Research Report: Bluetooth Technology, Range Issues, and Solutions

Verified

Added on  2020/02/24

|12
|3435
|36
Report
AI Summary
This report provides a comprehensive overview of Bluetooth technology, examining its architecture, applications, and various issues. It begins with a literature review, discussing the core problems of version control and device compatibility. The report details a research journal outlining the steps taken to gather and analyze information. It then explores the Bluetooth architecture, including different layers and protocols, followed by a background section that highlights the technology's applications and range limitations. The report addresses the factors influencing Bluetooth range and discusses the use of gateways and mesh networking to improve performance. It also covers the framework and methods used in the research, including qualitative and quantitative approaches. The discussion section delves into misconceptions, security measures, and technical specifications of Bluetooth. Finally, the report examines approaches for solving range issues, troubleshooting, and improving backward compatibility. The report concludes by summarizing the key findings and providing references for further study.
Document Page
Assignment on Introduction to research
2017
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Contents
Literature Review:.................................................................................................................................2
Task of Research Journal:..................................................................................................................2
Broad Scan:.......................................................................................................................................3
Background:..........................................................................................................................................4
Framework and methods:......................................................................................................................5
Discussion:............................................................................................................................................5
Approaches for Solving range issues:....................................................................................................7
Experiments:..........................................................................................................................................8
Research criteria:...................................................................................................................................9
Evaluation:............................................................................................................................................9
Conclusion.............................................................................................................................................9
References...........................................................................................................................................11
Document Page
Literature Review:
Bluetooth is the wireless technology which is used for connecting the peripheral units for
managing the short range wireless communication. “The basic problems which are seen in the
Bluetooth technology are maintaining the version control of the different participating
devices and the use of newer devices to manage connection with the older devices”
(Mulliner, 2015). The control of information flow through the Bluetooth technology can be
done by using the Bluetooth trademarks and Bluetooth certification process. There are some
capabilities which are associated with the Bluetooth technology are:
“Advanced audio distribution profile for managing the streamlining of wireless
communication” (Gunnar, 2016).
Hand free profile is used for sending and retrieving calls.
Phone book access profile is used for accessing contacts from the call history.
Message access profile is used for notifying the reading of the text messages and
emails.
Human interface device is used for managing the association of different devices.
Personal area network is used for managing sharing of web connections on the local
area network.
Audio video remote control profile is used for controlling the TV signals.
Task of Research Journal:
Date Task Action Description
2/ Aug/ 2017 Searching of the
topic
The list of topics is
prepared
Selection of the topic
from the prepared list
5/Aug/2017 Searching of the
papers and different
sources
Saving and
developing
documentation
Making the folder for
the data collection
10/Aug/2017 Reading of literature
collected
Reading of two
research papers from
the collection of
paper which are
relevant to the topic
Relevancy with the
selected topic
12/Aug/2017 Reading of literature Reading of two Relevancy with the
Document Page
collected research papers from
the collection of
paper which are
relevant to the topic
selected topic
15/Aug/2017 Reading of the paper Making notes of the
research paper
Write the research in
your own words.
Broad Scan:
The architecture of the Bluetooth technology is made up of different layers. “The Human
computer interaction layer is responsible for managing separation between hardware and
software” (Frenzel, 2012).
The architecture of the Bluetooth technology is made up of different layers. “The Human
computer interaction layer is responsible for managing separation between hardware and
software” (Frenzel, 2012). The implementation of the Bluetooth involves synchronization of
following layers:
Bluetooth architecture Layer Description
Application layer This layer is responsible for building profile
guide for the application
Telephone control system This layer deploys the telephony services
Service discovery protocol This protocol is used for providing services
to the remote Bluetooth devices
WAP It provides the interface to the higher layer by
making use of communication protocols.
RFCOMM It is used for managing serial interface
L2CAP It is used for managing multiplexing of data
shared with higher layers
HCI It is used for handling communication
between host ad the Bluetooth technology
Link manager protocol This protocol is used for managing
configuration with devices
Baseband and link controller This is used for managing physical links with
the assemblage of packets.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Radio waves Radio waves are used for modulation and
demodulation in the transmission of data.
Background:
The Bluetooth technology is used in deploying the wireless headsets, file transferring
between different participating devices, use of wireless printers, use of wireless speakers, in
the development of monitoring and reporting of devices, in monitoring sensors, and others.
The major issue which is associated with the implementation of Bluetooth technology is of
range. The range issue should be considered while dealing with the Bluetooth technology.
The following table gives the clear concise concept of the Bluetooth range.
Categories Bluetooth 2.1 Bluetooth low energy
Range It is near about 100 meters It is near about 100 meters
Maximum range It is near about 100 meters It is near about 100 meters
Frequency It is in between 2.402 and
2.481 GHz
It is in between 2.402 and
2.481 GHz
Maximum data transfer rate It is in between 1 to 3 Mbit /
Sec
It is around 1 Mbit / sec
Throughput application It is in between 0.7 to 2.1
Mbit / sec
It is up to 305 kbit / sec
Topologies used Scatternet and point to point
topologies are usually used
Mesh and point to point
topology are used
Network Standard 802.15.1 is the IEEE
standard for Bluetooth
802.15.1 is the IEEE
standard for Bluetooth
The range of the Bluetooth technology depends on the factors like output power generation
associated with the transmitter, the sensitivity of the receiver, the physical obstacles which
can come in the transmission path of the data, and the use of antennas. The performance of
the Bluetooth devices depends upon the performance of the radio waves and the antennas
used. The steps should be taken to improve the range of the Bluetooth devices for enhancing
the distribution of the information between different participating devices. “The Bluetooth
devices can communicate with the online services by making use of gateways” (Mahmood,
Document Page
2014). The deployment of gateway is the best solution for managing the flow of information
when the devices are placed in the large geographical area. The placement of the hubs can
helps in handling direct connection between the devices. The mesh networking protocols can
enhance the performance of the Bluetooth devices. The mesh network provides the gateway
for accessing and sharing of information between the Bluetooth devices. “The broadcasting
of the messages can be done in the mesh networking topology” (Rijah, 2017). The messages
can instantly share between the participating units. The Bluetooth low energy network is
successful in managing different devices for enabling sharing of information. The flow of
information can be easily controlled in the Bluetooth environment. The central gateway is not
required for managing the traffic on the network.
Framework and methods:
The qualitative and quantitative approach is used for analysing the result of the research on
Bluetooth technology. “The questionnaire and interviews are the valuable methods which are
used for reviewing the Bluetooth technology” (Purdy, 2012). The qualitative approach is used
for focusing on the issues related with the Bluetooth technology.
Interviews: The face to face communication helps in analysing the advantages and
disadvantages of Bluetooth technology.
Questionnaire: Questionnaire helps in formulation of open ended and close ended questions
which are used for providing opportunities to research about the Bluetooth technology.
Discussion:
There are some misconceptions with the Bluetooth technology. Bluetooth is categorised as a
short range technology which does not provide security to the Bluetooth network. It has been
analysed that it is not confined to the short range devices. The standard range of the
Bluetooth is expressed in the table below:
Classes Transmission power Intended Range
Class 1 It is about 100 mw The range is less than 100
meters
Class 2 It is about 2.5 mw The range is less than 10
meters
Class 3 It is about 1 mw The range is less than 10
Document Page
meters
The mobile devices and the Bluetooth headsets come in the category of class 2. The
Bluetooth is widely recognised in wireless LAN environment. Bluetooth enabled devices are
used to connect LAN remotely. The Bluetooth network encapsulation profile depends upon
the radio frequency communication protocols. The IP address of the host name is
automatically managed by the wired interface. The vulnerabilities like buffer overflow can
occur. The limited operations can be performed with the Bluetooth technology. The technical
specification of the Bluetooth technologies is described in the table below:
Connection Frequency of spread spectrum
Frequency band 2.4 GHZ
Use of modulation technique Gaussian frequency shift
Use of MAC scheduling scheme FH-CDMA
Use of transmission power Greater than 20 dbm
Aggregation in the data rate It should be in between 0.721 to 1 Mbps
Range It is in between 10m to 100 m
Supported stations It can be 8 devices
Use of voice channels 3
Data security Use of 128 bit key
Encryption mechanism for data security 8 to 128 bit.
The security methods are used for providing security to the Bluetooth. The levels of security
are developed for measuring the security in the Bluetooth devices. The security provides the
unauthorised access of data transmission. The authorization security methods are used for
developing access control on the information. The access controls are the rules which are
used during the operation for managing request and authentication of the device. The
services should be granted for providing authorisation to the devices. There are various keys
which are used for managing the operation permanently and temporarily such as link key,
encrypted key, and pin key. The link key is used for permanent storage and non-volatile
storage. The temporary keys are used for terminating the present situation. “The Pin key is
used for selecting the fixed number by making use of encryption key” (Paavola, 2011). The
mechanism of authentication is used for providing identity to the user for accessing the
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
information. The new keys are generated for managing new connection with the connected
devices. There are three modes which are used for managing the Bluetooth security. The
security is not initiated with the Bluetooth devices. It is a non-secure mode which is used for
providing authentication and encryption procedures for connecting the Bluetooth devices.
The security procedures should not be used for establishing connection with the Bluetooth
devices. There are different flexibility policies which are used for running the application.
“The security manager mentioned the mode for accessing control to the services. The
centralised security manager enforced the access control to the services. He is responsible for
maintaining the interface between protocols” (Chaitanya, 2013). This mode supports the
confidentiality of data, authentication, and authorization mechanism. The mode 3 is
responsible for initiating security procedures for completing the link set up. The application
layer security is not fixed in the security layer. The authentication and sharing procedures are
used with the help of secret link key.
Approaches for Solving range issues:
Many troubleshooting processes are carried out during the manufacturing of the Bluetooth
devices. The compatibility issues which are associated with the Bluetooth devices are
development of the newer compact devices which support computational power for Bluetooth
connection within the specification of operating device. “The major issue which is associated
with the implementation of Bluetooth technology is of range” (Clayton, 2013). The range
issue should be considered while dealing with the Bluetooth technology. The range of the
Bluetooth technology depends on the factors like output power generation associated with the
transmitter, the sensitivity of the receiver, the physical obstacles which can come in the
transmission path of the data, and the use of antennas. The errors in the operating system of
the Bluetooth devices can be the cause of connection breakdown. The hardware issues are
associated with the smart devices for the proper interaction with the operating system. The
Bluetooth certification process result into the smooth functioning of the range issues. The
problems of the range issues can be resolved by using the updated version of the Bluetooth in
the devices. The devices should be controlled by making use of smart application. The
Bluetooth version should be updated according to the new operating system. The connection
problems should be resolved by using the updated procedures. The resetting of the Bluetooth
devices should be done periodically. The streaming of data keeps the Bluetooth devices
updated. The backward compatibility of the Bluetooth can be improved by updating the new
Document Page
products. The Bluetooth has the capability to jump between numbers of channels. it can be
measured through channels used hundreds of time per second. When the error occurred in the
Bluetooth technology, it should be resolved by updating the version.
The Bluetooth signals operate in the frequency band of 2.45 GHZ. The spread spectrum
frequency hopping technology is used for managing the Bluetooth services and application.
The interference can be controlled by using multiple frequencies at a single moment of time.
The 10 meters is the approximate range of carrying Bluetooth signals between two devices
for sharing of information. It helps in replacing the use of cables for establishing
communication with the personal area network.
Experiments:
The interference is the major issue which exist between hands free headset and Bluetooth
technology. The Bluetooth enabled devices are used for managing interface between different
devices. The barriers like Bluetooth metal, concrete and plaster bricks, bulletproof glass, and
etc. are used for overcoming the problem of interference. The router channel should be
changed according to the need of the application. The rebooting of the Wi-Fi connection
helps in managing the interference in the Bluetooth technology for communication. The
router setting is used for changing and managing the channel manually. The Bluetooth
devices should be move closer to the router used for transferring information between the
devices. The change in frequencies can occur due to the occurrence of microwaves and
florescent light. The connection issues can be resolved by updating the version of the
operating system periodically. “The use of mesh topology and gateways are the preferred
solution to resolve the range issues associated with the deployment of Bluetooth technology”
(Bahl, 2015).
The Bluetooth is the wireless communication which is used for transmitting voice and data at
a very high speed by making use of radio waves. “Bluetooth is the standard protocol which is
used for managing short range radio communication between different associated devices”
(Paul, 2014). The devices which are used for communication are mobile phones,
entertainment system, electronics, and computer. The maximum distance which can exist
within the different participating devices for managing Bluetooth communication should be
approximately 10 meters. “The 2 mega-bit per second is the data transfer rate for information
sharing” (Gaikwad, 2015). The operational frequency band for the Bluetooth technology is
Document Page
about 2.45 GHz. The microchip is used for data transfer in the devices which make use of
Bluetooth technology. The link manager software is used for sending and receiving data in
the Bluetooth technology. “The frequency hopping spectrum is used for developing multiple
frequencies for limiting the interference between the participating multiple devices”
(Goldsmith, 2014). The wireless communication should be developed between peripheral
devices. The continuous exchange of data can be possible with the use of Bluetooth
technology. The data applications can be streamlined for managing the continuous exchange
of data. “The devices are capable of sending and receiving information at the same time”
(Wright, 2015). There are various advantage of using Bluetooth low energy which are
categorised as consumption of lower power in the same range, use of lower bandwidth, and
others.
Research criteria:
The focus of this paper is to determine the range issues associated with the use of Bluetooth
wireless technology. There are some misconceptions which are associated with the use of
Bluetooth technology. We will also focus on the threats and mitigation schemes which are
deployed by the Bluetooth technology.
Evaluation:
The objective of this paper is to focus on the range issues which are associated with the
deployment of the Bluetooth technology. The paper also outlines the dependencies of the
range in the Bluetooth scenario. The aim of this paper is to predict the methods used for
improving the range of Bluetooth within the networking site.
Conclusion
The Bluetooth technology is used in deploying the wireless headsets, file transferring
between different participating devices, use of wireless printers, use of wireless speakers, in
the development of monitoring and reporting of devices, in monitoring sensors, and others.
The range of the Bluetooth technology depends on the factors like output power generation
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
associated with the transmitter, the sensitivity of the receiver, the physical obstacles which
can come in the transmission path of the data, and the use of antennas. The deployment of
gateway is the best solution for managing the flow of information when the devices are
placed in the large geographical area. The placement of the hubs can helps in handling direct
connection between the devices. The mesh networking protocols can enhance the
performance of the Bluetooth devices. The Bluetooth version should be updated according to
the new operating system. The connection problems should be resolved by using the updated
procedures. The control of information flow through the Bluetooth technology can be done
by using the Bluetooth trademarks and Bluetooth certification process. Bluetooth is the
wireless technology which is used for connecting the peripheral units for managing the short
range wireless communication.
References
Bahl, S. (2015). Gi Fi: Future of wirelss technology. 1st ed. [ebook].
https://www.ijarcce.com/upload/2015/june-15/IJARCCE%2018.pdf [Accessed 03 Sep.
2017].
Document Page
Chaitanya, P. (2013). A review on improving technologies in wireless communications. 1st
ed. [ebook]. http://www.ijettjournal.org/volume-4/issue-4/IJETT-V4I4P308.pdf [Accessed 03
Sep. 2017].
Clayton, B. (2013). A literature review of recent development in bluetooth networking. 1st ed.
[ebook]. http://www.cs.ru.ac.za/research/g01c2974/honours/reports/literaturesurvey.pdf
[Accessed 03 Sep. 2017].
Frenzel, L. (2012). The fundamentals of short range wireless technology. 1st ed. [ebook].
http://www.electronicdesign.com/communications/fundamentals-short-range-wireless-
technology [Accessed 03 Sep. 2017].
Gaikwad, P. (2015). Bluetooth based smart automation system using android. 1st ed. [ebook].
https://www.ijsr.net/archive/v6i5/3051709.pdf [Accessed 03 Sep. 2017].
Goldsmith, C. (2014). Wireless local area network for device monitoring. 1st ed. [ebook].
http://auworkshop.autodesk.com/library/bim-curriculum-construction/4d-simulation-and-
construction-planning [Accessed 03 Sep. 2017].
Gunnar, J. (2016). Things should be known about Bluetooth range. 1st ed. [ebook].
http://blog.nordicsemi.com/getconnected/things-you-should-know-about-bluetooth-range
[Accessed 03 Sep. 2017].
Mahmood, A. (2014). A review of wireless communication for smart grid. 1st ed. [ebook].
https://www.researchgate.net/publication/264860124_A_Review_of_Wireless_Communicati
ons_for_Smart_Grid [Accessed 03 Sep. 2017].
Mulliner, C. (2015). Security and privacy issues of wireless technologies. 1st ed. [ebook].
http://www.cs.ucsb.edu/~almeroth/classes/tech-soc/2005-Fall/11-01.pdf [Accessed 03 Sep.
2017].
Paavola, M. (2011). Wireless technologies in process automation- Review and an
application. 1st ed. [ebook]. http://jultika.oulu.fi/files/isbn9789514287053.pdf [Accessed 03
Sep. 2017].
Paul, Z. (2014). Short range wireless communication: Bluetooth, zigbee, and infrared
transmission. 1st ed. [ebook]. http://study.com/academy/lesson/short-range-wireless-
communication-bluetooth-zigbee-infrared-transmission.html [Accessed 03 Sep. 2017].
chevron_up_icon
1 out of 12
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]