Professional Documents
Culture Documents
Running in the 2.4 GHz ISM band, Bluetooth employs frequency hopping
techniques with the carrier modulated using Gaussian Frequency Shift Keying
(GFSK). The hopping carrier enables interference to be avoided by Bluetooth
devices. A Bluetooth transmission only remains on a given frequency for a
short time, and if any interference is present the data will be re-sent later
when the signal has changed to a different channel which is likely to be clear
of other interfering signals. The standard uses a hopping rate of 1600 hops
per second, and the system hops over all the available frequencies using a
pre-determined pseudo-random hop sequence based upon the Bluetooth
address of the master node in the network.
adopt the use of frequency hopping system rather than a direct sequence
spread spectrum approach because it is able to operate over a greater
dynamic range. If direct sequence spread spectrum techniques were used
then other transmitters nearer to the receiver would block the required
transmission if it is further away and weaker.
Bluetooth frequencies are all located within the 2.4 GHz ISM band. The ISM
band typically extends from 2 400 MHz to 2 483.5 MHz (i.e. 2.4000 - 2.4835
GHz). The Bluetooth channels are spaced 1 MHz apart, starting at 2 402 MHz
and finishing at 2 480 MHz. This can be calculated as 2401 + n, where n
varies from 1 to 79.
Bluetooth modulation:
The format originally chosen for Bluetooth in version 1 was Gaussian frequency shift
keying, GFSK, however with the requirement for higher data rates two forms of
phase shift keying were introduced for Bluetooth 2 to provide the Enhanced Data
Rate, EDR capability.
Gaussian frequency shift keying: When GFSK is used for the chosen form of
Bluetooth modulation, the frequency of the carrier is shifted to carry the
modulation. A binary one is represented by a positive frequency deviation and a
binary zero is represented by a negative frequency deviation. The modulated signal
is then filtered using a filter with a Gaussian response curve to ensure the sidebands
do not extend too far either side of the main carrier. By doing this the Bluetooth
modulation achieves a bandwidth of 1 MHz with stringent filter requirements to
prevent interference on other channels. For correct operation the level of BT is set
to 0.5 and the modulation index must be between 0.28 and 0.35.
Phase shift keying: Phase shift keying is the form of Bluetooth modulation used
to enable the higher data rates achievable with Bluetooth 2 EDR (Enhanced Data
Rate). Two forms of PSK are used:
8DPSK: This form of Bluetooth modulation is eight point or 8-ary phase shift
keying. It is used when link conditions are good and it allows raw data rates
of up to 3 Mbps to be achieved.
The Bluetooth specification does define a maximum bit error rate of 0.1% and this
equates to a minimum requirement for the receive sensitivity of -70dBm. This
figures for sensitivity then lead to the distances achievable for the different power
levels, although today's receivers are generally more sensitive than those that were
used to baseline the specification at its launch.
The Bluetooth radio interface provides rugged physical layer without any
unnecessary complications to carry the required data from one device to the next.
With many devices being physically small and not having large battery capacity
levels, the radio interface has been designed to keep power consumption low, while
still providing the required capabilities.
Bluetooth links
There are two main types of Bluetooth link that are available and can be set up:
The choice of the form of Bluetooth link used is dependent upon the type of Bluetooth
data transfer that is required.
Bluetooth ACL
The ACL or Asynchronous Connectionless Communications Link is possible the most
widely used form of Bluetooth link. The ACL Bluetooth link is used for carrying framed
data - i.e. data submitted from an application to logical link control and adaptation
protocol channel. The channel may support either unidirectional or bidirectional
Bluetooth data transfer.
There is a variety of different ACL formats that can be used - most of them incorporate
forward error coding, FEC as well as header error correction to detect and correct errors
that may occur in the radio link.
The Asynchronous Bluetooth link provides connections for most applications within
Bluetooth. Data transfers like this are normally supported by profiles which allow the
data to be incorporated into frames and transferred to the other end of the Bluetooth
link where it is extracted from the frames and passed to the relevant application.
The ACL is enables data to be transferred via Bluetooth 1 at speeds up to the maximum
rate of 732.2 kbps. This occurs when it is operating in an asymmetric mode. This is
commonly used because for most applications there is far more data transferred in one
direction than the other. When a symmetrical mode is needed with data transferred at
the same rate in both directions, the data transfer rate falls to 433.9 kbps. The
synchronous links support two bi-directional connections at a rate of 64 kbps. The data
rates are adequate for audio and most file transfers.
When using Bluetooth 2 enhanced data rate, data rates of 2.1 Mbps may be achieved.
Also asynchronous links can be granted a quality of Service, QoS by setting the
appropriate channel parameters.
Bluetooth SCO
The SCO or Synchronous Connection Orientated communications link is used where data
is to be streamed rather than transferred in a framed format.
The SCO can operate alongside the ACL channels, and in fact needs one ACL to
configure the SCOs.
A Bluetooth master node can support up to three simultaneous SCL channels and these
can be split between up to three slave nodes.
The idea of the SCO is to ensure that audio data can be streamed without suffering
delays waiting for frames or packet slots to become available. The SCO communications
links is assigned guaranteed time slots so that they will be transported at the required
time with a known maximum latency.
A further form of link known as an eSCO or Extended SCO was introduced with version
1.2 of the Bluetooth standard. Originally no acknowledgement had been sent, whereas
using the eSCO greater reliability is provided to the Bluetooth link by sending an
acknowledgement and allowing a limited number of re-transmissions if data is
corrupted. In view of the latency requirements, re-transmissions are only allowable until
the next guaranteed time slot, otherwise new data would be delayed.
Bluetooth codec
Within the core specification, there are a number Bluetooth codec types that are
included. These Bluetooth codecs are relatively basic and are not used for audio,
including stereo music applications which would use the ACL.
Any Bluetooth codec is intended to provide telephone standard audio, limiting the audio
bandwidth to around 4 kHz.
The codecs are often CVSD, Continuously Variable Slope Delta modulation, based and
their advantage is that they provide a minimum latency solution so there are no issues
with synchronisation. As a result they may often be used with applications such as video
phones, etc..
These Bluetooth stack components are fundamental to all the profiles and transports
within the overall Bluetooth system.
Bluetooth L2CAP
The Bluetooth L2CAP or logical link control and adaptation protocol is used to provide an
interface for all the data applications that use the ACL links.
The Bluetooth L2CAP provides multiplexing between the higher layer protocols. This
enables multiple applications to utilise the same lower layer links.
In its basic mode the L2CAP enables the following configurability with the packet
payload:
The L2CAP achieves the transmission of the large data packets by segmenting and then
at the receiver, re-assembling the packets so that the data can be fitted into the limits
of the lower layer data packets.
The L2CAP also supports flow control and retransmission, performing CRC checks. The
latest specifications support two L2CAP modes over those originally included:
Any error checking and reliability enhancements can be provided by the lower layers.
Bluetooth SDP
The SDP or service discovery protocol is a key element of the Bluetooth ad-hoc
networking capability.
The Bluetooth SDP allows a Bluetooth device to discover and make many connections
during the course of its life. It enables the devices to discover what services other
Bluetooth devices support, and also lists everything that the Bluetooth device is capable
of supporting.
The Bluetooth SDP uses the Universal Unique Identifier, UUID. Services supported by the
Bluetooth Sig are given a short form UUID of 16 bits rather than the complete 128 bits
that would otherwise be required.
A profile known as the Service Discovery Applications Profile, or SDAP, is often confused
with the Bluetooth SDP. This defines how devices can interrogate each other's SDP after
and L2CAP link has been established.
All Bluetooth devices implement the features of an SDP client as well as having and SDP
server database.
Bluetooth GAP
The Bluetooth GAP or generic access protocol defines the way that Bluetooth devices
are able to discover each other and establish connections. It is one of the most basic
Bluetooth profiles, but is used by every other profile as the foundation for establishing a
link
The Bluetooth GAP can set the Bluetooth device into one of three different discovery
modes:
General discovery
Limited discovery
Non-discoverable
The Bluetooth GAP controls the formation of a connection by controlling the inquiry and
paging routines. It also looks after pairing and controls the use of security and
encryption.
Finally the Bluetooth GAP enables the Bluetooth device to be set into connectable or
non-connectable modes.
Bluetooth profiles
In order to enable Bluetooth devices to communicate properly with each other,
Bluetooth profiles are used. A Bluetooth profile is effectively a wireless interface
specification for communication between Bluetooth devices.
In order to be able to operate, a Bluetooth device must be compatible with a subset of
the profiles available sufficient to enable it to utilise the desired Bluetooth services.
The way a particular Bluetooth device uses Bluetooth technology depends on its
Bluetooth profile capabilities. The Bluetooth profiles provide standards which
manufacturers follow to allow devices to use Bluetooth in the intended manner.
At a minimum, each Bluetooth profile specification contains details of the following
topics:
Specific parts of the Bluetooth protocol stack used by the protocol. To perform its
task, each profile uses particular options and parameters at each layer of the
stack. This may include an outline of the required service record, if appropriate.
Bluetooth profiles
Overviews of the different Bluetooth profiles are tabulated below:
BLUETOOTH
PROFILE
DETAILS
Advanced Audio
Distribution
Profile (A2DP)
This Bluetooth profile defines how stereo quality audio can be streamed from a
media source to a sink.
This Bluetooth profile defines two roles of an audio device: source and sink:
Audio/Video
Remote Control
Profile (AVRCP)
1.
2.
Sink (SNK): A device is the SNK when it acts as a sink of a digital audio
stream delivered from the SRC on the same piconet.
2.
This Bluetooth profile protocol specifies the scope of the AV/C Digital Interface
Command Set that is to be used. This protocol adopts the AV/C device model
and command format for control messages and those messages are transported
by the Audio/Video Control Transport Protocol (AVCTP).
When using AVRCP, the controller detects the user action, i.e. button presses,
etc and then translates them into the A/V control signal. This control signal is
transmitted it to the remote Bluetooth enabled device. In this way, the functions
available for a conventional infrared remote controller can be realized over
BLUETOOTH
PROFILE
DETAILS
Bluetooth, thereby providing a mode robust form of communications.
Basic Imaging
Profile (BIP)
This Bluetooth profile details how an imaging device can be remotely controlled,
how it may print, and how it can transfer images to a storage device. This
Bluetooth profile is naturally intended for cameras and other devices that can
take pictures, including mobile phones now.
The Basic Image Profile, BIP defines two roles:
1.
2.
Basic Printing
Profile (BPP)
1.
2.
Image Pull: This function within the Bluetooth profile allows browsing
nd retrieval of images from a remote device, i.e. pulling images from a
remote source.
3.
4.
5.
6.
Remote Display: This allows for the Imaging Initiator to push images to
another device for display.
This Bluetooth profile allows devices to send text, e-mails, v-cards, images or
other information to printers based on print jobs.
As would be expected te Basic Printing Profile, BPP defines two roles:
1.
2.
The advantage of using the Basic Print Profile, BPP rather than the HCRP is that
it does not need any printer-specific drivers. This makes it particularly applicable
for use with embedded devices such as mobile phones and digital cameras.
Common ISDN
Access Profile
(CIP)
This Bluetooth profile details the way in which ISDN traffic can be transferred via
a Bluetooth wireless connection. It is typically used in Bluetooth enabled office
equipment that is ISDN enabled.
The CIP defines two roles within the Bluetooth profile:
1.
