wlan and bluetooth
WLAN (Wireless Local Area Network):
1. Physical Layer:
- Frequency Bands: WLAN operates in the 2.4 GHz and 5 GHz frequency bands. 802.11ax (Wi-Fi 6) can also use the 6 GHz band.
- Modulation Techniques: Common modulation schemes include QPSK, 16-QAM, and 64-QAM.
2. Data Link Layer:
- Multiple Standards: The IEEE 802.11 family of standards is widely used for WLAN. Common standards include 802.11a, 802.11b, 802.11g, 802.11n, 802.11ac, and 802.11ax.
- Frame Structure: WLAN uses frames for communication, including management frames (e.g., association, authentication), control frames (e.g., ACK), and data frames.
3. MAC Layer (Medium Access Control):
- CSMA/CA: Carrier Sense Multiple Access with Collision Avoidance is the protocol used to manage access to the wireless medium.
- Authentication and Association: Devices must authenticate and associate with an access point before communication.
4. Network Layer:
- IP Protocols: WLAN typically operates at the data link layer, and IP is used at the network layer. IP addresses are assigned to devices.
5. Security:
- Encryption: WPA2 (Wi-Fi Protected Access 2) and WPA3 provide encryption for securing wireless communication.
- Authentication: Pre-shared keys or enterprise-level authentication methods are used.
6. Mobility:
- Roaming: WLAN supports seamless roaming between access points within the same network.
Bluetooth:
1. Physical Layer:
- Frequency Band: Bluetooth operates in the 2.4 GHz ISM band.
- Modulation Techniques: Bluetooth uses various modulation schemes, including GFSK (Gaussian Frequency Shift Keying).
2. Data Link Layer:
- Bluetooth Versions: Bluetooth has gone through multiple versions, with Bluetooth 4.0 (Bluetooth Low Energy, BLE) and Bluetooth 5 being the most recent as of my knowledge cutoff in 2022.
- Frame Structure: Bluetooth uses packets for communication, including advertising packets, data packets, and acknowledgment packets.
3. MAC Layer (Medium Access Control):
- Frequency Hopping: Bluetooth uses FHSS (Frequency Hopping Spread Spectrum) for channel access, hopping between 79 different channels.
- Connection Establishment: Bluetooth devices go through a process of inquiry, paging, and connection establishment.
4. Network Layer:
- Profiles: Bluetooth devices use specific profiles (e.g., Hands-Free Profile, A2DP for audio streaming) to define how they communicate with each other.
5. Security:
- Pairing: Devices establish a secure connection through a pairing process, which can involve passkeys, PINs, or other authentication methods.
- Encryption: Data exchanged between paired devices is encrypted to ensure privacy.
6. Connectivity:
- Piconet and Scatternet: Bluetooth devices form piconets, and multiple piconets can be connected to form a scatternet, allowing more complex network topologies.