Mo
1
dul Uni
Hou Book
e t Topics
rs s
No No.
.
Wireless Personal Area Networks 12
2.1 Bluetooth (802.15.1): Radio T1
Specifications, Protocol Stack, Link Ch 19
Types, Security, State Model, Error (up to
19.12)
Correction, Topologies, Applications
2.2 Zigbee (802.15.4): Radio T1
Specifications, Components, Ch 20
2 Topologies, Protocol Stack, ( 20.6
& 20.7)
Applications
2.3 RFID: Radio Specifications, T1
Architecture & Types Ch 20
08/15/24 (20.9)
BLUETOOTH
08/15/24 A WPAN SERVICE
WPAN
3
A wireless personal area network (WPAN) is a
short-distance (typically 10 m- 100 m) wireless
network specially designed to support portable
and mobile computing devices such as PCs,
printers, storage devices, cell phones, pagers,
set-up boxes, and a variety of consumer
electronic equipment.
Bluetooth (IEEE 802.15.1), UWB (IEEE 802.15.3a),
and ZigBee (IEEE 802.15.4) are examples of
WPANs.
08/15/24
IEEE 802 working groups
4
08/15/24
INTRODUCTION
5
Bluetooth provides short-range, low-cost connectivity
between portable devices. Bluetooth is limited in range
(10 meters)
Bluetooth radio characteristics include low power, short
range, and
medium transmission speed. The low power
consumption makes Bluetooth ideal for small, battery-
powered devices like mobile phones and pocket PCs.
08/15/24
RADIO SPECIFICATION
The Bluetooth system is operating in the 2.4 GHz
ISM (Industrial Scientific Medicine) band. The
regulatory range of this frequency band is 2.402 –
2.480 GHz.
The Bluetooth radio accomplishes spectrum
spreading by in 79 hops displaced by 1 MHz.
Radio modulation uses GFSK.
Operating frequency bands:
0 1 2 78
2.402 GHz 2.480 GHz
6 08/15/24
AIR INTERFACE DETAILS
7
08/15/24
HISTORY (Peer to peer
8
discussion)
Why is it called Bluetooth?
Which country was the first one to propose the idea of Bluetooth
Why that unique symbol??
Patent??
Activity
time
Harald Bluetooth was king of Denmark in the late 1900s. He
managed to unite Denmark and part of Norway into a single
kingdom then introduced Christianity into Denmark. He left a
large monument, the Jelling rune stone, in memory of his parents.
He was killed in 1986 during a battle with his son, Svend
Forkbeard. Choosing this name for the standard indicates how
important companies from the Nordic region (nations including
Denmark, Sweden, Norway and Finland) are to the
communications industry, even if it says little about the way the
technology works.
08/15/24
EVOLUTION OF
BLUETOOTH
9
08/15/24
10
Bluetooth v1.2 721 kbps
Bluetooth v2.0 + EDR 2.1 Mbps
Bluetooth v2.1 + EDR 2.1 Mbps
Bluetooth v3.0 + HS 24 Mbps
Bluetooth v4.0 72 Mbps
Activit
y time 08/15/24
SOME DEFINITIONS….
Piconet. A collection
16
of devices connected
via Bluetooth
technology in an ad
hoc fashion.
A piconet starts with two
connected devices, such as
a PC and cellular phone, and
may grow to eight active
connected devices.
When establishing a piconet,
one unit will act as a master
for synchronization
purposes, and the other(s)
as slave(s) for the duration 08/15/24
of the piconet connection.
SOME DEFINITIONS….
17
Scatternet. Two or
more independent and
non synchronized
piconets that
communicate with
each other.
A slave as well as a
master unit in one
piconet
can establish this
connection by becoming
a slave in the other
piconet.
08/15/24
Piconets and scatternets
There is one master
and one or more
slaves in each
piconet
18 08/15/24
SOME DEFINITIONS….
19
Master unit. The device in the piconet whose clock
and hopping sequence are used to synchronize all
other devices in the piconet.
Slave units. All devices in a piconet that are not the
master (up to seven active units for each master).
Active MAC address. A 3-bit medium access control
address used to distinguish between units participating
in the piconet.
Passive MAC address: An 8-bit medium access control
address used by passive devices in a piconet.
Parked units. Devices in a piconet which are time-
synchronized but do not have active MAC addresses.
Sniff and hold mode. Devices that are synchronized
to a piconet, and which have temporarily entered
power-saving mode in which device activity is reduced.
08/15/24
Packet format in Bluetooth
20
(version 1)
Course
project for
grp 1.
08/15/24
BLUETOOTH PROTOCOL STACK
21
08/15/24
BLUETOOTH PROTOCOL
22
STACK(contd)
The bluetooth protocol stack can be
placed into three groups:
1.The transport protocol group
2.Middleware protocol group
3.Application group
08/15/24
BLUETOOTH PROTOCOL
23
STACK(contd)
1.The transport protocol group
-designed to allow bluetooth devices to locate
and connect to each other.
-also responsible for managing the physical
and logical links between the devices.
The protocols in this group are:
• Radio
• Baseband
• Link manager
• Logical link control and adaptation protocol
• Host controller interface
08/15/24
BLUETOOTH PROTOCOL
24
STACK(contd)
• Radio: takes care of transmission
technique and power control
TYPE POWER RANGE
Class 3 0dbm/1mW ~10 cm
Class 2 4dbm/2.3 mW ~10 m
Class 1 20 dbm/100mW ~100 m
Did you Know??
Most devices and Smart phones are
operating within the Class 2 power
range!!!
08/15/24
25
Base band layer is responsible for the following:
Process of searching for other devices and
establishing a connection with them.
Assigning the master and slave roles.
Controls the Bluetooth unit’s synchronization and
transmission frequency hopping sequence.
This layer also manages the links between the
devices
and is responsible for determining the packet
types supported for synchronous and
asynchronous traffic.
08/15/24
BLUETOOTH PROTOCOL
26
STACK(contd)
LMP
The Link Management Protocol (LMP)
is used for control of the radio link
between two devices. Implemented
on the controller.
Responsible for supervising device
pairing.
Responsible for power control and
may request adjustment in power
level.
08/15/24
27
L2CAP
The Logical Link Control and Adaptation
Protocol (L2CAP) is used to multiplex
multiple logical connections between two
devices using different higher level
protocols. Provides segmentation and
reassembly of on-air packets.
In Basic mode, L2CAP provides packets with
a payload configurable up to 64kB, with
672 bytes as the default MTU, and 48 bytes
as the minimum mandatory supported MTU.
08/15/24
28
HCI:
Host controller interface is an interface
between the lower three layers and L2CAP
and SDP layers.
RFCOMM
provides a simple reliable data stream to
the user, similar to TCP. It is used directly
by many telephony related profiles as a
carrier for AT commands, as well as being
a transport layer for OBEX over Bluetooth.
08/15/24
BLUETOOTH PROTOCOL
29
STACK(contd)
Service discovery protocol (SDP) layer. In Bluetooth wireless
communications
any two devices can start communicating on the spur of the
moment.
The SDP is a standard method for bluetooth devices to discover and
learn about the services of the other devices.
Once a connection is established there is a need for the devices to
find and
understand the services the other devices have to offer.
Object exchange (OBEX) protocol. IrOBEX (in short, OBEX) is a
session protocol
Developed by the Infrared Data Association to exchange objects in
a
simple and spontaneous manner. OBEX provides the same basic
functionality as HTTP but in a much lighter fashion.
08/15/24
BLUETOOTH PROTOCOL
30
STACK(contd)
Telephone control specification (TCS) layer
and audio. This layer is
designed to support telephony functions, which
include call control and group management.
These are associated with setting up voice calls.
Once a call is established a Bluetooth audio
channel can carry the call’s voice content.
08/15/24
Ready to
Forming a piconet explore your
mobile’s
BD_Addr??
31
All units have a unique global ID(BD_Addr)
address( 48 bits)
The unit that initializes the connection is
assigned as the master which controls the
traffic of the connection.
The global ID defines the hopping pattern.
The master shares its global ID and its clock
offset with the other radios which become
slaves.
The global ID and the clock parameters are
exchanged using a FHS (Frequency Hoping
Synchronization) packet.
08/15/24
Forming a piconet
32
The master/slave roles can be swapped.
A device can be a master in only one
“piconet” at a time.
08/15/24
Device states in Bluetooth
33
08/15/24
37
SNIFF MODE
A slave device listens to the piconet at a reduced rate.
The SNIFF interval is programmable.
In both the HOLD and SNIFF states the device retains
its AMA.
HOLD MODE
When data needs to be transmitted very infrequently,
thus conserving power.
In this mode only an internal timer is running.
No data is transferred when in HOLD mode.
The master can put slaves on HOLD mode.
08/15/24
38
PARK MODE
The device has given up the AMA and
has become passive.
The parked device will occasionally listen
to see if the master has sent any
broadcast data asking it to become
active.
08/15/24
Link types and packets
39
Supports 2 types of links….
Can different master-slave pairs of the same piconet use different
link types?
Can the link type change arbitrarily during a session?
Each link type supports up to sixteen different packet types.
Both link types use a time division duplex (TDD) scheme for
full-duplex transmission.
08/15/24
Types of Links and Packets
40
Asynchronous Connectionless Link
This is a packet switched link between a
master and slave.
Supports both symmetric and asymmetric traffic.
Error Correction Schemes
Forward error correction(1/3 and 2/3)
Automatic Repeat Request scheme.
08/15/24
Types of Links and Packets
41
Synchronous Connection Oriented(SCO)
Point to point full duplex link.
Typically used for voice data.
These packets do not use CRC and are
not retransmitted.
Needs an asynchronous connectionless
(ACL) type link to be first established.
Data rate for the SCO link is 64 Kbps
08/15/24
42
Are there any names given to different
types of Bluetooth packets??
08/15/24
43
08/15/24
44
08/15/24
Bluetooth Security
45
Authentication
Confidentiality
Authorization
08/15/24
Security modes of Bluetooth
47
08/15/24
Bluetooth security
48
architecture
08/15/24
Authentication procedure
50
The authentication is performed when a
connection request to a service is
submitted. The following procedure is
used :
1. The connect request to L2CAP is sent.
2. L2CAP requests access from the
security manager.
3. The security manager enquires the
service database.
4. The security manager enquires the
device database.
5. If necessary, the security manager
enforces the authentication and
encryption
procedure.
6. The security manager grants access,
and L2CAP continues to set up the
connection.
08/15/24
Usage Models- Voice/Data Access
51
Points
Connecting a computing
device to a
communicating device.
Allows any device with a
bluetooth chip to connect
to the internet while
located within the range
of the access point.
Example- a notebook
could link to the internet
using a mobile phone as
an access point.
Envisions08/15/24
public data
access points
Usage models-Peripheral
52
Interconnects
Standard peripheral
devices like keyboard,
mice, headsets etc working
over a wireless link.
The same device can be
used in multiple functions
e.g a headset can access
phones while in the office
and can interface with a
cellular phone when
mobile.
08/15/24
Usage model- Personal Area Networking.
53
(PAN)
Allows dynamic
formation and
breakdown of
“PICONETS”--ad-
hoc personal
networks.
08/15/24
Bluetooth Applications
54
Wireless control of and communication between a mobile
phone and a handsfree headset. This was one of the
earliest applications to become popular.
Wireless Bluetooth headset and Intercom.
Wireless networking between PCs in a confined space and
where little bandwidth is required.
Wireless communication with PC input and output devices,
the most common being the mouse, keyboard and printer.
Transfer of files, contact details, calendar appointments,
and reminders between devices with OBEX.
Replacement of previous wired RS-232 serial
communications in test equipment, GPS receivers, medical
equipment, bar code scanners, and traffic control devices.
08/15/24
Bluetooth Applications
55
For controls where infrared was often used.
For low bandwidth applications where higher USB bandwidth is not
required and cable-free connection desired.
Sending small advertisements from Bluetooth-enabled advertising
hoardings to other, discoverable, Bluetooth devices.
Dial-up internet access on personal computers or PDAs using a data-
capable mobile phone as a wireless modem.
Short range transmission of health sensor data from medical devices
to mobile phone, set-top box or dedicated telehealth devices.
Allowing a DECT phone to ring and answer calls on behalf of a nearby
cell phone
Real-time location systems (RTLS), are used to track and identify the
location of objects in real-time using “Nodes” or “tags” attached to, or
embedded in the objects tracked, and “Readers” that receive and
process the wireless signals from these tags to determine their
locations
08/15/24
Bluetooth Applications
56 08/15/24