SlideShare una empresa de Scribd logo
1 de 6
Descargar para leer sin conexión
Bluetooth
By
John Phillips
The art of connecting things is becoming more and more complex every day.
With the invention of Bluetooth technology, it is made to simplify the way people use
electronics in accordance to other electronics. The new innovation has given a solution
to give cable-free computer connections, which means real freedom to working
environment regardless of location and wire availability. The technology allows portable
computers, notebooks, mobile phones, personal digital assistant and other handy gadgets
to make use of "short range, low power" radio technology to connect to each other. With
this new invention, there is no doubt whether or not it will replace the inconsistency of
infrared, which is used for most television remotes, connections in the sense that there
does not need to be a line-of-sight connection to other devices. With Bluetooth it is
possible to be in another room and still be able to access another device with no use of
wires. The Bluetooth Special Interest Group, or SIG, is a group of companies working
together to promote and define the Bluetooth specifications. The Bluetooth SIG was
founded by five companies to develop the Bluetooth concept as a possible wireless
technology standard, which are Ericsson, Intel, IBM, Toshiba and Nokia. Other
companies like Microsoft, Lucent, 3Com and Motorola later joined the Bluetooth SIG.
Today there are more than 1,500 companies have joined this group and the specifications
are developed, published and promoted by the Bluetooth SIG. Bluetooth’s goals
expanded to include standardized wireless communications between any electrical
devices and created a notion of Personal Area Network.
The main competing technology against Bluetooth is infrared, which now is the
standard that most people use for wireless connections. Infrared is a “line of sight”
technology, meaning a direct connection is needed from the transmitter to the receiver.
Knowing this, it is very uncommon for people to have something that would interfere
with the direct connection to that receiver. Infrared communications are also a lot more
cost efficient and cost a lot less to install into devices. One of the main downsides to
infrared, however, is that it is a one-to-one technology, meaning that you can only send
data from one device to another, such as a personal digital assistant to a computer, but not
able to send data from a laptop to a computer.i
This is where Bluetooth comes into play,
because it allows numerous devices to communicate back and forth without needing a
line-of-sight connection.
The technology of Bluetooth centers around a 9mm x 9mm microchip, which
functions as a low cost and short range radio link (see picture below).ii
A Bluetooth
device consists of a radio unit, a link control unit, and a support unit, where the link
management takes place. The interface of a Bluetooth device consists of the Radio and
Baseband layer, and the Link Manager Protocol (LMP). The Radio is responsible for
transmitting data via radio waves over the air. The Baseband, which has both soft and
hardware, controls the radio and is responsible for lower level encryption. The Link
Manager Protocol is in charge of link setup, authentication, and link configuration. The
radio transceiver operates on the 2.4 GHz IM band which is defined as 2,400-2,483 MHz.
These radios use a spread spectrum, frequency hopping, and full-duplex signal at up to
1600 hops/sec. The signal hops among 79 frequencies at 1 MHz intervals to give a high
degree of interference immunity. Up to seven simultaneous connections can established
and maintained as seen in picture below.iii
For Bluetooth, information exchange happens
(http://www.palmone.com/us/wireless/bluetooth/) - above left
(http://www.sysopt.com/articles/bluetooth/) - above right
through packets on a channel, where each packet as a different hop frequency, provided
by the baseband to the radio. A combination of circuit switching and packet switching is
used, where slots are reserved for synchronous packets. The minimum number of
devices communicating is 2 units, which are referred to as a point-to-point connection.
Any more than 2 units are called a point-to-multipoint connection. Using two or more of
these units forms a personal-area network (PAN) or piconet with one master, which is the
controlling channel – the other units, 7 at maximum, are called slaves. In the picture
above, the PDA is serving as the master, and the other devices being the slaves. Two
types of links between the master and slaves are possible: the synchronous connection-
oriented link (SCO), being the point-to-point link, and the asynchronous connectionless
link (ACL), being the point-to-multipoint link. The Link Manager Protocol is
responsible for link setup, control, and security. If two devices fail to communicate with
each other, a common link key has to be initiated in order to transfer data. The process of
establishing links in order to transfer data at a future time is called a pairing. For
authentication, the verifier (either master or slave) sends a random number to the
claimant, which in turn calculates a response, including the secret key. Both devices
share the same secret key. If a slave is receiving and sending an authentication request at
once, it first accepts the incoming request by an authentication response and then starts its
own attempt. However, if a master is receiving and sending an authentication request at
once, it declines the incoming request first, while the slave is accepting the master's
request, and then the latter can restart another attempt.
(http://www.ietf.org/proceedings/00jul/SLIDES/ipobt-tech/sld016.htm)
Authentication takes place directly, when two devices communicated before, i.e.
if a link key has already been established.iv
For encryption, a temporary link key must
be issued from the master to the whole piconet, while every device as to agree on the use
of encryption, for example whether point-to-point or broadcasting packets should be
encrypted. Then, the master is configured to only receive encrypted packages after what
the slave is configured to transmit and receive encrypted packages.
There is much strength to this new Bluetooth technology; however, there are also
a few disadvantages. One of the main disadvantages is that Bluetooth operates on a
relatively small bandwidth of about 721kb, and has a maximum range of roughly 30ft.
There is also limited voice compatibility. The elimination of spaghetti cords is the main
advantage that most technical and non-technical can relate to. The problem with this is
that Infrared communication is already the standard, and even though it tends to be less
reliable, the average user might tend to be skeptical about accepting a new standard.
Bluetooth was originally created for the businessman on the go, therefore being a lot
more convenient for them rather than the average computer user. Security is also a
problem. Bluetooth's discovery protocol lets devices automatically find and start
interacting with each other, unintentionally exposing access and data to unauthorized
users. There is a huge chance that packets of data can be intercepted as information is
being transferred between devices. Network managers must plan for users toting around
instant access to their corporate networks wherever they travel. The narrow, point and
shoot, type of application, such as crowded situations in which two people wish to
exchange information while others are trying to do the same thing, is a strength of
Infrared. “In such situations, a Bluetooth device, which is omni directional, would be at a
disadvantage, as it might have trouble finding an individual device among many.”v
Bluetooth was designed to avoid conflict with other devices using spread-spectrum
frequency hopping. Bluetooth is compromised by a lack of standard feature performance.
“Because manufacturers have implemented certain Bluetooth capabilities differently,
devices of different brands often can't communicate with each other. This leads to a
number of problems, not the least of which is failure to negotiate spectrum use between
devices from different manufacturers.”vi
Another main advantage of Bluetooth is that
devices can establish connections through walls, and once that connection is established,
other devices do not have to be stationary. It is highly suitable for small devices such as
cordless phones, headsets for cell phones, etc.
There is a large market for Bluetooth technology. It will be compatible for all cell
phone and computer users. People will be able to virtually eliminate wired with the use
of this technology, for example using wireless keyboards, and mice in accordance to your
computer. “The [Acura] TL uses the technology in its patented HandsFreeLink phone
system that allows the Bluetooth-enabled cell phone to communicate wirelessly, securely
-- and flawlessly with the car from a maximum distance of 30 feet.”vii
Users will be able
to access data using a PDA, for example, from a laptop across the room without needing
a line-of-site connection. Many of the latest cellular phones are being equipped with this
Bluetooth technology, and will soon become the standard of wireless connection between
devices, and is the perfect innovation for the on the go consumer.
i
http://computer.howstuffworks.com/bluetooth2.htm
ii
Monson, Heidi, “Bluetooth technology and implications” System Optimization Information, December
14th, 1999 (date visited, December 2, 2003)
iii
http://www.bluetooth.com/dev/specifications.asp
iv
Bluetooth SIG, Specification of the Bluetooth system, Link Manager Protocol, Part C. Version 1.1,
March 20th
2003, http://www.bluetooth.com/.
v
http://www.sysopt.com/articles/bluetooth/index3.html
vi
Thurmond, Bob, “2001 Bluetooth Reigns?” Wall Street Technology Association, Ticker, June 6th
, 2001
vii
“All Around , A Sound System” The Washington Post, November 23rd
, 2003

