StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Bluetooth Application Development - Essay Example

Cite this document
Summary
This essay "Bluetooth Application Development" is about a host of technological innovations that have revolutionized wireless broadband Internet access and provided many new and exciting opportunities. However, much is left to be desired in the "last mile" or rather "last few feet"…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.4% of users find it useful
Bluetooth Application Development
Read Text Preview

Extract of sample "Bluetooth Application Development"

Running Head: BLUETOOTH APPLICATION DEVELOPMENT Bluetooth Application Development [The [The of the Executive Summary The recent steps along the wireless technological frontier and a host of technological innovations have revolutionized wireless broadband Internet access and provided many new and exciting opportunities. However, much is left to be desired in the "last mile" or rather "last few feet". For instance, with the advent of GPRS (General Packet Radio Service) and CDMA(Code Division Multiple Access) and a number of other revolutionary modulation and transmission techniques it is now possible to access the internet wirelessly using either a cellular phone or a PDA/Laptop at relatively high speeds. However, when it comes to synchronizing the PDA with the laptop or the phonebook in the cellular phone with PDA/Laptop or just exchanging information with a friend via laptop/PDA one would still need to either use cables to connect the two devices or remove them or have them specifically aligned (as in using Infrared). In either case, the process is quite cumbersome and does not happen without effort. This last bit of the network, which involves ones personal appliance, is referred to as the Personal Area Network (PAN). Ericsson, Nokia, IBM and a host of other companies together developed the Bluetooth wireless specification to specifically address the Personal Area Networking needs. Bluetooth is a short-range, low-cost, small from-factor and secure wireless solution that promises to completely eliminate the need for all data cables connecting the devices in homes and offices. One of the strongest and most attractive features of Bluetooth is its ability to form ad hoc networks. That is, when ever Bluetooth devices are in range of each other they could automatically discover the others presence and even make services related enquiries of each other without any user intervention whatsoever. Hypothesis Is there any significant evidence to prove that the Bluetooth is a short-range, low-cost, small from-factor and secure wireless solution Whereas everybody knows that it promises to completely eliminate the need for all data cables connecting the devices in homes and offices. Introduction In support of starters, it installs in a different way on nearly all phones, not every PCs have Bluetooth integrated, and there's a jumble of mismatched versions. Further we talk about that there are compound "stacks" for Bluetooth, such as WIDCOMM or RFCOMM. It's sufficient to make us desire to plug in a USB cable. Understand on as we expose Bluetooth and give details how to make it work with popular phones. The excellent news: just the once configured, Bluetooth is appealing efficient for swapping data wirelessly. How does Bluetooth work From a user's point of view, there are three important features to Bluetooth: It's wireless. When you travel, you don't have to worry about keeping track of a briefcase full of cables to attach all of your components, and you can design your office without wondering where all the wires will go. It's inexpensive. You don't have to think about it. Bluetooth doesn't require you to do anything special to make it work. The devices find one another and strike up a conversation without any user input at all. Bluetooth communicates on a frequency of 2.45 gigahertz, which has been set aside by international agreement for the use of industrial, scientific and medical devices (ISM). A number of devices that you may already use take advantage of this same radio-frequency band. Baby monitors, garage-door openers and the newest generation of cordless phones all make use of frequencies in the ISM band. To avoid interference Bluetooth uses a technique called spread-spectrum frequency hopping. In this technique, a device will use 79 individual, randomly chosen frequencies within a designated range, changing from one to another on a regular basis. In the case of Bluetooth, the transmitters change frequencies 1,600 times every second, meaning that more devices can make full use of a limited slice of the radio spectrum. Since every Bluetooth transmitter uses spread-spectrum transmitting automatically, it's unlikely that two transmitters will be on the same frequency at the same time. This same technique minimizes the risk that portable phones or baby monitors will disrupt Bluetooth devices, since any interference on a particular frequency will last only a tiny fraction of a second. Bluetooth units often have to contend with electro-magnetically noisy environments. Thus, the need for some kind of error-detection and -correction. For error-detection, Bluetooth uses various checksum-calculations. When errors are detected, there are 3 error-correction schemes defined for Bluetooth: 1. 1/3 rate FEC (Forward Error Correction) 2. 2/3 rate FEC 3. ARQ unnumbered scheme (Automatic Repeat Request). The purpose of the FEC scheme on the data payload is to reduce the number of re-transmissions. However, in a reasonably error-free environment, FEC gives unnecessary overhead that reduces the throughput. Therefore, the packet definitions have been kept flexible to use FEC in the payload or not, resulting in The DM and DH packets for the ACL link, and The HV packets for the SCO link. The packet header is always protected by a 1/3 rate FEC; it contains valuable link information and should be able to sustain more bit errors. On 2 occasions, the transmitted data blocks get corrupted, which is detected by the recipient. So the next time that recipient get a chance to communicate with that sender (i.e. at the next appropriate timeslot), the recipient sends a Negative Acknowledgement (a NAK, depicted in red), which prompts the other party to re-transmit that data block. Step one - Laptop or PC configuration There is predictable a Bluetooth image on the laptops or PCs that appears similar to a B ended out of a bend connect in the system tray. Click it to get in progress. Since we use a desktop PC, we might need a Bluetooth adapter for example the D-Link DBT-120. After plug in, try to run the install disc. Start Bluetooth, and we'll observe the reception or welcome display. Step two - About the Stake After that some steps are different somewhat depending on our stack. Bluetooth stacks decide what our phone willing, for instance sync data or serve as a Web link. WIDCOMM is frequent, particularly on laptops. Although Toshiba laptops utilize the RFCOMM stack and Microsoft has a additional standard stack. Auspiciously, the majority stacks entail the identical basic information. Step three - About the Service Now we can choose which services we wish to use with our phone. Just put a check next to the ones we want. The catch: When we essentially "pair" our phone with our PC, there's one more prompt that will let us identify which services we can actually apply with that phone and that stack. Step four - About Connection At this instant, on our phone, set out the Settings menu, allow Bluetooth, and click an choice to "find me" or "pair" our phone On our PC, our phone be supposed to appear in the choose a contrivance screen. Choose our phone and go next if we don't see our phone, examine the "Bluetooth Trouble" sidebar. Then working on type a code for pairing - in the direction of the inside the similar code on both our PC and our phone, for safety. This can be any figure - though we might have to verify the guide for a precise code. Next to click on pair now option. On our handset, type the similar code. At this instant, click yes to pair the phone. Step five - Successfully Enabled On our laptops, we'll observe a display that declares which Bluetooth services are accessible for our phone. Choose the ones we desire and click the next button, Congrats. We finally have effectively enabled Bluetooth and paired our laptops. How secure is Bluetooth Bluetooth is very secure; encryption, authentication, pairing and other active and passive security measures protect your communication privacy. The radio frequency changes 1600 times per second (called frequency hopping) in order to block simple eavesdropping. Bluetooth uses the same 128-bit encryption method and authentication process that 802.11 uses for maximum security protection and privacy. However, Bluetooth connections are harder to tap than 802.11 connections because the range for Bluetooth is fairly short - from approximately 33 ft. to 330 ft. (10 m to 100 m) - so that someone must come very close to attempt to catch the transmission. A few years ago we first heard of the name Bluetooth. Along with the interesting name, a "futuristic" scenario was embossed in my memory whereby a cell phone would communicate with one's fridge at home and then notify the owner that the milk-supply was running low. This may seem a little far-fetched but it may very well be a reality and a standard in a few decades. Bluetooth's primary purpose is to enable short-range wireless voice and data communications anywhere in the world. The way Bluetooth actually works by allowing users to connect to a wide range of telecommunication and computer devices without cables, namely mobile phones, portable computers, personal handheld devices, as well as connection to the Internet [7]. In the following, we will further explain what, how and where Bluetooth works and what the potential use of this new technology is. Bluetooth is a typical device introduced by a group of electronics makers that allows any sort of electronic equipments, from computers and mobile phones to keyboards and headphones, to make its own connections, wireless, cables or any direct action from a user. [2] It lets almost all equipments talk to one another by producing a common language between them. All equipments such as mobile phones, PDAs, pagers, stereos, and other home appliances can communicate and connect using Bluetooth technology to form a private, personal area network. It is the soubriquet for a development requirement for small form feature, low-cost, short range radio links between mobile PCs, mobile phones and other transferable equipments. Bluetooth technology permits for the substitute of the many proprietary cables that connect one device to another with one universal short-range radio link. The development is an open requirement for wireless phone call of data and voice. It is supports on an inexpensive short-range radio connection, built into a 9 x 9 mm microchip, easier protected ad hoc connections for immobile and mobile communication surroundings. For example, Bluetooth means of communication technology assemble into both the mobile phone and the laptop would substitute the cumbersome cable used nowadays to connect a laptop to a mobile phone. Printers, PDA's, desktops, fax machines, keyboards, joysticks and virtually any other digital equipment can be part of the Bluetooth system. But beyond removing the tethers from equipments by replacing the cables, Bluetooth means of communication technology provides a universal bridge to obtainable data networks, a peripheral interface, and a mechanism to form small private ad hoc groupings of connected equipments away from fixed network infrastructures. When equipment has Bluetooth technology and they are within each other's range, they create an automatic personal area network called a piconet. In this arrangement, one equipment acts as the "master" such as laptop or PDA, while other equipments function as "slaves" such as printers, scanners, etc. A piconet normally carries up to eight equipments. The master equipment decides if a particular communication service is needed from slave equipment. At the time when a connection is made between Bluetooth equipments, an exchange of unique Bluetooth identity called global ID takes place. An equipment globalID indicates its profile along with capability functions. Upon corresponding of the equipment profile a connection is made and as the equipments swap data, the Bluetooth transceiver chip hops back and onward among frequencies. Scatternet appearances if device from one piconet moreover acts as a member of another piconet. Within this system, equipment being master in one piconet can at the similar time be a slave in the other one. Someone may think that when unlike Bluetooth equipments in a room can interfere with one another, but it's improbable that several equipments will be on the same frequency at the same time, because Bluetooth utilizes a system called spread-spectrum frequency hopping. In this system, equipment will use 79 individual, randomly selected frequencies inside a designated range, changing from one to another on a regular basis. In the case of Bluetooth, the transmitters change frequencies 1,600 times every second, meaning that more equipments can make full use of a limited slice of the radio spectrum. Since every Bluetooth transmitter uses spread-spectrum transmitting automatically, it's unlikely that two transmitters will be on the same frequency at the same time. This identical method minimizes the risk that transferable phones or baby monitors will disrupt Bluetooth equipments, since any interference on a particular frequency will last only a tiny fraction of a second. While Bluetooth capable equipments approach within range of one another, an electronic discussion takes place to determine whether they have data to split or whether one needs to control the other. The consumer doesn't have to push a button or give a control, the electronic chat happens automatically. Once the conversation has happened, the equipments, whether they're part of a computer system or a stereo, form a network. [3] Ideally Bluetooth is intended to replace the numerous cables accompanied with today's electronic devices. It will replace serial interface cables found in personal digital assistants (or PDA's), modems, digital cameras and scanners. The same technology can also be used to replace the peripheral cables of monitors, printers, keyboards and mice [5]. This will create a wireless computer eliminating those multiple wires found tangled behind one's typical set-up today. The possibilities for Bluetooth technology are limitless. Imagine a cell phone that is your personal central unit, which can control almost everything, including your house lights, appliances, alarm and car. For example, you wake up to the melodious alarm ring of your mobile phone at seven o'clock, and along with the ring your coffee maker will start, the lights in your bathroom will turn on and your TV will switch on to the news channel. The same mobile phone can later on start your car outside and lock your house with the security system as you are walking out on your way to work. An highly regarded function is auto-synchronization or hidden computing, for example your PDA and your laptop or mobile phone auto-synchronize data such as emails and appointments as soon as they are within the range of each other and without any user interaction [4]. This is a great feature for people who get large amounts of email but access it through more then one device. Indeed the emerging Bluetooth technology does not sound too bad, it is rather safe, secure and most of all convenient. At the current growth rate Bluetooth will be widely accepted and used in a few years from now. IDC Research Company shows that the technology will be embedded in more than 100 million devices in the U.S. and 450 million around the globe by 2004 [3]. The elimination of wires and the hassle of plugging them in is not only an easy and useful solution but also a cheaper one. All the proprietary cables come at a great cost not to mention the amount of space they take up and the time that goes into configuring the devices. Methodology From the research question, the research objectives can be achieved. There is a need to understand the link between the Bluetooth technology in laptops available, the interface and interaction the user has with the product and the aspects of the product itself. Research objectives are based on gaps in knowledge of the target audience. Since this invention is new for laptops, the gaps are wide and there will be a need to gather vast amount of knowledge of their target audience. There will be an investigation into the response of a new hand held computer device among mobile phone users and identify issues for research and development. Research Methods Research methodology refers to the research process, the procedural framework within which the research is conducted. This methodology is defined by Leedy [9] as 'an operational framework within which the facts are placed so that their meaning may be seen more clearly'. Some methods provide data, which are quantitative and some that are qualitative. Quantitative methods (e.g. experiments, questionnaires and psychometric tests) provide information, which is easy to analyze statistically and fairly reliable. Quantitative methods are associated with the scientific and experimental approach and are criticized for not providing an in depth description. Qualitative methods are ways of collecting data, which are concerned with describing meaning, rather than with drawing statistical inferences. Depth Interviews Through a depth interview we can arrange an unstructured one-to-one interview and a direct way of obtaining information about this technology. Using depth interviews can gain insight that focus groups might not be able to. For example, group pressures are eliminated, so the respondent feels more comfortable to reveal more honest feelings. The respondent feels valued and appreciated in a one-to-one situation. The response of a respondent can be probed to gain further information. Since there are no restrictions of cultivating a group process, the interview is more flexible in exploring casual remarks and tangential issues [16]. The technique used for the interview will be the repertory grid since it requires more interaction from the respondent. It can explore meanings that might be hard to explain. This method is used in contrast to the laddering technique because this technique is controlled by the researcher and is not as flexible. Conclusion Local Area Networks (LANs) have become indispensable in the past few years. Many LAN technologies have been designed, and more than a few of these have made it to market; Ethernet is one of the most successful. The reasons for its success are: From the time of the first Ethernet standard, the specifications and the rights to build Ethernet technology have been made easily available to anyone. This openness, combined with the ease of use and robustness of the Ethernet system, resulted in a large Ethernet market and is another reason Ethernet is so widely implemented in the computer industry. Ethernet is capable of good performance for typical applications, even at high offered load. However the performance of CSMA/CD is sensitive to packet size and the time it takes to detect a collision. Therefore users must keep these parameters in mind. Bluetooth works so well for many reasons. One of these is its ease of use to connect, all that is required is Bluetooth enabling device, such as IOGEARs Bluetooth to USB Adapter. Bluetooth technology works because it has been developed as a cross industry solution it marries a vision of engineering innovation with an understanding of business and consumer expectations. With the drastic enhancement in new technology this past century, we are sure that many people have pondered the question: "We wonder what new technology is going to be part of our lives in the next 10 years or so". Wireless communications is the one particular technology that has always fascinated me. The convenience and mass usage of cordless phones, cell phones, wireless networking, GPS or navigation systems have always captured my attention. References [1]. Franklin, Curt 'How Bluetooth works' http://www.howstuffworks.com/bluetooth.htm [2]. Bray, Jennifer and Sturman, Charles F. (2000) 'Bluetooth: Connect Without Cables' Prentice Hall, p. 19-40 [3]. Muller, Nathan J. (2001), 'Bluetooth Demystified' The McGraw-Hill Companies Inc, p. 132-190. [4]. Miller, Michael (2001), 'Discovering Bluetooth' Sybex Inc. [5]. Miller, Brent A. and Bisdikian, Chatschik (2001), 'Bluetooth Revealed' Prentice Hall, p. 274-298. [6]. 'Specification of the Bluetooth System', Version 1.1 2001 http://ww.bluetooth.com/pdf/Bluetooth_11_Specifications_Book.pdfThe [7]. Official Bluetooth Website, 'How it works' http://www.bluetooth.com/tech/works.asp [8]. Jankowicz, A. (1995) Business Research Projects. London: International Thomson Business Press. [9]. Leedy, P. D. (1989). Practical Research: Planning and Design. MacMillan, fifth edition. [10]. Hague, Paul N. Questionnaire design. (1993) London: Kogan, p. 658. [11]. Obdd's Yaniv Shaked (2006) Cryptanalysis of the Bluetooth E 0 Cipher using - Chicago Press. [12]. Fluhrer (2002). Improved key recovery of level 1 of the Bluetooth Encryption System. Journal of Communication Technology. March 2002. [13]. IEEE November 6 - 9, 2002, Boston, MA - Bluetooth Wireless Technology. [14]. Beutel, Kasten (2001). A Minimal Bluetooth-Based Computing and Communication Platform. [15]. van der Zee, Heijenk (2001). Quality of Service in Bluetooth Networking - Part I. [16]. Proctor (2003) Essentials of Marketing Research, 3rd edition, Gosport, Prentice Hall Pearson Education Limited. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Bluetooth Application Development Essay Example | Topics and Well Written Essays - 1500 words”, n.d.)
Retrieved from https://studentshare.org/technology/1510926-bluetooth-application-development
(Bluetooth Application Development Essay Example | Topics and Well Written Essays - 1500 Words)
https://studentshare.org/technology/1510926-bluetooth-application-development.
“Bluetooth Application Development Essay Example | Topics and Well Written Essays - 1500 Words”, n.d. https://studentshare.org/technology/1510926-bluetooth-application-development.
  • Cited: 0 times

CHECK THESE SAMPLES OF Bluetooth Application Development

Strengths and Weaknesses of Professional Development

The journey to wholeness requires that you look honestly, openly, and with courage into yourself, into the dynamics that lie behind what you feel, what you perceive, what you value, and how you act1.... Personality analysis identifies the traits that ones have and the inter-relation between these characteristics....
8 Pages (2000 words) Admission/Application Essay

Undergraduate College Common Application for Transfering

I want to attend (new college) because I care about knowledge in-itself, and I realize this is my best opportunity to be around other students, with similar interests, purpose, and goals.... I have developed a considerable amount as a result of my time spent at (old college), and I… I believe in purpose, or at least something that transcends blind allegiance to the dollar, and this belief has taken me beyond my previous concerns scholastic concerns into new realms of academic investigation....
2 Pages (500 words) Admission/Application Essay

Education Major in Child Development

This paper "Education Major in Child development" focuses on the fact that the author's passion for teaching young children towards their development of being responsible adults led the author of this paper to the desire to become one of the faculty members in school.... As attached in my resume, I have recently gained my Associate Degree in Education major in Child development.... In response to this need, I am back to studying at San Jose State University, continuing my major in Child development, along with the Chinese language....
1 Pages (250 words) Admission/Application Essay

Marketing Plan Development Blog

In order to… This is expected to drive the company's revenue up (Pride and Ferrell, 2012). The current market share of Sand and Wels Trucking Marketing Plan development Blog Sand and Wels Trucking Company Marketing Plan Objectives The company's marketing objective is “toincrease the company's profits by 20% over 2012 sales, between May 1, 2014 and May 1, 2015....
2 Pages (500 words) Admission/Application Essay

Human Development

The transition period from the late childhood to adulthood is… Adolescence is a challenging stage of human development mainly characterised by unique physical, social and emotional changes. Adolescence commences with the onset of puberty between the age of about 12 and 20 years although it may extend Human development Human development: Adolescent Stage Human development is the process of broadening the freedoms of the people and opportunities in order to improve their wellbeing....
1 Pages (250 words) Admission/Application Essay

MS in Real Estate Development

My family owns more than one thousand acres of land with a lot of development projects.... Our current real estate collection ranges from residential to commercial and industrial properties… My family's next large scale development project will be to construct a small town a few miles outside East of Jakarta Region.... The project is planned to have five stages of development in the course of However, the recent economic slump in Indonesia has caused the postponement of our expansion plan....
4 Pages (1000 words) Admission/Application Essay

Personal Development Plan

In this paper, the writer would like to explain his personal development plan with the help of his current position and future aspirations in his professional life.... Career development is one of the main objectives of any enthusiastic professional who wants to capture the heights in his profession.... Career aspiring professionals must develop a personal development plan in order to make them capable of accepting bigger challenges in their future professional life....
12 Pages (3000 words) Admission/Application Essay

Personal Development Planning

… The paper "Personal development Planning" is a good example of an application essay on education.... The paper "Personal development Planning" is a good example of an application essay on education.... nbsp;Foreign exchange is categorized as one the most liquid financial market since its trading is on a global level scale, on the other hand, this has earned it recognition as one of the world's fast-paced markets....
7 Pages (1750 words) Admission/Application Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us