Você está na página 1de 15

ABSTRACT:

The term Bluetooth refers to an open specification for a technology to enable short-range wireless voice and data communications anywhere in the world. This paper provides a view about the current status of wireless and mobile technology, summarizes their current state of development and describes the additional sources and guides us to how to apply this particular technology. Bluetooth technology has been the subject of considerable hyperbole over the last year. This paper will attempt to cut through the hype and provide a reality check on the current state and future advancement of the technology. Specifically, the paper will outline:

History of Bluetooth What is Bluetooth; Bluetooth Architecture Protocols and Profiles Topology Security, Power Management & Quality of Services Advantages, Applications & Limitations. Conclusion Reference.

One of our wireless technology i.e. Bluetooth which is helpful to people all over the world is given with a broad description about its features, applications and about its development.

INTRODUCTION
Bluetooth is an open standard for wireless connectivity with supporters mostly from the PC and cell phone industries. Not surprisingly, it primary marker is for data and voice transfer between communication devices and PCs. In the way, it is similar in purpose to the IrDA protocol, Bluetooth, however, is a radio frequency (RI) technology utilizing the unlicensed 2.5 GHz industrial, scientific, and medical (ISM) band. Target applications include PC and peripheral networking, hidden computing, and data synchronization such as for address bookstand calendars. Other applications could include home networking and home applications of the future such as smart appliances, heating systems, and entertainment devices.

HISTORY
Bluetooth is the codename for a technology specification for small form factor, lowcost, low-power, short range radio links between mobile PCs, mobile phones and other portable devices. A global specification for wireless connectivity. Bluetooth is a cable replacement technology that simplifies the interaction between people as well as machines. Technology born in 1994 by Ericsson Mobile Communications. Bluetooth SIG (Special Interest Group) formed in Feb 1998 Founders - Ericsson, Nokia, Intel, IBM, Toshiba. Promoters - Lucent, Motorola, 3Com, Microsoft. (1 Dec 1999) About 1883 SIG members. (13 Aug 2000) Bluetooth legends. The technology is named after: Harald II Blatand, 10th century Viking king from Denmark Loved to eat blueberries, no toothbrush at that time..

Bluetooth attempts to provide significant advantages over other data transfer technologies, such as Ir DA and Home RF, vying for similar markets. Despite comments from the Bluetooth SIG indicating that the technology is complementary to Ir DA it is clearly a competitor for PC-to peripheral connection, Ir DA is already popular in PC peripherals, but connections up to 10m (up to 100 m if he transmitters power is increased), devices used not be within line of sight and may even connect through is severely limited by the short connection distance of 1 m and the line-or-sight requirement for communication. This limitation laminates the feasibility of using Ir DA for chidden computing, where the communicating devices are carboy but not visible to one another. Due to its RF nature, Bluetooth is not subset to such limitations. In addition to wireless device walls or other nonmetal objects. This allows for applications such as a cell phone in a pocket or a briefcase acting as a modem for laptop or PDA.

SYSTEM ARCHITECTURE :
Bluetooth communication occurs in the unlicensed ISM band at 2.4GHz. The transceiver utilizes frequency hopping to reduce interference and fading. A typical Bluetooth device has a range of about 10 meters. The communication channel can support both data (asynchronous) and voice(synchronous) communications with a total bandwidth of 1 Mb/sec. The supported channel configurations are as follows:

Configuration

Max. Data Max. Data Rate Rate Downstream Upstream

3 Simultaneous 64 kb/sec X 3 64 kb/sec X 3 Voice Channels channels channels Symmetric Data 433.9 kb/sec 433.9 kb/sec 723.2 kb/sec 57.6 kb/sec or 57.6 Asymmetric Data or 723.2 kb/sec kb/sec

The synchronous voice channels are provided using circuit switching with a slot reservation at fixed intervals. A synchronous link is referred to as an SCO (synchronous connection-oriented) link. The asynchronous data channels are provided using packet switching utilizing a polling access scheme. An asynchronous link is referred to as an ACL (asynchronous connection-less) link. A

combined data-voice SCO packet is also defined. This can provide 64 kb/sec voice and 64 kb/sec data in each direction.

BLUETOOTH TOPOLOGY
Introducing: The Piconet! Bluetooth devices can interact with one or more other Bluetooth devices in several different ways. The simplest scheme is when only two devices are involved. This is referred to as point-to-point. One of the devices acts as the master and the other as a slave. This ad-hoc network is referred to as a piconet. As a matter of fact, a piconet is any such Bluetooth network with one master and one or more slaves. A diagram ofa piconet is provided in Figure 1. In the case of multiple slaves, the communication topology is referred to as point-to-multipoint. In this case, the channel (and bandwidth) is shared among all the devices in the piconet. There can be up to seven active slaves in a piconet. Each of the active slaves has an assigned 3-bit Active Member address (AM_ADDR). There can be additional slaves which remain synchronized to the master, but do not have a Active Member address. These slaves are not activeand are referred to as parked. For the case of both active and parked units, all channel access is regulated by the master. A parked device has an 8-bit Parked Member Address (PM_ADDR), thus limiting the number of parked members to 256. A parked device remains synchronized to the master clock and can very quickly become active and begin communicating in the piconet.
piconet(fig 1)

M Stands for Master And S stands for Slave Introducing: The Scatternet!

You may be wondering what would happen if two piconets were within the same coverage area. For example, you might have a piconet consisting of your cell phone and your PC, while the person in the neighboring cubicle has a piconet consisting of a cell phone, headset, and business card scanner. A diagram is presented in Figure 2 below.

a scatternet (fig 2)

Because the two piconets are so close, they have overlapping coverage areas. This scenario is provided for in the Bluetooth specification and is referred to as a scatternet. As a matter of fact, slaves in one piconet can participate in another piconet as either a master or slave. This is accomplished through time division multiplexing. In a scatternet, the two (or more) piconets are not synchronized in either time or frequency. Each of the piconets operates in its own frequency hopping channel while any devices in multiple piconets participate at the appropriate time via time division multiplexing. Returning to the example, you may want to set up your neighbors business card scanner to also transmit the information that is scanned to your PC so that you will have access to his business contacts information. Of course, this would have to be a mutually agreed upon usage. This brings us to the next topic, Bluetooth security.

Bluetooth Protocol Overview


Bluetooth specifications include protocols [4] and profiles [5]. Protocols specify the workings of an individual component (RFCOMM or L2CAP, for example), while the profiles specify how a set of protocols can be used for implementing a particular usage model. Profiles are important to have a common understanding of the protocol stack in order to promote interoperability of usage model implementations. The Link Management Protocol (LMP), baseband, and radio are typically implemented in the Bluetooth hardware modules. These modules can interface to the host using different interfaces. However, all Bluetooth controllers should implement the Bluetooth Host Controller Interface (HCI). The Logical Link Control and Adaptation Protocol (L2CAP) implements a second link-layer protocol to address protocol multiplexing, segmentation, and reassembly. L2CAP hosts a set of client protocols. A couple of such protocols are the Service Discovery Protocol (SDP) and a serial cable emulation protocol called RFCOMM. Figure 1 summarizes the Bluetooth protocol stack.

Figure 1: Summary of Bluetooth protocol stack


The L2CAP is a core component of the stack that contributes to the overall throughput that can be achieved.

Power Consumption
As acable-replacement technology, its not surprising that Bluetooth devices are usually battery-powered devices, such as wireless mice and mobile phones. To

conserve power, most Bluetooth devices operate as low-power, 1 mW radios (Class 3 radio power). This gives Bluetooth devices a range of about 510 meters. This range is far enough for comfortable wireless peripheral communication but close enough to avoid drawing too much power from the devices power source.

Security

SOME BLUETOOTH DEVICES:

Bluetooth I Pod

WL MOUSE

WL PRINTER

WL HF EXT

BLUETOOTH MOBILE

BLUETOOTH PEN DRIVE

BLUETOOTH REMOTE

BLUETOOTH PEN DRIVE

Security is a challenge faced by every communications standard. Wireless communications present special security challenges. Bluetooth builds security into its model on several different levels, beginning with the security inherent in its frequency-hopping scheme At the lowest levels of the protocol stack, Bluetooth uses the publicly available cipher algorithm known as SAFER+ to authenticate a devices identity. The generic-access profile depends on this authentication for its device-pairing process. This process involves creating a

special link to create and exchange a link key. Once verified, the link key is used to negotiate an encryption mode the devices will use for their communication.

ADVANTAGES AND APPLICATIONS OF BLUETOOTH Bluetooth can handle data and voice simultaneously. It is capable of supporting one between computers and their connected units. Bluetooth is an open standard for wireless connectivity with supporters mostly from the PC and cell phone industries. Its primary market is for data and voice transfer between communication devices and PCs. It is capable of supporting one asynchronous data channel and up to three synchronous voice channels, or one channel for both voice and data. This capability combined with adhoc device connection and automatic service discovery make it a superior solution for mobile devices and Internet applications. Bluetooth finds applications in PC and peripheral networking , hidden computing ,data synchronization for address books and calendars, home networking and home appliances such a s heating systems and entertainment devices. Asynchronous data channel and up to three synchronous voice channels, or one channel for both voice and data. This capability combined with adhoc device connection and automatic service discovery make it a superior solution for mobile devices and Internet applications.

LIMITATIONS OF BLUETOOTH

The main drawback of Bluetooth is its limited connection distance and less transmission speeds. It supports data rates up to 780kb/s which may be used for unidirectional data transfer. It is perfectly adequate for file transfer and printing applications.

CONCLUSION
With-its relativelylow implementation costs, Bluetooth technology seems destined to dominate the electronic landscape, as humans worldwide will be able to form personal area networks with devices and completely simplify the way in which they interact with electronic tools and each other. In the years to come, Bluetooth will become a worldwide connectivity among electronic devices, leading to applications unthinkable by todays technological standards. Because the radio frequency used is globally available, Bluetooth can offer fast and secure connectivity all over the world.

Você também pode gostar