.

Sunday, January 6, 2019

Bluetooth Simulation

VIDYAVARDHINIS COLLEGE OF ENGINEERING AND TECHNOLOGY ELECTRONICS AND tele conference FINAL YEAR 2004-2005 A typography ON BLUETOOTH TECHNOLOGY PREPARED BY JANHAVI KHANOLKAR NAVEEN BITRA YASHESH MANKAD TABLE OF CONTENTS 1. INTRODUCTION 2. biography 3. WHAT IS BLUETOOTH? 4. BLUETOOTH SPECIFICATIONS 5. BLUETOOTH NETWORKS 6. HOW DOES BLUETOOTH WORK? 7. BLUETOOTH PROTOCOL STACK 8. BLUETOOTH credentials measure 9. APPLICATIONS 10. MERITS AND DEMERITS INTRODUCTION Blue tooth was origin exclusively(a)y conceived to interchange the blabbers nest of c competents typical in whatsoever PC circumscribeup at once and this remains a compelling folk finishing.However, as the Bluetooth taked it became clear that it would as well as en suitable a totally new vaneing paradigm, individualised Area Nedeucerks (genus Pans) With PAN technology a aimr go a counselling be able to organize a collection of privateised electronic products (their PDA, cell strait, laptop, desktop, MP3 p forge, etcetera ) to automati shouty work in concert. For instance the contact film director and calendar in the PDA, laptop, and desktop could all automatically synchronize whenever they ar at heart persona of severally early(a)). Over term PANs pull up stakes revolutionize the user sire of consumer electronics.Finally, Bluetooths dynamic nature go forth in either case revolutionize connectivity to the rest of the world. Bluetooth go out automatically disc all over cheats and usefulnesss close so functional servers, internet rise to place, printers etc. leave alone automatically become overt to a Bluetooth art wherever it is. fib Bluetooth is an open stipulation for ill-considered swear stockless voice and entropy communications that was originally let oned for pedigree rehabilitation in ain argona ne 2rking to figure out all over the world.By change regularize radio set communication mingled with each electrical thingamajigs, Bluetooth has pud dled the nonion of a personal Area Ne iirk (PAN), a harming of close range wireless network that looks set to revolutionize the way slew interact with the development technology beautify around them. In 1994 the initial determine for development of this technology started at Ericsson, Sweden. In 1998, Ericsson, Nokia, IBM, Toshiba, and Intel formed a Special amuse Group (SIG) to expand the concept and develop a quantity under IEEE 802. 15 WPAN ( radio set Personal Area Network ).In 1999, the introductory detailation was released and accepted as the IEEE 802. 15 WPAN precedent for 1Mbps networks. The Bluetooth SIG considers three basic scenarios The initial basic scenario is the personal credit pull Replacement ie. the wire replacement to connect a PC or laptop to its discernboard, mouse, microphone, and nonepad. It avoids the multiple short range wiring surroundings of straight offs personal computing arts. The arcsecond scenario is ad hoc networking of several diametrical users at actually short range in an atomic number 18a such as a conference room. The third scenario is to use Bluetooth as an AP to the wide argona voice and entropy services tolerated by the cellular networks, fit out fel upsetships or satellite wholees. Why the fall upon Bluetooth? The story of origin of name Bluetooth is interesting. Bnluetooth was the name of Harald Blaatand, 10th century Viking who unit of measuremented Denmark and Norway. When Bluetooth specification was introduced to public, a stone press clipping, erected from Harald Blaatands enceinte city Jelling was also pre moveed. This strange gondolaving was interpreted as Bluetooth connecting a cellular phone and a wireless nonepad in his pass.The picture was utilize to symbolize the deal in utilize Bluetooth to connect personal computing and communication twists. What is BLUETOOTH? pic augur1 Bluetooth frame blocks The Bluetooth system consists of a piano tuner unit, a radio link control unit, and a concomitant unit for link management and legions celestial pole interface functions ( shoot the breeze take to 1). The Host ascendence porthole (HCI) provides the means for a forces fraud to entree Bluetooth hardw be capabilities. For example, a laptop computer could be the host invention and a PC batting monastic pronounce inserted in the PC is the Bluetooth bend.All restraints from the host to the Bluetooth faculty and horizontalts from the module to the host go done the HCI interface. The communications communications communications communications protocol stack is above the radio and base exercise set hardware, disclosely residing in the Bluetooth unit and bustly in the host craft. A Bluetooth firmness of purpose brush off also be use as a one- attend toor architecture (embedded solution) where the natural covering resides to beguileher with the Bluetooth protocols in the alike hardware. In that brass, the HCI is not infallible. This is a feasible performance for simple thingumajigs such as accessories or micro servers.Requirements of Bluetooth technology If Bluetooth technology is to replace jobs, it fuel not be such(prenominal) more(prenominal) than expensive than a cable or nobody will vitiate it. Because Bluetooth technology is designed for peregrine ruses it essential be able to run on batteries. So it must be very impoverished power and should run on low voltages. It must also be lightweight and petite enough not to intrude on the design of sign up wandering thingamajigs such as cellular phones, handsets etc. It must be as reliable as the cable it replaces and also it must be resilient. Bluetooth impostures engage at 2. gigahertz in globally available, certify free philosophical system band, which obey a basic set of power and spiritual emission and hinderance specifications. THUS Bluetooth has to be very robust, as in that respect are many subsisting users and polluters of this shared spectrum. gum olibanum Bluetooth aims to be widely available, inexpensive, convenient, easy to use, reliable, weakened and low power. Specifications related with Bluetooth PARAMETER determine Frequency slog 2. 2. 4835 GHz Bandwidth of each channel 1MHz entropy rate 1 Mbps Frequency book hopping rate 1600 record hop per seconds Range of operation 10-100 meters Bluetooth system operates in 2. GHz Industrial Scientific Medicine (ISM) band. The direct band is divided into 1MHz spaced bring each signaling entropy at 1 Mbps so as to stupefy maximum available channel bandwidth with elect modulation scheme of GFSK (Gaussian Frequency stir up Keying). Using GFSK, a binary 1 give rise to a absolute oftenness deviation from the nominal flattop absolute absolute oftenness while binary 0 gives rise to a negative frequency deviation. After each packet near(prenominal) blinds retune their radio to a contrastive frequency, efficaciously hopping from radi o channel from radio channel.In this way Bluetooth thingamabobs use the whole of available ISM band and if infection is compromised by ruffle on one channel, the retransmission will unendingly be on a different channel. Each Bluetooth while slot lasts 625 microseconds enceinte rise to frequency hopping rate of 1600 record hop per seconds. Generally doodads hop once per packet. .For dour data transmission, particular users whitethorn fulfil multiple cartridge holder slots using the equal transmission frequency and so retardent instantaneous hopping rate to below 1600 hops/ sec. BLUETOOTH NETWORKS PICCONETS AND SCATTERNETThe Bluetooth network is called a piconet. In the simplest case it means that two devices are committed (see Figure 2a). The device that initiates the connector is called a rivet and the opposite devices are called slaves. The volume of Bluetooth applications will be point-to-point applications. Bluetooth unions are typically ad hoc connections, whi ch means that the network will be reared just for the authorized task and then dismantled later on the data transfer has been completed. A attain cigarette hurt simultaneous connections (point-to-multipoint) to up to s counterbalance slaves (see Figure2b).Then, however, the data rate is limited. one(a) device fag also be connected in two or more piconets. The set-up is called scatternet (see Figure 2c). A device apprise, however, provided be a professional person to one piconet at a time. uphold for hold, park, or sniff rule is necessary for a device to be part of the scatternet. In these styles a device does not actively move into in a piconet, leaving time for other activities such as participating in another(prenominal)(prenominal) piconet, for example. The predominate/slave roles are not necessarily icy and canful also be changed during the connection if, for example, the master does not switch enough esources to manage the piconet. cover/slave pommel is al so rented in the scatternet. obtain/slave switch support is not mandatory. Most of live Bluetooth death penaltys support piconets only. tear-to-multipoint support depends on the holdation Figure 2. Bluetooth piconet and scatternet scenarios a) floor-to-point connection amid two devices b) Point-to-multipoint connection between a master and three slaves c) Scatternet that consists of three piconets Modes of operation In connection state, the Bluetooth unit can be in several modes of operation.Sniff, hold, and park modes are used to save power or to free the capacity of a piconet active agent mode In the active mode, the Bluetooth unit actively participates on the channel. Sniff mode In the sniff mode, the duty roll of the slaves listen practise can be decreased. This means that the master can only start transmission in specified time slots. dungeon mode While in connection state, the ACL link to a slave can be put in a hold (possible SCO colligate are regular(a)-tempe red supported). In hold mode, the slave can do other things, such as scanning, paging, inquiring, or attending another piconet.Park mode If a slave does not need to participate in the piconet only excuse wants to remain synchronized to the channel (to participate in the piconet again later), it can encrypt the park mode. It gives up its active phallus conduct. Park mode is useful if in that location are more than seven devices that now and then need to participate in the said(prenominal) piconet. The parked slave wakes up on a regular basis to listen to the channel in order to re-synchronize and to check for b drivewaycast messages sent by the master.. FREQUENCY HOP blockG Bluetooth technology uses a frequency hopping technique, which means that any packet is patrimonial on a different frequency. In most countries, 79 channels can be used. With a fast hop rate (1600 hops per second), good interference protection is achieved. Another benefit is a short packet space. If some other device is jamming the transmission of a packet, the packet is resent in another frequency determined by the frequency scheme of the master. This scenario is depicted in Figure 3 where packets of device 1 (colored packets) and device 2 (banded packets) are trying to use the alike frequency.Note that this case only refers to situations where there are two or more simultaneous active piconets or a non-Bluetooth device using the same frequency in range. The error correction algorithms are used to correct the fault caused by jammed transmissions Figure 4. Three-slot and fin-slot long packets reduce overhead compared to one-slot packets. 220 s switching time after the packet is essential for changing the frequency. Subsequent time slots are used for transmitting and receiving. The nominal slot length is 625 (s.A packet nominally covers a angiotensin converting enzyme slot, plainly can be drawn-out to cover three or five slots, as depicted in Figure 4. In multi-slot packets the frequency remains the same until the entire packet is sent. When using a multi-slot packet, the data rate is higher because the headland and a 220 (s long switching time after the packet are needed only once in each packet. On the other hand, the robustness is reduced in a crowded environs the long packets will more in all likelihood be lost HOW DOES BLUETOOTH WORKS? Bluetooth devices create 4 basic States.They can be a Master (in control of a Piconet &8212 represented by a astronomical blue circle above), an diligent striver (connected and actively monitoring/participating on a Piconet &8212 medium orange circles), a Passive knuckle down (still logically part of a Piconet further in a low power, now and again monitoring but still synchronized, inactive, state &8212 medium aged circles), and understudy (not connected to a Piconet, episodicly monitoring for inquiries from other devices, but not synchronized with any other devices &8212 small white circles). IN IDEAL c onjure up Bluetooth devices initially know only most themselves and in this state they will be in secondary mode. standby is a inactive voice mode where a Bluetooth device listens on an fooling basis performing what are called inquiry and/or page Scans for 10 milliseconds out of every 1. 28 seconds to see if any other Bluetooth devices are feeling to communicate. Passive behavior is inherent to half(a) of Bluetooths states and is a tombstone machine to achieving very low power. In standby mode the Bluetooth devices occasional attention reduces power consumption by over 98%. While all of the Bluetooth devices in the same mode it is authorised to note that they are NOT synchronized or coordinated in any way.Thus they are all listening at different times and on different frequencies. pic Enquiry and page maps lead to connections dubiousness query is how a Bluetooth device learns virtually other devices that are within its range. In the illustration above Node A executes a rapscallion Function on the BT Inquiry ID and receives replies from other devices. Through these replies device A learns the explicit identity of these other devices (i. e. their unique Bluetooth device ID). During the Inquiry process device A incessantly b avenuecasts the knave direction using the reticent Inquiry ID which identifies it as as a paginate Inquiry.These broadcasts are spread across a standard pattern of 32 Standby radio frequencies which all devices in Standby mode monitor on an occasional basis. Over a duration of some seconds it is certain that every Standby device within range will harbor received the Inquiry summon even though they are not synchronized in any way. By pattern these nodes will respond with a standard FHS packet that provides their unique BT ID and their time graduation exercise. With these parameters the intercommunicate node can effect low latency synchronized connections.Node H (the continue circle above) illustrates how a Bluetoot h device can be programmed to remain anonymous (Undiscoverable in BT jargon). This is a user controlled feature that suspends Inquiry Scanning, and thus device As Inquiry Procedure cannot discover twisting B It is important to note that device H will continue to support Page Scanning however, and thus a users other personal devices (i. e. PAN) can penetrate this barrier by Paging directly to its unique Bluetooth ID. This is information that PAN devices can be configure to know and remember thus enabling private collaboration even when devices are undiscoverable.PAGING In its general form the Page command establishes a formal device to device link between a Master (the originator) and a knuckle down. Master/Slave connections in Bluetooth are referred to as a Piconet. To create the piconet device A broadcasts the Page command with the explicit device ID of the scar Slave (B in the illustration above) which was lettered earlier through an Inquiry Procedure. Further, this connection can be very low latency if the Inquiry data is new-fangled (and thus synchroneity can be accurate), but the process will plainly take longer if this is not the case.All Bluetooth devices and B will ignore this command as it is not anticipateed to them. When the device B replies, device A will head it an FHS packet back and advance it an Active particle Address in the Piconet. As an Active Slave device B will begin continuously monitoring for throw out commands from device A in synchronization with device As hopping pattern and clock offset. Further, standard Piconet activity continuously updates the clock offset data keeping the synchronization extremely accurate. Thus the Master and Slave states are not low power but exhibit very low doing latencies. EXPANDING A PICCONETThrough successive Page commands a Bluetooth Master can marry up to 7 Active Slaves. 7 is a hard limit as only 3 bits are allocated in Bluetooth for the Active Member Address (AMA) with 000 reserved for the Master and the remaining addresses allocated to Slaves. Practically, 7 is more than sufficient given Bluetooths crushed performance and dynamic configurability. Again, all Active Slaves to A continuously monitor for further commands addressed to them in synchronization with device As hopping pattern. PARKING pose is a implement that allows a Bluetooth Master to connect to an additional 256 devices. 56 is a hard limit as 8 bits are allocated in Bluetooth for the park Member Address (PMA). To Park a device the Bluetooth Master issues a Park command to an Active Slave and assigns it a PMA. This Slave then enters the Parked mode and surrenders its AMA. As a Parked Slave the device will revert to a passive mode and only monitor for commands on an occasional basis. The difference between Standby and Parked however is that the Slave will remain synchronized to the Masters hopping pattern and regularly update its clock offset. Thus this device can be reconnected at any time with a m inimum latency.BLUETOOTH PROTOCOLS communications protocols are needed to implement different visibilitys and usage models. Every visibility uses at least part of the protocol stack. In order to achieve interoperability between two Bluetooth devices, they both must have the same vertical profile of the protocol stack. Bluetooth Core Protocols Baseband and marry tame together enable a physical RF link between Bluetooth units forming a piconet. This layer is responsible for synchronizing the transmission-hopping frequency and alfilaria ofdifferent Bluetooth devices Whitepaper1, p. . Audio is routed directly to and from Baseband. Any two Bluetooth devices supporting audio can send and receive audio data between each other just by opening an audio link . Link Manager Protocol (LMP) is responsible for link set-up ( earmark and encoding, control, and negotiation of baseband packets) between Bluetooth devices and for power modes and connection states of a Bluetooth unit. Logical Link Control and Adaptation Protocol (L2CAP) takes care of multiplexing, reassembly, and variance of packets.Service Discovery Protocol (SDP) is needed when requesting device information, services, and the characteristics of other devices. Devices have to support the same service in order to establish a connection with each other. Cable Replacement Protocol RFCOMM emulates RS-232 signals and can thus be used in applications that were formerly implemented with a sequential cable (e. g. , a connection between a laptop computer and a mobile phone). Telephony Protocol Binary (TCS-BIN) de books the call control signaling for the establishment of destination and data call between Bluetooth devices.AT commands provide means for controlling a mobile phone or a modem. pick out Protocols OBEX (Object Exchange) is adopted from IrDA. It is a session protocol that provides means for simple and spontaneous objective lens and data transfer. It is independent of the transport mechanism and transpo rt Application Programming Interface (API). transmission control protocol/UDP/IP is defined to operate in Bluetooth units allowing them to communicate with other units connected, for instance, to the Internet. The TCP/IP/PPP protocol physical body is used for all Internet bridge circuit usage scenarios in Bluetooth 1. and for OBEX in upcoming adaptations. The UDP/IP/PPP configuration is available as transport for WAP. PPP in the Bluetooth technology is designed to run over RFCOMM to accomplish point-to-point connections. PPP is a packet-oriented protocol and must therefore use its serial mechanisms to convert the packet data be adrift into a serial data stream. The Wireless Application Protocol (WAP) stack can reside on top of RFCOMM (based on LAN Access pen) or on top of L2CAP (based on PAN Profile). The last mentioned reduces overhead and is believably to become the like solution for WAP over Bluetooth.Wireless Application environment (WAE) hosts the WAP browser environm ent. Dial up networking (DUN) profile protocol stack DUN profile is inside the Serial way Profile and therefore partly reuses the capabilities of the Serial Port Profile. For the DUN Profile, there are two device configurations (roles) Gateway (GW) is the device that provides access to the public network (typically mobile phones and modems) Data destination (DT) is the device that uses the dial-up services of the doorway (typically PCs) The DUN Profile needs a two-piece protocol stack and an SDP branch.PPP over RFCOMM is needed for transferring endureload data. AT commands are delivered over RFCOMM to control the modem (mobile phone). The application on top of the stack is either a driver application on a PC (data terminal) or the modem emulation on a phone (gateway). Bluetooth security conundrum identify All Bluetooth devices (master and slave) share a secret samara in a particular system. This key is used during the trademark and encryption process. This key is not trans fer over the channel but is quite an in-built by the manufacturer. AUTHENTICATIONAuthentication ensures the identity of Bluetooth devices. Authorization is a process of deciding if a device is allowed to have access to a specific service. User interaction may be undeniable unless the remote device has been mark as trusted. Usually the user an set authorization on/off to every remote device separately. Authorization everlastingly requires authentication. Authentication in Bluetooth is performed by an encryption engine which uses the SAFER+ algo. This algorithm requires the by-line material body to be encrypted or decrypted master address Master clock secret key shared by master and slave. A random number is generated by the encryption engine using various keys. This random number is encrypted by the master using the secret key. This number is also sent to the slave. The encrypted reply of the slave is compared with the master encrypted data. If it is a match then the slave is authentic. attach AND PAIRING Pairing is a occasion that authenticates two devices based on a common passkey, thereby creating a trusted relationship between those devices. An arbitrary but identical passkey must be entered on both devices.As long as both devices are paired, the pairing procedure is not demand when connecting those devices again (the existing link key is used for authentication). Devices without any input method, like headsets, have fixed passkeys. When two devices are linked with a common link the connection is called as hold fast. There are two types of bond Dedicated bonding Used to create and exchange a link key between two devices. General bonding Data over the link is available for higher layers. ENCRYPTION Encryption protects communication against eavesdropping.For example, it ensures that nobody can listen to what a laptop transmits to a phone. Encryption demands the following Negotiating encryption mode Negotiating key sizes-The key size could vary from 8 to 128 bits starting encryption Stopping encryption bail LEVELS A trusted device has been previously authenticated, a link key is stored, and the device is pronounced as trusted in the security database of a device. The device can access Bluetooth services without user sufferance. An untrusted device has been previously authenticated, a link key is stored, but the device is not marked as trusted. Access to services requires acceptance of the user. An unknown device means that there is no security information on this device. This is also an untrusted device. Security Level of go Authorization required Access is only granted automatically to trusted devices or untrusted devices after an authorization procedure (Do you accept connection from remote device? ). Authentication is always required. Authentication required The remote device must be authenticated earlier connecting to the application. Encryption required The link must be changed to encrypted before access ing the service.It is also possible that a service does not require any of these mechanisms. On the other hand, the application (service) might have its own user authentication mechanisms (a PIN code, for example). APPLICATIONS 1. Bluetooth in the fireside will finally eliminate most every cable related to consumer electronics (except power). Your PC, scanner, and printer will merely need to be within 10 meters of each other in order to work. Your PDA, digital camera, and MP3 romper will no longer need a docking fee station to transfer files or get the latest tunes (the exception will be to recharge, that power thing again).And, your home stereophony and other equipment will join the caller too. On the telephone front your cell phone will synchronize its address book with your PC and function as a handset to your cordless phone in the house (answering incoming calls to your home number and calling out on the cheaper land line too). Finally, even though its only 720Kbps, Bluet ooth is still pretty fine for wideband internet access since digital subscriber line and cable modems are typically throttled to nearly 384K anyway. Bluetooth access points could well be as ubiquitous as 56K modems in 2 or 3 years. . On the road much of your Bluetooth PAN goes with you. Even when your laptop is in your briefcase and your cell phone is in your pocket they will be able to collaborate to access e-mail. And, next extension cell phones featuring Bluetooth and General Packet wireless (GPR) technology will function as a wireless modems with internet access at 100Kbps+. With such performance it is likely web based e-business will roll and these devices will become the most habitual Bluetooth access points.This may well be the Killer App that ensures Bluetooths widespread adoption and success. When you are literally on the road your car will join your PAN too. Here your cell phone may operate in a hands free mode using the car audio system and an in-dash microphone even while comfortably in your pocket. Or you may use a wireless Bluetooth headset instead. And, your MP3 player will likely play music in 8 vocalizer surround sound, rip music justifiedly off of an FM broadcast, or record your phone calls for later review. And all without wires restore land line access points (supporting up to 720Kbps) such as a pay phone in the airport terminal or lounge, or the desk phone in your hotel, will provide true broadband access in these strategic locations. to a fault look for the pay phone to evolve to compete for your cell phone calls too with its low cost land lines. In the world of deregulation and open controversy future smart phones may even put your calls out for bid and channel the traffic over the carrier crack the lowest cost 3. Telephone applications manpower free use File synchronization Calendars Contact management Land line I/F for voice and data 4. Consumer applications File transfer MP3 Digital pictures encircling(prenominal) c onnectivity Keyboard/mouse/remote Printer ADVANTAGES 1. Point to point and point to multiple links 2. Voice and data links 3. thick(p) form factor 4. Low power 5. Low cost 6. Robust frequency hopping and error correction 7. Profiles ensure application level 8. High level of security through frequency hopping, encryption and authentication 9. Non directional 10. Unlicensed ISM band LIMITATIONS 1. 8 Devices per piconet with limited extension via scatternet 2.Short range 3. No handover facility 4. Maximum data rate of 723. 2 Kb/s 5. occupies the crowded ISM band 6. ho-hum connection setup References Bluetooth 1. 1 &8212Jenifer let loose Wireless Communication -Krishnamurthy Bluetooth Specifications, Bluetooth SIG at http//www. bluetooth. com Bluetooth Protocol Architecture v1. 0, Riku Mettala, Bluetooth SIG, August 1999 http//www. bluetooth. org/foundry/sitecontent/ scroll/whitepapers_presentations Bluetooth Security Architecture, Thomas Muller, Bluetooth SIG, July 1999 http/ /www. bluetooth. rg/foundry/sitecontent/ inventory/whitepapers_presentations Comprehensive Description of the Bluetooth System v0. 9p, Dan Sonnerstam, Bluetooth SIG, whitethorn 1998 http//info. nsu. ac. kr/cwb-data/data/ycra2/comprehensive_description_of_the_BT_system. pdf Bluetooth Technology Overview, version 1. 0, April 2003 http//forum. nokia. com &8212&8212&8212&8212&8212&8212&8212 pic Digital Camera Computer scanner Home Audio System MP3 musician PDA Cell address operable States Master Active Slave Parked Slave* Standby* ON THE channel Laptop PDA Cell Phone MP3 Player Headset Hotel Phone &038 Access Point

No comments:

Post a Comment