What's With The Name?

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 40

What’s With the Name?

•The name ‘Bluetooth’ was named after 10th century


Viking king in Denmark Harald Bluetooth who united
and controlled Denmark and Norway.

•The name was adopted because Bluetooth wireless


technology is expected to unify the
telecommunications and computing industries
Who Started Bluetooth?
• Bluetooth Special Interest Group (SIG)

•Founded in Spring 1998

•By Ericsson, Intel, IBM, Nokia, Toshiba;

•Now more than 2000 organizations joint the SIG


What Is Bluetooth?
☼ Bluetooth is an open standard for short-range
digital radio to interconnect a variety of devices Cell
phones, PDA, notebook computers, modems,
cordless phones, pagers, laptop computers, printers,
cameras by developing a single-chip, low-cost,
radio-based wireless network technology
Bluetooth
• Simplifying communications between:
- devices and the internet
- data synchronization
• Operates in licensed exempt ISM band at 2.4ghz
• Uses frequency hoping spread spectrum
• Omni directional, no requiring line of sight
• Bluetooth offers data speeds of up to 1 Mbps up to 10
meters (Short range wireless radio technology )
• Unlike IrDA, Bluetooth supports a LAN-like mode
where multiple devices can interact with each other.
• The key limitations of Bluetooth are security and
interference with wireless LANs.
• Short range wireless radio technology
Bluetooth
• Bluetooth is a PAN Technology
– Offers fast and reliable transmission for
both voice and data
– Can support either one asynchronous data
channel with up to three simultaneous
synchronous speech channels or one channel
that transfers asynchronous data and
synchronous speech simultaneously
– Support both packet-switching and circuit-
switching
Bluetooth
• Personal Area Network (PAN) Bluetooth is
a standard that will …
– Eliminate wires and cables between both
stationary and mobile devices
– Facilitate both data and voice
communications
– Offer the possibility of ad hoc networks and
deliver synchronicity between personal
devices
Bluetooth Topology
• Bluetooth-enabled devices can automatically
locate each other
• Topology is established on a temporary and
random basis
• Up to eight Bluetooth devices may be
networked together in a master-slave
relationship to form a Piconet
Cont.
• One is master, which controls and setup the
network
• All devices operate on the same channel and
follow the same frequency hopping sequence
• Two or more piconet interconnected to form a
scatter net
• Only one master for each piconet
• A device can’t be masters for two piconets
• The slave of one piconet can be the master of
another piconet
A Typical Bluetooth Network Piconet

• Master sends its globally unique 48-bit id and


clock
– Hopping pattern is determined by the 48-bit device ID
– Phase is determined by the master’s clock
• Why at most 7 slaves?
– (because a three-bit MAC adress is used).
• Parked and standby nodes
– Parked devices can not actively participate in the
piconet but are known to the network and can be
reactivated within some milliseconds
– 8-bit for parked nodes
– No id for standby nodes
– Standby nodes do not participate in the piconet
The Bluetooth Standard
• Defines a protocol stack to enable
heterogeneous devices to communicate.
• The Bluetooth stack includes protocols for
the radio layer all the way up to device
discovery, service discovery, etc.

10
Bluetooth Protocol Stack
Application
Applications

Presentation Layer
RFCOMM/SDP
Session Layer
L2CAP

Host Controller Interface Transport Layer

Link Manager Network Layer

Link Controller
Data Link Layer

Baseband
PHY
RF

OSI/ISO

11
Bluetooth Layers
• Radio: physically transmits/receives data.
• Baseband/Link Controller: controls PHY.
• Link Manager: controls links to other
devices.
• Host Controller:e2e communication.
• Logical Link Control:
multiplexes/demultiplexes data from higher
layers.
• RFCOMM: RS323-like serial interface.
• SDP: allows service discovery among
12
Bluetooth devices.
The Bluetooth PHY

13
Radio Band
• 2.4 GHz license-free ISM band.
• Available worldwide.
• Industrial, Scientific, Medical (ISM) band.
– Unlicensed, globally available.
– Centered around 2.4 GHz.
• Resilient to interference.
• Frequency hopping.
• Range: 10, 20, and 100m.
• 1MB/s.
14
Unlicensed Radio Spectrum


33cm 12cm 5cm

26 Mhz 83.5 Mhz 125 Mhz

902 Mhz 2.4 Ghz 5.725 Ghz


928 Mhz 2.4835 Ghz 5.785 Ghz

cordless phones 802.11 unused


baby monitors Bluetooth
Wireless LANs Microwave oven

15
Bluetooth Radio Link

1Mhz

. . .
12 3 79
83.5 Mhz
• MA scheme: Frequency hopping spread spectrum.
– 2.402 GHz + k MHz, k=0, …, 78
– 1,600 hops per second.
– 1 Mb/s data rate.

16
BT Radio Link (Cont’d)
• Time-division duplex (TDD)
– Separation of Xmission and reception in time.
– Units alternate transmits and receives.
• Gaussian Frequency Shift Keying (G-FSK)
modulation.
– ‘1’s as positive frequency deviations from
carrier frequency; ‘0’s as negative deviations.

17
Multiple Access

• BT targets large number of independent communications


active in the same area at the same time.
• Single FH channel: 1 Mb/s.
• Each 1Mb/s channel shared by limited number of
participants.
– In target user scenarios, it’s unlikely that all units in-range
will share data among all of them.
– 1 MB/s is reasonable. (is it?)
• Theoretically, total bandwidth is 79 Mb/s.
– In practice, < 79 Mb/s since codes are non-orthogonal.

18
Baseband
Control end of baseband
Applications +link controller=
Data link layer
RFCOMM/SDP
L2CAP

Host Controller Interface

Link Manager
Carries out MAC
functions.
Link Controller

Baseband

RF

19
Master and Slaves
• Communicating devices must agree on
hopping sequence.
• BT devices can operate as masters or slaves.
• Master node defines sequence to be used.
• Slave units use master id to pick sequence.
• Master also controls when devices are
allowed to transmit.
– Master allocates slots to slaves.
– Allocates total available bandwidth among
slaves.
20
Piconets
• BT communication takes place over piconets.
• Piconet formation initiated by master.
• All other participants are slaves.
• Number of participants limited to 8 (1 master and 7
slaves).
– Channel capacity and addressing overhead.
– Each slave assigned a locally unique ID.
• Master/slave roles last for the duration of the piconet.

21
Contention-Free MA
• Master and slaves.
• Master performs medium access control.
– Schedules traffic through polling.
• Time slots alternate between master and slave
transmission.
– Master-slave: master includes slave address.
– Slave-master: only slave chosen by master in previous
master-slave slot allowed to transmit.
– If master has data to send to a slave, slave polled implicitly;
otherwise, explicit poll.

22
BT States

. Initially, all nodes in


Standby standby.
Unconnected . Node (master) can begin
inquiry to find nearby
devices.
. Piconet is then formed.
. Devices join by paging.
Inquiry Page
Connecting

Transmit Connected
Active

Sniff
Park Hold

Low power

23
Bluetooth Link Formation

• Point-to-point link: m s
– Master-slave relationship.
m

• Piconet:
– 8 units: channel capacity. s s

s
– Master (establishes piconet) can
connect to up to 7 slaves.
– Master/slave relationship lasts while
link/piconet lasts.
– No slave-to-slave communication.

24
Link Types
• 2 types of links:
– Synchronous (SCO) links:
• Point-to-point between master and slave.
• Link established by reserving slots in either direction
periodically.
• Used to carry real-time traffic (voice).
– Asynchronous (ACL) links:
• Point-to-multipoint between master and slaves.
• Use remaining slots on channel.
• Traffic scheduled by master.

25
Link Controller and Link
Manager
Applications

RFCOMM/SDP
L2CAP
Attaching/detaching slaves from
piconet; power management; security.
Host Controller Interface

Link Manager
Carries out inquiry and paging
Link Controller operations; manages multiple
links and different piconets.
Baseband

RF

26
Power Management
• Low-power modes: prolong battery life.
– Devices can be turned-off when idle.
– Devices wake up periodically to send/receive
data.

27
Security
• Authentication and encryption.
• LMP provides mechanisms for negotiation
of encryption modes, keys, etc.

28
Host Controller Interface

Applications
Optional interface layer
between higher and lower
RFCOMM/SDP layers of the BT stack.

L2CAP

Host Controller Interface

Link Manager
E.g., when lower- and higher
Link Controller BT layers run on different
Devices: PCMCIA card and
PC’s processor.
Baseband

RF
29
L2CAP
Applications

RFCOMM/SDP
Logical Link Control and
L2CAP Adaptation Protocol=
Session Layer.

Host Controller Interface

Link Manager
Link Controller
L2CAP provides
Baseband • Protocol multiplexing
• Quality of service negotiation
RF

30
RFCOMM/SDP
Applications

RFCOMM/SDP
L2CAP
Service discovery, serial port
interface. Host Controller Interface

Link Manager
Link Controller

Baseband

RF

31
How Does It Work?
• Bluetooth is a standard
for tiny, radio frequency
chips that can be plugged
into your devices
• These chips were designed to
take all of the information that
your wires normally send, and
transmit it at a special
frequency to something
called a receiver
Bluetooth chip.
• The information is then transmitted to your device
SPECIFICATIONS

– Application Specifications
• These specifications include the following
• Profiles Cordless Telephony
• Serial Port
• Headset
• Intercom
• Dialup Networking
• Fax
• File Transfer
• Service Discovery Application
• Generic Access
Power Management Benefits

• Cable Replacement
– Replace the cables for peripheral devices
• Ease of file sharing
– Panel discussion, conference, etc.
• Wireless synchronization
– Synchronize personal information contained in the address
books and date books between different devices such as
PDAs, cell phones, etc.
• Bridging of networks
– Cell phone connects to the network through dial-up
connection while connecting to a laptop with Bluetooth.
Bluetooth Devices

Bluetooth will soon be enabled in


everything from:
• Telephones
• Headsets
• Computers
• Cameras
• PDAs
• Cars
• Etc …
Wireless Technologies

• There are two technologies that have been


developed as wireless cable replacements:
Infrared (IRDA) and radio (Bluetooth).
Compare Infrared, Bluetooth
Bluetooth Infrared
Connection Spread Infrared, narrow
Type Spectrum beam

Optical 850
Spectrum 2.4GHz
nano meters

Data Rate 1Mbps 16Mbps

Range 30 Feet 3 Feet


Supported
Upto 8 2
Devices
Cont…..
Voice
3 1
Channels
No special
Data Security 8-128bit Key
security

Addressing 48 bit MAC 32 bit ID


Security of Bluetooth

• Security in Bluetooth is provided on the radio paths only


– Link authentication and encryption may be provided
– True end-to-end security relies on higher layer security
solutions on top of Bluetooth

• Bluetooth provides three security services


– Authentication – identity verification of communicating
devices
– Confidentiality – against information compromise
– Authorization – access right of resources/services

• Fast FH together with link radio link power control provide


protection from eavesdropping and malicious access
– Fast FH makes it harder to lock the frequency
– Power control forces the adversary to be in relatively close
proximity
Bluetooth Key Generation From PIN
• Bluetooth Initialization Procedure
(Pairing)
– Creation of an initialization key (ki)

– Creation of a link key Authentication (ka)

You might also like