throbber

`
`Bluetooth-The universal radio interface for ad hoc, wireless connectivity
`
`) 3,1998
`
`Internet directory services with click-to-dial
`
`Jambala-Intelligence beyond digital wireless
`
`ERION-Ericsson optical networking using WDM technology
`
`Access 910 system
`
`SONY Exhibit 1007 - 0001
`
`

`

`The telecommunications
`technology journal
`
`The purpose of Ericsson Review is to
`report on the research, development
`and production achievements made in
`telecommunications technology at
`Ericsson. The journal is published in
`English and Spanish and distributed
`quarterly to readers in more than 130
`countries.
`
`Address:
`Telefonaktiebolaget LM Ericsson
`S-126 25 Stockholm, Sweden
`
`Tel: +46 8 719 00 00
`
`Fax: +46868 1 27 10
`
`Internet address:
`http://www.ericsson.com/Review
`
`Publisher: Lars A. Sdllberg
`
`Editorial board: Hans Alberg, Greger
`Berg, Tom Boothe, Mikael Back,
`Philippe Charas, Jonas Hermansson,
`Anders Hidmark, Lena Krogstad, Filip
`Lindell, Bo Malmberg, Mats Nilsson,
`Eric Peterson, Goran Rassmuson,
`Michele Schmidt, Ole Segrnan, Sture
`Sjostrom, Bengt Stavenow, Lars(cid:173)
`Gunnar Sundin, Peter Svard
`
`Editor: Eric Peterson
`
`Production manager: Eva Karlstein
`
`Layout: Paues Media, Stockholm
`
`Printer: Ljungforetagen, Orebro
`
`ISSN: 0014-0171
`
`Volume: 75,1998
`
`Cover: Bluecooth technology substitutes a
`universal short-range radio link for the
`many proprietary cables that are presently
`used for connecting devices. But more than
`this, BluetOoth radio rechnology provides a
`universal bridge to existing data networks,
`a peripheral interface, and a mechanism for
`forming small ad hoc groupings of connect(cid:173)
`ed devices away from fixed nerwork infra(cid:173)
`structures.
`
`© Telefonakriebolager LM Ericsson
`
`Contents
`
`Bluetooth- The universal radio interface for ad hoc,
`wireless connectivity
`Imagine a cheap, power-efficient radio chip that is small enough to fit inside
`any electronic device or machine and that provides local connectivity. Bluetooth
`is a universal radio interface in the 2.45 GHz frequency band that enables
`portable electronic devices to connect and communicate wirelessly via ad hoc
`Page 11.0
`networks.
`
`--
`
`Internet directory services with click-to-dial
`Internet directory services make available vast resources of the Internet, helping
`users to save valuable time in finding names, e-mail addresses, and so forth. Click(cid:173)
`to-dial services allow users to invoke calls by clicking on the phone number they
`retrieve using directory services. Ericsson's solution sets up and transmits calls via
`Page 118
`the PSTN, but it is equally compatible with VoIP.
`
`Intelligence beyond digital wireless
`Jambala-
`Jambala is the next-generation application platform that operators need to provide
`new, high-value services in an increasingly segmented end-user market. Jambala
`provides a unique combination of availability, reliability, scalability and Internet
`Page 126
`readiness-all using commercially available hardware.
`
`ERION- Ericsson optical networking using WDM
`technology
`Ericsson maintains a simple, pragmatic approach to networking as they further ex(cid:173)
`plore and exploit dense WDM technology and optical networking . Ericsson's next(cid:173)
`generation transport-network technology-ERION-enables operators to derive
`maximum benefit from investments in client technology, while simplifying net-
`Page 132
`works and improving traffic protection and routing functionality.
`
`Access 910 system
`Ericsson's Access 910 is a general-purpose, access-network system that provides
`PSTN, Internet, VoIP, ATM, and switched video broadcast capabilities to a wide
`range of service networks. The suppOrt it provides for practical, cost-effective mi(cid:173)
`g ration from narrowband to broadband services makes it ideal for present-day and
`Page 138
`future telecom environments.
`
`Ericsson Review No .3, 1998
`
`107
`
`SONY Exhibit 1007 - 0002
`
`

`

`Bluetooth-The universal radio interface for
`ad hoc, wireless connectivity
`
`Jaap Haartsen
`
`Bluetooth is a universal radio interface in the 2.45 GHz frequency band that
`enables portable electronic devices to connect and communicate wirelessly
`via short-range, ad hoc networks. Each unit can siinultaneously communi(cid:173)
`cate with up to seven other units per piconet. Moreover, each unit can
`simultaneously belong to several piconets.
`Bluetooth technology-which apart from Ericsson, has gained the support
`of Nokia, IBM, Toshiba, Intel and many other manufacturers-eliminates the
`need for wires, cables and connectors for and between cordless or mobile
`phones, modems, headsets, PDAs, computers, printers, projectors, local
`area networks, and so on, and paves the way for new and completely differ(cid:173)
`ent devices and applications.
`Before guiding us through frequency-hopping technology and the channel,
`packet and physical-link definitions that characterize the Bluetooth air inter(cid:173)
`face, the author briefly describes the conditions that led up to the develop(cid:173)
`ment of Bluetooth. He then -acquaints us with the networking aspects of
`Bluetooth technology, describing piconets and scatternets, connection pro(cid:173)
`cedures, and inter-piconet communication.
`
`\
`
`Imagine a cheap, power-efficient radio chip
`that is small enough to fit inside any elec(cid:173)
`tronic device or machine, that provides local
`connectivity, and that creates a (worldwide)
`micro-scale web . What applications might
`you use it in?
`In 1994, Ericsson Mobile Communica(cid:173)
`tions AB in Lund, Sweden, initiated a study
`ro investigate the feasibility of a low-power,
`low-cost radio interface between mobile
`phones and their accessories. The intention
`
`LAN
`
`Access point ~
`~
`Headset ~ /
`
`(
`
`was to eliminate cables between phones and
`PC cards, wireless headsets, and so forth.
`The study was part of a larger project that
`investigated multi-communicators con(cid:173)
`nected to the cellular network via cellular
`telephones. The last link in the connection
`between a communicator and the cellular
`network was a short-range radio link to the
`phone-thus, the link was called the multi(cid:173)
`communicator link or MC link. As the MC
`link project progressed, it became clear that
`there was no limit to the kinds of applica(cid:173)
`tion that could use a short-range radio link.
`Cheap, short-range radios would make wire(cid:173)
`less communication between portable de(cid:173)
`vices economically feasib le.
`infrared
`Current portable devices use
`links (IrDA) to communicate with each
`other. Although infrared transceivers are in(cid:173)
`expensive, they
`• have limited range (typically one to tW9
`meters);
`• are sensitive to direction and require
`direct line-of-sight;
`• can in principle only be used between two
`devices.
`By contrast, radios have much greater range,
`can propagate around objects and through
`various materials, and connect to many de(cid:173)
`vices simultaneously. What is more, radio
`interfaces do not require user interaction.
`In the beginning of 1997, when design(cid:173)
`ers had already begun work on an MC link
`
`Cellular network
`
`Mobile phone
`
`Figure 1
`User model with local wireless connectivity.
`Applications envisioned for the near future.
`
`~ Piconet
`
`Mouse
`
`110
`
`Ericsson Review No. 3, 1998
`
`SONY Exhibit 1007 - 0003
`
`

