Bluetooth operation and use
著者
書誌事項
Bluetooth operation and use
(McGraw-Hill telecom professional)
McGraw-Hill, c2002
大学図書館所蔵 件 / 全4件
-
該当する所蔵館はありません
- すべての絞り込み条件を解除する
注記
Bibliography: p. [545]-549
Includes index
内容説明・目次
内容説明
Unlike most other references on the market, this next-generation resource goes well beyond Bluetooth specifications and thoroughly examines different implementation approaches - as taught by a "master instructor." This book discusses Bluetooth in detail, covering both operational characteristics as well as its use as a wireless communications system. It addresses the coexistence of Bluetooth with other wireless networks and provides information on the significant security problems that exist when communicating without wires. It is based on 2 very popular and highly effective courses the author has been teaching for more than a year.
目次
Chapter 1: Introduction Differences Between Wired and Wireless Communications Advantages of the Wireless Network Advantages of the Wired Network Regulation of Unlicensed Bands FCC Part 15 Requirements Rules for Transmission in the 2.4 GHz Band FCC Product Certification The Bluetooth Story The Bluetooth Special Interest Group (SIG) Overview of Bluetooth Applications Three-in-One Phone Ultimate Headset Internet Bridge Data Access Point Object Push and File Transfer Automatic Synchronization Other Uses for Bluetooth Bluetooth Protocols and Profiles The OSI Model Bluetooth Protocols Bluetooth Profiles Summary of Bluetooth Operation Paging and Inquiry Specifications, Standards, and the IEEE Evolution of a Standard Health Effects from Exposure to 2.4 GHz RF Specific Absorption Rate (SAR) The $5 Pricing Goal Summary End Notes Chapter 2: Indoor Radio Propagation and Bluetooth Useful Range Indoor Propagation Mechanisms Large-Scale Path Loss (PL) Link Budget Equation Using Decibels in the Link Budget Equation Simplified Path Loss (PL) Calculations The Effect of Wavelength on Path Loss (PL) PL Exponent and Typical Values Calculating Bluetooth Range Accuracy of the Simplified Path Loss (PL) Model Improving Path Loss (PL) Prediction Accuracy Log Normal Shadowing Adding Pessimism to the Calculations Primary Ray Tracing for Improved Accuracy Direct Modeling of Partition Losses Bluetooth Range Estimations Using Primary Ray Tracing The Ups and Downs of Multipath Reflection, Transmission, and Absorption Phasor Diagram for Multiple Signal Arrivals Multipath Effect on Received Signal Strength Multipath Characteristics Doppler Spread Delay Spread Doppler Spread Versus Delay Spread Bluetooth Channel Fading Analysis Large-Scale Path Loss (PL) Using Multiple Ray Tracing Multipath Mitigation Fade Margin Diversity Equalization Error Control Antennas for Bluetooth Power Transfer and Impedance Matching Radiation Pattern and Antenna Placement Bluetooth Antenna Implementation Summary End Notes Chapter 3: The Bluetooth Radio Placing Information onto the RF Carrier Amplitude-, Frequency-, and Phase-Shift Keying FSK Modulation Index and Bandwidth Reducing FSK Bandwidth with Gaussian Baseband Filtering Bluetooth Modulation Requirements Channel Capacity Limits Shannon Limits as a Function of Bandwidth and SNR Power-Limited Channels Band-Limited Channels Capacity of the Bluetooth Channel The Nature of Interference Frequency Hop Spread Spectrum (FHSS) Synchronization Between Communicating Devices FHSS Cross Interference Bluetooth Transmitter Performance Transmitter Power Classes Consequences of Higher Transmit Power Transmitter Spurious Emissions and Drift Bluetooth Receiver Performance Sensitivity Interference Immunity Summary End Notes Chapter 4: Baseband Packets and Their Exchange Time Division Duplexing (TDD) Single-Slave Operation Multislave Operation Multislot Packets System Clock for Timing Control Physical Links Synchronous Connection-Oriented (SCO) Link Asynchronous Connectionless (ACL) Link Error Control Coding Error Detection Error Correction Bluetooth Addresses and Names Bluetooth Device Address (BD_ADDR) Active Member Address (AM_ADDR) Parked Member Address (PM_ADDR) Access Request Address (AR_ADDR) Bluetooth Device Name Bluetooth Baseband Packet Format Access Code Header Payload Packets on the Physical Links ACL for Data SCO for Real-Rime Two-Way Voice Packet TYPE Codes Packet Broadcasting Data Whitening Logical Channels Summary End Notes Chapter 5: Establishing Contact Through Inquiry and Paging Bluetooth Piconet Activity and States State Diagram: Point-to-Point Link Activity State Diagram: General Piconet Establishment Hop Sequence Selection Paging Other Bluetooth Devices General Description of the Page Process Prospective Slave: Page Scan and Page Response States Prospective Master: Page and Page Response States Optional Paging Schemes Paging Timers Finding Other Bluetooth Devices General Description of the Inquiry Process Prospective Slave: Inquiry Scan and Response States Prospective Master: Inquiry State Inquiry Timers Summary Chapter 6: Advanced Piconet Operation Low-Power Modes Sniff Hold Park Link Supervision Device Entry into an Existing Piconet Master Brings in New Slave Slave Initiates Its Own Entry The Scatternet and Its Implications Scatternet Timing Issues Master-Slave (MS) Switch Alternatives to Scatternet Operation Summary Chapter 7: Managing the Piconet Link Manager Protocol (LMP) General Link Session LMP Packet Structure General Response Messages Requesting Host Connection Completing the Setup Opodes and Their Functions Link Configuration and Information Piconet Management Security Management Connection Setup Procedure Summary Chapter 8: Transferring Data and Audio Information Logical Link Control and Adaptation Protocol (L2CAP) for Data L2CAP Functions L2CAP Operating Environment L2CAP Channel Concept L2CAP Packet Structure and Mapping Communicating with the L2CAP Layer L2CAP Signaling L2CAP for Streaming Audio Applications Real-Time Voice Communication Methods of Digitizing Voice Establishing and Disconnecting the SCO Channel Summary End Notes Chapter 9: Bluetooth Security Overview of Bluetooth Security Security Levels Limitations of Bluetooth Security Architecture Summary of Bluetooth Security Operations Authentication Authorization Pairing, Bonding, and Trust Encryption Security Management Bluetooth Security Implementation Process Security Entities Key Generation Functions Pairing Link Key Exchange Authentication Encryption Bluetooth Piconet Vulnerability Disclosure Threat Integrity Threat Denial-of-Service (DoS) Threat Summary End Notes Chapter 10: Host Interfacing Host Controller Interface (HCI) Functionality Commands, Events, and Data over HCI HCI Flow Control HCI Commands Link Control Commands Link Policy Commands HC and Baseband Commands Informational Parameters Status Parameters Testing Commands HCI Events Event Process: Command with Immediate Execution Event Process: Command with Delayed Execution Event Process: Triggered by an Incoming Baseband Packet Event Status and Errors HCI as a High-Level Language Device Name Request Establishing an ACL Connection Authenticating a Link HCI Transport Mechanisms USB Transport UART Transport RS-232 Transport Summary End Notes Chapter 11: Bluetooth Profiles Overview of Bluetooth Profiles Profile Descriptions A Paradigm Shift General Profiles Generic Access Profile (GAP) Service Discovery Application Profile (SDAP) Serial Port Profile (SPP) Profiles Based upon Serial Port Communication Dial-up Networking (DUN) LAN Access Fax Headset (HS) Hands-Free (HF) Video Conferencing Profiles Based upon Object Exchange Object Push File Transfer Synchronization Basic Printing Basic Imaging Telephony Profiles Cordless Telephony Intercom Audio/Video Profiles Advanced Audio Distribution Video Distribution Miscellaneous Profiles Audio/Video Remote Control Human Interface Device (HID) Hardcopy Cable Replacement Personal Area Networking (PAN) Common ISDN Access Summary End Notes Chapter 12: Module Fabrication, Integration, Testing,and Qualification Hardware Architecture The Bluetooth Chipset Device Fabrication Packaging Options Single-chip Versus Two-chip Solution Designing for Class 1 Transmit Power Power Consumption Integrating Bluetooth into a Host Selecting a Module Integration Strategies Qualification and Testing SIG Qualification RF Test Setup Testing the Transmitter Testing the Receiver Protocol Conformance Testing: The Protocol Analyzer Interoperability Testing: The UnPlugFest Summary End Notes Chapter 13: Coexisting with Other Wireless Systems Other Users in the 2.4 GHz ISM Band IEEE 802.11 Other Bluetooth Piconets Microwave Ovens and Other ISM Devices HomeRF Cordless Telephones Custom Devices Licensed Users Microwave Lighting Bluetooth and Wi-Fi: Can They Live Together? Wi-Fi Characteristics Bluetooth Characteristics Collocated Nodes Characterizing Bluetooth Interference Interfering Transmitter Disruption Distance Types of Disruption Approaches to Coexistence Analysis Coexisting with IEEE 802.11b (Wi-Fi) Wi-Fi Signal Structure Wi-Fi Effect on Bluetooth Bluetooth Effect on Wi-Fi Coexisting with Other Bluetooth Piconets Coexisting with Microwave Ovens Noncollaborative Coexistence Solutions Adaptive Frequency Hopping (AFH) Adaptive Packet Selection TX Power Control Antenna Isolation Coexistence Solutions for Wi-Fi Collaborative Coexistence Solutions Manual Switching Driver-Level Switching Collaborative Adaptive Hopping MAC-Level Switching System-Level Integration Bluetooth Operation Aboard Commercial Aircraft Summary End Notes Chapter 14: The Future of Bluetooth Gaining Customer Confidence Futur
e Applications Operational Enhancements End Notes
Acronyms References Index
「Nielsen BookData」 より