Bluetooth Technology - PowerPoint PPT Presentation

View by Category
About This Presentation
Title:

Bluetooth Technology

Description:

Bluetooth Technology Jason Babel Kyle Musal Joshua Turella Zdravko Tyankov History 1994 Ericsson Initiated Study Low-power, low-cost radio interface Unite ... – PowerPoint PPT presentation

Number of Views:4326
Avg rating:3.0/5.0
Slides: 38
Provided by: KyleJ2
Category:

less

Write a Comment
User Comments (0)
Transcript and Presenter's Notes

Title: Bluetooth Technology


1
Bluetooth Technology
  • Jason Babel
  • Kyle Musal
  • Joshua Turella
  • Zdravko Tyankov

2
History
  • 1994 Ericsson Initiated Study
  • Low-power, low-cost radio interface
  • Unite computer devices and telecommunications

3
Beginnings
  • 09/1998 Special Interest Group (SIG) Founded
  • 12/1999 Big Names Join Movement
  • Technology Was Free To Public

4
The Name and Logo
  • Danish Viking King Harald Blatand
  • United Warring Factions of Denmark and Norway
  • Runic Letters Used For Logo

5
Bluetooth Communication
  • Bluetooth operates on the ISM band
    (2.402-2.480GHz)
  • The ISM band is set aside for Industrial,
    Scientific and Medical devices.
  • ISM is a low powered unlicensed frequency band.

http//bluetooth.com
6
Bluetooth Communication
  • Bluetooth avoids interference by using
    spread-spectrum frequency hopping and a low power
    signal.
  • By using spread-spectrum frequency hopping a
    bluetooth device will change frequencies 1,600
    times per second.
  • Bluetooth is low powered which means that only
    devices within 32 feet can potentially cause
    interference, when used to FCC standards.

http//bluetooth.com
7
Avoiding Interference
  • By using spread-spectrum frequency hopping, a
    bluetooth device can pick from 79 different
    channels within the ISM band 1,600 times per
    second.
  • This avoids interference because if two Bluetooth
    devices operate on the same frequency and
    interfere with each other the interference will
    only last 1/1600 second.
  • This short period of interference will not be
    noticed by the user.

8
Avoiding Interference
  • By using a low power signal a Bluetooth device
    reduces its chances of interference even further.
  • The chances of two Bluetooth devices potentially
    operating on the same frequency and interfering
    is low because of the short range.

http//gpc.edu/pgore/PhysicalScience/destructive.
gif
9
Bluetooth Security
  • Bluetooth devices can use a PIN to prevent
    unauthorized access.
  • Bluetooth devices can be set to undiscoverable
    this prevents unauthorized users from accessing
    your Bluetooth device.

http//www.securityfocus.com/infocus/1830
10
Bluetooth Security
  • Bluetooth devices use a unique 48bit device
    identifier, a MAC address. This address takes the
    form 008FDF02BF7C.
  • Because of the amount of addresses it is
    difficult for a hacker to find the MAC address
    of a Bluetooth device set to undiscoverable.
  • The MAC address of Bluetooth devices is not
    encrypted during communication and maybe
    intercepted potentially allowing unauthorized
    access to your Bluetooth device.

11
Bluetooth Security
  • Bluetooths frequency hopping technique makes it
    difficult to intercept its communication because
    the frequency is always changing. Equipment
    capable of synchronizing to the frequency hopping
    is needed and is very expensive.
  • Usually the data sent by Bluetooth devices is of
    low importance, meaning it has a inherently lower
    risk of interception or desire for interception.

http//static.howstuffworks.com/gif/bluetooth-card
.jpg
12
Bluetooth Security
  • Overall the risk of unauthorized access to your
    Bluetooth device is low because these methods and
    the high cost of equipment capable of
    synchronizing with Bluetooth frequency hopping.
  • However with all wireless communication there is
    some risk involved.

http//www.cnet.com/i/ts/ces/2004/ps/BluetoothPhon
e_OVR_300.gif
13
So What Exactly is Bluetooth?
  • Hardware
  • A chip that establishes links and protocols
  • Software
  • Where the user actual can interact
  • Programs are written to handle the data

14
Hardware
  • A chip that creates a Bluetooth connection
  • Usually Low Power
  • 1 milliwatt signal
  • Avoids Interference
  • Limits Range
  • 10 Meters (32 Feet)

http//www.a7eng.com/products/embeddedblue/images/
eb501_top.jpg
15
Hardware
  • Serial Adapter
  • Replaces current serial wires with this chip to
    create a Bluetooth connection between devices
  • Similar designs can be found for other I/O ports
    such as USB

Antenna Attachment
DC Input
Serial Port
http//www.a7eng.com/products/embeddedblue/images/
eb501_top.jpg
16
Software
  • Once connection is established, the software
    determines what to do with data
  • User can create his/her own applications if savvy
    enough

17
Software
  • A Multitude of Software is out there
  • Software to do things such as
  • Transfer files to and from your phone
  • Route Mobile Calls to Your Home Phone when in
    Range
  • Use your Phone as a remote for you computer (good
    for PowerPoint presentations)

18
Piconet
  • A group of Bluetooth devices communicating with
    each other
  • 1 master, up to 7 slaves
  • Master determines hopping pattern

MMaster SBStandby PParked SSlave
http//eceserv0.ece.wisc.edu/sharmav/bluetooth/ar
chive.htm
19
Sending in a Piconet
http//eceserv0.ece.wisc.edu/sharmav/bluetooth/ar
chive.htm
20
Sending in a Piconet
fk
fk1
fk2
fk3
fk4
fk5
Master
Slave1
http//eceserv0.ece.wisc.edu/sharmav/bluetooth/ar
chive.htm
21
Piconet Efficiency
http//eceserv0.ece.wisc.edu/sharmav/bluetooth/ar
chive.htm
22
Pairing
  • To become paired
  • Two devices A and B
  • A is searching for other devices to connect to it
  • B enters the range and A detects it
  • A Passkey is entered into both devices
  • If As Passkey matches Bs passkey
  • A trusted pair is formed
  • As long as it is enabled on the devices,
    authentication shouldnt have to be done again if
    Device B leaves range and enters again later

23
How it all fits together
  • There is a Bluetooth Piconet already set up.
  • Lets say in it there is currently a computer, a
    stereo, and the house lighting in it.
  • The Computer is the Master
  • Another Bluetooth device is a Bluetooth House
    phone not connected to any system
  • So what can we do?
  • Computer can control the lights and stereo.

Home Phone
Stereo
Lights
Computer
Slave
Master
24
Things to Realize
  • The Computer talks to both the Stereo and the
    Lights, and they both talk back.
  • Stereo and Lights never talk to each other
  • Computer determines hop pattern.
  • All Devices Have Been on the Network Before
  • Already Paired

25
Enter New Device
  • Add a Cell phone
  • Person Walks into Room
  • As it gets in range a radio signal is sent out
    with its address
  • A range of addresses are given for the type of
    device
  • If a device can connect to the device (it knows
    what range addresses it can connect to) it will.

26
Were Talking Now
  • The Computer and Home phone respond
  • The Computer sees that it has paired with it
    before and connects it as a slave to its group
  • The Computer sets up the pseudo-random hopping
    sequence using its clock and address
  • The Cell Phone does the same with the Home Phone

27
Alright
  • Now the Cell Phone can send and receive files
    from the computer.
  • The Cell Phone will now route all calls to the
    Home Phone.
  • Two Piconets have been formed

Home Phone
Stereo
Lights
Computer
Cell
Slave
Master
28
Advantages
  • Bluetooth Devices are wireless
  • Bluetooth Tech is inexpensive
  • Bluetooth is automatic
  • Standardized Protocol

29
Advantages
  • Low Interference
  • Low Energy Consumption
  • Share Voice and Data
  • Endless applications

30
Disadvantages
  • Low Data Transfer Rate
  • 721 Kbps
  • Range 30ft
  • Mediocre Security
  • bluejacking
  • bluebugging
  • bluesnarfing
  • Car Whisperer

31
Where is it used?
  • Wireless Control Communication
  • Data Transmission
  • Cordless Desktop PC
  • Mobile Gaming

32
Wireless Control Communication
  • Communication between
  • Cell phone and a hands-free headset
  • PC and wireless input and output devices
  • Game Consoles and their wireless controllers

33
Data Transmission
  • Bluetooth enabled devices
  • Mobile phones
  • Smartphones
  • PDAs
  • Notebooks
  • GPS Receivers
  • Data types
  • Voice, Video, Images, Files and Data

34
Cordless Desktop PC
  • Connection between PC and its peripherals
  • Mouse
  • Keyboard/game pad
  • Printer/Scanner
  • Speaker system
  • Modems
  • Cameras

35
Mobile Gaming
  • Devices
  • Nokia N-gage
  • Gizmondo
  • Purpose
  • New level of gaming
  • Play with all your friends
  • Play anytime, anyplace

36
The Future
  • 05/2005 Announced To Team Up With UWB
    Developers (480mbits/s)
  • Estimated 2 Billion Devices Shipped Per Year By
    2010

37
Questions
  • Questions?
About PowerShow.com