SlideShare a Scribd company logo
1 of 46
11
BLUETOOTHBLUETOOTH
TECHNOLOGYTECHNOLOGY
A revolution in wirelessA revolution in wireless
communicationcommunication
2
ROAD MAPROAD MAP
 IntroductionIntroduction
 Basic DefinitionsBasic Definitions
 TopologyTopology
 ProtocolsProtocols
 Link Management & SecurityLink Management & Security
 Applications and FutureApplications and Future
3
IntroductionIntroduction
 Aim :- To replace cables between mobiles, PCAim :- To replace cables between mobiles, PC
cards, headsets, desktops and other devices.cards, headsets, desktops and other devices.
 Developed by Special Interest Group (SIG)Developed by Special Interest Group (SIG)
 Association of I.T majors like Intel, IBM,Association of I.T majors like Intel, IBM,
Nokia and ToshibaNokia and Toshiba
4
Bluetooth Verses InfraredBluetooth Verses Infrared
 Slower than IR as timeSlower than IR as time
taken to discover thetaken to discover the
intended recipientintended recipient
 Penetration of solidPenetration of solid
objectsobjects
 Omni directionalOmni directional
 Advantage of proximityAdvantage of proximity
so less time requirementso less time requirement
 No such featureNo such feature
 Unidirectional with 30Unidirectional with 30
degrees rangedegrees range
5
BT Verses IRBT Verses IR
 Data transfer rate 721Data transfer rate 721
KbpsKbps
 30 feet range30 feet range
 Mobility during dataMobility during data
transfertransfer
 Internet compatibleInternet compatible
(emulating EIA TIA 232)(emulating EIA TIA 232)
 Rate is 4 MbpsRate is 4 Mbps
 Range very lessRange very less
 Relatively stationaryRelatively stationary
6
Bluetooth DefinitionsBluetooth Definitions
 Piconet : Collection ofPiconet : Collection of
devices connected viadevices connected via
Bluetooth in ad hocBluetooth in ad hoc
fashion. Limited to 8fashion. Limited to 8
units in a Piconetunits in a Piconet
 Scatternet : Two orScatternet : Two or
more independentmore independent
unsynchronized Piconet.unsynchronized Piconet.
7
DefinitionsDefinitions
 Master : A device inMaster : A device in
Piconet whose clockPiconet whose clock
and hopping sequenceand hopping sequence
are used toare used to
synchronize all thesynchronize all the
devices. It alsodevices. It also
numbers thenumbers the
communicationcommunication
channelschannels
8
DefinitionsDefinitions
 Slave : All other devicesSlave : All other devices
in the Piconet exceptin the Piconet except
mastermaster
 MAC : 3-bit mediaMAC : 3-bit media
access control addressaccess control address
used to differentiateused to differentiate
between participatingbetween participating
unitsunits
9
Bluetooth technologyBluetooth technology
 Implemented using short range transreceiversImplemented using short range transreceivers
 Specifications comprises a system solutionSpecifications comprises a system solution
consisting of a hardware, a software &consisting of a hardware, a software &
interoperability requirementsinteroperability requirements
 Uses globally available unlicensed ISM radioUses globally available unlicensed ISM radio
band of 2.4 GHz.band of 2.4 GHz.
 Frequency range 2.4 – 2.484 GHzFrequency range 2.4 – 2.484 GHz
10
BT technologyBT technology
 Advantage of using an unlicensed frequencyAdvantage of using an unlicensed frequency
band is that it is globally acceptableband is that it is globally acceptable
11
Types of LinksTypes of Links
 Asynchronous Connection Links (ACL)Asynchronous Connection Links (ACL)
 Supports symmetrical, asymmetrical, packet-Supports symmetrical, asymmetrical, packet-
switched & point to multipoint linksswitched & point to multipoint links
 Data Transfer Rate: 433.9 Kbps(sym.)Data Transfer Rate: 433.9 Kbps(sym.)
 732.2 Kbps in one, 57.6 Kbps in732.2 Kbps in one, 57.6 Kbps in
reverse(asymmetric)reverse(asymmetric)
12
Types of LinksTypes of Links
 Synchronous Connection Oriented LinksSynchronous Connection Oriented Links
(SCO)(SCO)
 Provide symmetrical, circuit-switched & point toProvide symmetrical, circuit-switched & point to
point connectionspoint connections
13
Audio and VideoAudio and Video
 For voice coding 64 Kbps channels areFor voice coding 64 Kbps channels are
requiredrequired
 Channels are derived through use of PCM orChannels are derived through use of PCM or
CVSDMCVSDM
 Video encoding decoding using MPEG –4Video encoding decoding using MPEG –4
formatformat
 Radio links use freq. hopping spread spectrumRadio links use freq. hopping spread spectrum
techniquestechniques
14
Spread SpectrumSpread Spectrum
 Method of wireless communication that takesMethod of wireless communication that takes
a narrow band signal and spreads it over aa narrow band signal and spreads it over a
broader portion of the available frequencybroader portion of the available frequency
band.band.
 CDMA applies the same conceptCDMA applies the same concept
15
Advantages of SpreadAdvantages of Spread
Spectrum TechniqueSpectrum Technique
 Prevents Interference : where transmissionPrevents Interference : where transmission
disruption by external source such as noise fromdisruption by external source such as noise from
electromagnetic devices.electromagnetic devices.
 Prevents Jamming : where stronger signalPrevents Jamming : where stronger signal
overwhelms the weaker one.overwhelms the weaker one.
 No reflection off solids.No reflection off solids.
 No interception : where unauthorized usersNo interception : where unauthorized users
capture signal to determine the content.capture signal to determine the content.
16
Performance CharacteristicsPerformance Characteristics
FeaturesFunctionsFeaturesFunctions PerformancePerformance
1.Connection Type1.Connection Type
2.Spectrum2.Spectrum
3.Transmission Power3.Transmission Power
4.Aggregate Data Rate4.Aggregate Data Rate
5.Range5.Range
6.Supported stations6.Supported stations
Spread spectrumSpread spectrum
2.4GHz. ISM band2.4GHz. ISM band
1 milliwatt1 milliwatt
1 Mbps using frequency1 Mbps using frequency
hoppinghopping
Up to 30 feetUp to 30 feet
Up to 8 devices perUp to 8 devices per
piconetpiconet
17
FeaturesFunctionsFeaturesFunctions PerformancePerformance
Voice ChannelsVoice Channels Up to 3Up to 3
Data SecurityData Security For authentication a 128For authentication a 128
bit key; for encryptionbit key; for encryption
key size configurable (8-key size configurable (8-
128 bits)128 bits)
AddressingAddressing Each bit has 48 bit MACEach bit has 48 bit MAC
addressaddress
18
Bluetooth TopologyBluetooth Topology
 Ad-hoc connection where each Piconet is identifiedAd-hoc connection where each Piconet is identified
by a different hopping sequenceby a different hopping sequence
 Synchronization in unlicensed ISM band notSynchronization in unlicensed ISM band not
permitted but BT devices do it using TDMpermitted but BT devices do it using TDM
 Service discovery protocol allows wider applicationsService discovery protocol allows wider applications
ex: create LANex: create LAN
 Clustering avoided using technical safeguards.Clustering avoided using technical safeguards.
19
Bluetooth ProtocolsBluetooth Protocols
 Bluetooth Protocol LayersBluetooth Protocol Layers
 Bluetooth Core Protocols (Baseband, LMP,Bluetooth Core Protocols (Baseband, LMP,
L2CAP, SDP)L2CAP, SDP)
 Cable Replacement Protocols (Radio Freq.Cable Replacement Protocols (Radio Freq.
Communication)Communication)
 Telephony Control Protocols (TCSBIN, AT-Telephony Control Protocols (TCSBIN, AT-
Commands)Commands)
 Adopted Protocols (PPP, TCP, OBEX, WAP,Adopted Protocols (PPP, TCP, OBEX, WAP,
vCard, vCalender)vCard, vCalender)
20
LMP and SDPLMP and SDP
 LMP : responsible for link setup & controlLMP : responsible for link setup & control
between Bluetooth devices, including thebetween Bluetooth devices, including the
control and negotiations of baseband packetcontrol and negotiations of baseband packet
sizessizes
 SDP : device information, services andSDP : device information, services and
characteristics of services can be queried.characteristics of services can be queried.
2121
BLUETOOTHBLUETOOTH
LINK MANAGEMENTLINK MANAGEMENT
22
Link ManagementLink Management
 Peer to Peer communication using LMPPeer to Peer communication using LMP
 Link ManagerLink Manager
 Messages Exchanged (PDU’s)Messages Exchanged (PDU’s)
 Within 30 secondsWithin 30 seconds
 PDUPDU
 55 different types of PDU’s55 different types of PDU’s
 7 bit op code7 bit op code
23
AUTHENTICATIONAUTHENTICATION
 General Response MessagesGeneral Response Messages
 LMP_acceptedLMP_accepted
 LMP_not_acceptedLMP_not_accepted
 Challenge- Response SchemeChallenge- Response Scheme
 Verifier sends(LMP_au_rand)Verifier sends(LMP_au_rand)
 Response is a function of challenge ,Claimant ‘sResponse is a function of challenge ,Claimant ‘s
(BD_ADDR)&Secret Key(BD_ADDR)&Secret Key
 Common Secret key is required for proper calculationCommon Secret key is required for proper calculation
24
PAIRINGPAIRING
 When no Common Link Key:When no Common Link Key:
 128 bit Initialization Key based on PIN and128 bit Initialization Key based on PIN and
random no.random no.
 Calculation of Response on keyCalculation of Response on key
 Verifier Approves the Link KeyVerifier Approves the Link Key
 Response not correct then ErrorResponse not correct then Error
 Code authentication failure (LMP_detach)Code authentication failure (LMP_detach)
25
 Link Key is Created after authenticationLink Key is Created after authentication
 Link Key Created may be eitherLink Key Created may be either
combination of Keys or one of the unit’scombination of Keys or one of the unit’s
unit key(LMP_unit _key &unit key(LMP_unit _key &
LMP_comb_key)LMP_comb_key)
 Waiting Interval:Waiting Interval:
 Increased exponentiallyIncreased exponentially
26
ENCRYPTIONENCRYPTION
 Is an Option.Is an Option.
 Master’s Will in piconetMaster’s Will in piconet
 Master & Slave must AgreeMaster & Slave must Agree
 Point to Point or also broadcast packet’sPoint to Point or also broadcast packet’s
27
ENCRYPTIONENCRYPTION
StartStart StopStop
 Master is configured toMaster is configured to
Transmit unencryptedTransmit unencrypted
packets and receivepackets and receive
encrypted .encrypted .
 Slave is configured ToSlave is configured To
Transmit and ReceiveTransmit and Receive
encrypted packetsencrypted packets
 Master is configured toMaster is configured to
Transmit and ReceiveTransmit and Receive
encrypted packetsencrypted packets
 Master is configured toMaster is configured to
Transmit encrypted andTransmit encrypted and
receive unencrypted .receive unencrypted .
 Slave is configured ToSlave is configured To
Transmit and ReceiveTransmit and Receive
unencrypted .unencrypted .
 Master is configured toMaster is configured to
Transmit and ReceiveTransmit and Receive
unencrypted .unencrypted .
28
Clock Offset RequestClock Offset Request
 Every Device has an Internal System ClockEvery Device has an Internal System Clock
 Timing and frequncy determined by the master inTiming and frequncy determined by the master in
Piconet.Piconet.
 Difference between slave’s and master’s.Difference between slave’s and master’s.
 Clock offset is updated on each time a packetClock offset is updated on each time a packet
is received.is received.
29
BLUETOOTH SECURITYBLUETOOTH SECURITY
 Built in SecurityBuilt in Security
 Frequency HoppingFrequency Hopping
 Pseudorandom code sequencePseudorandom code sequence
 Lasts 0.4 secondsLasts 0.4 seconds
 75 channels in 2.4GHZ75 channels in 2.4GHZ
 Authentication preventing spoofing unwanted accessAuthentication preventing spoofing unwanted access
 Encryption makes data unintelligible.Encryption makes data unintelligible.
 Inhibiting user-friendly hence 3 levels of security.Inhibiting user-friendly hence 3 levels of security.
30
Security ModesSecurity Modes
 Mode 1:Mode 1:
 Absence of security (Bypassing Link –Level securityAbsence of security (Bypassing Link –Level security
functions)functions)
 Exchange of vCard and vCalendersExchange of vCard and vCalenders
 Mode 2:Mode 2:
 Service Level Security for parallel applicationsService Level Security for parallel applications
 Mode 3:Mode 3:
 Link Level SecurityLink Level Security
 LM enforces security at connection set up.LM enforces security at connection set up.
 Link KeysLink Keys
31
 Key Length(8 and 128 bits)Key Length(8 and 128 bits)
 128 bit challenge and 32 bit response .128 bit challenge and 32 bit response .
 Depends on Level of SecurityDepends on Level of Security
 Maximum length limited by HardwareMaximum length limited by Hardware
32
LAYOUTLAYOUT
 FIELDS OF APPLICATION.FIELDS OF APPLICATION.
 BLUETOOTH ADVANTAGEBLUETOOTH ADVANTAGE
 SHORTCOMINGS OF THESHORTCOMINGS OF THE
TECHNOLOGY.TECHNOLOGY.
 COMPARISON WITH IR & WLAN.COMPARISON WITH IR & WLAN.
 MISNOMERS.MISNOMERS.
 RESEARCHES ON THE TECHNOLOGY.RESEARCHES ON THE TECHNOLOGY.
 FUTURE ASPECTS.FUTURE ASPECTS.
33
APPLICATIONSAPPLICATIONS
 WAP enabled smart phones.WAP enabled smart phones.
 Electronic trading via handheld devices.Electronic trading via handheld devices.
 ad hoc Home/personal area network.ad hoc Home/personal area network.
 3G Telephony.3G Telephony.
34
BLUETOOTH ADVANTAGEBLUETOOTH ADVANTAGE
 Increased mobility in office by connectingIncreased mobility in office by connecting
various peripherals with BT.various peripherals with BT.

VVoice and data transmission possibleoice and data transmission possible
 721 kbps suffices most of the common uses.721 kbps suffices most of the common uses.
 Built in sufficient encryption andBuilt in sufficient encryption and
authentication.authentication.
 Cheaper insatllation & maintainence.Cheaper insatllation & maintainence.
35
ERROR CORRECTIONERROR CORRECTION
 1/3 rate FEC (Forward Error Correction)1/3 rate FEC (Forward Error Correction)
 2/3 rate FEC2/3 rate FEC
 ARQ unnumbered scheme (Automatic RepeatARQ unnumbered scheme (Automatic Repeat
Request).Request).
 This reduces the available bandwidth.This reduces the available bandwidth.
36
RADIATION THREATSRADIATION THREATS
 Penetration depth of RF is about 1.5 cm atPenetration depth of RF is about 1.5 cm at
2450 MHz and about 2.5 cm at 900 MHz2450 MHz and about 2.5 cm at 900 MHz
 It cannot generate enough heat to produce fireIt cannot generate enough heat to produce fire
hazards.hazards.
 Radiation not beamed but dispersed in allRadiation not beamed but dispersed in all
direction.direction.
 But in long run EM radiation can cause illBut in long run EM radiation can cause ill
effects in some persons.effects in some persons.
37
LOOPHOLES IN SECURITYLOOPHOLES IN SECURITY
 Key initialization is not reliable.Key initialization is not reliable.
 Unit key can leak the information in traffic.Unit key can leak the information in traffic.
 BT device address can be used to generate logsBT device address can be used to generate logs
of transaction.of transaction.
 Battery draining denial of service scheme.Battery draining denial of service scheme.
38
BLUETOOTH v/s INFRAREDBLUETOOTH v/s INFRARED
BT IrDABT IrDA
Range-10 to 100 mRange-10 to 100 m 20 cm to 2 m20 cm to 2 m
Omnidirectional comm.Omnidirectional comm. Bidirectional comm.Bidirectional comm.
Peak data rate- 1mbpsPeak data rate- 1mbps 16 mbps16 mbps
Can support 8 devices inCan support 8 devices in
piconetpiconet
2 devices can interact2 devices can interact
at timeat time
39
BLUETOOTH vs WLANBLUETOOTH vs WLAN
WLAN BTWLAN BT
VendorsVendors Proxim, 3COM,Proxim, 3COM,
Symbol, CiscoSymbol, Cisco
Most chipMost chip
vendorsvendors
SPEEDSPEED 11-54 Mbps11-54 Mbps 1-2 Mbps1-2 Mbps
No. of access ptsNo. of access pts
requiredrequired
Every 200 feetEvery 200 feet Every 30 feetEvery 30 feet
DistanceDistance
coveragecoverage
Upto 300 feetUpto 300 feet Upto 30 feetUpto 30 feet
interferenceinterference 2.4 GHz band is2.4 GHz band is
significant heresignificant here
pollutedpolluted
interferenceinterference
CostCost expensiveexpensive CheaperCheaper
(Rs1200-300)(Rs1200-300)
40
IrDa ResponseIrDa Response
 Infra com launches RED BEAMERInfra com launches RED BEAMER
technology.technology.
 Indirect and diffused IR will increase mobilityIndirect and diffused IR will increase mobility
of IR devices.of IR devices.
 Transmission at only 56kbps.Transmission at only 56kbps.
41
BLUETOOTH FACTSBLUETOOTH FACTS
 Its not WLAN. Data throughput is much lessIts not WLAN. Data throughput is much less
in BT.in BT.
 BT can jam WLAN as both use 2.4GHz RF.BT can jam WLAN as both use 2.4GHz RF.
 Not designed to carry heavy traffic loads.Not designed to carry heavy traffic loads.
 Not suitable in server-based applications.Not suitable in server-based applications.
42
PIONEERS IN RESEARCHPIONEERS IN RESEARCH
 IBM- Watch pad and cyber phones.IBM- Watch pad and cyber phones.
 MS- Intelligent apps for Windows.MS- Intelligent apps for Windows.
 INTEL-wireless PC Cards, access points.INTEL-wireless PC Cards, access points.
 MOTOROLA & TOSHIBA-pc mobileMOTOROLA & TOSHIBA-pc mobile
interface via bluetooth.interface via bluetooth.
 GENERAL MOTORS- Better communicationGENERAL MOTORS- Better communication
in cars.in cars.
 NEC-launched BT enabled notebook.NEC-launched BT enabled notebook.
43
44
BLUETOOTH FUTUREBLUETOOTH FUTURE
 100 million devices in use and around 2005100 million devices in use and around 2005
650 million devices will be deployed.650 million devices will be deployed.
 19% vehicles will be bluetooth enabled by19% vehicles will be bluetooth enabled by
2007.2007.
45
SOME PRODUCTS INSOME PRODUCTS IN
MARKETMARKET
 Ericsson R520 Bluetooth/WAP/GPRS/TribandEricsson R520 Bluetooth/WAP/GPRS/Triband
 Ericsson T36 Bluetooth/WAP/HSCSD/TribandEricsson T36 Bluetooth/WAP/HSCSD/Triband
 Alcatel OneTouch 700 GPRS, WAP, BluetoothAlcatel OneTouch 700 GPRS, WAP, Bluetooth
 TDK Bluetooth Product RangeTDK Bluetooth Product Range
 Bluetooth-enabled Nokia 9110 linked to a FujiFilmBluetooth-enabled Nokia 9110 linked to a FujiFilm
digital cameradigital camera
 Ericsson Bluetooth GSM HeadsetEricsson Bluetooth GSM Headset
 Ericsson CommunicatorEricsson Communicator
46
REFRENCESREFRENCES
 www.countersys.com/tech/bluetooth.htmlwww.countersys.com/tech/bluetooth.html
 www.bluetooth.comwww.bluetooth.com
 www.cnet.comwww.cnet.com
 www.motorola.comwww.motorola.com
 www.palowireless.comwww.palowireless.com
 www.swedetrack.comwww.swedetrack.com
 www.mobileinfo.comwww.mobileinfo.com
 www.computer.orgwww.computer.org
 www.informit.comwww.informit.com
 www.erricsson.comwww.erricsson.com

More Related Content

What's hot

Assaulting diameter IPX network
Assaulting diameter IPX networkAssaulting diameter IPX network
Assaulting diameter IPX network
Alexandre De Oliveira
 
Implementing QoS Solutions for H.323 Video Conferencing over IP
Implementing QoS Solutions for H.323 Video Conferencing over IPImplementing QoS Solutions for H.323 Video Conferencing over IP
Implementing QoS Solutions for H.323 Video Conferencing over IP
Videoguy
 
Security Evaluation of Z-Wave_WP
Security Evaluation of Z-Wave_WPSecurity Evaluation of Z-Wave_WP
Security Evaluation of Z-Wave_WP
Behrang Fouladi
 

What's hot (19)

Assaulting diameter IPX network
Assaulting diameter IPX networkAssaulting diameter IPX network
Assaulting diameter IPX network
 
Worldwide attacks on SS7/SIGTRAN network
Worldwide attacks on SS7/SIGTRAN networkWorldwide attacks on SS7/SIGTRAN network
Worldwide attacks on SS7/SIGTRAN network
 
MGCP Overview
MGCP OverviewMGCP Overview
MGCP Overview
 
Exploiting Layer 2
Exploiting Layer 2Exploiting Layer 2
Exploiting Layer 2
 
44Con 2014: GreedyBTS - Hacking Adventures in GSM
44Con 2014: GreedyBTS - Hacking Adventures in GSM44Con 2014: GreedyBTS - Hacking Adventures in GSM
44Con 2014: GreedyBTS - Hacking Adventures in GSM
 
Philippe Langlois - Hacking HLR HSS and MME core network elements
Philippe Langlois - Hacking HLR HSS and MME core network elementsPhilippe Langlois - Hacking HLR HSS and MME core network elements
Philippe Langlois - Hacking HLR HSS and MME core network elements
 
Implementing QoS Solutions for H.323 Video Conferencing over IP
Implementing QoS Solutions for H.323 Video Conferencing over IPImplementing QoS Solutions for H.323 Video Conferencing over IP
Implementing QoS Solutions for H.323 Video Conferencing over IP
 
OpenBTS: Emergency GSM Messaging & Monitoring System for Civil Protection
OpenBTS: Emergency GSM Messaging & Monitoring System for Civil ProtectionOpenBTS: Emergency GSM Messaging & Monitoring System for Civil Protection
OpenBTS: Emergency GSM Messaging & Monitoring System for Civil Protection
 
Synacktiv mobile communications attacks
Synacktiv mobile communications attacksSynacktiv mobile communications attacks
Synacktiv mobile communications attacks
 
Projects 2009 ver3
Projects 2009 ver3Projects 2009 ver3
Projects 2009 ver3
 
ASIS CCCT Workshop: Wireless Security & Surveillance
ASIS CCCT Workshop: Wireless Security & SurveillanceASIS CCCT Workshop: Wireless Security & Surveillance
ASIS CCCT Workshop: Wireless Security & Surveillance
 
H.323 protocol
H.323 protocolH.323 protocol
H.323 protocol
 
Attacking SS7 - P1 Security (Hackito Ergo Sum 2010) - Philippe Langlois
Attacking SS7 - P1 Security (Hackito Ergo Sum 2010) - Philippe LangloisAttacking SS7 - P1 Security (Hackito Ergo Sum 2010) - Philippe Langlois
Attacking SS7 - P1 Security (Hackito Ergo Sum 2010) - Philippe Langlois
 
AntTail white paper: Technology scan IoT Datacommunications: LoRa, NB-IoT, GPRS
AntTail white paper: Technology scan IoT Datacommunications: LoRa, NB-IoT, GPRSAntTail white paper: Technology scan IoT Datacommunications: LoRa, NB-IoT, GPRS
AntTail white paper: Technology scan IoT Datacommunications: LoRa, NB-IoT, GPRS
 
OpenBTS - Building Real Mobile Networks, Big or Small
OpenBTS - Building Real Mobile Networks, Big or SmallOpenBTS - Building Real Mobile Networks, Big or Small
OpenBTS - Building Real Mobile Networks, Big or Small
 
One business avenue business protfolio
One business avenue   business protfolioOne business avenue   business protfolio
One business avenue business protfolio
 
Diameter Penetration Test Lab
Diameter Penetration Test LabDiameter Penetration Test Lab
Diameter Penetration Test Lab
 
Presentation of H323 protocol
Presentation of H323 protocolPresentation of H323 protocol
Presentation of H323 protocol
 
Security Evaluation of Z-Wave_WP
Security Evaluation of Z-Wave_WPSecurity Evaluation of Z-Wave_WP
Security Evaluation of Z-Wave_WP
 

Viewers also liked (13)

Bluetooth
BluetoothBluetooth
Bluetooth
 
Wi Fi
Wi FiWi Fi
Wi Fi
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
802.11 Protocol Map
802.11 Protocol Map802.11 Protocol Map
802.11 Protocol Map
 
Fhss
FhssFhss
Fhss
 
Physical layer overview
Physical layer overviewPhysical layer overview
Physical layer overview
 
Unit i-introduction
Unit i-introductionUnit i-introduction
Unit i-introduction
 
Frequency hopping rohit
Frequency hopping rohitFrequency hopping rohit
Frequency hopping rohit
 
FHSS
FHSSFHSS
FHSS
 
The Differences Between Bluetooth, ZigBee and WiFi
The Differences Between Bluetooth, ZigBee and WiFiThe Differences Between Bluetooth, ZigBee and WiFi
The Differences Between Bluetooth, ZigBee and WiFi
 
Wi-Fi vs Bluetooth
Wi-Fi vs BluetoothWi-Fi vs Bluetooth
Wi-Fi vs Bluetooth
 
Presentation on fhss
Presentation on fhssPresentation on fhss
Presentation on fhss
 
Frequency hopping spread spectrum
Frequency hopping spread spectrumFrequency hopping spread spectrum
Frequency hopping spread spectrum
 

Similar to Bluetooth

Wpmc2004 phy protection
Wpmc2004 phy protectionWpmc2004 phy protection
Wpmc2004 phy protection
Arpan Pal
 
5. Firetide Next Generation Wireless Infrastructure for City Surveillance.pdf
5. Firetide Next Generation Wireless Infrastructure for City Surveillance.pdf5. Firetide Next Generation Wireless Infrastructure for City Surveillance.pdf
5. Firetide Next Generation Wireless Infrastructure for City Surveillance.pdf
PawachMetharattanara
 
39587457 slide-gprs-06std
39587457 slide-gprs-06std39587457 slide-gprs-06std
39587457 slide-gprs-06std
Ánh Lê Thị
 
Habibullah cdmabased
Habibullah cdmabasedHabibullah cdmabased
Habibullah cdmabased
hinalala
 
Wireless intelligent networking
Wireless intelligent networkingWireless intelligent networking
Wireless intelligent networking
Manish Kumar
 

Similar to Bluetooth (20)

124647123-Bluetooth.ppt
124647123-Bluetooth.ppt124647123-Bluetooth.ppt
124647123-Bluetooth.ppt
 
Modern devices with spread spectrum application opportunities for wireless co...
Modern devices with spread spectrum application opportunities for wireless co...Modern devices with spread spectrum application opportunities for wireless co...
Modern devices with spread spectrum application opportunities for wireless co...
 
Wpmc2004 phy protection
Wpmc2004 phy protectionWpmc2004 phy protection
Wpmc2004 phy protection
 
IRJET- Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP ...
IRJET- Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP ...IRJET- Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP ...
IRJET- Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP ...
 
5. Firetide Next Generation Wireless Infrastructure for City Surveillance.pdf
5. Firetide Next Generation Wireless Infrastructure for City Surveillance.pdf5. Firetide Next Generation Wireless Infrastructure for City Surveillance.pdf
5. Firetide Next Generation Wireless Infrastructure for City Surveillance.pdf
 
G3602050055
G3602050055G3602050055
G3602050055
 
Wireless personal area networks(PAN)
Wireless personal area networks(PAN)Wireless personal area networks(PAN)
Wireless personal area networks(PAN)
 
39587457 slide-gprs-06std
39587457 slide-gprs-06std39587457 slide-gprs-06std
39587457 slide-gprs-06std
 
Zigbee 802-15-4
Zigbee 802-15-4Zigbee 802-15-4
Zigbee 802-15-4
 
IRJET - Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP...
IRJET - Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP...IRJET - Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP...
IRJET - Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP...
 
Habibullah cdmabased
Habibullah cdmabasedHabibullah cdmabased
Habibullah cdmabased
 
Wireless Personal Area Networks
Wireless Personal Area NetworksWireless Personal Area Networks
Wireless Personal Area Networks
 
Webinar: BlueNRG-LP - Bluetooth 5.2 de longo alcance para aplicações industriais
Webinar: BlueNRG-LP - Bluetooth 5.2 de longo alcance para aplicações industriaisWebinar: BlueNRG-LP - Bluetooth 5.2 de longo alcance para aplicações industriais
Webinar: BlueNRG-LP - Bluetooth 5.2 de longo alcance para aplicações industriais
 
Wireless intelligent networking
Wireless intelligent networkingWireless intelligent networking
Wireless intelligent networking
 
LINKSTAR TECHNOLOGIES LIMITED - COMPANY PROFILE AND CAPABILITY
LINKSTAR TECHNOLOGIES LIMITED - COMPANY PROFILE AND CAPABILITYLINKSTAR TECHNOLOGIES LIMITED - COMPANY PROFILE AND CAPABILITY
LINKSTAR TECHNOLOGIES LIMITED - COMPANY PROFILE AND CAPABILITY
 
Track 3 session 8 - st dev con 2016 - music and voice over ble
Track 3   session 8 - st dev con 2016 - music and voice over bleTrack 3   session 8 - st dev con 2016 - music and voice over ble
Track 3 session 8 - st dev con 2016 - music and voice over ble
 
Global System for Mobile Communication Based Smart Home Security System
Global System for Mobile Communication Based Smart Home Security SystemGlobal System for Mobile Communication Based Smart Home Security System
Global System for Mobile Communication Based Smart Home Security System
 
Training Report BHARAT ELECTRONICS LIMITED
Training Report BHARAT ELECTRONICS LIMITEDTraining Report BHARAT ELECTRONICS LIMITED
Training Report BHARAT ELECTRONICS LIMITED
 
Voice over IP (VOIP)
Voice over IP (VOIP)Voice over IP (VOIP)
Voice over IP (VOIP)
 
Mobile Services
Mobile ServicesMobile Services
Mobile Services
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 

