Download as pdf or txt
Download as pdf or txt
You are on page 1of 12

HO CHI MINH CITY UNIVERSITY OF TECHNOLOGY AND EDUCATION

FACULTY OF INTERNATIONAL EDUCATION




MID-TERM REPORT

Subject: Data Communication

CLASS CODE: DACO430664E_22_2_02FIE


LECTURER: Nguyen Van Phuc
GROUP: 4
SEMESTER II - YEAR: 2022 - 2023

Nội dung sửa chữa:


Chỉnh sửa cấu trúc
Thêm phần lịch sử của bluetooth
Thêm các thế hệ của bluetooth
Soá bỏ phần ic hc05
Chỉnh sửa trang bìa
Chỉnh sửa phần tài liệu tham khảo
Thêm tên cho hình ảnh

HO CHI MINH CITY - APRIL 2023


Content: Bluetooth

Group: 4
Member:
Huynh Duong Ton Luc - 21161252
Nguyen Tuan Kiet - 21161249
Phan Ngoc Khiem - 21119310

Assignment sheet:
Name: Mission: Participate:
Huynh Duong Ton Luc -Advantages of Bluetooth transmission 100%
-History of bluetooth
-Bluetooth “generations”
-Assign, check, fix errors

Nguyen Tuan Kiet -Security of bluetooth, 100%


-The use andmanagement of energy in
bluetoothtechnology
-Conclution

Phan Ngoc Khiem -Introduction of bluetooth 100%


-Principle of operating of bluetooth
Table Of Contents
I/ Introduce Bluetooth................................................................................2
II/ History of bluetooth...............................................................................2
III/ Bluetooth “generations”......................................................................2
IV/ Principle of operating...........................................................................3
IV.1 How Bluetooth Works……..……………………..............................................................3
IV.2 Frequency hopping spread technique in Bluetooth ...............…………............................4
IV.3 Time Slots ......…………………………………………...................................................5
IV.4 Protocol layers in Bluetooth..............................................................................................5
V/ Security of bluetooth................................................................................6
V.1 Bluetooth security issues.....................................................................................................6
V.2 Bluetooth security process..................................................................................................6
VI/ The use and management of energy in bluetooth technology.............7
VII/Advantages of Bluetooth transmission.................................................7
VII.1 Wireless data transfer between mobile devices and computers........................................8
VII.2 Share a network connection via Bluetooth.......................................................................8
VII.3 Connecting peripherals....................................................................................................9
VII.4 User-friendly health.........................................................................................................9
VIII/Conclusion............................................................................................9

1
I. Introduce Bluetooth
Bluetooth is a wireless technology that allows electrical and electronic devices to
communicate with each other over isolated distances, radio band on band 2.40 JSM
(industrial, scientific, medical) per floor area + 2.48 gigahertz. And can transmit voice and
data.
II. History of bluetooth
Bluetooth was created by Dr. Jaap Haartsen at Ericsson in 1994. The name "Bluetooth"
(meaning "blue tooth") is named after a Danish king - King Harald Bluetooth, who was
famous for his ability allows people to communicate and negotiate with each other. That's
why this king is named for bluetooth technology.

- In 1998, the Bluetooth Special Interest Group (SIG) was established with the first
participation of Ericsson, IBM, Intel, Nokia and Toshiba, representing the standardization
and promotion of the new Bluetooth version. Later, many other companies also joined as
collaborators or facilitators. Bluetooth is also known as IEEE 802.15.1.

- In 1999, the first commercial Bluetooth version and aimed at general users was released.
The first commercial mobile phone with Bluetooth was the Sony Ericsson T36. The device
has a monochrome LCD screen configuration of 101 x 54 pixels, 3-band GSM Internet
connection, WAP and memory that can store up to 1000 contacts.

- Currently, mobile devices such as laptops, smartphones or tablets are mostly equipped
with Bluetooth connectivity standards, usually 3.0 or 4.0. Bluetooth can reach 1Mbps data
transfer rate. Bluetooth supports data transfer rates up to 720 Kbps within 10m. Unlike
infrared (IrDA) connections, Bluetooth connections are scalar and use the 2.4 GHz band.

- One of the applications of this technology that is receiving a warm welcome from young
people is bluetooth headsets.

III. Bluetooth “generations”


Bluetooth 1.0. In July 1999, the first Bluetooth 1.0 version was released to the market
with an initial connection speed of 1Mbps. However, in fact, the connection speed of this
generation has never exceeded 700Kbps.

Bluetooth 1.1. In 2001, Bluetooth version 1.1 was born, marking a new development of
Bluetooth technology in many different fields with the interest of many new manufacturers.

Bluetooth 1.2. Released in November 2003, Bluetooth 1.2 began to make significant
advances. This standard operates on the 2.4 Ghz frequency band and enhances voice
connectivity. The Motorola RARZ is the first mobile phone with built-in Bluetooth 1.2.

Bluetooth 2.0 + ERD. A year later, in November 2004, Bluetooth 2.0 + ERD
technology began to increase speed and reduce energy consumption by half compared to
2
before. Typical devices using Bluetooth 2.0 + ERD are: Apple iPhone, HTC Touch Pro and
T-Mobile's Android G1.

Bluetooth 2.1 + ERD. This is the upgraded generation of Bluetooth 2.0. This standard
has mainly been used in phones, computers and other mobile devices.

Bluetooth 3.0 + HS: April 2009, Bluetooth 3.0 officially launched. Bluetooth 3.0 has a
data transfer rate of 24Mbps - equal to Bluetooth - High Speed, equivalent to the first
generation Wi-Fi standard. In particular, it can automatically detect nearby devices and
switch directly to a Wi-Fi network if those devices have a Wi-Fi connection. However, the
most effective range is only within 10m.

Bluetooth 4.0: Bluetooth 4.0 has many features in common with the 3.0 standard, but in
addition to the ability to transmit high-speed data up to 25 Mbps, Bluetooth 4.0 also adds
the ability to transmit small-capacity data in a short range ( 8-27 bytes at 1Mbps) with very
low power consumption which saves energy compared to the old standard.

IV. Principle of operating


In the age of technology, bluetooth-integrated devices such as phones, computers,
headphones, music speakers, etc. have become so familiar to us. However, what is
bluetooth technology, how does it work, and how it works, not everyone knows. The
following is the principle of operation of bluetooth.
4.1. How Bluetooth Works
Here are the main steps to get Bluetooth working:
+ Scanning: Bluetooth devices will scan and search for other devices within their range.
This process helps Bluetooth devices identify available devices around and displays a
list of found devices.

+ Pairing: Once other devices are found, the Bluetooth devices need to be paired with
each other to establish a secure connection and encrypt data between them. During pairing,
Bluetooth devices need to share encrypted information, such as a PIN (Personal
Identification Number) or a dynamic token (Passkey) to verify the authenticity of the
devices.

+ Connection Establishment: After completing the pairing process, Bluetooth devices


will establish a wireless connection between them. This process includes setting connection
parameters such as frequency, power, sensitivity, and checking the correctness of the
connection.
Data Transmission and Reception: Once the connection has been established,
Bluetooth devices can transmit and receive data between them. The data can be audio,
images, text, or other types of data supported by the Bluetooth protocol.

+ Connection Control and Management: During operation, Bluetooth devices have the
ability to control and manage the connection between them. These activities may include
3
signal generation power control, frequency management, handling frequency conflicts,
error control, and maintaining connection stability.
Power Saving Mode: Bluetooth supports power saving mode to reduce energy
consumption.

4.2. Frequency hopping spread technique in Bluetooth


The Bluetooth (BT) Special Interest Group (SIG) initially incorporated frequency
hopping spread spectrum (FHSS) in the Core Specification Version 1.2. The fundamental
tenet is that each piconet member uses the same channel frequency,
which is regularly modified. Frequency hops between channels

in the unlicensed ISM band at 2.4 GHz affect the frequency of a BT radio. In order to
lessen the 2 impacts of interference and to comply with local regulatory standards, the
hopping process is carried out in a pseudo-random manner.The 79 channels in the channel
set, each with a bandwidth of 1 MHz, are available for the BT device to hop onto. The
relationship between the channel's center frequency (fc) and channel number (k) can be
summed up as follows: fc = 2402 MHz + k ∙ 1 MHz ; k = 0, 1, .., 78

(FHSS example in the IMS band and bad channels due to a coexisting WLAN singnal)

A pseudo+random hopping through all 79 RF channels is what defines the fundamental


piconet physical channel. The master's clock and BT device address are used to create a
special hopping pattern. The slave clock is synchronized to the master clock after the
piconet has been established by adding an offset to the slave's native clock. Because the
device clocks are independent, the offsets are adjusted often.

As a result, the time and frequency of every device connected to the piconet is
synchronized. The block diagram below depicts a common setup with a synchronized BT
transmitter and BT receiver.

4
4.3. Time Slots
The most significant 27 bits of the BT clock are used to number the 625+second time slots
that make up BT transmission channels. Therefore, the time slot number, indicated as k, falls
between 0 and 227+1. The maximum specified BT standard packet transmission on the CMW is
five time slots, which can be used for BT packet transfer.

(TDD scheme: Multi-slot packet transmission and frequency hops f(k))

4.4. Protocol layers in Bluetooth


Bluetooth uses a layered protocol architecture, similar to the OSI model, to support
communication between devices. The Bluetooth protocol stack consistsof several layers, each
with its own specific functionality. These classes are:
+ Physical Layer: This layer defines the physical properties of the Bluetooth radioand how
data is transmitted over the network. It includes the modulation scheme,frequency band and
power level used for transmission.

+Link Layer: This layer manages the establishment, maintenance, and termination of
connections between Bluetooth devices. It also handles packet formatting and error correction.

+L2CAP (Logical Link Control and Adaptation Protocol) Layer: This layer provides a
reliable data channel between two Bluetooth devices, allowing the transmission of larger data
packets than the Link Layer. It also supports multiple logical connections between devices.

+RFCOMM (Radio Frequency Communication) Layer: This layer simulates a serial port
connection between two Bluetooth devices, allowing them to exchange data using a serial
interface. It is commonly used to support legacy applications that rely on serial port connections.

+Service Discovery Protocol (SDP) Layer: This layer allows Bluetooth devices to discover
the services and capabilities of other devices on the network. It uses a standardized format for
service and device discovery.

+Configuration Layer: This class defines specific applications and use cases for Bluetooth,
such as audio streaming, file transfer, and device control. Each profile defines a set of protocols
and procedures for successful application execution. These layers worktogether to provide a
robust, reliable, and secure wireless communication environment for Bluetooth devices.
5
(Audio Gateway Application)

V. Security of bluetooth
5.1. Bluetooth security issues
Bluetooth is a widely used wireless technology in electronic devices such as phones,
tablets, and headphones. However, like any wireless technology, Bluetooth also has
security and safety issues. Here are some important issues:
+ Bluetooth spoofing: Attackers can spoof Bluetooth and create a connection with your
device. They can then access the data on your device or transmit malware.
+ Bluetooth eavesdropping: Attackers can eavesdrop or monitor Bluetooth calls or
other data transmissions between devices. This can expose sensitive information such as
bank account information or passwords.
+ Bluejacking: This is an attack where the attacker sends spam messages or unwanted
files to your Bluetooth device.
+ Bluetooth Denial of Service (DoS): Attackers can attack your Bluetooth by sending
large packets or invalid messages to your device. This can disrupt or temporarily disable
your Bluetooth connection.

To protect against these issues, you should follow these safety and security tips:
+ Don't turn on Bluetooth on your device when not needed.
+ Don't connect to unidentified or untrusted Bluetooth devices.
+ Update your devices with the latest software version to ensure that security
vulnerabilities have been addressed.
+ Use specialized Bluetooth devices to minimize security and safety risks.

5.2. Bluetooth security process


The Bluetooth security process consists of three main stages to ensure the privacy and
security of data transmitted over a Bluetooth connection.

+ The first stage is the connection process. During this process, Bluetooth devices
identify each other and perform authentication using a shared key generated by encryption.
This process ensures that the connecting devices are genuine and not spoofed.
6
+ The second stage is the authentication process. In this stage, Bluetooth devices
authenticate and accurately identify each other. This process uses a Personal Identification
Number (PIN) that the user must provide during the connection. This PIN is used to verify
that the user connecting is the owner of the Bluetooth devices.

+ The final stage is the authorization process. In this stage, Bluetooth devices
determine the services and features that they can access via the Bluetooth connection and
decide whether those services and features can be accessed or not. This process ensures
that Bluetooth devices cannot access features or data that have not been authorized.

Overall, the Bluetooth security process involves using shared keys, PINs, and
authorization processes to ensure that Bluetooth devices connect to each other safely and
securely.

VI. The use and management of energy in bluetooth technology


Managing power consumption is an important aspect of Bluetooth technology. The
technology employs several techniques to minimize power consumption, including low-
power modes, adaptive frequency hopping, and power control.

Low-power modes are designed to reduce power consumption by placing the Bluetooth
device into a sleep state when not in use. Adaptive frequency hopping allows Bluetooth
devices to dynamically adjust their transmission frequency to avoid interference from other
wireless devices, which helps to conserve power. Power control adjusts the transmit power of
the Bluetooth device based on the distance between the two devices, thereby minimizing
power consumption.

In addition to these techniques, Bluetooth technology also includes various power


management features that help to optimize power consumption. For example, Bluetooth
devices can be configured to enter low+power modes automatically when not in use or when
the battery level is low.

Overall, managing power consumption is a critical aspect of Bluetooth technology that


helps to extend the battery life of devices and improve their overall performance.

VII. Advantages of Bluetooth transmission


Bluetooth is a familiar wireless connection technology and it almost present on most
technological devices today. It can transmit wirelessly data at close range with high accuracy
and security.

7
( illustration )

7.1. Wireless data transfer between mobile devices and computers


We can send files back and forth between the phone and the computer easily by using
Bluetooth connection, but if you want to send files with a big size up to several hundred
hundred MB or more, this type of transmission is not suitable. But Bluetooth is still the
most convenient method if you want to send some photos to your friends or something like
that.

For a Bluetooth connection , Bluetooth on both devices must be turned on and the two
devices must be put close together. After making sure both devices have Bluetooth enabled,
a list of Bluetooth enabled devices around you will appear, all you need to do is find the
correct name of the device you want to pair. After connecting, you can start selecting the
data you want to send to the other person (photos, songs, short videos ...), then wait for the
other person to accept, this is really simple . However, it should be noted that Bluetooth
consumes a lot of power. Therefore, turn on Bluetooth all day without using is a bad idea,
especially for mobile devices that use bin.

Data transmission between two computers is also possible by Bluetooth connection. As


long as the computers have buetooth and it located close to each other, regardless of the
operating system. This is similar to a Bluetooth connection between a phone and a
computer. Two computers, once connected, can transfer moderate+sized files without the
cables.

7.2. Share a network connection via Bluetooth


An interesting feature of Bluetooth is allows users to share one device's internet
connection with another device. Normally, Tethering via Bluetooth is used to access the
network on a laptop via the smartphone's internet connection. In this case, the phone has a
similar role to the wifi modem. Bluetooth tethering consumes less power than Wi+Fi, so it
could be the ideal choice in certain situations.
8
7.3. Connecting peripherals
Today, Bluetooth is often used a lot to connect peripherals to smartphones, tablets or
laptops. Here are some peripherals that can connect wirelessly via Bluetooth:
+Headphones: Bluetooth headphone which come with smartphones that is very
commonly in life.The connected between bluetooth headphone and your phone makes it
possible to use without the wired headphone, which is especially convenient when you are
doing someting that require a lot of movement.

+Smartwatch: Most of today's smart watches also use Bluetooth to connect to


smartphones. From there, the smartwatch can receive notifications about messages,
incoming calls, message notificationfrom from your phone quickly .

+Mouse: Bluetooth mouse can work with laptop, tablet and even smartphone
conveniently. However, blutooht mouse use batery so you need to charging after use and
some types have alittle bit high latency compared to wired mouse.

+Keyboard: the keyboard can also connect via Bluetooth, which is especially useful
when used with a tablet. When using a normal USB connection, the device is often limited
to a certain number of ports, but with Bluetooth we can connect a wireless mouse and
keyboard at the same time, which is extremely convenient without worrying about missing
ports.

+Printer: Bluetooth enabled printers allow you to print documents without a Wi+Fi or
wired connection.
7.4. User-friendly health
Waves have a very small power, only 1mW (compared to the power of
electromagnetic waves emitted by mobile phones is about 1000mW to 2000mW) because
the power is very small, so it cannot affect to human body.

In addition to the advantages on Bluetooth, there are also disadvantages:


The biggest downside of Bluetooth is that it can get noisy while it moving. The
connection distance is close , it is easy to lose connection if there is an obstacle between
the two devices, it requires charging the battery if the device uses a battery, etc

VIII. Conclusion
In this report, we have presented the benefits and significance of Bluetooth in our lives.
Bluetooth is a convenient wireless communication technology that allows users to connect
devices easily and quickly. It provides users with the ability to stream music wirelessly,
control entertainment devices remotely, and monitor health conveniently. Bluetooth has
become an integral part of our daily lives and continues to evolve to bring better
experiences to user.

9
Reference material
[1] https://components101.com/sites/default/files/component_datasheet/HC-
05%20Datasheet.pdf
[2] https://www.bluetooth.com/specifications/
https://www.alldatasheet.com/view.jsp?Searchword=Datasheet%20hc05&gclid=
[3] Cj0KCQjw3a2iBhCFARIsAD4jQB11Kz0w-GU4pU9z
URmMFfns7sc0k2HZqKRfUN46CFuJQpC9nH0VaEaAo

10

You might also like