You are on page 1of 36

BLUETOOTH

Presented by:KAPIL VIJAYVARGIYA

WHY IS IT CALLED BLUETOOTH?

On the name of Harald Bluetooth,a king of Denmark in the late 900s. He managed to unite Denmark and part of Norway into a single kingdom .

BLUETOOTH ORIGIN

In 1994,the L.M. Ericsson company became interested in connecting its mobile phones to other devices without cables. Together with IBM, nokia,intel and toshiba formed SIG (special interest group) to develop wireless standard for interconnecting, computing and communication devices and accessories .

INTRODUCTION

Bluetooth is a high-speed, low-power microwave wireless link technology. Bluetooth is the name for a short-range radio frequency (RF) technology that operates at 2.4 GHz-2.48GHz and is capable of transmitting voice and data. The effective range of Bluetooth devices is 32 feet (10 meters).

INTRODUCTION
Bluetooth transfers data at the rate of 1 Mbps, which is from three to eight times the average speed of parallel and serial ports. Bluetooth is more suited for connecting two point-to-point devices. It is designed to connect phones, laptops, PDAs and other portable equipment together.

CONNECTIVITY

FEATURES OF BLUETOOTH
It's wireless. When you travel, you don't have to worry about keeping track of a briefcase full of cables to attach all of your components, and you can design your office without wondering where all the wires will go. It's inexpensive. You don't have to think about it. Bluetooth doesn't require you to do anything special to make it work. The devices find one another and strike up a conversation without any user

BLUETOOTH ARCHITECTURE

BLUETOOTH TERMINOLOGY
PICONET The basic unit of a bluetooth system is a piconet which consists of a master node and up to seven active slave nodes. MASTER NODE - A device in Piconet whose clock and hopping sequence are used to synchronize all the devices. It also numbers the communication channels.

SLAVE NODE Device which acts upon the instructions given by master. PARKED SLAVE A device cannot do anything except respond to an activation or beacon signal from the master. SCATTERNET - An interconnected collection of piconets via a bridge node is called a scatternet .

PAGING

LINK STABLISHMENT

SINGLE SLAVE COMMUNICATION


625 mu. s 366 mus

MAST ER

Time

f0

f1

f2

f3

Time

SLAVE

15

Multiple-slave communication
625 mu. s MAST ER 366 mus

Slave1

Slave2

f0

f1

f2

f3

16

BLUETOOTH LAYERS

Radio

layer. Baseband layer. Link manager. L2CAP. Other upper layers.

17

Analogy :
The analogy drawn from previous model are: Radio layer:Physical layer in OSI Model & 802-Model Baseband layer:MAC sublayer L2CAP layer:standard 802-LLC sublayer

RADIO LAYER
Moves bits from master to slave & viceversa Low power system Range-10m BAND:: Bluetooth uses a 2.4-GHz ISM (Industrial Scientific & Medical) band divided into 79 channels of 1 MHz each. FHSS:: This method in physical layer to avoid interference from other devices, or networks.

20

RADIO LAYER

Frequency hopping
ISM band at 2.45 GHz 2402 + k MHz, k = 0, , 78 device-specific hopping sequence nominal rate 1600 hops/s

Modulation
binary Frequency Shift Keying -20dB bandwidth of 1 MHz
21

BASEBAND LAYER
Turns raw bit stream into frames Defines some key formats Addressing &setting up connection. Each Bluetooth radio comes with a unique, factory preset 48-bit address, This address, known as the Bluetooth device address (BD_ADDR). constitutes the basis for identification of devices when connections are established.

22

BASEBAND LAYER
The first step in finding other devices is to send an inquiry message. Any device that wants to be visible to others (also known as being discoverable) frequently scans the inquiry hop sequence for inquiry messages. This procedure is referred to as inquiry scan.

23

BASEBAND LAYER
The access method is TDMA . The master and slave communicates with each other using time slots. Masters transmission starts in even slots & slaves transmission starts in odd ones. During the time that one frequency is used, a sender sends a frame to slave or vice versa. Slave-Slave communication not possible.

24

LINK MANAGER PROTOCOL


It is the link manager that is responsible for the control of the Bluetooth link. That includes all tasks related to the setup, detachment, or configuration of a link. The LM is also responsible for exchanging securityrelated messages. 2 kinds of links: ACL(Asynchronous connectionless link)-for packet switch data SCO(Synchronous Connection oriented)
25

L2CAP LAYER

The L2CAP takes care of datagram segmentation and reassembly, multiplexing of service streams, and quality-of-service issues. transmission control protocol/internet protocol (TCP/IP) traffic packets are too large to fit within a baseband packet. Therefore, such packets will be cut into smaller chunks of data before they are sent to the baseband for further processing.
26

L2CAP ARCHITECTURE

Connection-oriented Channel identifier (CID) used to label each connection endpoint Channels may be uni-directional or bi-directional QoS (Quality of service) flow specification assigned to each channel direction Connectionless Supports group abstraction

27

FRAME FORMAT TYPES


72 bits Access code 54 bits Header 0 to N bits Data

Address 3 bits

Type 4 bits

F A F 1 1

S 1

HEC 8 bits

28

1.
2.

Access code ::It contains syncronization bits and the identifier of the master to distinguish frame of one piconet to other. Address:: The 3-bit address field can define up to seven slaves. Type:: It defines the type of data coming from the upper layer. Synchronous connection oriented. Asynchronous connectionless.
29

F:-(flow control bit) This 1 bit subfield is for flow control, When set(1) , it indicates that device is unable to receive more frames. A:-( Acknowledgement bit) This 1 bit subfield is for acknowledgement, uses stop and wait protocol. S:- (Sequence bit)This 1 bit subfield holds the sequence number. HEC:: The 8-bit header error correction subfield is a checksum to detect errors in each 18 bit header section

30

BLUETOOTH SECURITY
1. Easy-to-use and self-explanatory security configuration; 2. Confidentiality protection; 3. Authentication of connecting devices; 4. Anonymity.

31

SECURITY COMPONENTS

Authentication Payload encryption Key handling

32

AUTHENTICATION

To verify claimed identity Challenge-response system One-sided or mutual authentication

33

ENCRYPTION

To prevent (un)intentional eavesdropping Stream ciphering Output: cipher stream Encryption of payload only Point-to-point or point-to-multipoint

34

BLUETOOTH APPLICATIONS
NAME Serial port Service discovery Fax Intercom File transfer LAN access DESCRIPTION Replacement for SP cable Protocol for discovering offered S. Mobile Fax machine-mobile phone Digital walkie-talkie. General file transfer facility P.Between mobile com.& fixed lan

35

QUESTIONS & QUERIES

You might also like