adil ppt.ppt

of 20 /20
Bluetooth Bluetooth Submitted by: Submitted by: Mohammad adil Mohammad adil Batch- Batch- Submitted To: Mrs.Anita Chopra

Upload: laxmikantchhipa

Post on 28-Sep-2015




3 download


  • BluetoothSubmitted by: Mohammad adil Batch-B2(ECE)Submitted To: Mrs.Anita Chopra Assist.Proff.

  • IntroductionWhat is Bluetooth?

    What does it do?

    History of Bluetooth

  • Introduction (contd)

    Is Bluetooth here to stay?

    What should we expect from Bluetooth in the future?

  • What Bluetooth Delivers to the end-user

    Connects a wide range of computing and telecommunication devices

    Expand communication capabilities

    Devices can communicate with each other with wireless connectivity

  • User Application Car manufactures Industry

    E-Mail / Internet / Intranet Access


    Bluetooth will facilitate Local Area Networks

  • Bluetooth in ActionSource: http// In the Office ...In the house

  • Home SecurityOn the RoadSource: http//

  • On your CarSource: http//

  • Bluetooth SpecificationsThings that you must have:Transceivers and Receivers that can send and receive data because they use Radio Waves.MAC Address (Physical Address)Burnt on the NIC card by the manufacturer.PIN Number To identify the user using the device.A PiconetA FHHS protocol

  • What is a Piconet?A Piconet session is a communication link that must be created between devices for devices to communicate with each other.

    This is done when the MAC address and the PIN number match.

  • Piconet (cont.)If two devices come onto contact with each other( 32 feet) the user will be prompted to initiate a communication session

    Users then can either deny or accept the request to initiate a session

    Only devices approved by the user can take part in the session

    Data will appear as noise to unauthorized devices(A great security feature).

  • FHHSBluetooth devices use a protocol called (FHHS) Frequency-Hopping Spread Spectrum .

    Uses packet-switching to send data.

    Bluetooth sends packets of data on a range of frequencies.

    In each session one device is a master and the others are slaves.

    The master device decides at which frequency data will travel.

  • FHHSTransceivers hop among 79 different frequencies in the 2.4 GHz baud at a rate of 1600 frequency hops per second.

    The master device tells the slaves at what frequency data will be sent.

    This technique allows devices to communicate with each other more securely.

  • FHHS ExampleSource:

  • Bluetooth SecurityModesSecurity Mode 1No SecuritySecurity Mode 2Service Level Enforced SecurityImplemented after channel is establishedSecurity Mode 3Link Level Enforced Security Implemented before channel is established

  • DevicesTrustedNo RestrictionsUntrustedRestrictions, Access is limited

  • Service LevelsAuthorization and Authentication

    Authentication Only

    Open to all Devices

  • Advantages of Bluetooth TechnologyIt is cheapEasy to installIt makes connecting to different devices convenientIt is wirelessIt is free to use if the device is installed with it condition

  • Disadvantages of Bluetooth Technology

    It can be hacked intoIf installed on a cellphone it is prone to receiving cell phone virusesIt only allows short range communication between devicesIt can only connect two devices at onceIt can lose connection in certain condition