Feeds

Bluetooth body confirms Wi-Fi 'hijack' plan

802.11 to speed Bluetooth transmissions

5 things you didn’t know about cloud backup

Mobile World Congress The organisation behind Bluetooth will tomorrow go public on its plan to borrow bandwidth from Wi-Fi, allowing the device-to-device wireless connection technology to offer faster data transfers when it needs to.

It's a stepping stone, of course, until Bluetooth is firmly fitted on top of ultrawideband (UWB) radios, but until then, the trick – which it began hinting at privately late last year - should provide it with a speed boost way beyond what it can deliver today.

How does that square with Bluetooth's low power consumption characteristics? Bluetooth will only leverage Wi-Fi if it needs it, and if the technology is present in the host device. It already is, in plenty of laptops and, increasingly, mobile phones too.

If Bluetooth detects that an application wants to transmit a large quantity of data, it will be able to grab the 802.11 radio temporarily. Once the data's sent, Bluetooth lets go of Wi-Fi and goes back to its usual state.

To make this work, the organisation behind the wireless technology, the Bluetooth Special Interest Group (SIG) has to separate the Bluetooth profiles and protocols from the radio technology they currently operate on. Conveniently, it's already doing that, to enable Bluetooth to operate on UWB. So it's just a matter of building a Wi-Fi foundation that can slot in alongside UWB, Wibree - for ultra-low power devices - and other wireless transmission systems.

It's a cunning move for two reasons. First, it provides a stop-gap until the Bluetooth SIG can complete its work on UWB. Wi-Fi hardware is in place now, UWB kit isn't, and may not be until long after the SIG completes its UWB code. Second, it takes Bluetooth into the same territory as Wireless USB – as a way of connecting peripherals without cables. Indeed, the Bluetooth SIG specifically talks about Bluetooth+802.11 in terms of classic USB applications, like copying music files between an MP3 player and a PC, or sending photos from a camera to a PC or printer.

It's not going to happen soon, however. The architecture that will allow Bluetooth connections to sit on top of a variety of radio technologies isn't expected to be published to SIG members until mid-2009, so Wireless USB has plenty of time to establish itself.

The Bluetooth SIG began hinting that it might make use of Wi-Fi back in November 2007. Earlier that year, it published Bluetooth 2.1, which adds support for device pairing using near-field communictions - allowing products to be linked just be touching them together.

Mobile World Congress 2008 Complete Coverage here

Secure remote control for conventional and virtual desktops

More from The Register

next story
6 Obvious Reasons Why Facebook Will Ban This Article (Thank God)
Clampdown on clickbait ... and El Reg is OK with this
So, Apple won't sell cheap kit? Prepare the iOS garden wall WRECKING BALL
It can throw the low cost race if it looks to the cloud
EE fails to apologise for HUGE T-Mobile outage that hit Brits on Friday
Customer: 'Please change your name to occasionally somewhere'
Time Warner Cable customers SQUEAL as US network goes offline
A rude awakening: North Americans greeted with outage drama
We need less U.S. in our WWW – Euro digital chief Steelie Neelie
EC moves to shift status quo at Internet Governance Forum
BT customers face broadband and landline price hikes
Poor punters won't be affected, telecoms giant claims
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.