You are on page 1of 44

Bluetooth

Page 1

Bluetooth

ABSTRACT
It is desired to get rid of the spaghetti of wires connecting the various devices used daily and so Bluetooth technology provides a low cost, low power and low complexity solution for ad-hoc wireless connectivity. Bluetooth is a short range wireless technology that forms the basis of communication platform which needs to be flexible, self organizing, highly scalable and energy efficient. The Bluetooth technology is capable of connecting a wide variety of devices like ersonal !igital "ssistants # !"$, mobile and cordless phones, headsets, desktops and notebook %s, digital cameras, home appliances etc. The applications include eliminating cables&wires between devices like %s, printers, modems, pro'ectors, self synchronization between !"s and %s, wirelessly connecting to local area networks #(")s$ through access points and internet through mobile phones, providing home networking solutions etc. In this paper, the author presents an overview of Bluetooth technology and its applications. The Bluetooth system is introduced and its various modes of operation are also discussed. " description of functionalities of Bluetooth layers and the protocol specifications is presented. The various links for communication among Bluetooth devices are also illustrated. The author has made an attempt to enlighten various important issues related to error correction, security and personalization of Bluetooth devices. The literature is enriched by discussion of other wireless technology, *i+i working together with Bluetooth. Thus the paper will provide helpful evaluation of Bluetooth technology, for the budding engineers.

Page 2

Bluetooth

CHAPTER 1 INTRODUCTION

Definition of Bluetooth . Why Bluetooth ? How need !i"e of Bluetooth? Hi"to!y. Wh t i" SI# ?

Page 3

Bluetooth

Wh t i" Bluetooth?
Wh t i" it $ te%hnolo&y' "t nd !d' n initi ti(e' o! )!odu%t? Bluetooth wireless technology is a de facto standard, as well as a specification for small form factor, low-cost, short range radio links between mobile %s, mobile phones and other portable devices. The Bluetooth ,pecial Interest -roup is an industry group consisting of leaders in the telecommunications, computing, and networking industries that are driving development of the technology and bringing it to market.

How did the need !i"e?


In phase with the IT boom, the mobility among people has constantly grown and wireless technologies for voice and data have evolved rapidly during the past years. %ountless electronic devices for home, personal and business use have been presented to the market during recent years but no widespread technology to address the needs of connecting personal devices in ersonal "rea )etworks # ")s$. The demand for a system that could easily connect devices for transfer of data and voice over short distances without cables grew stronger. Bluetooth wireless technology fills this important communication need, with its ability to communicate both voice and data wirelessly, using a standard low-power, lowcost technology which can be integrated in all devices to enable total mobility. The price will be low and result in mass production. The more units around, the more benefits for the customer.

Why Bluetooth ?
Wh t will Bluetooth wi!ele"" te%hnolo&y deli(e! to end u"e!"? It will enable users to connect a wide range of computing and telecommunications devices easily and simply, without the need to buy, carry, or connect cables. It delivers opportunities for rapid ad hoc connections, and the possibility of automatic, unconscious, connections between devices. It will virtually eliminate the need to purchase additional or proprietary cabling to connect individual devices. Because Bluetooth wireless technology can be used for a variety of purposes, it will also Page 4

Bluetooth potentially replace multiple cable connections via a single radio link. It creates the possibility of using mobile data in a different way, for different applications such as .,urfing on the sofa., .The instant postcard., .Three in one phone. and many others. It will allow them to think about what they are working on, rather than how to make their technology work. The solution eliminates the annoying cable and its limitations regarding flexibility #often specific for a brand or pair of devices$ and range. But, Bluetooth implies more than that. The techni/ue provides the means for connecting several units to each other such as setting up small radio (")s between any types of Bluetooth devices. " number of user scenarios are described. They highlight more possibilities that reach far beyond 'ust an elimination of the point-to-point cable.

Hi"to!y
By the way if, you0re wondering where the Bluetooth name originally came from , it is named after a !anish 1iking and 2ing of Denmark between 940 and 981 AD, 3arald Bl4tand #Bluetooth in 5nglish$, who lived in the latter part of the 67 T3 century. 3arald Bl4tand united and controlled !enmark and )orway #hence the inspiration on the name 8 uniting devices through Bluetooth
The idea that resulted in the Bluetooth wireless technology was born in 1994 when Ericsson Mobile Communications decided to investigate the feasibility of a low-power low-cost radio interface between mobile phones and their accessories! The idea was that a small radio built into both the cellular telephone and the laptop would replace the cumbersome cable used today to connect the two devices! " year later the engineering wor# began and the true potential of the technology began to crystalli$e! But beyond unleashing devices by replacing cables the radio technology showed possibilities to become a universal bridge to e%isting data networ#s a peripheral interface and a mechanism to form small private ad hoc groupings of connected devices away from fi%ed networ# infrastructures!

The re/uirements regarding price, capacity and size were set so that the new techni/ue would have the potential to outdo all cable solutions between mobile devices. Initially a suitable radio interface with a corresponding fre/uency range had to be specified. " number of criteria for the concept were defined regarding size, capacity and global uniformity. The radio unit should be so small and consume such low power that it could be fitted into portable devices with their limitations. The concept had to handle both speech and data and finally the techni/ue had to work all around the world. The study soon showed that a short-range radio link solution was feasible. *hen designers at 5ricsson had started to work on a transceiver chip, 5ricsson soon realized that they needed companions to develop the techni/ue. The associates strove not only to improve the technical solutions but also to get a solid and broad market support in the business areas of % hardware, portable computers and mobile phones. +ear for a market situation with a multitude of non-standard cable solutions, where one cable is designed specifically for one pair of devices, was one of the motives that made competing companies 'oin the pro'ect. 5ricsson 9obile %ommunications, Intel, IB9, Toshiba and )okia 9obile hones formed a ,pecial Interest -roup #,I-$ in 6::;. Page 5

Bluetooth

Wh t i" SI#?
&n 'ebruary 199( the )pecial &nterest *roup +)&*, was formed! Today the Bluetooth )&* includes promoter companies -Com Ericsson &BM &ntel .ucent Microsoft Motorola /o#ia and Toshiba and thousands

By signing a zero cost agreement, companies can 'oin the ,I- and /ualify for a royalty-free license to build products based on the Bluetooth technology.
of "dopter0"ssociate member companies!

This group represented the diverse market support that was needed to generate good support for the new Bluetooth technology. In 9ay of the same year, the Bluetooth consortium announced itself globally. The assignment of the )&* originally was to monitor the
technical development of short-range radio and to create an open global standard thus preventing the technology from becoming the property of a single company! This wor# resulted in the release of the first Bluetooth )pecification in 1uly 1999!

The intention of the Bluetooth ,I- is to form a de facto standard for the air interface and the software that controls it. The further development of the )pecification still is one of
the main tas#s for the )&* other important ones being interoperability re2uirements fre2uency band

The Bluetooth wireless technology was developed by the Bluetooth ,pecial Interest -roup, to define an industry-wide specification for connecting personal and business mobile devices. 9ore than 6,<777 companies are now members of the ,pecial Interest -roup, signifying the industry=s unprecedented acceptance of the Bluetooth wireless technology.
harmoni$ation and promotion of the technology!

To avoid different interpretations of the Bluetooth standard regarding how a specific type of application should be mapped to Bluetooth, the ,I- has defined number of user models and protocol profiles. These are described in more detail in the section entitled Bluetooth >sage 9odels and rofiles.The ,I- also works with a ?ualification rocess. This process defines criteria for bluetooth product /ualification that ensures that products that pass this process meet the Bluetooth specification.

Page 6

Bluetooth

CHAPTER *. O+ER+IEW O, B-UETOOTH S.STE/.

Technology overview. )etwork architecture.

TECHNO-O#. O+ER+IEW0
Page 7

Bluetooth

The technology is an open specification for wireless communication of data and voice. It is low cost short range radio link, built into a :@: mm microchip, facilitating protected ad hoc connections for stationary and mobile communication environment. Bluetooth technology allows for the replacement of the many proprietary cables that connect one device to another device with one universal short range radio link. +or instance Bluetooth radio technology built in both the cellular telephone and the laptop would replace the cumbersome cables used today to connect the laptop to a cellular telephone. rinters, !"=,, desktops, fax machines, keyboard, 'oysticks and virtually any other device can be part of the Bluetooth system. But beyond untethering devices by replacing the cables, Bluetooth radio technology provides a universal bridge to existing data networks, a peripheral interface, and a mechanism to form small private ad hoc grouping of connected devices away from fixed network infrastructures. !esigned to operate in noisy radio fre/uency environment, the Bluetooth radio uses a fast acknowledgement and fre/uency hopping scheme to make the link robust. The Bluetooth radio modules avoid interference from other signals by hopping to a new fre/uency after transmitting or receiving a packet. %ompared with other systems operating in the same fre/uency band, the Bluetooth radio typically hops faster and uses shorter packets. This makes the Bluetooth radio robust than the other system. ,hort packages and fast hopping also limit the impact of random noise and long distance links. The encoding is optimized for uncoordinated environment. Bluetooth radios operate in the unlicensed I,9 band at A.<-3z. a fre/uency hop transceiver is applied to combat interference and fading. " shaped binary +9 modulation is applied to minimize transceiver complexity. The gross data rate is 6mbps. " Time !ivision !uplex scheme is used for full duplex transmission. The Bluetooth base band protocol is a combination of circuit and packet switching. ,lots can be reserved for synchronous packet. 5ach packet is transmitted in a different hop fre/uency. " packet nominally covers a single slot, but can be extended to cover up to B slots. Bluetooth can support an asynchronous data channel, up to C simultaneous synchronous voice channels, or a channel that simultaneously supports asynchronous data synchronous voice. 5ach voice channel supports D< kbps synchronous #voice$ link. The asynchronous channel can support an asymmetric link of maximally EA6 kbps in either direction while permitting BE.D kbps in the return direction, or a <CA.D kbps symmetric link.

Page 8

Bluetooth

INTRODUCTION 0
The Bluetooth technology answers the need for short range wireless connectivity within three areas 8 !ata and voice access points . %able replacement "d hoc networking

The Bluetooth technology specification specifies a system solution comprising hardware, software and interoperability re/uirements. The Bluetooth radio operates in a globally available A.<-3z I,9 band, ensuring communication compatibility worldwide.

D t

nd (oi%e %%e"" )oint 0

The Bluetooth technology facilitates real time voice and data transmission. The technology makes it possible to connect any portable and stationary communication device as easily as switching on the light. Fou can, for instance, surf the Internet G send e-mail on your potable % or notebook regardless of whether you are wirelessly connected through a mobile phone or through a wire bound connection # ,T), I,!),(,),@!(,$. 1oice channel use the Continuous Variable Slope Delta Modulation (CVSD$ coding scheme, and never retransmit voice packets. The %1,! was chosen for its robustness in handling dropped and damaged samples. Hising interference levels are experienced as increased background noiseI even at bit error rate up to <J the %1,! coded voice is /uite audible.

CAB-E REP-ACE/ENT0
The Bluetooth technology eliminates the use for numerous often proprietary cable attachments for connection of practically any kind of device. %onnections are instant and they are maintained even when devices are not within line of sight. The range of each radio is approximately 67 meters but it can be extended around 677 meters with an optional amplifier.

AD$HOC NETWOR1IN#8
" device e/uipped with Bluetooth radio establishes instant connection to another Bluetooth radio as soon as it comes into range. ,ince Bluetooth technology supports both point to point and point to multi point connection, several piconets can be Page 9

Bluetooth established and linked together ad hoc. The Bluetooth technology is best described as multiple piconet structure. Pi%onet is a connection of devices connected via Bluetooth technology in an ad hoc fashion . " piconet starts with two connected devices ,such as portable % and cellular phone and may grow into eight connected devices. "ll Bluetooth devices are peer units and have identical implementation. 3owever, when establishing a piconet, one unit will act as a master and the other as a slave for the duration of piconet connection.

NETWOR1 ARCHITECTURE0

Scatternet, adcombinations point-tomultipoint and to-point piconet.

hoc in

point-

Bluetooth units that come within range of each other can set up ad hoc point-to-point and0or point-tomultipoint connections! 3nits can dynamically be added or disconnected to the networ#! Two or more Bluetooth units that share a channel form a piconet. )everal piconets can be established and lin#ed together in ad hoc scatternets to allow communication and data e%change in fle%ible configurations! &f several other piconets are within range they each wor# independently and each have access to full bandwidth! Each piconet is established by a different fre2uencyhopping channel! "ll users participating on the same piconet are synchroni$ed to this channel! Unlike infrared de ices! Bluetooth units are not limited to line"of"si#ht communication. To regulate traffic on the channel one of the participating units becomes a master of the piconet while all other units become slaves! 4ith the current Bluetooth )pecification up to seven slaves can actively communicate with one master! 5owever there can be almost an unlimited number of units virtually attached to a master being able to start communication instantly!

Page 10

Bluetooth

CHAPTER 2

BLUETOOTH PROTOCOL STACK.

Bluetooth protocol stack G network architecture. The Bluetooth architecture strategy.

Page 11

Bluetooth

THE B-UETOOTH PROTOCO- STAC1 3 IT4S NETWOR1 ARCHITECTURE

1 % a rd &1 % a l
O BE5

W A E W A P U D P IP PPP R ,C O / / TC P

AT$ C o6 6 nd

T C S B IN

SD P

A u d io - *C A P

H o " t C o n t! o lle ! I n te ! f % e -/ P B "e 7 n d B lu e to o th ! d io

Figure 1 The Bluetooth Protocol Stack

Page 12

Bluetooth

A77!e(i KB5@ *" >! I H+%K 99 3%I ((%" ,! T% (9

tion" U"ed OB'ect E8change Protocol Web Application Protocol User Datagram Protocol Internet Protocol Point to Point Protocol ,erial %able emulation protocol based on 5T,I T, 7E.67 Host Controller Interface -ogical -ink Control and Adaptation Protocol Service Discovery Protocol Telephony Control Protocol -ink /anager Protocol

This section describes the Bluetooth architecture. The complete protocol stack comprises, as seen in +igure 6, of both Bluetooth specific protocols and non-Bluetooth specific protocols. In the fi&u!e' non$Bluetooth ")e%ifi% )!oto%ol" !e "h ded.

B "e7 nd
The Baseband and (ink %ontrol layer enables the physical H+ link between Bluetooth units forming a piconet. This layer controls the Bluetooth unit0s synchronization and transmission fre/uency hopping se/uence. The two different link types defined in Bluetooth, ,ynchronous %onnection Kriented, ,%K, and "synchronous %onnectionless, "%(, described in the section (ink types, are also managed by this layer. The "%( links, for data, and the ,%K links, mainly for audio, can be multiplexed to use the same H+ link L6EM.

Audio

Page 13

Bluetooth "udio transmissions can be performed between one or more Bluetooth units, using many different usage models. "udio data do not go through the (A%" layer #described below$ but go directly, after opening a Bluetooth link and a straightforward set-up, between two Bluetooth units.

Ho"t Cont!olle! Inte!f %e' HCI


The 3ost %ontroller Interface, 3%I, provides a uniform interface method for accessing the Bluetooth hardware capabilities. It contains a command interface to the Baseband controller and link manager and access to hardware status. +inally, it contains control and event registers L;M.

-in9 / n &e! P!oto%ol' -/P


The (ink 9anager rotocol, (9 , is responsible for link set-up between Bluetooth units. It handles the control and negotiation of packet sizes used when transmitting data. The (ink 9anager rotocol also handles management of power modes, power consumption, and state of a Bluetooth unit in a piconet. +inally, this layer handles generation, exchange and control of link and encryption keys for authentication and encryption L:M.

-o&i% l -in9 Cont!ol nd Ad )t tion P!oto%ol' -*CAP


The Bluetooth logical link control and adaptation protocol, (A%" , is situated over the Baseband layer and beside the (ink 9anager rotocol in the Bluetooth protocol stack. The (A%" layer provides connection-oriented and connectionless data services to upper layers. The four main tasks for (A%" are8 9ultiplexing N (A%" must support protocol multiplexing since a number of protocols #e.g. ,! , H+%K99 and T%, Binary$ can operate over (A%" . ,egmentation and Heassembly N !ata packets exceeding the 9aximum Transmission >nit, 9T>, must be segmented before being transmitted. This and the reverse functionality, reassemble, is performed by (A%" . ?uality of ,ervice N The establishment of an (A%" connection allows the exchange of information regarding current ?uality of ,ervice for the connection between the two Bluetooth units. -roups N The (A%" specification supports a group abstraction that permits implementations for mapping groups on to a piconet. "n (A%" implementation must be uncomplicated and implying low overhead since it must be compatible with the limited computational resources in a small Bluetooth unit L67M.

Page 14

Bluetooth

Se!(i%e Di"%o(e!y P!oto%ol' SDP


The ,ervice !iscovery rotocol, ,! , defines how a Bluetooth client0s application shall act to discover available Bluetooth servers0 services and their. Bluetooth characteristics. The protocol defines how a client can search for a service based on specific attributes without the client knowing anything of the available services. The ,! provides means for the discovery of new services becoming available when the client enters an area where a Bluetooth server is operating. The ,! also provides functionality for detecting when a service is no longer available L66M.

Cable replacement protocol R,CO//


The H+%K99 protocol is a serial port emulation protocol. The protocol covers applications that make use of the serial ports of the unit. H+%K99 emulates H,-ACA control and data signals over the Bluetooth baseband. It provides transport capabilities for upper level services, e.g. KB5@ that use a serial line as the transport mechanism.

Tele)hony %ont!ol )!oto%ol


Tele)hony Cont!ol : Bin !y The Telephony %ontrol protocol N Binary, T%, Binary or T%, BI), is a bitoriented protocol, which defines the call control signalling for the establishment of speech and data calls between Bluetooth units. The protocol defines the signalling for establishment and release of calls between Bluetooth units. "s well as signalling to ease the handling of groups of Bluetooth units. +urthermore, T%, Binary provides functionality to exchange signalling information unrelated to ongoing calls. 5stablishment of a voice or data call in a point-to-point configuration as well as in a point-to-multipoint %onfi&u! tion is covered in this protocol #note, after establishment, the transmission is from point to point$. The T%, Binary is based on the IT>-T Hecommendation.

Tele)hony Cont!ol : AT Co66 nd"


" number of "T-commands are supported for transmitting control signals for telephony control. These use the serial port emulation, H+%K99, for transmission. Page 15

Bluetooth

Adopted protocols
This section describes a number of protocols that are defined to be adopted to the Bluetooth protocol stack. )ote some of these adaptations are at the moment incomplete.

PPP
The I5T+ oint-to- oint rotocol # $ in the Bluetooth technology is designed to run over H+%K99 to accomplish point-to-point connections. is a packetoriented protocol and must therefore use its serial mechanisms to convert the packet data stream into a serial data streams.

TCP;UDP;IP

The TCP/UDP/IP standards are de !ned to o"erate !n Bluetooth un!ts allo#!ng the$ to %o$$un!%ate #!th other un!ts %onne%ted& or !nstan%e& to the Internet' (en%e& the Bluetooth un!t %an a%t as a )r!dge to the Internet' The TCP/IP/PPP "roto%ol %on !gurat!on !s used or all Internet Br!dge usage s%enar!os !n Bluetooth 1'0 and or *B+, !n uture -ers!ons' The UDP/IP/PPP %on !gurat!on !s a-a!la)le as trans"ort or ./P'
OBE5 P!oto%ol
IrKB5@, shortly KB5@, is an optional application layer protocol designed to enable units supporting infrared communication to exchange a wide variety of data and commands in a resource-sensitive standardized fashion. KB5@ uses a client-server model and is independent of the transport mechanism and transport " I. The KB5@ protocol also defines a folder-listing ob'ect, which is used to browse the contents of folders on remote device. H+%K99 is used as the main transport layer for KB5@.

Content fo!6 t"


Page 16

Bluetooth The formats for transmitting v%ard and v%alendar information are also defined in the Bluetooth specification. The formats do not define transport mechanisms but the format in which electronic business cards and personal calendar entries and scheduling information are transported. v%ard and v%alendar is transferred by KB5@.

Wi!ele"" A))li% tion P!oto%ol' WAP


The *ireless "pplication rotocol #*" $ is a wireless protocol specification that works across a variety of wide-area wireless network technologies bringing the Internet to mobile devices. Bluetooth can be used like other wireless networks with regard to *" , it can be used to provide a bearer for transporting data between the *" %lient and its ad'acent *" ,erver. +urthermore, Bluetooth=s ad hoc networking capability gives a *" client uni/ue possibilities regarding mobility compared with other *" bearers. The traditional form of *" communications involves a client device that communicates with a ,erver& roxy device using the *" protocols. Bluetooth is expected to provide a bearer service as specified by the *" architecture. The *" technology supports server push. If this is used over Bluetooth, it opens new possibilities for distributing information to handheld devices on location basis. +or example, shops can push special price offers to a *" client when it comes within Bluetooth range .he Bluetooth i! inte!f %e This section describes the Bluetooth air interface. It is a continuation of the introduction to the air interface and is based on L6AM.

The Bluetooth architecture strateg


" number of profiles have been defined by the Bluetooth standardization organization. These profiles have been developed in order to describe how implementations of user models are to be accomplished. The user models describe a number of user scenarios where Bluetooth performs the radio transmission. These profiles specify how applications and devices shall be mapped onto the Bluetooth concept. " profile defines a selection of messages and procedures from the Bluetooth specifications and gives an unambiguous description of the air interface for specified services and use cases. " profile can be described as a vertical slice through the protocol stack. It defines options in each protocol that are mandatory for the profile. It also defines parameter ranges for each protocol. The profile concept is used to decrease the risk of interoperability problems between different manufacturers0 products.

Page 17

Bluetooth The profile defined for exchanging of v%ard information is illustrated in +igure A, where an application, v%ard, is defined to operate over a certain subset #KB5@, H+%K99 and so on$ of the Bluetooth protocol stack. ,ome of the user models and their profiles are described in section Bluetooth >sage 9odels and rofiles.

(C A R D

O BE5

R ,C O / /

SD P

T C S B in ! y

- *C A P

-/ P B "e B n d

Figure 2: The b!ect Push Pro"ile


There are four general profiles defined, on which some of the highest prioritized user models and their profiles are directly based on. These four models areI the -eneric "ccess rofile #-" $, the ,erial ort rofile, the ,ervice !iscovery "pplication rofile #,!" $ and the -eneric Kb'ect 5xchange rofile #-K5 $. rotocols such as KB5@ and >! have been included in the protocol architecture to facilitate the adaptation of applications using such existing protocols. This gives for instance a number of existing applications supporting >! an interface to the Bluetooth technology.

Page 18

Bluetooth

CHAPTER <. !"#"S"O$ AS %U$CT"O$AL U$"T

,oftware architecture. 3ardware architecture. (ink types. "uthentication, rivacy G ,ecurity.

Page 19

Bluetooth

DI+ISION AS ,UNCTIONA- UNITS


The diffe!ent fun%tion l unit" in the Bluetooth "y"te6 !e0 " radio unit " link control unit (ink management ,oftware function

NETWOR1 TOPO-O#.0
"s already mentioned, the Bluetooth system support both point to point and point to multi point connections. In this, each piconet is identified by a different hopping signal. "ll users participating on the same piconet are synchronized to this hopping se/uence. The full duplex data rate within a multiple piconet structure with 67 fully loaded, independent piconets is more than D mbps. This is due to a data throughput reduction rate of less then 67J according to system simulation based on 7 dbm transmitting power #at the antenna$.

RADIO UNIT0
The Bluetooth air interface is based on a nominal antenna at 7 dBm. The air interface compiles with the +%% rules for the I,9 band at power levels up to 7 dBm. Spectru# spreading has been added to facilitate optional operation at power levels up to 677 mw worldwide. ,pectrum spreading is accomplished by fre/uency hopping in E: hops displaced by 6 93z, starting at A.<7A 93z and stopping at A.<;7-3z. !ue to local conditions the bandwidth has been reduced in ,pain, +rance and Oapan.

BASEBAND0
Page 20

Bluetooth

The baseband describes the digital signal processing hardware-the Bluetooth link controller, which carries out the baseband protocols and other low level link routines. Before establishing any network connections in a piconet structure, all devices are in the stand-by mode. In this mode an unconnected unit periodically Plistens= for messages every 6.A; seconds. 5ach time a device wakes up, it listens on a set of CA hop fre/uencies defined for that unit. The number of fre/uencies varies in different geographical regions I CA is a number for most countries # except ,pain, +rance and Oapan$. The connection procedures are initiated by any of the devices which then become master. " connection is made by a page message if the address is already known, or by an en/uiry message followed by a subse/uent page message if the address is already known. The master unit is the device in the piconet structure whose clock and hopping fre/uencies are used to synchronize all other units in the piconet. The devices other than master are called the slave units. In the initial page state, the master unit will send a train of 6D identical page messages on 6D different hop fre/uencies defined for the device to be paged#slave unit $. If no response, the master transmits a train on the remaining 6D hop fre/uencies in the wake up se/uence. The maximum se/uence before the master reaches the slave is twice the wake up period #A.BD sec.$, while the average delay is the wake up period #7.D< sec.$. The en/uiry typically used for finding Bluetooth devices, including public printers, fax machines and similar devices with an unknown messages, but may re/uire 6 additional train period to collect all the responses. " power saving mode can be used for connected units in a piconet if no data need to be transmitted. This power saving mode is the sni"" and hold #ode in which the device activity is lower. The master unit can put the slave units into the hold mode, !ata transfer restarts instantly when units transits out of the hold mode. The hold is used when connecting several piconet or managing a low power device such as temperature sensor. Two more low power modes are available, the sniff and the park mode. In the sniff mode, the slave devices listens to the piconet reduced rate thus reducing its duty cycle. The sniff interval is programmable and depends on the application. In the park mode a device is still synchronized to the piconet but dose not participate in the traffic. ,uch a device is the parked device and does not have a 9"% address. The 9"% address is a three bit address to distinguish the units participating in the piconet structure. arked device have given up their 9"% addresses and occasionally listen to the traffic of the master to resynchronize and check on broadcast messages. If we list modes in increasing order of power efficiency, the sniff mode has the higher duty cycled followed by the hold mode with a lower duty cycle .

-IN1 /ANA#E/ENT0
The link manager software entity carries out link set up, authentication, link configuration and other protocols. The (ink 9anager discovers other remote (ink 9anagers and communication with them via the (ink 9anager protocol. To perform its Page 21

Bluetooth service provider role, the (ink 9anager uses the service of the under lying controller. ,ervices provided are 8 6. ,ending and receiving of data. A. The link manager has an efficient means to in/uire and report a name or device I! up to 6D characters in length. C. (ink address in/uiries. <. %onnection set up. B. "uthentication. D. (ink 9ode negotiation and set up, e.g. data or data&voice. This may be changed during a connection. E. The (ink 9anager decides the actual frame type on a packet to packet basis. ;. ,etting a device in sniff mode I In sniff mode, the duty cycle of the slaves reduces. It listen only every 9 slots, where 9 is negotiated at the (ink 9anager. The master can start transmission in specified time slots spaced at regular intervals. :. ,etting a link device on hold I In hold mode, turning off the receiver for long periods saves power. "ny device can wake up the link again, with an average latency of < seconds. This is defined by the link 9anager and handled by the (ink %ontroller. 67. ,etting a device in park mode I It wakes up at regular intervals to listen to the channel in order to resynchronize with the rest of the piconet, and to cheek page messages.

SO,TWARE ,RA/EWOR10
Bluetooth devices will be re/uired to support baseline interoperabilit$ feature re/uirements to create a positive consumer experience. +or some devices, these re/uirements will extend from radio module compliance and air protocols and ob'ect exchange formats. +or other devices, such as headset, the feature=s re/uirements will be significantly less. 5nsuring that any device displaying the Bluetooth Plogo= interpolates with other Bluetooth devices is the goal of the Bluetooth program. ,oftware interoperability begins with the Bluetooth link level protocol responsible for multiplexing , device and service discovery, segmentation and reassemble, Bluetooth devices must be able to recognize each other and load the appropriate software to discover the higher level abilities each device supports. Interoperability at the application level re/uires identical protocol stacks. !ifferent classes of Bluetooth devices# %=s, handheld, headsets, cellular telephones$ have different compliance re/uirements. +or example, a Bluetooth headset is not expected to contain an address book. 3eadsets compliance implies Bluetooth radio compliance, audio capability and device discovery protocols. 9ore functionality would be expected from cellular phones, handheld and notebook computer. To obtain this functionality, the Bluetooth software framework will reuse existing specifications such as KB5@, 1card&1calender, 3uman Interface !evice and T% &I rather than inventing yet another set of new specifications. !evice compliance will re/uire conformation to Page 22

Bluetooth both, the Bluetooth specification and existing protocols. The software framework is contemplating the following functions8 6.%onfiguration and diagnosis utility A. !evice discovery C.%able emulation <. eripheral communication B."udio communication and call control D.Kb'ect exchange for business cards and phone books )etworking protocols.

-IN1 T.PES AND PAC1ET T.PES0


The link defines QwhatR of packets can be used on a particular link. The Bluetooth baseband technology supports two link types8 ,ynchronous connection oriented #,%K$ type #used primarily for voice$ "synchronous connectionless #"%($ type #used primarily for packet data$

!ifferent master slave pairs of the same piconet structure can use different link types and the link type may change arbitrarily during a session. 5ach link Qsupports up to 6D different packet types. +our of these are control packets and are common for both ,%K and "%( links. Both link types use a Time !ivision !uplex #T!!$ scheme for full duplex transmission.

,F)%3HK)K>, %K))5%TK), KHI5)T5! TF 58


The ,%K link is symmetric and typically supports time bound voice traffic. ,%K packets are transmitted over reserved intervals. Knce the connection is established, both master and slave units may send ,%K packets without being polled. Kne ,%K packet type allows both voice and data transmission I with only the data portion being retransmitted when corrupted.

",F)%3HK)K>, %K))5%TIK)(5,, (I)2 TF 58


The "%( link is packet oriented and supports both, symmetric and asymmetric traffic. The master unit controls the link bandwidth and decides how much piconet bandwidth is given to each slave, and the symmetry of the traffic. ,laves must be polled before they can transmit data. The "%( link also supports broadcast messages from the master to all slaves in the piconet. Page 23

Bluetooth

&n order to ma#e different hardware implementations compatible Bluetooth devices use the 5C& as a common interface between the Bluetooth host +e!g! a portable 6C, and the Bluetooth core! 5igher-level protocols li#e the )76 8'C9MM +emulating a serial port connection, and the TC6 are interfaced to baseband services via the ..C"6! "mong the issues ..C"6 ta#es care of is segmentation and reassemble to allow larger data pac#ets to be carried over a Bluetooth baseband connection! The service discovery protocol allows applications to find out about available services and their characteristics when e!g! devices are moved or switched off!

HARDWARE ARCHITECTURE 0

The Bluetooth hardware consists of an analog radio part and a digital part - the 5ost Controller! The 5ost Controller has a hardware digital signal processing part called the .in# Controller +.C, a C63 core and interfaces to the host environment ! The .in# Controller consists of hardware that performs baseband processing and physical layer protocols such as "8: +"utomatic 8epeat re:uest, protocol and 'EC +'orward Error Correction, coding! The function of the .in# Controller includes "synchronous transfers )ynchronous transfers "udio coding and Encryption! The C63 core allows the Bluetooth module to handle &n2uiries and filter 6age re2uests without involving the host device! The 5ost Controller can be programmed to answer certain 6age messages and authenticate remote lin#s! The .in# Manager +.M, software runs on the C63 core! The .M discovers other .Ms and communicates with them via the .in# Manager 6rotocol +.M6, to perform its service provider role and to use the services of the underlying .in# Controller!

5HHKH %KHH5%TIK)8
There are three error correction schemes defined by the Bluetooth baseband controllers. Page 24

Bluetooth 6&C rate +orward 5rror %orrection code #+5%$ A&C rate +orward 5rror %orrection code automatic repeat re/uest #"H?$ scheme for data

+KH*"H! 5HHKH %KHH5%TIK)8


The purpose of the +5% on the data payload is to reduce the number of retransmission. 3owever, in a reasonably error free environment, +5% creates unnecessary overhead that reduces the throughput. Therefore, the packet definitions have been kept flexible as to whether or not to use the +5% in the payload. The packet header is always protected by a 6&C rate +5%I it contains valuable link information and should survive bit errors.

">TK9"TI% H5 5"T H5?>5,T8


"n unnumbered "H? scheme is applied in which the data transmitted in one slot is directly acknowledged by the recipient in the next slot. +or a data transmission to be acknowledged, both the header error check and the cyclic redundancy check must be maintained otherwise a negative acknowledge is returned.

AUTHENTICATION' PRI+AC. 3 SECURIT.0


The Bluetooth baseband provides user protection and information privacy mechanism at the physical layer. "uthentication and privacy is implemented in the same way in each Bluetooth device, appropriate for the ad-hoc nature of the network. %onnections may re/uire a one way, two ways or no authentication. "uthentication is based on a challenge-response algorithm. "uthentication is a key component of any Bluetooth system, allowing the user to develop a domain of trust between a personal Bluetooth device, such as allowing only the owners notebook computer to communicate through the owners cellular phone.

5ncryption is used to protect privacy of the connection. Bluetooth uses a string cipher well-suited for a silicon implementation with secret key lengths of 7, <7 or D< bits. 2ey management is left to higher layer software. The goal of Bluetooth=s security mechanism is to provide an appropriate level of protection for Bluetooth short-range nature and use in a global environment. >sers re/uiring stalwart protection are encouraged to use stronger security mechanisms available in network transport protocols and application programs. Bluetooth security
Page 25

Bluetooth Introducing the Bluetooth technology as a cable replacement techni/ue exposes the need for security functionality in the wireless solution. By replacing the cable and introducing radio signals there is a need for the Bluetooth device to have built-in security to prevent eavesdropping and falsifying the message originator. Therefore, functionality for authentication and encryption has been added to the Bluetooth technology. "uthentication is used to prevent unwanted access to data and to prevent falsifying of the message originator. 5ncryption is used to prevent eavesdropping. These two techni/ues combined with the fre/uency hopping techni/ue and the limited transmission range for a Bluetooth unit, usually 67 m, give the technology higher protection against eavesdropping.. ,ince the need for security is dependent on what kind of application is executed, three levels of security are defined in the Bluetooth concept. 6. )on-secure8 This mode bypasses functionality for authentication G encryption. A. ,ervice-level securityI ,ecurity procedures are not initiated until (A%" channel establishment. C. (ink-level securityI ,ecurity procedures are initiated before the link set-up at the (9 level is completed.

Se!(i%e$le(el "e%u!ity
In the ,ervice-level security mode, it is suggested to introduce a ,ecurity 9anager that controls the access to services and units. This security mode provides the possibility to define trust levels for the services and units used respectively. The access is restricted according to the defined trust levels.

-in9$le(el "e%u!ity
The (ink-level security mode is based on the concept of link keys. These keys are secret 6A; bit random numbers stored individually for each pair of devices in a Bluetooth connection. 5ach time two Bluetooth units communicate, the link key is used for authentication and encryption.

Page 26

Bluetooth

CHAPTER =. CO&&U$"CAT"O$ ' %RE(UE$C) HOPP"$*+ , BLUETOOTH $ET-ORKS+

The fre/uency hopping techni/ue. Bluetooth networking.

Page 27

Bluetooth

The ,!e>uen%y Ho))in& Te%hni>ue


Interference is avoided by using a fre/uency-hop, +3, spread spectrum technology. This technology is well suited for low-power, low-cost radio implementations and is used in some wireless (") products. The main advantage with Bluetooth0s choice of parameters is the high hop rate, 6D77 hops per second, instead of 'ust a few hops per second. The shorter packet length in the Bluetooth technology is another benefit. The fre/uency band in +3 systems is divided into a number of hop channels. 5very hop channel is 'ust a fraction of the total fre/uency band. In Bluetooth one channel is used in #one slot$ followed by a hop in a pseudo-random order to another channel for another transmission, repeated constantly. In this way the hopping spreads the Bluetooth traffic over the entire I,9 band and a system with good interference protection is achieved. If one of the transmissions is 'ammed by, for instance, a microwave oven, the probability of interference on the next hop channel is very low. 5rror correction algorithms are used to correct the fault caused by 'ammed transmissions.

/odul tion;T! n"6i""ion nd ) %9et definition


" -aussian shaped binary +,2 modulation is used to reduce the transceiver complexity in Bluetooth units. +ull duplex transmission capability is achieved by using time division duplex, subse/uent slots are used for transmitting and receiving. The Bluetooth baseband protocol is a combination of circuit and packet switching. Heservation of slots can be done for synchronous packets. Kne packet typically uses one slot, but a multi-slot method is also defined in the Bluetooth specifications. 9ulti-slot packets can cover three or five slots. ackets are always sent on one single hop channel. That means that when multi-slot packets are transmitted the hopping fre/uency is reduced and there is no hop until the whole packet is sent. This is illustrated in +igure B. The channel using the white packet. starts the illustrated se/uence with a multi-slot packet covering three slots. )ote that the hopping channel after the multi-slot packet is the same #compare with +igure <$ as if there had not been a multi-slot packet.

Bluetooth netwo!9in&
Page 28

Bluetooth

H o ) " e le % tio n

H o) "l (e % lo % 9 P h "e

Se> u en %e O ff "e t

" te ! id e n tity

*hen Bluetooth units are communicating, one unit is master and the rest of the units act as slaves. The master unit0s system clock and the master identity are the central parts in the fre/uency hop technology. The hop channel is determined by the hop se/uence and by the phase in this se/uence. The identity of the master determines the se/uence and the master unit0s system clock determines the phase. In the slave unit, an offset may be added to its system clock to create a copy of the master0s clock. In this way every unit in the Bluetooth connection holds synchronized clocks and the master identity, that uni/uely identifies the connection. 3ops synchronized with the master can therefore be achieved as described in +igure D. E: hop carriers have been defined for the Bluetooth Technology except for +rance and ,pain where AC hop carriers have been defined, because the I,9-band is narrower there. ,lave

+igure D

The hop selection

The Bluetooth packets have a fixed format. " EA-bit access code comes first in the packet. The access code is based on the master0s identity and the master0s system clock, i.e. it provides the means for the synchronization. This code is uni/ue for the channel and used by all packets transmitting on a specific channel. " B<-bit header follows the access code. This header contains error correction, retransmission and flow control information. The error correction information can. be used for correcting faults in the payload and in the header itself. +inally %omes he payload field with anything between zero and A,E<B bits, i.e. up to C<7 bytes.

Page 29

Bluetooth

f nSA f nS6 fn E A B its B < b its $-A E < B b its " ccess code acket header a y lo a d

t ?*= m s

Figure % The Bluetooth packet "or#at

R dio ) ! 6ete!"
Bluetooth units operate on the I,9 band, at A.<B -3z. The transmitting power is between 6 and 677 m*. The radio-fre/uency transmitters are very small. 5ricsson0s 6 m* Bluetooth radio module is only 67.Ax6<x6.D mm. The low power consumption implies that a Bluetooth unit can operate on the power from a small battery for a long time #months$. These hardware characteristics make it possible to fit a Bluetooth unit in many electrical devices. The maximum Bluetooth range is 67 m, with a possibility to extend it to 677 m. The maximum bit rate is 6 9bit&s. 9aximum effective payload is lower because the different protocol layers re/uire data payload for signalling to their %orresponding layers in the unit with which the device is communicating. 5stimates have indicated data transfer rates up to EA6 kbit&s. D t ) %9et" are protected by an "utomatic Hetransmission ?uery, "H?, and scheme. This scheme implies that at every packet reception an error check is done. If an error is detected, the receiving unit indicates this in the return packetI thus lost or faulty packets only cause a one-slot delay. In this way, retransmission is in this way selective, only faulty packets are retransmitted. ,ince retransmission is not optimal for voice transmissions due to its vulnerability for delays, a voice-encoding scheme is used. This scheme is highly resistant to bit errors. The errors that cannot be corrected result in an increasing background noise.

Pi%onet nd S% tte!net
Page 30

Bluetooth "ny two Bluetooth devices that come within range of each other can set up a so-called ad hoc connection. *hen such a connection is established a piconet is formed. There is always a master unit in a piconet and the rest of the units act as slaves. >p to eight active units can form a piconet, which is defined by the channel these units share. The number of devices in a piconet is actually unlimited even though you can have only eight active devices at any given moment. There is no difference in hardware or software between a master and a slave, hence any unit can be master. The unit that establishes the piconet becomes the master unit. The roles in a piconet can change but there can never be more than one master. The master unit controls all traffic in the piconet. It allocates capacity for ,%K links and handles a polling scheme for "%( links. ,lave units may only send in the slave-tomaster slot after being addressed in the preceding master-to-slave slot. If the master does not have any information to send in the master-to-slave slot, a packet with access code and header only is sent. That is, every slave unit is addressed in a specific order, and polling scheme, and may only send upon being addressed. In this way, packet collisions between sending slave units are eliminated.

E"t 7li"hin& netwo!9 %onne%tion"


Before a unit has 'oined a piconet it is in standby mode. In this mode, an unconnected unit periodically wakes up and listens for messages every 6.A; seconds. aging messages are transmitted on CA of the E: #6D of AC for ,pain and +rance$ hop carriers which are defined as wake-up carriers #the unit0s identity determines which of the hop carriers it is$. " connection is made by a page message if the address is already known, or by an in/uiry message followed by a subse/uent page message if the address is unknown. The wake-up se/uence is transmitted by the master over the CA #or 6D for ,pain and +rance, below is the CA hop carrier system described$ wake up carriers. Initially, the 6D first hop carriers are used, if there is no response, the rest of the carriers are used. The slave0s system clock determines the phase in the wake-up se/uence. The slave listens for 6; slots on the wake-up carrier and compares the incoming signal with the access code derived from its own identity. If there is a match, the unit invokes a connection-set-up procedure and enters %onnected mode. The master unit must know the slave0s identity and its system clock. This is re/uired to calculate the proper access code and the wakeup se/uence and to predict the wake-up se/uence phase. To keep track of the slaves0 system clocks, a paging procedure is defined for the master unit. It defines how identities are. transmitted between master and slave units and how the slaves0 current system clocks are distributed to the master. To connect units with an unknown address an in/uiry signal is transmitted initially. This signal is used to inform the master unit of the slave0s identity within transmission range. The paging unit on the in/uiry wake-up carriers sends an in/uiry access code. >nits receiving this message respond with their Page 31

Bluetooth identity and system clock. The in/uiry message is typically used for finding Bluetooth devices, including public printers, fax machines and similar devices with an unknown address.

Power saving modes


Three different power saving modes have been defined, 3old, ,niff and ark. They can be used if there is no data transmission ongoing in the piconet. " slave can either demand to be put in 3old mode or be put in 3old by the master unit. In 3old mode only an internal timer is running. !ata transfer restarts instantly when units make the transition out of 3old mode. The mode is used when connecting several piconets or managing a low power device such as a temperature sensor. In the ,niff mode, a slave device listens to the piconet at reduced rate, thereby reducing its duty cycle. In the ark mode a unit remains synchronized in the piconet but does not participate in the traffic L6CM.

S% tte!net
To optimize the use of the available spectrum, several piconets can exist in the same area. This is called ,catternet. *ithin one ,catternet all units share the same fre/uency range but each piconet uses different hop se/uences and transmits on different 6 93z hop channels. Thus, a way to optimize the data transmission capability is to keep the piconets small #i.e. few units$. "ll piconets share the ;7 93z band, where each piconet uses 6 93z, thus, as long as the piconets pick different hop fre/uencies, no sharing of 6 93z hop channels occurs. Why B

CHAPTER ?. BLUETOOTH USA*E &O!ELS+

Page 32

Bluetooth

Bluetooth usage models.

Bluetooth U" &e /odel"


In this section a number of Bluetooth usage models are described. +or each usage model there is one or more corresponding profiles defining protocol layers and functions to be used. The profiles are not described in detail in this document, for more information refer to the Bluetooth standardization documents.

,ile T! n"fe!
The +ile Transfer usage model offers the capability to transfer data ob'ects from one Bluetooth device to another. +iles, entire folders, directories and streaming media formats are supported in this usage model. The model also offers the possibility of browsing the contents of the folders on a remote device. +urthermore, push and exchange operations are covered in this usage model, e.g. business card exchange using the v%ard format. The +ile Transfer model is based on -K5 . Page 33

Bluetooth

Inte!net B!id&e
The Internet Bridge usage model describes how a mobile phone or cordless modem provides a % with dial-up networking capabilities without the need for physical connection to the %. This networking scenario re/uires a two-piece protocol stack, one for "T-commands to control the mobile phone and another stack to transfer payload data..

-AN A%%e""
The (") "ccess usage model is similar to the Internet Bridge user model. The difference is that the (") "ccess usage model does not use the protocols for "Tcommands. The usage model describes how data terminals use a (") access point as a wireless connection to a (ocal "rea )etwork. *hen connected, the data terminals operate as if it they were connected to the (") via dial-up networking.

Syn%h!oni@ tion
The synchronization usage model provides the means for automatic synchronization between for instance a desktop %, a portable %, a mobile phone and a notebook. The synchronization re/uires business card, calendar and task information to be transferred and processed by computers, cellular phones and !"s utilizing a common protocol and format.

Th!ee$in$One Phone
The Three-in-Kne hone usage model describes how a telephone handset may connect to three different service providers. The telephone may act as a cordless telephone connecting to the public switched telephone network at home, charged at a fixed line charge. This scenario includes making calls via a voice base station, and making direct calls between two terminals via the base station. The telephone can also connect directly to other telephones acting as a Qwalkie-talkieR or handset extension i.e. no charging needed. +inally, the telephone may act as a cellular telephone connecting to the cellular infrastructure. The cordless and intercom scenarios use the same protocol stack.

Ulti6 te He d"et
Page 34

Bluetooth

The >ltimate 3eadset usage model defines how a Bluetooth e/uipped wireless headset can be connected, to act as a remote unit=s audio input and output interface. The unit is probably a mobile phone or a % for audio input and output. "s for the Internet Bridge user model, this model re/uires a two-piece protocol stackI one for "Tcommands to control the mobile phone and another stack to transfer payload data, i.e. speech. The "T-commands control the telephone regarding for instance answering and terminating calls.

CHAPTER A. CO&PET"$* TECH$"(UES


Page 35

Bluetooth

, BLUETOOTH+

%ompeting techni/ues. Bluetooth strength.

Co6)etin& te%hni>ue"
There are a number of competitors to the Bluetooth technology. 3owever, there is no obvious single competitor in all the market segments in which the Bluetooth technology can operate.

I!DA
Page 36

Bluetooth

The main competitor in the cable replacement market segment is Ir!". Ir!" is an infrared interface standard providing wireless solutions between, for instance, mobile phones and !"s. The techni/ue is well known in the market but has had problems because some Ir!" manufacturers have made implementations incompatible with standard implementations. The maximum payload in the Ir!" technology exceeds the maximum Bluetooth payload. The two main disadvantages with Ir!" are that it is limited to point-to-point connections #only two parties in a connection$ and its need for line of sight #since it is based on infrared light$.

I6)le6ent tion" 7 "ed on IEEE BC*.11


The main competitors in the market segment for wireless (") are the implementations based on the I555 ;7A.66 standard. ,ome of these implementations also use the fre/uency hopping technology. The main differences between Bluetooth and these implementations are8 TImplementations based on I555 ;7A.66 have higher transmission capacity U The number of simultaneous users is higher for I555 ;7A.66-based systems U The Bluetooth hardware size is considerably smaller U The five 5uro unit is 67 to A7 times cheaper than an I555 ;7A.66 unit U The number of fre/uency hops is considerably higher for Bluetooth than for an I555 ;7A.66 implementation.

Ult! $Wide7 nd R dio' UWB


>ltra-*ideband Hadio, >*B, is a new radio technology. The concept is similar to radar. ,hort pulses are transmitted in a broad fre/uency range. The information is modulated by the pulses0 time and fre/uency. The techni/ue is not fully developed but might be a threat to the Bluetooth concept since its superiority in capacity and power consumption. >*B prototypes indicate payloads up to 6.AB 9bit&s with E7 meters range at 'ust 7.B m* power consumption.

Ho6e R,
3ome H+ is a techni/ue developed by a consortium with, among others, 9icrosoft, Intel, 3 , 9otorola and %ompa/. The techni/ue is developed from the. !5%T concept and operates in the A.< -3z fre/uency band #the same as Bluetooth$. The intention has been to develop a techni/ue for the home market. There are many Page 37

Bluetooth similarities with Bluetooth, price per unit, range, transmitting power etc. The ma'or differences are that 3ome H+ can handle up to 6AE units per net and it uses 'ust B7 fre/uency hops per second. The figures for Bluetooth are ; and 6D77 respectively.

TEC H N O -O # .

/ A 5 B A N D W ID T H

C O / / EN T P a ! e t o r i e n t e d " o r d a t a a p p l i ! a t i o n s #m a $ "u ll d u p le$ d a ta r a te is 4 % & b p s# a r r a n g ed a s ' 4 b p s ! h a n n els "o r sp ee! h P r im a r il( d esig n ed a s n o i! e ser v i! e# n o t p a ! et# e$ p en siv e (t( p i! a ll( ) 1 * * "o r a h a n d set a n d h o m e b a se sta tio n ) + er ( ! h ea p (n o w a r iu n d ) 1 to ) & p er in sta lla tio n ) lo w r a n g e (,1 m ) a n d lin e o " sig h t o n l(

B lu eto o th DEC T IR

1 m b p s(g r o ss r a te)

144

bps

4 m bps

Bluetooth strengths The Bluetooth concept offers several benefits compared with other techni/ues. The main advantages of Bluetooth are8 U The minimal hardware dimensions U The low price on Bluetooth components U The low power consumption for Bluetooth connections. The advantages make it possible to introduce support for Bluetooth in many types of devices at a low price. The diversity in product offerings #mobile phones, !"s, computers, computer hardware, notebooks etc$ from companies in the Bluetooth ,Iand their broad support for the techni/ue creates a uni/ue market position. Both hardware and device manufacturers will work for the introduction of Bluetooth in many different devices. The capabilities provided by Bluetooth, approximately EA7 kbit&s, can be used for cable replacement and several other applications such as speech, (") and so on, as described in the use cases, described in the section entitled Bluetooth >sage 9odels. +igure ; indicates in what areas the Bluetooth concept can be used. !efining of specific user models and corresponding profiles combined with the four general profiles will most likely lead to a market situation where applications covered by the user models will use the defined user models and their profiles. +urthermore, it is likely that new Page 38

Bluetooth applications will use the standard profiles and thereby avoid interoperability problems between different manufacturers. The Bluetooth baseband protocol is a combination of circuit and packet switching. ,lots can be reserved for synchronous packet. 5ach packet is transmitted in a different hop fre/uency. " packet nominally covers a single slot, but can be extended to cover up to B slots. Bluetooth can support an asynchronous data channel, up to C simultaneous synchronous voice channels, or a channel that simultaneously supports asynchronous data synchronous voice. 5ach voice channel supports D< kbps synchronous #voice$ link. The asynchronous channel can support an asymmetric link of maximally EA6 kbps in either direction while permitting BE.D kbps in the return direction, or a <CA.D kbps symmetric link.

CHAPTER B.
Page 39

Bluetooth

APP-ICATION ON 2$# WOR-D.

ossible C-- support application. The specification Technical definition.

Page 40

Bluetooth

/ADOR APP-ICATIONS IN THE 2$# WOR-D Po""i7le 2# Su))o!t A))li% tion"


The following examples demonstrate how C- and Bluetooth work together, providing local intercommunication as well as wide area connectivity in a wide range of applications. These are not definitive and by no means exhaustive, but aim to show how complementary standards can work together to provide a greater level of service than either could achieve separately. +endin& 6 %hine" in "ho))in& 6 ll "ll the automatic vending machines within a confined area can, through a Bluetooth access system, be connected to a central vending machine administration unit, that in turn uses a C- access system to call for maintenance or supplies. 9inor problems can be relayed to the 9all technician directly through his Bluetooth communicator. ricing changes can be sent from central administration and locally QbroadcastR to all Bluetooth vending machines. E$6 il deli(e!y to the PC C- terminals will be able to handle several channels simultaneously #e.g. voice, fax and data each re/uiring different channel characteristics and speeds$. *ith predictions of terminal penetration being very high #every member of the population above the age of 6A in a few years$, the % itself does not have to be a C- terminal in order to receive e-mails on the move. " Bluetooth&C- terminal can receive e-mail as a data transmission and forward it, via Bluetooth to the % #assuming it is within close proximity$. *hen the reception is complete, the % can notify the user via Bluetooth and Page 41

Bluetooth a short message to his mobile terminal that he has e-mail, and if an item is urgent, this fact can be forwarded too. This concept allows the C- terminal to be the local QheadendR for a variety of applications that are locally interconnected via Bluetooth. If for example, such an e-mail was received while waiting for a train or plane, the user could approach a Bluetooth services booth #example new commercial enterprise for business travelers$. 3ere, for a fee chargeable to his charge&credit card or e-*allet, he can instruct his % to print the e-mails of interest #using his C-&Bluetooth terminal to control it, leaving the % in the briefcase$.

The e$W llet


9any people believe that the mobile phone can become the portal of first choice to the e-commerce world. "t present however a separate ,mart %ard is re/uired to hold electronic cash - no-one wants to remove their ,I9 from the phone in order have it read by a oint of ,ale terminal. Bluetooth of course will allow the ,I9 #which now becomes a multi-function ,mart %ard$ to be read while it remains in the phone. *ith 677 2bytes ,mart %ards on the horizon we can foresee our mobile phones becoming the main repository for our cash, health info, personal preferences, season tickets, etc. etc. The wide area cellular world will be one of the main routes for updating it.

The Unde!&!ound T! in
>nderground facilities suffer from QpoorR coverage on cellular systems. 9any underground rail operators are overcoming this by installing systems designed to provide driver and station staff with a reliable communication network. ,ystems such as T5TH" #T5rrestrial Trunked Hadio$ provide sufficient capacity that there is spare to carry some passenger traffic too. %arriages e/uipped with Bluetooth transceivers would provide a gateway between the train T5TH" system and the user=s C-&Bluetooth terminal, and the T5TH" system would provide the gateway to the surface public networks. +or the convenience of other passengers, not all carriages would be enabled for support of voice over Bluetooth #though the use of Bluetooth for broadcasting timetable information, advertising etc. could be available in all carriages$.

The Bluetooth He d"et


The C-&Bluetooth terminal mentioned in the above example does not in fact need to be in the user=s hand or pocket during most of the noted transactions. The user will have a Bluetooth headset #a product already announced by 5ricsson$ allowing him to leave the terminal in his briefcase too. This may provide voice control&recognition functionality, removing most of the need for a keyboard or display on the C- terminal. These suggestions may raise the /uestion as to where the terminal #C-$ in fact should reside. 9uch of the functionality delivered by C- systems will be directed towards a Page 42

Bluetooth data terminal device such as a % or palm top computer and it may be logical to build the C- terminal into it. *ith an external #Bluetooth$ headset, there would be nothing to hold, though a simple 99I #9an 9achine Interface$ device to allow dialing and displaying of short messages #connected to the main terminal by Bluetooth of course$ may be re/uired. If this could be made credit card sized it becomes a small version of the bpad discussed above and may well replace the handset&terminal as we know it. "lternatively, as has been suggested previously in this paper, the % and C- terminal may be physically separate devices while being functionally connected when in close proximity to each other. This perhaps offers greater flexibility #it wouldn=t be necessary to carry a % everywhere simply to make and receive calls$, while losing none of the functionality of the combined device. In some cases it may even be possible to leave the % at home connected to the 3ome Base ,tation #via Bluetooth$, and retrieve data from it directly to the bpad using Bluetooth and C- together.

THE SPECI,ICATION IS AS ,O--OWS0


+re/uency band 8A.< -3z #unlicensed I,9 band$ Transmitting power8 6 milliwatt#7dBm$ Technology 8 spread spectrum I hybrid direct se/uence and fre/uency hopping. 9aximum voice channels 8 C per piconet !ata speed 8 EA6 kbps per piconet 5xpected system range 8 67 meters #<7 feet$ )umber of devices supported 8 ; per piconet, 67 piconets in coverage area. ,ecurity 8 Fes, link layer. ower re/uirements 8A.E volts. ower consumption 8 C7 u" sleep, B7 u" hold, C77u" stand by, ;-C7m"transmitting. 9odule size 8 7.B s/uare inches. Interference 8 Bluetooth minimize potential interference by employing fast fre/uency hopping N6D77 times a second.

TECHNICA- DE,INITIONS 0
I%K)5T 8 " collection of devices connected via Bluetooth technology in an ad hoc fashion. " piconet starts with grow to eight connected devices. "ll Bluetooth devices are peer unit and have identical implementations. 3owever, when establishing a piconet connection. The Bluetooth system supports both point-to-point and point-to-multi point connections. ,%"TT5H)5T ,catternet. 8 9ultiple independent and non-synchronized piconets form a Page 43

Bluetooth

9",T5H >)IT 8 The devices in the piconet whose clock and hopping se/uence are used to synchronize all other devices in the piconet. ,("15 >)IT, 8 "ll devices in the piconet that are not the master. 9"% "!!H5,, 8 C-bit address to distinguish between units participating in the piconet. "H25! >)IT, 8 !evices in a piconet, which are synchronized but do not have a 9"% address. ,)I++ ")! 3K(! 9K!5 8 !evices synchronized to a piconet can enter power saving modes in which device activity is lowered.

Page 44

You might also like