throbber
-- ----
`
`-------
`
`The Automatic Synchronizer
`
`41
`
`The speaking laptop usage model is an example of extending the
`functions of one device by allowing it to ''bor·row'' tl1e capabilities of
`some otl1er· device. Speakerphone capability becomes available, using
`the speaker and micr·ophone of the notebook computer, even if the
`mobile phone does not have its own speakerphone capability . Exten-
`sions to the speaking lapt op scenario migl1t enable other- similar usage
`models wher·e exjsting auruo input and output could be t1sed to supple-
`ment that of a mobile telephone. For example , the audio portion of a
`call could also be routed to a car's audio system in a vehicle with Blue-
`toot·h wirele ss communications.
`
`The Automatic Synchronizer
`is an example of using proximity netwo1·k-
`The automatic synchronizer
`ing to add value by making an existing task easier to do. Personal po1·ta-
`ble devices em pow er people
`to have quick and easy access
`to
`inf 01·mation they can use in tl1eir-daily lives. For that infor111ation to be
`most useful it need s to be kep t up to date, but this personal inf or 1r1ation
`ma11agement data might be dist1·ibuted across the many devices that a
`per son could use. For· examp le, new calenda1· entries or to-do list items
`migl1t be entered on any of a notebook computer, personal digital assis-
`tant 01-smart phone; or these ent1ies might be entered on a desktop
`computer and stored on a server· in a network. Synchroruzation
`is the
`proces s of merging
`the data from two differ·ent sou1·ces based upon
`some set of rules such that the resulting data sets are identical ( 01· at least
`reflect identical information ). A comn1on example
`is synchronizing a
`per·sonal digital assistant with a desktop or notebook computer·. Today
`tlus often is performed using special serial cables and software that may
`be unique to the device . Standard protocols and object for·111ats in the
`specification allow data on one device to be synch1·onized with data on
`any other· device , whether· they be PDAs, notebook computers, smart
`phones or even networ·ked data accessed th1·ough a data access point.
`The ''automatic '' part of this usage model is enabled by proximity
`networking. Today syncl11·onization is almost always a conscious effort-
`it involves connecting a ser·ial cable and pushing a button , 01· pointing
`two inf1·ared-capable devices at each othe1· and launching an applica -
`tion. With Bluetooth wireless co1nmunications
`it is possible for· two
`devices to automatically synch1·onize whenever they come within 1·a11ge
`of each other. For example, a personal digital assistant carried in a per-
`son's pocket could automatically synchr·onize witl1 tl1at per·son's desktop
`
`IPR2020-00202
`Apple Inc. EX1057 Page 63
`
`

`

`42
`
`Chapter 3 r, BLUETOOTH USAGE MODELS
`
`computer "''henever she \valked into her office. Clea1·ly it should be pos-
`sible to configure the devices as to whe11 and I1ow to automatica lly sy11-
`ch1·onize, and to ensure that devices synchr·onize on ly with otJ1er kno'vvn
`devices and data sources and not with just an)' randon1 device ; the spec-
`ification does offer mechanisn1s tl1at could be used to do tl1is. Figure 3.8
`shows examples of the automatic synchronizer ·. Th e figur e illustrate s
`how different device s in a pe1·sonal area netwo1·k (such as the mobil e
`telephone and PDA shown ) might automaticall y synchroni ze. Th e fig-
`ure also shows how one of those devices (he1·e, tl1e PDA in the bri ef-
`case) might aJso synch1·onize ,,vith a desktop computer when those
`devices come within rang·e of eacl1 other (in tl1is case, when the PD A s
`owner walks u1to her office).
`
`I
`
`•
`
`• • • • •••
`
`••• •••
`•• ••
`i
`•• •• •• ....
`•• . ........... u
`
`Figure 3.8
`The Bluetooth automatic synchronizer usage model.
`
`\
`
`·~
`
`•
`
`• -
`
`I
`
`\_ ,
`
`.-
`
`,
`
`--
`
`• E J
`
`In addition to the convenience afforded by automatic synchroniza -
`tion, Bluetooth wireless communication
`removes
`the requirem ent for
`cables. By specifying a standard protocol and object formats for syn-
`chronization
`(these are adopted from IrDA, as detailed
`in Chapters 9
`and 14), Bluetooth wireless communication makes it easier for any
`device to synchronize with any other device. This multidevice synchro-
`nization enables a person to use any convenient device to enter new
`appointments,
`to-do list items or other data .
`
`J
`
`•
`
`•
`
`a a •
`
`IPR2020-00202
`Apple Inc. EX1057 Page 64
`
`

`

`The Instant Postcard
`
`4 3
`
`The Instant Postcard
`The insta11t postcard is another usage model that was discussed early in
`tl1e development of the specification but is not formally part of the ver-
`sio11 1.0 profiles. This is 011e of tl1e few scenarios that involves a device
`othe1· than a mobile phone or comput ing platform, although
`it is
`expected that over ti1ne many new usage models and profiles will be
`developed for additional device classes. The underlying concept is that
`of having a digital camera which can wirelessly transfer a photo image
`to some other device which could then e-mail the image to a recipient,
`thus creating a digital ''postcard.'' Today many digital cameras use a
`serial cable to transfer photo images to a computer where they can be
`sto.red, catalogued , manipulated and distributed. As with the other ver-
`sion 1.0 usage models, Bluetooth wireless communication removes the
`need for a cable which in tu1·n presents new ways to use a device, as
`pointed out below. Figure 3.9 shows how the instant postcard might be
`realized.
`
`\ ,o
`
`Cellula\
`
`\
`
`\ \
`
`\
`
`Photo Image
`
`The Internet
`
`Figure 3.9
`The instant postcard.
`type pic-
`This scenario is useful not only for sending ''postcard''
`tu.res to friends and relatives but also for commercial applications, such
`as real estate (transferring photos o·f newly listed homes to a central
`
`IPR2020-00202
`Apple Inc. EX1057 Page 65
`
`

`

`44
`
`Chapter 3 & BLUETOOTH USAGE MODELS
`
`database) , law enforcement (transferring pl1otos of suspects or stolen
`vehicles, for example) and insurance (transferring ph otos of automobile
`damage resulting from accidents ). In addition to replacing cab les, Blue-
`tooth technology also could change the way a digital camera is used,
`since photos need not necessarily be transfe1·red to a comput er. Many
`photos might be transferred directly from the camera to a mobile phone
`and then sent as an e-mail attachment without using a computer as an
`inter111ediary. In addition, the transfer of photos from the camera to a
`database or librar y could be accomplished in more of a real -time fash-
`ion, since no cabling is required.
`
`Ad Hoc Networking
`This usage model could be considered to be an extension of the interac -
`tive conference (file transfer ) scena.rio. It is not specifica lly addr essed in
`the version 1.0 specification but it does provide an illustration of usage
`cases that could be enabled in the future. Ad hoc networ ks are network s
`that for 1n spontaneousl) '; Bluetooth
`\i\rireless communication
`is an
`enabling technology for these sorts of applicatio11s. The interactive con-
`ference usage model showed how objects such as electronic business
`cards or files could be exchanged in a conference room setting. When
`ad hoc nehvorks can be fo1111ed among the meeting participants, addi -
`tional applications become possible . Among
`these are collabor ative
`applications such as real-time viewing and group editing of presenta -
`tions and instant messaging among the meeting participants.
`Ad hoc nehvorks consisting of diverse types of devi ces present
`many new and exciting possibilities for usage scenarios. While more
`work is required
`to establish interoperable methods for general net -
`working, 4 Bluetooth wireless communication
`is positioned
`to be an
`enabling technology for ad hoc networking scenarios.
`
`Hidden Computing
`Hidden computing (sometimes called unconscious com·puting ) is on e of
`the most exciting future applications for Bluetooth technology. While
`in the version 1.0 specification, hidden comput -
`not directly addressed
`ing has been discussed at SIG events in the past and is an area ripe for
`4. For example, issues \Vith routing, name serving, address assignment and other topics all need to
`be addressed for effective ad hoc nel\vork.ing. Such issues are also relevant in forming Blue-
`tooth scattemets, ctiscussed in Chapter 6.
`
`IPR2020-00202
`Apple Inc. EX1057 Page 66
`
`

`

`Hidden Computing
`
`45
`
`futu1-e exploration. Tl1e fu11damental elements required for some forms
`of hidden computing al1·eady exist in the curre11t specification, although
`the SIG has not developed profiles that describe how the various hid-
`den computing applications might be accomplished
`in a standard and
`interoperable mann er.
`in which
`i·nvolves a class of applications
`Hidden
`computing
`devic es that a1·e not overtly being used by a person can still perforn1
`tasks on tl1at person 's behalf. We have already seen one example that
`could be considered a hidden computing application:
`the automatic
`synchroni zer·. In that usage model , a PDA ''hidden'' in a pocket or purse
`could synchronize with another device witl1out user inte1·vention. Sev-
`e1·al otl1er examples have been described
`in the context of Bluetooth
`wi1·eless communication. Among these a1·e:
`• A notebook computer
`''hidde11'' in a briefcase in a ''sleeping''
`mode could be configu1·ed to awake periodically, receive new e-
`mail and send information such as new e-mail alerts (and possi-
`bly a short clip of tl1e e-mail content ) to a mobile phone. The
`user might then decide to browse e-mail using the mobile phone
`01· p1·ocess e-mail on the notebook compute1·.
`• A mobile telephone
`''hidden'' in a pocket or purse could be used
`by an appropriately configt1red notebook computer ''hidden'' in a
`briefcase to access a network in the manner described for the
`Internet bridge (dial-up networking ) scenario. Once the computer
`is connected
`to a network in this fashion , network synchroniza-
`tion 01· transmission and 1·eception of e-mail could be initiated, all
`without conscious user interaction with either device.
`In early stages of the development of the specification, such appli-
`cations were called
`''the briefcase
`trick.'' With proximity netwo1·king
`enabled by Bluetooth wireless communication, hidden computing appli -
`cations abound. Other future possibilities might include the t1se of a hid-
`den device that cont1·ols environmental
`settings (such as home climate
`and lighting, music, automobile drive1·'s seat and mirror adjustments and
`so on) based upon the personal preferences of the user, automatic cus-
`tomer discounts applied at points of sale based upon a device tucked
`identification and authenti-
`away in a pocket or suitcase, and automated
`cation when a pe1·son checks in with an airline 01· a hotel.
`These sorts of scena1·ios are almost limitless. While hidden com-
`puting applications may not be fully realized for some time, the Blue-
`tooth
`technology does offer a basis upon which indust1·y innovators
`could build them.
`
`IPR2020-00202
`Apple Inc. EX1057 Page 67
`
`

`

`I
`
`• I
`
`... ,. ...
`
`'
`
`I PR2020-00202
`
`Apple Inc. EX1057 Page 68
`
`IPR2020-00202
`Apple Inc. EX1057 Page 68
`
`

`

`Intro __ uction
`t e
`to
`Bluetooth
`Speci
`
`..... ication
`
`A 11y good technical specification should answer several questions of
`''what ?'' for its readers. Some topics that a specification ought to add1·ess
`are:
`
`• what is the product or tecl1nology?
`• what is it designed to do?
`• what is it composed of?
`• what standa1·ds a11d metrics must an implementer· meet?
`Question s of ''how ?'' typically are not addressed in a specification
`but rather are left to the judg1nent and ingenuity of tl1e implementers. A
`specification usually does not add1·ess exactly how an instance of the
`technology or pr·oduct is constructed using· hardware or software mod -
`ules or describe the p1·ecise metl1ods used to ensu1·e that standards and
`requirements ar·e met.
`The Bluetooth specification
`is no different f1·om others in this
`1·espect. Even in its g1·eat magnitude ( over 1,500 total pages in version
`I.OB) the specification still focuses p1·ima1·ily on what an implementer
`needs to know to create products that use Bluetooth technology. One
`reason fo1· the enormity of the specification is the breadth of the topics
`that it covers. The specification is not one that addresses only a radio or
`just a single layer of a software stack or a solitary interface; rather it
`addresses a combination of hardware and software that includes all of
`these facets and more, with broad applications and a diver·se audience.
`The SIG deemed
`this approach necessary, given the many new con-
`cepts introduced with Bluetooth technology. However, the SIG adopted
`
`47
`
`IPR2020-00202
`Apple Inc. EX1057 Page 69
`
`

`

`48
`
`Chapter 4
`
`INTRODUCTION TO THE 8LUETOOTH SPECIFICATION
`
`existing protocols ,vhere feasible; large portions of the specification deal
`,,,ith adapting these protocols to Bluetootl1 environm ents.
`The SIG involved dozens, if not hundr eds of people who spent
`over a year developing the fi1·st version of the specification. Rather than
`publish a first edition that was informational only, the SIG chose to
`ensure that the version 1.0 specification was sufficiently correct and
`con1plete to enab le in1plementation s to begin. While the initial pt1blica-
`tion ,vas unsurprisingl y imperfect (nun1e1·ous er1·ata l1a·ve been pub -
`lished) and arguabl y can never be
`truly complet e
`(since ne\.\'
`applications of the technolo gy v,,ill continue to evolve), this approac h to
`producing a comprehensive
`first version of the specification was appre -
`ciated by many Bluetooth adopter companies.
`This chapter exp lains the purp ose, scope and structur e of the pec-
`ification and the relation ships amon g its constituent par ts. Because the
`specification is so broad and voluminou s it seem s unlikel y tl1at all read-
`ers will read it from cover to cover ,vith equal interest in all of its
`diverse parts. Since the main bod y (Parts 2 and 3) of this bo ok deal s
`\.\rith the specification, its structure logically mirror s the specification s
`structure to a great extent. By explaining hovv the specification is orga-
`nized , this chapter is designed to direct reader s to,,vard the chapt ers of
`this book, and hence to,vard the chapter s of the specification that are
`likely to be of most interest and relevanc e based up on the tasks they
`wish to accomplish or the knowledg e they hop e to gain.
`
`Purpose of the Specification
`Like most
`technical specifications, the Bluetooth specification is a
`response
`to marketing requirements. As previou sly noted, the SIG 's
`Marketing working group originally generated a marketing requirements
`document (MRD ), which is internal to the SIG and include s objectives
`and usage models which were the genesis of the specification. A co1·e
`purpose of the specification is to define components that can be used to
`develop solutions that address these marketing requirement s.
`Among the objectives set forth in the MRD were those that now
`are key attributes of Bluetooth wireless commun ication s: an open speci -
`fication, unlicensed global use, low cost and interoperable
`solutions
`regardless of device manufacturer. In fact, each of the fundamental
`characteristics of the technology in the list in Chapter 1 has some basis
`in the marketing
`requirements document. In many cases, portions of
`the specification can be traced back to an MRD objective . For example,
`
`IPR2020-00202
`Apple Inc. EX1057 Page 70
`
`

`

`Scope
`
`Scope
`
`49
`
`tl1e objective of an open specification is realized with its public avail-
`ability and royalty -free license ; unlicensed global communications are
`achiev ed through the use of the 2.4 GHz spectrum; many of the radio's
`paramete1·s ( described in more detail in Chapter 6) are a result of design
`tradeoffs to specify a robu st radio while meeting the objective of low
`cost; and tl1e objectiv e of interoperability is directly addressed in the
`more than 400 pages of profiles ( volume 2 of the specification).
`Man y of the usage models and technical characteristics reviewed
`in Chapter 3 also wer·e 1·ecorded first as marketing requirements. Most
`of these scenario s are described in the MRD and many of these survive
`largely unch anged
`today , although
`they have been
`refined and
`expanded. Initial outlines for the interactive conference (file transfer ),
`synch1·onization, Internet brid ge, three-i11-one phone , ultimate headset
`and others all are included within the original MRD , although some of
`these scenarios originall y were known by different names.
`
`Th e SIG intention ally began the specification development by focusing
`first on cable replacement usage model s and a basic protocol frame-
`work to support them . Thi s philo soph y resulted in the specification ver-
`sion 1.0, which defines a protocol stack that enables many important
`p1·ofiles, but the SIG has not stopped there. There is interest in many
`new application s and profile s; these will continue to be developed by
`the SIG and are likely to be publi shed in future editions of the specifica-
`tion. Part 4 explore s these possibilities further. By sta1·ting with the sim-
`plest and most fundamental usage models, the SIG was able to bound
`the version 1.0 specificatiop scope .
`The specification does not simp ly describe some existing imple -
`mentation. Great care was taken during its development
`to ensure that
`anyone who has or can obtain sufficient skills and resoUI·ces should be
`able to implement
`the specification. Recall that the specification was
`developed by a multicompany special interest group with a sha1·ed and
`stated objective to produce a truly open specification. The elements of
`the specification were developed to meet the objectives for the technol-
`ogy in a practical manner, not to match preconceived
`ideas nor a single
`company's viewpoint, experience or implementations.
`In fact, for most
`portions of the specification quite the opposite was true: the process was
`to draw upon the collective wisdom and experience of the company
`representatives
`to produce an initial version of some part of the specifi-
`
`IPR2020-00202
`Apple Inc. EX1057 Page 71
`
`

`

`50
`
`Chapter 4 •
`
`INTRODUCTION TO THE BLUETOOTH SPECIFICATION
`
`cation. Hypoth eses in the draft specification could then be tested at one
`or n1ore companies via prototyping or some other means, with the
`results then fed back into the refinement proce ss.
`The man y independent
`implementations of Bluetoot h hardware
`and software by multitudes of vendors, man y of whon1 were not part of
`the SI G's promoter group seem to indicate that the SIG ha s performed
`v.rell in producing a sufficiently comp lete specificatio n. It is encouragin g
`that man y products with Bluetooth wireless communi cat ion are being
`produced on the basis of the vers ion 1.0 specification.
`In any work this large, of course, some errors and op portunit ies for
`misinterpre tation are likely to arise. Th e Bluetoot h pe cification
`is no
`exception. Follo\.\ring publication of the version 1.0 (or mor e prope rly
`l.OA) specification, numerou s comments from adopter
`and others "''ere
`received. Many of these comments dealt with porti on of the specifica -
`tion that were unclear or for which multiple interpr etatio n cou ld rea-
`sonably be construed.
`In addition minor errors that had slipped
`through even the diligent revie\v of the SIG memb ers vvere discove red .
`For each of these item s-and
`there were dozens if not hundreds - the
`responsible working group within the SIG considered
`the co mm ent
`and , if accepted , prepared an erratum document and correcte d the
`error or clarified the wording in a corre spondin g chan ge to the specifi-
`cation. The result was the publication in Decem ber 1999 of the spec ifi-
`cation version l.OB, which is what most people mean when they ref er to
`version 1.0 of the specification (and inde ed this is what is mean t by such
`this book ). Of course even as new ver sions of the
`references throughout
`specification are generated, document main tenance mu st continue and
`the SIG still deals with errata to the initial specification while deve lop -
`ing new material for new versions.
`
`The Specification·s Structure
`At the highest level the specification is split into two volumes: volume 1
`is the core specification, which deals primarily with the proto col stac k
`but also includ~s descriptions of related items such as testing and co m -
`pliance; volume 2 is the profile specification. In this book these two vol-
`umes are examined
`in Parts 2 and 3, respectively.
`For version 1.0, the core specification is by far the larger of the two
`volumes, weighing in at nearly 1,100 total pages. Volume 2, the profiles,
`is about 440 pages in version 1.0. The set of profiles is expected
`to grow
`more rapidly
`though, as new usage cases are formalized. A major por-
`
`IPR2020-00202
`Apple Inc. EX1057 Page 72
`
`

`

`The Specification's Structure
`
`51
`
`tion of the SI G's work following release of the version 1.0 specification
`is focused on creating new profiles. So as Bluetooth wireless technology
`becomes more widely used in new industries with new applications, the
`continued creation of additional profiles is expected.
`Volume One Structure
`Within volume 1 the protocols are pre sented largely in a bottom-to-top
`organization. Th e specification begin s with a short discussion of the
`radio followed by the baseband , link manager and L2CAP layers. Next
`are the higher layers: RFCOMM, SDP, TCS and IrDA interoperability
`protocols. The Host Controller Interface (HCI ) is an interface to the
`baseband controller and link manager , but in the specification the HCI
`is discussed afte1· all of the higher -level protocol sections (the HCI is a
`command
`interface rather than a p1·otocol per se and its use may differ
`dependin g upon an implementation's design; thus it is discussed sepa-
`rately in the specification ). Additional chapters that do not deal specifi-
`cally with p1·otocols include WAP interoperability,
`test mode,
`test
`control a11d compliance discussions. Finally the miscellaneous material
`is included in the appendices, although much of this material is impor -
`tant for many implementers and should not be overlooked . Among the
`topics covered in the appendices of volume 1 of the specification are
`in Chapter 10 of this book ) and Bluetooth
`audio
`(also discussed
`assigned numbers.
`Appendix VIII of volume 1 of the specification, Bluetooth
`Assigned Numbers, is a central area in which values defined by the SIG
`are recorded. This important part of the specification is not detailed
`elsewhere
`in this book, so we briefly discuss it here. The Bluetooth
`Assigned Numbers section of the specification defines values that are
`expected
`to change or evolve over time and must be relied upon and
`therefore 1·egistered. Included are the particular values assigned to key
`fields or structures that must be well known in several protocols. Exam-
`ples include
`inquiry access codes and bit definitions for fields that
`describe device and service classes, used when establishing connec-
`tions; channel and protocol values used in L2CAP; and several specific
`values defined for use with SD P. In this latter case these values repre-
`sent particular services and attributes associated with those services that
`are required to accomplish the usage models ( as described in the pro-
`files) for version . 1.0. This list is expected
`to grow over time as new
`usage models are adopted. Because it is difficult to predict what new ser-
`vices will be available, it is difficult to pre-assign values for all services;
`
`IPR2020-00202
`Apple Inc. EX1057 Page 73
`
`

`

`52
`
`Chapter 4
`
`INTRODUCTION TO THE BLLJETOOTH SPECIFICATION
`
`thus the values are isolated i11 the assigi1ed nun1bers regist1-y so that t'he
`protocol specification itself need not be modified wl1en instan ces of new
`services are developed.
`Volume Two Structure
`The organization of the p1·ofiles in volume 2 of the specification is quit e
`straightfo1,vard . Each chapter
`is a single profile. Fo1· the most part,
`togeth er, althot1gh the seria l porl pr ofile
`related profiles ru:e grouped
`seems to be oddly inserted in the middl e of the teleph ony-ba sed pro -
`files. As in volume 1, the profile specification begins st1-aightaway ,,vith-
`out any introductory or background material to set tl1e stage. In Parl 3
`of this book ,.ve pro\ 1ide some context for the pro-file specification.
`Part 3 of this book mo stly follows the structw-e of volum e 2 of lhe
`specification , gi·ouping
`togethe1- tl1e GAP and SDAP profile s
`tele-
`phony-related
`profiles , serial port -related profil es and netwo rkin g-
`related profiles. Although
`these profiles are not formall y gTouped this
`\Vay in the specification, this approa ch is intended to aid und ers tand ing
`and is discussed further in Chapter 11.
`
`Relationships
`that there is som e couplin g
`it may not be evident
`initially
`While
`between
`the two volumes of the specification , ther e is in fact a corr e-
`spondence between many layers of the proto col stack and one or m ore
`profiles. Because the profiles are intended
`to infor1n the reader about
`how to apply the protocols defined in volum e 1 to realiz e an interopera -
`ble implementation
`of a particular usage case, the se profil es tend to
`map to protocol layers in some fashion , although it is not always a one -
`to-one mapping. Each profile describes the associated protocol
`stac k
`that it requires, as well as ho"v to use and configure the appropriat e pro-
`tocol layers. Many profiles are somewhat attuned to certain protocol s.
`For example,
`the generic access profile primarily defines how to use the
`baseband,
`link manager and L2CAP layers of the protocol stack . The
`service discovery application profile is tightly coup led with the SDP
`layer o·f the stack; the telephony-based profiles (intercom , headset 1 and
`cordless
`telephony) principally relate to the TCS protocol and audio
`traffic. The serial port -based profiles 2 (including object and file tran sfer
`and the serial port profile itself) and networking-based profiles (LAN
`1. The headset profile does not directly use TCS; see the discussion in Chapter 13.
`
`IPR2020-00202
`Apple Inc. EX1057 Page 74
`
`

`

`Guide to Understanding the Specification
`
`53
`
`the
`access, fax and dial-up networking ) l1ave some affinity with
`RFCOMM
`layer of the stack, with the serial port-based profiles also
`being tightly cot1pled to the IrDA interoperability protocol s.
`So while the1-e is not a direct mapping of the chapte1·s of volume 1
`of the specification to those of volume 2, the subject matter of corre-
`sponding parts of tl1ese two volumes does include 1·elated material.
`Th erefo1-e it is usually insufficient to read 01- write about just one portion
`of the specification in isolation. Thi s is why this book covers both vol-
`ume s of the specification in its main body; this is also why this book
`strives to explain the motivation for and relationships among the vari-
`ot1s part s of the specification. The following section suggests some
`method s tl1at might aid in understanding
`those portion s of the s.pecifica-
`tion that are of most inter-est; if using this book as a guide to the specifi-
`cation , these same method s may be used to determine the focus areas
`herein, since the structure of Parts 2 and 3 of the book largely mirr·ors
`that of version 1.0 of the specification.
`
`Guide to Understanding the Specification
`Th e specification version 1.0 does not include any introductory
`infor-
`mation about its purp ose, scope, structure or component relationships
`(aside from a table of contents ). Its readers will find a title page , some
`notic es and a mast er table of contents abruptly followed by the radio
`specification and remaining chapters. Readers will find no preface, no
`foreword and no organized background inforn1ation. This is not neces-
`sarily a bad thing; 3 it p1;marily results from the specification's technical
`nature and direct approach
`to its subject matter. This chapter
`is
`intended to suppl y some of the inforn1ation that is not ·found (or at least
`not explicitly called out) in the specification, thus making the specifica-
`tion more accessible and better p1·eparing its 1-eaders to get the most
`from it.
`While the most straightforward way to read the specification is to
`start with page I of volume I and continue reading all the way to the
`last page of volume 2, and while it is not our intent to discourage this
`method of reading, this may be impractical in many cases. We expect
`that ·many reade1-s would have difficulty absorbing
`the tremendous
`detail contained in the mo1-e than 1,500 pages of the complete version
`2. We group the serial port profiles as listed here ; Chapter 11 furtl1er describes profile family
`group ing.
`•
`3. After all, it helps to create a market for books such as this 011e.
`
`IPR2020-00202
`Apple Inc. EX1057 Page 75
`
`

`

`54
`
`Chapter 4
`
`INTRODUCTION TO THE BLUE TOOTH SPECIFICATION
`
`1.0 specification . Furthermore, many people p1·obabl y do not ne ed to
`learn all of the details of every protocol and profile, and eve 11 those who
`do may find it helpful to digest these details in logical grouping s, one at
`a time. The specification is quite broad , covering eve1·ythin g from low-
`level radio details to application software considerations. Th e projected
`Bluetooth marketplace is expected to be just as broad offering oppo rtu-
`nities for man y specialized products and skills as well as for gene1·al-pur -
`pose ones. Thus , dependin g upon interest, it may be benef1cial to
`develop an individualized plan for delving into the specification (and
`into the main body of this book). The suggestions offered here are
`intended to aid in doing just that.
`As partial rem edy to the lack of introductory material in the speci -
`fication, the SIG has published several white papers in addi tion to the
`specification. One of those white paper s, Bluetooth Protocol Architecture
`[Mettala99], is a useful overview of the content s of the specification and
`we recommend
`it as supplemental reading. This pap er cove rs som e of
`the same topics as Chapters 5 and 11 of this book and ma y serve as a
`good companion to that material .
`Once introductory material (such as Part 1 and Chapter s 5 and 11
`of this book along with the cited white paper) is und erstoo d, man y rea d-
`ers may wish to branch out to particular sections of the specificatio n
`depending upon their interests and objectives. It is unr ealistic to devise
`a reading plan to fit every audience 's need, but this sectio.n suggests
`some general guidelines. It is hoped that most read ers will be able to
`use one or more of these general classifications to achie ve an und er-
`standing of Bluetooth wireless technology that is appropriat e for th eir
`own situation.
`For General Knowledge
`Many readers, perhaps
`including students, teachers, consu ltan ts and
`others who have general interest in the Bluetooth technology and who
`wish to understand
`that technology in the context of their prof ession ,
`may wish to read this book and the specification to gain general knowl -
`edge. Such readers may not need to read the specification from cover to
`cover since they do not need to learn every detail of the specification
`that might be required by someone implementing the specification.
`Our suggested reading plan for general knowledge is to study the
`profiles after a general overview of the protocol stack as outlined below .
`
`•
`
`IPR2020-00202
`Apple Inc. EX1057 Page 76
`
`

`

`Guide to Understanding the Specification
`
`5 5
`
`1. Read Part 1 and Chapter 5 of this book and tl1e SIG protocol archi-
`tecture white pape1· (cited above). This material helps to put the
`protocol stack in context.
`2. Review or skim volume 1 of the specification using Chapters 6
`through 10 of this book as an explanatory guide to the correspond-
`ing specification sections.
`3. After reading Chapter 11 as an introduction
`to the profiles, study
`each pr·ofile in volume 2 of the specification, using Chapters 12
`through 15 as an aid in understanding
`the related profiles.
`From a Device Perspective
`A great deal of the interest in the Bluetooth technology comes from
`those who are concerned primarily with implementing
`that technology
`in devices. Device manufacturers,
`software developers and original
`equipment manufacturers who bt1ild device components need to under -
`stand the

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket