Documente Academic
Documente Profesional
Documente Cultură
BLUETOOTH TECHNOLOGY
BY Vikas Jagtap
CONTENT
• Overview of Bluetooth History
• The Bluetooth Specifications
• Typical Bluetooth Scenario
• Protocols
• Profiles
• Security
• Comparison with other technologies
• Future of Bluetooth
• Summary
11 February 2015 2
Example : The Networked Home
11 February 2015 3
What is Bluetooth?
11 February 2015 4
Ultimate Headset
11 February 2015 5
Cordless Computer
11 February 2015 6
Bluetooth Goals & Vision
11 February 2015 10
Technical features
Spread Spectrum (Frequency Hopping)
Connection Type
& Time Division Duplex (1600 hops/sec)
2.4 GHz ISM Open Band (79 MHz of
Spectrum
spectrum = 79 channels)
Modulation Gaussian Frequency Shift Keying
Transmission Power 1 mw – 100 mw
Data Rate 1 Mbps
Range 30 ft
Supported Stations 8 devices
Data Security –Authentication Key 128 bit key
Data Security –Encryption Key 8-128 bits (configurable)
Module size 9 x 9 mm
11 February 2015 11
Bluetooth FHSS
11 February 2015 12
Time-Division Duplex Scheme
11 February 2015 13
Classification
POWER RANGE
11 February 2015 14
Typical Bluetooth Scenario
• Piconet
— It is the network formed by a Master and one or more slaves
(max 7) m
— Each piconet is defined by a different hopping channel to
which users synchronize to
— Each piconet has max capacity (1 Mbps) s s s
11 February 2015 15
Piconet Structure
Master
Active Slave
Parked Slave
Standby
11 February 2015 16
Ad-hoc Network – the Scatternet
• Inter-piconet communication
• Up to 10 piconets in a
scatternet
• Multiple piconets can operate
within same physical space
• This is an ad-hoc, peer to
peer (P2P) network
11 February 2015 17
Bluetooth Protocol Stack
11 February 2015 18
Baseband
11 February 2015 19
Baseband
• Addressing
— Bluetooth device address (BD_ADDR)
– 48 bit IEEE MAC address
— Active Member address (AM_ADDR)
– 3 bits active slave address
– all zero broadcast address
— Parked Member address (PM_ADDR)
– 8 bit parked slave address
11 February 2015 20
Packet Structure
No CRC ARQ
FEC (optional) FEC (optional)
11 February 2015 21
Connection State Machine
Inquiry Page
Standby Connected
Transmit data
• Seven sub-states
— Inquiry
— Inquiry scan
— Inquiry response
— Page
— Page scan
— Master response
— Slave response
11 February 2015 24
Link Manager Protocol
11 February 2015 25
Link Manager Protocol
• The Link Manager carries out link setup, authentication & link
configuration.
• Channel Control
— All the work related to the channel control is managed by the master
– The master uses polling process for this
— The master is the first device which starts the connection
– This roles can change (master-slave role switch)
11 February 2015 26
L2CAP
11 February 2015 27
Middleware Protocol Group
ol
signaling protocol also present.
ntr
Data
Co
•Also includes Service Discovery
Protocol. L2CAP
Audio
Link Manager
Middleware Protocol Group Baseband
RF
11 February 2015 28
Middleware Protocol Group (contd.)
• TCP/IP
— Network Protocols for packet data communication, routing.
• RFCOMM
— Cable replacement protocol, emulation of serial ports over wireless network.
11 February 2015 29
IP Over Bluetooth
11 February 2015 30
IP Over Bluetooth
11 February 2015 31
File Transfer Profile
• Profile provides:
• Enhanced client-server interactions:
- browse, create, transfer folders
- browse, pull, push, delete files
11 February 2015 32
Headset Profile
• Profile provides:
• Both devices must provide capability to initiate connection &
accept/terminate calls.
• Volume can be controlled from either device.
• Audio gateway can notify headset of an incoming call.
11 February 2015 33
Core Bluetooth Products
11 February 2015 34
Other Products…
11 February 2015 35
Security
• Security Measures
— Link Level Encryption & Authentication.
— Personal Identification Numbers (PIN) for device access.
— Long encryption keys are used (128 bit keys).
— These keys are not transmitted over wireless. Other parameters are
transmitted over wireless which in combination with certain
information known to the device, can generate the keys.
— Further encryption can be done at the application layer.
11 February 2015 36
A Comparison
WLAN
11 February 2015 37
Bluetooth vs. IrD
• Bluetooth •IrD
— Point to Multipoint —Point to point
—Intended for Data
— Data & Voice
Communication
— Easier Synchronization due —Infrared, LOS communication
to omni-directional and no
—Can not penetrate solid objects
LOS requirement
—Both devices must be stationary,
— Devices can be mobile for synchronization
— Range 10 m —Range 1 m
11 February 2015 38
Bluetooth: Today & Tomorrow
11 February 2015 39
Will Bluetooth become a household name?
11 February 2015 40
Future of Bluetooth
11 February 2015 42
“Things that think…
don’t make sense unless they
link.”
- Vikas jagtap
11 February 2015 43