Professional Documents
Culture Documents
Page 1
Bluetooth
ABSTRACT
It is desired to get rid of the spaghetti of wires connecting the various devices used daily and so Bluetooth technology provides a low cost, low power and low complexity solution for ad-hoc wireless connectivity. Bluetooth is a short range wireless technology that forms the basis of communication platform which needs to be flexible, self organizing, highly scalable and energy efficient. The Bluetooth technology is capable of connecting a wide variety of devices like ersonal !igital "ssistants # !"$, mobile and cordless phones, headsets, desktops and notebook %s, digital cameras, home appliances etc. The applications include eliminating cables&wires between devices like %s, printers, modems, pro'ectors, self synchronization between !"s and %s, wirelessly connecting to local area networks #(")s$ through access points and internet through mobile phones, providing home networking solutions etc. In this paper, the author presents an overview of Bluetooth technology and its applications. The Bluetooth system is introduced and its various modes of operation are also discussed. " description of functionalities of Bluetooth layers and the protocol specifications is presented. The various links for communication among Bluetooth devices are also illustrated. The author has made an attempt to enlighten various important issues related to error correction, security and personalization of Bluetooth devices. The literature is enriched by discussion of other wireless technology, *i+i working together with Bluetooth. Thus the paper will provide helpful evaluation of Bluetooth technology, for the budding engineers.
Page 2
Bluetooth
CHAPTER 1 INTRODUCTION
Definition of Bluetooth . Why Bluetooth ? How need !i"e of Bluetooth? Hi"to!y. Wh t i" SI# ?
Page 3
Bluetooth
Wh t i" Bluetooth?
Wh t i" it $ te%hnolo&y' "t nd !d' n initi ti(e' o! )!odu%t? Bluetooth wireless technology is a de facto standard, as well as a specification for small form factor, low-cost, short range radio links between mobile %s, mobile phones and other portable devices. The Bluetooth ,pecial Interest -roup is an industry group consisting of leaders in the telecommunications, computing, and networking industries that are driving development of the technology and bringing it to market.
Why Bluetooth ?
Wh t will Bluetooth wi!ele"" te%hnolo&y deli(e! to end u"e!"? It will enable users to connect a wide range of computing and telecommunications devices easily and simply, without the need to buy, carry, or connect cables. It delivers opportunities for rapid ad hoc connections, and the possibility of automatic, unconscious, connections between devices. It will virtually eliminate the need to purchase additional or proprietary cabling to connect individual devices. Because Bluetooth wireless technology can be used for a variety of purposes, it will also Page 4
Bluetooth potentially replace multiple cable connections via a single radio link. It creates the possibility of using mobile data in a different way, for different applications such as .,urfing on the sofa., .The instant postcard., .Three in one phone. and many others. It will allow them to think about what they are working on, rather than how to make their technology work. The solution eliminates the annoying cable and its limitations regarding flexibility #often specific for a brand or pair of devices$ and range. But, Bluetooth implies more than that. The techni/ue provides the means for connecting several units to each other such as setting up small radio (")s between any types of Bluetooth devices. " number of user scenarios are described. They highlight more possibilities that reach far beyond 'ust an elimination of the point-to-point cable.
Hi"to!y
By the way if, you0re wondering where the Bluetooth name originally came from , it is named after a !anish 1iking and 2ing of Denmark between 940 and 981 AD, 3arald Bl4tand #Bluetooth in 5nglish$, who lived in the latter part of the 67 T3 century. 3arald Bl4tand united and controlled !enmark and )orway #hence the inspiration on the name 8 uniting devices through Bluetooth
The idea that resulted in the Bluetooth wireless technology was born in 1994 when Ericsson Mobile Communications decided to investigate the feasibility of a low-power low-cost radio interface between mobile phones and their accessories! The idea was that a small radio built into both the cellular telephone and the laptop would replace the cumbersome cable used today to connect the two devices! " year later the engineering wor# began and the true potential of the technology began to crystalli$e! But beyond unleashing devices by replacing cables the radio technology showed possibilities to become a universal bridge to e%isting data networ#s a peripheral interface and a mechanism to form small private ad hoc groupings of connected devices away from fi%ed networ# infrastructures!
The re/uirements regarding price, capacity and size were set so that the new techni/ue would have the potential to outdo all cable solutions between mobile devices. Initially a suitable radio interface with a corresponding fre/uency range had to be specified. " number of criteria for the concept were defined regarding size, capacity and global uniformity. The radio unit should be so small and consume such low power that it could be fitted into portable devices with their limitations. The concept had to handle both speech and data and finally the techni/ue had to work all around the world. The study soon showed that a short-range radio link solution was feasible. *hen designers at 5ricsson had started to work on a transceiver chip, 5ricsson soon realized that they needed companions to develop the techni/ue. The associates strove not only to improve the technical solutions but also to get a solid and broad market support in the business areas of % hardware, portable computers and mobile phones. +ear for a market situation with a multitude of non-standard cable solutions, where one cable is designed specifically for one pair of devices, was one of the motives that made competing companies 'oin the pro'ect. 5ricsson 9obile %ommunications, Intel, IB9, Toshiba and )okia 9obile hones formed a ,pecial Interest -roup #,I-$ in 6::;. Page 5
Bluetooth
Wh t i" SI#?
&n 'ebruary 199( the )pecial &nterest *roup +)&*, was formed! Today the Bluetooth )&* includes promoter companies -Com Ericsson &BM &ntel .ucent Microsoft Motorola /o#ia and Toshiba and thousands
By signing a zero cost agreement, companies can 'oin the ,I- and /ualify for a royalty-free license to build products based on the Bluetooth technology.
of "dopter0"ssociate member companies!
This group represented the diverse market support that was needed to generate good support for the new Bluetooth technology. In 9ay of the same year, the Bluetooth consortium announced itself globally. The assignment of the )&* originally was to monitor the
technical development of short-range radio and to create an open global standard thus preventing the technology from becoming the property of a single company! This wor# resulted in the release of the first Bluetooth )pecification in 1uly 1999!
The intention of the Bluetooth ,I- is to form a de facto standard for the air interface and the software that controls it. The further development of the )pecification still is one of
the main tas#s for the )&* other important ones being interoperability re2uirements fre2uency band
The Bluetooth wireless technology was developed by the Bluetooth ,pecial Interest -roup, to define an industry-wide specification for connecting personal and business mobile devices. 9ore than 6,<777 companies are now members of the ,pecial Interest -roup, signifying the industry=s unprecedented acceptance of the Bluetooth wireless technology.
harmoni$ation and promotion of the technology!
To avoid different interpretations of the Bluetooth standard regarding how a specific type of application should be mapped to Bluetooth, the ,I- has defined number of user models and protocol profiles. These are described in more detail in the section entitled Bluetooth >sage 9odels and rofiles.The ,I- also works with a ?ualification rocess. This process defines criteria for bluetooth product /ualification that ensures that products that pass this process meet the Bluetooth specification.
Page 6
Bluetooth
TECHNO-O#. O+ER+IEW0
Page 7
Bluetooth
The technology is an open specification for wireless communication of data and voice. It is low cost short range radio link, built into a :@: mm microchip, facilitating protected ad hoc connections for stationary and mobile communication environment. Bluetooth technology allows for the replacement of the many proprietary cables that connect one device to another device with one universal short range radio link. +or instance Bluetooth radio technology built in both the cellular telephone and the laptop would replace the cumbersome cables used today to connect the laptop to a cellular telephone. rinters, !"=,, desktops, fax machines, keyboard, 'oysticks and virtually any other device can be part of the Bluetooth system. But beyond untethering devices by replacing the cables, Bluetooth radio technology provides a universal bridge to existing data networks, a peripheral interface, and a mechanism to form small private ad hoc grouping of connected devices away from fixed network infrastructures. !esigned to operate in noisy radio fre/uency environment, the Bluetooth radio uses a fast acknowledgement and fre/uency hopping scheme to make the link robust. The Bluetooth radio modules avoid interference from other signals by hopping to a new fre/uency after transmitting or receiving a packet. %ompared with other systems operating in the same fre/uency band, the Bluetooth radio typically hops faster and uses shorter packets. This makes the Bluetooth radio robust than the other system. ,hort packages and fast hopping also limit the impact of random noise and long distance links. The encoding is optimized for uncoordinated environment. Bluetooth radios operate in the unlicensed I,9 band at A.<-3z. a fre/uency hop transceiver is applied to combat interference and fading. " shaped binary +9 modulation is applied to minimize transceiver complexity. The gross data rate is 6mbps. " Time !ivision !uplex scheme is used for full duplex transmission. The Bluetooth base band protocol is a combination of circuit and packet switching. ,lots can be reserved for synchronous packet. 5ach packet is transmitted in a different hop fre/uency. " packet nominally covers a single slot, but can be extended to cover up to B slots. Bluetooth can support an asynchronous data channel, up to C simultaneous synchronous voice channels, or a channel that simultaneously supports asynchronous data synchronous voice. 5ach voice channel supports D< kbps synchronous #voice$ link. The asynchronous channel can support an asymmetric link of maximally EA6 kbps in either direction while permitting BE.D kbps in the return direction, or a <CA.D kbps symmetric link.
Page 8
Bluetooth
INTRODUCTION 0
The Bluetooth technology answers the need for short range wireless connectivity within three areas 8 !ata and voice access points . %able replacement "d hoc networking
The Bluetooth technology specification specifies a system solution comprising hardware, software and interoperability re/uirements. The Bluetooth radio operates in a globally available A.<-3z I,9 band, ensuring communication compatibility worldwide.
D t
The Bluetooth technology facilitates real time voice and data transmission. The technology makes it possible to connect any portable and stationary communication device as easily as switching on the light. Fou can, for instance, surf the Internet G send e-mail on your potable % or notebook regardless of whether you are wirelessly connected through a mobile phone or through a wire bound connection # ,T), I,!),(,),@!(,$. 1oice channel use the Continuous Variable Slope Delta Modulation (CVSD$ coding scheme, and never retransmit voice packets. The %1,! was chosen for its robustness in handling dropped and damaged samples. Hising interference levels are experienced as increased background noiseI even at bit error rate up to <J the %1,! coded voice is /uite audible.
CAB-E REP-ACE/ENT0
The Bluetooth technology eliminates the use for numerous often proprietary cable attachments for connection of practically any kind of device. %onnections are instant and they are maintained even when devices are not within line of sight. The range of each radio is approximately 67 meters but it can be extended around 677 meters with an optional amplifier.
AD$HOC NETWOR1IN#8
" device e/uipped with Bluetooth radio establishes instant connection to another Bluetooth radio as soon as it comes into range. ,ince Bluetooth technology supports both point to point and point to multi point connection, several piconets can be Page 9
Bluetooth established and linked together ad hoc. The Bluetooth technology is best described as multiple piconet structure. Pi%onet is a connection of devices connected via Bluetooth technology in an ad hoc fashion . " piconet starts with two connected devices ,such as portable % and cellular phone and may grow into eight connected devices. "ll Bluetooth devices are peer units and have identical implementation. 3owever, when establishing a piconet, one unit will act as a master and the other as a slave for the duration of piconet connection.
NETWOR1 ARCHITECTURE0
hoc in
point-
Bluetooth units that come within range of each other can set up ad hoc point-to-point and0or point-tomultipoint connections! 3nits can dynamically be added or disconnected to the networ#! Two or more Bluetooth units that share a channel form a piconet. )everal piconets can be established and lin#ed together in ad hoc scatternets to allow communication and data e%change in fle%ible configurations! &f several other piconets are within range they each wor# independently and each have access to full bandwidth! Each piconet is established by a different fre2uencyhopping channel! "ll users participating on the same piconet are synchroni$ed to this channel! Unlike infrared de ices! Bluetooth units are not limited to line"of"si#ht communication. To regulate traffic on the channel one of the participating units becomes a master of the piconet while all other units become slaves! 4ith the current Bluetooth )pecification up to seven slaves can actively communicate with one master! 5owever there can be almost an unlimited number of units virtually attached to a master being able to start communication instantly!
Page 10
Bluetooth
CHAPTER 2
Page 11
Bluetooth
1 % a rd &1 % a l
O BE5
W A E W A P U D P IP PPP R ,C O / / TC P
AT$ C o6 6 nd
T C S B IN
SD P
A u d io - *C A P
Page 12
Bluetooth
tion" U"ed OB'ect E8change Protocol Web Application Protocol User Datagram Protocol Internet Protocol Point to Point Protocol ,erial %able emulation protocol based on 5T,I T, 7E.67 Host Controller Interface -ogical -ink Control and Adaptation Protocol Service Discovery Protocol Telephony Control Protocol -ink /anager Protocol
This section describes the Bluetooth architecture. The complete protocol stack comprises, as seen in +igure 6, of both Bluetooth specific protocols and non-Bluetooth specific protocols. In the fi&u!e' non$Bluetooth ")e%ifi% )!oto%ol" !e "h ded.
B "e7 nd
The Baseband and (ink %ontrol layer enables the physical H+ link between Bluetooth units forming a piconet. This layer controls the Bluetooth unit0s synchronization and transmission fre/uency hopping se/uence. The two different link types defined in Bluetooth, ,ynchronous %onnection Kriented, ,%K, and "synchronous %onnectionless, "%(, described in the section (ink types, are also managed by this layer. The "%( links, for data, and the ,%K links, mainly for audio, can be multiplexed to use the same H+ link L6EM.
Audio
Page 13
Bluetooth "udio transmissions can be performed between one or more Bluetooth units, using many different usage models. "udio data do not go through the (A%" layer #described below$ but go directly, after opening a Bluetooth link and a straightforward set-up, between two Bluetooth units.
Page 14
Bluetooth
Bluetooth
Adopted protocols
This section describes a number of protocols that are defined to be adopted to the Bluetooth protocol stack. )ote some of these adaptations are at the moment incomplete.
PPP
The I5T+ oint-to- oint rotocol # $ in the Bluetooth technology is designed to run over H+%K99 to accomplish point-to-point connections. is a packetoriented protocol and must therefore use its serial mechanisms to convert the packet data stream into a serial data streams.
TCP;UDP;IP
The TCP/UDP/IP standards are de !ned to o"erate !n Bluetooth un!ts allo#!ng the$ to %o$$un!%ate #!th other un!ts %onne%ted& or !nstan%e& to the Internet' (en%e& the Bluetooth un!t %an a%t as a )r!dge to the Internet' The TCP/IP/PPP "roto%ol %on !gurat!on !s used or all Internet Br!dge usage s%enar!os !n Bluetooth 1'0 and or *B+, !n uture -ers!ons' The UDP/IP/PPP %on !gurat!on !s a-a!la)le as trans"ort or ./P'
OBE5 P!oto%ol
IrKB5@, shortly KB5@, is an optional application layer protocol designed to enable units supporting infrared communication to exchange a wide variety of data and commands in a resource-sensitive standardized fashion. KB5@ uses a client-server model and is independent of the transport mechanism and transport " I. The KB5@ protocol also defines a folder-listing ob'ect, which is used to browse the contents of folders on remote device. H+%K99 is used as the main transport layer for KB5@.
Bluetooth The formats for transmitting v%ard and v%alendar information are also defined in the Bluetooth specification. The formats do not define transport mechanisms but the format in which electronic business cards and personal calendar entries and scheduling information are transported. v%ard and v%alendar is transferred by KB5@.
Page 17
Bluetooth The profile defined for exchanging of v%ard information is illustrated in +igure A, where an application, v%ard, is defined to operate over a certain subset #KB5@, H+%K99 and so on$ of the Bluetooth protocol stack. ,ome of the user models and their profiles are described in section Bluetooth >sage 9odels and rofiles.
(C A R D
O BE5
R ,C O / /
SD P
T C S B in ! y
- *C A P
-/ P B "e B n d
Page 18
Bluetooth
Page 19
Bluetooth
NETWOR1 TOPO-O#.0
"s already mentioned, the Bluetooth system support both point to point and point to multi point connections. In this, each piconet is identified by a different hopping signal. "ll users participating on the same piconet are synchronized to this hopping se/uence. The full duplex data rate within a multiple piconet structure with 67 fully loaded, independent piconets is more than D mbps. This is due to a data throughput reduction rate of less then 67J according to system simulation based on 7 dbm transmitting power #at the antenna$.
RADIO UNIT0
The Bluetooth air interface is based on a nominal antenna at 7 dBm. The air interface compiles with the +%% rules for the I,9 band at power levels up to 7 dBm. Spectru# spreading has been added to facilitate optional operation at power levels up to 677 mw worldwide. ,pectrum spreading is accomplished by fre/uency hopping in E: hops displaced by 6 93z, starting at A.<7A 93z and stopping at A.<;7-3z. !ue to local conditions the bandwidth has been reduced in ,pain, +rance and Oapan.
BASEBAND0
Page 20
Bluetooth
The baseband describes the digital signal processing hardware-the Bluetooth link controller, which carries out the baseband protocols and other low level link routines. Before establishing any network connections in a piconet structure, all devices are in the stand-by mode. In this mode an unconnected unit periodically Plistens= for messages every 6.A; seconds. 5ach time a device wakes up, it listens on a set of CA hop fre/uencies defined for that unit. The number of fre/uencies varies in different geographical regions I CA is a number for most countries # except ,pain, +rance and Oapan$. The connection procedures are initiated by any of the devices which then become master. " connection is made by a page message if the address is already known, or by an en/uiry message followed by a subse/uent page message if the address is already known. The master unit is the device in the piconet structure whose clock and hopping fre/uencies are used to synchronize all other units in the piconet. The devices other than master are called the slave units. In the initial page state, the master unit will send a train of 6D identical page messages on 6D different hop fre/uencies defined for the device to be paged#slave unit $. If no response, the master transmits a train on the remaining 6D hop fre/uencies in the wake up se/uence. The maximum se/uence before the master reaches the slave is twice the wake up period #A.BD sec.$, while the average delay is the wake up period #7.D< sec.$. The en/uiry typically used for finding Bluetooth devices, including public printers, fax machines and similar devices with an unknown messages, but may re/uire 6 additional train period to collect all the responses. " power saving mode can be used for connected units in a piconet if no data need to be transmitted. This power saving mode is the sni"" and hold #ode in which the device activity is lower. The master unit can put the slave units into the hold mode, !ata transfer restarts instantly when units transits out of the hold mode. The hold is used when connecting several piconet or managing a low power device such as temperature sensor. Two more low power modes are available, the sniff and the park mode. In the sniff mode, the slave devices listens to the piconet reduced rate thus reducing its duty cycle. The sniff interval is programmable and depends on the application. In the park mode a device is still synchronized to the piconet but dose not participate in the traffic. ,uch a device is the parked device and does not have a 9"% address. The 9"% address is a three bit address to distinguish the units participating in the piconet structure. arked device have given up their 9"% addresses and occasionally listen to the traffic of the master to resynchronize and check on broadcast messages. If we list modes in increasing order of power efficiency, the sniff mode has the higher duty cycled followed by the hold mode with a lower duty cycle .
-IN1 /ANA#E/ENT0
The link manager software entity carries out link set up, authentication, link configuration and other protocols. The (ink 9anager discovers other remote (ink 9anagers and communication with them via the (ink 9anager protocol. To perform its Page 21
Bluetooth service provider role, the (ink 9anager uses the service of the under lying controller. ,ervices provided are 8 6. ,ending and receiving of data. A. The link manager has an efficient means to in/uire and report a name or device I! up to 6D characters in length. C. (ink address in/uiries. <. %onnection set up. B. "uthentication. D. (ink 9ode negotiation and set up, e.g. data or data&voice. This may be changed during a connection. E. The (ink 9anager decides the actual frame type on a packet to packet basis. ;. ,etting a device in sniff mode I In sniff mode, the duty cycle of the slaves reduces. It listen only every 9 slots, where 9 is negotiated at the (ink 9anager. The master can start transmission in specified time slots spaced at regular intervals. :. ,etting a link device on hold I In hold mode, turning off the receiver for long periods saves power. "ny device can wake up the link again, with an average latency of < seconds. This is defined by the link 9anager and handled by the (ink %ontroller. 67. ,etting a device in park mode I It wakes up at regular intervals to listen to the channel in order to resynchronize with the rest of the piconet, and to cheek page messages.
SO,TWARE ,RA/EWOR10
Bluetooth devices will be re/uired to support baseline interoperabilit$ feature re/uirements to create a positive consumer experience. +or some devices, these re/uirements will extend from radio module compliance and air protocols and ob'ect exchange formats. +or other devices, such as headset, the feature=s re/uirements will be significantly less. 5nsuring that any device displaying the Bluetooth Plogo= interpolates with other Bluetooth devices is the goal of the Bluetooth program. ,oftware interoperability begins with the Bluetooth link level protocol responsible for multiplexing , device and service discovery, segmentation and reassemble, Bluetooth devices must be able to recognize each other and load the appropriate software to discover the higher level abilities each device supports. Interoperability at the application level re/uires identical protocol stacks. !ifferent classes of Bluetooth devices# %=s, handheld, headsets, cellular telephones$ have different compliance re/uirements. +or example, a Bluetooth headset is not expected to contain an address book. 3eadsets compliance implies Bluetooth radio compliance, audio capability and device discovery protocols. 9ore functionality would be expected from cellular phones, handheld and notebook computer. To obtain this functionality, the Bluetooth software framework will reuse existing specifications such as KB5@, 1card&1calender, 3uman Interface !evice and T% &I rather than inventing yet another set of new specifications. !evice compliance will re/uire conformation to Page 22
Bluetooth both, the Bluetooth specification and existing protocols. The software framework is contemplating the following functions8 6.%onfiguration and diagnosis utility A. !evice discovery C.%able emulation <. eripheral communication B."udio communication and call control D.Kb'ect exchange for business cards and phone books )etworking protocols.
!ifferent master slave pairs of the same piconet structure can use different link types and the link type may change arbitrarily during a session. 5ach link Qsupports up to 6D different packet types. +our of these are control packets and are common for both ,%K and "%( links. Both link types use a Time !ivision !uplex #T!!$ scheme for full duplex transmission.
Bluetooth
&n order to ma#e different hardware implementations compatible Bluetooth devices use the 5C& as a common interface between the Bluetooth host +e!g! a portable 6C, and the Bluetooth core! 5igher-level protocols li#e the )76 8'C9MM +emulating a serial port connection, and the TC6 are interfaced to baseband services via the ..C"6! "mong the issues ..C"6 ta#es care of is segmentation and reassemble to allow larger data pac#ets to be carried over a Bluetooth baseband connection! The service discovery protocol allows applications to find out about available services and their characteristics when e!g! devices are moved or switched off!
HARDWARE ARCHITECTURE 0
The Bluetooth hardware consists of an analog radio part and a digital part - the 5ost Controller! The 5ost Controller has a hardware digital signal processing part called the .in# Controller +.C, a C63 core and interfaces to the host environment ! The .in# Controller consists of hardware that performs baseband processing and physical layer protocols such as "8: +"utomatic 8epeat re:uest, protocol and 'EC +'orward Error Correction, coding! The function of the .in# Controller includes "synchronous transfers )ynchronous transfers "udio coding and Encryption! The C63 core allows the Bluetooth module to handle &n2uiries and filter 6age re2uests without involving the host device! The 5ost Controller can be programmed to answer certain 6age messages and authenticate remote lin#s! The .in# Manager +.M, software runs on the C63 core! The .M discovers other .Ms and communicates with them via the .in# Manager 6rotocol +.M6, to perform its service provider role and to use the services of the underlying .in# Controller!
5HHKH %KHH5%TIK)8
There are three error correction schemes defined by the Bluetooth baseband controllers. Page 24
Bluetooth 6&C rate +orward 5rror %orrection code #+5%$ A&C rate +orward 5rror %orrection code automatic repeat re/uest #"H?$ scheme for data
5ncryption is used to protect privacy of the connection. Bluetooth uses a string cipher well-suited for a silicon implementation with secret key lengths of 7, <7 or D< bits. 2ey management is left to higher layer software. The goal of Bluetooth=s security mechanism is to provide an appropriate level of protection for Bluetooth short-range nature and use in a global environment. >sers re/uiring stalwart protection are encouraged to use stronger security mechanisms available in network transport protocols and application programs. Bluetooth security
Page 25
Bluetooth Introducing the Bluetooth technology as a cable replacement techni/ue exposes the need for security functionality in the wireless solution. By replacing the cable and introducing radio signals there is a need for the Bluetooth device to have built-in security to prevent eavesdropping and falsifying the message originator. Therefore, functionality for authentication and encryption has been added to the Bluetooth technology. "uthentication is used to prevent unwanted access to data and to prevent falsifying of the message originator. 5ncryption is used to prevent eavesdropping. These two techni/ues combined with the fre/uency hopping techni/ue and the limited transmission range for a Bluetooth unit, usually 67 m, give the technology higher protection against eavesdropping.. ,ince the need for security is dependent on what kind of application is executed, three levels of security are defined in the Bluetooth concept. 6. )on-secure8 This mode bypasses functionality for authentication G encryption. A. ,ervice-level securityI ,ecurity procedures are not initiated until (A%" channel establishment. C. (ink-level securityI ,ecurity procedures are initiated before the link set-up at the (9 level is completed.
Se!(i%e$le(el "e%u!ity
In the ,ervice-level security mode, it is suggested to introduce a ,ecurity 9anager that controls the access to services and units. This security mode provides the possibility to define trust levels for the services and units used respectively. The access is restricted according to the defined trust levels.
-in9$le(el "e%u!ity
The (ink-level security mode is based on the concept of link keys. These keys are secret 6A; bit random numbers stored individually for each pair of devices in a Bluetooth connection. 5ach time two Bluetooth units communicate, the link key is used for authentication and encryption.
Page 26
Bluetooth
Page 27
Bluetooth
Bluetooth netwo!9in&
Page 28
Bluetooth
H o ) " e le % tio n
H o) "l (e % lo % 9 P h "e
Se> u en %e O ff "e t
" te ! id e n tity
*hen Bluetooth units are communicating, one unit is master and the rest of the units act as slaves. The master unit0s system clock and the master identity are the central parts in the fre/uency hop technology. The hop channel is determined by the hop se/uence and by the phase in this se/uence. The identity of the master determines the se/uence and the master unit0s system clock determines the phase. In the slave unit, an offset may be added to its system clock to create a copy of the master0s clock. In this way every unit in the Bluetooth connection holds synchronized clocks and the master identity, that uni/uely identifies the connection. 3ops synchronized with the master can therefore be achieved as described in +igure D. E: hop carriers have been defined for the Bluetooth Technology except for +rance and ,pain where AC hop carriers have been defined, because the I,9-band is narrower there. ,lave
+igure D
The Bluetooth packets have a fixed format. " EA-bit access code comes first in the packet. The access code is based on the master0s identity and the master0s system clock, i.e. it provides the means for the synchronization. This code is uni/ue for the channel and used by all packets transmitting on a specific channel. " B<-bit header follows the access code. This header contains error correction, retransmission and flow control information. The error correction information can. be used for correcting faults in the payload and in the header itself. +inally %omes he payload field with anything between zero and A,E<B bits, i.e. up to C<7 bytes.
Page 29
Bluetooth
f nSA f nS6 fn E A B its B < b its $-A E < B b its " ccess code acket header a y lo a d
t ?*= m s
R dio ) ! 6ete!"
Bluetooth units operate on the I,9 band, at A.<B -3z. The transmitting power is between 6 and 677 m*. The radio-fre/uency transmitters are very small. 5ricsson0s 6 m* Bluetooth radio module is only 67.Ax6<x6.D mm. The low power consumption implies that a Bluetooth unit can operate on the power from a small battery for a long time #months$. These hardware characteristics make it possible to fit a Bluetooth unit in many electrical devices. The maximum Bluetooth range is 67 m, with a possibility to extend it to 677 m. The maximum bit rate is 6 9bit&s. 9aximum effective payload is lower because the different protocol layers re/uire data payload for signalling to their %orresponding layers in the unit with which the device is communicating. 5stimates have indicated data transfer rates up to EA6 kbit&s. D t ) %9et" are protected by an "utomatic Hetransmission ?uery, "H?, and scheme. This scheme implies that at every packet reception an error check is done. If an error is detected, the receiving unit indicates this in the return packetI thus lost or faulty packets only cause a one-slot delay. In this way, retransmission is in this way selective, only faulty packets are retransmitted. ,ince retransmission is not optimal for voice transmissions due to its vulnerability for delays, a voice-encoding scheme is used. This scheme is highly resistant to bit errors. The errors that cannot be corrected result in an increasing background noise.
Pi%onet nd S% tte!net
Page 30
Bluetooth "ny two Bluetooth devices that come within range of each other can set up a so-called ad hoc connection. *hen such a connection is established a piconet is formed. There is always a master unit in a piconet and the rest of the units act as slaves. >p to eight active units can form a piconet, which is defined by the channel these units share. The number of devices in a piconet is actually unlimited even though you can have only eight active devices at any given moment. There is no difference in hardware or software between a master and a slave, hence any unit can be master. The unit that establishes the piconet becomes the master unit. The roles in a piconet can change but there can never be more than one master. The master unit controls all traffic in the piconet. It allocates capacity for ,%K links and handles a polling scheme for "%( links. ,lave units may only send in the slave-tomaster slot after being addressed in the preceding master-to-slave slot. If the master does not have any information to send in the master-to-slave slot, a packet with access code and header only is sent. That is, every slave unit is addressed in a specific order, and polling scheme, and may only send upon being addressed. In this way, packet collisions between sending slave units are eliminated.
Bluetooth identity and system clock. The in/uiry message is typically used for finding Bluetooth devices, including public printers, fax machines and similar devices with an unknown address.
S% tte!net
To optimize the use of the available spectrum, several piconets can exist in the same area. This is called ,catternet. *ithin one ,catternet all units share the same fre/uency range but each piconet uses different hop se/uences and transmits on different 6 93z hop channels. Thus, a way to optimize the data transmission capability is to keep the piconets small #i.e. few units$. "ll piconets share the ;7 93z band, where each piconet uses 6 93z, thus, as long as the piconets pick different hop fre/uencies, no sharing of 6 93z hop channels occurs. Why B
Page 32
Bluetooth
,ile T! n"fe!
The +ile Transfer usage model offers the capability to transfer data ob'ects from one Bluetooth device to another. +iles, entire folders, directories and streaming media formats are supported in this usage model. The model also offers the possibility of browsing the contents of the folders on a remote device. +urthermore, push and exchange operations are covered in this usage model, e.g. business card exchange using the v%ard format. The +ile Transfer model is based on -K5 . Page 33
Bluetooth
Inte!net B!id&e
The Internet Bridge usage model describes how a mobile phone or cordless modem provides a % with dial-up networking capabilities without the need for physical connection to the %. This networking scenario re/uires a two-piece protocol stack, one for "T-commands to control the mobile phone and another stack to transfer payload data..
-AN A%%e""
The (") "ccess usage model is similar to the Internet Bridge user model. The difference is that the (") "ccess usage model does not use the protocols for "Tcommands. The usage model describes how data terminals use a (") access point as a wireless connection to a (ocal "rea )etwork. *hen connected, the data terminals operate as if it they were connected to the (") via dial-up networking.
Syn%h!oni@ tion
The synchronization usage model provides the means for automatic synchronization between for instance a desktop %, a portable %, a mobile phone and a notebook. The synchronization re/uires business card, calendar and task information to be transferred and processed by computers, cellular phones and !"s utilizing a common protocol and format.
Th!ee$in$One Phone
The Three-in-Kne hone usage model describes how a telephone handset may connect to three different service providers. The telephone may act as a cordless telephone connecting to the public switched telephone network at home, charged at a fixed line charge. This scenario includes making calls via a voice base station, and making direct calls between two terminals via the base station. The telephone can also connect directly to other telephones acting as a Qwalkie-talkieR or handset extension i.e. no charging needed. +inally, the telephone may act as a cellular telephone connecting to the cellular infrastructure. The cordless and intercom scenarios use the same protocol stack.
Ulti6 te He d"et
Page 34
Bluetooth
The >ltimate 3eadset usage model defines how a Bluetooth e/uipped wireless headset can be connected, to act as a remote unit=s audio input and output interface. The unit is probably a mobile phone or a % for audio input and output. "s for the Internet Bridge user model, this model re/uires a two-piece protocol stackI one for "Tcommands to control the mobile phone and another stack to transfer payload data, i.e. speech. The "T-commands control the telephone regarding for instance answering and terminating calls.
Bluetooth
, BLUETOOTH+
Co6)etin& te%hni>ue"
There are a number of competitors to the Bluetooth technology. 3owever, there is no obvious single competitor in all the market segments in which the Bluetooth technology can operate.
I!DA
Page 36
Bluetooth
The main competitor in the cable replacement market segment is Ir!". Ir!" is an infrared interface standard providing wireless solutions between, for instance, mobile phones and !"s. The techni/ue is well known in the market but has had problems because some Ir!" manufacturers have made implementations incompatible with standard implementations. The maximum payload in the Ir!" technology exceeds the maximum Bluetooth payload. The two main disadvantages with Ir!" are that it is limited to point-to-point connections #only two parties in a connection$ and its need for line of sight #since it is based on infrared light$.
Ho6e R,
3ome H+ is a techni/ue developed by a consortium with, among others, 9icrosoft, Intel, 3 , 9otorola and %ompa/. The techni/ue is developed from the. !5%T concept and operates in the A.< -3z fre/uency band #the same as Bluetooth$. The intention has been to develop a techni/ue for the home market. There are many Page 37
Bluetooth similarities with Bluetooth, price per unit, range, transmitting power etc. The ma'or differences are that 3ome H+ can handle up to 6AE units per net and it uses 'ust B7 fre/uency hops per second. The figures for Bluetooth are ; and 6D77 respectively.
TEC H N O -O # .
/ A 5 B A N D W ID T H
C O / / EN T P a ! e t o r i e n t e d " o r d a t a a p p l i ! a t i o n s #m a $ "u ll d u p le$ d a ta r a te is 4 % & b p s# a r r a n g ed a s ' 4 b p s ! h a n n els "o r sp ee! h P r im a r il( d esig n ed a s n o i! e ser v i! e# n o t p a ! et# e$ p en siv e (t( p i! a ll( ) 1 * * "o r a h a n d set a n d h o m e b a se sta tio n ) + er ( ! h ea p (n o w a r iu n d ) 1 to ) & p er in sta lla tio n ) lo w r a n g e (,1 m ) a n d lin e o " sig h t o n l(
B lu eto o th DEC T IR
1 m b p s(g r o ss r a te)
144
bps
4 m bps
Bluetooth strengths The Bluetooth concept offers several benefits compared with other techni/ues. The main advantages of Bluetooth are8 U The minimal hardware dimensions U The low price on Bluetooth components U The low power consumption for Bluetooth connections. The advantages make it possible to introduce support for Bluetooth in many types of devices at a low price. The diversity in product offerings #mobile phones, !"s, computers, computer hardware, notebooks etc$ from companies in the Bluetooth ,Iand their broad support for the techni/ue creates a uni/ue market position. Both hardware and device manufacturers will work for the introduction of Bluetooth in many different devices. The capabilities provided by Bluetooth, approximately EA7 kbit&s, can be used for cable replacement and several other applications such as speech, (") and so on, as described in the use cases, described in the section entitled Bluetooth >sage 9odels. +igure ; indicates in what areas the Bluetooth concept can be used. !efining of specific user models and corresponding profiles combined with the four general profiles will most likely lead to a market situation where applications covered by the user models will use the defined user models and their profiles. +urthermore, it is likely that new Page 38
Bluetooth applications will use the standard profiles and thereby avoid interoperability problems between different manufacturers. The Bluetooth baseband protocol is a combination of circuit and packet switching. ,lots can be reserved for synchronous packet. 5ach packet is transmitted in a different hop fre/uency. " packet nominally covers a single slot, but can be extended to cover up to B slots. Bluetooth can support an asynchronous data channel, up to C simultaneous synchronous voice channels, or a channel that simultaneously supports asynchronous data synchronous voice. 5ach voice channel supports D< kbps synchronous #voice$ link. The asynchronous channel can support an asymmetric link of maximally EA6 kbps in either direction while permitting BE.D kbps in the return direction, or a <CA.D kbps symmetric link.
CHAPTER B.
Page 39
Bluetooth
Page 40
Bluetooth
Bluetooth a short message to his mobile terminal that he has e-mail, and if an item is urgent, this fact can be forwarded too. This concept allows the C- terminal to be the local QheadendR for a variety of applications that are locally interconnected via Bluetooth. If for example, such an e-mail was received while waiting for a train or plane, the user could approach a Bluetooth services booth #example new commercial enterprise for business travelers$. 3ere, for a fee chargeable to his charge&credit card or e-*allet, he can instruct his % to print the e-mails of interest #using his C-&Bluetooth terminal to control it, leaving the % in the briefcase$.
The Unde!&!ound T! in
>nderground facilities suffer from QpoorR coverage on cellular systems. 9any underground rail operators are overcoming this by installing systems designed to provide driver and station staff with a reliable communication network. ,ystems such as T5TH" #T5rrestrial Trunked Hadio$ provide sufficient capacity that there is spare to carry some passenger traffic too. %arriages e/uipped with Bluetooth transceivers would provide a gateway between the train T5TH" system and the user=s C-&Bluetooth terminal, and the T5TH" system would provide the gateway to the surface public networks. +or the convenience of other passengers, not all carriages would be enabled for support of voice over Bluetooth #though the use of Bluetooth for broadcasting timetable information, advertising etc. could be available in all carriages$.
Bluetooth data terminal device such as a % or palm top computer and it may be logical to build the C- terminal into it. *ith an external #Bluetooth$ headset, there would be nothing to hold, though a simple 99I #9an 9achine Interface$ device to allow dialing and displaying of short messages #connected to the main terminal by Bluetooth of course$ may be re/uired. If this could be made credit card sized it becomes a small version of the bpad discussed above and may well replace the handset&terminal as we know it. "lternatively, as has been suggested previously in this paper, the % and C- terminal may be physically separate devices while being functionally connected when in close proximity to each other. This perhaps offers greater flexibility #it wouldn=t be necessary to carry a % everywhere simply to make and receive calls$, while losing none of the functionality of the combined device. In some cases it may even be possible to leave the % at home connected to the 3ome Base ,tation #via Bluetooth$, and retrieve data from it directly to the bpad using Bluetooth and C- together.
TECHNICA- DE,INITIONS 0
I%K)5T 8 " collection of devices connected via Bluetooth technology in an ad hoc fashion. " piconet starts with grow to eight connected devices. "ll Bluetooth devices are peer unit and have identical implementations. 3owever, when establishing a piconet connection. The Bluetooth system supports both point-to-point and point-to-multi point connections. ,%"TT5H)5T ,catternet. 8 9ultiple independent and non-synchronized piconets form a Page 43
Bluetooth
9",T5H >)IT 8 The devices in the piconet whose clock and hopping se/uence are used to synchronize all other devices in the piconet. ,("15 >)IT, 8 "ll devices in the piconet that are not the master. 9"% "!!H5,, 8 C-bit address to distinguish between units participating in the piconet. "H25! >)IT, 8 !evices in a piconet, which are synchronized but do not have a 9"% address. ,)I++ ")! 3K(! 9K!5 8 !evices synchronized to a piconet can enter power saving modes in which device activity is lowered.
Page 44