Bluetooth™ Profiles: The Definitive Guide

Book description

Build reliable, interoperable Bluetooth products—right now!

  • Practical guidance for building reliable, interoperable Bluetooth products

  • Covers usage models, profile principles, user expectations and dependencies

  • Details every foundation profile and key application, from cordless telephony to file transfer

  • Introduces emerging profiles for personal area networking, imaging, printing and automotive applications

  • Shows how to build your own new profiles

Bluetooth Profiles are the key to delivering interoperable products that work reliably, "right out of the box." Now, leading Bluetooth expert Dean Anthony Gratton brings the Bluetooth Profiles to life, showing you exactly how to use them to build winning user-centered products. Gratton takes you "under the hood" of every significant Bluetooth Profile, from Bluetooth's essential Foundation Profiles to powerful emerging profiles for personal area networking, automotive applications and imaging. Drawing on his extensive experience with Bluetooth development, Gratton also offers practical guidance for creating innovative new profiles of your own.

  • Accessible, authoritative coverage of usage models, profile principles, user expectations and dependencies

  • Presents practical introductions to GAP, SDAP, OBEX and SPP—the Foundation Profiles that underlie most of Bluetooth's application development

  • Covers all core Bluetooth application profiles: cordless telephony, intercom, headset, dial-up networking, fax, LAN access, object push, file transfer and synchronisation

  • Previews new profiles for imaging, printing, extended services discovery, hands-free and much more

  • Contains a concise "macro-level" review of current Bluetooth protocol stacks and development kits

  • Includes a detailed Bluetooth glossary and reference section

Table of contents

  1. Copyright
    1. Dedication
  2. About Prentice Hall Professional Technical Reference
  3. Foreword
  4. Preface
  5. Acknowledgements
  6. Introduction
  7. About the Author
  8. I. Building On Solid Foundations
    1. 1. My Bluetooth Application
      1. 1.1. Introduction
      2. 1.2. What Are Bluetooth Profiles?
      3. 1.3. Developing Bluetooth Applications
      4. 1.4. Understanding the Bluetooth Protocol Stack
        1. 1.4.1. The Profile and the Protocol
        2. 1.4.2. Understanding the Bluetooth Host
        3. 1.4.3. Understanding the Bluetooth Host Controller
      5. 1.5. Interoperability
      6. 1.6. Qualification
      7. 1.7. Summary
  9. II. The Profiles in Depth
    1. 2. The Generic Access Profile
      1. 2.1. Introduction
      2. 2.2. Defining Profile Requirements
      3. 2.3. Profile Principles
      4. 2.4. User Expectations
        1. 2.4.1. Bluetooth Parameters
          1. 2.4.1.1. Bluetooth Device Address
          2. 2.4.1.2. Bluetooth Device Name
            1. 2.4.1.2.1. Name Discovery
          3. 2.4.1.3. Bluetooth Passkey
          4. 2.4.1.4. Bluetooth Device Class
      5. 2.5. Modes
        1. 2.5.1. Discoverability
          1. 2.5.1.1. Non-Discoverable
          2. 2.5.1.2. Limited Discoverable
            1. 2.5.1.2.1. Limited Inquiry
            2. 2.5.1.2.2. Limited Device Discovery
          3. 2.5.1.3. General Discoverable
            1. 2.5.1.3.1. General Inquiry
            2. 2.5.1.3.2. General Device Discovery
        2. 2.5.2. Connectability
          1. 2.5.2.1. Non-Connectable
          2. 2.5.2.2. Connectable
        3. 2.5.3. Bonding
        4. 2.5.4. Pairing
          1. 2.5.4.1. Pairable
          2. 2.5.4.2. Non-Pairable
        5. 2.5.5. Security
          1. 2.5.5.1. Authentication
          2. 2.5.5.2. Encryption
          3. 2.5.5.3. Non-Secure (Security Mode 1)
          4. 2.5.5.4. Service Level Enforced Security (Security Mode 2)
          5. 2.5.5.5. Link Level Enforced Security (Secruity Mode 3)
      6. 2.6. Establishment Procedures
        1. 2.6.1. Link Establishment
        2. 2.6.2. Channel Establishment
        3. 2.6.3. Connection Establishment
      7. 2.7. Summary
    2. 3. The Service Discovery Application Profile
      1. 3.1. Introduction
      2. 3.2. Profile Principles
      3. 3.3. Lifting the Lid
        1. 3.3.1. Dependencies
          1. 3.3.1.1. The Service Discovery Protocol
            1. 3.3.1.1.1. The Client-Server Model
            2. 3.3.1.1.2. Identifying Services
            3. 3.3.1.1.3. The Service Discovery Record
            4. 3.3.1.1.4. Browsing Services
            5. 3.3.1.1.5. The Service Discovery Protocol Data Unit
              1. 3.3.1.1.5.1. Service Search Request and Response
              2. 3.3.1.1.5.2. Service Attribute Request and Response
              3. 3.3.1.1.5.3. Service Search Attribute Request and Response
          2. 3.3.1.2. SDP in the Service Discovery Application Profile
          3. 3.3.1.3. L2CAP
            1. 3.3.1.3.1. Channel Types
            2. 3.3.1.3.2. Signalling
            3. 3.3.1.3.3. Configuration Options
          4. 3.3.1.4. Link Manager
            1. 3.3.1.4.1. Capabilities
              1. 3.3.1.4.1.1. Authentication
              2. 3.3.1.4.1.2. Encryption
          5. 3.3.1.5. Link Controller (LC)
            1. 3.3.1.5.1. Capabilities
              1. 3.3.1.5.1.1. Inquiry and Inquiry Scan
              2. 3.3.1.5.1.2. Paging and Paging Scan
              3. 3.3.1.5.1.3. Inter-piconet
              4. 3.3.1.5.1.4. Packet Types
      4. 3.4. Summary
    3. 4. The Cordless Telephony Profile
      1. 4.1. Introduction
        1. 4.1.1. Comparing Cordless Telephony with the Headset Profile
      2. 4.2. Usage Models
        1. 4.2.1. Existing Usage Models
        2. 4.2.2. Future Usage Models
      3. 4.3. Profile Principles
      4. 4.4. User Expectations
      5. 4.5. Lifting the Lid
        1. 4.5.1. Dependencies
          1. 4.5.1.1. Generic Access
            1. 4.5.1.1.1. Service Class
            2. 4.5.1.1.2. Major Device Class
            3. 4.5.1.1.3. Minor Device Class
          2. 4.5.1.2. Service Discovery
          3. 4.5.1.3. The Telephony Control Protocol
            1. 4.5.1.3.1. Inter-operating Devices
            2. 4.5.1.3.2. TCS Messaging Format and Coding
          4. 4.5.1.4. TCS in the Cordless Telephony Profile
            1. 4.5.1.4.1. Call Control
            2. 4.5.1.4.2. Supplementary Service
            3. 4.5.1.4.3. Group Management
          5. 4.5.1.5. L2CAP
            1. 4.5.1.5.1. Channel Types
            2. 4.5.1.5.2. Signalling
            3. 4.5.1.5.3. Configuration Options
          6. 4.5.1.6. Link Manager
            1. 4.5.1.6.1. Capabilities
            2. 4.5.1.6.2. Encryption
            3. 4.5.1.6.3. Master-Slave Switch
            4. 4.5.1.6.4. Supporting Park Mode
            5. 4.5.1.6.5. SCO Links
          7. 4.5.1.7. Link Controller
            1. 4.5.1.7.1. Capabilities
              1. 4.5.1.7.1.1. Inquiry and Inquiry Scan
              2. 4.5.1.7.1.2. Paging and Paging Scan
              3. 4.5.1.7.1.3. Inter-piconet
              4. 4.5.1.7.1.4. Packet Types
              5. 4.5.1.7.1.5. Voice Codecs
      6. 4.6. Summary
    4. 5. The Intercom Profile
      1. 5.1. Introduction
      2. 5.2. Usage Models
      3. 5.3. Profile Principles
      4. 5.4. User Expectations
      5. 5.5. Lifting the Lid
        1. 5.5.1. Dependencies
          1. 5.5.1.1. Generic Access
            1. 5.5.1.1.1. Service Class
            2. 5.5.1.1.2. Major Device Class
            3. 5.5.1.1.3. Minor Device Class
          2. 5.5.1.2. Service Discovery
          3. 5.5.1.3. TCS in the Intercom Profile
            1. 5.5.1.3.1. Call Control
          4. 5.5.1.4. L2CAP
            1. 5.5.1.4.1. Channel Types
            2. 5.5.1.4.2. Signalling
            3. 5.5.1.4.3. Configuration Options
          5. 5.5.1.5. Link Manager
            1. 5.5.1.5.1. Capabilities
            2. 5.5.1.5.2. SCO Links
          6. 5.5.1.6. Link Controller
            1. 5.5.1.6.1. Capabilities
              1. 5.5.1.6.1.1. Inquiry and Inquiry Scan
              2. 5.5.1.6.1.2. Paging and Paging Scan
              3. 5.5.1.6.1.3. Inter-piconet
              4. 5.5.1.6.1.4. Packet Types
              5. 5.5.1.6.1.5. Voice Codecs
      6. 5.6. Summary
    5. 6. The Serial Port Profile
      1. 6.1. Introduction
      2. 6.2. Usage Models
        1. 6.2.1. Legacy Applications (Type I)
        2. 6.2.2. Cable Replacement Applications (Type I)
        3. 6.2.3. Intermediate Applications (Type II)
        4. 6.2.4. Bluetooth Aware Helper Applications
          1. 6.2.4.1. Applications in the Microsoft Windows Environment
          2. 6.2.4.2. Applications in an Embedded Environment
      3. 6.3. Profile Principles
      4. 6.4. User Expectations
      5. 6.5. Lifting the Lid
        1. 6.5.1. Dependencies
          1. 6.5.1.1. Service Discovery
          2. 6.5.1.2. The RFCOMM Protocol
            1. 6.5.1.2.1. Emulating the Physical Serial Port
            2. 6.5.1.2.2. RFCOMM Frames and Commands
            3. 6.5.1.2.3. Flow Control
            4. 6.5.1.2.4. Credit Based Flow Control
            5. 6.5.1.2.5. Encoding Commands and Responses
              1. 6.5.1.2.5.1. Test
              2. 6.5.1.2.5.2. Flow Control On/Off (FCON/FCOFF)
              3. 6.5.1.2.5.3. Modem Status Command (MSC)
              4. 6.5.1.2.5.4. Remote Port Negotiation (RPN)
              5. 6.5.1.2.5.5. Remote Line Status (RLS)
              6. 6.5.1.2.5.6. Parameter Negotiation (PN)
              7. 6.5.1.2.5.7. Non-supported Command (NSC)
          3. 6.5.1.3. RFCOMM in the Serial Port Profile
          4. 6.5.1.4. L2CAP
            1. 6.5.1.4.1. Channel Types
            2. 6.5.1.4.2. Signalling
            3. 6.5.1.4.3. Configuration Options
          5. 6.5.1.5. Link Manager
          6. 6.5.1.6. Link Controller
            1. 6.5.1.6.1. Capabilities
              1. 6.5.1.6.1.1. Inquiry and Inquiry Scan
              2. 6.5.1.6.1.2. Paging and Paging Scan
              3. 6.5.1.6.1.3. Inter-piconet
              4. 6.5.1.6.1.4. Packet Types
      6. 6.6. Summary
    6. 7. The Headset Profile
      1. 7.1. Introduction
        1. 7.1.1. Comparing Headsets with the Hands-Free Profile
        2. 7.1.2. Comparing Headsets with the Cordless Telephony Profile
        3. 7.1.3. Bluetooth Audio
      2. 7.2. Usage Models
        1. 7.2.1. Existing Usage Models
        2. 7.2.2. Future Usage Models
      3. 7.3. Profile Principles
      4. 7.4. User Expectations
        1. 7.4.1. Audio Gateway Initiated ACL Connection
        2. 7.4.2. Headset Initiated ACL Connection
        3. 7.4.3. Transferring an Audio Connection
        4. 7.4.4. Terminating an Audio Connection
        5. 7.4.5. Operating Volume Control
      5. 7.5. Lifting the Lid
        1. 7.5.1. Dependencies
          1. 7.5.1.1. Generic Access
            1. 7.5.1.1.1. Service Class
            2. 7.5.1.1.2. Major Device Class
            3. 7.5.1.1.3. Minor Device Class
          2. 7.5.1.2. Service Discovery
          3. 7.5.1.3. RFCOMM
            1. 7.5.1.3.1. AT Command Control
          4. 7.5.1.4. L2CAP
            1. 7.5.1.4.1. Channel Types
            2. 7.5.1.4.2. Signalling
            3. 7.5.1.4.3. Configuration Options
          5. 7.5.1.5. Link Manager
            1. 7.5.1.5.1. Capabilities
            2. 7.5.1.5.2. SCO Links
          6. 7.5.1.6. Link Controller
            1. 7.5.1.6.1. Capabilities
              1. 7.5.1.6.1.1. Inquiry and Inquiry Scan
              2. 7.5.1.6.1.2. Paging and Paging Scan
              3. 7.5.1.6.1.3. Packet Types
              4. 7.5.1.6.1.4. Voice Codecs
      6. 7.6. Summary
    7. 8. The Dial-up Networking Profile
      1. 8.1. Introduction
        1. 8.1.1. Comparing Dial-up Networking with the LAN Access Profile
      2. 8.2. Usage Models
        1. 8.2.1. The Wireless Bridge
        2. 8.2.2. The Internet Bridge
      3. 8.3. Profile Principles
      4. 8.4. User Expectations
        1. 8.4.1. Data Terminal
          1. 8.4.1.1. Connecting to a Gateway
          2. 8.4.1.2. Ending a Connection with a Gateway
          3. 8.4.1.3. Losing a Connection with a Gateway
        2. 8.4.2. Gateway
          1. 8.4.2.1. Accepting a Connection from a DT
          2. 8.4.2.2. Refusing a Connection from a DT
      5. 8.5. Lifting the Lid
        1. 8.5.1. Dependencies
          1. 8.5.1.1. Generic Access
            1. 8.5.1.1.1. Service Class
            2. 8.5.1.1.2. Major Device Class
            3. 8.5.1.1.3. Minor Device Class
          2. 8.5.1.2. Service Discovery
          3. 8.5.1.3. RFCOMM
            1. 8.5.1.3.1. AT Command Control
            2. 8.5.1.3.2. Call Progress and Audio Feedback
          4. 8.5.1.4. L2CAP
            1. 8.5.1.4.1. Channel Types
            2. 8.5.1.4.2. Signalling
            3. 8.5.1.4.3. Configuration Options
          5. 8.5.1.5. Link Manager
            1. 8.5.1.5.1. Capabilities
            2. 8.5.1.5.2. SCO Links
          6. 8.5.1.6. Link Controller
            1. 8.5.1.6.1. Capabilities
              1. 8.5.1.6.1.1. Inquiry and Inquiry Scan
              2. 8.5.1.6.1.2. Paging and Paging Scan
              3. 8.5.1.6.1.3. Packet Types
              4. 8.5.1.6.1.4. Voice Codecs
          7. 8.5.1.7. The Point-to-Point Protocol
      6. 8.6. Summary
    8. 9. The Fax Profile
      1. 9.1. Introduction
      2. 9.2. Usage Models
        1. 9.2.1. The Wireless Bridge
      3. 9.3. Profile Principles
      4. 9.4. User Expectations
        1. 9.4.1. Data Terminal
          1. 9.4.1.1. Connecting to a Gateway
          2. 9.4.1.2. Ending a Connection with a Gateway
          3. 9.4.1.3. Losing a Connection with a Gateway
        2. 9.4.2. Gateway
          1. 9.4.2.1. Accepting a Connection from a DT
          2. 9.4.2.2. Refusing a Connection from a DT
      5. 9.5. Lifting the Lid
        1. 9.5.1. Dependencies
          1. 9.5.1.1. Generic Access
            1. 9.5.1.1.1. Service Class
            2. 9.5.1.1.2. Major Device Class
            3. 9.5.1.1.3. Minor Device Class
          2. 9.5.1.2. Service Discovery
          3. 9.5.1.3. RFCOMM
            1. 9.5.1.3.1. AT Command Control
            2. 9.5.1.3.2. Call Progress and Audio Feedback
          4. 9.5.1.4. L2CAP
            1. 9.5.1.4.1. Channel Types
            2. 9.5.1.4.2. Signalling
            3. 9.5.1.4.3. Configuration Options
          5. 9.5.1.5. Link Manager
            1. 9.5.1.5.1. Capabilities
            2. 9.5.1.5.2. SCO Links
          6. 9.5.1.6. Link Controller
            1. 9.5.1.6.1. Capabilities
              1. 9.5.1.6.1.1. Inquiry and Inquiry Scan
              2. 9.5.1.6.1.2. Paging and Paging Scan
              3. 9.5.1.6.1.3. Packet Types
              4. 9.5.1.6.1.4. Voice Codecs
      6. 9.6. Summary
    9. 10. The LAN Access Profile
      1. 10.1. Introduction
        1. 10.1.1. Comparing LAN Access with the Dial-up Networking Profile
      2. 10.2. Usage Models
        1. 10.2.1. Existing Usage Models
        2. 10.2.2. Future Usage Models
      3. 10.3. Profile Principles
        1. 10.3.1.1. Additional Parameters
      4. 10.4. User Expectations
        1. 10.4.1. Data Terminal
          1. 10.4.1.1. Connecting to a LAP
          2. 10.4.1.2. Ending a connection with a LAP
          3. 10.4.1.3. Losing a connection with a LAP
        2. 10.4.2. LAN Access Point
          1. 10.4.2.1. Accepting a Connection from a DT
            1. 10.4.2.1.1. Pairing
          2. 10.4.2.2. Refusing a Connection from a DT
          3. 10.4.2.3. Initialising the LAN Access Service
          4. 10.4.2.4. Establishing a LAN Connection
          5. 10.4.2.5. Losing or Disconnecting a LAN Connection
      5. 10.5. Lifting the Lid
        1. 10.5.1. Dependencies
          1. 10.5.1.1. Generic Access
            1. 10.5.1.1.1. Service Class
            2. 10.5.1.1.2. Major Device Class
            3. 10.5.1.1.3. Minor Device Class
          2. 10.5.1.2. Service Discovery
          3. 10.5.1.3. RFCOMM
          4. 10.5.1.4. L2CAP
            1. 10.5.1.4.1. Channel Types
            2. 10.5.1.4.2. Signalling
            3. 10.5.1.4.3. Configuration Options
          5. 10.5.1.5. Link Manager
            1. 10.5.1.5.1. Capabilities
              1. 10.5.1.5.1.1. Pairing
              2. 10.5.1.5.1.2. Authentication
              3. 10.5.1.5.1.3. Encryption
              4. 10.5.1.5.1.4. Master-Slave Switch
          6. 10.5.1.6. Link Controller
            1. 10.5.1.6.1. Capabilities
              1. 10.5.1.6.1.1. Inquiry and Inquiry Scan
              2. 10.5.1.6.1.2. Paging and Paging Scan
              3. 10.5.1.6.1.3. Inter-piconet
              4. 10.5.1.6.1.4. Packet Types
          7. 10.5.1.7. Management Entity
        2. 10.5.2. Other Dependencies
          1. 10.5.2.1. The Point-to-Point Protocol
            1. 10.5.2.1.1. Initialisation and Shutting Down a PPP Connection
            2. 10.5.2.1.2. Establishing and Disconnecting a PPP Connection
            3. 10.5.2.1.3. Authentication Protocols
            4. 10.5.2.1.4. HDLC Framing
          2. 10.5.2.2. Internet Protocol (IP)
            1. 10.5.2.2.1. IP Address Allocation
      6. 10.6. Summary
    10. 11. The Generic Object Exchange Profile
      1. 11.1. Introduction
      2. 11.2. Profile Principles
      3. 11.3. Lifting the Lid
        1. 11.3.1. Dependencies
          1. 11.3.1.1. Generic Access
            1. 11.3.1.1.1. Service Class
            2. 11.3.1.1.2. Major Device Class
            3. 11.3.1.1.3. Minor Device Class
          2. 11.3.1.2. The Object Exchange Protocol
            1. 11.3.1.2.1. The Object Model and the Session Protocol
            2. 11.3.1.2.2. Providing Basic Operations
            3. 11.3.1.2.3. Connecting an OBEX Session
            4. 11.3.1.2.4. Disconnecting an OBEX Session
            5. 11.3.1.2.5. Putting Data
            6. 11.3.1.2.6. Getting Data
            7. 11.3.1.2.7. Setting a Location
            8. 11.3.1.2.8. OBEX over RFCOMM
            9. 11.3.1.2.9. OBEX over TCP/IP
          3. 11.3.1.3. OBEX in the Generic Object Exchange Profile
            1. 11.3.1.3.1. Initialisation and Establishing an OBEX Session
            2. 11.3.1.3.2. OBEX Connection with Authentication
            3. 11.3.1.3.3. Disconnecting an OBEX Session
            4. 11.3.1.3.4. Pushing Data to the Server
            5. 11.3.1.3.5. Pulling Data from the Server
            6. 11.3.1.3.6. Locating Data Objects
          4. 11.3.1.4. RFCOMM
          5. 11.3.1.5. L2CAP
            1. 11.3.1.5.1. Channel Types
            2. 11.3.1.5.2. Signalling
            3. 11.3.1.5.3. Configuration Options
          6. 11.3.1.6. Link Manager
          7. 11.3.1.7. Link Controller
            1. 11.3.1.7.1. Capabilities
              1. 11.3.1.7.1.1. Inquiry and Inquiry Scan
              2. 11.3.1.7.1.2. Paging and Paging Scan
              3. 11.3.1.7.1.3. Inter-piconet
              4. 11.3.1.7.1.4. Packet Types
      4. 11.4. Summary
    11. 12. The Object Push Profile
      1. 12.1. Introduction
      2. 12.2. Usage Models
      3. 12.3. Profile Principles
      4. 12.4. User Expectations
        1. 12.4.1.1. The Object Push Feature
        2. 12.4.1.2. Business Card Pull
        3. 12.4.1.3. Business Card Exchange
      5. 12.5. Lifting the Lid
        1. 12.5.1. Dependencies
          1. 12.5.1.1. Service Discovery
          2. 12.5.1.2. OBEX in the Object Push Profile
            1. 12.5.1.2.1. Initialisation and Establishing an OBEX Session
            2. 12.5.1.2.2. Disconnecting an OBEX Session
            3. 12.5.1.2.3. Pushing Data to the Server
            4. 12.5.1.2.4. Pulling Data from the Server
            5. 12.5.1.2.5. The Default Get Object
      6. 12.6. Summary
    12. 13. The File Transfer Profile
      1. 13.1. Introduction
      2. 13.2. Usage Models
      3. 13.3. Profile Principles
      4. 13.4. User Expectations
        1. 13.4.1.1. The Folder Browsing Feature
        2. 13.4.1.2. Object Transfer
        3. 13.4.1.3. Object Manipulation
      5. 13.5. Lifting the Lid
        1. 13.5.1. Dependencies
          1. 13.5.1.1. Service Discovery
          2. 13.5.1.2. OBEX in the File Transfer Profile
            1. 13.5.1.2.1. Initialisation and Establishing an OBEX Session
            2. 13.5.1.2.2. OBEX Connection with Authentication
            3. 13.5.1.2.3. Disconnecting an OBEX Session
            4. 13.5.1.2.4. Pushing Files to the Server
            5. 13.5.1.2.5. Pulling Files from the Server
            6. 13.5.1.2.6. Locating Data Objects
            7. 13.5.1.2.7. Providing Folder Services
              1. 13.5.1.2.7.1. Pulling and Pushing a Folder
              2. 13.5.1.2.7.2. Manipulating Files and Folders
      6. 13.6. Summary
    13. 14. The Synchronisation Profile
      1. 14.1. Introduction
      2. 14.2. Usage Models
      3. 14.3. Profile Principles
      4. 14.4. User Expectations
        1. 14.4.1.1. The Synchronisation Feature
        2. 14.4.1.2. The Sync Command Feature
        3. 14.4.1.3. The Automatic Synchronisation Feature
      5. 14.5. Lifting the Lid
        1. 14.5.1. Dependencies
          1. 14.5.1.1. Service Discovery
          2. 14.5.1.2. OBEX in the Synchronisation Profile
            1. 14.5.1.2.1. Initialisation and Establishing an OBEX Session
            2. 14.5.1.2.2. OBEX Connection with Authentication
            3. 14.5.1.2.3. Disconnecting an OBEX Session
            4. 14.5.1.2.4. Pushing Files to the Server
            5. 14.5.1.2.5. Pulling Files from the Server
      6. 14.6. Summary
  10. III. The New Profiles
    1. 15. Defining New Profiles
      1. 15.1. Introduction
      2. 15.2. Identifying New Profiles
        1. 15.2.1. Market Requirements and Usage Models
      3. 15.3. Profiles and New Protocols Under Development
        1. 15.3.1. Audio and Video
        2. 15.3.2. Printing and Imaging
        3. 15.3.3. Car
        4. 15.3.4. Extended Services Discovery
        5. 15.3.5. Personal Area Networking
        6. 15.3.6. Radio
        7. 15.3.7. Others
    2. 16. The PAN Profile: An Overview
      1. 16.1. Introduction
        1. 16.1.1. Comparing Personal Area Networking with the LAN Access and Dial-up Networking Profiles
        2. 16.1.2. What is the Future of the LAN Access and Dial-up Networking Profiles?
      2. 16.2. Usage Models
        1. 16.2.1. Existing Usage Models
        2. 16.2.2. Future Usage Models
      3. 16.3. Profile Principles
      4. 16.4. User Expectations
        1. 16.4.1. Personal Area Networking (PAN) User
          1. 16.4.1.1. Connecting to a GN or NAP
          2. 16.4.1.2. Ending a Connection with a GN or NAP
        2. 16.4.2. Group Ad-hoc Networking
          1. 16.4.2.1. Refusing a Connection from a PAN User
          2. 16.4.2.2. A GN Initiating a Connection with a PAN User
        3. 16.4.3. Network Access Points
          1. 16.4.3.1. Refusing a Connection from a PAN User
          2. 16.4.3.2. A NAP Initiating a Connection with a PAN User
        4. 16.4.4. Security Levels Available to the PAN Profile
          1. 16.4.4.1. Modes of Security
      5. 16.5. Summary
    3. 17. The Car Profiles: An Overview
      1. 17.1. Introduction
      2. 17.2. Usage Models
        1. 17.2.1. In-Car Safety
        2. 17.2.2. When to Enable Functionality
        3. 17.2.3. Existing Usage Models
        4. 17.2.4. Future Usage Models
      3. 17.3. The Hands-Free Profile Basics
        1. 17.3.1. Profile Principles
        2. 17.3.2. User Expectations
          1. 17.3.2.1. Audio Gateway and the Hands-Free Unit
            1. 17.3.2.1.1. Service Level and Audio Connection Set-Up
            2. 17.3.2.1.2. Creating a Call
            3. 17.3.2.1.3. Accepting a Call
            4. 17.3.2.1.4. Rejecting and Terminating a Call
            5. 17.3.2.1.5. Voice Recognition
      4. 17.4. The Phone Access Profile Basics
        1. 17.4.1. Profile Principles
        2. 17.4.2. User Expectations
          1. 17.4.2.1. The Mobile and Terminal Equipment Units
            1. 17.4.2.1.1. Service Level and Audio Connection Set-up
            2. 17.4.2.1.2. Creating a Call
            3. 17.4.2.1.3. Accepting a Call
            4. 17.4.2.1.4. Rejecting and Terminating a Call
            5. 17.4.2.1.5. Voice Recognition
            6. 17.4.2.1.6. Other Functionality
          2. 17.4.2.2. Security
      5. 17.5. The SIM Access Profile Basics
        1. 17.5.1. Profile Principles
        2. 17.5.2. User Expectations
          1. 17.5.2.1. The SIM Client and Server
          2. 17.5.2.2. Security
      6. 17.6. Summary
    4. 18. The ESDP: An Overview
      1. 18.1. Introduction
      2. 18.2. Profile Principles
      3. 18.3. User Expectations
        1. 18.3.1. L2CAP-based Solution
          1. 18.3.1.1. Discover and Advertise UPnP Services
          2. 18.3.1.2. Operating UPnP Services
        2. 18.3.2. IP-based Solutions
      4. 18.4. Summary
    5. 19. The Basic Printing and Basic Imaging Profiles: An Overview
      1. 19.1. Introduction
      2. 19.2. The Basic Printing Profile
        1. 19.2.1. Usage Models
        2. 19.2.2. Profile Principles
        3. 19.2.3. User Expectations
          1. 19.2.3.1. Printer Modes and Services
          2. 19.2.3.2. Configuration
          3. 19.2.3.3. Printing a Single Object
          4. 19.2.3.4. Printing Multiple Objects
      3. 19.3. The Basic Imaging Profile
        1. 19.3.1. Usage Models
        2. 19.3.2. Profile Principles
        3. 19.3.3. User Expectations
          1. 19.3.3.1. Imaging Modes and Features
          2. 19.3.3.2. Image Push and Pull
          3. 19.3.3.3. Advanced Imaging Printing
          4. 19.3.3.4. Archiving Images
          5. 19.3.3.5. Remote Camera
          6. 19.3.3.6. Remote Display
      4. 19.4. Summary
  11. A. Link Manager Protocol Reasons
  12. B. Host Controller Interface Reasons
  13. Glossary & Definitions
  14. References

Product information

  • Title: Bluetooth™ Profiles: The Definitive Guide
  • Author(s): Dean A. Gratton
  • Release date: December 2002
  • Publisher(s): Pearson
  • ISBN: 0130092215