Published on

  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide


  1. 1. <ul><li>Etymology
  2. 2. Introduction
  3. 3. Bluetooth application
  4. 4. Bluetooth Vs Wi-Fi in networking
  5. 5. Specification and features
  6. 6. Bluetooth 1.0 and 1.0B
  7. 7. Bluetooth 1.1
  8. 8. Bluetooth 1.2
  9. 9. Bluetooth 2.0
  10. 10. Future of Bluetooth
  11. 11. Technical information
  12. 12. Communication and connection
  13. 13. Setting up Connection
  14. 14. Pairing
  15. 15. Air Interface
  16. 16. Security
  17. 17. Security Measures
  18. 18. Bluetooth Consortium
  19. 19. Conclusion</li></ul>INTRODUCTION<br /> Bluetooth is an industrial specification for wireless personal area networks (pans). Bluetooth provides a way to Connect and exchange information between devices such as Mobile phones, Laptops, PCs, Printers, digital cameras and Video games consoles via a secure, globally unlicensed short-range radio frequency.<br /> Bluetooth also simplifies the discovery and setup of Services. WI-FI is more analogous to the traditional Ethernet Network and requires configuration to setup shared resources, Transmit files, setup audio links (e.g. Headset and hands freeDevises). Whereas Bluetooth devise advertise all service that Much more accessible, without the need to worry about network address, permission and all the other consideration that go with typical networks. <br />ORIGIN OF BLUETOOTH<br />The system is named after a Danish king herald blatant, King of Denmark and Norway from 935 and 936 respectively, to940 Known for his unification of previously warning tribes for Denmark and Norway. Bluetooth likewise was intended to unify Different technology like computer and mobile phones. The Bluetooth logo merges the Nordic runs analogous the modern Latin H and B. the name may have been inspired less by the historical Herald than his loose interpretation of him in the long ships by Frame Gunnar Bentsen, a Swedish best-selling Viking-inspired novel.<br /> This logo is similar to an older logo for Beau knit Textiles a division of Beau nit Corporation. That logo, using the obvious connection of a reversed K and B for Beau knit, is wider and has rounded connection but is otherwise the same.<br />TYPICAL BLUETOOTH USP ADAPTER<br /> Bluetooth is a radio standard and communication protocol primarily designed for low power consumption, with a short range based around low-cost transceiver microchips in each devise.<br /> Bluetooth lets these devices communication with each other when they are in range. The devices use a radio communication system, so they do not have to be in line of sight of each other, and even be in other rooms, so long as the received transmission is powerful enough. <br />BLUETOOTH APPLICATION<br /><ul><li>Wireless control of communication between a cell phone and hands free or car kit. This is the most popular use.
  20. 20. Wireless networking between PCs in a confined space and where little bandwidth is required.
  21. 21. Wireless communication with Pc input and output devises.
  22. 22. Transfer of files between devices via OBEX
  23. 23. Replacement of traditional wired serial communication in test equipment, GPS receivers and medical equipments.
  24. 24. For remote controls where infrared was traditional used?
  25. 25. Sending small advertisement from Bluetooth enabled advertising hoarding to other.
  26. 26. Sending commands and software to the LEGO mind storms NXT instead of infrared.
  27. 27. Bluetooth Vs Wi-Fi in networking
  28. 28.
  29. 29. Bluetooth and Wi-Fi both have their places in today’s offices, homes and on the move setting up networks, printing, or transferring presentation and files from PDA’s computers.
  30. 30. Wi-Fi
  31. 31.
  32. 32. Wi-Fi uses the same radio frequencies as Bluetooth, but with higher power consumption resulting in a stronger connection. As mentioned earlier, Wi-Fi is sometimes called “wireless Ethernet”. Although this description is inaccurate, it provides an indication of Wi-Fi’s capabilities.
  33. 33. Wi-Fi is better suited for setting up networks as it enables a faster connection and has better security than Bluetooth. Wi-Fi is also become increasingly popular and widespread. It is a standard feature of most new laptop computers, and is a straight forward expansion to desktop computers not already Wi-Fi enabled. One method for comparing the efficiency of wireless transmission protocols such as Bluetooth and Wi-Fi is called spatial capacity.
  34. 34.
  36. 36. Bluetooth specification was first developed in 1994 by jape Haartsen, who was working for Ericsson Radio systems located in Emmen in the Netherland. The Bluetooth special Interest Group (SIG) formalized the specification. The Bluetooth special Interest Group formalized the specification.
  37. 37. The SIG was formally announced on May 20, 1998. Today it has over 6000 companies worldwide. It was established by Ericsson, Sony Ericsson, IBM, Intel, Toshiba and Nokia and later joined by many other companies as associate or adopter members.
  38. 38. Bluetooth Hardware Device Address (BD_ADDR) transmission in the handshaking process, rendering anonymity impossible at a protocol level, which was a major setback for services planned to be used in Bluetooth environment such as consumerium.
  39. 39. Adaptive frequency-hopping spread spectrum (AFH) which improves resistance to radio frequency interference by avoiding the use of crowded frequencies in the hopping sequence.
  40. 40. Higher transmission speed in practice.
  41. 41. Extended Synchronous connections (eSCO), which improves voice quality of audio links by allowing retransmission of corrupted packets.
  42. 42. Host controller Interface (HCI) support for 3-wire UART
  43. 43. HCI access to timing information for Bluetooth application.</li></ul>FUTURE OF BLUETOOTH<br />The next version of Bluetooth technology, currently code-named Lisbon, includes a number of features to increase security, usability and value of Bluetooth. The following features are defined:<br /><ul><li> Atomic Encryption change- allows encrypted links to change their encryption keys periodically, increasing security and also following role switches on an encrypted link.
  44. 44. Extended Enquiry Response- provides more information during the enquiry procedure to allow better filtering of devise before connection. This information includes the name of the device, and a list of services, with other information.
  45. 45. Sniff Sub rating – reducing the power consumption when devices are in the sniff low-power mode, especially on links with asymmetric data flows. Human Interface Devise (HID) is expected to benefit the most, with mouse and keyboard increasing the battery life from 3 to 10 times those currently used.
  46. 46. QoS Improvements – these will enable audio and video data to be transmitted at a higher quality, especially when best effort traffic is being transmitted in the same piconet.
  47. 47. Simple pairing – this improvement will radically improve the pairing experience for Bluetooth devices, while at the same time increasing the use and strength of security. It is expected that this feature will significantly increase the use of Bluetooth.</li></ul>TECHINICAL INFORMATION<br /><ul><li>Communication and Connection
  48. 48. A Bluetooth device playing the role of the “master” can communication with up to 7 devices playing the role of the
  49. 49. “Slave”. This network of “group of up to 8 devices” (1 master+ 7 slave) is called a piconet. A piconet is an adhoc computer network of devices using Bluetooth technology protocols to allow one master device to inter connection with up to 7 active slaves devices (because a three bit MAC address is used ). Up to 255 further slave devices can be inactive, or parked, which the master device can bring into active status at any time.
  50. 50. Setting up connection
  51. 51. Any Bluetooth device will transmit the following sets of information on demand:-
  52. 52. Device name
  53. 53. Device class
  54. 54. List of Services
  55. 55. Technical information e.g. device features, manufacture Bluetooth specification, clock offset</li></ul> <br />Anything may perform an enquiry to find other devices to which to connect, and any device can be configured to respond to such enquiries. However, if the device trying to connect knows the address of the device it will always respond to direct connection requests and will transmit the information shown in the list above if requested for it.<br />Use of the device’s services however may require pairing or its owner to accept but the connection itself can be started by any device and be held until it goes out of range. Some device can only be connected to one device at a time and connecting to them will prevent them from connecting to other devices and showing up in enquiries until they disconnected the other device.<br /> Every device has a unique 48-bit address. However, these addresses are generally not shown in enquiries and instead friendly “Bluetooth names” are used which can be set by the user, and will appear when another user scans for devices and in list of paired devices.<br />3. Pairing<br /> Pairs of devices may establish a trusted relationship between learning a shared secret known as “passkey”. A device that wants to communicate only with a trusted device can cryptographically authenticate the identity of the other device. Trusted device may also encrypt the data that they exchange over the air so that no one can listen. Pairs can be deleted at any time by either device. Some devices such as Sony Ericsson phones will usually accept OBEX business cards and notes without any pairing or prompts.<br /> 4. Air Interface The protocol operates in the license-free ISM at 2.45 GHz. Version 2.0 implementation feature Bluetooth Enhanced data rate(EDR), and thus reaches 2.1 Mb/Sec. Bluetooth differs from Wi-Fi in that the latter provides higher throughput and covers greater distance but requires more expensive hardware and higher power consumption. While Bluetooth is a cable replacement for a variety of application, Wi-Fi is a cable replacement only for a LAN access. However, this analogy is not accurate since unlike USB, Bluetooth does not require the presence of a host PC. Many USB Bluetooth adapter are available some of which also include an IrDA adapter.<br />5. Security Measures<br />Bluetooth uses the SAFER+algorithem for authentication and key generation. The EO stream cipher is used for encrypting packets. This makes eavesdropping on Bluetooth enabled devices more difficult.<br />6. BLUETOOTH CONSORTIUM<br /> In 1998, Ericsson, IBM, Intel, Motorola, Nokia and Toshiba formed the consortium among them and adapted the code name Bluetooth for their proposed open specification. In December 1999, 3Com, Lucent Technologies, Microsoft and Motorola jointed the initial founders as the promoter group. Since that time, lucent technologies transferred their membership to their spinoff Agree System and 3COkm has left the promoter group.<br />CONCLUSION<br />Bluetooth also simplified the discovery and setup of services. Wi-Fi is more analogous to the traditional Ethernet network and requires configuration to setup shared resources, transmit files, setup audio links, whereas Bluetooth device advertise all services they actually provide; this makes the utility of the service that much more accessible, without the need to worry about network addresses, permissions and all the other consideration that go with typical networks.<br />