SlideShare a Scribd company logo
1 of 20
Bluetooth
Swapnil Bangera
Mobile & Wireless Communication
ME-EXTC
Contents
• Introduction
• Various Terms in Bluetooth
• Classes of Bluetooth
• Network Establishment in Bluetooth
• Modes of Operation
• Security Features of Bluetooth
• Bluetooth Security Levels
• Applications
• Advantages
• Disadvantages
• Conclusion
Introduction
• Bluetooth is a short-range and low power wireless technology originally
developed for exchanging data over short distances from fixed and mobile
devices, creating personal area networks (PANs).
• It is named after Harald Blaatand.
• The name was adopted as a tribute to the tenth-century Viking Harald Blaatand
who peacefully united Denmark and Norway. Harald liked to eat blueberries,
which gave his teeth the coloration that lead to the nickname "Bluetooth.“
• Short-range radio frequency technology that operates at 2.4 GHz on an
unlicensed Industrial Scientific Medical (ISM) band. It is based on IEEE 802.15.1
standard.
• Effective range of Bluetooth devices is 10 meters.
• It was originally conceived as a wireless alternative to data cables.
Terms used in Bluetooth
• Piconet
• Scatternet
• Master unit
• Slave units
• MAC address
• Parked units
• Sniff and hold mode
Bluetooth Classes
Bluetooth devices are classified according to three different power classes, as
shown in the following table.
Class Maximum Permitted
Power (mW)
Range (m)
Class 1 100 100
Class 2 2.5 10
Class 3 1 1
Network Establishment in Bluetooth
• STANDBY mode
• Before any connection in a piconet is created, all devices are in STANDBY mode.
• In this mode, an unconnected unit periodically listens for messages every 1.28 seconds.
It listens the messages on a set of 32 hop frequencies defined for that unit. The device
is said to be wake-up when it listens to messages. When it does not listen to messages,
it is said to be in sleep.
• PAGE mode
• The connection procedure is initiated by any one of the device, which then becomes
master. A connection in made by PAGE message if the address is known.
• The master sends a train of 16 identical page messages on 16 different hop frequencies
defined for a device to be paged (slave).
• If no response is received, the master transmits a train on remaining 16 hop
frequencies in wake-up sequence i.e. when the slave listens on messages in STANDBY
mode.
• Maximum delay before master reaches is twice the wake-up period (2.56s) while
average delay is half the wake up period (0.64s).
• INQUIRY mode
• A connection is made by the master by an INQUIRY message followed by a subsequent
PAGE message if the address is unknown.
• The INQUIRY message is typically used for finding devices like public printers, fax
machines, and similar devices with unknown address.
• The INQUIRY message is similar to PAGE message, but may require one additional train
period to collect all responses.
Modes of Operation
SNIFF, HOLD and PARK modes are the three power saving modes of operation for
Bluetooth devices which are connected to a piconet. These modes are used when
no data is to be transmitted.
• SNIFF mode:
• The slave device listens to the piconet in this mode, but at a reduced rate. Thus
reducing its duty.
• The SNIFF interval is programmable and depends on application.
• HOLD mode:
• The master unit can put a slave unit into HOLD mode or a slave unit can demand to ne
put into HOLD mode.
• Data transfer restarts instantly when units transition out of HOLD mode.
• The HOLD is used when connecting several piconets or managing a low power device
such as temperature sensor.
• PARK mode:
• The device is still synchronized to the piconet but does not participate in traffic.
• PARKED devices have given up their MAC address and occasionally listen to the traffic
of the master to resynchronize and check on broadcast messages.
In the increasing order of power efficiency, the SNIFF mode has higher duty cycle,
followed by HOLD mode with a lower duty cycle, and PARK mode, with lowest duty
cycle.
Bluetooth Security Features
Bluetooth security supports authentication and encryption. Authentication verifies
who is at the other end of the link. Encryption ensures confidentiality of data. Even
if a third party hacks the data, it is in encrypted form and not in original form.
1. Pairing: When two devices communicate for the first time, there is a pairing
procedure. In this procedure, a secret key is generated. This key is shared by
both the devices. It is stored in each device. When the devices want to
communicate in future, there is no pairing procedure.
2. Security modes:
1. Non-secure: A device will not initiate any security procedure.
2. Service level enforced security: A device does not initiate security procedures before
channel establishment.
3. Link level enforced security: A device initiates security procedures before link set up
is completed
Bluetooth Security Levels
There are two kinds of security levels i.e. authentication & authorization
• Types of services: Different services have different service requirements. Some
services require authentication and authorization. Some services require only
authentication and not authorization. Some services don’t require both
authentication and authorization.
• Authentication: Authentication is performed after determining the type of
service. It cannot be performed when link is established. It is performed only
when connection request to service is submitted. It can be performed in both
directions : client authenticates server & vice versa.
• Authentication procedure
• Connection request to L2CAP is sent.
• L2CAP requests access from security manager.
• Security manager enquires the service database.
• Security manager enquires the device database.
• If necessary, security manager enforces the authentication and encryption procedure.
• The security manager grants access and L2CAP continues to set up the connection.
• Authorization:
Some services require manual authorization of the device after authentication only then,
these services can be accessed. This leads to the concept of trust. There are two kinds of
device trust levels:
• Trusted device: It has fixed relationship and unrestricted access to all services.
• Untrusted device: This device has been previously authenticated, a link key is stored,
but the device is not marked as trusted in device database.
• An unknown device is also an untrusted device. No security information is available for
this device.
Applications
• Replacing serial cables with radio links.
• Wearable networks/WPANs
• Desktop/room wireless networking
• Hot-spot wireless networking
• Medical: Transfer of measured values from training units to analytical systems,
patient monitoring
• Automotive: Remote control of audio/video equipment, hands-free telephony
• Point-of-sale payments: Payments by mobile phone
Advantages:
 Wireless
 Inexpensive
 Automatic
 Interoperability
 Low interference and energy consumption.
 Share voice and data
 Instant PAN
 Upgradeable
 Long lasting technology.
 Easy link establishment
Disadvantages
 Data rate and security
 More susceptible to Interception and attack
 Less range
 Average Speed
 Short Life
Conclusion
A global standard for data and voice
• Eliminates Cables.
• Low Power, Low range, Low Cost network devices.
• Bluetooth seems to have a bright future after reviewing its benefits and wide
use.
• Further improvements are planned to be made in
• Data Rates
• Power Reduction
• Range
THANK YOU!
Presented By
Swapnil Bangera
ME-EXTC

More Related Content

What's hot (20)

5G MOBILE TECHNOLOGY PPT
5G MOBILE TECHNOLOGY PPT5G MOBILE TECHNOLOGY PPT
5G MOBILE TECHNOLOGY PPT
 
Mobile communication
Mobile communicationMobile communication
Mobile communication
 
5G Technology
5G Technology 5G Technology
5G Technology
 
Wireless communication dr. s. swapna kumar
Wireless communication  dr. s. swapna kumarWireless communication  dr. s. swapna kumar
Wireless communication dr. s. swapna kumar
 
5G Technology PPT
5G Technology PPT 5G Technology PPT
5G Technology PPT
 
Wireless technology from 0G to 7.5G
Wireless technology from 0G to 7.5GWireless technology from 0G to 7.5G
Wireless technology from 0G to 7.5G
 
Presentation on 1G/2G/3G/4G/5G/Cellular & Wireless Technologies
Presentation on 1G/2G/3G/4G/5G/Cellular & Wireless TechnologiesPresentation on 1G/2G/3G/4G/5G/Cellular & Wireless Technologies
Presentation on 1G/2G/3G/4G/5G/Cellular & Wireless Technologies
 
6G Technology
6G Technology6G Technology
6G Technology
 
Zigbee
ZigbeeZigbee
Zigbee
 
5G wireless technology
5G wireless technology5G wireless technology
5G wireless technology
 
5g technology ppt
5g technology ppt5g technology ppt
5g technology ppt
 
4G wireless Network
4G wireless Network4G wireless Network
4G wireless Network
 
INTRODUCTION TO WIRELESS COMMUNICATION
INTRODUCTION TO WIRELESS COMMUNICATIONINTRODUCTION TO WIRELESS COMMUNICATION
INTRODUCTION TO WIRELESS COMMUNICATION
 
5G Presentation
5G Presentation5G Presentation
5G Presentation
 
Zig Bee
Zig BeeZig Bee
Zig Bee
 
Generations of wireless technologies
Generations of wireless technologiesGenerations of wireless technologies
Generations of wireless technologies
 
Network automation
Network automationNetwork automation
Network automation
 
Wireless Technologies and Standards
Wireless Technologies and StandardsWireless Technologies and Standards
Wireless Technologies and Standards
 
Analysis of 1G, 2G, 3G & 4G
Analysis of 1G, 2G, 3G & 4GAnalysis of 1G, 2G, 3G & 4G
Analysis of 1G, 2G, 3G & 4G
 
Mm wave
Mm waveMm wave
Mm wave
 

Similar to Bluetooth

Bluetooth Technology & Security
Bluetooth Technology & SecurityBluetooth Technology & Security
Bluetooth Technology & SecurityHimangshu Hazra
 
BluetoothSecurity.ppt
BluetoothSecurity.pptBluetoothSecurity.ppt
BluetoothSecurity.pptssuser1d7ef1
 
bluetooth-security
bluetooth-securitybluetooth-security
bluetooth-securityAnand Dhana
 
Internet of Things Protocol - Session 2
Internet of Things Protocol - Session 2Internet of Things Protocol - Session 2
Internet of Things Protocol - Session 2NEEVEE Technologies
 
Bluetoothppt
BluetoothpptBluetoothppt
Bluetoothpptsasidhar
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementationajeet singh
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementationajeet singh
 
internet network for o level
 internet network for o level  internet network for o level
internet network for o level Samit Singh
 
Wireless Body Area network
Wireless Body Area networkWireless Body Area network
Wireless Body Area networkRajeev N
 
Networking and internetworking devices
Networking and internetworking devicesNetworking and internetworking devices
Networking and internetworking devicesRaveena kumari
 
Bluetooth technology by shamshad
Bluetooth technology by shamshadBluetooth technology by shamshad
Bluetooth technology by shamshad1122334411223344
 
Bluetooth basic
Bluetooth basicBluetooth basic
Bluetooth basicEngr Sid
 
Bluetooth Basic Version
Bluetooth Basic VersionBluetooth Basic Version
Bluetooth Basic VersionAyesha Saeed
 
17.security level of services
17.security level of services17.security level of services
17.security level of servicesPramod Rathore
 
Wireless Network security
Wireless Network securityWireless Network security
Wireless Network securityFathima Rahaman
 

Similar to Bluetooth (20)

Bluetooth Technology & Security
Bluetooth Technology & SecurityBluetooth Technology & Security
Bluetooth Technology & Security
 
BluetoothSecurity.ppt
BluetoothSecurity.pptBluetoothSecurity.ppt
BluetoothSecurity.ppt
 
BluetoothSecurity.ppt
BluetoothSecurity.pptBluetoothSecurity.ppt
BluetoothSecurity.ppt
 
bluetooth-security
bluetooth-securitybluetooth-security
bluetooth-security
 
Internet of Things Protocol - Session 2
Internet of Things Protocol - Session 2Internet of Things Protocol - Session 2
Internet of Things Protocol - Session 2
 
Bluetoothppt
BluetoothpptBluetoothppt
Bluetoothppt
 
Network devices
Network devicesNetwork devices
Network devices
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
 
internet network for o level
 internet network for o level  internet network for o level
internet network for o level
 
Wireless Body Area network
Wireless Body Area networkWireless Body Area network
Wireless Body Area network
 
Wireless personal area networks(PAN)
Wireless personal area networks(PAN)Wireless personal area networks(PAN)
Wireless personal area networks(PAN)
 
Networking and internetworking devices
Networking and internetworking devicesNetworking and internetworking devices
Networking and internetworking devices
 
Bluetooth technology by shamshad
Bluetooth technology by shamshadBluetooth technology by shamshad
Bluetooth technology by shamshad
 
Bluetooth basic
Bluetooth basicBluetooth basic
Bluetooth basic
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth Basic Version
Bluetooth Basic VersionBluetooth Basic Version
Bluetooth Basic Version
 
17.security level of services
17.security level of services17.security level of services
17.security level of services
 
Wireless Network security
Wireless Network securityWireless Network security
Wireless Network security
 
unit-3.pptx
unit-3.pptxunit-3.pptx
unit-3.pptx
 

More from Swapnil Bangera

Schelkunoff Polynomial Method for Antenna Synthesis
Schelkunoff Polynomial Method for Antenna SynthesisSchelkunoff Polynomial Method for Antenna Synthesis
Schelkunoff Polynomial Method for Antenna SynthesisSwapnil Bangera
 
Signature verification in biometrics
Signature verification in biometricsSignature verification in biometrics
Signature verification in biometricsSwapnil Bangera
 

More from Swapnil Bangera (6)

Steganography
SteganographySteganography
Steganography
 
Shorting post
Shorting postShorting post
Shorting post
 
Schelkunoff Polynomial Method for Antenna Synthesis
Schelkunoff Polynomial Method for Antenna SynthesisSchelkunoff Polynomial Method for Antenna Synthesis
Schelkunoff Polynomial Method for Antenna Synthesis
 
Signature verification in biometrics
Signature verification in biometricsSignature verification in biometrics
Signature verification in biometrics
 
Fading & Doppler Effect
Fading & Doppler EffectFading & Doppler Effect
Fading & Doppler Effect
 
Satellite installation
Satellite installationSatellite installation
Satellite installation
 

Recently uploaded

Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 

Recently uploaded (20)

Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 

Bluetooth

  • 1. Bluetooth Swapnil Bangera Mobile & Wireless Communication ME-EXTC
  • 2. Contents • Introduction • Various Terms in Bluetooth • Classes of Bluetooth • Network Establishment in Bluetooth • Modes of Operation • Security Features of Bluetooth • Bluetooth Security Levels • Applications • Advantages • Disadvantages • Conclusion
  • 3. Introduction • Bluetooth is a short-range and low power wireless technology originally developed for exchanging data over short distances from fixed and mobile devices, creating personal area networks (PANs). • It is named after Harald Blaatand. • The name was adopted as a tribute to the tenth-century Viking Harald Blaatand who peacefully united Denmark and Norway. Harald liked to eat blueberries, which gave his teeth the coloration that lead to the nickname "Bluetooth.“ • Short-range radio frequency technology that operates at 2.4 GHz on an unlicensed Industrial Scientific Medical (ISM) band. It is based on IEEE 802.15.1 standard. • Effective range of Bluetooth devices is 10 meters. • It was originally conceived as a wireless alternative to data cables.
  • 4. Terms used in Bluetooth • Piconet • Scatternet • Master unit • Slave units • MAC address • Parked units • Sniff and hold mode
  • 5. Bluetooth Classes Bluetooth devices are classified according to three different power classes, as shown in the following table. Class Maximum Permitted Power (mW) Range (m) Class 1 100 100 Class 2 2.5 10 Class 3 1 1
  • 6. Network Establishment in Bluetooth • STANDBY mode • Before any connection in a piconet is created, all devices are in STANDBY mode. • In this mode, an unconnected unit periodically listens for messages every 1.28 seconds. It listens the messages on a set of 32 hop frequencies defined for that unit. The device is said to be wake-up when it listens to messages. When it does not listen to messages, it is said to be in sleep. • PAGE mode • The connection procedure is initiated by any one of the device, which then becomes master. A connection in made by PAGE message if the address is known. • The master sends a train of 16 identical page messages on 16 different hop frequencies defined for a device to be paged (slave). • If no response is received, the master transmits a train on remaining 16 hop frequencies in wake-up sequence i.e. when the slave listens on messages in STANDBY mode. • Maximum delay before master reaches is twice the wake-up period (2.56s) while average delay is half the wake up period (0.64s).
  • 7. • INQUIRY mode • A connection is made by the master by an INQUIRY message followed by a subsequent PAGE message if the address is unknown. • The INQUIRY message is typically used for finding devices like public printers, fax machines, and similar devices with unknown address. • The INQUIRY message is similar to PAGE message, but may require one additional train period to collect all responses.
  • 8.
  • 9. Modes of Operation SNIFF, HOLD and PARK modes are the three power saving modes of operation for Bluetooth devices which are connected to a piconet. These modes are used when no data is to be transmitted. • SNIFF mode: • The slave device listens to the piconet in this mode, but at a reduced rate. Thus reducing its duty. • The SNIFF interval is programmable and depends on application. • HOLD mode: • The master unit can put a slave unit into HOLD mode or a slave unit can demand to ne put into HOLD mode. • Data transfer restarts instantly when units transition out of HOLD mode. • The HOLD is used when connecting several piconets or managing a low power device such as temperature sensor.
  • 10. • PARK mode: • The device is still synchronized to the piconet but does not participate in traffic. • PARKED devices have given up their MAC address and occasionally listen to the traffic of the master to resynchronize and check on broadcast messages. In the increasing order of power efficiency, the SNIFF mode has higher duty cycle, followed by HOLD mode with a lower duty cycle, and PARK mode, with lowest duty cycle.
  • 11. Bluetooth Security Features Bluetooth security supports authentication and encryption. Authentication verifies who is at the other end of the link. Encryption ensures confidentiality of data. Even if a third party hacks the data, it is in encrypted form and not in original form. 1. Pairing: When two devices communicate for the first time, there is a pairing procedure. In this procedure, a secret key is generated. This key is shared by both the devices. It is stored in each device. When the devices want to communicate in future, there is no pairing procedure. 2. Security modes: 1. Non-secure: A device will not initiate any security procedure. 2. Service level enforced security: A device does not initiate security procedures before channel establishment. 3. Link level enforced security: A device initiates security procedures before link set up is completed
  • 12. Bluetooth Security Levels There are two kinds of security levels i.e. authentication & authorization • Types of services: Different services have different service requirements. Some services require authentication and authorization. Some services require only authentication and not authorization. Some services don’t require both authentication and authorization. • Authentication: Authentication is performed after determining the type of service. It cannot be performed when link is established. It is performed only when connection request to service is submitted. It can be performed in both directions : client authenticates server & vice versa.
  • 13. • Authentication procedure • Connection request to L2CAP is sent. • L2CAP requests access from security manager. • Security manager enquires the service database. • Security manager enquires the device database. • If necessary, security manager enforces the authentication and encryption procedure. • The security manager grants access and L2CAP continues to set up the connection.
  • 14.
  • 15. • Authorization: Some services require manual authorization of the device after authentication only then, these services can be accessed. This leads to the concept of trust. There are two kinds of device trust levels: • Trusted device: It has fixed relationship and unrestricted access to all services. • Untrusted device: This device has been previously authenticated, a link key is stored, but the device is not marked as trusted in device database. • An unknown device is also an untrusted device. No security information is available for this device.
  • 16. Applications • Replacing serial cables with radio links. • Wearable networks/WPANs • Desktop/room wireless networking • Hot-spot wireless networking • Medical: Transfer of measured values from training units to analytical systems, patient monitoring • Automotive: Remote control of audio/video equipment, hands-free telephony • Point-of-sale payments: Payments by mobile phone
  • 17. Advantages:  Wireless  Inexpensive  Automatic  Interoperability  Low interference and energy consumption.  Share voice and data  Instant PAN  Upgradeable  Long lasting technology.  Easy link establishment
  • 18. Disadvantages  Data rate and security  More susceptible to Interception and attack  Less range  Average Speed  Short Life
  • 19. Conclusion A global standard for data and voice • Eliminates Cables. • Low Power, Low range, Low Cost network devices. • Bluetooth seems to have a bright future after reviewing its benefits and wide use. • Further improvements are planned to be made in • Data Rates • Power Reduction • Range