Académique Documents
Professionnel Documents
Culture Documents
BLUETOOTH TECHNOLOGY
CONTENT
• Overview of Bluetooth History
• The Bluetooth Specifications
• Typical Bluetooth Scenario
• Protocols
• Profiles
• Security
• Comparison with other technologies
• Future of Bluetooth
• Summary
13 December 2009 2
Example : The Networked Home
13 December 2009 3
What is Bluetooth?
13 December 2009 4
Ultimate Headset
13 December 2009 5
Cordless Computer
13 December 2009 6
Bluetooth Goals & Vision
13 December 2009 10
Technical features
Connection Type Spread Spectrum (Frequency Hopping) &
Time Division Duplex (1600 hops/sec)
Spectrum 2.4 GHz ISM Open Band (79 MHz of
spectrum = 79 channels)
Modulation Gaussian Frequency Shift Keying
Transmission Power 1 mw – 100 mw
Data Rate 1 Mbps
Range 30 ft
Supported Stations 8 devices
Data Security –Authentication Key 128 bit key
Data Security –Encryption Key 8-128 bits (configurable)
Module size 9 x 9 mm
13 December 2009 11
Bluetooth FHSS
13 December 2009 12
Time-Division Duplex Scheme
13 December 2009 13
Classification
POWER RANGE
13 December 2009 14
Typical Bluetooth Scenario
• Piconet
— It is the network formed by a Master and one or more slaves
(max 7) m
— Each piconet is defined by a different hopping channel to
which users synchronize to
— Each piconet has max capacity (1 Mbps) s s s
13 December 2009 15
Piconet Structure
Master
Active Slave
Parked Slave
Standby
13 December 2009 16
Ad-hoc Network – the Scatternet
• Inter-piconet communication
• Up to 10 piconets in a
scatternet
• Multiple piconets can operate
within same physical space
• This is an ad-hoc, peer to
peer (P2P) network
13 December 2009 17
Bluetooth Protocol Stack
13 December 2009 18
Baseband
13 December 2009 19
Baseband
• Addressing
— Bluetooth device address (BD_ADDR)
– 48 bit IEEE MAC address
— Active Member address (AM_ADDR)
– 3 bits active slave address
– all zero broadcast address
— Parked Member address (PM_ADDR)
– 8 bit parked slave address
13 December 2009 20
Packet Structure
No CRC ARQ
FEC (optional) FEC (optional)
13 December 2009 21
Connection State Machine
Inquiry Page
Standby Connected
Transmit data
Snif
Park Hold
f
13 December 2009 22
Channel Establishment
• Seven sub-states
— Inquiry
— Inquiry scan
— Inquiry response
— Page
— Page scan
— Master response
— Slave response
13 December 2009 24
Link Manager Protocol
13 December 2009 25
Link Manager Protocol
• The Link Manager carries out link setup, authentication & link
configuration.
• Channel Control
— All the work related to the channel control is managed by the master
– The master uses polling process for this
— The master is the first device which starts the connection
– This roles can change (master-slave role switch)
13 December 2009 26
L2CAP
13 December 2009 27
Middleware Protocol Group
l o
signaling protocol also present.
ntr
Data
Co
•Also includes Service Discovery
Protocol. L2CAP
Audio
Link Manager
Middleware Protocol Group Baseband
RF
13 December 2009 28
Middleware Protocol Group (contd.)
• TCP/IP
— Network Protocols for packet data communication, routing.
• RFCOMM
— Cable replacement protocol, emulation of serial ports over wireless network.
13 December 2009 29
IP Over Bluetooth
13 December 2009 30
IP Over Bluetooth
13 December 2009 31
File Transfer Profile
• Profile provides:
• Enhanced client-server interactions:
- browse, create, transfer folders
- browse, pull, push, delete files
13 December 2009 32
Headset Profile
• Profile provides:
• Both devices must provide capability to initiate connection &
accept/terminate calls.
• Volume can be controlled from either device.
• Audio gateway can notify headset of an incoming call.
13 December 2009 33
Core Bluetooth Products
13 December 2009 34
Other Products…
13 December 2009 35
Security
• Security Measures
— Link Level Encryption & Authentication.
— Personal Identification Numbers (PIN) for device access.
— Long encryption keys are used (128 bit keys).
— These keys are not transmitted over wireless. Other parameters are
transmitted over wireless which in combination with certain
information known to the device, can generate the keys.
— Further encryption can be done at the application layer.
13 December 2009 36
A Comparison
WLAN
13 December 2009 37
Bluetooth vs. IrD
• Bluetooth •IrD
— Point to Multipoint —Point to point
—Intended for Data
— Data & Voice
Communication
— Easier Synchronization due —Infrared, LOS communication
to omni-directional and no
—Can not penetrate solid objects
LOS requirement
—Both devices must be stationary,
— Devices can be mobile for synchronization
— Range 10 m —Range 1 m
13 December 2009 38
Bluetooth: Today & Tomorrow
13 December 2009 39
Will Bluetooth become a household name?
13 December 2009 40
Future of Bluetooth
13 December 2009 42
“Things that think…
don’t make sense unless they
link.”
13 December 2009 43
Thank You
13 December 2009 44