`710
`Signals, Spectra, and Linear Systems,
`Fourier Techniques for Linear System Analysis,
`A.2.1
`Fourier Series Transform,
`713
`A.2.2
`Spectrum of a Pulse Train,
`716
`
`A2.3>Fourier Integral Transform, 719
`Fourier Transform Properties,
`720
`AZ.)
`Time Shifting Property,
`720
`AJ3.2
`Frequency Shifting Property,
`Useful Functions,
`721
`721
`A.4l
`Unit Impulse Function,
`
`A4.29Spectrum of a Sinusoid, 721
`Convolution,
`722
`Graphical Illustration of Convolution,
`Time Convolution Property,
`726
`726
`Frequency Convolution Property,
`Convolution of a Function with a Unit
`Impulse,
`728
`Demodulation Application of Convolution,
`Tables of Fourier Transforms and Operations,
`References,
`732
`
`A A REVIEW OF FOURIER TECHNIQUES
`
`A.l
`A.2
`
`720
`
`711
`
`726
`
`729
`731
`
`FUNDAMENTALS OF STATISTICAL DECISION
`THEORY
`
`B.1
`
`733
`Bayes’ Theorem,
`Bi
`Discrete Form of Bayes’ Theorem,
`BuI.2 Mixed Form of Bayes’ Theorem,
`
`734
`736
`
`Contents
`
`HTC/ZTE Exhibit 1015-14
`
`

`

`B.2
`
`B.3
`
`738
`Decision Theory,
`B.2.1
`Components of the Decision Theory Problem,
`B.2.2.
`The Likelihood Ratio Test and the Maximum
`A Posteriori Criterion,
`739
`The Maximum Likelihood Criterion,
`B.2.3.
`Signal Detection Example,
`740
`B.3.1
`The Maximum Likelihood Binary Decision,
`B.3.2
`Probability ofBit Error,
`74!
`References,
`743
`
`739
`
`738
`
`740
`
`RESPONSE OF CORRELATORS TO WHITE NOISE
`
`710
`
`OFTEN USED IDENTITIES
`
`A CONVOLUTIONAL ENCODER/DECODER
`COMPUTER PROGRAM
`
`LIST OF SYMBOLS
`
`INDEX
`
`744
`
`746
`
`748
`
`759
`
`765
`
`733
`
`Contents
`
`Contents
`
`xix
`
`HTC/ZTE Exhibit 1015-15
`
`HTC/ZTE Exhibit 1015-15
`
`

`

`HTC/ZTE Exhibit 1015-16
`
`‘Whenwetalk about a communications link, to what part of the system are we
`referring? Is it simply the channel or region between the transmitter and receiver?
`No, it is far more than that. The link encompasses the entire communications
`path, from the information source, through all the encoding and modulation steps,
`through the transmitter and the channel, up to and including the receiver with all
`its signal processing steps, and terminating at the information sink.
`Whatis a link analysis, and what purpose does it serve in the development
`of a communication system? The link analysis, and its output, the link budget,
`consist of the calculations and tabulation of the useful signal power and the in-
`terfering noise poweravailable at the receiver. The link budget is a balance sheet
`of gains and losses; it outlines the detailed apportionment of transmission and
`reception resources, noise sources, signal attenuators, and effects of processes
`throughoutthe link. Someofthe budget parameters are statistical (e.g., allowances
`for the fading of signals due to meteorological events); the budget is therefore an
`estimation technique for evaluating communication system performance. In Chap-
`ter 3 we examined probability of error versus E,/No curves having a ‘‘waterfall-
`like’? shape, such as the one shown in Figure 3.21. We thereby related error
`probability to E,/No for various modulation types in Gaussian noise. Once a mod-
`ulation scheme has been chosen,the requirement to meet a particular error prob-
`ability dictates a particular operating point on the curve; in other words, the
`required error performance dictates the value ofE,/No that must be made available
`
`4.1 WHAT THE SYSTEM LINK BUDGET TELLS THE
`SYSTEM ENGINEER
`
`188
`
`Communications Link Analysis
`
`Chap. 4
`
`HTC/ZTE Exhibit 1015-16
`
`

