Define Bluetooth and state that it creates a Personal Area Network (PAN).
Identify the key technical characteristics (frequency, range, data‑rate, versions, encryption).
List the hardware components that make Bluetooth communication possible.
Carry out the full discovery → pairing → connection process on two devices.
Explain how Bluetooth fits into the overall network hierarchy and how it relates to other network devices (NICs, gateways, routers).
Compare Bluetooth with Wi‑Fi, NFC and RFID, and choose the most appropriate technology for a given scenario.
Recognise and mitigate security threats (Bluejacking, Bluesnarfing, MITM) and apply e‑safety best practice, including password policies, anti‑malware considerations and relevant legislation.
Discuss health, social and environmental impacts of Bluetooth use.
Integrate Bluetooth‑based file transfers into document production, spreadsheets, databases, presentations and web pages (AO2 & AO3 of the Cambridge IGCSE ICT 0417 syllabus).
Place Bluetooth configuration within the Systems Life‑Cycle (analysis, design, implementation, testing, maintenance, disposal).
1. What Is Bluetooth?
Bluetooth is a short‑range, wireless communication standard that forms a Personal Area Network (PAN). It operates in the 2.4 GHz ISM band using frequency‑hopping spread spectrum (FHSS)** to reduce interference from other 2.4 GHz devices such as Wi‑Fi, cordless phones and microwaves.
2. Technical Characteristics
Version
Maximum Data Rate
Typical Range (Class)
Power Consumption
Key Features
Security / Encryption
1.0 – 1.2
1 Mbps
Class 2 ≈ 10 m
High
Basic voice & data
None (plain text)
2.0 + EDR
3 Mbps
Class 2 ≈ 10 m
Medium
Enhanced Data Rate, faster pairing
Authentication via 4‑digit PIN
3.0 + HS
24 Mbps
Class 2 ≈ 10 m
Higher
High‑speed mode for large files
SSP (Secure Simple Pairing)
4.0 – 4.2 (BLE)
1 Mbps (BLE 0.5 Mbps)
Class 2 ≈ 10 m; BLE up to 50 m
Low (IoT‑focused)
Low‑energy, improved security
AES‑CCM (128‑bit) encryption, SSP
5.0 – 5.2
2 Mbps (BLE 2 Mbps)
Class 2 ≈ 10 m; BLE up to 240 m (outdoor)
Very low
Longer range, mesh networking, higher speed
AES‑CCM, LE Secure Connections, privacy features
3. How Bluetooth Fits Into the Overall Network Hierarchy
PAN (Personal Area Network) – Direct device‑to‑device links (e.g., phone ↔ headset).
LAN/WLAN (Local Area Network) – Devices can reach a LAN/WLAN via a Bluetooth gateway or a PC that is simultaneously Bluetooth‑enabled and Wi‑Fi/Ethernet‑connected.
WAN (Wide Area Network) – Not covered by Bluetooth; accessed through routers, broadband or cellular networks.
Network Devices (Syllabus 4.1)
A Bluetooth adapter (built‑in or USB dongle) functions as a network interface card (NIC) for a PAN, just as Ethernet cards and Wi‑Fi adapters do for LAN/WLAN connections.
4. Required Hardware Components
Bluetooth radio / adapter – integrated (smartphones, tablets, laptops) or external USB dongle for PCs and older laptops.
Low‑energy RF; research shows no proven health risk, but schools may set policies for prolonged exposure.
Higher RF exposure; similar safety guidelines.
Minimal exposure; often used in public‑space payment systems.
6. Security, e‑Safety and Legal Considerations
Common Bluetooth threats
Bluejacking – sending unsolicited messages.
Bluesnarfing – unauthorised data extraction.
Man‑in‑the‑Middle (MITM) – intercepting or altering data during pairing.
Encryption & Authentication
AES‑CCM (128‑bit) encryption from Bluetooth 4.0 onward.
Secure Simple Pairing (SSP) and LE Secure Connections provide mutual authentication.
Password / PIN policies
Never use default “0000” or “1234”.
Prefer six‑digit or alphanumeric passkeys where supported.
Change the PIN after a device is repurposed or sold.
Anti‑malware relevance
Malicious Bluetooth drivers can be used to install malware; keep OS and driver updates current.
Physical safety
Ensure Bluetooth dongles are not obstructed or overheating (do not cover vents).
Use only certified adapters to comply with the UK Electrical Equipment (Safety) Regulations.
Legal framework
Data Protection Act 2018 / GDPR – personal data transferred via Bluetooth must be handled securely.
Copyright – transferring copyrighted media without permission breaches the Copyright, Designs and Patents Act 1988.
7. Step‑by‑Step Procedure to Connect Two Devices
Analyse the need – determine which device will act as the master (initiates the connection) and which as the slave (receives the request).
Design documentation – sketch a simple flowchart (Discovery → Pairing → Connection → Data Transfer) and note any required PIN or passkey.
Enable Bluetooth on both devices (Settings ► Bluetooth). Ensure the OS reports the correct version.
Make the target device discoverable (usually a 2‑5 minute window). Some devices stay permanently discoverable; turn this off after pairing.
Scan for devices on the master. The target’s name should appear in the list.
Select the device and initiate pairing.
If prompted, compare the numeric code (SSP “Just Works”, “Numeric Comparison” or “Passkey Entry”).
Enter the agreed PIN or confirm the displayed number.
Establish the logical link – the devices become “paired”. A Bluetooth link key is stored for future connections.
Test the connection – send a short file, play audio, or open a Bluetooth‑enabled app.
Document the configuration – record device names, MAC addresses, PINs and any special settings (e.g., file‑transfer profile).
Maintain the link – keep drivers updated, delete unused pairings, and turn Bluetooth off when not needed.
8. Quick Pre‑Connection Checklist
Item
Checked
Both devices have Bluetooth turned on
☐
Target device is set to “discoverable” (or already paired)
☐
Battery level ≥ 20 % on both devices
☐
Secure PIN / passkey is known and not the default
☐
No unnecessary Bluetooth devices are active nearby (reduces interference)
☐
Latest OS/driver updates installed (supports current Bluetooth version)
☐
Physical safety check – dongle not obstructed, no overheating risk
☐
Compliance with Data Protection / Copyright policy for the data to be transferred
☐
9. Linking Bluetooth to Other Syllabus Topics
Network Devices (Section 4.1)
Bluetooth adapters act as NICs for PANs. A Bluetooth‑enabled PC can act as a gateway, forwarding data to a LAN/WLAN router.
Network Types & Topologies (Section 4.2)
Compare PAN (Bluetooth star topology) with LAN (Ethernet bus/star) and WLAN (Wi‑Fi mesh). Discuss how multiple peripherals can connect to a single smartphone acting as a hub.
Security & Data Protection (Section 8)
Relate Bluetooth pairing security to broader concepts such as strong passwords, encryption, anti‑malware, and the Data Protection Act. Include specific threats: Bluejacking, Bluesnarfing, MITM.
Effects of Using IT – Health & Society (Section 5.1)
Discuss low‑energy RF exposure, reliance on wearables, and the social benefits of hands‑free communication.
Mobile Communication (Section 6.1)
Show how Bluetooth enables multimedia messaging, offline file sharing, and connectivity for mobile accessories (headsets, car kits).
Retail & Expert Systems (Sections 6.8‑6.9)
Demonstrate a point‑of‑sale (POS) terminal that receives payment data via Bluetooth, or a smart‑home hub that controls lights and thermostats using Bluetooth mesh.
Systems Life‑Cycle (Section 7)
Analysis – Identify the need for a wireless peripheral.
Design – Produce a flowchart of the pairing process and a risk assessment for security.
Implementation – Install drivers, pair devices.
Testing – Transfer a test file, verify encryption.
Maintenance – Update firmware, delete old pairings.
Disposal – Factory‑reset devices, remove stored link keys.
Document Production & Multimedia (Sections 11‑16)
Transfer a photograph via Bluetooth to a laptop.
Insert the image into a Word document, apply styles and caption.
Export the document as a PDF and email it as an attachment (offline‑to‑online workflow).
Import a CSV file received via Bluetooth into a spreadsheet and create a chart.
Load a small SQLite database transferred by Bluetooth into a classroom data‑analysis project.
Embed a short video clip received via Bluetooth into a PowerPoint slide.
Upload a Bluetooth‑received image to a simple HTML web page using a local web‑authoring tool.
10. Summary
Bluetooth provides a low‑power, short‑range solution for creating a Personal Area Network. Mastery of its technical specifications, the discovery‑pair‑connect workflow, and the associated security and e‑safety measures enables learners to use Bluetooth responsibly and to integrate it with the wider ICT concepts required by the Cambridge IGCSE ICT 0417 syllabus, from network devices and security to document production and the systems life‑cycle.
Suggested diagram: Flowchart – Discovery → Pairing (PIN/SSP) → Connection → Data Transfer → Maintenance.
Your generous donation helps us continue providing free Cambridge IGCSE & A-Level resources,
past papers, syllabus notes, revision questions, and high-quality online tutoring to students across Kenya.