throbber

`
`Exhibit 1018
`
`US. Patent NO. 6,108,388
`
`Exhibit 1018
`U.S. Patent No. 6,108,388
`
`

`

` i l1
`
`Library of Congress Cataloging-in-Publication Data
`
`SKLAR, BERNARD (date)
`Digital communications.
`
`Bibliography: 13.
`Includes index.
`1. Title.
`1. Digital communications.
`TK5103.7.SSS
`1988
`621.38’0413
`ISBN 0-13-211939-0
`
`87-1316
`
`..-.-mi
`
`Editorial/production supervision and
`interior design: Reynold Rieger
`Cover design: Wanda Lubelska Design
`Manufacturing buyers: Gordon Osbourne and Paula Beneyento
`
`._
`
`© 1988 by Prentice Hall
`A Division of Simon & Schuster
`
`Englewood Cliffs, New Jersey 07632
`
`All rights reserved. No part of this book may be
`reproduced, in any form or by any means,
`without permission in writing from the publisher.
`
`Printed in the United States of America
`
`10987654321
`
`ISBN U-lB-Ell‘lB‘l-U DES
`
`Prentice-Hall International (UK) Limited, London
`Prentice-Hall of Australia Pty. Limited, Sydney
`Prentice—Hall Canada Inc., Toronto
`Prentice—Hall Hispanoamericana, S.A., Mexico
`Prentice-Hall of India Private Limited, New Delhi
`Prentice-Hall of Japan, Inc., Tokyo
`Simon & Schuster Asia Pte. Ltd., Singapore
`Editora Prentice-Hall do Brasil, Ltda., Rio de Janeiro
`
`

`

`
`
`DIGITAL
`
`COMMUNICATIONS
`
`Englewood Cliffs, New Jersey 07632
`
`Fufiémefialfi and Apglicatiens
`
`BERNARD SKLéR
`
`The Aerospace Corporation, El Segundo, California
`and
`
`University of California, Los Angeles
`
`PRENTICE HALL
`
`

`

`1
`
`Contents
`
`PREFACE
`
`xxi
`
`SIGNALS AND SPECTRA
`
`4 9
`
`11
`
`17
`
`Digital Communication Signal Processing,
`1.1.1 Why Digital?,
`3
`1.1.2
`Typical Block Diagram and Transformations,
`1.1.3 Basic Digital Communication Nomenclature,
`1.1.4 Digital versus Analog Performance Criteria,
`Classification of Signals,
`11
`1.2.1 Deterministic and Random Signals,
`1.2.2
`Periodic and Nonperiodic Signals,
`1.2.3 Analog and Discrete Signals,
`12
`1.2.4
`Energy and Power Signals,
`1.2.5
`The Unit Impulse Function,
`
`3
`
`11
`12
`
`12
`13
`
`1.1
`
`1.2
`
`1.3
`
`1.5
`
`14
`Spectral Density,
`1.3.1'
`Energy Spectral Density,
`1.3.2
`Power Spectral Density,
`1.4 Autocorrelation,
`17
`17
`1.4.1 Aatocorrelation of an Energy Signal,
`1.4.2 Aatocorrelation of a Periodic (Power) Signal,
`Random Signals,
`18
`1.5.]
`Random Variables,
`1.5.2
`Random Processes,
`
`14
`15
`
`18
`20
`
`
`
`

`

`22
`Time Averaging and Ergodicity,
`1.5.3
`Power Spectral Density ofa Random Process,
`1.5.4
`1.5.5 Noise in Communication Systems,
`27
`Signal Transmission through Linear Systems,
`1.6.1
`Impulse Response,
`31
`31
`1.6.2
`Frequency Transfer Function,
`32
`1.6.3 Distortionless Transmission,
`1.6.4
`Signals, Circuits, and Spectra,
`Bandwidth of Digital Data,
`41
`1.7.1
`Baseband versus Bandpass,
`1.7.2
`The Bandwidth Dilemma,
`
`38
`
`41
`
`43
`
`23
`
`30
`
`Conclusion,
`References,
`Problems,
`
`46
`46
`47
`
`1.6
`
`1.7
`
`1.8
`
`2 FORMATTING AND BASEBAND TRANSMISSION
`
`51
`
`54
`Baseband Systems,
`2.1
`Formatting Textual Data (Character Coding),
`2.2
`2.3 Messages, Characters, and Symbols,
`55
`2.3.1
`Example of Messages, Characters, and
`Symbols,
`55
`Formatting Analog Information,
`2.4.1
`The Sampling Theorem,
`2.4.2 Aliasing,
`66
`2.4.3
`Signal Interface for a Digital System,
`
`2.4
`
`59
`
`59
`
`55
`
`69
`
`2.5
`
`2.6
`
`70
`Sources of Corruption,
`2.5.]
`Sampling and Quantizing Effects,
`2.5.2
`Channel Effects,
`71
`2.5.3
`Signal-to-Noise Ratio for Quantized Pulses,
`Pulse Code Modulation,
`‘73
`
`70
`
`72
`
`2.8
`
`2.7 Uniform and Nonuniform Quantization,
`2.7.1
`Statistics of Speech Amplitudes,
`74
`2.7.2 Nonuniform Quantization,
`76
`2.7.3
`Companding Characteristics,
`Baseband Transmission,
`78
`2.8.1 Waveform Representation ofBinary Digits.
`2.8.2
`PCM Waveform Types,
`78
`82
`2.8.3
`Spectral Attributes ofPCM Waveforms,
`2.9 Detection of Binary Signals in Gaussian Noise,
`2.9.1 Maximum Likelihood Receiver Structure,
`2.9.2
`The Matched Filter,
`88
`2.9.3
`Correlation Realization of the Matched Filter.
`2.9.4 Application of the Matched Filter,
`91
`2.9.5
`Error Probability Performance of Binary
`Signaling,
`92
`
`74
`
`77
`
`78
`
`83
`
`85
`
`90
`
`viii
`
`Contents
`
`
`
`#
`
`

`

`“I
`
`2.10 Multilevel Baseband Transmission,
`2.10.1 PCM WordSize,
`97
`
`95
`
`2.11
`
`100
`
`98
`lntersymbol Interference,
`2.11.1 Pulse Shaping to Reduce IS],
`2.11.2 Equalization,
`104
`2.12 Partial Response Signaling,
`2.12.1 Duobinary Signaling,
`2.12.2 Duobinary Decoding,
`2.12.3 Precoding,
`108
`2.12.4 Duobinary Equivalent Transfer Function,
`2.12.5 Comparison of Binary with Duobinary
`Signaling,
`111
`2.12.6 Polybinary Signaling,
`2.13 Conclusion,
`112
`References,
`113
`Problems,
`113
`
`106
`106
`107
`
`112
`
`109
`
`51
`
`3 BANDPASS MODULATION AND DEMODULATION
`
`3.3
`
`118
`3.1 Why Modulate?,
`119
`3.2
`Signals and Noise,
`119
`3.2.1
`Noise in Radio Communication Systems,
`120
`3.2.2
`A Geometric View of Signals and Noise,
`Digital Bandpass Modulation Techniques,
`127
`3.3.1
`Phase Shift Keying,
`130
`130
`3.3.2
`Frequency Shift Keying,
`131
`3.3.3 Amplitude Shift Keying,
`131
`3.3.4 Amplitude Phase Keying,
`3.3.5 Waveform Amplitude Coefficient,
`3.4 Detection of Signals in Gaussian Noise,
`3.4.1 Decision Regions,
`132
`3.4.2
`Correlation Receiver,
`
`132
`132
`
`133
`
`3.5
`
`138
`Coherent Detection,
`3.5.1
`Coherent Detection ofPSK,
`3.5.2
`Sampled Matched Filter,
`139
`3.5.3
`Coherent Detection of Multiple Phase Shift
`Keying,
`142
`Coherent Detection ofFSK,
`3.5.4
`3.6 Noncoherent Detection,
`146
`146
`3.6.1 Detection ofDifferential PSK,
`148
`3.6.2
`Binary Differential PSK Example,
`150
`3.6.3 Noncoherent Detection ofFSK,
`3.6.4 Minimum Required Tone Spacing for Noncoherent
`Orthogonal FSK Signaling,
`152
`
`138
`
`145
`
`“5
`
`Contents
`
`117
`
`ix
`
`
`
`

`

`3.7
`
`3.7.2
`
`3.7.3
`
`3.7.4
`
`3.7.5
`3.7.6
`
`3.9
`
`3.9.4
`
`155
`Error Performance for Binary Systems,
`3.7.1
`Probability of Bit Error for Coherently Detected
`BPSK,
`155
`Probability of Bit Error for Coherently Detected
`Dfierentially Encoded PSK,
`160
`Probability of Bit Error for Coherently Detected
`FSK,
`161
`Probability of Bit Error for Noncoherently Detected
`FSK,
`162
`164
`Probability of Bit Error for DPSK,
`Comparison of Bit Error Performance for Various
`Modulation Types,
`166
`167
`3.8 M-ary Signaling and Performance,
`3.8.1
`Ideal Probability of Bit Error Performance,
`3.8.2 M-ary Signaling,
`167
`170
`3.8.3
`Vectorial View of MPSK Signaling,
`3.8.4 BPSK and QPSK Have the Same Bit Error
`Probability,
`171
`172
`Vectorial View of MFSK Signaling,
`3.8.5
`Symbol Error Performance for M—ary Systems (M > 2),
`3.9.]
`Probability of Symbol Error for MPSK,
`176
`3.9.2
`Probability of Symbol Error for MFSK,
`177
`3.9.3
`Bit Error Probability versus Symbol Error Probability
`for Orthogonal Signals,
`180
`Bit Error Probability versus Symbol Error Probability
`for Multiple Phase Signaling,
`181
`Effects of Intersymbol Interference,
`3.9.5
`3.10 Conclusion,
`182
`References,
`182
`Problems,
`183
`
`167
`
`176
`
`182
`
`i
`
`A
`
`,
`;
`.
`
`4 COMMUNICATIONS LINK ANALYSIS
`
`187
`
`4.1 What the System Link Budget Tells the System
`Engineer,
`188
`189
`The Channel,
`189
`4.2.1
`The Concept ofFree Space,
`4.2.2
`Signal-to-Noise Ratio Degradation,
`4.2.3
`Sources of Signal Loss and Noise,
`Received Signal Power and Noise Power,
`4.3.1
`The Range Equation,
`195
`4.3.2
`Received Signal Power as a Function of
`Frequency,
`199
`Path Loss Is Frequency Dependent,
`Thermal Noise Power,
`202
`
`4.2
`
`4.3
`
`4.3.3
`4.3.4
`
`I90
`190
`195
`
`200
`
`x
`
`Contents
`
`
`
`

`

`4,4
`
`4.6
`
`204
`Link Budget Analysis,
`205
`4.4.1
`Two Eb/No Values ofInterest,
`4.4.2
`Link Budgets Are Typically Calculated in
`Decibels,
`206
`4.4.3 How Much Link Margin Is Enough?,
`4.4.4
`Link Availability,
`209
`4.5 Noise Figure, Noise Temperature, and System
`Temperature,
`213
`213
`4.5.1 Noise Figure,
`4.5.2 Noise Temperature,
`4.5.3
`Line Loss,
`216
`4.5.4
`Composite Noise Figure and Composite Noise
`Temperature,
`218
`System Efi‘ective Temperature,
`4.5.5
`Sky Noise Temperature,
`224
`4.5.6
`Sample Link Analysis,
`228
`228
`4.6.]
`Link Budget Details,
`4.6.2
`Receiver Figure-of-Merit,
`4.6.3
`Recieved Isotropic Power,
`
`207
`
`215
`
`220
`
`230
`231
`
`4.7
`
`4.8
`4.9
`
`232
`Satellite Repeaters,
`232
`4.7.1 Nonregenerative Repeaters,
`4.7.2 Nonlinear Repeater Amplifiers,
`System Trade-Offs,
`238
`Conclusion,
`239
`References,
`239
`Problems,
`240
`
`236
`
`5 CHANNEL CODING: PART 1
`
`245
`
`246
`5.1 Waveform Coding,
`5.1.1 Antipodal and Orthogonal Signals,
`5.1.2
`M—ary Signaling,
`249
`5.1.3 Waveform Coding with Correlation Detection,
`5.1.4 Orthogonal Codes,
`251
`5.1.5
`Biorthogonal Codes,
`255
`5.1.6
`Transorthogonal (Simplex) Codes,
`Types of Error Control,
`258
`258
`5.2.1
`Terminal Connectivity,
`5.2.2 Automatic Repeat Request,
`Structured Sequences,
`260
`5.3.1
`Channel Models,
`261
`5.3.2
`Code Rate and Redundancy,
`5.3.3
`Parity-Check Codes,
`263
`5.3.4
`Coding Gain,
`266
`
`247
`
`257
`
`249
`
`259
`
`263
`
`5.2
`
`5 .3
`
`7
`
`is
`
`Contents
`
`xi
`
`
`
`

`

`270
`
`269
`Linear Block Codes,
`269
`5.4.1
`Vector Spaces,
`5.4.2
`Vector Subspaces,
`.
`A (6, 3) Linear Block Code Example,
`5.4.3
`5.4.4 Generator Matrix,
`272
`5.4.5
`Systematic Linear Block Codes,
`5.4.6
`Parity-Check Matrix,
`275
`5.4.7
`Syndrome Testing,
`276
`5.4.8
`Error Correction,
`277
`
`273
`
`271
`
`280
`Coding Strength,
`280
`5.5.1 Weight and Distance of Binary Vectors,
`5.5.2 Minimum Distance of a Linear Code,
`281
`5.5.3
`Error Detection and Correction,
`281
`5.5.4 Visualization of a 6-Tuple Space,
`285
`5.5.5
`Erasure Correction,
`287
`
`288
`Cyclic Codes,
`5 .6.1 Algebraic Structure of Cyclic Codes,
`5.6.2
`Binary Cyclic Code Properties,
`290
`5.6.3
`Encoding in Systematic Form,
`290
`5.6.4
`Circuit for Dividing Polynomials,
`292
`5.6.5
`Systematic Encoding with an (n — k)-Stage Shift
`Register,
`294
`Error Detection with an (n — k)-Stage Shift
`Register,
`296
`
`5.6.6
`
`288
`
`5.4
`
`5.5
`
`5.6
`
`
`
`I I
`
`‘
`
`E i
`
`5.7 Well-Known Block Codes,
`5 .7.1 Hamming Codes,
`298
`5.7.2
`Extended Golay Code,
`5.7.3 BCH Codes,
`301
`5.7.4
`Reed—Solomon Codes,
`Conclusion,
`308
`References,
`308
`Problems,
`309
`
`5.8
`
`298
`
`301
`
`304
`
`6 CHANNEL CODING: PART 2
`
`314
`
`6.1
`6.2
`
`6.3
`
`xii
`
`315
`Convolutional Encoding,
`Convolutional Encoder Representation,
`6.2.1
`Connection Representation,
`318
`6.2.2
`State Representation and the State Diagram,
`6.2.3
`The Tree Diagram,
`324
`6.2.4
`The Trellis Diagram,
`326
`Formulation of the Convolutional Decoding Problem,
`6.3.] Maximum Likelihood Decoding,
`327
`6.3.2
`Channel Models: Hard versus Soft Decisions,
`6.3.3
`The Viterbi Convolutional Decoding Algorithm,
`
`317
`
`322
`
`327
`
`329
`333
`
`Contents
`
`

`

`397
`Bandwidth—Limited Systems,
`7.7
`397
`7.8 Modulation and Coding Trade-Offs,
`399
`7.9
`Bandwidth-Efficient Modulations,
`7.9.1
`QPSK and Offset QPSK Signaling.
`7.9.2 Minimum Shift Keying,
`403
`407
`7.9.3 Quadrature Amplitude Modulation,
`7.10 Modulation and Coding for Bandlimited Channels,
`7.10.] Commercial Telephone Modems,
`411
`7.10.2 Signal Constellation Boundaries,
`412
`7.10.3 Higher-Dimensional Signal Constellations,
`7.10.4 Higher-Density Lattice Structures,
`415
`7.10.5 Combined-Gain: N-Sphere Mapping and Dense
`Lattice,
`416
`7.10.6 Trellis—Coded Modulation,
`7.10.7 Trellis-Coding Example,
`7.11 Conclusion,
`424
`References,
`425
`Problems,
`426
`
`399
`
`410
`
`412
`
`'
`
`.
`
`'
`l
`I
`3
`3
`
`417
`420
`
`8 SYNCHRONIZATION
`Maurice A. King, Ir.
`
`429
`
`8.]
`
`8.2
`
`Synchronization in the Context of Digital
`Communications,
`430
`430
`8.1.1 What It Means to Be Synchronized,
`8.1.2
`Costs versus Benefits of Synchronization
`Levels,
`432
`434
`Receiver Synchronization,
`8.2.1
`Coherent Systems: Phase-Locked Loops,
`8.2.2
`Symbol Synchronization,
`453
`8.2.3
`Frame Synchronization,
`460
`8.3 Network Synchronization,
`464
`8.3 .1
`Open—Loop Transmitter Synchronization,
`8.3.2
`Closed-Loop Transmitter Synchronization,
`Conclusion,
`470
`References,
`471
`Problems,
`472
`
`8.4
`
`434
`
`465
`468
`
`g MULTIPLEXING AND MULTIPLE ACCESS
`
`475
`
`9.1
`
`Allocation of the Communciations Resource,
`9.1.1
`Frequency—Division Multiplexing/Multiple
`Access,
`478
`
`476
`
`xiv
`
`Contents
`
`
`
`

`

`9.1.2
`9.1.3
`9.1.4
`
`9.1.5
`9.1.6
`
`484
`487
`
`Time-Division Multiplexing/Multiple Access,
`Communications Resource Channelization,
`Performance Comparison of FDMA and
`TDMA,
`488
`491
`Code-Division Multiple Access,
`Space-Division and Polarization-Division Multiple
`Access,
`493
`9.2 Multiple Access Communications System and
`Architecture,
`495
`496
`9.2.1 Multiple Access Information Flow,
`9.2.2 Demand-Assignment Multiple Access, 497
`9.3 Access Algorithms,
`498
`9.3.1 ALOHA,
`498
`500
`9.3.2
`Slotted ALOHA,
`502
`9.3.3
`Reservation-ALOHA,
`9.3.4
`Performance Comparison of S-ALOHA
`and R-ALOHA,
`503
`
`505
`Polling Techniques,
`9.3.5
`9.4 Multiple Access Techniques Employed with -
`INTELSAT,
`507
`9.4.1
`Preassigned FDM/FM/FDMA 0r MCPC
`Operation,
`508
`9.4.2 MCPC Modes ofAccessing an INTELSAT
`Satellite,
`510
`SPADE Operation, 51]
`9.4.3
`TDMA in INTELSAT,
`516
`9.4.4
`523
`Satellite-Switched TDMA in INTELSAT,
`9.4.5
`9.5 Multiple Access Techniques for Local Area Networks,
`9.5.1
`Carrier-Sense Multiple Access Networks,
`526
`9.5.2
`Token-Ring Networks,
`528
`9.5.3
`Performance Comparison of CSMA/CD
`and Token-Ring Networks,
`530
`Conclusion,
`531
`References,
`532
`Problems,
`533
`
`9.6
`
`526
`
`‘10 SPREAD=SPECTRUM TECHNIQUES
`
`10.1
`
`537
`Spread-Spectrum Overview,
`10.1.1
`The Beneficial Attributes of Spread-Spectrum
`Systems,
`538
`10.1.2 Model for Spread-Spectrum Interference
`Rejection,
`542
`A Catalog of Spreading Techniques,
`10.1.3
`10.1.4 Historical Background,
`544
`
`543
`
`Contents
`
`XV
`
`536
`
`

`

`10.2
`
`10.3
`
`10.4
`
`10.5
`
`10.6
`
`10.7
`
`10.8
`
`549
`
`557
`
`552
`
`559
`560
`
`546
`Pseudonoise Sequences,
`546
`10.2.1
`Randomness Properties,
`547
`10.2.2
`Shift Register Sequences,
`548
`10.2.3
`PN Autocorrelation Function,
`Direct-Sequence Spread-Spectrum Systems,
`10.3.1
`Example ofDirect Sequencing,
`550
`10.3.2
`Processing Gain and Performance,
`Frequency Hopping Systems,
`555
`10.4.1
`Frequency Hopping Example,
`10.4.2
`Robustness,
`558
`10.4.3
`Frequency Hopping with Diversity,
`10.4.4
`Fast Hopping versus Slow Hopping,
`10.4.5
`FFH/MFSK Demodulator,
`562
`Synchronization,
`562
`10.5.1 Acquisition.
`563
`10.5.2
`Tracking,
`568
`571
`Spread-Spectrum Applications,
`10.6.1
`Code-Division Multiple Access,
`10.6.2 Multipath Channels,
`573
`10.6.3
`The Jamming Game,
`574
`Further Jamming Considerations,
`10.7.1 Broadband Noise Jamming,
`10.7.2
`Partial-Band Noise Jamming,
`10.7.3 Multiple-Tone Jamming,
`583
`10.7.4
`Pulse Jamming,
`584
`10.7.5 Repeat-Back Jamming,
`10.7.6
`BLADES System,
`588
`Conclusion,
`589
`References,
`589
`Problems,
`591
`
`571
`
`579
`579
`581
`
`586
`
`SOURCE CODING
`
`Fredric I. Harris
`
`595
`
`596
`601
`
`596
`Sources,
`11.1.1
`Discrete Sources,
`11.1.2 Waveform Sources,
`Amplitude Quantizing,
`603
`11.2.1
`Quantizing Noise,
`605
`11.2.2
`Uniform Quantizing,
`608
`11.2.3
`Saturation,
`611
`11.2.4 Dithering,
`614
`617
`11.2.5
`Nonuniform Quantizing,
`Differential Pulse Code Modulation,
`11.3.1
`One-Tap Prediction,
`630
`11.3.2
`N—Tap Prediction,
`631
`
`627
`
`11.1
`
`11.2
`
`11.3
`
`xvi
`
`Contents
`
` 11
`
`

`

`11.4
`
`11.5
`
`11.6
`
`11.7
`
`11.3.3 Delta Modulation,
`
`633
`
`639
`
`11.3.4 Adaptive Prediction,
`Block Coding,
`643
`643
`11.4.1
`Vector Quantizing,
`645
`11.4.2
`Transform Coding,
`11.4.3
`Quantization for Transform Coding,
`11.4.4
`Subband Coding,
`647
`
`647
`
`Synthesis/Analysis Coding,
`11.5.1
`Vocoders,
`650
`11.5.2
`Linear Predictive Coding,
`
`649
`
`Redundancy-Reducing Coding,
`11.6.1
`Properties ofCodes,
`655
`11.6.2
`Hufiman Code,
`657
`11.6.3
`Run-Length Codes,
`Conclusion,
`663
`References,
`663
`Problems,
`664
`
`660
`
`653
`
`653
`
`_.
`-"
`'
`
`12 ENCRYPTION AND DECRYPTION
`
`668
`
`669
`12.1 Models, Goals, and Early Cipher Systems,
`12.1.1
`A Model of the Encryption and Decryption
`Process,
`669
`System Goals,
`Classic Threats,
`Classic Ciphers,
`
`12.1.2
`12.1.3
`12.1.4
`
`671
`671
`672
`
`12.2
`
`12.3
`
`12.4
`
`The Secrecy of a Cipher System,
`12.2.1
`Perfect Secrecy,
`675
`678
`12.2.2
`Entropy and Equivocation,
`12.2.3
`Rate ofa Language and Redundancy,
`12.2.4
`Unicity Distance and Ideal Secrecy,
`Practical Security,
`683
`12.3.1
`Confusion and Diffusion,
`12.3.2
`Substitution,
`683
`12.3.3
`Permutation,
`685
`686
`12.3.4
`Product Cipher System,
`12.3.5
`The Data Encryption Standard,
`
`675
`
`683
`
`680
`680
`
`687
`
`12.4.2
`
`694
`Stream Encryption,
`12.4.1
`Example of Key Generation Using a Linear
`Feedback Shift Register,
`694
`Vulnerabilities of Linear Feedback Shift
`Registers,
`695
`Synchronous and SelfSynchronous Stream
`Encryption Systems,
`697
`
`12.4.3
`
`Contents
`
`xvii
`
`
`
`

`

`.1
`
`.4”.
`
`E i
`
`,i
`
`:
`
`%
`
`12.5
`
`12.6
`
`12.5.2
`12.5.3
`12.5.4
`12.5.5
`
`698
`Public Key Cryptosystems,
`12.5 .1
`Signature Authentication Using a Public Key
`Cryptosystem,
`699
`700
`A Trapdoor One-Way Function,
`The Rivest—Shamir—Adelman Scheme,
`The Knapsack Problem,
`703
`A Public Key Cryptosystem Based on a Trapdoor
`Knapsack,
`705
`Conclusion,
`707
`References,
`707
`Problems,
`708
`
`70]
`
`A A REVIEW OF FOURIER TECHNIQUES
`
`710
`
`A]
`A2
`
`A.3
`
`A.4
`
`A.5
`
`A.6
`
`710
`Signals, Spectra, and Linear Systems,
`Fourier Techniques for Linear System Analysis,
`A.2.1
`Fourier Series Transform,
`713
`A.2.2
`Spectrum of a Pulse Train,
`716
`A.2.3
`Fourier Integral Transform,
`719
`Fourier Transform Properties,
`720
`A.3.1
`Time Shifting Property,
`720
`A.3 .2
`Frequency Shifting Property,
`Useful Functions,
`721
`A.4.1
`Unit Impulse Function,
`A.4.2
`Spectrum of a Sinusoid,
`Convolution,
`722
`A5 .1
`Graphical Illustration of Convolution,
`A5 .2
`Time Convolution Property,
`726
`726
`A5.3
`Frequency Convolution Property,
`A.5 .4
`Convolution of a Function with a Unit
`Impulse,
`728
`- Demodulation Application of Convolution,
`A5 .5
`Tables of Fourier Transforms and Operations,
`References,
`732
`
`720
`
`72]
`721
`
`711
`
`729
`731
`
`726
`
`
`
`B FUNDAMENTALS OF STATISTICAL DECISION
`THEORY
`
`733
`Bayes’ Theorem,
`3.1 .1
`Discrete Form of Bayes’ Theorem,
`3.1.2 Mixed Farm of Bayes’ Theorem,
`
`734
`736
`
`B.1
`
`xvlii
`
`733
`
`Contents
`
`
`
`

`

`32
`
`3.?»
`
`738
`Decision Theory,
`3.2.1
`Components of the Decision Theory Problem,
`3.2.2
`The Likelihood Ratio Test and the Maximum
`A Posteriori Criterion,
`739
`3.2.3
`The Maximum Likelihood Criterion,
`Signal Detection Example,
`740
`3.3.1
`The Maximum Likelihood Binary Decision,
`B3 .2
`Probability of Bit Error,
`741
`References ,
`743
`
`739
`
`740
`
`738
`
`RESPONSE OF CORRELATORS TO WHITE NOISE
`
`OFTEN USED IDENTITIES
`
`A CONVOLUTIONAL ENCODER/DECODER
`COMPUTER PROGRAM
`
`LIST OF SYMBOLS
`
`INDEX
`
`Contents
`
`744
`
`746
`
`748
`
`759
`
`765
`
`xix
`
`

`

`fig
`
`CEL‘iPTER 1
`
`Signals and Spectra
`
`From other
`sources
`
`
`
`r _ _ ._
`Source
`
`Channel
`
`_____________ ._ _[
`1
`i
`
`Information
`source
`
`llIl
`
`Digital
`input
`mi
`
`
`
`Bit
`Synch-
`stream
`Digital
`
`ronization I waveform
`
`
`
`Information
`sink
`
`Channel
`bits
`
`__
`
`
`|
`l
`_ _ _ _ _ _ _ _ _l
`
`Optional
`
`D Essential
`
`1
`
`To other
`destinations
`
`
`
`:
`}|
`I
`
`
`
`Digital
`
`

`

`1.1 DI
`
`offs among basic system parameters such as signal-to—noise ratio (SNR), proba-
`
`
`
`

`

`from an infinite variety of waveform shapes with theoretically infinite resolution.
`In a DCS, the objective at the receiver is not to reproduce a transmitted waveform
`with precision; it is, instead, to determine from a noise-perturbed signal which
`waveform from the finite set of waveforms had been sent by the transmitter. An
`important measure of system performance in a DCS is the probability of error
`(PE)-
`
`1 1 DlGITAL COMMUNICATION SIGNAL PROCESSING
`
`1.1.1 Why Digital?
`
`3
`
`Why are communication systems, military and commercial alike, “going digital” ?
`There are many reasons. The primary advantage is the ease with which digital
`signals, compared to analog signals, are regenerated. Figure 1.1 illustrates an ideal
`binary digital pulse propagating along a transmission line. The shape of the wave-
`form is affected by two basic mechanisms: (1) as all transmission lines and circuits
`have some nonideal transfer function, there is a distorting effect on the ideal pulse;
`and (2) unwanted electrical noise or other interference further distorts the pulse
`waveform. Both of these mechanisms cause the pulse shape to degrade as a func-
`tion of line length, as shown in Figure 1.1. During the time that the transmitted
`pulse can still be reliably identified (before it is degraded to an ambiguous state
`by the transmission line), the pulse is amplified by a digital amplifier that recovers
`its original ideal shape. The pulse is thus “reborn” or regenerated. Circuits that
`perform this function at regular intervals along a transmission system are called
`regenerative repeaters.
`Digital circuits are less subject to distortion and interference than are analog
`circuits. Since binary digital circuits operate in one of two states, fully on or fully
`off, to be meaningful a disturbance must be large enough to change the circuit
`operating point from one state to the other. Such two-state operation facilitates
`signal regeneration and thus prevents noise and other disturbances from accu-
`
`Distance 1
`
`Original
`pulse signal
`
`Distance 2
`
`Some signal
`distortion
`
`Distance 3
`
`Distance 4
`
`Distance 5
`
`Degraded
`signal
`
`Signal is badly
`degraded
`
`Amplification
`to regenerate
`pulse
`
`I
`
`1
`2
`3
`4
`5
`
`Propagation distance—>
`
`Figure 1.1 Pulse degradation and regeneration.
`
`Sec. 1.1
`
`Digital Communication Signal Processing
`
`,
`
`'
`
`'
`
`

`

`mulating in transmission, Analog signals, however, are not two-state signals; they
`can take an infinite variety of shapes. With analog circuits, even a small disturb—
`ance can render the reproduced waveform unacceptably distorted. Once the an-
`alog signal is distorted, the distortion cannot be removed by amplification. Since,
`with analog signals, accumulated noise is irrevocably bound to the signal, analog
`signals cannot be completely regenerated. Extremely low error rates producing
`high signal fidelity are possible through error detection and correction with digital
`techniques, but similar procedures are not available with analog.
`There are other important advantages to digital communications. Digital
`circuits are more reliable and can be produced at lower cost than analog circuits.
`Also, digital hardware lends itself to more flexible implementation than analog
`hardware [e.g., microprocessors, digital switching, and large-scale integrated
`(LSI) circuits]. The combining of digital signals using time-division multiplexing
`(TDM) is simpler than the combining of analog signals using frequency-division
`multiplexing (FDM). Different types of digital signals (data, telegraph, telephone,
`television) can be treated as identical signals in transmission and switching—a
`bit is a bit. Also, for convenient switching, digital messages can be handled in
`autonomous groups called packets. Digital techniques lend themselves naturally
`to signal processing functions that protect against interference and jamming, or
`that provide encryption and privacy; such techniques are discussed in Chapters
`10 and 12, respectively. Also, much data communication is computer to computer,
`or digital instrument or terminal to computer. Such digital teraninations are nat-
`urally best served by digital communication links.
`Most system choices entail trade-offs; system options are rarely all good or
`all bad. Thus far we have discussed only the benefits of digital transmission. What
`do you suppose are the costs or liabilities? A major disadvantage of digital trans-
`mission is that it typically requires a greater system bandwidth to communicate
`the same information in a digital format as compared to an analog format. Through-
`out this book we emphasize that bandwidth is a valuable resource, not always
`available. Bandwidth-efficient signaling techniques are discussed in Chapters 2
`and 7. Another cost of digital transmission is that digital detection requires system
`synchronization (Chapter 8), whereas analog signals generally have no such
`requirement.
`
`1.1.2 Typical Block Diagram and Transformations
`
`The functional block diagram shown in Figure 1.2 illustrates the signal flow
`through a typical DCS. The upper blocks—format, source encode, encrypt, chan-
`nel encode, multiplex, modulate, frequency spread, and multiple access—indicate
`the signal transformations from the source to the transmitter. The lower blocks
`indicate the signal transformations from the receiver to the sink; the lower blocks
`essentially reverse the signal processing steps performed by the upper blocks. It
`used to be that the only blocks within the dashed lines were the modulator and
`demodulator, together called a modem. During the past two decades, other signal
`processing functions were frequently incorporated within the same assembly as
`the modulator and demodulator. Consequently, at present, the term “modem”
`
`4
`
`Signals and Spectra
`
`Chap. 1
`
`
`
`
`
`