Más contenido relacionado

La actualidad más candente

The latest development networks and communications (Microsoft Word)
The latest development networks and communications (Microsoft Word)The latest development networks and communications (Microsoft Word)
The latest development networks and communications (Microsoft Word)ainizbahari97
 
A Modern Study of Bluetooth Wireless Technology
A Modern Study of Bluetooth Wireless Technology A Modern Study of Bluetooth Wireless Technology
A Modern Study of Bluetooth Wireless Technology ijcseit
 
Bluetooth Wireless Technology
Bluetooth Wireless TechnologyBluetooth Wireless Technology
Bluetooth Wireless TechnologyAman Kumar Dutt
 
Ichci13 submission 104 (1)
Ichci13 submission 104 (1)Ichci13 submission 104 (1)
Ichci13 submission 104 (1)Saravana Kumar
 
Seminar on bluetooth
Seminar on bluetoothSeminar on bluetooth
Seminar on bluetoothhinduyuva
 
The latest development in network and communication
The latest development in network and communicationThe latest development in network and communication
The latest development in network and communicationMuhd Airil
 
Peer To Peer Content Sharing On Wi-Fi Network For Smart Phones
Peer To Peer Content Sharing On Wi-Fi Network For Smart PhonesPeer To Peer Content Sharing On Wi-Fi Network For Smart Phones
Peer To Peer Content Sharing On Wi-Fi Network For Smart PhonesIOSR Journals
 
V2 i10 ijertv2is100048
V2 i10 ijertv2is100048V2 i10 ijertv2is100048
V2 i10 ijertv2is100048Thaniga Vel
 
Review of Mobile Ad Hoc Network Protocols
Review of Mobile Ad Hoc Network ProtocolsReview of Mobile Ad Hoc Network Protocols
Review of Mobile Ad Hoc Network Protocolsiosrjce
 
Module - Function Hardware
Module - Function HardwareModule - Function Hardware
Module - Function HardwareAzam Jumberi
 
Siraj e commerce project
Siraj e commerce projectSiraj e commerce project
Siraj e commerce projectsirajislam7
 
A novel password based mutual authentication technique for 4 g mobile communi...
A novel password based mutual authentication technique for 4 g mobile communi...A novel password based mutual authentication technique for 4 g mobile communi...
A novel password based mutual authentication technique for 4 g mobile communi...eSAT Publishing House
 
System Support for Integrated Desktop Video Conferencing
System Support for Integrated Desktop Video ConferencingSystem Support for Integrated Desktop Video Conferencing
System Support for Integrated Desktop Video ConferencingVideoguy
 
Network design for_ip_convergence[1]
Network design for_ip_convergence[1]Network design for_ip_convergence[1]
Network design for_ip_convergence[1]Jaison
 

La actualidad más candente (19)

The latest development networks and communications (Microsoft Word)
The latest development networks and communications (Microsoft Word)The latest development networks and communications (Microsoft Word)
The latest development networks and communications (Microsoft Word)
 
IT WRITING SAMPLES PORTFOLIO
IT WRITING SAMPLES PORTFOLIOIT WRITING SAMPLES PORTFOLIO
IT WRITING SAMPLES PORTFOLIO
 
A Modern Study of Bluetooth Wireless Technology
A Modern Study of Bluetooth Wireless Technology A Modern Study of Bluetooth Wireless Technology
A Modern Study of Bluetooth Wireless Technology
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth Wireless Technology
Bluetooth Wireless TechnologyBluetooth Wireless Technology
Bluetooth Wireless Technology
 
Ichci13 submission 104 (1)
Ichci13 submission 104 (1)Ichci13 submission 104 (1)
Ichci13 submission 104 (1)
 
Seminar on bluetooth
Seminar on bluetoothSeminar on bluetooth
Seminar on bluetooth
 
The latest development in network and communication
The latest development in network and communicationThe latest development in network and communication
The latest development in network and communication
 
Peer To Peer Content Sharing On Wi-Fi Network For Smart Phones
Peer To Peer Content Sharing On Wi-Fi Network For Smart PhonesPeer To Peer Content Sharing On Wi-Fi Network For Smart Phones
Peer To Peer Content Sharing On Wi-Fi Network For Smart Phones
 
V2 i10 ijertv2is100048
V2 i10 ijertv2is100048V2 i10 ijertv2is100048
V2 i10 ijertv2is100048
 
Review of Mobile Ad Hoc Network Protocols
Review of Mobile Ad Hoc Network ProtocolsReview of Mobile Ad Hoc Network Protocols
Review of Mobile Ad Hoc Network Protocols
 
Bq4301381388
Bq4301381388Bq4301381388
Bq4301381388
 
Module - Function Hardware
Module - Function HardwareModule - Function Hardware
Module - Function Hardware
 
Modul ict bi
Modul ict biModul ict bi
Modul ict bi
 
Siraj e commerce project
Siraj e commerce projectSiraj e commerce project
Siraj e commerce project
 
A novel password based mutual authentication technique for 4 g mobile communi...
A novel password based mutual authentication technique for 4 g mobile communi...A novel password based mutual authentication technique for 4 g mobile communi...
A novel password based mutual authentication technique for 4 g mobile communi...
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
System Support for Integrated Desktop Video Conferencing
System Support for Integrated Desktop Video ConferencingSystem Support for Integrated Desktop Video Conferencing
System Support for Integrated Desktop Video Conferencing
 
Network design for_ip_convergence[1]
Network design for_ip_convergence[1]Network design for_ip_convergence[1]
Network design for_ip_convergence[1]
 

Destacado

Wisdom of February 10, 2010
Wisdom of February 10, 2010Wisdom of February 10, 2010
Wisdom of February 10, 2010guest133793
 
Best of dynami in Atlanta (What's New!)
Best of dynami in Atlanta (What's New!)Best of dynami in Atlanta (What's New!)
Best of dynami in Atlanta (What's New!)guestce8dd641
 
Bluetooth vs zigbee
Bluetooth vs zigbeeBluetooth vs zigbee
Bluetooth vs zigbeeaimenriyadh
 
Bluetooth applications
Bluetooth applicationsBluetooth applications
Bluetooth applicationsaimenriyadh
 

Destacado (7)

Wisdom of February 10, 2010
Wisdom of February 10, 2010Wisdom of February 10, 2010
Wisdom of February 10, 2010
 
Best of dynami in Atlanta (What's New!)
Best of dynami in Atlanta (What's New!)Best of dynami in Atlanta (What's New!)
Best of dynami in Atlanta (What's New!)
 
Jdm
JdmJdm
Jdm
 
Bluetooth (1)
Bluetooth (1)Bluetooth (1)
Bluetooth (1)
 
Mekanisme penetapan-kkm
Mekanisme penetapan-kkmMekanisme penetapan-kkm
Mekanisme penetapan-kkm
 
Bluetooth vs zigbee
Bluetooth vs zigbeeBluetooth vs zigbee
Bluetooth vs zigbee
 
Bluetooth applications
Bluetooth applicationsBluetooth applications
Bluetooth applications
 

Similar a Bluetooth

siddharth bt ppt.pptx
siddharth bt ppt.pptxsiddharth bt ppt.pptx
siddharth bt ppt.pptxHindujaBairi
 
Bluetooth paper presentation ieee
Bluetooth paper presentation ieee Bluetooth paper presentation ieee
Bluetooth paper presentation ieee Rohith Raj
 
Iaetsd bluetooth based smart sensor networks
Iaetsd bluetooth based smart sensor networksIaetsd bluetooth based smart sensor networks
Iaetsd bluetooth based smart sensor networksIaetsd Iaetsd
 
FINAL YEAR PROJECTS ABSTRACT ECE-Bluetooth attendance monitoring system
FINAL YEAR PROJECTS ABSTRACT ECE-Bluetooth attendance monitoring systemFINAL YEAR PROJECTS ABSTRACT ECE-Bluetooth attendance monitoring system
FINAL YEAR PROJECTS ABSTRACT ECE-Bluetooth attendance monitoring systemASHOKKUMAR RAMAR
 
Bluetooth technology_new.pptx
Bluetooth technology_new.pptxBluetooth technology_new.pptx
Bluetooth technology_new.pptxSumitSabale4
 
Introduction to Bluetooth technology
Introduction to Bluetooth technologyIntroduction to Bluetooth technology
Introduction to Bluetooth technologyDavid Livingston J
 
Understanding bluetooth
Understanding bluetoothUnderstanding bluetooth
Understanding bluetoothKumar
 
Understanding bluetooth
Understanding bluetoothUnderstanding bluetooth
Understanding bluetoothmadhu428
 
COMPUTER NETWORKING.pptx
COMPUTER NETWORKING.pptxCOMPUTER NETWORKING.pptx
COMPUTER NETWORKING.pptxvibhore jain
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technologymathan0071
 
3D bluetooth(VHGOHEL)
3D  bluetooth(VHGOHEL)3D  bluetooth(VHGOHEL)
3D bluetooth(VHGOHEL)Vishal Gohel
 
Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth TechnologyManish Sharma
 
Bluetooth network-security-seminar-report
Bluetooth network-security-seminar-reportBluetooth network-security-seminar-report
Bluetooth network-security-seminar-reportROHIT SAGAR
 

Similar a Bluetooth (20)

siddharth bt ppt.pptx
siddharth bt ppt.pptxsiddharth bt ppt.pptx
siddharth bt ppt.pptx
 
Arthi.pptx
Arthi.pptxArthi.pptx
Arthi.pptx
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth paper presentation ieee
Bluetooth paper presentation ieee Bluetooth paper presentation ieee
Bluetooth paper presentation ieee
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Iaetsd bluetooth based smart sensor networks
Iaetsd bluetooth based smart sensor networksIaetsd bluetooth based smart sensor networks
Iaetsd bluetooth based smart sensor networks
 
FINAL YEAR PROJECTS ABSTRACT ECE-Bluetooth attendance monitoring system
FINAL YEAR PROJECTS ABSTRACT ECE-Bluetooth attendance monitoring systemFINAL YEAR PROJECTS ABSTRACT ECE-Bluetooth attendance monitoring system
FINAL YEAR PROJECTS ABSTRACT ECE-Bluetooth attendance monitoring system
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth technology_new.pptx
Bluetooth technology_new.pptxBluetooth technology_new.pptx
Bluetooth technology_new.pptx
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
 
Introduction to Bluetooth technology
Introduction to Bluetooth technologyIntroduction to Bluetooth technology
Introduction to Bluetooth technology
 
Understanding bluetooth
Understanding bluetoothUnderstanding bluetooth
Understanding bluetooth
 
Understanding bluetooth
Understanding bluetoothUnderstanding bluetooth
Understanding bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
COMPUTER NETWORKING.pptx
COMPUTER NETWORKING.pptxCOMPUTER NETWORKING.pptx
COMPUTER NETWORKING.pptx
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
 
3D bluetooth(VHGOHEL)
3D  bluetooth(VHGOHEL)3D  bluetooth(VHGOHEL)
3D bluetooth(VHGOHEL)
 
Bluetooth ppt
Bluetooth pptBluetooth ppt
Bluetooth ppt
 
Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth Technology
 
Bluetooth network-security-seminar-report
Bluetooth network-security-seminar-reportBluetooth network-security-seminar-report
Bluetooth network-security-seminar-report
 

Último

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 

Último (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

Bluetooth

  • 1. Bluetooth By John Phillips The art of connecting things is becoming more and more complex every day. With the invention of Bluetooth technology, it is made to simplify the way people use electronics in accordance to other electronics. The new innovation has given a solution to give cable-free computer connections, which means real freedom to working environment regardless of location and wire availability. The technology allows portable computers, notebooks, mobile phones, personal digital assistant and other handy gadgets to make use of "short range, low power" radio technology to connect to each other. With this new invention, there is no doubt whether or not it will replace the inconsistency of infrared, which is used for most television remotes, connections in the sense that there does not need to be a line-of-sight connection to other devices. With Bluetooth it is possible to be in another room and still be able to access another device with no use of wires. The Bluetooth Special Interest Group, or SIG, is a group of companies working together to promote and define the Bluetooth specifications. The Bluetooth SIG was founded by five companies to develop the Bluetooth concept as a possible wireless technology standard, which are Ericsson, Intel, IBM, Toshiba and Nokia. Other companies like Microsoft, Lucent, 3Com and Motorola later joined the Bluetooth SIG. Today there are more than 1,500 companies have joined this group and the specifications are developed, published and promoted by the Bluetooth SIG. Bluetooth’s goals
  • 2. expanded to include standardized wireless communications between any electrical devices and created a notion of Personal Area Network. The main competing technology against Bluetooth is infrared, which now is the standard that most people use for wireless connections. Infrared is a “line of sight” technology, meaning a direct connection is needed from the transmitter to the receiver. Knowing this, it is very uncommon for people to have something that would interfere with the direct connection to that receiver. Infrared communications are also a lot more cost efficient and cost a lot less to install into devices. One of the main downsides to infrared, however, is that it is a one-to-one technology, meaning that you can only send data from one device to another, such as a personal digital assistant to a computer, but not able to send data from a laptop to a computer.i This is where Bluetooth comes into play, because it allows numerous devices to communicate back and forth without needing a line-of-sight connection. The technology of Bluetooth centers around a 9mm x 9mm microchip, which functions as a low cost and short range radio link (see picture below).ii A Bluetooth device consists of a radio unit, a link control unit, and a support unit, where the link management takes place. The interface of a Bluetooth device consists of the Radio and Baseband layer, and the Link Manager Protocol (LMP). The Radio is responsible for transmitting data via radio waves over the air. The Baseband, which has both soft and hardware, controls the radio and is responsible for lower level encryption. The Link Manager Protocol is in charge of link setup, authentication, and link configuration. The radio transceiver operates on the 2.4 GHz IM band which is defined as 2,400-2,483 MHz. These radios use a spread spectrum, frequency hopping, and full-duplex signal at up to
  • 3. 1600 hops/sec. The signal hops among 79 frequencies at 1 MHz intervals to give a high degree of interference immunity. Up to seven simultaneous connections can established and maintained as seen in picture below.iii For Bluetooth, information exchange happens (http://www.palmone.com/us/wireless/bluetooth/) - above left (http://www.sysopt.com/articles/bluetooth/) - above right through packets on a channel, where each packet as a different hop frequency, provided by the baseband to the radio. A combination of circuit switching and packet switching is used, where slots are reserved for synchronous packets. The minimum number of devices communicating is 2 units, which are referred to as a point-to-point connection. Any more than 2 units are called a point-to-multipoint connection. Using two or more of these units forms a personal-area network (PAN) or piconet with one master, which is the controlling channel – the other units, 7 at maximum, are called slaves. In the picture above, the PDA is serving as the master, and the other devices being the slaves. Two types of links between the master and slaves are possible: the synchronous connection- oriented link (SCO), being the point-to-point link, and the asynchronous connectionless link (ACL), being the point-to-multipoint link. The Link Manager Protocol is responsible for link setup, control, and security. If two devices fail to communicate with
  • 4. each other, a common link key has to be initiated in order to transfer data. The process of establishing links in order to transfer data at a future time is called a pairing. For authentication, the verifier (either master or slave) sends a random number to the claimant, which in turn calculates a response, including the secret key. Both devices share the same secret key. If a slave is receiving and sending an authentication request at once, it first accepts the incoming request by an authentication response and then starts its own attempt. However, if a master is receiving and sending an authentication request at once, it declines the incoming request first, while the slave is accepting the master's request, and then the latter can restart another attempt. (http://www.ietf.org/proceedings/00jul/SLIDES/ipobt-tech/sld016.htm) Authentication takes place directly, when two devices communicated before, i.e. if a link key has already been established.iv For encryption, a temporary link key must be issued from the master to the whole piconet, while every device as to agree on the use
  • 5. of encryption, for example whether point-to-point or broadcasting packets should be encrypted. Then, the master is configured to only receive encrypted packages after what the slave is configured to transmit and receive encrypted packages. There is much strength to this new Bluetooth technology; however, there are also a few disadvantages. One of the main disadvantages is that Bluetooth operates on a relatively small bandwidth of about 721kb, and has a maximum range of roughly 30ft. There is also limited voice compatibility. The elimination of spaghetti cords is the main advantage that most technical and non-technical can relate to. The problem with this is that Infrared communication is already the standard, and even though it tends to be less reliable, the average user might tend to be skeptical about accepting a new standard. Bluetooth was originally created for the businessman on the go, therefore being a lot more convenient for them rather than the average computer user. Security is also a problem. Bluetooth's discovery protocol lets devices automatically find and start interacting with each other, unintentionally exposing access and data to unauthorized users. There is a huge chance that packets of data can be intercepted as information is being transferred between devices. Network managers must plan for users toting around instant access to their corporate networks wherever they travel. The narrow, point and shoot, type of application, such as crowded situations in which two people wish to exchange information while others are trying to do the same thing, is a strength of Infrared. “In such situations, a Bluetooth device, which is omni directional, would be at a disadvantage, as it might have trouble finding an individual device among many.”v Bluetooth was designed to avoid conflict with other devices using spread-spectrum frequency hopping. Bluetooth is compromised by a lack of standard feature performance.
  • 6. “Because manufacturers have implemented certain Bluetooth capabilities differently, devices of different brands often can't communicate with each other. This leads to a number of problems, not the least of which is failure to negotiate spectrum use between devices from different manufacturers.”vi Another main advantage of Bluetooth is that devices can establish connections through walls, and once that connection is established, other devices do not have to be stationary. It is highly suitable for small devices such as cordless phones, headsets for cell phones, etc. There is a large market for Bluetooth technology. It will be compatible for all cell phone and computer users. People will be able to virtually eliminate wired with the use of this technology, for example using wireless keyboards, and mice in accordance to your computer. “The [Acura] TL uses the technology in its patented HandsFreeLink phone system that allows the Bluetooth-enabled cell phone to communicate wirelessly, securely -- and flawlessly with the car from a maximum distance of 30 feet.”vii Users will be able to access data using a PDA, for example, from a laptop across the room without needing a line-of-site connection. Many of the latest cellular phones are being equipped with this Bluetooth technology, and will soon become the standard of wireless connection between devices, and is the perfect innovation for the on the go consumer. i http://computer.howstuffworks.com/bluetooth2.htm ii Monson, Heidi, “Bluetooth technology and implications” System Optimization Information, December 14th, 1999 (date visited, December 2, 2003) iii http://www.bluetooth.com/dev/specifications.asp iv Bluetooth SIG, Specification of the Bluetooth system, Link Manager Protocol, Part C. Version 1.1, March 20th 2003, http://www.bluetooth.com/. v http://www.sysopt.com/articles/bluetooth/index3.html vi Thurmond, Bob, “2001 Bluetooth Reigns?” Wall Street Technology Association, Ticker, June 6th , 2001 vii “All Around , A Sound System” The Washington Post, November 23rd , 2003