+ All Categories
Home > Technology > Blue tooth by k pant

Blue tooth by k pant

Date post: 12-Aug-2015
Category:
Upload: kaushal-pant
View: 104 times
Download: 1 times
Share this document with a friend
Popular Tags:
41
BLUETOOTH BLUETOOTH TECHNOLOGY TECHNOLOGY PRESENTED BY :- KAUSHAL PANT{BSc (JNU),BA(PUB ADM) (IGNOU)}
Transcript

BLUETOOTH BLUETOOTH TECHNOLOGYTECHNOLOGY

PRESENTED BY :-

KAUSHAL PANT{BSc (JNU),BA(PUB ADM)

(IGNOU)}

AIM

TO ACQUAINT ABOUT

BLUETOOTH TECHNOLOGY.

PREVIEW• PHASE –I INTRODUCTION AND HISTORY

• PHASE- II WORKING OF BLUETOOTH NETWORK

BWT TOPOLOGIES & CLASSES

BWT PROTOCOLS

• PHASE- III BWT SECURITY AND MITIGATIONS

ADVANTAGES AND DISADVANTAGES

APPLICATIONS

HEALTH CONCERNS

FUTURE TRENDS AND MIL APPLICATIONS • PHASE- IV CONCLUSION

PHASE –I

INTRODUCTION

INTRODUCTION

• SHORT RANGE LOW POWER WIRELESS

TECHNOLOGY

• INTER CONNECTIONS WITH OTHER PERIPHERALS.

• EXCHANGE DATA OVER SHORT DISTANCES.

• EASY CONNECTION BETWEEN DEVICES

• WIRELESS ALTERNATIVE TO RS-232 DATA CABLES.

• MECHANISM TO FORM SHORT AD-HOC NETWORK.

HISTORY• 1994: ERICSSON CAME UP WITH A CONCEPT OF

“MULTI –COMMUNICATOR LINK”.

• RENAMING TO BLUETOOTH IN NAME OF HARALD

“BLÅTAND” GORMSEN OR HARALD BLUETOOTH,

• 1998 : FOUNDATION OF BLUETOOTH SIG.

• 2001 : FIRST CONSUMER PRODUCTS VERSION

1.1 RELEASED.

• 2003  - SIG ANNOUNCED VERSION 2.1.• 2004  - BLUETOOTH VERSION 2.0 + EDR (ENHANCED DATA RATE) INTRODUCED.

HISTORY

• 2007 - BLUETOOTH VERSION 2.1 + EDR ADOPTED

BY BLUETOOTH SIG.

• 2009 - BLUETOOTH VERSION 3.0 + HS (HIGH

SPEED) ADOPTED BY BLUETOOTH SIG.

• 2010 - BLUETOOTH CORE SPECIFICATION

VERSION 4.0 (CALLED BLUETOOTH SMART)•2013 - BLUETOOTH V4.1 

•DECEMBER 2, 2014 - BLUETOOTH V4.2

PHASE –II

TECHNOLOGY REVIEW

TECHNOLOGY REVIEW

• A BLUETOOTH CHIP COMBINES A TRANSMITTER AND RECEIVER, AS SMALLER AS 9 MM X 9 MM AND AN ANTENNA. • UNLICENSED INDUSTRIAL, SCIENTIFIC AND MEDICAL (ISM). • FREQUENCIES BETWEEN 2400 AND 2483.5 MHZ (INCLUDING  GUARD BANDS  2 MHZ (BOTTOM) AND 3.5 MHZ (TOP).79 CHANNELS BANDWIDTH OF 1 MHZ.•  BLUETOOTH USES FREQUENCY-HOPPING SPREAD SPECTRUM (FHSS). • 1600 HOPS /SEC, WITH  ADAPTIVE FREQUENCY-HOPPING (AFH).

DEVICE

CHIP(1998) CHIP(PRESENT)

BLUETOOTH TOPOLOGIES

• PICONETS AND SCATTERNET FORMATION.

• A MASTER BLUETOOTH DEVICE CAN

COMMUNICATE WITH A MAXIMUM OF SEVEN DEVICES

IN A PICONET .

• MASTER-UNIT ESTABLISHES A FREQUENCY-

HOPPING SCHEME.

• ROLE SWITCHING, BY AGREEMENT.

• ROUND-ROBIN FASHION FOR DATA TRANSFER IN

PACKETS.

BLUETOOTH CONNECTIONS

TWO TYPES OF DATA EXCHANGE “MODE” :-

• ASYNCHRONOUS CONNECTION-ORIENTED LOGICAL TRANSPORT (ACL)

- USED FOR DATA CONNECTIONS

• SYNCHRONOUS CONNECTION-ORIENTED LINK (SCO), ENHANCED SCO (ESCO)

– USED FOR VOICE DATA

CLASSES OF BLUETOOTH

BLUETOOTH DEVICES ARE CLASSIFIED

ACCORDING TO THREE DIFFERENT POWER CLASSES,

AS SHOWN IN THE FOLLOWING TABLE.

CLASSMAX

PERMITTED POWER(MW)

RANGE(APPROX)IN MTRS

Class 1 100 100

Class 2 2.5 50

Class 3 1 10

BLUETOOTH PROTOCOLS

PROTOCOL STACK

LLC

LINK MANAGER

Application Framework and Support

Link Manager and L2CAP

Radio & BasebandRF

Baseband

AudioLink Manager

L2CAP

TCP/IP

DATAC

ON

TRO

L

BLUETOOTH PROTOCOLS

HID RFCOMM

Applications

Host Controller Interface

PHASE –III

BLUETOOTH SECURITY

BLUETOOTH SECURITY

• SUSCEPTIBLE TO SPYING AND REMOTE ACCESS.

• INTERFERENCE AND EAVESDROPPING

• SAFER TRANSMISSION OF DATA.

• INFORMATION INTEGRITY.

• DENIAL OF SERVICE, UNINTENDED CONTROL AND

ACCESS OF DATA AND VOICE CHANNELS.

• UNAUTHORIZED DEVICE CONTROL AND DATA

ACCESS.

1. SAFER TRANSMISSION OF DATAa) AUTHENTICATIONb) AUTHORIZATIONc) ENCRYPTION

THREE MODES :-

a) MODE 1 - NO SECURITYb) MODE 2 - SERVICE LEVEL SECURITYc) MODE 3 – LINK LEVEL SECURITY(PAIRING

BLUETOOTH SECURITY

• DEVICES ARE MANUFACTURED WITH A UNIQUE 48-BIT IDENTIFIER KNOWN AS THE BLUETOOTH DEVICE ADDRESS (BD_ADDR).

• PUBLICALLY KNOWN AND CAN BE OBTAINED VIA AN INQUIRY ROUTINE PERFORMED BY ANY BLUETOOTH DEVICE.

• THE BD_ADDR OF THE MASTER DEVICE IS USED TO DERIVE THE DEVICE ACCESS CODE (DAC) AND THE CHANNEL ACCESS CODE (CAC), WHICH ARE TRANSMITTED IN CLEAR-TEXT.

BLUETOOTH SECURITY

ERROR CORRECTION

2. ERROR CORRECTION TYPES:-

a) FORWARD ERROR CORRECTION (FEC)- REDUCES NO OF RE-TRANSMISSIONS.

b) AUTOMATIC REPEAT REQUEST (ARQ)- CORRECTS THE CORRUPTED

TRANSMITTED DATA BLOCK.

3. FREQUENCY HOPPING TO AVOID INTERFERENCE

ERROR CORRECTION

MITIGATIONS

•ENABLE BLUETOOTH ONLY WHEN REQUIRED.

•ENABLE BLUETOOTH DISCOVERY ONLY WHEN

NECESSARY, AND DISABLE DISCOVERY WHEN FINISHED.

•DO NOT ENTER LINK KEYS OR PINS WHEN

UNEXPECTEDLY PROMPTED TO DO SO.

•REMOVE PAIRED DEVICES WHEN NOT IN USE.

•REGULARLY UPDATE FIRMWARE ON BLUETOOTH-

ENABLED DEVICES.

BLUETOOTH TECHNOLOGY

Advantages and Disadvantages

ADVANTAGES • ELIMINATES WIRES

• FACILITATES DATA AND VOICE COMMUNICATION

• OFFERS FORMATION OF AD HOC NETWORKS

• STANDARDIZED PROTOCOL

• FREE OF CHARGE

• EASY TO USE

• LOW POWER CONSUMES BATTERY LESS

• STATIONARY AND MOBILE ENVIRONMENTS

DISADVANTAGES

• RELATIVELY SHORT RANGE.

• LESS SECURE.

• INTERFERENCE WITH OTHER DEVICES.

• MEDIOCRE DATA RATES.

• BLUETOOTH INTERNET CONNECTION GETS

SLOW SOMETIMES.

HEALTH CONCERNS

HEALTH CONCERNS

• BLUETOOTH USES 2.4 GHZ TO 2.480 GHZ.

• SAME FREQUENCY RANGE AS MICROWAVE OVENS.

• EMITTED RF ENERGY IS ABSORBED BY THE BODY.

• PENETRATION DEPTH IS ABOUT 1.5 CM AT 2450 MHZ.

• ABSORPTION IS VERY SUPERFICIAL.

FUTURE OF BLUETOOTH

FUTURE OF BLUETOOTH

GENERIC NAVIGATION SATELLITE SYSTEM (GNSS)

• CREATE A WIRELESS SERIAL LINK SO A DEVICE

CAN SHARE ITS GPS POSITION DATA USING.

AUDIO STREAMING

• ADVANCED AUDIO DISTRIBUTION

• AUDIO VIDEO REMOTE CONTROL

• BROWSE YOUR MP3 PLAYER’S MUSIC AND

PLAYLISTS DIRECTLY FROM YOUR CAR USER

INTERFACE.

RECENT TRADITION

TELEPHONY

• HANDS FREE PROFILE

GENERIC OBJECT EXCHANGE

• BETTER QUALITY OF SERVICE.

• SERVICE MULTIPLEXING IS NOW

ENTIRELY DONE BY L2CAP.

• BETTER THROUGHPUT.

FUTURE OF BLUETOOTH

Bluetooth has a good future ahead because it meets a basic need of connectivity.

Currently a protocol is being researched that would support large adhoc networks.

Latest version of Bluetooth are improving both its security and capabilities.

Ultra wide band has been chosen by the Bluetooth Special Interest Group as the future of Bluetooth Technology.

New versions of Bluetooth technology will meet the high-speed and large range.

Many companies are designing impressive Bluetooth applications in demand.

MILITARY APPLICATIONS

IN MILITARY BLUETOOTH TECHNOLOGY CAN BE USED IN VARIOUS FIELDS AS:-

A) COMMUNICATION

B) SECURITY

C) IDENTIFICATION

D) TRAINING

E) TARGET EVALUATION

F) GPS

GENERIC NAVIGATION SATELLITE SYSTEM (GNSS)

PHASE –IV

CONCLUSION• A NEW GLOBAL STANDARD FOR DATA AND VOICE -ENABLED DEVICES WHICH OPERATE IN THE UNRESTRICTED 2.4-GHZ ISM BAND.

• ELIMINATING CABLES.

• LOW POWER, COST NETWORK DEVICES.

• BLUETOOTH HAS A BRIGHT FUTURE FOR WIDE USE.• FURTHER IMPROVEMENTS ARE PLANNED TO BE MADE IN

– DATA RATES– POWER REDUCTION– RANGE

ULTRA WIDE BAND

•  UWB OR AS DIGITAL PULSE WIRELESS IS A  WIRELESS TECHNOLOGY• TRANSMITS LARGE AMOUNTS OF DIGITAL DATA OVER A WIDE SPECTRUM OF FREQUENCY BANDS WITH VERY LOW POWER FOR A SHORT DISTANCE. • CAN CARRY A HUGE AMOUNT OF DATA OVER A DISTANCE UP TO 230 FEET AT VERY LOW POWER (LESS THAN 0.5 MILL WATTS).• ABILITY TO CARRY SIGNALS THROUGH DOORS AND OTHER OBSTACLES


Recommended