Upload
sayed-karar-waris
View
28
Download
5
Embed Size (px)
DESCRIPTION
Bluetooth is a radio frequency specification for short range, point to point and point to multi point voice and data transfer. Bluetooth technology facilitates the replacement of cables normally used to connect one device to another by a short range radio link. With the help of blue tooth we can operate our keyboard and mouse without direct connection of CPU. Printers, fax machines, headphone, mouse, keyboard or any other digital devices can be part of Bluetooth system.
Citation preview
An Overview
An Overview
OfOf
Bluetooth
Bluetooth
&
JALPAIGURI GOVT. JALPAIGURI GOVT. ENGG. COLLEGEENGG. COLLEGE
C.S.E 2011-2015C.S.E 2011-2015
BATCHBATCH
SAYED KARAR SAYED KARAR WARISWARIS
ByBy
IntroductionIntroduction
•What is Bluetooth?What is Bluetooth?
•What does it do?What does it do?
•History of BluetoothHistory of Bluetooth
Introduction (cont’d)Introduction (cont’d)
• Is Bluetooth here to stay?Is Bluetooth here to stay?
•What should we expect from What should we expect from Bluetooth in the future?Bluetooth in the future?
What Bluetooth Delivers to What Bluetooth Delivers to the end-userthe end-user
• Connects a wide range of computing Connects a wide range of computing and telecommunication devicesand telecommunication devices
• Expand communication capabilitiesExpand communication capabilities
• Devices can communicate with each Devices can communicate with each other with wireless connectivityother with wireless connectivity
User ApplicationUser Application
• Car manufactures Industry Car manufactures Industry
• E-Mail / Internet / Intranet AccessE-Mail / Internet / Intranet Access
• HeadsetsHeadsets
• Bluetooth will facilitate Local Area Bluetooth will facilitate Local Area NetworksNetworks
Bluetooth in ActionBluetooth in Action
Source: http//:www.motorola.com
In the Office ...In the Office ...In the houseIn the house
Home SecurityHome Security On the RoadOn the Road
Source: http//:www.motorola.com
On your CarOn your Car
Source: http//:www.motorola.com
Bluetooth SpecificationsBluetooth Specifications
• Things that you must have:Things that you must have:– Transceivers and Receivers that can send Transceivers and Receivers that can send
and receive data because they use and receive data because they use Radio Radio Waves.Waves.
– MAC Address (Physical Address)MAC Address (Physical Address)•Burnt on the NIC card by the manufacturer.Burnt on the NIC card by the manufacturer.
– PIN Number PIN Number •To identify the user using the device.To identify the user using the device.
– A PiconetA Piconet– A FHHS protocolA FHHS protocol
What is a Piconet?What is a Piconet?
• A Piconet session is a communication A Piconet session is a communication link that must be created between link that must be created between devices for devices to communicate devices for devices to communicate with each other. with each other.
• This is done when the MAC address This is done when the MAC address and the PIN number match.and the PIN number match.
Piconet (cont.)Piconet (cont.)
• If two devices come onto contact with each other( 32 If two devices come onto contact with each other( 32 feet) the user will be prompted to initiate a feet) the user will be prompted to initiate a communication sessioncommunication session
• Users then can either deny or accept the request to Users then can either deny or accept the request to initiate a sessioninitiate a session
• Only devices approved by the user can take part in Only devices approved by the user can take part in the sessionthe session
• Data will appear as noise to unauthorized devicesData will appear as noise to unauthorized devices (A (A great security feature).great security feature).
FHHSFHHS• Bluetooth devices use a protocol called (FHHS) Bluetooth devices use a protocol called (FHHS)
Frequency-Hopping Spread Spectrum .Frequency-Hopping Spread Spectrum .
• Uses packet-switching to send data.Uses packet-switching to send data.
• Bluetooth sends packets of data on a range of Bluetooth sends packets of data on a range of frequencies.frequencies.
• In each session one device is a master and the others are In each session one device is a master and the others are slaves.slaves.
• The master device decides at which frequency data will The master device decides at which frequency data will travel.travel.
FHHSFHHS
• Transceivers “hop” among 79 different Transceivers “hop” among 79 different frequencies in the 2.4 GHz baud at a rate of frequencies in the 2.4 GHz baud at a rate of 1600 frequency hops per second.1600 frequency hops per second.
• The master device tells the slaves at what The master device tells the slaves at what frequency data will be sent.frequency data will be sent.
• This technique allows devices to This technique allows devices to communicate with each other more securely.communicate with each other more securely.
FHHS ExampleFHHS Example
Source: http://www.xircom.com
Bluetooth SecurityBluetooth Security
• ModesModes– Security Mode 1Security Mode 1
•No SecurityNo Security
– Security Mode 2Security Mode 2•Service Level Enforced SecurityService Level Enforced Security• Implemented after channel is establishedImplemented after channel is established
– Security Mode 3Security Mode 3•Link Level Enforced Security Link Level Enforced Security • Implemented before channel is establishedImplemented before channel is established
DevicesDevices
• ““Trusted”Trusted”– No RestrictionsNo Restrictions
• ““Untrusted”Untrusted”– Restrictions, Access is limitedRestrictions, Access is limited
Service LevelsService Levels
• Authorization and AuthenticationAuthorization and Authentication
• Authentication OnlyAuthentication Only
• Open to all DevicesOpen to all Devices
Link LevelLink Level
• Bluetooth Device AddressBluetooth Device Address
• Private Link KeyPrivate Link Key
• Private Encryption KeyPrivate Encryption Key
• Random NumberRandom Number
Bluetooth Secure Enough?Bluetooth Secure Enough?
• Not enough for confidential and top Not enough for confidential and top secret information now but . . . secret information now but . . .
• Security will ImproveSecurity will Improve– Improve exisiting securityImprove exisiting security– Implement new securityImplement new security
Wrap upWrap up
• Growing TechnologyGrowing Technology
• AutomationAutomation
For More Information Please For More Information Please Visit The Following SitesVisit The Following Sites
•www.motorola.com
•www.xircom.com
•www.palowireless.com
•www.bluetooth.com