`

`at the receiver in order to meet that performance. The primary purposeofa link
`analysis is to determine the actual system operating point in Figure 3.21 and to
`establish that the error probability associated with that point is less than or equal
`to the system requirement. Of the many specifications, analyses, and tabulations
`that are used in the development of a communication system, the link budget
`stands out as a basic tool for providing the system engineer with overall system
`insight.
`By examining the link budget, one can learn many things aboutoverall sys-
`tem design and performance. For example, from the link margin, one learns
`whether the system will meet its requirements comfortably, marginally, or not at
`all. It will be evident if there are any hardware constraints, and whether such
`constraints can be compensated for in other parts of the link. The link budgetis
`often used as a ‘‘score sheet’’ in considering system trade-offs and configuration
`changes, and in understanding subsystem nuances and interdependencies. From
`a quick examinationof the link budget and its supporting documentation, one can
`judge whether the analysis was doneprecisely orif it represents a rough estimate.
`Together with other modeling techniques, the link budget can help predict equip-
`ment weight, size, prime power requirements, technical risk, and cost. The link
`budgetis one of the system manager’s most useful documents; it represents the
`‘“‘bottom-line’’ tally in the search for optimimum system performance.
`
`4.2 THE CHANNEL
`
`The propagating medium or electromagnetic path connecting the transmitter and
`receiver is called the channel. In general, a communications channel might consist
`of wires, coaxial cables, fiber optic cables, and in the case of radio-frequency
`(RF) links, waveguides, the atmosphere, or empty space. For mostterrestrial
`communication links, the channel space is occupied by the atmosphere and par-
`tially bounded by the earth’s surface. For satellite links, the channel is occupied
`mostly by empty space. Although some atmospheric effects occurat altitudes up
`to 100 km, the budk of the atmosphere extendsto an altitude of 20 km. Therefore,
`only a small part (0.05%) of the total synchronousaltitude (35,800 km) path is
`occupied by significant amounts of atmosphere. Most of this chapter is presented
`in the context of such a satellite communications link.
`
`4.2.1 The Concept of Free Space
`
`The concept of free space assumes a channelfree of all hindrances to RF prop-
`agation, such as absorption, reflection, refraction, or diffraction. If there is any
`atmosphere in the channel, it must be perfectly uniform and meetall these con-
`ditions. Also, we assume that the earth is infinitely far away or that its reflection
`coefficient is negligible. The RF energy arriving at the receiver is assumed to be
`a function only of distance from the transmitter (following the inverse-square law
`of optics). A free-space channel characterizes an ideal RF propagation path; in
`practice, propagation through the atmosphere and near the groundresults in ab-
`
`Sec. 4.2
`
`The Channel
`
`189
`
`the system are we
`nitter and receiver?
`re communications
`d modulation steps,
`he receiver with all
`1 sink,
`in the development
`ut, the link budget,
`| power and the in-
`-t is a balance sheet
`of transmission and
`‘ffects of processes
`cal (e.g., allowances
`dget is therefore an
`formance. In Chap-
`having a ‘“‘waterfall-
`ereby related error
`noise. Once a mod-
`articular error prob-
`in other words, the
`st be made available
`
`Analysis
`
`Chap. 4
`
`HTC/ZTE Exhibit 1015-17
`
`HTC/ZTE Exhibit 1015-17
`
`

`

`
`
`
`
`
`
`
`sorption, reflection, refraction, and diffraction, which modify the free-space trans-
`mission. Atmospheric absorption is treated in later sections. Reflection, refrac-
`tion, and diffraction, which play an important role in determining terrestrial
`communications performance, are not treated here; Panter [1] provides a com-
`prehensive treatment of these mechanisms.
`
`4.2.2 Signal-to-Noise Ratio Degradation
`
`The signal-to-noise power ratio (SNR) defined below is a convenient measure of
`performance at various points in the link.
`
`SNR =
`
`signal power
`-
`noise power
`
`Unless otherwise stated, SNR refers to average signal power and average noise
`power. The signal can be an information signal, a baseband waveform, or a mod-
`ulated carrier. The SNR can degrade in two ways: (1) through the decrease of
`the desired signal power, and (2) through the increase of noise power, or the
`increase of interfering signal power. Let us refer to these degradations as loss
`and noise (or interference), respectively. Losses occur when a portion ofthe signal
`is absorbed, diverted, scattered, or reflected along its route to the intended re-
`ceiver; thus a portion of the transmitted energy does not arrive at the receiver.
`There are four primary noise sources: (1) thermal noise can be generated within
`the link, (2) sky noise (e.g., galaxy noise, atmospheric noise) can be introduced
`into the link, (3) system nonlinearities can cause spurious signals to be created
`within the link, and (4) interfering signals from other users of the same frequency
`can be introduced into the link. Industry usage of the terms Joss and noise fre-
`quently confuses the underlying degradation mechanism; however, the net effect
`on the SNRis the same.
`
`4.2.3 Sources of Signal Loss and Noise
`
`Figure 4.1 is a block diagram of a satellite communications link, emphasizing the
`sources of signal loss and noise. In the figure a signal loss is distinguished from
`a noise source by a dot pattern or line pattern, respectively. The contributors of
`both signal loss and noise are identified by a crosshatched line pattern. The fol-
`lowing list of 21 sources of degradation represents a partial catalog of the major
`contributors to SNR degradation. The numbers correspond to the numbered cir-
`cles in Figure 4.1.
`
`1. Bandlimiting loss. All systems usefilters in the transmitter to ensure that
`the transmitted energy is confined to the allocated or assigned bandwidth.
`This is to avoid interfering with other channels or users and to meet the
`requirements of regulatory agencies. Suchfiltering reduces the total amount
`of energy that would otherwise have been transmitted; the result is a loss
`in signal.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Communications Link Analysis Chap. 4
`
`Or i oe
`
`HTC/ZTE Exhibit 1015-18
`
`

`

`
`
`quanelpy
`
`e free-spacetrans-
`Reflection, refrac-
`rmining terrestrial
`] provides a com-
`
`venient measure of
`
`and average noise
`iveform, or a mod-
`eh the decrease of
`pise power, or the
`gradations as loss
`rortion of the signal
`to the intended re-
`ve at the receiver.
`e generated within
`can be introduced
`
`2a
`
`
`SokoSef5
`
`domLe
`sae
`ao08%3
`sOhime]o5.voBDt°353|0Dofa
`
`itter to ensure that
`ssigned bandwidth.
`rs and to meet the
`es the total amount
`ws
`voa—
`—_=3wwoal
`wy2awe
`
`Analysis
`
`Chap. 4
`
`||
`|
`k, emphasizing the
`distinguished from
`©}
`[he contributors of
`a&2=raeweo=zA,oa
`euo2o26
`‘35
`Eel6§me»#3ae
`6.4
`
`
`
`uoljeuWUOjuyfsou1
`
` oot@AO|s80|:gsiouaseyd07
`{(st)pecs2586|Boalsepaey
`
` ay©souaadpalulaouatapieqU!i)juUeYyo-o74=[SUEY
`asiou@)LiYJanlsa0y
`
`UOIEZIUOAYSUASSSD]
`ASIONugie}UuEWa)duu|
`
`
`
`
`
`“S9OINOSSSIOUpueSSO[BOdA)YILMWUT]JaATVoe1-OP-LIYMUSUBHoITPIeS«Tpeansry
`asIouJOsaganosAas,
`
`580]4550]$S0|
`
`
`
`|$s0|{Anualoyg9
`
`Buy|pueg
`
`Wied
`
`bocrcog
`
`us
`
`
`
`joule)Guraleoay
`
`ssojUIeY
`
`
`
`saydsowiyUGIJEZLE|Og
`
`Bululiog
`
`580|
`
`|||||||!|
`
`|||||||||[
`
`WS)WL
`
`
`
`“4e1s‘HLOR|ED
`
`
`
`,SSIOU[B11}S9118)
`
`uoepesbap
`
`jauueys)
`
`puaba}
`
`gaqualapayulWY10aslON
`
`ao4nos
`
`
`
`880)|eubis:
`
`yrog
`
`
`
`|sjonpaidfWI421ue2f(9)
`
`aidijnyySexe)
`
`Uae|NpoY
`
`550|
`
`awopey
`
`SSO]
`
`Aguayo
`
`$80|
`
`
`
`aseyd97Wd/INY$sO|J8}IWI]||
`
`aslouWolssaAuog
`
`©yuaaguRyuaJO
`
`OG
`
`ISIBujuypueg
`
`S50}
`
`aounos
`
`uOIWBWUOJU|O
`
`JPulwusa}Guia}wsued|
`
`LJ=AOo-=
`
`ty
`
`=Fd
`
`it 1015-19
`
`HTC/ZTE Exhibit 1015-19
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`

`

`HTC/ZTE Exhibit 1015-20
`
`. Intersymbol interference (ISI). As discussed in Chapter2, filtering through-
`out the system—inthe transmitter, in the receiver, and in the channel—can
`result in ISI. The received pulses overlap one another; the tail of one pulse
`“‘smears’” into adjacent symbolintervals so as to interfere with the detection
`process. Evenin the absenceof thermal noise, imperfectfiltering and system
`bandwidth constraints lead to ISI degradation.
`. Local oscillator (LO) phase noise. When an ‘LOis used in signal mixing,
`phasefluctuationsorjitter adds phase noise to the signal. When used as the
`reference signal in a receiver correlator, phase jitter can cause detector
`degradation and hencesignal Joss. At the transmitter, phasejitter can cause
`out-of-band signal spreading, which, in turn, will be filtered out and cause
`@ loss in signal.
`. AM/PM conversion. AM-to-PM conversion is a phase noise phenomenon
`occurring in nonlinear devices such as traveling-wave tubes (TWT). Signal
`amplitudefluctuations (amplitude modulation) produce phase variations that
`contribute phase noise to signals that will be coherently detected. AM-to-
`PM conversion can also cause extraneous sidebands, resulting in signal loss.
`. Limiter loss or enhancement. A hard limiter can enhance the stronger of
`two signals, and suppress the weaker; this can result in either a signal /oss
`or a signal gain [2].
`. Multipie-carrier intermodulation (IM) products. Whenseveralsignals having
`different carrier frequencies are simultancously present in a nonlinear de-
`vice, such as a TWT,the result is a multiplicative interaction between the
`carrier frequencies which can produce signals at all combinations of sum
`and difference frequencies. The energy apportioned to these spurious signals
`(intermodulation or IM products) represents a Joss in signal energy. In ad-
`dition, if these IM products appear within the bandwidth region of these or
`othersignals, the effect is that of added noise for those signals,
`. Modulation loss. The link budgetis a calculation of received useful power
`(or energy). Only the power associated with information-bearingsignals is
`useful. Error performanceis a function of energy per transmitted symbol.
`Any powerusedfor transmitting the carrier rather than the modulating signal
`(symbols)iis a modulation /oss. (However, energy in the carrier may be useful
`in aiding synchronization.)
`. Antenna efficiency. Antennasare transducersthat convert electronic signals
`into electromagnetic fields, and vice versa. They are also used to focus the
`electromagnetic energy in a desired direction. The larger the antenna ap-
`erture (area), the larger is the resulting signal power density in the desired
`direction. An antenna’s efficiency is described by theratio of its effective
`aperture to its physical aperture. Mechanisms contributing to a reduction in
`efficiency (/oss in signal strength) are

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket