Upload
maddy125
View
70
Download
2
Embed Size (px)
DESCRIPTION
Bluetooth IN OUR life, technology,use,bluetooth
Citation preview
Bluetooth TechnologyBluetooth Technology
ByBy
MADHURESH MADHUKARMADHURESH MADHUKAR
ECONOMICS (H)ECONOMICS (H)
ROLL-7059 ROLL-7059
IntroductionIntroduction
•What is Bluetooth?What is Bluetooth?
•What does it do?What does it do?
Introduction (cont’d)Introduction (cont’d)
• Is Bluetooth here to stay?Is Bluetooth here to stay?
•What should we expect from What should we expect from Bluetooth in the future?Bluetooth in the future?
What Bluetooth Delivers to What Bluetooth Delivers to the end-userthe end-user
• Connects a wide range of computing Connects a wide range of computing and telecommunication devicesand telecommunication devices
• Expand communication capabilitiesExpand communication capabilities
• Devices can communicate with each Devices can communicate with each other with wireless connectivityother with wireless connectivity
User ApplicationUser Application
• Car manufactures Industry Car manufactures Industry
• E-Mail / Internet / Intranet AccessE-Mail / Internet / Intranet Access
• HeadsetsHeadsets
• Bluetooth will facilitate Local Area Bluetooth will facilitate Local Area NetworksNetworks
Bluetooth in ActionBluetooth in Action
Source: http//:www.motorola.com
In the Office ...In the Office ...In the houseIn the house
Home SecurityHome Security On the RoadOn the Road
Source: http//:www.motorola.com
On your CarOn your Car
Source: http//:www.motorola.com
Bluetooth Bluetooth SpecificationsSpecifications
•Things that you must have:Things that you must have:– Transceivers and Receivers that Transceivers and Receivers that
can send and receive data can send and receive data because they use because they use Radio Radio Waves.Waves.
– PIN Number PIN Number •To identify the user using the To identify the user using the device.device.
Bluetooth SecurityBluetooth Security
• ModesModes– Security Mode 1Security Mode 1
•No SecurityNo Security
– Security Mode 2Security Mode 2•Service Level Enforced SecurityService Level Enforced Security• Implemented after channel is establishedImplemented after channel is established
– Security Mode 3Security Mode 3•Link Level Enforced Security Link Level Enforced Security
DevicesDevices
• ““Trusted”Trusted”– No RestrictionsNo Restrictions
• ““Untrusted”Untrusted”– Restrictions, Access is limitedRestrictions, Access is limited
Service LevelsService Levels
• Authorization and AuthenticationAuthorization and Authentication
• Authentication OnlyAuthentication Only
• Open to all DevicesOpen to all Devices
Bluetooth Secure Enough?Bluetooth Secure Enough?
• Not enough for confidential and top Not enough for confidential and top secret information now but . . . secret information now but . . .
• Security will ImproveSecurity will Improve– Improve exisiting securityImprove exisiting security– Implement new securityImplement new security
For More Information Please For More Information Please Visit The Following SitesVisit The Following Sites REFERENCES
•www.motorola.com
•www.xircom.com
•www.palowireless.com
•www.bluetooth.com