Posted by : Unknown Saturday, June 29, 2013

Blue Tooth
1. INTRODUCTION

      
            The idea that resulted in the Bluetooth technology was born in 1994. Ericsson Mobile communications initiated a study to investigate the feasibility of a low-power, low-cost radio interface between Mobile Phones
And their accessories. The aim was to eliminate cables between Mobile Phones and PC cards, headsets and Desktop devices etc.

            In February 1998, five companies, Ericssion, Nokia, IBM, Toshiba and Intel formed a Special Interest Group (SIG). The group contained the Mix of business areas –two market leaders in Mobile Telephony, to market leaders in Laptop computing   and a market leader in core digital – signal-processor technology. It’s important to surround yourself with the right kind of people. That is a fact that even old Herald knew.
           
                In this Electronic era, the devices used by us are rapidly growing. We  are  using  several  wires  to  supply power,  to  connect  user  interfaces, to connect each other. There will be no problem until we shift them from one place to another. Bluetooth wireless technology – the technology that propels you into a new dimension in wireless connectivity.

            Bluetooth   is  a  new  standard  developed  by  a  group  of  electronics manufacturers,   that  will  allow   any  sort  of   electronic   equipment   from
Computers and cell phones to keyboards and headphones- to make its own connections without wires, cables or any direct action from user.

        Why the name Bluetooth is given to this technology?               Answers is      “Herald Bluetooth was the 10 th century Viking King who gave name to our technology. Herald Bluetooth was king of   Denmark   in the 10th century. He unified Denmark and part of Norway into a single kingdom, and then introduced Christianity into Denmark.   But he was killed in 986 during battle with his son.   Choosing  this  name  for  this  standard indicates  how  important  companies   from Baltic region  ( nations including Denmark,   Sweden,    Norway  and   Finland  )  are  to  the   communications industry, even if it says little about the way the technology works”.

2. NEED FOR BLUETOOTH

    There are already a couple of ways to get around wires. They are
1.       Beams of light in the infrared spectrum.
2.       Cable synchronization.

INFRARED

   It is used to connect some    computers with peripheral devices. For most of these computer and entertainment purposes, infrared is used in a digital mode. The signal is pulsed on and off very quickly to send data from one point to another.   Infrared communication are fairly reliable and don’t cost very much to build into a device.  Reliable  means  interference  between devices is uncommon because infrared  transmitters and receivers have to be lined  up  with  each  other  and  we  can  make  sure  a  message  goes only to intended recipient, even in a room full of infrared receivers.

Drawbacks with infrared communications are

  1. Infrared is a “line of sight “technology.  For example we have to        point the remote control at the TELEVISION or DVD player to make things happen.

2. Infrared is a “One –To –One” technology.  For  example  we  can send       data   from   our  PC  to  out  LAPTOP,  but  not  to  both LAPTOP and PDA at the same time.

CABLE SYNCHRONIZATION

           In synchronization, we attach PDA to out computer (usually with a cable),
Press a button and make sure that the data on PDA and the data on  the computer match. Its technique that makes the PDA a valuable tool for many people but synchronizing the PDA with the PC and making sure we have the correct cable or cradle to connect these two can be real hassle.


          Bluetooth intended to get around the problems that come with both Infrared and Cable synchronizing system. 
3. BASICS

                          Wireless     technology    is    growing    today  .    We     know    about
 WPANs, WLANS and WWANs.

·         WPANs, such as Bluetooth Pico nets provide short-range connectivity for devices such as Laptops, PDSs,CELL phones and even PCs in a network with small geographical spread and support low data rates and limited ranges to  achieve low cost and minimal power drain.

·         WLAN, such as 801.11 Wireless Ethernet provides higher speed and longer range in office buildings and homes.

·         WWANs, such as Cellular Networks works over large area but offer much lower data rates than WPANs and WLANs.

 Bluetooth is intended to be a standard that works at 2 levels.

1.       At  physical level - Bluetooth is a radio frequency standard.

2.  In  next  level -  products  have  to  agree on  when  bits are sent, how   many  will be sent at a time and how the parties in a conversation can be sure that the message received is the same as message sent.

         To communicate   peripherals,   telephones and   computers “Bluetooth radio” is used instead of wires.

From the users’ point of view, there are 3 important features in Bluetooth.

1.       It is wireless. When he/she travels he won’t have to worry about     keeping track of a brief case full of cables to attach all components.

                                                                                   
2. It is inexpensive. Manufacturers think that it will add about $20                        per device.
3.   No need to think of it. Bluetooth don’t require doing any thing special to make it work. The devices find one another and strike up a conversation.

        When any two devices want to talk to each other, they have to agree on  a number of points before the conversation begins.

1.       The first point of agreement is physical, will they talk over wires or through some form of wireless signal.

2.       The second point is type of communication, i.e. information can be sent one bit at a time in a scheme called Serial Communication or in group of bits in

3.       scheme called Parallel Communication. For example, a PC uses both serial and parallel communications to talk to different devices. Modems, mice, Keyboards are tending to use serial links, while printers tend to use parallel links.

                All parties in a electronic conversation need to know what the bits mean and whether the message they received is same of message that was sent. In most cases this means developing a language of commands and responses known as protocol. Some products have standard protocol used by virtually all companies so that the commands for one product will tend to have the same effect on another. Modems fall into this category. Other product types each speaks in their own language, which means commands intended for one specific product will seem gibberish if received by another. Printers are like this with multiple standards like PCC and POSTSCRPT.

                Computer and Entertainment systems manufacturers realized that to setting up computers and home entertainment systems they need more wires, so it  is very difficult to setup. In order to make home electronics friendly, we need some better way for all the electronic parts of our modern life to talk to each other. That is where Bluetooth comes in.


4.HOW BLUETOOTH WORKS?

4.1. AVOIDING INTERFERENCE

Bluetooth devices sent out very week signal of 1 milli watt. By comparison the most powerful cell phones can transmit a signal of 3 watts. The low power limit range of Bluetooth device to about 10 meters, cutting the chances of interferences.

With many different Bluetooth devices in a room, they wont interfere with one another. Why because, it is unlikely that several devices will be on the same frequency at the same time because Bluetooth uses a technique called Frequency Hopping Spread-Spectrum (FHSS)

In this technique a device will use 79 individual randomly chosen frequencies with in a designated range, changing from one to another on a regular basis. Transmitters changes frequencies 1600 times every second. Since every Bluetooth transmitter uses FHSS, it is unlikely that 2 transmitters will be on the same frequency at the same time. This same technique minimizes the risk that portable phones or baby monitors will disrupt Bluetooth devices since any interference on  a particular frequency will  lose only a tiny fraction of a second.

FHSS is designed to tradeoff bandwidth efficiently for reliability, integrity and security. FHSS uses a narrow band carrier that changes frequency in a pattern known  to both transmitter and receiver.

4.2.BLUETOOTH NETWORKS 
          Two possible networks exist in Bluetooth. They are:
                1. Pico net.
   2. Scatter net.

When we bring Bluetooth radios with in range of each other, an electronic conversation will take place to determine whether they have data to share or whether one need to control one another. Once the conversation has started the devices form a network i.e. Pico net. One unit becomes a MASTER and other as SLAVE. The master controls all the traffic in the Pico net. Bluetooth radios in a Pico net frequency-hop together.

   Scatter nets occur when multiple masters exists in range of each other. A master radio may also be a slave radio on another Pico net. Each Pico net is hopping with a different sequence sharing the same 2.4 GHz band. Because different hopping sequences, there is very little chance that any master will hit a channel at the same time as another master.xx
 4.3. BLUETOOTH RADIO STATES
           
     Radios in a Pico net can be in one of six states.
                     
1.       OFF – It means initial state. There is no connection for LMP.
2.       STANDBY – Radio is waiting to join in  a Piconet.
3.       INQUIRE – Radio seeking other radios to connect.
4.       PAGE – Master radio asking to connect to a specific radio.
5. CONNECTED – Radio active on a Piconet as a master, slave or simultaneously. 
6.       PARK/HOLD – When there is no work for a radio if states its position and waits for messages. This state is called Park state. In this state it consumes least power.

         Hold state consumes more power than park state. This state occurs when they  prepared to send messages. It won’t tell to the Piconet about its state for some time.

5.EXAMPLE

          If there is an Entertainment system with Stereo, DVD player, a Satellite TV receiver and a TV, a Cordless phone and a PC. Each of these systems uses Bluetooth and each forms its own Piconet to talk main unit and peripherals.

          The Cordless telephone has one Bluetooth transmitter in the base and another in the handset. The manufacturer has programmed each unit with an address that falls into a range of addresses, it has established for a particular type of device. When  the base is turned on, it sends radio signals asking for a response from any units with an address in the range, it responds and a tiny network is formed. Even if one of other devices receives a signal from another system, it will ignore it since it is not corresponding to it. In the similar way Computer and Entertainment system go through similar routines and establishes network among them. Each Piconet hops randomly through the available frequencies. So all  of the Piconets are completely separated from one another.

          Each Piconet hops separately so it is rarely occurred that two Piconets on same frequency, if happens interference will be for tiny of time.

           Communication may be in one (Asynchronous) or in both directions (synchronous). Example for an asynchronous communication is speakerphone and Synchronous communication is regular telephone handset.

                                                                                                 
           Bluetooth can send data at more than 64 kbps in a Synchronous link, a rate high enough to support several human voice conversation. Bluetooth can transmit 721 kbps in one direction with 57.6 kbps in the other. If the user calls for the same speed in both directions a link with 432.6 kbps  capacity in each direction can be made.
6.BLUETOOTH SPECIFICATIONS
1. Devices in a Piconet share a common communication data channel. It has total capacity of 1 Mbps. 2. In USA &Europe frequency range is 2400 – 2483.5 MHz with 79 1MHz RF channels.                 
3. In Japan the range is 2472 – 2497 MHz with 23  1MHz RF channels.
4. A data channel hops 1600 times per second between 79 (or 23) RF channels.
 5.Each channel is divided into time slots 625 micro seconds long.
 6. A Piconet can have a master and 7 slaves. The master transmits in even time slots and slaves in  odd time slots.                       
7.Packets can up to 5 time slots wide.
8.Data in a packet can be up to 2745 bits in length
9.There may be 2 types of transfers between devices:
a. SCO (Synchronous connection oriented)
b. ACL (Asynchronous connection less)
10.In a Piconet there can be up to 3 SCO links of 64 kbps                                                each. To avoid timing and collision problems, the SCO links use reserved slots setup by the master.
11. Master can support up to 3 SCO links with 1,2 or 3   slaves.
12.  Slots not reserved for SCO links can be used for ACL links.
13. One master and slave can have single ACL link.
14.  ACL is point-to-point or broadcast to all the slaves.
15.  ACL slaves can only transmit when requested by  master.
Frequency hops in the range 2400 – 2438.5 MHz at the rate of 1600 times per second

1,2,3 – SCO links – time slots were reserved
4,5,6,7 – ACL links – remaining slots

7.BLUETOOTH  PROTOCOL STACK

            The Bluetooth Special Interest Group (SIG) has developed the Bluetooth  specification version 1.0 Draft  Foundation that allows for developing interactive services and applications over interoperable radio modules and data communication protocols.
           Different applications may run over different protocol stacks. Nevertheless, each one of these different protocol stacks uses a common Bluetooth data link and physical layer. This figure shows the complete Bluetooth protocol stack as identified in the specification on top of which interoperable applications supporting the Bluetooth usage modules are build. Not all applications make use of all protocols shown here. Instead, applications run over one or more vertical slices from this protocol stack.
                                                                                                                               
          The main principle has been to maximize the reuse of existing protocols for different purposes at the higher layers, instead of re-inventing the wheel once again. The protocols re-use also helps to existing applications to work with the Bluetooth technology and to ensure the smooth operation and interoperability of these applications. So many applications developed can take immediate advantage of hardware  and software systems.

8.BLUETOOTH  PROTOCOL  ARCHITECTURE

                Bluetooth protocol stack can be divided into 4 layers according to their purpose including the aspect whether Bluetooth SIG has been involved in specifying these protocols.



     In addition to this Host Controller Interface (HCI), which provides access to Base band, Hardware status, Link manager and control registers? HCI can exist above L2CAP.

          Some protocols are (RFCOMM, TCS-BIN) are also developed by Bluetooth SIG based on other standards. Only core protocols are required by most of Bluetooth devices while rest of the protocols is used only as needed. Other protocols enable application to run over Bluetooth core protocols.

          Since Bluetooth specification is open and additional protocols (HTTP, FTP) can be accommodated in an interoperable fashion on top of the Bluetooth specific transport protocols or on the top of the application oriented protocols.

8.1. BLUETOOTH CORE PROTOCOLS
              
8.1.1. BASEBAND
      
          Base band and Link control layer enable the physical RF link between Bluetooth units forming a Pico net. This layer uses inquiry and paging procedures to synchronize the transmission hopping frequency and clock of different Bluetooth devices.
                 
          It provides 2 kinds of physical links with their packets, Synchronous Connection Oriented (SCO) and Asynchronous Connection Less (ACL), which can be transmitted in a multiplexing manner on the same RF links.  ACL packets can contain data only, while the SCO packets can contain audio or a combination of audio and data.  FEC and CRC error correction can be encrypted.


         ARCHITECTURE OF BLUETOOTH PACKET             

ACCESS CODE
POCKET HEADER
PAYLOAD

      72 BITS                                54 BITS                    0 – 2745 BITS
                
          Using access code slave compares data packets access code by comparing its internal code, otherwise it rejects it.


 8.1.2. AUDIO

          Audio data can be transferred between one or more Bluetooth devices making various usage models possible and audio data in SCO packets.  It directly routed to and from Base band and it does not go through L2CAP,  just by operating an audio link.


8.1.3. LINK MANAGER PROTOCOL

          It is responsible for link setup between Bluetooth devices.  This includes security aspects like authentication and encryption.

8.1.4. L2CAP


            It adapts upper layer protocols over Base band.  It thought to work is parallel with LMP in difference that L2CAP provides to the upper layer when the payload data is never sent at LMP massages.

          For Base band layer it supports SCO and ACL packets. L2CAP permits higher-level protocols and applications to transmit and receive L2CAP data packets up to 64 kbps lengths.

8.1.5. SDP

         Discovery services are crucial part of the Bluetooth framework.  Those services provide the basis for all the usage modules.  Using SDP, device information, services and the characteristics of services can be queried and after that, a communication between two or more Bluetooth devices can be established.

8.2 CABLE REPLACEMENT PROTOCOLS

8.2.1 RFCOMM

          This cable replacement protocol emulates RS-232 control and data signals over Bluetooth Base band, providing both transport capabilities for upper level services (OBEX) that use serial line as transport mechanism.


8.3. TELEPHONY CONTROL PROTOCOL

8.3.1. TELEPHONY CONTROL – BIN

          It is a bit-oriented protocol, defines the call control signaling for the establishment of speech and data calls between Bluetooth devices.

8.3.2. TELEPHONY CONTROL – AT COMMANDS

          Bluetooth SIG  has developed a set of AT commands by which a   Mobile phone and  Modem can be controlled in the multiple  usage models.  In  addition, the commands used for FAX services are also specified.
                                                                                                                                   

8.4. ADAPTED PROTOCOLS

8.4.1. PPP
          PPP is designed to run over RFCOMM to accomplish Point-to-Point connection.  PPP – networking is the means of taking IP packets to/from the PPP layer and placing them on the LAN.

8.4.2. TCP/UDP/IP

  These are the most widely used protocol family in the world.  TCP/IP stacks have appeared on numerous devices including printers, handheld computers and mobile handsets.
            Implementation of these standards in Bluetooth devices allows for communication with any other device connected to the Internet.

8.4.3. OBEX PROTOCOL
     This is to exchange objects in a simple and spontaneous manner.  OBEX, which provides the same basic functionality as HTTP but in a much lighter fashion, uses a client/server model and is independent of the transport mechanism and transport API, provided it realizes transport base.  OBEX provides model for representing objects and operations.  In addition OBEX protocol defines a folder listing objects, which is used to browse the contents of folders on remote devices.

8.4.4. Vcard / Vcal
     The specifications define the format of an electronic business card and personal calendar entries and scheduling information.  Vcard and Vcal are bit define any transport mechanism but only the format under which the data is transported.  SIF promote this for exchange of personal information under these well-defined and supported formats.

8.4.5. WAP

          WAP forum builds a wireless protocol specification that works across variety of wide-area wireless network technologies.  The goal is to bring Internet contents and telephony services to digital Cellular phones and other wireless terminals.  The idea of reuse is using existed upper layer protocols for WAP Application Environment (WAE).  This includes WML and WTA browsers that can interact with applications on the PC.  Building applications gateway which mediate between WAP servers and some other applications on the PC makes it possible to implement various hidden computing functionality, like remote control, data fetching from PC to handset.                                                          

9. BLUETOOTH USAGE MODELS

          Usage models are accompanied by a profile.  Profile defines the protocols and protocol features supporting a particular usage model.
  
9.1. FILE TRANSFER MODEL   

  This usage model offers the ability to transfer data objects from one device to another.  Object types includes .x1s, .ppt, .wav,.jpg and .doc files, entire folders or directories or streaming media formats.  It also offers a possibility to browse the contents of the folders on a remote device.

9.2. INTERNET BRIDGE

         Using this model, mobile phone or cordless modem acts as modem to PC, providing dial-up networking and fax capabilities without need for physical connection to PC.
                             
          The dial-up networking scenario of this usage model needs a two piece protocol stack.  AT-commands are needed to control the Mobile phone or modem and another (PPP over RFCOMM) to transfer payload data.

          The fax scenario has a similar protocol stack but PPP and the networking protocols above PPP are not used and the application software sends a fax mail directly over  RFCOMM.
 9.3. LAN ACCESS MODEL
           
          In this model multiple data terminals use a LAN Access Point (LAP) as a wireless connection to a LAN. Once connected, the DT’s operate as if it they were connected to the LAN via dial-up networking. The DT can access all of the services provided by the LAN.

 
 


9.4. SYNCHRONIZATION MODEL
          It provides a device-to-device (phone, PDA, computer etc) synchronization of the PIM (personal information Mgt) information, typically phonebook, calendar, message and note information. Synchronization requires business card, calendar and task information to be transferred and processed by computers, cellular phones and PDA utilizes a common protocol and format.
9.5. 3 IN  1 PHONE MODEL

          Telephone handsets built to this profile may connect to 3 different service providers.
1. Telephone may act as Cordless phone connecting to the Public   Switched Telephone Network (PSTN) at home or office.  This scenario includes making calls via a voice base station, making direct calls between 2 terminals via a voice base station and accessing supplementary services provided by an external network.
2.  Telephones can connect directly to other telephones for the purpose of acting as a “WALKIE-TALKIE” or handset extension.  This intercom scenario incurs no additional charges.
3.  The telephone may act as Cellular phone connecting to the Cellular    infrastructure and incurring cellular charges.
9.6. ULTIMATE HEADSET MODEL

          The headset can be wirelessly connected for the purpose of acting as a remote device’s audio input and output interface.  The headset increases the users freedom of movement while maintaining call privacy.

          Example is Headset used with a Cellular headset, Cordless headset, PC for audio input and output.

          The headset must be able to send AR-commands and receive result code.  This ability allows the headset to answer incoming calls and then terminate them without physically maintaining the telephone headset.
10. CONCLUSION
   Bluetooth wireless technology – The technology that propels you into a new dimension in wireless connectivity.  

            It is important to surround yourself with the right kind of people. Bluetooth is a new standard developed by a group of electronics  manufacturers, that will allow any sort of electronic equipment to  make it's own connections without wires, cables or any direct action  from user. It is a rapid growing technology that makes man easy to transfer his electronic equipments from one place to another.

   It is a technology that not yet completely developed. Hope this will be achieved very soon.

ACRONYMS

 ACL           :   Asynchronous Connection Less
 API             :  Application Programming Interface
 CRC           :   Cyclic Redundancy Check
 DT              :   Data Terminal

 FEC            :   Forward Error Correction

 FTP            :   File Transfer Protocol

 GAP           :   Generic Access Profile

 GOEP        :   Generic Object Exchange Profile

 HCI            :   Host Controller Interface

 HTTP        :   Hyper Text Transfer Protocol
 IP               :   Internet Protocol

 IrDA          :   Infrared Data Association

 IrMC         :   Infrared Mobile Communication

 LAN           :   Local Area Network

 LAP           :   LAN Access Point

 LMP          :   Link Manager Protocol

 L2CAP      :   Logical Link and Control Adaptation Protocol

 OBEX        :   Object Exchange Protocol

 PDA           :   Personal Digital Assistant

 PIM           :   Personnel Information Management

 PPP           :   Point-to-Point Protocol

 PSTN        :   Public Switched Telephony network

 RFCOMM:   Serial Cable Emulation Protocol

 SCO          :   Synchronous Connection Oriented

 SDAP        :   Service Discovery Application Protocol

 SDP           :  Service Discovery Protocol

 TCP           :  Transmission Control Protocol

 UDP          :   User Datagram Protocol
 TCS-BIN  :   Telephony Control Specification-Binary
 WAE         :  Wireless Application Environment

 WAP         :  Wireless Application Protocol

 WML        :  Wireless Markup Language



  

Leave a Reply

Subscribe to Posts | Subscribe to Comments

Blog Archive

- Copyright © Seminar Sparkz Inc -- Powered by Semianr Sparkz Inc - Designed by Shaik Chand -