Page 480 - From GMS to LTE
P. 480

466  From GSM to LTE-Advanced Pro and 5G

            the ID fame was received to higher layers. Thus, it is possible to sort the list of detected
            devices by the signal strength and to present devices that are closer to the user at the top
            of the list. This is especially useful if many devices are in close proximity such as during
            an exhibition. In this environment, it can become quite difficult to send an electronic
            business card to a nearby device, as the result of the scan often reveals the presence of
            several dozen devices and it is necessary to scroll through a long list. If the list is ordered
            on the signal strength, however, it is very likely that the response of the device that
            should receive the electronic business card is received with a high signal level because
            of its closer proximity to the sender and that device is thus presented at the top of
            the list.
             If a device receives an ID packet, it returns an FHS packet, which includes its address,
            frequency hopping and synchronization information.
             After receiving an FHS packet, the searching device can continue its search.
            Alternatively, the inquiry procedure can also be terminated to establish an ACL con-
            nection with the detected device by performing a paging procedure.
             To be detectable, master devices can also enter the inquiry scan state from time to
            time. Thus, it is possible to detect and connect to them even if they are already engaged
            in a connection with another device. It has to be noted, however, that some devices like
            mobile phones do not support this optional functionality.
             If a user wants its device to remain invisible, it is possible to deactivate the inquiry
            scan functionality. Thus, a device can only initiate a paging procedure and thus a con-
            nection with the user’s device if it already knows the device’s hardware address. It is
            useful to activate this setting once a user has paired all devices (see Section 7.5.1) that
            are frequently used together. In this way, the devices of the user remain invisible to the
            rest of the world but are still able to establish connections with each other. This drasti-
            cally reduces the opportunity for malicious attacks on Bluetooth devices, which may try
            to take advantage of security holes of some Bluetooth implementations [4].
             To establish an ACL connection by initiating a paging procedure, a device must be
            aware of the hardware address of the device to be connected to either from a previous
            connection or as a result of an inquiry procedure. The paging procedure works in a
            similar way to the inquiry procedure, that is, ID packets are sent in a rapid sequence on
            different frequencies. Instead of a generic address, the hardware address of the target
            device is included. The target device in turn replies with an ID packet and thus enables
            the requesting device to return an FHS packet that contains its hopping sequence.
            Figure 7.8 shows how the paging procedure is performed and how the devices enter the
            connected state upon success.
             The power consumption of a device that is not engaged in any connection and thus
            only performs inquiry and page scans at regular intervals is very low. Typically, the
            power consumption in this state is less than 1 mW. As mobile phones have a battery
            capacity of typically 4000–5000 mWh, the  Bluetooth functionality  has only  a small
            effect on the standby time of a mobile device.
             After successful paging, both devices enter the connection‐active state and data
            transfer can start over the established ACL connection.
             During connection establishment, it can happen that the slave device is master of
            another connection at the same time. In such cases, the Bluetooth protocol stack
              enables the device to indicate during connection establishment that a connection is
            possible only if a master–slave role change is performed after establishment of the
   475   476   477   478   479   480   481   482   483   484   485