Bluetooth

Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

BLUETOOTH

Bluetooth is a wireless LAN technology designed to connect devices of different


functions such as telephones, notebooks, computers (desktop and laptop), cameras,
printers, coffee makers, and so on. A Bluetooth LAN is an ad hoc network, which
means that the network is formed spontaneously; the devices, sometimes called
gadgets, find each other and make a network called a piconet. A Bluetooth LAN
can even be connected to the Internet if one of the gadgets has this capability. A
Bluetooth LAN, by nature, cannot be large. If there are many gadgets that try to
connect, there is chaos. Bluetooth technology has several applications. Peripheral
devices such as a wireless mouse or keyboard can communicate with the computer
through this technology. Monitoring devices can communicate with sensor devices
in a small health care center. Home security devices can use this technology to
connect different sensors to the main security controller. Conference attendees can
synchronize their laptop computers at a conference.

Architecture
Bluetooth defines two types of networks: piconet and scatternet.

Piconets:
A Bluetooth network is called a piconet, or a small net. A piconet can have up to
eight stations, one of which is called the primary the rest are called secondaries.
All the secondary stations synchronize their clocks and hopping sequence with the
primary. Note that a piconet can have only one primary station. The
communication between the primary and the secondary can be one-to-one or oneto-many. Although a piconet can have a maximum of seven secondaries, an
additional eight secondaries can be in the parked state. A secondary in a parked
state is synchronized with the primary, but cannot take part in communication until
it is moved from the parked state. Because only eight stations can be active in a
piconet, activating a station from the parked state means that an active station must
go to the parked state.

Scat/ernet
Piconets can be combined to form what is called a scatternet. A secondary station
in one piconet can be the primary in another piconet. This station can receive
messages from the primary in the first piconet (as a secondary) and, acting as a
primary, deliver them to secondaries in the second piconet. A station can be a
member of two piconets.

Bluetooth Devices
A Bluetooth device has a built-in short-range radio transmitter. The current data
rate is 1 Mbps with a 2.4-GHz bandwidth. This means that there is a possibility of
interference between the IEEE 802.11b wireless LANs and Bluetooth LANs.

Bluetooth Layers
Bluetooth uses several layers that do not exactly match those of the Internet model.

Radio Layer
The radio layer is roughly equivalent to the physical layer of the Internet model.
Bluetooth devices are low-power and have a range of 10 m.

Band
Bluetooth uses a 2.4-GHz ISM band divided into 79 channels of 1 MHz each.

FHSS
Bluetooth uses the frequency-hopping spread spectrum (FHSS) method in the
physical layer to avoid interference from other devices or other networks.
Bluetooth hops 1600 times per second, which means that each device changes its
modulation frequency 1600 times per second. A device uses a frequency for only
625 us (1/1600 s) before it hops to another frequency; the dwell time is 625 us.

Modulation
To transform bits to a signal, Bluetooth uses a sophisticated version of FSK, called
GFSK (FSK with Gaussian bandwidth filtering; a discussion of this topic is beyond
the scope of this book). GFSK has a carrier frequency. Bit 1 is represented by a
frequency deviation above the carrier; bit a is represented by a frequency deviation
below the carrier. The frequencies, in megahertz, are defined according to the
following formula for each channel:
Fc=2402+n n =0, 1, 2, 3... 78
For example, the first channel uses carrier frequency 2402 MHz (2.402 GHz), and
the second channel uses carrier frequency 2403 MHz (2.403 GHz).

Baseband Layer
The baseband layer is roughly equivalent to the MAC sublayer in LANs. The
access method is TDMA (see Chapter 12). The primary and secondary
communicate with each other using time slots. The length of a time slot is exactly
the same as the dwell time, 625 us. This means that during the time that one
frequency is used, a sender sends a frame to a secondary, or a secondary sends a
frame to the primary. Note that the communication is only between the primary
and a secondary; secondaries cannot communicate directly with one another.

TDMA
Bluetooth uses a form of TDMA (see Chapter 12) that is called TDD-TDMA (time
division
Duplex TDMA). TDD-TDMA is a kind of half-duplex communication in which
the secondary and receiver send and receive data, but not at the same time (half
duplex); however, the communication for each direction uses different hops. This
is similar to walkie-talkies using different carrier frequencies.

Single-Secondary Communication
If the piconet has only one secondary, the TDMA operation is very simple. The
time is divided into slots of 625 us. The primary uses even numbered slots
(0, 2, 4, ...); the secondary uses odd-numbered slots (1, 3, 5, ...).
TDD-TDMA allows the primary and the secondary to communicate in half-duplex
mode.
In slot 0, the primary sends, and the secondary receives; in slot 1, the secondary
sends, and the primary receives. The cycle is repeated.

IEEE 802.11
IEEE 802.11 is a set of media access control (MAC) and physical layer (PHY)
specifications for implementing wireless local area network (WLAN) computer
communication in the 2.4, 3.6, 5 and 60 GHz frequency bands. They are created
and maintained by the IEEE LAN/MAN Standards Committee (IEEE 802). The
base version of the standard was released in 1997 and has had subsequent
amendments. The standard and amendments provide the basis for wireless network
products using the Wi-Fi brand. While each amendment is officially revoked when
it is incorporated in the latest version of the standard, the corporate world tends to
market to the revisions because they concisely denote capabilities of their products.
As a result, in the market place, each revision tends to become its own standard.
The 802.11 family consists of a series of half-duplex over-the
air modulation techniques that use the same basic protocol. 802.11-1997 was the
first wireless networking standard in the family, but 802.11b was the first widely
accepted one, followed by 802.11a, 802.11g, 802.11n and 802.11ac. Other
standards in the family (cf, h, j) are service amendments and extensions or
corrections to the previous specifications.
802.11b and 802.11g use the 2.4 GHz ISM band, operating in the United States
under Part 15 of the U.S. Federal Communications Commission Rules and
Regulations. Because of this choice of frequency band, 802.11b and g equipment
may occasionally suffer interference from microwave ovens, cordless
telephones and Bluetooth devices. 802.11b and 802.11g control their interference
and susceptibility to interference by using direct-sequence spread spectrum (DSSS)
and orthogonal frequency-division multiplexing (OFDM) signaling methods,
respectively. 802.11a uses the 5 GHz U-NII band, which, for much of the world,
offers at least 23 non-overlapping channels rather than the 2.4 GHz ISM frequency
band, where adjacent channels overlap - see list of WLAN channels. Better or
worse performance with higher or lower frequencies (channels) may be realized,
depending on the environment.

The segment of the radio frequency spectrum used by 802.11 varies between
countries. In the US, 802.11a and 802.11g devices may be operated without a
license, as allowed in Part 15 of the FCC Rules and Regulations. Frequencies used
by channels one through six of 802.11b and 802.11g fall within the
2.4 GHz amateur radio band.

You might also like