logo

Bluetooth Technology: Applications and Security

   

Added on  2020-02-24

12 Pages3435 Words36 Views
 | 
 | 
 | 
2017Assignment on Introduction to researchAssignment on Introduction to research
Bluetooth Technology: Applications and Security_1

ContentsLiterature Review:.................................................................................................................................2Task of Research Journal:..................................................................................................................2Broad Scan:.......................................................................................................................................3Background:..........................................................................................................................................4Framework and methods:......................................................................................................................5Discussion:............................................................................................................................................5Approaches for Solving range issues:....................................................................................................7Experiments:..........................................................................................................................................8Research criteria:...................................................................................................................................9Evaluation:............................................................................................................................................9Conclusion.............................................................................................................................................9References...........................................................................................................................................11
Bluetooth Technology: Applications and Security_2

Literature Review:Bluetooth is the wireless technology which is used for connecting the peripheral units for managing the short range wireless communication. “The basic problems which are seen in theBluetooth technology are maintaining the version control of the different participating devices and the use of newer devices to manage connection with the older devices” (Mulliner, 2015). The control of information flow through the Bluetooth technology can be done by using the Bluetooth trademarks and Bluetooth certification process. There are some capabilities which are associated with the Bluetooth technology are:“Advanced audio distribution profile for managing the streamlining of wireless communication” (Gunnar, 2016). Hand free profile is used for sending and retrieving calls. Phone book access profile is used for accessing contacts from the call history. Message access profile is used for notifying the reading of the text messages and emails.Human interface device is used for managing the association of different devices. Personal area network is used for managing sharing of web connections on the local area network. Audio video remote control profile is used for controlling the TV signals.Task of Research Journal:DateTaskActionDescription2/ Aug/ 2017Searching of the topicThe list of topics is preparedSelection of the topicfrom the prepared list5/Aug/2017Searching of the papers and different sourcesSaving and developing documentationMaking the folder forthe data collection10/Aug/2017Reading of literature collectedReading of two research papers from the collection of paper which are relevant to the topicRelevancy with the selected topic12/Aug/2017Reading of literature collectedReading of two research papers from the collection of Relevancy with the selected topic
Bluetooth Technology: Applications and Security_3

paper which are relevant to the topic15/Aug/2017Reading of the paperMaking notes of the research paperWrite the research in your own words.Broad Scan:The architecture of the Bluetooth technology is made up of different layers. “The Human computer interaction layer is responsible for managing separation between hardware and software” (Frenzel, 2012).The architecture of the Bluetooth technology is made up of different layers. “The Human computer interaction layer is responsible for managing separation between hardware and software” (Frenzel, 2012). The implementation of the Bluetooth involves synchronization of following layers:Bluetooth architecture LayerDescriptionApplication layerThis layer is responsible for building profile guide for the applicationTelephone control systemThis layer deploys the telephony servicesService discovery protocolThis protocol is used for providing services to the remote Bluetooth devicesWAPIt provides the interface to the higher layer bymaking use of communication protocols.RFCOMMIt is used for managing serial interfaceL2CAPIt is used for managing multiplexing of data shared with higher layersHCIIt is used for handling communication between host ad the Bluetooth technologyLink manager protocolThis protocol is used for managing configuration with devicesBaseband and link controllerThis is used for managing physical links withthe assemblage of packets. Radio wavesRadio waves are used for modulation and demodulation in the transmission of data.
Bluetooth Technology: Applications and Security_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents