Inroute burst header in a VSAT system
09680562 ยท 2017-06-13
Assignee
Inventors
Cpc classification
H04B7/18528
ELECTRICITY
International classification
Abstract
A satellite terminal and a machine-implemented method are provided for encoding a burst header of a burst for transmission on an inroute. One component of a group of satellite terminal components consisting of an ASIC, a FPGA, and a DSP, generates a burst header having five information bits encoded therein. The five information bits may be encoded using a Reed-Muller code, a (32, 5) block code or a convolutional code having a code rate of either 1/5 or 1/10. The five information bits may represent one or more of a modulation type for a payload of the burst, a code rate for encoding the payload, a code type, and a spreading factor for spreading the payload during transmission. A satellite gateway and a machine-implemented method are also provided for decoding a burst header of a burst received on an inroute as described above.
Claims
1. A machine-implemented method for encoding a burst header of a burst to be transmitted on an inroute from a satellite terminal, the machine-implemented method comprising: generating, by an application specific integrated circuit of a satellite terminal, a burst header, the burst header having encoded therein, via a convolutional code having a code rate of either 1/5 or 1/10, a plurality of information bits representing a modulation type for modulating a payload of the burst and a code rate for the payload, a number of the plurality of information bits being five; providing the burst, including the burst header and the payload to a modulator; modulating the burst header via a binary phase shift keying modulation; modulating the payload data via a modulation matching the modulation type encoded within the burst header; and transmitting the modulated burst header and the modulated payload data, the modulated payload data having a first code rate matching the code rate encoded within the burst header, wherein either: the generating the burst header comprises: encoding the plurality of information bits of the burst header using the convolution code to produce a 50 bit codeword, wherein a plurality of generator polynomials for producing the 50 bit codeword comprise: g0=(1 1 1 1 1), g1=(1 0 1 1 1), g2=(1 1 0 0 1), g3=(1 1 0 1 1), g4=(1 1 1 0 1), g5=(1 1 0 1 1), g6=(1 0 1 1 1), g7=(1 0 1 0 1), g8=(1 0 0 1 1), and g9=(1 0 0 0 1), wherein: gi=(g.sub.i,0 g.sub.i,1 g.sub.i,2 g.sub.i,3 g.sub.i,4 g.sub.i,5), and i is an integer, and 0<i<9; or the generating the burst header comprises: encoding the plurality of information bits of the burst header using the convolutional code having the code rate of 1/5 to produce a 25 bit codeword which is repeated once, thereby producing 50 bits included in the encoded burst header, wherein a plurality of generator polynomials for producing the 25 bit codeword comprises: g0=(1 0 1 0 1), g1=(1 0 1 1 1), g2=(1 1 0 1 1), g3=(1 1 1 1 1), and g4=(1 1 0 0 1), wherein: gi=(g.sub.i,0 g.sub.i,1 g.sub.i,2 g.sub.i,3 g.sub.i,4), and i is an integer, and 0<i<4.
2. The machine-implemented method of claim 1, wherein: the plurality of information bits further represent a spreading factor for the payload, and the modulated payload data is transmitted using a first spreading factor matching the spreading factor represented by the plurality of information bits.
3. The machine-implemented method of claim 1, wherein: the plurality of information bits further represent a code type for encoding the payload, and the machine-implemented method further comprises encoding the payload data via a first code type matching the code type represented by the plurality of information bits.
4. The machine-implemented method of claim 1, wherein the modulating the burst header via a binary phase shift keying modulation comprises: modulating the burst header via a
5. The machine-implemented method of claim 1, wherein: the convolutional code and the plurality of generator polynomials for producing the 50 bit codeword are used to encode the plurality of information bits to produce the 50 bit codeword, and tail bits are not transmitted.
