+ All Categories
Home > Education > Short blutooth present

Short blutooth present

Date post: 25-Jun-2015
Category:
Upload: syedishaq
View: 243 times
Download: 1 times
Share this document with a friend
Description:
This topic of Bluetooth presentation is very useful in many communications.it can be very helpfull in various kind,just check it out you can get an idea
Popular Tags:
20
Bluetooth 1
Transcript
Page 1: Short blutooth present

1

Bluetooth

Page 2: Short blutooth present

Bluetooth is a packet based protocol with a master slave structure . One master may communicate with up to 7 slaves.

In Bluetooth technology ,the device which sends the data is called as MASTER. Where as the devices that receive the data is called as SLAVE.

Page 3: Short blutooth present
Page 4: Short blutooth present

4

BlueTooth- Some Specifications Uses unlicensed 2.402 - 2.480 GHz frequency range. Frequency hopping spread spectrum 79 hops separated

by 1 MHz. Maximum frequency hopping rate: 1600 hops/sec. Nominal range: 10 cm to 10 meters. Nominal antenna power: 0 dBm. One complete Bluetooth data packet can be transmitted

within each 625 msec hop slot.

Page 5: Short blutooth present

5

Potential Bluetooth Markets

Page 6: Short blutooth present
Page 7: Short blutooth present
Page 8: Short blutooth present
Page 9: Short blutooth present

9

Bluetooth Market Forecast

Nov’03: 100M Bluetooth compliant devices worldwide

Page 10: Short blutooth present
Page 11: Short blutooth present

11

Bluetooth Protocol StackAdopted Protocols

PPP(Point-To-Point Protocol)TCP/UDP/IPOBEX-Session Protocol for IrDA(Infrared Data

Association)Contents Format(e.g. vCard, vCalendar)WAP-Wireless Application Protocol

Page 12: Short blutooth present
Page 13: Short blutooth present

13

Bluetooth SecuritySupports Unidirectional or Mutual Encryption based

on a Secret Link key Shared Between Two Devices.Security Defined In 3 modes:

Mode1- No Security.Mode 2 - Service Level Security: Not Established

Before Channel is Established at L2CAP.Mode 3 - Link Level Security: Device Initiates

Security Before LMP Link is Setup.

Page 14: Short blutooth present

• Devices and Services can be Set for Different Levels of Security

Two Trust Levels are Set for Devices:Trusted Device : Fixed Relationship and

Unrestricted Access to All Services.Untrusted : No Permanent relationship and

Restricted Services.

Page 15: Short blutooth present
Page 16: Short blutooth present

16

Bluetooth Security3 Levels of Service Access

Require Authorization and Authentication.Require Authentication Only.Default Security for Legacy Applications.

Page 17: Short blutooth present
Page 18: Short blutooth present

18

But is this Wireless Link Secure?

Newsflash: Jan 2001: Norwegian “hackers” crack a Bluetooth transmissionNewsflash: Jan 2001: Norwegian “hackers” crack a Bluetooth transmission

Page 19: Short blutooth present

Bluetooth vs. the Rest (cont’d)

19

802.112.4 GHz, DSSS11 chips/bit11Mbps+20 dBm50m128 devicesCSMA/CAOptional WEPOptional

HomeRF2.4GHz, FHSS50 hops/s1 Mbps+20 dBm50m128 devicesCSMA/CAOptionalOptional

Bluetooth2.4 GHz, FHSS1000+hops/s1Mbps0, +20dBm1-10m, 50m8 devices, PiconetEncryptionYes

ParameterTechnology

Data RatePowerRangeTopology

SecurityVoice Channel

ZigBee (proposed)2.4 GHz,DSSS15 chips/bit40 kbits/s0dBm100m100s devices, CSMA/CANot yetNo

Bluetooth – aka IEEE 802.15.1

Zig Bee – aka IEEE 802.15.4

Page 20: Short blutooth present

Recommended