BLUETOOTH TECHNOLOGY
#1

[attachment=8634]
ABSTRACT
Bluetooth is a Radio Frequency (RF) specification for short-range, point-to-point and point-to-multi-point voice and data transfer, which enable users to connect to a wide range of computing and telecommunication devices without the need for proprietary cables that often fall short in terms of ease-of-use. Bluetooth has emerged as a very popular ad hoc network standard today. The Bluetooth standard is a computing and telecommunications industry specification that describes how mobile phones, computers, and PDA s should interconnect with each other, with home and business phones, and with computers using short-range wireless connections.
It is a wireless communication technology that permits communication between Bluetooth enabled devices. Bluetooth network applications include wireless synchronization, e-mail/Internet/intranet access using local personal computer connections, hidden computing through automated applications and networking, and applications that can be used for such devices as hands-free headsets and car kits.
INTRODUCTION
The original architect for Bluetooth, named after the 10th century Danish king Herald Bluetooth, was Ericsson Mobile Communication. In 1998, IBM, Intel, Nokia, and Toshiba formed the Bluetooth SIG, which serves as the governing body of the specification. The SIG began as a means to monitor the development of the radio technology and the creation of a global and open standard.
Bluetooth was originally designed primarily as a cable replacement protocol for wireless communications. Among the array of devices that are anticipated are cellular phones, PDAs, notebook computers, modems, cordless phones, pagers, laptop computers, cameras, PC cards, fax machines, and printers. Bluetooth is now standardized within the IEEE 802.15 Personal Area Network (PAN) Working Group that formed in early 1999.
BLUETOOTH ARCHITECTURE AND COMPONENTS
Bluetooth permits the 802.11 standard. In this architecture, client stations are grouped into a single geographic area and can be inter-networked without access to the wired
LAN. As in this piconet, one of the devices would be a master, and the other two devices would be slaves.
Unlike a WLAN that comprises both a wireless station and an access point, with Bluetooth, there are only wireless stations or clients. A Bluetooth client is simply a device with a Bluetooth radio and Bluetooth software module incorporating the Bluetooth protocol stack and interfaces. The Bluetooth architecture allows for defining security policies that can set trust relationships in such a way that even trusted devices can get access only to specific services and not to others. It is important to understand that Bluetooth core protocols can authenticate only devices and not users. This is not to say that user-based access control is not possible
TWO TYPES OF CHANNELS
Asynchronous and synchronous.
 For asynchronous communication the master polls a slave and the slave responds in the next slot. It is asynchronous and is initiated by the master.
 For synchronous communication the master and slave talk to each other at regular intervals of time. The interval of time is set up before the synchronous communication starts. This is mainly used for voice traffic.

BLUETOOTH ISSUES
Frequency usage Conflicts:
Bluetooth radios operate in the unlicensed 2.4-GHz band. The problem that Bluetooth technology will face is that even at 2.4 GHz, the bandwidth is finite. Because this is an unlicensed band, any number of devices can use it. The 2.4 GHz frequency range used by Bluetooth is currently shared by other wireless communication standards such as 802.11b LANs, Home RF LANs, and urban and suburban wireless telecommunications systems. At some point, devices start interfering with one another.
Compliance concerns:
Other organizations, including the Federal Aviation Administration (FAA), are concerned about Bluetooth as well. The operating airline has the ultimate responsibility for approving Bluetooth, and testing by the SIG members (including Intel and Boeing) is currently in progress. Bluetooth technology uses the same bandwidth frequency that several local wireless technologies use, which could mean data collisions and lost data.
Impact of Bluetooth on pacemakers:
Currently, the only recommendation available is for cell phones. The Health Industry Manufacturers Association recommends that a minimum separation of 2.5 cm be maintained between a cell phone and a pacemaker.
Bluetooth on an airplane:
Like with your cell phone and pager, Bluetooth must be turned off in an airplane. Bluetooth like our cell phone and pager are radio devices and are prohibited by the airlines during flight to minimize the risk of interference with the airplane’s radio frequency equipment such as radar and radios.
POWER TRANSMITTED BY THE BLUETOOTH
There are three classes of radios, which are characterized by their output power.
Class 1 is specified to have a maximum transmit power of +20 dBm (100milli watts).
Class 2 has a maximum transit power of +4 dBm (2.5milli watts).
Class 3 has a maximum transmit power of 0 dBm (1milli watt).
USAGE MODELS
A usage model is a set of protocols that implement a particular Bluetooth-based application. Each profile defines the protocols and protocol features supporting a particular usage model.
 File transfer.
 Internet Bridge.
 LAN access.
 Synchronization Three-in-one phone.
 Headset.
FEATURES
1. Uses 2.4 GHz ISM frequency band.
2. Piconet supports up to eight connected devices where one acts as a master and all others act as slaves.
3. Public/Private key authentication and encryption are key elements of the Bluetooth standard.
4. The Bluetooth logo program is a key initiative within the Special Interest Group (SIG).
5. Does not require line of site between devices to establish a connection.
ADVANTAGES
1. Multiple piconets (scatter mode) are able to connect to each other via the master devices thus increasing the total number of connected devices beyond eight.
2. Limiting range to ten meters helps reduce power requirements making Bluetooth a practical technology by eliminating the hassle of proprietary cables for a broad range of battery operated devices like notebook computers and cellular phones.
3. Provides a degree of security for communications between Bluetooth devices.
4. The Bluetooth logo program will provide the industry with a mechanism to identify Bluetooth enabled devices that meet stringent compliance criteria and ensure seamless interoperability between devices and enhance overall ease-of-use and customer experience.
5. Provides greater flexibility and ease-of-use over wireless technologies like IrDA, which require a line of site between devices.
6. Allows connections to be established through barriers.
7. Qualification program ensures that products displaying the Bluetooth logo have been tested to meet stringent expectations for ease of use.
8. Tremendous momentum not only within the computer industry but other industries like cellular telephones and transportation.
DISADVANTAGES
1. Early stages of development make Bluetooth an immature technology that will need to prove itself.
2. Bluetooth shares the same frequency range as 802.11b Wireless LAN products (i.e. 2.4GHz) which mean that under some conditions these two technologies will not be able to operate in the same physical space.
SECURITY SERVICES FOR BLUETOOTH
The three basic security services defined by the Bluetooth specifications are the following:
1. Authentication—a goal of Bluetooth is the identity verification of communicating devices. This security service addresses the question “Do I know with whom I’m communicating?” This service provides an abort mechanism if a device cannot authenticate properly.
2. Confidentiality—Confidentiality, or privacy, is another security goal of Bluetooth. The intent is to prevent information compromise caused by eavesdropping (passive attack). This service, in general, addresses the question “Are only authorized devices allowed to view my data?”
3. Authorization—a third goal of Bluetooth is a security service developed to allow the control of resources. This service addresses the question “Has this device been authorized to use this service?”
SECURITY LEVELS OF BLUETOOTH
The security levels can be described as follows:
1. Service Level 1—those that requires authorization and authentication. Automatic access is granted only to trusted devices. Untrusted devices need manual authorization.
2. Service Level 2—those that require authentication only. Access to an application is allowed only after an authentication procedure. Authorization is not necessary.
3. Service Level 3—those that opens to all devices. Authentication is not required, and access is granted automatically.
ENCRYPTION MODES OF BLUETOOTH
The Bluetooth specification also allows three different encryption modes to support the confidentiality service:
1. Encryption Mode 1—No encryption is performed on any traffic.
2. Encryption Mode2—Broadcast traffic goes unprotected (not encrypted), but individually addressed traffic is encrypted according to the individual page link keys.
3. Encryption Mode 3—all traffic is encrypted according to the master page link key.
CONCLUSION
Bluetooth is a short-range wireless communication technology for ad-hoc communication between devices, each of which has a range of around 10m. Bluetooth-enabled consumer devices to enhance wireless connectivity among the array of devices that are anticipated are cellular phones, PDA s, notebook computers, modems, cordless phones, pagers, laptop computers, cameras, PC cards, fax machines, and printers. Bluetooth is now standardized within the IEEE 802.15 Personal Area Network (PAN) Working Group that formed in early 1999. Bluetooth also include vending machines, banking and other electronic payment systems, wireless office and conference rooms; smart homes, and in-vehicle communications and parking.

“EVERY THING WILL BE IN WIRELESS”.
Reply
#2
[attachment=12611]
Introduction to Bluetooth Technology
Bluetooth is a radio frequency specification for short range, point to point and point to multi point voice and data transfer. Bluetooth technology facilitates the replacement of cables normally used to connect one device to another by a short range radio link. With the help of blue tooth we can operate our keyboard and mouse without direct connection of CPU. Printers, fax machines, headphone, mouse, keyboard or any other digital devices can be part of Bluetooth system.
In spite of facilitating the replacement of cables, Bluetooth technology works as an universal medium to bridge the existing data networks, a peripheral interface for existing devices and provide a mechanism to form short ad hok network of connected devices away from fixed network infrastructures.
Due to their independence on short range radio link, Bluetooth devices do not require a line of site connection in order to communicate. Therefore a computer can print information on a printer if printer is in inside the room. Two blue tooth devices can talk to each other when they come within range of 10 meters to each other.
Bluetooth technology represents an opportunity for the industry to deliver wireless solutions that are ubiquitous across a broad range of devices.
Why it’s name is Bluetooth?
While many new technologies bear technical names, like RS-232 or IEEE
802.11b, Bluetooth, the wireless technology, is different.
Bluetooth was named for the 10th Century Viking king , Harald Blatand
(A.K.A., Bluetooth) who peacefully united all the tiny island kingdoms of
Denmark, southern Sweden, and southern Norway into one country . In
keeping with its namesake, Bluetooth, the new low-cost radio technology, is
designed to unite or connect all different types of devices to effectively work
as one. By uniting devices, Bluetooth eliminates the need for cabling in a
wide range of products, including cellular phones, PCs, headphones, audio
equipment, printers, and many more.
Bluetooth Definitions
• Piconet: Devices connected in an ad hoc fashion, that is, not requiring predefinition and planning, as with a standard network. Two to eight devices can be networked into a piconet. It is a peer network, that is, once connected, each device has equal access to the others. However, one device is defined as master, and the others as slaves.
• Scatternet: Several piconets may form a larger scatternet, with each piconet maintaining independence.
• Master unit: The master in a piconet whose clock and hopping sequence synchronizes the other devices.
• Slave unit: Devices in a piconet that are not the master.
• MAC address: Three bit address that distinguishes each unit in a piconet.
• Parked units: Piconet devices that are synchronized but don't have MAC addresses.
• Sniff and hold mode: Power-saving mode of a piconet device.
How Bluetooth Technology Work
The technology of Bluetooth centers around a 9mm x 9mm microchip, which functions as a low cost and short range radio link. Bluetooth Technology provide a 10 meter personal bubble that support simultaneous transmission of both voice
and data for multiple devices. Up to 8 devices can be connected in a piconet, and uo to 10 piconets can exist within the 10 meter bubble. Each piconet support
up to 3 simultaneous full duplex voice devices.
The gross data rate is 1 Mb/s, but the actual data rate are 432 kbps for full
duplex transmission,721/56kbps for asymmetric transmission, and 384 kbps for
tms2000 transmission.
Bluetooth wireless technology is designed to be as secure as a wire with up to 128-bit public/private key authentication, and streaming cipher up to 64 bit based on a5 security.
Transmission types and rates :
The baseband (single channel per line) protocol combines circuit and packet switching. To assure that packets do not arrive out of order, slots (up to five) can be reserved for synchronous packets. As noted earlier, a different hop signal is used for each packet. Circuit switching can be either asynchronous or synchronous. Up to three synchronous (voice) data channels, or one synchronous and one asynchronous data channel, can be supported on one channel. Each synchronous channel can support a 64 Kb/s transfer rate, which is fully adequate for voice transmissions. An asynchronous channel can transmit as much as 721 Kb/s in one direction and 57.6 Kb/s in the opposite direction. It is also possible for an asynchronous connection to support 432.6 Kb/s in both directions if the page link is symmetric.
Radio frequency and spectrum hopping :
What if there's a lot of radio noise? Won't that interfere with Bluetooth connections? As a rule, the answer is no. It is designed to use fast acknowledgement and frequency hopping, which will make connections robust. It is packet-based, and will jump to a new frequency after each packet is received, which not only helps limit interference problems, but also adds to security. Data rates are one megabyte/second, including headers. Full duplex transmissions (both directions at once) are accomplished via time division multiplexing.
The Bluetooth radio chip functions at 2.4 gigahertz, which is in the unlicensed ISM (Industrial Scientific Medical) band. It separates the 2.4 gigahertz frequency band into 79 hops one megahertz apart, starting with 2.402 and ending with 2.480 (though this bandwidth is narrower in Japan, France, and Spain). This spread spectrum is used to hop from one channel to another, pseudo-randomly, which adds a strong layer of security. Up to 1600 hops per second can be made. The standard frequency range is 10 centimeters to 10 meters, and can be extended to at least 100 meters by increasing transmission power.
Data transmission:
Data can be transmitted both synchronously and asynchronously. The Synchronous Connection Oriented (SCO) method is used primarily for voice, and Asynchronous Connectionless (ACL) is primarily for data. Within a piconet, each master-slave pair can use a different transmission mode, and modes can be changed at any time. Time Division Duplex (TDD) is used by both SCO and ACL, and both support 16 types of packets, four of which are control packets that are the same in each type. Because of the need for smoothness in data transmission, SCO packets are generally delivered via reserved intervals, that is, the packets are sent in groups without allowing other transmissions to interrupt. SCO packets can be transmitted without polling by the sending unit. ACL links support both symmetric and assymetric transmissions.
Bandwidth is controlled by the master unit, which determines how much of the total each slave unit can use. Slaves cannot transmit data until they have been polled by the master, and the master can broadcast messages to the slave units via ACL link.
Network arrangement:
Bluetooth network arrangements (topology) can be either point-to-point or point-to-multipoint. Any unit in a piconet can establish a connection to another piconet to form a scatternet. See the figure, which diagrams a scatternet in which piconet A, which consists of four units, is connected to piconet B, consisting of two units. Note that the master unit of A is not the page link Bluetooth network arrangements (topology) can between the two piconets.
Error correction and security:
on code (FEC), 2/3 rate forward error correction code FEC, and automatic repeat request (ARQ). The FEC methods are designed to reduce the number of retransmissions. However, the over hea Three error correction techniques have been defined: 1/3 rate forward error corrected significantly slows transmissions, so is generally not used in relatively error-free environments, with the exception of packet headers. The ARQ scheme requires that the header error and cyclic redundancy checks are okay. When they are, an acknowledge is sent. When they aren't, the data is resent.
Security is provided in three ways: through pseudo-random frequency band hops, authentication, and encryption. Frequency band hops make it difficult for anyone to eavesdrop. Authentication allows a user to control connectivity to only devices specified. Encryption uses secret key lengths of 1, 40, and 64 bits. The quality of security is excellent for most applications. However, it is not the highest level available, and for those users who require it, the suggestion is to investigate separate network transfer protocols and security software.
Connection Protocol
Bluetooth connections are established via the following techniques:
1. Standby: Devices not connected in a piconet are in standby mode. In this mode, they listen for messages every 1.28 seconds over 32 hop frequencies (fewer in Japan, Spain, and France).
2. Page/Inquiry: If a device wishes to make a connection with another device, it sends out a page message, if the address is known, or an inquiry followed by a page message, if it is unknown. The master unit sends out 16 identical page messages on 16 hop frequencies to the slave unit. If there is no response, the master retransmits on the other 16 hop frequencies. The inquiry method requires an extra response from the slave unit, since the MAC address is unknown to the master unit.
3. Active: Data transmission occurs.
4. Hold: When either the master or slave wishes, a hold mode can be established, during which no data is transmitted. The purpose of this is to conserve power. Otherwise, there is a constant data exchange. A typical reason for going into hold mode is the connection of several piconets.
5. Sniff: The sniff mode, applicable only to slave units, is for power conservation, though not at as reduced a level as hold. During this mode, the slave does not take an active role in the piconet, but listens at a reduced level. This is usually a programmable setting.
6. Park: Park mode is a more reduced level of activity than the hold mode. During it, the slave is synchronized to the piconet, thus not requiring full reactivation, but is not part of the traffic. In this state, they do not have MAC addresses, but only listen enough to keep their synchronization with the master and check for broadcast messages.
Reply
#3
[attachment=14406]
Introduction to Bluetooth Technology
Bluetooth is a radio frequency specification for short range, point to point and point to multi point voice and data transfer. Bluetooth technology facilitates the replacement of cables normally used to connect one device to another by a short range radio link. With the help of blue tooth we can operate our keyboard and mouse without direct connection of CPU. Printers, fax machines, headphone, mouse, keyboard or any other digital devices can be part of Bluetooth system.
In spite of facilitating the replacement of cables, Bluetooth technology works as an universal medium to bridge the existing data networks, a peripheral interface for existing devices and provide a mechanism to form short ad hok network of connected devices away from fixed network infrastructures.
Due to their independence on short range radio link, Bluetooth devices do not require a line of site connection in order to communicate. Therefore a computer can print information on a printer if printer is in inside the room. Two blue tooth devices can talk to each other when they come within range of 10 meters to each other.
Bluetooth technology represents an opportunity for the industry to deliver wireless solutions that are ubiquitous across a broad range of devices.
Why it’s name is Bluetooth?
While many new technologies bear technical names, like RS-232 or IEEE
802.11b, Bluetooth, the wireless technology, is different.
Bluetooth was named for the 10th Century Viking king , Harald Blatand
(A.K.A., Bluetooth) who peacefully united all the tiny island kingdoms of
Denmark, southern Sweden, and southern Norway into one country . In
keeping with its namesake, Bluetooth, the new low-cost radio technology, is
designed to unite or connect all different types of devices to effectively work
as one. By uniting devices, Bluetooth eliminates the need for cabling in a
wide range of products, including cellular phones, PCs, headphones, audio
equipment, printers, and many more.
Bluetooth Definitions
• Piconet: Devices connected in an ad hoc fashion, that is, not requiring predefinition and planning, as with a standard network. Two to eight devices can be networked into a piconet. It is a peer network, that is, once connected, each device has equal access to the others. However, one device is defined as master, and the others as slaves.
• Scatternet: Several piconets may form a larger scatternet, with each piconet maintaining independence.
• Master unit: The master in a piconet whose clock and hopping sequence synchronizes the other devices.
• Slave unit: Devices in a piconet that are not the master.
• MAC address: Three bit address that distinguishes each unit in a piconet.
• Parked units: Piconet devices that are synchronized but don't have MAC addresses.
• Sniff and hold mode: Power-saving mode of a piconet device.
How Bluetooth Technology Work
The technology of Bluetooth centers around a 9mm x 9mm microchip, which functions as a low cost and short range radio link. Bluetooth Technology provide a 10 meter personal bubble that support simultaneous transmission of both voice
and data for multiple devices. Up to 8 devices can be connected in a piconet, and uo to 10 piconets can exist within the 10 meter bubble. Each piconet support
up to 3 simultaneous full duplex voice devices.
The gross data rate is 1 Mb/s, but the actual data rate are 432 kbps for full
duplex transmission,721/56kbps for asymmetric transmission, and 384 kbps for
tms2000 transmission.
Bluetooth wireless technology is designed to be as secure as a wire with up to 128-bit public/private key authentication, and streaming cipher up to 64 bit based on a5 security.
Transmission types and rates :
The baseband (single channel per line) protocol combines circuit and packet switching. To assure that packets do not arrive out of order, slots (up to five) can be reserved for synchronous packets. As noted earlier, a different hop signal is used for each packet. Circuit switching can be either asynchronous or synchronous. Up to three synchronous (voice) data channels, or one synchronous and one asynchronous data channel, can be supported on one channel. Each synchronous channel can support a 64 Kb/s transfer rate, which is fully adequate for voice transmissions. An asynchronous channel can transmit as much as 721 Kb/s in one direction and 57.6 Kb/s in the opposite direction. It is also possible for an asynchronous connection to support 432.6 Kb/s in both directions if the page link is symmetric.
Radio frequency and spectrum hopping :
What if there's a lot of radio noise? Won't that interfere with Bluetooth connections? As a rule, the answer is no. It is designed to use fast acknowledgement and frequency hopping, which will make connections robust. It is packet-based, and will jump to a new frequency after each packet is received, which not only helps limit interference problems, but also adds to security. Data rates are one megabyte/second, including headers. Full duplex transmissions (both directions at once) are accomplished via time division multiplexing.
The Bluetooth radio chip functions at 2.4 gigahertz, which is in the unlicensed ISM (Industrial Scientific Medical) band. It separates the 2.4 gigahertz frequency band into 79 hops one megahertz apart, starting with 2.402 and ending with 2.480 (though this bandwidth is narrower in Japan, France, and Spain). This spread spectrum is used to hop from one channel to another, pseudo-randomly, which adds a strong layer of security. Up to 1600 hops per second can be made. The standard frequency range is 10 centimeters to 10 meters, and can be extended to at least 100 meters by increasing transmission power.
Reply
#4
[attachment=15461]
What is Bluetooth?
Why is the technology called Bluetooth !

Bluetooth! The word was borrowed from the 10th century, second King of Denmark, King Harald Bluetooth.
He played a major role in uniting Denmark and Norway as also in the introduction of Christianity in Denmark.
His states include “Norway” & “Sweden” from which Ericsson comapany is belongs to(founder of bluetooth technology).
How Does Bluetooth Work?
Bluetooth is a technology, where by, devices communicate wirelessly to achieve data transfer at the rate of 720 kbps within a range of 10 to 100 meters. It operates in the unlicensed ISM (Industrial Scientific and Medical) band at 2.4 gigahertz.
A Bluetooth device consists of a special type of chip.This chips were design to take all of the information that your wires normaly send and transmit at special frequency.The chip is known as reciver blouetooth chip.
Bluetooth Networking components :
Piconet: A group of devices connected by means of Bluetooth technology is known as a piconet. There can be a maximum of 8 devices forming one piconet. One device acts as the master and others act as slaves.
Scatternet: A scatternet is composed of two or more independent piconets. This brings about a communication between piconets.
BNC……..
Master unit: It Is used to synchronize other devices in the piconet. The master device numbers the communication channels.
Slave unit: The slave units act in co-ordination with the master.
PAN ( Personal Area Network): PAN refers to the distance between the devices.
Data transmission
Data can be transmitted both synchronously and asynchronously.
The Synchronous Connection Oriented (SCO) method is used primarily for voice.
Asynchronous Connectionless (ACL) is primarily for data. Within a piconet, each master-slave pair can use a different transmission
Slaves cannot transmit data until they have been polled by the master
Bluetooth Characteristics:
It separates the frequency band into hops.Up to eight devices can be networked in a piconet
Signals can be transmitted through walls and briefcases, thus eliminating the need for line-of-sight.
Devices do not need to be pointed at each other, as signals are omni-directional.
Both synchronous and asynchronous applications are supported, making it easy to implement on a variety of devices and for a variety of services, such as voice and Internet
Applications
devices
Bluetooth dongle.
Bluetooth in Mobile
Bluetooth in car
ADVANTAGES OF BLUETOOTH TECHNOLOGY
.No line of site restrictions as with Infrared technology.
Low power consumption.
Tremendous momentum not only with in the computer industry
          but other industries like cellular telephones and transportation.       
Bluetooth Limitations
Communication speed is not that great with Bluetooth technology. WiFi and Infrared communication can happen at much higher speeds compared to that of Bluetooth
if a user happens to leave his device in the 'discoverable' mode, a hacker can establish a connection with the 'discovered' device without the user knowing about it.
Reply
#5
to get information about the topic Bluetooth Security full report ,ppt and related topic refer the page link bellow

http://studentbank.in/report-bluetooth-s...esentation

http://studentbank.in/report-bluetooth-a...esentation

http://studentbank.in/report-two-practic...le-pairing

http://studentbank.in/report-secure-conn...s%E2%88%97

http://studentbank.in/report-bluetooth-t...3#pid63553

http://studentbank.in/report-network-sec...81#pid4781

http://studentbank.in/report-bluetooth-t...ogy--18045

http://studentbank.in/report-bluetooth-t...ull-report
Reply
#6
BLUETOOTH TECHNOLOGY :

[attachment=17241]

What is Bluetooth? :
23 December, 2009 4 What is Bluetooth? “Bluetooth wireless technology is an open specification for a low-cost, low-power, short-range radio technology for ad-hoc wireless communication of voice and data anywhere in the world.” One of the first modules (Ericsson) A recent module

Ultimate Headset :
23 December, 2009 5 Ultimate Headset

Cordless Computer :
23 December, 2009 6 Cordless Computer

Bluetooth Goals & Vision :
23 December, 2009 7 Bluetooth Goals & Vision Originally conceived as a cable replacement technology Short-Range Wireless Solutions Open Specification Voice and Data Capability Worldwide Usability Other usage models began to develop: Personal Area Network (PAN) Ad-hoc networks Data/voice access points Wireless telematics

Overview of Bluetooth History :
23 December, 2009 8 Overview of Bluetooth History What is Bluetooth? Bluetooth is a short-range wireless communications technology. Why this name? It was taken from the 10th century Danish King Harald Blatand who unified Denmark and Norway. When does it appear? 1994 – Ericsson study on a wireless technology to page link mobile phones & accessories. 5 companies joined to form the Bluetooth Special Interest Group (SIG) in 1998. First specification released in July 1999.

Timeline :
23 December, 2009 9 Timeline 1994 : Ericsson study complete / vision 1995 : Engineering work begins 1997 : Intel agrees to collaborate 1998 : Bluetooth SIG formed: Ericsson, Intel, IBM, Nokia & Toshiba 1999 : Bluetooth Specification 1.0A SIG promoter group expanded: 3Com, Lucent, Microsoft & Motorola 2000 : Bluetooth Specification 1.0B, 2000+ adopters 2001 : First retail products released, Specification 1.1 2003 : Bluetooth Specification 1.2 2005 : Bluetooth Specification 2.0 (?)

Special Interest Group :
23 December, 2009 10 Special Interest Group

Technical features :
23 December, 2009 11 Technical features

Bluetooth FHSS :
23 December, 2009 12 Bluetooth FHSS Employs frequency hopping spread spectrum Reduce interference with other devices Pseudorandom hopping 1600 hops/sec- time slot is defined as 625 microseconds Packet 1-5 time slots long
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: kleer technology vs bluetooth, bluetooth technology seminar topics, bluetooth technology book, bluetooth technology seminar topic, posterpresentation of bluetooth technology, bluetooth technology tutorial, bluetooth technology is used,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  5G technology dhanya1987 8 12,923 11-04-2016, 11:21 AM
Last Post: dhanabhagya
  FinFET Technology computer science crazy 13 11,635 10-03-2015, 04:38 PM
Last Post: seminar report asees
  Cellonics Technology computer science crazy 3 3,530 05-09-2014, 09:45 PM
Last Post: seminar report asees
  Latest Invention: Acoustic Ear-scanning Technology to Help Avoid Theft project report helper 10 8,674 20-08-2014, 09:02 PM
Last Post: preethikrishna
  RFID Technology computer science crazy 4 4,631 09-08-2014, 07:10 PM
Last Post: Guest
  Seminar Report On Optical Computing Technology mechanical wiki 3 5,860 27-07-2013, 12:41 PM
Last Post: computer topic
Question Sixth Sense Technology nitins60 43 76,209 22-06-2013, 10:46 AM
Last Post: Guest
  Blue Eyes Technology sprity 21 31,186 30-01-2013, 12:54 PM
Last Post: seminar details
  3G MOBILE COMMUNICATION TECHNOLOGY full report seminar presentation 22 31,238 29-01-2013, 11:06 AM
Last Post: seminar details
  Cellonics Technology computer science crazy 25 28,441 10-01-2013, 03:34 PM
Last Post: seminar details

Forum Jump: