Table of Contents
Introduction
Bluetooth Devices, a modern technology, is a radio communication method that transmits data through electromagnetic waves to very short distances ranging from 1 to 100 meters. This type of technology requires a manageable amount of energy.
This technology allows the user to transfer data between mobile phones, laptops, and computer peripherals and wireless connectivity. When you start connecting devices, it’s like a whole network. Furthermore, bluetooth low energy (BLE) provides considerably reduced power consumption and for more info you can see the bluetooth low energy guide.
Bluetooth Genesis
Attempts to get rid of wires have begun to connect different devices since the early 1980s. They have faced severe difficulties, most notably the jamming of devices, the consumption of large quantities of electricity.
In a short time, the so-called Infrared Infrared appeared and is represented by IR, which was suspected to be the best solution for wiring disposal and an introduction to entering the world of wireless communication. By the 1990s, HP, Digital, IBM had concluded agreements with each other, along with other companies, to collaborate and create the Infrared Data Association, which was coded IrDA.
They sought to achieve their goal of finding an agreed protocol charter to transmit information by wireless connection. The problem of visual communication has been an obstacle in keeping this new technology.
Previous companies have hired Ericsson to provide them with a radical solution in developing a wireless communication method to replace infrared and intel; Toshiba, Nokia, Ericsson have been able to conclude agreements and develop and formulate a set of specifications and conditions, and Bluetooth is eventually acquainting.
BlueTooth Apps
Connect mobile phones wirelessly, or combine them with car tools, peripherals, or microphones. Build a personal network by clicking computer to each other within a short-term geographical range. We can use one of the input units attached to your computers, such as a mouse or keyboard. It can be used as an output unit such as printers. Transfer a set of files and information between electronic devices.
BlueTooth Mechanism
Bluetooth technology begins with wireless wave generation, with a frequency of 2.45 GHz (2.45 GHz), a globally agreed value in industrial, scientific, and medical devices, and is indicated that more than one Bluetooth connection can make in one room, and will not affect it because there are different frequencies per device at other times, called a “frequency jump with a blistering spectrum.” this technique allows the random use of more than seventy-nine frequencies within a given area.
The frequency value changes continuously, meaning that the frequency value will change 1,600 times per second by the BlueTooth device, i.e., the radio spectrum will benefit a range of devices together.
Its Versions
Bluetooth 1.0 and 1. B had many security and protection issues, following the use of Bluetooth Hardware Device Address Transmission “BD_ADDR” and transmitted the highest level of data by 732.2 kPs.
The Bluetooth 1.1: They develop this for the previous version by adding the signal strength indicator “Received Signal Strength Signal” and symbolizing it with an abbreviation (RSSI). It works to transmit data at a rate of 732.3 kbps.
The Bluetooth 2.0 +edr: the difference between this version and previous versions is the speed of data transfer EDR. Where the rate of data transfer reaches three maps, with the actual speed that it delivers is 2.1 Mbps.
Bluetooth 3.0 + hs: this version provides high speed in data transfer that may reach a maximum of approximately twenty-four Mbps, but this connection between devices using the BlueTooth line establishes a coupling between devices and traffic management.
Bluetooth 4.0, also called Bluetooth smart or low power BlueTooth can integrate with any device regardless of the manufacturer.
The BlueTooth Security
Each BlueTooth device has four entities that contribute to maintaining security: Your reliability key, 128 bit random. The private encryption key is between eight. And also, it is twenty-eight bits long and we use it for encryption purposes.
Therefore, A random number is allying to its device, and its number consists of a hundred and twenty-eight random bits. Bluetooth security levels are security situation 1: it is entirely unsafe. Security situation 2: in which the level of security services is compulsory. Security situation 3: This includes linking the level of forced security.
BlueTooth Features
Its cost is low. Low power consumption. It doesn’t affect him at all. Serves the transmission of sounds and data together. he found a solution to eliminating cables and wires. And also, Extend the battery life of the device used.