You are on page 1of 20

Bluetooth

Submitted by:
Mohammad
adil

Submitted To:
Mrs.Anita
Chopra

Introduction
What is Bluetooth?
What does it do?
History of Bluetooth

Introduction (contd)
Is Bluetooth here to stay?
What should we expect from
Bluetooth in the future?

What Bluetooth Delivers to


the end-user
Connects a wide range of computing
and telecommunication devices

Expand communication capabilities


Devices can communicate with each
other with wireless connectivity

User Application

Car manufactures Industry

E-Mail / Internet / Intranet Access


Headsets
Bluetooth will facilitate Local Area
Networks

Bluetooth in Action
In the house

In the Office ...

Source: http//:www.motorola.com

Home Security

On the Road

Source: http//:www.motorola.com

On your Car

Source: http//:www.motorola.com

Bluetooth Specifications
Things that you must have:
Transceivers and Receivers that can send and
receive data because they use Radio
Waves.
MAC Address (Physical Address)
Burnt on the NIC card by the manufacturer.
PIN Number
To identify the user using the device.
A Piconet
A FHHS protocol

What is a Piconet?
A Piconet session is a communication
link that must be created between
devices for devices to communicate
with each other.

This is done when the MAC address


and the PIN number match.

Piconet (cont.)
If two devices come onto contact with each other( 32
feet) the user will be prompted to initiate a
communication session

Users then can either deny or accept the request to


initiate a session

Only devices approved by the user can take part in the


session

Data will appear as noise to unauthorized devices


great security feature).

(A

FHHS
Bluetooth devices use a protocol called (FHHS) FrequencyHopping Spread Spectrum .

Uses packet-switching to send data.


Bluetooth sends packets of data on a range of frequencies.
In each session one device is a master and the others are
slaves.

The master device decides at which frequency data will


travel.

FHHS
Transceivers hop among 79 different

frequencies in the 2.4 GHz baud at a rate of


1600 frequency hops per second.

The master device tells the slaves at what


frequency data will be sent.

This technique allows devices to

communicate with each other more securely.

FHHS Example

Source: http://www.xircom.com

Bluetooth Security
Modes
Security Mode 1
No Security
Security Mode 2
Service Level Enforced Security
Implemented after channel is established
Security Mode 3
Link Level Enforced Security
Implemented before channel is established

Devices
Trusted
No Restrictions

Untrusted
Restrictions, Access is limited

Service Levels
Authorization and Authentication
Authentication Only
Open to all Devices

Advantages of Bluetooth
Technology

It is cheap
Easy to install
It makes connecting to different
devices convenient
It is wireless
It is free to use if the device is
installed with it condition

Disadvantages of
Bluetooth Technology
It can be hacked into
If installed on a cellphone it is prone to

receiving cell phone viruses


It only allows short range
communication between devices
It can only connect two devices at once
It can lose connection in certain
condition

THANK YOU

You might also like