Bluetooth

  • 1. 11 BLUETOOTHBLUETOOTH TECHNOLOGYTECHNOLOGY A revolution in wirelessA revolution in wireless communicationcommunication
  • 2. 2 ROAD MAPROAD MAP  IntroductionIntroduction  Basic DefinitionsBasic Definitions  TopologyTopology  ProtocolsProtocols  Link Management & SecurityLink Management & Security  Applications and FutureApplications and Future
  • 3. 3 IntroductionIntroduction  Aim :- To replace cables between mobiles, PCAim :- To replace cables between mobiles, PC cards, headsets, desktops and other devices.cards, headsets, desktops and other devices.  Developed by Special Interest Group (SIG)Developed by Special Interest Group (SIG)  Association of I.T majors like Intel, IBM,Association of I.T majors like Intel, IBM, Nokia and ToshibaNokia and Toshiba
  • 4. 4 Bluetooth Verses InfraredBluetooth Verses Infrared  Slower than IR as timeSlower than IR as time taken to discover thetaken to discover the intended recipientintended recipient  Penetration of solidPenetration of solid objectsobjects  Omni directionalOmni directional  Advantage of proximityAdvantage of proximity so less time requirementso less time requirement  No such featureNo such feature  Unidirectional with 30Unidirectional with 30 degrees rangedegrees range
  • 5. 5 BT Verses IRBT Verses IR  Data transfer rate 721Data transfer rate 721 KbpsKbps  30 feet range30 feet range  Mobility during dataMobility during data transfertransfer  Internet compatibleInternet compatible (emulating EIA TIA 232)(emulating EIA TIA 232)  Rate is 4 MbpsRate is 4 Mbps  Range very lessRange very less  Relatively stationaryRelatively stationary
  • 6. 6 Bluetooth DefinitionsBluetooth Definitions  Piconet : Collection ofPiconet : Collection of devices connected viadevices connected via Bluetooth in ad hocBluetooth in ad hoc fashion. Limited to 8fashion. Limited to 8 units in a Piconetunits in a Piconet  Scatternet : Two orScatternet : Two or more independentmore independent unsynchronized Piconet.unsynchronized Piconet.
  • 7. 7 DefinitionsDefinitions  Master : A device inMaster : A device in Piconet whose clockPiconet whose clock and hopping sequenceand hopping sequence are used toare used to synchronize all thesynchronize all the devices. It alsodevices. It also numbers thenumbers the communicationcommunication channelschannels
  • 8. 8 DefinitionsDefinitions  Slave : All other devicesSlave : All other devices in the Piconet exceptin the Piconet except mastermaster  MAC : 3-bit mediaMAC : 3-bit media access control addressaccess control address used to differentiateused to differentiate between participatingbetween participating unitsunits
  • 9. 9 Bluetooth technologyBluetooth technology  Implemented using short range transreceiversImplemented using short range transreceivers  Specifications comprises a system solutionSpecifications comprises a system solution consisting of a hardware, a software &consisting of a hardware, a software & interoperability requirementsinteroperability requirements  Uses globally available unlicensed ISM radioUses globally available unlicensed ISM radio band of 2.4 GHz.band of 2.4 GHz.  Frequency range 2.4 – 2.484 GHzFrequency range 2.4 – 2.484 GHz
  • 10. 10 BT technologyBT technology  Advantage of using an unlicensed frequencyAdvantage of using an unlicensed frequency band is that it is globally acceptableband is that it is globally acceptable
  • 11. 11 Types of LinksTypes of Links  Asynchronous Connection Links (ACL)Asynchronous Connection Links (ACL)  Supports symmetrical, asymmetrical, packet-Supports symmetrical, asymmetrical, packet- switched & point to multipoint linksswitched & point to multipoint links  Data Transfer Rate: 433.9 Kbps(sym.)Data Transfer Rate: 433.9 Kbps(sym.)  732.2 Kbps in one, 57.6 Kbps in732.2 Kbps in one, 57.6 Kbps in reverse(asymmetric)reverse(asymmetric)
  • 12. 12 Types of LinksTypes of Links  Synchronous Connection Oriented LinksSynchronous Connection Oriented Links (SCO)(SCO)  Provide symmetrical, circuit-switched & point toProvide symmetrical, circuit-switched & point to point connectionspoint connections
  • 13. 13 Audio and VideoAudio and Video  For voice coding 64 Kbps channels areFor voice coding 64 Kbps channels are requiredrequired  Channels are derived through use of PCM orChannels are derived through use of PCM or CVSDMCVSDM  Video encoding decoding using MPEG –4Video encoding decoding using MPEG –4 formatformat  Radio links use freq. hopping spread spectrumRadio links use freq. hopping spread spectrum techniquestechniques
  • 14. 14 Spread SpectrumSpread Spectrum  Method of wireless communication that takesMethod of wireless communication that takes a narrow band signal and spreads it over aa narrow band signal and spreads it over a broader portion of the available frequencybroader portion of the available frequency band.band.  CDMA applies the same conceptCDMA applies the same concept
  • 15. 15 Advantages of SpreadAdvantages of Spread Spectrum TechniqueSpectrum Technique  Prevents Interference : where transmissionPrevents Interference : where transmission disruption by external source such as noise fromdisruption by external source such as noise from electromagnetic devices.electromagnetic devices.  Prevents Jamming : where stronger signalPrevents Jamming : where stronger signal overwhelms the weaker one.overwhelms the weaker one.  No reflection off solids.No reflection off solids.  No interception : where unauthorized usersNo interception : where unauthorized users capture signal to determine the content.capture signal to determine the content.
  • 16. 16 Performance CharacteristicsPerformance Characteristics FeaturesFunctionsFeaturesFunctions PerformancePerformance 1.Connection Type1.Connection Type 2.Spectrum2.Spectrum 3.Transmission Power3.Transmission Power 4.Aggregate Data Rate4.Aggregate Data Rate 5.Range5.Range 6.Supported stations6.Supported stations Spread spectrumSpread spectrum 2.4GHz. ISM band2.4GHz. ISM band 1 milliwatt1 milliwatt 1 Mbps using frequency1 Mbps using frequency hoppinghopping Up to 30 feetUp to 30 feet Up to 8 devices perUp to 8 devices per piconetpiconet
  • 17. 17 FeaturesFunctionsFeaturesFunctions PerformancePerformance Voice ChannelsVoice Channels Up to 3Up to 3 Data SecurityData Security For authentication a 128For authentication a 128 bit key; for encryptionbit key; for encryption key size configurable (8-key size configurable (8- 128 bits)128 bits) AddressingAddressing Each bit has 48 bit MACEach bit has 48 bit MAC addressaddress
  • 18. 18 Bluetooth TopologyBluetooth Topology  Ad-hoc connection where each Piconet is identifiedAd-hoc connection where each Piconet is identified by a different hopping sequenceby a different hopping sequence  Synchronization in unlicensed ISM band notSynchronization in unlicensed ISM band not permitted but BT devices do it using TDMpermitted but BT devices do it using TDM  Service discovery protocol allows wider applicationsService discovery protocol allows wider applications ex: create LANex: create LAN  Clustering avoided using technical safeguards.Clustering avoided using technical safeguards.
  • 19. 19 Bluetooth ProtocolsBluetooth Protocols  Bluetooth Protocol LayersBluetooth Protocol Layers  Bluetooth Core Protocols (Baseband, LMP,Bluetooth Core Protocols (Baseband, LMP, L2CAP, SDP)L2CAP, SDP)  Cable Replacement Protocols (Radio Freq.Cable Replacement Protocols (Radio Freq. Communication)Communication)  Telephony Control Protocols (TCSBIN, AT-Telephony Control Protocols (TCSBIN, AT- Commands)Commands)  Adopted Protocols (PPP, TCP, OBEX, WAP,Adopted Protocols (PPP, TCP, OBEX, WAP, vCard, vCalender)vCard, vCalender)
  • 20. 20 LMP and SDPLMP and SDP  LMP : responsible for link setup & controlLMP : responsible for link setup & control between Bluetooth devices, including thebetween Bluetooth devices, including the control and negotiations of baseband packetcontrol and negotiations of baseband packet sizessizes  SDP : device information, services andSDP : device information, services and characteristics of services can be queried.characteristics of services can be queried.
  • 22. 22 Link ManagementLink Management  Peer to Peer communication using LMPPeer to Peer communication using LMP  Link ManagerLink Manager  Messages Exchanged (PDU’s)Messages Exchanged (PDU’s)  Within 30 secondsWithin 30 seconds  PDUPDU  55 different types of PDU’s55 different types of PDU’s  7 bit op code7 bit op code
  • 23. 23 AUTHENTICATIONAUTHENTICATION  General Response MessagesGeneral Response Messages  LMP_acceptedLMP_accepted  LMP_not_acceptedLMP_not_accepted  Challenge- Response SchemeChallenge- Response Scheme  Verifier sends(LMP_au_rand)Verifier sends(LMP_au_rand)  Response is a function of challenge ,Claimant ‘sResponse is a function of challenge ,Claimant ‘s (BD_ADDR)&Secret Key(BD_ADDR)&Secret Key  Common Secret key is required for proper calculationCommon Secret key is required for proper calculation
  • 24. 24 PAIRINGPAIRING  When no Common Link Key:When no Common Link Key:  128 bit Initialization Key based on PIN and128 bit Initialization Key based on PIN and random no.random no.  Calculation of Response on keyCalculation of Response on key  Verifier Approves the Link KeyVerifier Approves the Link Key  Response not correct then ErrorResponse not correct then Error  Code authentication failure (LMP_detach)Code authentication failure (LMP_detach)
  • 25. 25  Link Key is Created after authenticationLink Key is Created after authentication  Link Key Created may be eitherLink Key Created may be either combination of Keys or one of the unit’scombination of Keys or one of the unit’s unit key(LMP_unit _key &unit key(LMP_unit _key & LMP_comb_key)LMP_comb_key)  Waiting Interval:Waiting Interval:  Increased exponentiallyIncreased exponentially
  • 26. 26 ENCRYPTIONENCRYPTION  Is an Option.Is an Option.  Master’s Will in piconetMaster’s Will in piconet  Master & Slave must AgreeMaster & Slave must Agree  Point to Point or also broadcast packet’sPoint to Point or also broadcast packet’s
  • 27. 27 ENCRYPTIONENCRYPTION StartStart StopStop  Master is configured toMaster is configured to Transmit unencryptedTransmit unencrypted packets and receivepackets and receive encrypted .encrypted .  Slave is configured ToSlave is configured To Transmit and ReceiveTransmit and Receive encrypted packetsencrypted packets  Master is configured toMaster is configured to Transmit and ReceiveTransmit and Receive encrypted packetsencrypted packets  Master is configured toMaster is configured to Transmit encrypted andTransmit encrypted and receive unencrypted .receive unencrypted .  Slave is configured ToSlave is configured To Transmit and ReceiveTransmit and Receive unencrypted .unencrypted .  Master is configured toMaster is configured to Transmit and ReceiveTransmit and Receive unencrypted .unencrypted .
  • 28. 28 Clock Offset RequestClock Offset Request  Every Device has an Internal System ClockEvery Device has an Internal System Clock  Timing and frequncy determined by the master inTiming and frequncy determined by the master in Piconet.Piconet.  Difference between slave’s and master’s.Difference between slave’s and master’s.  Clock offset is updated on each time a packetClock offset is updated on each time a packet is received.is received.
  • 29. 29 BLUETOOTH SECURITYBLUETOOTH SECURITY  Built in SecurityBuilt in Security  Frequency HoppingFrequency Hopping  Pseudorandom code sequencePseudorandom code sequence  Lasts 0.4 secondsLasts 0.4 seconds  75 channels in 2.4GHZ75 channels in 2.4GHZ  Authentication preventing spoofing unwanted accessAuthentication preventing spoofing unwanted access  Encryption makes data unintelligible.Encryption makes data unintelligible.  Inhibiting user-friendly hence 3 levels of security.Inhibiting user-friendly hence 3 levels of security.
  • 30. 30 Security ModesSecurity Modes  Mode 1:Mode 1:  Absence of security (Bypassing Link –Level securityAbsence of security (Bypassing Link –Level security functions)functions)  Exchange of vCard and vCalendersExchange of vCard and vCalenders  Mode 2:Mode 2:  Service Level Security for parallel applicationsService Level Security for parallel applications  Mode 3:Mode 3:  Link Level SecurityLink Level Security  LM enforces security at connection set up.LM enforces security at connection set up.  Link KeysLink Keys
  • 31. 31  Key Length(8 and 128 bits)Key Length(8 and 128 bits)  128 bit challenge and 32 bit response .128 bit challenge and 32 bit response .  Depends on Level of SecurityDepends on Level of Security  Maximum length limited by HardwareMaximum length limited by Hardware
  • 32. 32 LAYOUTLAYOUT  FIELDS OF APPLICATION.FIELDS OF APPLICATION.  BLUETOOTH ADVANTAGEBLUETOOTH ADVANTAGE  SHORTCOMINGS OF THESHORTCOMINGS OF THE TECHNOLOGY.TECHNOLOGY.  COMPARISON WITH IR & WLAN.COMPARISON WITH IR & WLAN.  MISNOMERS.MISNOMERS.  RESEARCHES ON THE TECHNOLOGY.RESEARCHES ON THE TECHNOLOGY.  FUTURE ASPECTS.FUTURE ASPECTS.
  • 33. 33 APPLICATIONSAPPLICATIONS  WAP enabled smart phones.WAP enabled smart phones.  Electronic trading via handheld devices.Electronic trading via handheld devices.  ad hoc Home/personal area network.ad hoc Home/personal area network.  3G Telephony.3G Telephony.
  • 34. 34 BLUETOOTH ADVANTAGEBLUETOOTH ADVANTAGE  Increased mobility in office by connectingIncreased mobility in office by connecting various peripherals with BT.various peripherals with BT.  VVoice and data transmission possibleoice and data transmission possible  721 kbps suffices most of the common uses.721 kbps suffices most of the common uses.  Built in sufficient encryption andBuilt in sufficient encryption and authentication.authentication.  Cheaper insatllation & maintainence.Cheaper insatllation & maintainence.
  • 35. 35 ERROR CORRECTIONERROR CORRECTION  1/3 rate FEC (Forward Error Correction)1/3 rate FEC (Forward Error Correction)  2/3 rate FEC2/3 rate FEC  ARQ unnumbered scheme (Automatic RepeatARQ unnumbered scheme (Automatic Repeat Request).Request).  This reduces the available bandwidth.This reduces the available bandwidth.
  • 36. 36 RADIATION THREATSRADIATION THREATS  Penetration depth of RF is about 1.5 cm atPenetration depth of RF is about 1.5 cm at 2450 MHz and about 2.5 cm at 900 MHz2450 MHz and about 2.5 cm at 900 MHz  It cannot generate enough heat to produce fireIt cannot generate enough heat to produce fire hazards.hazards.  Radiation not beamed but dispersed in allRadiation not beamed but dispersed in all direction.direction.  But in long run EM radiation can cause illBut in long run EM radiation can cause ill effects in some persons.effects in some persons.
  • 37. 37 LOOPHOLES IN SECURITYLOOPHOLES IN SECURITY  Key initialization is not reliable.Key initialization is not reliable.  Unit key can leak the information in traffic.Unit key can leak the information in traffic.  BT device address can be used to generate logsBT device address can be used to generate logs of transaction.of transaction.  Battery draining denial of service scheme.Battery draining denial of service scheme.
  • 38. 38 BLUETOOTH v/s INFRAREDBLUETOOTH v/s INFRARED BT IrDABT IrDA Range-10 to 100 mRange-10 to 100 m 20 cm to 2 m20 cm to 2 m Omnidirectional comm.Omnidirectional comm. Bidirectional comm.Bidirectional comm. Peak data rate- 1mbpsPeak data rate- 1mbps 16 mbps16 mbps Can support 8 devices inCan support 8 devices in piconetpiconet 2 devices can interact2 devices can interact at timeat time
  • 39. 39 BLUETOOTH vs WLANBLUETOOTH vs WLAN WLAN BTWLAN BT VendorsVendors Proxim, 3COM,Proxim, 3COM, Symbol, CiscoSymbol, Cisco Most chipMost chip vendorsvendors SPEEDSPEED 11-54 Mbps11-54 Mbps 1-2 Mbps1-2 Mbps No. of access ptsNo. of access pts requiredrequired Every 200 feetEvery 200 feet Every 30 feetEvery 30 feet DistanceDistance coveragecoverage Upto 300 feetUpto 300 feet Upto 30 feetUpto 30 feet interferenceinterference 2.4 GHz band is2.4 GHz band is significant heresignificant here pollutedpolluted interferenceinterference CostCost expensiveexpensive CheaperCheaper (Rs1200-300)(Rs1200-300)
  • 40. 40 IrDa ResponseIrDa Response  Infra com launches RED BEAMERInfra com launches RED BEAMER technology.technology.  Indirect and diffused IR will increase mobilityIndirect and diffused IR will increase mobility of IR devices.of IR devices.  Transmission at only 56kbps.Transmission at only 56kbps.
  • 41. 41 BLUETOOTH FACTSBLUETOOTH FACTS  Its not WLAN. Data throughput is much lessIts not WLAN. Data throughput is much less in BT.in BT.  BT can jam WLAN as both use 2.4GHz RF.BT can jam WLAN as both use 2.4GHz RF.  Not designed to carry heavy traffic loads.Not designed to carry heavy traffic loads.  Not suitable in server-based applications.Not suitable in server-based applications.
  • 42. 42 PIONEERS IN RESEARCHPIONEERS IN RESEARCH  IBM- Watch pad and cyber phones.IBM- Watch pad and cyber phones.  MS- Intelligent apps for Windows.MS- Intelligent apps for Windows.  INTEL-wireless PC Cards, access points.INTEL-wireless PC Cards, access points.  MOTOROLA & TOSHIBA-pc mobileMOTOROLA & TOSHIBA-pc mobile interface via bluetooth.interface via bluetooth.  GENERAL MOTORS- Better communicationGENERAL MOTORS- Better communication in cars.in cars.  NEC-launched BT enabled notebook.NEC-launched BT enabled notebook.
  • 43. 43
  • 44. 44 BLUETOOTH FUTUREBLUETOOTH FUTURE  100 million devices in use and around 2005100 million devices in use and around 2005 650 million devices will be deployed.650 million devices will be deployed.  19% vehicles will be bluetooth enabled by19% vehicles will be bluetooth enabled by 2007.2007.
  • 45. 45 SOME PRODUCTS INSOME PRODUCTS IN MARKETMARKET  Ericsson R520 Bluetooth/WAP/GPRS/TribandEricsson R520 Bluetooth/WAP/GPRS/Triband  Ericsson T36 Bluetooth/WAP/HSCSD/TribandEricsson T36 Bluetooth/WAP/HSCSD/Triband  Alcatel OneTouch 700 GPRS, WAP, BluetoothAlcatel OneTouch 700 GPRS, WAP, Bluetooth  TDK Bluetooth Product RangeTDK Bluetooth Product Range  Bluetooth-enabled Nokia 9110 linked to a FujiFilmBluetooth-enabled Nokia 9110 linked to a FujiFilm digital cameradigital camera  Ericsson Bluetooth GSM HeadsetEricsson Bluetooth GSM Headset  Ericsson CommunicatorEricsson Communicator
  • 46. 46 REFRENCESREFRENCES  www.countersys.com/tech/bluetooth.htmlwww.countersys.com/tech/bluetooth.html  www.bluetooth.comwww.bluetooth.com  www.cnet.comwww.cnet.com  www.motorola.comwww.motorola.com  www.palowireless.comwww.palowireless.com  www.swedetrack.comwww.swedetrack.com  www.mobileinfo.comwww.mobileinfo.com  www.computer.orgwww.computer.org  www.informit.comwww.informit.com  www.erricsson.comwww.erricsson.com