Bluetooth is today one of the most well known wireless technologies. It is used for data transmission between devices over short distances. This technology uses UHF radio waves from 2.402 GHz to 2.480 GHz. Bluetooth was introduced on May 7th,1989. The present article discusses how it works, its principales, as well as how the connection is established.
The Bluetooth standard, like WiFi, uses the FHSS technique (Frequency-Hopping Spread Spectrum), which involves splitting the frequency band of 2.402-2.480 GHz into 79 channels (called hops), each 1MHz wide. Then it transmits the signal using a sequence of channels known to both the sending and receiving stations.
The Bluetooth standard is based upon a master/slave operational mode. The term piconet is used to refer to the network formed by one device and all devices found within its range. Up to 10 piconets can coexist within a single coverage area. A master can simultaneously connect to up to 7 active slave devices (255 when in parked mode). Devices in a piconet have a logical address of 3 bits, for a maximum of 8 devices. Devices in parked mode are synchronized, but do not have their own physical address in the piconet.
In reality, at a given moment, the master device can only be connected to a single slave at once. Therefore, it quickly switches between slaves in order to make it seem as if it is simultaneously connected to all the slave devices.
Establishing a connection between two Bluetooth devices follows a relatively complicated procedure meant to ensure a certain amount of security, as follows:
During normal use, a device operates in passive mode, meaning that it is listening to the network.
Establishing a connection begins with a phase called inquiry, during which the master device sends an inquiry request to all devices found within its range, called access points. All devices that receive the query reply with their address. Then, the master device chooses an address and synchronizes with the access point using a technique called paging.This primarily involves synchronizing its clock and frequency with the access point.
After, a link with the access point is established, allowing the master device to enter an access point service discovery phase, using a protocol called Service Discovery Protocol (SDP).
At the end of this service discovery phase, the master device is ready to create a communication channel with the access point, using the protocol L2CAP.
Depending on the service's needs, an additional channel (called RFCOMM and operating over the L2CAP channel) may be established in order to provide a virtual serial port.
Some applications have been designed to connect to a standard port, independent of the hardware used. For example, certain highway navigation programs have been designed to connect to any GPS Bluetooth device. Today, there are also more and more bluetooth headphones.
The access point may include a security mechanism called pairing that restricts the access to authorized users only, in order to give the piconet a certain measure of protection. Pairing is done with an encryption key commonly known as a PIN (Personal Information Number). To do so, the access point sends a pairing request to the master device. Most of the time, this may prompt the user to enter the access point's PIN. If the PIN received is correct, the connection is made.
In secure mode, the PIN will be sent encrypted, using a second key, in order to prevent the signal from being compromised.
The Bluetooth standard defines a certain number of application profiles, called Bluetooth profiles, in order to define which kind of services are offered by a Bluetooth device. Thus, each device can support multiple profiles. Here is a list of the main Bluetooth profiles: