SlideShare una empresa de Scribd logo
1 de 32
BLUETOOTH TECHOLOGY
Contents ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Introduction
Introduction ,[object Object],[object Object],[object Object],[object Object],[object Object]
Bluetooth Communication
History ,[object Object],[object Object],[object Object],[object Object]
Bluetooth Devices ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Technology Review
Technology Review ,[object Object],[object Object],[object Object],[object Object]
Classes Of Bluetooth
Piconets ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Scatternets ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Scatternets(contd)
Bluetooth Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Bluetooth Attacks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Bluetooth Protocols ,[object Object],[object Object]
Bluetooth Protocols ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Bluetooth Protocols ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Bluetooth Protocols ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Bluetooth Profiles ,[object Object],[object Object],[object Object]
Bluetooth Profiles(contd..)
Bluetooth Profiles(contd..) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object]
Bluetooth vs Other Wireless Technologies
Bluetooth Technology ,[object Object]
Pros n Cons ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Pros n Cons(contd..) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Future Of Bluetooth
Future Of Bluetooth ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Conclusion ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
References ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object]

Más contenido relacionado

La actualidad más candente

Bluetooth Technology -- detailed explanation
Bluetooth Technology -- detailed explanation Bluetooth Technology -- detailed explanation
Bluetooth Technology -- detailed explanation
Siva Pradeep Bolisetti
 
Bluetooth Basic Version
Bluetooth Basic VersionBluetooth Basic Version
Bluetooth Basic Version
Ayesha Saeed
 

La actualidad más candente (20)

Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth Technology -- detailed explanation
Bluetooth Technology -- detailed explanation Bluetooth Technology -- detailed explanation
Bluetooth Technology -- detailed explanation
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth presentation
Bluetooth presentationBluetooth presentation
Bluetooth presentation
 
Bluetooth technology by polite group
Bluetooth technology by polite groupBluetooth technology by polite group
Bluetooth technology by polite group
 
The Bluetooth technology
The Bluetooth technologyThe Bluetooth technology
The Bluetooth technology
 
Bluetooth Presentation
Bluetooth PresentationBluetooth Presentation
Bluetooth Presentation
 
Bluetooth Technology & Security
Bluetooth Technology & SecurityBluetooth Technology & Security
Bluetooth Technology & Security
 
Bluetooth low energy
Bluetooth low energyBluetooth low energy
Bluetooth low energy
 
Blue1
Blue1Blue1
Blue1
 
bluetooth-security
bluetooth-securitybluetooth-security
bluetooth-security
 
Wi fi
Wi fiWi fi
Wi fi
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
 
Bluetooth Basic Version
Bluetooth Basic VersionBluetooth Basic Version
Bluetooth Basic Version
 
Bluetooth- A wireless technology
Bluetooth- A wireless technologyBluetooth- A wireless technology
Bluetooth- A wireless technology
 
Bluetooth security
Bluetooth securityBluetooth security
Bluetooth security
 
Bluetooth ppt
Bluetooth pptBluetooth ppt
Bluetooth ppt
 
Bluetooth PPT Report
Bluetooth PPT ReportBluetooth PPT Report
Bluetooth PPT Report
 

Destacado

Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth Technology
Manish Sharma
 
R K 2 Bluetooth Technologies
R K 2  Bluetooth  TechnologiesR K 2  Bluetooth  Technologies
R K 2 Bluetooth Technologies
Saurav Kumar
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
mathan0071
 
Bluetooth Presentation
Bluetooth PresentationBluetooth Presentation
Bluetooth Presentation
wayn
 

Destacado (19)

Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth Technology
 
Bluetooth technology presentation
Bluetooth technology presentationBluetooth technology presentation
Bluetooth technology presentation
 
Bluetooth Slides
Bluetooth SlidesBluetooth Slides
Bluetooth Slides
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
R K 2 Bluetooth Technologies
R K 2  Bluetooth  TechnologiesR K 2  Bluetooth  Technologies
R K 2 Bluetooth Technologies
 
Bluetooth Technology By Volkan Sevindik
Bluetooth Technology By Volkan SevindikBluetooth Technology By Volkan Sevindik
Bluetooth Technology By Volkan Sevindik
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
 
Ieee project reversible logic gates by_amit
Ieee project reversible logic gates  by_amitIeee project reversible logic gates  by_amit
Ieee project reversible logic gates by_amit
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
 
Bluetooth and profiles on WEC7
Bluetooth and profiles on WEC7Bluetooth and profiles on WEC7
Bluetooth and profiles on WEC7
 
Bluetooth smart technology(description about all versions)
Bluetooth smart technology(description about all versions)Bluetooth smart technology(description about all versions)
Bluetooth smart technology(description about all versions)
 
Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth Technology
 
Bluetooth.ppt
Bluetooth.pptBluetooth.ppt
Bluetooth.ppt
 
An Introduction to BLUETOOTH TECHNOLOGY
An Introduction to BLUETOOTH TECHNOLOGYAn Introduction to BLUETOOTH TECHNOLOGY
An Introduction to BLUETOOTH TECHNOLOGY
 
Electronic Notice Board Using Raspberry Pi and Android Phone
Electronic Notice Board Using Raspberry Pi and Android PhoneElectronic Notice Board Using Raspberry Pi and Android Phone
Electronic Notice Board Using Raspberry Pi and Android Phone
 
Blue Tooth Technoloty
Blue Tooth TechnolotyBlue Tooth Technoloty
Blue Tooth Technoloty
 
Bluetooth Presentation
Bluetooth PresentationBluetooth Presentation
Bluetooth Presentation
 
Logic gates - AND, OR, NOT, NOR, NAND, XOR, XNOR Gates.
Logic gates - AND, OR, NOT, NOR, NAND, XOR, XNOR Gates.Logic gates - AND, OR, NOT, NOR, NAND, XOR, XNOR Gates.
Logic gates - AND, OR, NOT, NOR, NAND, XOR, XNOR Gates.
 

Similar a Bluetooth

Wireless & Mobile Lecture # 20
Wireless & Mobile Lecture # 20Wireless & Mobile Lecture # 20
Wireless & Mobile Lecture # 20
Bit Hacker
 
Introduction to bluetooth
Introduction to bluetoothIntroduction to bluetooth
Introduction to bluetooth
vish0110
 
Protocols in Bluetooth
Protocols in BluetoothProtocols in Bluetooth
Protocols in Bluetooth
Sonali Parab
 
Bluetooth Intro
Bluetooth IntroBluetooth Intro
Bluetooth Intro
amit_monty
 

Similar a Bluetooth (20)

Bluetooth.pptx
Bluetooth.pptxBluetooth.pptx
Bluetooth.pptx
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
 
IT WRITING SAMPLES PORTFOLIO
IT WRITING SAMPLES PORTFOLIOIT WRITING SAMPLES PORTFOLIO
IT WRITING SAMPLES PORTFOLIO
 
Wireless & Mobile Lecture # 20
Wireless & Mobile Lecture # 20Wireless & Mobile Lecture # 20
Wireless & Mobile Lecture # 20
 
Bluetooth, RFID and WiMAX Technologies
Bluetooth, RFID and WiMAX TechnologiesBluetooth, RFID and WiMAX Technologies
Bluetooth, RFID and WiMAX Technologies
 
Teknologi Bluetooth
Teknologi BluetoothTeknologi Bluetooth
Teknologi Bluetooth
 
Introduction to bluetooth
Introduction to bluetoothIntroduction to bluetooth
Introduction to bluetooth
 
Protocols in Bluetooth
Protocols in BluetoothProtocols in Bluetooth
Protocols in Bluetooth
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth Intro
Bluetooth IntroBluetooth Intro
Bluetooth Intro
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Blutooth technology
Blutooth technologyBlutooth technology
Blutooth technology
 
Bluetooth Details.ppt
Bluetooth Details.pptBluetooth Details.ppt
Bluetooth Details.ppt
 
Bluetooth versus wi
Bluetooth versus wiBluetooth versus wi
Bluetooth versus wi
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth
Bluetooth Bluetooth
Bluetooth
 
Seminar
SeminarSeminar
Seminar
 
Overview of Bluetooth technology
Overview of Bluetooth technologyOverview of Bluetooth technology
Overview of Bluetooth technology
 
Khetarpal
KhetarpalKhetarpal
Khetarpal
 

Último

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Último (20)

[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 

Bluetooth

Notas del editor

  1. First we move towards the introduction
  2. RS232 data cables
  3. FHSS Chops up the data being sent and transmits chunks of it on up to 79 frequencies. 1600 hops/sec- time slot is defined as 625 microseconds Packet 1-5 time slots long FHSS is used to minimize the risk of such interference with systems operating on this Band such as microwave ovens, baby monitors and 802.11 wireless networks. GFSK When we jump from (1,-1 or -1,1), mod waveform changes rapidly, introducing large out of bound spectrum.(no overshoot to a step function input ) Uses Gaussian filter (uses G.Function) to limit its spectral width. GFSK = Baseband pulses(-1,1)  gaussian filter  FSK modulator FSK = Baseband pulses(-1,1)  FSK modulator 1Mb/s with overhead, this effectively becomes 721 kbps. SIG 5 companies joined to form the Bluetooth Special Interest Group (SIG) in 1998. First specification released in July 1999
  4. Most powerful devices Infrared IrDA (WPAN) : synchronization, link between a phone and a laptop… – Less flexible than Bluetooth, need of a line of site – Comparable data rate Wi-Fi (WLAN) : Wireless LAN access – Far higher bandwidth and data rate than Bluetooth – Higher power consumption than Bluetooth – Requires infrastructure investment
  5. The slaves in a piconet can only have links to the master. Slaves cannot directly transmit data to one another
  6. Devices that participate in two or more piconets may act as gateways, forwarding traffic from one piconet to another Bluetooth units can only transmit and receive data in one piconet at a time. As devices in mulltiple piconets divide their time between the piconets, spending some time slots in one and some time slots in another on TDM basis. Devices give notification of inactivation to master that it will be inactive for a predetermined length of time. The device will then have to re-synchronize its clock with its other master. When a slave becomes inactive in a piconet, communications between masters and the other active slaves go on as normal. On the other hand, when a master becomes inactive in its piconet, the slaves will have to wait for it to be active again before communication can resume.
  7. Protection can be provided by using large pass key which makes computation to find link key more difficult. Best way(100% secure) is to make transfers in an environment that is eavesdropper free Authentication Encryption FHSS
  8. 1. SNARF ATTACK In Some Bluetooth devices , it is possible to connect to the device without making owner aware of the request and can be used in illegal mobile cloning. entire phonebook, calendar, realtime clock, business card, properties, change log are accessible but other services, such as modems or Internet, WAP and GPRS gateways may be accessed without the owner's knowledge or consent 2. BACKDOOR After creating a trusted relationship, the attacker removes his device name from paired devices register. If owner is monitoring exactly at the time connection is established, they're unable to notice anything unusual entire device can be "backed up" to an attacker's own system 3. BLUEJACKING Blue jacking supports transfer of anonymous messages in public places. Name field = 248 bits. The pairing protocol displays name of the requestor. This name can be used to convey a message to other mobiles. The problem lies in the fact that the protocol being abused is designed for information exchange. The ability to interface with other devices and exchange, update and synchronise data, is the raison d'e^tre of bluetooth. The bluejacking technique is using the first part of a process that allows that exchange to take place, and is therefore open to further abuse if the handshake completes and the "bluejacker" successfully pairs with the target device
  9. The Bluetooth protocols contain the standard procedures for connections and data exchange between Bluetooth devices.
  10. The radio layer describes the physical characteristics a Bluetooth device’s receiver-transmitter component must have. These include modulation characteristics, radio frequency tolerance, and sensitivity level.
  11. See ACL links
  12. See ACL links OBEX The Object Exchange Protocol (OBEX) is a specification for object data exchange over infrared (IR) links. Examples for using OBEX include exchanging business cards and synchronizing calendar applications.
  13. Following the profiles procedure supports compatibility Developers can be sure that the applications they create will work with any device that conforms to the Bluetooth specification Profiles are organized into a hierarchy of groups With each group depending upon the features provided by its predecessor.
  14. GAP GAP defines a consistent means to establish a baseband link between Bluetooth devices. GAP additionally defines: Which features must be implemented in all Bluetooth devices Generic procedures for discovering and linking to devices Basic user-interface terminology Human Interface Device (HID) Profile Describes how to communicate with a HID class device using a Bluetooth link. Serial Port Profile Serial port profile D efines RS-232 serial-cable emulation for Bluetooth devices and uses RFCOMM protocol for that. Dial-up Networking Profile The dial-up networking (DUN) profile is built on the serial port profile and describes how a data-terminal device can use a gateway device(mobile phone/modem) to access a telephone-based network Headset Profile Describes how a Bluetooth-enabled headset should communicate with a computer or other Bluetooth device Hardcopy cable replacement profile The hardcopy cable replacement profile (HCRP)describes how to send rendered data over a Bluetooth link to a device, such as a printer. GOBEX Profile • The generic object exchange profile provides a generic blueprint for other profiles using the OBEX protocol and defines the client and server roles for devices. Object Push Profile • The object push profile defines the roles of push server and push client. These roles are analogous to and must interoperate with the server and client device roles the generic object exchange profile defines. The object push profile focuses on a narrow range of object formats for maximum interoperability. The most common of the acceptable formats is the vCard format. File Transfer Protocol It provides guidelines for applications that need to exchange objects such as files and folders, Synchronization Profile It describes how applications can perform data synchronization, such as between a personal data assistant (PDA) and a computer.
  15. Infrared IrDA (WPAN) : synchronization, link between a phone and a laptop… – Less flexible than Bluetooth, need of a line of site – Comparable data rate Wi-Fi (WLAN) : Wireless LAN access – Far higher bandwidth and data rate than Bluetooth – Higher power consumption than Bluetooth – Requires infrastructure investment
  16. Standardized protocol supports interoperability of devices of different types.
  17. Interference with other devices that use the same frequency such as baby monitors, microwave over etc. FHSS is used to avoid it.
  18. Many companies are designing and researching impressive bluetooth applications in demand so this shows it has a bright future and it would be difficult for other technology to overcome.
  19. ACL links and SCO links Inquires who’s there Paging creates a link in piconet Expanding a piconet by excessive pages