BlueGate 1000
Appendix—A, Intro to BT
May 8, 2001
WIDCOMM, Inc, Proprietary and Confidential
A-7
A Typical Connection Scenario
In this simplified scenario Joe’s PC is a Bluetooth-aware computer that needs access to
the network:
1.
Joe’s PC performs a search of the Bluetooth Neighborhood (a Device Inquiry)
and determines that there are four Bluetooth devices in the vicinity.
2.
Joe’s PC queries each of the four nearby devices to determine which services
they provide (a Service Discovery). Ann’s Computer offers the network access
service.
3.
Joe’s PC sends a network connection request to Ann’s Computer.
4.
Ann’s Computer evaluates the request and determines that Joe’s PC is permitted
to use the network connection service, PROVIDED THE CORRECT
PASSWORD IS SUBMITTED.
5.
Ann’s Computer queries Joe’s PC for the password (Authentication).
6.
Joe’s PC returns the correct password and the network connection is established.
7.
Joe’s PC uses the network access connection on Ann’s Computer as if Joe’s PC
was connected directly to the network.
When Joe’s PC no longer needs the network access service the connection between it and
Ann’s Computer is disconnected by the operator.
Some Bluetooth services disconnect automatically, others must be closed manually.
<back>