SlideShare a Scribd company logo
BLUETOOTHBLUETOOTH
TECHNOLOGYTECHNOLOGY
PRESENTED BY :-
KAUSHAL PANT{BSc (JNU),BA(PUB ADM)
(IGNOU)}
AIM
TO ACQUAINT ABOUT
BLUETOOTH TECHNOLOGY.
PREVIEW
• PHASE –I INTRODUCTION AND HISTORY
• PHASE- II WORKING OF BLUETOOTH NETWORK
BWT TOPOLOGIES & CLASSES
BWT PROTOCOLS
• PHASE- III BWT SECURITY AND MITIGATIONS
ADVANTAGES AND DISADVANTAGES
APPLICATIONS
HEALTH CONCERNS
FUTURE TRENDS AND MIL APPLICATIONS
PHASE –I
INTRODUCTION
INTRODUCTION
• SHORT RANGE LOW POWER WIRELESS
TECHNOLOGY
• INTER CONNECTIONS WITH OTHER PERIPHERALS.
• EXCHANGE DATA OVER SHORT DISTANCES.
• EASY CONNECTION BETWEEN DEVICES
• WIRELESS ALTERNATIVE TO RS-232 DATA CABLES.
• MECHANISM TO FORM SHORT AD-HOC NETWORK.
HISTORY
• 1994: ERICSSON CAME UP WITH A CONCEPT OF
“MULTI –COMMUNICATOR LINK”.
• RENAMING TO BLUETOOTH IN NAME OF HARALD
“BLÅTAND” GORMSEN OR HARALD BLUETOOTH,
• 1998 : FOUNDATION OF BLUETOOTH SIG.
• 2001 : FIRST CONSUMER PRODUCTS VERSION
1.1 RELEASED.
• 2003 - SIG ANNOUNCED VERSION 2.1.
• 2004 - BLUETOOTH VERSION 2.0 + EDR
(ENHANCED DATA RATE) INTRODUCED.
HISTORY
• 2007 - BLUETOOTH VERSION 2.1 + EDR ADOPTED
BY BLUETOOTH SIG.
• 2009 - BLUETOOTH VERSION 3.0 + HS (HIGH
SPEED) ADOPTED BY BLUETOOTH SIG.
• 2010 - BLUETOOTH CORE SPECIFICATION
VERSION 4.0 (CALLED BLUETOOTH SMART)
•2013 - BLUETOOTH V4.1
•DECEMBER 2, 2014 - BLUETOOTH V4.2
PHASE –II
TECHNOLOGY REVIEW
TECHNOLOGY REVIEW
• A BLUETOOTH CHIP COMBINES A TRANSMITTER
AND RECEIVER, AS SMALLER AS 9 MM X 9 MM AND
AN ANTENNA.
• UNLICENSED INDUSTRIAL, SCIENTIFIC AND
MEDICAL (ISM).
• FREQUENCIES BETWEEN 2400 AND 2483.5 MHZ
(INCLUDING GUARD BANDS 2 MHZ (BOTTOM) AND
3.5 MHZ (TOP).79 CHANNELS BANDWIDTH OF 1 MHZ.
• BLUETOOTH USES FREQUENCY-HOPPING
SPREAD SPECTRUM (FHSS).
• 1600 HOPS /SEC, WITH ADAPTIVE FREQUENCY-
HOPPING (AFH).
DEVICE
CHIP(1998) CHIP(PRESENT)
BLUETOOTH TOPOLOGIES
• PICONETS AND SCATTERNET FORMATION.
• A MASTER BLUETOOTH DEVICE CAN
COMMUNICATE WITH A MAXIMUM OF SEVEN DEVICES
IN A PICONET .
• MASTER-UNIT ESTABLISHES A FREQUENCY-
HOPPING SCHEME.
• ROLE SWITCHING, BY AGREEMENT.
• ROUND-ROBIN FASHION FOR DATA TRANSFER
IN PACKETS.
BLUETOOTH CONNECTIONS
TWO TYPES OF DATA EXCHANGE “MODE” :-
• ASYNCHRONOUS CONNECTION-ORIENTED
LOGICAL TRANSPORT (ACL)
- USED FOR DATA CONNECTIONS
• SYNCHRONOUS CONNECTION-ORIENTED LINK
(SCO), ENHANCED SCO (ESCO)
– USED FOR VOICE DATA
CLASSES OF BLUETOOTH
BLUETOOTH DEVICES ARE CLASSIFIED
ACCORDING TO THREE DIFFERENT POWER CLASSES,
AS SHOWN IN THE FOLLOWING TABLE.
CLASS
MAX
PERMITTED
POWER(MW)
RANGE(APPROX)
IN MTRS
Class 1 100 100
Class 2 2.5 50
Class 3 1 10
BLUETOOTH PROTOCOLS
PROTOCOL STACK
LLC
LINK MANAGER
Application Framework
and Support
Link Manager and L2CAP
Radio & BasebandRF
Baseband
Audio
Link Manager
L2CAP
TCP/IP
DATA
CONTROL
BLUETOOTH PROTOCOLS
HID RFCOMM
Applications
Host Controller
Interface
PHASE –III
BLUETOOTH SECURITY
BLUETOOTH SECURITY
• SUSCEPTIBLE TO SPYING AND REMOTE ACCESS.
• INTERFERENCE AND EAVESDROPPING
• SAFER TRANSMISSION OF DATA.
• INFORMATION INTEGRITY.
• DENIAL OF SERVICE, UNINTENDED CONTROL AND
ACCESS OF DATA AND VOICE CHANNELS.
• UNAUTHORIZED DEVICE CONTROL AND DATA
ACCESS.
1. SAFER TRANSMISSION OF DATA
a) AUTHENTICATION
b) AUTHORIZATION
c) ENCRYPTION
THREE MODES :-
a) MODE 1 - NO SECURITY
b) MODE 2 - SERVICE LEVEL SECURITY
c) MODE 3 – LINK LEVEL SECURITY(PAIRING
BLUETOOTH SECURITY
• DEVICES ARE MANUFACTURED WITH A UNIQUE
48-BIT IDENTIFIER KNOWN AS THE BLUETOOTH DEVICE
ADDRESS (BD_ADDR).
• PUBLICALLY KNOWN AND CAN BE OBTAINED VIA
AN INQUIRY ROUTINE PERFORMED BY ANY BLUETOOTH
DEVICE.
• THE BD_ADDR OF THE MASTER DEVICE IS USED
TO DERIVE THE DEVICE ACCESS CODE (DAC) AND THE
CHANNEL ACCESS CODE (CAC), WHICH ARE
TRANSMITTED IN CLEAR-TEXT.
BLUETOOTH SECURITY
ERROR CORRECTION
2. ERROR CORRECTION TYPES:-
a) FORWARD ERROR CORRECTION (FEC)
- REDUCES NO OF RE-TRANSMISSIONS.
b) AUTOMATIC REPEAT REQUEST (ARQ)
- CORRECTS THE CORRUPTED
TRANSMITTED DATA BLOCK.
3. FREQUENCY HOPPING TO AVOID INTERFERENCE
ERROR CORRECTION
MITIGATIONS
•ENABLE BLUETOOTH ONLY WHEN REQUIRED.
•ENABLE BLUETOOTH DISCOVERY ONLY WHEN
NECESSARY, AND DISABLE DISCOVERY WHEN
FINISHED.
•DO NOT ENTER LINK KEYS OR PINS WHEN
UNEXPECTEDLY PROMPTED TO DO SO.
•REMOVE PAIRED DEVICES WHEN NOT IN USE.
•REGULARLY UPDATE FIRMWARE ON BLUETOOTH-
ENABLED DEVICES.
BLUETOOTH TECHNOLOGY
Advantages and Disadvantages
ADVANTAGES
• ELIMINATES WIRES
• FACILITATES DATA AND VOICE COMMUNICATION
• OFFERS FORMATION OF AD HOC NETWORKS
• STANDARDIZED PROTOCOL
• FREE OF CHARGE
• EASY TO USE
• LOW POWER CONSUMES BATTERY LESS
• STATIONARY AND MOBILE ENVIRONMENTS
DISADVANTAGES
• RELATIVELY SHORT RANGE.
• LESS SECURE.
• INTERFERENCE WITH OTHER DEVICES.
• MEDIOCRE DATA RATES.
• BLUETOOTH INTERNET CONNECTION GETS
SLOW SOMETIMES.
HEALTH CONCERNS
HEALTH CONCERNS
• BLUETOOTH USES 2.4 GHZ TO 2.480 GHZ.
• SAME FREQUENCY RANGE AS MICROWAVE
OVENS.
• EMITTED RF ENERGY IS ABSORBED BY THE BODY.
• PENETRATION DEPTH IS ABOUT 1.5 CM AT 2450
MHZ.
• ABSORPTION IS VERY SUPERFICIAL.
FUTURE OF BLUETOOTH
FUTURE OF BLUETOOTH
GENERIC NAVIGATION SATELLITE SYSTEM (GNSS)
• CREATE A WIRELESS SERIAL LINK SO A DEVICE
CAN SHARE ITS GPS POSITION DATA USING.
AUDIO STREAMING
• ADVANCED AUDIO DISTRIBUTION
• AUDIO VIDEO REMOTE CONTROL
• BROWSE YOUR MP3 PLAYER’S MUSIC AND
PLAYLISTS DIRECTLY FROM YOUR CAR USER
INTERFACE.
RECENT TRADITION
TELEPHONY
• HANDS FREE PROFILE
GENERIC OBJECT EXCHANGE
• BETTER QUALITY OF SERVICE.
• SERVICE MULTIPLEXING IS NOW ENTIRELY
DONE BY L2CAP.
• BETTER THROUGHPUT.
FUTURE OF BLUETOOTH
Bluetooth has a good future ahead
because it meets a basic need of connectivity.
Currently a protocol is being researched
that would support large adhoc networks.
Latest version of Bluetooth are improving
both its security and capabilities.
Ultra wide band has been chosen by the
Bluetooth Special Interest Group as the future of
Bluetooth Technology.
New versions of Bluetooth technology will
meet the high-speed and large range.
Many companies are designing impressive
Bluetooth applications in demand.
MILITARY APPLICATIONS
IN MILITARY BLUETOOTH TECHNOLOGY
CAN BE USED IN VARIOUS FIELDS AS:-
A) COMMUNICATION
B) SECURITY
C) IDENTIFICATION
D) TRAINING
E) TARGET EVALUATION
F) GPS
GENERIC NAVIGATION SATELLITE
SYSTEM (GNSS)
PHASE –IV
CONCLUSION
• A NEW GLOBAL STANDARD FOR DATA AND VOICE
-ENABLED DEVICES WHICH OPERATE IN THE
UNRESTRICTED 2.4-GHZ ISM BAND.
• ELIMINATING CABLES.
• LOW POWER, COST NETWORK DEVICES.
• BLUETOOTH HAS A BRIGHT FUTURE FOR WIDE
USE.
• FURTHER IMPROVEMENTS ARE PLANNED TO BE
MADE IN
– DATA RATES
– POWER REDUCTION
– RANGE
ULTRA WIDE BAND
• UWB OR AS DIGITAL PULSE WIRELESS IS A
WIRELESS TECHNOLOGY
• TRANSMITS LARGE AMOUNTS OF DIGITAL
DATA OVER A WIDE SPECTRUM OF FREQUENCY
BANDS WITH VERY LOW POWER FOR A SHORT
DISTANCE.
• CAN CARRY A HUGE AMOUNT OF DATA OVER A
DISTANCE UP TO 230 FEET AT VERY LOW POWER
(LESS THAN 0.5 MILL WATTS).
• ABILITY TO CARRY SIGNALS THROUGH DOORS
AND OTHER OBSTACLES

More Related Content

What's hot

Bluetooth smart technology(description about all versions)
Bluetooth smart technology(description about all versions)Bluetooth smart technology(description about all versions)
Bluetooth smart technology(description about all versions)
lurdhu agnes
 
Bluetooth and profiles on WEC7
Bluetooth and profiles on WEC7Bluetooth and profiles on WEC7
Bluetooth and profiles on WEC7
gnkeshava
 
Bluetooth Technology and its uses by Prince Rohan
Bluetooth Technology and its uses by Prince RohanBluetooth Technology and its uses by Prince Rohan
Bluetooth Technology and its uses by Prince Rohan
Rohan Das
 
Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth Technology
baralsashank
 
Bluetooth presentation
Bluetooth presentationBluetooth presentation
Bluetooth presentationpratikpatilp
 
Bluetooth ppt by Ajay
Bluetooth ppt by AjayBluetooth ppt by Ajay
Bluetooth ppt by Ajay
Åjâÿ Chelachuvadu
 
Introduction to Bluetooth technology
Introduction to Bluetooth technologyIntroduction to Bluetooth technology
Introduction to Bluetooth technologyDavid Livingston J
 
bluetooth technology
 bluetooth technology bluetooth technology
bluetooth technology
deepak kumar
 
Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth Technology
Ummar Ahmed
 
Bluetooth technology by polite group
Bluetooth technology by polite groupBluetooth technology by polite group
Bluetooth technology by polite group
politegcuf
 
Bluetooth technology
Bluetooth technology Bluetooth technology
Bluetooth technology
Karun Kumar
 
Bluetooth technology 31 12
Bluetooth technology 31 12Bluetooth technology 31 12
Bluetooth technology 31 12
mohamedobaid
 
Bluetooth
BluetoothBluetooth
Bluetooth
Hina Saxena
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
Madugula Kumar
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
shaikhaMohamed
 

What's hot (20)

Bluetooth smart technology(description about all versions)
Bluetooth smart technology(description about all versions)Bluetooth smart technology(description about all versions)
Bluetooth smart technology(description about all versions)
 
Bluetooth and profiles on WEC7
Bluetooth and profiles on WEC7Bluetooth and profiles on WEC7
Bluetooth and profiles on WEC7
 
Bluetooth Technology and its uses by Prince Rohan
Bluetooth Technology and its uses by Prince RohanBluetooth Technology and its uses by Prince Rohan
Bluetooth Technology and its uses by Prince Rohan
 
Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth Technology
 
Bluetooth presentation
Bluetooth presentationBluetooth presentation
Bluetooth presentation
 
Bluetooth ppt by Ajay
Bluetooth ppt by AjayBluetooth ppt by Ajay
Bluetooth ppt by Ajay
 
Introduction to Bluetooth technology
Introduction to Bluetooth technologyIntroduction to Bluetooth technology
Introduction to Bluetooth technology
 
bluetooth technology
 bluetooth technology bluetooth technology
bluetooth technology
 
Bluetooth presentation
Bluetooth presentationBluetooth presentation
Bluetooth presentation
 
Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth Technology
 
Bluetooth technology by polite group
Bluetooth technology by polite groupBluetooth technology by polite group
Bluetooth technology by polite group
 
Bluetooth technology
Bluetooth technology Bluetooth technology
Bluetooth technology
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
 
Bluetooth technology 31 12
Bluetooth technology 31 12Bluetooth technology 31 12
Bluetooth technology 31 12
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
 
Blue1
Blue1Blue1
Blue1
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
 

Similar to Blue tooth by k pant

Overview of Bluetooth technology
Overview of Bluetooth technologyOverview of Bluetooth technology
Overview of Bluetooth technology
Suman Bhattacharyya
 
Digital switching system PDH-SDH-sonet.ppt
Digital switching system PDH-SDH-sonet.pptDigital switching system PDH-SDH-sonet.ppt
Digital switching system PDH-SDH-sonet.ppt
ssuser08a5ab
 
336760739-Pdh-Sdh-Sonet.ppt
336760739-Pdh-Sdh-Sonet.ppt336760739-Pdh-Sdh-Sonet.ppt
336760739-Pdh-Sdh-Sonet.ppt
ssuserefc414
 
Pdhsdh
PdhsdhPdhsdh
Bluetooth
BluetoothBluetooth
Bluetooth
Kashyap Shah
 
Bluetooth - Comprehensive Presentation
Bluetooth - Comprehensive PresentationBluetooth - Comprehensive Presentation
Bluetooth - Comprehensive Presentation
Muhammed Afsal Villan
 
Bluetooth
BluetoothBluetooth
Bluetooth
Mac_Kevin
 
Data Communication and Network World of Bluetooth
Data Communication and Network World of BluetoothData Communication and Network World of Bluetooth
Data Communication and Network World of Bluetooth
Chandrakant Divate
 
Bluetooth
BluetoothBluetooth
Bluetooth
Anamika Garg
 
Bluetooth Aplication
Bluetooth AplicationBluetooth Aplication
Bluetooth AplicationEr Bhaduri
 
Bluetooth
BluetoothBluetooth
NetSim Webinar on Cognitive Radio Networks
NetSim Webinar on Cognitive Radio NetworksNetSim Webinar on Cognitive Radio Networks
NetSim Webinar on Cognitive Radio Networks
SANJAY ANAND
 
BLUETOOTH TECHNOLOGY
BLUETOOTH TECHNOLOGYBLUETOOTH TECHNOLOGY
BLUETOOTH TECHNOLOGY
AJAL A J
 
IT WRITING SAMPLES PORTFOLIO
IT WRITING SAMPLES PORTFOLIOIT WRITING SAMPLES PORTFOLIO
IT WRITING SAMPLES PORTFOLIO
Serena Rinaldi Lambiase
 
Multi Bandwidth Data path design for 5G Wireless Systems
Multi Bandwidth Data path design for 5G Wireless SystemsMulti Bandwidth Data path design for 5G Wireless Systems
Multi Bandwidth Data path design for 5G Wireless Systems
Chaitanya Krishna
 
Bluetooth.ppt
Bluetooth.pptBluetooth.ppt
Bluetooth.ppt
Hina Saxena
 
Distributed IP-PBX
Distributed IP-PBX Distributed IP-PBX
Frontiers of Wireless and Mobile Communications
Frontiers of Wireless and Mobile CommunicationsFrontiers of Wireless and Mobile Communications
Frontiers of Wireless and Mobile CommunicationsSai Varrshini
 

Similar to Blue tooth by k pant (20)

Overview of Bluetooth technology
Overview of Bluetooth technologyOverview of Bluetooth technology
Overview of Bluetooth technology
 
Digital switching system PDH-SDH-sonet.ppt
Digital switching system PDH-SDH-sonet.pptDigital switching system PDH-SDH-sonet.ppt
Digital switching system PDH-SDH-sonet.ppt
 
336760739-Pdh-Sdh-Sonet.ppt
336760739-Pdh-Sdh-Sonet.ppt336760739-Pdh-Sdh-Sonet.ppt
336760739-Pdh-Sdh-Sonet.ppt
 
Wireless personal area networks(PAN)
Wireless personal area networks(PAN)Wireless personal area networks(PAN)
Wireless personal area networks(PAN)
 
Pdhsdh
PdhsdhPdhsdh
Pdhsdh
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth - Comprehensive Presentation
Bluetooth - Comprehensive PresentationBluetooth - Comprehensive Presentation
Bluetooth - Comprehensive Presentation
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Data Communication and Network World of Bluetooth
Data Communication and Network World of BluetoothData Communication and Network World of Bluetooth
Data Communication and Network World of Bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth Aplication
Bluetooth AplicationBluetooth Aplication
Bluetooth Aplication
 
Khetarpal
KhetarpalKhetarpal
Khetarpal
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
NetSim Webinar on Cognitive Radio Networks
NetSim Webinar on Cognitive Radio NetworksNetSim Webinar on Cognitive Radio Networks
NetSim Webinar on Cognitive Radio Networks
 
BLUETOOTH TECHNOLOGY
BLUETOOTH TECHNOLOGYBLUETOOTH TECHNOLOGY
BLUETOOTH TECHNOLOGY
 
IT WRITING SAMPLES PORTFOLIO
IT WRITING SAMPLES PORTFOLIOIT WRITING SAMPLES PORTFOLIO
IT WRITING SAMPLES PORTFOLIO
 
Multi Bandwidth Data path design for 5G Wireless Systems
Multi Bandwidth Data path design for 5G Wireless SystemsMulti Bandwidth Data path design for 5G Wireless Systems
Multi Bandwidth Data path design for 5G Wireless Systems
 
Bluetooth.ppt
Bluetooth.pptBluetooth.ppt
Bluetooth.ppt
 
Distributed IP-PBX
Distributed IP-PBX Distributed IP-PBX
Distributed IP-PBX
 
Frontiers of Wireless and Mobile Communications
Frontiers of Wireless and Mobile CommunicationsFrontiers of Wireless and Mobile Communications
Frontiers of Wireless and Mobile Communications
 

Recently uploaded

Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 

Recently uploaded (20)

Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 

Blue tooth by k pant

  • 3. PREVIEW • PHASE –I INTRODUCTION AND HISTORY • PHASE- II WORKING OF BLUETOOTH NETWORK BWT TOPOLOGIES & CLASSES BWT PROTOCOLS • PHASE- III BWT SECURITY AND MITIGATIONS ADVANTAGES AND DISADVANTAGES APPLICATIONS HEALTH CONCERNS FUTURE TRENDS AND MIL APPLICATIONS
  • 6. INTRODUCTION • SHORT RANGE LOW POWER WIRELESS TECHNOLOGY • INTER CONNECTIONS WITH OTHER PERIPHERALS. • EXCHANGE DATA OVER SHORT DISTANCES. • EASY CONNECTION BETWEEN DEVICES • WIRELESS ALTERNATIVE TO RS-232 DATA CABLES. • MECHANISM TO FORM SHORT AD-HOC NETWORK.
  • 7. HISTORY • 1994: ERICSSON CAME UP WITH A CONCEPT OF “MULTI –COMMUNICATOR LINK”. • RENAMING TO BLUETOOTH IN NAME OF HARALD “BLÅTAND” GORMSEN OR HARALD BLUETOOTH, • 1998 : FOUNDATION OF BLUETOOTH SIG. • 2001 : FIRST CONSUMER PRODUCTS VERSION 1.1 RELEASED. • 2003 - SIG ANNOUNCED VERSION 2.1. • 2004 - BLUETOOTH VERSION 2.0 + EDR (ENHANCED DATA RATE) INTRODUCED.
  • 8. HISTORY • 2007 - BLUETOOTH VERSION 2.1 + EDR ADOPTED BY BLUETOOTH SIG. • 2009 - BLUETOOTH VERSION 3.0 + HS (HIGH SPEED) ADOPTED BY BLUETOOTH SIG. • 2010 - BLUETOOTH CORE SPECIFICATION VERSION 4.0 (CALLED BLUETOOTH SMART) •2013 - BLUETOOTH V4.1 •DECEMBER 2, 2014 - BLUETOOTH V4.2
  • 11. TECHNOLOGY REVIEW • A BLUETOOTH CHIP COMBINES A TRANSMITTER AND RECEIVER, AS SMALLER AS 9 MM X 9 MM AND AN ANTENNA. • UNLICENSED INDUSTRIAL, SCIENTIFIC AND MEDICAL (ISM). • FREQUENCIES BETWEEN 2400 AND 2483.5 MHZ (INCLUDING GUARD BANDS 2 MHZ (BOTTOM) AND 3.5 MHZ (TOP).79 CHANNELS BANDWIDTH OF 1 MHZ. • BLUETOOTH USES FREQUENCY-HOPPING SPREAD SPECTRUM (FHSS). • 1600 HOPS /SEC, WITH ADAPTIVE FREQUENCY- HOPPING (AFH).
  • 13. BLUETOOTH TOPOLOGIES • PICONETS AND SCATTERNET FORMATION. • A MASTER BLUETOOTH DEVICE CAN COMMUNICATE WITH A MAXIMUM OF SEVEN DEVICES IN A PICONET . • MASTER-UNIT ESTABLISHES A FREQUENCY- HOPPING SCHEME. • ROLE SWITCHING, BY AGREEMENT. • ROUND-ROBIN FASHION FOR DATA TRANSFER IN PACKETS.
  • 14. BLUETOOTH CONNECTIONS TWO TYPES OF DATA EXCHANGE “MODE” :- • ASYNCHRONOUS CONNECTION-ORIENTED LOGICAL TRANSPORT (ACL) - USED FOR DATA CONNECTIONS • SYNCHRONOUS CONNECTION-ORIENTED LINK (SCO), ENHANCED SCO (ESCO) – USED FOR VOICE DATA
  • 15. CLASSES OF BLUETOOTH BLUETOOTH DEVICES ARE CLASSIFIED ACCORDING TO THREE DIFFERENT POWER CLASSES, AS SHOWN IN THE FOLLOWING TABLE. CLASS MAX PERMITTED POWER(MW) RANGE(APPROX) IN MTRS Class 1 100 100 Class 2 2.5 50 Class 3 1 10
  • 18. Application Framework and Support Link Manager and L2CAP Radio & BasebandRF Baseband Audio Link Manager L2CAP TCP/IP DATA CONTROL BLUETOOTH PROTOCOLS HID RFCOMM Applications Host Controller Interface
  • 21. BLUETOOTH SECURITY • SUSCEPTIBLE TO SPYING AND REMOTE ACCESS. • INTERFERENCE AND EAVESDROPPING • SAFER TRANSMISSION OF DATA. • INFORMATION INTEGRITY. • DENIAL OF SERVICE, UNINTENDED CONTROL AND ACCESS OF DATA AND VOICE CHANNELS. • UNAUTHORIZED DEVICE CONTROL AND DATA ACCESS.
  • 22. 1. SAFER TRANSMISSION OF DATA a) AUTHENTICATION b) AUTHORIZATION c) ENCRYPTION THREE MODES :- a) MODE 1 - NO SECURITY b) MODE 2 - SERVICE LEVEL SECURITY c) MODE 3 – LINK LEVEL SECURITY(PAIRING BLUETOOTH SECURITY
  • 23. • DEVICES ARE MANUFACTURED WITH A UNIQUE 48-BIT IDENTIFIER KNOWN AS THE BLUETOOTH DEVICE ADDRESS (BD_ADDR). • PUBLICALLY KNOWN AND CAN BE OBTAINED VIA AN INQUIRY ROUTINE PERFORMED BY ANY BLUETOOTH DEVICE. • THE BD_ADDR OF THE MASTER DEVICE IS USED TO DERIVE THE DEVICE ACCESS CODE (DAC) AND THE CHANNEL ACCESS CODE (CAC), WHICH ARE TRANSMITTED IN CLEAR-TEXT. BLUETOOTH SECURITY
  • 24. ERROR CORRECTION 2. ERROR CORRECTION TYPES:- a) FORWARD ERROR CORRECTION (FEC) - REDUCES NO OF RE-TRANSMISSIONS. b) AUTOMATIC REPEAT REQUEST (ARQ) - CORRECTS THE CORRUPTED TRANSMITTED DATA BLOCK. 3. FREQUENCY HOPPING TO AVOID INTERFERENCE
  • 26. MITIGATIONS •ENABLE BLUETOOTH ONLY WHEN REQUIRED. •ENABLE BLUETOOTH DISCOVERY ONLY WHEN NECESSARY, AND DISABLE DISCOVERY WHEN FINISHED. •DO NOT ENTER LINK KEYS OR PINS WHEN UNEXPECTEDLY PROMPTED TO DO SO. •REMOVE PAIRED DEVICES WHEN NOT IN USE. •REGULARLY UPDATE FIRMWARE ON BLUETOOTH- ENABLED DEVICES.
  • 28. ADVANTAGES • ELIMINATES WIRES • FACILITATES DATA AND VOICE COMMUNICATION • OFFERS FORMATION OF AD HOC NETWORKS • STANDARDIZED PROTOCOL • FREE OF CHARGE • EASY TO USE • LOW POWER CONSUMES BATTERY LESS • STATIONARY AND MOBILE ENVIRONMENTS
  • 29. DISADVANTAGES • RELATIVELY SHORT RANGE. • LESS SECURE. • INTERFERENCE WITH OTHER DEVICES. • MEDIOCRE DATA RATES. • BLUETOOTH INTERNET CONNECTION GETS SLOW SOMETIMES.
  • 31. HEALTH CONCERNS • BLUETOOTH USES 2.4 GHZ TO 2.480 GHZ. • SAME FREQUENCY RANGE AS MICROWAVE OVENS. • EMITTED RF ENERGY IS ABSORBED BY THE BODY. • PENETRATION DEPTH IS ABOUT 1.5 CM AT 2450 MHZ. • ABSORPTION IS VERY SUPERFICIAL.
  • 33. FUTURE OF BLUETOOTH GENERIC NAVIGATION SATELLITE SYSTEM (GNSS) • CREATE A WIRELESS SERIAL LINK SO A DEVICE CAN SHARE ITS GPS POSITION DATA USING. AUDIO STREAMING • ADVANCED AUDIO DISTRIBUTION • AUDIO VIDEO REMOTE CONTROL • BROWSE YOUR MP3 PLAYER’S MUSIC AND PLAYLISTS DIRECTLY FROM YOUR CAR USER INTERFACE.
  • 34. RECENT TRADITION TELEPHONY • HANDS FREE PROFILE GENERIC OBJECT EXCHANGE • BETTER QUALITY OF SERVICE. • SERVICE MULTIPLEXING IS NOW ENTIRELY DONE BY L2CAP. • BETTER THROUGHPUT.
  • 35. FUTURE OF BLUETOOTH Bluetooth has a good future ahead because it meets a basic need of connectivity. Currently a protocol is being researched that would support large adhoc networks. Latest version of Bluetooth are improving both its security and capabilities. Ultra wide band has been chosen by the Bluetooth Special Interest Group as the future of Bluetooth Technology. New versions of Bluetooth technology will meet the high-speed and large range. Many companies are designing impressive Bluetooth applications in demand.
  • 36. MILITARY APPLICATIONS IN MILITARY BLUETOOTH TECHNOLOGY CAN BE USED IN VARIOUS FIELDS AS:- A) COMMUNICATION B) SECURITY C) IDENTIFICATION D) TRAINING E) TARGET EVALUATION F) GPS
  • 39. CONCLUSION • A NEW GLOBAL STANDARD FOR DATA AND VOICE -ENABLED DEVICES WHICH OPERATE IN THE UNRESTRICTED 2.4-GHZ ISM BAND. • ELIMINATING CABLES. • LOW POWER, COST NETWORK DEVICES. • BLUETOOTH HAS A BRIGHT FUTURE FOR WIDE USE. • FURTHER IMPROVEMENTS ARE PLANNED TO BE MADE IN – DATA RATES – POWER REDUCTION – RANGE
  • 40.
  • 41. ULTRA WIDE BAND • UWB OR AS DIGITAL PULSE WIRELESS IS A WIRELESS TECHNOLOGY • TRANSMITS LARGE AMOUNTS OF DIGITAL DATA OVER A WIDE SPECTRUM OF FREQUENCY BANDS WITH VERY LOW POWER FOR A SHORT DISTANCE. • CAN CARRY A HUGE AMOUNT OF DATA OVER A DISTANCE UP TO 230 FEET AT VERY LOW POWER (LESS THAN 0.5 MILL WATTS). • ABILITY TO CARRY SIGNALS THROUGH DOORS AND OTHER OBSTACLES

Editor's Notes

  1. First we move towards the introduction
  2. RS232 data cables
  3. FHSS Chops up the data being sent and transmits chunks of it on up to 79 frequencies. 1600 hops/sec- time slot is defined as 625 microseconds Packet 1-5 time slots long FHSS is used to minimize the risk of such interference with systems operating on this Band such as microwave ovens, baby monitors and 802.11 wireless networks. GFSK When we jump from (1,-1 or -1,1), mod waveform changes rapidly, introducing large out of bound spectrum.(no overshoot to a step function input ) Uses Gaussian filter (uses G.Function) to limit its spectral width. GFSK = Baseband pulses(-1,1) gaussian filter FSK modulator FSK = Baseband pulses(-1,1) FSK modulator 1Mb/s with overhead, this effectively becomes 721 kbps. SIG 5 companies joined to form the Bluetooth Special Interest Group (SIG) in 1998. First specification released in July 1999
  4. First we move towards the introduction
  5. FHSS Chops up the data being sent and transmits chunks of it on up to 79 frequencies. 1600 hops/sec- time slot is defined as 625 microseconds Packet 1-5 time slots long FHSS is used to minimize the risk of such interference with systems operating on this Band such as microwave ovens, baby monitors and 802.11 wireless networks. GFSK When we jump from (1,-1 or -1,1), mod waveform changes rapidly, introducing large out of bound spectrum.(no overshoot to a step function input ) Uses Gaussian filter (uses G.Function) to limit its spectral width. GFSK = Baseband pulses(-1,1) gaussian filter FSK modulator FSK = Baseband pulses(-1,1) FSK modulator 1Mb/s with overhead, this effectively becomes 721 kbps. SIG 5 companies joined to form the Bluetooth Special Interest Group (SIG) in 1998. First specification released in July 1999
  6. The slaves in a piconet can only have links to the master. Slaves cannot directly transmit data to one another
  7. Devices that participate in two or more piconets may act as gateways, forwarding traffic from one piconet to another Bluetooth units can only transmit and receive data in one piconet at a time. As devices in mulltiple piconets divide their time between the piconets, spending some time slots in one and some time slots in another on TDM basis. Devices give notification of inactivation to master that it will be inactive for a predetermined length of time. The device will then have to re-synchronize its clock with its other master. When a slave becomes inactive in a piconet, communications between masters and the other active slaves go on as normal. On the other hand, when a master becomes inactive in its piconet, the slaves will have to wait for it to be active again before communication can resume.
  8. FHSS Chops up the data being sent and transmits chunks of it on up to 79 frequencies. 1600 hops/sec- time slot is defined as 625 microseconds Packet 1-5 time slots long FHSS is used to minimize the risk of such interference with systems operating on this Band such as microwave ovens, baby monitors and 802.11 wireless networks. GFSK When we jump from (1,-1 or -1,1), mod waveform changes rapidly, introducing large out of bound spectrum.(no overshoot to a step function input ) Uses Gaussian filter (uses G.Function) to limit its spectral width. GFSK = Baseband pulses(-1,1) gaussian filter FSK modulator FSK = Baseband pulses(-1,1) FSK modulator 1Mb/s with overhead, this effectively becomes 721 kbps. SIG 5 companies joined to form the Bluetooth Special Interest Group (SIG) in 1998. First specification released in July 1999
  9. Most powerful devices Infrared IrDA (WPAN) : synchronization, link between a phone and a laptop… – Less flexible than Bluetooth, need of a line of site – Comparable data rate Wi-Fi (WLAN) : Wireless LAN access – Far higher bandwidth and data rate than Bluetooth – Higher power consumption than Bluetooth – Requires infrastructure investment
  10. The radio layer describes the physical characteristics a Bluetooth device’s receiver-transmitter component must have. These include modulation characteristics, radio frequency tolerance, and sensitivity level.
  11. See ACL links
  12. See ACL links OBEX The Object Exchange Protocol (OBEX) is a specification for object data exchange over infrared (IR) links. Examples for using OBEX include exchanging business cards and synchronizing calendar applications.
  13. See ACL links OBEX The Object Exchange Protocol (OBEX) is a specification for object data exchange over infrared (IR) links. Examples for using OBEX include exchanging business cards and synchronizing calendar applications.
  14. First we move towards the introduction
  15. Interference with other devices that use the same frequency such as baby monitors, microwave over etc. FHSS is used to avoid it.
  16. Interference with other devices that use the same frequency such as baby monitors, microwave over etc. FHSS is used to avoid it.
  17. Interference with other devices that use the same frequency such as baby monitors, microwave over etc. FHSS is used to avoid it.
  18. Standardized protocol supports interoperability of devices of different types.
  19. Standardized protocol supports interoperability of devices of different types.
  20. Standardized protocol supports interoperability of devices of different types.
  21. Many companies are designing and researching impressive bluetooth applications in demand so this shows it has a bright future and it would be difficult for other technology to overcome.
  22. Many companies are designing and researching impressive bluetooth applications in demand so this shows it has a bright future and it would be difficult for other technology to overcome.