You are on page 1of 45

Dianne Joy Roll no:13 S5 ,MCA B5

Introduction Operation Requirements

Versions

Security

Applications

Introduction Operation Requirements

Versions

Security

Applications

Bluetooth is a universal radio interface in 2.4 GHz frequency band that enables electronic devices to connect & communicate wirelessly via short range (10-100) ad-hoc n/ws. Key Features  Peak data rate  Low power consumption  Low cost  Ability to simultaneously handle both voice & data  Line of sight not required.

Invented in 1994 by L.M.Ericsson, Sweden.  Named after Harald Blaatand Bluetooth, King of Denmark 940-981 AD.  Currently Bluetooth trademark is owned by the Bluetooth SIG, a consortium of companies having stake in bluetooth.  More than 1900 members today.


 

Piconet is the fundamental form of communication for Bluetooth Wireless technology. Master & Slaves. The master Bluetooth device can communicate with upto 7 devices. Data can be transferred b/w the master & one other device. The master switches rapidly from device to another in a round-robin fashion.

Piconet 1
S P P S P M S P M SB S

Piconet 2

M-master S-Slave P-Parked SB-Standby

All devices in a piconet use the same frequencyhopping pattern

Two or more Piconets can be connected together to form a Scatternet.  Some devices act as a bridge by simultaneously playing the master role & the slave role in one piconet.  All devices in a piconet use the same frequency-hopping pattern


Application O B E X

TCP/IP PPP

AT Commands

RFCOMM L2CAP

TSC

SDP

HCI Audio Link Manager (LM) Baseband Bluetooth Radio

Bluetooth specification consists of a series of layers, implemented in h/w & s/w:


layer Baseband Link Manager Protocol(LMP) Host controller Logical Link Control and Adaptation Protocol (L2CAP). Application Protocol
Physical

 

A PC must have a bluetooth adapter to communicate with bluetooth devices Some contain an internal bluetooth adapter But most require an external USB bluetooth Dongle. Unlike IrDA, multiple Bluetooth devices can communicate with a computer over a single dongle.

The only versions of MS Windows tat have native support for BT are Windows XP Service Pack 2 and later Previous versions require the users to install their BT adapters own drivers (not directly supported by MS) Mac OS X has supported BT since version 10.2 released in 2002. Linux provides 2 BT stacks with BlueZ stack, Supporting all core BT protocols & layers

List of Applications
 

 

Wireless control of communication b/w a cell phone & a hands-free headset Wireless n/wing b/w PCs in a confined space Transfer of files b/w devices with OBEX For controls where IR was traditionally used 7th generation game consoles-Nintendo Wii ,Sony PlayStation3

Bluetooth 1.0 and 1.0B


Drawbacks:
in making it interoperable  Had mandatory h/w device add transmission  Rendering anonymity impossible at protocol level
 Difficulty

Bluetooth 1.1
Many errors found in 1.0B were fixed  Added support for non-encrypted channels  Received Signal Strength Indicator (RSSI)


Bluetooth 1.2
Backward compatible with 1.1  Faster connection and discovery  Improved resistance to Radio Frequency interference  Higher transmission speeds  Improved voice quality of audio links by allowing retransmission of corrupted pages  Host Controller Interface support.


Bluetooth 2.0
Specified in November 2004  Backward compatible with version 1.1  Introduction of Enhanced Data Rate (EDR) of 3.0 Mbits/s  3 times faster transmission speed  Lower power conception thru a reduced duty cycle  More available b/w  Further improved performance


Bluetooth 2.1
Will be adopted by BT SIG once interoperability testing has completed  Extended inquiry response  Encryption Pause Resume  Secure Simple Pairing  NFC(Near Field Communication) Cooperation


Broadcast channel  Topology Management  QoS (Quality of Service)




Since BT works with shortrange radio waves security is one of the most important concerns, as anyone in a specific range has access to your device.

Illegally accessing info: on other peoples computer systems without destroying or disrupting data or resources on n/w or CSs.  Simple broadcasting method to complex algorithms.


Bluejacking :
 

Sending Business cards anonymously. Most common & simplest form of phonehacking. Sounds harmless but can be nasty.

Tips to avoid bluejacking:  Never add funny sounding message from unknown sources to your contacts  Set your BT phone on non-discoverable mode when not in use.

Bluesnarfing


  

Theft of info from a wireless device like access to calendar, contact list etc. Advanced versions can even alter files. More dangerous Blooyer is a pgm used for bluesnarffing.

Tips:
Be in non-discoverable mode  Check if required firmware updates have been installed.


Bluebugging
Accessing the phone commands without alerting the phones user. The hacker can  Initiate phone calls  Send & read SMS  Read & write phone book contacts  Eavesdrop on phone conversations  Connect to internet

Bluesnipper


Uses a gun-like high power antenna that boosts the range of BT Can hack a device that is placed even a mile away Cabir worm, released in 2004 can bluejack nearby phones.

The pen has a digital sensor that can track the movement over tiny dots printed on the digital paper. Being Bluetooth enabled, this pen can transmit what you are writing directly to a computer or a cell phone and either store it as a file or send it off as an text message or email.

Write a mail in your own handwriting and get it transferred to your cell phone or PC Has got an internal memory of 1MB (approximately 40 pages of A4 size), Enable to write up to approximately 2 hours continuously. 38 grams Since it all works digitally, you can add colors and sketches to your notes


Key features
Natural use of pen and paper Wireless connection to compatible phones using BT tech: Send your personalized note or drawing Store your personal notes on a compatible PC runs on a polymer lithium ion battery, with a 10-hour standby time. The only drawback is that you need to have a special paper on which to write on.


Nokia BT pen

BlueTooth Helmet
 

Enable conversation while riding It is possible to adjust both the microphone as well as ear piece for maximum comfort. The sound of the ring tone is extremely clear inside the helmet Absolute voice clarity and no static is possible when you are not moving. As the bike picks up speed an element of static does get introduced but its not noticeable. The voice quality did not deteriorate and he found it easy to keep talking. The headset does not support the A2DP specification which would allow the user to listen to music.

 

The earphone is meant for a single ear only The helmet comes in only one standard size, the inside width of which is 12 centimeters. So if you are slightly larger then average then you may find it difficult to get your head into one The Bluetooth headset can be separated from the helmet and be used without it as well

BlueTooth Jacket

Wearable Technology

Features
Control panel to play music, answer calls & check your caller id. Stereo speakers that rock. Built-in hands free mic plus concealed jack for listening privacy. Rechargeable pocket battery pack. When it is time to clean the jacket just remove the electronics. Costs range from $600.


At the center of the jacket is a control panel located on the left-hand sleeve, allowing for simple and easy access to your incoming and outgoing calls, and music selections. Connect a compatible Bluetooth-enabled mobile phone to the panel wirelessly, while hooking up your iPod player via hidden, unobtrusive wires within the jacket. Speakers and a microphone are located in the hood for taking and making calls as well as listening to music.

BT watch
 

 

More than a watch. Second generation formal watch phone that comes with handwritten touch screen and BT Music Beautifully designed and also has MP4 Video functionality with 60 MB inbuilt memory this makes it looks giant The Bluetooth logo is clearly visible on the watch and there is also a mini USB.

You can control the cell phone's music player from the button on the watch.

You might also like