You are on page 1of 46

BLUETOOTH

TECHNOLOGY
A revolution in wireless
communication

1
ROAD MAP
 Introduction
 Basic Definitions
 Topology
 Protocols
 Link Management & Security
 Applications and Future

2
Introduction
 Aim :- To replace cables between mobiles, PC
cards, headsets, desktops and other devices.
 Developed by Special Interest Group (SIG)
 Association of I.T majors like Intel, IBM,
Nokia and Toshiba

3
Bluetooth Verses Infrared
 Slower than IR as time  Advantage of proximity
taken to discover the so less time requirement
intended recipient
 Penetration of solid  No such feature
objects
 Omni directional  Unidirectional with 30
degrees range

4
BT Verses IR
 Data transfer rate 721  Rate is 4 Mbps
Kbps
 30 feet range  Range very less
 Mobility during data  Relatively stationary
transfer
 Internet compatible

(emulating EIA\ TIA 232)

5
Bluetooth Definitions
 Piconet : Collection of
devices connected via
Bluetooth in ad hoc
fashion. Limited to 8
units in a Piconet
 Scatternet : Two or
more independent
unsynchronized Piconet.

6
Definitions
 Master : A device in
Piconet whose clock
and hopping sequence
are used to
synchronize all the
devices. It also
numbers the
communication
channels

7
Definitions
 Slave : All other devices
in the Piconet except
master
 MAC : 3-bit media
access control address
used to differentiate
between participating
units

8
Bluetooth technology
 Implemented using short range transreceivers
 Specifications comprises a system solution
consisting of a hardware, a software &
interoperability requirements
 Uses globally available unlicensed ISM radio
band of 2.4 GHz.
 Frequency range 2.4 – 2.484 GHz

9
BT technology
 Advantage of using an unlicensed frequency
band is that it is globally acceptable

10
Types of Links
 Asynchronous Connection Links (ACL)

 Supports symmetrical, asymmetrical, packet-


switched & point to multipoint links
 Data Transfer Rate: 433.9 Kbps(sym.)
 732.2 Kbps in one, 57.6 Kbps in
reverse(asymmetric)

11
Types of Links
 Synchronous Connection Oriented Links
(SCO)

 Provide symmetrical, circuit-switched & point to


point connections

12
Audio and Video
 For voice coding 64 Kbps channels are required
 Channels are derived through use of PCM or
CVSDM
 Video encoding decoding using MPEG –4 format
 Radio links use freq. hopping spread spectrum
techniques

13
Spread Spectrum

 Method of wireless communication that takes


a narrow band signal and spreads it over a
broader portion of the available frequency
band.

 CDMA applies the same concept

14
Advantages of Spread
Spectrum Technique
 Prevents Interference : where transmission
disruption by external source such as noise from
electromagnetic devices.
 Prevents Jamming : where stronger signal
overwhelms the weaker one.
 No reflection off solids.
 No interception : where unauthorized users
capture signal to determine the content.

15
Performance Characteristics
Features\Functions Performance

1.Connection Type Spread spectrum


2.Spectrum 2.4GHz. ISM band
3.Transmission Power 1 milliwatt
4.Aggregate Data Rate 1 Mbps using frequency
hopping
5.Range Up to 30 feet
6.Supported stations Up to 8 devices per
piconet
16
Features\Functions Performance

Voice Channels Up to 3

Data Security For authentication a 128


bit key; for encryption
key size configurable (8-
128 bits)

Addressing Each bit has 48 bit MAC


address
17
Bluetooth Topology
 Ad-hoc connection where each Piconet is identified
by a different hopping sequence
 Synchronization in unlicensed ISM band not
permitted but BT devices do it using TDM
 Service discovery protocol allows wider applications
ex: create LAN
 Clustering avoided using technical safeguards.

18
Bluetooth Protocols
 Bluetooth Protocol Layers
 Bluetooth Core Protocols (Baseband, LMP,
L2CAP, SDP)
 Cable Replacement Protocols (Radio Freq.
Communication)
 Telephony Control Protocols (TCSBIN, AT-
Commands)
 Adopted Protocols (PPP, TCP, OBEX, WAP,
vCard, vCalender)

19
LMP and SDP
 LMP : responsible for link setup & control
between Bluetooth devices, including the
control and negotiations of baseband packet
sizes
 SDP : device information, services and
characteristics of services can be queried.

20
BLUETOOTH
LINK MANAGEMENT

21
Link Management
 Peer to Peer communication using LMP
 Link Manager
 Messages Exchanged (PDU’s)
 Within 30 seconds
 PDU
 55 different types of PDU’s
 7 bit op code

22
AUTHENTICATION
 General Response Messages
 LMP_accepted
 LMP_not_accepted

 Challenge- Response Scheme


 Verifier sends(LMP_au_rand)
 Response is a function of challenge ,Claimant ‘s
(BD_ADDR)&Secret Key
 Common Secret key is required for proper calculation

23
PAIRING
 When no Common Link Key:
 128 bit Initialization Key based on PIN and

random no.
 Calculation of Response on key

 Verifier Approves the Link Key


 Response not correct then Error

 Code authentication failure (LMP_detach)

24
 Link Key is Created after authentication
 Link Key Created may be either

combination of Keys or one of the unit’s


unit key(LMP_unit _key &
LMP_comb_key)
 Waiting Interval:
 Increased exponentially

25
ENCRYPTION
 Is an Option.
 Master’s Will in piconet

 Master & Slave must Agree


 Point to Point or also broadcast packet’s

26
ENCRYPTION
Start Stop
 Master is configured to  Master is configured to
Transmit unencrypted Transmit encrypted and
packets and receive receive unencrypted .
encrypted .
 Slave is configured To
 Slave is configured To Transmit and Receive
Transmit and Receive unencrypted .
encrypted packets  Master is configured to
Transmit and Receive
 Master is configured to unencrypted .
Transmit and Receive
encrypted packets

27
Clock Offset Request
 Every Device has an Internal System Clock
 Timing and frequncy determined by the master in
Piconet.
 Difference between slave’s and master’s.
 Clock offset is updated on each time a packet
is received.

28
BLUETOOTH SECURITY
 Built in Security
 Frequency Hopping
 Pseudorandom code sequence
 Lasts 0.4 seconds
 75 channels in 2.4GHZ
 Authentication preventing spoofing unwanted access
 Encryption makes data unintelligible.
 Inhibiting user-friendly hence 3 levels of security.

29
Security Modes
 Mode 1:
 Absence of security (Bypassing Link –Level security
functions)
 Exchange of vCard and vCalenders
 Mode 2:
 Service Level Security for parallel applications
 Mode 3:
 Link Level Security
 LM enforces security at connection set up.
 Link Keys

30
 Key Length(8 and 128 bits)
 128 bit challenge and 32 bit response .
 Depends on Level of Security
 Maximum length limited by Hardware

31
LAYOUT
 FIELDS OF APPLICATION.
 BLUETOOTH ADVANTAGE
 SHORTCOMINGS OF THE TECHNOLOGY.
 COMPARISON WITH IR & WLAN.
 MISNOMERS.
 RESEARCHES ON THE TECHNOLOGY.
 FUTURE ASPECTS.

32
APPLICATIONS
 WAP enabled smart phones.
 Electronic trading via handheld devices.
 ad hoc Home/personal area network.
 3G Telephony.

33
BLUETOOTH ADVANTAGE
 Increased mobility in office by connecting
various peripherals with BT.
 Voice and data transmission possible
 721 kbps suffices most of the common uses.
 Built in sufficient encryption and
authentication.
 Cheaper insatllation & maintainence.

34
ERROR CORRECTION
 1/3 rate FEC (Forward Error Correction)
 2/3 rate FEC
 ARQ unnumbered scheme (Automatic Repeat
Request).
 This reduces the available bandwidth.

35
RADIATION THREATS
 Penetration depth of RF is about 1.5 cm at
2450 MHz and about 2.5 cm at 900 MHz
 It cannot generate enough heat to produce fire
hazards.
 Radiation not beamed but dispersed in all
direction.
 But in long run EM radiation can cause ill
effects in some persons.

36
LOOPHOLES IN SECURITY
 Key initialization is not reliable.
 Unit key can leak the information in traffic.
 BT device address can be used to generate logs
of transaction.
 Battery draining denial of service scheme.

37
BLUETOOTH v/s INFRARED

BT IrDA
Range-10 to 100 m 20 cm to 2 m

Omnidirectional comm. Bidirectional comm.

Peak data rate- 1mbps 16 mbps

Can support 8 devices in 2 devices can interact


piconet at time
38
BLUETOOTH v\s WLAN
WLAN BT
Vendors Proxim, 3COM, Most chip
Symbol, Cisco  vendors
SPEED 11-54 Mbps 1-2 Mbps
No. of access pts Every 200 feet Every 30 feet
required
Distance Upto 300 feet Upto 30 feet
coverage
interference 2.4 GHz band is polluted
significant here  interference

Cost expensive Cheaper


39
(Rs1200-300)
IrDa Response
 Infra com launches RED BEAMER
technology.
 Indirect and diffused IR will increase mobility
of IR devices.
 Transmission at only 56kbps.

40
BLUETOOTH FACTS
 Its not WLAN. Data throughput is much less
in BT.
 BT can jam WLAN as both use 2.4GHz RF.
 Not designed to carry heavy traffic loads.
 Not suitable in server-based applications.

41
PIONEERS IN RESEARCH
 IBM- Watch pad and cyber phones.
 MS- Intelligent apps for Windows.
 INTEL-wireless PC Cards, access points.
 MOTOROLA & TOSHIBA-pc mobile
interface via bluetooth.
 GENERAL MOTORS- Better communication
in cars.
 NEC-launched BT enabled notebook.

42
43
BLUETOOTH FUTURE
 100 million devices in use and around 2005
650 million devices will be deployed.
 19% vehicles will be bluetooth enabled by
2007.

44
SOME PRODUCTS IN
MARKET
 Ericsson R520 Bluetooth/WAP/GPRS/Triband
 Ericsson T36 Bluetooth/WAP/HSCSD/Triband
 Alcatel OneTouch 700 GPRS, WAP, Bluetooth
 TDK Bluetooth Product Range
 Bluetooth-enabled Nokia 9110 linked to a FujiFilm
digital camera
 Ericsson Bluetooth GSM Headset
 Ericsson Communicator

45
REFRENCES
 www.countersys.com/tech/bluetooth.html
 www.bluetooth.com
 www.cnet.com
 www.motorola.com
 www.palowireless.com
 www.swedetrack.com
 www.mobileinfo.com
 www.computer.org
 www.informit.com
46
 www.erricsson.com

You might also like