on
Table of Contents
Page | 1
S. Topic Covered Page
No. No.
1. Introduction 2
2. History 3
3. Implementation 3
4. Why Bluetooth? 5
7. Bluetooth Classes 8
8. Bluetooth Version 8
Specification
9. Bluetooth Protocol Stack 13
15. Conclusion 35
16. Bibliography 36
1. INTRODUCTION:
Page | 2
Bluetooth is a standard for a small, low-cost, power efficient radio chip that can be
used by computers, printers, mobile phones, headsets, headphones, and numerous other
consumer electronics. This technology allows multiple devices to communicate with each
other, or one device can control and manage several other devices.
2. HISTORY:
The word "Bluetooth" is taken from the 10th Century Danish King Harald
Bluetooth. King Bluetooth had been influential in uniting Scandinavian Europe i.e. Denmark
& Norway during an era when the region was torn apart by wars and feuding clans. The
founders of the Bluetooth SIG felt the name was fitting because: Bluetooth technology was
first developed in Scandinavia, and is able to unite differing industries such as the cell phone,
computing, and automotive markets.
The name “Bluetooth” and its logo are trademarked by the privately held trade
association named the Bluetooth Special Interest Group (SIG), founded in September 1998
by a group of 5 electronics manufacturers (Ericsson, IBM, Intel, Nokia, and Toshiba) who
joined forces to form a private trade association. The Bluetooth SIG is a unification of leaders
in the telecommunications, computing, network, industrial automation, and automotive
industries. Today, The Bluetooth SIG includes Promoter Member Companies such as
Microsoft, Ericsson, IBM, Intel, Agere, Motorola, Nokia and Toshiba, plus thousands of
associate & adopter member companies.
By 1999 – the year when Bluetooth Spec 1.0 was introduced - 850 companies had
joined the SIG. A year later, when spec 1.1 was accepted, the Group boasted well over 1,000
members and a full 2000 companies had become involved by 2003 when Bluetooth Spec 1.2
was announced. Today, the Bluetooth SIG counts among its members 3,400 companies.
3. Implementation:
Page | 3
Bluetooth uses a radio technology called frequency-hopping spread spectrum,
which chops up the data being sent and transmits chunks of it on up to 79 bands of 1 MHz
width in the range 2402-2480 MHz. This is in the globally unlicensed Industrial, Scientific
and Medical (ISM) 2.4 GHz short-range radio frequency band. In its basic rate (BR) mode,
the modulation is Gaussian frequency-shift keying (GFSK). It can achieve a gross data
rate of 1 Mbit/s. In extended data rate (EDR) π/4-DQPSK and 8DPSK are used, giving 2, and
3 Mbit/s respectively.
Works in ISM band: 2.4~2.4835 GHz (US, Europe and most other countries)
Bluetooth uses 2.4GHz ISM band because it is an unlicensed band, and available in
most countries. At this frequency (λ=12.3cm), a very small antenna is possible. And higher
frequency band may cause high cost on RF.
For some countries with different bandwidth allocations, a reduced hop (23 hops)
system is defined. According to current version of Bluetooth specs, 79/23 hops system can’t
communicate to each other. France and Japan recently released the full ISM band. Spain is
also working on it. It is very likely to use the same band globally in the future.
In the 2.4GHz ISM band, the use of spread spectrum is mandatory. Although DSSS
can achieve higher data rate (11Mbps for 802.11b standard), FHSS has its advantage of low
Page | 4
cost, low power, better security. FHSS also handles near-far problem better, since it will
effectively block out-of-band signals. Considering the possible applications of Bluetooth,
FHSS is a better solution.
The hopping sequence is calculated using the master’s Bluetooth Device Address. It
hops to every 1MHz channel with equal probability. Its 1600hops/sec fast hopping rate
is enough to overcome slow fading in most indoor environment, which has Doppler spread of
0.1~6Hz. The RMS delay spread usually ranges from 100ns to 10µs [30]. A typical 0.25µs
RMS delay spread corresponds to 640 KHz coherent bandwidth. So different 1MHz channels
will have different radio characteristics, and the FHSS will effectively solve the multipath
and fading problem.
