21
Organized By Pimpri Chinchwad College of Engineering Nigadi, Pune. National Level Symposium Techlligent 2012 17 th -18 th  Feb.2012

1339121_634653001068623750

Embed Size (px)

Citation preview

Page 1: 1339121_634653001068623750

8/13/2019 1339121_634653001068623750

http://slidepdf.com/reader/full/1339121634653001068623750 1/21

Organized By

Pimpri Chinchwad College of Engineering

Nigadi, Pune.

National Level Symposium

Techlligent 2012

17th-18th Feb.2012

Page 2: 1339121_634653001068623750

8/13/2019 1339121_634653001068623750

http://slidepdf.com/reader/full/1339121634653001068623750 2/21

Bluetooth Wireless Technology ( BWT )

Jitesh T. Patil & Manish S. Chaudhari

Department of Computer Engineering

S.S.V.P’s B.S.Deore College of Engineering, Dhule. 424002 (M.S.) 

E-mail:[email protected]

2

Page 3: 1339121_634653001068623750

8/13/2019 1339121_634653001068623750

http://slidepdf.com/reader/full/1339121634653001068623750 3/21

The present paper provides an overview of Bluetooth wireless

technology and instructs users on how to establish Bluetooth connections.Bluetooth technology provides a low cost, low power and low complexity

solution for ad-hoc wireless connectivity.

Bluetooth technology represents an opportunity for the industry to

deliver wireless solutions that are ubiquitous across a broad range of

devices.

Bluetooth technology represents an opportunity for the industry to

deliver wireless solutions that are ubiquitous across a broad range ofdevices.

Bluetooth is a specification for the use of wirelessly link phones,

computers and other network devices over short distances. 

3

Abstract… 

Page 4: 1339121_634653001068623750

8/13/2019 1339121_634653001068623750

http://slidepdf.com/reader/full/1339121634653001068623750 4/21

Page 5: 1339121_634653001068623750

8/13/2019 1339121_634653001068623750

http://slidepdf.com/reader/full/1339121634653001068623750 5/21

Piconet

Scatternet

Master unit

Slave unitMAC address

Parked units

5

Page 6: 1339121_634653001068623750

8/13/2019 1339121_634653001068623750

http://slidepdf.com/reader/full/1339121634653001068623750 6/21

6

Page 7: 1339121_634653001068623750

8/13/2019 1339121_634653001068623750

http://slidepdf.com/reader/full/1339121634653001068623750 7/21

BWT-enabled devices operate in the unrestricted 2.4-gigahertz (GHz)Industrial, Science, Medical (ISM) band. The ISM band ranges between

2.400 GHz and 2.483 GHz.

BWT-enabled devices use a technique called frequency hopping to

minimize eavesdropping and interference from other networks that use

the ISM band. With frequency hopping, the data is divided into smallpieces called packets. The transmitter and receiver exchange a data

packet at one frequency, and then they hope to another frequency to

exchange another packet. They repeat this process until all the data is

transmitted.

There are three classes of BWT radio devices, each with a different

maximum range: Class 1 (100 m)

Class 2 (50 m)

Class 3 (10 m)

Cont….. 7

Page 8: 1339121_634653001068623750

8/13/2019 1339121_634653001068623750

http://slidepdf.com/reader/full/1339121634653001068623750 8/21

Bluetooth Network Arrangement

8

BWT-enabled devices form network topologies called

piconets and scatternets.A piconet consists of up to eight

BWT-enabled devices. A piconet consists of up to eight BWT-

enabled devices.

Page 9: 1339121_634653001068623750

8/13/2019 1339121_634653001068623750

http://slidepdf.com/reader/full/1339121634653001068623750 9/21

  Bluetooth Security is provided in three ways:

1.Through pseudo-random frequency band hops

2. Authentication.

3.Encryption.

9

Page 10: 1339121_634653001068623750

8/13/2019 1339121_634653001068623750

http://slidepdf.com/reader/full/1339121634653001068623750 10/2110

When link security is enabled, Bluetooth devices must

complete an initial "bonding" exchange to derive pairwise linkauthentication and encryption keys.

The user must give both devices the same PIN code, which is

then mixed with a factory-defined unit key.

In order to reduce risk ….

Devices should be paired in a private location, using a

long, random PIN code.

Avoid default PIN codes,

Easily guessed PIN codes ("0000") and devices that

do not support configurable PIN codes.After bonding, paired Bluetooth devices associate to each

other whenever they want to exchange data.

Page 11: 1339121_634653001068623750

8/13/2019 1339121_634653001068623750

http://slidepdf.com/reader/full/1339121634653001068623750 11/2111

Bluetooth Model is used

voice/data access

points

peripheralinterconnects

Personal AreaNetworking (PAN).

Page 12: 1339121_634653001068623750

8/13/2019 1339121_634653001068623750

http://slidepdf.com/reader/full/1339121634653001068623750 12/21

Voice/data access points is one of the key initial usage models and

involves connecting a computing device to a communicating

device via a secure wireless link

12

Page 13: 1339121_634653001068623750

8/13/2019 1339121_634653001068623750

http://slidepdf.com/reader/full/1339121634653001068623750 13/21

The second category of uses, per ipheral interconnects , involves

connecting other devices together. Imagine standard keyboards,

mice, and joysticks that work over a wireless link.

13

Page 14: 1339121_634653001068623750

8/13/2019 1339121_634653001068623750

http://slidepdf.com/reader/full/1339121634653001068623750 14/21

The last usage model, Personal Area Networking (PAN ), focuses

on the ad-hoc formation and breakdown of personal networks

14

Page 15: 1339121_634653001068623750

8/13/2019 1339121_634653001068623750

http://slidepdf.com/reader/full/1339121634653001068623750 15/21

It separates the frequency band into hops. This spread spectrum is used to

hop from one channel to another, which adds a strong layer of security.

Signals can be transmitted through walls and briefcases, thus eliminating the

need for line-of-sight. 

Devices do not need to be pointed at each other, as signals are

omni-directional.

Governments worldwide regulate it, so it is possible to utilize the samestandard wherever one travels

15

Page 16: 1339121_634653001068623750

8/13/2019 1339121_634653001068623750

http://slidepdf.com/reader/full/1339121634653001068623750 16/21

a) Wireless synchronisation  –   you can eliminate wires along with

improving safety with Bluetooth. You need not worry about carryingconnection cables while travelling with your laptop or other wireless

devices.

 b) Universally accepted - Bluetooth technology is accepted world wide,

with it gaining so much popularity, you can rely on it for years to comewith an advent of more and more devices started to use Bluetooth

technology. 2.5 GHz radio frequency ensures worldwide operability.

c) Avoids interference from other wireless devices  - Bluetooth devices

avoid interference from other wireless devices with the usage of

technique known as frequency hopping, and low power wirelesssignals.

d) Faster data and voice Sharing  –   you can share data and voice

communications via Bluetooth with compatible devices connected to

it.

16

Page 17: 1339121_634653001068623750

8/13/2019 1339121_634653001068623750

http://slidepdf.com/reader/full/1339121634653001068623750 17/21

a) Since Bluetooth is omni-directional, it encounters problems in

discovering the intended recipient device.

 b) The only real downsides are the data rate and security. Infrared can

have data rates of up to 4 MBps, which provides very fast rates for datatransfer, while Bluetooth only offers 1 MBps.

c) Although there are very few disadvantages, Bluetooth still remains the

 best for short range wireless technology. Those who have tried it love it,and they know for a fact that Bluetooth will be around for years to

come.

17

Page 18: 1339121_634653001068623750

8/13/2019 1339121_634653001068623750

http://slidepdf.com/reader/full/1339121634653001068623750 18/21

 Peripherals such as mice, keyboards, and printers,Cell phones withBluetooth technology have been sold in large numbers, as they are able

to connect to computers, PDAs (Personal Data Assistant), and various

other devices.

Bluetooth technology headsets for smart phones and cell phones. The

transfer of files, images and MP3, between mobile phones.

Certain MP3 players and digital cameras to transfer files to and fromcomputers.

Data logging equipment that transmits data to a computer via Bluetooth

technology. 18

Page 19: 1339121_634653001068623750

8/13/2019 1339121_634653001068623750

http://slidepdf.com/reader/full/1339121634653001068623750 19/21

 

1) The official Bluetooth site, http://www.bluetooth.com

2) http://www.intel.com/mobile/bluetooth 

3) Wikipedia.com

19

Page 20: 1339121_634653001068623750

8/13/2019 1339121_634653001068623750

http://slidepdf.com/reader/full/1339121634653001068623750 20/21

20

Page 21: 1339121_634653001068623750

8/13/2019 1339121_634653001068623750

http://slidepdf.com/reader/full/1339121634653001068623750 21/21

21