You are on page 1of 1

“TGTU39 SAMPATH KUMAR VEERABOMMA SAMVE885”

BLUETOOTH ARCHITECTURE OVERVIEW


AUTHOR: JAMES KADARCH

In this paper the author clearly explained about the Bluetooth wireless technology and the
function of different layers in the Bluetooth architecture which are arranged in a stack manner
called Bluetooth stack.
The main purpose of this paper is to establish internet connection between mobile and computer
which minimizes the use of the cable and reduces the complexity, cost. The author explained in
clear about how the technology is developed and function of each layer in the architecture during
communication process.
The author mainly focused upon the developing a wireless cable replacement technology for
communication by taking into consideration the cost , complexity and mainly security.
Secondly he focused upon the Bluetooth usage models which are the broadly categorized into
three ways namely voice/data access points, peripheral interconnects, PAN(personal area
networking).Then he focused upon the Bluetooth architecture which is divided into two main
specifications which are core and profile specification. But the author explained only about the
core specification in this research paper and focused upon complete architecture of Bluetooth
which is divided into stacks called as Bluetooth stack which includes RF layer which determines
the requirement of Bluetooth transceiver, Base band layer used for framing, link manager which
is used for authentication, encryption and key management and the logical link layer which is
used for multiplexing.
The conclusions that author drawn from research paper is that Bluetooth is radio device which is
used for connecting different mobile devices or between a mobile and a pc in a secure ad-hoc
fashion (much concentrating on security).
The evidence that author had given in support of conclusion is that device is operated in radio
frequency and the communication between the devices which makes security as a key factor. The
author explained in clear about this in the paper in link layer security architecture and moreover
security architecture depends upon Pin code established between the devices. The conclusion
drawn by the author is valid because communication through these devices should be in secure
way by providing authentication key. If the authentication is not provided during communication
the data will be trapped by the others who are operating that dev ice in that region.
There are no assumptions in this research paper but the author had not explained about the upper
layers in Bluetooth architecture such as L2cap and data layer. Secondly, he had not explained the
frequency zone in which device is operating.
Finally this paper had proved the communication through this device is secure, simple, easier,
less complex and available at low cost and is much important in the field of communication and
covered all the lower layers of radio stack.

You might also like