slide1
Download
Skip this Video
Download Presentation
Bluetooth

Loading in 2 Seconds...

play fullscreen
1 / 11

Bluetooth - PowerPoint PPT Presentation


  • 70 Views
  • Uploaded on

Submitted to: Doctor : Rabie Ramadan Submitted by: Khaled Mohammed Ali Hassan Master’s Student, Cairo University/20 11. Bluetooth. BlueTooth- Some Specifications. Uses unlicensed 2.402 - 2.480 GHz frequency range Frequency hopping spread spectrum 79 hops separated by 1 MHz

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about ' Bluetooth' - hedda-farrell


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
slide1
Submitted to:

Doctor : Rabie Ramadan

Submitted by:

Khaled Mohammed Ali Hassan

Master’s Student, Cairo University/2011

Bluetooth
bluetooth some specifications
BlueTooth- Some Specifications
  • Uses unlicensed 2.402 - 2.480 GHz frequency range
  • Frequency hopping spread spectrum 79 hops separated by 1 MHz
  • Maximum frequency hopping rate: 1600 hops/sec
  • Nominal range: 10 cm to 10 meters
  • Nominal antenna power: 0 dBm
  • One complete Bluetooth data packet can be transmitted within each 625 msec hop slot
bluetooth protocol stack
Bluetooth Protocol Stack
  • Adopted Protocols
    • PPP(Point-To-Point Protocol)
    • TCP/UDP/IP
    • OBEX-Session Protocol for IrDA(Infrared Data Association)
    • Contents Fromat(e.g. vCard, vCalendar)
    • WAP-Wireless Application Protocol
bluetooth security
Bluetooth Security
  • Supports Unidirectional or Mutual Encryption based on a Secret Link key Shared Between Two Devices
  • Security Defined In 3 modes:
    • Mode1- No Security
    • Mode 2 - Service Level Security: Not Established Before Channel is Established at L2CAP
    • Mode 3 - Link Level Security: Device Initiates Security Before LMP Link is Setup
bluetooth security1
Bluetooth Security
  • Devices and Services can be Set for Different Levels of Security
    • Two Trust Levels are Set for Devices
      • Trusted Device: Fixed Relationship and Unrestricted Access to All Services
      • Untrusted : No Permanent relationship and Restricted Services
bluetooth security2
Bluetooth Security
  • 3 Levels of Service Access
    • Require Authorization and Authenication
    • Require Authentication Only
    • Default Security for Legacy Applications
the challenges
The Challenges
  • Future work is aimed to develop and design a blue tooth-enabled data concentrator for data acquisition and analysis.
conclusion
CONCLUSION
  • Blue tooth represents a great chance for sensor-networked architecture. This architecture heralds wireless future for home and also for industrial implementation. With a blue tooth RF link, users only need to bring the devices with in range, and the devices will automatically link up and exchange information.
  • Thus implementation of blue tooth technology for sensor networks not only cuts wiring cost but also integrates the industrial environment to smarter environment.
conclusion1
CONCLUSION
  • Today, with a broader specifications and a renewed concentration on interoperability, manufacturers are ready to forge ahead and take blue tooth products to the market place. Embedded design can incorporate the blue tooth wireless technology into a range of new products to meet the growing demand for connected information appliances.
ad