What is Bluetooth Technology?
Bluetooth technology comes about due to an amalgamation of different wireless technologies. The specifications of this technology enable the unification of these technologies, thus forming “Bluetooth technology”. As a technology that relies on an open wireless protocol, Bluetooth enables data exchanges over short distances. However, radio waves of the shorter length are necessary; to facilitate the transfer of such data from fixed devices to mobile devices. In the process, the technology helps to create PANs (personal area networks). Ericsson was the first company to develop Bluetooth technology. Other firms such as IBM, Nokia, Intel, and Toshiba later joined Ericsson, to formalize the technology, thereby setting a wireless global standard. Bluetooth technology fundamentally functions as a ‘cable-replacement technology’. Accordingly, the technology allows users to connect different devices, such as computers and PCs, mobile phones, MP3 players, and headsets. Bluetooth technology aims to phase out cables as a connector to closely spaced devices. Devices with Bluetooth technology support direct communication amongst themselves, without having to use any cables. Such devices can communicate instantaneously with each other, so long as they are within the range of the Bluetooth technology.
How Bluetooth technology works
The core system of Bluetooth technology comprises a baseband, an RF transceiver, and a protocol stack. A Bluetooth device entails an adapter. Either such an adapter can be in-built, for example in a certain device, or it can take the form of a card that allows the user to connect to the device in question. The instructions for the use of a Bluetooth adapter, embedded into the device in use facilitate the channels of communication with various devices. A harmony of the radio ranges of two connected devices facilities the recognition of the link managers of the two devices. As a result, LMP (link management protocol) executes a ‘peer-to-peer message exchange” (Franklin, C, & Layton, n. d., par. 2). The LMP then establishes a packet size negotiation and setup. In addition, a reassembly and segmentation of the packets occur, when the need arises. The presence of a service delivery protocol is important, because it joins a piconet to a Bluetooth device. In this case, the role of a device is to inquire on the available services that the piconet provides. A global Bluetooth identification exchange often occurs between the two devices in use. Once their profiles match, the establishment of a connection setup is then realised.
The hopping of Bluetooth frequency occurs in timeslots, implying that the signals of this technology are free of any interference from secondary signals due to their ability to hop away to an entirely new frequency, following a reception or transmission of an individual packet. Bluetooth technology has the potential to support a data channel of the asynchronous type. Moreover, the technology can also support up to three synchronous voice channels, at the same time. In addition, Bluetooth technology offers parallel support to both synchronous voice and data in tandem. The underlying principle of operation of Bluetooth technology is that of master and slave. Accordingly, some devices have to wait a while, as other devices execute their operations.
Bluetooth History
Both the logo and the name “Bluetooth” are the trademark of a company called SIG (Bluetooth Interest Group). SIG is a privately owned company, established in September 1998. The company merges leaders in the computing, telecommunications, industrial automation, network as well as the automotive industries. It is the responsibility of Bluetooth SIG to support and encourage the development of research in the areas of Bluetooth technology. Various promoter member companies are part of Bluetooth, and these include Ericsson, Microsoft, Intel, IBM, Agere, Nokia, Motorola, and Toshiba. Sven Mattisson and Jaap Hartsen developed the Bluetooth specification in 1994. At the time, the two were employees of Ericson Mobile Platform, a communication firm located in Lund, Sweden. The frequency hopping spread spectrum acts as the foundation for Bluetooth specification (Bluetommorrow, n. d., par. 5).
The SIG later on formalized this same specification in 1998. Currently, more than 11,000 global organizations are members of the SIG. The name “Bluetooth” was for the first time coined by individuals credited its development. Initially, these developers used the name “Bluetooth” as a code name about the wirelesses technology but over time, it stuck. The word dates as far back as the 10th century, and it refers to King Harald Bluetooth of Denmark. During his reign, the Danish King was quite influential in helping to bring together the Scandinavian countries at a time when this particular part of Europe faced clan feuds and wars that threatened to tear it apart. There are two reasons why Bluetooth SIG founders felt that the name they chose was appealing. First, the development of this technology took place in Scandinavia. Second, the technology connects various industries including computing, cell phone, and automotive markets, among others. Bluetooth is a wireless technology that combines and simplifies various types of wireless communication to form a single, low-cost, low power, globally available, and secure radio frequency.
Variability of Bluetooth technology
There are numerous areas where Bluetooth technology finds application. First, Bluetooth technology is used communication between and wireless control of a mobile phone on the one hand, and its hands-free set, on the other hand. This remains one of the most popular applications of Bluetooth technology. Second, Bluetooth technology finds use in the networking of personal computers, using wireless technology. In this case, such personal computers are usually located in confined spaces. Furthermore, such a wireless networking also demands less bandwidth. In addition, Bluetooth technology is also applicable in the output and input devices of personal computers, thereby facilitating wireless communication. Some of the devices in use here include the keyboard, mouse, and printer. Another application of Bluetooth technology is during the transfer of contact details, transfer files, reminders, and calendar appointments between various devices that have object exchange (OBEX). Bluetooth technology has also found use in conventional wired serial communications replacement in test equipment, bar code scanners, medical equipment as well as traffic control devices. Additional devices supported by Bluetooth technology include Global Positioning System receivers, digital cameras, and receivers.
Traditionally, infrared has found use in controls, but Bluetooth has now assumed this role. The technology is also ideal in applications that rely on low bandwidth, where the desire is to have a cable-free connection, as opposed to a higher bandwidth, such as USB. Bluetooth technology is also important when a user wishes to send for example, small advertisements from one device that is Bluetooth-enable, to a similar device. Bluetooth technology is a “wireless bridge between two Industrial Ethernet networks” (Bluetommorrow, n. d., par. 5). In the medical field, Bluetooth technology has found use as a transmitter for sensor data within short-range distances, from various medical devices to such other devices as the set-top box, mobile phone, or even a dedicated telehealth device).
Security
There are three security models through which Bluetooth technology can operate. Mode 1 is the non-security mode. Mode 2 guarantees security of the device only at the service level following the establishment of the channel. On the other hand, Mode 3 offers security at the point of linkage, before the establishment of the channel. An individual Bluetooth device consists of unique device address, with a memory size of 48-bit. Response to challenges characterizes the authentication scheme of Bluetooth technology devices. Therefore, symmetric keys accomplish encryption. The establishment of a channel of communication between two Bluetooth devices facilitates in the creation of an initialization key (Foley, 2009, par. 2). By inputting a Personal identification Number, followed by the creation of an initialization key, the devices attains authentication. Accordingly, the PIN or passkey becomes the prime concern for the security of a Bluetooth technology device. Like other keys, shorter keys appear more vulnerable to security hitches, compared with the longer ones. Once a hacker discovers the passkey or PIN of a Bluetooth technology device, he/she is in a position to compute the initiation key and accordingly, the link key. To avoid the vulnerability of a Bluetooth technology device from appearing quite vulnerable, one of the solutions is to ensure that the passkey is long.
Reference List
Bluetommorrow (n. d..). Bluetooth technology. 2009, Web.
Foley, M. (2009). The grass is always greener on the other side of the ocean. Web.
Franklin, C, & Layton, J. (n. d.). How Bluetooth Works. 2009, Web.