You are on page 1of 33

TABLE OF CONTENTS

Pag
Sr Remar
Subject e
No. k
No.
1 INTRODUCTION TO BLUETOOTH 02

1.1 ORIGIN OF NAME AND LOGO 02

2 HISTORY OF BLUETOOTH 03

3 WORKING OF BLUETOOTH 07

3.1 CONNECTING DEVICE 07

3.2 BLUETOOTH: LOW POWER & LOW COST 09

3.3 HOW BLUETOOTH IS USED? 10

3.4 HOW BLUETOOTH CREATE CONNECTION? 10

3.5 HOW BLUETOOTH OPERATES? 12

4 BLUETOOTH SECURITY 13

5 BLUETOOTH IN ACTION 15

5.1 WIRE LESS OFFICE 15

5.2 BLUETOOTH PAIRING 16

5.3 BLUETOOTH SPECIFICATION 19

1
6 COMPARISON WITH INFRARED 20

7 APPLICATION OF BLUETOOTH 22

8 ADVANTAGES OF BLUETOOTH 23

9 DISADVANTAGES OF BLUETOOTH 25

10 CONCLUSION 25

11 REFERENCE WEBSITES 26

2
1.Introduction of Bluetooth-

Bluetooth is a wireless protocol for exchanging data over


short distance from fixed and mobile devices, creating
personal area network (PANs). It was originally conceived
as a wireless alternative to RS232 data cables. It can
connect several devices, overcoming problems
synchronization

1.1 Origin of Name and Logo:

Bluetooth was named after a 10th Century King, Harald


Bluetooth,
King of Denmark and Norway.

The Bluetooth Logo contains the Latin letters H and B (H


for Harald, B
For Bluetooth)

3
2. History of Bluetooth

• The Bluetooth Special Interest Group (SIG)


is formed with five companies.
• The Bluetooth SIG welcomes its 400th
member by the end of the year.
• The name Bluetooth is officially adopted.

• The Bluetooth 1.0 Specification is released.


• The Bluetooth SIG hosts the first Unplug
Fest for member engineers.
• Bluetooth technology is awarded "Best of
Show Technology Award" at COMDEX.

4
• First mobile phone.
• First PC Card.
• Prototype mouse and laptop demonstrated
at CeBIT 2000.
• Prototype USB dongle shown at COMDEX.
• First chip to integrate radio frequency,
baseband, microprocessor functions and
Bluetooth wireless software.
• First Headset.

• First printer.
• First laptop.
• First hands-free car kit.
• First hands-free car kit with speech
recognition.
• The Bluetooth SIG, Inc. is formed as a
privately-held trade association.

• First keyboard and mouse combo.


• First GPS receiver.
• Bluetooth wireless qualified products now
number 500.
• IEEE approves the 802.15.1 specification to
conform with Bluetooth wireless
5
technology.
• First digital camera.

• First MP3 player.


• Bluetooth Core Specification Version 1.2
adopted by the Bluetooth SIG.
• Shipment of Bluetooth enabled products
hits rate of 1 million per week.
• First FDA-approved medical system.

• The Bluetooth SIG adopts Core Specification


Version 2.0 Enhanced Data Rate (EDR).
• Bluetooth technology reaches an installed
base of 250 million devices.
• Product-shipment rate surpasses 3 million
per week.
• First stereo headphones.

• Product shipments soar to 5 million chipsets


per week.
• The Bluetooth SIG welcomes its 4,000th
member.
• The Bluetooth SIG Headquarters opens in
Bellevue, WA; regional offices open in
Malmo, Sweden and Hong Kong.

6
• First Sunglasses.

• First watch.
• First picture frame.
• Bluetooth wireless reaches an installed
base of 1 billion devices.
• Bluetooth enabled devices ship at a rate of
10 million per week.
• The Bluetooth SIG announces it will
integrate Bluetooth technology with the Wi-
Media Alliance version of UWB.
• First alarm-clock radio.

• First television.
• The Bluetooth SIG welcomes its 8,000th
member.
• Signature, The Bluetooth quarterly, makes its
debut at the Bluetooth SIG's All Hands
Meeting in Vienna, Austria.
• Bluetooth SIG Executive Director, Michael
Foley, wins Telematics Leadership Award.

7
• 2008 marks Bluetooth technology’s 10 year
anniversary - no other wireless technology
has grown to be shipping nearly 2 Billion
products in 10 years.
• The Bluetooth SIG welcomes its 10,000th
member.
• Bluetooth SIG Executive Director, Michael
Foley, is named one of RCR Wireless News'
Mobile Movers & Shakers for 2008.

• The Bluetooth SIG adopts Core Specification


Version 3.0 HS making Bluetooth high speed
technology a reality
• The Bluetooth SIG welcomes its 12,000th
member
• The Bluetooth SIG All Hands Meeting is held
in Tokyo—the first AHM in APAC

3. Working of Bluetooth-

Bluetooth uses a Radio-technology frequency-hopping spread

Spectrum, which chops up the data being sent and transmits


chunks of it on up t o 7 9 frequenci es . In its basic mode, the
modulation is Gaussian frequency-shift keying (GFSK). It can
achieve a gross data rate of 1Mbps. Bluetooth provides a
8
way to connect and exchange information between devices
such as mobile phones, telephones, laptops, personal
computers, printers, Global Positioning System (GPS)
receivers, digital cameras and video game consoles.

3.1 Connecting Devices

In order to understand how Bluetooth technology works, we


must first take a look at how electronic devices (Bluetooth or
not) connect and communicate with one another. There are
several questions that need to be addressed before any two
devices can communicate with one another.

Q: Will the devices communicate via wires or through the air?


A: Obviously, if the devices are using Bluetooth technology,
they will communicate without wires. However, if the
devices are not Bluetooth enabled, then they have the
option of communicating either with or without wires.
Devices can take advantage of several wireless
technologies (Bluetooth included) by using various
transmitters to send information over the airwaves.

Q: How will messages or information be sent between the


two devices?
A: Information can be sent one bit at a time in a scheme called
serial communications, or in groups of bits (usually 8 or 16
at a time) in a scheme called parallel communications.
Q: How will devices in this “electronic conversation” know
what the information (bits or groups of bits) means? How
will they know if they received the same message that was
sent?
A: Most of the time these questions are answered by the
creation of what is known as a protocol. A protocol is a
standard that controls or enables the connection,

9
communication, and data transfer between two electrical
devices. Basically, a protocol is the "language" of devices.

With so many different types of electronics available, it is


probably no surprise that there are tons of established
protocols. However, almost all protocols address one or more
of the following:

* Detecting the presence of other devices


* Establishing communications guidelines between two devices
(AKA: Handshaking)
* Determining the various connection characteristics
* How to format a message
* How to start and end a message
* What to do with corrupted or incorrectly formatted
messages
* How to recognize unexpected connection loss, and what to
do next
* Ending the connection or “conversation”

10
Phone Server Computer
Printer

Some types of products have a standard protocol used by


almost all companies. As a result, the commands for one
product will have the same effect on another. However, there
are other devices that use their own specific protocol, which
means that commands intended for one specific device will
seem foreign if received by another.

The goal of Bluetooth is to establish a worldwide, universal


"language" for devices. Bluetooth uses a standardized wireless
protocol for devices to communicate. It forces devices to agree
on when bits are sent, how many will be sent at a time, and
how the devices in a conversation can be sure that the
message received is the same as the message sent. So, you
can be positive that any two devices using compatible
Bluetooth will definitely be able to communicate with one
another.

3.2 Bluetooth: Low Power and Low Cost!

Bluetooth wireless technology operates on an open frequency


within the 2.4 gigahertz band, which is the same as WiFi,
cordless phones and various other wireless devices. Bluetooth
is able to share the same frequency band without experiencing
any interference because it utilizes various key technologies.

Bluetooth avoids interference is through the use of low power


signals (around one milliwatt). Devices One of the ways using
the Bluetooth Core Specification Version 1.1 or later are able
to avoid interference with other wireless devices because their
signal is so weak.

11
The signal is also capable of passing through the walls in your
home, making it useful for controlling several devices in
different rooms. Data can be transferred at a rate of up to one
Megabyte per second (Mbps). Also, because Bluetooth
transmitters require minimal amounts of power, they are
relatively inexpensive to manufacture. Simply put, Bluetooth
uses low-power radio waves to reliably communicate in an
inexpensive way.

Another way Bluetooth devices are able to avoid interference


is through a technique known as spread-spectrum
frequency hopping. By using the “hopping” method, a
device will use one of 79 different, randomly chosen
frequencies within an assigned range, and will frequently
change frequencies from one to another.

Bluetooth enabled devices, which all use the “hopping”


method, change frequencies 1,600 times per second. As a
result, more devices can use a portion of the radio spectrum.

The risk of a device like a cell phone or baby monitor


interfering with Bluetooth devices is minimized, since any
interference on a specific frequency will last for only a fraction
of a second.

Bluetooth version 2.0 + EDR, the very latest of the Bluetooth


specification versions, uses an enhanced technology called:
Adaptive Frequency Hopping (AFH).

AFH allows Bluetooth devices to measure the quality of the


wireless signal and then determine if there are bad channels
present on specific frequencies due to interference from other
wireless devices. If bad channels are present on a specific
frequency, the Bluetooth device will adjust its hopping
sequence to avoid them. As a result, the Bluetooth connection
is stronger, faster, and more reliable.

12
3.3 How Bluetooth is used?

Bluetooth enabled devices must use and understand certain


Bluetooth "Profiles" in order to use Bluetooth technology to
connect to one another. These profiles define the possible
applications that a Bluetooth enabled device can support. In
order for one Bluetooth device to connect to another, both
devices must share at least one of the same Bluetooth profiles.

13
3.4 How Bluetooth Creates a Connection?

Bluetooth takes small-area networking to the next level by


removing the need for user intervention and keeping
transmission power extremely low to save battery power.
Picture this: You're on your Bluetooth-enabled cell phone,
standing outside the door to your house. You tell the person on
the other end of the line to call you back in five minutes so you
can get in the house and put your stuff away. As soon as you
walk in the house, the map you received on your cell phone
from your car's Bluetooth-enabled GPSsystem is automatically
sent to your Bluetooth-enabled computer, because your cell
phone picked up a Bluetooth signal from your PC and
automatically sent the data you designated for transfer. Five
minutes later, when your friend calls you back, you err
Bluetooth-enabled home phone rings instead of your cell
phone. The person called the same number, but your home
phone picked up the Bluetooth signal from your cell phone and
automatically re-routed the call because it realized you were
home. And each transmission signal to and from your cell
phone consumes just 1 mill watt of power, so your cell phone
charge is virtually unaffected by all of this activity.

Bluetooth is essentially a networking standard that works at


two levels:
• It provides agreement at the physical level -- Bluetooth
is a radio- frequency standard.
• It provides agreement at the protocol level, where
products have to agree on when bits are sent, how many
will be sent at a time, and how the parties in a
conversation can be sure that the message received is
the same as the message sent.
The big draws of Bluetooth are that it is wireless, inexpensive
and automatic. There are other ways to get around using
wires, including infrared communication. Infrared (IR) refers
14
to light waves of a lower frequency than human eyes can
receive and interpret. Infrared is used in most television
control systems. Infrared communications are fairly reliable
and don't cost very much to build into a device, but there are
a couple of drawbacks. First, infrared is a "line of sight"
technology.

For example, you have to point the remote control at the


television or DVD player to make things happen. The second
drawback is that infrared is almost always a "one to one"
technology. You can send data between your desktop
computer and your laptop computer, but not your laptop
computer and your PDA at the same time. (See How to learn
more about infrared communication.)

15
These two qualities of infrared are actually advantageous in
some regards. Because infrared transmitters and receivers
have to be lined up with each other, interference between
devices is uncommon. The one-to-one nature of infrared
communications is useful in that you can make sure a
message goes only to the intended recipient, even in a room
full of infrared receivers.

Bluetooth is intended to get around the problems that come


with infrared systems. The older Bluetooth 1.0 standard has a
maximum transfer speed of 1 megabit per second (Mbps),
while Bluetooth 2.0 can manage up to 3 Mbps. Bluetooth 2.0
is backward-compatible with 1.0 devices.

16
3.5 How B l u e t o o t h Operates?

Bluetooth networking transmits data via low-power radio


waves. It communicates on a frequency of 2.45 gigahertz
(actually between 2.402 GHz and 2.480 GHz, to be exact).
This frequency band has been set aside by international
agreement for the use of industrial, scientific and medical
devices (ISM).

A number of devices that you may already use take advantage


of this same radio-frequency band. Baby monitors, garage-
door openers and the newest generation of cordless phones all
make use of frequencies in the ISM band. Making sure that
Bluetooth and these other devices don't interfere with one
another has been a crucial part of the design process.

One of the ways Bluetooth devices avoid interfering with other


systems is by sending out very weak signals of about 1
milliwatt. By comparison, the most powerful cell phones can
transmit a signal of 3 watts. The low power limits theb g range
of a Bluetooth device to about 10 meters (32 feet), cutting the
chances of interference between your computer system and
your portable telephone or television. Even with the low
power, Bluetooth doesn't require line of sight between
communicating devices. The walls in your house won't stop a
Bluetooth signal, making the standard useful for controlling
several devices in different rooms.
Bluetooth can connect up to eight devices simultaneously.
With all of those devices in the same 10-meter (32-foot)
radius, you might think they'd interfere with one another, but
it's unlikely. Bluetooth uses a technique called spread-
spectrum frequency hopping that makes it rare for more than
one device to be transmitting on the same frequency at the
17
same time. In this technique, a device will use 79 individual,
randomly chosen frequencies within a designated range,
changing from one to another on a regular basis. In the case of
Bluetooth, the transmitters change frequencies 1,600 times
every second, meaning that more devices can make full use of
a limited slice of the radio spectrum. Since every Bluetooth
transmitter uses spread- spectrum transmitting automatically,
it’s unlikely that two transmitters will be on the same
frequency at the same time. This same technique minimizes
the risk that portable phones or baby monitors will disrupt
Bluetooth devices, since any interference on a particular
frequency will last only a tiny fraction of a second.

18
When Bluetooth-capable devices come within range of one
another, an electronic conversation takes
place to determine whether they have data to sharor whether
one needs to control the other. The user doesn't have to press
a button or give a command -- the electronic conversation
happens automatically. Once the conversation has occurred,
the devices -- whether they're part of a computer system or a
stereo -- form a network. Bluetooth systems create a personal-
area network (PAN), or piconet, that may fill a room or may
encompass no more distance than that between the cell
phone on a belt-clip and the headset on your head. Once a
piconet is established, the members randomly hop
frequencies in unison so they stay in touch with one another
and avoid other piconets that may be operating in the same
room. Let's check out an example of a Bluetooth-connected
system.

4. Bluetooth Security
In any wireless networking setup, security is a concern.
Devices can easily grab radio waves out of the air, so people
who send sensitive information over a wireless connection
need to take precautions to make sure those signals aren't
intercepted. Bluetooth technology is no different -- it's wireless
and therefore susceptible to spying and remote access, just
like WiFi is susceptible if the network isn't secure. With
Bluetooth, though, the automatic nature of the connection,
which is a huge benefit in terms of time and effort, is also a
benefit to people looking to send you data without your
permission.

Bluetooth offers several security modes, and device


manufacturers determine which mode to include in a
Bluetooth-enabled gadget. In almost all cases, Bluetooth users
can establish "trusted devices" that can exchange data
19
without asking permission. When any other device tries to
establish a connection to the user's gadget, the user has to
decide to allow it. Service- level security and device-level
security work together to protect Bluetooth
Devices from unauthorized data transmission. Security
methods include authorization and identification procedures
that limit the use of Bluetooth services to the registered user
and require that users make a conscious decision to open a
file or accept a data transfer. As long as these measures are
enabled on the user's phone or other device, unauthorized
access is unlikely. A user can also simply switch his Bluetooth
mode to "non- discoverable" and avoid connecting with other
Bluetooth devices entirely. If a user makes use of the
Bluetooth network primarily for synching devices at home, this
might be a good way to avoid any chance of a security breach
while in public.

20
Still, early cell-phone virus writers have taken advantage of
Bluetooth's automated connection process to send out
infected files. However, since most cell phones use a secure
Bluetooth connection that requires authorization and
authentication before accepting data from an unknown device,
the infected file typically doesn't get very far. When the virus
arrives in the user's cell phone, the user has to agree to open
it and then agree to install it. This has, so far, stopped most
cell-phone viruses from doing much damage. See How to learn
more.
Other problems like "blue jacking," "blue bugging" and "Car
Whisperer" have turned up as Bluetooth-specific security
issues. Blue jacking involves Bluetooth users sending a
business card (just a text message, really) to other Bluetooth
users within a 10-meter (32-foot) radius. If the user doesn't
realize what the message is, he might allow the contact to be
added to his address book, and the contact can send him
messages that might be automatically opened because they're
coming from a known contact. Blue bugging is more of a
problem, because it allows hackers to remotely access a user's
phone and use its features, including placing calls and sending
text messages, and the user doesn't realize it's happening.
The Car Whisperer is a piece of software that allows hackers
to send audio to and receive audio from a Bluetooth-enabled
car stereo. Like a computer security hole, these vulnerabilities
are an inevitable result of technological innovation, and device
manufacturers are releasing firmware upgrades that address
new problems as they arise.

21
If communications security is a concern of yours, then click
here to learn how phone conferencing securityworks. To learn
more about Bluetooth security issues and solutions, see
Bluetooth.com: Wireless Security.

5. BLUETOOTH IN ACTION

5.1 The Wireless Office

Imagine a modern day office with various hi-tech, yet common


electronic devices.
The first thing an office should have are the basic essentials: a
computer, keyboard, mouse, printer and phone. Next, lets say
there is a Headset that works with the phone.
Every device is connected, or is capable of being connected to
at least one other device. For example, the keyboard and
mouse have to connect to the computer and the PDA has the
option to connect to the computer.

Just imagine if all these devices


used cables to connect to one
another. The office would have
cables running everywhere and
we'd be left with a big, tangled
mess.
Now imagine all of these devices
use Bluetooth technology to
connect to one another instead.
The result: no more cables and
no more mess.

Suppose the Bluetooth enabled printer comes with a Bluetooth


Computer Adapter that plugs into the computer's universal
serial bus (USB) port. The company that manufactured the

22
printer and computer adapter programmed each device with
the same Bluetooth profiles.

Bluetooth profiles are used by devices to instruct them on how


to use the Bluetooth technology. Profiles define the
application(s) of Bluetooth technology.

After the printer is turned on, it transmits a signal, which looks


for a response from other Bluetooth enabled devices with the
same profile(s). Since the USB adapter shares the same
profile(s), it responds and a small network (AKA: Piconet) is
created.

Since this piconet is established between devices with the


same specific profiles, the signals sent by other devices with
different profiles, like the headset, will be ignored. All the other
Bluetooth devices in the room establish similar piconets that
are all separated from one another based on the specific
profile(s) they use.

Our "dream" office now has several different piconets


operating simultaneously, and each one knows which
Bluetooth devices to communicate with and which signals to
ignore.

5.2 Bluetooth Pairing

Bluetooth pairing occurs when two Bluetooth devices agree to


communicate with each other and establish a connection. In
order to pair two Bluetooth wireless devices, a password
(passkey) has to be exchanged between the two devices. A
Passkey is a code shared by both Bluetooth devices, which
proves that both users have agreed to pair with each other.

In order to find other Bluetooth devices, Bluetooth device A


must be set to discoverable mode. When set to discoverable,

23
Bluetooth device A will allow other Bluetooth devices to detect
its presence and attempt to establish a connection.

You may set your discover setting off if you like (It is
recommended that you turn it off when not using the
Bluetooth). When the discover setting is off, no other Bluetooth
device will be able to find it. Undiscoverable devices can still
communicate with each other but they have to initiate
communication themselves.

Bluetooth device A finds Bluetooth device B. Usually the


discoverable device will indicate what type of device it is (Such
as a printer, cell phone, headset, etc.) and its Bluetooth device
name. The Bluetooth device name is the name that you give
the Bluetooth device or the factory name that originally was
programmed.

Bluetooth Device A prompts you to enter a password


(PassKey). With advanced devices, both users must agree on
the Passkey and enter it into their device. The code can be
anything you like as long as it is the same for both Bluetooth
wireless devices. On other devices, such as Bluetooth
headsets, the Passkey stays the same. Refer to the product’s
manual for the default passkey. Most often , the passkey is
zero.
Bluetooth device A sends the Passkey to Bluetooth
device B
Bluetooth device B sends the Passkey back to
Bluetooth device A

24
If both Passkeys
are the same, a
trusted pair is
formed. This will
happen
automatically.
Bluetooth device
A and B are now
paired and able to
exchange data

25
)

A & B (Paired

B (Passkey)

A (Passkey)

5.3 Bluetooth Specification

26
➢ Bluetooth devices in a piconet share a common
communication data channel. The channel has a total
capacity of 1 megabit per second (Mbps). Headers and
handshaking information consume about 20 percent of this
capacity.
➢ In the United States and Europe, the frequency range is
2,400 to 2,483.5 MHz, with 79 1-MHz radio frequency (RF)
channels. In practice, the range is 2,402 MHz to 2,480 MHz.
In Japan, the frequency range is 2,472 to 2,497 MHz with 23
1-MHz RF channels and in Nigeria, the frequency range is
that same as that of the US.
➢ A data channel hops randomly 1,600 times per second
between the 79 (or 23) RF channels.
➢ Each channel is divided into time slots 625 microseconds
long.
➢ A piconet has a master and up to seven slaves. The master
transmits in even time slots, slaves in odd time slots.
➢ Packets can be up to five time slots wide.
➢ Data in a packet can be up to 2,745 bits in length.
➢ There are currently two types of data transfer between
devices: SCO (synchronous connection oriented) and ACL
(asynchronous connectionless).
➢ In a piconet, there can be up to three SCO links of 64,000
bits per second each. To avoid timing and collision

27
problems, the SCO links use reserved slots set up by the
master.
➢ Masters can support up to three SCO links with one, two or
three slaves.
➢ Slots not reserved for SCO links can be used for ACL links.
➢ One master and slave can have a single ACL link.
➢ ACL is either point-to-point (master to one slave) or
broadcast to all the slaves.
➢ ACL slaves can only transmit when requested by the master.

6.Comparison of Infrared, 802.11b RF and


Bluetooth

Infrared Bluetooth
*Cradle * Personal Cable
replacement, replacement
Personal
Cable * Mid range wireless
replacement
Data Exchange and
Network Access
Typical
* Short range (Requires time to
usage
wireless discover other
point-n-shoot Bluetooth devices in
Data the vicinity. Also, user
Exchange needs to identify
and Network which device he/she
Access wishes to connect to.)
* 115Kbps &
Bandwidt
4 Mbps, * 1 Mbps, shared
h
dedicated

28
Effective
* 115Kbps & * 700 Kbps, worse
Bandwidt
4Mbps due to interference
h
Other RF devices,
Interferen
None building material,
ce
equipment
Very secure
due to short
range and
Less Secure.
line-of-sight.
Built-in link level
No link level
authentication. More
security
difficult for traffic
Security protection,
sniffing. Still requires
requires
application level
application
authentication and
level
encryption.
authenticatio
n and
encryption.
Low Very
long battery
life due to
low power
Power High
consumption
consumpti Consumes more
and does not
on power than IR.
have
maintain a
constant
connection
Supportin * PDA, * Very few has it
g Devices laptop, cell built-in, require
phone and external H/W card
ragged * Very few
handheld
have it built-
29
in

* 100s of
millions
devices
User has to be within
Real-time
Requires 10 meters of an
network
user to walk access point. The
access
up to an user may
applicatio
access point inadvertently walk
n out of range.
Steps
requires Initial setup (bonding)
Plug-n-play,
to with the access point
point-n-shoot
connect required
to LAN
Range 1 meter 10 meter

7. Application of Bluetooth:

1) Wireless control of and communication between a


mobile phone and a hands-free headset. This
was one of the earliest applications to become
popular.
2) Wireless networking between PCs in a confined space
and where little bandwidth is required.
3) Wireless communication with PC input and output
devices, the most common being the mouse, keyboard
and printer.
4) Transfer of files, contact details,
calendar appointments ,and reminders
betweendeviceswith OBEX i.e. Object
30
Exchange technology.
5) Replacement of traditional wired
serial communications in test
Equipment, GPS receivers, medical equipment, bar code
scanners, and traffic control devices.
6) For controls where infrared was traditionally used.
7) Two seventh-generation game consoles, Nintendo's
Wii and Sony's
PlayStation 3, use Bluetooth for their respective wireless
controllers.
8) Dial-up internet access on personal computers or PDAs
using a data- capable mobile phone as a modem.

31
32
33