throbber
(12) United States Patent
`Gerten et al.
`
`111111
`
`1111111111111111111111111111111111111111111111111111111111111
`US006760319Bl
`
`(10) Patent No.:
`(45) Date of Patent:
`
`US 6,760,319 Bl
`Jul. 6, 2004
`
`(54) FIXED FREQUENCY INTERFERENCE
`AVOIDANCE ENHANCEMENT
`
`(75)
`
`Inventors: Leo Joseph Gerten, Hoffman Estates,
`IL (US); Kevin Alan Harnist,
`Arlington Heights, IL (US); Mark
`Robert Mahoney, Schaumburg, IL
`(US); Chuck Bromley Harmke,
`Rolling Meadows, IL (US)
`
`(73) Assignee: Motorola, Inc., Schaumburg, IL (US)
`
`( *) Notice:
`
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 707 days.
`
`(21) Appl. No.: 09/610,022
`
`(22) Filed:
`
`Jul. 5, 2000
`
`Int. Cl? ................................................. H04J 13/06
`(51)
`(52) U.S. Cl. ....................... 370/335; 370/342; 370/441;
`375/132
`(58) Field of Search ................................. 370/320, 329,
`370/332, 335, 441; 375/132
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`4,556,982 A * 12/1985 Dunn ......................... 375/224
`
`5,715,295 A * 2/1998 Yamashita .................. 455!455
`5,737,359 A * 4/1998 Koivu ........................ 375/133
`5,937,002 A * 8/1999 Andersson et a!.
`......... 375/131
`
`* cited by examiner
`
`Primary Examiner-Kenneth Vanderpuye
`Assistant Examiner-Joshua Kading
`
`(57)
`
`ABSTRACT
`
`A system and method is provided for removing channels in
`a frequency hopping scheme having strong interference or
`interferers in a wireless communication system. The present
`invention employs signal strength measurements on N num(cid:173)
`ber channels of the frequency hopping scheme to determine
`M number of channels to be avoided. The system and/or
`method then modifies the frequency hopping scheme to
`avoid transmission over the M channels. The M channels to
`avoid can be communicated to wireless units involved in the
`communication system, so that the members of the wireless
`communication system can frequency hop together over the
`modified frequency hopping scheme.
`
`7 Claims, 8 Drawing Sheets
`
`SCAN COMPLETE
`
`0001
`
`Marvell Semiconductor, Inc.
`MediaTek Inc.
`MediaTek USA, Inc.
`Exh. 1003
`IPR of U.S. Pat. No. 7,477,624
`
`

`
`'V"'-14
`
`' \
`
`I
`I
`\
`
`I
`
`--......
`
`•
`\Jl
`d •
`
`I
`I
`I
`I
`I
`I
`I
`\
`\
`
`/
`
`/
`
`I
`
`/
`
`/
`
`""""
`/
`
`_. .....
`
`\
`
`' ' ' ' ' \
`
`..... ......
`
`-.
`
`t_
`
`,--
`I
`I
`
`I
`I
`I
`
`FIG. 1
`
`......
`
`------
`
`MASTER
`
`\
`
`---
`
`' ' ' ...... ...... -
`\ ___ ...
`
`MOBILE
`
`UNIT
`
`20
`
`\
`
`\
`
`\
`\
`\
`I
`I
`I
`I
`I
`I
`I
`
`MOBILE
`
`UNIT
`
`20
`
`~­ /
`
`/
`
`/
`
`/
`
`/
`
`_ ...... -------
`
`10
`
`I
`
`/
`
`/
`
`/
`
`/
`
`/ -
`
`________ .......
`
`MASTER
`
`...... ...... ...... -
`
`MOBILE
`
`UNIT
`
`'
`'
`
`_.l
`
`24
`
`/
`
`/
`
`/
`
`/
`
`/
`
`/
`
`/
`
`_ ......
`-,
`/--\
`
`...... ~ I
`I
`I
`
`', /
`
`/
`
`\
`\
`I
`I
`I
`
`/
`
`/
`
`/
`
`'
`',
`' SLAVE
`
`'
`',
`
`21
`
`20
`
`'
`',
`
`MOBILE
`
`UNIT
`
`22
`
`,_,--------
`
`-- /
`
`/
`
`/
`
`/
`'y/
`/
`
`12
`
`\ MOBILE
`I
`I
`I
`I
`I
`I
`-~ ......
