Tuesday, January 26, 2010

Key Learning Points Of Bluetooth

Bluetooth is easily the best in wireless handheld technology. When it comes to learning, Bluetoothcan get quite complicated. To help you, you'll findthe key learning points of Bluetooth below:
1. Bluetooth is an energy efficient, lowoverhead communication protocol that's ideal for interdevice communications.

2. Unlike infrared, Bluetooth doesn't requiread line of sight.
3. Depending on the implementation, Bluetooth can have a range of up to 100 meters.
4. The specification of Bluetooth consists ofa Foundation Profile Document and a Foundation Core Document.
5. The protocol stack for Bluetooth consists of core protocols, cable protocols, and even adapted protocols.
6. The transmitter operates around the 2.4GHz frequency band.
7. The data channel will change frequency, orhops, 1,600 times in a second, between the 79 allocated channels in the ISM band.
8. Bluetooth utilizes a spread spectrum frequency hopping RF characteristic to ensure that independant networking operates when the other devices are in range.
9. A piconet is formed when one or more devices open up a channel of communication.
10. A piconet can have a master and up to seven slaves.
11. Communication of the interdevice is based on the concepts of channels.
12. All Bluetooth devices are capable oftransmitting voice.
13. The channel has a total capacity of1 MB per second.
14. There are two types of channels with Bluetooth - SCO (Synchronous Connection Oriented) andACL (Asynchronous Connectionless).
15. The SCO channels are time oriented, andare therefore primarily used for transferring time critical data such as voice.
16. ACL channels are normally used for communicating data.
17. Data contained in a packet can be up to2,745 bits in length.
18. In a single piconet, there can be upto three SCO links containing 64,000 bits a second each.
19. To avoid collision and timing problems,SCO links are reserved slots that are set up by the master.
20. The masters can support up to three SCO links with either one, two, or three slaves.
21. The slots that aren't reserved for SCO links can be used as ACL links.
22. The LMP (Link Management Protocol)will handle link level security, error corrections,and the establishment of communications links.
23. The LMP packets will have priorityover user packets that originate and form theL2CAP layer.
24. The L2CAP layer will ensure an acceptable quality of service. 25. No more than one ACL link can existat the L2CAP layer.

No comments:

Post a Comment