`
`Bluetooth-The universal radio interface for ad hoc, wireless connectivity
`
`) 3,1998
`
`Internet directory services with click-to-dial
`
`Jambala-Intelligence beyond digital wireless
`
`ERION-Ericsson optical networking using WDM technology
`
`Access 910 system
`
`SONY Exhibit 1007 - 0001
`
`
`
`The telecommunications
`technology journal
`
`The purpose of Ericsson Review is to
`report on the research, development
`and production achievements made in
`telecommunications technology at
`Ericsson. The journal is published in
`English and Spanish and distributed
`quarterly to readers in more than 130
`countries.
`
`Address:
`Telefonaktiebolaget LM Ericsson
`S-126 25 Stockholm, Sweden
`
`Tel: +46 8 719 00 00
`
`Fax: +46868 1 27 10
`
`Internet address:
`http://www.ericsson.com/Review
`
`Publisher: Lars A. Sdllberg
`
`Editorial board: Hans Alberg, Greger
`Berg, Tom Boothe, Mikael Back,
`Philippe Charas, Jonas Hermansson,
`Anders Hidmark, Lena Krogstad, Filip
`Lindell, Bo Malmberg, Mats Nilsson,
`Eric Peterson, Goran Rassmuson,
`Michele Schmidt, Ole Segrnan, Sture
`Sjostrom, Bengt Stavenow, Lars(cid:173)
`Gunnar Sundin, Peter Svard
`
`Editor: Eric Peterson
`
`Production manager: Eva Karlstein
`
`Layout: Paues Media, Stockholm
`
`Printer: Ljungforetagen, Orebro
`
`ISSN: 0014-0171
`
`Volume: 75,1998
`
`Cover: Bluecooth technology substitutes a
`universal short-range radio link for the
`many proprietary cables that are presently
`used for connecting devices. But more than
`this, BluetOoth radio rechnology provides a
`universal bridge to existing data networks,
`a peripheral interface, and a mechanism for
`forming small ad hoc groupings of connect(cid:173)
`ed devices away from fixed nerwork infra(cid:173)
`structures.
`
`© Telefonakriebolager LM Ericsson
`
`Contents
`
`Bluetooth- The universal radio interface for ad hoc,
`wireless connectivity
`Imagine a cheap, power-efficient radio chip that is small enough to fit inside
`any electronic device or machine and that provides local connectivity. Bluetooth
`is a universal radio interface in the 2.45 GHz frequency band that enables
`portable electronic devices to connect and communicate wirelessly via ad hoc
`Page 11.0
`networks.
`
`--
`
`Internet directory services with click-to-dial
`Internet directory services make available vast resources of the Internet, helping
`users to save valuable time in finding names, e-mail addresses, and so forth. Click(cid:173)
`to-dial services allow users to invoke calls by clicking on the phone number they
`retrieve using directory services. Ericsson's solution sets up and transmits calls via
`Page 118
`the PSTN, but it is equally compatible with VoIP.
`
`Intelligence beyond digital wireless
`Jambala-
`Jambala is the next-generation application platform that operators need to provide
`new, high-value services in an increasingly segmented end-user market. Jambala
`provides a unique combination of availability, reliability, scalability and Internet
`Page 126
`readiness-all using commercially available hardware.
`
`ERION- Ericsson optical networking using WDM
`technology
`Ericsson maintains a simple, pragmatic approach to networking as they further ex(cid:173)
`plore and exploit dense WDM technology and optical networking . Ericsson's next(cid:173)
`generation transport-network technology-ERION-enables operators to derive
`maximum benefit from investments in client technology, while simplifying net-
`Page 132
`works and improving traffic protection and routing functionality.
`
`Access 910 system
`Ericsson's Access 910 is a general-purpose, access-network system that provides
`PSTN, Internet, VoIP, ATM, and switched video broadcast capabilities to a wide
`range of service networks. The suppOrt it provides for practical, cost-effective mi(cid:173)
`g ration from narrowband to broadband services makes it ideal for present-day and
`Page 138
`future telecom environments.
`
`Ericsson Review No .3, 1998
`
`107
`
`SONY Exhibit 1007 - 0002
`
`
`
`Bluetooth-The universal radio interface for
`ad hoc, wireless connectivity
`
`Jaap Haartsen
`
`Bluetooth is a universal radio interface in the 2.45 GHz frequency band that
`enables portable electronic devices to connect and communicate wirelessly
`via short-range, ad hoc networks. Each unit can siinultaneously communi(cid:173)
`cate with up to seven other units per piconet. Moreover, each unit can
`simultaneously belong to several piconets.
