Академический Документы
Профессиональный Документы
Культура Документы
Short
IEEE802.11
The
name BLUETOOTH came from 10th century king, Harald Bluetooth, King of Denmark and Norway invented in 1994 by Swedish company called Ericson
First
Frequency Range
Data Rate Operating Range Security
2.4GHz
720Kbps-4Mbps 10m-100m Good, link layer authentication and encryption 0.1W
Power
Wireless
Less
consumption Available at cheaper rate Robustness Very easy to use Can be used anywhere
Master slave network called piconet. Up to 8 devices. Master coordinates the Piconet And Slave follows the Master Each Bluetooth device may operate as either Master or Slave
Link ManagerProtocol(LMP)
Configure, authenticate and handle the connections Power management scheme
7
Wireless control of and communication between a mobile phone and a handsfree headset. Wireless communication with PC input and output devices. Transfer of files, contact details, calendar appointments, and reminders between devices with OBEX.
8
SIG members are key to the success of bluetooth. 1,900 Bluetooth Technology Manufactures.
ADVANTAGES:
Communicate both data and voice Devices can find one another and can communicate without any user input. Uses low powered 2.4 GHZ band for radio communication. Avoids interference from other wireless devices. Its inexpensive. Simple and easy to use.
DISADVANTAGES:
Compatibility between bluetooth products. Relatively short range. Battery use. Security. Low data rate.
Bandwidth 800Kbps Can connect devices through bluetooth adapter Generally range within 10 meters
Bandwidth 11Mbps To enable connection need adapter,router and access point Range within 100meters Specification of wifi is IEEE Faster than Bluetooth
2.WiFi Antenna
4.WiFi Bridge
Attacks: Access control attacks Attempt to penetrate a network Confidentiality attacks Attempt to intercept private information Availability attacks These attacks impede delivery of wireless services
Security: Has sophisticated security features offered by WPA2 which the newest version of Wi-Fi security
1.Backdoor attack exploits the pairing mechanism 2.Snarf attack enable hacking technique
3.Bluejacking attack gain access to the victim
1.."Bluetooth traveler". http://www.hoovers.com/business-information/ 2..How Bluetooth Technology Works". Bluetooth SIG. http://www.bluetooth.com/Bluetooth/Technology/Wor ks 3..Kardach, Jim (2008-05-03). "How Bluetooth got its name". http://www.eetimes.eu/scandinavia
THANK YOU