How Bluetooth Works: Classic, BLE, and Mesh Networking Explained

Bluetooth is a short-range wireless technology standard for exchanging data between devices over the 2.4 GHz ISM (Industrial, Scientific, Medical) band, managed by the Bluetooth Special Interest Group (SIG). What started in 1998 as a simple cable replacement for serial connections has evolved into three distinct protocol families: Bluetooth Classic (BR/EDR) for high-bandwidth audio and data streaming, Bluetooth Low Energy (BLE) for battery-efficient sensor and IoT communication, and Bluetooth Mesh for large-scale device networks. Each variant uses fundamentally different protocol stacks, connection models, and radio techniques, united only by their shared use of the 2.4 GHz band and the Bluetooth brand. Understanding the engineering beneath the pairing dialogs and device lists reveals a sophisticated system of frequency hopping, adaptive power control, and cryptographic key management.

The 2.4 GHz ISM Band and Frequency Hopping

Bluetooth operates in the 2.4000-2.4835 GHz ISM band -- the same spectrum used by WiFi, microwave ovens, Zigbee, and countless other wireless technologies. To coexist in this crowded spectrum, Bluetooth uses Frequency Hopping Spread Spectrum (FHSS): instead of transmitting on a fixed frequency, devices hop between 79 channels (Classic) or 40 channels (BLE), each 1 MHz wide, in a pseudo-random sequence.

In Bluetooth Classic, the hopping sequence is derived from the master device's Bluetooth address (BD_ADDR) and its clock. Both master and slave devices compute the same sequence independently, hopping 1,600 times per second (every 625 microseconds, one "slot"). This rapid hopping means that even if one channel is occupied by WiFi or another interferer, the Bluetooth connection only loses 1/79th of its capacity -- the next hop will likely land on a clear channel.

Adaptive Frequency Hopping (AFH), introduced in Bluetooth 1.2, makes this even smarter. Devices continuously measure the quality of each channel and classify them as good or bad. Bad channels (those consistently occupied by WiFi, for example) are removed from the hopping sequence. The minimum number of channels that AFH can use is 20 (out of 79), so even in heavily congested environments, Bluetooth can avoid interference while maintaining enough channels for frequency diversity.

BLE uses a different scheme: 40 channels of 2 MHz width, of which 37 are data channels and 3 are advertising channels (37, 38, 39), positioned at frequencies specifically chosen to avoid the three most common WiFi channels (1, 6, 11). BLE also uses AFH but only on data channels; advertising channels are always active because they must be scannable by any device.

Bluetooth Frequency Hopping (2.4 GHz ISM Band) 2.402 2.480 GHz WiFi Ch1 WiFi Ch6 WiFi Ch11 Classic: 79 channels, 1 MHz, 1600 hops/sec x x x x x x AFH: bad channels removed from hopping sequence 37 38 39 BLE: 40 channels (37 data + 3 advertising), 2 MHz each Advertising channels placed between WiFi channels 1, 6, and 11 Classic hop BLE adv BLE data x = AFH excluded

Bluetooth Classic (BR/EDR)

Bluetooth Classic encompasses two radio modes: BR (Basic Rate) at 1 Mbps and EDR (Enhanced Data Rate) at 2-3 Mbps. Classic Bluetooth is connection-oriented: devices form a piconet with one master and up to seven active slaves. The master controls the hopping sequence and the timing -- slaves can only transmit when the master addresses them in a poll-response pattern.

The protocol stack for Classic Bluetooth is layered:

Classic Bluetooth defines profiles that standardize how specific use cases work:

Bluetooth Low Energy (BLE)

BLE (introduced in Bluetooth 4.0 in 2010) is a completely separate protocol stack designed from scratch for ultra-low power operation. A BLE device can run for months or years on a coin cell battery. BLE achieves this through extremely short transmission bursts, long sleep intervals, and a simplified connection model.

BLE's key characteristics differ from Classic in almost every dimension:

GATT: The BLE Data Model

BLE uses a data model called GATT (Generic Attribute Profile) built on top of the ATT (Attribute Protocol). GATT organizes data into a hierarchy:

The GATT model defines two roles: the GATT Server (the device with data to expose, e.g., a heart rate monitor) and the GATT Client (the device reading that data, e.g., your phone). After connecting, the client performs service discovery -- reading the server's attribute table to find available services and characteristics. The client can then read values, write values, or subscribe to notifications/indications for automatic updates when values change.

Notifications vs. indications: a notification is a one-way push from server to client (no acknowledgment required). An indication requires the client to acknowledge receipt. Notifications are preferred for high-frequency data (sensor readings) because they avoid the round-trip latency of acknowledgments.

BLE GATT Data Model GATT Client (phone / laptop) reads, writes, subscribes ATT GATT Server (Heart Rate Monitor) Heart Rate Service (UUID: 0x180D) Heart Rate Measurement (0x2A37) Props: Notify Value: 72 bpm CCCD (0x2902): notifications=ON Body Sensor Location (0x2A38) Props: Read Value: Chest (1) Device Information Service (UUID: 0x180A) Manufacturer Name (0x2A29) Props: Read | Value: "Polar" Firmware Rev (0x2A26) Props: Read | Value: "2.1.4" Service Characteristic Descriptor Props: R/W/Notify/Indicate

BLE Advertising and Discovery

BLE devices make themselves discoverable by broadcasting advertising packets on the three advertising channels (37, 38, 39). An advertising event consists of sending the same packet on each of the three channels in quick succession, then sleeping until the next advertising interval (20 ms to 10.24 seconds). The advertising packet contains:

A scanner (e.g., your phone looking for nearby devices) listens on the advertising channels. Passive scanning simply listens for advertisements. Active scanning sends a Scan Request to the advertiser, which responds with a Scan Response containing additional data (another 31 bytes). This doubles the amount of data a device can broadcast without establishing a connection.

BLE 5.0 introduced extended advertising, which uses the advertising channels only to announce the presence of extended advertising data on data channels. This allows advertising payloads up to 255 bytes (or fragmented across multiple packets) without consuming valuable advertising channel time.

Pairing, Bonding, and Security

Bluetooth security is built on pairing (establishing a shared secret between two devices) and bonding (storing that secret for future use). The security model has evolved significantly across Bluetooth versions, driven by a series of discovered vulnerabilities.

Classic Bluetooth pairing:

BLE pairing:

Bonding stores the derived keys (LTK for BLE, Link Key for Classic) in non-volatile memory so devices can reconnect without repeating the pairing process. Bonded devices also exchange Identity Resolving Keys (IRKs) that allow them to recognize each other even when using random MAC addresses (a privacy feature that prevents tracking).

BLE supports four security levels:

  1. Level 1 -- No security (no authentication, no encryption)
  2. Level 2 -- Unauthenticated encryption (Just Works pairing -- encrypted but no MITM protection)
  3. Level 3 -- Authenticated encryption (Numeric Comparison, Passkey, or OOB -- encrypted with MITM protection)
  4. Level 4 -- Authenticated LE Secure Connections with 128-bit encryption key (highest level, requires BLE 4.2+)

GATT services and characteristics can require specific security levels for access. A heart rate characteristic might be readable at Level 1, but a glucose measurement (medical data) might require Level 3 or Level 4.

BLE Connection Lifecycle

A BLE connection follows this sequence:

  1. Advertising -- The peripheral broadcasts advertising packets.
  2. Scanning -- The central device listens for advertisements.
  3. Connection Request -- The central sends a CONNECT_IND packet to the peripheral on an advertising channel, specifying connection parameters (connection interval, slave latency, supervision timeout).
  4. Connected -- Both devices switch to a shared hopping sequence on data channels. The central is the master (initiates each connection event), the peripheral is the slave.
  5. Service Discovery -- The central reads the peripheral's GATT attribute table to discover services and characteristics.
  6. Data Exchange -- The central reads/writes characteristics, subscribes to notifications.
  7. Disconnection -- Either side can terminate. The peripheral resumes advertising if it wants to be reconnectable.

Connection parameters significantly impact power consumption and performance:

Bluetooth Mesh

Bluetooth Mesh (introduced in 2017) extends BLE to support many-to-many device communication in large-scale networks. Unlike Classic and BLE's point-to-point (or star) topologies, Mesh creates a flood-based network where messages can reach devices anywhere in the mesh through multi-hop relay.

Bluetooth Mesh is designed for building automation (lighting, HVAC, access control), industrial IoT, and smart home applications. Key architectural concepts:

A significant limitation of Bluetooth Mesh is throughput. Because it uses managed flooding over BLE advertising channels, the aggregate bandwidth of the mesh is limited. In a dense mesh with many relay nodes, message collisions increase. For applications requiring high throughput or real-time streaming, Wi-Fi Mesh, Thread, or Zigbee may be more appropriate. Bluetooth Mesh's strength is in its massive installed base (any BLE 4.0+ device can potentially support mesh with a firmware update) and its mature security model.

Bluetooth 5.x and Beyond

Recent Bluetooth versions have focused on BLE improvements:

Bluetooth Coexistence Challenges

Sharing the 2.4 GHz band with WiFi creates real-world problems. A 20 MHz WiFi channel occupies 20 of Bluetooth's 79 channels. When both technologies are active in the same device (a smartphone using WiFi and Bluetooth simultaneously), they can physically interfere because the radio hardware must time-share the antenna and RF front-end.

Modern devices use coexistence mechanisms to mitigate this:

In practice, coexistence is imperfect. Users commonly experience Bluetooth audio dropouts when downloading large files over WiFi, or reduced WiFi throughput when streaming high-quality Bluetooth audio. Using the 5 GHz WiFi band (which does not overlap with Bluetooth) eliminates the interference entirely.

Bluetooth and Network Infrastructure

Bluetooth is fundamentally a personal area network (PAN) technology -- it connects devices within arm's reach. But increasingly, BLE devices are gateways to wider networks. A BLE sensor connects to a phone or gateway, which relays data over WiFi or cellular to cloud services, whose IP addresses are part of prefixes announced by autonomous systems via BGP. You can trace the network path from any BLE gateway's cloud backend to your location using the god.ad looking glass.

See BGP routing data in real time

Open Looking Glass
More Articles
What is DNS? The Internet's Phone Book
What is an IP Address?
IPv4 vs IPv6: What's the Difference?
What is a Network Prefix (CIDR)?
How Does Traceroute Work?
What is a CDN? Content Delivery Networks Explained