Sie sind auf Seite 1von 14

SREE VISVESVARAYYA INSTITUTE OF

TECHNOLOGY & SCIENCE

CHOWDARPALLY, MAHABUBAGAR.

SVITS QUEST-2007

A PAPER PRESENTATION ON

IN

WIRELESS COMMUNICATIONS

AUTHOR

Syed Ishaq Ahmed

III Yr ECE

Sree Visvesvarayya Institute of Technology & Science

Mahabubnagar

Andhra Pradesh
EMAIL ID: Ish_Zero18@Yahoo.com

ABSTRACT:
technology. Specifically, the paper
The term Bluetooth refers to an open
will outline:
specification for a technology to
enable short-range wireless voice and • History of Bluetooth
data communications anywhere in the • What is Bluetooth;
world. • Bluetooth Architecture
• Protocols and Profiles
This paper provides a view about • Topology
the current status of wireless and • Security, Power Management
mobile & Quality of Services
technology, summarizes their current • Advantages, Applications &
state of development and describes Limitations.
the additional sources and guides us • Conclusion
to how to apply this particular • Reference.
technology.
One of our wireless technology i.e.
Bluetooth technology has been the Bluetooth which is helpful to
subject of considerable hyperbole people all over the world is given
over the last year. This paper will with a broad description about its
attempt to cut through the hype and features, applications and about its
provide a reality check on the current development.
state and future advancement of the

2
INTRODUCTION

Bluetooth is an open standard for HISTORY


wireless connectivity with supporters
 Bluetooth is the codename for a
mostly from the PC and cell phone technology specification for small form factor,
industries. Not surprisingly, it primary low-cost, low-power, short range radio links
between mobile PCs, mobile phones and other
marker is for data and voice transfer portable devices.
between communication devices and  A global specification for wireless
connectivity. Bluetooth is a cable replacement
PCs. In the way, it is similar in purpose technology that simplifies the interaction
to the IrDA protocol, Bluetooth, between people as well as machines.
 Technology born in 1994 by Ericsson
however, is a radio frequency (RI) Mobile Communications.
technology utilizing the unlicensed 2.5  Bluetooth SIG (Special Interest Group)
formed in Feb 1998
GHz industrial, scientific, and medical
 Founders - Ericsson, Nokia,
(ISM) band. Target applications include Intel, IBM, Toshiba.
PC and peripheral networking, hidden  Promoters - Lucent, Motorola,
3Com, Microsoft. (1 Dec 1999)
computing, and data synchronization  About 1883 SIG members. (13
such as for address bookstand Aug 2000)

calendars. Other applications could  Bluetooth legends. The technology is


include home networking and home named after:
 Harald II Blatand, 10th century
applications of the future such as smart Viking king from Denmark
appliances, heating systems, and  Loved to eat blueberries, no
entertainment devices. toothbrush at that time…..

3
WHY BLUETOOTH?
laminates the feasibility of using Ir
Bluetooth attempts to provide
DA for chidden computing, where the
significant advantages over other data
communicating devices are carboy
transfer technologies, such as Ir DA
but not visible to one another.
and Home RF, vying for similar
Due to its RF nature, Bluetooth
markets. Despite comments from the
is not subset to such limitations. In
Bluetooth SIG indicating that the
addition to wireless device
technology is complementary to Ir
connections up to 10m (up to 100 m if
DA it is clearly a competitor for PC-to
he transmitter’s power is increased),
peripheral connection, Ir DA is
devices used not be within line of
already popular in PC peripherals, but
sight and may even connect through
is severely limited by the short
walls or other nonmetal objects. This
connection distance of 1 m and the
allows for applications such as a cell
line-or-sight requirement for
phone in a pocket or a briefcase acting
communication. This limitation
as a modem for laptop or PDA.

4
SYSTEM ARCHITECTURE :

Bluetooth communication occurs in


the unlicensed ISM band at 2.4GHz.
The transceiver utilizes frequency
hopping to reduce interference and
fading. A typical Bluetooth device has
a range of about 10 meters. The
communication channel can support
both data (asynchronous) and voice
(synchronous) communications with a
total bandwidth of 1 Mb/sec.
The supported channel configurations
are as follows:

Max. Data Max. Data


Configuration Rate Rate
Upstream Downstream
3 Simultaneous 64 kb/sec X 64 kb/sec X 3
Voice Channels 3 channels channels
433.9
Symmetric Data 433.9 kb/sec
kb/sec
723.2
Asymmetric 57.6 kb/sec or
kb/sec or
Data 723.2 kb/sec
57.6 kb/sec

5
switching utilizing a polling access
scheme. An asynchronous link is
The synchronous voice channels are
referred to as an ACL (asynchronous
provided using circuit switching with
connection-less) link. A combined
a slot reservation at fixed intervals. A
data-voice SCO packet is also
synchronous link is referred to as an
defined. This can provide 64 kb/sec
SCO (synchronous connection-
voice and 64 kb/sec data in each
oriented) link. The asynchronous data
direction.
channels are provided using packet

BLUETOOTH TOPOLOGY
Introducing: The Piconet! as point-to-multipoint. In this case,
the channel (and bandwidth) is shared
Bluetooth devices can interact with among all the devices in the piconet.
one or more other Bluetooth devices There can be up to seven active slaves
in several different ways. The in a piconet. Each of the active slaves
simplest scheme is when only two has an assigned 3-bit Active Member
devices are involved. This is referred address (AM_ADDR). There can be
to as point-to-point. One of the additional slaves which remain
devices acts as the master and the synchronized to the master, but do not
other as a slave. This ad-hoc network have a Active Member address. These
is referred to as a piconet. As a matter slaves are not active and are referred
of fact, a piconet is any such to as parked. For the case of both
Bluetooth network with one master active and parked units, all channel
and one or more slaves. A diagram of access is regulated by the master. A
a piconet is provided in Figure 1. In parked device has an 8-bit Parked
the case of multiple slaves, the Member Address (PM_ADDR), thus
communication topology is referred to limiting the number of parked

6
members to 256. A parked device active and begin communicating in
remains synchronized to the master the piconet.
clock and can very quickly become
piconet(fig 1)

M Stands for Master And S stands for Slave

Introducing: The Scatternet!

7
You may be wondering what would
happen if two piconets were within the person in the neighboring cubicle

the same coverage area. For example, has a piconet consisting of a cell

you might have a piconet consisting phone, headset, and business card

of your cell phone and your PC, while scanner. A diagram is presented in
Figure 2 below.

a scatternet (fig 2)

Because the two piconets are so close, or slave. This is accomplished


they have overlapping coverage areas. through time division multiplexing. In
This scenario is provided for in the a scatternet, the two (or more)
Bluetooth specification and is referred piconets are not synchronized in
to as a scatternet. As a matter of fact, either time or frequency. Each of the
slaves in one piconet can participate piconets operates in its own frequency
in another piconet as either a master hopping channel while any devices in

8
multiple piconets participate at the scanned to your PC so that you will
appropriate time via time division have access to his business contacts
multiplexing. Returning to the information. Of course, this would
example, you may want to set up your have to be a mutually agreed upon
neighbor’s business card scanner to usage. This brings us to the next topic,
also transmit the information that is Bluetooth security.

Bluetooth Protocol Overview

Bluetooth specifications include modules can interface to the host


protocols [4] and profiles [5]. using different interfaces. However,
Protocols specify the workings of an all Bluetooth controllers should
individual component (RFCOMM or implement the Bluetooth Host
L2CAP, for example), while the Controller Interface (HCI).
profiles specify how a set of protocols
The Logical Link Control and
can be used for implementing a
Adaptation Protocol (L2CAP)
particular usage model. Profiles are
implements a second link-layer
important to have a common
protocol to address protocol
understanding of the protocol stack in
multiplexing, segmentation, and re-
order to promote interoperability of
assembly. L2CAP hosts a set of client
usage model implementations.
protocols. A couple of such protocols
The Link Management Protocol are the Service Discovery Protocol
(LMP), baseband, and radio are (SDP) and a serial cable emulation
typically implemented in the protocol called RFCOMM. Figure 1
Bluetooth hardware modules. These

9
summarizes the Bluetooth protocol
stack.

Figure 1: Summary of Bluetooth protocol stack

The L2CAP is a core component of the stack that contributes to the overall throughput that can
be achieved.

Power Consumption power, 1 mW radios (Class 3 radio


power). This gives Bluetooth
As acable-replacement technology, devices a range of about 5–10
it’s not surprising that Bluetooth meters. This range is far enough
devices are usually for comfortable wireless peripheral
battery-powered devices, such as communication but close enough
wireless mice and mobile phones. to avoid drawing too much power
To conserve power, most from the device’s power source.
Bluetooth devices operate as low-

10
Security

Security is a challenge faced by known as SAFER+ to authenticate


every communications standard. a device’s identity. The generic-
Wireless communications present access profile depends on this
special security challenges. authentication for its device-
Bluetooth builds security into its pairing process. This process
model on several different levels, involves creating a special link to
beginning with the security create and exchange a link key.
inherent in its frequency-hopping Once verified, the link key is used
scheme At the lowest levels of the to negotiate an encryption mode
protocol stack, Bluetooth uses the the devices will use for their
publicly available cipher algorithm communication.

11
SOME BLUETOOTH DEVICES:

Bluetooth I Pod WL MOUSE WL PRINTER WL HF EXT

BLUETOOTH MOBILE BLUETOOTH PEN DRIVE BLUETOOTH REMOTE BLUETOOTH PEN DRIVE

ADVANTAGES AND APPLICATIONS OF BLUETOOTH


capable of supporting one
Bluetooth can handle data and voice
asynchronous data channel and up to
simultaneously. It is capable of
supporting one between computers
three synchronous voice channels, or
and their connected units. Bluetooth is
one channel for both voice and data.
an open standard for wireless
This capability combined with adhoc
connectivity with supporters mostly
device connection and automatic
from the PC and cell phone industries.
service discovery make it a superior
Its primary market is for data and
solution for mobile devices and
voice transfer between
Internet applications.
communication devices and PCs. It is

12
Bluetooth finds applications in PC channels, or one channel for both
and peripheral networking , hidden voice and data. This capability
computing ,data synchronization for combined with adhoc device
address books and calendars, home connection and automatic service
networking and home appliances such discovery make it a superior solution
a s heating systems and entertainment for mobile devices and Internet
devices. Asynchronous data channel applications.
and up to three synchronous voice

LIMITATIONS OF BLUETOOTH

The main drawback of Bluetooth is its used for unidirectional data transfer. It
limited connection distance and less is perfectly adequate for file transfer
transmission speeds. It supports data and printing applications.
rates up to 780kb/s which may be

CONCLUSION
In the years to come, Bluetooth will
With-its relativelylow implementation
become a worldwide connectivity
costs, Bluetooth technology seems
among electronic devices, leading to
destined to dominate the electronic
applications unthinkable by today’s
landscape, as humans worldwide will
technological standards. Because the
be able to form personal area
radio frequency used is globally
networks with devices and completely
available, Bluetooth can offer fast and
simplify the way in which they
secure connectivity all over the world.
interact with electronic tools and each
other.

13
REFERENCES:

1. J.C. Haartsen et al. ,”The Bluetooth Radio System” IEEE pers.


Commum.,Feb.2000 .

2. “Bluetooth in Wireless Communications” IEEE Communications


Magazine June 2002

3. Bluetooth IEEE Microwave Magazine September 2002

14

Das könnte Ihnen auch gefallen