6. The machine-implemented method of claim 5, wherein: the 50 bit codeword includes 50 coded bits, p.sub.0 through p.sub.49, the p.sub.0=((((u.sub.0 xor u.sub.4) xor u.sub.3) xor u.sub.2) xor u.sub.1), p.sub.1=(((u.sub.0 xor u.sub.3) xor u.sub.2) xor u.sub.1), p.sub.2=((u.sub.0 xor u.sub.4) xor u.sub.1), p.sub.3=(((u.sub.0 xor u.sub.4) xor u.sub.2) xor u.sub.1), p.sub.4=(((u.sub.0 xor u.sub.4) xor u.sub.3) xor u.sub.1), p.sub.5=(((u.sub.0 xor u.sub.4) xor u.sub.2) xor u.sub.1), p.sub.6=(((u.sub.0 xor u.sub.3) xor u.sub.2) xor u.sub.1), p.sub.7=((u.sub.0 xor u.sub.2) xor u.sub.1), p.sub.8=((u.sub.0 xor u.sub.2) xor u.sub.1), p.sub.9=(u.sub.0 xor u.sub.1), p.sub.10=((((u.sub.1 xor u.sub.0) xor u.sub.4) xor u.sub.3) xor u.sub.2), p.sub.11=(((u.sub.1 xor u.sub.4) xor u.sub.3) xor u.sub.2), p.sub.12=((u.sub.1 xor u.sub.0) xor u.sub.2), p.sub.13=(((u.sub.1 xor u.sub.0) xor u.sub.3) xor u.sub.2), p.sub.14=(((u.sub.1 xor u.sub.0) xor u.sub.4) xor u.sub.2), p.sub.15=(((u.sub.1 xor u.sub.0) xor u.sub.3) xor u.sub.2), p.sub.16=(((u.sub.1 xor u.sub.4) xor u.sub.3) xor u.sub.2), p.sub.17=((u.sub.1 xor u.sub.4) xor u.sub.2), p.sub.18=((u.sub.1 xor u.sub.3) xor u.sub.2), p.sub.19=(u.sub.1 xor u.sub.2), p.sub.20=((((u.sub.2 xor u.sub.1) xor u.sub.0) xor u.sub.4) xor u.sub.3), p.sub.21=(((u.sub.2 xor u.sub.0) xor u.sub.4) xor u.sub.3), p.sub.22=((u.sub.2 xor u.sub.1) xor u.sub.3), p.sub.23=(((u.sub.2 xor u.sub.1) xor u.sub.4) xor u.sub.3), p.sub.24=(((u.sub.2 xor u.sub.1) xor u.sub.0) xor u.sub.3), p.sub.25=(((u.sub.2 xor u.sub.1) xor u.sub.4) xor u.sub.3), p.sub.26=(((u.sub.2 xor u.sub.0) xor u.sub.4) xor u.sub.3), p.sub.27=((u.sub.2 xor u.sub.0) xor u.sub.3), p.sub.28=((u.sub.2 xor u.sub.4) xor u.sub.3), p.sub.29=(u.sub.2 xor u.sub.3), p.sub.30=((((u.sub.3 xor u.sub.2) xor u.sub.1) xor u.sub.0) xor u.sub.4), p.sub.31=(((u.sub.3 xor u.sub.1) xor u.sub.0) xor u.sub.4), p.sub.32=((u.sub.3 xor u.sub.2) xor u.sub.4), p.sub.33=(((u.sub.3 xor u.sub.2) xor u.sub.0) xor u.sub.4), p.sub.34=(((u.sub.3 xor u.sub.2) xor u.sub.1) xor u.sub.4), p.sub.35=(((u.sub.3 xor u.sub.2) xor u.sub.0) xor u.sub.4), p.sub.36=(((u.sub.3 xor u.sub.1) xor u.sub.0) xor u.sub.4), p.sub.37=((u.sub.3 xor u.sub.1) xor u.sub.4), p.sub.38=((u.sub.3 xor u.sub.1) xor u.sub.4), p.sub.39=(u.sub.3 xor u.sub.4), p.sub.40=((((u.sub.4 xor u.sub.3) xor u.sub.2) xor u.sub.1) xor u.sub.0), p.sub.41=(((u.sub.4 xor u.sub.2) xor u.sub.1) xor u.sub.0), p.sub.42=((u.sub.4 xor u.sub.3) xor u.sub.0), p.sub.43=(((u.sub.4 xor u.sub.3) xor u.sub.1) xor u.sub.0), p.sub.44=(((u.sub.4 xor u.sub.3) xor u.sub.2) xor u.sub.0), p.sub.45=(((u.sub.4 xor u.sub.3) xor u.sub.1) xor u.sub.0), p.sub.46=(((u.sub.4 xor u.sub.2) xor u.sub.1) xor u.sub.0), p.sub.47=((u.sub.4 xor u.sub.2) xor u.sub.0), p.sub.48=((u.sub.4 xor u.sub.1) xor u.sub.0), and the p.sub.49=(u.sub.4 xor u.sub.0), wherein: the u.sub.0, the u.sub.1, the u.sub.2, the u.sub.3, and the u.sub.4 are the plurality of information bits.