`

`transceiver chip, Ericsson approached other
`manufacturers of portable devices ro raise in(cid:173)
`terest in the technology-for the system ro
`succeed, a critical mass of portable devices
`must use the short-range radio . In February
`1998, five promoters-Ericsson, Nokia,
`IBM, Toshiba and Intel-formed a special
`interest group (SIG). The idea was ro achieve
`a proper mix of business areas: two market
`leaders in mobile telephony, two market
`leaders in laprop computing, and a market
`leader
`in core, digital-signal-processor
`(DSP) technology . OnMay 20 and 21,1998,
`the Bluerooth consortium announced itself
`ro the general public from London, England;
`SanJose, California; and Tokyo,Japan. Since
`then, several companies have joined as
`adopters of the technology (Box B).
`The putpose of the consortium is ro
`establish a de Jacto standard for the air inter(cid:173)
`face and the software that controls it,
`thereby ensuting interoperability between
`devices of different manufacturers. The first
`products ro use MC link technology will
`emerge at the end ofl999 in mobile phones,
`computers
`and
`accessories
`notebook
`(Figure 1).
`
`Box A
`Abbreviations
`Asynchronous connectionless
`Automatic retransmission query
`Continuous variable slope delta
`Digital signal processor
`Forward error correction
`Frequency hop
`Frequency shift keying
`Header error correction
`Handheld personal computer
`Infrared Data Association
`Industrial Scientific Medical
`Media access control
`Multicommunicator
`Personal computer
`Personal digital assistant
`Radio frequency
`Synchronous connection(cid:173)
`oriented
`Special interest group
`Time division duplex
`Time division multiplex
`
`...--
`
`ACL
`ARQ
`CVSD
`DSP
`FEC
`FH
`FSK
`HEC
`HPC
`IrDA
`ISM
`MAC
`MC
`PC
`PDA
`RF
`SCO
`
`SIG
`TDD
`TDM
`
`Box B
`The Bluetooth consortium-promoters and adopters
`
`The promoters of the Bluetooth* consortium formed a special interest group (SIG) at Ericsson
`Inc., Research Triangle Park, North Carolina, on February 4, 1998.
`The consortium was announced to the public on May 20 and 21, 1998. Many companies have
`since joined the consortium as adopters of the technology (status as of July 11, 1998):
`
`Promoter
`Promoter
`Promoter
`Promoter
`Promoter
`
`Ericsson
`Intel
`IBM
`Nokia
`Toshiba
`3Com
`Axis
`BreezeCOM
`Casio
`Cambridge consultantsLtd.
`CETECOM GmbH
`Cirrus Logic
`Compaq Computer Corp.
`Convergence Corporation
`Deli Computer Corp.
`InnoLabs Corporation
`Jeeves Telecom Ltd .
`Lucent Technologies UK Ltd .
`Metricom
`Motorola
`NeoParadigm Labs, Inc.
`
`Ericsson Review No.3, 1998
`
`Plantronics
`Psion
`Puma Technologies
`Quadriga
`Qualcomm, Inc.
`Samsung Electronics Ltd .
`Siemens Forsvarsystem A/S
`Symbian
`Symbionics Ltd .
`T-Span System
`Temic Semiconductor
`TDK
`TIP Communications Ltd.
`Universal Empowering Technologies
`VLSI Technology, Inc.
`Xircom
`
`* The name, Bluetooth, was taken from Har(cid:173)
`ald Blatand, a Danish Viking king from the
`early Middle Ages .
`
`111
`
`SONY Exhibit 1007 - 0004
`
`

