Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Bluetooth, RFID and WiMAX Technologies
1.
2. What is Bluetooth
Bluetooth is a wireless technology used to transfer data between
different electronic devices. The distance of data transmission is small in
comparison to other modes of wireless communication. This technology
eradicates the use of cords, cables, adapters and permits the electronic
devices to communicate wirelessly among each other.
Bluetooth is a high-speed, low-power microwave wireless link
technology, designed to connect phones, laptops, PDAs and other
portable equipment together with little or no work by the user.
3. History Of Bluetooth:
• Bluetooth was invented in 1994 by Ericsson. The company
later started working with a larger group of companies
called the Special Interests Group, or "SIG," to develop
the technology into what it is today. Bluetooth is not
owned by any one company and is developed and
maintained by SIG.
The name Bluetooth came from a code
name originally used by SIG for the
project and is a reference to a 10th
century Danish king named Harold
Bluetooth, who was responsible for
uniting Norway, Sweden, and Denmark
4. Bluetooth Technology
• It comprises of a base band processor, a radio and an antenna. Bluetooth
uses FHSS to avoid any interference. A Bluetooth channel is divided into
time slots each 625 micro second in length. The devices hop through these
timeslots making 1600 hops per second. This trades bandwidth efficiency
for reliability, integrity and security
• The radio uses Frequency Hopping to spread the energy across the ISM
spectrum in 79 hops displaced by 1MHz, starting at 2.402GHz and
stopping at 2.480GHz.
5. Bluetooth Technology
Documentation on Bluetooth is divided into two sections, the Bluetooth
Specification and Bluetooth Profiles.
•The Specification describes how the technology works (i.e. the
Bluetooth protocol architecture),
•The Profiles describe how the technology is used (i.e. how different
parts of the specification can be used to fulfill a desired function for a
Bluetooth device).
The range for Bluetooth communication is 0-30 feet (10 meters)
with a power consumption of 0dBm (1mW). This distance can be
increased to 100 meters by amplifying the power to 20dBm. The
Bluetooth radio system is optimized for mobility.
6. Bluetooth Applications
•File transfer
•Ad-hoc networking: Communicating devices can spontaneously form a
community of networks that persists only as long as it's needed
•Device synchronization: Seamless connectivity among PDAs, computers,
and mobile phones allows applications to update information on multiple
devices automatically when data on any one device changes.
•Peripheral connectivity.
•Car kits: Hands-free packages enable users to access phones and other
devices without taking their hands off the steering wheel
•Mobile payments: Your Bluetooth-enabled phone can communicate with
a Bluetooth-enabled vending machine to buy a can of Diet Pepsi, and put
the charge on your phone bill.
7. Bluetooth Limitations
Data sent between two Bluetooth devices is very slow compared with
Wi-Fi transfer Rate.
Range Of a Bluetooth Device is 15-30 feet depending upon the Device.
Security is Biggest Disadvantage as transfer takes place through radio
waves and a hacker can easily hack it.
Battery usage is also a problem, it will make device out of power before
it would have if Bluetooth was not powered on.
Bluetooth Radio Link
8. Bluetooth Networking
Bluetooth supports both unicast (point-to-point) and multicast (point-to-multipoint)
connections. Bluetooth protocol uses the concept of master and slave. In a master slave
protocol a device cannot talk as and when they desire. They need to wait till the time the
master allows them to talk.
The master and slaves together form
a piconet. Up to seven “slave” devices can
be set to communicate with a “master”.
Several of these piconets can be linked
together to form a larger network in
adhoc manner.
A network of piconets is called
scatternet. A scatternet is formed when a
device from one piconet also acts as a
member of another piconet. In this
scheme, a device being master in one
piconet can simultaneously be slave in
other one.
10. Bluetooth Protocol Stack
Bluetooth protocol stack can be divided into four basic layers according to their
functions. These are:
Bluetooth Core Protocols
• Baseband
• Link Manager Protocol (LMP)
• Logical Link Control and Adaptation Protocol (L2CAP)
• Service Discovery Protocol (SDP)
Cable Replacement Protocol
• RFCOMM
Telephony Control Protocol
• Telephony Control Protocol Binary
• AT- Commands
Adapted Protocols
• PPP Bluetooth
• TCP/IP
• OBEX Protocol
• Content Formats
11. Bluetooth Protocols
Radio - Specifies details of the air interface, including frequency, the use of frequency
hopping, modulation scheme, and transmit power.
Baseband - Concerned with connection establishment within a piconet, addressing,
packet format, timing, and power control. The Baseband and Link Control Layer enable
the physical RF link between Bluetooth units forming a piconet. This layer uses inquiry
and paging procedures to synchronize the transmission with different Bluetooth devices.
It provides 2 different kind of physical links with their corresponding baseband
packets, Synchronous Connection-Oriented (SCO) and Asynchronous Connectionless
(ACL) which can be transmitted in a multiplexing manner on the same RF link. ACL packets
are used for data only, while the SCO packet can contain audio only or a combination of
audio and data. All audio and data packets can be provided with different levels of FEC or
CRC error correction and can be encrypted.
Audio - Audio data can be transferred between one or more Bluetooth devices, making
various usage models possible and audio data in SCO packets is routed directly to and
from Baseband and it does not go through L2CAP.
12. Bluetooth Protocols
Link manager protocol (LMP) - Responsible for link setup between Bluetooth devices and
ongoing link management. This includes security aspects such as authentication and
encryption negotiation of baseband packet sizes. It also controls the power modes,
connection state and duty cycles of Bluetooth devices in a piconet.
Logical link control and adaptation protocol (L2CAP) - Adapts upper-layer protocols to
the baseband layer. This layer is responsible for segmentation of large packets and the
reassembly of the fragmented packets. L2CAP is also responsible for multiplexing of
Bluetooth packets from different applications.
Service discovery protocol (SDP) - Device information, services, and the characteristics of
the services can be queried to enable the establishment of a connection between two or
more Bluetooth devices.
Host Controller Interface (HCI) - The Host Controller Interface, HCI, provides a uniform
interface method for accessing the Bluetooth hardware capabilities. It contains a
command interface to the Baseband controller and link manager and access to hardware
status. Finally, it contains control and event registers.
13. Bluetooth Protocols
RFCOMM - It is a serial line communication protocol and is based on ETSI 07.10
specification. The “cable replacement” protocol emulates EIA - 232 (RS-232)
control and data signals over Bluetooth baseband protocol.
TCS BIN (telephony control specification binary) - It is a bit-oriented protocol
that defines the call control signaling for the establishment of speech and data
calls between Bluetooth devices. It also defines mobility-management
procedures for handling groups of Bluetooth TCS devices.
AT-Commands - this protocol defines a set of AT-commands by which a mobile
phone can be used and controlled as a modem for fax and data transfers.
AT(attention) commands are used from a computer or DTE (Data Terminal
Equipment) to control a modem or DCE (Data Circuit Terminating Equipment).
14. Bluetooth Protocols
The adopted protocols are defined in specifications issued by other standards-
making organizations and incorporated into the overall Bluetooth architecture.
The Bluetooth strategy is to invent only necessary protocols and use existing
standards whenever possible. These are the adopted protocols:
PPP - The point-to-point protocol is an Internet standard protocol for
transporting IP datagrams over a point-to-point link
TCP/UDP/IP - These are the foundation protocols of the TCP/IP protocol suite;
OBEX - The object exchange protocol is a session-level protocol developed by
the Infrared Data Association (IrDA) for the exchange of objects. OBEX provides
functionality similar to that of HTTP, but in a simpler fashion. It also provides a
model for representing objects and operations.
Content Formats - Examples of content formats transferred by OBEX are vCard
and vCalendar, which provide the format of an electronic business card and
personal calendar entries and scheduling information, respectively.
WAE/WAP - Bluetooth incorporates the wireless application environment and
the wireless application protocol into its architecture.
15. A number of usage models are defined in Bluetooth profile documents. In essence, a usage model is a set
of protocols that implement a particular Bluetooth-based application. Each profile defines the protocols
and protocol features supporting a particular usage model. Following are the highest-priority usage
models:
File transfer - The file transfer usage model supports the transfer of directories, files, documents,
images, and streaming media formats. This usage model also includes the capability to browse folders on
a remote device;
Internet bridge - With this usage model, a PC is wirelessly connected to a mobile phone or cordless
modem to provide dial-up networking and fax capabilities. For dial-up networking, AT commands are used
to control the mobile phone or modem, and another protocol stack (such as PPP over RFCOMM) is used
for data transfer. For fax transfer, the fax software operates directly over RFCOMM;
LAN access - This usage model enables devices on a piconet to access a LAN. Once connected, a
device functions as if it were directly connected (wired) to the LAN;
Synchronization - This model provides a device-to-device synchronization of PIM (personal
information management) information, such as phone book, calendar, message, and note information.
IrMC (Ir mobile communications) is an IrDA protocol that provides client/server capability for transferring
updated PIM information from one device to another;
Three-in-one phone - Telephone handsets that implement this usage model may act as a cordless
phone connecting to a voice base station, as an intercom device for connecting to other telephones, and
as a cellular phone;
Headset - The headset can act as a remote device's audio input and output interface.
Bluetooth Usage Models
16. Bluetooth offers security infrastructure starting from authentication, key
exchange to encryption. In addition to encryption, a frequency-hopping
scheme with 1600 hops/sec is employed. All of this makes the system
difficult to eavesdrop.
The main security features offered by Bluetooth include a challenge
response routine for authentication, a stream cipher for encryption, and a
session key generation. Each connection may require a one-way, two-way,
or no authentication using the challenge-response routine. The security
algorithms use the public identity of a device, a secret private user key, and
an internally generated random key as input parameters
17.
18. The first step, called pairing, is necessary if two Bluetooth devices have never
met before. To set up trust between the two devices a user can enter a secret
PIN into both devices. This PIN can have a length of up to 16 byte.
Based on the PIN, the device address, and random numbers, several keys can
be computed which can be used as link key for authentication. The
authentication is a challenge-response process based on the link key, a
random number generated by a verifier (the device that requests
authentication), and the device address of the claimat (the device that is
authenticated).
Based on the link key, and again a random number an encryption key is
generated during the encryption stage of the security architecture. This key
has a maximum size of 128 bits and can be individually generated for each
transmission.
Based on the encryption key, the device address and the current clock a
payload key is generated for ciphering user data. The payload key is a stream
of pseudo-random bits. The ciphering process is a simple XOR of the user
data and the payload key.
21. Radio transponder (known as RFID tags) carrying an ID
(Identification) can be read through radio frequency (RF) interfaces
Tag is attached to the object and data within the tag provides
identification for the object
Object could be an entity in a manufacturing shop, goods in
transit, item in a retail store, a vehicle in a parking lot, a pet, or a
book in a library
22. Comprises of different functional areas like:
Means of reading or interrogating the data in the tag
Mechanism to filter some of the data
Means to communicate the data in the tag with a host computer
Means for updating or entering customized data into the tag
Three basic criteria for categorization:
Frequency
Application
Power levels
23.
24. Works on six frequencies of 132.4 KHz, 13.56 MHz, 433
MHz, 918 MHz, 2.4 GHz and 5.8 GHz
Low frequency range tags are slow in data transfer and
suitable for slow moving objects, security access, asset
tracking and animal identification applications
High frequency range tags offer long reading ranges and
high data transfer speed and are used for fast moving
objects like railway wagon tracking and identification of
vehicles on freeways for automated toll collection
Higher the frequency, higher the data transfer rates
25. Speed of the object and distance to be read determines the
type of tag to be used
RFID systems follow contact-less and non line-of-sight nature
of the technology
Tags can be read at high speeds
RFID tag contains two segments of memory - one segment is
a factory set and used to uniquely identify a tag while the other
one is used by the application
Read/write capability of a RFID system is an advantage in
interactive applications such as work-in-process or maintenance
tracking
26. Two types - Active and Passive tags
Passive tags are generally in low frequency range
Tags at higher frequency range can be either active or passive
Powered by an internal battery and are typically read/write
Memory can vary from a few bytes to 1MB
Battery supplied power of an active tag generally gives it a longer
read range
Greater the size, greater the cost and a limited operational life
27. Operate without own power source
Obtains operating power from the reader’s antenna
Data within a passive tag is read only and generally cannot be changed during
operation
Lighter, less expensive and offer a virtually unlimited operational life
Have shorter read ranges than active tags and require a high powered reader
Data is usually 32 to 128 bits long
A transponder programmed with unique information (RFID tag)
A transceiver with decoder (a reader)
An antenna or coil
Close proximity passive tags rely on electromagnetic or inductive coupling
techniques whereas active tags are based upon propagating electromagnetic
waves techniques
28. Transportation and Logistics
Manufacturing and Processing
Security
Animal tagging
Retail store and enterprise stores
Community library
Time and attendance
Postal tracking
Airline baggage reconciliation
Road toll management
29.
30.
31. • Wireless PANs (Bluetooth – IEEE
802.15)
– very low range
– wireless connection to printers etc
• Wireless LANs (WiFi – IEEE 802.11)
– infrastructure as well as ad-hoc
networks possible
– home/office networking
• Multihop Ad hoc Networks
– useful when infrastructure not
available, impractical, or expensive
– military applications, emergencies
Wireless MANs (WiMAX-
802.16)
– Similar to cellular networks
– traditional base station
infrastructure systems
32. WiMAX or Worldwide Interoperability for Microwave Access, is a wireless Internet
service designed to cover wide geographical areas serving large number of users at
low cost
WiMAX is the synonym given to the IEEE 802.16 standard defining wide area
wireless data networking .
33.
34. Also known as Wireless Metropolitan Area Network
(Wireless MAN) and Wireless Microwave Access (WiMAX)
IEEE 802.16 standard released in April 2002
Offers an alternative to high bandwidth wired access
networks like fiber optic, cable modems and DSL
Provides network access to buildings through exterior
antennas communicating with radio base stations
Networks can be created in just weeks by deploying a
small number of base stations on buildings or poles to
create high capacity wireless access systems
35.
36.
37. Sub-standards of IEEE 802.16
IEEE 802.16 standardizes the air interface and related functions associated
with WLL. Three working groups have been chartered to produce the following
standards:
IEEE 802.16.1 - Air interface for 10 to 66 GHz
IEEE 802.16.2 - Coexistence of broadband wireless access systems
IEEE 802.16.3 - Air interface for licensed frequencies, 2 to 11 GHz
• WiMAX uses microwave radio technology to connect computers to the
internet in place of wired connections such as DSL or cable modems.
• It works very much like cell phone technology in that reasonable proximity
to a base station is required to establish a data link to the Internet.
• Users within 3 to 5 miles of the base station will be able to establish a link
using NLOS technology with data rates as high as 75 Mbps.
38. IEEE 802.16 standards are concerned with the air interface between a subscriber’s transceiver
station and a base transceiver station. The protocol stack of IEEE 802.16 standard consists of
two main layers: Medium Access Control (MAC) layer and Physical (PHY) layer. The MAC layer
is subdivided into three sub-layers, namely Service Specific Convergence Sub-layer (CS),
Common Part Sub-layer (CPS) and Security Sub-layer (SS)
The Physical Layer
MAC Layer
Convergence Layer
39. Specifies the frequency band, the modulation scheme, error-correction
techniques, synchronization between transmitter and receiver, data rate and
the multiplexing structure.
The PHY layer receives MAC frames and then transmits them through
coding and modulation of radio frequency signals. It supports Frequency
Division Duplexing (FDD) and Time Division Duplexing (TDD).
802.16 uses both licensed and unlicensed 2 – 11 GHz bands driven by the
need for non line-of-sight operation.
Three physical layers for services:
• Wireless MAN-SC2: Uses a single carrier modulation format. This is to
support existing networks and protocols
• Wireless MAN-OFDM: Uses OFDM with a 256-point transform. Acess is by
TDMA. This is mandatory for license-exempt bands
• Wireless MAN-OFDMA: Uses OFDM with a 2048-point transform. Here
multiple access is provided by addressing a sub-set of the multiple carriers
to individual receivers.
40. • The main part of the IEEE 802.16 standard is common part sub-layer
which is responsible for bandwidth allocation, connection
management, scheduling, connection control, automatic repeat request
and QoS enforcement
• Designed for point-to-multipoint broadband wireless access
• Addresses the need for very high bit rates, both uplink (to the base
station) and downlink (from the base station)
• Services like multimedia and voice can run, as 802.16 MAC is equipped
to accommodate both continuous and bursty traffic
41. Provides functions specific to the service being provided
Bearer services include digital audio/video multicast, digital
telephony, ATM, Internet access, wireless trunks in telephone
networks and frame relay
The service specific convergence sub-layer communicates with
higher layers and receives packets from them and then do some
specific functions like packet/frame classification and header
suppression. Next, it encapsulates these packets into MAC Service
Data Unit (MAC SDU) format, and then distributes MAC SDUs to
common part sub-layer. Asynchronous Transfer Mode (ATM)
convergence and packet convergence sub-layers are two types of
service specific convergence sub-layer. The ATM convergence sub-
layer is used for ATM networks, and the packet convergence sub-
layer is used for packet services like Ethernet, IPv4 and IPv6