Training Course

Bluetooth in Depth

  • 696
  • £2,385 +VAT
  • 3 days

Why this Bluetooth course?

In just three days, this unique course from LEVER Technology Group provides an essential, fast-track coverage of the technical aspects of Bluetooth technology, including:

  • Bluetooth operation
  • Bluetooth testing
  • Bluetooth troubleshooting

This hands-on practical course covers Bluetooth operation in depth, the installation of Bluetooth hardware and software, configuration, testing and troubleshooting.

Our Bluetooth course combination covers subjects and material that might require you to spend four or more days on other vendors’ training programmes.

Bluetooth Training Course Objectives

On completing this course, you will be able to:

  • Understand Bluetooth’s standards, architecture and operation.
  • Understand the APIs, radio interface and protocol layers used by Bluetooth.
  • Configure Bluetooth-enabled devices including mobile phones, PDAs and Access Points.
  • Install and configure Bluetooth hardware and software.
  • Configure LAN access, remote access and FAX gateway access point solutions using Bluetooth.
  • Understand and configure Bluetooth security and application level security.
  • Test and troubleshoot Bluetooth configurations.
  • Provide effective support to Bluetooth users.

Who should attend this Bluetooth course

  • Technical professionals reponsible for specifying, designing or implementing Bluetooth slutions.
  • Technical Sales or Marketing personnel who need an in-depth technical unbdertsnading of Bluetooth.
  • Professionals from solutions vendors and integrators who require a more in-depth understanding of Bluetooth.

Bluetooth Course Pre-requisites

Attendees should have some prior experience in data networking, and ideally an understanding of the OSI 7-later reference model.

Hands-on Practicals

The course incorporates hands-on practical labs using a range of commercial Bluetooth hardware and software products, including Bluetooth adapters, Bluetooth Access Points, Bluetooth enabled mobile phones, headsets, accessories, smartphones and tablets.

Lifetime Post-Course Support

After completing this Bluetooth training course, delegates receive lifetime post-training support from LEVER Technology Group, to help them apply the technologies and skills they have learned with us, to provide career-long support, and to ensure they are better equipped for their future roles in IT and networking.

Bluetooth Training Course Content

Overview of Bluetooth

  • What is Bluetooth?
  • Bluetooth Classic
  • Bluetooth Low Energy (BLE)
  • Why Bluetooth?
  • Applications for Bluetooth
  • Bluetooth application profiles
  • Bluetooth services
  • Accessing resources via Bluetooth
  • Bluetooth standards
  • The Bluetooth Special Interest Group (SIG)
  • IEEE Standards
  • Bluetooth Core Specification
  • Conformance and compatibility testing
  • Bluetooth Networking Architecture
  • Use of 2.4GHz Spectrum
  • FHSS and Interference
  • Class of Bluetooth radio
  • Power versus Range

Configuring Bluetooth devices

  • Installing Bluetooth support
  • Device discovery
  • Service discovery
  • Bluetooth Networks
  • Device Addressing
  • Masters and Slaves
  • Piconets and Scatternets
  • Addressing and selectivity
  • Bluetooth Operations

Inquiry and Paging

  • Device Discoverability
  • Bluetooth Security
  • Bluetooth Key Management
  • Authentication
  • Legacy Pairing
  • Vulnerabilities of Legacy Pairing
  • Secure Simple Pairing
  • Diffie Helman Elliptic Curve algorithm

Bluetooth hardware and software

  • Bluetooth hardware design
  • Battery power consumption
  • The Bluetooth API
  • Assessing Bluetooth performance
  • Bluetooth BR/EDR Protocols
  • Bluetooth implementations

Bluetooth RF Layer

  • The Bluetooth Radio layer
  • Bluetooth Frequency Hopping (FHSS)
  • Bluetooth “channels”
  • The Bluetooth APIs
  • The Baseband layer
  • Bluetooth addressing
  • Master/Slave transmission
  • The Packet format
  • SCO and ACL links
  • Data rates
  • Device addressing
  • Controller states
  • Access procedures
  • Error control
  • Asynchronous Connection-oriented (ACL) links
  • Synchronous Connection-Oriented (SCO) links
  • Link Management Protocol (LMP)
  • Host Controller Interface (HCI)
  • Low Energy Link Layer (LE LL)
  • Host stack

Logical link control and adaptation protocol (L2CAP)

  • Bluetooth network encapsulation protocol (BNEP)
  • Radio frequency communication (RFCOMM)
  • Service discovery protocol (SDP)
  • Telephony control protocol (TCP)
  • Audio/video control transport protocol (AVCTP)
  • Audio/video data transport protocol (AVDTP)
  • Object exchange (OBEX)
  • Low Energy Attribute Protocol (ATT)
  • Low Energy Security Manager Protocol (SMP)Adaptive Frequency Hopping (AFH)
  • Data Links
  • ACL links
  • Enhanced Data Rate (EDR)
  • Audio Links
  • SCO (Synchronous Connection Oriented) links
  • eSCO (Extended SCO) links
  • Audio Over ACL
  • The Advanced Audio Distribution Profile (A2DP)
  • Bluetooth Security
  • Authentication
  • Encryption

Core system architecture

  • Core architectural blocks
  • Channel manager
  • L2CAP resource manager
  • Device manager
  • Data transport architecture
  • Core traffic bearers
  • Transport architecture entities
  • Generic packet structure
  • Physical channels
  • Physical links
  • Logical links and logical transports
  • L2CAP channels
  • Piconet topology
  • Operational procedures and modes
    • Link manager (LM)
    • BB resource manager
    • Link controller
  • Bluetooth BR/EDR Profiles

Profile Specification

  • Profile Implementation Conformance Statement (PICS)
  • Profile Test Specification
  • Profile Tuning Suite (PTS)
  • The Headset Profiles
  • HandsFree Profile (HFP)
  • Headset Profile (HSP)
  • Human Interface Device Profile (HID)
  • Music Profiles
  • Advanced Audio Distribution Profile (A2DP)
  • Miscellaneous Profiles
  • SerialPortProfile (SPP)
  • SIM Access Profile
  • Phone Book Access Profile (PBAP)

Bluetooth Physical Layer (PHY)

  • Regional authorities
  • Frequency bands and channel arrangement
  • Transmitter characteristics
  • Modulation characteristics
  • Spurious emissions
  • Receiver characteristics
  • Actual sensitivity level
  • Interference performance
  • Out-of-band blocking
  • Intermodulation characteristics
  • Maximum usable level
  • Receiver signal strength indicator
  • Reference signal definition
  • Nominal test conditions
  • Extreme test conditions
  • Test condition parameters
  • Bluetooth Physical Channels

Physical channel definition

  • Basic piconet physical channel
  • Adapted piconet physical channel
  • Page scan physical channel
  • Inquiry scan physical channel
  • Hop selection
  • Physical Links

Link supervision

  • Logical transports
  • Logical transport address (LT_ADDR)
  • Synchronous logical transports
  • Asynchronous logical transport
  • Transmit/receive routines
  • Active slave broadcast (ASB) transport
  • Parked slave broadcast (PSB) transport
  • Logical links
  • Link control (LC) logical link
  • ACL control (ACL-C) logical link
  • Asynchronous/Isochronous user (ACL-U) logical link
  • Stream logical link
  • Logical link priorities
  • Bluetooth Packets

General format

  • Bit ordering
  • Access code
  • Packet header
  • Packet types
  • Payload format
  • Packet summary
  • Link Manager Protocol (LMP)

General rules

  • Message transport
  • Synchronisation
  • Packet format
  • Transactions
  • Error handling
  • Procedure rules
  • General response messages
  • LMP message constraints
  • Device features
  • Feature definitions
  • Features mask definition
  • LM interoperability policy
  • Procedure rules
  • Connection control
  • Security
  • Informational requests
  • Role switch
  • Modes of operation
  • Logical transports
  • Test mode
  • Parameter definitions
  • Default values
  • Host controller interface (HCI)

Lower layers of the IEEE software stack

  • Host Controller transport
  • Commands and events
  • Device setup
  • Controller flow control
  • Controller information
  • Controller configuration
  • Device discovery
  • Connection setup
  • Remote information
  • Synchronous connections
  • Connection state
  • Piconet structure
  • Bluetooth QoS
  • Host flow control
  • Link information
  • Authentication and encryption
  • Testing
  • Alphabetical list of commands and events
  • HCI flow control
  • Host-to-controller data flow control
  • Controller-to-host data flow control
  • Disconnection behavior
  • Command flow control
  • Command error handling
  • HCI data formats
  • Introduction
  • Data and parameter formats
  • Connection handles
  • Exchange of HCI-specific information
  • HCI configuration parameters
  • Logical Link Control and Adaptation Protocol (L2CAP)

LCAP features

  • Assumptions
  • Scope
  • Terminology
  • General operation
  • Channel identifiers (CIDs)
  • Operation between devices
  • Operation between layers
  • Modes of operation
  • Data packet format
  • Connection-oriented channel in basic LCAP mode
  • Connectionless data channel in basic LCAP mode
  • Connection-oriented channel in retransmission/flow control modes
  • Signaling Packet Formats

Configuration parameter options

  • MTU option
  • Flush timeout option
  • QoS option
  • Retransmission and flow control option
  • State machine
  • General rules for the state machine
  • Timers events
  • General procedures
  • Configuration process
  • Fragmentation and recombination
  • Encapsulation of SDUs
  • Delivery of erroneous LCAP SDUS
  • Operation with flushing
  • Connectionless data channel
  • Procedures for flow control and retransmission
  • Information retrieval
  • Function of PDU types for flow control and retransmission
  • Variables and SEQNs
  • Retransmission mode
  • Flow control mode
  • Configuration MSCs
  • Bluetooth Security

Security overview

  • Random number generation
  • Key management
  • Key types
  • Key generation and initialization
  • Encryption
  • Encryption key size negotiation
  • Encryption of broadcast messages
  • Encryption concept
  • Encryption algorithm
  • LFSR initialization
  • Key stream sequence
  • Authentication
  • Repeated attempts
  • The authentication and key-generating functions
  • The authentication function E
  • The functions Ar and A’r
  • E-key generation function for authentication
  • E-key generation function for encryption
  • Configuring Bluetooth Security
  • Hacking Bluetooth
  • Bluetooth Trends

Bluetooth Low Energy (BLE)

  • Powering the Emerging Beacon Market
  • Bluetooth “Smart” Ready technology
  • The Internet of Things (IoT) and Bluetooth incorporation into the devices
  • Bluetooth 4.2
  • Bluetooth 5.0
  • Bluetooth 4.2 Core and Enhancements for Smart Technology AKA Low Energy (LE)

Overview of Bluetooth Low Energy (BLE) Features

  • BLE Architecture and Protocols
  • BLE Link layer specification
  • BLE Configuration
  • Generic Attribute Profile (GATT)
  • GATT-Based Profiles and Specifications
  • Overview of Bluetooth LE Protocols

Physical Layer

  • Link Layer
  • Enhancements to HCI Protocol
  • Direct Test Mode (DTM)
  • Security and AES Encryption (NIST and NSA versions)
  • Enhancements to L2CAP for Low Energy
  • GAP for Low Energy (LE)
  • Generic Attribute Profile (GATT)
  • Security Manager (SM)

Bluetooth 5.x

  • Bluetooth 5.0 Architecture
  • Changes from v4.2 to v5.0
  • Bluetooth 5.0 Features Added
  • Integrated in v5.0
  • Deprecated Features
  • Slot Availability Mask (SAM)
  • 2 Msym/s PHY for LE
  • LE Long Range
  • High Duty Cycle Non-Connectable Advertising
  • LE Advertising Extensions
  • LE Channel Selection Algorithm
  • Bluetooth 5.1 enhancements
  • Bluetooth 5.2 enhancements
  • Bluetooth 5.3 enhancements
Repair, Installation, Training & Support

Get Started

We’ll find the solution, performance guaranteed.
Get in touch to find out more.

Contact Us

Type something below and press return to search or click a related link:

X Close Search