Presentation is loading. Please wait.

Presentation is loading. Please wait.

BLUETOOTH Created By: Ajay Bahoriya. Agenda Introduction to Bluetooth Bluetooth Basics Mode of operation Technology Security Advantages Integrating BT.

Similar presentations


Presentation on theme: "BLUETOOTH Created By: Ajay Bahoriya. Agenda Introduction to Bluetooth Bluetooth Basics Mode of operation Technology Security Advantages Integrating BT."— Presentation transcript:

1 BLUETOOTH Created By: Ajay Bahoriya

2 Agenda Introduction to Bluetooth Bluetooth Basics Mode of operation Technology Security Advantages Integrating BT with.NET

3 Is the Tooth really Blue? The Henry Blatand story The brand is a label that is not a single company technology but is shared by many members of the Bluetooth SIG The SIG is composed of more than 8,000 member companies that are leaders in the telecommunications, computing, automotive, music, apparel, industrial automation, and network industries Prominent members: Nokia, Intel, Motorola, Microsoft, Lenovo, Toshiba Installed base of over 500 million units at end of 2005 More details about Bluetooth SIG can be found on www.bluetooth.com www.bluetooth.com

4 Some Blue examples Bluetooth handsfree used in car Transfer data from one device to another Operating all electronic devices in your room with your mobile Synchronize data on Mobile and Laptop without using any wires

5 Bluetooth Basics Bluetooth is a wireless communication technology that allows devices, within a 10-meter proximity, to communicate with each other Simultaneously handle both data and voice transmissions Each device can simultaneously communicate with 7 other devices Enables devices to query other devices about the services they offer. If a device offers more than one service, the user can select the service they want to use from that particular device Unlike infra-red, Bluetooth does not require line-of-sight positioning of connected units. Networks are established dynamically and automatically

6 Spectrum ISM band used by Bluetooth is available from 2.40-2.4835 GHz Uses frequency hopping, full-duplex signal at a nominal rate of 1600 hops/sec Band is available and unlicensed in most nations

7 Interference Adaptive Frequency Hopping was designed to reduce interference between wireless technologies sharing the 2.4 GHz spectrum providing users with greater performance even if using other technologies along with Bluetooth technology The signal hops among 79 frequencies at 1 MHz intervals Data Rate 1 Mbps for Version 1.2; Up to 3 Mbps supported for Version 2.0 + EDR Low power consumption of 2.5mW for upto 10m range

8 FHSS Uses Frequency Hopping Spread Spectrum (FHSS) techniques Countries the radios hop in pseudo random sequences around all available channels, this equates to 79 RF channels with a channel spacing of 1 MHz Starting at a base frequency of 2402 MHz then the frequency of the channels, f, can be expressed as: f =2402 + n MHz where, n, is the channel number with an integer value in the range of 0 to 78 FHSS implements Time Division Multiplexing FHSS has 1600 hops/sec ie a hop every 625 µs. Master transmit in slot 1 and slave in slot 2

9 How the devices connect Exist in small ad-hoc network configuration with the ability to operate as either master or the slave Master provides the synchronization clock and the hopping sequence Only one master allowed Slaves cannot communicate directly Mechanism to interchange role between slave and master

10 Contd.. instant formation of networks The configurations can be: Single point: One master and one slave Multipoint (Piconet): Up to 7 slaves clustered around a single Master Scatternet: Group of Piconets effectively hubbed via a single Bluetooth device acting as a master in one Piconet and a slave in the other Piconet

11 Connecting the BT Way! Built in mechanism to inquire for devices, connect to them and once connected discover the services they possess in their database: 1.The master enters inquiry mode and sends out an inquiry to discover devices available to connect to. 2.Potential slaves make themselves discoverable by entering inquiry scan mode and listen for an inquiry from a master. 3.On receiving an inquiry, the slave responds to the master with information that is needed to create a connection to the device; this information includes its Bluetooth address and class of device. 4.The master collects this information from each device discovered. To connect to one of these devices the master goes into page mode and will page the device using the corresponding Bluetooth address. 5.The slave being paged by a master will need to be in page scan mode to be able to connect to a master

12 Security Modes of security for BT access: Security Mode 1: non-secure Security Mode 2: service level enforced security Security Mode 3: link level enforced security -Provides both device and service level security -Concept of Trusted and Untrusted device With respect to Services 1.Authorization and authentication 2.Only authentication 3.Open to all devices

13 More on Security Bluejacking –Send business card anonymously –No removal or alteration of data –User needs to react/accept first Bluebugging –Access mobile phone commands without alerting the owner –Internet access,initiate calls, send and receive text messages

14 Advantage BT convenient, wire-free, short-range communication between devices Bluetooth enabled products do not need to install driver software low power low cost built-in security ease-of-use ad hoc networking abilities

15 Questions!!


Download ppt "BLUETOOTH Created By: Ajay Bahoriya. Agenda Introduction to Bluetooth Bluetooth Basics Mode of operation Technology Security Advantages Integrating BT."

Similar presentations


Ads by Google