BLUETOOTH
TECHNOLOGY
By: Idris Bholebawa
ECED - SVNIT - Surat
Contents
Introduction to Bluetooth
Special Interest Group
Technology Basics
Bluetooth Usage Models
Bluetooth Specifications
Bluetooth Protocol Stack
Applications
Future of Bluetooth Technology
Concluding Thoughts
Bluetooth Technology by IB 2
What is Bluetooth?
Bluetooth refers to an open specification for a
technology to enable short-range wireless
voice and data communications anywhere in
the world.
Key points includes:
Open Specification
Short-range Wireless
Voice and Data
Anywhere in the World
Bluetooth Technology by IB 3
The Bluetooth Special Interest Group
(SIG)
There is no Bluetooth Headquarters nor is
there any Bluetooth Corporation nor any sort
of legally incorporated entity.
The SIG is governed by legal agreements
among the member parties but it is not a
company unto itself.
The SIG should not be consider as a formal
standards body; rather it is an organization
agreement to define and promote technology.
Bluetooth Technology by IB 4
Bluetooth Name
History and
SIG Origins
Bluetooth Technology by IB 5
Technology Basics
Radio Frequency Wireless Communications
RF Basics
RF Communications in 2.4 GHz Freq Spectrum
Spectrum of 79 Channels
BW 1 MHz
FHSS
Spread Spectrum RF Communications
IrDA vs Bluetooth
Bluetooth Technology by IB 6
Bluetooth RF Communications
Master and Slave Roles
When two devices establish a Bluetooth link, one
act as master and the other act as slave.
The master generally is a device that initiates
communication.
The role of master governs the synchronization of
the FHSS comm. between devices.
The MD determines FH pattern based on BD
Address.
Bluetooth Technology by IB 7
A given Master can communicate with:
7 active slaves
255 parked slaves
All slaves comm with single master form piconet.
Bluetooth Technology by IB 8
Baseband Modes
There are Four Modes of baseband state:
Active Mode
Sniff Mode
Hold Mode
Parked Mode
Bluetooth Technology by IB 9
Active Mode
Slave always listens for transmissions from master.
Active Slaves receive packets that enable them to
remain syn with the master.
It can be informed to transmit packets back to
master.
Active slave will not listen entire packet from
master during other active slaves communicate.
Active state provides fastest response time but
typically consumes more power.
Bluetooth Technology by IB 10
Sniff Mode
In sniff mode slaves becomes active periodically.
Master transmit packets at regular intervals.
Slave needs to listen for packets only at start of
that interval.
If the slave receives packets at start of that
interval it continues to listen and receive packet,
otherwise it can sleep until next interval.
Sniff mode reduce power consumption by
reducing average duty cycle of radio link.
It is less responsive than active mode.
It depends on length of sniff interval.
Bluetooth Technology by IB 11
Hold Mode
In hold mode a slave can stop listening for packets
entirely for a specified time interval.
Master and slave agree upon hold time.
During hold time slave could be doing other things
such as establishing links to other devices, or just
sleep.
Hold mode is less responsive than sniff mode.
It provides greater power savings than sniff mode.
(depends on hold time duration and slaves
activity).
Bluetooth Technology by IB 12
Parked Mode
In parked mode a slave maintains synchronization
with the master but is no longer considered active.
Parked mode is least responsive of the connected
modes.
Parked mode permits greater power consumption.
Fastest Responsiveness Slowest
Active Sniff/Hold Park
Highest Power Consumption Lowest
Bluetooth Technology by IB 13
Another power saving feature is Adaptive
Transmission Power.
This allows slaves to inform the master when the
masters Tx power is not appropriate.
This is accomplished through the use of the
Received Signal Strength Indicator (RSSI).
When the RSSI value is outside some determined
boundaries, slave can ask the master to adjust
the power.
The master maintains Tx. power settings for each
slaves so that change does not affect others.
Bluetooth Technology by IB 14
User Scenarios
Connection of Peripheral Devices:
Most devices are connected via wires.
Each device has its own type of cable.
No wires are required in wireless.
Batteries replaces power supplies.
Support of Ad-hoc Networking:
Small devices might not have WLAN adapters but
cheaper Bluetooth chips built in.
Bluetooth Technology by IB 15
Bridging of Networks:
Using wireless piconets, a mobile phone can be
connected to a PDA or Laptop.
The mobile phone acts as a bridge between
piconet and GSM network.
Bluetooth Technology by IB 16
Our goal is to provide local wireless access at
very low cost.
WLAN technology is designed for higher
bandwidth and larger range and are more
expensive and consumes more power.
Bluetooth Technology by IB 17
Architecture
Bluetooth specifications
79 channels in 2.4 GHz band with 1 MHz carrier.
FHSS for interference mitigation with 1600
hops/sec in pseudo-random fashion.
Bluetooth Technology by IB 18
Bluetooth Technology by IB 19
All active devices are assigned 3-bit AMA and
all parked devices are assigned 8-bit PMA.
Devices in stand-by do not need any address.
Throughput per user drops quickly as more
users join piconet.
A single piconet offers < 1Mbps gross data rate
A group of piconets can be formed.
Bluetooth Technology by IB 20
Bluetooth Scatternet
Bluetooth Technology by IB 21
Protocol Stack
Bluetooth Technology by IB 22
The elements of stack are logically partitioned
into 3 groups:
The Transport Protocol Group;
The Middleware Protocol Group; and
The Application Group
Bluetooth Technology by IB 23
The Transport protocols supports both
asynchronous transmissions and synchronous
transmission.
To maintain high QoS, the audio traffic has
high priority.
Bluetooth Technology by IB 24
Bluetooth Radio (Radio Layer)
Bluetooth uses license free frequency band at
2.4 GHz.
A FH/TDD scheme for transmission with fast
hopping rate of 1600 hops/sec.
The time between two hops is called a slot,
which is 625 s.
Each slot uses different frequency
Bluetooth Technology by IB 25
Bluetooth transceivers use GFSK for
modulation and are available in 3 classes:
Class 1: Max power is 100mW (20dBm) and min is
1mW, Power control is mandatory, it is designed
for high range devices such as Bluetooth access
points (~ 100m w/o obstacles).
Class 2: Max power is 2.5mW (4dBm), nominal is
1mW and min is 0.25mW, power control is
optional. It is designed for normal PCs and
portable plugged devices (~ 10m).
Class 3: Max power is 1mW (0dBm). It is designed
for low power devices (~ < 1m).
Bluetooth Technology by IB 26
Gaussian Frequency shift BT product: 0.5
Modulation
Keying (GFSK) Modulation index: 0.28 0.35
Using the binary GFSK, this
Symbol rate 1 Msps translates into 1 Mbps raw link
speed; bit transmission time: 1s
1600 hops/sec, typical Residence time: 625 s/hops
Frequency-
hopping rate 3200 hops/sec for inquiries
Residence time:312.5 s/hops
and pages
Class 3: 0 dBm (1 mW) A typical Bluetooth radio
Transmit
Class 2: 4 dBm (2.5 mW) Optional power control as above
power
Required power control to at least
Class 1: 20 dBm (100 mW)
4 dBm
Bluetooth receiver must attain The -70 dBm sensitivity level shall
Receiver a raw BER of 0.1% with an be attained for any input signal
Sensitivity input signal of -70 dBm or generated by any compliant
lower Bluetooth Technology byBluetooth
IB transmitter 27
Bluetooth Technology by IB 28
Baseband Layer
This layer includes Piconet and device control
functions like:
Connection creation,
Frequency hopping sequence selection & timing,
Modes of operation such as power control and
secure operation, and
Media access functions like polling, packet types,
packet processing and link types.
Bluetooth Technology by IB 29
Bluetooth Technology by IB 30
Operational states of Bluetooth Devices.
Bluetooth Technology by IB 31
In the connected state, the device is a
member of a piconet.
When a device is not associated with any
piconet or participates in no action, it is said
to be in standby state.
To move to the connected state, a device goes
through the inquiry and page states.
In the inquiry state, a device learns about the
identity of other devices in its vicinity
Bluetooth Technology by IB 32
In the page state, a device explicitly invites
another device to join the piconet whose
master is the inviting device.
A device may bypass the inquiry state if the
identity of a device to be paged is already
known.
While a device is a member of a piconet, it
may still perform inquiries and pages for
additional devices to join this or some other
piconet.
Bluetooth Technology by IB 33
To become a member of a piconet, a
Bluetooth device needs to know how to
recreate the frequency hopping sequence.
Also, the device needs to know how to
formulate, read and write information packet
on the piconet.
These operations are related to two
fundamental elements:
Bluetooth Device Address
Bluetooth Device (or native) Clock
Bluetooth Technology by IB 34
Two Baseband processes referring as the
fundamental processes are:
The Frequency Hopping Sequence, and
The Access Code
Bluetooth Technology by IB 35
The Bluetooth Device Address (BD_ADDR)
The BD_ADDR is a single 48 bit address
electronically engraved on each devices.
To guarantee uniqueness, a numbering
authority assigns BD_ADDRs.
Bluetooth Technology by IB 36
The 24 bits of the UAP and the NAP constitute
the Organization Unique Identifier (OUI) part
that is assigned by the numbering authority to
different organizations.
The LAP is assigned internally by various
organizations.
Bluetooth Technology by IB 37
The Bluetooth Clock
Each device has a free-running 28-bits
Bluetooth clock.
The Bluetooth clock is never adjusted and is
never turned off.
The clock rate is 3.2 KHz (312.5 s), which is
twice of hopping-rate 1600 hops/sec.
The Bluetooth clock wraps around just short
of once per day.
Bluetooth Technology by IB 38
The Bluetooth clock plays a fundamental role
in deciding
when a device can or cannot transmit or listen for
a transmission,
at which frequency and
for what type of information packets it transmits
or listen.
A slave device uses the value of Bluetooth
clock of a master to accomplish piconet
communications.
Bluetooth Technology by IB 39
Frequency Hopping Sequences
For devices to communicate with each other,
they must transmit and receive on the same
frequency at the same time.
Bluetooth Technology by IB 40
The FSM contains the procedure for selecting
the next frequency to be used under various
operating conditions.
Depending upon the country of use, the FSM is
set by the manufacturer to operate in a 23 or
79 channel frequency hop mode.
The clock input determines the phase of the
frequency hopping sequence.
In each of the three active operational states
(Normal Piconet, Page and Inquiry), a different
combination of clock and address input is
supplied to FSM.
Bluetooth Technology by IB 41
Bluetooth Technology by IB 42
If the master sends data at fk, then slave may
answer at fk+1.
TDD is used for separation of the transmission
directions.
A 1 slot packet data transmission uses one
625 s slot.
Within each slot the master or one out of
seven slaves may transmit data in an
alternating fashion.
Bluetooth also defines 3-slot and 5-slot
packets for higher data rates (multi-slot
packets).
Bluetooth Technology by IB 43
For a multi-slot packet transmission the radio
transmitter remains on the same frequency.
No frequency hopping is performed within
packets.
After transmitting the packet, the radio
returns to the frequency required for its
hopping sequence.
The reason is simple, not every slave might
receive a transmission (HTP) and it cannot
react on a multi-slot transmission.
Bluetooth Technology by IB 44
Those slaves not involved in the transmission
will continue with the hopping sequence.
All device can remain synchronized, because
the piconet is uniquely defined by having the
same hopping sequence with the same phase.
Shifting the phase in one device would destroy
the piconet.
Bluetooth Technology by IB 45
Access Code
The Access Code is a 68- or 72-bit field
prepended to each BB_PDU prior to Tx.
The access code serves:
Identifying Piconet,
Synchronizing on input bit stream,
Aiding in establishing proper DC-offset & others
The role of the access codes is identifying the
state classification of transmitted BB_PDU.
Bluetooth Technology by IB 46
Bluetooth Technology by IB 47
To receive a transmission a device uses a
correlator.
The correlator can be tuned to particular
access codes.
If the correlator matches the access code of an
incoming transmission, the receiver will
continue receiving incoming bit stream and
pass to higher layers for processing.
These higher layers not fully powered until
correlator informs.
Bluetooth Technology by IB 48
During normal Piconet operation, each
transmission on a given frequency of channel
hopping sequence is preceded by CAC
generated using LAP of master.
During paging operation, each paging
transmission on a given frequency of the
page-hopping sequence and each response to
it are preceded by the DAC generated using
LAP of paged device.
Bluetooth Technology by IB 49
During inquiry operation, each inquiry
transmission on a given frequency of the
inquiry-hopping sequence and each response
to it are preceded by and IAC.
There are 64 IACs, including GIAC.
Excluding GIAC other 63 referred as DIAC
Bluetooth Technology by IB 50
Each slave in a piconet must know the
masters clock and BD_ADDR, and for a
potential master to efficiently invite a
potential slave, it needs to know the slaves
clock and address.
The exchange of address and clock
information between devices occurs during
inquiries and pages.
The operational information is sent in FHS
BB_PDU.
Bluetooth Technology by IB 51
Device Frequency-hop
Access Code
State Module
Channel Access Code
Clock: masters; (CAC); it coincides with
Connected
Address: masters the masters Device
Access Code (DAC)
General or Dedicated
Clock: own;
Inquiry Inquiry Access Code
Address: GIAC
(GIAC or DIAC)
Clock: paged
devices; Paged devices Device
Page
Address: paged Access Code (DAC)
devices
Bluetooth Technology by IB 52
The first field of a packet is needed for timing
synchronization and Piconet identification.
No frequency hops occur during BB_PDU
transmission.
If BB_PDU does not contain header, the trailer
is not used.
Bluetooth Technology by IB 53
BB_PDU Header
Packet header contains Link Control (LC)
information and has 6 fields
Field Name Size Comments
Active member address assigned to an active slave
AM_ADDR 3 bits
when devices exchange paging information
TYPE 4 bits Defines BB_PDU/payload types
Stop/go flow control set by a receiving device in its
FLOW 1 bit
response to the sender (only for Asyn. data)
Used for ack. number for successfully transmitted
ARQN 1 bit
packet (0=NACK, 1=ACK)
SEQN 1 bit Simple sequence number for filtering retransmission
Header Error Check is used to protect the packet
HEC 8 bits
header.
Bluetooth Technology by IB 54
During the paging process, the master assigns
a 3-bit AM_ADDR to the new slave.
AM_ADDR takes on the values 1 to 7 and it is
unique for each active slave in a piconet.
The value 0 is used for a broadcast from the
master to all slaves.
The AM_ADDR is included in the same FHS
BB_PDU sent by the master to the slave that
also contains the masters address and clock
information.
Bluetooth Technology by IB 55
Bluetooth Technology by IB 56
The Type field allows for 16 different
packets:
4 Link control packets (NULL, POLL, FHS, DM1)
4 SCO packets (HV1, HV2, HV3, DV)
6 ACL packets (DH1, AUX1, DM3, DH3, DM5, DH5)
2 Undefined (for future)
Bluetooth Technology by IB 57
The 4 Link control packets are:
POLL: sent only by a master and requires ACK.
NULL: sent by either and does not require ACK,
used if link control carried by the header is
needed; e.g., flow control.
FHS: contains all information to get two units to
hop synchronized (CLK and the 48-bit identity).
DM1: for control data.
The other 12 packets are ACL and SCO packets
Bluetooth Technology by IB 58
Physical Links
Bluetooth offers two different types of links:
Synchronous Connection-Oriented (SCO), and
Asynchronous Connectionless (ACL).
Bluetooth Technology by IB 59
Synchronous Connection Oriented (SCO)
Master (i.e., a Piconet) can support up to 3 SCO
links to the same slave or to different slaves.
A slave can support up to 3 SCO links from the
same master, or 2 SCO links from different
masters.
SCO packets are sent at regular interval and
NEVER retransmitted.
SCO is established by the master sending an SCO
setup message via the LM protocol (a slave can
request).
Setup message contains timing parameters such as
SCO interval TSCO and the offset DSCO to specify the
reserved slots.
Bluetooth Technology by IB 60
Each SCO links carries voice at 64 kbps, and no
FEC, 2/3 FEC, or 1/3 FEC can be selected.
Depending on error rate of the channel, different
FEC schemes can be applied.
Voice data over SCO is never retransmitted,
instead, a very robust voice-encoding scheme,
Continuous Variable Slope Delta (CVSD) is
applied. Bluetooth Technology by IB 61
Asynchronous Connectionless (ACL)
Only a single ACL link may exist between a master
and a slave.
For most ACL packets, retransmission is applied
to assure data integrity (actually one is the
exception, the AUX1).
ACL slaves can only transmit when requested by
master.
A polling-interval is defined, Tpoll, where a master
polls a slave either explicitly (POLL packet) or
implicitly by simply transmitting any payload
carrying BB_PDU.
Bluetooth Technology by IB 62
Bluetooth Technology by IB 63
Data Transmission Example
The master always uses the even frequency slots,
the odd slots are for the slaves.
The ACL links use single or multiple slots
providing asymmetric bandwidth for
connectionless packet transmission.
Bluetooth Technology by IB 64
ACL links can additionally be protected using an
ARQ scheme and a checksum.
Each packet can be acknowledged in the slot
following the packet.
If the packet is lost, a sender can retransmit it
immediately in the next slot after the NAK, so it is
called fast ARQ scheme.
Bluetooth Technology by IB 65
Protocol Stack
Bluetooth Technology by IB 66
The Link Manager (LM) and Link
Manager Protocol (LMP)
LM does the following:
Set up and control Bluetooth-link between devices
via LMP_PDUs: Security, power-control, QoS.
LMP does not carry application data, either
communicate with the LM of another device or it
sends control signals to its own BB & radio layers.
Bluetooth Technology by IB 67
Bluetooth Technology by IB 68
LMP_PDUs are carried in the payload of ACL
(DM1 or DV) packets on a single slot.
Connection establishment and detachment:
A device may issue a LMP_host_connection_req
PDU,
If accepted, negotiation starts between the two
LMs on parameters on the link. After that, a
LMP_setup_complete PDUs must be exchanged
between the two devices to allow non-LMP_PDUs
to flow.
To terminate, any device can send a non-
contested LMP_detach PDU, with a reason
parameter explaining why link is to be terminated.
Bluetooth Technology by IB 69
LM and LMP: Security
Device authentication is mandatory and link
encryption is optional.
Security is presented in the BB part of the
specification but setup, negotiation and
configuration are the function of the LMs.
Authentication can be uni- or bidirectional.
Public-key and certificate schemes are not
appropriate for low-level ad-hoc networks since
they require the support of a trusted
authentication agencies (third-part). They can be
implemented at higher layers.
Bluetooth Technology by IB 70
LM and LMP: Authentication
Challenge-response transaction that depends
on a shared secret key.
The claimant-address, AU_RAND, and a 128-
bit shared secret link-key form the input to
produce a 32-bit signed-response and a 96-bit
Authenticated Cipher Offset (ACO).
The ACO is used for encryption.
Bluetooth Technology by IB 71
Bluetooth Technology by IB 72
The secret link-key is generated in an
initialization phase (pairing-up or associating
two devices).
Once the 128-bit link-key is generated, it
resides in hardware and is not accessible by
the user, and automatic authentication can be
done.
For N units, Nx(N-1)/2 link-keys required.
To authorize initialization, user has to enter
identical PIN in both devices.
Bluetooth Technology by IB 73
LM and LMP: Link Encryption
Encryption is based on 1-bit stream cipher,
whose implementation is specified in specs.
Encryption applies only to payload of the
BB_PDUs (link property: SCO and ACL) and is
symmetric (i.e., applies in both directions).
The payload bits are modulo-2 added to a
binary key stream.
Size of encryption key is negotiable to match
application requirements (max. 128 bits).
Bluetooth Technology by IB 74
Encryption-key is derived from the link-key,
the ACO (so authentication must precedes
encryption), and a master generated random
number.
Start: LMP_encryption_mode_req PDU (with a
parameter distinguishing a point-to-point or
broadcast encryption. In broadcast, a master
key is created to be used by all devices).
If accepted: devices exchange
LMP_encryption_key_size_req PDUs.
Bluetooth Technology by IB 75
LM and LMP: QoS (for ACL)
To control the minimum bandwidth of an ACL traffic,
the polling-interval, Tpoll, (max time between
subsequent master-to-slave transmissions) can be
adjusted as needed.
Polling-interval is guaranteed in active mode except
when there are collisions with page, page-scan,
inquiry, inquiry-scan.
Master can force change by LMP_quality_of_service
PDU (contains Tpoll).
A slave (or the master) may request to change the
polling-interval by LMP_quality_of_service_req PDU
(Only the master can set the Tpoll depending on its
bandwidth availability).
Bluetooth Technology by IB 76
LM and LMP: Power Management
A Bluetooth device can measure the received
signal strength.
Depending on this signal level the device can
direct the sender of the measured signal to
increase or decrease its transmit power.
Connection state level: four modes are defined
(Active, Sniff, Hold and Parked).
The active mode is the highest power and
fastest response mode.
The hold mode frees the slave to do other
things like scanning, paging, inquiring, or
attending other Piconets, or simply saving power.
It stops ACL tx. but still exchange SCO packets.
Bluetooth Technology by IB 77
Power Consumptions
Bluetooth Technology by IB 78
Protocol Stack
Bluetooth Technology by IB 79
Logical Link Control and Adaptation
Protocol (L2CAP)
Lower transport protocols are optimized to
deal with the hostility of the RF medium,
power consumption, security, regulatory
issues, and so on..
This lead to a small size BB_PDUs compared to
the Internet packets.
Therefore, adaptation layer is needed.
Bluetooth Technology by IB 80
Communication between L2CAP layers is based
on logical channels, through which L2CAP traffic
flows between endpoints within each device.
L2CAP provides 3 logical channels:
Connectionless: These unidirectional channels are
typically used for broadcasts from master to slaves.
Connection-oriented: Each channel of this type is
bidirectional and supports QoS flow specifications
for each direction.
Signaling: This channel is used to exchanging
signaling messages between L2CAP entities.
Bluetooth Technology by IB 81
Each endpoint of a channel (a devices L2CAP
layer) is assigned a unique 16-bit local Channel
Identifier (CID).
CID Comments
0x0000 Null identifier, not to be assigned
CID for both endpoints of an L2CAP signaling
0x0001
channel
CID for the destination endpoint of a CL L2CAP
0x0002
channel
0x0003 0x003F Range of reserved CIDs
Range of CIDs allocated on demand by a device
0x0040 0xFFFF
to its local endpoints for either CL or CO L2CAP
(64 to 65535)
channels Bluetooth Technology by IB 82
Logical Channel between Devices
Bluetooth Technology by IB 83
L2CAP Packet Formats
Bluetooth Technology by IB 84
L2CAP layer also provides segmentation and
reassembly functions.
Depending on the baseband capabilities, large
packets are chopped into smaller segments.
e.g. DH5 links carry a maximum of 339 bytes while
the L2CAP layer accepts up to 64 KB.
Bluetooth Technology by IB 85
Protocol Stack
Bluetooth Technology by IB 86
RFCOMM Protocol Layer
Serial interface are ubiquitous in computing
and telecommunication devices.
E.g. Notebook computers, PDAs, mobile
telephones, digital cameras, printers and other
computer peripherals.
Bluetooth technology replaces cables, to do
this the stack needs to support serial comm. in
the same manner as is done with cables.
Bluetooth Technology by IB 87
Thus the SIG has chosen to define a layer in
the protocol stack that looks similar to typical
serial interface: the RFCOMM layer.
In the world of personal computers, serial
interfaces are often called COM ports.
The name RFCOMM implies a wireless (RF)
instance of a virtual COM port.
Bluetooth Technology by IB 88
Service Discovery Protocol (SDP)
Bluetooth device should work together with
other devices in unknown environment in an ad-
hoc fashion.
It is essential to know what devices, or more
specifically what services, are available in radio
proximity.
To find new services, Bluetooth defined the
Service Discovery Protocol (SDP).
SDP defines only the discovery of services, not
their usage.
Bluetooth Technology by IB 89
Devices that want to offer a service have to install
an SDP server, for other devices SDP client is
sufficient.
All the information an SDP server has about a
service is contained in a service record.
Bluetooth Technology by IB 90
Telephony Control Protocol (TCS-BIN)
TCS-BIN is used for the call control aspects of
telephony, including establishing and
terminating calls along with many other
control functions apply to telephone calls
TCS can be used to control both voice and
data calls.
When a voice call is made the audio element
of the stack is used to carry its content.
In case of data calls the data content can be
carried over the transport layers of the stack.
Bluetooth Technology by IB 91
Profiles
A profile defines a set of protocol components
necessary for the set up of correct and
communicating applications.
We give hereafter some of the known profiles:
Generic access profile (GAP):
Assures the good behavior of the link layers.
It describes how the devices behave from the standby to
the connection state and guarantee that links and
channels can be established between nodes.
Discovery, connection establishment and security are
described with the adequate parameters.
Bluetooth Technology by IB 92
Service discovery application profile (SDAP):
The service discovery profile defines the protocols
and procedures used by service discovery
applications to find services in other equipment
supporting SDP.
This profile is not fixed because it is initiated by a
user willing to find something that changes
according to the scenario.
Cordless telephony profile (CTP):
This profile enables cellular phones to communicate
as cordless phones between a cellular and a PC.
Bluetooth Technology by IB 93
Intercom profile (IP):
Offers a talkie-walkie service over devices.
Serial Port Profile (SPP).
Headset (HS):
It is one of the most used profiles. Note also that
it is never implemented in the fixed PC, while it
could enable the communication between the PC
and the phone, and would transform the PC as a
Voice over IP gateway.
Dial-up networking profile (DNP):
To emulate a modem over a cellular phone.
Bluetooth Technology by IB 94
Fax FP (Fax Profile).
Local area network profile (LAP):
This profile implements a bridging facility for
Bluetooth devices to interconnect to a LAN.
Generic object exchange profile (GOEP):
This is very useful profile for exchanging objects
between two phones.
Objects are identified by their extensions.
Not all phones interpret these objects correctly.
Objects could be visit cards, photos, videos, email,
etc.
Bluetooth Technology by IB 95
File transfer profile (FTP):
This profile is not related to FTP over IP, but still
has the same functionalities.
Synchronization profile (SP):
This profile is useful to synchronize agendas,
mailers, addresses, etc.
Bluetooth Technology by IB 96
The Future Bluetooth
That was Bluetooth 1.1
There is a medium-rate Bluetooth 1.2
Rates of 2 to 3 Mbps
There is a high-rate Bluetooth 2.0: (~by 2004)
Expected to support gross rates of 4, 8, and 12 Mbps
Will offer new communications modes on top of the 1.1
specs, non-hopping narrow band and distributed MAC
protocols.
Faster response times, built-in QoS, broadcast/multicast
support.
Operates over the same 10-meter distance (peak power is
expected to be doubled).
Expected cost of Bluetooth 2.0 chip sets is not more than
20% more than the current Bluetooth chips
Bluetooth Technology by IB 97
Typical Bluetooth Equipments
Bluetooth Technology by IB 98
Summary
DEFINITION: Bluetooth is a wireless peer-to peer
communications protocol that interconnects
devices such as cell phones, PDAs, laptops, digital
cameras and computers within a maximum
distance of about 30 feet.
USAGE: Bluetooth networks are designed to be
short-distance Personal Area Networks (PANs),
and are almost always customized to meet one
specific user's requirements, often utilizing
inexpensive consumer electronics components.
Voice and low-rate data communications are
supported. Bluetooth Technology by IB 99
RANGE/THROUGHPUT: 30 feet, 1 Mbps.
(SLOW !!!) Future implementations will
increase transmission power to 100mW with a
range of eventually up to 300 feet.
OPERATING FREQUENCY: 2.4 to 2.5GHz. - FHSS
(Frequency Hopping Spread Spectrum).
Bluetooth resists interference by constantly
frequency hopping while sending and
receiving packets. Many Bluetooth networks
can operate simultaneously in a given area.
MEDIUM ACCESS CONTROL: TDMA (Time
Division Multiple Access)
Bluetooth Technology by IB 100
DISCOVERY MODE
Units to be paired (interconnected peer-to-peer)
are placed in a special search/listening mode
called discovery.
Once the units discover each other (i.e, cell phone
discovers your Bluetooth earpiece), the User must
enter a passcode (for example, 0000 for
Bluetooth earpieces).
The cell phone and Bluetooth earpiece then
update their individual EPROMs, and they are now
paired.
Bluetooth Technology by IB 101
Each Bluetooth device has a 48-bit device
address, which is publicly exposed during
discovery.
CHALLENGE-RESPONSE ROUTINE
Turning on a paired Bluetooth network member
(such as a Bluetooth earpiece) initiates a
challenge/response routine.
After authentication, the 2 network components
can then communicate (ie, the User may use their
Bluetooth earpiece in making cell phone calls).
PRIVATE KEY ENCRYPTION- 128-bit key is
created during startup and is secret.
Bluetooth Technology by IB 102
Protocol Stack
Bluetooth Technology by IB 103
Conclusion
Bluetooth technology has certain assets: low
power consumption, high level of integration,
profiles, native management of the voice and
it includes mechanisms for simple QoS and
error control.
The new version has improved data rates and
makes it more attractable for high-rate
transfers related to video.
Bluetooth Technology by IB 104