![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi39dv4zNLQRnwWcGWBxv2r6EIWroffYZplo12K1JSIEfxYTU240Ltmh1XzUpWbqzKxG-UV4sccJ9wqriA1KwqdtjE89RIqfm4mR0O-DrnJXfPGSFs6bBgIJq4MtQnptVO-iPrJZzVK8mU/s320/bluetooth.jpg)
Bluetooth is a specification for the use of low-power radio communications to wirelessly link phones, computers and other network devices over short distances. The name Bluetooth is borrowed from Harald Bluetooth, a king in Denmark more than 1,000 years ago.
Bluetooth technology was designed primarily to support simple wireless networking of personal consumer devices and peripherals, including cell phones, PDAs, and wireless headsets. Wireless signals transmitted with Bluetooth cover short distances, typically up to 30 feet (10 meters). Bluetooth devices generally communicate at less than 1 Mbps.
Bluetooth networks feature a dynamic topology called a piconet or PAN. Piconets contain a minimum of two and a maximum of eight Bluetooth peer devices. Devices communicate using protocols that are part of the Bluetooth Specification. Definitions for multiple versions of the Bluetooth specification exist including versions 1.1, 1.2 and 2.0.
Although the Bluetooth standard utilizes the same 2.4 Ghz range as 802.11b and 802.11g, Bluetooth technology is not a suitable Wi-Fi replacement. Compared to Wi-Fi, Bluetooth networking is much slower, a bit more limited in range, and supports many fewer devices.
As is true for Wi-Fi and other wireless technologies today, concerns with Bluetooth technology include security and interoperability with other networking standards. Bluetooth was ratified as IEEE 802.15.1.
Uses of Bluetooth :
Bluetooth is a standard wire-replacement communications protocol primarily designed for low power consumption, with a short range (power-class-dependent, but effective ranges vary in practice; see table below) based on low-cost transceiver microchips in each device. Because the devices use a radio (broadcast) communications system, they do not have to be in visual line of sight of each other, however a quasi optical wireless path must be viable.
Class | Maximum permitted power | Range (m) | |
---|---|---|---|
(mW) | (dBm) | ||
Class 1 | 100 | 20 | ~100 |
Class 2 | 2.5 | 4 | ~10 |
Class 3 | 1 | 0 | ~5 |
The effective range varies due to propagation conditions, material coverage, production sample variations, antenna configurations and battery conditions. In most cases the effective range of class 2 devices is extended if they connect to a class 1 transceiver, compared to a pure class 2 network. This is accomplished by the higher sensitivity and transmission power of Class 1 devices.
Version | Data rate | Maximum application throughput |
---|---|---|
Version 1.2 | 1 Mbit/s | 0.7 Mbit/s |
Version 2.0 + EDR | 3 Mbit/s | 2.1 Mbit/s |
Version 3.0 + HS | Up to 24 Mbit/s | See Version 3.0+HS. |
Version 4.0 | Up to 24 Mbit/s | See Version 3.0+HS. |
While the Bluetooth Core Specification does mandate minimums for range, the range of the technology is application specific and is not limited. Manufacturers may tune their implementations to the range needed to support individual use cases.
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQhA1Xqk76zU9fv4ork2pr1gZR_gY0RcoJWBNmb-VKOwQcV1e16_nKM-bpAjrT-DcrJxGXJI0AQ0DXIYQRybekG3HQWuL527cOPlRg8FHeewJ9xp8HcZhobzy_tXA0A9F9HJFUU8N8fAQ/s320/blackberry_bluetooth.jpg)
Motivation :
Many of the services offered over Bluetooth can expose private data or allow the connecting party to control the Bluetooth device. For security reasons it is necessary to be able to recognize specific devices and thus enable control over which devices are allowed to connect to a given Bluetooth device. At the same time, it is useful for Bluetooth devices to be able to establish a connection without user intervention (for example, as soon as they are in range).
To resolve this conflict, Bluetooth uses a process called bonding, and a bond is created through a process called pairing. The pairing process is triggered either by a specific request from a user to create a bond (for example, the user explicitly requests to "Add a Bluetooth device"), or it is triggered automatically when connecting to a service where (for the first time) the identity of a device is required for security purposes. These two cases are referred to as dedicated bonding and general bonding respectively.
Pairing often involves some level of user interaction, this user interaction is the basis for confirming the identity of the devices. Once pairing successfully completes, a bond will have been formed between the two devices, enabling those two devices to connect to each other in the future without requiring the pairing process in order to confirm the identity of the devices. When desired, the bonding relationship can later be removed by the user.
Reference: http://www.bluetooth.com/Pages/About-Us.aspx
Reference:http://en.wikipedia.org/wiki/Bluetooth
Ace288 merupakan situs agen judi bola terpercaya, terbaru dan terlengkap .
ReplyDeleteBagi anda semua yang suka bermain judi bola online,Livecasino, slot, poker. bisa daftarkan diri anda di ace288.com
Minimal deposit 25.000 dan withdraw 50.000. Proses deposit hanya 1 menit.
CS Super Ramah dan Humble
Hanya 1 user id anda bisa bermain banyak permainan yaitu :
- Live Casino
- Sportsbook
- Slot
- Poker
- Habanero
- IDNLive
Info Promo :
* Welcome Bonus hingga 100%
* Welcome Cashback hingga 100%
* Extra bonus hingga 200%
* Discount 4D : 66.00% , 3D : 59.5.00% , 2D : 29.5.00%
Buruan daftarkan diri anda, kami tunggu kehadiran anda!
LINK ALTERNATIF : ace288.com
WHATSAPP : +63 9185593952
SKYPE : Ace288
LINK JOIN JADI MEMBER : https://bit.ly/2G6aJEG