Bluetooth is an open specification that enables low-bandwidth, short-range wireless connections between computers and peripherals devices, like cell phones, personal data assistants (PDAs) and mice. Bluetooth model lies in its convenience for wirelessly transferring information and small data files between devices. Nor is it a replacement for the cables needed by high-bandwidth peripherals. Bluetooth offers a replacement for IrDA (Infrared Data Association).
Bluetooth is a cable-replacement technology designed to wirelessly connect peripherals, such as mice and mobile phones, you can connect with your mobile to mobile, or your desktop or laptop computer. Bluetooth is an inexpensive, low-power, and short-range radio-based technology. When we talking about IrDA, its supports wireless communication between peripherals and computers, it has two limitations. First, IrDA devices must be very close, not more than about 1 meter apart. Second, the communicating devices must have a direct line of sight to each other. Because it depends upon radio waves, however, Bluetooth communication overcomes these two limitations, when you are using Bluetooth, you can communicate at ranges of up to 10 meters. This makes Bluetooth communication much more flexible and robust as compare to IrDA. It’s also important to note that because Bluetooth excels at low-bandwidth data transfer, its not need to use high-bandwidth.
What Bluetooth Does Best
The main features of Bluetooth technology are —low cost, low power, and radio based— encouraged the concept of a personal area network (PAN). A PAN envelops the user in a small, mobile bubble of connectivity that is effortlessly available at any time. You don’t need to add IP address; you don’t need to add modem and other devices. Bluetooth gives you freedom from cables and potential ubiquity. It provides ranges of up to 100 meters.
Bluetooth doesn’t require you to think about setting up a connection or to push any buttons. When two or more Bluetooth devices enter a range (Up to 30 feet) of one another, they automatically begin to communicate without you having to do anything. Once the communicating begins, Bluetooth devices will setup Personal Area Networks or Piconets. The best part is: The devices take care of the entire setup process, and you can go about your business.
Free of charge, you don not have to pay a single penny for this service. Its not an extra cell phone or cable bill that you have to add in your budget. Simply by the technology and you’re done. All you need to do is connect it with what you are using.
Synchronization of Data Devices:
Do you want to transfer your mobile address book to your laptop contact system and your Blackberry contact list, or sync your calendars? Do it wirelessly with Bluetooth.
The system is also allows you to transfer data via Bluetooth. You can transfer or print photos from your Bluetooth-enabled camera straight to a Bluetooth-enabled printer for prints, or you can store your photos in your laptops or desktop.. Or transfer e-mail messages from phone to phone. You can transfer you data any time or anywhere, you don’t need to wait for signals, you don’t need to plug cable and then connect with your laptops or pc. You can directly connect with your laptops or pc.
You don’t require any special software or data cables for the devices to communicate with one another. That’s why its much more convenient for people who move around a lot with their electronics.
As a cable-replacement technology. To conserve power, most Bluetooth devices operate as low-power, 1 mW radios (Class 3 radio power). This gives Bluetooth devices a range of about 5–10 meters. This range is far enough for comfortable wireless peripheral communication but close enough to avoid drawing too much power from the device’s power source.
When we are talking about security. Security is a challenge faced by every communications standard. Wireless communications present special security challenges.
Bluetooth technology is no exception. Bluetooth builds security into its model on several different levels. At the lowest levels of the protocol stack, Bluetooth uses the publicly available cipher algorithm known as SAFER+ to authenticate a device’s identity. The generic-access profile depends on this authentication for its device-pairing process. This process involves creating a special link to create and exchange a link key. Once verified, the link key is used to negotiate an encryption mode the devices will use for their communication. In addition to the operational features, Bluetooth has several security features built into it that provide authentication, authorization, and encryption.
When two Bluetooth devices establish a communications channel, they both create an initialization key. A passkey or Personal Identification Number is input and the initialization key is created, and the link key is calculated using it. Then the link key is used for authentication. Without your permission nobody can access your Bluetooth.