Prepared By: Guided By: Komal L. Saraswat Mr. T. P. Dave & (D10561) Mrs. N. D. Mehta

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 8

Prepared By: Guided By:

Komal L. Saraswat Mr. T. P. Dave &


(D10561) Mrs. N. D. Mehta
INTRODUCTION TO
BLUETOOTH
 Named after tenth-century danish King Harald
Blatand.
 Developed by Special Interest Group (SIG).
 Bluetooth wireless technology is a short range
communication system intended to replace cables
connecting portable or fixed electronic devices.
 It provides the way to connect and exchange
information between devices like
PCs,Laptops,Digital cameras,Mobile phones,etc.
BLUETOOTH BASIC
FUNCTION
 Bluetooth networking transmits data via low
power radio waves.
 It operates in ISM band at 2.4 GHz (Exactly
between 2.402GHz to 2.480 GHz).
 It can operate in noisy frequency environments as
it uses a fast acknowledgement & frequency
hopping scheme to make the link robust.
 Bluetooth devices avoid interfering with other
systems by sending weak signals of about 1mW.
 It can connect upto 8 devices simultaneously.
 When the devices are connected then they form a
network called Personal Area network or Piconet.
BLUETOOTH
SPECIFICATION PROTOCOL
STACK
BENEFITS OF BLUETOOTH
TECHNOLOGY
 It’s a wireless technology
 Globally available,easy to use and has secure
connection. It reduces interference.
 It consumes low power and its data rate is upto
3Mbps supported for version 2.0+EDR.
 Its operating range is 10 meters(can be
increased or decreased) which is most
commonly found in mobile devices
APPLICATION OF
BLUETOOTH
 Wireless networking can be done.
 Bluetooth peripherals like printers, mice
and keyboards,cell phones,remote
controls,hearing aids,play station,etc..
 Medical applications.
 Bluetooth car kit are also available.
 Certain data logging equipment transmits
data to a computer via bluetooth.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy