Feeds

Bluetooth body confirms Wi-Fi 'hijack' plan

802.11 to speed Bluetooth transmissions

Top three mobile application threats

Mobile World Congress The organisation behind Bluetooth will tomorrow go public on its plan to borrow bandwidth from Wi-Fi, allowing the device-to-device wireless connection technology to offer faster data transfers when it needs to.

It's a stepping stone, of course, until Bluetooth is firmly fitted on top of ultrawideband (UWB) radios, but until then, the trick – which it began hinting at privately late last year - should provide it with a speed boost way beyond what it can deliver today.

How does that square with Bluetooth's low power consumption characteristics? Bluetooth will only leverage Wi-Fi if it needs it, and if the technology is present in the host device. It already is, in plenty of laptops and, increasingly, mobile phones too.

If Bluetooth detects that an application wants to transmit a large quantity of data, it will be able to grab the 802.11 radio temporarily. Once the data's sent, Bluetooth lets go of Wi-Fi and goes back to its usual state.

To make this work, the organisation behind the wireless technology, the Bluetooth Special Interest Group (SIG) has to separate the Bluetooth profiles and protocols from the radio technology they currently operate on. Conveniently, it's already doing that, to enable Bluetooth to operate on UWB. So it's just a matter of building a Wi-Fi foundation that can slot in alongside UWB, Wibree - for ultra-low power devices - and other wireless transmission systems.

It's a cunning move for two reasons. First, it provides a stop-gap until the Bluetooth SIG can complete its work on UWB. Wi-Fi hardware is in place now, UWB kit isn't, and may not be until long after the SIG completes its UWB code. Second, it takes Bluetooth into the same territory as Wireless USB – as a way of connecting peripherals without cables. Indeed, the Bluetooth SIG specifically talks about Bluetooth+802.11 in terms of classic USB applications, like copying music files between an MP3 player and a PC, or sending photos from a camera to a PC or printer.

It's not going to happen soon, however. The architecture that will allow Bluetooth connections to sit on top of a variety of radio technologies isn't expected to be published to SIG members until mid-2009, so Wireless USB has plenty of time to establish itself.

The Bluetooth SIG began hinting that it might make use of Wi-Fi back in November 2007. Earlier that year, it published Bluetooth 2.1, which adds support for device pairing using near-field communictions - allowing products to be linked just be touching them together.

Mobile World Congress 2008 Complete Coverage here

Top three mobile application threats

More from The Register

next story
A black box for your SUITCASE: Now your lost luggage can phone home – quite literally
Breakfast in London, lunch in NYC, and your clothes in Peru
Broadband Secretary of SHEEP sensationally quits Cabinet
Maria Miller finally resigns over expenses row
AT&T threatens to pull out of FCC wireless auctions over purchase limits
Company wants ability to buy more spectrum space in auction
EE dismisses DATA-BURNING glitch with Orange Mail app
Bug quietly slurps PAYG credit - yet EE denies it exists
Like Google, Comcast might roll its own mobile voice network
Says anything's possible if regulators approve merger with Time Warner
Turnbull leaves Australia's broadband blackspots in the dark
New Statement of Expectations to NBN Co offers get-out clauses for blackspot builds
Facebook claims 100 MEEELLION active users in India
Who needs China when you've got the next billion in your sights?
Facebook splats in-app chat, whacks brats into crack yakety-yak app
Jibber-jabbering addicts turfed out just as Zuck warned
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.