`
`Connectivity and Application
`aR wMOLL)a |
`Computing and
`OTTT@ALECEKS
`
`f
`
`YVEEEPersonal “==
`Communications
`
`SONYExhibit 1008 - 0001
`
`.
`coal Se
`
`a
`
`SONY Exhibit 1008 - 0001
`
`
`
`
`
`—
`
`FEBRUARY 2000 VOL. 7 NO. 1
`
`aR
`
`oO 7 2000
`
`THE MAGAZINE OF VWvireiS- COMMUNICATIONS AND NETWORKING
`_
`.
`ww
`
`-
`
`aus
`
`
`* =IEEEPersonal
`Communications
`
`i
`
`
`
`
`Guest Editorial:
`Connectivity and Application Enablers for
`Ubiquitous Computing and Communications
`Chatschik Bisdikian, Jaap C. Haartsen, and Parviz Kermani
`8
`Remembering Mark Weiser: Chief Technologist, Xerox PARC
`Roy Want
`11
`IrDA:Past, Present and Future
`Stuart Williams
`20
`Tein &
`netwo
`HomeRF: Wireless Networking for the Connected Home
`asynchronous <|
`~/O\,/peer-peer devices
`Kevin J. Negus, Adrian P. Stephens, and Jim Lansford
`oO
`28
`The Bluetooth Radio System
`Jaap C. Haartsen
`37
`Paving the Way for Personal Area Network Standards:
`An Overview ofthe IEEE P802.15 Working Group for
`Wireless Personal Area Networks
`Thomas M. Siep, lan C. Gifford, Richard C. Braley, and Robert F. Heile
`
`i
`
`|
`
`44
`System Support for Mobile, Adaptive Applications
`Brian Noble
`
`lgpeel
`
`
`
`Coverillustration: The Stock
`Market
`
`Editor’s Note — 4
`Index to Articles: 1999 — 50
`
`iz
`
`IEEE Personal Communications * February 2000
`
`SONYExhibit 1008 - 0002
`
`SONY Exhibit 1008 - 0002
`
`
`
`
`
`aT t is my utmost honorandprivilege
`
`EDITOR’S NOTE
`
`MAHMOUD
`NAGHSHINEH
`
`tion ofthe possibilities and potentials wire-
`less and mobile technologies will bring to us.
`It is expected that by 2003 the numberof
`cellular subscribers will be equal to the
`numberof wired phone subscribers. Obvi-
`ously, new evolving architectures and stan-
`dards, such as GPRS and EDGE,and
`third-generation systemswill play a major
`role in this transition, enabling a high-speed,
`ubiquitous wireless Internet. After all, it will
`be a totally new world when one billion peo-
`ple carry a personal gateway to the Internet
`with integrated voice and data support.
`Today, wireless technologies have crossed
`the cost, integration, and power consump-
`tion barriers, and are a key factor in defining new directions
`not only in enterprise but also in consumer markets. Sec-
`ond-generation cellular technologies are leading this front,
`
`to serve our JEEE Personal Communications
`community starting with this issue of our
`magazine. At first, on behalf of our Editorial
`Board and the IEEE Communications Soci-
`ety. | would like to extend my sincere grati-
`tude to Tom La Porta, who served as
`Editor-in-Chief from 1997 to 1999, Tom will
`continue to help and guideus as a senior
`advisor of the magazine. It will be hard to
`match the high level of leadership quality he
`has established, and I count on him, our
`founding Editor-in-Chief, Hamid Ahmadi,
`our Advisory Board, technical editors, and
`the IEEEeditorial team to help me carry my
`responsibility as the new Editor-in-Chief.
`In myview, this is the most exiting time in our area;
`we are starting a new millennium with tremendousanticipa-
`
`
`
`
`IEEE Personal Communications — The Maga-
`zine of Wireless Communications and
`Networking (ISSN 1070-9916) is published
`bimonthly by The Institute of Electrical and
`Electronics Engineers, Inc, Headquarters address:
`TEEE,3 Park Avenue, 17th Floor, New York,
`NY 10016-5997; tel: 212-705-8900; fax: 212-705-
`8999; e-mail: c.kemelmacher@comsoc.org.
`Responsibility for the contents rests upon authors
`ofsigned articles and not the IEEE orits members.
`Unless otherwise specified, the IEEE neither
`endorses nor sanctions any positions or actions
`espoused in JEEE Personal Communications,
`Annual subscription: Membersubscription:$25
`peryear, Non-membersubscription prices available
`on request. Single copy; $10 for members and $20
`for nonmembers.
`
`Director of Magazines
`MarkJ. Karol, Lucent Technologies, USA
`Editor-in-Chief
`Mahmoud Naghshineh, IBM Research, USA
`Senior Advisors
`Hamid Ahmadi, AT&T Labs, USA
`Thomas F, La Porta, Lucent Technologies, USA
`Advisory Board
`Donald Cox, Stanford University, USA
`David Goodman, Rutgers University, USA
`Jorma Lilleberg, Nokia, Finland
`Kaveh Pahlavan, Worcester Polytechnic
`Institute, USA
`Mahadey Satyanarayanan, CMU, USA
`IEEE Vehicular Technology Liaison
`Theodore Rappaport, Virginia Tech, USA
`IEEE Computer Society Liaison
`Mike Liu, Ohio State University, USA
`Technical Editors
`Editorial correspondence: Manuscripts for
`Umesh Amin, AT&T Wireless Services, USA
`consideration may be submitted to the Editor-in-
`Chief: Thomas F. La Porta, Lucent Technolo-
`B.R. Badrinath, Rutgers University, USA
`Pravin Bhagwat, IBM Research, USA
`gies, Ine., 101 Crawford Corners Road, Rm4F-519,
`Kwang-Cheng Chen, Tsing Hua Univ., Taiwan
`Holmdel, NJ07733. Electronic submissions maybe
`Si Tak Stanley Chia, AirYouch International, UK
`sent in postscript to: Up@bell-labs.com,
`Andrea Goldsmith, Caltech, USA
`Copyright and reprint permissions: Abstract-
`Paul Gough,Philips Research, UK
`ing is permitted with credit to the source. Libraries
`Davide Grillo, Fondazione Ugo Bordoni,Italy
`Jaap Haartsen, Ericsson, Sweden
`are permitted to photocopy beyondthe limits
`Takeshi Hattori, NTT, Japan
`of U.S. Copyright law for private use of patrons:
`Ravi Jain, Bellcore, USA
`those post-1977 articles that carry a code on the
`Joseph Kahn, UC Berkeley, USA
`bottomofthe first page provided the per copy fee
`Parviz Kermani, IBM Research, USA
`indicated in the code is paid through the Copyright
`Richard LaMaire, IBM Research, USA
`Clearance Center, 222 Rosewood Drive, Dan-
`Murray Mazer, Open Group Research Inst., USA
`vers, MA 01923. For other copying, reprint, or
`Sergio Palazzo, University of Catania,Italy
`republication permission, write to Director,
`Ramachandran Ramjee, Lucent Technologies,
`Publishing Services, at IEEE Headquarters. All
`Bell
`Labs, U:
`rights reserved. Copyright © 2000 by The Insti-
`Bill Schilit, FX Palo Alto Lab, Inc., USA
`Thomas Y. C. Woo, Lucent Technologies, USA
`tute of Electrical and Electronics Engineers,Inc,
`Yacov Yacobi, Microsoft Corp.,
`USA
`Postmaster: Send address changes to /EEE
`Michele Zorzi, University of CA San Diego, USA.
`Personal Communications, VEEE, 445 Hoes
`Department Editors
`Lane, Piscataway, NJ 08855-1331, or email to
`,
`boo!
`EvIEWS
`address.change(@icee.org. Printed in USA. Peri-
`Seshadri Mohan, Bellcore, USA
`odicals postage paid. at New York, NY and ataddi-
`Conference Review
`tional mailing offices. Canadian GST #125634188.
`Thomas Y. C. Woo, Lucent Technologies, USA
`Scanning the Literature
`-
`Yi-Bing Lin, National Chiao Tung Univ., Tatwan
`Subscriptions: Send orders, address changesto:
`IEEE Production Staff
`IEEE Service Center, 445 Hoes Lane, Piscat-
`away, NJ 08855-1331; tel. 908-981-0060.
`Joseph Milizzo, Manager, Print &
`Electronic Publishing
`Catherine Kemelmacher, Production Editor
`Advertising: Advertising is accepted at the dis-
`eretion of the publisher. Address correspondence
`Eric Levine, Advertising Sales Manager
`Joanne O'Rourke, Staff Assistant
`to: Advertising Manager, [EEE Personal Com-
`munications, 3035 East 47th Street, New York,
`Susan Lange, Layout Editor
`IEEE
`NY 10017-2394.
`Jennifer Porcello, Editorial Assistant
`
`
`
`
`IEEEPersonal
`Communications
`EitrieekeeCe
`
`2000 Communications Society
`Board of Governors
`
`Officers
`J. Roberto De Marea, President
`Thomas J, Plevyak, Past President
`Curtis A.Siller, ¥P—Technical Activities
`Horst Bessai, VP-Membership Services
`Douglas N. Zuckerman, P-
`Membership Development
`Federico Tosco, VP-Sociery Relations
`Harvey Freeman, Treasurer
`John M. Howell, Secretary
`
`Members-at-Large
`Class of 2000
`Gerhard Fettweis
`Paul Hartmann
`Michael Kincaid
`William R. Robinson
`Class of 2007
`Laura Cerchio
`Leonard Cimini
`Roberta Cohen
`William Tranter
`Class of2002
`Tomonori Aoyama
`Alex Gelman
`Roch Guerin
`Byeong Lee
`2000 IEEE Officers
`Bruce A. Eisenstein, President
`Joel B. Snyder, President-Elect
`David |. Kemp, Secretary
`David A. Conner, Treasurer
`Kenneth R. Laker, Past President
`Daniel J. Senese, Execunve Director
`Tom Rowbotham, Director, Division LT
`
`
`mh
`
`JEEE Personal Communications * February 2000
`
`SONY Exhibit 1008 - 0003
`
`SONY Exhibit 1008 - 0003
`
`
`
`This material may be protected by Copyright law (Title 17 U.S. Code)
`
`Abstract
`A few years ago it was recognized that the vision of a truly low-cost, low-power radio-based cable replacement was feasible. Such a ubiquitous
`link would provide the basis for portable devices to communicate together in an ad hoe fashion by creating personal area networks which have
`similar advantagesto their office environment counterpart, the local area network. Bluetooth™ is an effort by a consortium of companies to
`design a royalty-free technology specification enabling this vision. Thisarticle describes the radio system behind the Bluetooth concept. Designing
`an ad hoe radio system for worldwide usage poses several challenges. Thearticle describesthecritical system characteristics and motivates the
`design choices that have been made.
`
`The Bluetooth Radio System
`
`
`
`JAAP C. HAARTSEN, ERICSSON RADIO SYSTEMS B.V.
`
`n the last decades, progress in
`microelectronics and very large scale integration (VLSI) tech-
`nology has fostered the widespread use of computing and
`communication devices for commercial usage. The success of
`consumer products like PCs, laptops, personaldigital assis-
`tants (PDAs), cell phones, cordless phones, and their periph-
`erals has been based on continuouscost and size reduction.
`Information transfer between these devices has been cumber-
`some, mainly relying on cables. Recently, a new universal
`radio interface has been developed enabling electronic devices
`to communicate wirelessly via short-range ad hoe radio con-
`nections. The Bluetooth technology — whichhas gained the
`support of leading manufacturers like Ericsson, Nokia, IBM,
`Toshiba, Intel, and many others — eliminates the need for
`wires, cables, and the corresponding connectors between cord-
`less or mobile phones, modems, headsets, PDAs, computers,
`printers, projectors, and so on, and paves the way for new and
`completely different deyices and applications. The technology
`enables the design of low-power, small-sized, low-cost radios
`that can be embeddedin existing (portable) devices. Eventual-
`ly, these embedded radios will lead toward ubiquitous connec-
`tivity and truly connect everything to everything. Radio
`technology will allow this connectivity to occur without any
`explicit user interaction.
`This article describes the basic design and technology
`trade-offs which have led to the Bluetooth radio system. We
`describe some fundamental issues regarding ad hoc radio sys-
`tems. We give an overview of the Bluetooth system itself with
`the emphasis on the radio architecture. It explains howthe
`system has been optimized to support ad hoe connectivity. We
`also describe the Bluetooth specification effort.
`Ad Hoc Radio Connectivity
`The majority of radio systems in commercial use today are
`based on a cellular radio architecture. A mobile network estab-
`lished on a wired backboneinfrastructure uses one or more
`basestations placed at strategic positions to provide localcell
`coverage; users apply portable phones, or more generic mobile
`terminals, to access the mobile network; the terminals main-
`tain a connection to the network via a radio link to the base
`stations. Thereis a strict separation betweenthe base stations
`and the terminals. Once registered to the network, the termi-
`nals remain locked to the control channels in the network, and
`connections can be established and released according to the
`control channel protocols. Channel access, channel allocation,
`traffic control, and interference minimization are neatly con-
`
`trolled by the base stations. Examples of these conventional
`radio systems are the public cellular phone systems like Glob-
`al System for Mobile Communications (GSM), D-AMPS,and
`IS-95 [1-3], but also private systemslike wireless local area
`network (WLAN) systems based on 802.11 or HIPERLAN I
`and HIPERLAN II [4-6]. and cordless systems like Digital
`Enhanced Cordless Telecommunications (DECT) and Person-
`al Handyphone System (PHS)[7, 8].
`In contrast, in truly ad hoc systems, there is no difference
`between radio units; that is, there are no distinctive base sta-
`tions or terminals. Ad hoc connectivity is based on peer com-
`munications. There is no wired infrastructure to support
`connectivity between portable units; there is no central con-
`troller for the units to rely on for making interconnections; nor
`is there support for coordination of communications. In addi-
`tion, there is no intervention of operators. For the scenarios
`envisioned by Bluetooth,it is highly likely that a large number
`of ad hoc connectionswill coexist in the same area without any
`mutual coordination; that is, tens of ad hoc links must share
`the same medium at the same location in an uncoordinated
`fashion. This is different from ad hoc scenarios considered in
`the past, where ad hoc connectivity focused on providing a sin-
`gle (or very few) network(s) between the units in range [4,5].
`For the Bluetooth applications, typically many independent
`networks overlap in the same area. This will be indicated as a
`seatter ad hoc environment. Scatter ad hoc environments con-
`sist of multiple networks, each containing only a limited num-
`ber of units. The difference between a conventionalcellular
`environment, a conventional ad hoc environment, and a scatter
`ad hoc environmentis illustrated in Fig. 1. The environmental
`characteristics the ad hoc radio system has to operate in have a
`major impacton the following fundamental issues:
`* Applied radio spectrum
`* Determining which units are available to connect to
`* Connection establishment
`* Multiple access scheme
`* Channelallocation
`* Medium access control
`* Service prioritization (i.e., voice before data)
`* (Mutual) interference
`* Power consumption
`Ad hoe radio system have been in use for some time, for
`example, walky-talky systems used by the military, police, fire
`departments, and rescue teams in general. However, the Blue-
`tooth system is the first commercial ad hoe radio system envi-
`sioned to be used on a large seale and widely available to the
`public.
`
`;
`
`1070-9916/00/$10.00 © 2000 IEEE
`28
`—_—_—_—_—_—_—_—_—_—_—
`
`IEEE Personal Communications « February 2000
`SONY Exhibit 1008 - 0004 _
`
`SONY Exhibit 1008 - 0004
`
`
`
`
`
`
`
`
`yee
`
`i
`
`<
`
`~
`
`e
`
`-
`
`odes
`e me
`
`s. =
`=.
`--
`ie a
`ns
`en
`3
`4
`'
`&
`a © Oa
`e@
`@
`/
`Deere
`Ta
`' a \
`hee
`e
`fl Ge
`i
`:
`| @ e
`at
`7 ae
`i
`ae
`ee es Leeae ce
`“
`a
`nt
`"
`‘ye
`a
`Ea
`on
`i
`cm)
`‘ Seite fe, |
`my
`‘
`‘|
`«4
`'
`'
`Y
`‘
`=:
`if
`geen e, \e
`1 @
`eee
`,
`a)
`’
`.
`ae
`a
`f
`e
`ae
`mL
`ni
`:
`r
`i
`any
`ba fe
`Fews
`<
`Pa) |ae
`
`e
`
`#
`
`iv
`
`(b)
`
`~. 8.
`
`cs
`
`4
`
`;
`
`‘
`
`;
`«
`\
`1
`;
`'
`a
`‘
`;
`
`F
`
`u
`
`
`
`
`
`Bluetooth Radio System Architecture
`
`In this section the technical background of the Bluetooth
`radio system is presented. [t describes the design trade-offs
`made in order to optimize the ad hoc functionality and
`addresses the issues listed above.
`
`Radio Spectrum
`The choice of radio spectrum is first determined by the lack
`of operator interaction. The spectrum must be opento the
`public without the need for licenses. Second, the spectrum
`must be available worldwide. The first Bluetooth applications
`are targeted at the traveling businessperson who connects
`his/her portable devices wherever he/she goes. Fortunately,
`there is an unlicensed radio band thatis globally available.
`This band, the Industrial, Scientific, Medical (ISM) band,is
`centered around 2.45 GHz and was formerly reserved for
`some professional user groups but has recently been opened
`worldwide for commercial use. In the United States, the band
`ranges from 2400 to 2483.5 MHz,and the FCC Part 15 regu-
`lations apply. In most parts of Europe,! the same band is
`available under the ETS-300328 regulations. In Japan, recent-
`ly the band from 2400 to 2500 MHz has been allowed for
`commercial applications and has been harmonized with the
`rest of the world. Summarizing, in most countries of the
`world, free spectrum is available from 2400 MHz to 2483.5
`MHz, and harmonization efforts are ongoing to have this
`radio band available truly worldwide.
`The regulations in different parts of the world differ. How-
`ever, their scope is to enable fair access to the radio band by
`an arbitrary user. The regulations generally specify the
`spreading of transmitted signal energy and maximum allow-
`able transmit power. For a system to operate globally, a radio
`concept has to be found thatsatisfies all regulations simulta-
`neously. The result will therefore be the minimum denomina-
`tor of all the requirements.
`Interference Immunity
`Since the radio bandis free to be accessed by any radio trans-
`mitter as long as it satisfies the regulations, interference
`immunity is an important issue. The extent and nature of the
`interference in the 2.45 GHz ISM band cannotbe predicted.
`Radio transmitters may range, for example, from 10 dBm
`baby monitors to 30 dBm WLAN access points. With high
`probability, the different systems sharing the same bandwill
`not be able to communicate. Coordination is therefore not
`possible. More of a problem are the high-power transmitters
`covered by the FCC part 18 rules which include, for example,
`microwave ovensand lighting devices. These devices fall out-
`side the power and spreading regulations of part 15, butstill
`coexist in the 2.45 GHz ISM band.In addition to interference
`from external sources, co-user interference must be taken into
`account, which results from other Bluetooth users.
`Interference immunity can be obtained by interference
`suppression or avoidance. Suppression can be obtained by
`coding or direct-sequence spreading. However, the dynamic
`range of the interfering and intended signals in an ad hoc,
`uncoordinated radio environment can be huge. Taking into
`account the distance ratios and power differences of uncoordi-
`nated transmitters, near-far ratios in excess of 50 dB are no
`exception. With desired user rates on the order of 1 Mb/s and
`beyond, practically attained coding and processing gains are
`inadequate. Instead, interference avoidance is more attractive
`
`)
`
`(a
`
`=
`ass
`‘@.
`'
`‘
`x
`a Tsay
`se
`Be
`/@ “@:
`ie 4
`a ‘
`'
`1
`~~
`‘@:
`| ces
`ae
`'
`1
`hi
`'
`v
`eee
`aa
`t
`‘
`my
`ae
`i
`4
`Pie ere
`'
`‘
`‘
`/
`5
`i
`‘
`1
`ieee i
`‘
`ea
`re
`'
`#
`1
`mae
`,
`“@
`'
`.:
`ie vA ae
`oft
`i
`eee ara ret
`'
`OE
`’
`s
`iF
`
`‘
`
`2.
`
`t
`
`(c)
`
`§ Figure 1. Topologiesfor: a) cellular radio systems with squares
`representing stationary base stations; b) conventional ad hoc
`systems; and ¢) scatter ad hac systems.
`
`since the desired signal is transmitted at points in frequency
`and/or time where interference is low or absent. Avoidance in
`time can be an alternative if the interference concerns a
`pulsed jammer and the desired signal can be interrupted.
`Avoidance in frequencyis more practical. Since the 2.45 GHz
`band provides about 80 MHz of bandwidth and most radio
`systems are band-limited, with high probability a part of the
`radio spectrum can be found where there is no dominant
`interference. Filtering in the frequency domain provides the
`suppression of the interferers at other parts of the radio band.
`The filter suppression can easily arrive at 50 dB or more.
`Multiple Access Scheme
`The selection of the multiple access scheme for ad hoc radio
`systems is driven by the lack of coordination and the regula-
`tions in the ISM band. Frequency-division multiple access
`(FDMA)is attractive for ad hoc systems since channel orthog-
`onality only relies on the accuracy of the crystal oscillators in
`the radio units. Combined with an adaptive or dynamic chan-
`nel allocation scheme, interference can be avoided. Unfortu-
`nately, pure FDMA does not
`fulfill
`the spreading
`requirements set in the ISM band. Time-division multiple
`access (TDMA)requiresstrict time synchronization for chan-
`nel orthogonality. For multiple collocated ad hoe connections,
`maintaining a common timing reference becomes rather cum-
`bersome. Code-division multiple access (CDMA)offers the
`best properties for ad hoc radio systemssince it provides
`spreading and can deal with uncoordinated systems. Direct
`sequence (DS)-CDMAisless attractive because of the near-
`far problem which requires coordinated power control or
`excessive processing gain. In addition, as in TDMA, DS-
`CDMA channel orthogonality requires a commontiming ref-
`erence. Finally, for higher user rates, rather high chiprates
`are required, which is less attractive because of the wide
`bandwidth (interference immunity) and higher current con-
`sumption. Frequency-hopping (FH)-CDMA combines a num-
`ber properties which makeit the best choice for ad hoc radio
`systems. On average the signal can be spread overa large fre-
`quency range, but instantaneously only a small bandwidth is
`occupied, avoiding most of the potential interference in the
`ISM band. The hop carriers are orthogonal, and the interfer-
`"In France and Spain the exact locationofthe band differs, and the band
`is smaller.
`ence on adjacent hops can effectively be suppressed byfilter-
`
`TEBE Personal Communications * February 2000
`i
`
`29
`
`SONY Exhibit 1008 - 0005
`
`SONY Exhibit 1008 - 0005
`
`
`
`
`
`'‘
`1
`#(k)
`f{k + 1)
`f(k + 2)
`1
`'''‘1
`i
`4
`4
`‘
`
`4
`.’
`i
`1
`‘
`1'''
`‘
`'
`'
`t
`4'/1'
`''
`’
`Saa ee
`i
`1i
`1
`‘
`
`i]
`
`t
`
`ing. The hop sequenceswill not be orthogonal (coordination
`of hop sequencesis not allowed by the FCC rules anyway),
`but narrowband and co-user interference is experienced as
`short interruptions in the communications, which can be over-
`come with measuresat higher-layer protocols,
`Bluetooth is based on FH-CDMA. In the 2.45 GHz ISM
`band, a set of 79 hop carriers have been defined at a 1 MHz
`spacing.? The channelis a hopping channel with a nominal
`hop dwell time of 625 is. A large number of pseudo-random
`hopping sequences have been defined. The particular
`sequenceis determined by the unit that controls the FH chan-
`nel, which is called the master. The native clock of the master
`unit also defines the phase in the hopping sequence.All other
`participants on the hopping channel areslaves; they use the
`master identity to select the same hopping sequence and add
`time offsets to their respective native clocks to synchronize to
`the frequeney hopping. In the time domain, the channelis
`divided into slots. The minimum dwell time of 625 us corre-
`spondsto a single slot. To simplify implementation, full-
`duplex communicationsis achieved by applying time-division
`duplex (TDD). This means that a unit alternately transmits
`and receives. Separation of transmission and reception in time
`effectively prevents crosstalk between the transmit and receive
`operationsin the radio transceiver, which is essential if a one-
`chip implementation is desired, Since transmission and recep-
`tion take place at different time slots, transmission and
`reception also take place at different hop carriers. Figure 2
`illustrates the FH/TDD channelapplied in Bluetooth. Note
`that multiple ad hoc links will make use of different hopping
`channels with different hopping sequences and may have mis-
`aligned slottiming,
`The Modulation Scheme
`In the ISM band,the signal bandwidth of FH systemsis limit-
`ed to 1 MHz. For robustness, a binary modulation scheme was
`chosen. With the above-mentioned bandwidth restriction, the
`data rates are limited to about 1 Mb/s. For FH systems and
`support for bursty data traffic, a noncoherent detection
`scheme is most appropriate. Bluetooth uses Gaussian-shaped
`frequency shift keying (FSK) modulation with a nominal mod-
`ulation index of k = 0.3. Logical onesare sentas positive fre-
`quency deviations, logical zeroes as negative frequency
`deviations. Demodulation can simply be accomplished by a
`limiting FM discriminator. This modulation scheme allows the
`implementation of low-cost radio units,
`
`Medium Access Control
`Bluetooth has been optimized to allow a large numberof
`uncoordinated communications to take place in the same
`area. Unlike other ad hoc solutions whereall units in range
`es
`
`30
`
`
`
`IEEE Personal Communications « February 2000
`
`SONYExhibit 1008-0006
`
`‘
`'
`1
`i
`4
`‘
`4
`1
`I
`4
`4
`4
`1
`a
`A
`4
`i)
`1
`i
`
`i 6
`
`share the same channel, Bluetooth has been
`designed to allow a large numberof independent
`channels, each channel serving only a limited num-
`ber of participants. With the considered modulation
`scheme, a single FH channel in the ISM band only
`supports a gross bit rate of 1 Mb/s. This capacity has
`to be shared by all participants on the channel. The-
`oretically, the spectrum with 79 carriers can support
`25 tis
`79 Mb/s. In the user scenarios targeted by Blue-
`tooth, it is highly unlikely that all units in range
`@ Figure 2. An illustration ofthe FH/TDD channel applied in Bluetooth.
`need to share information among all of them. By
`using a large numberof independent 1 Mb/s chan-
`nels to which only the units are connectedthat real-
`ly want to exchange information, the 80 MHzis exploited
`much more effectively. Due to nonorthogonality of the hop
`sequences, the theoretical capacity of 79 Mb/s cannot be
`reached, butis at least much larger than 1 Mb/s.
`An FH Bluetooth channelis associated with a piconet. As
`mentioned earlier, the piconet channelis defined by the identi-
`ty (providing the hop sequence) and system clock (providing
`the hop phase) of a master unit, All other units participating in
`the piconet are slaves. Each Bluetooth radio unit has a free-
`running system or native clock, There is not a commontiming
`reference, but when a piconetis established, the slaves add off-
`sets to their native clocks to synchronize to the master. These
`offsets are released again when the piconetis cancelled, but can
`be stored for later use. Different channels have different mas-
`ters and therefore also different hopping sequences and phases.
`The numberof units that can participate on a common channel
`is deliberately limited to eight (one master and seven slaves) in
`order to keep a high-capacity link betweenall the units. It also
`limits the overhead required for addressing. Bluetooth is based
`on peer communications. The master/slaverole is only attribut-
`ed to a unit for the duration of the piconet. When the piconet
`is cancelled, the master and slave roles are cancelled. Each unit
`can become a master or slave. By definition, the unit that estab-
`lishes the piconet becomes the master,
`In addition to defining the piconet, the master also controls
`the traffic on the piconet and takes care of access control.
`Access is completely contention free. The short dwell time of
`625 js only allows the transmission of a single packet. A con-
`tention-based access scheme would provide too much over-
`head and is not efficient in the short dwell time Bluetooth
`applies. In Bluetooth, the master implements centralized con-
`trol; only communication between the master and one or more
`slaves is possible. The timeslots are alternately used for mas-
`ter transmission and slave transmission. In the master trans-
`mission, the master includes a slave address of the unit for
`which the information is intended. In order to preventcolli-
`sions on the channel due to multiple slave transmissions, the
`master applies a polling technique: for each slave-to-master
`slot, the master decides which slave is allowed to transmit. This
`decision is performed on a per-slot basis: only the slave
`addressed in the master-to- slave slot directly preceding the
`slave-to-masterslot is allowed to transmit in this slave-to-mas-
`ter slot. If the master has information to send to a specific
`slave, this slave is polled implicitly and can return information.
`If the master has no information to send,it has to poll the
`slave explicitly with a short poll packet. Since the master
`Schedules the traffic in both the uplink and downlink,intelli-
`gent scheduling algorithms have to be used that take into
`account the slave characteristics. The master control effectively
`prevents collisions between theparticipants on the piconet
`channel. Independentcollocated piconets may interfere when
`they occasionally use the same hop carrier. A type of ALOHA
`? Currently, for France and Spain a reduced set af23 hop carriers has been
`is applied: information is transmitted without checking for a
`defined at a 1 MHz carrier spacing.
`clear carrier (no listen-before-talk). If the information is
`
`
`SONY Exhibit 1008 - 0006
`
`
`
`
`
`
`72bits 54 bits
`
`0-2745 bits
`
`received incorrectly, it is retransmitted at the next
`transmission opportunity (for data only), Due to the
`short dwell time, collision avoidance schemes are
`less appropriate for FH radio. For each hop, differ-
`ent contenders are encountered. Backoff mecha-
`nisms are therefore less efficient.
`
`Payload
`Packet
`Access
`
`code header
`
`M Figure 3. The format ofpackets applied in Bluetooth.
`
`Physical Link Definition
`The Bluetooth link supports both synchronousservices such
`as voice traffic, and asynchronous services such as bursty data
`traffic. Two physical link types have been defined:
`* The synchronous connection-oriented (SCO)link
`* The asynchronous connectionless (ACL) link
`The SCOlinkis a point-to-point link between the master
`and a single slave. The link is established by reservation of
`duplex slots at regular intervals. The ACLlink is a point-to-
`multipoint link between the master and all the slaves on the
`piconet. The ACLlink can use all of the remainingslots on
`the channel not used for SCO links. The traffic over the
`ACL link is scheduled by the master. The slotted structure
`of the piconet channel allows effective mixing of the syn-
`chronous and asynchronouslinks. An example of a channel
`
`
`Packet-Based Communications
`have been defined, as will be further explained later. The
`The Bluetooth system uses packet-based transmission: the
`interpretation of packettype is different for synchronous and
`information stream is fragmented into packets. In each slot,
`asynchronous links. Currently, asynchronous links support
`only a single packet can be sent. All packets have the same
`payloads with or without a 2/3-rate FEC coding scheme. In
`format, starting with an access code, followed by a packet
`addition, on these links single-slot, three-slot, and five-slot
`header, and ending with the user payload (Fig.3),
`packets are available. The maximum user rate that can be
`The access code has pseudo-random properties andis used
`obtained over the asynchronous link is 723.2 kb/s. In that
`as a direct-sequence code in certain access operations. The
`case, a return link of 57.6 kb/s can still be supported. Link
`access code includes the identity of the piconet master. All pack-
`adaptation can be applied on the asynchronouslink by chang-
`ets exchanged on the channel are identified by this master iden-
`ing the packet length and FEC coding depending on link con-
`tity. Only if the access code matches the access code
`ditions. The payload length is variable and depends on the
`correspondingto the piconet masterwill the packet be accepted
`available user data. However, the maximum length is limited
`by the recipient. This prevents packets sent in one piconetfalse-
`by the minimum switching time between RX and TX, which
`ly being accepted by units of another piconet that happens to
`is specified at 200 us. This switching time seems large, but
`land on the same hopcarrier. In the receiver, the access code is
`allows the use of open-loop voltage controlled oscillators
`matched against the anticipated code inasliding correlator,
`(VCOs) for direct modulation and provides time for packet
`This correlator provides the direct-sequence processing gain.
`processing between RX and TX;
`this is also discussedlater.
`The packet header contains link control information: a 3-bit
`For synchronous links, only single-slot packets have been
`slave address to separate the slaves on the piconet, a 1-bit
`defined, The payload length is fixed. Payloads with 1/3-rate
`acknowledgment/negative acknowledgmennt (ACK/NACK)for
`FEC, 2/3-rate, or no FEC are supported. The synchronous
`the automatic repeat request (ARQ) scheme, a 4-bit packet type
`link supports a full-duplex link with a user rate of 64 kb/s in
`both directions.
`code to define 16 different payload types, and an 8-bit header
`error check (HEC) code which is a cyclic redundancy check
`(CRC) code to detect errors in the header. The packet headeris
`limited to 18 information bits in orderto restrict the overhead.
`The headeris further protected by 1/3 rate forward error correc-
`tion (FEC) coding. Bluetooth defines four control packets:
`* The ID or identification packet: Only consists of the access
`code; used for signaling
`* The NULL packet: Only has an access code and a packet
`header; used if link control information carried by the
`packet header has to be conveyed
`* The POLL packet: Similar to the NULL packet; used by the
`master to force slaves to return a response
`* The FHS packet: An FH-synchronization packet; used to
`exchange real-time clock and identity information between
`the units; contains all the information to get two units hop
`synchronized
`T