1 / 43

The Bluetooth Radio System

The Bluetooth Radio System. Jaap C. Haartsen , Ericsson Radio Systems B.V. IEEE Personal Communication 。 February 2000. Outline. Ad hoc radio connectivity Bluetooth radio system architecture Bluetooth standardization Conclusion. Ad Hoc Radio Connectivity.

joanne
Télécharger la présentation

The Bluetooth Radio System

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. The Bluetooth Radio System Jaap C. Haartsen,Ericsson Radio Systems B.V. IEEE Personal Communication。February 2000

  2. Outline • Ad hoc radio connectivity • Bluetooth radio system architecture • Bluetooth standardization • Conclusion

  3. Ad Hoc Radio Connectivity Figure 1. Topologies for:a)cellular radio with squares representing stationary base stations;b)conventional ad hoc systems;c)scatter ad hoc systems

  4. Ad Hoc Radio Connectivity • Environmental characteristics have impact on the following fundamental issues: • Applied radio spectrum • Determining which units are available to connect to • Connection establishment • Multiple access scheme • Channel allocation • Medium access control • Service prioritization(i.e. voice before data) • (Mutual)interference • Power consumption

  5. Bluetooth Radio System Architecture • Radio spectrum • Interference immunity • Multiple access scheme • The modulation scheme • Medium access control • Packet-based communications • Physical link definition

  6. Bluetooth Radio System Architecture • Connection establishment • Hop selection mechanism • Error correction • Power management • Security • Interpiconet communications

  7. Radio Spectrum • The Industrial、Scientific、Medical(ISM)band;around 2.45GHz • The regulations in different parts of the world differ • The regulations generally specify the spreading of transmitted signal energy and maximum allowable transmit power

  8. Interference Immunity • In addition to interference from external sources(microwave ovens),co-user interference must be taken into account • Interference immunity can be abtained by interference suppression or avoidance

  9. Interference Immunity • Suppression can be obtained by coding or direct-sequence spreading • Interference avoidance in frequency is more attractive and more practical

  10. Multiple Access Scheme • FDMA is attractive but don’t fulfill the spreading requirements set in the ISM band • TDMA needs a common timing reference(cumbersome) • CDMA offers the best properties • Direct sequence(DS)-CDMA is less attractive • Frequency-hopping(FH)-CDMA is the best choices

  11. Multiple Access Scheme • Bluetooth is based on FH-CDMA • In the 2.45 GHz ISM band,a set of 79 hop carriers have been defined at a 1 MHz spacing。The channel is a hopping channel with a nominal hop dwell time of 625 us • The hopping sequence is determined by the master that controls the FH channel

  12. Multiple Access Scheme • All other participants on the hopping channel are slaves • Full-duplex communication is achieved by applying time-division duplex(TDD)。This means that a unit alternatively transmits and receives

  13. Multiple Access Scheme Figure 2. An illustration of the FH/TDD channel applied in Bluetooth

  14. The Modulation Scheme • A binary modulation scheme was chosen • Bluetooth uses Gaussian-shaped frequency shift keying(FSK)modulation with a nominal modulation index of k = 0.3 • The modulation scheme allows the implementation of low-cost radio units

  15. Medium Access Control • Bluetooth allows a large number of uncoordinated communications to take place in the same area • An FH Bluetooth channel is associated with a piconet • The number of units that can participate on a common channel is limited to eight(one master and seven slaves)

  16. Medium Access Control • Master controls the traffic on the piconet and takes care of access control • In order to prevent collisions on the channel due to multiple slave transmissions,the master applies a polling technique • Independent collocated piconets may interfere,then ALOHA is applied

  17. Packet-Based Communications Figure 3. The format of packets applied in Bluetooth

  18. Packet-Based Communications • Access code • Includes the identity of the piconet master • Only if the access code matches the access code corresponding to the piconet master will the packet be accepted by the recipient。This prevents packets sent in one piconet falsely being accepted by units of another piconet that happens to land on the same hop carrier

  19. Packet-Based Communications • Packet header • Contains link control information • 3-bit slave address • 1-bit ACK/NACK for ARQ scheme • 4-bit packet type code to define 16 different payload types • 8-bit header error check(HEC)

  20. Packet-Based Communications • Bluetooth defines four control packets: • The ID packet • The NULL packet • The POLL packet • The FHS packet • The remaining 12 packets is divided into synchronous and asynchronous services

  21. Packet-Based Communications Figure 4. The frequency and timing characteristics of single-slot, three-slot,and five-slot packets

  22. Physical Link Definition • Two physical link types define: • Synchronous connection-oriented(SCO)link;for voice traffic;point-to-point • Asynchronous connectionless(ACL)link;for bursty data traffic;point-to-multipoint • The ACL link can use all of the remaining slots on the channel not used for SCO links

  23. Physical Link Definition Figure 5. An example of mixing synchronous SCO links and asynchronous ACL links on a single piconet channel

  24. Connection Establishment • Three elements have been defined to support connection establishment:scan、page、and inquiry • When a Bluetooth unit wakes up to scan,it opens its sliding correlator which is matched to the access code derived from its own identity。The scan window is a little longer than 10ms。Every time the unit wakes up,it scans at a different hop carrier

  25. Connection Establishment • Paging units help the unit that wants to connect setup up the connection • The paging unit transmits the access code repeatedly at different frequencies :every 1.25ms;the paging unit transmits two access codes and listens twice for a response

  26. Connection Establishment Figure 6. Frequency and timing behavior for a Bluetooth paging unit

  27. Connection Establishment • The maximum access delay therefore amounts to twice the sleep time • The paging unit becomes the master using its identity and clock to define the FH channel,and the idle unit becomes the slave • The above-described paging process assumes that the paging unit has no knowledge at all of the idle unit’s clock

  28. Connection Establishment • If the units have met before,the paging unit can have an estimate of the clock and the phase in the idle unit。 • In this case,the average response time is reduced to half the sleep time

  29. Connection Establishment • To establish a connection,a unit may broadcast an inquiry message that induces recipients to return their address and clock information • For the return of the FHS packet,a random backoff mechanism is used to prevent multiple recipients transmitting simultaneously

  30. Hop Selection Mechanism Figure 7. The basic concept of hop selection in Bluetooth

  31. Hop Selection Mechanism • The mechanism satisfies the following requirements: • The sequence is selected by the unit identity,the phase by the unit clock • The sequence cycle covers about 23 hours • 32 consecutive hops span about 64 MHz of spectrum • On average,all frequencies are visited with equal probability • The number of hop sequences is very large • By changing the clock and/or identity,the selected hop changes instantaneously

  32. Hop Selection Mechanism Figure 8. The hop selection mechanism;the dashed line for the more significant clock part is used in connection mode only

  33. Error Correction • Bluetooth includes both FEC and packet retransmission schemes • For FEC,a 1/3-rate code and 2/3-rate FEC code are supported • 1/3-rate code uses a 3-bit repeat coding applied on packet headers and the payload of the synchronous packets • 2/3-rate FEC cod uses a shortened Hamming code applied on both the payload of the synchronous and asynchronous packets

  34. Error Correction • Bluetooth implemented a fast-ARQ scheme Figure 9. An example of retransmission operation in Bluetooth

  35. Error Correction Figure 10. ARQ mechanisms where received ACK/NAK information decides on retransmission and received payload determines transmitted ACK/NAK information

  36. Power Management • In the idle mode,the unit only scans a little over 10ms every Ts where Ts can range from 1.28 to 3.84s • PARK mode where the duty cycle can be reduced even more can only be applied after the piconet established • In the SNIFF mode during connection,the slave does not scan at every master-to-slave slot,but has a large interval between scans

  37. Power Management • If no useful information needs to be exchanged,no transmission takes place • Since power control cannot be coordinated among different systems,it cannot be prevented that certain systems always try to overpower their contenders,and the strongest transmitter will prevail

  38. Security • At connection establishment,a conventional challenge-response is carried out Figure 11. The Bluetooth authentication procedure

  39. Security • Before the transmission of each packet,the LFSR is initialized by a combination of EN_RAND、the master identity、an encryption key、the slot number • The 128-bit link key is a secret key residing in the Bluetooth hardware and is generated during an initialization phase • Bluetooth provides a limited number of security elements at the lower level

  40. Interpiconet Communication • Tens of piconets operate in the same area without noticeable performance degradation • At any instant in time a unit can communicate in one piconet only • The unit can jump from one piconet to another by adjusting the piconet channel parameters(i.e. the master identity and master clock)

  41. Interpiconet Communication • HOLD mode has been introduced to allow a unit to temporary leave on piconet and visit another • Traffic scheduling and routing in a scatternet with interpiconet communications is a challenge and still a subject for future study

  42. Bluetooth Standardization Figure 12. The Bluetooth protocol stack

  43. Conclusion • A robust radio system which provides a universal wireless interface to a large range of low-cost,portable devices • Describe the motivation of the various design choices

More Related