By Alisia Dunham & Chiana Grant.  1994: L.M. Ericsson company had an idea of connecting mobile phones to other devices without cable  1998: SIG (Special.

Slides:



Advertisements
Similar presentations
Bluetooth.
Advertisements

Why to learn OSI reference Model? The answer is too simple that It tells us that how communication takes place between computers on internet but how??
BLUETOOTH TM :A new radio interface providing ubiquitous connectivity Jaap C.Haartsen Ericssion Radio System B.V IEEE.
BLUETOOTH. INTRODUCTION A look around at the moment! Keyboard connected to the computer, as well as a printer, mouse, monitor and so on. What (literally)
1 Introduction to Bluetooth v1.1 (Part I) Overview Radio Specification Baseband Specification LMP L2CAP.
Sattam Al-Sahli – Emad Al-Hemyari –
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 11th Lecture Christian Schindelhauer.
Mobile Communications: Wireless LANs Mobile Communications Chapter 7: Wireless LANs ª Parte - Bluetooth.
By Abdullah M. Dalloul… Abdullah M. Dalloul… Salman Y. Mansour Salman Y. Mansour Supervisor. Supervisor. Dr.
CPET 260 Bluetooth. What is Bluetooth? Not IEEE (Wi-Fi) or HomeRF Originally designed to replace wires Short-range, lower-power wireless technology.
1 Mini Course Programming Context-aware Mobile Phones Thomas Bodin IT University of Copenhagen.
The Protocol Stack Part of the protocol stack.
What is Bluetooth? Bluetooth technology is a peripheral that connects to a variety of products in order to provide wireless connections.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
Bluetooth Introduction The Bluetooth Technology
By: Trevor Parker, Minh-Tri Le. Bluetooth is a wireless technology that is a low-cost, low-power, short-range radio for ad-hoc wireless communication,
CS 453 Computer Networks Lecture 17 Medium Access Control Sublayer Bluetooth, Switching and VLAN.
Distributed systems – Part 2  Bluetooth – 2 nd set of slides Anila Mjeda.
Modeling & Simulation of Bluetooth MAC protocol COE543 Term Project Spring 2003 Submitted by: H.M.Asif (ID# )
Respected Sir & dear friends. Presented by Mohd. Sufiyan MCA –Vth Sem Sec-A2 GIMT (Gr. Noida)
Bluetooth & WPAN. 2 Bluetooth/WPAN WPAN (Wireless Personal Area Network) has a smaller area of coverage, say, 2.5 mW transmitter power, distance
Overview of Wireless LANs Use wireless transmission medium Issues of high prices, low data rates, occupational safety concerns, & licensing requirements.
What is Blue Tooth ? Blue tooth is a cable replacement technology that can be used to connect almost any device to any other devices. Blue tooth is the.
INTRODUCTION Bluetooth technology is code name for Personal Area Network (PAN) technology that makes it extremely easy to connect a mobile, computing device.
WIRELESS LANs BLUETOOTH.
Group Members Nishant Vaity Sushant Chavan Wireless Networks As early as 1901, the Italian physcist Guglielmo Marconi demostrated a ship-to- shore.
By Santosh Sam Koshy. Agenda Need for Bluetooth Brief History of Bluetooth Introduction to Bluetooth Bluetooth System Specifications Commercial Bluetooth.
Bluetooth Background Ericsson, IBM, Intel, Nokia, and Toshiba
Distributed Topology Construction of Bluetooth Personal Area Networks Theodoros Salonidis, Pravin Bhagwat, Leandros Tassiulas and Richard LaMaire.
INTRODUCTION TO BLUETOOTH Named after tenth-century danish King Harald Blatand. Developed by Special Interest Group (SIG). Bluetooth wireless technology.
Bluetooth Techniques ECE 591. Overview  Universal short-range wireless capability  Uses 2.4-GHz band  Available globally for unlicensed users  Devices.
10/18/2007 EETS Bluetooth Bluetooth Architecture Bluetooth Applications The Bluetooth Protocol Stack The Bluetooth Radio Layer The Bluetooth Baseband.
Wireless LANs Wireless Technologies for LANs –Radio –Infrared light (as in TV remote control) –Ideal for mobile devices –Useful when wiring would.
Chapter 6 – Connectivity Devices
Doc.: IEEE /033r2 Submission July 1999 Simon Baatz, University of BonnSlide 1 Integration of Bluetooth into LAN Environments Simon Baatz, Matthias.
An Introduction to BLUETOOTH TECHNOLOGY
BLUETOOTH Created By: Ajay Bahoriya. Agenda Introduction to Bluetooth Bluetooth Basics Mode of operation Technology Security Advantages Integrating BT.
March 22, 2004 Prof. Paul Lin 1 CPET 355 BLUETOOTH Paul I-Hai Lin, Professor Electrical and Computer Engineering Technology Purdue University, Fort Wayne.
Wireless Networks Instructor: Fatima Naseem Computer Engineering Department, University of Engineering and Technology, Taxila.
Bluetooth Techniques Chapter 15. Overview of Bluetooth Initially developed by Swedish mobile phone maker in 1994 to let laptop computers make calls over.
Bluetooth By Christian Doyle. Overview What is Bluetooth? What’s with the name? Establishing a connection Multiplexing Piconets Scatternets Architecture.
발표자 : 현근수 Bluetooth. Overview wireless protocol short-range communications technology single digital wireless protocol connecting multiple devices mobile.
Team Topic Presentation Team 6 BLUETOOTH What is Bluetooth? Cable Replacement Automatic Connectivity Hidden Computing Few Examples: 1.Automatic Door.
BLUETOOTH WIRELESS TECHNOLOGY
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Connecting Devices CORPORATE INSTITUTE OF SCIENCE & TECHNOLOGY, BHOPAL Department of Electronics and.
Lectured By: Vivek Dimri Asst Professor CSE Deptt. SET.
Bluetooth In 1994, the L. M. Ericsson company became interested in connecting its mobile phones to other devices without cables. A SIG (Special Interest.
Bluetooth.
Technology By :-. What Is Bluetooth? Designed to be used to connect both mobile devices and peripherals that currently require a wire Short range wireless.
Bluetooth Technology. History The name ‘Bluetooth’ was named after 10th century Viking king in Denmark Harald Bluetooth who united and controlled Denmark.
Respected Ma’am & Dear friends
Bluetooth Technology Name- Bittu Kumar Roll No.- A05 Section- E2801
SSN College of Engineering
Physical layer protocol bluetooth
Lecture 16 Medium Access Control Sublayer Broadband Wireless
The Medium Access Control Sublayer
A Wireless LAN technologies IEEE
Unit – III Wireless PAN’s
Bluetooth, RFID, Data Link Layer Switching
Wireless NETWORKS NET 434 Topic No 7 Bluetooth-IEEE802.15
Wireless NETWORKS NET 434 Topic No 7 Bluetooth-IEEE802.15
“I don’t have to be careful, I’ve got a gun.”
Wireless NETWORKS NET 434 Topic No 7 Bluetooth-IEEE802.15
Bluetooth: Vision, Goals and Architecture
BLUETOOTH Personal Area Networking [ PAN ] over Bluetooth
Bluetooth, RFID, Data Link Layer Switching
Topic- Bluetooth Architecture
The Medium Access Control
Presentation transcript:

By Alisia Dunham & Chiana Grant

 1994: L.M. Ericsson company had an idea of connecting mobile phones to other devices without cable  1998: SIG (Special Interest Group) is formed, including four other companies, such as IBM, Nokia, Toshiba, and Intel.  This development became known as Bluetooth, after Harald Blaatand (Bluetooth) II  Viking who unified Denmark and Norway without cables (connections)  First version of Bluetooth, Version 1.0, was released in July of 1999

 All consumer electronic devices use Bluetooth, such as mobile phones, laptops, and navigation units  Protocols are included with Bluetooth  Pairing: Allows the consumer electronic devices to find and connect each other and securely transfer data  Protocols have evolved over the decade  Bluetooth 2.0 (2004): higher data rates  Bluetooth 3.0 (2009): device pairing with for high throughput data transfer  Bluetooth 4.0 (Dec. 2009) low power operation; saves battery use

 Basic Unit: piconet  Master node and up to seven active slave nodes within a distance of 10 meters  Multiple piconets may exist in the same room and can be connected through a bridge node  Two or more piconets can be interconnected to form a scatternet  205 parked nodes in the net.  Master node determines which device gets to communicate in which time slot  All communication is between master and slave

p.321

 Bluetooth SIG  Specifies particular apps to be supported and provides different protocols stacks for each one  25 profiles  6 audio and video  Hands-free telephony while driving car  Streaming stereo-quality audio and video  Digital camera to TV  Human-Interface device profile  Connects keyboards and mice to computers  Other profiles allow for a mobile phone to be used as a remote control.

 Does not follow any other model  Bottom Layer (Physical Radio Layer).  Link Control.  L2CAP (Logical Link Control Adaptation Protocol).  Top Layer.

 Moves bits from master to slave, or vice versa  10 meter range on a low-power system operating on a 2.4 GHz ISM band  Frequency hopping spread spectrum is used so other networks can coexist on the ISM band  1600 hops/sec over slots with a dwell time of 625 picoseconds  Early revisions of bluetooth and interfered enough to ruin each other’s transmissions.

 Three forms of modulation are used to send bits on a channel  Basic Scheme: frequency shift typing to send a 1- bit symbol every microsecond, which equals 1 Mbps  Enhanced Rates: phase shift keying to send 2-3 bits per symbol, which equals to 2-3 Mbps  Only used in data portion of frames

 Turns raw bit stream into frames and defines some key formats  Simplest forms.  Frame length and other characteristics.  Link manager  Pairing Procedure: old vs. new  Upon Pairing Completion, the link manager sets up 1 of 2 links  SCO (Synchronous Connection Oriented).  ACL (Asynchronous ConnectionLess.

 Access Code  54-bit header  Frame sent in 2 rates  Basic rate:  Enhanced rate:  Inside the header are 6 sub-categories:  Address  Type  Flow  Acknowledgement  Sequence  Checksum

 Low end wireless devices that can be used to form computer networks  Technology that can be found in smartcards, implants for pets, passports, and library books to name a few  dPmXE&feature=youtu.be dPmXE&feature=youtu.be

 Form of RFID that is a replacement for barcodes that stores larger amount of information  Capable of being read over 10 M in distance  Ability to communicate over distance makes it relevant

2 key components: I. Tags II. Readers

Tags small, inexpensive devices that have a 96-bit identifier and memory; memory is used to record location history; resembles a sticker and has an antenna printed on it; tiny dot in the middle = integrated circuit; “Class 1” is term used to define how tags gather power Readers are the intelligence in the system; has its own power source; in charge of determining when tags send and receive messages; main job is to discover the identifiers of nearby tags

This layer defines how bits are sent between RFID readers and tags. To spread a strong signal, limit interference, and satisfy regulatory requirement the reader performs frequency hopping at least every 400 msec. ASK or Amplitude Shift Keying is used to encode bits The reader is always transmitting a signal, regardless of whether it is the reader or tag communicating. Backscatter is used a low-energy way for tags to create weak signals of their own.

Readers need to receive a message from each tag that gives the identifier for the tag in order to inventory nearby tags. The reader tells tags the range of slots over which to randomize transmissions. However, tags randomly select slots in which to reply.

 Bridges: devices that connect LANs to a larger, faster network  Commonly called switches  Operated in data link layer  Ability to handle IP packets

 3 reasons organizations use multiple LANs  Connection.  Cost.  Load Accommodation.  To make these benefits available, bridges must be completely transparent  Two algorithms make this possible  Backward learning  Spanning tree algorithm

TWO LANS JOINED BY A BRIDGE LANS WITH POINT-TO-POINT CABLES, INCLUDING ONE HUB, ARE JOINED.

 Frame F 0 is sent to B1  B1 sends 2 copies on each link to B2  B2 sends copies of F1 and F2 to all other ports  F3 and F4 are sent back to B1, and the cycle continues

Operates at different layers Physical = repeater, hub Data link = bridge, switch Network = router Transport = transport gateway Application = application gateway

Repeaters do not understand frames, packets, or headers; only understand symbols that encode bits as volts. Hubs are physical layer devices that do not examine the link layer addresses or use them in any way Modern bridge has multiple ports, usually enough for 4 to 48 input lines of a specific type. Each port is isolated to be its own collision domain