11
BLUETOOTH BLUETOOTH TECHNOLOGYTECHNOLOGY
A revolution in wireless A revolution in wireless communicationcommunication
22
ROAD MAPROAD MAP
IntroductionIntroduction Basic DefinitionsBasic Definitions TopologyTopology ProtocolsProtocols
Link Management & SecurityLink Management & Security Applications and FutureApplications and Future
33
IntroductionIntroduction
Aim :- To replace cables between mobiles, PC Aim :- To replace cables between mobiles, PC cards, headsets, desktops and other devices.cards, headsets, desktops and other devices.
Developed by Special Interest Group (SIG)Developed by Special Interest Group (SIG) Association of I.T majors like Intel, IBM, Association of I.T majors like Intel, IBM,
Nokia and ToshibaNokia and Toshiba
44
Bluetooth Verses Infrared Bluetooth Verses Infrared
Slower than IR as time Slower than IR as time taken to discover the taken to discover the intended recipientintended recipient
Penetration of solid Penetration of solid objectsobjects
Omni directionalOmni directional
Advantage of proximity Advantage of proximity so less time requirementso less time requirement
No such featureNo such feature
Unidirectional with 30 Unidirectional with 30 degrees rangedegrees range
55
BT Verses IRBT Verses IR
Data transfer rate 721 Data transfer rate 721 KbpsKbps
30 feet range30 feet range Mobility during data Mobility during data
transfertransfer Internet compatibleInternet compatible
(emulating EIA\ TIA 232)(emulating EIA\ TIA 232)
Rate is 4 MbpsRate is 4 Mbps
Range very lessRange very less Relatively stationaryRelatively stationary
66
Bluetooth DefinitionsBluetooth Definitions
Piconet : Collection of Piconet : Collection of devices connected via devices connected via Bluetooth in ad hoc Bluetooth in ad hoc fashion. Limited to 8 fashion. Limited to 8 units in a Piconetunits in a Piconet
Scatternet : Two or Scatternet : Two or more independent more independent unsynchronized Piconet. unsynchronized Piconet.
77
DefinitionsDefinitions
Master : A device in Master : A device in Piconet whose clock Piconet whose clock and hopping sequence and hopping sequence are used to are used to synchronize all the synchronize all the devices. It also devices. It also numbers the numbers the communication communication channelschannels
88
DefinitionsDefinitions
Slave : All other devices Slave : All other devices in the Piconet except in the Piconet except mastermaster
MAC : 3-bit media MAC : 3-bit media access control address access control address used to differentiate used to differentiate between participating between participating units units
99
Bluetooth technologyBluetooth technology
Implemented using short range transreceiversImplemented using short range transreceivers Specifications comprises a system solution Specifications comprises a system solution
consisting of a hardware, a software & consisting of a hardware, a software & interoperability requirementsinteroperability requirements
Uses globally available unlicensed ISM radio Uses globally available unlicensed ISM radio band of 2.4 GHz. band of 2.4 GHz.
Frequency range 2.4 – 2.484 GHzFrequency range 2.4 – 2.484 GHz
1010
BT technologyBT technology
Advantage of using an unlicensed frequency Advantage of using an unlicensed frequency band is that it is globally acceptableband is that it is globally acceptable
1111
Types of LinksTypes of Links
Asynchronous Connection Links (ACL)Asynchronous Connection Links (ACL)
Supports symmetrical, asymmetrical, packet-Supports symmetrical, asymmetrical, packet-switched & point to multipoint linksswitched & point to multipoint links
Data Transfer Rate: 433.9 Kbps(sym.)Data Transfer Rate: 433.9 Kbps(sym.) 732.2 Kbps in one, 57.6 Kbps in 732.2 Kbps in one, 57.6 Kbps in
reverse(asymmetric)reverse(asymmetric)
1212
Types of LinksTypes of Links
Synchronous Connection Oriented Links Synchronous Connection Oriented Links (SCO)(SCO)
Provide symmetrical, circuit-switched & point to Provide symmetrical, circuit-switched & point to point connectionspoint connections
1313
Audio and VideoAudio and Video
For voice coding 64 Kbps channels are requiredFor voice coding 64 Kbps channels are required Channels are derived through use of PCM or Channels are derived through use of PCM or
CVSDMCVSDM Video encoding decoding using MPEG –4 Video encoding decoding using MPEG –4
formatformat Radio links use freq. hopping spread spectrum Radio links use freq. hopping spread spectrum
techniquestechniques
1414
Spread SpectrumSpread Spectrum
Method of wireless communication that takes Method of wireless communication that takes a narrow band signal and spreads it over a a narrow band signal and spreads it over a broader portion of the available frequency broader portion of the available frequency band.band.
CDMA applies the same conceptCDMA applies the same concept
1515
Advantages of Spread Advantages of Spread Spectrum TechniqueSpectrum Technique
Prevents Interference : where transmission Prevents Interference : where transmission disruption by external source such as noise from disruption by external source such as noise from electromagnetic devices.electromagnetic devices.
Prevents Jamming : where stronger signal Prevents Jamming : where stronger signal overwhelms the weaker one.overwhelms the weaker one.
No reflection off solids. No reflection off solids. No interception : where unauthorized users No interception : where unauthorized users
capture signal to determine the content. capture signal to determine the content.
1616
Performance CharacteristicsPerformance Characteristics
Features\FunctionsFeatures\Functions PerformancePerformance
1.Connection Type1.Connection Type
2.Spectrum2.Spectrum
3.Transmission Power3.Transmission Power
4.Aggregate Data Rate4.Aggregate Data Rate
5.Range5.Range
6.Supported stations6.Supported stations
Spread spectrumSpread spectrum
2.4GHz. ISM band2.4GHz. ISM band
1 milliwatt1 milliwatt
1 Mbps using frequency 1 Mbps using frequency hoppinghopping
Up to 30 feet Up to 30 feet
Up to 8 devices per Up to 8 devices per piconetpiconet
1717
Features\FunctionsFeatures\Functions PerformancePerformance
Voice ChannelsVoice Channels Up to 3Up to 3
Data SecurityData Security For authentication a 128 For authentication a 128 bit key; for encryption bit key; for encryption key size configurable (8-key size configurable (8-128 bits)128 bits)
Addressing Addressing Each bit has 48 bit MAC Each bit has 48 bit MAC addressaddress
1818
Bluetooth TopologyBluetooth Topology
Ad-hoc connection where each Piconet is identified Ad-hoc connection where each Piconet is identified by a different hopping sequenceby a different hopping sequence
Synchronization in unlicensed ISM band not Synchronization in unlicensed ISM band not permitted but BT devices do it using TDMpermitted but BT devices do it using TDM
Service discovery protocol allows wider applications Service discovery protocol allows wider applications ex: create LANex: create LAN
Clustering avoided using technical safeguards.Clustering avoided using technical safeguards.
1919
Bluetooth ProtocolsBluetooth Protocols
Bluetooth Protocol LayersBluetooth Protocol Layers Bluetooth Core Protocols (Baseband, LMP, Bluetooth Core Protocols (Baseband, LMP,
L2CAP, SDP)L2CAP, SDP) Cable Replacement Protocols (Radio Freq. Cable Replacement Protocols (Radio Freq.
Communication)Communication) Telephony Control Protocols (TCSBIN, AT-Telephony Control Protocols (TCSBIN, AT-
Commands)Commands) Adopted Protocols (PPP, TCP, OBEX, WAP, Adopted Protocols (PPP, TCP, OBEX, WAP,
vCard, vCalender)vCard, vCalender)
2020
LMP and SDPLMP and SDP
LMP : responsible for link setup & control LMP : responsible for link setup & control between Bluetooth devices, including the between Bluetooth devices, including the control and negotiations of baseband packet control and negotiations of baseband packet sizessizes
SDP : device information, services and SDP : device information, services and characteristics of services can be queried. characteristics of services can be queried.
2121
BLUETOOTHBLUETOOTH
LINK MANAGEMENTLINK MANAGEMENT
2222
Link ManagementLink Management
Peer to Peer communication using LMPPeer to Peer communication using LMP Link ManagerLink Manager Messages Exchanged (PDU’s)Messages Exchanged (PDU’s) Within 30 secondsWithin 30 seconds
PDUPDU 55 different types of PDU’s55 different types of PDU’s 7 bit op code7 bit op code
2323
AUTHENTICATIONAUTHENTICATION
General Response MessagesGeneral Response Messages LMP_acceptedLMP_accepted LMP_not_acceptedLMP_not_accepted
Challenge- Response SchemeChallenge- Response Scheme Verifier sends(LMP_au_rand)Verifier sends(LMP_au_rand) Response is a function of challenge ,Claimant ‘s Response is a function of challenge ,Claimant ‘s
(BD_ADDR)&Secret Key(BD_ADDR)&Secret Key Common Secret key is required for proper calculationCommon Secret key is required for proper calculation
2424
PAIRINGPAIRING When no Common Link Key:When no Common Link Key:
128 bit Initialization Key based on PIN and 128 bit Initialization Key based on PIN and random no.random no.
Calculation of Response on keyCalculation of Response on key
Verifier Approves the Link KeyVerifier Approves the Link Key Response not correct then ErrorResponse not correct then Error Code authentication failure (LMP_detach)Code authentication failure (LMP_detach)
2525
Link Key is Created after authenticationLink Key is Created after authentication Link Key Created may be either Link Key Created may be either
combination of Keys or one of the unit’s combination of Keys or one of the unit’s unit key(LMP_unit _key & unit key(LMP_unit _key & LMP_comb_key)LMP_comb_key)
Waiting Interval:Waiting Interval: Increased exponentiallyIncreased exponentially
2626
ENCRYPTIONENCRYPTION
Is an Option.Is an Option. Master’s Will in piconetMaster’s Will in piconet
Master & Slave must AgreeMaster & Slave must Agree Point to Point or also broadcast packet’sPoint to Point or also broadcast packet’s
2727
ENCRYPTIONENCRYPTIONStartStart StopStop
Master is configured to Master is configured to Transmit unencrypted Transmit unencrypted packets and receive packets and receive encrypted .encrypted .
Slave is configured To Slave is configured To Transmit and Receive Transmit and Receive encrypted packetsencrypted packets
Master is configured to Master is configured to Transmit and Receive Transmit and Receive encrypted packetsencrypted packets
Master is configured to Master is configured to Transmit encrypted and Transmit encrypted and receive unencrypted .receive unencrypted .
Slave is configured To Slave is configured To Transmit and Receive Transmit and Receive unencrypted .unencrypted .
Master is configured to Master is configured to Transmit and Receive Transmit and Receive unencrypted .unencrypted .
2828
Clock Offset RequestClock Offset Request
Every Device has an Internal System ClockEvery Device has an Internal System Clock Timing and frequncy determined by the master in Timing and frequncy determined by the master in
Piconet.Piconet. Difference between slave’s and master’s.Difference between slave’s and master’s. Clock offset is updated on each time a packet Clock offset is updated on each time a packet
is received.is received.
2929
BLUETOOTH SECURITYBLUETOOTH SECURITY
Built in SecurityBuilt in Security Frequency HoppingFrequency Hopping
Pseudorandom code sequencePseudorandom code sequence Lasts 0.4 secondsLasts 0.4 seconds 75 channels in 2.4GHZ75 channels in 2.4GHZ
Authentication preventing spoofing unwanted accessAuthentication preventing spoofing unwanted access Encryption makes data unintelligible.Encryption makes data unintelligible. Inhibiting user-friendly hence 3 levels of security.Inhibiting user-friendly hence 3 levels of security.
3030
Security ModesSecurity Modes
Mode 1:Mode 1: Absence of security (Bypassing Link –Level security Absence of security (Bypassing Link –Level security
functions)functions) Exchange of vCard and vCalendersExchange of vCard and vCalenders
Mode 2:Mode 2: Service Level Security for parallel applicationsService Level Security for parallel applications
Mode 3:Mode 3: Link Level SecurityLink Level Security LM enforces security at connection set up.LM enforces security at connection set up. Link KeysLink Keys
3131
Key Length(8 and 128 bits)Key Length(8 and 128 bits) 128 bit challenge and 32 bit response .128 bit challenge and 32 bit response . Depends on Level of SecurityDepends on Level of Security Maximum length limited by HardwareMaximum length limited by Hardware
3232
LAYOUTLAYOUT
FIELDS OF APPLICATION.FIELDS OF APPLICATION. BLUETOOTH ADVANTAGEBLUETOOTH ADVANTAGE SHORTCOMINGS OF THE SHORTCOMINGS OF THE
TECHNOLOGY.TECHNOLOGY. COMPARISON WITH IR & WLAN.COMPARISON WITH IR & WLAN. MISNOMERS.MISNOMERS. RESEARCHES ON THE TECHNOLOGY. RESEARCHES ON THE TECHNOLOGY. FUTURE ASPECTS.FUTURE ASPECTS.
3333
APPLICATIONSAPPLICATIONS
WAP enabled smart phones.WAP enabled smart phones. Electronic trading via handheld devices.Electronic trading via handheld devices. ad hoc Home/personal area network.ad hoc Home/personal area network. 3G Telephony.3G Telephony.
3434
BLUETOOTH ADVANTAGEBLUETOOTH ADVANTAGE
Increased mobility in office by connecting Increased mobility in office by connecting various peripherals with BT.various peripherals with BT. VVoice and data transmission possibleoice and data transmission possible 721 kbps suffices most of the common uses.721 kbps suffices most of the common uses. Built in sufficient encryption and Built in sufficient encryption and
authentication.authentication. Cheaper insatllation & maintainence.Cheaper insatllation & maintainence.
3535
ERROR CORRECTIONERROR CORRECTION
1/3 rate FEC (Forward Error Correction)1/3 rate FEC (Forward Error Correction) 2/3 rate FEC2/3 rate FEC ARQ unnumbered scheme (Automatic Repeat ARQ unnumbered scheme (Automatic Repeat
Request). Request). This reduces the available bandwidth.This reduces the available bandwidth.
3636
RADIATION THREATSRADIATION THREATS
Penetration depth of RF is about 1.5 cm at Penetration depth of RF is about 1.5 cm at 2450 MHz and about 2.5 cm at 900 MHz 2450 MHz and about 2.5 cm at 900 MHz
It cannot generate enough heat to produce fire It cannot generate enough heat to produce fire hazards.hazards.
Radiation not beamed but dispersed in all Radiation not beamed but dispersed in all direction.direction.
But in long run EM radiation can cause ill But in long run EM radiation can cause ill effects in some persons.effects in some persons.
3737
LOOPHOLES IN SECURITYLOOPHOLES IN SECURITY
Key initialization is not reliable.Key initialization is not reliable. Unit key can leak the information in traffic.Unit key can leak the information in traffic. BT device address can be used to generate logs BT device address can be used to generate logs
of transaction.of transaction. Battery draining denial of service scheme. Battery draining denial of service scheme.
3838
BLUETOOTH v/s INFRAREDBLUETOOTH v/s INFRARED
BT IrDABT IrDARange-10 to 100 mRange-10 to 100 m 20 cm to 2 m20 cm to 2 m
Omnidirectional comm.Omnidirectional comm. Bidirectional comm.Bidirectional comm.
Peak data rate- 1mbpsPeak data rate- 1mbps 16 mbps16 mbps
Can support 8 devices in Can support 8 devices in piconetpiconet
2 devices can interact2 devices can interact
at timeat time
3939
BLUETOOTH v\s WLANBLUETOOTH v\s WLAN WLAN BT WLAN BT
VendorsVendors Proxim, 3COM, Proxim, 3COM, Symbol, Cisco Symbol, Cisco
Most chip Most chip vendorsvendors
SPEEDSPEED 11-54 Mbps11-54 Mbps 1-2 Mbps1-2 Mbps
No. of access pts No. of access pts requiredrequired
Every 200 feetEvery 200 feet Every 30 feetEvery 30 feet
Distance Distance coveragecoverage
Upto 300 feetUpto 300 feet Upto 30 feetUpto 30 feet
interferenceinterference 2.4 GHz band is 2.4 GHz band is significant here significant here
pollutedpolluted
interferenceinterference
Cost Cost expensiveexpensive CheaperCheaper
(Rs1200-300)(Rs1200-300)
4040
IrDa ResponseIrDa Response
Infra com launches RED BEAMER Infra com launches RED BEAMER technology.technology.
Indirect and diffused IR will increase mobility Indirect and diffused IR will increase mobility of IR devices.of IR devices.
Transmission at only 56kbps.Transmission at only 56kbps.
4141
BLUETOOTH FACTSBLUETOOTH FACTS
Its not WLAN. Data throughput is much less Its not WLAN. Data throughput is much less in BT.in BT.
BT can jam WLAN as both use 2.4GHz RF.BT can jam WLAN as both use 2.4GHz RF. Not designed to carry heavy traffic loads. Not designed to carry heavy traffic loads. Not suitable in server-based applications. Not suitable in server-based applications.
4242
PIONEERS IN RESEARCHPIONEERS IN RESEARCH
IBM- Watch pad and cyber phones.IBM- Watch pad and cyber phones. MS- Intelligent apps for Windows.MS- Intelligent apps for Windows. INTEL-wireless PC Cards, access points.INTEL-wireless PC Cards, access points. MOTOROLA & TOSHIBA-pc mobile MOTOROLA & TOSHIBA-pc mobile
interface via bluetooth.interface via bluetooth. GENERAL MOTORS- Better communication GENERAL MOTORS- Better communication
in cars.in cars. NEC-launched BT enabled notebook.NEC-launched BT enabled notebook.
4343
4444
BLUETOOTH FUTUREBLUETOOTH FUTURE
100 million devices in use and around 2005 100 million devices in use and around 2005 650 million devices will be deployed.650 million devices will be deployed.
19% vehicles will be bluetooth enabled by 19% vehicles will be bluetooth enabled by 2007.2007.
4545
SOME PRODUCTS IN SOME PRODUCTS IN MARKETMARKET
Ericsson R520 Bluetooth/WAP/GPRS/Triband Ericsson R520 Bluetooth/WAP/GPRS/Triband Ericsson T36 Bluetooth/WAP/HSCSD/Triband Ericsson T36 Bluetooth/WAP/HSCSD/Triband Alcatel OneTouch 700 GPRS, WAP, Bluetooth Alcatel OneTouch 700 GPRS, WAP, Bluetooth TDK Bluetooth Product Range TDK Bluetooth Product Range Bluetooth-enabled Nokia 9110 linked to a FujiFilm Bluetooth-enabled Nokia 9110 linked to a FujiFilm
digital camera digital camera Ericsson Bluetooth GSM Headset Ericsson Bluetooth GSM Headset Ericsson Communicator Ericsson Communicator
4646
REFRENCESREFRENCES www.countersys.com/tech/bluetooth.htmlwww.countersys.com/tech/bluetooth.html www.bluetooth.comwww.bluetooth.com www.cnet.comwww.cnet.com www.motorola.comwww.motorola.com www.palowireless.comwww.palowireless.com www.swedetrack.comwww.swedetrack.com www.mobileinfo.comwww.mobileinfo.com www.computer.orgwww.computer.org www.informit.comwww.informit.com www.erricsson.comwww.erricsson.com www.norwoodsystems.comwww.norwoodsystems.com