0% found this document useful (0 votes)
8 views31 pages

MCWC5

Study material

Uploaded by

Tisa Patel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views31 pages

MCWC5

Study material

Uploaded by

Tisa Patel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 31

Mobile Computing Wireless Communication

(MCWC)
GTU # 3170710

Unit-5:
Bluetooth

Prof.Swati R Sharma
Computer Engineering Department
Darshan Institute of Engineering & Technology, Rajkot
[email protected]
(O) 9727747317
✓ Topics
Looping
to be covered
• Introduction of Bluetooth
• Piconet and Scatternet
• Bluetooth Protocol Architecture
• Bluetooth Security
• Bluetooth Application
• Power saving states of Bluetooth
• States of Bluetooth Device

Bluetooth
Introduction of Bluetooth
Prof. Swati R Sharma Unit 5 – Bluetooth 4
Introduction of Bluetooth
Universal short-range wireless
capability
Uses 2.4-GHz band
Available globally for unlicensed users
Devices within 10m can share up to
2.1 Mbps to 24 Mbps of capacity
Supports open-ended list of
applications
Data, audio, graphics, video
Stated as IEEE 802.15.1
New standards come from the Bluetooth
Special Interest Group (Bluetooth SIG)
Bluetooth 2.0, 2.1, 3.0, 4.0 and 5.0

Prof. Swati R Sharma Unit 5 – Bluetooth 5


Introduction of Bluetooth
It is a standard for the short-range wireless interconnection
of mobile phones, computers, and other electronic devices.
Bluetooth technology allows users to make ad-hoc wireless
connections between devices like mobile, desktop or
notebook computers wirelessly.
Data transfer at a speed of about 720 Kbps within 50 meters
(150 feet) of range or beyond through walls, clothing and
even luggage bags.
It supports both unicast (point-to-point) and multicast
(point-to-multipoint) connections.
Bluetooth protocols are a collection of many inter-related
protocols.
IEEE has also adapted Bluetooth as the 802.15.1a standard.
Managed and maintained by Bluetooth Special Interest
Group.
Prof. Swati R Sharma Unit 5 – Bluetooth 6
Introduction of Bluetooth
Bluetooth radio built into a small microchip.
Operates in a globally available frequency band
ensuring worldwide interoperability.
79 available channels set of 1 MHz each, ranges
from 2.402 GHz to 2.480 GHz.
It provides power levels starting from 1mW
(covering 10 centimeters) to 100mW (covering
up-to 100 meters) suitable for short device zone
to personal area networks within a home/office.

Prof. Swati R Sharma Unit 5 – Bluetooth 7


Piconet
Piconet
Bluetooth protocol uses the concept of master and
slave.
A piconet is an ad-hoc network that links a wireless
user group of devices using Bluetooth technology
protocols.
Master and slaves together form a Piconet when
master allows slaves to talk.
Up to 7 ‘slave’ devices can be set to communicate with
a ‘master’ in a Piconet.
A piconet consists of two or more devices occupying
the same physical channel.

Prof. Swati R Sharma Unit 5 – Bluetooth 9


Scatternet
Scatternet
Scatternet formed when several of piconet are linked together to form a larger network in
an ad-hoc manner.
Scatternet is a topology where a device from one piconet also acts as a member of
another piconet wherein a device is a master in one piconet can simultaneously be a slave
in the other one.

Prof. Swati R Sharma Unit 5 – Bluetooth 11


Piconet Vs. Scatternet

Piconet Scatternet
It is capable to serve smaller coverage area It is capable to serve larger coverage area
comparatively. comparatively.
Here device can work either as a master or Here device can work as a master as well as
slave but not both. slave both.
Less efficient use of Bluetooth bandwidth. More efficient use of Bluetooth bandwidth.
At maximum, 8 nodes are supported. More 8 nodes are supported.

Prof. Swati R Sharma Unit 5 – Bluetooth 12


Bluetooth Protocol Architecture
Bluetooth Protocol Architecture/Stack
Bluetooth Core protocols plus Bluetooth radio protocols required by most Bluetooth devices.
Uses spread spectrum technologies at the Physical Layer while using both direct sequence
and frequency hopping spread spectrum technologies.
Uses connectionless (ACL–Asynchronous Connectionless Link) and connection-oriented
(SCO–Synchronous Connection-oriented Link) links.
Cable Replacement layer, Telephony Control layer and Adopted protocol layer form
application-oriented protocols.

Prof. Swati R Sharma Unit 5 – Bluetooth 14


Bluetooth Core Baseband, LMP,
Bluetooth Protocol Stack Protocol L2CAP, SDP
vCard/vCal WAE
OBEX WAP AT-Comma Cable Replacement RFCOMM
nds TCS BIN SDP Protocol

UDP TCP
Telephony Control TCS BIN,
IP Protocol AT-Commands
Adopted Protocol PPP, TCP/IP,
PPP OBEX,WAP, WAE,
vCard, vCal
RFCOMM

L2CAP Audio

Host Controller Interface


LMP

Baseband

Bluetooth Radio

Cable Core
Telephony
Bluetooth
Telephony
Attention
Content
Logical
Radio
Control
Formats
Link
Point-to-Point
Object Exchange
Frequency
Transmission - Specification
(AT)Protocol
Commands
Control
(OBEX)
Control and
(PPP)
Protocol
Communication
Binary
-Adaptation
defines
usedProtocol/Internet
to exchange
- means (TCS
- session
of BIN)and
ataking
set
messages
Protocol
(RFCOMM) IP--
of
protocol
Protocol
Adopted
Replacement
Link Manager
Service
defines
commands Discovery
the by Protocol
call control
which a (LMP)
Protocol – phone
(SDP) manages
signaling
mobile – Enablesdevices
a
protocol
can be in
device
and
used
Control notes
(L2CAP)
packets
to
emulates
Baseband
(TCP/IP)
range,
to
and join
handles
and
exchange
to/from
power
synchronize
segmentation
- –RS-232objects
enables
used
a piconet.
the
modes,
mobility
controlled as on
PPP
control
physical
for
management
awith
modem
data
and
andlayer
and
RFused
link
communication
connections,
amongst
and
data
duty
forfor
acrossvarious
re-assembly
toplacing
browse
signals
cycles,
fax groups
of
themthe
over
the
etc.
and data of
Protocol devices.
fragmented
onto
contents
the
Bluetooth
Internet. LAN.
of packets
folders
baseband their devices.
remote
protocol. multiplexing.
Protocol Bluetooth TCS devices.
transfers.
Bluetooth Core Protocol
Baseband – enables physical RF link.
Link Manager Protocol (LMP) – manages devices in range, power modes, connections, duty
cycles, etc.
Logical Link Control and Adaptation Protocol (L2CAP) – segmentation and re-assembly of
fragmented packets with their multiplexing.
Service Discovery Protocol (SDP) – Enables a device to join a piconet.

Prof. Swati R Sharma Unit 5 – Bluetooth 16


L2CAP protocol: Functions
Adaptation between higher-layer frames and lower layer frames of the
Bluetooth protocol stack.
Support for both connection-oriented as well as connectionless services.
Supporting two links for the Baseband layer −
Synchronous Connection-Oriented (SCO) links for real-time voice traffic using
reserved bandwidth.
Asynchronous Connection-Less (ACL) links for best-effort traffic.
Multiplexing of higher layer protocols, which allows them to use the links
provided by the lower layers.
Segmentation and reassembly of data packets of the upper layer that are
larger than the capacity of the radio layer underneath.
Group management.
Quality of Service (QoS) for upper-layer protocols

Prof. Swati R Sharma Unit 5 – Bluetooth 17


Cable Replacement Protocol
Radio Frequency Communication (RFCOMM) - emulates RS-232 control and data signals over
Bluetooth baseband protocol.

Prof. Swati R Sharma Unit 5 – Bluetooth 18


Telephony Control Protocols
Telephony Control Specification Binary (TCS BIN) - defines the call control signaling protocol
and handles mobility management for groups of Bluetooth TCS devices.
Attention (AT) Commands - defines a set of commands by which a mobile phone can be used
and controlled as a modem for fax and data transfers.

Prof. Swati R Sharma Unit 5 – Bluetooth 19


Adopted Protocols
Point-to-Point Protocol (PPP) - means of taking IP packets to/from the PPP layer and placing
them onto the LAN.
Transmission Control Protocol/Internet Protocol (TCP/IP) - used for communication across the
Internet.
Object Exchange (OBEX) Protocol - session protocol to exchange objects and used to browse
the contents of folders on remote devices.
Content Formats - used to exchange messages and notes and synchronize data amongst
various devices.

Prof. Swati R Sharma Unit 5 – Bluetooth 20


Bluetooth Security
Bluetooth Security
Offers security infrastructure starting from authentication,
key exchange to encryption.
Uses the publicly available cipher algorithm known as
SAFER+ to authenticate a device’s identity.
Bluetooth security includes authorisation, authentication and
optional encryption.
Authentication is the proving of identity of one Bluetooth-enabled
device to another.
Authorisation is the granting or denying of Bluetooth connection
access to resources or services from the requesting device.
Encryption is the translating of data into secret code so that
eavesdroppers cannot read its content.

Prof. Swati R Sharma Unit 5 – Bluetooth 22


Bluetooth Application
Bluetooth Application
Each application model in Bluetooth realized through a Profile.
Profiles define the protocols and protocol features supporting a particular usage model.
Some common profiles are:
File Transfer
Internet Bridge
LAN Access
Synchronization
Headset

Prof. Swati R Sharma Unit 5 – Bluetooth 24


Power saving states of Bluetooth
Power saving states of Bluetooth device
The Bluetooth Low Energy (BLE) guideline was released in 2010.
Bluetooth radio can use up to 30mA when receiving, it is important that it be used as little as
possible to save battery power
Bluetooth Low Energy (BLE) is embedded in smartphones, laptops, medical devices, sensors,
and other applications that benefit from the technology’s key differentiators:
lower power consumption
reduced memory requirements
efficient discovery
connection procedures
short packet lengths
simple protocols and services

Prof. Swati R Sharma Unit 5 – Bluetooth 26


States of Bluetooth Device
Different States of Bluetooth Device
There are 3 low-power modes:
1. Hold: Allows devices to be inactive for a single short period.
2. Sniff: Allows devices to be inactive except for periodic sniff slots.
3. Park: Similar to Sniff, except parked devices give up their active member address.
Disconnected Connecting Active Low-power

Inquiry Transmit Hold

Standby Sniff

Page Connected
Park

Prof. Swati R Sharma Unit 5 – Bluetooth 28


GTU Questions
Sr. Question Marks Year
1. Draw and explain Bluetooth Protocol Architecture. 7 Win’18
2. Explain L2CAP protocol of Bluetooth. 4 Sum’19
3 Sum’20
3. Explain the power saving states of Bluetooth device. 3 Sum’19
4. Explain each layer of Bluetooth Protocol Stack. 7 Sum’19
7 Win’19
7 Sum’20
7 Win’20
5. State the applications of Bluetooth and differentiate between Piconet and Scatternet with neat 3 Sum’19
diagram. 7 Win’19
3 Sum’20
4 Win’20
6. List the functionality of Service Discovery Protocol(SDP). 3 Win’20

Prof. Swati R Sharma Unit 5 – Bluetooth 29


References
Book: Wireless Communications & Networks, Second Edition, William Stallings by Pearson
Web: www.bluetooth.com

Prof. Swati R Sharma Unit 5 – Bluetooth 30


Thank you

You might also like