SlideShare ist ein Scribd-Unternehmen logo
1 von 27
PRESENTED BY:
Debasmita Banerjee
Diganta Bhaduri
Debjyoti Bhattacharya
WHAT IS BLUETOOTH?
 Bluetooth is a wireless technology standard
for exchanging data over short distances
from fixed and mobile devices.
 The transmission/exchange takes place by
building personal area networks (PANs).
BLUETOOTH IN ACTION
In the house In the Office
Home Security On the Road
On our Car
HISTORY
 Bluetooth was invented in 1994 by Ericsson.
 The company later started working with a larger group of
companies called the Bluetooth Special Interests Group,
or "SIG”, to develop the technology into what it is today.
 Bluetooth is not owned by any one company and is developed
and maintained by SIG.
 The name Bluetooth came from a code name originally used
by SIG for the project and is a reference to a 10th century
Danish king named Harold Bluetooth, who was responsible
for uniting Norway, Sweden, and Denmark.
THINGS YOU MUST HAVE FOR BLUETOOTH
 Transceivers and Receivers that can send and
receive data because they use Radio Waves.
 MAC Address (Physical Address):
- Burnt on the NIC card by the manufacturer.
 PIN Number
- To identify the user using the device.
 A Piconet
 A FHSS protocol
BLUETOOTH SPECIFICATIONS
WHAT IS A PICONET?
 A Piconet session is a communication link that must
be created between devices for devices to
communicate with each other.
 This is done when the MAC address and the PIN
number match.
 If two devices come onto contact with each other( 32
feet) the user will be prompted to initiate a
communication session.
 Users then can either deny or accept the request to
initiate a session.
 Only devices approved by the user can take part in
the session.
 Data will appear as noise to unauthorized devices.
(A great security feature).
MASTER – SLAVE CONCEPT
 MASTER:
- Device in Piconet whose clock and hopping sequence are
used to synchronize all other devices (slaves) in it.
- It also carries out Paging procedure and also Connection
Establishment.
o SLAVE:
- Units within the Piconet that are synchronized to the
master via its clock and hopping sequence.
- After connection establishment, Slaves are assigned a
temporary 3 bit member address to reduce the no. of
addressing bits required.
PICONET STRUCTURE
Master
Active Slave
Parked Slave
Standby
“FHSS” PROTOCOL
 Bluetooth devices use a protocol called (FHSS)
Frequency-Hopping Spread Spectrum .
 Uses packet-switching to send data.
 Bluetooth sends packets of data on a range of
frequencies.
 In each session one device is a master and the
others are slaves.
 The master device decides at which frequency
data will travel.
 Transceivers “hop” among 79 different frequencies
in the 2.4 GHz baud at a rate of 1600 frequency hops
per second.
 The master device tells the slaves at what frequency
data will be sent.
 This technique allows devices to communicate with
each other more securely.
TIME DIVISION DUPLEX SCHEME
 Bluetooth devices use a Time-Division Duplex (TDD)
scheme.
 Channel is divided into consecutive slots (each 625 s) .
 One packet can be transmitted per slot.
 Subsequent slots are alternatively used for transmitting
and receiving.
- Strict alternation of slots b/t the master and the
slaves.
- Master can send packets to a slave only in EVEN slots.
- Slave can send packets to the master only in the ODD
slots.
THE PROTOCOL STACK
Baseband
Link Manager
L2CAP
RFCOMM/SDP
TCP/IP
Applications
Transport Protocol Group
Middleware Protocol Group
Application Group
TRANSPORT PROTOCOL GROUP
 Radio Frequency(RF):
- Sending and receiving modulated bit streams.
 Baseband:
- Defines the timing & framing.
- Flow control on the link.
 Link Manager:
- Managing the connection states.
- Enforcing Fairness among slaves.
- Power Management.
 Logical Link Control &Adaptation Protocol:
- Handles multiplexing of higher level protocols.
- Segmentation & reassembly of large packets.
- Device discovery & Operations.
MIDDLEWARE PROTOCOL GROUP
 Service Discovery Protocol (SDP):
- Means for applications to discover device info, services
and its characteristics.
 RFCOMM:
- Cable replacement protocol, emulation of serial ports
over wireless network.
 TCP/IP:
- Network Protocols for packet data communication &
routing.
APPLICATION GROUP
Consists of Bluetooth aware as well
as un-aware applications.
PHYSICAL LINK TYPES
 Synchronous Connection Oriented (SCO):
- Point to Point Full Duplex between Master & Slave.
- Established once by master & kept alive till released by
Master.
-Typically used for Voice connection (to guarantee continuity).
- Master reserves slots used for SCO link on the channel to
preserve time sensitive information .
 Asynchronous Connection Link (ACL):
- It is a momentary link between master and slave.
- No slots are reserved.
- It is a Point to Multipoint connection.
- Symmetric & Asymmetric links possible.
SECURITY
 Security Measures:
- Limited/Restricted Access to authorized users.
- Both Link Level Encryption & Authentication.
- Personal Identification Numbers (PIN) for device access.
- Long encryption keys are used (128 bit keys).
- These keys are not transmitted over wireless. Other
parameters are transmitted over wireless which in
combination with certain information known to the device,
can generate the keys.
- Further encryption can be done at the application layer.
BLUETOOTH IN THE MARKET...
PC cards, Cell phones, Head sets, Chip sets,…
Features Cost
20 dBm (~100 m)
Point-to-multipoint
No Scatternet
Applications
File Transfer,
Dial-Up Networking
LAN access, Fax, …
169 $
---
200 $
0 dBm (~10 m)
Point-to-multipoint
No Scatternet
File Transfer,
Dial-Up Networking
LAN access, Fax, …
169 $
---
Company
Toshiba,
Motorola,
Digianswer
IBM, TDK
3COM
10 m user-user;
100 m user-Base Station
Point-to-multipoint
SW- & FW-
upgradeable
File Transfer,
Dial-Up Networking
LAN access, Fax, E-mail
Unconscious connection
149 $
Nokia
10 m user-user;
Point-to-point
Connectivity Battery
for the cell phone
File Transfer,
Dial-Up Networking
LAN access, Fax, E-mail
Unconscious connection
149 $
Ericsson,
Sigma
10 m user-user;
Point-to-point;
ARM processor;
USB; RFCOMM ports
Basic BT Radio stack
Embedded or Host stack
Programmable
500 $
1500$
ADVANTAGES OF BLUETOOTH
 These have Replaced cables for transferring
Information from one Electronic Device to
another one.
 These have decreased Strain like carrying
phones while talking, making hands free to
do another work.
 This is cheaply Available.
 It’s Mobility is also very Important as it
doesn’t need any power outlet or Internet
connection or any other items.
DISADVANTAGES OF BLUETOOTH
 Data sent between two Bluetooth devices is very
slow compared with Wi-Fi transfer Rate.
 Range Of a Bluetooth Device is 15-30 feet depending
upon the Device.
 Security is Biggest Disadvantage as transfer takes
place through radio waves and a hacker can easily
hack it.
 Battery usage is also a problem, it will make device
out of power before it would have if Bluetooth was
not powered on.
CONCLUSION
 A new global standard for data and voice.
 Eliminate Cables.
 Low Power, Low range, Low Cost network devices.
 Delivers Automatic synchronicity between devices.
 Future Improvements:
- Master-Slave relationship can be adjusted dynamically for
optimal resource allocation and utilization.
- Adaptive, closed loop transmit power control can be
implemented to further reduce unnecessary power usage.
REFERENCES
[1] Bluetooth Consortium :
http://www.bluetooth.com
http://www.ericsson.com/bluetooth/
[2] Bluetooth Tutorial :
http://www.ee.iitb.ernet.in/uma/~aman/bluetooth
http://www.palowireless.com
[3] G.F.Pedersen, P.Eggers, “Initial Investigation of the
Bluetooth Link”, VTC, pp 64 – 70
THANK YOU

Weitere ähnliche Inhalte

Was ist angesagt?

The Bluetooth technology
The Bluetooth technologyThe Bluetooth technology
The Bluetooth technologySaQi95
 
Bluetooth protocol stack
Bluetooth protocol stackBluetooth protocol stack
Bluetooth protocol stackstuimrozsm
 
bluetooth technology
 bluetooth technology bluetooth technology
bluetooth technologydeepak kumar
 
Bluethooth Protocol stack/layers
Bluethooth Protocol stack/layersBluethooth Protocol stack/layers
Bluethooth Protocol stack/layersJay Nagar
 
Bluetooth versus wi
Bluetooth versus wiBluetooth versus wi
Bluetooth versus wisher1242
 
Protocols in Bluetooth
Protocols in BluetoothProtocols in Bluetooth
Protocols in BluetoothSonali Parab
 
Bluetooth technology by polite group
Bluetooth technology by polite groupBluetooth technology by polite group
Bluetooth technology by polite grouppolitegcuf
 
BLUETOOTH TECHNOLOGY
BLUETOOTH TECHNOLOGYBLUETOOTH TECHNOLOGY
BLUETOOTH TECHNOLOGYAJAL A J
 
Bluetooth, RFID and WiMAX Technologies
Bluetooth, RFID and WiMAX TechnologiesBluetooth, RFID and WiMAX Technologies
Bluetooth, RFID and WiMAX TechnologiesMukesh Chinta
 
Bluetooth and profiles on WEC7
Bluetooth and profiles on WEC7Bluetooth and profiles on WEC7
Bluetooth and profiles on WEC7gnkeshava
 

Was ist angesagt? (20)

The Bluetooth technology
The Bluetooth technologyThe Bluetooth technology
The Bluetooth technology
 
Bluetooth.ppt
Bluetooth.pptBluetooth.ppt
Bluetooth.ppt
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth protocol stack
Bluetooth protocol stackBluetooth protocol stack
Bluetooth protocol stack
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
bluetooth technology
 bluetooth technology bluetooth technology
bluetooth technology
 
Bluethooth Protocol stack/layers
Bluethooth Protocol stack/layersBluethooth Protocol stack/layers
Bluethooth Protocol stack/layers
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
 
Bluetooth versus wi
Bluetooth versus wiBluetooth versus wi
Bluetooth versus wi
 
Bluetooth - Overview
Bluetooth - OverviewBluetooth - Overview
Bluetooth - Overview
 
Bluetooth technology
Bluetooth  technologyBluetooth  technology
Bluetooth technology
 
Bluetooth technology
Bluetooth  technologyBluetooth  technology
Bluetooth technology
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth profile
Bluetooth profileBluetooth profile
Bluetooth profile
 
Protocols in Bluetooth
Protocols in BluetoothProtocols in Bluetooth
Protocols in Bluetooth
 
Bluetooth technology by polite group
Bluetooth technology by polite groupBluetooth technology by polite group
Bluetooth technology by polite group
 
BLUETOOTH TECHNOLOGY
BLUETOOTH TECHNOLOGYBLUETOOTH TECHNOLOGY
BLUETOOTH TECHNOLOGY
 
Bluetooth, RFID and WiMAX Technologies
Bluetooth, RFID and WiMAX TechnologiesBluetooth, RFID and WiMAX Technologies
Bluetooth, RFID and WiMAX Technologies
 
Bluetooth and profiles on WEC7
Bluetooth and profiles on WEC7Bluetooth and profiles on WEC7
Bluetooth and profiles on WEC7
 

Andere mochten auch

Bluetooth & cdma technology
Bluetooth & cdma technologyBluetooth & cdma technology
Bluetooth & cdma technologybalpreetdhillon
 
Unicast multicast & broadcast
Unicast multicast & broadcastUnicast multicast & broadcast
Unicast multicast & broadcastNetProtocol Xpert
 
Unicasting , Broadcasting And Multicasting New
Unicasting , Broadcasting And Multicasting NewUnicasting , Broadcasting And Multicasting New
Unicasting , Broadcasting And Multicasting Newtechbed
 
Cómo produce energia un reactor nuclear
Cómo produce energia un reactor nuclearCómo produce energia un reactor nuclear
Cómo produce energia un reactor nuclearangelo26_
 
VirtualPBX - Back Office, Delivering Voice in a Competitive Market - KazooCon...
VirtualPBX - Back Office, Delivering Voice in a Competitive Market - KazooCon...VirtualPBX - Back Office, Delivering Voice in a Competitive Market - KazooCon...
VirtualPBX - Back Office, Delivering Voice in a Competitive Market - KazooCon...2600Hz
 
Tamayo, cristina evidence 1
Tamayo, cristina evidence 1Tamayo, cristina evidence 1
Tamayo, cristina evidence 1Criss Tamayo
 
Survey results final version
Survey results final versionSurvey results final version
Survey results final versionrmeasygen
 
Energía libre y espontaneidad
Energía libre y espontaneidadEnergía libre y espontaneidad
Energía libre y espontaneidadangelo26_
 
The end 인터렉 수정없음
The end 인터렉 수정없음The end 인터렉 수정없음
The end 인터렉 수정없음유림 이
 
"It was very good" (The Creation Story) - By Leroy Ramaphoko
"It was very good" (The Creation Story) - By Leroy Ramaphoko"It was very good" (The Creation Story) - By Leroy Ramaphoko
"It was very good" (The Creation Story) - By Leroy RamaphokoDikaps123
 
The end 인터렉 수정없음
The end 인터렉 수정없음The end 인터렉 수정없음
The end 인터렉 수정없음유림 이
 
Tugas arsitektur feng shui - menentukan posisi ruang-ruang dalam rumah
Tugas arsitektur feng shui - menentukan posisi ruang-ruang dalam rumah Tugas arsitektur feng shui - menentukan posisi ruang-ruang dalam rumah
Tugas arsitektur feng shui - menentukan posisi ruang-ruang dalam rumah Dzul Fahmi
 
Química inorgánica medicinal, vanadio, platino, oro
Química inorgánica medicinal, vanadio, platino, oroQuímica inorgánica medicinal, vanadio, platino, oro
Química inorgánica medicinal, vanadio, platino, oroangelo26_
 
Ejercicio: Bioenergia
Ejercicio: BioenergiaEjercicio: Bioenergia
Ejercicio: Bioenergiaangelo26_
 
Atraparelviento
AtraparelvientoAtraparelviento
Atraparelvientoangelo26_
 
인터렉2조 도담도담
인터렉2조 도담도담인터렉2조 도담도담
인터렉2조 도담도담유림 이
 
1316397 이유림
1316397 이유림1316397 이유림
1316397 이유림유림 이
 
인터렉 2조 최종
인터렉 2조 최종인터렉 2조 최종
인터렉 2조 최종유림 이
 

Andere mochten auch (20)

Bluetooth & cdma technology
Bluetooth & cdma technologyBluetooth & cdma technology
Bluetooth & cdma technology
 
Unicast multicast & broadcast
Unicast multicast & broadcastUnicast multicast & broadcast
Unicast multicast & broadcast
 
Unicasting , Broadcasting And Multicasting New
Unicasting , Broadcasting And Multicasting NewUnicasting , Broadcasting And Multicasting New
Unicasting , Broadcasting And Multicasting New
 
Cómo produce energia un reactor nuclear
Cómo produce energia un reactor nuclearCómo produce energia un reactor nuclear
Cómo produce energia un reactor nuclear
 
VirtualPBX - Back Office, Delivering Voice in a Competitive Market - KazooCon...
VirtualPBX - Back Office, Delivering Voice in a Competitive Market - KazooCon...VirtualPBX - Back Office, Delivering Voice in a Competitive Market - KazooCon...
VirtualPBX - Back Office, Delivering Voice in a Competitive Market - KazooCon...
 
Tamayo, cristina evidence 1
Tamayo, cristina evidence 1Tamayo, cristina evidence 1
Tamayo, cristina evidence 1
 
Survey results final version
Survey results final versionSurvey results final version
Survey results final version
 
Energía libre y espontaneidad
Energía libre y espontaneidadEnergía libre y espontaneidad
Energía libre y espontaneidad
 
Qim
QimQim
Qim
 
The end 인터렉 수정없음
The end 인터렉 수정없음The end 인터렉 수정없음
The end 인터렉 수정없음
 
"It was very good" (The Creation Story) - By Leroy Ramaphoko
"It was very good" (The Creation Story) - By Leroy Ramaphoko"It was very good" (The Creation Story) - By Leroy Ramaphoko
"It was very good" (The Creation Story) - By Leroy Ramaphoko
 
The end 인터렉 수정없음
The end 인터렉 수정없음The end 인터렉 수정없음
The end 인터렉 수정없음
 
Tugas arsitektur feng shui - menentukan posisi ruang-ruang dalam rumah
Tugas arsitektur feng shui - menentukan posisi ruang-ruang dalam rumah Tugas arsitektur feng shui - menentukan posisi ruang-ruang dalam rumah
Tugas arsitektur feng shui - menentukan posisi ruang-ruang dalam rumah
 
Química inorgánica medicinal, vanadio, platino, oro
Química inorgánica medicinal, vanadio, platino, oroQuímica inorgánica medicinal, vanadio, platino, oro
Química inorgánica medicinal, vanadio, platino, oro
 
Color
ColorColor
Color
 
Ejercicio: Bioenergia
Ejercicio: BioenergiaEjercicio: Bioenergia
Ejercicio: Bioenergia
 
Atraparelviento
AtraparelvientoAtraparelviento
Atraparelviento
 
인터렉2조 도담도담
인터렉2조 도담도담인터렉2조 도담도담
인터렉2조 도담도담
 
1316397 이유림
1316397 이유림1316397 이유림
1316397 이유림
 
인터렉 2조 최종
인터렉 2조 최종인터렉 2조 최종
인터렉 2조 최종
 

Ähnlich wie Bluetooth Aplication

Ähnlich wie Bluetooth Aplication (20)

Bluetooth
BluetoothBluetooth
Bluetooth
 
R K 2 Bluetooth Technologies
R K 2  Bluetooth  TechnologiesR K 2  Bluetooth  Technologies
R K 2 Bluetooth Technologies
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Overview of Bluetooth technology
Overview of Bluetooth technologyOverview of Bluetooth technology
Overview of Bluetooth technology
 
Bluetooth Details.ppt
Bluetooth Details.pptBluetooth Details.ppt
Bluetooth Details.ppt
 
Bluetooth.ppt
Bluetooth.pptBluetooth.ppt
Bluetooth.ppt
 
Bluetooth.ppt
Bluetooth.pptBluetooth.ppt
Bluetooth.ppt
 
Bluetooth Technology By Volkan Sevindik
Bluetooth Technology By Volkan SevindikBluetooth Technology By Volkan Sevindik
Bluetooth Technology By Volkan Sevindik
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth.pptx
Bluetooth.pptxBluetooth.pptx
Bluetooth.pptx
 
Bluetooth Intro
Bluetooth IntroBluetooth Intro
Bluetooth Intro
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Wireless personal area networks(PAN)
Wireless personal area networks(PAN)Wireless personal area networks(PAN)
Wireless personal area networks(PAN)
 
Bluetooth Technology -- detailed explanation
Bluetooth Technology -- detailed explanation Bluetooth Technology -- detailed explanation
Bluetooth Technology -- detailed explanation
 
Bluetooth
Bluetooth Bluetooth
Bluetooth
 
Bluetooth paper presentation ieee
Bluetooth paper presentation ieee Bluetooth paper presentation ieee
Bluetooth paper presentation ieee
 
Bluetooth
Bluetooth Bluetooth
Bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
MC Module 4.docx
MC Module 4.docxMC Module 4.docx
MC Module 4.docx
 
Bluetooth paper (IEEE)
Bluetooth paper (IEEE)Bluetooth paper (IEEE)
Bluetooth paper (IEEE)
 

Kürzlich hochgeladen

Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 

Kürzlich hochgeladen (20)

Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 

Bluetooth Aplication

  • 1.
  • 2. PRESENTED BY: Debasmita Banerjee Diganta Bhaduri Debjyoti Bhattacharya
  • 3. WHAT IS BLUETOOTH?  Bluetooth is a wireless technology standard for exchanging data over short distances from fixed and mobile devices.  The transmission/exchange takes place by building personal area networks (PANs).
  • 4. BLUETOOTH IN ACTION In the house In the Office
  • 5. Home Security On the Road
  • 7. HISTORY  Bluetooth was invented in 1994 by Ericsson.  The company later started working with a larger group of companies called the Bluetooth Special Interests Group, or "SIG”, to develop the technology into what it is today.  Bluetooth is not owned by any one company and is developed and maintained by SIG.  The name Bluetooth came from a code name originally used by SIG for the project and is a reference to a 10th century Danish king named Harold Bluetooth, who was responsible for uniting Norway, Sweden, and Denmark.
  • 8. THINGS YOU MUST HAVE FOR BLUETOOTH  Transceivers and Receivers that can send and receive data because they use Radio Waves.  MAC Address (Physical Address): - Burnt on the NIC card by the manufacturer.  PIN Number - To identify the user using the device.  A Piconet  A FHSS protocol
  • 10. WHAT IS A PICONET?  A Piconet session is a communication link that must be created between devices for devices to communicate with each other.  This is done when the MAC address and the PIN number match.  If two devices come onto contact with each other( 32 feet) the user will be prompted to initiate a communication session.  Users then can either deny or accept the request to initiate a session.  Only devices approved by the user can take part in the session.  Data will appear as noise to unauthorized devices. (A great security feature).
  • 11. MASTER – SLAVE CONCEPT  MASTER: - Device in Piconet whose clock and hopping sequence are used to synchronize all other devices (slaves) in it. - It also carries out Paging procedure and also Connection Establishment. o SLAVE: - Units within the Piconet that are synchronized to the master via its clock and hopping sequence. - After connection establishment, Slaves are assigned a temporary 3 bit member address to reduce the no. of addressing bits required.
  • 13. “FHSS” PROTOCOL  Bluetooth devices use a protocol called (FHSS) Frequency-Hopping Spread Spectrum .  Uses packet-switching to send data.  Bluetooth sends packets of data on a range of frequencies.  In each session one device is a master and the others are slaves.  The master device decides at which frequency data will travel.
  • 14.  Transceivers “hop” among 79 different frequencies in the 2.4 GHz baud at a rate of 1600 frequency hops per second.  The master device tells the slaves at what frequency data will be sent.  This technique allows devices to communicate with each other more securely.
  • 15. TIME DIVISION DUPLEX SCHEME  Bluetooth devices use a Time-Division Duplex (TDD) scheme.  Channel is divided into consecutive slots (each 625 s) .  One packet can be transmitted per slot.  Subsequent slots are alternatively used for transmitting and receiving. - Strict alternation of slots b/t the master and the slaves. - Master can send packets to a slave only in EVEN slots. - Slave can send packets to the master only in the ODD slots.
  • 16. THE PROTOCOL STACK Baseband Link Manager L2CAP RFCOMM/SDP TCP/IP Applications Transport Protocol Group Middleware Protocol Group Application Group
