SlideShare a Scribd company logo
Bluetooth & CDMA
Technology
Topics to be covered
   Bluetooth
       Introduction
       Name, Idea
       How Bluetooth Technology works
       Advantages
       Disadvantages
       Security
       Future
   CDMA
     Introduction & History
     Key Elements
     Advantages
     Disadvantages
Introduction to Bluetooth Technology
Ultimate Headset
Cordless Computer
   Originally and commonly (in day to day life), it is used to connect
    headset to a mobile phone. Or transferring data from one mobile to
    another (songs, pics, docs, messages).
   Then Bluetooth started being used to connect headsets to a regular
    computer.
   Then progressed on to making printers wireless as well as being
    able to connect to a Bluetooth network.
   Bluetooth is a protocol that allows you to remotely access and use
    devices on a computer or phone without the use of wires.
   Bluetooth is a short-range wireless communications technology.
   These signals travel through walls, windows, doors.
   Uses short-wavelength radio transmissions in the ISM band from
    2400-2480 MHz
   Wireless alternative to data cables.
   BMW was the first motor vehicle manufacturer to install handsfree
    Bluetooth technology in its cars. Followed by Toyota and Lexus.
What’s in the name – Bluetooth?
   Bluetooth was named for the 10th Century Viking king, Harald
    Blatand (aka bluetooth) who peacefully united all tiny island
    kingdoms of Denmark, southern Sweden and Southern Norway into
    one country.
   In keeping with its namesake, Bluetooth, the new low-cost radio
    technology, is designed to unite or connect all different types of
    devices to effectively work as one.
Idea – Bluetooth
   Idea that resulted in the Bluetooth wireless technology was born in
    1994.
   Initiated by Ericsson to investigate feasibility of a low-power, low-
    cost radio interface.
   Bluetooth SIG (Special Interest Group) formed in1998.
   First specification released in July 1999.
   1900 member companies till date.
   Main players
        3Com Corporation
        Ericsson
        IBM
        Intel
        Agere
        Microsoft
        Motorola
        Nokia
How do Bluetooth Technology works?
   Instant formation of networks.
   A piconet is collection of devices connected via Bluetooth technology
        Simple connection between two devices or more devices.
   Unlike infra-red, Bluetooth does not require line-of-sight positioning
    of connected units.
   Embedding tiny, inexpensive, short-range transceivers into the
    electronic devices
   The radio operates on the globally-available unlicensed radio band,
    2.45 GHz
   Supports data speeds of up to 721 Kbps.
   The Bluetooth modules can be either built into electronic devices or
    used as an adaptor. For instance in a PC they can be built in as a
    PC card or externally attached via the USB port.
   Best alternative to data transfer as compared to corrupt DVD/CD
    ROM
What’s the use ????
   Freedom from cables
   Technology is Inexpensive
   Automatic
   Standardized Protocol
   Avoids Interference from other wireless devices
   Low Power Consumption
   Faster Voice and Data sharing
   Instant Personal Area Network (PAN)
   Upgradeable
   Universally accepted
   Simplifies communication while driving
   Best alternative to data transfer as compared to corrupt DVD/CD
    ROM
Core Bluetooth Products
   Notebooks PCs & Desktop Computers
   Printers
   PDAs
   Other Handheld devices
   Cell Phones
   Wireless Peripherals:
     Headsets
     Camers

   CD Player
   TV / VCR / DVD
   Telephone Answering Devices
   Cordless phones
   Cars
Limitations / Disadvantages
   Compatibility between Bluetooth products
   Data Transfer Rate
   Limited Range
   Security
   Battery Use
   Interference with other devices that may use same frequency (e.g.
    garage door openers, cordless phones, microwave ovens, etc)
Security
   Security Measures
      Authentication
      Personal Identification Numbers (PIN) fro device access.
      Long Encryption keys are used (128 bit keys).
      These keys are not transmitted over wireless. Other parameters
       are transmitted over wireless which in combination with certain
       information known to the device, can generate the keys.
      Further encryption can be done.
Bluetooth Vs. Infrared
   Bluetooth                     Infra-Red
      Point to Multi-point          Point to Point
      Data & Voice                  Intended for Data
       Communication.                  Communication only.
      Easier                        Infra-Red, cannot
       Synchronization due             penetrate solid
       to Omni-directional             objects.
      Devices can be mobile         Both devices must be
      Range 10 meters                 stationary.
                                     Range 1 meter.
Future of Bluetooth Technology
   Continually expanding technology.
   The Bluetooth SIG is trying to evolve the Bluetooth technology to
    provide greater bandwidth and distances, thus increasing the
    potential platforms and applications used in the emerging personal
    area networking marketplace.
   New application profiles.
CDMA Technology


Introduction & History
   CDMA (Code Division Multiple Access).
   Both data and voice are separated from signals using codes and
    then transmitted using a wide frequency.
   This leaves more Space left for data transfer.
   14% of the worldwide market goes to CDMA.
   CDMA uses a “spread-spectrum” technique whereby
    electromagnetic energy is spread to allow for a signal with a wider
    bandwidth.
   CDMA is military technology first used during World War II by
    English allies to foil German attempts at jamming transmissions.
    The allies decided to transmit over several frequencies, instead of
    one, making it difficult for the Germans to pick up the complete
    signal.
   The CDMA standard was originally designed by Qualcomm in the
    U.S. and is primarily used in the U.S. and portions of Asia by other
    carriers.
CDMA Technology


  Key Elements
   CDMA is a form of spread spectrum transmission technology. It has
    a number of distinguishing features that are key to spread spectrum
    transmission technologies:

      Use of wide bandwidth: CDMA, like other spread spectrum technologies uses
       a wider bandwidth than would otherwise be needed fort he transmission of the
       data. This results in a number of advantages including an increased immunity to
       interference or jamming, and multiple user access.
      Spreading Codes Used: In order to achieve the increased bandwidth, the data
       is spread by use of a code which is independent of the data.
      Level of security: In order to receive the data, the receiver must have a
       knowledge of the spreading code, without this it is not possible to decipher the
       transmitted data, and this gives a measure of security.
      Multiple access: The use of the spreading codes which are independent for
       each user along with synchronous reception allow multiple users to access the
       same channel simultaneously.
CDMA Technology


  Advantages
   The use of CDMA offers several advantages and it is for this reason
    that CDMA technology has been adopted for many 3G cellular
    telecommunications systems.

        Improvement in capacity and Security: One of the chief claims for CDMA is
         that it gives significant improvements in network capacity.
        With CDMA technology, data and voice packets are separated using codes and
         then transmitted using a wide frequency range. Since more space is often
         allocated for data with CDMA, this standard became attractive for 3G high-speed
         mobile Internet use.
        Low power requirements and little cell-to-cell coordination needed by operators.
        Improvement in handover / handoff: Using CDMA it is possible for a terminal
         to communicate with two base stations at once. As a result, the old link only
         needs to be broken when the new one is firmly established. This provides
         significant improvements in terms of the reliability of handover / handoff from one
         base station to another.
        CDMA has been a particularly successful technology. CDMA technology has
         been used in all the 3G cellular telecommunications systems in one form or
         another and has enabled significant improvements to be gained over previously
         technologies used in 2G systems
CDMA Technology


  Disadvantages
   Due to its proprietary nature, all of CDMA's flaws are not known to
    the engineering community.
   CDMA is relatively new, and the network is not as mature as GSM.
   CDMA cannot offer international roaming, a large GSM advantage.
Questions ??
Thank You.

More Related Content

What's hot

Overview of data communication and networking
Overview of data communication and networkingOverview of data communication and networking
Overview of data communication and networkingSisir Ghosh
 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)
ArunChokkalingam
 
Presentation on Transmission Media
Presentation on Transmission MediaPresentation on Transmission Media
Presentation on Transmission Media
Syed Ahmed Zaki
 
Data communication and computer networks | Network Topologies
Data communication and computer networks | Network TopologiesData communication and computer networks | Network Topologies
Data communication and computer networks | Network Topologies
MSA Technosoft
 
Data communication
Data communicationData communication
Data communication
Burhan Ahmed
 
Computer networks - Channelization
Computer networks - ChannelizationComputer networks - Channelization
Computer networks - Channelization
Elambaruthi Elambaruthi
 
IT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTINGIT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTING
Kathirvel Ayyaswamy
 
Wireless humidity and temperature monitoring system
Wireless humidity and temperature monitoring systemWireless humidity and temperature monitoring system
Wireless humidity and temperature monitoring system
Sagar Srivastav
 
Metropolitan area network
Metropolitan area networkMetropolitan area network
Metropolitan area network
Faizan Rasool
 
Presentation on data communication
Presentation on data communicationPresentation on data communication
Presentation on data communicationHarpreet Dhaliwal
 
Cloud Computing Tools
Cloud Computing ToolsCloud Computing Tools
Cloud Computing Tools
Jithin Parakka
 
Osi model vs TCP/IP
Osi model vs TCP/IPOsi model vs TCP/IP
Osi model vs TCP/IPMannu Khani
 
Layering and Architecture
Layering and ArchitectureLayering and Architecture
Layering and Architecture
selvakumar_b1985
 
Wired Transmission Media
Wired Transmission MediaWired Transmission Media
Wired Transmission Media
nimx106
 
5. protocol layering
5. protocol layering5. protocol layering
5. protocol layering
JAIGANESH SEKAR
 
DSR Protocol
DSR ProtocolDSR Protocol
DSR Protocol
@zenafaris91
 
Presentation on unguided transmission media
Presentation on unguided transmission mediaPresentation on unguided transmission media
Presentation on unguided transmission media
Junayed Noor
 

What's hot (20)

Overview of data communication and networking
Overview of data communication and networkingOverview of data communication and networking
Overview of data communication and networking
 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)
 
Presentation on Transmission Media
Presentation on Transmission MediaPresentation on Transmission Media
Presentation on Transmission Media
 
Data communication and computer networks | Network Topologies
Data communication and computer networks | Network TopologiesData communication and computer networks | Network Topologies
Data communication and computer networks | Network Topologies
 
Data communication
Data communicationData communication
Data communication
 
Computer networks - Channelization
Computer networks - ChannelizationComputer networks - Channelization
Computer networks - Channelization
 
IT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTINGIT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTING
 
Wireless humidity and temperature monitoring system
Wireless humidity and temperature monitoring systemWireless humidity and temperature monitoring system
Wireless humidity and temperature monitoring system
 
Metropolitan area network
Metropolitan area networkMetropolitan area network
Metropolitan area network
 
Presentation on data communication
Presentation on data communicationPresentation on data communication
Presentation on data communication
 
Cloud Computing Tools
Cloud Computing ToolsCloud Computing Tools
Cloud Computing Tools
 
Osi model vs TCP/IP
Osi model vs TCP/IPOsi model vs TCP/IP
Osi model vs TCP/IP
 
Dqdb
DqdbDqdb
Dqdb
 
Layering and Architecture
Layering and ArchitectureLayering and Architecture
Layering and Architecture
 
Wired Transmission Media
Wired Transmission MediaWired Transmission Media
Wired Transmission Media
 
5. protocol layering
5. protocol layering5. protocol layering
5. protocol layering
 
Ch 06
Ch 06Ch 06
Ch 06
 
DSR Protocol
DSR ProtocolDSR Protocol
DSR Protocol
 
Load balancing
Load balancingLoad balancing
Load balancing
 
Presentation on unguided transmission media
Presentation on unguided transmission mediaPresentation on unguided transmission media
Presentation on unguided transmission media
 

Viewers also liked

Lec 1 and 2 evolution
Lec 1 and 2 evolutionLec 1 and 2 evolution
Lec 1 and 2 evolutionSidra Mallick
 
My PptIntroduction to 3G, GSM, GPRS, EDGE Network
My PptIntroduction to 3G, GSM, GPRS, EDGE NetworkMy PptIntroduction to 3G, GSM, GPRS, EDGE Network
My PptIntroduction to 3G, GSM, GPRS, EDGE NetworkARVIND SARDAR
 
Unicast multicast & broadcast
Unicast multicast & broadcastUnicast multicast & broadcast
Unicast multicast & broadcast
NetProtocol Xpert
 
Unicasting , Broadcasting And Multicasting New
Unicasting , Broadcasting And Multicasting NewUnicasting , Broadcasting And Multicasting New
Unicasting , Broadcasting And Multicasting New
techbed
 
Frequency hopping spread spectrum
Frequency hopping spread spectrumFrequency hopping spread spectrum
Frequency hopping spread spectrum
Harshit Gupta
 
CDMA
CDMACDMA
Bluetooth Aplication
Bluetooth AplicationBluetooth Aplication
Bluetooth AplicationEr Bhaduri
 
Cdma ppt for ECE
Cdma ppt for ECECdma ppt for ECE
Cdma ppt for ECE
ajitece
 
ITFT_Microwave, infrared & bluetooth communication
ITFT_Microwave, infrared & bluetooth communicationITFT_Microwave, infrared & bluetooth communication
ITFT_Microwave, infrared & bluetooth communication
Sneh Prabha
 
Near field communication ppt
Near field communication pptNear field communication ppt
Near field communication ppt
Prandeep Shekhawat
 
Bluetooth technology 31 12
Bluetooth technology 31 12Bluetooth technology 31 12
Bluetooth technology 31 12
mohamedobaid
 

Viewers also liked (12)

3g presentation4928
3g presentation49283g presentation4928
3g presentation4928
 
Lec 1 and 2 evolution
Lec 1 and 2 evolutionLec 1 and 2 evolution
Lec 1 and 2 evolution
 
My PptIntroduction to 3G, GSM, GPRS, EDGE Network
My PptIntroduction to 3G, GSM, GPRS, EDGE NetworkMy PptIntroduction to 3G, GSM, GPRS, EDGE Network
My PptIntroduction to 3G, GSM, GPRS, EDGE Network
 
Unicast multicast & broadcast
Unicast multicast & broadcastUnicast multicast & broadcast
Unicast multicast & broadcast
 
Unicasting , Broadcasting And Multicasting New
Unicasting , Broadcasting And Multicasting NewUnicasting , Broadcasting And Multicasting New
Unicasting , Broadcasting And Multicasting New
 
Frequency hopping spread spectrum
Frequency hopping spread spectrumFrequency hopping spread spectrum
Frequency hopping spread spectrum
 
CDMA
CDMACDMA
CDMA
 
Bluetooth Aplication
Bluetooth AplicationBluetooth Aplication
Bluetooth Aplication
 
Cdma ppt for ECE
Cdma ppt for ECECdma ppt for ECE
Cdma ppt for ECE
 
ITFT_Microwave, infrared & bluetooth communication
ITFT_Microwave, infrared & bluetooth communicationITFT_Microwave, infrared & bluetooth communication
ITFT_Microwave, infrared & bluetooth communication
 
Near field communication ppt
Near field communication pptNear field communication ppt
Near field communication ppt
 
Bluetooth technology 31 12
Bluetooth technology 31 12Bluetooth technology 31 12
Bluetooth technology 31 12
 

Similar to Bluetooth & cdma technology

Mobile Technologies
Mobile TechnologiesMobile Technologies
Mobile Technologies
Anjali Verma
 
Presentation on Wireless devices
Presentation on Wireless devicesPresentation on Wireless devices
Presentation on Wireless devices
Unhappy Verse
 
BLUETOOTH.ppt
BLUETOOTH.pptBLUETOOTH.ppt
BLUETOOTH.ppt
TheUltimateFunEntert
 
4g&5g .pdf
4g&5g .pdf4g&5g .pdf
4g&5g .pdf
MianAwais57
 
IT WRITING SAMPLES PORTFOLIO
IT WRITING SAMPLES PORTFOLIOIT WRITING SAMPLES PORTFOLIO
IT WRITING SAMPLES PORTFOLIO
Serena Rinaldi Lambiase
 
Chap 01 introduction to wirelless
Chap 01 introduction to wirelless Chap 01 introduction to wirelless
Chap 01 introduction to wirelless
EngkaderAMuse
 
4G technology
4G technology4G technology
4G technologyArun V
 
5G NETWORKS and 5G WIRELESS TECHNOLOGY
5G NETWORKS and 5G WIRELESS TECHNOLOGY5G NETWORKS and 5G WIRELESS TECHNOLOGY
5G NETWORKS and 5G WIRELESS TECHNOLOGY
oishimustafi1
 
5 G ANTENNASEMINAR PPT final.ppt
5 G ANTENNASEMINAR PPT final.ppt5 G ANTENNASEMINAR PPT final.ppt
5 G ANTENNASEMINAR PPT final.ppt
johnpragasam1
 
4g technology Ganesh Deshmukh
4g technology Ganesh Deshmukh4g technology Ganesh Deshmukh
4g technology Ganesh DeshmukhGanesh Deshmukh
 
Wireless cellular technologies
Wireless cellular technologiesWireless cellular technologies
Wireless cellular technologies
ganeshmaali
 
Wireless cellular technologies
Wireless cellular technologiesWireless cellular technologies
Wireless cellular technologies
ganeshmaali
 
5g
5g5g
COMPUTER NETWORKING.pptx
COMPUTER NETWORKING.pptxCOMPUTER NETWORKING.pptx
COMPUTER NETWORKING.pptx
vibhore jain
 

Similar to Bluetooth & cdma technology (20)

Mobile Technologies
Mobile TechnologiesMobile Technologies
Mobile Technologies
 
Presentation on Wireless devices
Presentation on Wireless devicesPresentation on Wireless devices
Presentation on Wireless devices
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
BLUETOOTH.ppt
BLUETOOTH.pptBLUETOOTH.ppt
BLUETOOTH.ppt
 
4g&5g .pdf
4g&5g .pdf4g&5g .pdf
4g&5g .pdf
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
IT WRITING SAMPLES PORTFOLIO
IT WRITING SAMPLES PORTFOLIOIT WRITING SAMPLES PORTFOLIO
IT WRITING SAMPLES PORTFOLIO
 
4G
4G4G
4G
 
3 Gppt
3 Gppt3 Gppt
3 Gppt
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Presentation1
Presentation1Presentation1
Presentation1
 
Chap 01 introduction to wirelless
Chap 01 introduction to wirelless Chap 01 introduction to wirelless
Chap 01 introduction to wirelless
 
4G technology
4G technology4G technology
4G technology
 
5G NETWORKS and 5G WIRELESS TECHNOLOGY
5G NETWORKS and 5G WIRELESS TECHNOLOGY5G NETWORKS and 5G WIRELESS TECHNOLOGY
5G NETWORKS and 5G WIRELESS TECHNOLOGY
 
5 G ANTENNASEMINAR PPT final.ppt
5 G ANTENNASEMINAR PPT final.ppt5 G ANTENNASEMINAR PPT final.ppt
5 G ANTENNASEMINAR PPT final.ppt
 
4g technology Ganesh Deshmukh
4g technology Ganesh Deshmukh4g technology Ganesh Deshmukh
4g technology Ganesh Deshmukh
 
Wireless cellular technologies
Wireless cellular technologiesWireless cellular technologies
Wireless cellular technologies
 
Wireless cellular technologies
Wireless cellular technologiesWireless cellular technologies
Wireless cellular technologies
 
5g
5g5g
5g
 
COMPUTER NETWORKING.pptx
COMPUTER NETWORKING.pptxCOMPUTER NETWORKING.pptx
COMPUTER NETWORKING.pptx
 

Recently uploaded

Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 

Recently uploaded (20)

Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 

Bluetooth & cdma technology

  • 2. Topics to be covered  Bluetooth  Introduction  Name, Idea  How Bluetooth Technology works  Advantages  Disadvantages  Security  Future  CDMA  Introduction & History  Key Elements  Advantages  Disadvantages
  • 6. Originally and commonly (in day to day life), it is used to connect headset to a mobile phone. Or transferring data from one mobile to another (songs, pics, docs, messages).  Then Bluetooth started being used to connect headsets to a regular computer.  Then progressed on to making printers wireless as well as being able to connect to a Bluetooth network.  Bluetooth is a protocol that allows you to remotely access and use devices on a computer or phone without the use of wires.  Bluetooth is a short-range wireless communications technology.  These signals travel through walls, windows, doors.  Uses short-wavelength radio transmissions in the ISM band from 2400-2480 MHz  Wireless alternative to data cables.  BMW was the first motor vehicle manufacturer to install handsfree Bluetooth technology in its cars. Followed by Toyota and Lexus.
  • 7. What’s in the name – Bluetooth?
  • 8. Bluetooth was named for the 10th Century Viking king, Harald Blatand (aka bluetooth) who peacefully united all tiny island kingdoms of Denmark, southern Sweden and Southern Norway into one country.  In keeping with its namesake, Bluetooth, the new low-cost radio technology, is designed to unite or connect all different types of devices to effectively work as one.
  • 10. Idea that resulted in the Bluetooth wireless technology was born in 1994.  Initiated by Ericsson to investigate feasibility of a low-power, low- cost radio interface.  Bluetooth SIG (Special Interest Group) formed in1998.  First specification released in July 1999.  1900 member companies till date.  Main players  3Com Corporation  Ericsson  IBM  Intel  Agere  Microsoft  Motorola  Nokia
  • 11. How do Bluetooth Technology works?
  • 12. Instant formation of networks.  A piconet is collection of devices connected via Bluetooth technology  Simple connection between two devices or more devices.  Unlike infra-red, Bluetooth does not require line-of-sight positioning of connected units.  Embedding tiny, inexpensive, short-range transceivers into the electronic devices  The radio operates on the globally-available unlicensed radio band, 2.45 GHz  Supports data speeds of up to 721 Kbps.  The Bluetooth modules can be either built into electronic devices or used as an adaptor. For instance in a PC they can be built in as a PC card or externally attached via the USB port.  Best alternative to data transfer as compared to corrupt DVD/CD ROM
  • 14. Freedom from cables  Technology is Inexpensive  Automatic  Standardized Protocol  Avoids Interference from other wireless devices  Low Power Consumption  Faster Voice and Data sharing  Instant Personal Area Network (PAN)  Upgradeable  Universally accepted  Simplifies communication while driving  Best alternative to data transfer as compared to corrupt DVD/CD ROM
  • 15. Core Bluetooth Products  Notebooks PCs & Desktop Computers  Printers  PDAs  Other Handheld devices  Cell Phones  Wireless Peripherals:  Headsets  Camers  CD Player  TV / VCR / DVD  Telephone Answering Devices  Cordless phones  Cars
  • 17. Compatibility between Bluetooth products  Data Transfer Rate  Limited Range  Security  Battery Use  Interference with other devices that may use same frequency (e.g. garage door openers, cordless phones, microwave ovens, etc)
  • 19. Security Measures  Authentication  Personal Identification Numbers (PIN) fro device access.  Long Encryption keys are used (128 bit keys).  These keys are not transmitted over wireless. Other parameters are transmitted over wireless which in combination with certain information known to the device, can generate the keys.  Further encryption can be done.
  • 20. Bluetooth Vs. Infrared  Bluetooth  Infra-Red  Point to Multi-point  Point to Point  Data & Voice  Intended for Data Communication. Communication only.  Easier  Infra-Red, cannot Synchronization due penetrate solid to Omni-directional objects.  Devices can be mobile  Both devices must be  Range 10 meters stationary.  Range 1 meter.
  • 21. Future of Bluetooth Technology
  • 22. Continually expanding technology.  The Bluetooth SIG is trying to evolve the Bluetooth technology to provide greater bandwidth and distances, thus increasing the potential platforms and applications used in the emerging personal area networking marketplace.  New application profiles.
  • 24. CDMA (Code Division Multiple Access).  Both data and voice are separated from signals using codes and then transmitted using a wide frequency.  This leaves more Space left for data transfer.  14% of the worldwide market goes to CDMA.  CDMA uses a “spread-spectrum” technique whereby electromagnetic energy is spread to allow for a signal with a wider bandwidth.  CDMA is military technology first used during World War II by English allies to foil German attempts at jamming transmissions. The allies decided to transmit over several frequencies, instead of one, making it difficult for the Germans to pick up the complete signal.  The CDMA standard was originally designed by Qualcomm in the U.S. and is primarily used in the U.S. and portions of Asia by other carriers.
  • 25. CDMA Technology Key Elements
  • 26. CDMA is a form of spread spectrum transmission technology. It has a number of distinguishing features that are key to spread spectrum transmission technologies:  Use of wide bandwidth: CDMA, like other spread spectrum technologies uses a wider bandwidth than would otherwise be needed fort he transmission of the data. This results in a number of advantages including an increased immunity to interference or jamming, and multiple user access.  Spreading Codes Used: In order to achieve the increased bandwidth, the data is spread by use of a code which is independent of the data.  Level of security: In order to receive the data, the receiver must have a knowledge of the spreading code, without this it is not possible to decipher the transmitted data, and this gives a measure of security.  Multiple access: The use of the spreading codes which are independent for each user along with synchronous reception allow multiple users to access the same channel simultaneously.
  • 27. CDMA Technology Advantages
  • 28. The use of CDMA offers several advantages and it is for this reason that CDMA technology has been adopted for many 3G cellular telecommunications systems.  Improvement in capacity and Security: One of the chief claims for CDMA is that it gives significant improvements in network capacity.  With CDMA technology, data and voice packets are separated using codes and then transmitted using a wide frequency range. Since more space is often allocated for data with CDMA, this standard became attractive for 3G high-speed mobile Internet use.  Low power requirements and little cell-to-cell coordination needed by operators.  Improvement in handover / handoff: Using CDMA it is possible for a terminal to communicate with two base stations at once. As a result, the old link only needs to be broken when the new one is firmly established. This provides significant improvements in terms of the reliability of handover / handoff from one base station to another.  CDMA has been a particularly successful technology. CDMA technology has been used in all the 3G cellular telecommunications systems in one form or another and has enabled significant improvements to be gained over previously technologies used in 2G systems
  • 29. CDMA Technology Disadvantages
  • 30. Due to its proprietary nature, all of CDMA's flaws are not known to the engineering community.  CDMA is relatively new, and the network is not as mature as GSM.  CDMA cannot offer international roaming, a large GSM advantage.