SlideShare a Scribd company logo
BLUETOOTH BASICS
Introduction The much hyped Bluetooth wireless technology has progressed at a snail’s pace. However it is gaining fresh momentum with a number of companies releasing Bluetooth-enabled consumer products. Let’s check out how Bluetooth drives these devices wireless.
BLUETOOTH HISTORY In 1994, Ericsson mobile communication began to examine alternatives to cables linking accessories with their mobile phones. This study produced the initial specification for wireless technology, with the Bluetooth Special Interest Group(SIG) founded in february 1998 by the core promoters , viz,  Ericsson mobile, Intel, IBM, Toshiba and Nokia mobile . Later  the core promoter group was enlarged with the inclusion of Microsoft, Agere, 3Com and Motorola.
[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object]
Advantages of Bluetooth  Bluetooth enabled devices are designed to be mobile, reliable and robust
How does Bluetooth actually works ? When two Bluetooth devices communicate, one device is designated the master & the other device is designated the slave. Data transfer rate between master & slave is approx. 1Mbps. The Bluetooth network is completely self-organising and can be established whenever two or more Bluetooth devices are close enough to establish radio contact. The devices automatically search for other Bluetooth enabled device in their vicinity. Upon establishing a contact, information is exchanged, which determines whether the connection should be completed or not. Bluetooth devices connect via a process of authorisation & authentication .

More Related Content

What's hot

TRENDS IN WIRELESS COMPUTING-E.HARSHITHA
TRENDS IN WIRELESS COMPUTING-E.HARSHITHATRENDS IN WIRELESS COMPUTING-E.HARSHITHA
TRENDS IN WIRELESS COMPUTING-E.HARSHITHA
Harshitha Ediga
 
Mobile computing
Mobile computingMobile computing
Mobile computing
lalit arora
 
5G Technology - The Future of Internet
5G Technology - The Future of Internet5G Technology - The Future of Internet
5G Technology - The Future of Internet
InterCon
 
How Wireless Networks/Bluetooth Works And Its Role Today
How Wireless Networks/Bluetooth Works And Its Role TodayHow Wireless Networks/Bluetooth Works And Its Role Today
How Wireless Networks/Bluetooth Works And Its Role Todaymhenderson132
 
Mobile computing -- Introduction
Mobile computing -- IntroductionMobile computing -- Introduction
Mobile computing -- Introductionnicole_wang
 
How wifi has improved your life?
How wifi has improved your life?How wifi has improved your life?
How wifi has improved your life?
Madhav Dhamija
 
Wireless network presentation
Wireless network presentationWireless network presentation
Wireless network presentation
Yaswanth Kalepalli
 
Computer wireless trends
Computer wireless trendsComputer wireless trends
Computer wireless trends
DevanshTelanga
 
Wireless computing
Wireless computingWireless computing
Wireless computing
Mukul Kumar
 
Wireless technology
Wireless technologyWireless technology
Wireless technologyFatma Ala'a
 
WIFI
WIFIWIFI
Bluetooth
BluetoothBluetooth
M1 computer networks
M1 computer networksM1 computer networks
M1 computer networksCarlTodd
 
5G Technology Making its Way to the Market!
5G Technology Making its Way to the Market!5G Technology Making its Way to the Market!
5G Technology Making its Way to the Market!
Fluper
 
Bluetooth Wireless Multimedia Technology
Bluetooth Wireless Multimedia TechnologyBluetooth Wireless Multimedia Technology
Bluetooth Wireless Multimedia Technology
Pratikdd
 
Mobile computing
Mobile computingMobile computing
Mobile computing
Khushboo Shaukat
 
Evolution from 3_g_to_4g_and_beyond_5g
Evolution from 3_g_to_4g_and_beyond_5gEvolution from 3_g_to_4g_and_beyond_5g
Evolution from 3_g_to_4g_and_beyond_5g
OPPO MOBILE TECHNOLOGY PAKISTAN
 

What's hot (20)

TRENDS IN WIRELESS COMPUTING-E.HARSHITHA
TRENDS IN WIRELESS COMPUTING-E.HARSHITHATRENDS IN WIRELESS COMPUTING-E.HARSHITHA
TRENDS IN WIRELESS COMPUTING-E.HARSHITHA
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
It (bluetoth)
It (bluetoth)It (bluetoth)
It (bluetoth)
 
5G Technology - The Future of Internet
5G Technology - The Future of Internet5G Technology - The Future of Internet
5G Technology - The Future of Internet
 
How Wireless Networks/Bluetooth Works And Its Role Today
How Wireless Networks/Bluetooth Works And Its Role TodayHow Wireless Networks/Bluetooth Works And Its Role Today
How Wireless Networks/Bluetooth Works And Its Role Today
 
Mobile computing -- Introduction
Mobile computing -- IntroductionMobile computing -- Introduction
Mobile computing -- Introduction
 
3 g vs wifi
3 g vs wifi3 g vs wifi
3 g vs wifi
 
How wifi has improved your life?
How wifi has improved your life?How wifi has improved your life?
How wifi has improved your life?
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
 
Wireless network presentation
Wireless network presentationWireless network presentation
Wireless network presentation
 
Computer wireless trends
Computer wireless trendsComputer wireless trends
Computer wireless trends
 
Wireless computing
Wireless computingWireless computing
Wireless computing
 
Wireless technology
Wireless technologyWireless technology
Wireless technology
 
WIFI
WIFIWIFI
WIFI
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
M1 computer networks
M1 computer networksM1 computer networks
M1 computer networks
 
5G Technology Making its Way to the Market!
5G Technology Making its Way to the Market!5G Technology Making its Way to the Market!
5G Technology Making its Way to the Market!
 
Bluetooth Wireless Multimedia Technology
Bluetooth Wireless Multimedia TechnologyBluetooth Wireless Multimedia Technology
Bluetooth Wireless Multimedia Technology
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Evolution from 3_g_to_4g_and_beyond_5g
Evolution from 3_g_to_4g_and_beyond_5gEvolution from 3_g_to_4g_and_beyond_5g
Evolution from 3_g_to_4g_and_beyond_5g
 

Similar to Bluetooth

Bluetooth
BluetoothBluetooth
Bluetooth
Pranati Das
 
siddharth bt ppt.pptx
siddharth bt ppt.pptxsiddharth bt ppt.pptx
siddharth bt ppt.pptx
HindujaBairi
 
Understanding bluetooth
Understanding bluetoothUnderstanding bluetooth
Understanding bluetoothKumar
 
Understanding bluetooth
Understanding bluetoothUnderstanding bluetooth
Understanding bluetooth
madhu428
 
Bluetooth
BluetoothBluetooth
Bluetooth
Hina Saxena
 
Bluetooth
BluetoothBluetooth
Bluetooth
kajalsingh177
 
226335 633858374451812775
226335 633858374451812775226335 633858374451812775
226335 633858374451812775pratikpatilp
 
3D bluetooth(VHGOHEL)
3D  bluetooth(VHGOHEL)3D  bluetooth(VHGOHEL)
3D bluetooth(VHGOHEL)
Vishal Gohel
 
Arthi.pptx
Arthi.pptxArthi.pptx
Arthi.pptx
PALANIAPPANC2
 
IT WRITING SAMPLES PORTFOLIO
IT WRITING SAMPLES PORTFOLIOIT WRITING SAMPLES PORTFOLIO
IT WRITING SAMPLES PORTFOLIO
Serena Rinaldi Lambiase
 
Bluetooth.ppt
Bluetooth.pptBluetooth.ppt
Bluetooth.ppt
asiamohamed1909
 
Bluetooth ppt
Bluetooth pptBluetooth ppt
Bluetooth ppt
sanjeev kumar suman
 
Bluetooth- A wireless technology
Bluetooth- A wireless technologyBluetooth- A wireless technology
Bluetooth- A wireless technology
Neha Jella
 
Bluetooth
BluetoothBluetooth
Bluetooth
XadafAttique
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technologymathan0071
 
Bluetooth smart technology(description about all versions)
Bluetooth smart technology(description about all versions)Bluetooth smart technology(description about all versions)
Bluetooth smart technology(description about all versions)
lurdhu agnes
 
Bluetooth paper presentation ieee
Bluetooth paper presentation ieee Bluetooth paper presentation ieee
Bluetooth paper presentation ieee
Rohith Raj
 

Similar to Bluetooth (20)

Bluetooth
BluetoothBluetooth
Bluetooth
 
siddharth bt ppt.pptx
siddharth bt ppt.pptxsiddharth bt ppt.pptx
siddharth bt ppt.pptx
 
Understanding bluetooth
Understanding bluetoothUnderstanding bluetooth
Understanding bluetooth
 
Understanding bluetooth
Understanding bluetoothUnderstanding bluetooth
Understanding bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
226335 633858374451812775
226335 633858374451812775226335 633858374451812775
226335 633858374451812775
 
3D bluetooth(VHGOHEL)
3D  bluetooth(VHGOHEL)3D  bluetooth(VHGOHEL)
3D bluetooth(VHGOHEL)
 
Arthi.pptx
Arthi.pptxArthi.pptx
Arthi.pptx
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
IT WRITING SAMPLES PORTFOLIO
IT WRITING SAMPLES PORTFOLIOIT WRITING SAMPLES PORTFOLIO
IT WRITING SAMPLES PORTFOLIO
 
Bluetooth.ppt
Bluetooth.pptBluetooth.ppt
Bluetooth.ppt
 
Bluetooth ppt
Bluetooth pptBluetooth ppt
Bluetooth ppt
 
Bluetooth- A wireless technology
Bluetooth- A wireless technologyBluetooth- A wireless technology
Bluetooth- A wireless technology
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
 
Blutooth technology
Blutooth technologyBlutooth technology
Blutooth technology
 
Bluetooth smart technology(description about all versions)
Bluetooth smart technology(description about all versions)Bluetooth smart technology(description about all versions)
Bluetooth smart technology(description about all versions)
 
Bluetooth paper presentation ieee
Bluetooth paper presentation ieee Bluetooth paper presentation ieee
Bluetooth paper presentation ieee
 
Bluetooth
BluetoothBluetooth
Bluetooth
 

Recently uploaded

GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 

Recently uploaded (20)

GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 

Bluetooth

  • 2. Introduction The much hyped Bluetooth wireless technology has progressed at a snail’s pace. However it is gaining fresh momentum with a number of companies releasing Bluetooth-enabled consumer products. Let’s check out how Bluetooth drives these devices wireless.
  • 3. BLUETOOTH HISTORY In 1994, Ericsson mobile communication began to examine alternatives to cables linking accessories with their mobile phones. This study produced the initial specification for wireless technology, with the Bluetooth Special Interest Group(SIG) founded in february 1998 by the core promoters , viz, Ericsson mobile, Intel, IBM, Toshiba and Nokia mobile . Later the core promoter group was enlarged with the inclusion of Microsoft, Agere, 3Com and Motorola.
  • 4.
  • 5.
  • 6. Advantages of Bluetooth Bluetooth enabled devices are designed to be mobile, reliable and robust
  • 7. How does Bluetooth actually works ? When two Bluetooth devices communicate, one device is designated the master & the other device is designated the slave. Data transfer rate between master & slave is approx. 1Mbps. The Bluetooth network is completely self-organising and can be established whenever two or more Bluetooth devices are close enough to establish radio contact. The devices automatically search for other Bluetooth enabled device in their vicinity. Upon establishing a contact, information is exchanged, which determines whether the connection should be completed or not. Bluetooth devices connect via a process of authorisation & authentication .