Term Paper: Bluetooth Technology in Detail. It Puts Light

Pages: 5 (1727 words)  ·  Bibliography Sources: 4  ·  Level: College Senior  ·  Topic: Physics  ·  Buy This Paper

¶ … Bluetooth technology in detail. It puts light on the frequency range, topologies, security considerations, advantages and disadvantages of Bluetooth networking. It also discusses the Bluetooth networking devices as well. This paper aims to define Bluetooth technology and the ways in which it fits in the world of networking.

From the beginning of the computers to their evolution and perfection the human beings were disturbed by one thing: wires. The computer or any other system needs all its peripherals to be connected. To get rid of these wires for connections, to share files without wires and for numerous other reasons radio technology was used. Bluetooth is a standard for a similar radio chip that can be used to create connections over small areas. It can make several connections at a time. The Bluetooth special interest group (SIG) handles the Bluetooth and it started in 1998 with five members. The SIG now has 17000 member companies which operate in different fields. (Discover the world of Bluetooth technology)

Working and Infrastructure of Bluetooth and Frequency Range of Bluetooth

The Bluetooth works in a frequency range that is acceptable in industry, science and medical (ISM) band. The range is from 2.402 to 2.480 GHz. Any Bluetooth device uses these 79 frequencies each measuring 1 MHz. The availability of multiple frequencies helps the device to set up a frequency hopping pattern which is then followed by all the devices connected to it. Frequency hopping enables the device to hop between these frequencies 1600 times per second. So the chances of interference in a Bluetooth network are very low. If any other device has the same frequency then it will only collide with the network for 1/1600th of a second. ("Bluetooth wireless technology," 2004)

Bluetooth Topologies

Like every connection, Bluetooth connections also have topologies. The Bluetooth topology is made up of piconets and scatternets. A piconet is formed when 6 or less slave devices connect to a master device. This master device then sets up the hopping pattern which is then followed by the rest. Each piconet has a different hopping pattern to distinguish it from other connections. A scatternet on the other hand is formed when two or more piconets connect. In this case, the device in multiple piconets sets up the hopping pattern of the master of the piconet it is currently communicating with. ("Bluetooth wireless technology," 2004)

Security Considerations

Anyone using a connection is concerned about the security and privacy of the connection. Bluetooth security is both more complex and simpler than WLAN. The security is complex because there are numerous applications and different security option for every application. The security is simpler because there is no need for the user to understand it. The 128 bit SAFER+ algorithm which is used for the security of the connection is very strong. The Bluetooth security consists of both authentication and encryption. The authentication uses a one time 128 bit key that gives a device entry to the connection. In encryption however, the key is derived from a link key which can be smaller. In general access profile, Bluetooth consists of three modes of security. Mode one: no security, Mode two: in this level, the service determines the level of security. You can give access to certain things to a device and can restrict a few things and Mode three: in this mode all devices must authorize themselves and implement security procedures. ("Understanding Bluetooth™," 2002)

Bluetooth networking devices:

Bluetooth Network Access Points

The functioning of Bluetooth network access points is somewhat similar to the functioning of WI-Fi access points. The only major difference between these two is the presence and use of Bluetooth technology. The clients' computers have Bluetooth adapters that have an access to the Bluetooth network points. These adapters lint the computers of clients to Bluetooth access points and these points give the connected computers an access to the local area network or wide area network. Point-to Point protocol (PPP) server functions are being provided by this technology for a number of local area networks including Ethernet, Token Ring, Cable Modem and simple networks present in a number of houses etcetera. (Patel, 2005)

At present time this technology can only transfer data at a low speed. The way in which the data terminal functions look like as if it is connected with some local area network with the help of dial-up networking. The major advantage of this technology is that it supports almost all the varied types of Bluetooth. This means that whether it is a mobile phone or a Personal Digital Assistant (PDA), any device can have an access to the local area network with the help of this technology. Another benefit is that the Bluetooth network access points can work with any Bluetooth adapter irrespective of its type and model. In addition to that, the radio signals that are being emitted by Bluetooth network access points as compared to other Bluetooth adapters. They can cover an area of about forty to hundred meters which is greater than the area of ten meters that is generally covered by other Bluetooth adapters. (Patel, 2005)

Use of Master Device Connection in Networking

The connection of a master device is another method with the help of which a Bluetooth connection can be established. The ability of mobile phones to remotely establish a connection with different networks is an appropriate example of this category of Bluetooth networking. It has been explained that when a master node has a connection with a network, the slave nodes, that are not being connected to the network on an individual bases, can also have an access to the network through the master node. By using a master device connection a Bluetooth network can be established to connect various devices. (Patel, 2005)

Growing Importance and Advantages of Bluetooth

Bluetooth has become important nowadays. The technology world will be incomplete if it is without Bluetooth. Bluetooth can be used where a personal area network is to be made. The connection you make between your phone and your Bluetooth headset and even the connection you make with your friend's phone via Bluetooth is an example of a personal area network. Bluetooth runs on very low power as compared to others wireless connection. ("Discover the world,")

Another benefit of using Bluetooth is that interference in a Bluetooth connection is quite difficult. In today's world, Bluetooth is functional in computers, laptops, printers, GPS, medical, science and industry. The frequency range of the Bluetooth allows it to be used in hospitals as well. In addition to that, the speed of Bluetooth is almost 2.1Mbps which is enough for a personal area network. The fact that supports its slow speed is that its power consumption is also very low. Bluetooth can be used for voice transfer without using cables over a small area. Another thing that makes Bluetooth efficient is its versatility. Bluetooth can be used for many applications in different fields. Data transfer, gaming, music or other Bluetooth can come in handy in the removal of cables in all these areas. ("Discover the world,")

Bluetooth connections can be made over different ranges. Class three Bluetooth which is embedded in cell phones and PDA's have a range of 10m. Class two Bluetooth which is used in printers and GPS have a range of 20m. Class one Bluetooth, which is used in Bluetooth to USB adapters, has a range of 100m. ("Discover the world,")


Though many measures have been taken to secure the Bluetooth signals and data transfer but it is still very easy for a third party to intercept the signals that are being sent by a Bluetooth. The Bluetooth signals are quite scattered and they travel in all directions and they can even travel through walls as well. Intercepting Bluetooth signals can be as easy as listening to someone's conversation from across the wall. With the advancements in computer technology a good hacking program that can hack Bluetooth signals can be made in no time. In case of a wired network the hackers have to tap an organization's network first but in case of a Bluetooth network they only need a receiver which could catch the signals and the network can easily be hacked. (Dursch, Yen & Shih, 2004)

Another disadvantage is the short-range of Bluetooth networks and due to this problem it cannot be used in large organizations as the employees might not be able to access the network from a distant place. And if an organization is located in different buildings than Bluetooth networking cannot work without the help of other networking technology. (Dursch, Yen & Shih, 2004)

Another disadvantage of Bluetooth networking is speed. In this era of advanced technology Bluetooth networks should work at a greater speed in order to fulfill the requirements of any establishment or individual. (Dursch, Yen & Shih, 2004)


The Bluetooth has a very promising role in the industry of technology and communication. It has the tendency to connect the computers of world through… [END OF PREVIEW]

iPad Keyboard and Case Marketing Plan

Security Issues in IEEE Wlan's 802.11 Term Paper

Organization Behavior Marketing Report for HP Pavilion Assessment

Innovative Supply Chain Management Practices Essay

EZ Tracker: Analysis of International Business Opportunity Business Plan

View 8 other related papers  >>

Cite This Term Paper:

APA Format

Bluetooth Technology in Detail. It Puts Light.  (2013, March 12).  Retrieved August 22, 2019, from https://www.essaytown.com/subjects/paper/bluetooth-technology-detail-puts-light/9686353

MLA Format

"Bluetooth Technology in Detail. It Puts Light."  12 March 2013.  Web.  22 August 2019. <https://www.essaytown.com/subjects/paper/bluetooth-technology-detail-puts-light/9686353>.

Chicago Format

"Bluetooth Technology in Detail. It Puts Light."  Essaytown.com.  March 12, 2013.  Accessed August 22, 2019.