Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

ASSIGNMENT- 2

CO-415 WMC

BLUETOOTH
Name:PALAK MEENA
Roll No: 2K18/IT/080

Explain Bluetooth in brief:

Bluetooth wireless technology is a short-range communications technology intended to


replace the cables connecting portable unit and maintaining high levels of security. Bluetooth
technology is based on Ad-hoc technology also known as Ad-hoc Pico nets, which is a
local area network with a very limited coverage.

The usage of Bluetooth has widely increased for its special features.

• Bluetooth offers a uniform structure for a wide range of devices to connect and
communicate with each other.

• Bluetooth technology has achieved global acceptance such that any Bluetooth
enabled device, almost everywhere in the world, can be connected with Bluetooth
enabled devices.

• Low power consumption of Bluetooth technology and an offered range of up to ten


meters has paved the way for several usage models.
• Bluetooth offers interactive conference by establishing an adhoc network of laptops.

Piconets and Scatternets

Bluetooth enabled electronic devices connect and communicate wirelessly through


shortrange devices known as Piconets. Bluetooth devices exist in small ad-hoc
configurations with the ability to act either as master or slave the specification allows a
mechanism for master and slave to switch their roles. Point to point configuration with one
master and one slave is the simplest configuration.

When more than two Bluetooth devices communicate with one another, this is called a
PICONET. A Piconet can contain up to seven slaves clustered around a single master. The
device that initializes establishment of the Piconet becomes the master.

The master is responsible for transmission control by dividing the network into a series of
time slots amongst the network members, as a part of time division multiplexing
scheme which is shown below.
The features of Piconets are as follows −

• Within a Piconet, the timing of various devices and the frequency hopping sequence
of individual devices is determined by the clock and unique 48-bit address of
master.

• Each device can communicate simultaneously with up to seven other devices within a
single Piconet.
• Each device can communicate with several piconets simultaneously.

• Piconets are established dynamically and automatically as Bluetooth enabled devices


enter and leave piconets.

• There is no direct connection between the slaves and all the connections are
essentially master-to-slave or slave-to-master.
• Slaves are allowed to transmit once these have been polled by the master.

• Transmission starts in the slave-to-master time slot immediately following a polling


packet from the master.

• A device can be a member of two or more piconets, jumping from one piconet to
another by adjusting the transmission regime-timing and frequency hopping sequence
dictated by the master device of the second piconet.

• It can be a slave in one piconet and master in another. It however cannot be a master
in more than once piconet.

• Devices resident in adjacent piconets provide a bridge to support inner-piconet


connections, allowing assemblies of linked piconets to form a physically extensible
communication infrastructure known as Scatternet.
Protocol Stack

The core protocols of Bluetooth comprise the following elements:


• Radio: Specification of the air interface, i.e., frequencies, modulation, and transmit
power. Bluetooth uses the license-free frequency band at 2.4 GHz allowing for
worldwide operation with some minor adaptations to national restrictions. A
frequency-hopping/time-division duplex scheme is used for transmission, with a fast
hopping rate of 1,600 hops per second. The time between two hops is called a
slot, which is an interval of 625 μs. Each slot uses a different frequency. Bluetooth
uses 79 hop carriers equally spaced with 1 MHz. After worldwide harmonization,
Bluetooth devices can be used (almost) anywhere.

• Baseband: Description of basic connection establishment, packet formats, timing, and


basic QoS parameters. The functions of the baseband layer are quite complex as it
not only performs frequency hopping for interference mitigation and medium access,
but also defines physical links and many packet formats. If, for example, the master
sends data at fk, then a slave may answer at fk+1. This scenario shows another
feature of Bluetooth. TDD is used for separation of the transmission directions.
The Bluetooth packet typically consists of the following three fields: access code,
packet header and payload.

• Link manager protocol: Link set-up and management between devices including
security functions and parameter negotiation. The following groups of functions are
covered by t he LMP: Aut hent icat ion, pairing, and encr yp t ion;
Synchronisation, Capability negotiations, QoS negotiations, Power
control, Link supervision & state and transmission mode change.
To save battery power, a Bluetooth device can go into one of three
low power states: sniff state, hold state and park state
• Logical link control and adaptation protocol (L2CAP): Adaptation of higher layers to
the baseband. L2CAP provides three different types of logical channels that are
transported via the ACL between master and slave: connectionless, connection-
oriented and signaling.
There are three packet types belonging to the three logical channel types. The length
field indicates the length of the payload (plus PSM for connectionless PDUs). The CID
has the multiplexing/demultiplexing function.
For connectionless PDUs a protocol/service multiplexor (PSM) field is needed to
identify the higher layer recipient for the payload. For connection-oriented PDUs the
CID already fulfills this function. Several PSM values have been defined, e.g., 1
(SDP), 3 (RFCOMM), 5 (TCS-BIN). Values above 4096 can be assigned dynamically.
The payload of the signaling PDU contains one or more commands. Each command
has its own code (e.g., for command reject, connection request, disconnection
response etc.) and an ID that matches a request with its reply. The length field
indicates the length of the data field for this command.

• Service discovery protocol: Device discovery in close proximity plus querying of


service characteristics. SDP defines only the discovery of services, not their usage.
Discovered services can be cached and gradual discovery is possible. Devices that
want to offer a service have to install an SDP server. For all other devices an SDP
client is sufficient. All the information an SDP server has about a service is
contained in a service record. This consists of a list of service attributes and is
identified by a 32-bit service record handle. SDP does not inform clients of any
added or removed services. There is no service access control or service
brokerage. A service attribute consists of an attribute ID and an attribute value.
The 16-bit attribute ID distinguishes each service attribute from other service
attributes within a service record. The attribute ID also identifies the semantics of
the associated attribute value. The attribute value can be an integer, a UUID
(universally unique identifier), a string, a Boolean, a URL (uniform resource
locator) etc.

You might also like