Key Learning Points Of Bluetooth
Bluetooth is easily the best in wireless handheld technology. When it comes to learning, Bluetooth can get quite complicated. To help you, you'll find the key learning points of Bluetooth below: 1. Bluetooth is an energy efficient, low overhead communication protocol that's ideal for interdevice communications. 2. Unlike infrared, Bluetooth doesn't require a line of sight.
3. Depending on the implementation, Bluetooth can have a range of up to 100 meters. 4. The specification of Bluetooth consists of a Foundation Profile Document and a Foundation Core Document. 5.
The protocol stack for Bluetooth consists of core protocols, cable protocols, and even adapted protocols. 6. The transmitter operates around the 2.4 GHz frequency band. 7. The data channel will change frequency, or hops, 1,600 times in a second, between the 79 allocated channels in the ISM band. 8. Bluetooth utilizes a spread spectrum frequency hopping RF characteristic to ensure that independant networking operates when the other devices are in range. 9. A piconet is formed when one or more devices open up a channel of communication.
10. A piconet can have a master and up to seven slaves. 11. Communication of the interdevice is based on the concepts of channels. 12. All Bluetooth devices are capable of transmitting voice. 13. The channel has a total capacity of 1 MB per second. 14. There are two types of channels with Bluetooth - SCO (Synchronous Connection Oriented) and ACL (Asynchronous Connectionless).
15. The SCO channels are time oriented, and are therefore primarily used for transferring time critical data such as voice. 16. ACL channels are normally used for communicating data. 17. Data contained in a packet can be up to 2,745 bits in length. 18. In a single piconet, there can be up to three SCO links containing 64,000 bits a second each. 19. To avoid collision and timing problems, SCO links are reserved slots that are set up by the master.
20. The masters can support up to three SCO links with either one, two, or three slaves. 21. The slots that aren't reserved for SCO links can be used as ACL links. 22. The LMP (Link Management Protocol) will handle link level security, error corrections, and the establishment of communications links. 23. The LMP packets will have priority over user packets that originate and form the L2CAP layer. 24.
Apple Products Articles
Apple Products Books