Submitted to:
This presentation is the property of its rightful owner.
Sponsored Links
1 / 11

Bluetooth PowerPoint PPT Presentation


  • 57 Views
  • Uploaded on
  • Presentation posted in: General

Submitted to: Doctor : Rabie Ramadan Submitted by: Khaled Mohammed Ali Hassan Master’s Student, Cairo University/20 11. Bluetooth. BlueTooth- Some Specifications. Uses unlicensed 2.402 - 2.480 GHz frequency range Frequency hopping spread spectrum 79 hops separated by 1 MHz

Download Presentation

Bluetooth

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


Bluetooth

Submitted to:

Doctor : Rabie Ramadan

Submitted by:

Khaled Mohammed Ali Hassan

Master’s Student, Cairo University/2011

Bluetooth


Bluetooth some specifications

BlueTooth- Some Specifications

  • Uses unlicensed 2.402 - 2.480 GHz frequency range

  • Frequency hopping spread spectrum 79 hops separated by 1 MHz

  • Maximum frequency hopping rate: 1600 hops/sec

  • Nominal range: 10 cm to 10 meters

  • Nominal antenna power: 0 dBm

  • One complete Bluetooth data packet can be transmitted within each 625 msec hop slot


Potential bluetooth markets

Potential Bluetooth Markets


Bluetooth protocol stack

Bluetooth Protocol Stack

  • Adopted Protocols

    • PPP(Point-To-Point Protocol)

    • TCP/UDP/IP

    • OBEX-Session Protocol for IrDA(Infrared Data Association)

    • Contents Fromat(e.g. vCard, vCalendar)

    • WAP-Wireless Application Protocol


Bluetooth protocol stack1

Bluetooth Protocol Stack


Bluetooth security

Bluetooth Security

  • Supports Unidirectional or Mutual Encryption based on a Secret Link key Shared Between Two Devices

  • Security Defined In 3 modes:

    • Mode1- No Security

    • Mode 2 - Service Level Security: Not Established Before Channel is Established at L2CAP

    • Mode 3 - Link Level Security: Device Initiates Security Before LMP Link is Setup


Bluetooth security1

Bluetooth Security

  • Devices and Services can be Set for Different Levels of Security

    • Two Trust Levels are Set for Devices

      • Trusted Device: Fixed Relationship and Unrestricted Access to All Services

      • Untrusted : No Permanent relationship and Restricted Services


Bluetooth security2

Bluetooth Security

  • 3 Levels of Service Access

    • Require Authorization and Authenication

    • Require Authentication Only

    • Default Security for Legacy Applications


The challenges

The Challenges

  • Future work is aimed to develop and design a blue tooth-enabled data concentrator for data acquisition and analysis.


Conclusion

CONCLUSION

  • Blue tooth represents a great chance for sensor-networked architecture. This architecture heralds wireless future for home and also for industrial implementation. With a blue tooth RF link, users only need to bring the devices with in range, and the devices will automatically link up and exchange information.

  • Thus implementation of blue tooth technology for sensor networks not only cuts wiring cost but also integrates the industrial environment to smarter environment.


Conclusion1

CONCLUSION

  • Today, with a broader specifications and a renewed concentration on interoperability, manufacturers are ready to forge ahead and take blue tooth products to the market place. Embedded design can incorporate the blue tooth wireless technology into a range of new products to meet the growing demand for connected information appliances.


  • Login