Feeds

Bluetooth formally adopts low power standard

Starts certification for Version 4.0

Designing a Defense for Mobile Applications

The Bluetooth Special Interest Group has formally adopted the standard's Core Specification Version 4.0, which targets very low power networks, potentially vying with other systems like ZigBee. The new spec, originally released in January, is targeted at markets such as sensors for healthcare, and security and home networks.

The SIG has now opened its qualification program to any products claiming to support Version 4.0. "The finalization of Bluetooth low energy wireless technology within the Core Specification is a monumental achievement," said Michael Foley, executive director of the SIG.

The new technology, which is based on the WiBree platform originally developed by Nokia, will allow Bluetooth devices to run for years on standard coin-cell batteries. The standard also features enhanced range.

Kirsten West, principal analyst with WTRS, commented: "Bluetooth low energy will be a significant contributor to the overall wireless sensor network market, representing nearly half of all shipments in 2015. The advantage to this new protocol is that it is totally optimized for low power battery operation."

The technology supports short data packets (from eight to 27 octets) transmitted at 1Mbps, minimizing interference with the adaptive frequency hopping technique that is used in all versions of Bluetooth. Latency is a few milliseconds and range can exceed 100 meters, with AES-128 strong encryption and authentication.

Among the Bluetooth chip vendors supporting Version 4.0 are CSR and Broadcom. The former will use its modular BlueCore architecture to support both single- and dual-mode low power gadgets. The dual-mode chipsets will add a low power mode to cellphones and PCs, alongside classic Bluetooth (the current release is 3Mbps EDR). After that, single-mode chips will be targeted at specific products like sensors. Texas Instruments, Nordic Semiconductor and EML have also showed silicon.

Copyright © 2010, Wireless Watch

Wireless Watch is published by Rethink Research, a London-based IT publishing and consulting firm. This weekly newsletter delivers in-depth analysis and market research of mobile and wireless for business. Subscription details are here.

HP ProLiant Gen8: Integrated lifecycle automation

More from The Register

next story
Scotland's BIG question: Will independence cost me my broadband?
They can take our lives, but they'll never take our SPECTRUM
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
Bring back error correction, say Danish 'net boffins
We don't need no steenkin' TCP/IP retransmission and the congestion it causes
NBN Co adds apartments to FTTP rollout
Commercial trial locations to go live in September
GoTenna: How does this 'magic' work?
An ideal product if you believe the Earth is flat
Samsung Z Tizen OS mobe is post-phoned – this time for good?
Russian launch for Sammy's non-droid knocked back
Telstra to KILL 2G network by end of 2016
GSM now stands for Grave-Seeking-Mobile network
Seeking LTE expert to insert small cells into BT customers' places
Is this the first step to a FON-a-like 4G network?
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Securing Web Applications Made Simple and Scalable
Learn how automated security testing can provide a simple and scalable way to protect your web applications.