SlideShare une entreprise Scribd logo
1  sur  43
An Introduction toAn Introduction to
BLUETOOTH TECHNOLOGYBLUETOOTH TECHNOLOGY
BY Vikas Jagtap
11 February 2015 2
CONTENT
• Overview of Bluetooth History
• The Bluetooth Specifications
• Typical Bluetooth Scenario
• Protocols
• Profiles
• Security
• Comparison with other technologies
• Future of Bluetooth
• Summary
11 February 2015 3
Example : The Networked Home
11 February 2015 4
What is Bluetooth?
• “Bluetooth wireless technology is an open specification for a
low-cost, low-power, short-range radio technology for ad-hoc
wireless communication of voice and data anywhere in the
world.”
One of the first modules (Ericsson) A recent module
11 February 2015 5
Ultimate Headset
11 February 2015 6
Cordless Computer
11 February 2015 7
Bluetooth Goals & Vision
• Originally conceived as a cable replacement technology
• Short-Range Wireless Solutions
• Open Specification
• Voice and Data Capability
• Worldwide Usability
• Other usage models began to develop:
— Personal Area Network (PAN)
— Ad-hoc networks
— Data/voice access points
— Wireless telematics
11 February 2015 8
Overview of Bluetooth History
• What is Bluetooth?
— Bluetooth is a short-range wireless communications technology.
• Why this name?
— It was taken from the 10th century Danish King Harald Blatand who
unified Denmark and Norway.
• When does it appear?
— 1994 – Ericsson study on a wireless technology to link mobile phones &
accessories.
— 5 companies joined to form the Bluetooth Special Interest Group (SIG)
in 1998.
— First specification released in July 1999.
11 February 2015 9
Timeline
• 1994 : Ericsson study complete / vision
• 1995 : Engineering work begins
• 1997 : Intel agrees to collaborate
• 1998 : Bluetooth SIG formed: Ericsson, Intel, IBM, Nokia & Toshiba
• 1999 : Bluetooth Specification 1.0A
SIG promoter group expanded: 3Com, Lucent, Microsoft &
Motorola
• 2000 : Bluetooth Specification 1.0B, 2000+ adopters
• 2001 : First retail products released, Specification 1.1
• 2003 : Bluetooth Specification 1.2
• 2005 : Bluetooth Specification 2.0 (?)
11 February 2015 10
Special Interest Group
11 February 2015 11
Technical features
Connection Type
Spread Spectrum (Frequency Hopping)
& Time Division Duplex (1600 hops/sec)
Spectrum
2.4 GHz ISM Open Band (79 MHz of
spectrum = 79 channels)
Modulation Gaussian Frequency Shift Keying
Transmission Power 1 mw – 100 mw
Data Rate 1 Mbps
Range 30 ft
Supported Stations 8 devices
Data Security –Authentication Key 128 bit key
Data Security –Encryption Key 8-128 bits (configurable)
Module size 9 x 9 mm
11 February 2015 12
Bluetooth FHSS
• Employs frequency hopping
spread spectrum
• Reduce interference with
other devices
• Pseudorandom hopping
• 1600 hops/sec- time slot is
defined as 625 microseconds
• Packet 1-5 time slots long
11 February 2015 13
Time-Division Duplex Scheme
• Channel is divided into consecutive slots (each 625 µs)
• One packet can be transmitted per slot
• Subsequent slots are alternatively used for transmitting and receiving
— Strict alternation of slots between the master and the slaves
— Master can send packets to a slave only in EVEN slots
— Slave can send packets to the master only in the ODD slots
11 February 2015 14
Classification
POWER RANGE
CLASS I 20 dBm 100 m
CLASS II 0-4 dBm 10 m
CLASS III 0 dBm 1 m
• Classification of devices on the basis of Power dissipated &
corresponding maximum Range.
11 February 2015 15
Typical Bluetooth Scenario
• Bluetooth will support wireless point-to-point and
point-to-multipoint (broadcast) between devices in a
piconet.
• Point to Point Link
— Master - slave relationship
— Bluetooth devices can function as masters or slaves
• Piconet
— It is the network formed by a Master and one or more slaves
(max 7)
— Each piconet is defined by a different hopping channel to
which users synchronize to
— Each piconet has max capacity (1 Mbps)
m s
s s s
m
11 February 2015 16
Piconet Structure
Master
Active Slave
Parked Slave
Standby
• All devices in piconet hop together.
• Master’s ID and master’s clock determines frequency hopping
sequence & phase.
11 February 2015 17
Ad-hoc Network – the Scatternet
• Inter-piconet communication
• Up to 10 piconets in a
scatternet
• Multiple piconets can operate
within same physical space
• This is an ad-hoc, peer to
peer (P2P) network
11 February 2015 18
Bluetooth Protocol Stack
11 February 2015 19
Baseband
11 February 2015 20
Baseband
• Addressing
— Bluetooth device address (BD_ADDR)
– 48 bit IEEE MAC address
— Active Member address (AM_ADDR)
– 3 bits active slave address
– all zero broadcast address
— Parked Member address (PM_ADDR)
– 8 bit parked slave address
• This MAC address is split into three parts
— The Non-significant Address Part (NAP)
– Used for encryption seed
— The Upper Address part (UAP)
– Used for error correction seed initialization & FH sequence generation
— The Lower Address Part (LAP)
– Used for FH sequence generation
11 February 2015 21
Packet Structure
Voice
No CRC
Data CRCheader
ARQ
FEC (optional) FEC (optional)
72 bits 54 bits 0 - 2744 bits
Access
Code
Header Payload
11 February 2015 22
Connection State Machine
Standby
Inquiry Page
Connected
Transmit data
Park Hold Sniff
11 February 2015 23
Channel Establishment
• There are two managed situations
— A device knows the parameters
of the other
– It follows paging process
— No knowledge about the other
– Then it follows inquiring &
paging process
• Two main states and sub-states
— Standby (no interaction)
— Connection (working)
— Seven more sub-states for
attaching slaves & connection
establishment
Connection
State
Machine
11 February 2015 24
Channel Establishment (contd.)
• Seven sub-states
— Inquiry
— Inquiry scan
— Inquiry response
— Page
— Page scan
— Master response
— Slave response
11 February 2015 25
Link Manager Protocol
11 February 2015 26
Link Manager Protocol
• The Link Manager carries out link setup, authentication & link
configuration.
• Channel Control
— All the work related to the channel control is managed by the master
– The master uses polling process for this
— The master is the first device which starts the connection
– This roles can change (master-slave role switch)
11 February 2015 27
• Service provided to the higher layer:
— L2CAP provides connection-oriented and connectionless data
services to upper layer protocols
— Protocol multiplexing and demultiplexing capabilities
— Segmentation & reassembly of large packets
— L2CAP permits higher level protocols and applications to transmit
and receive L2CAP data packets up to 64 kilobytes in length.
L2CAP
11 February 2015 28
Middleware Protocol Group
RF
Baseband
Audio
Link Manager
L2CAP
Data
SDP RFCOMM
IP
Control
Applications
Middleware Protocol Group
•Additional transport protocols to
allow existing and new applications to
operate over Bluetooth.
•Packet based telephony control
signaling protocol also present.
•Also includes Service Discovery
Protocol.
11 February 2015 29
Middleware Protocol Group (contd.)
• Service Discovery Protocol (SDP)
— Means for applications to discover device info, services and its
characteristics.
• TCP/IP
— Network Protocols for packet data communication, routing.
• RFCOMM
— Cable replacement protocol, emulation of serial ports over wireless network.
11 February 2015 30
IP Over Bluetooth
• IP over Bluetooth v 1.0
11 February 2015 31
IP Over Bluetooth
• IP over Bluetooth v 1.1
11 February 2015 32
File Transfer Profile
• Profile provides:
• Enhanced client-server interactions:
- browse, create, transfer folders
- browse, pull, push, delete files
11 February 2015 33
Headset Profile
• Profile provides:
• Both devices must provide capability to initiate connection &
accept/terminate calls.
• Volume can be controlled from either device.
• Audio gateway can notify headset of an incoming call.
11 February 2015 34
Core Bluetooth Products
• Notebook PCs & Desktop
computers
• Printers
• PDAs
• Other handheld devices
• Cell phones
• Wireless peripherals:
• Headsets
• Cameras
• CD Player
• TV/VCR/DVD
• Access Points
• Telephone Answering
Devices
• Cordless Phones
• Cars
11 February 2015 35
Other Products…
• 2004 Toyota Prius & Lexus LS 430
— hands free calls
• Digital Pulse Oximetry System
• Toshiba Washer & Dryer
• Nokia N-gage
11 February 2015 36
Security
• Security Measures
— Link Level Encryption & Authentication.
— Personal Identification Numbers (PIN) for device access.
— Long encryption keys are used (128 bit keys).
— These keys are not transmitted over wireless. Other parameters are
transmitted over wireless which in combination with certain
information known to the device, can generate the keys.
— Further encryption can be done at the application layer.
11 February 2015 37
A Comparison
WLAN
11 February 2015 38
Bluetooth vs. IrD
• Bluetooth
— Point to Multipoint
— Data & Voice
— Easier Synchronization due
to omni-directional and no
LOS requirement
— Devices can be mobile
— Range 10 m
•IrD
—Point to point
—Intended for Data
Communication
—Infrared, LOS communication
—Can not penetrate solid objects
—Both devices must be stationary,
for synchronization
—Range 1 m
11 February 2015 39
Bluetooth: Today & Tomorrow
11 February 2015 40
Will Bluetooth become a household name?
11 February 2015 41
Future of Bluetooth
• Success of Bluetooth depends on how well it is integrated into
consumer products
— Consumers are more interested in applications than the technology
— Bluetooth must be successfully integrated into consumer products
— Must provide benefits for consumer
— Must not destroy current product benefits
• Key Success Factors
— Interoperability
— Mass Production at Low Cost
— Ease of Use
— End User Experience
11 February 2015 42
Summary
• A new global standard for data and voice
• Eliminate Cables
• Low Power, Low range, Low Cost network devices
• Future Improvements
— Master-Slave relationship can be adjusted dynamically for optimal
resource allocation and utilization.
— Adaptive, closed loop transmit power control can be implemented
to further reduce unnecessary power usage.
11 February 2015 43
“Things that think…
don’t make sense unless they
link.”
- Vikas jagtap

Contenu connexe

Tendances

Zigbee intro v5
Zigbee intro v5Zigbee intro v5
Zigbee intro v5
rajrayala
 
software defined network, openflow protocol and its controllers
software defined network, openflow protocol and its controllerssoftware defined network, openflow protocol and its controllers
software defined network, openflow protocol and its controllers
Isaku Yamahata
 
ccna presentation 2013
ccna presentation 2013ccna presentation 2013
ccna presentation 2013
RoHit VashIsht
 

Tendances (20)

Information Security Lesson 7 - Remote Access - Eric Vanderburg
Information Security Lesson 7 - Remote Access - Eric VanderburgInformation Security Lesson 7 - Remote Access - Eric Vanderburg
Information Security Lesson 7 - Remote Access - Eric Vanderburg
 
Zigbee intro v5
Zigbee intro v5Zigbee intro v5
Zigbee intro v5
 
Security Testing 4G (LTE) Networks - 44CON 2012
Security Testing 4G (LTE) Networks - 44CON 2012Security Testing 4G (LTE) Networks - 44CON 2012
Security Testing 4G (LTE) Networks - 44CON 2012
 
Introduction to Bluetooth low energy
Introduction to Bluetooth low energyIntroduction to Bluetooth low energy
Introduction to Bluetooth low energy
 
Practical Examples of LoRaWAN in Action
Practical Examples of LoRaWAN in ActionPractical Examples of LoRaWAN in Action
Practical Examples of LoRaWAN in Action
 
Introduction to LoRa for developers
Introduction to LoRa for developersIntroduction to LoRa for developers
Introduction to LoRa for developers
 
Bluetooth Low Energy - A Case Study
Bluetooth Low Energy - A Case StudyBluetooth Low Energy - A Case Study
Bluetooth Low Energy - A Case Study
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9
 
iot-component-dimensioning
iot-component-dimensioningiot-component-dimensioning
iot-component-dimensioning
 
Bluetooth and Raspberry Pi
Bluetooth and Raspberry PiBluetooth and Raspberry Pi
Bluetooth and Raspberry Pi
 
Deep Packet Inspection technology evolution
Deep Packet Inspection technology evolutionDeep Packet Inspection technology evolution
Deep Packet Inspection technology evolution
 
IOT technology-standards
IOT technology-standardsIOT technology-standards
IOT technology-standards
 
Software defined networks and openflow protocol
Software defined networks and openflow protocolSoftware defined networks and openflow protocol
Software defined networks and openflow protocol
 
Carwhisperer Bluetooth Attack
Carwhisperer Bluetooth AttackCarwhisperer Bluetooth Attack
Carwhisperer Bluetooth Attack
 
software defined network, openflow protocol and its controllers
software defined network, openflow protocol and its controllerssoftware defined network, openflow protocol and its controllers
software defined network, openflow protocol and its controllers
 
