throbber
THE MAGAZINE OF WIRELESS COMMUNICATIONS AND NETWORKING
`
`Connectivity and Application
`Enablers for Ubiquitous
`‘
`Computing and
`Communications
`
`IEEEP61301101 Rhea";:27“:
`Communlcotl I as.
`
`
`
`‘.
`
`.
`_ .
`
`o in-..
`
`1
`" rag-Tc
`_,
`-
`SONY Exhibit 1008 - 0001
`
`SONY Exhibit 1008 - 0001
`
`

`

`
`
`
`
`EEPersonal
`ommummtlons
`
`'
`
`1
`
`l
`
`l
`
`l l
`
`
`
`
`mm.
`network of
`asynchronous- 4
`43% peer-peer devices
`"0
`
`
`
`
`Guest Editorial:
`.
`.
`
`
`Connectivity and Application Enablers for
`Ubiquitous Computing and Communications
`Chatsdiik Bisdikian, Jaap‘ C. Haar’tsen, and Parviz Kermani
`
`8
`Remembering Mark Weiser: Chief Technologist, Xerox PARC
`Roy Want
`
`1 1
`
`irDA: Past Present and Future
`Stuart Williams
`20
`HomeRF: Wireless Networking for the Connected Home
`Kevin J. Negus, Adrian P. Stephens, and Jim Lansford
`
`28
`
`The Bluetaoth Radio System
`Jaap C. Haartsen
`
`37
`
`Paving the Way for Personal Area Network Standards:
`An Ovenxiew ofthe lEEE 10802.15 Working Group for
`Wireless Personal Area Networks
`
`Thomas M. Siep, Ian C. Giiford, Richard C. Braiey, and Robert F. Heile
`44
`System Support for Mobile, Adaptive Applications
`Brian Noble
`
`
`
`Editor’s Note 7 4
`,-
`-
`Coverillustration: The Stock
`.
`Market
`Index to Articles. i999 — 90
`
`
`2
`
`[EEE Personal Communications ' February 2000
`
`SONY Exhibit 1008 - 0002
`
`SONY Exhibit 1008 - 0002
`
`

`

`
`
`EDITOR’S NOTE
`
`_' t is my utmost honor and privilege
`to serve our IEEE Persorwl’ Communications
`
`community starting with this issue of our
`magazine. At first, on behalf of our Editorial
`Board and the IEEE Communications Soci‘
`
`ety, Iwould like to extend my sincere grati~
`hide to Tom La Porta, who served as
`Editor-in-Chief from 1997 to 1999. Torn will
`
`
`
`MAHMOUD
`NAGHSHINEH
`
`tion of the possibilities and potentials wire-
`less and mobile technologies will bring to us.
`It is expected that by 2003 the number of
`cellular subscribers will be equal to the
`number of wired phone subscribers. Obvi-
`ously. new evolving architectures and stan-
`dards, such as GPRS and EDGE, and
`third-generation systems will play a major
`role in this transition. enabling a high-speed,
`continue to help and guide us as a senior
`ubiquitous wireless Internet. After all, it will
`adviser of the magazine. It will be hard to
`be a totally new world when one billion peo-
`match the high level of leadership quality he
`has established. and I count on him. our
`ple carry a personal gateway to the Internet
`with integrated voice and data support.
`founding Editor-in-Chief,‘ Hamid Ahmadi,
`our Advisory Board, technical editors, and
`Today, wireless technologies have crossed
`the lEEE editorial team to help me carry my
`the cost. integration, and power consump-
`tion barriers, and are a key factor in defining new directions
`responsibility as the new Editor-in—Chief.
