Bluetooth Pairing (14.3.7)–Cisco Connect to the Internet

Bluetooth pairing occurs when two Bluetooth devices establish a connection to share resources. For the devices to pair, the Bluetooth radios are turned on, and one device begins searching for other devices. Other devices must be set to discoverable mode, also called visible, so that they can be detected. When a Bluetooth device is in discoverable mode, it transmits the following information when another Bluetooth device requests it:

  • Name
  • Bluetooth class
  • Services that the device can use
  • Technical information, such as the features or the Bluetooth specification that it supports

During the pairing process, a personal identification number (PIN) may be requested to authenticate. The PIN is often a number but can also be a numeric code or passkey. The PIN is stored using pairing services, so it does not have to be entered the next time the device tries to connect. This capability is convenient when you‛re using a headset with a smartphone because they are paired automatically when the headset is turned on and within range.

To pair a Bluetooth device with an Android device, follow these steps:

Step 1. Follow the instructions for your device to place it in discoverable mode.

Step 2. Check the instructions for your device to find the connection PIN.

Step 3. Select Settings > Wireless and Networks.

Step 4. Touch Bluetooth to turn it on.

Step 5. Touch the Bluetooth tab.

Step 6. Touch Scan for Devices.

Step 7. Touch the discovered device to select it.

Step 8. Type the PIN.

Step 9. Touch the device name again to connect to it.

To pair a Bluetooth device with an iOS device, follow these steps:

Step 1. Follow the instructions for your device to place it in discoverable mode.

Step 2. Check the instructions for your device to find the connection PIN.

Step 3. Select Settings > Bluetooth.

Step 4. Touch Bluetooth to turn it on.

Step 5. Touch the discovered device to select it.

Step 6. Type the PIN.

Remember that mobile device operating systems are updated frequently. Always refer to the documentation from the manufacturer of your specific model device for the latest command reference.

Lab—Configure a Mobile Device for Wi-Fi Connectivity (14.3.8)

In this lab, you will complete the following objectives:

  • Familiarize yourself with the Wi-Fi settings on mobile devices.
  • Turn the Wi-Fi radio on and off.
  • Set the device to forget a found Wi-Fi network.
  • Connect to a new Wi-Fi network.

Summary (14.4)

The following is a summary of each topic in the chapter:

  • ISP Connectivity Options—An ISP provides a link between the home network and the Internet. Each ISP connects to other ISPs to form a network of links called the Internet backbone, which interconnects users all over the world. The Internet backbone uses fiber-optic cable to provide high-speed data links to connect the various service provider networks in major metropolitan areas around the world.

A router securely connects a computer to an ISP. The router includes a switch to connect wired hosts and a wireless AP to connect wireless hosts. The router also provides client addresses and security for inside hosts.

The most common connection options for small office and home users are cable and DSL. Other ISP connection options include cellular, satellite, and dial-up using a telephone line.

  • Network Virtualization—Cloud computing allows you to store personal files or even back up an entire drive on servers over the Internet. Cloud computing is possible because of data centers, which are facilities used to house computer systems and associated components. There are public, private, hybrid, and community clouds. The four main cloud computing services are SaaS, PaaS, IaaS, and ITaaS.

Virtualization is the foundation of cloud computing. Virtualization reduces costs and enables prototyping, faster server provisioning, increased server uptime, and improved disaster recovery; it also extends legacy support. A hypervisor is a program, firmware, or hardware that adds an abstraction layer on top of the physical hardware. The abstraction layer is used to create virtual machines that have access to all the hardware of the physical machine such as CPUs, memory, disk controllers, and NICs. The Type 2 hypervisor is the “hosted” approach. The Type 1 hypervisor is known as the “bare metal” approach.

Virtualization separates the operating system from the hardware. Network virtualization combines traditional networking hardware and software network resources into a software-based entity, a virtual network. The control plane is typically regarded as the brains of a device. The data plane (forwarding plane) is typically the switch fabric that connects the network ports to a device.

SDN is basically the separation of the control plane and data plane. The control plane function is removed from each device and is performed by a centralized controller. The centralized controller communicates control plane functions to each device. Each device can now focus on forwarding data while the centralized controller manages data flow, increases security, and provides other services. The SDN controller is a logical entity that enables network administrators to manage and dictate how the data plane of switches and routers should handle network traffic. It typically runs on a server. It orchestrates, mediates, and facilitates communication between applications and network elements.

  • Mobile Device Connectivity—Where possible, you should connect to Wi-Fi networks because data used over Wi-Fi does not count against most cellular data plans. Because Wi-Fi radios use less power than cellular radios, connecting to Wi-Fi networks conserves battery power. Use precautions when connecting to Wi-Fi networks:
    • Never send login information in plaintext.
    • Use a VPN connection.
    • Enable security on your home networks.
    • Use WPA2 or higher encryption.

Two popular operating systems for mobile devices are Android and Apple iOS. They each let you configure them to connect to wireless networks. When a mobile device is out of the range of the Wi-Fi network, it attempts to connect to another Wi-Fi network in range. If no Wi-Fi networks are in range, the mobile device connects to the cellular data network.

If your mobile device does not prompt to connect to a Wi-Fi network, the network SSID broadcast may be turned off, or the device may not be set to connect automatically. Manually configure the Wi-Fi settings on the mobile device. Remember that SSIDs and passphrases must be typed exactly as entered on the wireless router setup; otherwise, the device will not connect properly.

Most cell phone carriers offer cellular data plans, but the bandwidth limitations and charges for usage vary widely by carrier and by plan within carrier. As a result, many mobile device users use their cellular data plans only when Wi-Fi service is not available.

Bluetooth pairing occurs when two Bluetooth devices establish a connection to share resources. For the devices to pair, the Bluetooth radios are turned on, and one device begins searching for other devices. Other devices must be set to discoverable mode, also called visible, so that they can be detected.

Bluetooth technology provides a simple way for mobile devices to connect to each other and to wireless accessories. Bluetooth is wireless, automatic, and uses very little power, which helps conserve battery life. Up to eight Bluetooth devices can be connected together at any one time.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top