SlideShare a Scribd company logo
BLUETOOTH
Agenda Introduction to Bluetooth Bluetooth Basics Mode of operation Technology Security Advantages Integrating BT with .NET
Is the Tooth really Blue?  The Henry Blatand story The brand is a label that is not a single company technology but is shared by many members of the Bluetooth SIG  The SIG is composed of more than 8,000 member companies that are leaders in the telecommunications, computing, automotive, music, apparel, industrial automation, and network industries  Prominent members: Nokia, Intel, Motorola, Microsoft, Lenovo, Toshiba Installed base of over 500 million units at end of 2005 More details about Bluetooth SIG can be found on  www.bluetooth.com
Some Blue examples Bluetooth handsfree used in car Transfer data from one device to another Operating all electronic devices in your room with your mobile Synchronize data on Mobile and Laptop without using any wires
Bluetooth Basics Bluetooth is a wireless communication technology that allows devices, within a 10-meter proximity, to communicate with each other  Simultaneously handle both data and voice transmissions Each device can simultaneously communicate with 7 other devices Enables devices to query other devices about the services they offer. If a device offers more than one service, the user can select the service they want to use from that particular device  Unlike infra-red, Bluetooth does not require line-of-sight positioning of connected units.  Networks are established dynamically and automatically
Spectrum ISM band used by Bluetooth is available from 2.40-2.4835 GHz Uses frequency hopping, full-duplex signal at a nominal rate of 1600 hops/sec   Band is available and unlicensed in most nations
Interference Adaptive Frequency Hopping was designed to reduce interference  between wireless technologies sharing the 2.4 GHz spectrum  providing users with greater performance even if using other technologies along with  Bluetooth  technology  The signal hops among 79 frequencies at 1 MHz intervals  Data Rate 1 Mbps for Version 1.2;  Up to 3 Mbps  supported for Version 2.0 + EDR Low power consumption of 2.5mW for upto 10m range
FHSS Uses Frequency Hopping Spread Spectrum (FHSS) techniques  Countries the radios hop in pseudo random sequences around all available channels,  this equates to 79 RF channels with a channel spacing of 1 MHz   Starting at a base frequency of 2402 MHz then the frequency of the channels, f, can be expressed as:  f =2402 + n MHz where, n, is the channel number with an integer value in the range of 0 to 78   FHSS implements Time Division Multiplexing FHSS has 1600 hops/sec ie a hop every 625  µs. Master transmit in slot 1 and slave in slot 2
How the devices connect Exist in small ad-hoc network configuration with the ability to operate as either master or the slave Master provides the synchronization clock and the hopping sequence Only one master allowed Slaves cannot communicate directly Mechanism to interchange role between slave and master
Contd.. instant formation of networks   The configurations can be: Single point: One master and one slave   Multipoint (Piconet): Up to 7 slaves clustered around a single Master   Scatternet: Group of Piconets effectively hubbed via a single Bluetooth device acting as a master in one Piconet and a slave in the other Piconet
Connecting the BT Way! Built in mechanism to inquire for devices, connect to them and once connected discover the services they possess in their database:  The master enters inquiry mode and sends out an inquiry to discover devices available to connect to. Potential slaves make themselves discoverable by entering inquiry scan mode and listen for an inquiry from a master.  On receiving an inquiry, the slave responds to the master with information that is needed to create a connection to the device; this information includes its Bluetooth address and class of device. The master collects this information from each device discovered. To connect to one of these devices the master goes into page mode and will page the device using the corresponding Bluetooth address. The slave being paged by a master will need to be in page scan mode to be able to connect to a master
Security Modes of security for BT access: Security Mode 1: non-secure Security Mode 2: service level enforced    security Security Mode 3: link level enforced security -Provides both device and service level security -Concept of Trusted and Untrusted device With respect to Services Authorization and authentication Only authentication Open to all devices
More on Security Bluejacking Send business card anonymously No removal or alteration of data User needs to react/accept first Bluebugging Access mobile phone commands without alerting the owner Internet access,initiate calls, send and receive text messages
Advantage BT convenient, wire-free, short-range communication between devices  Bluetooth  enabled products do not need to install driver software  low power  low cost  built-in security  ease-of-use  ad hoc networking abilities
Questions!!

More Related Content

PPTX
Bluetooth Basic Version
PPTX
Bluetooth
PPT
bluetooth technology
PPTX
Bluetooth
PPT
An Introduction to BLUETOOTH TECHNOLOGY
PPTX
Bluetooth technology by polite group
DOC
Bluetooth
PPTX
Bluetooth technology
Bluetooth Basic Version
Bluetooth
bluetooth technology
Bluetooth
An Introduction to BLUETOOTH TECHNOLOGY
Bluetooth technology by polite group
Bluetooth
Bluetooth technology

What's hot (20)

PPTX
Bluetooth technology
DOCX
Bluetooth based smart sensor devices 2
PDF
Bluetooth
PPTX
Bluetooth - Comprehensive Presentation
PPTX
Bluetooth, RFID and WiMAX Technologies
PPT
Bluetooth
PPTX
Bluetooth smart technology(description about all versions)
PPTX
Bluetooth
PPTX
The Bluetooth technology
DOCX
Protocols in Bluetooth
PPTX
Bluetooth Power point presentation
PPT
Bluetooth presentation
PPT
Bluetooth
DOCX
Bluetooth technology
PPT
Bluetooth
KEY
Bluetooth Security
PPTX
Bluethooth Protocol stack/layers
PPTX
Bluetooth Technology and its uses by Prince Rohan
PPTX
Bluetooth
PPT
BLUETOOTH TECHNOLOGY
Bluetooth technology
Bluetooth based smart sensor devices 2
Bluetooth
Bluetooth - Comprehensive Presentation
Bluetooth, RFID and WiMAX Technologies
Bluetooth
Bluetooth smart technology(description about all versions)
Bluetooth
The Bluetooth technology
Protocols in Bluetooth
Bluetooth Power point presentation
Bluetooth presentation
Bluetooth
Bluetooth technology
Bluetooth
Bluetooth Security
Bluethooth Protocol stack/layers
Bluetooth Technology and its uses by Prince Rohan
Bluetooth
BLUETOOTH TECHNOLOGY
Ad

Similar to Bluetoothppt (20)

DOCX
Bluetooth paper presentation ieee
DOC
Bluetooth
PPTX
Bluetooth basic
DOCX
Bluetooth technology
PPTX
PPT on Bluetooth Based Wireless Sensor Networks
PPTX
COMPARISON OF SHORT RANGE WIRELESS NETWORKS (PAN’ s)
PDF
Tagg inferno - how does bluetooth work
DOCX
Bluetooth paper (IEEE)
PPT
R K 2 Bluetooth Technologies
PPTX
Bluetooth Based Smart Sensor Network
PPT
Bluetooth
PPT
124647123-Bluetooth.ppt
PPT
Bluetooth Technology By Volkan Sevindik
PPTX
Teknologi Bluetooth
PPT
Bluetooth
PPT
Bluetooth Technology
PPT
Introduction to Bluetooth technology
PPTX
Data Communication and Network World of Bluetooth
PPTX
IIOT BASIC CONCEPTS FOR DIPLOMA FINAL YEAR STUDENTS.pptx
PPT
Bluetooth technology aditya
Bluetooth paper presentation ieee
Bluetooth
Bluetooth basic
Bluetooth technology
PPT on Bluetooth Based Wireless Sensor Networks
COMPARISON OF SHORT RANGE WIRELESS NETWORKS (PAN’ s)
Tagg inferno - how does bluetooth work
Bluetooth paper (IEEE)
R K 2 Bluetooth Technologies
Bluetooth Based Smart Sensor Network
Bluetooth
124647123-Bluetooth.ppt
Bluetooth Technology By Volkan Sevindik
Teknologi Bluetooth
Bluetooth
Bluetooth Technology
Introduction to Bluetooth technology
Data Communication and Network World of Bluetooth
IIOT BASIC CONCEPTS FOR DIPLOMA FINAL YEAR STUDENTS.pptx
Bluetooth technology aditya
Ad

Recently uploaded (20)

PDF
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
PDF
A Brief Introduction About Julia Allison
PDF
Roadmap Map-digital Banking feature MB,IB,AB
PDF
Nidhal Samdaie CV - International Business Consultant
PDF
Training And Development of Employee .pdf
PDF
Types of control:Qualitative vs Quantitative
PPTX
job Avenue by vinith.pptxvnbvnvnvbnvbnbmnbmbh
PDF
Unit 1 Cost Accounting - Cost sheet
PPTX
Lecture (1)-Introduction.pptx business communication
PPTX
The Marketing Journey - Tracey Phillips - Marketing Matters 7-2025.pptx
PDF
How to Get Funding for Your Trucking Business
PPTX
Dragon_Fruit_Cultivation_in Nepal ppt.pptx
PDF
BsN 7th Sem Course GridNNNNNNNN CCN.pdf
PDF
COST SHEET- Tender and Quotation unit 2.pdf
DOCX
Business Management - unit 1 and 2
PPTX
Probability Distribution, binomial distribution, poisson distribution
PDF
Katrina Stoneking: Shaking Up the Alcohol Beverage Industry
PDF
Reconciliation AND MEMORANDUM RECONCILATION
DOCX
unit 1 COST ACCOUNTING AND COST SHEET
PPTX
New Microsoft PowerPoint Presentation - Copy.pptx
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
A Brief Introduction About Julia Allison
Roadmap Map-digital Banking feature MB,IB,AB
Nidhal Samdaie CV - International Business Consultant
Training And Development of Employee .pdf
Types of control:Qualitative vs Quantitative
job Avenue by vinith.pptxvnbvnvnvbnvbnbmnbmbh
Unit 1 Cost Accounting - Cost sheet
Lecture (1)-Introduction.pptx business communication
The Marketing Journey - Tracey Phillips - Marketing Matters 7-2025.pptx
How to Get Funding for Your Trucking Business
Dragon_Fruit_Cultivation_in Nepal ppt.pptx
BsN 7th Sem Course GridNNNNNNNN CCN.pdf
COST SHEET- Tender and Quotation unit 2.pdf
Business Management - unit 1 and 2
Probability Distribution, binomial distribution, poisson distribution
Katrina Stoneking: Shaking Up the Alcohol Beverage Industry
Reconciliation AND MEMORANDUM RECONCILATION
unit 1 COST ACCOUNTING AND COST SHEET
New Microsoft PowerPoint Presentation - Copy.pptx

Bluetoothppt

  • 2. Agenda Introduction to Bluetooth Bluetooth Basics Mode of operation Technology Security Advantages Integrating BT with .NET
  • 3. Is the Tooth really Blue? The Henry Blatand story The brand is a label that is not a single company technology but is shared by many members of the Bluetooth SIG The SIG is composed of more than 8,000 member companies that are leaders in the telecommunications, computing, automotive, music, apparel, industrial automation, and network industries Prominent members: Nokia, Intel, Motorola, Microsoft, Lenovo, Toshiba Installed base of over 500 million units at end of 2005 More details about Bluetooth SIG can be found on www.bluetooth.com
  • 4. Some Blue examples Bluetooth handsfree used in car Transfer data from one device to another Operating all electronic devices in your room with your mobile Synchronize data on Mobile and Laptop without using any wires
  • 5. Bluetooth Basics Bluetooth is a wireless communication technology that allows devices, within a 10-meter proximity, to communicate with each other Simultaneously handle both data and voice transmissions Each device can simultaneously communicate with 7 other devices Enables devices to query other devices about the services they offer. If a device offers more than one service, the user can select the service they want to use from that particular device Unlike infra-red, Bluetooth does not require line-of-sight positioning of connected units. Networks are established dynamically and automatically
  • 6. Spectrum ISM band used by Bluetooth is available from 2.40-2.4835 GHz Uses frequency hopping, full-duplex signal at a nominal rate of 1600 hops/sec Band is available and unlicensed in most nations
  • 7. Interference Adaptive Frequency Hopping was designed to reduce interference between wireless technologies sharing the 2.4 GHz spectrum providing users with greater performance even if using other technologies along with Bluetooth technology The signal hops among 79 frequencies at 1 MHz intervals Data Rate 1 Mbps for Version 1.2; Up to 3 Mbps supported for Version 2.0 + EDR Low power consumption of 2.5mW for upto 10m range
  • 8. FHSS Uses Frequency Hopping Spread Spectrum (FHSS) techniques Countries the radios hop in pseudo random sequences around all available channels, this equates to 79 RF channels with a channel spacing of 1 MHz Starting at a base frequency of 2402 MHz then the frequency of the channels, f, can be expressed as: f =2402 + n MHz where, n, is the channel number with an integer value in the range of 0 to 78 FHSS implements Time Division Multiplexing FHSS has 1600 hops/sec ie a hop every 625 µs. Master transmit in slot 1 and slave in slot 2
  • 9. How the devices connect Exist in small ad-hoc network configuration with the ability to operate as either master or the slave Master provides the synchronization clock and the hopping sequence Only one master allowed Slaves cannot communicate directly Mechanism to interchange role between slave and master
  • 10. Contd.. instant formation of networks The configurations can be: Single point: One master and one slave Multipoint (Piconet): Up to 7 slaves clustered around a single Master Scatternet: Group of Piconets effectively hubbed via a single Bluetooth device acting as a master in one Piconet and a slave in the other Piconet
  • 11. Connecting the BT Way! Built in mechanism to inquire for devices, connect to them and once connected discover the services they possess in their database: The master enters inquiry mode and sends out an inquiry to discover devices available to connect to. Potential slaves make themselves discoverable by entering inquiry scan mode and listen for an inquiry from a master. On receiving an inquiry, the slave responds to the master with information that is needed to create a connection to the device; this information includes its Bluetooth address and class of device. The master collects this information from each device discovered. To connect to one of these devices the master goes into page mode and will page the device using the corresponding Bluetooth address. The slave being paged by a master will need to be in page scan mode to be able to connect to a master
  • 12. Security Modes of security for BT access: Security Mode 1: non-secure Security Mode 2: service level enforced security Security Mode 3: link level enforced security -Provides both device and service level security -Concept of Trusted and Untrusted device With respect to Services Authorization and authentication Only authentication Open to all devices
  • 13. More on Security Bluejacking Send business card anonymously No removal or alteration of data User needs to react/accept first Bluebugging Access mobile phone commands without alerting the owner Internet access,initiate calls, send and receive text messages
  • 14. Advantage BT convenient, wire-free, short-range communication between devices Bluetooth enabled products do not need to install driver software low power low cost built-in security ease-of-use ad hoc networking abilities