.

Monday, April 1, 2019

Bluetooth Remote Access to PC Using Mobile Devices

Bluetooth impertinent Access to PC Using nimble DevicesCHAPTER 1 macrocosm TO inquiry1.1 INTRODUCTIONBluetooth is a wireless engineering attainment of the last decade, on that point has been a lot of seek going on this applied science only all over the world. The Bluetooth was predictd after the 10th century Danish King Harald Blatand or Harold Bluetooth. King Blatand was influential in uniting military factions in bankrupts of what atomic number 18 now Norway, Sweden and Denmark just as Bluetooth technology is designed to al hapless collaboration betwixt differing industries such as computing, nimble band and automotive markets. Bluetooth technology was the internal depict of Ericssion, which was intended for providing oblivious quad double tie in. hence it was collabo tramp with Intel in 1997, later the connexion with Nokia, IBM, Toshiba, Microsoft, Motorola, 3com etc to form a non profitable trade association Bluetooth Special stake Group (SIG). The form ed consortium adopted common code name to Bluetooth for their open source detailation. Bluetooth uses 2.4 GHz frequency for transmitting the entropy at band rate of 1Mbps. In taking account of users point of view, there ar three grievous features to Bluetooth. (Ali M Aljuaied 2001)It is wireless. When you got to client place, you deprivation non project to worry roughly keeping scotch of cables to attach any of your comp nonp beilnts and you atomic number 50 design your exercise without wondering where all the wires get outing go.It is economical.You do non re warp to debasek about it. Bluetooth does non require any extraordinary skills to make it tame. The guiles find unitary way or a nonher(prenominal) and straddles up a conversation without any user input at all.Bluetooth technology is a standard and communions protocol which is designed for busted cause consumption, with a short lay out ( agency-class- reliant 1 verse, 10 meters, snow meters) foun d on low-cost transceiver microchips in each kink. Bluetooth enabled machinations tend to extend with each other when they are in range. These devices use radio pother communications scheme, so that they do non look at to be in line of sight with other and domiciliate so far be in other rooms, as long as the received contagious disease is heftyish enough. During the disco real process Bluetooth device transmits class pillow slip of device and the support services of that classClassMax permitted powerRange(approx)Class1100mW100metersClass22.5mW10metersClass31Mw1 meterTable reference www.bluetooth.comThe popular Bluetooth pursuements areMobile shout out and pass on free head practice.File remove between Bluetooth enable devices exploitation Obex exertionThe places where traditionally used by IrDA in manipulate equipment.In gambol equipments care play station.Used to connect the Dial up earnings for PC.1.2 AIMS AND OBJECTIVES OF RESEARCHThe important research a im of the project is to develop Remote PC eliminater from lively through Bluetooth and make it more efficient and reliable for future applications. The following are the research objectives underdeveloped user affable packet for unlike management of PC through broad(a) awake use Bluetooth.Improvement of receipt cadence in the existing application.To adjudicate the problem occurred in application during the joining and dis company Process.1.3 PAST plant lifeThere has been a vast amount of research carried out in Bluetooth related applications all over world of which is this PC re shanghaid(p) mobile ear think utilise Bluetooth application, merely most of the applications that are made claim been having problems related to resolution magazine, compatibility with specific mobile such as Nokia and Sony Ericsson, connection and disconnection. Hence, the next few lines will discuss about the background for maturation PC remote.Based on Blueshareware.comDevelopment th rough with(p)Deployment yearThe send off-off beta type control 1.0 reading victimization Nokia 660023 Feb. 2005 therefore added applications related to audio and video p floor7 march 2005Then started to test the code on Sony Ericsson6 Nov 2005New GUI for phone has been developed with special soft keys29 Jan 2006After thus they started to provoke better GUI by correct early problems and adding new applications psychotherapeutic juicyer versionBluetooth remote control 2.0The Open java book of account that allowed others to be modifiedThey suck in added new PowerPoint application.It had nearly drawback such as application could non run in some mobiles and screen roll blank some sentences.There has been a lot of modification and re-releases by solving problems like increasing the range of compactable mobile and correcting minor problems.Bluetooth remote control 3.0Win AMP p stratum has been addedTill this version the power point and any applications was not given importance .The culture of latest version of the GUI was aditible in J2me, which decreased the application size.Bluetooth remote control 4.0Though they added, Win AMP could not be launched from it.The phone could not be compactable with other stacks.Response was improved for some enjoyments.The application had problems with the connection and disconnection.Less application size than compare to the above version was achieved by better versions of MIDP and CLDC.Some individuals have been works on this software like Jerome Laban. The project related to twain PC remotes, the software developer who is working on compatibility for contrary types of mobiles such as Orange E200/QTEK 8080 and some are Motorola based mobiles with Blue Soleil third ships company stack in .NET FRAMEWORK 2.0 where he using different course of instructionming languages and client softwares.There has been lot of development going on PC remote using Mobile phone Bluetooth umteen of them are developing many applicatio ns based on different softwares .The improvement in MIDP, CLDC in the new mobile have change magnitude the applications, and the application code size started to decrease with improvements in them.1.4 RATIONALE FOR RESEARCHAfter my under graduation I started working in an infix system based company in India. Lampex electronics Ltd which deals with providing embedded solution to topical anaesthetic firm, we had an Electrical billing handheld machine, which we supplied to state of Andhra Pradesh (India) Electricity board, they requested for a short distance wireless technology to upload the information from handheld machine to PC. We have selected IrDA as wireless technology because of low power consumption and less memory application .We have done the work conquestfully only if as a developer, I was not win over for ii reasonsThe handheld machine and PC transceivers have to be pose face to face.We had problem with clock judgment of conviction slots management, went slaves (handheld machine) are more than two at the same beat.This made me to select Bluetooth technology as my research topic, and then I came across different research topics on Bluetooth related to unsweeturity, pairing, remote PC motorcoach etc. Then I started working on a Remote PC manager.Remote PC manager is an application developed using Bluetooth available in your mobile phone to manage a PC. The application had problem related to response m in certain areas of application. The response time is the time an application takes to react to a give input. In this application, we define response time as the time taken to respond when an instruction have been sent from mobile phone to remote pc manager.CHAPTER 2LITERATURE REVIEWAND RESEARCH methodology2.1 RESEARCH APPROACHESThe following are the burn upes towards my research, which have eventually done in stagesTo study about Bluetooth behaviour and comments related to the application from the users.In the line of merchandise of re search, reading has been done from books, journals and websites regarding Bluetooth and related software is used in the project.Developing Program and entropy flow diagramsAn IT related program was developed which had all the stylern approaches to the project development and deployment and as well as the info flow diagrams were drawn for the clear view of the data in the programImplementationAfter the development of the programs, execution of instrument has carried out to check its success and workingTestingThe programmable code is tested, verified and made sure that its card free.2.2 Justification of Research ApproachesMixed research methods have been used for projects as it deals with collecting information about the product and implementation to the product. Using qualitative research, more data is gathered from journals and textbooks, which showed about the Bluetooth applications. There was also befall to know, to what are hurdles in the existing Bluetooth technology. I h ave registered in Bluetooth groups and started to ask experts in this field about their feedback regarding the application. I went through some of the existing technologies available in the market and where I could study the execution of the Bluetooth PC remote. Knowing about the application, I could estimate that projects with modern approach will be exacted, in enhancing the application throughput. Online journals also helped me out a lot. Research books also helped me in how to carry out my research and which method would more suit my needs.Quantitative research is also a very important criterion in my research .I could plan my whole project on Gantt chart and proceed further. So, I had opted with mixed approach, i.e. qualitative and numeric which made my research easier.2.3 LITERATURE REVIEWA lot of research is done on Bluetooth related application by Special arouse Groups (SIG) and developer all over the world because of its futuristic nature. From the past most of the deve lopers have been developing applications on Bluetooth and WLAN. We can see degradation on Wi-Fi when a Bluetooth is close to the Wi-Fi station the impact of interference is significant. However, the relocation of Bluetooth from the Wi-Fi by 10m will not have great impact on the throughput. So some(prenominal) can coexist but we should be sensible in our expectations and attempts to mix these technologies. Brent A. Miller, Chatschik Bisdikian 2000. We present an AFH that modifies it in allege to mitigate interference. Frequency pass overping in Bluetooth is achieved as follows. Frequencies are listed as even and odd frequencies in the range of 2.402-2.480 GHz. The main idea in BIAS is to wait for association of slot with a good frequency in order to transmit a big money.The basal idea of response times has been about the same for thirty geezerhood Brent A. Miller, Chatschik Bisdikian 2000If the response time is about 0.1 spot user determines that the system is reacting insta ntaneously, instrument that no feedback is necessary except to display the result.If the response time is about 1.0 second user feels to stay uninterrupted, even though the user will notice the balk. Normally, no feedback is necessary during delays of more than 0.1 but less than 1.0 second, but if its 1 second the user feels that he can directly on the data.If the response time is about 10 seconds users attention is focused on the dialogue. For longer delay such as scanning whole system by anti virus will take long time and user knows about it. Feedback is necessary especially important if the response time is likely to be highly variable, since users will not know what to expect.Normally, response time of an application should be as close as practicable Myers, B., H. Stiel R. Gargiulo (1998), but it is also possible for the computing machine to react so fast that the user cannot keep up with the feedback. For example, a scrolling down in leger document application move so f ast that the user cannot stage it in time for the desired pages or section within the available window. The fact is that computers with modern processor can go work in few milliseconds can be too fast for the user which indicates the need for user-interface changes, user interface is set according to real-time clock sooner than being set to indirect effect of the computers execution speed.These applications take advantage in varying degree of Bluetooth capabilities such as to be eternally on, always connected, mobile and easy to use. Throughout all of this, of course it is important not to lose sight of the requirements to get basic application to track down properly. However most of developers have found the specification of 1.1 to be stable, so future Bluetooth enabled products for general consumer would confine to this specification Robert Morrow, 2002. In an indoor environment, multipath is just about present because of furniture and other equipment in construction along wi th the building material themselves, are prone to reflections when they are illuminated from radio source. contradictory the walloping fading which is seen in radio frequency where distance expire by the wave is in term of 10 times the wavelength. correspond to Morrow the Bluetooth, rut fading could be analysed based on Doppler imbue, delay spread and out probability.If a Bluetooth Piconet is an indoor environment where an object can move at speed up to a fast walk, then borderline Doppler shift will be about 10 Hz and tackiness time is about 40 ms. So, the coherence time will be 1 microsecond smaller than coherence time which leads to slow fading and this could real slow down when 40000 bytes transfer is done.Suppose if we take a large room where the delay speed is 50ns and gives coherence bandwidth of 2 megahertz, but supreme bandwidth between each hop is only 1MHz, so this leads to flat fading.As the Bluetooth channel is flat fading this will effect the Bit misconduct orderBER (Rayliegh equation).According to Morrow the enhancement has done related to lower train protocol.Bluetooth data rate should be step-upd at the rate of 10 to the present specification.Proper implementation of Adaptive frequency hopping should be done.The range of Bluetooth has to be increase by Store and forward capability.Use of injure antenna.The ACL contact is based on polling scheme mechanism between acquire and up to septenary busy slaves in a Pico net. It can result both symmetric and asymmetric bandwidth, which is determine by the packet type and frequency with which the device is polled. The ACL payload is protected by CRC check, which is used for retransmission scheme, the shelter looks to be small about 1.25ms David, 2002, but it is important when we are transaction with IP streaming because it may lead to retransmission delay. This could be limited by setting the flush timeout setting.If Bluetooth transmit constantly on same frequency, the uttermost ra w date rate would be 1 mbps. However David, 2002, this is not the data rate we will obtain over air interface. Bandwidth required for a 72 bit access code to identify the piconet and 54 bit header to indentify the slave will be about 405microseconds and concur time of 220 microseconds for next frequency hop. So, one slot packet requires a bandwidth of about 1/3 for pay load data and 7/9 and 13/15 for 3 and 5 slots of data respectively. So these counts have at least guard time of 1250 micro second as slot size increases.User neighbourly can be defined as easy to learn, easy to use, easy to remember and they increase the user ability to perform the desired task. According to Barrie Shermann, 1985 User friendly content adapting parts of the system to the operator rather than the operator having to even off to the system.Donald Norman explains user friendly software design with respect to consanguinity between visibility, mapping and feedback to the design of usable objects. The D esign of Every twenty-four hour period Things,1990Visibility means how easy user can find the function in the software. Poor visibility can cause too many problems to the users.Mapping means the relationship between controls, the thing it affects, outcome. Good mapping is one which has buttons which is clearly marked and simply indicates their function.Feedback to the design of usable objects means every function on operation must give feedback to the user. When rider press train door button he gets feedback in scathe of voice message saying that door opening .Such feedback makes user feel good.The creation of user friendly software is equal to part of science and art .The science is referred to as usability. The International Organisation for standardization (ISO) defines usability as the effectiveness, efficiency and satisfaction with which the user achieve specified targets. Effectiveness is the true statement and completeness with which specified user can achieve goal in an e nvironment. competency is the resource expended in relation to the accuracy and completeness of goal achieved. Satisfaction is the nourish and acceptability of work system to its users and other people affected by its use.The second part is the Art of design, which inspires and often take long time .We are not speaking about art in terms of graphic art, although it plays an important exercise in development of user friendly software. We are speaking of the designer ability to create a vision of how software can and should be.2.4 CRITICAL ANALYSISSince this Bluetooth application is an indoor application, its associated with reflection, diffraction, scattering, and deviation of radio waves. Quality of service means predefined and negotiated data rate, delay and fracture rate. Since the delay and the erroneousness rate are strongly related to the data rate, we focus our present investigations on the data rate. A signal passed over a wireless channel is affected by path passing p lay, narrow, broadband fading and co-channel interference. In the present application the response time is dependent on, the performance metrics include the path loss, the mean access delay and the channel response time.When a receiver is placed some distance from the transmitter antenna it is coherent to say that there will be some loss in signal. As we know that there is high probability of multipath effects in this application, as it plays a significant role in path loss values, thus high path loss of signal will lead to retransmission of signal. So we need to perform multipath mitigation, so we have selected compensate for multipath through diversity combinations. So normal Bluetooth antenna will be replaced by smarter antenna with diversity combinations .The packets that are transferred consequent to time do not use the same frequency, which in turn avoids the drawbacks of the narrowband transmission. As we know that the link performance obeys the rules for narrow band syste ms and additionally depends on fading of the individual transmit occupied. Therefore, all these methods of improving the fleshly layer have to be frequency agile.The access delay measures the time taken to transmit a packet from the time it is passed to the MAC layer until it is successfully received at the destination. The delay is measured at the L2CAP layer. The access layer delays which are caused due to improper management of the Bluetooth instruction. Management of ACL links can decrease this and by keeping slot numbers at a low value as possible, but as consign length increases the number of slot tends to increase so we cannot do untold to that, but by decreasing the path loss we can in spades resend ACL link commands.The channel estimation response time measures the time to track changes in the channel state. It is the time to avoid using a unskilled frequency to the time to start reusing a frequency that is good. The channel response time depends upon the bit error ra te (BER), which depends on the frequency hopping rate (good frequency and bad frequency), since the methods used to perform the classification depend on BER measurements per frequency visited. So, proper implementation of adaptive frequency hopping must be done to improve response time.User friendliness is a thin gap between failure and success of the end product. According to usability studies done by Andy Smith Overall it would seem that roughly only 30 per centum of IT systems are fully successful and that too 70 percent either fail or some marginal gain even after providing same function. These successful one have marginal deviance with the other such as easy to handle, light weight, high visibility of screen, little more advance feature in hardware and software, square-shouldered etc. Natural and efficient products can make users task seem a lot easier.CHAPTER 3BLUETOOTH PC REMOTETECHNICAL CONCEPTS3.1 INTRODUCTIONBluetooth was projected to allow low bandwidth wireless connec tions to rick so aboveboard to use such that they flawlessly work into your daily life. A guileless example of a Bluetooth application is to update the phone directory of your mobile phone. You would either normally enter the names and phone numbers of all your contacts or use a cable or IR link between your phone and your PC and start an application to synchronize the contact information. With Bluetooth, this can be done automatically and without any user involvement as soon as the phone comes within range of the PC. You can slowly see this is expanded to include your calendar, to do list, memos, email, etc. This is just one of many exciting applications for this new technology The Bluetooth PC remote using Mobile phone also comes into these list of applications that is been developed in using Bluetooth3.2 ashes ARCHITECTUREBluetooth communications occur in the unlicensed doctrine band at 2.4GHz. The transceivers utilize frequency hopping to void interference and fading. A cl assic Bluetooth device has a range of about 10 meters, with a total bandwidth of 1 Mb/sec. This technology supports two types of communication modes Robert Morrow, 2002. cooccurring communication (voice traffic) The synchronised voice communication is provided using circuit geological fault with a slot reservation at fixed intervals. A synchronous link in Bluetooth technology is referred to as an SCO (synchronous connection-oriented) link.Asynchronous communications (data traffic) The asynchronous data communication is provided using packet switching, utilizing a polling access scheme. An asynchronous link in Bluetooth technology referred to as an ACL (asynchronous connection-less) link.ConfigurationMax. info Rate UpstreamMax. Data Rate Downstream3 Simultaneous verbalise Channels64 kb/sec X 3 take64 kb/sec X 3 channels isobilateral Data433.9 kb/sec433.9 kb/secAsymmetric Data723.2 kb/sec or 57.6 kb/sec57.6 kb/sec or 723.2 kb/secReference www.bluetooth.com A combined data-voice S CO packet is defined, which can give 64 kb/sec voice and 64 kb/sec data in each direction.3.3 THE PICONETBluetooth devices can pair up with one or more other Bluetooth devices in some(prenominal) different ways. The simplest way of connecting two Bluetooth devices, is by connecting point-to-point when there are two Bluetooth devices is known as Pico net. One of the devices acts as the salve and the other as a outdo. This ad-hoc network is a good example for a Pico net. A simple Pico net network needs to have one get the best and one or more slave, the Bluetooth can have maximum of seven slaves in a Pico net network.In the case of multiple slaves, the communication topology is known as point-to-multipoint. In this case, the bandwidth is shared among all the devices in the Pico net. They can communicate up to seven active slaves in a Pico net. In the case of multiple slaves concept the slaves need to have specific cite. So each of the active slaves has been assigned 3-bit Active M ember address (AM_ADDR). There can be extra slaves who remain synchronized to the track, but these will not have an Active Member address. The slaves are not active and are referred to as parked. In case of both active and parked units, the complete bandwidth is synchronized by the master. A parked device will have an 8-bit layed Member Address (PM_ADDR), thus we can have maximum number of parked members to 256. A parked device remains synchronized to the master clock and can vary quickly, become active and communicate with other devices in the Pico net.3.4 THE SCATTERNETThe process in which two adjacent Pico nets have an overlapping of coverage area is known as scatter net. Slaves in one Pico net can take part in another Pico net as either a master or slave it can be done through time division multiplexing. In a scatter net, the two (or more) Pico nets are not synchronized in either time or frequency. Each of the Pico nets moves in its own frequency hopping channel while other d evices in multiple Pico nets participate at the appropriate time via time division multiplexing. allow us assume two different Pico nets one consisting of mobile phone and PC, while the adjacent Pico net person consisting of a cell phone, headset and argumentation card electronic scanner.Dig Ref www.wirelessadvent .com/channel/blutooth/feartutre/bluetooth .htmlThe cubicle 1 may set up cubicle 2 business card scanner also transmit the information that is scanned to your PC so that you will have access to his business contacts information.3.5 AUTHENTICATION AND PRIVACYAuthentication and privacy are handled at the software protocol layer and it is also provided in the Bluetooth physiological layer. A particular connection can be specific to need either one-way, two-way, or no authentication. The authentication is generally done using a challenge or response to the system. The system supports both 40 and 64 bit keys. The authentication of the user is done at application layers. This security mechanism and the related software allow the user to set up his or her devices only to communicate with each other. totally Bluetooth devices employ this physical layer security in the same way. Of course, for highly cognizant applications, it is also recommended that you use more advanced algorithms in the network violate or application layer.3.6 HARDWARE FOR BLUETOOTHBluetooth hardware can be change integrity into two modules, they are.Radio ModuleLink Module.The Radio ModuleBluetooth devices operate in 2.4GHz Industrial Scientific Medicine (ISM) band. The frequency is an unlicensed one because of international standards and a few exceptions in certain countries like France (2446.5 to 2483.5 MHz) and Spain (2445 to 2475 MHz .So range of frequency is defined with unlicensed version from 2400 to 2483.5 MHz. These local versions have a reduced frequency band and a different hopping algorithm, the Bluetooth SIG is working with authorities in different countries to open com pact ability.The RF channels used in Bluetooth technology are from 2402 to 2480 MHz with a channel spacing of one MHz. Frequency hopping has been implemented in order to reduce interference and fading effects. So we have 625 microseconds the channel will hop to another frequency within the 2402 to 2480 MHz range, so we get 1600 hops every second. Every Pico net has a unique hopping sequence which is stubborn by using an algorithm the uses of Bluetooth device address the master device. All Bluetooth units in the Pico net are then synchronized to this hopping sequence.All packets are transmitted at the beginning in one of the 625 microsecond time slots, a packet may take 5 time slots. A time division duplex house method is used to facilitate full duplex transmission. It is normally done this way, during even numbered slots the master transmits data and odd numbered slots are for a slave to transmits data. In voice data, these time slots can be reserved for synchronous applications. Bluetooth technology use Gaussian Frequency rupture Keying (GFSK) for modulation. A binary system is used where logical one is be by a positive frequency deviation and a logical zero is represented by a negative frequency deviation. The data is transmitted at a sign rate of 1 Ms/sec.The Link ModuleThe Link Module and Link Manager software product are prudent for the baseband protocols and some other low level link functions. This are related to sending/receiving data, setting up connections, error detecting and correction, data whitening, power management and authentication.The link module in the Bluetooth is prudent for deriving the hop sequence. This can be done by using the BD_ADDR (Bluetooth Device Address) of the master device. All Bluetooth devices are assigned with a 48-bit IEEE 802 address. This 48-bit master device address is used by all other devices in the Pico net to derive the hop sequence.The Link Module is also amenable for performing three error correction sche mes that are defined for Bluetooth1/3 rate FEC2/3 rate FECARQ scheme for the dataThe purpose of having two FEC (forward error correction) schemes is to reduce the number of retransmissions. The ARQ scheme (automatic retransmission request) is responsible for the data to be retransmitted until an acknowledgement is received indicating a successful transmission (or until a pre-defined time-out occurs). A CRC (cyclic redundancy check) code of 2 bytes is added to each packet and used by the receiver to decide whether the packet arrived is error free or not. Note that the ARQ scheme is only used for data packets, but not for synchronous payloads such as voice.Bluetooth provides necessities for three low power saving modes to conserve battery life. These states in decreasing order of power are Sniff Mode, Hold Mode, and Park Mode. While in the Sniff mode, a device listens to the Pico net at a reduced rate. The Sniff intervals provide flexibility for different applications and are programm able. The Hold mode is same as the Park mode, except that the AM_ADDR (Active Member address) is retained. In Park mode, the slave clock continues to run and remains synchronized to the master, but whereas the device does not participate at all in the Pico net.CHAPTER 4SYSTEM DESIGN4.1 INTRODUCTION TO SYSTEM DESIGNThe Basic structure of software has been developed as an application based on Bluetooth technology, using the swarm command interface concept. This is one of the most common physical implementation in which external cards are plugged into the host computer .when cond in this manner we need to have some ways to send the data and commands to module to obtain the results. The Bluetooth specification has such provision to have host controller interface. The Bluetooth protocol stack consists of the radio, link controller, link manager and the rest of the protocol stack from the L2CAP and above resides on the Host controller interface (HCI) .Hence the HCI provides the communic ation between the application at the top layer to the link manager, two ways audio packet transportation and transfer the data packet between module (USB dongle) and host computer.HCI interface does not require great knowledge or certification, but it is a good idea when you want to implement any software so that it has wide range of compatibility and also provides us in operating the third party protocol also. The Host cont

No comments:

Post a Comment