Short blutooth present

20
Bluetooth 1

description

This topic of Bluetooth presentation is very useful in many communications.it can be very helpfull in various kind,just check it out you can get an idea

Transcript of Short blutooth present

Page 1: Short blutooth present

1

Bluetooth

Page 2: Short blutooth present

Bluetooth is a packet based protocol with a master slave structure . One master may communicate with up to 7 slaves.

In Bluetooth technology ,the device which sends the data is called as MASTER. Where as the devices that receive the data is called as SLAVE.

Page 3: Short blutooth present
Page 4: Short blutooth present

4

BlueTooth- Some Specifications Uses unlicensed 2.402 - 2.480 GHz frequency range. Frequency hopping spread spectrum 79 hops separated

by 1 MHz. Maximum frequency hopping rate: 1600 hops/sec. Nominal range: 10 cm to 10 meters. Nominal antenna power: 0 dBm. One complete Bluetooth data packet can be transmitted

within each 625 msec hop slot.

Page 5: Short blutooth present

5

Potential Bluetooth Markets

Page 6: Short blutooth present
Page 7: Short blutooth present
Page 8: Short blutooth present
Page 9: Short blutooth present

9

Bluetooth Market Forecast

Nov’03: 100M Bluetooth compliant devices worldwide

Page 10: Short blutooth present
Page 11: Short blutooth present

11

Bluetooth Protocol StackAdopted Protocols

PPP(Point-To-Point Protocol)TCP/UDP/IPOBEX-Session Protocol for IrDA(Infrared Data

Association)Contents Format(e.g. vCard, vCalendar)WAP-Wireless Application Protocol

Page 12: Short blutooth present
Page 13: Short blutooth present

13

Bluetooth SecuritySupports Unidirectional or Mutual Encryption based

on a Secret Link key Shared Between Two Devices.Security Defined In 3 modes:

Mode1- No Security.Mode 2 - Service Level Security: Not Established

Before Channel is Established at L2CAP.Mode 3 - Link Level Security: Device Initiates

Security Before LMP Link is Setup.

Page 14: Short blutooth present

• Devices and Services can be Set for Different Levels of Security

Two Trust Levels are Set for Devices:Trusted Device : Fixed Relationship and

Unrestricted Access to All Services.Untrusted : No Permanent relationship and

Restricted Services.

Page 15: Short blutooth present
Page 16: Short blutooth present

16

Bluetooth Security3 Levels of Service Access

Require Authorization and Authentication.Require Authentication Only.Default Security for Legacy Applications.

Page 17: Short blutooth present
Page 18: Short blutooth present

18

But is this Wireless Link Secure?

Newsflash: Jan 2001: Norwegian “hackers” crack a Bluetooth transmissionNewsflash: Jan 2001: Norwegian “hackers” crack a Bluetooth transmission

Page 19: Short blutooth present

Bluetooth vs. the Rest (cont’d)

19

802.112.4 GHz, DSSS11 chips/bit11Mbps+20 dBm50m128 devicesCSMA/CAOptional WEPOptional

HomeRF2.4GHz, FHSS50 hops/s1 Mbps+20 dBm50m128 devicesCSMA/CAOptionalOptional

Bluetooth2.4 GHz, FHSS1000+hops/s1Mbps0, +20dBm1-10m, 50m8 devices, PiconetEncryptionYes

ParameterTechnology

Data RatePowerRangeTopology

SecurityVoice Channel

ZigBee (proposed)2.4 GHz,DSSS15 chips/bit40 kbits/s0dBm100m100s devices, CSMA/CANot yetNo

Bluetooth – aka IEEE 802.15.1

Zig Bee – aka IEEE 802.15.4

Page 20: Short blutooth present