BLUETOOTH TECHNOLOGY
1. INTRODUCTION TO BLUETOOTH
ABSTRACT:
Bluetooth Wireless technology is the
world's new short range RF transmission standard for small form factor, low
cost, and short-range radio link between portable and desktop devices. This
technology does not replace Wireless LANs rather it compliments them. Bluetooth
wireless technology has many advantages over other Wireless LAN technologies,
which makes it attractive to many applications. One such application is in the
area of sensors and gauges on-board ships and submarines. If these are
connected wirelessly, a huge amount of cables are eliminated and more user
mobility is gained. This thesis studies the theories and principles of
Bluetooth technology and discusses the approaches of connecting Bluetooth to
sensors and gauges. Some of the Bluetooth products available in the market were
acquired for testing and evaluation. In the course of the study, it was found
that the technology was not mainly developed with sensor and gauge applications
in mind. However, integrating sensors with Bluetooth modules can be achieved by
one of two approaches. One approach requires an expensive Development Kit and
is limited to manufacturers integrating Bluetooth technology into their sensor
products in compliance with Bluetooth Specifications. The other inexpensive
approach requires custom circuit designing and program coding and is preferred
by university researchers.
OVERVIEW
Bluetooth, the
new technology named after the 10th Century Danish King Harold Bluetooth, is a
hot topic among wireless developers. This article will provide an introduction
to the technology.
The Bluetooth specification is an open
specification that is governed by the Bluetooth Special Interest Group (SIG).
The Bluetooth SIG is lead by its five founding companies and four new member
companies who were added in late 1999. These nine companies form the Promoter
Group of the Bluetooth SIG:
More than 1200 additional companies are
members of the Bluetooth SIG. The magnitude of industry involvement should
ensure that Bluetooth becomes a widely adopted technology. The first Bluetooth
products should begin to appear this year. The first Bluetooth product from
Ericsson is a wireless cellular phone headset to be available in
Definition
BlueTooth is a specification for the use of
low-power radio communications to wirelessly link phones, computers and other
network devices over short distances. The name "Bluetooth" is
borrowed from Harald Bluetooth, a king in
Bluetooth
networks feature a dynamic topology called a piconet or PAN.
Piconets contain a minimum of two and a maximum of eight Bluetooth peer
devices. Devices communicate using protocols that are part of the Bluetooth
Specification. Definitions for multiple versions of the Bluetooth specification
exist including versions 1.1, 1.2 and 2.0.
Although
the Bluetooth standard utilizes the same 2.4 Ghz range as 802.11b
and 802.11g,
Bluetooth technology is not a suitable Wi-Fi
replacement. Compared to Wi-Fi, Bluetooth networking is much slower, a bit more
limited in range, and supports many fewer devices.
As
is true for Wi-Fi and other wireless technologies today, concerns with
Bluetooth technology include security and interoperability with other
networking standards. Bluetooth was ratified as IEEE 802.15.
History of
Bluetooth:
The name “Bluetooth”
and its logo are trademarked by the privately held trade association named the
Bluetooth Special Interest Group (SIG).
Founded in
September 1998, the Bluetooth SIG is a unification of leaders This ad zapped.
in the telecommunications, computing, network, industrial automation, and Automotive
industries. Today, the Bluetooth SIG is responsible for encouraging and
supporting research and development in
Bluetooth technology.
The Bluetooth SIG includes promoter member companies
Microsoft, Ericsson, IBM, Intel, Agere, Motorola, Nokia,
and Toshiba, plus thousands of Associate and Adopter member companies
(BlueTomorrow.com's parent company, SP Commerce LLC, is a licensed and
certified Adopter member of the
Bluetooth SIG).
Why is It Called Bluetooth?
The developers of this wireless technology first used
the name "Bluetooth" as a code
name, but as time past, the name stuck.
The word "Bluetooth" is taken from the 10th century Danish
King Harald Bluetooth. King Bluetooth
had been influential in uniting
Scandinavian Europe during an era when the region was torn apart by wars
and feuding clans.
1. The founders of the
Bluetooth SIG felt the name was fitting because:
Bluetooth technology was first developed in
2. Bluetooth technology is
able to unite differing industries such as the cell phone, computing,
and automotive markets. Bluetooth wireless technology simplifies and
combines multiple forms of wireless communication into a
single, secure, low-power, low-cost, globally available radio frequency.
Where Did the Logo Come From?
A Scandinavian firm originally designed the logo at the
time the SIG was formally introduced to the public. Keeping to the same origin
as the Bluetooth name, the logo unites
the Runic alphabetic characters "H", which looks similar to an
asterisk, and a "B", which are the initials for Harald Bluetooth. If
you look close enough you can see both embodied in the logo.
When Bluetooth was officially introduced in 1998, its
intended basic purpose was to be a wire
replacement technology in order to rapidly transfer voice and data.
There were many doubters who believed Bluetooth would be
a distant memory in just a couple of years. However, multiple years have passed
and Bluetooth ontinues to make strides and advancements everyday.
A lot has changed since the first Bluetooth Core Specification
Version was introduced in 1998. Over the past couple years Bluetooth technology
has really begun to take giant leaps forward.
In 2003, the Bluetooth SIG began a major overhaul of the
Bluetooth specification with the
announcement of version 2.1. Then, in 2004, Bluetooth version 2.0 + EDR
(Enhanced Data Rate) was introduced. Devices using version 2.0 + EDR began to
hit the market in late 2005.
2.
FUNDAMENTALS
Concepts :
Bluetooth® wireless technology is an open
specification for a wireless personal area network (PAN). It provides
limited range wireless connectivity for voice and data transmissions
between information appliances. Bluetooth wireless technology eliminates
the need for interconnecting cables.
Unique for most wireless communications systems, Bluetooth enables ad
hoc networking among devices, without the need for infrastructure such as base
stations or access points.
Bluetooth wireless technology allows seamless
interconnectivity among devices. Imagine your computer synchronizing files and
databases with your personal digital assistant (PDA), simply because you
carried the PDA into the vicinity of the PC. Wireless headsets can simplify
hands-free operation of mobile phones as a convenient and safe way to talk
while driving. The potential of this technology is limitless when one considers
the growing sector of information appliances that would benefit from wireless
connectivity. This application note describes transmitter and receiver
measurements to test and verify Bluetooth RF including enhanced data
rate (EDR) designs. Test procedures range from manual intervention or custom software control, to
easy-to-use, one-button measurements.
Connection Setup Procedures
Authentication procedure is
triggered after determining the security level of the requested service in
order to allow different service requirements for different applications
without user intervention. Figure 9
illustrates the sequence of functions that are performed to gain The functions
are performed in the following order:
1.
Connection
request is made to L2CAP;
2.
L2CAP
requests access information from the Security Manager;
3.
Security
Manager queries the Service Database for service permissions;
4.
Security
Manager looks up the Device Database for trust level;
5.
Security
Manager enforces authentication and encryption at the Host Control Interface
(HCI) level if required;
6.
Security
Manager grants access;
7.
L2CAP
continues to setup the connection by sending the packet to the Application
level.
3. Architecture
Bluetooth
protocol stack:
The complete Bluetooth
protocol stack has been designed to include the existing protocols as much as
possible (like TCP, UDP, OBEX) as well as Bluetooth specific protocols like LMP
and L2CAP. The protocol reuse ensures smooth interoperability between existing
applications and hardware. The Specification is also open, thereby allowing
vendors to build proprietary applications. Although different applications may
run over different protocol stacks, they all use the Bluetooth data link and
physical layers. The Applications layer lies on top of the vCard (internal
object representation convention) layer.
Topology |
Supports up to 8 simultaneous
links in a piconet |
Flexibility |
Goes through walls, bodies,
clothes, ... |
Data Rate |
1 MSPS, 721 Kbps |
Power |
0.1 Watts active power |
Size/Weight |
25 mm × 13 mm × 2 mm, several
grams |
Cost |
Long term $5 per endpoint |
Range |
10 meters or less; up to 100
meters with PA |
Universal |
Intended to work worldwide |
Security |
Very, link layer security, SS
radio |
Table
1: Bluetooth features at a glance.
