BLUETOOTH Created By: Ajay Bahoriya. Agenda Introduction to Bluetooth Bluetooth Basics Mode of operation Technology Security Advantages Integrating BT.

Slides:



Advertisements
Similar presentations
Bluetooth.
Advertisements

BLUETOOTH TM :A new radio interface providing ubiquitous connectivity Jaap C.Haartsen Ericssion Radio System B.V IEEE.
BLUETOOTH. INTRODUCTION A look around at the moment! Keyboard connected to the computer, as well as a printer, mouse, monitor and so on. What (literally)
1 Introduction to Bluetooth v1.1 (Part I) Overview Radio Specification Baseband Specification LMP L2CAP.
Bluetooth Technology. What is Bluetooth? Bluetooth is a short- range communications technology that allows devices to communicate with each other without.
Infrared Data Association and Bluetooth Technology EE566 presentation
By Abdullah M. Dalloul… Abdullah M. Dalloul… Salman Y. Mansour Salman Y. Mansour Supervisor. Supervisor. Dr.
CPET 260 Bluetooth. What is Bluetooth? Not IEEE (Wi-Fi) or HomeRF Originally designed to replace wires Short-range, lower-power wireless technology.
Wireless Network Overview Slides originally from Carey Williamson and David Schwab Notes derived from “Computer Networking: A Top Down Approach”, by Jim.
BLUETOOTH.
Bluetooth Jennifer Portillo Thomas Razo Samson Vuong By Sonny Leung.
How secure is Darren Adams, Kyle Coble, and Lakshmi Kasoji.
Bluetooth Introduction The Bluetooth Technology
By: Trevor Parker, Minh-Tri Le. Bluetooth is a wireless technology that is a low-cost, low-power, short-range radio for ad-hoc wireless communication,
Stacy Drake Bluetooth Vs. Wi-Fi. What is Bluetooth?
Modeling & Simulation of Bluetooth MAC protocol COE543 Term Project Spring 2003 Submitted by: H.M.Asif (ID# )
Bluetooth & WPAN. 2 Bluetooth/WPAN WPAN (Wireless Personal Area Network) has a smaller area of coverage, say, 2.5 mW transmitter power, distance
Area 2 Computers & Technology Group 21 August 2008 Dean Steichen Br.#8.
Lecture #2 Chapter 14 Wireless LANs.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 50 – The Wireless LAN.
Overview of Wireless LANs Use wireless transmission medium Issues of high prices, low data rates, occupational safety concerns, & licensing requirements.
“Security Weakness in Bluetooth” M.Jakobsson, S.Wetzel LNCS 2020, 2001 The introduction of new technology and functionality can provides its users with.
What is Blue Tooth ? Blue tooth is a cable replacement technology that can be used to connect almost any device to any other devices. Blue tooth is the.
Bluetooth Technology Jason Babel Kyle Musal Joshua Turella Zdravko Tyankov.
Why go Wireless? By Cheryl Aupperle The Start…. Wireless communication is something we all are familiar with. Think about using a walkie- talkie, listening.
Goodbye! ….. to all things that are connected by cable…… NOW it can be connected using….
1 ITGS – Networking and T. Near and Far: Local Area Network/LAN/, (hubs, switches) Metropolitan Area Network/MAN/ Wide Area Network/WAN/ (backbone) Administrators,
WIRELESS LANs BLUETOOTH.
INTRODUCTION OVERVIEW OF OPERATION FREQUENCY HOPPING NETWORKING CONNECTION POWER CONSIDERATIONS CORE ARCHITECTURE RELIABILITY AND SECURITY ADVANTAGES.
Distributed Topology Construction of Bluetooth Personal Area Networks Theodoros Salonidis, Pravin Bhagwat, Leandros Tassiulas and Richard LaMaire.
Bluetooth Address or Name Sharing By Joseph Charboneau.
INTRODUCTION TO BLUETOOTH Named after tenth-century danish King Harald Blatand. Developed by Special Interest Group (SIG). Bluetooth wireless technology.
Bluetooth Submitted to: Doctor : Rabie Ramadan Submitted by: Khaled Mohammed Ali Hassan Master’s Student, Cairo University/2011.
Bluetooth Techniques ECE 591. Overview  Universal short-range wireless capability  Uses 2.4-GHz band  Available globally for unlicensed users  Devices.
MAHARANA PRATAP COLLEGE OF TECHNOLOGY, GWALIOR
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
An Introduction to BLUETOOTH TECHNOLOGY
By S.Karthika Menon N.Shanti sree.  Designed to connect both mobile devices and peripherals that currently requires a wire.  “USB without wires” 
PRESENTED BY M.A.M.JANI S.AMRUTHA RAJU M.A.M.JANI S.AMRUTHA RAJU.
Bluetooth Techniques Chapter 15. Overview of Bluetooth Initially developed by Swedish mobile phone maker in 1994 to let laptop computers make calls over.
Bluetooth By Christian Doyle. Overview What is Bluetooth? What’s with the name? Establishing a connection Multiplexing Piconets Scatternets Architecture.
Team Topic Presentation Team 6 BLUETOOTH What is Bluetooth? Cable Replacement Automatic Connectivity Hidden Computing Few Examples: 1.Automatic Door.
SEMINAR ON BLUETOOTH TECHNOLOGY
BLUETOOTH WIRELESS TECHNOLOGY
IEEE Wireless Personal Area Networks Wireless networks classified into four broad categories: –Wireless personal area network (WPAN): Hand-held.
Bluetooth In 1994, the L. M. Ericsson company became interested in connecting its mobile phones to other devices without cables. A SIG (Special Interest.
Handoff Support for Mobility with IP over Bluetooth Simon Baatz, Matthias Frank, Rolf Gopffarth, Peter Martini, Markus Schetelig, Dmitri Kassatkine, Asko.
Technology By :-. What Is Bluetooth? Designed to be used to connect both mobile devices and peripherals that currently require a wire Short range wireless.
Sonal Jain, IT-BHU Bluetooth Mobile Ad Hoc Networks Sonal Jain B.Tech (IV), Electrical Engg. Dept.,ITBHU IEEE SPAVes Sept 14, 15 Institute.
BluetoothTechnology Presenting By: AJAY DAGAR (ECE) Roll No: B.Tech VIIth Semester Inderprastha Engineering College.
Bluetooth Technology. History The name ‘Bluetooth’ was named after 10th century Viking king in Denmark Harald Bluetooth who united and controlled Denmark.
A presentation by Abhijit Chakrabarty or Dept of Computer Sc. & Engg. Dream Institute of Technology.
Respected Ma’am & Dear friends
Objective of this Presentation To understand what is Wi-Fi and what is Bluetooth. Difference between Bluetooth and Wi-Fi.
What is Bluetooth? A cable-replacement technology that can be used to connect almost any device to any other device Radio interface enabling electronic.
Corso di Reti mobili Wi-Fi and Bluetooth Francesco Potortì
Bluetooth for Ad-Hoc Networking
A Wireless LAN technologies IEEE
Unit – III Wireless PAN’s
Wireless NETWORKS NET 434 Topic No 7 Bluetooth-IEEE802.15
“I don’t have to be careful, I’ve got a gun.”
BLUETOOTH (I) Bluetooth technology aims at so-called ad hoc piconets, which are local area networks with a very limited coverage and without the need for.
Bluetooth: Vision, Goals and Architecture
BLUETOOTH AND ITS APPLICATION IN MOBILE PHONES
Bluetooth.
BLUETOOTH Personal Area Networking [ PAN ] over Bluetooth
Bluetooth, RFID, Data Link Layer Switching
Presentation transcript:

BLUETOOTH Created By: Ajay Bahoriya

Agenda Introduction to Bluetooth Bluetooth Basics Mode of operation Technology Security Advantages Integrating BT with.NET

Is the Tooth really Blue? The Henry Blatand story The brand is a label that is not a single company technology but is shared by many members of the Bluetooth SIG The SIG is composed of more than 8,000 member companies that are leaders in the telecommunications, computing, automotive, music, apparel, industrial automation, and network industries Prominent members: Nokia, Intel, Motorola, Microsoft, Lenovo, Toshiba Installed base of over 500 million units at end of 2005 More details about Bluetooth SIG can be found on

Some Blue examples Bluetooth handsfree used in car Transfer data from one device to another Operating all electronic devices in your room with your mobile Synchronize data on Mobile and Laptop without using any wires

Bluetooth Basics Bluetooth is a wireless communication technology that allows devices, within a 10-meter proximity, to communicate with each other Simultaneously handle both data and voice transmissions Each device can simultaneously communicate with 7 other devices Enables devices to query other devices about the services they offer. If a device offers more than one service, the user can select the service they want to use from that particular device Unlike infra-red, Bluetooth does not require line-of-sight positioning of connected units. Networks are established dynamically and automatically

Spectrum ISM band used by Bluetooth is available from GHz Uses frequency hopping, full-duplex signal at a nominal rate of 1600 hops/sec Band is available and unlicensed in most nations

Interference Adaptive Frequency Hopping was designed to reduce interference between wireless technologies sharing the 2.4 GHz spectrum providing users with greater performance even if using other technologies along with Bluetooth technology The signal hops among 79 frequencies at 1 MHz intervals Data Rate 1 Mbps for Version 1.2; Up to 3 Mbps supported for Version EDR Low power consumption of 2.5mW for upto 10m range

FHSS Uses Frequency Hopping Spread Spectrum (FHSS) techniques Countries the radios hop in pseudo random sequences around all available channels, this equates to 79 RF channels with a channel spacing of 1 MHz Starting at a base frequency of 2402 MHz then the frequency of the channels, f, can be expressed as: f = n MHz where, n, is the channel number with an integer value in the range of 0 to 78 FHSS implements Time Division Multiplexing FHSS has 1600 hops/sec ie a hop every 625 µs. Master transmit in slot 1 and slave in slot 2

How the devices connect Exist in small ad-hoc network configuration with the ability to operate as either master or the slave Master provides the synchronization clock and the hopping sequence Only one master allowed Slaves cannot communicate directly Mechanism to interchange role between slave and master

Contd.. instant formation of networks The configurations can be: Single point: One master and one slave Multipoint (Piconet): Up to 7 slaves clustered around a single Master Scatternet: Group of Piconets effectively hubbed via a single Bluetooth device acting as a master in one Piconet and a slave in the other Piconet

Connecting the BT Way! Built in mechanism to inquire for devices, connect to them and once connected discover the services they possess in their database: 1.The master enters inquiry mode and sends out an inquiry to discover devices available to connect to. 2.Potential slaves make themselves discoverable by entering inquiry scan mode and listen for an inquiry from a master. 3.On receiving an inquiry, the slave responds to the master with information that is needed to create a connection to the device; this information includes its Bluetooth address and class of device. 4.The master collects this information from each device discovered. To connect to one of these devices the master goes into page mode and will page the device using the corresponding Bluetooth address. 5.The slave being paged by a master will need to be in page scan mode to be able to connect to a master

Security Modes of security for BT access: Security Mode 1: non-secure Security Mode 2: service level enforced security Security Mode 3: link level enforced security -Provides both device and service level security -Concept of Trusted and Untrusted device With respect to Services 1.Authorization and authentication 2.Only authentication 3.Open to all devices

More on Security Bluejacking –Send business card anonymously –No removal or alteration of data –User needs to react/accept first Bluebugging –Access mobile phone commands without alerting the owner –Internet access,initiate calls, send and receive text messages

Advantage BT convenient, wire-free, short-range communication between devices Bluetooth enabled products do not need to install driver software low power low cost built-in security ease-of-use ad hoc networking abilities

Questions!!