วันอังคารที่ 21 กุมภาพันธ์ พ.ศ. 2555

Do You Know About Blue-Thooth?

Blue tooth is initially conceived by Ericsson. The five founding members of the Bluetooth Sig are Ericsson, Ibm, Intel, Nokia and Toshiba. On December 1, 1999, the founding members announced that 3Com, Lucent, Microsoft, and Motorola have joined the founders to form the Promoter Group with the founding companies. To date, more than 1,200 clubs have signed on. Bluetooth is a standard for a small, cheap radio chip to be plugged into computers, printers, mobile phones, etc.

Blue thooth is a cable-replacement technology. It uses radio frequencies in the 2.45 Ghz range to forward data over short distances of ordinarily 33 feet (10 meters) or less. By embedding a Bluetooth chip and receiver into products, cables that would regularly carry the signal can be eliminated.

Wireless Printer Setup

A Bluetooth chip is designed to replace cables by taking the data regularly carried by the cable, and transmitting it at a special frequency to a receiver Bluetooth chip, which will then give the data received to the computer, phone whatever.

Bluetooth definitions

o Piconet: Devices linked in an ad hoc fashion that is, not requiring predefinition and planning, as with a standard network. Two to eight devices can be networked into a piconet. It is a peer network that is, once linked each device has equal access to the others. However, one device is defined as master, and the others as slaves.

o Scatternet: any piconets may form a larger scatternet, with each piconet maintaining independence.

o scholar unit: The scholar in a piconet whose clock and hopping sequence synchronizes the other devices.

o Slave unit: Devices in a piconet that are not the master.

o Mac address: Three bit address that distinguishes each unit in a piconet.

o Parked units: Piconet devices that are synchronized but don't have Mac addresses.

o Sniff and hold mode: Power-saving mode of a piconet device.

Overview of Bluetooth characteristics

These are the features of the Bluetooth technology:

1. It separates the frequency band into hops. This spread spectrum is used to hop from one channel to another, which adds a strong layer of security.
2. Up to eight devices can be networked in a piconet.
3. Signals can be transmitted through walls and briefcases, thus eliminating the need for line-of-sight.
4. Devices do not need to be pointed at each other, as signals are omni-directional.
5. Both synchronous and asynchronous applications are supported, making it easy to implement on a collection of devices and for a collection of services, such as voice and Internet.
6. Governments worldwide regulate it, so it is possible to utilize the same standard wherever one travels.

How could Bluetooth be used?

Well, it's very much up to our imagination. But the ambition is set high, indeed; practically all computerized equipment regularly found in a modern office (and home) which do not use a synchronous communications protocol could be adapted for use with Bluetooth.

Check this list:

Phones and pagers, Modems, Lan access devices, Headsets, Notebook computers,
Desktop and handheld computers, printers, Fax machines, Keyboards, Joysticks etc

Virtually any digital device can be part of the Bluetooth system. Bluetooth radio technology can also supply a universal bridge to existing data networks, a peripheral interface, and a mechanism to form small ad hoc groupings of linked devices, away from fixed network infrastructures. The dynamic connectivity-nature of Bluetooth makes it possible for this principles to replace Usb, and it is an correction on Plug-and-Play-systems, where the operating principles has to be rebooted for the premise to take effect.

Basic Bluetooth functions

The Bluetooth technology is quite complex. This is not so surprising, considering the task it has to handle. It is in general based on the Ieee 802.11 standard, briefly described at right. Of the 2 network modes described, Bluetooth uses the ad-hoc mode. This means that each station must inspect "netiqette" and give all other units fair access to the wireless media.

The Ieee 802.11 communications standard defines the protocol for two types of networks; Ad-hoc and client/server.

How does Blue Tooth works?

Bluetooth uses frequency hopping in timeslots. Bluetooth has been designed to operate in noisy radio frequency environments, and uses a fast acknowledgement and a frequency-hopping task to make the communications link robust, communication-wise. Bluetooth radio modules avoid interference from other signals by hopping to a new frequency after transmitting or receiving a packet.
Compared with other systems operating in the same frequency band, the Bluetooth radio typically hops faster and uses shorter packets. This is because short packages and fast hopping limit the impact of microwave ovens and other sources of disturbances. Use of forward Error correction (Fec) limits the impact of random noise on long-distance links.

Establishing network connections

In order to make new connections the procedures inquiry and paging are used. The inquiry policy enables a unit to inspect which units are in range, and what their device addresses and clocks are. With the paging proce-dure, an actual relationship can be established. Only the Bluetooth device address is required to set up a connection. Knowledge about the clock will accelerate the setup procedure. A unit that establishes a relationship will carry out a page policy and will automatically come to be the scholar of the connection.

For the paging process, any paging schemes can be applied. There is one mandatory paging task which has to be supported by each Bluetooth device. This mandatory task is used when units meet for the first time, and in case the paging process directly follows the inquiry process. Two units, once linked using a mandatory paging/scanning scheme, may agree on an elective paging/scanning scheme.

What kind of traffic can Bluetooth handle?

Bluetooth is specifically designed to supply low-cost, robust, efficient, high capacity, ad hoc voice and data networking with the following characteristics:

1. 1 Mb/sec. Transmission/reception rate exploits maximum ready channel bandwidth.

2. Fast frequency hopping avoids interference.

3. Adaptive output power minimizes interference.

4. Short data packets maximize capacity during interference.

5. Fast rejoinder allows low coding overhead for links.

6. Cvsd (Continuous changeable Slope Delta Modulation) voice coding enables carrying out at high bit-error rates.

7. Flexible packet types supports a wide application range.

8. Relaxed link budget supports low-cost particular chip integration.

9. Transmission/reception interface tailored to minimize electric current consumption

What about Bluetooth's security?

Security can mean two things in this context:

o A) We want to be sure that transmitted data arrives in un-corrupted condition to the receiver.

o B) We also want to feel that this data has not been eaves dropped by parties for whom it is not intended.

Both of these issues are (of course!) addressed by Bluetooth.

Safe transmission of data

Are transmissions collect in a firm and home environment? Yes, they are supposed to be quite reliable. Bluetooth has built in adequate encryption and authentication and is thus very collect in any environment. In addition to this, a frequency-hopping task with 1600 hops/sec. Is employed. This is far quicker than any other competitive system. This, together with an self-operating output power adoption to sell out the range exactly to requirement, makes the principles extremely difficult to eavesdrop.

My Links : printer ink toner refurhedcameras

ไม่มีความคิดเห็น:

แสดงความคิดเห็น