Discuss about the Introduction to Research Methods, The architecture of the Bluetooth technology is made up of different layers.
Architecture of Bluetooth Technology
Bluetooth is the wireless technology which is used for connecting the peripheral units for managing the short range wireless communication. “The basic problems which are seen in the Bluetooth technology are maintaining the version control of the different participating devices and the use of newer devices to manage connection with the older devices” (Mulliner, 2015). The control of information flow through the Bluetooth technology can be done by using the Bluetooth trademarks and Bluetooth certification process. There are some capabilities which are associated with the Bluetooth technology are:
- “Advanced audio distribution profile for managing the streamlining of wireless communication” (Gunnar, 2016).
- Hand free profile is used for sending and retrieving calls.
- Phone book access profile is used for accessing contacts from the call history.
- Message access profile is used for notifying the reading of the text messages and emails.
- Human interface device is used for managing the association of different devices.
- Personal area network is used for managing sharing of web connections on the local area network.
- Audio video remote control profile is used for controlling the TV signals.
Date |
Task |
Action |
Description |
2/ Aug/ 2017 |
Searching of the topic |
The list of topics is prepared |
Selection of the topic from the prepared list |
5/Aug/2017 |
Searching of the papers and different sources |
Saving and developing documentation |
Making the folder for the data collection |
10/Aug/2017 |
Reading of literature collected |
Reading of two research papers from the collection of paper which are relevant to the topic |
Relevancy with the selected topic |
12/Aug/2017 |
Reading of literature collected |
Reading of two research papers from the collection of paper which are relevant to the topic |
Relevancy with the selected topic |
15/Aug/2017 |
Reading of the paper |
Making notes of the research paper |
Write the research in your own words. |
The architecture of the Bluetooth technology is made up of different layers. “The Human computer interaction layer is responsible for managing separation between hardware and software” (Frenzel, 2012).
The architecture of the Bluetooth technology is made up of different layers. “The Human computer interaction layer is responsible for managing separation between hardware and software” (Frenzel, 2012). The implementation of the Bluetooth involves synchronization of following layers:
Bluetooth architecture Layer |
Description |
Application layer |
This layer is responsible for building profile guide for the application |
Telephone control system |
This layer deploys the telephony services |
Service discovery protocol |
This protocol is used for providing services to the remote Bluetooth devices |
WAP |
It provides the interface to the higher layer by making use of communication protocols. |
RFCOMM |
It is used for managing serial interface |
L2CAP |
It is used for managing multiplexing of data shared with higher layers |
HCI |
It is used for handling communication between host ad the Bluetooth technology |
Link manager protocol |
This protocol is used for managing configuration with devices |
Baseband and link controller |
This is used for managing physical links with the assemblage of packets. |
Radio waves |
Radio waves are used for modulation and demodulation in the transmission of data. |
The Bluetooth technology is used in deploying the wireless headsets, file transferring between different participating devices, use of wireless printers, use of wireless speakers, in the development of monitoring and reporting of devices, in monitoring sensors, and others. The major issue which is associated with the implementation of Bluetooth technology is of range. The range issue should be considered while dealing with the Bluetooth technology. The following table gives the clear concise concept of the Bluetooth range.
Categories |
Bluetooth 2.1 |
Bluetooth low energy |
Range |
It is near about 100 meters |
It is near about 100 meters |
Maximum range |
It is near about 100 meters |
It is near about 100 meters |
Frequency |
It is in between 2.402 and 2.481 GHz |
It is in between 2.402 and 2.481 GHz |
Maximum data transfer rate |
It is in between 1 to 3 Mbit / Sec |
It is around 1 Mbit / sec |
Throughput application |
It is in between 0.7 to 2.1 Mbit / sec |
It is up to 305 kbit / sec |
Topologies used |
Scatternet and point to point topologies are usually used |
Mesh and point to point topology are used |
Network Standard |
802.15.1 is the IEEE standard for Bluetooth |
802.15.1 is the IEEE standard for Bluetooth |
The range of the Bluetooth technology depends on the factors like output power generation associated with the transmitter, the sensitivity of the receiver, the physical obstacles which can come in the transmission path of the data, and the use of antennas. The performance of the Bluetooth devices depends upon the performance of the radio waves and the antennas used. The steps should be taken to improve the range of the Bluetooth devices for enhancing the distribution of the information between different participating devices. “The Bluetooth devices can communicate with the online services by making use of gateways” (Mahmood, 2014). The deployment of gateway is the best solution for managing the flow of information when the devices are placed in the large geographical area. The placement of the hubs can helps in handling direct connection between the devices. The mesh networking protocols can enhance the performance of the Bluetooth devices. The mesh network provides the gateway for accessing and sharing of information between the Bluetooth devices. “The broadcasting of the messages can be done in the mesh networking topology” (Rijah, 2017). The messages can instantly share between the participating units. The Bluetooth low energy network is successful in managing different devices for enabling sharing of information. The flow of information can be easily controlled in the Bluetooth environment. The central gateway is not required for managing the traffic on the network.
Capabilities of Bluetooth Technology
The qualitative and quantitative approach is used for analysing the result of the research on Bluetooth technology. “The questionnaire and interviews are the valuable methods which are used for reviewing the Bluetooth technology” (Purdy, 2012). The qualitative approach is used for focusing on the issues related with the Bluetooth technology.
Interviews: The face to face communication helps in analysing the advantages and disadvantages of Bluetooth technology.
Questionnaire: Questionnaire helps in formulation of open ended and close ended questions which are used for providing opportunities to research about the Bluetooth technology.
There are some misconceptions with the Bluetooth technology. Bluetooth is categorised as a short range technology which does not provide security to the Bluetooth network. It has been analysed that it is not confined to the short range devices. The standard range of the Bluetooth is expressed in the table below:
Classes |
Transmission power |
Intended Range |
Class 1 |
It is about 100 mw |
The range is less than 100 meters |
Class 2 |
It is about 2.5 mw |
The range is less than 10 meters |
Class 3 |
It is about 1 mw |
The range is less than 10 meters |
The mobile devices and the Bluetooth headsets come in the category of class 2. The Bluetooth is widely recognised in wireless LAN environment. Bluetooth enabled devices are used to connect LAN remotely. The Bluetooth network encapsulation profile depends upon the radio frequency communication protocols. The IP address of the host name is automatically managed by the wired interface. The vulnerabilities like buffer overflow can occur. The limited operations can be performed with the Bluetooth technology. The technical specification of the Bluetooth technologies is described in the table below:
Connection |
Frequency of spread spectrum |
Frequency band |
2.4 GHZ |
Use of modulation technique |
Gaussian frequency shift |
Use of MAC scheduling scheme |
FH-CDMA |
Use of transmission power |
Greater than 20 dbm |
Aggregation in the data rate |
It should be in between 0.721 to 1 Mbps |
Range |
It is in between 10m to 100 m |
Supported stations |
It can be 8 devices |
Use of voice channels |
3 |
Data security |
Use of 128 bit key |
Encryption mechanism for data security |
8 to 128 bit. |
The security methods are used for providing security to the Bluetooth. The levels of security are developed for measuring the security in the Bluetooth devices. The security provides the unauthorised access of data transmission. The authorization security methods are used for developing access control on the information. The access controls are the rules which are used during the operation for managing request and authentication of the device. The services should be granted for providing authorisation to the devices. There are various keys which are used for managing the operation permanently and temporarily such as link key, encrypted key, and pin key. The link key is used for permanent storage and non-volatile storage. The temporary keys are used for terminating the present situation. “The Pin key is used for selecting the fixed number by making use of encryption key” (Paavola, 2011). The mechanism of authentication is used for providing identity to the user for accessing the information. The new keys are generated for managing new connection with the connected devices. There are three modes which are used for managing the Bluetooth security. The security is not initiated with the Bluetooth devices. It is a non-secure mode which is used for providing authentication and encryption procedures for connecting the Bluetooth devices. The security procedures should not be used for establishing connection with the Bluetooth devices. There are different flexibility policies which are used for running the application. “The security manager mentioned the mode for accessing control to the services. The centralised security manager enforced the access control to the services. He is responsible for maintaining the interface between protocols” (Chaitanya, 2013). This mode supports the confidentiality of data, authentication, and authorization mechanism. The mode 3 is responsible for initiating security procedures for completing the link set up. The application layer security is not fixed in the security layer. The authentication and sharing procedures are used with the help of secret link key.
Range Issue and Its Factors
Many troubleshooting processes are carried out during the manufacturing of the Bluetooth devices. The compatibility issues which are associated with the Bluetooth devices are development of the newer compact devices which support computational power for Bluetooth connection within the specification of operating device. “The major issue which is associated with the implementation of Bluetooth technology is of range” (Clayton, 2013). The range issue should be considered while dealing with the Bluetooth technology. The range of the Bluetooth technology depends on the factors like output power generation associated with the transmitter, the sensitivity of the receiver, the physical obstacles which can come in the transmission path of the data, and the use of antennas. The errors in the operating system of the Bluetooth devices can be the cause of connection breakdown. The hardware issues are associated with the smart devices for the proper interaction with the operating system. The Bluetooth certification process result into the smooth functioning of the range issues. The problems of the range issues can be resolved by using the updated version of the Bluetooth in the devices. The devices should be controlled by making use of smart application. The Bluetooth version should be updated according to the new operating system. The connection problems should be resolved by using the updated procedures. The resetting of the Bluetooth devices should be done periodically. The streaming of data keeps the Bluetooth devices updated. The backward compatibility of the Bluetooth can be improved by updating the new products. The Bluetooth has the capability to jump between numbers of channels. it can be measured through channels used hundreds of time per second. When the error occurred in the Bluetooth technology, it should be resolved by updating the version.
The Bluetooth signals operate in the frequency band of 2.45 GHZ. The spread spectrum frequency hopping technology is used for managing the Bluetooth services and application. The interference can be controlled by using multiple frequencies at a single moment of time. The 10 meters is the approximate range of carrying Bluetooth signals between two devices for sharing of information. It helps in replacing the use of cables for establishing communication with the personal area network.
The interference is the major issue which exist between hands free headset and Bluetooth technology. The Bluetooth enabled devices are used for managing interface between different devices. The barriers like Bluetooth metal, concrete and plaster bricks, bulletproof glass, and etc. are used for overcoming the problem of interference. The router channel should be changed according to the need of the application. The rebooting of the Wi-Fi connection helps in managing the interference in the Bluetooth technology for communication. The router setting is used for changing and managing the channel manually. The Bluetooth devices should be move closer to the router used for transferring information between the devices. The change in frequencies can occur due to the occurrence of microwaves and florescent light. The connection issues can be resolved by updating the version of the operating system periodically. “The use of mesh topology and gateways are the preferred solution to resolve the range issues associated with the deployment of Bluetooth technology” (Bahl, 2015).
Security Methods and Modes for Bluetooth Devices
The Bluetooth is the wireless communication which is used for transmitting voice and data at a very high speed by making use of radio waves. “Bluetooth is the standard protocol which is used for managing short range radio communication between different associated devices” (Paul, 2014). The devices which are used for communication are mobile phones, entertainment system, electronics, and computer. The maximum distance which can exist within the different participating devices for managing Bluetooth communication should be approximately 10 meters. “The 2 mega-bit per second is the data transfer rate for information sharing” (Gaikwad, 2015). The operational frequency band for the Bluetooth technology is about 2.45 GHz. The microchip is used for data transfer in the devices which make use of Bluetooth technology. The link manager software is used for sending and receiving data in the Bluetooth technology. “The frequency hopping spectrum is used for developing multiple frequencies for limiting the interference between the participating multiple devices” (Goldsmith, 2014). The wireless communication should be developed between peripheral devices. The continuous exchange of data can be possible with the use of Bluetooth technology. The data applications can be streamlined for managing the continuous exchange of data. “The devices are capable of sending and receiving information at the same time” (Wright, 2015). There are various advantage of using Bluetooth low energy which are categorised as consumption of lower power in the same range, use of lower bandwidth, and others.
The focus of this paper is to determine the range issues associated with the use of Bluetooth wireless technology. There are some misconceptions which are associated with the use of Bluetooth technology. We will also focus on the threats and mitigation schemes which are deployed by the Bluetooth technology.
The objective of this paper is to focus on the range issues which are associated with the deployment of the Bluetooth technology. The paper also outlines the dependencies of the range in the Bluetooth scenario. The aim of this paper is to predict the methods used for improving the range of Bluetooth within the networking site.
Conclusion
The Bluetooth technology is used in deploying the wireless headsets, file transferring between different participating devices, use of wireless printers, use of wireless speakers, in the development of monitoring and reporting of devices, in monitoring sensors, and others. The range of the Bluetooth technology depends on the factors like output power generation associated with the transmitter, the sensitivity of the receiver, the physical obstacles which can come in the transmission path of the data, and the use of antennas. The deployment of gateway is the best solution for managing the flow of information when the devices are placed in the large geographical area. The placement of the hubs can helps in handling direct connection between the devices. The mesh networking protocols can enhance the performance of the Bluetooth devices. The Bluetooth version should be updated according to the new operating system. The connection problems should be resolved by using the updated procedures. The control of information flow through the Bluetooth technology can be done by using the Bluetooth trademarks and Bluetooth certification process. Bluetooth is the wireless technology which is used for connecting the peripheral units for managing the short range wireless communication.
References
Bahl, S. (2015). Gi Fi: Future of wirelss technology. 1st ed. [ebook]. https://www.ijarcce.com/upload/2015/june-15/IJARCCE%2018.pdf [Accessed 03 Sep. 2017].
Chaitanya, P. (2013). A review on improving technologies in wireless communications. 1st ed. [ebook]. https://www.ijettjournal.org/volume-4/issue-4/IJETT-V4I4P308.pdf [Accessed 03 Sep. 2017].
Clayton, B. (2013). A literature review of recent development in bluetooth networking. 1st ed. [ebook]. https://www.cs.ru.ac.za/research/g01c2974/honours/reports/literaturesurvey.pdf [Accessed 03 Sep. 2017].
Frenzel, L. (2012). The fundamentals of short range wireless technology. 1st ed. [ebook]. https://www.electronicdesign.com/communications/fundamentals-short-range-wireless-technology [Accessed 03 Sep. 2017].
Gaikwad, P. (2015). Bluetooth based smart automation system using android. 1st ed. [ebook]. https://www.ijsr.net/archive/v6i5/3051709.pdf [Accessed 03 Sep. 2017].
Goldsmith, C. (2014). Wireless local area network for device monitoring. 1st ed. [ebook]. https://auworkshop.autodesk.com/library/bim-curriculum-construction/4d-simulation-and-construction-planning [Accessed 03 Sep. 2017].
Gunnar, J. (2016). Things should be known about Bluetooth range. 1st ed. [ebook]. https://blog.nordicsemi.com/getconnected/things-you-should-know-about-bluetooth-range [Accessed 03 Sep. 2017].
Mahmood, A. (2014). A review of wireless communication for smart grid. 1st ed. [ebook]. https://www.researchgate.net/publication/264860124_A_Review_of_Wireless_Communications_for_Smart_Grid [Accessed 03 Sep. 2017].
Mulliner, C. (2015). Security and privacy issues of wireless technologies. 1st ed. [ebook]. https://www.cs.ucsb.edu/~almeroth/classes/tech-soc/2005-Fall/11-01.pdf [Accessed 03 Sep. 2017].
Paavola, M. (2011). Wireless technologies in process automation- Review and an application. 1st ed. [ebook]. https://jultika.oulu.fi/files/isbn9789514287053.pdf [Accessed 03 Sep. 2017].
Paul, Z. (2014). Short range wireless communication: Bluetooth, zigbee, and infrared transmission. 1st ed. [ebook]. https://study.com/academy/lesson/short-range-wireless-communication-bluetooth-zigbee-infrared-transmission.html [Accessed 03 Sep. 2017].
Purdy, K. (2012). Understanding Bluetooth pairing problems. 1st ed. [ebook]. https://thewirecutter.com/blog/understanding-bluetooth-pairing-problems/ [Accessed 03 Sep. 2017].
Rijah, U. (2017). Bluetooth security analysis and solution. 1st ed. [ebook]. https://www.ijsrp.org/research-paper-0416/ijsrp-p5252.pdf [Accessed 03 Sep. 2017].
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2021). Understanding Bluetooth Technology And Managing Range Issues In An Essay. (70 Characters). Retrieved from https://myassignmenthelp.com/free-samples/esp318-introduction-to-research-methods/wireless-communication.html.
"Understanding Bluetooth Technology And Managing Range Issues In An Essay. (70 Characters)." My Assignment Help, 2021, https://myassignmenthelp.com/free-samples/esp318-introduction-to-research-methods/wireless-communication.html.
My Assignment Help (2021) Understanding Bluetooth Technology And Managing Range Issues In An Essay. (70 Characters) [Online]. Available from: https://myassignmenthelp.com/free-samples/esp318-introduction-to-research-methods/wireless-communication.html
[Accessed 19 August 2024].
My Assignment Help. 'Understanding Bluetooth Technology And Managing Range Issues In An Essay. (70 Characters)' (My Assignment Help, 2021) <https://myassignmenthelp.com/free-samples/esp318-introduction-to-research-methods/wireless-communication.html> accessed 19 August 2024.
My Assignment Help. Understanding Bluetooth Technology And Managing Range Issues In An Essay. (70 Characters) [Internet]. My Assignment Help. 2021 [cited 19 August 2024]. Available from: https://myassignmenthelp.com/free-samples/esp318-introduction-to-research-methods/wireless-communication.html.