Bluetooth Tech
Bluetooth Tech
INTRODUCTION
HOW IT WORKS
USES MODEL
COMPARISION WITH OTHER WIRELESS TECHNOLOGIES
APPLICATION
ADVANTAGES OF BLUETOOTH TECHNOLOGY
CONCLUSION
REFERENCE
Introduction to Bluetooth Technology
Bluetooth was named for the 10th Century Viking king , Harald
Blatand
(A.K.A., Bluetooth) who peacefully united all the tiny island kingdoms of
Denmark, southern Sweden, and southern Norway into one country . In
keeping with its namesake, Bluetooth, the new low-cost radio
technology, is
designed to unite or connect all different types of devices to effectively
work
as one. By uniting devices, Bluetooth eliminates the need for cabling in
a
wide range of products, including cellular phones, PCs, headphones,
audio
equipment, printers, and many more.
Bluetooth Definitions
Data transmission:
Data can be transmitted both synchronously and asynchronously.
The Synchronous Connection Oriented (SCO) method is used
primarily for voice, and Asynchronous Connectionless (ACL) is
primarily for data. Within a piconet, each master-slave pair can use
a different transmission mode, and modes can be changed at any
time. Time Division Duplex (TDD) is used by both SCO and ACL, and
both support 16 types of packets, four of which are control packets
that are the same in each type. Because of the need for smoothness
in data transmission, SCO packets are generally delivered via
reserved intervals, that is, the packets are sent in groups without
allowing other transmissions to interrupt. SCO packets can be
transmitted without polling by the sending unit. ACL links support
both symmetric and assymetric transmissions.
Network arrangement:
on code (FEC), 2/3 rate forward error correction code FEC, and
automatic repeat request (ARQ). The FEC methods are designed to
reduce the number of retransmissions. However, the over hea Three
error correction techniques have been defined: 1/3 rate forward
error corrected significantly slows transmissions, so is generally not
used in relatively error-free environments, with the exception of
packet headers. The ARQ scheme requires that the header error and
cyclic redundancy checks are okay. When they are, an acknowledge
is sent. When they aren't, the data is resent.
4. Hold: When either the master or slave wishes, a hold mode can
be established, during which no data is transmitted. The purpose
of this is to conserve power. Otherwise, there is a constant data
exchange. A typical reason for going into hold mode is the
connection of several piconets.
5. Sniff: The sniff mode, applicable only to slave units, is for power
conservation, though not at as reduced a level as hold. During
this mode, the slave does not take an active role in the piconet,
but listens at a reduced level. This is usually a programmable
setting.
6. Park: Park mode is a more reduced level of activity than the hold
mode. During it, the slave is synchronized to the piconet, thus
not requiring full reactivation, but is not part of the traffic. In this
state, they do not have MAC addresses, but only listen enough to
keep their synchronization with the master and check for
broadcast messages.
USAGE MODEL:
While the Bluetooth * usage model is based on connecting devices
together, it is focused on three broad categories: voice/data access
points, peripheral interconnects, and Personal Area Networking (PAN).
Voice/data access points is one of the key initial usage models and
involves connecting a computing device to a communicating device via
a secure wireless link (see Figure 1). For example, a mobile computer
equipped with Bluetooth technology could link to a mobile phone that
uses Bluetooth technology to connect to the Internet to access e-mail.
The mobile phone acts as a personal
access point. Even more ideal, the notebook can connect to the
Internet while the cell phone is being carried in a briefcase or purse.
The Bluetooth usage model also envisions public data access points in
the future. Imagine the current data-equipped pay phones in airports
being
upgraded with Bluetooth modems. This would allow any mobile device
equipped with Bluetooth technology to easily connect to the Internet
while located within ten meters of that access point. These access
points could, of course, support much higher data rates than today’s
modems, as public spaces could connect a variety of private Bluetooth
access points via a LAN that is routed to the Internet over a DSL line,
allowing each access point a private 1Mbps connection to the Internet.
Peripheral Interconnects :
The last usage model, Personal Area Networking (PAN), focuses on the
ad-hoc formation and breakdown of personal networks(see Figure 3).
Imagine meeting someone in an airport and quickly and securely
exchanging documents by establishing a private piconet. In the future,
Bluetooth kiosks could provide access to electronic media that could be
quickly downloaded for later access on the mobile device.
Bluetooth Special Interest group (SIG)
Bluetooth Characteristics:
COMPETING TECHNOLOGIES
While there is no single competing technology that covers the
entire concept of Bluetooth wireless technology, in certain market
segment other technology do exist.
IrDA
Wireless LAN:
At this time, we anticipate the Bluetooth SIG to evolve the Bluetooth technology
to provide greater bandwidth & distances, thus increasing the potential platforms
& applications used in the emerging personal area-networking marketplace.
Some members of the Bluetooth SIG such as Sony & Eastman Kodak are
interested in seeing the speed of Bluetooth increasing for applications such as
streaming video. Proposals are under consideration but it is not clear when
products based on any of the proposals would be available
Projected Market Growth:
Cahners In-Stat group estimates that the Bluetooth market will grow from virtually
zero in 1999 to over 1 billion Bluetooth-enabled devices that will
ship in 2005.
Smart Home
Automatic Check-in:
Hotels are testing, or plan to test, services that allow guests to check
in, unlock room doors and even control room temperature with
handheld devices equipped with Bluetooth Technology.
The Bluetooth enabled mobile phone or the PDA can present the
electronic ticket to the airline system without one having to go through
the queue at the check-in counters. The airline's on-line system
performs the identification via the ID-tag feature built into the mobile
phone or the PDA and confirms the reserved seat.
2. http://www.intel.com/mobile/bluetooth