You are on page 1of 25

BLUETOOTH VS.

WI-FI:
CATS AND DOGS LIVIVNG
TOGETHER
BLUETOOTH AND WI-FI --
DIFFERENT ANIMALS:
Bluetooth technology was developed to create a
short-range wireless voice and data link between
a broad range of devices such as PCs, notebook Bluetooth is secure in that it employs several
computers, handhelds and PDAs (hereafter layers of data encryption and user authentication
referred to as PDAs), Smart Phones, mobile measures. Bluetooth devices use a combination
phones and digital cameras. Consistent with its of the Personal Identification Number (PIN) and
aim of operating in even the smallest battery- a Bluetooth address to identify other Bluetooth
powered devices, the Bluetooth specification devices. Data encryption (i.e., 128-bit) can be
calls for a small form factor, low power used to further enhance the degree of Bluetooth
consumption and low cost. The range and speed security. The transmission scheme (FHSS)
of the technology were kept intentionally low so provides another level of security in itself.
as to ensure maximum battery life and minimum Instead of transmitting over one frequency
incremental cost for devices incorporating the within the 2.4 GHz band, Bluetooth radios use a
technology. At its heart, Bluetooth is about fast frequency-hopping spread spectrum (FHSS)
creating a Wireless Personal Area Network technique, allowing only synchronized receivers
(WPAN) consisting of all the Bluetooth-enabled to access the transmitted data. The Bluetooth
electronic devices immediately surrounding a radio transmissions will conform to the safety
user, wherever that user may be located. standards required by the countries where the
technology will be used with respect to the
The IEEE 802.11 standard was designed to be affects of radio transmissions on the human
the best solution for a single specific application: body. Emissions from Bluetooth enabled devices
wireless Ethernet. It is implemented in PCs, will be no greater than emissions from industry-
laptops, PDAs and network access points and is standard cordless phones. The Bluetooth module
meant to offer comparable performance to wired will not interfere or cause harm to public or
Ethernet LANs. Wi-Fi offers benefits to users private telecommunications network.
that wish to gain LAN or Internet access while
moving about an office or traveling and to small Bluetooth is a convenient way for
to mid-sized organizations seeking a rapid LAN communicating for a personal network, but it is
deployment. At its heart, Wi-Fi is about enabling not suitable as a LAN replacement, or in
wireless LAN access for computer and other perennial data transfer. But the growing
portable device users. popularity of laptops necessitated the need for a
wireless standard that would allow the people to
walk around their laptops and still be connected
INTRODUCTION: to a network. Wi-Fi, an abbreviation for Wireless
Bluetooth is a Wireless Personal Area Fidelity, is a wireless standard that promises
Networking (WPAN) protocol designed as a modularity while offering data rates comparable
cable-replacement technology providing a low on those a wired LAN. Wi-Fi is a collection of
cost, low power, modest speed, and short range standards ratified by the IEEE (Institute of
(<10 meters) radio communications. Originated Electrical and Electronics Engineering). In 1997,
in 1999, it is intended to provide robust services IEEE approved the 802.11 standard which laid
to small ad hoc networks. Since security is down the specifications in wireless LAN.
essential to many wireless applications, the Subsequently, revisions were made to this
Bluetooth specifications include security standard and these resulted in three other
mechanisms at various levels of their protocol standards, namely 802.11a, 802.11b, 802.11g.
stack. The entire family of 802.11 standards are
collectively called Wi-Fi. Hence, Wi-Fi or short
for "Wireless Fidelity" is the term for a high-
frequency wireless local area network (WLAN).
ORIGIN: clients to replace traditional cable networks. A
wire network required a thorough design of the
In 1994, Ericsson Mobile Communications, the
network topology and manual laying of hundreds
global telecommunications company based in
of meters of cable, sometimes in the most
Sweden, initiated a study to investigate the
unexpected places. Whereas all it takes to
feasibility of a low-power, low-cost radio
organize a wireless network is to install several
interface between mobile phones and their
base stations at one or several spots in the office
accessories. The aim of the study was to find a
(a central receiver and transmitter with an
way to eliminate cables between mobile phones
antenna connected to an outside network or a
and PC cords, headsets, desktops and other
server) and insert a network card with an
devices. The study was part of the larger project
antenna. After that, both people and computers
investigating how different communications
can be moved freely, and even changing offices
devices could be connected to the cellular
wouldn’t damage the network.
network via mobile phones. The company
determined that the last link in such a connection
In the United States, a company had
should be short-range radio link. As the project
offered in December 2003 to make the whole of
progressed, it became clear that the applications
San Francisco Wi-Fi. In Spain, Telephonic
for a short-range radio link were virtually
launched the services ADSL Wi-Fi, which has
unlimited.
led it to sign various agreements with public
centers, like hotels or convention centers, to
Ericsson’s work in this area caught the attention
install access points. The operator has created
of IBM, Intel, Nokia and Toshiba. The
almost 400 hotstops. Some educational institutes
companies formed a Bluetooth Special Interest
offering Wi-Fi are Pathways World School,
Group (SIG) in May 1998, which grew to over
Guraon while most IITs and IIMs, Anna
1500 member companies by April 2000 faster
University, Annamalai University, and
than any other wireless consortium has grown.
International School of Business (ISB) in
The companies jointly developed the Bluetooth
Hyderabad, Mount Zion College of Engineering
1.0 specification, which was released in July
and Technology have also become hotspots.
1999. The specification consists of two
documents:
• The foundation core: This provides MAIN FEATURES:
design specification.
• The foundation profile: This BLUETOOTH TECHNOLOGY:-
provides interoperability o It is wireless
guidelines. o It is inexpensive.
The core document specifies components such as o You don’t have to think about it i.e.,
radio, base band, link manager, service discovery does not require you to do anything
protocol, transport layer, and interoperability special to make it work.
with different communication protocols. The o Operates in the 2.56 GHz ISM band,
profile document specifies the protocols and which is globally available.
procedures required for different types of o Uses FHSS (Frequency Hopping Spread
Bluetooth applications. Spectrum)
o Can support up to 8 devices in the Pico
The five founding companies of Bluetooth SIG net.
were joined by 3Com, Lucent, Microsoft and o Omni-directional, non line of sight
Motorola to form the Promoter Group. The transmissions through walls.
charter of Promoter Group is to lead the efforts o 10m to 100m range.
of the Bluetooth SIG by creating a forum for o 1mW power.
enhancing the Bluetooth specification and o Extended range with external power
providing vehicle for interoperability testing. amplifier (100m).
o Its main strength is its ability to
The 802 .11b standard was developed at the end simultaneously handle both data and
of 1990’s and finally approved at the beginning voice transmissions.
of 1999. The first data transmission devices o It is capable of supporting one
based on the standard were launched in 2000. asynchronous data channel and up to
Wi-Fi devices were designed for corporate three synchronous voice channels, or
one channel supporting both voice and Bluetooth is designed to be low cost – eventually
data. under $10 per unit. It is now $5 per unit.

WI-FI TECHNOLOGY:- WI-FI TECHNOLOGY:-


o Wi-Fi networks operate in the First, Wi-Fi is cheap and fast. It's cheap,
unlicensed 2.4 and 5 GHz radio bands, compared to 3G. It's already here and its near-
with an 11 Mbps (802.11b) or 54 Mbps term rollout appears more widespread than 3G
(802.11a) or 100Mbps (802.11g) data will be. The price of a basic Wi-Fi access point
rate or with products that contain both has declined from approximately $1900 in 1997
bands (dual band), so they can provide to about $70 today (see "Wi-Fi 101" for an
real-world performance similar to the overview of the technology). But it is expensive
basic 10BaseT wired Ethernet networks compared to Bluetooth.
used in many offices.
o Modulation used in 802.11 has Second, its standards based (IEEE 802.11b);
historically been phase-shift keying therefore, consumers are not tied to proprietary
(PSK). The modulation method selected technology. Since Wi-Fi is not based on
for 802.11b is known as complementary proprietary technology, it ideally should allow
code keying or CCK, which makes many companies to enter the market and
possible high data speed and is less competitively hasten its evolution. Also, the
susceptible to multipath-propagation standard has been improved. IEEE 802.11g,
interference. which operates at 100 Mbps.
o It's powerful.
o Wi-Fi networks use radio technologies Third, major vendors are backing Wi-Fi. Intel is
called IEEE 802.11b, IEEE 802.11b and one of the biggest proponents of Wi-Fi. It has
IEEE 802.11g to provide reliable, fast recently unveiled a notebook chip called Banias
wireless connectivity. that is to be the heart of a mobile brand called
o A Wi-Fi network can be used to connect "Centrino." This chip is designed specifically for
computers to each other, to the Internet, wireless computers to enable a longer battery life
and to wired networks (which use IEEE and to meet the heat/thermal requirements of the
802.3 or Ethernet). notebook and handheld markets. Other major
players eager to step into the market include, a
ADVANTAGES: joint venture of AT&T, IBM, Intel (again), and
others.
BLUETOOTH TECHNOLOGY:-
Companies are finally paying particular attention
It attempts to provide advantages over IrDA to the security of Wi-Fi networks and for good
(Infrared Data Association) and Home RF reason. Many users do not take basic steps to
(Radio Frequency). IrDA is popular in PC safeguard against security breaches, e.g. turning
peripherals but is severely limited by short on Wired Equivalent Privacy (WEP), the
connection distance of 1m and by line of sight standard mechanism shipped with Wi-Fi gear
requirement for communication. It eliminates the that hides wireless data and denies intruders
feasibility of using IrDA for hidden computing. access to the network. (Many users do not even
Due to its RF nature Bluetooth is not subject to bother to install a firewall program.)
such limitations. In addition to wireless device
connections up to 10m (and up to 100m if Neither power line - nor phone line-based
transmitter power is increased), devices need not networks provide true mobility or portability.
be within line of sight and may connect through Wi-Fi capabilities will be extended from laptops
walls or other non-metal objects. to other devices - mobile phones and personal
digital assistants (PDAs)
Bluetooth could also be used in home-
networking applications. There is a need for For companies, the main advantages of this
networks that are simple to install and maintain. technology regarding non-mobile telephony are
Wireless connections circumvent the hassle of reduction of costs and mobility. Connection to
adding wiring to existing residences. Other the internet through Wi-Fi only requires an
technologies cost more than $100 per node. access point called hotspot. Further more Wi-Fi
allows a group of users to connect themselves to service, and it is uncertain when this
the internet from any site within range of issue will be addressed.
hotspot. However, the diffusion of 802.11 is not
limited to internal company nets: in the last six USAGE SCENARIOS :
months these access points have multiplied
The most common usage scenario for 802.11 is
significantly in public places. Hotel airline
portable computing. A user with a notebook
companies are the ones most backing the
computer moves from place-to-place within a
installation of access points.
building or campus and maintains connection to
the LAN, via an access point, at each stop. This
DISADVANTAGES: portability can even extend outside the bounds of
the office to public areas such as airports, hotels
BLUETOOTH TECHNOLOGY:- and coffee shops. In all cases, the user expects to
o Bluetooth devices are expected to be be able to use her computer just as she would at
omnipresent and at some places assess the office – to connect to other computers on the
to this devices by public users many LAN, such as servers, to connect to peripherals
have to be restricted. on the LAN, such as printers and to access the
o Personal privacy is at risk. Internet.
o The range cant be increased without
compromising on power. Bluetooth, on the other hand, supports a much
wider variety of usage scenarios, including:
WI-FI TECHNOLOGY:- • Device interoperability (also
known as cable replacement);
o Wi-Fi transmissions can be ruined by
Bluetooth transmissions, since • Peer-to-peer collaboration between
Bluetooth hops faster than Wi-Fi. multiple PDAs and/or notebooks;
o It consumes lot of power so it cant be • Notebook and PDA internet access
used efficiently for mobile devices. via mobile phone;
o It’s expensive. • PDA, notebook and PC LAN and
o It’s not very secure. Internet access via Bluetooth access
o Opponents of the technology argue points.
correctly that Internet service can be
affected by the user's proximity to the DEVICE INTEROPERABILITY :
access point, the number of people The first scenario provides the fundamental basis
using it, the speed of the server, for the development of the Bluetooth
interference from cordless phones and specification. It is, quite simply, the seamless
microwaves, and the user's interconnection of multiple Bluetooth-enabled
surroundings (i.e., radio signals are not devices that eliminates the need for cables to
high powered and cannot travel through connect the devices. The most obvious example
metal, water, or other dense materials). is a PC connected wirelessly to all of its
All of these factors can cloud Wi-Fi's peripheral devices. Not only are cables
wireless allure somewhat. eliminated but the user also can place the
o You might be wondering where 3G fits peripheral wherever he wishes without regard for
into the Wi-Fi picture. Ultimately, the cable length.
two may complement each other. Wi-Fi
and 3G also may not even vie for the Since Bluetooth supports both voice and data, a
same pool of users. single Bluetooth headset can be used in
o In theory, business travelers could use conjunction with multiple consumer and
Wi-Fi to access the Internet when they communication devices such as a desk phone, a
are stationary, e.g., waiting for a flight mobile phone, and a portable music player. The
in an airport, and 3G when they are in need for separate cables and device-specific
motion, e.g., commuting home from headsets is eliminated.
work on the train. However, this
scenario must overcome some hurdles PEER-TO-PEER COLLABORATION :
before it is realized. Currently, devices Bluetooth enables devices that are in close
cannot alternate between Wi-Fi and 3G proximity to form ad hoc networks, also known
as piconets. A piconet or WPAN can mobility within the office for devices that may
accommodate up to eight Bluetooth-enabled already be equipped with Bluetooth.
devices simultaneously, allowing any
combination of them to exchange files or other USAGE SUMMARY
objects, or to synchronize calendars, for It should be noted that Wi-Fi has seen
example. widespread deployment in the past year, both
within corporations and in public areas such as
This collaborative ability can also be enabled airports and hotels. These deployments offer
using Wi-Fi but requires administrator tremendous benefits to users of devices equipped
involvement to adjust the wireless LAN with Wi-Fi, most notably laptop or notebook
(WLAN) terminals (also known as stations, computers. Handheld users are likely to require
STA) for proper operation and to choose a Bluetooth access points in order to realize the
wireless radio channel for operation. With same benefits while maintaining acceptable
Bluetooth, peer-to-peer collaboration can be ad- battery life. As PDAs equipped with Bluetooth
hoc and instantaneous. become more and more widely used as core
business tools, particularly by mobile
The collaborative application is particularly professionals, Bluetooth access points will
compelling when some or all of the devices in a enable these users to be as productive as their
piconet are PDAs or Smart Phones. These Wi-Fi equipped counterparts.
devices, due to their small size and power
constraints are less likely to be Wi-Fi-enabled;
Bluetooth will likely to be the primary means by COMPARING THE CAPABILITIES
which these devices communicate with each OF BLUETOOTH AND WI-FI:
other and with the outside world. Let’s take a look at the actual capabilities of
these two technologies, as well as the
INTERNET CONNECTION THROUGH corresponding requirements of the applications
MOBILE PHONE : and real world considerations that affect the
Bluetooth opens up a new way for notebook performance of the systems.
computers and PDAs to access the Internet: via a
user’s own mobile phone. In fact, all of the POWER CONSUMPTION
phone’s capabilities to access the Internet, email Power consumption is a critical consideration as
or short messages will be accessible through the it directly affects device battery life. This
Bluetooth-enabled notebook or PDA. This consideration is obviously most crucial for
communication can take place while the phone is devices that spend most or all their operating
tucked away in a briefcase or pocket -- receiving hours on battery power – devices such as PDAs
all of its commands via the notebook or PDA. and mobile phones.

DIRECT NETWORK ACCESS : From its inception, Bluetooth was designed to be


Bluetooth access points (AP) can be used to a small-form factor, low-cost, low-power
allow Bluetooth-enabled devices that are in technology. The Bluetooth specification
range of the AP to access the Internet or an incorporates a number of power saving features
intranet directly. The AP is physically connected in order to keep power use to a minimum. These
to an Ethernet -- in the case of an office features include a standby mode as well as four
environment -- or a DSL/Cable modem – in the connected modes – parked, hold, sniff and
case of a public location -- and communicates active. An adaptive transmission power feature
via Bluetooth with the PDAs, notebooks and PCs further minimizes power use.
in the surrounding piconet. Thus, multiple
devices can simultaneously use the same AP to The Bluetooth specification also defines three
connect to a LAN or the Internet. different transmit power classes. Class 3 devices
operate at up to 0 dBm (1 mW); Class 2 devices
For companies that have already made an operate at up to 4 dBm (2.5 mW); and Class 3
investment in a traditional Ethernet LAN, the devices operate up to 20 dBm (100mW). Most
addition of Bluetooth access points will create a plug-in cards (e.g. PCMCIA, Compact Flash) are
wireless link to a hub (AP), thus enabling Class 3 devices; this will be the most dominant
type of Bluetooth device.
In order to achieve Ethernet-level data rates, Wi- DATA RATE, THROUGHPUT AND
Fi operates with higher radio power on fixed RANGE
channels of greater bandwidth. Wi-Fi offers a
As Bluetooth and Wi-Fi were designed to serve
power save mode in which STAs “sleep,” then
differing usage scenarios, it is no surprise that
reawaken periodically to check for messages.
the performance of the two systems differs as
well. Bluetooth trades off speed for lower power
Bluetooth and Wi-Fi modules are available in
consumption, whereas Wi-Fi attempts to match
many different form factors including PC cards
the performance of wired LANs.
(PCMCIA), Compact Flash (CF) cards, Secure
Digital (SD) cards, Springboard modules, PCI
Bluetooth supports two types of links – packet
cards and mini-PCI cards. Table 1 below
and connection-oriented (known as SCO). Packet
summarizes the power requirements of various
connection is used for data transmission and can
Bluetooth and Wi-Fi devices classes under
operate symmetrically or asymmetrically. The
various operating modes.
maximum symmetric data transfer rate is 433.9
kbps in each direction; the maximum asymmetric
data rate is 723.2 kbps upstream (57.6 kbps
downstream). Dedicated connection-oriented
links are used for audio applications. Bluetooth
can support three 64 kbps voice channels
simultaneously. These data rates are sufficient to
As shown in the table above, current Bluetooth accommodate the usage scenarios described in
devices have a minimum current that is earlier sections.
approximately one-tenth the amount of minimum
Wi-Fi current requirements, and a transmit Wi-Fi supports four different data rates: 11
current as little as a tenth of Wi-Fi’s transmit Mbps, 5.5 Mbps, 2 Mbps and 1 Mbps. A rate-
current, depending upon the output power of the scaling algorithm is used to reduce the data rate
devices in question. The implication is that when errors are detected in transmission. The
Bluetooth will drain the battery less quickly than result is that the data rate is reduced as a user
will Wi-Fi, making Bluetooth a more attractive moves farther away from an AP.
option for users with smaller devices. In fact, a
typical PDA with a 500 mA-hr battery life could Table 2 below shows the range for the Bluetooth
support Bluetooth running in idle mode for more APs (Class I) and Wi-Fi APs for typical office
than 250 hours, whereas Wi-Fi could only be environments. These figures will vary widely in
supported for 20 – 50 hours in sleep mode. If practice, depending upon the exact configuration
both technologies were in full transmit or receive of the office.
mode, a PDA using Wi-Fi could expect little
more than an hour of operation while a PDA
using Bluetooth could operate for five to ten
hours.

That said being said, PDA users seeking high-


speed access to their corporate LAN via Wi-Fi
may be willing to sacrifice either battery life or Contrary to popular belief, the range of
“pocketability” for this privilege. Vendors are Bluetooth devices can be substantial, particularly
beginning to offer WLAN PC cards for PDAs; when a Class I device is used to connect to an
many of these devices come with a “sled” that AP. Although the range for most Bluetooth
includes extra batteries to support the Wi-Fi client-to-client communication is 10m, a low
card. Although this approach succeeds in power client can be 32m away, on average, from
offering additional longevity to the PDA device, a high power AP, as shown in Table 2. An AP
it transforms the PDA into a much bulkier piece connected with a Class I client device can
of equipment. communicate over an average distance of 66m,
with even further range achievable using a client
incorporating a more sensitive receiver. This
Bluetooth range is quite comparable to Wi-Fi
range due to the simple fact that both APs have
comparable RF output power. Of course, it is Some of the basic security concepts addressed by
only at the greatest distances from the APs where the technologies include: 1) authentication – the
the throughputs of the two technologies are close process of verifying who is at the other end of a
to being comparable. link between devices; 2) authorization – the
process of determining what a device or user is
Range comparisons can be useful for contrasting allowed to do; and 3) encryption – the process of
the capabilities of these technologies. In practice, disguising information to make it inaccessible to
however, clients in a typical office are within unwanted listeners.
20m of an AP in order to avoid having too many
users sharing bandwidth of each AP. As a result, WI-FI SECURITY MECHANISMS
the range limits of these technologies are rarely The Extended Service Set ID (ESSID) is the first
tested. level of Wi-Fi security. The ESSID acts as a
basic password that is entered into all APs and
In order to get a complete picture of the STAs that share the network. In order for the
performance of these technologies, one must ESSID to serve as an effective barrier, the
consider throughput, as distinguished from raw default ESSID value should be changed upon
data rate. Based on numerous reports in the press deployment and broadcast of the ESSID by the
and by independent evaluators, peak throughput access point should be disabled, if possible. The
for Wi-Fi systems is in the range of 5 – 7 Mbps, broadcast feature makes it easy for clients to find
with throughput falling off significantly as the network but simultaneously makes it easier
distance from the AP increases. Typical observed for non-authorized users to find it.
performance is an average 5 Mbps at a distance
of six meters (20 feet) from the AP and 1 Mbps The Access List provides the second layer of
at a distance of 18 meters (60 feet) with several network security. The access list defines all
walls in between the STA and AP. MAC addresses associated with the STAs
allowed to associate with an AP. As a security
The Bluetooth Special Interest Group (SIG) feature, the Access List is important but has a
quotes data rate figures described above, e.g. degree of vulnerability due to the fact that MAC
723.2 kbps, as the actual throughput values, addresses are sent over the air unencrypted. A
having taken into account all of the overhead potential intruder can thus potentially discover a
associated with transmitting packets over the air. known good MAC address and use the address to
Thus, Bluetooth communication can take place at gain network access by configuring a NIC with
this speed, following agreement between the two that address.
communicating devices on an appropriate data
transfer rate. A third layer, authentication, can be
implemented in two ways: open system
SECURITY authentication and shared key authentication.
Any network, be it wired or wireless, is subject Both are hardware-based rather than user-based.
to security threats. These threats include the Open system authentication equates to “no
physical security of the network, unauthorized authentication” and is used in networks where
access, eavesdropping and attacks from within security is not a concern or, at least, not a
the network’s authorized user community. priority. An STA can associate with any AP and
Wireless networks are more susceptible to listen to any data sent in plain text. Shared key
threats due to the fact that signals from the authentication uses a challenge and response
network are more accessible to potential hackers. scheme to establish the presence of a shared key.
Nevertheless, developers have tried to make both The shared key is based on the Wired-Equivalent
Bluetooth and Wi-Fi highly resistant to security Privacy (WEP) protocol described below.
threats based on the security procedures
implemented in the protocols as well as The WEP protocol is used for the final layer of
commonly used adjunct security procedures. Yet security – encryption – as well as for
there are many loopholes in both the authentication. WEP uses either a 40-bit (less
technologies. Develepors are trying to address secure) or 128-bit (more secure) shared
these security problems and it will be encryption key to encrypt and decrypt data,
implemented in the future versions. meaning that both the AP and the STA need to
be programmed with the shared key. The same
WEP key is used on all clients and access points
for communication. In order to make the most of data transmission protocol that provides an
this security feature, it is desirable to frequently inherent degree of security. The frequency-
change WEP keys, a process that needs to be hopping scheme that Bluetooth employs makes
done on each AP and STA. Changing the WEP eavesdropping much more challenging, by
key frequently is particularly important in light ensuring that only receivers synchronized with
of the recent arrival of software (e.g. AirSnort the transmitter can access information.
and WEPCrack) that can be used to crack the
128-bit WEP key in a network, without detection Four different entities are used for maintaining
Some vendors have successfully minimized the security at the Bluetooth link layer. Table 3
likelihood of such an attack by incorporating below summarizes these entities:
such features as proprietary dynamic session
keys that are unique to each user and last only as
long as the connection lasts.

Additional security protocols can be


implemented in order to buttress the security of a
WLAN. Such protocols include Remote
Authentication Dial-in User Service (RADIUS),
TACACS, Virtual Private Network (VPN) and
firewalls. Both RADIUS and TACACS provide Bluetooth devices have the option of employing
an additional level of authentication and three different degrees of security, depending
authorization, as well as a centrally managed upon the requirements of the usage scenario.
means for carrying out these processes. • Mode 1 is non-secure and is used when
devices have no critical applications. A
A VPN ensures security through both user device in mode 1 does not initiate any
authentication and encryption and can be used in security procedure such as
conjunction with firewalls between the outside authentication or encryption.
world and the LAN and between the LAN and • Mode 2 provides security after an initial
the Wi-Fi network. The firewalls can be connection has been established
configured to pass only VPN traffic. A VPN has between devices. This mode allows
the additional ability to prevent “sniffing,” thus flexible access policies for
ensuring that the WEP vulnerabilities described applications/services and is used
above cannot be exploited. especially for running in parallel
applications that have differing security
Recognizing the possible vulnerability of the requirements.
802.11b standard, the IEEE is drafting a new • Mode 3 enforces authentication and
standard, 802.1x, which will address the current encryption before any connection has
shortcomings, maximize security and centralize been established between devices.
management functions. The proposed standard
includes the integration of RADIUS technology Bluetooth is unique in that it can define security
to assign wireless clients dynamic WEP keys on levels for both devices and services. From the
a per session basis. In fact, some vendors have standpoint of one Bluetooth device, other
already integrated dynamic session keys into devices can be categorized as either trusted or
their platforms, thus making for a substantially untrusted. A trusted device would have access to
improved level of security. all services offered by the first device. Trusted
devices can continue to be trusted upon
BLUETOOTH SECURITY MECHANISMS subsequent interactions without additional effort.
An untrusted device has no fixed relationship
Due to the broad range of applications that are
and its access to services is limited.
envisioned for Bluetooth devices, the protocol
was designed to have security options flexible
Services are the distinct activities such as voice
enough to allow for minimal demands on the
transmission, file transfer and dial-up networking
user when security is not a priority but a high
associated with different types of Bluetooth
level of security when circumstances demand it.
devices. Three levels of security are defined for
services. The first level is open to all devices;
Bluetooth uses multiple levels of user
neither authentication nor access approval are
authentication and data encryption as well as a
required. The second level requires an example, the same RADIUS or TACACS+
authentication only and authorization is not authentication that can be used in conjunction
necessary. The last level requires authorization with Wi-Fi also can be used with Bluetooth
and authentication in order to access a service; (note: the Pico Communications AP supports
automatic access is only granted to trusted both RADIUS and TACACS+). So too can VPN
devices. In this mode, encryption may be be implemented and used in conjunction with
required before access to the service is possible. Bluetooth access to the LAN.

When operating in its most protected modes, the For other types of secure interactions, other
first level of Bluetooth security entails application-level authentication and
determining the trust level of another device. authorization procedures can be put in place.
Unknown or untrusted devices can automatically Mobile commerce transactions, for example, can
be denied access to certain services available be protected with Secure Socket Link (SSL) just
over the Bluetooth link. The next layer of as are Internet commerce transactions. Any
security involves entering the same PIN number number of application-level security measures
into two devices that wish to connect. The PIN is can and will be implemented as Bluetooth device
used, in conjunction with a random number, to deployment becomes more widespread.
generate a 128-bit link key that is used for
authentication. In order to best ensure security, Finally, Bluetooth is an evolving standard.
users should be sure to use a PIN with as many Future iterations of the Bluetooth specification
digits as possible and that is as difficult to guess are expected to accommodate both higher speeds
as possible. and more robust security measures.

The next level of security is a challenge and SECURITY SUMMARY


response scheme that is used to determine When considering the relative efficacy of
whether both devices share the same 128-bit Bluetooth and Wi-Fi security procedures, it is
secret link key. If this hurdle is successfully helpful to remember the circumstances in which
passed, then the devices determine a mutually each are used. Bluetooth is used across a wide
acceptable encryption key, which may be variety of scenarios ranging from the simple
anywhere from 8 to 128 bits, depending upon the exchange of business cards and address
requirements of a particular service and the synchronization to LAN access. Wi-Fi, by
county in which the devices operate. If an definition, is used for LAN access only. As a
appropriate level of encryption cannot be agreed result, a significant portion of Bluetooth traffic
upon between devices, then the link will not be will have lower requirements for secure
completed. Once an encryption key is transmission, whereas Wi-Fi and the Bluetooth
established, it lasts only as long as the session LAN access mode, for example, will require a
and then is regenerated for the next session. greater degree of security protection.
In order to guarantee maximum security, Table 4 below summarizes the relevant security
Bluetooth users need to be cautious about attributes for Bluetooth and Wi-Fi. The table
devices – and owners – with whom they describes most all of the security aspects
communicate. Because each device in a available though not all may be implemented at
Bluetooth link uses the same authentication key any given time nor may all be implemented
and that authentication key can be semi- between any given pair of devices.
permanent, a hostile user can use this shared key,
along with the knowledge of the other device’s Both Wi-Fi and Bluetooth offer a series of robust
address and PIN number, to either mimic that security methods and protocols. When security
other device or simply listen in on transmissions procedures are fully implemented, the effort
made by the other device. This security breach is required to violate the security of these networks
difficult to carry out, though it is possible. It also is substantial, but within the capabilities of a
likely requires the violator to be someone within determined hacker. In a corporate LAN
your personal or professional sphere. environment, Wi-Fi is more susceptible to
security breaches than is Bluetooth due to the
As with Wi-Fi, additional security measures can vulnerability of the WEP protocol. In order to be
be applied – and, in fact, are envisioned -- at the certain of protecting sensitive information,
Bluetooth application layer. For LAN access, as additional security measures should be used in
conjunction with those outlined by the 802.11b
and Bluetooth standards; some vendors, The vast majority of Bluetooth applications, e.g.
including Pico, already offer additional synchronization, peer-to-peer file transfer,
implementations or the ability to work in headset, Internet access, have only moderate
conjunction with other security protocols. security requirements. Bluetooth offers the
flexibility to keep user involvement to a
The most likely circumstances under which minimum unless extra security precautions are
security will be breached are those in which the deemed necessary. This flexible security
most basic security precautions have not been approach enables the user to strike a balance
exercised. For Wi-Fi, this might mean the between the level of protection required and ease
operation of a WLAN in “open system” mode. of use.
For Bluetooth, this might mean the use of an
easily guessed password, such as “0000,” the
default on many systems.
Of course, there are many scenarios in Bluetooth
EASE OF USE that have no equivalent in Wi-Fi. One that comes
Numerous considerations come to mind when to mind is the use of a Bluetooth-enabled mobile
considering how easy it is to make use of phone as an Internet access point, as described
wireless technologies. These include how easy it earlier in this paper. This connection between a
is to set up a connection, how easy it is to engage notebook or PDA and mobile phone can be
applications and how comfortable is the device accomplished quickly if the devices are already
to use. known to each other and trusted. A user can
connect by simply discovering the phone and
establishing a point-to-point connection.
CONNECTING
When a user wishes to connect to a LAN, Wi-Fi PORTABILITY
offers a simpler procedure, as it has been
optimized for this function. Assuming a WLAN As mentioned earlier, Bluetooth draws far less
card is already in place, the user need merely power than Wi-Fi. As a result, devices that use
turn on her computing device and enter the Bluetooth to communicate with an AP can do so
necessary authenticating user name and in their native configurations while maintaining
password. The user is then on the network. substantial battery life. Devices that use Wi-Fi to
connect to a network must either contend with
For Bluetooth, the process is lengthier, possibly substantially reduced battery life or add battery
requiring each of the following steps: 1) device power – and, hence, size and weight -- to support
discovery; 2) device connection; 3) the Wi-Fi. Additionally, Bluetooth is being built
establishment of a LAN access connection; 4) directly into PDA devices, thus further
the establishment of a PPP connection; 5) PIN minimizing their weight and footprint. Due to its
entry; 6) network user name and password entry. power consumption, built-in Wi-Fi in PDAs is
Though most of these steps can be accomplished not anticipated, thus necessitating the addition of
with a single click of the mouse or tap of the a PC card, at the very least. For devices already
stylus, the entire process could take as long as 30 equipped with Bluetooth, the continued use of
seconds. The fact that Bluetooth enables the Bluetooth capability for LAN and Internet
communication between disparate device types access appears to make more sense for the user
using many different types of applications than changing back and forth between the two.
means, inevitably, that some procedures will take
longer with Bluetooth than with application- COEXISTENCE OF BLUETOOTH
specific technologies such as Wi-Fi. In order to AND WI-FI
streamline this process, Pico has developed a The explosion in Wi-Fi WLAN installations and
proprietary application -- PicoConnect™ -- that the anticipated growth in the use of Bluetooth-
allows onetouch network access. enabled devices ensure that the two technologies
will find themselves sharing space more and
For an ad hoc peer-to-peer communication more often. The question naturally arises as to
scenario, the picture is somewhat different. In how these two technologies that both operate in
Wi-Fi, a network administrator may become the same 2.4 GHz spectrum will get along.
involved to make the appropriate settings to the
STAs as well as to choose an appropriate BLUETOOTH AND WI-FI TECHNICAL
channel in which to operate the peer-to-peer
network. If three channels (the maximum
OVERVIEW
allowable) are already in use, the peer-to-peer Bluetooth supports both voice links and data
network may not be able to be established. links within an eight-node piconet. Bluetooth
Finally, peer-to-peer networking works only for radios transmit intermittently over a bandwidth
computers that are part of the same home of 1 MHz and they hop from one 1 MHz channel
network. The bottom line is that the to another at a rate of 1600 hops per second. This
establishment of a Wi-Fi peer-to-peer network technique is known as frequency hopping spread
requires some planning and preparation and spectrum (FHSS). As discussed previously, most
works only for users within the same company Bluetooth devices transmit at a power level of up
whereas Bluetooth peer-to-peer interaction can to1 mW (0 dBm).
truly be done on an ad hoc basis.
Wi-Fi technology uses a technique known as Fi and Bluetooth. This might be a notebook
direct-sequence spread spectrum (DSSS) to computer that uses Wi-Fi to connect to the LAN
transmit data at up to 11 Mbps across a 22 MHz and Bluetooth to connect to other devices such as
channel. Up to three channels can be deployed printers or a PDA. In this case, the Wi-Fi and
simultaneously in the 79 MHz ISM band. The Bluetooth radios will be in close proximity. The
technology employs a technique to avoid second scenario is one in which Wi-Fi and
collisions that requires an acknowledgment from Bluetooth are not collocated in the same device
the receiving device (Carrier Sense Multiple but used in separate devices that are some
Access with Collision Avoidance); a Wi-Fi distance apart from each other. This is a more
device will retransmit a packet if the common scenario today and might include a user
acknowledgment is not received. Typical RF with a laptop computer connected to the network
power for Wi-Fi devices is between 30 mW and via Wi-Fi sharing space with another employee
100 mW. using a PDA to connect to the network via a
Bluetooth AP.
HOW AND WHY BLUETOOTH AND
WI-FI INTERFERE When considering the degree of interference
between Wi-Fi and Bluetooth devices, it’s also
Interference between Bluetooth and Wi-Fi will
important to define the period over which the
occur any time there is an overlap of both time
interference may occur. To wit, when both
and frequency between transmissions associated
Bluetooth and Wi-Fi are simultaneously
with each technology. Interference between
transmitting or receiving in close proximity to
Bluetooth and Wi-Fi occurs when: a) a Wi-Fi
each other, one would expect to see the worst-
receiver senses a Bluetooth signal at the same
case interference.
time a Wi-Fi signal is being sent to it; and/or b) a
Bluetooth receiver senses a Wi-Fi signal at the
However, when evaluating the actual effect on a
same time a Bluetooth signal is being sent to it.
user, one must consider an entire day and the
type and frequency of traffic that is likely to
Bluetooth is considered less susceptible to
occur over the course of that day. This type of
interference because of its frequency hopping
analysis captures the fact that although there may
capability. It has the ability to “hop away” from
be moments of high interference, those moments
interfering signals and does so pseudo-randomly.
are few and far between and that the overall user
Wi-Fi is considered more susceptible to
experience is a positive one.
interference because it inhabits a specific 22
At the end of the day, the question is not
MHz passband and cannot “hop away” from
necessarily “do the technologies interfere with
interference as Bluetooth can. Its collision
each other?” but rather, “do the coexist well
avoidance mechanism also results in
together?” The former is an academic question;
retransmission following Bluetooth interference
the latter is a practical one focused on the
events, leading to successful transmission but
enduser’s experience.
reduced throughput.
INTERFERENCE TESTING RESULTS
INTERFERENCE SCENARIOS
As Bluetooth is seeing commercial deployment
There are a nearly infinite number of scenarios in
only just now, there exist few real-world tests
which one might find Wi-Fi and Bluetooth
measuring the interference effects between Wi-Fi
devices coexisting and countless variables that
and Bluetooth. The results in this section draw
will affect the degree to which interference
on published results of modeling the interaction
occurs between the two. Variables include the
between the two technologies, one real world test
number of devices in question; the distance
as well as on some of our own preliminary
between affected devices; RF output power of
testing.
the equipment; the type of transmission, e.g.
voice or data; the nature of the packets being
The Mobilian Corporation has created a
sent; and the density of the transmissions, i.e.
sophisticated computer model that simulates the
load factor.
interaction between Wi-Fi and Bluetooth
devices; the model appears to correspond well to
To simplify matters, two fundamental physical
actual performance . The company’s focus is on
scenarios can be considered. The first is one in
the first scenario identified above – collocated
which a single device is equipped with both Wi-
Wi-Fi and Bluetooth. Using the simulation computers. To simulate worst-case interference,
model, the company categorizes Wi-Fi files were downloaded from the network
performance degradation scenarios for collocated simultaneously onto both computers. File
Bluetooth and Wi-Fi devices in the following download was selected as this represents the
decreasing order of severity: asymmetric traffic common to most networks.
• The most severe interference occurs Wi-Fi throughput was measured first without
when a Wi-Fi device, such as a PC card, Bluetooth running and then at distances of 1m,
is collocated with a Bluetooth device, 2m and 3m between computers. The results are
such as an embedded mini-PCI card. shown in Table 5.
This scenario would be likely to occur
in a notebook computer with both Wi-Fi
and Bluetooth enabled and would
correspond to a separation between
devices of 10 cm or less.
• Slightly less severe effects are observed
when a transmitting Bluetooth device, Based on their experiment, Wi-Fi throughput
such as a PDA, is part of the same reduction in the presence of continuous
piconet as a Bluetooth device that is co- Bluetooth activity may or may not be significant
located with a Wi-Fi device, as above, at 1m and above, depending on the output power
and is at a typical range of 1 to 1½ of the client device. For Class III clients – the
meters from the collocated devices. most common – the reduced throughput even at
• The least severe effect is observed when 1m is unlikely be noticeable (24% reduction).
a Bluetooth interferer is outside of the When the interferer is a Class I client, throughput
collocated Bluetooth device’s piconet reduction at 1m is significant (87% reduction)
and is located at least 2 meters away. but quickly approaches full rate as the distance
between devices is increased beyond 1m (note
The message from this analysis is that collocated the lower baseline rate in this test). The reduced
Bluetooth and Wi-Fi devices are both likely to throughput associated with both Class I and
experience significant interference, with Wi-Fi Class III clients at 2m and 3m is measurable but
being most affected. Thus, this collocation also unlikely to be noticeable to an end-user.
scenario requires the development of techniques
to minimize or eliminate interference between In a less scientific experiment, they observed no
the protocols. The scenario described in the last noticeable degradation in a streaming video
bullet equates most closely to interference signal on either Wi-Fi or Bluetooth equipped
between separate Wi-Fi and Bluetooth devices, a notebooks when both were in simultaneous
situation more likely to occur in practice until operation. Exhibit 1 below is a photograph of
new technology is available to allow Wi-Fi and this experiment.
Bluetooth collocation in the same device.

Mobilian also draws some conclusions, based on


its model, about the non-collocated device
scenario. Their analysis concludes that Bluetooth
and Wi-Fi devices separated by a meter or more
will yield graceful degradation of the protocols
that is unlikely to be noticed by most users. Our
own preliminary testing supports this conclusion.

In tests at Pico Communications, two notebook


computers were placed in close proximity – one
equipped with a Bluetooth PC card (both Class I
and Class III) and the other equipped with a Wi- None of the tests or models mentioned so far
Fi PC card (100 mW). A Wi-Fi AP (100 mW) take into account the actual probability of
and a Bluetooth AP (100 mW) were placed at Bluetooth and Wi-Fi being in simultaneous
either end of a hallway, each approximately 7m operation and, as such, represent worst-case or
from the computers and each with an near worst-case scenarios. To measure the effect
unobstructed line-of-sight view to both
on an actual user during the course of a given throughput reduction of 10% or more.
day, one must take into account a likely mix and When separation is increased to 10m,
duration of traffic in a typical office the probability of a 10% or greater
environment. This type of analysis was carried throughput reduction increases to 24%.
out in. An office environment was modeled with • The upper limit on Bluetooth
typical usage assumptions and a piconet throughput reduction is 22%,
collocated with each Wi-Fi STA. The corresponding to the overlap of the
conclusions regarding the effect of Bluetooth 802.11b channel with the entire ISM
transmission on Wi-Fi performance were as band (79 MHz) over which Bluetooth
follows: operates.
• Wi-Fi performance degrades gracefully
in the presence of interference from Note that the Bluetooth voice channel will
Bluetooth systems; experience more degradation than the Bluetooth
• Assuming a baseline throughput of 7 data channel. The data channel applies
Mbps (note: 5 Mbps is typically retransmission in the event of a failed packet and
observed in practice), throughput will is thus able to cope with interference. The voice
be 5 Mbps or greater 95.6% of the time channel, on the other hand, is a connection-
and 3 Mbps or greater 99.5% of the oriented link with no retransmission capabilities.
time when the distance between the It is thus more susceptible to degradation.
STA and AP is 20m;
• Maximum throughput can be Finally, one researcher has measured the
maintained 95.6% and 97.8% of the throughput performance of both Bluetooth and
time at 10m of separation and 4m of Wi-Fi as mutual interferers. The experiments
separation, respectively, between the show that Bluetooth throughput is impacted
STA and the AP. when a Wi-Fi device is operating very close to it
but that throughput is approximately 90% of
Of course, the actual numbers will vary in baseline independent of range once the Wi-Fi
practice but the message is clear: in a typical device is moved away. The study concludes that
office environment, episodes of measurable both Wi-Fi and Bluetooth devices obtain a large
interference are likely to be the exception rather majority of the throughput that would be
than the norm. Another point highlighted by the available to them without interference as long as
results is – not surprisingly -- that the distance they are moved a reasonable distance from each
between devices and APs has an effect on the other.
interference. This is because interference is a
function of signal-to-noise ratio. OPTIONS FOR REDUCING
INTERFERENCE
One last issue of interference to address is the Based on the analyses cited above, we believe
effect of Wi-Fi systems on Bluetooth system that Wi-Fi and Bluetooth interference is not a
performance. As noted above, our own lab tests significant concern within an office environment.
showed good performance for Bluetooth in the Nevertheless, network designers or IT managers
presence of Wi-Fi interference. One study seeks seeking to minimize any potential interference
to model Bluetooth throughput reduction in the between Wi-Fi and Bluetooth systems can follow
presence of Wi-Fi interference. Using a few simple guidelines to help ensure optimal
assumptions similar to those in, the following coexistence between the two technologies.
results were observed:
• Ensure adequate spacing between Wi-Fi
• Under defined normal traffic conditions APs and Bluetooth APs to minimize the
on the WLAN, Bluetooth voice is probability of interference between the
unaffected as long as the distance two types of devices most likely to be
between the two Bluetooth devices is transmitting;
less than 2m. If that distance increases
• Do not deploy any devices that are
to 10m, the probability of noticeable
simultaneously equipped with both
interference rises to 8%;
Bluetooth and Wi-Fi;
• Under defined normal traffic conditions
• Increase the number of Wi-Fi APs
on the WLAN, the Bluetooth data
deployed in order to yield a shorter
channel has, at a 2m separation between
devices, a 3.2% probability of having a
average distance between wireless LAN bedroom door. It's six o'clock, time to rise and
STAs and APs. shine.
Sliding your feet to the floor, you reach
FUTURE DEVELOPMENTS AND out your arm, grab a credit card-sized remote
TRENDS control unit, and press a button; the buzzing of
the alarm goes silent. You press another button
Aware of the potential for interference between
on the remote and soft music fills the room,
the technologies, the IEEE has formed the
emanating from the compact stereo system
Coexistence Task Group 2 in order to develop
sitting on your dresser, on the other side of the
recommendations for coexistence between
room. With another push of a button the lights
WLANs and WPANs. (Note: the IEEE has
start to rise, and you hear the sounds of your
adopted Bluetooth as the 802.15.1 WPAN
shower turning on. When you know the water is
standard). The goal of the taskforce is to reduce
warm enough, you step under the showerhead for
the probability of the two technologies
the kind of pulsing hot shower that really gets
transmitting at the same time; it is pursuing two
you going.
approaches to achieving this objective. The first
After your shower you dry off, pull on
approach is known as non-collaborative, in
your robe, and shuffle to the kitchen. There, a
which no exchange of information is used
fresh pot of coffee is brewing at just the right
between the two wireless networks. The second
temperature, and two slices of toast pop up from
approach is known as collaborative, in which the
the gleaming chrome toaster as you walk by the
WLAN and the WPAN exchange information in
counter, as if on command. You reach inside the
order to minimize mutual interference.
refrigerator for some orange marmalade, and a
slightly accented female voice speaks to you
Aside from the progress being made by the
from the front of the refrigerator door, reminding
IEEE, companies such as Mobilian (cited above)
you to stop and pick up groceries on the way
are developing their own proprietary solutions
home from work.
for minimizing interference between the two
As you sit down at the kitchen table to
technologies. Their focus is on enabling the
eat your toast and marmalade, you pick up a thin
simultaneous deployment of Wi-Fi and
pad about the size of the Etch-A-Sketch toy you
Bluetooth on the same chip.
had as a kid. This pad isn't a toy, however; you
press a button on the side of the pad and the front
In addition to ongoing work to enhance
page of today's newspaper appears on the pad's
coexistence in the 2.4 GHz band, another
super-sharp electronic screen. You flip through
Wireless LAN technology – 802.11h and x – that
the pages with the press of a button, finishing the
addresses the security loopholes, is expected to
newspaper-and your breakfast-in a matter of
reach the market by the end of 2004. The
minutes.
802.11a technology operates in the 5 GHz band
You put your dirty dishes in the
and uses an entirely different coding technique
dishwasher and return to your bedroom to get
than does Wi-Fi to achieve maximum data
dressed for work. On your way out the door, you
throughput of 54 Mbps or more. The mere fact
pick up your palm-sized personal digital
that 802.11a operates in the 5 GHz band means
assistant, which is lying on the kitchen counter.
that it will be subject to far less interference than
A quick check of the PDA's screen confirms that
its 802.11b cousin; should 802.11a become the
your spouse has assembled a shopping list for
wireless LAN of choice, the question of
your visit to the grocery store, and downloaded
coexistence between Wi-Fi and Bluetooth in the
the list to your PDA. You smile to yourself at
2.4 GHz band will certainly become less of a
your spouse's efficiency, and then you walk
concern. The 802.11g operates at 100Mbps.
through the kitchen and out into the garage,
ready for your morning commute.
MAKING ROOM FOR THEM:
MAKING ROOM FOR WI-FI:-
MAKING ROOM FOR BLUETOOTH:-
Hotels have been amongst the first to
The buzzing of your alarm clock embrace Wi-Fi. These include Taj, Oberoi, ITC,
interrupts you from a shallow sleep. You turn Leela, Sarovar park Plaza Hotels, Le Royal
over, wipe the sleep from your eyes, and glance meridian, Hyatt, and others who are offering
across the room at the large digital numbers that wireless connectivity, some across all their
are seemingly floating in air beside your
branch hotels in India. Hotel marine plaza in o Bluetooth operates in the 2.4 GHz area
Mumbai was the latest hotel to become a of the spectrum, and provides a Range
hotspot, but connectivity is available only in the of 10 meters.
lobby area and the coffee shop Geoffrey’s. Most o It offers transfer speeds of around 720
hotels offer guest a PCMCIA card to plug in to Kbps.
their laptop and charge anything from Rs.100 per o Bluetooth devices are connected to each
hour to Rs.1000 for a 24-hour period. And guests other; they form a network called
can move from room to room without getting Piconet. Each piconet can have a
disconnected. master, and up to seven slaves.
o To accommodate interference from
A WIRELESS CLASS APART:- other signals, Bluetooth uses frequency
Students can now roam around the hopping.
campus and get access to the internet, finish o To conserve power, devices can go into
assignments, do research and communicate with three modes when they aren’t actively
classmates, faculty and family. involved in a piconet.
Some educational institutes offering o In increasing order of power
Wi-Fi are Pathways World School, Guraon while consumption, they can be in park mode,
most IITs and IIMs, Anna University, Annamalai hold mode and sniff mode.
University, and International School of Business o All the slave devices in a piconet are
(ISB) in Hyderabad, Mount Zion College of assigned an active member address
Engineering and Technology have also become (AM_ADDR).when a slave enters the
hotspots. park mode; it will give up its
AM_ADDR and get a park address,
MONEY MATTERS:- PM_ADDR.
o One of Bluetooth’s advantages is that it
Banking is also opting for Wi-Fi in a can handle both data (asynchronous)
bigway. Some of the ‘hotspot’ bank includes and voice (synchronous), which others
HDFC Bank, ICICI Bank, Indian Overseas such as infra-red can’t.
Bank, Punjab National Bank etc. o Every Bluetooth devices has a 48-bit
BDAddr (Bluetooth device address)
PUBLIC SERVICE HOTSPOTS:- burned into its ROM. This address can’t
The villages go hi-tech .More than 200 be easily changed by the user.
villages in western Maharashtra have been Wi- o A Bluetooth device can be set to
Fied, so that villagers can get agricultural access periodically scan for other devices in its
systems right at their doorsteps. vicinity or users can perform manual
In Madhya Pradesh too, a rural district scans.
opted for Wi-Fi to help local women access
information right from their homes instead of WI-FI TECHNOLOGY:-
truing miles. An 85-km long Wi-Fi digital bridge
o Bluetooth is a convenient way of
has also come up between Kanpur and Lucknow,
communication for a personal network,
created by a research team of media lab Asia,
but it is not suitable as an LAN
this project is working on outdoor wireless
replacement, or for perennial data
connectivity for longer distances.
transfer.
o Wi-Fi and abbreviation for wireless
fidelity, is a wireless standard that
SUMMARY: promises mobility while offering data
rates comparable to those of a wired
BLUETOOTH TECHNOLOGY:- LAN.
o Bluetooth is designed to be a personal o Wi-Fi is a collection of standards
area network, where participating ratified by the IEEE. In 1997; IEEE
entities are mobile and require sporadic approved the 802.11 standard, which
communication with others. laid down the specification for wireless
o It’s omni directional. LAN.
o Revisions were made to this standard
and these resulted in three other
standards, namely 802.11a, 802.11b and portable devices. With low power consumption
802.11g.The entire family of 802.11 and user friendliness, Bluetooth has all the
standards is collectively called Wi-Fi. requirements of a personal area network. Those
The name Wi-Fi was first given to the who need to transfer data on a regular basis and
802.11b standard. Approved in 1999, prefer portable device should definably opt for
802.11b Offered extensions to the Bluetooth.
original 802.11 that improved the
highest data rate from 2 Mbps to 11 CONS:-
Mbps. It operates in the 2.4 GHz In spite of promises that Bluetooth
frequency range, like as the original and support will be cheap, consumers avoid this due
has a range of about 300 feet. The latest to the cost. A Bluetooth USB sticks costs about
is 802.11g that has the highest data rate Rs 2,000, which may be on the higher side of
of 100Mbps. main stream customers. The cost is expected to
o 802.11a is a standard that operates at a come down to Rs 250. Don’t think this
frequency of 5 GHz, and hence it is technology as a LAN replacement, though.
incompatible with 802.11b.
o The range of 802.11a is lower than that DEVICE USING BLUETOOTH:-
802.11b; hence, more access points are
needed to cover a large area. Bluetooth is slowly beginning to reach
o 802.11a is less susceptible to the hands of consumers. Most premium-range
interference when compared to other mobiles and PDAs support Bluetooth; it has
standards such as 802.11b. started appering in the main stream range as
o To solve the limitation of ‘b’ and at the well. Users buying mobiles phones, or PDAs
same time provide the speed of ‘a’, the should look for Bluetooth enable devices .Using
802.11g was introduced. Bluetooth, you can transfer contacts, ring tones,
o 802.11g offers speeds of 100 Mbps, images etc., between devices easily.
while maintaining compatibility with
802.11b networks, while maintaining HOW WI-FI WORKS:
compatibility with 802.11b networks, so
a laptop with an 802.11g card will be SYSTEM SUPPORT:
able to use an 802.11b access point. For a system to connect to a Wi-Fi
o Wi-Fi has a basic level of security network, it should have a Wi-Fi card, or an
provided at the physical level, called access point connected to it. Wi-Fi network cards
WEP. are like normal network cards that plug into PCI
o All Wi-fi products come with a 40-bit slots, but have a protruding antenna. It’s also
encryption key. A 104-bit encryption possible to plug an external Wi-Fi adapter into a
key is also available, and it is USB port. Once network card are installed and
recommended that the largest available configured, the system can connect to any Wi-Fi
key should be used. network.

HOW BLUETOOTH WORKS:- PROS:


Given the current situation, Wi-Fi
SYSTEM SUPPORT:- should be adopted when there is a demand for
The easiest way to enable Bluetooth High speed on the move. Wi-Fi is suited for
support in a system is to attach Bluetooth USB corporate with several executives roaming
sticks. Some motherboards, such as MSI KT3 around the office with their laptops. Home
Ultra2-BR, come with inbuilt Bluetooth support. looking for a means to share a broad band
Once plugged into the system, you’ll have to internet connection can also consider adopting
install the drivers for the device to start using it. Wi-Fi.
The system will then periodically scan the
surroundings for Bluetooth devices. CONS:
A wireless setup is rather expensive
PROS:- when compared to a regular LAN. Also since
Currently Bluetooth offers the best Wi-Fi drains batteries much quicker, PDA users
solution for hassle-free communication between should avoid using it-especially if they have a
Bluetooth option available. It is difficult to either system. The trick is to minimize the
provide Wi-Fi network, as it is difficult to likelihood of an attack by using the available
control access to the network. security measures – in other words, locking the
front door. If locking the front door is not
DEVICE USING WI-FI: enough, both technologies can be used in
While Wi-Fi may be widely used for conjunction with additional security measures
communication between computers, there are that will further minimize their vulnerability. Of
PDAs that support it. It’s also possible to add course, many Bluetooth users may not be
Wi-Fi support to a PDA by inserting a Wi-Fi especially concerned about security given the
card in to the SD (secure Digital) slot. PDA such relatively mundane nature of most Bluetooth
as the Toshiba e750 have inbuilt support for Wi- transmissions. For this reason, Bluetooth offers
Fi. Nokia announced plans to build mobile multiple layers of security protection, allowing
phones that can seamlessly switch between users to invoke or to be subject to stronger
802.11b and public networks. The major security measures only when required.
problem with Wi-Fi is the high power
consumption, which mobile devices just can’t Wi-Fi and Bluetooth coexist well together under
afford. most circumstances. Though they both occupy
the same frequency spectrum, and are thus
subject to interference with each other, the
CONCLUSIONS: degree of interference will not be noticeable to
Wi-Fi and Bluetooth are complementary – not most users over the course of a typical day, as
competing – technologies. Wi-Fi is intended to long as the Wi-Fi and Bluetooth devices are
be a wireless replacement for Ethernet LANs. separated by 1 meter or more. Both industry and
It’s designed to enable portable devices such as standards bodies are developing solutions to
notebook computers to easily move about an minimize interference between the two
office or campus environment, while maintaining technologies with the goal of enabling
connectivity to the corporate LAN. It can also be simultaneous operation of Wi-Fi and Bluetooth
used to rapidly set up a LAN among desktop on the same device.
computers without pulling CAT-5 cable.
Bluetooth, on the other hand, is a generic access Wireless Ethernet connectivity is evolving. Since
technology meant for wirelessly connecting the end of 2001, companies have been shipping
devices of all types, shapes and sizes. It’s access points based on the 802.11a standard.
intended to be ubiquitous, allowing the This newer standard operates at more than four
formation of ad hoc networks between devices times the rate of 802.11b and it operates in a
wherever they may be located, with or without different frequency band – 5 GHz. If 802.11g
the user’s intervention. becomes the WLAN technology of choice -- as it
appears ready to do -- the distinction between
Bluetooth and Wi-Fi do share some functional WLAN and Bluetooth will be made even greater.
overlap. Like Wi-Fi, Bluetooth has the ability to The 802.11g standard will become the high-
connect devices to a LAN or to the Internet using speed network access technology of choice,
a Bluetooth AP. However, the Bluetooth niche is while Bluetooth will cement its position as the
with small devices such as PDAs that have universal connectivity standard and as the
limited battery life. Due to its power-miserly Internet access technology of choice for small
nature, Bluetooth allows these devices to achieve devices.
network access while simultaneously
maintaining long battery life. Of course, both
Bluetooth and Wi-Fi will be found on both
notebooks and PDAs and it will be up to users to
make the tradeoff between speed and battery life
when accessing a network.

Both Bluetooth and Wi-Fi have strong security


measures built-in that are sufficient for most
circumstances and applications. As is always the
case when protecting something of value, a
determined hacker will be able to break into
PRACTICAL IMPLEMENTATION
OF BLUETOOTH TECHNOLOGY:
The following hardware components were used:
Two laptops of the following specification were
taken:
LAPTOP 1: System Model: Dell Precision M50
Workstation, Mobile Intel® Pentium® 4- M
CPU-1.8Ghz 789 MHz, 512 MB – RAM, OS:
Microsoft Windows XP Professional Version
2002 Service Pack 1
LAPTOP 2: System Model: 1200XL - Compaq
Presario, Celeron - 633 MHz, 4.5 GB HDD, 128
MB – RAM, OS: Windows 98

Two Belkin’s Bluetooth USB Adapters were The Bluetooth piconet was set up as shown
attached to the above laptops: below in the diagram:
ADAPTER 1: BD_Addr: 0003C92D5225
ADAPTER2: BD_Addr: 0003C92D5226

BLUETOOTH NETWORK:
BLUETOOTH SETTINGS AND i) The “Notifications” tab lets you associate a
CONFIGURATION: sound (Windows *.wav file) with specific
Bluetooth events.
To customize the configuration settings of
Bluetooth software for Windows operating
system, follow the instructions described below:
1. Right click on the Bluetooth icon on the right-
hand side of the task bar of your screen. The
“Bluetooth Configuration” window appears to
allow you to customize the configuration settings
of “Explore”, “Setup”, or “Services”. In the
“Setup” menu, there are two extended items,
“Security” and “Configuration”.

2. Click on “Configuration”.
a) The “General” tab of “Configuration” allows
you to customize the device’s user name, type,
and security type.
b) The “Accessibility” tab allows you to specify
which individual devices are allowed to access
the user’s computer.
c) The “Discovery” tab allows you to specify
which individual devices, type of, or class of
device the user’s computer is allowed access to.
d) The “Information Exchange” tab allows you
to specify the location of different types of files.
e) The “Local Services” tab indicates the
services this computer makes available to the
other computers.
f) The “Client Applications” tab indicates the
properties of each application.
g) The “Hardware” tab indicates device
information of the user’s hardware.
h) The “Version Info” tab indicates the module
version of the user’s software component.
PRACTICAL IMPLEMENTATION Wi-Fi PDA through the access point. The LAN
OF WI-FI TECHNOLOGY: can also be accessed through it. We have also
created a peer-to-peer network to link up a Wi-Fi
In this report we show you how we enabled PDA and a laptop directly without the
created a Wi-Fi network using 2.4 GHz USB access point. The following section explains how
Wireless Adapter DWL-122 and DI- to configure the network.
614+2.4GHz Wireless Router 5V DC Power
Adapter. Thus we can access the laptop from a
DI-614+2.4GHZ WIRELESS
ROUTER 5V DC POWER
ADAPTER:-
2.4GHZ USB WIRELESS
ADAPTER DWL-122:
REFERENCES: 27. http://www.vlsi.ee.upatras.gr/~sklavos/
Papers03/IEEE03_Bluetooth.pdf
1. Living digital, Vol.8 issues,
28. http://www6.tomshardware.com/networ
11.November 2003, Pg.84-85
k/20020626/bluetooth-09.html
2. Living digital, Vol.9 issues, 01.January
29. An Overview of the Bluetooth Wireless
2004, Pg.62-64
Technology, Chatschik, IBM
3. CHIP magazine, January 2004,
Corporation.
Volume1, Issue 3, Page 129
30. AN1997, Philips FM/IF systems for
4. Digit, January 2004, Volume 4 issue 1,
GMSK/GFSK receivers, Yanpeng Guo,
Pg.102-105
1997 Aug 20, Philips.
5. “Wi-fi Home Networking”, Raymond
31. Bluetooth Encryption and Security,
Smith
Kjell Jorgen Hole, 13.5.2003,
6. Nathan.J.Muller, “Bluetooth
www.kjhole.com
Demystified” (2001), p.p. 1-36,44-
32. Bluetooth Overview, Kjell Jorgen Hole,
47,123-148, Tata McGraw Hill
13.5.2003, www.kjhole.com
Publishing Company.
33. Bluetooth Security SAFER+, Kjell
7. Manish Jain, “Bluetooth The Basics”
Jorgen Hole, 13.5.2003,
(2001), p.p 1-26, 104-105, 130-152,
www.kjhole.com
BPB Publications.
34. Bluetooth Platform Solution from
8. Anil Kumar, “The Bluetooth Protocol
Motorola, Motorola.
Stack”, p.p 33-36, Information
35. Bluetooth Security White Paper,
Technology Magazine, (Vol 11; No.3,
Bluetooth SIG Security Expert Group,
January 2002)
19.4.2002, Christian Gehrmann
9. Prasanto.K.Roy, “The Phone
36. Bluetooth Version 1.1, Specification of
Collector”, p.p 66, Computers @ Home
the Bluetooth system, Bluetooth,
Magazine, (Vol 7; Issue.1, January
www.bluetooth.com, February 22 2001.
2002)
37. Industrial Use of Bluetooth, 18.04.2001,
10. www.bluetooth.com
Mats Anderson, connectBlue.
11. Hasan Jawaid Khan, "Smart Homes of
38. How Secure Is Bluetooth, Karen. J.
the Future", pp.: 9-15, 50, The Science
Marcelo, March/April,
Reporter Magazine, (May 2002)
www.WBT2.com
12. www.HAL2000.com
39. Bluetooth Technology in a Nutshell,
13. www.homeseer.com
Mark Fu, KC Technology, 2001.
14. Michael Miller, Discovering Bluetooth,
40. Multimedia transmission in Bluetooth-
2001, SYBEX.
based networks, Marcin Michalak, June
15. Dean. A. Gratton, Bluetooth Profiles –
2001.
The Definitive Guide, 2003, Prentice
41. Mobile Computing Outlook, 2003,
Hall.
www.mobileinfo.com
16. Jim Geier, Wireless LAN, 2nd Edition-
42. Bluetooth Revealed
2002, SAMS.
43. Bluetooth-Connect without cables
17. http://www.codeproject.com
44. Stubblefield, A. et al., Using the
18. http://www.kjhole.com
Fluhrer, Mantin, and Shamir Attack to
19. http://learning.ericsson.net/bluetoothde
Break WEP, AT&T Labs Technical
mo
Report TD-4ZCPZZ
20. http://learning.ericsson.net/bluetoothde
45. Mobilian Corporation, Wi-Fi (802.11b)
mo/content/lesson1/blx11101.html
and Bluetooth: An Examination of
21. http://opensource.nus.edu.sg/projects/bl
Coexistence Approaches, 2001.
uetooth/noosphere/saferfigures.pdf
46. Mobilian Corporation, Wi-Fi (802.11b)
22. http://opensource.nus.edu.sg/projects/bl
and Bluetooth Simultaneous Operation:
uetooth/noosphere/safertweak.doc
Characterizing the Problem, November
23. http://www.palowireless.com/bluetooth/
2000.
24. http://www.rococo.com
47. Zyren, J., Reliability of IEEE 802.11 Hi
25. http://www.techonline.com/community/
Rate DSSS WLANs in a High Density
tech_topic/bluetooth
Bluetooth Environment, June 1999.
26. http://www.techonline.com/pdf/pavillio
48. Haartsen, J. et al., Bluetooth voice and
ns/standards/kct_bluetooth.pdf
data performance in 802.11 DS WLAN
environment, SIG publication, May
1999.
49. Shoemake, M., Wi-Fi (802.11b) and
Bluetooth: Coexistence Issues and
Solutions for the 2.4 GHz ISM Band,
February 2001.
50. Nedeltchev, P., Wireless Local Area
Networks and the 802.11 Standard,
March 31, 2001.
51. Nedeltchev, P., Wireless LAN Ready for
Prime Time, Cisco Packet Magazine, 3rd
Quarter, 2001.
52. Schenk, R. et al., Wireless LAN
Deployment and Security Basics,
ExtremeTech.com, August 2001.
53. Ellison, C., Exploiting and Protecting
802.11b Wireless Networks,
ExtremeTech.com, September 2001.
54. Cisco Systems, Wireless LAN Security,
Overview White Paper, 1999-2001.
55. Bluetooth, Bluetooth Specification
Version 1.1, February 2001
56. Vainio, J., Bluetooth Security, 2000-05-
25
57. Träskbäck, M., Security of Bluetooth:
An Overview of Bluetooth Security,
2000-11-2
58. Jakobbson, M. et al., Security
Weaknesses in Bluetooth, February
2001
59. Müller, T., Bluetooth Security
Architecture Version 1.0, July 1999
60. InfoTooth Knowledge Base,
http://www.palowireless.com/infotooth/
knowbase.asp

You might also like