Bluetoooth: A Comprehensive 3-Day Course
Date: April 21-23, 2010
Location: Akron, Ohio
Cost: $2,195
Instructor: Dr. Robert Morrow
![]() | Click this button to be taken to the Eogogics public class schedule and registration page |
Target Audience
Technical personnel charged with developing or deploying Bluetooth networks or devices and others who need to understand the technology in depth.
Prerequisites
Technical background and prior exposure to a wireless technology, particularly WiFi, will be helpful.
Detailed Course Outline:
Day 1
Introduction
- Bluetooth usage models and protocol stack
The Bluetooth Radio (BR/EDR)
- Calculating maximum range
- Frequency hopping spread spectrum operation
- Bluetooth basic rate (BR) and enhanced data rate (EDR) modulation
- Channel set for BR/EDR signals
- Required radio performance
- Performance analysis of a typical Bluetooth radio
Baseband Signaling Part 1 (BR/EDR)
- Master/slave timing
- Error control
- Addressing methods
- Packet structure
- Setting frequency hop parameters
- Logical transport mechanisms
- Bluetooth audio
- Throughput in perfect and imperfect channels
Baseband Signaling Part 2 (BR/EDR)
- Operational state diagram
- Paging and inquiry processes
- Sniff, hold, and park modes
- Scatternet operation
Day 2
Link Management
- Link connection and detachment
- Link management protocol (LMP) packets
- Managing sniff, hold, and park modes
- Transmit power control and quality of service
- Link setup using LMP packets
Logical Link Control and Adaptation Protocol (L2CAP)
- L2CAP overview and purpose
- Packet segmentation and reassembly
- Protocol multiplexing and channel definitions
- L2CAP signaling and channel setup
Host Controller Interface
- HCI overview and purpose
- Command packet structure
- Command groups and examples
- Event packet structure
- Event groups and examples
- HCI/USB interface
Bluetooth Security Part 1
- Security overview
- Link key generation and initialization
- Combination key derivation
- Authentication
- Encryption
Day 3
Bluetooth Security Part 2
- Filtering device access
- Security weaknesses
- Secure simple pairing
Applications
- Profile overview
- Service discovery protocol
- Generic access profile (GAP)
- Headset profile (HSP)
- Qualification and testing
- Development tools
- Hardware solutions
Coexistence
- Interference modeling
- Coexisting with Wi-Fi: separated nodes
- Coexisting with Wi-Fi: collocated nodes
- Examples and throughput analysis