`In my view, this is the most exiting time in our area;
`not only in enterprise but also in consumer markets. Sec-
`we are starting a new millennium with tremendous anticipa-
`ondwgeneration cellular technologies are leading this front,
`
`
`
`
`IEEEPersonaI
`Commummtmns
`1'»: "month“: or! twin": cannumcnmm no Nnrwoumue
`
`2000 Communications Society
`Board of Governors
`
`Officers
`J. Roberto De Marca. President
`Thomas J. Plevyak. Past President
`Curtis A. Sillcr. VP-Technicoixlctivflr‘ar
`Horst Bessai. VP—Membemiup Services
`Douglas N. Zuckcrman, VP—
`Membership Dalciopmeirt
`Federico Tosca. VP—Suciety Reimt'oro
`Harvey Freeman. Treasurer
`John M. Howell, Seen-rari-
`
`Membersaat-Large
`Class-(grating
`Gerhard Fctlweis
`Paul Hartmann
`Michael Kincaid
`William R. Robinson
`Class 91200:
`Laura Cerchio
`Leonard C‘imini
`Roberta Cohen
`William 'l'ranrer
`Class 0f2002
`Tomonori Aoyama
`Ales Gelman
`R'och Guerin
`Byeong Lee
`2000 IEEE Officers
`Bruce A. Eisenstein, President
`Joel H. Snyder. President-Elect
`David J. Kemp. Secretary
`David A. Conner. Tires-trier
`Kenneth R. L'dter. Prof President
`Daniel J, Sencse, Exccluiwflirectar
`Torn Rowbotham.Direi:mr. Dion-ion m
`
`
`Director of Mil azines
`Mark J. Karol. Luoent Te
`ologies. USA
`Editor~in~clriei
`Mahmoud Naghshineh. [BM Rest-arch. USA
`Senior Advise rs
`Hamid Ahmadi. AT&T Labs. USA
`Thomas F. La Porta. Lueent Technologies. USA.
`Advisory Board
`Donald Cox. Stanford University. USA
`David Goodman. Rutgers University. USA
`Jorma Lilleherg, Nelda. Finland
`Kaveh Fahlavan. Worcester Polytechnic
`Institute. USA
`Mnhadev Satyanarayanan. CMU. USA
`lEEE Vehicular Technology Liaison
`Theodore Rappapon, Virginia Tech. USA
`IEEE Com titer Society Liaison
`Mike Liu, 0 io State University. USA
`Technical Editors
`Editorial correspondence: Manuscripts for
`Umesh Amin. AT&T wireless Services. USA
`consideration may he submitted to the Editor-in-
`Chici‘. Thomas F. La Port". Luccnl Technolo-
`B. R. Badrinalh. Rutgers University. USA
`Pravin Bha
`at. IBM Research. USA
`gies. Inc, 101 Crawford Corners Road.Rm 41335] 9.
`Kwau —Cheng hel1,TsiogHua Univ..Taiwan
`Holmdel.Nl {17133. Electronic submissionsmnyhc
`Si Tak tanIey Chin. Air‘i'ouch International. UK
`Sent in poolscripl to: tip@beli‘labs.com.
`Andrea Goldsmith. Calrech. LISA
`Copyright and reprint permissions: Abstract—
`Paul Gou h. Philips Research. UK
`ing is permitted with credit to the source. Lib rarius
`Davide Grillo, ondazionc Ugo Bordoni. Italy
`limp Huartsen. Ericsson, Sweden
`are permitted to photocopy beyond the limits
`Takeshi Hattori. NTT. Japan
`of US Copyright law [or private use of patrons:
`Ravi Jain. Bellcore. USA.
`those post-197? articles that carry a code on the
`Jose h Kuhn. UC Berkeley. USA
`bottom of the first page provided the percopy fee
`Par-viz emani. IBM Research. USA
`indicated in the code ispnid through the Copyright
`Richard LaMaire. [BM Research. USA
`Clearance Center. 222 Rosewood Drive. Dan-
`Murray Miner. Open Group Research InsL, USA
`vers. MA I] | 913. For other copying. reprint. or
`Sergio Palazzo. Universety of Catania. ltaiy
`republication permission. write to Director,
`Ramachandran Ram'ee, Lucent Technologies.
`Publishing Services. at [EEE Headquarters. All
`Bell
`b5. USA
`rights reserved. Copyright Q 2000 by The Insti—
`Bill-Schilit, FX Palo Alto bib, lnc.. USA
`Thomas Y. C Woo, Lucent Technolo ‘es. USA
`tute of Electrical and Electronics Engineers. Inc.
`Yaoov Yambi. Microsoft Corp,
`SP.
