SlideShare a Scribd company logo
1 of 9
Bluetooth Protocol
stack/layers
by Jay Nagar
Call:9601957620
What is Bluetooth?
• Bluetooth is a wireless technology standard for exchanging data over short
distances from fixed and mobile devices, and building personal area networks.
How It Works?
• Bluetooth is a low-power wireless connectivity technology used to stream
audio, transfer data and broadcast information between devices. There are two
flavors of Bluetooth technology, Basic Rate/Enhanced Data Rate (BR/EDR) and
Low Energy (LE).
Masters, Slaves, and Piconets
• Bluetooth networks (commonly referred to as piconets) use a master/slave
model to control when and where devices can send data.
• In this model, a single master device can be connected to up to seven different
slave devices.
• Any slave device in the piconet can only be connected to a single master.
Bluetooth Protocol stack/layers
Layer
• Core protocols consisting 5 layer protocol stack viz. radio, baseband,link
manager protocol, logical link control and adaptation protocol, service discovery
protocol.
• Cable replacement protocol,RFCOMM
• Telephony Control Protocols
• Adopted protocols viz. PPP,TCP/UDP/IP,OBEX and WAE/WAP
Core protocols
• Radio
• Baseband – SCO & ACL Packet, Audio and data packet diff layer.
• Link Manager protocol - It is responsible to establish link between Bluetooth
devices and to maintain the link between them. This protocol also includes
authentication and encryption specifications. Negotiation of packet sizes
between devices can be taken care by this.
• Logical link control and adaptation protocol: This L2CAP protocol adapts
upper layer frame to baseband layer frame format and vice versa. L2CAP take
care of both connection oriented and connectionless services.
• SDP(Service Discovery Protocol)
Cable replacement protocol
• Only one member – RFCOMM
• Serial line communication Protocol based on ETSI 07.10 (European
Telecommunication Standard Institute)
• CRP – Emulates RS 232 Control and data Signal over Bluetooth.
• Serial ports are popular to provide serial communication between devices.
Bluetooth uses RFCOMM as cable replacement protocol. RFCOMM functions as
virtual serial port and does transport of binary digital data bits. It basically
emulates RS232 specifications over Bluetooth physical layer.
Telephony Control Protocols
• TCS BIN – Telephony Control Specification binary
• TCS-BIN is the protocol used here which is a bit oriented one.
• It specifies call control signals and mobility management procedures.
• These signals take care of establishing speech and data calls.
• Q.931
• AT – Commands
• Define set of commands by which a mobile phone can be used & control as a modem.
Adopted protocols
• These protocols are already defined by other standard bodies which are
incorporate without any change in the Bluetooth protocol stack architecture.
• PPP - PPP is a point to point protocol used to transfer IP datagram's.
• TCP/IP
• OBEX – Object Exchange Protocol
• WAP – Wireless Application Protocol
• V-Card/V- Calender/IRMC (Infrared Mobile Communication)

More Related Content

What's hot

WiMAX (IEEE 802.16)
WiMAX (IEEE 802.16)WiMAX (IEEE 802.16)
WiMAX (IEEE 802.16)
Sajid Marwat
 
Rf network design
Rf network designRf network design
Rf network design
Nguyen Le
 

What's hot (20)

Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth low energy
Bluetooth low energyBluetooth low energy
Bluetooth low energy
 
Bluetooth technology
Bluetooth  technologyBluetooth  technology
Bluetooth technology
 
Bluetooth technology by polite group
Bluetooth technology by polite groupBluetooth technology by polite group
Bluetooth technology by polite group
 
WiMAX (IEEE 802.16)
WiMAX (IEEE 802.16)WiMAX (IEEE 802.16)
WiMAX (IEEE 802.16)
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Wireless LAN and bluetooth technology
Wireless LAN and bluetooth technologyWireless LAN and bluetooth technology
Wireless LAN and bluetooth technology
 
5 g ran_jnn_atal_fdp
5 g ran_jnn_atal_fdp5 g ran_jnn_atal_fdp
5 g ran_jnn_atal_fdp
 
Wireless communication
Wireless communicationWireless communication
Wireless communication
 
Wifi ppt
Wifi pptWifi ppt
Wifi ppt
 
What is 5G?
What is 5G?What is 5G?
What is 5G?
 
Bluetooth profile
Bluetooth profileBluetooth profile
Bluetooth profile
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Wlan wireless network
Wlan wireless networkWlan wireless network
Wlan wireless network
 
Bluetooth - Comprehensive Presentation
Bluetooth - Comprehensive PresentationBluetooth - Comprehensive Presentation
Bluetooth - Comprehensive Presentation
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Rf network design
Rf network designRf network design
Rf network design
 
02 umts network architecturenew
02 umts network architecturenew02 umts network architecturenew
02 umts network architecturenew
 

Similar to Bluethooth Protocol stack/layers

Protols used in bluetooth
Protols used in bluetoothProtols used in bluetooth
Protols used in bluetooth
Sonali Parab
 
Wireless & Mobile Lecture # 20
Wireless & Mobile Lecture # 20Wireless & Mobile Lecture # 20
Wireless & Mobile Lecture # 20
Bit Hacker
 
Introduction to bluetooth
Introduction to bluetoothIntroduction to bluetooth
Introduction to bluetooth
vish0110
 
Bluetooth Intro
Bluetooth IntroBluetooth Intro
Bluetooth Intro
amit_monty
 
R K 2 Bluetooth Technologies
R K 2  Bluetooth  TechnologiesR K 2  Bluetooth  Technologies
R K 2 Bluetooth Technologies
Saurav Kumar
 

Similar to Bluethooth Protocol stack/layers (20)

Protols used in bluetooth
Protols used in bluetoothProtols used in bluetooth
Protols used in bluetooth
 
Bluetooth and profiles on WEC7
Bluetooth and profiles on WEC7Bluetooth and profiles on WEC7
Bluetooth and profiles on WEC7
 
Bluetooth, RFID and WiMAX Technologies
Bluetooth, RFID and WiMAX TechnologiesBluetooth, RFID and WiMAX Technologies
Bluetooth, RFID and WiMAX Technologies
 
SYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdf
SYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdfSYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdf
SYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdf
 
Wireless & Mobile Lecture # 20
Wireless & Mobile Lecture # 20Wireless & Mobile Lecture # 20
Wireless & Mobile Lecture # 20
 
MC Module 4.docx
MC Module 4.docxMC Module 4.docx
MC Module 4.docx
 
Introduction to bluetooth
Introduction to bluetoothIntroduction to bluetooth
Introduction to bluetooth
 
Overview of Bluetooth technology
Overview of Bluetooth technologyOverview of Bluetooth technology
Overview of Bluetooth technology
 
Bluetooth Technology By Volkan Sevindik
Bluetooth Technology By Volkan SevindikBluetooth Technology By Volkan Sevindik
Bluetooth Technology By Volkan Sevindik
 
bluetooth-security
bluetooth-securitybluetooth-security
bluetooth-security
 
Bluetooth Intro
Bluetooth IntroBluetooth Intro
Bluetooth Intro
 
Carwhisperer Bluetooth Attack
Carwhisperer Bluetooth AttackCarwhisperer Bluetooth Attack
Carwhisperer Bluetooth Attack
 
BluetoothSecurity.ppt
BluetoothSecurity.pptBluetoothSecurity.ppt
BluetoothSecurity.ppt
 
BluetoothSecurity.ppt
BluetoothSecurity.pptBluetoothSecurity.ppt
BluetoothSecurity.ppt
 
Bluetooth Technology & Security
Bluetooth Technology & SecurityBluetooth Technology & Security
Bluetooth Technology & Security
 
R K 2 Bluetooth Technologies
R K 2  Bluetooth  TechnologiesR K 2  Bluetooth  Technologies
R K 2 Bluetooth Technologies
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
bluetooth technology
 bluetooth technology bluetooth technology
bluetooth technology
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 

More from Jay Nagar

More from Jay Nagar (20)

11 best tips to grow your influence youtube
11 best tips to grow your influence youtube11 best tips to grow your influence youtube
11 best tips to grow your influence youtube
 
Impact of micro vs macro influencers in 2022
Impact of micro vs macro influencers in 2022Impact of micro vs macro influencers in 2022
Impact of micro vs macro influencers in 2022
 
What is Signature marketing
What is Signature marketingWhat is Signature marketing
What is Signature marketing
 
100+ Guest blogging sites list
100+ Guest blogging sites list100+ Guest blogging sites list
100+ Guest blogging sites list
 
Ethical Hacking and Defense Penetration
Ethical Hacking and Defense PenetrationEthical Hacking and Defense Penetration
Ethical Hacking and Defense Penetration
 
Cyber Security and Cyber Awareness Tips manual 2020
Cyber Security and Cyber Awareness Tips manual 2020Cyber Security and Cyber Awareness Tips manual 2020
Cyber Security and Cyber Awareness Tips manual 2020
 
On-Page SEO Techniques By Digitech Jay
On-Page SEO Techniques By Digitech JayOn-Page SEO Techniques By Digitech Jay
On-Page SEO Techniques By Digitech Jay
 
Artificial Intelligence
Artificial IntelligenceArtificial Intelligence
Artificial Intelligence
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual
 
Dynamic programming
Dynamic programmingDynamic programming
Dynamic programming
 
GPRS(General Packet Radio Service)
GPRS(General Packet Radio Service)GPRS(General Packet Radio Service)
GPRS(General Packet Radio Service)
 
Communication and Networking
Communication and NetworkingCommunication and Networking
Communication and Networking
 
MOBILE COMPUTING and WIRELESS COMMUNICATION
MOBILE COMPUTING and WIRELESS COMMUNICATION MOBILE COMPUTING and WIRELESS COMMUNICATION
MOBILE COMPUTING and WIRELESS COMMUNICATION
 
Global system for mobile communication(GSM)
Global system for mobile communication(GSM)Global system for mobile communication(GSM)
Global system for mobile communication(GSM)
 
Python for beginners
Python for beginnersPython for beginners
Python for beginners
 
Earn Money from bug bounty
Earn Money from bug bountyEarn Money from bug bounty
Earn Money from bug bounty
 
Code smell & refactoring
Code smell & refactoringCode smell & refactoring
Code smell & refactoring
 
The Diffie-Hellman Algorithm
The Diffie-Hellman AlgorithmThe Diffie-Hellman Algorithm
The Diffie-Hellman Algorithm
 
Confidentiality using Symmetric Encryption
Confidentiality using Symmetric EncryptionConfidentiality using Symmetric Encryption
Confidentiality using Symmetric Encryption
 

Recently uploaded

Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Recently uploaded (20)

Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 

Bluethooth Protocol stack/layers

  • 2. What is Bluetooth? • Bluetooth is a wireless technology standard for exchanging data over short distances from fixed and mobile devices, and building personal area networks. How It Works? • Bluetooth is a low-power wireless connectivity technology used to stream audio, transfer data and broadcast information between devices. There are two flavors of Bluetooth technology, Basic Rate/Enhanced Data Rate (BR/EDR) and Low Energy (LE).
  • 3. Masters, Slaves, and Piconets • Bluetooth networks (commonly referred to as piconets) use a master/slave model to control when and where devices can send data. • In this model, a single master device can be connected to up to seven different slave devices. • Any slave device in the piconet can only be connected to a single master.
  • 5. Layer • Core protocols consisting 5 layer protocol stack viz. radio, baseband,link manager protocol, logical link control and adaptation protocol, service discovery protocol. • Cable replacement protocol,RFCOMM • Telephony Control Protocols • Adopted protocols viz. PPP,TCP/UDP/IP,OBEX and WAE/WAP
  • 6. Core protocols • Radio • Baseband – SCO & ACL Packet, Audio and data packet diff layer. • Link Manager protocol - It is responsible to establish link between Bluetooth devices and to maintain the link between them. This protocol also includes authentication and encryption specifications. Negotiation of packet sizes between devices can be taken care by this. • Logical link control and adaptation protocol: This L2CAP protocol adapts upper layer frame to baseband layer frame format and vice versa. L2CAP take care of both connection oriented and connectionless services. • SDP(Service Discovery Protocol)
  • 7. Cable replacement protocol • Only one member – RFCOMM • Serial line communication Protocol based on ETSI 07.10 (European Telecommunication Standard Institute) • CRP – Emulates RS 232 Control and data Signal over Bluetooth. • Serial ports are popular to provide serial communication between devices. Bluetooth uses RFCOMM as cable replacement protocol. RFCOMM functions as virtual serial port and does transport of binary digital data bits. It basically emulates RS232 specifications over Bluetooth physical layer.
  • 8. Telephony Control Protocols • TCS BIN – Telephony Control Specification binary • TCS-BIN is the protocol used here which is a bit oriented one. • It specifies call control signals and mobility management procedures. • These signals take care of establishing speech and data calls. • Q.931 • AT – Commands • Define set of commands by which a mobile phone can be used & control as a modem.
  • 9. Adopted protocols • These protocols are already defined by other standard bodies which are incorporate without any change in the Bluetooth protocol stack architecture. • PPP - PPP is a point to point protocol used to transfer IP datagram's. • TCP/IP • OBEX – Object Exchange Protocol • WAP – Wireless Application Protocol • V-Card/V- Calender/IRMC (Infrared Mobile Communication)