`

`fk
`
`I
`I
`
`pOel
`1
`
`I
`I
`I
`I
`I
`I
`I
`
`,7-'-----i
`I: I
`:.
`
`!
`
`I
`
`625 IlS
`
`Figure 2
`Frequency-hop/time-division-duplex channel.
`
`Box C User scenarios
`
`Three-in-one phone-use the same phone
`everywhere
`When you are at the office, your phone func(cid:173)
`tions as an intercom (no telephony charge).
`At home, it functions as a cordless phone
`(fixed-line charge). When you are on the move,
`it functions as a mobile phone (cellular
`charge).
`
`Internet bridge-surf the Internet regardless
`of the connection
`Use your portable PC to surf the Intemet any(cid:173)
`where, regardless of whether you are con(cid:173)
`nected wirelesslythrough a mobile phone (cel(cid:173)
`lular) or through a wired connection (PSTN,
`ISDN, LAN, xDSL).
`
`Interactive conference-connect every par(cid:173)
`ticipant for instant data exchange
`In meetings and at conferences, you can
`share information instantly with other partici(cid:173)
`pants. You can also operate a projector
`remotely without wire connectors.
`
`The ultimate headset-a cordless headset
`keeps your hands free
`Connect a headset to your mobile PC or to any
`wired connection and free your hands for more
`important tasks at the office or in your car.
`
`the briefcase. When your portable PC
`receives an e-mail message, you will be noti(cid:173)
`fied by your mobile phone. You can also use
`the phone to browse incoming e-mail and read
`messages.
`
`Forbidden message (hidden computing 2)
`Compose e-mail on your PC while you are on
`an airplane. When you land and are allowed
`to switch on your mobile phone, the messages
`are sent immediately.
`
`Automatic synchronization (hidden
`computing 3)
`Automatically synchronize your desktop com(cid:173)
`puter, portable PC, notebook (PDA or HPC) and
`mobile phone. As soon as you enter the office,
`the address list and calendar in your notebook
`automatically updates the files on your desk(cid:173)
`top computer or vice versa.
`
`Instant postcard-send photos and video
`clips instantly from any location
`Connect a camera cordlessly to your mobile
`phone or to any wire-bound connection. Add
`comments from your mobile phone, a note(cid:173)
`book, or portable PC and send them instant(cid:173)
`ly to a recipient anywhere in the world. Suit(cid:173)
`able for professional and personal use.
`
`Portable PC speakerphone
`Connect cordless headsets to your portable
`PC and use it as a speakerphone regardless
`of whether you are in the office, your car, or
`at home.
`Briefcase trick (hidden computing 1)
`Access e-mail while your portable PC is still in
`
`Cordless desktop-connect all peripheral
`tools to your PC or the LAN
`Connect your desktop/laptop computer cord(cid:173)
`lessly to printers, scanners and the LAN.
`Increase your sense of freedom through
`cordless mouse and keyboard connections to
`your PC.
`
`112
`
`fk+2
`
`The Bluetooth air interface
`
`fk+l
`I
`~-'-----I
`II
`I
`I
`I
`I
`
`I
`I
`I
`
`pOel
`.:
`
`I
`
`I
`
`I
`I
`I
`I
`I
`I
`I
`
`I
`
`hOel
`1
`:l-i -----:
`:
`
`~
`t
`
`~
`t
`
`The focus of user scenarios envisioned for
`first-generation products is typically on
`traveling business people. Portable devices
`that contain Bluerooth radios would enable
`them to leave cables and connectors at home
`(Box C). Before the air interface for Blue(cid:173)
`tooth could be designed, however, certain
`requirements had to be settled:
`• The system must operate worldwide.
`• The connection must suppOrt voice and
`data-for insrance, for multimedia appli(cid:173)
`cations.
`• The radio transceiver must be small and
`operate at low power. That is, the radio
`must fit into small, portable devices, such
`as mobile phones, headsets and personal
`digital assistants (PDA).
`
`License-free band
`To operate worldwide, the required fre(cid:173)
`quency band must be available globally.
`Further, it must be license-free and open to
`any radio system. The only frequency band
`that
`satisfies
`these
`requirements
`is
`at 2.45 GHz-the Industrial-Scientific(cid:173)
`Medical (ISM) band , which ranges from
`2,400 to 2,48 3.5 MHz in the US and Eu(cid:173)
`rope (only parts of this band ate available in
`to
`France and Spain), and from 2,471
`2,497 MHz in Japan. Consequently, the
`system can be used worldwide, given that
`the radio transceivers cover the frequency
`band between 2,400 and 2,500 MHz and
`that they can select the proper seg ment in
`this band.
`
`Frequency hopping
`Since the ISM band is open to anyone, radio
`systems operating in this band must cope
`with several unpredictable sources of inter(cid:173)
`ference, such as baby monitors, garage door
`openers, cordless phones and microwave
`ovens (the strongest source of interference).
`Interference can be avoided using an adap(cid:173)
`tive scheme that finds an unused part of the
`spectrum, or it can be suppressed by means
`of spectrum spreading. In the US, radios op(cid:173)
`erating in the 2.45 GHz ISM band are re(cid:173)
`quired to apply spectrum-spreading tech(cid:173)
`niques if their transmitted power levels ex(cid:173)
`ceed 0 dBm.
`Bluetooth radios use frequency-hop (FH)
`spread spectrum, since this technology bet(cid:173)
`ter supports low-cost, low-power radio im(cid:173)
`plementations. Frequency-hop systems di(cid:173)
`vide the frequency band into several hop
`channels. During a connection, radio trans(cid:173)
`ceivers hop from one channel to another in
`a pseudo-random fashion . The instanta(cid:173)
`neous
`(hop) bandwidth
`small
`1S
`1ll
`frequency-hop radios, but spreading is usu(cid:173)
`ally obtained over the entire frequency band.
`This results in low-cost, narrowband trans(cid:173)
`ceivers with maximum immunity to inter(cid:173)
`ference. Occasionally, interference jams a
`hop channel, causing faulty reception.
`When this occurs, error-correction schemes
`in the link restore bit errors.
`
`Channel definition
`frequency(cid:173)
`a
`Bluetooth
`channels use
`hoplrime-division-duplex (FH/TDD) scheme
`(Figure 2). The channel is divided into
`625 JlS intervals-called slots-where a dif(cid:173)
`ferent hop frequency is used for each slot.
`This gives a nominal hop rate of 1,600 hops
`per second. One packet can be transmitted
`
`Ericsson Review No.3, 1998
`
`SONY Exhibit 1007 - 0005
`
`

