Bluetooth Based Household Automation. Michael Johnson. Department of Computer Science

Size: px
Start display at page:

Download "Bluetooth Based Household Automation. Michael Johnson. Department of Computer Science"

Transcription

1 Bluetooth Based Household Automation By Michael Johnson Department of Computer Science Submitted in partial fulfillment of the requirements for the degree of Bachelor of Computer Science Algoma University College Sault Ste. Marie, Ontario April 2008 Michael Johnson 2008

2 T:13, e of Cot terl Chapter 1 Introduction Brief Overview of Bluetooth Technology Project Plan Contribution 3 Chapter 2 Internet and Other Wireless Internet Technologies History of Wireless Communication and its Implementation Types of Wireless Communications Radio Transmission Microwave Transmission Infrared Transmission PANs PAN Connections PAN Networking Internet Applications 9 Chapter 3 Bluetooth History Bluetooth SIG Aim of Bluetooth How Bluetooth Works Applications of Bluetooth Bluetooth Protocol Stack Radio Baseband Link Manager Host Controller Interface Logical Link Control and Adaptation Protocol (L2CAP) RFCOMM Service Discovery Protocol The Wireless Application Protocol (WAP) OBEX Telephony Control Protocol Specification (TCS) 33 Chapter 4 Architecture of Household Automation Roomba Vacuum Roomba History Parts of the Roomba Vacuum The Cleaning Algorithm Power Regulating Circuit Online Availability 40 Chapter 5 Implementation and Experimental Results Issues related to sending commands through Bluetooth General Overview of Project Client-side Application Server-side Application Roomba vacuum 47 ii

3 Chapter 6 Chapter Summary and Future Directions Chapter Summary Future Directions 49 Bibliography Error! Bookmark not defined. Glossary

4 Table of Figures Figure 2.1 The Seven Layers of the OSI Model 8 Figure 3.1 Bluetooth Protocol Stack 17 Figure 3.2 THE WAP Protocol Stack 31 Figure 4.1 Power Regulating Circuit 38 Figure 5.1 Client-Side Application Screenshot 44 Figure 5.2 Server-Side Application Screenshot 46 iv

5 Chapte: 1 Introduction 1.1 Brief Overview of Bluetooth Technology 1.2 Project Plan 1.3 Contribution 1.1 Brief Overview of Bluetooth Technology Bluetooth technology is a newer technology which allows for short range wireless communication. The range Bluetooth technology can handle depends on the devices being used however it is generally between 10 and 100 meters. The technology allows for multiple devices to communicate with each other. Currently, the most common use for Bluetooth technology is the wireless headset for cellular phones or Personal Digital Assistants. Many companies are trying to determine new and different ways to exploit this technology for its products. Those companies see a value that Bluetooth brings to the industry of wireless communication. A lot of these companies which are rivals in certain aspects are actually helping each other out to develop new ways to use Bluetooth. They understand that they may be helping their competitors but they also see more revenue they can generate from this technology. 1

6 1,2 Project Plan In my thesis, I implemented a Bluetooth based system which allows users to control a Roomba vacuum. This system permits the user to visit a specific website from which they can select commands that can be performed by their Roomba vacuum. Once a command is selected, it will be sent from the website to the Roomba vacuum located in their house. This allows the user to complete his vacuuming from anywhere which has access to the Internet which is almost everywhere nowadays. When the system receives the command chosen by the user, it makes a Bluetooth connection with the Roomba vacuum itself to pass the command to the vacuum. This system and the Roomba vacuum will obviously need to stay within the Bluetooth communication range, therefore the system will also need to be located in the user's house. There is no real reason to use a Roomba vacuum other than the fact that it can receive more than a simple on or off command. The reason my thesis is named "Bluetooth Based Household Automation" is because any household appliance could have been used. Therefore it is not limited to the use of a Roomba vacuum. 2

7 1.3 Contribution My thesis shows that it is possible to use a short range wireless technology in a long range manner I have always been interested in network technology and I have very little experience with Bluetooth technology so I think this is a great opportunity to learn a new technology and to see if I can implement it in a real world environment. Bluetooth technology offers a lot of advantages to wireless communication so there is no need to limit its use simply because it is a short range technology. Any web-based or long-range communication to a system can simply be relayed to a central focal point and from there, Bluetooth technology can be used to complete the system and perform the all important task at hand. It is obviously impossible to have complete Bluetooth communication across the Internet due to the range restrictions Bluetooth has, however it is possible to manipulate the needed to data to the point where we can make it a Bluetooth communication. This thesis presents a fully functional system that can be accessed through the Internet and the Roomba vacuum will be manoeuvred by commands chosen from that website. 3

8 Chapter 2!nternet and Other VAi'eless Internet Technoiogies 2.1 History of wireless communication and its implementation 2.2 Types of wireless communications 2.3 Personal Area Networks 2.4 Internet applications 2.1 History of Wireless Communication and its Implementation Ever since wired technologies have been in place, there has been a need to move forward from this by having wireless technologies which would provide all the same functions as the wired technologies but you would be able to add flexibility, mobility and portability. The earliest works of wireless technologies are that of telegraphy which would receive Morse code through an apparatus. Once the data being sent over and the methods to send it were becoming much more complex, these were adapted to the wireless world and new and great ideas were implemented. The first major use of wireless technology was for the use of broadcast radio. The next one would be that of cellular phones which would provide the user with mobility while maintaining the same uses provided by standard telephones. Lastly and more recently, the use of wireless technology to connect to the Internet has been implemented, this ties in with my study on Bluetooth as it will wirelessly communicate with any Bluetooth enabled device and will then be able to send over any data needed. The usefulness of wireless technology will always exist because it will always be seen as an improvement from the norm as it provides the flexibility an end-user would want. 4

9 2.2 Types of Wireless Communications These wireless signals being transmitted can be sent in many different ways. The three most common ones are radio, microwave and infrared [7]. Bluetooth technology uses the 2.4GHz radio frequency band to transmit data. Not only can the frequencies change, but the way the wireless signal is sent can change to, and that obviously directly ties into the use of wireless for the application. The signal can be sent point-to-point which is as it implies, from a single point to another, similar to cellular phone communications. The signal can be sent point-to-multipoint which simply means that the signal will originate from a single location, however the signal will be dispersed to a multitude of locations such as VOIP(Voice over Internet Protocol) or general wireless Internet communications. The signal can be sent through a broadcast which is used by radio and will send its signal out to an intended audience and as is the case with most forms of broadcasting, the user needs to be set to the specific location where the broadcast is being sent to whether it is a television channel or a radio station Radio Transmission Radio transmissions are done by modulation of electromagnetic waves with frequencies below those of visible light. Electromagnetic radiation travels by means of oscillating electromagnetic fields that pass through the air and the vacuum of space. Information is carried by systematically changing some property of the radiated waves such as their amplitude or their frequency. When radio waves pass an electrical conductor, the oscillating fields induce an alternating current in the conductor which is detected and transformed into sound or other signals that carry information. 5

10 2.2.2 Microwave Transmission Microwaves are electromagnetic waves with wavelengths shorter than one meter and longer than one millimeter or frequencies between 300 megahertz and 300 gigahertz. Electromagnetic waves with a lower frequency are radio waves. Bluetooth and wireless technology uses microwaves in the 2.4 GHz ISM band. Cable television and Internet access on coaxial cable as well as broadcast television use some of the lower microwave frequencies Infrared Transmission Infrared is an electromagnetic radiation of a wavelength longer than that of visible light but shorter than that of microwaves. The name means below red because red is the color of visible light with the longest wavelength Infrared transmission is used for many different reasons such as infrared filters, night vision, tracking, heating and communication. Remote controls are a popular infrared communication device. The device uses an infrared LED to emit infrared radiation which is focused by a plastic lens into a narrow beam. The beam is modulated to encode the data. The receiver uses a silicon photodiode to convert the infrared radiation to an electric current. It responds only to the rapidly pulsing signal created by the transmitter and simply omits the slowly changing infrared radiation from ambient light. 6

11 2.3 PANs PAN Connections A Personal Area Network (PAN) works a lot like a Local Area Network (LAN), however instead of the location of the network being confined to a small location, it is confined to one's self. These can sometimes be referred to as a Wireless Personal Area Network (WPAN) due to the fact the device it is attached to is mobile. The PAN is very popular with Bluetooth technology as the technology range is very limited. These Bluetooth devices typically offer a communications range of approximately 10 meters but under ideal conditions, this can reach up to 100 meters. At this relatively small distance, these small portable devices can conserve their limited battery power and reuse their bandwidth. To be defined as a PAN, it must meet the following requirements: 1) It must allow devices to share information 2) It must have low power consumption 3) It must be able to frequently make and break connections for mobility 4) It needs to allow resource discovery and use and lastly, 5) It needs to incorporate international regulations for global interoperability. A PAN can use various communications channels, including electric, magnetic, optical and electromagnetic channels [8]. 7

12 2.3.2 PAC: Eletwor:cing The Open Systems Interconnect (OSI) model explicitly defines how to incorporate devices into computer network systems. It describes the functions of multiple layers that can be developed independently but still function cohesively. The OSI is a seven layer model as shown in Figure 2.1 [12]. Ap atlanlayer Presentation Layer Session Layer- Transport Layer Network Layer The Oats Link Layer The PiYysieal The seven layers of the 051 Model Figure 2.1 The Seven Layers of the OSI Model For personal area networking, only four of these are important. The physical layer transfers unstructured bits across a communication channel The Data Link layer establishes connections and provides reliable data transmissions. The Network layer provides logical addressing and data transmission services to the upper layers independent of the physical and data link methods used. The Application layer provides services such as file transfer to the software running on the system. On the physical layer, the medium most commonly used for PANs is the 2.4 GHz radio band. This medium effectively takes care of the lower layers by establishing the link and channel over which information flows from one device to another. Embedding a radio in a device establishes llie physical connections but the devices also need an acceptable format for transmitting 8

13 the data so they can share data, applications and resources. This requirement involves the upper layers. Since mobile devices are small, portable and wireless, they have unique requirements for data formatting and transmission. 2.4 Internet Applications Internet applications are web based applications that have the features and functionality of traditional desktop applications. They typically transfer the processing necessary for the user interface to the web client but keep the bulk of the data on the application server. Internet applications typically run in a web browser and do not require any software to be installed and they also run locally in a secure environment which is called a sandbox. Traditional web applications centered all activity around a client-server architecture. Under this architecture, all processing is done on the server and the client is only used to display static content. The biggest drawback with this setup is that all interaction with the application must pass through the server which requires data to be sent to the server, the server to respond and the page to be reloaded on the client with the response. There are many benefits for the user to use an Internet Application. For example: G Installations are not required Distribution and updates of the application is an instant and automated process Upgrades to new versions are automatic The application can be used as long as the user has an interne connection and it does not matter what operating system is being used. Web-based applications are generally less prone to infections when compared to an actual executable \ long with the benefits of using Internet applications, there are always some drawbacks ) this, if not every application would be a web application. 9

14 The use of a sandbox may cause some problems with restrict access to system resources Scripting languages such as JavaScript are required and it is possible the user has disabled scripting in their browser To achieve platform independence, some Internet Applications use client-side scripts which can cause performance issues 10

15 Chapter 3 Bluetooth 3.1 History 3.2 SIG 3.3 Aim of Bluetooth 3.4 How Bluetooth works 3.5 Applications of Bluetooth 3.6 The Protocol Stack 30 1 History Bluetooth technologies were initiated by Ericsson in 1994 as a means to eliminate wire clutter in homes and offices. Ericsson is a Swedish based company that is famous for its cellular phone services. Most recently, Ericsson has joined forces with the popular Japanese company Sony to foiin the joint venture of Sony Ericsson. Ericsson had interestingly coined the term Bluetooth after their Scandinavian heritage. The Danish king Harald "Bluetooth" Blátand had united Denmark and Norway, who were at war at the times, and he brought Christianity to Scandinavia. The base idea behind Bluetooth technologies was to unite computer devices and telecommunications. The King's nickname was simply for his love of blueberries and the legend states that he loved them so much that his teeth were stained blue. 11

16 3.2 Bluetooth SIG The Special Interest Group (SIG) was founded in February 1998 by major companies such as Ericsson Mobile Communications, Intel, IBM, Toshiba and Nokia Mobile Phones [6]. The SIG's main focus is to oversee the development of Bluetooth standards and the licensing of the technologies and trademarks to manufacturers. By July 1999, the core promoters had published the first version of the Bluetooth specifications. By December 1999, four more major companies had joined the Bluetooth SIG, and those companies were Microsoft, Lucent, 3COM and Motorola. It may not be clear at first why all these companies would want to work together with Bluetooth because some of these companies are in direct competition with each other. However, all involved companies stand to have something to gain from being a part of the SIG. The implementation of Bluetooth and the overall improvement of mobile device communication will allow all parties involved to sell devices with enhanced functionality. For the Bluetooth promoters group, making Bluetooth an open specification rather than keeping it restricted and proprietary is more beneficial because the consumers are more likely to adapt to a new technology if it is available through many major manufacturers rather than only having a select few carry the product. As of January 2008, the Bluetooth SIG has grown to over 10,000 member companies and these companies are industry leaders in telecommunications, computing, automotive, music, apparel and industrial automation. 12

17 3.3 Aim of Bluetooth The SIG had developed a specific set of goals Bluetooth had to achieve in order to become successful. Bluetooth was tagged as a cable replacement technology so in order for it to be implemented, it could not be more expensive than the cable that it was replacing. The use of Bluetooth needed to be as simple and convenient as plugging in the cable it was replacing and it must just as reliable. Being a wireless technology, it also needed to be able to cope with any errors it received. It was to work with mobile devices so it needed to be able to run on batteries, use very low power and should run on low voltage. It also needed to be lightweight and had to be small enough so it would not disrupt the design of cellular phones, headsets and Personal Digital Assistants. Bluetooth aims to be widely available, inexpensive, convenient, easy to use, reliable, small and low power. If it was to achieve all these goals, the SIG knew it would be a success for any company that was involved with it. 3.4 How Bluetooth Works Bluetooth devices operate at the very popular 2.4 GHz in the globally available, licencefree ISM (industrial, scientific and medical) band. Because so many devices use this frequency, Bluetooth had to implement a frequency hopping algorithm that would reduce transmission interference. Bluetooth operates in a master-slave environment so a Bluetooth device can take on the role of a master or a slave. The master sets the frequency hopping sequence while slaves simply synchronise to the master in time and frequency. Every Bluetooth device has a unique Bluetooth device address and a 1), luetooth clock. The baseband part of the specification describes the algorithm which calculate a frequency hop sequence from the device address and clock. When slaves 13

18 connect to a master, they are given the master's device address and clock because all slaves use the master's clock and address so that they are all synchronised to the same frequency hop sequence. The master also controls when devices are allowed to transmit. The master allows slaves to transmit by allocating slots for voice traffic or data traffic. For data traffic slots, slaves are only allowed to transmit when they are replying to a transmission sent to them by the master. For voice traffic slots, slaves must regularly transmit in reserved slots whether or not they are replying to the master. The number of time slots each device gets depends on its data transfer requirements. The next major concept in Bluetooth is that of Piconets and Scattemets. A collection of slaves operating with one common master is referred to as a piconet. All devices on a piconet follow the frequency hopping sequence and timing of the master. The slaves in a piconet only have links to the master and there are no direct links between slaves. The specification limits the number of slaves in a piconet to seven. It is possible to have a larger coverage area or a greater number of network members by linking piconets into a scatternet, where some devices are members of more than one piconet. When a device is present in more than one piconet, it must time share by spending a few slots on one piconet and a few slots on the other. It is possible to have a scatternet where one device is a slave in one piconet and a master in another. It can also happen where a device is a slave in both piconets. However, it is not possible to have a device that is a master of two different piconets and that is because all slaves in a piconet are synchronised to the master's hop sequence and two piconets cannot have the same hop sequence. Along with interference that was previously mentioned, having large amounts of piconets in the same area may also cause interference since there may be a frequency collision at a specific hop in the sequence of two separate piconets. The data transmitted during that collision 14

19 will be lost and will need to be retransmitted so the more piconets in an area, the more likely retransmissions will be needed causing data rates to fall. This can be compared to having a conversation in a noisy room. The noisier the room, the more likely you will need to repeat yourself. 3.5 Applications of Bluetooth Another important job of the Bluetooth SIG is to identify the various usage models within the Bluetooth environment and to assign a specific group to a certain working group. Each working group is responsible for defining specifications that control the development of Bluetooth enabled products within a particular technology or application area. In this section, a bit more detail will be given concerning what each working group is responsible for [2]. The Audio/Video working group needs to define Audio/Video protocols and profiles that make Bluetooth the low cost, low power, globally available wireless standard without having to compromise quality or range. The Car Profile working group is responsible for ensuring device interoperability in a vehicle environment using Bluetooth specifications. The Coexistence at 2.4GHz working group is responsible for ensuring that Bluetooth products can operate successfully in the ever popular and unlicensed radio spectrum without experiencing difficulties from wireless LANs, cordless telephones and other radio products. 15

20 The Extended Service Discovery Profile working group needs to provide mappings of industry Service Discovery Protocols. The mappings are discovered using the Bluetooth SDP(Service Discovery Protocol). The Human Interface Device working group ensures that user friendly Bluetooth enabled devices such as keyboards, pointing devices, gaming devices and monitoring devices are compatible with each other, easy for consumers to use and most importantly affordable. The Imaging working group defines the minimal requirements and generic functions necessary which will enable the exchange of digital images between devices. On the destination end, the images will be displayed, stored, printed or sent to another location viva Bluetooth data access point. The Local Positioning working groups is to develop a location descriptor in order to provide information that other applications can use to determine location. I he Personal Area Networking working group is concerned with the issues of creating (1-hoc, mobile IP-based personal area networks and the security issues that follow these lictworks. < inting working group must develop specifications to ensure that Bluetooth printers 1 I <<I ways be able to interoperate with other devices to some level of printing capability. Idio 2.0 working group has the responsibility to recommend improvements to the 1 [I I ), Itic.tooth radio specifications (Radio 1.0) in the development of a new and 16

21 expanded radio standard. Radio 2.0 will not replace Radio 1.0 but will rather add a set of optional extensions to the older specifications. The Unrestricted Digital Information Extension for Japanese 3G Handset working group is to provide a standard profile that enables the UDI transfer service of the 3G cellular phone system to external devices connected to the 3G cellular phone handsets via Bluetooth. All these working groups were implemented by the SIG to ensure that Bluetooth technologies would be able to integrate with day to day applications. They also wanted to make sure these integrations stayed current as the applications they work with were also being modified. 3.6 Bluetooth Protocol Stack rilivcal. OI3EX AT- Commands ICS 131N RFCOMM 6111MNIMMEME111 _, Audio Host Controller Inter face LMP Figure 3.1 Bluetooth Protocol Stack 'ii v of the main features Bluetooth offers is that it allows devices from different Hitheturers to work with one another. To this end, Bluetooth does not just define a 17

22 radio system, but it also defines a software stack to enable applications to find other Bluetooth devices in the area, discover what services they can offer and use those services. The Bluetooth stack is defined as a series of layers, though there are some features that cross several layers [1] Radio The previously mentioned frequency hopping is performed in this layer to ensure that there is no collision at the same frequency. Modulation is also performed at the radio layer, this is where the operating band is separated into different spaced channels. The operating band of 83.5MHz is divided into 1 MHz spaced channels, each signalling data at 1 M symbols per second as to obtain the maximum available channel bandwidth. Power emission and control is also performed at the radio layer. Regulations have allowed Bluetooth to create three power classes. Power Class 3 is the most common scheme adopted by manufacturers and it is the lowest power consumption option. It uses only 1mW of output power. Power Class 2 is the least used type however it offers a max output power of 2.5mW. Power Class 1 has a mandatory requirement for power control, while classes 2 or 3 make this optional. Power Class 1 has a maximum output power of nomw however it will allow for a range of up to 100 meters Baseband lc radio interfaces between the on-air channel medium and the digital baseband, which 'Inlats data supplied by the Link Controller for robust and reliable transmission over the '' 1 1), 1 and retrieves data from the channel for passing up the stack. The baseband is ble for channel coding and decoding and low level timing control and, n- lent of the link within the domain of a single data packet transfer. The Bluetooth 18

23 Device Address is also specified at the baseband layer, the address is a 48 bit IEEE MAC address. The address is split into three different parts, the Non-significant Address Part (NAP), the Upper Address Part (UAP) and the Lower Address Part (LAP). The NAP is 16 bits long and is used to initialise the encryption engine stream LFSR(linear feedback shift register). The UAP is 8 bits long and is used to initialise the HEC(Header Error Check) and CRC(Cyclic Redundancy Check) calculations and for frequency hopping. The LAP is 24 bits long and is used by sync word generation and frequency hopping. A link is also established between a device acting as Master and a device acting as Slave at the baseband level. Once that link has been made, there are two basic types of data packets that may be exchanged, each is characterised by the two following link types. An ACL(Asynchronous Connection-Less) link exists between a Master and a Slave as soon as a connection has been established. A Master may have a number of ACL links to a number of Slaves at any one time but only one link can exist between two devices. An ACL link will prove a packet-switched connection where data is exchanged at undefined times. The choice of which Slave to transmit to and receive from is up to the Master device on a slot by slot basis so both asynchronous and isochronous (time bounded) services are possible. Most ACL packets facilitate error checking and retransmission to assure data integrity. A SCO(Synchronous Connection Oriented) link is very different than an ACL since it Provides a symmetric link between Master and Slave with a reserved channel bandwidth and regular periodic exchange of data in the form of reserved slots. The SCO link 19

24 provides a circuit-switched connection where data is regularly exchanged and is intended for use with time-bounded information such as audio. The last major part of the baseband layer is to perform channel coding. Since Bluetooth is only designed to work over a line of sight link and the data rates are relatively modest for the signalling bandwidth, the necessary coding is not too complex. The coding applied to the data bit stream in Bluetooth consists of Cyclic Redundancy Check and header Error Check. A CRC is performed on all packet headers and on ACL payload data to validate the integrity of the received data. The 8 bit HEC is calculated over the packet header before applying FEC which will be explained shortly. The cipher stream, which is sourced by the encryption engine, is simply exclusive OR'd into the bitstream data path. Whitening is also performed, where a pseudo-random bit sequence with the data bitstream to randomize the data. This is done to reduce the possibility of long sequences of zeros or ones. The last channel coding part is to Forward Error Correction (FEC). This is done by adding extra parity bits created from the input data, a number of bit errors in the data may be detected and corrected. 20

25 3.6.3 Link Manager The diagram presented at the beginning of this chapter referred to this part as LMP which stands for the Link Management Protocol which is what the Link Manager uses to perform its duties. The host drives a Bluetooth device through Host Controller Interface commands but it is the Link Manager that translates those commands into operations at the baseband level. The Link Manager must manage many operations such as attaching slaves to a piconet and allocating their active member addresses. They must also handle the opposite where they need to break connections to detach slaves from a piconet. The Link Manager is also in charge of configuring the link which includes controlling master/slave switches where both devices must simultaneously change roles. It must also establish the ACL and SCO links mentioned in the previous section. It will also put connections into low-power mode for energy conservation. Link Managers communicate with others on other devices using the Link Manager Protocol, this defines a set of messages which are passed between Link Managers. Every LMP message begins with a single bit transaction identifier. This bit simply states who is initiating the transaction, it will be a 0 if a master initiated and a 1 if a slave initiated the transaction. After the transaction ID, a 7 bit Operation Code follows which identifies the type of LMP message being sent. The Operation Code is finally followed by the message's parameters, each of which occupies an integral number of bytes. The Link Manager is responsible for setting up and managing the baseband connections that link I luetooth devices. It establishes ACL links by controlling the baseband then LMP 111L-ssages can be used to establish a SCO link across an existing ACL connection. 21

26 Whenever a master or a slave wishes to shut down a link, it will send an LMP detach command This will be done if a user ended the connection, the device has low resources or it is about to power off. When a slave has been detached from a piconet, the master can reuse the slave's active member address to identify a new slave. If a slave did not detach properly, this could cause problems with two slaves trying to respond to the same active member address so the Link Manager will initiate a procedure to ensure that a slave is fully detached before its address can be reused. The Bluetooth baseband includes an encryption key generation and cipher engine. For encryption and decryption, this engine must be configured and controlled by higher layers and that control must be synchronised at both ends of the link. LMP provides the mechanism for negotiating encryption modes and coordinating encryption keys used by devices at either end Host Controller Interface Some Bluetooth systems will have the baseband and Link Manager on one processor while higher layers and applications are running on a separate host processor. In systems where the higher layers are run on a host device's processor and lower layers on a Bluetooth device, an interface is needed between the higher and lower layers. The Bluetooth standard defined the Host Controller Interface. A device such as a Bluetooth card for a PC may use the HCI to separate upper and lower layers because hosts such as PCs have spare capacity to handle the higher layers which then allows the Bluetooth d e vice to have less memory and a less powerful processor. The HCI interface is also Ieful for test and type approval of Bluetooth devices. By standardising the HCI, this I lows drivers to be written which can be used with a variety of Bluetooth modules from I Fferent manufacturers. It also provides a standard test interface which can be used for 22

27 the radio and lower portions of the stack. All Bluetooth devices are not split between processors, some devices such as headsets run all the layers on one processor. These single-processor devices still need to support an HCI for test purposes. HCI commands are used by the host to control the Bluetooth module and to monitor its status. There are only three types of HCI packets and these packets are carried on the HCI transport layer. A command packet used by the host to control the module. e An event packet used by the module to inform the host of changes in the lower layers A data packet to pass voice and data between host and module. There are some HCI transport interfaces that offer data rates much larger than the data rate across the Bluetooth radio and air interfaces, so a host can pass data down faster than it can be transmitted out of the module. A mechanism is needed to slow down data transport across the HCI only when the module's buffers are overloaded and to allow the transport layer to run at full speed the rest of the time. Bluetooth solves this problem H Providing flow control of the HCI. Each time a command is sent to the Bluetooth Ili( glide, the module responds with a command saying it can either complete the task iqdiately or not. If it cannot complete the task, it will send a notification when it is pleted. The host will then query to find out how many command packets the module iffer and it will not send more than that amount without having received a i on notification from the module. 23

28 3.6.5 Logical Link Control and 4%daptation Protocol (L2CAP) The logical link control and adaptation protocol takes data from higher layers of the Bluetooth stack and from applications and sends it over the lower layers of the stack. It passes the packets either to the Host Controller Interface or in a host-less system, to the Link Manager. L2CAP has many functions which include multiplexing between different higher layer protocols which allows them to share lower layer links, it segments and reassembles larger packets to allow transfer when lower layers do not support the large size. It also provides group management which provides a one-way transmission to a group of other Bluetooth devices and ensures quality of service for higher layer protocols. Once an L2CAP connection is established, it needs to be configured. Only certain parameters can be configured between the two devices, those are the Maximum Transmission Unit, the Flush Timeout and the quality of service. The MTU is the maximum size in bytes of packet payload a device is willing to accept. If the MTU requested is larger than a device can support, it will reject the request with a reject packet containing the MTU it can handle. The flush timeout gives the amount of time in milliseconds that a device will spend trying to transmit an L2CAP packet segment before it gives up. If a packet segment does not get through before the flush timeout is exceeded, the segment cannot get through and the V, hole packet is flushed or thrown away. quality of service option can select best effort or a guaranteed quality of service. iously, it is impossible to have a guaranteed quality of service with a wireless link (ke of the possibility of interference so it can only configure the channel so that it 24

29 does not compromise QoS by accepting more traffic than it can handle. The transmitting device tells the receiving device what quality of service it will implement. Higher layer protocols use packet sizes larger than those which Bluetooth can handle so L2CAP provides segmentation of higher layer packets going down the stack and reassembles them as they pass up the stack. L2CAP packets are very large, carrying up to 65,535 bytes of data while HCI uses smaller packets. The actual size of the packet is implementation independent however the specification says that all implementation must support packets carrying up to 255 bytes of data. It becomes clear that the L2CAP may need to be segmented into many HCI packets and the same will need to be done for reassembling the packets on their way back up the stack. Lastly, no matter on the application, they must use L2CAP to send data along with many of the higher layers so this layer has become a mandatory part of any Bluetooth system. 25

30 3.6.6 RFCOMM RS-232 serial ports have nine circuits, which can be used for transferring data and signalling. RFCOMM can emulate the serial cable line settings and status of an RS-232 serial port. RFCOMM provides multiple concurrent connections by relying on L2CAP to handle multiplexing over single connections and to provide connections to multiple devices. RFCOMM relies on the baseband to provide reliable in-sequence delivery of byte streams. It does not have any ability to correct errors. RFCOMM data rates will be limited in devices where there is a physical serial port involved, type 2 devices. Implementations may optionally pace data on virtual serial ports in type 1 devices. RFCOMM is a simple, reliable transport protocol with framing, multiplexing and additional provisions such as modem status, remote line status, remote port settings, parameter negotiation and optional credit based flow control. Serial port transmit and receive data lines are to a Universal Asynchronous Receiver Transmitter (UART). The job of the UART is to convert between the serial data sent down cables and the parallel data processing which devices use. UARTs use buffers to convert between serial and parallel data. This allows them to reduce the load on the processor. The UART transfers the bits between the cables and buffers, then the processor only needs to get involved when there is a whole buffer to deal with. The RFCOMM specification mentions emulating the nine circuits of an RS-232 serial port and specifies how a serial data stream can be emulated. Since the serial stream from an RS-232 port is viewed by the microprocessor after it has been through a UART, software dealing with serial ports is actually handling parallel data. Similarly, RFCOMM software deals with parallel data delivered by the lower layers of the Bluetooth stack. 26

31 RFCOOM handles two types of devices. Type 1 devices are internal emulated serial port and type 2 devices are intermediate devices with physical serial ports. For the type 1 device, the port emulation entity maps a system specific communication interface to the RFCOMM services. This can be used to connect to legacy applications or it can be used to connect to applications specifically written for Bluetooth. A type 1 device would usually be the end of a communication path such as a computer or a printer. For the type 2 device, the port proxy entity relays data from RFCOMM to an external RS-232 interface linked to another device. Type 2 devices are intermediate devices which sit in the middle of a communication path such as a modem. Since RFCOMM frames are carried in the payload of L2CAP packets, an L2CAP connection must be set up before and RFCOMM connection can be set up. RFCOMM has a reserved Protocol and Service Multiplexer (PSM) value which is used by L2CAP to identify RFCOMM traffic. The RFCOMM PSM is defined in the Bluetooth core specification as 0x0003. Any L2CAP frames received with this value in the PSM field will be sent to RFCOMM for processing. The first frame to be sent on an RFCOMM channel is a Start Asynchronous Balanced Mode frame, if the responding device's RFCOMM is willing to connect, it goes into Asynchronous Balanced Mode and sends back an Unnumbered Acknowledgement frame. If the responding device's RFCOMM does not want to connect, it refuses the connection by sending a Disconnected Mode frame. Bluetooth devices offering services supported by RFCOMM must have an entry in their service discovery database which gives information on how to connect over RFCOMM. RFCOMM server channel numbers are dynamic meaning the channel number can change however it will not due so while it is in use. It can be reallocated when the service is not 27

32 in use. The minimum information required to connect to a service over RFCOMM is a service name, needed to identify the type of service, and a channel number on which to transfer data. By querying Service Discovery Protocol records, a device can find out all the information it needs to connect to a service thru RFCOMM Service Discovery Protocol When using a Local Area Network, you can connect to a printer and once found, it stays in place for a great length of time. Bluetooth is designed to allow the user to walk in without any pre-configured settings, use the printer and leave forgetting all its details. The Service Discovery Protocol (SDP) allows this to happen. SDP provides the means to browse through the range of services Bluetooth devices in the area can offer. SDP relies on L2CAP links being established between SDP client and server. Once an L2CAP link has been established, it can be used to find out about services and how to connect to them. An SDP server is any Bluetooth device which offers a service or services to other devices. Infonnation about services is maintained in SDP database. Each SDP server maintains its own database, there is no centralized database. SDP clients use services provided by servers. To allow them to do this, servers and clients exchange information about services using service records. The SDP database is a set of record describing all the services which a Bluetooth device can offer to another device. SDP provides the means for another device to look at these r ecords. An SDP service is described by service attribute, which provide the information Client needs to use the service. Each attribute in the record describes a different aspect ''f a service. Bluetooth version 1.0b standards defined twenty-eight types of attributes. 28

33 Some of the attributes are specific to Bluetooth profiles. It is likely as more profiles are defined, more types of attributes will be defined for them. Attributes have values and those values can have various types and sizes. Attributes are sent in data elements which begin with data element descriptors that describe the type and size of the attribute being sent. A service record holds all the information a server provides to describe a service, which illustrates how a service record is made up. To make it easier to find the service you want, services are arranged in a hierarchy structured as a tree which can be browsed. Clients begin by examining the root of the hierarchy then follow it down to the leaf nodes where the individual services are described. It is up to each service provider to decide what services will be searchable and how the hierarchy will be constructed. A Universally Unique Identifier (UUID) is a 128 bit number and each record has a UUID attribute. These are used to search for a record. The Bluetooth standard specifies UUIDs for the attributes needed for the Bluetooth profiles. The Bluetooth specification's UUIDs are likely to be used a lot so to save bandwidth transferring them and storing them, they can be shortened to a 32 bit or 16 bit faun. This can be done because all the Bluetooth specification's UUIDs are based in the same Bluetooth base UUID. A manufacturer defining a new service is allowed to allocate its own UUIDs. This could easily lead to clashes of IDs so SDP uses a method of allocating UUIDs which makes them extremely unlikely to be duplicated. 29

34 3.6.8 The Wireless Application Protocol (WAP) The wireless application protocol is a wireless protocol that allows mobile devices to use data service and access the Internet. WAP can work with a variety of different wireless technologies, each of which connects at the bottom of the WAP stack as a bearer. Bluetooth simply provides another possible bearer beneath the WAP stack. In the same way Bluetooth has the SIG, WAP has the WAP forum. The WAP forum brings together companies from all parts of the wireless industry to define WAP standards and to help ensure interoperability between WAP products. Bluetooth has not been formally adopted as a bearer layer by the WAP forum. This does not mean that there will be no standards for interoperability between WAP-enabled Bluetooth products. The Bluetooth specification includes a section on how to interoperate with WAP and the Bluetooth SIG is working with the WAP forum to help ensure interoperability of Bluetooth and WAP. WAP supports a client/server architecture. The client communicates with a server using the WAP protocols. WAP enabled client devices can use microbrowsers. These are specially designed web browsers that fit onto mobile devices such as a cellular phones. A microbrowser is designed to work with a small screen and to use less memory than a browser running on a desktop PC. WAP supports such facilities through the Wireless Markup Language (WML). This works in similar ways to HTML however WML is designed to cope with the smaller screen sizes typically found on today's mobile devices. Content providers on the Internet are providing WAP pages because it allows them to access a huge market of mobile customers. The market for WAP services extends much further than this because around twice as many mobile phones are sold as desktop PCs so there will be a huge demand for this technology once these mobile devices becomes smart phones. Many people who do not have a PC will be able to access the World Wide Web through their mobile phone. WAP does not just work with phones, pagers and 30

35 personal digital assistants are obvious candidates to work with WAP. In fact, any device with a display screen and the ability to support a wireless connection could be turned into a WAP device. Application Layer (WAE) Other Services and Applications Session Layer (VISP) Transaction Layer (WTP) Security Layer (WTLS) Transport Layer (WDP) E3,nrffs: GSM 1S-136 I COMA PHS CDPD I PDC-P iden j FLEX Etc... Figure 3.2 THE WAP Protocol Stack WAP has defined its own stack which is used at a higher layer in the Bluetooth stack. It takes the layered approach much like other networking technologies such as the OSI model and the Bluetooth stack. o WAE: Provides a user interface, typically a microbrowser which was described earlier o WSP: Supports the session between a WAP client and the WAP server WTP: Provides a reliable transaction layer for the session layer. It is possible there is no need for WTP if the layers below the session provide a reliable service. For example, since Bluetooth baseband provides a reliable transport, there is no need for WTP when Bluetooth is used as a bearer for WAP WTLS: Provides security. This layer can also be omitted for applications which do not require more security than the Bluetooth baseband provides. 31

36 The last layer WDP(Wireless Datagram Protocol) is joined with Bluetooth by three Internet protocols, shown in the Bluetooth stack, which allow datagrams to be sent across Bluetooth's RFCOMM serial port emulation layer. UDP(User Datagram Protocol): Provides an unreliable, connectionless datagram transport IP(Internet Protocol): A protocol which supports addressing, routing, segmentation and the reassembly of packets PPP(Point to Point Protocol): A client/server based packet transport system commonly used on dial-up links to carry IP packets OBEX Object Exchange (OBEX) is a binary protocol designed to allow a variety of devices to exchange data simply and spontaneously. Spontaneity is important for Bluetooth where short duration ad-hoc connections can be setup. OBEX has a client/server architecture and allows a client to push data to a server or pull data from a server. OBEX packets are carried in RFCOMM frames. The data part of an RFCOMM frame is just an undifferentiated byte stream so the receiving OBEX implementation must sort this byte stream into packets. This is not too difficult because all OBEX packets include a length field which can be used to determine where one packet ends and the next one starts. Applications which are going to exchange data need to agree on a standard way of representing it. The object model fills this need by defining a series of headers which can!bold data objects and information about them. Each header carries a piece of information tn out the object or in the case of body headers, it can carry the object itself. The OBEX ''sion protocol describes how two OBEX clients and servers can communicate by 32

37 exchanging request and response messages. The client sends requests and the server sends responses. OBEX has six defined operations which are e Connect: Used to set up an OBEX connection Disconnect: Used to close an OBEX connection Put: Used to send an object Get: Used to request an object SetPath: Used to set the directory on the receiving side Abort: User to terminate an operation before it would noimally finish Telephony Control Protocol Specification (TCS) TCS defines how telephone calls should be sent across a Bluetooth link. It gives guidelines for the signalling needed to set up both point to point and point to multipoint calls. Telephony control relies upon the presence of a speech synchronisation and control system which can be used to set up speech paths through the baseband using SCO links. Telephony control is split up into four parts. e Call Control: handles connection and disconnection Group Management: handles groups of devices. This part manages inquiry, paging and scanning Connectionless: handles broadcast information o Protocol discrimination: handles directing messages between the other parts of TCS and L2CAP 33

38 TCS is driven by a telephony application which provides the user interface and provides the source of voice or data transferred across the connections set up by TCS. The specification for TCS suggests that multiple calls could be handled by running multiple instances of TCS, each with their own L2CAP channel identifier. TCS can be used to join devices in a Wireless User Group (WUG). A piconet Master acts as the WUG Master and handles pairing to all devices which join the WUG. Devices in a WUG can request connections directly to one another, allowing calls to be set up faster than if they were not in the WUG. TCS does not define handover of calls from one device to another. It also does not provide a mechanism for groups of devices to enter into conference calls, only point to point links are supported. 34

39 Chapter E, Architecture of Household.,LL/omation 4.1 Roomba Vacuum 4.2 Power regulating circuit 4.3 Online availability 401 Roomba Vacuum The Roomba vacuum is a robotic vacuum cleaner that is sold by the irobot company. The following subsections will provide some history on the vacuum, a description of the parts of the vacuum, and the cleaning algorithm the vacuum uses Roomba History The first Roomba vacuum was released in 2002 with updates and new models being released every year since. The irobot Corporation, which manufactures the Roomba vacuum, sells and designs many robots. The company was founded by Rodney Brooks, Colin Angle, and Helen Greiner after they all had worked in MIT's Artificial Intelligence lab. The company did not succeed from its inception in 1991 till the release of the koomba vacuum in After the success the company had with the Roomba vacuum, they decided to continue by designing other robots that perform cleaning tasks. irobot `Lsigned the Scooba which is a floor washing robot, the Dirt Dog which is used to pick objects from shop floors, the Verro which is a swimming pool cleaning robot k I lastly, the Looj which is a gutter cleaning robot [9]. 35

40 . t Parts of the Roomba Vacuum The Roomba vacuum is a circular vacuum one foot in diameter and is moved by two tracked wheels that reside below the unit. It contains all the normal parts to perform all necessary cleaning duties. It has a dirt storage bin, a vacuum inlet and a main cleaning deck. A Roomba runs on a rechargeable NiMH(Nickel Metal Hydride) battery which works at approximately 18 volts. When the battery is fully charged, it can vacuum for 2 hours. The vacuum has 5 motors built in, one driving each wheel (2 in total), one driving the vacuum, one driving the spinning side brush and one driving the agitator assembly. The most intriguing part of the Roomba vacuum is how the vacuum can seamlessly navigate. Roomba uses irobot's AWARE Robotic Intelligence System to make any decisions needed so that minimal human input is required. The AWARE system is made up of multiple sensors that pick up environmental data. They send this data to the microprocessor and the Roomba will adapt accordingly. According to irobot, the system can adapt to new input up to 67 times per second. There are two different types of sensors that are mounted on the vacuum. There are 4 cliff sensors which constantly send out infrared signals and Roomba expects them to immediately bounce back. If these signals are not returned, the vacuum knows its approaching a cliff and will change its direction right away. The other two sensors are object sensors. These sensors are activated when a bumper is retracted which tells the vacuum that it has encountered an obstacle. The Vacuum will then perform the actions of backing up, rotating and moving forward epeatedly until it finds a clear path. 36

41 4.1.3 The Cleaning Algorithm Once instructed to clean, the vacuum will begin to move in a spiral motion to determine the size of the room. It will head towards the perimeter of the room once it receives data from the sensors. It will begin to move around the perimeter of the room until it bumps into an object. Once it bumps into an object, it will maneuver around it and find a clear path and continue to perform its cleaning duties. The vacuum is given a certain amount of time to perform its job however it takes the approach that it should cover the entire floor before the allotted time expires. The only issue with that approach is that completely covering the entire floor is pretty much hit or miss. An extra feature available for some Roombas is an available docking station which will allow the vacuum to dock and undock itself to recharge its battery. When the battery power gets low, the vacuum starts looking for an infrared signal emitted by the charger. Once found, the vacuum follows the signal and will go dock itself to the charger. Some vacuums may even head back out to finish cleaning once they are fully recharged. 37

42 4.2 Power egulatin Circuit Ft: I 2 "E4.02%:::i 0:111. Figure 4.1 Power Regulating Circuit This circuit is needed to regulate the voltage provided from the Roomba vacuum to power the BlueSMiRF Bluetooth modem. The Bluetooth modem is attached to the vacuum through an 8-pin mini-din serial cable which can be found on many Macintosh computers. The voltage that is provided by the vacuum's battery is 16 volts, but only 5 volts are required to power the Bluetooth modem. Therefore the voltage must be reduced and accurately regulated to the required 5 volts to provide stable power with the correct 'cage to the Bluetooth modem. Both the cable connected to the vacuum and the n(qooth modem are connected to ground and the voltage regulator. There are only two cs which connect the vacuum and the Bluetooth, TXD and RXD. TXD stands for Ltnsmit Data and this is used with serial cable connections so any data sent from the U 01 to the modem is sent through this wire. RXD stands for Receive Data and this 38

43 wire will receive any information sent from the Bluetooth modem to the vacuum. At the Bluetooth end, the TXD signal connects into the RX-I input which is the serial input or the Receive into the B1ueSMiRF. The RXD signal connects into the TX-0 input which is serial output or the Transmit from the BIueSMiRF. The CTS-I and RTS-O connections are connected together because they are not used in this case. CTS-I is Clear-To-Send into the BIueSMiRF while RTS-O is Ready-To-Send from BIueSMiRF and both are used for hardware flow control which is not a necessary component for this project. The circuit did not require the use of an 8 pin mini-din serial cable - it could have used a 7 pin cable and there is an conversion chart available to change from an 8 pin setup to a 7 pin setup. Once the one end of the serial cable was cut to incorporate it into the circuit, a voltmeter was required to determine which wire corresponded with which pin to create the connection. This is a critical task since a minor mix up between wires could cause the circuit to simply lose the data sent to or from the device. This would not cause an error and so would be very difficult to determine the origin of the problem. More importantly, if the ground and power wires were accidentally inverted, this could cause significant damage to the Bluetooth modem. 39

44 4.3 Online Availability The interesting portion of this project is the fact that the Bluetooth technology can be extended so that the vacuum can be operated from anywhere with an interne connection. The user will be connecting to a specified server and the Roomba will be controlled from that server. The distance restriction will need to be followed from the server end to the Roomba vacuum. Open source software XAMPP is used to help host the server end. XAMPP is a free, cross-platform web server consisting mainly of the Apache HTTP Server, MySQL database and interpreters for scripts written in PHP and Perl programming languages. XAMPP stands for: X: X refers to the four operating systems( Windows, Linux, Sun Solaris and Mac OS X) A: Apache M: MySQL P: PHP P: Perl The webpage is an HTML page that has some java code integrated as an applet. The applet allows the user to control the vacuum. It simply reads in the command entered and sends that command to the vacuum to perform [3]. 40

45 if (state WAITING) { theoutput = "Welcome... Server connection established"; state = SENTWELCOME; //change into a command state } else if (state SENTWELCOME) { //Read sent command if (theinput.equalsignorecase(" forward")) { //SEND FORWARD COMMAND reseset(); rc.control(); rc.goforward(); state = WAITING; } This piece of code above is used to test out the connection with the server end and once the connection is established, it sends the Roomba into command mode [11]. In this case it will receive the command to move the vacuum forward so it will reset the Roomba connection and then send the requested command. The Roomba connection needs to be reset and this is simply because it will completely stop the previous command sent to it and send the new one. This is such a seamless process that it does not appear that the connection is reset but that a new command simply sent. All commands take this form.. The changes are be the input word sent to the system and the command sent to the Roomba communication system. 41

46 Cha2 1:e: 5 Implementation and 6... xperimental nesults 5.1 Issues related to sending commands through Bluetooth 5.2 General overview of project 5.1 Issues related to sending commands through Bluetooth The project did not run as smoothly as first anticipated. The majority of the problems that were encountered were related to Bluetooth communications is some way. he first issue encountered was that the Bluetooth receiver simply did not understand the commands it was being sent. It would simply do what it is designed to do when it feels,ome that it receives does not pertain to itself and that is to simply drop whatever was being sent to it. The receiver would be receiving commands to move the Roomba vacuum In \\ ever it would not understand them so it was ignoring them. Upon further inspection, w, discovered that the Bluetooth receiver needed to be in a command mode to be able pi ocess any commands. The receiver was sent into this mode when it was sent three ling plus (+) values in serial HyperTerminal. This could also be saved in non-volatile Jul Y on the Bluetooth chip so that this would not need to be done each time the chip mlnected. By always having the chip in command mode, the Roomba vacuum lids could be sent through Bluetooth at any time as long as the two devices are issue encountered was that the Bluetooth transmitter could not send the t(, the receiver. After the Bluetooth devices are paired, a virtual 42

47 communication port is opened so that the two devices could communicate with each other. The Roomba commands are simply sent through this port. However, after the need to replace the transmitter, the new transmitter was not able to create this virtual communication port so the commands were simply being dropped before even being sent. Even though the receiver was idly waiting in command mode, no command would ever reach it because the communication port was not set up. This issue was very difficult to isolate simply because the program was working previously. A lot of time was spent trying to test if the client/server applications were communicating properly. There was also the need to see if the web portion was actually prompting the server to send the command to the Roomba. All of these tests showed that these applications were working properly which indicated that Bluetooth had to be the issue. After stripping away all the extras within the application and returning to the basics which had previously been working, it was clear that the Bluetooth virtual communication port was not set up because the commands were reaching the last point before being sent over and yet they were not being sent. This issue could have been resolved had time constraints not arisen. 5.2 General Overview of Project I dying household appliances being controlled automatically through Bluetooth ommunications is a very good idea and one that can be accomplished. Obviously, there Nstrictions with Bluetooth communications however the web portion of the project ', Ply needs to be handled through standard TCP/IP procedures and the needed aspect to ' 11 ()I the Roomba vacuum can then be sent locally to the Roomba vacuum. 43

48 5.2.1 Client-side Application The base idea of having a client side application would allow the user to control his Roomba as long as he had access to the Internet. Upon arriving to the website, the user would be given a choice of commands to choose from and would select the command he would like the Roomba to perform. The client-side application is very important because it is the only part of the entire process the user actually sees so it does need to have some visual appeal. If the application is visually appealing and is easy to use, the user is more likely to want to use it again. Once the command has been selected, that command is sent from the client application to the server application. RIGHT FORWARD BACK! STOP Apple, Maned. Figure 5.1 Client-Side Application Screenshot 44

49 5.2.2 Server-side Application The server-side application works in the background and the end-user would never actually see this part of the project. The server-side application always needs to be running due to the fact that it will never know when a command will be sent to it so it always needs to be ready to receive one. The server application will receive a command from the client and will need to decipher which command needs to be sent to the Roomba vacuum. The client deals with users so it will speak a language the end-user will understand while the server application needs to speak a language the Roomba vacuum will understand so it will convert the command to a certain instruction the Roomba vacuum can understand. The server application also needs to know ahead of time which virtual communication port is being used between both Bluetooth modules. This part needs to be hard coded so that the server can always make connection with the Roomba. There are usually only a couple Bluetooth communication ports available and since the server application will always be running, the communication port will never need to change [10]. 45

50 C" La pus )11' rrz$ort,th' V". ' 710.nv larla ha. lip 6-grtfit rabetr.14p4 t le.. gr..11gen , ' naanit;:teni me A:u 3,I.. Sti asa Cainnci Ian 'La LQ0 Library lb Non Ina Pyra-X-1-7 itriek1731n la cg, :11ZI:24 let Figure 5.2 Server-Side Application Screenshot 46

Introduction to Wireless Networking ECE 401WN Spring 2009

Introduction to Wireless Networking ECE 401WN Spring 2009 I. Overview of Bluetooth Introduction to Wireless Networking ECE 401WN Spring 2009 Lecture 6: Bluetooth and IEEE 802.15 Chapter 15 Bluetooth and IEEE 802.15 What is Bluetooth? An always-on, short-range

More information

ENRNG3076 : Oral presentation BEng Computer and Communications Engineering

ENRNG3076 : Oral presentation BEng Computer and Communications Engineering Jean Parrend ENRNG3076 : Oral presentation BEng Computer and Communications Engineering 1 Origin 2 Purpose : Create a cable replacement standard for personal area network Handle simultaneously both data

More information

Bluetooth. Bluetooth Radio

Bluetooth. Bluetooth Radio Bluetooth Bluetooth is an open wireless protocol stack for low-power, short-range wireless data communications between fixed and mobile devices, and can be used to create Personal Area Networks (PANs).

More information

ALL SAINTS COLLEGE OF TECHNOLOGY, BHOPAL

ALL SAINTS COLLEGE OF TECHNOLOGY, BHOPAL BLUETOOTH Amita Tiwari IIIrd Semester amitaasct@gmail.com Sunil Kumar IIIrd Semester sunilasct@gmail.com ALL SAINTS COLLEGE OF TECHNOLOGY, BHOPAL ABSTRACT Blue tooth is a standard developed by a group

More information

CS4/MSc Computer Networking. Lecture 13: Personal Area Networks Bluetooth

CS4/MSc Computer Networking. Lecture 13: Personal Area Networks Bluetooth CS4/MSc Computer Networking Lecture 13: Personal Area Networks Bluetooth Computer Networking, Copyright University of Edinburgh 2005 BlueTooth Low cost wireless connectivity for Personal Area Networks

More information

Bluetooth: Short-range Wireless Communication

Bluetooth: Short-range Wireless Communication Bluetooth: Short-range Wireless Communication Wide variety of handheld devices Smartphone, palmtop, laptop Need compatible data communication interface Complicated cable/config. problem Short range wireless

More information

UNIT 5 P.M.Arun Kumar, Assistant Professor, Department of IT, Sri Krishna College of Engineering and Technology, Coimbatore.

UNIT 5 P.M.Arun Kumar, Assistant Professor, Department of IT, Sri Krishna College of Engineering and Technology, Coimbatore. Communication Switching Techniques UNIT 5 P.M.Arun Kumar, Assistant Professor, Department of IT, Sri Krishna College of Engineering and Technology, Coimbatore. Bluetooth Techniques References 1. Wireless

More information

[A SHORT REPORT ON BLUETOOTH TECHNOLOGY]

[A SHORT REPORT ON BLUETOOTH TECHNOLOGY] 2011 [A SHORT REPORT ON BLUETOOTH TECHNOLOGY] By Ram Kumar Bhandari 1. Introduction Bluetooth Technology A Technical Report Bluetooth is a short-ranged wire-less communication technology implementing the

More information

Wireless Personal Area Networks & Wide Area Networks

Wireless Personal Area Networks & Wide Area Networks Wireless Personal Area Networks & Wide Area Networks Patrick J. Stockreisser p.j.stockreisser@cs.cardiff.ac.uk Lecture Outline In the lecture we will: Look at PAN s in more detail Look at example networks

More information

Bluetooth. Quote of the Day. "I don't have to be careful, I've got a gun. -Homer Simpson. Stephen Carter March 19, 2002

Bluetooth. Quote of the Day. I don't have to be careful, I've got a gun. -Homer Simpson. Stephen Carter March 19, 2002 Bluetooth Stephen Carter March 19, 2002 Quote of the Day "I don't have to be careful, I've got a gun. -Homer Simpson 1 About Bluetooth Developed by a group called Bluetooth Special Interest Group (SIG),

More information

12/2/09. Mobile and Ubiquitous Computing. Bluetooth Networking" George Roussos! Bluetooth Overview"

12/2/09. Mobile and Ubiquitous Computing. Bluetooth Networking George Roussos! Bluetooth Overview Mobile and Ubiquitous Computing Bluetooth Networking" George Roussos! g.roussos@dcs.bbk.ac.uk! Bluetooth Overview" A cable replacement technology! Operates in the unlicensed ISM band at 2.4 GHz! Frequency

More information

By FaaDoOEngineers.com

By FaaDoOEngineers.com ABSTRACT The seemingly endless entanglement of data wires connecting today s electronic devices has become slightly less jumbled with the introduction of Bluetooth technology and the creation of a wireless

More information

Local Area Networks NETW 901

Local Area Networks NETW 901 Local Area Networks NETW 901 Lecture 6 IEEE 802.15.1 - Bluetooth Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 The 802.15 Family Target environment: communication of personal

More information

10.1 SERIAL PORTS AND UARTS

10.1 SERIAL PORTS AND UARTS RS- serial ports have nine circuits, which can be used for transferring data and signalling. can emulate the serial cable line settings and status of an RS- serial port. provides multiple concurrent connections

More information

Introduction to Bluetooth Wireless Technology

Introduction to Bluetooth Wireless Technology Introduction to Bluetooth Wireless Technology Jon Inouye Staff Software Engineer Mobile Platforms Group Intel Corporation Bluetooth Bluetooth is is a a trademark trademark owned owned by by Bluetooth Bluetooth

More information

MOBILE COMPUTING. Jan-May,2012. ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala.

MOBILE COMPUTING. Jan-May,2012. ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala. WPAN: Bluetooth MOBILE COMPUTING Jan-May,2012 ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala Email-alakroy.nerist@gmail.com EM Spectrum ISM band 902 928 Mhz 2.4 2.4835 Ghz 5.725 5.85 Ghz LF MF

More information

Guide to Wireless Communications, 3 rd Edition. Objectives

Guide to Wireless Communications, 3 rd Edition. Objectives Guide to Wireless Communications, 3 rd Edition Chapter 5 Wireless Personal Area Networks Objectives Describe a wireless personal area network (WPAN) List the different WPAN standards and their applications

More information

Inside Bluetooth. Host. Bluetooth. Module. Application RFCOMM SDP. Transport Interface. Transport Bus. Host Controller Interface

Inside Bluetooth. Host. Bluetooth. Module. Application RFCOMM SDP. Transport Interface. Transport Bus. Host Controller Interface Inside Bluetooth Application Host Application Host Audio (SCO) RFCOMM SDP Data (ACL) Control API and Legacy Support Modules Bluetooth HCI Driver Transport Interface Physical I/F Transport Bus Bluetooth

More information

Introducing Bluetooth

Introducing Bluetooth Chapter 1 Introducing Bluetooth In This Chapter From the beginning, Bluetooth technology was intended to hasten the convergence of voice and data to handheld devices, such as cellular telephones and portable

More information

Bluetooth Demystified

Bluetooth Demystified Bluetooth Demystified S-72.4210 Postgraduate Course in Radio Communications Er Liu liuer@cc.hut.fi -10 Content Outline Bluetooth History Bluetooth Market and Applications Bluetooth Protocol Stacks Radio

More information

Bluetooth. The Bluetooth Vision. Universal Wireless Connectivity. Universal Wireless Connectivity

Bluetooth. The Bluetooth Vision. Universal Wireless Connectivity. Universal Wireless Connectivity 1 2 The Vision Universal wireless connectivity Replace existing cables with radio Connect systems that have been separate Ubiquitous computing environment Intelligent devices performing distributed services

More information

Amarjeet Singh. February 7, 2012

Amarjeet Singh. February 7, 2012 Amarjeet Singh February 7, 2012 References Bluetooth Protocol Architecture v.1 www.bluetooth.org http://www.tutorial-reports.com/wireless/bluetooth/ Slides from last class uploaded on the course website

More information

MI-BPS (Wireless Networks) FIT - CTU

MI-BPS (Wireless Networks) FIT - CTU Evropský sociální fond Praha & EU: Investujeme do vaší budoucnosti MI-BPS (Wireless Networks) FIT - CTU Alex Moucha Lecture 8 - Piconets, Scatternets, Bluetooth, Zigbee 1 Piconet an ad-hoc network linking

More information

SE 4C03 Winter 2005 Bluetooth Wireless Network Technology

SE 4C03 Winter 2005 Bluetooth Wireless Network Technology SE 4C03 Winter 2005 Bluetooth Wireless Network Technology Researcher: Daren Tan Shen Hau Last Revised: April 4, 2005 Bluetooth As everyone will ask, what is Bluetooth? Bluetooth is a new technology that

More information

Jeffrey Price Dr. Konak IST 220 Bluetooth Technology

Jeffrey Price Dr. Konak IST 220 Bluetooth Technology Jeffrey Price Dr. Konak IST 220 Bluetooth Technology 1 TABLE OF CONTENTS 1. INTRODUCTION 2. COMPONENTS 3. BLUETOOTH ADVANTAGES/DISADVANTAGES 4. USES OF BLUETOOTH 5. THE FUTURE 7. DOCUMENTATION 2 1. INTRODUCTION

More information

Embedded Systems. 8. Communication

Embedded Systems. 8. Communication Embedded Systems 8. Communication Lothar Thiele 8-1 Contents of Course 1. Embedded Systems Introduction 2. Software Introduction 7. System Components 10. Models 3. Real-Time Models 4. Periodic/Aperiodic

More information

Bluetooth Tutorial. Bluetooth Introduction. Bluetooth Technology

Bluetooth Tutorial. Bluetooth Introduction. Bluetooth Technology Bluetooth Tutorial Bluetooth strives to remove the never ending maze of wires which provide a communication link between different electronic devices, through a short range wireless solution. Consider

More information

Overview of Bluetooth

Overview of Bluetooth Wireless Application Programming with J2ME and Bluetooth Page 1 http://developers.sun.com/techtopics/mobility/midp/articles/bluetooth1/ Dec 19, 2004 Article Wireless Application Programming with J2ME and

More information

e-pg Pathshala Quadrant 1 e-text

e-pg Pathshala Quadrant 1 e-text e-pg Pathshala Subject : Computer Science Module: Bluetooth Paper: Computer Networks Module No: CS/CN/37 Quadrant 1 e-text In our journey on networks, we are now exploring wireless networks. We looked

More information

Advanced Mobile Computing and Networking - CS 560. Wireless Technologies. Bluetooth. Bluetooth. Bluetooth. Bluetooth 7/3/2014.

Advanced Mobile Computing and Networking - CS 560. Wireless Technologies. Bluetooth. Bluetooth. Bluetooth. Bluetooth 7/3/2014. Advanced Mobile Computing and Networking - CS 560 Assessment CA 40% - Assignment 20% - 2 Tests 10% each Exam 60% Wireless Technologies, Infrared Data Association (),, and Institute of Electrical and Electronic

More information

Redes Inalámbricas Tema 2.B Wireless PANs: Bluetooth

Redes Inalámbricas Tema 2.B Wireless PANs: Bluetooth Redes Inalámbricas Tema 2.B Wireless PANs: Bluetooth Bluetooh Acknowledgments: Foo Chun Choong, Ericsson Research / Cyberlab Singapore, and Open Source Software Lab, ECE Dept, NUS Máster de Ingeniería

More information

Implementing A Bluetooth Stack on UEFI

Implementing A Bluetooth Stack on UEFI Implementing A Bluetooth Stack on UEFI Tony C.S. Lo Senior Manager American Megatrends Inc. presented by UEFI Plugfest October 2014 Agenda Introduction Bluetooth Architecture UEFI Bluetooth Stack Summary

More information

Bluetooth. Basic idea

Bluetooth. Basic idea Bluetooth Basic idea Universal radio interface for ad-hoc wireless connectivity Interconnecting computer and peripherals, handheld devices, DAs, cell phones replacement of IrDA Embedded in other devices,

More information

Wireless Access Protocol(WAP) architecture

Wireless Access Protocol(WAP) architecture Wireless Access Protocol(WAP) architecture While the evolution of cellular networks has resulted in many mobile services, such services are primarily for voice. Mobile phone users do have the desire to

More information

CS263: Wireless Communications and Sensor Networks

CS263: Wireless Communications and Sensor Networks CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 6: Bluetooth and 802.15.4 October 12, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Bluetooth Standard for Personal Area

More information

Solving the Interference Problem due to Wireless LAN for Bluetooth Transmission Using a Non- Collaborative Mechanism. Yun-Ming, Chiu 2005/6/09

Solving the Interference Problem due to Wireless LAN for Bluetooth Transmission Using a Non- Collaborative Mechanism. Yun-Ming, Chiu 2005/6/09 Solving the Interference Problem due to Wireless LAN for Bluetooth Transmission Using a Non- Collaborative Mechanism Yun-Ming, Chiu 2005/6/09 Outline Overview Survey of Bluetooth Structure of Bluetooth

More information

WPAN-like Systems. UWB Ultra Wide Band. IrDA Infrared Data Association. Bluetooth. Z-Wave. WPAN Wireless Personal Area Network

WPAN-like Systems. UWB Ultra Wide Band. IrDA Infrared Data Association. Bluetooth. Z-Wave. WPAN Wireless Personal Area Network WPAN-like Systems WPAN Wireless Personal Area Network PAN: Personal Area Network. Small, within a few meters. WPAN: Wireless PAN. Mostly short-range, low-power, lowrate networks. More or less self-organizing.

More information

Chapter 12. Network Organization and Architecture

Chapter 12. Network Organization and Architecture Chapter 12 Network Organization and Architecture Chapter 12 Objectives Learn the basic physical components of networks. Become familiar with routing protocols. 2 Computer networks are often classified

More information

Bluetooth technology, developed by Ericsson Mobile Communications, a. worldwide telecommunications company based in Sweden, is fast becoming the

Bluetooth technology, developed by Ericsson Mobile Communications, a. worldwide telecommunications company based in Sweden, is fast becoming the Bluetooth technology, developed by Ericsson Mobile Communications, a worldwide telecommunications company based in Sweden, is fast becoming the worldwide standard for short-range wireless communication.

More information

Modulation. Propagation. Typical frequency bands

Modulation. Propagation. Typical frequency bands References Wireless Technology 2 AT THE END OF THIS SECTION, YOU SHOULD HAVE AN UNDERSTANDING OF THE UNDERLYING WIRELESS TECHNOLOGIES. The physical layer provides mechanical, electrical, l functional,

More information

AT THE END OF THIS SECTION, YOU SHOULD HAVE AN UNDERSTANDING OF THE

AT THE END OF THIS SECTION, YOU SHOULD HAVE AN UNDERSTANDING OF THE Wireless Technology AT THE END OF THIS SECTION, YOU SHOULD HAVE AN UNDERSTANDING OF THE UNDERLYING WIRELESS TECHNOLOGIES. References 2 The physical layer provides mechanical, electrical, l functional,

More information

IMPLEMENTATION AND SECURITY OF BLUETOOTH TECHNOLOGY

IMPLEMENTATION AND SECURITY OF BLUETOOTH TECHNOLOGY Bachelor s Thesis (UAS) Information Technology Networking and Programming 2011 IDAHOSA AKHANOLU IMPLEMENTATION AND SECURITY OF BLUETOOTH TECHNOLOGY i BACHELOR S THESIS (UAS) ABSTRACT TURKU UNIVERSITY OF

More information

Communication Systems. WPAN: Bluetooth. Page 1

Communication Systems. WPAN: Bluetooth. Page 1 Communication Systems WPAN: Bluetooth Page 1 Outline Historical perspective Piconet Scatternet Lattency modes Applications Page 2 Bluetooth Bluetooth (BT) wireless technology is a short-range communications

More information

Master. Slave. Master. Slaves. TCP/IP Traffic with Efficient Bluetooth Technology. Shafqat Hameed 1, Umar F.Khan 2, *Muhammad Saleem 3

Master. Slave. Master. Slaves. TCP/IP Traffic with Efficient Bluetooth Technology. Shafqat Hameed 1, Umar F.Khan 2, *Muhammad Saleem 3 / Traffic with Efficient Bluetooth Technology Shafqat Hameed 1, Umar F.Khan 2, *Muhammad Saleem 3 1,3 National University of Sciences and Technology (NUST), Pakistan 2 University of Bradford, Bradford,

More information

FILE TRANSFER PROFILE

FILE TRANSFER PROFILE Part K:12 FILE TRANSFER PROFILE This application profile defines the application requirements for Bluetooth devices necessary for the support of the File Transfer usage model. The requirements are expressed

More information

TELEPHONY CONTROL PROTOCOL SPECIFICATION

TELEPHONY CONTROL PROTOCOL SPECIFICATION Part F:3 TELEPHONY CONTROL PROTOCOL SPECIFICATION TCS Binary This document describes the Bluetooth Telephony Control protocol Specification Binary (TCS Binary), using a bit-oriented protocol. This protocol

More information

Objectives of the Bluetooth Technology

Objectives of the Bluetooth Technology Bluetooth Origin of the name Harald I Bleutooth (in Danish, Harald Blåtand) (b. c. 910 d. c. 987), king of Denmark was credited with the first unification of Denmark and Norway Ericsson, inspired on the

More information

Dominique Chomienne & Michel Eftimakis NewLogic

Dominique Chomienne & Michel Eftimakis NewLogic Dominique Chomienne & Michel Eftimakis NewLogic Bluetooth is a trademark owned by the Bluetooth SIG, and licenced to NewLogic Page 1 Tutorial Agenda Bluetooth Marketing view Bluetooth network topology

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK CONTROLLING PC THROUGH MOBILE PHONE MISS. MUKTA N. PATIL, PROF. SHEETAL P. GAWANDE

More information

Bluetooth. Bluetooth Basics Bluetooth and Linux Bluetooth at AG Tech. Dr.-Ing. H. Ritter, 7.1

Bluetooth. Bluetooth Basics Bluetooth and Linux Bluetooth at AG Tech. Dr.-Ing. H. Ritter,   7.1 Bluetooth Bluetooth Basics Bluetooth and Linux Bluetooth at AG Tech Dr.-Ing. H. Ritter, http://www.hartmut-ritter.de/ 7.1 I. Bluetooth Idea Universal radio interface for ad-hoc wireless connectivity Interconnecting

More information

Introduction to Bluetooth

Introduction to Bluetooth Introduction to Bluetooth Kirsten Matheus The idea behind Bluetooth The problems when trying to realize the idea The solutions used in Bluetooth How well the solutions work 12.06.2003 1 he Idea Behind

More information

Case study of Wireless Technologies in Industrial Applications

Case study of Wireless Technologies in Industrial Applications International Journal of Scientific and Research Publications, Volume 7, Issue 1, January 2017 257 Case study of Wireless Technologies in Industrial Applications Rahul Hanumanth Rao Computer Information

More information

System Level Analysis of the Bluetooth standard

System Level Analysis of the Bluetooth standard System Level Analysis of the standard Massimo Conti, Daniele Moretti Università Politecnica delle Marche, via Brecce Bianche, I-60131, Ancona, Italy Abstract The SystemC modules of the Link Manager Layer

More information

DIAL-UP NETWORKING PROFILE

DIAL-UP NETWORKING PROFILE Part K:7 DIAL-UP NETWORKING PROFILE This profile defines the requirements for Bluetooth devices necessary for the support of the Dial-up Networking use case. The requirements are expressed in terms of

More information

Wireless Networked Systems

Wireless Networked Systems Wireless Networked Systems CS 795/895 - Spring 2013 Lec #7: Medium Access Control WPAN, Bluetooth, ZigBee Tamer Nadeem Dept. of Computer Science Bluetooth Page 2 Spring 2013 CS 795/895 - Wireless Networked

More information

INTRODUCTION DATA COMMUNICATION TELECOMMUNICATIONS SYSTEM COMPONENTS 1/28/2015. Satish Chandra satish0402.weebly.com

INTRODUCTION DATA COMMUNICATION TELECOMMUNICATIONS SYSTEM COMPONENTS 1/28/2015. Satish Chandra satish0402.weebly.com INTRODUCTION DATA COMMUNICATION Satish Chandra satish0402.weebly.com The term telecommunication means communication at a distance. The word data refers to information presented in whatever form is agreed

More information

WIRELESS-NETWORK TECHNOLOGIES/PROTOCOLS

WIRELESS-NETWORK TECHNOLOGIES/PROTOCOLS 3 WIRELESS-NETWORK TECHNOLOGIES/PROTOCOLS Dr. H. K. Verma Distinguished Professor (EEE) Sharda University, Greater Noida (Formerly: Deputy Director and Professor of Instrumentation Indian Institute of

More information

Simulation of Bluetooth Network

Simulation of Bluetooth Network Simulation of Bluetooth Network Lennart Lagerstedt Stockholm, 2003 Master of Science Thesis Project The Department of Microelectronics and Information Technology, Royal Institute of Technology (KTH) Lennart

More information

Networking interview questions

Networking interview questions Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected

More information

Bluetooth in Mobile Devices

Bluetooth in Mobile Devices Bluetooth in Mobile Devices Vidar Rinne Mälardalen University School of Innovation, Design and Engineering Computer Science: Game Development vre03001@student.mdh.se Abstract The basic idea of Bluetooth

More information

Research on Modern Bluetooth Technology

Research on Modern Bluetooth Technology Research on Modern Bluetooth Technology D.Annal 1, T.Indira 2, K.Poojitha 3, R.Rajashree 4 Student, Dept. of CSE, Magna College of Engineering, Chennai, Tamil Nadu, India 1,2,3,4 ABSTRACT: The seemingly

More information

WPAN/WBANs: ZigBee. Dmitri A. Moltchanov kurssit/elt-53306/

WPAN/WBANs: ZigBee. Dmitri A. Moltchanov    kurssit/elt-53306/ WPAN/WBANs: ZigBee Dmitri A. Moltchanov E-mail: dmitri.moltchanov@tut.fi http://www.cs.tut.fi/ kurssit/elt-53306/ IEEE 802.15 WG breakdown; ZigBee Comparison with other technologies; PHY and MAC; Network

More information

Bluetooth. Renato Lo Cigno

Bluetooth. Renato Lo Cigno Bluetooth Renato Lo Cigno www.dit.unitn.it/locigno/teaching ...Copyright Quest opera è protetta dalla licenza Creative Commons NoDerivs- NonCommercial. Per vedere una copia di questa licenza, consultare:

More information

COMPUTER SKILLS COMP101

COMPUTER SKILLS COMP101 COMPUTER SKILLS COMP101 Chapter 4 Introduction to Computer Networks Definitions and Terminologies Computer Network A network consists of two or more computers that are linked in order to share resources

More information

Bluetooth PCI Adapter

Bluetooth PCI Adapter Table of Contents 1 Introduction...2 2 Installation...2 2.1 Software Installation...2 2.1.1 Installation on Windows 95/98/ME/2000/XP...2 2.1.2 Installation on Windows NT...3 2.1.3 Installation on Linux...3

More information

SIMULATION BASED ANALYSIS OF BLUETOOTH NETWORKS. M. Subramani and M. Ilyas

SIMULATION BASED ANALYSIS OF BLUETOOTH NETWORKS. M. Subramani and M. Ilyas SIMULATION BASED ANALYSIS OF BLUETOOTH NETWORKS M. Subramani and M. Ilyas College of Engineering Florida Atlantic University Boca Raton, Florida 33431 {msubrama@cse.fau.edu, ilyas@fau.edu} Abstract Many

More information

In Brief TARIFF CLASSIFICATION OF CERTAIN ARTICLES USING BLUETOOTH TECHNOLOGY

In Brief TARIFF CLASSIFICATION OF CERTAIN ARTICLES USING BLUETOOTH TECHNOLOGY Ottawa, June 16, 2009 MEMORANDUM D10-14-57 In Brief TARIFF CLASSIFICATION OF CERTAIN ARTICLES USING BLUETOOTH TECHNOLOGY This memorandum explains the Canada Border Services Agency administrative policy

More information

Structure of the Lecture

Structure of the Lecture Structure of the Lecture Chapter 2 Technical Basics: Layer 1 Methods for Medium Access: Layer 2 Chapter 3 Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Networks: GSM, GPRS, UMTS Satellites

More information

CHAPTER 3 BLUETOOTH AND IEEE

CHAPTER 3 BLUETOOTH AND IEEE CHAPTER 3 BLUETOOTH AND IEEE 802.15 These slides are made available to faculty in PowerPoint form. Slides can be freely added, modified, and deleted to suit student needs. They represent substantial work

More information

Feasibility of a Bluetooth Based Structural Health Monitoring Telemetry System

Feasibility of a Bluetooth Based Structural Health Monitoring Telemetry System Feasibility of a Bluetooth Based Structural Health Monitoring Telemetry System Item Type text; Proceedings Authors Uchil, Vilas; Kosbar, Kurt Publisher International Foundation for Telemetering Journal

More information

WAP via ORBCOMM. Andrew R Cardoza, Sias Mostert.

WAP via ORBCOMM. Andrew R Cardoza, Sias Mostert. SSC00-X-7 WAP via ORBCOMM Andrew R Cardoza, Sias Mostert E-mail: acardoza@ing.sun.ac.za, mostert@eng.sun.ac.za Electronic Systems Laboratory, Department of Electrical and Electronic Engineering, University

More information

ITP 140 Mobile Applications Technologies. Networks

ITP 140 Mobile Applications Technologies. Networks ITP 140 Mobile Applications Technologies Networks A First Look Under the Hood 2 3 Communication Channels Mediums for transporting data from one system to another Physical Twisted Pair (CAT-3, CAT-5/6)

More information

Computer Networks II Advanced Features (T )

Computer Networks II Advanced Features (T ) Computer Networks II Advanced Features (T-110.5111) Bluetooth, PhD Assistant Professor DCS Research Group Based on slides previously done by Matti Siekkinen, reused with permission For classroom use only,

More information

Efficient Multicast Schemes for Mobile Multiparty Gaming Applications

Efficient Multicast Schemes for Mobile Multiparty Gaming Applications Efficient Multicast Schemes for Mobile Multiparty Gaming Applications P6-6th semester 2006 Group 681 - ComNet Aalborg University 9th March 2006 Institut for elektroniske systemer Fr. Bajers Vej 7 Telefon

More information

Bluetooth LE 4.0 and 4.1 (BLE)

Bluetooth LE 4.0 and 4.1 (BLE) Bluetooth LE 4.0 and 4.1 (BLE) Lab 11 Lunch April 23rd, 2014 Noah Klugman Josh Adkins 1 Outline History of Bluetooth Introduction to BLE Architecture Controller Host Applications Power Topology Example:

More information

Distributed Queue Dual Bus

Distributed Queue Dual Bus Distributed Queue Dual Bus IEEE 802.3 to 802.5 protocols are only suited for small LANs. They cannot be used for very large but non-wide area networks. IEEE 802.6 DQDB is designed for MANs It can cover

More information

Special Course in Computer Science: Local Networks. Lecture

Special Course in Computer Science: Local Networks. Lecture Special Course in Computer Science: Local Networks Lecture 11 16.5.2012 Roadmap of the Course So far Basic telecom concepts General study of LANs Local Networks Ethernet Token bus Token ring ATM LAN Wi-Fi

More information

Inside Bluetooth Low Energy

Inside Bluetooth Low Energy Inside Bluetooth Low Energy Naresh Gupta BOSTON LONDON artechhouse.com Contents Preface Acknowledgments Foreword xix xxiii xxv Introduction 1 1.1 Introduction to Wireless Communication 1 1.2 Data Rates

More information

CHAPTER 12 BLUETOOTH AND IEEE

CHAPTER 12 BLUETOOTH AND IEEE CHAPTER 12 BLUETOOTH AND IEEE 802.15 These slides are made available to faculty in PowerPoint form. Slides can be freely added, modified, and deleted to suit student needs. They represent substantial work

More information

MOBILE COMPUTING. Bluetooth 9/20/15. CSE 40814/60814 Fall Basic idea

MOBILE COMPUTING. Bluetooth 9/20/15. CSE 40814/60814 Fall Basic idea OBILE COUTING CE 40814/60814 Fall 2015 Bluetooth Basic idea Universal radio interface for ad-hoc wireless connectivity Interconnecting computer and peripherals, handheld devices, DAs, cell phones replacement

More information

Bluetooth Wireless Technology meets CAN

Bluetooth Wireless Technology meets CAN Bluetooth Wireless Technology meets CAN Matthias Fuchs esd electronic system design GmbH, Hannover, Germany To access mobile and moving CAN fieldbus systems a wireless approach is often a good solution.

More information

A Seminar Report On Bluetooth Technology

A Seminar Report On Bluetooth Technology A Seminar Report On Bluetooth Technology Submitted By Sanjay Dudani Roll No. - 419 Under The Guidance of Prof. P.B. Dehenkar Seminar On Bluetooth Technology (Professional Practices IV) Page 1 Bluetooth

More information

Network Communications Standards. Applied Information Technology

Network Communications Standards. Applied Information Technology Network Communications Standards Applied Information Technology Network Standards Why do we need network standards? Defined guidelines for how computers or networked devices communicate Think of it as

More information

Securing A Bluetooth Device

Securing A Bluetooth Device Securing A Bluetooth Device Mrs. Dhanashri D. Dhokate 1, Mr. Milind C. Butale 2, Mr. Babasaheb S. Patil 3 Assistant Professor, Information Technology, PVPIT, Budhgaon, India 1. Associate Professor, Electronics

More information

Ad Hoc Nets - MAC layer. Part II TDMA and Polling

Ad Hoc Nets - MAC layer. Part II TDMA and Polling Ad Hoc Nets - MAC layer Part II TDMA and Polling More MAC Layer protocols Bluetooth Piconet: a polling/tdma scheme Cluster TDMA: based on TDMA (with random access and reserved slots) research protocol

More information

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP CS 5520/ECE 5590NA: Network Architecture I Spring 2008 Lecture 13: UDP and TCP Most recent lectures discussed mechanisms to make better use of the IP address space, Internet control messages, and layering

More information

A COLLOCATED APPROACH FOR COEXISTENCE RESOLUTION IN WIRELESS HOME NETWORKING

A COLLOCATED APPROACH FOR COEXISTENCE RESOLUTION IN WIRELESS HOME NETWORKING A COLLOCATED APPROACH FOR COEXISTENCE RESOLUTION IN WIRELESS HOME NETWORKING Md Enamul Islam, Sanjay Jha, Dr. Paul W.H. Kwan, Monzurur Rahman School of Mathematics, Statistics and Computer Science, University

More information

Bluetooth low energy technology Bluegiga Technologies

Bluetooth low energy technology Bluegiga Technologies Bluetooth low energy technology Bluegiga Technologies Topics Background What is Bluetooth low energy? Basic concepts Architecture Differentiation and comparison Markets and applications Background Background

More information

WZRDnet. A Low-Power Wireless Ad-Hoc Mesh Network for Austere Tactical Environments. February 14, 2018

WZRDnet. A Low-Power Wireless Ad-Hoc Mesh Network for Austere Tactical Environments. February 14, 2018 White Paper TELEGRID Technologies, Inc. WZRDnet A Low-Power Wireless Ad-Hoc Mesh Network for Austere Tactical Environments February 14, 2018 23 Vreeland Road Suite 290 Florham Park, NJ 07932 www.telegrid.com

More information

Universitetet i Oslo Institutt for informatikk. Monitoring Bluetooth network topology. Cand Scient Thesis. Fredrik Borg

Universitetet i Oslo Institutt for informatikk. Monitoring Bluetooth network topology. Cand Scient Thesis. Fredrik Borg Universitetet i Oslo Institutt for informatikk Monitoring Bluetooth network topology Cand Scient Thesis Fredrik Borg February 1, 2002 II Foreword This thesis is a part of my cand.scient. degree in Communication

More information

Outline. CS5984 Mobile Computing HTTP. HTTP (especially 1.0) Problems 1/2. Dr. Ayman Abdel-Hamid, CS5984. Wireless Web.

Outline. CS5984 Mobile Computing HTTP. HTTP (especially 1.0) Problems 1/2. Dr. Ayman Abdel-Hamid, CS5984. Wireless Web. CS5984 Mobile Computing Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Outline HTTP HTTP 1.0 problems Approaches to help wireless access HTTP 1.1 enhancements System Architecture for Web

More information

Wireless LANs. The Protocol Stack The Physical Layer The MAC Sublayer Protocol The Frame Structure Services 802.

Wireless LANs. The Protocol Stack The Physical Layer The MAC Sublayer Protocol The Frame Structure Services 802. Wireless LANs The 802.11 Protocol Stack The 802.11 Physical Layer The 802.11 MAC Sublayer Protocol The 802.11 Frame Structure Services 56 802.11 The 802.11 Working Group The IEEE 802.11 was formed in July

More information

CS 4453 Computer Networks Winter

CS 4453 Computer Networks Winter CS 4453 Computer Networks Chapter 2 OSI Network Model 2015 Winter OSI model defines 7 layers Figure 1: OSI model Computer Networks R. Wei 2 The seven layers are as follows: Application Presentation Session

More information

IrDA INTEROPERABILITY

IrDA INTEROPERABILITY Part F:2 IrDA INTEROPERABILITY The IrOBEX protocol is utilized by the Bluetooth technology. In Bluetooth, OBEX offers same features for applications as within the IrDA protocol hierarchy and enabling the

More information

5275ch01.qxd 11/28/01 9:29 AM Page 1. Overview

5275ch01.qxd 11/28/01 9:29 AM Page 1. Overview 5275ch01.qxd 11/28/01 9:29 AM Page 1 1 Overview Bluetooth has been the subject of much hype and media attention over the last couple of years. As various manufacturers prepare to launch products using

More information

Test Bank for A Guide to Designing and Implementing Local And Wide Area Networks 2nd Edition by Palmer and Sinclair

Test Bank for A Guide to Designing and Implementing Local And Wide Area Networks 2nd Edition by Palmer and Sinclair Test Bank for A Guide to Designing and Implementing Local And Wide Area Networks 2nd Edition by Palmer and Sinclair Link download full: https://testbankservice.com/download/test-bank-for-aguide-to-designing-and-implementing-local-and-wide-area-networks-2ndedition-by-palmer-and-sinclair/

More information

Bluetooth Technologies

Bluetooth Technologies Bluetooth Technologies Bluetooth more than you thought! Where does the name come from? Danish King Harald "Blåtand" Gormsson Blatand = Bluetooth (Old Norse: Haraldr blátǫnn Gormsson, Danish: Harald Blåtand

More information

A typical WAN structure includes the following components.

A typical WAN structure includes the following components. CBCN4103 WAN is a computer network that spans a relatively large geographical area. Typically, a WAN consists of two or more LANs. A WAN is a network usually provided by a specialised company called a

More information

Module 5. Embedded Communications. Version 2 EE IIT, Kharagpur 1

Module 5. Embedded Communications. Version 2 EE IIT, Kharagpur 1 Module 5 Embedded Communications Version 2 EE IIT, Kharagpur 1 Lesson 27 Wireless Communication Version 2 EE IIT, Kharagpur 2 Instructional Objectives After going through this lesson the student would

More information

Bluetooth. 3.3 Latest Technology in Wireless Network. What is BLUETOOTH: Bluetooth 2/17/2016

Bluetooth. 3.3 Latest Technology in Wireless Network. What is BLUETOOTH: Bluetooth 2/17/2016 3.3 Latest Technology in Wireless Network Bluetooth Bluetooth Bluetooth is a high-speed, low-power microwave wireless link technology, designed to connect phones, laptops, PDAs and other portable equipment

More information