SlideShare ist ein Scribd-Unternehmen logo
1 von 13
Downloaden Sie, um offline zu lesen
Communication
Networks
Bluetooth
– IEEE 802.15
Overview of Module - 2
• Framing
• What is Framing
• Types of Framing
• Methods for identifying the
boundaries
• Flow Control
• What is flow control
• Types of flow control
• Access Control
• What is access control
• Types of access control
• Ethernet – IEEE 802.3
• Evolution of Ethernet
• Frame Format of Ethernet
• Access Control for Ethernet
• Performance Evaluation of Ethernet
• WLAN – IEEE 802.11
• Architecture
• Bluetooth
• WIFI
• Zigbee
• 6LowPan
• Network Layer Services
• IPv4
• Packet switching
• Network Layer Protocols
Visit www.youtube.com/GURUKULA for Lecture Videos
BLUETOOTH
• Bluetooth is a wireless LAN technology designed to connect
devices of different functions such as telephones, notebooks,
computers (desktop and laptop), cameras, printers.
• A Bluetooth LAN is an ad hoc network, which means that
the network is formed spontaneously; the devices, sometimes
called gadgets, find each other and make a network called a
piconet
• Bluetooth technology is the implementation of a protocol
defined by the IEEE 802.15 standard.
• The standard defines a wireless personal-area
network (PAN) operable in an area the size of a room or a
hall.
Visit www.youtube.com/GURUKULA for Lecture Videos
ARCHITECTURE
• Bluetooth defines two types of networks:
Piconet Scatternet
• A Bluetooth network is called a piconet, or a
small net.
• A piconet can have up to eight stations, one of
which is called the primary; the rest are called
secondaries.
• Piconets can be combined to form a scatternet.
• A secondary station in one piconet can be the primary in
another piconet.
• This station can receive messages from the primary in the
first piconet (as a secondary) and, acting as a primary,
deliver them to secondaries in the second piconet.
• A station can be a member of two piconets.
Visit www.youtube.com/GURUKULA for Lecture Videos
BLUETOOTH LAYERS
Visit www.youtube.com/GURUKULA for Lecture Videos
Radio Layer
• This layer is roughly equivalent to
the physical layer.
• This also defines 3 other
parameters
• Operating Band
• It is operated in 2.4 GHz ISM Band
• FHSS
• It uses FHSS method. It hops 1600
times per second
• Modulation
• It uses GFSK (Gaussian FSK) – Version
of FSK as a modulation Technique
Visit www.youtube.com/GURUKULA for Lecture Videos
Base Band Layer
• This layer is roughly equivalent to MAC Sub Layer.
• This layer defines the following parameters
• Access Method
• It uses TDD – TDMA as the access mechanism
• Physical Link
• There are 2 types of link that can be created between the
primary and secondary stations
• Synchronous Connection Oriented Link (SCL)
• This link is used when avoiding latency is more
important than any reliable delivery.
• No retransmission of frames occurs during
failure
• They are mainly used in audio communications
• Asynchronous Connectionless Link (ACL)
• This link is used when reliable delivery is more
important than any latency.
• Frames are retransmitted on the event of
failure.
L2CAP Layer
• Logical Link Control and Adaptation Layer
• They are roughly equivalent to the LLC sub layer.
• There are 4 specific duties
• Multiplexing
• It accepts the data from the upper layer and
delivers them to the lower layers
• Segmentation an Reassembly
• This layer divides the larger packets into segments
and adds extra information to define the location
of the segment in original packets
• At the destination this layer reassembles them
back.
• Quality of Service (QoS)
• QoS can be defined under any circumstances
• Group Management
• Bluetooth allows data transmission between the
group of users
• As similar to multicastVisit www.youtube.com/GURUKULA for Lecture Videos
L2CAP Frame Format
• Length :
• Indicates the size of the data field
• Channel ID:
• This defines the unique identifier for the virtual channel created
• Data and Control:
• Actual data to be sent.
• It can take a maximum value of 65,535 Bytes
Visit www.youtube.com/GURUKULA for Lecture Videos
General Frame Format
Access Code:
• This field contains a synchronisation bits to
identify the primary from various piconets
• The secondary stations uses this bits to
synchronise their speed with their primary
station
Address:
• This field runs from 000 – 111 to define up to 7
secondary address.
• 000 – represents broadcast address.
Type:
• This field represents the type of data coming
form the upper layer
F :
• This field is used for flow control
• When this field is set to “1” it indicates that the
buffer is Full
A :
• This field is used for Acknowledgement
S :
• This field is used for Sequence Number
HEC (Header Error Correction) :
• This field is used for error detection (Check Sum)
Data :
• This field carries the actual data.
• The length of this field varies according to the
type of the frame (As Mentioned in the Figure)
Frame Format Types
• Bluetooth frame can be classified in to 3 types.
• 1 slot frame:
• This frame frequency hops for each slot.
• Duration of this frame is 366 Bits (Note)
• 3 slot frame:
• This frame frequency hops for every 3 slots.
• Duration of this frame is 1616 Bits (Note)
• 5 slot frame:
• This frame frequency hops for every 5 slots
• Duration of this frame is 2866 Bits (Note)
Visit www.youtube.com/GURUKULA for Lecture Videos
Session Summary
• Introduction of Bluetooth
• Architecture of Bluetooth – Piconet and Scatternet
• Bluetooth Layers [ Radio, Base Band, L2cap Layers – Functions]
• Frame Format of Blutooth and its Types [1 slot, 3 slot, 5 slot]
Visit www.youtube.com/GURUKULA for Lecture Videos
References:
• Behrouz A. Forouzan, ―Data communication and Networking, Fifth
Edition, Tata McGraw – Hill, 2013
• Larry L. Peterson, Bruce S. Davie, ―Computer Networks: A Systems
Approach, Fifth Edition, Morgan Kaufmann Publishers, 2011.
• Few online References (Will be Mentioned in the description Section)
Thank You…

Weitere ähnliche Inhalte

Was ist angesagt?

Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocaltes31
 
5 IEEE standards
5  IEEE standards5  IEEE standards
5 IEEE standardsRodgers Moonde
 
Chapter10 switching
Chapter10 switchingChapter10 switching
Chapter10 switchingSuneel Varma
 
Media Access Control
Media Access ControlMedia Access Control
Media Access ControlVijayaLakshmi514
 
Ethernet - Networking presentation
Ethernet - Networking presentationEthernet - Networking presentation
Ethernet - Networking presentationViet Nguyen
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11Shreejan Acharya
 
Ethernet protocol
Ethernet protocolEthernet protocol
Ethernet protocolTom Chou
 
C08 wireless atm[1]
C08 wireless atm[1]C08 wireless atm[1]
C08 wireless atm[1]Rio Nguyen
 
Unit 2 cnd_22634_pranoti doke
Unit 2 cnd_22634_pranoti dokeUnit 2 cnd_22634_pranoti doke
Unit 2 cnd_22634_pranoti dokePranoti Doke
 
Computer networks - Channelization
Computer networks - ChannelizationComputer networks - Channelization
Computer networks - ChannelizationElambaruthi Elambaruthi
 
Ethernet Computer network
Ethernet Computer networkEthernet Computer network
Ethernet Computer networkmiteshppt
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesSayed Chhattan Shah
 

Was ist angesagt? (20)

Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
 
Ethernet
EthernetEthernet
Ethernet
 
5 IEEE standards
5  IEEE standards5  IEEE standards
5 IEEE standards
 
Network layer
Network layerNetwork layer
Network layer
 
Chapter10 switching
Chapter10 switchingChapter10 switching
Chapter10 switching
 
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
 
IEEE 802.11
IEEE 802.11IEEE 802.11
IEEE 802.11
 
Pure aloha
Pure alohaPure aloha
Pure aloha
 
Ethernet - Networking presentation
Ethernet - Networking presentationEthernet - Networking presentation
Ethernet - Networking presentation
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11
 
Ethernet protocol
Ethernet protocolEthernet protocol
Ethernet protocol
 
Mac layer
Mac  layerMac  layer
Mac layer
 
Chap 10 igmp
Chap 10 igmpChap 10 igmp
Chap 10 igmp
 
E1 To Stm
E1 To Stm E1 To Stm
E1 To Stm
 
C08 wireless atm[1]
C08 wireless atm[1]C08 wireless atm[1]
C08 wireless atm[1]
 
Unit 2 cnd_22634_pranoti doke
Unit 2 cnd_22634_pranoti dokeUnit 2 cnd_22634_pranoti doke
Unit 2 cnd_22634_pranoti doke
 
Computer networks - Channelization
Computer networks - ChannelizationComputer networks - Channelization
Computer networks - Channelization
 
Routing Protocols
Routing Protocols Routing Protocols
Routing Protocols
 
Ethernet Computer network
Ethernet Computer networkEthernet Computer network
Ethernet Computer network
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
 

Ă„hnlich wie 2.8 bluetooth ieee 802.15

bluetooth protocol stack.pptx
bluetooth protocol stack.pptxbluetooth protocol stack.pptx
bluetooth protocol stack.pptxJJospinJeya
 
2.7 wlan ieee 802.11
2.7 wlan   ieee 802.112.7 wlan   ieee 802.11
2.7 wlan ieee 802.11JAIGANESH SEKAR
 
AWMN Advances Wireless UNIT-1 Blue_Tooth.pptx
AWMN Advances Wireless UNIT-1 Blue_Tooth.pptxAWMN Advances Wireless UNIT-1 Blue_Tooth.pptx
AWMN Advances Wireless UNIT-1 Blue_Tooth.pptxshashijntuhceh
 
Et3003 sem2-1314-3 ethernets
Et3003 sem2-1314-3 ethernetsEt3003 sem2-1314-3 ethernets
Et3003 sem2-1314-3 ethernetsTutun Juhana
 
WiFi - IEEE 802.11
WiFi - IEEE 802.11WiFi - IEEE 802.11
WiFi - IEEE 802.11Damien Magoni
 
Bluetooth and Raspberry Pi
Bluetooth and Raspberry PiBluetooth and Raspberry Pi
Bluetooth and Raspberry PiDamien Magoni
 
campus_design_eng1.ppt
campus_design_eng1.pptcampus_design_eng1.ppt
campus_design_eng1.pptchali100
 
Unit 2 ppt-idc
Unit 2 ppt-idcUnit 2 ppt-idc
Unit 2 ppt-idchiya123jes
 
Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)
Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)
Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)Tutun Juhana
 
WPAN According To ZIGBEE
WPAN According To ZIGBEEWPAN According To ZIGBEE
WPAN According To ZIGBEEAfaq Siddiqui
 
Final_IoT_Protocol Stack.pptx
Final_IoT_Protocol Stack.pptxFinal_IoT_Protocol Stack.pptx
Final_IoT_Protocol Stack.pptxjainam bhavsar
 
AOS Lab 12: Network Communication
AOS Lab 12: Network CommunicationAOS Lab 12: Network Communication
AOS Lab 12: Network CommunicationZubair Nabi
 
IP Signal Distribution
IP Signal DistributionIP Signal Distribution
IP Signal DistributionrAVe [PUBS]
 
SYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdf
SYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdfSYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdf
SYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdfshubhangisonawane6
 
Data_Processing_and_communication_bluetooth.pptx
Data_Processing_and_communication_bluetooth.pptxData_Processing_and_communication_bluetooth.pptx
Data_Processing_and_communication_bluetooth.pptx20CE112YASHPATEL
 

Ă„hnlich wie 2.8 bluetooth ieee 802.15 (20)

Bluetooth
BluetoothBluetooth
Bluetooth
 
bluetooth protocol stack.pptx
bluetooth protocol stack.pptxbluetooth protocol stack.pptx
bluetooth protocol stack.pptx
 
2.7 wlan ieee 802.11
2.7 wlan   ieee 802.112.7 wlan   ieee 802.11
2.7 wlan ieee 802.11
 
AWMN Advances Wireless UNIT-1 Blue_Tooth.pptx
AWMN Advances Wireless UNIT-1 Blue_Tooth.pptxAWMN Advances Wireless UNIT-1 Blue_Tooth.pptx
AWMN Advances Wireless UNIT-1 Blue_Tooth.pptx
 
Et3003 sem2-1314-3 ethernets
Et3003 sem2-1314-3 ethernetsEt3003 sem2-1314-3 ethernets
Et3003 sem2-1314-3 ethernets
 
Network protocol
Network protocolNetwork protocol
Network protocol
 
2.1 framing
2.1 framing2.1 framing
2.1 framing
 
WiFi - IEEE 802.11
WiFi - IEEE 802.11WiFi - IEEE 802.11
WiFi - IEEE 802.11
 
Bluetooth and Raspberry Pi
Bluetooth and Raspberry PiBluetooth and Raspberry Pi
Bluetooth and Raspberry Pi
 
campus_design_eng1.ppt
campus_design_eng1.pptcampus_design_eng1.ppt
campus_design_eng1.ppt
 
Unit 2 ppt-idc
Unit 2 ppt-idcUnit 2 ppt-idc
Unit 2 ppt-idc
 
Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)
Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)
Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)
 
WPAN According To ZIGBEE
WPAN According To ZIGBEEWPAN According To ZIGBEE
WPAN According To ZIGBEE
 
Final_IoT_Protocol Stack.pptx
Final_IoT_Protocol Stack.pptxFinal_IoT_Protocol Stack.pptx
Final_IoT_Protocol Stack.pptx
 
AOS Lab 12: Network Communication
AOS Lab 12: Network CommunicationAOS Lab 12: Network Communication
AOS Lab 12: Network Communication
 
IP Signal Distribution
IP Signal DistributionIP Signal Distribution
IP Signal Distribution
 
SYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdf
SYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdfSYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdf
SYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdf
 
Data_Processing_and_communication_bluetooth.pptx
Data_Processing_and_communication_bluetooth.pptxData_Processing_and_communication_bluetooth.pptx
Data_Processing_and_communication_bluetooth.pptx
 
Connecting devices
Connecting devicesConnecting devices
Connecting devices
 
IoT Control Units and Communication Models
IoT Control Units and Communication ModelsIoT Control Units and Communication Models
IoT Control Units and Communication Models
 

Mehr von JAIGANESH SEKAR

Ec8551 communication networks mcq question bank
Ec8551   communication networks mcq question bank Ec8551   communication networks mcq question bank
Ec8551 communication networks mcq question bank JAIGANESH SEKAR
 
2.3b access control random access methods - part 3 - csma ca
2.3b access control   random access methods - part 3 - csma ca2.3b access control   random access methods - part 3 - csma ca
2.3b access control random access methods - part 3 - csma caJAIGANESH SEKAR
 
2.10b network layer services i pv4 - variable length subnetting
2.10b network layer services  i pv4 - variable length subnetting2.10b network layer services  i pv4 - variable length subnetting
2.10b network layer services i pv4 - variable length subnettingJAIGANESH SEKAR
 
2.10a network layer services i pv4 - fixed length subnetting
2.10a network layer services  i pv4 - fixed length subnetting2.10a network layer services  i pv4 - fixed length subnetting
2.10a network layer services i pv4 - fixed length subnettingJAIGANESH SEKAR
 
2.10 network layer services i pv4
2.10 network layer services  i pv42.10 network layer services  i pv4
2.10 network layer services i pv4JAIGANESH SEKAR
 
2.9 network layer services packet switching
2.9 network layer services   packet switching2.9 network layer services   packet switching
2.9 network layer services packet switchingJAIGANESH SEKAR
 
2.5 access control channelization methods
2.5 access control   channelization methods2.5 access control   channelization methods
2.5 access control channelization methodsJAIGANESH SEKAR
 
2.4 access control controlled access methods
2.4 access control   controlled access methods2.4 access control   controlled access methods
2.4 access control controlled access methodsJAIGANESH SEKAR
 
2.3a access control random access methods - part 2 - csma cd
2.3a access control   random access methods - part 2 - csma cd2.3a access control   random access methods - part 2 - csma cd
2.3a access control random access methods - part 2 - csma cdJAIGANESH SEKAR
 
2.3 access control random access methods - part 1
2.3 access control   random access methods - part 12.3 access control   random access methods - part 1
2.3 access control random access methods - part 1JAIGANESH SEKAR
 
9. data link layer error correction codes - hamming code
9. data link layer   error correction codes - hamming code9. data link layer   error correction codes - hamming code
9. data link layer error correction codes - hamming codeJAIGANESH SEKAR
 
8. data link layer error detection and correction codes - crc
8. data link layer   error detection and correction codes - crc8. data link layer   error detection and correction codes - crc
8. data link layer error detection and correction codes - crcJAIGANESH SEKAR
 
7. data link layer error detection and correction codes - parity and checksum
7. data link layer   error detection and correction codes - parity and checksum7. data link layer   error detection and correction codes - parity and checksum
7. data link layer error detection and correction codes - parity and checksumJAIGANESH SEKAR
 
6. data link layer physical addressing
6. data link layer   physical addressing6. data link layer   physical addressing
6. data link layer physical addressingJAIGANESH SEKAR
 
5. protocol layering
5. protocol layering5. protocol layering
5. protocol layeringJAIGANESH SEKAR
 
2. overview of data communication part 1
2. overview of data communication   part 12. overview of data communication   part 1
2. overview of data communication part 1JAIGANESH SEKAR
 
3. overview of data communication part 2
3. overview of data communication   part 23. overview of data communication   part 2
3. overview of data communication part 2JAIGANESH SEKAR
 
1. introduction to communication networks subject introduction
1. introduction to communication networks   subject introduction1. introduction to communication networks   subject introduction
1. introduction to communication networks subject introductionJAIGANESH SEKAR
 
Ever Noticed the Rings on Your Head Phone Jack - Explainer
Ever Noticed the Rings on Your Head Phone Jack - ExplainerEver Noticed the Rings on Your Head Phone Jack - Explainer
Ever Noticed the Rings on Your Head Phone Jack - ExplainerJAIGANESH SEKAR
 

Mehr von JAIGANESH SEKAR (20)

Ec8551 communication networks mcq question bank
Ec8551   communication networks mcq question bank Ec8551   communication networks mcq question bank
Ec8551 communication networks mcq question bank
 
2.3b access control random access methods - part 3 - csma ca
2.3b access control   random access methods - part 3 - csma ca2.3b access control   random access methods - part 3 - csma ca
2.3b access control random access methods - part 3 - csma ca
 
2.10b network layer services i pv4 - variable length subnetting
2.10b network layer services  i pv4 - variable length subnetting2.10b network layer services  i pv4 - variable length subnetting
2.10b network layer services i pv4 - variable length subnetting
 
2.10a network layer services i pv4 - fixed length subnetting
2.10a network layer services  i pv4 - fixed length subnetting2.10a network layer services  i pv4 - fixed length subnetting
2.10a network layer services i pv4 - fixed length subnetting
 
2.10 network layer services i pv4
2.10 network layer services  i pv42.10 network layer services  i pv4
2.10 network layer services i pv4
 
2.9 network layer services packet switching
2.9 network layer services   packet switching2.9 network layer services   packet switching
2.9 network layer services packet switching
 
2.5 access control channelization methods
2.5 access control   channelization methods2.5 access control   channelization methods
2.5 access control channelization methods
 
2.4 access control controlled access methods
2.4 access control   controlled access methods2.4 access control   controlled access methods
2.4 access control controlled access methods
 
2.3a access control random access methods - part 2 - csma cd
2.3a access control   random access methods - part 2 - csma cd2.3a access control   random access methods - part 2 - csma cd
2.3a access control random access methods - part 2 - csma cd
 
2.3 access control random access methods - part 1
2.3 access control   random access methods - part 12.3 access control   random access methods - part 1
2.3 access control random access methods - part 1
 
2.2 flow control
2.2 flow control2.2 flow control
2.2 flow control
 
9. data link layer error correction codes - hamming code
9. data link layer   error correction codes - hamming code9. data link layer   error correction codes - hamming code
9. data link layer error correction codes - hamming code
 
8. data link layer error detection and correction codes - crc
8. data link layer   error detection and correction codes - crc8. data link layer   error detection and correction codes - crc
8. data link layer error detection and correction codes - crc
 
7. data link layer error detection and correction codes - parity and checksum
7. data link layer   error detection and correction codes - parity and checksum7. data link layer   error detection and correction codes - parity and checksum
7. data link layer error detection and correction codes - parity and checksum
 
6. data link layer physical addressing
6. data link layer   physical addressing6. data link layer   physical addressing
6. data link layer physical addressing
 
5. protocol layering
5. protocol layering5. protocol layering
5. protocol layering
 
2. overview of data communication part 1
2. overview of data communication   part 12. overview of data communication   part 1
2. overview of data communication part 1
 
3. overview of data communication part 2
3. overview of data communication   part 23. overview of data communication   part 2
3. overview of data communication part 2
 
1. introduction to communication networks subject introduction
1. introduction to communication networks   subject introduction1. introduction to communication networks   subject introduction
1. introduction to communication networks subject introduction
 
Ever Noticed the Rings on Your Head Phone Jack - Explainer
Ever Noticed the Rings on Your Head Phone Jack - ExplainerEver Noticed the Rings on Your Head Phone Jack - Explainer
Ever Noticed the Rings on Your Head Phone Jack - Explainer
 

KĂĽrzlich hochgeladen

Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...121011101441
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdfCaalaaAbdulkerim
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - GuideGOPINATHS437943
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
home automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasadhome automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasadaditya806802
 
Solving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.pptSolving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.pptJasonTagapanGulla
 
National Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfNational Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfRajuKanojiya4
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleAlluxio, Inc.
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
Vishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsVishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsSachinPawar510423
 

KĂĽrzlich hochgeladen (20)

Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdf
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - Guide
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
home automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasadhome automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasad
 
Solving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.pptSolving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.ppt
 
National Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfNational Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdf
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at Scale
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
Vishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsVishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documents
 

