Pages

Thursday, December 16, 2021

About Bluetooth Technology - part 2

Bluetooth® Wireless Technology

One key reason for the incredible success of Bluetooth® technology is the tremendous flexibility it provides developers. Offering two radio options, Bluetooth technology provides developers with a versatile set of full-stack, fit-for-purpose solutions to meet the ever-expanding needs for wireless connectivity.

Whether a product streams high-quality audio between a smartphone and speaker, transfers data between a tablet and medical device, or sends messages between thousands of nodes in a building automation solution, the Bluetooth Low Energy (LE) and Bluetooth Classic radios are designed to meet the unique needs of developers worldwide.

From <https://www.bluetooth.com/learn-about-bluetooth/tech-overview/>



Bluetooth® Classic

The Bluetooth Classic radio, also referred to as Bluetooth Basic Rate/Enhanced Data Rate (BR/EDR), is a low power radio that streams data over 79 channels in the 2.4GHz unlicensed industrial, scientific, and medical (ISM) frequency band. Supporting point-to-point device communication, Bluetooth Classic is mainly used to enable wireless audio streaming and has become the standard radio protocol behind wireless speakers, headphones, and in-car entertainment systems. The Bluetooth Classic radio also enables data transfer applications, including mobile printing.

Bluetooth® Low Energy (LE)

The Bluetooth Low Energy (LE) radio is designed for very low power operation. Transmitting data over 40 channels in the 2.4GHz unlicensed ISM frequency band, the Bluetooth LE radio provides developers a tremendous amount of flexibility to build products that meet the unique connectivity requirements of their market. Bluetooth LE supports multiple communication topologies, expanding from point-to-point to broadcast and, most recently, mesh, enabling Bluetooth technology to support the creation of reliable, large-scale device networks. While initially known for its device communications capabilities, Bluetooth LE is now also widely used as a device positioning technology to address the increasing demand for high accuracy indoor location services. Initially supporting simple presence and proximity capabilities, Bluetooth LE now supports Bluetooth® Direction Finding and soon, high-accuracy distance measurement.

 

Bluetooth Low Energy (LE)

Bluetooth Classic

Frequency Band

2.4GHz ISM Band (2.402 – 2.480 GHz Utilized)

2.4GHz ISM Band (2.402 – 2.480 GHz Utilized)

Channels

40 channels with 2 MHz spacing

(3 advertising channels/37 data channels)

79 channels with 1 MHz spacing

Channel Usage

Frequency-Hopping Spread Spectrum (FHSS)

Frequency-Hopping Spread Spectrum (FHSS)

Modulation

GFSK

GFSK, π/4 DQPSK, 8DPSK

Data Rate

LE 2M PHY: 2 Mb/s

LE 1M PHY: 1 Mb/s

LE Coded PHY (S=2): 500 Kb/s

LE Coded PHY (S=8): 125 Kb/s

EDR PHY (8DPSK): 3 Mb/s

EDR PHY (π/4 DQPSK): 2 Mb/s

BR PHY (GFSK): 1 Mb/s

Tx Power*

100 mW (+20 dBm)

100 mW (+20 dBm)

Rx Sensitivity

LE 2M PHY: -70 dBm

LE 1M PHY: -70 dBm

LE Coded PHY (S=2): -75 dBm

LE Coded PHY (S=8): -82 dBm

-70 dBm

Data Transports

Asynchronous Connection-oriented

Isochronous Connection-oriented

Asynchronous Connectionless

Synchronous Connectionless

Isochronous Connectionless

Asynchronous Connection-oriented

Synchronous Connection-oriented

Communication Topologies

Point-to-Point (including piconet)

Broadcast

Mesh

Point-to-Point (including piconet)

Positioning Features

Presence (Advertising)

Proximity (RSSI)

Direction (AoA/AoD)

Distance (Coming)

None

* Devices shall not exceed the maximum allowed transmit power levels set by the regulatory bodies that have jurisdiction over the locales in which the device is to be sold or intended to operate. Implementers should be aware that the maximum transmit power level permitted under a given set of regulations might not be the same for all modulation modes.

 

From <https://www.bluetooth.com/learn-about-bluetooth/tech-overview/>

 

How does Bluetooth work?

November 5, 2007

We go straight to the source and get Bluetooth executive director Michael Foley to wirelessly transmit an answer to this query.

Bluetooth technology is a short-range wireless communications technology to replace the cables connecting electronic devices, allowing a person to have a phone conversation via a headset, use a wireless mouse and synchronize information from a mobile phone to a PC, all using the same core system.

The Bluetooth RF transceiver (or physical layer) operates in the unlicensed ISM band centered at 2.4 gigahertz (the same range of frequencies used by microwaves and Wi-Fi). The core system employs a frequency-hopping transceiver to combat interference and fading.

Bluetooth devices are managed using an RF topology known as a "star topology." A group of devices synchronized in this fashion forms a piconet, which may contain one master and up to seven active slaves, with additional slaves that are not actively participating in the network. (A given device may also be part of one or more piconets, either as a master or as a slave.) In a piconet, the physical radio channel is shared by a group of devices that are synchronized to a common clock and frequency-hopping pattern, with the master device providing the synchronization references.

Let's say the master device is your mobile phone. All of the other devices in your piconet are known as slaves. This could include your headset, GPS receiver, MP3 player, car stereo, and so on.



Devices in a piconet use a specific frequency-hopping pattern, which is algorithmically determined by the master device. The basic hopping pattern is a pseudorandom ordering of the 79 frequencies in the ISM band. The hopping pattern may be adapted to exclude a portion of the frequencies that are used by interfering devices. The adaptive hopping technique improves Bluetooth technology's coexistence with static (nonhopping) ISM systems, such as Wi-Fi networks, when these are located in the vicinity of a piconet.

The physical channel (or the wireless link) is subdivided into time units known as slots. Data is transmitted between Bluetooth-enabled devices in packets that are positioned in these slots. Frequency hopping takes place between the transmission or reception of packets, so the packets that make up one transmission may be sent over different frequencies within the ISM band.

The physical channel is also used as a transport for one or more logical links that support synchronous and asynchronous traffic as well as broadcast traffic. Each type of link has a specific use. For instance, synchronous traffic is used to carry hands-free audio data, while asynchronous traffic may carry other forms of data that can withstand more variability in the timing for delivery, such as printing a file or synchronizing your calendar between your phone and computer.

One of the complexities often associated with wireless technology is the process of connecting wireless devices. Users have become accustomed to the process of connecting wired devices by plugging one end of a cable into one device and the other end into the complementary device.

Bluetooth technology uses the principles of device "inquiry" and "inquiry scan." Scanning devices listen in on known frequencies for devices that are actively inquiring. When an inquiry is received, the scanning device sends a response with the information needed for the inquiring device to determine and display the nature of the device that has recognized its signal.

Let's say you want to wirelessly print a picture from your mobile phone to a nearby printer. In this case, you go to the picture on your phone and select print as an option for sending that picture. The phone would begin searching for devices in the area. The printer (the scanning device) would respond to the inquiry and, as a result, would appear on the phone as an available printing device. By responding, the printer is ready to accept the connection. When you select the Bluetooth wireless printer, the printing process kicks off by establishing connections at successively higher layers of the Bluetooth protocol stack that, in this case, control the printing function.

Like any successful technology, all of this complexity goes on without the user being aware of anything more than the task he or she is trying to complete, like connecting devices and talking hands-free or listening to high-quality stereo music on wireless headphones.

 

From <https://www.scientificamerican.com/article/experts-how-does-bluetooth-work/>

 

What Bluetooth is, what it does, and how it works

Bluetooth is a short-range wireless communication technology that allows devices such as mobile phones, computers, and peripherals to transmit data or voice wirelessly over a short distance. The purpose of Bluetooth is to replace the cables that normally connect devices, while still keeping the communications between them secure.

The "Bluetooth" name is taken from a 10th-century Danish king named Harald Bluetooth, who was said to unite disparate, warring regional factions. Like its namesake, Bluetooth technology brings together a broad range of devices across many different industries through a unifying communication standard. 

Bluetooth Technology

Developed in 1994, Bluetooth was intended as a wireless replacement for cables. It uses the same 2.4GHz frequency as some other wireless technologies in the home or office, such as cordless phones and WiFi routers. It creates a 10-meter (33-foot) radius wireless network, called a personal area network (PAN) or piconet, which can network between two and eight devices. This short-range network allows you to send a page to your printer in another room, for example, without having to run an unsightly cable.

Bluetooth uses less power and costs less to implement than Wi-Fi. Its lower power also makes it far less prone to suffering from or causing interference with other wireless devices in the same 2.4GHz radio band. 

Bluetooth range and transmission speeds are typically lower than Wi-Fi (the wireless local area network that you may have in your home). Bluetooth v3.0 + HS — Bluetooth high-speed technology — devices can deliver up to 24 Mbps of data, which is faster than the 802.11b WiFi standard, but slower than wireless-a or wireless-g standards. As technology has evolved, however, Bluetooth speeds have increased.

The Bluetooth 4.0 specification was officially adopted on July 6, 2010. Bluetooth version 4.0 features include low energy consumption, low cost, multivendor interoperability, and enhanced range. 

The hallmark feature enhancement to the Bluetooth 4.0 spec is its lower power requirements; devices using Bluetooth v4.0 are optimized for low battery operation and can run off of small coin-cell batteries, opening up new opportunities for wireless technology. Instead of fearing that leaving Bluetooth on will drain your cell phone's battery, for example, you can leave a Bluetooth v4.0 mobile phone connected all the time to your other Bluetooth accessories. 

Connecting With Bluetooth

Many mobile devices have Bluetooth radios embedded in them. PCs and some other devices that do not have built-in radios can be Bluetooth-enabled by adding a Bluetooth dongle, for example.

The process of connecting two Bluetooth devices is called "pairing." Generally, devices broadcast their presence to one another, and the user selects the Bluetooth device they want to connect to when its name or ID appears on their device. As Bluetooth-enabled devices proliferate, it becomes important that you know when and to which device you're connecting, so there may be a code to enter that helps ensure you're connecting to the correct device.

This pairing process can vary depending on the devices involved. For example, connecting a Bluetooth device to your iPad can involve different steps from those to pair a Bluetooth device to your car.

Bluetooth Limitations

There are some downsides to Bluetooth. The first is that it can be a drain on battery power for mobile wireless devices like smartphones, though as the technology (and battery technology) has improved, this problem is less significant than it used to be.

Also, the range is fairly limited, usually extending only about 30 feet, and as with all wireless technologies, obstacles such as walls, floors, or ceilings can reduce this range further.

The pairing process may also be difficult, often depending on the devices involved, the manufacturers, and other factors that all can result in frustration when attempting to connect.

How Secure Is Bluetooth?

Bluetooth is considered a reasonably secure wireless technology when used with precautions. Connections are encrypted, preventing casual eavesdropping from other devices nearby. Bluetooth devices also shift radio frequencies often while paired, which prevents an easy invasion.

Devices also offer a variety of settings that allow the user to limit Bluetooth connections. The device-level security of "trusting" a Bluetooth device restricts connections to only that specific device. With service-level security settings, you can also restrict the kinds of activities your device is permitted to engage in while on a Bluetooth connection. 

As with any wireless technology, however, there is always some security risk involved. Hackers have devised a variety of malicious attacks that use Bluetooth networking. For example, "bluesnarfing" refers to a hacker gaining authorized access to information on a device through Bluetooth; "bluebugging" is when an attacker takes over your mobile phone and all its functions.  

For the average person, Bluetooth doesn't present a grave security risk when used with safety in mind (e.g., not connecting to unknown Bluetooth devices). For maximum security, while in public and not using Bluetooth, you can disable it completely.

 

From <https://www.lifewire.com/what-is-bluetooth-2377412>

 

What are some security concerns?

Depending upon how it is configured, Bluetooth technology can be fairly secure. You can take advantage of its use of key authentication and encryption. Unfortunately, many Bluetooth devices rely on short numeric personal identification numbers (PINs) instead of more secure passwords or passphrases.

 

If someone can "discover" your Bluetooth device, he or she may be able to send you unsolicited messages or abuse your Bluetooth service, which could cause you to be charged extra fees. Worse, an attacker may be able to find a way to access or corrupt your data. One example of this type of activity is "bluesnarfing," which refers to attackers using a Bluetooth connection to steal information off of your Bluetooth device. Also, viruses or other malicious code can take advantage of Bluetooth technology to infect other devices. If you are infected, your data may be corrupted, compromised, stolen, or lost. You should also be aware of attempts to convince you to send information to someone you do not trust over a Bluetooth connection.

How can you protect yourself? 

·         Disable Bluetooth when you are not using it. Unless you are actively transferring information from one device to another, disable the technology to prevent unauthorized people from accessing it.

·         Use Bluetooth in "hidden" mode. When Bluetooth is enabled, make sure it is "hidden," not "discoverable." The hidden mode prevents other Bluetooth devices from recognizing your device. This does not prevent you from using your Bluetooth devices together. You can "pair" devices so that they can find each other even if they are in hidden mode. Although the devices (for example, a mobile phone and a headset) will need to be in discoverable mode to initially locate each other, once they are "paired," they will always recognize each other without needing to rediscover the connection.

·         Be careful where you use Bluetooth. Be aware of your environment when pairing devices or operating in discoverable mode. For example, if you are in a public wireless "hotspot," there is a greater risk that someone else may be able to intercept the connection (see Securing Wireless Networks for more information) than if you are in your home or your car.

·         Evaluate your security settings. Most devices offer a variety of features that you can tailor to meet your needs and requirements. However, enabling certain features may leave you more vulnerable to being attacked, so disable any unnecessary features or Bluetooth connections. Examine your settings, particularly the security settings, and select options that meet your needs without putting you at increased risk. Make sure that all of your Bluetooth connections are configured to require a secure connection.

·         Take advantage of security options. Learn what security options your Bluetooth device offers, and take advantage of features like authentication and encryption.

 

From <https://us-cert.cisa.gov/ncas/tips/ST05-015>

                                                    

History of Bluetooth

WLAN technology enables device connectivity to infrastructure based services through a wireless carrier provider. The need for personal devices to communicate wirelessly with one another without an established infrastructure has led to the emergence of Personal Area Networks (PANs).

·         Ericsson's Bluetooth project in 1994 defines the standard for PANs to enable communication between mobile phones using low power and low cost radio interfaces.

·         In May 1988, Companies such as IBM, Intel, Nokia and Toshiba joined Ericsson to form the Bluetooth Special Interest Group (SIG) whose aim was to develop a defacto standard for PANs.

·         IEEE has approved a Bluetooth based standard named IEEE 802.15.1 for Wireless Personal Area Networks (WPANs). IEEE standard covers MAC and Physical layer applications.

Bluetooth specification details the entire protocol stack. Bluetooth employs Radio Frequency (RF) for communication. It makes use of frequency modulation to generate radio waves in the ISM band.

The usage of Bluetooth has widely increased for its special features.

·         Bluetooth offers a uniform structure for a wide range of devices to connect and communicate with each other.

·         Bluetooth technology has achieved global acceptance such that any Bluetooth enabled device, almost everywhere in the world, can be connected with Bluetooth enabled devices.

·         Low power consumption of Bluetooth technology and an offered range of up to ten meters has paved the way for several usage models.

·         Bluetooth offers interactive conference by establishing an adhoc network of laptops.

·         Bluetooth usage model includes cordless computer, intercom, cordless phone and mobile phones.

 

For all discussed seminar topics list click here Index.

                                                                                             …till next post, bye-bye and take care.                                                     

No comments: