Вы находитесь на странице: 1из 41

BLUETOOTH: A Wireless

Revolution

SUKALYAN
SUJIT
MAHENDRA
RAHUL
CORDLESS
COMPUTER
wireless
technology to link mobile
phones &
accessories.
 5 companies joined to form
the
Bluetooth Special Interest
Group (SIG)
in 1998.
 First specification released
in July
1999.
 1994 : Ericsson study complete / vision
 1995 : Engineering work begins
 1997 : Intel agrees to collaborate
 1998 : Bluetooth SIG formed: Ericsson, Intel, IBM,
Nokia & Toshiba
 1999 : Bluetooth Specification 1.0A SIG promoter
group Expanded: 3Com, Lucent, Microsoft &
Motorola.
 2000 : Bluetooth Specification 1.0B, 2000+ adopters
 2001 : First retail products released, Specification 1.1
 2003 : Bluetooth Specification 1.2
 2005 : Bluetooth Specification 2.0 (?)
WHAT IS BLUETOOTH?
 Originally conceived as a cable
replacement technology
 Short-Range Wireless Solutions
 Open Specification
 Voice and Data Capability
 Worldwide Usability A RECENT ONE

ONE OF THE
FIRST
 Eliminate cables
 Inexpensive
 Easy to set up and use
 Readily available
 Good security
 Device compatibility
RANGE OF BLUETOOTH
 Class 3 radios – have a range of up to 1 meter or
3 feet
 Class 2 radios – most commonly found in
mobile devices – have a range of 10 meters
or 30 feet
 Class 1 radios – used primarily in industrial use
cases – have a range of 100 meters or 300 feet
POWER CONSUMPTION :
 The most commonly used radio is Class 2
and uses 2.5 mW of power.
 Bluetooth technology is designed to have
very low power consumption.
SPEED OF BLUETOOTH :
 1 Mbps for Version 1.2
 Up to 3 Mbps supported for Version 2.0
BLUETOOTH TECHNOLOGY

Bluetooth Devices Must Necessary


Contain
Four h/w Features

 A Radio Frequency Section


 A Baseband Microprocessor
 A memory
 An Interface To the Host Device
 Piconet is the fundamental form of
communication for Bluetooth Wireless
technology.
 Master & Slaves.
 The master Bluetooth device can
communicate with up tp 7 devices.
 Data can be transferred b/w the
master & one other device.
 The master switches rapidly from
device to another in a round-robin
fashion.
Piconet 1 Piconet 2

S SB S
P
P M M

S
SS M-master
S-Slave
P S
P P-Parked
SB-Standby

All devices in a piconet use the same


frequency-hopping pattern
 Two or more Piconets can be
connected together to form a
Scatternet.
 Some devices act as a bridge by
simultaneously playing the master
role & the slave role in one
piconet.
 All devices in a piconet use the
same frequency-hopping pattern
BLOCK DIAGRAM OF
CHIP
External Antenna

UART/USB

PCM/ IO
Bluecore PIO
2-
SPI
FILTER AMPLIFIE External
R
8 Mbit
Flash
Memory
Power
EXTERNAL RC CIRCUIT
Application

O
TCP/IP AT
B
E Commands
PPP
X

RFCOMM TSC SDP

L2CAP

HCI

Audio Link Manager (LM)

Baseband

Bluetooth Radio
RADIO PROTOCOL
 Bluetooth transfers data in the

frequency range between audio


and
infrared band of frequencies
(2400MHz to 2500MHz)
 The Bandwidth is divided into
many
channels
 These channels are divided in
BASEBAND PROTOCOL
MANAGES:--
 LINKS
 SCO
 ACL

 PACKETS

ACCESS CODE HEADER PAYLOAD

72 Bits 54 Bits 0- 2745 Bits


 DEVICE CONNECTION STATE

 Stand By

 Connection

 ERROR CORRECTION
 1/3 rate FEC
 2/3 rate FEC
 ARQ
LINK MANAGER PROTOCOL
MANAGES

 Link Setup
 Authentication
 Link Configuration
 Low Lying Protocols
HOST CONTROLLER
INTERFACE
Operates at three levels
viz. the HOST, Transport Layer
& the
Host Controller
 Provides command interface
to
lower data link layers
 Provides access to h/w status
and
control registers
LOGICAL LINK CONTROL
AND ADAPTATION LAYER
PROTOCOL
MANAGES
 Protocol Multiplexing

 Segmentation and
Reassembling

 Group Abstraction
RFCOMM PROTOCOL

 Establishes Process to
Process
Communication

 Up to 60 simultaneous links
can be
set up
SDP PROTOCOL
 Manages underlying protocols

 Provides service communication


reliability
 Keeps Record Of the processes
running
in the host.
SDP
request
SDP
response

Fig: SDP Communication


Bluetooth vs. IR

BLUETOOTH IR
 Point to multipoint Point to point

 Data & Voice Only data

 Easier Synchronization due Can’t penetrate


To Omni-directional solid devices
 Range 10 m Range 1 m

 Device can be mobile Devices must be

stationary
COMPARISON

COMPARISION
ADVANTAGES
• Wireless Technology

• Cost Effectiveness

• Low Power Consumption

• Acknowledgement System
ADVANTAGES

• Operates On Bi-directional Mode

• Voice And Data Co-exsits In this Technology

• Utilizes spread-spectrum frequency-hopping


scheme
LIMITATIONS
• Short Range operations: About 10 meter

• Supports Data Transfer up to 1 mbps

• Bluetooth standards does not address


routing in piconets and scatternets .
LIMITATIONS

• Multi-hop multicasting is absent in


this technology. 

• The only versions of MS Windows


that have native support for BT are
Windows XP Service Pack 2 and later
Security issue
While Bluetooth has its benefits, it is
susceptible to
denial of service attacks,
eavesdropping,
man-in-the-middle attacks,
message modification,
and resource misappropriation.
Timeline of Security
Concern
2001 - Jaobsson and Wetzel from Bell Laboratories discovered
flaws in the pairing protocol of Bluetooth, and also pointed to
vulnerabilities in the encryption scheme.
2003 - Ben and Adam Laurie from A.L. Digital Ltd. discovered that
serious flaws in Bluetooth security may lead to disclosure of
personal data.
2004 - first purported virus using Bluetooth to spread itself among
mobile phones appeared on the Symbian OS.
Also it was disclosed that with the help of directional antenna and
signal amplifiers the range of bluetooth 2.0 can be amplified upto
1.08 mile.
2005 - a mobile malware worm known as Lasco.A began targeting
mobile phones using Symbian OS (Series 60 platform) using
Bluetooth-enabled devices to replicate itself and spread to other
devices
2006 - researchers from Secure Network and F-Secure published a
report that warns of the large number of devices left in a visible
Bluejacking
Bluejacking is the sending of unsolicited
messages over Bluetooth to Bluetooth-
enabled devices such as mobile phones,
PDAs or laptop computers.

Usually harmless in nature.

Bluejacking was reportedly first carried out by


a Malaysian IT consultant who used his
phone to advertise Sony Ericsson.
Bluesnarfing
Bluesnarfing is the unauthorized access of
information from a wireless device through a
Bluetooth connection, often between
phones, desktops, laptops, and PDAs.

This allows access to a calendar, contact


list, emails and text messages, and on some
phones users can copy pictures and private
videos.
Future of Bluetooth
Bluetooth low energy
Bluetooth low energy technology is an
open radio technology for small devices. It
addresses devices with very low battery
capacity and is easily integrated with
traditional Bluetooth

In many cases, products will be able to


operate more than a year on a button cell
battery without recharging.

It will be available by early 2010


Bluetooth low energy vs
Classical Bluetooth
Thank
You

Вам также может понравиться