Anda di halaman 1dari 21

BLUETOOTH TECHNOLOGY

K. J. SOMAIYA INSTITUTE OF ENGINEERING


AND INFORMATION TECHNOLOGY

REPORT ON:

SUBJECT TEACHER
MRS. JADHAV S.S.

( )

HOD

( )

PRINCIPLE
( )

1 | PAGE
BLUETOOTH TECHNOLOGY

K. J. SOMAIYA INSTITUTE OF ENGINEERING


AND INFORMATION TECHNOLOGY

REPORT ON:

SUBMITTED BY:-

SHAIKH ABDUL SALAM [27]


PRIYESH WAGH [43]
BELA VAIDYA [26]
SWAPNEEL PARAB [36]
ANKITA [52]
PRIYA TIWARI [62]
JAIDEEP [65]
VINOD KADAM [22]

SUBMITTED TO:-

MRS. JADHAV S.S.

2 | PAGE
BLUETOOTH TECHNOLOGY

TABLE OF CONTENTS

Sr.No. Name of Content Page No.


1 Bluetooth Logo 3
2 Bluetooth Technology Over The 4
Years
3 Bluetooh Specification 6
4 Bluetooh Architecture 8
5 Bluetooth Chracteristics 12
6 General Bluetooth Profile 13
7 Bluetooth Protocol Stack 14
8 Bluetooth Core Protocol 15
9 Bluetooth Application 17
10 Bluetooth Security 18
11 Bluetooth Advantages 19
12 Bluetooth Disadvantages 20

3 | PAGE
BLUETOOTH TECHNOLOGY

The art of connecting things is becoming more and more complex


every day. We will look at a method of connecting devices, called
Bluetooth that can Streamline the process. A Bluetooth connection is
wireless an automatic, and it has a number of interesting features that
can simplify our daily lives.

A Scandinavian firm originally designed the logo at the time the SIG was
formally introduced to the public. Keeping to the same origin as the Bluetooth
name, the logo unites the Runic alphabetic characters "H", which looks similar
to an asterisk, and a "B", which are the initials for Herald Bluetooth. If you look
close enough you can see both embodied in the logo.

✔ Bluetooth provides a way to connect and exchange information between


devices such as mobile phones, laptops, PCs, printers, digital cameras,
and video game consoles over a secure, globally unlicensed short-range
radio frequency.
✔ The Bluetooth specifications are developed and licensed by the
Bluetooth Special Interest Group.

BLUETOOTH TECHNOLOGY OVER THE YEARS

4 | PAGE
BLUETOOTH TECHNOLOGY

Problem:

➢ Today, electronics that connect to one another are found everywhere--in


the office, home, Car, etc. Keyboards connect to computers, MP3 players
5 | PAGE
BLUETOOTH TECHNOLOGY

to headphones and so on. So, how do these devices connect to each


other? Usually the answer is: with wires and cables.
➢ But, as you know, wires and cables always result in a tangled mess.

Solution

➢ Bluetooth wireless technology eliminates many of the wires that clutter


our offices, homes, etc., while allowing our electronic devices of today
and tomorrow to communicate with one another.

BLUETOOH SPECIFICATION

• Bluetooth is a low-cost, low power, short range wireless communication


technology used in networking, mobile phones and other portable device.

6 | PAGE
BLUETOOTH TECHNOLOGY

• Bluetooth wireless technology also enables devices to communicate with


each other as soon as they come within range; no need to connect, plug
into, install, enable or configure anything.
• Although the range of each Bluetooth device is approximately 10 meters
but this distance can be increased to 100 meters with optional amplifiers
placed at strategic locations within a building.
• Bluetooth does not need to be set-up it is always on. The devices to
communicate do not even require line-of-sight communication.
• Different devices can be automatically link-up with each other as soon as
they come into range i.e. it creates a temporary network or Personal
Area Network (PAN).
• The Bluetooth specification is an open global specification defining the
complete system up to application level.
• The Bluetooth Promoters group has made Bluetooth an open
specification, rather than keeping it restricted and proprietary, because
more consumer can adopt it as many manufacturers are producing it.
• Bluetooth technology uses the globally available unlicensed ISM radio
band of 2.4GHz. the ISM (Industrial, Scientific and Medical) band
frequency 2.4-2.483GHz do not require an operator’s license.

