Está en la página 1de 8

STUDY AND TRIALS OF BLUETOOTH TECHNOLOGY AS AN ALTERNATIVE WIRELESS DATA COMMUNICATIONS

Yulia Faculty of Industrial Technology, Department of Informatics, Petra Christian University e-mail : yulia@petra.ac.id Leo Willyanto Santoso Faculty of Industrial Technology, Department of Informatics, Petra Christian University e-mail : leow@petra.ac.id

Abstract Bluetooth is a new emerging technology. This technology gives significant changes for electronic devices that we are using. If we look around, a keyboard is connected to a computer. So does a printer, a mouse, a monitor and so on. This condition creates a problem of so many scattered wires installed in the offices, houses and other places. Another problem is how to inspect the damaging or boken wires. In this paper, we will have a discussion on specific applications of bluetooth such as services provided by the bluetooth technology; bluetooth method - how bluetooth devices make connections in a piconet; as well as investigation on bluetooth protocol stack. Bluetooth has succesfully built easy connection among devices from many vendor without using cables, with less power dan money. By using bluetooth, we can build small network or Piconet, consisting of several devices without cables. Keywords : Bluetooth, Bluetooth Protocol Stack, Piconet, Data Communication, Wireless.

I.

INTRODUCTION The name Bluetooth come from the name of a king is Harald Blatan (translated in English as a Bluetooth), who lived during the mid tenth century. Harald Blatand unify and controlling of Denmark and Norway. It makes the inspiration to naming the equipment connected together similar to Bluetooth [1]. Bluetooth is a radio chip that is inserted into the computer, printer, mobile phones and so on [1]. Bluetooth chip is designed to replace cables. The information normally carried by the cable is transmitted by bluetooth at certain frequencies subsequently accepted by the bluetooth chip then the information is received by the computer, mobile phones and so on. If we can transmit data from computer to printer why can not transmit from phone to a printer or from the printer to another printer. In more detail, Bluetooth is the name given to a new technology using short range radio links to replace the cable connection or a portable electronic device that is certain. The objective is to reduce the complexity, power and cost. Bluetooth is implemented on places that does

not support wireless system, at home or on the road to form a Personal Area Networking (PAN), the equipment was used collectively together. There are thirteen specific applications of Bluetooth [2] : Generic Access : procedures for link management that provide a way to build and maintain a secure link between the master and slave. Service Discovery : protocol to determine the service provided. Serial Port : replacement for serial cable ports. Generic Object Exchange : establish a relationship of client - server for the object movement. LAN Access : protocol between mobile computers and fixed LAN. Dial Up Networking : allows a computer or notebook to dial / call via mobile phone. Fax : allow mobile fax to speak via a mobile phone. Cordless Telephony : connect the headset

with a local base station. Intercom : digital walkie talkie. Headset : allow handsfree voice communication. Object Push : provides a way to exchange simple objects. File Transfer : provide facilities in a more general file transfer. Synchronization : allow the PDA to synchronize with other computers. WORKINGS OF THE BLUETOOTH In Figure 1. Shows how Bluetooth devices connect to the piconet. Piconet consists of a master device and the active slave devices, where the maximum number is 7 active Slaves. A collection of several interconnected piconet called scatternets. II.

1,28 seconds. In the Standby mode the bluetooth device can reduce power consumption up to 98%.

Figure 3. Bluetooth Inquiry Process. Inquiry is a process of how a Bluetooth device to learn about other existing Bluetooth devices within range. In Figure 3, node A issued a functioning page on the Bluetooth Inquiry ID and receive replies from device B, C, E, F, G, I, J, and K. From these replies, A knows the identity of the other devices (for example, a Bluetooth device on their unique ID). During the inquiry process, device A continue - constantly doing broadcasts Page command by using the reserved Inquiry ID. Broadcasts are scattered along the standard pattern of 32. Standby radio frequencies where all the devices in standby mode monitor on an occasional basis. Then, each standby device within range will receive the inquiry page. By doing the approval, this nodes will respond with a standard Bluetooth FHS packet which provides its unique ID and their clock offset. Node H in Figure 3 shows how a Bluetooth device can be programmed as an anonymous (Undisco - verable).

Figure 1. Operational State of Bluetooth. Bluetooth devices have 4 basic states, among others is the master (which controls a piconet), active slave (connected and actively monitor the piconet), parked slave (according to the logic is still part of the piconet, but a low power), and standby (not connected to the piconet).

Figure 2. Bluetooth at first. Figure 4. Bluetooth Paging Process. Bluetooth device was initially only know about themselves and in this status they will be in Standby mode. Standby is a passive mode in which a Bluetooth device occasionally listen if any other bluetooth devices that wish to communicate, this is called Inquiry. This process is carried out for 10 milliseconds every After the inquiry process, will be doing the paging process, where in this process will be built on the relationship between the devices, (between the master as a beginner with a slave). The relationship between master and slave on the bluetooth called piconet.

To create a piconet, device A broadcasting Page command with an explicit target device ID of the slave (in the picture above is B) that has been prepared. All bluetooth devices except B will ignore this command because it is not aimed at them. When device B replies, device A will send a FHS packet back and set it as Active Member Address on piconet. As an active slave, device B starts to monitor continuously the next command from the device A. A bluetooth master can do this paging process with a maximum of 7 active Slaves. 7 is an upper limit because it provided only 3 bits in Bluetooth for the Active Member Address (AMA) with 000 reserved for master and the rest for slaves. Once again, all active slaves to A will be monitored continuously for commands was addressed to them in synchronization with the device A hopping pattern.

With the Active Member Addresses released by an active Slaves, bluetooth master can make the process of paging with other devices to become active slaves. In figure 6, device A add the H and C into its piconet with the AMA released by parking nodes B and J.

Figure 7. Scatternet. Each Bluetooth node can be part of multiple piconets at the same time. This makes some of the piconet can be joined to form a structure called scatternet. In Figure 7, two piconet combined to be a scatternet through the slaves E and I.
III. BLUETOOTH PROTOCOL STRUCTURE

Each Bluetooth system consists of a host based application and a Bluetooth module. Host can be anything, from a standalone computer up with an embedded controller as in a cell phone [4]. Figure 5. Parking Process. Parking is a mechanism that allows the Bluetooth master to connect with 256 additional devices. 256 is the upper limit because it provided by 8 bits on Bluetooth for Parked Member Address (PMA). To park a device, master issued the pack command to an active slaves and set it as PMA. then this slaves is entered parked mode and handed that AMA's. As a parked slave, device will be changed into passive mode and only monitors the commands on the occasional basis.

Figure 8. Bluetooth Protocol Structure. Figure 8 shows how the tasks were distributed starting from the host to the Bluetooth radio and otherwise. Each layer performs a specific function, same as in an ethernet stack. This architecture will make system design easier and make a lot of implementations appear. The tasks of the layer are as follows : SDP Layer (Service Discovery Protocol) Served as a place to ask for information units, information services and the characteristics of the service.

Figure 6. Piconet Generating Process.

RFCOMM Layer Served to emulate control and data signals from RS232 on bluetooth baseband layer, and provide transmission capacity at the top level service that uses a serial interaction as a mechanism of transmission. L2CAP Layer (Logical Link Control and Adaptation Protocol) Served to adapting the protocol layer above the L2CAP layer on layer baseband is by running the multiplex at various connections logic which done by layer on top. Set the process creation and termination of virtual connections, called Channels Negotiations with other devices and / or dictates the parameters. Including the Security and Quality of Service (QoS) etc. Regulate the flow of data between the host and the Link Manager. LMP Layer (Link Manager Protocol) Served to set the configuration between Bluetooth unit and set the security aspects such as encryption and authentication. Also set the data flow between L2CAP and Baseband with building the channel. Baseband Layer Served to establish a physical connection between Radiofrequency and Bluetooth unit in making a connection. Set and control the radio interface.
IV. BLUETOOTH DATA FRAME STRUCTURE

Dedicated Inquiry Access Code (DIAC), general to a class of Bluetooth devices. Inquiry process "finds" Bluetooth devices within range. Packet Header AM_ADDR : 3 bits of the address indicates an active member of the piconet. Data Type : shows various types of packets and the length. Allow non-addressed slaves to determine when they can transmit. Flow Control Acknowledgement : ACK/NAK field HEC : header error check, if an error is found, whole packet discarded. BLUETOOTH APPLICATION Application of the Bluetooth File Transfer File transfer using the model capability to transfer data from one device object (such as, PC, Smartphone or PDA) to other. Object types including, but not limited to ; .xls, .ppt, .wav, .jpg, and .doc files, the entire directory or streaming media formats [4]. Also use models offer the possibility to do browse the contents of folders on the remote device. In Figure 10, described protocol stack required for this model. This image does not display the LMP, Baseband and Radio Layers, although they are needed below. V.

The structure of a Bluetooth data frame can be seen in Figure 9.

Figure 10. File Transfer Protocol. Application Of the Bluetooth Internet Bridge In this model, mobile phone or cordless modem acts as a modem to a PC, provides the ability to dial - up networking without requiring a physical connection to a PC. Dial up scenario networking requires 2 piece protocol stack, which appears in figure 11, AT commands required to control the mobile phone or modem and the other stack (such as, PPP over RFCOMM) to transfer the data payload [4].

Figure 9. Bluetooth Data Frame Structure. Channel Access Code (CAC) : identifies a piconet, this code is used by all traffic exchanged on a piconet. Device Access Code (DAC) : used for signaling, such as paging and response to paging. Inquiry Access Code (IAC) : General Inquiry Access Code (GIAC), general to all bluetooth devices.

Figure 11. internet Bridge Protocol. TRIALS The trial will be conducted on three Bluetooth devices, that is : Mobilephone, PDA and Notebook. Scenario testing can generally be seen in Figure 12. VI.

Figure 14. Entering the PIN Process. 4. performed pairing process between notebook and mobilephone with the name Adi, security process is also done here by entering a PIN number. 5. Then the Adis phone will also make the process of entering a PIN, where the PIN number is entered in the notebook (master) should be the same as the PIN number is entered on the Adis phone. 6. Formed a piconet, where the notebook as a master and Adis phone as active slaves. 7. Performed service selection process, Services include internet connection, browse folder (with the OBEX protocol), file transfer, business card transfer, etc.

Figure 12. Equipment for Bluetooth Demo. Notebook with Mobilephone and PDA 1. Notebook became Master. 2. Notebook conduct inquiry process to find what devices are in range.

Figure 15. Services provided. PDA with Bluetooth Mobilephone Discovering Start Bluetooth Manager from the Start - up Menu, then select search. Make sure that the Figure 13. Devices Searching Process. 3. Found several devices include 3 Mobile Phone and 1 PDA.

phone in discoverable mode. Examples of the T39 :


Extras menu, then Bluetooth, then select Discoverable.

Figure 16. Other Devices Searching Process. 1 device found dan tekan Save.

Figure 18. Save into the Group Process. The device will shows the main list :

Figure 17. Device Found. Pairing/Paging Process On the phone, select a mode to accept the new paired devices Extras Menu | Bluetooth Select Paired Device Select Add Device On PDA, entered on the device found. This will directly to the pairing process. Then enter the PIN code on both devices.

Figure 19. Display on Equipment.

Figure 20. Pairing Process.

Figure 21. PIN Code Requested Process.

Figure 23. Creating Serial Port. Then on the Primate of the System Software, select the following connection (COM8:)

Figure 22. Device Information. Creating Serial Port Now do the create a serial port process. AT commands are used for SMS and Dial are not used for Dialup Modem profile : Select Connect to Serial Port. (1 or 2) :

Figure 24. Bluetooth Connection. VII. CONCLUSION Some conclusions can be drawn are : a. Bluetooth provides a robust communications with short distances. b. Flexible configuration can support multiple applications. c. With bluetooth, variety of equipment from different vendors can be connected wirelessly to form a personal area network. REFERENCES [1] Bluetooth Introduction; http://www.xilinx.com/esp/networks_tele com/bluetooth/tutorials.htm; access date 6 April 2004. [2] Andrew S. Tanenbaum; Computer Networks; 4th ed.; Prentice Hall; 2003.

[3] Riku Mettala; Bluetooth Protocol Stack; 1999. [4] Bluetooth Tutorial; http://www.newlogic.com/products/Bluet ooth-Tutorial-2001. pdf; 2001.

También podría gustarte