Documente Academic
Documente Profesional
Documente Cultură
Pag
Sr Remar
Subject e
No. k
No.
1 INTRODUCTION TO BLUETOOTH 02
2 HISTORY OF BLUETOOTH 03
3 WORKING OF BLUETOOTH 07
4 BLUETOOTH SECURITY 13
5 BLUETOOTH IN ACTION 15
1
6 COMPARISON WITH INFRARED 20
7 APPLICATION OF BLUETOOTH 22
8 ADVANTAGES OF BLUETOOTH 23
9 DISADVANTAGES OF BLUETOOTH 25
10 CONCLUSION 25
11 REFERENCE WEBSITES 26
2
1.Introduction of Bluetooth-
3
2. History of Bluetooth
4
• First mobile phone.
• First PC Card.
• Prototype mouse and laptop demonstrated
at CeBIT 2000.
• Prototype USB dongle shown at COMDEX.
• First chip to integrate radio frequency,
baseband, microprocessor functions and
Bluetooth wireless software.
• First Headset.
• First printer.
• First laptop.
• First hands-free car kit.
• First hands-free car kit with speech
recognition.
• The Bluetooth SIG, Inc. is formed as a
privately-held trade association.
6
• First Sunglasses.
• First watch.
• First picture frame.
• Bluetooth wireless reaches an installed
base of 1 billion devices.
• Bluetooth enabled devices ship at a rate of
10 million per week.
• The Bluetooth SIG announces it will
integrate Bluetooth technology with the Wi-
Media Alliance version of UWB.
• First alarm-clock radio.
• First television.
• The Bluetooth SIG welcomes its 8,000th
member.
• Signature, The Bluetooth quarterly, makes its
debut at the Bluetooth SIG's All Hands
Meeting in Vienna, Austria.
• Bluetooth SIG Executive Director, Michael
Foley, wins Telematics Leadership Award.
7
• 2008 marks Bluetooth technology’s 10 year
anniversary - no other wireless technology
has grown to be shipping nearly 2 Billion
products in 10 years.
• The Bluetooth SIG welcomes its 10,000th
member.
• Bluetooth SIG Executive Director, Michael
Foley, is named one of RCR Wireless News'
Mobile Movers & Shakers for 2008.
3. Working of Bluetooth-
9
communication, and data transfer between two electrical
devices. Basically, a protocol is the "language" of devices.
10
Phone Server Computer
Printer
11
The signal is also capable of passing through the walls in your
home, making it useful for controlling several devices in
different rooms. Data can be transferred at a rate of up to one
Megabyte per second (Mbps). Also, because Bluetooth
transmitters require minimal amounts of power, they are
relatively inexpensive to manufacture. Simply put, Bluetooth
uses low-power radio waves to reliably communicate in an
inexpensive way.
12
3.3 How Bluetooth is used?
13
3.4 How Bluetooth Creates a Connection?
15
These two qualities of infrared are actually advantageous in
some regards. Because infrared transmitters and receivers
have to be lined up with each other, interference between
devices is uncommon. The one-to-one nature of infrared
communications is useful in that you can make sure a
message goes only to the intended recipient, even in a room
full of infrared receivers.
16
3.5 How B l u e t o o t h Operates?
18
When Bluetooth-capable devices come within range of one
another, an electronic conversation takes
place to determine whether they have data to sharor whether
one needs to control the other. The user doesn't have to press
a button or give a command -- the electronic conversation
happens automatically. Once the conversation has occurred,
the devices -- whether they're part of a computer system or a
stereo -- form a network. Bluetooth systems create a personal-
area network (PAN), or piconet, that may fill a room or may
encompass no more distance than that between the cell
phone on a belt-clip and the headset on your head. Once a
piconet is established, the members randomly hop
frequencies in unison so they stay in touch with one another
and avoid other piconets that may be operating in the same
room. Let's check out an example of a Bluetooth-connected
system.
4. Bluetooth Security
In any wireless networking setup, security is a concern.
Devices can easily grab radio waves out of the air, so people
who send sensitive information over a wireless connection
need to take precautions to make sure those signals aren't
intercepted. Bluetooth technology is no different -- it's wireless
and therefore susceptible to spying and remote access, just
like WiFi is susceptible if the network isn't secure. With
Bluetooth, though, the automatic nature of the connection,
which is a huge benefit in terms of time and effort, is also a
benefit to people looking to send you data without your
permission.
20
Still, early cell-phone virus writers have taken advantage of
Bluetooth's automated connection process to send out
infected files. However, since most cell phones use a secure
Bluetooth connection that requires authorization and
authentication before accepting data from an unknown device,
the infected file typically doesn't get very far. When the virus
arrives in the user's cell phone, the user has to agree to open
it and then agree to install it. This has, so far, stopped most
cell-phone viruses from doing much damage. See How to learn
more.
Other problems like "blue jacking," "blue bugging" and "Car
Whisperer" have turned up as Bluetooth-specific security
issues. Blue jacking involves Bluetooth users sending a
business card (just a text message, really) to other Bluetooth
users within a 10-meter (32-foot) radius. If the user doesn't
realize what the message is, he might allow the contact to be
added to his address book, and the contact can send him
messages that might be automatically opened because they're
coming from a known contact. Blue bugging is more of a
problem, because it allows hackers to remotely access a user's
phone and use its features, including placing calls and sending
text messages, and the user doesn't realize it's happening.
The Car Whisperer is a piece of software that allows hackers
to send audio to and receive audio from a Bluetooth-enabled
car stereo. Like a computer security hole, these vulnerabilities
are an inevitable result of technological innovation, and device
manufacturers are releasing firmware upgrades that address
new problems as they arise.
21
If communications security is a concern of yours, then click
here to learn how phone conferencing securityworks. To learn
more about Bluetooth security issues and solutions, see
Bluetooth.com: Wireless Security.
5. BLUETOOTH IN ACTION
22
printer and computer adapter programmed each device with
the same Bluetooth profiles.
23
Bluetooth device A will allow other Bluetooth devices to detect
its presence and attempt to establish a connection.
You may set your discover setting off if you like (It is
recommended that you turn it off when not using the
Bluetooth). When the discover setting is off, no other Bluetooth
device will be able to find it. Undiscoverable devices can still
communicate with each other but they have to initiate
communication themselves.
24
If both Passkeys
are the same, a
trusted pair is
formed. This will
happen
automatically.
Bluetooth device
A and B are now
paired and able to
exchange data
25
)
A & B (Paired
B (Passkey)
A (Passkey)
26
➢ Bluetooth devices in a piconet share a common
communication data channel. The channel has a total
capacity of 1 megabit per second (Mbps). Headers and
handshaking information consume about 20 percent of this
capacity.
➢ In the United States and Europe, the frequency range is
2,400 to 2,483.5 MHz, with 79 1-MHz radio frequency (RF)
channels. In practice, the range is 2,402 MHz to 2,480 MHz.
In Japan, the frequency range is 2,472 to 2,497 MHz with 23
1-MHz RF channels and in Nigeria, the frequency range is
that same as that of the US.
➢ A data channel hops randomly 1,600 times per second
between the 79 (or 23) RF channels.
➢ Each channel is divided into time slots 625 microseconds
long.
➢ A piconet has a master and up to seven slaves. The master
transmits in even time slots, slaves in odd time slots.
➢ Packets can be up to five time slots wide.
➢ Data in a packet can be up to 2,745 bits in length.
➢ There are currently two types of data transfer between
devices: SCO (synchronous connection oriented) and ACL
(asynchronous connectionless).
➢ In a piconet, there can be up to three SCO links of 64,000
bits per second each. To avoid timing and collision
27
problems, the SCO links use reserved slots set up by the
master.
➢ Masters can support up to three SCO links with one, two or
three slaves.
➢ Slots not reserved for SCO links can be used for ACL links.
➢ One master and slave can have a single ACL link.
➢ ACL is either point-to-point (master to one slave) or
broadcast to all the slaves.
➢ ACL slaves can only transmit when requested by the master.
Infrared Bluetooth
*Cradle * Personal Cable
replacement, replacement
Personal
Cable * Mid range wireless
replacement
Data Exchange and
Network Access
Typical
* Short range (Requires time to
usage
wireless discover other
point-n-shoot Bluetooth devices in
Data the vicinity. Also, user
Exchange needs to identify
and Network which device he/she
Access wishes to connect to.)
* 115Kbps &
Bandwidt
4 Mbps, * 1 Mbps, shared
h
dedicated
28
Effective
* 115Kbps & * 700 Kbps, worse
Bandwidt
4Mbps due to interference
h
Other RF devices,
Interferen
None building material,
ce
equipment
Very secure
due to short
range and
Less Secure.
line-of-sight.
Built-in link level
No link level
authentication. More
security
difficult for traffic
Security protection,
sniffing. Still requires
requires
application level
application
authentication and
level
encryption.
authenticatio
n and
encryption.
Low Very
long battery
life due to
low power
Power High
consumption
consumpti Consumes more
and does not
on power than IR.
have
maintain a
constant
connection
Supportin * PDA, * Very few has it
g Devices laptop, cell built-in, require
phone and external H/W card
ragged * Very few
handheld
have it built-
29
in
* 100s of
millions
devices
User has to be within
Real-time
Requires 10 meters of an
network
user to walk access point. The
access
up to an user may
applicatio
access point inadvertently walk
n out of range.
Steps
requires Initial setup (bonding)
Plug-n-play,
to with the access point
point-n-shoot
connect required
to LAN
Range 1 meter 10 meter
7. Application of Bluetooth:
31
32
33