Sie sind auf Seite 1von 1

Paper11

- THE C ABLE REPLAC EMENT TEC HNOLOGY

PROMISING TOPIC <BLUE TOOTH>


BY

B.SHIVA KUMAR C HARY


ROLL NO.04B81A0488
ID:shiva_chary83@yahoo.com
&
M.SANDEEP KUMAR
ROLL NO.04B81A0474
ID:sanju_4742000@yahoo.co.in

DETAILS:
C ONTAC T NO.9912125432
BRANC H: ELEC TRONIC S AND C OMMUNIC ATIONS,3rd YEAR,
C VR C OLLEGE OF ENGINEERING,
IBRAHIMPATNAM,
R.R.DISTRIC T.

B.

ABSTRAC T:
Today, electronic gadgets that connect to one another are found everywhere--in the office, home,
C ar, etc. Keyboards connect to computers, MP3 players to headphones and so on. These devices
connect to each other usually with wires and cables. But, as the connection between the systems
increase, which is the need of the present day communication, wires and cables always result in a
tangled mess. Bluetooth is one of the solutions to form a cable-free environment.
Bluetooth technology is a short-range wireless radio technology that allows electronic devices to
connect one another. Generally, Bluetooth has a range of up to 30 ft. or greater.
This paper concentrates on the working of the Bluetooth technology (i.e.) the protocols and
profiles used in the application of this technology. And each protocol has been discussed in brief
and followed by discussion on Bluetooth pairing of two devices.
The next section of the paper explains its usage in the present day world with the help of a live
example which shows how this technology solves the problem created by using cable.
Lastly, the paper is concluded by giving the status of this technology in the upcoming days and
the expectations from it in the future.

NTRODUC TION:

Bluetooth is the name given to a new technology using short-range radio links, intended to
replace the cable(s) connecting portable and/or fixed electronic devices. It is envisaged that it will
allow for the replacement of the many propriety cables that connect one device to another with
one universal radio link. Its key features are robustness, low complexity, low power and low cost.

Bluetooth technology is how mobile phones, computers, and personal digital assistants (PDAs),
not to mention a broad selection of other devices, can be easily interconnected using a short-
range wireless connection. Using this technology, users can have all mobile and fixed computer
devices be totally coordinated.
Bluetooth wireless technology makes connections just like cables connect a computer to a
keyboard, mouse, or printer, or how a wire connects an MP3 player to headphones. With
Bluetooth there is no more worrying about which cable goes where, while getting tangled in the
mess.
WHY IT IS NAMED BLUETOOTH?
King Harald Bluetooth ruled Denmark between 940 and 985 A.D. Bluetooth was actually “Blåtand”
in old Viking language, which meant “dark complexion” — he had unusually dark hair for a Viking.
His legacy was that he brought C hristianity to Scan-dinavia and unified Denmark and Norway.
Ericsson hoped that the technology that bears Bluetooth’s name would similarly “unite” electronic
devices everywhere.
WORKING:
BLUETOOTH PAIRING:
Bluetooth pairing occurs when two Bluetooth devices agree to communicate with each other and
establish a connection.
In order to pair two Bluetooth wireless devices, a password (passkey) has to be exchanged
between the two devices. A Passkey is a code shared by both Bluetooth devices, which proves
that both users have agreed to pair with each other. This is the normal process that occurs with
Bluetooth pairing.
Bluetooth Specification Protocol Stack:The following is a diagram which shows the step by step
occurance of different protocols.

The major blocks in the above diagram are described briefly in the text to follow.
Bluetooth Radio
The Bluetooth Radio (layer) is the lowest defined layer of the Bluetooth specification. It defines
the requirements of the Bluetooth transceiver device operating in the 2.4GHz ISM band.
Frequency Bands and C hannel Arrangement
The Bluetooth radio accomplishes spectrum spreading by frequency hopping in 79 hops displaced
by 1 MHz, starting at 2.402GHz and finishing at 2.480GHz. In a few countries this frequency band
range is (temporarily) reduced, and a 23-hop system is used. In order to comply with out of band
regulations in each country. In both systems a guard band is used at the lower and upper band
edge.
Transmitter C haracteristics
Power C lasses: Each device is classified into 3 power classes, Power C lass 1, 2 & 3.
• Power C lass 1: is designed for long range (~100m) devices, with a max output power of 20
dBm,
• Power C lass 2: for ordinary range devices (~10m) devices, with a max output power of 4 dBm,
• Power C lass 3: for short range devices (~10cm) devices, with a max output power of 0 dBm.
The Bluetooth radio interface is based on a nominal antenna power of 0dBm
Modulation C haracteristics: The Bluetooth radio module uses GFSK (Gaussian Frequency Shift
Keying) where a binary one is represented by a positive frequency deviation and a binary zero by
a negative frequency deviation. BT is set to 0.5 and the modulation index must be between 0.28
and 0.35.
Receiver C haracteristics’
Sensitivity Level: The receiver must have a sensitivity level for which the bit error rate (BER)
0.1% is met. For Bluetooth this means an actual sensitivity level of -70dBm or better.
Interference Performance: The interference performance on C o-channel and adjacent 1 MHz and
2 MHz are measured with the wanted signal 10 dB over the reference sensitivity level. On all
other frequencies the wanted signal shall be 3 dB over the reference sensitivity level.
Out-of-Band blocking: The Out of band blocking is measured with the wanted signal 3 dB over the
reference sensitivity level. The interfering signal shall be a continuous wave signal. The BER shall
be less than or equal to 0.1%.
Intermodulation C haracteristics: The reference sensitivity performance, BER = 0.1%, shall be met
under the following conditions.
• The wanted signal at frequency f 0 with a power level 6 dB over the reference sensitivity level.
• A static sine wave signal at f 1 with a power level of –39 dBm
• A Bluetooth modulated signal at f 2 with a power level of -39 dBm
RSSI: Receiver Signal Strength Indicator: A transceiver that wishes to take part in a power-
controlled link must be able to measure its own receiver signal strength and determine if the
transmitter on the other side of the link should increase or decrease its output power level. A
Receiver Signal Strength Indicator (RSSI) makes this possible

Bluetooth baseband:
The Baseband is the physical layer of the Bluetooth. It manages physical channels and links apart
from other services like error correction, data whitening, hop selection and Bluetooth security.
The baseband also manages asynchronous and synchronous links, handles packets and does
paging and inquiry to access and inquire Bluetooth devices in the area. The baseband transceiver
applies a time-division duplex (TDD) scheme.
Physical C haracteristics
Physical C hannel :The channel is represented by a pseudo-random hopping sequence hopping
through the 79 or 23 RF channels. Two or more Bluetooth devices using the same channel form a
piconet. There is one master and one or more slave(s) in each piconet. The hopping sequence is
unique for the piconet and is determined by the Bluetooth device address (BD_ADDR) of the
master; the phase in the hopping sequence is determined by the Bluetooth clock of the master

A TDD scheme is used where master and slave alternatively transmit. The master shall start its
transmission in even-numbered time slots only, and the slave shall start its transmission in odd-
numbered time slots only.
Device Addressing: 4 possible types of addresses can be assigned to bluetooth units, BD_ADDR,
AM_ADDR, PM_ADDR & AR_ADDR
BD_ADDR: Bluetooth Device Address. Each Bluetooth transceiver is allocated a unique 48-bit
device address.
AM_ADDR: Active Member Address It is a 3-bit number. It is only valid as long as the slave is
active on the channel..
PM_ADDR: Parked Member Address It is a 8-bit member (master-local) address that separates
the parked slaves. The PM_ADDR is only valid as long as the slave is parked.
AR_ADDR: Access Request Address This is used by the parked slave to determine the slave-to-
master half slot in the access window it is allowed to send access request messages in. It is only
valid as long as the slave is parked and is not necessarily unique.
Packets
Packet Format: Each packet consists of 3 entities, the access code (68/72 bits), the header (54
bits) , and the payload (0-2745 bits).

• Access C ode: Access code are used for timing synchronization, offset compensation, paging and
inquiry.
• Header:The header contains information for packet acknowledgement, packet numbering for
out-of-order packet reordering, flow control, slave address and error check for header.
• Payload: The packet payload can contain either voice field, data field or both. It has a data field,
the payload will also contain a payload header.
C hannel C ontrol
Bluetooth controller operates in two major states: Standby and C onnection . There are seven
substates which are used to add slaves or make connections in the piconet. These are page, page
scan, inquiry, inquiry scan, master response, slave response and inquiry response .
The Standby state is the default low power state in the Bluetooth unit. Only the native clock is
running and there is no interaction with any device whatsoever. In the C onnection state, the
master and slave can exchange packet , using the channel (master) access code and the master
Bluetooth clock.
Link Manager Protocol (LMP)
The Link Manager carries out link setup, authentication, link configuration and other protocols. It
discovers other remote LM’s and communicates with them via the Link Manager Protocol (LMP). To
perform its service provider role, the LM uses the services of the underlying Link C ontroller (LC ).
The Link Manager Protocol essentially consists of a number of PDU (protocol Data Units), which
are sent from one device to another, determined by the AM_ADDR in the packet header. These
PDU's are used as response messages to other PDU's in a number of different procedures,
containing the opcode of the message that is being responded to.

Host C ontroller Interface (HC I) The HC I provides a command interface to the baseband controller
and link manager, and access to hardware status and control registers. Essentially this interface
provides a uniform method of accessing the Bluetooth baseband capabilities.The HC I exists
across 3 sections, the Host - Transport Layer - Host C ontroller
HC I Functional Entities
The HC I is functionally broken up into 3 separate parts:

HC I Firmware , is located on the Host C ontroller , (e.g. the actual Bluetooth hardware device).
The HC I firmware implements the HC I C ommands for the Bluetooth hardware by accessing
baseband commands, link manager commands, hardware status registers, control registers, and
event registers. The term Host C ontroller means the HC I-enabled Bluetooth device.
HC I Driver
HC I Driver which is located on the Host (e.g. software entity). The Host will receive asynchronous
notifications of HC I events, HC I events are used for notifying the Host when something occurs.
When the Host discovers that an event has occurred it will then parse the received event packet
to determine which event occurred. The term Host means the HC I-enabled Software Unit.
Host C ontroller Transport Layer (location: Intermediate Layers)
The HC I Driver and Firmware communicate via the Host C ontroller Transport Layer , i.e. a
definition of the several layers that may exist between the HC I driver on the host system and the
HC I firmware in the Bluetooth hardware. These intermediate layers, the Host C ontroller Transport
Layer, should provide the ability to transfer data without intimate knowledge of the data being
transferred.
The HC I provides a uniform command method of accessing the Bluetooth hardware capabilities.
The HC I Link commands provide the Host with the ability to control the link layer connections to
other Bluetooth devices. These commands typically involve the Link Manager (LM) to exchange
LMP commands with remote Bluetooth devices.
HC I Flow control is used in the direction from the Host to the Host C ontroller to avoid filling up the
Host C ontroller data buffers with AC L data destined for a remote device (connection handle) that
is not responding. It is the Host that manages the data buffers of the Host C ontroller. In addition a
number of different events are defined for the HC I layer. The events provide a method to return
parameters and data associated for each event. Similarly a large number of error codes have
been defined for the HC I layer. When a command fails, Error codes are returned to indicate the
reason for the error.
Logical Link C ontrol and Adaptation Protocol
The Logical Link C ontrol and Adaptation Layer Protocol (L2C AP) is layered over the Baseband
Protocol and resides in the data link layer. L2C AP provides connection-oriented and
connectionless data services to upper layer protocols with protocol multiplexing capability,
segmentation and reassembly operation, and group abstractions. L2C AP permits higher level
protocols and applications to transmit and receive L2C AP data packets up to 64 kilobytes in
length.
Two link types are supported for the Baseband layer : Synchronous C onnection-Oriented (SC O)
links and Asynchronous C onnection-Less (AC L) links. SC O links support real-time voice traffic
using reserved bandwidth. AC L links support best effort traffic. The L2C AP Specification is defined
for only AC L links and no support for SC O links is planned.
The L2C AP layer is based around the concept of ’channels’. Each one of the end-points of an
L2C AP channel is referred to by a channel identifier. C hannel identifiers (C IDs) are local names
representing a logical channel end-point on the device. The connection-oriented data channels
represent a connection between two devices, where a C ID identifies each endpoint of the channel.

L2C AP STATE MAC HINE defines the states, the events causing state transitions, and the actions to
be performed in response to events.

RFC OMM Protocol: The RFC OMM protocol provides emulation of serial ports over the L2C AP
protocol. The RFC OMM protocol supports up to 60 simultaneous connections between two
bluetooth devices. The number of connections that can be used simultaneously in a Bluetooth
device is implementation-specific. For the purposes of RFC OMM, a complete communication path
involves two applications running on different devices (the communication endpoints) with a
communication segment between them.
Service Discovery Protocol (SDP)
The service discovery protocol (SDP) provides a means for applications to discover which
services are available and to determine the characteristics of those available services.
A specific Service Discovery protocol is needed in the Bluetooth environment, as the set of
services that are available changes dynamically based on the RF proximity of devices in motion,
qualitatively different from service discovery in traditional network-based environments. The
service discovery protocol defined in the Bluetooth specification is intended to address the unique
characteristics of the Bluetooth environment.
SDP is a simple protocol with minimal requirements on the underlying transport. It can function
over a reliable packet transport (or even unreliable, if the client implements timeouts and repeats
requests as necessary). SDP uses a request/response model where each transaction consists of
one request protocol data unit (PDU) and one response PDU. However, the requests may
potentially be pipelined and responses may potentially be returned out of order.
SDP uses a request/response model where each transaction consists of one request protocol data
unit (PDU) and one response PDU. In the case where SDP is used with the Bluetooth L2C AP
transport protocol, only one SDP request PDU per connection to a given SDP server may be
outstanding at a given instant. In other words, a client must receive a response to each request
before issuing another request on the same L2C AP connection. Limiting SDP to sending one
unacknowledged request PDU provides a simple form of flow control.

The information about a service that is maintained by an SDP server is contained within a single
service record. The service record consists entirely of a list of service attributes. Each service
attribute describes a single characteristic of a service.
The whole point of the SDP is to allow bluetooth devices to discover what other bluetooth devices
can offer (what services). SDP allows this in various means. Searching means looking for specific
service, while Browsing means looking to see what services are actually being offered.
The Service Search transaction allows a client to retrieve the service record handles for particular
service records based on the values of attributes contained within those service records. The
process of looking for any offered services is termed browsing. In SDP, the mechanism for
browsing for services is based on an attribute shared by all service classes. This attribute is called
the BrowseGroupList attribute.
PROFILES: Bluetooth enabled devices must use and understand certain Bluetooth "profiles" in
order to use Bluetooth technology to connect to one another. These profiles define the possible
applications that a Bluetooth enabled device can support.
In order for one Bluetooth device to connect to another, both devices must share at least one of
the same Bluetooth profiles.
The profiles have been developed in order to describe how implementations of user models are to
be accomplished. Bluetooth profile structure and the dependencies of the profiles are depicted
below. A profile is dependent upon another profile if it re-uses parts of that profile, by implicitly or
explicitly referencing it. Dependency is illustrated in the figure: a profile has dependencies on the
profile(s) in which it is contained – directly and indirectly.

An Example of Bluetooth in Action: Imagine a modern day office with various hi-tech, yet
common electronic devices.
The first thing an office should have are the basic essentials: a computer, keyboard, mouse,
printer and phone. Next, lets say there is a Headset that works with the phone.
Now that we have all the basics, lets make this office a little more exciting by adding some fun
"toys", like a PDA, digital camera and MP3 player.
Every device is connected, or is capable of being connected to at least one other device. For
example, the keyboard and mouse have to connect to the computer and the PDA has the option
to connect to the computer.
Just imagine if all these devices used cables to connect to one another. The office would have
cables running everywhere and we'd be left with a big, tangled mess.
Now imagine all of these devices use Bluetooth technology to connect to one another instead. The
result: no more cables and no more mess.
Suppose the Bluetooth enabled printer comes with a Bluetooth C omputer Adapter that plugs into
the computer's universal serial bus (USB) port. The company that manufactured the printer and
computer adapter programmed each device with the same Bluetooth profiles.
Bluetooth profiles are used by devices to instruct them on how to use the Bluetooth technology.
After the printer is turned on, it transmits a signal, which looks for a response from other
Bluetooth enabled devices with the same profile(s). Since the USB adapter shares the same
profile(s), it responds and a small network (AKA: Piconet) is created.
Since this piconet is established between devices with the same specific profiles, the signals sent
by other devices with different profiles, like the headset, will be ignored. All the other Bluetooth
devices in the room establish similar piconets that are all separated from one another based on
the specific profile(s) they use.
Our "dream" office now has several different piconets operating simultaneously, and each one
knows which Bluetooth devices to communicate with and which signals to ignore. It is highly
unlikely that any two piconets will interfere with one anther because each is changing its
frequencies all of the time.
The following are the various electronic gadgets that use Bluetooth technology:
Bluetooth GPS receiver, Bluetooth stereo receiver, Bluetooth carkit are the gadgets left to right.

ADVANTAGES:
Following are the advantages of this over other modes of transmitting data.
1. Bluetooth Devices are Wireless, 2. Bluetooth Technology is Inexpensive, 3. Bluetooth is
Automatic, 4. Standardized Protocol = Interoperability, 5. Low Interference 6. Low Energy
C onsumption, 7. Share Voice and Data 8. Instant Personal Area Network (PAN), 9. Upgradeable.
List of applications
More prevalent applications of Bluetooth include:
àWireless control of and communication between a cell phone and a hands-free headset or car
kit. This was one of the earliest applications to become popular.
àWireless networking between PC s in a confined space and where little bandwidth is required.
à Wireless communications with PC input and output devices, the most common being the mouse,
keyboard and printer.
àTransfer of files between devices with OBEX.
àTransfer of contact details, calendar appointments, and reminders between devices with OBEX.
àReplacement of traditional wired serial communications in test equipment, GPS receivers,
medical equipment and traffic control devices.
àFor controls where infrared was traditionally used.
àSending small advertisements from Bluetooth enabled advertising hoardings to other,
discoverable, Bluetooth devices.
à Wireless controllers of game consoles—Nintendo Wii[1] and Sony PlayStation 3 use Bluetooth
for their wireless controllers

A typical Bluetooth mobile phone headset

A notebook Bluetooth card (14×36×4 mm)

A typical Bluetooth USB dongle (BC M2045A), shown here next to a metric ruler

Bluetooth vs. Wi-Fi in networking


Bluetooth and Wi-Fi both have their places in today’s offices, homes, and on the move: setting up
networks, printing, or transferring presentations and files from PDAs to computers.
Bluetooth
Bluetooth is in a variety of new products such as phones, printers, modems, and headsets.
Bluetooth is acceptable for situations when two or more devices are in proximity to each other
and don't require high bandwidth. Bluetooth is most commonly used with phones and hand-held
computing devices, either using a Bluetooth headset or transferring files from phones/PDAs to
computers.
Bluetooth also simplified the discovery and setup of services. Wi-Fi is more analogous to the
traditional Ethernet network and requires configuration to set up shared resources, transmit files,
set up audio links (for example, headsets and hands-free devices), whereas Bluetooth devices
advertise all services they actually provide; this makes the utility of the service that much more
accessible, without the need to worry about network addresses, permissions and all the other
considerations that go with typical networks.
Wi-Fi
Wi-Fi uses the same radio frequencies as Bluetooth, but with higher power consumption resulting
in a stronger connection. As mentioned earlier, Wi-Fi is sometimes, but rarely, called "wireless
Ethernet." Although this description is inaccurate, it provides an indication of Wi-Fi's relative
strengths and weaknesses. Wi-Fi requires more setup, but is better suited for operating full-scale
networks because it enables a faster connection, better range from the base station, and better
security than Bluetooth.[citation needed]
One method for comparing the efficiency of wireless transmission protocols such as Bluetooth and
Wi-Fi is spatial capacity, or bits per second per square meter.

Unwire your life


With the Bluetooth feature turned on, your Mac can perform a file transfer or synchronization.
From the Bluetooth menu, you can choose to send a file or browse a device, simply and quickly.
Or click the Sync button in iSync to update your mobile phone or Palm OS handheld. For extra
security, you can stipulate that only trusted devices talk to your Mac, and 128-bit over-the-air
encryption is also available.

Your Mac and your GSM/GPRS mobile phone with Bluetooth technology make each other more
useful. Using iSync, you can keep your phone updated with your contacts’ numbers without
having to type in their info on a tiny keypad. Keep the information in the more manageable
Address Book on your Mac instead. Address Book also lets you send SMS messages over your
mobile phone, and will display SMS messages from your phone on your Mac. You can also use
your Mac to respond to voice calls.
Use your Bluetooth-enabled Mac to print document and digital images to a select printer that
supports Bluetooth technology.(2) Or use a Bluetooth headset to talk to your friends and
colleagues during an iC hat AV session.(3)

Your Mac can also use Bluetooth technology to communicate with your Palm OS handheld, like the
Tungsten T3. You can perform a HotSync operation without cables. Or send your business card or
calendar events directly to a colleague’s handheld — using Bluetooth technology. The standard
vC al and vC ard formats let this work on both Palm and PocketPC handhelds with Bluetooth
technology.

And for a whizzy trick that’s sure to impress, send an instant iC ard with your own image taken by
your mobile phone. Use a camera phone such as the Nokia 6600 or the Sony Ericsson P800 to
take pictures, download them to your Mac over a Bluetooth connection, create an iC ard, then
send it using your phone’s GPRS connection.

The Apple Wireless Keyboard and Apple Wireless Mouse use Bluetooth technology to free you and
your Mac from the physical restraints of tethering cables and crowded peripheral ports.
Apple’s Bluetooth implementation is the latest in a series of bold strategic moves that have
caused tectonic shifts in the computer industry — and greatly benefited customers. Apple
established USB as the standard peripheral interface with the launch of the first iMac in 1998.
Then Apple established the 802.11 wireless networking standard with the launch of the iBook and
AirPort in 1999. In 2003 Apple launched AirPort Extreme, based on the new 802.11g high-speed
wireless technology. Now Bluetooth further strengthens the dominant position of the Mac in
wireless communications, preserving Apple’s reputation for being first to market with innovative
technology integrated right into the operating system.
Mac OS X lets you wirelessly transfer files between computers — even Mac to PC — using the
Bluetooth File Exchange utility. It’s even possible to browse selected devices and retrieve files
remotely. Apple recommends the use of AirPort and AirPort Extreme for wireless networking,
however, for anything but the smallest files.

Future expectations:
According to the statistics of global Bluetooth chipset shipment forecast the usage of Bluetooth
technology has increased drastically from 28million units in the year2002 to 500 million units in
the year 2006. These figures above project a rosy picture of the future of Bluetooth and may
suggest that as more manufacturers adopt Bluetooth and design technology that supports it,
developers will find new and previously unimagined ways of applying its power. We foresee that
Bluetooth, with all its advantages possesses the power to blur boundaries between home, work
and the outside world.
When technology becomes intertwined in our lives, we begin to expect more and more from it.
We applaud the functions Bluetooth currently serves. However, as greediness gets the better of
us, we begin asking for more. Below are some functions we hope, Bluetooth will provide, in time
to come.

1) We would love it if Bluetooth could turn into a multifunctional remote that could control switches
at home or alert a user when the laundry is done. You can remain a couch potato all day and let
the bluetooth enabled remote control do the work at home.

2) How would you like it if you could purchase the movie tickets of your choice straight from your
bluetooth enabled mobile phone? We could probably head towards an era where we could link our
mobile phones to a ticketing kiosk and buy movie tickets over Bluetooth.
C onclusion: We firmly believe that despite challenges and problems encountered by Bluetooth, it
will continue to exist in years to come as it develops and spreads its use and opens doors to
exciting and liberating futures. Regardless of whether you want to use it to transfer the picture of
your pet dog from your personal computer to your mobile phone or use it in business
organizations, Bluetooth is definitely a valuable technology that precedes over infra-red.
GET YOUR BLUETOOTH TODAY!

C ollected and C reated by youtrick.com .....

Das könnte Ihnen auch gefallen