SlideShare ist ein Scribd-Unternehmen logo
1 von 10
By
shamshad
Bluetooth Technology
History of Bluetooth:
• Bluetooth was invented in 1994 by Ericsson.
• The company later started working with a larger
Group of Companies called the Bluetooth special
Interests Group or “SIG” to develop the
technology into What it is today.
• Bluetooth is not owned by any one Company
and is developed and Maintained by SIG.
• The name Bluetooth come from a code name
originally used by a SIG for the project and is a
reference to a 10th
century by shamshad
Introduction
• What is Bluetooth?
• Why is it useful?
• Governing Standard-Large Consortium
What is Bluetooth technology
• Bluetooth is a wireless technology used to
transfer data between different electronic device
the distance of data transmission is small in
comparison to other modes of wireless
communication.
• Bluetooth is a high –speed low-power link
microwave wireless technology designed to
connect phones,laptops,pdas and other
portable equipment together with tittle or no
work by the users.
Importance of Bluetooth
• These have replace cables for transfering
information from one electronic device to
another one.
• This is cheaply Available.
• Its mobility is also very important as it does
not need any power outlet or Internet
connection or any other items.
Types of Bluetooth devices
• (1)Headset.
• In car Bluetooth system.
• Bluetooth Equipment printer.
• Bluetooth Equipment web cam.
• Bluetooth GPS system.
• Bluetooth keyboard.
• Bluetooth wireless mouse.
How it work
• Short range wireless connectivity.
• Low power consumption.
• Automatic recognition.
• Privacy/Security.
• Very important.
• Don’t want data to be shared.
• Security not great.
• Pairing security.
How to connects
• Once the device is turned on it sends out a
signal searching for other devices.
• It operates on the unlicensed industrial
Scientific and medical(JSM) radio band.
• Once a connection is mode a personal area
network is formed the signal uses Adaptive
frequency Hopping (ADF) to “hop” along 79
frequencies about 1600 times.
• The Range of these devices is divided into 3
classes .1st
100mw 100 meters 2nd
2.5mw 10
meters 3rd
1mw 1 meters.
Reliability
• What is really means?
• Which device are you connecting to?
• How large it the file ?
• Which version are you using?
• Have the two devices been connected before.
• Devices
• Laptop ,Gaming
console,Headsets,Cellphone,Printer.
Disadvantage of Bluetooth
â–ˇData sent between two Bluetooth devices is very
slow compared with Wi-Fi transfer rate.
â–ˇRange of Bluetooth devices is 15-30 feet depending
upon the device.
â–ˇSecurity is biggest disadvantage as transfer take
place through radio waves and a hacker can easily
hack it.

Weitere ähnliche Inhalte

Was ist angesagt?

Bluetooth Wireless Multimedia Technology
Bluetooth Wireless Multimedia TechnologyBluetooth Wireless Multimedia Technology
Bluetooth Wireless Multimedia TechnologyPratikdd
 
4g wireless final ppt
4g wireless  final ppt4g wireless  final ppt
4g wireless final pptShelly
 
Presentation on wireless technology
Presentation on wireless technologyPresentation on wireless technology
Presentation on wireless technologyDipjyoti Deka
 
TRENDS IN WIRELESS COMPUTING-E.HARSHITHA
TRENDS IN WIRELESS COMPUTING-E.HARSHITHATRENDS IN WIRELESS COMPUTING-E.HARSHITHA
TRENDS IN WIRELESS COMPUTING-E.HARSHITHAHarshitha Ediga
 
IoT Devices
IoT DevicesIoT Devices
IoT Devicessilaah
 
Types of wireless communication technologies
Types of wireless communication technologiesTypes of wireless communication technologies
Types of wireless communication technologiesMohamed Ahmed
 
The internet of everything
The internet of everythingThe internet of everything
The internet of everythingShanaka Thennakoon
 
Wireless Personal area networks (Wpan)
Wireless Personal area networks (Wpan)Wireless Personal area networks (Wpan)
Wireless Personal area networks (Wpan)Biplob Orton
 
First work on ms power point 2
First work on ms power point 2First work on ms power point 2
First work on ms power point 2BariulMunshi
 
Introduction to Mobile Computing
Introduction to Mobile ComputingIntroduction to Mobile Computing
Introduction to Mobile ComputingNitin Ujgare
 
What is nfc(3)
What is nfc(3)What is nfc(3)
What is nfc(3)_fahad_shaikh
 
Wireless network
Wireless networkWireless network
Wireless networkDevyani Vaidya
 
Wireless internet access and m-business
Wireless internet access and m-businessWireless internet access and m-business
Wireless internet access and m-businessshaunsykes
 
M1 computer networks
M1 computer networksM1 computer networks
M1 computer networksCarlTodd
 
4 g computer
4 g computer4 g computer
4 g computerAzizul Sadee
 
Wireless network presentation
Wireless network presentationWireless network presentation
Wireless network presentationYaswanth Kalepalli
 

Was ist angesagt? (20)

Bluetooth Wireless Multimedia Technology
Bluetooth Wireless Multimedia TechnologyBluetooth Wireless Multimedia Technology
Bluetooth Wireless Multimedia Technology
 
4g wireless final ppt
4g wireless  final ppt4g wireless  final ppt
4g wireless final ppt
 
Presentation on wireless technology
Presentation on wireless technologyPresentation on wireless technology
Presentation on wireless technology
 
TRENDS IN WIRELESS COMPUTING-E.HARSHITHA
TRENDS IN WIRELESS COMPUTING-E.HARSHITHATRENDS IN WIRELESS COMPUTING-E.HARSHITHA
TRENDS IN WIRELESS COMPUTING-E.HARSHITHA
 
Red tacton
Red tactonRed tacton
Red tacton
 
IoT Devices
IoT DevicesIoT Devices
IoT Devices
 
Types of wireless communication technologies
Types of wireless communication technologiesTypes of wireless communication technologies
Types of wireless communication technologies
 
The internet of everything
The internet of everythingThe internet of everything
The internet of everything
 
Wireless Personal area networks (Wpan)
Wireless Personal area networks (Wpan)Wireless Personal area networks (Wpan)
Wireless Personal area networks (Wpan)
 
First work on ms power point 2
First work on ms power point 2First work on ms power point 2
First work on ms power point 2
 
Introduction to Mobile Computing
Introduction to Mobile ComputingIntroduction to Mobile Computing
Introduction to Mobile Computing
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
What is nfc(3)
What is nfc(3)What is nfc(3)
What is nfc(3)
 
Wireless network
Wireless networkWireless network
Wireless network
 
Wireless internet access and m-business
Wireless internet access and m-businessWireless internet access and m-business
Wireless internet access and m-business
 
M1 computer networks
M1 computer networksM1 computer networks
M1 computer networks
 
4 g computer
4 g computer4 g computer
4 g computer
 
Wireless network presentation
Wireless network presentationWireless network presentation
Wireless network presentation
 
Shubham hatzade
Shubham hatzadeShubham hatzade
Shubham hatzade
 
It (bluetoth)
It (bluetoth)It (bluetoth)
It (bluetoth)
 

Ă„hnlich wie Bluetooth technology by shamshad

Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technologysai krish
 
Bluetooth basic
Bluetooth basicBluetooth basic
Bluetooth basicEngr Sid
 
Bluetooth Basic Version
Bluetooth Basic VersionBluetooth Basic Version
Bluetooth Basic VersionAyesha Saeed
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technologyRohit Roy
 
BluetoothSecurity.ppt
BluetoothSecurity.pptBluetoothSecurity.ppt
BluetoothSecurity.pptssuser1d7ef1
 
bluetooth-security
bluetooth-securitybluetooth-security
bluetooth-securityAnand Dhana
 
Bluetooth Technology & Security
Bluetooth Technology & SecurityBluetooth Technology & Security
Bluetooth Technology & SecurityHimangshu Hazra
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technologyDeevena Dayaal
 
Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth TechnologyVishal Arora
 
Overview of Bluetooth technology
Overview of Bluetooth technologyOverview of Bluetooth technology
Overview of Bluetooth technologySuman Bhattacharyya
 
Bluetooth smart technology(description about all versions)
Bluetooth smart technology(description about all versions)Bluetooth smart technology(description about all versions)
Bluetooth smart technology(description about all versions)lurdhu agnes
 

Ă„hnlich wie Bluetooth technology by shamshad (20)

Bluetooth ppt
Bluetooth pptBluetooth ppt
Bluetooth ppt
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
 
Bluetooth basic
Bluetooth basicBluetooth basic
Bluetooth basic
 
Bluetooth Basic Version
Bluetooth Basic VersionBluetooth Basic Version
Bluetooth Basic Version
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
 
BluetoothSecurity.ppt
BluetoothSecurity.pptBluetoothSecurity.ppt
BluetoothSecurity.ppt
 
BluetoothSecurity.ppt
BluetoothSecurity.pptBluetoothSecurity.ppt
BluetoothSecurity.ppt
 
bluetooth-security
bluetooth-securitybluetooth-security
bluetooth-security
 
Bluetooth Technology & Security
Bluetooth Technology & SecurityBluetooth Technology & Security
Bluetooth Technology & Security
 
1791.pptx
1791.pptx1791.pptx
1791.pptx
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
 
BLUETOOTH.ppt
BLUETOOTH.pptBLUETOOTH.ppt
BLUETOOTH.ppt
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth.ppt
Bluetooth.pptBluetooth.ppt
Bluetooth.ppt
 
Bluetooth
Bluetooth Bluetooth
Bluetooth
 
Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth Technology
 
Overview of Bluetooth technology
Overview of Bluetooth technologyOverview of Bluetooth technology
Overview of Bluetooth technology
 
Bluetooth smart technology(description about all versions)
Bluetooth smart technology(description about all versions)Bluetooth smart technology(description about all versions)
Bluetooth smart technology(description about all versions)
 

KĂĽrzlich hochgeladen

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 

KĂĽrzlich hochgeladen (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

Bluetooth technology by shamshad

  • 2. History of Bluetooth: • Bluetooth was invented in 1994 by Ericsson. • The company later started working with a larger Group of Companies called the Bluetooth special Interests Group or “SIG” to develop the technology into What it is today. • Bluetooth is not owned by any one Company and is developed and Maintained by SIG. • The name Bluetooth come from a code name originally used by a SIG for the project and is a reference to a 10th century by shamshad
  • 3. Introduction • What is Bluetooth? • Why is it useful? • Governing Standard-Large Consortium
  • 4. What is Bluetooth technology • Bluetooth is a wireless technology used to transfer data between different electronic device the distance of data transmission is small in comparison to other modes of wireless communication. • Bluetooth is a high –speed low-power link microwave wireless technology designed to connect phones,laptops,pdas and other portable equipment together with tittle or no work by the users.
  • 5. Importance of Bluetooth • These have replace cables for transfering information from one electronic device to another one. • This is cheaply Available. • Its mobility is also very important as it does not need any power outlet or Internet connection or any other items.
  • 6. Types of Bluetooth devices • (1)Headset. • In car Bluetooth system. • Bluetooth Equipment printer. • Bluetooth Equipment web cam. • Bluetooth GPS system. • Bluetooth keyboard. • Bluetooth wireless mouse.
  • 7. How it work • Short range wireless connectivity. • Low power consumption. • Automatic recognition. • Privacy/Security. • Very important. • Don’t want data to be shared. • Security not great. • Pairing security.
  • 8. How to connects • Once the device is turned on it sends out a signal searching for other devices. • It operates on the unlicensed industrial Scientific and medical(JSM) radio band. • Once a connection is mode a personal area network is formed the signal uses Adaptive frequency Hopping (ADF) to “hop” along 79 frequencies about 1600 times. • The Range of these devices is divided into 3 classes .1st 100mw 100 meters 2nd 2.5mw 10 meters 3rd 1mw 1 meters.
  • 9. Reliability • What is really means? • Which device are you connecting to? • How large it the file ? • Which version are you using? • Have the two devices been connected before. • Devices • Laptop ,Gaming console,Headsets,Cellphone,Printer.
  • 10. Disadvantage of Bluetooth â–ˇData sent between two Bluetooth devices is very slow compared with Wi-Fi transfer rate. â–ˇRange of Bluetooth devices is 15-30 feet depending upon the device. â–ˇSecurity is biggest disadvantage as transfer take place through radio waves and a hacker can easily hack it.