2. 2
ROAD MAPROAD MAP
IntroductionIntroduction
Basic DefinitionsBasic Definitions
TopologyTopology
ProtocolsProtocols
Link Management & SecurityLink Management & Security
Applications and FutureApplications and Future
3. 3
IntroductionIntroduction
Aim :- To replace cables between mobiles, PCAim :- To replace cables between mobiles, PC
cards, headsets, desktops and other devices.cards, headsets, desktops and other devices.
Developed by Special Interest Group (SIG)Developed by Special Interest Group (SIG)
Association of I.T majors like Intel, IBM,Association of I.T majors like Intel, IBM,
Nokia and ToshibaNokia and Toshiba
4. 4
Bluetooth Verses InfraredBluetooth Verses Infrared
Slower than IR as timeSlower than IR as time
taken to discover thetaken to discover the
intended recipientintended recipient
Penetration of solidPenetration of solid
objectsobjects
Omni directionalOmni directional
Advantage of proximityAdvantage of proximity
so less time requirementso less time requirement
No such featureNo such feature
Unidirectional with 30Unidirectional with 30
degrees rangedegrees range
5. 5
BT Verses IRBT Verses IR
Data transfer rate 721Data transfer rate 721
KbpsKbps
30 feet range30 feet range
Mobility during dataMobility during data
transfertransfer
Internet compatibleInternet compatible
(emulating EIA TIA 232)(emulating EIA TIA 232)
Rate is 4 MbpsRate is 4 Mbps
Range very lessRange very less
Relatively stationaryRelatively stationary
6. 6
Bluetooth DefinitionsBluetooth Definitions
Piconet : Collection ofPiconet : Collection of
devices connected viadevices connected via
Bluetooth in ad hocBluetooth in ad hoc
fashion. Limited to 8fashion. Limited to 8
units in a Piconetunits in a Piconet
Scatternet : Two orScatternet : Two or
more independentmore independent
unsynchronized Piconet.unsynchronized Piconet.
7. 7
DefinitionsDefinitions
Master : A device inMaster : A device in
Piconet whose clockPiconet whose clock
and hopping sequenceand hopping sequence
are used toare used to
synchronize all thesynchronize all the
devices. It alsodevices. It also
numbers thenumbers the
communicationcommunication
channelschannels
8. 8
DefinitionsDefinitions
Slave : All other devicesSlave : All other devices
in the Piconet exceptin the Piconet except
mastermaster
MAC : 3-bit mediaMAC : 3-bit media
access control addressaccess control address
used to differentiateused to differentiate
between participatingbetween participating
unitsunits
9. 9
Bluetooth technologyBluetooth technology
Implemented using short range transreceiversImplemented using short range transreceivers
Specifications comprises a system solutionSpecifications comprises a system solution
consisting of a hardware, a software &consisting of a hardware, a software &
interoperability requirementsinteroperability requirements
Uses globally available unlicensed ISM radioUses globally available unlicensed ISM radio
band of 2.4 GHz.band of 2.4 GHz.
Frequency range 2.4 – 2.484 GHzFrequency range 2.4 – 2.484 GHz
10. 10
BT technologyBT technology
Advantage of using an unlicensed frequencyAdvantage of using an unlicensed frequency
band is that it is globally acceptableband is that it is globally acceptable
11. 11
Types of LinksTypes of Links
Asynchronous Connection Links (ACL)Asynchronous Connection Links (ACL)
Supports symmetrical, asymmetrical, packet-Supports symmetrical, asymmetrical, packet-
switched & point to multipoint linksswitched & point to multipoint links
Data Transfer Rate: 433.9 Kbps(sym.)Data Transfer Rate: 433.9 Kbps(sym.)
732.2 Kbps in one, 57.6 Kbps in732.2 Kbps in one, 57.6 Kbps in
reverse(asymmetric)reverse(asymmetric)
12. 12
Types of LinksTypes of Links
Synchronous Connection Oriented LinksSynchronous Connection Oriented Links
(SCO)(SCO)
Provide symmetrical, circuit-switched & point toProvide symmetrical, circuit-switched & point to
point connectionspoint connections
13. 13
Audio and VideoAudio and Video
For voice coding 64 Kbps channels areFor voice coding 64 Kbps channels are
requiredrequired
Channels are derived through use of PCM orChannels are derived through use of PCM or
CVSDMCVSDM
Video encoding decoding using MPEG –4Video encoding decoding using MPEG –4
formatformat
Radio links use freq. hopping spread spectrumRadio links use freq. hopping spread spectrum
techniquestechniques
14. 14
Spread SpectrumSpread Spectrum
Method of wireless communication that takesMethod of wireless communication that takes
a narrow band signal and spreads it over aa narrow band signal and spreads it over a
broader portion of the available frequencybroader portion of the available frequency
band.band.
CDMA applies the same conceptCDMA applies the same concept
15. 15
Advantages of SpreadAdvantages of Spread
Spectrum TechniqueSpectrum Technique
Prevents Interference : where transmissionPrevents Interference : where transmission
disruption by external source such as noise fromdisruption by external source such as noise from
electromagnetic devices.electromagnetic devices.
Prevents Jamming : where stronger signalPrevents Jamming : where stronger signal
overwhelms the weaker one.overwhelms the weaker one.
No reflection off solids.No reflection off solids.
No interception : where unauthorized usersNo interception : where unauthorized users
capture signal to determine the content.capture signal to determine the content.
16. 16
Performance CharacteristicsPerformance Characteristics
FeaturesFunctionsFeaturesFunctions PerformancePerformance
1.Connection Type1.Connection Type
2.Spectrum2.Spectrum
3.Transmission Power3.Transmission Power
4.Aggregate Data Rate4.Aggregate Data Rate
5.Range5.Range
6.Supported stations6.Supported stations
Spread spectrumSpread spectrum
2.4GHz. ISM band2.4GHz. ISM band
1 milliwatt1 milliwatt
1 Mbps using frequency1 Mbps using frequency
hoppinghopping
Up to 30 feetUp to 30 feet
Up to 8 devices perUp to 8 devices per
piconetpiconet
17. 17
FeaturesFunctionsFeaturesFunctions PerformancePerformance
Voice ChannelsVoice Channels Up to 3Up to 3
Data SecurityData Security For authentication a 128For authentication a 128
bit key; for encryptionbit key; for encryption
key size configurable (8-key size configurable (8-
128 bits)128 bits)
AddressingAddressing Each bit has 48 bit MACEach bit has 48 bit MAC
addressaddress
18. 18
Bluetooth TopologyBluetooth Topology
Ad-hoc connection where each Piconet is identifiedAd-hoc connection where each Piconet is identified
by a different hopping sequenceby a different hopping sequence
Synchronization in unlicensed ISM band notSynchronization in unlicensed ISM band not
permitted but BT devices do it using TDMpermitted but BT devices do it using TDM
Service discovery protocol allows wider applicationsService discovery protocol allows wider applications
ex: create LANex: create LAN
Clustering avoided using technical safeguards.Clustering avoided using technical safeguards.
20. 20
LMP and SDPLMP and SDP
LMP : responsible for link setup & controlLMP : responsible for link setup & control
between Bluetooth devices, including thebetween Bluetooth devices, including the
control and negotiations of baseband packetcontrol and negotiations of baseband packet
sizessizes
SDP : device information, services andSDP : device information, services and
characteristics of services can be queried.characteristics of services can be queried.
22. 22
Link ManagementLink Management
Peer to Peer communication using LMPPeer to Peer communication using LMP
Link ManagerLink Manager
Messages Exchanged (PDU’s)Messages Exchanged (PDU’s)
Within 30 secondsWithin 30 seconds
PDUPDU
55 different types of PDU’s55 different types of PDU’s
7 bit op code7 bit op code
23. 23
AUTHENTICATIONAUTHENTICATION
General Response MessagesGeneral Response Messages
LMP_acceptedLMP_accepted
LMP_not_acceptedLMP_not_accepted
Challenge- Response SchemeChallenge- Response Scheme
Verifier sends(LMP_au_rand)Verifier sends(LMP_au_rand)
Response is a function of challenge ,Claimant ‘sResponse is a function of challenge ,Claimant ‘s
(BD_ADDR)&Secret Key(BD_ADDR)&Secret Key
Common Secret key is required for proper calculationCommon Secret key is required for proper calculation
24. 24
PAIRINGPAIRING
When no Common Link Key:When no Common Link Key:
128 bit Initialization Key based on PIN and128 bit Initialization Key based on PIN and
random no.random no.
Calculation of Response on keyCalculation of Response on key
Verifier Approves the Link KeyVerifier Approves the Link Key
Response not correct then ErrorResponse not correct then Error
Code authentication failure (LMP_detach)Code authentication failure (LMP_detach)
25. 25
Link Key is Created after authenticationLink Key is Created after authentication
Link Key Created may be eitherLink Key Created may be either
combination of Keys or one of the unit’scombination of Keys or one of the unit’s
unit key(LMP_unit _key &unit key(LMP_unit _key &
LMP_comb_key)LMP_comb_key)
Waiting Interval:Waiting Interval:
Increased exponentiallyIncreased exponentially
26. 26
ENCRYPTIONENCRYPTION
Is an Option.Is an Option.
Master’s Will in piconetMaster’s Will in piconet
Master & Slave must AgreeMaster & Slave must Agree
Point to Point or also broadcast packet’sPoint to Point or also broadcast packet’s
27. 27
ENCRYPTIONENCRYPTION
StartStart StopStop
Master is configured toMaster is configured to
Transmit unencryptedTransmit unencrypted
packets and receivepackets and receive
encrypted .encrypted .
Slave is configured ToSlave is configured To
Transmit and ReceiveTransmit and Receive
encrypted packetsencrypted packets
Master is configured toMaster is configured to
Transmit and ReceiveTransmit and Receive
encrypted packetsencrypted packets
Master is configured toMaster is configured to
Transmit encrypted andTransmit encrypted and
receive unencrypted .receive unencrypted .
Slave is configured ToSlave is configured To
Transmit and ReceiveTransmit and Receive
unencrypted .unencrypted .
Master is configured toMaster is configured to
Transmit and ReceiveTransmit and Receive
unencrypted .unencrypted .
28. 28
Clock Offset RequestClock Offset Request
Every Device has an Internal System ClockEvery Device has an Internal System Clock
Timing and frequncy determined by the master inTiming and frequncy determined by the master in
Piconet.Piconet.
Difference between slave’s and master’s.Difference between slave’s and master’s.
Clock offset is updated on each time a packetClock offset is updated on each time a packet
is received.is received.
29. 29
BLUETOOTH SECURITYBLUETOOTH SECURITY
Built in SecurityBuilt in Security
Frequency HoppingFrequency Hopping
Pseudorandom code sequencePseudorandom code sequence
Lasts 0.4 secondsLasts 0.4 seconds
75 channels in 2.4GHZ75 channels in 2.4GHZ
Authentication preventing spoofing unwanted accessAuthentication preventing spoofing unwanted access
Encryption makes data unintelligible.Encryption makes data unintelligible.
Inhibiting user-friendly hence 3 levels of security.Inhibiting user-friendly hence 3 levels of security.
30. 30
Security ModesSecurity Modes
Mode 1:Mode 1:
Absence of security (Bypassing Link –Level securityAbsence of security (Bypassing Link –Level security
functions)functions)
Exchange of vCard and vCalendersExchange of vCard and vCalenders
Mode 2:Mode 2:
Service Level Security for parallel applicationsService Level Security for parallel applications
Mode 3:Mode 3:
Link Level SecurityLink Level Security
LM enforces security at connection set up.LM enforces security at connection set up.
Link KeysLink Keys
31. 31
Key Length(8 and 128 bits)Key Length(8 and 128 bits)
128 bit challenge and 32 bit response .128 bit challenge and 32 bit response .
Depends on Level of SecurityDepends on Level of Security
Maximum length limited by HardwareMaximum length limited by Hardware
32. 32
LAYOUTLAYOUT
FIELDS OF APPLICATION.FIELDS OF APPLICATION.
BLUETOOTH ADVANTAGEBLUETOOTH ADVANTAGE
SHORTCOMINGS OF THESHORTCOMINGS OF THE
TECHNOLOGY.TECHNOLOGY.
COMPARISON WITH IR & WLAN.COMPARISON WITH IR & WLAN.
MISNOMERS.MISNOMERS.
RESEARCHES ON THE TECHNOLOGY.RESEARCHES ON THE TECHNOLOGY.
FUTURE ASPECTS.FUTURE ASPECTS.
33. 33
APPLICATIONSAPPLICATIONS
WAP enabled smart phones.WAP enabled smart phones.
Electronic trading via handheld devices.Electronic trading via handheld devices.
ad hoc Home/personal area network.ad hoc Home/personal area network.
3G Telephony.3G Telephony.
34. 34
BLUETOOTH ADVANTAGEBLUETOOTH ADVANTAGE
Increased mobility in office by connectingIncreased mobility in office by connecting
various peripherals with BT.various peripherals with BT.
VVoice and data transmission possibleoice and data transmission possible
721 kbps suffices most of the common uses.721 kbps suffices most of the common uses.
Built in sufficient encryption andBuilt in sufficient encryption and
authentication.authentication.
Cheaper insatllation & maintainence.Cheaper insatllation & maintainence.
35. 35
ERROR CORRECTIONERROR CORRECTION
1/3 rate FEC (Forward Error Correction)1/3 rate FEC (Forward Error Correction)
2/3 rate FEC2/3 rate FEC
ARQ unnumbered scheme (Automatic RepeatARQ unnumbered scheme (Automatic Repeat
Request).Request).
This reduces the available bandwidth.This reduces the available bandwidth.
36. 36
RADIATION THREATSRADIATION THREATS
Penetration depth of RF is about 1.5 cm atPenetration depth of RF is about 1.5 cm at
2450 MHz and about 2.5 cm at 900 MHz2450 MHz and about 2.5 cm at 900 MHz
It cannot generate enough heat to produce fireIt cannot generate enough heat to produce fire
hazards.hazards.
Radiation not beamed but dispersed in allRadiation not beamed but dispersed in all
direction.direction.
But in long run EM radiation can cause illBut in long run EM radiation can cause ill
effects in some persons.effects in some persons.
37. 37
LOOPHOLES IN SECURITYLOOPHOLES IN SECURITY
Key initialization is not reliable.Key initialization is not reliable.
Unit key can leak the information in traffic.Unit key can leak the information in traffic.
BT device address can be used to generate logsBT device address can be used to generate logs
of transaction.of transaction.
Battery draining denial of service scheme.Battery draining denial of service scheme.
38. 38
BLUETOOTH v/s INFRAREDBLUETOOTH v/s INFRARED
BT IrDABT IrDA
Range-10 to 100 mRange-10 to 100 m 20 cm to 2 m20 cm to 2 m
Omnidirectional comm.Omnidirectional comm. Bidirectional comm.Bidirectional comm.
Peak data rate- 1mbpsPeak data rate- 1mbps 16 mbps16 mbps
Can support 8 devices inCan support 8 devices in
piconetpiconet
2 devices can interact2 devices can interact
at timeat time
39. 39
BLUETOOTH vs WLANBLUETOOTH vs WLAN
WLAN BTWLAN BT
VendorsVendors Proxim, 3COM,Proxim, 3COM,
Symbol, CiscoSymbol, Cisco
Most chipMost chip
vendorsvendors
SPEEDSPEED 11-54 Mbps11-54 Mbps 1-2 Mbps1-2 Mbps
No. of access ptsNo. of access pts
requiredrequired
Every 200 feetEvery 200 feet Every 30 feetEvery 30 feet
DistanceDistance
coveragecoverage
Upto 300 feetUpto 300 feet Upto 30 feetUpto 30 feet
interferenceinterference 2.4 GHz band is2.4 GHz band is
significant heresignificant here
pollutedpolluted
interferenceinterference
CostCost expensiveexpensive CheaperCheaper
(Rs1200-300)(Rs1200-300)
40. 40
IrDa ResponseIrDa Response
Infra com launches RED BEAMERInfra com launches RED BEAMER
technology.technology.
Indirect and diffused IR will increase mobilityIndirect and diffused IR will increase mobility
of IR devices.of IR devices.
Transmission at only 56kbps.Transmission at only 56kbps.
41. 41
BLUETOOTH FACTSBLUETOOTH FACTS
Its not WLAN. Data throughput is much lessIts not WLAN. Data throughput is much less
in BT.in BT.
BT can jam WLAN as both use 2.4GHz RF.BT can jam WLAN as both use 2.4GHz RF.
Not designed to carry heavy traffic loads.Not designed to carry heavy traffic loads.
Not suitable in server-based applications.Not suitable in server-based applications.
42. 42
PIONEERS IN RESEARCHPIONEERS IN RESEARCH
IBM- Watch pad and cyber phones.IBM- Watch pad and cyber phones.
MS- Intelligent apps for Windows.MS- Intelligent apps for Windows.
INTEL-wireless PC Cards, access points.INTEL-wireless PC Cards, access points.
MOTOROLA & TOSHIBA-pc mobileMOTOROLA & TOSHIBA-pc mobile
interface via bluetooth.interface via bluetooth.
GENERAL MOTORS- Better communicationGENERAL MOTORS- Better communication
in cars.in cars.
NEC-launched BT enabled notebook.NEC-launched BT enabled notebook.
44. 44
BLUETOOTH FUTUREBLUETOOTH FUTURE
100 million devices in use and around 2005100 million devices in use and around 2005
650 million devices will be deployed.650 million devices will be deployed.
19% vehicles will be bluetooth enabled by19% vehicles will be bluetooth enabled by
2007.2007.
45. 45
SOME PRODUCTS INSOME PRODUCTS IN
MARKETMARKET
Ericsson R520 Bluetooth/WAP/GPRS/TribandEricsson R520 Bluetooth/WAP/GPRS/Triband
Ericsson T36 Bluetooth/WAP/HSCSD/TribandEricsson T36 Bluetooth/WAP/HSCSD/Triband
Alcatel OneTouch 700 GPRS, WAP, BluetoothAlcatel OneTouch 700 GPRS, WAP, Bluetooth
TDK Bluetooth Product RangeTDK Bluetooth Product Range
Bluetooth-enabled Nokia 9110 linked to a FujiFilmBluetooth-enabled Nokia 9110 linked to a FujiFilm
digital cameradigital camera
Ericsson Bluetooth GSM HeadsetEricsson Bluetooth GSM Headset
Ericsson CommunicatorEricsson Communicator