1 / 11

Bluetooth

Submitted to: Doctor : Rabie Ramadan Submitted by: Khaled Mohammed Ali Hassan Master’s Student, Cairo University/20 11. Bluetooth. BlueTooth- Some Specifications. Uses unlicensed 2.402 - 2.480 GHz frequency range Frequency hopping spread spectrum 79 hops separated by 1 MHz

Download Presentation

Bluetooth

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Submitted to: Doctor : Rabie Ramadan Submitted by: Khaled Mohammed Ali Hassan Master’s Student, Cairo University/2011 Bluetooth

  2. BlueTooth- Some Specifications • Uses unlicensed 2.402 - 2.480 GHz frequency range • Frequency hopping spread spectrum 79 hops separated by 1 MHz • Maximum frequency hopping rate: 1600 hops/sec • Nominal range: 10 cm to 10 meters • Nominal antenna power: 0 dBm • One complete Bluetooth data packet can be transmitted within each 625 msec hop slot

  3. Potential Bluetooth Markets

  4. Bluetooth Protocol Stack • Adopted Protocols • PPP(Point-To-Point Protocol) • TCP/UDP/IP • OBEX-Session Protocol for IrDA(Infrared Data Association) • Contents Fromat(e.g. vCard, vCalendar) • WAP-Wireless Application Protocol

  5. Bluetooth Protocol Stack

  6. Bluetooth Security • Supports Unidirectional or Mutual Encryption based on a Secret Link key Shared Between Two Devices • Security Defined In 3 modes: • Mode1- No Security • Mode 2 - Service Level Security: Not Established Before Channel is Established at L2CAP • Mode 3 - Link Level Security: Device Initiates Security Before LMP Link is Setup

  7. Bluetooth Security • Devices and Services can be Set for Different Levels of Security • Two Trust Levels are Set for Devices • Trusted Device: Fixed Relationship and Unrestricted Access to All Services • Untrusted : No Permanent relationship and Restricted Services

  8. Bluetooth Security • 3 Levels of Service Access • Require Authorization and Authenication • Require Authentication Only • Default Security for Legacy Applications

  9. The Challenges • Future work is aimed to develop and design a blue tooth-enabled data concentrator for data acquisition and analysis.

  10. CONCLUSION • Blue tooth represents a great chance for sensor-networked architecture. This architecture heralds wireless future for home and also for industrial implementation. With a blue tooth RF link, users only need to bring the devices with in range, and the devices will automatically link up and exchange information. • Thus implementation of blue tooth technology for sensor networks not only cuts wiring cost but also integrates the industrial environment to smarter environment.

  11. CONCLUSION • Today, with a broader specifications and a renewed concentration on interoperability, manufacturers are ready to forge ahead and take blue tooth products to the market place. Embedded design can incorporate the blue tooth wireless technology into a range of new products to meet the growing demand for connected information appliances.

More Related