Title: WELCOME%20TO%20BLUETOOTH%20TECHNOLOGY
1WELCOME TO BLUETOOTH TECHNOLOGY
Presented By M.L.Nikhil(09MD1A0438), III
E.C.E G.J.S.Pavan Kumar(09MD1A0417), III E.C.E
2HISTORY OF
- The word "Bluetooth" is taken from the 10th
century Danish King Harald Bluetooth.
3DEFINITION
- Bluetooth is a high-speed, low-power microwave
wireless link technology, designed to connect
phones, laptops and other portable equipment
together with little or no work by the user. - The effective range of Bluetooth devices is 32
feet (10 meters). Bluetooth transfers data at the
rate of 1 Mbps. It is also known as the IEEE
802.15 standards
4Special Interest Group
Bluetooth SIG is responsible for encouraging and
supporting research and development in Bluetooth
technology.
5Why bluetooth?
- Cable replacement between devices.
- Supported by major companies.
- Open Specification
- Low power consumption
- Connection can be initiated without user
interaction. - Devices can be connected to multiple devices at
the same time.
6Technical features
Connection Type Spread Spectrum (Frequency Hopping) Time Division Duplex (1600 hops/sec)
Spectrum 2.4 GHz ISM Open Band (79 MHz of spectrum 79 channels)
Modulation Gaussian Frequency Shift Keying
Transmission Power 1 mw 100 mw
Data Rate 1 Mbps
Range 30 ft
Supported Stations 8 devices
Data Security Authentication Key 128 bit key
Data Security Encryption Key 8-128 bits (configurable)
Module size 9 x 9 mm
7Operation
Bluetooth FHSS
- Employs frequency hopping spread spectrum
- Reduce interference with other devices
- Pseudorandom hopping
- 1600 hops/sec- time slot is defined as 625
microseconds
8Time-Division Duplex Scheme
- Channel is divided into consecutive slots (each
625 ?s) - One packet can be transmitted per slot
- Subsequent slots are alternatively used for
transmitting and receiving - Strict alternation of slots between the master
and the slaves - Master can send packets to a slave only in EVEN
slots - Slave can send packets to the master only in the
ODD slots
9Master slave
- The Bluetooth core system consists of an RF
transceiver, baseband, and protocol stack. - During typical operation, a physical radio
channel is shared by a group of devices that are
synchronized to a common clock and frequency
hopping pattern. One device provides the
synchronization reference. - It is known as the master. All other devices are
known as slaves. - A group of devices synchronized in this fashion
form a piconet. - This is the fundamental form of communication
for Bluetooth wireless technology.
10Typical Bluetooth Scenario
- Bluetooth will support wireless point-to-point
and point-to-multipoint (broadcast) between
devices in a piconet. - Point to Point Link
- Master - slave relationship
- Bluetooth devices can function as masters or
slaves - Piconet
- It is the network formed by a Master and one or
more slaves (max 7) - Each piconet has max capacity (1 Mbps)
11Piconet Structure
- All devices in piconet hop together.
-
12Connection State Machine
13Ad-hoc Network the Scatternet
- Inter-piconet communication
- Up to 10 piconets in a scatternet
- Multiple piconets can operate within same
physical space - This is an ad-hoc, peer to peer (P2P) network
14Architectural layers
15Device Manager
- controls the general behavior of the Bluetooth
enabled device - Functions
- inquiring
- connecting
- making the local Bluetooth enabled device
discoverable
16Link Manager
- Functions
- Creation
- Modification
- release of logical links
- Establishment of link set-up between devices is
called link manager protocal.
17Baseband Resource Manager
It acts as a scheduler that grants time on the
physical channels to all of the entities that
have negotiated an access contract. Link
Controller This is responsible for the encoding
and decoding of Bluetooth packets RF The RF
block is responsible for transmitting and
receiving packets of information on the physical
channel.
18security
- Security Measures
- Link Level Encryption Authentication.
- Personal Identification Numbers (PIN) for device
access. - Long encryption keys are used (128 bit keys).
- These keys are not transmitted over wireless.
Other parameters are transmitted over wireless
which in combination with certain information
known to the device, can generate the keys. - Further encryption can be done at the application
layer.
19Bluetooth vs. IrD
- Bluetooth
- Point to Multipoint
- Data Voice
- Easier Synchronization due to omni-directional
and no LOS requirement - Devices can be mobile
- Range 10 m
- IrD
- Point to point
- Intended for Data Communication
- Infrared, LOS communication
- Can not penetrate solid objects
- Both devices must be stationary, for
synchronization - Range 1 m
20Bluetooth enabled devices
21ADVANTAGES
- Wireless
- Inexpensive
- Automatic
- Interoperability
- Low interference and energy consumption
- Share voice and data
- Upgradeable
- Long lasting technology
22Limitations
- Every Bluetooth device has to have type approval
and qualification. - Less Range
- Low data rate between devices
23Conclusion
This technology is probably the only one that a
good chance to become widely available among
various devices.
24Thank you