throbber
Digital
`Communications
`by Satellite
`
`J.J. SPILKER, JR. Ph.D.
`
`Chairman, Stanford Telecommunications, Inc.
`
`PRENTICE-HALL, INC., Englewood Cliffs, New Jersey
`

`

`
`Petitioner Sirius XM Radio Inc. - Ex. 1007, p. 1
`
`Petitioner Sirius XM Radio Inc. - Ex. 1007, p. 1
`
`

`

`Library of Congress Cataloging in Publication Data
`Spilker, J
`J
`Digital communications by satellite.
`(Prentice-Hall information and system sciences series)
`Bibliography: p. 625
`Includes index.
`1. Artificial satellites in telecommunication.
`2. Data transmission systems.
`|. Title.
`TK5104.564
`621.38°0423
`75-43878
`ISBN 0-13-214155-8
`
`© 1977 by PRENTICE-HALL, INC.
`Englewood Cliffs, New Jersey
`
`All rights reserved. No part of this book
`may be reproducedin any form or by any means
`without permission in writing from the publisher.
`
`10
`
`9
`
`8
`
`7
`
`6
`
`Printed in the United States of America
`
`INC., London
`PRENTICE-HALL INTERNATIONAL,
`PRENTICE-HALL OF AUSTRALIA PTY. LIMITED, Sydney
`PRENTICE-HALL OF CANADA, LTD., Toronto
`PRENTICE-HALL OF INDIA PRIVATE LIMITED, New Delhi
`PRENTICE-HALL OF JAPAN,
`INC., Tokyo
`PRENTICE-HALL OF SOUTHEAST ASIA PTE. LTD., Singapore
`

`

`
`Petitioner Sirius XM Radio Inc. - Ex. 1007, p. 2
`
`Petitioner Sirius XM Radio Inc. - Ex. 1007, p. 2
`
`

`

`456 MODULATION AND CODING IN DISTORTED CHANNELS
`
`It also should be noted thatsatellite communications involves a sub-
`stantial time delay (=-0.25 sec) and often rather high data rates (= 100 Mbps).
`This combination can make Forward Error Correction (FEC) much more
`desirable than automatic request for retransmission (ARQ),because of the
`large costs of ARQto store data at the transmitter until a verification signal
`is received or a request for repeat is received for a data block. In ARQ,
`blocks of data are transmitted with redundancy introduced for error detec-
`tion, If a data blockis received in error, the receiver sends the transmitter
`a request for retransmission. The use of FEC and ARQ together can be
`advantageous.
`In this chapter we review the structure of convolutional codes, describe
`the structure of the Viterbi decoding algorithm, and discuss the error rate
`performance ofthe decoding algorithm for PSK and QPSK signals both
`with and ‘without carrier reconstruction phase noise. Manyof the results
`described in this chapter were first derived by Viterbi and his co-workers in
`the cited references.
`
`15-2
`
`CONVOLUTIONAL CODE STRUCTURE
`
`A convolutional encoder with constraint length K is a K-stage shift register
`with v linear algebraic function generators, one for each output port. A rate
`1/2 code produces two output bits for every input data bit, If one of these
`output bits is the original data bit, the codeis called systematic. Figure 15-1
`showsthe structure of a simple nonsystematic rate 1/2 encoder of constraint
`length K = 3.
`;
`Assuming that the encoderstarts in the all-zero state, the first four bits
`0100
`
`code generation
`G, =111
`
`data d;
`peers,
`0110
`
`Xaje Xi
`(0, 0), (1, 1), (0, 1) (0, 1)
`
`generator denotes the tap positions. VITERBI DECODING OF CONVOLUTIONAL CODES 487
`
`Table 15-1 shows the optimum codes for constraint lengths K = 3-8.
`The code generators define the taps for the K-bit shift register; ”, is the
`: number of bit errors in pathsat distance d,, and d} is the upper bound on
`F minimum free distance [Odenwalder, 1970]. Notice that these codes are all
`nonsystematic, A systematic code would have G, or G, equal to 100... 0;
`E.
`that is, one of the code generators would haveonly a single tap.
`Note that some of the code structures in Table 15-1 are transparent to
`code inyersion—thatis, if the signs of the input bits are reversed, the coded
`output bit sequence is simply inverted. For example,if one of the parity bits
`f. x,, is related to the data bits d, by
`(15-2)
`xy = dD dy Bdea
`’ where there are an odd numberoftermsin the sum,reversing the sign of the
` d, bits simply reversesall of these parity bits. Thus,if the numbersof “ones” or
`
`G, = 101
`
`
`parity bits
`
`oi
`
`Fig. 15-1 Nonsystematic convolutional encoder with
`constraint length K = 3, and rate 1/n = 1/2. The code
`
`0110 produce an output of 00, 11, 01, and 01, respectively, as shown.Clearly,
`the output of each new data bit depends on the previous bit pattern stored
`in stages 1, 2 of the shift register. These bit patterns can be labeled by the
`states defined as
`
`(15-1)
`d=H
`c=10
`b=01
`a=00
`The output bits and transitions between states can be labeled by thetrellis
`diagram of Fig. 15-2. The diagram starts in the all-zero state, node a, and
`makes transitions corresponding to the next data bit. These transitions are
`denoted by a solid line for a “0” and a dotted fine for a “1.” Thus, node a
`proceeds to node a or } with output bits 00 or 11.
`_ 00 *- ‘
`
`start
`
` time —>
`
`Fig. 15-2 Trellis-code representation for the convolu-
`tional encoderof Fig. 15-1
`

