Architecture and Protocols Used in Common Bluetooth Systems
نویسنده
چکیده
Bluetooth technology is a radio system that is used for wireless networking. It uses a master/slave design, where any of the units can function as either a master or a slave allowing greater functionality. This paper will provide some general information on Bluetooth technology as well as the architecture and protocols used within a Bluetooth system. The layers that some of these protocols reside will be addressed as well as what each one is responsible for.
منابع مشابه
An architecture enabling BluetoothTM/JiniTM interoperability
Service Discovery Protocols allow clients to discover services without actual knowledge of the locations or characteristics of the services. Jini' and 13luetooth SDP are two common service discovery protocols. They may meet each other in many environments. But there is still no general architecture to bring them together. In this paper, we introduce an architecture for Bluetooth client to disco...
متن کاملA Detailed Exploration of Usability Statistics and Application Rating Based on Wireless Protocols
A Detailed Exploration of usability statistics and Application Rating on short-range Wireless protocols Bluetooth (IEEE 802.15.1), ZigBee (IEEE 802.15.4), Wi-Fi (IEEE 802.11) and NFC (ISO/IEC 14443) has been performed that being representing of those prominent wireless protocols evaluating their main characteristics and performances in terms of some metric such as co-existence, data rate, secur...
متن کاملAn Energy Efficient Hierarchical Heterogeneous Wireless Sensor Network
Future communication networks are expected to be heterogeneous consisting of different wireless systems such as WLAN and Bluetooth systems, which can be used in building wireless sensor networks. The development of these network technologies and due to the limited energy supply of sensors have prompted sensor researchers to consider alternatives that minimize energy consumption in sensor networ...
متن کاملDraft - Do Not Publish ! Security Architectures
This article briefly describes the most important security protocols of the Bluetooth security architecture for Wireless Personal Area Networks (WPAN). We mainly focus on the key agreement protocol, which is the most critical part of this security architecture. The strengths and weaknesses of these solutions are discussed and perspectives on improvements are pre-
متن کاملSetting Initial Secret Keys in a Mobile Ad Hoc Network
Mobile ad hoc networks require specialized authentication protocols due to the mobility of users and lack of always-available trusted servers. There are a variety of mobile ad hoc authentication protocols for creating session and group keys, once a subset of individual nodes are signed in, i.e., established their shared secret keys. In this paper, we address the issue of setting initial secret ...
متن کامل