Bluetooth Baseband. Chingwei Yeh 2001/9/10
|
|
- Daniela Bishop
- 6 years ago
- Views:
Transcription
1 Bluetooth Baseband Chingwei Yeh 2001/9/10
2 Outline Introduction Masters, Slaves, and Piconets System Timing Physical Links: SCO and ACL Bluetooth Packets Logical Channels Synchronization
3 Scope Higher Protocol Stack Link Manager (LM) Link Controller (LC) Baseband RF
4 Link Controller & Baseband (1) LM LC Link-level and medium access management Packet-level access control PHY: Baseband: packet-level processing and timing RF
5 Link Controller & Baseband (2) LC: commanded by LM Local & remote LC entities manage the packet-by-packet process of establishing the link Maintain the link once established Baseband: commanded by LC Channel coding/decoding Low-level timing control and management
6 Link Controller & Baseband in the Bluetooth Spec.
7 Bluetooth Device Address BD_Addr[47:32] (NAP[15:0]) Used to initialize the encryption engine stream LFSR BD_Addr[31:24] (UAP[7:0]) Used to initialize the HEC and CRC calculation for frequency hopping BD_Addr[23:0] (LAP[23:0]) Used by sync word generation and frequency hopping
8 Masters, Slaves, and Piconets Master the device which initiates an exchange of data Slave the device which responds to the master
9 Time Division Multiplexing and Time Slots 625 µs/slot CLKN (312.5 µs): 0 to , cyclic
10 Multi-Slot Packets
11 Frequency Hopping Hopping Mechanism All devices in a piconet hops in synchrony with the Master Each device will hop once per packet* Benefits Security Reliability Tradeoff *equivalent for multi-slot packets
12 Hopping Sequence A pseudo-randomly determined frequency sequence Clocks CLKN native clock of the device CLK Master clock of the piconet CLKN of the piconet Master device CLKE estimate of CLKN of the slaves Hopping sequence determined by the Master (CLK and Master LAP)
13 Piconet and Scatternet (1) Two or more units sharing the same hopping sequence form a piconet (similar to a LAN) Each piconet can have only one master up to seven slaves Multiple piconets form a scatternet
14 Piconet and Scatternet (2)
15 Timing Master clock synchronizes the piconet
16 Multi-slave Timing
17 Important Clock Ticks Page/Inquiry Scan Rate =1.28s Half-slot Rate =312.5 µs Clock Wrap Slot-pair Rate =1.25ms Slot Rate =625 µs
18 Simple Calculations ±10us, ±20ppm between the Master and Slaves Allows for a Salve to be left alone for up to 800 slots DH5: 2870µs x 40ppm = 0.12 µs (1/8 symbol period) very simple timing recovery (20 µs / 625 µs ) / 40ppm = 800
19 Physical Links Asynchronous Connection-less (ACL) Synchronous Connection Oriented (SCO)
20 ACL An ACL link is formed immediately after a connection is established. A Master may have multiple ACL links to the slaves, but only one link can exist between any two devices. A slave is permitted to return an ACL packet in the slave-to-master( ) slot if and only if it has been addressed in the preceding master-toslave slot( ). Broadcast packets are ACL packets not addressed to any specific slaves.
21 SCO A SCO provides a symmetric link between Master and Slave with reserved channel bandwidth and slots. A Master can support up to three SCO links. A slave can support up to three SCO links from the same master two SCO links if the links are originated from different masters. SCO packets are never retransmitted. SCO > ACL
22 SCO T SCO, D SCO, and SCO interval SCO is setup via the Link Manager Protocol (LMP). LMP control messages (e.g. broadcast) > SCO slots Initialization Master CLK[27:1] mod T SCO = D SCO Master (CLK[27], CLK[26:1]) mod T SCO = D SCO
23 Bluetooth Packets Little Endian Each packet consists of 3 entities: Access code Header Payload
24 Access Code To catch A broadcast packet The packet to a specific slave Actions involved DC offset compensation Clock recovery and Synchronization Identification
25 Different Access Codes (1) Channel Access Code (CAC) Derived from Master s LAP and CLKN Used by all devices in a piconet during connection Device Access Code (DAC) Derived from a specific device s LAP and CLKN Used in Paging/Page Scan
26 Different Access Codes (2) Inquiry Access Code (IAC) General Inquiry Access Code (GIAC) Used by all devices during the inquiry procedures, as no prior knowledge of anyone s LAP exists. Fixed (0x9E8B33) Dedicated Inquiry Access Code (DIAC) For the inquiry of specific set of devices like printers and handsets 0x9E8B00 0x9E8B3F Generic Access Profile indicates only the Limited Inquiry Access Code (LIAC, 0x9E8B00) should be used. Use on a temporary basis
27 Different Access Codes (3)
28 Access Code Format
29 Access Code Preamble The sequence 1010 or 0101, depending on whether the LSB of the following sync word is 1 or 0. This gives the DC thresholding and clock recovery circuitry only 5µs to create a reliable clock signal, with which to sample and clock in the remainder of the data.
30 Access Code Trailer The trailer sequence is either 1010 or 0101 depending on whether the MSB of the sync word is 0 or 1.
31 Access Code Sync Word Total 64 bits. The 34-bit BCH parity word is the key element of the sync word very high autocorrelation very low co-correlation BCH Parity Word LAP Barker Sequence 34 bits 24 bits 6 bits
32 Access Code Sync Word Sync word Match: the packet is intended for the receiving device. No-match: the radio can be shut down to conserve power. The point in time at which the correlator match Master is exactly 68ms into its slots. This allows the Slave to re-adjust its own subslot timing to match up with the Master to within 1 ms.
33 Header
34 Header Protection against Erross Each field is crucial total 18 bits protected by a Forward Error Correction (FEC) code of 1/3, resulting in 54 bits.
35 Header AM_ADDR Distinguishes the active members participating on the piconet. Max. of 7 slaves 3 bits The all-zero address is reserved for broadcasting packets, with the FHS packet as the only exception.
36 Header TYPE Types of traffic: SCO, ACL, NULL, POLL, ID, FHS. Types of error correction used for the payload. How many slots the payload will last.
37
38 Header FLOW Used for flow control of packets over the ACL link. When the RX buffer in the recipient is full and is not emptied, FLOW=0 is returned to stop the transmission of data temporarily. Only applicable to ACL packets. Packets containing only link control information (ID, POLL, and NULL packets) or SCO packets can still be received. When the RX buffer is empty, FLOW=1 is returned. When no packet is received, or the received header is in error, FLOW=1 is assumed implicitly.
39 Header ARQN ARQN=1(0) informs the sender of a successful (failed) transfer of payload data with a cyclic redundancy check (CRC) code Positive acknowledge: ACK Negative acknowledge: NAK When no return message regarding acknowledge is received, a NAK is assumed and data is re-transmitted. NAK is also the default return information.
40 Packet Header SEQN The SEQN bit provides a sequential numbering scheme to order the data packet stream. For each new transmitted packet that contains data with CRC, the SEQN bit is inverted. By comparing the SEQN of consecutive packets, correctly received retransmissions can be discarded.
41 Header HEC Header Error Check (HEC) is simply a CRC function performed on the header. The HEC consists of an 8-bit word generated by the polynomial 647(octal representation). Before generating the HEC, the HEC generator is initialized with an the Master or Slave UAP or All-zero 8-bit values, depending on the packet. If the HEC does not pass, the entire packet is discarded.
42 Payload
43 Payload Content ACL packets only have the data field. SCO packets only have the voice field with the exception of the DV packets. Voice Field 240 bits for HV packets 80 bits for DV packets
44 Payload Data Field (1) Payload Header [8 or 16] Payload [0-2712] CRC [16] L_CH [2] Flow [1] Length [5 or 9] Undefined [0 or 4]
45 Payload Data Field (2) Packets in segments 1 & 2 have a 1-byte payload header (see Packet Types) Packets in segments 3 & 4 have a 2-bytes payload header (see Packet Types) The payload header specifies the logical channel (L_CH), controls the flow on the logical channels (FLOW), and the payload length (5 bits and 9 bits for 1-byte and 2-bytes payload header, respectively). In the case of a 2-byte payload header, the length indicator is extended by four bits into the next byte. The remaining four bits of the second byte are reserved for future use and shall be set to zero.
