Presentation is loading. Please wait.

Presentation is loading. Please wait.

Bluetooth Kirthika Parmeswaran Telcordia Technologies OOPSLA’2000.

Similar presentations


Presentation on theme: "Bluetooth Kirthika Parmeswaran Telcordia Technologies OOPSLA’2000."— Presentation transcript:

1 Bluetooth Kirthika Parmeswaran Telcordia Technologies OOPSLA’2000

2 Bluetooth http://bluetooth.com Short range, high speed LAN protocol (1M – 2Mbit/s) Encompass a standard communications interface and a low-cost computer chip Combines the DECT (Digital European Cordless Telephone) and iRDA (infraRed Data Association) technologies Open specification Enables users to connect their mobile devices via wireless short-range radio links unimpeded by line-of- sight restrictions Can be used as a WAP bearer

3 Bluetooth Architecture LMP: Link Management Protocol L2CAP: Logical Link Control And Adaptation Protocol SDP: Service Discovery Protocol TCS BIN: Telephony Control Protocol – Binary RFCOMM: emulates RS 232, cable replacement protocol OBEX: Object Exchange Protocol

4 Complementary Capabilities to Jini™ Service Discovery Layer using the Service Discovery Protocol (SDP) SDP can be used to: - search for services by service class or attributes - service browsing Security levels for devices and services –device trust levels –service levels –default security level for legacy applications Limitations in the security: device level, access control only at set-up

5 Usage Models Each usage model has a profile defined, e.g – generic access profile (GAP) –the serial port profile –the service discovery application profile –generic object exchange profile Usage models commonly used –File Transfer –Internet Bridge –LAN access –Three-in-one phone –Ultimate Headset

6 Conclusion Bluetooth can be used as an underlying protocol to Jini (see also Sun white paper on Jini™ Technology and Emerging Network Technologies) Bluetooth could serve as an area of pattern mining for ad hoc networking

7 Bluetooth Security Architecture Security levels for devices and services (1) device trust levels (2) service levels <authentication + authorization, authentication only, open to all> (3) Default security level for legacy applications Limitations (1) Legacy application need a “adapter application” for security (2) Only device is authenticated not user (3) No mechanism defined to preset authorization per service (4) Access control only at connection set-up time (5) unidirectional traffic not possible after access check (6) For “end-to-end” security higher level services required

8 Security built over Bluetooth  Security Manager - stores security related information on services and devices - performs access checks - helps to set up trusted relationships at the device level - initiates pairing and query PIN entry by the user - checks whether a service does not permit connectionless data packets when needed

9 Usage Models Each usage model has a profile defined, e.g generic access profile (GAP), the serial port profile, the service discovery application profile (SDAP), and the generic object exchange profile (GOEP) Usage models commonly used include File Transfer, Internet Bridge, LAN access, Three-in-one phone, Ultimate Headset

10 Protocols in the Bluetooth Architecture  The Specification also defines a Host Controller Interface (HCI), which provides a command interface to the baseband controller, link manager, and access to hardware status and control registers.  It can be positioned above/below L2CAP


Download ppt "Bluetooth Kirthika Parmeswaran Telcordia Technologies OOPSLA’2000."

Similar presentations


Ads by Google