CDA 6505 Network Architecture and Client/Server Computing

Slides:



Advertisements
Similar presentations
Bluetooth.
Advertisements

Presentation by Anna La Mura and Marcus Nagel TIM01AGR
Quiz Sketch the time domain waveform and spectrum, labeling all important features, of a rectangular pulse of 2.4 Ghz having 1 uS duration.
BLUETOOTH TM :A new radio interface providing ubiquitous connectivity Jaap C.Haartsen Ericssion Radio System B.V IEEE.
Bluetooth PANs IEEE
Digital Systems Design VHDL in Bluetooth Baseband Module by Marc A. Mackey.
1 Introduction to Bluetooth v1.1 (Part I) Overview Radio Specification Baseband Specification LMP L2CAP.
Lecture 16: WPAN IEEE (Bluetooth & ZigBee) Anders Västberg Slides are a selection from the slides from chapter 15 from:
Prof. Dr.-Ing. Jochen Schiller, SS057.1 SCO payload types payload (30) audio (30) audio (10) HV3 HV2 HV1 DV FEC (20) audio.
Overview of the Bluetooth technology
Sattam Al-Sahli – Emad Al-Hemyari –
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 11th Lecture Christian Schindelhauer.
Mohamed Mokdad Ecole d’Ingénieurs de Bienne
CPET 260 Bluetooth. What is Bluetooth? Not IEEE (Wi-Fi) or HomeRF Originally designed to replace wires Short-range, lower-power wireless technology.
Bluetooth: Technology for Short-Range Wireless Apps Author:Pravin Bhagwat Presented by Chin-Yi Tsai IEEE INTERNET COMPUTING MAY.JUNE 2001.
Chapter 15 Wireless Communications and Networks—W. Stallings
® The Bluetooth Architecture APIs, L2CAP, Link Management, Baseband, and the Radio.
BLUETOOTH.
Bluetooth1 Bluetooth Technology Farinaz Edalat, Ganesh Gopal, Saswat Misra, Deepti Rao April 26, 2001.
BLUETOOTH. Introduction Bluetooth technology discussed here aims at so-called ad- hoc piconets, which are local area networks with a very limited coverage.
Distributed systems – Part 2  Bluetooth – 2 nd set of slides Anila Mjeda.
Asstt. Professor Adeel Akram. Bluetooth Consortium: Ericsson, Motorola, Intel, IBM, Nokia, Toshiba… Scenarios: connection of peripheral devices loudspeaker,
Modeling & Simulation of Bluetooth MAC protocol COE543 Term Project Spring 2003 Submitted by: H.M.Asif (ID# )
Bluetooth (BT) Protocol Architecture
Data and Computer Communications Tenth Edition by William Stallings Data and Computer Communications, Tenth Edition by William Stallings, (c) Pearson Education.
A runic alphabet used to write German language
Bluetooth: Introduction
WIRELESS LANs BLUETOOTH.
Ch 7. Wireless Personal Area Networks
INTRODUCTION OVERVIEW OF OPERATION FREQUENCY HOPPING NETWORKING CONNECTION POWER CONSIDERATIONS CORE ARCHITECTURE RELIABILITY AND SECURITY ADVANTAGES.
3. Bluetooth usage models 4. L2CAP process 5. Example 6. Terminology
By Santosh Sam Koshy. Agenda Need for Bluetooth Brief History of Bluetooth Introduction to Bluetooth Bluetooth System Specifications Commercial Bluetooth.
Bluetooth Background Ericsson, IBM, Intel, Nokia, and Toshiba
Ad Hoc Nets - MAC layer Part II – TDMA and Polling - Bluetooth.
Distributed Topology Construction of Bluetooth Personal Area Networks Theodoros Salonidis, Pravin Bhagwat, Leandros Tassiulas and Richard LaMaire.
Bluetooth Techniques ECE 591. Overview  Universal short-range wireless capability  Uses 2.4-GHz band  Available globally for unlicensed users  Devices.
Bluetooth Techniques Chapter 15. Overview Universal short-range wireless capability Uses 2.4-GHz band Available globally for unlicensed users Devices.
Introduction to bluetooth. outline Why bluetooth History Bluetooth stack and technology Reference.
Lecture: Bluetooth and Zigbee Anders Västberg Slides are a selection from the slides from chapter 12,13, and 14 from:
Bluetooth.
Wireless Networks Instructor: Fatima Naseem Computer Engineering Department, University of Engineering and Technology, Taxila.
Bluetooth Techniques Chapter 15. Overview of Bluetooth Initially developed by Swedish mobile phone maker in 1994 to let laptop computers make calls over.
발표자 : 현근수 Bluetooth. Overview wireless protocol short-range communications technology single digital wireless protocol connecting multiple devices mobile.
Team Topic Presentation Team 6 BLUETOOTH What is Bluetooth? Cable Replacement Automatic Connectivity Hidden Computing Few Examples: 1.Automatic Door.
BLUETOOTH WIRELESS TECHNOLOGY
Chapter 12 Bluetooth and IEEE
Lectured By: Vivek Dimri Asst Professor CSE Deptt. SET.
Bluetooth In 1994, the L. M. Ericsson company became interested in connecting its mobile phones to other devices without cables. A SIG (Special Interest.
Bluetooth.
Computer Data Communications. Types of Wireless Networks 2.
Development of a Bluetooth based web camera module.
1 Wireless Networks Lecture 39 Bluetooth/Wireless Personal Area Networks (WPAN) Dr. Ghalib A. Shah.
Bluetooth Technology -Prepared By Jasmin Patel -Guided By Jagruti Goswami.
Bluetooth Technology -Prepared By Jasmin Patel -Guided By Jagruti Goswami.
What is Bluetooth? A cable-replacement technology that can be used to connect almost any device to any other device Radio interface enabling electronic.
Corso di Reti mobili Wi-Fi and Bluetooth Francesco Potortì
Bluetooth Technology Name- Bittu Kumar Roll No.- A05 Section- E2801
SSN College of Engineering
BLUETOOTH THE STANDARD & ISSUES.
Channel Control Interim substates for adding new slaves
A Wireless LAN technologies IEEE
Unit – III Wireless PAN’s
Wireless NETWORKS NET 434 Topic No 7 Bluetooth-IEEE802.15
Wireless NETWORKS NET 434 Topic No 7 Bluetooth-IEEE802.15
Wireless NETWORKS NET 434 Topic No 7 Bluetooth-IEEE802.15
CSE 4215/5431: Mobile Communications Winter 2010
Bluetooth and Mobile IP
BLUETOOTH Personal Area Networking [ PAN ] over Bluetooth
Bluetooth and Mobile IP
Presentation transcript:

CDA 6505 Network Architecture and Client/Server Computing Bluetooth by Zornitza Genova Prodanoff LectA..ppt - 04/06/05

Universal short-range wireless capability Uses 2.4-GHz band Overview Universal short-range wireless capability Uses 2.4-GHz band Available globally for unlicensed users Devices within 10 m can share up to 720 kbps of capacity Supports open-ended list of applications Data, audio, graphics, video 02

Bluetooth Application Areas Data and voice access points Real-time voice and data transmissions Cable replacement Eliminates need for numerous cable attachments for connection Ad hoc networking Device with Bluetooth radio can establish connection with another when in range 03

Bluetooth Standards Documents Core specifications Details of various layers of Bluetooth protocol architecture Profile specifications Use of Bluetooth technology to support various applications 04

Protocol Architecture Bluetooth is a layered protocol architecture Core protocols Cable replacement and telephony control protocols Adopted protocols Radio Baseband Link manager protocol (LMP) Logical link control and adaptation protocol (L2CAP) Service discovery protocol (SDP) 05

Protocol Architecture Cable replacement protocol RFCOMM Telephony control protocol Telephony control specification – binary (TCS BIN) Adopted protocols PPP TCP/UDP/IP OBEX WAE/WAP 06

Usage Models File transfer Internet bridge LAN access Synchronization Three-in-one phone Headset 07

Piconets and Scatternets Basic unit of Bluetooth networking Master and one to seven slave devices Master determines channel and phase Scatternet Device in one piconet may exist as master or slave in another piconet Allows many devices to share same area Makes efficient use of bandwidth 08

Wireless Network Configurations

Classes of transmitters Class 1: Outputs 100 mW for maximum range Radio Specification Classes of transmitters Class 1: Outputs 100 mW for maximum range Power control mandatory Provides greatest distance Class 2: Outputs 2.4 mW at maximum Power control optional Class 3: Nominal output is 1 mW Lowest power 010

Frequency Hopping in Bluetooth Provides resistance to interference and multipath effects Provides a form of multiple access among co-located devices in different piconets 011

Total bandwidth divided into 1MHz physical channels Frequency Hopping Total bandwidth divided into 1MHz physical channels FH occurs by jumping from one channel to another in pseudorandom sequence Hopping sequence shared with all devices on piconet Piconet access: Bluetooth devices use time division duplex (TDD) Access technique is TDMA FH-TDD-TDMA 012

Frequency Hopping 013

Physical Links between Master and Slave Synchronous connection oriented (SCO) Allocates fixed bandwidth between point-to-point connection of master and slave Master maintains link using reserved slots Master can support three simultaneous links Asynchronous connectionless (ACL) Point-to-multipoint link between master and all slaves Only single ACL link can exist 014

Bluetooth Packet Fields Access code – used for timing synchronization, offset compensation, paging, and inquiry Header – used to identify packet type and carry protocol control information Payload – contains user voice or data and payload header, if present 015

Channel access code (CAC) – identifies a piconet Types of Access Codes Channel access code (CAC) – identifies a piconet Device access code (DAC) – used for paging and subsequent responses Inquiry access code (IAC) – used for inquiry purposes 016

Preamble – used for DC compensation 0101 if LSB of sync word is 0 Access Code Preamble – used for DC compensation 0101 if LSB of sync word is 0 1010 if LSB of synch word is 1 Sync word – 64-bits, derived from: 7-bit Barker sequence Lower address part (LAP) Pseudonoise (PN) sequence Trailer 0101 if MSB of sync word is 1 1010 if MSB of sync word is 0 017

AM_ADDR – contains “active mode” address of one of the slaves Packet Header Fields AM_ADDR – contains “active mode” address of one of the slaves Type – identifies type of packet Flow – 1-bit flow control ARQN – 1-bit acknowledgment SEQN – 1-bit sequential numbering schemes Header error control (HEC) – 8-bit error detection code 018

L_CH field – identifies logical channel Payload Format Payload header L_CH field – identifies logical channel Flow field – used to control flow at L2CAP level Length field – number of bytes of data Payload body – contains user data CRC – 16-bit CRC code 019

Error Correction Schemes 1/3 rate FEC (forward error correction) Used on 18-bit packet header, voice field in HV1 packet 2/3 rate FEC Used in DM packets, data fields of DV packet, FHS packet and HV2 packet ARQ Used with DM and DH packets 020

Error detection – destination detects errors, discards packets ARQ Scheme Elements Error detection – destination detects errors, discards packets Positive acknowledgment – destination returns positive acknowledgment Retransmission after timeout – source retransmits if packet unacknowledged Negative acknowledgment and retransmission – destination returns negative acknowledgement for packets with errors, source retransmits 021

User asynchronous (UA) User isochronous (UI) Use synchronous (US) Logical Channels Link control (LC) Link manager (LM) User asynchronous (UA) User isochronous (UI) Use synchronous (US) 022

Standby – default state Connection – device connected Channel Control States of operation of a piconet during link establishment and maintenance Major states Standby – default state Connection – device connected 023

Interim substates for adding new slaves Channel Control Interim substates for adding new slaves Page – device issued a page (used by master) Page scan – device is listening for a page Master response – master receives a page response from slave Slave response – slave responds to a page from master Inquiry – device has issued an inquiry for identity of devices within range Inquiry scan – device is listening for an inquiry Inquiry response – device receives an inquiry response 024

State Transition Diagram

Potential master identifies devices in range that wish to participate Inquiry Procedure Potential master identifies devices in range that wish to participate Transmits ID packet with inquiry access code (IAC) Occurs in Inquiry state Device receives inquiry Enter Inquiry Response state Returns FHS packet with address and timing information Moves to page scan state 026

Slave responds with DAC ID packet Master responds with its FHS packet Page Procedure Master uses devices address to calculate a page frequency-hopping sequence Master pages with ID packet and device access code (DAC) of specific slave Slave responds with DAC ID packet Master responds with its FHS packet Slave confirms receipt with DAC ID Slaves moves to Connection state 027

Slave Connection State Modes Active – participates in piconet Listens, transmits and receives packets Sniff – only listens on specified slots Hold – does not support ACL packets Reduced power status May still participate in SCO exchanges Park – does not participate on piconet Still retained as part of piconet 028

Voice encoding schemes: Pulse code modulation (PCM) Bluetooth Audio Voice encoding schemes: Pulse code modulation (PCM) Continuously variable slope delta (CVSD) modulation Choice of scheme made by link manager Negotiates most appropriate scheme for application 029

Bluetooth Link Security Elements: Authentication – verify claimed identity Encryption – privacy Key management and usage Security algorithm parameters: Unit address Secret authentication key Secret privacy key Random number 030

Change current link key Encryption LMP PDUs General response Security Service Authentication Pairing Change link key Change current link key Encryption 031

Time/synchronization Clock offset request Slot offset information LMP PDUs Time/synchronization Clock offset request Slot offset information Timing accuracy information request Station capability LMP version Supported features 032

Switch master/slave role Name request Detach Hold mode Sniff mode LMP PDUs Mode control Switch master/slave role Name request Detach Hold mode Sniff mode Park mode Power control 033

Channel quality-driven change between DM and DH Quality of service LMP PDUs Mode control (cont.) Channel quality-driven change between DM and DH Quality of service Control of multislot packets Paging scheme Link supervision 034

Relies on lower layer for flow and error control L2CAP Provides a link-layer protocol between entities with a number of services Relies on lower layer for flow and error control Makes use of ACL links, does not support SCO links Provides two alternative services to upper-layer protocols Connection service Connection-mode service 035

Supports connectionless service Each channel is unidirectional L2CAP Logical Channels Connectionless Supports connectionless service Each channel is unidirectional Used from master to multiple slaves Connection-oriented Supports connection-oriented service Each channel is bidirectional Signaling Provides for exchange of signaling messages between L2CAP entities 036

L2CAP Packet Fields for Connectionless Service Length – length of information payload, PSM fields Channel ID – 2, indicating connectionless channel Protocol/service multiplexer (PSM) – identifies higher-layer recipient for payload Not included in connection-oriented packets Information payload – higher-layer user data 037

Signaling Packet Payload Consists of one or more L2CAP commands, each with four fields Code – identifies type of command Identifier – used to match request with reply Length – length of data field for this command Data – additional data for command, if necessary 038

L2CAP Signaling Command Codes 039

L2CAP Signaling Commands Command reject command Sent to reject any command Connection commands Used to establish new connections Configure commands Used to establish a logical link transmission contract between two L2CAP entities 040

L2CAP Signaling Commands Disconnection commands Used to terminate logical channel Echo commands Used to solicit response from remote L2CAP entity Information commands Used to solicit implementation-specific information from remote L2CAP entity 041

Flow Specification Parameters Service type Token rate (bytes/second) Token bucket size (bytes) Peak bandwidth (bytes/second) Latency (microseconds) Delay variation (microseconds) 042