throbber
US 6,643,278 B1
`(10) Patent No:
`a2) United States Patent
`Panasik etal.
`(45) Date of Patent:
`Nov.4, 2003
`
`
`US006643278B1
`
`(54) WIRELESS NETWORK CIRCUITS,
`SYSTEMS, AND METHODS FOR
`FREQUENCY HOPPING WITH REDUCED
`PACKET INTERFERENCE
`Inventors: Carl M. Panasik, Garland, TX (US);
`Thomas M.Siep, Garland, TX (US)
`
`(75)
`
`.
`(73) Assignee: Texas Instruments Incorporated,
`Dallas, TX (US)
`J
`y
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`US.C. 154(b) by 0 days.
`
`Notice:
`
`*)
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`4,716,573 A
`12/1987 Bergstrém et al.
`5,506,863 A *
`4/1996 Meidan et al. vse: 375/134
`5598622 A
`6/1996 Cadd et al
`5,778,075 A *
`7/1998 Haartsen ...cesseseeeeee 375/138
`5,809,059 A
`9/1998 Souissiet al.
`
`* cited by examiner
`
`Primary Examiner—Dang Ton
`(74) Attorney, Agent, or Firm—Ronald O. Neerings; Wade
`James Brady, III; Frederick J. Telecky, Jr.
`
`(21) Appl. No.: 09/473,337
`(22)
`Filed:
`Dec. 28, 1999
`
`ABSTRACT
`(57)
`for determining a frequency hopping
`A method (10)
`sequence for a newly-entering network. The method com-
`an
`prises the step of scanning (16) a plurality of frequency
`Related U.S. Application Data
`channels. For each of the plurality of frequency channels,
`rowisional application No. 60/125,573, filed on Mar. 23,
`(60)
`the scanning step comprises detecting whether a signal (18,
`,
`22) exists on the channel and recording information (20, 24)
`(SL) Unt. C0 eee ecccccccsecseeseeseeseereeseeseeneesees H04Q 7/00
`(52) US. Ch. eeceeceeeesesessessesseenesnes 370/330; 370/344|corresponding to each channel on whicha signalis detected.
`(58) Field of Search... 370/330, 480,
`Finally, and responsive to the recorded information,
`the
`370/342, 441, 442, 241, 252, 254, 389,
`method forms (30) the frequency hopping sequence.
`392, 465, 394, 344, 345; 375/130, 131,
`132-134; 380/49, 9, 48, 59; 455/422, 436
`
`25 Claims, 2 Drawing Sheets
`
`14~\J DETERMINE FIRST CHANNEL FOR ANALYSISfg
`——_-—______¥_.
`16~]
`SCAN SELECTED CHANNEL
`FOR EXISTING SIGNAL
`
`COMMENCE NEW HOPPING
`SEQUENCE DETERMINATION: START
`UP NEWLY-ENTERING NETWORK
`
`J2~)
`
`
`
`
`
`28
`
`NEXT CHANNEL
`
`NC
`
`NO
`
`
`FIXED
`20
`INTERFERENCE
`YES
`
`?
`RECORD TIME SLOT
`AND CHANNEL
`NO
` 22
`PACKET
`
`
`INTERFERENCE
`2
`
`
`
`ALL
`
`CHANNELS
`
`
`SCANNED?
`
`
`
`
`
`
`24
`RECORD USAGE
`CHARACTERISTICS
`
`26
`
`YES
`CREATE HOPPING SEQUENCE
`FOR NEWLY-ENTERING NETWORK
`
`30
`
`
`
` NEW SEQUENCE
`SEQUENCE?
`CHANNEL IN ITS SEQUENCE
`
`
`MODIFY NEWLY-CREATED HOPPING
`
`32-7] SEQUENCE TO AVOID FIXED INTERFERENCE
`
`= INCUMBENT
`
`WAIT AT LEAST TWO SLOTS
`AFTER INCUMBENT USES FIRST
`
`
`
`Ex. 1009 / Page 1 of 11
`ERICSSON v. UNILOC
`
`Ex. 1009 / Page 1 of 11
`ERICSSON v. UNILOC
`
`

`

`U.S. Patent
`
`Nov.4, 2003
`
`Sheet 1 of 2
`
`US 6,643,278 B1
`
`P29
`
`FREQUENCY
`
`|
`|
`
`[7
`
`FIRST NETWORK
`
`V4) PACKET, P1,,
`RN PACKET, P2,
`XQ SECOND NETWORK
`LY intERFERENCE (FI)
`
`FIXED
`
`CHANNEL
`
` LEGEND
`
`
`
`RSSI
`
`PREAMBLE +
`DATA
`
`RADIO
`
`TX/RX
`FREQUENCY
`
`
`
`
`
`SUBCHANNEL
`SCAN
`
`
`
`SEQUENCE
`
`
`CONTROL
`
`
`
`
`COMMAND
`PHYSICAL
`
`CONTROLLER
`ENGINE
`
`DATA
`
`
`
`
`
`RESULTS
`
`FIG. 8
`
`Ex. 1009 / Page 2 of 11
`ERICSSON v. UNILOC
`
`Ex. 1009 / Page 2 of 11
`ERICSSON v. UNILOC
`
`

`

`U.S. Patent
`
`Nov.4, 2003
`
`Sheet 2 of 2
`
`US 6,643,278 B1
`
`FIC. 2
`
`10
`
`12
`
`14~1
`
`COMMENCE NEW HOPPING
`SEQUENCE DETERMINATION: START
`UP NEWLY-ENTERING NETWORK
`
`DETERMINE FIRST CHANNEL FOR ANALYSIS
`
`16
`
`SCAN SELECTED CHANNEL
`FOR EXISTING SIGNAL
`
`20
`
`
`FIXED
`YES
`
`INTERFERENCE
`9
`
`
`
`
`
` PACKET
`?
`
`
`
`
`
`ALL
`CHANNELS
`
`SCANNED?
`
`
`YES
`
`RECORD TIME SLOT
`AND CHANNEL
`
`INTERFERENCE
`
`RECORD USAGE
`CHARACTERISTICS
`
`28
`
`NEXT CHANNEL
`
`26
`
`50
`
`52-7]
`
`CREATE HOPPING SEQUENCE
`FOR NEWLY-ENTERING NETWORK
`
`MODIFY NEWLY-CREATED HOPPING
`SEQUENCE TO AVOID FIXED INTERFERENCE
`
`NEW SEQUENCE
`YES
`© INCUMBENT
`
`SEQUENCE?
`
`WAIT AT LEAST TWO SLOTS
`
`AFTER INCUMBENT USES FIRST
`
`CHANNEL IN ITS SEQUENCE
`
`
`
`34
`
`58
`
`START FREQUENCY HOPPING
`
`36
`
`Ex. 1009 / Page 3 of 11
`ERICSSON v. UNILOC
`
`Ex. 1009 / Page 3 of 11
`ERICSSON v. UNILOC
`
`

`

`US 6,643,278 B1
`
`1
`
`WIRELESS NETWORK CIRCUITS,
`SYSTEMS, AND METHODS FOR
`FREQUENCY HOPPING WITH REDUCED
`PACKET INTERFERENCE
`
`This application claims the benefit of Provisional Appli-
`cation Ser. No. 60/125,573 filed Mar. 23, 1999.
`
`CROSS-REFERENCES TO RELATED
`APPLICATIONS
`
`Not Applicable.
`
`STATEMENT REGARDING FEDERALLY
`SPONSORED RESEARCH OR DEVELOPMENT
`
`Not Applicable.
`
`BACKGROUND OF THE INVENTION
`
`The present embodiments relate to wireless communica-
`tion systems, and are more particularly directed to such
`systems using frequency hopping.
`Wireless networks are becoming increasingly popular,
`and in this regard there has been improvement in many
`aspects of such networks. Some improvements relate to
`configurations that permit simultaneously operation of dif-
`ferent networks where there is minimal or no interference
`
`2
`different respective frequencies. Note further that if inter-
`ference or a collision does occur, it typically corrupts the
`data of both packets,that is, the data transmitted by both the
`newly-entering network and the incumbent network. As a
`result, both networks are then required to re-transmit the
`packets an additional time so as to replace the corrupted data
`resulting from the collision.
`In an effort to achieve minimal packet collision using
`frequency hopping, two prior art methods have arisen for
`determining the different frequencies to which a network
`will hop. In a first method, a frequency hopping network
`uses a pre-ordained hopping sequence. Thisfirst approach is
`used by way of example under the IEEE 802.11 standard. In
`a second method, a seed is provided to a pseudo-random
`generator which produces a corresponding pseudo-random
`series of frequencies along which the network hops. This
`second approach is used by way of example underthe fairly
`recently developed Bluetooth protocol. Both of these
`approaches have achieved somelevel of success in reducing
`the amount of inter-network packet collision. Nevertheless,
`the present inventors have empirically determined that by
`locating two or more different networks in the same vicinity
`such that transmissions from each different network effec-
`
`10
`
`15
`
`20
`
`25
`
`tively compete for airtime, there still arises a considerable
`amount of packet collisions, thereby reducing the effective
`transmission rate for each network.
`
`Frequency hopping as described thus far reduces the
`between communications belonging to each of the networks.
`chances of interference between a packet from newly-
`In this respect, the term network is used, and is further used
`entering network and a packet from an incumbent network.
`in the same manner for the remainder of this document, to
`Further in this regard and by way of additional background,
`describe a system consisting of an organized group of
`FIG. 1 illustrates communications of such packets and, as
`intercommunicating devices. Further in this respect,
`the
`detailed below,
`it also illustrates instances where packet
`different networks may be labeled according to a first
`collisions occur. Looking to FIG. 1 in greater detail, its
`network that is already transmitting in time followed by a
`horizontal axis illustrates time (or time slots), and its vertical
`second network in time seeking to transmit and thereby
`axis indicates frequency. Additionally, FIG. 1 illustrates a
`possibly communicating and causing interference due to a
`numberof blocks, where each block is intended to depict a
`communication overlapping the pre-existing communica-
`packet as transmitted by either an incumbent network or a
`tion of the first network. Accordingly,
`to facilitate the
`newly-entering network. Further in this regard, note that the
`remaining discussion, suchafirst network is referred to as
`term “packet” is used in this documentto define a block of
`40
`an incumbent network, while the network which seeks to
`information sent in a finite period of time, where subsequent
`communicate, or in fact does communicate, after the incum-
`such packets are sent at other times. This block of informa-
`bent network is referred to as the newly-entering network.
`tion may take on various forms, and sometimes includes
`Giventhis terminology, the present background and embodi-
`different information types such as a preamble or other type
`ments discussed below are directed to reducing interference
`of control information, followed by user information which
`between incumbent network communications and newly-
`is sometimes also referred to as user data. Further,
`the
`entering network communications.
`overall packet also may be referred to in the art by other
`names, such as a frame, and thus these other information
`One approach to reducing the above-introduced interfer-
`blocks are also intended as included within the term
`ence is known in the art as spread spectrum frequency
`hopping and is sometimes referred to more simply as
`“packet” for purposes of defining the present
`inventive
`frequency hopping. In frequency hopping, a newly-entering
`scope. In any event, returning to FIG. 1, for the sake of
`network transmitter transmits packets of information at
`reference, each packetillustrated in FIG. 1 is labeled with an
`identifier using the letter “P” (.e., for packet) and following
`different frequencies in an effort to reduce the chance that
`the packet will interfere or “collide” with a packet transmit-
`after that letter is a number corresponding to the network
`ted at a frequency by a transmitter in an incumbent network.
`which transmitted the packet. More particularly, packets
`transmitted by the first network (i.e.,
`the incumbent
`The change between frequencies,that is, from one frequency
`network) are labeled with an identifier Pl while packets
`to another, is said to be a “hop” between the frequencies.
`transmitted by the second network(i.e., the newly-entering
`Moreover, the goal is such that each packet from a newly-
`network) are labeled with an identifier P2. Further,
`the
`entering networkis transmitted at a frequency which neither
`overlaps nor is near enough to a frequency at which an
`subscript for each packet identifies a time period encom-
`incumbent network is transmitting. Further in this regard,
`passed by the duration of the packet. For example, during a
`some systems(e.g., using Bluetooth protocol) transmit each
`time to, the first network transmits a packet P1, while also
`successive packet at a different frequency,that is, the trans-
`during time t, the second network transmits a packet P2,.
`mitter is “hopping”to a different frequency for each packet.
`Further in this regard, in the prior art transmissions by the
`Alternatively, others systems(e.g., IEEE 802.11) transmit a
`first network are asynchronouswith respect to transmissions
`first set of packets at a first frequency, and then hop to a
`of the second network, both in start time and periodicity.
`second frequency to transmit a secondset of packets, and so
`Thus, time t, is only meant as a relative indication for the
`forth for numerous different sets of packets at numerous
`first packet from each network, and it is not intended to
`
`30
`
`35
`
`45
`
`50
`
`55
`
`60
`
`65
`
`Ex. 1009 / Page 4 of 11
`ERICSSON v. UNILOC
`
`Ex. 1009 / Page 4 of 11
`ERICSSON v. UNILOC
`
`

`

`3
`suggest that the packets from both networks begin and end
`at the same time.
`
`US 6,643,278 B1
`
`10
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`4
`provide other beneficial aspects and, thus, the choice to use
`such a protocolis a tradeoff in that other aspects are obtained
`without the availability of LBT.
`the preceding
`to all packets in FIG. 1,
`With respect
`Time t, in FIG. 1 illustrates a second type of packet
`demonstrates that each packet beginsat a certain time, ends
`at a later time, andfills a certain frequency range (where the
`interference in connection with a collision C, occurring
`range is referred to as a channel). As a result and as
`between a first network packet P1, and a second network
`packet P2,. For collision C, the incumbent first network
`described below, interference may occurif the area in FIG.
`1 defined by a packet overlaps or is within a certain distance
`transmits packet P1, during a period including timet, and at
`of a packet from another wireless link.
`Indeed and as
`a first channel, and thereafter the second network transmits
`discussed below, such interference may occur in one of four
`packet P2, also during a period including timet, (i.e., the
`different ways.
`periods of the packets overlap). Packet P2, is transmitted at
`a second channel which, while different than the channel of
`type of packet
`Time t,
`in FIG. 1 illustrates a first
`packet P1,, it is immediately adjacent the channel occupied
`interference, where it may be seen that the first network
`by packet P1,. Further in this regard, it is knownin the art
`transmits a packet P1, After packet P1, commencesbutalso
`15
`during time t, the second network transmits a packet P2,.
`that while packets occupy a certain channel as shownby the
`
`
`
`The overlap of packets Pl, and P2, is shownasafirst vertical displacement of a packet in FIG. 1, there is an
`collision C,. Note that the horizontal alignment of packets
`additional tendency for a packet to provide slight interfer-
`P1, and P2, graphically indicates that in the example of
`ence or “splatter” into adjacent frequency channels. As a
`collision C,, both packets occupy the same frequency chan-
`result of this effect, even though packets P1, and P2, occupy
`nel. Thus, collision C, represents an example where two
`different channels, they are still in adjacent channels and,
`different networks attempt to transmit packets during an
`thus, they are close enough to one another in frequency such
`overlapping time period and along the same channel.
`that the splatter effect causes a collision between the packets.
`Indeed,
`in some networks the filters used are relatively
`Before proceeding with other types of packet collisions,
`inexpensive and, as a result, the concept illustrated with
`an additional discussion is noteworthy with respect to a
`packets Pl, and P2, may also apply to next-adjacent
`methodology which has been used to further reduce the
`channels, that is, to the channels that are one more channel
`likelihood and impact of packet collisions such as collision
`away from the channels adjacent to the channel in which a
`C,. More particularly,
`this additional methodology is
`packet
`is transmitted. Thus, collision C, represents an
`referred to in the art as listen-before-talk (“LBT”). In an
`example where two different networks attempt to transmit
`LBT system,
`the system uses the hopping sequence
`packets during an overlapping time period and along adja-
`described above, but prior to transmitting along a channel in
`cent(or next-adjacent) frequency channels. Here, if neither
`the sequence the system monitors (or “listens”) at
`the
`network uses LBT,
`then both packets P1, and P2, will
`channel
`to determine if there is another packet already
`require retransmission due to the collision. If, however, the
`occupying that channel during the current time. Returning to
`network that intended to transmit the second packet of the
`packet P1, by way of example,
`if the second network
`two uses LBT, then note first that LBT mechanismsare less
`employed LBT,then it would listen at the desired channel at
`likely to correctly discern an adjacent channel collision.
`whichit intended to transmit P2, and would therefore detect
`However, if the LBT mechanism does recognize the poten-
`the presence of packet P1,. As a result, the second network
`tial adjacent channelcollision, then the second packet is not
`would avoid collision C1 by not transmitting packet P2, at
`transmitted along the channel represented by P2, and instead
`the desired frequency, but instead it would delay a random
`that packet is delayed. This delay, while diminishing the
`period and then proceed to the next designated channelof its
`effective transmission of the second network, avoids any
`hopping sequence. Next, the second network would listen at
`disturbance to the first already-existing packet.
`In the
`that next designated channel
`to again determine if that
`example of time t, therefore, if the second network uses
`channel was occupied by a packet from another network,
`LBT, then packet P1, will not be disturbed because the
`and if no packet was detected then the second network
`second network will move the transmission of packet P2, to
`would transmit its packet; however, if this next designated
`a different channel.
`channel also was occupied, then the second network would
`continue to examine additional channels in this same manner
`
`until a channel was detected without being occupied by a
`packet from another network, at which time the second
`network would transmit its packet along the now unoccupied
`channel. Given this process, however, note that a delay
`arises in LBT systems, where the amountof delay depends
`on the numberof times that the LBT network is forced to
`listen, detect, and advance from an occupied channel, and
`then delay an additional random periodto listen, detect, and
`transmit along an unoccupied channel.
`While LBT as shown above reduces the possibility of
`collisions, it also has drawbacks. For example, LBT delays
`transmission by the network which waspreparedto transmit
`along a channel but wasprevented from doing so due to an
`already-transmitted packet
`in the desired channel. As
`another example, it adds an element of delay to each packet
`due to its listening aspect. Also, all
`the devices in an
`environment must utilize LBT to gain the most benefit
`(fairness) of the scheme. As still another example, some
`protocols (e.g., Bluetooth) utilized in the unlicensed bands
`do not support LBT, while such protocols may nonetheless
`
`50
`
`55
`
`60
`
`65
`
`in FIG. 1 illustrates a third type of packet
`Time t,
`interference in connection with a collision C,, which is
`comparable to collision C, except that for collision C, the
`networks transmit in opposite order. More particularly, for
`collision C,, the second networkfirst transmits a packet P2,
`and, thereafter, the first network transmits a packet P1,. The
`duration of both of these packets overlaps time t,, and again
`their channels are adjacent to one another rather than being
`the same channel. Nonetheless,
`the splatter effect again
`causes sufficient reach of each packet
`into the adjacent
`channel suchthat a collision occurs. Here, if neither network
`uses LBT,
`then both packets P2, and P1, require
`re-transmission dueto the collision; if, however, the network
`transmitting the second packetin time (i.e., P1,) of the two
`which would otherwise collide uses LBT, then only that
`packet is delayed and the first already-existing packet(i.e.,
`P2,) is not disturbed.
`Time t, in FIG. 1 illustrates a fourth type of packet
`interference in connection with a collision C,, which is
`comparable to collision C, except that for collision C, the
`networks transmit in opposite order. More particularly, for
`
`Ex. 1009 / Page 5 of 11
`ERICSSON v. UNILOC
`
`Ex. 1009 / Page 5 of 11
`ERICSSON v. UNILOC
`
`

`

`US 6,643,278 B1
`
`5
`collision C,, the second networkfirst transmits a packet P2,
`and,thereafter, the first network transmits a packet P1,. The
`duration of both of these packets overlap time t, and their
`channels are the same. As a result, collision C, occurs
`(assuming the last network to transmit, whichhereis thefirst
`network, does not use LBT).
`FIG. 1 illustrates an additional type of potential interfer-
`ence by depicting a band of fixed interference FI. Fixed
`interference FI is intended to represent a non-network source
`of radio frequency transmission that remains at the same
`frequency for numerous time slots. Such fixed interference
`may arise from various devices, such as a leaking micro-
`wave oven by way of example. In any event, note at time t,
`that the second network transmits a packet P2,, and the
`channel along which that packet is transmitted overlaps
`fixed interference FI. As a result, fixed interference FI
`interferes with packet P2;,
`thereby requiring it
`to be
`re-transmitted. Once more, however, if the second network
`were to implement LBT, then assumingfixed interference FI
`were detected during the listening operation of the LBT, then
`packet P2, would not be transmitted so as to avoid the
`otherwise imminentinterference. Lastly, while the example
`of packet P2.; demonstrates a data collision where the packet
`uses the same channelas the fixed interference, note further
`that fixed interference also may disturb packets in a channel
`that is adjacent to the channel including the fixed interfer-
`ence. Once more, because some networks use relatively
`inexpensive filters, the fixed interference may corrupt pack-
`ets which are either in a channel which is immediately
`adjacent to the fixed interference or which are in the next-
`adjacent channel(i.e., a channel whichis next to the channel
`that is immediately adjacent to the fixed interference).
`In view of the above, one skilled in the art should
`appreciate there are various opportunities for packet colli-
`sion or packetinterference to occur.Indeed,referring to FIG.
`1,
`the examples above demonstrate that an area may be
`described around each packet, where the packet is disturbed
`if another packet occurs within that area. Thus, this area,
`which may be perceived as a window or zone around the
`packet, is not only defined by the dimensionsof the packet,
`but extends both before and after the packet by the width of
`another potentially-interfering packet, and extends above
`and below the packet channel through the height of at least
`the adjacent channel above and below the packet frequency
`channel. Still further, note that the packet sizes for both
`networks shown in FIG. 1 are the same size by way of
`example; however, in some contexts, an incumbent network
`may use packets of different dimension (i.e., either in
`frequency and/or time) relative to the newly-entering net-
`work. In these cases, the packet size for the incumbent as
`well as the packet size for the newly-entering network, in
`addition to the window-affecting factors described above, all
`further define a two-dimensional area relative to a newly-
`entering packet in which interference may occur. Given the
`size of the two-dimensional area, therefore, there remains a
`possibility of packet disturbance even given the pseudo
`random nature of hopping spread spectrum RF communi-
`cations.
`
`As an additional consideration relative to avoiding packet
`collisions, it is further noted that the Federal Communica-
`tions Commission (“FCC”) imposesa restriction on theart
`in the Industrial Scientific Medical
`(“ISM”) bands.
`Specifically,
`the FCC explicitly forbids independent net-
`works to expressly cooperate in allocation of the wireless
`medium.
`
`In view of the above, there arises a need to reduce the
`possibility of packet collision and interference, and prefer-
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`45
`
`50
`
`55
`
`60
`
`65
`
`6
`ably to do so in a manner that may be used with protocols
`that do not support LBT. The preferred embodiment
`addresses these goals, as is explored below. In addition,
`there arises a need to achieve the above goals while com-
`plying the with the above-described FCC requirements. The
`preferred embodiments described below avoid these require-
`ments by not requiring the newly entering network to have
`knowledge of or cooperation with the incumbent network.
`
`BRIEF SUMMARY OF THE INVENTION
`
`there is a method for
`In the preferred embodiment,
`determining a frequency hopping sequence for a newly-
`entering network. The method comprises the step of scan-
`ning a plurality of frequency channels. For each of the
`plurality of frequency channels, the scanning step comprises
`detecting whether a signal exists on the channel and record-
`ing information corresponding to each channel on which a
`signal is detected. Finally, and responsive to the recorded
`information,
`the method forms the frequency hopping
`sequence. Other circuits, systems, and methods are also
`disclosed and claimed.
`
`BRIEF DESCRIPTION OF THE SEVERAL
`VIEWS OF THE DRAWING
`
`FIG. 1 illustrates various packets transmitted by a first and
`second network and demonstrates potential collisions
`between such packets as well as interference from a band of
`fixed interference.
`
`FIG. 2 illustrates a flow chart of the preferred embodiment
`as implemented in a method performed by a network trans-
`ceiver.
`
`FIG. 3 illustrates a block diagram of a network transceiver
`operable to perform the method shown in FIG. 2.
`
`DETAILED DESCRIPTION OF THE
`INVENTION
`
`FIG. 1 was described in the Background Of The Invention
`section of this document and the reader is assumed familiar
`with that description.
`FIG. 2 illustrates a flow chart of a method 10 according
`to the preferred embodiment and for operating a wireless
`network so as to reduce the drawbacks described above in
`
`connection with the prior art. By way of introductiontothis
`preferred embodiment,
`the following discussion demon-
`strates that by the conclusion of method 10 an improved
`hopping sequence is generated for a wireless network. The
`hopping sequence is improved in tworespects. First, the
`hopping sequence is such that packets may be communi-
`cated according to it and results in a reduced amount of
`packet collisions as compared to a prior art non-LBT wire-
`less frequency hopping system. Second,
`the hopping
`sequenceis such that packets may be communicated accord-
`ing to it and results in a reduced incidence of conflict with
`fixed interference as compared to a prior art non-LBT
`wireless frequency hopping system. These benefits are illus-
`trated in greaterdetail after the following detailed discussion
`of method 10. Finally, it should be noted that method 10 may
`be implemented in connection with various types of wireless
`networks as may be ascertained by one skilled in the art and
`as further addressed later. Additionally, such a person also
`may determinevariousdifferent circuits and software imple-
`mentations given the selected network, as is also explored
`later by way of example.
`Method 10 begins with a step 12 where the wireless
`network begins the determination of a new hopping
`
`Ex. 1009 / Page 6 of 11
`ERICSSON v. UNILOC
`
`Ex. 1009 / Page 6 of 11
`ERICSSON v. UNILOC
`
`

`

`US 6,643,278 B1
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`In step 20, having been reached due to the detection of
`fixed interference existing in the scanned channel, method
`10 records an indication of the time slot and channel in
`which the fixed interference was detected. The use of this
`information is detailed later. Thereafter, method 10 contin-
`ues from step 20 to step 26, whichis discussed following the
`discussion below concerning steps 22 and 24.
`Step 22 directs the flow of method 10 if the potential
`interference, if any, detected in step 16 is interference from
`another packet being transmitted in the same, or an adjacent,
`channel as the channel scanned in step 16. In the preferred
`embodiment,
`the determination of whether a particular
`detected interference is packet interference (as opposed to
`fixed interference) is again made by measuring bandwidth
`which may then be compared with the known packet
`bandwidth, such as in connection with the sub-channel
`evaluation described above.
`If packet
`interference is
`detected in the scanned channel, then step 22 directs the flow
`to a step 24. To the contrary, if no interference was detected
`and step 22 is reached, then method 10 continues from step
`22 to step 28. Each of these alternative paths is described
`below.
`
`8
`7
`if ten same-sized sub-
`thus,
`entire channel bandwidth;
`sequenceto be used for intercommunications on the network
`(i.e., by all transmitters, receivers, and transceivers in the
`channels are scanned for a given evaluated channel, and if
`network). To facilitate the remaining discussion, the network
`the interference detected is only in one or two of those
`sub-channels,
`then the preferred embodiment determines
`which will use this new hopping sequenceis referred to as
`that the detected interference is fixed interference; to the
`the newly-entering network. This terminology is chosen
`contrary, if interference is detected across most or all of
`because the newly-entering network’s communications are
`those sub-channels, then the preferred embodiment deter-
`new with respect to any one or more incumbent networks
`minesthat the detected interference is packetinterference. In
`that already may be communicating along the frequency
`any event, if fixed interference is detected, then step 18
`band to be used by the newly-entering network. In the
`10
`directs the flow to a step 20. To the contrary, if either no
`preferred embodiment, step 12 occurs at network start-up,
`interference is detected, or if interference which is not fixed
`such as whenafirst transceiver of the newly-entering
`interference is detected, then method 10 continues from step
`network is turned on or is otherwise initialized. Next,
`18 to step 22. Each of these alternative paths is described
`method 10 continues to step 14.
`below.
`is selected for
`In step 14, a first frequency channel
`analysis. More particularly and as will become apparent
`given the remaining discussion of method 10, in the pre-
`ferred embodiment each channel along which the newly-
`entering network may transmit is individually analyzed by
`method 10 at least once. Accordingly, step 14 operates so
`that a first one of these channels is selected to be analyzed.
`This selection may be implementedin various fashions, such
`as by assigning a unique and ascending number to each
`increasing frequency channel which is available to the
`newly-entering network, and then step 14 may operate by
`initializing a counter to the first assigned number. Other
`implementations may be ascertained by one skilled in the
`art. In any event, oncea first channelis selected for analysis,
`method 10 continues to step 16.
`In step 16, the channel selected by step 14 is scanned to
`determineif there is an existing signal in that channel. In the
`preferred embodiment, the known receive signal strength
`indicator (“RSSI”) is used as the scan technique. Note that
`an existing signal may be detected in the scanned channel
`due to various eventsasillustrated earlier in connection with
`FIG. 1. For example, an existing signal will be detected in
`step 16 if there is fixed interference in the scanned channel
`In step 24, the usage characteristics of the packet inter-
`ference of the scanned channel are recorded. These charac-
`(or in a channel one or two adjacent channel locations from
`the scanned channel). As another example,an existing signal
`teristics preferably include the time slot and channel in
`will be detected in step 16 if another network has transmitted
`which the packet was detected.
`In addition, when a
`a packet that, during the duration of the scan,is either in the
`potentially-interfering packet
`is detected in the scanned
`scanned channel or in a channelthatis adjacent the scanned
`channel,
`there are two possible levels of information
`channel. Each of these possibilities is responded to by one
`retrieval from that packet. Asafirst possibility, if the packet
`or more additional steps, as discussed below. Following the
`is detected in time to properly recover the header informa-
`scan of step 16, method 10 continuesto step 18.
`tion from the packet, then that header information should
`Step 18 directs the flow of method 10 if the interference,
`include an indication of the hopping sequence of the incum-
`if any, detected in step 16 is fixed interference. The deter-
`bent network which transmitted the packet. For example,
`mination of whether a particular detected interference is
`this indication may be by wayof a seed whichis used by the
`fixed interference (as opposed to packet interference) may
`incumbent network which transmitted the packet and, more
`be made in various fashions. Asimple approachis to wait on
`particularly, which is applied to a random sequence genera-
`an occupied channel for a period of time which exceedsall
`tor of the network to generate the incumbent network’s
`knownpacket lengths (0.4 seconds by FCCpart 15 rules). In
`frequency hopping sequence. In any event, the indication is
`a faster and preferred approach,
`the instance of a fixed
`stored by step 24 as a usage characteristic. As a second
`interferer
`is determined by determining its occupied
`possibility, if the packet is not detected in time to properly
`bandwidth, which is very small relative to data carrying
`recover its header information, then preferably a record is
`modulated signals. More particularly, many scan circuits are
`made of the time slot and frequency channel in which the
`available which can be configured according to the preferred
`packet was detected. Further in this regard, note that there is
`embodimentto determine the bandwidth of a received signal
`the chance that the existence of packet data in the scanned
`by stepping through several sub-channels of the particular
`channel is detected, yet the actual data is relatively unintel-
`chann

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket