BLUEtooth Batch 4
-
Upload
rahul-kumar -
Category
Documents
-
view
122 -
download
0
description
Transcript of BLUEtooth Batch 4
BLUETOOTH: A Wireless Revolution
SUKALYAN SUJIT MAHENDRARAHUL
CORDLESS COMPUTER
1994 – Ericsson study on a wireless technology to link mobile phones & accessories. 5 companies joined to form the Bluetooth Special Interest Group (SIG) in 1998. First specification released in July 1999.
1994 : Ericsson study complete / vision 1995 : Engineering work begins 1997 : Intel agrees to collaborate 1998 : Bluetooth SIG formed: Ericsson, Intel, IBM, Nokia & Toshiba 1999 : Bluetooth Specification 1.0A SIG promoter group Expanded: 3Com, Lucent, Microsoft & Motorola. 2000 : Bluetooth Specification 1.0B, 2000+ adopters 2001 : First retail products released, Specification 1.1 2003 : Bluetooth Specification 1.2 2005 : Bluetooth Specification 2.0 (?)
WHAT IS BLUETOOTH?
Originally conceived as a cable replacement technology
Short-Range Wireless Solutions Open Specification Voice and Data Capability Worldwide Usability A RECENT ONE
ONE OF THE FIRST MODULE(ERICSSON)
Eliminate cables Inexpensive Easy to set up and use Readily available Good security Device compatibility
RANGE OF BLUETOOTH
Class 3 radios – have a range of up to 1 meter or 3 feet
Class 2 radios – most commonly found in mobile devices – have a range of 10 meters or 30 feet Class 1 radios – used primarily in industrial
use cases – have a range of 100 meters or 300 feet
POWER CONSUMPTION : The most commonly used radio is Class 2 and uses 2.5 mW of power. Bluetooth technology is designed to have very low power consumption. SPEED OF BLUETOOTH : 1 Mbps for Version 1.2 Up to 3 Mbps supported for Version 2.0
BLUETOOTH TECHNOLOGY
Bluetooth Devices Must Necessary ContainFour h/w Features
A Radio Frequency Section A Baseband Microprocessor A memory An Interface To the Host Device
Piconet is the fundamental form of communication for Bluetooth Wireless technology.
Master & Slaves. The master Bluetooth device can communicate with up tp 7 devices. Data can be transferred b/w the master & one
other device. The master switches rapidly from device to
another in a round-robin fashion.
M-masterS-SlaveP-ParkedSB-Standby
M M
S
S S
S
P
P
P
P
S
SB
All devices in a piconet use the same frequency-hopping pattern
Piconet 1 Piconet 2
SS
S
Two or more Piconets can be connected together to form a Scatternet.
Some devices act as a bridge by simultaneously playing the master role & the slave role in one piconet.
All devices in a piconet use the same frequency-hopping pattern
External Antenna
Power
FILTER
Bluecore 2- External
8 Mbit Flash Memory
UART/USB
PCM/ IOPIO
SPI
BLOCK DIAGRAM OF CHIP
AMPLIFIER
EXTERNAL RC CIRCUIT
Baseband
Bluetooth RadioBluetooth Radio
Link Manager (LM)Audio
Application
L2CAP
RFCOMM SDPTSC
OBEX
TCP/IP
PPP
ATCommands
HCI
RADIO PROTOCOL
Bluetooth transfers data in the frequency range between audio and infrared band of frequencies (2400MHz to 2500MHz) The Bandwidth is divided into many channels These channels are divided in time slots in which data is transmitted
BASEBAND PROTOCOL MANAGES:-- LINKS
SCO ACL
PACKETS
ACCESS CODE HEADER PAYLOAD
72 Bits 54 Bits 0- 2745 Bits
DEVICE CONNECTION STATE
Stand By
Connection
ERROR CORRECTION 1/3 rate FEC 2/3 rate FEC ARQ
LINK MANAGER PROTOCOL
MANAGES
Link Setup Authentication Link Configuration Low Lying Protocols
HOST CONTROLLER INTERFACE
Operates at three levels viz. the HOST, Transport Layer & the Host Controller Provides command interface to lower data link layers Provides access to h/w status and control registers
LOGICAL LINK CONTROL AND ADAPTATION LAYER PROTOCOL MANAGES Protocol Multiplexing
Segmentation and Reassembling
Group Abstraction
RFCOMM PROTOCOL
Establishes Process to Process Communication
Up to 60 simultaneous links can be set up
SDP PROTOCOL Manages underlying protocols
Provides service communication reliability Keeps Record Of the processes running in the host.
SDP request
SDP response
Fig: SDP Communication
Bluetooth vs. IR
BLUETOOTH IR
Point to multipoint Point to point
Data & Voice Only data
Easier Synchronization due Can’t penetrate
To Omni-directional solid devices
Range 10 m Range 1 m
Device can be mobile Devices must be
stationary
COMPARISION
COMPARISON
ADVANTAGES
• Wireless Technology
• Cost Effectiveness
• Low Power Consumption
• Acknowledgement System
ADVANTAGES
• Operates On Bi-directional Mode
• Voice And Data Co-exsits In this Technology
• Utilizes spread-spectrum frequency-hopping scheme
LIMITATIONS
• Short Range operations: About 10 meter
• Supports Data Transfer up to 1 mbps
• Bluetooth standards does not address routing in piconets and scatternets .
LIMITATIONS
• Multi-hop multicasting is absent in this technology.
• The only versions of MS Windows that have native support for BT are Windows XP Service Pack 2 and later
Security issue
While Bluetooth has its benefits, it is susceptible to denial of service attacks, eavesdropping, man-in-the-middle attacks, message modification, and resource misappropriation.
Timeline of Security Concern2001 - Jaobsson and Wetzel from Bell Laboratories discovered flaws in the pairing protocol of Bluetooth, and also pointed to vulnerabilities in the encryption scheme.
2003 - Ben and Adam Laurie from A.L. Digital Ltd. discovered that serious flaws in Bluetooth security may lead to disclosure of personal data.
2004 - first purported virus using Bluetooth to spread itself among mobile phones appeared on the Symbian OS. Also it was disclosed that with the help of directional antenna and signal amplifiers the range of bluetooth 2.0 can be amplified upto 1.08 mile.
2005 - a mobile malware worm known as Lasco.A began targeting mobile phones using Symbian OS (Series 60 platform) using Bluetooth-enabled devices to replicate itself and spread to other devices
2006 - researchers from Secure Network and F-Secure published a report that warns of the large number of devices left in a visible statek.
2007 - first Bluetooth PIN and Linkkeys cracker
BluejackingBluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers.
Usually harmless in nature.
Bluejacking was reportedly first carried out by a Malaysian IT consultant who used his phone to advertise Sony Ericsson.
BluesnarfingBluesnarfing is the unauthorized access of information from a wireless device through a Bluetooth connection, often between phones, desktops, laptops, and PDAs.
This allows access to a calendar, contact list, emails and text messages, and on some phones users can copy pictures and private videos.
Future of Bluetooth
Bluetooth low energyBluetooth low energy technology is an open radio technology for small devices. It addresses devices with very low battery capacity and is easily integrated with traditional Bluetooth
In many cases, products will be able to operate more than a year on a button cell battery without recharging.
It will be available by early 2010
Bluetooth low energy vs Classical Bluetooth
Thank You