`

`per interval/slot. Subsequent slots are alter(cid:173)
`nately used for transmitting and receiving,
`which results in a TDD scheme.
`Two or more units sharing the same chan(cid:173)
`nel form a piconet, where one unit acts as a
`master, controlling traffic on the piconet,
`and the other units act as slaves. The
`frequency-hop channel is determined by the
`frequency-hop sequence (the order in which
`hops are visited) and by the phase in this se(cid:173)
`quence . In Bluetooth, the sequence is de(cid:173)
`termined by the identi ty of the piconet mas(cid:173)
`ter and phase is determined by the master
`unit's system clock (Figure 3). In order to
`create the master clock in the slave unit, the
`slave may add an offset to its own native
`repetition
`interval of the
`clock. The
`frequency-hop sequence, which is very long
`(more than 23 hours), is determined by the
`clock. If every participant on a given chan(cid:173)
`nel uses the same identity and clock as input
`to the hop-selection box, then each unit will
`consistently select the same hop carrier and
`remain synchronized. Every piconet has a
`unique set of master parameters which cre(cid:173)
`ate a unique channel.
`The channel makes use of several, equal(cid:173)
`ly spaced, 1 MHz hops. With Gaussian(cid:173)
`shaped frequency shift keying (FSK) modu(cid:173)
`lation, a symbol rate of 1 Mbit/s can be
`achieved. In countries where the open band
`is 80 MHz or broader, 79 hop carriers have
`been defined. In countries where the band
`is narrower 0apan, France, and Spain), only
`23 hop carriers have been defined (Table 1).
`On average, the frequency-hop sequence vis(cid:173)
`its each carrier with equal probability.
`
`Packet definition
`In each slot, a packet can be exchanged be(cid:173)
`tween the master unit and one of the slaves.
`Packets have a fixed format (Figure 4). Each
`packet begins with a 72-bit access code that
`is derived from the master identity and is
`unique for the channel. Every packet ex(cid:173)
`changed on the channel is preceded by this
`access code. Recipients on the piconet com(cid:173)
`pare incoming signals with the access code.
`If the two do not match, the received pack(cid:173)
`et is not considered valid on the channel and
`the rest of its contents are ignored. Besides
`packet identification, the access code is also
`used for synchronization and compensating
`for offset. The access code is very robust and
`resistant to interference. Correlation of the ac(cid:173)
`cess code by recipients provides similar pro(cid:173)
`cessing gains as direct-sequence spreading.
`A header trails the access code. It contains
`important control information, such as a
`
`Ericsson Review No. 3, 1998
`
`Hop selection
`
`I Native CLK I -$ - - Phase
`Sequence
`
`-Hop
`
`Offset
`
`I Master Identity I
`
`Figure 3
`Hop selection scheme: In the selection box,
`the master identity selects the sequence,
`and the clock selects the phase.
`Combined, they give the hop carrier to be
`used.
`
`Parameters
`
`Values
`
`IModulation
`
`II
`
`G-FSK, h:5 0.35
`
`I
`1 Mbitjs
`Ipeak data rate II
`IRF bandwidth 11220 kHz (-3dB), 1 MHz (-20 dB)1
`
`IRF band
`
`II
`
`2.4 GHz, ISM band
`
`I RF carriers
`II
`Icarrier spacing I I
`Ipeak TX power II
`
`23/79
`1 MHz
`:5 20 dBm
`
`I
`
`I
`I
`I
`
`Table 1
`Radio parameters.
`
`three-bit media-access-control (MAC) ad(cid:173)
`dress, packet type, flow control bits, bits for
`the automatic-retransmission-query (ARQ)
`scheme and a header-error-check (HEC)
`field (Figure 5). The header, whose length
`is fixed at 54 bits, is protected by a one-third
`rate forward-error-correction (FEC) code.
`Payload mayor may not trail the' header.
`The length of the payload may vary from 0
`to 2,745 bits.
`To support high data rates, multi-slot
`packets have been defined . A packet can
`cover one slot, three slots, or five slots. Pack(cid:173)
`ets are always sent on a single-hop carrier.
`For multi-slot packets, the hop carrier is
`used as applied in the first slot. After the
`multi-slot packet, the channel continues on
`the hop as dictated by the master clock. For
`example, let us consider four slots: k, k+ 1,
`k+2 and k+ 3. Ordinarily, these would be as(cid:173)
`sociated with hop frequencies Ik' Ik+l' 1k+2
`and/k+3' However, a three-slot packet that
`starts in slot k uses Ik for the entire packet.
`The next packet begins in slot k+ 3 and uses
`1k+ 3'
`
`Physical link definition
`Two types of link have been defined for sup(cid:173)
`porting multimedia applications that mix
`voice and data:
`• synchronous connection-oriented (SCO)
`link;
`
`72 bits 54 bits ,---__ --'0"--=2.!...74"'5"--"b-'-'it"'s ___ ---,
`
`-----'
`
`DDL-I _ _
`
`Access Packet
`code
`header
`
`Payload
`
`Figure 4
`Fixed packet format.
`
`Figure 5
`Header fields.
`
`3
`
`4
`
`1
`
`1
`
`1
`
`I M_ADDR I~I Flow IIARQNIISEQNII
`
`8
`
`HEC
`
`113
`
`SONY Exhibit 1007 - 0006
`
`

`

`Type
`
`DMl
`DHl
`
`DM3
`
`DH3
`DM5
`
`DH5
`
`Symmetric
`(kbit/s)
`
`Asymmetric
`(kbit/s)
`
`108.8
`
`172.8
`
`256.0
`384.0
`
`286.7
`
`432.6
`
`108.8
`
`172.8
`
`384.0
`
`576.0
`477.8
`
`721.0
`
`108.8
`
`172.8
`
`54.4
`86.4
`
`36.3
`
`57.6
`
`Table 2
`Achievable data rates (in kbitjs) on the ACL
`link.
`
`Figure 6
`SCO and ACL links in a piconet with one
`master and two slaves.
`
`• asynchronous connectionless (ACL) link.
`sca links support symmetrical, circuit(cid:173)
`swi tched, point-to-point connections typi(cid:173)
`cally used for voice. These links are defined
`on the channel by reserving two consecutive
`slots (forward and return slots) at fixed in(cid:173)
`tervals.
`ACL links suppOrt symmetrical or asym(cid:173)
`point-to(cid:173)
`metrical,
`packet-switched,
`multipoint connections typically used for
`bursty data transmission. Master units use
`a polling scheme to control ACL connec(cid:173)
`tions.
`A set of packets has been defined for each
`physical link.
`• For sca links, three kinds of single-slot
`voice packet have been defined, each of
`which carries voice at a rate of 64 kbit/s.
`Voice is sent unprotected , but if the sca
`interval is decreased, a forward-error(cid:173)
`correction rate of 2/3 or 1/3 can be se(cid:173)
`lected.
`• For ACL links, I-slot, 3-slot, and 5-slot
`data packets have been defined. Data can
`be sent either unprotected or protected by
`a 2/3 forward-error-correction rate. The
`maximum data rate-721 kbitls in one
`direction and 57.6 kbitls in the reverse di(cid:173)
`rection-is obtained from an unprotect(cid:173)
`ed, 5-slot packet. Table 2 summarizes the
`data rates that can be obtained from ACL
`links. DMx
`represents x-slot, FEC(cid:173)
`encoded data packets; DHx represents un(cid:173)
`protected data packets.
`Figure 6 depicts mixed sca and ACL links
`on a piconet with one master and two slaves.
`Slave 1 supports an ACL link and an sca
`link with a six-slot sca interval. Slave 2
`only supports an ACL link. Note: slots may
`be empty when no data is available.
`
`Interference immunity
`As mentioned above, the Bluetooth radio
`mUSt operate in an open band that is sub-
`
`1 sco 1
`
`ACL
`
`1 sco 1
`
`ACL
`
`Master
`
`Slave 1
`
`Slave 2
`
`114
`
`ject to considerable uncontrolled interfer(cid:173)
`ence. Thus, the air interface has been opti(cid:173)
`mized to deal with interference.
`• Frequency hopping techniques are ap(cid:173)
`plied with a high hopping rate and short
`packet lengths (1,600 hopsls for single(cid:173)
`slot packets). If a packet is lost, only a
`small portion of the message is lost.
`• Packets can be ptotected by forward error
`COntrol.
`• Data packets are protected by an ARQ
`scheme in which lost data packets are au(cid:173)
`tomatically retransmitted. The recipient
`checks each received packet for errors. If
`errors are detected, it indicates this in the
`header of the return packet. This results
`in a fast ARQ scheme-delays are only
`one slot in duration , and only packets that
`have been lost need to be retransmitted .
`• Voice is never retransmitted. Instead, a ro(cid:173)
`bust voice-encoding scheme is used. This
`scheme, which is based on continuous
`variable slope delta (CVSD) modulation,
`follows the audio waveform (Figure 7) and
`is very resistant to bit errors- errors are
`perceived as background noise, which in(cid:173)
`tensifies as bit errors increase.
`
`Networking
`Piconets
`Bluetooth units that are within range of each
`other can set up ad hoc connections. In prin(cid:173)
`ciple, each unit is a peer with the same hard(cid:173)
`ware capabilities (unlike cellular systems,
`there is no distinction between terminals
`and base stations). Two or more Bluetooth
`uni ts that share a channel form a piconet. To
`regulate traffic on the channel, one of the
`participating units becomes a master of the
`piconet. Any unit can become a master, but
`by definition, the unit that establishes the
`piconet assumes this role. All other partici(cid:173)
`pants are slaves. Participants may change
`roles if a slave unit wants to take over the
`master role. Nonetheless, only one master
`may exist in a piconet at any time.
`Every unit in the piconet uses the master
`identity and clock to track the hopping
`channel. Each unit also has its own (native),
`free-running clock. When a connection is
`established, a clock offset is added to syn(cid:173)
`chronize the slave clock with the master
`clock. The native clock is never adjusted,
`however, and offsets are solely valid for the
`duration of the conneCtion.
`Master units control all traffic on a chan(cid:173)
`nel. They allocate capacity for sca links by
`reserving slots. For ACL links, they use a
`
`Ericsson Review No.3, 1998
`
`SONY Exhibit 1007 - 0007
`
`

