Bluetooth Presented by: Ahmad Mohawish & Hasan Al-Khudhair.
-
date post
19-Dec-2015 -
Category
Documents
-
view
222 -
download
1
Transcript of Bluetooth Presented by: Ahmad Mohawish & Hasan Al-Khudhair.
BluetoothBluetooth
Presented byPresented by::Ahmad MohawishAhmad Mohawish
&&Hasan Al-KhudhairHasan Al-Khudhair
OutlineOutline
• INTRODUCTIONINTRODUCTION
• SERVICES INTENDED TO PROVIDESERVICES INTENDED TO PROVIDE
• BLUETOOTH NETWORKBLUETOOTH NETWORK
• ADVANTIGES AND DISADVANTIGESADVANTIGES AND DISADVANTIGES
• OSI LAYERS USEDOSI LAYERS USED
• TYPE OF MODULATION USEDTYPE OF MODULATION USED
• PACKET FORMATPACKET FORMAT
• ERROR CONTROL USEDERROR CONTROL USED
• SECURITYSECURITY
• FUNNY THING ABOUT ITFUNNY THING ABOUT IT
Bluetooth NamingBluetooth Naming
A Danish king Harald Blåtand (Harold I of Denmark in English),A Danish king Harald Blåtand (Harold I of Denmark in English),
King of Denmark and Norway from 935 and 936 respectively, to 940 King of Denmark and Norway from 935 and 936 respectively, to 940
KKnown for his unification of previously warring tribes from Denmark nown for his unification of previously warring tribes from Denmark
and Norway. and Norway.
Bluetooth likewise was intended to Bluetooth likewise was intended to unify different technologiesunify different technologies
like computers and mobile phones. like computers and mobile phones.
Commercial OverviewCommercial Overview
• In 1998, Intel, IBM, Ericsson, Nokia and Toshiba formed the unified
among themselves and adopted the code name Bluetooth for their
proposed open specification.
• Major computing (Intel, IBM, and Toshiba) and telecommunications
(Nokia, Ericsson) leaders formed the Bluetooth Special Interest Group
(SIG).
• Their aim was to provide a royalty-free specification for a low-cost,
low-power, radio-based replacement for cable.
Bluetooth SpecificationBluetooth Specification
*Communicate with each other using the international
2.4GHz ISM (Industrial, Scientific and Medical) band
*Maximum capacity of 1Mbit/second.
*Specification protocol defines one universal 1Mbit/s full-
duplex.
*Short-range radio channel that may connect up to eight
portable, digital devices.
Bluetooth SpecificationBluetooth Specification
• Provides support for both voice and data transmission
• Uses a radio frequency that is available worldwide
• Low energy consumption.
• A Bluetooth device can go into one of three low power
modes if no data is ready to be sent
SERVICES INTENDED TO PROVIDESERVICES INTENDED TO PROVIDE
1)1)The Three-in-One Phone:The Three-in-One Phone:
This phone will have three functions:This phone will have three functions:
• When you are at home, it functions as a wireless fixed line (fixed line When you are at home, it functions as a wireless fixed line (fixed line
charge);charge);
• Away from home, it functions as a mobile phone (cellular charge);Away from home, it functions as a mobile phone (cellular charge);
• When the phone comes into range of another phone with in-built Bluetooth When the phone comes into range of another phone with in-built Bluetooth
technology, it may function as a walkie-talkie (no telephone charge).technology, it may function as a walkie-talkie (no telephone charge).
SERVICES INTENDED TO PROVIDESERVICES INTENDED TO PROVIDE
2) 2) Hidden Computing Model:Hidden Computing Model:
The Bluetooth SIG predicts that a Bluetooth device will The Bluetooth SIG predicts that a Bluetooth device will
function automatically and may send you periodic updates function automatically and may send you periodic updates
(within a 10m-100m range).(within a 10m-100m range).
This means that you may be alerted to new emails and telephone This means that you may be alerted to new emails and telephone
calls, even if your phone/PDA is situated in the next room!calls, even if your phone/PDA is situated in the next room!
SERVICES INTENDED TO PROVIDESERVICES INTENDED TO PROVIDE
3) 3) Automatic Background Synchronization:Automatic Background Synchronization:
As soon as you come within a ten metre range of As soon as you come within a ten metre range of your PC, the appointments calendar on your PDA will your PC, the appointments calendar on your PDA will be automatically updated to agree with the one on be automatically updated to agree with the one on your PC, or vice versa.your PC, or vice versa.
4) 4) Wireless Internet Connection:Wireless Internet Connection:To provide networking connectivity to the InternetTo provide networking connectivity to the Internet
AD-HOCAD-HOC
• Master/slave-based MAC (Medium Access Control)
protocol
• Each unit may be distinguished using its unique
(Bluetooth Device A) 48-bit address.
AD-HOCAD-HOC
• To establish a new piconet:
a unit initiates a connection by sending a page message,
if it knows the address of the receiver.
OR an address inquiry message followed by a page message
IF the receiver's address is unknown.
• The initiating unit is temporarily assigned as master.
Bluetooth NetworkingBluetooth Networking
• Piconets
• subnet of max. users of 8
• one MASTER and seven SLAVES
• MASTER/SLAVE
• SLAVE/SLAVE
Bluetooth NetworkBluetooth Network
Bluetooth NetworkBluetooth Network
Advantages of BluetoothAdvantages of Bluetooth
• Wireless technology
• Minimal power usage
• Minimal to no interference with other wireless devices (low
power)
• Minimal to no noise interference from other wireless
devices (low power)
• Relatively high bandwidth of about 712 Kbps (max)
• Relatively high upstream bandwidth of up to432 Kbps
(sending)
• Network Fields can extend up to 100m with Hub
broadcasters
• Supports many Devices
• Supports half and full duplex communications
• Supports Multimedia
Advantages of BluetoothAdvantages of Bluetooth
Disadvantages Of BluetoothDisadvantages Of Bluetooth
• It is only a 1 to 1 Network device
• Relative Piconet (personal area network) is
small at a maximum of 10m
• Wi-Fi technology seems to be on the rise, hence
the Bluetooth market maybe decreasing
• Limited voice compatibility
ApplicationsApplications
• Wireless networking between laptops,mobiles …where little bandwidth is Wireless networking between laptops,mobiles …where little bandwidth is
requiredrequired
• Bluetooth appliances such as printers, mice and keyboards Bluetooth appliances such as printers, mice and keyboards
• Transfer of files (images, mp3s, etc) between mobile phones, Personal digital Transfer of files (images, mp3s, etc) between mobile phones, Personal digital
assistants (PDAs) and computers via OBEX assistants (PDAs) and computers via OBEX
• Certain mp3 players and digital cameras to transfer files to and from computers Certain mp3 players and digital cameras to transfer files to and from computers
• Bluetooth headsets for mobile phones and smartphonesBluetooth headsets for mobile phones and smartphones
• Bluetooth car kitsBluetooth car kits
For remote controlsFor remote controls
Bluetooth OSI LayersBluetooth OSI Layers
Bluetooth OSI LayersBluetooth OSI Layers
Controls Piconet Controls Piconet management, link management, link configuration, and configuration, and securitysecurity
Provides serial Provides serial cable emulationcable emulation
Cordless Cordless Telephony Telephony ProfileProfile
Headset Headset ProfileProfile
Object Exchange Object Exchange ProtocolProtocol
Handles Handles multiplexing of multiplexing of higher layer higher layer protocols, and protocols, and quality of servicequality of service
Query for Query for servicesservices
Serial Port Serial Port ProfileProfile
Defines timing, framing, Defines timing, framing, and flow control on the and flow control on the linklink
Controls the Controls the sending and sending and receiving of receiving of modulated modulated bitstreamsbitstreams
Bluetooth OSI LayersBluetooth OSI Layers• CTP :CTP : Cordless Telephony Profile
• HP :HP : Headset Profile
• SPP :SPP : Serial Port Profile
• PPP :PPP : Point To Point Protocol
• OBEX :OBEX : Object Exchange Protocol
• TCP :TCP : Transmission Control Protocol
• SDP :SDP : Service Discovery Protocol (Query for services)
• L2CAP :L2CAP :Logical Link Control and Adaptation Protocol (Handles
multiplexing of higher layer protocols, and quality of service)
• RFCOMM:RFCOMM: Provides serial cable emulation
• Link Manager :Link Manager : Controls Piconet management, link configuration, and
security
• Baseband :Baseband : Defines timing, framing, and flow control on the link
• RF :RF : Controls the sending and receiving of modulated bitstreams
• Link Controller:Link Controller: Interface to baseband and link manager
Type of ModulationType of Modulation
• Frequency Hopping Spread Spectrum Frequency Hopping Spread Spectrum
(FHSS).(FHSS).
– 1600 hops/sec.1600 hops/sec.
– 79 frequency channels.79 frequency channels.
– 1 MHz/channel i.e. 1 Mbps.1 MHz/channel i.e. 1 Mbps.
– 220µs switching time.220µs switching time.
Type of ModulationType of Modulation
Type of ModulationType of Modulation
• TDMA-TDDTDMA-TDD– 625 µs time slot duration625 µs time slot duration
Type of ModulationType of Modulation
•Multi-slot frameMulti-slot frame
Packet FormatPacket Format
• Packet Types:Packet Types:– HV1, HV2, HV3 - Voice packetsHV1, HV2, HV3 - Voice packets– DV - Mixed voice/dataDV - Mixed voice/data– DM1, DM3, DM5 - Protected data packetsDM1, DM3, DM5 - Protected data packets– AUX1, DH1, DH3, DH5 - Unprotected data AUX1, DH1, DH3, DH5 - Unprotected data
packetspackets– NULL, POLL, ID, FHS - Baseband control NULL, POLL, ID, FHS - Baseband control
packetspackets
Error Control UsedError Control Used
• FEC (Forward Error Correction)FEC (Forward Error Correction)– 1/3 FEC - Repeat each bit 3 times1/3 FEC - Repeat each bit 3 times– 2/3 FEC - (15,10) shortened Hamming 2/3 FEC - (15,10) shortened Hamming
codecode
• ARQ (Automatic Repeat Request)ARQ (Automatic Repeat Request)• CRC (Cyclic Redundancy Check)CRC (Cyclic Redundancy Check)
– HEC (Header Error Check)HEC (Header Error Check)– Payload CRCPayload CRC
SecuritySecurity
None—None—all Bluetooth devices are allowed to all Bluetooth devices are allowed to
connect.connect.
Authorization—Authorization—the local device operator must the local device operator must
authorize a remote device connection, usually by authorize a remote device connection, usually by
physically clicking an on-screen button.physically clicking an on-screen button.
Authentication— Authentication— remote devices must provide remote devices must provide
a password that matches that of the local device.a password that matches that of the local device.
SecuritySecurity
Encryption— Encryption— connections with remote devices connections with remote devices
can be encrypted for additional security. can be encrypted for additional security.
Service Level— Service Level— individual local services may individual local services may
be disabled. Disabled services are not available to be disabled. Disabled services are not available to
any remote device. Service Level security is only any remote device. Service Level security is only
available on some types of devices.available on some types of devices.
A FUNNY THING ABOUT A FUNNY THING ABOUT ITIT
• In August 2005, police in Cambridge In August 2005, police in Cambridge shire, England, issued warnings shire, England, issued warnings about thieves using Bluetooth-about thieves using Bluetooth-enabled phones to track other enabled phones to track other devices left in cars. devices left in cars.
QUESTIONS?QUESTIONS?