46
1 BLUETOOTH BLUETOOTH TECHNOLOGY TECHNOLOGY A revolution in wireless A revolution in wireless communication communication

Bluetooth

Embed Size (px)

DESCRIPTION

Detailed power point presentation on Bluetooth, covering all the aspects of the technology from its introduction to the present usage.

Citation preview

Page 1: Bluetooth

11

BLUETOOTH BLUETOOTH TECHNOLOGYTECHNOLOGY

A revolution in wireless A revolution in wireless communicationcommunication

Page 2: Bluetooth

22

ROAD MAPROAD MAP

IntroductionIntroduction Basic DefinitionsBasic Definitions TopologyTopology ProtocolsProtocols

Link Management & SecurityLink Management & Security Applications and FutureApplications and Future

Page 3: Bluetooth

33

IntroductionIntroduction

Aim :- To replace cables between mobiles, PC Aim :- To replace cables between mobiles, PC cards, headsets, desktops and other devices.cards, headsets, desktops and other devices.

Developed by Special Interest Group (SIG)Developed by Special Interest Group (SIG) Association of I.T majors like Intel, IBM, Association of I.T majors like Intel, IBM,

Nokia and ToshibaNokia and Toshiba

Page 4: Bluetooth

44

Bluetooth Verses Infrared Bluetooth Verses Infrared

Slower than IR as time Slower than IR as time taken to discover the taken to discover the intended recipientintended recipient

Penetration of solid Penetration of solid objectsobjects

Omni directionalOmni directional

Advantage of proximity Advantage of proximity so less time requirementso less time requirement

No such featureNo such feature

Unidirectional with 30 Unidirectional with 30 degrees rangedegrees range

Page 5: Bluetooth

55

BT Verses IRBT Verses IR

Data transfer rate 721 Data transfer rate 721 KbpsKbps

30 feet range30 feet range Mobility during data Mobility during data

transfertransfer Internet compatibleInternet compatible

(emulating EIA\ TIA 232)(emulating EIA\ TIA 232)

Rate is 4 MbpsRate is 4 Mbps

Range very lessRange very less Relatively stationaryRelatively stationary

Page 6: Bluetooth

66

Bluetooth DefinitionsBluetooth Definitions

Piconet : Collection of Piconet : Collection of devices connected via devices connected via Bluetooth in ad hoc Bluetooth in ad hoc fashion. Limited to 8 fashion. Limited to 8 units in a Piconetunits in a Piconet

Scatternet : Two or Scatternet : Two or more independent more independent unsynchronized Piconet. unsynchronized Piconet.

Page 7: Bluetooth

77

DefinitionsDefinitions

Master : A device in Master : A device in Piconet whose clock Piconet whose clock and hopping sequence and hopping sequence are used to are used to synchronize all the synchronize all the devices. It also devices. It also numbers the numbers the communication communication channelschannels

Page 8: Bluetooth

88

DefinitionsDefinitions

Slave : All other devices Slave : All other devices in the Piconet except in the Piconet except mastermaster

MAC : 3-bit media MAC : 3-bit media access control address access control address used to differentiate used to differentiate between participating between participating units units

Page 9: Bluetooth

99

Bluetooth technologyBluetooth technology

Implemented using short range transreceiversImplemented using short range transreceivers Specifications comprises a system solution Specifications comprises a system solution

consisting of a hardware, a software & consisting of a hardware, a software & interoperability requirementsinteroperability requirements

Uses globally available unlicensed ISM radio Uses globally available unlicensed ISM radio band of 2.4 GHz. band of 2.4 GHz.

Frequency range 2.4 – 2.484 GHzFrequency range 2.4 – 2.484 GHz

Page 10: Bluetooth

1010

BT technologyBT technology

Advantage of using an unlicensed frequency Advantage of using an unlicensed frequency band is that it is globally acceptableband is that it is globally acceptable

Page 11: Bluetooth

1111

Types of LinksTypes of Links

Asynchronous Connection Links (ACL)Asynchronous Connection Links (ACL)

Supports symmetrical, asymmetrical, packet-Supports symmetrical, asymmetrical, packet-switched & point to multipoint linksswitched & point to multipoint links

