throbber
DECLARATION OF WILLIAM JOHNSON
`
`1.
`
`My name is William Johnson. I am over the age of twenty-one years, of sound
`
`mind, and capable of making the statements set forth in this Declaration. I am competent to testify
`
`about the matters set forth herein. All the facts and statements contained herein are within my
`
`personal knowledge.
`
`2.
`
`I visited the University of Texas at Austin's Life Science Library ("Life Science
`
`Library") located in Austin, Texas 78712 on January 23, 2020 and scanned certain pages from
`
`Digital Modulation Techniques by Fuqin Xiong ("Xiong").
`
`3.
`
`The Life Science Library's call number for Xiong is TK5103.7 X65 2000. The Life
`
`Science Library had one copy of Xiong, which was indexed and shelved as indicated by the Life
`
`Science Library's online catalog, a true and correct copy of which is attached as Appendix A. In
`
`the copy of Xiong, I scanned the cover, the table of contents, the "Date Due" slip, and pages 7-15,
`
`123-129, 136-139, 154-160, 195-201, 342-347, and 422-441. A true and correct copy of these
`
`pages from Xiong is attached as Appendix B.
`
`4.
`
`One date stamp on the "Date Due" slip of Xiong states "AUG 18 2000."
`
`5.
`
`I visited the University of Texas at Austin's McKinney Engineering Library
`
`("McKinney") located in Austin, TX 78712 on January 23, 2020 and scanned certain pages from
`
`Wireless Communications: Principles and Practice by Theodore S. Rappaport ("Rappaport").
`
`6.
`
`McKinney's call number for Rappaport is TK5103.2 R37 1995. McKinney had
`
`one copy of Rappaport, which was indexed and shelved as indicated by McKinney 's online
`
`catalog, a true and correct copy of which is attached as Appendix C. In the copy of Rappaport, I
`
`scanned the cover, the table of contents, the "Date Due" slip, and pages 197-298. A true and
`
`correct copy of these pages from Rappaport is attached as Appendix D.
`
`7.
`
`One date stamp on the "Date Due" slip of Rappaport states "AUG 14 1998."
`
`1
`
`Qualcomm Incorporated
`Exhibit 1035
`Page 1 of 217
`
`

`

`8.
`
`I visited the University of Texas at Austin's Perry-Castatieda Library ("PCL")
`
`located in Austin, TX 78712 on January 23, 2020 and scanned certain pages from Bluetooth:
`
`Connect Without Cables by Jennifer Bray and Charles F. Sturman ("Bray").
`
`9.
`
`PCL's call number for Bray is TK5103.3 B73 2001. PCL had two copies of Bray,
`
`which were indexed and shelved as indicated by PCL's online catalog, a true and correct copy of
`
`which is attached as Appendix E. In the copy of Bray, I scanned the cover, the table of contents,
`
`the "Date Due" slip, and pages 84-86. A true and correct copy of these pages from Bray is attached
`
`as Appendix F.
`
`10.
`
`One date stamp on the "Date Due" slip of Bray states "JUL 12 2001."
`
`1 1.
`
`I declare under penalty of perjury that the foregoing is true and correct.
`
`Executed on January 23, 2020 in Austin, Texas, U.S.A.
`
`2
`
`Page 2 of 217
`
`

`

`APPENDIX A
`
`APPENDIX A
`
`Page 3 of217
`
`Page 3 of 217
`
`

`

`  ÿ
`  ÿ
 
`
ÿÿ
` ÿ  
`ÿ  ÿ
` ÿ !"
`#$%&'()ÿ*  ÿ+ÿ,-
ÿ.
`
ÿ /000
`12ÿ34ÿ!56ÿ7ÿ+ÿ ÿ8ÿ/ ÿ 
`9'(ÿ,-
ÿ.
`
ÿ


`   ÿ :--;8ÿ,-
ÿ.
`
ÿ


`   ÿ :--;
`9$%<=ÿ  ÿ
` 
`>?@'A'ÿBC+ÿ05D08ÿEF*G+ÿ0D00!H00ÿIJÿ77
-K8ÿLCBC+ÿILCBCK  /D!!/
`MNOÿ:J
`'@ÿPÿ /000
`9$=ÿ,
`,4 :  ;ÿ ÿ   +
`Q 4
- ;ÿRÿS
3ÿ ÿ,
` +
`,4 :
+B R
ÿF
ÿB :--;ÿB R
ÿF
ÿB :--;ÿSTÿ506Hÿ!5ÿ/000
`
`Page 4 of 217
`
`

`

`APPENDIX B
`
`APPENDIX B
`
`Page 5 of217
`
`Page 5 of 217
`
`

`

`IIIIIm-Illllmllm NIH | HIHHH
`
`[H
`
`“I H
`
`IllllllmIllllllllllllllllllmll
`
`III-Il‘l'Lq—_
`
`1H “NH NH
`Iliummull-Inlmmum
`
`I
`
`Page6of217
`
`Page 6 of 217
`
`

`

`7:2?xx
`
`'HH
`
`‘!RRAPY
`
`—.——-
`
`1
`
`-
`
`‘ “I“'-."’:_’iRSlTY
`
`I‘
`
`.\AS
`
`A."
`
`fx'TyN
`
`Page 7 of217
`
`Page 7 of 217
`
`

`

`THE UNIVERSITY OF TEXAS AT AUSTIN
`THE GENERAL LIBRARIES
`
`AUG 2 5 2004
`
`RETURNED
`
`JAN 1 8 2005
`
`AUG 31 2005
`
`JUN 012006
`
`Page 8 of217
`
`Page 8 of 217
`
`

`

`''Igl—WE
`
`Er“
`
`ml?25*
`
`'ma'i IRRAPY
`
`1‘“ ~
`
`1
`
`‘.I::'1‘1RSITY
`:qu
`‘
`Y
`
`.
`
`‘x
`
`A} .‘S‘TYN
`
`Page 9 of217
`
`Page 9 of 217
`
`

`

`lfib‘“‘ : I
`
`RETURNED
`
`AUG 3 o 200:1AU
`
`
`
`JAN 16 2001
`
`:‘4
`
`APR 08 2002
`
`P ' wca'r-
`
`JAM? 2003
`
`m .
`
`* 2002
`
`JUN 0 4 20013433. n ENC-\N
`MA
`0 7 2003
`
`Page 10 of217
`
`Page 10 of 217
`
`

`

`Library of Congress Caalosing-in-Publicauon 0m
`Xiong, Fuqin.
`Digital modulation techniques / Fu
`p. cm. — (Am-ch House teleco
`Includes bibliographical references
`ISBN 0-89006-970-0 (alk. paper)
`1. Digital modulation.
`1. Title.
`
`II. Series.
`
`qin Xiong.
`mmunications library)
`and index.
`
`TK5103.7 X65 2000
`621.3815’36—dc21
`
`99-05809]
`CIP
`
`British library Cataloguing in Publication Data
`Xiong, Fuqin
`Digital modulation techniques. — (Artech House
`telecommunications library)
`1. Digital modulation
`I. Title
`
`621.3'81536
`
`ISBN 0-89006070-0
`
`Cover design by Igor Valdman
`
`© 2000 ARTECH HOUSE, INC.
`685 Canton Street
`
`Norwood, MA 02062
`
`All rights reserved. Printed and bound in the United States of America. No part 0‘-
`this book may be reproduced or utilized in any form or by any means. electronic 0'
`mechanical. including photocopying, recording. or by any information storage and I’c‘
`tricval system, without permission in writing from the publisher.
`All terms mentioned in this book that are known to be trademarks or service made
`have been appropriately capitalized. Anech House cannot attest to the accuracy ofthis
`information. Use of a term in this book should not be regarded as affecting (ht valid-
`ity of any trademark or service mark.
`
`International Standard Book Number: 0-89006o970-0
`Library of Congress Catalog Card Number: 99-05809]
`
`1098765432]
`
`Page 110f217
`
`Page 11 of 217
`
`

`

`Contents
`
`Preface
`
`Chapter 1
`
`Introduction
`
`1.1 Digital Communication Systems
`1.2 Communication Channels
`1.2.1 Additive White Gaussian Noise Channel
`1.2.2 Bandlimited Channel
`
`1.2.3 Fading Channel
`1.3 Basic Modulation Methods
`
`1.4 Criteria of Choosing Modulation Schemes
`1.4.1 Power Efficiency
`1.4.2 Bandwidth Efficiency
`1.4.3 System Complexity
`1.5 Overview of Digital Modulation Schemes
`References
`
`Chapter 2
`
`Baseband Modulation (Line Codes)
`2.1 Differential Coding
`2.2 Description of Line Codes
`2.2.1 Nonretum-to-Zero Codes
`2.2.2 Retum-to—Zero Codes
`
`2.2.3 Pseudotemary Codes (including AMI)
`2.2.4 Biphase Codes (including Manchester)
`2.2.5 Delay Modulation (Miller Code)
`Power Spectral Density of Line Codes
`2.3.1 PSD of Nonretum-to-Zero Codes
`2.3.2 PSD of Retum-to-Zero Codes
`
`2.3
`
`2.3.3 PSD of Pseudotemary Codes
`2.3.4 PSD of Biphase Codes
`2.3.5 PSD of Delay Modulation
`
`V
`
`xiii
`
`Oflflobb——
`
`10
`10
`ll
`12
`15
`
`l7
`18
`22
`25
`25
`26
`27
`27
`28
`30
`34
`35
`37
`40
`
`Page 12 of217
`
`| i
`
`Page 12 of 217
`
`

`

`vi
`
`Digital Modulation Techniques
`
`2.5
`
`2.6
`
`2.4 Bit Error Rate of Line Codes
`2.4.! BER of Binary Codes
`2.4.2 BER of Pseudoternary Codes
`2.4.3 BER of Biphase Codes
`2.4.4 BER of Delay Modulation
`Substitution Line Codes
`2.5.1 Binary N-Zero Substitution Codes
`2.5.2 High Density Bipolar n Codes
`Block Line Codes
`2.6.] Coded Mark Inversion Codes
`2.6.2 Differential Mode Inversion Codes
`2.6.3 mBnB Codes
`2.6.4 mBlC Codes
`2.6.5 DmBlM Codes
`2.6.6 PFmB(m+l)B Codes
`2.6.7 anT Codes
`
`2.7
`
`Chapter 3
`
`3.2
`3.3
`3.4
`
`Frequency Shift Keying
`3.!
`Binary FSK
`3.l.l Binary FSK Signal and Modulator
`3.1.2 Power Spectral Density
`Coherent Demodulation and Error Performance
`Noncoherent Demodulation and Error Performance
`M-ary FSK
`3.4.l MPSK Signal and Power Spectral Density
`3.4.2 Modulator, Demodulator. and Error
`Performance
`Demodulation Using Discriminator
`Synchronization
`Summary
`References
`
`3.5
`3.6
`3.7
`
`Chapter 4
`
`Phase Shift Keying
`4.|
`Binary PSK
`4.2
`Differential BPSK
`4.3
`M-ary PSK
`4.4
`PSD of MPSK
`4.5
`Differential MPSK
`4.6
`Quadrature PSK
`
`——'—
`fl,“5
`
`l
`
`Page 13 of217 A
`
`Page 13 of 217
`
`

`

`
`
`Contents
`
`4.7 Differential QPSK
`4.8 Offset QPSK
`4.9
`1t/4-QPSK
`4. l0 Synchronization
`4.10.] Carrier Recovery
`4.10.2 Clock Recovery
`4.10.3 Effects of Phase and Timing Error
`4.1 I Summary
`4.12 Appendix 4A
`References
`
`Chapter 5 Minimum Shift Keying and MSK-Type Modulations
`5.I Description of MSK
`5.] .l MSK Viewed as a Sinusoidal Weighted OQPSK
`5.1.2 MSK Viewed as a Special Case of CPFSK
`Power Spectrum and Bandwidth
`5.2.1 Power Spectral Density of MSK
`5.2.2 Bandwidth of MSK and Comparison with PSK
`5.3 Modulator
`5.4 Demodulator
`
`5.2
`
`5.5 Synchronization
`5.6 Error Probability
`5.7 Serial MSK
`
`5.7.I SMSK Description
`5.7.2 SMSK Modulator
`5.7.3 SMSK Demodulator
`
`5.7.4 Conversion and Matched Filter Implementation
`5.7.5 Synchronization of SMSK
`5.8 MSK-Type Modulation Schemes
`5.9
`Sinusoidal Frequency Shifi Keying
`5. IO Simon‘s Class of Symbol-Shaping Pulses
`5.1 I Rabzel and Pathupathy‘s Symbol-Shaping Pulses
`5. 12 Bazin‘s Class of Symbol-Shaping Pulses
`5. l3 MSK-Type Signal‘s Spectral Main Lobe
`5.14 Summary
`References
`
`Chapter 6
`
`Continuous Phase Modulation
`6.1 Description of CPM
`6. I .1 Various Modulating Pulse Shapes
`6. I .2 Phase and State of the CPM Signal
`
`vii
`
`I60
`I67
`I70
`179
`I79
`I83
`I86
`187
`190
`192
`
`I95
`I96
`196
`20I
`203
`203
`204
`207
`210
`
`214
`216
`219
`
`219
`22I
`223
`
`227
`231
`231
`236
`240
`247
`250
`254
`256
`257
`
`259
`260
`261
`265
`
`Page 14 of217
`
`Page 14 of 217
`
`

`

`viii
`
`Digital Modulation Techniques
`
`6.2
`
`6.3
`
`6.5
`
`6.6
`
`6.7
`6.8
`
`.—_4.D‘A—_-————
`
`
`V‘I‘Amt—s—-——'
`
`269
`272
`
`274
`
`6.1.3 Phase Tree and Trellis. State Trellis
`POWer Spectral Density
`62.1 Steps for Calculating PSDs for General CPM
`Signals
`6.2.2 Effects of Pulse Shape. Modulation Index. and
`276
`A Priori Distribution
`277
`6.2.3 PSD ofCPFSK
`279
`MLSD for CPM and Error Probability
`28]
`6.3.! Error Probability and Euclidean Distal"cc
`285
`6.3.2 Comparison of Minimum Distances
`286
`Modulator
`286
`6.4.1 Quadrature Modulator
`292
`6.4.2 Serial Modulator
`295
`6.4.3 All-Digital Modulator
`297
`Demodulator
`297
`6.5.l Optimum ML Coherent Demodulator
`301
`6.5.2 Optimum ML Noncoherent Demodulator
`3| l
`6.5.3 ViterbiDemodulator
`3 l 7
`6.5.4 Reduced-Complexity Viterbi Demodulator
`6.5.5 Reduction of the Number of Filters for LREC CPM 320
`325
`6.5.6 ML Block Detection of Noncoherent CPM
`326
`6.5.7 MSK-Type Demodulator
`330
`6.5.8 Difi‘erential and Discriminator Demodulator
`333
`6.5.9 Other Types of Demodulators
`337
`Synchronization
`337
`6.6.l MSK-Type Synchronizer
`6.6.2 Squaring Loop and Fourth-Power Loop
`Synchronizers
`6.6.3 Other Types of Synchronizer
`Gaussian Minimum Shifl Keying
`Summary
`References
`
`340
`34 l
`342
`346
`347
`
`Chapter 7
`
`Multi-h Continuous Phase Modulation
`7.1
`MHPM Signal. Phase Tree, and Trellis
`7.2
`Power Spectral Density
`7.3
`Distance Properties and Error Probability
`7.4
`Modulator
`7.5
`
`Demodulator and Synchronization
`7.5.] A Simple ML Demodulator for Multi-h Binary
`CPFSK
`
`35|
`351
`36!
`366
`382
`382
`
`382
`
`Page 15 of217
`
`Page 15 of 217
`
`

`

`Contenls
`
`7.5.2 Joint Demodulation and Carrier Synchronization of
`Multi-h CPFSK
`
`7.5.3 Joint Carrier Phase Tracking and Data Detection of
`Multi.h CPFSK
`
`ix
`
`388
`
`392
`
`7.6
`
`7.5.4 Joint Demodulation. Carrier Synchronization. and
`Symbol Synchronization of M-ary Multi-h C PFSK 393
`7.5.5 Synchronization of MHPM
`398
`Improved MHPM Schemes
`399
`7.6.1 MHPM with Asymmetrical Modulation Indexes
`400
`7.6.2 Multi-T Realization of Multi-h Phase Codes
`401
`
`7.6.3 Correlatively Encoded Multi-h Signaling Technique 401
`7.6.4 Nonlinear Multi-h CPFSK
`403
`
`Summary
`7.7
`7.8 Appendix 7A
`References
`
`403
`404
`408
`
`411
`Quadrature Amplitude Modulation
`411
`8.1 M-ary Amplitude Modulation
`412
`8.1.1 Power Spectral Density
`414
`8.1.2 Optimum Detection and Error Probability
`8.1.3 Modulator and Demodulator for Bandpass MAM 418
`8.1.4 On-Off Keying
`421
`8.2 QAM Signal Description
`422
`8.3 QAM Constellations
`425
`8.3.1 Square QAM
`429
`8.4 Power Spectral Density
`432
`8.5 Modulator
`434
`8.6 Demodulator
`436
`
`Chapter 8
`
`8.7 Error Probability
`8.8
`Synchronization
`8.9 Differential Coding in QAM
`8.10 Summary
`8.1 1 Appendix 8A
`References
`
`Chapter 9
`
`Nonconstant-Envelope Bandwidth-Efficient Modulations
`9.1
`Two~Symbol-Period Schemes and Optimum
`Demodulator
`
`9.2 Quasi-Bandlimited Modulation
`9.3 QORC. SQORC, and QOSRC
`9.4
`1JF-OQPSK and TSl-OQPSK
`
`438
`441
`448
`454
`455
`457
`
`459
`
`460
`
`465
`471
`478
`
`Page 16 of217
`
`Page 16 of 217
`
`

`

`Digital Modulation Techniques
`
`10.1.1 Channel Characteristics
`10. I .2 Channel Classification
`10.1.3 Fading Envelope Distributions
`'02 Digital Modulation in Slow. Flat Fading Channels
`10.2.l Rayleigh Fading Channel
`10.2.2 R
`.
`_
`ician Fading Channel
`10.3 Dig
`Ital Modulation in Frequency Selective Channels
`10.4 rt/4-
`DQPSK in Fading Channels
`10.5
`MHPM in Fading Channels
`10.6 QAM in Fading Channels
`10.6.1 Square QAM
`10.6.2 Star QAM
`10.7 R
`emedial Measures Against Fading
`10.8 Summary
`References
`
`Appendix A Power Spectral Densi
`ties of Signals
`A.l
`Bandpass Signals and Spectra
`A.2
`Bandpass Stationary Random Process and PSD
`A.3
`Power Spectral Densities of Digital Signals
`A.3.l Case I: Data Symbols Are Uncol'I‘Clmed
`.
`A.3.2 Case 2: Data Symbols Are Correlated
`Power Spectral Densities of Digital Bandpass signals
`Power Spectral Densities of CPM Signals
`References
`
`AA
`A.5
`
`Appendix B Detection of Signals
`3.1 Detection of Discrete Signals
`B. 1.1 Binary Hypothesis Test
`8.1.2 Decision Criteria
`8.13 M Hypotheses
`Detection of Continuous Signals With Known Phases
`8.2.1 Detection of Binary Signals
`8.2.2 Decision of M-ary Signals
`
`8.2
`
`ii
`
`490
`498
`515
`515
`
`517
`518
`518
`521
`524
`527
`527
`S31
`S33
`
`$48
`554
`555
`558
`560
`563
`564
`
`567
`567
`$69
`572
`574
`S76
`577
`580
`586
`
`589
`589
`589
`590
`594
`596
`596
`608
`
`Page 17 of217
`
`4__________~——
`_v:;.:/':-——.-
`F»!—JE'x-._—'
`
`Page 17 of 217
`
`

`

`Contents
`
`8.3 Detection ofContinuous Signals With Unknown Phases
`8.3.] Receiver Structure
`8.3.2 Receiver Error Performance
`References
`
`Glossary
`About the Author
`Index
`
`xi
`
`615
`615
`621
`625
`
`627
`631
`633
`
`Page 18 of217
`
`Page 18 of 217
`
`

`

`1.1:
`
`Digital Modulation Techniques
`
`Then the probability density function (PDF) of n can be written as
`
`1
`
`2
`
`13(71): WGXP‘I—KTO}
`
`(l9)
`
`annels are approximately an AWGN channel. For ex-
`_
`‘
`ample, the "ne'Of'S'ghl (L03) radio channels. including fixed terrestrial miCI'OWave
`links and fixed satellite links,
`-
`
`In this book, allmodulation schemes are studied for the AWGN channel. The
`fold. First. some channels are approximately an AWGN
`used directly. Second, additive Gaussian noise is ever
`er other channel impairments such as limited bmdwidth.
`.
`.
`fading, multtpath, and other interferences exist or not. Thus the AWGN channel is the
`be“ channel mat 0“ can 861- The performance ofa modulation scheme evaluated in
`this channel is an upper bound on the performance. When other channel impairments
`exist. the system performance will degrade. The extent ofdegradation may vary for
`emes. The performance in AWGN can serve as a standard
`dation and also in evaluating effectiveness of impainnent-
`
`combatttng techniques.
`
`1.2.2
`
`Bandlimited Channel
`
`When the channel bandwidth is smaller than the signal bandwidth. the channel is
`bandlimited. Severe bandwidth limitation causes intersymbol interference (lSl) (i.e..
`digital pulses will extend beyond their transmission duration (symbol period T. )) and
`interfere with the next symbol or even more symbols. The 15! causes an increase
`in the bit error probability (P5) or bit error rate (BER). as it is commonly called.
`When increasing the channel bandwidth is impossible or not cost-efficient. channel
`equalization techniques are used for combatting lSl. Throughout the years. numerous
`equalization techniques have been invented and used. New equalization techniques
`are appearing continuously. We will not cover them in this book. For introductory
`ueatment of equalization techniques. the reader is referred to [LChaptcr 6| or any other
`communication systems books.
`
`Page 19 of217
`
`Page 19 of 217
`
`

`

`Chapter I
`
`Introduction
`
`7
`
`1.2.3
`
`Fading Channel
`
`Fading is a phenomena occurring when the amplitude and phase of a radio signal
`change rapidly over a short period of time or travel distance. Fading is caused by in-
`terference between two or more versions of the transmitted signal which arrive at the
`receiver at slightly different times. These waves, called multipath waves. combine
`at the receiver antenna to give a resultant signal which can vary widely in amplitude
`and phase. If the delays of the multipath signals are longer than a symbol period,
`these multipath signals must be considered as different signals. In this case, we have
`individual multipath signals.
`In mobile communication channels. such as ten'estrial mobile channel and satel-
`lite mobile channel, fading and multipath interference are caused by reflections from
`surrounding buildings and terrains.
`In addition, the relative motion between the
`transmitter and receiver results in random frequency modulation in the signal due
`to different Doppler shifts on each of the multipath components. The motion of
`surrounding objects. such as vehicles, also induces a time-varying Doppler shifl on
`multipath component. However, if the surrounding objects move at a speed less than
`the mobile unit. their effect can be ignored [2].
`Fading and multipath interference also exist in fixed LOS microwave links [3]-
`On clear. calm summer evenings. normal atmospheric turbulence is minimal. The
`troposphere stratifies with inhomogeneous temperature and moisture distributions.
`Layering of the lower atmosphere creates sharp refractive index gradients which in
`turn create multiple signal paths with different relative amplitudes and delays.
`Fading causes amplitude fluctuations and phase variations in received signals.
`Multipath causes intersymbol interference. Doppler shift causes carrier frequency
`drift and signal bandwidth spread. All these lead to performances degradation of
`modulations. Analysis of modulation performances in fading channels is given in
`Chapter I0 where characteristics of fading channels will be discussed in more detail.
`
`I.3
`
`BASIC MODULATION METHODS
`
`Digital modulation is a process that impresses a digital symbol onto a signal suitable
`for transmission. For short distance transmissions, baseband modulation is usually
`
`used. Baseband modulation is often called line coding. A sequence of digital sym-
`bols are used to create a square pulse waveform with certain features which represent
`each type of symbol without ambiguity so that they can be recovered upon reception.
`These features are variations of pulse amplitude, pulse width. and pulse position.
`Figure 1.3 shows several baseband modulation waveforms. The first one is the non-
`return to zero-level (N RZ-L) modulation which represents a symbol I by a positive
`
`Page 20 of217
`
`Page 20 of 217
`
`

`

`8
`
`Digital Modulation Techniques
`
`(a) NRZ-L
`
`l
`
`0
`
`l
`
`I
`
`l
`
`0
`
`0
`
`l
`
`-A
`
`(b) Unipolar RZ
`
`A
`
`(c) Bi-Q-L (Manchester)
`A
`
`-A
`
`Figure 1.3 Baseband digital modulation examples.
`
`square pulse with length T and a symbol 0 by a negative square pulse with length T.
`The second one is the unipolar retum to zero modulation with a positive pulse of T0
`for symbol l and nothing for 0. The third is the biphase level or Manchester. alter
`its inventor, modulation which uses a waveform consisting of a positive first-half T
`pulse and a negative second-half T pulse for l and a reversed waveform for 0. These
`and other baseband schemes will be discussed in detail in Chapter 2.
`For long distance and wireless transmissions. bandpass modulation is usually
`used. Bandpass modulation is also called carrier modulation. A sequence of dig-
`ital symbols are used to alter the parameters of a high-frequency sinusoidal signal
`called carrier.
`It is well known that a sinusoidal signal has three parameters: am-
`plitude, frequency, and phase. Thus amplitude modulation. frequency modulation.
`and phase modulation are the three basic modulation methods in passband modula-
`tion. Figure 1.4 shows three basic binary carrier modulations. They are amplitude
`shifl keying (ASK). frequency shift keying (FSK), and phase shift keying (PSK). ln
`ASK, the modulator puts out a burst of carrier for every symbol I. and no signal
`for every symbol 0. This scheme is also called on-ofi' keying (00K). In a general
`ASK scheme. the amplitude for symbol 0 is not necessarily 0.
`In FSK. for symbol
`l a higher frequency burst is transmitted and for symbol 0 a lower frequency burst
`
`Page 21 of217
`
`l
`
`Page 21 of 217
`
`

`

`Chapter I
`
`Inlrvducnon
`
`9
`
`ASK
`
`FSK
`
`PSK
`
`Figure l 4 Three basic bandpass modulation schemes.
`
`In PSK, a symbol 1 is transmitted as a burst of carrier
`is transmitted. or vice versa.
`with 0 initial phase while a symbol 0 is transmitted as a burst of carrier with 180°
`initial phases
`Based on these three basic schemes. a variety of modulation schemes can be de-
`rived from their combinations. For example. by combining two binary PSK (BPSK)
`signals with orthogonal carriers a new scheme called quadrature phase shift keying
`(QPSK) can be generated. By modulating both amplitude and phase of the carrier.
`we can obtain a scheme called quadrature amplitude modulation (QAM), etc.
`
`1.4
`
`CRITERIA OF CHOOSINC MODULATION SCHEMES
`
`The essence of digital modern design is to efficiently transmit digital bits and recover
`them from corruptions from the noise and other channel impairments. There are
`three primary criteria of choosing modulation schemes: power efficiency, bandwidth
`
`Page 22 of217
`
`Page 22 of 217
`
`

`

`IO
`
`Digital Modulation Techniques
`
`efficiency, and system complexity.
`
`1.4.1
`
`Power Efficiency
`
`The bit error rate, or bit error probability of a modulation scheme is inversely related
`to Eb/No. the bit energy to noise spectral density ratio. For example. Pb 0f ASK m
`the AWGN channel is given by
`
`
`2E
`
`Pb=Q( Nob)
`
`(1‘10)
`
`where E, is the average bit energy, No is the noise power spectral density (PSDX and
`(2(1) is the Gaussian integral, sometimes referred to as the Q-function. It is defined
`as
`
`0-“)
`Q(x) = /°" LIE—“2dr;
`which is a monotonically decreasing function of 1. Therefore the power efficiency
`of a modulation scheme is defined straightforwardly as the required Eli/Na for a
`certain bit error probability (Pb) over an AWGN channel. Pi, = 10—5 is usually used
`as the reference bit error probability.
`
`1.4.2
`
`Bandwidth Efficiency
`
`The determination of bandwidth efficiency is a bit more complex. The bandwidth
`efficiency is defined as the number of bits per second that can be transmitted In
`one Hertz of system bandwidth. Obviously it depends on the requirement of SYS‘cm
`bandwidth for a certain modulated signal. For example. the one-sided power Specml
`density ofan ASK signal modulated by an equiprobable independent random binary
`sequence is given by
`
`2
`
`mm = A T
`
`A2
`
`varies depending on different criteria. For example" in Figul’:
`al energy concentrates in the band between two nulls,_thuf
`th requrrement seems adequate. Three bandwidth emc'cnc'es
`
`Page 23 of217
`
` ,
`
`‘0'
`
`'——'l
`
`Page 23 of 217
`
`

`

`
`
`Chapter I
`
`Introduction
`
`ll
`
`1
`T
`
`tc -
`
`I
`~
`tc’T
`
`fc
`
`f°++
`
`2
`fo’ T
`
`Figure 1.5 Power spectral density of ASK.
`
`.
`used in the literature are as follows:
`Nyquist Bandwidth Efficiency—Assuming the system uses Nyquis‘ “deal rec'
`tangular) filtering at baseband. which has the minimum bandwidth required for in-
`tersymbol interference-free transmission of digital signals, then the bandWidth at
`baseband is 0_ 512,, R3 is the symbol rate, and the bandwidth at carrier frequency
`is W = R,. Since R, : lib/1082 M, Rb = bit rate, for M-al')’ modulation, the
`bandwidth efficiency is
`
`Rb/W = logz M
`
`(”2)
`
`Null-to—Null Bandwidth Efficiency—For modulation schemes that have power
`density spectral nulls such as the one of ASK in Figure 1.5, defining the bandwidth
`as the width of the main spectral lobe is a convenient way of bandwidth definition.
`Percentage Bandwidth Efficiency—If the spectrum of the modulated signal
`does not have nulls, as in general continuous phase modulation (CPM), null-to—null
`bandwidth no longer exists. In this case. energy percentage bandwidth may be used.
`Usually 99% is used, even though other percentages (e.g., 90%, 95%) are also Used'
`
`1.4.3
`
`System Complexity
`
`System complexity refers to the amount of circuits involved and the technical dif-
`ficu't)’ 0f the system. Associated with the system complexity is the COSt 0f manu—
`
`Page 24 of217
`
`
`
`Page 24 of 217
`
`

`

`l2
`
`Digital Modulation "Techniques
`
`c0"
`
`. r conce
`rse a map
`
`"
`
`.
`in choosmg a mo
`
`facturing, which is of
`dulation tec
`hnique'
`-
`Usually the demodul
`oherent dem°d“'?'
`tor is much more co
`ator is more complex than the modulalgch cmicr recovery is
`mplex than noncoherem demodulatorl orimms like the Viterbi
`required. For some demodulation methOdS' 5°phisnca-Ed :rgnpafison‘
`algorithm isrequired. Allthesearebasis forComplexfl)’:vstem complexi‘)’ are the
`Since powar efiiciency, bandwidth efficiency, andwi'll always pay attention to
`main criteria ofchoosing a modulation teChnigue’ we tofthe book-
`them in the analysis ofmodulation techniques m the res
`d a scriptive
`t.s
`oveavuaworDIGITALM0DULATIONs
`To provide the reader with an overview, we "St-film:fzreiziaT;ble "l and miss:
`names ofvarious digital modulations that we w“ c oftheSchemescanbeSiencan
`them inarelationshiptreediagram inFigure l'6‘ some
`e differential encoding
`from morethan one “parent“ scheme. The “nameswsgoherenilydemOdula‘ed are
`beusedarelabeledbyletterDandthosethatcanbeta,demodula‘ed'
`.
`-
`t
`two
`labeledwithaletterN.Allschemescanbewhere“
`hetree are classified in o
`.
`The modulation schemes listed in ‘he “ableand‘envelope- Underconstfll“ el"t
`large categories: constant envelope and nonconswlgt and CPM- Under nonconslfln
`velope class, there are three subclasses: FSK' PS '
`envelope class.
`there are three subclasses: ASK. QAM. and 0th
`lope modulations.
`Among the listed schemes, ASK. PSK° 3:323:33 s:hemes. The advanced
`MSK. GMSK, CPM, MHPM, andQAM.etc.
`.
`hemeS-
`.
`schemesarevariationsandcombinations021thes:?t:l:|:cf°" communiC3‘_'°“ 3:51:11:
`whoihxvgte‘fxpii‘gtSrspneiust operate in the nonlincaEEfiEy. AnexampleISthe
`1
`class is genera y
`.
`-
`0f the mpu
`.
`characteristic inordertoachievemilxi')“.uma:£::§f:lotettmuni°a‘i°ns- Bowen:?.m!:;
`TX;(ligalzegclhinlasvi:Eltzzltzfareinappropriatefor'Szlggrgfimes. BinaryFSK
`-
`Iifier m 58
`-
`licatlon st
`lgiaveverylowbandwidthefi‘tciency incomparisonWl‘tion cellularsystems. AMPS
`isused inthe low-ratecontrol channels offirst gageguropean total accesscammt;
`(advance mobile phone service ofUS.) and ETAfC AMPS and 8 Kbps for E‘IAC. .
`nication system). The data rates are l0 KbPS 01:8K and MSK have been “53“ m
`The PSKschemes, including BPSK, QPSK. 0Q
`'
`-d 180° abrupt
`satellitecommugglzu‘gvsg’rsthesnpsecialattentionduetoitsabiltlyge‘ajviz'digimlmobile
`h 35:52::chenalbledifferentialdemodulation. “11ml;bfsgDC)system.
`scalar systems such as the United States digital CC ‘1
`
`cHEMEs
`
`. fonS an
`
`e
`
`er noncoltswnt en
`
`ve-
`
`.
`b sic modulations
`
`and
`
`Page 25 of 217
`
`

`

`Chapter I
`
`Introduction
`
`13
`
`Abbreviation
`
`AltcmaIeAbbr
`
`-
`
`;
`
`
`Frequency Shifl Keying (FSk)
`E- Binary Frequency Shift Keying
`— M-ary Frequency Shifl Keying
`
`
`
`
`“——
`manna-—
`
`———
`m— M-ary Pm: Shift Keying
`
`Continuous Phase Modulnions (CPM)
`
`
`
`
`
`
`Single-h (modulation index) Phase Modulation
`ulii-h Phase Modulation
`
`
`
`iU
`
`!83'5
`
`2°82'U7:” (n3
`
`Table l.l Digital modulation schemes (Abbt.=Abbrevietion).
`
`Page 26 of217
`
`Page 26 of 217
`
`

`

`14
`
`Digital Modulation Techniques
`
`Digital Modulations
`
`Constant Envelope
`
`Nonconstam Envelope
`
`m m
`BFSKIIIW
`
`(D)
`
`IREC
`(CPFSK
`.
`_
`. smusondal
`‘h=0.5
`: pulse-shaping
`.
`—>
`.............. MSK
`- ........................ mm
`
`L-l
`
`$
`
`LRC
`
`LSRC
`
`m
`
`I-
`
`TS
`OQPSK
`
`SQAM
`
`m
`
`m
`
`W ""0?“
`.
`(D)
`I
`'
`:
`u
`
`I :
`
`h=0 s —>
`
`(D)
`
`(N)
`
`Can be difl’erentially encoded and decoded
`
`Can be noncohctcntly detected
`
`Figure L6 Digital Modulation Trcc~ Aflcr [4].
`
`Page 27 of217
`
`Page 27 of 217
`
`

`

`Chapter I
`
`Introduction
`
`15
`
`The PSK schemes have constant envelope but discontinuous phase transitions
`from symbol to symbol. The CPM schemes have not only constant envelope, but also
`continuous phase transitions. Thus they have less side lobe energy in their spectra
`in comparison with the PSK schemes. The CPM class includes LREC. LRC. LSRC.
`GMSK, and TFM. Their difi’erences lie in their different frequency pulses which are
`reflected in their names. For example. LREC means the frequency pulse is a rectan-
`gular pulse with a length of L symbol periods. MSK and GMSK are two important
`schemes in C PM class. MSK is a special case of C PFSK, but it also can be derived
`from OQPSK with extra sinusoidal pulse-shaping. MSK has excellent power and
`bandwidth efficiency. its modulator and demodulator are also not too complex. MSK
`has been used in NASA‘s Advanced Communication Technology Satellite (ACTS).
`GMSK has a Gaussian frequency pulse. Thus it can achieve even better bandwidth
`efficiency than MSK. GMSK is used in the US cellular digital packet data (CDPD)
`system and European GSM (global system for mobile communication) system.
`MHPM is worth special attention since it has better error performance than
`single-h CPM by cyclically varying the modulation index h.
`The generic nonconstant envelope schemes, such as ASK and QAM. are gen-
`erally not suitable for systems with nonlinear power amplifiers. However QAM.
`with a large signal constellation. can achieve extremely high bandwidth efi'iciency.
`QAM has been widely used in modems used in telephone networks, such as computer
`modems. QAM can even be considered for satellite systems. In this case, however.
`back-off in TW'llA's input and output power must be provided to ensure the linearity
`of the power amplifier
`The third class under nonconstant envelope modulation includes quite a few
`schemes. These are primarily designed for satellite applications since they have very
`good bandwidth efficiency and the amplitude variation is minimal. All of them ex-
`cept QQPSK are based on 2T, amplitude pulse shaping and their modulator structures
`are similar to that of OQPSK. The scheme Q2PSK is based on four orthogonal car-
`riers.
`
`References
`
`[I]
`
`[2]
`
`[3]
`
`[4]
`
`Proakis. 1., Digital Communication. New Ybrk: McGraw-Hill. 1983.
`
`Rappaport. T.. "ire/es: Communications: Principles and Practice. Upper Saddle River. New
`Jersey: Prentice Hall. l996.
`
`Siller. C .. “Multipath propagation.“ IEEE Communications Magazine. vol. 22. no.2. Feb. I984.
`pp. 6-l5.
`
`Xiong. F.."Modem techniques in satellite communications.” IEEE Communications Magazine.
`vol. 32. no.8. August I994, pp. 84-98.
`
`Page 28 of217
`
`Page 28 of 217
`
`

`

`l22
`
`Digiul Modulation 1mm
`
`
`
`
`costly, most of FSK receivus use noncoherem demodulliou.
`.,
`
`I'ls“New"“mu”efl’Ofpetformanoeofthcnoneohetutrocdxvdl
`tomatofthecohmiona. However thedegmhuontsonlyl
`4‘
`
`exprasiomandcurvcs fordremprobabilitiesueahoptw
`Finally we explored other possible demodulation. The
`‘
`Intorissimpleandefi'lcient. ltisevenbenermmew- '
`
`ulator fat BFSK.
`
`[I] MILK. M1. Sill. 'smormm'uuww‘}
`
`Judy-August. 1965. pp. "65-1189.
`
`
`
`References
`
`’ .'_>
`
`.
`3!
`
`[21 MIL-unnm. mmama—m f
`memmvol. l8.no.....4Augul970pp29$-300
`
`[3] MILE. “mumormmmmwmm'm
`vol29..nollNou|98l...pp1634-l6‘3
`'
`
`[4] M1.E.‘11wyofammfoedWFM.'hRS)uu-W
`I966. pp. fill-1535.
`
`Selocud Blbllognply
`
`
`
`
`, f";
`.
`
`o ma.uw.wmwmcmw.mu.mfik '~ "l
`o mms..mmcmmmmunyammlsfi;"
`o sag]..'mdmmkvdmwmmdwm -.
`MCMMWmIJMJMIWSm4M
`Skin. 3. mnemm. FMadWau.W
`Prentice Hfll. I988.
`
`0
`
`
`
`
`o smmn.x.pmunmmmm.wwmmmu a
`1993.
`
`'
`
`0
`
`I
`
`Suite. E. 0.. ‘Idcdbhl'ypullemiuhnbyAMmdFM'MM
`v01. 38. Nov. I939. pp ”574426.
`\h'n'euJ‘LL,Wmmmmwmmmamw
`Smlmlm
`9
`
`
`
`Page 29 onI%
`
`Page 29 of 217
`
`

`

`Chapter 4
`
`Phase Shift Keying
`
`Phase shift keying (PSK) is a large class of digital modulation schemes. PSK is
`widely used in the communication industry. In this chapter we study each PSK mod-
`ulation scheme in a single section where signal description, power spectral density.
`modulator/demodulator block diagrams, and receiver error performance are all in-
`cluded. First we present coherent binary PSK(BPSK) and its noncoherent coun-
`terpart, differential BPSK (DBPSK), in Sections 4.l and 4.2. Then we discuss in
`Section 4.3 M-ary PSK (MPSK) and its PSD in Section 4.4. The noncoherent ver—
`sion, differential MPSK (DMPSK) is treated in Section 4.5. Vie discuss in great detail
`quadrature PSK (QPSK) and differential QPSK (DQPSK) in Sections 4.6 and 4.7, re-
`spectively. Section 4.8 is a brief discussion of offset QPSK (OQPSK). An important
`variation of QPSK, the 7r/4—DQPSK which has been designated as the American
`standard of the second-generation cellular mobile communications, is given in Sec-
`tion 4.9. Section 4.10 is devoted to carrier and clock recovery. Finally. we summarize
`the chapter with Section 4. l l.
`
`4.1
`
`BINARY PSK
`
`Binary data are represented by two signals with different phases in BPSK. Typically
`these two phases are 0 and 7r. the signals are
`
`31(t) = Acos21rfct. OStST.
`
`for!
`
`32(t) = —A00321rfct. ogtsT.
`
`for0
`
`(4.1)
`
`These signals are called ann'padal. The reason that they are chosen is that they have
`a correlation coefficient of — l, which leads to the minimum error proba

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket