Bluetooth Course: Operation, Security, Applications, Coexistence

Bluetooth Courses
  • Course:Bluetooth Course: Operation, Security, Applications, Coexistence
  • Course ID:BLUEOP Duration:4 days Where: Your Office (7+ Persons)
  • Available as a private, customized course for your group at your offices or ours and in some cases as a WebLive(TM) class.

  • Download Course Description (PDF)

Course Outline

Bluetooth Course: Operation, Security, Applications, Coexistence

 

Part 1:  Bluetooth Overview

  • Bluetooth usage model and protocol stack
    • Categories of information transmission
    • Short range wireless features
    • Bluetooth protocol stack: Host and controller

Part 2: The Bluetooth Radio

  • Propagation and ranging
    • RF modeling in indoor environments
    • Calculating maximum range
    • Eavesdropping vulnerability
  • Modulation and radio performance
    • Frequency hopping spread spectrum and Bluetooth channel set
    • Basic rate (BR) and enhanced data rate (EDR) modulation
    • Low Energy (LE) modulation
    • Radio performance

Part 3: Baseband Signaling I

  • BR/EDR functional operation
    • Master/slave timing
    • Automatic Repeat Request (ARQ)
    • Addressing methods
    • Packet structure
    • Error control
    • Frequency hop parameters
    • Logical transport
    • Throughput in perfect and imperfect channels

Part 4: Baseband Signaling II

  • Bluetooth audio
    • Methods of voice encoding
    • SCO and eSCO packet structure and performance
    • SCO vs ACL for wireless audio
  • BR/EDR device discovery, connection, and low-power modes
    • Operational state diagram
    • Paging and inquiry processes
    • Sniff, hold, and park modes
    • Scatternet operation
  • LE baseband operation
    • State diagram
    • Addressing
    • Packet structure
    • Advertising, initiating, and connecting operation
    • Data channel and packet exchange

Part 5: Link Management

  • Overview of Link Management Protocol (LMP)
  • Link management operations
    • Link connection and detachment
    • Maintaining the link
  • LMP packets and examples
    • Link setup
    • Link control

Part 6: Higher Protocols

  • Logical Link Control and Adaptation Protocol (L2CAP)
    • L2CAP overview and purpose
    • Protocol multiplexing and channel definitions
    • L2CAP signaling and channel setup
  • Service Discovery Protocol (SDP)
    • Client-server interaction
    • Service record and attributes
  • LE Attribute Protocol (ATT)
    • ATT operation on attributes
    • ATT retrieval
  • Host Controller Interface (HCI)
    • HCI overview and purpose
    • Summary of commands and events
    • HCI over USB transport example

Part 7: Profiles

  • Profile purpose and interaction
  • Generic Access Profile (GAP)
    • Purpose
    • BR/EDR operational modes
    • LE functions and roles
  • Headset Profile (HSP) and Handsfree Profile (HFP) [BR/EDR]
    • Fundamentals
    • Connections and usage
    • HSP and HFP comparison
  • Advanced Audio Distribution Profile (A2DP) [BR/EDR]
    • Protocol stack
    • Streaming process
    • A2DP and HSP comparison
  • LE profile examples
    • Generic Attribute (GATT) Profile
    • Find-Me Profile (FMP)

Part 8: Security

  • Overview
  • Shared and Public Key cryptography
  • Attack methods
  • Summary of legacy security
    • Link key generation and initialization
    • Combination key derivation
    • Authentication
    • Encryption
  • Secure Simple Pairing

Part 9: Qualification and Test

  • Qualification
    • Requirements
    • Program overview
    • Types of Bluetooth products
    • Steps to qualification
  • Testing
    • Development tools
    • Component test mode
    • Examples of devices and performance

Part 10: Coexistence

  • Coexistence overview
    • Bluetooth and Wi-Fi signal spectra
    • Interference modeling
  • Bluetooth-on-Bluetooth coexistence
    • Range of vulnerability
    • Simulation analysis
  • Bluetooth and Wi-Fi coexistence
    • Separated nodes
    • Collocated nodes
    • Examples and throughput analysis
  • Improving coexistence and interference mitigation

Bluetooth Course Wrap-up: Course Recap, Discussion, and Evaluation

DCN J(R)-TSnl-f

Course Overview

Course in a Nutshell

Bluetooth is a short range wireless technology used for applications such as Wireless Personal Area Networks (WPAN), Smart Homes, and Internet of Things (IoT). In this comprehensive four-day Bluetooth training session, you will acquire in-depth knowledge of all aspects of Bluetooth, including the technology, security, applications, and coexistence issues.

 

Customize It!

We can customize your Bluetooth training session to your team’s background and learning objectives by making it more or less technical, shortening or lengthening the course, adding or omitting topics, and tailoring it to your industry/application.

 

 

Audience / Prerequisites

Aimed At

This Bluetooth course is for wireless system designers, developers, implementers, and others who require an in-depth understanding of the Bluetooth technology.

Prerequisites

Prior familiarity with wireless networks.

Testimonials
  • "Very detailed study of Bluetooth operations. Instructor very knowledgeable, fantastic style of teaching. Great class, very informative." – Ray Bolawicz, Vice President Engineering, VXI Corporation
  • “Well organized course. Instructor extremely knowledgeable; communicates well; has a passion for the content. I wish my college professors were as effective at teaching. Very good job!” – Mike Davies, Chamberlain