Access Point (AP): This node is connected to the external network and
BLUETOOTH
PROFILE
DETAILS
acts as an endpoint for it. It handles all the interworking associated with
the external ISDN
2.
Cordless
Telephony Profile
(CTP)
Dial-Up Network
Profile (DUN)
File Transfer
Profile (FTP)
ISDN Client (IC): This is the remote node accessing the Access Point via
the Bluetooth wireless network or link
This Bluetooth profile defines how a cordless phone can be implemented using
Bluetooth. This Bluetooth profile is aimed at use for either a dedicated cordless
phone or a mobile phone acting as a cordless phone when close to a CTP
enabled base station. The aim of this Bluetooth profile was to allow a mobile
phone to use a Bluetooth CTP gateway connected to a landline when within the
home or office, and then use the mobile phone network when elsewhere.
Two roles are defined within this Bluetooth profile:
1.
2.
Gateway (GW): The gateway acts as the access point for the terminal
to the landline or other network.
This Bluetooth profile details a standard for accessing the Internet and other
dial-up services via a Bluetooth system. This may be required when accessing
the Internet from a laptop by when using a mobile phone, PDA, etc as a wireless
dial-up modem.
This user Bluetooth profile defines two roles for the Bluetooth nodes:
1.
Gateway (GW): This is the Bluetooth node or device that provides the
access to the public network and ultimately the Internet.
2.
Data Terminal (DT): This is the remote node that interfaces with the
Gateway via the Bluetooth wireless link.
This Bluetooth profile defines how a FAX gateway device can be used. This
Bluetooth profile may be needed when a personal computer uses a mobile
phone as a FAX gateway to send a FAX.
There are two roles for this Bluetooth profile
1.
2.
Data Terminal (DT): This device connects via the Bluetooth wireless
link to be able to send its FAX.
This Bluetooth profile details the way in which folders and files on a server can
be browsed by a client device. This Bluetooth profile may be used for
transferring files wirelessly between two PCs or laptops, or browsing and
retrieving files on a server.
Two roles are defined for this Bluetooth profile:
1.
Client: This is the device that initiates the operation and pushes or
pulls the files to or from the server.
BLUETOOTH
PROFILE
DETAILS
2.
General
Audio/Video
Distribution
Profile (GAVDP)
Generic Object
Exchange Profile
(GOEP)
Hands-Free
Profile (HFP)
Server: This is the target device and it is remote from the device that
pushes or pulls the files.
This Bluetooth profile provides the basis for the A2DP and VDP Bluetooth
profiles. These are used for systems designed for distributing video and audio
streams using Bluetooth technology. This may be used in a variety of scenarios,
e.g. with a set of wireless stereo headphones and a music player - the music
player sends messages to the headphones to establish a connection or adjust
the stream of music, or vise versa.
Two roles are defined within this Bluetooth profile:
1.
2.
This Bluetooth profile is used to transfer an object from one device to another.
One example may be in the exchange of vCards between devices such as
mobile phones, PDAs, etc.
Two roles are defined within this Bluetooth profile:
1.
Server: For this Bluetooth profile, this is the device that provides an
object exchange server for which data objects can be pushed or pulled.
2.
Client: This is the device that can pushes or pulls data to and from the
server.
The HFP Bluetooth profile details the way in which a gateway device may be
used to place and receive calls for a hands-free device. This profile adds
considerable additional functionality over the original Headset Profile, HSP,
allowing remote control, etc. The Bluetooth profile defines two roles:
1.
Audio Gateway (AG): The audio gateway is normally the mobile phone
of car kit and it provides connectivity to the source of the voice data.
2.
Hands-Free Unit (HF): This is the device which acts as the remote
audio input and output mechanism for the Audio Gateway. It also
provides some remote control means.
The Handsfree Bluetooth profile uses a CVSD codec for voice transmission cross
the Bluetooth link and it also defines a number of voice control features
including volume.
Hard Copy Cable
Replacement
Profile (HCRP)
Server: This is the server device that offers the HRCP service - typically
it is a printer.
2.
BLUETOOTH
PROFILE
DETAILS
Human Interface
Device Profile
(HID)
Audio Gateway: The device that is the gateway of the audio both for
input and output. This would typically be a mobile phone, car kit, or a
PC.
2.
This Bluetooth profile details the protocols, procedures and features to be used
by Bluetooth keyboards, mice, pointing and gaming devices and remote
monitoring devices.
Two roles are defined within this Bluetooth profile:
1.
Human Interface Device (HID): The device providing the human data
input and output to and from the host. Typical examples may be a
keyboard or a mouse.
2.
Host: The device using the services of a Human Interface Device. This
may typically be a computer or laptop, etc
Intercom Profile
(ICP)
This profile details the way in which two Bluetooth enabled mobile phones in the
same network can communicate directly with each other, i.e. acting as an
intercom. As the intercom usage is completely symmetrical, there are no
specific roles defined for this Bluetooth profile. However when using the
Intercom Profile, the devices at either end of the link will be denoted as a
Terminal (TL).
Object Push
Profile (OPP)
This Bluetooth profile details the roles of a push server and a push client. These
roles need to interoperate with the server and client device roles defined within
the GOEP Bluetooth profile.
The OPP defines two roles:
Personal Area
Networking
Profile (PAN)
1.
Push Server: This is the device within this Bluetooth profile that
provides an object exchange server
2.
Push Client: This device pushes and pulls objects to and from the Push
Server and initiates the actions.
This Bluetooth profile details the way in which two or more Bluetooth enabled
devices can form an ad-hoc network. It also details how the same mechanism
can be used to access a remote network through a network access point.
The PAN is somewhat more complicated than other Bluetooth profiles and
requires the definition of three roles:
1.
Network Access Point (NAP) and NAP Service: In view of the similarities
with Ethernet networks, the NAP can be considered as being equivalent
BLUETOOTH
PROFILE
DETAILS
Service
Discovery
Application
Profile (SDAP)
Service Port
Profile (SPP)
Synchronization
Profile (SYNC)
Video
Distribution
Profile (VDP)
2.
3.
PAN User (PANU) and PANU Service: As the name indicates the PANU is
the Bluetooth device that uses either the NAP or the GN service
The SDAP is a Bluetooth profile that describes how an application should use the
Service Discovery Procedure, SDP to discover services on a remote device. SDAP
can adopt a variety of approaches to managing the device discovery via Inquiry
and Inquiry Scan and service discovery via SDP. The ideas contained in the SDAP
specification augment the basic specifications provided in GAP, SDP, and the
basic processes of device discovery.
The SDAP defines two roles as given below:
1.
Local Device (LocDev): This is the Bluetooth deveice that initiates the
service discovery procedure.
2.
This Bluetooth profile details the way in which virtual serial ports may be set up
and how two Bluetooth enabled devices may connect.
This Bluetooth profile defines two roles for communication to proceed:
1.
2.
IrMC Server: The device that takes on the role of object exchange
server will become the IrMC Server. Typically this device will be the
mobile phone, PDA, etc.
2.
IrMC Client: This device is typically a PC, and it is the device that
contains the sync engine and pulls and pushes the PIM data to and from
the IrMC server.
This Bluetooth profile details how a Bluetooth enabled device is able to stream
video over a Bluetooth link. It could be used in a variety of scenarios such as
streaming video data from a storage areas such as on a PC to a mobile player,
or from a video camera to a television, etc.
BLUETOOTH
PROFILE
DETAILS
There are two roles defined within this Bluetooth profile:
1.
Source (SRC): As the name suggests the SRC is the origination point of
the streamed video on the piconet.
2.
Sink (SNK): Within this Bluetooth profile, the SNK is the destination for
the digital video stream on the same piconet as the SRC.
There are over twenty different Bluetooth profiles, each having their own function.
Naturally some of these Bluetooth profiles are used more than others, but each one may
be used in a variety of different places and applications.
Bluetooth scatternets
Bluetooth network connections are also able to support scatternets, although because
of timing and memory constraints this form of Bluetooth network has rarely been
implemented. For a Bluetooth scatternet, a slave node or slave device is able to share
its time between two different piconets. This enables large star networks to be built up.
Basic piconet channel: This Bluetooth connection channel is used only when
all 79 channels are used within the hop-set - it is now rarely used as the Adaptive
piconet channel is more often used as it provides greater flexibility.
Bluetooth pairing
In order that devices can connect easily and quickly, a scheme known as Bluetooth
pairing may be used. Once Bluetooth pairing has occurred two devices may
communicate with each other.
Bluetooth pairing is generally initiated manually by a device user. The Bluetooth link for
the device is made visible to other devices. They may then be paired.
The Bluetooth pairing process is typically triggered automatically the first time a device
receives a connection request from a device with which it is not yet paired. In order that
Bluetooth pairing may occur, a password has to be exchanged between the two devices.
This password or "Passkey" as it is more correctly termed is a code shared by both
Bluetooth devices. It is used to ensure that both users have agreed to pair with each
other.
The process of Bluetooth pairing is summarised below:
Two Bluetooth devices find each other: When the two devices: Device 1 and
device 2 find each other it is possible to detect what they are. Normally the
discoverable device will indicate what type of device it is - cellphone, headset,
etc., along with its Bluetooth device name. The Bluetooth device name is the can
be allocated by the user, or it will be the one allocated during manufacture.
Prompt for Passkey: Often the default passkey is set to "0000", but it is
advisable to use something else as hackers will assume most people will not
change this.
However many more sophisticated devices - smartphones and computers - both
users must agree on a code which must obviously be the same for both.
Device 1 sends passkey: The initiating device, Device 1 sends the passkey that
has been entered to Device 2.
Device 2 sends passkey: The passkeys are compared and if they are both the
same, a trusted pair is formed, Bluetooth pairing is established.
Once the Bluetooth pairing has been established it is remembered by the devices, which
can then connect to each without user intervention.
If necessary, the Bluetooth pairing relationship may be removed by the user at a later
time if required.
Bluetooth Security
Bluetooth security issues are an important factor with any Bluetooth device or system.
As with any device these days that provide connectivity, security is an important issue.
There are a number of Bluetooth security measures that can be incorporated into
Bluetooth devices to prevent various security threats that can be posed.
One of the main requirements for Bluetooth is that it should be easy to connect to other
devices. However Bluetooth security needs to be balanced against the ease of use and
the anticipated Bluetooth security threats.
Much work has been undertaken regarding Bluetooth security, however it remains high
on the agenda so that users can use their Bluetooth devices with ease while keeping the
security threats to a minimum.
The various versions of the specifications detail four Bluetooth security modes. Each
Bluetooth device must operate in one of four modes:
In Bluetooth Security Mode 4 the security procedures are initiated after link
setup. Secure Simple Pairing uses what are termed Elliptic Curve Diffie Hellman
(ECDH) techniques for key exchange and link key generation.
The algorithms for device authentication and encryption algorithms are the same
as those defined in Bluetooth v2.0 + EDR.
The security requirements for services protected by Security Mode 4 are as
follows:
No security required
Whether or not a link key is authenticated depends on the Secure Simple Pairing
association model used. Bluetooth Security Mode 4 is mandatory for
communication between v2.1 + EDR devices.
Car Whispering: This involves the use of software that allows hackers to send
and receive audio to and from a Bluetooth enabled car stereo system
In order to protect against these and other forms of vulnerability, the manufacturers of
Bluetooth enabled devices are upgrading he security to ensure that these Bluetooth
security lapses do not arise with their products.