`I
`
`UNIT
`
`I MASTER/
`I
`I
`
`) 1 SLAVE
`1
`
`/
`
`I
`I
`122
`I
`I
`
`/
`
`\
`
`\
`
`0002
`
`

`
`701 POWER I
`
`I?IG. 2
`
`FILTER ~ DEMODULATOR ~ AID
`
`46,
`
`44,
`
`-I
`J IF
`42,
`
`COMPONENT
`MEASUREMENT
`
`POWER
`66,
`I MIXER
`40,
`
`SYSTEM
`CONTROL
`CENTRAL
`
`CLOCK
`DEVICE
`
`64,
`
`H
`SYNTHESIZER
`FREQUENCY
`
`62 MEMORY
`
`60,
`
`30,
`
`{"20
`
`I
`I D/A
`
`48,
`
`I MODULATOR
`so-....._
`
`•
`\Jl
`d •
`
`i
`FILTER
`
`52,
`
`32
`
`{"
`
`TX
`
`r34
`
`RX
`
`36,
`
`ir
`
`38
`
`0003
`
`

`
`U.S. Patent
`
`Jul. 6, 2004
`
`Sheet 3 of 8
`
`US 6, 760,319 Bl
`
`100
`
`PERFORM SERVICE
`DISCOVERY
`
`115
`NO
`
`COMMENCE
`NORMAL
`OPERATION
`
`CHANNEL SCAN AT END
`OF TRANSMISSION
`
`DETERMINE CHANNELS
`TO BE A VOIDED
`
`CREATE LINK TO
`COMMUNICATE CHANNELS
`TO BE AVOIDED
`
`COMMUNICATE CHANNELS
`TO BE AVOIDED
`
`MODIFY HOPPING SEQUENCE
`
`120
`
`130
`
`140
`
`150
`
`160
`
`170
`
`USE MODIFIED HOPPING
`SEQUENCE TO TRANSMIT DATA
`
`F'IG. 3
`
`0004
`
`

`
`U.S. Patent
`
`Jul. 6, 2004
`
`Sheet 4 of 8
`
`US 6, 760,319 Bl
`
`200
`
`GET NEXT CHANNEL ---------------.
`
`COMPLETE
`
`READ SIGNAL STRENGTH
`
`WAIT PREDETERMINED
`TIME THEN READ
`SIGNAL STRENGTH
`
`YES
`
`PLACE
`CHANNEL
`ON LEVEL
`ONE LIST
`
`PLACE CHANNEL ON
`LEVEL TWO LIST
`
`I?IG. 4
`
`SCAN COMPLETE
`
`0005
`
`

`
`U.S. Patent
`
`Jul. 6, 2004
`
`Sheet 5 of 8
`
`US 6, 760,319 Bl
`
`3 00"'-.
`
`IDENTIFY M CHANNELS TO
`BE A VOIDED OF N
`TOTAL CHANNELS
`
`310" DEFINE AN ALTERNATE
`REGISTER BANK OF N-M
`CHANNELS
`
`320 " REMOVE SYNTHESIZER CODE FOR
`
`M CHANNELS TO BE AVOIDED
`
`33 0"
`
`LOAD ALTERNATE REGISTER
`BANK WITH N-M SYNTHESIZER
`CODES FOR N-M CHANNELS
`
`'
`3 40" RECONFIGURE ADDRESSING
`SCHEME TO ADDRESS
`ALTERNATE REGISTER BANK
`WITH N-M SYNTHESIZER
`CODES FOR N-M CHANNELS
`
`FIG. 5
`
`0006
`
`

`
`U.S. Patent
`
`Jul. 6, 2004
`
`Sheet 6 of 8
`
`US 6, 760,319 Bl
`
`A
`
`B
`
`C
`
`D
`
`E F
`
`X
`
`Y2
`
`FIG. 6
`
`A
`
`B
`
`c
`
`D
`
`E F
`
`Y2
`
`FIG. 7
`
`0
`2
`4
`•
`•
`•
`78
`1
`3
`•
`•
`•
`77
`
`(380
`
`0
`2
`4
`•
`•
`•
`78
`1
`3
`•
`•
`•
`77
`
`0007
`
`

`
`U.S. Patent
`
`Jul. 6, 2004
`
`Sheet 7 of 8
`
`US 6, 760,319 Bl
`
`400
`
`PROVIDE ALTERNATE CODE
`WORD BANK OF REGISTERS
`
`410
`LOAD ALTERNATE CODE WORD
`BANK WITH N CODE WORDS
`
`REPLACE LEVEL 2 LIST
`~-.~ CHANNELS WITH GUARDBAND
`CHANNELS
`
`PLACE CHANNELS ADJACENT
`LEVEL 2 CHANNELS ON
`LEVEL 2 LIST
`
`PLACE LEVEL 1 CHANNELS ON
`LEVEL 2 LIST UNTIL M TOTAL
`CHANNELS REPLACED OR
`UNTIL NO MORE LEVEL 1
`CHANNELS ARE LEFT
`
`FIG. B
`
`0008
`
`

`
`U.S. Patent
`
`Jul. 6, 2004
`
`Sheet 8 of 8
`
`US 6, 760,319 Bl
`
`500
`
`PROVIDE ALTERNATE CODE
`WORD BANK OF REGISTERS
`
`510
`LOAD ALTERNATE CODE WORD
`BANK WITH N CODE WORDS
`
`520
`
`REPLACE CHANNELS ON LEVEL
`2 LIST WITH CHANNELS
`FROM GUARDBAND
`
`REMOVE SYNTHESIZER CODE
`FOR REMAINING LEVEL 2
`CHANNELS TO BE AVOIDED
`UP TO M CHANNELS
`
`550
`
`REDUCE ALTERNATE CODE
`BANK REGISTER TO N-M
`CHANNELS
`
`560
`
`RECONFIGURE ADDRESSING
`SCHEME TO ADDRESS REGISTER
`BANK WITH N-M
`SYNTHESIZER CODES FOR
`N-M CHANNELS
`
`FIG. 9
`
`NO
`570
`
`BEGIN DATA
`TRANSMISSION
`
`0009
`
`

`
`US 6,760,319 Bl
`
`1
`FIXED FREQUENCY INTERFERENCE