`
`Petitioner Sirius XM Radio Inc. - Ex. 1007, p. 3
`
`Petitioner Sirius XM Radio Inc. - Ex. 1007, p. 3
`
`

`

`VITERBI DECODING OF CONVOLUTIONAL CODES 459
`
`Example survivor path to node a.
`survivor path to node a
`a
`g+2=10
`
`,
`<a ea
`10 >. ~
`“eb
`
`a
`be
`
`time —~
`
`6+0=6 delete this path to node a
`
`468 MODULATION AND CODING IN DISTORTED CHANNELS
`
`Table 15-1 Optimum Rate 1/2 Copes (Maximum MINIMUM
`DISTANCE) [GILHOUSENET AL., 1971]
`Code Trans-
`Constraint
`Code
`Distance
`Errors
`Distance
`parent to 180°
`
`Length K
`Generators
`dy
`Ne
`Bound d~ Phase Reversal
`3
`a . iat
`5
`1
`5
`no
`6
`Gem gm
`5
`Ge too
`7 $8
`6
`rH gg em
`ee
`6 Giron =
`
`weights of both G, and G, are odd, then the code is transparent to a sign
`inversion. That is, the decoded output bit stream has the sign ambiguity as
`the input. This transparency is valuable if biphase-modulated PSK is used
`with its ensuing sign ambiguity for it permits decoding prior to ambiguity
`removal. Differential decoding at the decoder output removes the sign ambi-
`guity and simply increases the outputerror rate by a factorofless than 2,
`because decoder output errors typically occur in short bursts. Differential
`decoding at the decoder input would double the decoderinputerror rate and
`thus would cause a muchlargerincrease in the bit-error rate than a factor of
`2 because of the high slope in the output-versus-input-error-rate curve.
`
`15-3
`
`THE MAXIMUM-LIKELIHOOD DECODER
`FOR A BINARY SYMMETRIC CHANNEL
`
`Maximum-likelihood decoding could be accomplished over # coded two-bit
`symbols for rate 1/2 codes by comparing the received 2m output sequences
`with all 4(2") possible code paths leading to each of the 4 nodes in Fig, 15-2
`andselecting the code sequences with the largest cross-correlation.* This
`calculation is extremely difficult for large m and would result in an overly
`complex decoderstructure.
`A major simplification was made by Viterbi in the likelihood calculation
`by noting that each of the 4 nodeshas only two predecessors, and only the path
`
`with the highest cross-correlation weight need be retained for each node, For
`*The factor of 4 includesall possible initial starting states.
`
`
`
`
`
`initial weightgigisd i i+ .
`
`
`
`
`
`Fig. 15-3 Example ofthe iterativelikelihood calcula-
`tion showing the survivor path to node a at f= /, The
`alternate pattern is eliminated because of its lower
`weight.
`
`example, the paths to node a might have weights 10 and 6 as shown in Fig.
`15-3. At each node,the weightof the survivor path determines the new weight.
`For example, at ¢ = i the aa path might add a weight 2 to the weight 8 of the
`previous node a. The added weight can be computed by correlating the
`received codebits r,,, r2, With the parity bits for that transition p1,P2; to
`
`produce w,= pri: -F Pasa, Where p, r are +1 for “hard” binary decisions
`in ry.
`Figure 15-4 showsa typical path structure and weights for decoding. No
`errors have been introduced in the channel, Decoding has begun with no
`information as to the initial state (node) of the coder. Hence,all nodes at
`t = 0 have been set at zero weight. Notice that at ¢ = 5 all node survivor
`paths beganat node a at ¢ = 0, the correct starting position. A decision on
`that ¢ = 0 data bit, the aa path corresponding to a 0 data bit, can then be
`made, Thusin this example a correct data bit decision could be made with
`a 5 symboldelay.In general, with an error-producing channel, data bit deci-
`B sions can be made after computing 5K successive nodes (a decoding delay of
`5K), where K is the coder constraint length.
`If an error is madein selecting the data bit at any time instant, several
`data bits in succession may be decoded incorrectly before the correct path is
`reached. Figure 15-5 showsthe surviving paths with an incorrectstart position
`& (start at node d) for the same data sequenceasin Fig. 15-4. Note that in this
`| example,6 data bits, t = 6 (12 codebits), have been received before the correct
`path (correct path after f= 2) has produced the highest weight.
`Some of the error correction and detection characteristics of the code
`: can be established by redrawingthetrellis in a state diagram (Fig. 15-6),
`

`
`Petitioner Sirius XM Radio Inc. - Ex. 1007, p. 4
`
`Petitioner Sirius XM Radio Inc. - Ex. 1007, p. 4
`
`

`

`460 MODULATION AND CODING IN DISTORTED CHANNELS
`
`
`
`
`a2
`
`input data
`0
`1
`1
`>
`node
`a
`a2
`
`!I
`nodes a 0.
`b0-
`8
`4
`2
`co
`«ce <— i
`da
`2
`6
`4
`0
`start
`f=0
`f=
`f=2
`i=3
`i=4
`time
`
`
`
`i=5
`
`f=6
`
`i=7
`
`Fig. 15-4 Typicaltrellis pattern for decodedbit stream
`with code words received with no errors and unknown
`starting node. The true path is in solid line, and the
`other paths at each node are shown in dotted lines.
`The number adjacent
`to the node fs
`its correlation
`metric. All nodes start at zero weight. Correlation is
`accomplished by replacing the codes by +1
`rather
`than 0,1. Tiesin the metric are broken by a random
`decision.
`
`the dottedline. If aaaa is the correct path in three steps, the minimum alter-
`
`correct
`starting true path
`state
`a
`
`weight value at this node
`
`6
`

`
`e
`
`
`
`be
`
`ce
`
`:
`incorrect
`starting
`state
`
`
`.
`d
`0
`0
`a
`0
`4
`4
`6
`6
`8
`t= 0
`1
`2
`3
`4
`5
`6
`7
`Fig. 15-5 Trellis paths after an initial starting error.
`The true path is shown by the dashedline.
`
`time—»
`
`whereeachpath in the state diagram is labeled with the code bits correspond-
`ing to that path—for example, the aa path is 00, Note that the minimum-
`weight path from ¢ to a, other than the direct aa path, is path abca shown by
`
`VITERBI DECODING OF CONVOLUTIONAL CODES 461
`
`
`
`Fig. 15-6 State-diagram representation for coder of
`Fig. 15-4
`
`nate-weight path abea correspondsto 11, 10, 11, and has weight 5, correspond-
`ing to five errors or Hamming distance d = 5. Thus, this code corrects any
`two errors over that path length and detects any three errors. Codes of mini-
`mum distance d = 2e + I can be used to correct ¢ errors.
`The error-correction properties of any code can be determined by
`generating the flow diagram from a to a for all paths, each labeled D*,
`where & is the weight in that path. The flow diagram for the example codeis
`given in Fig. 15-7. This diagram can be reduced to the generating function
`for all paths which eventually merge with the all-zeros path by the following
`calculations of the paths leading to each ofthe four nodes:
`
`d= Dd +- Db
`
`or
`
`c= Dd+ Db—b
`
`or
`
`
`
`1—D
`a= D> —1\b
`of
`a=De
`and thus 6 = D’a + ¢ — Dd — De
`
`(15-3)
`
`(15-4)
`
`(15-5)
`(15-6)
`
`Solving for a’ in terms of a, we obtain from (15-3) to (15-6)
`
`Tp) = =P = Ds + 2S 4D + + + DHS
`(15-7)
`
`Thus, there is one path of weight 5, two of weight 6, and, in general, 2* paths
`of weight k + 5.
`

`
`Petitioner Sirius XM Radio Inc. - Ex. 1007, p. 5
`
`Petitioner Sirius XM Radio Inc. - Ex. 1007, p. 5
`
`

`

`462 MODULATION AND CODING IN DISTORTED CHANNELS
`
`
`
`(b)
`Fig. 15-7 State diagram labeled according to (a) dis-
`tance from all zeros path for the coder of Fig. 15-1,
`(b) distance, length, and numberof input “ones”
`
`The generating function can be formed for an augmentedstate diagram
`in which each path in the state diagram contains a multiplier coefficient L
`with an exponent¢, correspondingto the length of the path and a coefficient
`NN‘ where ¢ is I for an inputdata | (a solid-line path in Fig. 15-2) and e = 0
`for a zero data-bit path. An example augmented state diagram is given in
`Fig. 15-7b for the coder of Fig. 15-1. The generating function of this aug-
`mented state diagram is then
`
`Thus there is one distance 5 path from a to a’ (the D* term) of length 3 cor-
`responding to the exponent of L. There are two distance 6 paths, one of
`length 4, and oneof length 5, both of which differ from the correct path by
`two data bits (the exponent of N).
`
`(15-8)
`
`The probability ofa first error event at some arbitrary step j with length
`is p(é). For hard-decision inputs, the probability of a first error event of
`length 3 for the one possible error path is p(3) and differs from the correct
`path in five code bits occurring with probability @, = @;. In general,
`the
`total set of erroneous paths and the distance, k, from the correct path have
`Pe
`New
`sk
`D°L?N
`a’
`already been described by the expansion of T(D, L, N). If there are hard deci-
`a TOL.) = 7ppn= Een L
`sions, and we use the T(D, L, N) of(15-8), the single possible length-3 error
`= D'LAN + DSA + LN? 4+
`event requires three received bit errors out of the five to make the incorrect
`+ DStm[seme] + Lypnotm foes
`path have a higher metric than the correct path. Thus, the probability of a
`first error event of length £=3 and distance k = 5 is expressed by
`
`
`
`VITERBI DECODING OF CONVOLUTIONAL CODES 463
`
`15-4
`
`ERROR-RATE PERFORMANCE OF THE
`MAXIMUM-LIKELIHOOD DECODER
`
`The error-rate performance of the decoderis calculated in this section for
`both a hard-decision input (0, 1) and a soft-decision input (analog sample or
`multibit quantized sample) to the decoder. Wefirst obtain the bound on the
`probability of a first decision-error event @, that results in one or more
`outputbit errors. By computing the number of data-bit errors for different
`error events, we then obtain a bound on the bit-error probability.
`
`First-Error-Event Probability
`A first error event occurs if the correct path to the correct nodeis
`excluded at the jth step in the decoding—thatis, the survivor is an erroneous
`path, Since the codes are group codes, thereis no loss in generality by assum-
`ing that the correct pathis the all-zero path aa --- aa. An erroneousdecision
`then occurs at step jin Fig. 15-8, where the path aa --- abca is selected as
`the survivor because of its hypothesized higher correlation metric,
`