7. The machine-implemented method of claim 1, further comprising: mapping bits of the encoded plurality of information bits of the burst header to respective symbols according to a desired modulation type for the payload, the desired modulation type being a modulation type selected from a group consisting of an offset quadrature phase shift keying modulation type, an 8 phase shift keying modulation type, and a 16 amplitude and phase shift keying modulation type, wherein as a result of the mapping bits, an effective modulation type for the burst header is a
8. The machine-implemented method of claim 1, wherein: the plurality of information bits are encoded, using the plurality of generator polynomials for producing the 25 bit codeword, to produce the 25 bit codeword, and the 25 bit codeword includes 25 coded bits, p.sub.0 through p.sub.24, the p.sub.0=((u.sub.0 xor u.sub.3) xor u.sub.1), p.sub.1=(((u.sub.0 xor u.sub.3) xor u.sub.2) xor u.sub.1), p.sub.2=(((u.sub.0 xor u.sub.4) xor u.sub.2) xor u.sub.1), p.sub.3=((((u.sub.0 xor u.sub.4) xor u.sub.3) xor u.sub.2) xor u.sub.1), p.sub.4=((u.sub.0 xor u.sub.4) xor u.sub.1), p.sub.5=((u.sub.1 xor u.sub.4) xor u.sub.2), p.sub.6=(((u.sub.1 xor u.sub.4) xor u.sub.3) xor u.sub.2), p.sub.7=(((u.sub.1 xor u.sub.0) xor u.sub.3) xor u.sub.2), p.sub.8=((((u.sub.1 xor u.sub.0) xor u.sub.4) xor u.sub.3) xor u.sub.2), p.sub.9=((u.sub.1 xor u.sub.0) xor u.sub.2), p.sub.10=((u.sub.2 xor u.sub.0) xor u.sub.3), p.sub.11=(((u.sub.2 xor u.sub.0) xor u.sub.4) xor u.sub.1), p.sub.12=(((u.sub.2 xor u.sub.1) xor u.sub.4) xor u.sub.3), p.sub.13=((((u.sub.2 xor u.sub.1) xor u.sub.0) xor u.sub.4) xor u.sub.3), p.sub.14=((u.sub.2 xor u.sub.1) xor u.sub.3), p.sub.15=((u.sub.3 xor u.sub.1) xor u.sub.4), p.sub.16=(((u.sub.3 xor u.sub.1) xor u.sub.0) xor u.sub.2), p.sub.17=(((u.sub.3 xor u.sub.2) xor u.sub.0) xor u.sub.4), p.sub.18=((((u.sub.3 xor u.sub.2) xor u.sub.1) xor u.sub.0) xor u.sub.4), p.sub.19=((u.sub.3 xor u.sub.2) xor u.sub.4), p.sub.20=((u.sub.4 xor u.sub.2) xor u.sub.0), p.sub.21=(((u.sub.4 xor u.sub.2) xor u.sub.1) xor u.sub.3), p.sub.22=(((u.sub.4 xor u.sub.3) xor u.sub.1) xor u.sub.0), p.sub.23=((((u.sub.4 xor u.sub.1) xor u.sub.2) xor u.sub.1) xor u.sub.0), and the p.sub.24=((u.sub.4 xor u.sub.3) xor u.sub.0)), wherein: the u.sub.0, the u.sub.1, the u.sub.2, the u.sub.3, and the u.sub.4 are the plurality of information bits.
9. A machine-implemented method for decoding a burst header of a burst, the machine-implemented method comprising: receiving, by a satellite gateway, the burst including the burst header and encoded payload data; demodulating, by the satellite gateway, the burst header having been modulated using a predefined phase shift keying modulation type; decoding the burst header by the satellite gateway, the burst header having a plurality of information bits encoded therein via a convolutional code having a code rate of either 1/5 or 1/10, the plurality of information bits being 5 bits representing, with respect to the payload data, a modulation type and a first code rate, the decoding the burst header further comprising: combining two sets of 25 bits of the burst header into one set of 25 bits, and decoding the one set of 25 bits of the burst header, encoded using the convolutional code, to produce the plurality of information bits; and demodulating the encoded payload data modulated using the modulation type, the encoded payload data having been encoded at the first code rate.
10. The machine-implemented method of claim 9, wherein the plurality of information bits further represents a spreading factor by which the payload is transmitted.
11. The machine-implemented method of claim 9, wherein the plurality of information bits further represent a code type used to encode the payload data.
12. The machine-implemented method of claim 9, further comprising: decoding the encoded payload data according to an encoding method having the first code rate represented by the plurality of information bits encoded in the burst header.
Description
DRAWINGS
(1) In order to describe the manner in which the above-recited and other advantages and features can be obtained, a more particular description is provided below and will be rendered by reference to specific embodiments thereof which are illustrated in the appended drawings. Understanding that these drawings depict only typical embodiments and are not therefore to be considered to be limiting of its scope, implementations will be described and explained with additional specificity and detail through the use of the accompanying drawings.
(2)
(3)
(4)
(5)
(6)
(7)
(8)
(9)
DETAILED DESCRIPTION
(10) Embodiments are discussed in detail below. While specific implementations are discussed, it should be understood that this is done for illustration purposes only. A person skilled in the relevant art will recognize that other components and configurations may be used without parting from the spirit and scope of the subject matter of this disclosure.
Overview
(11) A satellite terminal and a machine-implemented method are provided for encoding a burst header of a burst for transmission on an inroute from a satellite terminal to a satellite gateway. In various embodiments, an application specific integrated circuit (ASIC), a field programmable gate array (FPGA), or a digital signal processor (DSP) of a satellite terminal generates a burst header for a burst. Five information bits may be encoded within the burst header using a (16, 5) Reed-Muller code, a (32, 5) block code or a convolutional code having a code rate of either 1/5 or 1/10. The five information bits may represent a modulation type for a payload of the burst and a code rate for encoding the payload. In some embodiments, the five information bits may further represent a spreading factor for spreading the payload during transmission and a code type for encoding the payload. In some embodiments, the burst header may be modulated via a binary phase shift keying modulation.
(12) In various embodiments, when the five information bits are encoded using the (16, 5) Reed-Muller code, the resulting 16 bit codeword may be repeated to produce 32 bits for the burst header. In other embodiments, when the five information bits are encoded using a convolutional code, the code rate may be either 1/5 or 1/10. Thus, when the code rate is 1/10, encoding the five information bits produces a 50 bit codeword for the burst header. When the code rate is 1/5, encoding the five information bits produces a 25 bit codeword, which may be repeated to produce 50 bits for the burst header.
(13) Embodiments may include a satellite gateway and a machine-implemented method for decoding a burst header of a burst to produce five information bits representing a modulation type and a code rate for a payload of the burst. In some embodiments, the five information bits may further represent one or more of a spreading factor for spreading the payload during transmission and a code type used for encoding the payload.
Exemplary Operating Environment
(14)
Exemplary Burst
(15)
Satellite Terminal
(16)
Burst Header Encoding
(17) In one embodiment, a (16, 5) Reed-Muller code may be used to encode five information bits u=[u.sub.4 u.sub.3 u.sub.2 u.sub.1 u.sub.0]. The following generator matrix, G, may be used to Reed-Muller encode the five information bits for a burst header.
(18)
(19) Any 5 bit information vector u=[u.sub.4 u.sub.3 u.sub.2 u.sub.1 u.sub.0] may be encoded onto a 16 bit codeword, c, using c=u.Math.G. The 16 bit codeword may then be repeated once to produce 32 bits for the burst header. The burst header may be transmitted using a BPSK modulation. The BPSK modulation is very robust and works well at a low Es/No, where Es is symbol energy of the signal and No is noise. For example, when Es/No1 db, and a (16, 5) Reed-Muller code is used to encode five information bits onto a 16 bit codeword, which is repeated once and included as 32 bits of the burst header, the BPSK modulation is robust enough to work under these conditions. When only 16 bits of the codeword, with no repetition, is included in the burst header, the BPSK modulation is robust enough to work when Es2 db. In some embodiments, the BPSK modulation may be a
(20)
shifted BPSK modulation.
(21) In another embodiment a (32, 5) block code may be used to encode the five information bits onto a 32 bit codeword. Any 5 bit information vector u=[u.sub.4 u.sub.3 u.sub.2 u.sub.1 u.sub.0] may be encoded onto a 32 bit codeword, c, using c=u.Math.G, where G is given by the block code
(22)
(23) In a third embodiment, a convolutional code may be used to encode the five information bits onto a 50 bit codeword. In some implementations, a convolutional encoder may perform tail biting. In other words, tail bits are not transmitted. Alternatively, instead of encoding the five information bits onto a 50 bit codeword, a convolutional code may encode the five information bits onto a 25 bit codeword, which may be repeated and included as 50 bits of the burst header.
(24)
(25) Additional information may also be represented by the five information bits. For example, the five information bits may further represent a code type for encoding the payload, including, but not limited to, Turbo Coding and LDPC (low density parity check) coding. For example, with reference to
(26)
(27) If a generator polynomial gi=(g.sub.i,0 g.sub.i,1 g.sub.i,2 g.sub.i,3 g.sub.i,4) and a generator polynomial g0=(1 1 1 1 1), then g.sub.0,0=1, g.sub.0,1=1, g.sub.0,2=1, g.sub.0,3=1 and g.sub.0,4=1. When a respective gi=1, then a respective u bit is input to a respective xor. Otherwise, a 0 is input to the respective xor. Therefore, initially, a first bit produced, p.sub.0, is ((((u.sub.0 xor u.sub.4) xor u.sub.3) xor u.sub.2) xor u.sub.1). When g.sub.1,0=1, g.sub.1,1=0, g.sub.1,2=1, g.sub.1,3=1, g.sub.1,4=1, then a second bit produced, p.sub.1, is (((u.sub.0 xor u.sub.3) xor u.sub.2) xor u.sub.1). When g.sub.2,0=1, g.sub.2,1=1, g.sub.2,2=0, g.sub.2,3=0 and g.sub.2,4=1, then a third produced bit, p.sub.2, is ((u.sub.0 xor u.sub.4) xor u.sub.1). When g.sub.3,0=1, g.sub.3,1=1, g.sub.3,2=0, g.sub.3,3=1 and g.sub.3,4=1, then a fourth bit, p.sub.3, is (((u.sub.0 xor u.sub.4) xor u.sub.2) xor u.sub.1). When g.sub.4,0=1, g.sub.1,1=1, g.sub.1,2=1, g.sub.1,3=1, g.sub.1,4=1, then a fifth bit produced, p.sub.4, is (((u.sub.0 xor u.sub.4) xor u.sub.3) xor u.sub.1). When g.sub.5,0=1, g.sub.5,1=1, g.sub.5,2=1, g.sub.5,3=1, g.sub.5,4=1, then a sixth bit produced, p.sub.5, is (((u.sub.0 xor u.sub.4) xor u.sub.2) xor u.sub.1). When g.sub.6,0=1, g.sub.6,1=1, g.sub.6,2=1, g.sub.6,3=1, g.sub.6,4=1, then a seventh bit produced, p.sub.6, is (((u.sub.0 xor u.sub.3) xor u.sub.2) xor u.sub.1). When g.sub.7,0=1, g.sub.7,1=0, g.sub.7,2=1, g.sub.7,3=0, g.sub.7,4=1, then an eighth bit produced, p.sub.7, is ((u.sub.0 xor u.sub.2) xor u.sub.1). When g.sub.8,0=1, g.sub.8,1=0, g.sub.8,2=0, g.sub.8,3=1, g.sub.8,4=1, then a ninth bit produced, p.sub.8, is ((u.sub.0 xor u.sub.2) xor u.sub.1). When g.sub.9,0=1, g.sub.9,1=0, g.sub.9,2=0, g.sub.9,3=0, g.sub.9,4=1, then a tenth bit produced, p.sub.9, is (u.sub.0 xor u.sub.1).
(28) After generating bits p.sub.0 through p.sub.9, the u bits are shifted to the right and delay register 510 has an output of u.sub.1 and an input of u.sub.2, shift register 508 has an output of u.sub.2 and an input of u.sub.3, shift register 506 has an output of u.sub.3 and an input of u.sub.4, shift register 504 has an output of u.sub.4 and an input of u.sub.0, and shift register 502 has an output of u.sub.0 and an input of u.sub.1. Using the values of g0 through g9, to produce the next 10 bits, one can see that p.sub.10 is ((((u.sub.1 xor u.sub.0) xor u.sub.4) xor u.sub.3) xor u.sub.2), p.sub.11, is (((u.sub.1 xor u.sub.4) xor u.sub.3) xor u.sub.2), p.sub.12 is ((u.sub.1 xor u.sub.0) xor u.sub.2), p.sub.13 is (((u.sub.1 xor u.sub.0) xor u.sub.3) xor u.sub.2), p.sub.14 is (((u.sub.1 xor u.sub.0) xor u.sub.4) xor u.sub.2), p.sub.15 is (((u.sub.1 xor u.sub.0) xor u.sub.3) xor u.sub.2), p.sub.16 is (((u.sub.1 xor u.sub.4) xor u.sub.3) xor u.sub.2), p.sub.17 is ((u.sub.1 xor u.sub.4) xor u.sub.2), p.sub.18 is ((u.sub.1 xor u.sub.3) xor u.sub.2), and p.sub.19 is (u.sub.1 xor u.sub.2).
(29) After generating bits p.sub.10 through p.sub.19, the u bits are shifted to the right and delay register 510 has an output of u.sub.2 and an input of u.sub.3, shift register 508 has an output of u.sub.3 and an input of u.sub.4, shift register 506 has an output of u.sub.4 and an input of u.sub.0, shift register 504 has an output of u.sub.0 and an input of u.sub.1, and shift register 502 has an output of u.sub.1 and an input of u.sub.2. Using the values of g0 through g9, to produce the next 10 bits, one can see that p.sub.20 is ((((u.sub.2 xor u.sub.1) xor u.sub.0) xor u.sub.4) xor u.sub.3), p.sub.21, is (((u.sub.2 xor u.sub.0) xor u.sub.4) xor u.sub.3), p.sub.22 is ((u.sub.2 xor u.sub.1) xor u.sub.3), p.sub.23 is (((u.sub.2 xor u.sub.1) xor u.sub.4) xor u.sub.3), p.sub.24 is (((u.sub.2 xor u.sub.1) xor u.sub.0) xor u.sub.3), p.sub.25 is (((u.sub.2 xor u.sub.1) xor u.sub.4) xor u.sub.3), p.sub.26 is (((u.sub.2 xor u.sub.0) xor u.sub.4) xor u.sub.3), p.sub.27 is ((u.sub.2 xor u.sub.0) xor u.sub.3), p.sub.28 is ((u.sub.2 xor u.sub.4) xor u.sub.3), and p.sub.29 is (u.sub.2 xor u.sub.3).
(30) After generating bits p.sub.20 through p.sub.29, the u bits are shifted to the right and delay register 510 has an output of u.sub.3 and an input of u.sub.4, shift register 508 has an output of u.sub.4 and an input of u.sub.0, shift register 506 has an output of u.sub.0 and an input of u.sub.1, shift register 504 has an output of u.sub.1 and an input of u.sub.2, and shift register 502 has an output of u.sub.2 and an input of u.sub.3. Using the values of g.sub.0 through g.sub.9, to produce the next 10 bits, one can see that p.sub.30 is ((((u.sub.3 xor u.sub.2) xor u.sub.1) xor u.sub.0) xor u.sub.4), p.sub.31, is (((u.sub.3 xor u.sub.1) xor u.sub.0) xor u.sub.4), p.sub.32 is ((u.sub.3 xor u.sub.2) xor u.sub.4), p.sub.33 is (((u.sub.3 xor u.sub.2) xor u.sub.0) xor u.sub.4), p.sub.34 is (((u.sub.3 xor u.sub.2) xor u.sub.1) xor u.sub.4), p.sub.35 is (((u.sub.3 xor u.sub.2) xor u.sub.0) xor u.sub.4), p.sub.36 is (((u.sub.3 xor u.sub.1) xor u.sub.0) xor u.sub.4), p.sub.37 is ((u.sub.3 xor u.sub.1) xor u.sub.4), p.sub.38 is ((u.sub.3 xor u.sub.0) xor u.sub.4), and p.sub.39 is (u.sub.3 xor u.sub.4).
(31) After generating bits p.sub.30 through p.sub.39, the u bits are shifted to the right and delay register 510 has an output of u.sub.4 and an input of u.sub.0, shift register 508 has an output of u.sub.0 and an input of u.sub.1, shift register 506 has an output of u.sub.1 and an input of u.sub.2, shift register 504 has an output of u.sub.2 and an input of u.sub.3, and shift register 502 has an output of u.sub.3 and an input of u.sub.4. Using the values of g0 through g9, to produce the next 10 bits, one can see that p.sub.40 is ((((u.sub.4 xor u.sub.3) xor u.sub.2) xor u.sub.1) xor u.sub.0), p.sub.41, is (((u.sub.4 xor u.sub.2) xor u.sub.1) xor u.sub.0), p.sub.42 is ((u.sub.4 xor u.sub.3) xor u.sub.0), p.sub.43 is (((u.sub.4 xor u.sub.3) xor u.sub.1) xor u.sub.0), p.sub.44 is (((u.sub.4 xor u.sub.3) xor u.sub.2) xor u.sub.0), p.sub.45 is (((u.sub.4 xor u.sub.3) xor u.sub.1) xor u.sub.0), p.sub.46 is (((u.sub.4 xor u.sub.2) xor u.sub.1) xor u.sub.0), p.sub.47 is ((u.sub.4 xor u.sub.2) xor u.sub.0), p.sub.48 is ((u.sub.4 xor u.sub.1) xor u.sub.0), and p.sub.49 is (u.sub.4 xor u.sub.0).
(32) After generating bits p.sub.40 through p.sub.49, the u bits are shifted to the right and delay register 510 has an output of u.sub.0 and an input of u.sub.1, shift register 508 has an output of u.sub.1 and an input of u.sub.2, shift register 506 has an output of u.sub.2 and an input of u.sub.3, shift register 504 has an output of u.sub.3 and an input of u.sub.4, and shift register 502 has an output of u.sub.4 and an input of u.sub.0. However, because this embodiment employs tail biting, the inputs and outputs of shift registers 502, 504, 506, 508 are exactly the same as those of the initial state. When the inputs and outputs of shift registers 502, 504, 506, 508 are identical to those of the initial state, the process is completed.
(33) As one can see from the above example, when using convolutional coding with a code rate of 1/10, each of the five information bits, produces 10 coded bits. Therefore, exemplary convolutional encoder 500 produces a 50-bit codeword from the five information bits.
(34) By altering the generator polynomials of
(35)
shifted BPSK modulation is very robust, as previously mentioned, and may be used to modulate the burst header. Other types of modulation may be used in other embodiments, including, but not limited to, offset quadrature phase shift keying (OQPSK), 8 phase shift keying (8PSK), and 16 amplitude and phase shift keying (16APSK).
(36) In some embodiments, a burst header may be modulated according to a predefined modulation, which may include the OQPSK modulation, the 8PSK modulation, or the 16APSK modulation. However, by mapping each coded bit of the code header, the effective modulation type for the modulated burst header may be
(37)
shifted BPSK. For example, with reference to
(38) By performing the mappings as described above, an effective modulation of the burst header is
(39)
shifted BPSK.
Satellite Gateway
(40)
CONCLUSION
(41) The disclosed embodiments provide a number of advantages over existing systems such as: a. provides for flexible expansion of supported code rates per inroute without changing a length of the UW; b. eliminates the task of finding a good set of UWs each time additional code rates are added; c. allows modulation and code rate changes for payloads from burst to burst on an inroute; d. allows for more efficient use of bandwidth; and e. provides other information such as a spreading factor for a payload of a burst.
(42) Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter in the appended claims is not necessarily limited to the specific features or acts described above. Rather, the specific features and acts described above are disclosed as example forms for implementing the claims.
(43) Although the above descriptions may contain specific details, they should not be construed as limiting the claims in any way. Other configurations of the described embodiments are part of the scope of this disclosure. Accordingly, the appended claims and their legal equivalents should only define the invention, rather than any specific examples given.