Documente Academic
Documente Profesional
Documente Cultură
BY
AIM
THE AIM OF PRESENTATION IS TO ACQUAINT THE AUDIENCE TO BLUETOOTH TECHNOLOGY.
PREVIEW
. INTRODUCTION . PHASE I : THE TECHNOLOGY . PHASE II : PROTOCOL STACK . PHASE III : EST A CONNECTION . PHASE IV : SECURITY . PHASE V : APPLICATIONS . CONCLUSION
Bluetooth is short range radio link in the 2.4 GHz ISM band (10 100m). Being developed by Bluetooth Special Interest Group (SIG).
SIG includes Intel, Ericsson, Nokia, IBM,
Motorola. Supported by 1600 firms. Main aim is to replace the proprietary cables.
The Technology
6. Uses frequency hopping and FEC to give
robust link.
7. Supports the existing protocols. 8. Does not require line-of-sight. Can pass
Connectionless Link (ACL) for data and 3 Synchronous Connection Oriented (SCO) Links for voice.
Overview
NETWORK TOPOLOGY SYSTEM REQUIREMENTS TECHNICAL REQUIREMENT
Piconet A
Piconet B
PICONET
Devices connected on a common ch with unique hop sequence Initiating device is the master Seven slave possible More possible in parked state
SYSTEM REQUIREMENTS
UNIVERSAL FRAME WORK (PDA, PC etc) ADHOC CONNECTION VOICE & DATA SECURITY SIMPLE, SMALL, LESS POWER REQMT ROYALTY FREE
TECH CHALLENGES
ROBUST TO INTERFERNCE SIZE ADAPTABLE TO VARIOUS DEVICES AUTO CONNECT CLOCK SYNC ENCRPYTION COMPATABLE TO IrDA etc
Protocol Stack
OBEX
SDP
AUDIO
LMP
BLUETOOTH RADIO
RADIO LAYER
EST PHYSICAL CONNECTION ISM BAND 2400-2483.5 MHz FAST FREQ HOPPING SHORT DATA PACKET CVSD CODING
BASEBAND
Cont the radio Determines FH sequence Functionality to devices for clock sync & connection est Inquiry Encryption key genr Packet handling (ACL , SCO )
L2CAP
Multiplexing. Segmentation & reassembly (2745 bits). Quality of service. Function as Nw layer.
APPLICATION LAYER
Access data from L2CAP. Sp RFCOMM, TCS,SDP. Allows Use of TCP/IP or WAP ,PPP,FTP
PHASE III
CONNECTION EST
Inquiry. Paging. Link est Service discovery L2CAP ch RFCOMM ch Security request
Master
Slave
One Slot
HANDSHAKE
NETWORK FORMATION
Inquiry
Clock Offset
C B Global ID
NETWORK FORMATION
Page
A
Global ID D
C B
NETWORK FORMATION
MASTER
A
D
SLAVE
C B
SLAVE
FLOW CONTROL
ANTENNA
RADIO
ACL DATA
LINK MANAGER FIFO FIFO SCO LINK CONTROLLER
HEADER
PAYLOAD
CONNECTIONLESS PACKET
ACCESS CODE
HEADER
PAYLOAD CRC
BASEBAND PACKET
SECURITY
Uses four values device address ,pvt authentication key(128 bits),private encryption key(8-128 bits) & random no Initialisation key (PIN incl) Authentication proc (both ways) Encryption
BLUETOOTH SECURITY
PIN USER INPUT PIN
AUTHENTICATION
LINK KEY
LINK KEY
ENCRYPTION KEY
ENCRYPTION
ENCRYPTION KEY
APPLICATIONS
-DATA EXCHANGE -PERIPHERAL INTERCONNECTS
MILITARY APPLICATIONS
Characteristics useful for Military Applications
- REDUNDUNCY - NO LINE OF SIGHT NEEDED - IN-BUILT SECURITY - SUPPORTS BOTH VOICE & DATA - OPEN SPECIFICATION
EXAMPLE
RR
RR
AES
RR
RR
EXAMPLE
RR RR
AES
RR
RR