Sesion 9 - Bluetooth

33
Lic. Jorge Guerra Lic. Jorge Guerra Guerra Guerra

description

Sesion 9 - Bluetooth

Transcript of Sesion 9 - Bluetooth

  • Lic. Jorge Guerra Guerra

  • Connects a wide range of computing and telecommunication devicesExpand communication capabilitiesDevices can communicate with each other with wireless connectivity
  • Car manufactures Industry E-Mail / Internet / Intranet AccessHeadsetsBluetooth will facilitate Local Area Networks
  • PDA

    Cell Phone

    Cordless Phone

    Base Station

    Inkjet

    Printer

    Scanner

    Home Audio System

    Computer

    Digital Camera

  • Source: http//:www.motorola.com

    In the Office ...

    In the house

  • Home Security

    On the Road

    Source: http//:www.motorola.com

  • On your Car

    Source: http//:www.motorola.com

  • Bluetooth is a standard for tiny, radio frequency chips that can be plugged into your devices The information is then transmitted to your device These chips were designed to take all of the information that your wires normally send, and transmit it at a special frequency to something called a receiver Bluetooth chip.

    *

  • RF

    Baseband

    Controller

    Link

    Manager

    Bluetooth Chip

    *

  • Things that you must have:Transceivers and Receivers that can send and receive data because they use Radio Waves.MAC Address (Physical Address)

    Burnt on the NIC card by the manufacturer.

    PIN Number

    To identify the user using the device.

    A PiconetA FHHS protocol
  • A Piconet session is a communication link that must be created between devices for devices to communicate with each other. This is done when the MAC address and the PIN number match.
  • If two devices come onto contact with each other( 32 feet) the user will be prompted to initiate a communication sessionUsers then can either deny or accept the request to initiate a sessionOnly devices approved by the user can take part in the sessionData will appear as noise to unauthorized devices(A great security feature).
  • It comprises of a base band processor, a radio and an antenna . The base-band processor converts the data into signals, the antenna of another blue tooth device, within at least 30 feet distance, receives a transmitted signal in the air.

    It uses a frequency hopping spread spectrum technique (FHSS) - which is one of two basic modulation techniques used in spread spectrum signal transmission. Frequencies are switched repeatedly during radio transmission to help reduce unlawful access or other means of telecommunications to cross paths and cause interruption

    What is Bluetooth Technology:

    *

  • Bluetooth devices use a protocol called (FHHS) Frequency-Hopping Spread Spectrum .Uses packet-switching to send data.Bluetooth sends packets of data on a range of frequencies.In each session one device is a master and the others are slaves.The master device decides at which frequency data will travel.
  • Transceivers hop among 79 different frequencies in the 2.4 GHz baud at a rate of 1600 frequency hops per second.The master device tells the slaves at what frequency data will be sent.This technique allows devices to communicate with each other more securely.
  • Source: http://www.xircom.com

  • Has been set aside by the ISM( industrial ,scientific and medical ) for exclusive use of Bluetooth wireless products Communicates on the 2.45 GHz frequency

    *

  • In this technique, a device will use 79 individual, randomly chosen frequencies within a designated range Transmitters change frequency 1600 times a second

    *

  • ModesSecurity Mode 1

    No Security

    Security Mode 2

    Service Level Enforced Security

    Implemented after channel is established

    Security Mode 3

    Link Level Enforced Security

    Implemented before channel is established

  • TrustedNo RestrictionsUntrustedRestrictions, Access is limited
  • Authorization and AuthenticationAuthentication OnlyOpen to all Devices
  • Bluetooth Device AddressPrivate Link KeyPrivate Encryption KeyRandom Number
  • Not enough for confidential and top secret information now but . . . Security will ImproveImprove exisiting securityImplement new security
  • There are two technologies that have been developed as wireless cable replacements: Infrared (IRDA) and radio (Bluetooth).

    *

  • Intended for point to point linksLimited to line of sighthave a narrow angle (30 degree cone),Low penetration powerDistance covered is low(1 meter approx)have a throughput of 9600 bps to 4 Mbps IrDA has proven to be a popular technology with compliant ports currently available in an array of devices including: embedded devices, phones, modems, computers (PCs) and laptops, PDAs, printers, and other computer peripherals

    *

  • BluetoothInfraredConnection TypeSpread SpectrumInfrared, narrow beamSpectrum2.4GHz Optical 850 nano metersData Rate1Mbps16MbpsRange30 Feet3 FeetSupported DevicesUpto 82

    *

  • Voice Channels31Data Security8-128bit KeyNo special securityAddressing48 bit MAC32 bit ID

    *

  • HC - 05

    HC - 06

  • Conectividad

    HC05 pinMbed pin

    1 - Tx P10 - Rx

    2 - Rx P9 - Tx

    12 - 3.3VVout - 3.3V

    13 - GNDGND

    31 - PIO8--

    32 - PIO9--

    34 - PIO11GND or 3.3V

    PIO8 is used to control LED indicating the status. It will blink after power on.PIO9 is used to control LED indicating paring. It will be steady on when paring is successful.PIO11 is used to set this two mode: AT command mode (if the pin is connect to 3.3V) or Automatic binding transparent data mode (if the pin is connect to GND). The AT command mode is used to configure some characteristics of the device (for example the Master, Slave or Loopback modes).
  • Automatic synchronization between mobile and stationary devicesConnecting mobile users to the internet using bluetooth-enabled wire-bound connection portsDynamic creation of private networks
  • *

    10.psd