• From any authority, Bluetooth supports both voice and data as it supports
both circuit switching and packet switching.
• Bluetooth devices in a piconet share a common communication data
channel. The channel has a total capacity of 1 megabit per second
(Mbps). Headers and handshaking information consume about 20 percent
of this capacity.
• A data channel hops randomly 1,600 times per second between the 79
(or 23) RF channels.
7 | PAGE
BLUETOOTH TECHNOLOGY

• Each channel is divided into time slots 625 microseconds long.


• Data in a packet can be up to 2,745 bits in length.
• Slots not reserved for SCO links can be used for ACL links.
• One master and slave can have a single ACL link.

BLUETOOH ARCHITECTURE
The basic element of Bluetooth is piconet.
 Piconet is a collection of slave devices operating together with one
common master.

8 | PAGE
BLUETOOTH TECHNOLOGY

Slave-1
Master SLAVE-3

SLAVE SLAVE-2

Slave
Master
(c)
(a)
(b)

(A) Single-slave piconet (B) Multi-slave piconet

(C) Scatter-net

 Several piconets can be established and linked together in a


topology called Scatter-net. Only one piconet can be active at any
time.

 Different piconet in Scatter-net can participate through time division


multiplexing (TDM) sharing a common channel.

9 | PAGE
BLUETOOTH TECHNOLOGY

 Baseband (BB)
 Link Manager Protocol(LMP)
 Logical Link Control and Adaptation Layer(L2CAP)
 Services Discovery Protocol(SDP)
 Radio Frequency Communication (RFCOMM)
 Telephony Control Specification Binary(TCS BIN)
 Attention Sequence(AT)
 Point-to-point Protocol(PPP)
 User Datagram Protocol (UDP)
 Transmit Control Protocol (TCP)
10 | P A G E
BLUETOOTH TECHNOLOGY

 Internet Protocol (IP)


 Object Exchange Protocol (OBEX)
 Wireless Application Protocol (WAP)
 vCard
 vCalender
 Wireless Application Environment (WAE)

MAIN REASONS TO USE A BLUETOOTH DEVICE

➢ Bluetooth Devices are Wireless.


➢ Bluetooth Technology is Inexpensive.
➢ Bluetooth is Automatic.
➢ Standardized Protocol = Interoperability
➢ Low Interference
➢ Low Energy Consumption
➢ Share Voice and Data
➢ Instant Personal Area Network (PAN)
➢ Upgradeable
➢ The Technology is Here to Stay

11 | P A G E
BLUETOOTH TECHNOLOGY

BLUETOOTH CHRACTERISTICS

Sr.No. Features Performance


1. Operating Frequency 2.4GHz
2. Transmission Power 1 mW
3. Data Rate 720 kbps
4. Range 10 meters
5. Number of 8
Devices/piconet
6. Number of voice channel 3
7. Connectivity Type Spread
spectrum
12 | P A G E
BLUETOOTH TECHNOLOGY

GENERAL BLUETOOTH PROFILE


General profiles used in various models by Bluetooth:

 Generic Access Profile (GAP) defines the basic rules for using the
protocol and it is the foundation for all other profiles.
 Serial Port Profile (SPP) is built on the Generic Access Profile and
defines how Bluetooth devices can be set up to emulate a serial cable
connection using RFCOMM.
 RFCOMM is a transport protocol that emulates RS-232 serial ports
between two peer devices. RFCOMM transport the user data, modem
control signals and configure commands.

 Service Discovery Application Profile (SDAP) describes the device


information, services and its characteristics necessary for establishing
connection between Bluetooth devices.
 Generic Object Exchange Profile (GOEP) defines how Bluetooth
devices support the object exchange models (OBEX).It specifies
interoperability for the application profiles and requirements of lower
protocol layers.

13 | P A G E
BLUETOOTH TECHNOLOGY

BLUETOOTH PROTOCOL STACK


Sr.No. Bluetooth Member Protocol
1. Bluetooth core i. Baseband (BB)
protocols ii. Link Manager
Protocol(LMP)
iii. Logical Link Control and
Adaptation Layer(L2CAP)
iv. Services Discovery
Protocol(SDP)
2. Cable Replacement i. Radio Frequency
Protocol Communication
(RFCOMM)
3. Telephony Control i. Telephony Control
Protocol Specification Binary(TCS
BIN)
ii. Attention Sequence(AT)
4. Adopted Protocols i. Point-to-point
Protocol(PPP)
ii. User Datagram Protocol
(UDP)
iii. Transmit Control Protocol
(TCP)

14 | P A G E
BLUETOOTH TECHNOLOGY

iv. Internet Protocol (IP)


v. Object Exchange
Protocol (OBEX)
vi. Wireless Application
Protocol (WAP)
vii.vCard
viii.vCalender
ix. Wireless Application
Environment (WAE)

BLUETOOTH CORE PROTOCOL


Bluetooth core protocol consists of following layers –

I.Baseband: The Baseband layer enables the physical RF link between


various units within piconet. Baseband layer maintains formatting
addressing of packets.
The Baseband layer provides two types of physical link-
• Synchronous Connection Oriented (SCO)
• Asynchronous Connectionless (ACL)
These physical links are multiplexed on the same link.

II. Link Management Protocol (LMP): The LMP is responsible for link
setup and control between Bluetooth devices in a piconet. This
includes security aspects such as authentication encryption generating
and exchanging link encryption keys. It also controls the Baseband
packet and packet size.

III. Logical Link Control and Adaptation Protocol (L2CAP): It


performs following functions –
i. Packet segmentation
ii. Multiplexing and Demultiplexing of packets
iii. Quality of service (QOS) L2CAP receives data packets up to 64 kilo
bytes in length from upper layer and transmits them into suitable
frames. L2CAP supports asynchronous connection oriented links. Data
packets from upper layer such as RFCOMM and telephony are
multiplexed and demultiplexed for transmission and reception.
15 | P A G E
BLUETOOTH TECHNOLOGY

L2CAP handles QOS requirements for entire operation phase such


as link establishment, transmission and reception. Voice quality channels
for audio and telephony applications are run over the Baseband
synchronous connection oriented links.

iv. Service Discovery Protocol (SDP):


SDP performs devices information, services and the characteristics of
the services. The user may select the desires service from the available
services between the Bluetooth devices.

Cable Replacement Protocol (RFCOMM)


RFCOMM delivers control signaling over wireless links.RFCOMM is a
virtual serial port that uses control, data signals over the Baseband and
provides transport mechanisms.

Telephony Control Protocol

i. Telephony Control Specification Binary (TCS BIN):


TCSBIN is a bit-oriented protocol. TCSBIN defines the call control
signaling for setting up speech and data calls between Bluetooth devices.
It also specifies mobility management procedures for handling TCS
devices.
ii. Attention Sequence (AT): TCSBIN also specifies a set of AT
commands. AT commands defines how a mobile phone or modem can be
controlled.

Adopted Protocols

These protocols are reused for different purposes at higher layers in


Bluetooth architecture. The adopted protocols are PPP, TCP/UDP/IP, OBEX,
and WAE/WAP.

16 | P A G E
BLUETOOTH TECHNOLOGY

BLUETOOTH APPLICATION
1. Ad hoc networking- Immediate network can be erected without
interconnecting cables and configurations.

2. Synchronizing Data-The messages are sent to devices that


are powered off (sleep mode) e.g. when a mobile phone receives a
message, it can send it to laptop computers even if it is powered off.

3. Remote Synchronization-A laptop can be connected to Internet on a


moving vehicle through a cell phone.

4. Automatic Synchronization-All the device in an office such as PCs,


mobile phones, Intercom, Calendar, organizers etc are updated
automatically as soon as a Bluetooth device comes in contact.

5.3-in-1 Handset-In office a phone will work as a intercom, at home as


cordless phones or while moving it will work as cell phone.

6. Cable replacement-Bluetooth wireless eliminates the need of cabling to


inter connect devices. It also replaces multiple type of connections are
single radio link. The connections are instant and can be maintained even
when device is not within line of sight.

17 | P A G E
BLUETOOTH TECHNOLOGY

BLUETOOTH SECURITY
In any wireless networking setup, security is a concern. Devices can
easily grab radio waves out of the air, so people who send sensitive
information over a wireless connection need to take precautions to make sure
those signals aren't intercepted.

Bluetooth technology is no different -- it's wireless and therefore


susceptible to spying and remote access, just like Wi-Fi is susceptible if the
network isn't secure. With Bluetooth, though, the automatic nature of the
connection, which is a huge benefit in terms of time and effort, is also a benefit
to people looking to send you data without your permission.

Service-level security and device-level security work together to protect


Bluetooth devices from unauthorized data transmission. Still, early cell-phone
virus writers have taken advantage of Bluetooth's automated connection
process to send out infected files. However, since most cell phones use a
secure Bluetooth connection that requires authorization and authentication
before accepting data from an unknown device, the infected file typically
doesn't get very far.

When the virus arrives in the user's cell phone, the user has to agree to
open it and then agree to install it. This has, so far, stopped most cell-phone
viruses from doing much damage. See How Cell-phone Viruses Work to learn
more.

Other problems like "bluejacking," "bluebugging" and "Car Whisperer"


have turned up as Bluetooth-specific security issues. Bluejacking involves
Bluetooth users sending a business card (just a text message, really) to other
Bluetooth users within a 10-meter (32-foot) radius.

The Car Whisperer is a piece of software that allows hackers to send


audio to and receive audio from a Bluetooth-enabled car stereo. Like a
computer security hole, these vulnerabilities are an inevitable result of
technological innovation, and device manufacturers are releasing firmware
upgrades that address new problems as they arise.

18 | P A G E
BLUETOOTH TECHNOLOGY

BLUETOOTH ADVANTAGES
➢ Widely Used:
Bluetooth is now really popular and keeps getting more popular as time
passes by. It is now widely used across countries and almost by everyone.
Companies are taking the benefit by using this in their new and future products
to make life much easier for everyone. Pretty much very soon, you will be
noticing quite a bit of technology will be wireless due to Bluetooth. As it is
already, but most likely it will be more dominant. You can use Bluetooth on
laptops, cell phones, music players, headsets, printers and a lot more other
products.

➢ Feature Simplicity:
You do not need to know much about technology in order to run Bluetooth.
Anyone that doesn't have no knowledge about the new technology can still be
able to use the Bluetooth feature due to its simplicity and the ease of use. I
think that the simplicity of it and the fact that it's wire free makes it very
widely used and utmost popular.

➢ Free of Charge:
Best of all, you do not have to pay a penny for the service! It's not an extra cell
phone or cable bill that you have to add to your budget. Simply by the
technology and you're done! All you need to do is connect it with what you are
using. There hasn't been any reporting lately on companies charging a monthly
fee or any fee for people to use the Bluetooth feature and I don't expect it.

➢ Go Wireless:
It allows you to stay cord free and do not have to worry about finding the
correct place to connect that extra long cord. Avoid having to have a ton of
cords wherever you go. You may still need a few cords but not as much as you
would without Bluetooth. You can also go to the internet wirelessly with this
feature when you're out somewhere outside of your home.

➢ You’re in Control:
Even though you are able to exchange data across your cell phones, you still
have the ability to keep your information private. In order to make a transfer or
allow someone to access the files on your phone, you will have to give them
access by accepting or rejecting the request through your phone. If you have
the Bluetooth feature enabled on your phone and not disabled while using it,
others that you may not even know request to send you a file

19 | P A G E
BLUETOOTH TECHNOLOGY

BLUETOOTH DISADVANTAGES
➢ Battery Use:
This occurs mostly on your cell phone but also occurs in other technology
such as music players. You're using up more battery power when you leave
your Bluetooth enabled on your phone all day. To disregard all this, the best
thing that you can possibly do is disable it once you are completed with the
transfer. It only takes a few seconds to enable and disable so it wouldn't hurt to
disable it once you are done using it.

➢ Bluetooth Internet:
Throughout all devices, when using Bluetooth internet, the connection
can sometimes run very slow so Bluetooth internet is not highly suggested for
all cases.

As you can notice that there are quite a bit of advantages and fewer
disadvantages. Overall, Bluetooth is a great thing to be using on all your
devices that supports it. You can do so much with it and includes cutting all the
cords attached to your devices.

CONCLUSION:

Even though we are able to exchange data across our cell phones, we still
have the ability to keep our information private. In order to make a transfer or
allow someone to access the files on our phone, we will have to give them
access by accepting or rejecting the request through your phone. If we have
the Bluetooth feature enabled on our phone and not disabled while using it,
others that we may not even know request to send us a file.

20 | P A G E
BLUETOOTH TECHNOLOGY

21 | P A G E

Anda mungkin juga menyukai