SlideShare a Scribd company logo
World of Bluetooth
Mr. C. P. Divate
Department of Computer Engineering
:Overview of
Bluetooth:
• What is Bluetooth?
– Bluetooth is a short-range wireless communications technology.
• Why this name?
– It was taken from the 10th century Danish King Harald Blatand who
unified Denmark and Norway.
• When does it appear?
The Bluetooth specification was first developed in 1994 by Sven Mattison
and Jaap Haartsen, who were working for Ericsson Mobile Platforms in
Sweden.
– 5 companies (Ericsson, Nokia, IBM, Intel & Toshiba) joined to form the
Bluetooth Special Interest Group (SIG) in 1998.
– First specification released in July 1999.
:Bluetooth
technology:
• Bluetooth is a wireless system that uses radio waves for communication.
It has the ability to communicate with many different devices at once
without interference.
• Bluetooth is an open standard for short-range transmission of digital voice
and data that supports point-to-point and multipoint applications.
Bluetooth is based on a low-cost, low power, short range radio link.
Bluetooth cuts the cord that used to tie up digital devices. When two
bluetooth devices come within 50 meters range of each other,they establish
a connection together. It operates at 2.45 ghz which is available globally,
although slight variation of location and width of band apply.
• The range is set at 10 to100 meters to optimize for target market of mobile
and business user. The range can, however, be increased.
• Gross data rate is 1mbit/s, with second generation plans to increase to 2
mbit/sec.One-to-one connections allow maximum data transfer rate of 723
kbit/s. It has low power consumption, drawing only 0.3 ma in standby mode.
This enables maximum performance longevity for battery powered devices.
:Different Versions of
Bluetooth:
• This are the different versions of bluetooth technologies we have
since 1999.
1. Bluetooth v1.0 and v1.0B ( with mandatory bluetooth hardware
device address )
2. Bluetooth v1.1 ( ratified as IEEE standard 802.15.1-2002)
3. Bluetooth v1.2 ( faster connection and discovery )
4. Bluetooth v2.0 + EDR ( enhanced data rate )
5. Bluetooth v2.1 ( secure simple pairing-SSP )
6. Bluetooth v3.0 ( high speed data transfer )
7. Bluetooth v4.0 ( low energy consumption – recently used in apple
i -phone 4S )
:Technical
Features:
Connection Type
Spread Spectrum (Frequency Hopping) &
Time Division Duplex (1600 hops/sec)
Spectrum
2.4 GHz ISM Open Band (79 MHz of
spectrum = 79 channels)
Modulation Gaussian Frequency Shift Keying
Transmission Power 1 mw – 100 mw
Data Rate 1 Mbps
Range 30 ft
Supported Stations 8 devices
Data Security –Authentication Key 128 bit key
Data Security –Encryption Key 8-128 bits (configurable)
Module size 9 x 9 mm
• Bluetooth will support wireless point-to-point and
point-to-multipoint (broadcast) between devices
in a piconet.
• Point to Point Link
– Master - slave relationship
– Bluetooth devices can function as masters or
slaves
• Piconet
– It is the network formed by a Master and one
or more slaves (max 7)
– Each piconet is defined by a different hopping
channel to which users synchronize to
– Each piconet has max capacity (1 Mbps)
• All devices in piconet hop together.
• Master’s ID and master’s clock determines frequency
hopping sequence & phase. Scatternet structure consists
several piconets together.
: Piconet Structure
:
: Bluetooth Protocol
Stack :
• The heart of the Bluetooth
specification is the Bluetooth protocol
stack By providing well-defined layers
of functionality, the Bluetooth
specification ensures interoperability
of Bluetooth devices and encourages
adoption of Bluetooth technology.
• Bluetooth is defined as a layered
protocol architecture consisting of
core protocols, cable replacement and
telephony control protocols, and
adopted protocols .
: Core System Protocols
:
• Radio (RF) protocol : Specifies details of the air interface, the use of
frequency hopping, modulation scheme, and transmit power.
• Baseband protocol : Concerned with connection establishment within
a Piconet, addressing, packet format, timing, and power control.
• Link Manager protocol (LMP) : Responsible for link setup between
Bluetooth devices and ongoing link management.
• Logical link control and adaptation protocol (L2CAP)
L2CAP provides both connectionless and connection-oriented services.
• Service discovery protocol (SDP) : Device information, services, and
the characteristics of the services can be queried to enable the
establishment of a connection between two or more Bluetooth
devices
: Additional
Protocols :
• RF COMM : It provides connections to multiple devices by relying on
L2CAP to handle multiplexing over single connection
• Wireless access protocol (WAP): It supports the limited display size
and resolution typically found on mobile devices by providing special
formats for Web pages
• Object exchange protocol (OBEX): OBEX is a protocol designed to
allow a variety of devices to exchange data simply and spontaneously.
• Telephony control protocol : Bluetooth's Telephony Control protocol
Specification (TCS) defines how telephone calls should be sent across
a Bluetooth link
• Point-to-point protocol (PPP): The point-to-point protocol is an
Internet standard protocol for transporting IP datagram over a point-
to-point link
: Bluetooth
Profiles :
• In order to use Bluetooth wireless technology, a device must be able
to interpret certain Bluetooth profiles. The profiles define the
possible applications
• each profile specification contains information on the following
topics:
 Dependencies on other profiles
 Suggested user interface formats
 Specific parts of the Bluetooth protocol stack used by
the profile. To perform its task, each profile uses particular
options and parameters at each layer of the stack .
• Certain examples : Generic Access Profiles, Telephony Control
Protocol Specification, Generic Object Exchange Profiles, Serial Port
Profiles
: Health
Concerns :
• The carrier waves used by Bluetooth's transmitter is of the
same frequency range as microwave Ovens (Bluetooth uses
2.402 GHz to 2.480 GHz).
• Actually, the transmitting power is far too weak to be
noticeable for humans. When using a wireless phone or a
Bluetooth device, some of the emitted RF energy is absorbed
by the body. The penetration depth is about 1.5 cm at 2450
MHz which means that the absorption is very superficial.
• The radiated output power of Bluetooth devices is low when
compared to other widely used mobile devices, so it is
assumed that the potential for health risks are also
correspondingly lower.
: Comparison between
various Technologies
:
: Applications of Bluetooth
:
• Wireless control of and communication between a mobile phone and
a hands free headset. This was one of the earliest applications to
become popular.
• Wireless communication with pc input and output devices, the most
common being the mouse, keyboard and printer.
• Transfer of files, contact details, calendar appointments, and
reminders between devices with obex.
• In 2004 released cars like toyota prius & lexus ls 430 have hands free
call system.
• Sending small advertisements from bluetooth-enabled advertising
hoardings to other, discoverable, bluetooth devices.
• In game consoles like sony's playstation 3 and psp go, use bluetooth
for their respective wireless controllers.
Applications
•Dial-up internet access on personal computers or PDAs using a data-capable
mobile phone as a wireless modem.
•Personal security application on mobile phones for prevention of theft or loss of
items.
• In Real-time location systems (RTLS).
Digital Pulse Oximetry System
Toshiba Washer & Dryer.
: Future of Bluetooth :
• Success of Bluetooth depends on how well it is integrated into
consumer products
– Consumers are more interested in applications than the
technology
– Bluetooth must be successfully integrated into consumer
products
– Must provide benefits for consumer
Key Success Factors :
– Interoperability
– Mass Production at Low Cost
– Ease of Use
– End User Experience
Data Communication and Network World of Bluetooth

More Related Content

Similar to Data Communication and Network World of Bluetooth

Similar to Data Communication and Network World of Bluetooth (20)

Bluetooth Technology & Security
Bluetooth Technology & SecurityBluetooth Technology & Security
Bluetooth Technology & Security
 
Bluetooth Technology By Volkan Sevindik
Bluetooth Technology By Volkan SevindikBluetooth Technology By Volkan Sevindik
Bluetooth Technology By Volkan Sevindik
 
Carwhisperer Bluetooth Attack
Carwhisperer Bluetooth AttackCarwhisperer Bluetooth Attack
Carwhisperer Bluetooth Attack
 
Bluetooth and profiles on WEC7
Bluetooth and profiles on WEC7Bluetooth and profiles on WEC7
Bluetooth and profiles on WEC7
 
BluetoothSecurity.ppt
BluetoothSecurity.pptBluetoothSecurity.ppt
BluetoothSecurity.ppt
 
BluetoothSecurity.ppt
BluetoothSecurity.pptBluetoothSecurity.ppt
BluetoothSecurity.ppt
 
Introduction to bluetooth
Introduction to bluetoothIntroduction to bluetooth
Introduction to bluetooth
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
 
Bluetooth - Overview
Bluetooth - OverviewBluetooth - Overview
Bluetooth - Overview
 
Bluetooth ppt
Bluetooth pptBluetooth ppt
Bluetooth ppt
 
R K 2 Bluetooth Technologies
R K 2  Bluetooth  TechnologiesR K 2  Bluetooth  Technologies
R K 2 Bluetooth Technologies
 
Wireless & Mobile Lecture # 20
Wireless & Mobile Lecture # 20Wireless & Mobile Lecture # 20
Wireless & Mobile Lecture # 20
 
bluetooth-security
bluetooth-securitybluetooth-security
bluetooth-security
 
Bluetooth.ppt
Bluetooth.pptBluetooth.ppt
Bluetooth.ppt
 
IT WRITING SAMPLES PORTFOLIO
IT WRITING SAMPLES PORTFOLIOIT WRITING SAMPLES PORTFOLIO
IT WRITING SAMPLES PORTFOLIO
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Wireless personal area networks(PAN)
Wireless personal area networks(PAN)Wireless personal area networks(PAN)
Wireless personal area networks(PAN)
 
Presentation about Bluetooth and working principles.pptx
Presentation about Bluetooth and working principles.pptxPresentation about Bluetooth and working principles.pptx
Presentation about Bluetooth and working principles.pptx
 
Bluetooth
BluetoothBluetooth
Bluetooth
 

More from ChandrakantDivate1

Web Technology LAB MANUAL for Undergraduate Programs
Web Technology  LAB MANUAL for Undergraduate ProgramsWeb Technology  LAB MANUAL for Undergraduate Programs
Web Technology LAB MANUAL for Undergraduate ProgramsChandrakantDivate1
 
UNIVERSAL HUMAN VALUES- Harmony in the Nature
UNIVERSAL HUMAN VALUES- Harmony in the NatureUNIVERSAL HUMAN VALUES- Harmony in the Nature
UNIVERSAL HUMAN VALUES- Harmony in the NatureChandrakantDivate1
 
Study of Computer Hardware System using Block Diagram
Study of Computer Hardware System using Block DiagramStudy of Computer Hardware System using Block Diagram
Study of Computer Hardware System using Block DiagramChandrakantDivate1
 
Computer System Output Devices Peripherals
Computer System Output  Devices PeripheralsComputer System Output  Devices Peripherals
Computer System Output Devices PeripheralsChandrakantDivate1
 
Computer system Input Devices Peripherals
Computer system Input  Devices PeripheralsComputer system Input  Devices Peripherals
Computer system Input Devices PeripheralsChandrakantDivate1
 
Computer system Input and Output Devices
Computer system Input and Output DevicesComputer system Input and Output Devices
Computer system Input and Output DevicesChandrakantDivate1
 
Introduction to COMPUTER’S MEMORY RAM and ROM
Introduction to COMPUTER’S MEMORY RAM and ROMIntroduction to COMPUTER’S MEMORY RAM and ROM
Introduction to COMPUTER’S MEMORY RAM and ROMChandrakantDivate1
 
Introduction to Computer Hardware Systems
Introduction to Computer Hardware SystemsIntroduction to Computer Hardware Systems
Introduction to Computer Hardware SystemsChandrakantDivate1
 
Fundamentals of Internet of Things (IoT) Part-2
Fundamentals of Internet of Things (IoT) Part-2Fundamentals of Internet of Things (IoT) Part-2
Fundamentals of Internet of Things (IoT) Part-2ChandrakantDivate1
 
Fundamentals of Internet of Things (IoT)
Fundamentals of Internet of Things (IoT)Fundamentals of Internet of Things (IoT)
Fundamentals of Internet of Things (IoT)ChandrakantDivate1
 
Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)ChandrakantDivate1
 
Fundamentals of functions in C program.pptx
Fundamentals of functions in C program.pptxFundamentals of functions in C program.pptx
Fundamentals of functions in C program.pptxChandrakantDivate1
 
Fundamentals of Structure in C Programming
Fundamentals of Structure in C ProgrammingFundamentals of Structure in C Programming
Fundamentals of Structure in C ProgrammingChandrakantDivate1
 
INPUT AND OUTPUT STATEMENTS IN PROGRAMMING IN C
INPUT AND OUTPUT STATEMENTS IN PROGRAMMING IN CINPUT AND OUTPUT STATEMENTS IN PROGRAMMING IN C
INPUT AND OUTPUT STATEMENTS IN PROGRAMMING IN CChandrakantDivate1
 
Programming in C - Fundamental Study of Strings
Programming in C - Fundamental Study of  StringsProgramming in C - Fundamental Study of  Strings
Programming in C - Fundamental Study of StringsChandrakantDivate1
 
Basics of Control Statement in C Languages
Basics of Control Statement in C LanguagesBasics of Control Statement in C Languages
Basics of Control Statement in C LanguagesChandrakantDivate1
 
Features and Fundamentals of C Language for Beginners
Features and Fundamentals of C Language for BeginnersFeatures and Fundamentals of C Language for Beginners
Features and Fundamentals of C Language for BeginnersChandrakantDivate1
 
Basics of Programming Algorithms and Flowchart
Basics of Programming Algorithms and FlowchartBasics of Programming Algorithms and Flowchart
Basics of Programming Algorithms and FlowchartChandrakantDivate1
 
Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesChandrakantDivate1
 
Computer Graphics Three-Dimensional Geometric Transformations
Computer Graphics Three-Dimensional Geometric TransformationsComputer Graphics Three-Dimensional Geometric Transformations
Computer Graphics Three-Dimensional Geometric TransformationsChandrakantDivate1
 

More from ChandrakantDivate1 (20)

Web Technology LAB MANUAL for Undergraduate Programs
Web Technology  LAB MANUAL for Undergraduate ProgramsWeb Technology  LAB MANUAL for Undergraduate Programs
Web Technology LAB MANUAL for Undergraduate Programs
 
UNIVERSAL HUMAN VALUES- Harmony in the Nature
UNIVERSAL HUMAN VALUES- Harmony in the NatureUNIVERSAL HUMAN VALUES- Harmony in the Nature
UNIVERSAL HUMAN VALUES- Harmony in the Nature
 
Study of Computer Hardware System using Block Diagram
Study of Computer Hardware System using Block DiagramStudy of Computer Hardware System using Block Diagram
Study of Computer Hardware System using Block Diagram
 
Computer System Output Devices Peripherals
Computer System Output  Devices PeripheralsComputer System Output  Devices Peripherals
Computer System Output Devices Peripherals
 
Computer system Input Devices Peripherals
Computer system Input  Devices PeripheralsComputer system Input  Devices Peripherals
Computer system Input Devices Peripherals
 
Computer system Input and Output Devices
Computer system Input and Output DevicesComputer system Input and Output Devices
Computer system Input and Output Devices
 
Introduction to COMPUTER’S MEMORY RAM and ROM
Introduction to COMPUTER’S MEMORY RAM and ROMIntroduction to COMPUTER’S MEMORY RAM and ROM
Introduction to COMPUTER’S MEMORY RAM and ROM
 
Introduction to Computer Hardware Systems
Introduction to Computer Hardware SystemsIntroduction to Computer Hardware Systems
Introduction to Computer Hardware Systems
 
Fundamentals of Internet of Things (IoT) Part-2
Fundamentals of Internet of Things (IoT) Part-2Fundamentals of Internet of Things (IoT) Part-2
Fundamentals of Internet of Things (IoT) Part-2
 
Fundamentals of Internet of Things (IoT)
Fundamentals of Internet of Things (IoT)Fundamentals of Internet of Things (IoT)
Fundamentals of Internet of Things (IoT)
 
Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)
 
Fundamentals of functions in C program.pptx
Fundamentals of functions in C program.pptxFundamentals of functions in C program.pptx
Fundamentals of functions in C program.pptx
 
Fundamentals of Structure in C Programming
Fundamentals of Structure in C ProgrammingFundamentals of Structure in C Programming
Fundamentals of Structure in C Programming
 
INPUT AND OUTPUT STATEMENTS IN PROGRAMMING IN C
INPUT AND OUTPUT STATEMENTS IN PROGRAMMING IN CINPUT AND OUTPUT STATEMENTS IN PROGRAMMING IN C
INPUT AND OUTPUT STATEMENTS IN PROGRAMMING IN C
 
Programming in C - Fundamental Study of Strings
Programming in C - Fundamental Study of  StringsProgramming in C - Fundamental Study of  Strings
Programming in C - Fundamental Study of Strings
 
Basics of Control Statement in C Languages
Basics of Control Statement in C LanguagesBasics of Control Statement in C Languages
Basics of Control Statement in C Languages
 
Features and Fundamentals of C Language for Beginners
Features and Fundamentals of C Language for BeginnersFeatures and Fundamentals of C Language for Beginners
Features and Fundamentals of C Language for Beginners
 
Basics of Programming Algorithms and Flowchart
Basics of Programming Algorithms and FlowchartBasics of Programming Algorithms and Flowchart
Basics of Programming Algorithms and Flowchart
 
Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To Curves
 
Computer Graphics Three-Dimensional Geometric Transformations
Computer Graphics Three-Dimensional Geometric TransformationsComputer Graphics Three-Dimensional Geometric Transformations
Computer Graphics Three-Dimensional Geometric Transformations
 

Recently uploaded

A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdfA CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdfKamal Acharya
 
KIT-601 Lecture Notes-UNIT-4.pdf Frequent Itemsets and Clustering
KIT-601 Lecture Notes-UNIT-4.pdf Frequent Itemsets and ClusteringKIT-601 Lecture Notes-UNIT-4.pdf Frequent Itemsets and Clustering
KIT-601 Lecture Notes-UNIT-4.pdf Frequent Itemsets and ClusteringDr. Radhey Shyam
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdfKamal Acharya
 
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical EngineeringIntroduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical EngineeringC Sai Kiran
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industriesMuhammadTufail242431
 
ENERGY STORAGE DEVICES INTRODUCTION UNIT-I
ENERGY STORAGE DEVICES  INTRODUCTION UNIT-IENERGY STORAGE DEVICES  INTRODUCTION UNIT-I
ENERGY STORAGE DEVICES INTRODUCTION UNIT-IVigneshvaranMech
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.PrashantGoswami42
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdfKamal Acharya
 
Fruit shop management system project report.pdf
Fruit shop management system project report.pdfFruit shop management system project report.pdf
Fruit shop management system project report.pdfKamal Acharya
 
School management system project report.pdf
School management system project report.pdfSchool management system project report.pdf
School management system project report.pdfKamal Acharya
 
RESORT MANAGEMENT AND RESERVATION SYSTEM PROJECT REPORT.pdf
RESORT MANAGEMENT AND RESERVATION SYSTEM PROJECT REPORT.pdfRESORT MANAGEMENT AND RESERVATION SYSTEM PROJECT REPORT.pdf
RESORT MANAGEMENT AND RESERVATION SYSTEM PROJECT REPORT.pdfKamal Acharya
 
Hall booking system project report .pdf
Hall booking system project report  .pdfHall booking system project report  .pdf
Hall booking system project report .pdfKamal Acharya
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
 
Peek implant persentation - Copy (1).pdf
Peek implant persentation - Copy (1).pdfPeek implant persentation - Copy (1).pdf
Peek implant persentation - Copy (1).pdfAyahmorsy
 
Scaling in conventional MOSFET for constant electric field and constant voltage
Scaling in conventional MOSFET for constant electric field and constant voltageScaling in conventional MOSFET for constant electric field and constant voltage
Scaling in conventional MOSFET for constant electric field and constant voltageRCC Institute of Information Technology
 
Online resume builder management system project report.pdf
Online resume builder management system project report.pdfOnline resume builder management system project report.pdf
Online resume builder management system project report.pdfKamal Acharya
 
shape functions of 1D and 2 D rectangular elements.pptx
shape functions of 1D and 2 D rectangular elements.pptxshape functions of 1D and 2 D rectangular elements.pptx
shape functions of 1D and 2 D rectangular elements.pptxVishalDeshpande27
 
Cloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptx
Cloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptxCloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptx
Cloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptxMd. Shahidul Islam Prodhan
 
AI for workflow automation Use cases applications benefits and development.pdf
AI for workflow automation Use cases applications benefits and development.pdfAI for workflow automation Use cases applications benefits and development.pdf
AI for workflow automation Use cases applications benefits and development.pdfmahaffeycheryld
 

Recently uploaded (20)

A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdfA CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
 
KIT-601 Lecture Notes-UNIT-4.pdf Frequent Itemsets and Clustering
KIT-601 Lecture Notes-UNIT-4.pdf Frequent Itemsets and ClusteringKIT-601 Lecture Notes-UNIT-4.pdf Frequent Itemsets and Clustering
KIT-601 Lecture Notes-UNIT-4.pdf Frequent Itemsets and Clustering
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
 
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical EngineeringIntroduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
 
ENERGY STORAGE DEVICES INTRODUCTION UNIT-I
ENERGY STORAGE DEVICES  INTRODUCTION UNIT-IENERGY STORAGE DEVICES  INTRODUCTION UNIT-I
ENERGY STORAGE DEVICES INTRODUCTION UNIT-I
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 
Fruit shop management system project report.pdf
Fruit shop management system project report.pdfFruit shop management system project report.pdf
Fruit shop management system project report.pdf
 
School management system project report.pdf
School management system project report.pdfSchool management system project report.pdf
School management system project report.pdf
 
RESORT MANAGEMENT AND RESERVATION SYSTEM PROJECT REPORT.pdf
RESORT MANAGEMENT AND RESERVATION SYSTEM PROJECT REPORT.pdfRESORT MANAGEMENT AND RESERVATION SYSTEM PROJECT REPORT.pdf
RESORT MANAGEMENT AND RESERVATION SYSTEM PROJECT REPORT.pdf
 
Hall booking system project report .pdf
Hall booking system project report  .pdfHall booking system project report  .pdf
Hall booking system project report .pdf
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
Peek implant persentation - Copy (1).pdf
Peek implant persentation - Copy (1).pdfPeek implant persentation - Copy (1).pdf
Peek implant persentation - Copy (1).pdf
 
Scaling in conventional MOSFET for constant electric field and constant voltage
Scaling in conventional MOSFET for constant electric field and constant voltageScaling in conventional MOSFET for constant electric field and constant voltage
Scaling in conventional MOSFET for constant electric field and constant voltage
 
Online resume builder management system project report.pdf
Online resume builder management system project report.pdfOnline resume builder management system project report.pdf
Online resume builder management system project report.pdf
 
shape functions of 1D and 2 D rectangular elements.pptx
shape functions of 1D and 2 D rectangular elements.pptxshape functions of 1D and 2 D rectangular elements.pptx
shape functions of 1D and 2 D rectangular elements.pptx
 
Cloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptx
Cloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptxCloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptx
Cloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptx
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
AI for workflow automation Use cases applications benefits and development.pdf
AI for workflow automation Use cases applications benefits and development.pdfAI for workflow automation Use cases applications benefits and development.pdf
AI for workflow automation Use cases applications benefits and development.pdf
 

Data Communication and Network World of Bluetooth

  • 1. World of Bluetooth Mr. C. P. Divate Department of Computer Engineering
  • 2. :Overview of Bluetooth: • What is Bluetooth? – Bluetooth is a short-range wireless communications technology. • Why this name? – It was taken from the 10th century Danish King Harald Blatand who unified Denmark and Norway. • When does it appear? The Bluetooth specification was first developed in 1994 by Sven Mattison and Jaap Haartsen, who were working for Ericsson Mobile Platforms in Sweden. – 5 companies (Ericsson, Nokia, IBM, Intel & Toshiba) joined to form the Bluetooth Special Interest Group (SIG) in 1998. – First specification released in July 1999.
  • 3. :Bluetooth technology: • Bluetooth is a wireless system that uses radio waves for communication. It has the ability to communicate with many different devices at once without interference. • Bluetooth is an open standard for short-range transmission of digital voice and data that supports point-to-point and multipoint applications. Bluetooth is based on a low-cost, low power, short range radio link. Bluetooth cuts the cord that used to tie up digital devices. When two bluetooth devices come within 50 meters range of each other,they establish a connection together. It operates at 2.45 ghz which is available globally, although slight variation of location and width of band apply. • The range is set at 10 to100 meters to optimize for target market of mobile and business user. The range can, however, be increased. • Gross data rate is 1mbit/s, with second generation plans to increase to 2 mbit/sec.One-to-one connections allow maximum data transfer rate of 723 kbit/s. It has low power consumption, drawing only 0.3 ma in standby mode. This enables maximum performance longevity for battery powered devices.
  • 4. :Different Versions of Bluetooth: • This are the different versions of bluetooth technologies we have since 1999. 1. Bluetooth v1.0 and v1.0B ( with mandatory bluetooth hardware device address ) 2. Bluetooth v1.1 ( ratified as IEEE standard 802.15.1-2002) 3. Bluetooth v1.2 ( faster connection and discovery ) 4. Bluetooth v2.0 + EDR ( enhanced data rate ) 5. Bluetooth v2.1 ( secure simple pairing-SSP ) 6. Bluetooth v3.0 ( high speed data transfer ) 7. Bluetooth v4.0 ( low energy consumption – recently used in apple i -phone 4S )
  • 5. :Technical Features: Connection Type Spread Spectrum (Frequency Hopping) & Time Division Duplex (1600 hops/sec) Spectrum 2.4 GHz ISM Open Band (79 MHz of spectrum = 79 channels) Modulation Gaussian Frequency Shift Keying Transmission Power 1 mw – 100 mw Data Rate 1 Mbps Range 30 ft Supported Stations 8 devices Data Security –Authentication Key 128 bit key Data Security –Encryption Key 8-128 bits (configurable) Module size 9 x 9 mm
  • 6. • Bluetooth will support wireless point-to-point and point-to-multipoint (broadcast) between devices in a piconet. • Point to Point Link – Master - slave relationship – Bluetooth devices can function as masters or slaves • Piconet – It is the network formed by a Master and one or more slaves (max 7) – Each piconet is defined by a different hopping channel to which users synchronize to – Each piconet has max capacity (1 Mbps)
  • 7. • All devices in piconet hop together. • Master’s ID and master’s clock determines frequency hopping sequence & phase. Scatternet structure consists several piconets together. : Piconet Structure :
  • 8.
  • 9. : Bluetooth Protocol Stack : • The heart of the Bluetooth specification is the Bluetooth protocol stack By providing well-defined layers of functionality, the Bluetooth specification ensures interoperability of Bluetooth devices and encourages adoption of Bluetooth technology. • Bluetooth is defined as a layered protocol architecture consisting of core protocols, cable replacement and telephony control protocols, and adopted protocols .
  • 10. : Core System Protocols : • Radio (RF) protocol : Specifies details of the air interface, the use of frequency hopping, modulation scheme, and transmit power. • Baseband protocol : Concerned with connection establishment within a Piconet, addressing, packet format, timing, and power control. • Link Manager protocol (LMP) : Responsible for link setup between Bluetooth devices and ongoing link management. • Logical link control and adaptation protocol (L2CAP) L2CAP provides both connectionless and connection-oriented services. • Service discovery protocol (SDP) : Device information, services, and the characteristics of the services can be queried to enable the establishment of a connection between two or more Bluetooth devices
  • 11. : Additional Protocols : • RF COMM : It provides connections to multiple devices by relying on L2CAP to handle multiplexing over single connection • Wireless access protocol (WAP): It supports the limited display size and resolution typically found on mobile devices by providing special formats for Web pages • Object exchange protocol (OBEX): OBEX is a protocol designed to allow a variety of devices to exchange data simply and spontaneously. • Telephony control protocol : Bluetooth's Telephony Control protocol Specification (TCS) defines how telephone calls should be sent across a Bluetooth link • Point-to-point protocol (PPP): The point-to-point protocol is an Internet standard protocol for transporting IP datagram over a point- to-point link
  • 12. : Bluetooth Profiles : • In order to use Bluetooth wireless technology, a device must be able to interpret certain Bluetooth profiles. The profiles define the possible applications • each profile specification contains information on the following topics:  Dependencies on other profiles  Suggested user interface formats  Specific parts of the Bluetooth protocol stack used by the profile. To perform its task, each profile uses particular options and parameters at each layer of the stack . • Certain examples : Generic Access Profiles, Telephony Control Protocol Specification, Generic Object Exchange Profiles, Serial Port Profiles
  • 13. : Health Concerns : • The carrier waves used by Bluetooth's transmitter is of the same frequency range as microwave Ovens (Bluetooth uses 2.402 GHz to 2.480 GHz). • Actually, the transmitting power is far too weak to be noticeable for humans. When using a wireless phone or a Bluetooth device, some of the emitted RF energy is absorbed by the body. The penetration depth is about 1.5 cm at 2450 MHz which means that the absorption is very superficial. • The radiated output power of Bluetooth devices is low when compared to other widely used mobile devices, so it is assumed that the potential for health risks are also correspondingly lower.
  • 15. : Applications of Bluetooth : • Wireless control of and communication between a mobile phone and a hands free headset. This was one of the earliest applications to become popular. • Wireless communication with pc input and output devices, the most common being the mouse, keyboard and printer. • Transfer of files, contact details, calendar appointments, and reminders between devices with obex. • In 2004 released cars like toyota prius & lexus ls 430 have hands free call system. • Sending small advertisements from bluetooth-enabled advertising hoardings to other, discoverable, bluetooth devices. • In game consoles like sony's playstation 3 and psp go, use bluetooth for their respective wireless controllers.
  • 16. Applications •Dial-up internet access on personal computers or PDAs using a data-capable mobile phone as a wireless modem. •Personal security application on mobile phones for prevention of theft or loss of items. • In Real-time location systems (RTLS). Digital Pulse Oximetry System Toshiba Washer & Dryer.
  • 17. : Future of Bluetooth : • Success of Bluetooth depends on how well it is integrated into consumer products – Consumers are more interested in applications than the technology – Bluetooth must be successfully integrated into consumer products – Must provide benefits for consumer Key Success Factors : – Interoperability – Mass Production at Low Cost – Ease of Use – End User Experience