SlideShare une entreprise Scribd logo
1  sur  63
Télécharger pour lire hors ligne
Ayesha Saeed
Qurat-ul-Ain
Fatima Syed
Amna Naveed
What is Bluetooth?
“Bluetooth wireless technology is an open specification for a
low-cost, low-power, short-range radio technology for ad-hoc
wireless communication of voice and data anywhere in the
world.”
One of the first modules (Ericsson) A recent module
Bluetooth Goals & Vision
• Originally conceived as a cable replacement
technology
• Short-Range Wireless Solutions
• Open Specification
• Voice and Data Capability
• Worldwide Usability
Present wireless technology like Infra Red data
communication has two problems :
1)Line of Sight
2) One to One
BLUETOOTH OVERCOMES THESE PROBLEMS
Bluetooth vs. IRD
Bluetooth
• Point to Multipoint
• Data & Voice
• Easier Synchronization due to
omni-directional and no LOS
requirement
• Devices can be mobile
• Range 10 m
IRD
• Point to point
• Intended for Data Communication
• Infrared, LOS communication
• Both devices must be stationary,
for synchronization
• Range 1 m
Logo
• A Scandinavian firm originally designed the logo at the time the SIG
(Special Interest Group) was formally introduced to the public
• The logo unites the Runic alphabetic characters "H", which looks
similar to an asterisk, and a "B", which are the initials for Herald
Bluetooth
Bluetooth History
When does it appear?
1994 – Ericsson study on a wireless technology to link
mobile phones & accessories.
5 companies joined to form the Bluetooth Special Interest
Group (SIG) in 1998.
First specification released in July 1999.
Timeline
1994 : Ericsson study complete / vision
1995 : Engineering work begins
1997 : Intel agrees to collaborate
1998 : Bluetooth SIG formed: Ericsson, Intel, IBM, Nokia & Toshiba
1999 : Bluetooth Specification 1.0A SIG promoter group expanded
2000 : Bluetooth Specification 1.0B, 2000+ adopters
2001 : First retail products released, Specification 1.1
2003 : Bluetooth Specification 1.2
2005 : Bluetooth Specification 2.0
Special Interest Group
The Bluetooth Special Interest Group comprises more than 1000
companies:
Different Versions of Bluetooth
• Bluetooth 1.1:
Offers Only some Basic Features. The first Bluetooth core
specification version 1.1 was introduced in 1998
• Bluetooth 1.2:
New features to eliminate radio frequency interference
through frequency hopping and added greater security. It was
released in 2003.
• Bluetooth 2.0:
In 2004,Bluetooth version 2.0 + EDR(Enhanced data rate)
was introduced
Different Versions of Bluetooth
• Bluetooth 2.1:
The SIG then introduced version 2.1, which improved
pairing without the need for a PIN, requires even lower
power consumption, and offers more security.
• Bluetooth 3.0:
Created in 2009, Bluetooth 3.0 added the ability to use a
Wi-Fi connection to increase data transmission speeds
• Bluetooth 4.0:
Most recent is Bluetooth 4.0. Its major feature is Bluetooth
Low Energy, essentially strong power management skills.
The Basic Idea
• Bluetooth is a standard for a small , cheap radio chip to
be plugged into computers, printers, mobile phones, etc
• Bluetooth chip is designed to replace cables.
Information normally carried by the cable, is
transmitted at a special frequency to a receiver
Bluetooth chip.
• These devices can form a quick ad-hoc secure “piconet”
and start communication.
• Connections in the “piconets” can occur even when
mobile.
Requirements
• Low cost as cables – chip $5
• Secure as cables – must support authentication and
encryption
• Must support both data and voice.
• Must connect to a variety of devices.
• Must be able to function in a noisy environment.
• Data rates – 721kbps , using the 2.45Ghz radio
frequency band –I.S.M (Industrial, scientific and
medical)
• Must support many simultaneous and private
“piconets”.
• Must be low power, compact and global.
Bluetooth Classes
The following table compares the available
Bluetooth classes:
Bluetooth Classes
• If you wish to communicate over the 100m range, you
will need a class 3 Bluetooth device at both ends.
• If you wish to communicate over the 10m range, you can
have a class 2 device at both ends.
Bluetooth Classes
By: Qurat-ul-Ain
Piconet-word
• Pico- Small
• Net- Network
The word “Piconet" literally means "very small network."
Piconet
• A piconet is an ad-hoc computer network linking a wireless
user group of devices using Bluetooth technology protocols.
A collection of devices connected via
Bluetooth technology in an ad hoc fashion
Piconet….cont.
• A piconet starts with two connected devices, and may grow
to eight connected devices.
• Master
• Slaves (up to 7)
One of the Bluetooth devices as a main controlling
unit or MASTER unit
Other devices that follow the master unit are SLAVE units.
Piconet….cont.
• The master device acts as the hub, meaning the slave devices must
communicate through the master device in order to communicate with
each other. In most piconets, the computer serves as the master device.
• one master device interconnect with up to seven active slave devices using
a three-bit MAC address. In addition to this a further 255 slave devices can
be connected in an "inactive", or "parked" mode, which can be made
"active" at any time by the master device.
Each active device within a piconet is identifiable by a 3-bit
active device address.
• A master is the only one that may initiate a Bluetooth communication link.
However, once a link is established, the slave may request a master/slave
switch to become the master. Slaves are not allowed to talk to each other
directly. All communication occurs within the slave and the master.
• Where higher number of Bluetooth enabled devices need to communicate
for data exchange, the master Bluetooth-enabled device is capable of
swapping the active slaves for the parked slaves in a round robin sequence,
normally based of priority assigned.
How Piconet Works?
• Bluetooth piconets utilize frequency hopping.
• 79 frequencies are used and The frequency hopping is done
at a rate of 1600 times a second.
• Devices use an assigned frequency of 2.45 GHz, a frequency
set aside for this purpose by the ISM(Industrial Scientific and
Medical) frequency band.
Working…Cont.
• Each piconet has a unique master with it’s
>>Unique Bluetooth device address (BD_ADDR)
>>Clock
• Therefore, each piconet has its unique frequency hopping
sequence.
• When a connection is initiated by Bluetooth enabled devices,
the master device’s clock along with the device address
(BD_AAR) is transmitted to the slave devices in a packet known
as Frequency-Hop Synchronization Packet (FHS packet).
The device address of the master device is used to calculate the
sequence of frequency hops which all devices within a
piconet, follow. The clock of the master device assigns the
sequence of the frequency hops.
All devices within a piconet use the difference between their
own native clock and the master’s native clock to make use of
particular frequency in order to transmit or receive radio
signals on a particular moment.
• Using this method, the Bluetooth devices within a piconet are
able to avoid one another’s transmission by persistently
changing frequency channels.
Piconet…Features
• A piconet typically has a range of about 30 feet (or 10 meters).
Piconet range varies according to the class of the Bluetooth
device. Data transfer rates vary between about 200 and
2100 kilobits per second.
• Because the Bluetooth system hops over 79 channels, the probability of
interfering with another Bluetooth system is less than 1.5%. This allows
several Bluetooth Piconets to operate in the same area at the same time
with minimal interference.
After a Bluetooth device has been added to the temporary network (the
Piconet), each device is assigned a specific time period to transmit and
they do not collide or overlap with other units operating within the same
Piconet.
• Piconets can be setup to interact with other Piconets to form larger
networks called Scatternets. Scatternets allow the master in one Piconet to
operate as a slave in another Piconet. While this allows Bluetooth devices
in one Piconet to communicate with devices in another Piconet.
Piconet… Safety
• A Bluetooth piconet has encryption and verification built in to
the devises upon which it resides.
• There are error-correction schemas and a 4-digit PIN is used
on the master device to authenticate the user. However,
other devices may not be equipped with a PIN
authentication.
Fatima Syed
Bluetooth Applications
Bluetooth provides support for three general application
areas:
• Data and voice access points
• Cable replacement
• Ad hoc networking
Usage Models
Set of protocols that implement a particular Bluetooth-based
application. Some of the highest priority usage models are:
• File transfer
• Internet bridge
• LAN access
• Synchronization
• Three-in-one phone
• Headset
File Transfer
File Transfer
• one of the most fundamental and useful applications
• simple point-to-point links to exchange files and other data
objects
• removes the need for cables
• much easier to form temporary links between devices to
quickly exchange data
• also includes the capability to browse folders on a remote
device.
Internet Bridge
Internet Bridge
• PC is wirelessly connected to a mobile phone or cordless
modem to provide dial-up networking and fax capabilities.
• AT-commands (Attention commands) are needed to control
the Mobile phone or modem.
LAN Access
LAN Access
• This usage model enables devices on a piconet to access a
LAN. Once connected, a device functions as if it were
directly connected (wired) to a LAN.
Synchronization
Synchronization
• It provides a device-to-device (phone, PDA, computer, etc.)
synchronization of the PIM (personal information
management) information such as phonebook, calendar,
message and note information.
• It requires task information to be transferred and processed
by devices utilizing a common protocol and format.
Three-in-one Phone
Three-in-one Phone
Telephone handsets may connect to three different service
providers and act as a:
• Walkie-talkie or handset extension
• Cellular phone
• Cordless phone connecting to a voice access point
The Ultimate Headset
The Ultimate Headset
• Headset is wirelessly connected to act as a remote device’s
audio input and output interface
• Increases user’s freedom of movement
• Headset must be able to send AT-commands (Attention
commands) and receive result codes
AT Commands
• AT is the abbreviation of Attention
• AT commands are instructions used to control and
communicate with a modem
• These commands modify modem's behavior or instruct
the modem to do something specific, such as dialing a
telephone number
Amna Naveed
Bluetooth Architecture
• The Bluetooth technology is divided
into two specifications:
the core and the profile specifications.
• The core specification discusses how
the technology works
• The profile specification focuses on
how to build interoperating devices
using the core technologies.
Bluetooth Architecture
• RF(radio frequency):
The Radio (layer) is the lowest defined
layer. It defines the requirements
of the Bluetooth transceiver device
operating in the 2.4GHz ISM band.
Transmits data to and from the Baseband
• Baseband:
Establishes and manages the physical
radio frequency (RF) link between
Bluetooth units that form a piconet.
Bluetooth Architecture
• LMP:
Link management protocol responsible
for control of radio links.
• L2CAP:
logical link control and adaptation
protocol provides multiplexing,
Segmentation.
• RFCOMM:
radio frequency communication,
serial port emulation.
• HID:
Human interface device for peripheral devices.
Types of links
• Synchronous Connection Oriented(SCO) link.
• Asynchronous Connectionless Link
Synchronous Connection Oriented(SCO) link
• SCO is a type of communication link that provides for the
continuous transfer of data in pre-assigned time periods.
• Point to point full duplex link.
• The SCO link reserves slots between the master and the
slave.
• Time slot is reserved at every fixed interval.
• Used for a circuit switching voice connection.
• Needs an asynchronous connectionless (ACL) type link to be
first established.
Asynchronous Connectionless Link
• ACL is a type of communication link that can send data in
bursts whenever data is ready to be sent.
• when the communication channel (radio channel) is
available (not transmitting another transmission).
• ACL connections can use various types of flow control such
as reliable or time bounded.
• This is a packet switched link between a master and slave.
• The Bluetooth system has two types of ACL links control
(ACL-C) and user data (ACL-U).
Bluetooth packets
• Bluetooth supports a wide variety of packet types
depending on the type of link, throughput and bit fault
tolerance.
• Data packets
SCO packet –for circuit switching
ACL packet –for packet switching
• On SCO links packets for low, medium and high quality
voice as well as combined data and voice are supported.
• For ACL links 1, 3 and 5 slot packets using medium and
high data rates are supported.
Bluetooth packet format
Access code
• The 72-bit access code is mainly used to identify
packets transmitted over a Bluetooth channel.
• All data packets sent on the channel share the same
access code.
• In addition the access code is used for device paging
(finding out if a specific device is in range) and
inquiries (used to discover new devices).
Header
• The 18-bit packet header contains the following
information
• A 3-bit target device address
• A 4-bit type code. Identifies the type of data or control
packet.
• A 1-bit fields for flow control, sequencing and packet
acknowledgement.
• An 8-bit header error check
• To protect the header from transmission errors each bit
is repeated three times in yielding a total length of 54 bits
Payload
• The payload part (0 to 2745 bits) of the packet carries
the actual data.
Error Correction Schemes
• Forward error correction(1/3 and 2/3)
• Automatic Repeat Request scheme.
Forward error correction(FEC)
• FEC is a technique for detecting and correcting errors by
adding a small number of extra bits.
• FEC allows optical transmission over longer distances by
correcting errors that can happen as the signal-to-noise
ratio decreases with distance.
• Within Bluetooth technology, there are 2 versions of this
1/3 FEC and 2/3 FEC.
• 1/3 FEC is a simple 3-times repetition of each info bit.
• 2/3 FEC is a shortened Hamming code.
Automatic Repeat Request scheme
• Also referred to as ”backward error correction”.
• This is an error control technique in this every block of data
received is checked using the error detection code used, and
if the check fails, retransmission of the data is requested
this may be done repeatedly, until the data can be verified.
“Things that think…
don’t make sense unless they link.”
- Nicholas Negroponte, MIT Media
Laboratory
Thank You!

Contenu connexe

Tendances

Bluetooth Technology & Security
Bluetooth Technology & SecurityBluetooth Technology & Security
Bluetooth Technology & SecurityHimangshu Hazra
 
Introduction to Bluetooth technology
Introduction to Bluetooth technologyIntroduction to Bluetooth technology
Introduction to Bluetooth technologyDavid Livingston J
 
bluetooth-security
bluetooth-securitybluetooth-security
bluetooth-securityAnand Dhana
 
Wireless communication technologies
Wireless communication technologiesWireless communication technologies
Wireless communication technologiesChandrakant Choure
 
Bluetooth Power point presentation
Bluetooth Power point presentationBluetooth Power point presentation
Bluetooth Power point presentationjogiparthyramya
 
BLUETOOTH TECHNOLOGY
BLUETOOTH TECHNOLOGYBLUETOOTH TECHNOLOGY
BLUETOOTH TECHNOLOGYAJAL A J
 
Bluetooth technology by polite group
Bluetooth technology by polite groupBluetooth technology by polite group
Bluetooth technology by polite grouppolitegcuf
 
Bluetooth based smart sensor devices 2
Bluetooth based smart sensor devices 2Bluetooth based smart sensor devices 2
Bluetooth based smart sensor devices 2Vijay Kribpz
 
BLUETOOTH SECURITY
BLUETOOTH SECURITYBLUETOOTH SECURITY
BLUETOOTH SECURITYJay Nagar
 
Bluetooth Technology and its uses by Prince Rohan
Bluetooth Technology and its uses by Prince RohanBluetooth Technology and its uses by Prince Rohan
Bluetooth Technology and its uses by Prince RohanRohan Das
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technologyRohit Roy
 
Bluetooth Based Smart Sensor Network
Bluetooth Based Smart Sensor NetworkBluetooth Based Smart Sensor Network
Bluetooth Based Smart Sensor NetworkGyanendra Prakash
 
Wireless communication
Wireless communicationWireless communication
Wireless communicationLiton Ahmed
 

Tendances (20)

Bluetooth Technology & Security
Bluetooth Technology & SecurityBluetooth Technology & Security
Bluetooth Technology & Security
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth presentation
Bluetooth presentationBluetooth presentation
Bluetooth presentation
 
Introduction to Bluetooth technology
Introduction to Bluetooth technologyIntroduction to Bluetooth technology
Introduction to Bluetooth technology
 
Wireless communaction
Wireless communactionWireless communaction
Wireless communaction
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
bluetooth-security
bluetooth-securitybluetooth-security
bluetooth-security
 
Wireless communication technologies
Wireless communication technologiesWireless communication technologies
Wireless communication technologies
 
Bluetooth Power point presentation
Bluetooth Power point presentationBluetooth Power point presentation
Bluetooth Power point presentation
 
BLUETOOTH TECHNOLOGY
BLUETOOTH TECHNOLOGYBLUETOOTH TECHNOLOGY
BLUETOOTH TECHNOLOGY
 
Bluetooth.ppt
Bluetooth.pptBluetooth.ppt
Bluetooth.ppt
 
Bluetooth technology by polite group
Bluetooth technology by polite groupBluetooth technology by polite group
Bluetooth technology by polite group
 
Bluetooth based smart sensor devices 2
Bluetooth based smart sensor devices 2Bluetooth based smart sensor devices 2
Bluetooth based smart sensor devices 2
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
BLUETOOTH SECURITY
BLUETOOTH SECURITYBLUETOOTH SECURITY
BLUETOOTH SECURITY
 
Bluetooth PPT Report
Bluetooth PPT ReportBluetooth PPT Report
Bluetooth PPT Report
 
Bluetooth Technology and its uses by Prince Rohan
Bluetooth Technology and its uses by Prince RohanBluetooth Technology and its uses by Prince Rohan
Bluetooth Technology and its uses by Prince Rohan
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
 
Bluetooth Based Smart Sensor Network
Bluetooth Based Smart Sensor NetworkBluetooth Based Smart Sensor Network
Bluetooth Based Smart Sensor Network
 
Wireless communication
Wireless communicationWireless communication
Wireless communication
 

En vedette

Nokia Asha webinar: Developing health-care applications for Nokia Asha phones
Nokia Asha webinar: Developing health-care applications for Nokia Asha phonesNokia Asha webinar: Developing health-care applications for Nokia Asha phones
Nokia Asha webinar: Developing health-care applications for Nokia Asha phonesMicrosoft Mobile Developer
 
Bluetooth Smart: Connecting Medical Devices to Smart Phones
Bluetooth Smart: Connecting Medical Devices to Smart PhonesBluetooth Smart: Connecting Medical Devices to Smart Phones
Bluetooth Smart: Connecting Medical Devices to Smart PhonesCambridge Consultants
 
Past, Present and Future of Mobile Computing
Past, Present and Future of Mobile ComputingPast, Present and Future of Mobile Computing
Past, Present and Future of Mobile ComputingDavid Livingston J
 
Android Bluetooth Introduction
Android Bluetooth IntroductionAndroid Bluetooth Introduction
Android Bluetooth IntroductionErin Yueh
 
Bluetooth technology 31 12
Bluetooth technology 31 12Bluetooth technology 31 12
Bluetooth technology 31 12mohamedobaid
 
El software y el hardware del computador
El software y el hardware del computadorEl software y el hardware del computador
El software y el hardware del computadorJENNIFER ROJAS QUINTERO
 
Can we fix it? Solving Britain's housing crisis.
Can we fix it? Solving Britain's housing crisis.Can we fix it? Solving Britain's housing crisis.
Can we fix it? Solving Britain's housing crisis.ResolutionFoundation
 
Ευαισθητοποίηση κατά του ρατσισμού
Ευαισθητοποίηση κατά του ρατσισμού Ευαισθητοποίηση κατά του ρατσισμού
Ευαισθητοποίηση κατά του ρατσισμού epi08
 
Engineering Mechanice Lecture 07
Engineering Mechanice Lecture 07Engineering Mechanice Lecture 07
Engineering Mechanice Lecture 07Self-employed
 
Prezitutoriasblog
PrezitutoriasblogPrezitutoriasblog
Prezitutoriasblogbrinex
 

En vedette (20)

Nokia Asha webinar: Developing health-care applications for Nokia Asha phones
Nokia Asha webinar: Developing health-care applications for Nokia Asha phonesNokia Asha webinar: Developing health-care applications for Nokia Asha phones
Nokia Asha webinar: Developing health-care applications for Nokia Asha phones
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth
Bluetooth Bluetooth
Bluetooth
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
 
Bluetooth Smart: Connecting Medical Devices to Smart Phones
Bluetooth Smart: Connecting Medical Devices to Smart PhonesBluetooth Smart: Connecting Medical Devices to Smart Phones
Bluetooth Smart: Connecting Medical Devices to Smart Phones
 
Past, Present and Future of Mobile Computing
Past, Present and Future of Mobile ComputingPast, Present and Future of Mobile Computing
Past, Present and Future of Mobile Computing
 
IT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTINGIT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTING
 
Android Bluetooth Introduction
Android Bluetooth IntroductionAndroid Bluetooth Introduction
Android Bluetooth Introduction
 
Bluetooth technology 31 12
Bluetooth technology 31 12Bluetooth technology 31 12
Bluetooth technology 31 12
 
Question 1
Question 1Question 1
Question 1
 
Public Sector Enterprises Newsletter, January 2014
Public Sector Enterprises Newsletter, January 2014Public Sector Enterprises Newsletter, January 2014
Public Sector Enterprises Newsletter, January 2014
 
El software y el hardware del computador
El software y el hardware del computadorEl software y el hardware del computador
El software y el hardware del computador
 
Can we fix it? Solving Britain's housing crisis.
Can we fix it? Solving Britain's housing crisis.Can we fix it? Solving Britain's housing crisis.
Can we fix it? Solving Britain's housing crisis.
 
Ευαισθητοποίηση κατά του ρατσισμού
Ευαισθητοποίηση κατά του ρατσισμού Ευαισθητοποίηση κατά του ρατσισμού
Ευαισθητοποίηση κατά του ρατσισμού
 
Realtors 6 13-13 present
Realtors 6 13-13 presentRealtors 6 13-13 present
Realtors 6 13-13 present
 
C8600 cn
C8600 cnC8600 cn
C8600 cn
 
Engineering Mechanice Lecture 07
Engineering Mechanice Lecture 07Engineering Mechanice Lecture 07
Engineering Mechanice Lecture 07
 
Prezitutoriasblog
PrezitutoriasblogPrezitutoriasblog
Prezitutoriasblog
 

Similaire à Bluetooth Basic Version

Similaire à Bluetooth Basic Version (20)

Bluetooth basic
Bluetooth basicBluetooth basic
Bluetooth basic
 
BluetoothSecurity.ppt
BluetoothSecurity.pptBluetoothSecurity.ppt
BluetoothSecurity.ppt
 
BluetoothSecurity.ppt
BluetoothSecurity.pptBluetoothSecurity.ppt
BluetoothSecurity.ppt
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Overview of Bluetooth technology
Overview of Bluetooth technologyOverview of Bluetooth technology
Overview of Bluetooth technology
 
Bluetooth.ppt
Bluetooth.pptBluetooth.ppt
Bluetooth.ppt
 
PPT on Bluetooth Based Wireless Sensor Networks
PPT on Bluetooth Based Wireless Sensor NetworksPPT on Bluetooth Based Wireless Sensor Networks
PPT on Bluetooth Based Wireless Sensor Networks
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
BLUETOOTH.ppt
BLUETOOTH.pptBLUETOOTH.ppt
BLUETOOTH.ppt
 
Data_Processing_and_communication_bluetooth.pptx
Data_Processing_and_communication_bluetooth.pptxData_Processing_and_communication_bluetooth.pptx
Data_Processing_and_communication_bluetooth.pptx
 
Bluetooth Presentation
Bluetooth PresentationBluetooth Presentation
Bluetooth Presentation
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth ppt
Bluetooth pptBluetooth ppt
Bluetooth ppt
 
Bluetooth
Bluetooth Bluetooth
Bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth Technology
 

Dernier

Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...BookNet Canada
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Karmanjay Verma
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...Karmanjay Verma
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Jeffrey Haguewood
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 

Dernier (20)

Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 

Bluetooth Basic Version

  • 2. What is Bluetooth? “Bluetooth wireless technology is an open specification for a low-cost, low-power, short-range radio technology for ad-hoc wireless communication of voice and data anywhere in the world.” One of the first modules (Ericsson) A recent module
  • 3. Bluetooth Goals & Vision • Originally conceived as a cable replacement technology • Short-Range Wireless Solutions • Open Specification • Voice and Data Capability • Worldwide Usability
  • 4. Present wireless technology like Infra Red data communication has two problems : 1)Line of Sight 2) One to One BLUETOOTH OVERCOMES THESE PROBLEMS
  • 5. Bluetooth vs. IRD Bluetooth • Point to Multipoint • Data & Voice • Easier Synchronization due to omni-directional and no LOS requirement • Devices can be mobile • Range 10 m IRD • Point to point • Intended for Data Communication • Infrared, LOS communication • Both devices must be stationary, for synchronization • Range 1 m
  • 6. Logo • A Scandinavian firm originally designed the logo at the time the SIG (Special Interest Group) was formally introduced to the public • The logo unites the Runic alphabetic characters "H", which looks similar to an asterisk, and a "B", which are the initials for Herald Bluetooth
  • 7. Bluetooth History When does it appear? 1994 – Ericsson study on a wireless technology to link mobile phones & accessories. 5 companies joined to form the Bluetooth Special Interest Group (SIG) in 1998. First specification released in July 1999.
  • 8. Timeline 1994 : Ericsson study complete / vision 1995 : Engineering work begins 1997 : Intel agrees to collaborate 1998 : Bluetooth SIG formed: Ericsson, Intel, IBM, Nokia & Toshiba 1999 : Bluetooth Specification 1.0A SIG promoter group expanded 2000 : Bluetooth Specification 1.0B, 2000+ adopters 2001 : First retail products released, Specification 1.1 2003 : Bluetooth Specification 1.2 2005 : Bluetooth Specification 2.0
  • 9. Special Interest Group The Bluetooth Special Interest Group comprises more than 1000 companies:
  • 10. Different Versions of Bluetooth • Bluetooth 1.1: Offers Only some Basic Features. The first Bluetooth core specification version 1.1 was introduced in 1998 • Bluetooth 1.2: New features to eliminate radio frequency interference through frequency hopping and added greater security. It was released in 2003. • Bluetooth 2.0: In 2004,Bluetooth version 2.0 + EDR(Enhanced data rate) was introduced
  • 11. Different Versions of Bluetooth • Bluetooth 2.1: The SIG then introduced version 2.1, which improved pairing without the need for a PIN, requires even lower power consumption, and offers more security. • Bluetooth 3.0: Created in 2009, Bluetooth 3.0 added the ability to use a Wi-Fi connection to increase data transmission speeds • Bluetooth 4.0: Most recent is Bluetooth 4.0. Its major feature is Bluetooth Low Energy, essentially strong power management skills.
  • 12. The Basic Idea • Bluetooth is a standard for a small , cheap radio chip to be plugged into computers, printers, mobile phones, etc • Bluetooth chip is designed to replace cables. Information normally carried by the cable, is transmitted at a special frequency to a receiver Bluetooth chip. • These devices can form a quick ad-hoc secure “piconet” and start communication. • Connections in the “piconets” can occur even when mobile.
  • 13. Requirements • Low cost as cables – chip $5 • Secure as cables – must support authentication and encryption • Must support both data and voice. • Must connect to a variety of devices. • Must be able to function in a noisy environment. • Data rates – 721kbps , using the 2.45Ghz radio frequency band –I.S.M (Industrial, scientific and medical) • Must support many simultaneous and private “piconets”. • Must be low power, compact and global.
  • 14. Bluetooth Classes The following table compares the available Bluetooth classes:
  • 15. Bluetooth Classes • If you wish to communicate over the 100m range, you will need a class 3 Bluetooth device at both ends. • If you wish to communicate over the 10m range, you can have a class 2 device at both ends.
  • 18. Piconet-word • Pico- Small • Net- Network The word “Piconet" literally means "very small network."
  • 19. Piconet • A piconet is an ad-hoc computer network linking a wireless user group of devices using Bluetooth technology protocols. A collection of devices connected via Bluetooth technology in an ad hoc fashion
  • 20. Piconet….cont. • A piconet starts with two connected devices, and may grow to eight connected devices. • Master • Slaves (up to 7) One of the Bluetooth devices as a main controlling unit or MASTER unit Other devices that follow the master unit are SLAVE units.
  • 21.
  • 22. Piconet….cont. • The master device acts as the hub, meaning the slave devices must communicate through the master device in order to communicate with each other. In most piconets, the computer serves as the master device. • one master device interconnect with up to seven active slave devices using a three-bit MAC address. In addition to this a further 255 slave devices can be connected in an "inactive", or "parked" mode, which can be made "active" at any time by the master device. Each active device within a piconet is identifiable by a 3-bit active device address.
  • 23. • A master is the only one that may initiate a Bluetooth communication link. However, once a link is established, the slave may request a master/slave switch to become the master. Slaves are not allowed to talk to each other directly. All communication occurs within the slave and the master. • Where higher number of Bluetooth enabled devices need to communicate for data exchange, the master Bluetooth-enabled device is capable of swapping the active slaves for the parked slaves in a round robin sequence, normally based of priority assigned.
  • 24. How Piconet Works? • Bluetooth piconets utilize frequency hopping. • 79 frequencies are used and The frequency hopping is done at a rate of 1600 times a second. • Devices use an assigned frequency of 2.45 GHz, a frequency set aside for this purpose by the ISM(Industrial Scientific and Medical) frequency band.
  • 25. Working…Cont. • Each piconet has a unique master with it’s >>Unique Bluetooth device address (BD_ADDR) >>Clock • Therefore, each piconet has its unique frequency hopping sequence. • When a connection is initiated by Bluetooth enabled devices, the master device’s clock along with the device address (BD_AAR) is transmitted to the slave devices in a packet known as Frequency-Hop Synchronization Packet (FHS packet).
  • 26. The device address of the master device is used to calculate the sequence of frequency hops which all devices within a piconet, follow. The clock of the master device assigns the sequence of the frequency hops.
  • 27. All devices within a piconet use the difference between their own native clock and the master’s native clock to make use of particular frequency in order to transmit or receive radio signals on a particular moment. • Using this method, the Bluetooth devices within a piconet are able to avoid one another’s transmission by persistently changing frequency channels.
  • 28. Piconet…Features • A piconet typically has a range of about 30 feet (or 10 meters). Piconet range varies according to the class of the Bluetooth device. Data transfer rates vary between about 200 and 2100 kilobits per second. • Because the Bluetooth system hops over 79 channels, the probability of interfering with another Bluetooth system is less than 1.5%. This allows several Bluetooth Piconets to operate in the same area at the same time with minimal interference.