`
`.
`5
`
`~~
`
`StEP/ correct path eliminated at step /
`/*— incorrect survivor of length & = 3
`‘A ef eb
`._
`.
`SOF
`ec
`.
`f
`.
`.
`.
`e
`od
`.
`.
`error path length prior to step j
`2
`1
`0
`3
`4
`Fig. 15-8 Example of a decoding decision error for the
`coderof Fig. 15-2
`
`(159)
`23) = 6, =} (7 pa — py
`where p is the hard-decision received bit-error probability at the decoderinput.
`

`
`Petitioner Sirius XM Radio Inc. - Ex. 1007, p. 6
`
`Petitioner Sirius XM Radio Inc. - Ex. 1007, p. 6
`
`€
`

`

`464 MODULATION AND CODING IN DISTORTED CHANNELS
`
`Note that, in general, at step j there is no simple way of computing
`whether the paths described in the expansion of 7(D,L, N) have survived
`previous survivor decisions at earlier nodes. However, the first-error-event
`probability can be overbounded by including all the possible paths to a
`decision errorat step j whether they have been previously eliminated or not.
`Thus, since the generating function
`
`(15-10)
`T(D) = Ea,D*
`gives the total number of paths a, of distance k from the correct path, the
`probability of a first error event at some arbitrary step j is bounded by
`Op < Ea,8,
`(15-11)
`By a similar calculation using (15-8),the bit-error probability can be bounded
`from the expansion
`Gen)
`TD, L, N)lues & TD, N) = 3a,D*N"
`since the path length ¢, (exponentof L) is not needed for thisbound for the
`distance k error path. For the example encoder of Fig. 15-1, this expansionis
`T(D, N) = Xa,D*N*
`= D5N 4 2D8N2 4
`
`+++ } QEDEtSNEHE bee
`
`(85-13)
`
`where the numberoferrors e, = k + 1 in each error path. Bydifferentiating
`with respect to N and setting N = 1, we can weight each error path by the
`number of outputbit errors. We then have
`aT(D, N)
`CyB Apex
`GN hey = Ea,e,D* = Le,D*
`Thus it can be shownthat the bit-error probability is bounded by
`
`(15-14)
`
`0, < Le,P;
`
`(15-15)
`
`in which the value of @, depends on the type ofinputto the decoder (thatis,
`hard or soft decision) and on the channelnoise level in input bit-error rate
`(E,/N), respectively. The code properties determinethe coefficients ¢,. Hence,
`we have a simple division between codepropertyeffects and channel effects,
`
`Evaluation of 9,
`
`For a hard-decision input, the probability of a distance k survivor deci-
`sion error is
`
`
`
`VITERBI DECODING OF CONVOLUTIONAL CODES 465
`
`e
`
`Bm)
`
`k
`k
`7
`k odd
`ie ( i ea =p
`Tit
`EY
`4G
`fk tk
`z ii)PM — py? + we2det ( } \oa — py k even
`(15-16)
`where the factor of 1/2 in the first term for k even accounts for the random
`decision in case ofa tie vote. Since p < 1/2 and ¥ (7) = 2*, this probability
`can be bounded by
`“
`O, < 2p] — py?
`Hence, thefirst-error-event probability from (15-11) and (15-17) is
`Op, < Ea,2*p"2(1 — py?
`
`(15-17)
`
`(15-18)
`
`For the example coder of Fig. 15-1 where a, = 2*-5 for k > 5, the proba-
`bility ofa first-error event , then becomes
`
`3
`— pyev2 . [2p — py
`ae sqe_hing)
`Ft
`py? (ha (15-19)
`soph—
`Oe < Sy ak
`The bit-error probability is bounded by (15-15) using (15-17) to obtain
`
`8, < Eo,2*pe(1 — py? — DN)
`|w=1,p=2v70=9)
`dN
`where we have also used (15-14). For the example code, ¢, = (k — 4)2*-5,
`andthe bit-error probability for hard-decision inputs is bounded by
`
`(15-20)
`
`k=3
`G,< s (k — 4)2k-s2iepki2q] — py? = 2/pT — pi]? =
`[1 — 4./pC. — p)]
`Forthe additive Gaussian white noise channel! with soft analog decision,
`the correlation metric is
`Moon
`
`(15-21)
`
`(15-22)
`xy=l
`yy & XyVey
`where j runs over the n code bits in each output code symbol, and where i
`runs over the number nodes in each path. For a rate 1/2 code (n = 2), the
`cross-correlation metric is evaluated over M symbols (M = 5K, where K is
`the code constraint length, is usually sufficient), and is expressed by
`M.
`XL Gaba + X2ha)
`
`(15-23)
`

`
`Petitioner Sirius XM Radio Inc. - Ex. 1007, p. 7
`
`Petitioner Sirius XM Radio Inc. - Ex. 1007, p. 7
`
`

`

`466 MODULATION AND CODING IN DISTORTED CHANNELS
`
`Ifa decision erroris made, an incorrect path with components x; produces
`a higher correlation metric than the correct path with components x;; = !.
`Thus, an erroneous decision is made if
`(15-24)
`ELK — Pus) > 0
`If the incorrect path x’ differs from the correct path in k code bits and the
`probability of this occurrence is ©,,
`6, = P(E x Xu — Pu > 0) = P| (x ~ Dy > o|
`ke
`ie
`(15-25)
`= Pr(32»,< 0) = Pr(Sy, <0)
`where Pr{z > 0} is the probability that z > 0. We have used x, = 1 and
`x, = —1 # x,by definition and we have converted the double subscripts
`i, j to a single subscript r, which ranges over the same set of coefficients,
`r=nitj,andk =a(M + 1).
`Bound on Bit-Error Probibility
`
`erfe’ ./x + y< exp (=) erfe’ ./ x
`
`(15-28)
`
`
`
`de,\
`(de,
`dT(D, N
` IN=1, Deoxp (~es/Ny)
`(2)
`@; < erfe’ ,/Es
`(D,N)
`Wo PAN)
`‘
`aN
`The white noise channelhasnoise with one-sided density Ny and signal-
`For th
`i
`energy per bit of £,. Thus, the variables y,, have mean —./€, Where €, =
`mae - example rate 1/2 code of Fig. 15-1, where €, = E,/n = E,/2,
`E,|n is the energy per transmitted code bit and the variance of y,, is N4/2.
`The sum z = Sy,therefore is also Gaussian with mean k,/e, and variance
`aT(D, N)
`__
`DD?
` Ny
`kN,/2, and the probability of a k-bit-path error from (15-25) is
`aN
`0
`— ‘er
`~W— aDpF
`(15-32)
`
`®, = Pz <0) = J exp(2—KyeWKNseals dz
`Hence, the bound onbit-error probability from (15-31) is
`=f
`exp (= 2712) dy & erfe’
`2KE,
`(15.96
`
`JeGaemorte (ie 1826
`
`
`./98%exp(SEs) _[exp(—2/2N0)_:®, <erfe’ NP (Gxt) {l — 2exp EP2N,P (15-332)
`
`Thebit-error probability bound is then obtained from (15-15) and (15-26):
`and (15-332) reduces to
`&
`0
`B, <Ee,0, — Se, erfe’ foe
`(15-27)
`0,<eileSEIN,
`»< [T= texp(BINOF
`(15-338)
`where dis the minimum distance of the code (the smallest k where c, + 0).
`as comparedtothe result of no coding
`A simpler calculation involves the calculation of [dT(D, N)\/dN using
`(15-14) rather than all the coefficients c,. For this purpose, we want to express
`2B, 1
`E,
`@, as a power of & as in a@*. First, note that the function erfe’ ./x + y is

`bounded by
`Ne = = ele
`it
`erfe x = ea I e-” dy.
`
`WTERB! DECODING OF CONVOLUTIONAL CODES 467
`
`and x + p= 2ke,/N,.
`Th
`i
`= a oy tein
`
`Next, set k=d+, €=0,1,...,
`(15-26) and (15-28), we obtain

