Beruflich Dokumente
Kultur Dokumente
6
Infrared devices
• PDAs
• Phones
• Organizer
• Printers
• Cameras
• Laptops and
Notebooks
• Other Applications
9
Transmitting Data Between Two Different Electronic
Devices
10
The IR Signal
• The IR detector is only looking for infrared that’s flashing on
and off 38,500 times per second.
– It has built-in optical filters that allow very little light except the
980 nm infrared.
– It also has an electronic filter that only allows signals around 38.5
kHz to pass through.
• This is the type of signal produced by the remote control.
• This prevents IR interference from common sources such as
sunlight and indoor lighting.
Important Concepts
• Pulse width modulation (PWM): Pulse durations are
used in many applications, a few of which are motor
control, and communication. Since the IR detector
sends low pulses that can be measured to determine
what information the IR remote is sending, it's an
example of using PWM for communication.
Bluetooth Chip
Baseband Link
RF Controller Manager
SPECIFICATIONS
– Application Specifications
• These specifications include the following
• Profiles Cordless Telephony
• Serial Port
• Headset
• Intercom
• Dialup Networking
• Fax
• File Transfer
• Service Discovery Application
• Generic Access
RADIO POWER CLASSES
• Cable Replacement
– Replace the cables for peripheral devices
• Ease of file sharing
– Panel discussion, conference, etc.
• Wireless synchronization
– Synchronize personal information contained in the address
books and date books between different devices such as
PDAs, cell phones, etc.
• Bridging of networks
– Cell phone connects to the network through dial-up
connection while connecting to a laptop with Bluetooth.
Bluetooth Devices
Bluetooth will soon be enabled in
everything from:
• Telephones
• Headsets
• Computers
• Cameras
• PDAs
• Cars
• Etc …
Bluetooth Products 1
• Bluetooth-enabled
PC Card
Bluetooth Products 2
• Bluetooth-enabled
PDA
Bluetooth Products 3
• Bluetooth-enabled
Cell Phone
Bluetooth Products 4
• Bluetooth-enabled
Head Set
Usage Models
• Cordless computer
• Ultimate headset
• Three-in-one phone
• Interactive conference (file transfer)
• Direct network access
• Instant postcard
Wireless Technologies
Optical 850
Spectrum 2.4GHz
nano meters
• Challenge-Response Based
– Claimant: intends to prove its identity, to be verified
– Verifier: validating the identity of another device
– Use challenge-response to verify whether the claimant
knows the secret (link key) or not . If fail, the claimant must
wait for an interval to try a new attempt.
– The waiting time is increased exponentially to defend the
“try-and-error” authentication attack
– Mutual authentication is supported
• Challenge (128-bit)
• Response (32-bit)
• 48-bit device address
Confidentiality