SlideShare uma empresa Scribd logo
1 de 46
Baixar para ler offline
Bluetooth Technology


         Naitik A Gosar

       November 27 2011s




         Bluetooth         1
Bluetooth

A new global standard for data and voice


Goodbye Cables !




                               Bluetooth   2
Ultimate Headset




                   Bluetooth   3
Cordless Computer




                    Bluetooth   4
Automatic Synchronization


               In the Office




               At Home




                   Bluetooth   5
Bluetooth Specifications

  Connection Type                        Spread Spectrum (Frequency Hopping)

  MAC Scheme                             FH-CDMA

  Spectrum                               2.4 GHz ISM

  Modulation                             Gaussian Frequency Shift Keying

  Transmission Power                     1 mw – 100 mw

  Aggregate Data Rate                    1 Mbps

  Range                                  30 ft

  Supported Stations                     8 devices

  Voice Channels                         3

  Data Security- Authentication Key      128 bit key

  Data Security-Encryption Key           8-128 bits (configurable)

                                 Bluetooth                                     6
Bluetooth Protocol Stack

  Composed of protocols to allow
  Bluetooth devices to locate each                  Applications
  other and to create, configure
  and manage both physical and                         IP
  logical links that allow higher            SDP       RFCOMM




                                                                         ol
  layer protocols and applications




                                                                     ntr
  to pass data through these




                                                                   Co
                                                      Data
  transport protocols
                                                    L2CAP
                                            Audio
                                                    Link Manager
                                                Baseband
Transport Protocol Group
                                                   RF



                                Bluetooth                              7
Transport Protocol Group (contd.)
¢Radio   Frequency (RF)
          Sending and receiving modulated bit streams

 Baseband
          Defines the timing, framing
          Flow control on the link.

 Link Manager
      ¢ Managing the connection states.
      ¢ Enforcing Fairness among slaves.

      ¢ Power Management


 Logical Link Control &Adaptation Protocol
          Handles multiplexing of higher level protocols
          Segmentation & reassembly of large packets
          Device discovery & QoS
                                 Bluetooth                 8
Middleware Protocol Group


Additional transport protocols to allow
existing and new applications to operate
over Bluetooth. Packet based telephony                Applications
control signaling protocol also present.                 IP
Also includes Service Discovery                SDP       RFCOMM




                                                                           ol
Protocol.




                                                                       ntr
                                                                     Co
                                                        Data
 Middleware Protocol Group
  Middleware Protocol Group                           L2CAP
                                              Audio
                                                      Link Manager
                                                  Baseband
                                                     RF

                                  Bluetooth                               9
Middleware Protocol Group (contd.)

¢   Service Discovery Protocol (SDP)
          Means for applications to discover device info, services and its
          characteristics.
¢   TCP/IP
          Network Protocols for packet data communication, routing
¢   RFCOMM
          Cable replacement protocol, emulation of serial ports over
          wireless network




                                Bluetooth                               10
Application Group



      Application Group                               Applications
                                                         IP
                                               SDP       RFCOMM




                                                                           ol
Consists of Bluetooth aware as well as




                                                                       ntr
un-aware applications.




                                                                     Co
                                                        Data

                                                      L2CAP
                                              Audio
                                                      Link Manager
                                                  Baseband
                                                     RF

                                  Bluetooth                              11
Master - Slave

¢   Master
             Device in Piconet whose clock and hopping sequence are used
             to synchronize all other devices (slaves) in the Piconet.
             It also carries out Paging procedure and also Connection
             Establishment.
¢   Slaves
              Units within the piconet that are syncronized to the master via
             its clock and hopping sequence.
             After connetion establishment, Slaves are assigned a
             temporary 3 bit member address to reduce the no. of addresing
             bits required




                                   Bluetooth                               12
Piconets

    Point to Point Link
          Master - slave relationship
                                                           m       s
          Bluetooth devices can function as masters or
          slaves


¢   Piconet
          It is the network formed by a Master and one
          or more slaves (max 7).                              m
          Each piconet is defined by a different hopping
          channel to which users synchronize to.
          Each piconet has max capacity (1 Mbps).
                                                           s   s        s
          Hopping pattern is determined by the master.


                                Bluetooth                          13
Piconet Structure


                                Master

                                Active Slave

                                Parked Slave

                                 Standby




                    Bluetooth              14
Physical Link Types

 Synchronous Connection Oriented (SCO)
      Point to Point Full Duplex between Master & Slave
      Established once by master & kept alive till released by Master
      Typically used for Voice connection ( to guarantee continuity )
      Master reserves slots used for SCO link on the channel to
      preserve time sensitive information

 Asynchronous Connection Link (ACL)
      It is a momentary link between master and slave.
      No slots are reserved.
      It is a Point to Multipoint connection.
      Symmetric & Asymmetric links possible




                            Bluetooth                              15
Packet Types



   Control                     Data/voice
   packets                     packets

                 Voice                   data
 ID*
 Null            HV1               DM1          DH1
 Poll            HV2               DM3          DH3
 FHS             HV3               DM5          DH5
 DM1             DV

               Access Code
               Header
               Payload

                   Bluetooth                     16
Packet Structure

    72 bits      54 bits           0 - 2744 bits


    Access    Header                   Payload
     Code




         Voice                            header   Data   CRC

    No CRC                                         ARQ
    No retries
    FEC (optional)                         FEC (optional)




                           Bluetooth                            17
Access Code

¢   Purpose
            Synchronization
            DC offset compensation
            Identification
            Signaling
¢   Types
        l   Channel Access Code (CAC)
              •   Identifies a piconet.
        l   Device Access Code (DAC)
              •   Used for signalling procedures like paging and response paging.
        l   Inquiry Access Code (IAC)
              •   General IAC is common to all devices, Dedicated IAC is for a
                  dedicated group of Bluetooth devices that share a common
                  characteristic.

                                          Bluetooth                              18
Packet Header

 Addressing ( 3 bits )
 Packet type (4 bits )
 Flow Control ( 1 bit )
 1-bit ARQ
 Sequencing ( 1 bit )     For filtering retransmitted packets

 HEC ( 8 bit )            Verify header integrity




                          Bluetooth                             19
Connection State Machine



          Inquiry                  Page




Standby                                    Connected

             Transmit data


                                    Park   Hold   Sniff
                       Bluetooth                   20
Connection State Machine (contd.)

¢   Inquiry Scan
        l   A device that wants to be discovered will periodically enter
            this mode and listen for inquiry packets.
¢   Inquiry
            Device sends an Inquiry packet addressed to GIAC or DIAC
            Transmission is repeated on the inquiry hop sequence of
            frequencies.
¢   Inquiry Response
            When an inquiry message is received in the inquiry scan state,
            a response packet (FHS) containing the responding device
            address must be sent after a random number of slots.




                                  Bluetooth                                21
Connection State Machine (contd.)

¢   Inquiry Response




                       Bluetooth        22
Connection State Machine (contd.)

  Page
         The master uses the clock information, about the slave to be paged,
         to determine where in the hop sequence, the slave might be listening
         in the page scan mode.
         The master sends a page message

  Page Scan
         The page scan substate can be entered by the slave from the standby
         state or the connection state. It listens to packets addressed to its
         DAC.

  Page Response
         On receiving the page message, the slave enters the slave page
         response substate. It sends back a page response consisting of its ID
         packet which contains its DAC, at the frequency for the next slot
         from the one in which page message was received.



                                Bluetooth                                    23
Power Control Modes

¢   Sniff Mode
       l   This is a low power mode in which the listening activity of the
           slave is reduced.
       l   In the sniff mode, the slave listens for transmissions only at
           fixed intervals Tsniff, at the offset slot Dsniff for Nsniff times.
           These parameters are given by the LMP in the master when it
           issues the SNIFF command to the slave.
¢   Hold Mode
       l   Slave temporarily (for Thold sec) does not support ACL packets
           on the channel (possible SCO links will still be supported).
       l   By this capacity can be made free to do other things like
           scanning, paging, inquiring, or attending another piconet.
       l   The slave unit keeps its active member address (AM_ADDR).


                                  Bluetooth                                 24
Power Control Modes (contd.)

¢   Park Mode
        This is a very low power mode with very little activity.
        The slave however, stays synchronized to the channel.
        The parked slaves regularly listen for beacon signals at
        intervals decided by the beacon structure communicated to the
        slave during the start of parking.
        The parked slave has to be informed about a transmission in a
        beacon channel which is supported by the master to keep
        parked slaves in synchronization and send them any other
        information.
        Any message to be sent to a parked member are sent over the
        broadcast channel.
        It also helps the master to have more than seven slaves.



                             Bluetooth                             25
Security

¢   Security Measures
          Limited/Restricted Access to authorized users.
          Both Link Level Encryption & Authentication.
          Personal Identification Numbers (PIN) for device access.
          Long encryption keys are used (128 bit keys).
          These keys are not transmitted over wireless. Other parameters
          are transmitted over wireless which in combination with certain
          information known to the device, can generate the keys.
          Further encryption can be done at the application layer.
¢   Security values
          Device Address-Public
          Authentication Key(128 bits)-Private
          Encryption Key(8-128 bits)-Private
          Random Number
                                Bluetooth                             26
Frequency Hop Spread-Spectrum

•   Bluetooth channel is represented
    by a pseudo random hopping
    sequence through the entire 79
    RF frequencies
•   Nominal hop rate of 1600 hops
    per second
•   Channel Spacing is 1 MHz




                                Bluetooth   27
Time-Division Duplex Scheme
•   Bluetooth devices use a Time-Division Duplex (TDD) scheme
•   Channel is divided into consecutive slots (each 625 µs)
•   One packet can be transmitted per slot
•   Subsequent slots are alternatively used for transmitting and
    receiving
       Strict alternation of slots b/t the master and the slaves
       Master can send packets to a slave only in EVEN slots
       Slave can send packets to the master only in the ODD slots




                                  Bluetooth                          28
Performance Analysis of Link
            (Reference: Pedersen and Eggers, VTC 2000)


• Results collected from “real” Bluetooth link

•   two notebook PC’s
    •   PC cards from Digianswer
         - full power devices P = 20 dBm
                               t


    •   Indoor Measurements
         - stationary master and slave



    •   Outdoor Measurements
         - slave moves in circle R = 3- at 1.5 RPM



                                 Bluetooth               29
Test Parameters

• Testing done from a master to a single slave
      No major sources of interference



• Tests used DH5 packet only

       72 bits      54 bits               0 - 2744 bits

        Access    Header                   Payload
         Code



                  8-bit HEC               16-bit payload CRC



                              Bluetooth                        30
Pictures




           Bluetooth   31
Results: Indoor




                  Bluetooth   32
Results: Outdoor




                   Bluetooth   33
How reliable are Bluetooth Devices ?

• Indoor:
      Within 10 meters
      Within 25 meters, with LOS

      Further…?
      Concrete, Glass….?

• Outdoor:
      Within 150-220 meters with LOS


      More than 220 meters


                              Bluetooth   34
Analytic Analysis of Link
        (Reference: A.Kumar and A.Karnik, ICPWC 2000)


• Goal: Find a bound on the BER as a function of
  network size

         m




                                             s
                         s
                     s
             s



                                    m




                                                     s
                                                 s
                 m




                                                         m
                                                     s
                             s
    s




                                                     s
        s

             s




                                 Bluetooth                   35
The Problem

• Occasionally, two piconets will use overlapping
  frequencies




                         Bluetooth                  36
Assumptions and Parameters

• “Open” (LOS) indoor room; circular with radius R

• Received power is a random variable
   -   mean received power falls off as d2
   -   for fixed d, signal fading is Rician with K = 6dB


• Interference from other Bluetooth devices only
   -   ignore 802.11, microwaves


• Time offset of each Piconet is uniform [0,T]


                                Bluetooth                  37
SIR calculation

• For a reference piconet




 f(t) because the interfering and receiving devices within a piconet change with time


• Ignore noise power
    I 2.5 nW for device within Bluetooth specs operating at 1Mbps with
       BER < .001

                                    Bluetooth                                   38
SIR Calculation (cont.)




Probability of Outage:




                         Total interference power      Prob. that exactly n piconets
                         from n interfering piconets   are interfering



                         Bluetooth                                                     39
SIR Calculation (cont.)

• Evaluation of Pout is complicated and requires
  numerical techniques (see reference)
• Some results (for R = 5m; uniform distribution)
         Interferers   Lower Bound on Pout
                       V = 14dB         V = 11dB
         1             1.14 %           1.03 %
         2             2.27 %           2.04%


• In general Pout increases linearly with M
              Pout      (M-1) / Nf

                                Bluetooth           40
Other Technologies

¢   IrDA
           Infrared, LOS, serial data comm.
           Point to point
           Intended for Data Communication
           Simple to configure and use
           Both devices must be stationary, for synchronization
           Can not penetrate solid objects




                                 Bluetooth                        41
IrDA vs Bluetooth

¢   Bluetooth Advantages
           Point to Multipoint
           Data & Voice
           Broadcast
           Easier Synchronization due to omnidirectional and no LOS
           requirement
           Devices can be mobile
           Range 10 m
¢   IrDA
           Currently 16 Mbps
           Ample security and very less interference
           Already ubiquitous & Low cost



                                 Bluetooth                            42
Bluetooth: Today and Tomorrow…

¢   First market-ready product shipped November 2000
          Digital headset produced by GN Netcom $300




                             Bluetooth                 43
Bluetooth: Today and Tomorrow.. (cont.)

• Will Bluetooth become a household name?




                      Bluetooth             44
Conclusions
¢   A new global standard for data and voice
¢   Eliminate Cables
¢   Low Power, Low range, Low Cost network devices
¢   Delivers Automatic synchronicity between devices
¢   Future Improvements
          Master-Slave relationship can be adjusted dynamically for
          optimal resource allocation and utilization
          Adaptive, closed loop transmit power control can be
          implemented to further reduce unnecessary power usage




                                Bluetooth                             45
References

[1] Bluetooth Consortium :
           http://www.bluetooth.com
           http://www.ericsson.com/bluetooth/

[2] Bluetooth Tutorial :
           http://www.ee.iitb.ernet.in/uma/~aman/bluetooth
           http://www.palowireless.com
[3] G.F.Pedersen, P.Eggers, “Initial Investigation of the Bluetooth Link”,
    VTC, pp 64 – 70
[4] J.C.Haartsen, et al, “Bluetooth – A New Low-Power Radio Internface
    Providing Short-Range Connectivity”, IEEE Proc. , Vol 88, No.10, Oct
   2000
[5] Min-Chul Ju, et al. , “Channel Estimation and DC-Offset Compensation
    Schemes for Frequency Hopped Bluetooth Networks”, IEEE
    Communications Letters, Vol 5, No.1, Jan 2001


                                     Bluetooth                               46

Mais conteúdo relacionado

Mais procurados

El camino hacia la 5G - Isidro Nieto from Ericsson at VI Jornadas Cátedras Te...
El camino hacia la 5G - Isidro Nieto from Ericsson at VI Jornadas Cátedras Te...El camino hacia la 5G - Isidro Nieto from Ericsson at VI Jornadas Cátedras Te...
El camino hacia la 5G - Isidro Nieto from Ericsson at VI Jornadas Cátedras Te...Ericsson España
 
Practical Fundamentals of Voice over IP (VoIP) for Engineers and Technicians
Practical Fundamentals of Voice over IP (VoIP) for Engineers and TechniciansPractical Fundamentals of Voice over IP (VoIP) for Engineers and Technicians
Practical Fundamentals of Voice over IP (VoIP) for Engineers and TechniciansLiving Online
 
VoIP - Technology To Business Models
VoIP - Technology To Business ModelsVoIP - Technology To Business Models
VoIP - Technology To Business Modelsguesta5f2fb
 
Sinnreich Henry Johnston Alan Pt 2
Sinnreich Henry Johnston Alan   Pt 2Sinnreich Henry Johnston Alan   Pt 2
Sinnreich Henry Johnston Alan Pt 2Carl Ford
 
Avaya VoIP on Cisco Best Practices by PacketBase
Avaya VoIP on Cisco Best Practices by PacketBaseAvaya VoIP on Cisco Best Practices by PacketBase
Avaya VoIP on Cisco Best Practices by PacketBasePacketBase, Inc.
 
VoIP (Voice over Internet Protocol)
VoIP (Voice over Internet Protocol)VoIP (Voice over Internet Protocol)
VoIP (Voice over Internet Protocol)Abdullah Shah
 
VoIP - seminar at IASRI, New Delhi
VoIP - seminar at IASRI, New DelhiVoIP - seminar at IASRI, New Delhi
VoIP - seminar at IASRI, New DelhiNishikant Taksande
 
Skystar 360 E Data Sheet
Skystar 360 E Data SheetSkystar 360 E Data Sheet
Skystar 360 E Data Sheetdigital.signage
 
IP Multimedia Subsystem architecture overview
IP Multimedia Subsystem architecture overviewIP Multimedia Subsystem architecture overview
IP Multimedia Subsystem architecture overviewNarasimham Settipalli
 
Bluetooth Aplication
Bluetooth AplicationBluetooth Aplication
Bluetooth AplicationEr Bhaduri
 
IMS IP multimedia subsystem presentation
IMS IP multimedia subsystem presentationIMS IP multimedia subsystem presentation
IMS IP multimedia subsystem presentationWaldir R. Pires Jr
 
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...csandit
 
VOIP: VOICE OVER IP
VOIP: VOICE OVER IPVOIP: VOICE OVER IP
VOIP: VOICE OVER IPVideoguy
 
6293213 sip-presentation
6293213 sip-presentation6293213 sip-presentation
6293213 sip-presentationJoe Trial
 
Colt wholesale vpn customer presentation
Colt wholesale vpn customer presentationColt wholesale vpn customer presentation
Colt wholesale vpn customer presentationacaiani
 

Mais procurados (20)

El camino hacia la 5G - Isidro Nieto from Ericsson at VI Jornadas Cátedras Te...
El camino hacia la 5G - Isidro Nieto from Ericsson at VI Jornadas Cátedras Te...El camino hacia la 5G - Isidro Nieto from Ericsson at VI Jornadas Cátedras Te...
El camino hacia la 5G - Isidro Nieto from Ericsson at VI Jornadas Cátedras Te...
 
Practical Fundamentals of Voice over IP (VoIP) for Engineers and Technicians
Practical Fundamentals of Voice over IP (VoIP) for Engineers and TechniciansPractical Fundamentals of Voice over IP (VoIP) for Engineers and Technicians
Practical Fundamentals of Voice over IP (VoIP) for Engineers and Technicians
 
VoIP - Technology To Business Models
VoIP - Technology To Business ModelsVoIP - Technology To Business Models
VoIP - Technology To Business Models
 
Sinnreich Henry Johnston Alan Pt 2
Sinnreich Henry Johnston Alan   Pt 2Sinnreich Henry Johnston Alan   Pt 2
Sinnreich Henry Johnston Alan Pt 2
 
Avaya VoIP on Cisco Best Practices by PacketBase
Avaya VoIP on Cisco Best Practices by PacketBaseAvaya VoIP on Cisco Best Practices by PacketBase
Avaya VoIP on Cisco Best Practices by PacketBase
 
VoIP (Voice over Internet Protocol)
VoIP (Voice over Internet Protocol)VoIP (Voice over Internet Protocol)
VoIP (Voice over Internet Protocol)
 
VoIP - seminar at IASRI, New Delhi
VoIP - seminar at IASRI, New DelhiVoIP - seminar at IASRI, New Delhi
VoIP - seminar at IASRI, New Delhi
 
Telex Radio Dispatch: brochure
Telex Radio Dispatch: brochureTelex Radio Dispatch: brochure
Telex Radio Dispatch: brochure
 
Skystar 360 E Data Sheet
Skystar 360 E Data SheetSkystar 360 E Data Sheet
Skystar 360 E Data Sheet
 
Introduction to VoIP
Introduction to VoIPIntroduction to VoIP
Introduction to VoIP
 
IP Multimedia Subsystem architecture overview
IP Multimedia Subsystem architecture overviewIP Multimedia Subsystem architecture overview
IP Multimedia Subsystem architecture overview
 
Bluetooth Aplication
Bluetooth AplicationBluetooth Aplication
Bluetooth Aplication
 
IMS IP multimedia subsystem presentation
IMS IP multimedia subsystem presentationIMS IP multimedia subsystem presentation
IMS IP multimedia subsystem presentation
 
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
 
VOIP: VOICE OVER IP
VOIP: VOICE OVER IPVOIP: VOICE OVER IP
VOIP: VOICE OVER IP
 
VOIP QOS
VOIP QOSVOIP QOS
VOIP QOS
 
Download
DownloadDownload
Download
 
6293213 sip-presentation
6293213 sip-presentation6293213 sip-presentation
6293213 sip-presentation
 
Colt wholesale vpn customer presentation
Colt wholesale vpn customer presentationColt wholesale vpn customer presentation
Colt wholesale vpn customer presentation
 
Voip
VoipVoip
Voip
 

Semelhante a Bluetooth

Bluetooth Power point presentation
Bluetooth Power point presentationBluetooth Power point presentation
Bluetooth Power point presentationjogiparthyramya
 
R K 2 Bluetooth Technologies
R K 2  Bluetooth  TechnologiesR K 2  Bluetooth  Technologies
R K 2 Bluetooth TechnologiesSaurav Kumar
 
Bluetooth Intro
Bluetooth IntroBluetooth Intro
Bluetooth Introamit_monty
 
Protols used in bluetooth
Protols used in bluetoothProtols used in bluetooth
Protols used in bluetoothSonali Parab
 
Bluethooth Protocol stack/layers
Bluethooth Protocol stack/layersBluethooth Protocol stack/layers
Bluethooth Protocol stack/layersJay Nagar
 
Other types of networks: Bluetooth, Zigbee, & NFC
Other types of networks: Bluetooth, Zigbee, & NFCOther types of networks: Bluetooth, Zigbee, & NFC
Other types of networks: Bluetooth, Zigbee, & NFCDilum Bandara
 
Module 2_part 2.pptx
Module 2_part 2.pptxModule 2_part 2.pptx
Module 2_part 2.pptxNIKHILAS12
 
LTE Femtocell Roadmap- From Concept to Reality
LTE Femtocell Roadmap- From Concept to RealityLTE Femtocell Roadmap- From Concept to Reality
LTE Femtocell Roadmap- From Concept to RealityContinuous Computing
 
Bluetooth Technology By Volkan Sevindik
Bluetooth Technology By Volkan SevindikBluetooth Technology By Volkan Sevindik
Bluetooth Technology By Volkan Sevindikvsevindik
 
Wireless & Mobile Lecture # 20
Wireless & Mobile Lecture # 20Wireless & Mobile Lecture # 20
Wireless & Mobile Lecture # 20Bit Hacker
 
Bluetooth protocol stack
Bluetooth protocol stackBluetooth protocol stack
Bluetooth protocol stackstuimrozsm
 
Wireless Personal Area Networks
Wireless Personal Area NetworksWireless Personal Area Networks
Wireless Personal Area NetworksDilum Bandara
 
Bluetooth versus wi
Bluetooth versus wiBluetooth versus wi
Bluetooth versus wisher1242
 
Bluetooth and profiles on WEC7
Bluetooth and profiles on WEC7Bluetooth and profiles on WEC7
Bluetooth and profiles on WEC7gnkeshava
 
Network protocols
Network protocolsNetwork protocols
Network protocolsIT Tech
 
JSR82: Past, Present and Future
JSR82: Past, Present and FutureJSR82: Past, Present and Future
JSR82: Past, Present and FutureSean O'Sullivan
 

Semelhante a Bluetooth (20)

Bluetooth Power point presentation
Bluetooth Power point presentationBluetooth Power point presentation
Bluetooth Power point presentation
 
R K 2 Bluetooth Technologies
R K 2  Bluetooth  TechnologiesR K 2  Bluetooth  Technologies
R K 2 Bluetooth Technologies
 
Bluetooth Intro
Bluetooth IntroBluetooth Intro
Bluetooth Intro
 
Protols used in bluetooth
Protols used in bluetoothProtols used in bluetooth
Protols used in bluetooth
 
Bluethooth Protocol stack/layers
Bluethooth Protocol stack/layersBluethooth Protocol stack/layers
Bluethooth Protocol stack/layers
 
Other types of networks: Bluetooth, Zigbee, & NFC
Other types of networks: Bluetooth, Zigbee, & NFCOther types of networks: Bluetooth, Zigbee, & NFC
Other types of networks: Bluetooth, Zigbee, & NFC
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Module 2_part 2.pptx
Module 2_part 2.pptxModule 2_part 2.pptx
Module 2_part 2.pptx
 
LTE Femtocell Roadmap- From Concept to Reality
LTE Femtocell Roadmap- From Concept to RealityLTE Femtocell Roadmap- From Concept to Reality
LTE Femtocell Roadmap- From Concept to Reality
 
Bluetooth Technology By Volkan Sevindik
Bluetooth Technology By Volkan SevindikBluetooth Technology By Volkan Sevindik
Bluetooth Technology By Volkan Sevindik
 
Wireless & Mobile Lecture # 20
Wireless & Mobile Lecture # 20Wireless & Mobile Lecture # 20
Wireless & Mobile Lecture # 20
 
Bluetooth protocol stack
Bluetooth protocol stackBluetooth protocol stack
Bluetooth protocol stack
 
Wireless Personal Area Networks
Wireless Personal Area NetworksWireless Personal Area Networks
Wireless Personal Area Networks
 
Bluetooth versus wi
Bluetooth versus wiBluetooth versus wi
Bluetooth versus wi
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth and profiles on WEC7
Bluetooth and profiles on WEC7Bluetooth and profiles on WEC7
Bluetooth and profiles on WEC7
 
Network protocols
Network protocolsNetwork protocols
Network protocols
 
MC Module 4.docx
MC Module 4.docxMC Module 4.docx
MC Module 4.docx
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
JSR82: Past, Present and Future
JSR82: Past, Present and FutureJSR82: Past, Present and Future
JSR82: Past, Present and Future
 

Último

4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sectoritnewsafrica
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...itnewsafrica
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...amber724300
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Karmanjay Verma
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Mark Simos
 

Último (20)

4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
 

Bluetooth

  • 1. Bluetooth Technology Naitik A Gosar November 27 2011s Bluetooth 1
  • 2. Bluetooth A new global standard for data and voice Goodbye Cables ! Bluetooth 2
  • 3. Ultimate Headset Bluetooth 3
  • 4. Cordless Computer Bluetooth 4
  • 5. Automatic Synchronization In the Office At Home Bluetooth 5
  • 6. Bluetooth Specifications Connection Type Spread Spectrum (Frequency Hopping) MAC Scheme FH-CDMA Spectrum 2.4 GHz ISM Modulation Gaussian Frequency Shift Keying Transmission Power 1 mw – 100 mw Aggregate Data Rate 1 Mbps Range 30 ft Supported Stations 8 devices Voice Channels 3 Data Security- Authentication Key 128 bit key Data Security-Encryption Key 8-128 bits (configurable) Bluetooth 6
  • 7. Bluetooth Protocol Stack Composed of protocols to allow Bluetooth devices to locate each Applications other and to create, configure and manage both physical and IP logical links that allow higher SDP RFCOMM ol layer protocols and applications ntr to pass data through these Co Data transport protocols L2CAP Audio Link Manager Baseband Transport Protocol Group RF Bluetooth 7
  • 8. Transport Protocol Group (contd.) ¢Radio Frequency (RF) Sending and receiving modulated bit streams Baseband Defines the timing, framing Flow control on the link. Link Manager ¢ Managing the connection states. ¢ Enforcing Fairness among slaves. ¢ Power Management Logical Link Control &Adaptation Protocol Handles multiplexing of higher level protocols Segmentation & reassembly of large packets Device discovery & QoS Bluetooth 8
  • 9. Middleware Protocol Group Additional transport protocols to allow existing and new applications to operate over Bluetooth. Packet based telephony Applications control signaling protocol also present. IP Also includes Service Discovery SDP RFCOMM ol Protocol. ntr Co Data Middleware Protocol Group Middleware Protocol Group L2CAP Audio Link Manager Baseband RF Bluetooth 9
  • 10. Middleware Protocol Group (contd.) ¢ Service Discovery Protocol (SDP) Means for applications to discover device info, services and its characteristics. ¢ TCP/IP Network Protocols for packet data communication, routing ¢ RFCOMM Cable replacement protocol, emulation of serial ports over wireless network Bluetooth 10
  • 11. Application Group Application Group Applications IP SDP RFCOMM ol Consists of Bluetooth aware as well as ntr un-aware applications. Co Data L2CAP Audio Link Manager Baseband RF Bluetooth 11
  • 12. Master - Slave ¢ Master Device in Piconet whose clock and hopping sequence are used to synchronize all other devices (slaves) in the Piconet. It also carries out Paging procedure and also Connection Establishment. ¢ Slaves Units within the piconet that are syncronized to the master via its clock and hopping sequence. After connetion establishment, Slaves are assigned a temporary 3 bit member address to reduce the no. of addresing bits required Bluetooth 12
  • 13. Piconets Point to Point Link Master - slave relationship m s Bluetooth devices can function as masters or slaves ¢ Piconet It is the network formed by a Master and one or more slaves (max 7). m Each piconet is defined by a different hopping channel to which users synchronize to. Each piconet has max capacity (1 Mbps). s s s Hopping pattern is determined by the master. Bluetooth 13
  • 14. Piconet Structure Master Active Slave Parked Slave Standby Bluetooth 14
  • 15. Physical Link Types Synchronous Connection Oriented (SCO) Point to Point Full Duplex between Master & Slave Established once by master & kept alive till released by Master Typically used for Voice connection ( to guarantee continuity ) Master reserves slots used for SCO link on the channel to preserve time sensitive information Asynchronous Connection Link (ACL) It is a momentary link between master and slave. No slots are reserved. It is a Point to Multipoint connection. Symmetric & Asymmetric links possible Bluetooth 15
  • 16. Packet Types Control Data/voice packets packets Voice data ID* Null HV1 DM1 DH1 Poll HV2 DM3 DH3 FHS HV3 DM5 DH5 DM1 DV Access Code Header Payload Bluetooth 16
  • 17. Packet Structure 72 bits 54 bits 0 - 2744 bits Access Header Payload Code Voice header Data CRC No CRC ARQ No retries FEC (optional) FEC (optional) Bluetooth 17
  • 18. Access Code ¢ Purpose Synchronization DC offset compensation Identification Signaling ¢ Types l Channel Access Code (CAC) • Identifies a piconet. l Device Access Code (DAC) • Used for signalling procedures like paging and response paging. l Inquiry Access Code (IAC) • General IAC is common to all devices, Dedicated IAC is for a dedicated group of Bluetooth devices that share a common characteristic. Bluetooth 18
  • 19. Packet Header Addressing ( 3 bits ) Packet type (4 bits ) Flow Control ( 1 bit ) 1-bit ARQ Sequencing ( 1 bit ) For filtering retransmitted packets HEC ( 8 bit ) Verify header integrity Bluetooth 19
  • 20. Connection State Machine Inquiry Page Standby Connected Transmit data Park Hold Sniff Bluetooth 20
  • 21. Connection State Machine (contd.) ¢ Inquiry Scan l A device that wants to be discovered will periodically enter this mode and listen for inquiry packets. ¢ Inquiry Device sends an Inquiry packet addressed to GIAC or DIAC Transmission is repeated on the inquiry hop sequence of frequencies. ¢ Inquiry Response When an inquiry message is received in the inquiry scan state, a response packet (FHS) containing the responding device address must be sent after a random number of slots. Bluetooth 21
  • 22. Connection State Machine (contd.) ¢ Inquiry Response Bluetooth 22
  • 23. Connection State Machine (contd.) Page The master uses the clock information, about the slave to be paged, to determine where in the hop sequence, the slave might be listening in the page scan mode. The master sends a page message Page Scan The page scan substate can be entered by the slave from the standby state or the connection state. It listens to packets addressed to its DAC. Page Response On receiving the page message, the slave enters the slave page response substate. It sends back a page response consisting of its ID packet which contains its DAC, at the frequency for the next slot from the one in which page message was received. Bluetooth 23
  • 24. Power Control Modes ¢ Sniff Mode l This is a low power mode in which the listening activity of the slave is reduced. l In the sniff mode, the slave listens for transmissions only at fixed intervals Tsniff, at the offset slot Dsniff for Nsniff times. These parameters are given by the LMP in the master when it issues the SNIFF command to the slave. ¢ Hold Mode l Slave temporarily (for Thold sec) does not support ACL packets on the channel (possible SCO links will still be supported). l By this capacity can be made free to do other things like scanning, paging, inquiring, or attending another piconet. l The slave unit keeps its active member address (AM_ADDR). Bluetooth 24
  • 25. Power Control Modes (contd.) ¢ Park Mode This is a very low power mode with very little activity. The slave however, stays synchronized to the channel. The parked slaves regularly listen for beacon signals at intervals decided by the beacon structure communicated to the slave during the start of parking. The parked slave has to be informed about a transmission in a beacon channel which is supported by the master to keep parked slaves in synchronization and send them any other information. Any message to be sent to a parked member are sent over the broadcast channel. It also helps the master to have more than seven slaves. Bluetooth 25
  • 26. Security ¢ Security Measures Limited/Restricted Access to authorized users. Both Link Level Encryption & Authentication. Personal Identification Numbers (PIN) for device access. Long encryption keys are used (128 bit keys). These keys are not transmitted over wireless. Other parameters are transmitted over wireless which in combination with certain information known to the device, can generate the keys. Further encryption can be done at the application layer. ¢ Security values Device Address-Public Authentication Key(128 bits)-Private Encryption Key(8-128 bits)-Private Random Number Bluetooth 26
  • 27. Frequency Hop Spread-Spectrum • Bluetooth channel is represented by a pseudo random hopping sequence through the entire 79 RF frequencies • Nominal hop rate of 1600 hops per second • Channel Spacing is 1 MHz Bluetooth 27
  • 28. Time-Division Duplex Scheme • Bluetooth devices use a Time-Division Duplex (TDD) scheme • Channel is divided into consecutive slots (each 625 µs) • One packet can be transmitted per slot • Subsequent slots are alternatively used for transmitting and receiving  Strict alternation of slots b/t the master and the slaves  Master can send packets to a slave only in EVEN slots  Slave can send packets to the master only in the ODD slots Bluetooth 28
  • 29. Performance Analysis of Link (Reference: Pedersen and Eggers, VTC 2000) • Results collected from “real” Bluetooth link • two notebook PC’s • PC cards from Digianswer - full power devices P = 20 dBm t • Indoor Measurements - stationary master and slave • Outdoor Measurements - slave moves in circle R = 3- at 1.5 RPM Bluetooth 29
  • 30. Test Parameters • Testing done from a master to a single slave  No major sources of interference • Tests used DH5 packet only 72 bits 54 bits 0 - 2744 bits Access Header Payload Code 8-bit HEC 16-bit payload CRC Bluetooth 30
  • 31. Pictures Bluetooth 31
  • 32. Results: Indoor Bluetooth 32
  • 33. Results: Outdoor Bluetooth 33
  • 34. How reliable are Bluetooth Devices ? • Indoor:  Within 10 meters  Within 25 meters, with LOS  Further…?  Concrete, Glass….? • Outdoor:  Within 150-220 meters with LOS  More than 220 meters Bluetooth 34
  • 35. Analytic Analysis of Link (Reference: A.Kumar and A.Karnik, ICPWC 2000) • Goal: Find a bound on the BER as a function of network size m s s s s m s s m m s s s s s s Bluetooth 35
  • 36. The Problem • Occasionally, two piconets will use overlapping frequencies Bluetooth 36
  • 37. Assumptions and Parameters • “Open” (LOS) indoor room; circular with radius R • Received power is a random variable - mean received power falls off as d2 - for fixed d, signal fading is Rician with K = 6dB • Interference from other Bluetooth devices only - ignore 802.11, microwaves • Time offset of each Piconet is uniform [0,T] Bluetooth 37
  • 38. SIR calculation • For a reference piconet f(t) because the interfering and receiving devices within a piconet change with time • Ignore noise power I 2.5 nW for device within Bluetooth specs operating at 1Mbps with BER < .001 Bluetooth 38
  • 39. SIR Calculation (cont.) Probability of Outage: Total interference power Prob. that exactly n piconets from n interfering piconets are interfering Bluetooth 39
  • 40. SIR Calculation (cont.) • Evaluation of Pout is complicated and requires numerical techniques (see reference) • Some results (for R = 5m; uniform distribution) Interferers Lower Bound on Pout V = 14dB V = 11dB 1 1.14 % 1.03 % 2 2.27 % 2.04% • In general Pout increases linearly with M Pout (M-1) / Nf Bluetooth 40
  • 41. Other Technologies ¢ IrDA Infrared, LOS, serial data comm. Point to point Intended for Data Communication Simple to configure and use Both devices must be stationary, for synchronization Can not penetrate solid objects Bluetooth 41
  • 42. IrDA vs Bluetooth ¢ Bluetooth Advantages Point to Multipoint Data & Voice Broadcast Easier Synchronization due to omnidirectional and no LOS requirement Devices can be mobile Range 10 m ¢ IrDA Currently 16 Mbps Ample security and very less interference Already ubiquitous & Low cost Bluetooth 42
  • 43. Bluetooth: Today and Tomorrow… ¢ First market-ready product shipped November 2000 Digital headset produced by GN Netcom $300 Bluetooth 43
  • 44. Bluetooth: Today and Tomorrow.. (cont.) • Will Bluetooth become a household name? Bluetooth 44
  • 45. Conclusions ¢ A new global standard for data and voice ¢ Eliminate Cables ¢ Low Power, Low range, Low Cost network devices ¢ Delivers Automatic synchronicity between devices ¢ Future Improvements Master-Slave relationship can be adjusted dynamically for optimal resource allocation and utilization Adaptive, closed loop transmit power control can be implemented to further reduce unnecessary power usage Bluetooth 45
  • 46. References [1] Bluetooth Consortium : http://www.bluetooth.com http://www.ericsson.com/bluetooth/ [2] Bluetooth Tutorial : http://www.ee.iitb.ernet.in/uma/~aman/bluetooth http://www.palowireless.com [3] G.F.Pedersen, P.Eggers, “Initial Investigation of the Bluetooth Link”, VTC, pp 64 – 70 [4] J.C.Haartsen, et al, “Bluetooth – A New Low-Power Radio Internface Providing Short-Range Connectivity”, IEEE Proc. , Vol 88, No.10, Oct 2000 [5] Min-Chul Ju, et al. , “Channel Estimation and DC-Offset Compensation Schemes for Frequency Hopped Bluetooth Networks”, IEEE Communications Letters, Vol 5, No.1, Jan 2001 Bluetooth 46