You are on page 1of 19

V Bluetoothis a short range communication

technology was developed to replace the


cables and to provide high levels of
security.

V Bluetooth is globally accepted device the


any Bluetooth device connect to other
Bluetooth enabled device almost every
part in the world.
V Bluetooth wireless technology is a
wireless communication link, operating
in the unlicensed ISM band at 2.4 GHz
using a frequency hopping transceiver.

V It is a globally available standard that


wirelessly connects mobile phones,
portable computers, cars, stereo
headset,MP3 players, and etc««
Vëhe signal hops among 79
frequencies at 1 MHz intervals to
give a high degree of interference
immunity.
Vëhe key features of Bluetooth
technology are robustness, low
power, and low cost.
V ëhe operating range depends on the
device class:
V Class 3 radios ² have a range of up to 1
meter or 3 feet.
V Class 2 radios ² most commonly found in
mobile devices ² have a range of 10
meters or 30 feet.
V Class 1 radios ² used primarily in
industrial use cases ² have a range of 100
meters or 300 feet.
V ëhe most commonly used radio is Class
2 and uses 2.5 mW of power.

V Bluetooth technology is designed to


have very low power consumption.

V ëhis is reinforced in the specification by


allowing radios to be powered down
when inactive.
V ëhe Bluetooth core system consists
of an RF transceiver, baseband, and
protocol stack.

V ëhe system offers services that


enable the connection of devices
and the exchange of a variety of
data classes between these devices.
Vëhe symbol rate is1 Megasymbol
per second (Msps) supporting the
bit rate of 1 Megabit per second
(Mbps).

V Enhanced Data Rate, a gross air bit


rate of 2 or 3Mb/s. ëhese modes are
known as Basic Rate and Enhanced
Data Rate respectively.
V ëhe link manager function uses LMP to
control the operation of devices in the
piconet and provide services to manage
the lower architectural layers.

V ëheLMP protocol is only carried on the


default ACL logical transport and the
default broadcast logical transport.
VCore Specification Versions.

VVersion 2.0 + Enhanced Data Rate


(EDR), adopted November, 2004.

VVersion 1.2, adopted November,


2003.
V ëhere are three modes of security for
Bluetooth access between two
devices.

V Security Mode 1: non-secure.


V Security Mode 2: service level
enforced security.
V Security Mode 3: link level
enforced security.
VBlue jacking.

VBlue snarfing.
V Bluejacking allows phone users to send
business cards anonymously using
Bluetooth wireless technology.
V Bluejacking does NOë involve the
removal or alteration of any data from
the device.
V ëhese business cards often have a clever
or flirtatious message rather than the
typical name and phone number.
V Bluesnarfing allows hackers to gain
access to data stored on a Bluetooth
enabled phone using Bluetooth wireless
technology without alerting the phone·s
user of the connection made to the
device.

V Only specific older Bluetooth enabled


phones are susceptible to bluesnarfing.
VGlobally Available.
VRange of Devices.
VEasy of use.
VGlobally Accepted Adderss.
VSecure Connection.
VBluetooth Baseband.
VBluetooth clock.
VBluetooth controller.
VBluetooth enabled devices.
VBluetooth device address.
VBluetooth HCI.
VBluetooth Host.
V ëhus Bluetooth is the fastest growing
technology in the world.

V It is efficient,securable,easy to use
and transefers the data quickly and
safely.

V Bluetooth wireless technology is no


exception.
¢    

] Õ 

Õ


] Õ  
  


] Õ  


 


] Õ  
 


] Õ 

 


You might also like