Presentation is loading. Please wait.

Presentation is loading. Please wait.

Bluetooth Submitted to: Doctor : Rabie Ramadan Submitted by: Khaled Mohammed Ali Hassan Master’s Student, Cairo University/2011.

Similar presentations


Presentation on theme: "Bluetooth Submitted to: Doctor : Rabie Ramadan Submitted by: Khaled Mohammed Ali Hassan Master’s Student, Cairo University/2011."— Presentation transcript:

1 Bluetooth Submitted to: Doctor : Rabie Ramadan Submitted by: Khaled Mohammed Ali Hassan Master’s Student, Cairo University/2011

2 BlueTooth- Some Specifications Uses unlicensed 2.402 - 2.480 GHz frequency range Frequency hopping spread spectrum 79 hops separated by 1 MHz Maximum frequency hopping rate: 1600 hops/sec Nominal range: 10 cm to 10 meters Nominal antenna power: 0 dBm One complete Bluetooth data packet can be transmitted within each 625 msec hop slot

3 Potential Bluetooth Markets

4 Bluetooth Protocol Stack Adopted Protocols –PPP(Point-To-Point Protocol) –TCP/UDP/IP –OBEX-Session Protocol for IrDA(Infrared Data Association) –Contents Fromat(e.g. vCard, vCalendar) –WAP-Wireless Application Protocol

5 Bluetooth Protocol Stack

6 Bluetooth Security Supports Unidirectional or Mutual Encryption based on a Secret Link key Shared Between Two Devices Security Defined In 3 modes: –Mode1- No Security –Mode 2 - Service Level Security: Not Established Before Channel is Established at L2CAP –Mode 3 - Link Level Security: Device Initiates Security Before LMP Link is Setup

7 Bluetooth Security Devices and Services can be Set for Different Levels of Security –Two Trust Levels are Set for Devices Trusted Device: Fixed Relationship and Unrestricted Access to All Services Untrusted : No Permanent relationship and Restricted Services

8 Bluetooth Security 3 Levels of Service Access –Require Authorization and Authenication –Require Authentication Only –Default Security for Legacy Applications

9 The Challenges Future work is aimed to develop and design a blue tooth-enabled data concentrator for data acquisition and analysis.

10 CONCLUSION Blue tooth represents a great chance for sensor- networked architecture. This architecture heralds wireless future for home and also for industrial implementation. With a blue tooth RF link, users only need to bring the devices with in range, and the devices will automatically link up and exchange information. Thus implementation of blue tooth technology for sensor networks not only cuts wiring cost but also integrates the industrial environment to smarter environment.

11 CONCLUSION Today, with a broader specifications and a renewed concentration on interoperability, manufacturers are ready to forge ahead and take blue tooth products to the market place. Embedded design can incorporate the blue tooth wireless technology into a range of new products to meet the growing demand for connected information appliances.


Download ppt "Bluetooth Submitted to: Doctor : Rabie Ramadan Submitted by: Khaled Mohammed Ali Hassan Master’s Student, Cairo University/2011."

Similar presentations


Ads by Google