You are on page 1of 4

BLUETHOOTH

a.
Bluetooth is a proprietary open wireless technology standard for exchanging data over short distances (using short wavelength radio transmissions in the ISM band from 24002480 MHz) from fixed and mobile devices, creating personal area networks (PANs) with high levels of security.

b.

Created by telecoms vendor Ericsson in 1994,[1] it was originally conceived as a wireless alternative to RS-232 data cables. It can connect several devices, overcoming problems of synchronization.

c.

Bluetooth is managed by the Bluetooth Special Interest Group, which has more than 14,000 member companies in the areas of telecommunication, computing, networking, and consumer electronics.[2] The SIG oversees the development of the specification, manages the qualification program, and protects the trademarks.[3] To be marketed as a Bluetooth device, it must be qualified to standards defined by the SIG. A network of patents are required to implement the technology and are only licensed to those qualifying devices; thus the protocol, whilst open, may be regarded as proprietary.

d.

The word Bluetooth is an anglicised version of the Scandinavian Bltand/Bltann, the epithet of the tenth-century king Harald I of Denmarkand parts of Norway who united dissonant Danish tribes into a single kingdom. The implication is that Bluetooth does the same with communications protocols, uniting them into one universal standard.

e. f.

The Bluetooth logo is a bind rune merging the Younger Futhark runes and (Bjarkan) ( ), Harald's initials.

(Hagall) ( )

Bluetooth uses a radio technology called frequency-hopping spread spectrum,( Frequency-hopping spread spectrum (FHSS) is a method of transmitting radio signals by rapidly switching a carrier among many frequency channels, using

a pseudorandom sequence known to both transmitter and receiver. It is utilized as a multiple access method in thefrequency-hopping code division multiple access (FHCDMA) scheme.) which chops up the data being sent and transmits chunks of it on up to 79 bands (1 MHz each; centered from 2402 to 2480 MHz) in the range 2,4002,483.5 MHz (allowing for guard bands). This range is in the globally unlicensed Industrial, Scientific and Medical (ISM) 2.4 GHz short-range radio frequency band.

g.

Originally Gaussian frequency-shift keying (GFSK)

[ Gaussian Frequency-Shift

Keying (GFSK) is a type of Frequency Shift Keying modulation that uses a Gaussian filter to smooth positive/negative frequency deviations, which represent a binary 1 or 0. ] modulation was the only modulation scheme available; subsequently, since the introduction of Bluetooth 2.0+EDR, /4-DQPSK and 8DPSK modulation may also be used between compatible devices. Devices functioning with GFSK are said to be operating in basic rate (BR) mode where an instantaneous data rate of 1 Mbit/s is possible. The term Enhanced Data Rate (EDR) is used to describe /4-DPSK and 8DPSK schemes, each giving 2 and 3 Mbit/s respectively. The combination of these (BR and EDR) modes in Bluetooth radio technology is classified as a "BR/EDR radio".

h.

Bluetooth is a packet-based protocol with a master-slave structure(Master/slave is a model of communication where one device or process has unidirectional control over one or more other devices. In some systems a master is elected from a group of eligible devices, with the other devices acting in the role of slaves). One master may communicate with up to 7 slaves in a piconet; all devices share the master's clock. Packet exchange is based on the basic clock, defined by the master, which ticks at 312.5 s intervals. Two clock ticks make up a slot of 625 s; two slots make up a slot pair of 1250 s. In the simple case of single-slot packets the master transmits in even slots and receives in odd slots; the slave, conversely, receives in even slots and transmits in odd slots. Packets may be 1, 3 or 5 slots long but in all cases the master transmit will begin in even slots and the slave transmit in odd slots.

i.

Bluetooth provides a secure way to connect and exchange information between devices such as faxes, mobile phones, telephones, laptops,personal computers, printers, Global Positioning System (GPS) receivers, digital cameras, and video game consoles.

j.

A master Bluetooth device can communicate with a maximum of seven devices in a piconet [These days, a piconet' is an ad-hoc computer network linking a user group of devices using Bluetooth technology protocols to allow one master device to interconnect with up to seven active slave devices (because a three-bit MAC address is used). Up to

255 further slave devices can be inactive, or parked, which the master device can bring into active status at any time.Piconet range will vary according to the class of the bluetooth device. Data transfer rates vary between about 200 and 2100 kbit/s at the application.] (an ad-hoc computer network using Bluetooth technology), though not all devices support this limit. The devices can switch roles, by agreement, and the slave can become the master (for example, a headset initiating a connection to a phone will necessarily begin as master, as initiator of the connection; but may subsequently prefer to be slave). k. The Bluetooth Core Specification provides for the connection of two or more piconets to form a scatternet, in which certain devices simultaneously play the master role in one piconet and the slave role in another. l. At any given time, data can be transferred between the master and one other device (except for the little-used broadcast mode). The master chooses which slave device to address; typically, it switches rapidly from one device to another in a roundrobin fashion. Since it is the master that chooses which slave to address, whereas a slave is (in theory) supposed to listen in each receive slot, being a master is a lighter burden than being a slave. Being a master of seven slaves is possible; being a slave of more than one master is difficult. The specification is vague as to required behaviour in scatternets. m. Many USB Bluetooth adapters or "dongles" are available, some of which also include an IrDA adapter. Older (pre-2003) Bluetooth dongles, however, have limited capabilities, offering only the Bluetooth Enumerator and a less-powerful Bluetooth Radio incarnation. Such devices can link computers with Bluetooth with a distance of 100 meters, but they do not offer as many services as modern adapters do.

n. List of applications
o

Wireless control of and communication between a mobile phone and a hands free headset. This was one of the earliest applications to become popular. Wireless Bluetooth headset and Intercom. Wireless networking between PCs in a confined space and where little bandwidth is required. Wireless communication with PC input and output devices, the most common being the mouse, keyboard and printer.

o o

Transfer of files, contact details, calendar appointments, and reminders between devices with OBEX. Replacement of traditional wired serial communications in test equipment,GPS receivers, medical equipment, bar code scanners, and traffic control devices. For controls where infrared was traditionally used. For low bandwidth applications where higher USB bandwidth is not required and cable-free connection desired. Sending small advertisements from Bluetooth-enabled advertising hoardings to other, discoverable, Bluetooth devices.[10] Wireless bridge between two Industrial Ethernet (e.g., PROFINET) networks. Three consoles, Nintendo's Wii
[11]

o o

o o

seventh-generation game and Sony's PlayStation 3 and PSP Go, use Bluetooth

for their respective wireless controllers. o Dial-up internet access on personal computers or PDAs using a data-capable mobile phone as a wireless modem. o Short range transmission of health sensor data from medical devices to mobile phone, set-top box or dedicated telehealthdevices.[12] o o Allowing a DECT phone to ring and answer calls on behalf of a nearby cell phone Real-time location systems (RTLS), are used to track and identify the location of objects in real-time using Nodes or tags attached to, or embedded in the objects tracked, and Readers that receive and process the wireless signals from these tags to determine their locations[13] o Personal security application on mobile phones for prevention of theft or loss of items. The protected item has a Bluetooth marker (e.g. a tag) that is in constant communication with the phone. If the connection is broken (the marker is out of range of the phone) then an alarm is raised. This can also be used as a man overboard alarm. A product using this technology has been available since 2009. o

You might also like