Skip to main content

How Bluetooth technology connect the Devices?

What is Bluetooth?


Usually, when two electronic devises communicate with each other, they use cables, infrared rays, WiFi etc. These are some of the various complicated methods used in connecting one device to another. Bluetooth is a similar technology, which is used to connect one electronic device to another, without the usage of any wires and cables. It is a wireless technology to send and receive data between two devices.

Coinage of the term Bluetooth


The etymology of word Bluetooth is interesting. An interesting fact about the Bluetooth technology is that it is named after King Harold Bluetooth, who was the King of Denmark during 10th century. It was him who united countries like Denmark and Norway. The name Bluetooth was chosen for the technology because it is countries like Denmark which dominates the Bluetooth communication industry. Another reason for the naming is that Bluetooth technology integrates two electronic devices just as King Bluetooth did in the late 9th century.

How does Bluetooth technology work?


What are Bluetooth adapters? How do they work?


Bluetooth works by the simple principle of sending and receiving data in the form of radio waves. Every Bluetooth enabled device has a card-like attachment known as the Bluetooth adapter. It is this Bluetooth adapter that sends and receives data. A Bluetooth adapter has a particular range of connection. One electronic adaptor can notice another Bluetooth device only if the second device is present within the range of the first device. When they are within the range, they can strike up a connection between themselves. Striking up of connection between two Bluetooth devices are known as paring of devices.

How is the data sent between two Bluetooth devices?


The radio-wave connection between two devices is used to send and receive data between two Bluetooth devices. The data send and received at a time is equal to 720 Kilo bytes per second. There are 79 frequency channels of a frequency 2.45 Giga Hertz through which the devices send and receive data to each other. When two devices are trying to be paired, they are actually searching for a common frequency through which they can send and receive data. When such a frequency is discovered, the devices are "found". The connecting of two devices does not hamper the connecting of two other devices because they usually use different channels of frequency and hence do not overlap. In simple terms, this is the principle behind Bluetooth technology.

What is piconet? How is it related to Bluetooth?


One merit of Bluetooth technology is that it allows more than two devices to be sharing information at the same time. When more than two electronic devices enter into the process of sending and receiving data, they form a small network like that of a computer network. Such a micro-network of electronic devices is called a Piconet. In a piconet, there will be more than two devices. The maximum number of devices that a single piconet can accommodate is seven. Any one of these devices acts as the superior device, or the Master device. It is the master device that initiates the action, or "give the order to begin" the action. The other devices are known as slave units. They act according to the instructions given by the Master unit. A Bluetooth device can either act as the Master or as the Slave, depending upon the situation. A device can enter a piconet and leave a piconet. When more than one piconets join together, it is termed a scatternet.

Is Bluetooth safe and secure?


As we all know, wireless connections are always more prone to attacks than wired connections. Wired connections occur through a medium which is generally accessible only to the devices engaged in communication. Attacks, for example, a virus can enter a device only if it is present in one of the devices that is engaged in open. Nowadays, even this type of connections are not as secure as they used to be, but a wireless connection is always more vulnerable. Bluetooth being a wireless technology, cannot be said to be secure. Nowadays we hear the incidents where Bluetooth devices are hacked. To prevent this, Bluetooth security measures are necessary.

Bluetooth security: How to keep it secure and safe?


  1. Switch on the Bluetooth when you need to send or receive data. Do not keep it turned on always. This can prevent chances of hacking.

  2. When a Bluetooth device tries to send data to your device, usually a message will show up, asking you to confirm the reception. Do it only if you know who is sending the data.

  3. Install a good antivirus program in your mobile device.

  4. Install a good program in your system as well. Harmful software can enter your device from system as well when you transfer data.

  5. Do not use Wireless technology like Bluetooth to send confidential data.

These are some of the specific ways through which you can keep your Bluetooth device safe and keep your data secure.


Comments

Popular posts from this blog

Team Work - Meaning and Tips for better Team Work

A single brain is not always capable of making key decisions on its own. To come up with an efficient solution, an individual requires the help and advice of others. A team is established when individuals get together on a common platform with the common goal of completing a task. To guarantee optimum compatibility, team members should ideally come from similar backgrounds and have a single aim. To provide their best, the team members must complement each other and function as a single unit in tight cooperation. "There is no I in Team Work," as the saying goes, and each member must put the needs of his team first. Personal interests must take a second seat. Any team's performance is directly proportionate to the relationship between its members and their combined efforts. What is the definition of teamwork? Teamwork is defined as the sum of each team member's efforts toward the fulfilment of the team's goal. In other words, any team's backbone is its ability t

Scientists discover a new theory / The fundamental property of light – 150 years after Maxwell

Light plays a vital role in our everyday lives and technologies based on light are all around us. So we might expect that our understanding of light is pretty settled. But scientists have just uncovered a new fundamental property of light that gives new insight into the 150-year-old classical theory of electromagnetism and which could lead to applications manipulating light at the nanoscale. It is unusual for a pure-theory physics paper to make it into the journal Science. So when one does, it’s worth a closer look. In the new study, researchers bring together one of physics' most venerable set of equations – those of James Clerk’s Maxwell’s famous theory of light – with one of the hot topics in modern solid-state physics: the quantum spin Hall effect and topological insulators . To understand what the fuss is about, let’s first consider the behaviour of electrons in the quantum spin Hall effect. Electrons possess an intrinsic spin as if they were tiny spinning-tops,

19 Types Of Content Writing Services For Your Business

  It’s hard to know which type of content writing service is the best for your business.  There are so many  different types of content writing services  out there that it’s easy to get confused. You end up wondering if you’re choosing the right one for you. In this post, we’ll get rid of this confusion, once and for all. I’m going to list out the different kinds of writing services you could use.  By the end of this article, you’ll know whether you need a copywriter, a content writer, or a social media marketer and how they can help you achieve your business goals. This post is also useful for writers who want to hone their writing skills in a specific area. Let’s dive in and learn what types of content writing services exist and when you should use them. (Bonus – if you want to  hire the top 1%  of writers, go to the bottom to learn how). Types of Content Writing Services As we go through the list of content writing services, you will find that many of them overlap. That’s perfectly