throbber
WIRELESS COMMUNICATIONS
`AND NETWORKS
`SECOND EDITION
`
`Williant Stallings
`
`• Upper Saddle River, NJ 07458
`
`CELLSPIN
`EX. 2014, Page 1
`
`

`

`-
`
`Library of Congress Cataloging-in-Publication Data on file
`
`Vice President and Editorial Director, ECS:
`Marcia J Horton
`Publisher: Alan Apt
`Associate Editor: Toni D. Holm
`Editorial Assistant: Patrick Lindner
`Vice President and Director of Production and
`Manufacturing, ESM: David W Riccardi
`Executive Managing Editor: Vince O'Brien
`Managing Editor: Camille Trentacoste
`Production Editor: Rose Kernan
`Cover Photo: Brand X Pictures
`
`Director of Creative Services: Paul Belfanti
`Art Director: Heather Scott
`Cover Designer: Tamara Newnam
`Managing Editor,AV Management
`and Production: Patricia Burns
`Art Editor: Gregory Dulles
`Manufacturing Manager: Trudy Pisciotti
`Manufacturing Buyer: Lynda Castillo
`Marketing Manager: Pamela Hersperger
`Marketing Assistant: Barrie Reinhold
`
`• .
`
`© 2005, 2002 Pearson Education, Inc.
`Pearson Prentice Hall
`Pearson Education, Inc.
`Upper Saddle River, NJ 07458
`
`All rights reserved. No part of this book may be reproduced, in any form or by any means, without permission
`in writing from the publisher.
`
`Pearson Prentice Hall® is a trademark of Pearson Education, Inc.
`
`The author and publisher of this book have used their best efforts in preparing this book. These efforts include the
`development, research, and testing of the theories and programs to determine their effectiveness. The author and
`publisher make no warranty of any kind, expressed or implied, with regard to these programs or the documentation
`contained in this book. The author and publisher shall not be liable in any event for incidental or consequential
`damages in connection with, or arising out of, the furnishing, performance, or use of these programs.
`
`Printed in the United States of America
`10987654321
`
`ISBN: 0-13-191835-4
`
`Pearson Education Ltd., London
`Pearson Education Australia Pty. Ltd., Sydney
`Pearson Education Singapore, Pte. Ltd.
`Pearson Education North Asia Ltd., Hong Kong
`Pearson Education Canada, Inc., Toronto
`Pearson Educacion de Mexico, S.A. de C. V.
`Pearson Education~apan, Tokyo
`Pearson Education Malaysia, Pte. Ltd.
`Pearson Education Inc., Upper Saddle River, New Jersey
`
`CELLSPIN
`EX. 2014, Page 2
`
`

`

`As always)
`for my loving wife
`and her constant companions
`Geoffroi and Helma
`
`CELLSPIN
`EX. 2014, Page 3
`
`

`

`CONTENTS
`
`Preface xi
`
`Chapter 1
`1.1
`1.2
`1.3
`1.4
`1.5
`1.6
`1.7
`1.8
`
`Introduction 1
`Wireless Comes of Age 2
`The Cellular Revolution 3
`The Global Cellular Network 4
`Broadband 5
`Future Trends 5
`The Trouble with Wireless 7
`Outline of the Book 7
`Internet and Web Resources 10
`
`PART ONE TECHNICAL BACKGROUND 13
`Chapter 2
`Transmission Fundamentals 14
`2.1
`Signals for Conveying Information 15
`2.2
`Analog and Digital Data Transmission 22
`2.3
`Channel Capacity 27
`2.4
`Transmission Media 31
`2.5
`Multiplexing 36
`2.6
`Recommended Readings and Web Sites 40
`2.7
`Key Terms, Review Questions, and Problems 41
`Appendix 2A Decibels and Signal Strength 43
`Communication Networks 46
`LANs,MANs,andWANs 47
`Switching Techniques 49
`Circuit Switching 50
`Packet Switching 54
`Asynchronous Transfer Mode 60
`Recommended Readings and Web Sites 65
`Key Terms, Review Questions, and Problems 66
`Protocols and the TCP /IP Suite 69
`The Need for a Protocol Architecture 70
`The TCP/IP Protocol Architecture 71
`The OSI Model 75
`Internetworking 77
`Recommended Readings and Web Sites 83
`Key Terms, Review Questions, and Problems 83
`Appendix 4A Internet Protocol 85
`Appendix 4B Transmission Control Protocol 88
`Appendix 4C User Datagram Protocol 92
`
`Chapter 3
`3.1
`3.2
`3.3
`3.4
`3.5
`3.6
`3.7
`Chapter 4
`4.1
`4.2
`4.3
`4.4
`4.5
`4.6
`
`.. vu
`
`CELLSPIN
`EX. 2014, Page 4
`
`

`

`-
`
`...
`
`Vlll CONTENTS
`
`PART TWO WIRELESS COMMUNICATION TECHNOLOGY 94
`Antennas and Propagation 95
`Chapter 5
`5.1
`Antennas 96
`5.2
`Propagation Modes 101
`5.3
`Line-of-Sight Transmission 105
`5.4
`Fading in the Mobile Environment 115
`5.5
`Recommended Readings and Web Sites 122
`5.6
`Key Terms, Review Questions, and Problems 123
`Chapter 6
`Signal Encoding Techniques 127
`6.1
`Signal Encoding Criteria 129
`6.2
`Digital Data, Analog Signals 131
`6.3
`Analog Data, Analog Signals 142
`6.4
`Analog Data, Digital Signals 148
`6.5
`Recommended Readings 155
`6.6
`Key Terms, Review Questions, and Problems 155
`Spread Spectrum 159
`Chapter 7
`7.1
`The Concept of Spread Spectrum 160
`7.2
`Frequency Hopping Spread Spectrum 161
`7.3
`Direct Sequence Spread Spectrum 166
`7.4
`Code Division Multiple Access 170
`7.5
`Generation of Spreading Sequences 173
`7.6
`Recommended Readings and Web Sites 186
`7.7
`Key Terms, Review Questions, and Problems 186
`Coding and Error Control 192
`Chapter 8
`8.1
`Error Detection 193
`8.2
`Block Error Correction Codes 200
`Convolutional Codes 216
`8.3
`8.4
`Automatic Repeat Request 223
`8.5
`Recommended Readings 230
`8.6
`Key Terms, Review Questions, and Problems 231
`
`PART THREE WIRELESS NETWORKING 236
`Satellite Communications 23 7
`Chapter 9
`9.1
`Satellite Parameters and Configurations 238
`9.2
`Capacity Allocation-Frequency Division 250
`9.3
`Capacity Allocation-Time Division 256
`9.4
`Recommended Readings and Web Sites 261
`9.5
`Key Terms, Review Questions, and Problems 262
`Cellular Wireless Networks 264
`Chapter 10
`10.1
`Principles of Cellular Networks 265
`10.2
`First-Generation Analog 282
`10.3
`Second-Generation TDMA 285
`10.4
`Second-Generation CDMA 298
`10.5
`Third-Generation Systems 304
`
`CELLSPIN
`EX. 2014, Page 5
`
`

`

`CONTENTS
`
`.
`
`IX
`
`10.6
`10.7
`Chapter 11
`11.1
`11.2
`11.3
`11.4
`11.5
`
`Recommended Readings and Web Sites 311
`Key Terms, Review Questions, and Problems 314
`Cordless Systems and Wireless Local Loop 317
`Cordless Systems 318
`Wireless Local Loop 329
`WiMAX and IEEE 802.16 Broadband Wireless Access Standards 342
`Recommended Readings and Web Sites 354
`Key Terms, Review Questions, and Problems 355
`Appendix 11A Linear Predictive Filters 356
`Chapter 12 Mobile IP and Wireless Access Protocol 358
`12.1
`Mobile IP 359
`12.2
`Wireless Application Protocol 373
`12.3
`Recommended Readings and Web Sites 394
`12.4
`Key Terms, Review Questions, and Problems 396
`Appendix 12A Internet Control Message Protocol 397
`Appendix 12B Message Authentication 401
`Appendix 12C Service Primitives and Parameters 402
`
`PART FOUR WIRELESS LANS 404
`Chapter 13 Wireless Lan Technology 405
`13 .1
`Overview 406
`13.2
`Infrared LANs 413
`13.3
`Spread Spectrum LANs 417
`13.4
`Narrowband Microwave LANs 418
`13.5
`Recommended Readings and Web Sites 419
`13.6
`Key Terms, Review Questions, and Problems 419
`Chapter 14
`Wi-Fi and the IEEE 802.11 Wireless Lan Standard 421
`14.1
`IEEE 802 Protocol Architecture 422
`14.2
`IEEE 802.11 Architecture and Services 428
`14.3
`IEEE 802.11 Medium Access Control 433
`14.4
`IEEE 802.11 Physical Layer 442
`14.5
`Other IEEE 802.11 Standards 451
`14.6
`Recommended Readings and Web Sites 458
`14.7
`Key Terms, Review Questions, and Problems 459
`Appendix 14A Scrambling 460
`Bluetooth and IEEE 802.15 463
`Overview 464
`Radio Specification 471
`Baseband Specification 4 72
`Link Manager Protocol 491
`Logical Link Control and Adaptation Protocol 495
`IEEE 802.15 501
`Recommended Readings and Web Sites 508
`Key Terms, Review Questions, and Problems 509
`
`Chapter 15
`15.1
`15.2
`15.3
`15.4
`15.5
`15.6
`15.7
`15.8
`
`CELLSPIN
`EX. 2014, Page 6
`
`

`

`r X CONTENTS
`
`APPENDICES 511
`Appendix A
`Traffic Analysis 511
`A.1
`Basic Traffic Concepts 512
`A.2
`Multiserver Models 513
`A.3
`Recommended Reading 519
`Appendix B
`Fourier Analysis 520
`B.1
`Fourier Series Representation of Periodic Signals 521
`B.2
`Fourier Transform Representation of Aperiodic Signals 522
`B.3
`Recommended Readings 525
`Appendix C
`Data Link Control Protocols 526
`C.1
`High-Level Data Link Control 527
`Glossary 533
`References 540
`Index 547
`
`CELLSPIN
`EX. 2014, Page 7
`
`

`

`'¥
`
`·\.,.
`';-J-,+<>t'
`'
`. ~ ' ; ~
`
`PREFACE
`
`Wireless technology has become the most exciting area in telecommunications and network(cid:173)
`ing. The rapid growth of mobile telephone use, various satellite services, and now the wireless
`Internet and wireless LANs are generating tremendous changes in telecommunications and
`networking. This book explores the key topics in the field in the following general categories:
`• Technology and architecture: There is a small collection of ingredients that serves to char(cid:173)
`acterize and differentiate wireless communication and networking, including frequency
`band, signal encoding technique, error correction technique, and network architecture.
`• Network type: This book covers the important types of wireless networks, including
`satellite, cellular, fixed wireless access, and wireless LANs.
`• Design approaches: The book examines alternative design choices and assesses their
`relative merits.
`• Applications: A number of key technologies and applications have been developed on
`top of wireless infrastructures, especially mobile IP and wireless Web access.
`Throughout, there is an emphasis on both technology and on standards. The book pro(cid:173)
`vides a comprehensive guide to understanding specific wireless standards, such as those pro(cid:173)
`mulgated by ITU and IEEE 802, as well as standards developed by other organizations. This
`emphasis reflects the importance of such standards in defining the available products and
`future research directions in this field.
`
`This book is intended for a broad range of readers who will benefit from an understanding
`of wireless communications and networks, and the associated technologies. This includes stu(cid:173)
`dents and professionals in the fields of data processing and data communications, designers
`and implementers, and data communication and networking customers and managers. For
`the professional interested in this field, the book serves as a basic reference volume and is
`suitable for self-study.
`As a textbook, it is suitable for an advanced undergraduate or graduate course. It cov(cid:173)
`ers the material in the CS332 Wireless and Mobile Computing advanced course of the joint
`ACM/IEEE Computing Curricula 2001. The chapters and parts of the book are sufficiently
`modular to provide a great deal of flexibility in the design of courses.
`
`The book treats a number of advanced topics and provides a brief survey of the required ele(cid:173)
`mentary topics. For the reader with little or no background in data communications, Part
`One and the appendices cover a number of basic topics. The book is divided into four parts:
`• Technical Background
`• Wireless Communication Technology
`
`XI
`
`CELLSPIN
`EX. 2014, Page 8
`
`

`

`xii PREFACE
`
`• Wireless Networking
`• Wireless LAN s
`In addition, the book includes an extensive glossary, a list of frequently used acronyms,
`and a bibliography. Each chapter includes problems, suggestions for further reading, and a
`list of relevant Web sites. Each chapter also includes, for review, a list of key words and a
`number of review questions.
`
`INTERNET SERVICES FOR INSTR.UCTOR.S AND STUDENTS
`
`There is a Web site for this book that provides support for students and instructors. The site
`includes links to other relevant sites, transparency masters of figures and tables from the book
`in PDF (Adobe Acrobat) format, PowerPoint slides, and sign-up information for the book's
`Internet mailing list. The Web page is at WilliamStallings.com/Wireless/Wireless2e.html; see
`Section 1.8 for more information. An Internet mailing list has been set up so that instructors
`using this book can exchange information, suggestions, and questions with each other and with
`the author. As soon as typos or other errors are discovered, an errata list for this book will be
`available at WilliamStallings.com. I also maintain the Computer Science Student Resource
`Site at WilliamStallings.com/StudentSupport.html.
`
`In the three years since the first edition of this book was published, the field has seen con(cid:173)
`tinued innovations and improvements. In this new edition, I try to capture these changes
`while maintaining a broad and comprehensive coverage of the entire field. To begin the
`process of revision, the first edition of this book was extensively reviewed by a number of
`professors who teach the subject. The result is that, in many places, the narrative has been
`clarified and tightened, and illustrations have been improved. Also, a number of new "field(cid:173)
`tested" problems have been added.
`Beyond these refinements to improve pedagogy and user friendliness, the technical
`content of the book has been updated throughout, to reflect the ongoing changes in this
`exciting field. Every chapter has been revised. Highlights include the following:
`• Minimum shift keying: MSK is a form of modulation that is found in some mobile
`communications systems. This material is now covered.
`• CDMA2000: The first 3G (third generation) wireless system to be deployed commercially
`is known as CDMA2000 lxEV-DO. A discussion of this important standard is included.
`• WiMAX and IEEE 802.16a: Work on wireless local loop has evolved, including the intro(cid:173)
`duction of the WiMAX specification to provide interoperability specifications for 802.16.
`Chapter 11 includes new material on 802.16, including the recent 802.16a standard.
`• Orthogonal frequency division multiplexing: The popularity of OFDM is increasing
`and is used in a variety of local and wide area wireless standards. The material on
`OFDM has been updated and expanded.
`• Wi-Fi and IEEE 802.11: The coverage of 802.lla and 802.llb has been expanded
`significantly, and treatment of 802.llg had been added.
`• Data scrambling: Scrambling is a technique often used to improve signal quality. An
`overview of data scrambling is provided in Chapter 14.
`
`CELLSPIN
`EX. 2014, Page 9
`
`

`

`...
`PREFACE Xlll
`
`• Wi-Fi protected access: WPA has replaced Wireless Equivalent Privacy (WEP) as
`the specification for providing security in wireless LANs. Chapter 14 provides
`coverage of WPA.
`• IEEE 802.15 and personal area networks: The initial 802.15.1 standard provides an
`official specification for Bluetooth, which was covered in the first edition as well as
`this edition. This edition also covers two new standards: the 802.15.3 high-speed
`wireless PAN standard and the 802.15.4 low-speed wireless PAN standard.
`• Trellis-coded modulation: TCM is a technique that provides for efficient use of
`bandlimited channels; it is described in Chapter 15.
`In addition, throughout the book, virtually every topic has been updated to reflect the
`developments in standards and technology that have occurred since the publication of the
`first edition.
`
`This new edition has benefited from review by a number of people, who gave generously of
`their time and expertise. The following people reviewed all or a large part of the manuscript:
`Dr. Albert Cheng (University of Houston-University Park), Dale W. Callahan (University of
`Alabama, Birmingham), Ravi Sankar (University of South Florida, Tampa), Pei Zheng
`(Arcadia University, Pennsylvania), and Anne Cox (Austin Community College, Texas).
`Thanks also to the many people who provided detailed technical reviews of a single
`chapter: Lars Poulsen, Howard Eisenhauer, D. E. Jennings, Paul Robichaux, John Adams,
`Jerry Huang, Andreas Kasenides, Munira Ahmed, Hossein Izadpanah, Aaron King, Benoit
`d'Udekem, Marco Casole, Kevin Peterson, Dinesh Lal Pradhan, and Catha! Mc Daid.
`Finally, I would like to thank the many people responsible for the publication of the
`book, all of whom did their usual excellent job. This includes the staff at Prentice Hall, par(cid:173)
`ticularly my editors Alan Apt and Toni Holm; their assistant Patrick Lindner: production
`manager Rose Kernan; and supplements manager Sarah Parker. Also, Jake Warde of Warde
`Publishers managed the reviews; and Patricia M. Daly did the copy editing.
`
`CELLSPIN
`EX. 2014, Page 10
`
`

`

`15.l Overview
`
`15.2 Radio Specification
`
`15.3 Baseband Specification
`
`15.4 Link Manager Specification
`
`15.5 Logical Link Control and Adaptation Protocol
`
`15.6 IEEE 802.15
`
`15. 7 Recommended Readings and Web Sites
`
`15.8 Key Terms, Review Questions, and Problems
`
`.... ·············---·--·-- ... ·····-······----------------------+-----'----'----'--~.......,_~-
`
`463
`
`CELLSPIN
`EX. 2014, Page 11
`
`

`

`464 CHAPTER 15 / BLUETOOTH AND IEEE 802.15
`
`Bluetooth1 is an always-on, short-range radio hookup that resides on a microchip.
`It was initially developed by Swedish mobile-phone mak1 r Ericsson in 1994 as a
`way to let laptop computers make calls over a mobile ph ne. Since then, several
`thousand companies have signed on to make Bluetootl
`the low-power short(cid:173)
`range wireless standard for a wide range of devices. The ] luetooth standards are
`published by an industry consortium known as the Blueto< th SIG (special interest
`group). This chapter provides an overview.
`Following the discussion of Bluetooth, the chapter co ers IEEE 802.15, which
`is concerned with personal area networks (PANs). PANs are local networks in
`which all of the devices are controlled by a single user o a family. IEEE 802.15
`covers Bluetooth plus two other PAN standards, knowr as IEEE 802.15.3 and
`IEEE 802.15.4.
`
`The concept behind Bluetooth is to provide a universal sho t-range wireless capabil(cid:173)
`ity. Using the 2.4-GHz band, available globally for unlicer sed low-power uses, two
`Bluetooth devices within 10 m of each other can share ui: to 720 kbps of capacity.
`Bluetooth is intended to support an open-ended list of ai: lications, including data
`( e.g., schedules and telephone numbers), audio, graphics, anc even video. For example,
`audio devices can include headsets, cordless and standard I hones, home stereos, and
`digital MP3 players. The following are examples of some o: the capability Bluetooth
`can provide consumers:
`
`• Make calls from a wireless headset connected remot, ly to a cell phone.
`11 Eliminate cables linking computers to printers, keyb, ards, and the mouse.
`* Hook up MP3 players wirelessly to other machines t download music.
`* Set up home networks so that a couch potato can re1 otely monitor air condi(cid:173)
`tioning, the oven, and childrens' Internet surfing.
`11 Call home from a remote location to tum appliances on and off, set the alarm,
`and monitor activity.
`
`Bluetooth Applications
`
`Bluetooth is designed to operate in an environment of many users. Up to eight
`devices can communicate in a small network called a piconet. Ten of these
`piconets can coexist in the same coverage range of the Bluetooth radio. To pro(cid:173)
`vide security, each link is encoded and protected ag, inst eavesdropping and
`interference.
`
`1The name comes from King Harald Blaatand (Bluetooth) of Denmarl , who lived in the tenth century
`A.D. Unlike his Viking counterparts, King Harald had dark hair (thus he name Bluetooth, meaning a
`dark complexion) and is credited with bringing Christianity to Scandia ia along with uniting Denmark
`and Norway. The blue logo that identifies Bluetooth-enabled devict s is derived from the runes of
`his initials.
`
`L
`
`CELLSPIN
`EX. 2014, Page 12
`
`

`

`i 5.1 / 0\ ERVIEW 465
`
`Bluetooth provides support for three general application areas using short(cid:173)
`range wireless connectivity:
`
`w Data and voice access points: Bluetooth facilitates real-time voice and data trans(cid:173)
`missions by providing effortless wireless connection of portable and stationary
`communications devices.
`• Cable replacement: Bluetooth eliminates the need for numeroL s, often propri(cid:173)
`etary, cable attachments for connection of practically any kind of ~ommunication
`device. Connections are instant and are maintained even when ~evices are not
`within line of sight. The range of each radio is approximately 1 ) m but can be
`extended to 100 m with an optional amplifier.
`• Ad hoc networking: A device equipped with a Bluetoc~th radio can
`establish instant connection to another Bluetooth radio as sot,n as it comes
`into range.
`
`Table 15.1 gives some examples of Bluetooth uses.
`
`Table 15.1 Bluetooth User Scenarios [HAAR98]
`
`Three-in-one phone
`When you are in the office, your phone
`functions as an intercom (no telephony
`charge). At home, it functions as a cordless
`phone (fixed-line charge). When you are on the
`move, it functions as a mobile phone ( cellular
`charge).
`
`Internet bridge
`Use your portable PC to surf the Internet
`anywhere, whether you are connected
`wirelessly through a mobile phone (cellular) or
`through a wired connection (PSTN, ISDN,
`LAN,xDSL).
`
`Interactive conference
`In meetings and at conferences, you can share
`information instantly with other participants.
`You can also operate a projector remotely
`without wire connectors.
`
`The ultimate headset
`Connect a headset to your mobile PC or to any
`wired connection and free your hands for more
`important tasks at the office or in your car.
`
`Portable PC speakerphone
`Connect cordless headsets to your portable PC,
`and use it as a speaker phone regardless of
`whether you are in the office, your car, or at
`home.
`
`Briefcase e-mail
`Access e-mail while your portat le PC is still in
`the briefcase. When your PC rec~ives an e-mail
`message, you are notified by y01 r mobile
`phone. You can also use the phone to browse
`incoming e-mail and read messa~es.
`
`Delayed messages
`Compose e-mail on your PC wh le you are on
`an airplane. When you land and are allowed to
`switch on your mobile phone, tb~ messages are
`sent immediately.
`
`Automatic synchronization
`Automatically synchronize your desktop
`computer, portable PC, notebock, and mobile
`phone. As soon as you enter the office, the
`address list and calendar in yorn notebook
`automatically updates the files < n your desktop
`computer or vice versa.
`
`Instant digital postcard
`Connect a camera cordlessly to wour mobile
`phone or to any wire-bound cor nection. Add
`comments from you mobile phcoe, a notebook,
`or portable PC and send them ii~stantly.
`
`Cordless desktop
`Connect your desktop/laptop cc mputer
`cordlessly to printers, scanner, klc!yboard,
`mouse, and the LAN.
`
`CELLSPIN
`EX. 2014, Page 13
`
`

`

`466 CHAPTER .. 15 / BLUETOOTH AND IEEE 802.15
`
`Blu.etooth Standards
`
`The Bluetooth standards present a formidable bulk-well o, er 1500 pages, divided
`into two groups: core and profile. The core specifications des ribe the details of the
`various layers of the Bluetooth protocol architecture, from the radio interface to
`link control. Related topics are covered, such as interoperat ility with related tech(cid:173)
`nologies, testing requirements, and a definition of various Bluetooth timers and
`their associated values.
`The profile specifications are concerned with the use o Bluetooth technology
`to support various applications. Each profile specificatio1 discusses the use of
`the technology defined in the core specifications to implen ent a particular usage
`model. The profile specification includes a description of wl ich aspects of the core
`specifications are mandatory, optional, and not applicable. The purpose of a pro(cid:173)
`file specification is to define a standard of interoperability so that products from
`different vendors that claim to support a given usage mo, el will work together.
`In general terms, profile specifications fall into one of two c, tegories: cable replace(cid:173)
`ment or wireless audio. The cable replacement profiles prov de a convenient means
`for logically connecting devices in proximity to one anotl er and for exchanging
`data. For example, when two devices first come within ran e of one another, they
`can automatically query each other for a common profile. Tl is might then cause the
`end users of the device to be alerted, or cause some automat c data exchange to take
`place. The wireless audio profiles are concerned with establ shing short-range voice
`connections.
`
`Protocol Architecture
`
`Bluetooth is defined as a layered protocol architecture (Figme 15.1) consisting of core
`protocols, cable replacement and telephony control protocol , and adopted protocols.
`The core protocols form a five-layer stack consisting o the following elements:
`
`• Radio: Specifies details of the air interface, including• requency, the use of fre(cid:173)
`quency hopping, modulation scheme, and transmit po er.
`• Baseband: Concerned with connection establishment ' ithin a piconet, address(cid:173)
`ing, packet format, timing, and power control.
`111 Link manager protocol (LMP): Responsible for li k setup between Blue(cid:173)
`tooth devices and ongoing link management. This i eludes security aspects
`such as authentication and encryption, plus the co trol and negotiation of
`baseband packet sizes.
`• Logical link control and adaptation protocol (L2C1 P): Adapts upper-layer
`protocols to the baseband layer. L2CAP provides oth connectionless and
`connection-oriented services.
`" Service discovery protocol (SOP): Device informatic n, services, and the char(cid:173)
`acteristics of the services can be queried to enabl<
`the establishment of a
`connection between two or more Bluetooth devices.
`
`RFCOMM is the cable replacement protocol include in the Bluetooth specifi(cid:173)
`cation. RFCOMM presents a virtual serial port that is desi~ ned to make replacement
`
`CELLSPIN
`EX. 2014, Page 14
`
`

`

`r
`'
`
`D = Core protocols
`~ = Cable replacement protocol
`~ = Telephony control protocols
`D ~ Adopted protocols
`
`vCard/vCal
`OBEX
`
`WAE
`WAP
`
`UDP/TCP
`IP
`PPP
`
`Audio
`
`Control
`
`Host-controller interface
`
`= attention sequence (modem prefix)
`= Internet Protocol
`= Object Exchange Protocol
`= Point-to-Point Protocol
`= radio frequency communications
`= Transmission Control Protocol
`Figmc 15.1 Bluetooth Protocol Stack
`
`AT
`IP
`OBEX
`PPP
`RFCOMM
`C'nD
`TCP
`
`- C'n-.. :nn n:~nmm_., D-nfnnnl
`
`TCS BIN = telephony control specification-binary
`= User Datagram Protocol
`UDP
`= virtual calendar
`vCal
`= virtual card
`vCard
`= wireless application environment
`WAE
`UIAD
`
`llf:rnJ.,.c,c, A ..,,..,,J;r,,o,f;n.~ Drnfn..,...nl
`
`-
`
`CELLSPIN
`EX. 2014, Page 15
`
`

`

`468 CHAPTER I 5 / BLUETOOTH AND IEEE 8U2. 15
`
`of cable technologies as transparent as possible. Serial port are one of the most
`common types of communications interfaces used with corr puting and communi(cid:173)
`cations devices. Hence, RFCOMM enables the replacemen of serial port cables
`with the minimum of modification of existing devices. RFCO~ M provides for binary
`data transport and emulates EIA-232 control signals ove
`the Bluetooth base(cid:173)
`band layer. EIA-232 (formerly known as RS-232) is a widel) used serial port inter(cid:173)
`face standard.
`Bluetooth specifies a telephony control protocol. TCS 1 IN (telephony control
`specification-binary) is a bit-oriented protocol that defines the call control signal(cid:173)
`ing for the establishment of speech and data calls betweer Bluetooth devices. In
`addition, it defines mobility management procedures for ha dling groups of Blue(cid:173)
`tooth TCS devices.
`The adopted protocols are defined in specifications iss1 ed by other standards(cid:173)
`making organizations and incorporated into the overall Blm tooth architecture. The
`Bluetooth strategy is to invent only necessary protocols anc use existing standards
`whenever possible. The adopted protocols include the follo~ ing:
`
`• PPP: The point-to-point protocol is an Internet stanc ard protocol for trans(cid:173)
`porting IP datagrams over a point-to-point link.
`• TCP/UDP/IP: These are the foundation protocols cf the TCP/IP protocol
`suite (described in Chapter 4).
`• OBEX: The object exchange protocol is a session-leve protocol developed by
`the Infrared Data Association (IrDA) for the exchang1 of objects. OBEX pro(cid:173)
`vides functionality similar to that of HTTP, but in a simpler fashion. It also
`provides a model for representing objects and opera ions. Examples of con(cid:173)
`tent formats transferred by OBEX are vCard and v( alendar, which provide
`the format of an electronic business card and persor al calendar entries and
`scheduling information, respectively.
`• WAE/WAP: Bluetooth incorporates the wireless a, plication environment
`and the wireless application protocol into its arc itecture ( described in
`Chapter 12).
`
`Usage Models
`
`A number of usage models are defined in Bluetooth profil documents. In essence,
`a usage model is set of protocols that implement a particula Bluetooth-based appli(cid:173)
`cation. Each profile defines the protocols and protocol feat res supporting a partic(cid:173)
`ular usage model. Figure 15.2, taken from [METT99], illust ates the highest-priority
`usage models:
`
`• File transfer: The file transfer usage model supports tl e transfer of directories,
`files, documents, images, and streaming media forma s. This usage model also
`includes the capability to browse folders on a remote device.
`• Internet bridge: With this usage model, a PC is w relessly connected to a
`mobile phone or cordless modem to provide dial-up 1 etworking and fax capa(cid:173)
`bilities. For dial-up networking, AT commands are med to control the mobile
`
`CELLSPIN
`EX. 2014, Page 16
`
`

`

`15.1 / 0' 7ER.VIEW 469
`
`File transfer application
`
`Modem emulation or driver application
`
`AT commands
`
`~ - - - ---1
`: ___ PP_!.1 __ ...!
`
`(a) File transfer
`
`(b) Dial-up network ng
`
`LAN access application
`:-;.;., IP--:
`--- ----
`
`(c) LAN access
`
`(d) Synchronizatio
`
`HS gateway or headset ap lication
`
`(e) Cordless phone and intercom
`
`(f) Headset
`
`flgure 15.2 Bluetooth Usage Models
`
`phone or modem, and another protocol stack (e.g., PPP over RFCOMM) is
`used for data transfer. For fax transfer, the fax software op rates directly
`over RFCOMM.
`• LAN access: This usage model enables devices on a piconet to access a LAN.
`Once connected, a device functions as if it were directly corn ected (wired)
`to the LAN.
`• Synchronization: This model provides a device-to-device synchronization of
`PIM (personal information management) information, such a phone book,
`calendar, message, and note information. IrMC (Ir mobile com1 unications) is
`an IrDA protocol that provides a client/server capability f< r transferring
`updated PIM information from one device to another.
`• Three-in-one phone: Telephone handsets that implement thi usage model
`may act as a cordless phone connecting to a voice base station, s an intercom
`device for connecting to other telephones, and as a cellular pho e.
`• Headset: The headset can act as a remote device's audio ini:ut and output
`interface.
`
`CELLSPIN
`EX. 2014, Page 17
`
`

`

`470 CHAPTER 15 / BLUETOOTH AND IEEE 802.15
`
`Piconets and Scatternets
`
`As was mentioned, the basic unit of networking in Bluetooth ·s a piconet, consisting
`of a master and from one to seven active slave devices. The r dio designated as the
`master makes the determination of the channel (frequency-topping sequence) and
`phase (timing offset, i.e., when to transmit) that shall be usec by all devices on this
`piconet. The radio designated as master makes this detern ·nation using its own
`device address as a parameter, while the slave devices must tu e to the same channel
`and phase. A slave may only communicate with the master aJ d may only communi(cid:173)
`cate when granted permission by the master. A device in one piconet may also exist
`as part of another piconet and may function as either a slave or master in each
`piconet (Figure 15.3). This form of overlapping is called a :,catternet. Figure 15.4,
`based on one in [HAAROOa], contrasts the piconet/scatternet architecture with other
`forms of wireless networks.
`The advantage of the piconet/scatternet scheme i~ that it allows many
`devices to share the same physical area and make efficient use of the bandwidth.
`A Bluetooth system uses a frequency-hopping scheme wi:h a carrier spacing of
`1 MHz. Typically, up to 80 different frequencies are used for a total bandwidth of
`80 MHz. If frequency hopping were not used, then a singlE channel would corre(cid:173)
`spond to a single 1-MHz band. With frequency hoppin;~ a logical channel is
`defined by the frequency-hopping sequence. At any give 1 time, the bandwidth
`available is 1 MHz, with a maximum of eight devices sharilg the bandwidth. Dif(cid:173)
`ferent logical channels (different hopping sequences) car. simultaneously share
`the same 80-MHz bandwidth. Collisions will occur when devices in different
`
`Figure 15.3 Master/Slave Relationships
`
`CELLSPIN
`EX. 2014, Page 18
`
`

`

`15.2 I R..ADIO SPECHICATION 471
`-/
`
`/
`
`/
`
`/ . I
`-' ' e\
`•
`•
`\ ', . ' '
`
`I
`I
`I
`I
`I
`I
`I
`\
`
`\
`I
`I
`I
`I
`I
`I
`I
`I

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket