Sunteți pe pagina 1din 45

Dianne

Joy
Roll
no:13
Introduction

Operation
Requirements

Versions
Security

Applications
Introduction

Operation
Requirements

Versions
Security

Applications
Bluetooth is a universal radio interface in
2.4 GHz frequency band that enables
electronic devices to connect & communicate
wirelessly via short range (10-100) ad-hoc
n/ws.
Key Features
 Peak data rate

 Low power consumption

 Low cost

 Ability to simultaneously handle both voice &

data
 Line of sight not required.
 Invented in 1994 by L.M.Ericsson,
Sweden.
 Named after Harald Blaatand
“Bluetooth”, King of Denmark 940-981 AD.
 Currently Bluetooth trademark is owned
by the Bluetooth SIG, a consortium of
companies having stake in bluetooth.
 More than 1900 members today.
 Piconet is the fundamental form of
communication for Bluetooth Wireless
technology.
 Master & Slaves.

 The master Bluetooth device can

communicate with upto 7 devices.


 Data can be transferred b/w the master &

one other device.


 The master switches rapidly from device to

another in a round-robin fashion.


Piconet 1 Piconet 2
S SB S
P
P M M

S
S M-master
S S-Slave
P P P-Parked
SB-Standby

All devices in a piconet use the same frequency-


hopping pattern
 Two or more Piconets can be
connected together to form a
Scatternet.
 Some devices act as a bridge by

simultaneously playing the master role


& the slave role in one piconet.
 All devices in a piconet use the same

frequency-hopping pattern
Application

O
B TCP /IP AT
E Commands
PPP
X

RFCO MM TSC SDP

L2CAP

HCI

Audio Link Manager (LM)

Bas eb an d

Bluet ooth Radio


 Bluetooth specification consists of a
series of layers, implemented in h/w
& s/w:
Physical layer
Baseband

Link Manager Protocol(LMP)

Host controller

Logical Link Control and Adaptation


Protocol (L2CAP).
Application Protocol
 The only versions of MS Windows tat have
native support for BT are Windows XP
Service Pack 2 and later
 Previous versions require the users to install

their BT adapter’s own drivers (not directly


supported by MS)
 Mac OS X has supported BT since version

10.2 released in 2002.


 Linux provides 2 BT stacks with BlueZ

stack, Supporting all core BT protocols &


layers
 Wireless control of communication b/w a
cell phone & a hands-free headset
 Wireless n/wing b/w PCs in a confined

space
 Transfer of files b/w devices with OBEX

 For controls where IR was traditionally

used
 7th generation game consoles-Nintendo Wii

,Sony PlayStation3
Bluetooth 1.0 and 1.0B
Drawbacks:
 Difficultyin making it interoperable
 Had mandatory h/w device add
transmission
 Rendering anonymity impossible at
protocol level
 Many errors found in 1.0B were fixed
 Added support for non-encrypted

channels
 Received Signal Strength Indicator

(RSSI)
 Backward compatible with 1.1
 Faster connection and discovery

 Improved resistance to Radio

Frequency interference
 Higher transmission speeds

 Improved voice quality of audio links

by allowing retransmission of corrupted


pages
 Host Controller Interface support.
 Specified in November 2004
 Backward compatible with version 1.1

 Introduction of Enhanced Data Rate

(EDR) of 3.0 Mbits/s


 3 times faster transmission speed

 Lower power conception thru a reduced

duty cycle
 More available b/w

 Further improved performance


 Will be adopted by BT SIG once
interoperability testing has completed
 Extended inquiry response

 Encryption Pause Resume

 Secure Simple Pairing

 NFC(Near Field Communication)

Cooperation
 Broadcast channel
 Topology Management

 QoS (Quality of Service)


Since BT works with short-
range radio waves security is
one of the most important
concerns, as anyone in a
specific range has access to
your device.
 Illegally accessing info: on other
people’s computer systems without
destroying or disrupting data or
resources on n/w or CS’s.
 Simple broadcasting method to

complex algorithms.
Bluejacking :
 Sending Business cards anonymously.
 Most common & simplest form of phone-
hacking.
 Sounds harmless but can be nasty.

Tips to avoid bluejacking:


 Never add funny sounding message from

unknown sources to your contacts


 Set your BT phone on non-discoverable mode

when not in use.


Bluesnarfing
 Theft of info from a wireless device like access to
calendar, contact list etc.
 Advanced versions can even alter files.
 More dangerous
 Blooyer is a pgm used for bluesnarffing.

Tips:
 Be in non-discoverable mode
 Check if required firmware updates have been

installed.
Bluebugging

Accessing the phone commands without


alerting the phone’s user.

The hacker can


 Initiate phone calls
 Send & read SMS
 Read & write phone book contacts
 Eavesdrop on phone conversations
 Connect to internet
Bluesnipper
 Uses a gun-like high power antenna that
boosts the range of BT
 Can hack a device that is placed even a
mile away
 Cabir worm, released in 2004 can bluejack
nearby phones.
The pen has a digital sensor that can track
the movement over tiny dots printed on the
digital paper. Being Bluetooth enabled, this
pen can transmit what you are writing
directly to a computer or a cell phone and
either store it as a file or send it off as an
 Write a mail in your own handwriting and get
it transferred to your cell phone or PC
Has got an internal memory of 1MB

(approximately 40 pages of A4 size),


Enable to write up to approximately 2 hours

continuously.
38 grams
Since it all works digitally, you can add

colors and sketches to your notes


Key features
Natural use of pen and paper
Wireless connection to compatible

phones using BT tech:


Send your personalized note or drawing

Store your personal notes on a

compatible PC
runs on a polymer lithium ion battery,

with a 10-hour standby time.


The only drawback is that you need to

have a special paper on which to write on.


Nokia BT pen
BlueTooth Helmet
 Enable conversation while riding
 It is possible to adjust both the microphone as well as
ear piece for maximum comfort.
 The sound of the ring tone is extremely clear inside
the helmet
 Absolute voice clarity and no static is possible when
you are not moving.
 As the bike picks up speed an element of static does
get introduced but its not noticeable.
 The voice quality did not deteriorate and he found it
easy to keep talking.
 The headset does not support the A2DP specification
which would allow the user to listen to music.
 The earphone is meant for a single ear only
 The helmet comes in only one standard size, the
inside width of which is 12 centimeters. So if you are
slightly larger then average then you may find it
difficult to get your head into one
 The Bluetooth headset can be separated from the
helmet and be used without it as well
BlueTooth Jacket

Wearable Technology
Features
 Control panel to play music, answer calls
& check your caller id.
Stereo speakers that rock.
Built-in hands free mic plus concealed

jack for listening privacy.


Rechargeable pocket battery pack.
When it is time to clean the jacket just

remove the electronics.


Costs range from $600.
 At the center of the jacket is a control
panel located on the left-hand sleeve,
allowing for simple and easy access to
your incoming and outgoing calls, and
music selections.
 Connect a compatible Bluetooth-enabled
mobile phone to the panel wirelessly,
while hooking up your iPod player via
hidden, unobtrusive wires within the
jacket.
 Speakers and a microphone are located in
the hood for taking and making calls as
well as listening to music.
BT watch
 More than a watch.
 Second generation formal watch phone that comes
with handwritten touch screen and BT Music
 Beautifully designed and also has MP4 Video
functionality with 60 MB inbuilt memory
 this makes it looks giant
 The Bluetooth logo is clearly visible on the watch and
there is also a mini USB.
You can control the cell phone's music player
from the button on the watch.

S-ar putea să vă placă și