SlideShare a Scribd company logo
1 of 18
Prof. Neeraj Bhargava
Pramod Singh Rathore
Department of Computer Science
School of Engineering & System Sciences,
MDS University Ajmer, Rajasthan, India
1
Bluetooth ensures reliable data transfer
when devices are connected.
 A connection is required for secure data
transfer.
This section describes e basic procedures to
be followed by two or more Bluetooth
devices to start a connection between
themselves.
 Inquiry:-The device on reaching a new
environment would automatically initiated an
inquiry are within its range.
 Paging:- The device will invoke a baseband
procedure called paging.
This results in synchronization of the device with
the access point.
Following are the Elements of Connection Establishment Procedure
 Link establishment:-This is the sequence of activity
perform by link manager of the paging device to
establish a physical link.
 Service discovery:-The LMP will use the
SDP(service discovery protocol) to discover what
services are available from the access point.
 RFCOMM channel:- Depending on the need of the
email application an RFCOMM or other channel will
be created over the L2CAP channel.
 L2CAP channel:-With information obtained
from SDP the device will create an L2CAP channel
to the access point.
 PPP:-This link will allow the user to login to his
email account.
 Data transfer:-In this data is transfered.
All above are the Elements of Connection Establishment Procedure
 RFCOMM (Radio Frequency
Communication)
 Pairing
 L2CAP(Logical Link ControlAdaption
Protocol)
 The Bluetooth protocol RFCOMM is a simple set of
transport protocols, made on top of the L2CAP protocol,
providing emulated RS-232 serial ports.
 RFCOMM is sometimes called ”serial port emulation”.
The Bluetooth ”serial port profile” is based on this
protocol.
 RFCOMM provides a simple reliable data stream to the
user, similar to TCP.
 RFCOMM provides a simple reliable data stream to the
user, similar to TCP.
 Service Discovery Protocol(S.D.P)
 Service Discovery Server(S.D.S)
 Service Discovery Database(S.D.D.B)
Following are the Some Services of RFCOMM…
The service discovery profile defines the
protocols and procedures that shall be used
by a service discovery application on
a device to locate services in
other Bluetooth-enabled devices using
the Bluetooth Service Discovery Protocol
(SDP).
A specific Service Discovery protocol is
needed in the Bluetooth environment, as the
set of services that are available changes
dynamically based on the RF proximity of
devices in motion different from service
discovery in traditional network-based
environments.
 In order that devices can connect easily and quickly, a scheme known as
Bluetooth pairing may be used. Once Bluetooth pairing has occurred two
devices may communicate with each other.
 Bluetooth pairing is generally initiated manually by a device user. The
Bluetooth link for the device is made visible to other devices. They may
then be paired.
 The Bluetooth pairing process is typically triggered automatically the first
time a device receives a connection request from a device with which it is
not yet paired. In order that Bluetooth pairing may occur, a password has
to be exchanged between the two devices.
 This password or "Passkey" as it is more correctly termed is a code shared
by both Bluetooth devices. It is used to ensure that both users have agreed
to pair with each other.
Device
1
Device
2
Pass Key Authentication
Data
Receive
Pass Key
Confirmed
Authenticated
Data Transfer
 L2CAP is used within the Bluetooth protocol stack. It
passes packets to either the Host Controller Interface
(HCI) or on a hostless system.
 L2CAP is used to communicate over the host ACL(A-
synch Connection Link) link. Its connection is
established after the ACL link has been set up.
Network
Authenticate
Dead
Establish
Terminate
 Active mode:- This is the regular connected
mode,where the device is actively transmitting
or receiving data.
 Sniff mode:-This is a power-saving mode,where
the device is less active.
 It’ll sleep and only listen for transmissions at a
set interval.
 Hold mode:-Hold mode is a temporary,power-
saving mode where a device sleeps for a defined
period and then returns back to active mode
when that interval has passed.
The master can command a slave device to hold.
 Park mode:- Park is the deepest of sleep modes.
A master can command a slave to “park” and
that slave will become inactive until the master
tells it to wake back up.
STANDBY
PageDATA
Tx/Rx
Active
SniffHoldPark
Inquiry
Thank You…!

More Related Content

What's hot

PPP (Point to Point Protocol)
PPP (Point to Point Protocol)PPP (Point to Point Protocol)
PPP (Point to Point Protocol)Ali Jafar
 
Mobile computing unit-5
Mobile computing unit-5Mobile computing unit-5
Mobile computing unit-5Ramesh Babu
 
Point-to-Point Protocol(PPP) CCN ppt
Point-to-Point Protocol(PPP) CCN pptPoint-to-Point Protocol(PPP) CCN ppt
Point-to-Point Protocol(PPP) CCN pptNiaz Shaikh
 
Internet connectivity
Internet connectivityInternet connectivity
Internet connectivityFabMinds
 
Point to point protocol | PPP - Nitish Jadia
Point to point protocol | PPP - Nitish JadiaPoint to point protocol | PPP - Nitish Jadia
Point to point protocol | PPP - Nitish JadiaNitish Jadia
 
MOBILE IP,DHCP,ADHOC ROUTING PROTOCOLS
MOBILE IP,DHCP,ADHOC ROUTING PROTOCOLSMOBILE IP,DHCP,ADHOC ROUTING PROTOCOLS
MOBILE IP,DHCP,ADHOC ROUTING PROTOCOLSManju La
 
Point to-point-protocol
Point to-point-protocolPoint to-point-protocol
Point to-point-protocolamigurumi21
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteAtharaw Deshmukh
 
Transmission Control Protocol and User Datagram protocol
Transmission Control Protocol and User Datagram protocolTransmission Control Protocol and User Datagram protocol
Transmission Control Protocol and User Datagram protocolSamsil Arefin
 
TCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionTCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionShubham Khedekar
 
Network Protocol
Network ProtocolNetwork Protocol
Network ProtocolKetan Nayak
 
Final Presentation on the Network layer
Final Presentation on the Network layerFinal Presentation on the Network layer
Final Presentation on the Network layerZee Haak
 
TCP IP
TCP IPTCP IP
TCP IPhivasu
 

What's hot (20)

PPP (Point to Point Protocol)
PPP (Point to Point Protocol)PPP (Point to Point Protocol)
PPP (Point to Point Protocol)
 
Mobile computing unit-5
Mobile computing unit-5Mobile computing unit-5
Mobile computing unit-5
 
Point-to-Point Protocol(PPP) CCN ppt
Point-to-Point Protocol(PPP) CCN pptPoint-to-Point Protocol(PPP) CCN ppt
Point-to-Point Protocol(PPP) CCN ppt
 
Computer network
Computer networkComputer network
Computer network
 
Internet connectivity
Internet connectivityInternet connectivity
Internet connectivity
 
Point to point protocol | PPP - Nitish Jadia
Point to point protocol | PPP - Nitish JadiaPoint to point protocol | PPP - Nitish Jadia
Point to point protocol | PPP - Nitish Jadia
 
IEEE 802.1 x
IEEE 802.1 xIEEE 802.1 x
IEEE 802.1 x
 
MOBILE IP,DHCP,ADHOC ROUTING PROTOCOLS
MOBILE IP,DHCP,ADHOC ROUTING PROTOCOLSMOBILE IP,DHCP,ADHOC ROUTING PROTOCOLS
MOBILE IP,DHCP,ADHOC ROUTING PROTOCOLS
 
Point to-point-protocol
Point to-point-protocolPoint to-point-protocol
Point to-point-protocol
 
Assingment 2
Assingment 2Assingment 2
Assingment 2
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol Suite
 
Mcse question
Mcse questionMcse question
Mcse question
 
Transmission Control Protocol and User Datagram protocol
Transmission Control Protocol and User Datagram protocolTransmission Control Protocol and User Datagram protocol
Transmission Control Protocol and User Datagram protocol
 
TCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionTCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer Description
 
Network Protocol
Network ProtocolNetwork Protocol
Network Protocol
 
Final Presentation on the Network layer
Final Presentation on the Network layerFinal Presentation on the Network layer
Final Presentation on the Network layer
 
Network Layer by-adeel
Network Layer by-adeelNetwork Layer by-adeel
Network Layer by-adeel
 
Chapter2 ppp
Chapter2   pppChapter2   ppp
Chapter2 ppp
 
TCP IP
TCP IPTCP IP
TCP IP
 
four
fourfour
four
 

Similar to Bluetooth Connection Establishment Procedures

SYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdf
SYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdfSYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdf
SYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdfshubhangisonawane6
 
Network access layer security protocol
Network access layer security protocolNetwork access layer security protocol
Network access layer security protocolKirti Ahirrao
 
Module 2_part 2.pptx
Module 2_part 2.pptxModule 2_part 2.pptx
Module 2_part 2.pptxNIKHILAS12
 
HDLC and Point to point protocol
HDLC and Point to point protocolHDLC and Point to point protocol
HDLC and Point to point protocolKinza Razzaq
 
Protocols in computer network
Protocols in computer network   Protocols in computer network
Protocols in computer network priya sehgal
 
Protocols and standards
Protocols and standardsProtocols and standards
Protocols and standardsPriyankaM69
 
Linux Based Advanced Routing with Firewall and Traffic Control
Linux Based Advanced Routing with Firewall and Traffic ControlLinux Based Advanced Routing with Firewall and Traffic Control
Linux Based Advanced Routing with Firewall and Traffic Controlsandy_vasan
 
Remote access service
Remote access serviceRemote access service
Remote access serviceApoorw Pandey
 
17.security level of services
17.security level of services17.security level of services
17.security level of servicesPramod Rathore
 
client server protocol
client server protocolclient server protocol
client server protocolbmuhire
 
Unit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi ModelUnit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi ModelJacqueline Thomas
 
CISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network FundamentalCISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network FundamentalKarthikeyan Dhayalan
 
Communication Protocol - Arindam Samanta
Communication Protocol - Arindam SamantaCommunication Protocol - Arindam Samanta
Communication Protocol - Arindam Samantasankhadeep
 

Similar to Bluetooth Connection Establishment Procedures (20)

Bluetooth1
Bluetooth1Bluetooth1
Bluetooth1
 
Bluetooth v3+HS
Bluetooth v3+HSBluetooth v3+HS
Bluetooth v3+HS
 
SYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdf
SYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdfSYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdf
SYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdf
 
Network access layer security protocol
Network access layer security protocolNetwork access layer security protocol
Network access layer security protocol
 
Module 2_part 2.pptx
Module 2_part 2.pptxModule 2_part 2.pptx
Module 2_part 2.pptx
 
HDLC and Point to point protocol
HDLC and Point to point protocolHDLC and Point to point protocol
HDLC and Point to point protocol
 
L2tp1
L2tp1L2tp1
L2tp1
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Protocols in computer network
Protocols in computer network   Protocols in computer network
Protocols in computer network
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Basic to advance protocols
Basic to advance protocolsBasic to advance protocols
Basic to advance protocols
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
 
Protocols and standards
Protocols and standardsProtocols and standards
Protocols and standards
 
Linux Based Advanced Routing with Firewall and Traffic Control
Linux Based Advanced Routing with Firewall and Traffic ControlLinux Based Advanced Routing with Firewall and Traffic Control
Linux Based Advanced Routing with Firewall and Traffic Control
 
Remote access service
Remote access serviceRemote access service
Remote access service
 
17.security level of services
17.security level of services17.security level of services
17.security level of services
 
client server protocol
client server protocolclient server protocol
client server protocol
 
Unit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi ModelUnit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi Model
 
CISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network FundamentalCISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network Fundamental
 
Communication Protocol - Arindam Samanta
Communication Protocol - Arindam SamantaCommunication Protocol - Arindam Samanta
Communication Protocol - Arindam Samanta
 

More from Pramod Rathore

Restoration by spatial filtering
Restoration by spatial filteringRestoration by spatial filtering
Restoration by spatial filteringPramod Rathore
 
Image enhancement in frequency domain
Image enhancement in frequency domainImage enhancement in frequency domain
Image enhancement in frequency domainPramod Rathore
 
Image enhancement in fourier transform part ii
Image enhancement in fourier transform  part iiImage enhancement in fourier transform  part ii
Image enhancement in fourier transform part iiPramod Rathore
 
Image enhancement in fourier transform
Image enhancement in fourier transformImage enhancement in fourier transform
Image enhancement in fourier transformPramod Rathore
 
How to handling strings in r
How to handling strings in rHow to handling strings in r
How to handling strings in rPramod Rathore
 
Smoothing spatial filtering
Smoothing spatial filteringSmoothing spatial filtering
Smoothing spatial filteringPramod Rathore
 
6.histogram processing
6.histogram processing6.histogram processing
6.histogram processingPramod Rathore
 
5.image enhancement in spatial domain copy - copy
5.image enhancement in spatial domain   copy - copy5.image enhancement in spatial domain   copy - copy
5.image enhancement in spatial domain copy - copyPramod Rathore
 
4.image enhancement in spatial domain copy
4.image enhancement in spatial domain   copy4.image enhancement in spatial domain   copy
4.image enhancement in spatial domain copyPramod Rathore
 
Issues in machine learning
Issues in machine learningIssues in machine learning
Issues in machine learningPramod Rathore
 
Image enhancement in spatial domain
Image enhancement in spatial domainImage enhancement in spatial domain
Image enhancement in spatial domainPramod Rathore
 

More from Pramod Rathore (20)

Restoration by spatial filtering
Restoration by spatial filteringRestoration by spatial filtering
Restoration by spatial filtering
 
Image restoration
Image restorationImage restoration
Image restoration
 
Homomorphic filtering
Homomorphic filteringHomomorphic filtering
Homomorphic filtering
 
Sharpening filtering
Sharpening filteringSharpening filtering
Sharpening filtering
 
Image enhancement in frequency domain
Image enhancement in frequency domainImage enhancement in frequency domain
Image enhancement in frequency domain
 
Image enhancement in fourier transform part ii
Image enhancement in fourier transform  part iiImage enhancement in fourier transform  part ii
Image enhancement in fourier transform part ii
 
Image enhancement in fourier transform
Image enhancement in fourier transformImage enhancement in fourier transform
Image enhancement in fourier transform
 
Control statements
Control statementsControl statements
Control statements
 
Basic image operation
Basic image operationBasic image operation
Basic image operation
 
How to handling strings in r
How to handling strings in rHow to handling strings in r
How to handling strings in r
 
Smoothing spatial filtering
Smoothing spatial filteringSmoothing spatial filtering
Smoothing spatial filtering
 
Handle list in r
Handle list in rHandle list in r
Handle list in r
 
Spatial filtering
Spatial filteringSpatial filtering
Spatial filtering
 
Data types in r
Data types in rData types in r
Data types in r
 
6.histogram processing
6.histogram processing6.histogram processing
6.histogram processing
 
5.image enhancement in spatial domain copy - copy
5.image enhancement in spatial domain   copy - copy5.image enhancement in spatial domain   copy - copy
5.image enhancement in spatial domain copy - copy
 
4.image enhancement in spatial domain copy
4.image enhancement in spatial domain   copy4.image enhancement in spatial domain   copy
4.image enhancement in spatial domain copy
 
Issues in machine learning
Issues in machine learningIssues in machine learning
Issues in machine learning
 
R programming
R programmingR programming
R programming
 
Image enhancement in spatial domain
Image enhancement in spatial domainImage enhancement in spatial domain
Image enhancement in spatial domain
 

Recently uploaded

Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 

Recently uploaded (20)

Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 

Bluetooth Connection Establishment Procedures

  • 1. Prof. Neeraj Bhargava Pramod Singh Rathore Department of Computer Science School of Engineering & System Sciences, MDS University Ajmer, Rajasthan, India 1
  • 2. Bluetooth ensures reliable data transfer when devices are connected.  A connection is required for secure data transfer. This section describes e basic procedures to be followed by two or more Bluetooth devices to start a connection between themselves.
  • 3.  Inquiry:-The device on reaching a new environment would automatically initiated an inquiry are within its range.  Paging:- The device will invoke a baseband procedure called paging. This results in synchronization of the device with the access point. Following are the Elements of Connection Establishment Procedure
  • 4.  Link establishment:-This is the sequence of activity perform by link manager of the paging device to establish a physical link.  Service discovery:-The LMP will use the SDP(service discovery protocol) to discover what services are available from the access point.  RFCOMM channel:- Depending on the need of the email application an RFCOMM or other channel will be created over the L2CAP channel.
  • 5.  L2CAP channel:-With information obtained from SDP the device will create an L2CAP channel to the access point.  PPP:-This link will allow the user to login to his email account.  Data transfer:-In this data is transfered. All above are the Elements of Connection Establishment Procedure
  • 6.  RFCOMM (Radio Frequency Communication)  Pairing  L2CAP(Logical Link ControlAdaption Protocol)
  • 7.  The Bluetooth protocol RFCOMM is a simple set of transport protocols, made on top of the L2CAP protocol, providing emulated RS-232 serial ports.  RFCOMM is sometimes called ”serial port emulation”. The Bluetooth ”serial port profile” is based on this protocol.  RFCOMM provides a simple reliable data stream to the user, similar to TCP.  RFCOMM provides a simple reliable data stream to the user, similar to TCP.
  • 8.  Service Discovery Protocol(S.D.P)  Service Discovery Server(S.D.S)  Service Discovery Database(S.D.D.B) Following are the Some Services of RFCOMM…
  • 9. The service discovery profile defines the protocols and procedures that shall be used by a service discovery application on a device to locate services in other Bluetooth-enabled devices using the Bluetooth Service Discovery Protocol (SDP).
  • 10. A specific Service Discovery protocol is needed in the Bluetooth environment, as the set of services that are available changes dynamically based on the RF proximity of devices in motion different from service discovery in traditional network-based environments.
  • 11.  In order that devices can connect easily and quickly, a scheme known as Bluetooth pairing may be used. Once Bluetooth pairing has occurred two devices may communicate with each other.  Bluetooth pairing is generally initiated manually by a device user. The Bluetooth link for the device is made visible to other devices. They may then be paired.  The Bluetooth pairing process is typically triggered automatically the first time a device receives a connection request from a device with which it is not yet paired. In order that Bluetooth pairing may occur, a password has to be exchanged between the two devices.  This password or "Passkey" as it is more correctly termed is a code shared by both Bluetooth devices. It is used to ensure that both users have agreed to pair with each other.
  • 12. Device 1 Device 2 Pass Key Authentication Data Receive Pass Key Confirmed Authenticated Data Transfer
  • 13.  L2CAP is used within the Bluetooth protocol stack. It passes packets to either the Host Controller Interface (HCI) or on a hostless system.  L2CAP is used to communicate over the host ACL(A- synch Connection Link) link. Its connection is established after the ACL link has been set up.
  • 15.  Active mode:- This is the regular connected mode,where the device is actively transmitting or receiving data.  Sniff mode:-This is a power-saving mode,where the device is less active.  It’ll sleep and only listen for transmissions at a set interval.
  • 16.  Hold mode:-Hold mode is a temporary,power- saving mode where a device sleeps for a defined period and then returns back to active mode when that interval has passed. The master can command a slave device to hold.  Park mode:- Park is the deepest of sleep modes. A master can command a slave to “park” and that slave will become inactive until the master tells it to wake back up.