Professional Documents
Culture Documents
NETWORKING
Bilal Ahmed, Safwan Hamza
3
Scatternet
Piconets can be combined to form what is called a
Scatternet. A secondary station in one Piconet can
be the primary in another Piconet. This station can
receive messages from the primary in the first
Piconet (as a secondary) and, acting as a primary,
deliver them to secondaries in the second Piconet. BLUETOOTH NETWORK
A station can be a member of two Piconets. If CONNECTIONS
several Piconets overlap a physical
area, and members of the various Bluetooth is a wireless technology that
Piconets communicate with each other, provides connectivity to the mobile
any unit in one Piconet can devices. Bluetooth connects devices in
communicate in a second Piconet as three ways. We discuss each way as a
long as it serves as master for only one category. These categories are
Piconet at a time. voice/data access points,
peripheral interconnects, and
Up to 10 piconets can work together With Personal Area Networking (PAN).
minimal impact on each other. The throughput
degradation in the presence of multiple piconets is Ad hoc networking is the major
given by difference between Bluetooth wireless
connectivity and the cellular radio
TH=(1-1/79)N-1 architecture. As Bluetooth network is an
So the overall throughput of the scatternet could ad hoc network, it establishes the
reach well above 10Mbps. The topology of connection on run time, and is always
scatternet will also effectively extend the available for use. It’s an example of
operation range when some units act as bridge. ALWAYS ON ALWAYS CONNECTED
Secondary in the same piconet cannot network. Its connections are made on
communicate with each other directly. If one per requirement bases, i.e. when
Secondary wants to talk to another, it can page someone need connectivity Bluetooth
that Secondary and set up a new piconet, or networks are available to serve. [1]
request to change its role from slave to master.
The Bluetooth network depends upon
Each Bluetooth unit has a unique 48-bit Bluetooth
Device Address; this address is derived from the radio connectivity between the peer
IEEE802 standard. devices; in this regard it does not
depend upon the Base stations and any
A single Bluetooth channel has about 1Mbps data terminals.
rate. It’s believed the future version will have a
10Mbps data rate to accommodate applications
like real time video. [8] Voice/Data Access Points
Voice /data access points connect a
computing device with mobile device
through a wireless but secure
4
connection. It allows the connectivity networks have capability to be formed
between mobiles phones that don’t quickly and become able to
have internet connections with the communicate and share information
personnel computers that have internet within the range of 10cm to 10m. This
connection. The mobile phone here is type of networking is refers to ad hoc
acting as an access point. networking. This is again an AOAC
Developments are being made to network which is also an on-demand
create a public data access point. The network, which is available to serve any
main purpose will be to provide internet time when any client wants to send or
connection to public, especially receive data. Another feature is the
passengers at airports, stations that security that this connection provides
carry their equipment in briefcases. The to the data that is being transferred,
main idea behind this development is of which has been discussed in detail. This
access points provided by the Bluetooth network also vanishes quickly save time
technology. These points will support and space.
higher data rates. These data points will
be connected to each other via faster
internet connection e.g. DSL.
SECURITY IMPLEMENTATION FOR
BLUETOOTH
Peripheral Interconnects Bluetooth technology provides three modes of
This category of Bluetooth network security.
provides inter-connectivity between 1. Security mode 1 (non-secure). A
different devices with different device does not initiate any
functions. security procedure such as
For example, keyboard, mouse, encryption or authentication
headsets can be connected to their 2. Security mode 2 (service-level
parent devices such as computers enforcement security). This mode
without any cable connections. These allows different and flexible
wireless peripheral devices are of low access policies for applications,
cost because of less cable connections. and is used especially for running
Moreover all peripheral devices of any applications with different
office can be connected to a common security
point that connects the computing 3. Security mode 3 (link-level
devices of all office.[1] enforced security).a device allows
An other aspect of this type of only authenticated connections.in
connection is used in the field of other words it initiate security
security; it can connect the sensors procedures.
with the computing device and provide
time to time update to central There are three security attributes of Bluetooth
computer. technology.
• Authorization
• Authentication
Personal Area Networking/ Ad
hoc networking • Encryption
This type of networking creates
immediate networks on run time. These
5
We can achieve Authentication using a Bluetooth network contains 8 devices among
challenge response scheme using which one is primary while others are
symmetric link keys. If the devices do secondary.bluetooth network ensures a high
not share a link key, it is created secure communication between its peer devices,
through a process called “pairing” and because it use FHSS that hopes at 79 channel and
it is based on a shared secret also provide near and far effects.
association, such as a PIN code. If a Bluetooth networks could be used in any of three
device does not have a mechanism to categories depending upon requirements, access
enter a PIN, a restricted form link key, points, peripheral connections,PAN,among them
called a unit key, is generated based on PAN or adhoc network is widely used
the device’s address and random this paper covered many aspects of Bluetooth
number. Encryption can only be technology i.e. Bluetooth network architecture,
activated after authentication.[9] bluetooth layer architecture, bluetooth connection
SPREAD SPECTRUM types and security implementations.
Bluetooth use spread spectrum and
operates at 2.4GHz spectrum. Spread REFERNCES
spectrum was initially developed by [1] James Kardach, Bluetooth Architecture
the US military to send unbreakable Overview, Mobile Computing Group, Intel
codes that were either hard to detect or Corporation. Intel Technology Journal Q2, 2000
hard to jam. there systems were [2] Chatschik Bisdikian, an Overview of the
assumes to be very secure because Bluetooth Wireless Technology, IBM Corporation,
they used spread spectrum IEEE Communications Magazine December 2001
technology but when the spreading [3] Behrouz A. Forouzan, Data Communications
sequence is known to everyone, there and Networking, the McGraw-Hill Companies,
is very little security gained from Inc
spread spectrum.[9] pp. 434-435.
[4] Anthony C Davies, An overview of Bluetooth
Wireless Technology and some competing LAN
Impact on ease of use Standards,
Encryption is optional for security. it is School of Computing and Information Systems,
because we also take into account the Kingston University Kingston-upon-Thames,
issue of ease in using such security Surrey, England, KTl 2EE.
[5] Hongfeng Wang, Overview of Bluetooth
applications. sometimes we don’t
Technology, Dept. of Electrical Engineering State
require encryption, so we don’t use it
College, PA16802, July 3, 2001
but it can be used where required. [9]
[6] Behrouz A. Forouzan, Data Communications
Complexity increases with and Networking, the McGraw-Hill Companies,
increasing level of security. if user Inc
want to get security , he should pp. 435-437
have some knowledge about [7] Diane McMichael Gilster, Bluetooth End to
security mechanism, otherwise it is End, Published by: Wiley Date Published: March
not possible for him to access this 2002
application. ISBN: 0764548875, pp 9-11.
[8] Kristoffer Fleming, Robert J. Hunter,
CONCLUSION Jon Inouye, Jeffrey Schiffer, Enabling
Always On, Always Connected (AOAC)
Bluetooth technology is a wireless communication Computing with Bluetooth Technology.
technology whose network range is from 10cm to Intel Technology Journal Q2, 2000
10m.
6
[9] Sultan Weatherspoon,Overview of
IEEE 802.11b Security, Network
Communications Group, Intel
Corporation.