`AVOIDANCE ENHANCEMENT
`
`TECHNICAL FIELD
`
`The present invention generally relates to communication
`systems, and in particular to a system and method for
`improving noise and interference immunity in a wireless
`communication system.
`
`BACKGROUND OF THE INVENTION
`
`10
`
`2
`FIG. 2 illustrates a block schematic diagram of a mobile
`communication unit in accordance with the present inven(cid:173)
`tion;
`FIG. 3 is a flow diagram illustrating a methodology for
`5 determining and communicating channels to be avoided to a
`remote device in accordance with the present invention;
`FIG. 4 is a flow diagram illustrating a methodology for
`determining channels with interferers above a certain thresh(cid:173)
`old in accordance with the present invention;
`FIG. 5 is a flow diagram illustrating a methodology for
`modifying the hopping sequence in a wireless communica(cid:173)
`tion system in accordance with the present invention;
`FIG. 6 is a block schematic diagram of a hop selection
`15 kernel having a modulo of 79 for a wireless communication
`device employing the Bluetooth standard in accordance with
`the present invention;
`FIG. 7 is a block schematic diagram of a modified hop
`selection kernel having a modulo of 75 for a wireless
`20 communication device employing the Bluetooth standard in
`accordance with the present invention;
`FIG. 8 is a flow diagram illustrating another methodology
`for modifying the hopping sequence in a wireless commu(cid:173)
`nication system in accordance with the present invention;
`25 and
`FIG. 9 is a flow diagram illustrating yet another method(cid:173)
`ology for modifying the hopping sequence in a wireless
`communication system in accordance with the present
`invention.
`
`DETAILED DESCRIPTION OF THE
`INVENTION
`
`Recently a standard for short range wireless communica(cid:173)
`tion has evolved known as the Bluetooth standard (see
`www.bluetooth.com). Bluetooth is a Radio Frequency (RF)
`specification for short range, point to multi -point voice and
`data transfers. Bluetooth can transmit through solid, non(cid:173)
`metal objects. It has a nominal link range from 10 centime(cid:173)
`ters to 10 meters, but can be extended to 100 meters by
`increasing the transmit power. It is based on short-range
`radio links and facilitates ad hoc connections for stationary
`and mobile communication environments. The Bluetooth
`standard is a low-cost short range wireless communication
`standard that typically operates in the 2,400-2,483.5 MHz
`industrial, scientific and medical (ISM) band. The ISM band
`is available worldwide and allows unlicensed operation of
`spread spectrum systems. The Bluetooth standard is often
`employed for short-distance connections and can be
`employed to replace cables used today that, for example,
`connect laptops to cellular telephones, printers, desktops, 30
`fax machined, joysticks and many other digital device that
`can be part of the Bluetooth system. Bluetooth can also
`provide a bridge to existing data networks. Bluetooth is
`specifically designed to provide low-cost, robust, efficient,
`high capacity, ad hoc voice and data networking.
