Get Instant Help From 5000+ Experts For
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing:Proofread your work by experts and improve grade at Lowest cost

And Improve Your Grades
myassignmenthelp.com
loader
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Guaranteed Higher Grade!
Free Quote
wave

Discuss about the Introduction to Research Methods, The architecture of the Bluetooth technology is made up of different layers.

Architecture of Bluetooth Technology

Bluetooth is the wireless technology which is used for connecting the peripheral units for managing the short range wireless communication. “The basic problems which are seen in the Bluetooth technology are maintaining the version control of the different participating devices and the use of newer devices to manage connection with the older devices” (Mulliner, 2015). The control of information flow through the Bluetooth technology can be done by using the Bluetooth trademarks and Bluetooth certification process. There are some capabilities which are associated with the Bluetooth technology are:

  • “Advanced audio distribution profile for managing the streamlining of wireless communication” (Gunnar, 2016).
  • Hand free profile is used for sending and retrieving calls.
  • Phone book access profile is used for accessing contacts from the call history.
  • Message access profile is used for notifying the reading of the text messages and emails.
  • Human interface device is used for managing the association of different devices.
  • Personal area network is used for managing sharing of web connections on the local area network.
  • Audio video remote control profile is used for controlling the TV signals.

Date

Task

Action

Description

2/ Aug/ 2017

Searching of the topic

The list of topics is prepared

Selection of the topic from the prepared list

5/Aug/2017

Searching of the papers and different sources

Saving and developing documentation

Making the folder for the data collection

10/Aug/2017

Reading of literature collected

Reading of two research papers from the collection of paper which are relevant to the topic

Relevancy with the selected topic

12/Aug/2017

Reading of literature collected

Reading of two research papers from the collection of paper which are relevant to the topic

Relevancy with the selected topic

15/Aug/2017

Reading of the paper

Making notes of the research paper

Write the research in your own words.

The architecture of the Bluetooth technology is made up of different layers. “The Human computer interaction layer is responsible for managing separation between hardware and software” (Frenzel, 2012).

The architecture of the Bluetooth technology is made up of different layers. “The Human computer interaction layer is responsible for managing separation between hardware and software” (Frenzel, 2012). The implementation of the Bluetooth involves synchronization of following layers:

Bluetooth architecture Layer

Description

Application layer

This layer is responsible for building profile guide for the application

Telephone control system

This layer deploys the telephony services

Service discovery protocol

This protocol is used for providing services to the remote Bluetooth devices

WAP

It provides the interface to the higher layer by making use of communication protocols.

RFCOMM

It is used for managing serial interface

L2CAP

It is used for managing multiplexing of data shared with higher layers

HCI

It is used for handling communication between host ad the Bluetooth technology

Link manager protocol

This protocol is used for managing configuration with devices

Baseband and link controller

This is used for managing physical links with the assemblage of packets.

Radio waves

Radio waves are used for modulation and demodulation in the transmission of data.

The Bluetooth technology is used in deploying the wireless headsets, file transferring between different participating devices, use of wireless printers, use of wireless speakers, in the development of monitoring and reporting of devices, in monitoring sensors, and others. The major issue which is associated with the implementation of Bluetooth technology is of range. The range issue should be considered while dealing with the Bluetooth technology. The following table gives the clear concise concept of the Bluetooth range.

Categories

Bluetooth 2.1

Bluetooth low energy

Range

It is near about 100 meters

It is near about 100 meters

Maximum range

It is near about 100 meters

It is near about 100 meters

Frequency

It is in between 2.402 and 2.481 GHz

It is in between 2.402 and 2.481 GHz

Maximum data transfer rate

It is in between 1 to 3 Mbit / Sec

It is around 1 Mbit / sec

Throughput application

It is in between 0.7 to 2.1 Mbit / sec

It is up to 305 kbit / sec

Topologies used

Scatternet and point to point topologies are usually used

Mesh and point to point topology are used

Network Standard

802.15.1 is the IEEE standard for Bluetooth

802.15.1 is the IEEE standard for Bluetooth

The range of the Bluetooth technology depends on the factors like output power generation associated with the transmitter, the sensitivity of the receiver, the physical obstacles which can come in the transmission path of the data, and the use of antennas. The performance of the Bluetooth devices depends upon the performance of the radio waves and the antennas used. The steps should be taken to improve the range of the Bluetooth devices for enhancing the distribution of the information between different participating devices. “The Bluetooth devices can communicate with the online services by making use of gateways” (Mahmood, 2014). The deployment of gateway is the best solution for managing the flow of information when the devices are placed in the large geographical area. The placement of the hubs can helps in handling direct connection between the devices. The mesh networking protocols can enhance the performance of the Bluetooth devices. The mesh network provides the gateway for accessing and sharing of information between the Bluetooth devices. “The broadcasting of the messages can be done in the mesh networking topology” (Rijah, 2017). The messages can instantly share between the participating units. The Bluetooth low energy network is successful in managing different devices for enabling sharing of information. The flow of information can be easily controlled in the Bluetooth environment. The central gateway is not required for managing the traffic on the network.

Capabilities of Bluetooth Technology

The qualitative and quantitative approach is used for analysing the result of the research on Bluetooth technology. “The questionnaire and interviews are the valuable methods which are used for reviewing the Bluetooth technology” (Purdy, 2012). The qualitative approach is used for focusing on the issues related with the Bluetooth technology.

Interviews: The face to face communication helps in analysing the advantages and disadvantages of Bluetooth technology.

Questionnaire: Questionnaire helps in formulation of open ended and close ended questions which are used for providing opportunities to research about the Bluetooth technology.

There are some misconceptions with the Bluetooth technology. Bluetooth is categorised as a short range technology which does not provide security to the Bluetooth network. It has been analysed that it is not confined to the short range devices. The standard range of the Bluetooth is expressed in the table below:

Classes

Transmission power

Intended Range

Class 1

It is about 100 mw

The range is less than 100 meters

Class 2

It is about 2.5 mw

The range is less than 10 meters

Class 3

It is about 1 mw

The range is less than 10 meters

The mobile devices and the Bluetooth headsets come in the category of class 2. The Bluetooth is widely recognised in wireless LAN environment. Bluetooth enabled devices are used to connect LAN remotely. The Bluetooth network encapsulation profile depends upon the radio frequency communication protocols. The IP address of the host name is automatically managed by the wired interface. The vulnerabilities like buffer overflow can occur. The limited operations can be performed with the Bluetooth technology. The technical specification of the Bluetooth technologies is described in the table below:

Connection

Frequency of spread spectrum

Frequency band

2.4 GHZ

Use of modulation technique

Gaussian frequency shift

Use of MAC scheduling scheme

FH-CDMA

Use of transmission power

Greater than 20 dbm

Aggregation in the data rate

It should be in between 0.721 to 1 Mbps

Range

It is in between 10m to 100 m

Supported stations

It can be 8 devices

Use of voice channels

3

Data security

Use of 128 bit key

Encryption mechanism for data security

8 to 128 bit.

The security methods are used for providing security to the Bluetooth. The levels of security are developed for measuring the security in the Bluetooth devices. The security provides the unauthorised access of data transmission. The authorization security methods are used for developing access control on the information. The access controls are the rules which are used during the operation for managing request and authentication of the device.  The services should be granted for providing authorisation to the devices. There are various keys which are used for managing the operation permanently and temporarily such as link key, encrypted key, and pin key. The link key is used for permanent storage and non-volatile storage. The temporary keys are used for terminating the present situation. “The Pin key is used for selecting the fixed number by making use of encryption key” (Paavola, 2011). The mechanism of authentication is used for providing identity to the user for accessing the information. The new keys are generated for managing new connection with the connected devices. There are three modes which are used for managing the Bluetooth security. The security is not initiated with the Bluetooth devices. It is a non-secure mode which is used for providing authentication and encryption procedures for connecting the Bluetooth devices. The security procedures should not be used for establishing connection with the Bluetooth devices. There are different flexibility policies which are used for running the application. “The security manager mentioned the mode for accessing control to the services. The centralised security manager enforced the access control to the services. He is responsible for maintaining the interface between protocols” (Chaitanya, 2013). This mode supports the confidentiality of data, authentication, and authorization mechanism. The mode 3 is responsible for initiating security procedures for completing the link set up. The application layer security is not fixed in the security layer. The authentication and sharing procedures are used with the help of secret link key.

Range Issue and Its Factors

Many troubleshooting processes are carried out during the manufacturing of the Bluetooth devices. The compatibility issues which are associated with the Bluetooth devices are development of the newer compact devices which support computational power for Bluetooth connection within the specification of operating device. “The major issue which is associated with the implementation of Bluetooth technology is of range” (Clayton, 2013). The range issue should be considered while dealing with the Bluetooth technology. The range of the Bluetooth technology depends on the factors like output power generation associated with the transmitter, the sensitivity of the receiver, the physical obstacles which can come in the transmission path of the data, and the use of antennas.  The errors in the operating system of the Bluetooth devices can be the cause of connection breakdown. The hardware issues are associated with the smart devices for the proper interaction with the operating system. The Bluetooth certification process result into the smooth functioning of the range issues. The problems of the range issues can be resolved by using the updated version of the Bluetooth in the devices. The devices should be controlled by making use of smart application. The Bluetooth version should be updated according to the new operating system. The connection problems should be resolved by using the updated procedures. The resetting of the Bluetooth devices should be done periodically. The streaming of data keeps the Bluetooth devices updated. The backward compatibility of the Bluetooth can be improved by updating the new products. The Bluetooth has the capability to jump between numbers of channels. it can be measured through channels used hundreds of time per second. When the error occurred in the Bluetooth technology, it should be resolved by updating the version.  

The Bluetooth signals operate in the frequency band of 2.45 GHZ. The spread spectrum frequency hopping technology is used for managing the Bluetooth services and application. The interference can be controlled by using multiple frequencies at a single moment of time. The 10 meters is the approximate range of carrying Bluetooth signals between two devices for sharing of information. It helps in replacing the use of cables for establishing communication with the personal area network.

The interference is the major issue which exist between hands free headset and Bluetooth technology. The Bluetooth enabled devices are used for managing interface between different devices. The barriers like Bluetooth metal, concrete and plaster bricks, bulletproof glass, and etc. are used for overcoming the problem of interference. The router channel should be changed according to the need of the application. The rebooting of the Wi-Fi connection helps in managing the interference in the Bluetooth technology for communication. The router setting is used for changing and managing the channel manually. The Bluetooth devices should be move closer to the router used for transferring information between the devices. The change in frequencies can occur due to the occurrence of microwaves and florescent light. The connection issues can be resolved by updating the version of the operating system periodically. “The use of mesh topology and gateways are the preferred solution to resolve the range issues associated with the deployment of Bluetooth technology” (Bahl, 2015).

Security Methods and Modes for Bluetooth Devices

The Bluetooth is the wireless communication which is used for transmitting voice and data at a very high speed by making use of radio waves. “Bluetooth is the standard protocol which is used for managing short range radio communication between different associated devices” (Paul, 2014). The devices which are used for communication are mobile phones, entertainment system, electronics, and computer. The maximum distance which can exist within the different participating devices for managing Bluetooth communication should be approximately 10 meters. “The 2 mega-bit per second is the data transfer rate for information sharing” (Gaikwad, 2015). The operational frequency band for the Bluetooth technology is about 2.45 GHz. The microchip is used for data transfer in the devices which make use of Bluetooth technology. The link manager software is used for sending and receiving data in the Bluetooth technology. “The frequency hopping spectrum is used for developing multiple frequencies for limiting the interference between the participating multiple devices” (Goldsmith, 2014). The wireless communication should be developed between peripheral devices. The continuous exchange of data can be possible with the use of Bluetooth technology. The data applications can be streamlined for managing the continuous exchange of data. “The devices are capable of sending and receiving information at the same time” (Wright, 2015). There are various advantage of using Bluetooth low energy which are categorised as consumption of lower power in the same range, use of lower bandwidth, and others.

The focus of this paper is to determine the range issues associated with the use of Bluetooth wireless technology. There are some misconceptions which are associated with the use of Bluetooth technology. We will also focus on the threats and mitigation schemes which are deployed by the Bluetooth technology.

The objective of this paper is to focus on the range issues which are associated with the deployment of the Bluetooth technology. The paper also outlines the dependencies of the range in the Bluetooth scenario. The aim of this paper is to predict the methods used for improving the range of Bluetooth within the networking site.

Conclusion

The Bluetooth technology is used in deploying the wireless headsets, file transferring between different participating devices, use of wireless printers, use of wireless speakers, in the development of monitoring and reporting of devices, in monitoring sensors, and others. The range of the Bluetooth technology depends on the factors like output power generation associated with the transmitter, the sensitivity of the receiver, the physical obstacles which can come in the transmission path of the data, and the use of antennas. The deployment of gateway is the best solution for managing the flow of information when the devices are placed in the large geographical area. The placement of the hubs can helps in handling direct connection between the devices. The mesh networking protocols can enhance the performance of the Bluetooth devices. The Bluetooth version should be updated according to the new operating system. The connection problems should be resolved by using the updated procedures. The control of information flow through the Bluetooth technology can be done by using the Bluetooth trademarks and Bluetooth certification process. Bluetooth is the wireless technology which is used for connecting the peripheral units for managing the short range wireless communication.

References

Bahl, S. (2015). Gi Fi: Future of wirelss technology. 1st ed. [ebook]. https://www.ijarcce.com/upload/2015/june-15/IJARCCE%2018.pdf [Accessed 03 Sep. 2017].

Chaitanya, P. (2013). A review on improving technologies in wireless communications. 1st ed. [ebook]. https://www.ijettjournal.org/volume-4/issue-4/IJETT-V4I4P308.pdf [Accessed 03 Sep. 2017].

Clayton, B. (2013). A literature review of recent development in bluetooth networking. 1st ed. [ebook]. https://www.cs.ru.ac.za/research/g01c2974/honours/reports/literaturesurvey.pdf [Accessed 03 Sep. 2017].

Frenzel, L. (2012). The fundamentals of short range wireless technology. 1st ed. [ebook]. https://www.electronicdesign.com/communications/fundamentals-short-range-wireless-technology [Accessed 03 Sep. 2017].

Gaikwad, P. (2015). Bluetooth based smart automation system using android. 1st ed. [ebook]. https://www.ijsr.net/archive/v6i5/3051709.pdf [Accessed 03 Sep. 2017].

Goldsmith, C. (2014). Wireless local area network for device monitoring. 1st ed. [ebook]. https://auworkshop.autodesk.com/library/bim-curriculum-construction/4d-simulation-and-construction-planning [Accessed 03 Sep. 2017].

Gunnar, J. (2016). Things should be known about Bluetooth range. 1st ed. [ebook]. https://blog.nordicsemi.com/getconnected/things-you-should-know-about-bluetooth-range [Accessed 03 Sep. 2017].

Mahmood, A. (2014). A review of wireless communication for smart grid. 1st ed. [ebook]. https://www.researchgate.net/publication/264860124_A_Review_of_Wireless_Communications_for_Smart_Grid [Accessed 03 Sep. 2017].

Mulliner, C. (2015). Security and privacy issues of wireless technologies. 1st ed. [ebook]. https://www.cs.ucsb.edu/~almeroth/classes/tech-soc/2005-Fall/11-01.pdf [Accessed 03 Sep. 2017].

Paavola, M. (2011). Wireless technologies in process automation- Review and an application. 1st ed. [ebook]. https://jultika.oulu.fi/files/isbn9789514287053.pdf [Accessed 03 Sep. 2017].

Paul, Z. (2014). Short range wireless communication: Bluetooth, zigbee, and infrared transmission. 1st ed. [ebook]. https://study.com/academy/lesson/short-range-wireless-communication-bluetooth-zigbee-infrared-transmission.html [Accessed 03 Sep. 2017].

Purdy, K. (2012). Understanding Bluetooth pairing problems. 1st ed. [ebook]. https://thewirecutter.com/blog/understanding-bluetooth-pairing-problems/ [Accessed 03 Sep. 2017].

Rijah, U. (2017). Bluetooth security analysis and solution. 1st ed. [ebook]. https://www.ijsrp.org/research-paper-0416/ijsrp-p5252.pdf [Accessed 03 Sep. 2017].

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2021). Understanding Bluetooth Technology And Managing Range Issues In An Essay. (70 Characters). Retrieved from https://myassignmenthelp.com/free-samples/esp318-introduction-to-research-methods/wireless-communication.html.

"Understanding Bluetooth Technology And Managing Range Issues In An Essay. (70 Characters)." My Assignment Help, 2021, https://myassignmenthelp.com/free-samples/esp318-introduction-to-research-methods/wireless-communication.html.

My Assignment Help (2021) Understanding Bluetooth Technology And Managing Range Issues In An Essay. (70 Characters) [Online]. Available from: https://myassignmenthelp.com/free-samples/esp318-introduction-to-research-methods/wireless-communication.html
[Accessed 26 November 2024].

My Assignment Help. 'Understanding Bluetooth Technology And Managing Range Issues In An Essay. (70 Characters)' (My Assignment Help, 2021) <https://myassignmenthelp.com/free-samples/esp318-introduction-to-research-methods/wireless-communication.html> accessed 26 November 2024.

My Assignment Help. Understanding Bluetooth Technology And Managing Range Issues In An Essay. (70 Characters) [Internet]. My Assignment Help. 2021 [cited 26 November 2024]. Available from: https://myassignmenthelp.com/free-samples/esp318-introduction-to-research-methods/wireless-communication.html.

Get instant help from 5000+ experts for
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing: Proofread your work by experts and improve grade at Lowest cost

loader
250 words
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Plagiarism checker
Verify originality of an essay
essay
Generate unique essays in a jiffy
Plagiarism checker
Cite sources with ease
support
close