Advertisement

WPANs Technologies Beginning

  • Mohsen A. M. El-Bendary
Chapter
Part of the Signals and Communication Technology book series (SCT)

Abstract

Contents of the beginning of the personal wireless communications and original Bluetooth version are presented and the classes of the power also. Bluetooth technology forms its network from eight devices, this network is called Piconet. Every piconet contains from one device acts as a master and seven device act as slave. There are two types of physical connections, the ACL and SCO connection for voice communications. This chapter also presents the different Bluetooth protocols. The Bluetooth technology can be considered adaptive packets technology; there are different packets format can be employed for user data transmission. The different packets are introduced in this chapter.

Keywords

ACK SCO Protocols Packet types Piconet Scatternet 

References

  1. 1.
    Bluetooth specifications v1.1. http://www.bluetooth.com
  2. 2.
    Specification of bluetooth system, volume 2, version 1.1, February 22, 2001Google Scholar
  3. 3.
    Bluetooth specifications v1.2. http://www.bluetooth.com
  4. 4.
    Dasgupta K. Bluetooth protocol, and security architecture review. Online report, http://www.cs.utk.edu/~dasgupta/bluetooth/
  5. 5.
    Muller T (1999) Bluetooth security architecture: version 1.0. Bluetooth white paper, Document # 1.C.116/1.0, July 15, 1999Google Scholar
  6. 6.
    Bluetooth specifications core v2.0. http://www.bluetooth.com
  7. 7.
    Haartsen JC (2000) The bluetooth radio system. IEEE Pers Commun 7(1):28–36CrossRefGoogle Scholar
  8. 8.
    IEEE 802.11, the working group setting the standards for wireless lans. http://grouper.ieee.org/groups/802/11
  9. 9.
    IEEE 802.15 wpan task group 1 (tg1). http://www.ieee802.org/15/pub/TG1.html
  10. 10.
    Candolin C. Security issues for wearable computing and bluetooth technology. Online report, http://www.cs.hut.fi/Opinnot/Tik-86.174/btwearable.pdf
  11. 11.
    Vainio JT (2000) Bluetooth security. Online report, May 25, 2000 http://www.niksula.cs.hut.fi/~jiitv/bluesec.html
  12. 12.
    Mohamed MAM, El-Azm AA, El-Fishawy NA, El-Tokhy MAR, Abd El-Samie FEA (2008) Optimization of bluetooth frame format for efficient performance. Prog Electromagn Res M, Vol. 1Google Scholar
  13. 13.
    Khalil AA, Elnaby MMA, Saad EM, Al-Nahari AY, Al-Zubi N, El-Bendary MAM, Abd El-Samie FEA (2014) Efficient speaker identification from speech transmitted over Bluetooth networks. Int J Speech Technol, SpringerGoogle Scholar
  14. 14.
    El-Bendary MAM, Abou-El-Azm AE, El-Fishawy NA, Shawki F, El-Tokhy M, Abd El-Samie FEA, Kazemian HB (2013) Image transmission over mobile Bluetooth networks with enhanced data rate packets and chaotic interleaving. Wireless networks, Springer, Vol. 13Google Scholar
  15. 15.
    El-Bendary MAM (2017) FEC merged with double security approach based on encrypted image steganography for different purpose in the presence of noise and different attacks. Multimedia Tools and Appl, SpringerGoogle Scholar
  16. 16.
    El-Bendary MAM (2015) Developing security tools of WSN and WBAN networks applications, SpringerGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  1. 1.Department of Electronics TechnologyHelwan UniversityCairoEgypt

Personalised recommendations