Data Transfer Rate: 433.9 Kbps(sym.)Data Transfer Rate: 433.9 Kbps(sym.) 732.2 Kbps in one, 57.6 Kbps in 732.2 Kbps in one, 57.6 Kbps in

reverse(asymmetric)reverse(asymmetric)

Page 12: Bluetooth

1212

Types of LinksTypes of Links

Synchronous Connection Oriented Links Synchronous Connection Oriented Links (SCO)(SCO)

Provide symmetrical, circuit-switched & point to Provide symmetrical, circuit-switched & point to point connectionspoint connections

Page 13: Bluetooth

1313

Audio and VideoAudio and Video

For voice coding 64 Kbps channels are requiredFor voice coding 64 Kbps channels are required Channels are derived through use of PCM or Channels are derived through use of PCM or

CVSDMCVSDM Video encoding decoding using MPEG –4 Video encoding decoding using MPEG –4

formatformat Radio links use freq. hopping spread spectrum Radio links use freq. hopping spread spectrum

techniquestechniques

Page 14: Bluetooth

1414

Spread SpectrumSpread Spectrum

Method of wireless communication that takes Method of wireless communication that takes a narrow band signal and spreads it over a a narrow band signal and spreads it over a broader portion of the available frequency broader portion of the available frequency band.band.

CDMA applies the same conceptCDMA applies the same concept

Page 15: Bluetooth

1515

Advantages of Spread Advantages of Spread Spectrum TechniqueSpectrum Technique

Prevents Interference : where transmission Prevents Interference : where transmission disruption by external source such as noise from disruption by external source such as noise from electromagnetic devices.electromagnetic devices.

Prevents Jamming : where stronger signal Prevents Jamming : where stronger signal overwhelms the weaker one.overwhelms the weaker one.

No reflection off solids. No reflection off solids. No interception : where unauthorized users No interception : where unauthorized users

capture signal to determine the content. capture signal to determine the content.

Page 16: Bluetooth

1616

Performance CharacteristicsPerformance Characteristics

Features\FunctionsFeatures\Functions PerformancePerformance

1.Connection Type1.Connection Type

2.Spectrum2.Spectrum

3.Transmission Power3.Transmission Power

4.Aggregate Data Rate4.Aggregate Data Rate

5.Range5.Range

6.Supported stations6.Supported stations

Spread spectrumSpread spectrum

2.4GHz. ISM band2.4GHz. ISM band

1 milliwatt1 milliwatt

1 Mbps using frequency 1 Mbps using frequency hoppinghopping

Up to 30 feet Up to 30 feet

Up to 8 devices per Up to 8 devices per piconetpiconet

Page 17: Bluetooth

1717

Features\FunctionsFeatures\Functions PerformancePerformance

Voice ChannelsVoice Channels Up to 3Up to 3

Data SecurityData Security For authentication a 128 For authentication a 128 bit key; for encryption bit key; for encryption key size configurable (8-key size configurable (8-128 bits)128 bits)

Addressing Addressing Each bit has 48 bit MAC Each bit has 48 bit MAC addressaddress

Page 18: Bluetooth

1818

Bluetooth TopologyBluetooth Topology

Ad-hoc connection where each Piconet is identified Ad-hoc connection where each Piconet is identified by a different hopping sequenceby a different hopping sequence

Synchronization in unlicensed ISM band not Synchronization in unlicensed ISM band not permitted but BT devices do it using TDMpermitted but BT devices do it using TDM

Service discovery protocol allows wider applications Service discovery protocol allows wider applications ex: create LANex: create LAN

Clustering avoided using technical safeguards.Clustering avoided using technical safeguards.

Page 19: Bluetooth

1919

Bluetooth ProtocolsBluetooth Protocols

Bluetooth Protocol LayersBluetooth Protocol Layers Bluetooth Core Protocols (Baseband, LMP, Bluetooth Core Protocols (Baseband, LMP,

L2CAP, SDP)L2CAP, SDP) Cable Replacement Protocols (Radio Freq. Cable Replacement Protocols (Radio Freq.

Communication)Communication) Telephony Control Protocols (TCSBIN, AT-Telephony Control Protocols (TCSBIN, AT-

Commands)Commands) Adopted Protocols (PPP, TCP, OBEX, WAP, Adopted Protocols (PPP, TCP, OBEX, WAP,

vCard, vCalender)vCard, vCalender)

Page 20: Bluetooth

2020

LMP and SDPLMP and SDP

LMP : responsible for link setup & control LMP : responsible for link setup & control between Bluetooth devices, including the between Bluetooth devices, including the control and negotiations of baseband packet control and negotiations of baseband packet sizessizes

SDP : device information, services and SDP : device information, services and characteristics of services can be queried. characteristics of services can be queried.

Page 21: Bluetooth

2121

BLUETOOTHBLUETOOTH

LINK MANAGEMENTLINK MANAGEMENT

Page 22: Bluetooth

2222

Link ManagementLink Management

Peer to Peer communication using LMPPeer to Peer communication using LMP Link ManagerLink Manager Messages Exchanged (PDU’s)Messages Exchanged (PDU’s) Within 30 secondsWithin 30 seconds

PDUPDU 55 different types of PDU’s55 different types of PDU’s 7 bit op code7 bit op code

Page 23: Bluetooth

2323

AUTHENTICATIONAUTHENTICATION

General Response MessagesGeneral Response Messages LMP_acceptedLMP_accepted LMP_not_acceptedLMP_not_accepted

Challenge- Response SchemeChallenge- Response Scheme Verifier sends(LMP_au_rand)Verifier sends(LMP_au_rand) Response is a function of challenge ,Claimant ‘s Response is a function of challenge ,Claimant ‘s

(BD_ADDR)&Secret Key(BD_ADDR)&Secret Key Common Secret key is required for proper calculationCommon Secret key is required for proper calculation

Page 24: Bluetooth

2424

PAIRINGPAIRING When no Common Link Key:When no Common Link Key:

128 bit Initialization Key based on PIN and 128 bit Initialization Key based on PIN and random no.random no.

Calculation of Response on keyCalculation of Response on key

Verifier Approves the Link KeyVerifier Approves the Link Key Response not correct then ErrorResponse not correct then Error Code authentication failure (LMP_detach)Code authentication failure (LMP_detach)

Page 25: Bluetooth

2525

Link Key is Created after authenticationLink Key is Created after authentication Link Key Created may be either Link Key Created may be either

combination of Keys or one of the unit’s combination of Keys or one of the unit’s unit key(LMP_unit _key & unit key(LMP_unit _key & LMP_comb_key)LMP_comb_key)

Waiting Interval:Waiting Interval: Increased exponentiallyIncreased exponentially

Page 26: Bluetooth

2626

ENCRYPTIONENCRYPTION

Is an Option.Is an Option. Master’s Will in piconetMaster’s Will in piconet

Master & Slave must AgreeMaster & Slave must Agree Point to Point or also broadcast packet’sPoint to Point or also broadcast packet’s

Page 27: Bluetooth

2727

ENCRYPTIONENCRYPTIONStartStart StopStop

Master is configured to Master is configured to Transmit unencrypted Transmit unencrypted packets and receive packets and receive encrypted .encrypted .

Slave is configured To Slave is configured To Transmit and Receive Transmit and Receive encrypted packetsencrypted packets

Master is configured to Master is configured to Transmit and Receive Transmit and Receive encrypted packetsencrypted packets

Master is configured to Master is configured to Transmit encrypted and Transmit encrypted and receive unencrypted .receive unencrypted .

Slave is configured To Slave is configured To Transmit and Receive Transmit and Receive unencrypted .unencrypted .

Master is configured to Master is configured to Transmit and Receive Transmit and Receive unencrypted .unencrypted .

Page 28: Bluetooth

2828

Clock Offset RequestClock Offset Request

Every Device has an Internal System ClockEvery Device has an Internal System Clock Timing and frequncy determined by the master in Timing and frequncy determined by the master in

Piconet.Piconet. Difference between slave’s and master’s.Difference between slave’s and master’s. Clock offset is updated on each time a packet Clock offset is updated on each time a packet

is received.is received.

Page 29: Bluetooth

2929

BLUETOOTH SECURITYBLUETOOTH SECURITY

Built in SecurityBuilt in Security Frequency HoppingFrequency Hopping

Pseudorandom code sequencePseudorandom code sequence Lasts 0.4 secondsLasts 0.4 seconds 75 channels in 2.4GHZ75 channels in 2.4GHZ

Authentication preventing spoofing unwanted accessAuthentication preventing spoofing unwanted access Encryption makes data unintelligible.Encryption makes data unintelligible. Inhibiting user-friendly hence 3 levels of security.Inhibiting user-friendly hence 3 levels of security.

Page 30: Bluetooth

3030

Security ModesSecurity Modes

Mode 1:Mode 1: Absence of security (Bypassing Link –Level security Absence of security (Bypassing Link –Level security

functions)functions) Exchange of vCard and vCalendersExchange of vCard and vCalenders

Mode 2:Mode 2: Service Level Security for parallel applicationsService Level Security for parallel applications

Mode 3:Mode 3: Link Level SecurityLink Level Security LM enforces security at connection set up.LM enforces security at connection set up. Link KeysLink Keys

Page 31: Bluetooth

3131

Key Length(8 and 128 bits)Key Length(8 and 128 bits) 128 bit challenge and 32 bit response .128 bit challenge and 32 bit response . Depends on Level of SecurityDepends on Level of Security Maximum length limited by HardwareMaximum length limited by Hardware

Page 32: Bluetooth

3232

LAYOUTLAYOUT

FIELDS OF APPLICATION.FIELDS OF APPLICATION. BLUETOOTH ADVANTAGEBLUETOOTH ADVANTAGE SHORTCOMINGS OF THE SHORTCOMINGS OF THE

TECHNOLOGY.TECHNOLOGY. COMPARISON WITH IR & WLAN.COMPARISON WITH IR & WLAN. MISNOMERS.MISNOMERS. RESEARCHES ON THE TECHNOLOGY. RESEARCHES ON THE TECHNOLOGY. FUTURE ASPECTS.FUTURE ASPECTS.

Page 33: Bluetooth

3333

APPLICATIONSAPPLICATIONS

WAP enabled smart phones.WAP enabled smart phones. Electronic trading via handheld devices.Electronic trading via handheld devices. ad hoc Home/personal area network.ad hoc Home/personal area network. 3G Telephony.3G Telephony.

Page 34: Bluetooth

3434

BLUETOOTH ADVANTAGEBLUETOOTH ADVANTAGE

Increased mobility in office by connecting Increased mobility in office by connecting various peripherals with BT.various peripherals with BT. VVoice and data transmission possibleoice and data transmission possible 721 kbps suffices most of the common uses.721 kbps suffices most of the common uses. Built in sufficient encryption and Built in sufficient encryption and

authentication.authentication. Cheaper insatllation & maintainence.Cheaper insatllation & maintainence.

Page 35: Bluetooth

3535

ERROR CORRECTIONERROR CORRECTION

1/3 rate FEC (Forward Error Correction)1/3 rate FEC (Forward Error Correction) 2/3 rate FEC2/3 rate FEC ARQ unnumbered scheme (Automatic Repeat ARQ unnumbered scheme (Automatic Repeat

Request). Request). This reduces the available bandwidth.This reduces the available bandwidth.

Page 36: Bluetooth

3636

RADIATION THREATSRADIATION THREATS

Penetration depth of RF is about 1.5 cm at Penetration depth of RF is about 1.5 cm at 2450 MHz and about 2.5 cm at 900 MHz 2450 MHz and about 2.5 cm at 900 MHz

It cannot generate enough heat to produce fire It cannot generate enough heat to produce fire hazards.hazards.

Radiation not beamed but dispersed in all Radiation not beamed but dispersed in all direction.direction.

But in long run EM radiation can cause ill But in long run EM radiation can cause ill effects in some persons.effects in some persons.

Page 37: Bluetooth

3737

LOOPHOLES IN SECURITYLOOPHOLES IN SECURITY

Key initialization is not reliable.Key initialization is not reliable. Unit key can leak the information in traffic.Unit key can leak the information in traffic. BT device address can be used to generate logs BT device address can be used to generate logs

of transaction.of transaction. Battery draining denial of service scheme. Battery draining denial of service scheme.

Page 38: Bluetooth

3838

BLUETOOTH v/s INFRAREDBLUETOOTH v/s INFRARED

BT IrDABT IrDARange-10 to 100 mRange-10 to 100 m 20 cm to 2 m20 cm to 2 m

Omnidirectional comm.Omnidirectional comm. Bidirectional comm.Bidirectional comm.

Peak data rate- 1mbpsPeak data rate- 1mbps 16 mbps16 mbps

Can support 8 devices in Can support 8 devices in piconetpiconet

2 devices can interact2 devices can interact

at timeat time

Page 39: Bluetooth

3939

BLUETOOTH v\s WLANBLUETOOTH v\s WLAN WLAN BT WLAN BT

VendorsVendors Proxim, 3COM, Proxim, 3COM, Symbol, Cisco  Symbol, Cisco 

Most chip Most chip vendorsvendors

SPEEDSPEED 11-54 Mbps11-54 Mbps 1-2 Mbps1-2 Mbps

No. of access pts No. of access pts requiredrequired

Every 200 feetEvery 200 feet Every 30 feetEvery 30 feet

Distance Distance coveragecoverage

Upto 300 feetUpto 300 feet Upto 30 feetUpto 30 feet

interferenceinterference 2.4 GHz band is 2.4 GHz band is significant here  significant here 

pollutedpolluted

interferenceinterference

Cost Cost expensiveexpensive CheaperCheaper

(Rs1200-300)(Rs1200-300)

Page 40: Bluetooth

4040

IrDa ResponseIrDa Response

Infra com launches RED BEAMER Infra com launches RED BEAMER technology.technology.

Indirect and diffused IR will increase mobility Indirect and diffused IR will increase mobility of IR devices.of IR devices.

Transmission at only 56kbps.Transmission at only 56kbps.

Page 41: Bluetooth

4141

BLUETOOTH FACTSBLUETOOTH FACTS

Its not WLAN. Data throughput is much less Its not WLAN. Data throughput is much less in BT.in BT.

BT can jam WLAN as both use 2.4GHz RF.BT can jam WLAN as both use 2.4GHz RF. Not designed to carry heavy traffic loads. Not designed to carry heavy traffic loads. Not suitable in server-based applications. Not suitable in server-based applications.

Page 42: Bluetooth

4242

PIONEERS IN RESEARCHPIONEERS IN RESEARCH

IBM- Watch pad and cyber phones.IBM- Watch pad and cyber phones. MS- Intelligent apps for Windows.MS- Intelligent apps for Windows. INTEL-wireless PC Cards, access points.INTEL-wireless PC Cards, access points. MOTOROLA & TOSHIBA-pc mobile MOTOROLA & TOSHIBA-pc mobile

interface via bluetooth.interface via bluetooth. GENERAL MOTORS- Better communication GENERAL MOTORS- Better communication

in cars.in cars. NEC-launched BT enabled notebook.NEC-launched BT enabled notebook.

Page 43: Bluetooth

4343

Page 44: Bluetooth

4444

BLUETOOTH FUTUREBLUETOOTH FUTURE

100 million devices in use and around 2005 100 million devices in use and around 2005 650 million devices will be deployed.650 million devices will be deployed.

19% vehicles will be bluetooth enabled by 19% vehicles will be bluetooth enabled by 2007.2007.

Page 45: Bluetooth

4545

SOME PRODUCTS IN SOME PRODUCTS IN MARKETMARKET

Ericsson R520 Bluetooth/WAP/GPRS/Triband Ericsson R520 Bluetooth/WAP/GPRS/Triband Ericsson T36 Bluetooth/WAP/HSCSD/Triband Ericsson T36 Bluetooth/WAP/HSCSD/Triband Alcatel OneTouch 700 GPRS, WAP, Bluetooth Alcatel OneTouch 700 GPRS, WAP, Bluetooth TDK Bluetooth Product Range TDK Bluetooth Product Range Bluetooth-enabled Nokia 9110 linked to a FujiFilm Bluetooth-enabled Nokia 9110 linked to a FujiFilm

digital camera digital camera Ericsson Bluetooth GSM Headset Ericsson Bluetooth GSM Headset Ericsson Communicator Ericsson Communicator

Page 46: Bluetooth

4646

REFRENCESREFRENCES www.countersys.com/tech/bluetooth.htmlwww.countersys.com/tech/bluetooth.html www.bluetooth.comwww.bluetooth.com www.cnet.comwww.cnet.com www.motorola.comwww.motorola.com www.palowireless.comwww.palowireless.com www.swedetrack.comwww.swedetrack.com www.mobileinfo.comwww.mobileinfo.com www.computer.orgwww.computer.org www.informit.comwww.informit.com www.erricsson.comwww.erricsson.com www.norwoodsystems.comwww.norwoodsystems.com