BLUETOOTH
BLUETOOTH
1
dul Uni
Hou Book
e t Topics
rs s
No No.
.
Wireless Personal Area Networks 12
2.1 Bluetooth (802.15.1): Radio T1
Specifications, Protocol Stack, Link Ch 19
Types, Security, State Model, Error (up to
19.12)
Correction, Topologies, Applications
2.2 Zigbee (802.15.4): Radio T1
Specifications, Components, Ch 20
2 Topologies, Protocol Stack, ( 20.6
& 20.7)
Applications
2.3 RFID: Radio Specifications, T1
Architecture & Types Ch 20
08/15/24 (20.9)
BLUETOOTH
08/15/24 A WPAN SERVICE
WPAN
3
08/15/24
IEEE 802 working groups
4
08/15/24
INTRODUCTION
5
08/15/24
RADIO SPECIFICATION
The Bluetooth system is operating in the 2.4 GHz
ISM (Industrial Scientific Medicine) band. The
regulatory range of this frequency band is 2.402 –
2.480 GHz.
The Bluetooth radio accomplishes spectrum
spreading by in 79 hops displaced by 1 MHz.
Radio modulation uses GFSK.
Operating frequency bands:
0 1 2 78
6 08/15/24
AIR INTERFACE DETAILS
7
08/15/24
HISTORY (Peer to peer
8
discussion)
Why is it called Bluetooth?
Which country was the first one to propose the idea of Bluetooth
Why that unique symbol??
Patent??
Activity
time
Harald Bluetooth was king of Denmark in the late 1900s. He
managed to unite Denmark and part of Norway into a single
kingdom then introduced Christianity into Denmark. He left a
large monument, the Jelling rune stone, in memory of his parents.
He was killed in 1986 during a battle with his son, Svend
Forkbeard. Choosing this name for the standard indicates how
important companies from the Nordic region (nations including
Denmark, Sweden, Norway and Finland) are to the
communications industry, even if it says little about the way the
technology works.
08/15/24
EVOLUTION OF
BLUETOOTH
9
08/15/24
10
Activit
y time 08/15/24
SOME DEFINITIONS….
Piconet. A collection
16
of devices connected
via Bluetooth
technology in an ad
hoc fashion.
A piconet starts with two
connected devices, such as
a PC and cellular phone, and
may grow to eight active
connected devices.
When establishing a piconet,
one unit will act as a master
for synchronization
purposes, and the other(s)
as slave(s) for the duration 08/15/24
of the piconet connection.
SOME DEFINITIONS….
17
Scatternet. Two or
more independent and
non synchronized
piconets that
communicate with
each other.
A slave as well as a
master unit in one
piconet
can establish this
connection by becoming
a slave in the other
piconet.
08/15/24
Piconets and scatternets
18 08/15/24
SOME DEFINITIONS….
19
Course
project for
grp 1.
08/15/24
BLUETOOTH PROTOCOL STACK
21
08/15/24
BLUETOOTH PROTOCOL
22
STACK(contd)
The bluetooth protocol stack can be
placed into three groups:
1.The transport protocol group
2.Middleware protocol group
3.Application group
08/15/24
BLUETOOTH PROTOCOL
23
STACK(contd)
1.The transport protocol group
-designed to allow bluetooth devices to locate
and connect to each other.
-also responsible for managing the physical
and logical links between the devices.
The protocols in this group are:
• Radio
• Baseband
• Link manager
08/15/24
BLUETOOTH PROTOCOL
24
STACK(contd)
• Radio: takes care of transmission
technique and power control
devices
and is responsible for determining the packet
types supported for synchronous and
asynchronous traffic.
08/15/24
BLUETOOTH PROTOCOL
26
STACK(contd)
LMP
The Link Management Protocol (LMP)
is used for control of the radio link
between two devices. Implemented
on the controller.
Responsible for supervising device
pairing.
Responsible for power control and
may request adjustment in power
level.
08/15/24
27
L2CAP
The Logical Link Control and Adaptation
Protocol (L2CAP) is used to multiplex
multiple logical connections between two
devices using different higher level
protocols. Provides segmentation and
reassembly of on-air packets.
In Basic mode, L2CAP provides packets with
a payload configurable up to 64kB, with
672 bytes as the default MTU, and 48 bytes
as the minimum mandatory supported MTU.
08/15/24
28
HCI:
Host controller interface is an interface
08/15/24
Ready to
08/15/24
Device states in Bluetooth
33
08/15/24
37
SNIFF MODE
A slave device listens to the piconet at a reduced rate.
The SNIFF interval is programmable.
In both the HOLD and SNIFF states the device retains
its AMA.
HOLD MODE
When data needs to be transmitted very infrequently,
08/15/24
38
PARK MODE
The device has given up the AMA and
08/15/24
Link types and packets
39
08/15/24
Types of Links and Packets
40
08/15/24
Types of Links and Packets
41
not retransmitted.
Needs an asynchronous connectionless
08/15/24
42
08/15/24
43
08/15/24
44
08/15/24
Bluetooth Security
45
Authentication
Confidentiality
Authorization
08/15/24
Security modes of Bluetooth
47
08/15/24
Bluetooth security
48
architecture
08/15/24
Authentication procedure
50
The authentication is performed when a
connection request to a service is
submitted. The following procedure is
used :
1. The connect request to L2CAP is sent.
2. L2CAP requests access from the
security manager.
3. The security manager enquires the
service database.
4. The security manager enquires the
device database.
5. If necessary, the security manager
enforces the authentication and
encryption
procedure.
6. The security manager grants access,
and L2CAP continues to set up the
connection.
08/15/24
Usage Models- Voice/Data Access
51
Points
Connecting a computing
device to a
communicating device.
Allows any device with a
bluetooth chip to connect
to the internet while
located within the range
of the access point.
Example- a notebook
could link to the internet
using a mobile phone as
an access point.
Envisions08/15/24
public data
access points
Usage models-Peripheral
52
Interconnects
Standard peripheral
devices like keyboard,
mice, headsets etc working
over a wireless link.
The same device can be
used in multiple functions
e.g a headset can access
phones while in the office
and can interface with a
cellular phone when
mobile.
08/15/24
Usage model- Personal Area Networking.
53
(PAN)
Allows dynamic
formation and
breakdown of
“PICONETS”--ad-
hoc personal
networks.
08/15/24
Bluetooth Applications
54
08/15/24
Bluetooth Applications
56 08/15/24