Presentation is loading. Please wait.

Presentation is loading. Please wait.

1 BLUETOOTH TECHNOLOGY A revolution in wireless communication.

Similar presentations


Presentation on theme: "1 BLUETOOTH TECHNOLOGY A revolution in wireless communication."— Presentation transcript:

1 1 BLUETOOTH TECHNOLOGY A revolution in wireless communication

2 2 ROAD MAP Introduction Introduction Basic Definitions Basic Definitions Topology Topology Protocols Protocols Link Management & Security Link Management & Security Applications and Future Applications and Future

3 3 Introduction Aim :- To replace cables between mobiles, PC cards, headsets, desktops and other devices. Aim :- To replace cables between mobiles, PC cards, headsets, desktops and other devices. Developed by Special Interest Group (SIG) Developed by Special Interest Group (SIG) Association of I.T majors like Intel, IBM, Nokia and Toshiba Association of I.T majors like Intel, IBM, Nokia and Toshiba

4 4 Bluetooth Verses Infrared Slower than IR as time taken to discover the intended recipient Slower than IR as time taken to discover the intended recipient Penetration of solid objects Penetration of solid objects Omni directional Omni directional Advantage of proximity so less time requirement Advantage of proximity so less time requirement No such feature No such feature Unidirectional with 30 degrees range Unidirectional with 30 degrees range

5 5 BT Verses IR Data transfer rate 721 Kbps Data transfer rate 721 Kbps 30 feet range 30 feet range Mobility during data transfer Mobility during data transfer Internet compatible Internet compatible (emulating EIA\ TIA 232) Rate is 4 Mbps Rate is 4 Mbps Range very less Range very less Relatively stationary Relatively stationary

6 6 Bluetooth Definitions Piconet : Collection of devices connected via Bluetooth in ad hoc fashion. Limited to 8 units in a Piconet Piconet : Collection of devices connected via Bluetooth in ad hoc fashion. Limited to 8 units in a Piconet Scatternet : Two or more independent unsynchronized Piconet. Scatternet : Two or more independent unsynchronized Piconet.

7 7 Definitions Master : A device in Piconet whose clock and hopping sequence are used to synchronize all the devices. It also numbers the communication channels Master : A device in Piconet whose clock and hopping sequence are used to synchronize all the devices. It also numbers the communication channels

8 8 Definitions Slave : All other devices in the Piconet except master Slave : All other devices in the Piconet except master MAC : 3-bit media access control address used to differentiate between participating units MAC : 3-bit media access control address used to differentiate between participating units

9 9 Bluetooth technology Implemented using short range transreceivers Implemented using short range transreceivers Specifications comprises a system solution consisting of a hardware, a software & interoperability requirements Specifications comprises a system solution consisting of a hardware, a software & interoperability requirements Uses globally available unlicensed ISM radio band of 2.4 GHz. Uses globally available unlicensed ISM radio band of 2.4 GHz. Frequency range 2.4 – 2.484 GHz Frequency range 2.4 – 2.484 GHz

10 10 BT technology Advantage of using an unlicensed frequency band is that it is globally acceptable Advantage of using an unlicensed frequency band is that it is globally acceptable

11 11 Types of Links Asynchronous Connection Links (ACL) Asynchronous Connection Links (ACL) Supports symmetrical, asymmetrical, packet- switched & point to multipoint links Supports symmetrical, asymmetrical, packet- switched & point to multipoint links Data Transfer Rate: 433.9 Kbps(sym.) Data Transfer Rate: 433.9 Kbps(sym.) 732.2 Kbps in one, 57.6 Kbps in reverse(asymmetric) 732.2 Kbps in one, 57.6 Kbps in reverse(asymmetric)

12 12 Types of Links Synchronous Connection Oriented Links (SCO) Synchronous Connection Oriented Links (SCO) Provide symmetrical, circuit-switched & point to point connections Provide symmetrical, circuit-switched & point to point connections

13 13 Audio and Video For voice coding 64 Kbps channels are required For voice coding 64 Kbps channels are required Channels are derived through use of PCM or CVSDM Channels are derived through use of PCM or CVSDM Video encoding decoding using MPEG –4 format Video encoding decoding using MPEG –4 format Radio links use freq. hopping spread spectrum techniques Radio links use freq. hopping spread spectrum techniques

14 14 Spread Spectrum Method of wireless communication that takes a narrow band signal and spreads it over a broader portion of the available frequency band. Method of wireless communication that takes a narrow band signal and spreads it over a broader portion of the available frequency band. CDMA applies the same concept CDMA applies the same concept

15 15 Advantages of Spread Spectrum Technique Prevents Interference : where transmission disruption by external source such as noise from electromagnetic devices. Prevents Interference : where transmission disruption by external source such as noise from electromagnetic devices. Prevents Jamming : where stronger signal overwhelms the weaker one. Prevents Jamming : where stronger signal overwhelms the weaker one. No reflection off solids. No reflection off solids. No interception : where unauthorized users capture signal to determine the content. No interception : where unauthorized users capture signal to determine the content.

16 16 Performance Characteristics Features\FunctionsPerformance 1.Connection Type 2.Spectrum 3.Transmission Power 4.Aggregate Data Rate 5.Range 6.Supported stations Spread spectrum 2.4GHz. ISM band 1 milliwatt 1 Mbps using frequency hopping Up to 30 feet Up to 8 devices per piconet

17 17 Features\FunctionsPerformance Voice Channels Up to 3 Data Security For authentication a 128 bit key; for encryption key size configurable (8- 128 bits) Addressing Each bit has 48 bit MAC address

18 18 Bluetooth Topology Ad-hoc connection where each Piconet is identified by a different hopping sequence Ad-hoc connection where each Piconet is identified by a different hopping sequence Synchronization in unlicensed ISM band not permitted but BT devices do it using TDM Synchronization in unlicensed ISM band not permitted but BT devices do it using TDM Service discovery protocol allows wider applications ex: create LAN Service discovery protocol allows wider applications ex: create LAN Clustering avoided using technical safeguards. Clustering avoided using technical safeguards.

19 19 Bluetooth Protocols Bluetooth Protocol Layers Bluetooth Protocol Layers Bluetooth Core Protocols (Baseband, LMP, L2CAP, SDP) Bluetooth Core Protocols (Baseband, LMP, L2CAP, SDP) Cable Replacement Protocols (Radio Freq. Communication) Cable Replacement Protocols (Radio Freq. Communication) Telephony Control Protocols (TCSBIN, AT- Commands) Telephony Control Protocols (TCSBIN, AT- Commands) Adopted Protocols (PPP, TCP, OBEX, WAP, vCard, vCalender) Adopted Protocols (PPP, TCP, OBEX, WAP, vCard, vCalender)

20 20 LMP and SDP LMP : responsible for link setup & control between Bluetooth devices, including the control and negotiations of baseband packet sizes LMP : responsible for link setup & control between Bluetooth devices, including the control and negotiations of baseband packet sizes SDP : device information, services and characteristics of services can be queried. SDP : device information, services and characteristics of services can be queried.

21 21 BLUETOOTH LINK MANAGEMENT

22 22 Link Management Peer to Peer communication using LMP Peer to Peer communication using LMP Link Manager Link Manager Messages Exchanged (PDU’s) Messages Exchanged (PDU’s) Within 30 seconds Within 30 seconds PDU PDU 55 different types of PDU’s 55 different types of PDU’s 7 bit op code 7 bit op code

23 23 AUTHENTICATION General Response Messages General Response Messages LMP_accepted LMP_accepted LMP_not_accepted LMP_not_accepted Challenge- Response Scheme Challenge- Response Scheme Verifier sends(LMP_au_rand) Verifier sends(LMP_au_rand) Response is a function of challenge,Claimant ‘s (BD_ADDR)&Secret Key Response is a function of challenge,Claimant ‘s (BD_ADDR)&Secret Key Common Secret key is required for proper calculation Common Secret key is required for proper calculation

24 24 PAIRING When no Common Link Key: When no Common Link Key: 128 bit Initialization Key based on PIN and random no. 128 bit Initialization Key based on PIN and random no. Calculation of Response on key Calculation of Response on key Verifier Approves the Link Key Verifier Approves the Link Key Response not correct then Error Response not correct then Error Code authentication failure (LMP_detach) Code authentication failure (LMP_detach)

25 25 Link Key is Created after authentication Link Key is Created after authentication Link Key Created may be either combination of Keys or one of the unit’s unit key(LMP_unit _key & LMP_comb_key) Link Key Created may be either combination of Keys or one of the unit’s unit key(LMP_unit _key & LMP_comb_key) Waiting Interval: Waiting Interval: Increased exponentially Increased exponentially

26 26 ENCRYPTION Is an Option. Is an Option. Master’s Will in piconet Master’s Will in piconet Master & Slave must Agree Master & Slave must Agree Point to Point or also broadcast packet’s Point to Point or also broadcast packet’s

27 27 ENCRYPTION StartStop Master is configured to Transmit unencrypted packets and receive encrypted. Master is configured to Transmit unencrypted packets and receive encrypted. Slave is configured To Transmit and Receive encrypted packets Slave is configured To Transmit and Receive encrypted packets Master is configured to Transmit and Receive encrypted packets Master is configured to Transmit and Receive encrypted packets Master is configured to Transmit encrypted and receive unencrypted. Master is configured to Transmit encrypted and receive unencrypted. Slave is configured To Transmit and Receive unencrypted. Slave is configured To Transmit and Receive unencrypted. Master is configured to Transmit and Receive unencrypted. Master is configured to Transmit and Receive unencrypted.

28 28 Clock Offset Request Every Device has an Internal System Clock Every Device has an Internal System Clock Timing and frequncy determined by the master in Piconet. Timing and frequncy determined by the master in Piconet. Difference between slave’s and master’s. Difference between slave’s and master’s. Clock offset is updated on each time a packet is received. Clock offset is updated on each time a packet is received.

29 29 BLUETOOTH SECURITY Built in Security Built in Security Frequency Hopping Frequency Hopping Pseudorandom code sequence Pseudorandom code sequence Lasts 0.4 seconds Lasts 0.4 seconds 75 channels in 2.4GHZ 75 channels in 2.4GHZ Authentication preventing spoofing unwanted access Authentication preventing spoofing unwanted access Encryption makes data unintelligible. Encryption makes data unintelligible. Inhibiting user-friendly hence 3 levels of security. Inhibiting user-friendly hence 3 levels of security.

30 30 Security Modes Mode 1: Mode 1: Absence of security (Bypassing Link –Level security functions) Absence of security (Bypassing Link –Level security functions) Exchange of vCard and vCalenders Exchange of vCard and vCalenders Mode 2: Mode 2: Service Level Security for parallel applications Service Level Security for parallel applications Mode 3: Mode 3: Link Level Security Link Level Security LM enforces security at connection set up. LM enforces security at connection set up. Link Keys Link Keys

31 31 Key Length(8 and 128 bits) Key Length(8 and 128 bits) 128 bit challenge and 32 bit response. 128 bit challenge and 32 bit response. Depends on Level of Security Depends on Level of Security Maximum length limited by Hardware Maximum length limited by Hardware

32 32 LAYOUT FIELDS OF APPLICATION. FIELDS OF APPLICATION. BLUETOOTH ADVANTAGE BLUETOOTH ADVANTAGE SHORTCOMINGS OF THE TECHNOLOGY. SHORTCOMINGS OF THE TECHNOLOGY. COMPARISON WITH IR & WLAN. COMPARISON WITH IR & WLAN. MISNOMERS. MISNOMERS. RESEARCHES ON THE TECHNOLOGY. RESEARCHES ON THE TECHNOLOGY. FUTURE ASPECTS. FUTURE ASPECTS.

33 33 APPLICATIONS WAP enabled smart phones. WAP enabled smart phones. Electronic trading via handheld devices. Electronic trading via handheld devices. ad hoc Home/personal area network. ad hoc Home/personal area network. 3G Telephony. 3G Telephony.

34 34 BLUETOOTH ADVANTAGE Increased mobility in office by connecting Increased mobility in office by connecting various peripherals with BT. various peripherals with BT. V oice and data transmission possible V oice and data transmission possible 721 kbps suffices most of the common uses. 721 kbps suffices most of the common uses. Built in sufficient encryption and authentication. Built in sufficient encryption and authentication. Cheaper insatllation & maintainence. Cheaper insatllation & maintainence.

35 35 ERROR CORRECTION 1/3 rate FEC (Forward Error Correction) 1/3 rate FEC (Forward Error Correction) 2/3 rate FEC 2/3 rate FEC ARQ unnumbered scheme (Automatic Repeat Request). ARQ unnumbered scheme (Automatic Repeat Request). This reduces the available bandwidth. This reduces the available bandwidth.

36 36 RADIATION THREATS Penetration depth of RF is about 1.5 cm at 2450 MHz and about 2.5 cm at 900 MHz Penetration depth of RF is about 1.5 cm at 2450 MHz and about 2.5 cm at 900 MHz It cannot generate enough heat to produce fire hazards. It cannot generate enough heat to produce fire hazards. Radiation not beamed but dispersed in all direction. Radiation not beamed but dispersed in all direction. But in long run EM radiation can cause ill effects in some persons. But in long run EM radiation can cause ill effects in some persons.

37 37 LOOPHOLES IN SECURITY Key initialization is not reliable. Key initialization is not reliable. Unit key can leak the information in traffic. Unit key can leak the information in traffic. BT device address can be used to generate logs of transaction. BT device address can be used to generate logs of transaction. Battery draining denial of service scheme. Battery draining denial of service scheme.

38 38 BLUETOOTH v/s INFRARED BT IrDA Range-10 to 100 m 20 cm to 2 m Omnidirectional comm. Bidirectional comm. Peak data rate- 1mbps 16 mbps 16 mbps Can support 8 devices in piconet 2 devices can interact 2 devices can interact at time

39 39 BLUETOOTH v\s WLAN WLAN BT Vendors Proxim, 3COM, Symbol, Cisco Proxim, 3COM, Symbol, Cisco Most chip vendors SPEED 11-54 Mbps 1-2 Mbps No. of access pts required Every 200 feet Every 30 feet Distance coverage Upto 300 feet Upto 30 feet interference 2.4 GHz band is significant here 2.4 GHz band is significant here pollutedinterference CostexpensiveCheaper(Rs1200-300)

40 40 IrDa Response Infra com launches RED BEAMER technology. Infra com launches RED BEAMER technology. Indirect and diffused IR will increase mobility of IR devices. Indirect and diffused IR will increase mobility of IR devices. Transmission at only 56kbps. Transmission at only 56kbps.

41 41 BLUETOOTH FACTS Its not WLAN. Data throughput is much less in BT. Its not WLAN. Data throughput is much less in BT. BT can jam WLAN as both use 2.4GHz RF. BT can jam WLAN as both use 2.4GHz RF. Not designed to carry heavy traffic loads. Not designed to carry heavy traffic loads. Not suitable in server-based applications. Not suitable in server-based applications.

42 42 PIONEERS IN RESEARCH IBM- Watch pad and cyber phones. IBM- Watch pad and cyber phones. MS- Intelligent apps for Windows. MS- Intelligent apps for Windows. INTEL-wireless PC Cards, access points. INTEL-wireless PC Cards, access points. MOTOROLA & TOSHIBA-pc mobile interface via bluetooth. MOTOROLA & TOSHIBA-pc mobile interface via bluetooth. GENERAL MOTORS- Better communication in cars. GENERAL MOTORS- Better communication in cars. NEC-launched BT enabled notebook. NEC-launched BT enabled notebook.

43 43

44 44 BLUETOOTH FUTURE 100 million devices in use and around 2005 650 million devices will be deployed. 100 million devices in use and around 2005 650 million devices will be deployed. 19% vehicles will be bluetooth enabled by 2007. 19% vehicles will be bluetooth enabled by 2007.

45 45 SOME PRODUCTS IN MARKET Ericsson R520 Bluetooth/WAP/GPRS/Triband Ericsson R520 Bluetooth/WAP/GPRS/Triband Ericsson T36 Bluetooth/WAP/HSCSD/Triband Ericsson T36 Bluetooth/WAP/HSCSD/Triband Alcatel OneTouch 700 GPRS, WAP, Bluetooth Alcatel OneTouch 700 GPRS, WAP, Bluetooth TDK Bluetooth Product Range TDK Bluetooth Product Range Bluetooth-enabled Nokia 9110 linked to a FujiFilm digital camera Bluetooth-enabled Nokia 9110 linked to a FujiFilm digital camera Ericsson Bluetooth GSM Headset Ericsson Bluetooth GSM Headset Ericsson Communicator Ericsson Communicator

46 46 REFRENCES www.countersys.com/tech/bluetooth.html www.countersys.com/tech/bluetooth.html www.countersys.com/tech/bluetooth.html www.bluetooth.com www.bluetooth.com www.cnet.com www.cnet.com www.motorola.com www.motorola.com www.motorola.com www.palowireless.com www.palowireless.com www.palowireless.com www.swedetrack.com www.swedetrack.com www.swedetrack.com www.mobileinfo.com www.mobileinfo.com www.mobileinfo.com www.computer.org www.computer.org www.computer.org www.informit.com www.informit.com www.informit.com www.erricsson.com www.erricsson.com www.erricsson.com www.norwoodsystems.com www.norwoodsystems.com


Download ppt "1 BLUETOOTH TECHNOLOGY A revolution in wireless communication."

Similar presentations


Ads by Google