You are on page 1of 29

CONTENT

Overview of Bluetooth History The Bluetooth Specifications Typical Bluetooth Scenario Protocols Profiles Security Comparison with other technologies Future of Bluetooth Summary

15 April, 2013

Example : The Networked Home

15 April, 2013

What is Bluetooth?
Bluetooth wireless technology is an open specification

for a low-cost, low-power, short-range radio technology for ad-hoc wireless communication of voice and data anywhere in the world.
One of the first modules (Ericsson) A recent module

15 April, 2013

Ultimate Headset

15 April, 2013

Cordless Computer

15 April, 2013

Bluetooth Goals & Vision


Originally conceived as a cable replacement

technology Short-Range Wireless Solutions Open Specification Voice and Data Capability Worldwide Usability Other usage models began to develop:
Personal Area Network (PAN) Ad-hoc networks Data/voice access points Wireless telematics

15 April, 2013

Overview of Bluetooth History


What is Bluetooth? Bluetooth is a short-range wireless communications technology. Why this name? It was taken from the 10th century Danish King Harald Blatand who unified Denmark and Norway. When does it appear? 1994 Ericsson study on a wireless technology to link mobile phones & accessories. 5 companies joined to form the Bluetooth Special Interest Group (SIG) in 1998. First specification released in July 1999.
15 April, 2013 8

Timeline

1994 : Ericsson study complete / vision 1995 : Engineering work begins 1997 : Intel agrees to collaborate 1998 : Bluetooth SIG formed: Ericsson, Intel, IBM, Nokia & Toshiba 1999 : Bluetooth Specification 1.0A SIG promoter group expanded: 3Com, Lucent, Microsoft & Motorola 2000 : Bluetooth Specification 1.0B, 2000+ adopters 2001 : First retail products released, Specification 1.1 2003 : Bluetooth Specification 1.2 2005 : Bluetooth Specification 2.0 (?)

15 April, 2013

Special Interest Group

15 April, 2013

10

Technical features
Connection Type Spectrum Modulation Transmission Power Data Rate Range Supported Stations Data Security Authentication Key Data Security Encryption Key Module size
15 April, 2013

Spread Spectrum (Frequency Hopping) & Time Division Duplex (1600 hops/sec) 2.4 GHz ISM Open Band (79 MHz of spectrum = 79 channels) Gaussian Frequency Shift Keying 1 mw 100 mw 1 Mbps 30 ft 8 devices 128 bit key 8-128 bits (configurable) 9 x 9 mm
11

Bluetooth FHSS
Employs frequency

hopping spread spectrum


Reduce interference with

other devices
Pseudorandom hopping 1600 hops/sec- time slot is

defined as 625 microseconds


Packet 1-5 time slots long

15 April, 2013

12

Time-Division Duplex Scheme


Channel is divided into consecutive slots (each 625 s) One packet can be transmitted per slot Subsequent slots are alternatively used for transmitting and receiving

Strict alternation of slots between the master and the slaves Master can send packets to a slave only in EVEN slots Slave can send packets to the master only in the ODD slots

15 April, 2013

13

Classification
Classification of devices on the basis of Power dissipated &
corresponding maximum Range.

POWER
CLASS I CLASS II CLASS III 20 dBm 0-4 dBm 0 dBm

RANGE
100 m 10 m 1m

15 April, 2013

14

Piconet Structure
Master Active Slave

Parked Slave
Standby

All devices in piconet hop together. Masters ID and masters clock determines frequency hopping sequence & phase.
15

15 April, 2013

Ad-hoc Network the Scatternet


Inter-piconet

communication Up to 10 piconets in a scatternet Multiple piconets can operate within same physical space This is an ad-hoc, peer to peer (P2P) network

15 April, 2013

16

Baseband

15 April, 2013

17

L2CAP
Service provided to the higher layer:
L2CAP provides connection-oriented and connectionless

data services to upper layer protocols


Protocol multiplexing and demultiplexing capabilities

Segmentation & reassembly of large packets


L2CAP permits higher level protocols and applications to

transmit and receive L2CAP data packets up to 64 kilobytes

in length.

15 April, 2013

18

File Transfer Profile

Profile provides:
Enhanced client-server interactions: - browse, create, transfer folders - browse, pull, push, delete files
15 April, 2013 19

Headset Profile

Profile provides:
Both devices must provide capability to initiate connection & accept/terminate calls. Volume can be controlled from either device. Audio gateway can notify headset of an incoming call.
15 April, 2013 20

Core Bluetooth Products


Notebook PCs & Desktop computers Printers PDAs Other handheld devices Cell phones Wireless peripherals:
Headsets Cameras

CD Player

TV/VCR/DVD
Access Points Telephone Answering Devices Cordless Phones Cars

15 April, 2013

21

Other Products
2004 Toyota Prius & Lexus LS 430 hands free calls Digital Pulse Oximetry System Toshiba Washer & Dryer Nokia N-gage

15 April, 2013

22

Security
Security Measures

Link Level Encryption & Authentication.

Personal Identification Numbers (PIN) for device


access. Long encryption keys are used (128 bit keys).

These keys are not transmitted over wireless. Other


parameters are transmitted over wireless which in combination with certain information known to the

device, can generate the keys.

Further encryption can be done at the application layer.


23

15 April, 2013

A Comparison

WLAN

15 April, 2013

24

Bluetooth: Today & Tomorrow

15 April, 2013

25

Will Bluetooth become a household name?

15 April, 2013

26

Success of Bluetooth depends on how well it is integrated

Future of Bluetooth
into consumer products
technology

Consumers are more interested in applications than the Bluetooth must be successfully integrated into consumer

products
Must provide benefits for consumer Must not destroy current product benefits

Key Success Factors Interoperability Mass Production at Low Cost Ease of Use End User Experience
15 April, 2013 27

Summary
A new global standard for data and voice Eliminate Cables

Low Power, Low range, Low Cost network devices


Future Improvements

Master-Slave relationship can be adjusted dynamically for optimal resource allocation and utilization. Adaptive, closed loop transmit power control can be implemented to further reduce unnecessary power usage.
28

15 April, 2013

Thank You

15 April, 2013

29

You might also like