For 1MHz channel, the 1Msps symbol rate is already fully exploiting the bandwidth.
The 1MHz channel bandwidth was the requirement of FCC, but recent decision from FCC
changed that to 5MHz. This will probably enable the future version protocol to get higher
data rate. HomeRF is already taking advantage of this 5MHz channel to get 10Mbps
throughput.
2.4GHz ISM band is free to all, so many applications now are using this band. These
applications include digital cordless phone, WLAN (802.11b), HomeRF, RFID, microwave
oven and many other proprietary technologies.
4. Why Bluetooth?
Bluetooth was designed for consumers and small office/ home office users as an easy-
to-use, inexpensive way to transmit data without wires.
Bluetooth is perfectly suited for computers, mouse, phones, pens, laptops, PDAs,
cameras and any small battery-powered device.
Bluetooth and Wi-Fi have many common applications such as: setting up networks,
printing, or transferring files.
Page | 5
Wi-Fi is intended for resident equipment and its applications. The category of
applications is outlined as WLAN, the wireless local area networks. Wi-Fi is intended
as a replacement for cabling for general local area network access in work areas.
Bluetooth is intended for non-resident equipment and its applications. The category of
applications is outlined as the wireless personal area network (WPAN). Bluetooth is a
replacement for cabling in a variety of personally carried applications in any
ambience.
Wi-Fi uses the same radio frequencies as Bluetooth, but with higher power, resulting
in a stronger connection.
Bluetooth is a short range device but it does not need any additional setup for use. It
just needs to be used as a plug & play device.
Wi-Fi is sometimes called "wireless Ethernet". Wi-Fi requires more setup but is better
suited for operating full-scale networks; it enables a faster connection and better range
from the base station.
S.
Factor Bluetooth Wi-Fi
No.
1. IEEE Standard IEEE 802.16 IEEE 802.11
Data Transfer Up to 732
2. up to 11 mbps
Rate kbps
3. Range 10m - 100 m 100 m
Frequency
4. 2.4 GHz FHSS 2.4 GHz DSSS
Band
5. Technology TDMA CSMA/CA
6. Costing Cheaper($5) Expensive($50)
7. Power Efficient Yes (20mA) No (200mA)
6. Bluetooth vs. IrDA:
The Infrared Data Association (IrDA) has 2 standards: IrDA-Data and IrDA-Control,
the latter one is used for lower speed communications like wireless keyboard, joystick and
etc. Here, we are only interested with the IrDA-Data.
Page | 6
IrDA is used for high-speed, short-range, line-of-sight and point-to-point data
transfer. The range of IrDA is larger than 1 meter. It requires a narrow angle (30degree)
point-and-shoot operation. The maximum data transfer speed is 4Mbps and 16Mbps is under
development. It doesn’t interfere with other wireless communications and also it’s immune to
interference from others.
IrDA gained great acceptance worldwide. Currently over 150 million units are
installed worldwide and this number is growing 40% annually. Its major applications are
laptop computers, printers and LAN access among others.
The biggest advantage of IrDA over Bluetooth is its high throughput, which makes it
suitable for high-speed applications. The IrDA is also cheaper. One manufacturer can get a
whole solution with cost of about $1.
Bluetooth provides users more mobility. For class 2 Bluetooth devices, its range can
reach 10 meters, and it is Omni-Directional. It can effectively penetrate clothes and soft
partitions. For examples, the user can leave his cellular phone in his pocket while using dial-
up networking. This is impossible for IrDA.
Page | 7
Both of them have their advantages and disadvantages, and neither can fully replace
the other. In Bluetooth specifications, IrOBEX is defined to enable applications to work on
both RF and IR media.
7. Bluetooth Classes:
Bluetooth devices are categorized in 3 main Classes by the SIG & these classes are
known as Class 1, Class 2 & Class 3.
POWER
CLASSE
RANGE CONSUMPTI APPLICATIONS
S
ON
Versions 1.0 and 1.0B had many problems, and manufacturers had difficulty
making their products interoperable. Versions 1.0 and 1.0B also included mandatory
Page | 8
Bluetooth hardware device address (BD_ADDR) transmission in
the Connecting process (rendering anonymity impossible at the protocol level), which
was a major setback for certain services planned for use in Bluetooth environments.
This version is backward compatible with 1.1 and the major enhancements
include the following:
Page | 9
nominal rate of EDR is about 3 megabits per second, although the practical data
transfer rate is 2.1 megabits per second.
According to the 2.0 + EDR specification, EDR provides the following benefits:
Sniff SubRating
Reduces the power consumption when devices are in the sniff low-power
mode, especially on links with asymmetric data flows. Human interface
devices (HID) are expected to benefit the most, with mouse and keyboard devices
Page | 10
increasing their battery life by a factor of 3 to 10. It lets devices decide how long they
will wait before sending keepalive messages to one another. Previous Bluetooth
implementations featured keep alive message frequencies of up to several times per
second. In contrast, the 2.1 + EDR specification allows pairs of devices to negotiate
this value between them to as infrequently as once every 10 seconds.
Using this feature L2CAP may support both isochronous (A2DP media
streaming) and asynchronous data flows (AVRCP Commands) over the same
logical link by marking packets as automatically-flushable or non-automatically-
Page | 11
flushable by setting the appropriate value for the “Packet_Boundary_Flag” in the
HCI ACL Data Packet.
The 3.0 + HS specification was adopted by the Bluetooth SIG on April 21,
2009. It supports theoretical data transfer speeds of up to 24 Mbit/s, though not over
the Bluetooth link itself. Instead, the Bluetooth link is used for negotiation and
establishment, and the high data rate traffic is carried over a collocated Wi-Fi link.
Its main new feature is AMP (Alternate MAC/PHY), the addition of 802.11
as a high speed transport. Two technologies had been anticipated for AMP: 802.11
and UWB, but UWB is missing from the specification.
Alternate MAC/PHY
Enables the use of alternative MAC and PHYs for transporting Bluetooth
profile data. The Bluetooth Radio is still used for device discovery, initial connection
and profile configuration, however when large quantities of data need to be sent, the
high speed alternate MAC PHY (802.11, typically associated with Wi-Fi) will be used
to transport the data.
Updates the power control feature to remove the open loop power control, and
also to clarify ambiguities in power control introduced by the new modulation
Page | 12
schemes added for EDR. Enhanced power control removes the ambiguities by
specifying the behavior that is expected. The feature also adds closed loop power
control, meaning RSSI filtering can start as the response is received. Additionally, a
"go straight to maximum power" request has been introduced; this is expected to deal
with the headset link loss issue typically observed when a user puts their phone into a
pocket on the opposite side to the headset.
On December 17, 2009, the Bluetooth SIG adopted Bluetooth Low Energy
(Ble) as the hallmark feature of the version 4.0. The provisional
names Wibree and Bluetooth ULP (Ultra Low Power) are abandoned.
On June 12, 2007, Nokia and Bluetooth SIG had announced that Wibree will
be a part of the Bluetooth specification, as an ultra-low power Bluetooth
technology. Expected use cases include watches displaying Caller ID information,
sports sensors monitoring the wearer's heart rate during exercise, and medical devices.
The Medical Devices Working Group is also creating a medical devices profile and
associated protocols to enable this market. Bluetooth low energy technology is
designed for devices to have a battery life of up to one year.
8.8. Future
Broadcast channel
Topology management
vCard WAE
Page | 13
OBEX WAP
PPP Audio
RFCOMM
L2CAP
Bluetooth Radio
The LMP will now establish a link with the access point. As the application in this
case is email, an ACL link will be used. Various setup steps will be carried out as described
below.
Used to multiplex multiple logical connections between two devices using different
higher level protocols. Provides segmentation and reassembly of on-air packets.
Page | 14
In Basic mode, L2CAP provides packets with a payload configurable up to 64kB,
with 672 bytes as the default MTU, and 48 bytes as the minimum mandatory supported
MTU.
In Retransmission & Flow Control modes, L2CAP can be configured for reliable or
isochronous data per channel by performing retransmissions and CRC checks.
Bluetooth Core Specification Addendum 1 adds two additional L2CAP modes to the
core specification. These modes effectively deprecate original Retransmission and Flow
Control modes:
Streaming Mode (SM): This is a very simple mode, with no retransmission or flow
control. This mode provides an unreliable L2CAP channel.
Allows a device to discover services support by other devices, and their associated
parameters. For Example: when connecting a mobile phone to a Bluetooth headset, SDP will
be used for determining which Bluetooth profiles are supported by the headset (Headset
Profile, Hands Free Profile, Advanced Audio Distribution Profile (A2DP) etc.) and the
protocol multiplexer settings needed to connect to each of them. Each service is identified by
a Universally Unique Identifier (UUID), with official services (Bluetooth profiles) assigned a
short form UUID (16 bits rather than the full 128)
Page | 15
Standardized communication between the host stack (e.g., a PC or mobile phone OS)
and the controller (the Bluetooth IC). This standard allows the host stack or controller IC to
be swapped with minimal adaptation.
There are several HCI transport layer standards, each using a different hardware
interface to transfer the same command, event and data packets. The most commonly used
are USB (in PCs) and UART (in mobile phones and PDAs).
In Bluetooth devices with simple functionality (e.g., headsets) the host stack and
controller can be implemented on the same microprocessor. In this case the HCI is optional,
although often implemented as an internal software interface.
RFCOMM provides a simple reliable data stream to the user, similar to TCP. It is
used directly by many telephony related profiles as a carrier for AT commands, as well as
being a transport layer for OBEX over Bluetooth.
Many Bluetooth applications use RFCOMM because of its widespread support and
publicly available API on most operating systems. Additionally, applications that used a
serial port to communicate can be quickly ported to use RFCOMM.
BNEP is used for transferring another protocol stack's data via an L2CAP channel. It's
main purpose is the transmission of IP packets in the Personal Area Networking Profile.
BNEP performs a similar function to SNAP in Wireless LAN.
Used by the remote control profile to transfer AV/C commands over an L2CAP
channel. The music control buttons on a stereo headset use this protocol to control the music
player
Page | 16
Used by the advanced audio distribution profile to stream music to stereo headsets
over an L2CAP channel. Intended to be used by video distribution profile.
Telephony control protocol-binary (TCS BIN) is the bit-oriented protocol that defines
the call control signaling for the establishment of voice and data calls between Bluetooth
devices. Additionally, "TCS BIN defines mobility management procedures for handling
groups of Bluetooth TCS devices."
TCS-BIN is only used by the cordless telephony profile, which failed to attract
implementers. As such it is only of historical interest.
Adopted Protocols:
TCP/IP/UDP
Session-layer protocol for the exchange of objects, providing a model for object and
operation representation
WAE specifies an application framework for wireless devices and WAP is an open
standard to provide mobile users access to telephony and information services.
Page | 17
10. Bluetooth Networking:
The Master switches rapidly from one device to another in a round-robin fashion.
Simultaneous transmission from the master to multiple other devices is possible via broadcast
mode, but not used much.
The Bluetooth specification allows connecting two or more Piconets together to form
a Scatternet, with some devices acting as a Bridge by simultaneously playing the Master
role in one Piconet and the Slave role in another.
