SlideShare a Scribd company logo
1 of 57
Wireless Networks
Bluetooth and Mobile IP
Wireless Networks
Bluetooth
 Consortium: Ericsson, Intel, IBM, Nokia, Toshiba…
 Scenarios:
o connection of peripheral devices
• loudspeaker, joystick, headset
o support of ad-hoc networking
• small devices, low-cost
o bridging of networks
• e.g., GSM via mobile phone - Bluetooth - laptop
 Simple, cheap, replacement of IrDA, low range, lower data rates,
low-power
o Worldwide operation: 2.4 GHz
o Resistance to jamming and selective frequency fading:
• FHSS over 79 channels (of 1MHz each), 1600hops/s
o Coexistence of multiple piconets: like CDMA
o Links: synchronous connections and asynchronous connectionless
o Interoperability: protocol stack supporting TCP/IP, OBEX, SDP
o Range: 10 meters, can be extended to 100 meters
 Documentation: over 1000 pages specification: www.bluetooth.com
Wireless Networks
Bluetooth Application Areas
 Data and voice access points
o Real-time voice and data transmissions
 Cable replacement
o Eliminates need for numerous cable attachments for
connection
 Low cost < $5
 Ad hoc networking
o Device with Bluetooth radio can establish connection with
another when in range
Wireless Networks
Protocol Architecture
 Bluetooth is a layered protocol architecture
o Core protocols
o Cable replacement and telephony control protocols
o Adopted protocols
 Core protocols
o Radio
o Baseband
o Link manager protocol (LMP)
o Logical link control and adaptation protocol (L2CAP)
o Service discovery protocol (SDP)
Wireless Networks
Protocol Architecture
 Cable replacement protocol
o RFCOMM
 Telephony control protocol
o Telephony control specification – binary (TCS BIN)
 Adopted protocols
o PPP
o TCP/UDP/IP
o OBEX
o WAE/WAP
Wireless Networks
Protocol Architecture
 BT Radio (2.4 GHZ Freq. Band):
 Modulation: Gaussian Frequency Shift Keying
 Baseband: FH-SS (79 carriers), CDMA (hopping
sequence from the node MAC address)
 Audio: interfaces directly with the baseband. Each
voice connection is over a 64Kbps SCO link. The
voice coding scheme is the Continuous Variable
Slope Delta (CVSD)
 Link Manager Protocol (LMP): link setup and
control, authentication and encryption
 Host Controller Interface: provides a uniform
method of access to the baseband, control
registers, etc through USB, PCI, or UART
 Logical Link Control and Adaptation Layer (L2CAP):
higher protocols multiplexing, packet
segmentation/reassembly, QoS
 Service Discover Protocol (SDP): protocol of
locating services provided by a Bluetooth device
 Telephony Control Specification (TCS): defines the
call control signaling for the establishment of
speech and data calls between Bluetooth devices
 RFCOMM: provides emulation of serial links
(RS232). Upto 60 connections
HCI
Bluetooth Radio
Baseband
Audio Link Manager (LMP)
L2CAP
RFCOMM TCS SDP
TCP/UDP
PPP
AT
Commands
OBEX
Application
OBEX: OBject EXchange (e.g., vCard)
Wireless Networks
Usage Models
File transfer
Internet bridge
LAN access
Synchronization
Three-in-one phone
Headset
Wireless Networks
Piconets and Scatternets
 Piconet
o Basic unit of Bluetooth networking
o Master and one to seven slave devices
o Master determines channel and phase
 Scatternet
o Device in one piconet may exist as master or slave in
another piconet
o Allows many devices to share same area
o Makes efficient use of bandwidth
Wireless Network Configurations
Wireless Networks
Network Topology
 Piconet = set of Bluetooth nodes synchronized to a master node
o The piconet hopping sequence is derived from the master MAC address
(BD_ADDR IEEE802 48 bits compatible address)
 Scatternet = set of piconet
 Master-Slaves can switch roles
 A node can only be master of one piconet. Why?
Piconet 1
Master
Master
Piconet 2
Scatternet
Slave
Wireless Networks
Scatternets
piconets
 Each piconet has one master and up to 7 slaves
 Master determines hopping sequence, slaves have to synchronize
 Participation in a piconet = synchronization to hopping sequence
 Communication between piconets = devices jumping back and forth
between the piconets
Wireless Networks
Radio Specification
 Classes of transmitters
o Class 1: Outputs 100 mW for maximum range
• Power control mandatory
• Provides greatest distance
o Class 2: Outputs 2.4 mW at maximum
• Power control optional
o Class 3: Nominal output is 1 mW
• Lowest power
 Frequency Hopping in Bluetooth
o Provides resistance to interference and multipath effects
o Provides a form of multiple access among co-located
devices in different piconets
Wireless Networks
Frequency Hopping
 Total bandwidth divided into 1MHz physical
channels
 FH occurs by jumping from one channel to
another in pseudorandom sequence
 Hopping sequence shared with all devices on
piconet
 Piconet access:
o Bluetooth devices use time division duplex (TDD)
o Access technique is TDMA
o FH-TDD-TDMA
Wireless Networks
Frequency Hopping
Wireless Networks
Physical Links
 Synchronous connection oriented (SCO)
o Allocates fixed bandwidth between point-to-point
connection of master and slave
o Master maintains link using reserved slots
o Master can support three simultaneous links
 Asynchronous connectionless (ACL)
o Point-to-multipoint link between master and all slaves
o Only single ACL link can exist
Wireless Networks
Bluetooth Packet Fields
Access code – used for timing
synchronization, offset compensation,
paging, and inquiry
Header – used to identify packet type and
carry protocol control information
Payload – contains user voice or data and
payload header, if present
Wireless Networks
Bluetooth Piconet MAC
Each node has a Bluetooth Device Address (BD_ADDR). The master
BD_ADDR determines the sequence of frequency hops
Types of connections:
Synchronous Connection-Oriented link (SCO) (symmetrical, circuit switched, point-to-point)
Asynchronous Connectionless Link (ACL): (packet switched, point-to-multipoint, master-
polls)
Packet Format:
o Access code: synchronization, when piconet active derived from master
o Packet header (for ACL): 1/3-FEC, MAC address (1 master, 7 slaves), link type,
alternating bit ARQ/SEQ, checksum
f(k) f(k+1) f(k+2) f(k+3) f(k+4) f(k+4) f(k+4) f(k+7)
Master
Slave 1
Slave 2
bits
access code packet header payload
72 54 0-2745 bits
MAC address type flow ARQN SEQN HEC
3 4 1 1 1 8
Wireless Networks
Types of Access Codes
Channel access code (CAC) – identifies a
piconet
Device access code (DAC) – used for
paging and subsequent responses
Inquiry access code (IAC) – used for
inquiry purposes
Preamble+sync+trailer
Wireless Networks
Packet Header Fields
 AM_ADDR – contains “active mode” address of
one of the slaves
 Type – identifies type of packet
o ACL: Data Medium (DM) or Data High (DH), with
different slot lengths (DM1, DM3, DM5, DH1, DH3, DH5)
o SCO: Data Voice (DV) and High-quality voice (HV)
 Flow – 1-bit flow control
 ARQN – 1-bit acknowledgment
 SEQN – 1-bit sequential numbering schemes
 Header error control (HEC) – 8-bit error detection
code
Wireless Networks
Payload Format
Payload header
o L_CH field – identifies logical channel
o Flow field – used to control flow at L2CAP level
o Length field – number of bytes of data
Payload body – contains user data
CRC – 16-bit CRC code
Wireless Networks
Error Correction Schemes
1/3 rate FEC (forward error correction)
o Used on 18-bit packet header, voice field in
HV1 packet
2/3 rate FEC
o Used in DM packets, data fields of DV packet,
FHS packet and HV2 packet
ARQ
o Used with DM and DH packets
Wireless Networks
ARQ Scheme Elements
 Error detection – destination detects errors,
discards packets
 Positive acknowledgment – destination returns
positive acknowledgment
 Retransmission after timeout – source retransmits
if packet unacknowledged
 Negative acknowledgment and retransmission –
destination returns negative acknowledgement for
packets with errors, source retransmits
Wireless Networks
Types of packets
 SCO packets: Do not have a CRC (except for the data part of DV)
and are never retransmitted. Intended for High-quality Voice
(HV).
 ACL packets: Data Medium-rate (DM) and Data High-rate (DH)
Type Payload
(bytes)
FEC CRC max-rate kbps
HV1 10 1/3 No 64
HV2 20 2/3 No 64
HV3 30 No No 64
DV 10+(1-10)D 2/3D Yes D 64+57.6D
Type Payload
(bytes)
FEC CRC Symm.
max-rate kbps
Asymm.
max-rate (DL/UL)
DM1 0-17 2/3 Yes 108.8 108.8/108.9
DM3 0-121 2/3 Yes 258.1 387.2/54.4
DM5 0-224 2/3 Yes 286.7 477.8/36.3
DH1 0-27 No Yes 172.8 172.8/172.8
DH3 0-183 No Yes 390.4 585.6/86.4
DH5 0-339 No Yes 433.9 723.2/185.6
Wireless Networks
Channel Control
 Major states
o Standby – default state
o Connection – device connected
 Interim substates for adding new slaves
o Page – device issued a page (used by master)
o Page scan – device is listening for a page
o Master response – master receives a page response from
slave
o Slave response – slave responds to a page from master
o Inquiry – device has issued an inquiry for identity of
devices within range
o Inquiry scan – device is listening for an inquiry
o Inquiry response – device receives an inquiry response
State Transition Diagram
Wireless Networks
Inquiry Procedure
 Potential master identifies devices in range that
wish to participate
o Transmits ID packet with inquiry access code (IAC)
o Occurs in Inquiry state
 Device receives inquiry
o Enter Inquiry Response state
o Returns FHS (Frequency Hop Synchrnonization) packet
with address and timing information
o Moves to page scan state
Wireless Networks
Inquiry Procedure Details
 Goal: aims at discovering other neighboring devices
 Inquiring node:
o Sends an inquiry message (packet with only the access code: General
Inquiry Access Code: GIAC or Dedicated IAC: DIAC). This message is sent
over a subset of all possible frequencies.
o The inquiry frequencies are divided into two hopping sets of 16 frequencies
each.
o In inquiry state the node will send upto NINQUIRY sequences on one set of 16
frequencies before switching to the other set of 16 frequencies. Upto 3
switches can be executed. Thus the inquiry may last upto 10.24 seconds.
 To be discovered node:
o Enters an inquiry_scan mode
o When hearing the inquiry_message (and after a backoff procedure) enter an
inquiry_response mode: send a Frequency Hop Sync (FHS) packet
(BD_ADDR, native clock)
 After discovering the neighbors and collecting information on their
address and clock, the inquiring node can start a page routine to setup
a piconet
Wireless Networks
Page Procedure
Master uses devices address to calculate a
page frequency-hopping sequence
Master pages with ID packet and device
access code (DAC) of specific slave
Slave responds with DAC ID packet
Master responds with its FHS packet
Slave confirms receipt with DAC ID
Slaves moves to Connection state
Wireless Networks
Page Procedure Details
 Goal: e.g., setup a piconet after an inquiry
 Paging node (master):
o Sends a page message (i.e., packet with only Device
Access Code of paged node) over 32 frequency hops
(from DAC and split into 2*16 freq.)
o Repeated until a response is received
o When a response is received send a FHS message to
allow the paged node to synchronize
 Paged node (slave):
o Listens on its hopping sequence
o When receiving a page message, send a page_response
and wait for the FHS of the pager
Wireless Networks
Slave Connection State Modes
Active – participates in piconet
o Listens, transmits and receives packets
Sniff – only listens on specified slots
Hold – does not support ACL packets
o Reduced power status
o May still participate in SCO exchanges
Park – does not participate on piconet
o Still retained as part of piconet
Wireless Networks
States of a Bluetooth Device
STANDBY
inquiry page
connectedtransmit
PARK HOLD SNIFF
unconnected
connecting
active
low power
BT device addressing:
• BD_ADDR (48 bits)
• AM_ADDR ( 3bits): ACTIVE, HOLD, or SNIFF
• PM_ADDR (8 bits): PARK Mode address (exchanged with the AM_ADDR when entering PARK mode)
• AR_ADDR (8 bits): not unique used to come back from PARK to ACTIVE state
ACTIVE (connected/transmit): the device is uniquely identified by a 3bits AM_ADDR and
is fully participating
SNIFF state: participates in the piconet only within the SNIFF interval
HOLD state: keeps only the SCO links
PARK state (low-power): releases AM_ADDR but stays synchronized with master
Wireless Networks
Bluetooth Audio
Voice encoding schemes:
o Pulse code modulation (PCM)
o Continuously variable slope delta (CVSD)
modulation
Choice of scheme made by link manager
o Negotiates most appropriate scheme for
application
Wireless Networks
Bluetooth Link Security
 Elements:
o Authentication – verify claimed identity
o Encryption – privacy
o Key management and usage
 Security algorithm parameters:
o Unit address
o Secret authentication key (128 bits key)
o Secret privacy key (4-128 bits secret key)
o Random number
Wireless Networks
Link Management
Manages master-slave radio link
Security Service: authentication,
encryption, and key distribution
Clock synchronization
Exchange station capability information
Mode management:
o switch master/slave role
o change hold, sniff, park modes
o QoS
Wireless Networks
L2CAP
 Provides a link-layer protocol between entities
with a number of services
 Relies on lower layer for flow and error control
 Makes use of ACL links, does not support SCO
links
 Provides two alternative services to upper-layer
protocols
o Connectionless service
o Connection-oriented service: A QoS flow specification is
assigned in each direction
 Exchange of signaling messages to establish and
configure connection parameters
Wireless Networks
Flow Specification Parameters
Service type
Token rate (bytes/second)
Token bucket size (bytes)
Peak bandwidth (bytes/second)
Latency (microseconds)
Delay variation (microseconds)
Wireless Networks
Mobile IP
Wireless Networks
Motivation for Mobile IP
 Routing
o based on IP destination address, network prefix (e.g.
129.13.42) determines physical subnet
o change of physical subnet implies change of IP address to have
a topological correct address (standard IP) or needs special
entries in the routing tables
 Specific routes to end-systems?
o change of all routing table entries to forward packets to the
right destination
o does not scale with the number of mobile hosts and frequent
changes in the location, security problems
 Changing the IP-address?
o adjust the host IP address depending on the current location
o almost impossible to find a mobile system, DNS updates take
too much time
o TCP connections break, security problems
Wireless Networks
Mobile IP Requirements
 Transparency
o mobile end-systems keep their IP address
o continuation of communication after interruption of link
possible
o point of connection to the fixed network can be changed
 Compatibility
o support of the same layer 2 protocols as IP
o no changes to current end-systems and routers required
o mobile end-systems can communicate with fixed systems
 Security
o authentication of all registration messages
 Efficiency and scalability
o only little additional messages to the mobile system required
(connection typically via a low bandwidth radio link)
o world-wide support of a large number of mobile systems in the
whole Internet
Wireless Networks
Terminology
 Mobile Node (MN)
o system (node) that can change the point of connection
to the network without changing its IP address
 Home Agent (HA)
o system in the home network of the MN, typically a router
o registers the location of the MN, tunnels IP datagrams to the COA
 Foreign Agent (FA)
o system in the current foreign network of the MN, typically a
router
o forwards the tunneled datagrams to the MN, typically also the
default router for the MN
 Care-of Address (COA)
o address of the current tunnel end-point for the MN (at FA or MN)
o actual location of the MN from an IP point of view
o can be chosen, e.g., via DHCP
 Correspondent Node (CN)
o communication partner
Wireless Networks
Example network
mobile end-system
Internet
router
router
router
end-system
FA
HA
MN
home network
foreign
network
(physical home network
for the MN)
(current physical network
for the MN)
CN
Wireless Networks
Data transfer to the mobile
Internet
sender
FA
HA
MN
home network
foreign
network
receiver
1
2
3
1. Sender sends to the IP address of MN,
HA intercepts packet (proxy ARP)
2. HA tunnels packet to COA, here FA,
by encapsulation
3. FA forwards the packet
to the MN
CN
Wireless Networks
Data transfer from the mobile
Internet
receiver
FA
HA
MN
home network
foreign
network
sender
1
1. Sender sends to the IP address
of the receiver as usual,
FA works as default router
CN
Wireless Networks
Overview
CN
router
HA
router
FA
Internet
router
1.
2.
3.
home
network
MN
foreign
network
4.
CN
router
HA
router
FA
Internet
router
home
network
MN
foreign
network
COA
Wireless Networks
Network integration
 Agent Advertisement
o HA and FA periodically send advertisement messages into
their physical subnets
o MN listens to these messages and detects, if it is in the home
or a foreign network (standard case for home network)
o MN reads a COA from the FA advertisement messages
 Registration (always limited lifetime!)
o MN signals COA to the HA via the FA, HA acknowledges via
FA to MN
o these actions have to be secured by authentication
 Advertisement
o HA advertises the IP address of the MN (as for fixed
systems), i.e. standard routing information
o routers adjust their entries, these are stable for a longer time
(HA responsible for a MN over a longer period of time)
o packets to the MN are sent to the HA,
o independent of changes in COA/FA
Wireless Networks
Agent advertisement
preference level 1
router address 1
#addresses
type
addr. size lifetime
checksum
COA 1
COA 2
type sequence numberlength
0 7 8 15 16 312423
code
preference level 2
router address 2
. . .
registration lifetime
. . .
R B H F M G V reserved
ICMP-Type = 0; Code = 0/16; Extension Type = 16
TTL = 1 Dest-Adr = 224.0.0.1 (multicast on link) or 255.255.255.255 (broadcast)
R: registration required
B: busy
H: home agent
F: foreign agent
M: minimal encapsulation
G: generic encapsulation
V: header compression
Wireless Networks
Registration
t
MN HAregistrationrequest
registration
reply
t
MN FA HAregistrationrequest
registrationrequest
registration
reply
registration
reply
Goal: inform the home agent of current location of MN (COA-FA or co-located COA)
Registration expires automatically (lifetime)
Uses UDP port 434
Wireless Networks
Mobile IP registration request
home agent
home address
type lifetime
0 7 8 15 16 312423
rsv
identification
COA
extensions . . .
S B DMGV
UDP packet on port 343
Type = 1 for registration request
S: retain prior mobility bindings
B: forward broadcast packets
D: co-located address=> MN decapsulates packets
Wireless Networks
Encapsulation
original IP header original data
new datanew IP header
outer header inner header original data
Wireless Networks
Encapsulation I
 Encapsulation of one packet into another as payload
o e.g. IPv6 in IPv4 (6Bone), Multicast in Unicast (Mbone)
o here: e.g. IP-in-IP-encapsulation, minimal encapsulation or
GRE (Generic Record Encapsulation)
 IP-in-IP-encapsulation (mandatory in RFC 2003)
o tunnel between HA and COA
Care-of address COA
IP address of HA
TTL
IP identification
IP-in-IP IP checksum
flags fragment offset
lengthTOSver. IHL
IP address of MN
IP address of CN
TTL
IP identification
lay. 4 prot. IP checksum
flags fragment offset
lengthTOSver. IHL
TCP/UDP/ ... payload
Wireless Networks
Encapsulation II
 Minimal encapsulation (optional) [RFC2004]
o avoids repetition of identical fields
o e.g. TTL, IHL, version, TOS
o only applicable for unfragmented packets, no space left
for fragment identification
care-of address COA
IP address of HA
TTL
IP identification
min. encap. IP checksum
flags fragment offset
lengthTOSver. IHL
IP address of MN
original sender IP address (if S=1)
Slay. 4 protoc. IP checksum
TCP/UDP/ ... payload
reserved
Wireless Networks
Optimization of packet forwarding
 Triangular Routing
o sender sends all packets via HA to MN
o higher latency and network load
 “Solutions”
o sender learns the current location of MN
o direct tunneling to this location
o HA informs a sender about the location of MN
o big security problems!
 Change of FA
o packets on-the-fly during the change can be lost
o new FA informs old FA to avoid packet loss, old FA now
forwards remaining packets to new FA
o this information also enables the old FA to release
resources for the MN
Wireless Networks
Change of foreign agent
CN HA FAold FAnew MN
t
request
update
ACK
data data
MN changes
location
registration
update
ACK
data
data data
warning
update
ACK
data
data
registration
Wireless Networks
Reverse tunneling (RFC 2344)
Internet
receiver
FA
HA
MN
home network
foreign
network
sender
3
2
1
1. MN sends to FA
2. FA tunnels packets to HA
by encapsulation
3. HA forwards the packet to the
receiver (standard case)
CN
Wireless Networks
Mobile IP with reverse tunneling
 Routers accept often only “topological correct“ addresses
(firewall)
o a packet from the MN encapsulated by the FA is now
topological correct
o furthermore multicast and TTL problems solved (TTL in the
home network correct, but MN is to far away from the receiver)
 Reverse tunneling does not solve
o problems with firewalls, the reverse tunnel can be abused to
circumvent security mechanisms (tunnel hijacking)
o optimization of data paths, i.e. packets will be forwarded
through the tunnel via the HA to a sender (double triangular
routing)
 The new standard is backwards compatible
o the extensions can be implemented easily and cooperate with
current implementations without these extensions
Wireless Networks
Mobile IP and IPv6
 security is integrated and not an add-on, authentication of
registration is included
 COA can be assigned via auto-configuration (DHCPv6 is one
candidate), every node has address autoconfiguration
 no need for a separate FA, all routers perform router
advertisement which can be used instead of the special
agent advertisement
 MN can signal a sender directly the COA, sending via HA not
needed in this case (automatic path optimization)
 “soft” hand-over, i.e. without packet loss, between two
subnets is supported
o MN sends the new COA to its old router
o the old router encapsulates all incoming packets for the MN and
forwards them to the new COA
o authentication is always granted
Wireless Networks
Problems with Mobile IP
 Security
o authentication with FA problematic, for the FA typically belongs
to another organization
o no protocol for key management and key distribution has been
standardized in the Internet
o patent and export restrictions
 Firewalls
o typically mobile IP cannot be used together with firewalls,
special set-ups are needed (such as reverse tunneling)
 QoS
o many new reservations in case of RSVP
o tunneling makes it hard to give a flow of packets a special
treatment needed for the QoS
 Security, firewalls, QoS etc. are topics of current research
and discussions!

More Related Content

What's hot

What's hot (20)

Introduction To Cellular And Wireless Networks
Introduction To Cellular And Wireless NetworksIntroduction To Cellular And Wireless Networks
Introduction To Cellular And Wireless Networks
 
Bluetooth Intro
Bluetooth IntroBluetooth Intro
Bluetooth Intro
 
Digital network lecturer3
Digital network  lecturer3Digital network  lecturer3
Digital network lecturer3
 
Digital network lecturer7
Digital network  lecturer7Digital network  lecturer7
Digital network lecturer7
 
WIRELESS NETWORKS EC6802 BABU unit 1 & 2 PPT
WIRELESS NETWORKS EC6802 BABU unit 1 & 2 PPTWIRELESS NETWORKS EC6802 BABU unit 1 & 2 PPT
WIRELESS NETWORKS EC6802 BABU unit 1 & 2 PPT
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Networks
NetworksNetworks
Networks
 
Lectures On Wireless Communication By Professor Dr Arshad Abbas Khan
Lectures On Wireless Communication By Professor Dr Arshad Abbas Khan Lectures On Wireless Communication By Professor Dr Arshad Abbas Khan
Lectures On Wireless Communication By Professor Dr Arshad Abbas Khan
 
Introduction to communication system lecture4
Introduction to communication system lecture4Introduction to communication system lecture4
Introduction to communication system lecture4
 
Digital network lecturer6
Digital network  lecturer6Digital network  lecturer6
Digital network lecturer6
 
Normas y Estándares
Normas y EstándaresNormas y Estándares
Normas y Estándares
 
Sdh basics hand_outs_of_sdh_basics
Sdh basics hand_outs_of_sdh_basicsSdh basics hand_outs_of_sdh_basics
Sdh basics hand_outs_of_sdh_basics
 
Presentation
PresentationPresentation
Presentation
 
Wsh96 Wilkinson
Wsh96 WilkinsonWsh96 Wilkinson
Wsh96 Wilkinson
 
Switching systems lecture8 mpls
Switching  systems lecture8 mplsSwitching  systems lecture8 mpls
Switching systems lecture8 mpls
 
Hiperlan
HiperlanHiperlan
Hiperlan
 
Lecture 14
Lecture 14Lecture 14
Lecture 14
 
Digital network lecturer4
Digital network  lecturer4Digital network  lecturer4
Digital network lecturer4
 
Mobile Networking and Ad hoc routing protocols validation
Mobile Networking and Ad hoc routing protocols validationMobile Networking and Ad hoc routing protocols validation
Mobile Networking and Ad hoc routing protocols validation
 
Bluetooth profile
Bluetooth profileBluetooth profile
Bluetooth profile
 

Viewers also liked

Viewers also liked (18)

Bluetooth Technology Todays Advanced Wireless Communication System
Bluetooth Technology Todays Advanced Wireless Communication SystemBluetooth Technology Todays Advanced Wireless Communication System
Bluetooth Technology Todays Advanced Wireless Communication System
 
Ferrier slideshare
Ferrier slideshareFerrier slideshare
Ferrier slideshare
 
Social Networking
Social NetworkingSocial Networking
Social Networking
 
ii mca juno
ii mca junoii mca juno
ii mca juno
 
Rss
RssRss
Rss
 
Gram negative rods
Gram negative rodsGram negative rods
Gram negative rods
 
Indian Armed Forces
Indian Armed ForcesIndian Armed Forces
Indian Armed Forces
 
Educating consumers through social media
Educating consumers through social mediaEducating consumers through social media
Educating consumers through social media
 
Philoedreport.teacherkath
Philoedreport.teacherkathPhiloedreport.teacherkath
Philoedreport.teacherkath
 
Ieee paper mobile boadband
Ieee paper mobile boadbandIeee paper mobile boadband
Ieee paper mobile boadband
 
Phobia's
Phobia'sPhobia's
Phobia's
 
Walk Through Wednesday
Walk Through WednesdayWalk Through Wednesday
Walk Through Wednesday
 
Troublemaker
TroublemakerTroublemaker
Troublemaker
 
System development life cycle
System development life cycleSystem development life cycle
System development life cycle
 
Spectronic 21
Spectronic 21Spectronic 21
Spectronic 21
 
Application form
Application formApplication form
Application form
 
Diet
DietDiet
Diet
 
Slideshare
SlideshareSlideshare
Slideshare
 

Similar to Wireless Networks Bluetooth and Mobile IP Overview

BluetoothMobileIP.ppt
BluetoothMobileIP.pptBluetoothMobileIP.ppt
BluetoothMobileIP.pptparul757596
 
BluetoothMobileIP.ppt
BluetoothMobileIP.pptBluetoothMobileIP.ppt
BluetoothMobileIP.pptssuser4d3a6b
 
R K 2 Bluetooth Technologies
R K 2  Bluetooth  TechnologiesR K 2  Bluetooth  Technologies
R K 2 Bluetooth TechnologiesSaurav Kumar
 
Networks (Distributed computing)
Networks (Distributed computing)Networks (Distributed computing)
Networks (Distributed computing)Sri Prasanna
 
WirelessTechnologies.pptx
WirelessTechnologies.pptxWirelessTechnologies.pptx
WirelessTechnologies.pptxAbyThomas54
 
WirelessTechnologies.pptx
WirelessTechnologies.pptxWirelessTechnologies.pptx
WirelessTechnologies.pptxAbyThomas54
 
Bluetooth Details.ppt
Bluetooth Details.pptBluetooth Details.ppt
Bluetooth Details.pptVignesh kumar
 
Wireless Personal Area Networks
Wireless Personal Area NetworksWireless Personal Area Networks
Wireless Personal Area NetworksDilum Bandara
 
Chapter 5 introduction to computer communication networks
Chapter 5   introduction to computer communication networksChapter 5   introduction to computer communication networks
Chapter 5 introduction to computer communication networksN. A. Sutisna
 
Physical And Data Link Layers
Physical And Data Link LayersPhysical And Data Link Layers
Physical And Data Link Layerstmavroidis
 
Other types of networks: Bluetooth, Zigbee, & NFC
Other types of networks: Bluetooth, Zigbee, & NFCOther types of networks: Bluetooth, Zigbee, & NFC
Other types of networks: Bluetooth, Zigbee, & NFCDilum Bandara
 

Similar to Wireless Networks Bluetooth and Mobile IP Overview (20)

BluetoothMobileIP.ppt
BluetoothMobileIP.pptBluetoothMobileIP.ppt
BluetoothMobileIP.ppt
 
BluetoothMobileIP.ppt
BluetoothMobileIP.pptBluetoothMobileIP.ppt
BluetoothMobileIP.ppt
 
BluetoothMobileIP.ppt
BluetoothMobileIP.pptBluetoothMobileIP.ppt
BluetoothMobileIP.ppt
 
Bluetooth 1
Bluetooth 1Bluetooth 1
Bluetooth 1
 
LAN TECHNOLOGLES
 LAN TECHNOLOGLES LAN TECHNOLOGLES
LAN TECHNOLOGLES
 
R K 2 Bluetooth Technologies
R K 2  Bluetooth  TechnologiesR K 2  Bluetooth  Technologies
R K 2 Bluetooth Technologies
 
Networks (Distributed computing)
Networks (Distributed computing)Networks (Distributed computing)
Networks (Distributed computing)
 
Bluetooth.ppt
Bluetooth.pptBluetooth.ppt
Bluetooth.ppt
 
Bluetooth.ppt
Bluetooth.pptBluetooth.ppt
Bluetooth.ppt
 
WirelessTechnologies.pptx
WirelessTechnologies.pptxWirelessTechnologies.pptx
WirelessTechnologies.pptx
 
WirelessTechnologies.pptx
WirelessTechnologies.pptxWirelessTechnologies.pptx
WirelessTechnologies.pptx
 
Bluetooth Details.ppt
Bluetooth Details.pptBluetooth Details.ppt
Bluetooth Details.ppt
 
IoT Network Technologies
IoT Network TechnologiesIoT Network Technologies
IoT Network Technologies
 
Wireless Personal Area Networks
Wireless Personal Area NetworksWireless Personal Area Networks
Wireless Personal Area Networks
 
Networking
NetworkingNetworking
Networking
 
Bluetooth.pptx
Bluetooth.pptxBluetooth.pptx
Bluetooth.pptx
 
Ch4
Ch4Ch4
Ch4
 
Chapter 5 introduction to computer communication networks
Chapter 5   introduction to computer communication networksChapter 5   introduction to computer communication networks
Chapter 5 introduction to computer communication networks
 
Physical And Data Link Layers
Physical And Data Link LayersPhysical And Data Link Layers
Physical And Data Link Layers
 
Other types of networks: Bluetooth, Zigbee, & NFC
Other types of networks: Bluetooth, Zigbee, & NFCOther types of networks: Bluetooth, Zigbee, & NFC
Other types of networks: Bluetooth, Zigbee, & NFC
 

Recently uploaded

History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 

Recently uploaded (20)

History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 

Wireless Networks Bluetooth and Mobile IP Overview

  • 2. Wireless Networks Bluetooth  Consortium: Ericsson, Intel, IBM, Nokia, Toshiba…  Scenarios: o connection of peripheral devices • loudspeaker, joystick, headset o support of ad-hoc networking • small devices, low-cost o bridging of networks • e.g., GSM via mobile phone - Bluetooth - laptop  Simple, cheap, replacement of IrDA, low range, lower data rates, low-power o Worldwide operation: 2.4 GHz o Resistance to jamming and selective frequency fading: • FHSS over 79 channels (of 1MHz each), 1600hops/s o Coexistence of multiple piconets: like CDMA o Links: synchronous connections and asynchronous connectionless o Interoperability: protocol stack supporting TCP/IP, OBEX, SDP o Range: 10 meters, can be extended to 100 meters  Documentation: over 1000 pages specification: www.bluetooth.com
  • 3. Wireless Networks Bluetooth Application Areas  Data and voice access points o Real-time voice and data transmissions  Cable replacement o Eliminates need for numerous cable attachments for connection  Low cost < $5  Ad hoc networking o Device with Bluetooth radio can establish connection with another when in range
  • 4. Wireless Networks Protocol Architecture  Bluetooth is a layered protocol architecture o Core protocols o Cable replacement and telephony control protocols o Adopted protocols  Core protocols o Radio o Baseband o Link manager protocol (LMP) o Logical link control and adaptation protocol (L2CAP) o Service discovery protocol (SDP)
  • 5. Wireless Networks Protocol Architecture  Cable replacement protocol o RFCOMM  Telephony control protocol o Telephony control specification – binary (TCS BIN)  Adopted protocols o PPP o TCP/UDP/IP o OBEX o WAE/WAP
  • 6. Wireless Networks Protocol Architecture  BT Radio (2.4 GHZ Freq. Band):  Modulation: Gaussian Frequency Shift Keying  Baseband: FH-SS (79 carriers), CDMA (hopping sequence from the node MAC address)  Audio: interfaces directly with the baseband. Each voice connection is over a 64Kbps SCO link. The voice coding scheme is the Continuous Variable Slope Delta (CVSD)  Link Manager Protocol (LMP): link setup and control, authentication and encryption  Host Controller Interface: provides a uniform method of access to the baseband, control registers, etc through USB, PCI, or UART  Logical Link Control and Adaptation Layer (L2CAP): higher protocols multiplexing, packet segmentation/reassembly, QoS  Service Discover Protocol (SDP): protocol of locating services provided by a Bluetooth device  Telephony Control Specification (TCS): defines the call control signaling for the establishment of speech and data calls between Bluetooth devices  RFCOMM: provides emulation of serial links (RS232). Upto 60 connections HCI Bluetooth Radio Baseband Audio Link Manager (LMP) L2CAP RFCOMM TCS SDP TCP/UDP PPP AT Commands OBEX Application OBEX: OBject EXchange (e.g., vCard)
  • 7. Wireless Networks Usage Models File transfer Internet bridge LAN access Synchronization Three-in-one phone Headset
  • 8. Wireless Networks Piconets and Scatternets  Piconet o Basic unit of Bluetooth networking o Master and one to seven slave devices o Master determines channel and phase  Scatternet o Device in one piconet may exist as master or slave in another piconet o Allows many devices to share same area o Makes efficient use of bandwidth
  • 10. Wireless Networks Network Topology  Piconet = set of Bluetooth nodes synchronized to a master node o The piconet hopping sequence is derived from the master MAC address (BD_ADDR IEEE802 48 bits compatible address)  Scatternet = set of piconet  Master-Slaves can switch roles  A node can only be master of one piconet. Why? Piconet 1 Master Master Piconet 2 Scatternet Slave
  • 11. Wireless Networks Scatternets piconets  Each piconet has one master and up to 7 slaves  Master determines hopping sequence, slaves have to synchronize  Participation in a piconet = synchronization to hopping sequence  Communication between piconets = devices jumping back and forth between the piconets
  • 12. Wireless Networks Radio Specification  Classes of transmitters o Class 1: Outputs 100 mW for maximum range • Power control mandatory • Provides greatest distance o Class 2: Outputs 2.4 mW at maximum • Power control optional o Class 3: Nominal output is 1 mW • Lowest power  Frequency Hopping in Bluetooth o Provides resistance to interference and multipath effects o Provides a form of multiple access among co-located devices in different piconets
  • 13. Wireless Networks Frequency Hopping  Total bandwidth divided into 1MHz physical channels  FH occurs by jumping from one channel to another in pseudorandom sequence  Hopping sequence shared with all devices on piconet  Piconet access: o Bluetooth devices use time division duplex (TDD) o Access technique is TDMA o FH-TDD-TDMA
  • 15. Wireless Networks Physical Links  Synchronous connection oriented (SCO) o Allocates fixed bandwidth between point-to-point connection of master and slave o Master maintains link using reserved slots o Master can support three simultaneous links  Asynchronous connectionless (ACL) o Point-to-multipoint link between master and all slaves o Only single ACL link can exist
  • 16. Wireless Networks Bluetooth Packet Fields Access code – used for timing synchronization, offset compensation, paging, and inquiry Header – used to identify packet type and carry protocol control information Payload – contains user voice or data and payload header, if present
  • 17. Wireless Networks Bluetooth Piconet MAC Each node has a Bluetooth Device Address (BD_ADDR). The master BD_ADDR determines the sequence of frequency hops Types of connections: Synchronous Connection-Oriented link (SCO) (symmetrical, circuit switched, point-to-point) Asynchronous Connectionless Link (ACL): (packet switched, point-to-multipoint, master- polls) Packet Format: o Access code: synchronization, when piconet active derived from master o Packet header (for ACL): 1/3-FEC, MAC address (1 master, 7 slaves), link type, alternating bit ARQ/SEQ, checksum f(k) f(k+1) f(k+2) f(k+3) f(k+4) f(k+4) f(k+4) f(k+7) Master Slave 1 Slave 2 bits access code packet header payload 72 54 0-2745 bits MAC address type flow ARQN SEQN HEC 3 4 1 1 1 8
  • 18. Wireless Networks Types of Access Codes Channel access code (CAC) – identifies a piconet Device access code (DAC) – used for paging and subsequent responses Inquiry access code (IAC) – used for inquiry purposes Preamble+sync+trailer
  • 19. Wireless Networks Packet Header Fields  AM_ADDR – contains “active mode” address of one of the slaves  Type – identifies type of packet o ACL: Data Medium (DM) or Data High (DH), with different slot lengths (DM1, DM3, DM5, DH1, DH3, DH5) o SCO: Data Voice (DV) and High-quality voice (HV)  Flow – 1-bit flow control  ARQN – 1-bit acknowledgment  SEQN – 1-bit sequential numbering schemes  Header error control (HEC) – 8-bit error detection code
  • 20. Wireless Networks Payload Format Payload header o L_CH field – identifies logical channel o Flow field – used to control flow at L2CAP level o Length field – number of bytes of data Payload body – contains user data CRC – 16-bit CRC code
  • 21. Wireless Networks Error Correction Schemes 1/3 rate FEC (forward error correction) o Used on 18-bit packet header, voice field in HV1 packet 2/3 rate FEC o Used in DM packets, data fields of DV packet, FHS packet and HV2 packet ARQ o Used with DM and DH packets
  • 22. Wireless Networks ARQ Scheme Elements  Error detection – destination detects errors, discards packets  Positive acknowledgment – destination returns positive acknowledgment  Retransmission after timeout – source retransmits if packet unacknowledged  Negative acknowledgment and retransmission – destination returns negative acknowledgement for packets with errors, source retransmits
  • 23. Wireless Networks Types of packets  SCO packets: Do not have a CRC (except for the data part of DV) and are never retransmitted. Intended for High-quality Voice (HV).  ACL packets: Data Medium-rate (DM) and Data High-rate (DH) Type Payload (bytes) FEC CRC max-rate kbps HV1 10 1/3 No 64 HV2 20 2/3 No 64 HV3 30 No No 64 DV 10+(1-10)D 2/3D Yes D 64+57.6D Type Payload (bytes) FEC CRC Symm. max-rate kbps Asymm. max-rate (DL/UL) DM1 0-17 2/3 Yes 108.8 108.8/108.9 DM3 0-121 2/3 Yes 258.1 387.2/54.4 DM5 0-224 2/3 Yes 286.7 477.8/36.3 DH1 0-27 No Yes 172.8 172.8/172.8 DH3 0-183 No Yes 390.4 585.6/86.4 DH5 0-339 No Yes 433.9 723.2/185.6
  • 24. Wireless Networks Channel Control  Major states o Standby – default state o Connection – device connected  Interim substates for adding new slaves o Page – device issued a page (used by master) o Page scan – device is listening for a page o Master response – master receives a page response from slave o Slave response – slave responds to a page from master o Inquiry – device has issued an inquiry for identity of devices within range o Inquiry scan – device is listening for an inquiry o Inquiry response – device receives an inquiry response
  • 26. Wireless Networks Inquiry Procedure  Potential master identifies devices in range that wish to participate o Transmits ID packet with inquiry access code (IAC) o Occurs in Inquiry state  Device receives inquiry o Enter Inquiry Response state o Returns FHS (Frequency Hop Synchrnonization) packet with address and timing information o Moves to page scan state
  • 27. Wireless Networks Inquiry Procedure Details  Goal: aims at discovering other neighboring devices  Inquiring node: o Sends an inquiry message (packet with only the access code: General Inquiry Access Code: GIAC or Dedicated IAC: DIAC). This message is sent over a subset of all possible frequencies. o The inquiry frequencies are divided into two hopping sets of 16 frequencies each. o In inquiry state the node will send upto NINQUIRY sequences on one set of 16 frequencies before switching to the other set of 16 frequencies. Upto 3 switches can be executed. Thus the inquiry may last upto 10.24 seconds.  To be discovered node: o Enters an inquiry_scan mode o When hearing the inquiry_message (and after a backoff procedure) enter an inquiry_response mode: send a Frequency Hop Sync (FHS) packet (BD_ADDR, native clock)  After discovering the neighbors and collecting information on their address and clock, the inquiring node can start a page routine to setup a piconet
  • 28. Wireless Networks Page Procedure Master uses devices address to calculate a page frequency-hopping sequence Master pages with ID packet and device access code (DAC) of specific slave Slave responds with DAC ID packet Master responds with its FHS packet Slave confirms receipt with DAC ID Slaves moves to Connection state
  • 29. Wireless Networks Page Procedure Details  Goal: e.g., setup a piconet after an inquiry  Paging node (master): o Sends a page message (i.e., packet with only Device Access Code of paged node) over 32 frequency hops (from DAC and split into 2*16 freq.) o Repeated until a response is received o When a response is received send a FHS message to allow the paged node to synchronize  Paged node (slave): o Listens on its hopping sequence o When receiving a page message, send a page_response and wait for the FHS of the pager
  • 30. Wireless Networks Slave Connection State Modes Active – participates in piconet o Listens, transmits and receives packets Sniff – only listens on specified slots Hold – does not support ACL packets o Reduced power status o May still participate in SCO exchanges Park – does not participate on piconet o Still retained as part of piconet
  • 31. Wireless Networks States of a Bluetooth Device STANDBY inquiry page connectedtransmit PARK HOLD SNIFF unconnected connecting active low power BT device addressing: • BD_ADDR (48 bits) • AM_ADDR ( 3bits): ACTIVE, HOLD, or SNIFF • PM_ADDR (8 bits): PARK Mode address (exchanged with the AM_ADDR when entering PARK mode) • AR_ADDR (8 bits): not unique used to come back from PARK to ACTIVE state ACTIVE (connected/transmit): the device is uniquely identified by a 3bits AM_ADDR and is fully participating SNIFF state: participates in the piconet only within the SNIFF interval HOLD state: keeps only the SCO links PARK state (low-power): releases AM_ADDR but stays synchronized with master
  • 32. Wireless Networks Bluetooth Audio Voice encoding schemes: o Pulse code modulation (PCM) o Continuously variable slope delta (CVSD) modulation Choice of scheme made by link manager o Negotiates most appropriate scheme for application
  • 33. Wireless Networks Bluetooth Link Security  Elements: o Authentication – verify claimed identity o Encryption – privacy o Key management and usage  Security algorithm parameters: o Unit address o Secret authentication key (128 bits key) o Secret privacy key (4-128 bits secret key) o Random number
  • 34. Wireless Networks Link Management Manages master-slave radio link Security Service: authentication, encryption, and key distribution Clock synchronization Exchange station capability information Mode management: o switch master/slave role o change hold, sniff, park modes o QoS
  • 35. Wireless Networks L2CAP  Provides a link-layer protocol between entities with a number of services  Relies on lower layer for flow and error control  Makes use of ACL links, does not support SCO links  Provides two alternative services to upper-layer protocols o Connectionless service o Connection-oriented service: A QoS flow specification is assigned in each direction  Exchange of signaling messages to establish and configure connection parameters
  • 36. Wireless Networks Flow Specification Parameters Service type Token rate (bytes/second) Token bucket size (bytes) Peak bandwidth (bytes/second) Latency (microseconds) Delay variation (microseconds)
  • 38. Wireless Networks Motivation for Mobile IP  Routing o based on IP destination address, network prefix (e.g. 129.13.42) determines physical subnet o change of physical subnet implies change of IP address to have a topological correct address (standard IP) or needs special entries in the routing tables  Specific routes to end-systems? o change of all routing table entries to forward packets to the right destination o does not scale with the number of mobile hosts and frequent changes in the location, security problems  Changing the IP-address? o adjust the host IP address depending on the current location o almost impossible to find a mobile system, DNS updates take too much time o TCP connections break, security problems
  • 39. Wireless Networks Mobile IP Requirements  Transparency o mobile end-systems keep their IP address o continuation of communication after interruption of link possible o point of connection to the fixed network can be changed  Compatibility o support of the same layer 2 protocols as IP o no changes to current end-systems and routers required o mobile end-systems can communicate with fixed systems  Security o authentication of all registration messages  Efficiency and scalability o only little additional messages to the mobile system required (connection typically via a low bandwidth radio link) o world-wide support of a large number of mobile systems in the whole Internet
  • 40. Wireless Networks Terminology  Mobile Node (MN) o system (node) that can change the point of connection to the network without changing its IP address  Home Agent (HA) o system in the home network of the MN, typically a router o registers the location of the MN, tunnels IP datagrams to the COA  Foreign Agent (FA) o system in the current foreign network of the MN, typically a router o forwards the tunneled datagrams to the MN, typically also the default router for the MN  Care-of Address (COA) o address of the current tunnel end-point for the MN (at FA or MN) o actual location of the MN from an IP point of view o can be chosen, e.g., via DHCP  Correspondent Node (CN) o communication partner
  • 41. Wireless Networks Example network mobile end-system Internet router router router end-system FA HA MN home network foreign network (physical home network for the MN) (current physical network for the MN) CN
  • 42. Wireless Networks Data transfer to the mobile Internet sender FA HA MN home network foreign network receiver 1 2 3 1. Sender sends to the IP address of MN, HA intercepts packet (proxy ARP) 2. HA tunnels packet to COA, here FA, by encapsulation 3. FA forwards the packet to the MN CN
  • 43. Wireless Networks Data transfer from the mobile Internet receiver FA HA MN home network foreign network sender 1 1. Sender sends to the IP address of the receiver as usual, FA works as default router CN
  • 45. Wireless Networks Network integration  Agent Advertisement o HA and FA periodically send advertisement messages into their physical subnets o MN listens to these messages and detects, if it is in the home or a foreign network (standard case for home network) o MN reads a COA from the FA advertisement messages  Registration (always limited lifetime!) o MN signals COA to the HA via the FA, HA acknowledges via FA to MN o these actions have to be secured by authentication  Advertisement o HA advertises the IP address of the MN (as for fixed systems), i.e. standard routing information o routers adjust their entries, these are stable for a longer time (HA responsible for a MN over a longer period of time) o packets to the MN are sent to the HA, o independent of changes in COA/FA
  • 46. Wireless Networks Agent advertisement preference level 1 router address 1 #addresses type addr. size lifetime checksum COA 1 COA 2 type sequence numberlength 0 7 8 15 16 312423 code preference level 2 router address 2 . . . registration lifetime . . . R B H F M G V reserved ICMP-Type = 0; Code = 0/16; Extension Type = 16 TTL = 1 Dest-Adr = 224.0.0.1 (multicast on link) or 255.255.255.255 (broadcast) R: registration required B: busy H: home agent F: foreign agent M: minimal encapsulation G: generic encapsulation V: header compression
  • 47. Wireless Networks Registration t MN HAregistrationrequest registration reply t MN FA HAregistrationrequest registrationrequest registration reply registration reply Goal: inform the home agent of current location of MN (COA-FA or co-located COA) Registration expires automatically (lifetime) Uses UDP port 434
  • 48. Wireless Networks Mobile IP registration request home agent home address type lifetime 0 7 8 15 16 312423 rsv identification COA extensions . . . S B DMGV UDP packet on port 343 Type = 1 for registration request S: retain prior mobility bindings B: forward broadcast packets D: co-located address=> MN decapsulates packets
  • 49. Wireless Networks Encapsulation original IP header original data new datanew IP header outer header inner header original data
  • 50. Wireless Networks Encapsulation I  Encapsulation of one packet into another as payload o e.g. IPv6 in IPv4 (6Bone), Multicast in Unicast (Mbone) o here: e.g. IP-in-IP-encapsulation, minimal encapsulation or GRE (Generic Record Encapsulation)  IP-in-IP-encapsulation (mandatory in RFC 2003) o tunnel between HA and COA Care-of address COA IP address of HA TTL IP identification IP-in-IP IP checksum flags fragment offset lengthTOSver. IHL IP address of MN IP address of CN TTL IP identification lay. 4 prot. IP checksum flags fragment offset lengthTOSver. IHL TCP/UDP/ ... payload
  • 51. Wireless Networks Encapsulation II  Minimal encapsulation (optional) [RFC2004] o avoids repetition of identical fields o e.g. TTL, IHL, version, TOS o only applicable for unfragmented packets, no space left for fragment identification care-of address COA IP address of HA TTL IP identification min. encap. IP checksum flags fragment offset lengthTOSver. IHL IP address of MN original sender IP address (if S=1) Slay. 4 protoc. IP checksum TCP/UDP/ ... payload reserved
  • 52. Wireless Networks Optimization of packet forwarding  Triangular Routing o sender sends all packets via HA to MN o higher latency and network load  “Solutions” o sender learns the current location of MN o direct tunneling to this location o HA informs a sender about the location of MN o big security problems!  Change of FA o packets on-the-fly during the change can be lost o new FA informs old FA to avoid packet loss, old FA now forwards remaining packets to new FA o this information also enables the old FA to release resources for the MN
  • 53. Wireless Networks Change of foreign agent CN HA FAold FAnew MN t request update ACK data data MN changes location registration update ACK data data data warning update ACK data data registration
  • 54. Wireless Networks Reverse tunneling (RFC 2344) Internet receiver FA HA MN home network foreign network sender 3 2 1 1. MN sends to FA 2. FA tunnels packets to HA by encapsulation 3. HA forwards the packet to the receiver (standard case) CN
  • 55. Wireless Networks Mobile IP with reverse tunneling  Routers accept often only “topological correct“ addresses (firewall) o a packet from the MN encapsulated by the FA is now topological correct o furthermore multicast and TTL problems solved (TTL in the home network correct, but MN is to far away from the receiver)  Reverse tunneling does not solve o problems with firewalls, the reverse tunnel can be abused to circumvent security mechanisms (tunnel hijacking) o optimization of data paths, i.e. packets will be forwarded through the tunnel via the HA to a sender (double triangular routing)  The new standard is backwards compatible o the extensions can be implemented easily and cooperate with current implementations without these extensions
  • 56. Wireless Networks Mobile IP and IPv6  security is integrated and not an add-on, authentication of registration is included  COA can be assigned via auto-configuration (DHCPv6 is one candidate), every node has address autoconfiguration  no need for a separate FA, all routers perform router advertisement which can be used instead of the special agent advertisement  MN can signal a sender directly the COA, sending via HA not needed in this case (automatic path optimization)  “soft” hand-over, i.e. without packet loss, between two subnets is supported o MN sends the new COA to its old router o the old router encapsulates all incoming packets for the MN and forwards them to the new COA o authentication is always granted
  • 57. Wireless Networks Problems with Mobile IP  Security o authentication with FA problematic, for the FA typically belongs to another organization o no protocol for key management and key distribution has been standardized in the Internet o patent and export restrictions  Firewalls o typically mobile IP cannot be used together with firewalls, special set-ups are needed (such as reverse tunneling)  QoS o many new reservations in case of RSVP o tunneling makes it hard to give a flow of packets a special treatment needed for the QoS  Security, firewalls, QoS etc. are topics of current research and discussions!

Editor's Notes

  1. Slot duration: 625seconds Why don’t we transmit during all the slot?