Rab Nawaz Jadoon (Assistant Professor) Department of Computer Science COMSATS University, Abbottabad, Pakistan
|
|
- Harvey Andrews
- 5 years ago
- Views:
Transcription
1 Rab Nawaz Jadoon (Assistant Professor) Department of Computer Science COMSATS University, Abbottabad, Pakistan 1
2 TABLE OF CONTENTS 1. Introduction History Bluetooth Versions System Architecture Piconet Single secondary communication: Multiple secondary communications Scatternet Range: Security Architecture Bluetooth Security Risks Connection establishment Protocol stack Base-band Layer Link Manager Protocol HCI (Host Controller Interface) L2CAP (Logical Link Control and Adaptation Protocol) RFCOMM SDP (Service Discovery Protocol) TCS Binary (Telephony Control-Binary) PPP (Point-to-Point Protocol) UDP/TCP/IP Frame Format Access Code Header Payload: Bluetooth Profiles Some available Bluetooth profile References
3 Rab Nawaz Jadoon (Assistant Professor) Department of Computer Science COMSATS Institute of Information Technology, Abbottabad. 1. Introduction Bluetooth is a wireless protocol for exchanging data over short distances for creating personal area networks (PANs). Basically it is a standard for short range radio communication technology. Originally it was developed by Ericsson, a cell manufacturer company in 1994 [1]. The embedded Bluetooth capability is widely used in many type of devices, like PDAs, computer peripherals (Mice, keyboards, joysticks, cameras, printers, LAN access points etc), cell phones, audio peripherals and other many more applications [1]. The radio technology used in Bluetooth is FHSS (Frequency Hopping Spread Spectrum), which send the data in the form of chunks over entire 79 channels. To reduce the interference the Bluetooth technology utilizes AFH (Adaptive Frequency Hopping) mechanism. Frequency hopping works within the available spectrum to take advantage of the available frequency. This frequency hopping provides more efficient transmission within the spectrum, providing users with greater performance even if they are using other technologies along with Bluetooth technology. The maximum range for Bluetooth radio is 10m, but it can be extended up to 100m by using amplifiers. The data rate achieved is 1 Mb/s. The Bluetooth standard work on ISM band on 2.4 GHz frequency range, which is available globally unlicensed [2]. 1.1 History The name Bluetooth and its logo are the trade mark of an associated named BSIG (Bluetooth Special Interest Group). The promoter members of this technology are, Microsoft, Ericsson, IBM, Intel, Agere, Motorola, Nokia and Toshiba and even thousands of others. The word Bluetooth is taken from the 10 th century Danish King Harald Bluetooth. The kind united the Scandinavian Europe during an era when this region was in parts. This technology was first introduced in Scandinavia and this technology merges different industries such as cell phones, computing and automotive market. The Bluetooth officially introduced the first core specification version in Cable replacement was the basic intended purpose of Bluetooth technology. After the first version a lot has changed. In 2003 the Bluetooth SIG has announced the 2.1 version. In 2004, Bluetooth version 2.0+ERD was introduced. Devices using this version hit the market in Bluetooth Versions Many Bluetooth versions have been released since this technology was introduced in The earliest versions 1.0 and 1.0B has many problems. The main problem was that there was a lack of interoperability among devices. The first successful core version of Bluetooth technology was 1.1 and corrected many 3
4 problem found in the earliest versions. After 1.1 version the next version 1.2 come. Version 1.2 is directly backward compatible with Bluetooth 1.1 and it also reduces the radio interference by using adaptive frequency hopping (AFH). It has faster transmission speed of 1Mbps. It also improves voice quality of audio connections by enabling retransmissions of corrupted data. It has also the specification of received Signal Strength Indicator as well. The next version was 2.0 or ERD (Enhanced Data Rate) was first introduced by the Bluetooth SIG in June 2004 and appearing in Bluetooth devices in late It has the data rate up to 3 times faster than the original Bluetooth specifications. It provides enhanced multiple connectivity. It also facilitates the end user to run multiple Bluetooth devices at the same time. As a result of this version the BPAN will become more common. Using this specification a user can easily synchronize a Bluetooth enabled computer with a Bluetooth PDA, and at the same time they can listen music at the same time using bluetooth wireless headphones. 2. System Architecture The architecture defines how Bluetooth devices group themselves for communication. A Bluetooth Wireless Personal Area Network (BT-WPAN) consists of two sub architecture, 1) Piconet 2) Scatternet 2.1 Piconet It is a basic unit of communication in Bluetooth. Piconet is an Ad hoc network. Each piconet is a network of eight Bluetooth devices. One device is acting as a master device while rests of the devices (up to seven active Bluetooth devices) are acting as slaves or secondary devices [2], but there is no limit to the total number of devices in a piconet. If there are more than seven slaves in one piconet then rest of the slave devices must be in Parked state. The maximum upper limit of Parked slave devices in one piconet is 255 with direct addressing scheme [1]. To activate a parked slave into slave, the master node must first place a currently active slave into a parked state. When two Bluetooth devices start communicating when they come into the radio range of each other. If no piconet is available at that time a negotiation process will occur. Once device will become master and the other become slave [1]. All the devices in one piconet communicate with each other through master node. For communication purpose all the devices synchronize their hopping sequence with the master device. A master node is also responsible for telling the slave devices to switch to different states during the inactivity period. The master radio shares its global ID and clock information with each slave in its piconet. When a new node joins a piconet, it first recreates the Frequency hopping sequence of that piconet. The slave node must know the frequency and then synchronize itself with the master s clock. Basically connecting two or more piconets a gateway is used for multihope communication. The bridge communicates with all the piconets connecting to it by synchronizing each piconet when it is ready to communicate. However a bridge can communicate with only one piconet at a time. The bridge device can be slave in all piconets or it may a master in one piconet and a slave in the others. The frequency hopping sequence and the polling order of the slaves are selected by the master node. The maximum range is up to 10m within one piconet, and the maximum data transfer rate is between 400 to 700Kbps, depending on the connection used i.e. synchronous or asynchronous [7]. Each piconet has its own hopping channel [6]. The following figure shows the architecture of piconet. 4
5 Figure. 1: Piconet in Bluetooth Bluetooth transceiver uses all 79 channels, and utilizes random hop sequence over these channels at 1600 hops per second for standard transmissions [1]. Amplifier can only be used in bluetooth to extand the radio range up to 100meters. One important thing to be noted that bluetooth specification uses time division duplexing (TDD) and time division multiple access (TDMA) for device communicaiton within one piconet or in a scatternet scenario [1]. The duration of each time slot is 625 micro second. Bascially there are two types of communication accured in piconet, single secondary communication and multiple secondary communications [12] Single secondary communication: If there is only secondary/slave device in a piconet. TDMA operation is very simple by first divding the time into 625micro second. The primary device uses the even numbered slots while the secondary uses the odd number slots. The communication in this scenario is half duplex mode. In slot 0 the primery device sends and slave device recieves. In slot 1 the secondary/slave sends and primery recieves. Single secondary communication as shown in figure. In slot F1 secondary device sends a frame to primary. In slot F0 Primary device sends a frame to secondary. The secondary uses odd number slots for sending data to primary. The master device utilizes even number slots for sending data. Figure. 2: Single secondary communication Multiple secondary communications. In this case the primery uses the even number slots as used in previous case but the secondary sends in the next odd numbered slot if the packet in the previous slot was addressed to it. All the secondary devices listen to even numbered slot and send only one secondary device in any odd numbered slot. Following figure show the operation. 5
6 Figure. 3: Multiple Secondary communications In slot 0 the master or primery sends a frame to secondary 1. In slot 1 only secondary 1 sends a frame to the primery because the previous frame was send to it, other secondaries are in silent mode. In slot 2 the primery sends a frame to secondry 3. In slot 3 only secondary 2 sends a frame to primery. Through this way the cycle continuous. 2.2 Scatternet The overlapping piconets are called Scatternet. A Scatternet is a number of interconnected piconets that supports communication between more than 8 devices. Scatternet can be formed when a member of one piconet can be a member either slave or master in other piconet. The device participating in both piconets can relay data between members of both ad-hoc networks. Using this approach, it is possible to combine more than one piconet to form a Scatternet. Through Scatternet we can expand the physical size of the network beyond Bluetooth's limited range. More than one devices can be the member of more than one piconets [2]. The following figure shows that in piconet 1 two slave devices acts as master in two other piconets. 6
7 Piconet 1 Piconet 2 Piconet 3 Figure.4: Scatternet formation Range: The operating ranges of bluetooth depend on the device class: Class 3 radios it has a range up to 1 meter. Class 2 radios it has range up to 10m, commonly found in mobile devices. Class 1 radios it has a range up to 100m used primarily in industrial use cases. As I earlier mentioned that the most commonly used radio for Bluetooth is class 2 which consumes 2.5mW of power. The Bluetooth technology design to have very low power consumption. It is mentioned in Bluetooth specification that the radio of Bluetooth device should be powered down during inactive period. 2.3 Security Architecture. Security is a major issue in wireless environment. In general, the security architecture in Bluetooth has three modes, none-secure, service level enforced security and link level enforced security [10]. Non Secure In this mode of security a Bluetooth device does not initiate any security measures. There is no as such security measurements are addressed in this mode of operation. Service level enforced security In this mode of security a Bluetooth device can establish a no secure ACL link. Authentication, authorization and other encryption techniques are initiated when a L2CAP connection-oriented or connectionless channel request is made [10]. Link level enforced security. In this mode of security a Bluetooth device first calls the security procedures before going to establish the channel. 7
8 Authentication includes the identity of the device or device user. Authorization is concerned with granting network resources or not, and encryption deals with translating the data into some other forms, not understandable by the human Bluetooth Security Risks Following are some security risks, Bluejacking Bluesnarfing Backdoor Attacks Cabir Worm Bluejacking: It is the process in which the Bluetooth enable devices receives unsolicited messages, or business cards. In non-discoverable mode, Bluetooth devices are not susceptible to Bluejacking. The sending and receiving devices should be within range of 10 meters to each other in order for Bluejacking to work. While for promotional purposes this method has been widely used, Bluetooth users should be careful enough not to store the contact into their address book. While Bluejacking is not done with the malicious purpose, repetitive and redundant messages can be annoying to the user, can render the product inoperable. The door for social engineering attacks may be opened due to this reason. Bluesnarfing: It is the method used for hacking purpose, basically it hacks the information like contact book, calendar or anything else stored in the phone s memory of the Bluetooth enable devices. When the Bluetooth device is non-discoverable mode, then it is difficult to find and attack the device. However, there are many tools are available on the web which is used to steal information from the Bluetooth enable mobile phones, and also the knowledge about their usage is growing. Companies such as Nokia and Sony Ericsson are trying to produce bluesnarfing free phones. Backdoor Attacks: Through the pairing mechanism, the backdoor attack involves establishing a trust relationship, but ensuring that it will not appear in target s register of paired devices. In this way, unless the owner is looking for devices in precise moment a connection is established and they are unlikely to notice anything disturbing and unexpected, and the attacker is free to use any resources by utilizing the trusted relationship. This means the attacker not only can access the data from the phone but can also access the services like modem, or internet, WAP and GPRS without the owner s knowledge or permission. Cabir Worm: It is malicious software that pushes itself to available Bluetooth devices by making use of Bluetooth technology. According to Bluetooth SIG (2006), the mobile phones which have Symbian series 60 user interface platform and feature Bluetooth wireless technology are affected by Cabir worm. Furthermore the user has to manually accept the worm and has to install malware to infect his phone. It shows that it is achievable to write mobile viruses and disseminate them over Bluetooth devices and it may cause hackers to explore to write the Bluetooth viruses [10]. 2.4 Connection establishment A Bluetooth device has one of the following states during connection establishment: standby, inquiry, page, connected, transmit holds, park or sniff. a. Standby State A device is said to be in standby mode when it is powered on but has not yet joined a piconet. b. Inquiry State 8
9 A device enters in the inquiry state when it sends out a request to devices in a piconet to which it wants to connect. c. Page state A master in a piconet can be in Page state, sending out messages looking for devices that it can invite to join its own piconet. d. Connected State A new device acting as slave when communicating successfully with the master node and receive an active address, it is said to be in connected state. e. Transmit state. When slave device transmit data to master, the slave is in a Transmit state. At the end of its transmission, it returns to the connected state again. f. Sniff state. It is a power saving state. The slave sleeps until its pre allocated time slot. It wakes up at its appointed time slot for data transmission. g. Hold state. It is another low power state in which the slave is inactive for a predetermined amount of time. No data transmission can be occurred in the Hold state. h. Park state. When slave device has no data to send or receive, the master node compels the slave device to enter in the park state. In the park state the slave being a part of the piconet but not sending or receiving the data. The above mentioned states can be represented pictorially as, Standby Unconnected Inquiry Page Page Scan Connecting Master Slave States Transmit Connected Active States Park Sniff Hold Low Power States Figure. 5: Bluetooth States diagram 3. Protocol stack The complete Bluetooth protocol stack is show in the figure below. The radio frequency of Bluetooth operates at 2.4 GHz, in an unlicensed ISM band. 9
10 3.1 Base-band Layer The Base-band and Link Control Layer enables the physical link between other units of Bluetooth by forming a piconet. The Base-band layer do the synchronization and issue related to frequency hopping sequence [6]. This layer also has two link types names Synchronous Connection Oriented (SCO) and Asynchronous Connectionless (ACL). The SCO link used for audio and ACL links are used for data only. 3.2 Link Manager Protocol The link manager protocol is responsible for link establishment between Bluetooth units. This protocol is used to control and negotiation of data packet sizes during data transmission [6]. This protocol also deals with the power related issues regarding power consumption. It also deals with controlling of links and issues regarding security i.e. encryption keys for authentication and encryption and decryption. 3.3 HCI (Host Controller Interface) It is an interface method used to access the Bluetooth hardware as shown in the figure. It has a command interface to the Base-band controller and link manager and method used to access hardware status. 3.4 L2CAP (Logical Link Control and Adaptation Protocol) It provides some connection oriented and connectionless services to upper layers of the protocol stack. Issues regarding multiplexing, segmentation and reassembly and QoS etc. 3.5 RFCOMM This is a serial port emulation protocol which uses the serial port only for application. This protocol emulates RS-232 control and data signals over the Base-band layer. Transporting services to upper layer is also done by this layer [6]. 3.6 SDP (Service Discovery Protocol) This protocol defines how a client can search for any application or service without any knowledge about that particular service or application. This protocol provides a mechanism to discover new service becoming available when client finding a Bluetooth server. This protocol is also used for detecting a service which is no longer available [9]. 3.7 TCS Binary (Telephony Control-Binary) It is bit oriented protocol. It handles the issues regarding the speech and data calls between Bluetooth units. It also handles the signaling information not relevant to ongoing calls. 3.8 PPP (Point-to-Point Protocol) It is packet oriented protocol used for packet data stream. PPP runs over the RFCOMM to establish point to point connections. 10
11 3.9 UDP/TCP/IP These standard protocols allow the Bluetooth units to communicate with rest of the units of Bluetooth connected to it. Bluetooth unit can act as a bridge in internet scenario. The TCP/IP/PPP protocol configuration is used for internet bridge usage scenarios in Bluetooth 1.0 and OBEX in future versions. Bluetooth supports many AT commands for transmitting control signals for telephony control through the serial ports based on RFCOMM [6]. Application Application Group ATCom OBEX UDP/TCP/IP PPP Transport protocol Group TCS RFCOMM SDP Host Controller Interface Audio L2CAP Base-band Link Manager Transport protocol Group 4. Frame Format Radio Layer Figure. 6: Bluetooth protocol Stack The Bluetooth packet contains the following format [1]. Basically it has 3 parts including access code, header and payload. The frame format shown in the figure Access Code It contains 72 bits. It normally contains synchronous bits and an identifier to separate the frames of one piconet to another. 11
12 Figure. 6: Packet header format 4.2 Header Header is actually 18 bits but it repeats three times. Header contains the following set of fields, address, type, F, A, S and HEC (Header error correction). Address (ADD): It can define up to 7 slaves. If the address is 0, then it is broadcast from primary to all slaves in a piconet. Type: It defines the type of data coming from upper layers. F: A one bit field is used for flow control. A: Also one bit field used for Acknowledgment. S: It is also one bit field used for sequence number. HEC: header error correction is an eight bit field used for checksum to detect errors in each 18 bit header section. 4.3 Payload: This area of the frame contains the data/control information coming from upper layer of protocol stacks. 5. Bluetooth Profiles Basically profiles are behaviors through which Bluetooth devices communicate to each other. Connecting one or more devices to each other, Bluetooth must support some Bluetooth profiles. Profiles define the possible application and shows how this technology is to be used for each specific device. For example, the file transfer profile is used to define the file transfer between a Bluetooth enabled PDA device to another devices like cell phone, laptops etc. at the development stage the manufacturer assigns some specific Bluetooth profiles for that particular device [11]. When a Bluetooth device communicate with other device, then it is necessary for both the devices to use and share at least one of the same Bluetooth profiles. For example if one can use the Bluetooth enabled headset with Bluetooth enabled cell phone, then both the devices must use the headset profile. The HS (head set) profile shows how headsets and cell phones use Bluetooth technology to connect to one another. Every Bluetooth profile contains information on the following issues, 12
13 Dependencies on other profiles. Recommended user interface formats. Particular part of the protocol stack used by the profile. Many Bluetooth devices have few profiles i.e. a Bluetooth headset will only use the headset profile (HS) but not using any other like LAN access profile [11]. Currently there are 25 Bluetooth profiles are available and they all are in use. The SIG continue working on the development of new Bluetooth profiles. If we have a Bluetooth enabled printer for basic printing and has printing profile. But if we have a PDA with this technology, things may be more complicated. A Bluetooth enabled PDA has many profiles such as Synchronization Profile, LAN Access Profile, File Transfer Profile and many others. 5.1 Some available Bluetooth profile All Bluetooth devices have a common profile named foundation Profile upon which all other profiles are dependent. It is also called Generic Access Profile (GAP). It is used for detecting other Bluetooth devices, and link management issues. It also addresses the security aspects [11]. Some commonly used Bluetooth profiles are listed below, Generic Access Profile (GAP) Service Discovery Application Profile (SDAP) Cordless Telephony Profile (CTP) Intercom Profile (ICP) Serial Port profile (SPP) Headset Profile (HSP) Dialup Networking Profile (DUN) Fax Profile (FAX) Generic Object Exchange Profile (GOEP) Object Push Profile (OPP) File Transfer Profile (FTP) Synchronization Profile (SP) 13
14 References [1] McDermott-Wells, P, What is Bluetooth? Potentials, IEEE Volume 23, Issue 5, Dec 2004-Jan 2005 Page(s):33 35, Digital Object Identifier /MP [2] Rashid, R.A.; Yusoff, R, Bluetooth Performance Analysis in Personal Area Network (PAN) RF and Microwave Conference, RFM International Sept Page(s): Digital Object Identifier /RFM [3] OConnor, Terrence; Reeves, Douglas, Bluetooth Network-Based Misuse Detection, Computer Security Applications Conference, ACSAC Annual 8-12 Dec Page(s): Digital Object Identifier /ACSAC [4] Bayaki, E.; Lampe, L.; Schober, R, Performance Evaluation of Bluetooth Systems With LDI, Modified LDI, and NSD Receivers Vehicular Technology, IEEE transactions on Volume 57, Issue 1, Jan Page(s): Digital Object Identifier /TVT [5] Chakrabarti, S.; Liyun Wu; Son Vuong; Leung, V.C.M, A remotely controlled Bluetooth enabled environment Consumer Communications and Networking Conference, CCNC First IEEE 5-8 Jan Page(s):77-81 Digital Object Identifier /CCNC [6] Yabin Liu; Shouqian Yu; Weihai Chen; Wei Li, Wireless Communication Technology Based on Bluetooth and Its Application to a Manipulator Industrial Informatics, 2006 IEEE International Conference on Aug Page(s): Digital Object Identifier /INDIN [7] McDermott-Wells, P, Bluetooth Scatternet models Potentials, IEEE Volume 23, Issue 5, Dec 2004-Jan 2005 Page(s):36-39 Digital Object Identifier /MP [8] Chorng-Horng Yang; Yen-Chun Chin, An Efficient Reformation Approach for Survivable Bluetooth Piconets with Master Mobility, TENCON IEEE Region 10 Conference Nov Page(s):1-4 Digital Object Identifier /TENCON [9] F. Zhu, M. Mutka, and L. Ni, "Splendor: A Secure, Private, and Location-aware Service Discovery Protocol Supporting Mobile Services", Presented at 1st IEEE Annual Conference on Pervasive Computing and Communications, Fort Worth, Texas, [10] Colleen Rhodes, Bluetooth Security, East Carolina University. [11] [12] Behrouz A Frouzan, Data communication and Networking from Book. 14
[A SHORT REPORT ON BLUETOOTH TECHNOLOGY]
2011 [A SHORT REPORT ON BLUETOOTH TECHNOLOGY] By Ram Kumar Bhandari 1. Introduction Bluetooth Technology A Technical Report Bluetooth is a short-ranged wire-less communication technology implementing the
More informationENRNG3076 : Oral presentation BEng Computer and Communications Engineering
Jean Parrend ENRNG3076 : Oral presentation BEng Computer and Communications Engineering 1 Origin 2 Purpose : Create a cable replacement standard for personal area network Handle simultaneously both data
More informationCS4/MSc Computer Networking. Lecture 13: Personal Area Networks Bluetooth
CS4/MSc Computer Networking Lecture 13: Personal Area Networks Bluetooth Computer Networking, Copyright University of Edinburgh 2005 BlueTooth Low cost wireless connectivity for Personal Area Networks
More informationBluetooth Demystified
Bluetooth Demystified S-72.4210 Postgraduate Course in Radio Communications Er Liu liuer@cc.hut.fi -10 Content Outline Bluetooth History Bluetooth Market and Applications Bluetooth Protocol Stacks Radio
More informationIntroduction to Wireless Networking ECE 401WN Spring 2009
I. Overview of Bluetooth Introduction to Wireless Networking ECE 401WN Spring 2009 Lecture 6: Bluetooth and IEEE 802.15 Chapter 15 Bluetooth and IEEE 802.15 What is Bluetooth? An always-on, short-range
More informationBluetooth: Short-range Wireless Communication
Bluetooth: Short-range Wireless Communication Wide variety of handheld devices Smartphone, palmtop, laptop Need compatible data communication interface Complicated cable/config. problem Short range wireless
More information12/2/09. Mobile and Ubiquitous Computing. Bluetooth Networking" George Roussos! Bluetooth Overview"
Mobile and Ubiquitous Computing Bluetooth Networking" George Roussos! g.roussos@dcs.bbk.ac.uk! Bluetooth Overview" A cable replacement technology! Operates in the unlicensed ISM band at 2.4 GHz! Frequency
More informationBluetooth. Bluetooth Radio
Bluetooth Bluetooth is an open wireless protocol stack for low-power, short-range wireless data communications between fixed and mobile devices, and can be used to create Personal Area Networks (PANs).
More informationALL SAINTS COLLEGE OF TECHNOLOGY, BHOPAL
BLUETOOTH Amita Tiwari IIIrd Semester amitaasct@gmail.com Sunil Kumar IIIrd Semester sunilasct@gmail.com ALL SAINTS COLLEGE OF TECHNOLOGY, BHOPAL ABSTRACT Blue tooth is a standard developed by a group
More informationMOBILE COMPUTING. Jan-May,2012. ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala.
WPAN: Bluetooth MOBILE COMPUTING Jan-May,2012 ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala Email-alakroy.nerist@gmail.com EM Spectrum ISM band 902 928 Mhz 2.4 2.4835 Ghz 5.725 5.85 Ghz LF MF
More informationLocal Area Networks NETW 901
Local Area Networks NETW 901 Lecture 6 IEEE 802.15.1 - Bluetooth Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 The 802.15 Family Target environment: communication of personal
More informationInside Bluetooth. Host. Bluetooth. Module. Application RFCOMM SDP. Transport Interface. Transport Bus. Host Controller Interface
Inside Bluetooth Application Host Application Host Audio (SCO) RFCOMM SDP Data (ACL) Control API and Legacy Support Modules Bluetooth HCI Driver Transport Interface Physical I/F Transport Bus Bluetooth
More informatione-pg Pathshala Quadrant 1 e-text
e-pg Pathshala Subject : Computer Science Module: Bluetooth Paper: Computer Networks Module No: CS/CN/37 Quadrant 1 e-text In our journey on networks, we are now exploring wireless networks. We looked
More informationAmarjeet Singh. February 7, 2012
Amarjeet Singh February 7, 2012 References Bluetooth Protocol Architecture v.1 www.bluetooth.org http://www.tutorial-reports.com/wireless/bluetooth/ Slides from last class uploaded on the course website
More informationUNIT 5 P.M.Arun Kumar, Assistant Professor, Department of IT, Sri Krishna College of Engineering and Technology, Coimbatore.
Communication Switching Techniques UNIT 5 P.M.Arun Kumar, Assistant Professor, Department of IT, Sri Krishna College of Engineering and Technology, Coimbatore. Bluetooth Techniques References 1. Wireless
More informationComputer Networks II Advanced Features (T )
Computer Networks II Advanced Features (T-110.5111) Bluetooth, PhD Assistant Professor DCS Research Group Based on slides previously done by Matti Siekkinen, reused with permission For classroom use only,
More informationBluetooth. Quote of the Day. "I don't have to be careful, I've got a gun. -Homer Simpson. Stephen Carter March 19, 2002
Bluetooth Stephen Carter March 19, 2002 Quote of the Day "I don't have to be careful, I've got a gun. -Homer Simpson 1 About Bluetooth Developed by a group called Bluetooth Special Interest Group (SIG),
More informationRedes Inalámbricas Tema 2.B Wireless PANs: Bluetooth
Redes Inalámbricas Tema 2.B Wireless PANs: Bluetooth Bluetooh Acknowledgments: Foo Chun Choong, Ericsson Research / Cyberlab Singapore, and Open Source Software Lab, ECE Dept, NUS Máster de Ingeniería
More informationGuide to Wireless Communications, 3 rd Edition. Objectives
Guide to Wireless Communications, 3 rd Edition Chapter 5 Wireless Personal Area Networks Objectives Describe a wireless personal area network (WPAN) List the different WPAN standards and their applications
More informationIntroduction to Bluetooth Wireless Technology
Introduction to Bluetooth Wireless Technology Jon Inouye Staff Software Engineer Mobile Platforms Group Intel Corporation Bluetooth Bluetooth is is a a trademark trademark owned owned by by Bluetooth Bluetooth
More informationBluetooth. The Bluetooth Vision. Universal Wireless Connectivity. Universal Wireless Connectivity
1 2 The Vision Universal wireless connectivity Replace existing cables with radio Connect systems that have been separate Ubiquitous computing environment Intelligent devices performing distributed services
More informationBluetooth Tutorial. Bluetooth Introduction. Bluetooth Technology
Bluetooth Tutorial Bluetooth strives to remove the never ending maze of wires which provide a communication link between different electronic devices, through a short range wireless solution. Consider
More informationBluetooth. Basic idea
Bluetooth Basic idea Universal radio interface for ad-hoc wireless connectivity Interconnecting computer and peripherals, handheld devices, DAs, cell phones replacement of IrDA Embedded in other devices,
More informationBy FaaDoOEngineers.com
ABSTRACT The seemingly endless entanglement of data wires connecting today s electronic devices has become slightly less jumbled with the introduction of Bluetooth technology and the creation of a wireless
More informationCS263: Wireless Communications and Sensor Networks
CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 6: Bluetooth and 802.15.4 October 12, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Bluetooth Standard for Personal Area
More informationIMPLEMENTATION AND SECURITY OF BLUETOOTH TECHNOLOGY
Bachelor s Thesis (UAS) Information Technology Networking and Programming 2011 IDAHOSA AKHANOLU IMPLEMENTATION AND SECURITY OF BLUETOOTH TECHNOLOGY i BACHELOR S THESIS (UAS) ABSTRACT TURKU UNIVERSITY OF
More informationWireless Networked Systems
Wireless Networked Systems CS 795/895 - Spring 2013 Lec #7: Medium Access Control WPAN, Bluetooth, ZigBee Tamer Nadeem Dept. of Computer Science Bluetooth Page 2 Spring 2013 CS 795/895 - Wireless Networked
More informationWireless Personal Area Networks & Wide Area Networks
Wireless Personal Area Networks & Wide Area Networks Patrick J. Stockreisser p.j.stockreisser@cs.cardiff.ac.uk Lecture Outline In the lecture we will: Look at PAN s in more detail Look at example networks
More informationSecurity. Nelli Gordon and Sean Vakili May 10 th 2011
Security Nelli Gordon and Sean Vakili May 10 th 2011 What is Bluetooth? Bluetooth is an open standard for short-range radio frequency (RF) communication. Bluetooth technology is used primarily to establish
More informationMI-BPS (Wireless Networks) FIT - CTU
Evropský sociální fond Praha & EU: Investujeme do vaší budoucnosti MI-BPS (Wireless Networks) FIT - CTU Alex Moucha Lecture 8 - Piconets, Scatternets, Bluetooth, Zigbee 1 Piconet an ad-hoc network linking
More informationCommunication Systems. WPAN: Bluetooth. Page 1
Communication Systems WPAN: Bluetooth Page 1 Outline Historical perspective Piconet Scatternet Lattency modes Applications Page 2 Bluetooth Bluetooth (BT) wireless technology is a short-range communications
More informationFeasibility of a Bluetooth Based Structural Health Monitoring Telemetry System
Feasibility of a Bluetooth Based Structural Health Monitoring Telemetry System Item Type text; Proceedings Authors Uchil, Vilas; Kosbar, Kurt Publisher International Foundation for Telemetering Journal
More informationWireless Personal Area Networks
CE 477 Wireless and obile Networks Wireless ersonal Area Networks Bluetooth CE 477 User cenarios Architecture rotocol tack IEEE 802.15.1 and IEEE 802.15.2 IEEE 802.15.4 (Low-Rate Wireless ersonal Area
More informationBluetooth. Bluetooth Basics Bluetooth and Linux Bluetooth at AG Tech. Dr.-Ing. H. Ritter, 7.1
Bluetooth Bluetooth Basics Bluetooth and Linux Bluetooth at AG Tech Dr.-Ing. H. Ritter, http://www.hartmut-ritter.de/ 7.1 I. Bluetooth Idea Universal radio interface for ad-hoc wireless connectivity Interconnecting
More informationSolving the Interference Problem due to Wireless LAN for Bluetooth Transmission Using a Non- Collaborative Mechanism. Yun-Ming, Chiu 2005/6/09
Solving the Interference Problem due to Wireless LAN for Bluetooth Transmission Using a Non- Collaborative Mechanism Yun-Ming, Chiu 2005/6/09 Outline Overview Survey of Bluetooth Structure of Bluetooth
More informationEmbedded Systems. 8. Communication
Embedded Systems 8. Communication Lothar Thiele 8-1 Contents of Course 1. Embedded Systems Introduction 2. Software Introduction 7. System Components 10. Models 3. Real-Time Models 4. Periodic/Aperiodic
More informationImplementing A Bluetooth Stack on UEFI
Implementing A Bluetooth Stack on UEFI Tony C.S. Lo Senior Manager American Megatrends Inc. presented by UEFI Plugfest October 2014 Agenda Introduction Bluetooth Architecture UEFI Bluetooth Stack Summary
More informationIntroducing Bluetooth
Chapter 1 Introducing Bluetooth In This Chapter From the beginning, Bluetooth technology was intended to hasten the convergence of voice and data to handheld devices, such as cellular telephones and portable
More informationDominique Chomienne & Michel Eftimakis NewLogic
Dominique Chomienne & Michel Eftimakis NewLogic Bluetooth is a trademark owned by the Bluetooth SIG, and licenced to NewLogic Page 1 Tutorial Agenda Bluetooth Marketing view Bluetooth network topology
More informationOverview of Bluetooth
Wireless Application Programming with J2ME and Bluetooth Page 1 http://developers.sun.com/techtopics/mobility/midp/articles/bluetooth1/ Dec 19, 2004 Article Wireless Application Programming with J2ME and
More informationStructure of the Lecture
Structure of the Lecture Chapter 2 Technical Basics: Layer 1 Methods for Medium Access: Layer 2 Chapter 3 Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Networks: GSM, GPRS, UMTS Satellites
More informationBluetooth PCI Adapter
Table of Contents 1 Introduction...2 2 Installation...2 2.1 Software Installation...2 2.1.1 Installation on Windows 95/98/ME/2000/XP...2 2.1.2 Installation on Windows NT...3 2.1.3 Installation on Linux...3
More informationWireless Sensor Networks
Wireless Sensor Networks 11th Lecture 29.11.2006 Christian Schindelhauer schindel@informatik.uni-freiburg.de 1 Bluetooth in WSN? There are several commercially available MAC protocol/products Wi-Fi Bluetooth
More informationBluetooth in Mobile Devices
Bluetooth in Mobile Devices Vidar Rinne Mälardalen University School of Innovation, Design and Engineering Computer Science: Game Development vre03001@student.mdh.se Abstract The basic idea of Bluetooth
More informationMOBILE COMPUTING. Bluetooth 9/20/15. CSE 40814/60814 Fall Basic idea
OBILE COUTING CE 40814/60814 Fall 2015 Bluetooth Basic idea Universal radio interface for ad-hoc wireless connectivity Interconnecting computer and peripherals, handheld devices, DAs, cell phones replacement
More informationWIRELESS TECHNOLOGIES
WIRELESS TECHNOLOGIES Bluetooth, ZigBee and ANT Thomas Aasebø OVERVIEW What are wireless sensor networks? What are personal area networks? What are these networks typically used for? Bluetooth, ZigBee
More informationCHAPTER 12 BLUETOOTH AND IEEE
CHAPTER 12 BLUETOOTH AND IEEE 802.15 These slides are made available to faculty in PowerPoint form. Slides can be freely added, modified, and deleted to suit student needs. They represent substantial work
More informationResearch on Modern Bluetooth Technology
Research on Modern Bluetooth Technology D.Annal 1, T.Indira 2, K.Poojitha 3, R.Rajashree 4 Student, Dept. of CSE, Magna College of Engineering, Chennai, Tamil Nadu, India 1,2,3,4 ABSTRACT: The seemingly
More informationWireless LANs & PANs Case Study: Bluetooth & IEEE W.lan.4
Wireless LANs & PANs Case Study: Bluetooth & IEEE802.15 W.lan.4 Dr.M.Y.Wu@CSE Shanghai Jiaotong University Shanghai, China Dr.W.Shu@ECE University of New Mexico Albuquerque, NM, USA W.wan.4-2 PANs: Bluetooth
More informationWireless Communications
4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:
More informationSimulation of Bluetooth Network
Simulation of Bluetooth Network Lennart Lagerstedt Stockholm, 2003 Master of Science Thesis Project The Department of Microelectronics and Information Technology, Royal Institute of Technology (KTH) Lennart
More informationSpecial Course in Computer Science: Local Networks. Lecture
Special Course in Computer Science: Local Networks Lecture 11 16.5.2012 Roadmap of the Course So far Basic telecom concepts General study of LANs Local Networks Ethernet Token bus Token ring ATM LAN Wi-Fi
More informationObjectives of the Bluetooth Technology
Bluetooth Origin of the name Harald I Bleutooth (in Danish, Harald Blåtand) (b. c. 910 d. c. 987), king of Denmark was credited with the first unification of Denmark and Norway Ericsson, inspired on the
More informationBluetooth. Renato Lo Cigno
Bluetooth Renato Lo Cigno www.dit.unitn.it/locigno/teaching ...Copyright Quest opera è protetta dalla licenza Creative Commons NoDerivs- NonCommercial. Per vedere una copia di questa licenza, consultare:
More informationAT THE END OF THIS SECTION, YOU SHOULD HAVE AN UNDERSTANDING OF THE
Wireless Technology AT THE END OF THIS SECTION, YOU SHOULD HAVE AN UNDERSTANDING OF THE UNDERLYING WIRELESS TECHNOLOGIES. References 2 The physical layer provides mechanical, electrical, l functional,
More informationModulation. Propagation. Typical frequency bands
References Wireless Technology 2 AT THE END OF THIS SECTION, YOU SHOULD HAVE AN UNDERSTANDING OF THE UNDERLYING WIRELESS TECHNOLOGIES. The physical layer provides mechanical, electrical, l functional,
More informationAh-Hoc, PAN, WSN,... Introduction Bluetooth ( ) Zigbee ( ) Renato Lo Cigno
Ah-Hoc, PAN, WSN,... Introduction Bluetooth (802.15.1) Zigbee (802.15.4) Renato Lo Cigno www.dit.unitn.it/locigno/ Ad-Hoc Networks Built by the userse themselves to support specific (in time, space, applications)
More informationCHAPTER 3 BLUETOOTH AND IEEE
CHAPTER 3 BLUETOOTH AND IEEE 802.15 These slides are made available to faculty in PowerPoint form. Slides can be freely added, modified, and deleted to suit student needs. They represent substantial work
More informationSE 4C03 Winter 2005 Bluetooth Wireless Network Technology
SE 4C03 Winter 2005 Bluetooth Wireless Network Technology Researcher: Daren Tan Shen Hau Last Revised: April 4, 2005 Bluetooth As everyone will ask, what is Bluetooth? Bluetooth is a new technology that
More informationBluetooth. Digital Communications CIM242. Amarpreet Singh Saini KINGSTON UNIVERSITY K /10/2010
KINGSTON UNIVERSITY Bluetooth Digital Communications CIM242 Amarpreet Singh Saini K1051678 12/10/2010 Bluetooth is a wireless technology that was conceived in the year 1998. Since then it has amassed an
More information101seminartopics.com. Bluetooth Based Smart Sensor Networks
Bluetooth Based Smart Sensor Networks ABSTRACT Dragging the world towards wireless galaxy Various sensors are already in a broad use today as part of different devices or as standalone devices connected
More informationSecuring A Bluetooth Device
Securing A Bluetooth Device Mrs. Dhanashri D. Dhokate 1, Mr. Milind C. Butale 2, Mr. Babasaheb S. Patil 3 Assistant Professor, Information Technology, PVPIT, Budhgaon, India 1. Associate Professor, Electronics
More informationWireless# Guide to Wireless Communications. Objectives
Wireless# Guide to Wireless Communications Chapter 6 High Rate Wireless Personal Area Networks Objectives Define a high rate wireless personal area network (HR WPAN) List the different HR WPAN standards
More informationSensor Application for Museum Guidance
Sensor Application for Museum Guidance Radka Dimitrova a a TU,Dresden, Germany, e-mail: dimitrova@ifn.et.tu-dresden.de Abstract - This article examines the conditions for successful communication and power
More informationModule 5. Embedded Communications. Version 2 EE IIT, Kharagpur 1
Module 5 Embedded Communications Version 2 EE IIT, Kharagpur 1 Lesson 27 Wireless Communication Version 2 EE IIT, Kharagpur 2 Instructional Objectives After going through this lesson the student would
More informationInside Bluetooth Low Energy
Inside Bluetooth Low Energy Naresh Gupta BOSTON LONDON artechhouse.com Contents Preface Acknowledgments Foreword xix xxiii xxv Introduction 1 1.1 Introduction to Wireless Communication 1 1.2 Data Rates
More informationBluetooth Wireless Technology meets CAN
Bluetooth Wireless Technology meets CAN Matthias Fuchs esd electronic system design GmbH, Hannover, Germany To access mobile and moving CAN fieldbus systems a wireless approach is often a good solution.
More informationIntroduction to Bluetooth
Introduction to Bluetooth Kirsten Matheus The idea behind Bluetooth The problems when trying to realize the idea The solutions used in Bluetooth How well the solutions work 12.06.2003 1 he Idea Behind
More informationSIMULATION BASED ANALYSIS OF BLUETOOTH NETWORKS. M. Subramani and M. Ilyas
SIMULATION BASED ANALYSIS OF BLUETOOTH NETWORKS M. Subramani and M. Ilyas College of Engineering Florida Atlantic University Boca Raton, Florida 33431 {msubrama@cse.fau.edu, ilyas@fau.edu} Abstract Many
More informationSystem Level Analysis of the Bluetooth standard
System Level Analysis of the standard Massimo Conti, Daniele Moretti Università Politecnica delle Marche, via Brecce Bianche, I-60131, Ancona, Italy Abstract The SystemC modules of the Link Manager Layer
More informationBluetooth Information Exchange Network
Bluetooth Information Exchange Network Xiaoning (Linda) Liu A thesis submitted to AUT University In partial fulfilment of the requirements for the degree of Master of Engineering (ME) October 2008 School
More informationAdvanced Mobile Computing and Networking - CS 560. Wireless Technologies. Bluetooth. Bluetooth. Bluetooth. Bluetooth 7/3/2014.
Advanced Mobile Computing and Networking - CS 560 Assessment CA 40% - Assignment 20% - 2 Tests 10% each Exam 60% Wireless Technologies, Infrared Data Association (),, and Institute of Electrical and Electronic
More informationJeffrey Price Dr. Konak IST 220 Bluetooth Technology
Jeffrey Price Dr. Konak IST 220 Bluetooth Technology 1 TABLE OF CONTENTS 1. INTRODUCTION 2. COMPONENTS 3. BLUETOOTH ADVANTAGES/DISADVANTAGES 4. USES OF BLUETOOTH 5. THE FUTURE 7. DOCUMENTATION 2 1. INTRODUCTION
More informationIn Brief TARIFF CLASSIFICATION OF CERTAIN ARTICLES USING BLUETOOTH TECHNOLOGY
Ottawa, June 16, 2009 MEMORANDUM D10-14-57 In Brief TARIFF CLASSIFICATION OF CERTAIN ARTICLES USING BLUETOOTH TECHNOLOGY This memorandum explains the Canada Border Services Agency administrative policy
More informationBluetooth General Information White Paper
General Information is the registered trademark of Atmel Corporation, 2325 Orchard Parkway, San Jose, CA 95131 Rev. 1993A 11/00 Introduction The wireless technology is the world s new shortrange RF transmission
More informationBluetooth Technologies
Bluetooth Technologies Bluetooth more than you thought! Where does the name come from? Danish King Harald "Blåtand" Gormsson Blatand = Bluetooth (Old Norse: Haraldr blátǫnn Gormsson, Danish: Harald Blåtand
More informationBluetooth technology, developed by Ericsson Mobile Communications, a. worldwide telecommunications company based in Sweden, is fast becoming the
Bluetooth technology, developed by Ericsson Mobile Communications, a worldwide telecommunications company based in Sweden, is fast becoming the worldwide standard for short-range wireless communication.
More informationChapter 5. Wireless PANs
Chapter 5 Wireless PANs 5.1 Introduction Introduction of Wireless PANs (WPANs) has caused the latest revolution in the area of wireless technologies. WPANs are short to very short-range (from a couple
More informationAd Hoc Nets - MAC layer. Part II TDMA and Polling
Ad Hoc Nets - MAC layer Part II TDMA and Polling More MAC Layer protocols Bluetooth Piconet: a polling/tdma scheme Cluster TDMA: based on TDMA (with random access and reserved slots) research protocol
More informationBlueSerial. Bluetooth Serial RS232 Port Adapters. User Manual HANTZ + PARTNER. The Upgrade Company!
Bluetooth Serial RS232 Port Adapters User Manual HANTZ + PARTNER The Upgrade Company! www.hantz.com Deutschland: Tel.: 0761 / 59 21 00 Fax: 0761 / 58 52 28 Schweiz: Tel.: 061 / 27 311-31 Fax: 061 / 27
More informationCALIFORNIA SOFTWARE LABS
CALIFORNIA SOFTWARE LABS R E A L I Z E Y O U R I D E A S California Software Labs 6800 Koll Center Parkway, Suite 100 Pleasanton CA 94566, USA. Phone (925) 249 3000 Fax (925) 426 2556 info@cswl.com http://www.cswl.com
More informationMaster. Slave. Master. Slaves. TCP/IP Traffic with Efficient Bluetooth Technology. Shafqat Hameed 1, Umar F.Khan 2, *Muhammad Saleem 3
/ Traffic with Efficient Bluetooth Technology Shafqat Hameed 1, Umar F.Khan 2, *Muhammad Saleem 3 1,3 National University of Sciences and Technology (NUST), Pakistan 2 University of Bradford, Bradford,
More informationBluetooth. March 28, 2005 Patrick Lui
Bluetooth March 28, 2005 Patrick Lui 0053252 1. Introduction As our everyday lives move closer towards complete digital age, connectivity between devices is an important aspect that has not been emphasized
More informationDevelopment of a Service Discovery Architecture for. Christian Schwingenschlögl, Anton Heigl
Development of a Service Discovery Architecture for the Bluetooth Radio System Christian Schwingenschlögl, Anton Heigl Technische Universität München (TUM), Institute of Communication Networks Arcisstr.
More informationWireless LANs. The Protocol Stack The Physical Layer The MAC Sublayer Protocol The Frame Structure Services 802.
Wireless LANs The 802.11 Protocol Stack The 802.11 Physical Layer The 802.11 MAC Sublayer Protocol The 802.11 Frame Structure Services 56 802.11 The 802.11 Working Group The IEEE 802.11 was formed in July
More informationWireless Protocols Overview
Sami Kiminki Department of Computer Science and Engineering Aalto University, School of Science sami.kiminki@aalto.fi September 22, 2011 Introduction A primer for wireless IoT topics Brief overview on
More informationWPAN-like Systems. UWB Ultra Wide Band. IrDA Infrared Data Association. Bluetooth. Z-Wave. WPAN Wireless Personal Area Network
WPAN-like Systems WPAN Wireless Personal Area Network PAN: Personal Area Network. Small, within a few meters. WPAN: Wireless PAN. Mostly short-range, low-power, lowrate networks. More or less self-organizing.
More information6/21/2016 bluetooth printing support
Develop hardware and software to enable Wireless printing using a USB printer Setting up of server device/printer Device inquiry Sending of print data to printer What is Bluetooth? Bluetooth is also known
More informationECE 435 Network Engineering Lecture 8
ECE 435 Network Engineering Lecture 8 Vince Weaver http://web.eece.maine.edu/~vweaver vincent.weaver@maine.edu 26 September 2016 HW#3 was posted Announcements note the warnings you were getting on toupper()
More informationWIRELESS-NETWORK TECHNOLOGIES/PROTOCOLS
3 WIRELESS-NETWORK TECHNOLOGIES/PROTOCOLS Dr. H. K. Verma Distinguished Professor (EEE) Sharda University, Greater Noida (Formerly: Deputy Director and Professor of Instrumentation Indian Institute of
More information13 Wireless. Communications Using Bluetooth. Oge Marques and Nitish Barman CONTENTS
13 Wireless Communications Using Bluetooth Oge Marques and Nitish Barman CONTENTS 13.1 Introduction...308 13.2 Overview...309 13.2.1 Masters and Slaves...310 13.2.2 Frequency Hopping Spread Spectrum (FHSS)
More informationA Routing Protocol and Energy Efficient Techniques in Bluetooth Scatternets
A Routing Protocol and Energy Efficient Techniques in Bluetooth Scatternets Balakrishna J. Prabhu and A. Chockalingam Department of Electrical Communication Engineering Indian Institute of Science, Bangalore
More informationShahin Teymouri. October 30 th, Dr. Andrew Rawicz School of Engineering Science Simon Fraser University Burnaby, BC V5A 1S6
Dr. Andrew Rawicz School of Engineering Science Burnaby, BC V5A 1S6 October 30 th, 2006 Re: ENSC440 Design Specification for VirtualKey (Bluetooth Access Control System) Dear Dr. Rawicz, The following
More informationChapter 10: Wireless LAN & VLANs
Chapter 10: Wireless LAN & VLANs Abdullah Konak School of Information Sciences and Technology Penn State Berks Wireless Transmission for LAN Radio Frequency Transmission (RF) Infrared Transmission 2 1
More informationElectromagnetic Spectrum (3kHz 300GHz)
Wireless Communication Serial communication Allocated a frequency of operation Could be a range of frequencies Regulated by FCC (Federal Communications Commission) in US Unfortunately, allocations are
More informationEssential Bluetooth It s everywhere you want to be
IEEE OEB Wireless Seminar Fremont, CA - 12/07/02 Essential Bluetooth It s everywhere you want to be Noel Baisa Technical Marketing Manager Device Connectivity Division 408-721 721-74667466 Noel.Baisa Baisa@nsc.com
More informationPersonal Area Networking over Bluetooth
Personal Area Networking over Bluetooth Pravin Bhagwat Networking Research Group AT&T Labs - Research pravin@acm.org ACM Mobicom 2000 Half day tutorial Aug 06, 2000 Boston, MA Bluetooth A cable replacement
More informationCommunication Systems for the Mobile Information Society
Communication Systems for the Mobile Information Society Martin Sauter Nortel Networks, Germany John Wiley Si Sons, Ltd Contents Preface List of Figures List of Tables List of Abbreviations xi xiii xix
More informationUniversitetet i Oslo Institutt for informatikk. Monitoring Bluetooth network topology. Cand Scient Thesis. Fredrik Borg
Universitetet i Oslo Institutt for informatikk Monitoring Bluetooth network topology Cand Scient Thesis Fredrik Borg February 1, 2002 II Foreword This thesis is a part of my cand.scient. degree in Communication
More informationBluetooth. 3.3 Latest Technology in Wireless Network. What is BLUETOOTH: Bluetooth 2/17/2016
3.3 Latest Technology in Wireless Network Bluetooth Bluetooth Bluetooth is a high-speed, low-power microwave wireless link technology, designed to connect phones, laptops, PDAs and other portable equipment
More information