Bluetooth wireless sensor networks can be implemented using Bluetooth technology. Smart sensor nodes equipped with sensors, microprocessors and Bluetooth communication interface can collect data and transmit it to a gateway node. The network involves discovering Bluetooth devices, establishing connections and exchanging data. Algorithms are used for initialization, discovery, parameter setting and data transfer between nodes. While Bluetooth provides benefits like being wireless and inexpensive, it also has limitations such as average data rates and security risks.
2.4 GHz Open band
Globally available
Other devices include microwave ovens, cordless phones
Frequency hopping and Time Division Multiplexing
10 – 100 meter range
Up to 8 active devices can be in the same piconet
This presentation provides an brief introduction about Bluetooth Low Energy. This also covers the basic protocol layers of bluetooth low energy. Also discusses about the ble device discovery, service discovery, connection establishment, connection termination, etc.
Bluetooth is a low-cost, short-range wireless technology with
small footprint, small power consumption, reasonable
throughput and hence suitable for various small, batterydriven devices like mobile phones, PDAs, cameras, laptops
etc. Development of the Bluetooth started several years ago
with the intention to replace all sorts of cables used to
connect different devices. In meantime the idea has evolved
and Bluetooth is now developing not just as a point-to-point,
but as a network technology as well.
Bluetooth has gone through periods of big hype when it was
considered as the best short-range technology as well as
through periods when it was considered a failure. However,
the last year could be seen as the turning point year for
Bluetooth. A lot of various Bluetooth devices and accessories
appeared on the market, broad range of users is able to use it
and first experiences are generally positive. The main
challenge in front of Bluetooth developers now is to prove
interoperability between different manufacturers’ devices and
to provide numerous interesting applications. An example of
such applications are wireless sensor networks.
Bluetooth operates in the 2.4GHz frequency band and uses
frequency hopping spread spectrum technique. There are 79
channels, each 1MHz wide, available for hopping.
A Bluetooth device has to be member of a piconet to be able
to communicate with other devices. A piconet is a collection
of up to 8 devices that frequency hop together. Each piconet
has one master, usually the device that initiated establishment
of the piconet, and up to 7 slave devices. Master’s Bluetooth
address is used for definition of the frequency hopping
sequence. Slave devices use the master’s clock to
synchronize their clocks to be able to hop simultaneously.
Wireless sensor networks are an interesting research area
with many possible applications. They are based on
collaborative effort of many small devices capable of
communicating and processing data. There are still many
open issues ranging from the choice of physical and MAC
layer to design of routing and application level protocols.
Bluetooth is a possible choice for data communication in
sensor networks. Good throughput, low-power, low-cost,
standardized specification and hardware availability are
Bluetooth advantages, while slow connection establishment
and lack of scatternet support are some of the deficiencies.
An initial implementation of a Bluetooth based sensor
network platform is presented. Implemented functionality and
various problems experienced during the implementation are
described. Implemented platform presents a good
environment for further research and development of sensor
network protocols and algorithms.
It includes versions of Bluetooth, how Bluetooth works, Bluetooth profile, Bluetooth core architecture, power classes of Bluetooth, Bluetooth protocol, advantages and applications of Bluetooth.
This presentation describes the future perspectives of embedded devices due to the spread of ubiquitous applications. The presentation shows the transition from Internet of Things to Web of Things and presents Webinos as a platform for WoT
Embedded systems The Past Present and the FutureSrikanth KS
This presentation provides an overview of the trends in embedded systems. It will mainly help engineering students to select a good final year project.
2.4 GHz Open band
Globally available
Other devices include microwave ovens, cordless phones
Frequency hopping and Time Division Multiplexing
10 – 100 meter range
Up to 8 active devices can be in the same piconet
This presentation provides an brief introduction about Bluetooth Low Energy. This also covers the basic protocol layers of bluetooth low energy. Also discusses about the ble device discovery, service discovery, connection establishment, connection termination, etc.
Bluetooth is a low-cost, short-range wireless technology with
small footprint, small power consumption, reasonable
throughput and hence suitable for various small, batterydriven devices like mobile phones, PDAs, cameras, laptops
etc. Development of the Bluetooth started several years ago
with the intention to replace all sorts of cables used to
connect different devices. In meantime the idea has evolved
and Bluetooth is now developing not just as a point-to-point,
but as a network technology as well.
Bluetooth has gone through periods of big hype when it was
considered as the best short-range technology as well as
through periods when it was considered a failure. However,
the last year could be seen as the turning point year for
Bluetooth. A lot of various Bluetooth devices and accessories
appeared on the market, broad range of users is able to use it
and first experiences are generally positive. The main
challenge in front of Bluetooth developers now is to prove
interoperability between different manufacturers’ devices and
to provide numerous interesting applications. An example of
such applications are wireless sensor networks.
Bluetooth operates in the 2.4GHz frequency band and uses
frequency hopping spread spectrum technique. There are 79
channels, each 1MHz wide, available for hopping.
A Bluetooth device has to be member of a piconet to be able
to communicate with other devices. A piconet is a collection
of up to 8 devices that frequency hop together. Each piconet
has one master, usually the device that initiated establishment
of the piconet, and up to 7 slave devices. Master’s Bluetooth
address is used for definition of the frequency hopping
sequence. Slave devices use the master’s clock to
synchronize their clocks to be able to hop simultaneously.
Wireless sensor networks are an interesting research area
with many possible applications. They are based on
collaborative effort of many small devices capable of
communicating and processing data. There are still many
open issues ranging from the choice of physical and MAC
layer to design of routing and application level protocols.
Bluetooth is a possible choice for data communication in
sensor networks. Good throughput, low-power, low-cost,
standardized specification and hardware availability are
Bluetooth advantages, while slow connection establishment
and lack of scatternet support are some of the deficiencies.
An initial implementation of a Bluetooth based sensor
network platform is presented. Implemented functionality and
various problems experienced during the implementation are
described. Implemented platform presents a good
environment for further research and development of sensor
network protocols and algorithms.
It includes versions of Bluetooth, how Bluetooth works, Bluetooth profile, Bluetooth core architecture, power classes of Bluetooth, Bluetooth protocol, advantages and applications of Bluetooth.
This presentation describes the future perspectives of embedded devices due to the spread of ubiquitous applications. The presentation shows the transition from Internet of Things to Web of Things and presents Webinos as a platform for WoT
Embedded systems The Past Present and the FutureSrikanth KS
This presentation provides an overview of the trends in embedded systems. It will mainly help engineering students to select a good final year project.
Classification of Networks & Network topologiesPriyanka Nain
These are the slides regarding Computer Network means what is computer network.Classification of Network that consists of LAN,MAN & WAN. Then we have Network Topologies that are- Bus,Star,Ring,Mesh & Tree Topology.
The aim of this list of programming languages is to include all notable programming languages in existence, both those in current use and ... Note: This page does not list esoteric programming languages. .... Computer programming portal ...
Electric cars are automobiles, which are powered by the electric engine and electric energy. The development of the electric vehicles is a very perspective and important process. Scientists and engineers managed to create electric engines which are no less effective than the ordinary engines used today. It is obvious that electric cars are more ecologically safe and require less energy for work. EVs provide fast acceleration by delivering power instantly to the wheels by providing high torque at low speeds; they give a feel of smooth and quick responsiveness (Technology).
There use are not only for the purpose of electroplating process but for the service engineering too and these can be made from the pure fabric that is polypropylene. To know more about Filter Bags, Please visit our Official Page www.filterclothindia.co.in
Presentation on sparkler filter bag with slide show. This presentation is for education purpose only. For Commercial interest or requirements, PL visit www.filterclothindia.co.in
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
4. Introduction
Bluetooth Wireless Technology (BWT) was developed in
1994 at Ericsson in Sweden.
It is named for Harald Blaatand.
Bluetooth-Wireless and Automatic technology simplifying
art of communication.
Frequency used is 2.45 GHz, same used in ISM devices.
Purpose – Originally it was build to eliminate the need for
cable connections between PDAs and notebook PCs.
Later the goals were to enable different devices through
a commonly accepted standard for wireless connectivity
. Ericsson on advent of BWT conceptualized a Radio
Technology through a wireless personal area network
(WPAN).
5. Bluetooth Specification
Bluetooth-Wireless technology providing
link between mobile and electronic
devices.
It operates on 2.45 GHz radio signals
using frequency hopping spread spectrum.
Technology of Bluetooth concentrates on
short range of communication.
6. Bluetooth Specification
•Standard: IEEE 802.15
•ISM Band Frequency: 2.4 GHz
•Range: 10 – 100 meters
•Channel Bandwidth: 1 Mbps
•Maximum Asymmetric Data Transfer
Rate: 721 Kbps
7. Types of Bluetooth Wireless
Technology
Depending on the power consumption
and range of the device, there are 3
Bluetooth Classes as:
•Class 1: Max Power – 100mW ;
Range – 100 m
•Class 2: Max Power – 2.5mW ;
Range – 10 m
•Class 3: Max Power – 1mW ;
Range – 1 m
8. Why the name Bluetooth?
The name was adopted as a tribute to
the tenth-century vikingking Harald
Blatand who peacefully united
Denmark and Norway.
Harald liked to eat blueberries,
which gave his teeth the coloration
that lead to the nickname
"Bluetooth."
9. How to reduce interference?
•BWT devices hop randomly between
frequencies up to 1600 times per
second.
•So,if another device using a 2.4 GHz
frequency (e.g.:cordless phone) ,
then the interference with the BWT
network lasts only for about 1/1600
of a second.
•By then, the devices hop to another
frequency.
11. Bluetooth Basics
Bluetooth is low powered and low cost.
All the devices follow a uniform structure
Devices Connect through network called
Pico nets.
Strength lies in handling data and video
transmission simultaneously.
12. Bluetooth Basics
Specification- Bluetooth specification gives
developers data link and application layer
definitions
Spectrum-Bluetooth operates between 2.4
and 2.485 GHz using a frequency hopping
spread spectrum.
Interference- is reduced using Adaptive
Frequency Hopping allowing a better
efficiency and greater performance.
14. i.Piconet Topology
•A piconet consists of upto 8 BWT-
enabled devices.
•When piconet is established, one
device sets up frequency-hopping
pattern and other devices
synchronize their signals to the same
pattern.
•Each piconet has a different
frequency-hopping pattern.
16. ii.Scatternet Topology
•Scatternet consists of several piconets
connected by devices participating in
multiple piconet.
• There is a ‘BRIDGE’ connecting 2
piconets which is also a slave in
individual piconets.
Advantages of Scatternet :
•Higher throughput
•Multi-hop connections between devices
indifferent piconets
18. Future Of Bluetooth
•BROADCAST CHANNELS:Adoption of
Bluetooth into mobile phones and
enable advertising models based on
users pulling information from the
information points.
•TOPOLOGY MANAGEMENT:Automatic
configuration of piconet topologies in
scatternet situations.
19. Bluetooth Software
Bluetooth software can be installed and
used on Bluetooth capable devices.
There exists different software for different
devices like PDA , personal computer.
Enables the device to use technology at its
fullest.
Best example is Bluesoleil.
20. Bluetooth software
Bluesoleil can be installed on
personal computer or on
personal digital assistant also
On a PC, it provides a lot of
Extra wireless features.
It also has a graphical user
interface (GUI).
On a PDA, provides basic
Bluetooth profiles such as
headset and hands free profile,
personal networking (PAN)
profile
21. How Bluetooth works?
They normally operate at 2.45GHZ in license
free globally available ISM radio band.
Advantage-worldwide availability and
compatibility.
Disadvantage- devices must share the band
with other RF emitters including automobile
security systems, noise sources such as
Microwaves
Solution- Frequency Hopping Spread
Spectrum.
22. Frequency Hopping Spread
Spectrum (FHSS)
Frequency hopping is jumping from one
frequency to another within the ISM radio
band.
Efficient use of entire bandwidth.
Low Interference
Provides basic level of security.
23. Working of FHSS
There exists a master-slave relation between
devices.
A device in master mode can communicate with
upto seven slave devices.
Bluetooth devices work in a short range to
conserve the battery power.
24. Technical operations
High speed, low powered wireless technology.
Circuits are Contained on a 0.9 cm square.
This offers 1MB link with security.
Each device offers unique 48 bit address from
IEEE 802.15 standard.
Authentification is via a 128 bit key.
Supports up to 721KBps along with 3 voice
channels.
25. Bluetooth Keyboard
Bluetooth keyboard is one of major applications of
Bluetooth technology.
It was first developed by Microsoft in 2002.
Today most of companies offer this type of
keyboard, some of which companies include Dell,
Apple..
A Bluetooth keyboard and mouse combination will
allow the user to work at distances of up to 30 feet.
There are mainly two types in this-wireless
keyboard and virtual keyboard.
26. Wireless and Virtual keyboard
Wireless keyboard, called
Optical Desktop Elite offered
by Microsoft work with 2.4 GHz
Bluetooth technology.
Apple wireless keyboard is a
sleek and compact design and
makes a secure, reliable
connection with Mac.
Foldable types are another
type of Bluetooth keyboards.
It ranges in full size keyboard
to mini keyboard.
27. Virtual keyboard
Virtual keyboard is projected
on a flat, non reflective surface
and keystrokes are
accompanied by key clicking
sounds that are simulated.
The keyboard has 63 keys and
it measures only 295*95 mm
with a height of 3.5 inches.
Keyboard works by producing
a red diode laser light when
keyboard is projected on
surface.
30. Bluetooth Protocol Stack
Adopted Protocols
• PPP(Point-To-Point Protocol)
• TCP/UDP/IP
• OBEX-Session Protocol for IrDA(Infrared Data
Association)
• Contents Fromat(e.g. vCard, vCalendar)
• WAP-Wireless Application Protocol
31. Bluetooth Security
Supports Unidirectional or Mutual Encryption based
on a Secret Link key Shared Between Two Devices
Security Defined In 3 modes:
• Mode1- No Security
• Mode 2 - Service Level Security: Not Established
Before Channel is Established at L2CAP
• Mode 3 - Link Level Security: Device Initiates
Security Before LMP Link is Setup
32. Bluetooth Security
3 Levels of Service Access
• Require Authorization and Authenication
• Require Authentication Only
• Default Security for Legacy Applications
32
33. Bluetooth Based Sensor
Networks
•One such application is : WIRELESS
SENSOR NETWORKS (WSN)
•Important features of
WSN:Collaboration of network nodes
during execution and Data Centric
nature.
•Many smart sensor nodes scattered
in the field collect data and send it to
users via ‘gateway’ using multi-hop
routes.
34. Wireless Sensor Networks
(WSN)
WSN consists of number of small
devices equipped with asensing unit,
microprocessors, wireless
communication interfaceand power
source.
35. Sensor Network Implementation
•OBJECTIVE: To build a Hardware
platform and generic Software
Solutions to serve for research in
WSN protocols.
•Components of Sensor Network:
Smart Sensor Nodes and Gateway
36. Example: Pressure Sensor
For implementation of Pressure Sensor
as Bluetooth Node, following
components are important:
•Bluetooth Device
•Sensors
•Microcontroller
37. Blutooth Hardware Architecture
Bluetooth Hardware consists of 3 main
functional modules:
•2.4 GHz Bluetooth RF Transceiver
Unit
•Link Management Unit
•Host Controller Interface
39. On October 31, 2001 Vitek Boden was convicted of:
• 26 counts of will fully using a restricted computer to
cause damage
• 1 count of causing serious environment harm
The facts of the case:
• Vitek worked for the contractor involved in the
installation of Maroochy Shire sewage treatment
plant.
• Vitek left the contractor in December 1999 and
approached the shire for employment. He was
refused.
• Between Jan 2000 and Apr 2000 the sewage
system experienced 47 unexplainable faults,
causing millions of liters of sewage to be spilled.
40. How did he do it?
On April 23, 2000 Vitek was arrested with stolen
radio equipment, controller programming
software on a laptop and a fully operational
controller.
Vitek is now in jail…
Disgruntled
Contractor
PLC PLC
Sewage Plant
Rogue Radio
41. Algorithms For Operation Of
Networks
•Initialization of gateway and
Bluetooth Inquiry Procedure.
•Discovery of Bluetooth device and
Checking of major and minor devices.
•Setting of parameters and assigning
type of devices and sensors.
•Description by Service-Class Field.
•Discarding of non-smart nodes.
42. •Else, service database of the
discovered smart node is searched
for sensor services.
•If no current sensor profile, then
database is searched for serial port
connection parameters.
•Lastly, Bluetooth link is established
and data exchange with smart node
starts.
43. Sensor Market: $11B in 2001
Installation (wiring) costs:
>$100B
43
Freedonia Group report on Sensors, April 2002
• Fragmented market
platform
opportunity
• Installation cost limits
penetration
reducing
installation cost
increases market size
Slide courtesy of Rob Conant, Dust
Highly Fragmented
Sensor Market
44. Firewall Architectures
44
The external router blocks attempts to use the
underlying IP layer to break security (e.g. IP spoofing,
source routing, packet fragments, etc) and forces all
traffic to the proxy.
The proxy firewall handles potential security holes in the
higher layer protocols.
The internal router blocks all traffic except to the proxy
server.
Internal
Router
Internet
External
Router
45. Statistics on Types of Attacks
0 20 40 60 80 100 120
Theft of Propriety Info
Sabotage
Telecom Evesdropping
System Penetration
Insider Abuse of Net Access
Finacial Fraud
Virus
Unauthorized Insider Access
Telecom Fraud
Active Wiretap
Laptop Theft
Denial of Service
1997
1998
1999
2000
2001
2002
*Source: “2002 CSI/FBI Computer Crime and Security Survey” Computer Security
Institute - www.gocsi.com/losses.
% of Respondents
46. There’s lot of “Wireless”
From cellphones to PDAs to WiFi
to Satellite-based
48. Merits
Wireless
Inexpensive
Automatic
Interoperability
Low interference and energy consumption.
Share voice and data
Instant PAN
Upgradeable
Long lasting technology.
Easy link establishment
49. Demerits
Data rate and security
More susceptible to Interception and
attack
Less range
Average Speed
Short Life