`Postmaster: Send address changes to {BEE
`Michele Zuni. University of CA San Diego. USA
`Personal! Communications. IEEE. 445 Hoes
`Department Editors
`Lane. Piscataway. NJ 08855-1331; or email to
`_ Book Reviews
`addresschangcCrilteeeorg. Printed in USA. Peri—
`Seshadrl Mohan, Bellcorc, USA
`odicals postage paid at New York. NY and ill addi-
`Conference Review
`tional mailing offices.(‘aundian GST#125634188_
`Thomas Y. C. Woo. Lueent Technologies, USA
`Sr'rzmiin tire Uremflu‘c
`_
`YI-Bing Lin. Nation Chiao Tung Univ. Tainan
`Subscriptions: Send orders, address changes to:
`IEEE Production Staff
`lEEE Service Ccnler. 445 Hoes Lane. Fiscal—
`nway: NJ 08855-1331: tel..' 908-931—0050.
`Juseph Milizzo. Manager. Print &
`Electronic Puinshing
`Catherine Kemelmaeher. Production Editor
`Advertising: Advertising is accepted at the dis-
`cretion of the publisher. Address correspondence
`Eric Levine. Advertising Sales Manager
`llllllll
`Joanne O'Rourke. Staff Assistant
`to: Advertising Manager. {EEE Persona! Conn
`minor-minus. 305 East 47th Street. New York.
`Susan Lari e, La out Editor
`IEEE
`NY 10017-1394.
`Jennifer Porcel o. E itorial Assistant
`
`
`
`
`IEEE Personal Communications — The Maga-
`zine of Wireless Communications and
`Neltvorking {ISSN min—99m} is published
`himunthlyhy The Inslitute of Electrical and
`Electronics Engineers. Jne. [-leud quarters address:
`IEEE. 3 Park Avenue. l'ith Floor. New York.
`NY ”Kilo-5997: tel: 212—?05~890tl; l'nx: 2I2v705-
`8999: e-mail: c.kemeImucherCfl'kflmsocbrg.
`Responsibility for the contents rests upon authors
`ofsigncd articles and not the lEEE or its members.
`Unless otherwise specified. the IEEE neither
`endorses nor sanctions any positions or actions
`espoused in JEEE Persona! Cmnmunimtimis.
`Annual su hstription: Member subscriptionzszs
`perye at: Non-member subscription prices available
`011 request. Single copy: Sill for members and $20
`for nonmembers.
`
`
`
`JEEE Personal Communications - February 2000
`
`SONY Exhibit 1008 - 0003
`
`SONY Exhibit 1008 - 0003
`
`

`

`This material may be protected by Copyright law (Title 17 US. Code)
`
`Abstract
`A few years ago it was recognized that the vision of a truly low-cost. low-power radio-based cable replacement was feasible. Such a ubiquitous
`link would provide the basis for portable devices to communicate together in an ad hoe fashion by creating personal area networks which have
`similar advantages to their office environment counterpart, the local area network. BluetoothTM is an effort by a consortium of companies to
`design a royalty-free technology specification enabling this vision. This article describes the radio system behind the Bluetooth concept. Designing
`an ad hoc radio system for worldwide usage poses several challenges. The article describes the critical system characteristics and motivates the
`design choices that have been made.
`
`The Bluetooth Radio System
`
`
`
`JAAP C. HAARTSEN, ERICSSDN RADIO SYSTEMS B.V.
`
`n the last decades, progress in
`microelectronics and very large scale integration (VLSI) tech-
`nology has fostered the widespread use of computing and
`communication devices for commercial usage. The success of
`consumer products like PCs, laptops, personal digital assis-
`tants (PDAs). cell phones, cordless phones. and their periph-
`erals has been based on continuous cost and size reduction.
`Information transfer between these devices has been cumbep
`some, mainly relying on cables. Recently, a new universal
`radio interface has been developed enabling electronic devices
`to communicate wirelessly via short-range ad hoc radio con-
`nections. The Bluetooth technology — which has gained the
`support of leading manufacturers like Ericsson, Nokia, IBM,
`Toshiba, lore]. and many others — eliminates the need for
`wires, cables, and the corresponding connectors between cord-
`less or mobile phones. modems, headsets, PDAs, computers,
`printers, projectors, and so on, and paves the way for new and
`completely different devices and applications. The technology
`enables the design of low-power, small—sized, low-cost radios
`that can be embedded in existing (portable) devices. Eventual~
`1y, these embedded radios will lead toward ubiquitous connec-
`tivity and truly connect everything to everything. Radio
`technology will allow this connectivity to occur without any
`explicit user interaction.
`This article describes the basic design and technology
`trade-offs which have led to the Bluetooth radio system. We
`describe some fundamental issues regarding ad hoc radio sys-
`tems. We give an overview of the Bluetooth system itself with
`the emphasis on the radio architecture. It explains how the
`system has been optimized to support ad hoc connectivity. We
`also describe the Bluetooth specification effort.
