Submitted By: Amit Dovtya
INDEX Introduction Circuit Diagram Bluetooth Architecture Bluetooth Profiles Profiles In Bluetooth Advantages Disadvantages Security Applications Future scope
INTRODUCTION WHAT IS BLUETOOTH ? CONSORTIUM FOR BLUETOOTH TECHNOLOGY, SIG (SPECIAL INTEREST GROUP) ARCHITECTURE PICONET
S S S S S M S S S S S S M PICONET -1 PICONET -2 BRIDGE SLAVE PARKED SLAVE ACTIVE SLAVE
BLUETOOTH ARCHITECTURE PICONET SCATTERNET
BLUETOOTH PROFILES WHAT IS BLUETOOH PROFILE? PROFILES USED IN BLUETOOTH GENERIC ACCESS SERVICE DISCOVERY SERIAL PORT GENERIC OBJECT EXCHANGE LAN ACCESS
PROFILES IN BLUETOOTH DIAL-UP-NETWORKING FAX CORDLESS TELEPHONE HEADSET INTERCOM FILE TRANSFER SYNCHRONIZATION
ADVANTAGES OF BLUETOOTH SYNCHRONIZED INFORMATION ELIMINATES WIRE INEXPENSIVE KEEP PHONE SECURE FACILITY OF BOTH DATA & VOICE COMMUNICATION
DISADVANTAGES OF  BLUETOOTH COMPATIBILITY SECURITY RELATIVELY SHORT RANGE MEDIOCRE DATA TRANSFER RATE INTERFERENCE WITH OTHER DEVICES
BLUETOOTH SECURITY BLUEJACKING BLUESNARFING SECURITY MODES PASSKEYS
APPLICATIONS OF BLUETOOTH AT HOME HOME AUTOMATION CELL PHONES INTERCOM RTLS(REAL TIME LOCATION SYSTEM) ETHERNET
FUTURE SCOPE RETAIL AND E-COMMERCE MEDICAL TRAVEL HOME NETWORKING
THANK YOU
Queries

Bluetooth presentation