Download presentation
Presentation is loading. Please wait.
1
Presented by: Ahmad Mohawish & Hasan Al-Khudhair
Bluetooth Presented by: Ahmad Mohawish & Hasan Al-Khudhair
2
Outline INTRODUCTION SERVICES INTENDED TO PROVIDE BLUETOOTH NETWORK
ADVANTIGES AND DISADVANTIGES OSI LAYERS USED TYPE OF MODULATION USED PACKET FORMAT ERROR CONTROL USED SECURITY FUNNY THING ABOUT IT
3
Bluetooth Naming A Danish king Harald Blåtand (Harold I of Denmark in English), King of Denmark and Norway from 935 and 936 respectively, to Known for his unification of previously warring tribes from Denmark and Norway. Bluetooth likewise was intended to unify different technologies like computers and mobile phones.
4
Commercial Overview In 1998, Intel, IBM, Ericsson, Nokia and Toshiba formed the unified among themselves and adopted the code name Bluetooth for their proposed open specification. Major computing (Intel, IBM, and Toshiba) and telecommunications (Nokia, Ericsson) leaders formed the Bluetooth Special Interest Group (SIG). Their aim was to provide a royalty-free specification for a low-cost, low-power, radio-based replacement for cable.
5
Bluetooth Specification
*Communicate with each other using the international 2.4GHz ISM (Industrial, Scientific and Medical) band *Maximum capacity of 1Mbit/second. *Specification protocol defines one universal 1Mbit/s full-duplex. *Short-range radio channel that may connect up to eight portable, digital devices.
6
Bluetooth Specification
Provides support for both voice and data transmission Uses a radio frequency that is available worldwide Low energy consumption. A Bluetooth device can go into one of three low power modes if no data is ready to be sent
7
SERVICES INTENDED TO PROVIDE
The Three-in-One Phone: This phone will have three functions: When you are at home, it functions as a wireless fixed line (fixed line charge); Away from home, it functions as a mobile phone (cellular charge); When the phone comes into range of another phone with in-built Bluetooth technology, it may function as a walkie-talkie (no telephone charge).
8
SERVICES INTENDED TO PROVIDE
2) Hidden Computing Model: The Bluetooth SIG predicts that a Bluetooth device will function automatically and may send you periodic updates (within a 10m-100m range). This means that you may be alerted to new s and telephone calls, even if your phone/PDA is situated in the next room!
9
SERVICES INTENDED TO PROVIDE
3) Automatic Background Synchronization: As soon as you come within a ten metre range of your PC, the appointments calendar on your PDA will be automatically updated to agree with the one on your PC, or vice versa. 4) Wireless Internet Connection: To provide networking connectivity to the Internet
10
AD-HOC Master/slave-based MAC (Medium Access Control) protocol
Each unit may be distinguished using its unique (Bluetooth Device A) 48-bit address.
11
AD-HOC To establish a new piconet:
a unit initiates a connection by sending a page message, if it knows the address of the receiver. OR an address inquiry message followed by a page message IF the receiver's address is unknown. The initiating unit is temporarily assigned as master.
12
Bluetooth Networking Piconets subnet of max. users of 8
one MASTER and seven SLAVES MASTER/SLAVE SLAVE/SLAVE
13
Bluetooth Network
14
Bluetooth Network
15
Advantages of Bluetooth
Wireless technology Minimal power usage Minimal to no interference with other wireless devices (low power) Minimal to no noise interference from other wireless devices (low power) Relatively high bandwidth of about 712 Kbps (max)
16
Advantages of Bluetooth
Relatively high upstream bandwidth of up to432 Kbps (sending) Network Fields can extend up to 100m with Hub broadcasters Supports many Devices Supports half and full duplex communications Supports Multimedia
17
Disadvantages Of Bluetooth
It is only a 1 to 1 Network device Relative Piconet (personal area network) is small at a maximum of 10m Wi-Fi technology seems to be on the rise, hence the Bluetooth market maybe decreasing Limited voice compatibility
18
Applications Wireless networking between laptops,mobiles …where little bandwidth is required Bluetooth appliances such as printers, mice and keyboards Transfer of files (images, mp3s, etc) between mobile phones, Personal digital assistants (PDAs) and computers via OBEX Certain mp3 players and digital cameras to transfer files to and from computers Bluetooth headsets for mobile phones and smartphones Bluetooth car kits For remote controls
19
Bluetooth OSI Layers
20
Bluetooth OSI Layers Serial Port Profile Cordless Telephony Profile
Object Exchange Protocol Headset Profile Provides serial cable emulation Query for services Handles multiplexing of higher layer protocols, and quality of service Controls Piconet management, link configuration, and security Controls the sending and receiving of modulated bitstreams Defines timing, framing, and flow control on the link
21
Bluetooth OSI Layers CTP : Cordless Telephony Profile
HP : Headset Profile SPP : Serial Port Profile PPP : Point To Point Protocol OBEX : Object Exchange Protocol TCP : Transmission Control Protocol SDP : Service Discovery Protocol (Query for services) L2CAP :Logical Link Control and Adaptation Protocol (Handles multiplexing of higher layer protocols, and quality of service) RFCOMM: Provides serial cable emulation Link Manager : Controls Piconet management, link configuration, and security Baseband : Defines timing, framing, and flow control on the link RF : Controls the sending and receiving of modulated bitstreams Link Controller: Interface to baseband and link manager
22
Type of Modulation Frequency Hopping Spread Spectrum (FHSS).
1600 hops/sec. 79 frequency channels. 1 MHz/channel i.e. 1 Mbps. 220µs switching time.
23
Type of Modulation
24
Type of Modulation TDMA-TDD 625 µs time slot duration
25
Type of Modulation Multi-slot frame
26
Packet Format Packet Types: HV1, HV2, HV3 - Voice packets
DV - Mixed voice/data DM1, DM3, DM5 - Protected data packets AUX1, DH1, DH3, DH5 - Unprotected data packets NULL, POLL, ID, FHS - Baseband control packets
27
Error Control Used FEC (Forward Error Correction)
1/3 FEC - Repeat each bit 3 times 2/3 FEC - (15,10) shortened Hamming code ARQ (Automatic Repeat Request) CRC (Cyclic Redundancy Check) HEC (Header Error Check) Payload CRC
28
Security None—all Bluetooth devices are allowed to connect.
Authorization—the local device operator must authorize a remote device connection, usually by physically clicking an on-screen button. Authentication— remote devices must provide a password that matches that of the local device.
29
Security Encryption— connections with remote devices can be encrypted for additional security. Service Level— individual local services may be disabled. Disabled services are not available to any remote device. Service Level security is only available on some types of devices.
30
A FUNNY THING ABOUT IT In August 2005, police in Cambridge shire, England, issued warnings about thieves using Bluetooth-enabled phones to track other devices left in cars.
31
QUESTIONS?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.