Webnesday - Introduction to LoRaWAN
Webnesday - Introduction to LoRaWANWebnesday - Introduction to LoRaWAN
Webnesday - Introduction to LoRaWAN
 
ccna presentation 2013
ccna presentation 2013ccna presentation 2013
ccna presentation 2013
 
Deu datasheet rev_u
Deu datasheet rev_uDeu datasheet rev_u
Deu datasheet rev_u
 
CCNA (R & S) Module 04 - Scaling Networks - Chapter 5
CCNA (R & S) Module 04 - Scaling Networks - Chapter 5CCNA (R & S) Module 04 - Scaling Networks - Chapter 5
CCNA (R & S) Module 04 - Scaling Networks - Chapter 5
 
CISSP Prep: Ch 5. Communication and Network Security (Part 1)
CISSP Prep: Ch 5. Communication and Network Security (Part 1)CISSP Prep: Ch 5. Communication and Network Security (Part 1)
CISSP Prep: Ch 5. Communication and Network Security (Part 1)
 

Similaire à Amit

R K 2 Bluetooth Technologies
R K 2  Bluetooth  TechnologiesR K 2  Bluetooth  Technologies
R K 2 Bluetooth Technologies
Saurav Kumar
 

Similaire à Amit (20)

bluetooth technology
 bluetooth technology bluetooth technology
bluetooth technology
 
Fair Bluetooth.pdf
Fair Bluetooth.pdfFair Bluetooth.pdf
Fair Bluetooth.pdf
 
R K 2 Bluetooth Technologies
R K 2  Bluetooth  TechnologiesR K 2  Bluetooth  Technologies
R K 2 Bluetooth Technologies
 
7952034.ppt
7952034.ppt7952034.ppt
7952034.ppt
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth Technology & Security
Bluetooth Technology & SecurityBluetooth Technology & Security
Bluetooth Technology & Security
 
Wireless personal area networks(PAN)
Wireless personal area networks(PAN)Wireless personal area networks(PAN)
Wireless personal area networks(PAN)
 
Bluetooth.ppt
Bluetooth.pptBluetooth.ppt
Bluetooth.ppt
 
Bluetooth.ppt
Bluetooth.pptBluetooth.ppt
Bluetooth.ppt
 
Bluetooth - Comprehensive Presentation
Bluetooth - Comprehensive PresentationBluetooth - Comprehensive Presentation
Bluetooth - Comprehensive Presentation
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
bluetooth-security
bluetooth-securitybluetooth-security
bluetooth-security
 
BluetoothSecurity.ppt
BluetoothSecurity.pptBluetoothSecurity.ppt
BluetoothSecurity.ppt
 
BluetoothSecurity.ppt
BluetoothSecurity.pptBluetoothSecurity.ppt
BluetoothSecurity.ppt
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
IoT Control Units and Communication Models
IoT Control Units and Communication ModelsIoT Control Units and Communication Models
IoT Control Units and Communication Models
 
Bluetooth and profiles on WEC7
Bluetooth and profiles on WEC7Bluetooth and profiles on WEC7
Bluetooth and profiles on WEC7
 
Overview of Bluetooth technology
Overview of Bluetooth technologyOverview of Bluetooth technology
Overview of Bluetooth technology
 
TLEN_AWL_LECTURE.pptx
TLEN_AWL_LECTURE.pptxTLEN_AWL_LECTURE.pptx
TLEN_AWL_LECTURE.pptx
 
Data_Processing_and_communication_bluetooth.pptx
Data_Processing_and_communication_bluetooth.pptxData_Processing_and_communication_bluetooth.pptx
Data_Processing_and_communication_bluetooth.pptx
 

Plus de Vikas Jagtap

Animation technique
Animation techniqueAnimation technique
Animation technique
Vikas Jagtap
 

Plus de Vikas Jagtap (20)

ip addressing & routing
 ip addressing & routing ip addressing & routing
ip addressing & routing
 
broad band networks
 broad band networks broad band networks
broad band networks
 
Simple Network Management Protocol by vikas jagtap
Simple Network Management Protocol by vikas jagtapSimple Network Management Protocol by vikas jagtap
Simple Network Management Protocol by vikas jagtap
 
KNOWLEDGE BASE SYSTEMS
KNOWLEDGE  BASE SYSTEMSKNOWLEDGE  BASE SYSTEMS
KNOWLEDGE BASE SYSTEMS
 
ADVANCE DATABASE MANAGEMENT SYSTEM CONCEPTS & ARCHITECTURE by vikas jagtap
ADVANCE DATABASE MANAGEMENT SYSTEM CONCEPTS & ARCHITECTURE by vikas jagtapADVANCE DATABASE MANAGEMENT SYSTEM CONCEPTS & ARCHITECTURE by vikas jagtap
ADVANCE DATABASE MANAGEMENT SYSTEM CONCEPTS & ARCHITECTURE by vikas jagtap
 
Overview of Object-Oriented Concepts Characteristics by vikas jagtap
Overview of Object-Oriented Concepts Characteristics by vikas jagtapOverview of Object-Oriented Concepts Characteristics by vikas jagtap
Overview of Object-Oriented Concepts Characteristics by vikas jagtap
 
things which make think ooh!!!!!!!! by vikas jagtap
things which make think ooh!!!!!!!! by vikas jagtapthings which make think ooh!!!!!!!! by vikas jagtap
things which make think ooh!!!!!!!! by vikas jagtap
 
Paradise on earth
Paradise on earthParadise on earth
Paradise on earth
 
Dear son daughter by vikas jagtap
Dear son daughter   by vikas jagtapDear son daughter   by vikas jagtap
Dear son daughter by vikas jagtap
 
Double vision by vikas jagtap
Double vision by vikas jagtapDouble vision by vikas jagtap
Double vision by vikas jagtap
 
Dubai by vikas jagtap
Dubai by vikas jagtapDubai by vikas jagtap
Dubai by vikas jagtap
 
District of maharashtra by vikas jagtap
District of maharashtra by vikas jagtapDistrict of maharashtra by vikas jagtap
District of maharashtra by vikas jagtap
 
Cr java concept by vikas jagtap
Cr java  concept by vikas jagtapCr java  concept by vikas jagtap
Cr java concept by vikas jagtap
 
Jdbc ppt
Jdbc pptJdbc ppt
Jdbc ppt
 
Jsp ppt
Jsp pptJsp ppt
Jsp ppt
 
Servlet ppt by vikas jagtap
Servlet ppt by vikas jagtapServlet ppt by vikas jagtap
Servlet ppt by vikas jagtap
 
Animation technique
Animation techniqueAnimation technique
Animation technique
 
An Introduction to BLUETOOTH TECHNOLOGY
An Introduction to BLUETOOTH TECHNOLOGYAn Introduction to BLUETOOTH TECHNOLOGY
An Introduction to BLUETOOTH TECHNOLOGY
 
Network security
 Network security Network security
Network security
 
domain network services (dns)
 domain network services (dns) domain network services (dns)
domain network services (dns)
 

Dernier

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Dernier (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Amit

