|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
n |
Error
correction:
|
|
|
|
– |
1/3
rate forward error correction code (FEC)
|
|
|
|
n |
for
SCO only
|
|
|
|
– |
2/3
rate forward error correction code FEC
|
|
|
|
– |
Automatic
repeat request (ARQ) scheme for data
|
|
|
|
n |
data
transmitted in one slot is directly acknowledged by the recipient
|
|
|
|
in the
next slot.
|
|
|
n |
Authentication and Privacy
|
|
|
|
– |
one-way,
two-way, or no authentication possible
|
|
|
|
– |
use
stream cipher based on secret keys (0, 40, 64 bits)
|
|
|
|
– |
key
management left to higher layer software
|
|
|
|
– |
if
stronger protection (longer key is needed), use better encryption
|
|
at
network and/or application level
|
|