SlideShare une entreprise Scribd logo
1  sur  44
What is Bluetooth
Bluetooth is a wireless technology used to transfer data between
different electronic devices. The distance of data transmission is small in
comparison to other modes of wireless communication. This technology
eradicates the use of cords, cables, adapters and permits the electronic
devices to communicate wirelessly among each other.
Bluetooth is a high-speed, low-power microwave wireless link
technology, designed to connect phones, laptops, PDAs and other
portable equipment together with little or no work by the user.
History Of Bluetooth:
• Bluetooth was invented in 1994 by Ericsson. The company
later started working with a larger group of companies
called the Special Interests Group, or "SIG," to develop
the technology into what it is today. Bluetooth is not
owned by any one company and is developed and
maintained by SIG.
The name Bluetooth came from a code
name originally used by SIG for the
project and is a reference to a 10th
century Danish king named Harold
Bluetooth, who was responsible for
uniting Norway, Sweden, and Denmark
Bluetooth Technology
• It comprises of a base band processor, a radio and an antenna. Bluetooth
uses FHSS to avoid any interference. A Bluetooth channel is divided into
time slots each 625 micro second in length. The devices hop through these
timeslots making 1600 hops per second. This trades bandwidth efficiency
for reliability, integrity and security
• The radio uses Frequency Hopping to spread the energy across the ISM
spectrum in 79 hops displaced by 1MHz, starting at 2.402GHz and
stopping at 2.480GHz.
Bluetooth Technology
Documentation on Bluetooth is divided into two sections, the Bluetooth
Specification and Bluetooth Profiles.
•The Specification describes how the technology works (i.e. the
Bluetooth protocol architecture),
•The Profiles describe how the technology is used (i.e. how different
parts of the specification can be used to fulfill a desired function for a
Bluetooth device).
The range for Bluetooth communication is 0-30 feet (10 meters)
with a power consumption of 0dBm (1mW). This distance can be
increased to 100 meters by amplifying the power to 20dBm. The
Bluetooth radio system is optimized for mobility.
Bluetooth Applications
•File transfer
•Ad-hoc networking: Communicating devices can spontaneously form a
community of networks that persists only as long as it's needed
•Device synchronization: Seamless connectivity among PDAs, computers,
and mobile phones allows applications to update information on multiple
devices automatically when data on any one device changes.
•Peripheral connectivity.
•Car kits: Hands-free packages enable users to access phones and other
devices without taking their hands off the steering wheel
•Mobile payments: Your Bluetooth-enabled phone can communicate with
a Bluetooth-enabled vending machine to buy a can of Diet Pepsi, and put
the charge on your phone bill.
Bluetooth Limitations
 Data sent between two Bluetooth devices is very slow compared with
Wi-Fi transfer Rate.
 Range Of a Bluetooth Device is 15-30 feet depending upon the Device.
 Security is Biggest Disadvantage as transfer takes place through radio
waves and a hacker can easily hack it.
 Battery usage is also a problem, it will make device out of power before
it would have if Bluetooth was not powered on.
Bluetooth Radio Link
Bluetooth Networking
Bluetooth supports both unicast (point-to-point) and multicast (point-to-multipoint)
connections. Bluetooth protocol uses the concept of master and slave. In a master slave
protocol a device cannot talk as and when they desire. They need to wait till the time the
master allows them to talk.
The master and slaves together form
a piconet. Up to seven “slave” devices can
be set to communicate with a “master”.
Several of these piconets can be linked
together to form a larger network in
adhoc manner.
A network of piconets is called
scatternet. A scatternet is formed when a
device from one piconet also acts as a
member of another piconet. In this
scheme, a device being master in one
piconet can simultaneously be slave in
other one.
Bluetooth Protocol Stack
Bluetooth Protocol Stack
Bluetooth protocol stack can be divided into four basic layers according to their
functions. These are:
 Bluetooth Core Protocols
• Baseband
• Link Manager Protocol (LMP)
• Logical Link Control and Adaptation Protocol (L2CAP)
• Service Discovery Protocol (SDP)
 Cable Replacement Protocol
• RFCOMM
 Telephony Control Protocol
• Telephony Control Protocol Binary
• AT- Commands
 Adapted Protocols
• PPP Bluetooth
• TCP/IP
• OBEX Protocol
• Content Formats
Bluetooth Protocols
Radio - Specifies details of the air interface, including frequency, the use of frequency
hopping, modulation scheme, and transmit power.
Baseband - Concerned with connection establishment within a piconet, addressing,
packet format, timing, and power control. The Baseband and Link Control Layer enable
the physical RF link between Bluetooth units forming a piconet. This layer uses inquiry
and paging procedures to synchronize the transmission with different Bluetooth devices.
It provides 2 different kind of physical links with their corresponding baseband
packets, Synchronous Connection-Oriented (SCO) and Asynchronous Connectionless
(ACL) which can be transmitted in a multiplexing manner on the same RF link. ACL packets
are used for data only, while the SCO packet can contain audio only or a combination of
audio and data. All audio and data packets can be provided with different levels of FEC or
CRC error correction and can be encrypted.
Audio - Audio data can be transferred between one or more Bluetooth devices, making
various usage models possible and audio data in SCO packets is routed directly to and
from Baseband and it does not go through L2CAP.
Bluetooth Protocols
Link manager protocol (LMP) - Responsible for link setup between Bluetooth devices and
ongoing link management. This includes security aspects such as authentication and
encryption negotiation of baseband packet sizes. It also controls the power modes,
connection state and duty cycles of Bluetooth devices in a piconet.
Logical link control and adaptation protocol (L2CAP) - Adapts upper-layer protocols to
the baseband layer. This layer is responsible for segmentation of large packets and the
reassembly of the fragmented packets. L2CAP is also responsible for multiplexing of
Bluetooth packets from different applications.
Service discovery protocol (SDP) - Device information, services, and the characteristics of
the services can be queried to enable the establishment of a connection between two or
more Bluetooth devices.
Host Controller Interface (HCI) - The Host Controller Interface, HCI, provides a uniform
interface method for accessing the Bluetooth hardware capabilities. It contains a
command interface to the Baseband controller and link manager and access to hardware
status. Finally, it contains control and event registers.
Bluetooth Protocols
RFCOMM - It is a serial line communication protocol and is based on ETSI 07.10
specification. The “cable replacement” protocol emulates EIA - 232 (RS-232)
control and data signals over Bluetooth baseband protocol.
TCS BIN (telephony control specification binary) - It is a bit-oriented protocol
that defines the call control signaling for the establishment of speech and data
calls between Bluetooth devices. It also defines mobility-management
procedures for handling groups of Bluetooth TCS devices.
AT-Commands - this protocol defines a set of AT-commands by which a mobile
phone can be used and controlled as a modem for fax and data transfers.
AT(attention) commands are used from a computer or DTE (Data Terminal
Equipment) to control a modem or DCE (Data Circuit Terminating Equipment).
Bluetooth Protocols
The adopted protocols are defined in specifications issued by other standards-
making organizations and incorporated into the overall Bluetooth architecture.
The Bluetooth strategy is to invent only necessary protocols and use existing
standards whenever possible. These are the adopted protocols:
 PPP - The point-to-point protocol is an Internet standard protocol for
transporting IP datagrams over a point-to-point link
 TCP/UDP/IP - These are the foundation protocols of the TCP/IP protocol suite;
 OBEX - The object exchange protocol is a session-level protocol developed by
the Infrared Data Association (IrDA) for the exchange of objects. OBEX provides
functionality similar to that of HTTP, but in a simpler fashion. It also provides a
model for representing objects and operations.
 Content Formats - Examples of content formats transferred by OBEX are vCard
and vCalendar, which provide the format of an electronic business card and
personal calendar entries and scheduling information, respectively.
 WAE/WAP - Bluetooth incorporates the wireless application environment and
the wireless application protocol into its architecture.
A number of usage models are defined in Bluetooth profile documents. In essence, a usage model is a set
of protocols that implement a particular Bluetooth-based application. Each profile defines the protocols
and protocol features supporting a particular usage model. Following are the highest-priority usage
models:
File transfer - The file transfer usage model supports the transfer of directories, files, documents,
images, and streaming media formats. This usage model also includes the capability to browse folders on
a remote device;
Internet bridge - With this usage model, a PC is wirelessly connected to a mobile phone or cordless
modem to provide dial-up networking and fax capabilities. For dial-up networking, AT commands are used
to control the mobile phone or modem, and another protocol stack (such as PPP over RFCOMM) is used
for data transfer. For fax transfer, the fax software operates directly over RFCOMM;
LAN access - This usage model enables devices on a piconet to access a LAN. Once connected, a
device functions as if it were directly connected (wired) to the LAN;
Synchronization - This model provides a device-to-device synchronization of PIM (personal
information management) information, such as phone book, calendar, message, and note information.
IrMC (Ir mobile communications) is an IrDA protocol that provides client/server capability for transferring
updated PIM information from one device to another;
Three-in-one phone - Telephone handsets that implement this usage model may act as a cordless
phone connecting to a voice base station, as an intercom device for connecting to other telephones, and
as a cellular phone;
Headset - The headset can act as a remote device's audio input and output interface.
Bluetooth Usage Models
Bluetooth offers security infrastructure starting from authentication, key
exchange to encryption. In addition to encryption, a frequency-hopping
scheme with 1600 hops/sec is employed. All of this makes the system
difficult to eavesdrop.
The main security features offered by Bluetooth include a challenge
response routine for authentication, a stream cipher for encryption, and a
session key generation. Each connection may require a one-way, two-way,
or no authentication using the challenge-response routine. The security
algorithms use the public identity of a device, a secret private user key, and
an internally generated random key as input parameters
 The first step, called pairing, is necessary if two Bluetooth devices have never
met before. To set up trust between the two devices a user can enter a secret
PIN into both devices. This PIN can have a length of up to 16 byte.
 Based on the PIN, the device address, and random numbers, several keys can
be computed which can be used as link key for authentication. The
authentication is a challenge-response process based on the link key, a
random number generated by a verifier (the device that requests
authentication), and the device address of the claimat (the device that is
authenticated).
 Based on the link key, and again a random number an encryption key is
generated during the encryption stage of the security architecture. This key
has a maximum size of 128 bits and can be individually generated for each
transmission.
 Based on the encryption key, the device address and the current clock a
payload key is generated for ciphering user data. The payload key is a stream
of pseudo-random bits. The ciphering process is a simple XOR of the user
data and the payload key.
RFID
Radio transponder (known as RFID tags) carrying an ID
(Identification) can be read through radio frequency (RF) interfaces
 Tag is attached to the object and data within the tag provides
identification for the object
 Object could be an entity in a manufacturing shop, goods in
transit, item in a retail store, a vehicle in a parking lot, a pet, or a
book in a library
Comprises of different functional areas like:
 Means of reading or interrogating the data in the tag
 Mechanism to filter some of the data
 Means to communicate the data in the tag with a host computer
 Means for updating or entering customized data into the tag
Three basic criteria for categorization:
 Frequency
 Application
 Power levels
 Works on six frequencies of 132.4 KHz, 13.56 MHz, 433
MHz, 918 MHz, 2.4 GHz and 5.8 GHz
 Low frequency range tags are slow in data transfer and
suitable for slow moving objects, security access, asset
tracking and animal identification applications
 High frequency range tags offer long reading ranges and
high data transfer speed and are used for fast moving
objects like railway wagon tracking and identification of
vehicles on freeways for automated toll collection
 Higher the frequency, higher the data transfer rates
 Speed of the object and distance to be read determines the
type of tag to be used
 RFID systems follow contact-less and non line-of-sight nature
of the technology
 Tags can be read at high speeds
 RFID tag contains two segments of memory - one segment is
a factory set and used to uniquely identify a tag while the other
one is used by the application
 Read/write capability of a RFID system is an advantage in
interactive applications such as work-in-process or maintenance
tracking
 Two types - Active and Passive tags
 Passive tags are generally in low frequency range
 Tags at higher frequency range can be either active or passive
 Powered by an internal battery and are typically read/write
 Memory can vary from a few bytes to 1MB
 Battery supplied power of an active tag generally gives it a longer
read range
 Greater the size, greater the cost and a limited operational life
 Operate without own power source
 Obtains operating power from the reader’s antenna
 Data within a passive tag is read only and generally cannot be changed during
operation
 Lighter, less expensive and offer a virtually unlimited operational life
 Have shorter read ranges than active tags and require a high powered reader
 Data is usually 32 to 128 bits long
 A transponder programmed with unique information (RFID tag)
 A transceiver with decoder (a reader)
 An antenna or coil
Close proximity passive tags rely on electromagnetic or inductive coupling
techniques whereas active tags are based upon propagating electromagnetic
waves techniques
 Transportation and Logistics
 Manufacturing and Processing
 Security
 Animal tagging
 Retail store and enterprise stores
 Community library
 Time and attendance
 Postal tracking
 Airline baggage reconciliation
 Road toll management
• Wireless PANs (Bluetooth – IEEE
802.15)
– very low range
– wireless connection to printers etc
• Wireless LANs (WiFi – IEEE 802.11)
– infrastructure as well as ad-hoc
networks possible
– home/office networking
• Multihop Ad hoc Networks
– useful when infrastructure not
available, impractical, or expensive
– military applications, emergencies
 Wireless MANs (WiMAX-
802.16)
– Similar to cellular networks
– traditional base station
infrastructure systems
WiMAX or Worldwide Interoperability for Microwave Access, is a wireless Internet
service designed to cover wide geographical areas serving large number of users at
low cost
WiMAX is the synonym given to the IEEE 802.16 standard defining wide area
wireless data networking .
 Also known as Wireless Metropolitan Area Network
(Wireless MAN) and Wireless Microwave Access (WiMAX)
 IEEE 802.16 standard released in April 2002
 Offers an alternative to high bandwidth wired access
networks like fiber optic, cable modems and DSL
 Provides network access to buildings through exterior
antennas communicating with radio base stations
 Networks can be created in just weeks by deploying a
small number of base stations on buildings or poles to
create high capacity wireless access systems
Sub-standards of IEEE 802.16
IEEE 802.16 standardizes the air interface and related functions associated
with WLL. Three working groups have been chartered to produce the following
standards:
IEEE 802.16.1 - Air interface for 10 to 66 GHz
 IEEE 802.16.2 - Coexistence of broadband wireless access systems
 IEEE 802.16.3 - Air interface for licensed frequencies, 2 to 11 GHz
• WiMAX uses microwave radio technology to connect computers to the
internet in place of wired connections such as DSL or cable modems.
• It works very much like cell phone technology in that reasonable proximity
to a base station is required to establish a data link to the Internet.
• Users within 3 to 5 miles of the base station will be able to establish a link
using NLOS technology with data rates as high as 75 Mbps.
IEEE 802.16 standards are concerned with the air interface between a subscriber’s transceiver
station and a base transceiver station. The protocol stack of IEEE 802.16 standard consists of
two main layers: Medium Access Control (MAC) layer and Physical (PHY) layer. The MAC layer
is subdivided into three sub-layers, namely Service Specific Convergence Sub-layer (CS),
Common Part Sub-layer (CPS) and Security Sub-layer (SS)
 The Physical Layer
 MAC Layer
 Convergence Layer
 Specifies the frequency band, the modulation scheme, error-correction
techniques, synchronization between transmitter and receiver, data rate and
the multiplexing structure.
 The PHY layer receives MAC frames and then transmits them through
coding and modulation of radio frequency signals. It supports Frequency
Division Duplexing (FDD) and Time Division Duplexing (TDD).
802.16 uses both licensed and unlicensed 2 – 11 GHz bands driven by the
need for non line-of-sight operation.
 Three physical layers for services:
• Wireless MAN-SC2: Uses a single carrier modulation format. This is to
support existing networks and protocols
• Wireless MAN-OFDM: Uses OFDM with a 256-point transform. Acess is by
TDMA. This is mandatory for license-exempt bands
• Wireless MAN-OFDMA: Uses OFDM with a 2048-point transform. Here
multiple access is provided by addressing a sub-set of the multiple carriers
to individual receivers.
• The main part of the IEEE 802.16 standard is common part sub-layer
which is responsible for bandwidth allocation, connection
management, scheduling, connection control, automatic repeat request
and QoS enforcement
• Designed for point-to-multipoint broadband wireless access
• Addresses the need for very high bit rates, both uplink (to the base
station) and downlink (from the base station)
• Services like multimedia and voice can run, as 802.16 MAC is equipped
to accommodate both continuous and bursty traffic
 Provides functions specific to the service being provided
 Bearer services include digital audio/video multicast, digital
telephony, ATM, Internet access, wireless trunks in telephone
networks and frame relay
The service specific convergence sub-layer communicates with
higher layers and receives packets from them and then do some
specific functions like packet/frame classification and header
suppression. Next, it encapsulates these packets into MAC Service
Data Unit (MAC SDU) format, and then distributes MAC SDUs to
common part sub-layer. Asynchronous Transfer Mode (ATM)
convergence and packet convergence sub-layers are two types of
service specific convergence sub-layer. The ATM convergence sub-
layer is used for ATM networks, and the packet convergence sub-
layer is used for packet services like Ethernet, IPv4 and IPv6
Bluetooth, RFID and WiMAX Technologies
Bluetooth, RFID and WiMAX Technologies
Bluetooth, RFID and WiMAX Technologies

Contenu connexe

Tendances

2.1 introduction to cellular architecture
2.1   introduction to cellular architecture2.1   introduction to cellular architecture
2.1 introduction to cellular architectureJAIGANESH SEKAR
 
Presentation on 1G/2G/3G/4G/5G/Cellular & Wireless Technologies
Presentation on 1G/2G/3G/4G/5G/Cellular & Wireless TechnologiesPresentation on 1G/2G/3G/4G/5G/Cellular & Wireless Technologies
Presentation on 1G/2G/3G/4G/5G/Cellular & Wireless TechnologiesKaushal Kaith
 
Wireless communication
Wireless communicationWireless communication
Wireless communicationDarshan Maru
 
Wireless network ppt
Wireless network pptWireless network ppt
Wireless network pptBasil John
 
Wireless local loop
Wireless local loopWireless local loop
Wireless local loopSANJUU7
 
Transport layer services
Transport layer servicesTransport layer services
Transport layer servicesMelvin Cabatuan
 
Phase Shift Keying & π/4 -Quadrature Phase Shift Keying
Phase Shift Keying & π/4 -Quadrature Phase Shift KeyingPhase Shift Keying & π/4 -Quadrature Phase Shift Keying
Phase Shift Keying & π/4 -Quadrature Phase Shift KeyingNaveen Jakhar, I.T.S
 
Communication technologies
Communication technologiesCommunication technologies
Communication technologiesFabMinds
 
Analysis of 1G, 2G, 3G & 4G
Analysis of 1G, 2G, 3G & 4GAnalysis of 1G, 2G, 3G & 4G
Analysis of 1G, 2G, 3G & 4GPrateek Aloni
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11Shreejan Acharya
 

Tendances (20)

2.1 introduction to cellular architecture
2.1   introduction to cellular architecture2.1   introduction to cellular architecture
2.1 introduction to cellular architecture
 
Ch4
Ch4Ch4
Ch4
 
Gprs architecture ppt
Gprs architecture pptGprs architecture ppt
Gprs architecture ppt
 
Presentation on 1G/2G/3G/4G/5G/Cellular & Wireless Technologies
Presentation on 1G/2G/3G/4G/5G/Cellular & Wireless TechnologiesPresentation on 1G/2G/3G/4G/5G/Cellular & Wireless Technologies
Presentation on 1G/2G/3G/4G/5G/Cellular & Wireless Technologies
 
Bluetooth Slides
Bluetooth SlidesBluetooth Slides
Bluetooth Slides
 
Wireless communication
Wireless communicationWireless communication
Wireless communication
 
Wireless network ppt
Wireless network pptWireless network ppt
Wireless network ppt
 
Wireless local loop
Wireless local loopWireless local loop
Wireless local loop
 
Bluetooth technology
Bluetooth  technologyBluetooth  technology
Bluetooth technology
 
Multiple access techniques for wireless communications
Multiple access techniques for wireless communicationsMultiple access techniques for wireless communications
Multiple access techniques for wireless communications
 
Physical Layer
Physical LayerPhysical Layer
Physical Layer
 
Transport layer services
Transport layer servicesTransport layer services
Transport layer services
 
Phase Shift Keying & π/4 -Quadrature Phase Shift Keying
Phase Shift Keying & π/4 -Quadrature Phase Shift KeyingPhase Shift Keying & π/4 -Quadrature Phase Shift Keying
Phase Shift Keying & π/4 -Quadrature Phase Shift Keying
 
Computer networks - Channelization
Computer networks - ChannelizationComputer networks - Channelization
Computer networks - Channelization
 
UMTS, Introduction.
UMTS, Introduction.UMTS, Introduction.
UMTS, Introduction.
 
Communication technologies
Communication technologiesCommunication technologies
Communication technologies
 
Analysis of 1G, 2G, 3G & 4G
Analysis of 1G, 2G, 3G & 4GAnalysis of 1G, 2G, 3G & 4G
Analysis of 1G, 2G, 3G & 4G
 
Mobile communication
Mobile communicationMobile communication
Mobile communication
 
Gsm architecture
Gsm architectureGsm architecture
Gsm architecture
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11
 

En vedette

Interfacing two arduino boards using rn 42 bluetooth
Interfacing two arduino boards using rn 42 bluetoothInterfacing two arduino boards using rn 42 bluetooth
Interfacing two arduino boards using rn 42 bluetoothsumit chakraborty
 
Bluetooth Technology In Wireless Communications
Bluetooth Technology In Wireless CommunicationsBluetooth Technology In Wireless Communications
Bluetooth Technology In Wireless Communicationsguestac67362
 
THE TELEVISION SYSTEM IN INDIA
THE TELEVISION SYSTEM IN INDIATHE TELEVISION SYSTEM IN INDIA
THE TELEVISION SYSTEM IN INDIAIshank Ranjan
 
Fiber fabrications
Fiber fabricationsFiber fabrications
Fiber fabricationsSagar Adroja
 
Fire accident avoidance on running train using zigbee wireless sensor network
Fire accident avoidance on running train using zigbee wireless sensor networkFire accident avoidance on running train using zigbee wireless sensor network
Fire accident avoidance on running train using zigbee wireless sensor networkDivakar Triple H
 
An Introduction to BLUETOOTH TECHNOLOGY
An Introduction to BLUETOOTH TECHNOLOGYAn Introduction to BLUETOOTH TECHNOLOGY
An Introduction to BLUETOOTH TECHNOLOGYVikas Jagtap
 
Implementation of Digital Filters
Implementation of Digital FiltersImplementation of Digital Filters
Implementation of Digital Filtersop205
 
Design of IIR filters
Design of IIR filtersDesign of IIR filters
Design of IIR filtersop205
 
Basics of Digital Filters
Basics of Digital FiltersBasics of Digital Filters
Basics of Digital Filtersop205
 
application of fibre optics in communication
application of fibre optics in communicationapplication of fibre optics in communication
application of fibre optics in communicationRimmi07
 
optical fibre ppt for download visit http://nowcracktheworld.blogspot.in/
optical fibre  ppt for download visit http://nowcracktheworld.blogspot.in/optical fibre  ppt for download visit http://nowcracktheworld.blogspot.in/
optical fibre ppt for download visit http://nowcracktheworld.blogspot.in/Ram Niwas Bajiya
 
Rfid ppt 8th sem
Rfid ppt 8th semRfid ppt 8th sem
Rfid ppt 8th semAmit Ranjan
 
Design of FIR filters
Design of FIR filtersDesign of FIR filters
Design of FIR filtersop205
 
Optical fiber communiction system
Optical fiber communiction systemOptical fiber communiction system
Optical fiber communiction systemrahulohlan14
 

En vedette (20)

Interfacing two arduino boards using rn 42 bluetooth
Interfacing two arduino boards using rn 42 bluetoothInterfacing two arduino boards using rn 42 bluetooth
Interfacing two arduino boards using rn 42 bluetooth
 
Bluetooth Technology In Wireless Communications
Bluetooth Technology In Wireless CommunicationsBluetooth Technology In Wireless Communications
Bluetooth Technology In Wireless Communications
 
Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth Technology
 
THE TELEVISION SYSTEM IN INDIA
THE TELEVISION SYSTEM IN INDIATHE TELEVISION SYSTEM IN INDIA
THE TELEVISION SYSTEM IN INDIA
 
Fiber fabrications
Fiber fabricationsFiber fabrications
Fiber fabrications
 
DTH System
DTH SystemDTH System
DTH System
 
Fire accident avoidance on running train using zigbee wireless sensor network
Fire accident avoidance on running train using zigbee wireless sensor networkFire accident avoidance on running train using zigbee wireless sensor network
Fire accident avoidance on running train using zigbee wireless sensor network
 
An Introduction to BLUETOOTH TECHNOLOGY
An Introduction to BLUETOOTH TECHNOLOGYAn Introduction to BLUETOOTH TECHNOLOGY
An Introduction to BLUETOOTH TECHNOLOGY
 
Implementation of Digital Filters
Implementation of Digital FiltersImplementation of Digital Filters
Implementation of Digital Filters
 
3g & 4g technology
3g & 4g technology3g & 4g technology
3g & 4g technology
 
Design of IIR filters
Design of IIR filtersDesign of IIR filters
Design of IIR filters
 
3 g and 4g final ppt
3 g and 4g final ppt3 g and 4g final ppt
3 g and 4g final ppt
 
Basics of Digital Filters
Basics of Digital FiltersBasics of Digital Filters
Basics of Digital Filters
 
Rfid technologies
Rfid technologiesRfid technologies
Rfid technologies
 
application of fibre optics in communication
application of fibre optics in communicationapplication of fibre optics in communication
application of fibre optics in communication
 
OPTICAL FIBER COMMUNICATION PPT
OPTICAL FIBER COMMUNICATION PPTOPTICAL FIBER COMMUNICATION PPT
OPTICAL FIBER COMMUNICATION PPT
 
optical fibre ppt for download visit http://nowcracktheworld.blogspot.in/
optical fibre  ppt for download visit http://nowcracktheworld.blogspot.in/optical fibre  ppt for download visit http://nowcracktheworld.blogspot.in/
optical fibre ppt for download visit http://nowcracktheworld.blogspot.in/
 
Rfid ppt 8th sem
Rfid ppt 8th semRfid ppt 8th sem
Rfid ppt 8th sem
 
Design of FIR filters
Design of FIR filtersDesign of FIR filters
Design of FIR filters
 
Optical fiber communiction system
Optical fiber communiction systemOptical fiber communiction system
Optical fiber communiction system
 

Similaire à Bluetooth, RFID and WiMAX Technologies

Introduction to bluetooth
Introduction to bluetoothIntroduction to bluetooth
Introduction to bluetoothvish0110
 
Protocols in Bluetooth
Protocols in BluetoothProtocols in Bluetooth
Protocols in BluetoothSonali Parab
 
Bluetooth Technology By Volkan Sevindik
Bluetooth Technology By Volkan SevindikBluetooth Technology By Volkan Sevindik
Bluetooth Technology By Volkan Sevindikvsevindik
 
Wireless & Mobile Lecture # 20
Wireless & Mobile Lecture # 20Wireless & Mobile Lecture # 20
Wireless & Mobile Lecture # 20Bit Hacker
 
Blue star seminar report dated 18 march
Blue star seminar report dated 18 marchBlue star seminar report dated 18 march
Blue star seminar report dated 18 marchbhadreshagm
 
Unit 2 bluetooth-iot_complete notes
Unit 2 bluetooth-iot_complete notesUnit 2 bluetooth-iot_complete notes
Unit 2 bluetooth-iot_complete notestathagatanaha3
 
Protols used in bluetooth
Protols used in bluetoothProtols used in bluetooth
Protols used in bluetoothSonali Parab
 
Bluetooth and profiles on WEC7
Bluetooth and profiles on WEC7Bluetooth and profiles on WEC7
Bluetooth and profiles on WEC7gnkeshava
 
Bluetooth versus wi
Bluetooth versus wiBluetooth versus wi
Bluetooth versus wisher1242
 
Bluetooth Intro
Bluetooth IntroBluetooth Intro
Bluetooth Introamit_monty
 
Overview of Bluetooth technology
Overview of Bluetooth technologyOverview of Bluetooth technology
Overview of Bluetooth technologySuman Bhattacharyya
 
Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth TechnologyManish Sharma
 
R K 2 Bluetooth Technologies
R K 2  Bluetooth  TechnologiesR K 2  Bluetooth  Technologies
R K 2 Bluetooth TechnologiesSaurav Kumar
 
A Novel Solution To The Short Range Bluetooth Communication
A Novel Solution To The Short Range Bluetooth Communication   A Novel Solution To The Short Range Bluetooth Communication
A Novel Solution To The Short Range Bluetooth Communication pijans
 

Similaire à Bluetooth, RFID and WiMAX Technologies (20)

Introduction to bluetooth
Introduction to bluetoothIntroduction to bluetooth
Introduction to bluetooth
 
Protocols in Bluetooth
Protocols in BluetoothProtocols in Bluetooth
Protocols in Bluetooth
 
Bluetooth Technology By Volkan Sevindik
Bluetooth Technology By Volkan SevindikBluetooth Technology By Volkan Sevindik
Bluetooth Technology By Volkan Sevindik
 
MC Module 4.docx
MC Module 4.docxMC Module 4.docx
MC Module 4.docx
 
Wireless & Mobile Lecture # 20
Wireless & Mobile Lecture # 20Wireless & Mobile Lecture # 20
Wireless & Mobile Lecture # 20
 
Blue star seminar report dated 18 march
Blue star seminar report dated 18 marchBlue star seminar report dated 18 march
Blue star seminar report dated 18 march
 
Unit 2 bluetooth-iot_complete notes
Unit 2 bluetooth-iot_complete notesUnit 2 bluetooth-iot_complete notes
Unit 2 bluetooth-iot_complete notes
 
Protols used in bluetooth
Protols used in bluetoothProtols used in bluetooth
Protols used in bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth.pptx
Bluetooth.pptxBluetooth.pptx
Bluetooth.pptx
 
Bluetooth and profiles on WEC7
Bluetooth and profiles on WEC7Bluetooth and profiles on WEC7
Bluetooth and profiles on WEC7
 
Bluetooth versus wi
Bluetooth versus wiBluetooth versus wi
Bluetooth versus wi
 
Bluetooth Intro
Bluetooth IntroBluetooth Intro
Bluetooth Intro
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Overview of Bluetooth technology
Overview of Bluetooth technologyOverview of Bluetooth technology
Overview of Bluetooth technology
 
Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth Technology
 
R K 2 Bluetooth Technologies
R K 2  Bluetooth  TechnologiesR K 2  Bluetooth  Technologies
R K 2 Bluetooth Technologies
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
A Novel Solution To The Short Range Bluetooth Communication
A Novel Solution To The Short Range Bluetooth Communication   A Novel Solution To The Short Range Bluetooth Communication
A Novel Solution To The Short Range Bluetooth Communication
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
 

Plus de Mukesh Chinta

CCNA-2 SRWE Mod-10 LAN Security Concepts
CCNA-2 SRWE Mod-10 LAN Security ConceptsCCNA-2 SRWE Mod-10 LAN Security Concepts
CCNA-2 SRWE Mod-10 LAN Security ConceptsMukesh Chinta
 
CCNA-2 SRWE Mod-11 Switch Security Configuration
CCNA-2 SRWE Mod-11 Switch Security ConfigurationCCNA-2 SRWE Mod-11 Switch Security Configuration
CCNA-2 SRWE Mod-11 Switch Security ConfigurationMukesh Chinta
 
CCNA-2 SRWE Mod-12 WLAN Concepts
CCNA-2 SRWE Mod-12 WLAN ConceptsCCNA-2 SRWE Mod-12 WLAN Concepts
CCNA-2 SRWE Mod-12 WLAN ConceptsMukesh Chinta
 
CCNA-2 SRWE Mod-13 WLAN Configuration
CCNA-2 SRWE Mod-13 WLAN ConfigurationCCNA-2 SRWE Mod-13 WLAN Configuration
CCNA-2 SRWE Mod-13 WLAN ConfigurationMukesh Chinta
 
CCNA-2 SRWE Mod-15 Static IP Routing
CCNA-2 SRWE Mod-15 Static IP RoutingCCNA-2 SRWE Mod-15 Static IP Routing
CCNA-2 SRWE Mod-15 Static IP RoutingMukesh Chinta
 
CCNA-2 SRWE Mod-14 Routing Concepts
CCNA-2 SRWE Mod-14 Routing ConceptsCCNA-2 SRWE Mod-14 Routing Concepts
CCNA-2 SRWE Mod-14 Routing ConceptsMukesh Chinta
 
Protecting the Organization - Cisco: Intro to Cybersecurity Chap-4
Protecting the Organization - Cisco: Intro to Cybersecurity Chap-4Protecting the Organization - Cisco: Intro to Cybersecurity Chap-4
Protecting the Organization - Cisco: Intro to Cybersecurity Chap-4Mukesh Chinta
 
Protecting Your Data and Privacy- Cisco: Intro to Cybersecurity chap-3
Protecting Your Data and Privacy- Cisco: Intro to Cybersecurity chap-3Protecting Your Data and Privacy- Cisco: Intro to Cybersecurity chap-3
Protecting Your Data and Privacy- Cisco: Intro to Cybersecurity chap-3Mukesh Chinta
 
Attacks, Concepts and Techniques - Cisco: Intro to Cybersecurity Chap-2
Attacks, Concepts and Techniques - Cisco: Intro to Cybersecurity Chap-2Attacks, Concepts and Techniques - Cisco: Intro to Cybersecurity Chap-2
Attacks, Concepts and Techniques - Cisco: Intro to Cybersecurity Chap-2Mukesh Chinta
 
The need for Cybersecurity - Cisco Intro to Cybersec Chap-1
The need for Cybersecurity - Cisco Intro to Cybersec Chap-1The need for Cybersecurity - Cisco Intro to Cybersec Chap-1
The need for Cybersecurity - Cisco Intro to Cybersec Chap-1Mukesh Chinta
 
Cisco Cybersecurity Essentials Chapter- 7
Cisco Cybersecurity Essentials Chapter- 7Cisco Cybersecurity Essentials Chapter- 7
Cisco Cybersecurity Essentials Chapter- 7Mukesh Chinta
 
Protocols and Reference models CCNAv7-1
Protocols and Reference models  CCNAv7-1Protocols and Reference models  CCNAv7-1
Protocols and Reference models CCNAv7-1Mukesh Chinta
 
Basic Switch and End Device configuration CCNA7 Module 2
Basic Switch and End Device configuration   CCNA7 Module 2Basic Switch and End Device configuration   CCNA7 Module 2
Basic Switch and End Device configuration CCNA7 Module 2Mukesh Chinta
 
Introduction to networks CCNAv7 Module-1
Introduction to networks CCNAv7 Module-1Introduction to networks CCNAv7 Module-1
Introduction to networks CCNAv7 Module-1Mukesh Chinta
 
Process scheduling (CPU Scheduling)
Process scheduling (CPU Scheduling)Process scheduling (CPU Scheduling)
Process scheduling (CPU Scheduling)Mukesh Chinta
 
OS - Process Concepts
OS - Process ConceptsOS - Process Concepts
OS - Process ConceptsMukesh Chinta
 
Operating systems system structures
Operating systems   system structuresOperating systems   system structures
Operating systems system structuresMukesh Chinta
 
Introduction to Operating Systems
Introduction to Operating SystemsIntroduction to Operating Systems
Introduction to Operating SystemsMukesh Chinta
 
Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8Mukesh Chinta
 
Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6Mukesh Chinta
 

Plus de Mukesh Chinta (20)

CCNA-2 SRWE Mod-10 LAN Security Concepts
CCNA-2 SRWE Mod-10 LAN Security ConceptsCCNA-2 SRWE Mod-10 LAN Security Concepts
CCNA-2 SRWE Mod-10 LAN Security Concepts
 
CCNA-2 SRWE Mod-11 Switch Security Configuration
CCNA-2 SRWE Mod-11 Switch Security ConfigurationCCNA-2 SRWE Mod-11 Switch Security Configuration
CCNA-2 SRWE Mod-11 Switch Security Configuration
 
CCNA-2 SRWE Mod-12 WLAN Concepts
CCNA-2 SRWE Mod-12 WLAN ConceptsCCNA-2 SRWE Mod-12 WLAN Concepts
CCNA-2 SRWE Mod-12 WLAN Concepts
 
CCNA-2 SRWE Mod-13 WLAN Configuration
CCNA-2 SRWE Mod-13 WLAN ConfigurationCCNA-2 SRWE Mod-13 WLAN Configuration
CCNA-2 SRWE Mod-13 WLAN Configuration
 
CCNA-2 SRWE Mod-15 Static IP Routing
CCNA-2 SRWE Mod-15 Static IP RoutingCCNA-2 SRWE Mod-15 Static IP Routing
CCNA-2 SRWE Mod-15 Static IP Routing
 
CCNA-2 SRWE Mod-14 Routing Concepts
CCNA-2 SRWE Mod-14 Routing ConceptsCCNA-2 SRWE Mod-14 Routing Concepts
CCNA-2 SRWE Mod-14 Routing Concepts
 
Protecting the Organization - Cisco: Intro to Cybersecurity Chap-4
Protecting the Organization - Cisco: Intro to Cybersecurity Chap-4Protecting the Organization - Cisco: Intro to Cybersecurity Chap-4
Protecting the Organization - Cisco: Intro to Cybersecurity Chap-4
 
Protecting Your Data and Privacy- Cisco: Intro to Cybersecurity chap-3
Protecting Your Data and Privacy- Cisco: Intro to Cybersecurity chap-3Protecting Your Data and Privacy- Cisco: Intro to Cybersecurity chap-3
Protecting Your Data and Privacy- Cisco: Intro to Cybersecurity chap-3
 
Attacks, Concepts and Techniques - Cisco: Intro to Cybersecurity Chap-2
Attacks, Concepts and Techniques - Cisco: Intro to Cybersecurity Chap-2Attacks, Concepts and Techniques - Cisco: Intro to Cybersecurity Chap-2
Attacks, Concepts and Techniques - Cisco: Intro to Cybersecurity Chap-2
 
The need for Cybersecurity - Cisco Intro to Cybersec Chap-1
The need for Cybersecurity - Cisco Intro to Cybersec Chap-1The need for Cybersecurity - Cisco Intro to Cybersec Chap-1
The need for Cybersecurity - Cisco Intro to Cybersec Chap-1
 
Cisco Cybersecurity Essentials Chapter- 7
Cisco Cybersecurity Essentials Chapter- 7Cisco Cybersecurity Essentials Chapter- 7
Cisco Cybersecurity Essentials Chapter- 7
 
Protocols and Reference models CCNAv7-1
Protocols and Reference models  CCNAv7-1Protocols and Reference models  CCNAv7-1
Protocols and Reference models CCNAv7-1
 
Basic Switch and End Device configuration CCNA7 Module 2
Basic Switch and End Device configuration   CCNA7 Module 2Basic Switch and End Device configuration   CCNA7 Module 2
Basic Switch and End Device configuration CCNA7 Module 2
 
Introduction to networks CCNAv7 Module-1
Introduction to networks CCNAv7 Module-1Introduction to networks CCNAv7 Module-1
Introduction to networks CCNAv7 Module-1
 
Process scheduling (CPU Scheduling)
Process scheduling (CPU Scheduling)Process scheduling (CPU Scheduling)
Process scheduling (CPU Scheduling)
 
OS - Process Concepts
OS - Process ConceptsOS - Process Concepts
OS - Process Concepts
 
Operating systems system structures
Operating systems   system structuresOperating systems   system structures
Operating systems system structures
 
Introduction to Operating Systems
Introduction to Operating SystemsIntroduction to Operating Systems
Introduction to Operating Systems
 
Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8
 
Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6
 

Dernier

Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxAmita Gupta
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxcallscotland1987
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxdhanalakshmis0310
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 

Dernier (20)

Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 

Bluetooth, RFID and WiMAX Technologies

  • 1.
  • 2. What is Bluetooth Bluetooth is a wireless technology used to transfer data between different electronic devices. The distance of data transmission is small in comparison to other modes of wireless communication. This technology eradicates the use of cords, cables, adapters and permits the electronic devices to communicate wirelessly among each other. Bluetooth is a high-speed, low-power microwave wireless link technology, designed to connect phones, laptops, PDAs and other portable equipment together with little or no work by the user.
  • 3. History Of Bluetooth: • Bluetooth was invented in 1994 by Ericsson. The company later started working with a larger group of companies called the Special Interests Group, or "SIG," to develop the technology into what it is today. Bluetooth is not owned by any one company and is developed and maintained by SIG. The name Bluetooth came from a code name originally used by SIG for the project and is a reference to a 10th century Danish king named Harold Bluetooth, who was responsible for uniting Norway, Sweden, and Denmark
  • 4. Bluetooth Technology • It comprises of a base band processor, a radio and an antenna. Bluetooth uses FHSS to avoid any interference. A Bluetooth channel is divided into time slots each 625 micro second in length. The devices hop through these timeslots making 1600 hops per second. This trades bandwidth efficiency for reliability, integrity and security • The radio uses Frequency Hopping to spread the energy across the ISM spectrum in 79 hops displaced by 1MHz, starting at 2.402GHz and stopping at 2.480GHz.
  • 5. Bluetooth Technology Documentation on Bluetooth is divided into two sections, the Bluetooth Specification and Bluetooth Profiles. •The Specification describes how the technology works (i.e. the Bluetooth protocol architecture), •The Profiles describe how the technology is used (i.e. how different parts of the specification can be used to fulfill a desired function for a Bluetooth device). The range for Bluetooth communication is 0-30 feet (10 meters) with a power consumption of 0dBm (1mW). This distance can be increased to 100 meters by amplifying the power to 20dBm. The Bluetooth radio system is optimized for mobility.
  • 6. Bluetooth Applications •File transfer •Ad-hoc networking: Communicating devices can spontaneously form a community of networks that persists only as long as it's needed •Device synchronization: Seamless connectivity among PDAs, computers, and mobile phones allows applications to update information on multiple devices automatically when data on any one device changes. •Peripheral connectivity. •Car kits: Hands-free packages enable users to access phones and other devices without taking their hands off the steering wheel •Mobile payments: Your Bluetooth-enabled phone can communicate with a Bluetooth-enabled vending machine to buy a can of Diet Pepsi, and put the charge on your phone bill.
  • 7. Bluetooth Limitations  Data sent between two Bluetooth devices is very slow compared with Wi-Fi transfer Rate.  Range Of a Bluetooth Device is 15-30 feet depending upon the Device.  Security is Biggest Disadvantage as transfer takes place through radio waves and a hacker can easily hack it.  Battery usage is also a problem, it will make device out of power before it would have if Bluetooth was not powered on. Bluetooth Radio Link
  • 8. Bluetooth Networking Bluetooth supports both unicast (point-to-point) and multicast (point-to-multipoint) connections. Bluetooth protocol uses the concept of master and slave. In a master slave protocol a device cannot talk as and when they desire. They need to wait till the time the master allows them to talk. The master and slaves together form a piconet. Up to seven “slave” devices can be set to communicate with a “master”. Several of these piconets can be linked together to form a larger network in adhoc manner. A network of piconets is called scatternet. A scatternet is formed when a device from one piconet also acts as a member of another piconet. In this scheme, a device being master in one piconet can simultaneously be slave in other one.
  • 10. Bluetooth Protocol Stack Bluetooth protocol stack can be divided into four basic layers according to their functions. These are:  Bluetooth Core Protocols • Baseband • Link Manager Protocol (LMP) • Logical Link Control and Adaptation Protocol (L2CAP) • Service Discovery Protocol (SDP)  Cable Replacement Protocol • RFCOMM  Telephony Control Protocol • Telephony Control Protocol Binary • AT- Commands  Adapted Protocols • PPP Bluetooth • TCP/IP • OBEX Protocol • Content Formats
  • 11. Bluetooth Protocols Radio - Specifies details of the air interface, including frequency, the use of frequency hopping, modulation scheme, and transmit power. Baseband - Concerned with connection establishment within a piconet, addressing, packet format, timing, and power control. The Baseband and Link Control Layer enable the physical RF link between Bluetooth units forming a piconet. This layer uses inquiry and paging procedures to synchronize the transmission with different Bluetooth devices. It provides 2 different kind of physical links with their corresponding baseband packets, Synchronous Connection-Oriented (SCO) and Asynchronous Connectionless (ACL) which can be transmitted in a multiplexing manner on the same RF link. ACL packets are used for data only, while the SCO packet can contain audio only or a combination of audio and data. All audio and data packets can be provided with different levels of FEC or CRC error correction and can be encrypted. Audio - Audio data can be transferred between one or more Bluetooth devices, making various usage models possible and audio data in SCO packets is routed directly to and from Baseband and it does not go through L2CAP.
  • 12. Bluetooth Protocols Link manager protocol (LMP) - Responsible for link setup between Bluetooth devices and ongoing link management. This includes security aspects such as authentication and encryption negotiation of baseband packet sizes. It also controls the power modes, connection state and duty cycles of Bluetooth devices in a piconet. Logical link control and adaptation protocol (L2CAP) - Adapts upper-layer protocols to the baseband layer. This layer is responsible for segmentation of large packets and the reassembly of the fragmented packets. L2CAP is also responsible for multiplexing of Bluetooth packets from different applications. Service discovery protocol (SDP) - Device information, services, and the characteristics of the services can be queried to enable the establishment of a connection between two or more Bluetooth devices. Host Controller Interface (HCI) - The Host Controller Interface, HCI, provides a uniform interface method for accessing the Bluetooth hardware capabilities. It contains a command interface to the Baseband controller and link manager and access to hardware status. Finally, it contains control and event registers.
  • 13. Bluetooth Protocols RFCOMM - It is a serial line communication protocol and is based on ETSI 07.10 specification. The “cable replacement” protocol emulates EIA - 232 (RS-232) control and data signals over Bluetooth baseband protocol. TCS BIN (telephony control specification binary) - It is a bit-oriented protocol that defines the call control signaling for the establishment of speech and data calls between Bluetooth devices. It also defines mobility-management procedures for handling groups of Bluetooth TCS devices. AT-Commands - this protocol defines a set of AT-commands by which a mobile phone can be used and controlled as a modem for fax and data transfers. AT(attention) commands are used from a computer or DTE (Data Terminal Equipment) to control a modem or DCE (Data Circuit Terminating Equipment).
  • 14. Bluetooth Protocols The adopted protocols are defined in specifications issued by other standards- making organizations and incorporated into the overall Bluetooth architecture. The Bluetooth strategy is to invent only necessary protocols and use existing standards whenever possible. These are the adopted protocols:  PPP - The point-to-point protocol is an Internet standard protocol for transporting IP datagrams over a point-to-point link  TCP/UDP/IP - These are the foundation protocols of the TCP/IP protocol suite;  OBEX - The object exchange protocol is a session-level protocol developed by the Infrared Data Association (IrDA) for the exchange of objects. OBEX provides functionality similar to that of HTTP, but in a simpler fashion. It also provides a model for representing objects and operations.  Content Formats - Examples of content formats transferred by OBEX are vCard and vCalendar, which provide the format of an electronic business card and personal calendar entries and scheduling information, respectively.  WAE/WAP - Bluetooth incorporates the wireless application environment and the wireless application protocol into its architecture.
  • 15. A number of usage models are defined in Bluetooth profile documents. In essence, a usage model is a set of protocols that implement a particular Bluetooth-based application. Each profile defines the protocols and protocol features supporting a particular usage model. Following are the highest-priority usage models: File transfer - The file transfer usage model supports the transfer of directories, files, documents, images, and streaming media formats. This usage model also includes the capability to browse folders on a remote device; Internet bridge - With this usage model, a PC is wirelessly connected to a mobile phone or cordless modem to provide dial-up networking and fax capabilities. For dial-up networking, AT commands are used to control the mobile phone or modem, and another protocol stack (such as PPP over RFCOMM) is used for data transfer. For fax transfer, the fax software operates directly over RFCOMM; LAN access - This usage model enables devices on a piconet to access a LAN. Once connected, a device functions as if it were directly connected (wired) to the LAN; Synchronization - This model provides a device-to-device synchronization of PIM (personal information management) information, such as phone book, calendar, message, and note information. IrMC (Ir mobile communications) is an IrDA protocol that provides client/server capability for transferring updated PIM information from one device to another; Three-in-one phone - Telephone handsets that implement this usage model may act as a cordless phone connecting to a voice base station, as an intercom device for connecting to other telephones, and as a cellular phone; Headset - The headset can act as a remote device's audio input and output interface. Bluetooth Usage Models
  • 16. Bluetooth offers security infrastructure starting from authentication, key exchange to encryption. In addition to encryption, a frequency-hopping scheme with 1600 hops/sec is employed. All of this makes the system difficult to eavesdrop. The main security features offered by Bluetooth include a challenge response routine for authentication, a stream cipher for encryption, and a session key generation. Each connection may require a one-way, two-way, or no authentication using the challenge-response routine. The security algorithms use the public identity of a device, a secret private user key, and an internally generated random key as input parameters
  • 17.
  • 18.  The first step, called pairing, is necessary if two Bluetooth devices have never met before. To set up trust between the two devices a user can enter a secret PIN into both devices. This PIN can have a length of up to 16 byte.  Based on the PIN, the device address, and random numbers, several keys can be computed which can be used as link key for authentication. The authentication is a challenge-response process based on the link key, a random number generated by a verifier (the device that requests authentication), and the device address of the claimat (the device that is authenticated).  Based on the link key, and again a random number an encryption key is generated during the encryption stage of the security architecture. This key has a maximum size of 128 bits and can be individually generated for each transmission.  Based on the encryption key, the device address and the current clock a payload key is generated for ciphering user data. The payload key is a stream of pseudo-random bits. The ciphering process is a simple XOR of the user data and the payload key.
  • 19.
  • 20. RFID
  • 21. Radio transponder (known as RFID tags) carrying an ID (Identification) can be read through radio frequency (RF) interfaces  Tag is attached to the object and data within the tag provides identification for the object  Object could be an entity in a manufacturing shop, goods in transit, item in a retail store, a vehicle in a parking lot, a pet, or a book in a library
  • 22. Comprises of different functional areas like:  Means of reading or interrogating the data in the tag  Mechanism to filter some of the data  Means to communicate the data in the tag with a host computer  Means for updating or entering customized data into the tag Three basic criteria for categorization:  Frequency  Application  Power levels
  • 23.
  • 24.  Works on six frequencies of 132.4 KHz, 13.56 MHz, 433 MHz, 918 MHz, 2.4 GHz and 5.8 GHz  Low frequency range tags are slow in data transfer and suitable for slow moving objects, security access, asset tracking and animal identification applications  High frequency range tags offer long reading ranges and high data transfer speed and are used for fast moving objects like railway wagon tracking and identification of vehicles on freeways for automated toll collection  Higher the frequency, higher the data transfer rates
  • 25.  Speed of the object and distance to be read determines the type of tag to be used  RFID systems follow contact-less and non line-of-sight nature of the technology  Tags can be read at high speeds  RFID tag contains two segments of memory - one segment is a factory set and used to uniquely identify a tag while the other one is used by the application  Read/write capability of a RFID system is an advantage in interactive applications such as work-in-process or maintenance tracking
  • 26.  Two types - Active and Passive tags  Passive tags are generally in low frequency range  Tags at higher frequency range can be either active or passive  Powered by an internal battery and are typically read/write  Memory can vary from a few bytes to 1MB  Battery supplied power of an active tag generally gives it a longer read range  Greater the size, greater the cost and a limited operational life
  • 27.  Operate without own power source  Obtains operating power from the reader’s antenna  Data within a passive tag is read only and generally cannot be changed during operation  Lighter, less expensive and offer a virtually unlimited operational life  Have shorter read ranges than active tags and require a high powered reader  Data is usually 32 to 128 bits long  A transponder programmed with unique information (RFID tag)  A transceiver with decoder (a reader)  An antenna or coil Close proximity passive tags rely on electromagnetic or inductive coupling techniques whereas active tags are based upon propagating electromagnetic waves techniques
  • 28.  Transportation and Logistics  Manufacturing and Processing  Security  Animal tagging  Retail store and enterprise stores  Community library  Time and attendance  Postal tracking  Airline baggage reconciliation  Road toll management
  • 29.
  • 30.
  • 31. • Wireless PANs (Bluetooth – IEEE 802.15) – very low range – wireless connection to printers etc • Wireless LANs (WiFi – IEEE 802.11) – infrastructure as well as ad-hoc networks possible – home/office networking • Multihop Ad hoc Networks – useful when infrastructure not available, impractical, or expensive – military applications, emergencies  Wireless MANs (WiMAX- 802.16) – Similar to cellular networks – traditional base station infrastructure systems
  • 32. WiMAX or Worldwide Interoperability for Microwave Access, is a wireless Internet service designed to cover wide geographical areas serving large number of users at low cost WiMAX is the synonym given to the IEEE 802.16 standard defining wide area wireless data networking .
  • 33.
  • 34.  Also known as Wireless Metropolitan Area Network (Wireless MAN) and Wireless Microwave Access (WiMAX)  IEEE 802.16 standard released in April 2002  Offers an alternative to high bandwidth wired access networks like fiber optic, cable modems and DSL  Provides network access to buildings through exterior antennas communicating with radio base stations  Networks can be created in just weeks by deploying a small number of base stations on buildings or poles to create high capacity wireless access systems
  • 35.
  • 36.
  • 37. Sub-standards of IEEE 802.16 IEEE 802.16 standardizes the air interface and related functions associated with WLL. Three working groups have been chartered to produce the following standards: IEEE 802.16.1 - Air interface for 10 to 66 GHz  IEEE 802.16.2 - Coexistence of broadband wireless access systems  IEEE 802.16.3 - Air interface for licensed frequencies, 2 to 11 GHz • WiMAX uses microwave radio technology to connect computers to the internet in place of wired connections such as DSL or cable modems. • It works very much like cell phone technology in that reasonable proximity to a base station is required to establish a data link to the Internet. • Users within 3 to 5 miles of the base station will be able to establish a link using NLOS technology with data rates as high as 75 Mbps.
  • 38. IEEE 802.16 standards are concerned with the air interface between a subscriber’s transceiver station and a base transceiver station. The protocol stack of IEEE 802.16 standard consists of two main layers: Medium Access Control (MAC) layer and Physical (PHY) layer. The MAC layer is subdivided into three sub-layers, namely Service Specific Convergence Sub-layer (CS), Common Part Sub-layer (CPS) and Security Sub-layer (SS)  The Physical Layer  MAC Layer  Convergence Layer
  • 39.  Specifies the frequency band, the modulation scheme, error-correction techniques, synchronization between transmitter and receiver, data rate and the multiplexing structure.  The PHY layer receives MAC frames and then transmits them through coding and modulation of radio frequency signals. It supports Frequency Division Duplexing (FDD) and Time Division Duplexing (TDD). 802.16 uses both licensed and unlicensed 2 – 11 GHz bands driven by the need for non line-of-sight operation.  Three physical layers for services: • Wireless MAN-SC2: Uses a single carrier modulation format. This is to support existing networks and protocols • Wireless MAN-OFDM: Uses OFDM with a 256-point transform. Acess is by TDMA. This is mandatory for license-exempt bands • Wireless MAN-OFDMA: Uses OFDM with a 2048-point transform. Here multiple access is provided by addressing a sub-set of the multiple carriers to individual receivers.
  • 40. • The main part of the IEEE 802.16 standard is common part sub-layer which is responsible for bandwidth allocation, connection management, scheduling, connection control, automatic repeat request and QoS enforcement • Designed for point-to-multipoint broadband wireless access • Addresses the need for very high bit rates, both uplink (to the base station) and downlink (from the base station) • Services like multimedia and voice can run, as 802.16 MAC is equipped to accommodate both continuous and bursty traffic
  • 41.  Provides functions specific to the service being provided  Bearer services include digital audio/video multicast, digital telephony, ATM, Internet access, wireless trunks in telephone networks and frame relay The service specific convergence sub-layer communicates with higher layers and receives packets from them and then do some specific functions like packet/frame classification and header suppression. Next, it encapsulates these packets into MAC Service Data Unit (MAC SDU) format, and then distributes MAC SDUs to common part sub-layer. Asynchronous Transfer Mode (ATM) convergence and packet convergence sub-layers are two types of service specific convergence sub-layer. The ATM convergence sub- layer is used for ATM networks, and the packet convergence sub- layer is used for packet services like Ethernet, IPv4 and IPv6