Sie sind auf Seite 1von 11

ABSTRACT

The term emerging technology has been frequently used


by Information Technology professionals and academics.
However, little research has shed light on this term and
specified its characteristics and what it means. Therefore
this Seminar aims at defining and giving the
characteristics of Emerging Technologies. The
characteristics are uncertainty, network effect, unseen
social and ethical concerns, cost, Limitation to particular
countries, and a lack of investigation and research.
Several examples of Emerging technologies are given to
validate these characteristics.
ACKNOWLEDGEMENT
SPECIAL THANKS TO God Almighty for his Mercy, Grace,
love and protection all through my academic year.
My Sincere gratitude goes to my Ever loving and Caring
parents Mr.& Mrs. B UDEAJA for sending me to school,
and their moral Upbringing and in spite of the economic
situation of the country, they find a way to make
provision for the success of my Academic life.
To my lovely siblings, Judith, chizzy, emmanuella and
Joshua, I want to say I love you all for ever.
To my loved ones, UDEAJA AUSTEN, my besties
ANNIE, CREAMY MZ BOBO and all my numerous friends
and colleagues that contributed positively, I thank you all
for all your support and encouragement towards my
academic work, I say may God Almighty bring their good
desires true and also increase their days.
CHAPTER ONE

INTRODUCTION TO EMERGING TECHNOLOGY

There is no widely agreed- upon definition of emerging


technologies, as different persons have defined emerging
technologies in different ways.

SCHOEMAKER (2000) AND SRINIVASAN (2008)


defined emerging technology as science based
innovations with the potential to create a new industry or
transform an existing one. They Identified the DVD
Market and the record label companies as an example,
they were destroyed as a result of the emerging Apple
store and the IPod.

The BUSINESS DICTIONARY also defined Emerging


Technologies as technologies that are currently
developing or will be developed over the next five to ten
years and will substantially alter the business and social
environment (www.business dictionary.com)

DANIEL ET ALS (1998) Viewed Emerging technology


as something that is commercially available but not
common or something that could become commercially
available within the next five years. This definition implies
that technology does not need to be new to be
considered an Emerging Technology (vine 2000). Rather,
technology is considered Emerging if it is not widely
available in the market and used by people. The business
Dictionary Definition of Emerging technologies specified
that technology is considered emerging for the first 5 to
10 years of its life cycle, whereas (stahl2011) states
that technology considered emerging for the first 10 to 15
years. This is another misconception about specifying a
range of time in a technologys lifecycle to determine if a
technology is emerging.

To sum up, Emerging technologies are not necessary


new. Technology is labeled as emerging in a particular
content,(domain, place or application) but can be
established elsewhere. Technology can also be considered
Emerging when it is not widely spread in a particular
content. Emerging technology has no limited or fixed life.
Technology is defined as Emerging when it causes a
radical change to business, industry or the society at
large.
BLUETOOTH WIRELESS TECHNOLOGY

This seminar provides an overview of Bluetooth wireless


technology and also give to little instruction on how to
establish Bluetooth connections using Device, Bluetooth
wireless technology is 90 in expensive stout range radio
technology that eliminates the need for proprietary cabling
between devices such as mobile phones, Notebook PCS,
personal digital assistants (PDA.S) cameras, and also
printers. Bluetooth technologies can be used at homes, in
the office, in the car etc.

CHAPTER 2

HISTORY OF BLUETOOTH WIRELESS


TECHNOLOGY

Bluetooth wireless technology was developed in 1994


at Ericson in Sweden. The original purpose of Bluetooth
was to eliminate the need for cable connections between
devices. Although infrared communication existed at that
time, but it be required line of sight contact. Therefore
Ericson choose to use an inexpensive, low power radio
built into each device making it possible to wirelessly
connect devices through walls and other non-meteoric
materials. After Ericson began work on Bluetooth, the
concept blossomed into a radio technology that
simultaneously connect several devices in a wireless
personal Area Network. (WPAN)

Because of the Unlimited potential of Bluetooth, the


Bluetooth special interest Group (SIG) was formed in 1998
to develop the Bluetooth specification 1EEE 802.15. The
specification standardized the development of Bluetooth enabled
devices so that devices from different Manufacturers can work
together.This means that, with Bluetooth, one can run a
presentation on a clients Bluetooth enabled projector
without a cable connection, Exchange electronic business
cards with everyone in the room, regardless of where
they are sitting.

CHAPTER THREE

WORK HOW BLUETOOTH WIRELESS


TECHNOLOGY

The Bluetooth clip can operate between the


frequency bands of 2400- 2483.5MHZ. Bluetooth is
designed to be fully functional in areas that wireless
communication such as infrared ports could not function.

In order to achieve this communication, the main clip


operates with frequency hopping and thus does not need
a clear path between two devices. The Bluetooth network
can link up to eight devices. This connection is referred to
as piconet. The idea between these connections is like
that of masters and slaves. Where the soft wire sends a
page from the master to the slaves and the slave then
listens for its devices access code, if there is a match,
then connection is established.
The software aspect of Bluetooth is the main
controller of the communication. This also plays an
Important role regarding security issues. Once the
connection is established, than a NULL packet is set from
the master to the slave and the master must wait for the
slave to respond. At this point the link manager protocol
(LMP) takes over, The LMP is comprised of mandatory
protocol Data units and these are transferred between
devices through a single packet, When a connection is
requested, the requesting device must send LMP host
connection request. The requested device can respond
with either LMP accepted or not accepted. Once the
linkage is complete, LMP setup complete is sent and
packets or data are transmitted.

BLUETOOTH COMPATIBLE DEVICES


There are over 10000 products that are Bluetooth
enabled, some of the categories consists of mobile
phones, personal computers headsets and printers, These
components are every essential in the future as they are
being used every day, some classified mobile phone can
connect or communicate various products as washer and
dryers and automobiles. All of the products which have
Bluetooth may not have proper profile and link to
establish a connection. However as the technology
progresses, more profiles can be utilized and the virtual
gaps will be bridged.

BLUETOOTH SECURITY

Bluetooth security is complex, yet it is mostly


transparent and easy for user to implement, Bluetooth
uses three types of security mechanism: Authentication,
Authorization and Encryption. Authentication verifies the
identity of the Bluetooth device trying to connect with
your device, after Authentication is complete, your
Bluetooth device grants (authorizes) another Bluetooth
device access to a specific service. Encryption translates
data into a format that can be read by only another
device with the same encryption key.

The Implementation of these mechanisms Occurs at 3


levels (modes of security):

MODE1: No security anyone can use this device, This


mode is the default setting for public devices such as
printers
MODE 2: In this mode, permission to access your device
is dependent on the service(s) you authorize (service
level security). With your PDA, for example you can allow
another device to exchange electronic business cards
and delay the device access to contact information and
calendar entries.
MODE 3: In this mode, the device must be paired before
they can establish a connection and transfer data (link
level security). There are several concerns within
Bluetooth security as some have proven that the link
between two devices can be easily intercepted once
major Concern is the use of the PIN to generate the link
between two devices. This pin could be as short as 4
digits, leaving a possibility of thousands of combination.
CONCLUSION
Bluetooth seems to be growing in the industry of
electronic every day. All major electronic companies are
looking to Bluetooth as the form of wireless
communication. However, there are still security issues
that must be addressed and looked at in fine details,
Bluetooth is creative, innovative and is outlook for a
prosperous future in technology.

Das könnte Ihnen auch gefallen