Professional Documents
Culture Documents
INTRODUCTION
Definition of Bluetooth .
Why Bluetooth ?
How need arise of Bluetooth?
History.
What is SIG ?
What is Bluetooth?
What is it - a technology, a standard, an initiative, or a product?
Bluetooth wireless technology is a de facto standard, as well as a specification for small
form factor, low-cost, short range radio links between mobile PCs, mobile phones and
other portable devices. The Bluetooth Special Interest Group is an industry group
consisting of leaders in the telecommunications, computing, and networking industries
that are driving development of the technology and bringing it to market.
Blue tooth wire less te chnology fills this important communication need, with its ability to communicate
both voice and data wire lessly, using a standard low-powe r, low-cost te chnology which can be integrated in all
de vices to e nable total mobility. The price will be low and result in mass production. The more units around, the
more bene fits for the custome r.
Why Bluetooth ?
What will Bluetooth wireless technology deliver to end users?
It will enable users to connect a wide range of computing and telecommunications
devices easily and simply, without the need to buy, carry, or connect cables. It delivers
opportunities for rapid ad hoc connections, and the possibility of automatic, unconscious,
connections between devices. It will virtually eliminate the need to purchase additional or
proprietary cabling to connect individual devices. Because Bluetooth wire less technology
can be used for a variety of purposes, it will also potentially replace multiple cable
History
By the way if, you're wondering where the Bluetooth name originally came from ,
it is named after a Danish Viking and King of Denmark between 940 and 981 A D , Harald
Blåtand (Bluetooth in English), who lived in the latter part of the 10 T H century. Harald
Blåtand united and controlled Denmark and Norway (hence the inspiration on the name :
uniting devices through Bluetooth
The idea that resulted in the Blue tooth wire less te chnology was born in 1994 whe n Ericsson Mobile
Communications de cided to inve stigate the feasibility of a low-powe r, low-cost radio inte rface be twee n mobile
phones and the ir acce ssories. The idea was that a small radio built into both the ce llular tele phone and the laptop
would re place the cumbe rsome cable used today to conne ct the two de vices.
A year late r the enginee ring work began and the true potential of the te chnology began to crystallize.
But be yond unleashing de vices by replacing cables, the radio te chnology showed possibilitie s to be come a
unive rsal bridge to ex isting data networks, a pe riphe ral inte rface , and a me chanism to form small private ad hoc
groupings of conne cte d de vices away from fixed ne twork infrastructures.
The requirements regarding price, capacity and size were set so that the new
technique would have the potential to outdo all cable solutions between mobile devices.
Initially a suitable radio interface with a corresponding frequency range had to be
specified. A number of criteria for the concept were defined regarding size, capacity and
global uniformity. The radio unit should be so small and consume such low power that it
could be fitted into portable devices with their limitations. The concept had to handle
both speech and data and finally the technique had to work all around the world. The
study soon showed that a short-range radio link solution was feasible.
What is SIG?
In February 1998 the Spe cial Inte re st Group (SIG) was formed. Today the Blue tooth SIG includes
promote r companies 3Com, Ericsson, IBM, Inte l, Lucent, Microsoft, Motorola, Nok ia and Toshiba, and thousands
of Adopte r/Associate membe r companies. By signing a zero cost agreement, companies can join
This group represented the diverse market support that was needed to generate
good support for the new Bluetooth technology. In May of the same year, the Bluetooth
consortium announced itself globally. The assignment of the SIG originally was to monitor the
te chnical de ve lopment of short-range radio and to create an ope n global standard, thus pre venting the
te chnology from be com ing the prope rty of a single company. This work re sulted in the release of the first
Blue tooth Spe cification in July 1999.
The intention of the Bluetooth SIG is to form a de facto standard for the air
interface and the software that controls it. The furthe r de ve lopment of the Spe cification still is one of
the main tasks for the SIG, othe r important ones be ing inte rope rability requirements, frequency band
The Bluetooth wireless technology was developed
harmonization and promotion of the te chnology.
by the Bluetooth Special Interest Group, to define an industry-wide specification for
connecting personal and business mobile devices. More than 1,4000 companies are now
members of the Special Interest Group, signifying the industry‟s unprecedented
acceptance of the Bluetooth wireless technology.
Technology overview.
Network architecture.
TECHNOLOGY OVERVIEW:
The technology is an open specification for wireless communication of data and
voice. It is low cost short range radio link, built into a 9X9 mm microchip, facilitating
protected ad hoc connections for stationary and mobile communication environment.
Bluetooth technology allows for the replacement of the many proprietary cables that
connect one device to another device with one universal short range radio link. For
instance Bluetooth radio technology built in both the cellular telephone and the laptop
would replace the cumbersome cables used today to connect the laptop to a cellular
telephone.
Printers, PDA‟S, desktops, fax machines, keyboard, joysticks and virtually any
other device can be part of the Bluetooth system. But beyond untethering devices by
replacing the cables, Bluetooth radio technology provides a universal bridge to existing
data networks, a peripheral interface, and a mechanism to form small private ad hoc
grouping of connected devices away from fixed network infrastructures. Designed to
operate in noisy radio frequency environment, the Bluetooth radio uses a fast
acknowledgement and frequency hopping scheme to make the link robust. The Bluetooth
radio modules avoid interference from other signals by hopping to a new frequency after
transmitting or receiving a packet. Compared with other systems operating in the same
frequency band, the Bluetooth radio typically hops faster and uses shorter packets. This
makes the Bluetooth radio robust than the other system. Short packages and fast hopping
also limit the impact of random noise and long distance links. The encoding is optimized
for uncoordinated environment. Bluetooth radios operate in the unlicensed ISM band at
2.4GHz. a frequency hop transceiver is applied to combat interference and fading. A
shaped binary FM modulation is applied to minimize transceiver complexity. The gross
The asynchronous channel can support an asymmetric link of maximally 721 kbps
in either direction while permitting 57.6 kbps in the return direction, or a 432.6 kbps
symmetric link.
INTRODUCTION :
The Bluetooth technology answers the need for short range wireless connectivity
within three areas :
Voice channel use the Continuous Variable Slope Delta Modulation (CVSD)
coding scheme, and never retransmit voice packets. The CVSD was chosen for its
robustness in handling dropped and damaged samples. Rising interference levels are
experienced as increased background noise; even at bit error rate up to 4% the CVSD
coded voice is quite audible.
AD-HOC NETWORKING:
A device equipped with Bluetooth radio establishes instant connection to another
Bluetooth radio as soon as it comes into range. Since Bluetooth technology supports both
point to point and point to multi point connection, several piconets can be established and
linked together ad hoc. The Bluetooth technology is best described as multiple piconet
structure.
NETWORK ARCHITECTURE :
Blue tooth units that come within range of each othe r can se t up ad hoc point-to-point and/or point-to-
multipoint conne ctions. Units can dynamically be added or disconne cted to the ne twork. Two or more
Bluetooth units that share a channel form a piconet.
Se ve ral picone ts can be e stablished and linked togethe r in ad ho c scatte rne ts to allow communication
and data ex change in flexible configurations. If se ve ral othe r piconets are within range the y each work
inde pendently and each have acce ss to full bandwidth. Each picone t is establishe d by a diffe rent freque ncy-
hopping channe l. All use rs participating on the same picone t are synchronized to this channe l.
Unlike infrared devices, Bluetooth units are not limited to line -of-sight communication. To
regulate traffic on the channe l, one of the participating units be comes a m aste r of the picone t, while all othe r
units be come slaves. W ith the current Blue tooth Spe cification up to seve n slaves can actively communicate with
VCard/VCal WAE
OBEX WAP
AT-
Command TCS BIN SDP
UDP TCP
IP
PPP
RFCOMM Audio
L2CAP
Base band
Abbreviations Used
OBEX OBject Exchange Protocol
WAP Web Application Protocol
UDP User Datagram Protocol
IP Internet Protocol
PPP Point to Point Protocol
RFCO Serial Cable emulation protocol based on ETSI TS
MM
HCI 07.10
Host Controller Interface
LLCAP Logical Link Control and Adaptation Protocol
SDP Service Discovery Protocol
TCP Telephony Control Protocol
LMP Link Manager Protocol
This section describes the Bluetooth architecture. The complete protocol stack
comprises, as seen in Figure 1, of both Bluetooth specific protocols and non-Bluetooth
specific protocols. In the figure, non-Bluetooth specific protocols are shaded.
Baseband
The Baseband and Link Control layer enables the physical RF link between
Bluetooth units forming a piconet. This layer controls the Bluetooth unit's
synchronization and transmission frequency hopping sequence. The two different link
types defined in Bluetooth, Synchronous Connection Oriented, SCO, and Asynchronous
Connectionless, ACL, described in the section Link types, are also managed by this layer.
The ACL links, for data, and the SCO links, mainly for audio, can be multiplexed
to use the same RF link [17].
Audio
RFCOMM
The RFCOMM protocol is a serial port emulation protocol. The protocol covers
applications that make use of the serial ports of the unit. RFCOMM emulates RS-232
control and data signals over the Bluetooth baseband. It provides transport capabilities for
upper level services, e.g. OBEX that use a serial line as the transport mechanism.
The Telephony Control protocol – Binary, TCS Binary or TCS BIN, is a bit-
oriented protocol, which defines the call control signalling for the establishment of
speech and data calls between Bluetooth units. The protocol defines the signalling for
establishment and release of calls between Bluetooth units. As well as signalling to ease
the handling of groups of Bluetooth units. Furthermore, TCS Binary provides
functionality to exchange signalling information unrelated to ongoing calls.
Establishment of a voice or data call in a point-to-point configuration as well as in a
point-to-multipoint configuration is covered in this protocol (note, after establishment,
the transmission is from point to point). The TCS Binary is based on the ITU-T
Recommendation.
Adopted protocols
This section describes a number of protocols that are defined to be adopted to the
Bluetooth protocol stack. Note some of these adaptations are at the moment incomplete.
PPP
TCP/UDP/IP
OBEX Protocol
IrOBEX, shortly OBEX, is an optional application layer protocol designed to
enable units supporting infrared communication to exchange a wide variety of data and
commands in a resource-sensitive standardized fashion. OBEX uses a client-server model
and is independent of the transport mechanism and transport API. The OBEX protocol
also defines a folder- listing object, which is used to browse the contents of folders on
remote device. RFCOMM is used as the main transport layer for OBEX.
Content formats
The formats for transmitting vCard and vCalendar information are also defined in
the Bluetooth specification. The formats do not define transport mechanisms but the
format in which electronic business cards and personal calendar entries and scheduling
information are transported. vCard and vCalendar is transferred by OBEX.
vCARD
OBEX
L2CAP
LMP
Base Band
Software architecture.
Hardware architecture.
Link types.
Authentication, Privacy & Security.
A radio unit
A link control unit
Link management
Software function
NETWORK TOPOLOGY:
As already mentioned, the Bluetooth system support both point to point and point
to multi point connections. In this, each piconet is identified by a different hopping
signal. All users participating on the same piconet are synchronized to this hopping
sequence.
The full duplex data rate within a multiple piconet structure with 10 fully loaded,
independent piconets is more than 6 mbps. This is due to a data throughput reduction rate
of less then 10% according to system simulation based on 0 dbm transmitting power (at
the antenna).
RADIO UNIT:
BASEBAND:
The baseband describes the digital signal processing hardware-the Bluetooth link
controller, which carries out the baseband protocols and other low level link routines.
Before establishing any network connections in a piconet structure, all devices are in the
stand-by mode. In this mode an unconnected unit periodically „listens‟ for messages
every 1.28 seconds. Each time a device wakes up, it listens on a set of 32 hop frequencies
defined for that unit. The number of frequencies varies in different geographical regions ;
32 is a number for most countries ( except Spain, France and Japan).
The connection procedures are initiated by any of the devices which then become
master. A connection is made by a page message if the address is already known, or by
an enquiry message followed by a subsequent page message if the address is already
known. The master unit is the device in the piconet structure whose clock and hopping
frequencies are used to synchronize all other units in the piconet. The devices other than
master are called the slave units. In the initial page state, the master unit will send a train
of 16 identical page messages on 16 different hop frequencies defined for the device to be
paged(slave unit ). If no response, the master transmits a train on the remaining 16 hop
frequencies in the wake up sequence. The maximum sequence before the master reaches
the slave is twice the wake up period (2.56 sec.), while the average delay is the wake up
period (0.64 sec.). The enquiry typically used for finding Bluetooth devices, including
public printers, fax machines and similar devices with an unknown messages, but may
require 1 additional train period to collect all the responses. A power saving mode can be
used for connected units in a piconet if no data need to be transmitted. This power saving
mode is the sniff and hold mode in which the device activity is lower. The master unit can
put the slave units into the hold mode, Data transfer restarts instantly when units transits
out of the hold mode. The hold is used when connecting several piconet or managing a
low power device such as temperature sensor. Two more low power modes are available,
the sniff and the park mode. In the sniff mode, the slave devices listens to the piconet
reduced rate thus reducing its duty cycle. The sniff interval is programmable and depends
on the application. In the park mode a device is still synchronized to the piconet but dose
not participate in the traffic. Such a device is the p arked device and does not have a MAC
address. The MAC address is a three bit address to distinguish the units participating in
the piconet structure. Parked device have given up their MAC addresses and occasionally
listen to the traffic of the master to resynchronize and check on broadcast messages. If we
list modes in increasing order of power efficiency, the sniff mode has the higher duty
cycled followed by the hold mode with a lower duty cycle .
LINK MANAGEMENT:
SOFTWARE FRAMEWORK:
Bluetooth devices will be required to support baseline interoperability feature
requirements to create a positive consumer experience. For some de vices, these
requirements will extend from radio module compliance and air protocols and object
exchange formats. For other devices, such as headset, the feature‟s requirements will be
significantly less. Ensuring that any device displaying the Bluetooth „ logo‟ interpolates
with other Bluetooth devices is the goal of the Bluetooth program. Software
interoperability begins with the Bluetooth link level protocol responsible for multiplexing
, device and service discovery, segmentation and reassemble, Bluetooth devices must be
able to recognize each other and load the appropriate software to discover the higher level
abilities each device supports. Interoperability at the application level requires identical
protocol stacks.
The link defines “what” of packets can be used on a particular link. The
Bluetooth baseband technology supports two link types:
Different master slave pairs of the same piconet structure can use different link
types and the link type may change arbitrarily during a session. Each link “supports up to
16 different packet types. Four of these are control packets and are common for both
SCO and ACL links. Both link types use a Time Division Duplex (TDD) scheme for full
duplex transmission.
In orde r to make diffe rent hardware implementations compatible , Blue tooth de vices use the HC I as a
common inte rface be twee n the Blue tooth host (e .g. a portable PC) and the Blue tooth core .
Highe r-le ve l protocols like the SDP, R FCOMM (emulating a se rial port conne ction) and the TCP are
inte rfaced to baseband se rvices via the LLC AP. Among the issues LLC AP takes care of, is segmentation and
reassemble to allow large r data packe ts to be carried ove r a Bluetooth baseband conne ction. The se rvice
discove ry protocol allows applications to find out about available se rvices and the ir characte ristics when e.g.
de vices are moved or switche d off.
The Blue tooth hardware consists of an analog radio part and a digital part - the Host Controlle r. The
Host Controlle r has a hardware digital signal processing part called the Link Controlle r (LC), a CPU core and
inte rfaces to the host environment
.
The Link Controlle r consists of hardware that pe rform s baseband processing and physical laye r protocols
such as ARQ (Automatic Repeat reQue st) protocol and FEC (Forward Error Corre ction) coding. The function of the
Link Controlle r includes Asynchronous transfe rs, Synchronous transfe rs, Audio coding and Encryption.
The CPU core allows the Blue tooth module to handle Inquiries and filte r Page re quests without involving
the host de vice. The Host Controlle r can be programmed to answe r ce rtain Page messages and authenticate
remote links.
The Link Manage r (LM) software runs on the CPU core . The LM discove rs othe r LMs and communicate s wi th them
via the Link Manage r Protocol (LMP) to pe rform its se rvice provide r role and to use the se rvices of the unde rlying
Link Controlle r.
ERROR CORRECTION:
There are three error correction schemes defined by the Bluetooth baseband
controllers.
1/3 rate Forward Error Correction code (FEC)
2/3 rate Forward Error Correction code
automatic repeat request (ARQ) scheme for data
Bluetooth security
Introducing the Bluetooth technology as a cable replacement technique exposes
the need for security functionality in the wireless solution. By replacing the cable and
introducing radio signals there is a need for the Bluetooth device to have built- in security
to prevent eavesdropping and falsifying the message originator. Therefore, functionality
for authentication and encryption has been added to the Bluetooth technology.
Authentication is used to prevent unwanted access to data and to prevent falsifying of the
message originator. Encryption is used to prevent eavesdropping. These two techniques
combined with the frequency hopping technique and the limited trans mission range for a
Bluetooth unit, usually 10 m, give the technology higher protection against
eavesdropping.. Since the need for security is dependent on what kind of application is
executed, three levels of security are defined in the Bluetooth concept.
Link-level security
The Link- level security mode is based on the concept of link keys. These keys are
secret 128 bit random numbers stored individually for each pair of devices in a Bluetooth
connection. Each time two Bluetooth units communicate, the link key is used for
authentication and encryption.
Bluetooth networking
When Bluetooth units are communicating, one unit is master and the rest of the
units act as slaves. The master unit's system clock and the master identity are the central
parts in the frequency hop technology. The hop channel is dete rmined by the hop
sequence and by the phase in this sequence. The identity of the master determines the
sequence and the master unit's system clock determines the phase. In the slave unit, an
offset may be added to its system clock to create a copy of the master's clock. In this way
every unit in the Bluetooth connection holds synchronized clocks and the master identity,
that uniquely identifies the connection. Hops synchronized with the master can therefore
be achieved as described in Figure 6. 79 hop carriers have been defined for the Bluetooth
Technology except for France and Spain where 23 hop carriers have been defined,
because the ISM-band is narrower there. Slave
Hop
slave Phase
clock
Sequence
Off set
Master identity
f n+2
625 ms
Radio parameters
Bluetooth units operate on the ISM band, at 2.45 GHz. The transmitting power is
between 1 and 100 mW. The radio- frequency transmitters are very small. Ericsson's 1
mW Bluetooth radio module is only 10.2x14x1.6 mm. The low power consumption
implies that a Bluetooth unit can operate on the power from a small battery for a long
time (months). These hardware characteristics make it possible to fit a Bluetooth unit in
many electrical devices. The maximum Bluetooth range is 10 m, with a possibility to
extend it to 100 m. The maximum bit rate is 1 Mbit/s. Maximum effective payload is
lower because the different protocol layers require data payload for signalling to their
The roles in a piconet can change but there can never be more than one master.
The master unit controls all traffic in the piconet. It allocates capacity for SCO links and
handles a polling scheme for ACL links. Slave units may only send in the slave-to- master
slot after being addressed in the preceding master-to-slave slot. If the master does not
have any information to send in the master-to-slave slot, a packet with access code and
header only is sent. That is, every slave unit is addressed in a specific order, and polling
scheme, and may only send upon being addressed. In this way, packet collisions between
sending slave units are eliminated.
The wake-up sequence is transmitted by the master over the 32 (or 16 for Spain
and France, below is the 32 hop carrier system described) wake up carriers. Initially, the
16 first hop carriers are used, if there is no response, the rest of the carriers are used. The
slave's system clock determines the phase in the wake- up sequence. The slave listens for
18 slots on the wake-up carrier and compares the incoming signal with the access code
Scatternet
To optimize the use of the available spectrum, several piconets can exist in the
same area. This is called Scatternet. Within one Scatternet all units share the same
frequency range but each piconet uses different hop sequences and transmits on different
1 MHz hop channels. Thus, a way to optimize the data transmission capability is to keep
the piconets small (i.e. few units). All piconets share the 80 MHz band, where each
piconet uses 1 MHz, thus, as long as the piconets pick different hop frequencies, no
sharing of 1 MHz hop channels occurs.
Why B
File Transfer
The File Transfer usage model offers the capability to transfer data objects from
one Bluetooth device to another. Files, entire folders, directories and streaming media
formats are supported in this usage model. The model also offers the possibility of
browsing the contents of the folders on a remote device. Furthermore, push and exchange
operations are covered in this usage model, e.g. business card exchange using the vCard
format. The File Transfer model is based on GOEP.
Internet Bridge
The Internet Bridge usage model describes how a mobile phone or cordless
modem provides a PC with dial- up networking capabilities without the need for physical
connection to the PC. This networking scenario requires a two-piece protocol stack, one
for AT-commands to control the mobile phone and another stack to transfer payload
data..
LAN Access
The LAN Access usage model is similar to the Internet Bridge user model. The
difference is that the LAN Access usage model does not use the protocols for AT-
commands. The usage model describes how data terminals use a LAN access point as a
wireless connection to a Local Area Network. When connected, the data terminals
operate as if it they were connected to the LAN via dial-up networking.
Three-in-One Phone
The Three- in-One Phone usage model describes how a telephone handset may
connect to three different service providers. The telephone may act as a cordless
telephone connecting to the public switched telephone network at home, charged at a
fixed line charge. This scenario includes making calls via a voice base station, and
making direct calls between two terminals via the base station. The telephone can also
connect directly to other telephones acting as a “walkie-talkie” or handset extension i.e.
no charging needed. Finally, the telephone may act as a cellular telephone connecting to
the cellular infrastructure. The cordless and intercom scenarios use the same protocol
stack.
Ultimate Headset
The Ultimate Headset usage model defines how a Bluetooth equipped wireless
headset can be connected, to act as a remote unit‟s audio input and output interface. The
unit is probably a mobile phone or a PC for audio input and output. As for the Internet
Bridge user model, this model requires a two-piece protocol stack; one for AT-commands
to control the mobile phone and another stack to transfer payload data, i.e. speech. The
AT-commands control the telephone regarding for instance answering and terminating
calls.
COMPETING TECHNIQUES
&
BLUETOOTH.
Competing techniques.
Bluetooth strength.
Competing techniques
There are a number of competitors to the Bluetooth technology. However, there is
no obvious single competitor in all the market segments in which the Bluetooth
technology can operate.
IrDA
The main competitor in the cable replacement market segment is IrDA. IrDA is an
infrared interface standard providing wireless solutions between, for instance, mobile
phones and PDAs. The technique is well known in the market but has had problems
because some IrDA manufacturers have made implementations incompatible with
standard implementations. The maximum payload in the IrDA technology exceeds the
maximum Bluetooth payload. The two main disadvantages with IrDA are that it is limited
to point-to-point connections (only two parties in a connection) and its need for line of
sight (since it is based on infrared light).
Home RF
Home RF is a technique developed by a consortium with, among others,
Microsoft, Intel, HP, Motorola and Compaq. The technique is developed from the. DECT
concept and operates in the 2.4 GHz frequency band (the same as Bluetooth). The
intention has been to develop a technique for the home market. There are many
similarities with Bluetooth, price per unit, range, transmitting power etc. The major
differences are that Home RF can handle up to 127 units per net and it uses just 50
frequency hops per second. The figures for Bluetooth are 8 and 1600 respectively.
The advantages make it possible to introduce support for Bluetooth in many types
of devices at a low price. The diversity in product offerings (mobile phones, PDAs,
computers, computer hardware, notebooks etc) from companies in the Bluetooth SIG and
their broad support for the technique creates a unique market position. Both hardware and
device manufacturers will work for the introduction of Bluetooth in many different
devices.
The capabilities provided by Bluetooth, approximately 720 kbit/s, can be used for
cable replacement and several other applications such as speech, LAN and so on, as
described in the use cases, described in the section entitled Bluetooth Usage Models.
Figure 8 indicates in what areas the Bluetoo th concept can be used. Defining of specific
user models and corresponding profiles combined with the four general profiles will most
likely lead to a market situation where applications covered by the user models will use
the defined user models and their profiles. Furthermore, it is likely that new applications
will use the standard profiles and thereby avoid interoperability problems between
different manufacturers.
The e-Wallet
Many people believe that the mobile phone can become the portal of first choice
to the e-commerce world. At present however a separate Smart Card is required to hold
electronic cash - no-one wants to remove their SIM from the phone in order have it read
by a Point of Sale terminal. Bluetooth of course will allow the SIM (which now becomes
a multi- function Smart Card) to be read while it remains in the phone. With 100 Kbytes
Smart Cards on the horizon we can foresee our mobile phones becoming the main
repository for our cash, health info, personal preferences, season tickets, etc. etc. The
wide area cellular world will be one of the main routes for updating it.
TECHNICAL DEFINITIONS :
PICONET : A collection of devices connected via Bluetooth technology in an ad hoc
fashion. A piconet starts with grow to eight connected devices. All Bluetooth devices are
peer unit and have identical implementations. However, when establishing a piconet
connection. The Bluetooth system supports both point-to-point and point-to-multi point
connections.
MASTER UNIT : The devices in the piconet whose clock and hopping sequence are used
to synchronize all other devices in the piconet.
SLAVE UNITS : All devices in the piconet that are not the master.
MAC ADDRESS : 3-bit address to distinguish between units participating in the piconet.
PARKED UNITS : Devices in a piconet, which are synchronized but do not have a MAC
address.