You are on page 1of 32

GENERAL PROFICIENCY

ON

BLUETOOTH
TECHNOLOGY

Submitted by:
ELECTRONICS &
TELECOMMUNICATION
ENGINEERING
Gagan Jyoti Kalita
Roll No -- 139

1
Himu Kalita
Roll No -- 081
Himangshu Saud
Roll No -- 076
Mridul Barman
Roll No -- 085

2
Acknowledgement:

We take this opportunity to express our


gratitude and thanks to the respected Head of
the Department Electronics &
Telecommunication,GIMT, Prof. Abhijit Nath for
his valuable technical suggestions and
constant encouragement, without which this
report would not have come into existence.

3
CONTENTS

Chapter Page

1. Introduction to Bluetooth 4

2. Bluetooth range 5

3. Uses of Bluetooth 5

4. Working of Bluetooth 7

5. Bluetooth Security 9

6. Competing Technologies 13

7. Specifications & Features 18

8. Future of Bluetooth Technology 25

9. Advantages & Disadvantages 27

10. Application 28

11. Conclusions 30

4
Introduction to Bluetooth

Bluetooth is a very simple type of wireless networking that can


allow up to eight devices to be connected together in a mini-
network. Bluetooth wireless technology is a short-range
communications technology intended to replace the cables
connecting portable and/or fixed devices while maintaining high
levels of security. The key features of Bluetooth technology are
robustness, low power, and low cost. The Bluetooth Specification
defines a uniform structure for a wide range of devices to connect
and communicate with each other.

The Bluetooth specification was developed in 1994 by Jaap


Haartsen and Sven Mattisson, who were working for Ericsson
Mobile company .It is named for Harald Blaatand, the king of
Denmark (940-981) who united Denmark and Norway. Blaatand
translated to Bluetooth in English.

It is very short range in operation, and so is considered to be


for 'personal' networking. With a range typically under 30ft, this
allows enough distance to perhaps communicate across an office,
but not any further. It is a moderately slow type of networking, but
it can transfer data sufficiently fast enough for most typical
applications.

The concept behind Bluetooth is to provide a universal short-


range wireless capability. Using the 2.4 GHz band, available
globally for unlicensed low-power (of the order of 1mwatt) uses,
two Bluetooth devices within 10 m of each other can share up to
720 Kbps of capacity. Bluetooth is intended to support an open-
ended list of applications, including data (such as schedules and
telephone numbers), audio, graphics, and even video. For example,
audio devices can include headsets, cordless and standard phones,

5
home stereos, and digital MP3 players.

Bluetooth Range
These are very low power (typically 1 mill watt - 1/1000th of
a watt) and have a range of about 10 m (33 ft). The current
data rate is 1 Mbps with a 2.4-GHz bandwidth. With
Bluetooth, short range is actually a benefit, because it reduces
the chance of interference between your Bluetooth devices and
those belonging to other people nearby.

Uses of Bluetooth

A limited, but growing number of devices use Bluetooth at


present. Devices that are starting to have Bluetooth connectivity
built in include:

 Digital cameras and camcorders


 Printers
 Scanners
 Cell Phones
 PDAs
 Laptops

Bluetooth is a standard and a communications protocol primarily


designed for low power consumption, with a short range (power-
class-dependent: 100m, 10m and 1m, but ranges vary in practice;
see table below) based on low-cost transceiver microchips in each
device. Bluetooth makes it possible for these devices to
communicate with each other when they are in range. Because the
devices use a radio (broadcast) communications system, they do
not have to be in line of sight of each other.

6
Maximum Permitted Power
Range
Class
(approximate)
mW dBm

Class 1 100 mW 20 dBm ~100 metres

Class 2 2.5 mW 4 dBm ~10 metres

Class 3 1 mW 0 dBm ~1 metres

In most cases the effective range of class 2 devices is extended if


they connect to a class 1 transceiver, compared to a pure class 2
network. This is accomplished by the higher sensitivity and
transmission power of Class 1 devices.

Version Data Rate

Version 1.2 1 Mbit/s

Version 2.0 + EDR 3 Mbit/s

7
Working of Bluetooth Technology:
1)Uses frequency of 2.45 GHZ:

Bluetooth networking transmits data via low-power radio


waves. It communicates on a frequency of 2.45 gigahertz (actually
between 2.402 GHz and 2.480 GHz, to be exact). This frequency
band has been set aside by international agreement for the use of
industrial, scientific and medical devices (ISM).

2)Low power requirement:

Bluetooth devices won't drain precious battery life. Each


transmission signal to and from cell phones consumes just 1
milliwatt of power, so cell phone charge is virtually unaffected by
all of this activity.

3)Connection establishment:

Unlike infra-red, Bluetooth does not require line-of-sight


positioning of connected units.When one Bluetooth product comes
within range of another, they automatically exchange address and
capability details. They can then establish a 1 megabit/s link (up to
2 Mbps in the second generation of the technology) with security
and error correction.
Bluetooth is essentially a networking standard that works
at two layers:

• Physical layer or radio layer:

Bluetooth is a radio-frequency standard. In this layer bluetooth


connection is established through radio wave.Here it uses

8
frquency hopping spread spectrum (FHSS)to avoid interference
from other devices or network i.e. each device changes its
modulation frequency 1600 times per second.

• Baseband layer:

Here products have to agree on when bits are sent, how many will
be sent at a time.The access method used in this technology is
TDMA(Time Division Multiple Access).Here the primary and
secondary communicate with each other using time slots.The
length of a time slot is exactly 625 micro sec.This means that
during the time that one frequency is used,a primary sends a frame
to a secondary,or a secondary sends a frame to a primary.

9
Bluetooth Security

In any wireless networking setup, security is a concern. Devices


can easily grab radio waves out of the air, so people who send
sensitive information over a wireless connection need to take
precautions to make sure those signals aren't intercepted. Bluetooth
technology is no different -- it's wireless and therefore susceptible
to spying and remote access.

Bluetooth offers several security modes, and device manufacturers


determine which mode to include in a Bluetooth-enabled gadget. In
almost all cases, Bluetooth users can establish "trusted devices"
that can exchange data without asking permission. When any other
device tries to establish a connection to the user's gadget, the user
has to decide to allow it. Service-level security and device-level
security work together to protect Bluetooth devices from
unauthorized data transmission. Security methods include
authorization and identification procedures that limit the use of
Bluetooth services to the registered user and require that users
make a conscious decision to open a file or accept a data transfer.
As long as these measures are enabled on the user's phone or other
device, unauthorized access is unlikely. A user can also simply
switch his Bluetooth mode to "non-discoverable" and avoid
connecting with other Bluetooth devices entirely. If a user makes
use of the Bluetooth network primarily for synching devices at
home, this might be a good way to avoid any chance of a security
breach while in public.

Still, early cell-phone virus writers have taken advantage of


Bluetooth's automated connection process to send out infected
files. However, since most cell phones use a secure Bluetooth
connection that requires authorization and authentication before
accepting data from an unknown device, the infected file typically

10
doesn't get very far. When the virus arrives in the user's cell phone,
the user has to agree to open it and then agree to install it. This has,
so far, stopped most cell-phone viruses from doing much damage.

Other problems like "bluejacking," "bluebugging" and "Car


Whisperer" have turned up as Bluetooth-specific security issues.
Bluejacking involves Bluetooth users sending a business card (just
a text message, really) to other Bluetooth users within a 10-meter
(32-foot) radius. If the user doesn't realize what the message is, he
might allow the contact to be added to his address book, and the
contact can send him messages that might be automatically opened
because they're coming from a known contact. Bluebugging is
more of a problem, because it allows hackers to remotely access a
user's phone and use its features, including placing calls and
sending text messages, and the user doesn't realize it's happening.
The Car Whisperer is a piece of software that allows hackers to
send audio to and receive audio from a Bluetooth-enabled car
stereo. Like a computer security hole, these vulnerabilities are an
inevitable result of technological innovation, and device
manufacturers are releasing firmware upgrades that address new
problems as they arise.

Bluetooth signals can be easily intercepted, as can any other type


of wireless signal. So, the Bluetooth specification calls for the
use of built in security to discourage eavesdrooping and
attempts to falsify the origin of messages, which is called
“spoofing”. Specifically, link-level security features are
available that implement authentication and encryption.

