Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Bluetooth - Networking - Lecture Slides, Slides of Computer Networks

This lecture is about Wireless LAN and course title is Networking. Some keywords are: Bluetooth, History of Bluetooth, User Application, Bluetooth Specifications, Piconet, Frequency-Hopping Spread Spectrum, Devices

Typology: Slides

2013/2014

Uploaded on 01/29/2014

jamil
jamil 🇮🇳

4

(12)

145 documents

1 / 21

Toggle sidebar

Related documents


Partial preview of the text

Download Bluetooth - Networking - Lecture Slides and more Slides Computer Networks in PDF only on Docsity! Bluetooth docsity.com Introduction •What is Bluetooth? •What does it do? •History of Bluetooth docsity.com User Application • Car manufactures Industry • E-Mail / Internet / Intranet Access • Headsets • Bluetooth will facilitate Local Area Networks docsity.com Bluetooth in Action Source: http//:www.motorola.com In the Office ... In the house docsity.com Home Security On the Road Source: http//:www.motorola.com docsity.com What is a Piconet? • A Piconet session is a communication link that must be created between devices for devices to communicate with each other. • This is done when the MAC address and the PIN number match. docsity.com Piconet (cont.) • If two devices come onto contact with each other( 32 feet) the user will be prompted to initiate a communication session •Users then can either deny or accept the request to initiate a session •Only devices approved by the user can take part in the session •Data will appear as noise to unauthorized devices (A great security feature). docsity.com FHHS • Bluetooth devices use a protocol called (FHHS) Frequency-Hopping Spread Spectrum . •Uses packet-switching to send data. • Bluetooth sends packets of data on a range of frequencies. • In each session one device is a master and the others are slaves. • The master device decides at which frequency data will travel. docsity.com Bluetooth Security • Modes • Security Mode 1 • No Security • Security Mode 2 • Service Level Enforced Security • Implemented after channel is established • Security Mode 3 • Link Level Enforced Security • Implemented before channel is established docsity.com Devices • “Trusted” • No Restrictions • “Untrusted” • Restrictions, Access is limited docsity.com Service Levels • Authorization and Authentication • Authentication Only • Open to all Devices docsity.com * Growing Technology ¢ Automation Wrap up docsity.com For More Information Please Visit The Following Sites • www.motorola.com • www.xircom.com • www.palowireless.com • www.bluetooth.com docsity.com