2.8 bluetooth ieee 802.15

  • 2. Overview of Module - 2 • Framing • What is Framing • Types of Framing • Methods for identifying the boundaries • Flow Control • What is flow control • Types of flow control • Access Control • What is access control • Types of access control • Ethernet – IEEE 802.3 • Evolution of Ethernet • Frame Format of Ethernet • Access Control for Ethernet • Performance Evaluation of Ethernet • WLAN – IEEE 802.11 • Architecture • Bluetooth • WIFI • Zigbee • 6LowPan • Network Layer Services • IPv4 • Packet switching • Network Layer Protocols Visit www.youtube.com/GURUKULA for Lecture Videos
  • 3. BLUETOOTH • Bluetooth is a wireless LAN technology designed to connect devices of different functions such as telephones, notebooks, computers (desktop and laptop), cameras, printers. • A Bluetooth LAN is an ad hoc network, which means that the network is formed spontaneously; the devices, sometimes called gadgets, find each other and make a network called a piconet • Bluetooth technology is the implementation of a protocol defined by the IEEE 802.15 standard. • The standard defines a wireless personal-area network (PAN) operable in an area the size of a room or a hall. Visit www.youtube.com/GURUKULA for Lecture Videos
  • 4. ARCHITECTURE • Bluetooth defines two types of networks: Piconet Scatternet • A Bluetooth network is called a piconet, or a small net. • A piconet can have up to eight stations, one of which is called the primary; the rest are called secondaries. • Piconets can be combined to form a scatternet. • A secondary station in one piconet can be the primary in another piconet. • This station can receive messages from the primary in the first piconet (as a secondary) and, acting as a primary, deliver them to secondaries in the second piconet. • A station can be a member of two piconets. Visit www.youtube.com/GURUKULA for Lecture Videos
  • 6. Radio Layer • This layer is roughly equivalent to the physical layer. • This also defines 3 other parameters • Operating Band • It is operated in 2.4 GHz ISM Band • FHSS • It uses FHSS method. It hops 1600 times per second • Modulation • It uses GFSK (Gaussian FSK) – Version of FSK as a modulation Technique Visit www.youtube.com/GURUKULA for Lecture Videos
  • 7. Base Band Layer • This layer is roughly equivalent to MAC Sub Layer. • This layer defines the following parameters • Access Method • It uses TDD – TDMA as the access mechanism • Physical Link • There are 2 types of link that can be created between the primary and secondary stations • Synchronous Connection Oriented Link (SCL) • This link is used when avoiding latency is more important than any reliable delivery. • No retransmission of frames occurs during failure • They are mainly used in audio communications • Asynchronous Connectionless Link (ACL) • This link is used when reliable delivery is more important than any latency. • Frames are retransmitted on the event of failure.
  • 8. L2CAP Layer • Logical Link Control and Adaptation Layer • They are roughly equivalent to the LLC sub layer. • There are 4 specific duties • Multiplexing • It accepts the data from the upper layer and delivers them to the lower layers • Segmentation an Reassembly • This layer divides the larger packets into segments and adds extra information to define the location of the segment in original packets • At the destination this layer reassembles them back. • Quality of Service (QoS) • QoS can be defined under any circumstances • Group Management • Bluetooth allows data transmission between the group of users • As similar to multicastVisit www.youtube.com/GURUKULA for Lecture Videos
  • 9. L2CAP Frame Format • Length : • Indicates the size of the data field • Channel ID: • This defines the unique identifier for the virtual channel created • Data and Control: • Actual data to be sent. • It can take a maximum value of 65,535 Bytes Visit www.youtube.com/GURUKULA for Lecture Videos
  • 10. General Frame Format Access Code: • This field contains a synchronisation bits to identify the primary from various piconets • The secondary stations uses this bits to synchronise their speed with their primary station Address: • This field runs from 000 – 111 to define up to 7 secondary address. • 000 – represents broadcast address. Type: • This field represents the type of data coming form the upper layer F : • This field is used for flow control • When this field is set to “1” it indicates that the buffer is Full A : • This field is used for Acknowledgement S : • This field is used for Sequence Number HEC (Header Error Correction) : • This field is used for error detection (Check Sum) Data : • This field carries the actual data. • The length of this field varies according to the type of the frame (As Mentioned in the Figure)
  • 11. Frame Format Types • Bluetooth frame can be classified in to 3 types. • 1 slot frame: • This frame frequency hops for each slot. • Duration of this frame is 366 Bits (Note) • 3 slot frame: • This frame frequency hops for every 3 slots. • Duration of this frame is 1616 Bits (Note) • 5 slot frame: • This frame frequency hops for every 5 slots • Duration of this frame is 2866 Bits (Note) Visit www.youtube.com/GURUKULA for Lecture Videos
  • 12. Session Summary • Introduction of Bluetooth • Architecture of Bluetooth – Piconet and Scatternet • Bluetooth Layers [ Radio, Base Band, L2cap Layers – Functions] • Frame Format of Blutooth and its Types [1 slot, 3 slot, 5 slot] Visit www.youtube.com/GURUKULA for Lecture Videos
  • 13. References: • Behrouz A. Forouzan, ―Data communication and Networking, Fifth Edition, Tata McGraw – Hill, 2013 • Larry L. Peterson, Bruce S. Davie, ―Computer Networks: A Systems Approach, Fifth Edition, Morgan Kaufmann Publishers, 2011. • Few online References (Will be Mentioned in the description Section) Thank You…