EC8394 Notes U5
EC8394 Notes U5
EC8394 Notes U5
et
and is also used in other countries.
.n
It is based on the initial electromagnetic radiation spectrum
allocation for cellular service by the Federal Communications
Commission (FCC) in 1970. Introduced by AT&T in 1983,
pz
AMPS became one of the most widely deployed cellular system
in the United States.
ee
AMPS allocates frequency ranges within the 800 and 900
Megahertz (MHz) spectrum to cellular telephone. Each service
provider can use half of the 824-849 MHz range for receiving
ad
signals from cellular phones and half the 869-894 MHz range
for transmitting to cellular phones.
.p
www.padeepz.net EC8394
EC8394
et
cellular service by adding to FDMA a further subdivision of
each channel using time division multiple access (TDMA). This
.n
service is known as digital AMPS (D-AMPS). Although AMPS
and D-AMPS originated for the North American cellular
telephone market , they are now used worldwide with over 74
pz
million subscribers, according to Ericsson, one of the major
cellular phone manufacturers.
GSM
ee
ad
.p
w
w
w
www.padeepz.net EC8394
EC8394
et
• Voice and data transmission & receipt
• Frequency and time synchronization
.n
• Monitoring of power and signal quality of the surrounding cells
• Provision of location updates even during inactive state
pz
ee
ad
.p
w
w
w
www.padeepz.net EC8394
EC8394
et
.n
pz
ee
ad
.p
w
w
w
www.padeepz.net EC8394
EC8394
et
.n
pz
ee
ad
.p
w
w
w
www.padeepz.net EC8394
EC8394
et
.n
pz
ee
ad
.p
w
w
w
www.padeepz.net EC8394
EC8394
et
.n
pz
ee
ad
.p
w
w
w
www.padeepz.net EC8394
EC8394
et
.n
pz
ee
ad
.p
w
w
w
www.padeepz.net EC8394
EC8394
et
.n
pz
ee
ad
.p
w
w
w
www.padeepz.net EC8394
EC8394
et
.n
pz
ee
ad
.p
w
w
w
www.padeepz.net EC8394
EC8394
et
.n
pz
ee
ad
.p
w
w
w
www.padeepz.net EC8394
EC8394
CDMA
et
technology referred to as CDMA, see IS-95 and CDMA2000.
Multiplex techniques
.n
Analog modulation
pz
AM
FM
PM
QAM
ee
SM
SSB
ad
TDM
FDM / WDM
SDM
.p
Polarization multiplexing
Spatial multiplexing
OAM multiplexing
w
bandwidth)
Packet switching
w
Dynamic TDM
FHSS
DSSS
OFDMA
www.padeepz.net EC8394
EC8394
SC-FDM
MC-SS
Related topics
et
Media access control
v
.n
t
e
pz
Code division multiple access (CDMA) is a channel access method
used by various radio communication technologies.
ee
CDMA is an example of multiple access, which is where several
transmitters can send information simultaneously over a single
communication channel. This allows several users to share a band of
frequencies (see bandwidth). To permit this to be achieved without
ad
time multiplied with a high frequency pure sine wave carrier, and
transmitted. This is effectively a frequency convolution (Weiner-
Kinchin Theorem) of the two signals, resulting in a carrier with
narrow sidebands. In the digital case, the sinusoidal carrier is replaced
by Walsh functions. These are binary square waves that form a
www.padeepz.net EC8394
EC8394
complete orthonormal set. The data signal is also binary and the time
multiplication is achieved with a simple XOR function. This is
usually a Gilbert cell mixer in the circuitry.
et
Vectors can be multiplied by taking their dot product, by summing the
products of their respective components (for example, if u = (a, b) and
v = (c, d), then their dot product u·v = ac + bd). If the dot product is
.n
zero, the two vectors are said to be orthogonal to each other. Some
properties of the dot product aid understanding of how W-CDMA
works. If vectors a and b are orthogonal, then and:
pz
ee
ad
interfere with each other. In the case of IS-95 64 bit Walsh codes are
used to encode the signal to separate different users. Since each of the
64 Walsh codes are orthogonal to one another, the signals are
w
www.padeepz.net EC8394
EC8394
Example
et
.n
pz
ee
An example of four mutually orthogonal digital signals.
ad
www.padeepz.net EC8394
EC8394
Each sender has a different, unique vector v chosen from that set, but
the construction method of the transmitted vector is identical.
et
modelled by the addition of the transmission vectors, component by
component.
.n
If sender0 has code (1, –1) and data (1, 0, 1, 1), and sender1 has code
(1, 1) and data (0, 0, 1, 1), and both senders transmit simultaneously,
then this table describes the coding steps:
pz
Step Encode sender0 Encode sender1
0 code0 = (1, –1), data0 = (1, 0, code1 = (1, 1), data1 = (0, 0, 1,
ee
1, 1) 1)
Because signal0 and signal1 are transmitted at the same time into the
w
(1, –1, –1, 1, 1, –1, 1, –1) + (–1, –1, –1, –1, 1, 1, 1, 1) = (0, –2, –
w
2, 0, 2, 0, 2, 0)
w
www.padeepz.net EC8394
EC8394
code0 = (1, –1), signal = (0, –2, code1 = (1, 1), signal = (0, –2,
0
–2, 0, 2, 0, 2, 0) –2, 0, 2, 0, 2, 0)
et
decode0 = ((0, –2), (–2, 0), (2, decode1 = ((0, –2), (–2, 0), (2,
2
0), (2, 0)).(1, –1) 0), (2, 0)).(1, 1)
.n
decode0 = ((0 + 2), (–2 + 0), (2 decode1 = ((0 – 2), (–2 + 0), (2
3
+ 0), (2 + 0)) + 0), (2 + 0))
pz
data0=(2, –2, 2, 2), meaning (1, data1=(–2, –2, 2, 2), meaning
4
0, 1, 1) (0, 0, 1, 1)
ee
Further, after decoding, all values greater than 0 are interpreted as 1
while all values less than zero are interpreted as 0. For example, after
decoding, data0 is (2, –2, 2, 2), but the receiver interprets this as (1, 0,
1, 1). Values of exactly 0 means that the sender did not transmit any
ad
Assume signal0 = (1, –1, –1, 1, 1, –1, 1, –1) is transmitted alone. The
following table shows the decode at the receiver:
.p
code0 = (1, –1), signal = (1, –1, code1 = (1, 1), signal = (1, –1,
0
–1, 1, 1, –1, 1, –1) –1, 1, 1, –1, 1, –1)
w
decode0 = ((1, –1), (–1, 1), (1, – decode1 = ((1, –1), (–1, 1), (1, –
2
1), (1, –1)).(1, –1) 1), (1, –1)).(1, 1)
3 decode0 = ((1 + 1), (–1 – 1),(1 + decode1 = ((1 – 1), (–1 + 1),(1
www.padeepz.net EC8394
EC8394
When the receiver attempts to decode the signal using sender1's code,
et
the data is all zeros, therefore the cross correlation is equal to zero and
it is clear that sender1 did not transmit any data.
.n
Asynchronous CDMA
See also: Direct-sequence spread spectrum and near-far problem
pz
When mobile-to-base links cannot be precisely coordinated,
particularly due to the mobility of the handsets, a different approach is
required. Since it is not mathematically possible to create signature
sequences that are both orthogonal for arbitrarily random starting
ee
points and which make full use of the code space, unique "pseudo-
random" or "pseudo-noise" (PN) sequences are used in asynchronous
CDMA systems. A PN code is a binary sequence that appears random
but can be reproduced in a deterministic manner by intended
ad
the variance (e.g., the noise power) of the MAI increases in direct
proportion to the number of users. In other words, unlike synchronous
CDMA, the signals of other users will appear as noise to the signal of
w
www.padeepz.net EC8394
EC8394
et
arbitrarily strong signals using different codes, time slots or frequency
channels due to the orthogonality of these systems. This is not true for
Asynchronous CDMA; rejection of unwanted signals is only partial.
.n
If any or all of the unwanted signals are much stronger than the
desired signal, they will overwhelm it. This leads to a general
requirement in any asynchronous CDMA system to approximately
pz
match the various signal power levels as seen at the receiver. In
CDMA cellular, the base station uses a fast closed-loop power control
scheme to tightly control each mobile's transmit power.
ee
Advantages of asynchronous CDMA over other techniques
Efficient practical utilization of the fixed frequency spectrum
ad
In theory CDMA, TDMA and FDMA have exactly the same spectral
efficiency but practically, each has its own challenges – power control
in the case of CDMA, timing in the case of TDMA, and frequency
generation/filtering in the case of FDMA.
.p
www.padeepz.net EC8394
EC8394
et
simultaneous users is limited. There are a fixed number of orthogonal
codes, time slots or frequency bands that can be allocated for CDM,
TDMA, and FDMA systems, which remain underutilized due to the
.n
bursty nature of telephony and packetized data transmissions. There is
no strict limit to the number of users that can be supported in an
asynchronous CDMA system, only a practical limit governed by the
pz
desired bit error probability, since the SIR (Signal to Interference
Ratio) varies inversely with the number of users. In a bursty traffic
environment like mobile telephony, the advantage afforded by
ee
asynchronous CDMA is that the performance (bit error rate) is
allowed to fluctuate randomly, with an average value determined by
the number of users times the percentage of utilization. Suppose there
are 2N users that only talk half of the time, then 2N users can be
ad
the time.
slots in a TDMA system and 2N users that talk half of the time, then
half of the time there will be more than N users needing to use more
than N time slots. Furthermore, it would require significant overhead
to continually allocate and deallocate the orthogonal code, time slot or
frequency channel resources. By comparison, asynchronous CDMA
www.padeepz.net EC8394
EC8394
transmitters simply send when they have something to say, and go off
the air when they don't, keeping the same PN signature sequence as
long as they are connected to the system.
et
signal since bandwidth is a limited resource. However, spread
spectrum techniques use a transmission bandwidth that is several
orders of magnitude greater than the minimum required signal
.n
bandwidth. One of the initial reasons for doing this was military
applications including guidance and communication systems. These
systems were designed using spread spectrum because of its security
pz
and resistance to jamming. Asynchronous CDMA has some level of
privacy built in because the signal is spread using a pseudo-random
code; this code makes the spread spectrum signals appear random or
have noise-like properties. A receiver cannot demodulate this
ee
transmission without knowledge of the pseudo-random sequence used
to encode the data. CDMA is also resistant to jamming. A jamming
signal only has a finite amount of power available to jam the signal.
The jammer can either spread its energy over the entire bandwidth of
ad
this will undergo fading due to multipath at any given time. Like the
narrow band interference this will result in only a small loss of data
and can be overcome.
w
www.padeepz.net EC8394
EC8394
other words, as long as the multipath channel induces at least one chip
of delay, the multipath signals will arrive at the receiver such that they
are shifted in time by at least one chip from the intended signal. The
correlation properties of the pseudo-random codes are such that this
slight delay causes the multipath to appear uncorrelated with the
intended signal, and it is thus ignored.
et
Some CDMA devices use a rake receiver, which exploits multipath
delay components to improve the performance of the system. A rake
receiver combines the information from several correlators, each one
.n
tuned to a different path delay, producing a stronger version of the
signal than a simple receiver with a single correlation tuned to the
path delay of the strongest signal.[10]
pz
Frequency reuse is the ability to reuse the same radio channel
frequency at other cell sites within a cellular system. In the FDMA
and TDMA systems frequency planning is an important consideration.
ee
The frequencies used in different cells must be planned carefully to
ensure signals from different cells do not interfere with each other. In
a CDMA system, the same frequency can be used in every cell,
because channelization is done using the pseudo-random codes.
ad
Reusing the same frequency in every cell eliminates the need for
frequency planning in a CDMA system; however, planning of the
different pseudo-random sequences must be done to ensure that the
received signal from one cell does not correlate with the signal from a
.p
nearby cell.[11]
Since adjacent cells use the same frequencies, CDMA systems have
w
the ability to perform soft hand offs. Soft hand offs allow the mobile
telephone to communicate simultaneously with two or more cells. The
best signal quality is selected until the hand off is complete. This is
w
www.padeepz.net EC8394
EC8394
Collaborative CDMA
et
environment. The authors show that it is possible to achieve this
increase at a low complexity and high bit error rate performance in
flat fading channels, which is a major research challenge for
.n
overloaded CDMA systems. In this approach, instead of using one
sequence per user as in conventional CDMA, the authors group a
small number of users to share the same spreading sequence and
pz
enable group spreading and despreading operations. The new
collaborative multi-user receiver consists of two stages: group multi-
user detection (MUD) stage to suppress the MAI between the groups
ee
and a low complexity maximum-likelihood detection stage to recover
jointly the co-spread users’ data using minimum Euclidean distance
measure and users’ channel gain coefficients. In CDM signal security
is high.
ad
HAND OFF
In cellular telecommunications, the term handover or handoff refers
to the process of transferring an ongoing call or data session from one
channel connected to the core network to another channel. In satellite
.p
Purpose
w
when the phone is moving away from the area covered by one
cell and entering the area covered by another cell the call is
transferred to the second cell in order to avoid call termination
when the phone gets outside the range of the first cell;
www.padeepz.net EC8394
EC8394
et
a different cell, the call is transferred to a different channel in
the same cell or to a different channel in another cell in order to
avoid the interference;
.n
again in non-CDMA networks when the user behaviour
changes, e.g. when a fast-travelling user, connected to a large,
umbrella-type of cell, stops then the call may be transferred to a
pz
smaller macro cell or even to a micro cell in order to free
capacity on the umbrella cell for other fast-traveling users and to
reduce the potential interference to other cells or users (this
ee
works in reverse too, when a user is detected to be moving faster
than a certain threshold, the call can be transferred to a larger
umbrella-type of cell in order to minimize the frequency of the
handovers due to this movement);
ad
etc.
redirected from its current cell (called source) to a new cell (called
target). In terrestrial networks the source and the target cells may be
served from two different cell sites or from one and the same cell site
w
(in the latter case the two cells are usually referred to as two sectors
on that cell site). Such a handover, in which the source and the target
are different cells (even if they are on the same cell site) is called
w
www.padeepz.net EC8394
EC8394
A special case is possible, in which the source and the target are one
and the same cell and only the used channel is changed during the
handover. Such a handover, in which the cell is not changed, is called
intra-cell handover. The purpose of intra-cell handover is to change
one channel, which may be interfered or fading with a new clearer or
less fading channel.
et
Types of handover
.n
classification of handovers, they also can be divided into hard and soft
handovers:
pz
A hard handover is one in which the channel in the source cell is
released and only then the channel in the target cell is engaged.
Thus the connection to the source is broken before or 'as' the
connection to the target is made—for this reason such handovers
ee
are also known as break-before-make. Hard handovers are
intended to be instantaneous in order to minimize the disruption
to the call. A hard handover is perceived by network engineers
as an event during the call. It requires the least processing by the
ad
www.padeepz.net EC8394
EC8394
Comparison of handovers
et
An advantage of the hard handover is that at any moment in time one
call uses only one channel. The hard handover event is indeed very
.n
short and usually is not perceptible by the user. In the old analog
systems it could be heard as a click or a very short beep; in digital
systems it is unnoticeable. Another advantage of the hard handoff is
pz
that the phone's hardware does not need to be capable of receiving
two or more channels in parallel, which makes it cheaper and simpler.
A disadvantage is that if a handover fails the call may be temporarily
disrupted or even terminated abnormally. Technologies which use
ee
hard handovers, usually have procedures which can re-establish the
connection to the source cell if the connection to the target cell cannot
be made. However re-establishing this connection may not always be
possible (in which case the call will be terminated) and even when
ad
has been established and therefore the chances that the call will be
terminated abnormally due to failed handovers are lower. However,
by far a bigger advantage comes from the mere fact that
w
www.padeepz.net EC8394
EC8394
et
which they occur, the network engineers can balance the benefit of
extra call reliability against the price of reduced capacity.
.n
Possibility of handover
pz
technology, analog or digital, the cost of implementing them for
analog technologies is prohibitively high and none of the technologies
that were commercially successful in the past (e.g. AMPS, TACS,
NMT, etc.) had this feature. Of the digital technologies, those based
ee
on FDMA also face a higher cost for the phones (due to the need to
have multiple parallel radio-frequency modules) and those based on
TDMA or a combination of TDMA/FDMA, in principle, allow not so
expensive implementation of soft handovers. However, none of the
ad
www.padeepz.net EC8394
EC8394
Implementations
et
computer tools are used. They implement different algorithms and
may use for input data from field measurements or computer
predictions of radio wave propagation in the areas covered by the
.n
cells.
pz
the source cell are monitored and assessed in order to decide when a
handover may be necessary. The downlink (forward link) and/or
uplink (reverse link) directions may be monitored. The handover may
be requested by the phone or by the base station (BTS) of its source
ee
cell and, in some systems, by a BTS of a neighbouring cell. The
phone and the BTSs of the neighbouring cells monitor each other
others' signals and the best target candidates are selected among the
neighbouring cells. In some systems, mainly based on CDMA, a
ad
target candidate may be selected among the cells which are not in the
neighbour list. This is done in an effort to reduce the probability of
interference due to the aforementioned near-far effect.
.p
www.padeepz.net EC8394
EC8394
et
signals are used during a soft handoff, is referred to as the active set.
If the search finger finds a sufficiently-strong signal (in terms of high
Ec/Io or RSCP) from a new cell this cell is added to the active set.
.n
The cells in the neighbour list (called in CDMA neighbouring set) are
checked more frequently than the rest and thus a handoff with a
neighbouring cell is more likely, however a handoff with others cells
pz
outside the neighbor list is also allowed (unlike in GSM, IS-
136/DAMPS, AMPS, NMT, etc.).
ee
ad
.p
Satellite
(disambiguation).
w
www.padeepz.net EC8394
EC8394
Play media
et
.n
NASA's Earth-observing fleet as of June 2012.
pz
ee
ad
www.padeepz.net EC8394
EC8394
The world's first artificial satellite, the Sputnik 1, was launched by the
Soviet Union in 1957. Since then, thousands of satellites have been
et
launched into orbit around the Earth. Some satellites, notably space
stations, have been launched in parts and assembled in orbit. Artificial
satellites originate from more than 50 countries and have used the
.n
satellite launching capabilities of ten nations. A few hundred satellites
are currently operational, whereas thousands of unused satellites and
satellite fragments orbit the Earth as space debris. A few space probes
pz
have been placed into orbit around other bodies and become artificial
satellites to the Moon, Mercury, Venus, Mars, Jupiter, Saturn, Vesta,
Eros, and the Sun.
ee
Satellites are used for a large number of purposes. Common types
include military and civilian Earth observation satellites,
communications satellites, navigation satellites, weather satellites, and
research satellites. Space stations and human spacecraft in orbit are
ad
About 6,600 satellites have been launched. The latest estimates are
that 3,600 remain in orbit.[1] Of those, about 1,000 are operational;[2][3]
w
the rest have lived out their useful lives and are part of the space
debris. Approximately 500 operational satellites are in low-Earth
orbit, 50 are in medium-Earth orbit (at 20,000 km), the rest are in
w
www.padeepz.net EC8394
EC8394
et
.n
pz
Sputnik 1: The first artificial satellite to orbit Earth.
ee
The first artificial satellite was Sputnik 1, launched by the Soviet
Union on October 4, 1957, and initiating the Soviet Sputnik program,
with Sergei Korolev as chief designer (there is a crater on the lunar far
ad
side which bears his name). This in turn triggered the Space Race
between the Soviet Union and the United States.
the United States and ignited the so-called Space Race within the
Cold War.
w
www.padeepz.net EC8394
EC8394
1945 under the Bureau of Aeronautics of the United States Navy. The
United States Air Force's Project RAND eventually released the
above report, but did not believe that the satellite was a potential
military weapon; rather, they considered it to be a tool for science,
politics, and propaganda. In 1954, the Secretary of Defense stated, "I
know of no American satellite program."[11]
et
On July 29, 1955, the White House announced that the U.S. intended
to launch satellites by the spring of 1958. This became known as
Project Vanguard. On July 31, the Soviets announced that they
.n
intended to launch a satellite by the fall of 1957.
pz
Science Foundation, and the International Geophysical Year, military
interest picked up and in early 1955 the Army and Navy were
working on Project Orbiter, two competing programs: the army's
which involved using a Jupiter C rocket, and the civilian/Navy
ee
Vanguard Rocket, to launch a satellite. At first, they failed: initial
preference was given to the Vanguard program, whose first attempt at
orbiting a satellite resulted in the explosion of the launch vehicle on
national television. But finally, three months after Sputnik 2, the
ad
first standardized satellite bus design was the HS-333 GEO commsat,
launched in 1972.
w
www.padeepz.net EC8394
EC8394
et
1U CubeSat ESTCube-1, developed mainly by the students from the
.n
University of Tartu, carries out a tether deployment experiment on the
low Earth orbit.
pz
Space Surveillance Network
Main article: United States Space Surveillance Network
interested in the active satellites, but also tracks space debris which
upon reentry might otherwise be mistaken for incoming missiles.
w
www.padeepz.net EC8394
EC8394
et
Mobile satellite systems help connect remote regions, vehicles, ships,
people and aircraft to other parts of the world and/or other mobile or
.n
stationary communications units, in addition to serving as navigation
systems.
pz
Scientific research satellites (commercial and noncommercial)
Types
ad
.p
w
w
www.padeepz.net EC8394
EC8394
et
and small sizes.[17] New classifications are used to categorize
these satellites: minisatellite (500–100 kg), microsatellite (below
100 kg), nanosatellite (below 10 kg).[citation needed]
.n
Navigational satellites are satellites which use radio time
signals transmitted to enable mobile receivers on the ground to
determine their exact location. The relatively clear line of sight
pz
between the satellites and receivers on the ground, combined
with ever-improving electronics, allows satellite navigation
systems to measure location to accuracies on the order of a few
ee
meters in real time.
Reconnaissance satellites are Earth observation satellite or
communications satellite deployed for military or intelligence
applications. Very little is known about the full power of these
ad
www.padeepz.net EC8394
EC8394
et
.n
pz
International Space Station as seen from Space
BLUETOOTH
This article is about a wireless technology standard. For the medieval
w
Bluetooth
www.padeepz.net EC8394
EC8394
et
Mobile personal area
Industry
networks
.n
Mobile phones, Personal
Compatible
computers, Laptop
hardware
computers
pz
Physical
Up to 60 metres[1]
range
ee
Bluetooth is a wireless technology standard for exchanging data over
short distances (using short-wavelength UHF radio waves in the ISM
band from 2.4 to 2.485 GHz[2]) from fixed and mobile devices, and
ad
www.padeepz.net EC8394
EC8394
Implementation
et
packets and each packet is transmitted on one of the 79 designated
Bluetooth channels. Each channel has a bandwidth of 1 MHz.
Bluetooth 4.0 uses 2 MHz spacing which allows for 40 channels. The
.n
first channel starts at 2402 MHz and continues up to 2480 MHz in
1 MHz steps. It usually performs 1600 hops per second, with
Adaptive Frequency-Hopping (AFH) enabled.[12]
pz
Originally, Gaussian frequency-shift keying (GFSK) modulation was
the only modulation scheme available; subsequently, since the
introduction of Bluetooth 2.0+EDR, π/4-DQPSK and 8DPSK
ee
modulation may also be used between compatible devices. Devices
functioning with GFSK are said to be operating in basic rate (BR)
mode where an instantaneous data rate of 1 Mbit/s is possible. The
term Enhanced Data Rate (EDR) is used to describe π/4-DPSK and
ad
pair of 1250 µs. In the simple case of single-slot packets the master
transmits in even slots and receives in odd slots; the slave, conversely,
receives in even slots and transmits in odd slots. Packets may be 1, 3
w
or 5 slots long, but in all cases the master transmit will begin in even
slots and the slave transmit in odd slots.
www.padeepz.net EC8394
EC8394
et
will necessarily begin as master, as initiator of the connection; but
may subsequently prefer to be slave).
.n
The Bluetooth Core Specification provides for the connection of two
or more piconets to form a scatternet, in which certain devices
simultaneously play the master role in one piconet and the slave role
pz
in another.
At any given time, data can be transferred between the master and one
other device (except for the little-used broadcast mode.[citation needed])
ee
The master chooses which slave device to address; typically, it
switches rapidly from one device to another in a round-robin fashion.
Since it is the master that chooses which slave to address, whereas a
slave is (in theory) supposed to listen in each receive slot, being a
ad
Uses
w
1 100 20 ~100
2 2.5 4 ~10
www.padeepz.net EC8394
EC8394
3 1 0 ~1
et
not have to be in visual line of sight of each other, however a quasi
optical wireless path must be viable.[4] Range is power-class-
dependent, but effective ranges vary in practice; see the table on the
.n
right.
pz
1.2 1 Mbit/s >80 kbit/s
device as the lower powered device tends to set the range limit. In
some cases the effective range of the data link can be extended when
a Class 2 devices is connecting to a Class 1 transceiver with both
w
www.padeepz.net EC8394
EC8394
et
needed for individual use cases.
Bluetooth profiles
.n
Main article: Bluetooth profile
pz
interpret certain Bluetooth profiles, which are definitions of possible
applications and specify general behaviours that Bluetooth enabled
devices use to communicate with other Bluetooth devices. These
profiles include settings to parametrize and to control the
ee
communication from start. Adherence to profiles saves the time for
transmitting the parameters anew before the bi-directional link
becomes effective. There are a wide range of Bluetooth profiles that
describe many different types of applications or use cases for
ad
devices.[19][20]
List of applications
.p
w
w
w
www.padeepz.net EC8394
EC8394
et
where little bandwidth is required.
Wireless communication with PC input and output devices, the
most common being the mouse, keyboard and printer.
.n
Transfer of files, contact details, calendar appointments, and
reminders between devices with OBEX.
Replacement of previous wired RS-232 serial communications
pz
in test equipment, GPS receivers, medical equipment, bar code
scanners, and traffic control devices.
For controls where infrared was often used.
ee
For low bandwidth applications where higher USB bandwidth is
not required and cable-free connection desired.
Sending small advertisements from Bluetooth-enabled
advertising hoardings to other, discoverable, Bluetooth
ad
devices.[21]
Wireless bridge between two Industrial Ethernet (e.g.,
PROFINET) networks.
Three seventh and eighth generation game consoles, Nintendo's
.p
devices.[23]
Allowing a DECT phone to ring and answer calls on behalf of a
w
www.padeepz.net EC8394
EC8394
et
overboard alarm. A product using this technology has been
available since 2009.[25]
Calgary, Alberta, Canada's Roads Traffic division uses data
.n
collected from travelers' Bluetooth devices to predict travel
times and road congestion for motorists.[26]
pz
ee
ad
.p
w
w
w
www.padeepz.net EC8394