SlideShare a Scribd company logo
www.techvilla.org.in
1
TECHVILL
A
www.techvilla.org.in
www.techvilla.org.in
BLUETOOTH
www.techvilla.org.in3
Bluetooth Origins• Study by Ericsson Mobile Communications in 1994.
• Alternatives to cables connecting mobile phones to
accessories.
• Use of radio links instead of infrared.
• Why?
• Transmission of data and voice.
• Result: Bluetooth spec.
• Named after Harald Blatand (Danish for Bluetooth).
• 10th
century Viking king who united Denmark and
Norway.
www.techvilla.org.in4
Bluetooth SIG History
• Early 1998: Bluetooth SIG is formed.
• Promoter company group: Ericsson, IBM, Intel, Nokia,
Toshiba.
• Goal: develop license-free technology for universal
wireless connectivity.
• Target: handheld market.
• Bluetooth spec: defines RF wireless communication
interface and protocols.
www.techvilla.org.in5
Bluetooth SIG History
• May 1998: Public announcement of Bluetooth SIG.
• July 1999: 1.0A spec (>1,500 pages) published.
• December 1999: version 1.0B released.
• December 1999: promoters increases to 9.
• 3Com, Lucent, Microsoft, Motorola
• February 2000: 1,800+ adopters.
• February 2001: version 1.1 out.
www.techvilla.org.in6
Goals• Open spec.
• Low cost.
• In order to replace cables, should have similar cost.
• Cell phone cable is ~ $10.
• Power efficiency.
• Lightweight and small form factor.
• Easy to use.
• Reliable and resilient to failures.
www.techvilla.org.in7
The Bluetooth Standard
• Defines a protocol stack to enable heterogeneous devices to
communicate.
• The Bluetooth stack includes protocols for the radio layer all the way
up to device discovery, service discovery, etc.
www.techvilla.org.in8
Bluetooth Protocol Stack
RF
Baseband
Link Manager
L2CAP
RFCOMM/SDP
Applications
Link Controller
Host Controller Interface
PHY
Data Link Layer
Network Layer
Transport Layer
Session Layer
Presentation Layer
Application
OSI/ISO
www.techvilla.org.in9
Bluetooth Layers
• Radio: physically transmits/receives data.
• Baseband/Link Controller: controls PHY.
• Link Manager: controls links to other devices.
• Host Controller:e2e communication.
• Logical Link Control: multiplexes/demultiplexes data from higher
layers.
• RFCOMM: RS323-like serial interface.
• SDP: allows service discovery among Bluetooth devices.
www.techvilla.org.in10
The Bluetooth PHY
www.techvilla.org.in11
Radio Band
• 2.4 GHz license-free ISM band.
• Available worldwide.
• Industrial, Scientific, Medical (ISM) band.
• Unlicensed, globally available.
• Centered around 2.4 GHz.
• Resilient to interference.
• Frequency hopping.
• Range: 10, 20, and 100m.
• 1MB/s.
www.techvilla.org.in12
Unlicensed Radio Spectrum
902 Mhz
928 Mhz
26 Mhz 83.5 Mhz 125 Mhz
2.4 Ghz
2.4835 Ghz
5.725 Ghz
5.785 Ghz
cordless phones
baby monitors
Wireless LANs
802.11
Bluetooth
Microwave oven
unused
λ 33cm 12cm 5cm
www.techvilla.org.in13
Bluetooth Radio Link
• MA scheme: Frequency hopping spread spectrum.
• 2.402 GHz + k MHz, k=0, …, 78
• 1,600 hops per second.
• 1 Mb/s data rate.
. . .
1Mhz
1 2 3 79
83.5 Mhz
www.techvilla.org.in14
BT Radio Link (Cont’d)
• Time-division duplex (TDD)
• Separation of Xmission and reception in time.
• Units alternate transmits and receives.
• Gaussian Frequency Shift Keying (G-FSK) modulation.
• ‘1’s as positive frequency deviations from carrier frequency; ‘0’s as negative
deviations.
www.techvilla.org.in15
Multiple Access
• BT targets large number of independent communications
active in the same area at the same time.
• Single FH channel: 1 Mb/s.
• Each 1Mb/s channel shared by limited number of participants.
• In target user scenarios, it’s unlikely that all units in-range will
share data among all of them.
• 1 MB/s is reasonable. (is it?)
• Theoretically, total bandwidth is 79 Mb/s.
• In practice, < 79 Mb/s since codes are non-orthogonal.
www.techvilla.org.in16
Baseband
Carries out MAC
functions.
RF
Baseband
Link Manager
L2CAP
RFCOMM/SDP
Applications
Link Controller
Host Controller Interface
Control end of baseband
+link controller=
Data link layer
www.techvilla.org.in17
Master and Slaves
• Communicating devices must agree on hopping sequence.
• BT devices can operate as masters or slaves.
• Master node defines sequence to be used.
• Slave units use master id to pick sequence.
• Master also controls when devices are allowed to transmit.
• Master allocates slots to slaves.
• Allocates total available bandwidth among slaves.
www.techvilla.org.in18
Piconets
• BT communication takes place over piconets.
• Piconet formation initiated by master.
• All other participants are slaves.
• Number of participants limited to 8 (1 master and 7 slaves).
• Channel capacity and addressing overhead.
• Each slave assigned a locally unique ID.
• Master/slave roles last for the duration of the piconet.
www.techvilla.org.in19
More on Piconets
• On a piconet, slaves only have direct links to master.
• Point-to-point or point-to-multipoint connections.
www.techvilla.org.in20
Piconets: Considerations
• Most target applications involve local communication among small
group of devices.
• Piconets with up to 8 nodes match well.
• If many groups of devices active simultaneously, each group as
separate piconet.
• Overlapping piconets can coexist.
www.techvilla.org.in21
Contention-Free MA
• Master and slaves.
• Master performs medium access control.
• Schedules traffic through polling.
• Time slots alternate between master and slave transmission.
• Master-slave: master includes slave address.
• Slave-master: only slave chosen by master in previous master-slave slot allowed to
transmit.
• If master has data to send to a slave, slave polled implicitly; otherwise, explicit poll.
www.techvilla.org.in22
BT States
Standby
Inquiry Page
Transmit Connected
Park Hold Sniff
Unconnected
Connecting
Active
Low power
. Initially, all nodes in
standby.
. Node (master) can begin
inquiry to find nearby
devices.
. Piconet is then formed.
. Devices join by paging.
www.techvilla.org.in23
Inquiry
• Device discovery
•Listeners respond with
their address.
www.techvilla.org.in24
Paging Master
Active Slave
Parked Slave
Standby
• Device enters paging to invite
others to join its piconet.
• Establishes links with nodes in
proximity.
• Paging message unicast to
selected receiver.
• Receiver sends ACK.
• Sender becomes master,
receiver slave.
www.techvilla.org.in25
Piconet New Node Admission
• Master can actively try to discover new nodes or wait (in scan/listen
mode) to be discovered.
• Communication in the current piconet suspended.
• Admission latency versus piconet capacity tradeoff.
www.techvilla.org.in26
Bluetooth Link Formation
• Point-to-point link:
• Master-slave relationship.
m s
s
s
m
s
• Piconet:
– 8 units: channel capacity.
– Master (establishes piconet) can
connect to up to 7 slaves.
– Master/slave relationship lasts while
link/piconet lasts.
– No slave-to-slave communication.
www.techvilla.org.in27
Link Types
• 2 types of links:
• Synchronous (SCO) links:
• Point-to-point between master and slave.
• Link established by reserving slots in either direction periodically.
• Used to carry real-time traffic (voice).
• Asynchronous (ACL) links:
• Point-to-multipoint between master and slaves.
• Use remaining slots on channel.
• Traffic scheduled by master.
www.techvilla.org.in28
Error Control
• Supports both FEC and retransmission.
• FEC for SCO packets.
• ARQ for ACL traffic.
• If no ACKs, retransmit.
• Stop-and-wait ARQ.
• Fast-ARQ: ACK included in RX slot immediately following the TX slot in which packet was
sent.
• CRC to check for errors.
www.techvilla.org.in29
Packet Format
72 bits 54 bits 0 - 2744 bits
Access
code
Header Payload
DataVoice CRC
No CRC
No retries
625 µs
master
slave
header
ARQ
FEC (optional)
FEC (optional)
www.techvilla.org.in30
Access Code
• Address of piconet master.
Access
code
Header Payload
72 bits
www.techvilla.org.in31
Packet Header
• Addressing (3)
• Packet type (4)
• Flow control (1)
• 1-bit ARQ (1)
• Sequencing (1)
• HEC (8)
Access
code
Header Payload
54 bits
Purpose
Broadcast packets are not ACKed
For filtering retransmitted packets
18 bitstotal
s
s
m
s
16 packet types (some unused)
Max 7 active slaves
Verify header integrity
www.techvilla.org.in32
Multiple Piconets
• Piconets may overlap in space and time.
• They can work independently.
• Each with its own hopping sequence.
• Packets with different access codes.
• Or they can overlap, i.e., nodes can participate in more than 1 piconet.
• “Time sharing”.
www.techvilla.org.in33
Scatternets
• Interconnection of multiple piconets.
Master
Slave
www.techvilla.org.in34
Scatternets (cont’d…)
• Interconnection by bridge nodes.
• Bridge nodes are members of piconets they interconnect.
• Bridge node “stay” in a piconet for some time, then switch to another piconet
by changing hop sequence.
• Do this for all member piconets.
• Send and receive in each piconet.
• Forward from one piconet to another.
www.techvilla.org.in35
Link Controller and Link Manager
RF
Baseband
Link Manager
L2CAP
RFCOMM/SDP
Applications
Link Controller
Host Controller Interface
Carries out inquiry and paging
operations; manages multiple
links and different piconets.
Attaching/detaching slaves from
piconet; power management; security.
www.techvilla.org.in36
Power Management
• Low-power modes: prolong battery life.
• Devices can be turned-off when idle.
• Devices wake up periodically to send/receive data.
www.techvilla.org.in37
Low-Power Operation
• 3 modes:
• Hold: node sleeps for specified interval.
• Master can put slaves in hold while searching for new members, attending another piconet, etc.
• No ACL packets.
• Sniff: slave low-duty cycle mode.
• Slave wakes up periodically to talk to master.
• Fixed “sniff” intervals.
• Park:
• Very low power state.
• Used to admit more than 7 slaves in piconet.
• Slave gives up its active member address.
• Receives “parked” member address.
• Wakes up periodically listening for broadcasts which can be used to “unpark” node.
www.techvilla.org.in38
Security
• Authentication and encryption.
• LMP provides mechanisms for negotiation of encryption modes, keys,
etc.
www.techvilla.org.in39
Host Controller Interface
RF
Baseband
Link Manager
L2CAP
RFCOMM/SDP
Applications
Link Controller
Host Controller Interface
Optional interface layer
between higher and lower
layers of the BT stack.
E.g., when lower- and higher
BT layers run on different
Devices: PCMCIA card and
PC’s processor.
www.techvilla.org.in40
L2CAP
Logical Link Control and
Adaptation Protocol=
Session Layer.
L2CAP provides
• Protocol multiplexing
• Quality of service negotiationRF
Baseband
Link Manager
L2CAP
RFCOMM/SDP
Applications
Link Controller
Host Controller Interface
www.techvilla.org.in41
RFCOMM/SDP
RF
Baseband
Link Manager
L2CAP
RFCOMM/SDP
Applications
Link Controller
Host Controller Interface
Service discovery, serial port
interface.
42
Features Cost
20 dBm (~100 m)
Point-to-multipoint
No Scatternet
Applications
File Transfer,
Dial-Up Networking
LAN access, Fax, …
169 $
---
200 $
0 dBm (~10 m)
Point-to-multipoint
No Scatternet
File Transfer,
Dial-Up Networking
LAN access, Fax, …
169 $
---
Company
Toshiba,
Motorola,
Digianswer
IBM, TDK
3COM
10 m user-user;
100 m user-Base Station
Point-to-multipoint
SW- & FW-upgradeable
File Transfer,
Dial-Up Networking
LAN access, Fax, E-mail
Unconscious connection
149 $
Nokia
10 m user-user;
Point-to-point
Connectivity Battery
for the cell phone
File Transfer,
Dial-Up Networking
LAN access, Fax, E-mail
Unconscious connection
149 $
Ericsson,
Sigma
10 m user-user;
Point-to-point;
ARM processor;
USB; RFCOMM ports
Basic BT Radio stack
Embedded or Host stack
Programmable
500 $
1500$
Bluetooth on the market:Bluetooth on the market:
PC cards, Cell phones, Head sets, Chip sets,…
www.techvilla.org.in
HC-05 Bluetooth Module
www.techvilla.org.in
HC-05 BLUETOOTH MODULE
www.techvilla.org.in
HC-05 working
• HC-05 embedded Bluetooth serial communication module has two
work modes:
• order-response work mode and automatic connection work mode.
• there are three work roles (Master, Slave and Loopback) at the
automatic connection work mode.
• When the module is at the automatic connection work mode, it will
follow the default way set lastly to transmit the data automatically.
www.techvilla.org.in
• When the module is at the order-response work mode, user can send
the AT command to the module to set the control parameters and
sent control order.
• The work mode of module can be switched by controlling the module
PIN (PIO11) input level.
www.techvilla.org.in
commands
www.techvilla.org.in
www.techvilla.org.in
www.techvilla.org.in
www.techvilla.org.in

More Related Content

What's hot

Overview of Low Power Wide Area Networks
Overview of Low Power Wide Area NetworksOverview of Low Power Wide Area Networks
Overview of Low Power Wide Area Networks
Maarten Weyn
 
Hallowed be thy packets by Paul Coggin
Hallowed be thy packets by Paul CogginHallowed be thy packets by Paul Coggin
Hallowed be thy packets by Paul Coggin
EC-Council
 
Exploring LTE security and protocol exploits with open source software and lo...
Exploring LTE security and protocol exploits with open source software and lo...Exploring LTE security and protocol exploits with open source software and lo...
Exploring LTE security and protocol exploits with open source software and lo...
EC-Council
 
Smart communication solution in emergency situations 2013
Smart communication solution in emergency situations 2013Smart communication solution in emergency situations 2013
Smart communication solution in emergency situations 2013
Governments ENabled with IPv6
 
LoRaWAN What is it good for - Mark Stanley, Mike Beardmore
LoRaWAN What is it good for - Mark Stanley, Mike BeardmoreLoRaWAN What is it good for - Mark Stanley, Mike Beardmore
LoRaWAN What is it good for - Mark Stanley, Mike Beardmore
Things North
 
MulteFire Technology Progress and Benefits
MulteFire Technology Progress and BenefitsMulteFire Technology Progress and Benefits
MulteFire Technology Progress and Benefits
Qualcomm Research
 
Practical Examples of LoRaWAN in Action
Practical Examples of LoRaWAN in ActionPractical Examples of LoRaWAN in Action
Practical Examples of LoRaWAN in Action
Robin Harris
 
Blue tooth communication
Blue tooth communicationBlue tooth communication
Blue tooth communication
Dibyendu Porey
 
Republic of IoT 2018 - ESPectro32 and NB-IoT Workshop
Republic of IoT 2018 - ESPectro32 and NB-IoT WorkshopRepublic of IoT 2018 - ESPectro32 and NB-IoT Workshop
Republic of IoT 2018 - ESPectro32 and NB-IoT Workshop
Alwin Arrasyid
 
IoT LPWAN network security: Sigfox and LoRaWAN (Mikael Falkvidd @ Knowit secu...
IoT LPWAN network security: Sigfox and LoRaWAN (Mikael Falkvidd @ Knowit secu...IoT LPWAN network security: Sigfox and LoRaWAN (Mikael Falkvidd @ Knowit secu...
IoT LPWAN network security: Sigfox and LoRaWAN (Mikael Falkvidd @ Knowit secu...
Mikael Falkvidd
 
Amit
AmitAmit
Lecture 6 - Wireless Sensors LoRa vs LoRaWAN
Lecture 6 - Wireless Sensors LoRa vs LoRaWANLecture 6 - Wireless Sensors LoRa vs LoRaWAN
Lecture 6 - Wireless Sensors LoRa vs LoRaWAN
Alexandru Radovici
 
R K 2 Bluetooth Technologies
R K 2  Bluetooth  TechnologiesR K 2  Bluetooth  Technologies
R K 2 Bluetooth Technologies
Saurav Kumar
 
Wi-Fi For Beginners - Module 3 - Access Points (APs)
Wi-Fi For Beginners - Module 3 - Access Points (APs)Wi-Fi For Beginners - Module 3 - Access Points (APs)
Wi-Fi For Beginners - Module 3 - Access Points (APs)
Nigel Bowden
 
Bluetooth
BluetoothBluetooth
Bluetooth
Mac_Kevin
 
4G to 5G Evolution
4G to 5G Evolution4G to 5G Evolution
4G to 5G Evolution
Manoj Singh
 
5G: The Future of Telecom
5G: The Future of Telecom5G: The Future of Telecom
5G: The Future of Telecom
Rishabh Sinha
 
Bluetooth
BluetoothBluetooth
Bluetooth
Ankit Bahuguna
 
An Overview of LoRA, Sigfox, and IEEE 802.11ah
An Overview of LoRA, Sigfox, and IEEE 802.11ahAn Overview of LoRA, Sigfox, and IEEE 802.11ah
An Overview of LoRA, Sigfox, and IEEE 802.11ah
Faheem Zafari
 
Anonymity in the web based on routing protocols
Anonymity in the web based on routing protocolsAnonymity in the web based on routing protocols
Anonymity in the web based on routing protocols
Biagio Botticelli
 

What's hot (20)

Overview of Low Power Wide Area Networks
Overview of Low Power Wide Area NetworksOverview of Low Power Wide Area Networks
Overview of Low Power Wide Area Networks
 
Hallowed be thy packets by Paul Coggin
Hallowed be thy packets by Paul CogginHallowed be thy packets by Paul Coggin
Hallowed be thy packets by Paul Coggin
 
Exploring LTE security and protocol exploits with open source software and lo...
Exploring LTE security and protocol exploits with open source software and lo...Exploring LTE security and protocol exploits with open source software and lo...
Exploring LTE security and protocol exploits with open source software and lo...
 
Smart communication solution in emergency situations 2013
Smart communication solution in emergency situations 2013Smart communication solution in emergency situations 2013
Smart communication solution in emergency situations 2013
 
LoRaWAN What is it good for - Mark Stanley, Mike Beardmore
LoRaWAN What is it good for - Mark Stanley, Mike BeardmoreLoRaWAN What is it good for - Mark Stanley, Mike Beardmore
LoRaWAN What is it good for - Mark Stanley, Mike Beardmore
 
MulteFire Technology Progress and Benefits
MulteFire Technology Progress and BenefitsMulteFire Technology Progress and Benefits
MulteFire Technology Progress and Benefits
 
Practical Examples of LoRaWAN in Action
Practical Examples of LoRaWAN in ActionPractical Examples of LoRaWAN in Action
Practical Examples of LoRaWAN in Action
 
Blue tooth communication
Blue tooth communicationBlue tooth communication
Blue tooth communication
 
Republic of IoT 2018 - ESPectro32 and NB-IoT Workshop
Republic of IoT 2018 - ESPectro32 and NB-IoT WorkshopRepublic of IoT 2018 - ESPectro32 and NB-IoT Workshop
Republic of IoT 2018 - ESPectro32 and NB-IoT Workshop
 
IoT LPWAN network security: Sigfox and LoRaWAN (Mikael Falkvidd @ Knowit secu...
IoT LPWAN network security: Sigfox and LoRaWAN (Mikael Falkvidd @ Knowit secu...IoT LPWAN network security: Sigfox and LoRaWAN (Mikael Falkvidd @ Knowit secu...
IoT LPWAN network security: Sigfox and LoRaWAN (Mikael Falkvidd @ Knowit secu...
 
Amit
AmitAmit
Amit
 
Lecture 6 - Wireless Sensors LoRa vs LoRaWAN
Lecture 6 - Wireless Sensors LoRa vs LoRaWANLecture 6 - Wireless Sensors LoRa vs LoRaWAN
Lecture 6 - Wireless Sensors LoRa vs LoRaWAN
 
R K 2 Bluetooth Technologies
R K 2  Bluetooth  TechnologiesR K 2  Bluetooth  Technologies
R K 2 Bluetooth Technologies
 
Wi-Fi For Beginners - Module 3 - Access Points (APs)
Wi-Fi For Beginners - Module 3 - Access Points (APs)Wi-Fi For Beginners - Module 3 - Access Points (APs)
Wi-Fi For Beginners - Module 3 - Access Points (APs)
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
4G to 5G Evolution
4G to 5G Evolution4G to 5G Evolution
4G to 5G Evolution
 
5G: The Future of Telecom
5G: The Future of Telecom5G: The Future of Telecom
5G: The Future of Telecom
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
An Overview of LoRA, Sigfox, and IEEE 802.11ah
An Overview of LoRA, Sigfox, and IEEE 802.11ahAn Overview of LoRA, Sigfox, and IEEE 802.11ah
An Overview of LoRA, Sigfox, and IEEE 802.11ah
 
Anonymity in the web based on routing protocols
Anonymity in the web based on routing protocolsAnonymity in the web based on routing protocols
Anonymity in the web based on routing protocols
 

Similar to Bluetooth Part-17

Bluetooth.ppt
Bluetooth.pptBluetooth.ppt
Bluetooth.ppt
DrTThendralCompSci
 
bluetooth-security
bluetooth-securitybluetooth-security
bluetooth-security
Anand Dhana
 
Bluetooth based-smart-sensor-network
Bluetooth based-smart-sensor-networkBluetooth based-smart-sensor-network
Bluetooth based-smart-sensor-network
priyadharshini murugan
 
Bluetooth Technology & Security
Bluetooth Technology & SecurityBluetooth Technology & Security
Bluetooth Technology & Security
Himangshu Hazra
 
BluetoothSecurity.ppt
BluetoothSecurity.pptBluetoothSecurity.ppt
BluetoothSecurity.ppt
ssuser1d7ef1
 
BluetoothSecurity.ppt
BluetoothSecurity.pptBluetoothSecurity.ppt
BluetoothSecurity.ppt
georgejustymirobi1
 
Bluetooth basic
Bluetooth basicBluetooth basic
Bluetooth basic
Engr Sid
 
Bluetooth Basic Version
Bluetooth Basic VersionBluetooth Basic Version
Bluetooth Basic Version
Ayesha Saeed
 
lecture10-wireless.pptx
lecture10-wireless.pptxlecture10-wireless.pptx
lecture10-wireless.pptx
PranavSinghSambyal
 
Bluetooth
BluetoothBluetooth
Bluetooth
Anamika Garg
 
Bluetooth.ppt
Bluetooth.pptBluetooth.ppt
Bluetooth.ppt
FarhanFarhan674893
 
Bluetooth
BluetoothBluetooth
Bluetooth
VAISHNAVI MADHAN
 
AWMN Advances Wireless UNIT-1 Blue_Tooth.pptx
AWMN Advances Wireless UNIT-1 Blue_Tooth.pptxAWMN Advances Wireless UNIT-1 Blue_Tooth.pptx
AWMN Advances Wireless UNIT-1 Blue_Tooth.pptx
shashijntuhceh
 
Bluetooth
BluetoothBluetooth
Bluetooth
BluetoothBluetooth
Bluetooth
Kashyap Shah
 
Dc ch01 : data communications, data networks, and the internet
Dc ch01 : data communications, data networks, and the internetDc ch01 : data communications, data networks, and the internet
Dc ch01 : data communications, data networks, and the internet
Syaiful Ahdan
 
zigbee technology
zigbee technology zigbee technology
zigbee technology
N.CH Karthik
 
Data_Processing_and_communication_bluetooth.pptx
Data_Processing_and_communication_bluetooth.pptxData_Processing_and_communication_bluetooth.pptx
Data_Processing_and_communication_bluetooth.pptx
20CE112YASHPATEL
 
Living on the iot edge
Living on the iot edgeLiving on the iot edge
Living on the iot edge
Steve Mylroie
 
IoT Control Units and Communication Models
IoT Control Units and Communication ModelsIoT Control Units and Communication Models
IoT Control Units and Communication Models
National Institute of Technology Karnataka, Surathkal
 

Similar to Bluetooth Part-17 (20)

Bluetooth.ppt
Bluetooth.pptBluetooth.ppt
Bluetooth.ppt
 
bluetooth-security
bluetooth-securitybluetooth-security
bluetooth-security
 
Bluetooth based-smart-sensor-network
Bluetooth based-smart-sensor-networkBluetooth based-smart-sensor-network
Bluetooth based-smart-sensor-network
 
Bluetooth Technology & Security
Bluetooth Technology & SecurityBluetooth Technology & Security
Bluetooth Technology & Security
 
BluetoothSecurity.ppt
BluetoothSecurity.pptBluetoothSecurity.ppt
BluetoothSecurity.ppt
 
BluetoothSecurity.ppt
BluetoothSecurity.pptBluetoothSecurity.ppt
BluetoothSecurity.ppt
 
Bluetooth basic
Bluetooth basicBluetooth basic
Bluetooth basic
 
Bluetooth Basic Version
Bluetooth Basic VersionBluetooth Basic Version
Bluetooth Basic Version
 
lecture10-wireless.pptx
lecture10-wireless.pptxlecture10-wireless.pptx
lecture10-wireless.pptx
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth.ppt
Bluetooth.pptBluetooth.ppt
Bluetooth.ppt
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
AWMN Advances Wireless UNIT-1 Blue_Tooth.pptx
AWMN Advances Wireless UNIT-1 Blue_Tooth.pptxAWMN Advances Wireless UNIT-1 Blue_Tooth.pptx
AWMN Advances Wireless UNIT-1 Blue_Tooth.pptx
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Dc ch01 : data communications, data networks, and the internet
Dc ch01 : data communications, data networks, and the internetDc ch01 : data communications, data networks, and the internet
Dc ch01 : data communications, data networks, and the internet
 
zigbee technology
zigbee technology zigbee technology
zigbee technology
 
Data_Processing_and_communication_bluetooth.pptx
Data_Processing_and_communication_bluetooth.pptxData_Processing_and_communication_bluetooth.pptx
Data_Processing_and_communication_bluetooth.pptx
 
Living on the iot edge
Living on the iot edgeLiving on the iot edge
Living on the iot edge
 
IoT Control Units and Communication Models
IoT Control Units and Communication ModelsIoT Control Units and Communication Models
IoT Control Units and Communication Models
 

More from Techvilla

Raspberry pi Part 26
Raspberry pi Part 26Raspberry pi Part 26
Raspberry pi Part 26
Techvilla
 
Raspberry pi Part 25
Raspberry pi Part 25Raspberry pi Part 25
Raspberry pi Part 25
Techvilla
 
Raspberry pi Part 24
Raspberry pi Part 24Raspberry pi Part 24
Raspberry pi Part 24
Techvilla
 
Raspberry pi Part 23
Raspberry pi Part 23Raspberry pi Part 23
Raspberry pi Part 23
Techvilla
 
Raspberry pi Part 22
Raspberry pi Part 22Raspberry pi Part 22
Raspberry pi Part 22
Techvilla
 
Raspberry pi Part 21
Raspberry pi Part 21Raspberry pi Part 21
Raspberry pi Part 21
Techvilla
 
Raspberry pi Part 20
Raspberry pi Part 20Raspberry pi Part 20
Raspberry pi Part 20
Techvilla
 
Raspberry pi Part 19
Raspberry pi Part 19Raspberry pi Part 19
Raspberry pi Part 19
Techvilla
 
Raspberry pi Part 18
Raspberry pi Part 18Raspberry pi Part 18
Raspberry pi Part 18
Techvilla
 
Raspberry pi Part 17
Raspberry pi Part 17Raspberry pi Part 17
Raspberry pi Part 17
Techvilla
 
Raspberry pi Part 16
Raspberry pi Part 16Raspberry pi Part 16
Raspberry pi Part 16
Techvilla
 
Rasperry pi Part 15
Rasperry pi Part 15Rasperry pi Part 15
Rasperry pi Part 15
Techvilla
 
Rasperry pi Part 13
Rasperry pi Part 13Rasperry pi Part 13
Rasperry pi Part 13
Techvilla
 
Rasperry pi Part 12
Rasperry pi Part 12Rasperry pi Part 12
Rasperry pi Part 12
Techvilla
 
Rasperry pi Part 10
Rasperry pi Part 10Rasperry pi Part 10
Rasperry pi Part 10
Techvilla
 
Rasperry pi Part 9
Rasperry pi Part 9Rasperry pi Part 9
Rasperry pi Part 9
Techvilla
 
Rasperry pi Part 8
Rasperry pi Part 8Rasperry pi Part 8
Rasperry pi Part 8
Techvilla
 
Rasperry pi Part 7
Rasperry pi Part 7Rasperry pi Part 7
Rasperry pi Part 7
Techvilla
 
Raspberry pi Part 6
Raspberry pi Part 6Raspberry pi Part 6
Raspberry pi Part 6
Techvilla
 
Raspberry pi Part 5
Raspberry pi Part 5Raspberry pi Part 5
Raspberry pi Part 5
Techvilla
 

More from Techvilla (20)

Raspberry pi Part 26
Raspberry pi Part 26Raspberry pi Part 26
Raspberry pi Part 26
 
Raspberry pi Part 25
Raspberry pi Part 25Raspberry pi Part 25
Raspberry pi Part 25
 
Raspberry pi Part 24
Raspberry pi Part 24Raspberry pi Part 24
Raspberry pi Part 24
 
Raspberry pi Part 23
Raspberry pi Part 23Raspberry pi Part 23
Raspberry pi Part 23
 
Raspberry pi Part 22
Raspberry pi Part 22Raspberry pi Part 22
Raspberry pi Part 22
 
Raspberry pi Part 21
Raspberry pi Part 21Raspberry pi Part 21
Raspberry pi Part 21
 
Raspberry pi Part 20
Raspberry pi Part 20Raspberry pi Part 20
Raspberry pi Part 20
 
Raspberry pi Part 19
Raspberry pi Part 19Raspberry pi Part 19
Raspberry pi Part 19
 
Raspberry pi Part 18
Raspberry pi Part 18Raspberry pi Part 18
Raspberry pi Part 18
 
Raspberry pi Part 17
Raspberry pi Part 17Raspberry pi Part 17
Raspberry pi Part 17
 
Raspberry pi Part 16
Raspberry pi Part 16Raspberry pi Part 16
Raspberry pi Part 16
 
Rasperry pi Part 15
Rasperry pi Part 15Rasperry pi Part 15
Rasperry pi Part 15
 
Rasperry pi Part 13
Rasperry pi Part 13Rasperry pi Part 13
Rasperry pi Part 13
 
Rasperry pi Part 12
Rasperry pi Part 12Rasperry pi Part 12
Rasperry pi Part 12
 
Rasperry pi Part 10
Rasperry pi Part 10Rasperry pi Part 10
Rasperry pi Part 10
 
Rasperry pi Part 9
Rasperry pi Part 9Rasperry pi Part 9
Rasperry pi Part 9
 
Rasperry pi Part 8
Rasperry pi Part 8Rasperry pi Part 8
Rasperry pi Part 8
 
Rasperry pi Part 7
Rasperry pi Part 7Rasperry pi Part 7
Rasperry pi Part 7
 
Raspberry pi Part 6
Raspberry pi Part 6Raspberry pi Part 6
Raspberry pi Part 6
 
Raspberry pi Part 5
Raspberry pi Part 5Raspberry pi Part 5
Raspberry pi Part 5
 

Recently uploaded

Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
Textile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdfTextile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdf
NazakatAliKhoso2
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Sinan KOZAK
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
gerogepatton
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
mamunhossenbd75
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
IJECEIAES
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
University of Maribor
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
IJNSA Journal
 
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEMTIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
HODECEDSIET
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
Yasser Mahgoub
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
rpskprasana
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
Hitesh Mohapatra
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
jpsjournal1
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Christina Lin
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
wisnuprabawa3
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
Recycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part IIRecycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part II
Aditya Rajan Patra
 
Engine Lubrication performance System.pdf
Engine Lubrication performance System.pdfEngine Lubrication performance System.pdf
Engine Lubrication performance System.pdf
mamamaam477
 

Recently uploaded (20)

Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
Textile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdfTextile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdf
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
 
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEMTIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
Recycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part IIRecycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part II
 
Engine Lubrication performance System.pdf
Engine Lubrication performance System.pdfEngine Lubrication performance System.pdf
Engine Lubrication performance System.pdf
 

Bluetooth Part-17

  • 3. www.techvilla.org.in3 Bluetooth Origins• Study by Ericsson Mobile Communications in 1994. • Alternatives to cables connecting mobile phones to accessories. • Use of radio links instead of infrared. • Why? • Transmission of data and voice. • Result: Bluetooth spec. • Named after Harald Blatand (Danish for Bluetooth). • 10th century Viking king who united Denmark and Norway.
  • 4. www.techvilla.org.in4 Bluetooth SIG History • Early 1998: Bluetooth SIG is formed. • Promoter company group: Ericsson, IBM, Intel, Nokia, Toshiba. • Goal: develop license-free technology for universal wireless connectivity. • Target: handheld market. • Bluetooth spec: defines RF wireless communication interface and protocols.
  • 5. www.techvilla.org.in5 Bluetooth SIG History • May 1998: Public announcement of Bluetooth SIG. • July 1999: 1.0A spec (>1,500 pages) published. • December 1999: version 1.0B released. • December 1999: promoters increases to 9. • 3Com, Lucent, Microsoft, Motorola • February 2000: 1,800+ adopters. • February 2001: version 1.1 out.
  • 6. www.techvilla.org.in6 Goals• Open spec. • Low cost. • In order to replace cables, should have similar cost. • Cell phone cable is ~ $10. • Power efficiency. • Lightweight and small form factor. • Easy to use. • Reliable and resilient to failures.
  • 7. www.techvilla.org.in7 The Bluetooth Standard • Defines a protocol stack to enable heterogeneous devices to communicate. • The Bluetooth stack includes protocols for the radio layer all the way up to device discovery, service discovery, etc.
  • 8. www.techvilla.org.in8 Bluetooth Protocol Stack RF Baseband Link Manager L2CAP RFCOMM/SDP Applications Link Controller Host Controller Interface PHY Data Link Layer Network Layer Transport Layer Session Layer Presentation Layer Application OSI/ISO
  • 9. www.techvilla.org.in9 Bluetooth Layers • Radio: physically transmits/receives data. • Baseband/Link Controller: controls PHY. • Link Manager: controls links to other devices. • Host Controller:e2e communication. • Logical Link Control: multiplexes/demultiplexes data from higher layers. • RFCOMM: RS323-like serial interface. • SDP: allows service discovery among Bluetooth devices.
  • 11. www.techvilla.org.in11 Radio Band • 2.4 GHz license-free ISM band. • Available worldwide. • Industrial, Scientific, Medical (ISM) band. • Unlicensed, globally available. • Centered around 2.4 GHz. • Resilient to interference. • Frequency hopping. • Range: 10, 20, and 100m. • 1MB/s.
  • 12. www.techvilla.org.in12 Unlicensed Radio Spectrum 902 Mhz 928 Mhz 26 Mhz 83.5 Mhz 125 Mhz 2.4 Ghz 2.4835 Ghz 5.725 Ghz 5.785 Ghz cordless phones baby monitors Wireless LANs 802.11 Bluetooth Microwave oven unused λ 33cm 12cm 5cm
  • 13. www.techvilla.org.in13 Bluetooth Radio Link • MA scheme: Frequency hopping spread spectrum. • 2.402 GHz + k MHz, k=0, …, 78 • 1,600 hops per second. • 1 Mb/s data rate. . . . 1Mhz 1 2 3 79 83.5 Mhz
  • 14. www.techvilla.org.in14 BT Radio Link (Cont’d) • Time-division duplex (TDD) • Separation of Xmission and reception in time. • Units alternate transmits and receives. • Gaussian Frequency Shift Keying (G-FSK) modulation. • ‘1’s as positive frequency deviations from carrier frequency; ‘0’s as negative deviations.
  • 15. www.techvilla.org.in15 Multiple Access • BT targets large number of independent communications active in the same area at the same time. • Single FH channel: 1 Mb/s. • Each 1Mb/s channel shared by limited number of participants. • In target user scenarios, it’s unlikely that all units in-range will share data among all of them. • 1 MB/s is reasonable. (is it?) • Theoretically, total bandwidth is 79 Mb/s. • In practice, < 79 Mb/s since codes are non-orthogonal.
  • 16. www.techvilla.org.in16 Baseband Carries out MAC functions. RF Baseband Link Manager L2CAP RFCOMM/SDP Applications Link Controller Host Controller Interface Control end of baseband +link controller= Data link layer
  • 17. www.techvilla.org.in17 Master and Slaves • Communicating devices must agree on hopping sequence. • BT devices can operate as masters or slaves. • Master node defines sequence to be used. • Slave units use master id to pick sequence. • Master also controls when devices are allowed to transmit. • Master allocates slots to slaves. • Allocates total available bandwidth among slaves.
  • 18. www.techvilla.org.in18 Piconets • BT communication takes place over piconets. • Piconet formation initiated by master. • All other participants are slaves. • Number of participants limited to 8 (1 master and 7 slaves). • Channel capacity and addressing overhead. • Each slave assigned a locally unique ID. • Master/slave roles last for the duration of the piconet.
  • 19. www.techvilla.org.in19 More on Piconets • On a piconet, slaves only have direct links to master. • Point-to-point or point-to-multipoint connections.
  • 20. www.techvilla.org.in20 Piconets: Considerations • Most target applications involve local communication among small group of devices. • Piconets with up to 8 nodes match well. • If many groups of devices active simultaneously, each group as separate piconet. • Overlapping piconets can coexist.
  • 21. www.techvilla.org.in21 Contention-Free MA • Master and slaves. • Master performs medium access control. • Schedules traffic through polling. • Time slots alternate between master and slave transmission. • Master-slave: master includes slave address. • Slave-master: only slave chosen by master in previous master-slave slot allowed to transmit. • If master has data to send to a slave, slave polled implicitly; otherwise, explicit poll.
  • 22. www.techvilla.org.in22 BT States Standby Inquiry Page Transmit Connected Park Hold Sniff Unconnected Connecting Active Low power . Initially, all nodes in standby. . Node (master) can begin inquiry to find nearby devices. . Piconet is then formed. . Devices join by paging.
  • 24. www.techvilla.org.in24 Paging Master Active Slave Parked Slave Standby • Device enters paging to invite others to join its piconet. • Establishes links with nodes in proximity. • Paging message unicast to selected receiver. • Receiver sends ACK. • Sender becomes master, receiver slave.
  • 25. www.techvilla.org.in25 Piconet New Node Admission • Master can actively try to discover new nodes or wait (in scan/listen mode) to be discovered. • Communication in the current piconet suspended. • Admission latency versus piconet capacity tradeoff.
  • 26. www.techvilla.org.in26 Bluetooth Link Formation • Point-to-point link: • Master-slave relationship. m s s s m s • Piconet: – 8 units: channel capacity. – Master (establishes piconet) can connect to up to 7 slaves. – Master/slave relationship lasts while link/piconet lasts. – No slave-to-slave communication.
  • 27. www.techvilla.org.in27 Link Types • 2 types of links: • Synchronous (SCO) links: • Point-to-point between master and slave. • Link established by reserving slots in either direction periodically. • Used to carry real-time traffic (voice). • Asynchronous (ACL) links: • Point-to-multipoint between master and slaves. • Use remaining slots on channel. • Traffic scheduled by master.
  • 28. www.techvilla.org.in28 Error Control • Supports both FEC and retransmission. • FEC for SCO packets. • ARQ for ACL traffic. • If no ACKs, retransmit. • Stop-and-wait ARQ. • Fast-ARQ: ACK included in RX slot immediately following the TX slot in which packet was sent. • CRC to check for errors.
  • 29. www.techvilla.org.in29 Packet Format 72 bits 54 bits 0 - 2744 bits Access code Header Payload DataVoice CRC No CRC No retries 625 µs master slave header ARQ FEC (optional) FEC (optional)
  • 30. www.techvilla.org.in30 Access Code • Address of piconet master. Access code Header Payload 72 bits
  • 31. www.techvilla.org.in31 Packet Header • Addressing (3) • Packet type (4) • Flow control (1) • 1-bit ARQ (1) • Sequencing (1) • HEC (8) Access code Header Payload 54 bits Purpose Broadcast packets are not ACKed For filtering retransmitted packets 18 bitstotal s s m s 16 packet types (some unused) Max 7 active slaves Verify header integrity
  • 32. www.techvilla.org.in32 Multiple Piconets • Piconets may overlap in space and time. • They can work independently. • Each with its own hopping sequence. • Packets with different access codes. • Or they can overlap, i.e., nodes can participate in more than 1 piconet. • “Time sharing”.
  • 34. www.techvilla.org.in34 Scatternets (cont’d…) • Interconnection by bridge nodes. • Bridge nodes are members of piconets they interconnect. • Bridge node “stay” in a piconet for some time, then switch to another piconet by changing hop sequence. • Do this for all member piconets. • Send and receive in each piconet. • Forward from one piconet to another.
  • 35. www.techvilla.org.in35 Link Controller and Link Manager RF Baseband Link Manager L2CAP RFCOMM/SDP Applications Link Controller Host Controller Interface Carries out inquiry and paging operations; manages multiple links and different piconets. Attaching/detaching slaves from piconet; power management; security.
  • 36. www.techvilla.org.in36 Power Management • Low-power modes: prolong battery life. • Devices can be turned-off when idle. • Devices wake up periodically to send/receive data.
  • 37. www.techvilla.org.in37 Low-Power Operation • 3 modes: • Hold: node sleeps for specified interval. • Master can put slaves in hold while searching for new members, attending another piconet, etc. • No ACL packets. • Sniff: slave low-duty cycle mode. • Slave wakes up periodically to talk to master. • Fixed “sniff” intervals. • Park: • Very low power state. • Used to admit more than 7 slaves in piconet. • Slave gives up its active member address. • Receives “parked” member address. • Wakes up periodically listening for broadcasts which can be used to “unpark” node.
  • 38. www.techvilla.org.in38 Security • Authentication and encryption. • LMP provides mechanisms for negotiation of encryption modes, keys, etc.
  • 39. www.techvilla.org.in39 Host Controller Interface RF Baseband Link Manager L2CAP RFCOMM/SDP Applications Link Controller Host Controller Interface Optional interface layer between higher and lower layers of the BT stack. E.g., when lower- and higher BT layers run on different Devices: PCMCIA card and PC’s processor.
  • 40. www.techvilla.org.in40 L2CAP Logical Link Control and Adaptation Protocol= Session Layer. L2CAP provides • Protocol multiplexing • Quality of service negotiationRF Baseband Link Manager L2CAP RFCOMM/SDP Applications Link Controller Host Controller Interface
  • 42. 42 Features Cost 20 dBm (~100 m) Point-to-multipoint No Scatternet Applications File Transfer, Dial-Up Networking LAN access, Fax, … 169 $ --- 200 $ 0 dBm (~10 m) Point-to-multipoint No Scatternet File Transfer, Dial-Up Networking LAN access, Fax, … 169 $ --- Company Toshiba, Motorola, Digianswer IBM, TDK 3COM 10 m user-user; 100 m user-Base Station Point-to-multipoint SW- & FW-upgradeable File Transfer, Dial-Up Networking LAN access, Fax, E-mail Unconscious connection 149 $ Nokia 10 m user-user; Point-to-point Connectivity Battery for the cell phone File Transfer, Dial-Up Networking LAN access, Fax, E-mail Unconscious connection 149 $ Ericsson, Sigma 10 m user-user; Point-to-point; ARM processor; USB; RFCOMM ports Basic BT Radio stack Embedded or Host stack Programmable 500 $ 1500$ Bluetooth on the market:Bluetooth on the market: PC cards, Cell phones, Head sets, Chip sets,…
  • 45. www.techvilla.org.in HC-05 working • HC-05 embedded Bluetooth serial communication module has two work modes: • order-response work mode and automatic connection work mode. • there are three work roles (Master, Slave and Loopback) at the automatic connection work mode. • When the module is at the automatic connection work mode, it will follow the default way set lastly to transmit the data automatically.
  • 46. www.techvilla.org.in • When the module is at the order-response work mode, user can send the AT command to the module to set the control parameters and sent control order. • The work mode of module can be switched by controlling the module PIN (PIO11) input level.

Editor's Notes

  1. Mention that over SCO link you cannot carry any other real-time traffic. There is no protocol-id field in the SCO header/payload. Is this really true?
  2. How useful is header protection when payload is unprotected