In line with the tradition of newer technologies being designed to satisfy upcoming needs, Bluetooth was developed to take over the place of cables that connect mobile devices to their peripherals including but not limited to notebook computers, digital cameras, cellular phones, and personal digital assistants (PDAs). Bluetooth can be defined as open standard that permits communication between diverse devices using a standard short-range wireless radio connection. Even though Bluetooth technology is a technology that replaces cable technology, its current application is diverse. The key areas of focus for Bluetooth technology are its less complex architecture, low price, less power consumption, robustness, and the ability to transmit data and access local networks and internet (Bisdikian, 2001). Bluetooth wireless technology has gone through many stages of development to be as known today, has its specific architecture, has many applications and uses in today’s’ life and has huge impacts on both society and commerce.
1.1 Overview of Bluetooth Technology Whereas personal devices ordinarily communicate through the RS-232 serial port protocol, pin arrangements and proprietary connectors make it completely impossible to make use of the same set of cables to connect devices manufactured by different companies, and sometimes, even devices from the same manufacturer. The focus of Bluetooth technology is to offer a flexible cable connector that has a pin that can be reconfigured to allow several personal mobile devices to interconnect with one another. Bluetooth wireless technology offers opportunities for personal connectivity with the benefit of multi-directionality and elimination of the need for the line of sight requirement that was a feature of RF-based connectivity. The personal connectivity provided by Bluetooth technology can be likened to a communications bubble that follows individuals whenever they go and allows them to connect their mobile devices with others that join the bubble. Within this bubble, connectivity is momentary and spontaneous and involves numerous devices with different computing capabilities (Kaur, Kaur & Kaur, 2016). 1.1.1 Technicalities Bluetooth radio communications operate in a free 2.4 GHz ISM band. The Bluetooth radio transmission makes use of a uses a packet switching protocol with Frequency Hopping Spread Spectrum (FHSS). This frequency has 1600 hops per second. The frequency spectrum is subdivided into 79 hops and each hop has 1 MHz bandwidth. As a result, Bluetooth devices take 79MHz, but at any particular moment, just 1 MHz is occupied. Each hop is linked to a slot that is 625us long. The main role of frequency hopping is to enhance security and reduce interference. The scheme of frequency hopping is combined with Automatic Repeat Request (ARQ), Forward Error Correction (FEC), and Cyclic Redundancy Check (CRC). The Bluetooth wireless technology offers a data transfer rate of one Mbit/s (Kaur, Kaur & Kaur, 2016). 1.1.2 Bluetooth networking When numerous Bluetooth devices are in close proximity to each other, they create a piconet. …show more content…
A single piconet includes one master and a maximum of seven slaves whereby, the principle of master-slave is used in initiating and controlling the traffic between the devices in a piconet. The master defines and synchronizes the frequency hop pattern in its piconet. The packets are exchanged between slaves and a master within a particular piconet. There is no direct communication between master and master or a slave and slave. A mobile device can be a slave in various piconets but, for every piconet, there is only one master. Bluetooth piconets can exist simultaneously in space and time simultaneously while remaining independent of one another. Additionally, a single device can be a member of numerous piconets (scatternet). Figure 1 below indicates a Bluetooth piconet (Kaur, Kaur & Kaur, 2016). A piconet is created in ad hic fashion without the help of any infrastructure, and it can last as long as the creator wants it to. Slave and master vary from one piconet to another. In identifying each slave, the piconet master assigns a unique address to all slaves that are engaged in active communication within the piconet. The work of the master is control and regulate who transmits and when. Up to a maximum of seven slaves can actively communicate in a particular piconet at any one time. Additional devices can be registered with the master and can be accepted as