Architecture and Protocols Used in Common Bluetooth Systems

نویسنده

  • Vinod Vokkarane
چکیده

Bluetooth technology is a radio system that is used for wireless networking. It uses a master/slave design, where any of the units can function as either a master or a slave allowing greater functionality. This paper will provide some general information on Bluetooth technology as well as the architecture and protocols used within a Bluetooth system. The layers that some of these protocols reside will be addressed as well as what each one is responsible for.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An architecture enabling BluetoothTM/JiniTM interoperability

Service Discovery Protocols allow clients to discover services without actual knowledge of the locations or characteristics of the services. Jini' and 13luetooth SDP are two common service discovery protocols. They may meet each other in many environments. But there is still no general architecture to bring them together. In this paper, we introduce an architecture for Bluetooth client to disco...

متن کامل

A Detailed Exploration of Usability Statistics and Application Rating Based on Wireless Protocols

A Detailed Exploration of usability statistics and Application Rating on short-range Wireless protocols Bluetooth (IEEE 802.15.1), ZigBee (IEEE 802.15.4), Wi-Fi (IEEE 802.11) and NFC (ISO/IEC 14443) has been performed that being representing of those prominent wireless protocols evaluating their main characteristics and performances in terms of some metric such as co-existence, data rate, secur...

متن کامل

An Energy Efficient Hierarchical Heterogeneous Wireless Sensor Network

Future communication networks are expected to be heterogeneous consisting of different wireless systems such as WLAN and Bluetooth systems, which can be used in building wireless sensor networks. The development of these network technologies and due to the limited energy supply of sensors have prompted sensor researchers to consider alternatives that minimize energy consumption in sensor networ...

متن کامل

Draft - Do Not Publish ! Security Architectures

This article briefly describes the most important security protocols of the Bluetooth security architecture for Wireless Personal Area Networks (WPAN). We mainly focus on the key agreement protocol, which is the most critical part of this security architecture. The strengths and weaknesses of these solutions are discussed and perspectives on improvements are pre-

متن کامل

Setting Initial Secret Keys in a Mobile Ad Hoc Network

Mobile ad hoc networks require specialized authentication protocols due to the mobility of users and lack of always-available trusted servers. There are a variety of mobile ad hoc authentication protocols for creating session and group keys, once a subset of individual nodes are signed in, i.e., established their shared secret keys. In this paper, we address the issue of setting initial secret ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006