`/2ke
`6, = erfc’
`,/—=
`VW,
`
`a ada te
`_
`i
`fi
`:
`€,

`/2de,
`erfe’
`,/ m <exp( Wr ) exfe Var
`ightly weakened to ob
`Thus, the bound on @, in (15-27) can besli
`(15-15) and (15-29)
`*
`i
`a
`O, < Ee,P, <erfe’ ae See exp [498]

`/2de,
`de,\
`=
`Sei
`0
`(15-30)
`<< erfe’ 4/ Ft exp (S$) Shee sealM
`The expression (15-30) can be rewritten using (15-14) to replace the summa-
`tion
`
`(15-29)
`
`i
`fain From
`
`(15-31)
`
`@, = erfc’
`
`where
`
`(15-34)
`

`
`Petitioner Sirius XM Radio Inc. - Ex. 1007, p. 8
`
`Petitioner Sirius XM Radio Inc. - Ex. 1007, p. 8
`
`

`

`
`
`
`
`
`
`
`
`
`
`
`
`
`
`i
`
`10-5
`
`r
`
`10-6
`
`14
`
`16
`
`10-7
`—-8-6-4-2 0
`
`10
`
`12
`
`Lisistisistiiiil
`2
`4
`6
`8
`E,/Ny, dB
`Fig. 15-10 Simulated performance of a rate 1/2 con-
`volutional code with generators G = 11101, G = 10011.
`The performance js
`for Viterbi decoding with soft
`decision, constraint
`length 5, 25-bit paths, 8-level
`receiver quantization. The quantizer threshold spacing
`is equal to 0,50,
`
`ance at , = 10-5 for codes of constraint lengths 3, 5, and 7 [Heller and
`Jacobs, 1971, 835-848 ; Bustamante and Leong, 1972]. The codesare rate 1/2
`codes with the parity tap positions defined by G,, G, as indicated in the cap-
`tions. Eight-level soft decision is used rather than a pure analog input; this
`soft decision experimentally produces a performance within 0.25 dB of the ana-
`log input sample decoder. Decoding is performed over M = 5K path lengths.
`

`
`Petitioner Sirius XM Radio Inc. - Ex. 1007, p. 9
`
`XX
`K
`
`.
`
`10-1
`
`|
`a i.
`
`2=r
`
`
`E
`E
`
`25
`2
`es
`Fol
`a
`
`simulation 1 (32-bit-path, QTS = 0.5)
`Oo
`Thus by comparing(15-332) ,(15-34) for high E,/No this errorbound ——
`92,160samples}
`%
`that the coded signal is more than 10 log (2.5) = 3.98 dB better than the
`D 921,800 samplesfSimulation 2
`
`uncoded signal for the same outputerrorrate.
`.
`10°
`TTTTTyy
`Figures 15-9 through 15-11 show experimental curves of measured bit-
`error rates indicating the approximately 4 to 6-dB improvementin perform-
`© simulation 1 (32-bit-path, OTS = 0.5)
`X
`10,752 samples
`area
`uncodedquadriphase
` 10°
`1D 921,600 samples } simulation
`
`TTT VIALE THATTETT
`
`4d
`L
`{theoretical)
`
`
`
`
`aT| 10-1
`
`buditilwu
`
`eyaveragebit-errorrate 10-4
`
`
`
`10-2
`
`
`
`
`
`
`
`
`
`
`
` 10-6
`
`468 MODULATION AND CODING IN DISTORTED CHANNELS
`
`VITERBI DECODING OF CONVOLUTIONAL CODES 463
`
`uncoded quadriphase
`(theoretical)
`
`
`
`
`
`
`
`
`
`
`
`14
`
`16
`
`
`
`
`
`
`motets bi
`0-7
`ete? OD 6
`8 7 12
`E,/No, 0B
`Fig. 15-9 Simulated performanceof a rate 1/2 convo-
`lutional code with generators employing soft decision,
`G, = 111, G, = 101, constraint length 3, 18-bit paths
`and 32-bit paths. Soft decision 8-level receiver quan-
`tization is employed. Thebit errorrate is for maximum-
`likelihood decoding. The quantizer threshold spacing
`(QTS)is set equal to 0.50 o where @ is the rms noise.
`[Bustamante, 1972]
`
`Petitioner Sirius XM Radio Inc. - Ex. 1007, p. 9
`
`

`

`VITERBI DECODING OF CONVOLUTIONAL CODES 471
`©—simulation 1 (32-bit-path, UTS = 0.5)
`x
`92,160 samples
`simulation 2
`orif the inphase and quadrature channels of a QPSKsignal have cross-talk,
`which causes correlation between errors.
`O
`921,600 samples
`Theeffects of these adjacentor nearly adjacent errors can be reduced by
`properinterleaving of the coder output bits, For example, the coder output
`bits X,, can be transmitted with no delay, and the code bits ¥,, can be trans-
`mitted with a 5K bit delay simply by adding a 5K bit shift register in the
`output of the lower mod2 adderin Fig. 15-1. This simple delay operation pre-
`vents adjacentreceived bits from affecting the same decoded databit. Higher
`orderinterleavingis also possible to prevent -
`-
`- 0,0,0,- «+ error patterns from
`affecting the same decoded data bit. (See Forney and Bower [1971], J. L.
`Ramsey [1970]). Higher orderinterleaving may require the addition of special
`syne words underto preformthe deinterleaving process.
`
`470 MODULATION AND CODING IN DISTORTED CHANNELS
`
`10°
`
`(theoretical)
` 10-2
`
` 10-3
`15-5=EFFECTS OF PHASE NOISE IN COHERENT
`DEMODULATION ON DECODER
`PERFORMANCE
`
` 10-1 uncoded quadriphase
`
`pal
`
`po
`
`
`
`
`
`
`
`
`valid if there are significant filter distortion effects, as described in Chap. 13,
`
`
`
`
`
`
`
`
`oyaveragebiterrorrate
`
` 10-4
`
`
`
`Leeda
` 10-6
`
`14
`
`16
`
`12
`
`
`Lorsttosrilitartitrstiiiitispiiiveitinas
`10-7
`—-8-6-4-2 0
`2
`4
`6
`8
`10
`E,4/No, dB
`Fig. 15-11 Simulated performance of a rate 1/2 con-
`volutional code with generators G; = 1111001, G, =
`1011011. The performanceis for Viterbi decoding, soft
`decision, rate 1/2, constraint length 7, 35-bit paths,
`8-level receiver quantization. The quantizer threshold
`spacing is set equal to 0.50 a.
`
`Code interleaving
`
`This section has assumed that the decoder input samples or bit decisions
`have independentnoise or errors from bit to bit. This assumptionmay not be
`
`Theeffect of phase noise in carrier-tracking phase-locked loops on errorrate
`has been discussed for uncoded PSK channels in Chap. 12. A coded channel
`hasa steeper curve of @, versus E,/N, and therefore is moresensitive to phase
`noise. Thus, a short momentaryincreasein the slowly varying phase-tracking
`error ¢ produces a momentary decrease in effective E,{Ny and a very large
`increase in error rate.* Much of the time, the phase noise is near its mean
`value of zero to provide low error rates. However, the smallfraction of time
`whentheeffective E/N, decreases dominates because of the steepness of the
`error rate curves.
`.
`Theeffect of slowly varying phase error ¢ on a BPSK channeldecreases
`the effective E,/N,y to (E,/N,) cos? ¢. Thus, instead of an error-probability
`functional relationship
`
`(15-35)
`0, =£(#)
`the phase noise degrades performanceto the error probability for a given ¢:
`E,
`sd)
`=F(008? 6)
`(15-36)
`Ob)
`= f(=* cos?
`15-36
`For a first-order loop the probability density of phase error ¢ for an SNR
`a in the closed-loop bandwidth is (see Chap. 12)
`exces ¢
`(15-37)
`pb) = Talker tl
`*“Slowly”refers to a small change in phase error ¢ over many (> 102) bit periods.
`

`
`Petitioner Sirius XM Radio Inc. - Ex. 1007, p. 10
`
`Petitioner Sirius XM Radio Inc. - Ex. 1007, p. 10
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket