Computer Network | Bluetooth

It is a Wireless Personal Area Network (WPAN) technology and is used for exchanging data over smaller distances. This technology was invented by Ericson in 1994. It operates in the unlicensed, industrial, scientific and medical (ISM) band at 2.4 GHz to 2.485 GHz. Maximum devices that can be connected at the same time are 7. Bluetooth ranges upto 10 meters. It provides data rates upto 1 Mbps or 3 Mbps depending upon the version. The spreading technique which it uses is FHSS (Frequency hopping spread spectrum). A bluetooth network is called piconet and a collection of interconnected piconets is call scatternet.

Bluetooth Architecture:



Bluetooth protocol stack:

  1. Radio (RF) layer:
    It performs modulation/demodulation of the data into RF signals. It defines the physical characteristics of bluetooth transceiver. It defines two types of physical link: connection-less and connection-oriented.
  2. Baseband Link layer:
    It performs the connection establishment within a piconet.
  3. Link Manager protocol layer:
    It performs the management of the already established links. It also includes authentication and encryption processes.
  4. Logical Link Control and Adaption protocol layer:
    It is also known as the heart of the bluetooth protocol stack. It allows the communication between upper and lower layers of the bluetooth protocol stack. It packages the data packets received from upper layers into the form expected by lower layers. It also performs the segmentation and multiplexing.
  5. SDP layer:
    It is short for Service Discovery Protocol. It allows to discover the services available on another bluetooth enabled device.
  6. RF comm layer:
    It is short for Radio Frontend Component. It provides serial interface with WAP and OBEX.
  7. OBEX:
    It is short for Object Exchange. It is a communication protocol to exchange objects between 2 devices.
  8. WAP:
    It is short for Wireless Access Protocol. It is used for internet access.
  9. TCS:
    It is short for Telephony Control Protocol. It provides telephony service.
  10. Application layer:
    It enables the user to interact with the application.

Advantages:

  • Low cost.
  • Easy to use.
  • It can also penetrate through walls.
  • It creates an adhoc connection immediately without any wires.
  • It is used for voice and data transfer.

Disadvantages:

  • It can be hacked and hence, less secure.
  • It has slow data transfer rate: 3 Mbps.
  • It has small range: 10 meters.


My Personal Notes arrow_drop_up

Check out this Author's contributed articles.

If you like GeeksforGeeks and would like to contribute, you can also write an article using contribute.geeksforgeeks.org or mail your article to contribute@geeksforgeeks.org. See your article appearing on the GeeksforGeeks main page and help other Geeks.

Please Improve this article if you find anything incorrect by clicking on the "Improve Article" button below.




Article Tags :
Practice Tags :


Be the First to upvote.


Please write to us at contribute@geeksforgeeks.org to report any issue with the above content.