Bluetoooth: A Comprehensive 3-Day Course

Date: April 21-23, 2010

Location: Akron, Ohio

Cost: $2,195

Instructor: Dr. Robert Morrow

register

Click this button to be taken to the Eogogics public class schedule and registration page

Target Audience

Technical personnel charged with developing or deploying Bluetooth networks or devices and others who need to understand the technology in depth.

Prerequisites

Technical background and prior exposure to a wireless technology, particularly WiFi, will be helpful.

Detailed Course Outline:

Day 1

Introduction

  • Bluetooth usage models and protocol stack

The Bluetooth Radio (BR/EDR)

  • Calculating maximum range
  • Frequency hopping spread spectrum operation
  • Bluetooth basic rate (BR) and enhanced data rate (EDR) modulation
  • Channel set for BR/EDR signals
  • Required radio performance
  • Performance analysis of a typical Bluetooth radio

Baseband Signaling Part 1 (BR/EDR)

  • Master/slave timing
  • Error control
  • Addressing methods
  • Packet structure
  • Setting frequency hop parameters
  • Logical transport mechanisms
  • Bluetooth audio
  • Throughput in perfect and imperfect channels

Baseband Signaling Part 2 (BR/EDR)

  • Operational state diagram
  • Paging and inquiry processes
  • Sniff, hold, and park modes
  • Scatternet operation

Day 2

Link Management

  • Link connection and detachment
  • Link management protocol (LMP) packets
  • Managing sniff, hold, and park modes
  • Transmit power control and quality of service
  • Link setup using LMP packets

Logical Link Control and Adaptation Protocol (L2CAP)

  • L2CAP overview and purpose
  • Packet segmentation and reassembly
  • Protocol multiplexing and channel definitions
  • L2CAP signaling and channel setup

Host Controller Interface

  • HCI overview and purpose
  • Command packet structure
  • Command groups and examples
  • Event packet structure
  • Event groups and examples
  • HCI/USB interface

Bluetooth Security Part 1

  • Security overview
  • Link key generation and initialization
  • Combination key derivation
  • Authentication
  • Encryption

Day 3

Bluetooth Security Part 2

  • Filtering device access
  • Security weaknesses
  • Secure simple pairing

Applications

  • Profile overview
  • Service discovery protocol
  • Generic access profile (GAP)
  • Headset profile (HSP)
  • Qualification and testing
  • Development tools
  • Hardware solutions

Coexistence

  • Interference modeling
  • Coexisting with Wi-Fi: separated nodes
  • Coexisting with Wi-Fi: collocated nodes
  • Examples and throughput analysis