In 1994, a team of researcher from Ericsson Mobile, led by Jaap Haartsen and Dr. Sven Mattisson, did a study on the feasibility of wireless connectivity at low power, eliminating the cable, which is then developed in Bluetooth technology in September 1998 by Bluetooth Special Interest Group (SIG). Ericsson, IBM, Intel, Nokia and Toshiba were the founding members of SGI.
Technical Detail
Bluetooth uses short-range radio frequency (RF) to transmit voice and data ranging from 2402 GHz. at 2480 GHz, a frequency reserved for medical applications, industrial and scientific equipment. The scope of the device is about 10 meters, while the vast power of Bluetooth will range of 100m. It is very different for the interference with other radio frequency (RF) devices for the following reasons:
* It switches to a frequency rate 1600hops/sec.
* The data packets are very small.
Each Bluetooth devices can communicate with up to seven other transmission devices within its radius.
The Bluetooth power consumption is low compared to other devices such as wireless Bluetooth radios draw 0.3mA in standby mode and 30 mA when transmitting data.
Bluetooth version 1.2 used to transmit 1 Mbps, then it increases significantly up to 3 Mbps in version 2.0. Under the new specification, Bluetooth 3.0 adopt ultra-wideband (UWB) radio technology. This will allow a very fast data transfer up to 480 Mbit / s.
How does it work?
The conversation is automatically mails between Bluetooth devices that are within their range. Once the network is established and the conversation takes place, they create a Personal-Area Network (PAN), commonly known as Piconet. If you have several components, for example, a Bluetooth, mobile phone, personal computer, mouse and printer, each of them their own form Piconet. All devices have their own range of addresses. When a computer is turned on, it sends signals to demand answers from other devices with an address. Since the mobile phone at this address, it responds and sets up a network. Even if it receives signals from other systems, it is not known because it does not belong to the same network. As mentioned above, it is very unlikely that the two networks have the same frequency at the same time.
Bluetooth Applications
Bluetooth applications include:
* The wireless networking between computers
* Wireless communication between the computer input and output devices
* Internet access computers and PDAs using mobile phones
* Control and wireless communication between mobile phone and hands free.
Security
In the wireless connection is involved, security is a major problem. Bluetooth operates on three different models of security:
* Model 1: No security required, ie no authorization or authentication is required
* Model 2: Ensuring security in the level of service once the channel is established, ie no permission is required, only authentication is required
* Model 3: Ensure the security level in the bond before the channel is established, that is to say two authorization and authentication is required.
When using Bluetooth allows the user if "non-discoverable" mode, it will prevent the connection to other Bluetooth devices. There are three major threats to use this technology:
* Bluejacking: Bluetooth, allowing the user to send business cards to other users within Bluetooth 10m. Radius
* Bluebugging: Allow hackers access to other remote phone and its functionality.
* Car Whisper: Allow hackers to send audio to other audio and receive from others.
Using devices at home is a good way to avoid security breaches in public.
Conclusion
Bluetooth technology is already widely used in industry as it has the ability to manage voice and data simultaneously. It allows end users to enjoy a variety of technological innovations such as wireless printing and faxing, hands free, and synchronization, and mobile phones. The future of Bluetooth technology is the quality of service, enabling high-quality audio and video data transfer, providing greater bandwidth and greater distance in a highly secure environment.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment