0% found this document useful (0 votes)
20 views10 pages

A Micro Project Proposal

The micro project proposal focuses on the architecture of Bluetooth technology in computer networks, aiming to clarify its components and their roles. It outlines the project's objectives, including studying Bluetooth fundamentals, analyzing protocols, and understanding low power modes and quality of service. The report also discusses Bluetooth's advantages and disadvantages, resources required, and the skills developed through the project.

Uploaded by

dp5645530
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views10 pages

A Micro Project Proposal

The micro project proposal focuses on the architecture of Bluetooth technology in computer networks, aiming to clarify its components and their roles. It outlines the project's objectives, including studying Bluetooth fundamentals, analyzing protocols, and understanding low power modes and quality of service. The report also discusses Bluetooth's advantages and disadvantages, resources required, and the skills developed through the project.

Uploaded by

dp5645530
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 10

A Micro Project Proposal

Title of Micro Project: Bluetooth Architecture in Computer Network

1.Introduction:
Bluetooth is composed of multiple technologies, protocols, and elements.
Their relationship and usage are complex, presenting a barrier to entry when
starting to study this technology. This article aims to serve as an introduction
to the architecture of a Bluetooth communication device and clarify the role
each of its components plays.
The architecture described in the extensive Bluetooth standard dictates which
functions must exist in an implementation and how they should be organized,
so knowing it greatly facilitates understanding the operation of a device, a
codebase, or Bluetooth as a technology in general.

2.Aim of the Project:


Bluetooth Architecture in Computer Network

3. Intended Course Outcome:


 To study the fundamental concepts of Bluetooth module.
 To analyze the protocol operation.
 To gain knowledge on various low power modes and Quality of
Service parameters.

4.Literature Review:
Bluetooth is primarily utilized for communication between wireless Personal
Area Network (PANs). It could be a broadly utilized and persuasive application
for sending information from one device to another. It empowers clients to
make ad hoc network for information exchange between a wide extend of
gadgets. Bluetooth's current information transmission rate is 1 megabits per
second utilizing FSK. Bluetooth signals are Omni-directional, so gadgets ought
not to be pointed at each other. Our day by day gadgets like phone, wireless
headset, smart home application, security framework, Bluetooth car packs etc.
all utilize Bluetooth. However, as Bluetooth innovation gets to be more broadly
utilized, security imperfections within the innovation are getting to be more
visit, causing extreme harm to users' individual information. The matching
gadgets play a basic part in anticipating such unauthorized get to from secure
contact.
5. Bluetooth of Piconet:

 Scatternet:
6.Resources Required:

Sr. Name of Resources / Matetial Specification


no
1 Hardware Laptop Computer Processor: Intel(R) Pentium(R )
Dual CPU [email protected]
RAM:512MB
2 MS Office Word for Documentation MS -
Power Point for PPT

7.Action Plan:
Sr. Details of Activity Planned Planned Name of
No. Start Finish Date responsible
Date team
member
1 Define Problem of the Project 17/1/25 24/1/25 Harshal,
Chaitali
2 Searching and Gathering 24/1/25 31/1/25 Snehal, Chaitali
Information
3 Designing the Project 14/2/25 21/2/25 Harshnil,
Dnyaneshwar

4 Documentation 7/3/25 12/2/25 All Members

5 Demonstration 20/3/25 20/3/25 All Members

PART B: Micro – Project Report


Title of Micro Project: Bluetooth Architecture in Computer Network

1.Rationale:
Bluetooth is a wireless technology that lets devices like phones, tablets, and
headphones connect to each other and share information without needing
cables. Bluetooth simply follows the principle of transmitting and receiving
data using radio waves. It can be paired with the other device which has also
Bluetooth but it should be within the estimated communication range to
connect. When two devices start to share data, they form a network called
piconet which can further accommodate more than five devices.

2.Course Outcomes Addressed:


 To study the fundamental concepts of Bluetooth module.
 To analyze the protocol operation.
 To gain knowledge on various low power modes and Quality of Service
parameters.

3.Literature Review:
Bluetooth is primarily utilized for communication between wireless Personal
Area Network (PANs). It could be a broadly utilized and persuasive application
for sending information from one device to another. It empowers clients to
make ad hoc network for information exchange between a wide extend of
gadgets. Bluetooth's current information transmission rate is 1 megabits per
second utilizing FSK. Bluetooth signals are Omni-directional, so gadgets ought
not to be pointed at each other. Our day by day gadgets like phone, wireless
headset, smart home application, security framework, Bluetooth car packs etc.
all utilize Bluetooth. However, as Bluetooth innovation gets to be more broadly
utilized, security imperfections within the innovation are getting to be more
visit, causing extreme harm to users' individual information. The matching
gadgets play a basic part in anticipating such unauthorized get to from secure
contact.

4.Actual Resources Used:


Sr. Name of Resources / Matetial Specification
no
1 Hardware Laptop Computer Processor: Intel(R) Pentium(R )
Dual CPU [email protected]
RAM:512MB
2 MS Office Word for Documentation MS -
Power Point for PPT

5. Actual Methodalogy:
 Error Correction and Security:

Errors Correction Types:

1. Forward Error Correction(FEC)


2. Automatic Repeat Request(ARQ)

Security Provided Three Ways:


 Pseudo random frequency band hops
 Authentication
 Encryption

1.Forward Error Correction(FEC) :


Forward Error Correction (FEC) is a technique used to minimize errors in data
transmission over communication channels. In real-time multimedia
transmission, re-transmission of corrupted and lost packets is not useful
because it creates an unacceptable delay in reproducing : one needs to wait
until the lost or corrupted packet is resent. Thus, there must be some
technique which could correct the error or reproduce the packet immediately
and give the receiver the ability to correct errors without needing a reverse
channel to request re-transmission of data.

2. Automatic Repeat Request(ARQ):


ARQ stands for Automatic Repeat Request also known as Automatic Repeat
Query. ARQ is an error-control strategy used in a two-way communication
system. It is a group of error-control protocols to achieve reliable data
transmission over an unreliable source or service. These protocols reside in the
Transport Layer and Data Link Layer of the OSI(Open System Interconnection)
model. These protocols are responsible for the automatic retransmission of
packets that are found to be corrupted or lost during the transmission
process.

Uses Bluetooth Model :

 Voice /Data Access Point :


An access point in networking is a device that allows wireless devices, like
smartphones and laptops, to connect to a wired network. It creates a Wi-Fi
network that lets wireless devices communicate with the internet or other
devices on the network. Access points are used to extend the range of a
network or provide Wi-Fi in areas that do not have it. They are commonly
found in homes, offices, and public places to provide wireless internet access.

 peripheral interconnect
t could be a standard information transport that was common in computers
from 1993 to 2007 or so. It was for a long time the standard transport for
extension cards in computers, like sound cards, network cards, etc. It was a
parallel transport, that, in its most common shape, had a clock speed of 66
MHz, and can either be 32 or 64 bits wide. It has since been replaced by PCI
Express, which could be a serial transport as contradicted to PCI. A PCI port, or,
more precisely, PCI opening, is essentially the connector that’s utilized to put
through the card to the transport.

6.Bluetooth Protocol Architecture :


Bluetooth network technology connects mobile devices wirelessly over a
short-range to form a personal area network (PAN). The Bluetooth
architecture has its own independent model with a stack of protocols,
instead of following the standard OSI model or TCP/IP model.
The protocols in the Bluetooth standard can be loosely grouped into the
physical layer, data link layer, middleware layer, and application layer as
shown inthe following diagram −

7.Advantages Of Bluetooth Architecture in Computer


Network:
1. Wireless Transmission of Data
2. Extensive Availability and Accessibility

3. Convenience From Ease of Use

4. Energy Efficiency

8.Disadvantages Of Bluetooth Architecture in Computer


Network:
1. Limited Operational Range.

2. Can Be Energy Inefficient.

3. Slower Than Other Technologies.

4. Possible Security Vulnerabilities.

9.Skills Developed Out Of This Microproject :


 Technical knowledge .

 Troubleshooting skills.

 Project Management.

 Communication Skills.

 Critical Thinking .

10.References:
 Data communications And Networking: Behrouz A.Forouzan
 Computer Network: Andrew S.Tanenbaum
 Greeksforgreeks: http://www.greeksforgreeks.org

You might also like