BlueTooth
1
Bluetooth - overview
Motivation
In 1994 the L.M. Ericsson company wanted
to connect mobile phones to other devices
without using cables.
2
Bluetooth - overview
Special Interest Group (SIG)
L.M. Ericsson
IBM
Intel
Nokia
Toshiba
3
Bluetooth overview
Etymology
Harald Blaatand II ( translated
Bluetooth)
A Viking king that unified
(conquered) Denmark and
Norway in 940 – 981.
4
Bluetooth - overview
Goals of the Bluetooth SIG
• Wireless standard (unification) for the
interconnection of computing and
communication devices.
• Inexpensive
• Short range
• Wireless radios
5
Bluetooth - overview
Change in Bluetooth original scope
From Getting rid of cables between
devices
To Becoming more like a wireless
LAN
6
Bluetooth - overview
In 1999 the Bluetooth SIG published a
1500 page document describing V 1.0.
IEEE assigned designation 802.15 and used
the V 1.0 specification as its basis. Then
they began to modify parts of it.
7
Bluetooth - overview
Differences between V 1.0 and 802.15
V 1.0 is a complete specification from
application layer to physical layer
802.15 is only standardizing (modifying)
the physical and data link layers.
8
Bluetooth - overview
The Bluetooth 802.15 specification not
only creates competition for other
wireless technologies, namely 802.11,
but the two occupy most of the same
2.4 GHz spectrum and thus interfere
with each other.
9
Bluetooth - architecture
Piconet – the basic unit of a Bluetooth
system.
1 Master node
1 to 7 active slave nodes
0 to 255 parked nodes
10
Piconet
11
Bluetooth - architecture
Parked node
a slave device in a low power state to
conserve the drain on the devices batteries
In this state the device can only respond to
the beacon from the master node
12
Bluetooth - architecture
Node range
Slave nodes need to be within 10 meters of
the master node.
Why design such a short range?
13
Bluetooth - architecture
Answer : Money,
Money Money !!!
The designers
wanted this
technology to be
used widely (i.e. to
sell product).
Bluetooth chips
under $5.00
14
Bluetooth - architecture
Communication
Only possible between master and slave
nodes
Piconet uses centralized Time Division
Multiplexing.
The master node controls the clock and
determines which devices occupy which
time slot.
15
Bluetooth - architecture
How can such a limited range
architecture really provide competition
for 802.11 (WiFi)?
16
Bluetooth - architecture
How can such a limited range
architecture really provide competition
for 802.11 (WiFi)?
Answer : Scatternets
17
Bluetooth – architecture
18
Scatternet
19
Bluetooth - profiles
Bluetooth is different from most network
protocols.
Most network protocols focus defining how the
channels are to be used and leave application
designers to define what they will be used for.
Bluetooth V 1.1 defines 13 specific profiles
(applications) that will be supported along with
the different protocol stacks for each of them.
20
Bluetooth – profiles
Generic access profile
provides secure channels between the
master and slave.
Service discovery profile
allows devices to discover what services
are available from other devices.
21
Bluetooth – profiles
Serial port profile
for applications that need a serial port
communication
Generic object exchange profile
provide support for the client/server model.
note that a slave can be a client or a
server.
22
Bluetooth – profiles
LAN access profile
is a direct competitor of 802.11.
allows a Bluetooth device to connect to a fixed
network.
Dialup access profile
Ericsson’s original motivation
allows a notebook computer to communicate to a
mobile phone without wires
Fax profile
allows fax machines to connect to mobile phones
wirelessly to send and receive faxes
23
Bluetooth – profiles
Cordless Telephony Profile
connect a cordless telephone handset to a base
station without wires.
Intercom profile
allows two telephones to connect like walkie-
talkies
Headset Profile
good for hands free telephony while driving a car
24
Bluetooth – profiles
The last three profiles are for wireless
devices to exchange a wide variety of
data
Object Push profile – for simple objects
File transfer profile - general file transfer
Synchronization profile - was designed to
facilitate the exchange of data in both
directions between a P.C. and a P.D.A.
25
Bluetooth – profiles
There is a feeling that the 13 profiles
are an overly complicated solution to
achieve the desired goal.
A more simplistic solution could have been
the use of one protocol stack for file
transfer and one for streaming real-time
communication.
So how did it get to be so complicated?
26
Bluetooth – profiles
Answer : In the 1968 April issue of
Datamation magazine, Melvin Conway
proposed : If you assign n people to
design a compiler then you will wind up
with an n-pass compiler.
Said another way, the resulting software
structure mirrors the structure of the group
that created it.
27
Bluetooth – profiles
The groups of designers of Bluetooth
each focused on solving a specific problem.
Each generated a profile.
Next, lets take a look at how all of
these profiles fit together (The 802.15
protocol stack architecture).
28
Bluetooth
Bluetooth uses FHSS
It Uses ISM Band
Bluetooth Hops 1600 times /second
It uses GFSK to transfer bits to a
signal(Modulation)
Primary(Master) and Secondary(Slave)
communicates with each other using time slots
Primary uses even no. slots 0,2,4,…while
secondary odd no. slots 1,3,5…….
29
Single-secondary communication
30
Multiple-secondary communication
31
Bluetooth – protocol stack architecture
Does not fit any known models :
OSI, TCP/IP, including the 802 model
Radio layer corresponds to the physical layer
deals with radio transmission and modulation
focuses on inexpensive implementation
32
Bluetooth – protocol stack architecture
Base band layer
Combines part of the typical physical and data link layer roles.
Specifically the MAC sub-layer of the data link layer.
Focuses on how the master controls the time slots and how the
slots are grouped into frames. 33
Bluetooth – protocol stack architecture
Link Manager Protocol(LMP)
logical channels between devices/device pairing
power management
Device authentication
quality of service
Performs generation and exchange of encryption
key as well ie Handling data encryption 34
BlueTooth – protocol stack architecture
Logical link control adaptation protocol (L2CAP)
shields upper layers from the details of transmission
somewhat analogous to 802 LLC sub layer
Multiplexing data of higher layer protocols
Synchronization and reassembly of packets
Transmission management to a group of devices 35
BlueTooth – protocol stack architecture
Middleware layer
RFcomm : serial communications, mouse, keyboard …ie it
provides RS232 serial port emulation
Telephony : speech oriented protocol
Service Discovery : locate services in the network 36
Bluetooth – protocol stack architecture
Audio
controls audio, applications have direct access
Control
a control protocol, applications have direct access
37
Bluetooth – protocol stack architecture
The top layer is for application and profiles.
each application need only use the necessary
subset of the protocol stack to accomplish it’s task
38
More Bluetooth protocol
layers
A. Radio Layer
B. Base band Layer
C. L2CAP Layer
39
Radio Layer
Low power system can operated up to 10
meter with the frequency in the 2.4 GHz ISM
band
Lowest defined layer of the Bluetooth
specification
Band is divided into 79 channels with 1 MHz
each
Frequency hopping spread spectrum at 1600
hops/sec.
40
The Bluetooth Base band Layer
It lies on top of the Bluetooth radio layer
It is the physical layer of the Bluetooth
Each frame is transmitted over a logical
channel called a linked between master slave
Two kinds of links
Asynchronous Connection less (ASL)
Synchronous Connection Oriented (SCO)
41
Asynchronous Connection less & Synchronous
Connection Oriented
Data comes from L2CAP layer Their channel is allocated a
on the sending side and fixed slot in each direction
delivered to the L2CAP on the Frame send are never
receiver side retransmitted
Frame can be lost and may Forward error correction can
need to retransmitted be used to provide high
reliability
Can have up to 3 slave SCO
links with its master
Each SCO links can
transmitted one 64000 bps
PCM audio channel
42
Logical Link Control and
Adaptation Protocol (L2CAP)
There are 3 major functions
I. It accepts packets up to 64 kB from the upper layers &
breaks them into frames for transmission
II. It handles the multiplexing and demultiplexing of multiple
packet source
Packet has been reassemble the L2CAP layer can determines which upper-layer
protocol to handle ( RFcomm or telephony)
III. The third major function is to handles the quality of service
requirements when both links are established
43
The Bluetooth Frame Structure
44
Bluetooth Frame Structure
Access code (72 bits)
Header (54 bits)
Address field, type field, flow bit,
acknowledge bit, sequence bit, and
checksum
Data ( 0-2744 bits)
45
Conclusion
Bluetooth is a wireless technology that
was developed to be very low cost in hopes
that it would become widely used.
It is still yet to be seen whether or not it will
become the standard that the initial SIG
had hoped it would become.
46