This document provides an introduction to Bluetooth technology. It discusses that Bluetooth allows for short-range wireless transmission of voice and data between various devices. It then covers how Bluetooth works through spread spectrum frequency hopping and encryption. Various transmission types and rates are described. Bluetooth networks can connect multiple devices in piconets and scatter nets. Examples of Bluetooth applications include wireless peripherals and personal area networks.
2.4 GHz Open band
Globally available
Other devices include microwave ovens, cordless phones
Frequency hopping and Time Division Multiplexing
10 – 100 meter range
Up to 8 active devices can be in the same piconet
2.4 GHz Open band
Globally available
Other devices include microwave ovens, cordless phones
Frequency hopping and Time Division Multiplexing
10 – 100 meter range
Up to 8 active devices can be in the same piconet
ABSTRACT
Cloud computing promises to significantly change the way we use computers and access and store our personal and business information. With these new computing and communications paradigms arise new data security challenges. Existing data protection mechanisms such as encryption have failed in preventing data theft attacks, especially those perpetrated by an insider to the cloud provider. For securing user data from such attacks a new paradigm called fog computing can be used. Fog Computing is a paradigm that extends Cloud computing and services to the edge of the network. Similar to Cloud, Fog provides data, compute, storage, and application services to end-users. The motivation of Fog computing lies in a series of real scenarios, such as Smart Grid, smart traffic lights in vehicular networks and software defined network .This technique can monitor the user activity to identify the legitimacy and prevent from any unauthorized user access. Here we have discussed this paradigm for preventing misuse of user data and securing information.
Blue eyes- The perfect presentation for a technical seminarkajol agarwal
The technology that gifts you with a friend, a right choice for people who are lazy , a technology that caters to help all age groups and helps to share your emotions and feelings with your computer. Computer with human power!
ABSTRACT
Cloud computing promises to significantly change the way we use computers and access and store our personal and business information. With these new computing and communications paradigms arise new data security challenges. Existing data protection mechanisms such as encryption have failed in preventing data theft attacks, especially those perpetrated by an insider to the cloud provider. For securing user data from such attacks a new paradigm called fog computing can be used. Fog Computing is a paradigm that extends Cloud computing and services to the edge of the network. Similar to Cloud, Fog provides data, compute, storage, and application services to end-users. The motivation of Fog computing lies in a series of real scenarios, such as Smart Grid, smart traffic lights in vehicular networks and software defined network .This technique can monitor the user activity to identify the legitimacy and prevent from any unauthorized user access. Here we have discussed this paradigm for preventing misuse of user data and securing information.
Blue eyes- The perfect presentation for a technical seminarkajol agarwal
The technology that gifts you with a friend, a right choice for people who are lazy , a technology that caters to help all age groups and helps to share your emotions and feelings with your computer. Computer with human power!
3. Bluetooth is a radio frequency specification for short
range, point to point and to multi point voice and data
transfer.
In spite of facilitating the replacement of cables,
Bluetooth technology work as an universal medium to
bridge the existing data networks, a peripheral
interface for existing devices and provide a mechanism
to form short ad hok network of connected devices
away fro fixed network infrastructure
5. In keeping its namesake, Bluetooth, the new
low cost radio technology, is designed to unite
or connect all different types of devices to
effectively work as one.
7. Bluetooth wireless technology is designed to be as secure as
a wire with up to 128 – bit public/ private key
authentication, and streaming cipher up to64 bit based on
a5 security .
8. Transmission types and rates :
The baseband (single channel per line)protocols combines
circuit and packet switching. To assure that packets do not
arrive out of order, slots (up to five) can be reserved
synchronous packet. Circuit switching can be either
asynchronous or synchronous. Up to three synchronous and
one asynchronous data channel, can be supported on one
channel. Each synchronous channel support 64Kbs transfer
rate which is fully adequate for voice transmissions. An
asynchronous channel can transmit as much as 721KBs in
one direction and 57.6Kbs in the opposite direction .It is also
possible for an asynchronous connection to support
432.6Kbs in both direction if the link is symmetric.
17. VOICE /DATA ACCESS POINT
Voice/data access points is one of the key initial usage models and involves connecting a computer device to a communicating
device via a secure wireless link.
21. It separates the frequency band into hops. This spread
spectrum is used to from one channel to another, which
adds a strong layer of security.
Up to eight devices can be networked in piconet.
Signals can be transmitted through walls and briefcases,
thus eliminating the need for line-of-sight.
Devices do not need to be pointed at each other, as signals
are Omni-directional.
Governments worldwide regulate it, so it is possible to
utilize the same standard wherever one travels.
22. COMPETING TECHNOLOGIES
IrDA
WIRELESS
LAN
•For cable replacement, the
infrared standard IrDA has been
around for several years and its
quite widespread.
•Wireless LAN based on the lEEE
BO2.11b standard are used to
replace a wired LAN throughout a
building The transmission is high
and so is the number of
simultaneous users.
24. 1.) No line of site restrictions as with IrDA.
2.) Power consumption makes integrated in battery
powered devices very practical.
3.) 2.4GHz radio frequency ensures worldwide
operability.
Tremendous momentum not only within the
computer industry but other industries like cellular
telephones and transportation.
26. AUTOMATIC Check –in
Hotels are testing , or plan to test ,services that allow
guests to check in, unlock room doors and even control
room temperature with handheld devices equipped with
Bluetooth Technology.