PCT Final Bluetooth

Embed Size (px)

Citation preview

  • 8/8/2019 PCT Final Bluetooth

    1/21

    BBLUETOOTHLUETOOTH TTECHNOLOGYECHNOLOGY

    K. J. SOMAIYA INSTITUTE OF ENGINEERINGK. J. SOMAIYA INSTITUTE OF ENGINEERING

    AND INFORMATION TECHNOLOGYAND INFORMATION TECHNOLOGY

    REPORT ON:REPORT ON:

    SUBJECT TEACHERSUBJECT TEACHER

    MMRSRS.. JADHAVJADHAVSS..SS..

    ( )( )

    HODHOD

    (( ))

    PRINCIPLEPRINCIPLE

    ( )( )

    11 || PP A G EA G E

  • 8/8/2019 PCT Final Bluetooth

    2/21

    BBLUETOOTHLUETOOTH TTECHNOLOGYECHNOLOGY

    K. J. SOMAIYA INSTITUTE OF ENGINEERINGK. J. SOMAIYA INSTITUTE OF ENGINEERINGAND INFORMATION TECHNOLOGYAND INFORMATION TECHNOLOGY

    REPORT ON:REPORT ON:

    SUBMITTEDSUBMITTEDBYBY:-:-

    SHAIKHSHAIKHABDULABDULSALAMSALAM [[2727]]

    PPRIYESHRIYESHWAGHWAGH [[4343]]

    BELABELAVAIDYAVAIDYA [[2626]]

    SWAPNEELSWAPNEELPARABPARAB [36[36]]

    ANKITAANKITA [52[52]]

    PRIYAPRIYATIWARITIWARI [62[62]]

    JAIDEEPJAIDEEP [65[65]]

    VINODVINODKADAMKADAM [[2222]]

    SSUBMITTEDUBMITTEDTOTO:-:-

    MMRSRS

    .. JADHAVJADHAV

    SS

    ..SS

    ..

    22 || PP A G EA G E

  • 8/8/2019 PCT Final Bluetooth

    3/21

    BBLUETOOTHLUETOOTH TTECHNOLOGYECHNOLOGY

    TTABLEABLE OOFF CCONTENTSONTENTS

    Sr.No. Name of Content Page No.1 Bluetooth Logo 3

    2 Bluetooth Technology Over TheYears

    4

    3 Bluetooh Specification 64 Bluetooh Architecture 85 Bluetooth Chracteristics 126 General Bluetooth Profile 137 Bluetooth Protocol Stack 148 Bluetooth Core Protocol 159 Bluetooth Application 1710 Bluetooth Security 1811 Bluetooth Advantages 1912 Bluetooth Disadvantages 20

    33 || PP A G EA G E

  • 8/8/2019 PCT Final Bluetooth

    4/21

  • 8/8/2019 PCT Final Bluetooth

    5/21

    BBLUETOOTHLUETOOTH TTECHNOLOGYECHNOLOGY

    Problem:Problem:

    Today, electronics that connect to one another are found everywhere--inToday, electronics that connect to one another are found everywhere--inthe office, home, Car, etc. Keyboards connect to computers, MP3 playersthe office, home, Car, etc. Keyboards connect to computers, MP3 players

    55 || PP A G EA G E

  • 8/8/2019 PCT Final Bluetooth

    6/21

    BBLUETOOTHLUETOOTH TTECHNOLOGYECHNOLOGY

    to headphones and so on. So, how do these devices connect to eachto headphones and so on. So, how do these devices connect to eachother? Usually the answer is: with wires and cables.other? Usually the answer is: with wires and cables.

    But, as you know, wires and cables always result in a tangled mess.But, as you know, wires and cables always result in a tangled mess.

    SolutionSolution

    Bluetooth wireless technology eliminates many of the wires that clutterBluetooth wireless technology eliminates many of the wires that clutter our offices, homes, etc., while allowing our electronic devices of todayour offices, homes, etc., while allowing our electronic devices of todayand tomorrow to communicate with one another.and tomorrow to communicate with one another.

    BBLUETOOHLUETOOH SSPECIFICATIONPECIFICATION

    Bluetooth is a low-cost, low power, short range wireless communicationBluetooth is a low-cost, low power, short range wireless communication

    technology used in networking, mobile phones and other portable device.technology used in networking, mobile phones and other portable device.

    66 || PP A G EA G E

  • 8/8/2019 PCT Final Bluetooth

    7/21

    BBLUETOOTHLUETOOTH TTECHNOLOGYECHNOLOGY

    Bluetooth wireless technology also enables devices to communicate withBluetooth wireless technology also enables devices to communicate with

    each other as soon as they come within range; no need to connect, plugeach other as soon as they come within range; no need to connect, plug

    into, install, enable or configure anything.into, install, enable or configure anything.

    Although the range of each Bluetooth device is approximately 10 metersAlthough the range of each Bluetooth device is approximately 10 metersbut this distance can be increased to 100 meters with optional amplifiersbut this distance can be increased to 100 meters with optional amplifiers

    placed at strategic locations within a building.placed at strategic locations within a building.

    Bluetooth does not need to be set-up it is always on. The devices toBluetooth does not need to be set-up it is always on. The devices to

    communicate do not even require line-of-sight communication.communicate do not even require line-of-sight communication.

    Different devices can be automatically link-up with each other as soon asDifferent devices can be automatically link-up with each other as soon as

    they come into range i.e. it creates a temporary network orthey come into range i.e. it creates a temporary network or PersonalPersonal

    Area Network (PAN)Area Network (PAN)..

    The Bluetooth specification is an open global specification defining theThe Bluetooth specification is an open global specification defining the

    complete system up to application level.complete system up to application level.

    The Bluetooth Promoters group has made Bluetooth an openThe Bluetooth Promoters group has made Bluetooth an open

    specification, rather than keeping it restricted and proprietary, becausespecification, rather than keeping it restricted and proprietary, because

    more consumer can adopt it as many manufacturers are producing it.more consumer can adopt it as many manufacturers are producing it.

    Bluetooth technology uses the globally available unlicensed ISM radioBluetooth technology uses the globally available unlicensed ISM radioband of 2.4GHz. theband of 2.4GHz. the ISM (ISM (Industrial, Scientific and Medical) bandIndustrial, Scientific and Medical) band

    frequency 2.4-2.483GHz do not require an operators license.frequency 2.4-2.483GHz do not require an operators license.

    From any authority, Bluetooth supports both voice and data as it supportsFrom any authority, Bluetooth supports both voice and data as it supports

    both circuit switching and packet switching.both circuit switching and packet switching.

    Bluetooth devices in a piconet share a common communication dataBluetooth devices in a piconet share a common communication data

    channel. The channel has a total capacity of 1 megabit per secondchannel. The channel has a total capacity of 1 megabit per second

    (Mbps). Headers and handshaking information consume about 20 percent(Mbps). Headers and handshaking information consume about 20 percent

    of this capacity.of this capacity.

    A data channel hops randomly 1,600 times per second between the 79A data channel hops randomly 1,600 times per second between the 79

    (or 23) RF channels.(or 23) RF channels.

    77 || PP A G EA G E

  • 8/8/2019 PCT Final Bluetooth

    8/21

    BBLUETOOTHLUETOOTH TTECHNOLOGYECHNOLOGY

    Each channel is divided into time slots 625 microseconds long.Each channel is divided into time slots 625 microseconds long.

    Data in a packet can be up to 2,745 bits in length.Data in a packet can be up to 2,745 bits in length.

    Slots not reserved for SCO links can be used for ACL links.Slots not reserved for SCO links can be used for ACL links.

    One master and slave can have a single ACL link.One master and slave can have a single ACL link.

    BBLUETOOHLUETOOH AARCHITECTURERCHITECTURE

    The basic element of Bluetooth is piconet.The basic element of Bluetooth is piconet. Piconet is a collection of slave devices operating together with onePiconet is a collection of slave devices operating together with one

    common master.common master.

    88 || PP A G EA G E

  • 8/8/2019 PCT Final Bluetooth

    9/21

    Slave-1Slave-1

    BBLUETOOTHLUETOOTH TTECHNOLOGYECHNOLOGY

    (A) Single-slave piconet(A) Single-slave piconet (B) Multi-slave piconet(B) Multi-slave piconet

    (C) Scatter-net(C) Scatter-net

    Several piconets can be established and linked together in aSeveral piconets can be established and linked together in atopology called Scatter-net. Only one piconet can be active at anytopology called Scatter-net. Only one piconet can be active at anytime.time.

    Different piconet in Scatter-net can participate through time divisionDifferent piconet in Scatter-net can participate through time divisionmultiplexing (TDM) sharing a common channel.multiplexing (TDM) sharing a common channel.

    99 || PP A G EA G E

    MasterMaster

    SlaveSlaveSlaveSlaveSlaveSlaveSlaveSlaveMasterMasterMasterMaster(a)(a)(b)(b)(c)(c)

    SSLAVELAVE-2-2

    SSLAVELAVE-3-3

    SSLAVELAVE

  • 8/8/2019 PCT Final Bluetooth

    10/21

    BBLUETOOTHLUETOOTH TTECHNOLOGYECHNOLOGY

    Baseband (BB)Baseband (BB) Link Manager Protocol(LMP)Link Manager Protocol(LMP) Logical Link Control and Adaptation Layer(L2CAP)Logical Link Control and Adaptation Layer(L2CAP) Services Discovery Protocol(SDP)Services Discovery Protocol(SDP) Radio Frequency Communication (RFCOMM)Radio Frequency Communication (RFCOMM) Telephony Control Specification Binary(TCS BIN)Telephony Control Specification Binary(TCS BIN) Attention Sequence(AT)Attention Sequence(AT) Point-to-point Protocol(PPP)Point-to-point Protocol(PPP)

    User Datagram Protocol (UDP)User Datagram Protocol (UDP) Transmit Control Protocol (TCP)Transmit Control Protocol (TCP)

    1010 || PP A G EA G E

  • 8/8/2019 PCT Final Bluetooth

    11/21

    BBLUETOOTHLUETOOTH TTECHNOLOGYECHNOLOGY

    Internet Protocol (IP)Internet Protocol (IP) Object Exchange Protocol (OBEX)Object Exchange Protocol (OBEX) Wireless Application Protocol (WAP)Wireless Application Protocol (WAP) vCardvCard vCalendervCalender

    Wireless Application Environment (WAE)Wireless Application Environment (WAE)

    MMAINAIN RREASONSEASONSTOTO UUSESEAA BBLUETOOTHLUETOOTH DDEVICEEVICE

    Bluetooth Devices are Wireless.Bluetooth Devices are Wireless. Bluetooth Technology is Inexpensive.Bluetooth Technology is Inexpensive.

    Bluetooth is Automatic.Bluetooth is Automatic. Standardized Protocol = InteroperabilityStandardized Protocol = Interoperability Low InterferenceLow Interference Low Energy ConsumptionLow Energy Consumption Share Voice and DataShare Voice and Data Instant Personal Area Network (PAN)Instant Personal Area Network (PAN) UpgradeableUpgradeable The Technology is Here to StayThe Technology is Here to Stay

    1111 || PP A G EA G E

  • 8/8/2019 PCT Final Bluetooth

    12/21

    BBLUETOOTHLUETOOTH TTECHNOLOGYECHNOLOGY

    BBLUETOOTHLUETOOTH CCHRACTERISTICSHRACTERISTICS

    Sr.No.Sr.No. FeaturesFeatures PerformancePerformance

    1.1. Operating FrequencyOperating Frequency 2.4GHz2.4GHz

    2.2. Transmission PowerTransmission Power 1 mW1 mW

    3.3. Data RateData Rate 720 kbps720 kbps

    4.4. RangeRange 10 meters10 meters

    5.5. Number ofNumber ofDevices/piconetDevices/piconet

    88

    6.6. Number of voice channelNumber of voice channel 33

    7.7. Connectivity TypeConnectivity Type SpreadSpreadspectrumspectrum

    1212 || PP A G EA G E

  • 8/8/2019 PCT Final Bluetooth

    13/21

    BBLUETOOTHLUETOOTH TTECHNOLOGYECHNOLOGY

    GGENERALENERAL BBLUETOOTHLUETOOTH PPROFILEROFILEGeneral profiles used in various models by Bluetooth:General profiles used in various models by Bluetooth:

    Generic Access Profile (GAP)Generic Access Profile (GAP) defines the basic rules for using thedefines the basic rules for using theprotocol and it is the foundation for all other profiles.protocol and it is the foundation for all other profiles.

    Serial Port Profile (SPP)Serial Port Profile (SPP) is built on the Generic Access Profile andis built on the Generic Access Profile anddefines how Bluetooth devices can be set up to emulate a serial cabledefines how Bluetooth devices can be set up to emulate a serial cableconnection usingconnection using RFCOMMRFCOMM..

    RFCOMMRFCOMM is a transport protocol that emulates RS-232 serial portsis a transport protocol that emulates RS-232 serial portsbetween two peer devices.between two peer devices. RFCOMMRFCOMM transporttransportthe user data, modemthe user data, modemcontrol signals and configure commands.control signals and configure commands.

    Service Discovery Application Profile (SDAP)Service Discovery Application Profile (SDAP) describes the devicedescribes the deviceinformation, services and its characteristics necessary for establishinginformation, services and its characteristics necessary for establishingconnection between Bluetooth devices.connection between Bluetooth devices.

    Generic Object Exchange Profile (GOEP)Generic Object Exchange Profile (GOEP) defines how Bluetoothdefines how Bluetoothdevices support the object exchange models (OBEX).It specifiesdevices support the object exchange models (OBEX).It specifiesinteroperability for the application profiles and requirements of lowerinteroperability for the application profiles and requirements of lowerprotocol layers.protocol layers.

    1313 || PP A G EA G E

  • 8/8/2019 PCT Final Bluetooth

    14/21

    BBLUETOOTHLUETOOTH TTECHNOLOGYECHNOLOGY

    BBLUETOOTHLUETOOTH PPROTOCOLROTOCOL SSTACKTACK

    Sr.No.Sr.No. BluetoothBluetooth Member ProtocolMember Protocol1.1. Bluetooth coreBluetooth core

    protocolsprotocolsi.i. Baseband (BB)Baseband (BB)ii.ii. Link ManagerLink Manager

    Protocol(LMP)Protocol(LMP)iii.iii. Logical Link Control andLogical Link Control and

    Adaptation Layer(L2CAP)Adaptation Layer(L2CAP)iv.iv. Services DiscoveryServices Discovery

    Protocol(SDP)Protocol(SDP)2.2. Cable ReplacementCable Replacement

    ProtocolProtocoli.i. Radio FrequencyRadio Frequency

    CommunicationCommunication(RFCOMM)(RFCOMM)

    3.3. Telephony ControlTelephony Control ProtocolProtocol

    i.i. Telephony ControlTelephony Control Specification Binary(TCSSpecification Binary(TCSBIN)BIN)

    ii.ii. Attention Sequence(AT)Attention Sequence(AT)4.4. Adopted ProtocolsAdopted Protocols i.i. Point-to-pointPoint-to-point

    Protocol(PPP)Protocol(PPP)ii.ii. User Datagram ProtocolUser Datagram Protocol

    (UDP)(UDP)

    iii.iii.Transmit Control ProtocolTransmit Control Protocol(TCP)(TCP)

    1414 || PP A G EA G E

  • 8/8/2019 PCT Final Bluetooth

    15/21

    BBLUETOOTHLUETOOTH TTECHNOLOGYECHNOLOGY

    iv.iv. Internet Protocol (IP)Internet Protocol (IP)v.v. Object ExchangeObject Exchange

    Protocol (OBEX)Protocol (OBEX)vi.vi. Wireless ApplicationWireless Application

    Protocol (WAP)Protocol (WAP)

    vii.vii.vCardvCardviii.viii.vCalendervCalenderix.ix. Wireless ApplicationWireless Application

    Environment (WAE)Environment (WAE)

    BBLUETOOTHLUETOOTH CCOREORE PPROTOCOLROTOCOL

    Bluetooth core protocol consists of following layers Bluetooth core protocol consists of following layers

    II.. BasebandBaseband: The Baseband layer enables the physical RF link between: The Baseband layer enables the physical RF link between various units within piconet. Baseband layer maintains formattingvarious units within piconet. Baseband layer maintains formatting

    addressing of packets.addressing of packets.The Baseband layer provides two types of physical link-The Baseband layer provides two types of physical link- Synchronous Connection Oriented (SCO)Synchronous Connection Oriented (SCO) Asynchronous Connectionless (ACL)Asynchronous Connectionless (ACL)

    These physical links are multiplexed on the same link.These physical links are multiplexed on the same link.

    IIII.. Link Management Protocol (LMP):Link Management Protocol (LMP): The LMP is responsible for linkThe LMP is responsible for linksetup and control between Bluetooth devices in a piconet. Thissetup and control between Bluetooth devices in a piconet. Thisincludes security aspects such as authentication encryption generatingincludes security aspects such as authentication encryption generatingand exchanging link encryption keys. It also controls the Basebandand exchanging link encryption keys. It also controls the Baseband

    packet and packet size.packet and packet size.

    IIIIII.. Logical Link Control and Adaptation Protocol (L2CAP):Logical Link Control and Adaptation Protocol (L2CAP): ItItperforms following functions performs following functions

    i.i. Packet segmentationPacket segmentationii.ii. Multiplexing and Demultiplexing of packetsMultiplexing and Demultiplexing of packetsiii.iii. Quality of service (QOS) L2CAP receives data packets up to 64 kiloQuality of service (QOS) L2CAP receives data packets up to 64 kilo

    bytes in length from upper layer and transmits them into suitablebytes in length from upper layer and transmits them into suitableframes. L2CAP supports asynchronous connection oriented links. Dataframes. L2CAP supports asynchronous connection oriented links. Datapackets from upper layer such as RFCOMM and telephony arepackets from upper layer such as RFCOMM and telephony aremultiplexed and demultiplexed for transmission and reception.multiplexed and demultiplexed for transmission and reception.

    1515 || PP A G EA G E

  • 8/8/2019 PCT Final Bluetooth

    16/21

    BBLUETOOTHLUETOOTH TTECHNOLOGYECHNOLOGY

    L2CAP handles QOS requirements for entire operation phase suchL2CAP handles QOS requirements for entire operation phase suchas link establishment, transmission and reception. Voice quality channelsas link establishment, transmission and reception. Voice quality channelsfor audio and telephony applications are run over the Basebandfor audio and telephony applications are run over the Basebandsynchronous connection oriented links.synchronous connection oriented links.

    iv. Service Discovery Protocol (SDPiv. Service Discovery Protocol (SDP):):SDP performs devices information, services and the characteristics ofSDP performs devices information, services and the characteristics of

    the services. The user may select the desires service from the availablethe services. The user may select the desires service from the availableservices between the Bluetooth devices.services between the Bluetooth devices.

    Cable Replacement Protocol (RFCOMM)Cable Replacement Protocol (RFCOMM)RFCOMM delivers control signaling over wireless links.RFCOMM is aRFCOMM delivers control signaling over wireless links.RFCOMM is a

    virtual serial port that uses control, data signals over the Baseband andvirtual serial port that uses control, data signals over the Baseband and provides transport mechanisms.provides transport mechanisms.

    Telephony Control ProtocolTelephony Control Protocol

    i. Telephony Control Specification Binary (TCS BIN):i. Telephony Control Specification Binary (TCS BIN):TCSBINTCSBIN is a bit-oriented protocol. TCSBIN defines the call controlis a bit-oriented protocol. TCSBIN defines the call control

    signaling for setting up speech and data calls between Bluetooth devices.signaling for setting up speech and data calls between Bluetooth devices.It also specifies mobility management procedures for handling TCSIt also specifies mobility management procedures for handling TCSdevices.devices.ii. Attention Sequence (AT):ii. Attention Sequence (AT): TCSBIN also specifies a set of ATTCSBIN also specifies a set of ATcommands. AT commands defines how a mobile phone or modem can becommands. AT commands defines how a mobile phone or modem can becontrolled.controlled.

    Adopted ProtocolsAdopted ProtocolsThese protocols are reused for different purposes at higher layers inThese protocols are reused for different purposes at higher layers in

    Bluetooth architecture. The adopted protocols are PPP, TCP/UDP/IP, OBEX,Bluetooth architecture. The adopted protocols are PPP, TCP/UDP/IP, OBEX,and WAEand WAE/WAP./WAP.

    1616 || PP A G EA G E

  • 8/8/2019 PCT Final Bluetooth

    17/21

    BBLUETOOTHLUETOOTH TTECHNOLOGYECHNOLOGY

    BBLUETOOTHLUETOOTH AAPPLICATIONPPLICATION

    1. Ad hoc networking-1. Ad hoc networking- Immediate network can be erected withoutImmediate network can be erected withoutinterconnecting cables and configurations.interconnecting cables and configurations.

    2.2.Synchronizing DataSynchronizing Data-The messages are sent to devices that-The messages are sent to devices thatare powered off (sleep mode) e.g. when a mobile phone receives aare powered off (sleep mode) e.g. when a mobile phone receives amessage, it can send it to laptop computers even if it is powered off.message, it can send it to laptop computers even if it is powered off.

    3. Remote Synchronization3. Remote Synchronization-A laptop can be connected to Internet on a-A laptop can be connected to Internet on amoving vehicle through a cell phone.moving vehicle through a cell phone.

    4. Automatic Synchronization4. Automatic Synchronization-All the device in an office such as PCs,-All the device in an office such as PCs,mobile phones, Intercom, Calendar, organizers etc are updatedmobile phones, Intercom, Calendar, organizers etc are updatedautomatically as soon as a Bluetooth device comes in contact.automatically as soon as a Bluetooth device comes in contact.

    5.3-in-1 Handset5.3-in-1 Handset-In office a phone will work as a intercom, at home as-In office a phone will work as a intercom, at home ascordless phones or while moving it will work as cell phone.cordless phones or while moving it will work as cell phone.

    6.6.Cable replacementCable replacement-Bluetooth wireless eliminates the need of cabling to-Bluetooth wireless eliminates the need of cabling tointer connect devices. It also replaces multiple type of connections areinter connect devices. It also replaces multiple type of connections aresingle radio link. The connections are instant and can be maintained evensingle radio link. The connections are instant and can be maintained evenwhen device is not within line of sight.when device is not within line of sight.

    1717 || PP A G EA G E

  • 8/8/2019 PCT Final Bluetooth

    18/21

    BBLUETOOTHLUETOOTH TTECHNOLOGYECHNOLOGY

    BBLUETOOTHLUETOOTH SSECURITYECURITY

    In any wireless networking setup, security is a concern. Devices canIn any wireless networking setup, security is a concern. Devices caneasily grab radio waves out of the air, so people who send sensitiveeasily grab radio waves out of the air, so people who send sensitiveinformation over a wireless connection need to take precautions to make sureinformation over a wireless connection need to take precautions to make surethose signals aren't intercepted.those signals aren't intercepted.

    Bluetooth technology is no different -- it's wireless and thereforeBluetooth technology is no different -- it's wireless and thereforesusceptible to spying and remote access, just like Wi-Fi is susceptible if thesusceptible to spying and remote access, just like Wi-Fi is susceptible if thenetwork isn't secure. With Bluetooth, though, the automatic nature of thenetwork isn't secure. With Bluetooth, though, the automatic nature of theconnection, which is a huge benefit in terms of time and effort, is also a benefitconnection, which is a huge benefit in terms of time and effort, is also a benefitto people looking to send you data without your permission.to people looking to send you data without your permission.

    Service-level security and device-level security work together to protectService-level security and device-level security work together to protectBluetooth devices from unauthorized data transmission. Still, early cell-phoneBluetooth devices from unauthorized data transmission. Still, early cell-phonevirus writers have taken advantage of Bluetooth's automated connectionvirus writers have taken advantage of Bluetooth's automated connection

    process to send out infected files. However, since most cell phones use aprocess to send out infected files. However, since most cell phones use asecure Bluetooth connection that requires authorization and authenticationsecure Bluetooth connection that requires authorization and authenticationbefore accepting data from an unknown device, the infected file typicallybefore accepting data from an unknown device, the infected file typicallydoesn't get very far.doesn't get very far.

    When the virus arrives in the user's cell phone, the user has to agree toWhen the virus arrives in the user's cell phone, the user has to agree toopen it and then agree to install it. This has, so far, stopped most cell-phoneopen it and then agree to install it. This has, so far, stopped most cell-phoneviruses from doing much damage. See How Cell-phone Viruses Work to learnviruses from doing much damage. See How Cell-phone Viruses Work to learnmore.more.

    Other problems like "bluejacking," "bluebugging" and "Car Whisperer"Other problems like "bluejacking," "bluebugging" and "Car Whisperer"have turned up as Bluetooth-specific security issues. Bluejacking involveshave turned up as Bluetooth-specific security issues. Bluejacking involvesBluetooth users sending a business card (just a text message, really) to otherBluetooth users sending a business card (just a text message, really) to other Bluetooth users within a 10-meter (32-foot) radius.Bluetooth users within a 10-meter (32-foot) radius.

    The Car Whisperer is a piece of software that allows hackers to sendThe Car Whisperer is a piece of software that allows hackers to sendaudio to and receive audio from a Bluetooth-enabled car stereo. Like aaudio to and receive audio from a Bluetooth-enabled car stereo. Like acomputer security hole, these vulnerabilities are an inevitable result ofcomputer security hole, these vulnerabilities are an inevitable result oftechnological innovation, and device manufacturers are releasing firmwaretechnological innovation, and device manufacturers are releasing firmware

    upgrades that address new problems as they arise.upgrades that address new problems as they arise.

    1818 || PP A G EA G E

  • 8/8/2019 PCT Final Bluetooth

    19/21

    BBLUETOOTHLUETOOTH TTECHNOLOGYECHNOLOGY

    BBLUETOOTHLUETOOTH AADVANTAGESDVANTAGES Widely Used:Widely Used:

    Bluetooth is now really popular and keeps getting more popular as timeBluetooth is now really popular and keeps getting more popular as timepasses by. It is now widely used across countries and almost by everyone.passes by. It is now widely used across countries and almost by everyone. Companies are taking the benefit by using this in their new and future productsCompanies are taking the benefit by using this in their new and future productsto make life much easier for everyone. Pretty much very soon, you will beto make life much easier for everyone. Pretty much very soon, you will be noticing quite a bit of technology will be wireless due to Bluetooth. As it isnoticing quite a bit of technology will be wireless due to Bluetooth. As it isalready, but most likely it will be more dominant. You can use Bluetooth onalready, but most likely it will be more dominant. You can use Bluetooth on

    laptops, cell phones, music players, headsets, printers and a lot more otherlaptops, cell phones, music players, headsets, printers and a lot more otherproducts.products.

    Feature Simplicity:Feature Simplicity:You do not need to know much about technology in order to run Bluetooth.You do not need to know much about technology in order to run Bluetooth.

    Anyone that doesn't have no knowledge about the new technology can still beAnyone that doesn't have no knowledge about the new technology can still beable to use the Bluetooth feature due to its simplicity and the ease of use. Iable to use the Bluetooth feature due to its simplicity and the ease of use. Ithink that the simplicity of it and the fact that it's wire free makes it verythink that the simplicity of it and the fact that it's wire free makes it verywidely used and utmost popular.widely used and utmost popular.

    Free of Charge:Free of Charge:Best of all, you do not have to pay a penny for the service! It's not an extra cellBest of all, you do not have to pay a penny for the service! It's not an extra cellphone or cable bill that you have to add to your budget. Simply by thephone or cable bill that you have to add to your budget. Simply by thetechnology and you're done! All you need to do is connect it with what you aretechnology and you're done! All you need to do is connect it with what you areusing. There hasn't been any reporting lately on companies charging a monthlyusing. There hasn't been any reporting lately on companies charging a monthlyfee or any fee for people to use the Bluetooth feature and I don't expect it.fee or any fee for people to use the Bluetooth feature and I don't expect it.

    Go Wireless:Go Wireless:It allows you to stay cord free and do not have to worry about finding theIt allows you to stay cord free and do not have to worry about finding the

    correct place to connect that extra long cord. Avoid having to have a ton ofcorrect place to connect that extra long cord. Avoid having to have a ton of

    cords wherever you go. You may still need a few cords but not as much as youcords wherever you go. You may still need a few cords but not as much as youwould without Bluetooth. You can also go to the internet wirelessly with thiswould without Bluetooth. You can also go to the internet wirelessly with this feature when you're out somewhere outside of your home.feature when you're out somewhere outside of your home.

    YoureYoure in Control:in Control:Even though you are able to exchange data across your cell phones, you stillEven though you are able to exchange data across your cell phones, you still have the ability to keep your information private. In order to make a transfer orhave the ability to keep your information private. In order to make a transfer or allow someone to access the files on your phone, you will have to give themallow someone to access the files on your phone, you will have to give themaccess by accepting or rejecting the request through your phone. If you haveaccess by accepting or rejecting the request through your phone. If you havethe Bluetooth feature enabled on your phone and not disabled while using it,the Bluetooth feature enabled on your phone and not disabled while using it, others that you may not even know request to send you a fileothers that you may not even know request to send you a file

    1919 || PP A G EA G E

  • 8/8/2019 PCT Final Bluetooth

    20/21

    BBLUETOOTHLUETOOTH TTECHNOLOGYECHNOLOGY

    BBLUETOOTHLUETOOTH

    DDISADVANTAGESISADVANTAGES

    BatteryBattery Use:Use:This occurs mostly on your cell phone but also occurs in other technologyThis occurs mostly on your cell phone but also occurs in other technology

    such as music players. You're using up more battery power when you leavesuch as music players. You're using up more battery power when you leave your Bluetooth enabled on your phone all day. To disregard all this, the bestyour Bluetooth enabled on your phone all day. To disregard all this, the bestthing that you can possibly do is disable it once you are completed with thething that you can possibly do is disable it once you are completed with thetransfer. It only takes a few seconds to enable and disable so it wouldn't hurt totransfer. It only takes a few seconds to enable and disable so it wouldn't hurt todisable it once you are done using it.disable it once you are done using it.

    Bluetooth Internet:Bluetooth Internet:Throughout all devices, when using Bluetooth internet, the connectionThroughout all devices, when using Bluetooth internet, the connection

    can sometimes run very slow so Bluetooth internet is not highly suggested forcan sometimes run very slow so Bluetooth internet is not highly suggested for all cases.all cases.

    As you can notice that there are quite a bit of advantages and fewerAs you can notice that there are quite a bit of advantages and fewerdisadvantages. Overall, Bluetooth is a great thing to be using on all yourdisadvantages. Overall, Bluetooth is a great thing to be using on all your devices that supports it. You can do so much with it and includes cutting all thedevices that supports it. You can do so much with it and includes cutting all thecords attached to your devices.cords attached to your devices.

    CONCLUSION:CONCLUSION:

    Even thoughEven though wewe arare able to exchange data acrosse able to exchange data across our cell phones,our cell phones, wewe stillstillhave the ability to keephave the ability to keep our information private. In order to make a transfer orour information private. In order to make a transfer or allowallow someone to access the files onsomeone to access the files on our phone,our phone, wewe will have to give themwill have to give themaccess by accepting or rejecting the request through your phone. Ifaccess by accepting or rejecting the request through your phone. Ifwewe havehaveththe Bluetooth feature enabled one Bluetooth feature enabled on our phone and not disabled while using it,our phone and not disabled while using it,others thatothers that wewe may not even know request to sendmay not even know request to send usus a filea file..

    2020 || PP A G EA G E

  • 8/8/2019 PCT Final Bluetooth

    21/21

    BBLUETOOTHLUETOOTH TTECHNOLOGYECHNOLOGY

    2121 || PP A G EA G E