  • 29. After a Bluetooth device has been added to the temporary network (the Piconet), each device is assigned a specific time period to transmit and they do not collide or overlap with other units operating within the same Piconet. • Piconets can be setup to interact with other Piconets to form larger networks called Scatternets. Scatternets allow the master in one Piconet to operate as a slave in another Piconet. While this allows Bluetooth devices in one Piconet to communicate with devices in another Piconet.
  • 30. Piconet… Safety • A Bluetooth piconet has encryption and verification built in to the devises upon which it resides. • There are error-correction schemas and a 4-digit PIN is used on the master device to authenticate the user. However, other devices may not be equipped with a PIN authentication.
  • 32. Bluetooth Applications Bluetooth provides support for three general application areas: • Data and voice access points • Cable replacement • Ad hoc networking
  • 33. Usage Models Set of protocols that implement a particular Bluetooth-based application. Some of the highest priority usage models are: • File transfer • Internet bridge • LAN access • Synchronization • Three-in-one phone • Headset
  • 35. File Transfer • one of the most fundamental and useful applications • simple point-to-point links to exchange files and other data objects • removes the need for cables • much easier to form temporary links between devices to quickly exchange data • also includes the capability to browse folders on a remote device.
  • 37. Internet Bridge • PC is wirelessly connected to a mobile phone or cordless modem to provide dial-up networking and fax capabilities. • AT-commands (Attention commands) are needed to control the Mobile phone or modem.
  • 39. LAN Access • This usage model enables devices on a piconet to access a LAN. Once connected, a device functions as if it were directly connected (wired) to a LAN.
  • 41. Synchronization • It provides a device-to-device (phone, PDA, computer, etc.) synchronization of the PIM (personal information management) information such as phonebook, calendar, message and note information. • It requires task information to be transferred and processed by devices utilizing a common protocol and format.
  • 43. Three-in-one Phone Telephone handsets may connect to three different service providers and act as a: • Walkie-talkie or handset extension • Cellular phone • Cordless phone connecting to a voice access point
  • 45. The Ultimate Headset • Headset is wirelessly connected to act as a remote device’s audio input and output interface • Increases user’s freedom of movement • Headset must be able to send AT-commands (Attention commands) and receive result codes
  • 46. AT Commands • AT is the abbreviation of Attention • AT commands are instructions used to control and communicate with a modem • These commands modify modem's behavior or instruct the modem to do something specific, such as dialing a telephone number
  • 48. Bluetooth Architecture • The Bluetooth technology is divided into two specifications: the core and the profile specifications. • The core specification discusses how the technology works • The profile specification focuses on how to build interoperating devices using the core technologies.
  • 49. Bluetooth Architecture • RF(radio frequency): The Radio (layer) is the lowest defined layer. It defines the requirements of the Bluetooth transceiver device operating in the 2.4GHz ISM band. Transmits data to and from the Baseband • Baseband: Establishes and manages the physical radio frequency (RF) link between Bluetooth units that form a piconet.
  • 50. Bluetooth Architecture • LMP: Link management protocol responsible for control of radio links. • L2CAP: logical link control and adaptation protocol provides multiplexing, Segmentation. • RFCOMM: radio frequency communication, serial port emulation. • HID: Human interface device for peripheral devices.
  • 51. Types of links • Synchronous Connection Oriented(SCO) link. • Asynchronous Connectionless Link
  • 52. Synchronous Connection Oriented(SCO) link • SCO is a type of communication link that provides for the continuous transfer of data in pre-assigned time periods. • Point to point full duplex link. • The SCO link reserves slots between the master and the slave. • Time slot is reserved at every fixed interval. • Used for a circuit switching voice connection. • Needs an asynchronous connectionless (ACL) type link to be first established.
  • 53. Asynchronous Connectionless Link • ACL is a type of communication link that can send data in bursts whenever data is ready to be sent. • when the communication channel (radio channel) is available (not transmitting another transmission). • ACL connections can use various types of flow control such as reliable or time bounded. • This is a packet switched link between a master and slave. • The Bluetooth system has two types of ACL links control (ACL-C) and user data (ACL-U).
  • 54. Bluetooth packets • Bluetooth supports a wide variety of packet types depending on the type of link, throughput and bit fault tolerance. • Data packets SCO packet –for circuit switching ACL packet –for packet switching • On SCO links packets for low, medium and high quality voice as well as combined data and voice are supported. • For ACL links 1, 3 and 5 slot packets using medium and high data rates are supported.
  • 56. Access code • The 72-bit access code is mainly used to identify packets transmitted over a Bluetooth channel. • All data packets sent on the channel share the same access code. • In addition the access code is used for device paging (finding out if a specific device is in range) and inquiries (used to discover new devices).
  • 57. Header • The 18-bit packet header contains the following information • A 3-bit target device address • A 4-bit type code. Identifies the type of data or control packet. • A 1-bit fields for flow control, sequencing and packet acknowledgement. • An 8-bit header error check • To protect the header from transmission errors each bit is repeated three times in yielding a total length of 54 bits
  • 58. Payload • The payload part (0 to 2745 bits) of the packet carries the actual data.
  • 59. Error Correction Schemes • Forward error correction(1/3 and 2/3) • Automatic Repeat Request scheme.
  • 60. Forward error correction(FEC) • FEC is a technique for detecting and correcting errors by adding a small number of extra bits. • FEC allows optical transmission over longer distances by correcting errors that can happen as the signal-to-noise ratio decreases with distance. • Within Bluetooth technology, there are 2 versions of this 1/3 FEC and 2/3 FEC. • 1/3 FEC is a simple 3-times repetition of each info bit. • 2/3 FEC is a shortened Hamming code.
  • 61. Automatic Repeat Request scheme • Also referred to as ”backward error correction”. • This is an error control technique in this every block of data received is checked using the error detection code used, and if the check fails, retransmission of the data is requested this may be done repeatedly, until the data can be verified.
  • 62. “Things that think… don’t make sense unless they link.” - Nicholas Negroponte, MIT Media Laboratory

Notes de l'éditeur

  1. Data and voice access points: Bluetooth facilitates real-time voice and data transmissions by providing effortless wireless connection of portable and stationary communication devices. Cable replacement: Bluetooth eliminates the need for numerous, often proprietary, cable attachments for connection of any kind of communication devices. Connections are instant and are maintained even when devices are not within line of sight. The range of each radio is approximately 10m but can be extended to 100m with an operational amplifier. Ad hoc networking: A device equipped with a Bluetooth radio can establish instant connection to another Bluetooth radio as soon as it comes into range.
  2. File transfer: One of the most fundamental and useful applications for any type of data networking, including simple point-to-point links (like those of Bluetooth wireless communication), is to exchange files and other data objects. File transfer using floppy disks or cables is common; wireless communication removes the need for cables, making it much easier to form temporary links between devices to quickly exchange files and other data objects. This same sort of file and object transfer is possible with Bluetooth wireless communication. The file transfer usage model supports the transfer of directories, files, documents, images and streaming media formats. It also includes the capability to browse folders on a remote device. In an interactive conference room scenario, business cards and files could be exchanged among the participants of the meeting. 
  3. Three-in-one phone: Telephone handsets that implement this usage model may connect to three different service providers. First, telephones may act as cordless phones connecting to the public switched telephone network (PSTN) at home or the office and incurring a fixed line charge. This scenario includes making calls via a voice base station, making direct calls between two terminals via the base station and accessing supplementary services provided by an external network. Second, telephones can connect directly to other telephones for the purpose of acting as a walkie-talkie or handset extension. Referred to as the intercom scenario, the connection incurs no additional charge. Third, the telephone may act as a cellular phone connecting to the cellular infrastructure and incurring cellular charges.
  4. Ultimate headset: The headset can be wirelessly connected for the purpose of acting as a remote device’s audio input and output interface. The headset increases the user’sfreedom of movement while maintaining call privacy. A common example is a scenario where a headset is used with a cellular handset, cordless handset, or personal computer for audio input and output. The headset must be able to send AT-commands (Attention commands) and receive result codes. This ability allows the headset to answer incoming calls and then terminate them without physically manipulating the telephone handset.