`

`
`
`T
`
`a
`n
`n
`
`R
`C
`
`Information (cid:9)
`source (cid:9)
`
`T - - - - (cid:9)
`Source (cid:9)
`i (cid:9)
`bits (cid:9)
`I (cid:9)
`
`--------
`Channel
`bits
`
`From other
`sources
`
`4Fr’
`
`Format (cid:9)
`
`YJi99 (cid:9)
`
`Ir
`1J Mod-
`sj(t) /7
`:ut\
`
`Mult(
`
`I (cid:9)
`Freq- j 4Multi Ple4
`uenCy (cid:9)
`
`es acc s
`late Ispread (cid:9)
`Irr/ZZr/-Zz (cid:9)
`
`I
`
`I
`
`Bit (cid:9)
`stream
`
`ronization
`
`Digital (cid:9)
`waveform (cid:9)
`
`I (cid:9)
`I (cid:9)
`
`Digital
`input
`M i
`
`
`
`Digital (cid:9)Digital
`
`o_*] Format
`
`[.4-
`
`: (cid:9)
`
`DecryptJ-4- decode (cid:9)
`plex (cid:9)
`ulate (cid:9)
`IChannflemuItflemod-I (cid:9)
`
`t
`Information (cid:9)
`sink (cid:9)
`
`It (cid:9)
`I Source (cid:9)
`bits (cid:9)
`L ___
`
`Optional (cid:9)
`
`Essential (cid:9)
`
`Freq- (cid:9)
`
`Multiple
`access
`
`--J
`
`-
`
`It
`
`Channel
`bits
`__
`
`To other
`destinations
`
`Figure 1.2 Block diagram of a typical digital communication system. (Reprinted with per-
`mission from B. Sklar, "A Structured Overview of Digital Communications," IEEE Corn-
`mun. Mag., August 1983, Fig. 1, p. 5. ' 1983 IEEE.)
`
`often encompasses all the processing steps shown within the dashed lines of Figure
`1.2; when this is the case, the modem can be thought of as the "brains" of the
`system. Note that what constitutes a modem is not a precise concept; some of
`the blocks have purposely been shown on the dashed line rather than either inside
`or outside the modem. The transmitter and receiver can be thought of as the
`"muscles" of the system. The transmitter usually consists of a frequency up-
`conversion stage, a high-power amplifier, and an antenna. The receiver portion
`usually consists of an antenna, a low-noise amplifier (LNA), and a down-converter
`stage, typically to an intermediate frequency (IF).
`Of all the signal processing steps, only formatting, modulation, and demod-
`ulation are essential for a DCS; the other processing steps within the modem are
`design options for specific system needs. Formatting transforms the source in-
`formation into digital symbols; it makes the information compatible with the signal
`processing within a digital communication system. Modulation is the process by
`which the symbols are converted to waveforms that are compatible with the trans-
`mission channel.
`The source encoding step produces analog-to-digital (AID) conversion (for
`
`Sec. 1.1 (cid:9)
`
`Digital Communication Signal Processing (cid:9)
`
`5
`
`

`

`analog sources) and removes redundant 0r unneeded information. Encryption
`prevents unauthorized users from understanding messages and from injecting false
`messages into the system. Channel coding, for a given data rate, can reduce the
`probability of error (PE), or reduce the signal-to-noise ratio (SNR) requirement,
`at the expense of bandwidth or decoder complexity. Channel coding can also
`reduce the system bandwidth requirement at the expense of SNR or PE' perform-
`ance. Frequency spreading can produce a signal that is less vulnerable to inter-
`ference (both natural and intentional) and can be used to enhance the privacy of
`the communicators. Multiplexing and multiple access procedures combine signals
`that might have different characteristics or might originate from different sources,
`so that they can share a portion of the communications resource.
`The flow of the signal processing steps shown in Figure 1.2 represents a
`typical arrangement; however, the blocks are sometimes implemented in a dif-
`ferent order. For example, multiplexing can take place prior to channel encoding,
`or prior to modulation, or—with a two-step modulation process (subcarrier and
`carrier)—it can be performed between the two modulation steps. Similarly,
`spreading can take place anywhere along the transmission chain; its precise lo-
`cation depends on the particular technique used. Figure 1.2 illustrates the recip-
`rocal aspect of the procedure; any signal processing step that takes place in the
`transmitting chain must be reversed in the receiving chain. The figure also indi-
`cates that from the source to the modulator a message, also called a baseband
`signal or a bit stream, is characterized by a sequence of digital symbols. After
`modulation, the message takes the form of a digitally encoded waveform or digital
`waveform. Similarly, in the reverse direction, a received message appears as a
`digital waveform until it is demodulated. Thereafter it takes the form of a bit
`stream for all further signal processing steps. At various points along the signal
`route, noise corrupts the waveform s(t) so that its reception must be termed an
`estimate s‘(t). Such noise and its deleterious effects on system performance are
`considered in Chapter 4.
`Figure 1.3 shows the basic signal processing functions, which may be vieWed
`as transformations from one signal space to another. The transformations are
`classified into seven basic groups:
`
`Formatting and source coding
`. Modulation/demodulation
`
`flail-gaggle;—
`
`Channel coding
`
`Multiplexing and multiple access
`. Spreading
`
`. Encryption
`
`Synchronization
`
`Although this organization has some inherent overlap, it provides a useful
`structure for the book. Beginning with Chapter 2, the seven basic transformations
`are considered individually. In Chapter 2 we discuss the basic formatting tech-
`niques for transforming the source information into digital symbols, as well as
`
`6
`
`Signals and Spectra
`
`Chap. 1
`
`

`

`Formatting/Source Coding
`
`Bandpass Modulation/Demodulat ion
`
`Coherent
`
`Noncoherent
`
` Differential PCM (DPCM)
` character coding
`
`Sampling
`_
`Quantization
`Pulse code modulation (PCM)
`
`
`
`Block coding
`Synthesis/analysis coding
`Redundancy reducing coding
`
`
`
`Phase shift
`keying (PSK)
`Frequency shift
`keying (FSK)
`Amplitude shift
`keying (ASK)
`Continuous phase
`modulation
`(CPM)
`
`Differential phase
`shift keying
`(DPSK)
`Frequency shift
`keying (FSK)
`Amplitude shift
`keying (ASK)
`Continuous phase
`modulation
`(CPM)
`Hybrids
`
`Hybrids
`(PUMA)
`Data stream
`
`Channel Coding
`
`Waveform
`
`Structured
`Sequences
`
`Antipodal
`
` IVI-ary signaling
`
`Orthogonal
`Biorthogonal
`Transorthogonal
`
`Convolutional
`
`Spreading
`
`Direct sequencing
`(DS)
`Frequency hopping
`(FH)
`Time h0pping (TH)
`Hybrids
`
`\
`
`'--
`
`Synchronization
`
`Multiplexing/Multiple Access
`
`Frequency division
`
`(FDM/FDMA)
`
`Time division
`(TDM/TDMA)
`Code division
`(CD M/CD MA)
`Space division
`(SDMA)
`Polarization division
`
`Carrier
`
`synchronization
`
`Subcarrier
`synchronization
`Symbol
`synchronization
`Frame
`synchronization
`Network
`synchronization
`
`Encryption
`
`' Block
`
`V
`
`Figure 1.3 Basic digital communication transformations. (Reprinted with permission from
`B. Sklar, “A Structured Overview of Digital Communications,” IEEE Commun. Mag.,
`August 1983, Fig. 2, p. 6. © 1983 IEEE.)
`
`the selection of waveforms for making the symbols compatible with baseband
`transmission. As seen in Figure 1.3, formatting and source coding are grouped
`together; they are similar in that they involve data digitization. Since the term
`“source coding” has taken on the connotation of data redundancy reduction in
`addition to digitization, it is treated later, as a special formatting case, in Chapter
`11.
`
`In Figure 1.3, bandpass modulation/demodulation is partitioned into two
`basic categories, coherent and noncoherent. The process of demodulation in-
`volves the detection of the baseband information. Digital demodulation is typically
`accomplished with the aid of reference waveforms. When the references contain
`all the signal attributes, particularly phase information, the process is termed
`coherent; when phase information is not used, the process is termed noncoherent.
`Both techniques are detailed in Chapter 3.
`'
`
`Sec. 1.1
`
`Digital Communication Signal Processing
`
`7
`
`
`
`

`

`‘
`
`!,
`
`K
`
`(pulse amplitude modulation). Do you suppose that the sampled data in Figure
`
`2.14bare compatible with adigital system? No, they are not, because the am—
`
`plitude of each natural sample still has an infinite number of possible values; a
`digital system deals with a finite number of symbols. Even if the sampling is flat-
`top sampling, thepossible pulse values form an infinite set, since they reflect all
`the possible values of the continuous analog waveform. Figure 2.14c illustrates
`the original waveform represented by discrete pulses. Here the pulses have flat
`tops and the pulse amplitude values are limited to a finite set. Each pulse is
`expressed as a level from a finite number of predetermined levels; each such level
`can be represented by a symbol from a finite alphabet. The pulses in Figure 2.14c
`are referred to as quantized samples; such a format is the obvious choice for
`
`interfacing with a digital system. The format in Figure 2.14d may be construed
`as the output of a sample-and—hold circuit. When the sample values are quantized
`to a finite set, this format can also interface with a digital system. After quanti-
`zation, the analog waveform can still be recovered, but not precisely; improved
`reconstruction fidelity of the analog waveform can be achieved by increasing the
`number of quantization levels (requiring increased syste

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket