SlideShare a Scribd company logo
1 of 1
How Bluetooth Works
Bluetoothdeviceswill normallyoperate at2.4 GHZ in the license free,globallyavailable ISMradio
band.The advantage tothisband includesworldwide availabilityandcompatibility.A disadvantage
to thishowever,isthatthe devicesmustshare this bandwithotherRFemitters.Thisincludes
automobile securitysystems,otherwirelessdevices, andothernoise sources,suchasmicrowaves.
To overcome thischallenge,Bluetoothemploysa fastfrequencyhoppingschemeandthereforeuses
shorterpacketsthan otherstandardswithinthe ISMband.This scheme helpstomake Bluetooth
communicationmore robustandmore secure. Frequencyhopping Frequencyhoppingisbasically
jumpingfromfrequency tofrequencywithinthe ISMradioband.
WANTTO LEARN RASPBERRY PI?CLICKHERE : https://www.digistore24.com/redir/271198/jack00/
Aftera bluetoothdevice sendsorreceivesapacket,it and the device (ordevices) it’s
communicatingwith hoptoanotherfrequencybefore the nextpacketis sent.Thisscheme offers
three advantages:
1. AllowsBluetoothdevicestouse the entiretyof the availableISMband,while never transmitting
froma fixedfrequencyformore thana shortperiodof time.Thishelpsinsure that Bluetooth
conformsto the ISMrestrictionsonthe transmissionquantityperfrequency.
2. Ensuresthat any interference won’t lastlong.Anypacketthatdoesn’tarrive safely toits
destinationcanbe resenttothe next frequency.
3. Providesabase level of securityas it’sveryhardfor an eavesdroppingdevice topredictwhich
frequencythe Bluetoothdeviceswill use next. The connecteddeviceshowever,mustagree uponthe
frequencytheywilluse next.
The specification inBluetoothensuresthisintwoways.First,it definesamasterandslave type
relationshipbetween bluetoothdevices.Next,itspecifiesanalgorithm calculatingthe frequencyhop
sequences. A Bluetoothdevice thatoperatesinmastermode can communicate withuptoseven
devicesthatare setin slave mode.Toeach of the slaves,the master Bluetoothdevice will sendits
ownunique address andthe value of itsowninternal clock.The informationsentisthenusedto
calculate the frequencyhopsequences. Because the masterdevice andeachof the slave devicesuse
the same algorithmwiththe same initial input,the connecteddeviceswillalwaysarrive togetherat
the nextfrequencythattheyhave agreed upon. Asa replacementforcable technology,it’sno
wonderthatBluetoothdevicesare usuallybattery powered,suchaswirelessmice andbattery
powered cell phones.Toconserve the power,mostdevices operateinlow power.Thishelpstogive
Bluetooth devicesarange of around5 – 10 meters. Thisrange is far enoughforwireless
communication butclose enoughtoavoiddrawingtoomuchpower fromthe powersource of the
device.

More Related Content

What's hot

Wireless hacking
Wireless hackingWireless hacking
Wireless hacking
Mihir Shah
 
Final report firewall reconciliation
Final report   firewall reconciliationFinal report   firewall reconciliation
Final report firewall reconciliation
Gurjan Oberoi
 
How To Hack Wireless Internet Connections
How To Hack Wireless Internet ConnectionsHow To Hack Wireless Internet Connections
How To Hack Wireless Internet Connections
guest85e156e
 
How to hack wireless internet connections
How to hack wireless internet connectionsHow to hack wireless internet connections
How to hack wireless internet connections
Nitin kumar Gupta
 

What's hot (19)

WiMax - Technology & Architecture
WiMax - Technology & ArchitectureWiMax - Technology & Architecture
WiMax - Technology & Architecture
 
What is Wi-Fi 6? - C&T RF Antennas Inc
What is Wi-Fi 6? - C&T RF Antennas IncWhat is Wi-Fi 6? - C&T RF Antennas Inc
What is Wi-Fi 6? - C&T RF Antennas Inc
 
Wireless hacking
Wireless hackingWireless hacking
Wireless hacking
 
Ch11 Hacking Wireless Networks it-slideshares.blogspot.com
Ch11 Hacking Wireless Networks it-slideshares.blogspot.comCh11 Hacking Wireless Networks it-slideshares.blogspot.com
Ch11 Hacking Wireless Networks it-slideshares.blogspot.com
 
Where is the beef
Where is the beefWhere is the beef
Where is the beef
 
Where is the beef with 6 e
Where is the beef with 6 eWhere is the beef with 6 e
Where is the beef with 6 e
 
Overview of Wireless Communications
Overview of Wireless CommunicationsOverview of Wireless Communications
Overview of Wireless Communications
 
Wi max
Wi maxWi max
Wi max
 
Final report firewall reconciliation
Final report   firewall reconciliationFinal report   firewall reconciliation
Final report firewall reconciliation
 
Wifi vs wimax
Wifi vs wimax Wifi vs wimax
Wifi vs wimax
 
Hack wireless internet connections or wifi
Hack wireless internet connections or wifiHack wireless internet connections or wifi
Hack wireless internet connections or wifi
 
Where is the 6 GHz beef?
Where is the 6 GHz beef?Where is the 6 GHz beef?
Where is the 6 GHz beef?
 
Teori Jaringan Nirkabael
Teori Jaringan NirkabaelTeori Jaringan Nirkabael
Teori Jaringan Nirkabael
 
Bluetooth ppt
Bluetooth pptBluetooth ppt
Bluetooth ppt
 
BLUETOOTH _TECHNOLOGY
BLUETOOTH _TECHNOLOGYBLUETOOTH _TECHNOLOGY
BLUETOOTH _TECHNOLOGY
 
Wi max by yogijicreations
Wi max by yogijicreationsWi max by yogijicreations
Wi max by yogijicreations
 
How To Hack Wireless Internet Connections
How To Hack Wireless Internet ConnectionsHow To Hack Wireless Internet Connections
How To Hack Wireless Internet Connections
 
Wifi hacking
Wifi hackingWifi hacking
Wifi hacking
 
How to hack wireless internet connections
How to hack wireless internet connectionsHow to hack wireless internet connections
How to hack wireless internet connections
 

Similar to how does bluetooth work?

Bluetoothppt
BluetoothpptBluetoothppt
Bluetoothppt
sasidhar
 
Bluetooth technology aditya
Bluetooth technology adityaBluetooth technology aditya
Bluetooth technology aditya
akshay8811
 
SurOUNDExecutiveFeasibilityAssessment
SurOUNDExecutiveFeasibilityAssessmentSurOUNDExecutiveFeasibilityAssessment
SurOUNDExecutiveFeasibilityAssessment
Ross Harrison
 
Wireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+VulnerabilitiesWireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+Vulnerabilities
Yogesh Kumar
 

Similar to how does bluetooth work? (20)

Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth technology by polite group
Bluetooth technology by polite groupBluetooth technology by polite group
Bluetooth technology by polite group
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth versus wi
Bluetooth versus wiBluetooth versus wi
Bluetooth versus wi
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetoothppt
BluetoothpptBluetoothppt
Bluetoothppt
 
Seminar
SeminarSeminar
Seminar
 
Bluetooth technology_new.pptx
Bluetooth technology_new.pptxBluetooth technology_new.pptx
Bluetooth technology_new.pptx
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
 
Wireless standards
Wireless standards Wireless standards
Wireless standards
 
Bluetooth
Bluetooth Bluetooth
Bluetooth
 
Bluetooth technology aditya
Bluetooth technology adityaBluetooth technology aditya
Bluetooth technology aditya
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
 
SurOUNDExecutiveFeasibilityAssessment
SurOUNDExecutiveFeasibilityAssessmentSurOUNDExecutiveFeasibilityAssessment
SurOUNDExecutiveFeasibilityAssessment
 
Wireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+VulnerabilitiesWireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+Vulnerabilities
 
Bluetooth
BluetoothBluetooth
Bluetooth
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Recently uploaded (20)

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software Engineering
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 

how does bluetooth work?

  • 1. How Bluetooth Works Bluetoothdeviceswill normallyoperate at2.4 GHZ in the license free,globallyavailable ISMradio band.The advantage tothisband includesworldwide availabilityandcompatibility.A disadvantage to thishowever,isthatthe devicesmustshare this bandwithotherRFemitters.Thisincludes automobile securitysystems,otherwirelessdevices, andothernoise sources,suchasmicrowaves. To overcome thischallenge,Bluetoothemploysa fastfrequencyhoppingschemeandthereforeuses shorterpacketsthan otherstandardswithinthe ISMband.This scheme helpstomake Bluetooth communicationmore robustandmore secure. Frequencyhopping Frequencyhoppingisbasically jumpingfromfrequency tofrequencywithinthe ISMradioband. WANTTO LEARN RASPBERRY PI?CLICKHERE : https://www.digistore24.com/redir/271198/jack00/ Aftera bluetoothdevice sendsorreceivesapacket,it and the device (ordevices) it’s communicatingwith hoptoanotherfrequencybefore the nextpacketis sent.Thisscheme offers three advantages: 1. AllowsBluetoothdevicestouse the entiretyof the availableISMband,while never transmitting froma fixedfrequencyformore thana shortperiodof time.Thishelpsinsure that Bluetooth conformsto the ISMrestrictionsonthe transmissionquantityperfrequency. 2. Ensuresthat any interference won’t lastlong.Anypacketthatdoesn’tarrive safely toits destinationcanbe resenttothe next frequency. 3. Providesabase level of securityas it’sveryhardfor an eavesdroppingdevice topredictwhich frequencythe Bluetoothdeviceswill use next. The connecteddeviceshowever,mustagree uponthe frequencytheywilluse next. The specification inBluetoothensuresthisintwoways.First,it definesamasterandslave type relationshipbetween bluetoothdevices.Next,itspecifiesanalgorithm calculatingthe frequencyhop sequences. A Bluetoothdevice thatoperatesinmastermode can communicate withuptoseven devicesthatare setin slave mode.Toeach of the slaves,the master Bluetoothdevice will sendits ownunique address andthe value of itsowninternal clock.The informationsentisthenusedto calculate the frequencyhopsequences. Because the masterdevice andeachof the slave devicesuse the same algorithmwiththe same initial input,the connecteddeviceswillalwaysarrive togetherat the nextfrequencythattheyhave agreed upon. Asa replacementforcable technology,it’sno wonderthatBluetoothdevicesare usuallybattery powered,suchaswirelessmice andbattery powered cell phones.Toconserve the power,mostdevices operateinlow power.Thishelpstogive Bluetooth devicesarange of around5 – 10 meters. Thisrange is far enoughforwireless communication butclose enoughtoavoiddrawingtoomuchpower fromthe powersource of the device.