RK-2 Bluetooth Technologies
RK-2 Bluetooth Technologies
BLUETOOTH TECHNOLOGY
CONTENT
Protocols
Profiles
Security
Future of Bluetooth
Summary
7 December, 2014
7 December, 2014
What is Bluetooth?
Bluetooth wireless technology is an open specification for a
low-cost, low-power, short-range radio technology for ad-hoc
wireless communication of voice and data anywhere in the
world.
One of the first modules (Ericsson)
7 December, 2014
A recent module
Ultimate Headset
7 December, 2014
Cordless Computer
7 December, 2014
Worldwide Usability
Other usage models began to develop:
Personal Area Network (PAN)
Ad-hoc networks
Data/voice access points
Wireless telematics
7 December, 2014
Timeline
1994 : Ericsson study complete / vision
1995 : Engineering work begins
7 December, 2014
10
Technical features
Connection Type
Spectrum
Modulation
Transmission Power
1 mw 100 mw
Data Rate
1 Mbps
Range
30 ft
Supported Stations
8 devices
Module size
9 x 9 mm
7 December, 2014
11
Bluetooth FHSS
Employs frequency hopping
spread spectrum
Pseudorandom hopping
1600 hops/sec- time slot is
defined as 625 microseconds
7 December, 2014
12
7 December, 2014
13
Classification
Classification of devices on the basis of Power dissipated &
corresponding maximum Range.
POWER
RANGE
CLASS I
20 dBm
100 m
CLASS II
0-4 dBm
10 m
CLASS III
0 dBm
1m
7 December, 2014
14
Piconet
It is the network formed by a Master and one or more slaves
(max 7)
m
Each piconet is defined by a different hopping channel to
which users synchronize to
s
15
Piconet Structure
Master
Active Slave
Parked Slave
Standby
7 December, 2014
16
7 December, 2014
17
7 December, 2014
18
Baseband
7 December, 2014
19
Baseband
Addressing
Bluetooth device address (BD_ADDR)
48 bit IEEE MAC address
20
Packet Structure
72 bits
Access
Code
54 bits
Header
Voice
No CRC
FEC (optional)
7 December, 2014
0 - 2744 bits
Payload
Data
CRC
ARQ
FEC (optional)
21
Inquiry
Page
Standby
Connected
Transmit data
Park
7 December, 2014
Hold
Sniff
22
Channel Establishment
There are two managed situations
A device knows the parameters of
the other
It follows paging process
No knowledge about the other
Then it follows inquiring &
paging process
Connection
State
Machine
Connection (working)
Seven more sub-states for
attaching slaves & connection
establishment
7 December, 2014
23
Seven sub-states
Inquiry
Inquiry scan
Inquiry response
Page
Page scan
Master response
Slave response
7 December, 2014
24
7 December, 2014
25
Channel Control
All the work related to the channel control is managed by the master
The master uses polling process for this
The master is the first device which starts the connection
This roles can change (master-slave role switch)
7 December, 2014
26
L2CAP
Service provided to the higher layer:
L2CAP provides connection-oriented and connectionless data
services to upper layer protocols
Protocol multiplexing and demultiplexing capabilities
Segmentation & reassembly of large packets
L2CAP permits higher level protocols and applications to transmit
and receive L2CAP data packets up to 64 kilobytes in length.
7 December, 2014
27
Applications
IP
SDP
Data
7 December, 2014
RFCOMM
L2CAP
Link Manager
Baseband
RF
28
TCP/IP
Network Protocols for packet data communication, routing.
RFCOMM
Cable replacement protocol, emulation of serial ports over wireless network.
7 December, 2014
29
IP Over Bluetooth
IP over Bluetooth v 1.0
7 December, 2014
30
IP Over Bluetooth
IP over Bluetooth v 1.1
7 December, 2014
31
Profile provides:
Enhanced client-server interactions:
- browse, create, transfer folders
- browse, pull, push, delete files
7 December, 2014
32
Headset Profile
Profile provides:
Both devices must provide capability to initiate connection &
accept/terminate calls.
Volume can be controlled from either device.
Audio gateway can notify headset of an incoming call.
7 December, 2014
33
PDAs
CD Player
TV/VCR/DVD
Access Points
Telephone Answering
Devices
Cell phones
Cordless Phones
Wireless peripherals:
Headsets
Cameras
Cars
7 December, 2014
34
Other Products
2004 Toyota Prius & Lexus LS 430
hands free calls
7 December, 2014
35
Security
Security Measures
Link Level Encryption & Authentication.
Personal Identification Numbers (PIN) for device access.
Long encryption keys are used (128 bit keys).
These keys are not transmitted over wireless. Other parameters are
transmitted over wireless which in combination with certain
information known to the device, can generate the keys.
Further encryption can be done at the application layer.
7 December, 2014
36
A Comparison
WLAN
7 December, 2014
37
IrD
Point to Multipoint
Point to point
Range 10 m
Range 1 m
7 December, 2014
38
7 December, 2014
39
7 December, 2014
40
Future of Bluetooth
Success of Bluetooth depends on how well it is integrated into
consumer products
Consumers are more interested in applications than the technology
41
Summary
A new global standard for data and voice
Eliminate Cables
Low Power, Low range, Low Cost network devices
Future Improvements
Master-Slave relationship can be adjusted dynamically for optimal
resource allocation and utilization.
Adaptive, closed loop transmit power control can be implemented
to further reduce unnecessary power usage.
7 December, 2014
42
7 December, 2014
43
Thank You
7 December, 2014
44