Authentication prevents spoofing and unwanted access to critical


data and functions, while encryption protects link privacy.
However, in providing link-level authentication and
encryption, enforcing security at only these levels inhibits
user-friendly access to more public-oriented usage models,
such as discovering services and exchanging virtual business

11
cards. To meet these differing demands, the Bluetooth
specification defines three security modes that cover the
functionality and application of devices.

Security modes: Mode 1 refers to the absence of security and is


used when the devices have no critical applications. In this
mode, the devices bypass the link-level security functions,
making them suitable for accessing data bases containing non-
sensitive information. The automatic exchange of business
cards and calendars are typical examples of non-secure data
transfers.

Mode 2 provides service-level security, allowing for


more versatile access procedures, especially for running
parallel applications which may each have a different security
requirement. Mode 3 provides link-level security, whereby the
Link Manager(LM) enforces security at a common level for all
applications at the time of connection setup. Although less
flexible, this mode enforces a common security level, and it is
easier to implement than Mode 2.

Bluejacking:

Bluejacking is the sending of unsolicited messages over Bluetooth


to Bluetooth-enabled devices such as mobile phones, PDAs or
laptop computers, sending a vCard which typically contains a
message in the name field (i.e., for blue dating or blue chat) to
another bluetooth enabled device via the OBEX protocol.
Bluebugging:

Bluebugging is a form of Bluetooth attack often caused by a lack


of personal security and carelessness. In progession of discovery
date to society, bluetooth attacks were first seen with the advent of

12
bluejacking, followed by bluesnarfing, and as this article will go
into more detail, Bluebugging.
Bluebugging was first discovered by the German researcher named
Herfurt. His Bluebug program allowed the user to ultimately take
control of a victim's phone, which, in turn could be used to call the
user's phone. In other words, this meant that the Bluebug user
could simply listen to any conversation his/her victim was having
in real life/time. In addition, this program allowed for the ability to
create a call forwarding application whereby the user could receive
calls intended for his/her victim.

Bluesnarfing
Bluesnarfing is the unauthorized access of information from a
wireless device through a Bluetooth connection, often between
phones, desktops, laptops, and PDAs. This allows access to a
calendar, contact list, emails and text messages and on some
phones users can copy pictures and private videos. Currently
available programs must allow connection and to be 'paired' to
another phone to copy content. There may be other programs that
can break into the phones without any control, but if they exist
they are not made publicly available by the developer. One
instance of Bluesnarfing software that was demonstrated (but never
made available for download) utilised weaknesses in the Bluetooth
connection of some phones. This weakness has since been patched
by the Bluetooth standard. There seem to be no available reports of
phones being Bluesnarfed without pairing, since the patching of
the Bluetooth standard.
Bluesnarfing is much more serious than bluejacking, but both
exploit others' Bluetooth connections without their knowledge.
Any device with its Bluetooth connection turned on and set to
"discoverable" (able to be found by other Bluetooth devices in
range) may be susceptible to Bluejacking, and possibly to
Bluesnarfing when and if Bluesnarfing of the current Bluetooth
security becomes possible. By turning off this feature, the potential

13
victim can be safer from the possibility of being Bluesnarfed;
although a device that is set to "hidden" may be Bluesnarfable by
guessing the device's MAC address via brute force.

Competing Technologies
Besides Bluetooth many other technologies exist like IrDA, Home
RF (SWAP) that provide similar or related services. A quick
glance into their scope and properties would help putting all of
these into perspective. Let’s look at the features of Bluetooth first

• Operates in the 2.56 GHZ ISM(industrial, scientific &


medical) band which is globally available
• Uses FHSS
• Can support up to 8 devices in a piconet
• Omni-directional, non line of sight transmission through
walls
• 10m to 100m range
• Low cost, $20
• 1mW power
• Extended range with external power amplifier (100 meters)

1) IrDA
IrDA is an international organization that creates and
promotes interoperable, low-cost infrared data
interconnection standards. IrDA has a set of protocols
covering all layers of data transfer and in addition has some
network management and interoperability designs. IrDA
protocols have IrDA DATA as the vehicle for data delivery
and IrDA CONTROL for sending the control information.

14
Features:

• Range: From contact to at least 1metre. Can be extended to 2


meters. A low power version relaxes the range objective for
operation from contact through at least 20 cm between low
power devices and 30 cm between low power and standard
power devices. This implementation affords 10 times less
power consumption. These parameters are termed the
required maximum ranges by certain classes of IrDA featured
devices and sets the end user expectation for discovery,
recognition and performance.
• Bi-directional communication is the basis of all specifications
• Data transmission from 9600 b/s with primary speed/cost
steps of 115 kb/s and maximum speed up to 4 Mb/s
• Data packets are protected using a CRC (CRC-16 for speeds
up to 1.152Mb/s and CRC-32 at 4 Mb/s).

IrDA vs Bluetooth

If one examines the benefits of each technology, it can be can seen


that Bluetooth and IrDA are both critical to the marketplace. Each
technology has advantages and drawbacks and neither can meet all
users' needs. Bluetooth's ability to penetrate solid objects and its
capability for maximum mobility within the piconet allows for data
exchange applications that are very difficult or impossible with
IrDA. For example, with Bluetooth a person could synchronize
their phone with a PC without taking the phone out of their pocket
or purse (this is not possible with IrDA). The omni-directional
capability of Bluetooth allows synchronization to start when the
phone is brought into range of the PC.

The Bluetooth standard defines the layers 1 and 2 of the OSI


model. The application framework of Bluetooth is aimed to

15
achieve interoperability with IrDA and WAP. In addition, a host of
other applications will be able to use the Bluetooth technology and
protocols.

2) HOME RF

The HomeRF is a subset of the International


Telecommunication Union (ITU) who is working on the
development of a standard for inexpensive RF voice and data
communication. Currently, the HomeRF Working Group
specification provides for wireless Ethernet transmission.

• Range: Maximum 40 meters


• Data rates of 1.2Mbps

The HomeRF Working Group has also developed the Shared


Wireless Access Protocol (SWAP). SWAP is a industry
specification that permits PCs, peripherals, cordless telephones and
other devices to communicate voice and data without the usage of
cables.
Features:

• operates in the 2.45 GHz range of the unlicensed ISM band


• Range: upto 150 feet
• employs frequency hopping at 50 hops per second
• It supports both a TDMA service to provide delivery of
interactive voice and CSMA/CA service for delivery of high
speed data packets
• The network is capable of supporting upto 127 nodes
• Transmission Power : 100mW
• Data Rate : 1Mbps using 2FSK modulation and 2 Mbps using
4 FSK modulation
• Voice connections : upto 6 full duplex conversations

16
• Data Security : Blowfish encryption algorithm (over 1 trillion
codes)

SWAP vs Bluetooth

Currently SWAP has more installed base compared to Bluetooth


but it is believed that Bluetooth is eventually going to prevail.
Bluetooth is a technology to connect devices without cables. The
intended use is to provide short-range connections between mobile
devices and to the Internet via bridging devices to different
networks (wired and wireless) that provide Internet capability.
HomeRF SWAP is a wireless technology optimized for the home
environment. Its primary use is to provide data networking and dial
tones between devices such as PCs, cordless phones, Web Tablets
and a broadband cable or DSL modem. Both technologies share
the same frequency spectrum but do not interfere when operating
in the same space.
A quick glance comparison between these technologies is
presented below.
Peak Voice Data
Relative
Data Range network network
Cost
Rate support support
IEEE
2 Mbps 50m Medium Via IP TCP / IP
802.11
16
IrDA < 2m Low Via IP Via PPP
Mbps
Via IP and
Bluetooth 1 Mbps < 10m Medium Via PPP
cellular
1.6 Via IP and
HomeRF 50m Medium TCP / IP
Mbps PSTN

WI-FI vs Bluetooth

17
Wi-Fi is a traditional Ethernet network, and requires configuration
to set up shared resources, transmit files, and to set up audio links
(for example, headsets and hands-free devices). Wi-Fi uses the
same radio frequencies as Bluetooth, but with higher power,
resulting in a stronger connection. Wi-Fi is sometimes called
"wireless Ethernet." This description is accurate, as it also provides
an indication of its relative strengths and weaknesses. Wi-Fi
requires more setup but is better suited for operating full-scale
networks; it enables a faster connection, better range from the base
station, and better security than Bluetooth.

The nearest equivalent in Bluetooth is the DUN profile, which


allows devices to act as modem interfaces.

Bluetooth and Wi-Fi have many applications in today's offices,


homes, and on the move: setting up networks, printing, or
transferring presentations and files from PDAs to computers. Both
are versions of unlicensed wireless technology.

Wi-Fi is intended for resident equipment and its applications. The


category of applications is outlined as WLAN, the wireless local
area networks. Wi-Fi is intended as a replacement for cabling for
general local area network access in work areas.

Bluetooth is intended for non resident equipment and its


applications. The category of applications is outlined as the
wireless personal area network (WPAN). Bluetooth is a
replacement for cabling in a variety of personally carried
applications in any ambience.

18
Specifications and features
The Bluetooth specification was developed in 1994 by Jaap
Haartsen and Sven Mattisson, who were working for Ericsson in
Lund, Sweden.[13] The specification is based on frequency-hopping
spread spectrum technology.

The specifications were formalized by the Bluetooth Special


Interest Group (SIG). The SIG was formally announced on May
20, 1998. Today it has a membership of over 12,000 companies
worldwide. It was established by Ericsson, IBM, Intel, Toshiba,
and Nokia, and later joined by many other companies.

Bluetooth 1.0 and 1.0B

Versions 1.0 and 1.0B had many problems, and manufacturers had
difficulty making their products interoperable. Versions 1.0 and
1.0B also included mandatory Bluetooth hardware device address
(BD_ADDR) transmission in the Connecting process (rendering
anonymity impossible at the protocol level), which was a major
setback for certain services planned for use in Bluetooth
environments.

• Bluetooth 1.1

• Ratified as IEEE Standard 802.15.1-2002[14]


• Many errors found in the 1.0B specifications were fixed.
• Added support for non-encrypted channels.
• Received Signal Strength Indicator (RSSI).

• Bluetooth 1.2

This version is backward compatible with 1.1 and the major


enhancements include the following:

• Faster Connection and Discovery

19
• Adaptive frequency-hopping spread spectrum (AFH), which
improves resistance to radio frequency interference by
avoiding the use of crowded frequencies in the hopping
sequence.
• Higher transmission speeds in practice, up to 721 kbit/s, than
in 1.1.
• Extended Synchronous Connections (eSCO), which improve
voice quality of audio links by allowing retransmissions of
corrupted packets, and may optionally increase audio latency
to provide better support for concurrent data transfer.
• Host Controller Interface (HCI) support for three-wire
UART.
• Ratified as IEEE Standard 802.15.1-2005[15]
• Introduced Flow Control and Retransmission Modes for
L2CAP.

• Bluetooth 2.0 + EDR

This version of the Bluetooth specification was released on


November 10, 2004. It is backward compatible with the previous
version 1.2. The main difference is the introduction of an
Enhanced Data Rate (EDR) for faster data transfer. The nominal
rate of EDR is about 3 megabits per second, although the practical
data transfer rate is 2.1 megabits per second.[16] The additional
throughput is obtained by using a different radio technology for
transmission of the data. Standard, or Basic Rate, transmission uses
Gaussian Frequency Shift Keying (GFSK) modulation of the radio
signal with a gross air data rate of 1 Mbit/s. EDR uses a
combination of GFSK and Phase Shift Keying modulation (PSK)
with two variants, π/4-DQPSK and 8DPSK. These have gross air
data rates of 2, and 3 Mbit/s respectively.[17]

According to the 2.0 + EDR specification, EDR provides the


following benefits:

20
• Three times the transmission speed (2.1 Mbit/s) in some
cases.
• Reduced complexity of multiple simultaneous connections
due to additional bandwidth.
• Lower power consumption through a reduced duty cycle.

The Bluetooth Special Interest Group (SIG) published the


specification as "Bluetooth 2.0 + EDR" which implies that EDR is
an optional feature. Aside from EDR, there are other minor
improvements to the 2.0 specification, and products may claim
compliance to "Bluetooth 2.0" without supporting the higher data
rate. At least one commercial device, the HTC TyTN Pocket PC
phone, states "Bluetooth 2.0 without EDR" on its data sheet.[18]

• Bluetooth 2.1 + EDR

Bluetooth Core Specification Version 2.1 + EDR is fully backward


compatible with 1.2, and was adopted by the Bluetooth SIG on
July 26, 2007.[17] It supports theoretical data transfer speeds of up
to 3 Mbit/s. This specification includes the following features:

Extended inquiry response (EIR)


Provides more information during the inquiry procedure to
allow better filtering of devices before connection. This
information may include the name of the device, a list of
services the device supports, the transmission power level
used for inquiry responses, and manufacturer defined data.
Sniff subrating
Reduces the power consumption when devices are in the sniff
low-power mode, especially on links with asymmetric data
flows. Human interface devices (HID) are expected to benefit
the most, with mouse and keyboard devices increasing their
battery life by a factor of 3 to 10.[citation needed] It lets devices
decide how long they will wait before sending keepalive
messages to one another. Previous Bluetooth
implementations featured keep alive message frequencies of

21
up to several times per second. In contrast, the 2.1 + EDR
specification allows pairs of devices to negotiate this value
between them to as infrequently as once every 10 seconds.
Encryption pause/resume (EPR)
Enables an encryption key to be changed with less
management required by the Bluetooth host. Changing an
encryption key must be done for a role switch of an
encrypted ACL link, or every 23.3 hours (one Bluetooth day)
encryption is enabled on an ACL link. Before this feature
was introduced, when an encryption key is refreshed the
Bluetooth host would be notified of a brief gap in encryption
while the new key was generated; so the Bluetooth host was
required to handle pausing data transfer (however data
requiring encryption may already have been sent before the
notification that encryption is disabled has been received).
With EPR, the Bluetooth host is not notified of the gap, and
the Bluetooth controller ensures that no unencrypted data is
transferred while they key is refreshed.
Secure simple pairing (SSP)
Radically improves the pairing experience for Bluetooth
devices, while increasing the use and strength of security. See
the section on Pairing below for more details. It is expected
that this feature will significantly increase the use of
Bluetooth.[19]
Near field communication (NFC) cooperation
Automatic creation of secure Bluetooth connections when
NFC radio interface is also available. This functionality is
part of SSP where NFC is one way of exchanging pairing
information. For example, a headset should be paired with a
Bluetooth 2.1 + EDR phone including NFC just by bringing
the two devices close to each other (a few centimeters).
Another example is automatic uploading of photos from a
mobile phone or camera to a digital picture frame just by
bringing the phone or camera close to the frame.[20][21]
Non-Automatically-Flushable Packet Boundary Flag (PBF)

22
Using this feature L2CAP may support both isochronous
(A2DP media Streaming) and asynchronous data flows
(AVRCP Commands) over the same logical link by marking
packets as automatically-flushable or non-automatically-
flushable by setting the appropriate value for the
Packet_Boundary_Flag in the HCI ACL Data Packet

• Bluetooth 3.0 + HS

The 3.0 + HS specification[17] was adopted by the Bluetooth SIG on


April 21, 2009. It supports theoretical data transfer speeds of up to
24 Mbit/s. Its main new feature is AMP (Alternate MAC/PHY),
the addition of 802.11 as a high speed transport. Two technologies
had been anticipated for AMP: 802.11 and UWB, but UWB is
missing from the specification.[22]

Alternate MAC/PHY
Enables the use of alternative MAC and PHYs for
transporting Bluetooth profile data. The Bluetooth Radio is
still used for device discovery, initial connection and profile
configuration, however when lots of data needs to be sent,
the high speed alternate MAC PHY (802.11, typically
associated with Wi-Fi) will be used to transport the data. This
means that the proven low power connection models of
Bluetooth are used when the system is idle, and the low
power per bit radios are used when lots of data needs to be
sent.
Unicast connectionless data
Permits service data to be sent without establishing an
explicit L2CAP channel. It is intended for use by applications
that require low latency between and
reconnection/transmission of data. This is only appropriate
for small amounts of data.
Read encryption key size

23
Introduces a standard HCI command for a Bluetooth host to
query the encryption key size on an encrypted ACL link. The
encryption key size used on a link is required for the SIM
Access Profile, so generally Bluetooth controllers provided
this feature in a proprietary manner. Now the information is
available over the standard HCI interface.
Enhanced Power Control
Updates the power control feature to remove the open loop
power control, and also to clarify ambiguities in power
control introduced by the new modulation schemes added for
EDR. Enhanced power control removes the ambiguities by
specifying the behaviour that is expected. The feature also
adds closed loop power control, meaning RSSI filtering can
start as the response is received. Additionally, a "go straight
to maximum power" request has been introduced, this is
expected to deal with the headset link loss issue typically
observed when a user puts their phone into a pocket on the
opposite side to the headset.

• Bluetooth V4.0 (low energy protocols)

Main article: Bluetooth low energy

On December 17, 2009, the Bluetooth SIG published the adoption


of Bluetooth low energy wireless technology as the hallmark
feature of the Bluetooth Core Specification Version 4.0[23]. Chip
shipments are anticipated to follow closely behind. The first
Bluetooth low energy enabled products should be available in
2010.

On April 20, 2009, Bluetooth SIG presented the new Bluetooth


low energy technology as an entirely additional protocol stack,
compatible with other existing Bluetooth protocol stacks. The
preceding naming as Wibree and Bluetooth ULP (Ultra Low
Power) has been replaced by the adopted name of Bluetooth low
energy technology.

24
On June 12, 2007, Nokia and Bluetooth SIG had announced that
Wibree will be a part of the Bluetooth specification, as an ultra-low
power Bluetooth technology.[24] Expected use cases include
watches displaying Caller ID information, sports sensors
monitoring the wearer's heart rate during exercise, and medical
devices. The Medical Devices Working Group is also creating a
medical devices profile and associated protocols to enable this
market. Bluetooth low energy technology is designed for devices
to have a battery life of up to one year.

25
Future of Bluetooth Technology

Because it meets the basic needs of connectivity in close range,


Bluetooth has a very bright future ahead of it. Bluetooth is actually
the result of initiatives from nine leading communications and
computer industry giants, including 3-COM, Sony, Lucent, IBM,
Nokia, Microsoft, and more!

Since the forming of the original group, more than 1,800


manufacturers around the world have joined the initiative.
According to reports, the Bluetooth technology is expected to be
built into more than 100 million devices, with over 670 million
enabled Bluetooth devices.

Resulting from the amazing success of WAP (Wireless Application


Protocol), the adoption of smart phones and hand held devices,
Bluetooth can easily have an amazing impact on your day to day
life. Bluetooth is one of the key technologies that can help to make
the mobile information society happen, by blurring the possibilities
between home, the office, and the outside world.

The seamless integration and connectivity that Bluetooth promises


will make it possible to explore a wide range of interactive and
highly transparent personalized services which were actually quite
difficult to dream of simply because of the complexity involved
with making such devices communicate with each other.

Many Bluetooth pilot products have already been rolled into the
market and backed by big vendors, which is a healthy sign for the
overall acceptance of the technology. The support for Bluetooth is
not limited to companies that develop only Bluetooth enabled
products.

The applications for Bluetooth can have great impacts on other

26
industries as well. The adoption of Bluetooth technology is
expected to spread throughout the industry of computers.

Unlike infrared technology, Bluetooth is used by many different


wireless devices. Bluetooth offers exceptional quality for short
range wireless, even going through walls and obstructions. While
infrared is the biggest competitor at this time, Bluetooth far
surpasses it, proving to millions that it is the wireless
communication technology of the present day and age.

In the beginning, Bluetooth started with version 1.0, then gradually


moved from there. The current version is 2.0+EDR, with another
version currently in development. The technology behind the
Bluetooth specification always getting better and better, which is
why it's so popular.

In the future, you can expect the technology behind Bluetooth to


get better. Bluetooth has proven to be the wireless standard of the
future, offering you wireless connectability for hundreds of
different devices. For cell phones or other forms of wireless
connections, Bluetooth is the one technology that you don't want to
find yourself without.

27
Advantages:

Widely Used: Bluetooth is now really popular and keeps getting


more popular as time passes by. It is now widely used across
countries and almost by everyone. Companies are taking the
benefit by using this in their new and future products to make life
much easier for everyone. We can use Bluetooth on laptops, cell
phones, music players, headsets, printers and a lot more other
products.

Feature Simplicity: We do not need to know much about


technology in order to run Bluetooth. Anyone that doesn’t have no
knowledge about the new technology can still be able to use the
Bluetooth feature due to its simplicity and the ease of use. We
think that the simplicity of it and the fact that it's wire free makes it
very widely used and utmost popular.

Free of Charge: Best of all, we do not have to pay a penny for the
service! It's not an extra cell phone or cable bill that we have to add
to your budget. Simply by the technology and we're done! All we
need to do is connect it with what we are using. There hasn't been
any reporting lately on companies charging a monthly fee or any
fee for people to use the Bluetooth feature

Go Wireless!: It allows us to stay cord free and do not have to


worry about finding the correct place to connect that extra long
cord. Avoid having to have a ton of cords wherever we go. We
can also go to the internet wirelessly with this feature when we're
out somewhere outside of our home.

Data Privacy: Even though we are able to exchange data across our
cell phones, we still have the ability to keep your information
private. In order to make a transfer or allow someone to access the
files on your phone, we will have to give them access by accepting

28
or rejecting the request through our phone.

Disadvantages:

Battery Use: This occurs mostly on the cell phone but also occurs
in other technology such as music players. We're using up more
battery power when we leave our Bluetooth enabled on our phone
all day. To disregard all this, the best thing that we can possibly do
is disable it once we are completed with the transfer. It only takes
a few seconds to enable and disable so it wouldn't hurt to disable it
once we are done using it.

Bluetooth Internet: Throughout all devices, when using Bluetooth


internet, the connection can sometimes run very slow so Bluetooth
internet is not highly suggested for all cases.

As you can notice that there are quite a bit of advantages and fewer
disadvantages. Overall, Bluetooth is a great thing to be using on all
your devices that supports it. You can do so much with it and
includes cutting all the cords attached to your devices.

Applications:

Bluetooth has a tremendous potential in moving and synchronizing


information in a localized setting. Potential for Bluetooth
applications is huge, because we transact business and
communicate more with people who are close by than with those
who are far away - a natural phenomenon of human interaction.
The following list represents only a small set of potential
applications - in future many more imaginative applications will
come along

29
• The Bluetooth technology connects all our office peripherals
wirelessly. We can connect our PC or notebook to printers,
scanners and faxes without the troublesome cable
attachments.

• If our digital cameras in Bluetooth enabled, we can send still


or video images from any location to any location.

• Bluetooth allows three-way phones. At home, our phone


functions as a portable phone (fixed line charge). When we
are on the move, it functions as a mobile phone (cellular
charge). And when our phone comes within range of another
mobile phone with built-in Bluetooth wireless technology it
functions as a walkie-talkie (no telephony charge).

• We can connect our wireless headset to our mobile phone,


mobile computer or any wired connection to keep our hands
free for more important tasks when we are at the office or in
our car

30
Conclusion:

Bluetooth wireless technology is a specification designed to enable


wireless communication between small,mobile devices.The
inspiration behind this technology was the concept to eliminate the
need for proprietary cables,which are currently required to enable
device connectivity. For instance,in order to transfer images from a
digital camera to a laptop PC, a cable is needed in order to connect
the camera to the laptop.Each camera manufacturer and model has
a different cable requirement.In fact every hand held device
manufactured,which allows connectivity with a PC,has a different
cable configuration.Imagine a scenario in which both the laptop PC
and the digital camera use Bluetooth wireless technology.In this
case there is no need for cables to transfer data between
devices.Expanding that idea to include all hand held mobile
electronic devices is, in a nutshell, the Bluetooth wireless
technology vision.

31
BIBLIOGRAPHY:

1) Data Communications & Networking, Behrouz A Forouzan.


2) www.wikipedia.com.
3) www.google.com.

32

You might also like