OSI 7 Layers,where does the protocol fit-in?

  • Thread starter Thread starter marellasunny
  • Start date Start date
  • Tags Tags
    bluetooth
AI Thread Summary
The discussion centers on the OSI model and its relation to Bluetooth technology. Bluetooth, as a communication protocol, spans multiple layers of the OSI model, primarily fitting into the physical layer while also encompassing aspects of the upper layers. The IEEE 802 standards, which include various protocols, mainly address the lower two layers of the OSI model. Although Bluetooth was once part of the IEEE 802 standards (specifically 802.15.1), it is no longer maintained under that designation. The OSI model serves as a comprehensive framework for understanding communication protocols, from hardware to application software.
marellasunny
Messages
245
Reaction score
3
I am a novice reading about the 7 OSI layers. I am reading this because I am currently working with a bluetooth device which is used to send serial data from the bluetooth module to the laptop. Since bluetooth is in itself a protocol,much like the 802 protocols, where among the 7 OSI layers does it fit-in?
 
Technology news on Phys.org
Perhaps this may help:

http://en.wikipedia.org/wiki/OSI_model

Many communication protocols fit into the OSI model but may collapse a couple of layers into one layer or may not implement some layer or may in fact be one of the layers in a larger communication scheme.

The OSI model is a framework for building a communication protocol from hardware details to firmware to middleware to application software.

In your case, bluetooth and 802 are at the physical layer.
 
Bluetooth comprises a large number of protocols that span the first six layers of the OSI model. Most of the IEEE 802 standards address only the bottom two layers of the OSI model. Note that Bluetooth was initially one of the IEEE 802 standards (802.15.1), but that standard is no longer maintained. So it's still fair to say that IEEE 802 addresses the bottom two layers of the OSI model.

img015.gif


Source: Slide 15 of the 1999 IEEE 802.15 Bluetooth proposal, http://www.ietf.org/proceedings/45/slides/mobileip-802_15-99jul/sld001.htm
 
  • Like
Likes 2 people
Thread 'Is this public key encryption?'
I've tried to intuit public key encryption but never quite managed. But this seems to wrap it up in a bow. This seems to be a very elegant way of transmitting a message publicly that only the sender and receiver can decipher. Is this how PKE works? No, it cant be. In the above case, the requester knows the target's "secret" key - because they have his ID, and therefore knows his birthdate.
I tried a web search "the loss of programming ", and found an article saying that all aspects of writing, developing, and testing software programs will one day all be handled through artificial intelligence. One must wonder then, who is responsible. WHO is responsible for any problems, bugs, deficiencies, or whatever malfunctions which the programs make their users endure? Things may work wrong however the "wrong" happens. AI needs to fix the problems for the users. Any way to...
Back
Top