Bluetooth is a wireless technology standard for exchanging data over short distances. It was initially developed in 1994 by Ericsson with the goal of wireless connectivity between devices. Major versions of Bluetooth technology have provided improvements in areas such as data transfer rates, power reduction, and operating range. Potential future applications of Bluetooth include improved audio streaming, device tethering, and use in military communications and tracking systems. Ultra-wideband is being explored as a possible next generation wireless technology standard.
An Introduction to BLUETOOTH TECHNOLOGYVikas Jagtap
“Bluetooth wireless technology is an open specification for a low-cost, low-power, short-range radio technology for ad-hoc wireless communication of voice and data anywhere in the world.”
An Introduction to BLUETOOTH TECHNOLOGYVikas Jagtap
“Bluetooth wireless technology is an open specification for a low-cost, low-power, short-range radio technology for ad-hoc wireless communication of voice and data anywhere in the world.”
This Presentation is prepared by the higher authority of polite group
under the supervision of Syed Mubashair Abid and other members are Ch.Junaid Arshad and Muhammad Aftab Mustafa
This Presentation is prepared by the higher authority of polite group
under the supervision of Syed Mubashair Abid and other members are Ch.Junaid Arshad and Muhammad Aftab Mustafa
NetSim Webinar on Cognitive Radio NetworksSANJAY ANAND
Why use a Network Simulator for research ?
Introduction to NetSim
Cognitive Radio Basics
Designing Cognitive Radio networks using NetSim
Modifying Cognitive Radio source C code in NetSim
How to develop custom metrics?
Q & A
2.4 GHz Open band
Globally available
Other devices include microwave ovens, cordless phones
Frequency hopping and Time Division Multiplexing
10 – 100 meter range
Up to 8 active devices can be in the same piconet
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
3. PREVIEW
• PHASE –I INTRODUCTION AND HISTORY
• PHASE- II WORKING OF BLUETOOTH NETWORK
BWT TOPOLOGIES & CLASSES
BWT PROTOCOLS
• PHASE- III BWT SECURITY AND MITIGATIONS
ADVANTAGES AND DISADVANTAGES
APPLICATIONS
HEALTH CONCERNS
FUTURE TRENDS AND MIL APPLICATIONS
6. INTRODUCTION
• SHORT RANGE LOW POWER WIRELESS
TECHNOLOGY
• INTER CONNECTIONS WITH OTHER PERIPHERALS.
• EXCHANGE DATA OVER SHORT DISTANCES.
• EASY CONNECTION BETWEEN DEVICES
• WIRELESS ALTERNATIVE TO RS-232 DATA CABLES.
• MECHANISM TO FORM SHORT AD-HOC NETWORK.
7. HISTORY
• 1994: ERICSSON CAME UP WITH A CONCEPT OF
“MULTI –COMMUNICATOR LINK”.
• RENAMING TO BLUETOOTH IN NAME OF HARALD
“BLÅTAND” GORMSEN OR HARALD BLUETOOTH,
• 1998 : FOUNDATION OF BLUETOOTH SIG.
• 2001 : FIRST CONSUMER PRODUCTS VERSION
1.1 RELEASED.
• 2003 - SIG ANNOUNCED VERSION 2.1.
• 2004 - BLUETOOTH VERSION 2.0 + EDR
(ENHANCED DATA RATE) INTRODUCED.
8. HISTORY
• 2007 - BLUETOOTH VERSION 2.1 + EDR ADOPTED
BY BLUETOOTH SIG.
• 2009 - BLUETOOTH VERSION 3.0 + HS (HIGH
SPEED) ADOPTED BY BLUETOOTH SIG.
• 2010 - BLUETOOTH CORE SPECIFICATION
VERSION 4.0 (CALLED BLUETOOTH SMART)
•2013 - BLUETOOTH V4.1
•DECEMBER 2, 2014 - BLUETOOTH V4.2
11. TECHNOLOGY REVIEW
• A BLUETOOTH CHIP COMBINES A TRANSMITTER
AND RECEIVER, AS SMALLER AS 9 MM X 9 MM AND
AN ANTENNA.
• UNLICENSED INDUSTRIAL, SCIENTIFIC AND
MEDICAL (ISM).
• FREQUENCIES BETWEEN 2400 AND 2483.5 MHZ
(INCLUDING GUARD BANDS 2 MHZ (BOTTOM) AND
3.5 MHZ (TOP).79 CHANNELS BANDWIDTH OF 1 MHZ.
• BLUETOOTH USES FREQUENCY-HOPPING
SPREAD SPECTRUM (FHSS).
• 1600 HOPS /SEC, WITH ADAPTIVE FREQUENCY-
HOPPING (AFH).
13. BLUETOOTH TOPOLOGIES
• PICONETS AND SCATTERNET FORMATION.
• A MASTER BLUETOOTH DEVICE CAN
COMMUNICATE WITH A MAXIMUM OF SEVEN DEVICES
IN A PICONET .
• MASTER-UNIT ESTABLISHES A FREQUENCY-
HOPPING SCHEME.
• ROLE SWITCHING, BY AGREEMENT.
• ROUND-ROBIN FASHION FOR DATA TRANSFER
IN PACKETS.
14. BLUETOOTH CONNECTIONS
TWO TYPES OF DATA EXCHANGE “MODE” :-
• ASYNCHRONOUS CONNECTION-ORIENTED
LOGICAL TRANSPORT (ACL)
- USED FOR DATA CONNECTIONS
• SYNCHRONOUS CONNECTION-ORIENTED LINK
(SCO), ENHANCED SCO (ESCO)
– USED FOR VOICE DATA
15. CLASSES OF BLUETOOTH
BLUETOOTH DEVICES ARE CLASSIFIED
ACCORDING TO THREE DIFFERENT POWER CLASSES,
AS SHOWN IN THE FOLLOWING TABLE.
CLASS
MAX
PERMITTED
POWER(MW)
RANGE(APPROX)
IN MTRS
Class 1 100 100
Class 2 2.5 50
Class 3 1 10
18. Application Framework
and Support
Link Manager and L2CAP
Radio & BasebandRF
Baseband
Audio
Link Manager
L2CAP
TCP/IP
DATA
CONTROL
BLUETOOTH PROTOCOLS
HID RFCOMM
Applications
Host Controller
Interface
21. BLUETOOTH SECURITY
• SUSCEPTIBLE TO SPYING AND REMOTE ACCESS.
• INTERFERENCE AND EAVESDROPPING
• SAFER TRANSMISSION OF DATA.
• INFORMATION INTEGRITY.
• DENIAL OF SERVICE, UNINTENDED CONTROL AND
ACCESS OF DATA AND VOICE CHANNELS.
• UNAUTHORIZED DEVICE CONTROL AND DATA
ACCESS.
22. 1. SAFER TRANSMISSION OF DATA
a) AUTHENTICATION
b) AUTHORIZATION
c) ENCRYPTION
THREE MODES :-
a) MODE 1 - NO SECURITY
b) MODE 2 - SERVICE LEVEL SECURITY
c) MODE 3 – LINK LEVEL SECURITY(PAIRING
BLUETOOTH SECURITY
23. • DEVICES ARE MANUFACTURED WITH A UNIQUE
48-BIT IDENTIFIER KNOWN AS THE BLUETOOTH DEVICE
ADDRESS (BD_ADDR).
• PUBLICALLY KNOWN AND CAN BE OBTAINED VIA
AN INQUIRY ROUTINE PERFORMED BY ANY BLUETOOTH
DEVICE.
• THE BD_ADDR OF THE MASTER DEVICE IS USED
TO DERIVE THE DEVICE ACCESS CODE (DAC) AND THE
CHANNEL ACCESS CODE (CAC), WHICH ARE
TRANSMITTED IN CLEAR-TEXT.
BLUETOOTH SECURITY
24. ERROR CORRECTION
2. ERROR CORRECTION TYPES:-
a) FORWARD ERROR CORRECTION (FEC)
- REDUCES NO OF RE-TRANSMISSIONS.
b) AUTOMATIC REPEAT REQUEST (ARQ)
- CORRECTS THE CORRUPTED
TRANSMITTED DATA BLOCK.
3. FREQUENCY HOPPING TO AVOID INTERFERENCE
26. MITIGATIONS
•ENABLE BLUETOOTH ONLY WHEN REQUIRED.
•ENABLE BLUETOOTH DISCOVERY ONLY WHEN
NECESSARY, AND DISABLE DISCOVERY WHEN
FINISHED.
•DO NOT ENTER LINK KEYS OR PINS WHEN
UNEXPECTEDLY PROMPTED TO DO SO.
•REMOVE PAIRED DEVICES WHEN NOT IN USE.
•REGULARLY UPDATE FIRMWARE ON BLUETOOTH-
ENABLED DEVICES.
28. ADVANTAGES
• ELIMINATES WIRES
• FACILITATES DATA AND VOICE COMMUNICATION
• OFFERS FORMATION OF AD HOC NETWORKS
• STANDARDIZED PROTOCOL
• FREE OF CHARGE
• EASY TO USE
• LOW POWER CONSUMES BATTERY LESS
• STATIONARY AND MOBILE ENVIRONMENTS
29. DISADVANTAGES
• RELATIVELY SHORT RANGE.
• LESS SECURE.
• INTERFERENCE WITH OTHER DEVICES.
• MEDIOCRE DATA RATES.
• BLUETOOTH INTERNET CONNECTION GETS
SLOW SOMETIMES.
31. HEALTH CONCERNS
• BLUETOOTH USES 2.4 GHZ TO 2.480 GHZ.
• SAME FREQUENCY RANGE AS MICROWAVE
OVENS.
• EMITTED RF ENERGY IS ABSORBED BY THE BODY.
• PENETRATION DEPTH IS ABOUT 1.5 CM AT 2450
MHZ.
• ABSORPTION IS VERY SUPERFICIAL.
33. FUTURE OF BLUETOOTH
GENERIC NAVIGATION SATELLITE SYSTEM (GNSS)
• CREATE A WIRELESS SERIAL LINK SO A DEVICE
CAN SHARE ITS GPS POSITION DATA USING.
AUDIO STREAMING
• ADVANCED AUDIO DISTRIBUTION
• AUDIO VIDEO REMOTE CONTROL
• BROWSE YOUR MP3 PLAYER’S MUSIC AND
PLAYLISTS DIRECTLY FROM YOUR CAR USER
INTERFACE.
34. RECENT TRADITION
TELEPHONY
• HANDS FREE PROFILE
GENERIC OBJECT EXCHANGE
• BETTER QUALITY OF SERVICE.
• SERVICE MULTIPLEXING IS NOW ENTIRELY
DONE BY L2CAP.
• BETTER THROUGHPUT.
35. FUTURE OF BLUETOOTH
Bluetooth has a good future ahead
because it meets a basic need of connectivity.
Currently a protocol is being researched
that would support large adhoc networks.
Latest version of Bluetooth are improving
both its security and capabilities.
Ultra wide band has been chosen by the
Bluetooth Special Interest Group as the future of
Bluetooth Technology.
New versions of Bluetooth technology will
meet the high-speed and large range.
Many companies are designing impressive
Bluetooth applications in demand.
36. MILITARY APPLICATIONS
IN MILITARY BLUETOOTH TECHNOLOGY
CAN BE USED IN VARIOUS FIELDS AS:-
A) COMMUNICATION
B) SECURITY
C) IDENTIFICATION
D) TRAINING
E) TARGET EVALUATION
F) GPS
39. CONCLUSION
• A NEW GLOBAL STANDARD FOR DATA AND VOICE
-ENABLED DEVICES WHICH OPERATE IN THE
UNRESTRICTED 2.4-GHZ ISM BAND.
• ELIMINATING CABLES.
• LOW POWER, COST NETWORK DEVICES.
• BLUETOOTH HAS A BRIGHT FUTURE FOR WIDE
USE.
• FURTHER IMPROVEMENTS ARE PLANNED TO BE
MADE IN
– DATA RATES
– POWER REDUCTION
– RANGE
40.
41. ULTRA WIDE BAND
• UWB OR AS DIGITAL PULSE WIRELESS IS A
WIRELESS TECHNOLOGY
• TRANSMITS LARGE AMOUNTS OF DIGITAL
DATA OVER A WIDE SPECTRUM OF FREQUENCY
BANDS WITH VERY LOW POWER FOR A SHORT
DISTANCE.
• CAN CARRY A HUGE AMOUNT OF DATA OVER A
DISTANCE UP TO 230 FEET AT VERY LOW POWER
(LESS THAN 0.5 MILL WATTS).
• ABILITY TO CARRY SIGNALS THROUGH DOORS
AND OTHER OBSTACLES
Editor's Notes
First we move towards the introduction
RS232 data cables
FHSS
Chops up the data being sent and transmits chunks of it on up to 79 frequencies.
1600 hops/sec- time slot is defined as 625 microseconds
Packet 1-5 time slots long
FHSS is used to minimize the risk of such interference with systems operating on this Band such as microwave ovens, baby monitors and 802.11 wireless
networks.
GFSK
When we jump from (1,-1 or -1,1), mod waveform changes rapidly, introducing large out of bound spectrum.(no overshoot to a step function input )
Uses Gaussian filter (uses G.Function) to limit its spectral width.
GFSK = Baseband pulses(-1,1) gaussian filter FSK modulator
FSK = Baseband pulses(-1,1) FSK modulator
1Mb/s
with overhead, this effectively becomes 721 kbps.
SIG
5 companies joined to form the Bluetooth Special Interest Group (SIG) in 1998.
First specification released in July 1999
First we move towards the introduction
FHSS
Chops up the data being sent and transmits chunks of it on up to 79 frequencies.
1600 hops/sec- time slot is defined as 625 microseconds
Packet 1-5 time slots long
FHSS is used to minimize the risk of such interference with systems operating on this Band such as microwave ovens, baby monitors and 802.11 wireless
networks.
GFSK
When we jump from (1,-1 or -1,1), mod waveform changes rapidly, introducing large out of bound spectrum.(no overshoot to a step function input )
Uses Gaussian filter (uses G.Function) to limit its spectral width.
GFSK = Baseband pulses(-1,1) gaussian filter FSK modulator
FSK = Baseband pulses(-1,1) FSK modulator
1Mb/s
with overhead, this effectively becomes 721 kbps.
SIG
5 companies joined to form the Bluetooth Special Interest Group (SIG) in 1998.
First specification released in July 1999
The slaves in a piconet can only have links to the
master. Slaves cannot directly transmit data to one
another
Devices that participate in two or more piconets may act as gateways, forwarding traffic from one piconet to another
Bluetooth units can only transmit and receive data in one piconet at a time.
As devices in mulltiple piconets divide their time between the piconets, spending some time slots in one and some time slots in another on TDM basis.
Devices give notification of inactivation to master
that it will be inactive for a predetermined length of time. The device will then have to re-synchronize its clock with its other master. When a slave becomes inactive in a piconet, communications between masters and the other active slaves go on as normal.
On the other hand, when a master becomes inactive in its piconet, the slaves will have to wait for it to be active again before communication can resume.
FHSS
Chops up the data being sent and transmits chunks of it on up to 79 frequencies.
1600 hops/sec- time slot is defined as 625 microseconds
Packet 1-5 time slots long
FHSS is used to minimize the risk of such interference with systems operating on this Band such as microwave ovens, baby monitors and 802.11 wireless
networks.
GFSK
When we jump from (1,-1 or -1,1), mod waveform changes rapidly, introducing large out of bound spectrum.(no overshoot to a step function input )
Uses Gaussian filter (uses G.Function) to limit its spectral width.
GFSK = Baseband pulses(-1,1) gaussian filter FSK modulator
FSK = Baseband pulses(-1,1) FSK modulator
1Mb/s
with overhead, this effectively becomes 721 kbps.
SIG
5 companies joined to form the Bluetooth Special Interest Group (SIG) in 1998.
First specification released in July 1999
Most powerful devices
Infrared IrDA (WPAN) : synchronization, link
between a phone and a laptop…
– Less flexible than Bluetooth, need of a line of site
– Comparable data rate
Wi-Fi (WLAN) : Wireless LAN access
– Far higher bandwidth and data rate than Bluetooth
– Higher power consumption than Bluetooth
– Requires infrastructure investment
The radio layer describes the physical characteristics a Bluetooth device’s receiver-transmitter component must have. These include modulation characteristics, radio frequency tolerance, and sensitivity level.
See ACL links
See ACL links
OBEX
The Object Exchange Protocol (OBEX) is a specification for object data exchange over infrared (IR) links. Examples for using OBEX include exchanging business cards and synchronizing calendar applications.
See ACL links
OBEX
The Object Exchange Protocol (OBEX) is a specification for object data exchange over infrared (IR) links. Examples for using OBEX include exchanging business cards and synchronizing calendar applications.
First we move towards the introduction
Interference with other devices that use the same frequency such as baby monitors, microwave over etc. FHSS is used to avoid it.
Interference with other devices that use the same frequency such as baby monitors, microwave over etc. FHSS is used to avoid it.
Interference with other devices that use the same frequency such as baby monitors, microwave over etc. FHSS is used to avoid it.
Standardized protocol supports interoperability of devices of different types.
Standardized protocol supports interoperability of devices of different types.
Standardized protocol supports interoperability of devices of different types.
Many companies are designing and researching impressive bluetooth applications in demand so this shows it has a bright future and it would be difficult for other technology to overcome.
Many companies are designing and researching impressive bluetooth applications in demand so this shows it has a bright future and it would be difficult for other technology to overcome.