Abstract and full paper on BLUETOOTH TECHNOLOGY - creativeworld9

728x90 AdSpace

Trending
Sunday, November 6, 2011

Abstract and full paper on BLUETOOTH TECHNOLOGY



BLUETOOTH TECHNOLOGY

ABSTRACT
Bluetooth technology unplugs our digital peripherals and makes a cable clutter a thing of the past. In short, it is a wireless replacement for many of the cables we currently use to transmit voice and data signals. It is the result of the joint achievements of nine leading companies:  3COM, Lucent Technologies, IBM, Intel, Microsoft, Motorola, Nokia, Toshiba, Ericsson, altogether known as the Blue Tooth Special Interest Group (SIG). The idea is to create a single wireless protocol to address the end-user problems arising from proliferation of various mobile devices.
The Bluetooth specification is ideal for mobile professionals who need to link notebook computers, mobile phones, PDA’s , PIMs, digital cameras, and other hand-held devices to do business at home, on the road, or in the office. Governments worldwide regulate it, so it is possible to utilize the same standard wherever one travels. Bluetooth provides three low power modes to conserve battery life: sniff mode, hold mode, and park mode. It aims at low power consumption and provides security for both stationary and mobile devices. A
Bluetooth chip (9mm x 9mm) takes the information normally carried by the cable, and transmits it at a special frequency to a receiver. Bluetooth radio modules use Gaussian Frequency Shift Keying (GFSK) for modulation. Blue Tooth employs an FHSS spreading technique, changing frequencies at a rate of 1600 times per second - 160 times the rate at which a wireless LAN changes frequencies. This provides a fairly robust communications link for its intended range. Signals can be transmitted through walls and briefcases, thus eliminating the need for line-of-sight.
Bluetooth is a standard developed that allows any sort of electronic equipment –from cellphones to keyboards and headphones-to make its own connections without direct action from a user. Bluetooth is primarily a wireless personal area networking technology, complementing other solutions (such as the industry-standard IEEE 802.11 and 802.11b based LANs).  Bluetooth is emerging as the short-range connection media of choice amongst mobile devices and electronic equipment, giving the user, ease of operation.    It promises to significantly change the way we use machines!!!

Introduction:
A look around at the moment! Keyboard connected to the computer, as well as a printer, mouse, monitor and so on. What (literally) joins all of these together? They are connected  by cables. Cables have become the bane of many offices, homes etc. That is what the Bluetooth technology aims at – a cable replacement technology!

Bluetooth - In detail:
One of the most significant recent developments in wireless technologies is the emergence of Wireless personal area networking (WPAN). Developed in 1998, WPAN is based on a new technology called Bluetooth, which uses short-range radio frequencies to transmit both voice and data. This technology wirelessly and transparently synchronizes data across devices and creates access to networks and the Internet within a range of ten meters. The short-range networks Bluetooth enables are called Personal Area Networks (PANs) or piconets. Bluetooth is more able to move from frequency to frequency, making it better able to handle interference than competing protocols. Bluetooth technology is the result of the joint achievements of nine leading companies:  3com, lucent technologies, IBM, Intel, Microsoft, Motorola, Nokia, Toshiba, Ericsson altogether known as the Blue Tooth Special Interest Group (SIG), which has widespread participation by many companies. Originally initiated by L M Ericsson, it was designed as a short-range communications medium for wireless headsets to communicate with cellular phones.


Bluetooth technology Features:
            It separates the frequency band into hops. This spread spectrum is used to hop from one channel to another, which adds a strong layer of security.
            Signals can be transmitted through walls and briefcases, thus eliminating the need for line-of-sight. Devices do not need to be pointed at each other, as signals are omni-directional.
            Both synchronous and asynchronous applications are supported, making it easy to implement on a variety of devices and for a variety of services, such as voice and Internet.
            Governments worldwide regulate it, so it is possible to utilize the same standard wherever one travels.
The Aim of "Bluetooth" has been set quite high. It is to arrive at a specification for a technology that optimizes the usage model of all mobile computing and communications devices, and providing:
            Global usage ,Voice and data handling.
            The ability to establish ad-hoc connections.
            The ability to withstand interference from other sources in open band
            Very small size, in order to accommodate integration into variety of devices with negligible power consumption in comparison to other devices for similar use.
            An open interface standard and competitively low cost of all units, as compared to their non-Bluetooth correspondents.
BLUETOOTH is used in Phones and pagers and Headsets, Modems and LAN access devices , Notebook computers , Desktop and handheld computers, Printers and Fax machines, Keyboards and Joysticks.

Bluetooth Specification:
Bluetooth is a global specification for a small form-factor, low-cost radio solution providing links between mobile computers, mobile phones, and other portable handheld devices, as well as connectivity to the Internet. The Institute of Electrical and Electronics Engineers (IEEE) has given the IEEE 802.15 standard. A Time-Division Duplex (TDD) scheme is used for full-duplex transmission. Its main strength is its ability to simultaneously handle both data and voice transmissions. A mobile computer equipped with Bluetooth technology, for example, could link to a similarly equipped mobile phone to connect to the Internet. Multiple Bluetooth units form a Wireless Personal Area Network, called and up to seven client devices. A Bluetooth WPAN is capable of supporting an asynchronous data link with
each client and synchronous voice links with up to
three client devices. It provides a range of up to 10m
at a transmit power of 1 mwatt. The range can be
extended to 100m if the transmit power is increased to 100 mwatt. Bluetooth has a data rate of 1 Mbps. Bluetooth is a standard for a small (9mm  x 9mm) , cheap radio chip to be plugged into computers, printers, mobile phones, etc. A Bluetooth chip  takes the information normally carried by the cable, and transmits it at a special frequency to a receiver. Bluetooth chip, which will then give the information received to the computer, phone whatever. Bluetooth offers the most economical solution for low-to-medium-speed device connectivity. It aims at low power consumption and provides security for both stationary and mobile devices. The basic function is to provide a standard wireless technology to replace the multitude of propriety cables currently linking computing devices.

Technical standards and performance levels
1.         Bluetooth is based upon small, high performance integrated radio transceivers, each of which is allocated a unique 48-bit address derived from the IEEE 802 standards.
2.         It operates in the unrestricted 2.45 GHz ISM "free band", which is available globally, although slight variation of location and width of band apply.
3.         The range is set at 10 meters to optimize for target market of mobile and business user. The range can, however, be increased.
4.         Gross data rate is 1Mbit/s, with second generation plans to increase to 2 Mbit/s. One-to-one connections allow maximum data transfer rate of 721 kbits/s (corresponding to 3 voice channels).
5.         Bluetooth uses a packet switching protocol, based on a frequency hop scheme with 1600 hops/sek.  to enable high performance in noisy radio environments. The entire available frequency spectrum is used with 79 hops of 1 Mhz bandwidth, analogous to the IEEE 802.11 standard.
6.         It has low power consumption, drawing only 0.3 mA in standby mode. This enables maximum performance longevity for battery powered devices. During data transfer the maximum current drain is 30 mA. However, during pauses or at lower data rates the drain would be lower.

The Bluetooth Network Topology:
There are 3 types of connections in Bluetooth, as shown below:
Either: Single-slave  or  Multi-slave (up to 7 ”slaves”
 on one master)  or Scatternet. Multiple Bluetooth
units form a Wireless Personal Area  Network,
called a piconet.  A piconet consists of one hub device and up to seven client devices. It is possible to support more devices in a piconet by placing one or more of the clients into what is referred to as park mode. In order to exchange information with the parked client, the hub must take it out of parked mode and return it to active mode. Only seven clients can be in active mode at any given time. When two piconets are in close proximity, they have overlapping coverage areas - a scenario referred to as a scatternet Clients in one piconet can participate in another piconet as either a hub or client. This is accomplished through time
division on multiplexing. In a scatternet, the two
(or more) piconets are not synchronized in either
 time or frequency. Each of the piconets operates in its own frequency-hopping channel, while any devices in multiple piconets participate at the appropriate time via time division multiplexing. A piconet can be created in one of 4 ways: A page (used by Master to connect to Slave)  or A page scan (a unit listens for its´ device access code)  or A Master – Slave switch is made or An ”Unpark” of a unit is made (provided there are no active slaves).


Personal Networking Hardware And the Protocol Stack Layers:
Bluetooth radio modules use Gaussian Frequency Shift Keying (GFSK) for modulation. The data is transmitted at a data rate of 1 Mb/second.
The Bluetooth Baseband Layer: The baseband layer performs functions like Bluetooth packet assembly, forward error correction (FEC), automatic repeat request (ARQ), data whitening, Bluetooth clock synchronization, and frequency hopping control.
The Bluetooth Link Manager Layer: The Link Manager forms the piconet by inquiring what other Bluetooth radios are in the area, establishing connection and maintaining the piconet. The Link Manager also handles security issues like authentication and encryption.
Radio: The Radio layer defines the requirements for a Bluetooth transceiver operating in the 2.4 GHz ISM band.

Base band: This layer describes the specification of the Bluetooth Link Controller (LC) which carriesout the baseband protocols and other low-level link routines.The Link Manager Protocol (LMP) is used by the Link Managers (on either side) for link set-up and control.The Host Controller Interface (HCI) provides a command interface to the Baseband Link Controller and Link Manager, and access to hardware status and control registers.


.Logical Link Control and Adaptation Protocol (L2CAP) supports higher
level protocol multiplexing, packet
segmentation and reassembly, and the
conveying of quality of service information.
L2CAP, which adapts upper layer protocols
over the Baseband, provides data services to the high layer protocols with group abstractions. The RFCOMM protocol provides emulation of serial ports over the L2CAP protocol. The protocol is based on the ETSI standard TS 07.10. The Service Discovery Protocol (SDP) provides a means for applications to discover which services are provided by or available through a Bluetooth device. Device information, services and the characteristics of the services can be queried using the SDP.

The Power Modes:
Bluetooth provides for three low power modes to conserve battery life: sniff mode, hold mode, and park mode. While in the sniff mode, a device listens to the piconet at a reduced rate. The sniff interval is programmable, providing flexibility for different applications. In hold mode, only an internal timer is running, and data transfer restarts when units transition out of the hold mode. Park mode is used to handle more than seven clients - since only seven clients can be “active” at any time, one client can be “parked” and another one activated.

The advantage of   “frequency-hopping”
Bluetooth has been designed to operate in noisy radio frequency environments, and uses a fast acknowledgement and frequency-hopping scheme to make the link robust, communication-wise. Bluetooth radio modules avoid interference from other signals by hopping to a new frequency
 after transmitting or receiving a packet.
Compared with other systems operating
 in the same frequency band, the Bluetooth radio typically hops faster and uses shorter packets. This is because short packages and fast hopping limit the impact of microwave ovens and other sources of disturbances. Use of Forward Error Correction (FEC) limits the impact of random noise on long-distance links.  Bluetooth can support an asynchronous data channel, or up to 3 simultaneous synchronous voice channels, or a channel which simultaneously supports asynchronous data and synchronous voice.

Safer transmission of data: “Security”:
Bluetooth has built in sufficient encryption and authentication and is thus very secure in any environment. In addition to this, a frequency-hopping scheme with 1600 hops/sec. is employed. This is far quicker than any other competing system. This, together with an automatic output power adaption to reduce the range exactly to requirement, makes the system extremely difficult to eavesdrop. The transmitting power is far too weak to be noticeable for humans.
 Moreover, the radiation is not concentrated in a beam, but dispersed more or less in all directions. Hence not dangerous!!
Bluetooth units often have to contend with electro-magnetically noisy environments. Thus, the need for some kind of error-detection and -correction.  When errors are detected, there are 3 error-correction schemes defined for Bluetooth: 1/3 rate FEC (Forward Error Correction) , 2/3 rate FEC , ARQ unnumbered scheme (Automatic Repeat Request).
In Bluetooth, it has these components: Random Number Generation, Encryption,  Encryption Key Management 
and Authentication.In fig. On
 2 occasions, the transmitted
 data blocks gets corrupted,
which is detected by the
 recipient. So the next time that recipient gets a chance to communicate with that sender , the recipient sends a Negative Acknowledgement (a NAK, depicted in red), which prompts the other party to re-transmit that data block.

Application Examples:
1.         A Bluetooth-mouse or a Bluetooth-keyboard could be used at a further distance from a monitor, and while moving about in the room. 
2.         Use e-mail while your portable PC is still in the briefcase! When your portable PC receives an e-mail, you'll get an alert on your mobile phone.
3.         A travelling businessman could ask his laptop computer to locate a suitable printer as soon as he enters a hotel lobby, and send a printout to that printer when it has been found, and replied in a positive manner.
4.         Cable-less connection to printers and faxes, to digital cameras and video projectors. Cordless connection from cell phone to handsfree headset.
5.         Bluetooth interface to office PBX and Dial-up networking and automatic e-mail and use cell phone as office cordless phone. Use of PC or PDA as handsfree phone.
6.         Automatic exchange of files, electronic business cards, calendars etc.

Conclusion:
Despite some of the problems, Bluetooth remains a very promising technology, with plenty of medium and long term applications. But the real test will be whether it survives the hype. Promoters are laying on it, with their unrealistic claims.
This technology is probably the only one which has a good chance to become widely available among PDAs and mobile devices. Bluetooth-equipped gadgets can connect to the LAN through the Access Protocols at once.50 kilobytes per second is about all you can expect from Bluetooth. So there we are: Bluetooth is simply the best !!





Abstract and full paper on BLUETOOTH TECHNOLOGY Reviewed by creativeworld9 on 10:25 PM Rating: 5 BLUETOOTH TECHNOLOGY ABSTRACT Bluetooth technology unplugs our digital peripherals and makes a cable clutter a thing of th...

48 comments:

  1. Wow, such a detailed and interesting post! I actually rarely care about any topic beside ones I need to do research about for my schooling, though I always can leave this part to HitTheGrade, especially when I know that they can take care of it better then I :)

    ReplyDelete
  2. What a fantabulous post this has been. Never seen this kind of useful post. I am grateful to you and expect more number of posts like these. Thank you very much. Fast Wireless Car Charger

    ReplyDelete
  3. Thank you because you have been willing to share information with us. we will always appreciate all you have done here because I know you are very concerned with our. Bluetooth Headset

    ReplyDelete
  4. The abstract and the full paper on Bluetooth is really great. IDM Crack

    ReplyDelete
  5. easeus data recovery crack


    EaseUS Data Recovery Wizard 13.0 with Keygen + WinPE ISO

    EaseUS Data Recovery Wizard crack is the best data recovery answer for Companies with Multiple Machines, Data Recovery Service Providers, IT Professionals, System Administrators, Technicians and Consultants. With its thorough data recovery arrangement, clients can appreciate boundless use and particular support of spare expense and time. You can recoup records, photographs, music, recordings, messages, organizers, and chronicle documents and so forth from Windows PCs and work stations. The application additionally bolsters various stockpiling gadgets including outer hard drives, USB drives, SD cards, memory cards, advanced cameras, and MP3/MP4 players, and so forth.

    Utilizing EaseUS Data Recovery Wizard crack may do mischief to your PC. Why not get the authority EaseUS data recovery crack. There are two different ways to get the full form of this data recovery device. One is to download it for nothing. Furthermore, the other is to get the most current variant - 13.0 with permit code, sequential or keygen (half off).

    serial key

    EaseUS Data Recovery Wizard crack

    ReplyDelete
  6. Really I enjoy your site with effective and useful information. It is included very nice post with a lot of our resources.thanks for share. i enjoy this post. check on site topbestspec.com

    ReplyDelete
  7. Antares Autotune Free Download Crack is an audio editor produced by Antares Audio Technologies. It really is accustomed to measure or change the music file. So, It is always important for speech and tones. Therefore, AutoTune VST Torrent apparent it and deal with all your music files. You are able to do your important show results and display. Thereby, Cooling is a primary affliction to be used during the continue to be. So, It is really easy to use. The Antares AutoTune 9 may help you handle with pitch and time to the work. And it can help to evaluate the first music.

    ReplyDelete
  8. Your content is nothing short of brilliant in many ways. I think this is engaging and eye-opening material. Thank you so much for caring about your content and your readers. video

    ReplyDelete
  9. Nice work is done by admin here. I love it. Thank you very much for sharing this information.
    Little Snitch Torrent Crack
    IBM SPSS 27 Crack
    OmniGraffle Crack

    ReplyDelete
  10. I loved as much as you will receive carried out right here.
    The sketch is attractive, your authored material stylish.
    nonetheless, you command get got a shakiness over that you wish
    be delivering the following. unwell unquestionably come further formerly
    again as the same nearly a lot often inside case you shield this hike.
    synchro arts crack
    mirroring360 license key
    camtasia studio crack
    sony vegas pro crack

    ReplyDelete
  11. For those looking to learn more about this topic, this is the right site. Do you know
    a lot of difficulties in the dispute. (Not so, personally you need ... ha ha)
    you have changed the subject for centuries.
    progdvb professional crack

    ReplyDelete
  12. My brother advised me to probably like this network
    website. He was absolutely right. This post really made my day
    You have no idea how much time I spent on this information! Thanks!
    microsoft security essentials crack
    z3x samsung tool pro crack

    ReplyDelete
  13. Very interesting, you are a very professional blogger.
    I subscribed to your RSS feed and am still looking for more interesting articles. I also share your site on my social networks.
    cloanto c64 forever crack
    dll files fixer crack

    ReplyDelete
  14. Thank you so much for sharing this information with everyone who knows what you are talking about! Fill in.
    Please get advice on my website too. =) There may be another cooperation agreement between us!
    reflector
    ultraiso crack

    ReplyDelete

  15. Good post, I look at this blog all the time and it impressed me a lot!
    Very helpful information, especially the last step: I usually deal with this type of information. I'm looking for this
    Superfluous information for a long time. Thank you and good luck.
    recuva professiona crack
    visual paradigm crack

    ReplyDelete
  16. For those who want to learn more about this topic, this is the right website. You know
    a lot of difficulties in arguing with you. (Not like that, personally, I must...haha) Over
    the centuries, you have changed the subject.
    smart driver updater crack
    trojan killer crack

    ReplyDelete
  17. Wow, marvelous blog structure! How long have you ever been running a
    blog for? you make running a blog look easy.
    The entire glance of your web site is excellent, as smartly
    as the content!
    cyberfox crack
    xlstat crack
    paperscan pro crack
    smartftp enterprise crack
    lumion pro crack
    gilisoft audio toolbox suite crack
    wps office premium crack

    ReplyDelete
  18. Its truly strong for you from a general viewpoint all window programming establishment. This site is astonishing its article are focal and beating. I appreciated and bookmark this site on my chrome. This is the place where you can get all break programming in like manner present in clear way.
    /https://chlicensekey.com

    ReplyDelete
  19. Its really solid for you from an overall perspective all window programming foundation. This site is astounding its article are central and beating. I appreciated and bookmark this site on my chrome. This is where you can get all break programming in like way present in clear manner.
    https://apsksway.com/

    ReplyDelete
  20. Its truly strong for you from a general point of view all window programming establishment. This site is bewildering its article are focal and beating. I appreciated and bookmark this site on my chrome. This is the place where you can get all break programming in like manner present in clear way.
    https://apskzamn.com/

    ReplyDelete
  21. Ummy Video Downloader Crack is a very simple and powerful video download source. With this software, you can use a convenient program to download HD MP3 from YouTube. Also, you can watch videos and listen to music anytime, anywhere. In this software, there is no internet connection and you enjoy audio and video songs. Also, this application helps you to record HD videos with audio from YouTube and Daily Motion, allows you to extract MP3 and any video, and gives you the option to choose a video format. With this software, you can also create your own impressive music collection and enjoy it anytime, anywhere. Quick and easy. Get it and show the great experience of downloading your videos from all kinds of sites. You can download from this link https://crackclick.com/ummy-video-downloader-crack/

    ReplyDelete
  22. Wow this article is very amazing. Thanks for sharing this website with us. This blog is very attractive. Also this article is very intersting. I will visit this website again and again.
    bitwig torrent
    fonepaw registration code free
    avast internet security full crack

    ReplyDelete
  23. Hey There Bro I like Your Blog Very Much..Keep It up..
    Ultraviewer Crack

    ReplyDelete
  24. Excellent post. I was checking constantly this blog and I’m impressed! Very useful information particularly the ultimate phase.I handle such info a lot. I used to be looking for this particular information for a very long time. Thanks and best of luck.…Sublime Text 4 Build 4113 crack

    ReplyDelete
  25. https://crackwebs.com/

    https://crackwebs.com/360-total-security/
    https://crackwebs.com/3d-coat-4-9-70-crack/
    https://crackwebs.com/4k-stogram-crack-full/
    https://crackwebs.com/4videosoft-video-converter-ultimate-crack/
    https://crackwebs.com/7-best-firewall-for-windows-10-8-7-pc-and-mac/
    https://crackwebs.com/abbyy-finereader-crack-patch/
    https://crackwebs.com/abelssoft-antiransomware/

    ReplyDelete
  26. I am very impressed with your post because this post is very beneficial for me and provide a new knowledge to me.....
    https://hit4crack.com/recuva-pro-crack/

    ReplyDelete
  27. I am very impressed with your post because this post is very beneficial for me and provide a new knowledge to me
    Recuva Pro Crack

    ReplyDelete
  28. I am very impressed with your post because this post is very beneficial for me and provide a new knowledge to me.....
    SpyHunter 5.10.7.226 Crack

    ReplyDelete
  29. Wow, great blog structure! How long do they have?
    have you ever blogged? you made blogging easy.
    The whole look and feel of your site is amazing, not to mention
    contents!
    malwarebytes crack key
    malwarebytes key
    malwarebytes crack
    malwarebytes crack

    ReplyDelete
  30. https://keysmod.com/hotspot-shield-vpn-crack/
    Hotspot Shield Crack is the best tool that use to hide your IP address from another system. Therefore, this tool is actually a VPN. And it allows access from the proxy website. Also, it uses to service and make and secure the system from the surfing session.

    ReplyDelete
  31. https://activationkeysfree.com/avg-internet-security-crack/
    AVG Internet Security Crack is one of the important software in the market that provides user internet security. It is fast and also a powerful efficient tool that is totally free to use.

    ReplyDelete
  32. https://www.thecrackbox.com/spyhunter-5-final-crack/
    SpyHunter Crack turns out to become a rather productive tool to locate malware that’s infecting your own body. Just as antivirus software may detect and neutralize all the malicious applications, many still proceed undetected by antivirus programs.

    ReplyDelete
  33. https://07cracked.com/adobe-creative-cloud-fully-crack/
    Adobe Creative Cloud Crack is an image that uses web design and makes the program in any kind of moderate way. While the tool sue to enable and use this tool to make you any kind of image design photos.

    ReplyDelete
  34. This comment has been removed by the author.

    ReplyDelete
  35. Generally I am a big fan of wireless devices. I love the increased mobility that a wireless keyboard and mouse gives you as well as the way it cuts down on the clutter around your PC. Bluetooth mouse

    ReplyDelete
  36. Nice information. I’ve bookmarked your site, and I’m adding your RSS feeds to my Google account to get updates instantly.
    Red Dead Redemption Crack

    ReplyDelete
  37. Please continue this great work and I look forward to more of your awesome blog posts. Tws earbuds Pakistan

    ReplyDelete
  38. Abstract And Full Paper On Bluetooth Technology - Creativeworld9 >>>>> Download Now

    >>>>> Download Full

    Abstract And Full Paper On Bluetooth Technology - Creativeworld9 >>>>> Download LINK

    >>>>> Download Now

    Abstract And Full Paper On Bluetooth Technology - Creativeworld9 >>>>> Download Full

    >>>>> Download LINK oL

    ReplyDelete
  39. how to mature emotionally: While maturity, as we popularly understand it, is typically developed through a combination of age and experience, emotional maturity is another story. Merriam-Webster defines the state of being mature as "having completed natural growth and development," but with emotional maturity, the emphasis is more specific and personal. Nicole LePera, PhD, founder of The Holistic Psychologist, defines it as “the ability to process your own emotions and cope with life situations with agency, responsibility, and flexibility.”

    ReplyDelete
  40. how long does codeine stay in your system Codeine is available in several different formulations, including tablets, capsules and liquids, and is easily absorbed from the GI tract into the bloodstream. From there, it crosses the blood-brain barrier and affects the brain for pain and cough. After taking a dose of codeine, it can take up to an hour to feel its effects. Pain and cough relief is typically felt for about three or four hours. Codeine is commonly prescribed for use multiple times daily as a result

    ReplyDelete