Beruflich Dokumente
Kultur Dokumente
From its very inception, Bluetooth technology was designed with security
needs in mind
In today's wireless world data is being sent invisibly from device to device,
country to country, person to person. That data comes in the form of e-mails,
photos, contacts and addresses, and is precious and private to each of us.
Wireless standards around the world are evolving and have various formats
for dealing with the security issues of its users. Bluetooth wireless
technology is no exception. Since Bluetooth is globally available in the open
2.4 GHz ISM band, robustness was built in from the beginning. For your
protection, Bluetooth technology has built-in security such as 128-bit
encryption and PIN code authentication.
There are three modes of security for Bluetooth access between two devices.
• Security Mode 1: non-secure
• Security Mode 2: service level enforced security
• Security Mode 3: link level enforced security
•
The manufacturer of each product determines these security modes. Devices
and services also have different security levels. For devices, there are two
levels: "trusted device" and "untrusted device." A trusted device, having
been paired with one's other device, has unrestricted access to all services.
With regard to services, three security levels are defined: services that
require authorization and authentication, services that require authentication
only and services that are open to all devices.
USES:
Bluetooth is a radio standard and communications protocol primarily
designed for low power consumption, with a short range (power-class-
dependent: 1 metre, 10 metres, 100 m)[1] based on low-cost transceiver
microchips in each device.
Bluetooth lets these devices communicate with each other when they are in
range. The devices use a radio communications system, so they do not have
to be in line of sight of each other, and can even be in other rooms, as long
as the received transmission is powerful enough.
BLUETOOTH PROFILES:
In order to use Bluetooth, a device must be compatible with certain
Bluetooth profiles. These define the possible applications and uses.
LIST OF APPLICATIONS:
More prevalent applications of Bluetooth include:
• Wireless control of and communication between a cell phone and a
hands-free headset or car kit. This was one of the earliest applications
to become popular.
• Wireless networking between PCs in a confined space and where little
bandwidth is required.
• Wireless communications with PC input and output devices, the most
common being the mouse, keyboard and printer.
• Transfer of files between devices with OBEX.
• Transfer of contact details, calendar appointments, and reminders
between devices with OBEX.
• Replacement of traditional wired serial communications in test
equipment, GPS receivers, medical equipment and traffic control
devices.
• For controls where infrared was traditionally used.
• Sending small advertisements from Bluetooth enabled advertising
hoardings to other, discoverable, Bluetooth devices.
• Seventh-generation game consoles—Nintendo Wii[2], Sony
PlayStation 3—use Bluetooth for their respective wireless controllers.
• Remote management of sex toys.
BLUETOOTH VS. Wi-Fi IN NETWORKING:
Bluetooth and Wi-Fi both have their places in today's offices, homes, and on
the move: setting up networks, printing, or transferring presentations and
files from PDAs to computers.
BLUETOOTH:
Wi-Fi:
BLUETOOTH 3.0:
The next version of Bluetooth after v2.1, code-named Seattle, that will be
called Bluetooth 3.0, has many of the same features, but is most notable for
plans to adopt ultra-wideband (UWB) radio technology. This will allow
Bluetooth use over UWB radio, enabling very fast data transfers of up to 480
Mbit/s, while building on the very low-power idle modes of Bluetooth.