`
`Ad Hoc Radio Connectivity
`The majority of radio systems in commercial use today are
`based on a cellular radio architecture. A mobile network estab-
`lished on a wired backbone infrastructure uses one or more
`base stations placed at strategic positions to provide local cell
`coverage; users apply portable phones, or more generic mobile
`terminals, to access the mobile network; the terminals main—
`tain a connection to the network via a radio link to the base
`stations. There is a strict separation between the base stations
`and the terminals. Once registered to the network, the tenni-
`nals remain locked to the control channels in the network, and
`connections can be established and released according to the
`control channel protocols. Channel access, channel allocation,
`traffic control, and interference minimization are neatly con~
`
`trolled by the base stations. Examples of these conventional
`radio systems are the public cellular phone systems like Glob-
`al System for Mobile Communications (GSM), D-AMPS, and
`[S95 [1—3], but also private systems like wireless local area
`network (Vt/LAN) systems based on 802.11 or HIPERLAN I
`and HIPERLAN 1] [4—6]. and cordless systems like Digital
`Enhanced Cordless Telecommunications (DECT) and Person-
`al Handyphone System (PHS) [7, 8].
`In contrast, in truly ad hoc systems, there is no difference
`between radio units; that is, there are no distinctive base sta-
`tions or terminals. Ad hoc connectivity is based on peer com-
`munications. There is no wired infrastructure to support
`connectivity between portable units; there is no central con-
`troller for the units to rely on for making interconnections; nor
`is there support for coordination of communications. In addi-
`tion. there is no intervention of operators. For the scenarios
`envisioned by Bluetooth, it is highly likely that a large number
`of ad hoc connections will coexist in the same area without any
`mutual coordination; that is, tens of ad hoc links must share
`the same medium at the same location in an uncoordinated
`fashion. This is different from ad hoc scenarios considered in
`the past, where ad hoc connectivity focused on providing a sin-
`gle (or very few} network(s) between the units in range [4, 5].
`For the Bluetooth applications. typically many independent
`networks overlap in the same area. This will be indicated as a
`scatter ad hoc environment. Scatter ad hoc environments con-
`sist of multiple networks, each containing only a limited num-
`ber of units. The difference between a conventional cellular
`environment, a conventional ad hoc environment, and a scatter
`ad hoc environment is illustrated in Fig. l. The environmental
`characteristics the ad hOC radio system has to operate in have a
`major impact on the following fundamental issues:
`' Applied radio spectrum
`- Determining which units are available to connect to
`' Connection establishment
`- Multiple access scheme
`0 Channel allocation
`0 Medium access control
`
`. Service prioritization (i.e., voice before data}
`- (Mutual) interference
`- Power consumption
`Ad hoc radio system have been in use for some time, for
`example, walky~talky systems used by the military, police, fire
`departments, and rescue teams in general. However, the Blue-
`tooth system is the first commercial ad hoc radio system enviA
`sioncd to he used on a large scale and widely available to the
`public.
`
`-
`
`28
`
`103‘0-99lbf00l31000 © 2000 [EEE
`
`IEEE Personal Communications ' February 2000
`
`—'
`
`SONY Exhibit 1008 - 6004
`
`SONY Exhibit 1008 - 0004
`
`

`

`
`
`
`
`
`‘r
`
`'fi-
`
`I
`
`l\
`n
`‘1 . .
`I
`
`n
`
`‘
`
`a
`
`a
`
`_-
`
`-
`
`u
`
`,
`
`,' . ‘
`"-‘-‘
`
`‘,
`
`,
`\
`a
`.a
`‘
`I
`r
`.
`i
`.‘
`fl-
`0‘.
`y I
`‘
`I;
`I
`,-
`_4_
`D
`_
`ll
`‘
`:'-.."0.: ":'o'.
`‘
`,-'
`‘s‘ w" ""-.
`I
`'
`u
`|
`t“.
`\m.
`.M.
`‘I
`.
`l'
`.
`'0:
`I
`IIl
`,
`,‘r‘s
`n‘
`.
`"' —___--'r
`5t- ..... 1‘
`'
`,‘i
`.'
`I
`l .
`t
`
`t
`
`n
`
`'I
`r
`I
`
`1’
`
`r
`
`J
`
`.l I
`
`.
`
`I
`l
`‘, x
`If?“
`
`‘
`
`'
`
`i
`
`. f
`g.
`,‘
`s
`“-__-'
`
`. .
`‘
`\
`
`(b)
`
`‘-_._I
`
`'
`
`4
`
`l'
`
`
`
`Blue-tooth Radio System Architecture
`
`In this section the technical background of the Bluetooth
`radio system is presented. It describes the design trade-offs
`made in order to optimize the ad hoc functionality and
`addresses the issues listed above.
`
`Radio Spectrum
`The choice of radio spectrum is first determined by the lack
`of operator interaction. The spectrum must be open to the
`public without the need for licenses. Second, the spectrum
`must be available worldwide. The first Bluetooth applications
`are targeted at the traveling businessperson who connects
`his/her portable devices wherever he/she goes. Fortunately,
`there is an unlicensed radio band that is globally available.
`This band, the Industrial, Scientific, Medical (ISM) band. is
`centered around 2.45 61-12 and was formerly reserved for
`some professional user groups but has recently been opened
`worldwide for commercial use. In the United States, the band
`ranges from 2400 to 2483.5 MHz, and the FCC Part 15 regu-
`lations apply. In most parts of Europe,l the same band is
`available under the ETS-300328 regulations. In Japan, recent-
`ly the band from 2400 to 2500 MHz has been allowed for
`commercial applications and has been harmonized with the
`rest of the world. Summarizing. in most countries of the
`world, free spectrum is available from 2400 MHz to 2483.5
`MHz, and harmonization efforts are ongoing to have this
`radio band available truly worldwide.
`The regulations in different parts of the world differ. How-
`ever. their scope is to enable fair access to the radio band by
`an arbitrary user. The regulations generally specify the
`spreading of transmitted signal energy and maximum allow-
`able transmit power. For a system to operate globally. a radio
`concept has to be found that satisfies all regulations simulta-
`neously. The result will therefore be the minimum denomina-
`tor of all the requirements.
`
`I
`I .
`|
`‘
`
`\\‘
`
`\
`
`
`
`(a)
`
`s
`
`r .am,
`
`“
`a""-_ ,-,'
`‘.
`-
`I.
`a".
`.
`I

`‘
`I
`l
`I
`I
`.' 0..
`l I.“
`‘L_'
`I
`I
`r:
`’
`I
`t
`“d’
`fa:
`.I
`‘0
`i~!—'l
`.
`l‘
`a
`1
`’
`.-
`I
`,’r
`I
`y
`y, ________ 3,!
`.‘
`m 9
`1
`i
`I
`_;
`~_,'
`_________ - ..i
`(C)
`
`II
`
`‘
`
`I Figure I. Tepologies for: a) cellular radio systems with squares
`representing stationary base stations; (3) conventional ed hoe
`systems; and c) scatter ad hoe .rytrtems.
`
`since the desired signal is transmitted at points in frequency
`and/or time where interference is low or absent. Avoidance in
`time can be an alternative if the interference concerns a
`pulsed jammer and the desired signal can be interrupted.
`Avoidance in frequency is more practical. Since the 2.45 GHz
`band provides about 80 MHz of bandwidth and most radio
`systems are band-limited, with high probability a part of the
`radio spectrum can be found where there is no dominant
`interference. Filtering in the frequency domain provides the
`suppression of the interferers at other parts of the radio band.
`The filter suppression can easily arrive at 50 dB or more.
`
`interference immunity
`Since the radio band is free to be accessed by any radio trans-
`mitter as long as it satisfies the regulations, interference
`immunity is an important issue. The extent and nature of the
`interference in the 2.45 GHz ISM band cannot be predicted.
`Radio transmitters may range, for example, from 10 dBm
`baby monitors to 30 dBm WLAN access points. With high
`probability. the different systems sharing the same band will
`not be able to communicate. Coordination is therefore not
`possible. More of a problem are the high-power transmitters
`covered by the FCC part 18 rules which include, for example,
`microwave ovens and lighting devices. These devices fall out-
`side the power and spreading regulations of part 15, but still
`coexist in the 2.45 GI—Ez ISM band. In addition to interference
`from external sources, co-user interference must be taken into
`account, which results from other Bluetooth users.
