BLUETOOTH TECHNOLOGY
#1

[attachment=8634]
ABSTRACT
Bluetooth is a Radio Frequency (RF) specification for short-range, point-to-point and point-to-multi-point voice and data transfer, which enable users to connect to a wide range of computing and telecommunication devices without the need for proprietary cables that often fall short in terms of ease-of-use. Bluetooth has emerged as a very popular ad hoc network standard today. The Bluetooth standard is a computing and telecommunications industry specification that describes how mobile phones, computers, and PDA s should interconnect with each other, with home and business phones, and with computers using short-range wireless connections.
It is a wireless communication technology that permits communication between Bluetooth enabled devices. Bluetooth network applications include wireless synchronization, e-mail/Internet/intranet access using local personal computer connections, hidden computing through automated applications and networking, and applications that can be used for such devices as hands-free headsets and car kits.
INTRODUCTION
The original architect for Bluetooth, named after the 10th century Danish king Herald Bluetooth, was Ericsson Mobile Communication. In 1998, IBM, Intel, Nokia, and Toshiba formed the Bluetooth SIG, which serves as the governing body of the specification. The SIG began as a means to monitor the development of the radio technology and the creation of a global and open standard.
Bluetooth was originally designed primarily as a cable replacement protocol for wireless communications. Among the array of devices that are anticipated are cellular phones, PDAs, notebook computers, modems, cordless phones, pagers, laptop computers, cameras, PC cards, fax machines, and printers. Bluetooth is now standardized within the IEEE 802.15 Personal Area Network (PAN) Working Group that formed in early 1999.
BLUETOOTH ARCHITECTURE AND COMPONENTS
Bluetooth permits the 802.11 standard. In this architecture, client stations are grouped into a single geographic area and can be inter-networked without access to the wired
LAN. As in this piconet, one of the devices would be a master, and the other two devices would be slaves.
Unlike a WLAN that comprises both a wireless station and an access point, with Bluetooth, there are only wireless stations or clients. A Bluetooth client is simply a device with a Bluetooth radio and Bluetooth software module incorporating the Bluetooth protocol stack and interfaces. The Bluetooth architecture allows for defining security policies that can set trust relationships in such a way that even trusted devices can get access only to specific services and not to others. It is important to understand that Bluetooth core protocols can authenticate only devices and not users. This is not to say that user-based access control is not possible
TWO TYPES OF CHANNELS
Asynchronous and synchronous.
 For asynchronous communication the master polls a slave and the slave responds in the next slot. It is asynchronous and is initiated by the master.
 For synchronous communication the master and slave talk to each other at regular intervals of time. The interval of time is set up before the synchronous communication starts. This is mainly used for voice traffic.

BLUETOOTH ISSUES
Frequency usage Conflicts:
Bluetooth radios operate in the unlicensed 2.4-GHz band. The problem that Bluetooth technology will face is that even at 2.4 GHz, the bandwidth is finite. Because this is an unlicensed band, any number of devices can use it. The 2.4 GHz frequency range used by Bluetooth is currently shared by other wireless communication standards such as 802.11b LANs, Home RF LANs, and urban and suburban wireless telecommunications systems. At some point, devices start interfering with one another.
Compliance concerns:
Other organizations, including the Federal Aviation Administration (FAA), are concerned about Bluetooth as well. The operating airline has the ultimate responsibility for approving Bluetooth, and testing by the SIG members (including Intel and Boeing) is currently in progress. Bluetooth technology uses the same bandwidth frequency that several local wireless technologies use, which could mean data collisions and lost data.
Impact of Bluetooth on pacemakers:
Currently, the only recommendation available is for cell phones. The Health Industry Manufacturers Association recommends that a minimum separation of 2.5 cm be maintained between a cell phone and a pacemaker.
Bluetooth on an airplane:
Like with your cell phone and pager, Bluetooth must be turned off in an airplane. Bluetooth like our cell phone and pager are radio devices and are prohibited by the airlines during flight to minimize the risk of interference with the airplane’s radio frequency equipment such as radar and radios.
POWER TRANSMITTED BY THE BLUETOOTH
There are three classes of radios, which are characterized by their output power.
Class 1 is specified to have a maximum transmit power of +20 dBm (100milli watts).
Class 2 has a maximum transit power of +4 dBm (2.5milli watts).
Class 3 has a maximum transmit power of 0 dBm (1milli watt).
USAGE MODELS
A usage model is a set of protocols that implement a particular Bluetooth-based application. Each profile defines the protocols and protocol features supporting a particular usage model.
 File transfer.
 Internet Bridge.
 LAN access.
 Synchronization Three-in-one phone.
 Headset.
FEATURES
1. Uses 2.4 GHz ISM frequency band.
2. Piconet supports up to eight connected devices where one acts as a master and all others act as slaves.
3. Public/Private key authentication and encryption are key elements of the Bluetooth standard.
4. The Bluetooth logo program is a key initiative within the Special Interest Group (SIG).
5. Does not require line of site between devices to establish a connection.
ADVANTAGES
1. Multiple piconets (scatter mode) are able to connect to each other via the master devices thus increasing the total number of connected devices beyond eight.
2. Limiting range to ten meters helps reduce power requirements making Bluetooth a practical technology by eliminating the hassle of proprietary cables for a broad range of battery operated devices like notebook computers and cellular phones.
3. Provides a degree of security for communications between Bluetooth devices.
4. The Bluetooth logo program will provide the industry with a mechanism to identify Bluetooth enabled devices that meet stringent compliance criteria and ensure seamless interoperability between devices and enhance overall ease-of-use and customer experience.
5. Provides greater flexibility and ease-of-use over wireless technologies like IrDA, which require a line of site between devices.
6. Allows connections to be established through barriers.
7. Qualification program ensures that products displaying the Bluetooth logo have been tested to meet stringent expectations for ease of use.
8. Tremendous momentum not only within the computer industry but other industries like cellular telephones and transportation.
DISADVANTAGES
1. Early stages of development make Bluetooth an immature technology that will need to prove itself.
2. Bluetooth shares the same frequency range as 802.11b Wireless LAN products (i.e. 2.4GHz) which mean that under some conditions these two technologies will not be able to operate in the same physical space.
SECURITY SERVICES FOR BLUETOOTH
The three basic security services defined by the Bluetooth specifications are the following:
1. Authentication—a goal of Bluetooth is the identity verification of communicating devices. This security service addresses the question “Do I know with whom I’m communicating?” This service provides an abort mechanism if a device cannot authenticate properly.
2. Confidentiality—Confidentiality, or privacy, is another security goal of Bluetooth. The intent is to prevent information compromise caused by eavesdropping (passive attack). This service, in general, addresses the question “Are only authorized devices allowed to view my data?”
3. Authorization—a third goal of Bluetooth is a security service developed to allow the control of resources. This service addresses the question “Has this device been authorized to use this service?”
SECURITY LEVELS OF BLUETOOTH
The security levels can be described as follows:
1. Service Level 1—those that requires authorization and authentication. Automatic access is granted only to trusted devices. Untrusted devices need manual authorization.
2. Service Level 2—those that require authentication only. Access to an application is allowed only after an authentication procedure. Authorization is not necessary.
3. Service Level 3—those that opens to all devices. Authentication is not required, and access is granted automatically.
ENCRYPTION MODES OF BLUETOOTH
The Bluetooth specification also allows three different encryption modes to support the confidentiality service:
1. Encryption Mode 1—No encryption is performed on any traffic.
2. Encryption Mode2—Broadcast traffic goes unprotected (not encrypted), but individually addressed traffic is encrypted according to the individual page link keys.
3. Encryption Mode 3—all traffic is encrypted according to the master page link key.
CONCLUSION
Bluetooth is a short-range wireless communication technology for ad-hoc communication between devices, each of which has a range of around 10m. Bluetooth-enabled consumer devices to enhance wireless connectivity among the array of devices that are anticipated are cellular phones, PDA s, notebook computers, modems, cordless phones, pagers, laptop computers, cameras, PC cards, fax machines, and printers. Bluetooth is now standardized within the IEEE 802.15 Personal Area Network (PAN) Working Group that formed in early 1999. Bluetooth also include vending machines, banking and other electronic payment systems, wireless office and conference rooms; smart homes, and in-vehicle communications and parking.

“EVERY THING WILL BE IN WIRELESS”.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: bluetooth technology cingular, bluetooth technology v 21, bluetooth technology, bluetooth technology tutorial, bluetooth technology seminar pdfproject, bluetooth technology seminar topics, seminar repors on bluetooth technology,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
BLUETOOTH TECHNOLOGY - by seminar class - 14-02-2011, 12:41 PM
RE: BLUETOOTH TECHNOLOGY - by seminar class - 22-04-2011, 11:21 AM
RE: BLUETOOTH TECHNOLOGY - by smart paper boy - 09-07-2011, 03:16 PM
RE: BLUETOOTH TECHNOLOGY - by smart paper boy - 25-08-2011, 10:50 AM
RE: BLUETOOTH TECHNOLOGY - by seminar addict - 02-02-2012, 10:24 AM
RE: BLUETOOTH TECHNOLOGY - by seminar addict - 07-02-2012, 02:02 PM

Possibly Related Threads...
Thread Author Replies Views Last Post
  5G technology dhanya1987 8 12,975 11-04-2016, 11:21 AM
Last Post: dhanabhagya
  FinFET Technology computer science crazy 13 11,746 10-03-2015, 04:38 PM
Last Post: seminar report asees
  Cellonics Technology computer science crazy 3 3,591 05-09-2014, 09:45 PM
Last Post: seminar report asees
  Latest Invention: Acoustic Ear-scanning Technology to Help Avoid Theft project report helper 10 8,795 20-08-2014, 09:02 PM
Last Post: preethikrishna
  RFID Technology computer science crazy 4 4,683 09-08-2014, 07:10 PM
Last Post: Guest
  Seminar Report On Optical Computing Technology mechanical wiki 3 6,198 27-07-2013, 12:41 PM
Last Post: computer topic
Question Sixth Sense Technology nitins60 43 76,645 22-06-2013, 10:46 AM
Last Post: Guest
  Blue Eyes Technology sprity 21 31,535 30-01-2013, 12:54 PM
Last Post: seminar details
  3G MOBILE COMMUNICATION TECHNOLOGY full report seminar presentation 22 31,538 29-01-2013, 11:06 AM
Last Post: seminar details
  Cellonics Technology computer science crazy 25 28,727 10-01-2013, 03:34 PM
Last Post: seminar details

Forum Jump: