IJRIT International Journal of Research in Information Technology, Volume 2, Issue 6, June 2014, Pg: 127-130

International Journal of Research in Information Technology (IJRIT) www.ijrit.com

ISSN 2001-5569

Radio Communication: Bluetooth and Its Configuration Dr. Reena Hooda, Assistant Professor. Indira Gandhi University Meerpur (Rewari). Haryana (India) E-mail: [email protected] Abstract: Bluetooth operates in a master-slave structure having point to multi-point communication between master and its slaves. A master is like a manger in network that is responsible for monitoring and controlling its slaves and communications. A slave is akin to an Agent that is an active member in piconet and other members are known as parked that are act as non-active member slave of master in a piconet. The current paper highlights a master slave structure and communication between different participants. The paper also involves the key features of frequency hopping technique of Bluetooth for secured communication, voice and data transmissions as well as hardware specifications. The paper also depicts the two modules i.e. radio module for modulation methods and link module for error detections and corrections for successful transmission of data between Bluetooth devices. Keywords: Master, Slave, Piconet, Scatternet, Link, Modules, Frequency Hopping.

1. Introduction Bluetooth is a packet-based protocol with a master-slave structure [1] (function of the type point to multiple-point) [2]. Two or more units can share the same channel, and these units then form a small network called Piconet [4]. One unit acts as the master of the piconet, and all other units act as slaves, a master can control up to seven slaves in his zone [2]. Each of the active slaves has an assigned 3-bit Active Member address (AM_ADDR) [10]. The master is simply the first apparatus connected and is the one that sets the clock and the frequency jumping sequence as well as the access code for the link. There can be additional slaves which remain synchronized to the master, but do not have an Active Member address [10]. These slaves are not active and are referred to as parked [10]. For the case of both active and parked units, all channel access is regulated by the master. A parked device has an 8-bit Parked Member Address (PM_ADDR), thus limiting the number of parked members to 256 [10]. A parked device remains synchronized to the master clock and can very quickly become active and begin communicating in the piconet [10]. All the Bluetooth modules of the same Piconet use the same frequency jumping sequence [2] and are synchronized with the masters clock (basic clock) which ticks at 312.5 µs intervals, for exchange of packets [1]. Two clock ticks make up a slot of 625 µs; two slots make up a slot pair of 1250 µs [1]. All packet transmissions are started at the beginning of one of the 625 µs time slots. A packet may last up to 5 time slots. In addition, these time slots can be reserved for synchronous applications such as voice data. [10] In the simple case of single-slot packets the master transmits in even slots and receives in odd slots; the slave, conversely, receives in even slots and transmits in odd slots. At first it is the master who sends a packet at a frequency f(k), the slave to whom this packet is addressed (and only this one) has the right to reply to it in the time interval following the arrival of the master packet. The reply from the slave is then given on the frequency channel f (k+1). On reception of a master packet, a synchronization word on the top of it enables the slave to re-synchronizes his clock. [2] Whatever happens, the machine's role (master or slave) is invisible to the user. Also, one apparatus/unit can participate in several piconets, being the master in one and slave in others [4]. This is accomplished through time division multiplexing [10].The interlacing of several piconets forms what is called a Scatternet. Around 10 independent piconets (or up to 80 apparatus) can transmit at maximum output. Above that, the network becomes saturated [2]. In a scatternet, the two (or more) piconets are not synchronized in either time or frequency [10]. Each of the piconets operates in its own frequency Dr. Reena Hooda,IJRIT

127

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 6, June 2014, Pg: 127-130

hopping channel (sequence) to allow communication [4], this unique hopping sequence which is determined using an algorithm that uses the Bluetooth device address of the master device [10]. All Bluetooth units in the piconet are then synchronized to this hopping sequence [10]. Any devices in multiple piconets participate at the appropriate time called full duplex transmission [10] via time division multiplexing.

SCATTERNET AS1B AS

AS1A AS

AS21

AS1C

AS22

AS1D M1 AS23

AS1E

M2 AS24

P1A P1B

AS1F AS1G

Piconet1/ Community1

AS25 P21

Full-duplex Transmission Through TDM

Piconet2/ Community2

Figure 1: Bluetooth Mater-Slave Structure AS1 & AS2: Active Member Slaves in Piconet M1, M2 are Masters in Piconet 1 &2 1 & 2 1 &2 P1 & P2: Parked/ Nom- Active Member Slaves in Piconet

Bluetooth employs a transmission technique called frequency hopping spread spectrum to reduce interference and fading. This means that every 625 usec the channel will hop to another frequency within the 2402 to 2480 MHz range, whereby the carrier frequency of the transmitter changes up to 1600 hops (channels) per second. [10] This translates to 1600 every second. The frequency hopping pattern is known by the communicating devices ahead of time. Frequency hopping has two significant benefits: • Improved privacy. By switching the carrier frequency up to 1600 times a second, it becomes harder to eavesdrop on data. This is because the frequency pattern hopping pattern appears random except to the devices communicating with one another. • Improved noise and narrowband interference rejection The Bluetooth protocol allows the authentication and encryption of a link at the same time [2]. The security is controlled by the lower layers of the Bluetooth protocol. A first security level is assured by the fact that each Bluetooth module has a unique address MAC (48-bits). To achieve a real level of security, the system, the Bluetooth system necessitates 2 secret keys (authentication key and encryption key) as well as a random number (generated regularly) [2] in two stages: 1st stage: Authentication. The scanner sends a challenge to the terminal with which it wishes to connect itself and sends the decoded bar code. The terminal has to reply to the challenge by returning a link key shared between the scanner and the terminal. 2nd stage: Encryption. When the authentication has been carried out between the 2 devices, the link can be encrypted. While authentication and privacy could be handled at the software protocol layer, it is also provided in the Bluetooth physical layer. A particular connection can be specified to require either one-way, two-way, or no authentication. Dr. Reena Hooda,IJRIT

128

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 6, June 2014, Pg: 127-130

The authentication is provided using a challenge/response system. The system supports key lengths of 40 or 64 bits. The key management is left to software layers. These security mechanisms and the associated software allow a user to set up his or her devices to only communicate with each other. All Bluetooth devices implement this physical layer security in the same way. Of course, for highly sensitive applications, it is also recommended that more advanced algorithms should be utilized in the network transport or application layer. [10]

2. Bluetooth Connections Common types of links used in Bluetooth are Asynchronous Connection-oriented (ACL) for data, and synchronous connection-oriented (SCO) link [1] for voice. The asynchronous data channels are provided using packet switching utilizing polling TDMA [1] scheme ACL is the normal type of radio link used for general data packets using a polling scheme to arbitrate access [10]. A connection must be explicitly set up and accepted between two devices before packets can be transferred. ACL packets are retransmitted automatically if unacknowledged, allowing for correction of a radio link that is subject to interference. ACL links are disconnected if there is nothing received for the supervision timeout period; the default timeout is 20 seconds, but this may be modified by the master. ACL can carry several different packet types, which are distinguished by: length normally 1, 3, or 5 time slots depending on required payload size, forward error correction and modulation i.e. EDR - enhanced data rate - packets allow up to triple data rate by using a different RF modulation for the payload. SCO type of radio link (channel) is used for voice data [1] and is provided using circuit switching [10]. An SCO link is a set of reserved timeslots on an existing ACL link. Each device transmits encoded voice data in the reserved timeslot. There are no retransmissions, but forward error correction can be optionally applied. SCO packets may be sent every 1, 2 or 3 timeslots. Enhanced SCO (eSCO) links allow greater flexibility in setting up links: they may use retransmissions to achieve reliability, allow a wider variety of packet types, and greater intervals between packets than SCO, thus increasing radio availability for other links. [1] A combined data-voice SCO packet is also defined. This can provide 64 kb/sec voice and 64 kb/sec data in each direction [10]. Bluetooth can support an asymmetric link with up to 723.2 kb/s in one direction and 57.6 kb/s in the return direction, or a symmetric link with 433.9 kb/s in both directions at once [4]. To control of the radio link between two devices, handling matters such as link establishment, querying device abilities and power control, link management protocol (LMP) is implemented on the controller. Host/controller interface (HCI) is used for the standardised communication between the host stack (e.g., a PC or mobile phone OS) and the controller (the Bluetooth IC). This standard allows the host stack or controller IC to be swapped with minimal adaptation. There are several HCI transport layer standards, each using a different hardware interface to transfer the same command, event and data packets. The most commonly used are USB (in PCs) and UART (in mobile phones and PDAs). In Bluetooth devices with simple functionality (e.g., headsets), the host stack and controller can be implemented on the same microprocessor. In this case the HCI is optional, although often implemented as an internal software interface. Low Energy Link Layer (LE LL) is implemented on the controller and manages advertisement, scanning, connection and security from a low-level, close to the hardware point of view. [1] Companies such as Cambridge Silicon Radio are working on single chip Bluetooth solution with roadmaps towards the $5 cost target. In future designs the host controller software will be frozen and the flash memory will be integrated as mask ROM into the silicon, further reducing the size of the design. [10]

3. Bluetooth Hardware Bluetooth hardware can be divided into two primary functions, the Radio Module and the Link Module. At this time, a complete Bluetooth hardware module including both Radio and Link subsystems costs between $25-30 in additional parts. In most countries, includes the frequency range from 2400 to 2483.5 MHz. Of course, as always when dealing with international standards, there are a few exceptions. The primary geographies with exceptions are France (2446.5 to 2483.5 MHz) and Spain (2445 to 2475 MHz). At this time, Bluetooth products for these two markets are local versions that are not interoperable with the international versions which implement the full range. These localized versions have a reduced frequency band and a different hopping algorithm. However, the Bluetooth SIG is working with authorities in both countries to open the full range. [10] Bluetooth radio modules use Gaussian Frequency Shift Keying (GFSK) for modulation. A binary system is used where a one is signified by a positive frequency deviation and a zero is signified by a negative frequency deviation. The data is transmitted at a symbol rate of 1 Ms/sec. [10] Devices functioning with GFSK are said to be operating in basic rate (BR) mode where an instantaneous data rate of 1 Mbit/s is possible. Since the introduction of Bluetooth Dr. Reena Hooda,IJRIT

129

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 6, June 2014, Pg: 127-130

2.0+EDR, π/4-DQPSK and 8DPSK modulation may also be used between compatible devices. The term Enhanced Data Rate (EDR) is used to describe π/4-DPSK and 8DPSK schemes, each giving 2 and 3 Mbit/s respectively. The combination of these (BR and EDR) modes in Bluetooth radio technology is classified as a "BR/EDR radio". [1] The Link Module and the closely associated Link Manager software are responsible for the baseband protocols and some other low level link functions. This includes sending/receiving data, setting up connections, error detection and correction, data whitening, power management, and authentication. The link module is responsible for deriving the hop sequence. This is accomplished using the Bluetooth Device Address (BD_ADDR) of the master device. All Bluetooth devices are assigned a 48-bit IEEE 802 address. This 48-bit master device address is used by each of the devices in the piconet to derive the hop sequence. [10] The Link Module is also responsible for performing the three error correction schemes that are defined for Bluetooth: • 1/3 rate FEC • 2/3 rate FEC • ARQ scheme for the data The purpose of the two FEC (forward error correction) schemes is to reduce the number of retransmissions. The ARQ scheme (automatic retransmission request) will cause the data to be retransmitted until an acknowledgement is received indicating a successful transmission (or until a pre-defined time-out occurs). A CRC (cyclic redundancy check) code is added to each packet and used by the receiver to decide whether or not the packet has arrived error free. Note that the ARQ scheme is only used for data packets, not synchronous payloads such as voice. [10]

4. Conclusions and Future Scope of Work As Bluetooth is gaining popularity among users due to ease of use and only cost of device. A further addition of frequency hopping spectrum adds extra benefits to Bluetooth for privacy and security in communication. The technology introduced a new network category PAN (personal area network), new wireless service with its own standard. The technology supports Asynchronous Connection-oriented link, and Synchronous Connection-Oriented link for both data as well as voice communications between devices. The technology encompasses Time-division multiplexing and Gaussian frequency shift keying modulation method as well as Link Manager for transferring data, error detection & correction, power control, authentication, and to manage the retransmissions for the purpose of fast and successful delivery of the data. The future scope of work includes the exploration of modulation methods for transmission.

5. References [1].

Wikipedia, The Free Encyclopedia (2012). Bluetooth. Retrieved From: Http://En.Wikipedia.Org/Wiki/Bluetooth. [2]. Bluetooth Protocol. Retrieved Jan, 2012 From: Http://Www.Baracoda.Com/Shared_Docs/Bluetooth_Protocol.Pdf [3]. Thomas (March 22, 2002). IEEE Releases Bluetooth Standard. Http://Www.Geek.Com/Articles/Mobile/IeeeReleases-Bluetooth-Standard-20020322/ [4]. Http://Www.Ee.Ucla.Edu/~Lerong/Ee202a/Hw2/ [5]. http://mason.gmu.edu/~vneamo/disadvantages.html [6]. Thomson, Robert (2011). Retrieved 2012 from: http://www.articleclick.com/Article/Advantages--Disadvantages-of-Bluetooth/933096 [7]. Adamma (September 06, 2008). Advantages And Disadvantages in Bluetooth Technology. Retrieved from: http://www.technicaltalk.net/index.php?topic=277.msg966#msg966 [8]. http://en.wikipedia.org/wiki/RS-232 [9]. http://en.wikipedia.org/wiki/Global_Positioning_System [10]. Blankenbeckler, David (n.d.). An Introduction to Bluetooth. Retrieved 13.01.2012 from: http://www.wirelessdevnet.com/channels/bluetooth/features/bluetooth.html [11]. Mapleridge, Ann (n.d.). Features of Bluetooth Technology. Retrieved 13.01.2012 from: http://www.ehow.com/about_5394040_features-bluetooth-technology.html [12]. CNET'S QUICK GUIDE (2012). Features and profiles. Retrieved from: http://reviews.cnet.com/452011288_7-6554363-2.html Dr. Reena Hooda,IJRIT

130

Bluetooth and Its Configuration - International Journal of Research in ...

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 6, ... Bluetooth is a packet-based protocol with a master-slave structure [1] ... Frequency hopping has two significant benefits: .... technology introduced a new network category PAN (personal area network), new wireless service with its own.

114KB Sizes 0 Downloads 305 Views

Recommend Documents

Bluetooth and Its Configuration - International Journal of Research in ...
IJRIT International Journal of Research in Information Technology, Volume 2, ..... http://www.wirelessdevnet.com/channels/bluetooth/features/bluetooth.html. [11].

8085 Microprocessors - International Journal of Research in ...
including CRRES, Polar, FAST, Cluster, HESSI, the Sojourner Mars Rover, and THEMIS. The Swiss company. SAIA used the 8085 and the 8085-2 as the CPUs of their PCA1 line of programmable logic controllers during the 1980s. Pro-Log Corp. put the 8085 and

nanofiltration - International Journal of Research in Information ...
Abstract- The term “membrane filtration” describes a family of separation methods.The basic principle is to use semi-permeable membranes to separate fluids, Gases, particles and solutes. Membranes are usually shaped as a thin film, which allows t

Software - International Journal of Research in Information ...
approach incorporates the elements of specification-driven, prototype-driven process methods, ... A prototype is produced at the end of the risk analysis phase.

Pervasive Computing - International Journal of Research in ...
These techniques can be digital cookbook embedded on your microwave, video-on-demand services available on you home screen or shopping list stockpiled on your refrigerator even when you are miles away. Information .... Schilit introduced context awar

vampire attacks research paper - International Journal of Research in ...
A wireless sensor network are spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. and to cooperatively pass their data through the network to a main location. Denial of

vampire attacks research paper - International Journal of Research in ...
initial connection state onto the client, or cryptographic puzzles. These solutions place minimal load on legitimate clients who only initiate a small number of connections, but deter malicious entities who will attempt a large number. Note that this

Heat Recycling Of Data Centers - International Journal of Research in ...
When outside temperatures are high, the exchangers are sprinkled with water to ... (V) is proportional to the temperature difference (∆T) via the Seebeck ...

Download PDF - International Journal of Advanced Research
It is described and illustrated here based on recent collection from Wayanad (E.S. Santhosh Kumar 56416, TBGT) to facilitate its easy identification. Thottea dalzellii (Hook.f.) Karthik. & Moorthy, Fl. Pl. India 156. 2009. Bragantia dalzellii Hook.f.

Download PDF - International Journal of Advanced Research
Distribution and Ecology:— Lasianthus idukkianus grows in a shola forest at ... Deb, D.B. and Gangopadhyay, M. (1991): Taxonomic study of the genus ...

Download PDF - International Journal of Advanced Research
695562, Kerala, India. Manuscript ... In India, it is represented by 14 species which include 10 endemics confined to .... Forest Department for the logistic support.

Cloud Computing Security - International Journal of Research in ...
sharing of resources which include software and infrastructure with the help of virtualization.In order to provide quality services ... Platform-as-a-service is higher level service than infrastructure service. Platform based services includes .... F

cyborgs - International Journal of Research in Information Technology ...
Bioelectronics is already a real and recognized ... biological systems at a more basic level; nanotechnology and nano-machines may be able to effect biological changes at the intracellular level ... recombinant DNA research, much of the public showed

Uzma Ijrit Paper - International Journal of Research in Information ...
Auto Trip computer, engine control, air bag, ABS, instrumentation, security system, transmission control ... GSM also pioneered low-cost implementation of the short message service (SMS), also called ... Frequency: 900 MHz or 1800 MHz (Some countries

Web Based IDE - International Journal of Research in Information ...
B.E computer engineering, Institute of Knowledge College of engineering, pune .... Cloud computing is usage of computer resources (both hardware and ...

Compiler Design - International Journal of Research in Information ...
The final result of this paper is to provide a general knowledge about compiler design and implementation and to serve as a springboard to more advanced courses. Although this paper concentrates on the implementation of a compiler, an outline for an

Compiler Design - International Journal of Research in Information ...
... be regarded as an 'add-on' feature of acompiler. Its inuence upon the overall design is pervasive, and it is a necessary debugging tool during construction of.

(OLSR) Protocol - International Journal of Research in Information ...
2Assistant Professer, 2Punjabi University Regional Centre for IT & Mgmt., Mohali, India. Mohali, Punjab, India [email protected]. Abstract. OLSR is a leading proactive protocol used in MANET. Due to its low latency for route determination it has be

review paper - International Journal of Research in Information ...
[email protected] , [email protected] , [email protected]. Abstract. Iris recognition has been finished by numerous scientists in a decade ago. Iris recognition assumes a important part to enhance effectiveness in biometric identific

data hiding using watermarking - International Journal of Research in ...
Asst.Professor, Dr. Babasaheb Ambedkar College of Engg. and research, ECE department,. R.T.M. Nagpur University, Nagpur,. Maharashtra, India. Samruddhi Pande1, Aishwarya Iyer2, Parvati Atalkar3 ,Chetna Sorte4 ,Bhagyashree Gardalwar 5,. Student, Dr. B

(STBC) OFDM Systems - International Journal of Research in ...
2 Department of Electronics Engineering, Sri Guru Granth Sahib World University, Fatehgarh Sahib, Punjab,. India. 4 Department of Electronics and communication Engineering, CTIEMT, Jalandhar city. Abstract. In this paper, performance analysis of inte

Energy Harvesting - International Journal of Research in Information ...
[email protected], [email protected]. Abstract. Purpose: To review and discuss various Energy harvesting techniques and to implement one amongst them to reduce the usage of implantable medical device's (IMD's) battery so that the life span

Restaurant Management system - International Journal of Research in ...
A recipe for a menu item has a chef, preparation instruction sand associated ingredients. The ingredients are identified by their ingredient id and the quantity of ...

Android Game Development - International Journal of Research in ...
internet or even play mobile games. As the technology improves, more and more gadgets based on cellular phones are emerging seamlessly. One good example is the invention of the smart phones; it has the ability to support two-dimensional (2D) and thre