`(10) Patent No:
`a2) United States Patent
`Panasik etal.
`(45) Date of Patent:
`Nov.4, 2003
`
`
`US006643278B1
`
`(54) WIRELESS NETWORK CIRCUITS,
`SYSTEMS, AND METHODS FOR
`FREQUENCY HOPPING WITH REDUCED
`PACKET INTERFERENCE
`Inventors: Carl M. Panasik, Garland, TX (US);
`Thomas M.Siep, Garland, TX (US)
`
`(75)
`
`.
`(73) Assignee: Texas Instruments Incorporated,
`Dallas, TX (US)
`J
`y
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`US.C. 154(b) by 0 days.
`
`Notice:
`
`*)
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`4,716,573 A
`12/1987 Bergstrém et al.
`5,506,863 A *
`4/1996 Meidan et al. vse: 375/134
`5598622 A
`6/1996 Cadd et al
`5,778,075 A *
`7/1998 Haartsen ...cesseseeeeee 375/138
`5,809,059 A
`9/1998 Souissiet al.
`
`* cited by examiner
`
`Primary Examiner—Dang Ton
`(74) Attorney, Agent, or Firm—Ronald O. Neerings; Wade
`James Brady, III; Frederick J. Telecky, Jr.
`
`(21) Appl. No.: 09/473,337
`(22)
`Filed:
`Dec. 28, 1999
`
`ABSTRACT
`(57)
`for determining a frequency hopping
`A method (10)
`sequence for a newly-entering network. The method com-
`an
`prises the step of scanning (16) a plurality of frequency
`Related U.S. Application Data
`channels. For each of the plurality of frequency channels,
`rowisional application No. 60/125,573, filed on Mar. 23,
`(60)
`the scanning step comprises detecting whether a signal (18,
`,
`22) exists on the channel and recording information (20, 24)
`(SL) Unt. C0 eee ecccccccsecseeseeseeseereeseeseeneesees H04Q 7/00
`(52) US. Ch. eeceeceeeesesessessesseenesnes 370/330; 370/344|corresponding to each channel on whicha signalis detected.
`(58) Field of Search... 370/330, 480,
`Finally, and responsive to the recorded information,
`the
`370/342, 441, 442, 241, 252, 254, 389,
`method forms (30) the frequency hopping sequence.
`392, 465, 394, 344, 345; 375/130, 131,
`132-134; 380/49, 9, 48, 59; 455/422, 436
`
`25 Claims, 2 Drawing Sheets
`
`14~\J DETERMINE FIRST CHANNEL FOR ANALYSISfg
`——_-—______¥_.
`16~]
`SCAN SELECTED CHANNEL
`FOR EXISTING SIGNAL
`
`COMMENCE NEW HOPPING
`SEQUENCE DETERMINATION: START
`UP NEWLY-ENTERING NETWORK
`
`J2~)
`
`
`
`
`
`28
`
`NEXT CHANNEL
`
`NC
`
`NO
`
`
`FIXED
`20
`INTERFERENCE
`YES
`
`?
`RECORD TIME SLOT
`AND CHANNEL
`NO
` 22
`PACKET
`
`
`INTERFERENCE
`2
`
`
`
`ALL
`
`CHANNELS
`
`
`SCANNED?
`
`
`
`
`
`
`24
`RECORD USAGE
`CHARACTERISTICS
`
`26
`
`YES
`CREATE HOPPING SEQUENCE
`FOR NEWLY-ENTERING NETWORK
`
`30
`
`
`
` NEW SEQUENCE
`SEQUENCE?
`CHANNEL IN ITS SEQUENCE
`
`
`MODIFY NEWLY-CREATED HOPPING
`
`32-7] SEQUENCE TO AVOID FIXED INTERFERENCE
`
`= INCUMBENT
`
`WAIT AT LEAST TWO SLOTS
`AFTER INCUMBENT USES FIRST
`
`
`
`Ex. 1009 / Page 1 of 11
`ERICSSON v. UNILOC
`
`Ex. 1009 / Page 1 of 11
`ERICSSON v. UNILOC
`
`
`
`U.S. Patent
`
`Nov.4, 2003
`
`Sheet 1 of 2
`
`US 6,643,278 B1
`
`P29
`
`FREQUENCY
`
`|
`|
`
`[7
`
`FIRST NETWORK
`
`V4) PACKET, P1,,
`RN PACKET, P2,
`XQ SECOND NETWORK
`LY intERFERENCE (FI)
`
`FIXED
`
`CHANNEL
`
` LEGEND
`
`
`
`RSSI
`
`PREAMBLE +
`DATA
`
`RADIO
`
`TX/RX
`FREQUENCY
`
`
`
`
`
`SUBCHANNEL
`SCAN
`
`
`
`SEQUENCE
`
`
`CONTROL
`
`
`
`
`COMMAND
`PHYSICAL
`
`CONTROLLER
`ENGINE
`
`DATA
`
`
`
`
`
`RESULTS
`
`FIG. 8
`
`Ex. 1009 / Page 2 of 11
`ERICSSON v. UNILOC
`
`Ex. 1009 / Page 2 of 11
`ERICSSON v. UNILOC
`
`
`
`U.S. Patent
`
`Nov.4, 2003
`
`Sheet 2 of 2
`
`US 6,643,278 B1
`
`FIC. 2
`
`10
`
`12
`
`14~1
`
`COMMENCE NEW HOPPING
`SEQUENCE DETERMINATION: START
`UP NEWLY-ENTERING NETWORK
`
`DETERMINE FIRST CHANNEL FOR ANALYSIS
`
`16
`
`SCAN SELECTED CHANNEL
`FOR EXISTING SIGNAL
`
`20
`
`
`FIXED
`YES
`
`INTERFERENCE
`9
`
`
`
`
`
` PACKET
`?
`
`
`
`
`
`ALL
`CHANNELS
`
`SCANNED?
`
`
`YES
`
`RECORD TIME SLOT
`AND CHANNEL
`
`INTERFERENCE
`
`RECORD USAGE
`CHARACTERISTICS
`
`28
`
`NEXT CHANNEL
`
`26
`
`50
`
`52-7]
`
`CREATE HOPPING SEQUENCE
`FOR NEWLY-ENTERING NETWORK
`
`MODIFY NEWLY-CREATED HOPPING
`SEQUENCE TO AVOID FIXED INTERFERENCE
`
`NEW SEQUENCE
`YES
`© INCUMBENT
`
`SEQUENCE?
`
`WAIT AT LEAST TWO SLOTS
`
`AFTER INCUMBENT USES FIRST
`
`CHANNEL IN ITS SEQUENCE
`
`
`
`34
`
`58
`
`START FREQUENCY HOPPING
`
`36
`
`Ex. 1009 / Page 3 of 11
`ERICSSON v. UNILOC
`
`Ex. 1009 / Page 3 of 11
`ERICSSON v. UNILOC
`
`
`
`US 6,643,278 B1
`
`1
`
`WIRELESS NETWORK CIRCUITS,
`SYSTEMS, AND METHODS FOR
`FREQUENCY HOPPING WITH REDUCED
`PACKET INTERFERENCE
`
`This application claims the benefit of Provisional Appli-
`cation Ser. No. 60/125,573 filed Mar. 23, 1999.
`
`CROSS-REFERENCES TO RELATED
`APPLICATIONS
`
`Not Applicable.
`
`STATEMENT REGARDING FEDERALLY
`SPONSORED RESEARCH OR DEVELOPMENT
`
`Not Applicable.
`
`BACKGROUND OF THE INVENTION
`
`The present embodiments relate to wireless communica-
`tion systems, and are more particularly directed to such
`systems using frequency hopping.
`Wireless networks are becoming increasingly popular,
`and in this regard there has been improvement in many
`aspects of such networks. Some improvements relate to
`configurations that permit simultaneously operation of dif-
`ferent networks where there is minimal or no interference
`
`2
`different respective frequencies. Note further that if inter-
`ference or a collision does occur, it typically corrupts the
`data of both packets,that is, the data transmitted by both the
`newly-entering network and the incumbent network. As a
`result, both networks are then required to re-transmit the
`packets an additional time so as to replace the corrupted data
`resulting from the collision.
`In an effort to achieve minimal packet collision using
`frequency hopping, two prior art methods have arisen for
`determining the different frequencies to which a network
`will hop. In a first method, a frequency hopping network
`uses a pre-ordained hopping sequence. Thisfirst approach is
`used by way of example under the IEEE 802.11 standard. In
`a second method, a seed is provided to a pseudo-random
`generator which produces a corresponding pseudo-random
`series of frequencies along which the network hops. This
`second approach is used by way of example underthe fairly
`recently developed Bluetooth protocol. Both of these
`approaches have achieved somelevel of success in reducing
`the amount of inter-network packet collision. Nevertheless,
`the present inventors have empirically determined that by
`locating two or more different networks in the same vicinity
`such that transmissions from each different network effec-
`
`10
`
`15
`
`20
`
`25
`
`tively compete for airtime, there still arises a considerable
`amount of packet collisions, thereby reducing the effective
`transmission rate for each network.
`
`Frequency hopping as described thus far reduces the
`between communications belonging to each of the networks.
`chances of interference between a packet from newly-
`In this respect, the term network is used, and is further used
`entering network and a packet from an incumbent network.
`in the same manner for the remainder of this document, to
`Further in this regard and by way of additional background,
`describe a system consisting of an organized group of
`FIG. 1 illustrates communications of such packets and, as
`intercommunicating devices. Further in this respect,
`the
`detailed below,
`it also illustrates instances where packet
`different networks may be labeled according to a first
`collisions occur. Looking to FIG. 1 in greater detail, its
`network that is already transmitting in time followed by a
`horizontal axis illustrates time (or time slots), and its vertical
`second network in time seeking to transmit and thereby
`axis indicates frequency. Additionally, FIG. 1 illustrates a
`possibly communicating and causing interference due to a
`numberof blocks, where each block is intended to depict a
`communication overlapping the pre-existing communica-
`packet as transmitted by either an incumbent network or a
`tion of the first network. Accordingly,
`to facilitate the
`newly-entering network. Further in this regard, note that the
`remaining discussion, suchafirst network is referred to as
`term “packet” is used in this documentto define a block of
`40
`an incumbent network, while the network which seeks to
`information sent in a finite period of time, where subsequent
`communicate, or in fact does communicate, after the incum-
`such packets are sent at other times. This block of informa-
`bent network is referred to as the newly-entering network.
`tion may take on various forms, and sometimes includes
`Giventhis terminology, the present background and embodi-
`different information types such as a preamble or other type
`ments discussed below are directed to reducing interference
`of control information, followed by user information which
`between incumbent network communications and newly-
`is sometimes also referred to as user data. Further,
`the
`entering network communications.
`overall packet also may be referred to in the art by other
`names, such as a frame, and thus these other information
`One approach to reducing the above-introduced interfer-
`blocks are also intended as included within the term
`ence is known in the art as spread spectrum frequency
`hopping and is sometimes referred to more simply as
`“packet” for purposes of defining the present
`inventive
`frequency hopping. In frequency hopping, a newly-entering
`scope. In any event, returning to FIG. 1, for the sake of
`network transmitter transmits packets of information at
`reference, each packetillustrated in FIG. 1 is labeled with an
`identifier using the letter “P” (.e., for packet) and following
`different frequencies in an effort to reduce the chance that
`the packet will interfere or “collide” with a packet transmit-
`after that letter is a number corresponding to the network
`ted at a frequency by a transmitter in an incumbent network.
`which transmitted the packet. More particularly, packets
`transmitted by the first network (i.e.,
`the incumbent
`The change between frequencies,that is, from one frequency
`network) are labeled with an identifier Pl while packets
`to another, is said to be a “hop” between the frequencies.
`transmitted by the second network(i.e., the newly-entering
`Moreover, the goal is such that each packet from a newly-
`network) are labeled with an identifier P2. Further,
`the
`entering networkis transmitted at a frequency which neither
`overlaps nor is near enough to a frequency at which an
`subscript for each packet identifies a time period encom-
`incumbent network is transmitting. Further in this regard,
`passed by the duration of the packet. For example, during a
`some systems(e.g., using Bluetooth protocol) transmit each
`time to, the first network transmits a packet P1, while also
`successive packet at a different frequency,that is, the trans-
`during time t, the second network transmits a packet P2,.
`mitter is “hopping”to a different frequency for each packet.
`Further in this regard, in the prior art transmissions by the
`Alternatively, others systems(e.g., IEEE 802.11) transmit a
`first network are asynchronouswith respect to transmissions
`first set of packets at a first frequency, and then hop to a
`of the second network, both in start time and periodicity.
`second frequency to transmit a secondset of packets, and so
`Thus, time t, is only meant as a relative indication for the
`forth for numerous different sets of packets at numerous
`first packet from each network, and it is not intended to
`
`30
`
`35
`
`45
`
`50
`
`55
`
`60
`
`65
`
`Ex. 1009 / Page 4 of 11
`ERICSSON v. UNILOC
`
`Ex. 1009 / Page 4 of 11
`ERICSSON v. UNILOC
`
`
`
`3
`suggest that the packets from both networks begin and end
`at the same time.
`
`US 6,643,278 B1
`
`10
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`4
`provide other beneficial aspects and, thus, the choice to use
`such a protocolis a tradeoff in that other aspects are obtained
`without the availability of LBT.
`the preceding
`to all packets in FIG. 1,
`With respect
`Time t, in FIG. 1 illustrates a second type of packet
`demonstrates that each packet beginsat a certain time, ends
`at a later time, andfills a certain frequency range (where the
`interference in connection with a collision C, occurring
`range is referred to as a channel). As a result and as
`between a first network packet P1, and a second network
`packet P2,. For collision C, the incumbent first network
`described below, interference may occurif the area in FIG.
`1 defined by a packet overlaps or is within a certain distance
`transmits packet P1, during a period including timet, and at
`of a packet from another wireless link.
`Indeed and as
`a first channel, and thereafter the second network transmits
`discussed below, such interference may occur in one of four
`packet P2, also during a period including timet, (i.e., the
`different ways.
`periods of the packets overlap). Packet P2, is transmitted at
`a second channel which, while different than the channel of
`type of packet
`Time t,
`in FIG. 1 illustrates a first
`packet P1,, it is immediately adjacent the channel occupied
`interference, where it may be seen that the first network
`by packet P1,. Further in this regard, it is knownin the art
`transmits a packet P1, After packet P1, commencesbutalso
`15
`during time t, the second network transmits a packet P2,.
`that while packets occupy a certain channel as shownby the
`
`
`
`The overlap of packets Pl, and P2, is shownasafirst vertical displacement of a packet in FIG. 1, there is an
`collision C,. Note that the horizontal alignment of packets
`additional tendency for a packet to provide slight interfer-
`P1, and P2, graphically indicates that in the example of
`ence or “splatter” into adjacent frequency channels. As a
`collision C,, both packets occupy the same frequency chan-
`result of this effect, even though packets P1, and P2, occupy
`nel. Thus, collision C, represents an example where two
`different channels, they are still in adjacent channels and,
`different networks attempt to transmit packets during an
`thus, they are close enough to one another in frequency such
`overlapping time period and along the same channel.
`that the splatter effect causes a collision between the packets.
`Indeed,
`in some networks the filters used are relatively
`Before proceeding with other types of packet collisions,
`inexpensive and, as a result, the concept illustrated with
`an additional discussion is noteworthy with respect to a
`packets Pl, and P2, may also apply to next-adjacent
`methodology which has been used to further reduce the
`channels, that is, to the channels that are one more channel
`likelihood and impact of packet collisions such as collision
`away from the channels adjacent to the channel in which a
`C,. More particularly,
`this additional methodology is
`packet
`is transmitted. Thus, collision C, represents an
`referred to in the art as listen-before-talk (“LBT”). In an
`example where two different networks attempt to transmit
`LBT system,
`the system uses the hopping sequence
`packets during an overlapping time period and along adja-
`described above, but prior to transmitting along a channel in
`cent(or next-adjacent) frequency channels. Here, if neither
`the sequence the system monitors (or “listens”) at
`the
`network uses LBT,
`then both packets P1, and P2, will
`channel
`to determine if there is another packet already
`require retransmission due to the collision. If, however, the
`occupying that channel during the current time. Returning to
`network that intended to transmit the second packet of the
`packet P1, by way of example,
`if the second network
`two uses LBT, then note first that LBT mechanismsare less
`employed LBT,then it would listen at the desired channel at
`likely to correctly discern an adjacent channel collision.
`whichit intended to transmit P2, and would therefore detect
`However, if the LBT mechanism does recognize the poten-
`the presence of packet P1,. As a result, the second network
`tial adjacent channelcollision, then the second packet is not
`would avoid collision C1 by not transmitting packet P2, at
`transmitted along the channel represented by P2, and instead
`the desired frequency, but instead it would delay a random
`that packet is delayed. This delay, while diminishing the
`period and then proceed to the next designated channelof its
`effective transmission of the second network, avoids any
`hopping sequence. Next, the second network would listen at
`disturbance to the first already-existing packet.
`In the
`that next designated channel
`to again determine if that
`example of time t, therefore, if the second network uses
`channel was occupied by a packet from another network,
`LBT, then packet P1, will not be disturbed because the
`and if no packet was detected then the second network
`second network will move the transmission of packet P2, to
`would transmit its packet; however, if this next designated
`a different channel.
`channel also was occupied, then the second network would
`continue to examine additional channels in this same manner
`
`until a channel was detected without being occupied by a
`packet from another network, at which time the second
`network would transmit its packet along the now unoccupied
`channel. Given this process, however, note that a delay
`arises in LBT systems, where the amountof delay depends
`on the numberof times that the LBT network is forced to
`listen, detect, and advance from an occupied channel, and
`then delay an additional random periodto listen, detect, and
`transmit along an unoccupied channel.
`While LBT as shown above reduces the possibility of
`collisions, it also has drawbacks. For example, LBT delays
`transmission by the network which waspreparedto transmit
`along a channel but wasprevented from doing so due to an
`already-transmitted packet
`in the desired channel. As
`another example, it adds an element of delay to each packet
`due to its listening aspect. Also, all
`the devices in an
`environment must utilize LBT to gain the most benefit
`(fairness) of the scheme. As still another example, some
`protocols (e.g., Bluetooth) utilized in the unlicensed bands
`do not support LBT, while such protocols may nonetheless
`
`50
`
`55
`
`60
`
`65
`
`in FIG. 1 illustrates a third type of packet
`Time t,
`interference in connection with a collision C,, which is
`comparable to collision C, except that for collision C, the
`networks transmit in opposite order. More particularly, for
`collision C,, the second networkfirst transmits a packet P2,
`and, thereafter, the first network transmits a packet P1,. The
`duration of both of these packets overlaps time t,, and again
`their channels are adjacent to one another rather than being
`the same channel. Nonetheless,
`the splatter effect again
`causes sufficient reach of each packet
`into the adjacent
`channel suchthat a collision occurs. Here, if neither network
`uses LBT,
`then both packets P2, and P1, require
`re-transmission dueto the collision; if, however, the network
`transmitting the second packetin time (i.e., P1,) of the two
`which would otherwise collide uses LBT, then only that
`packet is delayed and the first already-existing packet(i.e.,
`P2,) is not disturbed.
`Time t, in FIG. 1 illustrates a fourth type of packet
`interference in connection with a collision C,, which is
`comparable to collision C, except that for collision C, the
`networks transmit in opposite order. More particularly, for
`
`Ex. 1009 / Page 5 of 11
`ERICSSON v. UNILOC
`
`Ex. 1009 / Page 5 of 11
`ERICSSON v. UNILOC
`
`
`
`US 6,643,278 B1
`
`5
`collision C,, the second networkfirst transmits a packet P2,
`and,thereafter, the first network transmits a packet P1,. The
`duration of both of these packets overlap time t, and their
`channels are the same. As a result, collision C, occurs
`(assuming the last network to transmit, whichhereis thefirst
`network, does not use LBT).
`FIG. 1 illustrates an additional type of potential interfer-
`ence by depicting a band of fixed interference FI. Fixed
`interference FI is intended to represent a non-network source
`of radio frequency transmission that remains at the same
`frequency for numerous time slots. Such fixed interference
`may arise from various devices, such as a leaking micro-
`wave oven by way of example. In any event, note at time t,
`that the second network transmits a packet P2,, and the
`channel along which that packet is transmitted overlaps
`fixed interference FI. As a result, fixed interference FI
`interferes with packet P2;,
`thereby requiring it
`to be
`re-transmitted. Once more, however, if the second network
`were to implement LBT, then assumingfixed interference FI
`were detected during the listening operation of the LBT, then
`packet P2, would not be transmitted so as to avoid the
`otherwise imminentinterference. Lastly, while the example
`of packet P2.; demonstrates a data collision where the packet
`uses the same channelas the fixed interference, note further
`that fixed interference also may disturb packets in a channel
`that is adjacent to the channel including the fixed interfer-
`ence. Once more, because some networks use relatively
`inexpensive filters, the fixed interference may corrupt pack-
`ets which are either in a channel which is immediately
`adjacent to the fixed interference or which are in the next-
`adjacent channel(i.e., a channel whichis next to the channel
`that is immediately adjacent to the fixed interference).
`In view of the above, one skilled in the art should
`appreciate there are various opportunities for packet colli-
`sion or packetinterference to occur.Indeed,referring to FIG.
`1,
`the examples above demonstrate that an area may be
`described around each packet, where the packet is disturbed
`if another packet occurs within that area. Thus, this area,
`which may be perceived as a window or zone around the
`packet, is not only defined by the dimensionsof the packet,
`but extends both before and after the packet by the width of
`another potentially-interfering packet, and extends above
`and below the packet channel through the height of at least
`the adjacent channel above and below the packet frequency
`channel. Still further, note that the packet sizes for both
`networks shown in FIG. 1 are the same size by way of
`example; however, in some contexts, an incumbent network
`may use packets of different dimension (i.e., either in
`frequency and/or time) relative to the newly-entering net-
`work. In these cases, the packet size for the incumbent as
`well as the packet size for the newly-entering network, in
`addition to the window-affecting factors described above, all
`further define a two-dimensional area relative to a newly-
`entering packet in which interference may occur. Given the
`size of the two-dimensional area, therefore, there remains a
`possibility of packet disturbance even given the pseudo
`random nature of hopping spread spectrum RF communi-
`cations.
`
`As an additional consideration relative to avoiding packet
`collisions, it is further noted that the Federal Communica-
`tions Commission (“FCC”) imposesa restriction on theart
`in the Industrial Scientific Medical
`(“ISM”) bands.
`Specifically,
`the FCC explicitly forbids independent net-
`works to expressly cooperate in allocation of the wireless
`medium.
`
`In view of the above, there arises a need to reduce the
`possibility of packet collision and interference, and prefer-
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`45
`
`50
`
`55
`
`60
`
`65
`
`6
`ably to do so in a manner that may be used with protocols
`that do not support LBT. The preferred embodiment
`addresses these goals, as is explored below. In addition,
`there arises a need to achieve the above goals while com-
`plying the with the above-described FCC requirements. The
`preferred embodiments described below avoid these require-
`ments by not requiring the newly entering network to have
`knowledge of or cooperation with the incumbent network.
`
`BRIEF SUMMARY OF THE INVENTION
`
`there is a method for
`In the preferred embodiment,
`determining a frequency hopping sequence for a newly-
`entering network. The method comprises the step of scan-
`ning a plurality of frequency channels. For each of the
`plurality of frequency channels, the scanning step comprises
`detecting whether a signal exists on the channel and record-
`ing information corresponding to each channel on which a
`signal is detected. Finally, and responsive to the recorded
`information,
`the method forms the frequency hopping
`sequence. Other circuits, systems, and methods are also
`disclosed and claimed.
`
`BRIEF DESCRIPTION OF THE SEVERAL
`VIEWS OF THE DRAWING
`
`FIG. 1 illustrates various packets transmitted by a first and
`second network and demonstrates potential collisions
`between such packets as well as interference from a band of
`fixed interference.
`
`FIG. 2 illustrates a flow chart of the preferred embodiment
`as implemented in a method performed by a network trans-
`ceiver.
`
`FIG. 3 illustrates a block diagram of a network transceiver
`operable to perform the method shown in FIG. 2.
`
`DETAILED DESCRIPTION OF THE
`INVENTION
`
`FIG. 1 was described in the Background Of The Invention
`section of this document and the reader is assumed familiar
`with that description.
`FIG. 2 illustrates a flow chart of a method 10 according
`to the preferred embodiment and for operating a wireless
`network so as to reduce the drawbacks described above in
`
`connection with the prior art. By way of introductiontothis
`preferred embodiment,
`the following discussion demon-
`strates that by the conclusion of method 10 an improved
`hopping sequence is generated for a wireless network. The
`hopping sequence is improved in tworespects. First, the
`hopping sequence is such that packets may be communi-
`cated according to it and results in a reduced amount of
`packet collisions as compared to a prior art non-LBT wire-
`less frequency hopping system. Second,
`the hopping
`sequenceis such that packets may be communicated accord-
`ing to it and results in a reduced incidence of conflict with
`fixed interference as compared to a prior art non-LBT
`wireless frequency hopping system. These benefits are illus-
`trated in greaterdetail after the following detailed discussion
`of method 10. Finally, it should be noted that method 10 may
`be implemented in connection with various types of wireless
`networks as may be ascertained by one skilled in the art and
`as further addressed later. Additionally, such a person also
`may determinevariousdifferent circuits and software imple-
`mentations given the selected network, as is also explored
`later by way of example.
`Method 10 begins with a step 12 where the wireless
`network begins the determination of a new hopping
`
`Ex. 1009 / Page 6 of 11
`ERICSSON v. UNILOC
`
`Ex. 1009 / Page 6 of 11
`ERICSSON v. UNILOC
`
`
`
`US 6,643,278 B1
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`In step 20, having been reached due to the detection of
`fixed interference existing in the scanned channel, method
`10 records an indication of the time slot and channel in
`which the fixed interference was detected. The use of this
`information is detailed later. Thereafter, method 10 contin-
`ues from step 20 to step 26, whichis discussed following the
`discussion below concerning steps 22 and 24.
`Step 22 directs the flow of method 10 if the potential
`interference, if any, detected in step 16 is interference from
`another packet being transmitted in the same, or an adjacent,
`channel as the channel scanned in step 16. In the preferred
`embodiment,
`the determination of whether a particular
`detected interference is packet interference (as opposed to
`fixed interference) is again made by measuring bandwidth
`which may then be compared with the known packet
`bandwidth, such as in connection with the sub-channel
`evaluation described above.
`If packet
`interference is
`detected in the scanned channel, then step 22 directs the flow
`to a step 24. To the contrary, if no interference was detected
`and step 22 is reached, then method 10 continues from step
`22 to step 28. Each of these alternative paths is described
`below.
`
`8
`7
`if ten same-sized sub-
`thus,
`entire channel bandwidth;
`sequenceto be used for intercommunications on the network
`(i.e., by all transmitters, receivers, and transceivers in the
`channels are scanned for a given evaluated channel, and if
`network). To facilitate the remaining discussion, the network
`the interference detected is only in one or two of those
`sub-channels,
`then the preferred embodiment determines
`which will use this new hopping sequenceis referred to as
`that the detected interference is fixed interference; to the
`the newly-entering network. This terminology is chosen
`contrary, if interference is detected across most or all of
`because the newly-entering network’s communications are
`those sub-channels, then the preferred embodiment deter-
`new with respect to any one or more incumbent networks
`minesthat the detected interference is packetinterference. In
`that already may be communicating along the frequency
`any event, if fixed interference is detected, then step 18
`band to be used by the newly-entering network. In the
`10
`directs the flow to a step 20. To the contrary, if either no
`preferred embodiment, step 12 occurs at network start-up,
`interference is detected, or if interference which is not fixed
`such as whenafirst transceiver of the newly-entering
`interference is detected, then method 10 continues from step
`network is turned on or is otherwise initialized. Next,
`18 to step 22. Each of these alternative paths is described
`method 10 continues to step 14.
`below.
`is selected for
`In step 14, a first frequency channel
`analysis. More particularly and as will become apparent
`given the remaining discussion of method 10, in the pre-
`ferred embodiment each channel along which the newly-
`entering network may transmit is individually analyzed by
`method 10 at least once. Accordingly, step 14 operates so
`that a first one of these channels is selected to be analyzed.
`This selection may be implementedin various fashions, such
`as by assigning a unique and ascending number to each
`increasing frequency channel which is available to the
`newly-entering network, and then step 14 may operate by
`initializing a counter to the first assigned number. Other
`implementations may be ascertained by one skilled in the
`art. In any event, oncea first channelis selected for analysis,
`method 10 continues to step 16.
`In step 16, the channel selected by step 14 is scanned to
`determineif there is an existing signal in that channel. In the
`preferred embodiment, the known receive signal strength
`indicator (“RSSI”) is used as the scan technique. Note that
`an existing signal may be detected in the scanned channel
`due to various eventsasillustrated earlier in connection with
`FIG. 1. For example, an existing signal will be detected in
`step 16 if there is fixed interference in the scanned channel
`In step 24, the usage characteristics of the packet inter-
`ference of the scanned channel are recorded. These charac-
`(or in a channel one or two adjacent channel locations from
`the scanned channel). As another example,an existing signal
`teristics preferably include the time slot and channel in
`will be detected in step 16 if another network has transmitted
`which the packet was detected.
`In addition, when a
`a packet that, during the duration of the scan,is either in the
`potentially-interfering packet
`is detected in the scanned
`scanned channel or in a channelthatis adjacent the scanned
`channel,
`there are two possible levels of information
`channel. Each of these possibilities is responded to by one
`retrieval from that packet. Asafirst possibility, if the packet
`or more additional steps, as discussed below. Following the
`is detected in time to properly recover the header informa-
`scan of step 16, method 10 continuesto step 18.
`tion from the packet, then that header information should
`Step 18 directs the flow of method 10 if the interference,
`include an indication of the hopping sequence of the incum-
`if any, detected in step 16 is fixed interference. The deter-
`bent network which transmitted the packet. For example,
`mination of whether a particular detected interference is
`this indication may be by wayof a seed whichis used by the
`fixed interference (as opposed to packet interference) may
`incumbent network which transmitted the packet and, more
`be made in various fashions. Asimple approachis to wait on
`particularly, which is applied to a random sequence genera-
`an occupied channel for a period of time which exceedsall
`tor of the network to generate the incumbent network’s
`knownpacket lengths (0.4 seconds by FCCpart 15 rules). In
`frequency hopping sequence. In any event, the indication is
`a faster and preferred approach,
`the instance of a fixed
`stored by step 24 as a usage characteristic. As a second
`interferer
`is determined by determining its occupied
`possibility, if the packet is not detected in time to properly
`bandwidth, which is very small relative to data carrying
`recover its header information, then preferably a record is
`modulated signals. More particularly, many scan circuits are
`made of the time slot and frequency channel in which the
`available which can be configured according to the preferred
`packet was detected. Further in this regard, note that there is
`embodimentto determine the bandwidth of a received signal
`the chance that the existence of packet data in the scanned
`by stepping through several sub-channels of the particular
`channel is detected, yet the actual data is relatively unintel-
`chann