21
An Overview An Over view Of Of Blueto o th Blu etoo th & JALPAIGURI GOVT. JALPAIGURI GOVT. ENGG. COLLEGE ENGG. COLLEGE C.S.E 2011-2015 C.S.E 2011-2015 BATCH BATCH By By

Seminar on Bluetooth Ppt Fromat

Embed Size (px)

DESCRIPTION

Bluetooth is a radio frequency specification for short range, point to point and point to multi point voice and data transfer. Bluetooth technology facilitates the replacement of cables normally used to connect one device to another by a short range radio link. With the help of blue tooth we can operate our keyboard and mouse without direct connection of CPU. Printers, fax machines, headphone, mouse, keyboard or any other digital devices can be part of Bluetooth system.

Citation preview

Page 1: Seminar on Bluetooth Ppt Fromat

An Overview

An Overview

OfOf

Bluetooth

Bluetooth

&

JALPAIGURI GOVT. JALPAIGURI GOVT. ENGG. COLLEGEENGG. COLLEGE

C.S.E 2011-2015C.S.E 2011-2015

BATCHBATCH

SAYED KARAR SAYED KARAR WARISWARIS

ByBy

Page 2: Seminar on Bluetooth Ppt Fromat

IntroductionIntroduction

•What is Bluetooth?What is Bluetooth?

•What does it do?What does it do?

•History of BluetoothHistory of Bluetooth

Page 3: Seminar on Bluetooth Ppt Fromat

Introduction (cont’d)Introduction (cont’d)

• Is Bluetooth here to stay?Is Bluetooth here to stay?

•What should we expect from What should we expect from Bluetooth in the future?Bluetooth in the future?

Page 4: Seminar on Bluetooth Ppt Fromat

What Bluetooth Delivers to What Bluetooth Delivers to the end-userthe end-user

• Connects a wide range of computing Connects a wide range of computing and telecommunication devicesand telecommunication devices

• Expand communication capabilitiesExpand communication capabilities

• Devices can communicate with each Devices can communicate with each other with wireless connectivityother with wireless connectivity

Page 5: Seminar on Bluetooth Ppt Fromat

User ApplicationUser Application

• Car manufactures Industry Car manufactures Industry

• E-Mail / Internet / Intranet AccessE-Mail / Internet / Intranet Access

• HeadsetsHeadsets

• Bluetooth will facilitate Local Area Bluetooth will facilitate Local Area NetworksNetworks

Page 6: Seminar on Bluetooth Ppt Fromat

Bluetooth in ActionBluetooth in Action

Source: http//:www.motorola.com

In the Office ...In the Office ...In the houseIn the house

Page 7: Seminar on Bluetooth Ppt Fromat

Home SecurityHome Security On the RoadOn the Road

Source: http//:www.motorola.com

Page 8: Seminar on Bluetooth Ppt Fromat

On your CarOn your Car

Source: http//:www.motorola.com

Page 9: Seminar on Bluetooth Ppt Fromat

Bluetooth SpecificationsBluetooth Specifications

• Things that you must have:Things that you must have:– Transceivers and Receivers that can send Transceivers and Receivers that can send

and receive data because they use and receive data because they use Radio Radio Waves.Waves.

– MAC Address (Physical Address)MAC Address (Physical Address)•Burnt on the NIC card by the manufacturer.Burnt on the NIC card by the manufacturer.

– PIN Number PIN Number •To identify the user using the device.To identify the user using the device.

– A PiconetA Piconet– A FHHS protocolA FHHS protocol

Page 10: Seminar on Bluetooth Ppt Fromat

What is a Piconet?What is a Piconet?

• A Piconet session is a communication A Piconet session is a communication link that must be created between link that must be created between devices for devices to communicate devices for devices to communicate with each other. with each other.

• This is done when the MAC address This is done when the MAC address and the PIN number match.and the PIN number match.

Page 11: Seminar on Bluetooth Ppt Fromat

Piconet (cont.)Piconet (cont.)

• If two devices come onto contact with each other( 32 If two devices come onto contact with each other( 32 feet) the user will be prompted to initiate a feet) the user will be prompted to initiate a communication sessioncommunication session

• Users then can either deny or accept the request to Users then can either deny or accept the request to initiate a sessioninitiate a session

• Only devices approved by the user can take part in Only devices approved by the user can take part in the sessionthe session

• Data will appear as noise to unauthorized devicesData will appear as noise to unauthorized devices (A (A great security feature).great security feature).

Page 12: Seminar on Bluetooth Ppt Fromat

FHHSFHHS• Bluetooth devices use a protocol called (FHHS) Bluetooth devices use a protocol called (FHHS)

Frequency-Hopping Spread Spectrum .Frequency-Hopping Spread Spectrum .

• Uses packet-switching to send data.Uses packet-switching to send data.

• Bluetooth sends packets of data on a range of Bluetooth sends packets of data on a range of frequencies.frequencies.

• In each session one device is a master and the others are In each session one device is a master and the others are slaves.slaves.

• The master device decides at which frequency data will The master device decides at which frequency data will travel.travel.

Page 13: Seminar on Bluetooth Ppt Fromat

FHHSFHHS

• Transceivers “hop” among 79 different Transceivers “hop” among 79 different frequencies in the 2.4 GHz baud at a rate of frequencies in the 2.4 GHz baud at a rate of 1600 frequency hops per second.1600 frequency hops per second.

• The master device tells the slaves at what The master device tells the slaves at what frequency data will be sent.frequency data will be sent.

• This technique allows devices to This technique allows devices to communicate with each other more securely.communicate with each other more securely.

Page 14: Seminar on Bluetooth Ppt Fromat

FHHS ExampleFHHS Example

Source: http://www.xircom.com

Page 15: Seminar on Bluetooth Ppt Fromat

Bluetooth SecurityBluetooth Security

• ModesModes– Security Mode 1Security Mode 1

•No SecurityNo Security

– Security Mode 2Security Mode 2•Service Level Enforced SecurityService Level Enforced Security• Implemented after channel is establishedImplemented after channel is established

– Security Mode 3Security Mode 3•Link Level Enforced Security Link Level Enforced Security • Implemented before channel is establishedImplemented before channel is established

Page 16: Seminar on Bluetooth Ppt Fromat

DevicesDevices

• ““Trusted”Trusted”– No RestrictionsNo Restrictions

• ““Untrusted”Untrusted”– Restrictions, Access is limitedRestrictions, Access is limited

Page 17: Seminar on Bluetooth Ppt Fromat

Service LevelsService Levels

• Authorization and AuthenticationAuthorization and Authentication

• Authentication OnlyAuthentication Only

• Open to all DevicesOpen to all Devices

Page 18: Seminar on Bluetooth Ppt Fromat

Link LevelLink Level

• Bluetooth Device AddressBluetooth Device Address

• Private Link KeyPrivate Link Key

• Private Encryption KeyPrivate Encryption Key

• Random NumberRandom Number

Page 19: Seminar on Bluetooth Ppt Fromat

Bluetooth Secure Enough?Bluetooth Secure Enough?

• Not enough for confidential and top Not enough for confidential and top secret information now but . . . secret information now but . . .

• Security will ImproveSecurity will Improve– Improve exisiting securityImprove exisiting security– Implement new securityImplement new security

Page 20: Seminar on Bluetooth Ppt Fromat

Wrap upWrap up

• Growing TechnologyGrowing Technology

• AutomationAutomation

Page 21: Seminar on Bluetooth Ppt Fromat

For More Information Please For More Information Please Visit The Following SitesVisit The Following Sites

•www.motorola.com

•www.xircom.com

•www.palowireless.com

•www.bluetooth.com