46 Payload Header (Data Field) L_CH 00 Undefined 01 Continue of an L2CAP message 10 Start of an L2CAP message 11 LMP message FLOW Flow control at the L2CAP level (1 if L_CH=11) Set by LM No real-time requirements (real-time flow control at packet level is carried out via the FLOW bit in the packet header)
47 CRC The 16-bit CRC code is generated by the CRC- CCITT polynomial (octal representation). Before determining the CRC code, an 8-bit value is used to initialize the CRC generator. For the CRC code in the FHS packets sent in master page response state, the UAP of the slave is used. For the FHS packet sent in inquiry response state, the DCI (all-zero) is used. For all other packets, the UAP of the master is used.
48 Packet Types (1) It is the responsibility of LM to monitor the quality and reliability of the link and decide what packet types to use at any given time. LMP_max_slot_req LMP_accepted, LMP_not_accepted Single-slot packet is used by default. Asymmetric bandwidth different packet type in different transmission directions
49
50 Packet Types (2) Segment 1 (NULL, POLL, FHS, DM1): reserved for the four control packets common to all physical link types. Segment 2 (HV1-3, DV, DH, AUX1): reserved for packets occupying a single time slot. Segment 3 (DM3, DH3): reserved for packets occupying three time slots. ACL defined only. Segment 4 (DM5, DH5): reserved for packets occupying five time slots. ACL defined only.
51 Common Packet Types ID packet NULL packet POLL packet FHS packet DM1 packet
52 ID Packet The identity (ID) packet consists of the device access code (DAC) or inquiry access code (IAC). It has a fixed length of 68 bits. It is a very robust packet since the only info it carries is the access code of the sender.
53 NULL Packet The NULL packet has no payload and therefore consists of the channel access code and packet header only. Its total (fixed) length is 126 bits. The NULL packet is used to return link information to the source regarding the success of the previous transmission (ARQN), or the status of the RX buffer (FLOW).
54 POLL Packet Similar to the NULL packet does not have a payload In contrast to the NULL packet requires a confirmation from the recipient Used by the master in a piconet to check the presence of the slaves, which must then respond even if they do not have information to send. The return packet is an implicit acknowledgement of the POLL packet. The POLL packet does not affect the ARQN and SEQN fields.
55 FHS Packet (1) A special control packet revealing, among other things, the Bluetooth device address and the clock of the sender. The payload contains 144 information bits plus a 16- bit CRC code. The payload is coded with a rate 2/3 FEC which brings the gross payload length to 240 bits. Used in page master response, inquiry response and in master slave switch. The payload consists of 11 fields.
56 FHS Packet (2) BCH Parity Word
57 FHS Packet (3)
58
59 FHS Packet (5)
60 FHS Packet (6)
61 DM1 Packet Data Medium rate DM1 serves as part of segment 1 in order to support control messages in any link type. However, it can also carry regular user data. Since the DM1 packet is recognized on the SCO link, it can interrupt the synchronous information to send control information.
62 SCO Packets Typically used for 64kb/s speech transmission HV1 packet HV2 packet HV3 packet DV packet
63 HV1 Packet High-quality Voice The HV1 packet carries 10 information bytes. The bytes are protected with a rate 1/3 FEC. Payload length is fixed at 240 bits. No CRC. No payload header. A HV1 packet can carry 1.25ms of speech at a 64 kb/s rate. In that case, an HV1 packet has to be sent every two time slots (T SCO =2).
64 HV2 Packet The HV2 packet carries 20 information bytes protected with a rate 2/3 FEC. The payload length is fixed at 240 bits. No payload header, No CRC. If the HV2 packet is used for voice at a 64 kb/s rate, it can carry 2.5ms of speech. In that case, an HV2 packet has to be sent every four time slots (T SCO =4).
65 HV3 Packet The HV3 packet carries 30 information bytes. The bytes are not protected by FEC. The payload length is fixed at 240 bits. No CRC. No payload header. If the HV3 packet is used for voice at a 64 kb/s rate, it can carry 3.75ms of speech. In that case, an HV3 packet has to be sent every six time slots (T SCO =6).
66 DV Packet (1) The DV packet is a combined data-voice packet. The payload is divided into a voice field of 80 bits and a data field containing up to 150 bits. The voice field is not protected by FEC. The data field contains up to 10 infor-mation bytes (including the 1-byte payload header) and includes a 16-bit CRC. The data field is encoded with a rate 2/3 FEC. The voice field is handled like normal SCO data and is never retransmitted; that is, the voice field is always new. The data field is checked for errors and is retransmitted if necessary.
67 DV Packet (2)
68 ACL Packets DM1 packet DH1 packet DM3 packet DH3 packet DM5 packet DH5 packet AUX1 packet
69 DM1 Packet The DM1 packet is a packet that carries data information only. The payload contains up to 18 information bytes (including the 1-byte payload header) plus a 16-bit CRC code. The DM1 packet may cover up to a single time slot. The information plus CRC bits are coded with a rate 2/3 FEC which adds 5 parity bits to every 10-bit segment. If necessary,extra zeros are appended after the CRC bits to get the total number of bits(information bits, CRC bits, and tail bits) equal a multiple of 10. The payload header in the DM1 packet is only 1 byte long. The length indicator in the payload header specifies the number of user bytes(excluding payload header and the CRC code).
70 DH1 Packet This packet is similar to the DM1 packet, except that the information in the pay-load is not FEC encoded. DH1 packet can carry up to 28 information bytes plus a 16-bit CRC code. The DH1 packet may cover up to a single time slot.
71 DM3 Packet The DM3 packet is a DM1 packet with an extended payload. The DM3 packet may cover up to three time slots. The payload contains up to 123 information bytes (including the 2-bytes payload header) plus a 16-bit CRC code. The payload header in the DM3 packet is 2 bytes long, The length indicator in the payload header specifies the number of user bytes (excluding payload header and the CRC code). When a DM3 packet is sent or received, the RF hop frequency shall not change for a duration of three time slots (the first time slot being the slot where the channel access code was transmitted).
72 DH3 Packet This packet is similar to the DM3 packet, except that the information in the pay-load is not FEC encoded. DH3 packet can carry up to 185 information bytes (including the two bytes payload header) plus a 16-bit CRC code. The DH3 packet may cover three time slots. When a DH3 packet is sent or received, the hop frequency shall not change for a duration of three time slots (the first time slot being the slot where the channel access code was transmitted).
73 DM5 Packet The DM5 packet is a DM1 packet with an extended payload. The DM5 packet may cover up to five time slots. The payload contains up to 226 information bytes (including the 2-bytes payload header) plus a 16-bit CRC code. The pay-load header in the DM5 packet is 2 bytes long. The length indicator in the pay-load header specifies the number of user bytes (excluding payload header and the CRC code). When a DM5 packet is sent or received, the hop frequency shall not change for a duration of five time slots (the first time slot being the slot where the channel access code was transmitted).
74 DH5 Packet This packet is similar to the DM5 packet, except that the information in the pay-load is not FEC encoded. DH5 packet can carry up to 341 information bytes (including the two bytes payload header) plus a 16-bit CRC code. The DH5 packet may cover five time slots. When a DH5 packet is sent or received, the hop frequency shall not change for a duration of five time slots (the first time slot being the slot where the channel access code was transmitted).
75 AUX1 Packet This packet resembles a DH1 packet but has no CRC code. The AUX1 packet can carry up to 30 information bytes (including the 1-byte payload header). The AUX1 packet may cover up to a single time slot.
76 Packet Summary (1)
77 Packet Summary (2)
78 ISM Overhead ACL data packets 142 non-data bits (72b access code, 54b packet header, 16b CRC) DH5 packets in asymmetric transmission 5 slots 339 bytes = 2712 bits of data = 2854 bits transmitted in total 2712 bits / (6 * 625µs) = kb/s < 1Mb/s Necessary overhead to provide a robust link over the ISM band.
79 More Calculations DH5 Asymmetric (DH5, DH1) 339 bytes / (6 * 625µs) = kb/s 27 bytes / (6 * 625µs) = 57.6 kb/s DH5 Symmetric (DH5, DH5) 339 bytes / (10 * 625µs) = kb/s
80 Packet Summary (3)
81 Logic Channels LC (Link Control) Carried out via the packet header LM (Link Manager) Typically carried by DM0 type packets with L_CH=11 DM1 is common to SCO and ACL, allowing LMP messages to be carried over an active SCO link UA / UI (User Asynchronous) Carried by ACL payload US (User Synchronous) Carried by SCO payload
82 Synchronization (1) TX Slot RX Slot Correlator open RX Timeout T Match
83 Synchronization (2) Start of packet header T Match + 1 µs for 68b access code T Match + 5 µs for 72b access code (with trailer) Offset from the Master = T Match - 68µs The updated CLKE and sub-slot count are applied immediately.
84 Link Control Chingwei Yeh 2001/9/10
85 Outline Link Control Protocol Link Controller States and Operations Master / Slave Role Switching Low-power Operation
86 Link Control Protocol Carried in the LC channel Responsible for maintaining a link once it has been set up
87 ARQN ARQN=0: previous receive failed Access code failure A Slave fails to detect an access code (not possible) A Master fails to detect an access code Header failure Slave side: an access code is detected but HEC fails (not possible due to corrupted AM_ADDR) Master side: an access code is detected but HEC fails Payload failure An access code is detected but CRC fails The usual reason for re-transmission during connection
88 SEQN SEQN Toggled each time a new packet with a CRC is transmitted Remains the same otherwise Used to differentiate receiver NAK d the previous packet transmitter failed to receive the receiver s ACK Same SEQN packet ignored, but ACK returned
89 ARQ/SEQ under Broadcast ARQ scheme is not applicable Re-transmit broadcast packets a specified number of times (N BC ) Each new broadcast packet in a sequence is identified by toggling SEQN Spec 1.0B resets SEQN upon each start of LMP and L2CAP?!
90 Link Controller States Standby Inquiry Inquiry Scan Page Page Scan Connection Active, Hold, Sniff, Park In Standby, Hold, Park the device may be driven by a LPO with ±250ppm.
91 Inquiry and Inquiry Scan
92 Inquiry (1) To discover all Bluetooth enabled devices in its local area Baseband end of the Service Discovery Protocol (SDP) May be initiated one-shot or periodically (HCI_Periodic_Inquiry_Mode) Inquired upon devices supply FHS CLKN, BD_ADDR, etc
93 Inquiry (2) A device in the inquiry substate does not acknowledge the inquiry response. It just keeps probing at different hop channels and in between listens for response packets. Stops when Instructed inquiryto
94 What to Inquire No knowledge of the environment No BD_ADDR, CLK, etc Both the inquirer and inquiry scanner uses the same hopping sequence determined by GIAC LAP Still can not communicate even the same hopping sequence is used
95 Inquiry Objective Objective: to capture the scanners as quickly as possible. Only need to match the frequency for one slot pair to allow information retrieval. Basic Concept Use the same hopping sequence The inquirer hops fast The inquiry scanners hop slow Eventually they will meet
96 The Hop of the Inquirer GIAC+CLKN(inquirer) the hopping sequence for inquiry. A train of identical GIACs at different hopping frequencies Frequencies in the train is designed to surround a central frequency Although it seems alright to use any sequence through the spectrum, the spec. aligned the inquiry sequence to that of the page.
97 Inquirer Fast Hopping TX transmits on two different hop frequencies. RX listens on two different hop frequencies. ID packet (68bits) (uncertainty) = 224.5us to switch the freq. synthesizer.
98 Inquiry Trains (1) A train of identical GIACs at different hopping frequencies. Frequencies in the train is designed to surround a central frequency The central frequency is determined by the hopping sequence. The hopping sequence is determined by the general inquiry address GIAC LAP + 4 LSBs of the DCI (pp. 137, pp. 54)
99 Inquiry Trains (2)
100 Inquiry Train A 16 different hop frequencies in 16 slots (10 ms) Train A f(k-8), f(k-7),,f(k),,f(k+7) Covers 8x1.28s to 7x1.28s deviation from CLKN(inquirer) 16 * 625µs = 10ms f(k) is one frequency in the hopping sequence, which is determined by CLKN (CLKN ) (changed every 1.28s, regardless of N inquiry 256)
101 Inquiry Train B 16 different hop frequencies in 16 slots (10 ms) Train B f(k-16), f(k-15),,f(k-9),f(k+8),f(k+15) Covers drifts from CLKN that are Less than 8*1.28s More than 7*1.28s f(k) is one frequency in the hopping sequence, which is determined by CLKN (CLKN ) (changed every 1.28s, regardless of N inquiry 256)
102 Inquiry Train Usage (1) N inquiry of train A N inquiry of train B N inquiry of train A N inquiry of train B (three train switches) N inquiry 256 Alternately use train A and B until A response is received inquiryto is exceeded
103 Inquiry Train Usage (2) Train A and B Each train is repeated at least N inquiry 256 times At least three train switches must be taken place So, inquiry substate lasts for at least 256*10ms*4=10.24s If inquiry is activated periodically, the interval between two inquiry instances must be determined randomly (avoiding inquiry synchrony, HCI_Periodic_Inquiry_Mode )
104 Inquiry Train Illustration 128*(16*625us)=1.28s 128 TA 128 TA 128 TB 128 TB 128 TA. 128TB N inquiry (=256) 3 train switches, 4*256*10ms = 10.24s 16*625us = 10ms
105 Entering Inquiry Inquiry can be entered from STANDBY CONNECTION Entering from connection Hold or Park ACL Interrupted by SCO increase scan window
106 Inquiry Scan (1) A device wanting to be discovered could conduct an inquiry scan until it has responded to an inquiry, then do a mandatory page scan. If that doesn t result in a connection, go back into inquiry scan. Battery, radio receiver power consumption Continuous scanning would cause existing connections to timeout So, scan in short bursts! Short bursts (18 slots,11.25ms), short interval ( 2.56s)
107 Inquiry Scan (2) Hop sequence is determined by GIAC. The phase is determined by CLKN of the scanner. Scan at a single hop frequency in 1.28s Hops every 1.28s Listen to GIAC/DIAC for at least 18 slots in T scan interval ( 2.56s in spec, and stay in discoverable mode for at least 30.72s
108 Entering Inquiry Scan Inquiry scan can be entered from STANDBY CONNECTION Entering from connection Hold or Park ACL Interrupted by SCO increase scan window
109 Inquiry Scan with SCO One SCO link(hv3, T SCO = 6 slots) T w inquiry scan at least 36 slots(22.5ms) Two SCO link(hv3, T SCO = 6 slots) T w inquiry scan at least 54 slots(33.75ms) The inquiry scan interval shall be at most 2.56s
110 SCO During Inquiry Scan = 50% waste if one SCO in every 3 slot pairs Correlator Opens For inquiry scan ±10us ID 625us Ratio Settle Time 150us 200us 366us FHS 2x625us Correlator Opens For inquiry scan RX Inquiry Scan Slot Pair Starts TX SCO Slot Pair Starts
111 Inquiry Response (1) Only slave responds (with FHS packet) Multiple devices may respond at the same time collision!
112 Inquiry Response (2) Response steps (to avoid collision) Received inquiry message RAND 0~1023 Memorize the phase in the hopping sequence Return to CONNECTION or STANDBY for at least RAND time slots inqrespto counter starts Listen for inquiry message with inqrespto, and if correctly received Return FHS (Master collects information now) Phase++ Return to inquiry scan
113 Inquiry Response (3) In 1.28s, the slave responds 4 times in average. (1.28s/625µs)/(RAND/2)=4
114 Page and Page Scan
115 Page To establish a connection, the Master is instructed by the application to carry out the paging procedure. Using the Slave s access code and timing information gathered previously. FHS packets in-between
116 What to Page The Master knows the device BD_ADDR (DAC) CLKE Need to make CLKE as precise as possible Both the pager and page scanner use the same hopping sequence determined by DAC LAP Still may not communicate properly even the same hopping sequence is used
117 Page Objective Objective: to capture the offset of phase as quickly as possible. Basic Concept Use the same hopping sequence (DAC) The pager hops fast The page scanner hops slow Eventually they will meet
118 The Hop of the Pager DAC+CLKE(pager) the hopping sequence for inquiry. A train of identical DACs at different hopping frequencies Frequencies in the train is designed to surround a central frequency CLKE(pager) Last encounter with the Slave (e.g., the previous inquiry)
119 Pager Fast Hopping TX transmits on two different hop frequencies. RX listens on two different hop frequencies. ID packet (68bits) (uncertainty) = 224.5us to switch the freq. synthesizer.
120 Paging Trains (1) A train of identical DACs at different hopping frequencies. Frequencies in the train is designed to surround a central frequency The central frequency is determined by the hopping sequence. The hopping sequence is determined by the DAC
121 Paging Trains (2)
122 Paging Train A 16 different hop frequencies in 16 slots (10 ms) Train A f(k-8), f(k-7),,f(k),,f(k+7) Covers 8*1.28s to 7*1.28s deviation from 16 * 625µs = 10ms CLKE(pager) f(k) is one frequency in the hopping sequence, which is determined by CLKE (pager) (CLKE (pager) in half-hop systems) Phase changed every 1.28s, regardless of N page
123 Paging Train B 16 different hop frequencies in 16 slots (10 ms) Train B f(k-16), f(k-15),,f(k-9),f(k+8),f(k+15) Covers drifts from CLKE(pager) that are Less than 8*1.28s More than 7*1.28s f(k) is one frequency in the hopping sequence, which is determined by CLKE (pager) (CLKE (pager) in half-hop systems) Phase changed every 1.28s, regardless of N page
124 Paging Train A & B Usage N page of train A N page of train B. Alternately use train A and B until Receive a response pageto is exceeded
125 Paging Train Illustration 128*(16*625us)=1.28s 128 TA 128TA 128 TB 128 TB 128 TA. 128TB N page (=256) (N page can be 1, 128, 256) Alternately use train A and B until a response is received or pageto 16*625us = 10ms
126 Page Modes R0: N page 1 (16 slots,16 slots ) Continuous, T w page scan = T page scan R1: N page 128 Once in a while T w page scan 18 slots T page scan 1.28s R2: N page 256.
127 Entering Page Page from STANDBY CONNECTION Entering from connection Hold or Park ACL Interrupted by SCO increase scan window
128 Paging with SCO (1)
129 Paging with SCO (2)
130 Paging Scheme Mandatory paging scheme First met Paging directly following inquiry Optional paging/scanning scheme After the mandatory scheme
131 Page Scan (1) Like inquiry scan, a device may enter page scan periodically to allow connection with it. When page scan completes, the Slave updates CLK, sync word, and access code before entering the connection state.
132 Page Scan (2) Can be entered from STANDBY CONNECTION Entering from connection Hold or Park ACL Interrupted by SCO increase scan window
133 Page Scan (3) Listen for its DAC for T w page scan 18 slots T page scan determined by SR (scan repetition) Hop sequence determined by the Slave s BD_ADDR. Phase in the hopping sequence is determined by CLKE (pager) (CLKE (pager) in half-hop systems) Phase changed every 1.28s, regardless of N page
134 Page Scan Repetition (SR) SR field in the FHS packet The paging unit must choose R0, R1, or R2 accordingly.
135 Page / Page Scan Modes R0: N page 1 (16 slots,16 slots ) Continuous, T w page scan = T page scan R1: N page 128 Once in a while T w page scan 18 slots T page scan 1.28s R2: N page 256.
136 Page Scan with SCO One SCO link(hv3, T SCO = 6 slots) T w page scan at least 36 slots(22.5ms) Two SCO link(hv3, T SCO = 6 slots) T w page scan at least 54 slots(33.75ms)
137 Page Response Procedure (1)
138 Page Response Procedure (2)
139 Page Response Procedure (3)
140 Slave Response The X input to hop sequence generator is fixed at CLKN The Slave awaits FHS within pagerespto Within pagerespto, the Slave advances to the next phase every 1.25ms to match with the Master s next paging frequency. After pagerespto Page scan for one additional scan period, if not successful, return to the state prior to page scan.
141 Master Response FHS packet Real-time Bluetooth clock (26 MSBs only), Master s BD_ADDR, BCH parity bits, etc (all information to construct the channel access code without requiring a math derivation from the Master s BD_ADDR) Repeat FHS with updated phase until either successful or pagerespto If failed, report to LM
142 Connection Confirmation On entry, both devices move to the pager s hop sequence. To verify the success of the link set-up The Master transmits a POLL packet which the Slave must respond (typically with NULL). Both ARQN=NAK (still a response!). If everything goes well Master transmits and starts ARQ, SEQ for real. LMP configuration starts. Master/Slave role switch can proceed, if desired.
143 Connection Time-out When both the Master and Slave switches to the Master s normal hopping sequence, newconnectionto (in terms of #slots) is ticked. If after newconnectionto, either POLL is not received by the Slave POLL response is not received by the Master then connection is regarded failed, and both return to the page and page scan states
144 Synchronization the Slave The Slave stays synchronized to the Master during a connection by correlating against the Master s access code (CAC) in each packet the Mater transmits, even if it s not destined for that Slave. If AM_ADDR does not match abort the remainder of the reception, and use packet type field to reduce power consumption for the duration of Master s transmission any device in connection state may move into Low Power mode as described above
145 Synchronization the Master The Master must keep transmitting periodically, even if there is no data to send. A NULL packet is usually used for this purpose.
146 Connection Active, Hold, Sniff, Park
147 Connection Modes Active Low-power Hold: Allows device to be inactive for a single short period. Sniff: Allows devices to be inactive except for periodic sniff slots. Park: Similar to Sniff, except parked devices give up their active member addresses.
148 Connection Active The Master schedules transmission based on traffic demands to and from different slaves. Constant Master transmission to keep synchronization (channel access code). If an active slave is not addressed, it may sleep until the next master transmission. Type of packet the number of slots
149 Connection Hold (1) A device ceases to support ACL for a negotiated period of time to free up bandwidth for other operations like Scanning, paging, inquiry. SCO is not affected. AM_ADDR is maintained. Re-synchronizes to CAC after holdto.
150 Connection Hold (2) HCI_Hold_Mode Connection Handle, Max/Min hold periods HCI_Write_Hold_Mode_Activity LMP_hold_req (1st or refresh) LMP_accepted, LMP_not_accepted LMP_hold_req (negotiating different parameters) LMP_hold (after the 1st hold)
151 Connection Sniff (1) The Slave is given a pre-defined slot time and periodicity to listen for traffic. The Master can only transmit at the specified time slots. Starting at every D sniff instant, repeat for N sniff attempt times. Master CLKN[27:1] mod T sniff = D sniff Master (CLKN[27], CLKN[26:1]) mod T Sniff = D sniff Received Master s call(s) within N sniff attempt continues listening for Sniff_Timeout
152 Connection Sniff (2) HCI_Sniff_Mode Connection_Handle, Max/Min Sniff periods Sniff_attempt, Sniff_Timeout LMP_sniff_req LMP_accepted, LMP_not_accepted LMP_sniff_req (negotiating sniff parameters) LMP_sniff HCI_Exit_Sniff_Mode, LMP_unsniff_req
153 Connection Park Similar to Sniff, but the Slave gives up its AM_ADDR. Cannot transmit Cannot be addressed directly by the Master The Slave only needs to wake up at a defined Beacon instant to listen for broadcasts to synchronize.
154 Park Mode Purpose Low Power To accommodate more than 7 slaves Parked Slaves still synchronized to the channel Give up AM_ADDR and receive PM_ADDR [8] (Parked Member Address) AR_ADDR [8] (Access Request Address) Park only one slave at a time All messages sent to the parked Slaves must be carried by broadcast packets.
155 Beacon Instants and Slots (1) Transmission for synchronization of the parked devices Carrying messages to the parked devices to change the beacon parameters Carrying general broadcast messages to the parked devices Unparking of one or more parked devices
156 Beacon Instants and Slots (2) N B and T B are chosen so that there are sufficient beacon slots for a parked slave to synchronize. The Slave receives beacon parameters through an LMP command. CLK 27-1 mod T B = D B for initialization 1 (CLK 27, CLK 26-1 ) mode T B = D B for initialization 2 Any packet can be used for synchronization May be interrupted by SCO link
157 Beacon Access Window (1) Parked slaves send requests to be unparked Fixed delay D access after beacon instant Repeat M access times
158 Beacon Access Window (2) Parked Slaves can only respond if the Master has broadcast in the preceding even slot. Polling Wait for the Master to broadcast an unpark message.
159 Beacon Access Window (3)
160 Sleeping Through Beacon Slots Sleep window = N B_sleep * T B
161 Park Mode Addressing Master initiated unpark uses PM_ADDR BD_ADDR (All zero PM_ADDR is reserved for those that can only be unparked by BD_ADDR) Slave initiated unpark uses AR_ADDR
162 Entering Park Mode HCI_Park_Mode Connection_Handle, Max/Min interval between beacon slots LMP_park_req (a whole lot of parameters, see the spec) LMP_park, LMP_accepted, LMP_not_accepted LMP_set_broadcast_scan_window, LMP_modify_beacon
163 Master-Activated Unparking HCI_Exit_Park_Mode w/ connection handle. LMP_unpark broadcast in a beacon slot PM_ADDR or BD_ADDR A new AM_ADDR The Slave receives the unpark message returns to active mode. The Master POLLs with the new AM_ADDR. LMP_accepted to confirm the Slave has been unparked. newconnectionto Master : unpark the slave in the next beacon slot Slave : return to park with the same beacon parameters
164 Slave-Activated Unparking (1) Send an access request message in the access window only when a broadcast packet has been received. The message is an ID packet with Master s DAC Listen for Master s unpark message. If not, try in the next access window (total: M access windows). After the last access window, the Slave shall listen for N POLL slots for the unpark message. Fail sleep until the next beacon instant.
165 Slave-Activated Unparking (2) Unpark message received The Slave listens for POLL with its AM_ADDR, and then responds. If the Master did not receive response after N POLL + newconnectionto Master : send unpark message again Slave : return to park with the same beacon parameter
166 Polling Schemes Polling in active mode ACL: A slave is allowed to transmit in a slot only if it was addressed by the preceding slot. SCO: A slave is allowd to transmit unless the (valid) AM_ADDR in the preceding slot indicates a different slave. Polling in park mode A slave can only respond after a broadcast packet is received in the preceding slot.
167 Broadcast Scheme All-zero AM_ADDR New broadcast message shall start with the flush indication(l_ch=10) Never acknowledged no traffic at the beacon event broadcast packets shall be sent.
168 Scatternet Each piconet has their own channel hopping sequence and phase as determined by the respective Master. The packets are preceded by different channel access codes.
169 Inter-Piconet Communications ACL only Hold or park the current piconet connection, then Join the other piconet by changing channel parameters. Sniff mode : in between the sniff slots SCO In the non-reserved slots Four slots in between, two for misalignment Regular updates is necessary as the clocks of various piconets drift independently.
170 Master-Slave Switch Happens when slave wants to be a Master Redefinition of the piconet New piconet parameter
171 Master-Slave Switch Process (1) Slave A and master B agree to exchange roles (LMP) When confirmed, A & B do the TDD switch but keep the former hopping sequence. A now becomes the Master of the piconet
172 Master-Slave Switch Process (2) A now becomes the Master of the piconet The 1.25ms resolution in FHS is not enough to align the slot boundary A sends LMP packet giving the delay of the old and new master-to-slave slots (0 to 1249µs, resolution=1µs) After LMP time alignment, A sends FHS including the new AM_ADDR to B, still using the old piconet parameters After ACK (ID) by B, both A & B switch to the new channel parameters of the new piconet.
173 Master-Slave Switch Process (3) A piconet switch is enforced on each Slave separately. For each Slave, A sends a time alignment and FHS packets using old parameters. Upon ACK (ID), the Slave switches to the new parameters. The FHS sent to each Salve has the old AM_ADDR in the FHS packet header and their new AM_ADDR in the FHS packet payload. A polls each Slave to verify the swtich within newconnectionto. Repeat if verification failed.
174 Link Supervision Break down Out of range Power failure Supervision Timer (Master, Slave, SCO, ACL) Reset when access code & HEC & correct AM_ADDR is received supervisionto negotiated at LM level, longer than hold and sniff period Connection is reset when supervisionto expires
175 Link Controller States Revisited Major states Standby Connection Substates Page Page scan Inquiry Inquiry scan Master response Slave response Inquiry response
176 Complicated Context Switching The previous figure represents only the state of one link between two devices at any one time. A Master may be in connection with one Slave while simultaneously inquiring, paging, and scanning several other devices. Inquiry/paging may last for several seconds
177 HW/SW Partitioning Needs a unique context for the LC protocol, ARQN, SEQN, and re-transmit packets of an active interaction. The area of state control and link context management is at the sharp end of the hardware/software (HW/SW) partitioning problem.
178 Other Baseband Topics Left Hop Selection Algorithms Audio Error Corrections and Security Related Algorithms
BASEBAND SPECIFICATION
Core System Package [Controller volume] Part B BASEBAND SPECIFICATION This document describes the specification of the Bluetooth link controller which carries out the baseband protocols and other lowlevel
More informationUNIT 5 P.M.Arun Kumar, Assistant Professor, Department of IT, Sri Krishna College of Engineering and Technology, Coimbatore.
Communication Switching Techniques UNIT 5 P.M.Arun Kumar, Assistant Professor, Department of IT, Sri Krishna College of Engineering and Technology, Coimbatore. Bluetooth Techniques References 1. Wireless
More informationA Guide. Wireless Network Library Bluetooth
A Guide to the Wireless Network Library Conforming to Standard v1.1 SystemView by ELANIX Copyright 1994-2005, Eagleware Corporation All rights reserved. Eagleware-Elanix Corporation 3585 Engineering Drive,
More informationBluetooth: Short-range Wireless Communication
Bluetooth: Short-range Wireless Communication Wide variety of handheld devices Smartphone, palmtop, laptop Need compatible data communication interface Complicated cable/config. problem Short range wireless
More informationIntroduction to Bluetooth Wireless Technology
Introduction to Bluetooth Wireless Technology Jon Inouye Staff Software Engineer Mobile Platforms Group Intel Corporation Bluetooth Bluetooth is is a a trademark trademark owned owned by by Bluetooth Bluetooth
More informatione-pg Pathshala Quadrant 1 e-text
e-pg Pathshala Subject : Computer Science Module: Bluetooth Paper: Computer Networks Module No: CS/CN/37 Quadrant 1 e-text In our journey on networks, we are now exploring wireless networks. We looked
More informationSimulation of Bluetooth Network
Simulation of Bluetooth Network Lennart Lagerstedt Stockholm, 2003 Master of Science Thesis Project The Department of Microelectronics and Information Technology, Royal Institute of Technology (KTH) Lennart
More informationWireless Local Area Network. Internet Protocol Suite
Wireless Local Area Network Internet Protocol Suite Application layer File transfer protocol Telnet Hypertext transfer protocol Transport layer Network layer Host-tonetwork layer User datagram protocol
More informationCS4/MSc Computer Networking. Lecture 13: Personal Area Networks Bluetooth
CS4/MSc Computer Networking Lecture 13: Personal Area Networks Bluetooth Computer Networking, Copyright University of Edinburgh 2005 BlueTooth Low cost wireless connectivity for Personal Area Networks
More informationLocal Area Networks NETW 901
Local Area Networks NETW 901 Lecture 6 IEEE 802.15.1 - Bluetooth Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 The 802.15 Family Target environment: communication of personal
More informationWireless Sensor Networks
Wireless Sensor Networks 11th Lecture 29.11.2006 Christian Schindelhauer schindel@informatik.uni-freiburg.de 1 Bluetooth in WSN? There are several commercially available MAC protocol/products Wi-Fi Bluetooth
More informationObjectives of the Bluetooth Technology
Bluetooth Origin of the name Harald I Bleutooth (in Danish, Harald Blåtand) (b. c. 910 d. c. 987), king of Denmark was credited with the first unification of Denmark and Norway Ericsson, inspired on the
More informationAd Hoc Nets - MAC layer. Part II TDMA and Polling
Ad Hoc Nets - MAC layer Part II TDMA and Polling More MAC Layer protocols Bluetooth Piconet: a polling/tdma scheme Cluster TDMA: based on TDMA (with random access and reserved slots) research protocol
More informationCHAPTER 12 BLUETOOTH AND IEEE
CHAPTER 12 BLUETOOTH AND IEEE 802.15 These slides are made available to faculty in PowerPoint form. Slides can be freely added, modified, and deleted to suit student needs. They represent substantial work
More informationBluetooth Demystified
Bluetooth Demystified S-72.4210 Postgraduate Course in Radio Communications Er Liu liuer@cc.hut.fi -10 Content Outline Bluetooth History Bluetooth Market and Applications Bluetooth Protocol Stacks Radio
More informationRECOGNITION OF BLUETOOTH SIGNALS BASED ON FEATURE DETECTION
Facoltà di Ingegneria Tesi di Laurea Specialistica in Ingegneria delle Telecomunicazioni RECOGNITION OF BLUETOOTH SIGNALS BASED ON FEATURE DETECTION Candidato Stefano Boldrini Relatore Prof.ssa Maria-
More informationAmarjeet Singh. February 7, 2012
Amarjeet Singh February 7, 2012 References Bluetooth Protocol Architecture v.1 www.bluetooth.org http://www.tutorial-reports.com/wireless/bluetooth/ Slides from last class uploaded on the course website
More informationBluetooth. Renato Lo Cigno
Bluetooth Renato Lo Cigno www.dit.unitn.it/locigno/teaching ...Copyright Quest opera è protetta dalla licenza Creative Commons NoDerivs- NonCommercial. Per vedere una copia di questa licenza, consultare:
More informationImplementing A Bluetooth Stack on UEFI
Implementing A Bluetooth Stack on UEFI Tony C.S. Lo Senior Manager American Megatrends Inc. presented by UEFI Plugfest October 2014 Agenda Introduction Bluetooth Architecture UEFI Bluetooth Stack Summary
More information13 Wireless. Communications Using Bluetooth. Oge Marques and Nitish Barman CONTENTS
13 Wireless Communications Using Bluetooth Oge Marques and Nitish Barman CONTENTS 13.1 Introduction...308 13.2 Overview...309 13.2.1 Masters and Slaves...310 13.2.2 Frequency Hopping Spread Spectrum (FHSS)
More informationSolving the Interference Problem due to Wireless LAN for Bluetooth Transmission Using a Non- Collaborative Mechanism. Yun-Ming, Chiu 2005/6/09
Solving the Interference Problem due to Wireless LAN for Bluetooth Transmission Using a Non- Collaborative Mechanism Yun-Ming, Chiu 2005/6/09 Outline Overview Survey of Bluetooth Structure of Bluetooth
More informationDominique Chomienne & Michel Eftimakis NewLogic
Dominique Chomienne & Michel Eftimakis NewLogic Bluetooth is a trademark owned by the Bluetooth SIG, and licenced to NewLogic Page 1 Tutorial Agenda Bluetooth Marketing view Bluetooth network topology
More informationBy FaaDoOEngineers.com
ABSTRACT The seemingly endless entanglement of data wires connecting today s electronic devices has become slightly less jumbled with the introduction of Bluetooth technology and the creation of a wireless
More informationBluetooth. Bluetooth Radio
Bluetooth Bluetooth is an open wireless protocol stack for low-power, short-range wireless data communications between fixed and mobile devices, and can be used to create Personal Area Networks (PANs).
More informationBluetooth. Bluetooth. WPAN Technologies. HomeRF. Bluetooth. Claudio Casetti. Dipartimento di Elettronica Politecnico di Torino
Bluetooth Claudio Casetti Dipartimento di Elettronica Politecnico di Torino WPAN Technologies HomeRF Bluetooth Bluetooth A cable replacement technology 1 Mb/s symbol rate Range 10+ meters Single chip radio+baseband
More informationCommunication Systems. WPAN: Bluetooth. Page 1
Communication Systems WPAN: Bluetooth Page 1 Outline Historical perspective Piconet Scatternet Lattency modes Applications Page 2 Bluetooth Bluetooth (BT) wireless technology is a short-range communications
More informationBluetooth. Basic idea
Bluetooth Basic idea Universal radio interface for ad-hoc wireless connectivity Interconnecting computer and peripherals, handheld devices, DAs, cell phones replacement of IrDA Embedded in other devices,
More informationCS263: Wireless Communications and Sensor Networks
CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 6: Bluetooth and 802.15.4 October 12, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Bluetooth Standard for Personal Area
More informationBluetooth WPAN. Korea Electronics Technical Institute
Bluetooth WPAN 2001.3. 21 Korea Electronics Technical Institute What is WPAN? WPAN Load MAP(1) Data Rate 50 30 EHW-WPAN HR-WPAN 10 1 WPAN (BT ver. 2) WPAN (BT ver.1), ö Virtual Space 2000 2002 2003 2005
More information[A SHORT REPORT ON BLUETOOTH TECHNOLOGY]
2011 [A SHORT REPORT ON BLUETOOTH TECHNOLOGY] By Ram Kumar Bhandari 1. Introduction Bluetooth Technology A Technical Report Bluetooth is a short-ranged wire-less communication technology implementing the
More informationComputer Networks II Advanced Features (T )
Computer Networks II Advanced Features (T-110.5111) Bluetooth, PhD Assistant Professor DCS Research Group Based on slides previously done by Matti Siekkinen, reused with permission For classroom use only,
More informationEmbedded Systems. 8. Communication
Embedded Systems 8. Communication Lothar Thiele 8-1 Contents of Course 1. Embedded Systems Introduction 2. Software Introduction 7. System Components 10. Models 3. Real-Time Models 4. Periodic/Aperiodic
More informationSystem Level Analysis of the Bluetooth standard
System Level Analysis of the standard Massimo Conti, Daniele Moretti Università Politecnica delle Marche, via Brecce Bianche, I-60131, Ancona, Italy Abstract The SystemC modules of the Link Manager Layer
More informationInside Bluetooth. Host. Bluetooth. Module. Application RFCOMM SDP. Transport Interface. Transport Bus. Host Controller Interface
Inside Bluetooth Application Host Application Host Audio (SCO) RFCOMM SDP Data (ACL) Control API and Legacy Support Modules Bluetooth HCI Driver Transport Interface Physical I/F Transport Bus Bluetooth
More information12/2/09. Mobile and Ubiquitous Computing. Bluetooth Networking" George Roussos! Bluetooth Overview"
Mobile and Ubiquitous Computing Bluetooth Networking" George Roussos! g.roussos@dcs.bbk.ac.uk! Bluetooth Overview" A cable replacement technology! Operates in the unlicensed ISM band at 2.4 GHz! Frequency
More informationSIMULATION BASED ANALYSIS OF BLUETOOTH NETWORKS. M. Subramani and M. Ilyas
SIMULATION BASED ANALYSIS OF BLUETOOTH NETWORKS M. Subramani and M. Ilyas College of Engineering Florida Atlantic University Boca Raton, Florida 33431 {msubrama@cse.fau.edu, ilyas@fau.edu} Abstract Many
More informationMESHES AND CUBES: DISTRIBUTED SCATTERNET FORMATIONS FOR BLUETOOTH PERSONAL AREA NETWORKS
MESHES AND CUBES: DISTRIBUTED SCATTERNET FORMATIONS FOR BLUETOOTH PERSONAL AREA NETWORKS By ANIRUDDHA SHRIRAM DAPTARDAR A thesis submitted in partial fulfillment of the requirements for the degree of MASTER
More informationVNC Service on Bluetooth Wireless Network
University of New Orleans ScholarWorks@UNO University of New Orleans Theses and Dissertations Dissertations and Theses 8-7-2003 VNC Service on Bluetooth Wireless Network Rui Xia University of New Orleans
More informationMOBILE COMPUTING. Bluetooth 9/20/15. CSE 40814/60814 Fall Basic idea
OBILE COUTING CE 40814/60814 Fall 2015 Bluetooth Basic idea Universal radio interface for ad-hoc wireless connectivity Interconnecting computer and peripherals, handheld devices, DAs, cell phones replacement
More informationData Link Layer: Overview, operations
Data Link Layer: Overview, operations Chapter 3 1 Outlines 1. Data Link Layer Functions. Data Link Services 3. Framing 4. Error Detection/Correction. Flow Control 6. Medium Access 1 1. Data Link Layer
More informationDesign of Bluetooth Baseband Controller Using FPGA
Journal of the Korean Physical Society, Vol. 42, No. 2, February 2003, pp. 200 205 Design of Bluetooth Baseband Controller Using FPGA Sunhee Kim and Seungjun Lee CAD and VLSI Lab.,Department of Information
More informationA new BlueRing scatternet topology for Bluetooth with its formation, routing, and maintenance protocols
WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. 2003; 3:517 537 (DOI: 10.1002/wcm.130) A new BlueRing scatternet topology for Bluetooth with its formation, routing, and maintenance
More informationEfficient Multicast Schemes for Mobile Multiparty Gaming Applications
Efficient Multicast Schemes for Mobile Multiparty Gaming Applications P6-6th semester 2006 Group 681 - ComNet Aalborg University 9th March 2006 Institut for elektroniske systemer Fr. Bajers Vej 7 Telefon
More informationWireless Networked Systems
Wireless Networked Systems CS 795/895 - Spring 2013 Lec #7: Medium Access Control WPAN, Bluetooth, ZigBee Tamer Nadeem Dept. of Computer Science Bluetooth Page 2 Spring 2013 CS 795/895 - Wireless Networked
More informationRedes Inalámbricas Tema 2.B Wireless PANs: Bluetooth
Redes Inalámbricas Tema 2.B Wireless PANs: Bluetooth Bluetooh Acknowledgments: Foo Chun Choong, Ericsson Research / Cyberlab Singapore, and Open Source Software Lab, ECE Dept, NUS Máster de Ingeniería
More informationGuide to Wireless Communications, 3 rd Edition. Objectives
Guide to Wireless Communications, 3 rd Edition Chapter 5 Wireless Personal Area Networks Objectives Describe a wireless personal area network (WPAN) List the different WPAN standards and their applications
More informationIntroduction to Wireless Networking ECE 401WN Spring 2009
I. Overview of Bluetooth Introduction to Wireless Networking ECE 401WN Spring 2009 Lecture 6: Bluetooth and IEEE 802.15 Chapter 15 Bluetooth and IEEE 802.15 What is Bluetooth? An always-on, short-range
More informationENRNG3076 : Oral presentation BEng Computer and Communications Engineering
Jean Parrend ENRNG3076 : Oral presentation BEng Computer and Communications Engineering 1 Origin 2 Purpose : Create a cable replacement standard for personal area network Handle simultaneously both data
More informationTELEPHONY CONTROL PROTOCOL SPECIFICATION
Part F:3 TELEPHONY CONTROL PROTOCOL SPECIFICATION TCS Binary This document describes the Bluetooth Telephony Control protocol Specification Binary (TCS Binary), using a bit-oriented protocol. This protocol
More informationMOBILE COMPUTING. Jan-May,2012. ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala.
WPAN: Bluetooth MOBILE COMPUTING Jan-May,2012 ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala Email-alakroy.nerist@gmail.com EM Spectrum ISM band 902 928 Mhz 2.4 2.4835 Ghz 5.725 5.85 Ghz LF MF
More informationCROSS-LAYER APPROACHES TO WIRELESS COMMUNICATIONS AND NETWORKING
Proceedings of the 4th Annual ISC Research Symposium ISCRS 2010 April 21, 2010, Rolla, Missouri CROSS-LAYER APPROACHES TO WIRELESS COMMUNICATIONS AND NETWORKING Chaitri Aroskar caa279@mst.edu Y.R.Zheng
More informationInstitutionen för systemteknik Department of Electrical Engineering
Institutionen för systemteknik Department of Electrical Engineering Examensarbete Bluetooth Packet Reader in an OSE Environment Henrik Ekblad Tobias Gentzell LiTH-ISY-EX-3131 2001-02-22 Bluetooth Packet
More informationBluetooth. The Bluetooth Vision. Universal Wireless Connectivity. Universal Wireless Connectivity
1 2 The Vision Universal wireless connectivity Replace existing cables with radio Connect systems that have been separate Ubiquitous computing environment Intelligent devices performing distributed services
More informationWireless LANs & PANs Case Study: Bluetooth & IEEE W.lan.4
Wireless LANs & PANs Case Study: Bluetooth & IEEE802.15 W.lan.4 Dr.M.Y.Wu@CSE Shanghai Jiaotong University Shanghai, China Dr.W.Shu@ECE University of New Mexico Albuquerque, NM, USA W.wan.4-2 PANs: Bluetooth
More informationLecture Computer Networks
Prof. Dr. H. P. Großmann mit M. Rabel sowie H. Hutschenreiter und T. Nau Sommersemester 2012 Institut für Organisation und Management von Informationssystemen Lecture Computer Networks Networks for Multimedia
More informationBluetooth Simulations for Wireless Sensor Networks using GTNetS
Bluetooth Simulations for Wireless Sensor Networks using GTNetS Xin Zhang, George F. Riley Department of ECE, Georgia Institute of Technology Atlanta, GA 30332-0250 {xinzhang, riley}@ece.gatech.edu Abstract
More informationPersonal Area Networking over Bluetooth
Personal Area Networking over Bluetooth Pravin Bhagwat Networking Research Group AT&T Labs - Research pravin@acm.org ACM Mobicom 2000 Half day tutorial Aug 06, 2000 Boston, MA Bluetooth A cable replacement
More informationSensor Application for Museum Guidance
Sensor Application for Museum Guidance Radka Dimitrova a a TU,Dresden, Germany, e-mail: dimitrova@ifn.et.tu-dresden.de Abstract - This article examines the conditions for successful communication and power
More informationLinks Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame
Links Reading: Chapter 2 CS 375: Computer Networks Thomas Bressoud 1 Goals of Todayʼs Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared
More informationLinks. CS125 - mylinks 1 1/22/14
Links 1 Goals of Today s Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared media Channel partitioning Taking turns Random access Shared
More informationBluetooth Enabled Ad-hoc Networks: Performance Evaluation of a Self-healing Scatternet Formation Protocol
Michigan Technological University Digital Commons @ Michigan Tech Dissertations, Master's Theses and Master's Reports - Open Dissertations, Master's Theses and Master's Reports 2004 Bluetooth Enabled Ad-hoc
More informationHOST CONTROLLER INTERFACE FUNCTIONAL SPECIFICATION
Part H:1 HOST CONTROLLER INTERFACE FUNCTIONAL SPECIFICATION This document describes the functional specification for the Host Controller Interface (HCI). The HCI provides a command interface to the baseband
More informationWPANs. 6.1 Introduction
6 WPANs 6.1 Introduction A PAN is a network solution that enhances our personal environment, either work or private, by networking a variety of personal and wearable devices within the space surrounding
More informationUniversitetet i Oslo Institutt for informatikk. Monitoring Bluetooth network topology. Cand Scient Thesis. Fredrik Borg
Universitetet i Oslo Institutt for informatikk Monitoring Bluetooth network topology Cand Scient Thesis Fredrik Borg February 1, 2002 II Foreword This thesis is a part of my cand.scient. degree in Communication
More informationExtending or Interconnecting LANS. Physical LAN segment. Virtual LAN. Forwarding Algorithm 11/9/15. segments. VLAN2, Port3. VLAN1, Port1.
Physical LAN segment q Hosts connected on the same physical LAN segment q Same subnet; L2 forwarding q ARP (IPè MAC) L2 frame (S, D), send q Scale? Extending or Interconnecting LANS q q q Why not just
More informationThe Bluetooth Radio System
Abstract A few years ago it was recognized that the vision of a truly low-cost, low-power radio-based cable replacement was feasible. Such a ubiquitous link would provide the basis for portable devices
More informationData Link Control Protocols
Protocols : Introduction to Data Communications Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 23 May 2012 Y12S1L07, Steve/Courses/2012/s1/its323/lectures/datalink.tex,
More informationWiMOD LR Base Host Controller Interface
WiMOD LR Base Host Controller Interface Specification Version 1.7 Document ID: 4100/40140/0062 IMST GmbH Carl-Friedrich-Gauß-Str. 2-4 47475 KAMP-LINTFORT GERMANY Introduction Document Information File
More informationAh-Hoc, PAN, WSN,... Introduction Bluetooth ( ) Zigbee ( ) Renato Lo Cigno
Ah-Hoc, PAN, WSN,... Introduction Bluetooth (802.15.1) Zigbee (802.15.4) Renato Lo Cigno www.dit.unitn.it/locigno/ Ad-Hoc Networks Built by the userse themselves to support specific (in time, space, applications)
More informationSENSOR-MAC CASE STUDY
SENSOR-MAC CASE STUDY Periodic Listen and Sleep Operations One of the S-MAC design objectives is to reduce energy consumption by avoiding idle listening. This is achieved by establishing low-duty-cycle
More informationMaster. Slave. Master. Slaves. TCP/IP Traffic with Efficient Bluetooth Technology. Shafqat Hameed 1, Umar F.Khan 2, *Muhammad Saleem 3
/ Traffic with Efficient Bluetooth Technology Shafqat Hameed 1, Umar F.Khan 2, *Muhammad Saleem 3 1,3 National University of Sciences and Technology (NUST), Pakistan 2 University of Bradford, Bradford,
More information2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING
UNIT-2 2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS 2.2.1 Pure ALOHA 2.2.2 Slotted ALOHA 2.2.3 Carrier Sense Multiple Access 2.2.4 CSMA with Collision Detection 2.2.5 Collision Free Protocols 2.2.5.1
More information10.1 SERIAL PORTS AND UARTS
RS- serial ports have nine circuits, which can be used for transferring data and signalling. can emulate the serial cable line settings and status of an RS- serial port. provides multiple concurrent connections
More informationStructure of the Lecture
Structure of the Lecture Chapter 2 Technical Basics: Layer 1 Methods for Medium Access: Layer 2 Chapter 3 Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Networks: GSM, GPRS, UMTS Satellites
More informationWireless Communications
4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:
More informationNETWORK FORMATION AND ROUTING FOR MULTI HOP WIRELESS AD HOC NETWORKS
NETWORK FORMATION AND ROUTING FOR MULTI HOP WIRELESS AD HOC NETWORKS A Dissertation Presented to The Academic Faculty By Xin Zhang In Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy
More informationWireless LANs. ITS 413 Internet Technologies and Applications
Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE
More informationON SECURITY OF BLUETOOTH WIRELESS SYSTEM. Pavel Kucera, Petr Fiedler, Zdenek Bradac, Ondrej Hyncica
ON SECURITY OF BLUETOOTH WIRELESS SYSTEM Pavel Kucera, Petr Fiedler, Zdenek Bradac, Ondrej Hyncica Brno University of Technology Faculty of Electrical Engineering and Communication Department of Control
More informationoriginal standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS
IEEE 802.11 The standard defines a wireless physical interface and the MAC layer while LLC layer is defined in 802.2. The standardization process, started in 1990, is still going on; some versions are:
More informationIMPLEMENTATION AND SECURITY OF BLUETOOTH TECHNOLOGY
Bachelor s Thesis (UAS) Information Technology Networking and Programming 2011 IDAHOSA AKHANOLU IMPLEMENTATION AND SECURITY OF BLUETOOTH TECHNOLOGY i BACHELOR S THESIS (UAS) ABSTRACT TURKU UNIVERSITY OF
More informationChapter 6 Digital Data Communications Techniques
Chapter 6 Digital Data Communications Techniques Asynchronous and Synchronous Transmission timing problems require a mechanism to synchronize the transmitter and receiver receiver samples stream at bit
More informationBluetooth. Quote of the Day. "I don't have to be careful, I've got a gun. -Homer Simpson. Stephen Carter March 19, 2002
Bluetooth Stephen Carter March 19, 2002 Quote of the Day "I don't have to be careful, I've got a gun. -Homer Simpson 1 About Bluetooth Developed by a group called Bluetooth Special Interest Group (SIG),
More informationData Link Layer. Goals of This Lecture. Engineering Questions. Outline of the Class
Data Link Layer Kuang Chiu Huang TCM NCKU Goals of This Lecture Through the lecture and in-class discussion, students are enabled to describe role and functions of the link layer, and compare different
More informationBluetooth. Acknowledgements. Based on Jochen Schiller slides. Supporting text
BT 1 Bluetooth FEUP PR BT 2 Acknowledgements Based on Jochen chiller slides upporting text» Jochen chiller, obile Comunications, Addison-Wesley» ection 7.5 Bluetooth BT 3 Bluetooth» Universal radio interface
More informationUSER MANUAL Free2move Configuration Software
USER MANUAL Free2move Configuration Software BLUETOOTH is a trademark owned by Bluetooth SIG, Inc., U.S.A. and licensed to Free2move FCC-B Radio Frequency Interference Statement This deceive has been tested
More informationBluetooth. Bluetooth Basics Bluetooth and Linux Bluetooth at AG Tech. Dr.-Ing. H. Ritter, 7.1
Bluetooth Bluetooth Basics Bluetooth and Linux Bluetooth at AG Tech Dr.-Ing. H. Ritter, http://www.hartmut-ritter.de/ 7.1 I. Bluetooth Idea Universal radio interface for ad-hoc wireless connectivity Interconnecting
More information101seminartopics.com. Bluetooth Based Smart Sensor Networks
Bluetooth Based Smart Sensor Networks ABSTRACT Dragging the world towards wireless galaxy Various sensors are already in a broad use today as part of different devices or as standalone devices connected
More informationFeasibility of a Bluetooth Based Structural Health Monitoring Telemetry System
Feasibility of a Bluetooth Based Structural Health Monitoring Telemetry System Item Type text; Proceedings Authors Uchil, Vilas; Kosbar, Kurt Publisher International Foundation for Telemetering Journal
More informationWiMOD LoRaWAN EndNode Modem HCI Specification
WiMOD LoRaWAN EndNode Modem HCI Specification Specification Version 1.13 Document ID: 4100/40140/0073 IMST GmbH Carl-Friedrich-Gauß-Str. 2-4 47475 KAMP-LINTFORT GERMANY Introduction Document Information
More informationWireless Personal Area Networks
CE 477 Wireless and obile Networks Wireless ersonal Area Networks Bluetooth CE 477 User cenarios Architecture rotocol tack IEEE 802.15.1 and IEEE 802.15.2 IEEE 802.15.4 (Low-Rate Wireless ersonal Area
More informationBlueCore TM 01. Summary. Returns information on bit errors to the host as those given for BIT ERR1.
Spec Name BIT ERR2 Enables the receiver with simplified hopping defined by Country Code with a choice of low or high side modulation (hi-side), and with a designated attenuation setting (RX Attenuation)
More informationComputer Communication III
Computer Communication III Wireless Media Access IEEE 802.11 Wireless LAN Advantages of Wireless LANs Using the license free ISM band at 2.4 GHz no complicated or expensive licenses necessary very cost
More informationImage acquisition and Communication
Image acquisition and Communication Developements around the ACME Fox Board E. Pamba Capo-ChiChi 1,2,G. Weisenhorn 1,J-M. Friedt 3,4 H. Guyennet 1,2 1 Department of Computer Science University of Franche-Comte
More informationA Routing Protocol and Energy Efficient Techniques in Bluetooth Scatternets
A Routing Protocol and Energy Efficient Techniques in Bluetooth Scatternets Balakrishna J. Prabhu and A. Chockalingam Department of Electrical Communication Engineering Indian Institute of Science, Bangalore
More informationImproving Simultaneous Voice and Data Performance in Bluetooth Systems
Improving Simultaneous Voice and Data Performance in Bluetooth Systems Abstract In the Bluetooth system, isochronous applications, such as voice and audio, are carried by Synchronous Connection Oriented
More informationMessage, Segment, Packet, and Frame Link-layer services Encoding, framing, error detection, transmission control Error correction and flow control
Links EE 122: Intro to Communication Networks Fall 2007 (WF 4-5:30 in Cory 277) Vern Paxson TAs: Lisa Fowler, Daniel Killebrew & Jorge Ortiz http://inst.eecs.berkeley.edu/~ee122/ Announcements Homework
More informationWiMOD LR Base Host Controller Interface
WiMOD LR Base Host Controller Interface Specification Version 1.10 Document ID: 4100/40140/0062 IMST GmbH Carl-Friedrich-Gauß-Str. 2-4 47475 KAMP-LINTFORT GERMANY Introduction Document Information File
More informationResearch Article Sensor Protocol for Roaming Bluetooth Multiagent Systems
Hindawi Publishing Corporation International Journal of Distributed Sensor Networks Volume 2013, Article ID 963508, 7 pages http://dx.doi.org/10.1155/2013/963508 Research Article Sensor Protocol for Roaming
More informationWIRELESS TECHNOLOGIES
WIRELESS TECHNOLOGIES Bluetooth, ZigBee and ANT Thomas Aasebø OVERVIEW What are wireless sensor networks? What are personal area networks? What are these networks typically used for? Bluetooth, ZigBee
More informationPCs Closed! Cell Phones Off! Marketing Assistant Manager - Magic Lin
Bluetooth solution PCs Closed! Cell Phones Off! Marketing Assistant Manager - Magic Lin 林 lin.magic@tw.anritsu.com 0933-710-634 v.9 群 1 Bluetooth Core System Architecture 2 Bluetooth Core System Architecture_2
More information