SlideShare a Scribd company logo
Bluetooth Technology
Name
details
email
contacts

Abstract--There are different ways that
electronic devices can connect to each other. For
example: Component cables, Electrical wires,
Ethernet cables, Wi-Fi, Infrared signals. A
Bluetooth connection is wireless and automatic,
and it has a number of features that can help us
in daily life. Bluetooth is a well-known, shortrange technology for Wireless Personal Area
Networks (WPAN). Created by telecom vendor
Ericsson in 1994. It was named after the Harald
Bluetooth, king of Denmark and Norway in late
900’s. Bluetooth networking transmits data by
low-power radio waves. It communicates on a
frequency between 2.402 GHz and 2.480 GHz, to
be exact. Bluetooth uses a radio technology
called frequency-hopping spread spectrum. The
transmitted data is divided into packets and
each packet is transmitted on one of the 79
individual, randomly chosen frequencies within
a designated range. In the case of Bluetooth, the
transmitters change frequencies 1,600 times
every second, meaning that more devices can
make full use of a limited slice of the radio
spectrum. Bluetooth is a packet-based protocol
with a master slave structure. A master
Bluetooth device can communicate with a
maximum of seven devices in a piconet . The
devices can switch roles, by agreement, and the
slave can become the master. When Bluetoothcapable devices come within range of one
another, an electronic conversation takes place
to determine whether they have share data or
whether one needs to control the other.
Bluetooth systems create a personal-area
network (PAN), or piconet. Service-level
security and device-level security work together
to protect Bluetooth devices from unauthorized
data transmission. Blue jacking, Blue bugging
and Car Whisperer are the main security issues.
Bluetooth 1.0 has a maximum transfer speed of
1Mbps, while Bluetooth 2.0 can has data rate up
to 3Mbps and version3.0 has up to 24Mbps.
keywords--piconet, Frequency hopping spread
system.

I.

INTRODUCTION

This world is made up of cables, cables and lots of
cables. Let it be current wires, TV wires ,or cables
connecting various electronic devices such as
computers connected to keyboard, mouse, printer,
phone(USB) etc. Cables have become the bane of
many offices, homes etc. That is where the
Bluetooth technology aims at – a cable replacement
technology . There are many cable replacement
technologies now such as Wi-Fi, Infrared signals,
Gi-Fi, NFC etc. Bluetooth technology is wireless
and automatic, and it has a number of interesting
features that can help us in many ways. The big
draws of Bluetooth are that it is wireless,
inexpensive and automatic. Bluetooth was named
after the king Harald Bluetooth. Harald Bluetooth
was the king of Denmark in the late 900s. He
managed to unite Denmark and part of Norway into
a single kingdom then introduced Christianity into
Denmark. The idea of this name was proposed in
1997 by Jim Kardach who developed a system that
would allow mobile phones to communicate with
computers (at the time he was reading Frans
Gunnar Bengtsson's historical novel The Long
Ships about Vikings and king Harald Bluetooth).
The Bluetooth logo is a bind rune merging the
Younger Futhark runes (Hagall) (ᚼ Bjarkan (ᚼ
),
),
Harald's initial.
One of
the most significant recent developments in
wireless technologies is the emergence of Wireless
personal area networking (WPAN). Developed in
1998, WPAN is based on a new technology called
Bluetooth, which uses short-range radio frequencies
to transmit both voice and data. This technology
wirelessly and transparently synchronizes data
across devices and creates access to networks and
the Internet within a range of ten meters. The shortrange networks Bluetooth enables are called
Personal Area Networks (PANs) or piconets.
Bluetooth is more able to move from frequency to
frequency, making it better able to handle
interference than competing protocols .
II.

HOW BLUETOOTH TECHNOLOGY
WORKS

The
technology of Bluetooth centres around 9mm x
9mm microchip, which functions as a low cost and
short range radio link. Bluetooth Technology
provides a 10 meter personal bubble that support
simultaneous transmission of both voice and data
for multiple devices. Up to 7 devices can be
connected in a piconet, and up to 10 piconets can
exist within the 10 meter bubble. In Bluetooth the
transceiver transmits and receives in a previously
unused frequency band of 2.45 GHz that is
available globally. Each device has a unique 48-bit
address from the IEEE 802 standard. Connections
can be point-to-point or multipoint. The maximum
range is 10-100 meters. Data can be exchanged at a
rate of 1 megabit per second.
Bluetoot
h can connect up to eight devices simultaneously.
With all of those devices in the same 10meterradius, there might be any problem like
they'd interfere with one another, but it's unlikely.
Bluetooth uses a technique called spread-spectrum
frequency hopping that makes it rare for more than
one device to be transmitting on the same
frequency at the same time. In this technique, a
device will use 79 individual, randomly chosen
frequencies within a designated range, changing
from one to another on a regular basis. In the case
of Bluetooth, the transmitters change frequencies
1,600 times every second. Since every Bluetooth
transmitter uses spread-spectrum transmitting
automatically, it’s unlikely that two transmitters
will be on the same frequency at the same time.
This same technique minimizes the risk that
portable phones or baby monitors will disrupt
Bluetooth devices, since any interference on a
particular frequency will last only a tiny fraction of
a second.
When
Bluetooth-capable devices come within range of
one another, an electronic conversation takes place
to determine whether they have data to share or
whether one needs to control the other. Once the
conversation has occurred, the devices -whether
they're part of a computer system or a stereo - form
a network. Bluetooth systems create a personal-area
network (PAN). Once a piconet is established, the
members randomly hop frequencies in unison so
they stay in touch with one another and avoid other
piconets that may be operating in the same room.

III.

BLUETOOTH NETOWRK TOPOLOGY

There are
3 types of connections in Bluetooth, as shown
below: Either Single-slave or Multi-slave (up to 7
"slaves" on one master) or Scatter net. Multiple
Bluetooth units form a Wireless Personal Area
Network, piconet. A piconet consists of one hub
device and up to seven client devices. It is possible

to support more devices in a piconet by placing one
or more of the clients into what is referred to as
park mode. In order to exchange information with
the parked client, the hub must take it out of parked
mode and return it to active mode. Only seven
clients can be in active mode at any given time.
When two piconets are in close proximity, they
have overlapping coverage areas - a scenario
referred to as a scatter net Clients in one piconet
can participate in another piconet as either a hub or
client. This is accomplished through time division
on multiplexing. In a scatter net, the two(or more)
piconets are not synchronized in either time or
frequency. Each of the piconets operates in its own
frequency-hopping channel, while any devices in
multiple piconets participate at the appropriate time
via time division multiplexing.

IV.

POWER MODES

Bluetoot
h provides for three low power modes to conserve
battery life: sniff mode, hold mode, and park mode.
While in the sniff mode, a device listens to the
piconet at a reduced rate. The sniff interval is
programmable, providing flexibility for different
applications. In hold mode, only an internal timer is
running, and data transfer restarts when units
transition out of the hold mode. Park mode is used
to handle more than seven clients - since only seven
clients can be "active" at any time, one client can be
"parked" and another one activated.
V.

BLUETOOTH SECURITY

By
default, most Bluetooth devices operate in
unprotected "non-secure" mode. Security is
provided in three ways: through pseudo-random
frequency band hops, authentication, and
encryption.
When link security is enabled, Bluetooth devices
must complete an initial "bonding" exchange to
derive pair wise link authentication and encryption
keys. The user must give both devices the same
PIN code, which is then mixed with a factorydefined unit key. Bluetooth offers several other
security modes, and device manufacturers
determine which mode to include in a Bluetoothenabled gadget. In almost all cases, Bluetooth users
can establish "trusted devices" that can exchange
data without asking permission. When any other
device tries to establish a connection to the user's
gadget, the user has to decide to allow it. Servicelevel security and device-level security work
together to protect Bluetooth devices from
unauthorized data transmission. Security methods
include authorization and identification procedures
that limit the use of Bluetooth services to the
registered user and require that users make a
conscious decision to open a file or accept a data
transfer. As long as these measures are enabled on
the user's phone or other device, unauthorized
access is unlikely. A user can also simply switch
his Bluetooth mode to "non-discoverable" and
avoid connecting with other Bluetooth devices
entirely.
VI.
APPLICATIONS
Hands free devices, music players,
car-driving system to ensure safety,
Wireless connection of input/output
devices like key-board, Monitor,
mouse, Printer etc with PC.
Wireless internet access using
Bluetooth Dongle.
Smart sensor devices, In medical,
sports field.
In Gaming consoles. i.e. PSPs.
VII.

CONCLUSION

Despite some of the problems, Bluetooth remains a
very promising technology, with plenty of medium
and long term applications. Bluetooth is a
continually expanding technology. There are plans
to add many new application profiles. With over
15000 companies working on Bluetooth, the future
is very bright. With a strong special interest group
behind Bluetooth, the standardization of the
application profiles is almost assured. Bluetooth is
simply the best!!
VIII.

REFERENCES

[1] The
official
Bluetooth
site:
http://www.bluetooth.com
[2] http://electronics.howstuffworks.com/bluet
ooth.htm
[3] https://en.wikipedia.org/wiki/Bluetooth

More Related Content

PPT
Bluetooth
PPT
Bluetooth presentation
PPT
Bluetooth
DOC
Bluetooth
PPT
Bluetooh Technology
PPTX
4G and 5gG Communication for Beginner
DOCX
Bluetooth paper (IEEE)
PPTX
Bluetooth
Bluetooth
Bluetooth presentation
Bluetooth
Bluetooth
Bluetooh Technology
4G and 5gG Communication for Beginner
Bluetooth paper (IEEE)
Bluetooth

What's hot (20)

PDF
FUNDAMENTALS OF MICROWAVE RADIO COMMUNICATION FOR IP AND TDM
PPTX
Generation of mobile communication systems
PPT
Bluetooth Slides
PPT
Evolution from 3_g_to_4g_and_beyond_5g
PPT
Diapositivas U2 2 Bluetooth V2
PPTX
Wireless mobile communication
PPT
bluetooth-security
PDF
Designing 5G NR (New Radio)
PPT
1G, 2G, 3G, 4G, 5G. Best topic for telecom presentation
PPTX
Bluetooth smart technology(description about all versions)
PPTX
Introduction to 5G NR
PPTX
Generations of Mobile Communications
PPTX
Bluetooth Basic Version
PPTX
Types of wireless communication technologies
PPTX
Bluetooth
PPTX
Bluetooth technology
PDF
3GPP Release 17: Completing the first phase of 5G evolution
PDF
5G Standards: 3GPP Release 15, 16, and beyond
DOCX
Normas fibra-optica
PPTX
Wi-max Technology PPT
FUNDAMENTALS OF MICROWAVE RADIO COMMUNICATION FOR IP AND TDM
Generation of mobile communication systems
Bluetooth Slides
Evolution from 3_g_to_4g_and_beyond_5g
Diapositivas U2 2 Bluetooth V2
Wireless mobile communication
bluetooth-security
Designing 5G NR (New Radio)
1G, 2G, 3G, 4G, 5G. Best topic for telecom presentation
Bluetooth smart technology(description about all versions)
Introduction to 5G NR
Generations of Mobile Communications
Bluetooth Basic Version
Types of wireless communication technologies
Bluetooth
Bluetooth technology
3GPP Release 17: Completing the first phase of 5G evolution
5G Standards: 3GPP Release 15, 16, and beyond
Normas fibra-optica
Wi-max Technology PPT
Ad

Similar to Bluetooth paper presentation ieee (20)

PPTX
Bluetooth Technology and its uses by Prince Rohan
PPTX
Bluetooth
DOCX
Bluetooth technology
PPT
Introduction to Bluetooth technology
PPTX
404347218-PRESENTATION-ON-BLUETOOTH-TECHNOLOGY.pptx
PDF
Bluetooth
PPT
Bluetooth.ppt
PPT
Bluetooth
DOCX
Bluetooth based smart sensor devices 2
PDF
Overview of Bluetooth technology
PPS
Bluetoothppt
PPT
Bluetooth
PPT
Bluetooth
PPTX
Bluetooth
PPTX
siddharth bt ppt.pptx
PPTX
Bluetooth
PDF
IT WRITING SAMPLES PORTFOLIO
PPT
New advancement in technology - bluetooth technology
DOCX
Bluetooth
PPTX
Cn final-project-presentation-by-luqman
Bluetooth Technology and its uses by Prince Rohan
Bluetooth
Bluetooth technology
Introduction to Bluetooth technology
404347218-PRESENTATION-ON-BLUETOOTH-TECHNOLOGY.pptx
Bluetooth
Bluetooth.ppt
Bluetooth
Bluetooth based smart sensor devices 2
Overview of Bluetooth technology
Bluetoothppt
Bluetooth
Bluetooth
Bluetooth
siddharth bt ppt.pptx
Bluetooth
IT WRITING SAMPLES PORTFOLIO
New advancement in technology - bluetooth technology
Bluetooth
Cn final-project-presentation-by-luqman
Ad

More from Rohith Raj (7)

DOCX
Bitcoin
DOCX
Internet of things
PPTX
Google person finder
PPTX
Raspberry pi
PPTX
Perfumes
PPTX
Touch screen technology
PPTX
emotional intelligence
Bitcoin
Internet of things
Google person finder
Raspberry pi
Perfumes
Touch screen technology
emotional intelligence

Recently uploaded (20)

PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
sap open course for s4hana steps from ECC to s4
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
KodekX | Application Modernization Development
PDF
Empathic Computing: Creating Shared Understanding
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
Programs and apps: productivity, graphics, security and other tools
PPT
Teaching material agriculture food technology
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
Cloud computing and distributed systems.
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
Spectroscopy.pptx food analysis technology
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Network Security Unit 5.pdf for BCA BBA.
Mobile App Security Testing_ A Comprehensive Guide.pdf
sap open course for s4hana steps from ECC to s4
MIND Revenue Release Quarter 2 2025 Press Release
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
KodekX | Application Modernization Development
Empathic Computing: Creating Shared Understanding
MYSQL Presentation for SQL database connectivity
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Understanding_Digital_Forensics_Presentation.pptx
Encapsulation_ Review paper, used for researhc scholars
Unlocking AI with Model Context Protocol (MCP)
NewMind AI Weekly Chronicles - August'25 Week I
Programs and apps: productivity, graphics, security and other tools
Teaching material agriculture food technology
Spectral efficient network and resource selection model in 5G networks
Cloud computing and distributed systems.
20250228 LYD VKU AI Blended-Learning.pptx
Spectroscopy.pptx food analysis technology

Bluetooth paper presentation ieee

  • 1. Bluetooth Technology Name details email contacts Abstract--There are different ways that electronic devices can connect to each other. For example: Component cables, Electrical wires, Ethernet cables, Wi-Fi, Infrared signals. A Bluetooth connection is wireless and automatic, and it has a number of features that can help us in daily life. Bluetooth is a well-known, shortrange technology for Wireless Personal Area Networks (WPAN). Created by telecom vendor Ericsson in 1994. It was named after the Harald Bluetooth, king of Denmark and Norway in late 900’s. Bluetooth networking transmits data by low-power radio waves. It communicates on a frequency between 2.402 GHz and 2.480 GHz, to be exact. Bluetooth uses a radio technology called frequency-hopping spread spectrum. The transmitted data is divided into packets and each packet is transmitted on one of the 79 individual, randomly chosen frequencies within a designated range. In the case of Bluetooth, the transmitters change frequencies 1,600 times every second, meaning that more devices can make full use of a limited slice of the radio spectrum. Bluetooth is a packet-based protocol with a master slave structure. A master Bluetooth device can communicate with a maximum of seven devices in a piconet . The devices can switch roles, by agreement, and the slave can become the master. When Bluetoothcapable devices come within range of one another, an electronic conversation takes place to determine whether they have share data or whether one needs to control the other. Bluetooth systems create a personal-area network (PAN), or piconet. Service-level security and device-level security work together to protect Bluetooth devices from unauthorized data transmission. Blue jacking, Blue bugging and Car Whisperer are the main security issues. Bluetooth 1.0 has a maximum transfer speed of 1Mbps, while Bluetooth 2.0 can has data rate up to 3Mbps and version3.0 has up to 24Mbps. keywords--piconet, Frequency hopping spread system. I. INTRODUCTION This world is made up of cables, cables and lots of cables. Let it be current wires, TV wires ,or cables connecting various electronic devices such as computers connected to keyboard, mouse, printer, phone(USB) etc. Cables have become the bane of many offices, homes etc. That is where the Bluetooth technology aims at – a cable replacement technology . There are many cable replacement technologies now such as Wi-Fi, Infrared signals, Gi-Fi, NFC etc. Bluetooth technology is wireless and automatic, and it has a number of interesting features that can help us in many ways. The big draws of Bluetooth are that it is wireless, inexpensive and automatic. Bluetooth was named after the king Harald Bluetooth. Harald Bluetooth was the king of Denmark in the late 900s. He managed to unite Denmark and part of Norway into a single kingdom then introduced Christianity into Denmark. The idea of this name was proposed in 1997 by Jim Kardach who developed a system that would allow mobile phones to communicate with computers (at the time he was reading Frans Gunnar Bengtsson's historical novel The Long Ships about Vikings and king Harald Bluetooth). The Bluetooth logo is a bind rune merging the Younger Futhark runes (Hagall) (ᚼ Bjarkan (ᚼ ), ), Harald's initial. One of the most significant recent developments in wireless technologies is the emergence of Wireless personal area networking (WPAN). Developed in 1998, WPAN is based on a new technology called Bluetooth, which uses short-range radio frequencies to transmit both voice and data. This technology wirelessly and transparently synchronizes data across devices and creates access to networks and the Internet within a range of ten meters. The shortrange networks Bluetooth enables are called Personal Area Networks (PANs) or piconets. Bluetooth is more able to move from frequency to frequency, making it better able to handle interference than competing protocols . II. HOW BLUETOOTH TECHNOLOGY WORKS The technology of Bluetooth centres around 9mm x 9mm microchip, which functions as a low cost and
  • 2. short range radio link. Bluetooth Technology provides a 10 meter personal bubble that support simultaneous transmission of both voice and data for multiple devices. Up to 7 devices can be connected in a piconet, and up to 10 piconets can exist within the 10 meter bubble. In Bluetooth the transceiver transmits and receives in a previously unused frequency band of 2.45 GHz that is available globally. Each device has a unique 48-bit address from the IEEE 802 standard. Connections can be point-to-point or multipoint. The maximum range is 10-100 meters. Data can be exchanged at a rate of 1 megabit per second. Bluetoot h can connect up to eight devices simultaneously. With all of those devices in the same 10meterradius, there might be any problem like they'd interfere with one another, but it's unlikely. Bluetooth uses a technique called spread-spectrum frequency hopping that makes it rare for more than one device to be transmitting on the same frequency at the same time. In this technique, a device will use 79 individual, randomly chosen frequencies within a designated range, changing from one to another on a regular basis. In the case of Bluetooth, the transmitters change frequencies 1,600 times every second. Since every Bluetooth transmitter uses spread-spectrum transmitting automatically, it’s unlikely that two transmitters will be on the same frequency at the same time. This same technique minimizes the risk that portable phones or baby monitors will disrupt Bluetooth devices, since any interference on a particular frequency will last only a tiny fraction of a second. When Bluetooth-capable devices come within range of one another, an electronic conversation takes place to determine whether they have data to share or whether one needs to control the other. Once the conversation has occurred, the devices -whether they're part of a computer system or a stereo - form a network. Bluetooth systems create a personal-area network (PAN). Once a piconet is established, the members randomly hop frequencies in unison so they stay in touch with one another and avoid other piconets that may be operating in the same room. III. BLUETOOTH NETOWRK TOPOLOGY There are 3 types of connections in Bluetooth, as shown below: Either Single-slave or Multi-slave (up to 7 "slaves" on one master) or Scatter net. Multiple Bluetooth units form a Wireless Personal Area Network, piconet. A piconet consists of one hub device and up to seven client devices. It is possible to support more devices in a piconet by placing one or more of the clients into what is referred to as park mode. In order to exchange information with the parked client, the hub must take it out of parked mode and return it to active mode. Only seven clients can be in active mode at any given time. When two piconets are in close proximity, they have overlapping coverage areas - a scenario referred to as a scatter net Clients in one piconet can participate in another piconet as either a hub or client. This is accomplished through time division on multiplexing. In a scatter net, the two(or more) piconets are not synchronized in either time or frequency. Each of the piconets operates in its own frequency-hopping channel, while any devices in multiple piconets participate at the appropriate time via time division multiplexing. IV. POWER MODES Bluetoot h provides for three low power modes to conserve battery life: sniff mode, hold mode, and park mode. While in the sniff mode, a device listens to the piconet at a reduced rate. The sniff interval is programmable, providing flexibility for different applications. In hold mode, only an internal timer is running, and data transfer restarts when units transition out of the hold mode. Park mode is used to handle more than seven clients - since only seven clients can be "active" at any time, one client can be "parked" and another one activated. V. BLUETOOTH SECURITY By default, most Bluetooth devices operate in unprotected "non-secure" mode. Security is provided in three ways: through pseudo-random frequency band hops, authentication, and encryption. When link security is enabled, Bluetooth devices must complete an initial "bonding" exchange to derive pair wise link authentication and encryption keys. The user must give both devices the same PIN code, which is then mixed with a factorydefined unit key. Bluetooth offers several other security modes, and device manufacturers determine which mode to include in a Bluetoothenabled gadget. In almost all cases, Bluetooth users can establish "trusted devices" that can exchange data without asking permission. When any other device tries to establish a connection to the user's gadget, the user has to decide to allow it. Servicelevel security and device-level security work together to protect Bluetooth devices from unauthorized data transmission. Security methods
  • 3. include authorization and identification procedures that limit the use of Bluetooth services to the registered user and require that users make a conscious decision to open a file or accept a data transfer. As long as these measures are enabled on the user's phone or other device, unauthorized access is unlikely. A user can also simply switch his Bluetooth mode to "non-discoverable" and avoid connecting with other Bluetooth devices entirely. VI. APPLICATIONS Hands free devices, music players, car-driving system to ensure safety, Wireless connection of input/output devices like key-board, Monitor, mouse, Printer etc with PC. Wireless internet access using Bluetooth Dongle. Smart sensor devices, In medical, sports field. In Gaming consoles. i.e. PSPs. VII. CONCLUSION Despite some of the problems, Bluetooth remains a very promising technology, with plenty of medium and long term applications. Bluetooth is a continually expanding technology. There are plans to add many new application profiles. With over 15000 companies working on Bluetooth, the future is very bright. With a strong special interest group behind Bluetooth, the standardization of the application profiles is almost assured. Bluetooth is simply the best!! VIII. REFERENCES [1] The official Bluetooth site: http://www.bluetooth.com [2] http://electronics.howstuffworks.com/bluet ooth.htm [3] https://en.wikipedia.org/wiki/Bluetooth