SlideShare a Scribd company logo
Bluetooth Technology
1
Abstract
Bluetooth is a new short-range wireless technology designed to enable wireless communication
between diverse devices. It is gaining increasing popularity and acceptance in the world today.
There is a growing body of research on the subject, but very few, if any of the analyses, provided
balanced view of the technology which describes its pros and cons and implications for
businesses. This paper attempts to critically analyze the Bluetooth technology from a various
perspectives. It begins with a description of the technology in terms of its hardware, software,
and network infrastructure. Then it addresses the related issues of interference, security, and
reliability. This microanalysis is followed by a larger macro analytical view, which includes the
advantages of this technology, its role in the global third generation (3G) wireless scheme,
health/safety issues, and business implications. It concludes with the applications of Bluetooth
and its future potential Bluetooth is a wireless communication protocol. Since it's a
communication protocol, you can use Bluetooth to communicate to other Bluetooth-enabled
devices. In this sense, Bluetooth is like any other communication protocol that you use every
day, such as HTTP, FTP, SMTP, or IMAP. Bluetooth has a client-server architecture; the one
that initiates the connection is the client, and the one who receives the connection is the server.
Bluetooth is a great protocol for wireless communication because it's capable of transmitting data
at nearly 1MB/s, while consuming 1/100th of the power of Wi-Fi. We discuss criteria for
different types of scatternets and establish general models of scatternet topologies. Then we
review the state-of-the-art approaches with respect to Bluetooth scatternet formation and contrast
them.
Bluetooth Technology
2
Introduction to Bluetooth Technology
Bluetooth is a radio frequency specification for short range, point to point and point to multi
point voice and data transfer. Bluetooth technology facilitates the replacement of cables normally
used to connect one device to another by a short range radio link. With the help of blue tooth we
can operate our keyboard and mouse without direct connection of CPU. Printers, fax machines,
headphone, mouse, keyboard or any other digital devices can be part of Bluetooth system.
In spite of facilitating the replacement of cables, Bluetooth technology works as an universal
medium to bridge the existing data networks, a peripheral interface for existing devices and
provide a mechanism to form short ad hoc network of connected devices away from fixed
network infrastructures.
Due to their independence on short range radio link, Bluetooth devices do not require a line of
site connection in order to communicate. Therefore a computer can print information on a printer
if printer is in inside the room. Two blue tooth devices can talk to each other when they come
within range of 10 meters to each other.
Bluetooth technology represents an opportunity for the industry to deliver wireless solutions that
are ubiquitous across a broad range of devices. Bluetooth wireless technology is a cable
replacement technology that provides wireless communication between portable devices, desktop
devices and peripherals. It is used to swap data and synchronize files between devices without
having to connect each other with cable. The wireless link has a range of 10m which offers the
user mobility. This technology can be used to make wireless data connection to conventional
local area networks (LAN) through an access point. There is no need for the user to open an
application or press button to initiate a process. Bluetooth wireless technology is always on and
runs in the background. Bluetooth devices scan for other Bluetooth devices and when these
devices are in range they start to exchange messages so they can become aware of each others
capabilities. These devices do not require a line of sight to transmit data with each other.
Within a few years about 80 percent of the mobile phones are expected to carry the Bluetooth
chip. The Bluetooth transceiver operates in the globally available unlicensed ISM radio band of
2.4GHz. The ISM bands include frequency range at 902MHz to 928MHz and 2.4GHz to
2.484GHZ which do not require operator license from a regulatory agency. This means that
Bluetooth technology can be used virtually anywhere in the world. Another type of wireless
technology that is being used nowadays is infrared signals. The choice of using either one of the
wireless technology will depend on the application for which it is being used. Bluetooth is an
economical, wireless solution that is convenient, reliable, easy to use and operates over a longer
distance than infrared. The initial development started in 1994 by Ericsson. Bluetooth now has a
special interest group (SIG) which has 1800 companies worldwide. Bluetooth technology
enables voice and data transmission in a short-range radio.
Bluetooth Technology
3
There is a wide range of devises which can be connected easily and quickly without the need for
cables. Soon people world over will enjoy the convenience, speed and security of instant wireless
connection. Bluetooth is expected to be embedded in hundreds of millions mobile phones, PCs,
laptops and a whole range of other electronic devices in the next few years. This is mainly
because of the elimination of cables and this makes the work environment look and feel
comfortable and inviting.
Why it’s name is Bluetooth?
While many new technologies bear technical names, like RS-232 or IEEE
802.11b, Bluetooth, the wireless technology, is different.
Bluetooth was named for the 10th Century Viking king Harald Blatand (A.K.A., Bluetooth) who
peacefully united all the tiny island kingdoms of Denmark, southern Sweden, and southern
Norway into one country In keeping with its namesake, Bluetooth, the new low-cost radio
technology, is designed to unite or connect all different types of devices to effectively work as
one. By uniting devices, Bluetooth eliminates the need for cabling in a wide range of products,
including cellular phones, PCs, headphones, audio equipment, printers, and many more.
Bluetooth Definitions
 Piconet: Devices connected in an ad hoc fashion that is, not requiring predefinition and
planning, as with a standard network. Two to eight devices can be networked into a piconet.
It is a peer network that is, once connected each device has equal access to the others.
However, one device is defined as master, and the others as slaves.
 Scatternet: Several piconets may form a larger scatternet with each piconet maintaining
independence.
 Master unit: The master in a piconet whose clock and hopping sequence synchronizes the
other devices.
 Slave unit: Devices in a piconet that are not the master.
 MAC address: Three bit address that distinguishes each unit in a piconet.
 Parked units: Piconet devices that are synchronized but don't have MAC addresses.
 Sniff and hold mode: Power-saving mode of a piconet device.
Bluetooth Technology
4
How Bluetooth Technology Work
BLUETOOTH PROTOCOL ARCHITECTURE:
As the report is designed mainly for the spread spectrum techniques course, the protocols
in the lower level are described more extensively and the upper layer protocols are just
mentioned with a very brief description.
Moreover, one should note that the upper layer protocols are totally dependent on the
lower level protocols whereas the lower level protocols can function independently even with a
totally different set of upper protocols.
Bluetooth Radio: The Bluetooth Radio (layer) is the lowest defined layer of the Bluetooth
specification. It defines the requirements of the Bluetooth transceiver device operating in the
2.4GHz ISM band. The Bluetooth air interface is based on three power classes,
 Power Class 1: designed for long range (~100m), max output power of 20 dBm,
 Power Class 2: ordinary range devices (~10m), max output power of 4 dBm,
 Power Class 3 short range devices (~10cm), with a max output power of 0 dBm.
Bluetooth Technology
5
The radio uses Frequency Hopping to spread the energy across the ISM spectrum in 79 hops
displaced by 1MHz, starting at 2.402GHz and stopping at 2.480GHz.Some countries use the 79
RF channels whereas countries like Japan use 23 channels. Currently, the SIG is working to
harmonize this 79-channel radio to work globally and has instigated changes within Japan,
Spain, and other countries. Also, the Bluetooth radio module uses GFSK (Gaussian Frequency
Shift Keying) where a binary one is represented by a positive frequency deviation and a binary
zero by a negative frequency deviation. BT is set to 0.5 and the modulation index must be
between 0.28 and 0.35. The receiver must have a sensitivity level for which the bit error rate
(BER) 0.1% is met. For Bluetooth this means an actual sensitivity level of -70dBm or better.
Baseband: The Baseband is the physical layer of the Bluetooth. It manages physical channels
and links apart from other services like error correction, data whitening, hop selection and
Bluetooth security. As mentioned previously, the basic radio is a hybrid spread spectrum radio.
Typically, the radio operates in a frequency-hopping manner in which the 2.4GHz ISM band is
broken into 79 1MHz channels that the radio randomly hops through while transmitting and
receiving data. A piconet is formed when one Bluetooth radio connects to another Bluetooth
radio.
Both radios then hop together through the 79 channels. The Bluetooth radio system supports a
large number of piconets by providing each piconet with its own set of random hopping patterns.
Occasionally, piconets will end up on the same channel. When this occurs, the radios will hop to
a free channel and the data are retransmitted (if lost). The Bluetooth frame consists of a transmit
packet followed by a receive packet. Each packet can be composed of multiple slots (1, 3, or 5)
of 625us. A typical single slot frame typically hops at 1,600 hops/second. Multi-slot frames
allow higher data rates because of the elimination of the turn-around time between packets and
the reduction in header overhead.
LMP: The Link Manager Protocol is used by the Link Managers (on either side) for link set-up
and control.
HCI: The Host Controller Interface provides a command interface to the Baseband Link
Controller and Link Manager, and access to hardware status and control registers.
L2CAP: Logical Link Control And adaptation Protocol supports higher level protocol
multiplexing, packet segmentation and reassembly, and the conveying of quality of service
information.
RFCOMM: The RFCOMM protocol provides emulation of serial ports over the
L2CAPprotocol. The protocol is based on the ETSI standard TS 07.10.
Bluetooth Technology
6
SDP: The Service Discovery Protocol provides a means for applications to discover which
services are provided by or available through a Bluetooth device. It also allows applications to
determine the characteristics of those available services. The technology of Bluetooth centers
around 9mm x 9mm microchip, which functions as a low cost and short range radio link.
Bluetooth Technology provide a 10 meter personal bubble that support simultaneous
transmission of both voice and data for multiple devices. Up to 8 devices can be connected in a
piconet, and to 10 piconets can exist within the 10 meter bubble. Each piconet support up to 3
simultaneous full duplex voice devices. The gross data rate is 1 Mb/s, but the actual data rate are
432 kbps for full Duplex transmission,721/56kbps for asymmetric transmission, and 384 kbps for
tms 2000 transmission. Bluetooth wireless technology is designed to be as secure as a wire with
up to 128-bit public/private key authentication, and streaming cipher up to 64 bit based on a5
security.
Transmission types and rates :
The baseband (single channel per line) protocol combines circuit and packet switching. To
assure that packets do not arrive out of order, slots (up to five) can be reserved for
synchronous packets. As noted earlier, a different hop signal is used for each packet. Circuit
switching can be either asynchronous or synchronous. Up to three synchronous (voice) data
channels, or one synchronous and one asynchronous data channel, can be supported on one
channel. Each synchronous channel can support a 64 Kb/s transfer rate, which is fully
adequate for voice transmissions. An asynchronous channel can transmit as much as 721
Kb/s in one direction and 57.6 Kb/s in the opposite direction. It is also possible for an
asynchronous connection to support 432.6 Kb/s in both directions if the link is symmetric.
Radio frequency and spectrum hopping :
What if there's a lot of radio noise? Won't that interfere with Bluetooth connections? As a
rule, the answer is no. It is designed to use fast acknowledgement and frequency hopping,
which will make connections robust. It is packet-based, and will jump to a new frequency
after each packet is received, which not only helps limit interference problems, but also adds
to security. Data rates are one megabyte/second, including headers. Full duplex transmissions
(both directions at once) are accomplished via time division multiplexing.
The Bluetooth radio chip functions at 2.4 gigahertz, which is in the unlicensed ISM
(Industrial Scientific Medical) band. It separates the 2.4 gigahertz frequency band into 79
hops one megahertz apart, starting with 2.402 and ending with 2.480 (though this bandwidth
is narrower in Japan, France, and Spain). This spread spectrum is used to hop from one
channel to another, pseudo-randomly, which adds a strong layer of security. Up to 1600 hops
Bluetooth Technology
7
per second can be made. The standard frequency range is 10 centimeters to 10 meters, and
can be extended to at least 100 meters by increasing transmission power.
Data transmission:
Data can be transmitted both synchronously and asynchronously. The Synchronous
Connection Oriented (SCO) method is used primarily for voice, and Asynchronous
Connectionless (ACL) is primarily for data. Within a piconet, each master-slave pair can use
a different transmission mode, and modes can be changed at any time. Time Division Duplex
(TDD) is used by both SCO and ACL, and both support 16 types of packets, four of which
are control packets that are the same in each type. Because of the need for smoothness in data
transmission, SCO packets are generally delivered via reserved intervals, that is, the packets
are sent in groups without allowing other transmissions to interrupt. SCO packets can be
transmitted without polling by the sending unit. ACL links support both symmetric and
asymmetric transmissions.
Bandwidth is controlled by the master unit, which determines how much of the total each
slave unit can use. Slaves cannot transmit data until they have been polled by the master, and
the master can broadcast messages to the slave units via ACL link.
Network arrangement:
Bluetooth network arrangements (topology) can be either point-to-point or point-to-multipoint.
Any unit in a piconet can establish a connection to another piconet to form a scatternet. See
the figure, which diagrams a scatternet in which piconet A, which consists of four units, is
connected to piconet B, consisting of two units. Note that the master unit of A is not the link
Bluetooth network arrangements (topology) can between the two piconets.
Bluetooth Technology
8
Error correction and security:
on code (FEC), 2/3 rate forward error correction code FEC, and automatic repeat request
(ARQ). The FEC methods are designed to reduce the number of retransmissions. However,
the over a Three error correction techniques have been defined: 1/3 rate forward error
corrected significantly slows transmissions, so is generally not used in relatively error-free
environments, with the exception of packet headers. The ARQ scheme requires that the
header error and cyclic redundancy checks are okay. When they are an acknowledge is sent.
When they aren't, the data is resent.
Security is provided in three ways: through pseudo-random frequency band hops,
authentication, and encryption. Frequency band hops make it difficult for anyone to
eavesdrop. Authentication allows a user to control connectivity to only devices specified.
Encryption uses secret key lengths of 1, 40, and 64 bits. The quality of security is excellent
for most applications. However, it is not the highest level available, and for those users who
require it, the suggestion is to investigate separate network transfer protocols and security
software.
Bluetooth Special Interest group (SIG)
Bluetooth special group is group of companies working together to define, developed
promote an open royalty free specification for seamless wireless connectivity and cable
replacement for a wide variety of mobility-enhancing devices. The original charter of the SIG is
to monitor the technical development of a short range radio and to create an open global
standard. It prevent the technology from becoming the property of any single company.
In developing the Bluetooth specification, the SIG is strictly adhering to some basic principles
that that can be summed up in five key words: freedom, security, simplicity, versatility and
reliability. These keywords are the foundation of Bluetooth technology. To be Bluetooth
certified, a device must pass interoperability testing by the Bluetooth Special Interest Group thus
assuring that products meeting the specification will be able to interact with all other Bluetooth-
certified products and with the Internet.
In february1998, the Special Interest Group (SIG) was formed. The founding SIG member are
Ericsson, Intel, IBM, Nokia & Toshiba. Since then over 2000 adopter have joined including
Compaq, Lucent, Motorola and 3com.
Bluetooth Technology
9
Bluetooth Characteristics:
These are the features of the Bluetooth technology:
 It separates the frequency band into hops. This spread spectrum is used to hop from one
channel to another, which adds a strong layer of security.
 Up to eight devices can be networked in a piconet.
 Signals can be transmitted through walls and briefcases, thus eliminating the need for line-of-
sight.
 Devices do not need to be pointed at each other, as signals are omni-directional.
 Both synchronous and asynchronous applications are supported, making it easy to implement
on a variety of devices and for a variety of services, such as voice and Internet.
 Governments worldwide regulate it, so it is possible to utilize the same standard wherever
one travels.
Bluetooth in the Future
What is the future direction of the Bluetooth standard?
At this time, we anticipate the Bluetooth SIG to evolve the Bluetooth technology to provide
greater bandwidth & distances, thus increasing the potential platforms & applications used in the
emerging personal area-networking marketplace.
What is the future of Bluetooth?
Bluetooth is a continually expanding technology. There are plans to add many new application
profiles. With over 1800 companies working on Bluetooth, the future could not be brighter. With
a strong special interest group behind Bluetooth, the standardization of the application profiles is
almost assured.
According to market researchers, Cahners In-Stat Group, it is anticipated that as many as 670
million products will have Bluetooth built-in by the year 2005.
Will the speed of Bluetooth increase?
Some members of the Bluetooth SIG such as Sony & Eastman Kodak are interested in seeing the
speed of Bluetooth increasing for applications such as streaming video. Proposals are under
consideration but it is not clear when products based on any of the proposals would be available
Bluetooth Technology
10
ADVANTAGES OF BLUETOOTH TECHNOLOGY
 Bluetooth devices are wireless
 Bluetooth technology is inexpensive
 Bluetooth is automatic
 Share voice and data
 Low energy consumption
 Accessible from anywhere
 Easy to use
DISADVANTAGES OF BLUETOOTH TECHNOLOGY
 Relatively short range
 Less secure
 Interference with other devices
 Mediocre Data rates
 Bluetooth internet connection gets slow sometimes
APPLICATIONS
Smart Home
Homes equipped with Bluetooth devices may be able to recognize the arrival of its bonafide
residents and unlock the door on their arrival. The device will also adjust heat to a preset
temperature. While this is happening, the data from the individual’s PDA may be exchanged
with the home electronic board, and the family calendar is updated
to reflect the scheduled activities in the office.
The Internet Bridge
An extension of this model could be a mobile computer that allows surfing the Internet
irrespective of the location of the user, and regardless of whether the user is cordlessly connected
through a mobile phone (cellular) or through a wire line connection (e.g. PSTN, ISDN, LAN,
xDSL).
Automatic Check-in:

Hotels are testing, or plan to test, services that allow guests to check in, unlock room doors and
even control room temperature with handheld devices equipped with Bluetooth Technology.
Bluetooth Technology
11

The Bluetooth enabled mobile phone or the PDA can present the electronic ticket to the airline
system without one having to go through the queue at the check-in counters. The airline's on-line
system performs the identification via the ID-tag feature built into the mobile phone or the PDA
and confirms the reserved seat.
The Three-in-one Phone
With Bluetooth support, one handset will be able to provide multiple functionality. When at
home, the phone functions as a cordless phone, connected to the fixed line. When on the move, it
functions as a mobile phone connected to the mobile network. Additionally, when the phone
comes within range of another mobile phone with built-in Bluetooth technology, it functions as a
walkie-talkie.
Summary
A new global standard for data and voice
Eliminates Cables.
Low Power, Low range, Low Cost network devices.
Bluetooth seems to have a bright future after reviewing its benefits and wide use.
Further improvements are planned to be made in
Data Rates
Power Reduction
Range
Bluetooth Technology
12
REFERENCES
1.slideshare.com & Seminarproject.com
2.www.bluetooth.com
3.wikipedia

More Related Content

What's hot

Broadband technology wired and wireless
Broadband technology wired and wireless Broadband technology wired and wireless
Broadband technology wired and wireless
DILSHAD AHMAD
 
Bluetooth Power point presentation
Bluetooth Power point presentationBluetooth Power point presentation
Bluetooth Power point presentation
jogiparthyramya
 
Bluetooth
BluetoothBluetooth
Bluetooth
mpriyanka259
 
Basics of vlsi
Basics of vlsiBasics of vlsi
Topic : B ISDN
Topic : B ISDNTopic : B ISDN
Topic : B ISDN
Dr Rajiv Srivastava
 
Bluetooth presentation
Bluetooth presentationBluetooth presentation
Bluetooth presentation
DhairYash Kotwani
 
Dsl
DslDsl
Physical layer OSI Model & Transmission Media
Physical layer OSI Model & Transmission MediaPhysical layer OSI Model & Transmission Media
Physical layer OSI Model & Transmission Media
Mukesh Chinta
 
Network Layer
Network LayerNetwork Layer
Network Layer
Ghaffar Khan
 
cell phone jammer report
cell phone jammer reportcell phone jammer report
cell phone jammer report
Sameer Gupta
 
Bluetooth
BluetoothBluetooth
Bluetooth
Fahim Faysal
 
3G & 4G : Advantages and disadvantages
3G & 4G : Advantages and disadvantages3G & 4G : Advantages and disadvantages
3G & 4G : Advantages and disadvantages
Junaid Iqbal
 
1G vs 2G vs 3G vs 4G vs 5G
1G vs 2G vs 3G vs 4G vs 5G1G vs 2G vs 3G vs 4G vs 5G
1G vs 2G vs 3G vs 4G vs 5G
Bharathi Ravi
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
sai krish
 
powerline communication system
powerline communication systempowerline communication system
powerline communication system
Ahmed Hassan
 
Ftth development manual part1 (1)
Ftth development manual part1 (1)Ftth development manual part1 (1)
Ftth development manual part1 (1)
Igors Cardoso
 
BUilt-In-Self-Test for VLSI Design
BUilt-In-Self-Test for VLSI DesignBUilt-In-Self-Test for VLSI Design
BUilt-In-Self-Test for VLSI Design
Usha Mehta
 
BLUETOOTH TECHNOLOGY
BLUETOOTH TECHNOLOGYBLUETOOTH TECHNOLOGY
BLUETOOTH TECHNOLOGY
AJAL A J
 
BSNL TRAINING PPT
BSNL TRAINING PPTBSNL TRAINING PPT
BSNL TRAINING PPT
Manideep Srirangam
 
ASIC vs FPGA
ASIC vs FPGAASIC vs FPGA

What's hot (20)

Broadband technology wired and wireless
Broadband technology wired and wireless Broadband technology wired and wireless
Broadband technology wired and wireless
 
Bluetooth Power point presentation
Bluetooth Power point presentationBluetooth Power point presentation
Bluetooth Power point presentation
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Basics of vlsi
Basics of vlsiBasics of vlsi
Basics of vlsi
 
Topic : B ISDN
Topic : B ISDNTopic : B ISDN
Topic : B ISDN
 
Bluetooth presentation
Bluetooth presentationBluetooth presentation
Bluetooth presentation
 
Dsl
DslDsl
Dsl
 
Physical layer OSI Model & Transmission Media
Physical layer OSI Model & Transmission MediaPhysical layer OSI Model & Transmission Media
Physical layer OSI Model & Transmission Media
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
cell phone jammer report
cell phone jammer reportcell phone jammer report
cell phone jammer report
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
3G & 4G : Advantages and disadvantages
3G & 4G : Advantages and disadvantages3G & 4G : Advantages and disadvantages
3G & 4G : Advantages and disadvantages
 
1G vs 2G vs 3G vs 4G vs 5G
1G vs 2G vs 3G vs 4G vs 5G1G vs 2G vs 3G vs 4G vs 5G
1G vs 2G vs 3G vs 4G vs 5G
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
 
powerline communication system
powerline communication systempowerline communication system
powerline communication system
 
Ftth development manual part1 (1)
Ftth development manual part1 (1)Ftth development manual part1 (1)
Ftth development manual part1 (1)
 
BUilt-In-Self-Test for VLSI Design
BUilt-In-Self-Test for VLSI DesignBUilt-In-Self-Test for VLSI Design
BUilt-In-Self-Test for VLSI Design
 
BLUETOOTH TECHNOLOGY
BLUETOOTH TECHNOLOGYBLUETOOTH TECHNOLOGY
BLUETOOTH TECHNOLOGY
 
BSNL TRAINING PPT
BSNL TRAINING PPTBSNL TRAINING PPT
BSNL TRAINING PPT
 
ASIC vs FPGA
ASIC vs FPGAASIC vs FPGA
ASIC vs FPGA
 

Viewers also liked

บทที่ 6
บทที่  6บทที่  6
บทที่ 6
Rank Saharath
 
Osteogénesis Imperfecta k
Osteogénesis Imperfecta kOsteogénesis Imperfecta k
Osteogénesis Imperfecta k
Kidaly1993
 
บทที่ 6
บทที่  6บทที่  6
บทที่ 6
Rank Saharath
 
5กระบวนการวิทยาศาสตร์(สมเกียรติ วิชาการ)
5กระบวนการวิทยาศาสตร์(สมเกียรติ วิชาการ)5กระบวนการวิทยาศาสตร์(สมเกียรติ วิชาการ)
5กระบวนการวิทยาศาสตร์(สมเกียรติ วิชาการ)Rank Saharath
 
Altus exertus-specification
Altus exertus-specificationAltus exertus-specification
Altus exertus-specification
patel170591
 
บทที่ 6
บทที่  6บทที่  6
บทที่ 6
Rank Saharath
 
Pedoman hut ke 69
Pedoman hut ke 69Pedoman hut ke 69
Pedoman hut ke 69
Cak Al-Faqiir
 
Setia selam-ii-meds
Setia selam-ii-medsSetia selam-ii-meds
Setia selam-ii-meds
patel170591
 
Security in digital voting system
Security in digital voting systemSecurity in digital voting system
Security in digital voting system
Madlena Pavlova
 
ใบงานที่ 11 แผ่นพับ
ใบงานที่ 11 แผ่นพับใบงานที่ 11 แผ่นพับ
ใบงานที่ 11 แผ่นพับ
Rank Saharath
 
Altus optimus-specification
Altus optimus-specificationAltus optimus-specification
Altus optimus-specification
patel170591
 
P iaget
P iagetP iaget
P iaget
Abdul Ali
 
Sat dhruv-specification1
Sat dhruv-specification1Sat dhruv-specification1
Sat dhruv-specification1
patel170591
 
Investigating the potential of Big Data Analyticv2
Investigating   the potential  of Big  Data Analyticv2Investigating   the potential  of Big  Data Analyticv2
Investigating the potential of Big Data Analyticv2
Madlena Pavlova
 

Viewers also liked (15)

บทที่ 6
บทที่  6บทที่  6
บทที่ 6
 
Osteogénesis Imperfecta k
Osteogénesis Imperfecta kOsteogénesis Imperfecta k
Osteogénesis Imperfecta k
 
Campus fashion
Campus fashionCampus fashion
Campus fashion
 
บทที่ 6
บทที่  6บทที่  6
บทที่ 6
 
5กระบวนการวิทยาศาสตร์(สมเกียรติ วิชาการ)
5กระบวนการวิทยาศาสตร์(สมเกียรติ วิชาการ)5กระบวนการวิทยาศาสตร์(สมเกียรติ วิชาการ)
5กระบวนการวิทยาศาสตร์(สมเกียรติ วิชาการ)
 
Altus exertus-specification
Altus exertus-specificationAltus exertus-specification
Altus exertus-specification
 
บทที่ 6
บทที่  6บทที่  6
บทที่ 6
 
Pedoman hut ke 69
Pedoman hut ke 69Pedoman hut ke 69
Pedoman hut ke 69
 
Setia selam-ii-meds
Setia selam-ii-medsSetia selam-ii-meds
Setia selam-ii-meds
 
Security in digital voting system
Security in digital voting systemSecurity in digital voting system
Security in digital voting system
 
ใบงานที่ 11 แผ่นพับ
ใบงานที่ 11 แผ่นพับใบงานที่ 11 แผ่นพับ
ใบงานที่ 11 แผ่นพับ
 
Altus optimus-specification
Altus optimus-specificationAltus optimus-specification
Altus optimus-specification
 
P iaget
P iagetP iaget
P iaget
 
Sat dhruv-specification1
Sat dhruv-specification1Sat dhruv-specification1
Sat dhruv-specification1
 
Investigating the potential of Big Data Analyticv2
Investigating   the potential  of Big  Data Analyticv2Investigating   the potential  of Big  Data Analyticv2
Investigating the potential of Big Data Analyticv2
 

Similar to Bluetooth technology

Bluetooth
BluetoothBluetooth
Bluetooth
JauwadSyed
 
Bluetooth
BluetoothBluetooth
Bluetooth
karunvir
 
Bluetooth k.v
Bluetooth                                k.vBluetooth                                k.v
Bluetooth k.v
karunvir
 
Bluetooth
Bluetooth Bluetooth
Bluetooth
Sajan Sahu
 
Bluetooth
BluetoothBluetooth
Bluetooth
Abinash Dash
 
IT WRITING SAMPLES PORTFOLIO
IT WRITING SAMPLES PORTFOLIOIT WRITING SAMPLES PORTFOLIO
IT WRITING SAMPLES PORTFOLIO
Serena Rinaldi Lambiase
 
Bluetooth.ppt
Bluetooth.pptBluetooth.ppt
Bluetooth.ppt
SarojKumar864774
 
Bluetooth
BluetoothBluetooth
Bluetooth Technology and its uses by Prince Rohan
Bluetooth Technology and its uses by Prince RohanBluetooth Technology and its uses by Prince Rohan
Bluetooth Technology and its uses by Prince Rohan
Rohan Das
 
Khetarpal
KhetarpalKhetarpal
Bluetooth Technology -- detailed explanation
Bluetooth Technology -- detailed explanation Bluetooth Technology -- detailed explanation
Bluetooth Technology -- detailed explanation
Siva Pradeep Bolisetti
 
Bluetooth Technology By Volkan Sevindik
Bluetooth Technology By Volkan SevindikBluetooth Technology By Volkan Sevindik
Bluetooth Technology By Volkan Sevindik
vsevindik
 
Bluetooth- A wireless technology
Bluetooth- A wireless technologyBluetooth- A wireless technology
Bluetooth- A wireless technology
Neha Jella
 
Bluetooth
BluetoothBluetooth
Bluetooth
guestf83f32
 
siddharth bt ppt.pptx
siddharth bt ppt.pptxsiddharth bt ppt.pptx
siddharth bt ppt.pptx
HindujaBairi
 
AN EXPANDED BLUETOOTH NETWORK-A SOLUTION TO THE SHORT RANGE BLUETOOTH COMMUNI...
AN EXPANDED BLUETOOTH NETWORK-A SOLUTION TO THE SHORT RANGE BLUETOOTH COMMUNI...AN EXPANDED BLUETOOTH NETWORK-A SOLUTION TO THE SHORT RANGE BLUETOOTH COMMUNI...
AN EXPANDED BLUETOOTH NETWORK-A SOLUTION TO THE SHORT RANGE BLUETOOTH COMMUNI...
cscpconf
 
Introduction to Bluetooth technology
Introduction to Bluetooth technologyIntroduction to Bluetooth technology
Introduction to Bluetooth technology
David Livingston J
 
bluetooth-151010104202-lva1-app6891.docx
bluetooth-151010104202-lva1-app6891.docxbluetooth-151010104202-lva1-app6891.docx
bluetooth-151010104202-lva1-app6891.docx
LyricsJam
 
A Novel Solution To The Short Range Bluetooth Communication
A Novel Solution To The Short Range Bluetooth Communication   A Novel Solution To The Short Range Bluetooth Communication
A Novel Solution To The Short Range Bluetooth Communication
pijans
 
Bluetooth
BluetoothBluetooth
Bluetooth
Bhushan Bagde
 

Similar to Bluetooth technology (20)

Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth k.v
Bluetooth                                k.vBluetooth                                k.v
Bluetooth k.v
 
Bluetooth
Bluetooth Bluetooth
Bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
IT WRITING SAMPLES PORTFOLIO
IT WRITING SAMPLES PORTFOLIOIT WRITING SAMPLES PORTFOLIO
IT WRITING SAMPLES PORTFOLIO
 
Bluetooth.ppt
Bluetooth.pptBluetooth.ppt
Bluetooth.ppt
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth Technology and its uses by Prince Rohan
Bluetooth Technology and its uses by Prince RohanBluetooth Technology and its uses by Prince Rohan
Bluetooth Technology and its uses by Prince Rohan
 
Khetarpal
KhetarpalKhetarpal
Khetarpal
 
Bluetooth Technology -- detailed explanation
Bluetooth Technology -- detailed explanation Bluetooth Technology -- detailed explanation
Bluetooth Technology -- detailed explanation
 
Bluetooth Technology By Volkan Sevindik
Bluetooth Technology By Volkan SevindikBluetooth Technology By Volkan Sevindik
Bluetooth Technology By Volkan Sevindik
 
Bluetooth- A wireless technology
Bluetooth- A wireless technologyBluetooth- A wireless technology
Bluetooth- A wireless technology
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
siddharth bt ppt.pptx
siddharth bt ppt.pptxsiddharth bt ppt.pptx
siddharth bt ppt.pptx
 
AN EXPANDED BLUETOOTH NETWORK-A SOLUTION TO THE SHORT RANGE BLUETOOTH COMMUNI...
AN EXPANDED BLUETOOTH NETWORK-A SOLUTION TO THE SHORT RANGE BLUETOOTH COMMUNI...AN EXPANDED BLUETOOTH NETWORK-A SOLUTION TO THE SHORT RANGE BLUETOOTH COMMUNI...
AN EXPANDED BLUETOOTH NETWORK-A SOLUTION TO THE SHORT RANGE BLUETOOTH COMMUNI...
 
Introduction to Bluetooth technology
Introduction to Bluetooth technologyIntroduction to Bluetooth technology
Introduction to Bluetooth technology
 
bluetooth-151010104202-lva1-app6891.docx
bluetooth-151010104202-lva1-app6891.docxbluetooth-151010104202-lva1-app6891.docx
bluetooth-151010104202-lva1-app6891.docx
 
A Novel Solution To The Short Range Bluetooth Communication
A Novel Solution To The Short Range Bluetooth Communication   A Novel Solution To The Short Range Bluetooth Communication
A Novel Solution To The Short Range Bluetooth Communication
 
Bluetooth
BluetoothBluetooth
Bluetooth
 

Recently uploaded

Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 

Recently uploaded (20)

Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 

Bluetooth technology

  • 1. Bluetooth Technology 1 Abstract Bluetooth is a new short-range wireless technology designed to enable wireless communication between diverse devices. It is gaining increasing popularity and acceptance in the world today. There is a growing body of research on the subject, but very few, if any of the analyses, provided balanced view of the technology which describes its pros and cons and implications for businesses. This paper attempts to critically analyze the Bluetooth technology from a various perspectives. It begins with a description of the technology in terms of its hardware, software, and network infrastructure. Then it addresses the related issues of interference, security, and reliability. This microanalysis is followed by a larger macro analytical view, which includes the advantages of this technology, its role in the global third generation (3G) wireless scheme, health/safety issues, and business implications. It concludes with the applications of Bluetooth and its future potential Bluetooth is a wireless communication protocol. Since it's a communication protocol, you can use Bluetooth to communicate to other Bluetooth-enabled devices. In this sense, Bluetooth is like any other communication protocol that you use every day, such as HTTP, FTP, SMTP, or IMAP. Bluetooth has a client-server architecture; the one that initiates the connection is the client, and the one who receives the connection is the server. Bluetooth is a great protocol for wireless communication because it's capable of transmitting data at nearly 1MB/s, while consuming 1/100th of the power of Wi-Fi. We discuss criteria for different types of scatternets and establish general models of scatternet topologies. Then we review the state-of-the-art approaches with respect to Bluetooth scatternet formation and contrast them.
  • 2. Bluetooth Technology 2 Introduction to Bluetooth Technology Bluetooth is a radio frequency specification for short range, point to point and point to multi point voice and data transfer. Bluetooth technology facilitates the replacement of cables normally used to connect one device to another by a short range radio link. With the help of blue tooth we can operate our keyboard and mouse without direct connection of CPU. Printers, fax machines, headphone, mouse, keyboard or any other digital devices can be part of Bluetooth system. In spite of facilitating the replacement of cables, Bluetooth technology works as an universal medium to bridge the existing data networks, a peripheral interface for existing devices and provide a mechanism to form short ad hoc network of connected devices away from fixed network infrastructures. Due to their independence on short range radio link, Bluetooth devices do not require a line of site connection in order to communicate. Therefore a computer can print information on a printer if printer is in inside the room. Two blue tooth devices can talk to each other when they come within range of 10 meters to each other. Bluetooth technology represents an opportunity for the industry to deliver wireless solutions that are ubiquitous across a broad range of devices. Bluetooth wireless technology is a cable replacement technology that provides wireless communication between portable devices, desktop devices and peripherals. It is used to swap data and synchronize files between devices without having to connect each other with cable. The wireless link has a range of 10m which offers the user mobility. This technology can be used to make wireless data connection to conventional local area networks (LAN) through an access point. There is no need for the user to open an application or press button to initiate a process. Bluetooth wireless technology is always on and runs in the background. Bluetooth devices scan for other Bluetooth devices and when these devices are in range they start to exchange messages so they can become aware of each others capabilities. These devices do not require a line of sight to transmit data with each other. Within a few years about 80 percent of the mobile phones are expected to carry the Bluetooth chip. The Bluetooth transceiver operates in the globally available unlicensed ISM radio band of 2.4GHz. The ISM bands include frequency range at 902MHz to 928MHz and 2.4GHz to 2.484GHZ which do not require operator license from a regulatory agency. This means that Bluetooth technology can be used virtually anywhere in the world. Another type of wireless technology that is being used nowadays is infrared signals. The choice of using either one of the wireless technology will depend on the application for which it is being used. Bluetooth is an economical, wireless solution that is convenient, reliable, easy to use and operates over a longer distance than infrared. The initial development started in 1994 by Ericsson. Bluetooth now has a special interest group (SIG) which has 1800 companies worldwide. Bluetooth technology enables voice and data transmission in a short-range radio.
  • 3. Bluetooth Technology 3 There is a wide range of devises which can be connected easily and quickly without the need for cables. Soon people world over will enjoy the convenience, speed and security of instant wireless connection. Bluetooth is expected to be embedded in hundreds of millions mobile phones, PCs, laptops and a whole range of other electronic devices in the next few years. This is mainly because of the elimination of cables and this makes the work environment look and feel comfortable and inviting. Why it’s name is Bluetooth? While many new technologies bear technical names, like RS-232 or IEEE 802.11b, Bluetooth, the wireless technology, is different. Bluetooth was named for the 10th Century Viking king Harald Blatand (A.K.A., Bluetooth) who peacefully united all the tiny island kingdoms of Denmark, southern Sweden, and southern Norway into one country In keeping with its namesake, Bluetooth, the new low-cost radio technology, is designed to unite or connect all different types of devices to effectively work as one. By uniting devices, Bluetooth eliminates the need for cabling in a wide range of products, including cellular phones, PCs, headphones, audio equipment, printers, and many more. Bluetooth Definitions  Piconet: Devices connected in an ad hoc fashion that is, not requiring predefinition and planning, as with a standard network. Two to eight devices can be networked into a piconet. It is a peer network that is, once connected each device has equal access to the others. However, one device is defined as master, and the others as slaves.  Scatternet: Several piconets may form a larger scatternet with each piconet maintaining independence.  Master unit: The master in a piconet whose clock and hopping sequence synchronizes the other devices.  Slave unit: Devices in a piconet that are not the master.  MAC address: Three bit address that distinguishes each unit in a piconet.  Parked units: Piconet devices that are synchronized but don't have MAC addresses.  Sniff and hold mode: Power-saving mode of a piconet device.
  • 4. Bluetooth Technology 4 How Bluetooth Technology Work BLUETOOTH PROTOCOL ARCHITECTURE: As the report is designed mainly for the spread spectrum techniques course, the protocols in the lower level are described more extensively and the upper layer protocols are just mentioned with a very brief description. Moreover, one should note that the upper layer protocols are totally dependent on the lower level protocols whereas the lower level protocols can function independently even with a totally different set of upper protocols. Bluetooth Radio: The Bluetooth Radio (layer) is the lowest defined layer of the Bluetooth specification. It defines the requirements of the Bluetooth transceiver device operating in the 2.4GHz ISM band. The Bluetooth air interface is based on three power classes,  Power Class 1: designed for long range (~100m), max output power of 20 dBm,  Power Class 2: ordinary range devices (~10m), max output power of 4 dBm,  Power Class 3 short range devices (~10cm), with a max output power of 0 dBm.
  • 5. Bluetooth Technology 5 The radio uses Frequency Hopping to spread the energy across the ISM spectrum in 79 hops displaced by 1MHz, starting at 2.402GHz and stopping at 2.480GHz.Some countries use the 79 RF channels whereas countries like Japan use 23 channels. Currently, the SIG is working to harmonize this 79-channel radio to work globally and has instigated changes within Japan, Spain, and other countries. Also, the Bluetooth radio module uses GFSK (Gaussian Frequency Shift Keying) where a binary one is represented by a positive frequency deviation and a binary zero by a negative frequency deviation. BT is set to 0.5 and the modulation index must be between 0.28 and 0.35. The receiver must have a sensitivity level for which the bit error rate (BER) 0.1% is met. For Bluetooth this means an actual sensitivity level of -70dBm or better. Baseband: The Baseband is the physical layer of the Bluetooth. It manages physical channels and links apart from other services like error correction, data whitening, hop selection and Bluetooth security. As mentioned previously, the basic radio is a hybrid spread spectrum radio. Typically, the radio operates in a frequency-hopping manner in which the 2.4GHz ISM band is broken into 79 1MHz channels that the radio randomly hops through while transmitting and receiving data. A piconet is formed when one Bluetooth radio connects to another Bluetooth radio. Both radios then hop together through the 79 channels. The Bluetooth radio system supports a large number of piconets by providing each piconet with its own set of random hopping patterns. Occasionally, piconets will end up on the same channel. When this occurs, the radios will hop to a free channel and the data are retransmitted (if lost). The Bluetooth frame consists of a transmit packet followed by a receive packet. Each packet can be composed of multiple slots (1, 3, or 5) of 625us. A typical single slot frame typically hops at 1,600 hops/second. Multi-slot frames allow higher data rates because of the elimination of the turn-around time between packets and the reduction in header overhead. LMP: The Link Manager Protocol is used by the Link Managers (on either side) for link set-up and control. HCI: The Host Controller Interface provides a command interface to the Baseband Link Controller and Link Manager, and access to hardware status and control registers. L2CAP: Logical Link Control And adaptation Protocol supports higher level protocol multiplexing, packet segmentation and reassembly, and the conveying of quality of service information. RFCOMM: The RFCOMM protocol provides emulation of serial ports over the L2CAPprotocol. The protocol is based on the ETSI standard TS 07.10.
  • 6. Bluetooth Technology 6 SDP: The Service Discovery Protocol provides a means for applications to discover which services are provided by or available through a Bluetooth device. It also allows applications to determine the characteristics of those available services. The technology of Bluetooth centers around 9mm x 9mm microchip, which functions as a low cost and short range radio link. Bluetooth Technology provide a 10 meter personal bubble that support simultaneous transmission of both voice and data for multiple devices. Up to 8 devices can be connected in a piconet, and to 10 piconets can exist within the 10 meter bubble. Each piconet support up to 3 simultaneous full duplex voice devices. The gross data rate is 1 Mb/s, but the actual data rate are 432 kbps for full Duplex transmission,721/56kbps for asymmetric transmission, and 384 kbps for tms 2000 transmission. Bluetooth wireless technology is designed to be as secure as a wire with up to 128-bit public/private key authentication, and streaming cipher up to 64 bit based on a5 security. Transmission types and rates : The baseband (single channel per line) protocol combines circuit and packet switching. To assure that packets do not arrive out of order, slots (up to five) can be reserved for synchronous packets. As noted earlier, a different hop signal is used for each packet. Circuit switching can be either asynchronous or synchronous. Up to three synchronous (voice) data channels, or one synchronous and one asynchronous data channel, can be supported on one channel. Each synchronous channel can support a 64 Kb/s transfer rate, which is fully adequate for voice transmissions. An asynchronous channel can transmit as much as 721 Kb/s in one direction and 57.6 Kb/s in the opposite direction. It is also possible for an asynchronous connection to support 432.6 Kb/s in both directions if the link is symmetric. Radio frequency and spectrum hopping : What if there's a lot of radio noise? Won't that interfere with Bluetooth connections? As a rule, the answer is no. It is designed to use fast acknowledgement and frequency hopping, which will make connections robust. It is packet-based, and will jump to a new frequency after each packet is received, which not only helps limit interference problems, but also adds to security. Data rates are one megabyte/second, including headers. Full duplex transmissions (both directions at once) are accomplished via time division multiplexing. The Bluetooth radio chip functions at 2.4 gigahertz, which is in the unlicensed ISM (Industrial Scientific Medical) band. It separates the 2.4 gigahertz frequency band into 79 hops one megahertz apart, starting with 2.402 and ending with 2.480 (though this bandwidth is narrower in Japan, France, and Spain). This spread spectrum is used to hop from one channel to another, pseudo-randomly, which adds a strong layer of security. Up to 1600 hops
  • 7. Bluetooth Technology 7 per second can be made. The standard frequency range is 10 centimeters to 10 meters, and can be extended to at least 100 meters by increasing transmission power. Data transmission: Data can be transmitted both synchronously and asynchronously. The Synchronous Connection Oriented (SCO) method is used primarily for voice, and Asynchronous Connectionless (ACL) is primarily for data. Within a piconet, each master-slave pair can use a different transmission mode, and modes can be changed at any time. Time Division Duplex (TDD) is used by both SCO and ACL, and both support 16 types of packets, four of which are control packets that are the same in each type. Because of the need for smoothness in data transmission, SCO packets are generally delivered via reserved intervals, that is, the packets are sent in groups without allowing other transmissions to interrupt. SCO packets can be transmitted without polling by the sending unit. ACL links support both symmetric and asymmetric transmissions. Bandwidth is controlled by the master unit, which determines how much of the total each slave unit can use. Slaves cannot transmit data until they have been polled by the master, and the master can broadcast messages to the slave units via ACL link. Network arrangement: Bluetooth network arrangements (topology) can be either point-to-point or point-to-multipoint. Any unit in a piconet can establish a connection to another piconet to form a scatternet. See the figure, which diagrams a scatternet in which piconet A, which consists of four units, is connected to piconet B, consisting of two units. Note that the master unit of A is not the link Bluetooth network arrangements (topology) can between the two piconets.
  • 8. Bluetooth Technology 8 Error correction and security: on code (FEC), 2/3 rate forward error correction code FEC, and automatic repeat request (ARQ). The FEC methods are designed to reduce the number of retransmissions. However, the over a Three error correction techniques have been defined: 1/3 rate forward error corrected significantly slows transmissions, so is generally not used in relatively error-free environments, with the exception of packet headers. The ARQ scheme requires that the header error and cyclic redundancy checks are okay. When they are an acknowledge is sent. When they aren't, the data is resent. Security is provided in three ways: through pseudo-random frequency band hops, authentication, and encryption. Frequency band hops make it difficult for anyone to eavesdrop. Authentication allows a user to control connectivity to only devices specified. Encryption uses secret key lengths of 1, 40, and 64 bits. The quality of security is excellent for most applications. However, it is not the highest level available, and for those users who require it, the suggestion is to investigate separate network transfer protocols and security software. Bluetooth Special Interest group (SIG) Bluetooth special group is group of companies working together to define, developed promote an open royalty free specification for seamless wireless connectivity and cable replacement for a wide variety of mobility-enhancing devices. The original charter of the SIG is to monitor the technical development of a short range radio and to create an open global standard. It prevent the technology from becoming the property of any single company. In developing the Bluetooth specification, the SIG is strictly adhering to some basic principles that that can be summed up in five key words: freedom, security, simplicity, versatility and reliability. These keywords are the foundation of Bluetooth technology. To be Bluetooth certified, a device must pass interoperability testing by the Bluetooth Special Interest Group thus assuring that products meeting the specification will be able to interact with all other Bluetooth- certified products and with the Internet. In february1998, the Special Interest Group (SIG) was formed. The founding SIG member are Ericsson, Intel, IBM, Nokia & Toshiba. Since then over 2000 adopter have joined including Compaq, Lucent, Motorola and 3com.
  • 9. Bluetooth Technology 9 Bluetooth Characteristics: These are the features of the Bluetooth technology:  It separates the frequency band into hops. This spread spectrum is used to hop from one channel to another, which adds a strong layer of security.  Up to eight devices can be networked in a piconet.  Signals can be transmitted through walls and briefcases, thus eliminating the need for line-of- sight.  Devices do not need to be pointed at each other, as signals are omni-directional.  Both synchronous and asynchronous applications are supported, making it easy to implement on a variety of devices and for a variety of services, such as voice and Internet.  Governments worldwide regulate it, so it is possible to utilize the same standard wherever one travels. Bluetooth in the Future What is the future direction of the Bluetooth standard? At this time, we anticipate the Bluetooth SIG to evolve the Bluetooth technology to provide greater bandwidth & distances, thus increasing the potential platforms & applications used in the emerging personal area-networking marketplace. What is the future of Bluetooth? Bluetooth is a continually expanding technology. There are plans to add many new application profiles. With over 1800 companies working on Bluetooth, the future could not be brighter. With a strong special interest group behind Bluetooth, the standardization of the application profiles is almost assured. According to market researchers, Cahners In-Stat Group, it is anticipated that as many as 670 million products will have Bluetooth built-in by the year 2005. Will the speed of Bluetooth increase? Some members of the Bluetooth SIG such as Sony & Eastman Kodak are interested in seeing the speed of Bluetooth increasing for applications such as streaming video. Proposals are under consideration but it is not clear when products based on any of the proposals would be available
  • 10. Bluetooth Technology 10 ADVANTAGES OF BLUETOOTH TECHNOLOGY  Bluetooth devices are wireless  Bluetooth technology is inexpensive  Bluetooth is automatic  Share voice and data  Low energy consumption  Accessible from anywhere  Easy to use DISADVANTAGES OF BLUETOOTH TECHNOLOGY  Relatively short range  Less secure  Interference with other devices  Mediocre Data rates  Bluetooth internet connection gets slow sometimes APPLICATIONS Smart Home Homes equipped with Bluetooth devices may be able to recognize the arrival of its bonafide residents and unlock the door on their arrival. The device will also adjust heat to a preset temperature. While this is happening, the data from the individual’s PDA may be exchanged with the home electronic board, and the family calendar is updated to reflect the scheduled activities in the office. The Internet Bridge An extension of this model could be a mobile computer that allows surfing the Internet irrespective of the location of the user, and regardless of whether the user is cordlessly connected through a mobile phone (cellular) or through a wire line connection (e.g. PSTN, ISDN, LAN, xDSL). Automatic Check-in:  Hotels are testing, or plan to test, services that allow guests to check in, unlock room doors and even control room temperature with handheld devices equipped with Bluetooth Technology.
  • 11. Bluetooth Technology 11  The Bluetooth enabled mobile phone or the PDA can present the electronic ticket to the airline system without one having to go through the queue at the check-in counters. The airline's on-line system performs the identification via the ID-tag feature built into the mobile phone or the PDA and confirms the reserved seat. The Three-in-one Phone With Bluetooth support, one handset will be able to provide multiple functionality. When at home, the phone functions as a cordless phone, connected to the fixed line. When on the move, it functions as a mobile phone connected to the mobile network. Additionally, when the phone comes within range of another mobile phone with built-in Bluetooth technology, it functions as a walkie-talkie. Summary A new global standard for data and voice Eliminates Cables. Low Power, Low range, Low Cost network devices. Bluetooth seems to have a bright future after reviewing its benefits and wide use. Further improvements are planned to be made in Data Rates Power Reduction Range
  • 12. Bluetooth Technology 12 REFERENCES 1.slideshare.com & Seminarproject.com 2.www.bluetooth.com 3.wikipedia