`

`polling scheme. A slave is only permirred to
`send in the slave-eo-master slot when it has
`been addressed by its MAC address in the
`preceding master-eo-slave sloe. A master-to(cid:173)
`slave packet implicitly polls the slave; that
`is , an ordinary traffic packet addressed to a
`slave polls the slave automatically. If no in(cid:173)
`formation eo the slave is available, the mas(cid:173)
`ter can use a POLL packet to poll the slave
`explicitly. POLL packets consist of an access
`code and header only. This central polling
`scheme eliminates collisions between slave
`transmissions.
`
`Establishing connection
`When units are not participating in a pi co(cid:173)
`net, they enter standby mode, from which
`state they periodically listen for page mes(cid:173)
`sages. Feom the eocal set of79 (23) hop car(cid:173)
`riers, a subset of 32 (16) wake-up carriers
`has been defined. The subset, which is cho(cid:173)
`sen pseudo-randomly, is determined by the
`unit identity. Over the wake-up carriers, a
`wake-up sequence visits each hop carrier
`once: the sequence length is 32 (16) hops.
`Every 2,048 slots (1.28 s), standby units
`move their wake-up hop carrier forward one
`hop in the wake-up sequence. The native
`clock of the unit determines the phase of the
`wake-up sequence. During the listening in(cid:173)
`terval , which lasts for 18 slots or 11.25 ms,
`the unit listens on a single wake-up hop car(cid:173)
`rier and correlates incoming signals with the
`access code derived from its own identity. If
`the correlaeor triggers-that is , if most of
`the received bits match the access code-the
`unit activates
`itself and
`invokes
`a
`connection-secup procedure. Otherwise, the
`unit recurns eo sleep until the next wake-up
`evene.
`Units connecting ro a unit in standby
`mode must know the standby unit's identi(cid:173)
`ty and preferably its native clock
`• ro generate the required access code
`(which constitutes the paging message);
`• ro derive the wake-up sequence;
`• to predict the phase of this sequence.
`Since paging units cannot accurately know
`the native clock of a recipient, they must re(cid:173)
`solve the time-frequency uncertainty. They
`do so by transmitting the access code con(cid:173)
`tinuously-not only in the hop in which
`they expect the recipient to wake up , but
`also in hops before and after. For a period of
`10 ms, paging units transmit the access code
`sequentially on several hop frequencies
`around the expected hop carrier. Note: the
`access code is only 72 bits long (72 ms).
`Therefore, many codes can be sent in the
`
`Ericsson Review No.3, 1998
`
`Scatternet
`Users of a channel must share capacity. Al(cid:173)
`though channels are 1 MHz wide, as more
`and more users are added, throughput per
`Llser quickly drops to less than a few tens of
`kbit/s. Furthermore, although the medium
`available bandwidth is 80 MHz in the US
`and Europe (slighcly less in Japan, France
`and Spain), it cannot be used efficiently
`when every unit must share the same 1 MHz
`hop channel. Therefore, another solution
`was adopted.
`
`110000001011111010000111000101010 ..... . .
`
`Figure 7
`Continuous variable slope delta (CVSO) wave(cid:173)
`form coding.
`
`space of 10 ms. The 10 ms train of access __
`codes on different hop carriers is transmit-
`ted repeatedly until the recipient responds
`or a time-out is exceeded .
`When a paging unit and recipient select
`the same wake-up carrier, the recipient re(cid:173)
`ceives the access code and returns an ac(cid:173)
`knowledgement. The paging unit then
`sends a packet containing its identity and
`its current clock. After the recipient ac(cid:173)
`knowledges this packet, each unit uses the
`paging unit's parameters for hop selec(cid:173)
`tion-thereby establishing a piconet in
`which the paging unit acts as the master.
`To establish a connection, the paging unit
`must obtain the identity of units within
`transmission range. Therefore, it executes an
`inquiry procedure: the paging unit trans(cid:173)
`mits an inquiry access code (which is com(cid:173)
`mon ro all Bluetooth devices) on the inquiry
`wake-up carriers. When a recipient receives
`the inquiry, it returns a packet containing
`its identity and clock-the very opposite of
`the paging procedure. After having gath(cid:173)
`ered each response, the paging unit can then
`select a specific unit to page (Figure 8).
`
`Figure 8
`Connection-establishment procedure and
`maximum time associated with establishing
`a connection.
`
`~-.... S
`
`\
`/
`(Inquiry , - Page
`,-_ .....
`
`-
`
`Typical
`
`5.12 s
`
`0.64 s
`
`0.1-300 minutes
`
`Max.
`
`15.36 s
`
`7.68 s
`
`115
`
`SONY Exhibit 1007 - 0008
`
`

`

`,
`'
`--4---------_...,
`I
`I
`
`I . . . . .
`I
`I
`I
`
`,
`
`........
`' . . . . . . . . . . /
`' , , , , /
`"
`/ /
`.,/
`" I "
`V
`I"
`
`I
`I
`I
`I
`\
`\
`/ "
`~ /1
`'..........
`~"./
`Mouse -
`- ....
`
`/ "
`
`....-'
`
`______ _
`_--~ '
`\
`I
`I
`I
`
`. "
`
`/
`
`Printer
`
`/
`
`/
`
`/
`/ /
`/ /
`
`Access ~o~n~ ~
`//('' ')./'" __ 0y ------__ _
`---
`
`I
`
`_ _
`
`, __ -
`
`-
`
`-
`
`-
`
`-
`
`Mobile phone
`
`LAN
`
`,
`
`, , _ _
`
`Headset
`
`..... t-..........
`" .....
`
`I
`/Laptop
`- - -
`
`---
`
`- - - .....
`
`",
`
`/",/
`
`...............
`
`Figure 9
`A scatternet of four piconets applied to the
`scenario described in Figure 1. -
`
`Units that share the same area and that
`are within range of one another can poten(cid:173)
`tially establish ad hoc connections between
`themselves. However, only those units that
`truly want to exchange information share
`the same channel (piconet). This solution
`permits several piconets to be created with
`overlapping areas of coverage. Each piconet
`adheres
`to
`its own hopping sequence
`through the 80 MHz medium. The channel
`in each piconet hops pseudo-randomly over
`the carriers in the 80 MHz band. The users
`in each piconet have only a 1 MHz hop chan(cid:173)
`nel at their disposal.
`A group of piconets is called a scatternet.
`Aggregate and individual throughput of
`users in a scatternet is much greater than
`when each user participates on the same pi(cid:173)
`conet with a 1 Mbit/s channel. Additional
`gains are obtained by statistically multi(cid:173)
`plexing hop channels and by reusing chan(cid:173)
`nels. The 1 MHz hop channel in any given
`
`Hop selection
`
`I Native eLK I-$-- Phase
`
`-
`
`Hop
`
`Sequence 1
`
`Identity X
`
`Piconet X
`
`Offset X
`
`Figure 10
`Hop selection in inter-piconet communica(cid:173)
`tion.
`
`Piconet Y
`
`Offset Y
`
`Identity Y
`
`Piconet Z
`
`Offset Z
`
`Identity Z
`
`116
`
`piconet need only be shared by users of that
`piconet. Because individual piconets hop
`differently, different piconets can simulta(cid:173)
`neously use different hop channels. Conse(cid:173)
`quently, units in one piconet do not share
`their 1 MHz channel with units 'in anothe

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket