Bluetoothtechnology 1
Bluetoothtechnology 1
Bluetoothtechnology 1
ABSTRACT
INTRODUCTION
Bluetooth was named for the 10th Century Viking king , Harald Blatand
(A.K.A., Bluetooth) who peacefully united all the tiny island kingdoms
of
Denmark, southern Sweden, and southern Norway into one country . In
keeping with its namesake, Bluetooth, the new low-cost radio
technology, is
designed to unite or connect all different types of devices to effectively
work
as one. By uniting devices, Bluetooth eliminates the need for cabling in a
wide range of products, including cellular phones, PCs, headphones,
audio
equipment, printers, and many more.
Bluetooth Definitions
• Parked units: Piconet devices that are synchronized but don't have
MAC addresses.
WORKING
Data transmission:
Network arrangement:
on code (FEC), 2/3 rate forward error correction code FEC, and
automatic repeat request (ARQ). The FEC methods are designed to
reduce the number of retransmissions. However, the over hea Three error
correction techniques have been defined: 1/3 rate forward error corrected
significantly slows transmissions, so is generally not used in relatively
error-free environments, with the exception of packet headers. The ARQ
scheme requires that the header error and cyclic redundancy checks are
okay. When they are, an acknowledge is sent. When they aren't, the data
is resent.
Connection Protocol
In this mode, they listen for messages every 1.28 seconds over 32
hop frequencies (fewer in Japan, Spain, and France).
4. Hold: When either the master or slave wishes, a hold mode can be
5. Sniff: The sniff mode, applicable only to slave units, is for power
6. Park: Park mode is a more reduced level of activity than the hold
mode. During it, the slave is synchronized to the piconet, thus not
requiring full reactivation, but is not part of the traffic. In this state,
they do not have MAC addresses, but only listen enough to keep
their synchronization with the master and check for broadcast
messages.
USAGE MODEL:
Voice/data access points is one of the key initial usage models and
involves connecting a computing device to a communicating device via a
secure wireless link (see Figure 1). For example, a mobile computer
equipped with Bluetooth technology could link to a mobile phone that
uses Bluetooth technology to connect to the Internet to access e-mail. The
mobile phone acts as a personal
access point. Even more ideal, the notebook can connect to the Internet
while the cell phone is being carried in a briefcase or purse. The
Bluetooth usage model also envisions public data access points in the
future. Imagine the current data-equipped pay phones in airports being
upgraded with Bluetooth modems. This would allow any mobile device
equipped with Bluetooth technology to easily connect to the Internet
while located within ten meters of that access point. These access points
could, of course, support much higher data rates than today’s modems, as
public spaces could connect a variety of private Bluetooth access points
via a LAN that is routed to the Internet over a DSL line, allowing each
access point a private 1Mbps connection to the Internet.
Peripheral Interconnects :
keyboards, mice, and joysticks that work over a wireless link. The
Bluetooth link is built into the mobile computer; therefore, the cost of the
peripheral device is less because an access point is not needed.
Additionally, many of these devices can be used in multiple markets. For
example, a Bluetooth headset used in the office could be connected to a
Bluetooth access point that provides access to the office phone and multi-
media functions of the mobile computer. When mobile, the same headset
could be used to interface with the cellular phone (which can now remain
in a
briefcase or purse).Another aspect of a short-range link like Bluetooth is
in the area of proximity security devices. In this case, if one device is not
within range of another device, the first device will go into a high
security mode.
The last usage model, Personal Area Networking (PAN), focuses on the
ad-hoc formation and breakdown of personal networks(see Figure 3).
Imagine meeting someone in an airport and quickly and securely
exchanging documents by establishing a private piconet. In the future,
Bluetooth kiosks could provide access to electronic media that could be
quickly downloaded for later access on the mobile device.
Bluetooth Characteristics:
Competing technologies
IrDA
For cable replacement, the infrared standard IrDA has been around
for several years and is quite widespread. Most new portable PCs, PDAs,
and some cellular phones support IrDA, although actual adoption by
users has been rather limited. IrDA is faster than Bluetooth but is limited
to point to point connections,
Whereas Bluetooth is also capable to point to multi point. IrDA’s biggest
draw back is that it requires a clear line to sight, and is usually limited to
a few feet between devices.
Wireless LAN:
power and have a larger hardware footprint, making them unsuitable for
small mobile devices.
BLUETOOTH IN FUTURE
Some members of the Bluetooth SIG such as Sony & Eastman Kodak are
interested in seeing the speed of Bluetooth increasing for applications
such as streaming video. Proposals are under consideration but it is not
clear when products based on any of the proposals would be available
Cahners In-Stat group estimates that the Bluetooth market will grow from
virtually zero in 1999 to over 1 billion Bluetooth-enabled devices that
will
ship in 2005.
ADVANTAGES OF BLUETOOTH
TECHNOLOGY:
APPLICATIONS
Smart Home
happening, the data from the individual’s PDA may be exchanged with
the home electronic board, and the family calendar is updated
to reflect the scheduled activities in the office.
Automatic Check-in:
• Hotels are testing, or plan to test, services that allow guests to
check in, unlock room doors and even control room temperature
with handheld devices equipped with Bluetooth Technology.
• The Bluetooth enabled mobile phone or the PDA can present the
electronic ticket to the airline system without one having to go
through the queue at the check-in counters. The airline's on-line
system performs the identification via the ID-tag feature built into
the mobile phone or the PDA and confirms the reserved seat.
BIBLIOGRAPHY
2. http://www.intel.com/mobile/bluetooth