Your SlideShare is downloading. ×
Upcoming SlideShare
Loading in...5

Thanks for flagging this SlideShare!

Oops! An error has occurred.


Saving this for later?

Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime - even offline.

Text the download link to your phone

Standard text messaging rates apply



Published on

Published in: Business, Technology

1 Comment
1 Like
No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

No notes for slide


  • 2. Agenda
    • Introduction to Bluetooth
    • Bluetooth Basics
    • Mode of operation
    • Technology
    • Security
    • Advantages
    • Integrating BT with .NET
  • 3. Is the Tooth really Blue?
    • The Henry Blatand story
    • The brand is a label that is not a single company technology but is shared by many members of the Bluetooth SIG
    • The SIG is composed of more than 8,000 member companies that are leaders in the telecommunications, computing, automotive, music, apparel, industrial automation, and network industries
    • Prominent members:
    • Nokia, Intel, Motorola, Microsoft, Lenovo, Toshiba
    • Installed base of over 500 million units at end of 2005
    • More details about Bluetooth SIG can be found on
  • 4. Some Blue examples
    • Bluetooth handsfree used in car
    • Transfer data from one device to another
    • Operating all electronic devices in your room with your mobile
    • Synchronize data on Mobile and Laptop without using any wires
  • 5. Bluetooth Basics
    • Bluetooth is a wireless communication technology that allows devices, within a 10-meter proximity, to communicate with each other
    • Simultaneously handle both data and voice transmissions
    • Each device can simultaneously communicate with 7 other devices
    • Enables devices to query other devices about the services they offer. If a device offers more than one service, the user can select the service they want to use from that particular device
    • Unlike infra-red, Bluetooth does not require line-of-sight positioning of connected units.
    • Networks are established dynamically and automatically
  • 6. Spectrum
    • ISM band used by Bluetooth is available from 2.40-2.4835 GHz
    • Uses frequency hopping, full-duplex signal at a nominal rate of 1600 hops/sec
    • Band is available and unlicensed in most nations
  • 7. Interference
    • Adaptive Frequency Hopping was designed to reduce interference between wireless technologies sharing the 2.4 GHz spectrum
    • providing users with greater performance even if using other technologies along with Bluetooth technology
    • The signal hops among 79 frequencies at 1 MHz intervals
    • Data Rate 1 Mbps for Version 1.2;
      • Up to 3 Mbps supported for Version 2.0 + EDR
    • Low power consumption of 2.5mW for upto 10m range
  • 8. FHSS
    • Uses Frequency Hopping Spread Spectrum (FHSS) techniques
    • Countries the radios hop in pseudo random sequences around all available channels, this equates to 79 RF channels with a channel spacing of 1 MHz
    • Starting at a base frequency of 2402 MHz then the frequency of the channels, f, can be expressed as:
    • f =2402 + n MHz
    • where, n, is the channel number with an integer value in the range of 0 to 78
    • FHSS implements Time Division Multiplexing
    • FHSS has 1600 hops/sec ie a hop every 625 µs.
    • Master transmit in slot 1 and slave in slot 2
  • 9. How the devices connect
    • Exist in small ad-hoc network configuration with the ability to operate as either master or the slave
    • Master provides the synchronization clock and the hopping sequence
    • Only one master allowed
    • Slaves cannot communicate directly
    • Mechanism to interchange role between slave and master
  • 10. Contd..
    • instant formation of networks
    • The configurations can be:
    • Single point: One master and one slave
    • Multipoint (Piconet): Up to 7 slaves clustered around a single Master
    • Scatternet: Group of Piconets effectively hubbed via a single Bluetooth device acting as a master in one Piconet and a slave in the other Piconet
  • 11. Connecting the BT Way!
    • Built in mechanism to inquire for devices, connect to them and once connected discover the services they possess in their database:
    • The master enters inquiry mode and sends out an inquiry to discover devices available to connect to.
    • Potential slaves make themselves discoverable by entering inquiry scan mode and listen for an inquiry from a master.
    • On receiving an inquiry, the slave responds to the master with information that is needed to create a connection to the device; this information includes its Bluetooth address and class of device.
    • The master collects this information from each device discovered. To connect to one of these devices the master goes into page mode and will page the device using the corresponding Bluetooth address.
    • The slave being paged by a master will need to be in page scan mode to be able to connect to a master
  • 12. Security
    • Modes of security for BT access:
      • Security Mode 1: non-secure Security Mode 2: service level enforced security Security Mode 3: link level enforced security
      • -Provides both device and service level security
      • -Concept of Trusted and Untrusted device
      • With respect to Services
      • Authorization and authentication
      • Only authentication
      • Open to all devices
  • 13. More on Security
    • Bluejacking
      • Send business card anonymously
      • No removal or alteration of data
      • User needs to react/accept first
    • Bluebugging
      • Access mobile phone commands without alerting the owner
      • Internet access,initiate calls, send and receive text messages
  • 14. Advantage BT
    • convenient, wire-free, short-range communication between devices
    • Bluetooth enabled products do not need to install driver software
    • low power
    • low cost
    • built-in security
    • ease-of-use
    • ad hoc networking abilities
  • 15. Questions!!