`Bluetooth technology-which apart from Ericsson, has gained the support
`of Nokia, IBM, Toshiba, Intel and many other manufacturers-eliminates the
`need for wires, cables and connectors for and between cordless or mobile
`phones, modems, headsets, PDAs, computers, printers, projectors, local
`area networks, and so on, and paves the way for new and completely differ(cid:173)
`ent devices and applications.
`Before guiding us through frequency-hopping technology and the channel,
`packet and physical-link definitions that characterize the Bluetooth air inter(cid:173)
`face, the author briefly describes the conditions that led up to the develop(cid:173)
`ment of Bluetooth. He then -acquaints us with the networking aspects of
`Bluetooth technology, describing piconets and scatternets, connection pro(cid:173)
`cedures, and inter-piconet communication.
`
`\
`
`Imagine a cheap, power-efficient radio chip
`that is small enough to fit inside any elec(cid:173)
`tronic device or machine, that provides local
`connectivity, and that creates a (worldwide)
`micro-scale web . What applications might
`you use it in?
`In 1994, Ericsson Mobile Communica(cid:173)
`tions AB in Lund, Sweden, initiated a study
`ro investigate the feasibility of a low-power,
`low-cost radio interface between mobile
`phones and their accessories. The intention
`
`LAN
`
`Access point ~
`~
`Headset ~ /
`
`(
`
`was to eliminate cables between phones and
`PC cards, wireless headsets, and so forth.
`The study was part of a larger project that
`investigated multi-communicators con(cid:173)
`nected to the cellular network via cellular
`telephones. The last link in the connection
`between a communicator and the cellular
`network was a short-range radio link to the
`phone-thus, the link was called the multi(cid:173)
`communicator link or MC link. As the MC
`link project progressed, it became clear that
`there was no limit to the kinds of applica(cid:173)
`tion that could use a short-range radio link.
`Cheap, short-range radios would make wire(cid:173)
`less communication between portable de(cid:173)
`vices economically feasib le.
`infrared
`Current portable devices use
`links (IrDA) to communicate with each
`other. Although infrared transceivers are in(cid:173)
`expensive, they
`• have limited range (typically one to tW9
`meters);
`• are sensitive to direction and require
`direct line-of-sight;
`• can in principle only be used between two
`devices.
`By contrast, radios have much greater range,
`can propagate around objects and through
`various materials, and connect to many de(cid:173)
`vices simultaneously. What is more, radio
`interfaces do not require user interaction.
`In the beginning of 1997, when design(cid:173)
`ers had already begun work on an MC link
`
`Cellular network
`
`Mobile phone
`
`Figure 1
`User model with local wireless connectivity.
`Applications envisioned for the near future.
`
`~ Piconet
`
`Mouse
`
`110
`
`Ericsson Review No. 3, 1998
`
`SONY Exhibit 1007 - 0003
`
`
`
`transceiver chip, Ericsson approached other
`manufacturers of portable devices ro raise in(cid:173)
`terest in the technology-for the system ro
`succeed, a critical mass of portable devices
`must use the short-range radio . In February
`1998, five promoters-Ericsson, Nokia,
`IBM, Toshiba and Intel-formed a special
`interest group (SIG). The idea was ro achieve
`a proper mix of business areas: two market
`leaders in mobile telephony, two market
`leaders in laprop computing, and a market
`leader
`in core, digital-signal-processor
`(DSP) technology . OnMay 20 and 21,1998,
`the Bluerooth consortium announced itself
`ro the general public from London, England;
`SanJose, California; and Tokyo,Japan. Since
`then, several companies have joined as
`adopters of the technology (Box B).
`The putpose of the consortium is ro
`establish a de Jacto standard for the air inter(cid:173)
`face and the software that controls it,
`thereby ensuting interoperability between
`devices of different manufacturers. The first
`products ro use MC link technology will
`emerge at the end ofl999 in mobile phones,
`computers
`and
`accessories
`notebook
`(Figure 1).
`
`Box A
`Abbreviations
`Asynchronous connectionless
`Automatic retransmission query
`Continuous variable slope delta
`Digital signal processor
`Forward error correction
`Frequency hop
`Frequency shift keying
`Header error correction
`Handheld personal computer
`Infrared Data Association
`Industrial Scientific Medical
`Media access control
`Multicommunicator
`Personal computer
`Personal digital assistant
`Radio frequency
`Synchronous connection(cid:173)
`oriented
`Special interest group
`Time division duplex
`Time division multiplex
`
`...--
`
`ACL
`ARQ
`CVSD
`DSP
`FEC
`FH
`FSK
`HEC
`HPC
`IrDA
`ISM
`MAC
`MC
`PC
`PDA
`RF
`SCO
`
`SIG
`TDD
`TDM
`
`Box B
`The Bluetooth consortium-promoters and adopters
`
`The promoters of the Bluetooth* consortium formed a special interest group (SIG) at Ericsson
`Inc., Research Triangle Park, North Carolina, on February 4, 1998.
`The consortium was announced to the public on May 20 and 21, 1998. Many companies have
`since joined the consortium as adopters of the technology (status as of July 11, 1998):
`
`Promoter
`Promoter
`Promoter
`Promoter
`Promoter
`
`Ericsson
`Intel
`IBM
`Nokia
`Toshiba
`3Com
`Axis
`BreezeCOM
`Casio
`Cambridge consultantsLtd.
`CETECOM GmbH
`Cirrus Logic
`Compaq Computer Corp.
`Convergence Corporation
`Deli Computer Corp.
`InnoLabs Corporation
`Jeeves Telecom Ltd .
`Lucent Technologies UK Ltd .
`Metricom
`Motorola
`NeoParadigm Labs, Inc.
`
`Ericsson Review No.3, 1998
`
`Plantronics
`Psion
`Puma Technologies
`Quadriga
`Qualcomm, Inc.
`Samsung Electronics Ltd .
`Siemens Forsvarsystem A/S
`Symbian
`Symbionics Ltd .
`T-Span System
`Temic Semiconductor
`TDK
`TIP Communications Ltd.
`Universal Empowering Technologies
`VLSI Technology, Inc.
`Xircom
`
`* The name, Bluetooth, was taken from Har(cid:173)
`ald Blatand, a Danish Viking king from the
`early Middle Ages .
`
`111
`
`SONY Exhibit 1007 - 0004
`
`
`
`fk
`
`I
`I
`
`pOel
`1
`
`I
`I
`I
`I
`I
`I
`I
`
`,7-'-----i
`I: I
`:.
`
`!
`
`I
`
`625 IlS
`
`Figure 2
`Frequency-hop/time-division-duplex channel.
`
`Box C User scenarios
`
`Three-in-one phone-use the same phone
`everywhere
`When you are at the office, your phone func(cid:173)
`tions as an intercom (no telephony charge).
`At home, it functions as a cordless phone
`(fixed-line charge). When you are on the move,
`it functions as a mobile phone (cellular
`charge).
`
`Internet bridge-surf the Internet regardless
`of the connection
`Use your portable PC to surf the Intemet any(cid:173)
`where, regardless of whether you are con(cid:173)
`nected wirelesslythrough a mobile phone (cel(cid:173)
`lular) or through a wired connection (PSTN,
`ISDN, LAN, xDSL).
`
`Interactive conference-connect every par(cid:173)
`ticipant for instant data exchange
`In meetings and at conferences, you can
`share information instantly with other partici(cid:173)
`pants. You can also operate a projector
`remotely without wire connectors.
`
`The ultimate headset-a cordless headset
`keeps your hands free
`Connect a headset to your mobile PC or to any
`wired connection and free your hands for more
`important tasks at the office or in your car.
`
`the briefcase. When your portable PC
`receives an e-mail message, you will be noti(cid:173)
`fied by your mobile phone. You can also use
`the phone to browse incoming e-mail and read
`messages.
`
`Forbidden message (hidden computing 2)
`Compose e-mail on your PC while you are on
`an airplane. When you land and are allowed
`to switch on your mobile phone, the messages
`are sent immediately.
`
`Automatic synchronization (hidden
`computing 3)
`Automatically synchronize your desktop com(cid:173)
`puter, portable PC, notebook (PDA or HPC) and
`mobile phone. As soon as you enter the office,
`the address list and calendar in your notebook
`automatically updates the files on your desk(cid:173)
`top computer or vice versa.
`
`Instant postcard-send photos and video
`clips instantly from any location
`Connect a camera cordlessly to your mobile
`phone or to any wire-bound connection. Add
`comments from your mobile phone, a note(cid:173)
`book, or portable PC and send them instant(cid:173)
`ly to a recipient anywhere in the world. Suit(cid:173)
`able for professional and personal use.
`
`Portable PC speakerphone
`Connect cordless headsets to your portable
`PC and use it as a speakerphone regardless
`of whether you are in the office, your car, or
`at home.
`Briefcase trick (hidden computing 1)
`Access e-mail while your portable PC is still in
`
`Cordless desktop-connect all peripheral
`tools to your PC or the LAN
`Connect your desktop/laptop computer cord(cid:173)
`lessly to printers, scanners and the LAN.
`Increase your sense of freedom through
`cordless mouse and keyboard connections to
`your PC.
`
`112
`
`fk+2
`
`The Bluetooth air interface
`
`fk+l
`I
`~-'-----I
`II
`I
`I
`I
`I
`
`I
`I
`I
`
`pOel
`.:
`
`I
`
`I
`
`I
`I
`I
`I
`I
`I
`I
`
`I
`
`hOel
`1
`:l-i -----:
`:
`
`~
`t
`
`~
`t
`
`The focus of user scenarios envisioned for
`first-generation products is typically on
`traveling business people. Portable devices
`that contain Bluerooth radios would enable
`them to leave cables and connectors at home
`(Box C). Before the air interface for Blue(cid:173)
`tooth could be designed, however, certain
`requirements had to be settled:
`• The system must operate worldwide.
`• The connection must suppOrt voice and
`data-for insrance, for multimedia appli(cid:173)
`cations.
`• The radio transceiver must be small and
`operate at low power. That is, the radio
`must fit into small, portable devices, such
`as mobile phones, headsets and personal
`digital assistants (PDA).
`
`License-free band
`To operate worldwide, the required fre(cid:173)
`quency band must be available globally.
`Further, it must be license-free and open to
`any radio system. The only frequency band
`that
`satisfies
`these
`requirements
`is
`at 2.45 GHz-the Industrial-Scientific(cid:173)
`Medical (ISM) band , which ranges from
`2,400 to 2,48 3.5 MHz in the US and Eu(cid:173)
`rope (only parts of this band ate available in
`to
`France and Spain), and from 2,471
`2,497 MHz in Japan. Consequently, the
`system can be used worldwide, given that
`the radio transceivers cover the frequency
`band between 2,400 and 2,500 MHz and
`that they can select the proper seg ment in
`this band.
`
`Frequency hopping
`Since the ISM band is open to anyone, radio
`systems operating in this band must cope
`with several unpredictable sources of inter(cid:173)
`ference, such as baby monitors, garage door
`openers, cordless phones and microwave
`ovens (the strongest source of interference).
`Interference can be avoided using an adap(cid:173)
`tive scheme that finds an unused part of the
`spectrum, or it can be suppressed by means
`of spectrum spreading. In the US, radios op(cid:173)
`erating in the 2.45 GHz ISM band are re(cid:173)
`quired to apply spectrum-spreading tech(cid:173)
`niques if their transmitted power levels ex(cid:173)
`ceed 0 dBm.
`Bluetooth radios use frequency-hop (FH)
`spread spectrum, since this technology bet(cid:173)
`ter supports low-cost, low-power radio im(cid:173)
`plementations. Frequency-hop systems di(cid:173)
`vide the frequency band into several hop
`channels. During a connection, radio trans(cid:173)
`ceivers hop from one channel to another in
`a pseudo-random fashion . The instanta(cid:173)
`neous
`(hop) bandwidth
`small
`1S
`1ll
`frequency-hop radios, but spreading is usu(cid:173)
`ally obtained over the entire frequency band.
`This results in low-cost, narrowband trans(cid:173)
`ceivers with maximum immunity to inter(cid:173)
`ference. Occasionally, interference jams a
`hop channel, causing faulty reception.
`When this occurs, error-correction schemes
`in the link restore bit errors.
`
`Channel definition
`frequency(cid:173)
`a
`Bluetooth
`channels use
`hoplrime-division-duplex (FH/TDD) scheme
`(Figure 2). The channel is divided into
`625 JlS intervals-called slots-where a dif(cid:173)
`ferent hop frequency is used for each slot.
`This gives a nominal hop rate of 1,600 hops
`per second. One packet can be transmitted
`
`Ericsson Review No.3, 1998
`
`SONY Exhibit 1007 - 0005
`
`
`
`per interval/slot. Subsequent slots are alter(cid:173)
`nately used for transmitting and receiving,
`which results in a TDD scheme.
`Two or more units sharing the same chan(cid:173)
`nel form a piconet, where one unit acts as a
`master, controlling traffic on the piconet,
`and the other units act as slaves. The
`frequency-hop channel is determined by the
`frequency-hop sequence (the order in which
`hops are visited) and by the phase in this se(cid:173)
`quence . In Bluetooth, the sequence is de(cid:173)
`termined by the identi ty of the piconet mas(cid:173)
`ter and phase is determined by the master
`unit's system clock (Figure 3). In order to
`create the master clock in the slave unit, the
`slave may add an offset to its own native
`repetition
`interval of the
`clock. The
`frequency-hop sequence, which is very long
`(more than 23 hours), is determined by the
`clock. If every participant on a given chan(cid:173)
`nel uses the same identity and clock as input
`to the hop-selection box, then each unit will
`consistently select the same hop carrier and
`remain synchronized. Every piconet has a
`unique set of master parameters which cre(cid:173)
`ate a unique channel.
`The channel makes use of several, equal(cid:173)
`ly spaced, 1 MHz hops. With Gaussian(cid:173)
`shaped frequency shift keying (FSK) modu(cid:173)
`lation, a symbol rate of 1 Mbit/s can be
`achieved. In countries where the open band
`is 80 MHz or broader, 79 hop carriers have
`been defined. In countries where the band
`is narrower 0apan, France, and Spain), only
`23 hop carriers have been defined (Table 1).
`On average, the frequency-hop sequence vis(cid:173)
`its each carrier with equal probability.
`
`Packet definition
`In each slot, a packet can be exchanged be(cid:173)
`tween the master unit and one of the slaves.
`Packets have a fixed format (Figure 4). Each
`packet begins with a 72-bit access code that
`is derived from the master identity and is
`unique for the channel. Every packet ex(cid:173)
`changed on the channel is preceded by this
`access code. Recipients on the piconet com(cid:173)
`pare incoming signals with the access code.
`If the two do not match, the received pack(cid:173)
`et is not considered valid on the channel and
`the rest of its contents are ignored. Besides
`packet identification, the access code is also
`used for synchronization and compensating
`for offset. The access code is very robust and
`resistant to interference. Correlation of the ac(cid:173)
`cess code by recipients provides similar pro(cid:173)
`cessing gains as direct-sequence spreading.
`A header trails the access code. It contains
`important control information, such as a
`
`Ericsson Review No. 3, 1998
`
`Hop selection
`
`I Native CLK I -$ - - Phase
`Sequence
`
`-Hop
`
`Offset
`
`I Master Identity I
`
`Figure 3
`Hop selection scheme: In the selection box,
`the master identity selects the sequence,
`and the clock selects the phase.
`Combined, they give the hop carrier to be
`used.
`
`Parameters
`
`Values
`
`IModulation
`
`II
`
`G-FSK, h:5 0.35
`
`I
`1 Mbitjs
`Ipeak data rate II
`IRF bandwidth 11220 kHz (-3dB), 1 MHz (-20 dB)1
`
`IRF band
`
`II
`
`2.4 GHz, ISM band
`
`I RF carriers
`II
`Icarrier spacing I I
`Ipeak TX power II
`
`23/79
`1 MHz
`:5 20 dBm
`
`I
`
`I
`I
`I
`
`Table 1
`Radio parameters.
`
`three-bit media-access-control (MAC) ad(cid:173)
`dress, packet type, flow control bits, bits for
`the automatic-retransmission-query (ARQ)
`scheme and a header-error-check (HEC)
`field (Figure 5). The header, whose length
`is fixed at 54 bits, is protected by a one-third
`rate forward-error-correction (FEC) code.
`Payload mayor may not trail the' header.
`The length of the payload may vary from 0
`to 2,745 bits.
`To support high data rates, multi-slot
`packets have been defined . A packet can
`cover one slot, three slots, or five slots. Pack(cid:173)
`ets are always sent on a single-hop carrier.
`For multi-slot packets, the hop carrier is
`used as applied in the first slot. After the
`multi-slot packet, the channel continues on
`the hop as dictated by the master clock. For
`example, let us consider four slots: k, k+ 1,
`k+2 and k+ 3. Ordinarily, these would be as(cid:173)
`sociated with hop frequencies Ik' Ik+l' 1k+2
`and/k+3' However, a three-slot packet that
`starts in slot k uses Ik for the entire packet.
`The next packet begins in slot k+ 3 and uses
`1k+ 3'
`
`Physical link definition
`Two types of link have been defined for sup(cid:173)
`porting multimedia applications that mix
`voice and data:
`• synchronous connection-oriented (SCO)
`link;
`
`72 bits 54 bits ,---__ --'0"--=2.!...74"'5"--"b-'-'it"'s ___ ---,
`
`-----'
`
`DDL-I _ _
`
`Access Packet
`code
`header
`
`Payload
`
`Figure 4
`Fixed packet format.
`
`Figure 5
`Header fields.
`
`3
`
`4
`
`1
`
`1
`
`1
`
`I M_ADDR I~I Flow IIARQNIISEQNII
`
`8
`
`HEC
`
`113
`
`SONY Exhibit 1007 - 0006
`
`
`
`Type
`
`DMl
`DHl
`
`DM3
`
`DH3
`DM5
`
`DH5
`
`Symmetric
`(kbit/s)
`
`Asymmetric
`(kbit/s)
`
`108.8
`
`172.8
`
`256.0
`384.0
`
`286.7
`
`432.6
`
`108.8
`
`172.8
`
`384.0
`
`576.0
`477.8
`
`721.0
`
`108.8
`
`172.8
`
`54.4
`86.4
`
`36.3
`
`57.6
`
`Table 2
`Achievable data rates (in kbitjs) on the ACL
`link.
`
`Figure 6
`SCO and ACL links in a piconet with one
`master and two slaves.
`
`• asynchronous connectionless (ACL) link.
`sca links support symmetrical, circuit(cid:173)
`swi tched, point-to-point connections typi(cid:173)
`cally used for voice. These links are defined
`on the channel by reserving two consecutive
`slots (forward and return slots) at fixed in(cid:173)
`tervals.
`ACL links suppOrt symmetrical or asym(cid:173)
`point-to(cid:173)
`metrical,
`packet-switched,
`multipoint connections typically used for
`bursty data transmission. Master units use
`a polling scheme to control ACL connec(cid:173)
`tions.
`A set of packets has been defined for each
`physical link.
`• For sca links, three kinds of single-slot
`voice packet have been defined, each of
`which carries voice at a rate of 64 kbit/s.
`Voice is sent unprotected , but if the sca
`interval is decreased, a forward-error(cid:173)
`correction rate of 2/3 or 1/3 can be se(cid:173)
`lected.
`• For ACL links, I-slot, 3-slot, and 5-slot
`data packets have been defined. Data can
`be sent either unprotected or protected by
`a 2/3 forward-error-correction rate. The
`maximum data rate-721 kbitls in one
`direction and 57.6 kbitls in the reverse di(cid:173)
`rection-is obtained from an unprotect(cid:173)
`ed, 5-slot packet. Table 2 summarizes the
`data rates that can be obtained from ACL
`links. DMx
`represents x-slot, FEC(cid:173)
`encoded data packets; DHx represents un(cid:173)
`protected data packets.
`Figure 6 depicts mixed sca and ACL links
`on a piconet with one master and two slaves.
`Slave 1 supports an ACL link and an sca
`link with a six-slot sca interval. Slave 2
`only supports an ACL link. Note: slots may
`be empty when no data is available.
`
`Interference immunity
`As mentioned above, the Bluetooth radio
`mUSt operate in an open band that is sub-
`
`1 sco 1
`
`ACL
`
`1 sco 1
`
`ACL
`
`Master
`
`Slave 1
`
`Slave 2
`
`114
`
`ject to considerable uncontrolled interfer(cid:173)
`ence. Thus, the air interface has been opti(cid:173)
`mized to deal with interference.
`• Frequency hopping techniques are ap(cid:173)
`plied with a high hopping rate and short
`packet lengths (1,600 hopsls for single(cid:173)
`slot packets). If a packet is lost, only a
`small portion of the message is lost.
`• Packets can be ptotected by forward error
`COntrol.
`• Data packets are protected by an ARQ
`scheme in which lost data packets are au(cid:173)
`tomatically retransmitted. The recipient
`checks each received packet for errors. If
`errors are detected, it indicates this in the
`header of the return packet. This results
`in a fast ARQ scheme-delays are only
`one slot in duration , and only packets that
`have been lost need to be retransmitted .
`• Voice is never retransmitted. Instead, a ro(cid:173)
`bust voice-encoding scheme is used. This
`scheme, which is based on continuous
`variable slope delta (CVSD) modulation,
`follows the audio waveform (Figure 7) and
`is very resistant to bit errors- errors are
`perceived as background noise, which in(cid:173)
`tensifies as bit errors increase.
`
`Networking
`Piconets
`Bluetooth units that are within range of each
`other can set up ad hoc connections. In prin(cid:173)
`ciple, each unit is a peer with the same hard(cid:173)
`ware capabilities (unlike cellular systems,
`there is no distinction between terminals
`and base stations). Two or more Bluetooth
`uni ts that share a channel form a piconet. To
`regulate traffic on the channel, one of the
`participating units becomes a master of the
`piconet. Any unit can become a master, but
`by definition, the unit that establishes the
`piconet assumes this role. All other partici(cid:173)
`pants are slaves. Participants may change
`roles if a slave unit wants to take over the
`master role. Nonetheless, only one master
`may exist in a piconet at any time.
`Every unit in the piconet uses the master
`identity and clock to track the hopping
`channel. Each unit also has its own (native),
`free-running clock. When a connection is
`established, a clock offset is added to syn(cid:173)
`chronize the slave clock with the master
`clock. The native clock is never adjusted,
`however, and offsets are solely valid for the
`duration of the conneCtion.
`Master units control all traffic on a chan(cid:173)
`nel. They allocate capacity for sca links by
`reserving slots. For ACL links, they use a
`
`Ericsson Review No.3, 1998
`
`SONY Exhibit 1007 - 0007
`
`
`
`polling scheme. A slave is only permirred to
`send in the slave-eo-master slot when it has
`been addressed by its MAC address in the
`preceding master-eo-slave sloe. A master-to(cid:173)
`slave packet implicitly polls the slave; that
`is , an ordinary traffic packet addressed to a
`slave polls the slave automatically. If no in(cid:173)
`formation eo the slave is available, the mas(cid:173)
`ter can use a POLL packet to poll the slave
`explicitly. POLL packets consist of an access
`code and header only. This central polling
`scheme eliminates collisions between slave
`transmissions.
`
`Establishing connection
`When units are not participating in a pi co(cid:173)
`net, they enter standby mode, from which
`state they periodically listen for page mes(cid:173)
`sages. Feom the eocal set of79 (23) hop car(cid:173)
`riers, a subset of 32 (16) wake-up carriers
`has been defined. The subset, which is cho(cid:173)
`sen pseudo-randomly, is determined by the
`unit identity. Over the wake-up carriers, a
`wake-up sequence visits each hop carrier
`once: the sequence length is 32 (16) hops.
`Every 2,048 slots (1.28 s), standby units
`move their wake-up hop carrier forward one
`hop in the wake-up sequence. The native
`clock of the unit determines the phase of the
`wake-up sequence. During the listening in(cid:173)
`terval , which lasts for 18 slots or 11.25 ms,
`the unit listens on a single wake-up hop car(cid:173)
`rier and correlates incoming signals with the
`access code derived from its own identity. If
`the correlaeor triggers-that is , if most of
`the received bits match the access code-the
`unit activates
`itself and
`invokes
`a
`connection-secup procedure. Otherwise, the
`unit recurns eo sleep until the next wake-up
`evene.
`Units connecting ro a unit in standby
`mode must know the standby unit's identi(cid:173)
`ty and preferably its native clock
`• ro generate the required access code
`(which constitutes the paging message);
`• ro derive the wake-up sequence;
`• to predict the phase of this sequence.
`Since paging units cannot accurately know
`the native clock of a recipient, they must re(cid:173)
`solve the time-frequency uncertainty. They
`do so by transmitting the access code con(cid:173)
`tinuously-not only in the hop in which
`they expect the recipient to wake up , but
`also in hops before and after. For a period of
`10 ms, paging units transmit the access code
`sequentially on several hop frequencies
`around the expected hop carrier. Note: the
`access code is only 72 bits long (72 ms).
`Therefore, many codes can be sent in the
`
`Ericsson Review No.3, 1998
`
`Scatternet
`Users of a channel must share capacity. Al(cid:173)
`though channels are 1 MHz wide, as more
`and more users are added, throughput per
`Llser quickly drops to less than a few tens of
`kbit/s. Furthermore, although the medium
`available bandwidth is 80 MHz in the US
`and Europe (slighcly less in Japan, France
`and Spain), it cannot be used efficiently
`when every unit must share the same 1 MHz
`hop channel. Therefore, another solution
`was adopted.
`
`110000001011111010000111000101010 ..... . .
`
`Figure 7
`Continuous variable slope delta (CVSO) wave(cid:173)
`form coding.
`
`space of 10 ms. The 10 ms train of access __
`codes on different hop carriers is transmit-
`ted repeatedly until the recipient responds
`or a time-out is exceeded .
`When a paging unit and recipient select
`the same wake-up carrier, the recipient re(cid:173)
`ceives the access code and returns an ac(cid:173)
`knowledgement. The paging unit then
`sends a packet containing its identity and
`its current clock. After the recipient ac(cid:173)
`knowledges this packet, each unit uses the
`paging unit's parameters for hop selec(cid:173)
`tion-thereby establishing a piconet in
`which the paging unit acts as the master.
`To establish a connection, the paging unit
`must obtain the identity of units within
`transmission range. Therefore, it executes an
`inquiry procedure: the paging unit trans(cid:173)
`mits an inquiry access code (which is com(cid:173)
`mon ro all Bluetooth devices) on the inquiry
`wake-up carriers. When a recipient receives
`the inquiry, it returns a packet containing
`its identity and clock-the very opposite of
`the paging procedure. After having gath(cid:173)
`ered each response, the paging unit can then
`select a specific unit to page (Figure 8).
`
`Figure 8
`Connection-establishment procedure and
`maximum time associated with establishing
`a connection.
`
`~-.... S
`
`\
`/
`(Inquiry , - Page
`,-_ .....
`
`-
`
`Typical
`
`5.12 s
`
`0.64 s
`
`0.1-300 minutes
`
`Max.
`
`15.36 s
`
`7.68 s
`
`115
`
`SONY Exhibit 1007 - 0008
`
`
`
`,
`'
`--4---------_...,
`I
`I
`
`I . . . . .
`I
`I
`I
`
`,
`
`........
`' . . . . . . . . . . /
`' , , , , /
`"
`/ /
`.,/
`" I "
`V
`I"
`
`I
`I
`I
`I
`\
`\
`/ "
`~ /1
`'..........
`~"./
`Mouse -
`- ....
`
`/ "
`
`....-'
`
`______ _
`_--~ '
`\
`I
`I
`I
`
`. "
`
`/
`
`Printer
`
`/
`
`/
`
`/
`/ /
`/ /
`
`Access ~o~n~ ~
`//('' ')./'" __ 0y ------__ _
`---
`
`I
`
`_ _
`
`, __ -
`
`-
`
`-
`
`-
`
`-
`
`Mobile phone
`
`LAN
`
`,
`
`, , _ _
`
`Headset
`
`..... t-..........
`" .....
`
`I
`/Laptop
`- - -
`
`---
`
`- - - .....
`
`",
`
`/",/
`
`...............
`
`Figure 9
`A scatternet of four piconets applied to the
`scenario described in Figure 1. -
`
`Units that share the same area and that
`are within range of one another can poten(cid:173)
`tially establish ad hoc connections between
`themselves. However, only those units that
`truly want to exchange information share
`the same channel (piconet). This solution
`permits several piconets to be created with
`overlapping areas of coverage. Each piconet
`adheres
`to
`its own hopping sequence
`through the 80 MHz medium. The channel
`in each piconet hops pseudo-randomly over
`the carriers in the 80 MHz band. The users
`in each piconet have only a 1 MHz hop chan(cid:173)
`nel at their disposal.
`A group of piconets is called a scatternet.
`Aggregate and individual throughput of
`users in a scatternet is much greater than
`when each user participates on the same pi(cid:173)
`conet with a 1 Mbit/s channel. Additional
`gains are obtained by statistically multi(cid:173)
`plexing hop channels and by reusing chan(cid:173)
`nels. The 1 MHz hop channel in any given
`
`Hop selection
`
`I Native eLK I-$-- Phase
`
`-
`
`Hop
`
`Sequence 1
`
`Identity X
`
`Piconet X
`
`Offset X
`
`Figure 10
`Hop selection in inter-piconet communica(cid:173)
`tion.
`
`Piconet Y
`
`Offset Y
`
`Identity Y
`
`Piconet Z
`
`Offset Z
`
`Identity Z
`
`116
`
`piconet need only be shared by users of that
`piconet. Because individual piconets hop
`differently, different piconets can simulta(cid:173)
`neously use different hop channels. Conse(cid:173)
`quently, units in one piconet do not share
`their 1 MHz channel with units 'in anothe