Know and understand connecting a device to a network using Bluetooth

Connecting a Device to a Network Using Bluetooth

Learning Outcomes (What you should be able to do)

  • Define Bluetooth and state that it creates a Personal Area Network (PAN).
  • Identify the key technical characteristics (frequency, range, data‑rate, versions, encryption).
  • List the hardware components that make Bluetooth communication possible.
  • Carry out the full discovery → pairing → connection process on two devices.
  • Explain how Bluetooth fits into the overall network hierarchy and how it relates to other network devices (NICs, gateways, routers).
  • Compare Bluetooth with Wi‑Fi, NFC and RFID, and choose the most appropriate technology for a given scenario.
  • Recognise and mitigate security threats (Bluejacking, Bluesnarfing, MITM) and apply e‑safety best practice, including password policies, anti‑malware considerations and relevant legislation.
  • Discuss health, social and environmental impacts of Bluetooth use.
  • Integrate Bluetooth‑based file transfers into document production, spreadsheets, databases, presentations and web pages (AO2 & AO3 of the Cambridge IGCSE ICT 0417 syllabus).
  • Place Bluetooth configuration within the Systems Life‑Cycle (analysis, design, implementation, testing, maintenance, disposal).

1. What Is Bluetooth?

Bluetooth is a short‑range, wireless communication standard that forms a Personal Area Network (PAN). It operates in the 2.4 GHz ISM band using frequency‑hopping spread spectrum (FHSS)** to reduce interference from other 2.4 GHz devices such as Wi‑Fi, cordless phones and microwaves.

2. Technical Characteristics

Version Maximum Data Rate Typical Range (Class) Power Consumption Key Features Security / Encryption
1.0 – 1.2 1 Mbps Class 2 ≈ 10 m High Basic voice & data None (plain text)
2.0 + EDR 3 Mbps Class 2 ≈ 10 m Medium Enhanced Data Rate, faster pairing Authentication via 4‑digit PIN
3.0 + HS 24 Mbps Class 2 ≈ 10 m Higher High‑speed mode for large files SSP (Secure Simple Pairing)
4.0 – 4.2 (BLE) 1 Mbps (BLE 0.5 Mbps) Class 2 ≈ 10 m; BLE up to 50 m Low (IoT‑focused) Low‑energy, improved security AES‑CCM (128‑bit) encryption, SSP
5.0 – 5.2 2 Mbps (BLE 2 Mbps) Class 2 ≈ 10 m; BLE up to 240 m (outdoor) Very low Longer range, mesh networking, higher speed AES‑CCM, LE Secure Connections, privacy features

3. How Bluetooth Fits Into the Overall Network Hierarchy

  • PAN (Personal Area Network) – Direct device‑to‑device links (e.g., phone ↔ headset).
  • LAN/WLAN (Local Area Network) – Devices can reach a LAN/WLAN via a Bluetooth gateway or a PC that is simultaneously Bluetooth‑enabled and Wi‑Fi/Ethernet‑connected.
  • WAN (Wide Area Network) – Not covered by Bluetooth; accessed through routers, broadband or cellular networks.
Network Devices (Syllabus 4.1)
A Bluetooth adapter (built‑in or USB dongle) functions as a network interface card (NIC) for a PAN, just as Ethernet cards and Wi‑Fi adapters do for LAN/WLAN connections.

4. Required Hardware Components

  • Bluetooth radio / adapter – integrated (smartphones, tablets, laptops) or external USB dongle for PCs and older laptops.
  • Bluetooth‑enabled device – headphones, keyboard, mouse, printer, fitness tracker, POS terminal, smart‑home hub, etc.
  • Power source – adequate battery level (BLE devices can run for months on a coin cell).
  • Device drivers / OS support – latest Bluetooth stack to ensure compatibility with the newest version and security patches.

5. Benefits, Limitations and Social/Health Impacts

Aspect Bluetooth Wi‑Fi (2.4 GHz) Other PAN Tech (NFC / RFID)
Range 10 m (Class 2); up to 240 m with BLE 5.0 (outdoor) 30 m indoor / 100 m outdoor NFC ≈ 4 cm, RFID ≈ 10 cm‑10 m (depends on frequency)
Data Rate 1–2 Mbps (latest); 24 Mbps in HS mode Up to 600 Mbps (Wi‑Fi 5) – 9.6 Gbps (Wi‑Fi 6E) NFC ≈ 424 kbps, RFID ≈ 100 kbps‑1 Mbps
Power Consumption Very low (BLE) – ideal for battery‑powered wearables Higher – continuous radio activity Very low (passive RFID) or moderate (active RFID)
Typical Uses Peripheral devices, wearables, short‑range file transfer, POS, smart‑home control Internet access, video streaming, large file transfer Contactless payments (NFC), inventory tracking (RFID)
Health / Social Impact Low‑energy RF; research shows no proven health risk, but schools may set policies for prolonged exposure. Higher RF exposure; similar safety guidelines. Minimal exposure; often used in public‑space payment systems.

6. Security, e‑Safety and Legal Considerations

  • Common Bluetooth threats
    • Bluejacking – sending unsolicited messages.
    • Bluesnarfing – unauthorised data extraction.
    • Man‑in‑the‑Middle (MITM) – intercepting or altering data during pairing.
  • Encryption & Authentication
    • AES‑CCM (128‑bit) encryption from Bluetooth 4.0 onward.
    • Secure Simple Pairing (SSP) and LE Secure Connections provide mutual authentication.
  • Password / PIN policies
    • Never use default “0000” or “1234”.
    • Prefer six‑digit or alphanumeric passkeys where supported.
    • Change the PIN after a device is repurposed or sold.
  • Anti‑malware relevance
    • Malicious Bluetooth drivers can be used to install malware; keep OS and driver updates current.
  • Physical safety
    • Ensure Bluetooth dongles are not obstructed or overheating (do not cover vents).
    • Use only certified adapters to comply with the UK Electrical Equipment (Safety) Regulations.
  • Legal framework
    • Data Protection Act 2018 / GDPR – personal data transferred via Bluetooth must be handled securely.
    • Copyright – transferring copyrighted media without permission breaches the Copyright, Designs and Patents Act 1988.

7. Step‑by‑Step Procedure to Connect Two Devices

  1. Analyse the need – determine which device will act as the master (initiates the connection) and which as the slave (receives the request).
  2. Design documentation – sketch a simple flowchart (Discovery → Pairing → Connection → Data Transfer) and note any required PIN or passkey.
  3. Enable Bluetooth on both devices (Settings ► Bluetooth). Ensure the OS reports the correct version.
  4. Make the target device discoverable (usually a 2‑5 minute window). Some devices stay permanently discoverable; turn this off after pairing.
  5. Scan for devices on the master. The target’s name should appear in the list.
  6. Select the device and initiate pairing.
    • If prompted, compare the numeric code (SSP “Just Works”, “Numeric Comparison” or “Passkey Entry”).
    • Enter the agreed PIN or confirm the displayed number.
  7. Establish the logical link – the devices become “paired”. A Bluetooth link key is stored for future connections.
  8. Test the connection – send a short file, play audio, or open a Bluetooth‑enabled app.
  9. Document the configuration – record device names, MAC addresses, PINs and any special settings (e.g., file‑transfer profile).
  10. Maintain the link – keep drivers updated, delete unused pairings, and turn Bluetooth off when not needed.

8. Quick Pre‑Connection Checklist

ItemChecked
Both devices have Bluetooth turned on
Target device is set to “discoverable” (or already paired)
Battery level ≥ 20 % on both devices
Secure PIN / passkey is known and not the default
No unnecessary Bluetooth devices are active nearby (reduces interference)
Latest OS/driver updates installed (supports current Bluetooth version)
Physical safety check – dongle not obstructed, no overheating risk
Compliance with Data Protection / Copyright policy for the data to be transferred

9. Linking Bluetooth to Other Syllabus Topics

Network Devices (Section 4.1)
Bluetooth adapters act as NICs for PANs. A Bluetooth‑enabled PC can act as a gateway, forwarding data to a LAN/WLAN router.
Network Types & Topologies (Section 4.2)
Compare PAN (Bluetooth star topology) with LAN (Ethernet bus/star) and WLAN (Wi‑Fi mesh). Discuss how multiple peripherals can connect to a single smartphone acting as a hub.
Security & Data Protection (Section 8)
Relate Bluetooth pairing security to broader concepts such as strong passwords, encryption, anti‑malware, and the Data Protection Act. Include specific threats: Bluejacking, Bluesnarfing, MITM.
Effects of Using IT – Health & Society (Section 5.1)
Discuss low‑energy RF exposure, reliance on wearables, and the social benefits of hands‑free communication.
Mobile Communication (Section 6.1)
Show how Bluetooth enables multimedia messaging, offline file sharing, and connectivity for mobile accessories (headsets, car kits).
Retail & Expert Systems (Sections 6.8‑6.9)
Demonstrate a point‑of‑sale (POS) terminal that receives payment data via Bluetooth, or a smart‑home hub that controls lights and thermostats using Bluetooth mesh.
Systems Life‑Cycle (Section 7)
  • Analysis – Identify the need for a wireless peripheral.
  • Design – Produce a flowchart of the pairing process and a risk assessment for security.
  • Implementation – Install drivers, pair devices.
  • Testing – Transfer a test file, verify encryption.
  • Maintenance – Update firmware, delete old pairings.
  • Disposal – Factory‑reset devices, remove stored link keys.
Document Production & Multimedia (Sections 11‑16)
  1. Transfer a photograph via Bluetooth to a laptop.
  2. Insert the image into a Word document, apply styles and caption.
  3. Export the document as a PDF and email it as an attachment (offline‑to‑online workflow).
Spreadsheets, Databases, Presentations, Websites (Sections 18‑21)
  • Import a CSV file received via Bluetooth into a spreadsheet and create a chart.
  • Load a small SQLite database transferred by Bluetooth into a classroom data‑analysis project.
  • Embed a short video clip received via Bluetooth into a PowerPoint slide.
  • Upload a Bluetooth‑received image to a simple HTML web page using a local web‑authoring tool.

10. Summary

Bluetooth provides a low‑power, short‑range solution for creating a Personal Area Network. Mastery of its technical specifications, the discovery‑pair‑connect workflow, and the associated security and e‑safety measures enables learners to use Bluetooth responsibly and to integrate it with the wider ICT concepts required by the Cambridge IGCSE ICT 0417 syllabus, from network devices and security to document production and the systems life‑cycle.

Suggested diagram: Flowchart – Discovery → Pairing (PIN/SSP) → Connection → Data Transfer → Maintenance.

Create an account or Login to take a Quiz

85 views
0 improvement suggestions

Log in to suggest improvements to this note.