Bluetoot
h
Bluetoot Headset
h
Enabled Bluetoot
Cell h
Phone Enabled
PDA
Bluetoot
h
Bluetoot
Enabled
h
Printer
Embedd Bluetoot
ed h
Laptop Enabled
Mouse
Page | 18
10.2. Setting up Connections:
Device name
Device class
List of services
Technical information (For Example: Device Features, Manufacturer,
Bluetooth Specification Used, Clock Offset)
Any device may perform an inquiry to find other devices to connect to, and
any device can be configured to respond to such inquiries. However, if the device
trying to connect knows the address of the device, it always responds to direct
connection requests and transmits the information shown in the list above if
requested. Use of a device's services may require pairing or acceptance by its owner,
but the connection itself can be initiated by any device and held until it goes out of
range. Some devices can be connected to only one device at a time, and connecting to
them prevents them from connecting to other devices and appearing in inquiries until
they disconnect from the other device.
Every device has a unique 48-bit address. However, these addresses are
generally not shown in inquiries. Instead, friendly Bluetooth names are used, which
can be set by the user. This name appears when another user scans for devices and in
lists of paired devices. Most phones have the Bluetooth name set to the manufacturer
and model of the phone by default. Most phones and laptops show only the Bluetooth
names and special programs are required to get additional information about remote
devices.
Motivation:
Many of the services offered over Bluetooth can expose private data or allow
the connecting party to control the Bluetooth device. For security reasons it is
therefore necessary to control which devices are allowed to connect to a given
Bluetooth device. At the same time, it is useful for Bluetooth devices to automatically
establish a connection without user intervention as soon as they are in range.
Page | 19
To resolve this conflict, Bluetooth uses a process called Pairing. Two devices
need to be paired once to communicate with each other; the pairing process is
typically triggered automatically the first time a device receives a connection request
from a device it is not yet paired with. Once a pairing has been established, it is
remembered by the devices, which can then connect to each without user intervention.
When desired, the pairing relationship can later be removed by the user.
Implementation:
During the pairing process, the two devices involved establish a relationship
by creating a shared secret known as a link key. If a link key is stored by both
devices they are said to be bonded. A device that wants to communicate only with a
bonded device can cryptographically authenticate the identity of the other device, and
so be sure that it is the same device it previously paired with. Once a link key has
been generated, an authenticated ACL link between the devices may be encrypted so
that the data that they exchange protected against eavesdropping.
Page | 20
Link keys can be deleted at any time by either device. If done by either device
this will implicitly remove the bonding between the devices; so it is possible for one
of the devices to have a link key stored but not be aware that it is no longer bonded to
the device associated with the given link key.
Pairing Mechanisms:
1. Legacy Pairing: This is the only method available before Bluetooth 2.1.
Each device must enter a PIN code; pairing is only successful if both devices enter
the same PIN code. Any 16-byte UTF-8 string may be used as a PIN code,
however not all devices may be capable of entering all possible PIN codes.
Numeric input devices: Mobile phones are classic examples of these devices.
They allow a user to enter a numeric value up to 16 digits in length.
Page | 21
2. Secure Simple Pairing (SSP):
This is required by Bluetooth 2.1. A Bluetooth 2.1 device may only use
legacy pairing to interoperate with a 2.0 or earlier device. Secure Simple Pairing
uses a form of public key cryptography, and has the following modes of operation:
Just works: As implied by the name, this method just works. No user
interaction is required; however, a device may prompt the user to confirm the
pairing process. This method is typically used by headsets with very limited
IO capabilities, and is more secure than the fixed PIN mechanism which is
typically used for legacy pairing by this set of limited devices. This method
provides no “Man in the Middle (MITM)” protection.
Numeric comparison: If both devices have a display and at least one can
accept a binary Yes/No user input, they may use Numeric Comparison. This
method displays a 6-digit numeric code on each device. The user should
compare the numbers to ensure they are identical. If the comparison succeeds,
the user(s) should confirm pairing on the device(s) that can accept an input.
This method provides MITM protection, assuming the user confirms on both
devices and actually performs the comparison properly.
Passkey Entry: This method may be used between a device with a display
and a device with numeric keypad entry (such as a keyboard), or two devices
with numeric keypad entry. In the first case, the display is used to show a 6-
digit numeric code to the user, who then enters the code on the keypad. In the
second case, the user of each device enters the same 6-digit number. Both
cases provide MITM protection.
Page | 22
Advantages of Secure Simple Pairing:
A
Simple
Bluetooth
Network
Page | 23
Connection Modes:
1. Sniff Mode: In the sniff mode, the slave reduces its activity by listening only
to slots of interval Tsniff, which is mutually agreed by both the slave and the
master. Sniff mode has the highest duty cycle among 3 power saving modes.
2. Hold Mode: In the hold mode, the slave sleeps for some preset period, and
then restarts data transfers instantly. Also, the time of the hold mode is negotiated
between the slave and the master.
3. Park Mode: In the park mode, the slave gives up its active-member-address
and gets a new 8-bit parked-member-address. The parked slave has very little
activity. It only listens to the beacon channel to synchronize and checks for
broadcast messages. The unit in park mode has the lowest power consumption
among all connected states.
One Piconet has up to 256 parked members. By switching between active and
park mode, a Piconet can accommodate much more units than 8. Also, one unit can
participate in multiple Piconets by putting itself into park mode in some Piconets.
Bluetooth uses different hopping sequences for inquiring, paging and active
channel. Both inquiring and paging processes use a 32 chip hopping sequence, which
lasts 10ms. It changes the phase of hopping every 1.28S. The unit in the inquiry scans
or page scan mode will listen only to 1 frequency. Usually the connection
establishment will take several seconds.
This profile defines how high quality audio (stereo or mono) can be streamed
from one device to another over a Bluetooth connection. For example, music can be
streamed from a mobile phone to a wireless headset or car audio or from a
laptop/desktop to a wireless headset.
This profile is designed for sending images between devices and includes the
ability to resize, and convert images to make them suitable for the receiving device. It
may be broken down into smaller pieces:
Image Push
Allows the sending of images from a device the user controls.
Image Pull
Allows the browsing and retrieval of images from a remote device.
Automatic Archive
Allows the automatic backup of all the new images from a target device. For
Example: a laptop could download all of the new pictures from a camera
whenever it is within range.
Remote Camera
Page | 25
Allows the initiator to remotely use a digital camera. For Example, a
user could place a camera on a tripod for a group photo, use their phone handset
to check that everyone is in frame, and activate the shutter with the user in the
photo.
Remote Display
Allows the initiator to push images to be displayed on another device.
For Example: a user could give a presentation by sending the slides to a video
projector.
Page | 26
11.8. Dial-up Networking Profile (DUN)
This profile provides a standard to access the Internet and other dial-
up services over Bluetooth. The most common scenario is accessing the Internet
from a laptop by dialing up on a mobile phone, wirelessly.
It is based on Serial Port Profile (SPP), and provides for relatively easy
conversion of existing products, through the many features that it has in common
with the existing wired serial protocols for the same task. These include the AT
command set specified in European Telecommunications Standards Institute (ETSI)
07.07, and Point-to-Point Protocol (PPP).
Provides the capability to browse, manipulate and transfer objects (files and
folders) in an object store (file system) of another system. Uses GOEP as a basis.
This is the most commonly used profile, providing support for the popular
Bluetooth Headsets to be used with mobile phones. It relies on SCO for audio
encoded in 64 Kbit/s CVSD or PCM and a subset of AT commands from GSM
07.07 for minimal controls including the ability to ring, answer a call, hang up and
adjust the volume.
Page | 27
11.13. Intercom Profile (ICP)
A basic profile for sending "objects" such as pictures, virtual business cards,
or appointment details. It is called push because the transfers are always instigated
by the sender (client), not the receiver (server). OPP uses the APIs of OBEX profile
and the OBEX operations which are used in OPP are connect, disconnect, put, get
and abort. By using these APIs the OPP layer reside over OBEX and hence follow
the specifications of the Bluetooth stack.
Allow the car kit to display the name of the incoming caller;
Allow the car kit to download the phone book so the user can initiate a
call from the car display.
Page | 28
11.18. Serial Port Profile (SPP)
This allows devices such as car phones with built in GSM transceivers to
connect to a SIM card in a phone with Bluetooth, thus the car phone itself doesn't
require a separate SIM card. This profile is also known as rSAP (remote-SIM-
Access-Profile).
This profile allows the transport of a video stream. It could be used for
streaming a recorded video from a PC media center to a portable player, or a live
video from a digital video camera to a TV. Support for the H.263 baseline is
mandatory. The MPEG-4 Visual Simple Profile, and H.263 profiles 3 and 8 are
optionally supported, and covered in the specification.
Page | 29
12. Bluetooth Security Threats:
The recent Bluetooth security threats have been isolated to Bluetooth cell phones.
The issues were due to specific problems with the cell phone’s platforms. In order to
solve, and prevent against further security problems, the Bluetooth SIG and all of its
members work together to discover, inspect and solve reported problems.
If there is something wrong with the actual Bluetooth specification, then the
Bluetooth SIG will confront the problem directly. However, if the problem is a
result of the implementation of Bluetooth technology, then the SIG will work with
the specific members in order to release patches and prevent future problems from
occurring.
BlueSnarfing: Bluesnarfing refers to a hacker who has gained access to data, which
is stored on a Bluetooth enabled phone. Bluesnarfing allows the hacker to make phone
calls, send and receive text messages, read and write phonebook contacts, eavesdrop on
phone conversations, and connect to the Internet. The good news is, bluesnarfing requires
advanced equipment and expertise or requires the hacker to be within a 30 ft. range. If
your phone is in non-discoverable mode, it becomes significantly more difficult for
hackers to bluesnarf your phone. According to the Bluetooth SIG, only some
older Bluetooth enabled phones are vunerable to bluesnarfing.
Page | 30
13. Applications of Bluetooth:
1. Laptop:
2. PDA Device:
3. Printer:
4. Mobile Phones:
Page | 31
5. Headsets:
Make a call on your Bluetooth headset
while your mobile phone is in your pocket,
purse or briefcase!
Ideal for use in your car or for making
VOIP calls from your Bluetooth-enabled
computer.
6. Stereo Headphones:
Enjoy full stereo audio without being
tethered to your stereo or MP3 player!
Bluetooth headphones deliver complete
freedom from wires. You can even control
the volume and skip from track to track, &
easily make calls from your cell phone.
7. Keyboard – Mouse:
8. GPS System:
Page | 32
14. The Advantages of Bluetooth:
5. Low Interference (If Any): Bluetooth devices avoid interference with other wireless
devices by:
(a) Using a technique known as Spread-Spectrum Frequency Hopping, and
(b) Using low power wireless signals.
6. Low Energy Consumption: As stated above, Bluetooth uses low power signals. As a
result, the technology requires little energy and will therefore use less battery or
electrical power. Obviously, this is a great benefit for mobile devices because
Bluetooth won't drain the life of your device's battery.
Page | 33
7. Share Voice and Data: The Bluetooth standard allows compatible devices to share
both voice and data communications. For example, it is probably no surprise that a
Bluetooth enabled cell phone is capable of sharing voice communications with a
compatible Bluetooth headset; however, the same cell phone may also be capable of
establishing a GPRS connection to the Internet. Then, using Bluetooth, the phone can
connect to a laptop. The result: The laptop is capable of surfing the web or sending
and receiving email.
Page | 34
Conclusion
Page | 35
Bibliography
www.wikipedia.org
www.4shared.com
www.google.com
www.scribd.com
www.freebsd.org
www.about.com
Bluetooth Tutorials & E-Books
Page | 36