Lecture: Bluetooth and Zigbee Anders Västberg 08-790 44 55 Slides are a selection from the slides from chapter 12,13, and 14 from:

Slides:



Advertisements
Similar presentations
Bluetooth.
Advertisements

Presentation by Anna La Mura and Marcus Nagel TIM01AGR
Quiz Sketch the time domain waveform and spectrum, labeling all important features, of a rectangular pulse of 2.4 Ghz having 1 uS duration.
BLUETOOTH TM :A new radio interface providing ubiquitous connectivity Jaap C.Haartsen Ericssion Radio System B.V IEEE.
Bluetooth PANs IEEE
Digital Systems Design VHDL in Bluetooth Baseband Module by Marc A. Mackey.
1 Introduction to Bluetooth v1.1 (Part I) Overview Radio Specification Baseband Specification LMP L2CAP.
Lecture 16: WPAN IEEE (Bluetooth & ZigBee) Anders Västberg Slides are a selection from the slides from chapter 15 from:
Prof. Dr.-Ing. Jochen Schiller, SS057.1 SCO payload types payload (30) audio (30) audio (10) HV3 HV2 HV1 DV FEC (20) audio.
CDA 6505 Network Architecture and Client/Server Computing
Overview of the Bluetooth technology
Sattam Al-Sahli – Emad Al-Hemyari –
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 11th Lecture Christian Schindelhauer.
Mohamed Mokdad Ecole d’Ingénieurs de Bienne
CPET 260 Bluetooth. What is Bluetooth? Not IEEE (Wi-Fi) or HomeRF Originally designed to replace wires Short-range, lower-power wireless technology.
Bluetooth: Technology for Short-Range Wireless Apps Author:Pravin Bhagwat Presented by Chin-Yi Tsai IEEE INTERNET COMPUTING MAY.JUNE 2001.
Chapter 15 Wireless Communications and Networks—W. Stallings
® The Bluetooth Architecture APIs, L2CAP, Link Management, Baseband, and the Radio.
BLUETOOTH.
Bluetooth1 Bluetooth Technology Farinaz Edalat, Ganesh Gopal, Saswat Misra, Deepti Rao April 26, 2001.
Bluetooth Introduction The Bluetooth Technology
BLUETOOTH. Introduction Bluetooth technology discussed here aims at so-called ad- hoc piconets, which are local area networks with a very limited coverage.
Distributed systems – Part 2  Bluetooth – 2 nd set of slides Anila Mjeda.
Asstt. Professor Adeel Akram. Bluetooth Consortium: Ericsson, Motorola, Intel, IBM, Nokia, Toshiba… Scenarios: connection of peripheral devices loudspeaker,
Modeling & Simulation of Bluetooth MAC protocol COE543 Term Project Spring 2003 Submitted by: H.M.Asif (ID# )
Bluetooth (BT) Protocol Architecture
Data and Computer Communications Tenth Edition by William Stallings Data and Computer Communications, Tenth Edition by William Stallings, (c) Pearson Education.
Bluetooth Techniques IEEE Bluetooth technology is a short-range wireless communication technology that is simple, secure, and everywhere. The.
A runic alphabet used to write German language
Bluetooth: Introduction
WIRELESS LANs BLUETOOTH.
Ch 7. Wireless Personal Area Networks
INTRODUCTION OVERVIEW OF OPERATION FREQUENCY HOPPING NETWORKING CONNECTION POWER CONSIDERATIONS CORE ARCHITECTURE RELIABILITY AND SECURITY ADVANTAGES.
By Santosh Sam Koshy. Agenda Need for Bluetooth Brief History of Bluetooth Introduction to Bluetooth Bluetooth System Specifications Commercial Bluetooth.
Bluetooth Background Ericsson, IBM, Intel, Nokia, and Toshiba
Ad Hoc Nets - MAC layer Part II – TDMA and Polling - Bluetooth.
Distributed Topology Construction of Bluetooth Personal Area Networks Theodoros Salonidis, Pravin Bhagwat, Leandros Tassiulas and Richard LaMaire.
Bluetooth Techniques ECE 591. Overview  Universal short-range wireless capability  Uses 2.4-GHz band  Available globally for unlicensed users  Devices.
Bluetooth Techniques Chapter 15. Overview Universal short-range wireless capability Uses 2.4-GHz band Available globally for unlicensed users Devices.
Introduction to bluetooth. outline Why bluetooth History Bluetooth stack and technology Reference.
King Fahd University of Petroleum & Minerals Electrical Engineering Department EE400 PROJECT Personal Area Networks Instructed by Dr.AlGhadbanPresenters.
Wireless Networks Instructor: Fatima Naseem Computer Engineering Department, University of Engineering and Technology, Taxila.
Bluetooth Techniques Chapter 15. Overview of Bluetooth Initially developed by Swedish mobile phone maker in 1994 to let laptop computers make calls over.
발표자 : 현근수 Bluetooth. Overview wireless protocol short-range communications technology single digital wireless protocol connecting multiple devices mobile.
Team Topic Presentation Team 6 BLUETOOTH What is Bluetooth? Cable Replacement Automatic Connectivity Hidden Computing Few Examples: 1.Automatic Door.
BLUETOOTH WIRELESS TECHNOLOGY
Chapter 12 Bluetooth and IEEE
Lectured By: Vivek Dimri Asst Professor CSE Deptt. SET.
Bluetooth In 1994, the L. M. Ericsson company became interested in connecting its mobile phones to other devices without cables. A SIG (Special Interest.
Bluetooth.
Computer Data Communications. Types of Wireless Networks 2.
Development of a Bluetooth based web camera module.
1 Wireless Networks Lecture 39 Bluetooth/Wireless Personal Area Networks (WPAN) Dr. Ghalib A. Shah.
Bluetooth Technology -Prepared By Jasmin Patel -Guided By Jagruti Goswami.
Bluetooth Technology -Prepared By Jasmin Patel -Guided By Jagruti Goswami.
What is Bluetooth? A cable-replacement technology that can be used to connect almost any device to any other device Radio interface enabling electronic.
Corso di Reti mobili Wi-Fi and Bluetooth Francesco Potortì
Bluetooth Technology Name- Bittu Kumar Roll No.- A05 Section- E2801
SSN College of Engineering
BLUETOOTH THE STANDARD & ISSUES.
Channel Control Interim substates for adding new slaves
A Wireless LAN technologies IEEE
Unit – III Wireless PAN’s
Wireless NETWORKS NET 434 Topic No 7 Bluetooth-IEEE802.15
Wireless NETWORKS NET 434 Topic No 7 Bluetooth-IEEE802.15
Wireless NETWORKS NET 434 Topic No 7 Bluetooth-IEEE802.15
Bluetooth and Mobile IP
BLUETOOTH Personal Area Networking [ PAN ] over Bluetooth
Bluetooth and Mobile IP
Presentation transcript:

Lecture: Bluetooth and Zigbee Anders Västberg Slides are a selection from the slides from chapter 12,13, and 14 from:

Bluetooth Overview Universal short-range wireless capability Uses 2.4-GHz band Available globally for unlicensed users Devices within 10 m can share up to 720 kbps of capacity Supports open-ended list of applications –Data, audio, graphics, video

Bluetooth Application Areas Data and voice access points –Real-time voice and data transmissions Cable replacement –Eliminates need for numerous cable attachments for connection Ad hoc networking –Device with Bluetooth radio can establish connection with another when in range

Bluetooth Standards Documents Core specifications –Details of various layers of Bluetooth protocol architecture Profile specifications –Use of Bluetooth technology to support various applications

Protocol Architecture Bluetooth is a layered protocol architecture –Core protocols –Cable replacement and telephony control protocols –Adopted protocols Core protocols –Radio –Baseband –Link manager protocol (LMP) –Logical link control and adaptation protocol (L2CAP) –Service discovery protocol (SDP)

Protocol Architecture Cable replacement protocol –RFCOMM Telephony control protocol –Telephony control specification – binary (TCS BIN) Adopted protocols –PPP –TCP/UDP/IP –OBEX –WAE/WAP

Usage Models File transfer Internet bridge LAN access Synchronization Three-in-one phone Headset

Usage Models

Piconets and Scatternets Piconet –Basic unit of Bluetooth networking –Master and one to seven slave devices –Master determines channel and phase Scatternet –Device in one piconet may exist as master or slave in another piconet –Allows many devices to share same area –Makes efficient use of bandwidth

Wireless Network Configurations

Radio Specification Classes of transmitters –Class 1: Outputs 100 mW for maximum range Power control mandatory Provides greatest distance –Class 2: Outputs 2.4 mW at maximum Power control optional –Class 3: Nominal output is 1 mW Lowest power

Frequency Hopping in Bluetooth Provides resistance to interference and multipath effects Provides a form of multiple access among co- located devices in different piconets

Frequency Hopping Total bandwidth divided into 1MHz physical channels FH occurs by jumping from one channel to another in pseudorandom sequence Hopping sequence shared with all devices on piconet Piconet access: –Bluetooth devices use time division duplex (TDD) –Access technique is TDMA –FH-TDD-TDMA

Frequency Hopping

Physical Links between Master and Slave Synchronous connection oriented (SCO) –Allocates fixed bandwidth between point-to-point connection of master and slave –Master maintains link using reserved slots –Master can support three simultaneous links Asynchronous connectionless (ACL) –Point-to-multipoint link between master and all slaves –Only single ACL link can exist

Bluetooth Baseband format

Bluetooth Packet Fields Access code – used for timing synchronization, offset compensation, paging, and inquiry Header – used to identify packet type and carry protocol control information Payload – contains user voice or data and payload header, if present

Types of Access Codes Channel access code (CAC) – identifies a piconet Device access code (DAC) – used for paging and subsequent responses Inquiry access code (IAC) – used for inquiry purposes

Access Code Preamble – used for DC compensation –0101 if LSB of sync word is 0 –1010 if LSB of synch word is 1 Sync word – 64-bits, derived from: –7-bit Barker sequence –Lower address part (LAP) –Pseudonoise (PN) sequence Trailer –0101 if MSB of sync word is 1 –1010 if MSB of sync word is 0

Packet Header Fields AM_ADDR – contains “active mode” address of one of the slaves Type – identifies type of packet Flow – 1-bit flow control ARQN – 1-bit acknowledgment SEQN – 1-bit sequential numbering schemes Header error control (HEC) – 8-bit error detection code

Payload Format Payload header –L_CH field – identifies logical channel –Flow field – used to control flow at L2CAP level –Length field – number of bytes of data Payload body – contains user data CRC – 16-bit CRC code

Error Correction Schemes 1/3 rate FEC (forward error correction) –Used on 18-bit packet header, voice field in HV1 packet 2/3 rate FEC –Used in DM packets, data fields of DV packet, FHS packet and HV2 packet ARQ –Used with DM and DH packets

ARQ Scheme Elements Error detection – destination detects errors, discards packets Positive acknowledgment – destination returns positive acknowledgment Retransmission after timeout – source retransmits if packet unacknowledged Negative acknowledgment and retransmission – destination returns negative acknowledgement for packets with errors, source retransmits

Bluetooth ARQ

Logical Channels Link control (LC) Link manager (LM) User asynchronous (UA) User isochronous (UI) Use synchronous (US)

Channel Control States of operation of a piconet during link establishment and maintenance Major states –Standby – default state –Connection – device connected

Channel Control Interim substates for adding new slaves –Page – device issued a page (used by master) –Page scan – device is listening for a page –Master response – master receives a page response from slave –Slave response – slave responds to a page from master –Inquiry – device has issued an inquiry for identity of devices within range –Inquiry scan – device is listening for an inquiry –Inquiry response – device receives an inquiry response

State Transition Diagram

Inquiry Procedure Potential master identifies devices in range that wish to participate –Transmits ID packet with inquiry access code (IAC) –Occurs in Inquiry state Device receives inquiry –Enter Inquiry Response state –Returns FHS packet with address and timing information –Moves to page scan state

Page Procedure Master uses devices address to calculate a page frequency-hopping sequence Master pages with ID packet and device access code (DAC) of specific slave Slave responds with DAC ID packet Master responds with its FHS packet Slave confirms receipt with DAC ID Slaves moves to Connection state

Slave Connection State Modes Active – participates in piconet –Listens, transmits and receives packets Sniff – only listens on specified slots Hold – does not support ACL packets –Reduced power status –May still participate in SCO exchanges Park – does not participate on piconet –Still retained as part of piconet

Bluetooth Audio Voice encoding schemes: –Pulse code modulation (PCM) –Continuously variable slope delta (CVSD) modulation Choice of scheme made by link manager –Negotiates most appropriate scheme for application

Bluetooth Link Security Elements: –Authentication – verify claimed identity –Encryption – privacy –Key management and usage Security algorithm parameters: –Unit address –Secret authentication key –Secret privacy key –Random number

LMP PDUs General response Security Service –Authentication –Pairing –Change link key –Change current link key –Encryption

LMP PDUs Time/synchronization –Clock offset request –Slot offset information –Timing accuracy information request Station capability –LMP version –Supported features

LMP PDUs Mode control –Switch master/slave role –Name request –Detach –Hold mode –Sniff mode –Park mode –Power control

LMP PDUs Mode control (cont.) –Channel quality-driven change between DM and DH –Quality of service –Control of multislot packets –Paging scheme –Link supervision

L2CAP Provides a link-layer protocol between entities with a number of services Relies on lower layer for flow and error control Makes use of ACL links, does not support SCO links Provides two alternative services to upper-layer protocols –Connection service –Connection-mode service

L2CAP Logical Channels Connectionless –Supports connectionless service –Each channel is unidirectional –Used from master to multiple slaves Connection-oriented –Supports connection-oriented service –Each channel is bidirectional Signaling –Provides for exchange of signaling messages between L2CAP entities

L2CAP Packet Fields for Connectionless Service Length – length of information payload, PSM fields Channel ID – 2, indicating connectionless channel Protocol/service multiplexer (PSM) – identifies higher-layer recipient for payload –Not included in connection-oriented packets Information payload – higher-layer user data

Signaling Packet Payload Consists of one or more L2CAP commands, each with four fields –Code – identifies type of command –Identifier – used to match request with reply –Length – length of data field for this command –Data – additional data for command, if necessary

L2CAP Signaling Command Codes

L2CAP Signaling Commands Command reject command –Sent to reject any command Connection commands –Used to establish new connections Configure commands –Used to establish a logical link transmission contract between two L2CAP entities

L2CAP Signaling Commands Disconnection commands –Used to terminate logical channel Echo commands –Used to solicit response from remote L2CAP entity Information commands –Used to solicit implementation-specific information from remote L2CAP entity

Flow Specification Parameters Service type Token rate (bytes/second) Token bucket size (bytes) Peak bandwidth (bytes/second) Latency (microseconds) Delay variation (microseconds)

IEEE

“Zigbee” ZigBee is a low-power wireless communications technology ZigBee uses the PHY and MAC layers defined by IEEE , which is the short-distance wireless communication standard for 2.4 GHz band.

Zigbee Features Low Power Robust Mesh Networking Interoperability

Trellis Coded Modulation

Protocol Architecture