Wi-Fi vs Bluetooth

4,438 views

Published on

Wi-Fi vs Bluetooth

Published in: Technology
0 Comments
3 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
4,438
On SlideShare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
316
Comments
0
Likes
3
Embeds 0
No embeds

No notes for slide
  • 18 October 2010
  • 18 October 2010
  • 18 October 2010
  • Wi-Fi vs Bluetooth

    1. 1. It's a Presentation from THIAGARAJAR POLYTECHNIC COLLEGE (Autonomous Institution) Salem - 5
    2. 2. Wi-Fi, Bluetooth
    3. 3. This Paper has been submitted under the guidance of <ul><li>Over headed by </li></ul><ul><ul><li>M.Saravanan (M.E) – Lecturer (Computer Tech). </li></ul></ul><ul><ul><li>PL.Sindhu B. E – Lecturer (Computer Tech). </li></ul></ul>MR.D.ARUL SELVAN M.E., Head Of the Department / Computer Technology
    4. 4. Presented & performed by <ul><li>Arunachalam. PL </li></ul><ul><li>COMPUTER ENGINEERING </li></ul>
    5. 5. <ul><li>Wi-Fi </li></ul><ul><ul><li>Welcome to the World of Wireless </li></ul></ul><ul><ul><li>Wireless Local Area Networking </li></ul></ul><ul><ul><li>Products </li></ul></ul><ul><ul><li>How to use WiFi? </li></ul></ul><ul><ul><li>Wi-Fi Security </li></ul></ul><ul><li>Bluetooth </li></ul><ul><ul><li>Technical features </li></ul></ul><ul><ul><li>Ultimate Headset </li></ul></ul><ul><ul><li>Cordless Computer </li></ul></ul><ul><ul><li>Bluetooth Goals & Vision </li></ul></ul><ul><ul><li>PC’s Environment </li></ul></ul><ul><ul><li>Security measures </li></ul></ul><ul><li>Bibliography </li></ul><ul><li>Concluding remarks </li></ul>Synopsis
    6. 6. Wireless Fidelity (Wi-Fi) Welcome to the World of Wireless <ul><li>Short form of Wireless Fidelity. This can be defined as a wireless Local Area Networking System. </li></ul><ul><li>Can you imagine a day without Internet ? For me it is not possible. That means now internet has become an integral part of our life. </li></ul><ul><li>With the help of Wi-Fi, we can access broad band internet connection with high data transfer rate. </li></ul><ul><li>The main attractive feature of this technology is that it can provide wireless broadband connection within a specific geographic boundary. </li></ul>
    7. 8. Wireless Local Area Networking
    8. 9. Products
    9. 10. Wireless adapters Wireless adapters can plug into a computer's PC card slot or USB port.
    10. 11. The Beat Goes on…. <ul><li>There are many WiFi hotspots now available in public places like restaurants, hotels, libraries and airports. For example, Starbucks. </li></ul><ul><li>The number of hotspots in the world is growing daily. </li></ul><ul><li>One way to find a hotspot is to go on-line. </li></ul><ul><li>Want Broadband With Your Fries? </li></ul><ul><li>McDonald's serves WLAN broadband in Singapore </li></ul>Locating Hotspots
    11. 12. Wireless Fidelity <ul><li>We can access internet through our laptop. </li></ul><ul><li>With the help of this technology Tourism Department of Srinagar is looking forward for a very good response from the tourists. </li></ul><ul><li>And they believe that in the near future itself, there will be a good change in tourism industry in Kasmir. </li></ul><ul><li>Now Kashmir is getting a good image among world tourist map. </li></ul><ul><li>So Wi-Fi is rocking . Isn't it? </li></ul>
    12. 13. One Type of Amplifier
    13. 14. Another Way to Amplify WiFi Signals A WiFi repeater is installed to extend coverage. Wireless Access Point
    14. 15. Wireless Fidelity Advantages <ul><li>Mobile. </li></ul><ul><li>Widely available in public venues. </li></ul><ul><li>Relatively inexpensive. </li></ul><ul><li>Easy to set up a network. </li></ul><ul><li>User-friendly software. </li></ul><ul><li>Security features. </li></ul><ul><li>Global set of standards. </li></ul>
    15. 16. Wi-Fi Security <ul><li> WEP stands for Wired Equivalency Privacy </li></ul><ul><li>As its name implies, this standard was intended to make wireless networks as secure as wired networks. </li></ul><ul><li>The common key lengths are currently 128- and 256- bit. </li></ul><ul><li>WPA Wi-Fi Protected Access is an early version of the 802.11i security standard that was developed by the Wi-Fi Alliance to replace WEP. </li></ul>
    16. 17. <ul><li>“ Bluetooth is a protocol which enables the electronic devices to communicate each other without any wires in a less expense.” </li></ul>
    17. 18. Technical features 8-128 bits (configurable) Data Security –Encryption Key 8 devices Supported Stations 128 bit key Data Security –Authentication Key 30 ft Range 1 Mbps Data Rate 2.4 GHz Spectrum
    18. 19. Ultimate Headset
    19. 20. Headset Profile <ul><li>Profile provides: </li></ul><ul><ul><li>Both devices must provide capability to initiate connection </li></ul></ul><ul><ul><li>& accept/terminate calls. </li></ul></ul><ul><ul><li>Volume can be controlled from either device. </li></ul></ul><ul><ul><li>Audio gateway can notify headset of an incoming call. </li></ul></ul>
    20. 21. Cordless Computer
    21. 22. Bluetooth Goals & Vision <ul><li>Originally conceived as a cable replacement technology </li></ul><ul><li>Short-Range Wireless Solutions </li></ul><ul><li>Open Specification </li></ul><ul><li>Voice and Data Capability </li></ul><ul><li>Worldwide Usability </li></ul>
    22. 23. PC’s Environment <ul><li>Here a PC and k550i is connected </li></ul>
    23. 24. File Transfer Profile <ul><li>Profile provides: </li></ul><ul><ul><li>Enhanced client-server interactions: </li></ul></ul><ul><ul><ul><li>browse, create, transfer folders </li></ul></ul></ul><ul><ul><ul><li>browse, pull, push, delete files </li></ul></ul></ul>
    24. 25. Piconet <ul><li>&quot;Piconet&quot; is a combination of the prefix &quot;pico,&quot; meaning very small or one trillionth, and network. </li></ul><ul><li>A network of devices connected in an ad hoc fashion using Bluetooth technology. </li></ul><ul><li>The connection is established for the duration of one session and requires no base station is called ad hoc. </li></ul><ul><li>A piconet is formed when at least two devices, such as a portable PC and a cellular phone, connect. A piconet can support up to eight devices. </li></ul><ul><li>When a piconet is formed, one device acts as the master while the others act as slaves for the duration of the piconet connection. </li></ul>
    25. 26. Piconet Structure <ul><li>All devices in piconet hop together. </li></ul><ul><li>Master’s ID and master’s clock determines frequency hopping sequence & phase. </li></ul>Master Active Slave Parked Slave Standby
    26. 27. Ad-hoc Network – the Scatternet <ul><li>Inter-piconet communication </li></ul><ul><li>Up to 10 piconets in a scatternet </li></ul><ul><li>Multiple piconets can operate within same physical space </li></ul><ul><li>This is an ad-hoc, peer to peer (P2P) network </li></ul>
    27. 28. Security measures <ul><li>Supports </li></ul><ul><ul><ul><li>Authentication </li></ul></ul></ul><ul><ul><ul><li>Encryption & Decryption </li></ul></ul></ul><ul><ul><ul><li>Authorization </li></ul></ul></ul><ul><li>Identifiers </li></ul><ul><ul><ul><li>ID’s </li></ul></ul></ul><ul><ul><ul><li>Random numbers </li></ul></ul></ul><ul><ul><ul><li>Private Keys </li></ul></ul></ul><ul><ul><ul><li>Long encryption keys are used </li></ul></ul></ul>
    28. 29. Comparison of Wi-Fi & Bluetooth Wi-Fi TM
    29. 30. www.logmein.com
    30. 31. Conclusion
    31. 32. Thank You “ Things that think… don’t make sense unless they link.” Its time for small Demo…
    32. 33. Bibliography Website www.wikipedia.com www.howstuffworks.com www.palowireless.com www.bluetooth.com www.technologyreview.com Simplicity is the key to Victory. Bruce Lee

    ×