Protocols in Bluetooth Architecture:
Bluetooth Core Protocols
1.
Baseband
2.
Link
Manager Protocol
3.
Logical
Link Control and Adaptation Protocol
4.
Service
Discovery Protocol
5.
Cable
Replacement Protocol
- Telephony
Control Protocol
- Adopted
Protocols
Baseband: It deals with
connection establishment within a piconet, addressing, packet format, timing
and power control. The
Baseband
and Link Control Layer enables the RF
link Bluetooth units in a piconet.
Link Manager Protocol (LMP): The link manager
protocol is responsible for setting up link channels between Bluetooth devices
and ongoing link management. This protocol includes security
parts such as authentication and encryption plus the control and negotiation of
Baseband packet sizes.
Logical Link Control and Adaptation Protocol (L2CAP): It maintains upper-layer protocols of the Baseband layer. L2CAP provides
connectionless as well as connection-oriented services.
Service Discovery Protocol (SDP): It gives detail device information, services and the
characteristics of the services that can be required to enable the
establishment of a connection between two or more Bluetooth devices.
Cable Replacement Protocol (RFCOMM): RFCOMM is a serial line
emulation protocol. RFCOMM provides the replacement of serial port cables with the minimum
adjustment of existing devices. RFCOMM provides binary data transportation and
emulates control signals over the Bluetooth Baseband layer.
Telephony Control Protocol: The Telephony
Control - Binary (TCS Binary) and Telephony Control - AT Commands are used to
establish speech and data calls between devices and control mobile phones and
modems respectively.
Adopted Protocols: Bluetooth also supports PPP, TCP/UDP/IP, OBEX
and WAP protocols to maximize interoperability.
The Bluetooth policy is to invent only necessary
protocols and use existing standards whenever possible. Following are the
adopted protocols:
·
PPP - The point-to-point protocol is an Internet
protocol used for transporting IP datagram over a point-to-point link.
·
TCP/UDP/IP - These are the basic protocols of the
TCP/IP protocol suite.
·
OBEX - The object exchange protocol is a session
protocol for the exchange of objects developed by the Infrared Data Association
(IrDA). OBEX offers functionality similar to that of HTTP. Its model is used
for representing objects and operations.
·
WAE/WAP - Bluetooth includes the wireless
application environment and wireless application protocol into its
architecture.
BLUETOOTH USB & iNTERNAL CARD
A personal
computer must have a Bluetooth adapter in order to be able to
communicate with other Bluetooth devices (such as mobile
phones, mice and keyboards).
While some desktop computers and most recent laptops come
with a built-in Bluetooth adapter, others will require an external one in the
form of a dongle.
Unlike its predecessor, IrDA, which requires a separate
adapter for each device, Bluetooth allows multiple devices to communicate with
a computer over a single adapter.
4. CASES
An Example of Bluetooth in Action
The Wireless Office :
Imagine a modern day office with various hi-tech, yet
common electronic
devices.
The first thing an office should have are the basic
essentials: a computer, keyboard, mouse, printer and phone. Next, lets say
there is a Headset
that works with the phone.
Now that we have all the basics, lets make this office a
little more exciting by adding some fun
"toys", like a PDA, digital camera and MP3 player. By now you should
have a pretty good picture of the office and the various devices in it.
Every device is connected, or is capable of being
connected to at least one other device.
For example, the keyboard and mouse have to connect to the computer and the PDA has the option to connect
to the computer. Just imagine if all these devices used cables to connect to
one another. The office would have
cables running everywhere and we'd be left with a big, tangled mess.
Now imagine all of these devices use Bluetooth technology
to connect to one another instead. The
result: no more cables and no more mess. Suppose the Bluetooth enabled printer comes
with a Bluetooth
Computer Adapter that plugs into the computer's universal
serial bus (USB) port. The company that manufactured the printer and computer
adapter programmed each device with the same Bluetooth profiles.
Bluetooth profiles are used by devices to instruct them
on how to use the Bluetooth
technology. Profiles define the application(s) of Bluetooth technology (To learn
more about profiles, click: Bluetooth
Profiles).
After the printer is turned on, it transmits a signal,
which looks for a response from other
Bluetooth enabled devices with the same profile(s). Since the USB adapter shares the same profile(s), it
responds and a small network (AKA: Piconet)
is created.
Since this piconet is established between devices with
the same specific profiles, the signals
sent by other devices with different profiles, like the headset, will be ignored. All the other
Bluetooth devices in the room establish similar
piconets that are all separated from one another based on the specific profile(s) they use.
Our "dream" office now has several different
piconets operating simultaneously, and
each one knows which Bluetooth devices to communicate with and which signals to ignore. It is highly
unlikely that any two piconets will interfere
with one anther because each is changing its frequencies all of the
time.
Bluetooth Cell
Phones :
Walk down the street.
It’s virtually impossible not to see someone talking on their cell phone. Over
the last ten years, cell phones have become a necessity, not a luxury.
Bluetooth technology, allowing for wireless, streaming use of these devices,
makes them more convenient and practical.
As with all Bluetooth
technology, Bluetooth cell phones use radio waves to transmit
from your cell phone to a headset or earpiece that is totally wireless. No
wires to clip to your belt or shuffle around your handbag.
There is no need to set
up an access from your Bluetooth cell phone to your headset. Most models of
Bluetooth cell phones are able to work with most headsets simply by “finding”
it, via radio waves. Using the options on your phone, you can search out any
compatible Bluetooth
headset in range and sync them up. Accept your headset
option, and from that point on, when your Bluetooth cell phone is on, it will
search for your headset.
The range of use of your
accessories depends on the level of Bluetooth technology that your phone
employs, but more often than not, they use either version 1.1 or 1.2 and have a
30 foot range of use between accessories and the Bluetooth cell phone.
Several options exist
for Bluetooth
cell phone car kits that plug directly into your car
and are accessible wirelessly. Push button or voice options exist for calling
and music selections in many of these devices, and your Bluetooth cell phone is
functional as soon as you turn on your car.
Many cell phones also
have web or music options, playing wither MP3 or WMA formats. Bluetooth cell
phones allow for wireless or voice music streaming and control as well as
Internet use.
Does your state have laws about driving while using a cell phone?
Chances are, if it doesn’t, it soon will. While some states, like
Many headsets have
voice-control options for both music and talk. Thanks to the hands-free
capability, there is no need to drive one-handed while talking, thus
eliminating much of the risk of talking in the car. There is no longer a need
to miss a call while on the road, or for risking a ticket or an accident by
holding a cell phone while driving.
Bluetooth cell phones allow users
constant, hassle-free, wire-free use of their phones, whether in the car or in
the home.
5. TRENDS
The Advantages of Bluetooth
1.
Bluetooth Devices are Wireless :
If you navigate through the rest of our
site you will learn that there are This
ad zapped. tons of advantages/benefits when using wireless devices. In addition
to improving safety as a result of eliminating the clutter of wires and
associated hazardous connections, wireless technology also offers many convenient advantages. For example, when you
are traveling with your laptop, PDA, MP3 player and other devices, you no
longer have to worry about bringing along all of your connecting cables.
2. Bluetooth Technology is Inexpensive :
Bluetooth technology is cheap
for companies to implement, which results in lower
over-all manufacturing Costs.
These savings are then passed on to you, the consumer. The end result:
Bluetooth devices are relatively inexpensive.
3.
Bluetooth is Automatic :
Bluetooth doesn't
require you to think about setting up a connection or to push any buttons. When
two or more Bluetooth devices enter a range (Up to 30 feet) of one another,
they automatically begin to communicate without you having to do anything. Once
the communicating begins, Bluetooth devices will setup Personal
Area Networks or Piconets. The best part is: The devices
take care of the entire setup process, and you can go about your
business.
4.
Standardized Protocol = Interoperability :
Since Bluetooth is a standardized
wireless specification, a high level of
compatibility among devices is guaranteed. The Bluetooth specification
uses and defines various profiles. Every Bluetooth profile is specific to a
particular function. For instance, when a Bluetooth enabled cell phone and a
Bluetooth headset (Both with the same profile) are communicating with one
another, both will understand each other without the user having to do
anything, even if the devices are of different models/makes.
5. Low Interference :
Bluetooth devices avoid
interference with other wireless devices by: a) Using a technique known as
spread-spectrum frequency hopping, and b) Using low power wireless signals.
6.
Low Energy Consumption
As stated above,
Bluetooth uses low power signals. As a result, the technology requires little
energy and will therefore use less battery or electrical power. Obviously, this
is a great benefit for mobile devices because Bluetooth won't drain the life of
your device's battery.
7.
Share Voice and Data
The Bluetooth standard
allows compatible devices to share both voice and data communications. For
example, it is probably no surprise that a Bluetooth enabled cell phone is
capable of sharing voice communications with
a compatible Bluetooth headset, however, the same cell phone may also be
capable of establishing a GPRS connection to the Internet. Then, using
Bluetooth, the phone can connect to a laptop. The result: The laptop is capable
of surfing the web or sending and receiving email.
8. Instant Personal Area Network (PAN) :
Up to seven compatible Bluetooth devices
can connect to one another within a proximity of up to 30 feet, forming a PAN
or piconet. Multiple piconets can be automatically setup for a single room.
9. Upgradeable :
The Bluetooth standard is upgradeable. A
development group at the Bluetooth Special Interest Group (SIG) has been given
the task of working on the new Bluetooth version 2, which offers several new
advantages and is backward compatible with the older versions.
10. The Technology is Here
to Stay :
Bluetooth is a universal,
world-wide, wireless standard. Therefore, you can count on it being around for
years to come. As more devices begin to use Bluetooth technology, electronics
manufacturers will be increasingly eager to make their products compatible,
using Bluetooth. A chain reaction is inevitable, in fact, it has already begun
What are the
Applications?
Bluetooth has a
tremendous potential in moving and synchronizing information in a localized
setting. Potential for Bluetooth applications is huge, because we transact
business and communicate with people - a natural phenomenon of human
interaction.
The following
list represents only a small set of potential applications - in future many
more imaginative applications will come along:
·
By
installing a Bluetooth network in your office you can do away with the complex and tedious task of
networking between the computing devices, yet have the power of connected
devices. No bound to fixed locations where we
can connect to the network. Each Bluetooth device could be connected to
200 other devices making the connection possible between every device. Since it supports both point to
point and point to multipoint it will virtually make the maximum number of
simultaneously linked devices unlimited.
·
The
Bluetooth technology connects all your office peripherals wirelessly. Connect your PC or notebook to
printers, scanners and faxes without the ugly and trouble some cable
attachments. You can increase your freedom by connecting your mouse or the
keyboard wirelessly to your computer.
·
If
your digital cameras in Bluetooth enabled, you can send still or video images without the hassle of
connecting your camera to the mobile phone on the wireline phone.
·
Bluetooth
allows us to have three way phones. At home, your phone functions as a portable phone (fixed line
charge). When you're on the move, it functions as a mobile phone (cellular
charge). And when your phone comes within range of another mobile phone with
built-in Bluetooth wireless technology it functions
as a walkie-talkie (no telephony charge).
·
In
meetings and conferences you can transfer selected documents instantly with selected participants,
and exchange electronic business cards automatically, without any wired
connections.
·
Automatic
Message Delivery: Compose e-mails on your portable PC while you're on an
airplane. As soon as you've landed and switched on your mobile phone, all messages are
immediately sent.
·
Upon
arriving at your home, the door automatically unlocks for you, the entry way lights come on, and the heat
is adjusted to your pre-set preferences.
·
IBM
researchers are working on a number of personal devices like a Watch Pad that could be connected
with other devices through Bluetooth. The Watch Pad is very thin and contains
8MB of RAM. They are also working on
version of Cyber Phone called CyberPhone - that can project data onto a
small mirror. The CyberPhone
can show as much information as a small PDA because of high resolution VGA
screen.
Bluetooth Security
The Bluetooth SIG Focuses on Security :
The Bluetooth SIG
is constantly improving formats for combating security threats associated with
Bluetooth technology. Offering a secure method to wirelessly communicate has
always been one of the key benefits of Bluetooth technology. In The
History of Bluetooth, offering secure data transmission was
one of the core principles for its creation.
In order to lead the
security effort, a group of engineers within the Bluetooth SIG formed the Bluetooth Security
Experts Group. As the Bluetooth Core Specification Versions continue to
advance, the Bluetooth Security Experts Group is responsible for monitoring the
advancement and testing for flaws in its security.
The Fundamentals of Bluetooth Security :
One of the most basic
levels of security for Bluetooth devices is the
“pairing” process. Two or more Bluetooth devices recognizeeach
other by the Bluetooth
Profiles and in most
cases, both must enter the same PIN.
The Bluetooth core specifications use an encryption
algorithm, which is entirely secure. Bluetooth devices will not communicate
with each other until they have successfully paired. So, because of this
pairing process and the fact that it has a short range, Bluetooth technology is
considered to be fundamentally secure.
How Developers Can Provide Security
There are three security
modes for connecting two
Bluetooth devices:
·
Security
Mode 1: non-secure
·
Security
Mode 2: service level enforced security
·
Security
Mode 3: link level enforced security
It is the company who develops each specific Bluetooth
product that decides which security
modes to use. Also, the devices and services have different security levels as
well. For example, devices use two levels: "trusted device" and "untrusted
device". After a trusted device is connected to another device, it has unrestricted access to all
services. As far as services, there are three security levels which are
defined: services that require authorization and authentication, services that
require authentication only and services that are open to all devices.
What is Bluejacking?
Bluejacking
allows phone users to send business cards anonymously to one another using
Bluetooth technology. Bluejacking does NOT involve any altercations to your
phone's data. These business cards usually consist of some clever message or
joke. Bluejackers are simply looking for a reaction from the recipient. To
ignore bluejackers, simply reject the business card, or if you want to avoid
them entirely, set your phone to non-discoverable mode
What is
Bluesnarfing?
Bluesnarfing refers to a hacker who has gained access to
data, which is stored on a Bluetooth enabled phone. Bluesnarfing allows the
hacker to make phone calls, send and receive text messages, read and write
phonebook contacts, eavesdrop on phone conversations, and connect to the
Internet. The good news is, bluesnarfing requires advanced equipment and
expertise or requires the hacker to be within a 30 ft. range. If your phone is
in non-discoverable mode, it becomes significantly more difficult for hackers
to bluesnarf your phone. According to the Bluetooth SIG, only some older
Bluetooth enabled phones are vunerable to bluesnarfing.
What is Bluebugging?
Bluebugging refers to a skilled hacker who has accessed a
cell phone's commands using Bluetooth technology without the owner's permission
or knowledge. Bluebugging allows the hacker to make phone calls, send messages,
read and write contacts and calendar events, eavesdrop on phone conversations,
and connect to the Internet. Just like all Bluetooth attacks, the hacker must
be within a 30 ft. range. Bluebugging and bluesnarfing are separate security
issues, and phones that are vulnerable to one are not necessarily vulnerable to
the other.
What are Phone Manufacturers
Doing to Solve These Problems?
Two of the leading cell
phone manufacturers, Nokia and Sony Ericsson, have developed software patches
for phones susceptible to bluesnarfing and bluebugging. Also, both
manufacturers have taken great measures to ensure new phones entering the
market will not be susceptible to these attacks.
Bluetooth Core Specification Versions
Bluetooth Specification Version
1.1 and Earlier :
Several Bluetooth specification versions
have been released since 1998. Versions 1.0 and 1.0B had too many problems and
restraints for manufacturers
to successfully develop Bluetooth devices. The main issue was the lack of
interoperability among devices.
The Bluetooth Core Specification version 1.1 is the first
truly successful operating version of Bluetooth technology. Bluetooth 1.1 corrected
many of the problems found in the earlier versions. As a result: Devices using
Bluetooth 1.1 have much greater interoperability.
Bluetooth Version 1.2 :
Many new Bluetooth
devices, like the latest cell phones, are being
sold with the newer Bluetooth specification version 1.2.The new
features/benefits that the Bluetooth 1.2
offer are:
·
Backward
compatible with Bluetooth 1.1
·
Adaptive
Frequency Hopping - helps reduce radio interference by eliminating the use of crowded
frequencies in the hopping sequence
·
Faster
transmission speeds (1 Mbps)
·
Extended
Synchronous Connections Oriented links - improves voice quality of audio connections by
enabling retransmissions of corrupted
data.
·
Received
Signal Strength Indicator
·
Host
Controller Interface (HCI) support for 3-wire UART
·
HCI
access to timing information for Bluetooth applications
Bluetooth
Version 2.0 + EDR (Enhanced Data Rate)
:
There may be multiple
communication technologies, but they all share one thing in common: Faster is
better. The Bluetooth SIG is working for
improving the speeds of Bluetooth version 1.2.
Bluetooth version 2.0 +
EDR was announced by the Bluetooth SIG in June 2004 and began appearing in
Bluetooth devices in late 2005. Bluetooth version 2.0 + EDR delivers data
transfer rates up to three times faster than the original Bluetooth
specification. Bluetooth version + EDR also provides enhanced
multiple-connectivity. With
Bluetooth 2.0 + EDR,
users will be able to more efficiently run multiple Bluetooth devices at the
same time. As a result, Bluetooth
Personal-Area Networks (PAN) or Piconets will become more
common.
The main enhance ments/features
found with Bluetooth Specification Version 2.0 + EDR :
·
Backward
compatible with previous Bluetooth versions
·
Three
times faster transmission speed (10 times in some cases)
·
Enhanced
data rate of up to 3 Mbps
·
Lower
power consumption due to reduced duty cycles
·
Broadcast/multicast
support
·
Simplification
of multi-link scenarios due to more available
bandwidth
·
Distributed
media-access control protocols
·
Further
improved Bit Error Rate performance
6. Future of Bluetooth
- Broadcast Channel: enables Bluetooth information points. This will
drive the adoption of Bluetooth into mobile phones, and enable advertising
models based around users pulling information from the information points,
and not based around the object push model that is used in a limited way
today.
- Topology Management: enables the automatic configuration of the piconet
topologies especially in scatternet situations that are becoming more
common today. This should all be invisible to the users of the technology,
while also making the technology just work.
- Alternate MAC PHY: enables the use of alternative MAC
and PHY's
for transporting Bluetooth profile data. The Bluetooth Radio will still be
used for device discovery, initial connection and profile configuration,
however when lots of data needs to be sent, the high speed alternate MAC
PHY's will be used to transport the data. This means that the proven low
power connection models of Bluetooth are used when the system is idle, and
the low power per bit radios are used when lots of data needs to be sent.
- QoS
improvements: enable audio and video data to be transmitted at a higher
quality, especially when best effort traffic is being transmitted in the
same piconet.
The
fact that thousands of companies have invested considerable sums of money in
Bluetooth also indicates that the technology will be promoted for quite some
time to come. SIG is determined not to let Bluetooth technology become obsolete
in light of newer technology. On
7. Conclusion
Bluetooth is aimed at the short range radio link market. Its scheme does not fit in the senario of broad range network like WAN or Internet. However, Wapforum's solution is designed intendly to be as the internet standards. So They have different playground. Actually, one can integrate them together,use Bluetooth as a bearer for transporting data between the WAP clients and their adjacent WAP Server. [BLUE]
However, concerned with the security feature, WAP get a stronger and more flexible one. It use public key scheme to excange the secret key which is used in symmetric-key algorithm to encrypt the user data. So when gainingsecurity strength, at the same time it also obtain a comparative good performance. But the Bluetooth depends its security on the PIN code which is used to generate the initialization key. Considering it aimed to be used in a short range, such security may be enough, though obviously weaker than WAP's.
Comments
Post a Comment