Bluetooth. March 28, 2005 Patrick Lui
|
|
- Piers Porter
- 6 years ago
- Views:
Transcription
1 Bluetooth March 28, 2005 Patrick Lui
2 1. Introduction As our everyday lives move closer towards complete digital age, connectivity between devices is an important aspect that has not been emphasized comparing to other technologies. An often neglected part of research and development, there are only a few different protocols used in commercial products. Some of the examples include infrared, radio signal and Bluetooth. The latter is the focus of this research paper. 2. How Bluetooth works Bluetooth, in short, is a radio-frequency standard allows electronic devices to communicate wirelessly. It can be separated into two different layers: physical and link layers. Physical Layer It uses frequency in the range 2400 to MHz, which is the Industrial, Scientific and Medical (ISM) band. To minimize collision, Bluetooth adopts Frequency Hopping Spread Spectrum (FHSS). FHSS is when a device switches its frequency at up to 1600 times per second within 79 randomly chosen frequencies. There are three power classes with Class 3 being the most common. A Class 3 Bluetooth device sends 1 millivolt signals while giving a range of up to 10 meters. Since it uses radio-frequency, the shortcoming of line of sight technologies such as infrared is eliminated. It has the ability to go through walls. Link Layer This layer is responsible to establish and multiplex the data between two Bluetooth adapters. Each adapter is assigned an address by the manufacturer. When a Bluetooth-enabled device is turned on, the link layer will look for other devices that are physically within the range that have addresses in a particular addressing range. If one of such device is in range, a Personal Area Network (PAN), also known as a piconet, is formed. One device will act as the master and another as the slave. There can be up to seven active slaves in a piconet. Each slave is given a 3-bit Active Member Address. Once this is done, packets can be transmitted between the master and the slaves. The speed of transmission can go up to kb/sec depending if the data is symmetric 2
3 or asymmetric. This layer is usually controlled by embedded software to conserve power. 3. Security There are three modes of security: Mode 1: Non-secure, no authentication required. Mode 2: Authentication only. Mode 3: Authentication and authorization required before a link can be established. To accomplish the above, the following is provided either by the physical layer or the link layer: random (128 bits), encryption key (8-128 bits) and link key (128 bits). Before a connection between two devices can be established, the link key has to be used for authentication. The link key can be a combination key, unit key, master key or an initialization key, depending on the application. The following table shows which algorithm produces which key: Algorithm Input Output Notes E3 Link key, 96-bit Ciphering Encryption key - encryption key is used whenever a device go into encryption mode Offset Number, random - new encryption key is generated each time going into encryption mode E21 Bluetooth device address, random Combination/Unit key - devices exchange securely their random s and calculate the combination key to be used between them E22 PIN, length of PIN, random Initialization/Master key - the generated key is used for key exchange during the generation of a link key 3
4 The encryption process is similar to encryption in other devices where the encryption key is used to encrypt and decrypt data. Vulnerabilities There are several known attacks that go through the Bluetooth protocol. A snarf attack refers to the compromise of data. Normally, this is only possible if the devices near an attacker are visible but there are ways around it. Another type of attack is called a backdoor attack, which is the abuse of the list of trusted devices that each Bluetooth-enabled device has. By posing as a trust device, the attack will be able to sneak onto the device without the owner knowing. Bluejacking is another vulnerability where the attacker can send unwanted messages to Bluetooth-enabled devices. The details of how these attacks can be accomplished are easily available online. Although it seems as if it is very easy to be a victim, there is a very simple method to avoid being attacked; do not turn on Bluetooth unless one needs to. There is no way an attacker can cause any harm if Bluetooth is not turned on. 4. Conclusion With so many electronics manufacturer, including Apple, IBM, Sony, Motorola, backing Bluetooth, it is here to stay and will only become more prominent in the near future. As outlined in the Security section, there are issues with Bluetooth but it is a good step towards a wireless society. There are already printers that utilize Bluetooth technology. Bluetooth-enabled keyboards and mouse are becoming more common. While the main use so far is to connect mobile phones and PDA s to the computer, there is no reason to limit this technology to those uses alone. More innovative uses will be seen in the near future. 4
5 References: Blankenbeckler, D. (n.d.). Retrieved Mar. 25, 2005, from An Introduction to Bluetooth Web site: Vainio, J. T. (2000). Retrieved Mar. 25, 2005, from Bluetooth Security Web site: (2003). Retrieved Mar. 25, 2005, from Bluetooth Specification Web site: cation.htm. (2004). Retrieved Mar. 25, 2005, from Serious flaws in bluetooth security lead to disclosure of personal data Web site: (n.d.). Retrieved Mar. 25, 2005, from How Bluetooth Works Web site: 5
Bluetooth. Quote of the Day. "I don't have to be careful, I've got a gun. -Homer Simpson. Stephen Carter March 19, 2002
Bluetooth Stephen Carter March 19, 2002 Quote of the Day "I don't have to be careful, I've got a gun. -Homer Simpson 1 About Bluetooth Developed by a group called Bluetooth Special Interest Group (SIG),
More information[A SHORT REPORT ON BLUETOOTH TECHNOLOGY]
2011 [A SHORT REPORT ON BLUETOOTH TECHNOLOGY] By Ram Kumar Bhandari 1. Introduction Bluetooth Technology A Technical Report Bluetooth is a short-ranged wire-less communication technology implementing the
More informationChapter 10: Wireless LAN & VLANs
Chapter 10: Wireless LAN & VLANs Abdullah Konak School of Information Sciences and Technology Penn State Berks Wireless Transmission for LAN Radio Frequency Transmission (RF) Infrared Transmission 2 1
More informationResearch on Modern Bluetooth Technology
Research on Modern Bluetooth Technology D.Annal 1, T.Indira 2, K.Poojitha 3, R.Rajashree 4 Student, Dept. of CSE, Magna College of Engineering, Chennai, Tamil Nadu, India 1,2,3,4 ABSTRACT: The seemingly
More informationGuide to Wireless Communications, 3 rd Edition. Objectives
Guide to Wireless Communications, 3 rd Edition Chapter 5 Wireless Personal Area Networks Objectives Describe a wireless personal area network (WPAN) List the different WPAN standards and their applications
More informationA Seminar Report On Bluetooth Technology
A Seminar Report On Bluetooth Technology Submitted By Sanjay Dudani Roll No. - 419 Under The Guidance of Prof. P.B. Dehenkar Seminar On Bluetooth Technology (Professional Practices IV) Page 1 Bluetooth
More informationON SECURITY OF BLUETOOTH WIRELESS SYSTEM. Pavel Kucera, Petr Fiedler, Zdenek Bradac, Ondrej Hyncica
ON SECURITY OF BLUETOOTH WIRELESS SYSTEM Pavel Kucera, Petr Fiedler, Zdenek Bradac, Ondrej Hyncica Brno University of Technology Faculty of Electrical Engineering and Communication Department of Control
More informationIntroduction to Wireless Networking ECE 401WN Spring 2009
I. Overview of Bluetooth Introduction to Wireless Networking ECE 401WN Spring 2009 Lecture 6: Bluetooth and IEEE 802.15 Chapter 15 Bluetooth and IEEE 802.15 What is Bluetooth? An always-on, short-range
More informationSolving the Interference Problem due to Wireless LAN for Bluetooth Transmission Using a Non- Collaborative Mechanism. Yun-Ming, Chiu 2005/6/09
Solving the Interference Problem due to Wireless LAN for Bluetooth Transmission Using a Non- Collaborative Mechanism Yun-Ming, Chiu 2005/6/09 Outline Overview Survey of Bluetooth Structure of Bluetooth
More informationSecurity. Nelli Gordon and Sean Vakili May 10 th 2011
Security Nelli Gordon and Sean Vakili May 10 th 2011 What is Bluetooth? Bluetooth is an open standard for short-range radio frequency (RF) communication. Bluetooth technology is used primarily to establish
More informationWireless# Guide to Wireless Communications. Objectives
Wireless# Guide to Wireless Communications Chapter 6 High Rate Wireless Personal Area Networks Objectives Define a high rate wireless personal area network (HR WPAN) List the different HR WPAN standards
More informationBluetooth. Bluetooth Radio
Bluetooth Bluetooth is an open wireless protocol stack for low-power, short-range wireless data communications between fixed and mobile devices, and can be used to create Personal Area Networks (PANs).
More informationCompTIA FC0-U51. CompTIA IT Fundamentals.
CompTIA FC0-U51 CompTIA IT Fundamentals http://killexams.com/exam-detail/fc0-u51 or intranet against unauthorized access from the Internet or other outside networks. It restricts inbound and outbound access
More informationSecuring A Bluetooth Device
Securing A Bluetooth Device Mrs. Dhanashri D. Dhokate 1, Mr. Milind C. Butale 2, Mr. Babasaheb S. Patil 3 Assistant Professor, Information Technology, PVPIT, Budhgaon, India 1. Associate Professor, Electronics
More informationJeffrey Price Dr. Konak IST 220 Bluetooth Technology
Jeffrey Price Dr. Konak IST 220 Bluetooth Technology 1 TABLE OF CONTENTS 1. INTRODUCTION 2. COMPONENTS 3. BLUETOOTH ADVANTAGES/DISADVANTAGES 4. USES OF BLUETOOTH 5. THE FUTURE 7. DOCUMENTATION 2 1. INTRODUCTION
More informationCS4/MSc Computer Networking. Lecture 13: Personal Area Networks Bluetooth
CS4/MSc Computer Networking Lecture 13: Personal Area Networks Bluetooth Computer Networking, Copyright University of Edinburgh 2005 BlueTooth Low cost wireless connectivity for Personal Area Networks
More informationComputer Networks II Advanced Features (T )
Computer Networks II Advanced Features (T-110.5111) Bluetooth, PhD Assistant Professor DCS Research Group Based on slides previously done by Matti Siekkinen, reused with permission For classroom use only,
More informationBluetooth technology, developed by Ericsson Mobile Communications, a. worldwide telecommunications company based in Sweden, is fast becoming the
Bluetooth technology, developed by Ericsson Mobile Communications, a worldwide telecommunications company based in Sweden, is fast becoming the worldwide standard for short-range wireless communication.
More informationInside Bluetooth. Host. Bluetooth. Module. Application RFCOMM SDP. Transport Interface. Transport Bus. Host Controller Interface
Inside Bluetooth Application Host Application Host Audio (SCO) RFCOMM SDP Data (ACL) Control API and Legacy Support Modules Bluetooth HCI Driver Transport Interface Physical I/F Transport Bus Bluetooth
More informationWireless Networking. Chapter The McGraw-Hill Companies, Inc. All rights reserved
Wireless Networking Chapter 23 Overview In this chapter, you will learn how to Discuss wireless networking components Analyze and explain wireless networking standards Install and configure wireless networks
More informationBluetooth. Digital Communications CIM242. Amarpreet Singh Saini KINGSTON UNIVERSITY K /10/2010
KINGSTON UNIVERSITY Bluetooth Digital Communications CIM242 Amarpreet Singh Saini K1051678 12/10/2010 Bluetooth is a wireless technology that was conceived in the year 1998. Since then it has amassed an
More informationA COLLOCATED APPROACH FOR COEXISTENCE RESOLUTION IN WIRELESS HOME NETWORKING
A COLLOCATED APPROACH FOR COEXISTENCE RESOLUTION IN WIRELESS HOME NETWORKING Md Enamul Islam, Sanjay Jha, Dr. Paul W.H. Kwan, Monzurur Rahman School of Mathematics, Statistics and Computer Science, University
More informatione-pg Pathshala Quadrant 1 e-text
e-pg Pathshala Subject : Computer Science Module: Bluetooth Paper: Computer Networks Module No: CS/CN/37 Quadrant 1 e-text In our journey on networks, we are now exploring wireless networks. We looked
More informationENRNG3076 : Oral presentation BEng Computer and Communications Engineering
Jean Parrend ENRNG3076 : Oral presentation BEng Computer and Communications Engineering 1 Origin 2 Purpose : Create a cable replacement standard for personal area network Handle simultaneously both data
More informationWireless Personal Area Networks & Wide Area Networks
Wireless Personal Area Networks & Wide Area Networks Patrick J. Stockreisser p.j.stockreisser@cs.cardiff.ac.uk Lecture Outline In the lecture we will: Look at PAN s in more detail Look at example networks
More informationWireless Technologies
Wireless Technologies Networking for Home and Small Businesses Chapter 7 Manju. V. Sankar 1 Objectives Describe wireless technologies. Describe the various components and structure of a WLAN Describe wireless
More informationBhopal, , India 3 M.Tech Scholor,Department Of Computer Science, BIST Bhopal. Bhopal, , India
Indirect Mobile Data Transfer Under Bluetooth Protocol 1 Pramod Kumar Maurya, 2 Gireesh Dixit, 3 Jay Prakash Maurya 1 M.Tech Scholor, 2 HOD, Department Of Computer Science, MPM, Bhopal, Bhopal, 462021,
More informationALL SAINTS COLLEGE OF TECHNOLOGY, BHOPAL
BLUETOOTH Amita Tiwari IIIrd Semester amitaasct@gmail.com Sunil Kumar IIIrd Semester sunilasct@gmail.com ALL SAINTS COLLEGE OF TECHNOLOGY, BHOPAL ABSTRACT Blue tooth is a standard developed by a group
More informationWireless LANs. The Protocol Stack The Physical Layer The MAC Sublayer Protocol The Frame Structure Services 802.
Wireless LANs The 802.11 Protocol Stack The 802.11 Physical Layer The 802.11 MAC Sublayer Protocol The 802.11 Frame Structure Services 56 802.11 The 802.11 Working Group The IEEE 802.11 was formed in July
More informationWireless Networks. Authors: Marius Popovici Daniel Crişan Zagham Abbas. Technical University of Cluj-Napoca Group Cluj-Napoca, 24 Nov.
Wireless Networks Authors: Marius Popovici Daniel Crişan Zagham Abbas Technical University of Cluj-Napoca Group 3250 Cluj-Napoca, 24 Nov. 2003 Presentation Outline Wireless Technology overview The IEEE
More informationWIRELESS TECHNOLOGIES
WIRELESS TECHNOLOGIES Bluetooth, ZigBee and ANT Thomas Aasebø OVERVIEW What are wireless sensor networks? What are personal area networks? What are these networks typically used for? Bluetooth, ZigBee
More informationBluetooth PCI Adapter
Table of Contents 1 Introduction...2 2 Installation...2 2.1 Software Installation...2 2.1.1 Installation on Windows 95/98/ME/2000/XP...2 2.1.2 Installation on Windows NT...3 2.1.3 Installation on Linux...3
More informationAmarjeet Singh. February 7, 2012
Amarjeet Singh February 7, 2012 References Bluetooth Protocol Architecture v.1 www.bluetooth.org http://www.tutorial-reports.com/wireless/bluetooth/ Slides from last class uploaded on the course website
More informationOverview of Bluetooth
Wireless Application Programming with J2ME and Bluetooth Page 1 http://developers.sun.com/techtopics/mobility/midp/articles/bluetooth1/ Dec 19, 2004 Article Wireless Application Programming with J2ME and
More informationWPAN-like Systems. UWB Ultra Wide Band. IrDA Infrared Data Association. Bluetooth. Z-Wave. WPAN Wireless Personal Area Network
WPAN-like Systems WPAN Wireless Personal Area Network PAN: Personal Area Network. Small, within a few meters. WPAN: Wireless PAN. Mostly short-range, low-power, lowrate networks. More or less self-organizing.
More informationSecurity in Ad-hoc Networks
1(12) Security in Ad-hoc Networks Anne Vanhala University of Helsinki Department of Computing Science Research seminar on Security in Distributed Systems anne.vanhala@sonera.com Abstract A short-range
More informationCS263: Wireless Communications and Sensor Networks
CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 6: Bluetooth and 802.15.4 October 12, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Bluetooth Standard for Personal Area
More informationWIRELESS-NETWORK TECHNOLOGIES/PROTOCOLS
3 WIRELESS-NETWORK TECHNOLOGIES/PROTOCOLS Dr. H. K. Verma Distinguished Professor (EEE) Sharda University, Greater Noida (Formerly: Deputy Director and Professor of Instrumentation Indian Institute of
More informationMODELING AND SIMULATION OF IEEE WIRELESS-LAN AND BLUETOOTH PICONET RANGE INTERFERENCE
MODELING AND SIMULATION OF IEEE 802.11 WIRELESS-LAN AND BLUETOOTH PICONET RANGE INTERFERENCE Patrick O. Bobbie and Abdul-Lateef Yussiff School of Computing and Software Engineering Southern Polytechnic
More informationNetwork Communications Standards. Applied Information Technology
Network Communications Standards Applied Information Technology Network Standards Why do we need network standards? Defined guidelines for how computers or networked devices communicate Think of it as
More informationPerformance Evaluation of Bluetooth Links in the Presence of Specific Types of Interference
Vol:1, No:3, 27 Performance Evaluation of Bluetooth Links in the Presence of Specific Types of Interference Radosveta Sokullu and Engin Karatepe International Science Index, Electrical and Computer Engineering
More informationWireless Sensor Networks
Wireless Sensor Networks 11th Lecture 29.11.2006 Christian Schindelhauer schindel@informatik.uni-freiburg.de 1 Bluetooth in WSN? There are several commercially available MAC protocol/products Wi-Fi Bluetooth
More informationSIMULATION BASED ANALYSIS OF BLUETOOTH NETWORKS. M. Subramani and M. Ilyas
SIMULATION BASED ANALYSIS OF BLUETOOTH NETWORKS M. Subramani and M. Ilyas College of Engineering Florida Atlantic University Boca Raton, Florida 33431 {msubrama@cse.fau.edu, ilyas@fau.edu} Abstract Many
More informationCo-Existence of WirelessHART with other Wireless Technologies
Co-Existence of WirelessHART with other Wireless Technologies HCF_LIT-122 Rev. 1.0 Date of Publication: March 9, 2010 Contributors: Gareth Johnston, ABB; Jim Cobb, Emerson Process Management; Eric Rotvold,
More informationSensor Application for Museum Guidance
Sensor Application for Museum Guidance Radka Dimitrova a a TU,Dresden, Germany, e-mail: dimitrova@ifn.et.tu-dresden.de Abstract - This article examines the conditions for successful communication and power
More informationAdvanced Mobile Computing and Networking - CS 560. Wireless Technologies. Bluetooth. Bluetooth. Bluetooth. Bluetooth 7/3/2014.
Advanced Mobile Computing and Networking - CS 560 Assessment CA 40% - Assignment 20% - 2 Tests 10% each Exam 60% Wireless Technologies, Infrared Data Association (),, and Institute of Electrical and Electronic
More informationBluetooth Tutorial. Bluetooth Introduction. Bluetooth Technology
Bluetooth Tutorial Bluetooth strives to remove the never ending maze of wires which provide a communication link between different electronic devices, through a short range wireless solution. Consider
More informationMOBILE COMPUTING. Jan-May,2012. ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala.
WPAN: Bluetooth MOBILE COMPUTING Jan-May,2012 ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala Email-alakroy.nerist@gmail.com EM Spectrum ISM band 902 928 Mhz 2.4 2.4835 Ghz 5.725 5.85 Ghz LF MF
More informationEmploying Wireless Bluetooth for C 3 in Industrial Automation C. Norz C. Miller
1 Employing Wireless Bluetooth for C 3 in Industrial Automation C. Norz C. Miller Abstract: This paper discusses the use of wireless Bluetooth for controllerto-controller coordination (C 3 ) within industrial
More informationRab Nawaz Jadoon (Assistant Professor) Department of Computer Science COMSATS University, Abbottabad, Pakistan
Rab Nawaz Jadoon (Assistant Professor) Department of Computer Science COMSATS University, Abbottabad, Pakistan rabnawaz@ciit.net.pk 1 TABLE OF CONTENTS 1. Introduction... 3 1.1 History... 3 1.2 Bluetooth
More information12/2/09. Mobile and Ubiquitous Computing. Bluetooth Networking" George Roussos! Bluetooth Overview"
Mobile and Ubiquitous Computing Bluetooth Networking" George Roussos! g.roussos@dcs.bbk.ac.uk! Bluetooth Overview" A cable replacement technology! Operates in the unlicensed ISM band at 2.4 GHz! Frequency
More informationModulation. Propagation. Typical frequency bands
References Wireless Technology 2 AT THE END OF THIS SECTION, YOU SHOULD HAVE AN UNDERSTANDING OF THE UNDERLYING WIRELESS TECHNOLOGIES. The physical layer provides mechanical, electrical, l functional,
More informationAT THE END OF THIS SECTION, YOU SHOULD HAVE AN UNDERSTANDING OF THE
Wireless Technology AT THE END OF THIS SECTION, YOU SHOULD HAVE AN UNDERSTANDING OF THE UNDERLYING WIRELESS TECHNOLOGIES. References 2 The physical layer provides mechanical, electrical, l functional,
More informationModule 5. Embedded Communications. Version 2 EE IIT, Kharagpur 1
Module 5 Embedded Communications Version 2 EE IIT, Kharagpur 1 Lesson 27 Wireless Communication Version 2 EE IIT, Kharagpur 2 Instructional Objectives After going through this lesson the student would
More informationSeminar: Mobile Systems. Krzysztof Dabkowski Supervisor: Fabio Hecht
Personal Area Networks Seminar: Mobile Systems November 19th 2009 Krzysztof Dabkowski Supervisor: Fabio Hecht Agenda Motivation Application areas Historical and technical overview Security issues Discussion
More informationEthernet. Lecture 6. Outline. Ethernet - Physical Properties. Ethernet - Physical Properties. Ethernet
Lecture 6 Ethernet Reminder: Homework 2, Programming Project 2 due on 9/20/12. Thick-net Thin-net Twisted Pair Thursday, September 13 CS 475 Networks - Lecture 6 1 Thursday, September 13 CS 475 Networks
More informationA Wireless Identification System to Assist Sight- Constrained People
A Wireless Identification System to Assist Sight- Constrained People Dec06-06 5 December 2006 Client: Mr. Curtis Chong Iowa Department for the Blind Faculty Advisor: Dr. Zhengdao Wang Team: Jerad Harmsen
More informationMobile Hands Free Operation. Ontario Regulation 366/09
Mobile Hands Free Operation Ontario Regulation 366/09 Display screen visible to driver prohibited 78. (1) No person shall drive a motor vehicle on a highway if the display screen of a television, computer
More informationWireless LAN. Access Point. Provides network connectivity over wireless media
LAN Technologies 802.11 Wireless LAN Network connectivity to the legacy wired LAN Access Point Desktop with PCI 802.11 LAN card Laptop with PCMCIA 802.11 LAN card Provides network connectivity over wireless
More informationBluetooth: Short-range Wireless Communication
Bluetooth: Short-range Wireless Communication Wide variety of handheld devices Smartphone, palmtop, laptop Need compatible data communication interface Complicated cable/config. problem Short range wireless
More informationImplementing A Bluetooth Stack on UEFI
Implementing A Bluetooth Stack on UEFI Tony C.S. Lo Senior Manager American Megatrends Inc. presented by UEFI Plugfest October 2014 Agenda Introduction Bluetooth Architecture UEFI Bluetooth Stack Summary
More informationCommunication Systems. WPAN: Bluetooth. Page 1
Communication Systems WPAN: Bluetooth Page 1 Outline Historical perspective Piconet Scatternet Lattency modes Applications Page 2 Bluetooth Bluetooth (BT) wireless technology is a short-range communications
More informationLecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15
Lecture 23 Overview Last Lecture ADSL, ATM This Lecture Wireless Technologies (1) Wireless LAN, CSMA/CA, Bluetooth Source: chapters 6.2, 15 Next Lecture Wireless Technologies (2) Source: chapter 16, 19.3
More informationCryptographic Concepts
Outline Identify the different types of cryptography Learn about current cryptographic methods Chapter #23: Cryptography Understand how cryptography is applied for security Given a scenario, utilize general
More informationBut where'd that extra "s" come from, and what does it mean?
SSL/TLS While browsing Internet, some URLs start with "http://" while others start with "https://"? Perhaps the extra "s" when browsing websites that require giving over sensitive information, like paying
More informationThe 8 th International Scientific Conference DEFENSE RESOURCES MANAGEMENT IN THE 21st CENTURY Braşov, November 14 th 2013
The 8 th International Scientific Conference DEFENSE RESOURCES MANAGEMENT IN THE 21st CENTURY Braşov, November 14 th 2013 Florin OGÎGĂU-NEAMŢIU National Defense University of Romania "Carol I"/ The Regional
More informationBlueSerial. Bluetooth Serial RS232 Port Adapters. User Manual HANTZ + PARTNER. The Upgrade Company!
Bluetooth Serial RS232 Port Adapters User Manual HANTZ + PARTNER The Upgrade Company! www.hantz.com Deutschland: Tel.: 0761 / 59 21 00 Fax: 0761 / 58 52 28 Schweiz: Tel.: 061 / 27 311-31 Fax: 061 / 27
More informationWireless Communications
4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:
More informationTable Contents. Introduction Key Features...2. Getting Started Package Contents...3. Minimum System Requirements...3
1 Table Contents Introduction... 2 Key Features...2 Getting Started... 3 Package Contents...3 Minimum System Requirements...3 Driver Installation...3 Applications Installed...7 BlueSoleil... 8 Main Windows...8
More informationLogitech Advanced 2.4 GHz Technology With Unifying Technology
Logitech Advanced 2.4 GHz Technology Revision 070709 December 8, 2009 TABLE OF CONTENTS 1 INTRODUCTION: THE MOVE TO WIRELESS PERIPHERALS IN BUSINESS... 3 2 SYSTEM OVERVIEW... 4 2.1 NETWORK TOPOLOGY...4
More informationBluetooth Wireless Technology meets CAN
Bluetooth Wireless Technology meets CAN Matthias Fuchs esd electronic system design GmbH, Hannover, Germany To access mobile and moving CAN fieldbus systems a wireless approach is often a good solution.
More informationA Study Wireless Communication Domain
A Study Wireless Communication Domain Sangram Routray 1, Sanjib k. Nayak 2 Lalit M. Satapathy 1 1 Department of Electronics and Communication Engg. KIST,Bhubaneswar 2 Department of Computer science and
More informationWireless Sensor Networks CS742
Wireless Sensor Networks CS742 Outline Overview Environment Monitoring Medical application Data-dissemination schemes Media access control schemes Distributed algorithms for collaborative processing Architecture
More informationMessage acknowledgement and an optional beacon. Channel Access is via Carrier Sense Multiple Access with
ZigBee IEEE 802.15.4 Emerging standard for low-power wireless monitoring and control Scale to many devices Long lifetime is important (contrast to Bluetooth) 10-75m range typical Designed for industrial
More informationInterference Mitigation Technique for Performance Enhancement in Coexisting Bluetooth and WLAN
2012 International Conference on Information and Computer Networks (ICICN 2012) IPCSIT vol. 27 (2012) (2012) IACSIT Press, Singapore Interference Mitigation Technique for Performance Enhancement in Coexisting
More informationWireless Terms. Uses a Chipping Sequence to Provide Reliable Higher Speed Data Communications Than FHSS
How to Set Up a Secure Home Wireless Network What you don t know about setting up a home wireless network can hurt you. 2008 APCUG Convention Session Tom Jones, P.E., RCDD-NTS CQS-CWLSS AGENDA Some Terms
More informationWireless Networked Systems
Wireless Networked Systems CS 795/895 - Spring 2013 Lec #7: Medium Access Control WPAN, Bluetooth, ZigBee Tamer Nadeem Dept. of Computer Science Bluetooth Page 2 Spring 2013 CS 795/895 - Wireless Networked
More informationInstitute of Electrical and Electronics Engineers (IEEE) IEEE standards
HW Institute of Electrical and Electronics Engineers (IEEE) IEEE 802.11 standards WLAN Standard (IEEE 802.11) The IEEE 802.11 is a family of standards that governs the operations and functions of WLANs.
More informationCHAPTER 3 BLUETOOTH AND IEEE
CHAPTER 3 BLUETOOTH AND IEEE 802.15 These slides are made available to faculty in PowerPoint form. Slides can be freely added, modified, and deleted to suit student needs. They represent substantial work
More informationA Survey on Security Threats and Vulnerability attacks on Bluetooth Communication
A Survey on Security Threats and Vulnerability attacks on Bluetooth Communication Trishna Panse #, Prashant Panse * # Department of Information Technology, RGPV Sushila Devi Bansal College of Technology,
More informationZigBee----free as a bee!
ZigBee----free as a bee! ZigBee is the perfect wireless solution for industrial control, medical purposes, alarm systems, building automation, and so many others. You just name it! ICP DAS releases the
More informationLevelOne BLH-1000 Bluetooth Headset User s Manual
LevelOne BLH-1000 Bluetooth Headset User s Manual - 1 - Introduction Introduction to Bluetooth Wireless Technology Bluetooth is a short- range wireless communication technology. It allows wireless connections
More information3Com Wireless Bluetooth PC Card, USB Adapter, and Printer Adapter
DATA SHEET 3Com Wireless Bluetooth PC Card, USB Adapter, and Printer Adapter Key Benefits Simplicity Bluetooth Connection Manager provides automatic discovery and point-and-click management of devices,
More informationLecture 6. Reminder: Homework 2, Programming Project 2 due on Thursday. Questions? Tuesday, September 13 CS 475 Networks - Lecture 6 1
Lecture 6 Reminder: Homework 2, Programming Project 2 due on Thursday. Questions? Tuesday, September 13 CS 475 Networks - Lecture 6 1 Outline Chapter 2 - Getting Connected 2.1 Perspectives on Connecting
More informationSecurity Overview of Bluetooth
Security Overview of Bluetooth Dave Singelée, Bart Preneel COSIC Internal Report June, 2004 Abstract In this paper, we give a short overview of the security architecture of Bluetooth. We will especially
More informationWIRELESS SENSOR NETWORK
1 WIRELESS SENSOR NETWORK Dr. H. K. Verma Distinguished Professor (EEE) Sharda University, Greater Noida (Formerly: Deputy Director and Professor of Instrumentation Indian Institute of Technology Roorkee)
More informationCase study of Wireless Technologies in Industrial Applications
International Journal of Scientific and Research Publications, Volume 7, Issue 1, January 2017 257 Case study of Wireless Technologies in Industrial Applications Rahul Hanumanth Rao Computer Information
More informationBluetooth Demystified
Bluetooth Demystified S-72.4210 Postgraduate Course in Radio Communications Er Liu liuer@cc.hut.fi -10 Content Outline Bluetooth History Bluetooth Market and Applications Bluetooth Protocol Stacks Radio
More informationUnit title: Mobile Technology: Device Connectivity (SCQF level 5) Outcome 1
1 Outcome 1 A description of mobile device internet connectivity using two current Wi-Fi methods. A description of mobile device internet connectivity using two current GSM mobile telephony methods. A
More informationSE 4C03 Winter 2005 Bluetooth Wireless Network Technology
SE 4C03 Winter 2005 Bluetooth Wireless Network Technology Researcher: Daren Tan Shen Hau Last Revised: April 4, 2005 Bluetooth As everyone will ask, what is Bluetooth? Bluetooth is a new technology that
More informationBy N.Golmie Presented by: Sushanth Divvela
By N.Golmie Presented by: Sushanth Divvela 1 Agenda Introduction WPAN WLAN Simulation Models Simulation results Concluding remarks 2 Introduc.on Coexistence of WPAN and WLAN Performance evaluation WLAN
More informationOutline. Performance Evaluation of Traffic in a Interfering Wireless LANs Environment for Bluetooth and IEEE
Performance Evaluation of Traffic in a Interfering Wireless LANs Environment for Bluetooth and IEEE 82.11 Wuyi YUE, Koichi HATOGAI, Koji MIYAZAKI and Shinya OOKA Department of Information Science and Systems
More informationWireless Local Area Networks (WLAN)
Department of Computer Science Institute for System Architecture, Chair for Computer Networks Wireless Local Area Networks (WLAN) Mobile Communication and Mobile Computing Prof. Dr. Alexander Schill http://www.rn.inf.tu-dresden.de
More informationComparative Analysis of ZigBee, WLAN and Bluetooth System and its Throughput Enhancement
Comparative Analysis of ZigBee, WLAN and Bluetooth System and its Throughput Enhancement Ms. Hina Dhiman Dept. of Electronics and Telecommunication Sinhgad College of Engineering Pune, India Prof. Mrs.
More informationExtending or Interconnecting LANS. Physical LAN segment. Virtual LAN. Forwarding Algorithm 11/9/15. segments. VLAN2, Port3. VLAN1, Port1.
Physical LAN segment q Hosts connected on the same physical LAN segment q Same subnet; L2 forwarding q ARP (IPè MAC) L2 frame (S, D), send q Scale? Extending or Interconnecting LANS q q q Why not just
More informationBy FaaDoOEngineers.com
ABSTRACT The seemingly endless entanglement of data wires connecting today s electronic devices has become slightly less jumbled with the introduction of Bluetooth technology and the creation of a wireless
More informationITP 140 Mobile Applications Technologies. Networks
ITP 140 Mobile Applications Technologies Networks A First Look Under the Hood 2 3 Communication Channels Mediums for transporting data from one system to another Physical Twisted Pair (CAT-3, CAT-5/6)
More informationWireless LANs/data networks
RADIO SYSTEMS - ETIN15 Lecture no: 12 Wireless LANs/data networks Ove Edfors, Department of Electrical and Information Technology Ove.Edfors@eit.lth.se 2016-05-03 Ove Edfors - ETIN15 1 Centralized and
More informationBluetooth Communications App Using App Inventor
ABSTRACT 2016 IJSRST Volume 2 Issue 6 Print ISSN: 2395-6011 Online ISSN: 2395-602X Themed Section: Science and Technology Bluetooth Communications App Using App Inventor N. Anju Latha, B. Rama Murthy Department
More informationWireless technology Principles of Security
Wireless technology Principles of Security 1 Wireless technologies 2 Overview This module provides an introduction to the rapidly evolving technology of wireless LANs (WLANs). WLANs redefine the way the
More information