Bluetooth Review Paper

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 9

SUMMARY

THIS

RESEARCH PAPER DISCUSSES

BLUETOOTH

TECHNOLOGY AT A PRELIMINARY

LEVEL AND EXAMINES ITS ROLE IN TECHNOLOGY TODAY . KEY FEATURES THAT

BLUETOOTH

IT

ALSO DISCUSSES THE

PROVIDES AS A WIRELESS STANDARD AND

BLUETOOTH TECHNOLOGY FOR DIFFERENT BLUETOOTH NETWORK ARRANGEMENTS. FURTHERMORE , THE PAPER EXAMINES THE BENEFITS OF USING BLUETOOTH TECHNOLOGY , DISCUSSES ITS CHARACTERISTICS AND WHERE BLUETOOTH FITS IN THE WORLD OF COMMUNICATION AND DEVICES . T HERE IS ALSO A BRIEF DISCUSSION ABOUT BLUETOOTH'S EMERGENCE AND ITS ROLE IN THE FUTURE OF WIRELESS COMMUNICATIONS . From the Paper: "Bluetooth technology could have had its beginning n the 10th century when Harold Blatand, which translates to Blue tooth, was King of Denmark. His goal was to unite Denmark and part of Norway as one kingdom. Although he died before he could achieve this goal, his name became synonymous with a standard aimed at unifying the worlds of telecommunications and computing (www.sysopt.com, 2004). As a side note, it is rumored that Harold liked to eat huge amounts of blueberries. So many in fact, that his teeth were stained blue hence the name Bluetooth (www.btdesigner.com, 2004)." BLUETOOTH BLUETOOTH IS A PROPRIETARY OPEN WIRELESS TECHNOLOGY STANDARD FOR EXCHANGING DATA OVER SHORT DISTANCES (USING SHORT WAVELENGTH RADIO TRANSMISSIONS) FROM FIXED AND MOBILE DEVICES, CREATING PERSONAL AREA NETWORKS (PAN S) WITH HIGH LEVELS OF SECURITY . C REATED BY TELECOMS [1] VENDOR E RICSSON IN 1994, IT WAS ORIGINALLY CONCEIVED AS A WIRELESS ALTERNATIVE TO RS-232 DATA CABLES . IT CAN CONNECT SEVERAL DEVICES, OVERCOMING PROBLEMS OF SYNCHRONIZATION . T ODAY BLUETOOTH IS MANAGED BY THE BLUETOOTH SPECIAL INTEREST G ROUP HISTORY
INVESTIGATES THE IMPLICATIONS OF

The word Bluetooth is an anglicised version of the Scandinavian Bltand/Bltann, the epithet of the tenth-century king Harald I of Denmark and parts of Norway who united dissonant Danish tribes into a single kingdom. The implication is that Bluetooth does the same with communications protocols, uniting them into one universal standard Implementation Bluetooth uses a radio technology called frequency-hopping spread spectrum, which chops up the data being sent and transmits chunks of it on up to 79 bands (1 MHz each; centered from 2402 to 2480 MHz) in the range 2,400-2,483.5 MHz (allowing for guard bands). This range is in the globally unlicensed Industrial, Scientific and Medical (ISM) 2.4 GHz short-range radio frequency band. Originally Gaussian frequency-shift keying (GFSK) modulation was the only modulation scheme available; subsequently, since the introduction of Bluetooth 2.0+EDR, /4-DQPSK and 8DPSK modulation may also be used between compatible devices. Devices functioning with GFSK are

said to be operating in basic rate (BR) mode where an instantaneous data rate of 1 Mbit/s is possible. The term enhanced data rate (EDR) is used to describe /4-DPSK and 8DPSK schemes, each giving 2 and 3 Mbit/s respectively. The combination of these (BR and EDR) modes in Bluetooth radio technology is classified as a "BR/EDR radio". Bluetooth is a packet-based protocol with a master-slave structure. One master may communicate with up to 7 slaves in a piconet; all devices share the master's clock. Packet exchange is based on the basic clock, defined by the master, which ticks at 312.5 s intervals. Two clock ticks make up a slot of 625 s; two slots make up a slot pair of 1250 s. In the simple case of single-slot packets the master transmits in even slots and receives in odd slots; the slave, conversely, receives in even slots and transmits in odd slots. Packets may be 1, 3 or 5 slots long but in all cases the master transmit will begin in even slots and the slave transmit in odd slots. Bluetooth provides a secure way to connect and exchange information between devices such as faxes, mobile phones, telephones, laptops, personal computers, printers, Global Positioning System (GPS) receivers, digital cameras, and video game consoles. The Bluetooth specifications are developed and licensed by the Bluetooth Special Interest Group (SIG). The Bluetooth SIG consists of more than 13,000 companies in the areas of telecommunication, computing, networking, and consumer electronics.[5] To be marketed as a Bluetooth device, it must be qualified to standards defined by the SIG. [edit] Communication and connection A master Bluetooth device can communicate with up to seven devices in a piconet. The devices can switch roles, by agreement, and the slave can become the master at any time. At any given time, data can be transferred between the master and one other device (except for the little-used broadcast mode). The master chooses which slave device to address; typically, it switches rapidly from one device to another in a round-robin fashion. The Bluetooth Core Specification provides for the connection of two or more piconets to form a scatternet, in which certain devices serve as bridges, simultaneously playing the master role in one piconet and the slave role in another. Many USB Bluetooth adapters or "dongles" are available, some of which also include an IrDA adapter. Older (pre-2003) Bluetooth dongles, however, have limited capabilities, offering only the Bluetooth Enumerator and a less-powerful Bluetooth Radio incarnation. Such devices can link computers with Bluetooth with a distance of 100 meters, but they do not offer as many services as modern adapters do. List of applications

A typical Bluetooth mobile phone headset.


Wireless control of and communication between a mobile phone and a handsfree headset. This was one of the earliest applications to become popular. Wireless networking between PCs in a confined space and where little bandwidth is required. Wireless communication with PC input and output devices, the most common being the mouse, keyboard and printer. Transfer of files, contact details, calendar appointments, and reminders between devices with OBEX. Replacement of traditional wired serial communications in test equipment, GPS receivers, medical equipment, bar code scanners, and traffic control devices. For controls where infrared was traditionally used. For low bandwidth applications where higher USB bandwidth is not required and cablefree connection desired. Sending small advertisements from Bluetooth-enabled advertising hoardings to other, discoverable, Bluetooth devices.[9] Wireless bridge between two Industrial Ethernet (e.g., PROFINET) networks. Three seventh-generation game consoles, Nintendo's Wii[10] and Sony's PlayStation 3 and PSP Go, use Bluetooth for their respective wireless controllers. Dial-up internet access on personal computers or PDAs using a data-capable mobile phone as a wireless modem like Novatel mifi. Short range transmission of health sensor data from medical devices to mobile phone, settop box or dedicated telehealth devices.[11] Allowing a DECT phone to ring and answer calls on behalf of a nearby cell phone Real-time location systems (RTLS), are used to track and identify the location of objects in real-time using Nodes or tags attached to, or embedded in the objects tracked, and Readers that receive and process the wireless signals from these tags to determine their locations[12] Tracking livestock and detainees. According to a leaked diplomatic cable, King Abdullah of Saudi Arabia suggested "implanting detainees with an electronic chip containing information about them and allowing their movements to be tracked with Bluetooth. This was done with horses and falcons, the King said."[13] Personal security application on mobile phones for theft prevention. The protected item has a Bluetooth marker (e.g. a headset) that is monitored continuously by the security application. If connection is lost (the marker is out of range) then an alarm is raised. The

first known implementation of this security application of Bluetooth is BluCop, which is published in December 2010

Bluetooth Technology

Scribd Upload a Document Search Documents Explore

Documents

Books - Fiction Books - Non-fiction Health & Medicine Brochures/Catalogs Government Docs How-To Guides/Manuals Magazines/Newspapers Recipes/Menus School Work + all categories Featured Recent

People

Authors Students Researchers Publishers Government & Nonprofits Businesses Musicians Artists & Designers Teachers + all categories Most Followed Popular latikadhawan

Account
o o o o o o o o o o

Home My Documents My Collections My Shelf View Public Profile Messages Notifications Settings Help Log Out

/ 9

Download this Document for Free Bluetooth Technology A New Era of Connectivity PAPER PRESENTED BY:PRANEETH SURAPANENI NAVYA PUTUMBAKA IT IT ANITS ANITS VISAKHAPATNAM VISAKHAPTNAM E-MAIL:praneeth1000@gmail.com E- MAIL:navya_naughty2003@yahoo.co.inPH.NO:9908033043 PH.NO:9989721146

Bluetooth Technology ABSTRACT T h e s e e m i n g l y e n d l e s s entanglement of data wires connectingtodays electronic devices has becomes l i g h t l y l e s s j u m b l e d w i t h t h e introduction of Bluetooth technologyand the creation of a wireless data link. T h i s a r t i c l e d e l v e s i n t o t h e implementation and architecture of Bluetooth. It also describes thefunctional overview and applications of B l u e t o o t h . I t g i v e s s i g n i f i c a n t advantages of Bluetooth over other datatransfer technologies such as IrDA and Home RF. It illustrates how aconnection is made in Bluetoothb e t w e e n t w o e n v i r o n m e n t s . I t m a i n l ye m p h a s i z e s t h e a r c h i t e c t u r e o f B l u e t o o t h . I t g i v e s o v e r a l l B l u e t o o t h p a c k e t s t r u c t u r e a n d d i f f e r e n t communication and data informationp r o t o c o l s s u c h a s W A P , U D P , IP,TCP ,RFCOMM, L2CAP etc. It alsoexplains Link Security by DataEncryption. Finally it narrates howB l u e t o o t h w i l l b r i n g a n e w l e v e l o f connectivity and convenience whenoperating electronic devices. Thesedetails in the article establish thegrowing need for Bluetooth technology.

Bluetooth Technology INTRODUCTION B luetooth is a method for datacommunication that uses short-range radiol i n k s t o r e p l a c e c a b l e s b e t w e e n computers and their connected units.B l u e t o o t h i s a r a d i o f r e q u e n c y technology utilizing the unlicensed2.5GHz industrial, scientific and medical(ISM) band. B luetooth is an open standardfor wireless connectivity with supportersmostly from the PC and cell phoneindustries. Not surprisingly, its primarymarket is for data and voice transfer betweencommunication devices and PCs. Bluetoothwas invented by L.M.Ericson of Sweden in 1994. The standard is nameda f t r H a r a l d B l a a t a n d " B l u e t o o t h " 2 n d , k i n g o f Denmark.

WHY BLUETOOTH? Bluetooth attempts to provide significantadvantages over other data transfer technologies such as IrDA and HomeRF.IrDA is already popular in PC toperipherals,but is severely limited by theshort connection distance of 1m and thel i n e o f s i g h t r e q u i r e m e n t f o r c o m m u n i c a t i o n . D u e t o i t s R F n a t u r e bluetooth is not subjected to suchlimitations. In addition to wirelessdevice connections up to 10-100m,devices need not be within line of sight.A l s o i t i s d e s i g n e d t o b e l o w c o s t i . e under $10/unit. E s t a b l i s h i n g a c o n n e c t i o n i n Bluetooth:

Linking one Bluetoooth device to another toa n o t h e r i n v o l v e s a s e r i e s o f i n q u i r y a n d paging procedures. The inquiry processentails the following steps: The Bluetooth device sends out aninquiry access code packet (inquirypacket) to search and locate thesedevices. The existing Bluetooth devices alreadywithin the area (and usually unware of any inquiring devices) will occasionallyenter an inquiry scan state of their own to troll for any inquiring devices. When a device in the inquiry scan statereceives an inquiry packet, it will r e s p o n d w i t h a f r e q u e n c y h o p synchronization (FHS) packet that issent back to the inquiring device.

Bluetooth Technology Once the inquiry routine is completed, thepaging process follows: The inquiring Bluetooth device noww a n t s t o e s t a b l i s h a c o n n e c t i o n w i t h another Bluetoooth device. To successfully locate and page a targetBluetooth device, the paging deviceestimates the hop frequency and clock of t h e t a r g e t B l u e t o o t h d e v i c e u s i n g t h e FHS packet received during inquiry. T h e p a g i n g d e v i c e p a g e s t h e t a r g e t device with the target devices device access code (DAC). The paging device transmits the DAC on several different hop frequencies that it thinks the target device is receiving (as calculated using the FHS packet) and continues to do so until a connection is made. While the paging device (the master) is paging, the target (slave) device may be involved in other piconets. Occasionally ,i t w i l l e n t e r t h e p a g e s c a n s t a t e a n d listen for pages directed to it, scanning through 16 different frequencies. When it receives a page from the paging d e v i c e , i t w i l l r e s p o n d t o t h e p a g e b y s e n d i n g a n u p d a t e o f i t s c l o c k t o t h e paging device. Once the paging device receives a page response from the target device, information vital for a connection is exchanged between the two devices. Information exchanged includes the device address and clock of the paging device, which is used to determine the timing and frequency-hop sequence of the newly formed piconet. When all connection information has been communicated, the connection is complete, and the two devices can beg into exchange data with one another. Bluetooth packet format:

Since Bluetooth is meant to be compatible with many different applications, it must be a b l e t o s e n d d a t a w i t h d i f f e r e n t p r o t o c o l s quickly and efficiently. When data is t r a n s m i t t e d a t t h e l o w e s t l e v e l , i t i s f i r s t broken down into smaller packets and sent s e r i a l l y w i t h t h e l e a s t s i g n i f i c a n t b i t s e n t first. Each data packet (represented in Figure2) contains three fields: an access code, a header, and a payload. Access codes c e s s c o d e . T h e a c c e s s c o d e i s u s e d ure 3) is divided into three sections-c e i v e s a d a t a p a c k e t , i t c h e c k s t h e uence (SEQN) bit allows t h e d u s e d t o p r e v e n t t h e r e c e p t i o n o f hird the forward error correctionk e t capable of being sent duringe r y 6 2 5 m i c r o s e c o n d t i m e s l o t , a etooth c a n h a n d l e t h e t r a n s m i s s i o n o f ble for transmission over a BluetoothE N E R A L B L U E T O O T H t o c o l s w i t h i n t h e B l u e t o o t h s ys t e m es the data for suitablee r a l s t r u c t u r e o f a B l u e t o o t h t e m c o n s i s t s o f a m i c r o p r o c e s s o r t h a t e r a l s o f t w a r e l a ye r s t h a t s t r u c t u r e t h e f e r e n t c o m m u n i c a t i o n a n d d a t a col (UDP), transport control protocolalone communication protocols, theyooth link. To support these differenta b l e o f c a p a b l e o f d i f f e r e n t i a t i n g a n d cols into data packets that thea t u s e t h e s e r i a l p o r t s o n a B l u e t o o t h st o B l u e t o o t h d a t a p a c k e t s a n d rol and adaptation protocol (L2CAP)ooth-established serviceplexing between all incoming uppertoothare (baseband controller) through at a m a y b e t r a n s p o r t e d o v e r o n e o f t h e band controller thate m b l e i t i n t o p a c k e t s t h a t a r e ooth packet composition for ion. Running on the basebandu r i t y s u r r o u n d i n g t h e d a t a transfer ween two devices. With the frequencyping, is very difficult for an externalice to eavesdrop on a Bluetooth link. h e r B l u e t o o t h d e v i c e s a l r e a d y r devices and the piconet fromt c h a l l e n g e b y t h a t c l a i m a n t device.etooth address, and a secret key. The formation between the v e r i f i e r a n d u l t a n e o u s l y. I t i s c a p a b l e o f i r c o n n e c t e d u n i t s . B l u e t o o t h i s a n m u n i c a t i o n d e v i c e s a n d P C s . I t i s e of supporting one asynchronousa c h a n n e l a n d u p t o t h r e e n n e l f o r b o t h v o i c e a n d d a t a . T h i s ion and automatic servicei p h e r a l n e t w o r k i n g , h i d d e n ted connection distance and lessmission speeds. It supports data rates irectional data transfer. It is perfectlyp l e t e l y s i m p l i f y t h e w a y i n w h i c h y i n t e r a c t w i t h e l e c t r o n i c t o o l s ande ye a r s t o c o m e , B l u e t o o t h w i l l e c t r o n i c d e v i c e s , l e a d i n g t o Haartsen et al. ,Thee t o o t h R a d i o S ys t e m I E E E p e r s . . B l u e t o o t h i n W i r e l e s s luetooth IEEE M i c r o w a v e BLUETOOTH

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy