throbber
Digital
`
`Communications
`
`by 8&7 tel/ite-
`
`J.J. SPILKER, JR. PhD.
`
`Chairman, Stanfbrd Telecomn-imrirations, Inc.
`
`PRENTICE-HALL, lNC.. Eng/ewood Cliffs, New Jersey
`

`

`
`Petitioner Sirius XM Radio Inc. - Ex. 1007, p. 1
`
`Petitioner Sirius XM Radio Inc. - Ex. 1007, p. 1
`
`

`

`Library of Congress Cataloging in Publication Data
`Spilker, J
`J
`Digital communications by satellite.
`(Prentice-Hall information and system sciences series)
`Bibliography: p. 525
`Includes index.
`1. Artificial satellites in telecommunication.
`2. Datatransmission systems.
`I. Title.
`“(5104.864
`621 .38‘0423
`75—43878
`IS B N 0—13—214155-8
`
`© 1977 by PRENTICE-HALL, INC.
`Englewood Cliffs, New Jersey
`
`All rights reserved. No part of this book
`may be reproduced in any form or by any means
`without permission in writing from the publisher.
`
`109876
`
`Printed in the United States of America
`
`|NC.,I.ondon
`PRENTICE-HALL INTERNATIONAL,
`PRENTICE-HALL OF AUSTRALIA PTY. LIMITED,Sydney
`PRENTICE—HALL OF CANADA, LTD., Toronto
`PRENTICEuHALL OF INDIA PRIVATE LIMITED, New Delhi
`PRENTICE-HALL OF JAPAN,
`|NC., Tokyo
`PRENTICE-I—IALL OF SOUTHEAST ASIA PTE. LTD.,Smgapore
`

`

`
`Petitioner Sirius XM Radio Inc. - Ex. 1007, p. 2
`
`Petitioner Sirius XM Radio Inc. - Ex. 1007, p. 2
`
`

`

`456 MDDULAT/ON AND CODING FN DISTORTED CHANNELS
`
`VI7ERBI DECODING OF CGNI/DLUTION‘IL CODES 457
`
`It also should be noted that sateliite communications involves a sub-
`stantial time delay (20.25 sec) and often rather high data rates (2 100 Mbps).
`This combination can make Forward Error Correction (FEC) much more
`desirable than automatic request for retransmission (ARQ), because of the
`]arge costs of ARQ to store data at the transmitter until a verification signal
`is received or a request for repeat is received for a data block. In ARQ,
`blocks of data are transmitted with redundancy introduced for error detec-
`tion. If a data block is received in error, the receiver sends the transmitter
`a request for retransmission The use of PEG and ARQ together can be
`advantageous
`In this chapter we review the structure of convolutionai codes, describe
`the structure of the Viterbi decoding algorithm, and discuss the error rate
`performance of the decoding algorithm for PSK and QPSK signals both
`with and without carrier reconstruction phase noise. Many of the results
`described in this chapter were first derived by Viterbi and his coworkers in
`the cited references.
`
`15-2
`
`CONVOLUTIONAL CODE STRUCTURE
`
`A convolutional encoder with constraint length K is a K—stage shift register
`with :1 linear algebraic function generators, one for each output port. A rate
`If). code producestwo output bits for every input data bit. If one of these
`output bits is the original data bit, the code is called systematic. Figure [571
`shows the structure ofa simple nonsystematic rate If?! encoder of constraint
`length K —. 3.
`‘
`Assuming that the encoder starts in the allvzero state, the first four hits
`0100
`
`code generation
`G. = 111
`62 = 101
`
`data d;_,
`- 0110
`
`xli‘rxlr
`[0,Dl.l1.1l.[0.1i (0,1)
`
`generator denotes the tap pneutinns.
`
`
`
`
`0111
`
`Fig. 15-1 Nonsystematir: convolurional encoder with
`constraint length K = 3, and rate ‘lln = ‘lIZ. The code
`
`0110 produce an output of 00, 11, UL and 01, respectively, as shown. Clearly,
`the output of each new data bit depends on the previous bit pattern stored
`in stages 1, 2 of the shift register. These bit patterns can be labeled by the
`states defined as
`
`(15.1)
`d=ll
`crio
`b=01
`a=00
`The output bits and transitions between states can be labeled by the trellis
`diagram of Fig 15-2. The diagram starts in the all-zero state, node a. and
`makes transitions corresponding to the next data bit. These transitions are
`denoted by a solid line for a “0“ and a dotted line for a “1.“ Thus, node a
`proceeds to node a or b With output bits 00 or I].
`
`\
`\
`start >K—fl—R CO
`\
`00
`a
`DC}
`a
`00
`
`5= on
`
`
`
`\ii
`
`Fig. 15-2 Trelliscode representation for the convolu-
`tional encoder of Fig. 15-1
`
`Table 15-1 shows the optimum codes for constraint lengths K : 373.
`The code generators define the taps for the [Hall shift register; 11¢
`is the
`: number of bit errors in paths at distance d,, and d} is the upper bound on
`'. minimum free distance [Odenwaldcn [970}. Notice that these codes are all
`nonsystematic. A systematic code would have G, or G; equal to 100 V
`. .0;
`, that is, one of the code generators would have only a single tap.
`Note that some of the code structures in Table 15-1 are transparent to
`code inverston—that is, if the signs of the input bits are reversed, the coded
`output bit sequence is simply inverted. For example, if one of the parity bits
`-._ xi, is related to the data bits df by
`(15.2)
`XIIL-df®d5.1@df..z
`" where there are an odd number of terms in the sum, reversing the sign ofthe
`- d4 bits simply reverses all ofthese parity bits. Thus, if the numbersof “ones“ or
`

`
`Petitioner Sirius XM Radio Inc. - Ex. 1007, p. 3
`
`Petitioner Sirius XM Radio Inc. - Ex. 1007, p. 3
`
`

`

`458 MODULAT/ON AND EODJNG IN DISTOFTED CHANNELS
`
`Table 15-1 OPIIMUM RATE [[2 Coors (MAXIMUM MINIMUM
`DISTANCE) [Gru-rousen er AL, 1971]
`Code Trans-
`Constrm'nt
`Code
`Dfsfu'ncs
`Errors
`Distance
`parent m 180”
`
`Length X
`Generator:
`J,-
`ue
`Bound d} Phase Reversal
`
`no
`5
`1
`5
`g: : icii
`3
`no
`.,
`2
`.
`2:35:
`4
`no
`8
`4
`7
`3: Z 13.131
`5
`yes
`.
`.
`a
`can:
`.
`m
`m
`a.
`10
`2:33:21
`.
`
`
`
`'02; Z 155$?!8 w 2
`
`
`weights of both GI and G2 are odd. then the code is transparent to a sign
`inversion. That is, the decoded output bit stream has the sign ambiguity as
`the inputr This transparency is valuable if biphasemodulared PSK is used
`with its ensuing sign ambiguity for it permits decoding prior to ambiguity
`removal. Differential decoding at the decoder output removes the sign ambi-
`guity and simply increases the output error rate by a factor of less than 2.
`because decoder output errors typically occur in short bursts, Difierential
`dewding at the decoder input would double the decoder input error rate and
`thus would cause a much larger increase in the hit-error rate than a factor of
`2 because of the high slope in the output-versus-input-errorerate curve.
`
`15-3
`
`THE MAXIMUM-LIKELIHOOD DECODER
`FOR A BINARY SYMMETHlC CHANNEL
`
`Maximum-likelihood decoding could be accomplished over 1: coded two-hit
`Symbols for rate 112 codes by comparing the received 2m output sequences
`with 3114(2’") possible code paths leading to each of the 4 nodes in Fig. 15-2
`and selecting the code sequences with the largest cross-correlation} This
`calculation is extremely difiicult for large m and would result in an overly
`complex decoder structure.
`A major simplification was made by Viterbi in the likelihood calculation
`by noting that each of the 4 nodes has only two predecessors, and only the path
`
`with the highest cross-correlation weight need be retained for each node. For
`'The factor of 4 includes all possible initial Starling stares.
`
`
`
`-‘
`
`.
`
`example, the paths to node a might have weights 1t) and 6 as shown in Fig.
`15-31 At each node, the weight of the survivor path determines the new weight.
`For example, at r = ithe on path might add a weight 2 to the weight 8 of the
`previous node a. The added weight can be computed by correlating the
`received code bits r“, r2, with the parity bits for that transition p”, :12, to
`
`produce w, = [11,?” el- [22mlr where p, r are :1 for "hard” binary decisions
`in r“.
`Figure 15-4 shows a typical path structure and weights for decoding. No
`errors have been introduced in the channel. Decoding has begun with no
`information as to the initial state (node) of the Coder, Hence, all nodes at
`I = 0 have been set at zero weight Notice that at 1 : 5 all node survivor
`paths began at node a at I z D, the correct starting position, A decision on
`that t = 0 data bit, the an path corresponding to a 0 data bit, can then be
`made. Thus in this example a correct data bit decision could be made with
`a 5 symbol delay. In general, with an error-producing channel, data bit deci-
`sions can be made after computing 5K successive nodes (a decoding delay of
`SK), where K is the coder constraint length.
`If an error is made in selecting the data bit at any time instant, several
`data bits in succession may be decoded incorrectly before the correct path is
`reached. Figure 15-5 shows the surviving paths with an incorrect start position
`i (start at node n7) for the same data sequence as in Fig. 15-4. Note that in this
`; example, 6 data bits, 1 = 6 (12 code bits), have been received before the correct
`path (correct path after t = 2) has produced the highest weight.
`Some of the error correction and detection characteristics of the code
`I‘ can be established by redrawing the trellis in a state diagram (Fig. 15-6),
`
`WTERBJ DECDDHVG OF CONVOLUTIONAL CODES 455
`
`Example survivor path to nodea.
`survivor oath to node a
`/
`8+2=10
`
`time—*-
`
`E+U=6
`
`
`
`c
`
`_ / 6
`.
`I
`inltlal welght
`f — 1
`
`delete this path to nodes
`I
`i+ 1
`
`i
`
`t
`
`Fig 153 Example of the iterative likelihood calcula-
`tion showing the survivor path to node a at 1 =41 The
`alternate pattern is eliminated because of IIS lower
`weight.
`

`
`Petitioner Sirius XM Radio Inc. - Ex. 1007, p. 4
`
`Petitioner Sirius XM Radio Inc. - Ex. 1007, p. 4
`
`

`

`c (T
`n5———~v
`d 0
`O
`start
`i:D
`r=1
`
`2
`v
`2
`132
`
`4
`6
`r=3
`
`i=4
`tlmB—D»
`
`i=5
`
`Fig. 154 Tvpical trellis pattern for decoded bit stream
`with code words received with no errors and unknown
`stalling node. The true path is in solid line, and the
`other paths at each node are shown in dotted lines.
`The number adjacent
`to the nails is
`its correlaliun
`metric. Ail nodes start at zero weight. Correlation is
`accomplished by replacing the codes by 11 rather
`than 0, ‘l Tiesin the metric are broken by a random
`decision.
`
`weight ualue atthis node
`
`snag; "”9 ‘3th
`slate /at q
`
`
`
`incorrect
`Starting
`state
`
`:1
`fl
`t I D
`
`.
`I“.
`6
`6
`4
`4
`0
`Cl
`0
`E
`7
`6
`5
`4
`2i
`2
`1
`Fig. 15-5 Trellis paths after an initial starting arrori
`The true path is shown by the dashed line.
`
`i
`
`r=6
`
`r=7
`
`time»
`
`where each path in the state diagram is labeled with the code hits correspond—
`ing to that pathifor cxampie, the an: path is 00. Note that thc minimum,
`weight path from a to a, other than the direct at: path. is path abca shown by
`
`480 MDEULAT/GN AND CODING 1N DISYDRTED CHANNELS
`
`I/lTEREI DECODING OF CONVOLUTIONAL CODES ‘61
`
` input data
`1
`1
`0
`1
`1
`0
`
`b
`a
`77776 ______c 777777b _____
`node
`a
`En'dEJ
`"Tiny"?iiiii n
`n
`o
`0
`T
`r
`r
`
`output
`D
`1
`1
`1
`o
`‘i
`
`i
`
`|I||
`i
`nodes 8 0a
`b D
`
`
`
`the dotted line, If mum is the correct path in three steps, the minimum alter-
`
`
`
`Fig. 15-6 Stare-diagram representation for coder of
`Fig. 15-4
`
`1 E, and has weight 5, correspond-
`nate-wcight path abca corresponds to ll, ll),
`ing to five errors or Hamming distance d -— 5. Thus, this cod: corrects any
`two errors over that path length and detects any three errors. Codes of mini-
`mum distance d ,— Ze + I can be used to correct e errors.
`The erroricorrcclion propertics of any Code can be determined by
`generating the flow diagram from a lo a for all paths, each labeied D",
`where k is the weight in that path. The flow diagram for the example code is
`given in Fig. 1577, This diagram can he reduced to the generating function
`for all paths which eventually merge with the ail-zcros path by the following
`calculations of the paths leading to each of the four nodes:
`
`d : Dd -i' D!)
`
`of
`
`r: : Dd + D!) 7 b
`
`01‘
`
`
`
`1 — D
`a' : Dii —1 b
`or
`41' = his
`and thus I) ; Dzrz + c — Dd 7 Dc
`
`(15-3)
`
`(15-4)
`
`(155)
`(15-6)
`
`Solving for a' in terms of a, we obtain from (15-3) to (1576)
`
`msg#11931), D5 +206 i
`413*
`i
`iZ"D’”5i(15.7)
`Thus, there is one path of weight 5, two of weight 6, and, in general, 2" paths
`of weight k 7i— 5.
`

