Vous êtes sur la page 1sur 7

BLUETOOTH TECHNOLOGY

A.ANUPAMA AND P.JYOTHSNA REGENCY INSTITUTE OF TECHNOLOGY, (PONDICHERRY UNIVERSITY) ADIVIPOLAM, YANAM.

E-mail ID: anoo_techno@yahoo.com, Itzjosh14@yahoo.com

ABSTRACT - There is an important trend toward personal mobile communications. People use more and more handheld devices to keep in touch with friends or business partners. One possible way to connect these devices is provided by wireless radio technologies. The emerging Bluetooth technology is such a short-range wireless technology. An important feature of Bluetooth is that it enables ad hoc networking. In this paper we present some methods which enable Bluetooth devices to form an ad hoc network. Keywords: Bluetooth, ad hoc networking, scatter net formation, distributed methods I. INTRODUCTION In the near future, the role and capabilities of short-range data transaction are expected to grow, serving as a complement to traditional large-scale communication. Most man-machine communication as well as oral communication between human beings occurs at distances of less than 10 meters and often, as a result of this communication, the two communicating parties have a need to exchange data. As an enabling factor, license-exempted frequency bands invite the use of developing radio technologies (such as Bluetooth) that admit effortless and inexpensive deployment of wireless communication The emerging Bluetooth technology enables a simple short-range connection between different devices. They can connect to an access network or form a separate network called ad hoc network. The ad hoc network is a set of devices, which build a network without any infrastructure. They forward the packets of each other. In this latter case the nodes can communicate without any infrastructure by forwarding the data of each other. The ad hoc networking with Bluetooth arises new problems to solve. Bluetooth is a connectionoriented technology, which means that the connection between two devices must be set up before they could send packets to each other. The main question is how to build up these connections to provide an efficient communication in the ad hoc network. The aim is to increase the whole capacity in the network and provide routes as short as possible. Furthermore we should maintain a fully connected network to support easy packet forwarding for the nodes. Section IV describes two methods for network building, maintenance procedures and in Section V we present a topology optimization mechanism. Every method operates in a distributed manner, which is useful in the ad hoc environment.

II. BLUETOOTH WIRELESS TECHNOLOGY Bluetooth wireless technology operates in the 2.4-2.5 GHz Industrial, Scientific, Medicine (ISM) frequency band which is license free. This means that users do not need to pay for the license of the usage of the frequency band. But it also means that other radio technologies and other types of devices (for example the microwave oven) can also use the same frequencies as Bluetooth. To reduce the interference caused by other devices Bluetooth technology uses the Frequency Hopping Spread Spectrum (FHSS) method. The transmission frequency is periodically changed. This feature of the FHSS method gives robustness against interference and fading. The Time Division Duplex (TDD) communication scheme is used for sending packets in both directions (Figure 1).

Fig. 1. FHSS/TDD communication between nodes Bluetooth standard defines 79 frequencies for communication. The devices use a pseudo-random sequence to determine the series of the frequency hopping between the channels. The length of the time slots is 0.625 ms, which means 1600 hops/s hopping speed. Each packet is sent on different frequency. The devices can communicate using a master-slave method. The master role is signed to the node, which determines the frequency-hopping scheme in the connection. Up to 7 active slaves can connect to a master node. This formation is called piconet. Communication in the piconet is lead by the master which means that the master determines the hopping sequence and the slaves synchronize their clock to the master's clock. These roles are only logical states. Any device can become a master or a slave. Several piconets can form a larger network, called scatternet (Figure 2).

Fig. 2. Scatternet of Bluetooth devices In this case there are some nodes which participate in more than one piconet. These nodes are called bridging nodes. There can be bridging nodes, which are slaves in both piconets. Alternatively, they can be a master in one piconet and a slave in another piconet. A bridging node switches between the piconets on a time-sharing based method. During the switch the bridging node has to synchronize its clock to the master's clock of the piconet it actually switches to. The node must wait till it can send data in that piconet. This bridging procedure means an overhead in the communication. An important aim of the optimization protocol is the reduction of bridging in the network.

III. PROBLEM FORMULATION The Bluetooth specification enables the formation of a larger network from many nodes but it does not define an exact method for scatternet formation. Connection setup mechanism Since Bluetooth is a connection-oriented technology there is the question how to build a connection as fast as possible. The connection setup procedure includes the inquiry and page procedures. The Bluetooth specification describes methods for building up connections with neighbouring nodes. How to reduce the connection setup time is out of scope of this paper. Bluetooth scatternet building We want to build up a network and keep it connected so that every node can communicate with another when it is possible. We must assign the master and slave roles and we must determine which nodes bridge between piconets. Due to the movement of the nodes the existing links can be broken. In this case we must maintain the network topology to prevent the network from being split into two parts. So we must replace the broken link with an alternative path. To ensure the reachability of each node in the network it is sufficient to provide the reachability of every visible node. This means when a node can reach the nodes in its radio range (visible neighbours) then it can reach the visible neighbours of these nodes, too, and so on. When a node can not find a route to a visible neighbour then they build up a direct connection. Bluetooth scatternet optimization The network building procedure ensures a fully connected scatternet. However this topology can be inefficient in some cases. The scatternet builder modifies the topology only when a link failure occurs. To reach a more efficient topology we have given an additional feature to the scatternet formation: this is the scatternet optimization. The scatternet optimization procedure makes the existing topology more efficient. The traffic carried by the network is forwarded on a shorter path, which increases the capacity of the whole network

IV.WORKING OF BLUETOOTH TECHNOLOGY Bluetooth wireless technology is a short-range communications system intended to replace the cables connecting portable and/or fixed electronic devices. The key features of Bluetooth wirelesstechnology are robustness, low power, and low cost. Many features of the core specification are optional, allowing product differentiation. Overview of Operation The Bluetooth core system consists of an RF transceiver, baseband, and protocol stack. The system offers services that enable the connection of devices and the exchange of a variety of data classes between these devices. The Bluetooth RF (physical layer) operates in the unlicensed ISM band at 2.4GHz. The system employs a frequency hop transceiver to combat interference and fading, and provides many FHSS carriers. RF operation uses a shaped, binary frequency modulation to minimize transceiver complexity. The symbol rate is 1 Megasymbol per second (Msps) supporting the bit rate of 1 Megabit per second (Mbps) or, with Enhanced Data Rate, a gross air bit rate of 2 or 3Mb/s. These modes are known as Basic Rate and Enhanced Data Rate respectively. During typical operation, a physical radio channel is shared by a group of devices that are synchronized to a common clock and frequency hopping pattern. One device provides the synchronization reference and is known as the master. All other devices are known as slaves. A group of devices synchronized in this fashion form a piconet. This is the fundamental form of communication for Bluetooth wireless technology. Devices in a piconet use a specific frequency hopping pattern which is algorithmically determined by certain fields in the Bluetooth specification address and clock of the master. The basic hopping pattern is a pseudo-random ordering of the 79 frequencies in the ISM band. The hopping pattern may be adapted to exclude a portion of the frequencies that are used by interfering devices. The adaptive hopping technique improves Bluetooth technology co-existence with static (non-hopping) ISM systems when these are co-located. The physical channel is sub-divided into time units known as slots. Data is transmitted between Bluetooth enabled devices in packets that are positioned in these slots. When circumstances permit, a number of consecutive slots may be allocated to a single packet. Frequency hopping takes place between the transmission or reception of packets. Bluetooth technology provides the effect of full duplex transmission through the use of a time-division duplex (TDD) scheme. Above the physical channel there is a layering of links and channels and associated control protocols. The hierarchy of channels and links from the physical channel upwards is physical channel, physical link, logical transport, logical link and L2CAP channel.

Within a physical channel, a physical link is formed between any two devices that transmit packets in either direction between them. In a piconet physical channel there are restrictions on which devices may form a physical link. There is a physical link between each slave and the master. Physical links are not formed directly between the slaves in a piconet. The physical link is used as a transport for one or more logical links that support unicast synchronous, asynchronous and isochronous traffic, and broadcast traffic. Traffic on logical links is multiplexed onto the physical link by occupying slots assigned by a scheduling function in the resource manager. A control protocol for the baseband and physical layers is carried over logical links in addition to user data. This is the link manager protocol (LMP). Devices that are active in a piconet have a default asynchronous connection-oriented logical transport that is used to transport the LMP protocol signaling. For historical reasons this is known as the ACL logical transport. The default ACL logical transport is the one that is created whenever a device joins a piconet. Additional logical transports may be created to transport synchronous data streams when this is required. The link manager function uses LMP to control the operation of devices in the piconet and provide services to manage the lower architectural layers (radio layer and baseband layer). The LMP protocol is only carried on the default ACL logical transport and the default broadcast logical transport. Above the baseband layer the L2CAP layer provides a channel-based abstraction to applications and services. It carries out segmentation and reassembly of application data and multiplexing and demultiplexing of multiple channels over a shared logical link. L2CAP has a protocol control channel that is carried over the default ACL logical transport. Application data submitted to the L2CAP protocol may be carried on any logical link that supports the L2CAP protocol.

V.BENEFITS OF BLUETOOTH TECHNOLOGY Bluetooth wireless technology is the simple choice for convenient, wire-free, short-range communication between devices. It is a globally available standard that wirelessly connects mobile phones, portable computers, cars, stereo headsets, MP3 players, and more. Thanks to the unique concept of profiles, Bluetooth enabled products do not need to install driver software. The technology is now available in its fourth version of the specification and continues to develop, building on its inherent strengths small-form factor radio, low power, low cost, built-in security, robustness, ease-of-use, and ad hoc networking abilities. Bluetooth wireless technology is the leading and only proven short-range wireless technology on the market today shipping over five million units every week with an installed base of over 500 million units at the end of 2005. Ease of Use Bluetooth technology is an ad hoc technology that requires no fixed infrastructure and is simple to install and set up. You dont need wires to get connected. The process for a new user is easy you get a Bluetooth branded product, check the profiles available and connect it to another Bluetooth

device with the same profiles. The subsequent PIN code process is as easy as when you identify yourself at the ATM machine. When out-and-about, you carry your personal area network (PAN) with you and can even connect to others. Globally Accepted Specification Bluetooth wireless technology is the most widely supported, versatile, and secure wireless standard on the market today. The globally available qualification program tests member products as to their accordance with the standard. Since the first release of the Bluetooth specification in 1999, over 4000 companies have become members in the Bluetooth Special Interest Group (SIG). Meanwhile, the number of Bluetooth products on the market is multiplying rapidly. Volumes have doubled for the fourth consecutive year and are likely to reach an installed base of 500 million units by the close of 2005. Secure Connections From the start, Bluetooth technology was designed with security needs in mind. Since it is globally available in the open 2.4 GHz ISM band, robustness was built in from the beginning. With adaptive frequency hopping (AFH), the signal hops and thus limits interference from other signals. Further, Bluetooth technology has built-in security such as 128bit encryption and PIN code authentication. When Bluetooth products identify themselves, they use the PIN code the first time they connect. Once connected, always securely connected. VI.SECURITY Today's wireless world means that data is being sent, among us, invisibly from device to device, country to country, person to person. This data, in the form of e-mails, photos, contacts and addresses are precious and private to each of us. This private information, no longer making its way along wires in plain sight, needs to be sent securely to its intended recipient without interception. Wireless standards the world over are evolving and have various formats for dealing with the security issues of its users. Bluetooth wireless technology is no exception. Bluetooth wireless technology has, from its inception, put great emphasis on wireless security so that users of this global standard can feel secure while making their connections. The Bluetooth Special Interest Group (SIG), made up of over 4000 member manufacturers, has a Bluetooth security experts group made up of engineers from its member companies who provide critical security information and feedback that is taken into account as the Bluetooth wireless specification evolves. Product developers that use Bluetooth wireless technology in their products have several options for implementing security. There are three modes of security for Bluetooth access between two devices. Security Mode 1: non-secure Security Mode 2: service level enforced security Security Mode 3: link level enforced security Using SIG Bluetooth products will be secure Absolute security can never be totally guaranteed - in technology or otherwise. Security is an

ongoing and important effort for any technology. The Bluetooth SIG has made security a high priority from day one with security algorithms that to date have proven adequate. In the roadmap for the advancement of Bluetooth wireless technology, the Bluetooth SIG published security and privacy enhancements. These enhancements to the specification further strengthen the pairing process and ensure privacy after a connection is established. We are continuing with our work in this area, trying to always stay a step ahead of people trying to hack into devices. Denial of service (DoS) The well known denial of service (DoS) attack, which has been most popular for attacking internet web sites and networks, is now an option for hackers of Bluetooth wireless technology enabled devices. This nuisance is neither original nor ingenious and is, very simply, a constant request for response from a hackers Bluetooth enabled computer (with specific software) to another Bluetooth enabled device such that it causes some temporary battery degradation in the receiving device. While occupying the Bluetooth link with invalid communication requests, the hacker can temporarily disable the products Bluetooth services. The DoS attack only offers the hacker the satisfaction of temporary annoyance, but does not allow for access to the devices data or services no information residing on the receiving device can be used or stolen by the attacker.

VII. CONCLUSIONS Bluetooth technology provides a universal interface for the interconnection of various devices. This technology enables ad hoc networking as well. However ad hoc networking with Bluetooth arises new problems to solve. Bluetooth technology is an ad hoc technology that requires no fixed infrastructure and is simple to install and set up. We dont need wires to get connected. Using this technology user can have all mobile and fixed computer devices be totally Co-ordinate. Bluetooth wireless technology makes our world wireless and gives us the freedom to explore. VIII. REFERENCES [1] Bluetooth Base band Specification version 1.0 B, November 1999, http://www.bluetooth.com/ [2] Charles Perkins (Ed), "Ad Hoc Networking" Addison-Wesley 2001

Vous aimerez peut-être aussi