Presentation is loading. Please wait.

Presentation is loading. Please wait.

Bluetooth Jennifer Portillo Thomas Razo Samson Vuong By Sonny Leung.

Similar presentations


Presentation on theme: "Bluetooth Jennifer Portillo Thomas Razo Samson Vuong By Sonny Leung."— Presentation transcript:

1

2 Bluetooth Jennifer Portillo Thomas Razo Samson Vuong By Sonny Leung

3 Introduction What is Bluetooth? What is Bluetooth? What does it do? What does it do? History of Bluetooth History of Bluetooth

4 Introduction (cont’d) Is Bluetooth here to stay? Is Bluetooth here to stay? What should we expect from Bluetooth in the future? What should we expect from Bluetooth in the future?

5 What Bluetooth Delivers to the end-user Connects a wide range of computing and telecommunication devices Connects a wide range of computing and telecommunication devices Expand communication capabilities Expand communication capabilities Devices can communicate with each other with wireless connectivity Devices can communicate with each other with wireless connectivity

6 User Application Car manufactures Industry Car manufactures Industry E-Mail / Internet / Intranet Access E-Mail / Internet / Intranet Access Headsets Headsets Bluetooth will facilitate Local Area Networks Bluetooth will facilitate Local Area Networks

7 Bluetooth in Action Source: http//:www.motorola.com In the Office... In the Office... In the house

8 Home Security On the Road Source: http//:www.motorola.com

9 On your Car Source: http//:www.motorola.com

10 Bluetooth Specifications Things that you must have: Things that you must have: –Transceivers and Receivers that can send and receive data because they use Radio Waves. –MAC Address (Physical Address) Burnt on the NIC card by the manufacturer. Burnt on the NIC card by the manufacturer. –PIN Number To identify the user using the device. To identify the user using the device. –A Piconet –A FHHS protocol

11 What is a Piconet? A Piconet session is a communication link that must be created between devices for devices to communicate with each other. A Piconet session is a communication link that must be created between devices for devices to communicate with each other. This is done when the MAC address and the PIN number match. This is done when the MAC address and the PIN number match.

12 Piconet (cont.) If two devices come onto contact with each other( 32 feet) the user will be prompted to initiate a communication session If two devices come onto contact with each other( 32 feet) the user will be prompted to initiate a communication session Users then can either deny or accept the request to initiate a session Users then can either deny or accept the request to initiate a session Only devices approved by the user can take part in the session Only devices approved by the user can take part in the session Data will appear as noise to unauthorized devices(A great security feature). Data will appear as noise to unauthorized devices(A great security feature).

13 FHHS Bluetooth devices use a protocol called (FHHS) Frequency-Hopping Spread Spectrum. Bluetooth devices use a protocol called (FHHS) Frequency-Hopping Spread Spectrum. Uses packet-switching to send data. Uses packet-switching to send data. Bluetooth sends packets of data on a range of frequencies. Bluetooth sends packets of data on a range of frequencies. In each session one device is a master and the others are slaves. In each session one device is a master and the others are slaves. The master device decides at which frequency data will travel. The master device decides at which frequency data will travel.

14 FHHS Transceivers “hop” among 79 different frequencies in the 2.4 GHz baud at a rate of 1600 frequency hops per second. Transceivers “hop” among 79 different frequencies in the 2.4 GHz baud at a rate of 1600 frequency hops per second. The master device tells the slaves at what frequency data will be sent. The master device tells the slaves at what frequency data will be sent. This technique allows devices to communicate with each other more securely. This technique allows devices to communicate with each other more securely.

15 FHHS Example Source: http://www.xircom.com

16 Bluetooth Security Modes Modes –Security Mode 1 No Security No Security –Security Mode 2 Service Level Enforced Security Service Level Enforced Security Implemented after channel is established Implemented after channel is established –Security Mode 3 Link Level Enforced Security Link Level Enforced Security Implemented before channel is established Implemented before channel is established

17 Devices “Trusted” “Trusted” –No Restrictions “Untrusted” “Untrusted” –Restrictions, Access is limited

18 Service Levels Authorization and Authentication Authorization and Authentication Authentication Only Authentication Only Open to all Devices Open to all Devices

19 Link Level Bluetooth Device Address Bluetooth Device Address Private Link Key Private Link Key Private Encryption Key Private Encryption Key Random Number Random Number

20 Bluetooth Secure Enough? Not enough for confidential and top secret information now but... Not enough for confidential and top secret information now but... Security will Improve Security will Improve –Improve exisiting security –Implement new security

21 Wrap up Growing Technology Growing Technology Automation Automation

22 For More Information Please Visit The Following Sites www.motorola.com www.motorola.com www.motorola.com www.xircom.com www.xircom.com www.xircom.com www.palowireless.com www.palowireless.com www.palowireless.com www.bluetooth.com www.bluetooth.com www.bluetooth.com


Download ppt "Bluetooth Jennifer Portillo Thomas Razo Samson Vuong By Sonny Leung."

Similar presentations


Ads by Google