Top Banner
08/02/2005 Bluetooth Bluetooth Claudio Casetti Dipartimento di Elettronica Politecnico di Torino 08/02/2005 C.Casetti - Politecnico di Torino WPAN Technologies WPAN Technologies HomeRF Bluetooth 08/02/2005 C.Casetti - Politecnico di Torino Bluetooth Bluetooth A cable replacement technology 1 Mb/s symbol rate Range 10+ meters Single chip radio+baseband at low power & low price Why not using WLANs? power cost Why not using IrDA? Line of sight Short distance range (1m)
64

WPAN Technologies - polito.it · 2 C.Casetti - Politecnico di Torino 08/02/2005 The Bluetooth Idea • Bluetooth has been named after a Scandinavian king, who lived in the X …

Oct 07, 2018

Download

Documents

phungduong
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: WPAN Technologies - polito.it · 2 C.Casetti - Politecnico di Torino 08/02/2005 The Bluetooth Idea • Bluetooth has been named after a Scandinavian king, who lived in the X …

1

08/02/2005

BluetoothBluetooth

Claudio Casetti

Dipartimento di ElettronicaPolitecnico di Torino

08/02/2005C.Casetti - Politecnico di Torino

WPAN TechnologiesWPAN Technologies

• HomeRF

• Bluetooth

08/02/2005C.Casetti - Politecnico di Torino

BluetoothBluetooth

• A cable replacement technology

• 1 Mb/s symbol rate

• Range 10+ meters

• Single chip radio+baseband

at low power & low price

• Why not using WLANs?powercost

• Why not using IrDA?Line of sightShort distance range (1m)

Page 2: WPAN Technologies - polito.it · 2 C.Casetti - Politecnico di Torino 08/02/2005 The Bluetooth Idea • Bluetooth has been named after a Scandinavian king, who lived in the X …

2

08/02/2005C.Casetti - Politecnico di Torino

The Bluetooth IdeaThe Bluetooth Idea

• Bluetooth has been named after a Scandinavian king, who lived in the X century A.C., called Harald Bluetooth

• Harald Bluetooth took over several tribes which had different cultures and habits

• The aim of the Bluetooth technology is to be“universal” and suitable for any kind of environment

08/02/2005C.Casetti - Politecnico di Torino

Bluetooth Bluetooth WWorkingorking GGrouproupHHistoryistory• February 1998: The Bluetooth SIG is formed

promoter company groups: Ericsson, IBM, Intel, Nokia, Toshiba

• May 1998: Public announcement of the Bluetooth SIG

• July 1999: 1.0A spec (>1,500 pages) is published

• December 1999: v. 1.0B is released

• December 1999: The promoter group increases to 9 members

3Com, Lucent, Microsoft, Motorola

• June 2002: There are 1,900+ adopters

08/02/2005C.Casetti - Politecnico di Torino

Providing a standard for low data-rate wirelessconnectivity (LR-WPAN)

IEEE 802.15.4

Drafting and publishing a new standard for high-rate (20Mbit/s or greater) WPANs

IEEE 802.15.3

Facilitating coexistence of WPAN and WLAN.Thecoexistence model tries to quantify the mutualinterference of the two

IEEE 802.15.2

Developing a standard for short range wirelesscommunication referred as WPAN, and based on the Bluetooth Specifications

IEEE 802.15.1

GoalTask Group

The IEEE 802.15 The IEEE 802.15 Working Working GroupsGroups

Page 3: WPAN Technologies - polito.it · 2 C.Casetti - Politecnico di Torino 08/02/2005 The Bluetooth Idea • Bluetooth has been named after a Scandinavian king, who lived in the X …

3

08/02/2005C.Casetti - Politecnico di Torino

IEEE 802.15.1IEEE 802.15.1

• In March 2002, the IEEE 802.15.1 WG has releasedthe first version of the standard for WPANs

• The two lower layers of the protocol stack (Physicaland MAC layers) are based on the Bluetooth v1.x Specifications

08/02/2005C.Casetti - Politecnico di Torino

Basic Basic CharacteristicsCharacteristics

08/02/2005C.Casetti - Politecnico di Torino

Design Design CConsiderationsonsiderations

data signal

recovereddata signal

cost

power

spectrum

noise, interference

Goals• high bandwidth• conserve battery power• cost < $10• robust system

Page 4: WPAN Technologies - polito.it · 2 C.Casetti - Politecnico di Torino 08/02/2005 The Bluetooth Idea • Bluetooth has been named after a Scandinavian king, who lived in the X …

4

08/02/2005C.Casetti - Politecnico di Torino

Bluetooth vs. Bluetooth vs. CableCable

CableBTProperty

08/02/2005C.Casetti - Politecnico di Torino

Bluetooth vs. IEEE 802.11bBluetooth vs. IEEE 802.11b

ComplexVery simpleType of use

DSSSFHSSPhysical layer

Expensive (∼300 mA)Limited (∼60 mA)Power Consumption

Limited applicabilityfor handheld devices

Ideal for CellularPhones

Type of devices

ISMISMBandwidth

∼ $50∼ $10Cost

11 Mbps1 MbpsData rate

>100 meters<10 metersRange

Wireless version of Ethernet LAN

Cable replacementtechnology

Application

IEEE 802.11bBTProperty

08/02/2005C.Casetti - Politecnico di Torino

EM SpectrumEM Spectrum

Propagation characteristics are different in each frequency band

(ISM: Industrial, Scientific and Medical)

LF HF VHF UHF SHF EHFMF

AM radio

S/W ra

dioFM

radio

TV TV cellu

lar

f

902 – 928 Mhz2.4 – 2.4835 Ghz

5.725 – 5.785 Ghz

ISM bands

λ

30kHz 300kHz 3MHz 30MHz 300MHz 30GHz 300GHz10km 1km 100m 10m 1m 10cm 1cm 100mm

3GHz

Page 5: WPAN Technologies - polito.it · 2 C.Casetti - Politecnico di Torino 08/02/2005 The Bluetooth Idea • Bluetooth has been named after a Scandinavian king, who lived in the X …

5

08/02/2005C.Casetti - Politecnico di Torino

902 Mhz

928 Mhz

26 Mhz 83.5 Mhz 125 Mhz

2.4 Ghz2.4835 Ghz

5.725 Ghz5.785 Ghz

Cordless phonesBaby monitors

802.11BluetoothMicrowave oven

Unused (so far)

33cm 12cm 5cm

UnlicensedUnlicensed Radio Radio SpectrumSpectrum((U.SU.S.).)

08/02/2005C.Casetti - Politecnico di Torino

Bluetooth Bluetooth RRadioadio LLinkink

• 2.402 GHz + k MHz, k=1, …, 79 (79 channels spaced by 1MHz)

• GFSK modulation: 1 Mb/s symbol rate

• transmit power: 0dBm (up to 20dBm with power control)

. . .

1Mhz

12 3 7983.5 Mhz

08/02/2005C.Casetti - Politecnico di Torino

• Dynamic reconfigurability for a very flexible system suited to many environments

Piconet: all ad hoc networks with at most 8 simultaneously active devices

1 master: controls the channel access withinthe piconet and handles all the traffic within the piconetup to 7 slaves

Scatternet: Many piconets coexisting in the same area (interconnected or not)

• Any device can be either a master or a slave in a piconet

Network Network ArchitectureArchitecture

Page 6: WPAN Technologies - polito.it · 2 C.Casetti - Politecnico di Torino 08/02/2005 The Bluetooth Idea • Bluetooth has been named after a Scandinavian king, who lived in the X …

6

08/02/2005C.Casetti - Politecnico di Torino

AnAn ExampleExample

08/02/2005C.Casetti - Politecnico di Torino

ApplicationsApplications

08/02/2005C.Casetti - Politecnico di Torino

Cordlessheadset

Keyboard

mouse

Cable replacement

Personal ad hoc networking

Data/voice accesspoint

Internet access

ApplicationApplication ScenariosScenarios

Printer

To satellite, land line,…

Page 7: WPAN Technologies - polito.it · 2 C.Casetti - Politecnico di Torino 08/02/2005 The Bluetooth Idea • Bluetooth has been named after a Scandinavian king, who lived in the X …

7

08/02/2005C.Casetti - Politecnico di Torino

SynchronizationSynchronization

User benefits

• Automatic synchronization of calendars, address books, business cards

Push button synchronization

Proximity operation

08/02/2005C.Casetti - Politecnico di Torino

Cordless HeadsetCordless Headset

User benefits

• Multiple device access

• Cordless phone benefits

• Hands free operation

Cordlessheadset

08/02/2005C.Casetti - Politecnico di Torino

Usage Usage SScenarioscenarios EExamplesxamples

• Data Access Points

• Synchronization

• Headset

• Conference Table

• Cordless Computer

• Instant Postcard

• Computer Speakerphone

• ....

Page 8: WPAN Technologies - polito.it · 2 C.Casetti - Politecnico di Torino 08/02/2005 The Bluetooth Idea • Bluetooth has been named after a Scandinavian king, who lived in the X …

8

08/02/2005C.Casetti - Politecnico di Torino

TechnicalTechnical OverviewOverview

08/02/2005C.Casetti - Politecnico di Torino

The Bluetooth The Bluetooth TechnologyTechnology

• The Specifications describe how the technology works (i.e., the Bluetooth protocol architecture)

• The Profiles describe how the technology is used (i.e., how different parts of the specification can be used to fulfill a desired function for a Bluetooth device)

Bluetooth documentation is divided into two parts:

08/02/2005C.Casetti - Politecnico di Torino

Bluetooth Bluetooth SpecificationsSpecifications

Page 9: WPAN Technologies - polito.it · 2 C.Casetti - Politecnico di Torino 08/02/2005 The Bluetooth Idea • Bluetooth has been named after a Scandinavian king, who lived in the X …

9

08/02/2005C.Casetti - Politecnico di Torino

Design Design CConsiderationsonsiderations

• high bandwidth• conserve battery power• cost < $10• robust system

data signal

recovereddata signal

Goalscost

power

spectrum

noise, interference

08/02/2005C.Casetti - Politecnico di Torino

Bluetooth RadioBluetooth Radio• Low Power

Low voltage RFStandby modes (Sniff, Hold, Park)

• Power Classes: devices can be classified into 3 power classes

Power Class 1: long range (~100m) devices, max output power = 20dBm

Power Class 2: ordinary range devices (~10m), max output power = 4dBm

Power Class 3: short range devices (~10cm), max output power = 0dBm

08/02/2005C.Casetti - Politecnico di Torino

Design Design CConsiderationsonsiderations

• high bandwidth• conserve battery power• cost < $10• robust system

data signal

recovereddata signal

Goalscost

power

spectrum

noise, interference

Page 10: WPAN Technologies - polito.it · 2 C.Casetti - Politecnico di Torino 08/02/2005 The Bluetooth Idea • Bluetooth has been named after a Scandinavian king, who lived in the X …

10

08/02/2005C.Casetti - Politecnico di Torino

Bluetooth RadioBluetooth Radio

• Low Cost

Single chip radio (minimize external components)

Today’s technology

Time division duplex

08/02/2005C.Casetti - Politecnico di Torino

Design Design CConsiderationsonsiderations

• high bandwidth• conserve battery power• cost < $10• robust system

data signal

recovereddata signal

Goalscost

power

spectrum

noise, interference

08/02/2005C.Casetti - Politecnico di Torino

Bluetooth RadioBluetooth Radio

• Robust operation

Fast frequency hopping: 1600 hops/sec

Strong interference protection

Fast ARQ

Robust access code

Forward header correction

Page 11: WPAN Technologies - polito.it · 2 C.Casetti - Politecnico di Torino 08/02/2005 The Bluetooth Idea • Bluetooth has been named after a Scandinavian king, who lived in the X …

11

08/02/2005

Bluetooth Bluetooth ProtocolProtocol StackStack

08/02/2005C.Casetti - Politecnico di Torino

ProtocolProtocol StackStack ComparisonComparison

RFBaseband

AudioLM

L2CAP

Data

SDP RFCOMMIP

Cont

rol

Applications

08/02/2005C.Casetti - Politecnico di Torino

Bluetooth Bluetooth ProtocolProtocol StackStack

RFBaseband

Audio

Data

SDP RFCOMMIP

Single chip (RF, BB, LM, HCI) With RS-232,USB, or PC card interface

• A hardware/software/protocol description

• An application framework

Applications

Link MngL2CAP

HCI

Software

Cont

rol

Page 12: WPAN Technologies - polito.it · 2 C.Casetti - Politecnico di Torino 08/02/2005 The Bluetooth Idea • Bluetooth has been named after a Scandinavian king, who lived in the X …

12

08/02/2005C.Casetti - Politecnico di Torino

ProtocolProtocol StackStack

08/02/2005C.Casetti - Politecnico di Torino

Bluetooth Radio SpecificationBluetooth Radio Specification

RFBaseband

AudioLMP

L2CAP

Data

SDP RFCOMMIP

Cont

rol

Applications

defines the requirements of the Bluetooth transceiver

08/02/2005C.Casetti - Politecnico di Torino

SpreadSpread SpectrumSpectrum• Idea

spread signal over all the available bandwidth

originally designed to thwart jamming

• Direct Sequence

• Frequency Hopping

transmit over pseudo-random sequence of frequencies

sender and receiver share:

seed

pseudo-random number generator

Page 13: WPAN Technologies - polito.it · 2 C.Casetti - Politecnico di Torino 08/02/2005 The Bluetooth Idea • Bluetooth has been named after a Scandinavian king, who lived in the X …

13

08/02/2005C.Casetti - Politecnico di Torino

Radio Radio ChannelChannel

• Uses a FHSS technique to minimize power wasteand guarantee robustness to interference

• Bandwidth: 79 MHz divided into 79 frequencychannels with width equal to 1 MHz

In the U.S., hopping is performed over all the 79 channels

In Europe, hopping uses only 23 channelsout of the 79

08/02/2005C.Casetti - Politecnico di Torino

08/02/2005C.Casetti - Politecnico di Torino

• Each BT device has a free-running clock that is the heart-beat of the tranceiver

• Slaves synchronize with the master by adding anoffset to its native clock; offsets have to beupdated regularly

PiconetPiconet SynchronizationSynchronization

Page 14: WPAN Technologies - polito.it · 2 C.Casetti - Politecnico di Torino 08/02/2005 The Bluetooth Idea • Bluetooth has been named after a Scandinavian king, who lived in the X …

14

08/02/2005C.Casetti - Politecnico di Torino

• Once created, each piconet uses its own frequencyhopping sequence which is derived from the address of the master node

Interference between neighboring piconets isreduced

The hopping sequence is defined so that there isequal probability to hop on any of the availablefrequency channels (pseudo-random sequence)

in the U.S.: channel hopping prob.=1/79in Europe: channel hopping prob.= 1/23

PiconetPiconet SynchronizationSynchronization

08/02/2005C.Casetti - Politecnico di Torino

BasebandBaseband

RFBaseband

AudioLMP

L2CAP

Data

SDP RFCOMMIP

Cont

rol

Applications

08/02/2005C.Casetti - Politecnico di Torino

Bluetooth Physical Bluetooth Physical LLinkink

• Point to point linkmaster - slave relationship

radios can function as masters or slaves

m s

ss

m

s

• Piconet

Master can connect to 7 slaves

Each piconet has max grosscapacity of 1 Mbps

hopping pattern is determined by the master

Page 15: WPAN Technologies - polito.it · 2 C.Casetti - Politecnico di Torino 08/02/2005 The Bluetooth Idea • Bluetooth has been named after a Scandinavian king, who lived in the X …

15

08/02/2005C.Casetti - Politecnico di Torino

PiconetPiconet FFormationormation

• Inquiry - scan protocol

to learn about the clock offset and device address of other nodes in proximity

08/02/2005C.Casetti - Politecnico di Torino

PiconetPiconet FFormationormation

Master

Active Slave

Parked Slave

Standby

• Page - scan protocol

to establish links with nodes in proximity

08/02/2005C.Casetti - Politecnico di Torino

AddressingAddressing

• Bluetooth device address (BD_ADDR)

48 bit IEEE MAC address

• Active Member address (AM_ADDR)

3 bits active slave address

all zeros: broadcast address

• Parked Member address (PM_ADDR)

8 bit parked slave address

Page 16: WPAN Technologies - polito.it · 2 C.Casetti - Politecnico di Torino 08/02/2005 The Bluetooth Idea • Bluetooth has been named after a Scandinavian king, who lived in the X …

16

08/02/2005C.Casetti - Politecnico di Torino

• A Hopping Sequence is used to select the nextradio channel

It is only related to master’s hardware address

The phase in the hopping sequence is determined by the master’s BT clock

• Channel is temporally slotted (slot duration= 625 µs)

• A packet is transmitted within a single radio channel

PhysicalPhysical ChannelChannel

08/02/2005C.Casetti - Politecnico di Torino

PiconetPiconet CChannelhannel

m

s1

s2

625µs

f0 f1 f2 f3

1600 hops/s

f4 f5

FH/TDD

366µs

tx/rx turn around time

08/02/2005C.Casetti - Politecnico di Torino

ChannelChannel AccessAccess

• Slaves can transmit only if polled by the master

The packet header indicates the intended receipient

• Master always starts transmitting on even slots

• Slaves always start transmitting on odd slots

Page 17: WPAN Technologies - polito.it · 2 C.Casetti - Politecnico di Torino 08/02/2005 The Bluetooth Idea • Bluetooth has been named after a Scandinavian king, who lived in the X …

17

08/02/2005C.Casetti - Politecnico di Torino

MultiMulti--SSlot lot PPacketsackets

m

s1

s2

625µs

f0 f3 f4 f5

FH/TDD

Data rate depends on the packet type

08/02/2005C.Casetti - Politecnico di Torino

Physical Link TypesPhysical Link Types

m

s1

s2

SCO SCO SCO

• Synchronous Connection Oriented (SCO) Link • slot reservation at fixed intervals

• Asynchronous Connection-less (ACL) Link

• Polling access method

ACL ACL ACLACL ACL ACL

08/02/2005C.Casetti - Politecnico di Torino

• Point-to-point connection

• Two duplex slots are allocated periodically

• All packets are 1-slot long

• Packets are never retransmitted

SCOSCO

Page 18: WPAN Technologies - polito.it · 2 C.Casetti - Politecnico di Torino 08/02/2005 The Bluetooth Idea • Bluetooth has been named after a Scandinavian king, who lived in the X …

18

08/02/2005C.Casetti - Politecnico di Torino

• A master can support up to 3 SCO links with the same slave or with different slaves

• A slave can support up to 3 SCO links with the same master and up to 2 SCO links if they originate from different piconets

• The SCO link is established by the master sendingthe SCO period TSCO and the SCO offset DSCO

• Even if a slave fails in decoding the slave address in the SCO packet header, it can access the channelin the following slot

SCO SCO

08/02/2005C.Casetti - Politecnico di Torino

• Point-to-multipoint link between the master and the slaves within the piconet and point-to-pointlink between a slave and the master

• Can use all the slots not allocated to SCO traffic

• ACL traffic is scheduled by the master

• Multi-slot packets can be used

• Packets can be retransmitted

ACLACL

08/02/2005C.Casetti - Politecnico di Torino

• Between a master and a slave one ACL link onlycan exist

• An ACL link is always established between a master and a slave since it must be used toexchange LMP messages

• If a slave fails in decoding the slave address in the packet header, it cannot access the channelin the following slot

ACLACL

Page 19: WPAN Technologies - polito.it · 2 C.Casetti - Politecnico di Torino 08/02/2005 The Bluetooth Idea • Bluetooth has been named after a Scandinavian king, who lived in the X …

19

08/02/2005C.Casetti - Politecnico di Torino

Packet TypesPacket Types

Controlpackets

Data/voicepackets

ID*NullPollFHS

Voice DataHV1HV2HV3DV

DM1DM3DM5

DH1DH3DH5

combines voice and data (voice field+data field)

08/02/2005C.Casetti - Politecnico di Torino

Packet FormatPacket Format

72 bits 54 bits 0 - 2744 bits

Access code

Header Payload

DataVoice CRC

No CRCNo retries

header

ARQ

FEC (optional) FEC (optional)

08/02/2005C.Casetti - Politecnico di Torino

• Access Code (72 bits):Used for synchronization and to identify the piconet, or for inquiry and pagingIf the piconet cannot be identified by the receiver, the packet is discarded

• Header (54 bits):Encoded with a 1/3 FECIf not correctly received, the packet is discarded

• Payload:For ACL packets, it’s covered by a 16 bit CRCPayload header only for ACL: indicates howmany bytes are transmitted

PacketPacket FormatFormat

Page 20: WPAN Technologies - polito.it · 2 C.Casetti - Politecnico di Torino 08/02/2005 The Bluetooth Idea • Bluetooth has been named after a Scandinavian king, who lived in the X …

20

08/02/2005C.Casetti - Politecnico di Torino

Three different access codes exist:• Channel Access Code (CAC): identifies a

piconet

• Device Access Code (DAC): used in pagingand response to paging

• Inquiry Access Code (IAC): 64 possible access codes used in the inquiry procedure (derived from 64 reserved LAPs)

1 General Inquiry Access Code (GIAC)

63 Dedicated Inquiry Access Codes (DIAC)

Access CodeAccess Code

08/02/2005C.Casetti - Politecnico di Torino

• AM_ADDR: 3 bit active member address

• TYPE: 4-bit packet type (SCO, ACL, duration)

• FLOW: 1-bit flow control (=0 if rx buffer is full)

• ARQN: 1-bit ack indication

• SEQN: 1-bit sequence number (inverted at each packet tx so that 2 correct tx of the same packetcan be distinguished)

• HEC: 8-bit header error check

HeaderHeader

08/02/2005C.Casetti - Politecnico di Torino

• ID: consists of the DAC or IAC (68 bits), used in inquiry, paging and response routines

• NULL: CAC+Header only, used to return information to the source such as ARQN and FLOW

• POLL: CAC+Header only, used by the master to poll a slave which must respond. Not a part of the ARQ scheme

• FHS: control packet revealing the sender’s addressand clock (144 bits+16-bit CRC)

Control Control PacketsPackets

Page 21: WPAN Technologies - polito.it · 2 C.Casetti - Politecnico di Torino 08/02/2005 The Bluetooth Idea • Bluetooth has been named after a Scandinavian king, who lived in the X …

21

08/02/2005C.Casetti - Politecnico di Torino

HV HV PacketsPackets

• HV (High quality Voice):

Used for SCO links

Bit-rate=64 Kbps

2 packets every Tsco slots are sent

HV1: with 1/3 FEC; Tsco=2HV2: with 2/3 FEC; Tsco=4HV3: with no FEC; Tsco=6

08/02/2005C.Casetti - Politecnico di Torino

HVHV PacketsPackets

Access code Header

Payload

72 bits 54 bits 240 bits

30 bytes

= 366 bits

10 bytes

+ 2/3 FEC

+ 1/3 FEC

20 bytes

30 bytesHV3

HV2

HV1

3.75ms (HV1)2.5ms (HV2)

1.25ms (HV3)

08/02/2005C.Casetti - Politecnico di Torino

DH and DM DH and DM PacketsPackets

• DH/M (Data High/Medium rate):

Used for ACL links

DM: with 2/3 FEC

DH: no FEC

Possible packet duration: 1, 3, 5 slots

DM1, DM3, DM5

DH1, DH3, DH5

Page 22: WPAN Technologies - polito.it · 2 C.Casetti - Politecnico di Torino 08/02/2005 The Bluetooth Idea • Bluetooth has been named after a Scandinavian king, who lived in the X …

22

08/02/2005C.Casetti - Politecnico di Torino

RRate ate CCalculationalculation: DM/H1: DM/H1

Payload

Accesscode Header

72 bits 54 bits 240 bits

30 bytes

= 366 bits

2/3 FEC

1 17 2DM1

1 27 2DH1

625 µs

625 µs

1 2

172.827↑172.827↓

108.817↓

108.81600/217↑Peak RateFreqSizeDir

08/02/2005C.Casetti - Politecnico di Torino

Rate Calculation: DM/H3Rate Calculation: DM/H3

Payload

Access code Header

72 bits

54 bits 1500 bits

187 bytes

= 1626 bits

2/3 FEC

2 121 2DM3

2 183 2DH3

1875µs

1875µs

585.6183↑86.427↓

54.417↓

387.21600/4121↑Peak RateFreqSizeDir

1 2 3 4

08/02/2005C.Casetti - Politecnico di Torino

Rate calculation: DM/H5Rate calculation: DM/H5

Payload

AccessCode Header

72 bits

54 bits 2744 bits

343 bytes

= 2870 bits

2/3 FEC

2 224 2DM5

2 339 2DH5

3125 µs

3125 µs 625 µs

1 2 3 4 5 6

723.2339↑57.627↓

36.317↓

477.81600/6224↑Peak RateFreqSizeDir

Page 23: WPAN Technologies - polito.it · 2 C.Casetti - Politecnico di Torino 08/02/2005 The Bluetooth Idea • Bluetooth has been named after a Scandinavian king, who lived in the X …

23

08/02/2005C.Casetti - Politecnico di Torino

Data Packet TypesData Packet Types

DM1

DM3

DM5

DH1

DH3

DH5

2/3 FEC

No FEC

Symmetric Asymmetric

36.3477.8 286.7

54.4387.2258.1

108.8108.8108.8

Symmetric Asymmetric

57.6723.2 433.9

86.4585.6390.4

172.8172.8172.8

08/02/2005C.Casetti - Politecnico di Torino

08/02/2005C.Casetti - Politecnico di Torino

• SCO traffic always has priority due to delayrequirements

• ACL link: a round-robin scheduling has been proposed by Ericsson

Not the most efficient solution in the case of asymmetric traffic

For asymmetric traffic, it’s better to transmit to the same slave (or let the slave transmit) for a longer time

DH/M-3 and DH/M-5 packets can be used to reduce the overhead

TrafficTraffic SchedulingScheduling

Page 24: WPAN Technologies - polito.it · 2 C.Casetti - Politecnico di Torino 08/02/2005 The Bluetooth Idea • Bluetooth has been named after a Scandinavian king, who lived in the X …

24

08/02/2005C.Casetti - Politecnico di Torino

• Stop-and-Wait

Applied to DH and DM packets only

If the master is receiving, it can send the ACK in the slot next to the received packeteven if the master transmission is toward a different slave (fast Stop&Wait)

the time latency is reducedin this case the ACK is sent by setting

the ARQN bit to 1

Link ControlLink Control

08/02/2005C.Casetti - Politecnico di Torino

InquiryInquiry

• Used to discover other devices and exchangesynchronization information (HW address and clock)

This allows two nodes to agree on a common channel-hopping sequence:

Address used to select the sequence

Clock used to select the sequence phase

• Asymmetric procedure

• Listener and sender hop using the same sequence but the sender hops faster than the listener

08/02/2005C.Casetti - Politecnico di Torino

• The interval between two consecutive inquiryprocedures is a random variable so thatsynchronization between two or more entitiesperforming the procedure is avoided

• Typically, the sender repeats the procedure forabout 10 s every minute

• The sender stops repeating the procedure when it has contacted a sufficient number of nodes

InquiryInquiry ProcedureProcedure

Page 25: WPAN Technologies - polito.it · 2 C.Casetti - Politecnico di Torino 08/02/2005 The Bluetooth Idea • Bluetooth has been named after a Scandinavian king, who lived in the X …

25

08/02/2005C.Casetti - Politecnico di Torino

• The sender uses a known-to-all inquiryhopping sequence and IAC

• The sender can specify the class of devices to contact by using a dedicated instead of a general inquiry access code

InquiryInquiry TransmissionTransmission

08/02/2005C.Casetti - Politecnico di Torino

f(k) f(k+1) f’(k) f’(k+1) f(k+2) f(k+3)

625 µs

• The sender:Keeps transmitting the IAC on different frequenciesEvery 1.25ms transmits on two hops and listenswhether there is a response from neighboring units

InquiryInquiry TimingTiming

08/02/2005C.Casetti - Politecnico di Torino

• The sequence comprises 32 frequency hops:

It is divided into 2 sub-sequencies of 16 hops, each lasting 10 ms (625 µs·16=10 ms)

The single sub-sequence is repeated 256 times, i.e., for 2.56 s

• To discover neighbors, 4 trains of sub-sequences have to be transmitted

Inquiry may have to last 10.24 s (4·2.56=10.24)

It may finish earlier if many responses have beencollected

InquiryInquiry TransmissionTransmission

Page 26: WPAN Technologies - polito.it · 2 C.Casetti - Politecnico di Torino 08/02/2005 The Bluetooth Idea • Bluetooth has been named after a Scandinavian king, who lived in the X …

26

08/02/2005C.Casetti - Politecnico di Torino

• A listener, i.e., a unit that wants to be discovered, periodically enters the inquiry scan state and listens to one frequency only for a while

• When it detects an inquiry message, it has the option to not reply

• If it replies, it uses a FHS packet with the sameaccess code and the common sequence, calledinquiry response

• Interval between two consecutive inquiry scansequal to 2.56 s. Each time the unit listens to a different frequency for 10 ms

InquiryInquiry ScanScan

08/02/2005C.Casetti - Politecnico di Torino

InquiryInquiry Procedure Procedure FurtherFurther observationsobservations

• Listeners:

when more than one listener is present, theirreplies may collide

to avoid collisions, listeners defer their replies until expiration of a random back-off timer

the FHS packet is retransmitted at other times and frequencies as long as the master is probingwith inquiry messages

08/02/2005C.Casetti - Politecnico di Torino

FHS FHS PacketPacket

• Used in inquiry response (and in page master response and in master-slave switch; in these two cases it’s retx until an ack is received or a timeout expires)

• Allows for frequency hop sync., before a M-S channel is established.

24-bit for the class of device (of the sender)

3 bits for the AM_ADDR (in the case of inquiry and pagingis all-zeros)

Page 27: WPAN Technologies - polito.it · 2 C.Casetti - Politecnico di Torino 08/02/2005 The Bluetooth Idea • Bluetooth has been named after a Scandinavian king, who lived in the X …

27

08/02/2005C.Casetti - Politecnico di Torino

InquiryInquiry Procedure Procedure FurtherFurther observationsobservations

• Sender:

collects device address and clock offset fromthe listeners

this information is subsequently used to page the selected listener

08/02/2005C.Casetti - Politecnico di Torino

InquiryInquiry MessageMessage ExchangeExchange

f(k) f(k+1) f’(k)

625 µs

FHS

ID ID

625 µs

f(k) f(k+1) f’(k)

625 µs

Received packet

inquiringunit

inquiryrespondingunit

08/02/2005C.Casetti - Politecnico di Torino

InquiryInquiry MessageMessage ExchangeExchange

f(k) f(k+1) f’(k+1)

625 µs

FHS

ID ID

625 µs

f(k) f(k+1)

625 µs

Received packet

inquiringunit

inquiryrespondingunit

Page 28: WPAN Technologies - polito.it · 2 C.Casetti - Politecnico di Torino 08/02/2005 The Bluetooth Idea • Bluetooth has been named after a Scandinavian king, who lived in the X …

28

08/02/2005C.Casetti - Politecnico di Torino

ExampleExample (1)(1)

• B,C,D are in Inquire Scan

A

B

D

CIDb

IDa IDd

IDc

INQ

08/02/2005C.Casetti - Politecnico di Torino

ExampleExample (2)(2)

• B,C,D are in Inquire Scan

A

B

D

CIDb

IDa IDd

IDc

FHS

IDb

08/02/2005C.Casetti - Politecnico di Torino

ExampleExample (3)(3)

• C and D respond simultaneously: their FHSs are lost

A

B

D

CIDb

IDa IDd

IDc

IDb

FHS

FHS

Page 29: WPAN Technologies - polito.it · 2 C.Casetti - Politecnico di Torino 08/02/2005 The Bluetooth Idea • Bluetooth has been named after a Scandinavian king, who lived in the X …

29

08/02/2005C.Casetti - Politecnico di Torino

ExampleExample (4)(4)

• A issues an inquiry again

A

B

D

CIDb

IDa IDd

IDc

INQ

IDb

08/02/2005C.Casetti - Politecnico di Torino

ExampleExample (5)(5)

• C responds with an FHS

A

B

D

CIDb

IDa IDd

IDc

IDb

FHS

IDc

08/02/2005C.Casetti - Politecnico di Torino

ExampleExample (6)(6)

• A issues an inquiry again and D responds

A

B

D

CIDb

IDa IDd

IDc

FHS

IDb

IDc

IDd

Page 30: WPAN Technologies - polito.it · 2 C.Casetti - Politecnico di Torino 08/02/2005 The Bluetooth Idea • Bluetooth has been named after a Scandinavian king, who lived in the X …

30

08/02/2005C.Casetti - Politecnico di Torino

PagingPaging

• Used to establish connections and define roles

• Steps similar to Inquiry, BUT

Paging message is unicast to a selected listener(ID packet uses the DAC) ⇒ listener does notneed to back-off

The sender has also an estimate of the listener’s clock ⇒ it is enabled to communicatewith the listener almost istantaneously

08/02/2005C.Casetti - Politecnico di Torino

PagingPaging SchemesSchemes

• Several paging schemes can be applied

Mandatory paging scheme: supported by all the units; used when 2 units meet for the first time and when paging directly follows the inquiryprocedure

• Once connected, 2 units may agree on an optional paging/scanning scheme to be used next time it isneeded

08/02/2005C.Casetti - Politecnico di Torino

Knows the address (DAC) of the unit to page (X)

Derives the hopping frequency to be used forpaging from X’s address

However, usually the pager and X are notperfectly sync. Thus, the pager does not knowexactly:

when X will listen to the channelon which frequency (i.e., X’s phase)

PagingPaging TransmissionTransmission

The paging unit:

Page 31: WPAN Technologies - polito.it · 2 C.Casetti - Politecnico di Torino 08/02/2005 The Bluetooth Idea • Bluetooth has been named after a Scandinavian king, who lived in the X …

31

08/02/2005C.Casetti - Politecnico di Torino

• The paging sequence is 32-hop long and isdivided into two sub-sequences of 16 hops each(in U.S.)

• The paging unit periodically repeats the pagingsequence

PagingPaging TransmissionTransmission

08/02/2005C.Casetti - Politecnico di Torino

f(k) f(k+1) f(k+2) f(k+3)

625 µs

• The paging unit:

keeps transmitting X’s access code on differentfrequencies

every 1.25 ms transmits on two hops and listenswhether there is a response from X

PagingPaging TimingTiming

08/02/2005C.Casetti - Politecnico di Torino

• In a 10 ms interval, the pager transmits X’s access code on 16 frequency hops (625µs·16=10ms)

• Repeats the single sub-seq. for a period equal to the sleep time between two consecutive paging scans of X

128 times (i.e., for 1.28 s) if it’s using the R1 mode256 times (i.e., for 2.56 s) if it’s using the R2 mode

• If X doesn’t reply, the pager repeats the procedure using the other 16 freq. out of the 32-hop sequence

• The whole procedure is repeated until the paged unitreplies or the timeout pageTO expires

PagingPaging TransmissionTransmission

Page 32: WPAN Technologies - polito.it · 2 C.Casetti - Politecnico di Torino 08/02/2005 The Bluetooth Idea • Bluetooth has been named after a Scandinavian king, who lived in the X …

32

08/02/2005C.Casetti - Politecnico di Torino

• There isn’t a paging channel (it’s an ad hoc environment)

X has to periodically listens to the channel to detect whetherthere is a paging message for itself

• X listens to the channel to detect whether the access code derived from its own address is beingtransmitted

• X scans the channel at least every 1.28 s (R1 mode) or 2.56 s (R2 mode), and each time listens to a different frequency for 10 ms

PagingPaging ScanScan

08/02/2005C.Casetti - Politecnico di Torino

• When X receives the paging msg, it replies back withan ID packet using a sequence called pagingresponse, derived from its address

• The pager replies by sending its own address and clock information (FHS packet) and using the samehopping frequency and access code employed by X

• X sends an acknowledgment with the same hoppingfrequency and access code

• After that, the paging unit (i.e., the master) starts the data exchange by using the hopping sequence of the piconet, derived by its own address and clock

Connection EstablishmentConnection Establishment

08/02/2005C.Casetti - Politecnico di Torino

PagingPaging MessageMessage ExchangeExchange

messageexchangefollowsafter a

poll+null

Received packet

f(k) f(k+1) f’(k) f(k+1)

625 µs

FHSID ID

625 µs

f(k) f(k+1) f’(k) f(k+1)

625 µs

ID ID

f’(k+1)pagingunit

pagedunit

Page 33: WPAN Technologies - polito.it · 2 C.Casetti - Politecnico di Torino 08/02/2005 The Bluetooth Idea • Bluetooth has been named after a Scandinavian king, who lived in the X …

33

08/02/2005C.Casetti - Politecnico di Torino

PagingPaging MessageMessage ExchangeExchange

f(k) f(k+1) f(k+2)

625 µs

FHSID ID

625 µs

f(k) f(k+1) f’(k+1)

625 µs

ID ID

f’(k+2)

messageexchangefollowsafter a

poll+null

Received packet

pagingunit

pagedunit

08/02/2005C.Casetti - Politecnico di Torino

PagingPaging

• Upon receiving a response for the pagingmessage, the sender becomes the master and the listener the slave of a newly formed piconet

• Both nodes switch to the piconet channel-hopping sequence

08/02/2005C.Casetti - Politecnico di Torino

ExampleExample (1)(1)

• A knows C’s ID and has an idea of its clock

A

B

D

C

IDa

IDc

IDc

IDc

Page 34: WPAN Technologies - polito.it · 2 C.Casetti - Politecnico di Torino 08/02/2005 The Bluetooth Idea • Bluetooth has been named after a Scandinavian king, who lived in the X …

34

08/02/2005C.Casetti - Politecnico di Torino

ExampleExample (2)(2)

A

B

D

C

IDa

IDc

IDc

IDc

08/02/2005C.Casetti - Politecnico di Torino

ExampleExample (3)(3)

A

B

D

C

IDa

IDc

IDc

• A replies with its ID and clock (FHS packet)

IDa

08/02/2005C.Casetti - Politecnico di Torino

ExampleExample (4)(4)

A

B

D

C

IDa

IDc

IDc

IDaIDc

Page 35: WPAN Technologies - polito.it · 2 C.Casetti - Politecnico di Torino 08/02/2005 The Bluetooth Idea • Bluetooth has been named after a Scandinavian king, who lived in the X …

35

08/02/2005C.Casetti - Politecnico di Torino

ExampleExample (5)(5)

A

B

D

C

IDa

IDc

IDc

• Then, A connects as a master to C

IDa

08/02/2005C.Casetti - Politecnico di Torino

• Typically, masters have a much highercomputational and communication load, thusexperiencing higher energy consumption thanslaves do

• Master and slave can switch role within the piconet through an appropriate procedure

Master and SlaveMaster and Slave

08/02/2005C.Casetti - Politecnico di Torino

Inter Inter PPiconeticonet CCommunicationommunication

Cordlessheadset

Cordlessheadset

Cordlessheadset

mouse

Page 36: WPAN Technologies - polito.it · 2 C.Casetti - Politecnico di Torino 08/02/2005 The Bluetooth Idea • Bluetooth has been named after a Scandinavian king, who lived in the X …

36

08/02/2005C.Casetti - Politecnico di Torino

ScatternetScatternet -- SScenariocenario 11

08/02/2005C.Casetti - Politecnico di Torino

ScatternetScatternet -- SScenariocenario 11

• A slave can belong to two or more piconets, but cannot communicate with more than one at the same time

• It must use time multiplexing by being in “suspend” (i.e., hold, park, or sniff mode) in a piconet and active in another

• A slave can leave its current piconet (after informing its current master about the duration of the leave) and join another piconet

08/02/2005C.Casetti - Politecnico di Torino

ScatternetScatternet -- SScenariocenario 22

Page 37: WPAN Technologies - polito.it · 2 C.Casetti - Politecnico di Torino 08/02/2005 The Bluetooth Idea • Bluetooth has been named after a Scandinavian king, who lived in the X …

37

08/02/2005C.Casetti - Politecnico di Torino

ScatternetScatternet -- SScenariocenario 22

• A master in one piconet can also act as a slave in another piconet (but not as a master)

• How to schedule presence in two piconets?

• Forwarding delay?

• Missed traffic?

08/02/2005C.Casetti - Politecnico di Torino

BasebandBaseband SummarySummary

• FH/TDD physical layer

• Two types of links SCO and ACL links

• Multiple packet types (multiple data rates with and without FEC)

• Device inquiry and paging

• Scatternet

Baseband BasebandPhysical

Device 2Device 1

08/02/2005C.Casetti - Politecnico di Torino

Link Manager ProtocolLink Manager Protocol

Setup and management of Baseband connections

• Piconet Management• Link Configuration• Security

RFBaseband

AudioLMP

L2CAP

Data

SDP RFCOMMIP

Cont

rol

Applications

LMP

Page 38: WPAN Technologies - polito.it · 2 C.Casetti - Politecnico di Torino 08/02/2005 The Bluetooth Idea • Bluetooth has been named after a Scandinavian king, who lived in the X …

38

08/02/2005C.Casetti - Politecnico di Torino

PiconetPiconet ManagementManagement• Attach and detach slaves

• Master-slave switch

• Establishing ACL and SCO links

• Handling of low power modes ( Sniff, Hold, Park)

Paging @ BasebandMaster

Slaves

s

m

s LMP_host_conn_req

LMP Accepted

08/02/2005C.Casetti - Politecnico di Torino

• Detach:

The connection between 2 units can be closed anytime either by the master or the slave

A reason parameter is included in the messageto inform the other party of why the connection is closed

• A Reset procedure occurs in the case of an abruptlink failure

DetachDetach/Reset/Reset

08/02/2005C.Casetti - Politecnico di Torino

MasterMaster--Slave Slave SwitchSwitch (1)(1)

• The pager becomes the master, but a switch betweenslave and master may occur if both agree on it

• First, a TDD switch is performed between the old and the new master

• A piconet switch for all the piconet participants follows

Page 39: WPAN Technologies - polito.it · 2 C.Casetti - Politecnico di Torino 08/02/2005 The Bluetooth Idea • Bluetooth has been named after a Scandinavian king, who lived in the X …

39

08/02/2005C.Casetti - Politecnico di Torino

MasterMaster--Slave Slave SwitchSwitch (2)(2)

• The piconet switch is done with one piconetparticipant at a time: The new master sends a time allignment command and a FHS packet and waits foran ack (ID packet) from the slave

• From then on, that slave uses the new master parameters for its communications

• Information on the piconet participants may betransfered from the old to the new master

08/02/2005C.Casetti - Politecnico di Torino

• Standby:

The node is not connected to anyone through a traffic link

However it listens to the channel checkingevery 1.28s (or 2.56s) over 32 frequency hopsif there are msgs from the master sent to him

• Page/Inquiry-scan

• Connected:

The node is connected to another node through a traffic link

Node Node OperationalOperational StateState

08/02/2005C.Casetti - Politecnico di Torino

standby

LinkLink Controller Controller State State TransitionsTransitions

page page scan inquiry

inquiryscan

master response

slave response

inquiryresponse

detach/reset

connetd

unconnected state, only the native clock is running @ the LPO

Page 40: WPAN Technologies - polito.it · 2 C.Casetti - Politecnico di Torino 08/02/2005 The Bluetooth Idea • Bluetooth has been named after a Scandinavian king, who lived in the X …

40

08/02/2005C.Casetti - Politecnico di Torino

standby

inquiry

page

connetd

active

sniff

hold

park

2ms

2ms

connectingstates (7)

activestates

low-powerstates

LinkLink Controller Controller State State TransitionsTransitions

08/02/2005C.Casetti - Politecnico di Torino

The node transmits and/or receives traffic

ConnectedConnected StatesStates: : ActiveActive

08/02/2005C.Casetti - Politecnico di Torino

Defined for slaves only, the slave listens for Dsniffslots every Tsniff and for a Nsniff attempt number of times

The master issues a sniff command indicating the Tsniff period, the Dsniff, and Nsniff

The slave remains synchronized to the piconet and maintains its MAC address

Listens to the channel while consuming little energy

The master can force the slave in sniff mode; boththe slave and the master can request to put the connection in sniff mode or to move back to activemode

ConnectedConnected StatesStates: : SniffSniff

Page 41: WPAN Technologies - polito.it · 2 C.Casetti - Politecnico di Torino 08/02/2005 The Bluetooth Idea • Bluetooth has been named after a Scandinavian king, who lived in the X …

41

08/02/2005C.Casetti - Politecnico di Torino

SniffSniff ModeMode

Master

Slave

Sniff period

Sniff offset

Sniff slots

• Traffic reduced to periodic sniff slots

08/02/2005C.Casetti - Politecnico di Torino

Master and slave agree on the hold time duration. Both of them can request hold mode

Tx/rx in one piconet/inquiry/paging/scanning and in hold state in the other

ACL link can be put in hold mode also to saveenergy (if so, the unit in hold turns off its receiver)

Maintains its MAC address

Returning from hold, it must listen for the master and resync its clock offset

ConnectedConnected StatesStates: : HoldHold

08/02/2005C.Casetti - Politecnico di Torino

HHoldold ModeMode

Slave

Hold duration

Hold offset

Master

Page 42: WPAN Technologies - polito.it · 2 C.Casetti - Politecnico di Torino 08/02/2005 The Bluetooth Idea • Bluetooth has been named after a Scandinavian king, who lived in the X …

42

08/02/2005C.Casetti - Politecnico di Torino

The master can force a slave in park mode; eitherthe slave or the master can require to put the connection in park mode

The master can force the park mode to one slave at a time

The node does not participate in piconet activity and does not have a MAC address (PM_ADDR for the unpark master initiated procedure, AR_ADDR for the unpark slave initiated-procedure)

ConnectedConnected StatesStates: Park: Park

08/02/2005C.Casetti - Politecnico di Torino

Remains synchronized to the piconet waking up periodically to listen to the beacons from the master

Returning from park, it must listen for the master and resync its clock offset

A slave can send an unpark request in a proper half-slot after a broadcast packet sent by the master topoll parked slaves. The slave can unpark when itreceives an ack by the master

ConnectedConnected StatesStates: Park: Park

08/02/2005C.Casetti - Politecnico di Torino

ParkPark ModeMode

Master

Slave

Beacon interval

Beacon instant

• Power saving + keep more than 7 slaves in a piconet

• Give up active member address, yet maintain synchronization

• Communication via broadcast LMP messages

Page 43: WPAN Technologies - polito.it · 2 C.Casetti - Politecnico di Torino 08/02/2005 The Bluetooth Idea • Bluetooth has been named after a Scandinavian king, who lived in the X …

43

08/02/2005C.Casetti - Politecnico di Torino

BatteryBattery LifeLife• Low power consumption*

Standby current < 0.3 mA 3 monthsVoice mode 8-30 mA 75 hoursData mode average 5 mA (0.3-30mA, 20 kbit/s, 25%)

120 hours• Low Power Architecture

Programmable data length (else radio sleeps)Hold and Park modes 60 µA

Devices connected but not participatingDevice can participate within 2 ms

*Estimates calculated with 0.6 Ah battery

08/02/2005C.Casetti - Politecnico di Torino

Link Manager ProtocolLink Manager Protocol

Setup and management of Baseband connections

• Piconet Management• Link Configuration• Security

RFBaseband

AudioLMP

L2CAP

Data

SDP RFCOMMIP

Cont

rol

Applications

LMP

08/02/2005C.Casetti - Politecnico di Torino

Link ConfigurationLink Configuration• Quality of service

Polling interval for ACL traffic

Packet type negotiation (multi-slot packets)

Broadcast repetition

• Power control

LMP_quality_of_service

LMP_not_AcceptedMaster

Slave

Paging @ Baseband

Page 44: WPAN Technologies - polito.it · 2 C.Casetti - Politecnico di Torino 08/02/2005 The Bluetooth Idea • Bluetooth has been named after a Scandinavian king, who lived in the X …

44

08/02/2005C.Casetti - Politecnico di Torino

• Mandatory for class 1 devices and optional otherwise

• In practice, most devices are class 2 and most support power control

• A device can send increase or decrease link manager commands to another device based on the RSSI

Power ControlPower Control

08/02/2005C.Casetti - Politecnico di Torino

• The specification defines a 20dB golden window with the lower limit at least 6dB above the receiver sensitivity. If the RSSI falls within thiswindow, no power adjustment is requested

• Typically, the power control scheme tends todrive the output power to somewhere in the range of –50 to –70 dBm

Power ControlPower Control

08/02/2005C.Casetti - Politecnico di Torino

Link Manager ProtocolLink Manager Protocol

Setup and management of Baseband connections

• Piconet Management• Link Configuration• Security

RFBaseband

AudioLMP

L2CAP

Data

SDP RFCOMMIP

Cont

rol

Applications

LMP

Page 45: WPAN Technologies - polito.it · 2 C.Casetti - Politecnico di Torino 08/02/2005 The Bluetooth Idea • Bluetooth has been named after a Scandinavian king, who lived in the X …

45

08/02/2005C.Casetti - Politecnico di Torino

BasebandBaseband Connection Connection EEstablishmentstablishment & Security& SecurityGoals:

• Authenticated accessOnly accept connections from trusted devices

• Privacy of communication

Prevent eavesdropping

Constraints:• Processing & memory

limitations (e.g., $10 headsets)

LMP_host_conn_req

LMP Accepted

Security procedure

Master

Slave

LMP_setup_complete

LMP_setup_complete

Paging @ Baseband

08/02/2005C.Casetti - Politecnico di Torino

AuthenticationAuthentication• It is a mandatory feature

• Authentication is based on a challenge/response mechanism using a link key (128 bit shared secret between two devices)

• How can link keys be distributed securely?

Verifier

ClaimantChallenge (RN)

response

accepted

Link key Link key

08/02/2005C.Casetti - Politecnico di Torino

Pairing (Pairing (KKeyey DDistributionistribution))• Pairing is a process of establishing a trusted secret channel

between two devices (construction of initializationsymmetric key Kinit)

• Kinit is used for initial authentication and then to distribute linkkeys

Random number

Kinit

PIN + address

Randomnumber

Randomnumber

Verifier Claimant

Kinit

challenge

response

accepted

PIN + address

PIN=Common PIN entered in both the devices

Page 46: WPAN Technologies - polito.it · 2 C.Casetti - Politecnico di Torino 08/02/2005 The Bluetooth Idea • Bluetooth has been named after a Scandinavian king, who lived in the X …

46

08/02/2005C.Casetti - Politecnico di Torino

EncryptionEncryption• It is optional• An encryption key (configurable key length 8 – 128

bits, derived from the link key) and the encryptionalgorithm are needed

Stop encryption

Encrypted traffic

Key size?

Encryption mode?

Start encryption

08/02/2005C.Casetti - Politecnico di Torino

LMLMPP SummarySummary

• Piconet managementLow-power modes

• Link configurationQoSPower Control

• Security: authentication and encryption

Baseband Baseband

LMPLMP

Physical

Data

Device 2Device 1

08/02/2005C.Casetti - Politecnico di Torino

L2CAPL2CAP

RFBaseband

AudioLMP

L2CAP

Data

SDP RFCOMMIP

Cont

rol

Applications

Logical Link Control andAdaptation Protocol

• Protocol multiplexing

• Segmentation and reassembly

• Quality of service negotiation

L2CAP provides:

Page 47: WPAN Technologies - polito.it · 2 C.Casetti - Politecnico di Torino 08/02/2005 The Bluetooth Idea • Bluetooth has been named after a Scandinavian king, who lived in the X …

47

08/02/2005C.Casetti - Politecnico di Torino

L2CAPL2CAP

Goals

• Hides peculiarities of lower layer protocols from the upper layers thus providing great flexibility in supporting higher layer protocols

• Provides services to ACL traffic links

08/02/2005C.Casetti - Politecnico di Torino

Why Why IsIs L2CAP L2CAP NeededNeeded ??

Baseband

• Baseband pckt size is very small (17min, 339 max) cmp to HL pckts• No protocol-ID field in the baseband header

IP RFCOMM IP RFCOMM

reliable, flow controlled

Multiplexingdemultiplexing

in-sequence, asynchronous linkwith unlikely duplication

08/02/2005C.Casetti - Politecnico di Torino

IP RFCOMM

Need Need forfor a a MMultiulti--protocol protocol EEncapsulationncapsulation LLayerayer

IP RFCOMM

reliable, in-sequence, flow controlled, ACL linkwith unlikely duplication

Desired features:

• Protocol multiplexing

• Segmentation and reassembly

Page 48: WPAN Technologies - polito.it · 2 C.Casetti - Politecnico di Torino 08/02/2005 The Bluetooth Idea • Bluetooth has been named after a Scandinavian king, who lived in the X …

48

08/02/2005C.Casetti - Politecnico di Torino

Segmentation Segmentation & & RReassemblyeassembly

Length Payload

Basebandpackets

start ofL2CAP

continuationof L2CAP

continuationof L2CAP

CRC CRC CRC

MTU (Maximum Transmission Unit): Max L2CAP PDU payload that a local device can accept• min MTU = 48 B; max MTU = 65535 B• default MTU = 672 B

IP headerL2CAP

08/02/2005C.Casetti - Politecnico di Torino

WhatWhat AboutAbout......

• Reliability?

• Connection-oriented or connection-less?

• QoS?

08/02/2005C.Casetti - Politecnico di Torino

ReliabilityReliability

Unreliable, not integrity provisioning:

• Mixing of multiple L2CAP fragments not allowed

• Cannot cope with re-ordering or loss (no SQN)

• If the start of L2CAP packet is not acked, the rest should be discarded

Length Payload

Basebandpackets

start ofL2CAP

continuationof L2CAP

continuationof L2CAP

CRC CRC CRC

IP header L2CAP

Page 49: WPAN Technologies - polito.it · 2 C.Casetti - Politecnico di Torino 08/02/2005 The Bluetooth Idea • Bluetooth has been named after a Scandinavian king, who lived in the X …

49

08/02/2005C.Casetti - Politecnico di Torino

IP RFCOMM

ConnectionConnection--orientedoriented or or ConnectionConnection--lessless??

IP RFCOMM

A L2CAP PDU transfer can be either connection-orientedor connection-less:

• Bandwidth efficiency: carrying state in each packet vs. maintaining it at end-points

Connection-orientedor connection-less ?

08/02/2005C.Casetti - Politecnico di Torino

Connection Connection TypesTypes

Connection-oriented:• Used for bi-directional transfer• Needs a prior signaling exchange in order to set the L2CAP

connection

Connection-less:• Used for uni-directional transfer and broadcast transmissions

to a group of devices• No need for any prior signaling exchange

Signaling:• Bi-directional connections used for connection establishmenet,

link configuration, disconnection• No need for any prior signaling exchange

08/02/2005C.Casetti - Politecnico di Torino

L2CAP ChannelsL2CAP Channels

Length CID Payload

CID

CIDCID

CID

CID

CIDCID

CID

signalingchannel

datachannel

masterSlave #1

Slave #2

Slave #30101

01

01

0101

Signaling channel CIDdoes not uniquely determine the identityof the source L2CAP entity

Page 50: WPAN Technologies - polito.it · 2 C.Casetti - Politecnico di Torino 08/02/2005 The Bluetooth Idea • Bluetooth has been named after a Scandinavian king, who lived in the X …

50

08/02/2005C.Casetti - Politecnico di Torino

More on More on ConnectionConnection--orientedorientedL2CAP link configuration:

• MTU• Reliability - Flush timeout option: Amount of time duringwhich the LMP of local device keeps attempting to transmitBB packets from a L2CAP PDU before discarding it• QoS (Traffic-flow specifications)

Best effort or guaranteed?If guaranteed:

– Token bucket parameter negotiation– Peak bandwidth– Latency– Delay variation

08/02/2005C.Casetti - Politecnico di Torino

L2CAP L2CAP CConnectiononnection--orientedoriented: : EExamplexample

L2CAP_ConnectRsp

L2CAP_ConnectReq

L2CAP_ConfigRsp

L2CAP_ConfigReq

Establishment

Configuration

Data transfer

Termination

Initiator Target

L2CAP_ConfigRspL2CAP_ConfigReq

L2CAP_DisconnectRsp

L2CAP_DisconnectReq

MTU, QoSreliability

08/02/2005C.Casetti - Politecnico di Torino

L2CAPL2CAP SummarySummary (1)(1)

Baseband Baseband

L2CAPL2CAPLMPLMP

Physical

Data link

Device 2Device 1

SimplicityLow overheadLimited computation and memory

Design constraints:

Page 51: WPAN Technologies - polito.it · 2 C.Casetti - Politecnico di Torino 08/02/2005 The Bluetooth Idea • Bluetooth has been named after a Scandinavian king, who lived in the X …

51

08/02/2005C.Casetti - Politecnico di Torino

L2CAP SummaryL2CAP Summary (2)(2)

• Reliable, in-order delivery of fragments• Integrity checks on each fragment• Asynchronous, best effort point-to-point link• No duplication• Full duplex

Assumptions about the lower layer

Service provided to the higher layerProtocol multiplexing and demultiplexingLarger MTU than basebandPoint2point and point2multipoint communication

08/02/2005C.Casetti - Politecnico di Torino

Bluetooth Service Bluetooth Service Discovery ProtocolDiscovery Protocol

RFBaseband

AudioLink Mng

L2CAP

Data

SDP RFCOMMIP

Cont

rol

Applications

08/02/2005C.Casetti - Politecnico di Torino

Example Example UUsage of SDPsage of SDP

• Establish L2CAP connection to remote device

• Query for services

search for specific class of service, or

browse for services

• Retrieve attributes that detail how to connect to the service

• Establish a separate (non-SDP) connection to use the service

Page 52: WPAN Technologies - polito.it · 2 C.Casetti - Politecnico di Torino 08/02/2005 The Bluetooth Idea • Bluetooth has been named after a Scandinavian king, who lived in the X …

52

08/02/2005C.Casetti - Politecnico di Torino

Serial Port Emulation Serial Port Emulation UUsing sing RFCOMMRFCOMM

Serial Port emulation on top of a packet oriented link

• Similar to HDLC

• For supporting legacy applications

RFBaseband

AudioLM

L2CAP

Data

SDP RFCOMMIP

Cont

rol

Applications

08/02/2005C.Casetti - Politecnico di Torino

Serial Serial LLineine EEmulationmulation over over PPacketacket BBasedased MACMAC

L2CAP

• Functions:framing: assemble bit stream into bytes and, subsequently, into packets

transport: in-sequence, reliable delivery of serial stream

control signals: emulate RTS, CTS,…

RFCOMM

L2CAP

RFCOMM

• Options at the TX1. collect MTU bytes @

L2CAP and then send

2. wait until a timeout

3. send whatever is available

08/02/2005C.Casetti - Politecnico di Torino

Bluetooth Bluetooth ProfilesProfiles

Page 53: WPAN Technologies - polito.it · 2 C.Casetti - Politecnico di Torino 08/02/2005 The Bluetooth Idea • Bluetooth has been named after a Scandinavian king, who lived in the X …

53

08/02/2005C.Casetti - Politecnico di Torino

• Represent default solutions for usage models: Theydescribe how implementations of usage models have to be accomplished

• The usage models describe a number of user scenarios where Bluetooth performs the radio transmission

• The profile concept is used to decrease the risk of interoperability problems between different manufacturers' products

ProfilesProfiles and and UsageUsage ModelsModels

08/02/2005C.Casetti - Politecnico di Torino

• A profile can be described as a vertical slice through the protocol stack

• It defines options in each protocol that are mandatory for the profileand parameter ranges for each protocol

Bluetooth Bluetooth ProfilesProfiles

Profiles

Prot

ocol

s

Applications

08/02/2005C.Casetti - Politecnico di Torino

• FTP (File Transfer Profile)

• CTP (Cordless TelePhony)

• HS (Headset)

• FP (Fax)

• LAN (Local Area Network Access)

ExamplesExamples

Page 54: WPAN Technologies - polito.it · 2 C.Casetti - Politecnico di Torino 08/02/2005 The Bluetooth Idea • Bluetooth has been named after a Scandinavian king, who lived in the X …

54

08/02/2005C.Casetti - Politecnico di Torino

• Each Bluetooth device supports one or more profiles

• A profile is dependent upon another profile if it re-uses parts of that profile

Bluetooth Bluetooth ProfileProfile StructureStructure

08/02/2005C.Casetti - Politecnico di Torino

RFBaseband

AudioLink Mng

L2CAP

Data

SDP RFCOMMIP

Cont

rol

Applications

IP over Bluetooth V1.0IP over Bluetooth V1.0

GOALS:

• Internet access using cell phones

• Connect PDA devices & laptops to the Internet via LAN access points

08/02/2005C.Casetti - Politecnico di Torino

LAN LAN AAccessccess PPointoint PProfilerofile

• SecurityAuthentication

• EfficiencyHeader and data compression

• Auto-configuration• Lower barrier for deployment

Why use PPP (Point-to-Point Protocol)?

Access Point

Baseband

LMP

L2CAP

RFCOMM

PPP

IP

Page 55: WPAN Technologies - polito.it · 2 C.Casetti - Politecnico di Torino 08/02/2005 The Bluetooth Idea • Bluetooth has been named after a Scandinavian king, who lived in the X …

55

08/02/2005C.Casetti - Politecnico di Torino

Inefficiency of Inefficiency of LLayeringayering

• Emulation of RS-232 over the Bluetooth radio link could be eliminated

L2CAP

RFCOMM

rfc 1662

PPPIP

L2CAP

RFCOMM

rfc 1662

PPP

IP

Palmtop LAN access point

packet oriented

packet oriented

byte oriented

08/02/2005C.Casetti - Politecnico di Torino

Terminate PPP at Terminate PPP at LAN LAN AAccessccess PPointoint

• PPP server function at each access pointmanagement of user name/password is an issueroaming is not seamless

Bluetooth

RFCOMMPPP

IP

Bluetooth

RFCOMMPPP

IPethernet

Palmtop Access Point

08/02/2005C.Casetti - Politecnico di Torino

L2TP L2TP SStyletyle TTunnelingunneling

• Tunneling PPP traffic from access points to the PPP server

1) centralized management of user name/password

2) reduction of processing and state maintenance at each AP

3) seamless roaming

BluetoothRFCOMM

PPP

IP

Palmtop Access Point

BluetoothRFCOMM

PPP

IP

ethernet

IPUDP

ethernet

IPUDP

PPP server

Page 56: WPAN Technologies - polito.it · 2 C.Casetti - Politecnico di Torino 08/02/2005 The Bluetooth Idea • Bluetooth has been named after a Scandinavian king, who lived in the X …

56

08/02/2005C.Casetti - Politecnico di Torino

Seamless Seamless RRoamingoaming with PPPwith PPP

AP1

Server

AP2

MAC level registration MAC level handoff

REQ1

2 RPL2 REQ

3

RPL4

CLR5

palmtop

PPP

PPP PPPpalmtop

08/02/2005

CCoeoexistencexistence betweenbetweenDifferentDifferent WirelessWirelessTechnologiesTechnologies

08/02/2005C.Casetti - Politecnico di Torino

The 2.4 The 2.4 GHzGHz ISM BandISM Band

Page 57: WPAN Technologies - polito.it · 2 C.Casetti - Politecnico di Torino 08/02/2005 The Bluetooth Idea • Bluetooth has been named after a Scandinavian king, who lived in the X …

57

08/02/2005C.Casetti - Politecnico di Torino

CoexistenceCoexistence

• Systems operating in the ISM bands and sharing the same environment may interfere

• Example: Bluetooth and 802.11b that are in the one another’s transmission range

• The closer the interfering transmitter to the receiver, the greater the throughput decrease

• Coexistence is obtained when different technologiesdo not significantly degrade each other’s performance

08/02/2005

AnAn ExampleExample of of Coexistence MechanismsCoexistence Mechanisms: : The OLA The OLA SchemesSchemes

08/02/2005C.Casetti - Politecnico di Torino

IEEE 802.11 IEEE 802.11 WLANsWLANs

• Designed to cover areas as vast as offices or buildings

• The Basic Service Set (BSS) is the basic architectural block and is composed of one access point and several wireless stations

• DSSS WLANs at 11Mbps

• Bandwidth roughly equal to 22 MHz

• DCF used at the MAC layer

Page 58: WPAN Technologies - polito.it · 2 C.Casetti - Politecnico di Torino 08/02/2005 The Bluetooth Idea • Bluetooth has been named after a Scandinavian king, who lived in the X …

58

08/02/2005C.Casetti - Politecnico di Torino

Bluetooth Bluetooth (IEEE 802.15 (IEEE 802.15 WPANsWPANs))

• Interconnection of devices in a range of about 10 m

• FH/TDD channel with bandwidth equal to 79 MHz

master

slave625 µs 366 µs

f2n f2n+1 f2n+2

08/02/2005C.Casetti - Politecnico di Torino

The The Interference ModelInterference Model

• One 802.11 BSS and several 802.15 devices in the proximity of each other interfere when their transmissions overlap both in time and infrequency

• The probability that an 802.15 packet hops within the 802.11 frequency band is equal to 22/79=0.278

08/02/2005C.Casetti - Politecnico di Torino

WLAN packet

The The Interference ModelInterference Model

625 µs

366 µs

offset

802.15 packets colliding in time withthe WLAN packet

Page 59: WPAN Technologies - polito.it · 2 C.Casetti - Politecnico di Torino 08/02/2005 The Bluetooth Idea • Bluetooth has been named after a Scandinavian king, who lived in the X …

59

08/02/2005C.Casetti - Politecnico di Torino

CoexistenceCoexistence MechanismMechanismss

• Collaborative (e.g., META):

• Non-collaborative (e.g., AFH):

Centralized controller at the MAC layer monitoring the 802.11 and the 802.15 traffic

Implemented between co-located interferers only

Counteract interference from both co-located and non co-located interferers

In the case of co-located devices, worse performance in terms of goodput with respect to collaborative mechanisms

08/02/2005C.Casetti - Politecnico di Torino

CollaborativeCollaborative MechanismMechanisms: s: METAMETA

• The META scheme, proposed within the 802.15 Coexistence Working Group, uses a TDMA approach

• META controller allows exchange of information between the two systems and implements a precise timing of packet traffic

• 802.15 voice link has priority over 802.11 data traffic

• 802.11 data traffic has priority over 802.15 data link

08/02/2005C.Casetti - Politecnico di Torino

NonNon--collaborativecollaborativeMechanismMechanisms: AFHs: AFH

• Adaptive Frequency Hopping, proposed within the 802.15 Coexistence Working Group

• Good and bad frequency channels are identified based on interference level

• A new hopping sequence is obtained by avoiding badchannels (although a minimum number of channels isalways needed)

• Periodically, all channels are re-scanned

Page 60: WPAN Technologies - polito.it · 2 C.Casetti - Politecnico di Torino 08/02/2005 The Bluetooth Idea • Bluetooth has been named after a Scandinavian king, who lived in the X …

60

08/02/2005C.Casetti - Politecnico di Torino

The OLA The OLA SchemesSchemes• V-OLA (Voice OverLap Avoidance):

Performed at the WLAN stations to avoidinterference between 802.11 data traffic and 802.15 voice traffic

• D-OLA (Data OverLap Avoidance):

Performed at the 802.15 devices to avoidinterference between 802.11 and 802.15 data traffic

Both schemes assume that 802.11 and 802.15can detect interference due to other technologies

08/02/2005C.Casetti - Politecnico di Torino

The VThe V--OLA OLA SchemeScheme

• By listening to the channel, a 802.11 station becomes aware of which time slots are busy over the 802.15 voice link

• When a station has traffic to transmit, it checks on the channel status:

if idle and expected to be so for the next (i−1)slots, a packet with length equal to min(i⋅500,1500) bytes is sent

if busy, either refrain from transmitting (PT mode) or send a 500 bytes packet (ST mode)

08/02/2005C.Casetti - Politecnico di Torino

The DThe D--OLA OLA SchemeScheme (1)(1)• 802.15 devices supporting data links become aware

of the frequency band used by the interfering WLAN (e.g., through assessment of the RSS)

• Let 2n be the current time slot (master tx) and consider the case of 1-slot packets:

If f2n+1 hops on the 802.11 band, the master schedules a multi-slot packet so that f2n+1 isskipped

If f2n+2 hops on the 802.11 band, the master asksthe next transmitting slave to send a multi-slotpacket so that f2n+2 is skipped

Page 61: WPAN Technologies - polito.it · 2 C.Casetti - Politecnico di Torino 08/02/2005 The Bluetooth Idea • Bluetooth has been named after a Scandinavian king, who lived in the X …

61

08/02/2005C.Casetti - Politecnico di Torino

The DThe D--OLA OLA SchemeScheme (2)(2)

2n 2n+6

2n 2n+6

M MM M M

M MM M MM MS S S S S S S

S S S SSMMS S

M = Master transmissionS = Slave transmission

08/02/2005C.Casetti - Politecnico di Torino

AdvantagesAdvantages

• V-OLA and D-OLA do not require a centralized traffic scheduler

• Interference mitigation between collocated and non-collocated interfering devices

• Minor impact on the 802.11 and the 802.15 standard

V-OLA can be implemented through the CCA functionspecified in 802.11

In 802.15 the master can only indicate to a slave the maximum no. of slots to use. While in D-OLA the slave shouldinterpret the indication as the suggested packet length

08/02/2005C.Casetti - Politecnico di Torino

Simulation ScenarioSimulation Scenario• HV3-link for 802.15 voice traffic, DH1-link for 802.15

data traffic

• RTS/CTS mechanism always active

• Arrival of frames at the 802.11 and 802.15 MAC layers modeled with exponential inter-arrival times and a truncated geometric distribution for the frame length

• The OLA schemes performance are compared withthe results obtained in the case where no coexistence mechanism is used (hereinafter indicatedby label N-CM)

Page 62: WPAN Technologies - polito.it · 2 C.Casetti - Politecnico di Torino 08/02/2005 The Bluetooth Idea • Bluetooth has been named after a Scandinavian king, who lived in the X …

62

08/02/2005C.Casetti - Politecnico di Torino

VV--OLA: 802.11 OLA: 802.11 GoodputGoodputTwoTwo 802.15 Voice 802.15 Voice LinksLinks

0.55

0.6

0.65

0.7

0.75

0.8

0.85

0.9

0.95

IEEE

802

.11

Goo

dput

IEEE 802.11 Traffic Load

N-CMV-OLA PTV-OLA ST

1.00

0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8

08/02/2005C.Casetti - Politecnico di Torino

VV--OLA: 802.15 OLA: 802.15 GoodputGoodputTwoTwo 802.15 Voice 802.15 Voice LinksLinks

0.7

0.75

0.8

0.85

0.9

0.95

1

0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8

IEEE

802

.15

Goo

dput

IEEE 802.11 Traffic Load

N-CMV-OLA PTV-OLA ST

08/02/2005C.Casetti - Politecnico di Torino

DD--OLA: 802.11 OLA: 802.11 GoodputGoodput vs. vs. 802.15 Data 802.15 Data TrafficTraffic

IEEE 802.15 Traffic Load

0.55

0.6

0.65

0.7

0.75

0.8

0.85

0.9

0.95

0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8

IEEE

802

.11

Goo

dput

N-CM – 802.11 Load=0.5

N-CM – 802.11 Load=0.3D-OLA – 802.11 Load=0.3

D-OLA – 802.11 Load=0.5

Page 63: WPAN Technologies - polito.it · 2 C.Casetti - Politecnico di Torino 08/02/2005 The Bluetooth Idea • Bluetooth has been named after a Scandinavian king, who lived in the X …

63

08/02/2005C.Casetti - Politecnico di Torino

DD--OLA: 802.15 OLA: 802.15 GoodputGoodput vs. vs. 802.11 Data 802.11 Data TrafficTraffic

IEEE 802.11 Traffic Load

0.7

0.75

0.8

0.85

0.9

0.95

11

0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8

IEEE

802

.15

Goo

dput

N-CM – 802.15 Load=0.5

N-CM – 802.15 Load=0.3D-OLA – 802.15 Load=0.3

D-OLA – 802.15 Load=0.5

08/02/2005C.Casetti - Politecnico di Torino

DD--OLA: 802.15 OLA: 802.15 PacketPacket DelayDelay vs. vs. 802.15 Data 802.15 Data TrafficTraffic

IEEE 802.15 Traffic Load

1

10

30

50

70

90

0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8

IEEE

802

.15

Ave

rage

Pac

ket D

elay

[ms]

N-CM – 802.11 Load=0.5

N-CM – 802.11 Load=0.3D-OLA – 802.11 Load=0.3

D-OLA – 802.11 Load=0.5

08/02/2005C.Casetti - Politecnico di Torino

Microwave OvenMicrowave Ovenss• Operate in the ISM bands

• Residential transformer type is active for about 8 ms over a power cycle of 20 ms, when the supply frequency is equal to 60 MHz

• The impact on the WLAN performance varies depending on the distance between the oven and the WLAN receiver

• BER at the 802.11 receiver equal to 0.01 (i.e., distance from the oven equal to 3 m)

Page 64: WPAN Technologies - polito.it · 2 C.Casetti - Politecnico di Torino 08/02/2005 The Bluetooth Idea • Bluetooth has been named after a Scandinavian king, who lived in the X …

64

08/02/2005C.Casetti - Politecnico di Torino

Impact of Impact of MicrowaveMicrowave OvenOvenInterferenceInterference on 802.11on 802.11

0,55

0,6

0,65

0,7

0,75

0,8

0,85

0,9

0,95

1

0,1 0,2 0,3 0,4 0,5 0,6 0,7 0,8

IEEE 802.11 Traffic Load

IEEE

802

.11

Goo

dput

N-CM V-OLA PT V-OLA ST

08/02/2005C.Casetti - Politecnico di Torino

ReferencesReferences• A. Tanenbaum, “Computer networks,” 4th ed., Prentice-Hall,

2002.

• J. Haartsen, “The Bluetooth Radio System,” IEEE Personal Comm. Magazine, Feb. 2000.

• B.A. Miller and B. Bisdikian, Bluetooth Revealed, Prentice Hall, 2nd Ed., 2002.

• B. Chatschik, An Overview of the Bluetooth Wireless Technology, IEEE Communications Magazine, Vol. 39, Dec. 2001.

• J. Haartsen, “Paving the way for personal area network standards: An overview of the IEEE P802.15 Working Group forwireless personal area networks,” IEEE Personal Comm.Magazine, March 2000.

08/02/2005C.Casetti - Politecnico di Torino

ReferencesReferences• Bluetooth version 1.1 specifications

http://www.bluetooth.com/dev/specifications.asp

Part A, Radio Specification

Part B, Baseband

Part C, Link Manager Protocol

Part D, Logical Link Control and Adaption Protocol Specification

Part E, Service Discovery Protocol (SDP)

• Bluetooth version 1.1 profiles

http://www.bluetooth.com/dev/specifications.asp

Part K:9, LAN access profile