You are on page 1of 29

PRESENTATION

y WALIULLAH y NABEEL y MUDDASIR y SAQUIB y AHMEDULLAH

BLUETOOTH
BaseBand Specification
.Frequency Hopping .Physical Links .Packets .Error Correction .Logical Channels .Channel Control .Bluetooth Audio .Bluetooth Security

FREQUENCY HOPPING
y It provides resistance to interference and multipath effects. y It provides a form of multiple access among co-Located device in different piconets.

Characteristics
y The total bandwidth is divided into 79 Physical

channels of 1 MHz

y FH occurs by jumping 1 physical channel to another in

a Pseudorandom sequence.

y The hope rate is 1600 hops per second(0.625 ms). y Each 0.625 ms Time period is referred to as a slot &

these are numbered Sequentially.

Working
y Bluetooth radios communicate using TDD Discipline. y TDD is a link transmission technique in which data are transmitted in 1

direction at a time.
y More then two devices share the piconet medium, the access technique

is TDMA.
y Piconet access can be characterized as FH-TDD-TDMA.

Frequency Hop TDD

Explanation
y Transmission of a packet starts at the beginning of a slot. Packet y y y y

lengths requiring 1, 3, or 5 slots are allowed. For multislot packets, the radio remains at the same frequency until the entire packet has been sent. In the next slot after the multislot packet, the radio returns to the frequency required for its hopping sequence During the transmission, two or four hop frequencies have been skipped. A complex mathematical operation involving permutations and exclusive- OR (XOR) operations is used to generate a pseudorandom hop sequence.

PHYSICAL LINKS
Synchronous connection oriented(SCO)
y Allocates a fixed bandwidth between a point-to-point connection y y y y

involving the master & a single slave. The Master maintains the SCO link by using reserved slots at a regular intervals. The basic unit of reservation is two consecutive slots(One in each transmission direction). The Master can support up to 3 simultaneous SCO links A Slave can support 2 or 3 SCO links.

Asynchronous Connectionless (ACL)


y A point-to-point multipoint link between the master and all the slave

in the Piconet.
y The Master can exchange packets with any Slave on a Per-slot basis,

including a Slave already engaged in an SCO links.


y Only ACL links can exist. y Packet retransmission is applied on most ACL Packets.

Working
SCO
y SCO links are used primarily to exchange time-bounded data requiring

guaranteed data rate but without guaranteed delivery. y The guaranteed data rate is achieved through the reservation of a particular number of slots.

ACL
y ACL links provide a packet-switched style of connection. y No bandwidth reservation is possible & delivery maybe guaranteed

through error detection & retransmission. y A Slave is permitted to return an ACL packet in the Slave-to-Master slot if & only if it has been addressed in the preceding Master-to-Slave slot.

PACKETS
Access code
y Used for timing synchronization, offset compensation, paging and inquiry. y Consist of a preamble, a sync word, and a trailer. y The preamble used for DC compensation. y The pattern 0101 if the least significant ( Leftmost) bit in the Sync Word is

1.

y The trailer is 0101 in the most significant (Rightmost) bit of the Sync Word

is 1.

Types of Access Code


y Channel Access Code( CAC )
Identifies a Piconet (unique for a Piconet)

y Device Access Code


Used for Paging & its subsequent responses.

y Inquiry Access Code


Used for Inquiry purposes.

Packet Header
The Header format for all Bluetooth packets consist of six fields.
y AM_ADDR: Transmission from the Master to a Slave & Slave to a Master in the

Piconet from the Broadcast as 0 it s reserved value.


y TYPE: Identifies the type of Packet. Four type codes are reserved for control

packets common to both SCO & ACL links.


y FLOW: Provides a 1-bit flow control mechanism for ACL traffic only. When a

packet with Flow = 1 is received, transmission may resume.

y ARQN: Provides a 1-bit acknowledgement mechanism for ACL traffic.

Protected by CRC. If ARQN=1 is returned, NAK then assume implicity. If a NAK is received, the relevant packet is retransmitted.

y SEQN: Provides a 1-bit sequential numbering schemes. Transmitted packets are

alternately labeled with a 1 or 0.

y Header Error Control( HEC ): An 8-bit error detection code used to protect the

Packet Header.

Payload Format
y For some types, the baseband specification defines a format for the

Payload field. The Payload format consists of 3 fields.


y Payload Header: An 8-bit header is defined for a single-slot packets, & a 16-bit

header is defined for multislot Packets.


y Payload Body: Contains User Information. y CRC: A 16-bit CRC code is used on all data payloads except the AUX1 packet.

ERROR CORRECTION
At the baseband level, Bluetooth makes use of 3 Error correction schemes: 1/3 rate FEC ( Forward Error Correction)
y The 1/3 rate FEC is used on the 18-bit packet header & also for the voice

field in an HV1 Packet.


y The scheme simply involves sending three copies of each bit. y A Majority logic is used: Each received triple of bits is mapped into

whichever bit is in the Majority.

2/3 rate FEC( Forward Error Correction)


y The 2/3 rate FEC is used in all DM packets in the Field of DV packets,

the FHS packet and the HV2 packet.


y The Encoder is a form of hamming code with parameters. y This code can correct all single Errors & detect all Double Errors in

each Codeword.

ARQ( Automatic Repeat Request ) The ARQ scheme is used with DM & DH packets, & the data field of DV packets. The scheme is similar to ARQ schemes used in data link protocols. ARQ schemes have the following Elements:
y Error Detection: The destination detects errors & discard packets that are in Error. y Positive Acknowledgement: The destination returns a positive acknowledgment to successfully received, Error-Free packets. y Retransmission After Timeout: The source retransmits a packet that has not been Acknowledgment after a predetermined amount of time. y Negative Acknowledgment & Retransmission: The destination returns a negative acknowledgment to packets in which an Error is detected & source retransmits such Packets.

LOGICAL CHANNELS
Bluetooth defines 5 types of logical data channels designated to carry different type of Payload Traffic.
y Link Control(LC): Used to manage the flow of packets over the link

interface. This channel carries low-level link control information like ARQ, Flow Control and Payload Characterization.
y Link Manager(LM):Transports link management information between

participating stations. This logical channel supports LMP traffic & can be carried over either an SCO or ACL link.

y User Asynchronous(UA): Carries asynchronous user data. This channel

is normally carried over the ACL link but may be carried in a DV packet on the SCO link.
y User Isochronous(UI):Carries isochronous user data. At the baseband

level, the UI channel is treated the same way as a UA channel. Timing to provide Isochronous properties is provided at Higher Layer.
y User Synchronous(US): Carries synchronous user data. This channel

carried over the SCO links.

CHANNEL CONTROL
y y y y y y y y y y

There are three major states: STANDBY CONNECTION PARK In addition, there are seven sub states Page page scan inquiry inquiry scan master response slave response inquiry response.

The sub states are interim states that are used to establish connections and enable device discovery. To move from one state or sub state to another, either commands from the link manager are used, or internal signals in the link controller are used.

BLUETOOTH AUDIO
The baseband specification indicates that either 2 voice encoding schemes can be used: Pulse Code Modulation(PCM) or Continuously Variable Slope Delta
y On the air-interface, either a 64 kb/s log PCM (Pulse Code

Modulation) format (A-law or -law) may be used, or a 64 kb/s CVSD (Continuous Variable Slope Delta Modulation) may be used. syllabic commanding.

y The latter format applies an adaptive delta modulation algorithm with y The voice coding on the line interface is designed to have a quality

equal to or better than the quality of 64 kb/s log PCM.

Pulse Code Modulation

Continuously Variable Slope Delta Modulation

BLUETOOTH SECURITY
The Bluetooth baseband specification defines a facility for a link security between any two Bluetooth device.
y Authentication: To verify the claimed identity of one of the two

Bluetooth device involved an Exchange.

y Encryption(Privacy):User information can be protected by Encryption

of the Packet Payload. The access code & the Packet header are never encrypted. Encryption is performed using an encryption Algorithm.

y Key Management & Usage: When Encryption is enabled, the Master

sends a random number to the Slave. For each packet transmission, a new Encryption key is generated.

Security Algorithms
Unit Address: The 48-bit device address, which is publicly known. Secret Authentication Key: A secret 128-bit key. Secret Privacy Key: A secret key of length from 4 to 128 bits. Random Number: A 128-bit random number derived from a pseudorandom generation algorithm in the Bluetooth Unit.

Q&A

THANK YOU

You might also like