throbber

`WIRELESS COMMUNICATIONSWIRELESS COMMUNICATIONS
`
`AND NETWORKSAND NETWORKS
`
`SeCOND EDITIONSeCOND EDITION
`
`
`
`Williant StallingsWilliant Stallings
`
`
`
`•Upper Saddle River, NJ 07458•Upper Saddle River, NJ 07458
`
`Cellspin Ex. 2008 - Pg. 1
`
`Petition for Inter Parties Review
`of U.S. Patent No. 9,258,698
`EXHIBIT
`
`Cellspin-2008
`
`IPR2019-00127
`
`exhibitsticker.com
`
`

`

`-
`
`Library of Congress Cataloging-in-Publication Data on file
`
`Vice President and Editorial Director, ECS:
`MarciaJ Horton
`Publisher: Alan Apt
`Associate Editor: TOni D. Holm
`Editorial Assistant: Patrick Lindner
`Vice President and Director of Production and
`Manufacturing, ESM: David W Riccardi
`Executive Managing Editor: Vince OJBrien
`Managing Editor: Camille Trentacoste
`Production Editor: Rose Kernan
`Cover Photo: Brand X Pictures
`
`Director of Creative Services: Paul Belfanti
`Art Director: Heather Scott
`Cover Designer: Tamara Newnam
`Managing Editor,AV Management
`and Production: Patricia Burns
`Art Editor: Gregory Dulles
`Manufacturing Manager: Trudy Pisdotti
`Manufacturing Buyer: Lynda Castillo
`Marketing Manager: Pamela Hersperger
`Marketing Assistant: Barrie Reinhold
`
`.
`
`.
`
`• •
`
`© 2005,2002 Pearson Education, Inc.
`Pearson Prentice Hall
`Pearson Education, Inc.
`Upper Saddle River, NJ 07458
`
`All rights reserved. No part of this book may be reproduced, in any form or by any means, without permission
`in writing from the publisher.
`
`Pearson Prentice Hall® is a trademark of Pearson Education, Inc.
`
`The author and publisher of this book have used their best efforts in preparing this book. These efforts include the
`development, research, and testing of the theories and programs to determine their effectiveness. The author and
`publisher make no warranty of any kind, expressed or implied, with regard to these programs or the documentation
`contained in this book. The author and publisher shall not be liable in any event for incidental or consequential
`damages in connection with, or arising out of, the furnishing, performance, or use of these programs.
`
`Printed in the United States ofAmerica
`10987654321
`
`ISBN: 0-13-191835-4
`
`Pearson Education Ltd., London
`Pearson Education Australia Pty. Ltd., Sydney
`Pearson Education Singapore, Pte. Ltd.
`Pearson Education North Asia Ltd., Hong Kong
`Pearson Education Canada, Inc., TOronto
`Pearson EducaCion de Mexico, S.A. de C.V.
`Pearson Education~apan,TOkyo
`Pearson Education Malaysia, Pte. Ltd.
`Pearson Education Inc., Upper Saddle River, NewJersey
`
`Cellspin Ex. 2008 - Pg. 2
`
`

`

`As always)
`for my loving wife
`and her constant companions
`Geoffroi and Helma
`
`Cellspin Ex. 2008 - Pg. 3
`
`

`

`CONTENTS
`
`Preface xi
`
`Chapter 1
`1.1
`1.2
`1.3
`1.4
`1.5
`1.6
`1.7
`1.8
`
`Introduction 1
`Wireless Comes ofAge 2
`The Cellular Revolution 3
`The Global Cellular Network 4
`Broadband 5
`Future Trends 5
`The Trouble with Wireless 7
`Outline of the Book 7
`Internet and Web Resources 10
`
`PART ONE TECHNICAL BACKGROUND 13
`Chapter 2
`Transmission Fundamentals 14
`2.1
`Signals for Conveying Information 15
`2.2
`Analog and Digital Data Transmission 22
`2.3
`Channel Capacity 27
`2.4
`Transmission Media 31
`2.5
`Multiplexing 36
`2.6
`Recommended Readings and Web Sites 40
`2.7
`Key Terms, Review Questions, and Problems 41
`Appendix 2A Decibels and Signal Strength 43
`Communication Networks 46
`LANs,MANs,andWANs 47
`Switching Techniques 49
`Circuit Switching 50
`Packet Switching 54
`Asynchronous Transfer Mode 60
`Recommended Readings and Web Sites 65
`key Terms, Review Questions, and Problems 66
`Protocols and the TCPlIP Suite 69
`The Need for a Protocol Architecture 70
`The TCP/IP Protocol Architecture 71
`The OSI Model 75
`Internetworking 77
`Recommended Readings and Web Sites 83
`Key Terms, Review Questions, and Problems 83
`Appendix 4A Internet Protocol 85
`Appendix 4B Transmission Control Protocol 88
`Appendix 4C User Datagram Protocol 92
`
`Chapter 3
`3.1
`3.2
`3.3
`3.4
`3.5
`3.6
`3.7
`Chapter 4
`4.1
`4.2
`4.3
`4.4
`4.5
`4.6
`
`--VII
`
`Cellspin Ex. 2008 - Pg. 4
`
`

`

`-
`
`...
`Vlll CONTENTS
`
`PART TWO WIRELESS COMMUNICATION TECHNOLOGY 94
`Antennas and Propagation 95
`Chapter 5
`5.1
`Antennas 96
`5.2
`Propagation Modes 101
`5.3
`Line-of-Sight Transmission 105
`5.4
`Fading in the Mobile Environment 115
`5.5
`Recommended Readings and Web Sites 122
`5.6
`Key Terms, Review Questions, and Problems 123
`Chapter 6
`Signal Encoding Techniques 127
`6.1
`Signal Encoding Criteria 129
`6.2
`Digital Data, Analog Signals 131
`6.3
`Analog Data, Analog Signals 142
`6.4
`Analog Data, Digital Signals 148
`6.5
`Recommended Readings 155
`6.6
`Key Terms, Review Questions, and Problems 155
`Spread Spectrum 159
`Chapter 7
`7.1
`The Concept of Spread Spectrum 160
`7.2
`Frequency Hopping Spread Spectrum 161
`7.3
`Direct Sequence Spread Spectrum 166
`7.4
`Code Division Multiple Access 170
`7.5
`Generation of Spreading Sequences 173
`7.6
`Recommended Readings and Web Sites 186
`7.7
`Key Terms, Review Questions, and Problems 186
`Coding and Error Control 192
`Chapter 8
`8.1
`Error Detection 193
`8.2
`Block Error Correction Codes 200
`Convolutional Codes 216
`8.3
`8.4
`Automatic Repeat Request 223
`8.5
`Recommended Readings 230
`8.6
`Key Terms, Review Questions, and Problems 231
`
`PART THREE WIRELESS NETWORKING 236
`Satellite Communications 237
`Chapter 9
`9.1
`Satellite Parameters and Configurations 238
`9.2
`Capacity Allocation-Frequency Division 250
`9.3
`Capacity Allocation-Time Division 256
`9.4
`Recommended Readings and Web Sites 261
`9.5
`Key Terms, Review Questions, and Problems 262
`Cellular Wireless Networks 264
`Chapter 10
`10.1
`Principles of Cellular Networks 265
`10.2
`First-Generation Analog 282
`10.3
`Second-Generation TDMA 285
`10.4
`Second-Generation CDMA 298
`10.5
`Third-Generation Systems 304
`
`Cellspin Ex. 2008 - Pg. 5
`
`

`

`CONTENTS IX
`
`.
`
`10.6
`10.7
`Chapter 11
`11.1
`11.2
`11.3
`11.4
`11.5
`
`Chapter 12
`12.1
`12.2
`12.3
`12.4
`
`Recommended Readings and Web Sites 311
`Key Terms, Review Questions, and Problems 314
`Cordless Systems and Wireless Local Loop 317
`Cordless Systems 318
`Wireless Local Loop 329
`WiMAX and IEEE 802.16 Broadband Wireless Access Standards 342
`Recommended Readings and Web Sites 354
`Key Terms, Review Questions, and Problems 355
`Appendix llA Linear Predictive Filters 356
`Mobile IP and Wireless Access Protocol 358
`Mobile IP 359
`Wireless Application. Protocol 373
`Recommended Readings and Web Sites 394
`Key Terms, Review Questions, and Problems 396
`Appendix 12A Internet Control Message Protocol 397
`Appendix 12B Message Authentication 401
`Appendix 12C Service Primitives and Parameters 402
`
`PART FOUR WIRELESS LANS 404
`Chapter 13
`Wireless Lan Technology 405
`13.1
`Overview 406
`13.2
`Infrared LANs 413
`13.3
`Spread Spectrum LANs 417
`13.4
`Narrowband Microwave LANs 418
`13.5
`Recommended Readings and Web Sites 419
`13.6
`Key Terms, Review Questions, and Problems 419
`Chapter 14
`Wi-Fi and the IEEE 802.11 Wireless Lan Standard 421
`14.1
`IEEE 802 Protocol Architecture 422
`14.2
`IEEE 802.11 Architecture and Services 428
`14.3
`IEEE 802.11 Medium Access Control 433
`14.4
`IEEE 802.11 Physical Layer 442
`14.5
`Other IEEE 802.11 Standards 451
`14.6
`Recommended Readings and Web Sites 458
`14.7
`Key Terms, Review Questions, and Problems 459
`Appendix 14A Scrambling 460
`Bluetooth and IEEE 802.15 463
`Overview 464
`Radio Specification 471
`Baseband Specification 472
`Link Manager Protocol 491
`Logical Link Control and Adaptation Protocol 495
`IEEE 802.15 501
`Recommended Readings and Web Sites 508
`Key Terms, Review Questions, and Problems 509
`
`Chapter 15
`15.1
`15.2
`15.3
`15.4
`15.5
`15.6
`15.7
`15.8
`
`Cellspin Ex. 2008 - Pg. 6
`
`

`

`X CONTENTS
`
`APPENDICES 511
`Appendix A
`Traffic Analysis 511
`A.l
`Basic Traffic Concepts 512
`A.2
`Multiserver Models 513
`A.3
`Recommended Reading 519
`Appendix B
`Fourier Analysis 520
`B.l
`Fourier Series Representation of Periodic Signals 521
`B.2
`Fourier Transform Representation of Aperiodic Signals 522
`B.3
`Recommended Readings 525
`Appendix C
`Data Link Control Protocols 526
`C.l
`High-Level Data Link Control 527
`Glossary 533
`References 540
`Index 547
`
`Cellspin Ex. 2008 - Pg. 7
`
`

`

`'¥
`
`"';\ ••-
`. ~ , ; ~
`';-j-,+<-('
`
`"
`
`PREFACE
`
`Wireless technology has become the most exciting area in telecommunications and network(cid:173)
`ing. The rapid growth of mobile telephone use, various satellite services, and now the wireless
`Internet and wireless LANs are generating tremendous changes in telecommunications and
`networking. This book explores the key topics in the field in the following general categories:
`• Technology and architecture: There is a small collection of ingredients that serves to char(cid:173)
`acterize and differentiate wireless communication and networking, including frequency
`band, signal encoding technique, error correction technique, and network architecture.
`• Network type: This book covers the important types of wireless networks, including
`satellite, cellular, fixed wireless access, and wireless LANs.
`• Design approaches: The book examines alternative design choices and assesses their
`relative merits.
`• Applications: A number of key technologies and applications have been developed on
`top of wireless infrastructures, especially mobile IP and wireless Web access.
`Throughout, there is an emphasis on both technology and on standards. The book pro(cid:173)
`vides a comprehensive guide to understanding specific wireless standards, such as those pro(cid:173)
`mulgated by lTD and IEEE 802, as well as standards developed by other organizations. This
`emphasis reflects the importance of such standards in defining the available products and
`future research directions in this field.
`
`This book is intended for a broad range of readers who will benefit from an understanding
`of wireless communications and networks, and the associated technologies. This includes stu(cid:173)
`dents and professionals in the fields of data processing and data communications, designers
`and implementers, and data communication and networking customers and managers. For
`the professional interested in this field, the book serves as a basic reference volume and is
`suitable for self-study.
`As a textbook, it is suitable for an advanced undergraduate or graduate course. It cov(cid:173)
`ers the material in the CS332 Wireless and Mobile Computing advanced course of the joint
`ACM/IEEE Computing Curricula 2001. The chapters and parts of the book are sufficiently
`modular to provide a great deal of flexibility in the design of courses.
`
`The book treats a number of advanced topics and provides a brief survey of the required ele(cid:173)
`mentary topics. For the reader with little or no background in data communications, Part
`One and the appendices cover a number of basic topics. The book is divided into four parts:
`• Technical Background
`• Wireless Communication Technology
`
`Xl
`
`Cellspin Ex. 2008 - Pg. 8
`
`

`

`xii PREfACE
`
`• Wireless Networking
`• Wireless LANs
`In addition, the book includes an extensive glossary, a list of frequently used acronyms,
`and a bibliography. Each chapter includes problems, suggestions for further reading, and a
`list of relevant Web sites. Each chapter also includes, for review, a list of key words and a
`number of review questions.
`
`There is a Web site for this book that provides support for students and instructors. The site
`includes links to other relevant sites, transparency masters of figures and tables from the book
`in PDF (Adobe Acrobat) format, PowerPoint slides, and sign-up information for the book's
`Internet mailing list. The Web page is at WilliamStallings.comlWireless/Wireless2e.html; see
`Section 1.8 for more information. An Internet mailing list has been set up so that instructors
`using this book can exchange information, suggestions, and questions with each other and with
`the author. As soon as typos or other errors are discovered, an errata list for this book will be
`available at WilliamStallings.com. I also maintain the Computer Science Student Resource
`Site at WilliamStallings.com/StudentSupport.html.
`
`In the three years since the first edition of this book was published, the field has seen con(cid:173)
`tinued innovations and improvements. In this new edition, I try to capture these changes
`while maintaining a broad and comprehensive coverage of the entire field. To begin the
`process of revision, the first edition of this book was extensively reviewed by a number of
`professors who teach the subject. The result is that, in many places, the narrative has been
`clarified and tightened, and illustrations have been improved. Also, a number of new "field(cid:173)
`tested" problems have been added.
`Beyond these refinements to improve pedagogy and user friendliness, the technical
`content of the book has been updated throughout, to reflect the ongoing changes in this
`exciting field. Every chapter has been revised. Highlights include the following:
`• Minimum shift keying: MSK is a form of modulation that is found in some mobile
`communications systems. This material is now covered.
`• CDMA2000: The first 3G (third generation) wireless system to be deployed commercially
`is known as CDMA2000 1xEV-Do. A discussion of this important standard is included.
`• WiMAX and IEEE 802.16a: Work on wireless local loop has evolved, including the intro(cid:173)
`duction of the WiMAX specification to provide interoperability specifications for 802.16.
`Chapter 11 includes new material on 802.16, including the recent 802.16a standard.
`• Orthogonal frequency division multiplexing: The popularity of OFDM is increasing
`and is used in a variety of local and wide area wireless standards. The material on
`OFDM has been updated and expanded.
`• Wi-Fi and IEEE 802.11: The coverage of 802.11a and 802.11b has been expanded
`significantly, and treatment of 802.11g had been added.
`• Data scrambling: Scrambling is a technique often used to improve signal quality. An
`overview of data scrambling is provided in Chapter 14.
`
`Cellspin Ex. 2008 - Pg. 9
`
`

`

`...
`PR.EFACE XIll
`
`• Wi-Fi protected access: WPA has replaced Wireless Equivalent Privacy (WEP) as
`the specification for providing security in wireless LANs. Chapter 14 provides
`coverage of WPA.
`• IEEE 802.15 and personal area networks: The initial 802.15.1 standard provides an
`official specification for Bluetooth, which was covered in the first edition as well as
`this edition. This edition also covers two new standards: the 802.15.3 high-speed
`wireless PAN standard and the 802.15.4 low-speed wireless PAN standard.
`• Trellis-coded modulation: TCM is a technique that provides for efficient use of
`bandlimited channels; it is described in Chapter 15.
`In addition, throughout the book, virtually every topic has been updated to reflect the
`developments in standards and technology that have occurred since the publication of the
`first edition.
`
`This new edition has benefited from review by a number of people, who gave generously of
`their time and expertise. The following people reviewed all or a large part of the manuscript:
`Dr. Albert Cheng (University of Houston-University Park), Dale W. Callahan (University of
`Alabama, Birmingham), Ravi Sankar (University of South Florida, Tampa), Pei Zheng
`(Arcadia University, Pennsylvania), and Anne Cox (Austin Community College, Texas).
`Thanks also to the many people who provided detailed technical reviews of a single
`chapter: Lars Poulsen, Howard Eisenhauer, D. E. Jennings, Paul Robichaux, John Adams,
`Jerry Huang, Andreas Kasenides, Munira Ahmed, Hossein Izadpanah, Aaron King, Benoit
`d'Udekem, Marco Casole, Kevin Peterson, Dinesh Lal Pradhan, and Cathal Mc Daid.
`Finally, I would like to thank the many people responsible for the publication of the
`book, all of whom did their usual excellent job. This includes the staff at Prentice Hall, par(cid:173)
`ticularly my editors Alan Apt and Toni Holm; their assistant Patrick Lindner: production
`manager Rose Kernan; and supplements manager Sarah Parker. Also, Jake Warde of Warde
`Publishers managed the reviews; and Patricia M. Daly did the copy editing.
`
`Cellspin Ex. 2008 - Pg. 10
`
`

`

`BLUETOOTH AND I
`
`15.1 Overview
`
`15.2 Radio Specification
`
`15.3 Baseband Specification
`
`15.4 Link Manager Specification
`
`15.5 Logical Link Control and Adaptation Pro
`
`15.6 IEEE 802.15
`
`15.7 Recommended Readings and We
`
`15.8 Key Terms, Review Questions, an
`
`-.-----.------.------f------'-------
`
`463
`
`Cellspin Ex. 2008 - Pg. 11
`
`

`

`464 CHAPTER 15 / BLUETOOTH AND IEEE 802.15
`
`Bluetooth1 is an always-on, short-range radio hookup that resides on a microchip.
`It was initially developed by Swedish mobile-phone makl r Ericsson in 1994 as a
`way to let laptop computers make calls over a mobile ph ne. Since then, several
`thousand companies have signed on to make BluetootJ
`the low-power short(cid:173)
`range wireless standard for a wide range of devices. The ] luetooth standards are
`published by an industry consortium known as the Blueto( th SIG (special interest
`group). This chapter provides an overview.
`Following the discussion of Bluetooth, the chapter co ers IEEE 802.15, which
`is concerned with personal area networks (PANs). PANs are local networks in
`which all of the devices are controlled by a single user 0
`a family. IEEE 802.15
`covers Bluetooth plus two other PAN standards, knowr as IEEE 802.15.3 and
`IEEE 802.15.4.
`
`The concept behind Bluetooth is to provide a universal sho t-range wireless capabil(cid:173)
`ity. Using the 2.4-GHz band, available globally for unlicer sed low-power uses, two
`Bluetooth devices within 10 m of each other can share ur to 720 kbps of capacity.
`Bluetooth is intended to support an open-ended list of af
`lications, including data
`(e.g., schedules and telephone numbers), audio, graphics, ane even video. For example,
`audio devices can include headsets, cordless and standard I hones, home stereos, and
`digital MP3 players. The following are examples of some 0: the capability Bluetooth
`can provide consumers:
`
`e Make calls from a wireless headset connected remotl ly to a cell phone.
`e Eliminate cables linking computers to printers, keybl ards, and the mouse.
`'0 Hook up MP3 players wirelessly to other machines t download music.
`'0 Set up home networks so that a couch potato can rel otely monitor air condi(cid:173)
`tioning, the oven, and childrens' Internet surfing.
`e Call home from a remote location to turn appliances on and off, set the alarm,
`and monitor activity.
`
`Bluetooth Applications
`
`Bluetooth is designed to operate in an environment of many users. Up to eight
`devices can communicate in a small network called a piconet. Ten of these
`piconets can coexist in the same coverage range of the Bluetooth radio. To pro(cid:173)
`vide security, each link is encoded and protected ag; inst eavesdropping and
`interference.
`
`lThe name comes from King Harald Blaatand (Bluetooth) of Denmarl , who lived in the tenth century
`A.D. Unlike his Viking counterparts, King Harald had dark hair (thus he name Bluetooth, meaning a
`dark complexion) and is credited with bringing Christianity to Scandia ia along with uniting Denmark
`and Norway. The blue logo that identifies Bluetooth-enabled devict s is derived from the runes of
`his initials.
`
`L
`
`Cellspin Ex. 2008 - Pg. 12
`
`

`

`5.1 / 0\ ERVIEW 465
`
`Bluetooth provides support for three general application are~s using short(cid:173)
`range wireless connectivity:
`
`w Data and voice access points: Bluetooth facilitates real-time voice and data trans(cid:173)
`missions by providing effortless wireless connection of portable and stationary
`communications devices.
`.. Cable replacement: Bluetooth eliminates the need for numerol s, often propri(cid:173)
`etary, cable attachments for connection of practically any kind of ~ommunication
`device. Connections are instant and are maintained even when ~evices are not
`within line of sight. The range of each radio is approximately 1Dm but can be
`extended to 100 m with an optional amplifier.
`• Ad hoc networking: A device equipped with a Bluetoc~th radio can
`establish instant connection to another Bluetooth radio as so~:m as it comes
`into range.
`
`Table 15.1 gives some examples of Bluetooth uses.
`
`Table 15.1 Bluetooth User Scenarios [HAAR98]
`
`Three-in-one phone
`When you are in the office, your phone
`functions as an intercom (no telephony
`charge). At home, it functions as a cordless
`phone (fixed-line charge). When you are on the
`move, it functions as a mobile phone (cellular
`charge).
`
`Internet bridge
`Use your portable PC to surf the Internet
`anywhere, whether you are connected
`wirelessly through a mobile phone (cellular) or
`through a wired connection (PSTN, ISDN,
`LAN,.xDSL).
`
`Interactive conference
`In meetirigs and at coriferences, you can share
`iriformation iristantly with other participants.
`You can also operate a projector remotely
`without wire connectors.
`
`The ultimate headset
`Connect a headset to your mobile PC or to any
`wired connection and free your hands for more
`important tasks at the office or in yourcar.
`
`Portable PC speakerphone
`Connect cordless headsets to your portable PC,
`and use it as a speaker phone regardless of
`whether you are in the office, your car, or at
`home.
`
`Briefcase e-mail
`Access e-mail while your portat Ie PC is still in
`the briefcase. When your PC rec~ives an e-mail
`message, you are notified by yO! r mobile
`phone, You canalso use the phope to browse
`incoming e-mail and read messa~es.
`
`Delayed messages
`Compose e-mail on your PC wh Ie you are on
`an airplane. When you land and are allowed to
`switch on your mobile phone, tb~ messages are
`sent immediately.
`
`Automatic synchronization
`Automatically synchronize your desktop
`computer,portablePC, noteboc~,and mobile
`phone. As spon asyou enter the office, the
`addresslistand calendar in yOUI notebook
`autolllaticallyupdates the files ( n your desktop
`computer or vice versa.
`
`Instant.digital p()stcard
`Connect a cameracordlessly to wour mobile
`ph?neor toa.ny.wire-bound cor nection. Add
`colllments from you mobile phcpe, a notebook,
`or portable PGand send them il stantly.
`
`Cordless desktop
`Cpnnect your desktop/laptop cc mputer
`cordlessly to printers, scanner, k~yboard,
`mouse, and the LAN.
`
`Cellspin Ex. 2008 - Pg. 13
`
`

`

`466 CHAPTEIt 15 / BLUETOOTH AND IEEE 802.15
`
`Bluetooth Standards
`
`The Bluetooth standards present a formidable bulk-well 0' er 1500 pages, divided
`into two groups: core and profile. The core specifications des ribe the details of the
`various layers of the Bluetooth protocol architecture, from the radio interface to
`link control. Related topics are covered, such as interoperat ility with related tech(cid:173)
`nologies, testing requirements, and a definition of various Bluetooth timers and
`their associated values.
`The profile specifications are concerned with the use 0 Bluetooth technology
`to support various applications. Each profile specificatiOI discusses the use of
`the technology defined in the core specifications to implen ent a particular usage
`model. The profile specification includes a description of wI ich aspects of the core
`specifications are mandatory, optional, and not applicable. The purpose of a pro(cid:173)
`file specification is to define a standard of interoperability so that products from
`different vendors that claim to support a given usage mo, el will work together.
`In general terms, profile specifications fall into one of two c( tegories: cable replace(cid:173)
`ment or wireless audio. The cable replacement profiles prov de a convenient means
`for logically connecting devices in proximity to one anotl er and for exchanging
`data. For example, when two devices first come within ran e of one another, they
`can automatically query each other for a common profile. TJ is might then cause the
`end users of the device to be alerted, or cause some automat c data exchange to take
`place. The wireless audio profiles are concerned with establ shing short-range voice
`connections.
`
`Protocol Architecture
`
`Bluetooth is defined as a layered protocol architecture (Figme 15.1) consisting of core
`protocols, cable replacement and telephony control protocol, and adopted protocols.
`The core protocols form a five-layer stack consisting 0
`the following elements:
`
`1II Radio: Specifies details of the air interface, including. requency, the use of fre(cid:173)
`quency hopping, modulation scheme, and transmit po er.
`• Baseband: Concerned with connection establishment' ithin a piconet, address(cid:173)
`ing, packet format, timing, and power control.
`11l Link manager protocol (LMP): Responsible for Ii k setup between Blue(cid:173)
`tooth devices and ongoing link management. This j cludes security aspects
`such as authentication and encryption, plus the co trol and negotiation of
`baseband packet sizes.
`1II Logical link control and adaptation protocol (L2Ci P): Adapts upper-layer
`protocols to the baseband layer. L2CAP provides
`oth connectionless and
`connection-oriented services.
`.. Service discovery protocol (SDP): Device informati( n, services, and the char(cid:173)
`acteristics of the services can be queried to enabl< the establishment of a
`connection between two or more Bluetooth devices.
`
`RFCOMM is the cable replacement protocol include in the Bluetooth specifi(cid:173)
`cation. RFCOMM presents a virtual serial port that is desi~ ned to make replacement
`
`Cellspin Ex. 2008 - Pg. 14
`
`

`

`r,
`
`= Core protocols
`~ = Cable replacement protocol
`~ = Telephony control protocols
`D ~ Adopted protocols
`
`vCard/vCal
`OBEX
`
`WAE
`WAP
`
`UDPITCP
`IP
`PPP
`
`Audio
`
`Control
`
`Host-controller interface
`
`= attention sequence (modem prefix)
`= Internet Protocol
`= Object Exchange Protocol
`= Point-to-Point Protocol
`= radio frequency communications
`= Transmission Control Protocol
`Figure 15.1 Bluetooth Protocol Stack
`
`AT
`IP
`OBEX
`PPP
`RFCOMM
`
`~nn
`
`TCP
`
`- ~n_..:nn n:nnmm_.. D_nfnnnl
`J
`
`L;>
`
`-
`
`TCS BIN
`UDP
`vCal
`vCard
`WAE
`UIAD
`
`= telephony control specification-binary
`= User Datagram Protocol
`= virtual calendar
`= virtual card
`= wireless application environment
`
`'l'~ ...nl .... C'C' A ..".."I;"' .... t;n.~ D ....ntn."...nl
`rr
`
`Cellspin Ex. 2008 - Pg. 15
`
`

`

`468 CHAPTER J 5 / BLUETOOTHAND IEEE 802.15
`
`of cable technologies as transparent as possible. Serial port are one of the most
`common types of communications interfaces used with corr puting and communi(cid:173)
`cations devices. Hence, RFCOMM enables the replacemen of serial port cables
`with the minimum of modification of existing devices. RFCO~ M provides for binary
`data transport and emulates EIA-232 control signals ove
`the Bluetooth base(cid:173)
`band layer. EIA-232 (formerly known as RS-232) is a widel) used serial port inter(cid:173)
`face standard.
`Bluetooth specifies a telephony control protocol. TCS I IN (telephony control
`specification-binary) is a bit-oriented protocol that defines the call control signal(cid:173)
`ing for the establishment of speech and data calls betweer Bluetooth devices. In
`addition, it defines mobility management procedures for ha dling groups of Blue(cid:173)
`tooth TCS devices.
`The adopted protocols are defined in specifications iSSl ed by other standards(cid:173)
`making organizations and incorporated into the overall BlUE tooth architecture. The
`Bluetooth strategy is to invent only necessary protocols ane use existing standards
`whenever possible. The adopted protocols include the follo~ ing:
`
`"" PPP: The point-to-point protocol is an Internet stane ard protocol for trans(cid:173)
`porting IP datagrams over a point-to-point link.
`• TCPfUDPIIP: These are the foundation protocols ef the TCP/IP protocol
`suite (described in Chapter 4).
`• OBEX: The object exchange protocol is a session-Ieve protocol developed by
`the Infrared Data Association (IrDA) for the exchangl of objects. OBEX pro(cid:173)
`vides functionality similar to that of HTTP, but in a simpler fashion. It also
`provides a model for representing objects and opera ions. Examples of con(cid:173)
`tent formats transferred by OBEX are vCard and v( alendar, which provide
`the format of an electronic business card and persor al calendar entries and
`scheduling information, respectively.
`• WAEIWAP: Bluetooth incorporates the wireless al plication environment
`and the wireless application protocol into its arc itecture (described in
`Chapter 12).
`
`Usage Models
`
`A number of usage models are defined in Bluetooth profil documents. In essence,
`a usage model is set of protocols that implement a particula Bluetooth-based appli(cid:173)
`cation. Each profile defines the protocols and protocol feat res supporting a partic(cid:173)
`ular usage model. Figure 15.2, taken from [METT99], illust ates the highest-priority
`usage models:
`
`\II File transfer: The file transfer usage model supports t] e transfer of directories,
`files, documents, images, and streaming media forma s. This usage model also
`includes the capability to browse folders on a remote device.
`• Internet bridge: With this usage model, a PC is w relessly connected to a
`mobile phone or cordless modern to provide dial-up 1 etworking and fax capa(cid:173)
`bilities. For dial-up networking, AT commands are wed to control the mobile
`
`Cellspin Ex. 2008 - Pg. 16
`
`

`

`15.1 / 0' 7ERVIEW 469
`
`(a) File transfer
`
`(b) Dial-up network ng
`
`(c) LAN access
`
`(e) Cordless phone and intercom
`
`(f) Headset
`
`Hgure 15.2 Bluetooth Usage Models
`
`phone or modem, and another protocol stack (e.g., PPP over RFCOMM) is
`used for data transfer. For fax transfer, the fax software op rates directly
`over RFCOMM.
`• LAN access: This usage model enables devices on a piconet to access a LAN.
`Once connected, a device functions as if it were directly com ected (wired)
`to the LAN.
`• Synchronization: This model provides a device-to-device synchronization of
`PIM (personal information management) information, such a phone book,
`calendar, message, and note information. IrMC (Ir mobile coml unications) is
`an IrDA protocol that provides a client/server capability f( r transferring
`updated PIM information from one device to another.
`• Three-in-one phone: Telephone handsets that implement thi usage model
`may act as a cordless phone connecting to a voice base station, s an intercom
`device for connecting to other telephones, and as a cellular pho e.
`• Headset: The headset can act as a remote device's audio inJ=ut and output
`interface.
`
`Cellspin Ex. 2008 - Pg. 17
`
`

`

`470 CHAPTER 15 / BLUETOOTH AND IEEE 802.15
`
`Piconets and Scatternets
`
`As was mentioned, the basic unit of networking in Bluetooth 's a piconet, consisting
`of a master and from one to seven active slave devices. The I dio designated as the
`master makes the determination of the channel (frequency-t opping sequence) and
`phase (timing offset, i.e., when to transmit) that shall be usee by all devices on this
`piconet. The radio designated as master makes this detern 'nation using its Own
`device address as a parameter, while the slave devices must tu e to the same channel
`and phase. A slave may only communicate with the master aJ d may only communi(cid:173)
`cate when granted permission by the master. A device in one piconet may also exist
`as part of another piconet and may function as either a slave or master in each
`piconet (Figure 15.3). This form of overlapping is called a :;catternet. Figure 15.4,
`based on one in [HAAROOa], contrasts the piconet/scatternet architecture with other
`forms of wireless networks.
`The advantage of the piconet/scatternet scheme i~
`that it allows many
`devices to share the same physical area and make efficient use of the bandwidth.
`A Bluetooth system uses a frequency-hopping scheme wi:h a carrier spacing of
`1 MHz. Typically, up to 80 different frequencies are used fClr a total bandwidth of
`80 MHz. If frequency hopping were not used, then a singlE channel would corre(cid:173)
`spond to a single I-MHz band. With frequency hoppin;~ a logical channel is
`defined by the frequency-hopping sequence. At any give 1 time, the bandwidth
`available is 1 MHz, with a maximum of eight devices sharilg the bandwidth. Dif(cid:173)
`ferent logical channels (different hopping sequences) car. simultaneously share
`the same 80-MHz bandwidth. Collisions will occur when devices in different
`
`Figure 15.3 Master/Slave Relationships
`
`Cellspin Ex. 2008 - Pg. 18
`
`

`

`/-- .......
`
`,
`
`I
`I
`,
`I
`I • • \
`1
`\
`\
`\
`
`'. ",
`\ . "
`
`// .I
`'".,
`
`"
`
`I
`
`IIII\
`
`\,,
`
`,
`
`.....
`
`\
`
`\III
`
`I
`
`\
`
`I
`
`I
`
`/
`
`. /
`
`_ /
`
`".\,
`•
`•
`
`15.2/ fLADIO SPECIfICATION 471
`(cid:173)"/
`
`\
`\
`
`\1
`
`\
`
`I
`
`!
`
`,
`
`\
`
`".
`,
`
`/
`
`' ....... _ /
`
`(a) Cellular system (squares represent
`stationary base stations)
`
`(b) Conventional ad hoc systems
`
`\
`/
`''1/ . '
`/ "
`I
`I
`/
`\
`I
`\
`•
`/
`/ ) I
`I
`
`/-,
`
`I
`
`I
`
`I
`
`I
`
`I
`
`/
`
`--
`
`/,,-
`•
`
`/
`
`I
`
`I
`I
`I
`\
`
`,
`
`\
`
`/
`
`I
`
`I
`/
`I .
`/
`" I
`'-1- __ - / I
`I
`I
`
`I
`
`'. /
`
`I
`I
`I
`I
`
`I
`
`, / /
`
`/
`
`/
`
`/
`
`/
`
`(c) Scattemets
`Figure 15.4 Wireless Network Configurations
`
`piconets, on different logical channels, happen to use the same hep frequency at
`the same time. As the number of piconets in an area increases, the number of col(cid:173)
`lisions increases, and performance degrades. In summary, the ph:rsical area and
`total bandwidth are shared by the scatternet. The logical channel ;md data trans(cid:173)
`fer are shar

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket