0% found this document useful (0 votes)
62 views23 pages

Bluetooth Technology: Electronics & Communication Engineering

Download as docx, pdf, or txt
Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1/ 23

A Technical Seminar Report on

BLUETOOTH TECHNOLOGY
Submitted in partial fulfillment of the Academic requirements for the award of the
degree of

Bachelor of Technology

In

Electronics & Communication Engineering


Submitted by

SREEHARI YERMAL (18H51A04M0)

DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERING


CMR COLLEGE OF ENGINEERING & TECHNOLOGY
(Autonomous)
(NAAC Accredited with ‘A+’ Grade & NBA Accredited)
(Approved by AICTE, Permanently Affiliated to JNTU
Hyderabad) KANDLAKOYA, MEDCHAL ROAD, HYDERABAD
- 501401

2020-21
CMR COLLEGE OF ENGINEERING & TECHNOLOGY
(Autonomous)
(NAAC Accredited with ‘A+’ Grade & NBA Accredited)
(Approved by AICTE, Permanently Affiliated to JNTU
Hyderabad) KANDLAKOYA, MEDCHAL ROAD, HYDERABAD
- 501401
DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERING

CERTIFICATE

This is to certify that the Technical Seminar report entitled “BLUETOOTH


TECHNOLOGY” is a bonafide work done by SREEHARI YERMAL (18H51A04M0) of IV
B. Tech ECE, in partial fulfillment of the requirements for the award of the degree of Bachelor of
Technology in Electronics & Communication Engineering, submitted to the Department of
Electronics & Communication Engineering, CMR College of Engineering & Technology,
Hyderabad during the Academic Year 2020-21.

Dr. Krishnaveni Prof. E.N.V. Purna Chandra


Rao Coordinator, Department of ECE HOD, ECE Department

(ii)
ACKNOWLEDGEMENT

We are obliged and grateful to Prof. E.N.V. Purna Chandra Rao, HOD, Department of
ECE, CMRCET, for his cooperation in all respects during the course.

We would like to thank Dr. B. Lokeswara Rao, Professor of ECE, Dean Academics
CMRCET for his encouragement throughout our course.

We would like to thank Major Dr. V.A. Narayana, Principal, CMRCET, for his support in
the course of this work.

We would like to thank Shri Ch. Gopal Reddy garu, Secretary & Correspondent of
CMRCET, for his cooperation in all respects during the course.

It gives immense pleasure in expressing our deep sense of gratitude to Technical Seminar
In-charge Dr. M. Mahalakshmi, Associate Professor, Department of ECE, CMRCET, for her
valuable suggestions for Technical Seminar.

Finally, we would like to thank all teaching & non- teaching staff members of the
department, for their cooperation and support throughout the duration of our course.

Ultimately, we own all our success to our beloved parents, whose vision, love and
inspiration has made us to reach out for these glories.

Signature

SREEHARI YERMAL (18H51A04M0)

(iii)
INDEX
Serial CONTENTS Page No.
Number
ABSTRACT v
Chapter 1 INTRODUCTION 1
1.1 Introduction 2
1.2 History 2
Chapter 2 IMPLEMENTATION 4
2.1 Working 5
2.1.1 Transmission types and rates 5
2.1.2 Radio Frequency and Spectrum Hopping 5
2.1.3 Data Transmission 6
2.1.4 Network Management 7
2.1.5 Error Correction and Security 7
2.1.6 Connection Protocol 8
2.2 Usage Model 9
2.2.1 Peripheral Interconnects 10
2.2.2 Personal Area Network 10
2.3 Characteristics 11
2.4 Future Scope 11
2.4 Applications 12
2.5 Advantages 13
2.6 Disadvantages 13

Chapter 4 CONCLUSION 14
3.1 Conclusion

References 15

(iv)
ABSTRACT

Bluetooth wireless technology is a short-range communications technology intended to


replace the cables connecting portable and/or fixed devices while maintaining high
levels of security.
The key features of Bluetooth technology are robustness, low power, and low cost.
The Bluetooth specification defines a uniform structure for a wide range of devices to
connect and communicate with each other. Bluetooth technology has achieved global
acceptance such that any Bluetooth enabled device, almost everywhere in the world,
can connect to other Bluetooth enabled devices in proximity. Bluetooth enabled
electronic devices connect and communicate wirelessly through short-range, ad hoc
networks known as piconets. Each device can simultaneously communicate with up to
seven other devices within a single piconet. Each device can also belong to several
piconets simultaneously. Piconets are established dynamically and automatically as
Bluetooth enabled devices enter and leave radio proximity.
Most Bluetooth devices are described as 'Class 2'. These are very low power (typically
1 milliwatt - 1/1000th of a watt) and have a range of about 10 m (33 ft).Some devices -
for example, some plug in ‘dongles' that can be added to laptop computers - are Class
1. These have range comparable to that of Wi-Fi, i.e., 100 m or 330 ft. With Bluetooth,
short range is actually a benefit, because it reduces the chance of interference between
your Bluetooth devices and those belonging to other people nearby.

(v)
BLUETOOTH TECHNOLOGY

CHAPTER – I

INTRODUCTION

Department of ECE CMR College of Engineering & Technology pg. 1


1.1. INTRODUCTION:

 Bluetooth is a radio frequency specification for short range, point to point and point to
multi point voice and data transfer. Bluetooth technology facilitates the replacement of
cables normally used to connect one device to another by a short-range radio link. With
the help of Bluetooth we can operate our keyboard and mouse without direct
connection of CPU. Printers, fax machines, headphone, mouse, keyboard or any other
digital devices can be part of Bluetooth system.

   In spite of facilitating the replacement of cables, Bluetooth technology works as an


universal medium to bridge the existing data networks, a peripheral interface for
existing devices and provide a mechanism to form short ad hok network of connected
devices away from fixed network infrastructures.

    Due to their independence on short range radio link, Bluetooth devices do not
require a line of site connection in order to communicate. Therefore, a computer can
print information on a printer if printer is in inside the room. Two blue tooth devices
can talk to each other when they come within range of 10 meters to each other.

  Bluetooth technology represents an opportunity for the industry to deliver wireless


solutions that are ubiquitous across a broad range of devices. 

1.2. HISTORY:

Bluetooth was developed by Ericsson in the 1990s. It is named after the 10th
century Danish king Harald “Bluetooth” Gormsson, who united Denmark and
Norway. The Bluetooth logo combines the runes ᚼ and ᛒ, which are Harald’s
initials.
The name (which was actually proposed by an Intel engineer) signified the
ambition to become the unifying standard for all kinds of electronics – phones,
computers and various accessories.
At the time data cables (serial or USB) were used to, for example, sync data
between your computer and your PDA, infrared was available as a wireless
option. However, that required line-of-sight, meaning you had to “aim” the two
devices at each other during the data transfer.
Bluetooth was omnidirectional, though it worked at around 10m (30 ft)
maximum, so it didn’t really have a range advantage. Nor a speed advantage –
version 1.0 topped out at 721 Kbps.
That was plenty for the original use-cases planned and so the first Bluetooth-
enabled phone was unveiled in 2000 – an Ericsson, of course, the T36.
However, that wasn’t the first Bluetooth phone to actually hit the stores (the
T36 was cancelled).
The Ericsson T39 pioneered the tech, launching in 2001. That same year IBM
introduced the ThinkPad A30 laptop with a Bluetooth connection built in. Now
you could sync your phone and computers wirelessly.
The first Bluetooth accessories
The first-ever Bluetooth device was a wireless headset unveiled in 1999, which
won the “Best of Show Technology Award” at COMDEX. Soon after the first
Bluetooth car kits actually came out in 2001.
They were mono-only, but they served an important purpose – countries
around the world were already looking to ban the use of phones while driving.
For example, the UK made it illegal on December 1 2003 with fines starting at
£30, but they could rise to £1,000.
The first stereo headphones would arrive in 2004. Strangely, that happened a
year after the first Bluetooth-enabled MP3 player hit the market.
The Benefone Esc! from 1999 was the first phone with a built-in GPS receiver,
but it would be many years before that feature became standard – Bluetooth to
the rescue! In 2002 Socket unveiled the first stand-alone GPS receiver that
could send positioning data to a mobile device – a Pocket PC, in this case. It
cost $450, almost as much as the Pocket PC itself.

Bluetooth 2.0 was unveiled in 2005 with “EDR” (Enhanced Data Rate), which
tripled the transfer speed to 2.1 Mbps. It was an optional feature and it was still
too slow for heavy duty data transfers. The new standard did also boost the
range to 30m (100 ft).
But the true boost to performance would come in 2009 with Bluetooth 3.0 and
“HS” (High Speed), which achieved 24 Mbps. This used a Bluetooth link to do
the handshaking between the two devices then handed off the data to 802.11
hardware – so it was actually Wi-Fi that did the heavy lifting.
CHAPTER – II

IMPLEMENTATION
2.1. Working:

The technology of Bluetooth centres around a 9mm x 9mm microchip, which functions
as a low cost and short-range radio link. Bluetooth Technology provide a 10-meter
personal bubble that support simultaneous transmission of both voice 
and data for multiple devices. Up to 8 devices can be connected in a piconet, and uo to
10 piconets can exist within the 10-meter bubble. Each piconet support
up to 3 simultaneous full duplex voice devices.
       The gross data rate is 1 Mb/s, but the actual data rate are 432 kbps for full 
duplex transmission,721/56kbps for asymmetric transmission, and 384 kbps for 
tms2000 transmission.
         Bluetooth wireless technology is designed to be as secure as a wire with up to
128-bit public/private key authentication, and streaming cipher up to 64 bit based on a5
security.

2.1.1 TRANSMISSION TYPES AND RATES

The baseband (single channel per line) protocol combines circuit and packet
switching. To assure that packets do not arrive out of order, slots (up to five) can be
reserved for synchronous packets. As noted earlier, a different hop signal is used for
each packet. Circuit switching can be either asynchronous or synchronous. Up to
three synchronous (voice) data channels, or one synchronous and one asynchronous
data channel, can be supported on one channel. Each synchronous channel can
support a 64 Kb/s transfer rate, which is fully adequate for voice transmissions. An
asynchronous channel can transmit as much as 721 Kb/s in one direction and 57.6
Kb/s in the opposite direction. It is also possible for an asynchronous connection to
support 432.6 Kb/s in both directions if the link is symmetric.

2.1.2 RADIO FREQUENCY AND SPECTRUM HOPPING:

What if there's a lot of radio noise? Won't that interfere with Bluetooth connections?
As a rule, the answer is no. It is designed to use fast acknowledgement and
frequency hopping, which will make connections robust. It is packet-based, and will
jump to a new frequency after each packet is received, which not only helps limit
interference problems, but also adds to security. Data rates are one
megabyte/second, including headers. Full duplex transmissions (both directions at
once) are accomplished via time division multiplexing.
  The Bluetooth radio chip functions at 2.4 gigahertz, which is in the unlicensed
ISM (Industrial Scientific Medical) band. It separates the 2.4 gigahertz frequency
band into 79 hops one megahertz apart, starting with 2.402 and ending with 2.480
(though this bandwidth is narrower in Japan, France, and Spain). This spread
spectrum is used to hop from one channel to another, pseudo-randomly, which adds
a strong layer of security. Up to 1600 hops per second can be made. The standard
frequency range is 10 centimetres to 10 meters, and can be extended to at least 100
meters by increasing transmission power.

2.1.3 DATA TRANSMISSION:

Data can be transmitted both synchronously and asynchronously. The Synchronous


Connection Oriented (SCO) method is used primarily for voice, and Asynchronous
Connectionless (ACL) is primarily for data. Within a piconet, each master-slave
pair can use a different transmission mode, and modes can be changed at any time.
Time Division Duplex (TDD) is used by both SCO and ACL, and both support 16
types of packets, four of which are control packets that are the same in each type.
Because of the need for smoothness in data transmission, SCO packets are generally
delivered via reserved intervals, that is, the packets are sent in groups without
allowing other transmissions to interrupt. SCO packets can be transmitted without
polling by the sending unit. ACL links support both symmetric and assymetric
transmissions.

Bandwidth is controlled by the master unit, which determines how much of the total
each slave unit can use. Slaves cannot transmit data until they have been polled by
the master, and the master can broadcast messages to the slave units via ACL link.

2.1.4 NETWORK ARRANGEMENT:

Bluetooth network arrangements (topology) can   be either point-to-point or point-to-


multipoint. Any  unit in a piconet can establish a connection to another piconet to form
a scatternet. See the  figure, which diagrams a scatternet in which piconet A, which
consists of four units, is connected to piconet B, consisting of two units. Note that the
master unit of A is not the link Bluetooth network arrangements (topology) can
between the two piconets.
                                    

2.1.5 ERROR CORRECTION AND SECURITY:

On code (FEC), 2/3 rate forward error correction code FEC, and automatic repeat
request (ARQ). The FEC methods are designed to reduce the number of
retransmissions. However, the over hea Three error correction techniques have been
defined: 1/3 rate forward error corrected significantly slows transmissions, so is
generally not used in relatively error-free environments, with the exception of
packet headers. The ARQ scheme requires that the header error and cyclic
redundancy checks are okay. When they are, an acknowledge is sent. When they
aren't, the data is resent.

Security is provided in three ways: through pseudo-random frequency band hops,


authentication, and encryption. Frequency band hops make it difficult for anyone to
eavesdrop. Authentication allows a user to control connectivity to only devices
specified. Encryption uses secret key lengths of 1, 40, and 64 bits. The quality of
security is excellent for most applications. However, it is not the highest level
available, and for those users who require it, the suggestion is to investigate separate
network transfer protocols and security software
2.1.6 CONNECTION PROTOCOL:

Bluetooth connections are established via the following techniques: 


1. Standby: Devices not connected in a piconet are in standby mode. In this mode,
they listen for messages every 1.28 seconds over 32 hop frequencies (fewer in
Japan, Spain, and France).
2. Page/Inquiry: If a device wishes to make a connection with another device, it
sends out a page message, if the address is known, or an inquiry followed by a
page message, if it is unknown. The master unit sends out 16 identical page
messages on 16 hop frequencies to the slave unit. If there is no response, the
master retransmits on the other 16 hop frequencies. The inquiry method requires
an extra response from the slave unit, since the MAC address is unknown to the
master unit.
3. Active: Data transmission occurs.
4. Hold: When either the master or slave wishes, a hold mode can be established,
during which no data is transmitted. The purpose of this is to conserve power.
Otherwise, there is a constant data exchange. A typical reason for going into
hold mode is the connection of several piconets.
5. Sniff: The sniff mode, applicable only to slave units, is for power conservation,
though not at as reduced a level as hold. During this mode, the slave does not
take an active role in the piconet, but listens at a reduced level. This is usually a
programmable setting.
6. Park: Park mode is a more reduced level of activity than the hold mode. During
it, the slave is synchronized to the piconet, thus not requiring full reactivation,
but is not part of the traffic. In this state, they do not have MAC addresses, but
only listen enough to keep their synchronization with the master and check for
broadcast messages.
2.2 USAGE MODEL:

While the Bluetooth * usage model is based on connecting devices together, it is


focused on three broad categories: voice/data access points, peripheral interconnects,
and Personal Area Networking (PAN).

Voice/Data Access Points:

  Voice/data access points is one of the key initial usage models and involves
connecting a computing device to a communicating device via a secure wireless link
(see Figure 1). For example, a mobile computer equipped with Bluetooth technology
could link to a mobile phone that uses Bluetooth technology to connect to the Internet
to access e-mail. The mobile phone acts as a personal
access point. Even more ideal, the notebook can connect to the Internet while the cell
phone is being carried in a briefcase or purse. The Bluetooth usage model also
envisions public data access points in the future. Imagine the current data-equipped pay
phones in airports being
upgraded with Bluetooth modems. This would allow any mobile device equipped with
Bluetooth technology to easily connect to the Internet while located within ten meters
of that access point. These access points could, of course, support much higher data
rates than today’s modems, as public spaces could connect a variety of private
Bluetooth access points via a LAN that is routed to the Internet over a DSL line,
allowing each access point a private 1Mbps connection to the Internet.
2.2.1 PERIPHERAL INTERCONNECTS:

The second category of uses, peripheral interconnects, involves connecting other


devices together as shown in Figure 2. Imagine standard keyboards, mice, and joysticks
that work over a wireless link. The Bluetooth link is built into the mobile computer;
therefore, the cost of the peripheral device is less because an access point is not needed.
Additionally, many of these devices can be used in multiple markets. For example, a
Bluetooth headset used in the office could be connected to a Bluetooth access point
that provides access to the office phone and multi-      media functions of the mobile
computer. When mobile, the same headset could be used to interface with the cellular
phone (which can now remain in a
briefcase or purse).Another aspect of a short-range link like Bluetooth is in the area of
proximity security devices. In this case, if one device is not within range of another
device, the first device will go into a high security mode.

2.1.2 PERSONAL AREA NETWORKING:

The last usage model, Personal Area Networking (PAN), focuses on the ad-hoc
formation and breakdown of personal networks(see Figure 3). Imagine meeting
someone in an airport and quickly and securely exchanging documents by establishing
a private piconet. In the future, Bluetooth kiosks could provide access to electronic
media that could be quickly downloaded for later access on the mobile device.
2.3 CHARECTERISTICS:

These are the features of the Bluetooth technology: 


 It separates the frequency band into hops. This spread spectrum is used to hop
from one channel to another, which adds a strong layer of security.
 Up to eight devices can be networked in a piconet.
 Signals can be transmitted through walls and briefcases, thus eliminating the
need for line-of-sight.
 Devices do not need to be pointed at each other, as signals are omni-directional.
 Both synchronous and asynchronous applications are supported, making it easy
to implement on a variety of devices and for a variety of services, such as voice
and Internet.
 Governments worldwide regulate it, so it is possible to utilize the same standard
wherever one travels. 

2.4 FUTURE SCOPE:

At this time, we anticipate the Bluetooth SIG to evolve the Bluetooth technology to
provide greater bandwidth & distances, thus increasing the potential platforms &
applications used in the emerging personal area-networking marketplace.

Bluetooth is a continually expanding technology. There are plans to add many new
application profiles. With over 1800 companies working on Bluetooth, the future could
not be brighter. With a strong special interest group behind Bluetooth, the
standardization of the application profiles is almost assured.

According to market researchers, Cahners In-Stat Group, it is anticipated that as


many as 670 million products will have Bluetooth built-in by the year 2005.

Some members of the Bluetooth SIG such as Sony & Eastman Kodak are interested in
seeing the speed of Bluetooth increasing for applications such as streaming video.
Proposals are under consideration but it is not clear when products based on any of the
proposals would be available.
2.5 APPLICATIONS:

Some of the common applications of Bluetooth are −


 In laptops, notebooks and wireless PCs
 In mobile phones and PDAs (personal digital assistant).
 In printers.
 In wireless headsets.
 In wireless PANs (personal area networks) and even LANs (local area
networks)
 To transfer data files, videos, and images and MP3 or MP4.
 In wireless peripheral devices like mouse and keyboards.
 In data logging equipment.
 In the short-range transmission of data from sensors devices to sensor nodes
like mobile phones.
2.6 ADVANTAGES:

 It avoids interference from other wireless devices.


 It has lower power consumption.
 It is easily upgradeable.
 It has range better than Infrared communication.
 The Bluetooth is used for voice and data transfer.
 Bluetooth devices are available at very cheap cost.
 No line of sight hence can connect through any obstacles.
 Free to use if the device is installed with Bluetooth.
 The technology is adopted in many products such as head set, in car system,
printer, web cam, GPS system, keyboard and mouse.

2.7 DISADVANTAGES:
 It can lose connection in certain conditions.
 It has low bandwidth as compared to Wi-Fi.
 It allows only short range communication between devices.
 Security is a very key aspect as it +can be hacked.
FLEXIBLE ELECTRONIC SKIN

CHAPTER -III

CONCLUSION

Department of ECE CMR College of Engineering & Technology pg. 13


3.1 CONCLUSION:

Bluetooth is a standard used in links of radio of short scope, destined to replace wired
connections between electronic devices like cellular telephones, Personal Digital
Assistants (PDA), computers, and many other devices. Every year we have to add new
peripherals to our computers and the need to replace the wired connections is more
important every year. That is why the Bluetooth technology is going continue
expanding with the support of the industry of Computer science and of
Telecommunications, which in some way guarantees the success. One of the biggest
attractions of the implementation of this technology is the creation of networks, with
the Bluetooth technology is possible to form different networks in the same
geographical point, with relatively high speed of transmission. Anyway, the Bluetooth
technology has a limited scope, this characteristic of limited scope presents a great
disadvantage if we try to implement a net in one extensive geographical area. Another
positive aspect that presents this technology is the easy manipulation and configuration
of networks and sub-networks inside the same space with the implementation of
diverse Piconets interlaced across Scatternets with different configurations.

REFERENCES:
 IEEE Sensors Journal, Vol.12,No.8, August 12
 Massachusetts engineering firm MC 10 Nature materials
 ICap Technologies, http://www.icaptech.com/.
 Artificial Skin - used, first, blood, body, produced, Burke and Yannas Create
Synthetic Skin, Graftskin.
 Discoveries in medicine.com. 2010-03-11. Retrieved 2013-10-17.
 How is artificial skin made?: Information from". Answers.com. Retrieved 2013-10-
17.
 Robotic Tactile Sensing. Springer. p. 265. ISBN 978-94-007-0578-4.
Park, B. Chen, and R. J. Wood (Oct. 2011), Soft artificial skin with multimodal
sensing capability using embedded liquid conductors, Proc. IEEE Sensors Conf.,
Limerick, Ireland, pp. 1–3.
 S. P. Lacour (Aug. 2005) et al., Stretchable interconnects for elastic electronic
surfaces, Proc. IEEE, vol. 93, pp. 1459–1467.

You might also like