SlideShare a Scribd company logo
1 of 20
1
 Bluetooth is a packet based protocol
with a master slave structure . One
master may communicate with up to 7
slaves.
In Bluetooth technology ,the device
which sends the data is called as
MASTER. Where as the devices that
receive the data is called as SLAVE.
BlueTooth- Some Specifications
4
 Uses unlicensed 2.402 - 2.480 GHz frequency range.
 Frequency hopping spread spectrum 79 hops separated
by 1 MHz.
 Maximum frequency hopping rate: 1600 hops/sec.
 Nominal range: 10 cm to 10 meters.
 Nominal antenna power: 0 dBm.
 One complete Bluetooth data packet can be transmitted
within each 625 msec hop slot.
Potential Bluetooth Markets
5
Bluetooth Market Forecast
9
Nov’03: 100M Bluetooth compliant devices worldwide
Bluetooth Protocol Stack
 Adopted Protocols
 PPP(Point-To-Point Protocol)
 TCP/UDP/IP
 OBEX-Session Protocol for IrDA(Infrared Data
Association)
 Contents Format(e.g. vCard, vCalendar)
 WAP-Wireless Application Protocol
11
Bluetooth Security
 Supports Unidirectional or Mutual Encryption based
on a Secret Link key Shared Between Two Devices.
 Security Defined In 3 modes:
Mode1- No Security.
Mode 2 - Service Level Security: Not Established
Before Channel is Established at L2CAP.
Mode 3 - Link Level Security: Device Initiates
Security Before LMP Link is Setup.
13
• Devices and Services can be Set for Different
Levels of Security
Two Trust Levels are Set for Devices:
Trusted Device : Fixed Relationship and
Unrestricted Access to All Services.
Untrusted : No Permanent relationship and
Restricted Services.
Bluetooth Security
 3 Levels of Service Access
 Require Authorization and Authentication.
 Require Authentication Only.
 Default Security for Legacy Applications.
16
But is this Wireless Link Secure?
18
Newsflash: Jan 2001: Norwegian “hackers” crack a
Bluetooth transmission
Bluetooth vs. the Rest (cont’d)
19
802.11
2.4 GHz,
DSSS
11 chips/bit
11Mbps
+20 dBm
50m
128 devices
CSMA/CA
Optional WEP
Optional
HomeRF
2.4GHz,
FHSS
50 hops/s
1 Mbps
+20 dBm
50m
128 devices
CSMA/CA
Optional
Optional
Bluetooth
2.4 GHz, FHSS
1000+hops/s
1Mbps
0, +20dBm
1-10m, 50m
8 devices,
Piconet
Encryption
Yes
Parameter
Technology
Data Rate
Power
Range
Topology
Security
Voice
Channel
ZigBee (proposed)
2.4 GHz,DSSS
15 chips/bit
40 kbits/s
0dBm
100m
100s devices,
CSMA/CA
Not yet
No
Bluetooth – aka IEEE 802.15.1
Zig Bee – aka IEEE 802.15.4
Short blutooth present

More Related Content

What's hot

Ccna 3 chapter 7 v4.0 answers 2011
Ccna 3 chapter 7 v4.0 answers 2011Ccna 3 chapter 7 v4.0 answers 2011
Ccna 3 chapter 7 v4.0 answers 2011
Dân Chơi
 
Wireless hacking
Wireless hackingWireless hacking
Wireless hacking
Mihir Shah
 
Ch7 ccna exploration 3 lan switching and wireless
Ch7 ccna exploration 3 lan switching and wirelessCh7 ccna exploration 3 lan switching and wireless
Ch7 ccna exploration 3 lan switching and wireless
kratos2424
 

What's hot (20)

LoRa Alliance
LoRa AllianceLoRa Alliance
LoRa Alliance
 
Zigbee based two way wireless chatting system
Zigbee based two way wireless chatting systemZigbee based two way wireless chatting system
Zigbee based two way wireless chatting system
 
St58 t8g specification-www.ttbvs.com
St58 t8g specification-www.ttbvs.comSt58 t8g specification-www.ttbvs.com
St58 t8g specification-www.ttbvs.com
 
Barriers to TOR Research at UC Berkeley
Barriers to TOR Research at UC BerkeleyBarriers to TOR Research at UC Berkeley
Barriers to TOR Research at UC Berkeley
 
Bao cao vpn
Bao cao vpnBao cao vpn
Bao cao vpn
 
IRDA Infrared Data Association (IrDA)
IRDA Infrared Data Association (IrDA)IRDA Infrared Data Association (IrDA)
IRDA Infrared Data Association (IrDA)
 
Bluetooth Module
Bluetooth ModuleBluetooth Module
Bluetooth Module
 
Wi-Fi Module
Wi-Fi ModuleWi-Fi Module
Wi-Fi Module
 
Wireless Mobile Networks--> Wireless Body Area and Wireless Personal Area Net...
Wireless Mobile Networks--> Wireless Body Area and Wireless Personal Area Net...Wireless Mobile Networks--> Wireless Body Area and Wireless Personal Area Net...
Wireless Mobile Networks--> Wireless Body Area and Wireless Personal Area Net...
 
RUGGEDCOM RM1224 cellular routers
RUGGEDCOM RM1224 cellular routersRUGGEDCOM RM1224 cellular routers
RUGGEDCOM RM1224 cellular routers
 
Ccna 3 chapter 7 v4.0 answers 2011
Ccna 3 chapter 7 v4.0 answers 2011Ccna 3 chapter 7 v4.0 answers 2011
Ccna 3 chapter 7 v4.0 answers 2011
 
Zigbee
ZigbeeZigbee
Zigbee
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Security
 
Ccna 2 Chapter 8 V4.0 Answers
Ccna 2 Chapter 8 V4.0 AnswersCcna 2 Chapter 8 V4.0 Answers
Ccna 2 Chapter 8 V4.0 Answers
 
Lecture 11 wifi security
Lecture 11 wifi securityLecture 11 wifi security
Lecture 11 wifi security
 
Brief LoRaWAN Overview
Brief LoRaWAN OverviewBrief LoRaWAN Overview
Brief LoRaWAN Overview
 
DASH7 Alliance Protocol Technical Presentation
DASH7 Alliance Protocol Technical PresentationDASH7 Alliance Protocol Technical Presentation
DASH7 Alliance Protocol Technical Presentation
 
Wireless hacking
Wireless hackingWireless hacking
Wireless hacking
 
Ch7 ccna exploration 3 lan switching and wireless
Ch7 ccna exploration 3 lan switching and wirelessCh7 ccna exploration 3 lan switching and wireless
Ch7 ccna exploration 3 lan switching and wireless
 
ComNet NWK3 Data Sheet
ComNet NWK3 Data SheetComNet NWK3 Data Sheet
ComNet NWK3 Data Sheet
 

Similar to Short blutooth present

R K 2 Bluetooth Technologies
R K 2  Bluetooth  TechnologiesR K 2  Bluetooth  Technologies
R K 2 Bluetooth Technologies
Saurav Kumar
 
Bluetoothppt
BluetoothpptBluetoothppt
Bluetoothppt
sasidhar
 
Bluetooth Aplication
Bluetooth AplicationBluetooth Aplication
Bluetooth Aplication
Er Bhaduri
 

Similar to Short blutooth present (20)

Bluetooth.pptx
Bluetooth.pptxBluetooth.pptx
Bluetooth.pptx
 
R K 2 Bluetooth Technologies
R K 2  Bluetooth  TechnologiesR K 2  Bluetooth  Technologies
R K 2 Bluetooth Technologies
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
 
Bluetoothppt
BluetoothpptBluetoothppt
Bluetoothppt
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Teknologi Bluetooth
Teknologi BluetoothTeknologi Bluetooth
Teknologi Bluetooth
 
Extending Bluetooth with Mesh Networking
Extending Bluetooth with Mesh NetworkingExtending Bluetooth with Mesh Networking
Extending Bluetooth with Mesh Networking
 
Bluetooth Technology By Volkan Sevindik
Bluetooth Technology By Volkan SevindikBluetooth Technology By Volkan Sevindik
Bluetooth Technology By Volkan Sevindik
 
Bluetooth technology by polite group
Bluetooth technology by polite groupBluetooth technology by polite group
Bluetooth technology by polite group
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Wireless personal area networks(PAN)
Wireless personal area networks(PAN)Wireless personal area networks(PAN)
Wireless personal area networks(PAN)
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth Aplication
Bluetooth AplicationBluetooth Aplication
Bluetooth Aplication
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Other types of networks: Bluetooth, Zigbee, & NFC
Other types of networks: Bluetooth, Zigbee, & NFCOther types of networks: Bluetooth, Zigbee, & NFC
Other types of networks: Bluetooth, Zigbee, & NFC
 
124647123-Bluetooth.ppt
124647123-Bluetooth.ppt124647123-Bluetooth.ppt
124647123-Bluetooth.ppt
 
Bluetooth
BluetoothBluetooth
Bluetooth
 

Recently uploaded

Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
SanaAli374401
 

Recently uploaded (20)

Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 

Short blutooth present

  • 1. 1
  • 2.  Bluetooth is a packet based protocol with a master slave structure . One master may communicate with up to 7 slaves. In Bluetooth technology ,the device which sends the data is called as MASTER. Where as the devices that receive the data is called as SLAVE.
  • 3.
  • 4. BlueTooth- Some Specifications 4  Uses unlicensed 2.402 - 2.480 GHz frequency range.  Frequency hopping spread spectrum 79 hops separated by 1 MHz.  Maximum frequency hopping rate: 1600 hops/sec.  Nominal range: 10 cm to 10 meters.  Nominal antenna power: 0 dBm.  One complete Bluetooth data packet can be transmitted within each 625 msec hop slot.
  • 6.
  • 7.
  • 8.
  • 9. Bluetooth Market Forecast 9 Nov’03: 100M Bluetooth compliant devices worldwide
  • 10.
  • 11. Bluetooth Protocol Stack  Adopted Protocols  PPP(Point-To-Point Protocol)  TCP/UDP/IP  OBEX-Session Protocol for IrDA(Infrared Data Association)  Contents Format(e.g. vCard, vCalendar)  WAP-Wireless Application Protocol 11
  • 12.
  • 13. Bluetooth Security  Supports Unidirectional or Mutual Encryption based on a Secret Link key Shared Between Two Devices.  Security Defined In 3 modes: Mode1- No Security. Mode 2 - Service Level Security: Not Established Before Channel is Established at L2CAP. Mode 3 - Link Level Security: Device Initiates Security Before LMP Link is Setup. 13
  • 14. • Devices and Services can be Set for Different Levels of Security Two Trust Levels are Set for Devices: Trusted Device : Fixed Relationship and Unrestricted Access to All Services. Untrusted : No Permanent relationship and Restricted Services.
  • 15.
  • 16. Bluetooth Security  3 Levels of Service Access  Require Authorization and Authentication.  Require Authentication Only.  Default Security for Legacy Applications. 16
  • 17.
  • 18. But is this Wireless Link Secure? 18 Newsflash: Jan 2001: Norwegian “hackers” crack a Bluetooth transmission
  • 19. Bluetooth vs. the Rest (cont’d) 19 802.11 2.4 GHz, DSSS 11 chips/bit 11Mbps +20 dBm 50m 128 devices CSMA/CA Optional WEP Optional HomeRF 2.4GHz, FHSS 50 hops/s 1 Mbps +20 dBm 50m 128 devices CSMA/CA Optional Optional Bluetooth 2.4 GHz, FHSS 1000+hops/s 1Mbps 0, +20dBm 1-10m, 50m 8 devices, Piconet Encryption Yes Parameter Technology Data Rate Power Range Topology Security Voice Channel ZigBee (proposed) 2.4 GHz,DSSS 15 chips/bit 40 kbits/s 0dBm 100m 100s devices, CSMA/CA Not yet No Bluetooth – aka IEEE 802.15.1 Zig Bee – aka IEEE 802.15.4