Faruk Seminar Repot

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 28

lOMoARcPSD|34866583

Shree Ambabai Talim Sanstha’s


Sanjay Bhokare Group of Institute, Miraj

Department Of Computer Engineering

A SEMINAR REPORT ON
WIRELESS NETWORKED DIGITAL DEVICES

PREPARED BY
Roll no. PRN No. Name
2007 2266441245026 FARUK ILAHI GOUNDI

UNDER GUIDANCE OF

Mrs. A. J. Sawakhande.

*Academic Year 2023-2024*


lOMoARcPSD|34866583

Certificate
This is to certify that the following student of S.Y. Computer Engineering have
successfully completed the report entitled “WIRELESS NETWORKED DIGITAL
DEVICES” in the partial fulfillment of degree in the Computer Engineering, of “Dr.
BATU, Lonere” during academic year 2023-2024.

Place: Miraj. Date:

Mrs. A.J.Sawakhande Mr. C.G. Pawar-Kokane


Seminar Guide HOD
(Comp.Eng.Dept.)

Acknowledgement

It gives us great pleasure while presenting this project report on “WIRELESS NETWORKED
DIGITAL DEVICES”. We are indeed grateful to H.O.D of our Computer Engineering department
lOMoARcPSD|34866583

Prof. C. G. Kokane-Pawar for being an effective source of inspirations. A sense of prevailing


satisfaction and achievement envelopes the whole feeling of having completed the paper work under
the guidance of Mrs. A. J. Sawakhande We wish to express our respect, deep sense of gratitude
regard to him for this valuable guidance, keen interest and co-operation without which it would have
been impossible to accomplish this project successfully. It was indeed great experience to work under
his guidance.

Place: Miraj

Date:
lOMoARcPSD|34866583

Index
No. Topics Page no.
1 WHAT WIRLESS NETWORKD DIGITAL DEVICES IS
?
2 WIRELESS REVOLUTION
3 ADVANTAGES
4 DISADVANTAGES
5 TYPE OF WIRLESS NETWORK
6 CELLULAR NETWORK STANDARDS
7 CELLULAR GENERATION
8 WI-FI
9 RFID
10 A BLUETOOTH NETWORK
11 WHAT IS CONCLUSION
12 BIBLIOGRAPHY
lOMoARcPSD|34866583

WHAT IS WIRELESS NETWORK DIGITAL DEVICES:

By. In Wireless Network Digital Devices, mobile computing devices with personal
digital assistants, laptops, and wearable computers they all are created a demand for
Personal Area Networks (PANs). They allow devices to share the information.

The Wireless network which helps us to create a wireless data connection from connects with
the network nodes. By using this method, we can easily avoid or neglect the heavy and costly
bills. These devices have unique requirements on personal area networks such as
international regulation and low consumption of power.

In the prediction of 10 years Jean Paul Jacob who observes that the effect of such
communication technology is continuously under appreciated.
There are such situations where it is quite difficult to handle the computers network.

Wireless Network Digital Device plays an important role with the homeowners. It becomes
effective when it set up a connection or network with home. It also gives an effective result
with sharing printers, high- speed internet connection, and scanners. They are simple in
nature as they only require at least one connection or network to develop a connection in the
area. It connects directly to the internet with the help of its router.

Personal Area Networks connect mobile devices, which are carried by users to other
phones. Their range of communication is scaled to know the exact distance between the
voices. This distance of voices coincides with the battery capacity of portable devices that
are small. Wireless Personal Area Network communication can occur over magnetic,
optical and electric channels.

The network allows computers or such devices to share the information and resources. To
handle the computers is not an easy task. For computers, there must be a physical means
of connectivity to connect with such computers so that they can know the information.
This also allows data to flow from one machine to another.
Communication needs to have compatibility so that it becomes more challenging in the
market. To make the communication more powerful and useful, all the manufacture start
to
establish and implement the devices to be compatible. Digital devices are living in a
digital
lOMoARcPSD|34866583

world with more compatibility.


lOMoARcPSD|34866583

WIRELESS REVOLUTION

Connectivity, The Wireless Revolution, and Communication Systems

▪ Computer communications is the process of sharing data, programs, and


information between two or more computers.
▪ Connectivity is a concept related to using computer networks to link people and
resources
▪ Mobile telephone and Bluetooth are technologies of wireless revolution.
▪ Communication systems transmit data.

Connectivity

▪ Connectivity is a concept related to using computer networks to link people and


resources
▪ You can use telephone or other telecommunication lines to link to nearly any
computer in the world.

Wireless The Revolution

▪ The single most dramatic change in connectivity and communications in the past five
years has been the widespread use of mobile or wireless telephones.
▪ In 2002, it was estimated that there are over 600 million mobile telephones in use
worldwide, and by 2004, almost 1.5 billion.
▪ This wireless technology allows individuals to stay connected with one another from
almost anywhere at any time.
▪ Originally developed for voice, the wireless revolution can transmit nearly any kind
of information.
▪ Bluetooth: a technology that allows wide variety of nearby devices to
communicate with one other without any physical connection.

Communications systems

▪ Communications systems are electronic systems that transmit data from one
location to another. It has four basic elements:
lOMoARcPSD|34866583

Sending and receiving devices

▪ Often a computer or specialized communications device. They send as well as


accept messages in form of data, information, and/or instructions.

Communication channel (aka transmission medium)

▪ The actual connection that carries the message


▪ Can be a physical wire, or cable or a wireless connection

Connection device (aka communications device)

▪ Act as an interface between the sending and receiving devices and the
communication channel. They convert outgoing messages into a form and format
(digital) so that they can travel across the communication channel, and back again at
the receiving (incoming) end.

Data transmission specifications

▪ The rules and procedures that coordinate the sending and receiving devices by
precisely defining how the message will be sent across the communication channel.
lOMoARcPSD|34866583

ADVANTAGES:
Increased efficiency. Improved data communications lead to faster transfer of information within
businesses and between partners and customers. ...
Access and availability...
Availability measures the extent to which the provider has the requisite resources, such as
personnel and technology, to meet the needs of the client. Accessibility refers to geographic
accessibility, which is determined by how easily the client can physically reach the provider's
location.
Flexibility…
Setting up a wireless network helps the user to do work from home easily. Due to this
network, users can work more productively and also have accessibility to customer data.
Efficiency: Wireless networks allow improved and better communication of data.
Cost savings...
Cost savings is the benefit realized from actions that reduce an organization's overall
spending on assets that directly impact its bottom line. Actions that can result in cost
savings range from improving efficiency to negotiating lower prices for supply purchases.
New opportunities...
• Wireless networking in the '80s meant I would copy a file onto a floppy
• disk, take it out of the drive, and carry it across the office. No
• wires were involved.
• The need for wireless LANs has always been there, the technology has
• only really evolved over the past year or so. It's ideal for
• conferences and temporary venues, for example, where a network may have
• to be set up and taken down a week later. It's also quite useful in
• circumstances where physical cabling is difficult or impossible.
• But with the advances in wireless networking equipment, one must ask
• the question, "Who will run it?" The answer is, perhaps, you will.
Security. ...
Whether you’re protecting your home, or looking for business security systems in Michigan, we all
sleep easier knowing we’re protecting what’s important to us. But as with everything else in life,
there’s a catch: a system that doesn’t cover all the fundamentals is fundamentally flawed, so if you’re
shopping for a new security system, don’t just browse on price. Look into the installation, design,
monitoring, and key features like the way that system communicates with its owner and the outside
world. We find that wireless security systems from Vigilante Security offer a number of advantages to
their owners.
lOMoARcPSD|34866583

Installation problems…Common Wireless Network Issues

• Connectivity issues. It can be maddening when you find that you can't connect to your
wireless network. ...
• Security issues. When you transmit sensitive information over wireless
networks, it automatically becomes more vulnerable. ...
• Network Expansion issues. ...
• Access Point issues.
Coverage…
Wireless network coverage is defined as the extent of the area to which the
wireless signals are transmitted. Let's compare this to sound energy. The further
away you are from the source, the less audible the sound becomes.
lOMoARcPSD|34866583

DISADVANTAGES
Security
Utilizing wireless networks raises serious security concerns. An improperly
installed or managed wireless network could pose serious security risks. A wireless
network does not require physical connections like wires. They merely require a
wireless adaptor, which raises the risk of hacking because hackers may easily enter
the network. A worsening of the situation may occur if the network has password
protection.
Speed
The wireless network's speed is less rapid than that of wired networks. In a
wireless network, file transfers and file sharing are much slower. The location of
the user on the network affects performance as well. The connection degrades more
rapidly the further the user is away from the network. For vast areas or buildings,
this is a major issue.
Prone to Interference
There is a high chance of interference and jamming in wireless networks because
of environmental variables like dust storms or fog. When too many users are in
one area, the air band that the signals are transported

across can become overloaded. A wireless network could become unreliable due to
fog, radiation, radio waves, or any other type of interference since wireless networks
are particularly prone to interference.

Requires Basic Computer Knowledge


A basic understanding of computers is necessary to set up a wireless network.
Installing a wireless network might be difficult for people with little computer
skills. Security is risky, and those networks are easy targets for hackers.
lOMoARcPSD|34866583

TYPES OF WIRELESS NETWORK

Satellite Communication

Satellite communication is a type of self-contained wireless technology widely


utilized globally to allow users to remain connected virtually anywhere on the earth.
The space and ground segments are the two key components of satellite
communication. The main element of the space segment is the satellite itself,
whereas the ground element consists of fixed or mobile transmission, reception, and
support equipment. The antenna receiver is located on the earth's surface and
receives the signal when the satellite is close by, amplifying it and sending it back (a
modulated microwave beam).

INFRARED COMMUNICATION
Electromagnetic energy with a wavelength longer than red light is known as
infrared energy (IR). Infrared radiation is used in wireless infrared communication
to send data inside a system or device. It is employed for short-range
communications, TV remote control, and security control. IR radiation lies between
microwaves and visible light in the electromagnetic spectrum. They can therefore
be a means of communication

BROADCAST REDIO
Open radio communication was the first wireless technology to seek general
adoption, and it still has applications today. Portable multichannel radios enable
users to communicate over short distances, whereas maritime and citizen's band
radios serve as a means of communication for sailors. During emergencies, ham
radio enthusiasts use emergency communication aids and disseminate information
using their powerful broadcasting equipment. They can even transmit digital data
across radio waves.

WI-FI
Wireless portability is made possible by the widespread use of Wi-Fi in networking
applications. Smartphones, computers, and other electronic devices use Wi-Fi, a
low-power wireless communication technology. In this system, a router serves as a
lOMoARcPSD|34866583

wireless communication hub. Users of these networks can connect only if they are
close to a router. These networks need password-protected for security reasons;
otherwise, others can access them.

Mobile Communication Systems


Mobile network development is broken down into generations. Many people use
mobile phones to communicate over a single-frequency band. Two examples of
gadgets that employ wireless transmissions are cellular and cordless phones. Cell
phones typically have a wider variety of networks to offer coverage. But the range
of cordless phones is constrained. Some phones use satellite signals to
communicate, much like GPS units do.

Bluetooth Technology
Bluetooth technology's main goal is to make it possible for systems and various
electrical devices to transport data wirelessly. Using wireless keyboards, mice, and
hands-free headphones is possible with mobile devices. When Bluetooth connects
two devices, data can be transmitted between them. The wireless communication
sector makes extensive use of this technology for a variety of functions.

Global Positioning System (GPS)


Global positioning systems, or GPS, are a type of satellite communication. Different
wireless services, including speed, location, navigation, placement using satellites, and
GPS receivers, are provided by this type of technology to assist.
lOMoARcPSD|34866583

CELLULAR NETWORK STANDARDS

We rely on cellular networks to provide most of our mobile communications, these days. We
use our mobile phones and mobile devices to communicate over these separate cells of
communication. We have antennas that can converge the data within these cells so that you
can move from cell to cell and still maintain communication wherever you happen to be. In
the early days of cellular networking there were two primary standards that you would see.
One is GSM– which is the Global System for Mobile communications– and the other was
CDMA– or Code Division Multiple Access. These were really designed for voice
communication.
There is limited data functionality. It used circuit switching to be able to set up a call, send
data, and it had to emulate that same circuit switching to be able to send data. To be able to
perform some type of data or packet switching we needed newer standards that would
support these newer ways to communicate.

Let’s start by looking at GSM– the Global System for Mobile communications. This had
about a 90% coverage in the market. And that’s because it was a standard almost
everywhere in the world. In the United States, AT&T and T-Mobile were big providers of
the GSM standard. This also allowed you to take a SIM card out of one phone and move it
to another phone. So anytime you needed to change telephones you could simply move
your SIM card from phone to phone. This original GSM standard uses a multiplexing called
TDMA to be able to communicate where everyone on a particular frequency gets a little
slice of time to be able to complete that communication.

Here’s how Time Division Multiple Access– or TDMA– multiplexing works. You would
have multiple streams. You can see each of these phones on the left side communicating over
a blue, a red, and a purple communication. The multiplexer blends those together and gives
everybody a certain timestamp that’s available to them. On the other side that signal is
demultiplexed and you would break out the blue, the red, and the purple stream so that they
can be sent to their normal destinations.

The other standard of the time was CDMA. This is the Code Division Multiple Access which
uses a different method of multiplexing this data. With CDMA everyone’s communicating
over the same frequencies but each call is using a different code and the phone on the other
end is filtering out all of the information that it doesn’t need to hear. This was a standard
commonly used by Verizon and Sprint and all of those handsets were controlled by that
lOMoARcPSD|34866583

network provider. In the United States there wasn’t much adoption outside of Verizon and
Sprint for CDMA. These days, most mobile phone providers have moved towards what they
call 4G– or the Fourth Generation– of Long term Evolution communication– or LTE. This is
a converged standard so we no longer have to worry about a provider giving us a GSM or a
CDMA phone. This is based on the GSM and EDGE– which is Enhanced Data Rates for
GSM Evolution– and it finally allows us to completely and seamlessly communicate with
voice and data simultaneously over the same network. The original LTE standard supported
download data rates up to 150 megabits per second and the latest version of LTE– LTE
Advanced– has doubled that to support download speeds of up to 300 megabits per second.
lOMoARcPSD|34866583

CELLULAR GENERATIONS:
Introduced in the late 1970s, the first cellular systems were analog voice. Years later,
some 1G cellphones occasionally provided wireless data service to a laptop by
connecting them to the laptop's dial-up modem, but hookups were precarious and
the data transfer rate was minuscule. See AMPS, TACS and NMT.
lOMoARcPSD|34866583

WI-FI
What is a Wi-Fi network?

A Wi-Fi network is simply an internet connection that’s shared with multiple devices in a
home or business via a wireless router. The router is connected directly to your internet
modem and acts as a hub to broadcast the internet signal to all your Wi-Fi enabled devices.
This gives you flexibility to stay connected to the internet as long as you’re within your
network coverage area.

What does Wi-Fi stand for?

The term was created by a marketing firm because the wireless industry was looking for a
user-friendly name to refer to some not so user-friendly technology known
as IEEE 802.11 and the name stuck. Wi-Fi, often referred to as WiFi, wifi, wi-fi or wi fi, is
often thought to be short for Wireless Fidelity and the organization that paid for the
marketing firm is sometimes referred to as the Wireless Fidelity Alliance Inc.

How does Wi-Fi work?

Wi-Fi uses radio waves to transmit data from your wireless router to your Wi-Fi enabled
devices like your TV, smartphone, tablet and computer. Because they communicate with
each other over airwaves, your devices and personal information can become vulnerable to
hackers, cyber-attacks and other threats. This is especially true when you connect to a
public Wi-Fi network at places like a coffee shop or airport. When possible, it’s best to
connect to a wireless network that is password-protected or a personal hotspot.

Types of Wi-Fi connections

Your options for connecting wirelessly at home are growing as mobile networks expand into
the home internet realm. As with internet service, there are advantages and disadvantages to
each type of wireless connection, such as speed and strength of signal. We’ve outlined a few
of them here.

Wireline/router
Most homes use a wireless router to access the internet these days. The pros include convenience
of setup, mobility within range of the Wi-Fi access point (router) and the ability to connect
multiple devices. The cons: limited bandwidth and reduced speed as more devices are connected
to the same Wi-Fi network, as well as potential interference from other electromagnetic devices
lOMoARcPSD|34866583

in the home.

Mobile hotspot or jetpack

Mobile and dedicated hotspots are becoming a more popular way of connecting safely on the
go. Two common hotspot devices are your smartphone and a jetpack. Most any smartphone
or tablet today can be used as a temporary hotspot and is a great option if you occasionally
need it. It’s easy to use and doesn’t require buying extra devices, but it can zap your battery
life and data pretty fast. On the other hand, a jetpack acts as a dedicated mobile hotspot that
picks up a signal from cell towers in your area just like your smartphone. More devices can
connect to it and it offers a greater range of Wi-Fi. And because it’s a separate device, your
smartphone battery power doesn’t get touched. The downfall is having to buy the jetpack
and a separate plan.

LTE Home Internet

If you live in a rural area where your internet options are limited, 4G LTE Home Internet is
worth considering. It offers high speed internet service delivered over cell phone towers and
mobile networks with average download speeds around 25 Mbps. The advantages of LTE
over satellite are better speeds and reliability depending on your carrier

5G Home Internet

5G Home Internet (Fixed Wireless Access) is now in more places around the country.* Even
with multiple devices connected, it’s reliable and fast enough to power your whole home.
Fixed wireless access has a simple plug and play setup, which means there are no messy
wires and no need to wait for a technician to come to your home for setup.

How to get Wi-Fi at home

As mentioned, there are several ways to get wireless service at your home and most depend
on geographical location and availability. (See what Wi-Fi home internet is available in your
area.) The majority of urban and suburban areas offer most of these services, with 5G Home
Internet right around the corner. Rural areas will most likely offer satellite and 4G LTE
Home Internet. If you have a wired internet service, you’ll be able to set up your own Wi-Fi
network at home. By connecting a router to your modem, you can share your internet
connection with all your Wi-Fi enabled devices within range. If your home has two levels,
concrete walls or random dead zones, adding a Wi-Fi extender that relays the wireless signal
to these areas can make a big difference.
lOMoARcPSD|34866583
lOMoARcPSD|34866583

RFID
What is RFID (radio frequency identification)?

RFID (radio frequency identification) is a form of wireless communication that incorporates


the use of electromagnetic or electrostatic coupling in the radio frequency portion of the
electromagnetic spectrum to uniquely identify an object, animal or person.

How does RFID work?

Every RFID system consists of three components: a scanning antenna, a transceiver and

a transponder. When the scanning antenna and transceiver are combined, they are referred to
as an RFID reader or interrogator. There are two types of RFID readers -- fixed readers and
mobile readers. The RFID reader is a network-connected device that can be portable or
permanently attached. It uses radio waves to transmit signals that activate the tag. Once
activated, the tag sends a wave back to the antenna, where it is translated into data.

The transponder is in the RFID tag itself. The read range for RFID tags varies based on
factors including the type of tag, type of reader, RFID frequency and interference in the
surrounding environment or from other RFID tags and readers. Tags that have a stronger
power source also have a longer read range.

What are RFID tags and smart labels?

RFID tags are made up of an integrated circuit (IC), an antenna and a substrate. The part of
an RFID tag that encodes identifying information is called the RFID inlay.

There are two main types of RFID tags:

• Active RFID. An active RFID tag has its own power source, often a battery.

• Passive RFID. A passive RFID tag receives its power from the reading antenna,
whose electromagnetic wave induces a current in the RFID tag's antenna.
lOMoARcPSD|34866583

There are also semi-passive RFID tags, meaning a battery runs the circuitry while communication
is powered by the RFID reader.

Low-power, embedded non-volatile memory plays an important role in every RFID


system. RFID tags typically hold less than 2,000 KB of data, including a unique
identifier/serial number. Tags can be read-only or read-write, where data can be added by
the reader or existing data overwritten.

The read range for RFID tags varies based on factors including type of tag, type of reader,
RFID frequency, and interference in the surrounding environment or from other RFID tags
and readers. Active RFID tags have a longer read range than passive RFID tags due to the
stronger power source.

smart labels are simple RFID tags. These labels have an RFID tag embedded into an
adhesive label and feature a barcode. They can also be used by both RFID and barcode
readers. Smart labels can be printed on-demand using desktop printers, where RFID tags
require more advanced equipment.

What are the types of RFID systems?

There are three main types of RFID systems: low frequency (LF), high frequency (HF) and
ultra-high frequency (UHF). Microwave RFID is also available. Frequencies vary greatly by
country and region.
lOMoARcPSD|34866583

• Low-frequency RFID systems. These range from 30 KHz to 500 KHz, though the typical
frequency is 125 KHz. LF RFID has short transmission ranges, generally anywhere from a
few inches to less than six feet.

• High-frequency RFID system These range from 3 MHzto 30 MHz, with the typical
HF frequency being 13.56 MHz. The standard range is anywhere from a few inches to
several feet.

• UHF RFID systems. These range from 300 MHz to 960 MHz, with the typical
frequency of 433 MHz and can generally be read from 25-plus feet away.

• Microwave RFID systems. These run at 2.45 Ghzand can be read from 30- plus feet
away.

The frequency used will depend on the RFID application, with actual obtained distances
sometimes varying from what is expected. For example, when the U.S. State Department
announced it would issue electronic passports enabled with an RFID chip, it said the chips
would only be able to be read from approximately 4 inches away. However, the State
Department soon received evidence that RFID readers could skim the information from
the RFID tags from much farther than 4 inches -- sometimes upward of 33 feet away.

If longer read ranges are needed, using tags with additional power can boost read ranges
to 300-plus feet.

RFID applications and use cases

RFID dates back to the 1940s; however, it was used more frequently in the 1970s. For a long
time, the high cost of the tags and readers prohibited widespread commercial use. As
hardware costs have decreased, RFID adoption has also increased.

Some common uses for RFID applications include:

• pet and livestock tracking

• inventory management

• asset tracking and equipment tracking


lOMoARcPSD|34866583

• inventory control

• cargo and supply chain logistics

• vehicle tracking

• customer service and loss control

• improved visibility and distribution in the supply chain

• access control in security situations

• shipping

• healthcare

• manufacturing

• retail sales

• tap-and-go credit card payments


lOMoARcPSD|34866583

A BLUETOOTH NETWORK
Bluetooth is a short-range wireless technology standard that is used for exchanging data
between fixed and mobile devices over short distances and building personal area networks
(PANs). In the most widely used mode, transmission power is limited to 2.5 milliwatts,
giving it a very short range of up to 10 metres (33 ft). It
employs UHF radio waves in the ISM bands, from 2.402 GHz to 2.48 GHz. [3] It is mainly
used as an alternative to wire connections, to exchange files between nearby portable devices
and connect cell phones and music players with wireless headphones.

Bluetooth is managed by the Bluetooth Special Interest Group (SIG), which has more than
35,000 member companies in the areas of telecommunication, computing, networking, and
consumer electronics. The IEEE standardized Bluetooth as IEEE 802.15.1, but no longer
maintains the standard. The Bluetooth SIG oversees development of the specification,
manages the qualification program, and protects the trademarks.[4] A manufacturer must meet
Bluetooth SIG standards to market it as a Bluetooth device.[5] A network of patents apply to
the technology, which are licensed to individual qualifying devices. As of 2009, Bluetooth
integrated
circuit chips ship approximately 920 million units annually. [6] By 2017, there were 3.6 billion
Bluetooth devices being shipped annually and the shipments were expected to continue
increasing at about 12% a year. [7] In 2021, shipments reached 4.7 billion units, with 9%
growth forecast.

IMPLIMENTATION

Bluetooth operates at frequencies between 2.402 and 2.480 GHz, or 2.400 and 2.4835 GHz,
including guard bands 2 MHz wide at the bottom end and 3.5 MHz wide at the top.[24] This is
in the globally unlicensed (but not unregulated) industrial, scientific and medical (ISM) 2.4
GHz short-range radio frequency band. Bluetooth uses a radio technology called frequency-
hopping spread spectrum. Bluetooth divides transmitted data into packets, and transmits each
packet on one of 79 designated Bluetooth channels. Each channel has a bandwidth of 1 MHz.
It usually performs 1600 hops per second, with adaptive frequency-hopping (AFH) enabled.
[24]
Bluetooth Low Energy uses 2 MHz spacing, which accommodates 40 channels.[25]

Originally, Gaussian frequency-shift keying (GFSK) modulation was the only modulation
scheme available. Since the introduction of Bluetooth 2.0+EDR, π/4- DQPSK (differential
quadrature phase-shift keying) and 8-DPSK modulation may also be used between
lOMoARcPSD|34866583

compatible devices. Devices functioning with GFSK are said to be operating in basic rate
(BR) mode, where an instantaneous bit rate of
1 Mbit/s is possible. The term Enhanced Data Rate (EDR) is used to describe π/4- DPSK
(EDR2) and 8-DPSK (EDR3) schemes, each giving 2 and 3 Mbit/s respectively. The
combination of these (BR and EDR) modes in Bluetooth radio technology is classified as a
BR/EDR radio.

In 2019, Apple published an extension called HDR which supports data rates of 4 (HDR4)
and 8 (HDR8) Mbit/s using π/4-DQPSK modulation on 4 MHz channels with forward error
correction (FEC).[26]
Bluetooth is a packet-based protocol with a master/slave architecture. One master may
communicate with up to seven slaves in a piconet. All devices within a given piconet use the
clock provided by the master as the base for packet exchange. The master clock ticks with a
period of 312.5 μs, two clock ticks then make up a slot of 625 µs, and two slots make up a slot
pair of 1250 µs. In the simple case of single- slot packets, the master transmits in even slots and
receives in odd slots. The slave, conversely, receives in even slots and transmits in odd slots.
Packets may be 1, 3, or 5 slots long, but in all cases, the master's transmission begins in even
slots and the slave's in odd slots.
USES

Bluetooth is a standard wire-replacement communications protocol primarily designed for


low power consumption, with a short range based on low- cost transceiver
microchips in each device.[29] Because the devices use a radio (broadcast) communications
system, they do not have to be in visual line of sight of each other; however, a quasi optical
wireless path must be viable.

Bluetooth Classes and power use

Historically, the Bluetooth range was defined by the radio class, with a lower class (and
higher output power) having larger range.[2] The actual range achieved by a given link will
depend on the qualities of the devices at both ends of the link, as well as the air and obstacles
in between. The primary hardware attributes affecting range are the data rate, protocol
(Bluetooth Classic or Bluetooth Low Energy), the transmitter power, the receiver sensitivity,
and the gain of both antennas.[31]

The effective range varies depending on propagation conditions, material coverage,


production sample variations, antenna configurations and battery conditions. Most Bluetooth
applications are for indoor conditions, where attenuation of walls and signal fading due to
signal reflections make the range far lower than specified line-of- sight ranges of the
lOMoARcPSD|34866583

Bluetooth products.
Bluetooth vs Wi-Fi (IEEE 802.11)

Bluetooth and Wi-Fi (Wi-Fi is the brand name for products using IEEE
802.11 standards) have some similar applications: setting up networks, printing, or
transferring files. Wi-Fi is intended as a replacement for high-speed cabling for general
local area network access in work areas or home. This category of applications is sometimes
called wireless local area networks (WLAN). Bluetooth was intended for portable
equipment and its applications. The category of applications is outlined as the wireless
personal area network (WPAN). Bluetooth is a replacement for cabling in various
personally carried applications in any setting and also works for fixed location applications
such as smart energy functionality in the home (thermostats, etc.).

Wi-Fi and Bluetooth are to some extent complementary in their applications and usage. Wi-
Fi is usually access point-centered, with an asymmetrical client-server connection with all
traffic routed through the access point, while Bluetooth is usually symmetrical, between two
Bluetooth devices. Bluetooth serves well in simple applications where two devices need to
connect with a minimal configuration like a button press, as in headsets and speakers.
Bluetooth exists in numerous products such as telephones, speakers, tablets, media players,
robotics systems, laptops, and game console equipment as well as some high definition
headsets, modems, hearing aids[52] and even watches.[53] Given the variety of devices which
use Bluetooth, coupled with the contemporary deprecation of headphone jacks by Apple,
Google, and other companies, and the lack of regulation by the FCC, the technology is prone
to interference.[54] Nonetheless, Bluetooth is useful when transferring information between
two or more devices that are near each other in low-bandwidth situations. Bluetooth is
commonly used to transfer sound data with telephones (i.e., with a Bluetooth headset) or
byte data with hand-held computers (transferring files).
lOMoARcPSD|34866583

CONCLUSION

In conclusion Wireless networking provides numerous opportunities to increase


productivity and cut costs. It also alters an organization’s overall computer security
risk profile. Although it is impossible to totally eliminate all risks associated with
wireless networking, it is possible to achieve area sonable level of overall security
by adopting a systematic approach

assessing and managing risk. This paper discussed the threats and vulnerabilities
associated with each of the three basic technology components of wireless networks
(clients, access points, and the transmission medium) and described various
commonly available countermeasures that could be used to mitigate those risks. It
also stressed the importance of training and educating users in safe wireless
networking procedures.
lOMoARcPSD|34866583

BIBLIOGRAPHY

Wireless Networks - by Matthew Fast

Computer Networking First-Step -by Norman Laurence

Designing and Deploying 802.11 Wireless Networks -by Jim Geier

Networking Made Easy - by James Bernstein

Wi-Fi Analytics - by Luke Buikema and John Kerber

Wireless Network Security - by Wolfgang Osterhage

Wireless Network Security: A Beginner’s Guide - by Tyler Wrightson

Wireless Networks - by Daniel Collins and Clint Smith

You might also like