`Interference immunity can be obtained by interference
`suppression or avoidance. Suppression can be obtained by
`coding or direct-sequence spreading. However, the dynamic
`range of the interfering and intended signals in an ad hoc,
`uncoordinated radio environment can be huge. Taking into
`account the distance ratios and powor differences of uncoordi-
`nated transmitters, near-far ratios in excess of 50 dB are no
`exception. With desired user rates on the order of 1 Mb/s and
`beyond, practically attained coding and processing gains are
`inadequate. Instead, interference avoidance is more attractive
`
`Multiple Access Scheme
`The selection of the multiple access scheme for ad hoc radio
`systems is driven by the lack of coordination and the regula-
`tions in the ISM band. Frequency-division multiple access
`(FDMA) is attractive for ad hoc systems since channel orthog-
`onality only relies on the accuracy of the crystal oscillators in
`the radio units. Combined with an adaptive or dynamic chan-
`nel allocation scheme, interference can be avoided. Unfortu-
`nately, pure FDMA does not
`fulfill
`the spreading
`requirements set in the ISM band. Time—division multiple
`access (TDMA) requires strict time synchronization for chan-
`nel orthogonality. For multiple collocated ad hoc connections,
`maintaining a common timing reference becomes rather cum-
`bersome. Code-division multiple access (CDMA) offers the
`best properties for ad hoc radio systems since it provides
`spreading and can deal with uncoordinated systems. Direct
`sequence (DS)-CDMA is less attractive because of the near-
`far problem which requires coordinated power control or
`excessive processing gain. In addition, as in TDMA, DS-
`CDMA channel orthogonality requires a common timing ref-
`erence. Finally, for higher user rates, rather high chip- rates
`are required, which is less attractive because of the wide
`bandwidth (interference immunity) and higher current con-
`sumption. Frequency-hopping (FH)-CDMA combines a num-
`ber properties which make it the best choice for ad hoc radio
`systems. On average the signal can be spread over a large fre»
`quency range, but instantaneously only a small bandwidth is
`occupied, avoiding most of the potential interference in the
`ISM band. The hop carriers are orthogonal, and the interfer-
`i In France and Spain the exact location oftne band diflers. and the band
`is smaller.
`ence on adjacent hops can effectively be suppressed by filter-
`
`IEEE Personal Communications ' February 200.0
`—‘—__—
`
`29
`
`SONY Exhibit 1008 - 0005
`
`SONY Exhibit 1008 - 0005
`
`

`

`
`
`
`flit)
`
`flit + 1)
`
`
`
`t
`
`share the same channel. Bluetooth has been
`designed to allow a large number of independent
`channels, each channel serving only a limited num-
`ber of participants. With the considered modulation
`scheme, a single FH channel in the ISM band only
`supports a gross bit rate of ] Mbis. This capacity has
`to be shared by all participants on the channel. The-
`oretically, the spectrum with 79 carriers can support
`525 [13
`79 bes. In the user scenarios targeted by Blue~
`tooth. it is highly unlikely that all units in range
`I Figure 2. An illustration ofrhe FH/TDD channel applied in Bluetooth.
`need to share information among all of them. By
`using a large number of independent 1 Mbis chan—
`nels to which only the units are connected that real-
`ly want to exchange information, the 80 MHz is exploited
`much more effectively. Due to nonorthogonality of the hop
`sequences, the theoretical capacity of 79 bes cannot be
`reached. but is at least much larger than 1 Mb/s.
`An Fl-l Bluetooth channel is associated with a piconet. As
`mentioned earlier, the piconet channel is defined by the identi-
`ty (providing the hop sequence} and system clock {providing
`the hop phase) of a master unit. All other units participating in
`the piconet are slaves. Each Bluetooth radio unit has a free-
`running system or native clock. There is not a common timing
`reference, but when a piconet is established, the slaves add off-
`sets to their native clocks to synchronize to the master. These
`offsets are released again when the piconet is cancelled, but can
`be stored for later use. Different channels have different mas-
`ters and therefore also different hopping sequences and phases.
`The number of units that can participate on a common channel
`is deliberately limited to eight {one master and seven slaves) in
`order to keep a high-capacity link between all the units. It also
`limits the overhead required for addressing. Bluetooth is based
`on peer communications. The masterfslave role is only attribut-
`ed to a unit for the duration of the piconet. When the piconet
`is cancelled. the master and slave roles are cancelled. Each unit
`can become a master or slave. By definition, the unit that estab—
`lishes the piconet becomes the master.
`In addition to defining the piconet, the master also controls
`the traffic on the piconet and takes care of access control.
`Access is completely contention free. The short dwell time of
`625 us only allows the transmission of a single packet. A con-
`tention-based access scheme would provide too much over-
`head and is not efficient in the short dwell time Bluetooth
`applies. in Bluetooth, the master implements centralized con-
`trol; only communication between the master and one or more
`slaves is possible. The time slots are alternately used for mas—
`ter transmission and slave transmission. In the master trans»
`mission, the master includes a slave address of the unit for
`which the information is intended. In order to prevent colli~
`sions on the channel due to multiple slave transmissions, the
`master appliesa polling technique: for each slavevto-master
`slot, the master decides which slave is allowed to transmit. This
`decision is performed on a per-slot basis: only the slave
`addressed in the masternlo— slave slot directly preceding the
`slavedo-master slot is allovmd to transmit in this slave-to-mas-
`ter slot. If the master has information to send to a specific
`slave, this slave is pulled implicitly and can return information.
`If the master has no information to send, it has to poll the
`slave explicitly with a short poll packet. Since the master
`schedules the traffic in both the npiink and downlink. intelli-
`gent scheduling algorithms have to be used that take into
`account the slave characteristics. The master control effectively
`prevents collisions between the participants on the piconet
`channel. Independent collocated piconets may interfere when
`they occasionally use the same hop carrier. A type of ALOHA
`-’ Cum-nth), fiv- France and Spain a reduced set of2'3 hop carriers has been
`is applied: information is transmitted without checking for a
`defined at u 1 MHz carrier spacing.
`clear carrier (no listentbefore-talkj. If the information is
`
`
`ing. The hop sequences will not be orthogonal (coordination
`of hop sequences is not allowed by the FCC rules anyway),
`but narrowband and co-user interference is experienced as
`short interruptions in the communications, which can be over-
`come with measures at higher-layer protocols.
`Bluetooth is based on FH-CDMA. In the 2.45 GHz ISM
`band, a set of 79 hop carriers have been defined at a 1 MHz
`spacing.3 The channel is a hopping channel with a nominal
`hop dwell time of 625 us. A large number of pseudo-random
`hopping sequences have been defined. The particular
`sequence is determined by the unit that controls the PH chan-
`nel, which is called the master. The native clock of the master
`unit also defines the phase in the hopping sequence. All other
`participants on the hopping channel are sieves; they use the
`master identity to select the same hopping sequence and add
`time offsets to their re5pectivc native clocks to synchronize to
`the frequency hopping. in the time domain, the channel is
`divided into slots. The minimum dwell time of 625 ps corre~
`sponds to a single slot. To simplify implementation, full-
`duplex communications is achieved by applying time-division
`duplex (TDD). This means that a unit alternately transmits
`and receives. Separation of transmission and reception in time
`effectively prevents crosstalk between the transmit and receive
`operations in the radio transceiver, which is essential if a one-
`chip implementation is desired. Since transmission and recep-
`tion take place at different time slots, transmission and
`reception also take place at different hop carriers. Figure 2
`illustrates the FHKTDD channel applied in Bluetooth. Note
`that multiple ad hoe links will make use of different hopping
`channels with different hopping sequences and may have mis-
`aligned slot timing.
`
`The Modulation Scheme
`In the ISM band. the signal bandwidth of FH systems is limit-
`ed to 1 MHz. For robustness, a binary modulation scheme was
`chosen. With the above-mentioned bandwidth restriction, the
`data rates are limited to about 1 Mbls. For FH systems and
`support for bursty data traffic, a noncoherent detection
`scheme is most appropriate. Bluetooth uses Gaussian-shaped
`frequency shift keying (FSK) modulation with a nominal mod»
`ulation index of k = 0.3. Logical ones are sent as positive fre-
`quency deviations, logical zeroes as negative frequency
`deviations. Demodulation can simply be accomplished by a
`limiting FM discriminator. This modulation scheme allows the
`implementation of low-cost radio units.
`
`Medium Access Control
`Bluetooth has been optimized to allow a large number of
`uncoordinated communications to take place in the same
`area. Unlike other ad hoc solutions where all units in range
`——-————.——_____
`
`50
`
`
`
`I'EEE Personal Communications - February 2000
`
`_:
`
`SONY Exhibit 1008 - 0006 '
`
`SONY Exhibit 1008 - 0006
`
`

`

`
`
`72 bits
`
`0—2745 bits
`
`54 bits
`
`received incorrectly, it is retransmitted at the next --—
`Packet
`Payload
`header
`code
`
`transmission opportunity {for data only). Due to the
`short dwell time collision avoidance schemes are
`less appropriate for FH radio. For each hop, differ-
`ent contenders are encountered. Backoft mecha-
`nisms are therefore less efficient.
`
`I Figure 5. The format ofpackets applied in Birtetootit.
`
`have been defined, as will be further explained later. The
`interpretation of packet type is different for synchronous and
`asynchronous links. Currently, asynchronous links support
`payloads with or without a 2/3-rate FEC coding scheme. In
`addition, on these links single—slot, three-slot, and five-slot
`packets are available. The maximum user rate that can be
`obtained over the asynchronous link is 723.2 kbr’s. In that
`case, a return link of 57.6 kb/s can still be supported. Link
`adaptation can be applied on the asynchronous link by chang-
`ing the packet length and PEG coding depending on link con‘
`ditions. The payload length is variable and depends on the
`available user data. However, the maximum length is limited
`by the minimum switching time between RX and TX, which
`is specified at 200 us. This switching time seems large, but
`allows the use of open-loop voltage controlled oscillators
`(VCOs) for direct modulation and provides time for packet
`processing between RX and TX;
`this is also discussed later.
`For synchronous links, only single-slot packets have been
`defined. The payload length is fixed. Payloads with 1/3-rate
`FEC. 2(3-rate, or no FEC are supported. The synchronous
`[ink supports a full-duplex link with a user rate of 64 kb/s in
`both directions.
`
`Pocket-Based Communications
`The Bluetooth system uses packet—based transmission: the
`information stream is fragmented into packets. In each slot,
`only a single packet can be sent. All packets have the same
`format, starting with an access code followed by a packet
`header and ending with the user payload (Fig. 3}.
`The access code has pseudo--random properties and is used
`as a direct-sequence code in certain access operations. The
`aceess code includes the identity of the piconet master. All pack-
`ets exchanged on the channel are identified by this master iden
`tity. Only if the access code matches the access code
`mnespondirtg to the piconet master will the packet be accepted
`by the recipient. This prevents packets sent in one picortet false-
`ly being accepted by units of another piconet that happens to
`land on the same hop carrier. In the receiver, the access code is
`matched against the anticipated code in a sliding correlator.
`This correlator provides the direct-sequence proeessing gain.
`The packet header contains link control information: a 3-bit
`slave address to separate the slaves on the piconet, a 1-bit
`acknowledgment/negative acknowledgmennt (ACWNACK) for
`the automatic repeat request (ARQ) scheme, a 4-bit packet type
`code to define in different payload types, and an 8-bit header
`error check (HEC) code which is a cyclic redundancy check
`(CRC) code to detect errors in the header. The packet header is
`limited to 18 information bits in order to restrict the overhead.
`The header is further protected by U3 rate forward error correc-
`tion (FEC) coding. Bluetooth defines four control packets:
`' The ID or identification packet: Only consists of the access
`code; used for signaling
`- The NULL packet: Only has an access code and a packet
`header; used if link control information carried by the
`packet header has to be conveyed
`' The POLL packet: Similar to the NULL packet; used by the
`master to force slaves to return a response
`' The FHS packet: An FH—synchronizarion packet; used to
`exchange real-time ciock and identity information between
`the units; contains all the information to get two units hop
`synchronized
`The remaining 12 type codes are
`used to define packets for syn-
`chronous and asynchronous services.
`These 12 types are divided into three
`segments. Segment 1 specifies pack-
`ets that fit into a single slot, segment
`2 specifies 3-slot packets, and seg-
`ment 3 specifies 5-slot packets. Multi-
`slot packets are sent on a single-hop
`carrier. The hop carrier which is valid
`in the first slot is used for the remain-
`der of the packet; therefore, there is
`no frequency switch in the middle of
`a packet. After the packet has been
`sent, the hop carrier as specified by
`the current master clock value is used
`(Fig. 4). Note that only an odd num-
`ber of multislot packets have been
`defined, which guarantees that the
`TXIRX timing is maintained.
`I Figure 4. The frequency and

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket