Você está na página 1de 45

Bluetooth

 What is bluetooth?
 Introduction
 Overview
 Specifications & Layers
 Profiles
 Ad-hoc networking
 Qualification
 Products & Future Usage
What is bluetooth?
 Bluetooth wireless technology is an
open specification for a low-cost,
low-power, short-range radio
technology for ad-hoc wireless
communication of voice and data
anywhere in the world.
Intoduction
 1994 Ericsson gets interested in wireless
connections from mobile telephones to
other devices like PDAs and accessories like
Headsets.
 Uses the radio range of 2.45 GHz
 Bluetooth is a wireless LAN technology designed to
connect devices of different functions such as telephones,
notebooks, computers, cameras, printers, coffee makers,
and so on.
 Several Bluetooth devices can form an ad hoc
network called a “piconet”
 In a piconet one device acts as a master (sets
frequency hopping behavior) and the others as
slaves
 Each piconet has one master and up to 7 simultaneous
slaves
 Master : device that initiates a data exchange.
 Slave : device that responds to the master
 Example: A conference room with many laptops
wishing to communicate with each other
 Scatternet
 Linking of multiple piconets through the master or
slave devices
 Bluetooth devices have point-to-multipoint capability
to engage in Scatternet communication.
Figure 14.19 Piconet

14.6
Figure 14.20 Scatternet

14.7
Overview
 Originally conceived as a cable
replacement technology
 Other usage models began to develop:
 Personal Area Network (PAN)
 Ad-hoc networks
 Data/voice access points
 Wireless telematics
 Bluetooth SIG (Special Interest Group) :
 Founded in 1998 by : Ericsson, Intel, IBM, Toshiba
and Nokia
 Currently more than 2500 adopter companies
 Created in order to promote, shape an define the
specification and position Bluetooth in the market
place Current specification : Bluetooth 2.1
Overview
 Advantages
 Bluetooth: interoperable
 IrDA: line of sight needed, point-to-point
 WLAN: higher power consumption
 Disadvantages
 Bluetooth: only up to 1 Mbps
 IrDA: much cheaper, faster (up to 16 Mbps)
 WLAN: faster (up to 11 Mbps)
WLAN and Bluetooth interfere each other
(both are using the ISM band)
Figure 14.21 Bluetooth layers

14.11
Layers
 Bluetooth Radio
 Baseband
 LMP (Link Manager Protocol)
 HCI (Host Controller Interface)
 L2CAP (Logical Link Control and Adaptation
Protocol)
 RFCOMM (Radio Frequency Communication)
 SDP (Service Discovery Protocol)
Bluetooth Radio
 the lowest defined layer of the
Bluetooth specification
 operating in the 2.4 GHz ISM Band
 accomplishes spectrum spreading by
frequency hopping (FHSS) from 2.402
GHz to 2.480 GHz
Bluetooth Radio
 Similar to Physical layer of Internet model
 specifics details of the air interface, including frequency,
frequency hopping, modulation scheme, and transmission
power
 3 different power classes
 Power Class1: long range (100m,100mW)
 Power Class2: mid range (10m,1-2,5mW)
 Power Class3: short range (0.1-10m,1mW)
 signal strength adjustment
 Band: 2.4GHz ISM band, FHSS, hops
1600times/sec, GFSK with carrier frequency
 The industrial, scientific and medical (ISM)
radio bands are radio bands (portions of the
radio spectrum) reserved internationally for the
use of radio frequency (RF) energy for
industrial, scientific and medical purposes
other than telecommunications.
 Examples of applications in these bands include
radio-frequency process heating, microwave
ovens, and medical diathermy machines.
Baseband
 Similar to MAC sublayer in LAN.
 Master and Slave communicate with each
other using time slots ie 625
microseconds
 Uses TDMA which is half-duplex
communication
 the physical layer of the Bluetooth that
provides
 Error correction
 Flow control
 Hopping sequence
 Security
 data is divided in packets
 access code: e.g. timing synchronization
 header: e.g. packet numbering, flow control,
slave address
 payload: voice, data or both
Baseband
 Connection Modes
Describes the set of rules by which all bluetooth
devices must abide in order to establish a link a
communicate with one another

 STANDBY : not connected in a piconet


 ACTIVE : active participation on the channel
 Power Saving Modes
 SNIFF : slave listens to the channel at a reduced rate
(decreasing of duty cycle ) least power efficient
 HOLD : data transfer is held for a specific time
period, medium power efficient
 PARK : synchronized to the piconet but does not
participate in traffic
Baseband
 Security Modes
 non-secure
 encryption enforced by application layer
 encryption enforced by link layer

 For devices
 trusted device
 untrusted device
 For services
 require authorization and authentication
 open to all devices
Single secondary communication
 Primary uses even-numbered
slots and secondary uses odd-
numbered sots
 Single slave
 In slot 0, primary sends, secondary
receives.
 In slot 1, secondary send and
primary receives
Figure 14.22 Single-secondary communication

14.21
Multiple Secondary communications

 More than one slave.


 Master uses even-numbered slots
and secondary uses odd-numbered
slots
 All secondary listen on even slots,
but only one sends in any odd
numbered slot
Figure 14.23 Multiple-secondary communication

14.23
Audio
 synchronous connection oriented(SCO)
links- Used when avoiding latency is
important, used in real time audio
 Asynchronous connectionless Link(AVC)
– used when data integrity is more
important than latency
 no retransmission
 errors appear as background noise
LMP (Link Manager Protocol)
 provides authentication, link setup
and link configuration including
power surveillance
 takes place as a service provider
 communication with LM PDUs
(protocol data units)
Figure 14.24 Frame format types

14.26
Frame format
Frame types:
1. One slot: 259 microsecs for hopping
and control mechanism.
2. Three slot: 3 slots. Length of the
frame 3 x 625-259=1616 bits.
Device with 3 slot frame remains at
the same hop for 3 slot.
3. Five slot: length =5 x 625-
259=2866 bits.
 Access code: identify master and
slave.
 Header:
1. Address: Identifies active devices the
frame is intended for. If the address is
0, uses broadcast( commn., from
primary to all secondary)
2. Type:Identifies frame type (ACL, SCO,
poll or null), the type of error correction
and number of slots of the frame
3. Flow(F): Flow control. If 1, used by
slave when its buffer is full and
cannot receive data further
4. ACK(A): piggyback and ACK into a
frame. Uses Stop and wait ARQ
5. Sequence(s): Number the frames
to detect retransmission
6. Checksum: Detect errors
L2CAP (Logical Link Control and
Adaptation Protocol)
 Provides a connection-oriented and
connectionless service to upper layer
 Protocols with quality-of-service functions
using multiplexing, segmentation and
reassembly
 two link types defined in Baseband layer:
 1. SCO (synchronous connection-oriented)
 2. ACL (asynchronous connection-less)

BUT ONLY ACL is supported by L2CAP


(SCO not planned)
L2CAP:
 3 major functions:
1. Accepts packets of upto 65 kb from
upper layers and breaks them in to
packets. At destn, frames are
reassembled
2. Handles multimplexing and
demultimplexing of multiple packet
sources.
3. Handles QoS: pass reliable data
from end to end.
Data packet frame

Length: size of data


CID: Unique identifier for the virtual channel created at this
level
Data: upto 65535 bytes
RFCOMM (Radio Frequency
Communication)
 Provides emulation of serial ports
 Supports up to 60 simultaneous
connections
 Differentiates between two device types:
 Type 1: communication end points (e.g. printer
or headsets)
 Type 2: devices which are part of
communication (e.g. modems)
 But in the protocol itself no distinction is
made, some information is for type 1 other
for type 2
SDP (Service Discovery Protocol)
 discovers which services are available
 identifies the characteristics of the
services
 uses a request/response model where each
transaction consists of one request protocol
data unit (PDU) and one response PDU
 SDP is used with L2CAP
 is optimized for the dynamic nature of
bluetooth
 SDP does not define methods for accessing
services
SDP (Service Discovery Protocol)
Profiles
 how bluetooth is used
 describe how implementations for a
specific use must be written
 defines options in each protocol
 defines parameter ranges
 profiles are used to solve
interoperability problems between
different manufacturers’ products
Profiles
Ad-hoc-networking
 piconet
 decentral, one master up to 7 slaves
 up to 255 parked slaves
 point to point or point to multipoint conn
 unique bluetooth device address
 scatternet
 overlapping of two piconets, up to 10
 different hopping sequences
 peer to peer (P2P) network
Ad-hoc-networking
 a: piconet with
a single slave

 b: piconet with
a multi slave

 c: scatternet
Qualification
 aims interoperability between all
bletooth devices
 no license fees
 bluetooth devices must support same
profiles
 bluetooth logo guarantees
interoperability
Qualification
 no line of sight required
 you can use it everywhere
 bluetooth chip
 integrated
 power management
 not really cheap
 Automatic ad-hoc networking
(invisible)
e.g.automaticdata synchronisation
Products
 Notebook PCs &  CD Player
desktop computers  TV/VCR/DVD
 Printers  Telephone Answering
 PDAs Devices
 Other handheld  Cordless Phones
devices  Cars
 Cell phones
 Wireless periperals:
 Headsets
 Cameras
 Access Points
Products
 2004 Toyota Prius
– hands free calls
 Toshiba Washer &
Dryer – downloads
the washer/dryer
software for new
clothes!
 Nokia N-gage
 Digital Pulse
Oximetry System
Future Usage
 Home Automation
 Home Entertainment/Games
 Electronic Commerce/M-Commerce
 Industrial Control
 Surveillance
 Access Control
 Location Based Services
 Current Trials: Shopping Malls, Train
Stations
Thats All !

Thanks for listening...

Você também pode gostar