SlideShare a Scribd company logo
1 of 26
BLUE TOOTH
S.AZHAGARAMMAL(Info
Tech)
NADAR SARASWATHI
COLLEGE OF ARTS AND
SCIENCE,THENI.
BLUE TOOTH
•Bluetooth is, with the infrared, one
of the major wireless technologies
developed to achieve WPAN.
•Bluetooth is a wireless LAN
technology used to connect devices
of different functions such as
telephones, computers (laptop or
desktop), notebooks,
cameras, printers and so on.
USES:
1.It is used for providing
communication between
peripheral
devices like wireless mouse or
keyboard with the computer.
2. It is used by modern
healthcare
devices to send signals to
3. It is used by modern
communicating devices like mobile
phone, PDAs, palmtops etc to
transfer data rapidly.
4. It is used for dial up networking.
Thus allowing a notebook
computer to call via a mobile
phone.
5. It is used for cordless
Bluetooth Architecture:
Bluetooth architecture defines two types
of networks:
Piconet
Scattemet
1. Piconet:
• piconet can have upto eight active
nodes (1 master and 7 slaves) or
stations within the distance of 10 meters.
• There can be only one primary or
master station in each piconet.
• The communication between the
primary and the secondary can be one-
to-one or one-to-many.
•All communication is between
master and a slave. Salve-slave
communication is not possible.
• In addition to seven active slave
station, a piconet can have upto
255 parked nodes. These parked
nodes are secondary or slave
stations and cannot take part in
communication until it is moved
from parked state to active state.
2. Scatternet:
• A slave in one piconet can act as a
master or primary in other piconet.
• Such a station or node can receive
messages from the master in the first
piconet and deliver the message to its
slaves in other piconet where it is acting
as master. This node is also called
bridge slave.
Bluetooth protocol
architecture.
Radio Layer
•The Bluetooth radio layer
corresponds to the physical layer of
OSI model.
• It deals with ratio transmission
and modulation.
• The radio layer moves data from
master to slave or vice versa.
• It is a low power system that uses
2.4 GHz ISM band in a range of 10
meters.
• This band is divided into 79
channels of 1MHz each. Bluetooth
uses the Frequency Hopping
Spread Spectrum (FHSS) method
in the physical layer to avoid
interference from other devices or
networks.
Baseband Layer
• Baseband layer is
equivalent to the MAC
sublayer in LANs.
• Bluetooth uses a form of
TDMA called TDD-TDMA
(time division duplex TDMA).
• The master in each piconet
defines the time slot of 625 µsec.
• In TDD- TDMA, communication
is half duplex in which receiver
can send and receive data but
not at the same time.
1. Asynchronous
Connection-less (ACL
• It is used for packet switched data
that is available at irregular intervals.
• ACL delivers traffic on a best effort
basis. Frames can be lost & may have
to be retransmitted.
2. Synchronous
Connection Oriented (SCO)
• sco is used for real time data such as sound. It is used
where fast delivery is preferred over accurate delivery.
• In an sco link, a physical link is created between the
master and slave by reserving specific slots at regular
intervals.
.
Logical Link, Control
Adaptation Protocol Layer
(L2CAP)
• The logical unit link control
adaptation protocol is equivalent to
logical link control sublayer of LAN.
• The ACL link uses L2CAP for data
exchange but sco channel does not
use it.
1. Segmentation and
reassembly
• L2CAP receives the packets of upto 64
KB from upper layers and divides them
into frames for transmission.
• It adds extra information to define the
location of frame in the original packet.
• The L2CAP reassembles the frame into
packets again at the destination.
2. Multiplexing
• L2CAP performs multiplexing at
sender side and demultiplexing at
receiver side.
• At the sender site, it accepts data
from one of the upper layer
protocols frames them and deliver
them to the Baseband layer.
3. Quality of Service (QOS)
• L2CAP handles quality of service
requirements, both when links are
established and during normal
operation.
• It also enables the devices to
negotiate the maximum payload
size during connection
establishment.
Bluetooth Frame Format
The various fields of blue tooth frame
format are:
1. Access Code: It is 72 bit field
that contains synchronization bits.
It identifies the master.
2. Header: This is 54-bit field. It
contain 18 bit pattern that is
repeated for 3 time.
The header field contains
following subfields:
(i) Address: This 3 bit field can
define upto seven slaves (1 to
7). If the address is zero, it is
used for broadcast
communication from primary to
all secondaries.
(ii)Type: This 4 bit field
identifies the type of data
coming from upper layers.
(iii) F: This flow bit is used for flow
control. When set to 1, it means the
device is unable to receive more
frames.
(iv) A: This bit is used for
acknowledgement.
(v) S: This bit contains a sequence
number of the frame to detect
retransmission.
(vi) Checksum: This 8 bit
field contains checksum to
detect errors in header.
3. Data: This field can be 0 to
2744 bits long. It contains
data or control information
coming from upper layers

More Related Content

What's hot

UNIT -03 Transmission Media and Connecting Devices
UNIT -03 Transmission Media and Connecting Devices UNIT -03 Transmission Media and Connecting Devices
UNIT -03 Transmission Media and Connecting Devices Raj vardhan
 
Dc lec-02 (networks)
Dc lec-02 (networks)Dc lec-02 (networks)
Dc lec-02 (networks)diaryinc
 
Computer network (Lecture 1)
Computer network (Lecture 1)Computer network (Lecture 1)
Computer network (Lecture 1)Vishwajit Nandi
 
Network Connecting Devices UNIT 5
Network Connecting Devices UNIT 5Network Connecting Devices UNIT 5
Network Connecting Devices UNIT 5Raj vardhan
 
20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks 20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks Kathirvel Ayyaswamy
 
types of computer networks, protocols and standards
types of computer networks, protocols and standardstypes of computer networks, protocols and standards
types of computer networks, protocols and standardsMidhun Menon
 
Ec8004 wireless networks unit 1 hiperlan 2
Ec8004 wireless networks unit 1 hiperlan 2Ec8004 wireless networks unit 1 hiperlan 2
Ec8004 wireless networks unit 1 hiperlan 2HemalathaR31
 
Categorize computer networks
Categorize computer networksCategorize computer networks
Categorize computer networksmyrajendra
 
Concept of networking
Concept of networkingConcept of networking
Concept of networkingsumit dimri
 
Networking Related
Networking RelatedNetworking Related
Networking RelatedZunAib Ali
 
Introduction to mobile ad hoc network (m.a.net)
Introduction to mobile ad hoc network (m.a.net)Introduction to mobile ad hoc network (m.a.net)
Introduction to mobile ad hoc network (m.a.net)Sohebuzzaman Khan
 
20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks 20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks Kathirvel Ayyaswamy
 
Chapter06 -- topologies and access methods
Chapter06  -- topologies and access methodsChapter06  -- topologies and access methods
Chapter06 -- topologies and access methodsRaja Waseem Akhtar
 

What's hot (20)

UNIT -03 Transmission Media and Connecting Devices
UNIT -03 Transmission Media and Connecting Devices UNIT -03 Transmission Media and Connecting Devices
UNIT -03 Transmission Media and Connecting Devices
 
Dc lec-02 (networks)
Dc lec-02 (networks)Dc lec-02 (networks)
Dc lec-02 (networks)
 
Wireless Local Area Network
Wireless Local Area NetworkWireless Local Area Network
Wireless Local Area Network
 
Networking Technologies : Introduction to data flow
Networking Technologies : Introduction to data flowNetworking Technologies : Introduction to data flow
Networking Technologies : Introduction to data flow
 
Mc wireless lan
Mc wireless lanMc wireless lan
Mc wireless lan
 
Networking HMT-1
Networking HMT-1Networking HMT-1
Networking HMT-1
 
Computer network (Lecture 1)
Computer network (Lecture 1)Computer network (Lecture 1)
Computer network (Lecture 1)
 
Network Connecting Devices UNIT 5
Network Connecting Devices UNIT 5Network Connecting Devices UNIT 5
Network Connecting Devices UNIT 5
 
Switching
SwitchingSwitching
Switching
 
20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks 20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks
 
1.lan man wan
1.lan man wan1.lan man wan
1.lan man wan
 
types of computer networks, protocols and standards
types of computer networks, protocols and standardstypes of computer networks, protocols and standards
types of computer networks, protocols and standards
 
HIGH SPEED NETWORKS
HIGH SPEED NETWORKSHIGH SPEED NETWORKS
HIGH SPEED NETWORKS
 
Ec8004 wireless networks unit 1 hiperlan 2
Ec8004 wireless networks unit 1 hiperlan 2Ec8004 wireless networks unit 1 hiperlan 2
Ec8004 wireless networks unit 1 hiperlan 2
 
Categorize computer networks
Categorize computer networksCategorize computer networks
Categorize computer networks
 
Concept of networking
Concept of networkingConcept of networking
Concept of networking
 
Networking Related
Networking RelatedNetworking Related
Networking Related
 
Introduction to mobile ad hoc network (m.a.net)
Introduction to mobile ad hoc network (m.a.net)Introduction to mobile ad hoc network (m.a.net)
Introduction to mobile ad hoc network (m.a.net)
 
20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks 20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks
 
Chapter06 -- topologies and access methods
Chapter06  -- topologies and access methodsChapter06  -- topologies and access methods
Chapter06 -- topologies and access methods
 

Similar to Cn blue tooth

AWMN Advances Wireless UNIT-1 Blue_Tooth.pptx
AWMN Advances Wireless UNIT-1 Blue_Tooth.pptxAWMN Advances Wireless UNIT-1 Blue_Tooth.pptx
AWMN Advances Wireless UNIT-1 Blue_Tooth.pptxshashijntuhceh
 
bluetooth protocol stack.pptx
bluetooth protocol stack.pptxbluetooth protocol stack.pptx
bluetooth protocol stack.pptxJJospinJeya
 
SYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdf
SYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdfSYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdf
SYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdfshubhangisonawane6
 
01 coms 525 tcpip - networking concepts review
01   coms 525 tcpip - networking concepts review01   coms 525 tcpip - networking concepts review
01 coms 525 tcpip - networking concepts reviewPalanivel Kuppusamy
 
How to get Hardware and Networking jobs in Delhi
How to get Hardware and Networking jobs in DelhiHow to get Hardware and Networking jobs in Delhi
How to get Hardware and Networking jobs in DelhiSilicon Univ
 
Computer networks basic network_hardware_1
Computer networks basic network_hardware_1Computer networks basic network_hardware_1
Computer networks basic network_hardware_1Aneesh Nelavelly
 
INFORMATION PRACTICES CBSE CLASS 12 UNIT 3
INFORMATION PRACTICES CBSE CLASS 12 UNIT 3INFORMATION PRACTICES CBSE CLASS 12 UNIT 3
INFORMATION PRACTICES CBSE CLASS 12 UNIT 3NIMISHMUTYAPU
 
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...Soumen Santra
 
Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)
Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)
Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)Tutun Juhana
 
wifi-technology
 wifi-technology wifi-technology
wifi-technologytardeep
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardwareMziaulla
 
Cyber security training at ist apr-18
Cyber security training at ist apr-18Cyber security training at ist apr-18
Cyber security training at ist apr-18Sagar Walvekar
 

Similar to Cn blue tooth (20)

AWMN Advances Wireless UNIT-1 Blue_Tooth.pptx
AWMN Advances Wireless UNIT-1 Blue_Tooth.pptxAWMN Advances Wireless UNIT-1 Blue_Tooth.pptx
AWMN Advances Wireless UNIT-1 Blue_Tooth.pptx
 
bluetooth protocol stack.pptx
bluetooth protocol stack.pptxbluetooth protocol stack.pptx
bluetooth protocol stack.pptx
 
IoT Network Technologies
IoT Network TechnologiesIoT Network Technologies
IoT Network Technologies
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
SYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdf
SYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdfSYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdf
SYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdf
 
01 coms 525 tcpip - networking concepts review
01   coms 525 tcpip - networking concepts review01   coms 525 tcpip - networking concepts review
01 coms 525 tcpip - networking concepts review
 
How to get Hardware and Networking jobs in Delhi
How to get Hardware and Networking jobs in DelhiHow to get Hardware and Networking jobs in Delhi
How to get Hardware and Networking jobs in Delhi
 
Computer networks basic network_hardware_1
Computer networks basic network_hardware_1Computer networks basic network_hardware_1
Computer networks basic network_hardware_1
 
INFORMATION PRACTICES CBSE CLASS 12 UNIT 3
INFORMATION PRACTICES CBSE CLASS 12 UNIT 3INFORMATION PRACTICES CBSE CLASS 12 UNIT 3
INFORMATION PRACTICES CBSE CLASS 12 UNIT 3
 
Network protocol
Network protocolNetwork protocol
Network protocol
 
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
 
Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)
Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)
Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)
 
Blue tooth
Blue toothBlue tooth
Blue tooth
 
wifi-technology
 wifi-technology wifi-technology
wifi-technology
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardware
 
Cct203 lesson 10
Cct203 lesson 10Cct203 lesson 10
Cct203 lesson 10
 
Unit 2B.pdf
Unit 2B.pdfUnit 2B.pdf
Unit 2B.pdf
 
LAN TECHNOLOGLES
 LAN TECHNOLOGLES LAN TECHNOLOGLES
LAN TECHNOLOGLES
 
Cyber security training at ist apr-18
Cyber security training at ist apr-18Cyber security training at ist apr-18
Cyber security training at ist apr-18
 

More from SangeethaSasi1 (20)

L4 multiplexing & multiple access 16
L4 multiplexing & multiple access 16L4 multiplexing & multiple access 16
L4 multiplexing & multiple access 16
 
Image processing using matlab
Image processing using matlab Image processing using matlab
Image processing using matlab
 
Mc ppt
Mc pptMc ppt
Mc ppt
 
Mc ppt
Mc pptMc ppt
Mc ppt
 
Dip pppt
Dip ppptDip pppt
Dip pppt
 
Web techh
Web techhWeb techh
Web techh
 
Web tech
Web techWeb tech
Web tech
 
Vani wt
Vani wtVani wt
Vani wt
 
Vani dbms
Vani dbmsVani dbms
Vani dbms
 
Hema wt (1)
Hema wt (1)Hema wt (1)
Hema wt (1)
 
Hema rdbms
Hema rdbmsHema rdbms
Hema rdbms
 
Web tech
Web techWeb tech
Web tech
 
Web tech
Web techWeb tech
Web tech
 
Dbms
DbmsDbms
Dbms
 
Vani
VaniVani
Vani
 
Hema se
Hema seHema se
Hema se
 
Software
SoftwareSoftware
Software
 
Operating system
Operating systemOperating system
Operating system
 
Dataminng
DataminngDataminng
Dataminng
 
System calls
System callsSystem calls
System calls
 

Recently uploaded

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 

Recently uploaded (20)

Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 

Cn blue tooth

  • 2. BLUE TOOTH •Bluetooth is, with the infrared, one of the major wireless technologies developed to achieve WPAN. •Bluetooth is a wireless LAN technology used to connect devices of different functions such as telephones, computers (laptop or desktop), notebooks, cameras, printers and so on.
  • 3. USES: 1.It is used for providing communication between peripheral devices like wireless mouse or keyboard with the computer. 2. It is used by modern healthcare devices to send signals to
  • 4. 3. It is used by modern communicating devices like mobile phone, PDAs, palmtops etc to transfer data rapidly. 4. It is used for dial up networking. Thus allowing a notebook computer to call via a mobile phone. 5. It is used for cordless
  • 5. Bluetooth Architecture: Bluetooth architecture defines two types of networks: Piconet Scattemet
  • 6. 1. Piconet: • piconet can have upto eight active nodes (1 master and 7 slaves) or stations within the distance of 10 meters. • There can be only one primary or master station in each piconet. • The communication between the primary and the secondary can be one- to-one or one-to-many.
  • 7.
  • 8. •All communication is between master and a slave. Salve-slave communication is not possible. • In addition to seven active slave station, a piconet can have upto 255 parked nodes. These parked nodes are secondary or slave stations and cannot take part in communication until it is moved from parked state to active state.
  • 9. 2. Scatternet: • A slave in one piconet can act as a master or primary in other piconet. • Such a station or node can receive messages from the master in the first piconet and deliver the message to its slaves in other piconet where it is acting as master. This node is also called bridge slave.
  • 10.
  • 12. Radio Layer •The Bluetooth radio layer corresponds to the physical layer of OSI model. • It deals with ratio transmission and modulation. • The radio layer moves data from master to slave or vice versa.
  • 13. • It is a low power system that uses 2.4 GHz ISM band in a range of 10 meters. • This band is divided into 79 channels of 1MHz each. Bluetooth uses the Frequency Hopping Spread Spectrum (FHSS) method in the physical layer to avoid interference from other devices or networks.
  • 14. Baseband Layer • Baseband layer is equivalent to the MAC sublayer in LANs. • Bluetooth uses a form of TDMA called TDD-TDMA (time division duplex TDMA).
  • 15. • The master in each piconet defines the time slot of 625 µsec. • In TDD- TDMA, communication is half duplex in which receiver can send and receive data but not at the same time.
  • 16. 1. Asynchronous Connection-less (ACL • It is used for packet switched data that is available at irregular intervals. • ACL delivers traffic on a best effort basis. Frames can be lost & may have to be retransmitted.
  • 17. 2. Synchronous Connection Oriented (SCO) • sco is used for real time data such as sound. It is used where fast delivery is preferred over accurate delivery. • In an sco link, a physical link is created between the master and slave by reserving specific slots at regular intervals. .
  • 18. Logical Link, Control Adaptation Protocol Layer (L2CAP) • The logical unit link control adaptation protocol is equivalent to logical link control sublayer of LAN. • The ACL link uses L2CAP for data exchange but sco channel does not use it.
  • 19. 1. Segmentation and reassembly • L2CAP receives the packets of upto 64 KB from upper layers and divides them into frames for transmission. • It adds extra information to define the location of frame in the original packet. • The L2CAP reassembles the frame into packets again at the destination.
  • 20. 2. Multiplexing • L2CAP performs multiplexing at sender side and demultiplexing at receiver side. • At the sender site, it accepts data from one of the upper layer protocols frames them and deliver them to the Baseband layer.
  • 21. 3. Quality of Service (QOS) • L2CAP handles quality of service requirements, both when links are established and during normal operation. • It also enables the devices to negotiate the maximum payload size during connection establishment.
  • 22. Bluetooth Frame Format The various fields of blue tooth frame format are:
  • 23. 1. Access Code: It is 72 bit field that contains synchronization bits. It identifies the master. 2. Header: This is 54-bit field. It contain 18 bit pattern that is repeated for 3 time. The header field contains following subfields:
  • 24. (i) Address: This 3 bit field can define upto seven slaves (1 to 7). If the address is zero, it is used for broadcast communication from primary to all secondaries. (ii)Type: This 4 bit field identifies the type of data coming from upper layers.
  • 25. (iii) F: This flow bit is used for flow control. When set to 1, it means the device is unable to receive more frames. (iv) A: This bit is used for acknowledgement. (v) S: This bit contains a sequence number of the frame to detect retransmission.
  • 26. (vi) Checksum: This 8 bit field contains checksum to detect errors in header. 3. Data: This field can be 0 to 2744 bits long. It contains data or control information coming from upper layers