You are on page 1of 36

BLUETOOTH TECHNONOGY

A
Seminar Report
On
Submitted
in partial fulfilment
for the award of the Degree of
Bachelors of Technology (E&C)
In Department Of Electronics & Communication Engineering

Supervisor:Mr.HARISH MAHESHWARI

Submitted By:
LALCHAND KUMAVAT

(Assistant Prof,ECE Deptt.)

Department of Electronics & Communication Engineering


Sri Balaji College of Engineerin & Technology, Jaipur
Rajasthan Technical University, Kota
Feb,2014

Sri Balaji College of Engineering & Technology , Jaipur

CERTIFICATE
This is to certify that Mr.LALCHAND KUMAVAT (10ESBEC045), a student of B.Tech.
(Electronics & communication Engineering) 8th semester has submitted His Seminar report
entitled BLUETOOTH TECHNOLOGY under my guidance.

LALCHAND KUMAVAT
(10ESBEC045)
GUIDED By :Mr.HARISH MAHESHWARI
(Assistant Prof.ECE Deptt.)

Mr.G.R.MEENA
(HOD OF ECE)

AKNOWLEDGEMENT
I express deep sense of gratitude to the management of the Sri Balaji College of
Engineering & Technology , jaipur who provide equipment for performing measurements
without which these measurements could not have done. My thanks are also due to Shri DR.
I.N. khan (Principal), who always encouraged me to do these investigations. I also have to
thank Mr. G.R. Meena Sir (HOD, ECE). I am also grateful to my parents, who always
advised me to work hard and blessed me for success.

PLACE: - JAIPUR

LALCHAND

DATE 14/11/2013

(10ESBEC045)

ii

ABSTRACT
This document is written specially for the practical aspect regarding to the theory. It is a well
are getting theoretical and at Sri Balaji College of Engineering & Technologr , jaipur, but
for being a perfectionist in the field of technology, Project lab is must. Grateful to our college
who gave us opportunity and provide project lab. I was doing 45 days on named
BLUETOOTH TECHNOLOGY. This document gives all information regarding to our
training. This report is ahead a sincere attempt of summarizing all the meaningful information
that we have gathered during the periods.

iii

LIST OF FIGURE
Figure

Page no.

Fig 1: Bluetooth

Fig 2: Architecture of Bluetooth

Fig 3: Bluetooth Connection

Fig 4: Protocol State Diagram


9
Fig 5: FHSS

10

Fig 6: Master Slave Co-ordination

16

iv

CONTENT
Certificate

Acknowledgement

ii

Abstract

iii

List of Figure

iv

Chapter 1: INTRODUCTION BLUETOOTH

1.1: BLUETOOTH TECHNOLOGY

1.2:WORKING OF BLUETOOTH

1.2.1:BLUETOOTH RADIO

1.2.2:BASEBAND

Chapter 2: HISTORY

2.1: PROFILES

2.2: NETWORK TOPOLOGY

2.2.1:PICONETS

2.2.2: SCATTERNETS

Chapter 3: ADVANTAGES & DISADVANTAGES

12

3.1:ADVANTACES
3.2: DISADVANTAGES

12
13

Chapter 4: APPLICATION

14

Chapter 5: FUTURE PROSPECTS

17

5.1:RETAIL AND MOBILE E-COMMERCE

18

5.2: MEDICAL

19

5.3: TRAVEL

19

5.4: HOME NETWORKING

20

Chapter 6: BLUETOOTH USAGE MODELS

21

6.1: FILE TRANSFER

21

6.2: INTERNET BRIDGE

21

6.3: LAN ACCESS

22

6.4: SYNCHRONIZATION

22

6.5: THREE-IN-ONE PHONE

22

6.6: ULTIMATE HEADSET

23

7.CONCLUSION

24

8.SUGGESTION FOR FURTHER STEADY

25

9. REFERENCE

26

Chapter 1

1.INTRODUCTION
1.1 BLUETOOTH TECHNOLOGY
Bluetooth is a wireless technology used to transfer data between different electronic
devices. The distance of data transmission is small in comparison to other modes of
wireless communication. This technology eradicates the use of cords, cables, adapters
and permits the electronic devices to communicate wirelessly among each other

Figure 1: Bluetooth

During the past two decades, the advancement in microelectronics and VLSI
technology dipped down the cost of many consumer electronic products to a level
which was affordable for the common man. The first quarter of 2001, saw the vending
of about 32.5 million PCs. The sale of cellular phones is predicted to reach 1 billion in
2005. With increase in the number of electronic devices, comes in the need of
connecting them together for maximum interoperability and utilization. These devices
connect with each other using a variety of wires, cables, radio signals and infrared
light beams, and an even greater variety of connectors, plugs and protocols. Bluetooth
is devised to replace these cables.

Bluetooth is a global standard for wireless connectivity. Bluetooth technology


facilitates the replacement of the cables used to connect one device to another, with
one universal short-range radio link operating in the unlicensed 2.45 GHz ISM band.
The main objectives of Bluetooth technology can be described as follows,
Cable replacement: Getting rid of the various types of cables and wires required for
interconnectivity between various devices would enable the lay man to use all
electronic devices without wasting time and money.
Small size: the Bluetooth device is very small so that it can be attached to any device
required like the cell phones without adding much to the weight of the system.
Low cost: Bluetooth is aimed to be a low cost device approximately $5 in the near
future.
Low power: The utilization of power is very less (within 100 mW) as it is short range
equipment and so it facilitates the use of small batteries for its usage.
Besides the characteristics mentioned above, Bluetooth can imitate a universal bridge
to attach the existing data networks, and also as a mechanism for forming ad-hoc
networks. Designed to operate in noisy frequency environments, the Bluetooth radio
uses a fast acknowledgement and frequency hopping scheme to make the link robust.
.

1.2:WORKING OF BLUETOOTH:
Basically, Bluetooth is the term used to describe the protocol of a short range (10
meter) frequency-hopping radio link between devices. These devices implementing
the Bluetooth technology are termed Bluetooth - enabled. Documentation on
Bluetooth is divided into two sections, the Bluetooth Specification and Bluetooth
Profiles

The Specification describes how the technology works (i.e. the Bluetooth protocol
architecture),

The Profiles describe how the technology is used (i.e. how different parts of the
specification can be used to fulfill a desired function for a Bluetooth device).

BLUETOOTH PROTOCOL ARCHITECTURE

Figure 2:Architecture Of Bluetooth

As the report is designed mainly for the spread spectrum techniques


course, the protocols in the lower level are described more
extensively and the upper layer protocols are just mentioned with a
very brief description.
Moreover, one should note that the upper layer protocols are totally
dependent on the lower level protocols whereas the lower level
protocols can function independently even with a totally different
set of upper protocols.

1.2.1: BLUETOOTH RADIO:

The Bluetooth Radio (layer) is the lowest

defined layer of the Bluetooth specification. It defines the requirements of the


Bluetooth transceiver device operating in the 2.4GHz ISM band. The Bluetooth air
interface is based on three power classes,

Power Class 1: designed for long range (~100m), max output power of 20 dBm,

Power Class 2: ordinary range devices (~10m), max output power of 4 dBm,

Power Class 3 short range devices (~10cm), with a max output power of 0 dBm.

The radio uses Frequency Hopping to spread the energy across the ISM spectrum in
79 hops displaced by 1MHz, starting at 2.402GHz and stopping at 2.480GHz.Some
countries use the 79 RF channels whereas countries like Japan use 23 channels.
Currently, the SIG is working to harmonize this 79-channel radio to work globally and
has instigated changes within Japan, Spain, and other countries. Also, the Bluetooth

radio module uses GFSK (Gaussian Frequency Shift Keying) where a binary one is
represented by a positive frequency deviation and a binary zero by a negative
frequency deviation.
4
BT is set to 0.5 and the modulation index must be between 0.28 and 0.35. The
receiver must have a sensitivity level for which the bit error rate (BER) 0.1% is met.
For Bluetooth this means an actual sensitivity level of -70dBm or better.

1.2.2:BASEBAND:

The Baseband is the physical layer of the

Bluetooth. It manages physical channels and links apart from other


services like error correction, data whitening, hop selection and
Bluetooth security. As mentioned previously, the basic radio is a
hybrid spread spectrum radio. Typically, the radio operates in a
frequency-hopping manner in which the 2.4GHz ISM band is broken
into 79 1MHz channels that the radio randomly hops through while
transmitting and receiving data. A piconet is formed when one Bluetooth radio
connects to another Bluetooth radio

Figure 3:Bluetooth Connection

Both radios then hop together through the 79 channels. The Bluetooth radio system
supports a large number of piconets by providing each piconet with its own set of
random hopping patterns. Occasionally, piconets will end up on the same channel.
When this occurs, the radios will hop to a free channel and the data are retransmitted
(if lost).
5
The Bluetooth frame consists of a transmit packet followed by a receive packet. Each
packet can be composed of multiple slots (1, 3, or 5) of 625us.A typical single slot
frame typically hops at 1,600 hops/second. Multi-slot frames allow higher data rates
because of the elimination of the turn-around time between packets and the reduction
in header overhead.
LMP: The Link Manager Protocol is used by the Link Managers (on either side) for
link set-up and control.
HCI: The Host Controller Interface provides a command interface to the Baseband
Link Controller and Link Manager, and access to hardware status and control
registers.
L2CAP: Logical Link Control And Adaptation Protocol supports higher level protocol
multiplexing, packet segmentation and reassembly, and the conveying of quality of
service information.
RFCOMM: The RFCOMM protocol provides emulation of serial ports over the
L2CAPprotocol. The protocol is based on the ETSI standard TS 07.10.

SDP: The Service Discovery Protocol provides a means for applications to discover
which services are provided by or available through a Bluetooth device. It also allows
applications to determine the characteristics of those available services.

Chapter-2

2. HISTORY:
In 1994, Ericsson in Sweden launched an initiative to study a low-power, low-cost
radio interface between mobile phones and their accessories. After three years, In
1997, Ericsson approached various manufacturers of mobile electronic devices to
discuss the development and promotion of this short range wireless radio link as alone
this phenomenon could not be implemented.
Thus in 1998, Ericsson, IBM, Intel,
Toshiba and NOKIA formed the Special Interest Group (SIG) for the promotion and
development of BLUETOOTH technology. The first Bluetooth silicon was also ready
in 1998. As we can see that the SIG included two market leaders in mobile telephony,
two in laptop computing and one in digital signal processing technology. The biggies
being in the game gave an impetus to thousands of companies to join hands with the
SIG for the endorsement and expansion of this technology.
One would wonder how Bluetooth got its name. It has an interesting heritage.
Bluetooth is named after the 10th century Viking King Harald Blatand (Blatand
meaning Bluetooth). He was instrumental in uniting the countries in the Baltic region
like Sweden, Denmark, Norway and thus emerging as a powerful force. Bluetooth
aims at uniting the computing and telecommunication world and so achieving the
same greatness.

2.1: PROFILES
The profiles have been developed in order to portray how implementations of user
models are to be accomplished. The user models describe a number of user scenarios
where Bluetooth performs the radio transmission. A profile can be described as a
vertical slice through the protocol stack. It defines options in each protocol that are
compulsory for the profile. It also defines parameter ranges for each protocol. The
profile concept is used to decrease the risk of interoperability problems between
different manufacturers' products. For example: The Headset profile defines the
requirements for Bluetooth devices necessary to support the Headset use case. The
Fax profile defines to support the Fax use case. There are as many profiles as
applications which are growing everyday.

2.2:NETWORK TOPOLOGY
The Bluetooth system supports both point to point and point to multipoint
connections.

2.2.1: PICONETS: Bluetooth radios connect to each other in piconets, which are
formed by a master radio simultaneously connecting up to seven active slave radios
[ 3 bit address] in an Ad-hoc manner. There can be up to 256 parked slaves [ 8 bit
address] which like the active members are synchronized to the master clock. Each
piconet has a unique hopping sequence. To form a piconet, the Bluetooth radio needs
to understand two parameters: the hopping pattern of the radio it wishes to connect to
and the phase within that pattern. In forming a piconet,
8

the master radio shares its Global ID with the other radios, which then become slaves
and provide all the radios with the correct hopping pattern. The master also shares its
clock offset (represented by the clock dial) with the slaves in the piconet, providing
the offset into the hopping pattern. This information can easily be exchanged via the
FHS packet.

2.2.2: SCATTERNETS: Two or more piconets with overlapping coverage areas


form the scatternet. Slaves in one piconet can be master or slave in the other piconet
[Achieved by TDM].Up to 10 fully loaded piconets can coexist in a scatternet. Any
devices in multiple piconets employ TDM. The two types of links that can be
establishes between the master and slaves are named
SCO: Synchronous Connection Oriented
ACL: Asynchronous Connection Less link
The communication protocol is described by the following state diagram. Standby is
the default state.

Figure 4 :Protocol State Diagram

FREQUENCY HOPPING SPREAD SPECTRUM:

Figure 5 :FHSS

Frequency-Hopping Spread-Spectrum (FHSS) is a spread spectrum modulation


scheme that uses a narrowband carrier that varies frequency in a pseudo random
pattern known to both transmitter and receiver. To an unintended receiver, FHSS
appears to be a short-duration impulse noise. Only transmitters and receivers that are
synchronized on the same hop frequency pattern will have access to the transmitted
data. The transmitter switches hop frequencies 1,600 times per second to assure a high
degree of data security. Also compared to DSSS, FHSS is simpler to build with
higher noise immunity.

10

TECHNICAL SPECIFICATIONS:

SPECIFICATIONS

Frequency band

2.4 GHz ISM band

Modulation

Gaussian shaped BFSK

Range

10 -100 m

Physical layer

FHSS

Coverage

Omni-directional.

Non

line

of

sight

transmission

Data rate

1 Mbps/723 Kbps

Hopping rate

1600 hops/sec at 1 hop/packet

Channels

79/23 channels

Channel length

625 microseconds long

Data packet

Up to 2,745 bits in length

Reliable and secure

Good.

Link

layer

authentication

and

encryption

Cost

$ 20 aims at $5 endpoint

Power

0.1 W (Active)

Acceptance

SIG have about 2500 member companies

Data / Voice support

One asynchronous data channel (732.2 kbps


and

reverse

57.6

kbps)

OR

Three

simultaneous synchronous voice channels


(64 kbps) .

Piconet

1 master and 7 slaves

Scatternet

Up to 10 piconets in a scatternet

Links

SCO and ACL links

Table 1: Technical Specification


11

Chapte 3

3.1: ADVANTAGES
Bluetooth is low power consuming and low processing with an overhead protocol. It
means that it is the best for integration with small battery powered devices. This
means Bluetooth wireless technology could take place in every device, machinery,
robot etc.

3.1.1: INBUILT SOFTWARE


If you have Bluetooth hardware in your mobile phone, PDA, GPS or headset, you
probably won't need to worry about installing special Bluetooth drivers - the software
is built-in and ready for use. If connecting to a PC, you'll need to install Bluetooth
drivers.

3.1.2: FEATURE SIMPLICITY


You do not need to know much about technology in order to run Bluetooth. Anyone
that doesnt have no knowledge about the new technology can still be able to use the
Bluetooth feature due to its simplicity and the ease of use. I think that the simplicity
of it and the fact that it's wire free makes it very widely used and utmost popular.

3.1.3: FREE OF CHARGE


Best of all, you do not have to pay a penny for the service! It's not an extra cell phone
or cable bill that you have to add to your budget. Simply by the technology and you're
done! All you need to do is connect it with what you are using.

12

3.1.4: WIRELESS
It allows you to stay cord free and do not have to worry about finding the correct
place to connect that extra long cord. Avoid having to have a ton of cords wherever
you go. You may still need a few cords but not as much as you would without
Bluetooth. You can also go to the internet wirelessly with this feature when you're out

somewhere outside of your home.

3.1.5: REJECTING THE REQUEST THROUGH YOUR PHONE


Even though you are able to exchange data across your cell phones, you still have the
ability to keep your information private. In order to make a transfer or allow someone
to access the files on your phone, you will have to give them access by accepting or If
you have the Bluetooth feature enabled on your phone and not disabled while using it,
others that you may not even know request to send you a file.

3.2: DISADVANTAGES :

Too many unfeasible applications so do we really need it ?

No handoff / handover capability

Initial stages so it needs to prove its worth

Few analog or FH cordless phones have designed to operate at the 2.4GHz band.
Certainly interference exists in between, but more serious effects would be exerted
on analog 2.4GHz cordless phone
13

Chapte 4

4.1: APPLICATIONS

Bluetooth has a varied number of applications. Each application has a corresponding


profile. Some of them are named as follows
Mobile phones

Laptops, desktops, pdas

Digital cameras

Printers

Home networking

Data access points

Music

Office equipment

Medical

Senior assisted living

Child monitoring

Wireless headsets

Three-in-one phone, etc

14

4.2: HOW IT WORKS


Bluetooth is a short-range wireless technology used to create PANs (Personal Area
Networks) among your devices and with other nearby devices. Bluetooth requires that

a low-cost transceiver chip be included in each device. The transceiver transmits and
receives in a previously unused frequency band of 2.45 GHz that is available
globally (with some variation of bandwidth in different countries). In addition to data,
up to three voice channels are available. Each device has a unique 48-bit

address from the IEEE 802 standard. Connections can be point-to-point or


multipoint. The maximum range is 10 meters. Data can be exchanged at a rate of 1
megabit per second (up to 2 Mbps in the second generation of the technology). A
frequency hop scheme allows devices to communicate even in areas with a great deal
of electromagnetic interference. Built-in encryption and verification is provided.
Bluetooth is essentially a networking standard that works at two levels:

It provides agreement at the physical level -- Bluetooth is a radio-frequency standard.

It provides agreement at the protocol level, where products have to agree on when bits
are sent, how many will be sent at a time, and how the parties in a conversation can be
sure that the message received is the same as the message sent
A number of devices may already take advantage of this same radio-frequency band.
Baby monitors, garage-door openers and the newest generation of cordless phones all
make use of frequencies in the ISM band. Making sure that Bluetooth and these other
devices don't interfere with one another has been a crucial part of the design process.
15
One of the ways Bluetooth devices avoid interfering with other systems is by sending
out very weak signals of about 1 milliwatt. By comparison, the most powerful cell

phones can transmit a signal of 3 watts. The low power limits the range of a Bluetooth
device to about 10 meters (32 feet), cutting the chances of interference between
your computer system and your portable telephone or television or any other device.
Even with the low power, Bluetooth doesn't require line of sight between
communicating devices. The walls in your house won't stop a Bluetooth signal,
making the standard useful for controlling several devices in different rooms.
Bluetooth can connect up to eight devices simultaneously. With all of those devices
in the same 10-meter (32-feet) radius, you might think they'd interfere with one
another, but it's unlikely. Bluetooth uses a technique called spread-spectrum

frequency hopping that makes it rare for more than one device to be transmitting on
the same frequency at the same time. In this technique, a device will use 79
individual, randomly chosen frequencies within a designated range, changing from
one to another on a regular basis.

Figure.6: Master-Slave coordination

16
In the case of Bluetooth, the transmitters change frequencies 1,600 times every second,

meaning that more devices can make full use of a limited slice of the radio spectrum.

Since every Bluetooth transmitter uses spread-spectrum transmitting automatically,


its unlikely that two transmitters will be on the same frequency at the same time. This
same technique minimizes the risk that portable phones or baby monitors will disrupt
Bluetooth devices, since any interference on a particular frequency will last only a
tiny fraction of a second.
When Bluetooth-capable devices come within range of one another, an electronic
conversation takes place to determine whether they have data to share or whether one
needs to control the other. The user doesn't have to press a button or give a command
-- the electronic conversation happens automatically. Once the conversation has
occurred, the devices -- whether they're part of a computer system or a stereo -- form
a network. Bluetooth systems create a personal-area network (PAN), or piconet, that
may fill a room or may encompass no more distance than that between the cell phone
on a belt-clip and the headset on your head. Once a piconet is established, the
members randomly hop frequencies in unison so they stay in touch with one another
and avoid other piconets that may be operating in the same room.

17

Chapte 5

5. FUTURE PROSPECTS

Here we examine just a few new Bluetooth application domains, in addition to those
already being developed as new profiles within the Bluetooth Special Interest

Group (SIG). This section deals with possibilities; solutions like those described
here may or may not be deployed. This discussion is not exhaustive; new applications
will almost certainly continue to appear over time.

5.1: RETAIL AND MOBILE E- COMMERCE


As Bluetooth wireless technology is incorporated in more personal mobile devices, it
enables new uses for those devices. One such use is that of a mobile device as a
method of payment for goods and services.
Any terminal that is used for retail transactions could incorporate Bluetooth wireless
technology and thus connect to other Bluetooth devices to complete retail
transactions. For example, a mobile phone could connect to a soda machine over a
Bluetooth link to pay for a soda, or link to a kiosk at which you could buy a theater
ticket. Similarly, a mobile phone, PDA, or other device could be used to pay for goods
and services using Bluetooth communication links with a cash register. Indeed,
through the use of Bluetooth access points, entire shopping malls, arenas, grocery
stores, restaurants, and other retail areas could allow customers to perform financial
transactions throughout the building.

18

5.2: MEDICAL
As the practice of medicine becomes more sophisticated and complex, new
technology is increasingly used in this area. Here we suggest three possible
applications of Bluetooth wireless technology in the medical domain (remote patient
monitoring, wireless biometric data, and medicine dispensers); certainly others are
conceivable.
Patient monitoring of things like vital signs outside of typical medical environments
(such as hospitals) is becoming increasingly common. Patients may measure certain
body functions and periodically report these to a medical care provider. This can be
done electronically, and if so, might involve manual data entry or cables from the
measuring equipment; the data might then be transmitted over a dial-up network
connection. Bluetooth wireless technology can improve this process by automating
the data transfer from one device to another and making the transmission of the data
more convenient, using wireless dial-up networking. The biometric data collection
could even use Bluetooth links as described next.

5.3: TRAVEL
The travel industry is always seeking new ways to save time and enhance
convenience for travelers. Here we present a few ways in which Bluetooth wireless
technology could enhance travel scenarios.

19

5.4: HOME NETWORKING


In-home networks are becoming more common as people want to enhance their
convenience, security and safety at home and use their personal devices in home
environments (as well as elsewhere). Bluetooth technology can be especially useful in
home networks because it does not require any wires to be installed in the home to
allow devices to communicate. For instance, a mobile phone could be used as a
cordless phone via a Bluetooth voice access point (base station), as described in the
three-in-one phone usage model in our book, Bluetooth Revealed. Portable computers
could be used at home through wireless dial-up networking or a data access point
(similar to the LAN access profile), also described in our book.

20

Chapter 6

6. BLUETOOTH USAGE MODELS


In this section a number of Bluetooth usage models are described.
For each usage model there is one or more corresponding profiles
defining protocol layers and functions to be used. The profiles are
not described in detail in this document, for more information refer
to the Bluetooth standardization documents.

6.1: FILE TRANSFER


The File Transfer usage model offers the capability to transfer data objects from one
Bluetooth device to another. Files, entire folders, directories and streaming media
formats are supported in this usage model. The model also offers the possibility of
browsing the contents of the folders on a remote device. Furthermore, push and
exchange operations are covered in this usage model, e.g. business card exchange
using the vCard format. The File Transfer model is based on GOEP.

6.2: INTERNET BRIDGE


The Internet Bridge usage model describes how a mobile phone or cordless modem
provides a PC with dial-up networking capabilities without the need for physical
connection to the PC. This networking scenario requires a two-piece protocol stack,
one for AT-commands to control the mobile phone and another stack to transfer
payload data..

21

6.3: LAN ACCESS


The LAN Access usage model is similar to the Internet Bridge user model. The
difference is that the LAN Access usage model does not use the protocols for ATcommands. The usage model describes how data terminals use a LAN access point as
a wireless connection to a Local Area Network. When connected, the data terminals
operate as if it they were connected to the LAN via dial-up networking.

6.4: SYNCHRONIZATION
The synchronization usage model provides the means for automatic synchronization
between for instance a desktop PC, a portable PC, a mobile phone and a notebook.
The synchronization requires business card, calendar and task information to be
transferred and processed by computers, cellular phones and PDAs utilizing a
common protocol and format.

6.5: THREE-IN-ONE PHONE


The Three-in-One Phone usage model describes how a telephone handset may
connect to three different service providers. The telephone may act as a cordless
telephone connecting to the public switched telephone network at home, charged at a
fixed line charge. This scenario includes making calls via a voice base station, and
making direct calls between two terminals via the base station. The telephone can also
connect directly to other telephones acting as a walkie-talkie or handset extension
i.e. no charging needed.

22
Finally, the telephone may act as a cellular telephone connecting to the cellular
infrastructure. The cordless and intercom scenarios use the same protocol stack.

6.6: ULTIMATE HEADSET


The Ultimate Headset usage model defines how a Bluetooth equipped wireless
headset can be connected, to act as a remote units audio input and output interface.
The unit is probably a mobile phone or a PC for audio input and output. As for the
Internet Bridge user model, this model requires a two-piece protocol stack; one for
AT-commands to control the mobile phone and another stack to transfer payload data,
i.e. speech. The AT-commands control the telephone regarding for instance answering
and terminating calls.

23

7.CONCLUSION
The amazing technology of Bluetooth presents a great way of exchanging data
between two wireless devices. Unlike telephones, there are no wires or messy leads to
worry about. One can enjoy wireless communications with short distances of up to
thirty feet. Bluetooth also offers interoperability, meaning that one can use the
portable Bluetooth device to connect with existing Bluetooth points.
Bluetooth, a wireless solution for reducing the cable clutter of peripherals, is
constantly growing in popularity because of the convenience of exchanging
information between mobile devices. As Bluetooth usage rises, so do the
security risks associated with the technology but we are not up to the point
regarding the Bluetooth security

24

8. SUGGESTIONS FOR FURTHER STUDY

If I had more time to work on this research topic, I would have liked to explain

the

coexistence mechanisms for interference mitigation in the 2.4GHz band. This can
be studied from the IEEE paper on the same, published in September 2003, Volume:
2, Issue: 5, By Chiasserini, C.F. & Rao, R.R. Also, I would

like to have

provided a detailed comparison between Bluetooth and 802.11 LAN. Another


interesting addition could have been a detailed explanation of

the Bluetooth profiles

explaining the protocols for various applications. Comparing this close proximity
communication device with Infra red and Home RF can also add more value to the
study of Bluetooth.

25

9. REFERENCES
1

http://en.wikipedia.org/wiki/Bluetooth

http://electronics.howstuffworks.com/bluetooth.htm

http://electronics.howstuffworks.com/bluetooth2.htm

http://searchmobilecomputing.techtarget.com/sDefinition/0,,sid40_gci211680,00.html

http://www.mobileinfo.com/Bluetooth/FAQ.htm#g4

26

You might also like