Archive for the ‘ Bluetooths ’ Category

How To Bluetooth and Bluetooth History

Bluetooth History:
Bluetooth is a wireless technology for exchanging data over distance, mobile devices or computers, creating personal area networks with high security. Bluetooth is Created by Ericsson company in 1994, it was conceived as a wireless alternative to RS-232 data cables. It can be connect with several devices, due to problems of synchronization. Bluetooth services was firstly developed by Jaap Haartsen and Sven Mattisson when they were working for Ericsson in Sweden.
Bluetooth is controlled by “Bluetooth Special Interest Group”, which has 14,000+ member companies in the field of telecommunication, computing, networking, and consumer electronics. To be marketed as a Bluetooth device, it must be qualified with the standards of SIG. Network of patent is required to implement the technology and only licensed to those qualifying devices.

Name And Logo:

Bluetooth word is an anglicised version of the Scandinavian Bl├ątand. Bluetooth Logo comes from bind rune merging the Younger Futhark runes Hagall, Bjarkan, Haralds initials.

Setting up connections:

Any Bluetooth in discoverable mode will transmit following info (on demand):Device name, Device class, List of services.
Any device may perform inquiry or respond to find or configure other devices to connect. if the device is trying to connect knows the address of other device, it always replys to direct connection requests and transmits the information shown in the list above if requested. Use of a device services might require pairing or acception by its owner, but the connection itself can be initiated by any device and held. Some Bluetooth devices can be connect with only one device at a moment.

Every Bluetooth device has its own unique 48-bit address. these addresses are generally not shown. Instead of that address friendly Bluetooth names are used, which can be set by device user. That names appears when another user scans for devices.

Most phones have the Bluetooth name set with manufacture or model of phone by defaulted by company. Most of phones and laptops shows only Bluetooth names and some special programs are required to get additional information about such device.

Implementation:

Bluetooth is running by radio technology which is called frequency hopping spread spectrum, that chops up several data being sent and transmits chunks of it on up to 79 bands (1 MHz each; centered from 2402 to 2480 MHz) in the range 2,400-2,483.5 MHz (allowing for guard bands). This range is in the globally unlicensed Industrial, Scientific and Medical (ISM) 2.4GHz short-range radio frequency band.

Bluetooth provides a security to connect or exchange information or data between several devices such as fax machines, mobile phones, laptop notebooks, PCs, PRinting Machines, GPS receivers, Digital Cameras and also video game consoles.

Communication System:

Major Bluetooth devices can communicate with up to seven devices in a piconet at a time. At any time, data could be transferred between the main and one other device. The master bluetooth chooses which slave device to address, typically, it switches rapidly from another device in a round-robin fashion. Bluetooth provides for the connection of two or more piconets to form a scatternet, in this system certain devices serve as bridges, and they playing the master role in one piconet and the slave role in another.

Most of USB Bluetooth adapters or “dongles” are available, some from them also include an IrDA adapter. In starting Bluetooth dongles, however, have limited capabilities, providing only the Bluetooth Enumerator and a low powerful Bluetooth Radio incarnation. These devices can link computers with Bluetooth with a distance of 100 meters, but they do not offer as many services like modern adapters.

Bluejacking:

Bluejacking is the sending of picture or message from one bluetooth user to another suspicious user through Bluetooth wireless technology. Applications include short messages (e.g., You have just been hacked by bluejack!). Bluejacking is not involve in the removal of any data from the device. Bluejacking can be involve taking control of a mobile wirelessly or phoning a premium rate line, which is owned by the bluejacker.

Future:

In future we will see bluetooth in every field, when childern uses bluetooth for their education purposes and for the copying of their homework as well, office use this service for their customers and employees to check their work and demands. Bluetooth will play important role for medical services. Hope these services will never used for teasing someone or community.

Helped from wikipedia.org