  • 17. TRANSPORT PROTOCOL GROUP  Radio Frequency(RF): - Sending and receiving modulated bit streams.  Baseband: - Defines the timing & framing. - Flow control on the link.  Link Manager: - Managing the connection states. - Enforcing Fairness among slaves. - Power Management.  Logical Link Control &Adaptation Protocol: - Handles multiplexing of higher level protocols. - Segmentation & reassembly of large packets. - Device discovery & Operations.
  • 18. MIDDLEWARE PROTOCOL GROUP  Service Discovery Protocol (SDP): - Means for applications to discover device info, services and its characteristics.  RFCOMM: - Cable replacement protocol, emulation of serial ports over wireless network.  TCP/IP: - Network Protocols for packet data communication & routing.
  • 19. APPLICATION GROUP Consists of Bluetooth aware as well as un-aware applications.
  • 20. PHYSICAL LINK TYPES  Synchronous Connection Oriented (SCO): - Point to Point Full Duplex between Master & Slave. - Established once by master & kept alive till released by Master. -Typically used for Voice connection (to guarantee continuity). - Master reserves slots used for SCO link on the channel to preserve time sensitive information .  Asynchronous Connection Link (ACL): - It is a momentary link between master and slave. - No slots are reserved. - It is a Point to Multipoint connection. - Symmetric & Asymmetric links possible.
  • 21. SECURITY  Security Measures: - Limited/Restricted Access to authorized users. - Both Link Level Encryption & Authentication. - Personal Identification Numbers (PIN) for device access. - Long encryption keys are used (128 bit keys). - These keys are not transmitted over wireless. Other parameters are transmitted over wireless which in combination with certain information known to the device, can generate the keys. - Further encryption can be done at the application layer.
  • 22. BLUETOOTH IN THE MARKET... PC cards, Cell phones, Head sets, Chip sets,… Features Cost 20 dBm (~100 m) Point-to-multipoint No Scatternet Applications File Transfer, Dial-Up Networking LAN access, Fax, … 169 $ --- 200 $ 0 dBm (~10 m) Point-to-multipoint No Scatternet File Transfer, Dial-Up Networking LAN access, Fax, … 169 $ --- Company Toshiba, Motorola, Digianswer IBM, TDK 3COM 10 m user-user; 100 m user-Base Station Point-to-multipoint SW- & FW- upgradeable File Transfer, Dial-Up Networking LAN access, Fax, E-mail Unconscious connection 149 $ Nokia 10 m user-user; Point-to-point Connectivity Battery for the cell phone File Transfer, Dial-Up Networking LAN access, Fax, E-mail Unconscious connection 149 $ Ericsson, Sigma 10 m user-user; Point-to-point; ARM processor; USB; RFCOMM ports Basic BT Radio stack Embedded or Host stack Programmable 500 $ 1500$
  • 23. ADVANTAGES OF BLUETOOTH  These have Replaced cables for transferring Information from one Electronic Device to another one.  These have decreased Strain like carrying phones while talking, making hands free to do another work.  This is cheaply Available.  It’s Mobility is also very Important as it doesn’t need any power outlet or Internet connection or any other items.
  • 24. DISADVANTAGES OF BLUETOOTH  Data sent between two Bluetooth devices is very slow compared with Wi-Fi transfer Rate.  Range Of a Bluetooth Device is 15-30 feet depending upon the Device.  Security is Biggest Disadvantage as transfer takes place through radio waves and a hacker can easily hack it.  Battery usage is also a problem, it will make device out of power before it would have if Bluetooth was not powered on.
  • 25. CONCLUSION  A new global standard for data and voice.  Eliminate Cables.  Low Power, Low range, Low Cost network devices.  Delivers Automatic synchronicity between devices.  Future Improvements: - Master-Slave relationship can be adjusted dynamically for optimal resource allocation and utilization. - Adaptive, closed loop transmit power control can be implemented to further reduce unnecessary power usage.
  • 26. REFERENCES [1] Bluetooth Consortium : http://www.bluetooth.com http://www.ericsson.com/bluetooth/ [2] Bluetooth Tutorial : http://www.ee.iitb.ernet.in/uma/~aman/bluetooth http://www.palowireless.com [3] G.F.Pedersen, P.Eggers, “Initial Investigation of the Bluetooth Link”, VTC, pp 64 – 70