A Comparative Study of Mobile Operating Systems With Special Emphasis On Android OS
A Comparative Study of Mobile Operating Systems With Special Emphasis On Android OS
data or android screen mirroring then this page will guide you. Let’s discuss.
Contents:
What is PC Suite?
What is PC Suite?
mobile and provides us in a single place. PC suite can access media, apps,
Custom ringtone maker
Screen capturing option
IEEE 802.15
From Wikipedia, the free encyclopedia
Contents
IEEE 802.15.3b-2006[edit]
IEEE 802.15.3b-2005 amendment was released on May 5, 2006. It enhanced
802.15.3 to improve implementation and interoperability of the MAC. This
amendment include many optimizations, corrected errors, clarified ambiguities, and
added editorial clarifications while preserving backward compatibility. Among other
changes, the amendment defined the following new features: [8]
IEEE 802.15.4-2003 (Low Rate WPAN) deals with low data rate but very long battery
life (months or even years) and very low complexity. The standard defines both the
physical (Layer 1) and data-link (Layer 2) layers of the OSI model. The first edition of
the 802.15.4 standard was released in May 2003. Several standardized and
proprietary networks (or mesh) layer protocols run over 802.15.4-based networks,
including IEEE 802.15.5, ZigBee, Thread, 6LoWPAN, WirelessHART,
and ISA100.11a.
WPAN Low Rate Alternative PHY (4a)[edit]
Main article: IEEE 802.15.4a
Route establishment
Dynamic route reconfiguration
Discovery and addition of new nodes
Breaking of established routes
Loss and recurrence of routes
Real time gathering of link status
Allowing for single hop appearance at the networking layer (not breaking standard L3
mechanisms)
Support for broadcast
Support for multicast
Effective frame forwarding
The draft recommended practice is under development; more information can be
found on the IEEE 802.15.10 web page.
See also[edit]
Bluetooth
From Wikipedia, the free encyclopedia
Jump to navigationJump to search
For the Danish king, see Harald Bluetooth.
Bluetooth
Personal computers
Compatible
Smartphones
hardware
Gaming consoles
Audio devices
(330 ft).
Website www.bluetooth.com
Logo[edit]
The Bluetooth logo is a bind rune merging the Younger Futhark runes (ᚼ, Hagall) and
(ᛒ, Bjarkan), Harald's initials.[15][16]
History[edit]
Ericsson Bluetooth module PBA 313 01/2S R2A manufactured in week 22, 2001.
The development of the "short-link" radio technology, later named Bluetooth, was initiated in
1989 by Nils Rydbeck, CTO at Ericsson Mobile in Lund, Sweden. The purpose was to develop
wireless headsets, according to two inventions by Johan Ullman, SE 8902098-6, issued 1989-06-
12 and SE 9202239, issued 1992-07-24. Nils Rydbeck tasked Tord Wingren with specifying and
Dutchman Jaap Haartsen and Sven Mattisson with developing.[17] Both were working for Ericsson
in Lund.[18] Principal design and development began in 1994 and by 1997 the team had a
workable solution.[19] From 1997 Örjan Johansson became the project leader and propelled the
technology and standardization.[20][21][22][23]
In 1997, Adalio Sanchez, then head of IBM ThinkPad product R&D, approached Nils Rydbeck
about collaborating on integrating a mobile phone into a ThinkPad notebook. The two assigned
engineers from Ericsson and IBM to study the idea. The conclusion was that power consumption
on cellphone technology at that time was too high to allow viable integration into a notebook and
still achieve adequate battery life. Instead, the two companies agreed to integrate Ericsson's
short-link technology on both a ThinkPad notebook and an Ericsson phone to accomplish the
goal. Since neither IBM ThinkPad notebooks nor Ericsson phones were the market share leaders
in their respective markets at that time, Adalio Sanchez and Nils Rydbeck agreed to make the
short-link technology an open industry standard to permit each player maximum market access.
Ericsson contributed the short-link radio technology, and IBM contributed patents around the
logical layer. Adalio Sanchez of IBM then recruited Stephen Nachtsheim of Intel to join and then
Intel also recruited Toshiba and Nokia. In May 1998, the Bluetooth SIG was launched with IBM
and Ericsson as the founding signatories and a total of five members: Ericsson, Intel, Nokia,
Toshiba and IBM.
The first consumer Bluetooth device was launched in 1999. It was a hands-free mobile headset
that earned the "Best of show Technology Award" at COMDEX. The first Bluetooth mobile phone
was the Ericsson T36 but it was the revised T39 model that actually made it to store shelves in
2001. In parallel, IBM introduced the IBM ThinkPad A30 in October 2001 which was the first
notebook with integrated Bluetooth.