`
`Petitioner Sirius XM Radio Inc. - Ex. 1007, p. 5
`
`Petitioner Sirius XM Radio Inc. - Ex. 1007, p. 5
`
`

`

`“2 MODULATION AND CODING 1N DISTOHTED CHANNELS
`
`erFrBl Meow/VG 0F coNl/OLUIIONAL CODES 463
`
`
`
`
`
`[bi
`Fig. 15-? State diagram labeled according to (a) dis-
`tance from all zeros path for the coder nt Fig. 151,
`(b) distance, length, and number of input “ones"
`
`The generating function can be formed for an augmented state diagram
`in which each path in the state diagram contains a multiplier coefficient 1.
`with an exponent t’,‘ corresponding to the length of the path and a coefficient
`N" where a is I for an input data ] (a solid-line path in Fig. 15-2) and e : 0
`for a zero data-bit path_ An example augmented state diagram is given in
`Fig. 15-711 for the coder of Fig. 15-], The generating function of this ring
`merited state diagram is then
`
`Ix
`r
`D‘L’N
`a'
`7:T(D.L,N)=mé2flvDN L
`;_ D=Lw + own + L)Nz + ~-
`V‘, D(S+WI)L(SW'MJ(1 + ijNU4M) + . ..
`
`1:
`
`(15.8)
`
`Thus there is one distance 5 path from a to a’ (the D5 term) of length 3 cor-
`responding to the exponent of L. There are two distance 6 paths, one of
`length 4, and one of length 5, both of which differ from the correct path by
`two data bits (the exponent of N).
`
`
`
`15-4
`
`ERRORaRATE PERFORMANCE OF THE
`MAXIMUM-LIKELIHOOD DECODEH
`
`The error—rate performance of the decoder is calculated in this section for
`both a hard-decision input (0, l) and a softwdecision input (analog sample or
`multibit quantized sample) to the decoder. We first obtain the bound on the
`probability of a first decision—error event (PE that results in one or more
`output bit errors. By computing the number of data-bit errors for different
`error events. we then obtain a bound on the bit-error probability.
`
`First-Error-Event Probability
`A first error event occurs if the correct path to the correct node is
`excluded at the jth step in the decodingithat is, the survivor is an erroneous
`path. Since the codes are group codes, there is no loss in generality by assum-
`ing that the correct path is the allezero path era - - - ea. An erroneous decision
`then occurs at stepj in Figs [58, where the path on - - - fibre is selected as
`the survivor because of its hypothesized higher correlation metric.
`
`A
`o
`'
`5
`
`“a” James: path eliminated at step]
`”incorrect survivor of length 2 = 3
`xN
`I ob
`o \ u
`a
`\\ f
`ac
`o
`I
`c’
`o
`on'
`I
`n
`u
`u
`error path length prior to stepi
`0
`3
`2
`1
`4
`Fig.15—3 Example of a decoding decision error for the
`coder ot Fig. 15-1
`
`The probabiiity of a first error event at some arbitrary stepj with length
`l is mi). For hard-decision inputs, the probability of a first error event of
`length 3 for the one possible error path is p{3) and differs from the correct
`path in five code bits occurring with probability (Pk = 05. In general,
`the
`total set of erroneous paths and the distance, k, from the correct path have
`already been described by the expansion of T(D, L. N). If there are hard deci-
`sions, and we use the T(D, L, N) of(1578), the single possible length-3 error
`event requires three received bit errors out of the five to make the incorrect
`path have a higher metric than the correct path. Thus, the probability of a
`first error event of length {=3 and distance k : 5 is expressed by
`r- 3
`(15-9)
`m3) = on = ’2 ( f )p'cl 7 in“
`where p is the hard-decision received bit-error probability at the decoder input.
`

`
`Petitioner Sirius XM Radio Inc. - Ex. 1007, p. 6
`
`Petitioner Sirius XM Radio Inc. - Ex. 1007, p. 6
`
`

`

`WTEHBI‘ DECODING OF CONVDUJTIONAL CODES 4l5
`
`_
`k
`R
`l:(k‘z-1:/2 ( i )9!“ ‘PV ’
`k
`t
`1
`k
`.
`,
`T H2)pk.2(1 — ”rel 4.. Mg” ( E)p(1 ._P)k-i
`
`e
`
`“ =
`
`k odd
`k cyan
`(1516)
`where the factor of 112 in the first term for i: even accounts for the random
`.
`.
`.
`.
`k
`.=i
`1‘ ) -_ 2mm probability
`decrsron in case of a no vote. Since p < 1/2 andz(i
`can be bounded by
`
`0,. < ”in“ _p)m
`Hence, the first-error-event probability from (1511) and (15-17) is
`(PE < zakzkpkrzu _ p)“
`
`(15.17)
`
`(15-18)
`
`For the example coder of Fig. 15-] where 4k : 2"" for leg 5, the proba-
`bility of a first-error event (P5 then becomes
`
`(1549)
`(PE < :35 arrow-‘20 7 p)“: : —][2_W%i:)_l;)
`The biteerror probability is bounded by (15-15) using (15717) to obtain
`
`6’» < Zc'tZfiJWI ’17)“: : d—Tw‘M
`Johnna—me,»
`fl'N
`where we have also used (1544). For the example code, We -_- (k 7 4)2""5,
`and the bitterror probability for hard-decision inputs is bounded by
`
`(15-20)
`
`(PD
`
`t W [ZM‘
`75
`..
`k—42J‘ 2kt—21_ raffle; 15—21
`)
`u—wpu—ni
`)
`” l
`m
`(
`(£5
`For the additive Gaussian white noise channel with soft analog decision,
`the correlation metric is
`
`2 my”
`
`x1, = l
`
`(15.22)
`
`M E
`
`where j runs over the 12 code bits in each output code symbol, and where 1'
`runs over the number nodes in each path. For a rate 112 code (:1 : 2L the
`cross-correlation metric is evaluated over M symbols (M a 5K, where K is
`the code constraint length, is usually sufficient), and is expressed by
`
`(rays + my“)
`
`(15-23)
`

`
`M X
`
`45‘ MODULATION AND CODING IN DJSTORTED CHANNELS
`
`Note that, in general, at step j there is no simple way of computing
`whether the paths described in the expansion of T(D,L,N) have survived
`previous survivor decisions at earlier nodes. However, the I'irstverror-eVent
`probability can be overbounded by including all the possible paths to a
`decision error at step j whether they have been previously eliminated or not.
`Thus, since the generating function
`
`T(D) = 21:ka
`
`(15-10)
`
`gives the total number of paths a,* of distance k from the correct path, the
`probability of a first error event at some arbitrary stepj is bounded by
`(P; < mar,
`(15-1!)
`
`By a similar calculation using (15-8), the biteerror probability can be bounded
`from the expansion
`
`(15.12)
`up, L. Nun. a To). N) = :2 how“
`since the path ]cngth (3,, (exponent of L) is not needed for this‘bound for the
`distance I: error path. For the example encoder of Fig, 15-1, this expanston is
`TU), N) : EskD’UV“
`—' DSN + mm2 -i
`
`+ drown}m +
`
`(is—13)
`
`where the number of errors ek = + 1 in each error path. By differentiating
`with respect to N and setting N = l, we can weight each error path by the
`number of output bit errors. We then have
`dT(D, N)
`ck é ake,‘
`N“ = Eakepfl‘~ -:- chD"
`dN
`Thus it can be shown that the bituerror probability is bounded by
`
`(15—14)
`
`(Pi. < 2cm
`
`(is—15)
`
`in which the value of (PR depends on the type of input to the decoder (that is,
`hard or soft decision) and on the channel noise level in input bit—error rate
`(Eb/ND), respectively. The code properties determine the coefficients ck. Hence,
`we have a simple division between code property effects and channel efiects.
`
`Evaluation of (Pk
`
`For a hard-decision input, the probability of a distance k survivor deci‘
`sion error is
`
`
`
`Petitioner Sirius XM Radio Inc. - Ex. 1007, p. 7
`
`Petitioner Sirius XM Radio Inc. - Ex. 1007, p. 7
`
`

`

`465 MODULATION AND CODWG Ml DfSTCh’TED CHANNHS
`
`If a decision error is made, an incorrect path with components x0. produces
`a higher correlation metric than the correct path with components x” e 1.
`Thus, an erroneous decision is made if
`
`(I 5-24)
`Eztx’uyu , y”) > 0
`if the incorrect path x’ difi'crs from the correct path in k code bits and the
`probabiiity of this occurrence is (Pk,
`
`(pk : pr(; 12 xii)?” 7 y“ > 0) = PrL: (I; "' ”Yr > 0]
`I:
`J:
`(mm
`44§m<g:mg¢<g
`where Pr{z > 0} is the probability that z > 0. We have used x, 2 1 and
`xi : #1 i x, by definition and we have converted the double subscripts
`i, j to a single subscript r, which ranges over the same set of coefficients,
`r:n‘i+j.andk=n(M—l— 1).
`Bound on Bit-Error Probibilizy
`
`The white noise channel has noise with one-sided density N[. and signal-
`encrgy per hit of E. Thus, the variables )1” have mean *m/E where 51 :
`Erin is the energy per transmitted code bit and the variance of y” is Nufl.
`The sum 2 : Ey, therefore is also Gaussian with mean kg and variance
`anfl, and the probability of a kebit—path error from (15-25) is
`D
`— .7
`9k:Pr(z<m;J‘ Wfi
`
`ik—E‘
`==
`k
`exp (_ 19/2)“ A erfc’
`)
`(
`N.
`Jv-m :7 21:
`—
`The bit-error probability bound is then obtained from (15—15) and (15-26):
`
`15-26
`
`(15-27)
`6),, < 5:5er : fickcnc'VtLA‘f—i
`where d is the minimum distance of the code (the smallest k where fr 7‘: 0].
`
`A simpler caiculation involves the calculation of [dT(D, N)]/dN using
`(15-14) rather than all the coefficients c,“ For this purpose, we want to express
`G’,t as a power of k as in are”. First, note that the function erfe' 4/2: + y is
`bounded by
`
`erfc’ Jx + y 3 exp (%y) erf‘c’ ./ x
`
`(15-28)
`
`
`
`WTEH-‘i‘f DECODING 0F CDNVDLUNONAL CODES 437
`
`'
`3“, “5mg
`
`Next,setk:d-l-6,!:0,l,.i..andx+ =2k€N Th
`(15-26) and (15-28), we obtain
`)’
`a],
`“I
`
`.
`2k£
`(P , erfc
`‘
`4/ Na
`k
`.
`—€
`,
`7,
`201’ -i' OE,
`
`0
`n
`erfc ,/
`N
`g exp< N05) erfc
`2155'
`ght] weakened to 0b
`Thus, the bound on (9,, in (15-27) can be sli
`(15—15) and (15—29)
`y
`
`
`D
`u
`(P, < 2cm g affix/21$" ; ck exp [#1
`
`i
`242's
`d6
`“
`<
`t
`_r
`— m 'i
`(15.30)
`eerfc 1/ ND “Mmigi cke *
`A
`The expression (15-30) can be rewritten using (15-14) to replace the summa-
`tion
`
`(15-29)
`
`'
`mm from
`
`(15.31)
`
`(15-32)
`
`(15—33”)
`
`(15-331))
`
`(”'34)
`

`
`[5.1, where f. = 38/” = 55/2,
`
` ”=1 U=HP (1“,...)
`
`)
`
`a an; N
`2d:
`,
`a! <erfc1f—l
`(i)
`t
`,
`Nu 9"” ND
`dN
`”
`For th
`'
`and d : 5’e example rate lf2 code of Fig,
`mi), N)
`,
`D5
` v
`dN
`
`’(1 _ 21.0)1
`Hence, the bound on bit»error probability from (15731) is
`
`(p a erfe’ ”in E M

`ND “P (2N6) [1 _ 2 exp 55/2110]:
`and (l5-334r) reduces to
`
`<9 _rfc'5_W
`' < [l - 2min fibrin”:
`as compared to the result of no coding
`#
`,
`213
`1
`ME
`I? _
`_ ~
`"EC v N: " 7““ F”
`A
`
`where
`
`51'1“: x = 72rTJ‘ e'V' dy.
`
`Petitioner Sirius XM Radio Inc. - Ex. 1007, p. 8
`
`Petitioner Sirius XM Radio Inc. - Ex. 1007, p. 8
`
`

`

`“a MODULATION AND CODING IN DISTDHTED CHANNELS
`
`Thus by comparing(15-33a),(15734) for high 5,,an this error-bound shovlrs
`that the coded signal is more than 10 log (2.5) : 3.98 dB better than t e
`uncoded signal for the same output error rate.
`_
`Figures 15-9 through l5-1] shew experimental- curves of measured bit—
`error rates indicating the approximately 4- to 6»dB Improvement tn perform-
`0 simulation 1 [32-bit-pa1h. 0T5 = 0.5l
`x
`IDJSQSImples
`
`u 921,3m5amplas } simulation 2
`Ill HAW
`
`10°
`
` i 10"
`
`
`
`
`
`
`
`
`
`
`
`
`
`i_.lIt.l.l.|_t._luul.l__t_t.uml
`9aaveragehitermrrate 10’“
`
`
`
`
` 10’?
`
` 10’3
`
`
`
`
`
`
`.__l
`(5
`
`1075
`
` 10‘“
`
`
`lui maul-1mm
`0’7
`1—3—3’4’2524 6810121416
`En/No, dB
`Fig. 15-5 Simutated nerlorrnance of a rate 112 convo-
`lurional nude with generators employing soft deuteron.
`G, : 111, G2 : 101. constraint length 3, 1fi-bit paths
`and 32m: paths. Sort decisiun 8-levell receiver‘quan-
`tizarlon is employed. The bit error rate us for maxrmnm-
`likelihood decoding. The quanlizer threshold spacing
`(0T5) is set equal to 0.50 a' where O“ is the rms noise.
`[Busiaman13, 1972]
`
`
`
`WTEHBI DECODING 0F CUNVOLUTIONAL CODES “S
`
`0
`X
`El
`
`Simulation 1 1327bit-path, 0T5 I 0.5)
`92,160 samples
`.
`.
`
`921,600 sample‘s
`SImuIaIlOl‘l 2
`
`Humi|vvw-m7iirrrrrrrn-m.l
`10‘I
`XX
`X):
`10H
`
` 10—2
`
`
`
` 10“
`
`10—5
`
`I—
`
`
`
`averagebiterrorrate
`
`i
`
`—8—6 —4 —2
`
`U
`
`M4444
`2
`4
`6
`8
`Eb W“, dB
`Fig. 15-10 Simulated performance of a rate 1l2 con-
`vnlutienal codewith generators G =11101, G =10011.
`The performance is
`for Viterbi decoding with soft
`decision, constraint
`length 5, 25-bit paths, Bilevei
`receiver quantization. The quantizer threshold spacing
`is equal to 0.50 a.
`
`
`
`
`
`
`
`
`
`
` 10'7
`‘1’wm—r..mn—.—mw~y—y—mm
` Ill
`
`1D
`
`12
`
`14
`
`15
`
`ance at (P, -: [0’5 for codes of constraint lengths 3, 5, and 7 [Heller and
`Jacobs, 1971, 8357848; Bustamante and Leong, 1972]. The codes are rate lf2
`codes with the parity tap positions defined by G,, G2 as indicated in the cap-
`tions. Eight-level soft decision is used rather than a. pure analog input; this
`soft decision experimentally produces a performance within 0.25 dB of the ana—
`log input sample decoder. Decoding is performed over M a 5K path lengths.
`

`
`Petitioner Sirius XM Radio Inc. - Ex. 1007, p. 9
`
`Petitioner Sirius XM Radio Inc. - Ex. 1007, p. 9
`
`

`

`470 MODUMYION AND CODING IN orsraarw CHANNELS
`o
`simulation 1 l32-bit~pam, uTS = 050)
`x
`92,160 samples
`simulation 2
`'3
`921,600 samples
`
`1|)"
`
`uncoded quadriphase
`ltheoretieall
` 1&7
`
`10—3
`
`10"
`
`
`
`0 aireragebiterrorrate
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`,
`.
`we?
`78 its—”7:1 72 ID ‘#2
`
`.ur in;
`6
`B
`
`4
`
`10
`
`12
`
`14
`
`15
`
`Es/dea
`Fig. 15-11 Simulated performance at a rate U2 con-
`volutional code with generators 61 = 1111001, G; =
`1011011. The performance is for Viterbl decoding. $051
`dacisinn, rate ”Leonstralnt length 7, 35-bit paths.
`Eelevel receiver quantization. The quantizer threshold
`spacing is set equal lo 0.50 a.
`
`Code lnterleaving
`
`This section has assumed that the decoder input samples 01' hit daemons
`have independent noise or errors from bit to hit. This assumption. may not be
`valid if there are significant filter distortion efi‘ects, as descnbed 1:: Chap. [3,
`
` 10“
`
`Iriuut
`
`tlHm.
`
`
`
`
`tux 1041'
`
`
`
`
`
`
`
`
`
`
`wriREt assoc/N5 o; CONVDLUNCNAL [cogs 471
`
`or ifthe inphase and quadrature channels of a QPSK signal have crosstalk.
`which causes correlation between errors.
`The efiects of these adjacent or nearly adjacent errors can he reduced by
`proper interleaving of the coder output hits. For example, the coder output
`bits X“ can be transmitted with no delay, and the code bits X2; can be trans,
`mitted with a 5K hit delay simply by adding a 5K hit shift register in the
`output of the lower mod 2 adder in Fig 15-] , This simple delay operation [are
`vents adjacent received bits from affecting the same decoded data bit. Higher
`order interleaving is also possible to prevent -
`-
`- 0.0741“ .
`- error patterns from
`affecting the same decoded data bit. (See Forney and flower [197]], J. L.
`Ramsey [1970]). Higher order interleaving may require the addition of special
`sync words under to preform the deinterleaving process.
`
`15-5
`
`EFFECTS OF PHASE NOESE EN COHERENT
`DEMODULATION 0N DECODER
`PERFORMANCE
`
`The effect of phase noise in carrieretraeking phase-locked loops on error rate
`has been discussed for uncoded PSK channels in Chap. 12. A coded channel
`has a steeper curve of (Pb versus EDIND and therefore is more sensitiv: to phase
`noise. Thus. a short momentary increase in the slowly varying phase-tracking
`error it produces a momentary decrease in efiective Ebe0 and a very large
`increase in error rate.* Much of the time, the phase noise is near its mean
`value of zero to provide low error rates. However, the small fraction of time
`when the effective lib/No decreases dominates because of the steepness ofthe
`error rate curves.
`_
`The effect of slowly varying phase error d on a BPSK channel decreases
`the effective EDI/Nu to (Eb/1N0) cos2 (b. Thus, instead of an error-probability
`funclionaj l‘flla’tlonship
`
`n
`5),, add?)
`
`“545)
`
`the phase noise degrades performance to theerror probability for a giVen qS:
`a
`(15-36)
`«Prev =f(% cos“ a)
`For a first-order loop the probability density of phase error Q} for an SNR
`at In the Closed-loop bandwrdth is (see Chap. 12)
`Ellen!
`n
`(15-37)
`m5) : —— a: >>i
`21:! (,1)
`"‘Slowly“ refers to a small change in phase error d over many (> 102) bit periods.
`
`
`

`
`Petitioner Sirius XM Radio Inc. - Ex. 1007, p. 10
`
`Petitioner Sirius XM Radio Inc. - Ex. 1007, p. 10
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket