SlideShare a Scribd company logo
1 of 20
Bluetooth
Swapnil Bangera
Mobile & Wireless Communication
ME-EXTC
Contents
• Introduction
• Various Terms in Bluetooth
• Classes of Bluetooth
• Network Establishment in Bluetooth
• Modes of Operation
• Security Features of Bluetooth
• Bluetooth Security Levels
• Applications
• Advantages
• Disadvantages
• Conclusion
Introduction
• Bluetooth is a short-range and low power wireless technology originally
developed for exchanging data over short distances from fixed and mobile
devices, creating personal area networks (PANs).
• It is named after Harald Blaatand.
• The name was adopted as a tribute to the tenth-century Viking Harald Blaatand
who peacefully united Denmark and Norway. Harald liked to eat blueberries,
which gave his teeth the coloration that lead to the nickname "Bluetooth.“
• Short-range radio frequency technology that operates at 2.4 GHz on an
unlicensed Industrial Scientific Medical (ISM) band. It is based on IEEE 802.15.1
standard.
• Effective range of Bluetooth devices is 10 meters.
• It was originally conceived as a wireless alternative to data cables.
Terms used in Bluetooth
• Piconet
• Scatternet
• Master unit
• Slave units
• MAC address
• Parked units
• Sniff and hold mode
Bluetooth Classes
Bluetooth devices are classified according to three different power classes, as
shown in the following table.
Class Maximum Permitted
Power (mW)
Range (m)
Class 1 100 100
Class 2 2.5 10
Class 3 1 1
Network Establishment in Bluetooth
• STANDBY mode
• Before any connection in a piconet is created, all devices are in STANDBY mode.
• In this mode, an unconnected unit periodically listens for messages every 1.28 seconds.
It listens the messages on a set of 32 hop frequencies defined for that unit. The device
is said to be wake-up when it listens to messages. When it does not listen to messages,
it is said to be in sleep.
• PAGE mode
• The connection procedure is initiated by any one of the device, which then becomes
master. A connection in made by PAGE message if the address is known.
• The master sends a train of 16 identical page messages on 16 different hop frequencies
defined for a device to be paged (slave).
• If no response is received, the master transmits a train on remaining 16 hop
frequencies in wake-up sequence i.e. when the slave listens on messages in STANDBY
mode.
• Maximum delay before master reaches is twice the wake-up period (2.56s) while
average delay is half the wake up period (0.64s).
• INQUIRY mode
• A connection is made by the master by an INQUIRY message followed by a subsequent
PAGE message if the address is unknown.
• The INQUIRY message is typically used for finding devices like public printers, fax
machines, and similar devices with unknown address.
• The INQUIRY message is similar to PAGE message, but may require one additional train
period to collect all responses.
Modes of Operation
SNIFF, HOLD and PARK modes are the three power saving modes of operation for
Bluetooth devices which are connected to a piconet. These modes are used when
no data is to be transmitted.
• SNIFF mode:
• The slave device listens to the piconet in this mode, but at a reduced rate. Thus
reducing its duty.
• The SNIFF interval is programmable and depends on application.
• HOLD mode:
• The master unit can put a slave unit into HOLD mode or a slave unit can demand to ne
put into HOLD mode.
• Data transfer restarts instantly when units transition out of HOLD mode.
• The HOLD is used when connecting several piconets or managing a low power device
such as temperature sensor.
• PARK mode:
• The device is still synchronized to the piconet but does not participate in traffic.
• PARKED devices have given up their MAC address and occasionally listen to the traffic
of the master to resynchronize and check on broadcast messages.
In the increasing order of power efficiency, the SNIFF mode has higher duty cycle,
followed by HOLD mode with a lower duty cycle, and PARK mode, with lowest duty
cycle.
Bluetooth Security Features
Bluetooth security supports authentication and encryption. Authentication verifies
who is at the other end of the link. Encryption ensures confidentiality of data. Even
if a third party hacks the data, it is in encrypted form and not in original form.
1. Pairing: When two devices communicate for the first time, there is a pairing
procedure. In this procedure, a secret key is generated. This key is shared by
both the devices. It is stored in each device. When the devices want to
communicate in future, there is no pairing procedure.
2. Security modes:
1. Non-secure: A device will not initiate any security procedure.
2. Service level enforced security: A device does not initiate security procedures before
channel establishment.
3. Link level enforced security: A device initiates security procedures before link set up
is completed
Bluetooth Security Levels
There are two kinds of security levels i.e. authentication & authorization
• Types of services: Different services have different service requirements. Some
services require authentication and authorization. Some services require only
authentication and not authorization. Some services don’t require both
authentication and authorization.
• Authentication: Authentication is performed after determining the type of
service. It cannot be performed when link is established. It is performed only
when connection request to service is submitted. It can be performed in both
directions : client authenticates server & vice versa.
• Authentication procedure
• Connection request to L2CAP is sent.
• L2CAP requests access from security manager.
• Security manager enquires the service database.
• Security manager enquires the device database.
• If necessary, security manager enforces the authentication and encryption procedure.
• The security manager grants access and L2CAP continues to set up the connection.
• Authorization:
Some services require manual authorization of the device after authentication only then,
these services can be accessed. This leads to the concept of trust. There are two kinds of
device trust levels:
• Trusted device: It has fixed relationship and unrestricted access to all services.
• Untrusted device: This device has been previously authenticated, a link key is stored,
but the device is not marked as trusted in device database.
• An unknown device is also an untrusted device. No security information is available for
this device.
Applications
• Replacing serial cables with radio links.
• Wearable networks/WPANs
• Desktop/room wireless networking
• Hot-spot wireless networking
• Medical: Transfer of measured values from training units to analytical systems,
patient monitoring
• Automotive: Remote control of audio/video equipment, hands-free telephony
• Point-of-sale payments: Payments by mobile phone
Advantages:
 Wireless
 Inexpensive
 Automatic
 Interoperability
 Low interference and energy consumption.
 Share voice and data
 Instant PAN
 Upgradeable
 Long lasting technology.
 Easy link establishment
Disadvantages
 Data rate and security
 More susceptible to Interception and attack
 Less range
 Average Speed
 Short Life
Conclusion
A global standard for data and voice
• Eliminates Cables.
• Low Power, Low range, Low Cost network devices.
• Bluetooth seems to have a bright future after reviewing its benefits and wide
use.
• Further improvements are planned to be made in
• Data Rates
• Power Reduction
• Range
THANK YOU!
Presented By
Swapnil Bangera
ME-EXTC

More Related Content

What's hot

Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networksjuno susi
 
Bluetooth Basic Version
Bluetooth Basic VersionBluetooth Basic Version
Bluetooth Basic VersionAyesha Saeed
 
Cellular network
Cellular networkCellular network
Cellular networkshreb
 
Mac protocols
Mac protocolsMac protocols
Mac protocolsjuno susi
 
Energy consumption of wsn
Energy consumption of wsnEnergy consumption of wsn
Energy consumption of wsnDeepaDasarathan
 
Presentation on 1G/2G/3G/4G/5G/Cellular & Wireless Technologies
Presentation on 1G/2G/3G/4G/5G/Cellular & Wireless TechnologiesPresentation on 1G/2G/3G/4G/5G/Cellular & Wireless Technologies
Presentation on 1G/2G/3G/4G/5G/Cellular & Wireless TechnologiesKaushal Kaith
 
MEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLMEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLjunnubabu
 
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...ArunChokkalingam
 
mobile ad-hoc network (MANET) and its applications
mobile ad-hoc network (MANET) and its applicationsmobile ad-hoc network (MANET) and its applications
mobile ad-hoc network (MANET) and its applicationsAman Gupta
 
web communication protocols in IoT
web communication protocols in IoTweb communication protocols in IoT
web communication protocols in IoTFabMinds
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network LayerManoj Kumar
 
EC 8004 WIRELESS NETWORKS SUBJECT OVERVIEW
EC 8004 WIRELESS NETWORKS SUBJECT OVERVIEWEC 8004 WIRELESS NETWORKS SUBJECT OVERVIEW
EC 8004 WIRELESS NETWORKS SUBJECT OVERVIEWgopivasu345
 
Wsn unit-1-ppt
Wsn unit-1-pptWsn unit-1-ppt
Wsn unit-1-pptSwathi Ch
 

What's hot (20)

Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Computer networks - Channelization
Computer networks - ChannelizationComputer networks - Channelization
Computer networks - Channelization
 
Presentation on CDMA
Presentation on CDMAPresentation on CDMA
Presentation on CDMA
 
Bluetooth Basic Version
Bluetooth Basic VersionBluetooth Basic Version
Bluetooth Basic Version
 
Cellular network
Cellular networkCellular network
Cellular network
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
 
Energy consumption of wsn
Energy consumption of wsnEnergy consumption of wsn
Energy consumption of wsn
 
Presentation on 1G/2G/3G/4G/5G/Cellular & Wireless Technologies
Presentation on 1G/2G/3G/4G/5G/Cellular & Wireless TechnologiesPresentation on 1G/2G/3G/4G/5G/Cellular & Wireless Technologies
Presentation on 1G/2G/3G/4G/5G/Cellular & Wireless Technologies
 
GPRS
GPRSGPRS
GPRS
 
MEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLMEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROL
 
Bluetooth Slides
Bluetooth SlidesBluetooth Slides
Bluetooth Slides
 
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
 
mobile ad-hoc network (MANET) and its applications
mobile ad-hoc network (MANET) and its applicationsmobile ad-hoc network (MANET) and its applications
mobile ad-hoc network (MANET) and its applications
 
web communication protocols in IoT
web communication protocols in IoTweb communication protocols in IoT
web communication protocols in IoT
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network Layer
 
Manet
ManetManet
Manet
 
Wireless Communication ppt
Wireless Communication pptWireless Communication ppt
Wireless Communication ppt
 
WLAN
WLANWLAN
WLAN
 
EC 8004 WIRELESS NETWORKS SUBJECT OVERVIEW
EC 8004 WIRELESS NETWORKS SUBJECT OVERVIEWEC 8004 WIRELESS NETWORKS SUBJECT OVERVIEW
EC 8004 WIRELESS NETWORKS SUBJECT OVERVIEW
 
Wsn unit-1-ppt
Wsn unit-1-pptWsn unit-1-ppt
Wsn unit-1-ppt
 

Similar to Bluetooth

Bluetooth Technology & Security
Bluetooth Technology & SecurityBluetooth Technology & Security
Bluetooth Technology & SecurityHimangshu Hazra
 
BluetoothSecurity.ppt
BluetoothSecurity.pptBluetoothSecurity.ppt
BluetoothSecurity.pptssuser1d7ef1
 
bluetooth-security
bluetooth-securitybluetooth-security
bluetooth-securityAnand Dhana
 
Internet of Things Protocol - Session 2
Internet of Things Protocol - Session 2Internet of Things Protocol - Session 2
Internet of Things Protocol - Session 2NEEVEE Technologies
 
Bluetoothppt
BluetoothpptBluetoothppt
Bluetoothpptsasidhar
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementationajeet singh
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementationajeet singh
 
internet network for o level
 internet network for o level  internet network for o level
internet network for o level Samit Singh
 
Wireless Body Area network
Wireless Body Area networkWireless Body Area network
Wireless Body Area networkRajeev N
 
Networking and internetworking devices
Networking and internetworking devicesNetworking and internetworking devices
Networking and internetworking devicesRaveena kumari
 
Bluetooth technology by shamshad
Bluetooth technology by shamshadBluetooth technology by shamshad
Bluetooth technology by shamshad1122334411223344
 
Bluetooth basic
Bluetooth basicBluetooth basic
Bluetooth basicEngr Sid
 
17.security level of services
17.security level of services17.security level of services
17.security level of servicesPramod Rathore
 
Wireless Network security
Wireless Network securityWireless Network security
Wireless Network securityFathima Rahaman
 

Similar to Bluetooth (20)

Bluetooth Technology & Security
Bluetooth Technology & SecurityBluetooth Technology & Security
Bluetooth Technology & Security
 
BluetoothSecurity.ppt
BluetoothSecurity.pptBluetoothSecurity.ppt
BluetoothSecurity.ppt
 
BluetoothSecurity.ppt
BluetoothSecurity.pptBluetoothSecurity.ppt
BluetoothSecurity.ppt
 
bluetooth-security
bluetooth-securitybluetooth-security
bluetooth-security
 
Internet of Things Protocol - Session 2
Internet of Things Protocol - Session 2Internet of Things Protocol - Session 2
Internet of Things Protocol - Session 2
 
Bluetoothppt
BluetoothpptBluetoothppt
Bluetoothppt
 
Network devices
Network devicesNetwork devices
Network devices
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
 
internet network for o level
 internet network for o level  internet network for o level
internet network for o level
 
Wireless Body Area network
Wireless Body Area networkWireless Body Area network
Wireless Body Area network
 
Wireless personal area networks(PAN)
Wireless personal area networks(PAN)Wireless personal area networks(PAN)
Wireless personal area networks(PAN)
 
Networking and internetworking devices
Networking and internetworking devicesNetworking and internetworking devices
Networking and internetworking devices
 
Bluetooth technology by shamshad
Bluetooth technology by shamshadBluetooth technology by shamshad
Bluetooth technology by shamshad
 
Bluetooth basic
Bluetooth basicBluetooth basic
Bluetooth basic
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
17.security level of services
17.security level of services17.security level of services
17.security level of services
 
Wireless Network security
Wireless Network securityWireless Network security
Wireless Network security
 
unit-3.pptx
unit-3.pptxunit-3.pptx
unit-3.pptx
 
Internet of things
Internet of thingsInternet of things
Internet of things
 

More from Swapnil Bangera

Schelkunoff Polynomial Method for Antenna Synthesis
Schelkunoff Polynomial Method for Antenna SynthesisSchelkunoff Polynomial Method for Antenna Synthesis
Schelkunoff Polynomial Method for Antenna SynthesisSwapnil Bangera
 
Signature verification in biometrics
Signature verification in biometricsSignature verification in biometrics
Signature verification in biometricsSwapnil Bangera
 

More from Swapnil Bangera (6)

Steganography
SteganographySteganography
Steganography
 
Shorting post
Shorting postShorting post
Shorting post
 
Schelkunoff Polynomial Method for Antenna Synthesis
Schelkunoff Polynomial Method for Antenna SynthesisSchelkunoff Polynomial Method for Antenna Synthesis
Schelkunoff Polynomial Method for Antenna Synthesis
 
Signature verification in biometrics
Signature verification in biometricsSignature verification in biometrics
Signature verification in biometrics
 
Fading & Doppler Effect
Fading & Doppler EffectFading & Doppler Effect
Fading & Doppler Effect
 
Satellite installation
Satellite installationSatellite installation
Satellite installation
 

Recently uploaded

CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 

Recently uploaded (20)

CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 

Bluetooth

  • 1. Bluetooth Swapnil Bangera Mobile & Wireless Communication ME-EXTC
  • 2. Contents • Introduction • Various Terms in Bluetooth • Classes of Bluetooth • Network Establishment in Bluetooth • Modes of Operation • Security Features of Bluetooth • Bluetooth Security Levels • Applications • Advantages • Disadvantages • Conclusion
  • 3. Introduction • Bluetooth is a short-range and low power wireless technology originally developed for exchanging data over short distances from fixed and mobile devices, creating personal area networks (PANs). • It is named after Harald Blaatand. • The name was adopted as a tribute to the tenth-century Viking Harald Blaatand who peacefully united Denmark and Norway. Harald liked to eat blueberries, which gave his teeth the coloration that lead to the nickname "Bluetooth.“ • Short-range radio frequency technology that operates at 2.4 GHz on an unlicensed Industrial Scientific Medical (ISM) band. It is based on IEEE 802.15.1 standard. • Effective range of Bluetooth devices is 10 meters. • It was originally conceived as a wireless alternative to data cables.
  • 4. Terms used in Bluetooth • Piconet • Scatternet • Master unit • Slave units • MAC address • Parked units • Sniff and hold mode
  • 5. Bluetooth Classes Bluetooth devices are classified according to three different power classes, as shown in the following table. Class Maximum Permitted Power (mW) Range (m) Class 1 100 100 Class 2 2.5 10 Class 3 1 1
  • 6. Network Establishment in Bluetooth • STANDBY mode • Before any connection in a piconet is created, all devices are in STANDBY mode. • In this mode, an unconnected unit periodically listens for messages every 1.28 seconds. It listens the messages on a set of 32 hop frequencies defined for that unit. The device is said to be wake-up when it listens to messages. When it does not listen to messages, it is said to be in sleep. • PAGE mode • The connection procedure is initiated by any one of the device, which then becomes master. A connection in made by PAGE message if the address is known. • The master sends a train of 16 identical page messages on 16 different hop frequencies defined for a device to be paged (slave). • If no response is received, the master transmits a train on remaining 16 hop frequencies in wake-up sequence i.e. when the slave listens on messages in STANDBY mode. • Maximum delay before master reaches is twice the wake-up period (2.56s) while average delay is half the wake up period (0.64s).
  • 7. • INQUIRY mode • A connection is made by the master by an INQUIRY message followed by a subsequent PAGE message if the address is unknown. • The INQUIRY message is typically used for finding devices like public printers, fax machines, and similar devices with unknown address. • The INQUIRY message is similar to PAGE message, but may require one additional train period to collect all responses.
  • 8.
  • 9. Modes of Operation SNIFF, HOLD and PARK modes are the three power saving modes of operation for Bluetooth devices which are connected to a piconet. These modes are used when no data is to be transmitted. • SNIFF mode: • The slave device listens to the piconet in this mode, but at a reduced rate. Thus reducing its duty. • The SNIFF interval is programmable and depends on application. • HOLD mode: • The master unit can put a slave unit into HOLD mode or a slave unit can demand to ne put into HOLD mode. • Data transfer restarts instantly when units transition out of HOLD mode. • The HOLD is used when connecting several piconets or managing a low power device such as temperature sensor.
  • 10. • PARK mode: • The device is still synchronized to the piconet but does not participate in traffic. • PARKED devices have given up their MAC address and occasionally listen to the traffic of the master to resynchronize and check on broadcast messages. In the increasing order of power efficiency, the SNIFF mode has higher duty cycle, followed by HOLD mode with a lower duty cycle, and PARK mode, with lowest duty cycle.
  • 11. Bluetooth Security Features Bluetooth security supports authentication and encryption. Authentication verifies who is at the other end of the link. Encryption ensures confidentiality of data. Even if a third party hacks the data, it is in encrypted form and not in original form. 1. Pairing: When two devices communicate for the first time, there is a pairing procedure. In this procedure, a secret key is generated. This key is shared by both the devices. It is stored in each device. When the devices want to communicate in future, there is no pairing procedure. 2. Security modes: 1. Non-secure: A device will not initiate any security procedure. 2. Service level enforced security: A device does not initiate security procedures before channel establishment. 3. Link level enforced security: A device initiates security procedures before link set up is completed
  • 12. Bluetooth Security Levels There are two kinds of security levels i.e. authentication & authorization • Types of services: Different services have different service requirements. Some services require authentication and authorization. Some services require only authentication and not authorization. Some services don’t require both authentication and authorization. • Authentication: Authentication is performed after determining the type of service. It cannot be performed when link is established. It is performed only when connection request to service is submitted. It can be performed in both directions : client authenticates server & vice versa.
  • 13. • Authentication procedure • Connection request to L2CAP is sent. • L2CAP requests access from security manager. • Security manager enquires the service database. • Security manager enquires the device database. • If necessary, security manager enforces the authentication and encryption procedure. • The security manager grants access and L2CAP continues to set up the connection.
  • 14.
  • 15. • Authorization: Some services require manual authorization of the device after authentication only then, these services can be accessed. This leads to the concept of trust. There are two kinds of device trust levels: • Trusted device: It has fixed relationship and unrestricted access to all services. • Untrusted device: This device has been previously authenticated, a link key is stored, but the device is not marked as trusted in device database. • An unknown device is also an untrusted device. No security information is available for this device.
  • 16. Applications • Replacing serial cables with radio links. • Wearable networks/WPANs • Desktop/room wireless networking • Hot-spot wireless networking • Medical: Transfer of measured values from training units to analytical systems, patient monitoring • Automotive: Remote control of audio/video equipment, hands-free telephony • Point-of-sale payments: Payments by mobile phone
  • 17. Advantages:  Wireless  Inexpensive  Automatic  Interoperability  Low interference and energy consumption.  Share voice and data  Instant PAN  Upgradeable  Long lasting technology.  Easy link establishment
  • 18. Disadvantages  Data rate and security  More susceptible to Interception and attack  Less range  Average Speed  Short Life
  • 19. Conclusion A global standard for data and voice • Eliminates Cables. • Low Power, Low range, Low Cost network devices. • Bluetooth seems to have a bright future after reviewing its benefits and wide use. • Further improvements are planned to be made in • Data Rates • Power Reduction • Range