`Bluetooth technology has been designed to operate in
`noisy radio frequency environments and uses a fast
`acknowledgment and frequency hopping scheme to make a
`robust communications link. Bluetooth radio modules
`attempt to avoid interference from other signals by hopping
`to a new frequency after transmitting or receiving a packet
`as compared to other systems operating at the same fre(cid:173)
`quency band. The implementations of faster hops and
`shorter packets limit impact of microwave and other sources
`of interference. Bluetooth uses forward error correction to 45
`limit impact of random noise on longer distance link.
`In Bluetooth Synchronous Connection Oriented (SCO)
`links there is no provision for re-sending lost data; and each
`time a receiver hops to a blocked channel, up to 3.75
`milliseconds of sequential audio may be unrecoverable. The 50
`lost packets due to fixed interferers are compounded with
`lost packets from FHSS (Frequency Hopped Spread
`Spectrum) interference from other FCC (Federal Commu(cid:173)
`nications Commission) devices operating in the vicinity to
`produce noticeably degraded audio for the user. For Blue- 55
`tooth Asynchronous Connection-Less (ACL) links, different
`levels of error correction and detection can be put in place
`to protect against lost or bad data. However, in any case, the
`error correction or detection often results in reduced bit rate.
`Other standards in the ISM band also have similar problems 60
`associated with channels with strong interference or noisy
`fixed interferers.
`
`The present invention relates to a system and method for
`35 removing channels in a frequency hopping scheme having
`strong interference or interferers in a wireless communica(cid:173)
`tion system. The present invention employs signal strength
`measurements on N number of channels (N being an integer)
`of the frequency hopping scheme to determine M number of
`40 channels (M being an integer less than or equal to N) to
`avoid. The system and/or method then modify the frequency
`hopping scheme to avoid transmission over the M channels.
`The M channels to avoid can be communicated to wireless
`units involved in the communication system, so that the
`members of the wireless communication system can fre(cid:173)
`quency hop together over the modified frequency hopping
`scheme. The frequency hopping scheme can be modified by
`providing a first register bank storing synthesizer codes for
`generating frequency hopping over the N total channels in
`normal mode with an alternate register bank storing synthe(cid:173)
`sizer codes for generating frequency hopping over N-M
`channels for interference avoidance mode. Alternatively, the
`frequency hopping scheme can be modified by substituting
`guardband channels for channels with strong interference or
`interferers. A combination of the substitution of guardband
`channels arid a reduced alternate register bank can also be
`employed to provide the modified frequency hopping
`scheme.
`The present invention will be described with reference to
`a system and method for removal of channels having strong
`interference or interferers on certain channels employed by
`a frequency hopping scheme in a wireless radio communi(cid:173)
`cation system. An example of a system and method will also
`be provided directed to a wireless communication system
`employing the Bluetooth standard in at least one piconet. It
`is to be appreciated that the system and/or method of the
`present invention may be employed in wireless radio com-
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`FIG. 1 illustrates a system diagram of a scatternet employ- 65
`ing the Bluetooth standard in accordance with the present
`invention;
`
`0010
`
`

`
`US 6,760,319 Bl
`
`3
`munication systems that utilize other communication stan(cid:173)
`dards (e.g., IEEE 802.11). It is also to be appreciated that by
`removing channels with interferers from the hop sequence
`where it is known that a packet would be lost or degraded,
`effectively increases the number of devices that may operate
`in a given area or the range that devices operate at to still
`achieve a desired audio quality.
`FIG.1 illustrates operation of three piconets 10, 12 and 14
`forming a scatternet. Each piconet contains a plurality of
`wireless mobile communication units. A piconet is a collec(cid:173)
`tions of devices that can be connected via Bluetooth tech(cid:173)
`nology in an ad hoc fashion. A piconet can start with two
`connected devices, such as a portable PC and cellular phone,
`and may grow to eight connected devices. Each Bluetooth
`device is a peer unit and has substantially identical imple(cid:173)
`mentations. However, when establishing a piconet, one unit
`will act as a master for synchronization purposes and the
`other as a slave for the duration of the piconet connection.
`Two or more independent non-synchronized piconets that
`communicate with each other are known as a scatternet. A
`slave as well as a master unit in one piconet can establish a
`connection by becoming a slave in another piconet. A master
`unit is a device in a piconet whose clock and hopping
`sequence are employed to synchronize other devices in the
`piconet-devices in a piconet that are not the master are
`typically slaves.
`A first piconet 10 is formed with a plurality of mobile
`units 20 each wirelessly communicating with one another
`through an antenna 21. The first piconent 10 includes a
`master mobile unit and a slave mobile unit that is also a slave
`of a second piconet 12. The second piconet 12 includes a
`number of mobile units 22 wireless communicating with one
`another through an antenna 23. The second piconet 12
`includes a master mobile unit that is also a slave unit of a
`third piconet 14. The third piconet 14 includes a number of
`mobile units 24 wireless communicating with one another
`through an antenna 25. The present invention may be
`employed in other radio networking connections based on
`the particular standard being employed.
`Referring now to FIG. 2, a schematic representation of the
`mobile communication unit 20 is shown according to one
`particular aspect of the present invention, wherein a central
`control system 30 is responsible for controlling general
`operations of the mobile communication unit 20. The central
`control system 30 can include a processor or the like that is
`programmed to control and operate various components
`within the mobile communication unit 20 in order to carry
`out various functions described herein. The manner in which
`the processor can be programmed to carry out the functions
`relating to the present invention will be readily apparent to
`those having ordinary skill in the art based on the description
`provided herein.
`The mobile communication unit 20 includes a transceiver
`32 having transmitting circuitry 34 and receiving circuitry
`36 that are both coupled to an antenna 38. The receiver 36
`receives transmissions through the antenna 38, which is
`converted by a mixer 40, filtered by an intermediate fre(cid:173)
`quency (IF) filter 42 and demodulated by a demodulator 44.
`The transmission is then digitized through an ND converter
`46 for processing by the central control system 30. Trans(cid:173)
`missions are transmitted from the central control system 30
`through a D/Aconverter 48 to a modulator 50 and a filter 52
`to the transmitter 34 out through the antenna 38. A frequency
`synthesizer component 60 contains a memory component
`62. The frequency synthesizer component 60 cooperates
`with the central control system 30 and a device clock 64 to
`provide frequency hopping for the mobile communication
`
`5
`
`10
`
`4
`unit 20. The memory component 62 may include a plurality
`of register banks for storing synthesizer codes that are
`employed to facilitate frequency hopping. Alternatively, the
`register banks may reside in the central control system 30
`(e.g., in a memory component, onboard registers or memory
`in a processor or in separate register components). The
`frequency synthesizer component 60 is also operatively
`coupled to the modulator 50, the demodulator 44 and the
`mixer 40 to provide a frequency oscillation component for
`transmitting and receiving communications. A power mea(cid:173)
`surement component 66 is operatively coupled to the
`receiver 34 and provides transmission power measurement
`information to the central control system 30. Power is
`provided to the central control system 30 and other compo(cid:173)
`nents forming the mobile communication unit 20 by a power
`15 component 70, such as a battery power module, line power
`or the like, for example.
`The present invention provides for elimination of M
`channels with high interference of N total channels being
`transmitted in a frequency hopping scheme in a wireless
`20 communication system, such as a piconent or the like.
`Presently, the Bluetooth standard and the IEEE 802.11
`standard provide for frequency hopping between seventy
`nine channels, while the FCC requires frequency hopping
`with at least seventy five channels. The present invention
`25 will be described by example with respect to elimination of
`transmissions over channels having four worst interferers
`amongst seventy nine channels in a Bluetooth piconet.
`However, it is to be appreciated that the number of channels
`for different standards may vary as well as the number of
`30 channels in the above standards being subject to change.
`Therefore, the invention is not limited to the example(s)
`discussed herein and many variations with respect to elimi(cid:173)
`nation of transmissions over channels having strong inter(cid:173)
`ferers over different or modified standards in a wireless
`35 communication system are contemplated by the present
`invention, and are intended to fall within the scope of the
`hereto appended claims.
`FIG. 3 is a flow diagram illustrating one particular meth(cid:173)
`odology for communicating channels to be avoided in
`40 accordance with the present invention. In step 100, a master
`device performs a service discovery request to determine if
`a remote device has interference avoidance capabilities. In
`step 110, the master device determines if the remote device
`has interference avoidance capabilities. If the remote device
`45 does not have interference avoidance capabilities (NO), the
`master device and the remote device commence normal
`operation in step 115. If the remote device does have
`interference avoidance capabilities (YES), the master device
`performs a channel scan at completion of its last transmis-
`50 sian (step 120) and determines which channels have stron(cid:173)
`gest interference in step 130. The master device establishes
`a link to communicate channels to be avoided in step 140.
`The master device then communicates the channels to be
`avoided to the remote device at step 150. In step 160, the
`55 master device and the remote device modify their respective
`hopping sequences. In step 170, the master device and the
`remote device begin transmitting data at the modified hop(cid:173)
`ping sequences. In step 180, the master device periodically
`updates the channels to be avoided. If the master does not
`60 update the channels to be avoided (NO), the master device
`and the remote device continue transmitting data at the
`modified hopping sequences in step 170. If the master does
`update the channels to be avoided (YES), the master device
`returns to step 140 to create another link and communicate
`65 the new channels to the remote device.
`The above process can be applied to a Bluetooth example
`and includes identification of a Bluetooth device's ability to
`
`0011
`
`

`
`US 6,760,319 Bl
`
`5
`support interference avoidance, the measurements of signal
`strength on all channels and identification of which channel
`should not be used without violating the FCC rules, a
`method of modifying the Bluetooth hop sequence so that it
`will avoid channels containing strong or fixed interferers 5
`while still supporting standard Bluetooth hopping with other
`non-enabled members of the piconet and a method of
`relating necessary interference avoidance information to the
`remote Bluetooth devices.
`Once a connection is made between a master and slave in
`a piconet, a Bluetooth service discovery protocol (SDP) can
`be used to relay capability of the slave device to participate
`in interference avoidance. This is accomplished by one
`device querying service records of another device to deter(cid:173)
`mine if the remote device supports interference avoidance. 15
`Interference avoidance capable devices will create a service
`record identifying the service and store that record in an SDP
`server database.
`In order to identify channels with fixed interferers in step
`130, an identification algorithm may be employed. The 20
`identification algorithm can use hardware (e.g., measure(cid:173)
`ment power component 66) and software (e.g., residing in
`central control system 30) to read signal strength of channels
`and determine which channels to avoid. FIG. 4 is a flow
`diagram illustrating one particular methodology for deter(cid:173)
`mining channels with interferers above a certain threshold
`according to step 130 of FIG. 3. In step 200, a master device
`obtains a next channel in a list of channels to determine
`signal strength of that channel. In step 210, the master device
`determines if there are any additional channels to scan. If the
`master device does not have additional channels to scan
`(NO), the scan is completed as illustrated in step 215. If the
`master device does have additional channels to scan (YES),
`the master device advances to step 220 where the master
`device determines signal strength of the channel. In step
`230, the master device determines if the signal strength of
`the channel is above a level one threshold. If the signal
`strength of the channel is not above a level one threshold
`(NO), the process/algorithm returns to step 200 to obtain the
`next channel. If the signal strength of the channel is above
`a level one threshold (YES), the process/algorithm advances
`to step 240. In step 240, the master device waits a prede(cid:173)
`termined period and then determines signal strength of the
`channel a second time. In step 245, the master device
`determines if the signal strength of the channel is above a
`level one threshold. If the signal strength of the channel is
`not above a level one threshold (NO), the process/algorithm
`returns to step 200 to obtain the next channel. If the signal
`strength of the channel is above a level one threshold (YES),
`the process/algorithm advances to step 250. In step 250, the 50
`master device determines if the signal strength of the chan(cid:173)
`nel is above a level two threshold. If the signal strength of
`the channel is not above a level two threshold (NO), the
`channel is placed on the level one list in step 260 and the
`process/algorithm returns to step 200 to obtain the next
`channel. If the signal strength of the channel is above a level
`two threshold (YES), the process/algorithm advances to step
`255. In step 255, the process/algorithm determines if the
`level two list is full. If the level two list is full (YES), the
`scan is complete in step 270. If the level two list is not full 60
`(YES), the channel is placed on the level two list in step 265
`and the process/algorithm returns to step 200 to obtain the
`next channel.
`In the Blue tooth example, an exemplary channel scanning
`algorithm can include reading signal strength of all 79
`Bluetooth available channels. In an alternate aspect of the
`invention, the signal strength is read from all 79 Bluetooth
`
`6
`available channels plus guardbands around the 79 Bluetooth
`channels so as to cover the full 2.4 GHz ISM band. The
`guardbands around the 79 Bluetooth channels are channels
`that are still within the ISM band but not employed by the
`Blue tooth standard. For the Bluetooth standard, this includes
`a first guardband at a frequency of 2.401 GHZ before a
`bottom frequency of the Bluetooth standard and three addi(cid:173)
`tional guardbands at frequencies of 2.481 GHZ, 2.482 GHZ
`and 2.483 GHZ above a top frequency of the Bluetooth
`10 standard. It is to be appreciated that other standards also
`include guardband frequencies, such as the IEEE 802.11
`standard.
`For example, in a two-way radio implementation during
`transmission of a voice audio signal from a device such as
`a microphone pin coupled to the two-way radio or a remote
`device, a manner in which to identify channels that should
`be avoided is to leave the two-way radio keyed for an
`additional fraction of a second (typically on the order of 0.1
`second) at the end of a transmission. When a call is initiated
`from the microphone pin, which is a remote Blue tooth audio
`device (REA), the REA keys the two-way radio for the
`duration of the audio transmission across the Bluetooth
`channel. The digital Bluetooth audio from the remote device
`is decoded and enters the two-way radio as analog audio via
`25 the accessory microphone pin. The only change to this
`normal procedure is that at the end of the Bluetooth audio
`transmission, the REA will leave the radio keyed for an
`additional fraction of a second. During this time the REA's
`receiver is free to sweep the ISM band for interferers and
`30 determine which are fixed. In this manner, the following
`channel scanning algorithm will include ISM band interfer(cid:173)
`ers generated by the two-way radio during transmit.
`The order in which channels can be scanned is equivalent
`to stepping through a code word bank of registers starting at
`35 index zero and proceeding to index seventy-eight (channels
`0, 2, 4, ... 74, 76, 78, 1, 3, 5, ... 73, 75, 77). Optionally,
`the guardbands then can be scanned. If the signal strength of
`a particular channel does not exceed a certain threshold,
`which is referred to as Levell, then it may be concluded that
`40 the channel in question will not significantly interfere with
`normal transmissions. If the signal strength does surpass the
`Level 1 threshold then the signal strength of that channel
`will be measured again 3.125 milliseconds later (the longest
`Bluetooth packet will take 3.125 milliseconds to transmit).
`45 If the signal strength does not exceed the Levell threshold
`on the second measurement then the channel does not
`contain a fixed interferer and the channel scanning algorithm
`will move on to the next channel to be scanned, thus
`avoiding identifying a hopping signal from another device as
`a candidate for removal. If on the second measurement the
`signal strength is above a different, higher threshold, which
`will is referred to as Level 2, then it is placed on an index
`of the channel on a list of Level 2 interferers called Level_
`2_List, otherwise it will be placed on a list of Level 1
`55 interferers called Level_l_List. Entries into the Level_l_
`List may be overwritten by other interferers if the Level_
`l_List becomes full. This procedure can be repeated until
`all the channels have been considered or the Level_2_List
`is full.
`In the Bluetooth example, additional channels can be
`added to the list of interferers if the appropriate number of
`interferers above a certain threshold is not identified. For
`example, if there were not four channels listed in the
`Level_2_List after the scan is complete, then the remaining
`65 slots available in the Level_2_List will be filled with the
`channel immediately before and after a channel already on
`the Level_2_List (the adjacent channel C/1 is 0 dB for a
`
`0012
`
`

`
`US 6,760,319 Bl
`
`7
`Blue tooth radio). If there are not four indices in the Level_
`2_List after the addition of the adjacent channels, then the
`remaining Level_2_List can be replaced with channels in
`the Level_1_List until there are no more channels in the
`Level_1_List.
`
`5
`
`8
`
`TABLE 1-continued
`
`Page scan/
`Inquiry scan
`
`Page/
`Inquiry
`
`Page response Connection
`(master/slave)
`state
`
`A A27-23
`
`B A22-19
`c As, 6, 4, 2, o
`
`A27-23
`
`A27-23
`
`A22-19
`As, 6, 4, 2, o
`
`A22-19
`As, 6, 4, 2, o
`
`A27-23
`._l CLK25-2r
`A22-19
`As, 6, 4, 2, o.-J
`CLK20-ro
`A18-1o ._1 CLKls-7
`D A18-1o
`A18-1o
`A1s-1o
`E A13, 11, 9, 7, s, 3, 1A13, 11, 9, 7, s, 3, 1A13, 11, 9, 7, s, 3, 1A13, 11, 9, 7, s, 3, 1
`F 0
`0
`0
`16 X CLK27-3
`mod 79
`
`FIG. 5 is a flow diagram illustrating one particular meth(cid:173)
`odology for modifying the hopping sequence of the master
`and slave device as illustrated in step 160 of FIG. 3. In step
`300, the master device and the slave device identify M 10
`channels to be avoided among N total channels. In step 310,
`both the master device and the slave device define an
`alternate register bank of N-M channels. In step 320, the
`synthesizer code words for the M channels to be avoided are
`removed. In step 330, the alternate register bank is loaded 15
`with N-M synthesizer code words for the N-M channels with
`the synthesizer code words for the M channels to be avoided
`removed. In step 340, the address scheme is reconfigured for
`addressing the alternate register bank with N-M synthesizer
`codes for N-M channels.
`
`In the Bluetooth example, the above methodology can
`seek to reduce the level of interference in a Blue tooth system
`by identifying the 4 strongest interferers, removing these
`synthesizer code words from a length-79 register bank,
`creating a new length-75 register bank. The synthesizer code
`words within the length-75 register bank can be ordered so
`that a length-32 segment still spans 64 MHz as is conven(cid:173)
`tional in a length-79 register bank. It is to be appreciated that
`the above reconfigured addressing scheme can be employed,
`so as to skip addressing of the 4 strongest interferers in the
`length-79 register bank. However, a simpler and less time
`consuming methodology would be to reduce the length
`79-register bank to a length 75-register bank.
`
`FIG. 6 illustrates a hop selection kernel370 for a 79-hop
`system as illustrated in the Bluetooth specification, while
`Table 1 below illustrates how each of the control signals
`used by the selection kernel is determined for a 79-hop
`system. During the connection state the control signals (X,
`Y1, Y2, A, B, C, D, E, F) are derived from the 27 MSB's
`(Most Significant Bits) of the CLK signal and the 28-bit
`address of the master as per Table 1. The control signals are
`used to determine addresses to a bank of 79 registers in
`segments of 32. However, after the 4 worst interferers have
`been identified the register bank will have been shortened to
`length-75, meaning that the hop selection kernel must be
`modified so that it generated addresses to a bank of 75
`registers, instead of 79, still in segments of 32. Referring to
`Table 1, the first change (of two changes) is to generate
`control signal F modulo 75 instead of modulo 79 as shown
`in Table 1. The second change (of two changes) is to change
`the modulo of the final add operation from 79 as shown in
`FIG. 6 to 75 as shown in FIG. 7 to generate a modified hop
`selection kernel 380 illustrated in FIG. 7. The modulo
`operation is well known to those skilled in the art and
`implementation of the hop selection kernel and the modulo
`operation can be employed via hardware and/or software.
`
`TABLE 1
`
`Page scan/
`Inquiry scan
`
`X CLKN16-12
`
`Y1 0
`Y2 0
`
`Page/
`Inquiry
`
`Page response Connection
`(master/slave)
`state
`Xprm4-D <79) I CL~2
`Xp4-D(79)/
`(79)
`(79)
`Xprs4--0
`Xi4--0
`CLKE1/CLKN1 CLKE1/CLKN1 CLK1
`32 x CLK1/
`32 x CLKE1/
`32 x CLK1
`32 x CLKN1
`32 x CLKN1
`
`The hop selection kernel in FIG. 7 starts by adding X and
`A modulo 32. The 4 LSB's (Least Significant Bits) of the
`result are then exc

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket