0% found this document useful (0 votes)
87 views44 pages

RK-2 Bluetooth Technologies

Bluetooth is a wireless technology standard for exchanging data over short distances. It was initially developed as a cable replacement but has expanded to enable personal area networks between devices. Key aspects of Bluetooth include short-range communication using radio waves, support for up to 8 devices in a piconet network, and use of frequency hopping spread spectrum to reduce interference. Profiles define how devices interact at the application layer to enable functionality like file transfers, audio streaming, and more. Security measures include encryption and authentication to protect data transmission.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
87 views44 pages

RK-2 Bluetooth Technologies

Bluetooth is a wireless technology standard for exchanging data over short distances. It was initially developed as a cable replacement but has expanded to enable personal area networks between devices. Key aspects of Bluetooth include short-range communication using radio waves, support for up to 8 devices in a piconet network, and use of frequency hopping spread spectrum to reduce interference. Profiles define how devices interact at the application layer to enable functionality like file transfers, audio streaming, and more. Security measures include encryption and authentication to protect data transmission.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 44

An Introduction to

BLUETOOTH TECHNOLOGY

CONTENT

Overview of Bluetooth History

The Bluetooth Specifications

Typical Bluetooth Scenario

Protocols

Profiles

Security

Comparison with other technologies

Future of Bluetooth

Summary

7 December, 2014

Example : The Networked Home

7 December, 2014

What is Bluetooth?
Bluetooth wireless technology is an open specification for a
low-cost, low-power, short-range radio technology for ad-hoc
wireless communication of voice and data anywhere in the
world.
One of the first modules (Ericsson)

7 December, 2014

A recent module

Ultimate Headset

7 December, 2014

Cordless Computer

7 December, 2014

Bluetooth Goals & Vision


Originally conceived as a cable replacement technology
Short-Range Wireless Solutions
Open Specification
Voice and Data Capability

Worldwide Usability
Other usage models began to develop:
Personal Area Network (PAN)

Ad-hoc networks
Data/voice access points
Wireless telematics
7 December, 2014

Overview of Bluetooth History


What is Bluetooth?
Bluetooth is a short-range wireless communications technology.

Why this name?


It was taken from the 10th century Danish King Harald Blatand who
unified Denmark and Norway.

When does it appear?


1994 Ericsson study on a wireless technology to link mobile phones &
accessories.

5 companies joined to form the Bluetooth Special Interest Group (SIG)


in 1998.
First specification released in July 1999.
7 December, 2014

Timeline
1994 : Ericsson study complete / vision
1995 : Engineering work begins

1997 : Intel agrees to collaborate


1998 : Bluetooth SIG formed: Ericsson, Intel, IBM, Nokia & Toshiba
1999 : Bluetooth Specification 1.0A
SIG promoter group expanded: 3Com, Lucent, Microsoft &
Motorola

2000 : Bluetooth Specification 1.0B, 2000+ adopters


2001 : First retail products released, Specification 1.1
2003 : Bluetooth Specification 1.2
2005 : Bluetooth Specification 2.0 (?)
7 December, 2014

Special Interest Group

7 December, 2014

10

Technical features
Connection Type

Spread Spectrum (Frequency Hopping)


& Time Division Duplex (1600 hops/sec)

Spectrum

2.4 GHz ISM Open Band (79 MHz of


spectrum = 79 channels)

Modulation

Gaussian Frequency Shift Keying

Transmission Power

1 mw 100 mw

Data Rate

1 Mbps

Range

30 ft

Supported Stations

8 devices

Data Security Authentication Key

128 bit key

Data Security Encryption Key

8-128 bits (configurable)

Module size

9 x 9 mm

7 December, 2014

11

Bluetooth FHSS
Employs frequency hopping
spread spectrum

Reduce interference with


other devices

Pseudorandom hopping
1600 hops/sec- time slot is
defined as 625 microseconds

Packet 1-5 time slots long

7 December, 2014

12

Time-Division Duplex Scheme


Channel is divided into consecutive slots (each 625 s)
One packet can be transmitted per slot
Subsequent slots are alternatively used for transmitting and receiving
Strict alternation of slots between the master and the slaves
Master can send packets to a slave only in EVEN slots
Slave can send packets to the master only in the ODD slots

7 December, 2014

13

Classification
Classification of devices on the basis of Power dissipated &
corresponding maximum Range.

POWER

RANGE

CLASS I

20 dBm

100 m

CLASS II

0-4 dBm

10 m

CLASS III

0 dBm

1m

7 December, 2014

14

Typical Bluetooth Scenario


Bluetooth will support wireless point-to-point and
point-to-multipoint (broadcast) between devices in a
piconet.

Point to Point Link


Master - slave relationship

Bluetooth devices can function as masters or slaves

Piconet
It is the network formed by a Master and one or more slaves
(max 7)
m
Each piconet is defined by a different hopping channel to
which users synchronize to

Each piconet has max capacity (1 Mbps)


7 December, 2014

s
15

Piconet Structure
Master
Active Slave

Parked Slave
Standby

All devices in piconet hop together.


Masters ID and masters clock determines frequency hopping
sequence & phase.

7 December, 2014

16

Ad-hoc Network the Scatternet


Inter-piconet communication
Up to 10 piconets in a
scatternet

Multiple piconets can operate


within same physical space

This is an ad-hoc, peer to


peer (P2P) network

7 December, 2014

17

Bluetooth Protocol Stack

7 December, 2014

18

Baseband

7 December, 2014

19

Baseband
Addressing
Bluetooth device address (BD_ADDR)
48 bit IEEE MAC address

Active Member address (AM_ADDR)


3 bits active slave address
all zero broadcast address

Parked Member address (PM_ADDR)


8 bit parked slave address

This MAC address is split into three parts


The Non-significant Address Part (NAP)
Used for encryption seed
The Upper Address part (UAP)
Used for error correction seed initialization & FH sequence generation
The Lower Address Part (LAP)
Used for FH sequence generation
7 December, 2014

20

Packet Structure
72 bits

Access
Code

54 bits

Header

Voice

No CRC
FEC (optional)

7 December, 2014

0 - 2744 bits

Payload

Data

CRC

ARQ
FEC (optional)

21

Connection State Machine

Inquiry

Page

Standby

Connected
Transmit data

Park
7 December, 2014

Hold

Sniff
22

Channel Establishment
There are two managed situations
A device knows the parameters of
the other
It follows paging process
No knowledge about the other
Then it follows inquiring &
paging process

Two main states and sub-states


Standby (no interaction)

Connection
State
Machine

Connection (working)
Seven more sub-states for
attaching slaves & connection
establishment
7 December, 2014

23

Channel Establishment (contd.)

Seven sub-states
Inquiry
Inquiry scan
Inquiry response
Page
Page scan
Master response

Slave response

7 December, 2014

24

Link Manager Protocol

7 December, 2014

25

Link Manager Protocol


The Link Manager carries out link setup, authentication & link
configuration.

Channel Control
All the work related to the channel control is managed by the master
The master uses polling process for this
The master is the first device which starts the connection
This roles can change (master-slave role switch)

7 December, 2014

26

L2CAP
Service provided to the higher layer:
L2CAP provides connection-oriented and connectionless data
services to upper layer protocols
Protocol multiplexing and demultiplexing capabilities
Segmentation & reassembly of large packets
L2CAP permits higher level protocols and applications to transmit
and receive L2CAP data packets up to 64 kilobytes in length.

7 December, 2014

27

Middleware Protocol Group


Additional transport protocols to
allow existing and new applications to
operate over Bluetooth.
Packet based telephony control
signaling protocol also present.

Applications
IP
SDP

Data

Also includes Service Discovery


Protocol.
Audio
Middleware Protocol Group

7 December, 2014

RFCOMM

L2CAP
Link Manager

Baseband
RF
28

Middleware Protocol Group (contd.)


Service Discovery Protocol (SDP)
Means for applications to discover device info, services and its
characteristics.

TCP/IP
Network Protocols for packet data communication, routing.

RFCOMM
Cable replacement protocol, emulation of serial ports over wireless network.

7 December, 2014

29

IP Over Bluetooth
IP over Bluetooth v 1.0

7 December, 2014

30

IP Over Bluetooth
IP over Bluetooth v 1.1

7 December, 2014

31

File Transfer Profile

Profile provides:
Enhanced client-server interactions:
- browse, create, transfer folders
- browse, pull, push, delete files
7 December, 2014

32

Headset Profile

Profile provides:
Both devices must provide capability to initiate connection &
accept/terminate calls.
Volume can be controlled from either device.
Audio gateway can notify headset of an incoming call.
7 December, 2014

33

Core Bluetooth Products


Notebook PCs & Desktop
computers
Printers

PDAs

CD Player

TV/VCR/DVD
Access Points

Other handheld devices

Telephone Answering
Devices

Cell phones

Cordless Phones

Wireless peripherals:
Headsets
Cameras

Cars

7 December, 2014

34

Other Products
2004 Toyota Prius & Lexus LS 430
hands free calls

Digital Pulse Oximetry System

Toshiba Washer & Dryer


Nokia N-gage

7 December, 2014

35

Security
Security Measures
Link Level Encryption & Authentication.
Personal Identification Numbers (PIN) for device access.
Long encryption keys are used (128 bit keys).
These keys are not transmitted over wireless. Other parameters are
transmitted over wireless which in combination with certain
information known to the device, can generate the keys.
Further encryption can be done at the application layer.

7 December, 2014

36

A Comparison

WLAN

7 December, 2014

37

Bluetooth vs. IrD


Bluetooth

IrD

Point to Multipoint

Point to point

Data & Voice

Intended for Data


Communication

Easier Synchronization due


to omni-directional and no
LOS requirement

Infrared, LOS communication


Can not penetrate solid objects

Devices can be mobile

Both devices must be stationary,


for synchronization

Range 10 m

Range 1 m

7 December, 2014

38

Bluetooth: Today & Tomorrow

7 December, 2014

39

Will Bluetooth become a household name?

7 December, 2014

40

Future of Bluetooth
Success of Bluetooth depends on how well it is integrated into
consumer products
Consumers are more interested in applications than the technology

Bluetooth must be successfully integrated into consumer products


Must provide benefits for consumer
Must not destroy current product benefits

Key Success Factors


Interoperability
Mass Production at Low Cost
Ease of Use
End User Experience
7 December, 2014

41

Summary
A new global standard for data and voice
Eliminate Cables
Low Power, Low range, Low Cost network devices
Future Improvements
Master-Slave relationship can be adjusted dynamically for optimal
resource allocation and utilization.
Adaptive, closed loop transmit power control can be implemented
to further reduce unnecessary power usage.

7 December, 2014

42

Things that think


dont make sense unless they link.

- Nicholas Negroponte, MIT Media Laboratory

7 December, 2014

43

Thank You

7 December, 2014

44

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy