Академический Документы
Профессиональный Документы
Культура Документы
com
Bluetooth
Whitepaper
TM
Summary
The number of computing and telecommunications devices is increasing and consequently, the focus on how to connect them to each other. The usual solution is to connect the devices with a cable to make file transfer and synchronisation possible. File transfer is required so that the user is able to type a document in, for instance, a PDA and move it later to the PC. There is also a need for synchronisation of events in the calendars of the various devices. The solution to these requirements has been to connect the devices with a cable, or sometimes to connect them using infrared light. The cable solution is often complicated since it may require a cable specific to the devices being connected as well as configuration software. The infrared solution eliminates the cable, but requires line of sight. To solve these problems a new technology, Bluetooth, has been developed. Bluetooth provides the means for a short-range radio link solution. It is the result of a co-operative effort among a number of companies all working for a cheap, simple, and low power-consuming solution with broad market support. With Bluetooth, users will be able to connect a wide range of computing and telecommunications devices easily and simply, without the need for connecting cables. The technology defines how units can communicate up to 10 meters from each other. It also defines how certain applications should be mapped onto the hardware to be compatible with Bluetooth. If this is achieved, the concept ensures that devices can operate with other Bluetooth applications and devices regardless of manufacturer. The concept can also act as a way to avoid cable solutions. Furthermore, it can also be used to enable communication between several units, such as small radio LANs. This results in a multitude of possible future user scenarios. The strength of the Bluetooth concept is that Bluetooth chips can be made very small; they are cheap and they are low power-consuming. Furthermore, there is support for the technique from a vast variety of companies. It is supported not only in the PC and mobile phone industries, but also in several other industries as well.
Introduction
This Bluetooth white paper aims to give a good overview of the Bluetooth concept. It strives to cover technical aspects, regarding hardware, software and Bluetooth applications. It also deals with marketing aspects in relation to competing techniques. Furthermore, it describes some of the companies behind Bluetooth and some of their motives. The document begins with an introduction where the Bluetooth background and the Bluetooth standardisation organisation are described. What benefits and possibilities the technology can provide to users are handled in the section Bluetooth Cable replacement, and more. This section also gives a view of the marketing position that the Bluetooth technology enters. The Bluetooth protocol layers and their configuration is described in the section Bluetooth architecture. It A section describing the Bluetooth air interface follows it. Competing techniques and the strengths with the Bluetooth concept is then handled in the section Why Bluetooth Technical aspects. Finally, a brief look at the near Bluetooth future is done in the last section.
Background
Bluetooth technology and standards provide the means for the replacement of cable that connects one device to another with a universal short-range radio link. The technology was initially developed for replacing cables, but has now evolved into not only being a cable replacement technique but also a technique to establish connection between several units. For instance, it shows how to create small radio LANs. A study was initiated at Ericsson Mobile Communications in 1994 to find a low power and low cost radio interface between mobile phones and their accessories. The requirements regarding price, capacity and size were set so that the new technique would have the potential to outdo all cable solutions between mobile devices. Initially a suitable radio interface with a corresponding frequency range had to be specified. A number of criteria for the concept were defined regarding size, capacity and global uniformity. The radio unit should be so small and consume such low power that it could be fitted into portable devices with their limitations. The concept had to handle both speech and data and finally the technique had to work all around the world. The study soon showed that a short-range radio link solution was feasible. When designers at Ericsson had started to work on a transceiver chip, Ericsson soon realised that they needed companions to develop the technique. The associates strove not only to improve the technical solutions but also to get a solid and broad market support in the business areas of PC hardware, portable computers and mobile phones. Fear for a market situation with a multitude of non-standard cable solutions, where one cable is designed specifically for one pair of devices, was one of the motives that made competing companies join the project. Ericsson Mobile Communications, Intel, IBM, Toshiba and Nokia Mobile Phones formed a Special Interest Group (SIG) in 1998. This group represented the diverse market support that was needed to generate good support for the new
Bluetooth White Paper 1.1, AU-System, January 2000
technology. In May of the same year, the Bluetooth consortium announced itself globally. The intention of the Bluetooth SIG is to form a de facto standard for the air interface and the software that controls it. The purpose is to achieve interoperability between different devices from different producers of portable computers, mobile phones and other devices. The name Bluetooth comes from a Danish Viking and King, Harald Bltand (Bluetooth in English), who lived in the latter part of the 10th century. Harald Bltand united and controlled Denmark and Norway.
Bluetooth SIG
In February 1998, the Bluetooth Special Interest Group, SIG, was founded. At the start, it consisted of the five companies mentioned above. Today more than 1300 companies have joined the SIG to work for an open standard for the Bluetooth concept. By signing a zero cost agreement, companies can join the SIG and qualify for a royalty-free licence to build products based on the Bluetooth technology. To avoid different interpretations of the Bluetooth standard regarding how a specific type of application should be mapped to Bluetooth, the SIG has defined a number of user models and protocol profiles. These are described in more detail in the section entitled Bluetooth Usage Models and Profiles. The SIG also works with a Qualification Process. This process defines criteria for Bluetooth product qualification that ensures that products that pass this process meet the Bluetooth specification.
Bluetooth devices. A number of user scenarios are described. They highlight more possibilities that reach far beyond just an elimination of the point-to-point cable.
IP
PPP
RFCOMM
Baseband
RFCOMM and so on) of the Bluetooth protocol stack. Some of the user models and their profiles are described in section Bluetooth Usage Models and Profiles.
vCARD OBEX RFCOMM SDP TCS Binary
There are four general profiles defined, on which some of the highest prioritised user models and their profiles are directly based on. These four models are; the Generic Access Profile (GAP), the Serial Port Profile, the Service Discovery Application Profile (SDAP) and the Generic Object Exchange Profile (GOEP). Protocols such as OBEX and UDP have been included in the protocol architecture to facilitate the adaptation of applications using such existing protocols. This gives for instance a number of existing applications supporting UDP an interface to the Bluetooth technology.
Generic Access Profile TCS Binary profiles Service Discovery Profile Cordless Telephony Profile Intercom Profile
Serial Port Profile Dial up Networking Profile Fax Profile Generic Object Exchange Profile File Transfer Profile Object Push Profile Synchronisation Profile
The SDAP is dependent on the GAP, i.e. SDAP re-uses parts of the GAP [4]. Serial Port Profile The Serial Port Profile defines how to set-up virtual serial ports on two devices and connecting these with Bluetooth. Using this profile provides the Bluetooth units with an emulation of a serial cable using RS232 control signalling (RS232 is a common interface standard for data communications equipment). The profile ensures that data rates up to 128 kbit/s can be used. The Serial Port Profile is dependent on the GAP, i.e. just as SDAP, Serial Port Profile re-uses parts of the GAP [5]. Generic Object Exchange Profile, GOEP The Generic Object Exchange Profile, GOEP, defines the set of protocols and procedures to be used by applications handling object exchanges. A number of usage models, described in the section Bluetooth Usage Models, are based on this profile, e.g. File Transfer and Synchronisation. Typical Bluetooth units using this profile are notebook PCs, PDAs, mobile phones and smart phones. Applications using the GOEP assume that links and channels are established, as defined by the GAP. The GOEP describes the procedure for pushing data from one Bluetooth unit to another. The profile also describes how to pull data between units. The GOEP is dependent on the Serial Port Profile [6].
10
LAN Access The LAN Access usage model is similar to the Internet Bridge user model. The difference is that the LAN Access usage model does not use the protocols for ATcommands. The usage model describes how data terminals use a LAN access point as a wireless connection to a Local Area Network. When connected, the data terminals operate as if it they were connected to the LAN via dial-up networking. Synchronisation The synchronisation usage model provides the means for automatic synchronisation between for instance a desktop PC, a portable PC, a mobile phone and a notebook. The synchronisation requires business card, calendar and task information to be transferred and processed by computers, cellular phones and PDAs utilising a common protocol and format. Three-in-One Phone The Three-in-One Phone usage model describes how a telephone handset may connect to three different service providers. The telephone may act as a cordless telephone connecting to the public switched telephone network at home, charged at a fixed line charge. This scenario includes making calls via a voice base station, and making direct calls between two terminals via the base station. The telephone can also connect directly to other telephones acting as a walkie-talkie or handset extension i.e. no charging needed. Finally, the telephone may act as a cellular telephone connecting to the cellular infrastructure. The cordless and intercom scenarios use the same protocol stack. Ultimate Headset The Ultimate Headset usage model defines how a Bluetooth equipped wireless headset can be connected, to act as a remote units audio input and output interface. The unit is probably a mobile phone or a PC for audio input and output. As for the Internet Bridge user model, this model requires a two-piece protocol stack; one for AT-commands to control the mobile phone and another stack to transfer payload data, i.e. speech. The AT-commands control the telephone regarding for instance answering and terminating calls.
11
Audio Audio transmissions can be performed between one or more Bluetooth units, using many different usage models. Audio data do not go through the L2CAP layer (described below) but go directly, after opening a Bluetooth link and a straightforward set-up, between two Bluetooth units.
12
characteristics. The protocol defines how a client can search for a service based on specific attributes without the client knowing anything of the available services. The SDP provides means for the discovery of new services becoming available when the client enters an area where a Bluetooth server is operating. The SDP also provides functionality for detecting when a service is no longer available [11].
Adopted protocols
This section describes a number of protocols that are defined to be adopted to the Bluetooth protocol stack. Note some of these adaptations are at the moment incomplete.
PPP
The IETF Point-to-Point Protocol (PPP) in the Bluetooth technology is designed to run over RFCOMM to accomplish point-to-point connections. PPP is a packetoriented protocol and must therefore use its serial mechanisms to convert the packet data stream into a serial data stream.
Bluetooth White Paper 1.1, AU-System, January 2000
13
TCP/UDP/IP
The TCP/UDP/IP standards are defined to operate in Bluetooth units allowing them to communicate with other units connected, for instance, to the Internet. Hence, the Bluetooth unit can act as a bridge to the Internet. The TCP/IP/PPP protocol configuration is used for all Internet Bridge usage scenarios in Bluetooth 1.0 and for OBEX in future versions. The UDP/IP/PPP configuration is available as transport for WAP.
OBEX Protocol
IrOBEX, shortly OBEX, is an optional application layer protocol designed to enable units supporting infrared communication to exchange a wide variety of data and commands in a resource-sensitive standardised fashion. OBEX uses a client-server model and is independent of the transport mechanism and transport API. The OBEX protocol also defines a folder-listing object, which is used to browse the contents of folders on remote device. RFCOMM is used as the main transport layer for OBEX Content formats The formats for transmitting vCard and vCalendar information are also defined in the Bluetooth specification. The formats do not define transport mechanisms but the format in which electronic business cards and personal calendar entries and scheduling information are transported. vCard and vCalendar is transferred by OBEX.
14
15
starts the illustrated sequence with a multi-slot packet covering three slots. Note that the hopping channel after the multi-slot packet is the same (compare with Figure 4) as if there had not been a multi-slot packet.
Bluetooth networking
When Bluetooth units are communicating, one unit is master and the rest of the units act as slaves. The master unit's system clock and the master identity are the central parts in the frequency hop technology. The hop channel is determined by the hop sequence and by the phase in this sequence. The identity of the master determines the sequence and the master unit's system clock determines the phase. In the slave unit, an offset may be added to its system clock to create a copy of the master's clock. In this way every unit in the Bluetooth connection holds synchronised clocks and the master identity, that uniquely identifies the connection. Hops synchronised with the master can therefore be achieved as described in Figure 6. 79 hop carriers have been defined for the Bluetooth technology except for France and Spain where 23 hop carriers have been defined, because the ISM-band is narrower there.
Hop selection Hop + Phase Sequence Offset Master identity
Figure 6 The hop selection
Slave clock
The Bluetooth packets have a fixed format. A 72-bit access code comes first in the packet. The access code is based on the master's identity and the master's system clock, i.e. it provides the means for the synchronisation. This code is unique for the channel and used by all packets transmitting on a specific channel. A 54-bit header follows the access code. This header contains error correction, retransmission and flow control information. The error correction information can
Bluetooth White Paper 1.1, AU-System, January 2000
16
be used for correcting faults in the payload and in the header itself. Finally comes the payload field with anything between zero and 2,745 bits, i.e. up to 340 bytes.
fn +2 f n+1 fn t 625 s
Radio parameters
Bluetooth units operate on the ISM band, at 2.45 GHz. The transmitting power is between 1 and 100 mW. The radio-frequency transmitters are very small. Ericsson's 1 mW Bluetooth radio module is only 10.2x14x1.6 mm. The low power consumption implies that a Bluetooth unit can operate on the power from a small battery for a long time (months). These hardware characteristics make it possible to fit a Bluetooth unit in many electrical devices. The maximum Bluetooth range is 10 m, with a possibility to extend it to 100 m. The maximum bit rate is 1 Mbit/s. Maximum effective payload is lower because the different protocol layers require data payload for signalling to their corresponding layers in the unit with which the device is communicating. Estimates have indicated data transfer rates up to 721 kbit/s.
Link types
Two types of link have been defined, Asynchronous Connectionless, ACL, and Synchronous Connection Oriented, SCO. When two Bluetooth units communicate a piconet is established (capable of handling up to eight Bluetooth devices). One device in the piconet always has the master role. Different masterslave pairs in the same piconet can use different link types. The link type may be changed during a session. The SCO links support symmetrical, circuit-switched, point-to-point connections and are therefore primarily used for voice traffic. Two consecutive time slots, up and down, at fixed intervals are reserved for a SCO link. The data rate for SCO links is 64 kbit/s. ACL links are defined for bursty data transmission, i.e. packet data primarily. They support symmetrical and asymmetrical, packet-switched, point-tomultipoint connections. Multi-slot packets use the ACL link type and can reach the maximum data rate 721 kbit/s in one direction and 57.6 kbit/s in the other direction if no error correction is used. The master unit controls the ACL link bandwidth and decides how much of the bandwidth in a piconet a slave can use. The master also controls the symmetry of the traffic. Broadcast messages are supported in the ACL link, i.e. from the master to all slaves in the piconet.
Bluetooth White Paper 1.1, AU-System, January 2000
17
Data packets are protected by an Automatic Retransmission Query, ARQ, scheme. This scheme implies that at every packet reception an error check is done. If an error is detected, the receiving unit indicates this in the return packet; thus lost or faulty packets only cause a one-slot delay. In this way, retransmission is in this way selective, only faulty packets are retransmitted. Since retransmission is not optimal for voice transmissions due to its vulnerability for delays, a voice-encoding scheme is used. This scheme is highly resistant to bit errors. The errors that cannot be corrected result in an increasing background noise.
18
transmitted between master and slave units and how the slaves' current system clocks are distributed to the master. To connect units with an unknown address an inquiry signal is transmitted initially. This signal is used to inform the master unit of the slave's identity within transmission range. The paging unit on the inquiry wake-up carriers sends an inquiry access code. Units receiving this message respond with their identity and system clock. The inquiry message is typically used for finding Bluetooth devices, including public printers, fax machines and similar devices with an unknown address. Power saving modes Three different power saving modes have been defined, Hold, Sniff and Park. They can be used if there is no data transmission ongoing in the piconet. A slave can either demand to be put in Hold mode or be put in Hold by the master unit. In Hold mode only an internal timer is running. Data transfer restarts instantly when units make the transition out of Hold mode. The mode is used when connecting several piconets or managing a low power device such as a temperature sensor. In the Sniff mode, a slave device listens to the piconet at reduced rate, thereby reducing its duty cycle. In the Park mode a unit remains synchronised in the piconet but does not participate in the traffic [13].
Scatternet
To optimise the use of the available spectrum, several piconets can exist in the same area. This is called scatternet. Within one scatternet all units share the same frequency range but each piconet uses different hop sequences and transmits on different 1 MHz hop channels. Thus, a way to optimise the data transmission capability is to keep the piconets small (i.e. few units). All piconets share the 80 MHz band, where each piconet uses 1 MHz, thus, as long as the piconets pick different hop frequencies, no sharing of 1 MHz hop channels occurs. Consequently, if a mobile user wants to connect a number of Bluetooth units to his mobile phone, the best way to get high data transmission capacity is to form as many piconets as possible in one scatternet. Every connection is using a piconet's maximum capacity (721 kbit/s). The laws of probability imply that the number of collision resulting in retransmission is so low that up to 8 piconets are possible in one scatternet.
Bluetooth security
Introducing the Bluetooth technology as a cable replacement technique exposes the need for security functionality in the wireless solution. By replacing the cable and introducing radio signals there is a need for the Bluetooth device to have built-in security to prevent eavesdropping and falsifying the message originator. Therefore, functionality for authentication and encryption has been added to the Bluetooth technology. Authentication is used to prevent unwanted access to data and to prevent falsifying of the message originator. Encryption is used to prevent eavesdropping. These two techniques combined with the frequency hopping technique and the limited transmission range for a Bluetooth unit, usually 10 m, give the technology higher protection against eavesdropping.
19
Since the need for security is dependent on what kind of application is executed, three levels of security are defined in the Bluetooth concept. 1. Non-secure; This mode bypasses functionality for authentication and encryption. 2. Service-level security; Security procedures are not initiated until L2CAP channel establishment. 3. Link-level security; Security procedures are initiated before the link set-up at the LMP level is completed.
Service-level security
In the Service-level security mode, it is suggested to introduce a Security Manager that controls the access to services and units. This security mode provides the possibility to define trust levels for the services and units used respectively. The access is restricted according to the defined trust levels.
Link-level security
The Link-level security mode is based on the concept of link keys. These keys are secret 128 bit random numbers stored individually for each pair of devices in a Bluetooth connection. Each time two Bluetooth units communicate, the link key is used for authentication and encryption.
20
IrDA
The main competitor in the cable replacement market segment is IrDA. IrDA is an infrared interface standard providing wireless solutions between, for instance, mobile phones and PDAs. The technique is well known in the market but has had problems because some IrDA manufacturers have made implementations incompatible with standard implementations. The maximum payload in the IrDA technology exceeds the maximum Bluetooth payload. The two main disadvantages with IrDA are that it is limited to point-to-point connections (only two parties in a connection) and its need for line of sight (since it is based on infrared light).
Home RF
Home RF is a technique developed by a consortium with, among others, Microsoft, Intel, HP, Motorola and Compaq. The technique is developed from the
Bluetooth White Paper 1.1, AU-System, January 2000
21
DECT concept and operates in the 2.4 GHz frequency band (the same as Bluetooth). The intention has been to develop a technique for the home market. There are many similarities with Bluetooth, price per unit, range, transmitting power etc. The major differences are that Home RF can handle up to 127 units per net and it uses just 50 frequency hops per second. The figures for Bluetooth are 8 and 1600 respectively.
Bluetooth strengths
The Bluetooth concept offers several benefits compared with other techniques. The main advantages of Bluetooth are: The minimal hardware dimensions The low price on Bluetooth components The low power consumption for Bluetooth connections
The advantages make it possible to introduce support for Bluetooth in many types of devices at a low price. The diversity in product offerings (mobile phones, PDAs, computers, computer hardware, notebooks etc) from companies in the Bluetooth SIG and their broad support for the technique creates a unique market position. Both hardware and device manufacturers will work for the introduction of Bluetooth in many different devices. The capabilities provided by Bluetooth, approximately 720 kbit/s, can be used for cable replacement and several other applications such as speech, LAN and so on, as described in the use cases, described in the section entitled Bluetooth Usage Models. Figure 8 indicates in what areas the Bluetooth concept can be used. Defining of specific user models and corresponding profiles combined with the four general profiles will most likely lead to a market situation where applications covered by the user models will use the defined user models and their profiles. Furthermore, it is likely that new applications will use the standard profiles and thereby avoid interoperability problems between different manufacturers.
22
23
References
[1] "Bluetooth the gap between perception and reality" Mobile Europe, September 1999 , p 14-17 "Bluetooth Technology: The Convergence of Computing and Communications", Intel Corporation, http://www.gsmdata.com/cannes99/cannespaper.htm Generic Access Profile Specification, www.bluetooth.com Service Discovery Application Profile Specification, www.bluetooth.com Serial Port Profile Specification, www.bluetooth.com Generic Object Exchange Profile Specification, www.bluetooth.com Baseband Specification, www.bluetooth.com Host Controller Interface, Functional Specification, www.bluetooth.com Link Manager Protocol, Specification, www.bluetooth.com Logical Link Control and Adaptation Protocol Specification, www.bluetooth.com Service Discovery Protocol, Specification, www.bluetooth.com "Bluetooth The universal radio interface for ad hoc, wireless connectivity", Ericsson Review No. 3, 1998 Bluetooth overview, www.bluetooth.com
[2]
[3] [4]
[5] [6]
[7] [8]
[9] [10]
[11] [12]
[13]
24
Abbreviations
Abbreviation or Acronym ACL API ARQ AT-commands FSK GAP GOEP FH HCI IETF IP IrDA ISM LAN LMP L2CAP OBEX PDA PPP RF RFCOMM SCO SDAP SDP SIG TCP TCS Binary UDP WAE WAP Meaning Asynchronous ConnectionLess Application Programming Interface Automatic Retransmission Query ATtention commands Frequency Shift Keying Generic Access Profile Generic Object Exchange Profile Frequency-Hop Host Controller Interface Internet Engineering Task Force Internet Protocol Infrared Data Association Industrial-Scientific-Medical Local Area Network Link Manager Protocol Logical Link and Control Adaptation Protocol Object Exchange Protocol Personal Digital Assistant Point-to-Point Protocol Radio Frequency Serial Cable Emulation Protocol Synchronous Connection-Oriented Service Discovery Application Profile Service Discovery Protocol Special Interest Group Transport Control Protocol Telephony Control Specification Binary User Datagram Protocol Wireless Application Environment Wireless Application Protocol
25