Bluetooth Demystified / Edition 1 available in Paperback
- ISBN-10:
- 0071363238
- ISBN-13:
- 9780071363235
- Pub. Date:
- 09/08/2000
- Publisher:
- McGraw-Hill Professional Publishing
- ISBN-10:
- 0071363238
- ISBN-13:
- 9780071363235
- Pub. Date:
- 09/08/2000
- Publisher:
- McGraw-Hill Professional Publishing
Paperback
Buy New
$61.00Buy Used
$41.21-
PICK UP IN STORE
Your local store may have stock of this item.
Available within 2 business hours
-
SHIP THIS ITEM
Temporarily Out of Stock Online
Please check back later for updated availability.
Overview
Product Details
ISBN-13: | 9780071363235 |
---|---|
Publisher: | McGraw-Hill Professional Publishing |
Publication date: | 09/08/2000 |
Series: | Demystified |
Pages: | 416 |
Product dimensions: | 7.53(w) x 9.32(h) x 0.92(d) |
About the Author
Nathan J. Muller (Huntsville, AL) is a consultant who specializes in telecommunications. He has written 1500 articles for nearly 50 magazines and 14 other books, including The Totally Wired Web Toolkit.
Table of Contents
Preface | xv | |
1 | The Case for Bluetooth | 1 |
What About Infrared? | 2 | |
Infrared and Bluetooth? | 3 | |
Speed Differential | 4 | |
Wireless to Wireline | 4 | |
Dialup to the Internet | 5 | |
How About Wireless Lans? | 6 | |
HomeRF Networks | 8 | |
Bluetooth Advantage | 13 | |
Origin of Bluetooth | 14 | |
What's With the Name? | 15 | |
Bluetooth Technology | 16 | |
Types of Links | 17 | |
Ad Hoc Networking | 17 | |
Voice over Bluetooth | 18 | |
Video over Bluetooth | 19 | |
Radio Link | 21 | |
Interference | 21 | |
Safety | 22 | |
Personal Area Networks | 22 | |
Bluetooth Topology | 23 | |
Security | 25 | |
What Can You Do With Bluetooth? | 26 | |
Presentations | 26 | |
Card Scanning | 27 | |
Collaboration | 27 | |
Synchronizing Data | 27 | |
Remote Synchronization | 28 | |
Printing | 28 | |
In-Car Systems | 29 | |
Communicator Platforms | 29 | |
Electronic Books | 30 | |
Travel | 31 | |
Home Entertainment | 32 | |
Payment Systems | 32 | |
Scanners | 33 | |
Behavior Enforcement | 34 | |
Mobile E-commerce | 34 | |
Java and Bluetooth | 37 | |
Jini and Bluetooth | 38 | |
Other Connectivity Solutions | 40 | |
JetSend | 40 | |
HAVi | 41 | |
Global 3G Wireless Framework | 42 | |
Problems with Bluetooth | 44 | |
Bluetooth Qualification Program | 45 | |
Market for Bluetooth | 45 | |
Summary | 46 | |
2 | Basic Concepts | 49 |
Serial versus Parallel | 50 | |
Serial Transmission | 51 | |
Parallel Transmission | 51 | |
Asynchronous versus Synchronous | 53 | |
Asynchronous | 54 | |
Synchronous | 57 | |
Spread Spectrum | 60 | |
Spreading | 62 | |
Direct Sequence | 64 | |
Frequency Hopping | 65 | |
Circuit and Packet Switching | 66 | |
Time Division Duplexing | 68 | |
Physical Links | 74 | |
SCO Links | 74 | |
ACL Links | 75 | |
Peeking into Packets | 75 | |
Bluetooth Packets | 77 | |
Access Code | 77 | |
Header | 79 | |
Payload | 81 | |
Logical Channels | 82 | |
Client-Server Architecture | 83 | |
Architectural Model | 83 | |
Service Discovery | 86 | |
Summary | 88 | |
3 | Bluetooth Protocol Architecture | 89 |
What Are Protocols? | 90 | |
Open Systems Interconnection | 91 | |
Application Layer | 92 | |
Presentation Layer | 94 | |
Session Layer | 95 | |
Transport Layer | 96 | |
Network Layer | 97 | |
Data-Link Layer | 98 | |
Physical Layer | 99 | |
Bluetooth Protocol Stack | 101 | |
Bluetooth Core Protocols | 103 | |
Baseband | 104 | |
Link Manager Protocol (LMP) | 104 | |
Logical Link Control and Adaptation Protocol | 105 | |
Service Discovery Protocol (SDP) | 105 | |
Cable Replacement Protocols | 105 | |
RFCOMM | 105 | |
Telephony Control Protocols | 107 | |
Adopted Protocols | 107 | |
PPP | 107 | |
TCP/UDP/IP | 108 | |
OBEX Protocol | 110 | |
Wireless Application Protocol (WAP) | 111 | |
WAP Applications Environment (WAE) | 113 | |
Content Formats | 116 | |
Usage Models and Profiles | 118 | |
Summary | 120 | |
4 | Link Management | 121 |
Types of PDUs | 123 | |
General Response Messages | 127 | |
Authentication | 127 | |
Pairing | 128 | |
Changing the Link Key | 129 | |
Changing the Current Link Key | 130 | |
Changing a Temporary Link Key | 130 | |
Encryption | 131 | |
Clock Offset Request | 133 | |
Slot Offset Information | 133 | |
Timing Accuracy Information Request | 134 | |
LMP Version | 134 | |
Supported Features | 136 | |
Switching of Master-Slave Role | 136 | |
Name Request | 137 | |
Detach | 137 | |
Hold Mode | 137 | |
Sniff Mode | 138 | |
Park Mode | 139 | |
Power Control | 140 | |
Channel Quality-Driven Change of Data Rate | 141 | |
Quality of Service (QoS) | 142 | |
SCO Links | 143 | |
Control of Multi-Slot Packets | 144 | |
Paging Scheme | 145 | |
Link Supervision | 146 | |
Connection Establishment | 146 | |
Test Modes | 147 | |
Error Handling | 147 | |
Summary | 148 | |
5 | Logical Link Control | 149 |
L2CAP Functions | 151 | |
Basic Operation | 152 | |
Channel Identifiers | 153 | |
Segmentation and Reassembly | 154 | |
State Machine | 155 | |
Events | 157 | |
Actions | 161 | |
Channel Operational States | 163 | |
Mapping Events to Actions | 164 | |
Data Packet Format | 168 | |
Connection-Oriented Channel | 168 | |
Connectionless Data Channel | 169 | |
Signaling | 170 | |
Packet Structure | 170 | |
Signaling Commands | 171 | |
Configuration Parameter Options | 173 | |
Packet Structure | 173 | |
Options | 174 | |
Configuration Process | 175 | |
Service Primitives | 176 | |
Event Indication | 176 | |
Connect | 176 | |
Connect Response | 177 | |
Configure | 177 | |
Configuration Response | 177 | |
Disconnect | 177 | |
Write | 177 | |
Read | 178 | |
Group Create | 178 | |
Group Close | 178 | |
Group Add Member | 178 | |
Group Remove Member | 178 | |
Get Group Membership | 179 | |
Ping | 179 | |
Get Info | 179 | |
Disable Connectionless Traffic | 179 | |
Enable Connectionless Traffic | 179 | |
Summary | 179 | |
6 | Bluetooth General Profiles | 181 |
Generic Access Profile | 182 | |
Common Parameters | 184 | |
Idle Mode Procedures | 186 | |
Bonding | 187 | |
Establishment Procedures | 188 | |
Serial Port Profile | 190 | |
Application-Level Procedures | 191 | |
Power Mode and Link Loss Handling | 193 | |
RS-232 Control Signals | 193 | |
L2CAP Interoperability Requirements | 194 | |
SDP Interoperability Requirements | 195 | |
Link Manager Interoperability Requirements | 195 | |
Service Discovery Application Profile | 196 | |
Client and Server Roles | 197 | |
Pairing | 199 | |
Service Discovery Application | 200 | |
Message Sequence | 202 | |
Service Discovery | 202 | |
Signaling | 203 | |
Configuration Options | 204 | |
SDP Transactions and L2CAP Connections | 204 | |
Link Manager | 206 | |
Link Control | 208 | |
Generic Object Exchange Profile (GOEP) | 210 | |
Profile Stack | 211 | |
Server and Client | 211 | |
Profile Basics | 212 | |
Features | 213 | |
OBEX Operations | 213 | |
Summary | 214 | |
7 | Bluetooth Profiles for Usage Models | 217 |
Intercom Profile | 218 | |
Call Procedures | 221 | |
Message Summary | 223 | |
Call Failure | 223 | |
Cordless Telephony Profile | 225 | |
Device Roles | 226 | |
Typical Call Scenarios | 227 | |
Features | 229 | |
Terminal-to-Gateway Connection | 230 | |
Terminal-to-Terminal Connection | 231 | |
Call Control | 232 | |
Group Management | 234 | |
Periodic Key Update | 235 | |
Inter-Piconet Capability | 236 | |
Service Discovery Procedures | 236 | |
LMP Procedures | 237 | |
Link Control Features | 238 | |
GAP Compliance | 239 | |
Headset Profile | 241 | |
Profile Restrictions | 243 | |
Basic Operation | 243 | |
Features | 244 | |
Link Control Features | 246 | |
GAP Compliance | 247 | |
Dialup Networking Profile | 248 | |
Profile Restrictions | 250 | |
Basic Operation | 250 | |
Services | 251 | |
Gateway Commands | 251 | |
Audio Feedback | 253 | |
Service Discovery Procedures | 254 | |
Link Control Features | 254 | |
GAP Compliance | 254 | |
Fax Profile | 256 | |
Profile Restrictions | 257 | |
Basic Operation | 258 | |
Services | 259 | |
Gateway Commands | 259 | |
Audio Feedback | 260 | |
Service Discovery Procedures | 260 | |
Link Control Features | 260 | |
GAP Compliance | 260 | |
LAN Access Profile | 261 | |
Profile Restrictions | 263 | |
Basic Operation | 264 | |
Security | 265 | |
GAP Compliance | 265 | |
Service Discovery Procedures | 266 | |
Link Control | 267 | |
Management Entity Procedures | 267 | |
File Transfer Profile | 268 | |
Basic Operation | 270 | |
Functions | 270 | |
Features | 271 | |
OBEX Operations | 272 | |
Service Discovery Procedures | 273 | |
Object Push Profile | 273 | |
Functions | 275 | |
Basic Operation | 276 | |
Features | 277 | |
Content Formats | 277 | |
OBEX Operations | 278 | |
Service Discovery Procedures | 278 | |
Synchronization Profile | 279 | |
Basic Operation | 281 | |
Features | 283 | |
OBEX Operations | 284 | |
Service Discovery Procedures | 284 | |
Summary | 286 | |
8 | Bluetooth Security | 289 |
Security Modes | 290 | |
Link-level Security | 291 | |
A Matter of Trust | 292 | |
Flexible Access | 293 | |
Implementation | 293 | |
Architecture Overview | 294 | |
Security Level of Services | 296 | |
Connection Setup | 296 | |
Authentication on Baseband Link Setup | 297 | |
Protocol Stack Handling | 298 | |
Registration Procedures | 299 | |
External Key Management | 301 | |
Access Control Procedures | 301 | |
Connectionless L2CAP | 301 | |
Security Manager | 301 | |
Interface to L2CAP | 305 | |
Interface to Other Multiplexing Protocols | 306 | |
Interface to ESCE | 306 | |
Registration Procedures | 306 | |
Interface to HCI/Link Manager |
Interviews
Exclusive Author Essay Among the many things you can do with this technology is swap data and synchronize files merely by having the devices come within range of one another. Images captured with a digital camera, for example, can be dropped off at a PC for editing or to a color printer for output on photo-quality paper -- all without having to connect cables, load files, open applications, or push buttons. The technology is a combination of circuit- and packet-switching, making it suitable for voice as well as data. Instead of fumbling with a cell phone while driving, you can wear a lightweight headset to answer a call and engage in a conversation without even taking the phone out of your briefcase or purse. Bluetooth can be combined with other technologies to offer wholly new capabilities, such as automatically lowering the ring volume of cell phones or shutting them off as users enter quiet zones like churches, restaurants, theaters, and classrooms. Upon leaving the quiet zone, the cell phones are returned to their original settings. The Technology No matter what the application, making connections between Bluetooth devices is as easy as powering them up. In fact, one advantage of Bluetooth is that it does not need to be set up -- it is always on, running in the background, and looking for other devices to chat with. When Bluetooth devices come within range of one another, they exchange messages so they can become aware of one another's capabilities, establish connections and, if needed, arrange for security to protect sensitive data during transmission. Within a few years, about 80 percent of mobile phones are expected to carry a Bluetooth chip. These radio transceivers operate in the globally available ISM (industrial, scientific, and medical) radio band of 2.4 GHz, which does not require an operator's license from a regulatory agency, such as the Federal Communications Commission (FCC) in the U.S. The use of a generally available frequency band means that Bluetooth-enabled devices can be used virtually anywhere in the world and link up with one another for ad hoc networking when they come within range. The radio link itself is very robust, using frequency-hopping spread spectrum technology to overcome interference and fading. Spread spectrum is a digital coding technique in which the signal is taken apart or "spread" so that it sounds more like noise as it is sent through the air. With the addition of frequency hopping -- having the signals hop from one frequency to another -- wireless transmissions are made even more secure. Since only the sender and receiver know the hopping sequence for coding and decoding the signal, eavesdropping is virtually impossible. The Future Communicator platforms of the future will combine a number of technologies and features in one device, including mobile Internet browsing, messaging, imaging, location-based applications and services, mobile telephony, personal information management, and enterprise applications. Bluetooth will be a key component of these platforms. Ericsson is among several companies that plan to offer such products. The user interface will be based upon the VGA format and have a color touch screen, which allows for easy navigation, pen-input, and handwriting recognition. With a built-in GPS receiver, the device will also provide positioning information. And with built-in Bluetooth and infrared components, the device can connect wirelessly with virtually any other device, network, and third-party application. There will be points of convergence between Bluetooth and other wireless technologies. Infrared and Bluetooth technologies, for example, provide complementary implementations for data exchange and voice applications. Bluetooth complements infrared's point-and-shoot ease of use with omni-directional signaling, longer distance communications, and capacity to penetrate walls. For some users, having both Bluetooth and infrared will provide the optimal short-range wireless solution. For others, the choice of adding Bluetooth or infrared will be based on the applications and intended usage. Origins of Bluetooth Since its initial development in 1994 by the Swedish telecommunications firm Ericsson, more than 1,800 companies worldwide have signed on as members of the Bluetooth Special Interest Group (SIG) to build products to the wireless specification and promote the new technology in the marketplace. The engineers at Ericsson code-named the new wireless technology Bluetooth to honor a tenth-century Viking king. Harald Bluetooth reigned from 940 to 985 and is credited with uniting Denmark and bringing order to that country. Harald's name was actually Blåtand, which roughly translates into English as "Bluetooth." This has nothing to do with the color of his teeth -- Blåtand actually referred to Harald's very dark hair, which was unusual for Vikings. Bluetooth Advantage As the number and types of computer and communications devices continue to proliferate, establishing connectivity between them becomes the critical issue. What is needed is an economical wireless solution that is also convenient, reliable, easy to use, and operates securely over a longer distance than infrared without requiring a clear line of sight. Of the many emerging wireless solutions that attempt to address one or more of these needs, only one has gained global support from the broadest base of vendors representing all segments of the computer and communications markets -- Bluetooth wireless technology. When Bluetooth arrives at a device near you, it will herald a new era of unification for all devices, finally putting an end to the cable chaos that still plagues us. Nathan Muller is a consultant in Sterling, Virginia, who specializes in advanced technology marketing, research, and education. In his 30 years of industry experience, he has published 19 books and more than 2,000 articles about computers and communications in more than 50 publications worldwide. From the B&N Reads Blog
Page 1 of
Related SubjectsCustomer Reviews |