Different versions of Bluetooth
geeksforgeeks.org/different-versions-of-bluetooth
1. Bluetooth v1.0 – It was the first standard of Bluetooth technology, faced many
difficulties with interoperability as manufacturers were facing problems and difficulty
in making their products interoperable, being the drawback of this version.
2. Bluetooth v1.1 – This version fixed all those problems which were faced from v1.0
i.e. it fixed the problem of interoperability and also added non encrypted channels
and signal strength indicators to it.
3. Bluetooth v1.2 – This version gave faster transfer or transmission speed as
compared to that of v1.1, up to 721 kbit/s, better transmission involving
retransmission of corrupted data packets if any.
4. Bluetooth v2.0+EDR – This version introduced AFH and Enhanced Data Rate
(EDR) technology, which is used for faster transmission of data and allowing its
users to theoretically boost data transfer rate up to 3 megabits per second (Mbit/s)
& maximum data transfer rate is 2.1 Mbit/s. EDR can provide a lower power
consumption i.e, it will draw low power to operate. According to the specification,
Bluetooth v2.0+EDR, EDR is an optional feature in this version.
5. Bluetooth v2.1+EDR – This version improves the pairing experience for Bluetooth
devices & let device pairing happen much faster and more easily, while increasing
the overall security and use.
6. Bluetooth v3.0+HS – This version could reach data transfer speed of up to 24
Mbits/s & the important feature of this version is its high-speed data transfer and
can able to transfer large amounts of data.
7. Bluetooth v4.0 LE – Bluetooth Low energy, it kept data rates at up by lowering the
power, & it was mainly designed to frequently transmit data to devices, such as
smart devices including fitness bands, smart watches etc, while saving power. This
version is also called as Bluetooth Smart & mainly used by Health and fitness
companies.
8. Bluetooth 5.0 – Bluetooth 5.0 was released in 2016 and introduced several
significant improvements, including higher data transfer rates, improved range, and
increased capacity. It introduced Dual Audio, which allowed devices to connect to
two audio devices simultaneously. It also included Bluetooth Mesh, which enabled
devices to communicate with each other in a network. The maximum data transfer
rate for Bluetooth 5.0 was 50
1/1
Unit 3B Bluetooth Smart Connectivity
Bluetooth overview
i. Bluetooth is a short-range wireless technology standard that is used for exchanging data
between fixed and mobile devices over short distances using Ultra high frequency radio
waves in the ISM (industrial, scientific and medical) bands, from 2.402 to 2.48 GHz, and
building personal area networks (PANs).
ii. It is mainly used as an alternative to wire connections, to exchange files between nearby
portable devices and connect cell phones and music players with wireless headphones. In the
most widely used mode, transmission power is limited to 2.5 milliwatts, giving it a very short
range of up to 10 metres (33 ft).
a. Bluetooth links
i. To provide effective mechanisms for the data transfer over a Bluetooth link, there are
number of protocols and different types of link. There are two main types of Bluetooth link
that are available and can be set up:
SCO Synchronous Connection Orientated communications link
ACL Asynchronous Connectionless communications Link
The Bluetooth link that is used is determined by the type of Bluetooth data transfer required.
i. SCO: The SCO or Synchronous Connection Orientated communications link is used where
data is to be streamed rather than transferred in a framed format. The SCO can operate
alongside the ACL channels
ii. ACL: The ACL or Asynchronous Connectionless Communications Link is possible the
most widely used form of Bluetooth link. The ACL Bluetooth link is used for carrying
framed data - i.e. data submitted from an application to logical link control and adaptation
protocol channel. The channel may support either unidirectional or bidirectional Bluetooth
data transfer.
b. Bluetooth connection basics
i. Bluetooth is a system in which connections are made between a master and a slave. These
connections are maintained until they are broken, either by deliberately disconnecting, or by
communications cannot be maintained - typically this occurs as the devices go out of range of
each other.
ii. The way in which Bluetooth devices make connections is more complicated than many
other types of wireless device. The reason for this is the frequency hopping nature of the
devices.
iii. Within the connection process, there are four types of Bluetooth connection channel:
Basic piconet channel, Adapted piconet channel, Inquiry channel & Paging channel
c. Bluetooth pairing
i. The devices can connect easily and quickly, known as Bluetooth pairing. Once Bluetooth
pairing has occurred two devices may communicate with each other.
ii. Bluetooth pairing is generally initiated manually by a device user. The Bluetooth link for
the device is made visible to other devices. They may then be paired.
1
iii. The Bluetooth pairing process is typically triggered automatically the first time a device
receives a connection request from a device with which it is not yet paired. In order that
Bluetooth pairing may occur, a password has to be exchanged between the two devices. This
password or "Passkey" as it is more correctly termed is a code shared by both Bluetooth
devices. It is used to ensure that both users have agreed to pair with each other.
iv. The process of Bluetooth pairing is summarised below:
a. Bluetooth device looks for other Bluetooth devices in range
b. Two Bluetooth devices find each other
c. Prompt for Passkey
Device 1 sends passkey: The initiating device, Device 1 sends the passkey that has been
entered to Device 2.
Device 2 sends passkey: The passkeys are compared and if they are both the same, a trusted
pair is formed, Bluetooth pairing is established.
d. Communication is established
d. Bluetooth security basics
i. Bluetooth security is important as devices are subject to a variety of wireless and
networking attacking (including denial of service attacks, eavesdropping, man-in-the-middle
attacks, message modification, and resource misappropriation).
ii. Bluetooth security must address these attacks in Bluetooth implementations and
specifications. These may include attacks against improperly secured Bluetooth
implementations which can provide attackers with unauthorized access.
iii. Many Bluetooth network has an issue with Bluetooth security, hackers may be able to
gain access to information from phone lists to more sensitive information.
There are three basic means of providing Bluetooth security:
Authentication: In this process the identity of the communicating devices are verified. User
authentication is not part of the main Bluetooth security elements of the specification.
Confidentiality: This process prevents information being eavesdropped by ensuring that only
authorised devices can access and view the data.
Authorisation: This process prevents access by ensuring that a device is authorised to use a
service before enabling it to do so.
e. Common Bluetooth security issues
There are a number of ways in which Bluetooth security can compromised often. The major
forms of Bluetooth security problems fall into the following categories:
i. Bluejacking: Bluejacking is often not a major malicious security problem, although there
can be issues with it, especially as it enables someone to get their data onto another person's
phone, etc. Bluejacking involves the sending of a vCard message via Bluetooth to other
Bluetooth users within the locality - typically 10 metres. The aim is that the recipient will not
realise what the message is and allow it into their address book. Thereafter messages might
be automatically opened because they have come from a supposedly known contact
ii. Bluebugging: This more of an issue. This form of Bluetooth security issue allows hackers
to remotely access a phone and use its features. This may include placing calls and sending
text messages while the owner does not realise that the phone has been taken over.
iii. Car Whispering: This involves the use of software that allows hackers to send and
receive audio to and from a Bluetooth enabled car stereo system
2
Bluetooth Key Versions
Bluetooth 1.0 and 1.0B
Products weren't able to exchange and make use of information. The condition of being
anonymous wasn't possible and preventing certain services from using Bluetooth
environments
Bluetooth 1.1
i. Ratified as IEEE Standard 802.15.1
ii. Many errors found in the v1.0B specifications were fixed.
iii. Added possibility of non-encrypted channels.
iv. Received Signal Strength Indicator (RSSI).
Bluetooth 1.2
Major enhancements include:
Faster Connection and Discovery
Adaptive frequency-hopping spread spectrum (AFH), which improves resistance to radio
frequency interference by avoiding the use of crowded frequencies in the hopping
sequence.
Higher transmission speeds in practice, up to 721 kbit/s.
Extended Synchronous Connections (eSCO), which improve voice quality of audio links.
Host Controller Interface (HCI) operation with three-wire UART.
Ratified as IEEE Standard 802.15.1
Bluetooth 2.0 + EDR
The introduction of an Enhanced Data Rate (EDR) for faster data transfer. The bit rate of
EDR is 3 Mbit/s, although the maximum data transfer rate is 2.1 Mbit/s. EDR uses a
combination of Gaussian frequency-shift keying (GFSK) and phase-shift keying modulation
(PSK).
Bluetooth 2.1 + EDR
The headline feature of v2.1 is secure simple pairing (SSP): this improves the pairing
experience for Bluetooth devices, while increasing the use and strength of security.
Version 2.1 allows various other improvements, including extended inquiry response (EIR),
which provides more information during the inquiry procedure to allow better filtering of
devices before connection.
Bluetooth 3.0 + HS
Bluetooth v3.0 + HS (High-Speed) provides theoretical data transfer speeds of up to 24
Mbit/s, though not over the Bluetooth link itself. Instead, the Bluetooth link is used for
negotiation and establishment, and the high data rate traffic is carried over a
collocated 802.11 link.
Bluetooth 4.0 (Bluetooth Low Energy)
Bluetooth 4.0 includes Classic Bluetooth, Bluetooth high speed and Bluetooth Low
Energy (BLE) protocols. Bluetooth high speed is based on Wi-Fi, and Classic Bluetooth
consists of legacy Bluetooth protocols. Bluetooth Low Energy, previously known as Wibree,
is a subset of Bluetooth v4.0 with an entirely new protocol stack for rapid build-up of simple
links. As an alternative to the Bluetooth standard protocols that were introduced in Bluetooth
v1.0 to v3.0, it is aimed at very low power applications powered by a coin cell. Chip designs
allow for two types of implementation, dual-mode, single-mode and enhanced past versions.
3
In a single-mode implementation, only the low energy protocol stack is implemented.
In a dual-mode implementation, Bluetooth Smart functionality is integrated into an
existing Classic Bluetooth controller.
Compared to Classic Bluetooth, Bluetooth Low Energy is intended to provide considerably
reduced power consumption and cost while maintaining a similar communication range.
Consider table 1 for more comparison.
Bluetooth 4.1
Bluetooth v4.1 is an incremental software update to Bluetooth Specification v4.0, and not a
hardware update. Adds new features that improve consumer usability. These include
increased co-existence support for LTE, bulk data exchange rates and helps the developer
innovation by allowing devices to support multiple roles simultaneously.
Bluetooth 4.2
Bluetooth 4.2 Introduces features for the Internet of Things.
The major areas of improvement are:
Low Energy Secure Connection with Data Packet Length Extension
Link Layer Privacy with Extended Scanner Filter Policies
Internet Protocol Support Profile (IPSP) for Bluetooth Smart things to support connected
home
Bluetooth 5
The increase in transmissions could be important for Internet of Things devices, where many
nodes connect throughout a whole house. Bluetooth 5 increases capacity of connectionless
services such as location-relevant navigation of low-energy Bluetooth connections.
The major areas of improvement are:
Bluetooth 5.1
The major areas of improvement is Angle of Arrival (AoA) and Angle of Departure (AoD)
which are used for locating and tracking of devices
Bluetooth 5.2
Enhanced Attribute Protocol (EATT), an improved version of the Attribute Protocol
(ATT)
Table 1: Comparition of Bluetooth Low Energy (LE) to Bluetooth Classic
Bluetooth Low Energy (LE) Bluetooth Classic
Frequency 2.4GHz ISM Band 2.4GHz ISM Band
Band
Channels 40 channels with 2 MHz spacing 79 channels with 1 MHz spacing
Channel Usage Frequency-Hopping Spread Frequency-Hopping Spread
Spectrum (FHSS) Spectrum (FHSS)
Modulation GFSK GFSK
Data Rate 2 Mb/s 3 Mb/s
Tx Power ≤ 100 mW (+20 dBm) ≤ 100 mW (+20 dBm)
4
Data Transports Asynchronous Connection-oriented Asynchronous Connection-oriented
Isochronous Connection-oriented Synchronous Connection-oriented
Asynchronous Connectionless
Synchronous Connectionless
Isochronous Connectionless
Communication Point-to-Point Point-to-Point
Topologies Broadcast
Mesh
Positioning Presence: Advertising None
Features Direction: RSSI, HADM(Coming)
Distance: Direction
Finding (AoA/AoD)
Bluetooth Low Energy (BLE) Protocol
Although users will usually interface directly only with the upper layers of the Bluetooth Low
Energy protocol stack, it’s probably best to begin with a basic overview of the complete
stack, which provides a solid foundation to understanding how and why things operate the
way they do. As shown in Figure 1, a complete single-mode BLE device is divided into three
parts: controller, host, and application. Each of these basic building blocks of the protocol
stack is split into several layers that provide the functionality required to operate:
Figure 1: The BLE protocol stack
Application
The application is the highest layer and the one responsible for containing the logic, user
interface, and data handling related to the application. The architecture of an application is
highly dependent on each particular implementation.
Host
Includes the following layers:
5
Generic Access Profile (GAP)
Generic Attribute Profile (GATT)
Logical Link Control and Adaptation Protocol (L2CAP)
Attribute Protocol (ATT)
Security Manager (SM)
Host Controller Interface (HCI), Host side
Controller
Includes the following layers:
Host Controller Interface (HCI), Controller side
Link Layer (LL)
Physical Layer (PHY)
1. Physical Layer
The physical (PHY) layer is the part that actually contains the analog communications
circuitry, capable of modulating and demodulating analog signals and transforming them into
digital symbols. The radio uses the 2.4 GHz ISM (Industrial, Scientific, and Medical) band to
communicate and divides this band into 40 channels from 2.4000 GHz to 2.4835 GHz. As
shown in Figure 2, 37 of these channels are used for connection data and the last three
channels (37, 38, and 39) are used as advertising channels to set up connections and send
broadcast data.
Figure 2: Frequency channels
The standard uses a technique called frequency hopping spread spectrum, in which the radio
hops between channels on each connection event using the following formula:
channel = (curr_channel + hop) mod 37
The value of the hop is communicated when the connection is established and is therefore
different for every new established connection. The modulation chosen to encode the
bitstream over the air is Gaussian Frequency Shift Keying (GFSK), the same modulation used
by classic Bluetooth. The modulation rate for Bluetooth Low Energy is fixed at 1 Mbit/s,
which is therefore the upper physical throughput limit for the technology.
2. Link Layer
The Link Layer is directly interfaces with the PHY, and it is usually implemented as a
combination of custom hardware and software.
The Link Layer defines the following roles:
Advertiser: A device sending advertising packets.
Scanner: A device scanning for advertising packets.
Master: A device that initiates a connection and manages it later.
6
Slave: A device that accepts a connection request and follows the master’s timing. These
roles can be logically grouped into two pairs: advertiser and scanner
A BLE device can be a master, a slave, or both, depending on the use case and requirements.
Devices that initiate connections will be masters and devices that advertise their availability
and accept connections will be slaves. A master can connect to multiple slaves and a slave
can be connected to multiple masters. Typically, devices such as smartphones or tablets tend
to act as a master, while smaller, simpler, and memory-constrained devices such as
standalone sensors usually adopt the slave role.
Bluetooth Device Address
The fundamental identifier of a Bluetooth device is the Bluetooth device address. This 48-bit
(6-byte) number uniquely identifies a device among peers. There are two types of device
addresses, and one or both can be set on a particular device:
Public device address
This is the equivalent to a fixed, BR/EDR, factory-programmed device address. It must be
registered with the IEEE Registration Authority and will never change during the lifetime of
the device.
Random device address
This address can either be pre-programmed on the device or dynamically generated at
runtime. It has many practical uses in BLE.
3. Host Controller Interface (HCI)
i. Host Controller Interface (HCI) is a standard protocol that allows for the communication
between a host and a controller. A line draw at this level to indicate the controller (is the only
module with real-time requirements and contact with the physical layer) separated from the
host.
ii. Typical examples of this configuration include most smartphones, tablets, and personal
computers, in which the host (and the application) runs in the main CPU, while the controller
is located in a separate hardware chip connected via a UART or USB.
iii. The Bluetooth specification defines HCI as a set of commands and events for the host and
the controller to interact with each other, along with a data packet format and a set of rules
for flow control and other procedures.
4. Logical Link Control and Adaptation Protocol (L2CAP)
i. L2CAP serves as a protocol multiplexer that takes multiple protocols from the upper layers
and compresses them into the standard BLE packet format.
ii. It also performs fragmentation and recombination, a process by which it takes large
packets from the upper layers and breaks them up into chunks that fit into the 27-byte
maximum payload size of the BLE packets on the transmit side.
iii. On the reception path, it receives multiple packets that have been fragmented and
recombines them into a single large packet that will then be sent upstream to the appropriate
entity in the upper layers of the host.
iv. For Bluetooth Low Energy, the L2CAP layer is in charge or routing two main protocols:
the Attribute Protocol (ATT) and the Security Manager Protocol (SMP). The ATT (discussed
in) forms the basis of data exchange in BLE applications, while the SMP (see Security
Manager (SM)) provides a framework to generate and distribute security keys between peers.
7
5. Attribute Protocol (ATT)
i. The Attribute Protocol (ATT) is a simple client/server stateless protocol based on attributes
presented by a device. In BLE, each device is a client, a server, or both, irrespective of
whether it’s a master or slave.
ii. A client requests data from a server, and a server sends data to clients. The protocol is
strict when it comes to its sequencing: if a request is still pending (no response for it has been
yet received) no further requests can be sent until the response is received and processed.
iii. ATT operations includes Error Handling, Error Response, Server Configuration, Find
Information (Find Information Request/Response), Read Operations (Read by Type
Request/Response, Read Request/Response, Read Multiple Request/Response, Read by
Group Type Request/Response), Write Operations (Write Request/Response, Write
Command, Queued Writes, Prepare Write Request/Response, Execute Write
Request/Response), Server Initiated.
6. Security Manager Protocol (SMP)
The Security Manager (SM) is a protocol and security algorithms designed to provide the
Bluetooth protocol stack with the ability to generate and exchange security keys.
This allow the peers to communicate securely over an encrypted link, to trust the identity of
the remote device.
The Security Manager defines two roles:
Initiator
Always communicates to the Link Layer master and therefore to the GAP central.
Responder
Always corresponds to the Link Layer slave and therefore the GAP peripheral.
Security Procedures
The Security Manager provides support for the following three procedures:
Pairing
The procedure by which a temporary common security encryption key is generated to be able
to switch to a secure, encrypted link. This temporary key is not stored and is therefore not
reusable in subsequent connections.
Bonding
A sequence of pairing followed by the generation and exchange of permanent security keys
and stored in nonvolatile memory and therefore creating a permanent bond between two
devices, which will allow them to quickly set up a secure link in later connections without
having to perform a bonding procedure again.
Encryption Reestablishment
After a bonding procedure is complete, keys might have been stored on both sides of the
connection. If encryption keys have been stored, this procedure defines to use those keys in
later connections to reestablish.
7. Generic Attribute Profile (GATT)
i. The Generic Attribute Profile (GATT) builds on the Attribute Protocol (ATT) and it can be
considered as the backbone of BLE data transfer because it defines how data is organized and
exchanged between applications.
ii. It defines generic data objects that can be used and reused by a variety of application
profiles (known as GATT-based profiles). It maintains the same client/server architecture
present in ATT, but the data is now converted in services.
8. Generic Access Profile (GAP)
8
i. The Generic Access Profile (GAP) dictates how devices interact with each other at a lower
level so GAP can be considered to define the BLE topmost control layer. It defines the device
discovery, connection, security establishment, and to allow data exchange to take place
between devices (even from different vendors).
ii. GAP establishes different sets of rules and concepts to regulate and standardize the low-
level operation of devices. Such as roles and interaction between devices during the
operational modes and following the communication security aspects, including security
modes and procedures.
PSoC4 BLE architecture and Component Overview
Figure 3: PSoC4 BLE architecture
Features
PSoC 4100/4200 families have these major components:
i. 32-bit Cortex-M0 CPU with 48 MHz
ii. Up to 32-KB flash and 4-KB SRAM
iii. Four independent pulse-width modulators (PWMs) and synchronized analog-to-digital
converter (ADC) operation
iv. Up to 1 Msps 12-bit ADC
v. Up to two opamps with comparator mode and successive approximation register (SAR)
input buffering capability
vi. Two low-power comparators
vii. Two serial communication blocks (SCB) to work as SPI/ UART/I2C serial
communication channels
9
viii. Up to four programmable logic blocks, known as universal digital blocks (UDBs)
ix. CapSense and segment LCD drive
x. Low-power operating modes: Sleep, Deep-Sleep, Hibernate, and Stop
xi. Programming and debug system through serial wire debug (SWD)
1. CPU System
i. Processor: The heart of the PSoC 4 is a 32-bit Cortex-M0 CPU core running up to 48MHz.
It is optimized for low-power operation. It uses 16-bit instructions and executes a subset of
the Thumb-2 instruction set.
ii. Interrupt Controller: The CPU subsystem of PSoC includes a nested vectored interrupt
controller (NVIC) with 32 interrupt inputs and a wakeup interrupt controller (WIC), which
can wake the processor from deep-sleep mode. The Cortex-M0 implements non-maskable
interrupt (NMI) input.
2. Memory
The PSoC 4 memory subsystem consists of flash and SRAM. A supervisory ROM,
containing boot and configuration routines.
i. Flash: The PSoC 4 has a flash module with a flash read accelerator tightly coupled to the
CPU to improve average access times from the flash block.
ii. SRAM: The PSoC 4 provide SRAM, which is engaged during hibernate mode.
3. System-Wide Resources
i. Clocking System: The clock system for the PSoC 4100/4200 consists of the internal main
oscillator (IMO) and internal low-speed oscillator (ILO) as internal clocks and has provision
for an external clock. The default IMO frequency is 24 MHz and it can be adjusted between 3
MHz and 48 MHz in steps of 1 MHz. The ILO is a low-power, less accurate oscillator and is
used to generate clocks for peripheral operation in deep-sleep mode. Its clock frequency is 32
kHz with ±60 percent accuracy.
ii. Power System: The PSoC 4100/4200 operates with a single external supply over the range
of 1.71 V to 5.5 V. PSoC 4100/4200 has several low-power modes – sleep, deep-sleep,
hibernate, and stop modes – besides the default active mode.
iii. GPIO: Every GPIO in PSoC are capable to disables of input and output. A high-speed I/O
matrix is used to multiplex between various signals that may connect to an I/O pin.
4. Programmable Digital
The PSoC 4200 has up to four universal digital block (UDB). Each UDB contains structured
data-path logic and uncommitted programmable logic devices (PLD) logic with flexible
interconnect. The UDB array provides a switched routing fabric called the Digital System
Interconnect (DSI). The DSI allows routing of signals from peripherals and ports to and
within the UDBs.
5. Analog System
i. SAR ADC: PSoC 4 has a configurable SAR ADC. The ADC provides the choice of three
internal voltage references (VDD, VDD/2, and VREF) and an external reference through a
GPIO pin.
ii. Continuous Time Block mini (CTBm): The CTBm block provides continuous time
functionality at the entry and exit points of the analog subsystem. The CTBm has two high-
performance opamps.
6. Special Function Peripherals
i. LCD Segment Drive: The PSoC 4 has an LCD controller. It uses full digital methods
(digital correlation and PWM) to drive the LCD segments.
10
ii. CapSense: PSoC 4 devices has the CapSense feature, which allows you to use the
capacitive properties of your fingers to toggle buttons, sliders, and wheels
7. Program and Debug
PSoC 4 devices support programming and debug features of the device via the on-chip SWD
(Serial Wire Debug) interface. The SWD interface is also fully compatible with industry
standard third-party tools.
Additional information
Bluetooth profiles
Overviews of the more commonly used Bluetooth profiles are tabulated below:
SUMMARY OF MAIN BLUETOOTH PROFILES
BLUETOOTH DETAILS
PROFILE
Advanced Audio This Bluetooth profile defines how stereo quality audio can be streamed
Distribution from a media source to a sink.
Profile (A2DP) This Bluetooth profile defines two roles of an audio device: source and
sink:
1. Source (SRC): A device is the SRC when it acts as a source of a
digital audio stream that is delivered to the SNK of the piconet.
2. Sink (SNK): A device is the SNK when it acts as a sink of a digital
audio stream delivered from the SRC on the same piconet.
Audio/Video This Bluetooth profile provides a standard interface to control audio visual
Remote Control devices including televisions, stereo audio equipment, and the like. It
Profile allows a single remote control (or other device) to control all the equipment
(AVRCP) to which a particular individual has access.
The AVRCP Bluetooth profile defines two roles:
1. Controller: The controller is normally the remote control device
2. Target: As the name suggests, this si the device that is being
controlled or targeted and whose characteristics are being altered
This Bluetooth profile protocol specifies the scope of the AV/C Digital
Interface Command Set that is to be used. This protocol adopts the AV/C
device model and command format for control messages and those
messages are transported by the Audio/Video Control Transport Protocol
(AVCTP).
When using AVRCP, the controller detects the user action, i.e. button
presses, etc and then translates them into the A/V control signal. This
control signal is transmitted it to the remote Bluetooth enabled device. In
this way, the functions available for a conventional infrared remote
controller can be realized over Bluetooth, thereby providing a mode robust
form of communications.
Basic Imaging This Bluetooth profile details how an imaging device can be remotely
Profile (BIP) controlled, how it may print, and how it can transfer images to a storage
device. This Bluetooth profile is naturally intended for cameras and other
devices that can take pictures, including mobile phones now.
The Basic Image Profile, BIP defines two roles:
1. Imaging Initiator: This is the device that initiates this feature.
2. Imaging Responder: As the name implies, this si the device that
responds to the initiator.
11