Sei sulla pagina 1di 38

MILAN.M.

GOR
IT 0618
3rd Sem

PRAGENESH.J.CHAUDHA
RY
IT 0611
3rd Sem

7 June 2008 1
An Introduction to
BLUETOOTH
TECHNOLOGY

Bluetooth-Tech
CONTENT
 Overview of Bluetooth History
 The Bluetooth Specifications
 Typical Bluetooth Scenario
 Protocols
 Profiles
 Security
 Comparison with other
technologies
 Future of Bluetooth
 Summary
7 June 2008 3
Example : The Networked
Home

7 June 2008 4
What is Bluetooth?
 “Bluetooth wireless technology is an
open specification for a low-cost,
low-power, short-range radio
technology for ad-hoc wireless
communication of voice and data
anywhere in the world.”

7 June 2008 5
Ultimate Headset

7 June 2008 6
Cordless Computer

7 June 2008 7
Bluetooth Goals & Vision
 Originally conceived as a cable replacement
technology
 Short-Range Wireless Solutions
 Open Specification
 Voice and Data Capability
 Worldwide Usability
 Other usage models began to develop:
– Personal Area Network (PAN)
– Ad-hoc networks
– Data/voice access points
– Wireless telematics
7 June 2008 8
Overview of Bluetooth
History
 What is Bluetooth?
– Bluetooth is a short-range wireless communications
technology.

 Why this name?


– It was taken from the 10th century Danish King
Harald Blatand who unified Denmark and Norway.

 When does it appear?


– 1994 – Ericsson study on a wireless technology to link
mobile phones & accessories.
– 5 companies joined to form the Bluetooth Special
Interest Group (SIG) in 1998.
– First specification released in July 1999.

7 June 2008 9
Timeline
 1994 : Ericsson study complete / vision
 1995 : Engineering work begins
 1997 : Intel agrees to collaborate
 1998 : Bluetooth SIG formed: Ericsson, Intel, IBM,
Nokia & Toshiba
 1999 : Bluetooth Specification 1.0A
SIG promoter group expanded: 3Com,
Lucent, Microsoft & Motorola
 2000 : Bluetooth Specification 1.0B, 2000+
adopters
 2001 : First retail products released, Specification
1.1
 2003 : Bluetooth Specification 1.2
 2005 : Bluetooth Specification 2.0 (?)
7 June 2008 10
Special Interest Group

7 June 2008 11
Technical features
Spread Spectrum
(Frequency Hopping) &
Connection Type
Time Division Duplex
(1600 hops/sec)
2.4 GHz ISM Open Band
Spectrum (79 MHz of spectrum = 79
channels)
Gaussian Frequency Shift
Modulation
Keying
Transmission Power 1 mw – 100 mw
Data Rate 1 Mbps
Range 30 ft
7 June 2008 12
Bluetooth FHSS
 Employs frequency
hopping spread
spectrum
 Reduce interference
with other devices
 Pseudorandom
hopping
 1600 hops/sec- time
slot is defined as 625
microseconds
 Packet 1-5 time slots
7 June 2008 13
long
Time-Division Duplex
Scheme
 Channel is divided into consecutive slots (each 625 µs)
 One packet can be transmitted per slot
 Subsequent slots are alternatively used for transmitting
and receiving
– Strict alternation of slots between the master and the
slaves
– Master can send packets to a slave only in EVEN slots
– Slave can send packets to the master only in the ODD
slots

7 June 2008 14
Classification
 Classification
of devices on the basis of
Power dissipated & corresponding
maximum Range.

POWER RANGE
20
CLASS I 100 m
dBm
CLASS 0-4
10 m
II dBm
CLASS
0 dBm 1 m
III
7 June 2008 15
Typical Bluetooth Scenario
 Bluetooth will support wireless point-to-
point and point-to-multipoint (broadcast)
between devices in a piconet.
 Point to Point Link m s
– Master - slave relationship
– Bluetooth devices can function as masters
or slaves
 Piconet
– It is the network formed by a Master and
m
one or more slaves (max 7)
– Each piconet is defined by a different
hopping channel to which users
synchronize to s s s
– Each piconet has max capacity (1 Mbps)
7 June 2008 16
Piconet Structure
Master

Active Slave

Parked Slave

Standby

• All devices in piconet hop together.


• Master’s ID and master’s clock determines frequency hopping
sequence & phase.

7 June 2008 17
Ad-hoc Network – the
Scatternet
 Inter-piconet
communication
 Up to 10 piconets in
a scatternet
 Multiple piconets can
operate within same
physical space
 This is an ad-hoc,
peer to peer (P2P)
network
7 June 2008 18
Bluetooth Protocol Stack

7 June 2008 19
Baseband

7 June 2008 20
Baseband
 Addressing
– Bluetooth device address (BD_ADDR)
– 48 bit IEEE MAC address
– Active Member address (AM_ADDR)
– 3 bits active slave address
– all zero broadcast address
– Parked Member address (PM_ADDR)
– 8 bit parked slave address

 This MAC address is split into three parts


– The Non-significant Address Part (NAP)
– Used for encryption seed
– The Upper Address part (UAP)
– Used for error correction seed initialization & FH sequence
generation
– The Lower Address Part (LAP)
– Used for FH sequence generation
7 June 2008 21
Packet Structure
72 bits 54 bits 0 - 2744 bits

Access Header Payload


Code

Voice header Data CRC

No CRC ARQ
FEC (optional) FEC (optional)

7 June 2008 22
Connection State Machine

Inquiry Page

Standby Connected

Transmit data

Park Hold Sniff


7 June 2008 23
Channel Establishment
 There are two managed
situations
– A device knows the
parameters of the other
 It follows paging process
– No knowledge about the
other
 Then it follows inquiring &
paging process Connection
State
 Two main states and sub- Machine
states
– Standby (no interaction)
– Connection (working)
– Seven more sub-states for
attaching slaves &
connection
7 June 2008 establishment 24
Channel Establishment
(contd.)

 Seven sub-
states
– Inquiry
– Inquiry
scan
– Inquiry
response
– Page
7 June 2008
– Page scan 25
Link Manager Protocol

7 June 2008 26
Link Manager Protocol
 The Link Manager carries out link setup,
authentication & link configuration.
 Channel Control
– All the work related to the channel control is
managed by the master
 The master uses polling process for this

– The master is the first device which starts


the connection
 This roles can change (master-slave role switch)

7 June 2008 27
IP Over Bluetooth
 IP over Bluetooth v
1.1

7 June 2008 28
File Transfer Profile

• Profile provides:
• Enhanced client-server interactions:
- browse, create, transfer folders
- browse, pull, push, delete files

7 June 2008 29
Headset Profile

• Profile provides:
• Both devices must provide capability to initiate connection &
accept/terminate calls.
• Volume can be controlled from either device.
• Audio gateway can notify headset of an incoming call.

7 June 2008 30
Core Bluetooth Products
• Notebook PCs & • CD Player
Desktop • TV/VCR/DVD
computers • Access Points
• Printers
• PDAs
• Telephone
• Other handheld
Answering
devices
Devices
• Cell phones • Cordless
• Wireless Phones
peripherals: • Cars
• Headsets
• Cameras
7 June 2008 31
Other Products…
 2004 Toyota Prius &
Lexus LS 430
– hands free calls
 DigitalPulse Oximetry
System
 Toshiba Washer &
Dryer
 Nokia N-gage

7 June 2008 32
Security
 Security Measures
– Link Level Encryption & Authentication.
– Personal Identification Numbers (PIN) for device
access.
– Long encryption keys are used (128 bit keys).
– These keys are not transmitted over wireless.
Other parameters are transmitted over wireless
which in combination with certain information
known to the device, can generate the keys.
– Further encryption can be done at the
application layer.

7 June 2008 33
A Comparison

WLAN

7 June 2008 34
Bluetooth vs. IrD
 Bluetooth •IrD
– Point to Multipoint —Point to point

– Data & Voice —Intended for Data


Communication
– Easier
—Infrared, LOS communication
Synchronization
—Can not penetrate solid objects
due to omni-
—Both devices must be stationary,
directional and no
for synchronization
LOS requirement
—Range 1 m
– Devices can be
mobile
– Range 10 m
7 June 2008 35
Bluetooth: Today &
Tomorrow

7 June 2008 36
Future of Bluetooth
 Success of Bluetooth depends on how well it is
integrated into consumer products
– Consumers are more interested in applications than the
technology
– Bluetooth must be successfully integrated into consumer
products
– Must provide benefits for consumer
– Must not destroy current product benefits
 Key Success Factors
– Interoperability
– Mass Production at Low Cost
– Ease of Use
– End User Experience

7 June 2008 37
Summary
 A new global standard for data and voice
 Eliminate Cables
 Low Power, Low range, Low Cost network
devices
 Future Improvements
– Master-Slave relationship can be adjusted
dynamically for optimal resource allocation and
utilization.
– Adaptive, closed loop transmit power control can
be implemented to further reduce unnecessary
power usage.
7 June 2008 38

Potrebbero piacerti anche