蓝牙中英文翻译
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
Bluetooth
Introduction
Bluetooth is a forever, limited radio connect that resides o n a microchip. It was originally expanded through Swedish mo bile phone creator Ericsson in 1994 as a method to let lap top computers make calls above a mobile phone. As then, num erous organizations have signed on to create Bluetooth the low-power thoughtless wireless average for a broad variety of
devices (LeVitus, 216-220). Industry spectators anticipate Bluetooth to be fitted in billions of devices through 2005. Discussion
Developed by engineers at Ericsson in the late 1990s, Blue tooth is more and more special technology that facilitates t houghtless wireless communication among a diversity of electro nic devices. Its mainly important aspect is that it permits devices to “talk”(relocate and orchestrate data) wirelessly with each other, terminating the requirement for the outwar dly continuous tangle of cables, cords, and adapters importan t for numerous today’s expertise.
The Bluetooth Special Interest Group (SIG) was formed in 1 998 to manage the expansion and prologue of Bluetooth knowle dge (LeVitus, 216-220). IBM, Intel, Toshiba and Nokia connected with Ericsson as the beginning associates of the SIG, and in exc ess of 8,000 organizations have contracted since. So as to trade products with the Bluetooth requirement and logo, manufacturers should be associates of the SIG and the devices should meet well-outlined credentials. These procedures make
sure that Bluetooth wireless devices international may converse with each other, apart from company or nation of
derivation.
Speed and Range
Range is application specific and although a minimum range
is mandated by the Core Specification, there is not a lim
it and manufacturers can tune their implementation to support the use case they are enabling.
Range may vary depending on class of radio used in an impl ementation:
·Class 3 radios-have a range of up to 1 meter or 3 feet ·Class 2 radios-most commonly found in mobile devices, have a
range of 10 meters or 33 feet.
·Class 1 radios-used primarily in industrial use cases,have a range of 100 meters or 300 feet.
That creates Bluetooth technology appropriate for transporting lesser files for example cell phone contracts and text documents, also as lower-quality pictures and audio (Kumkum, 160-162).
At these relocate speeds; Bluetooth may not actually deal st reaming video or high-quality pictures and audio at this end, except this possibly will alter in the future when fresh Bl uetooth standards are initiated.
Simple and Competent to Utilize
Creating and configuring Bluetooth allowed devices is modera tely uncomplicated, with little extra commotion than acquire the two devices close to one another and twist them on.Ther
e is no requirement to mount drivers or further software to complex an ad-hoc, personal wireless network (Kumkum, 160-162). It has a uniform organization, meaning that some two wireles
s products attributing Bluetooth technology,despite of product
or nation of origin, have the ability to converse faultles
sly with each other.
Common Applications
One of the mainly ordinary applications of Bluetooth is hand s -free cell phone procedure. About each cell phone fashioned in our day has constructed Bluetooth (Meier, 15-20). Only pair phone with a Bluetooth headset, and he may talk whereas his phone is in his purse or pocket. Several of today’s car stereo s as well have fitted Bluetooth for hands-free calling in his vehicle. And if his vehicle has a plant stereo or grown-up aftermarket one that he merely doesn’t wish to restore, he may yet like hands-free identifying with a Bluetooth car kit. Bluetooth 3.0
Bluetooth 3.0 is the fresh Bluetooth wireless typical adopted through the Bluetooth SIG on April 21, 2009. The fresh st andard supports elevated data remove speeds and constructs ah ead the preceding standards (Meier, 15-20). With its superior speed, the technology has the probable to transfigure the co nsumer electronics industry.
PROTOCOL
The Bluetooth technology standard is set to make different a pplications can “communicate”with each other. Remote device s in communication use the same protocol stacks, while diffe rent applications need different protocol stacks. But, every application needs the data link layer and physical layer of the Bluetooth technology.The whole Bluetooth protocol stacks
is shown as blow. Not any application should use all of the protocols, but one or some lists of these. The chart b elow shows the relationship between protocols, but the relati onship may change in some applications.
The completely protocol stacks include Bluetooth special proto cols (like LMP and L2CAP) and not special ones (such as OB EX and UDP). The basic principle for designing protocol and protocol stacks is that use existing highlevel protocol as p ossible, ensure the combination of protocols and Bluetooth te chnology, and take the best advantage of the software and h ardware which adapt to the Bluetooth technology standards. Th e open Bluetooth technology makes device manufacturers can ch oose protocols freely as they like or used to.
The protocols in Bluetooth protocol system.
There are four layers in Bluetooth protocol system according
to the SIG:
·Core protocols
·Cable replacement protocols
·Telephony control protocols
·Adopted protocols
Except the protocol layers above, the standard also defines Host/Controller Interface (HCI),which provides command interface for baseband controller, connection manager, hardware state and control register.
Bluetooth core protocols consist of the special protocols mad e by SIG. Most Bluetooth devices need core protocols, while other protocols are used depend on needs of the application. After all, cable replacement protocols, technology control p rotocols and adopted protocols based on the core protocols c onstitute the object-oriented protocols.
·Core protocols
·LMP (Link Management Protocol)
Used for control of the radio link between two devices. Implemented on
the controllers.
It identifies and encrypts through launching, exchanging and checking the connection, and decides the size of baseband da ta packets through conference. It also controls the power mo de and work cycle of wireless equipment, and connection stat us of unit equipment in piconet.
·L2CAP (Logical Link Control & Adaptation Protocol)
This protocol is used to multiplex multiple logical connectio ns between two devices using different higher level protocols, and provides segmentation and reassembly of on-air packets.
In Basic mode, L2CAP provides packets with a payload configu rable up to 64kB, with 672 bytes as the default MTU, and 48 bytes as the minimum mandatory supported MTU.
In Retransmission & Flow Control modes, L2CAP can be configu red for reliable or isochronous data per channel by performi ng retransmissions and CRC checks.
Bluetooth Core Specification Addendum 1 adds two additional L 2CAP modes to the core specification. These modes effectively deprecate original Retransmission and Flow Control modes:·Enhanced Retransmission Mode (ERTM): This mode is an improv ed version of the original retransmission mode. This mode pr ovides a reliable L2CAP channel.
·Streaming Mode (SM): This is a very simple mode, with no retransmissionor flow control. This mode provides an unreliabl e L2CAP channel.
Reliability in any of these modes is optionally and/or addit ionally guaranteed by the lower layer Bluetooth BDR/EDR air interface by configuring the number of retransmissions and fl ush timeout (time after which the radio will flush packets).
In-order sequencing is guaranteed by the lower layer.
Only L2CAP channels configured in ERTM or SM may be operate
d over AMP logical links.
·SDP (Service Discovery Protocol)
Service Discovery Protocol (SDP) allows a device to discover services supported by other devices, and their associated par ameters. For example, when connecting a mobile phone to a B luetooth headset, SDP will be used for determining which Blu etooth profiles are supported by the headset (Headset Profile, Hands Free Profile, Advanced Audio Distribution Profile (A2DP) etc.) and the protocol multiplexer settings needed to connect to each of them. Each service is identified by a Universall
y Unique Identifier (UUID), with official services (Bluetooth profiles) assigned a short form UUID (16 bits rather than t he full 128)/vichitra
·Cable replacement protocols(RFCOMM)
Radio frequency communications (RFCOMM) is a cable replacement protocol used to create a virtual serial data stream. RFCOMM provides for binary data transport and emulates EIA-232 (formerly RS-232) control signals over the Bluetooth baseband layer.
RFCOMM provides a simple reliable data stream to the user, similar to TCP. It is used directly by many telephony relat ed profiles as a carrier for AT commands, as well as being a transport layer for OBEX over Bluetooth.
·Telephony control protocols (TCP).
Telephony control protocol-binary (TCS BIN) is the bit-
oriented protocol that defines the call control signaling for the establishment of voice and data calls between Bluetooth
devices. Additionally, “TCS BIN defines mobility management p rocedures for handling groups of Bluetooth TCS devices.”
TCS-BIN is only used by the cordless telephony profile, which failed to attract implementers. As such it is only of historical interest.
Adopted protocols
Adopted protocols are defined by other standards-making organizations and incorporated into Bluetooth’s protocol stack, allowing Bluetooth to create protocols only when necessary. T he adopted protocols include:
·Point-to-Point Protocol (PPP): Internet standard protocol for transporting IP datagrams over a point-to-point link.
·TCP/IP/UDP: For communicating with the device connected to Internet.
·Object Exchange Protocol (OBEX): Session-layer protocol for the exchange of objects, providing a model for object and operation representation. It uses the client-server mode.
· Wireless Application Environment/Wireless Application Protocol (WAE/WAP):WAE specifies an application framework for wireless devices and WAP is an open standard to provide mobile users access to telephony and information services.
Technology
SPECTRUM AND INTERFERENCE
Bluetooth technology operates in the unlicensed industrial, sc ientific and medical (ISM) band at 2.4 to 2.485 GHz, using
a spread spectrum, frequency hopping, full-duplex signal at a nominal rate of 1600 hops/sec. The 2.4 GHz ISM band is ava ilable and unlicensed in most countries.
SIM frequency band is open to all radio system, So the use
of a certain frequency band will meet unpredictable interfe rence sources. Therefore, Bluetooth designs special fast ackno wledge and frequency hopping technique to ensure the stabilit y of link. Frequency hopping technique to divide the band i nto many frequency hopping channels, in a connection, radio transceiver “jump”from a channel to another constantly acc ording to certain code sequence. Only sender and receiver co mmunicate according to this law, and the rest of interferenc e may not press the same rule. The instantaneous bandwidth of Frequency hopping is very narrow, but through the spread spectrum technology it can make the narrow bandwidth one h undred times expanded into wideband, making the influence of interference may become very small. Comparing to other syst ems that work in the same frequency band, frequency hopping of Bluetooth works faster, data packet of Bluetooth is sho rter, which make it more stable than the other.
ERROR CORRECTION
Bluetooth supports circuit switching and packet switching two techniques, and defines two types of link connection, namel y connection-oriented synchronous link (SCO) and connectionless-oriented asynchronous link (ACL).
Bluetooth use three error correction models:1/3 Forward Error Correction (FEC), 2/3forward Forward Error Correction and Au tomatic Repeat Request (ARQ). Purpose to the error correction is to reduce the possibility of retransmission, while at t he same time increase the extra expenses, but in a reasonab le errorless environment, redundant bids will reduce output. So the packet definition itself also keeps flexible ways. He nce the software can be defined whether to adopt FEC. In g
eneral, when the channel noise is large, Bluetooth system will uses FEC, in order to ensure the quality of communication: as to SCO link, 1/3 FEC is used; 2/3 FEC is used in ACL link. In Unnumbered ARQ, the data send in a time slot must receive a confirmation of receipt in the next time slot. On ly when the data is checked to be without mistake after he ader error detection and CRC at receiver will the confirmati on sent to sender, or an error message will be sent back. RANGE
Range is application specific and although a minimum range i s mandated by the Core Specification, there is not a limit and manufacturers can tune their implementation to support the use case they are enabling.
Range may vary depending on class of radio used in an impl ementation:
Class 3 radios-have a range of up to 1 meter or 3 feet. Class 2 radios-most commonly found in mobile devices , have a range of 10 meters or 33 feet.
Class 1 radios-used primarily in industrial use cases , have a range of 100 meters or 300 feet.
POWER
In order to make a Bluetooth equipment can also be in conn ection even in a very low power state, Bluetooth stipulates three energy saving state: Park state, Hold state and Snif f state. The energy saving efficiency of these states declin es one by one.
The most commonly used radio is Class 2 and users 2.5mW of power. Bluetooth technology is designed to have very low p ower consumption. This is reinforced in the specification by
allowing radios to be powered down when inactive.
The Generic Alternate MAC/PHY in Version 3.0 HS enables the discovery of remote AMPs for high speed devices and tums on the radio only when needed for data transfer giving a p ower optimization benefit as well as aiding in the security of the radios.
Bluetooth low energy technology, optimized for devices requiri ng maximum battery life instead of a high data transfer rat e, consumers between 1/2 and 1/100 the power of classic Blu etooth technology.
SECURITY
Mobility and open of Bluetooth system makes safety problems extremely important. Although the frequency modulation techniqu e used by Bluetooth system has already provided a certain s ecurity, but Bluetooth system still need safety management to link layer and application layer. In link layer, Bluetooth system provides authentication, encryption and key management, and other functions. Each user has a Personal Identificatio n Number (PIN), which will be translated into 128 bit link key for one-way or both-way certification. Once the authentication finished, link will use encryphon key to encrypt. The link layer security mechanism provides a great deal of certification schemes and a flexible encryption scheme (means allow the consultation of the length of password). This me chanism is very important when the equipments in communicatio n are from different countries, because some countries will specify maximum password length. Bluetooth system will select the smallest maximum allowable password length of all equip ments in the piconet.
Bluetooth system also supports the high level of protocol st ack in different applications of special security mechanisms. Bluetooth security mechanism builds trust relationship betwee n devices relying on pins. Once this relationship established , these pins can be stored in the equipment, in order to connection more quickly the next time.
Source: Baidu Library
蓝牙
介绍
蓝牙是一种永久、有限的无线连接,驻留在微芯片上。
1994年,它最初是通过瑞典手机制造商爱立信(Ericsson)扩展的,作为一种让笔记本电脑在手机上方拨打电话的方法。
当时,许多组织已经签署了创建蓝牙的协议,这是一种低功耗、轻率的无线设备,适用于各种设备(LeVitus,216-220)。
业内人士预计,到2005年,蓝牙将安装在数十亿台设备上。
讨论
蓝牙是爱立信公司的工程师在20世纪90年代末开发的一种越来越特殊的技术,它可以促进各种电子设备之间的无意识无线通信。
其主要的重要方面是,它允许设备之间以无线方式“对话”(重新定位和编排数据),从而终止了对电缆、跳线和适配器的外部连续缠绕的要求,这对当今众多专业技术来说都很重要。
蓝牙特别利益小组(SIG)成立于1998年,负责管理蓝牙的扩展和开场白(LeVitus,216-220)。
IBM、英特尔、东芝和诺基亚与爱立信建立了联系,成为SIG的最初合作伙伴,自那时以来,已有超过8000家公司签约。
为了交易具有蓝牙要求和标志的产品,制造商应是SIG的合作伙伴,设备应符合良好的认证要求。
这些程序可确保蓝牙无线设备国际公司可以与其他公司或国家进行对话。
速度和范围
范围是特定于应用程序的,尽管核心规范规定了最小范围,但没有限制,制造商可以调整其实现以支持他们正在启用的用例。
范围可能因实施中使用的无线电类别而异:
·3类无线电的射程可达1米或3英尺
·2类无线电最常见于移动设备中,其射程为10米或33英尺。
·主要用于工业用途的1类无线电的射程为100米或300英尺。
这创造了蓝牙技术,适用于传输较小的文件,例如手机合同和文本文档,以及较低质量的图片和音频(Kumkum,160-162)。
以这些重新定位的速度;蓝牙在这方面可能不会真正处理流式视频或高质量的图片和音频,除非将来新的蓝牙标准启动后,这种情况可能会改变。
简单且能使用
创建和配置允许使用蓝牙的设备相当简单,只需将两台设备靠近并缠绕在一起,就不会有什么额外的麻烦。
不需要安装驱动程序或其他软件来复杂一个特殊的个人无线网络(Kumkum,160-162)。
它有一个统一的组织,这意味着,某些属于蓝牙技术的两种无线产品,无论其产品或原产国如何,都能够完美地相互对话。
常见应用
蓝牙的一个主要普通应用是免提手机程序。
在我们这个时代,几乎每一部手机都构建了蓝牙(Meier,15-20)。
只需将手机与蓝牙耳机配对,他就可以在手机放在钱包或口袋里时通话。
今天的几款车载立体声系统也在他的车上安装了蓝牙免提通话功能。
如果他的车有一个他不想恢复的立体声或成熟的售后服务,他可能会喜欢用蓝牙车载套件进行免提识别。
蓝牙3.0
蓝牙3.0是典型的通过蓝牙SIG于2009年4月21日,通过新鲜的蓝牙无线。
新鲜的标准支持提升数据删除速度和结构,前面的标准迈尔(15-20)。
凭借其出众的速度,有可能transfigure消费电子行业的技术。
技术
协议
蓝牙技术标准的设置,使不同的应用程序可以相互“沟通”。
在远程通信设备使用相同的协议栈,而不同的应用需要不同的协议栈。
但是,每一个应用程序需要的数据链路层和物理层的蓝牙技术。
整个蓝牙协议栈所示的打击。
任何应用程序不应该使用的所有协议,但其中一个或一些名单。
下面的图表显示了协议之间的关系,但在某些应用中的关系可能会改变。
完全的协议栈包括蓝牙特殊协议(LMP和L2CAP),而不是特殊的(如OBEX 和UDP)。
设计协议和协议栈的基本原则是,尽可能利用现有的高层协议,确保协议和蓝牙技术相结合,采取适应的蓝牙技术标准的软件和硬件的最佳优势。
开放的蓝牙技术,使得设备制造商可以自由选择的协议,因为他们喜欢或使用。
蓝牙协议体系中的协议
据SIG的有4层蓝牙协议体系
核心协议
电缆替代协议
电话控制协议
通过协议
除上述协议层,该标准还定义了主机/控制器接口(HCI),它提供基带控制器,连接管理器,硬件状态和控制寄存器的命令接口。
蓝牙核心协议包括由SIG提出的特殊协议。
大多数蓝牙设备需要核心协议,而其他协议取决于应用的需要。
毕竟,电缆替代协议,技术控制协议,通过协议和基于核心协议,构成了面向对象的协议。
核心协议
LMP(链路管理协议)
用于两个设备之间的无线链路控制。
控制器上实现。
通过开展交流和检查连接的识别和加密,并决定基带数据包通过会议的规模。
它还控制无线设备的电源模式和工作周期,并在微微网单元设备的连接状态。
的L2CAP(逻辑链路控制与适配协议)
该协议用于复用多个逻辑连接两个使用不同的高层协议的设备之间,提供分割和重组的空气包。
L2CAP的基本模式,提供与有效载荷配置多达64KB的数据包,为672个字节的默认MTU,48个字节的最低强制性支持的MTU。
L2CAP的转播及流量控制模式,可以被配置为每个通道的可靠或同步数据进行转播和CRC检查。
蓝牙核心规范附录1增加了两个额外的L2CAP模式的核心规范。
这些模式有效地贬低原重发和流量控制模式:
增强重传模式(ERTM):这种模式是一种原始的转播模式的改进版本。
这种模式提供了可靠的L2CAP信道。
流模式(SM):这是一个非常简单的模式,没有转播或流量控制。
这种模式提供了一个可靠的L2CAP信道。
在这些模式中的任何可靠性,选择性和/或另外下层BDR的/ EDR的蓝牙空气通过配置重传和的冲洗超时(时间之后,无线电将刷新包)接口保证。
保证下
层顺序排序。
ERTM或SM只有配置的L2CAP通道可运行超过AMP的逻辑联系。
SDP(服务发现协议)
服务发现协议(SDP)允许设备发现其他设备,其相关参数的支持服务。
例如,当手机连接到蓝牙耳机,社民党将用于确定哪些支持蓝牙配置文件耳机(耳机模式,免提配置文件,高级音频分配模式(A2DP)等)和协议复用器设置需要连接到他们每个人。
每个服务标识通用唯一标识符(UUID)分配一个短形式的UUID(16位),而不是完整的128 / vichitra官方服务(蓝牙模式),电缆替代协议(RFCOMM协议)
无线电频率通信(RFCOMM协议)是一种电缆替代协议,用于创建一个虚拟的串行数据流。
RFCOMM协议提供二进制数据传输和模拟的EIA-232(RS-232)在蓝牙基带层的控制信号。
RFCOMM协议提供给用户一个简单可靠的数据流,类似于TCP。
它被用于许多与电话相关的配置文件直接作为AT命令的载体,以及通过蓝牙OBEX传输层。
电话控制协议(TCP)。
电话控制协议二进制(塔塔咨询服务公司的BIN)是面向比特的协议,它定义了呼叫控制蓝牙设备之间的语音和数据呼叫建立信令。
此外,“塔塔咨询服务公司的BIN定义用于处理蓝牙TCS的设备组的流动性管理程序。
”
TCS-BIN仅用于无绳电话模式,该模式未能吸引实施者。
因此,它只具有历史意义。
通过协议
通过协议定义其他组织的标准制定,并纳入蓝牙协议栈,允许蓝牙协议只在必要时。
所采用的协议包括:
点的点对点协议(PPP):互联网点至点链接的IP数据报传输的标准协议。
的TCP / IP / UDP的连接到互联网的设备进行通信。
对象交换协议(OBEX):会话层协议的交换对象,提供了一个模型对象和操作表示。
它采用客户- 服务器模式。
无线应用环境/无线应用协议(WAE / WAP):WAE指定用于无线设备和WAP 是一个开放的标准,向移动用户提供电话和信息服务的访问的应用程序框架。
技术
频谱与干扰
蓝牙技术在2.4至2.485 GHz的未经许可的工业、科学和医疗(ISM)频段上运行,使用扩频、跳频、全双工信号,标称速率为1600跳/秒。
在大多数国家,2.4 GHz ISM频段是可用的且未经许可。
SIM频段对所有无线电系统开放,因此使用某个频段会遇到不可预测的干扰源。
因此,蓝牙设计了特殊的快速应答和跳频技术来保证链路的稳定性。
跳频技术将频带分成多个跳频信道,在一个连接中,无线电收发机根据一定的码序列不断地从一个信道“跳”到另一个信道。
只有发送方和接收方根据此规则进行通信,其余的干扰可能不遵循相同的规则。
跳频的瞬时带宽很窄,但通过扩频技术可以使窄带带宽扩展到宽带,使得干扰的影响可能变得很小。
与其他工作在同一频段的系统相比,蓝牙的跳频速度更快,数据包更短,稳定性更强。
纠错
蓝牙支持电路交换和分组交换两种技术,定义了两种链路连接类型,即面向连接的同步链路(SCO)和面向无连接的异步链路(ACL)。
蓝牙使用三种纠错模式:1/3前向纠错(FEC)、2/3前向纠错和自动重传请求(ARQ)。
纠错的目的是减少重传的可能性,同时增加额外费用,但在合理的无差错环境中,冗余投标将减少输出。
因此,包定义本身也保持了灵活的方式。
因此,可以定义软件是否采用FEC。
一般来说,当信道噪声较大时,蓝牙系统会使用FEC,为了保证通信质量:对于SCO链路,使用1/3的FEC;ACL链接中使用了2/3 FEC。
在无编号ARQ中,在一个时隙中发送的数据必须在下一个时隙中收到接收确认。
只有在接收端进行报头错误检测和CRC校验后,确认数据无误后,才会将确认发送给发送方,或返回错误消息。
范围
范围是特定于应用程序的,尽管核心规范规定了最小范围,但没有限制,制造商可以调整其实现以支持他们正在启用的用例。
范围可能因实施中使用的无线电类别而异:
3类无线电的射程可达1米或3英尺。
2类无线电最常见于移动设备中,其射程为10米或33英尺。
主要用于工业用途的1类无线电的射程为100米或300英尺。
电力
为了使蓝牙设备也可以连接,即使是在一个非常低的功率状态,蓝牙规定了三种节能状态:驻车状态、保持状态和嗅探状态。
这些状态的节能效率下降一个接一个。
最常用的无线电为2级,用户功率为2.5mW。
蓝牙技术被设计成具有非常低的功耗。
规范中通过允许收音机在不活动时关闭电源加强了这一点。
版本3.0 HS中的通用备用MAC/PHY仅在数据传输需要时才允许在无线电上发现高速设备和TUM的远程放大器,从而实现功率优化,并有助于无线电的安全性。
蓝牙低能耗技术,针对需要最大电池寿命而非高数据传输速率的设备进行了优化,用户的电量介于经典蓝牙技术的1/2到1/100之间。
安全
蓝牙系统的移动性和开放性使得安全问题变得极其重要。
虽然蓝牙系统采用的调频技术已经提供了一定的安全性,但蓝牙系统仍然需要对链路层和应用层进行安全管理。
在链路层,蓝牙系统提供认证、加密和密钥管理等功能。
每个用户都有一个个人识别码(PIN),该识别码将转换为128位链接密钥,用于单向或双向认证。
身份验证完成后,link将使用encryphon密钥进行加密。
链路层安全机制提供了大量的认证方案和灵活的加密方案(即允许咨询密码长度)。
当通信设备来自不同国家时,这种机制非常重要,因为有些国家会指定最大密码长度。
蓝牙系统将选择微微网中所有设备允许的最小最大密码长度。
蓝牙系统还支持高级协议栈在不同应用中的特殊安全机制。
蓝牙安全机制在依赖PIN的设备之间建立信任关系。
一旦建立了这种关系,这些引脚就可以存储在设备中,以便下次更快速地连接。