Abstract
Contents of the beginning of the personal wireless communications and original Bluetooth version are presented and the classes of the power also. Bluetooth technology forms its network from eight devices, this network is called Piconet. Every piconet contains from one device acts as a master and seven device act as slave. There are two types of physical connections, the ACL and SCO connection for voice communications. This chapter also presents the different Bluetooth protocols. The Bluetooth technology can be considered adaptive packets technology; there are different packets format can be employed for user data transmission. The different packets are introduced in this chapter.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bluetooth specifications v1.1. http://www.bluetooth.com
Specification of bluetooth system, volume 2, version 1.1, February 22, 2001
Bluetooth specifications v1.2. http://www.bluetooth.com
Dasgupta K. Bluetooth protocol, and security architecture review. Online report, http://www.cs.utk.edu/~dasgupta/bluetooth/
Muller T (1999) Bluetooth security architecture: version 1.0. Bluetooth white paper, Document # 1.C.116/1.0, July 15, 1999
Bluetooth specifications core v2.0. http://www.bluetooth.com
Haartsen JC (2000) The bluetooth radio system. IEEE Pers Commun 7(1):28–36
IEEE 802.11, the working group setting the standards for wireless lans. http://grouper.ieee.org/groups/802/11
IEEE 802.15 wpan task group 1 (tg1). http://www.ieee802.org/15/pub/TG1.html
Candolin C. Security issues for wearable computing and bluetooth technology. Online report, http://www.cs.hut.fi/Opinnot/Tik-86.174/btwearable.pdf
Vainio JT (2000) Bluetooth security. Online report, May 25, 2000 http://www.niksula.cs.hut.fi/~jiitv/bluesec.html
Mohamed MAM, El-Azm AA, El-Fishawy NA, El-Tokhy MAR, Abd El-Samie FEA (2008) Optimization of bluetooth frame format for efficient performance. Prog Electromagn Res M, Vol. 1
Khalil AA, Elnaby MMA, Saad EM, Al-Nahari AY, Al-Zubi N, El-Bendary MAM, Abd El-Samie FEA (2014) Efficient speaker identification from speech transmitted over Bluetooth networks. Int J Speech Technol, Springer
El-Bendary MAM, Abou-El-Azm AE, El-Fishawy NA, Shawki F, El-Tokhy M, Abd El-Samie FEA, Kazemian HB (2013) Image transmission over mobile Bluetooth networks with enhanced data rate packets and chaotic interleaving. Wireless networks, Springer, Vol. 13
El-Bendary MAM (2017) FEC merged with double security approach based on encrypted image steganography for different purpose in the presence of noise and different attacks. Multimedia Tools and Appl, Springer
El-Bendary MAM (2015) Developing security tools of WSN and WBAN networks applications, Springer
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
A. M. El-Bendary, M. (2018). WPANs Technologies Beginning. In: Wireless Personal Communications. Signals and Communication Technology. Springer, Singapore. https://doi.org/10.1007/978-981-10-7131-7_2
Download citation
DOI: https://doi.org/10.1007/978-981-10-7131-7_2
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-7130-0
Online ISBN: 978-981-10-7131-7
eBook Packages: EngineeringEngineering (R0)