SlideShare una empresa de Scribd logo
1 de 29
 
Introduction to Bluetooth Technology
Bluetooth is a radio frequency specification for short range, point to point and point to multi point voice and data transfer. In spite of facilitating the replacement of cables, Bluetooth technology works as an universal medium to bridge the existing data networks, a peripheral interface for existing devices and provide a mechanism to form short ad hok network of connected devices away from fixed network infrastructures.
Why it’s name is Bluetooth?
Bluetooth was named for the 10th Century Viking king , Harald Blatand (A.K.A., Bluetooth) who peacefully united all the tiny island kingdoms of Denmark, southern Sweden, and southern Norway into one country . In keeping with its namesake, Bluetooth, the new low-cost radio technology, is designed to unite or connect all different types of devices to effectively work as one.
How Bluetooth Technology Work ?
The technology of Bluetooth centers around a 9mm x 9mm microchip, which functions as a low cost and short range radio link. Bluetooth Technology provide a 10 meter personal bubble that support simultaneous transmission of both voice and data for multiple devices. Up to 8 devices can be connected in a piconet, and up to 10 piconets can exist within the 10 meter bubble. Each piconet support up to 3 simultaneous full duplex voice devices. Bluetooth wireless technology is designed to be as secure as a wire with up to 128-bit public/private key authentication, and streaming cipher up to 64 bit based on a5 security
Transmission types and rates  : The baseband (single channel per line) protocol combines circuit and packet switching. To assure that packets do not arrive out of order, slots (up to five) can be reserved for synchronous packets. As noted earlier, a different hop signal is used for each packet. Circuit switching can be either asynchronous or synchronous. Up to three synchronous (voice) data channels, or one synchronous and one asynchronous data channel, can be supported on one channel. Each synchronous channel can support a 64 Kb/s transfer rate, which is fully adequate for voice transmissions. An asynchronous channel can transmit as much as 721 Kb/s in one direction and 57.6 Kb/s in the opposite direction. It is also possible for an asynchronous connection to support 432.6 Kb/s in both directions if the link is symmetric.
Data Transmission Data Transmission synchronous Asynchronous Voice Data
Network Arrangement Scatternet Piconet A Piconet B 1 2 3 4 1 2
Error correction and security
Error correction Types :- ,[object Object],[object Object],Security Provided Three Ways :- ,[object Object],[object Object],[object Object]
Connection Protocol
Bluetooth connections are established via the following techniques:  1.Standby 2.Page/Inquiry 3.Active: 4.Hold 5.Sniff 6.Park
USAGE MODEL
Bluetooth Model is  Used voice/data access points peripheral interconnects Personal Area Networking (PAN).
Voice/Data Access Point Voice/data access points is one of the key initial usage models and involves connecting a computing device to a communicating device via a secure wireless link
Peripheral Interconnects  The second category of uses,  peripheral interconnects , involves connecting other devices together
Personal Area Networking: The last usage model,  Personal Area Networking (PAN ), focuses on the ad-hoc formation and breakdown of personal networks
Bluetooth Characteristics
[object Object],[object Object],[object Object],[object Object],[object Object]
COMPETING TECHNOLOGIES
ADVANTAGES OF BLUETOOTH TECHNOLOGY
[object Object],[object Object],[object Object],[object Object]
APPLICATIONS
[object Object],[object Object],[object Object],[object Object]
References : 1. The official Bluetooth site, http:/www.bluetooth.com 2.  http://www.intel.com/mobile/bluetooth
Thank You
? Any Question ?

Más contenido relacionado

La actualidad más candente (20)

Bluetooth
BluetoothBluetooth
Bluetooth
 
Wireless Communication ppt
Wireless Communication pptWireless Communication ppt
Wireless Communication ppt
 
Wireless communication
Wireless communicationWireless communication
Wireless communication
 
Wi-max Technology PPT
Wi-max Technology PPTWi-max Technology PPT
Wi-max Technology PPT
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth Technology -- detailed explanation
Bluetooth Technology -- detailed explanation Bluetooth Technology -- detailed explanation
Bluetooth Technology -- detailed explanation
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Wireless network
Wireless networkWireless network
Wireless network
 
wireless usb ppt
wireless usb pptwireless usb ppt
wireless usb ppt
 
SMART DUST
SMART DUSTSMART DUST
SMART DUST
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Wi-Fi Technology
Wi-Fi TechnologyWi-Fi Technology
Wi-Fi Technology
 
Bluetooth.ppt
Bluetooth.pptBluetooth.ppt
Bluetooth.ppt
 
Bluetooth ppt
Bluetooth pptBluetooth ppt
Bluetooth ppt
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Ad-Hoc Networks
Ad-Hoc NetworksAd-Hoc Networks
Ad-Hoc Networks
 
Bluetooth Presentation
Bluetooth PresentationBluetooth Presentation
Bluetooth Presentation
 
6G Technology
6G Technology6G Technology
6G Technology
 
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gInternet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
 
Powerpoint presentation on 5G wireless technology
Powerpoint presentation on 5G wireless technologyPowerpoint presentation on 5G wireless technology
Powerpoint presentation on 5G wireless technology
 

Destacado

Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9koolkampus
 
Mobile Network Layer
Mobile Network LayerMobile Network Layer
Mobile Network LayerRahul Hada
 
Wireless network ppt
Wireless network pptWireless network ppt
Wireless network pptBasil John
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesSayed Chhattan Shah
 
Bluetooth based smart sensor devices 2
Bluetooth based smart sensor devices 2Bluetooth based smart sensor devices 2
Bluetooth based smart sensor devices 2Vijay Kribpz
 
Lecture 10 intruders
Lecture 10 intrudersLecture 10 intruders
Lecture 10 intrudersrajakhurram
 
Bluetooth Controlled Robot/Car
Bluetooth Controlled Robot/CarBluetooth Controlled Robot/Car
Bluetooth Controlled Robot/CarVarun A M
 
20130719 Robot Car controlled by Android Phone
20130719 Robot Car controlled by Android Phone20130719 Robot Car controlled by Android Phone
20130719 Robot Car controlled by Android PhoneKenichi Ohwada
 
Android controlled robot
Android controlled robotAndroid controlled robot
Android controlled robotBen Johnke
 
Bluetooth Controlled Robot
Bluetooth Controlled RobotBluetooth Controlled Robot
Bluetooth Controlled RobotPankaj Rai
 
Car speed control using bluetooth
Car speed control using bluetoothCar speed control using bluetooth
Car speed control using bluetoothNagendra Reddy
 
Bluetooth Module HC-06
Bluetooth Module HC-06Bluetooth Module HC-06
Bluetooth Module HC-06Raghav Shetty
 
PPT on Bluetooth Based Wireless Sensor Networks
PPT on Bluetooth Based Wireless Sensor NetworksPPT on Bluetooth Based Wireless Sensor Networks
PPT on Bluetooth Based Wireless Sensor NetworksSiya Agarwal
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)Parvesh Taneja
 
Wired and wireless technologies
Wired and  wireless  technologiesWired and  wireless  technologies
Wired and wireless technologiesAkhil Sabu
 
Wireless technology
Wireless technologyWireless technology
Wireless technologyFatma Ala'a
 

Destacado (19)

Network security and viruses
Network security and virusesNetwork security and viruses
Network security and viruses
 
Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9
 
Mobile Network Layer
Mobile Network LayerMobile Network Layer
Mobile Network Layer
 
Wireless network ppt
Wireless network pptWireless network ppt
Wireless network ppt
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
 
Bluetooth based smart sensor devices 2
Bluetooth based smart sensor devices 2Bluetooth based smart sensor devices 2
Bluetooth based smart sensor devices 2
 
Lecture 10 intruders
Lecture 10 intrudersLecture 10 intruders
Lecture 10 intruders
 
Bluetooth Controlled Robot/Car
Bluetooth Controlled Robot/CarBluetooth Controlled Robot/Car
Bluetooth Controlled Robot/Car
 
20130719 Robot Car controlled by Android Phone
20130719 Robot Car controlled by Android Phone20130719 Robot Car controlled by Android Phone
20130719 Robot Car controlled by Android Phone
 
Android controlled robot
Android controlled robotAndroid controlled robot
Android controlled robot
 
Bluetooth Controlled Robot
Bluetooth Controlled RobotBluetooth Controlled Robot
Bluetooth Controlled Robot
 
Car speed control using bluetooth
Car speed control using bluetoothCar speed control using bluetooth
Car speed control using bluetooth
 
Antenna
AntennaAntenna
Antenna
 
Bluetooth Module HC-06
Bluetooth Module HC-06Bluetooth Module HC-06
Bluetooth Module HC-06
 
Bluetooth Module
Bluetooth ModuleBluetooth Module
Bluetooth Module
 
PPT on Bluetooth Based Wireless Sensor Networks
PPT on Bluetooth Based Wireless Sensor NetworksPPT on Bluetooth Based Wireless Sensor Networks
PPT on Bluetooth Based Wireless Sensor Networks
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)
 
Wired and wireless technologies
Wired and  wireless  technologiesWired and  wireless  technologies
Wired and wireless technologies
 
Wireless technology
Wireless technologyWireless technology
Wireless technology
 

Similar a Introduction to Bluetooth Tech: A 40-char guide

New advancement in technology - bluetooth technology
New advancement in technology - bluetooth technology New advancement in technology - bluetooth technology
New advancement in technology - bluetooth technology JOMY JOHNSON
 
Bluetooth Technology and its uses by Prince Rohan
Bluetooth Technology and its uses by Prince RohanBluetooth Technology and its uses by Prince Rohan
Bluetooth Technology and its uses by Prince RohanRohan Das
 
BluetoothPPT.pdf
BluetoothPPT.pdfBluetoothPPT.pdf
BluetoothPPT.pdfPpupu
 
Bluetooth paper presentation ieee
Bluetooth paper presentation ieee Bluetooth paper presentation ieee
Bluetooth paper presentation ieee Rohith Raj
 
Bluetooth Details.ppt
Bluetooth Details.pptBluetooth Details.ppt
Bluetooth Details.pptVignesh kumar
 
Bluetooth Technology Todays Advanced Wireless Communication System
Bluetooth Technology Todays Advanced Wireless Communication SystemBluetooth Technology Todays Advanced Wireless Communication System
Bluetooth Technology Todays Advanced Wireless Communication SystemEdgefxkits & Solutions
 
Bluetooth Technology Paper Presentation
Bluetooth Technology Paper PresentationBluetooth Technology Paper Presentation
Bluetooth Technology Paper Presentationguestac67362
 
Overview of Bluetooth technology
Overview of Bluetooth technologyOverview of Bluetooth technology
Overview of Bluetooth technologySuman Bhattacharyya
 
Bluetooth, RFID and WiMAX Technologies
Bluetooth, RFID and WiMAX TechnologiesBluetooth, RFID and WiMAX Technologies
Bluetooth, RFID and WiMAX TechnologiesMukesh Chinta
 
Bluetooth Technology By Volkan Sevindik
Bluetooth Technology By Volkan SevindikBluetooth Technology By Volkan Sevindik
Bluetooth Technology By Volkan Sevindikvsevindik
 

Similar a Introduction to Bluetooth Tech: A 40-char guide (20)

New advancement in technology - bluetooth technology
New advancement in technology - bluetooth technology New advancement in technology - bluetooth technology
New advancement in technology - bluetooth technology
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth Technology and its uses by Prince Rohan
Bluetooth Technology and its uses by Prince RohanBluetooth Technology and its uses by Prince Rohan
Bluetooth Technology and its uses by Prince Rohan
 
BluetoothPPT.pdf
BluetoothPPT.pdfBluetoothPPT.pdf
BluetoothPPT.pdf
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth paper presentation ieee
Bluetooth paper presentation ieee Bluetooth paper presentation ieee
Bluetooth paper presentation ieee
 
Bluetooth.pptx
Bluetooth.pptxBluetooth.pptx
Bluetooth.pptx
 
Bluetooth Details.ppt
Bluetooth Details.pptBluetooth Details.ppt
Bluetooth Details.ppt
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
 
Bluetooth Technology Todays Advanced Wireless Communication System
Bluetooth Technology Todays Advanced Wireless Communication SystemBluetooth Technology Todays Advanced Wireless Communication System
Bluetooth Technology Todays Advanced Wireless Communication System
 
Bluetooth Technology Paper Presentation
Bluetooth Technology Paper PresentationBluetooth Technology Paper Presentation
Bluetooth Technology Paper Presentation
 
Overview of Bluetooth technology
Overview of Bluetooth technologyOverview of Bluetooth technology
Overview of Bluetooth technology
 
MC Module 4.docx
MC Module 4.docxMC Module 4.docx
MC Module 4.docx
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth.ppt
Bluetooth.pptBluetooth.ppt
Bluetooth.ppt
 
BLUETOOTH _TECHNOLOGY
BLUETOOTH _TECHNOLOGYBLUETOOTH _TECHNOLOGY
BLUETOOTH _TECHNOLOGY
 
IoT Network Technologies
IoT Network TechnologiesIoT Network Technologies
IoT Network Technologies
 
Bluetooth, RFID and WiMAX Technologies
Bluetooth, RFID and WiMAX TechnologiesBluetooth, RFID and WiMAX Technologies
Bluetooth, RFID and WiMAX Technologies
 
Bluetooth Technology By Volkan Sevindik
Bluetooth Technology By Volkan SevindikBluetooth Technology By Volkan Sevindik
Bluetooth Technology By Volkan Sevindik
 

Último

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 

Último (20)

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 

Introduction to Bluetooth Tech: A 40-char guide

  • 1.  
  • 3. Bluetooth is a radio frequency specification for short range, point to point and point to multi point voice and data transfer. In spite of facilitating the replacement of cables, Bluetooth technology works as an universal medium to bridge the existing data networks, a peripheral interface for existing devices and provide a mechanism to form short ad hok network of connected devices away from fixed network infrastructures.
  • 4. Why it’s name is Bluetooth?
  • 5. Bluetooth was named for the 10th Century Viking king , Harald Blatand (A.K.A., Bluetooth) who peacefully united all the tiny island kingdoms of Denmark, southern Sweden, and southern Norway into one country . In keeping with its namesake, Bluetooth, the new low-cost radio technology, is designed to unite or connect all different types of devices to effectively work as one.
  • 7. The technology of Bluetooth centers around a 9mm x 9mm microchip, which functions as a low cost and short range radio link. Bluetooth Technology provide a 10 meter personal bubble that support simultaneous transmission of both voice and data for multiple devices. Up to 8 devices can be connected in a piconet, and up to 10 piconets can exist within the 10 meter bubble. Each piconet support up to 3 simultaneous full duplex voice devices. Bluetooth wireless technology is designed to be as secure as a wire with up to 128-bit public/private key authentication, and streaming cipher up to 64 bit based on a5 security
  • 8. Transmission types and rates : The baseband (single channel per line) protocol combines circuit and packet switching. To assure that packets do not arrive out of order, slots (up to five) can be reserved for synchronous packets. As noted earlier, a different hop signal is used for each packet. Circuit switching can be either asynchronous or synchronous. Up to three synchronous (voice) data channels, or one synchronous and one asynchronous data channel, can be supported on one channel. Each synchronous channel can support a 64 Kb/s transfer rate, which is fully adequate for voice transmissions. An asynchronous channel can transmit as much as 721 Kb/s in one direction and 57.6 Kb/s in the opposite direction. It is also possible for an asynchronous connection to support 432.6 Kb/s in both directions if the link is symmetric.
  • 9. Data Transmission Data Transmission synchronous Asynchronous Voice Data
  • 10. Network Arrangement Scatternet Piconet A Piconet B 1 2 3 4 1 2
  • 12.
  • 14. Bluetooth connections are established via the following techniques: 1.Standby 2.Page/Inquiry 3.Active: 4.Hold 5.Sniff 6.Park
  • 16. Bluetooth Model is Used voice/data access points peripheral interconnects Personal Area Networking (PAN).
  • 17. Voice/Data Access Point Voice/data access points is one of the key initial usage models and involves connecting a computing device to a communicating device via a secure wireless link
  • 18. Peripheral Interconnects The second category of uses, peripheral interconnects , involves connecting other devices together
  • 19. Personal Area Networking: The last usage model, Personal Area Networking (PAN ), focuses on the ad-hoc formation and breakdown of personal networks
  • 21.
  • 24.
  • 26.
  • 27. References : 1. The official Bluetooth site, http:/www.bluetooth.com 2. http://www.intel.com/mobile/bluetooth