Professional Documents
Culture Documents
Bluetooth Presentatio
Bluetooth Presentatio
Technology
Introduction
What is Bluetooth?
Why is it useful?
Governing Standard – Large Consortium
2
- Danish Viking King Harald Bluetooth
-United WarringFactions ofDenmark
andNorway
-Runic Letters UsedFor Logo
1
The Name and Logo
History1998 - Bluetooth technology is officially
introduced and the BLUETOOTH SIG is formed.
Bluetooth technology's intended basic purpose is to
be a wire replacement technology in order to
rapidly transfer voice and data.
1999 - Bluetooth 1.0 Specification is introduced.
2003 - The BLUETOOTH SIG overhauls the
Bluetooth Core Specification with the
announcement of Version 2.1.
2004 - Bluetooth Version 2.0 + EDR (Enhanced
Data Rate) is introduced.
2005 - Devices using Version 2.0 + EDR begin to
hit the market in late 2005.
■2007 - Bluetooth Core Specification Version 2.1 +
EDR is adopted by the BLUETOOTH SIG.
2009- Bluetooth Core Specification Version 3.0 +
HS (High Speed) is adopted by the BLUETOOTH
SIG. 4
Where is it used?
-Wireless Control &Communication
-Data Transmission
-Cordless Desktop PC
-Mobile Gaming
5
What are Bluetooth
adapters?
How do they work?
7
How is the data sent between
two Bluetooth devices?
• The radio-wave connection between two devices is used to send and
receive data between two Bluetooth devices.
• The data send and received at a time is equal to 720 Kilo bytes per second.
• There are 79 frequency channels of a frequency 2.45 Giga Hertz through
which the devices send and receive data to each other.
• When two devices are trying to be paired, they are actually searching for a
common frequency through which they can send and receive data.
• When such a frequency is discovered, the devices are "found".
• The connecting of two devices does not hamper the connecting of two
other devices because they usually use different channels of frequency and
hence do not overlap.
8
Data Transmission
Bluetooth enableddevices:
•Mobile phones
• Smartphones
• PDAs
•Notebooks
•GPS Receivers
Data types:
•Voice, Video, Images, Files and Data
9
Piconet Network
10
Protocols:
11
Bluetooth Security:
The security of Bluetooth uses the
concept of two separate keys, an
authentication key and an encryption
key. The authentication key is the
master key, and encryption keys are
regenerated with each new session. A
random number, generated for each
transaction, adds additional security
Devices:
■Laptops
■Gaming Consoles
■Headsets
■Cell Phones
■ Printers
13
MAIN APPLICATIONS:
-Wireless control of and communication between a mobile phone and a
hands-free
headset.
This was one of the earliest applications to become popular.
-Wireless networking between PCs in a confined space and where little
bandwidth is required.
- Wireless communications with PC input and output devices, the most
common being the mouse, keyboard and printer.
- Transfer of files between devices with OBEX (a kind of communications
protocol).
- Replacement of traditional wired serial communications in test equipment,
GPS receivers, medical equipment, bar code scanners, and traffic control
devices
-Wireless control of and communication between a mobile phone and a
hands-free headset. 14
Advantages:
• It avoids interference from other wireless devices.
• It has lower power consumption.
• It is easily upgradeable.
• It has range better than Infrared communication.
• The Bluetooth is used for voice and data transfer.
• Bluetooth devices are available at very cheap cost.
• No line of sight hence can connect through any obstacles.
• Free to use if the device is installed with Bluetooth.
• The technology is adopted in many products such as head set, in car system, printer, web cam, GPS
system, keyboard and mouse
Disadvantages:
16
THANK YOU!!
17