Bluetooth's early incorporation into consumer electronics products continued at Vosi
Technologies in Costa Mesa, California, USA, initially overseen by founding members Bejan
Amini and Tom Davidson. Vosi Technologies had been created by real estate developer Ivano
Stegmenga, with United States Patent 608507, for communication between a cellular phone and
a vehicle's audio system. At the time, Sony/Ericsson had only a minor market share in the
cellular phone market, which was dominated in the US by Nokia and Motorola. Due to ongoing
negotiations for an intended licensing agreement with Motorola beginning in the late 1990s, Vosi
could not publicly disclose the intention, integration and initial development of other enabled
devices which were to be the first "Smart Home" internet connected devices.
Vosi needed a means for the system to communicate without a wired connection from the vehicle
to the other devices in the network. Bluetooth was chosen, since Wi-Fi was not yet readily
available or supported in the public market. Vosi had begun to develop the Vosi Cello integrated
vehicular system and some other internet connected devices, one of which was intended to be a
table-top device named the Vosi Symphony, networked with Bluetooth. Through the negotiations
with Motorola, Vosi introduced and disclosed its intent to integrate Bluetooth in its devices. In the
early 2000s a legal battle ensued between Vosi and Motorola, which indefinitely suspended
release of the devices. Later, Motorola implemented it in their devices which initiated the
significant propagation of Bluetooth in the public market due to its large market share at the time.
In 2012, Jaap Haartsen was nominated by the European Patent Office for the European Inventor
Award.[19]
Implementation[edit]
Bluetooth operates at frequencies between 2.402 and 2.480 GHz, or 2.400 and 2.4835 GHz,
including guard bands 2 MHz wide at the bottom end and 3.5 MHz wide at the top.[24] This is in
the globally unlicensed (but not unregulated) industrial, scientific and medical (ISM) 2.4 GHz
short-range radio frequency band. Bluetooth uses a radio technology called frequency-hopping
spread spectrum. Bluetooth divides transmitted data into packets, and transmits each packet on
one of 79 designated Bluetooth channels. Each channel has a bandwidth of 1 MHz. It usually
performs 1600 hops per second, with adaptive frequency-hopping (AFH) enabled.[24] Bluetooth
Low Energy uses 2 MHz spacing, which accommodates 40 channels.[25]
Originally, Gaussian frequency-shift keying (GFSK) modulation was the only modulation scheme
available. Since the introduction of Bluetooth 2.0+EDR, π/4-DQPSK (differential quadrature
phase-shift keying) and 8-DPSK modulation may also be used between compatible devices.
Devices functioning with GFSK are said to be operating in basic rate (BR) mode, where an
instantaneous bit rate of 1 Mbit/s is possible. The term Enhanced Data Rate (EDR) is used to
describe π/4-DPSK (EDR2) and 8-DPSK (EDR3) schemes, each giving 2 and 3 Mbit/s
respectively. The combination of these (BR and EDR) modes in Bluetooth radio technology is
classified as a BR/EDR radio.
In 2019, Apple published an extension called HDR which supports data rates of 4 (HDR4) and 8
(HDR8) Mbit/s using π/4-DQPSK modulation on 4 MHz channels with forward error correction
(FEC).[26]
Bluetooth is a packet-based protocol with a main/follower architecture. One main may
communicate with up to seven followers in a piconet. All devices within a given piconet use the
clock provided by the master as the base for packet exchange. The master clock ticks with a
period of 312.5 μs, two clock ticks then make up a slot of 625 µs, and two slots make up a slot
pair of 1250 µs. In the simple case of single-slot packets, the main transmits in even slots and
receives in odd slots. The follower, conversely, receives in even slots and transmits in odd slots.
Packets may be 1, 3, or 5 slots long, but in all cases, the main's transmission begins in even
slots and the follower's in odd slots.
The above excludes Bluetooth Low Energy, introduced in the 4.0 specification, [27] which uses the
same spectrum but somewhat differently.
Uses[edit]
Bluetooth is a standard wire-replacement communications protocol primarily designed for low
power consumption, with a short range based on low-cost transceiver microchips in each device.
[29]
Because the devices use a radio (broadcast) communications system, they do not have to be
in visual line of sight of each other; however, a quasi optical wireless path must be viable.[30]
Max. permitted power
Class
(mW) (dBm)
2 1 — 2.5 0 — +4
3 0.01 — 1 -20 — 0
Historically, the Bluetooth range was defined by the radio class, with a lower class (and higher
output power) having larger range. [2] The actual range achieved by a given link will depend on the
qualities of the devices at both ends of the link, as well as the air and obstacles in between. The
primary hardware attributes affecting range are the data rate, protocol (Bluetooth Classic or
Bluetooth Low Energy), the transmitter power, the receiver sensitivity, and the gain of both
antennas.[31]
The effective range varies depending on propagation conditions, material coverage, production
sample variations, antenna configurations and battery conditions. Most Bluetooth applications
are for indoor conditions, where attenuation of walls and signal fading due to signal reflections
make the range far lower than specified line-of-sight ranges of the Bluetooth products.
Most Bluetooth applications are battery-powered Class 2 devices, with little difference in range
whether the other end of the link is a Class 1 or Class 2 device as the lower-powered device
tends to set the range limit. In some cases the effective range of the data link can be extended
when a Class 2 device is connecting to a Class 1 transceiver with both higher sensitivity and
transmission power than a typical Class 2 device.[32] Mostly, however, the Class 1 devices have a
similar sensitivity to Class 2 devices. Connecting two Class 1 devices with both high sensitivity
and high power can allow ranges far in excess of the typical 100m, depending on the throughput
required by the application. Some such devices allow open field ranges of up to 1 km and
beyond between two similar devices without exceeding legal emission limits. [33][34][35]
Bluetooth profile[edit]
Main article: List of Bluetooth profiles
To use Bluetooth wireless technology, a device must be able to interpret certain Bluetooth
profiles, which are definitions of possible applications and specify general behaviors that
Bluetooth-enabled devices use to communicate with other Bluetooth devices. These profiles
include settings to parameterize and to control the communication from the start. Adherence to
profiles saves the time for transmitting the parameters anew before the bi-directional link
becomes effective. There are a wide range of Bluetooth profiles that describe many different
types of applications or use cases for devices.[36]
List of applications[edit]
Wireless control and communication between a mobile phone and a handsfree headset. This
was one of the earliest applications to become popular. [37]
Wireless control of and communication between a mobile phone and a Bluetooth compatible
car stereo system (and sometimes between the SIM card and the car phone [38][39]).
Wireless communication between a smartphone and a smart lock for unlocking doors.
Wireless control of and communication with iOS and Android device phones, tablets and
portable wireless speakers.[40]
Wireless Bluetooth headset and intercom. Idiomatically, a headset is sometimes called "a
Bluetooth".
Wireless streaming of audio to headphones with or without communication capabilities.
Wireless streaming of data collected by Bluetooth-enabled fitness devices to phone or PC. [41]
Wireless networking between PCs in a confined space and where little bandwidth is required.
[42]
Wireless communication with PC input and output devices, the most common being
the mouse, keyboard and printer.
Transfer of files, contact details, calendar appointments, and reminders between devices
with OBEX[a] and sharing directories via FTP.[43]
Replacement of previous wired RS-232 serial communications in test equipment, GPS
receivers, medical equipment, bar code scanners, and traffic control devices.
For controls where infrared was often used.
For low bandwidth applications where higher USB bandwidth is not required and cable-free
connection desired.
Sending small advertisements from Bluetooth-enabled advertising hoardings to other,
discoverable, Bluetooth devices.[44]
Wireless bridge between two Industrial Ethernet (e.g., PROFINET) networks.
Game consoles have been using Bluetooth as a wireless communications protocol for
peripherals since the seventh generation, including Nintendo's Wii[45] and Sony's PlayStation
3 which use Bluetooth for their respective controllers.
Dial-up internet access on personal computers or PDAs using a data-capable mobile phone
as a wireless modem.
Short-range transmission of health sensor data from medical devices to mobile phone, set-
top box or dedicated telehealth devices.[46][47]
Allowing a DECT phone to ring and answer calls on behalf of a nearby mobile phone.
Real-time location systems (RTLS) are used to track and identify the location of objects in
real time using "Nodes" or "tags" attached to, or embedded in, the objects tracked, and
"Readers" that receive and process the wireless signals from these tags to determine their
locations.[48]
Personal security application on mobile phones for prevention of theft or loss of items. The
protected item has a Bluetooth marker (e.g., a tag) that is in constant communication with the
phone. If the connection is broken (the marker is out of range of the phone) then an alarm is
raised. This can also be used as a man overboard alarm.
Calgary, Alberta, Canada's Roads Traffic division uses data collected from travelers'
Bluetooth devices to predict travel times and road congestion for motorists. [49]
Wireless transmission of audio (a more reliable alternative to FM transmitters)
Live video streaming to the visual cortical implant device by Nabeel Fattah in Newcastle
university 2017.[50]
Connection of motion controllers to a PC when using VR headsets
Bluetooth vs Wi-Fi (IEEE 802.11)[edit]
Bluetooth and Wi-Fi (Wi-Fi is the brand name for products using IEEE 802.11 standards) have
some similar applications: setting up networks, printing, or transferring files. Wi-Fi is intended as
a replacement for high-speed cabling for general local area network access in work areas or
home. This category of applications is sometimes called wireless local area networks (WLAN).
Bluetooth was intended for portable equipment and its applications. The category of applications
is outlined as the wireless personal area network (WPAN). Bluetooth is a replacement for cabling
in various personally carried applications in any setting and also works for fixed location
applications such as smart energy functionality in the home (thermostats, etc.).
Wi-Fi and Bluetooth are to some extent complementary in their applications and usage. Wi-Fi is
usually access point-centered, with an asymmetrical client-server connection with all traffic
routed through the access point, while Bluetooth is usually symmetrical, between two Bluetooth
devices. Bluetooth serves well in simple applications where two devices need to connect with a
minimal configuration like a button press, as in headsets and speakers.
Devices[edit]
A typical Bluetooth USB dongle
A personal computer that does not have embedded Bluetooth can use a Bluetooth adapter that
enables the PC to communicate with Bluetooth devices. While some desktop computers and
most recent laptops come with a built-in Bluetooth radio, others require an external adapter,
typically in the form of a small USB "dongle."
Unlike its predecessor, IrDA, which requires a separate adapter for each device, Bluetooth lets
multiple devices communicate with a computer over a single adapter. [56]
Linux has two popular Bluetooth stacks, BlueZ and Fluoride. The BlueZ stack is included with
most Linux kernels and was originally developed by Qualcomm.[60] Fluoride, earlier known as
Bluedroid is included in Android OS and was originally developed by Broadcom.[61] There is also
Affix stack, developed by Nokia. It was once popular, but has not been updated since 2005. [62]
FreeBSD has included Bluetooth since its v5.0 release, implemented through netgraph.[63][64]
NetBSD has included Bluetooth since its v4.0 release.[65][66] Its Bluetooth stack was ported
to OpenBSD as well, however OpenBSD later removed it as unmaintained. [67][68]
DragonFly BSD has had NetBSD's Bluetooth implementation since 1.11 (2008). [69][70] A netgraph-
based implementation from FreeBSD has also been available in the tree, possibly disabled until
2014-11-15, and may require more work.[71][72]
The Bluetooth Core Specification, release cycle is typically a few years in between
Core Specification Addendum (CSA), release cycle can be as tight as a few times per year
Core Specification Supplements (CSS), can be released very quickly
Errata (Available with a user account: Errata login)
Bluetooth 1.0 and 1.0B[edit]
Bluetooth 4.0[edit]
Main article: Bluetooth Low Energy
The Bluetooth SIG completed the Bluetooth Core Specification version 4.0
(called Bluetooth Smart) and has been adopted as of 30 June 2010. It
includes Classic Bluetooth, Bluetooth high speed and Bluetooth Low
Energy (BLE) protocols. Bluetooth high speed is based on Wi-Fi, and Classic
Bluetooth consists of legacy Bluetooth protocols.
Bluetooth Low Energy, previously known as Wibree,[94] is a subset of Bluetooth
v4.0 with an entirely new protocol stack for rapid build-up of simple links. As an
alternative to the Bluetooth standard protocols that were introduced in Bluetooth
v1.0 to v3.0, it is aimed at very low power applications powered by a coin cell.
Chip designs allow for two types of implementation, dual-mode, single-mode
and enhanced past versions.[95] The provisional names Wibree and Bluetooth
ULP (Ultra Low Power) were abandoned and the BLE name was used for a
while. In late 2011, new logos "Bluetooth Smart Ready" for hosts and "Bluetooth
Smart" for sensors were introduced as the general-public face of BLE. [96]
Compared to Classic Bluetooth, Bluetooth Low Energy is intended to provide
considerably reduced power consumption and cost while maintaining a similar
communication range. In terms of lengthening the battery life of Bluetooth
devices, BLE represents a significant progression.
Bluetooth 4.1[edit]
The Bluetooth SIG announced formal adoption of the Bluetooth v4.1
specification on 4 December 2013. This specification is an incremental software
update to Bluetooth Specification v4.0, and not a hardware update. The update
incorporates Bluetooth Core Specification Addenda (CSA 1, 2, 3 & 4) and adds
new features that improve consumer usability. These include increased co-
existence support for LTE, bulk data exchange rates—and aid developer
innovation by allowing devices to support multiple roles simultaneously. [105]
New features of this specification include:
Bluetooth 4.2[edit]
Released on 2 December 2014, it introduces features for the Internet of Things.
The major areas of improvement are:
Bluetooth 5[edit]
The Bluetooth SIG released Bluetooth 5 on 6 December 2016. Its new features
are mainly focused on new Internet of Things technology. Sony was the first to
announce Bluetooth 5.0 support with its Xperia XZ Premium in Feb 2017 during
the Mobile World Congress 2017. [109] The Samsung Galaxy S8 launched with
Bluetooth 5 support in April 2017. In September 2017, the iPhone 8, 8 Plus
and iPhone X launched with Bluetooth 5 support as well. Apple also integrated
Bluetooth 5 in its new HomePod offering released on 9 February 2018.
[110]
Marketing drops the point number; so that it is just "Bluetooth 5" (unlike
Bluetooth 4.0);[111] the change is for the sake of "Simplifying our marketing,
communicating user benefits more effectively and making it easier to signal
significant technology updates to the market."
Bluetooth 5 provides, for BLE, options that can double the speed (2 Mbit/s burst)
at the expense of range, or provide up to four times the range at the expense of
data rate. The increase in transmissions could be important for Internet of
Things devices, where many nodes connect throughout a whole house.
Bluetooth 5 increases capacity of connectionless services such as location-
relevant navigation[112] of low-energy Bluetooth connections.[113][114][115]
The major areas of improvement are:
Park State[116]
Bluetooth 5.1[edit]
The Bluetooth SIG presented Bluetooth 5.1 on 21 January 2019.
The major areas of improvement are:
Angle of Arrival (AoA) and Angle of Departure (AoD) which are used for
locating and tracking of devices
Advertising Channel Index
GATT Caching
Minor Enhancements batch 1:
o HCI support for debug keys in LE Secure Connections
o Sleep clock accuracy update mechanism
o ADI field in scan response data
o Interaction between QoS and Flow Specification
o Block Host channel classification for secondary advertising
o Allow the SID to appear in scan response reports
o Specify the behavior when rules are violated
Periodic Advertising Sync Transfer
Features Added in Core Specification Addendum (CSA) 6 – Integrated in v5.1:
Models
Mesh-based model hierarchy
The following features were removed in this version of the specification:
Unit keys
Bluetooth 5.2[edit]
On 31 December 2019, the Bluetooth SIG published the Bluetooth Core
Specification Version 5.2. The new specification adds new features: [117]
Connection Subrating
Periodic Advertisement Interval
Channel Classification Enhancement
Encryption Key Size Control Enhancements
The following features were removed in this version of the specification:
Technical information[edit]
Architecture[edit]
Software[edit]
Seeking to extend the compatibility of Bluetooth devices, the devices that
adhere to the standard use an interface called HCI (Host Controller Interface)
between the host device (e.g. laptop, phone) and the Bluetooth device (e.g.
Bluetooth wireless headset).
High-level protocols such as the SDP (Protocol used to find other Bluetooth
devices within the communication range, also responsible for detecting the
function of devices in range), RFCOMM (Protocol used to emulate serial port
connections) and TCS (Telephony control protocol) interact with the baseband
controller through the L2CAP (Logical Link Control and Adaptation Protocol).
The L2CAP protocol is responsible for the segmentation and reassembly of the
packets.
Hardware[edit]
The hardware that makes up the Bluetooth device is made up of, logically, two
parts; which may or may not be physically separate. A radio device, responsible
for modulating and transmitting the signal; and a digital controller. The digital
controller is likely a CPU, one of whose functions is to run a Link Controller; and
interfaces with the host device; but some functions may be delegated to
hardware. The Link Controller is responsible for the processing of the baseband
and the management of ARQ and physical layer FEC protocols. In addition, it
handles the transfer functions (both asynchronous and synchronous), audio
coding (e.g. SBC (codec)) and data encryption. The CPU of the device is
responsible for attending the instructions related to Bluetooth of the host device,
in order to simplify its operation. To do this, the CPU runs software called Link
Manager that has the function of communicating with other devices through the
LMP protocol.
A Bluetooth device is a short-range wireless device. Bluetooth devices
are fabricated on RF CMOS integrated circuit (RF circuit) chips.[6][123]
Setting up connections[edit]
Any Bluetooth device in discoverable mode transmits
the following information on demand:
Device name
Device class
List of services
Technical information (for example: device
features, manufacturer, Bluetooth specification
used, clock offset)
Any device may perform an inquiry to find other devices
to connect to, and any device can be configured to
respond to such inquiries. However, if the device trying
to connect knows the address of the device, it always
responds to direct connection requests and transmits
the information shown in the list above if requested.
Use of a device's services may require pairing or
acceptance by its owner, but the connection itself can
be initiated by any device and held until it goes out of
range. Some devices can be connected to only one
device at a time, and connecting to them prevents them
from connecting to other devices and appearing in
inquiries until they disconnect from the other device.
Every device has a unique 48-bit address. However,
these addresses are generally not shown in inquiries.
Instead, friendly Bluetooth names are used, which can
be set by the user. This name appears when another
user scans for devices and in lists of paired devices.
Most cellular phones have the Bluetooth name set to
the manufacturer and model of the phone by default.
Most cellular phones and laptops show only the
Bluetooth names and special programs are required to
get additional information about remote devices. This
can be confusing as, for example, there could be
several cellular phones in range
named T610 (see Bluejacking).
Pairing and bonding[edit]
Motivation[edit]
Many services offered over Bluetooth can expose
private data or let a connecting party control the
Bluetooth device. Security reasons make it necessary
to recognize specific devices, and thus enable control
over which devices can connect to a given Bluetooth
device. At the same time, it is useful for Bluetooth
devices to be able to establish a connection without
user intervention (for example, as soon as in range).
To resolve this conflict, Bluetooth uses a process
called bonding, and a bond is generated through a
process called pairing. The pairing process is triggered
either by a specific request from a user to generate a
bond (for example, the user explicitly requests to "Add
a Bluetooth device"), or it is triggered automatically
when connecting to a service where (for the first time)
the identity of a device is required for security
purposes. These two cases are referred to as
dedicated bonding and general bonding respectively.
Pairing often involves some level of user interaction.
This user interaction confirms the identity of the
devices. When pairing completes, a bond forms
between the two devices, enabling those two devices to
connect in the future without repeating the pairing
process to confirm device identities. When desired, the
user can remove the bonding relationship.
Implementation[edit]
During pairing, the two devices establish a relationship
by creating a shared secret known as a link key. If both
devices store the same link key, they are said to
be paired or bonded. A device that wants to
communicate only with a bonded device
can cryptographically authenticate the identity of the
other device, ensuring it is the same device it
previously paired with. Once a link key is generated, an
authenticated ACL link between the devices may
be encrypted to protect exchanged data
against eavesdropping. Users can delete link keys from
either device, which removes the bond between the
devices—so it is possible for one device to have a
stored link key for a device it is no longer paired with.
Bluetooth services generally require either encryption
or authentication and as such require pairing before
they let a remote device connect. Some services, such
as the Object Push Profile, elect not to explicitly require
authentication or encryption so that pairing does not
interfere with the user experience associated with the
service use-cases.
Pairing mechanisms[edit]
Pairing mechanisms changed significantly with the
introduction of Secure Simple Pairing in Bluetooth v2.1.
The following summarizes the pairing mechanisms:
Security[edit]
Overview[edit]
See also: Mobile security § Attacks based on
communication networks
Bluetooth
implements confidentiality, authentication and key deriv
ation with custom algorithms based on
the SAFER+ block cipher. Bluetooth key generation is
generally based on a Bluetooth PIN, which must be
entered into both devices. This procedure might be
modified if one of the devices has a fixed PIN (e.g., for
headsets or similar devices with a restricted user
interface). During pairing, an initialization key or master
key is generated, using the E22 algorithm.
[126]
The E0 stream cipher is used for encrypting packets,
granting confidentiality, and is based on a shared
cryptographic secret, namely a previously generated
link key or master key. Those keys, used for
subsequent encryption of data sent via the air interface,
rely on the Bluetooth PIN, which has been entered into
one or both devices.
An overview of Bluetooth vulnerabilities exploits was
published in 2007 by Andreas Becker.[127]
In September 2008, the National Institute of Standards
and Technology (NIST) published a Guide to Bluetooth
Security as a reference for organizations. It describes
Bluetooth security capabilities and how to secure
Bluetooth technologies effectively. While Bluetooth has
its benefits, it is susceptible to denial-of-service attacks,
eavesdropping, man-in-the-middle attacks, message
modification, and resource misappropriation. Users and
organizations must evaluate their acceptable level of
risk and incorporate security into the lifecycle of
Bluetooth devices. To help mitigate risks, included in
the NIST document are security checklists with
guidelines and recommendations for creating and
maintaining secure Bluetooth piconets, headsets, and
smart card readers.[128]
Bluetooth v2.1 – finalized in 2007 with consumer
devices first appearing in 2009 – makes significant
changes to Bluetooth's security, including pairing. See
the pairing mechanisms section for more about these
changes.
Bluejacking[edit]
Main article: Bluejacking
2005[edit]
In January 2005, a mobile malware worm known as
Lasco surfaced. The worm began targeting mobile
phones using Symbian OS (Series 60 platform) using
Bluetooth enabled devices to replicate itself and spread
to other devices. The worm is self-installing and begins
once the mobile user approves the transfer of the file
(Velasco.sis) from another device. Once installed, the
worm begins looking for other Bluetooth enabled
devices to infect. Additionally, the worm infects
other .SIS files on the device, allowing replication to
another device through the use of removable media
(Secure Digital, CompactFlash, etc.). The worm can
render the mobile device unstable. [137]
In April 2005, Cambridge University security
researchers published results of their actual
implementation of passive attacks against the PIN-
based pairing between commercial Bluetooth devices.
They confirmed that attacks are practicably fast, and
the Bluetooth symmetric key establishment method is
vulnerable. To rectify this vulnerability, they designed
an implementation that showed that stronger,
asymmetric key establishment is feasible for certain
classes of devices, such as mobile phones.[138]
In June 2005, Yaniv Shaked[139] and Avishai
Wool[140] published a paper describing both passive and
active methods for obtaining the PIN for a Bluetooth
link. The passive attack allows a suitably equipped
attacker to eavesdrop on communications and spoof if
the attacker was present at the time of initial pairing.
The active method makes use of a specially
constructed message that must be inserted at a specific
point in the protocol, to make the master and slave
repeat the pairing process. After that, the first method
can be used to crack the PIN. This attack's major
weakness is that it requires the user of the devices
under attack to re-enter the PIN during the attack when
the device prompts them to. Also, this active attack
probably requires custom hardware, since most
commercially available Bluetooth devices are not
capable of the timing necessary.[141]
In August 2005, police in Cambridgeshire, England,
issued warnings about thieves using Bluetooth enabled
phones to track other devices left in cars. Police are
advising users to ensure that any mobile networking
connections are de-activated if laptops and other
devices are left in this way.[142]
2006[edit]
In April 2006, researchers from Secure Network and F-
Secure published a report that warns of the large
number of devices left in a visible state, and issued
statistics on the spread of various Bluetooth services
and the ease of spread of an eventual Bluetooth worm.
[143]
Health concerns[edit]
Main article: Wireless electronic devices and health
Award programs[edit]
The Bluetooth Innovation World Cup, a marketing
initiative of the Bluetooth Special Interest Group (SIG),
was an international competition that encouraged the
development of innovations for applications leveraging
Bluetooth technology in sports, fitness and health care
products. The competition aimed to stimulate new
markets.[154]
The Bluetooth Innovation World Cup morphed into the
Bluetooth Breakthrough Awards in 2013. Bluetooth SIG
subsequently launched the Imagine Blue Award in 2016
at Bluetooth World.[155] The Bluetooth Breakthrough
Awards program highlights the most innovative
products and applications available today, prototypes
coming soon, and student-led projects in the making. [156]
See also[edit]
ANT+
Bluetooth stack – building blocks that make up the
various implementations of the Bluetooth protocol
Bluetooth profile – features used within the
Bluetooth stack
Bluesniping
BlueSoleil – proprietary Bluetooth driver
Bluetooth Low Energy
Beacons (AltBeacon, iBeacon, Eddystone)
Bluetooth Mesh
Continua Health Alliance
DASH7
Headset (audio)
Hotspot (Wi-Fi)
Java APIs for Bluetooth
Key finder
Li-Fi
List of Bluetooth protocols
List of Bluetooth Profiles
MyriaNed
Near-field communication
RuBee – secure wireless protocol alternative
Tethering
Thread (network protocol)
Wi-Fi HaLow
ZigBee – low-power lightweight wireless protocol in
the ISM band based on IEEE 802.15.4
Notes
TDMA
Definition:
Pronunciation:
tee-dee-em-eh
Time Division Multiple Access
Example:
TDMA technology was incorporated into the more advanced GSM standard.
How do mobile networks work?
Mobile networks, or cellular networks, are made up of transceiver towers that rely on
various radio frequencies to transmit data between mobile devices. The towers
connect to telephone switches or exchanges, which route the data to the appropriate
device.
What is FDMA?
What is EDGE?
EDGE stands for Enhanced Data rates for GSM Evolution. It's a faster version of
GSM, but it can't match the speed of DSL or high-speed cable internet. EDGE
technology was replaced by Evolved EDGE, which is twice as fast as the original
EDGE.
"When you look beyond the obvious; the most beneficial impact of
5G comes down to connectivity," he says. "With stronger and more
reliable network connectivity, people have the ability to
simultaneously experience digital content and communicate
without the disruptions experienced with 4G, such as lagging,
buffering, etc. This new era of network connectivity is creating an
untapped market for technological advances to connect and
communicate, benefitting both users and enterprises."
That said, 5G is still paving the way for smoother connectivity from
our everyday devices, too, like when gaming, making video calls,
streaming movies, downloading files, sharing HD and 4K media,
receiving real-time traffic updates, vlogging, etc.
5G is so fast that it's not just available for mobile devices. It has
the potential to completely replace your high-speed wired
connection via fixed wireless access! See our 5G Internet: The
High-Speed Replacement for Cable article for more on this.
However, not every mobile network operator works the same way.
Some companies make use of 5G on lower ends of the radio
spectrum so that cell towers can reach broader areas and go
through walls, but the trade-off is relatively slower speeds.
5G cells can communicate with all sorts of devices, like ones used
by a stationary person who isn’t moving to someone in a high-
speed vehicle like a train, who’s traveling up to 500 kmh (310
mph).
It's easy to confuse 5G with 5 GHz Wi-Fi, but the two are not the
same. The former is a mobile networking technology, while the
latter is a frequency band used in some Wi-Fi routers.
Information stored on SIM cards. Based on GSM. May use SIM cards. 2G system.
Switching phones means only Three times Provider stores information. Predates
switching cards. faster than GSM. GSM.
Most widely used, especially Used by AT&T Can't change phones without No longer in
internationally. and T-Mobile. provider approval. use.
Switch SIM cards to use phone in other Used by Sprint, Virgin Mobile,
countries without roaming. and Verizon Wireless.
For years, the two major mobile phone technologies, CDMA and
GSM, have been incompatible competitors. This incompatibility is
the reason many AT&T phones don't work with Verizon service
and vice versa.
Max speed of about 7.2 Mbps. Only about 1 Mbps.No longer available.
Both GSM and CDMA are 3G networks, but between the two,
GSM is the faster option. CDMA shows an effective download
speed of about 1 megabit per second, while GSM claims speeds of
up to 7 Mbps. Testing has put the practical speed of GSM closer to
2.11 Mbps, which is twice as fast as CDMA.
EDGE is three times faster than GSM and is built upon that
standard. It is designed to accommodate streaming media on
mobile devices. AT&T and T-Mobile have EDGE networks.
User-Friendliness: GSM Is Easiest to Transfer
GSM EDGE CDMA TDMA
Uses SIM cards to store user data. Works similarly Doesn't use SIM cards. Unavailable.
to GSM.
CDMA phones may or may not have SIM cards. User information
is stored with the service provider, which must give its permission
to switch phones. CDMA phones must be programmed with every
carrier you use. When you switch carriers, the phone must be
reprogrammed for that carrier, even if it's an unlocked phone.
Providers: Look for Your Favorites
GSM EDGE CDMA TDMA
Providers include T-Mobile Same as Providers include Sprint, Virgin Mobile, Incorporated into
and AT&T. GSM. and Verizon Wireless. GSM.
More popular
internationally.
FAQ
A new type of flexible microchip could be cheap enough to transform everyday items.
Arm’s new chip, PlasticArm, could be placed on milk bottles to ensure the contents aren’t
spoiled.
Future generations of smaller, faster chips even could power artificial intelligence that works
without an internet connection.
sinology / Getty Images
Microchips might soon be so cheap and flexible that they could be printed onto milk bottles.
Chip manufacturer Arm has unveiled a new prototype plastic-based microchip. Arm says this
will create a new "internet of everything," with chips integrated into many kinds of objects.
It’s the latest in a series of recent advances in chip technology that could transform personal
electronics.
"Many of today's wearables and implantables face severe battery life and size issues that
prevent breakthroughs in applications such as AR glasses, AR contacts, and neural-computer
interfaces," Wood Chiang, a professor of electrical and computer engineering at Brigham
Young University who studies chip design, told Lifewire in an email interview.
"For example, making a Zoom call on your smart glasses or having GPS maps appear
overlayed on top of your vision."
Cheaper Chips
"The potential for this technology is beyond significant," Arm said in a news release.
"PlasticArm is bringing the possibility of seamlessly embedding billions of extremely low-
cost, ultra-thin, conformable microprocessors into everyday objects–a significant leap
forward in realizing the Internet of Things."
Arm and flexible electronics developer PragmatIC said PlasticArm is "an ultra-minimalist
Cortex-M0-based SoC, with just 128 bytes of RAM and 456 bytes of ROM," which means
it's much less powerful than silicon-based chips. However, it’s "12 times more complex than
the previous state-of-the-art flexible electronics." The chip could be placed on milk bottles,
for example, to make sure the contents aren’t spoiled.
But not all observers agree that flexible chips will make it to market. The Arm chips are still
in the research phase, and the company hasn’t said when they could go into production.
"People have been investigating flexible electronics for decades with few actual products
other than foldable phones (even that is a niche product)," Chiang said. "As CMOS circuits
get smaller and better, it's not clear if flexible electronics will find good applications to take
off."
This means better interfaces in vehicles, more depth using smart home software,
and better visuals for movies or games.
ARM isn't the only manufacturer working to make less expensive chips. South Korea’s
Samsung and Taiwan’s TSMC plan to introduce the first 3-nanometer chips next year. Both
companies last year introduced 5-nanometer chips, which are used in some recently launched
consumer devices.
"Three-nanometer chips increase transistor density by about a third compared to five-
nanometer chips," Nir Kshetri, a professor who studies chip manufacturing at the University
of North Carolina at Greensboro, told Lifewire in an email interview. "Higher transistor
density means smaller devices for a given level of performance, less costly, and more
powerful."
New chips like the 3-millimeter designs from Samsung will make personal technology faster
and energy-efficient, Mark Granahan, the CEO of chip design company iDEAL
Semiconductor told Lifewire in an email interview.
"It will help bring larger computing power to devices, which can take shape in all forms from
making calculations to showing more brilliant visuals to support VR headsets," he said.
"It’s the real engine of the machine, so an upgrade here means an upgrade everywhere. This
spans more than simply phones or personal devices—this means better interfaces in vehicles,
more depth using smart home software, and better visuals for movies or games."
Yellow Dog Productions / Getty Images
"Microchip technology continues to get smaller and better each year despite naysayers for the
last 30 years," he added. "We have moved from building transistors on a 2D plane to a 2.5D
structure in today's latest processes. It is a matter of time before we figure out how to build
3D transistors. I don't see Moore's Law running out of steam anytime soon."
Future generations of smaller, faster chips could even power artificial intelligence that works
without an internet connection, Chiang said.
"AI will write novels, create music, and draw animation films for people," he added. "There
might even be AI stars and TV personalities. The line between virtual and reality will blur to
a point where people can't tell if they are talking to or watching an AI or a human."