Bluetooth in Mobile Devices

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Bluetooth in Mobile Devices"

Transcription

1 Bluetooth in Mobile Devices Vidar Rinne Mälardalen University School of Innovation, Design and Engineering Computer Science: Game Development Abstract The basic idea of Bluetooth was to replace cables with a wireless technology that was both cheap and energy efficient. Today, Bluetooth has become a standard and is used in many electronic devices, especially mobile devices like mobile phones, headsets, PDAs etc. more than anyone could ever imagine at the time of its early days. How could a basic idea of just cutting the cables become a worldwide standard? How did Bluetooth outperform its competitors? In this overview paper, we answers these questions and explain the basics of Bluetooth technology including features, security, protocol stack and layers, limitations and performance. We also cover how the technique has been developed until today, how it is expected to be in near future, how it weighs against WLAN, Zigbee and how Bluetooth outperformed IrDA. Keywords Bluetooth, wireless communication, security, profiles, protocol stack, application layers, Special Interest Group, SIG, WLAN, Zigbee. 1 Introduction Bluetooth has become important for communication between mobile devices because of its low cost, both in terms of money, power usage and that it has no need of cables [1; chapter 4.6, pp ]. The need of cables for connection between mobile devices would not be an option in the long run. An early alternative solution for wireless communication was Infrared Data Association (IrDA), but because of its very limited range and easily breakable connection such as a piece of paper between the devices would kill the link, IrDA was Mattias Andersson Mälardalen University School of Innovation, Design and Engineering Mecatronic not an option [3; chapter 9, pp ], [4; chapter 9, pp ]. Today, Bluetooth is a standard for wireless communication and is widely used. Nowadays, it is difficult to find a mobile phone without Bluetooth. The Bluetooth saga began in 1994 when engineers at Telefonaktiobolaget LM Ericsson, later on Ericsson and now Sony Ericsson, realized that within a short period, it would be necessary with a standard for low cost and low energy wireless communication between mobile devices, especially between mobile phone and its headset, which will be used as a cable replacement. The plan was to use the unlicensed frequency band (2.4 to 2.48 GHz in this case). In the year of 1997, Ericsson decided it was better if more companies used the technology, otherwise, the technology would probably not survive, and therefore, Ericsson began conversations with other companies. One year later, the Bluetooth Special Interest Group (SIG) was founded. SIG was in cooperation with several large companies such as Ericsson, Intel Corporation, IBM, Nokia Corporation and Toshiba Corporation. The Bluetooth SIG released the first version of Bluetooth, Bluetooth v1.0, in July After the release of the specification, the interest among other companies raised and in December, four more promoters (3Com, Lucent Technologies, Microsoft and Motorola) joined the group. In the first year of the new millennium, the first Bluetooth products came out to the market. In the same year, the Bluetooth technology was wide spread and thousands of other companies joined the Bluetooth SIG [1; chapter 4.6, pp ], [3; chapter 1, pp.5 8], [4; chapter 2, pp.18 25]. Bluetooth v1.0 had some limitations, a few of the most important changes made until today were in general improvements of data rate and security but 1

2 also the software layers to improve usability [4; chapter 10, pp.218], [5a]. In this paper, we will cover the development, improvements and problems in various Bluetooth versions including features, limitations, technical issues, security, how Bluetooth stands against WLAN, Zigbee and IrDA and what is expected in near future. 2 The Development of Bluetooth When developing Bluetooth, the idea was mainly to cut the cable [6a]. It can easy become a snake nest when a cable from every device that needs to be connected lies among each other. Since very few cables between mobile devices are very long, it was not supposed that the width of the wireless range should be very long, it was more important with a low power consuming [4; chapter 2, pp.18 25]. Most of the layers in the Bluetooth stack are based on already existing layers and protocols [3; chapter 5, pp.60]. In the earliest versions, the protocols were made just for a specific purpose [1; chapter 4.6.2, pp ]. A group, whose task was to find bugs and security holes, was selected and eventually mistakes would be corrected in future versions [4; chapter 10, pp.218]. 2.1 The Name Bluetooth The name Bluetooth comes from a Danish old Viking king, Harald Blåtand, Blåtand is Danish for Bluetooth. His last name comes from that he had a blue tooth. The king also had a great ability to unite folks and make them speak to each other, the same as Bluetooth is meant to do [4; chapter 2, pp.25 28]. The Bluetooth logo is a conjunction of the runic letters for H and B [4; chapter 2, pp.25 28]. Figure 2.1 The Bluetooth logo 3 Bluetooth and Networking TV broadcasting is an early example of one waycommunication, a transmitter sends out radio waves of a specific frequency and a receiver receives it. The transmitter just sends out and takes no notice of however if it reaches the receiver. It is up to the receiver to catch the data, fully, corrupted, or not at all. Bluetooth on the other hand is an example of twoway communication. This means that both sides can transmit at the same time and that acknowledgement packet can confirm the connection status and it s possible to resend corrupted data if needed. If an audio connection is set, it is better with a few packet losses because it would be choppy and might have long time delays, but if a document is to be sent, it is probably better to wait a few moments extra to get the whole file. 3.1 Radio Wave Communication Bluetooth uses radio waves to communicate. Radio waves instead of wires has been used for a long time, mostly known are radio, TV and satellites. The frequency of the waves in Bluetooth is between 2.4 and 2.48 GHz. This range is often called the 2.4 GHz or ISM (industrial, scientific, medical), it is unlicensed [4; chapter 1, pp.8 9], and the radio waves in this frequency fade away rather fast, normally meters for Bluetooth and Zigbee [9], 100 meters for WLAN (Wireless Local Area Network) [4; chapter 9, pp ], depending on the power usage of the radios. Short range means that it is possible to have many different nets in a relative close distance without interfering each other. That is why the frequency is widely used in WLANs all over the world. This frequency also makes water molecules vibrate and is therefore used in microwave ovens [4; chapter 6, pp ], [7]. Bluetooth uses frequency hopping to avoid interferences from other devices using the same frequency. There is a small risk that Bluetooth s frequency hopping will corrupt for example a WLAN transmission [7]. 3.2 Interconnection A piconet is formed when a slave is connected to a master. The piconet topology in Bluetooth uses 3 bit addresses, which means 2 3 = 8 devices in a topology, 2

3 whence at least one must be a master [2; chapter 2. pp 28 30]. Scatternet is several different piconets that are interconnected into a greater network. In a scatternet, a device could belong to different piconets and got different tasks for different piconets [1; chapter 4.6.1, pp. 311], [2; chapter 2. pp 28 30]. Figure 3.1 (the original picture is located in [2; chapter 2. pp 28 30]) describes three piconets (the large circles) making a scatternet. The unit inside the intersection between piconet A and B acts as a master in B and as a slave in A [2; chapter 2. pp 28 30]. A slave can act as a bridge slave like the one between Piconet A and C [1; chapter 4.6.1, pp. 311]. 4.1 The Protocol Stack The Bluetooth protocol stack is not similar to OSI (Open System Interconnection) reference model, TCP/IP, 802 or any other networking protocol [1; Many protocols are packed into layers [1; chapter pp ], we will describ e the layer s, from bottom to top. Application/Profiles Audio Other LLC RFcomm Telephony SDP Logical link control adaption protocol Control Link manager Baseband Physical radio Figure 4.1 The Bluetooth v1 stack. The original picture can be found in [1; chapter pp ] Figure 3.1 Piconets making a scatternet 4 Version 1 specifications Version 1.0 has a theoretical limit of 1 Mbps with an estimated practical speed of approximately 720 kbps, the lost bandwidth is used for header information [2; chapter 2.3.4, pp.31], [5b]. The basic developments in version 1.1 were merely fixing some small issues, bugs, implementation of Received Signal Strength Indicator (RSSI), which is used to measure and control power levels. Version 1.1 also added support for non secure channels. For version 1.2, the main extends were implementation of adaptive frequency hopping spread spectrum, which is used to avoid overloaded channels. Faster discovery and connection between devices, faster effective transmission speed and retransmission of corrupted packets were also added [5a], [8]. Radio Layer: The task of the radio layer is to make the data bits travel from the sender to the receiver. The frequency bands are divided into 79 pieces of 1 MHz channels and uses frequency hopping. When transferring data, its transfer in 625 µs per channel, then it hopes to another channel. This gives about 1600 hops per second. Every unit connected to the server shift frequency at the same time [1; chapter pp ]. Baseband Layer: The base band layer s task is to divide data into frames and defines which devices that will be masters and what role the masters will have. When all masters are defined, all remaining devices are set to slaves. The layer also synchronizes the frequency hopping and allocates several timeslots, which are 625 µs each. This is called Time Division Multiplexing (TDM). Each frame can be either 1, 3 or 5 slots. Masters always starts at even slots and slaves on uneven [1; Logical Link Control and Adoption Protocol Layer: Logical Link Control and Adoption Protocol (L2CAP) conceal the lower layers from the higher layers. It also divides packets of an upper limit of 64 KB to frames. Furthermore, it takes care of multiplexing and demultiplexing. When the L2CAP receives a packet from a lower layer, it decides what upper laye r to forward it to [1; 3

4 There has been a main extension to version 2.0 and then some minor improvements. The most important thing added in 2.0 compared to the earlier version was Enhanced Data Rate (EDR). With EDR enabled the theoretical speed reaches 3 Mbps or 2.1 Mbps in real life, which is about three times faster than previous versions. The technology that made this speed avail able is a combination of Gaussian Frequency Shift Keying (GFSK) and Phase Shift Keying (PSK) modulation while earlier versions only used GFSK. It also has better power efficiency since it has a shorter operating time (duty cycle). This version has higher power consumption but since the transfer speed is faster, it will use less time and therefore less power [5b], [8a]. This version also uses a maximum of 128 bits (1 8 bytes) for the PIN code compared to 48 bits in the first versions [6b]. The Link Manager Protocol (LMP) works parallel with the L2CAP but has no connection to upper layers. The LMP takes care of the establishment for logical link setups between devices like power management, authentication and quality of service [1; chapter pp ]. Radio Frequency Communication: The radio frequency communication protocol (RFcomm) emulates a serial port connection. Serial port devices can be mice, keyboards, modems etc [1; Telephony: This is a real time protocol that is used for voice and data calls, including setup and termination of calls [1; Service Discovery Protocol: The Service Discovery Protocol (SDP) discovers other Bluetooth devices, establishes connection, and examines what features are available for each connection [1; chapter pp ]. Audio Protocol: The audio Protocol is, as it sounds used for audio. It does not need any lower layers other than Baseband and Physical Radio. This is directly available from the applications and do not need to go through L2CAP [3; chapter 5, pp.70 72]. 4.2 Profiles There are several different profiles in Bluetooth where each profile has a specific purpose depending of what the task is, for example voice or file transferring. The different profiles are described below. Generic Access: Its main task is to set up and keep a reliable communication between master and slave. Applications are built upon it. This is a necessary profile and should be implemented in all Bluetooth devices [1; Service Discovery: This protocol finds out which services are available of the other device. This protocol should be implemented for Bluetooth to work [1; Serial Port: This profile emulates a serial link for application that is programmed for serial ports so that the data can be sent over a wireless connection via Bluetooth [1; Generic Object Exchange: It is a relationship of clientserver. The special is that a slave could be either a client or a server [1; LAN Access: This profile is used for when a Bluetooth device connects to a network [1; chapter pp ]. Dial up Networking: Allows a computer to use mobile phones as modem and make calls [1; chapter pp ]. Fax: This is similar as dial up networking but instead it sends and receives fax [1; Cordless Telephony: This is used when using a mobile phone as a telephone receiver (horn) connected to some kind of base station [1; chapter pp ]. Intercom: Allows two mobile phones to act as walkie between mobile phone and hands free device [1; talkies [1; Headset: Is the name when using wireless channels Object Push: This profile is used to exchange simple objects as business cards, pictures or data files [1; File Transfer: A profile for more general file transfer than just small files and pictures using object push [1; Synchronization: Allows synchronization of files etc. between a computer and a mobile phone or PDA [1; 5 Version 2 Specification 4

5 Version 2.1 uses an extended inquiry response, which means that when discovering other devices it gets more information like the services it supports, name and some other pairing information. This way it is easier to filter devices before a connection. Another thing added is the Sniff Subrating, which means that a device like a mouse or a keyboard can make a decision of how often it will send ping or keep alive packets. In this way, it can choose a longer ping time up to about 10 seconds, which will give a longer battery time. When in this low power sniff mode it can save up to about a third more power. Compared to earlier versions these keep alive packets were sent several times each second. An Encryption Pause Resume function has also been added to this version; it allows the devices to refresh their encryption keys, which then offers much better security for long time connections. A fourth thing is Secure Simple Pairing, which improves the security. Near Field Communication makes it possible to automatically connect to for example a headset that is in very close range, which has a NFC radio implemented. This function is a part of the Secure Simple Pairing. Another example is when bringing two devices near each other they will synchronize information. The Bit Error Rate (BER) performance has also improved in this version [5b], [8a]. 6 Security Security is important for all networks and especially for wireless commu nication where it is easy to pick up and listen to the radio waves, which are broadcasted out in the open air. Therefore, it is necessary to encrypt the data and use device authentication to avoid un authorized users. 6.1 Bluetooth Security Modes Bluetooth uses three security modes: Non Secure: There is no security at all [3; chapter 12, pp ], [4; chapter 7, pp ]. Service Level Enforced Security: After a connection is established, the security mode is initiated. This security mode is initiated in the L2CAP layer [3; chapter 12, pp ], [4; chapter 7, pp ]. Link Level Enforced Security: The security mode is initiated before the connection is established. This is the most secure mode of them all. This security mode is initiated in the LMP layer [3; chapter 12, pp ], [4; chapter 7, pp ]. 6.2 Key Management The Key Management uses three types of keys, which are PIN code, private link key and private encryption key. Personal Identification Number (PIN) Code is a userdefined code. All users that connect to the network must enter the same code before a connection is established [4; chapter 7, pp ]. Private Link Key (also called authentication key) is a set of four different types that are created at every transmission. The first called unit key and is, decided by one of the sides, the device address can be used to calculate one. The second is a combination key that is determined from both sides. There also is a type called master key, which is the centre of a network (piconet). This is used when a master is going to send the same information to all slaves. The last kind is an initialization key that is used to protect initialization parameters [4; chapter 7, pp ]. Private Encryption Key is made of the link key. The key is changed at every time the encryption is needed. The key can also be of different lengths [4; chapter 7, pp ]. What happens in the security mode, see picture 6.1 below redrawn from the original image in [4; chapter 7, pp ]. PIN Link Key Encryption Key Authentication Encryption Figure 6.1 Security steps. PIN Link Key Encryption Key The first step is that the users enter a PIN code. The second step is that a private link key is generated on a side and exchanges it with the other side. The third step is that a private encryption key is generated on a side and exchanges it with the other side. If any of th ese keys do not match, the connection will be aborted [4; chapter 7, pp ]. 5

6 7 Problems Bluetooth v1 was highly criticized due to security. An aspect was that the security keys, that used 48 bits, which was claimed to be of too short length. It was said that it easily could be hacked [4; chapter 10, pp.218]. Before Bluetooth implemented adaptive frequency hopping, it could easier be interfered by for example WLAN and microwave ovens. Even after this implementation, it still can be interfered if a microwave oven is within a very short range [4; chapter 6, pp ], [7]. Bluetooth version 1 also has a low practical speed compared to the theoretical speed. The speed of B luetooth v2 was increased b y three to a theoretical speed of 3 Mbps but even in this version suffers from packet headers which limits the pay load size (the actual data speed) to just a bit over 2 Mbps [5d], [8a]. Even if this version of Bluetooth is faster than previous versions, it still is very limited compared to WLAN, which rarely is below 54 Mbps. The first hardware of the Bluetooth radio used two chips, one for radio and another for controller. Because of this, the radio used much more power than it was supposed to. Later versions integrated the two chips into a single one, which resulted in lower power usage [4; chapter 10, pp ]. 8 Performance and Results WLAN can draw more power and is therefore stronger in speed and range; it is also more expensive to build than Bluetooth [4; chapter 9, pp ]. WLAN is made more for replacing cables in networks compared to Bluetooth, which was first built to replace cables between two or a few mobile devices. WLAN has a more further complex setup while Bluetooth was made to make its connection simple and fast [4; chapter 9, pp ]. On the other hand, WLAN has more improved security [8b]. If interference between Bluetooth and WLAN occurs, Bluetooth will try to send the packet on a different channel and WLAN will see this as a collision, slow down and try to resend later in the same way as Ethernet does [7]. IrDA was already on the market when the first Bluetooth products arrived. At that time, Bluetooth was expensive, drew more power and its data transfer was significantly slower. However, IrDA had a few major drawbacks. As a comparison to, between IrDA had a very short range, about 1 m, the devices had to point to each other within a 30 degree angle and a thin piece of paper between the devices would interrupt the transmission. Since Bluetooth uses radio waves and IrDA uses light, Bluetooth is capable of handling the largest drawbacks of IrDA [4; chapter 9, pp ], [4; chapter 9, pp ]. Since IrDA cannot operate outside a 30 degree angle, it is not suitable for networks as technologies based on radio waves [4; chapter 9, pp ]. When Bluetooth s data rate was increased with its newer versions, it speeded up the downfall of IrDA as a cable replacement compared to Bluetooth [4; chapter 9, pp ]. The technique in Zigbee is very similar to Bluetooth s but is rather used for Industrial control and monitoring. Zigbee was designed to have very low power consumption and the data rate is much slower than in Bluetooth. When developing new versions of Bluetooth, it has always supported backward capability. It means that different versions can interact with each other [5a]. The data transfer speed is always at its maximum limitation and depending on how far the transmission range is, the power consumption will increase acc ording to the power classes seen below. There are three power classes, which describe how much power is needed for a specific range: Class 1: has a range of 100 meters and requires 100 mw. Class 2: has a range of 10 meters and requires 2.5 mw. Class 3: has a range of 1 meter and requires 1 mw. As the class scheme shows, the power demand grows exponentially in proportion to the range [4; Appendix B, pp.252]. 6

7 9 What to Expect in the Future The next version, which is expected to be called WiMedia Alliance, is going to be quite similar to current versions but according to an announcement from the Bluetooth SIG, it will be using Multi Band Orthogonal Frequency Division Multiplexing on the Ultra Wideband (UWB). This technology will raise the speed from 3 Mbps to about 480 Mbps (theoretical speed) and in this way it will meet the high speed demands of today [5c], [8c]. 10 Summary and Conclusion Almost every new mobile phone supports Bluetooth. From the early days when some engineers at Ericsson decided to invent Bluetooth as a cable replacement, it has grown to a worldwide industry. Already opponents, such as IrDA, had no chance in the long run compared to Bluetooth s more advanced technique. When Zigbee hit the market later on, Bluetooth was already widely used and even if Zigbee required much less power consumption, the data rate was much slower than Bluetooth s. The main purpose of the Zigbee development was not to cover the same areas as Bluetooth. Bluetooth s usability is constantly developing for new areas and is today intersecting with WLAN. Today s versions of Bluetooth is three time faster than the earliest but according to the present days, the speed isn t very impressive, although next version, that is expected to hit the market in a short period of time, the speed will be fast enough for today s demands and the speed will even be faster than current WLANs. Security is still not as strong as in recent WLAN but has been improved compared to earlier versions when it didn t was expected to be as WLAN alike as it has become. The area of Bluetooth usability has spread and is now used in printers for example. Printers are not very mobile so the original idea of cable replacement in just mobile devices has broadened too many electronic devices. When the approach Bluetooth in non mobile devices, for examples printers, it came up ideas, that Bluetooth could replace almost every wire between electronic devices. It is however not very common in nowadays. 11 References 1. Andrew S. Tanenbaum. Computer Networks, 4 th Edition. Pearson Education, Inc. ISBN: Javier García Castaño. Algorithms and Protocols Enhancing Mobility Support for Wireless Sensor Networks Based on Bluetooth and Zigbee. Mälardalen University Press. ISBN: Brent A. Miller, Chatschik Bisdikian. Bluetooth Revealed. Prentice Hall, Inc. ISBN: Michael Miller. Discovering Bluetooth. Sybex, Inc. ISBN: BlueTomorrow: a. Bluetooth Core Specification Versions: 275/ b. Bluetooth Specifications: 1/ c. High Speed Bluetooth: 466/ 6. Bluetooth: a. How Bluetooth Technology Works rks/ b. Specification of the Bluetooth System, Volume 0, Core Specification v2.1 + EDR, Key Types, chapter ding/specifications/ 7. HP Invent: Wi Fi and Bluetooth Interference Issues, existance.pdf 8. Bluetooth: a. Specifications and Features: and_features b. WiFi: Fi c. Future of Bluetooth: etooth 9. Software Technologies Group: How does ZigBee compare with other wireless standards? 7

[A SHORT REPORT ON BLUETOOTH TECHNOLOGY]

[A SHORT REPORT ON BLUETOOTH TECHNOLOGY] 2011 [A SHORT REPORT ON BLUETOOTH TECHNOLOGY] By Ram Kumar Bhandari 1. Introduction Bluetooth Technology A Technical Report Bluetooth is a short-ranged wire-less communication technology implementing the

More information

Bluetooth: Short-range Wireless Communication

Bluetooth: Short-range Wireless Communication Bluetooth: Short-range Wireless Communication Wide variety of handheld devices Smartphone, palmtop, laptop Need compatible data communication interface Complicated cable/config. problem Short range wireless

More information

Guide to Wireless Communications, 3 rd Edition. Objectives

Guide to Wireless Communications, 3 rd Edition. Objectives Guide to Wireless Communications, 3 rd Edition Chapter 5 Wireless Personal Area Networks Objectives Describe a wireless personal area network (WPAN) List the different WPAN standards and their applications

More information

Bluetooth Demystified

Bluetooth Demystified Bluetooth Demystified S-72.4210 Postgraduate Course in Radio Communications Er Liu liuer@cc.hut.fi -10 Content Outline Bluetooth History Bluetooth Market and Applications Bluetooth Protocol Stacks Radio

More information

Wireless Personal Area Networks & Wide Area Networks

Wireless Personal Area Networks & Wide Area Networks Wireless Personal Area Networks & Wide Area Networks Patrick J. Stockreisser p.j.stockreisser@cs.cardiff.ac.uk Lecture Outline In the lecture we will: Look at PAN s in more detail Look at example networks

More information

AT THE END OF THIS SECTION, YOU SHOULD HAVE AN UNDERSTANDING OF THE

AT THE END OF THIS SECTION, YOU SHOULD HAVE AN UNDERSTANDING OF THE Wireless Technology AT THE END OF THIS SECTION, YOU SHOULD HAVE AN UNDERSTANDING OF THE UNDERLYING WIRELESS TECHNOLOGIES. References 2 The physical layer provides mechanical, electrical, l functional,

More information

Computer Networks II Advanced Features (T )

Computer Networks II Advanced Features (T ) Computer Networks II Advanced Features (T-110.5111) Bluetooth, PhD Assistant Professor DCS Research Group Based on slides previously done by Matti Siekkinen, reused with permission For classroom use only,

More information

WPAN-like Systems. UWB Ultra Wide Band. IrDA Infrared Data Association. Bluetooth. Z-Wave. WPAN Wireless Personal Area Network

WPAN-like Systems. UWB Ultra Wide Band. IrDA Infrared Data Association. Bluetooth. Z-Wave. WPAN Wireless Personal Area Network WPAN-like Systems WPAN Wireless Personal Area Network PAN: Personal Area Network. Small, within a few meters. WPAN: Wireless PAN. Mostly short-range, low-power, lowrate networks. More or less self-organizing.

More information

Wireless Sensor Networks

Wireless Sensor Networks Wireless Sensor Networks 11th Lecture 29.11.2006 Christian Schindelhauer schindel@informatik.uni-freiburg.de 1 Bluetooth in WSN? There are several commercially available MAC protocol/products Wi-Fi Bluetooth

More information

CS263: Wireless Communications and Sensor Networks

CS263: Wireless Communications and Sensor Networks CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 6: Bluetooth and 802.15.4 October 12, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Bluetooth Standard for Personal Area

More information

Wireless Networked Systems

Wireless Networked Systems Wireless Networked Systems CS 795/895 - Spring 2013 Lec #7: Medium Access Control WPAN, Bluetooth, ZigBee Tamer Nadeem Dept. of Computer Science Bluetooth Page 2 Spring 2013 CS 795/895 - Wireless Networked

More information

12/2/09. Mobile and Ubiquitous Computing. Bluetooth Networking" George Roussos! Bluetooth Overview"

12/2/09. Mobile and Ubiquitous Computing. Bluetooth Networking George Roussos! Bluetooth Overview Mobile and Ubiquitous Computing Bluetooth Networking" George Roussos! g.roussos@dcs.bbk.ac.uk! Bluetooth Overview" A cable replacement technology! Operates in the unlicensed ISM band at 2.4 GHz! Frequency

More information

MOBILE COMPUTING. Bluetooth 9/20/15. CSE 40814/60814 Fall Basic idea

MOBILE COMPUTING. Bluetooth 9/20/15. CSE 40814/60814 Fall Basic idea OBILE COUTING CE 40814/60814 Fall 2015 Bluetooth Basic idea Universal radio interface for ad-hoc wireless connectivity Interconnecting computer and peripherals, handheld devices, DAs, cell phones replacement

More information

Chapter 6 Wireless and Mobile Networks

Chapter 6 Wireless and Mobile Networks Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley, July 2004. 6: Wireless and Mobile Networks 6

More information

Security. Nelli Gordon and Sean Vakili May 10 th 2011

Security. Nelli Gordon and Sean Vakili May 10 th 2011 Security Nelli Gordon and Sean Vakili May 10 th 2011 What is Bluetooth? Bluetooth is an open standard for short-range radio frequency (RF) communication. Bluetooth technology is used primarily to establish

More information

Wireless LANs. The Protocol Stack The Physical Layer The MAC Sublayer Protocol The Frame Structure Services 802.

Wireless LANs. The Protocol Stack The Physical Layer The MAC Sublayer Protocol The Frame Structure Services 802. Wireless LANs The 802.11 Protocol Stack The 802.11 Physical Layer The 802.11 MAC Sublayer Protocol The 802.11 Frame Structure Services 56 802.11 The 802.11 Working Group The IEEE 802.11 was formed in July

More information

Communication Systems. WPAN: Bluetooth. Page 1

Communication Systems. WPAN: Bluetooth. Page 1 Communication Systems WPAN: Bluetooth Page 1 Outline Historical perspective Piconet Scatternet Lattency modes Applications Page 2 Bluetooth Bluetooth (BT) wireless technology is a short-range communications

More information

Redes Inalámbricas Tema 2.B Wireless PANs: Bluetooth

Redes Inalámbricas Tema 2.B Wireless PANs: Bluetooth Redes Inalámbricas Tema 2.B Wireless PANs: Bluetooth Bluetooh Acknowledgments: Foo Chun Choong, Ericsson Research / Cyberlab Singapore, and Open Source Software Lab, ECE Dept, NUS Máster de Ingeniería

More information

Bluetooth. Basic idea

Bluetooth. Basic idea Bluetooth Basic idea Universal radio interface for ad-hoc wireless connectivity Interconnecting computer and peripherals, handheld devices, DAs, cell phones replacement of IrDA Embedded in other devices,

More information

Chapter 4: Communication Technology. Solutions

Chapter 4: Communication Technology. Solutions Chapter 4: Communication Technology Solutions Summative Assessment Multiple-Choice Questions (MCQs) 1. Two examples of network are telephone and. a. Radio b. Transmission c. Globe d. All of the above 2.

More information

Bluetooth Tutorial. Bluetooth Introduction. Bluetooth Technology

Bluetooth Tutorial. Bluetooth Introduction. Bluetooth Technology Bluetooth Tutorial Bluetooth strives to remove the never ending maze of wires which provide a communication link between different electronic devices, through a short range wireless solution. Consider

More information

Simulation of Bluetooth Network

Simulation of Bluetooth Network Simulation of Bluetooth Network Lennart Lagerstedt Stockholm, 2003 Master of Science Thesis Project The Department of Microelectronics and Information Technology, Royal Institute of Technology (KTH) Lennart

More information

Bluetooth. 3.3 Latest Technology in Wireless Network. What is BLUETOOTH: Bluetooth 2/17/2016

Bluetooth. 3.3 Latest Technology in Wireless Network. What is BLUETOOTH: Bluetooth 2/17/2016 3.3 Latest Technology in Wireless Network Bluetooth Bluetooth Bluetooth is a high-speed, low-power microwave wireless link technology, designed to connect phones, laptops, PDAs and other portable equipment

More information

Introduction to Bluetooth

Introduction to Bluetooth Introduction to Bluetooth Kirsten Matheus The idea behind Bluetooth The problems when trying to realize the idea The solutions used in Bluetooth How well the solutions work 12.06.2003 1 he Idea Behind

More information

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices

More information

Case study of Wireless Technologies in Industrial Applications

Case study of Wireless Technologies in Industrial Applications International Journal of Scientific and Research Publications, Volume 7, Issue 1, January 2017 257 Case study of Wireless Technologies in Industrial Applications Rahul Hanumanth Rao Computer Information

More information

Wireless Technologies

Wireless Technologies Wireless Technologies Networking for Home and Small Businesses Chapter 7 Manju. V. Sankar 1 Objectives Describe wireless technologies. Describe the various components and structure of a WLAN Describe wireless

More information

Bluetooth PCI Adapter

Bluetooth PCI Adapter Table of Contents 1 Introduction...2 2 Installation...2 2.1 Software Installation...2 2.1.1 Installation on Windows 95/98/ME/2000/XP...2 2.1.2 Installation on Windows NT...3 2.1.3 Installation on Linux...3

More information

e-pg Pathshala Quadrant 1 e-text

e-pg Pathshala Quadrant 1 e-text e-pg Pathshala Subject : Computer Science Module: Bluetooth Paper: Computer Networks Module No: CS/CN/37 Quadrant 1 e-text In our journey on networks, we are now exploring wireless networks. We looked

More information

NT1210 Introduction to Networking. Unit 6: Chapter 6, Wireless LANs

NT1210 Introduction to Networking. Unit 6: Chapter 6, Wireless LANs NT1210 Introduction to Networking Unit 6: Chapter 6, Wireless LANs Objectives Identify the major needs and stakeholders for computer networks and network applications. Identify the classifications of networks

More information

IT220 Network Standards & Protocols. Unit 6: Chapter 6 Wireless LANs

IT220 Network Standards & Protocols. Unit 6: Chapter 6 Wireless LANs IT220 Network Standards & Protocols Unit 6: Chapter 6 Wireless LANs 2 Objectives Identify the major needs and stakeholders for computer networks and network applications. Identify the classifications of

More information

Introduction to Bluetooth Wireless Technology

Introduction to Bluetooth Wireless Technology Introduction to Bluetooth Wireless Technology Jon Inouye Staff Software Engineer Mobile Platforms Group Intel Corporation Bluetooth Bluetooth is is a a trademark trademark owned owned by by Bluetooth Bluetooth

More information

Wireless# Guide to Wireless Communications. Objectives

Wireless# Guide to Wireless Communications. Objectives Wireless# Guide to Wireless Communications Chapter 6 High Rate Wireless Personal Area Networks Objectives Define a high rate wireless personal area network (HR WPAN) List the different HR WPAN standards

More information

In Brief TARIFF CLASSIFICATION OF CERTAIN ARTICLES USING BLUETOOTH TECHNOLOGY

In Brief TARIFF CLASSIFICATION OF CERTAIN ARTICLES USING BLUETOOTH TECHNOLOGY Ottawa, June 16, 2009 MEMORANDUM D10-14-57 In Brief TARIFF CLASSIFICATION OF CERTAIN ARTICLES USING BLUETOOTH TECHNOLOGY This memorandum explains the Canada Border Services Agency administrative policy

More information

MI-BPS (Wireless Networks) FIT - CTU

MI-BPS (Wireless Networks) FIT - CTU Evropský sociální fond Praha & EU: Investujeme do vaší budoucnosti MI-BPS (Wireless Networks) FIT - CTU Alex Moucha Lecture 8 - Piconets, Scatternets, Bluetooth, Zigbee 1 Piconet an ad-hoc network linking

More information

IMPLEMENTATION AND SECURITY OF BLUETOOTH TECHNOLOGY

IMPLEMENTATION AND SECURITY OF BLUETOOTH TECHNOLOGY Bachelor s Thesis (UAS) Information Technology Networking and Programming 2011 IDAHOSA AKHANOLU IMPLEMENTATION AND SECURITY OF BLUETOOTH TECHNOLOGY i BACHELOR S THESIS (UAS) ABSTRACT TURKU UNIVERSITY OF

More information

Mobile and Sensor Systems

Mobile and Sensor Systems Mobile and Sensor Systems Lecture 2: Mobile Medium Access Control Protocols and Wireless Systems Dr Cecilia Mascolo In this lecture We will describe medium access control protocols and wireless systems

More information

Network Communications Standards. Applied Information Technology

Network Communications Standards. Applied Information Technology Network Communications Standards Applied Information Technology Network Standards Why do we need network standards? Defined guidelines for how computers or networked devices communicate Think of it as

More information

Dominique Chomienne & Michel Eftimakis NewLogic

Dominique Chomienne & Michel Eftimakis NewLogic Dominique Chomienne & Michel Eftimakis NewLogic Bluetooth is a trademark owned by the Bluetooth SIG, and licenced to NewLogic Page 1 Tutorial Agenda Bluetooth Marketing view Bluetooth network topology

More information

Bluetooth Wireless Technology meets CAN

Bluetooth Wireless Technology meets CAN Bluetooth Wireless Technology meets CAN Matthias Fuchs esd electronic system design GmbH, Hannover, Germany To access mobile and moving CAN fieldbus systems a wireless approach is often a good solution.

More information

Wireless Local Area Networks. Networks: Wireless LANs 1

Wireless Local Area Networks. Networks: Wireless LANs 1 Wireless Local Area Networks Networks: Wireless LANs 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices (PDAs and cell phones) created an obvious application

More information

CHAPTER 12 BLUETOOTH AND IEEE

CHAPTER 12 BLUETOOTH AND IEEE CHAPTER 12 BLUETOOTH AND IEEE 802.15 These slides are made available to faculty in PowerPoint form. Slides can be freely added, modified, and deleted to suit student needs. They represent substantial work

More information

Bluetooth. Renato Lo Cigno

Bluetooth. Renato Lo Cigno Bluetooth Renato Lo Cigno www.dit.unitn.it/locigno/teaching ...Copyright Quest opera è protetta dalla licenza Creative Commons NoDerivs- NonCommercial. Per vedere una copia di questa licenza, consultare:

More information

APAC Application Support Manager Magic Lin

APAC Application Support Manager Magic Lin New Bluetooth measurement and solution for Bluetooth low energy MMD APAC Application Support Manager Magic Lin +886-933-710-634 magic.lin@anritsu.com v. H Slide 1 Agenda 1. History of Bluetooth 2. Special

More information

Chapter 10: Wireless LAN & VLANs

Chapter 10: Wireless LAN & VLANs Chapter 10: Wireless LAN & VLANs Abdullah Konak School of Information Sciences and Technology Penn State Berks Wireless Transmission for LAN Radio Frequency Transmission (RF) Infrared Transmission 2 1

More information

Bluetooth. March 28, 2005 Patrick Lui

Bluetooth. March 28, 2005 Patrick Lui Bluetooth March 28, 2005 Patrick Lui 0053252 1. Introduction As our everyday lives move closer towards complete digital age, connectivity between devices is an important aspect that has not been emphasized

More information

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University Wireless and WiFi Daniel Zappala CS 460 Computer Networking Brigham Young University Wireless Networks 2/28 mobile phone subscribers now outnumber wired phone subscribers similar trend likely with Internet

More information

Wireless standards--home automation, energy, care and security

Wireless standards--home automation, energy, care and security Wireless standards--home automation, energy, care and security Rene Kohlmann - October 30, 2013 Exceptional changes are underway in the home networking market and a wide range of home systems. Everything

More information

Module 5. Embedded Communications. Version 2 EE IIT, Kharagpur 1

Module 5. Embedded Communications. Version 2 EE IIT, Kharagpur 1 Module 5 Embedded Communications Version 2 EE IIT, Kharagpur 1 Lesson 27 Wireless Communication Version 2 EE IIT, Kharagpur 2 Instructional Objectives After going through this lesson the student would

More information

Implementing A Bluetooth Stack on UEFI

Implementing A Bluetooth Stack on UEFI Implementing A Bluetooth Stack on UEFI Tony C.S. Lo Senior Manager American Megatrends Inc. presented by UEFI Plugfest October 2014 Agenda Introduction Bluetooth Architecture UEFI Bluetooth Stack Summary

More information

Extending or Interconnecting LANS. Physical LAN segment. Virtual LAN. Forwarding Algorithm 11/9/15. segments. VLAN2, Port3. VLAN1, Port1.

Extending or Interconnecting LANS. Physical LAN segment. Virtual LAN. Forwarding Algorithm 11/9/15. segments. VLAN2, Port3. VLAN1, Port1. Physical LAN segment q Hosts connected on the same physical LAN segment q Same subnet; L2 forwarding q ARP (IPè MAC) L2 frame (S, D), send q Scale? Extending or Interconnecting LANS q q q Why not just

More information

Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs

Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer 1 Wireless Local Area Networks (WLANs) The proliferation of laptop computers and other mobile devices (PDAs and cell phones)

More information

The Wi-Fi Boom. Dr. Malik Audeh Tropos Networks March 13, 2004

The Wi-Fi Boom. Dr. Malik Audeh Tropos Networks March 13, 2004 1 The Wi-Fi Boom Dr. Malik Audeh Tropos Networks March 13, 2004 Outline 2 Wi-Fi has gone mainstream Background of Wi-Fi/802.11 Technical Details of Wi-Fi Physical Layer(s) MAC Layer Security Wi-Fi in different

More information

Bluetooth low energy technology Bluegiga Technologies

Bluetooth low energy technology Bluegiga Technologies Bluetooth low energy technology Bluegiga Technologies Topics Background What is Bluetooth low energy? Basic concepts Architecture Differentiation and comparison Markets and applications Background Background

More information

Chapter 5. Wireless PANs

Chapter 5. Wireless PANs Chapter 5 Wireless PANs 5.1 Introduction Introduction of Wireless PANs (WPANs) has caused the latest revolution in the area of wireless technologies. WPANs are short to very short-range (from a couple

More information

Performance Evaluation of Bluetooth Links in the Presence of Specific Types of Interference

Performance Evaluation of Bluetooth Links in the Presence of Specific Types of Interference Vol:1, No:3, 27 Performance Evaluation of Bluetooth Links in the Presence of Specific Types of Interference Radosveta Sokullu and Engin Karatepe International Science Index, Electrical and Computer Engineering

More information

Mobile Hands Free Operation. Ontario Regulation 366/09

Mobile Hands Free Operation. Ontario Regulation 366/09 Mobile Hands Free Operation Ontario Regulation 366/09 Display screen visible to driver prohibited 78. (1) No person shall drive a motor vehicle on a highway if the display screen of a television, computer

More information

Efficient Multicast Schemes for Mobile Multiparty Gaming Applications

Efficient Multicast Schemes for Mobile Multiparty Gaming Applications Efficient Multicast Schemes for Mobile Multiparty Gaming Applications P6-6th semester 2006 Group 681 - ComNet Aalborg University 9th March 2006 Institut for elektroniske systemer Fr. Bajers Vej 7 Telefon

More information

Structure of the Lecture

Structure of the Lecture Structure of the Lecture Chapter 2 Technical Basics: Layer 1 Methods for Medium Access: Layer 2 Chapter 3 Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Networks: GSM, GPRS, UMTS Satellites

More information

3Com Wireless Bluetooth PC Card, USB Adapter, and Printer Adapter

3Com Wireless Bluetooth PC Card, USB Adapter, and Printer Adapter DATA SHEET 3Com Wireless Bluetooth PC Card, USB Adapter, and Printer Adapter Key Benefits Simplicity Bluetooth Connection Manager provides automatic discovery and point-and-click management of devices,

More information

Bluetooth PC Card from IBM

Bluetooth PC Card from IBM Bluetooth PC Card from IBM Installation and User s Guide IBM 19K4260 Note: Before using this information and the product it supports, read Appendix E, Product warranties and notices on page E-1. First

More information

Pengantar Teknologi Informasi dan Teknologi Hijau. Suryo Widiantoro, ST, MMSI, M.Com(IS)

Pengantar Teknologi Informasi dan Teknologi Hijau. Suryo Widiantoro, ST, MMSI, M.Com(IS) Pengantar Teknologi Informasi dan Teknologi Hijau Suryo Widiantoro, ST, MMSI, M.Com(IS) 1 Topics covered 1. From analog to digital age 2. Networks 3. Wired-communication data 4. Wireless-communication

More information

Embedded Systems Dr. Santanu Chaudhury Department of Electrical Engineering IIT Delhi. Lecture 26 Networked Embedded Systems III

Embedded Systems Dr. Santanu Chaudhury Department of Electrical Engineering IIT Delhi. Lecture 26 Networked Embedded Systems III Embedded Systems Dr. Santanu Chaudhury Department of Electrical Engineering IIT Delhi Lecture 26 Networked Embedded Systems III Today, we shall look at wireless networks which are intended for usage in

More information

Wireless Networking. Chapter The McGraw-Hill Companies, Inc. All rights reserved

Wireless Networking. Chapter The McGraw-Hill Companies, Inc. All rights reserved Wireless Networking Chapter 23 Overview In this chapter, you will learn how to Discuss wireless networking components Analyze and explain wireless networking standards Install and configure wireless networks

More information

Wireless# Guide to Wireless Communications. Objectives

Wireless# Guide to Wireless Communications. Objectives Wireless# Guide to Wireless Communications Chapter 1 Introduction to Wireless Communications Jorge Olenewa jolenewa@georgebrown.ca Office: E425 ext. 6809 Objectives Explain how the major wireless technologies

More information

Wireless Networking WiFi Standards 802.11a 5GHz 54MB 802.11b 2.4 GHz 11MB 802.11g 2.4GHz 52MB 802.11n 2.4/5GHz 108MB 802.11b The 802.11b standard has a maximum raw data rate of 11 Mbit/s, and uses

More information

Comparison study of ZigBee and Bluetooth with regards to power consumption, packet-error-rate and distance

Comparison study of ZigBee and Bluetooth with regards to power consumption, packet-error-rate and distance Comparison study of ZigBee and Bluetooth with regards to power consumption, packet-error-rate and distance M. C. Ekström, M. Bergblomma, M. Lindén, M. Björkman and M. Ekström School of Innovation, Design

More information

STA-MU-A0028S (MiniCard-USB version)

STA-MU-A0028S (MiniCard-USB version) STA-MU-A0028S (MiniCard-USB version) WiFi 802.11 b/g and Bluetooth v2.0 + EDR Combo Mini Card Module Approval Sheet Ver: 1.1 CONTENT 1. Introduction...3 1.1 Features & Benefits...3 1.2 Applications...4

More information

Computer Networks. Wireless LANs

Computer Networks. Wireless LANs Computer Networks Wireless LANs Mobile Communication Technology according to IEEE (examples) Local wireless networks WLAN 802.11 Personal wireless nw WPAN 802.15 WiFi 802.11a 802.11b 802.11h 802.11i/e/

More information

Wireless# Guide to Wireless Communications. Objectives

Wireless# Guide to Wireless Communications. Objectives Wireless# Guide to Wireless Communications Chapter 8 High-Speed WLANs and WLAN Security Objectives Describe how IEEE 802.11a networks function and how they differ from 802.11 networks Outline how 802.11g

More information

Last Lecture: Data Link Layer

Last Lecture: Data Link Layer Last Lecture: Data Link Layer 1. Design goals and issues 2. (More on) Error Control and Detection 3. Multiple Access Control (MAC) 4. Ethernet, LAN Addresses and ARP 5. Hubs, Bridges, Switches 6. Wireless

More information

Part IX: Mobile Business

Part IX: Mobile Business Part IX: Mobile Business Learning Targets What is mobile business? What devices and device properties exist? How can we communicate with mobile equipment? Which are interesting mobile applications? 2 3

More information

Learning Objectives. Introduction. Advantages of WLAN. Information Technology. Mobile Computing. Module: Wireless Local Area Network: IEEE 802.

Learning Objectives. Introduction. Advantages of WLAN. Information Technology. Mobile Computing. Module: Wireless Local Area Network: IEEE 802. Information Technology Mobile Computing Module: Wireless Local Area Network: IEEE 802.11 Learning Objectives Introduction to Wireless Local Area Network Advantages of WLAN Types of WLAN IEEE 802.11 standards

More information

54M Wireless LAN CardBus Card

54M Wireless LAN CardBus Card 54M Wireless LAN CardBus Card User s Manual Ver.2.0 Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device,

More information

Attack & Defense in Wireless Networks

Attack & Defense in Wireless Networks Attack & Defense in Wireless Networks John M. Shea April 22, 2008 Overview Wireless networks fundamentals vulnerabilities WING testbed Demonstration of Denial-of-Service Attack and Defense Classification:

More information

Wireless Networking: An Introduction. Hongwei Zhang

Wireless Networking: An Introduction. Hongwei Zhang Wireless Networking: An Introduction Hongwei Zhang http://www.cs.wayne.edu/~hzhang Outline Networking as resource allocation A taxonomy of current practice Technical elements Outline Networking as resource

More information

The Basics of Computer Networking. David Phenix Computing in the Modern World 1 st Period

The Basics of Computer Networking. David Phenix Computing in the Modern World 1 st Period The Basics of Computer Networking David Phenix Computing in the Modern World 1 st Period The Computer Network Arguably, the greatest advancement in technology and communication over the past 20 years has

More information

Architectures of Next Generation Wireless Networks. Pascal LORENZ.

Architectures of Next Generation Wireless Networks. Pascal LORENZ. Architectures of Next Generation Wireless Networks lorenz@ieee.org Internet is increasing exponentially: 2001: 180 million users today: more than 2 billions users Internet traffic and the bandwidth double

More information

Wireless Terms. Uses a Chipping Sequence to Provide Reliable Higher Speed Data Communications Than FHSS

Wireless Terms. Uses a Chipping Sequence to Provide Reliable Higher Speed Data Communications Than FHSS How to Set Up a Secure Home Wireless Network What you don t know about setting up a home wireless network can hurt you. 2008 APCUG Convention Session Tom Jones, P.E., RCDD-NTS CQS-CWLSS AGENDA Some Terms

More information

IEEE WLANs Standards for Mobile Ad-hoc Networks (MANETs): Performance Analysis

IEEE WLANs Standards for Mobile Ad-hoc Networks (MANETs): Performance Analysis Global Journal of Computer Science and Technology Vol. 10 Issue 14 (Ver. 1.0) November 2010 P a g e 42 IEEE WLANs Standards for Mobile Ad-hoc Networks (MANETs): Performance Analysis Ajay Jangra 1, Nitin

More information

Wireless# Guide to Wireless Communications. Objectives

Wireless# Guide to Wireless Communications. Objectives Wireless# Guide to Wireless Communications Chapter 7 Low-Speed Wireless Local Area Networks Objectives Describe how WLANs are used List the components and modes of a WLAN Describe how an RF WLAN works

More information

Chapter 3. Wired and Wireless Communication. What You Will Learn... Computers Are Your Future. What You Will Learn...

Chapter 3. Wired and Wireless Communication. What You Will Learn... Computers Are Your Future. What You Will Learn... What You Will Learn... Computers Are Your Future Chapter 3 The definition of bandwidth The bandwidth needs of a typical user How modems change digital signals into analog Transmission media and methods

More information

Junseok Kim Wireless Networking Lab (WINLAB) Konkuk University, South Korea

Junseok Kim Wireless Networking Lab (WINLAB) Konkuk University, South Korea Junseok Kim Wireless Networking Lab (WINLAB) Konkuk University, South Korea http://usn.konkuk.ac.kr/~jskim 1 IEEE 802.x Standards 802.11 for Wireless Local Area Network 802.11 legacy clarified 802.11 legacy

More information

DIAL-UP NETWORKING PROFILE

DIAL-UP NETWORKING PROFILE Part K:7 DIAL-UP NETWORKING PROFILE This profile defines the requirements for Bluetooth devices necessary for the support of the Dial-up Networking use case. The requirements are expressed in terms of

More information

MOTHER TERESA SR. SEC. CO-ED SCHOOL. CLASS VIII (Comp Sc.) CHAPTER-1 : ABOUT NETWORKING

MOTHER TERESA SR. SEC. CO-ED SCHOOL. CLASS VIII (Comp Sc.) CHAPTER-1 : ABOUT NETWORKING Q1. Multiple Choice Questions MOTHER TERESA SR. SEC. CO-ED SCHOOL 1) WLAN stands for : CLASS VIII (Comp Sc.) 2017-18 CHAPTER-1 : ABOUT NETWORKING a) Wide Local Area Network b) World Local Area Network

More information

Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005 Network and Telecommunications Basics Chapter Outline The telecommunications system Network services

More information

IEEE Romel Rudyard J. Lucentales, ECE 5

IEEE Romel Rudyard J. Lucentales, ECE 5 IEEE 802.11 Romel Rudyard J. Lucentales, ECE 5 IEEE 802.11 a set of standards for wireless local area network (WLAN) computer communication developed by the IEEE LAN/MAN Standards Committee (IEEE 802)

More information

Computers Are Your Future Tenth Edition

Computers Are Your Future Tenth Edition Computers Are Your Future Tenth Edition Chapter 3: Wired & Wireless Communication Copyright 2009 Pearson Education, Inc. Publishing as Prentice Hall 1 All rights reserved. No part of this publication may

More information

Protocol Based on Mobile Agents

Protocol Based on Mobile Agents Bluecouts: A catternet Formation Bluecouts: A catternet Formation ergio González-Valenzuela 1 on T. Vuong 2 Victor C. M. Leung 1 1 Department of Electrical and Computer Engineering 2 Department of Computer

More information

Reti degli elaboratori

Reti degli elaboratori Reti degli elaboratori Dealing with Mobility; Bluetooth Basics Chiara Petrioli petrioli@di.uniroma1.it What is mobility? v spectrum of mobility, from the network perspective: no mobility high mobility

More information

Medium Access Control Sublayer Chapter 4

Medium Access Control Sublayer Chapter 4 Medium Access Control Sublayer Chapter 4 Channel Allocation Problem Multiple Access Protocols Ethernet Wireless LANs Broadband Wireless Bluetooth RFID Data Link Layer Switching Revised: August 2011 & February

More information

Elchin Mammadov. Overview of Communication Systems

Elchin Mammadov. Overview of Communication Systems Overview of Communication Systems About Me Studying towards the Masters of Applied Science in Electrical and Computer Engineering. My research area is about implementing a communication framework (software

More information

Bluetooth LE 4.0 and 4.1 (BLE)

Bluetooth LE 4.0 and 4.1 (BLE) Bluetooth LE 4.0 and 4.1 (BLE) Lab 11 Lunch April 23rd, 2014 Noah Klugman Josh Adkins 1 Outline History of Bluetooth Introduction to BLE Architecture Controller Host Applications Power Topology Example:

More information

EDITORIAL: Wireless Networks and Their Applications in Building Automation Systems. Shengwei Wang, PhD Member ASHRAE

EDITORIAL: Wireless Networks and Their Applications in Building Automation Systems. Shengwei Wang, PhD Member ASHRAE VOLUME 14, NUMBER 4 HVAC&R RESEARCH JULY 2008 EDITORIAL: Wireless Networks and Their Applications in Building Automation Systems INTRODUCTION Shengwei Wang, PhD Member ASHRAE In recent years, wireless

More information

Collaborative Middleware for Bluetooth-based ad-hoc Wireless Networks on Symbian OS

Collaborative Middleware for Bluetooth-based ad-hoc Wireless Networks on Symbian OS 6th WSEAS International Conference on E-ACTIVITIES, Tenerife, Spain, December 14-16, 2007 304 Collaborative iddleware for Bluetooth-based ad-hoc Wireless Networks on Symbian OS FENG GAO, ARTIN HOPE Informatics

More information

Essential Bluetooth It s everywhere you want to be

Essential Bluetooth It s everywhere you want to be IEEE OEB Wireless Seminar Fremont, CA - 12/07/02 Essential Bluetooth It s everywhere you want to be Noel Baisa Technical Marketing Manager Device Connectivity Division 408-721 721-74667466 Noel.Baisa Baisa@nsc.com

More information

WIRELESS TECHNOLOGIES FOR THE INTERNET OF THINGS

WIRELESS TECHNOLOGIES FOR THE INTERNET OF THINGS WIRELESS TECHNOLOGIES FOR THE INTERNET OF THINGS MIRKO FRANCESCHINIS Workshop on Scientific Applications for the Internet of Things (IoT) 16-27 March 2015, ICTP Trieste Pervasive Technologies ABOUT ME

More information

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS IEEE 802.11 The standard defines a wireless physical interface and the MAC layer while LLC layer is defined in 802.2. The standardization process, started in 1990, is still going on; some versions are:

More information

Using Bluetooth Scatternet for Automatic Meter Reading: A Wireless Network Application in Telemetry System

Using Bluetooth Scatternet for Automatic Meter Reading: A Wireless Network Application in Telemetry System Using Bluetooth Scatternet for Automatic Meter Reading: A Wireless Network Application in Telemetry System ODAIR PERIANÊZ FERLINE and LUIZ AUGUSTO DE PAULA LIMA JR. Pos Graduate Program on Applied Computer

More information

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross Wireless Networks CSE 3461: Introduction to Computer Networking Reading: 6.1 6.3, Kurose and Ross 1 Wireless Networks Background: Number of wireless (mobile) phone subscribers now exceeds number of wired

More information