Bluetooth Technology

  1. Device Connectivity and Network Formation
    1. Device Roles and Responsibilities
      1. Central Device Role
        1. Classic Bluetooth Master Functions
          1. BLE Central Responsibilities
            1. Connection Management
            2. Peripheral Device Role
              1. Classic Bluetooth Slave Functions
                1. BLE Peripheral Responsibilities
                  1. Service Provision
                  2. BLE-Specific Roles
                    1. Observer Role Functions
                      1. Broadcaster Role Functions
                        1. Role Flexibility
                      2. Device Discovery Mechanisms
                        1. Classic Bluetooth Inquiry
                          1. Inquiry Process Steps
                            1. Inquiry Response Handling
                              1. Device Information Exchange
                              2. BLE Advertising
                                1. Advertising Channel Usage
                                  1. Advertising Data Structure
                                    1. Advertising Types and Modes
                                    2. Scanning Procedures
                                      1. Active Scanning Process
                                        1. Passive Scanning Benefits
                                          1. Scan Response Handling
                                        2. Connection Establishment
                                          1. Classic Bluetooth Paging
                                            1. Page Process Mechanics
                                              1. Page Response Protocol
                                                1. Connection Parameter Negotiation
                                                2. BLE Connection Initiation
                                                  1. Connection Request Process
                                                    1. Connection Parameter Selection
                                                      1. Connection Event Scheduling
                                                    2. Security and Pairing
                                                      1. Pairing Fundamentals
                                                        1. Pairing vs Bonding Concepts
                                                          1. Security Level Requirements
                                                          2. Pairing Methods
                                                            1. Legacy Pairing Process
                                                              1. Secure Simple Pairing (SSP)
                                                                1. LE Secure Connections
                                                                2. Authentication and Key Exchange
                                                                  1. Temporary Key Generation
                                                                    1. Long-Term Key Establishment
                                                                      1. Authentication Procedures
                                                                      2. Bonding and Key Storage
                                                                        1. Bonding Process Steps
                                                                          1. Security Key Management
                                                                            1. Device Recognition
                                                                          2. Network Topologies
                                                                            1. Piconet Structure
                                                                              1. Master-Slave Relationship
                                                                                1. Device Limitations
                                                                                  1. Communication Scheduling
                                                                                  2. Scatternet Formation
                                                                                    1. Multiple Piconet Participation
                                                                                      1. Bridge Device Functions
                                                                                        1. Complexity and Limitations