  • 1. An Introduction toAn Introduction to BLUETOOTH TECHNOLOGYBLUETOOTH TECHNOLOGY BY Vikas Jagtap
  • 2. 11 February 2015 2 CONTENT • Overview of Bluetooth History • The Bluetooth Specifications • Typical Bluetooth Scenario • Protocols • Profiles • Security • Comparison with other technologies • Future of Bluetooth • Summary
  • 3. 11 February 2015 3 Example : The Networked Home
  • 4. 11 February 2015 4 What is Bluetooth? • “Bluetooth wireless technology is an open specification for a low-cost, low-power, short-range radio technology for ad-hoc wireless communication of voice and data anywhere in the world.” One of the first modules (Ericsson) A recent module
  • 5. 11 February 2015 5 Ultimate Headset
  • 6. 11 February 2015 6 Cordless Computer
  • 7. 11 February 2015 7 Bluetooth Goals & Vision • Originally conceived as a cable replacement technology • Short-Range Wireless Solutions • Open Specification • Voice and Data Capability • Worldwide Usability • Other usage models began to develop: — Personal Area Network (PAN) — Ad-hoc networks — Data/voice access points — Wireless telematics
  • 8. 11 February 2015 8 Overview of Bluetooth History • What is Bluetooth? — Bluetooth is a short-range wireless communications technology. • Why this name? — It was taken from the 10th century Danish King Harald Blatand who unified Denmark and Norway. • When does it appear? — 1994 – Ericsson study on a wireless technology to link mobile phones & accessories. — 5 companies joined to form the Bluetooth Special Interest Group (SIG) in 1998. — First specification released in July 1999.
  • 9. 11 February 2015 9 Timeline • 1994 : Ericsson study complete / vision • 1995 : Engineering work begins • 1997 : Intel agrees to collaborate • 1998 : Bluetooth SIG formed: Ericsson, Intel, IBM, Nokia & Toshiba • 1999 : Bluetooth Specification 1.0A SIG promoter group expanded: 3Com, Lucent, Microsoft & Motorola • 2000 : Bluetooth Specification 1.0B, 2000+ adopters • 2001 : First retail products released, Specification 1.1 • 2003 : Bluetooth Specification 1.2 • 2005 : Bluetooth Specification 2.0 (?)
  • 10. 11 February 2015 10 Special Interest Group
  • 11. 11 February 2015 11 Technical features Connection Type Spread Spectrum (Frequency Hopping) & Time Division Duplex (1600 hops/sec) Spectrum 2.4 GHz ISM Open Band (79 MHz of spectrum = 79 channels) Modulation Gaussian Frequency Shift Keying Transmission Power 1 mw – 100 mw Data Rate 1 Mbps Range 30 ft Supported Stations 8 devices Data Security –Authentication Key 128 bit key Data Security –Encryption Key 8-128 bits (configurable) Module size 9 x 9 mm
  • 12. 11 February 2015 12 Bluetooth FHSS • Employs frequency hopping spread spectrum • Reduce interference with other devices • Pseudorandom hopping • 1600 hops/sec- time slot is defined as 625 microseconds • Packet 1-5 time slots long
  • 13. 11 February 2015 13 Time-Division Duplex Scheme • Channel is divided into consecutive slots (each 625 µs) • One packet can be transmitted per slot • Subsequent slots are alternatively used for transmitting and receiving — Strict alternation of slots between the master and the slaves — Master can send packets to a slave only in EVEN slots — Slave can send packets to the master only in the ODD slots
  • 14. 11 February 2015 14 Classification POWER RANGE CLASS I 20 dBm 100 m CLASS II 0-4 dBm 10 m CLASS III 0 dBm 1 m • Classification of devices on the basis of Power dissipated & corresponding maximum Range.
  • 15. 11 February 2015 15 Typical Bluetooth Scenario • Bluetooth will support wireless point-to-point and point-to-multipoint (broadcast) between devices in a piconet. • Point to Point Link — Master - slave relationship — Bluetooth devices can function as masters or slaves • Piconet — It is the network formed by a Master and one or more slaves (max 7) — Each piconet is defined by a different hopping channel to which users synchronize to — Each piconet has max capacity (1 Mbps) m s s s s m
  • 16. 11 February 2015 16 Piconet Structure Master Active Slave Parked Slave Standby • All devices in piconet hop together. • Master’s ID and master’s clock determines frequency hopping sequence & phase.
  • 17. 11 February 2015 17 Ad-hoc Network – the Scatternet • Inter-piconet communication • Up to 10 piconets in a scatternet • Multiple piconets can operate within same physical space • This is an ad-hoc, peer to peer (P2P) network
  • 18. 11 February 2015 18 Bluetooth Protocol Stack
  • 19. 11 February 2015 19 Baseband
  • 20. 11 February 2015 20 Baseband • Addressing — Bluetooth device address (BD_ADDR) – 48 bit IEEE MAC address — Active Member address (AM_ADDR) – 3 bits active slave address – all zero broadcast address — Parked Member address (PM_ADDR) – 8 bit parked slave address • This MAC address is split into three parts — The Non-significant Address Part (NAP) – Used for encryption seed — The Upper Address part (UAP) – Used for error correction seed initialization & FH sequence generation — The Lower Address Part (LAP) – Used for FH sequence generation
  • 21. 11 February 2015 21 Packet Structure Voice No CRC Data CRCheader ARQ FEC (optional) FEC (optional) 72 bits 54 bits 0 - 2744 bits Access Code Header Payload
  • 22. 11 February 2015 22 Connection State Machine Standby Inquiry Page Connected Transmit data Park Hold Sniff
  • 23. 11 February 2015 23 Channel Establishment • There are two managed situations — A device knows the parameters of the other – It follows paging process — No knowledge about the other – Then it follows inquiring & paging process • Two main states and sub-states — Standby (no interaction) — Connection (working) — Seven more sub-states for attaching slaves & connection establishment Connection State Machine
  • 24. 11 February 2015 24 Channel Establishment (contd.) • Seven sub-states — Inquiry — Inquiry scan — Inquiry response — Page — Page scan — Master response — Slave response
  • 25. 11 February 2015 25 Link Manager Protocol
  • 26. 11 February 2015 26 Link Manager Protocol • The Link Manager carries out link setup, authentication & link configuration. • Channel Control — All the work related to the channel control is managed by the master – The master uses polling process for this — The master is the first device which starts the connection – This roles can change (master-slave role switch)
  • 27. 11 February 2015 27 • Service provided to the higher layer: — L2CAP provides connection-oriented and connectionless data services to upper layer protocols — Protocol multiplexing and demultiplexing capabilities — Segmentation & reassembly of large packets — L2CAP permits higher level protocols and applications to transmit and receive L2CAP data packets up to 64 kilobytes in length. L2CAP
  • 28. 11 February 2015 28 Middleware Protocol Group RF Baseband Audio Link Manager L2CAP Data SDP RFCOMM IP Control Applications Middleware Protocol Group •Additional transport protocols to allow existing and new applications to operate over Bluetooth. •Packet based telephony control signaling protocol also present. •Also includes Service Discovery Protocol.
  • 29. 11 February 2015 29 Middleware Protocol Group (contd.) • Service Discovery Protocol (SDP) — Means for applications to discover device info, services and its characteristics. • TCP/IP — Network Protocols for packet data communication, routing. • RFCOMM — Cable replacement protocol, emulation of serial ports over wireless network.
  • 30. 11 February 2015 30 IP Over Bluetooth • IP over Bluetooth v 1.0
  • 31. 11 February 2015 31 IP Over Bluetooth • IP over Bluetooth v 1.1
  • 32. 11 February 2015 32 File Transfer Profile • Profile provides: • Enhanced client-server interactions: - browse, create, transfer folders - browse, pull, push, delete files
  • 33. 11 February 2015 33 Headset Profile • Profile provides: • Both devices must provide capability to initiate connection & accept/terminate calls. • Volume can be controlled from either device. • Audio gateway can notify headset of an incoming call.
  • 34. 11 February 2015 34 Core Bluetooth Products • Notebook PCs & Desktop computers • Printers • PDAs • Other handheld devices • Cell phones • Wireless peripherals: • Headsets • Cameras • CD Player • TV/VCR/DVD • Access Points • Telephone Answering Devices • Cordless Phones • Cars
  • 35. 11 February 2015 35 Other Products… • 2004 Toyota Prius & Lexus LS 430 — hands free calls • Digital Pulse Oximetry System • Toshiba Washer & Dryer • Nokia N-gage
  • 36. 11 February 2015 36 Security • Security Measures — Link Level Encryption & Authentication. — Personal Identification Numbers (PIN) for device access. — Long encryption keys are used (128 bit keys). — These keys are not transmitted over wireless. Other parameters are transmitted over wireless which in combination with certain information known to the device, can generate the keys. — Further encryption can be done at the application layer.
  • 37. 11 February 2015 37 A Comparison WLAN
  • 38. 11 February 2015 38 Bluetooth vs. IrD • Bluetooth — Point to Multipoint — Data & Voice — Easier Synchronization due to omni-directional and no LOS requirement — Devices can be mobile — Range 10 m •IrD —Point to point —Intended for Data Communication —Infrared, LOS communication —Can not penetrate solid objects —Both devices must be stationary, for synchronization —Range 1 m
  • 39. 11 February 2015 39 Bluetooth: Today & Tomorrow
  • 40. 11 February 2015 40 Will Bluetooth become a household name?
  • 41. 11 February 2015 41 Future of Bluetooth • Success of Bluetooth depends on how well it is integrated into consumer products — Consumers are more interested in applications than the technology — Bluetooth must be successfully integrated into consumer products — Must provide benefits for consumer — Must not destroy current product benefits • Key Success Factors — Interoperability — Mass Production at Low Cost — Ease of Use — End User Experience
  • 42. 11 February 2015 42 Summary • A new global standard for data and voice • Eliminate Cables • Low Power, Low range, Low Cost network devices • Future Improvements — Master-Slave relationship can be adjusted dynamically for optimal resource allocation and utilization. — Adaptive, closed loop transmit power control can be implemented to further reduce unnecessary power usage.
  • 43. 11 February 2015 43 “Things that think… don’t make sense unless they link.” - Vikas jagtap