Bluetooth Presented by: Ahmad Mohawish & Hasan Al-Khudhair.

31
Bluetooth Bluetooth Presented by Presented by : : Ahmad Mohawish Ahmad Mohawish & & Hasan Al-Khudhair Hasan Al-Khudhair
  • date post

    19-Dec-2015
  • Category

    Documents

  • view

    222
  • download

    1

Transcript of Bluetooth Presented by: Ahmad Mohawish & Hasan Al-Khudhair.

Page 1: Bluetooth Presented by: Ahmad Mohawish & Hasan Al-Khudhair.

BluetoothBluetooth

Presented byPresented by::Ahmad MohawishAhmad Mohawish

&&Hasan Al-KhudhairHasan Al-Khudhair

Page 2: Bluetooth Presented by: Ahmad Mohawish & Hasan Al-Khudhair.

OutlineOutline

• INTRODUCTIONINTRODUCTION

• SERVICES INTENDED TO PROVIDESERVICES INTENDED TO PROVIDE

• BLUETOOTH NETWORKBLUETOOTH NETWORK

• ADVANTIGES AND DISADVANTIGESADVANTIGES AND DISADVANTIGES

• OSI LAYERS USEDOSI LAYERS USED

• TYPE OF MODULATION USEDTYPE OF MODULATION USED

• PACKET FORMATPACKET FORMAT

• ERROR CONTROL USEDERROR CONTROL USED

• SECURITYSECURITY

• FUNNY THING ABOUT ITFUNNY THING ABOUT IT

Page 3: Bluetooth Presented by: Ahmad Mohawish & Hasan Al-Khudhair.

Bluetooth NamingBluetooth Naming

A Danish king Harald Blåtand (Harold I of Denmark in English),A Danish king Harald Blåtand (Harold I of Denmark in English),

King of Denmark and Norway from 935 and 936 respectively, to 940 King of Denmark and Norway from 935 and 936 respectively, to 940

KKnown for his unification of previously warring tribes from Denmark nown for his unification of previously warring tribes from Denmark

and Norway. and Norway.

Bluetooth likewise was intended to Bluetooth likewise was intended to unify different technologiesunify different technologies

like computers and mobile phones. like computers and mobile phones.

Page 4: Bluetooth Presented by: Ahmad Mohawish & Hasan Al-Khudhair.

Commercial OverviewCommercial Overview

• In 1998, Intel, IBM, Ericsson, Nokia and Toshiba formed the unified

among themselves and adopted the code name Bluetooth for their

proposed open specification.

• Major computing (Intel, IBM, and Toshiba) and telecommunications

(Nokia, Ericsson) leaders formed the Bluetooth Special Interest Group

(SIG).

• Their aim was to provide a royalty-free specification for a low-cost,

low-power, radio-based replacement for cable.

Page 5: Bluetooth Presented by: Ahmad Mohawish & Hasan Al-Khudhair.

Bluetooth SpecificationBluetooth Specification

*Communicate with each other using the international

2.4GHz ISM (Industrial, Scientific and Medical) band

*Maximum capacity of 1Mbit/second.

*Specification protocol defines one universal 1Mbit/s full-

duplex.

*Short-range radio channel that may connect up to eight

portable, digital devices.

Page 6: Bluetooth Presented by: Ahmad Mohawish & Hasan Al-Khudhair.

Bluetooth SpecificationBluetooth Specification

• Provides support for both voice and data transmission

• Uses a radio frequency that is available worldwide

• Low energy consumption.

• A Bluetooth device can go into one of three low power

modes if no data is ready to be sent

Page 7: Bluetooth Presented by: Ahmad Mohawish & Hasan Al-Khudhair.

SERVICES INTENDED TO PROVIDESERVICES INTENDED TO PROVIDE

1)1)The Three-in-One Phone:The Three-in-One Phone:

This phone will have three functions:This phone will have three functions:

• When you are at home, it functions as a wireless fixed line (fixed line When you are at home, it functions as a wireless fixed line (fixed line

charge);charge);

• Away from home, it functions as a mobile phone (cellular charge);Away from home, it functions as a mobile phone (cellular charge);

• When the phone comes into range of another phone with in-built Bluetooth When the phone comes into range of another phone with in-built Bluetooth

technology, it may function as a walkie-talkie (no telephone charge).technology, it may function as a walkie-talkie (no telephone charge).

Page 8: Bluetooth Presented by: Ahmad Mohawish & Hasan Al-Khudhair.

SERVICES INTENDED TO PROVIDESERVICES INTENDED TO PROVIDE

2) 2) Hidden Computing Model:Hidden Computing Model:

The Bluetooth SIG predicts that a Bluetooth device will The Bluetooth SIG predicts that a Bluetooth device will

function automatically and may send you periodic updates function automatically and may send you periodic updates

(within a 10m-100m range).(within a 10m-100m range).

This means that you may be alerted to new emails and telephone This means that you may be alerted to new emails and telephone

calls, even if your phone/PDA is situated in the next room!calls, even if your phone/PDA is situated in the next room!

Page 9: Bluetooth Presented by: Ahmad Mohawish & Hasan Al-Khudhair.

SERVICES INTENDED TO PROVIDESERVICES INTENDED TO PROVIDE

3) 3) Automatic Background Synchronization:Automatic Background Synchronization:

As soon as you come within a ten metre range of As soon as you come within a ten metre range of your PC, the appointments calendar on your PDA will your PC, the appointments calendar on your PDA will be automatically updated to agree with the one on be automatically updated to agree with the one on your PC, or vice versa.your PC, or vice versa.

4) 4) Wireless Internet Connection:Wireless Internet Connection:To provide networking connectivity to the InternetTo provide networking connectivity to the Internet

Page 10: Bluetooth Presented by: Ahmad Mohawish & Hasan Al-Khudhair.

AD-HOCAD-HOC

• Master/slave-based MAC (Medium Access Control)

protocol

• Each unit may be distinguished using its unique

(Bluetooth Device A) 48-bit address.

Page 11: Bluetooth Presented by: Ahmad Mohawish & Hasan Al-Khudhair.

AD-HOCAD-HOC

• To establish a new piconet:

a unit initiates a connection by sending a page message,

if it knows the address of the receiver.

OR an address inquiry message followed by a page message

IF the receiver's address is unknown.

• The initiating unit is temporarily assigned as master.

Page 12: Bluetooth Presented by: Ahmad Mohawish & Hasan Al-Khudhair.

Bluetooth NetworkingBluetooth Networking

• Piconets

• subnet of max. users of 8

• one MASTER and seven SLAVES

• MASTER/SLAVE

• SLAVE/SLAVE

Page 13: Bluetooth Presented by: Ahmad Mohawish & Hasan Al-Khudhair.

Bluetooth NetworkBluetooth Network

Page 14: Bluetooth Presented by: Ahmad Mohawish & Hasan Al-Khudhair.

Bluetooth NetworkBluetooth Network

Page 15: Bluetooth Presented by: Ahmad Mohawish & Hasan Al-Khudhair.

Advantages of BluetoothAdvantages of Bluetooth

• Wireless technology

• Minimal power usage

• Minimal to no interference with other wireless devices (low

power)

• Minimal to no noise interference from other wireless

devices (low power)

• Relatively high bandwidth of about 712 Kbps (max)

Page 16: Bluetooth Presented by: Ahmad Mohawish & Hasan Al-Khudhair.

• Relatively high upstream bandwidth of up to432 Kbps

(sending)

• Network Fields can extend up to 100m with Hub

broadcasters

• Supports many Devices

• Supports half and full duplex communications

• Supports Multimedia

Advantages of BluetoothAdvantages of Bluetooth

Page 17: Bluetooth Presented by: Ahmad Mohawish & Hasan Al-Khudhair.

Disadvantages Of BluetoothDisadvantages Of Bluetooth

• It is only a 1 to 1 Network device

• Relative Piconet (personal area network) is

small at a maximum of 10m

• Wi-Fi technology seems to be on the rise, hence

the Bluetooth market maybe decreasing

• Limited voice compatibility

Page 18: Bluetooth Presented by: Ahmad Mohawish & Hasan Al-Khudhair.

ApplicationsApplications

• Wireless networking between laptops,mobiles …where little bandwidth is Wireless networking between laptops,mobiles …where little bandwidth is

requiredrequired

• Bluetooth appliances such as printers, mice and keyboards Bluetooth appliances such as printers, mice and keyboards

• Transfer of files (images, mp3s, etc) between mobile phones, Personal digital Transfer of files (images, mp3s, etc) between mobile phones, Personal digital

assistants (PDAs) and computers via OBEX assistants (PDAs) and computers via OBEX

• Certain mp3 players and digital cameras to transfer files to and from computers Certain mp3 players and digital cameras to transfer files to and from computers

• Bluetooth headsets for mobile phones and smartphonesBluetooth headsets for mobile phones and smartphones

• Bluetooth car kitsBluetooth car kits

For remote controlsFor remote controls

Page 19: Bluetooth Presented by: Ahmad Mohawish & Hasan Al-Khudhair.

Bluetooth OSI LayersBluetooth OSI Layers

Page 20: Bluetooth Presented by: Ahmad Mohawish & Hasan Al-Khudhair.

Bluetooth OSI LayersBluetooth OSI Layers

Controls Piconet Controls Piconet management, link management, link configuration, and configuration, and securitysecurity

Provides serial Provides serial cable emulationcable emulation

Cordless Cordless Telephony Telephony ProfileProfile

Headset Headset ProfileProfile

Object Exchange Object Exchange ProtocolProtocol

Handles Handles multiplexing of multiplexing of higher layer higher layer protocols, and protocols, and quality of servicequality of service

Query for Query for servicesservices

Serial Port Serial Port ProfileProfile

Defines timing, framing, Defines timing, framing, and flow control on the and flow control on the linklink

Controls the Controls the sending and sending and receiving of receiving of modulated modulated bitstreamsbitstreams

Page 21: Bluetooth Presented by: Ahmad Mohawish & Hasan Al-Khudhair.

Bluetooth OSI LayersBluetooth OSI Layers• CTP :CTP : Cordless Telephony Profile

• HP :HP : Headset Profile

• SPP :SPP : Serial Port Profile

• PPP :PPP : Point To Point Protocol

• OBEX :OBEX : Object Exchange Protocol

• TCP :TCP : Transmission Control Protocol

• SDP :SDP : Service Discovery Protocol (Query for services)

• L2CAP :L2CAP :Logical Link Control and Adaptation Protocol (Handles

multiplexing of higher layer protocols, and quality of service)

• RFCOMM:RFCOMM: Provides serial cable emulation

• Link Manager :Link Manager : Controls Piconet management, link configuration, and

security

• Baseband :Baseband : Defines timing, framing, and flow control on the link

• RF :RF : Controls the sending and receiving of modulated bitstreams

• Link Controller:Link Controller: Interface to baseband and link manager

Page 22: Bluetooth Presented by: Ahmad Mohawish & Hasan Al-Khudhair.

Type of ModulationType of Modulation

• Frequency Hopping Spread Spectrum Frequency Hopping Spread Spectrum

(FHSS).(FHSS).

– 1600 hops/sec.1600 hops/sec.

– 79 frequency channels.79 frequency channels.

– 1 MHz/channel i.e. 1 Mbps.1 MHz/channel i.e. 1 Mbps.

– 220µs switching time.220µs switching time.

Page 23: Bluetooth Presented by: Ahmad Mohawish & Hasan Al-Khudhair.

Type of ModulationType of Modulation

Page 24: Bluetooth Presented by: Ahmad Mohawish & Hasan Al-Khudhair.

Type of ModulationType of Modulation

• TDMA-TDDTDMA-TDD– 625 µs time slot duration625 µs time slot duration

Page 25: Bluetooth Presented by: Ahmad Mohawish & Hasan Al-Khudhair.

Type of ModulationType of Modulation

•Multi-slot frameMulti-slot frame

Page 26: Bluetooth Presented by: Ahmad Mohawish & Hasan Al-Khudhair.

Packet FormatPacket Format

• Packet Types:Packet Types:– HV1, HV2, HV3 - Voice packetsHV1, HV2, HV3 - Voice packets– DV - Mixed voice/dataDV - Mixed voice/data– DM1, DM3, DM5 - Protected data packetsDM1, DM3, DM5 - Protected data packets– AUX1, DH1, DH3, DH5 - Unprotected data AUX1, DH1, DH3, DH5 - Unprotected data

packetspackets– NULL, POLL, ID, FHS - Baseband control NULL, POLL, ID, FHS - Baseband control

packetspackets

Page 27: Bluetooth Presented by: Ahmad Mohawish & Hasan Al-Khudhair.

Error Control UsedError Control Used

• FEC (Forward Error Correction)FEC (Forward Error Correction)– 1/3 FEC - Repeat each bit 3 times1/3 FEC - Repeat each bit 3 times– 2/3 FEC - (15,10) shortened Hamming 2/3 FEC - (15,10) shortened Hamming

codecode

• ARQ (Automatic Repeat Request)ARQ (Automatic Repeat Request)• CRC (Cyclic Redundancy Check)CRC (Cyclic Redundancy Check)

– HEC (Header Error Check)HEC (Header Error Check)– Payload CRCPayload CRC

Page 28: Bluetooth Presented by: Ahmad Mohawish & Hasan Al-Khudhair.

SecuritySecurity

None—None—all Bluetooth devices are allowed to all Bluetooth devices are allowed to

connect.connect.

Authorization—Authorization—the local device operator must the local device operator must

authorize a remote device connection, usually by authorize a remote device connection, usually by

physically clicking an on-screen button.physically clicking an on-screen button.

Authentication— Authentication— remote devices must provide remote devices must provide

a password that matches that of the local device.a password that matches that of the local device.

Page 29: Bluetooth Presented by: Ahmad Mohawish & Hasan Al-Khudhair.

SecuritySecurity

Encryption— Encryption— connections with remote devices connections with remote devices

can be encrypted for additional security. can be encrypted for additional security.

Service Level— Service Level— individual local services may individual local services may

be disabled. Disabled services are not available to be disabled. Disabled services are not available to

any remote device. Service Level security is only any remote device. Service Level security is only

available on some types of devices.available on some types of devices.

Page 30: Bluetooth Presented by: Ahmad Mohawish & Hasan Al-Khudhair.

A FUNNY THING ABOUT A FUNNY THING ABOUT ITIT

• In August 2005, police in Cambridge In August 2005, police in Cambridge shire, England, issued warnings shire, England, issued warnings about thieves using Bluetooth-about thieves using Bluetooth-enabled phones to track other enabled phones to track other devices left in cars. devices left in cars.

Page 31: Bluetooth Presented by: Ahmad Mohawish & Hasan Al-Khudhair.

QUESTIONS?QUESTIONS?