Javascript Menu by Deluxe-Menu.com
          




we will provide the technical
papers as PDF format.

FREE TO DOWNLOAD.



Technicalpapers About us Dedicators Contact us Site map Bio-informatics Bio-metrics Bacterial computing more... Mobile computing(data on road) Mobile networking Mobile computing(past,present,future) More... Anti-hiv Nano robotics Utility fog more... Network awareness service Bluetooth-wireless network more... Self learning system more... Datawarehouse Genetic algorithm(travelling salesman) Artificial intelligence Automiszation of umpiring(fuzzy logic) Red taction Stego hunter attacking more...


HOME > Networking > bluetooth technology>

paper no:
net2
last update: 10/04/08
                                                                                          

BLUETOOTH TECHNOLOGY
(Wireless network using Bluesoleil)

INTRODUCTION:

       Authentication and security have been major issues right from the beginning of the computer age. At first the IEEE standards such as Ethernet are provided for the data transmission with the help of cables. In the Ethernet the implementation of network connections is very complex. So we go for the wireless communications. In the wireless communications security and the authentication is very important so we give more importance to security. The emerging and efficient technique for implementing network security in wireless communications is BLUETOOTH. It is one of the devices which can be used recently in the all communication areas. Bluetooth is a short-range radio technology aimed at simplifying communications among Internet devices and between devices and the Internet. The technology allows users to make effortless, instant connections between a wide range of communication devices. 


DRAWBACKS OF IEEE802.11:

       •  Several attacks on IEEE802.11 have been described in media.

       •  WEP security framework used in IEEE802.11 is susceptible to both attacks on data content and user authentication.

       •  These exposures allow an attacker to both inappropriately intercept data and also gain access to a network by impersonating a valid user.

       •  Implementation of Ethernet is complex when compared to Bluetooth.

       •  The passwords can be guessed, stolen, or cracked.

       •  In some environments, users deliberately share passwords for their own convenience. So passwords may not be secured in such cases.

       •  Unlike 802.11b, Bluetooth is not intended to be solely an Ethernet wire replacement, but a general cable replacement technology.

 

BLUETOOTH DEFINITION:

       Bluetooth is a communication standard for short distance wireless communications, connecting electronic devices such as computers, peripherals and mobile and fixed-line telecommunications devices at speeds up to 1 mbps and distances up to 10 meters.

       It is the name Bluetooth is the name for a short-range radio frequency (RF) technology that operates at 2.4 GHz and is capable of transmitting voice and data.

       Bluetooth will facilitate wireless Local Area Networks in which networks of different handheld computing terminals and mobile terminals can communicate and exchange data, even on the move and when there is no line-of-sight between those terminals.

BLUETOOTH PROTOCOL ARCHITECTURE:

       Bluetooth technology is designed for and optimized for use in mobile devices. Mobile computers, cellular handsets, network access points, printers, PDA's, desktops, keyboards, joysticks and virtually any other device can have short range. It uses Frequency Hop (FH) spread spectrum, which divides the frequency band into a number of hop channels.

     
  The following figure shows the protocol architecture of the Bluetooth.

       The complete Bluetooth protocol stack has been designed to include the existing protocols as much as possible (like TCP, UDP, OBEX) as well as Bluetooth specific protocols like LMP and L2CAP. The protocol reuse ensures smooth interoperability between existing applications and hardware. The Specification is also open, thereby allowing vendors to build proprietary applications. Although different applications may run over different protocol stacks, they all use the Bluetooth data link and physical layers. The Applications layer lies on top of the vCard (internal object representation convention) layer. 

Baseband: The Baseband and Link Control Layer enables the RF link Bluetooth units in a piconet. This layer uses inquiry and paging procedures to synchronize the transmission between different Bluetooth devices. 

Link Manager Protocol (LMP):  The link manager protocol is responsible for setting up link channels between Bluetooth devices after performing security methods like authentication and encryption by generating, exchanging and verifying linking and encryption keys and negotiating base band packet size.

Logical Link Control and Adaptation Protocol (L2CAP): L2CAP packets carry payloads which are carried to the upper layer protocols.

Service Discovery Protocol (SDP): Using SDP, device information, services allowed and characteristics of the services are queried between Bluetooth enabled devices.

Cable Replacement Protocol (RFCOMM): RFCOMM is a serial line emulation protocol.

Telephony Control Protocol:  The Telephony Control - Binary (TCS Binary) and Telephony Control - AT Commands are used to establish speech and data calls between devices and control mobile phones and modems respectively.


Adopted Protocols:
Bluetooth also supports PPP, TCP/UDP/IP, and OBEX and WAP protocols to maximize interoperability.


BLUESOLEIL:

       Bluesoleil is window based software that allows your Bluetooth ® enabled desktop or notebook computer to wirelessly connect to other Bluetooth enabled devices. BlueSoleil allows MS Windows users to wirelessly access a wide variety of Bluetooth enabled digital devices, such as cameras, mobile phones, and headsets, printers, and GPS receivers. You can also form networks and exchange data with other Bluetooth enabled computers or PDAs.

       Here we are going to explain about the LAN (Local Area Network) connection with the help of Bluesoleil. The main window of the bluesoleil software is as shown below.


 

LAN ACCESS:

       The Bluetooth LAN Access Profile (LAP) allows users to access a Local Area Network (LAN) via a Bluetooth enabled LAN access point.

Typical Usage:

       •  Accesses a Local Area Networking via a Bluetooth enabled LAN access point.

       •  Use your computer as a LAN Access Point.

Access a LAN via a Bluetooth enabled Access Point (AP)

       •  Connect to the LAN AP's LAP service.

       •  In the Connect Bluetooth LAP Connection dialog, enter the user name and password if necessary. Click Connect .



         Figure 1 Connect Bluetoot h LAP Connection  


Use your computer as a LAN Access Point (Advanced Users Only)

       •  Start the Bluetooth LAP Access service on BlueSoleil.

       •  Specify any static IP addresses for LAP clients (Alternatively, you can use DHCP to have the system dynamically assign IP addresses).

(1) In the Network Connections window, right click Incoming Connection , then select Properties on the popup menu.



Figure 2 : Select Properties On the Pop-up Menu

(2) Select Incoming Connections Properties | Networking -> Internet Protocol (TCP/IP) , and click on the Properties button. (Figure 3)

Figure 3 : Internet Protocol (TCP/IP) Network Component


3) Select Specify TCP/IP addresses and enter the range of IP addresses assigned to LAP clients.

Figure 4 : Enter the IP Addresses Thus we can get the LAN connection in wireless communication using Bluetooth with the help of Bluesoleil.


BLUETOOTH ADVANTAGES:

       •  The synchronization and exchange of data are Bluetooth's major applications, as are electronic commerce applications such as electronically paying for parking meters, bus tickets, shopping bills, movie tickets and so on.

       •  Smart offices are envisaged in which an employee with a Bluetooth device is automatically checked in when entering the building and this triggers a series of actions such as lights and PCs being switched on.

       •  Home equipments, automotive components and entertainment devices can be interfaced together using Bluetooth technology.

       •  According to the Bluetooth partners one of its main advantages is the feature that it does not need to be set up. 

BLUETOOTH APPLICATIONS:

       •  Wireless networking between desktops and laptops, or desktops in a confined space and where little bandwidth is required

       •  Bluetooth cell phones have been sold in large numbers, and are able to connect to computers, personal digital assistants (PDAs), certain automobile handsfree systems and various other devices. The standard also includes support for more powerful, longer-range devices suitable for constructing wireless LANs.

       •  Transfer of files (images, mp3s, etc) between mobile phones, Personal digital assistants (PDAs) and computers via OBEX nes

       •  Bluetooth car kits Acura, with the 2004 Acura TL, was the first motor vehicle manufacturer to install handsfree Bluetooth technology Companies like Parrot or Motorola manufacture Bluetooth hands-free car kits for well-known brand car manufacturers.


  For Further more download pdf...





WELCOME TECHNICAL PAPERS

send technical papers with your details. we will publish them shortly with your details
for more info goto Dedicators section
.

our email id is given below:

TheTechnicalpapers@gmail.com


WELCOME ADS

Our email id is given below:

TheTechnicalpapers@gmail.com








Home | About Us | Contact Us | Site Map

Copyright 2008 Know Technology Team. All rights reserved.

Your Ad Here