SlideShare a Scribd company logo
1 of 7
Prof. Neeraj Bhargava
Pramod Singh Rathore
Department of Computer Science
School of Engineering & System Sciences,
MDS University Ajmer, Rajasthan, India
1
 specification protocol stack
 Bluetooth Radio
 Baseband
 LMP (Link Manager Protocol)
 HCI (Host Controller Interface)
 L2CAP (Logical Link Control and Adaptation
Protocol)
 RFCOMM (Radio Frequency Communication)
 SDP (Service Discovery Protocol)
 the physical layer of the Bluetooth that provides
◦ Error correction
◦ Flow control
◦ Hopping sequence
◦ Security
 hopping through 79 channels
 data is divided in packets
◦ access code: e.g. timing synchronization
◦ header: e.g. packet numbering, flow control, slave
address
◦ payload: voice, data or both
 Connection Modes
describes the set of rules by which all bluetooth devices must
abide in order to establish a link a communicate with one another
◦ STANDBY : not connected in a piconet
◦ ACTIVE : active participation on the channel
◦ Power Saving Modes
 SNIFF : slave listens to the channel at a reduced rate (decreasing of
duty cycle ) least power efficient
 HOLD : data transfer is held for a specific time period, medium power
efficient
 PARK : synchronized to the piconet but does not participate in traffic
 Security Modes
◦ non-secure
◦ encryption enforced by application layer
◦ encryption enforced by link layer
◦ For devices
 trusted device
 untrusted device
◦ For services
 require authorization and authentication
 require authentication
 open to all devices
18.protocol interaction with layers

More Related Content

What's hot

EE552SDNAunAhsan57371357
EE552SDNAunAhsan57371357EE552SDNAunAhsan57371357
EE552SDNAunAhsan57371357Aun Ahsan
 
Tutorial on IEEE 802.11 - MAC Protocols and Frames
Tutorial on IEEE 802.11 - MAC Protocols and FramesTutorial on IEEE 802.11 - MAC Protocols and Frames
Tutorial on IEEE 802.11 - MAC Protocols and FramesDheryta Jaisinghani
 
Presentation of the IEEE 802.11a MAC Layer
Presentation of the IEEE 802.11a MAC LayerPresentation of the IEEE 802.11a MAC Layer
Presentation of the IEEE 802.11a MAC LayerMahdi Ahmed Jama
 
Multi-hop backscatter Tag-to-Tag Networks
Multi-hop backscatter Tag-to-Tag Networks Multi-hop backscatter Tag-to-Tag Networks
Multi-hop backscatter Tag-to-Tag Networks Amjed Majid
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...
A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...
A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...Tal Lavian Ph.D.
 
WIRELESS NETWORKS EC6802 BABU unit 1 & 2 PPT
WIRELESS NETWORKS EC6802 BABU unit 1 & 2 PPTWIRELESS NETWORKS EC6802 BABU unit 1 & 2 PPT
WIRELESS NETWORKS EC6802 BABU unit 1 & 2 PPTbabuece
 
IRJET- Secured LAN Network Topology of a Small Office with Redundancy
IRJET-  	  Secured LAN Network Topology of a Small Office with RedundancyIRJET-  	  Secured LAN Network Topology of a Small Office with Redundancy
IRJET- Secured LAN Network Topology of a Small Office with RedundancyIRJET Journal
 
Introduction to ss7
Introduction to ss7Introduction to ss7
Introduction to ss7Abdul Nasir
 

What's hot (20)

Openflow Protocol
Openflow ProtocolOpenflow Protocol
Openflow Protocol
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
 
Data link layer
Data link layerData link layer
Data link layer
 
EE552SDNAunAhsan57371357
EE552SDNAunAhsan57371357EE552SDNAunAhsan57371357
EE552SDNAunAhsan57371357
 
final14-4
final14-4final14-4
final14-4
 
Tutorial on IEEE 802.11 - MAC Protocols and Frames
Tutorial on IEEE 802.11 - MAC Protocols and FramesTutorial on IEEE 802.11 - MAC Protocols and Frames
Tutorial on IEEE 802.11 - MAC Protocols and Frames
 
Presentation of the IEEE 802.11a MAC Layer
Presentation of the IEEE 802.11a MAC LayerPresentation of the IEEE 802.11a MAC Layer
Presentation of the IEEE 802.11a MAC Layer
 
Multi-hop backscatter Tag-to-Tag Networks
Multi-hop backscatter Tag-to-Tag Networks Multi-hop backscatter Tag-to-Tag Networks
Multi-hop backscatter Tag-to-Tag Networks
 
Transport Layer
Transport LayerTransport Layer
Transport Layer
 
Lec21 22
Lec21 22Lec21 22
Lec21 22
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Chapter#14
Chapter#14Chapter#14
Chapter#14
 
Vrajesh parikh handoff_presentation1
Vrajesh parikh handoff_presentation1Vrajesh parikh handoff_presentation1
Vrajesh parikh handoff_presentation1
 
bluetooth
bluetooth bluetooth
bluetooth
 
SOFTWARE DEFINED NETWORKING
SOFTWARE DEFINED NETWORKINGSOFTWARE DEFINED NETWORKING
SOFTWARE DEFINED NETWORKING
 
A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...
A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...
A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...
 
Mac 802.11
Mac 802.11Mac 802.11
Mac 802.11
 
WIRELESS NETWORKS EC6802 BABU unit 1 & 2 PPT
WIRELESS NETWORKS EC6802 BABU unit 1 & 2 PPTWIRELESS NETWORKS EC6802 BABU unit 1 & 2 PPT
WIRELESS NETWORKS EC6802 BABU unit 1 & 2 PPT
 
IRJET- Secured LAN Network Topology of a Small Office with Redundancy
IRJET-  	  Secured LAN Network Topology of a Small Office with RedundancyIRJET-  	  Secured LAN Network Topology of a Small Office with Redundancy
IRJET- Secured LAN Network Topology of a Small Office with Redundancy
 
Introduction to ss7
Introduction to ss7Introduction to ss7
Introduction to ss7
 

Similar to 18.protocol interaction with layers

Wireless Personal Area Networks
Wireless Personal Area NetworksWireless Personal Area Networks
Wireless Personal Area NetworksDilum Bandara
 
bluetooth protocol stack.pptx
bluetooth protocol stack.pptxbluetooth protocol stack.pptx
bluetooth protocol stack.pptxJJospinJeya
 
Bluetooth Power point presentation
Bluetooth Power point presentationBluetooth Power point presentation
Bluetooth Power point presentationjogiparthyramya
 
SYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdf
SYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdfSYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdf
SYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdfshubhangisonawane6
 
Bluetooth mobileip
Bluetooth mobileipBluetooth mobileip
Bluetooth mobileipRamya Sasi
 
HDLC and Point to point protocol
HDLC and Point to point protocolHDLC and Point to point protocol
HDLC and Point to point protocolKinza Razzaq
 
10.connection establishement procedure
10.connection establishement procedure10.connection establishement procedure
10.connection establishement procedurePramod Rathore
 
Physical And Data Link Layers
Physical And Data Link LayersPhysical And Data Link Layers
Physical And Data Link Layerstmavroidis
 
Other types of networks: Bluetooth, Zigbee, & NFC
Other types of networks: Bluetooth, Zigbee, & NFCOther types of networks: Bluetooth, Zigbee, & NFC
Other types of networks: Bluetooth, Zigbee, & NFCDilum Bandara
 
Verification Strategy for PCI-Express
Verification Strategy for PCI-ExpressVerification Strategy for PCI-Express
Verification Strategy for PCI-ExpressDVClub
 
CISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network FundamentalCISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network FundamentalKarthikeyan Dhayalan
 

Similar to 18.protocol interaction with layers (20)

Wireless Personal Area Networks
Wireless Personal Area NetworksWireless Personal Area Networks
Wireless Personal Area Networks
 
OSI layers
OSI layersOSI layers
OSI layers
 
Bluetooth mobileip
Bluetooth mobileipBluetooth mobileip
Bluetooth mobileip
 
Bluetooth 1
Bluetooth 1Bluetooth 1
Bluetooth 1
 
bluetooth protocol stack.pptx
bluetooth protocol stack.pptxbluetooth protocol stack.pptx
bluetooth protocol stack.pptx
 
Bluetooth Power point presentation
Bluetooth Power point presentationBluetooth Power point presentation
Bluetooth Power point presentation
 
SYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdf
SYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdfSYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdf
SYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdf
 
Bluetooth mobileip
Bluetooth mobileipBluetooth mobileip
Bluetooth mobileip
 
HDLC and Point to point protocol
HDLC and Point to point protocolHDLC and Point to point protocol
HDLC and Point to point protocol
 
Presentation
PresentationPresentation
Presentation
 
10.connection establishement procedure
10.connection establishement procedure10.connection establishement procedure
10.connection establishement procedure
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Physical And Data Link Layers
Physical And Data Link LayersPhysical And Data Link Layers
Physical And Data Link Layers
 
Other types of networks: Bluetooth, Zigbee, & NFC
Other types of networks: Bluetooth, Zigbee, & NFCOther types of networks: Bluetooth, Zigbee, & NFC
Other types of networks: Bluetooth, Zigbee, & NFC
 
BLE短講
BLE短講BLE短講
BLE短講
 
Verification Strategy for PCI-Express
Verification Strategy for PCI-ExpressVerification Strategy for PCI-Express
Verification Strategy for PCI-Express
 
Ch4
Ch4Ch4
Ch4
 
CISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network FundamentalCISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network Fundamental
 
Bluetooth1
Bluetooth1Bluetooth1
Bluetooth1
 
Bluetooth
BluetoothBluetooth
Bluetooth
 

More from Pramod Rathore

Restoration by spatial filtering
Restoration by spatial filteringRestoration by spatial filtering
Restoration by spatial filteringPramod Rathore
 
Image enhancement in frequency domain
Image enhancement in frequency domainImage enhancement in frequency domain
Image enhancement in frequency domainPramod Rathore
 
Image enhancement in fourier transform part ii
Image enhancement in fourier transform  part iiImage enhancement in fourier transform  part ii
Image enhancement in fourier transform part iiPramod Rathore
 
Image enhancement in fourier transform
Image enhancement in fourier transformImage enhancement in fourier transform
Image enhancement in fourier transformPramod Rathore
 
How to handling strings in r
How to handling strings in rHow to handling strings in r
How to handling strings in rPramod Rathore
 
Smoothing spatial filtering
Smoothing spatial filteringSmoothing spatial filtering
Smoothing spatial filteringPramod Rathore
 
6.histogram processing
6.histogram processing6.histogram processing
6.histogram processingPramod Rathore
 
5.image enhancement in spatial domain copy - copy
5.image enhancement in spatial domain   copy - copy5.image enhancement in spatial domain   copy - copy
5.image enhancement in spatial domain copy - copyPramod Rathore
 
4.image enhancement in spatial domain copy
4.image enhancement in spatial domain   copy4.image enhancement in spatial domain   copy
4.image enhancement in spatial domain copyPramod Rathore
 
Issues in machine learning
Issues in machine learningIssues in machine learning
Issues in machine learningPramod Rathore
 
Image enhancement in spatial domain
Image enhancement in spatial domainImage enhancement in spatial domain
Image enhancement in spatial domainPramod Rathore
 

More from Pramod Rathore (20)

Restoration by spatial filtering
Restoration by spatial filteringRestoration by spatial filtering
Restoration by spatial filtering
 
Image restoration
Image restorationImage restoration
Image restoration
 
Homomorphic filtering
Homomorphic filteringHomomorphic filtering
Homomorphic filtering
 
Sharpening filtering
Sharpening filteringSharpening filtering
Sharpening filtering
 
Image enhancement in frequency domain
Image enhancement in frequency domainImage enhancement in frequency domain
Image enhancement in frequency domain
 
Image enhancement in fourier transform part ii
Image enhancement in fourier transform  part iiImage enhancement in fourier transform  part ii
Image enhancement in fourier transform part ii
 
Image enhancement in fourier transform
Image enhancement in fourier transformImage enhancement in fourier transform
Image enhancement in fourier transform
 
Control statements
Control statementsControl statements
Control statements
 
Basic image operation
Basic image operationBasic image operation
Basic image operation
 
How to handling strings in r
How to handling strings in rHow to handling strings in r
How to handling strings in r
 
Smoothing spatial filtering
Smoothing spatial filteringSmoothing spatial filtering
Smoothing spatial filtering
 
Handle list in r
Handle list in rHandle list in r
Handle list in r
 
Spatial filtering
Spatial filteringSpatial filtering
Spatial filtering
 
Data types in r
Data types in rData types in r
Data types in r
 
6.histogram processing
6.histogram processing6.histogram processing
6.histogram processing
 
5.image enhancement in spatial domain copy - copy
5.image enhancement in spatial domain   copy - copy5.image enhancement in spatial domain   copy - copy
5.image enhancement in spatial domain copy - copy
 
4.image enhancement in spatial domain copy
4.image enhancement in spatial domain   copy4.image enhancement in spatial domain   copy
4.image enhancement in spatial domain copy
 
Issues in machine learning
Issues in machine learningIssues in machine learning
Issues in machine learning
 
R programming
R programmingR programming
R programming
 
Image enhancement in spatial domain
Image enhancement in spatial domainImage enhancement in spatial domain
Image enhancement in spatial domain
 

Recently uploaded

UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 

Recently uploaded (20)

UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 

18.protocol interaction with layers

  • 1. Prof. Neeraj Bhargava Pramod Singh Rathore Department of Computer Science School of Engineering & System Sciences, MDS University Ajmer, Rajasthan, India 1
  • 3.  Bluetooth Radio  Baseband  LMP (Link Manager Protocol)  HCI (Host Controller Interface)  L2CAP (Logical Link Control and Adaptation Protocol)  RFCOMM (Radio Frequency Communication)  SDP (Service Discovery Protocol)
  • 4.  the physical layer of the Bluetooth that provides ◦ Error correction ◦ Flow control ◦ Hopping sequence ◦ Security  hopping through 79 channels  data is divided in packets ◦ access code: e.g. timing synchronization ◦ header: e.g. packet numbering, flow control, slave address ◦ payload: voice, data or both
  • 5.  Connection Modes describes the set of rules by which all bluetooth devices must abide in order to establish a link a communicate with one another ◦ STANDBY : not connected in a piconet ◦ ACTIVE : active participation on the channel ◦ Power Saving Modes  SNIFF : slave listens to the channel at a reduced rate (decreasing of duty cycle ) least power efficient  HOLD : data transfer is held for a specific time period, medium power efficient  PARK : synchronized to the piconet but does not participate in traffic
  • 6.  Security Modes ◦ non-secure ◦ encryption enforced by application layer ◦ encryption enforced by link layer ◦ For devices  trusted device  untrusted device ◦ For services  require authorization and authentication  require authentication  open to all devices