Discoverable and accepting connections then it is

Info icon This preview shows pages 48–50. Sign up to view the full content.

View Full Document Right Arrow Icon
discoverable and accepting connections, then it is theoretically possible for someone to use a Bluetooth exploit to connect to my system without authorization and potentially compromise the data on it. So what I want to do is go to open settings and I'm going to turn discovery off. That will make it so that other Bluetooth devices won't be able to see it. If I want to really increase the system security I'm going to just disallow new connections over Bluetooth to this computer. Summary 9:30-9:50 That's it for this demonstration. In this demo, we talked about Bluetooth connections. We first talked about how to enable the Bluetooth device on a PC system. We checked the drivers and then when we paired the PC system with another Bluetooth device, in this case a phone and then we transferred data back and forth between the two and then we ended this demonstration by disconnecting from the phone and securing the Bluetooth radio. In addition to 802.11 specifications for wireless networking, there are several more wireless communication methods that you should be familiar with: Method Description IR (Infrared) Infrared uses invisible light waves for communication. Infrared: Is a line-of-sight medium. Objects cannot be in the path of communications. Communicates at 9600 bps up to 4 Mbps and uses the resources of a COM port. Works best for devices within 1 meter, but can operate up to 30 meters in areas without ambient light interference. Offers no security for transmissions. Infrared is typically used for remote control devices or for sending data between two devices. Most smartphones have integrated IR capabilities. Bluetooth Bluetooth uses radio waves in the 2.4 GHz frequency range for communication. Bluetooth uses ad hoc connections between devices to create personal area networks called piconets . A piconet can have up to 7 devices, and each device can participate in multiple piconets at the same time. By using adaptive frequency hopping (AFH), Bluetooth is able to automatically detect other devices in the area and avoid the frequencies used by those devices. It can switch between 79 channels to avoid interference. A 128-bit proprietary encryption mechanism is used to encrypt signals. Transmission speeds and max distance depends on the version and device class: Version Speed Class Distance
Image of page 48

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
1.2 1 Mbps 1 100 m 2.0 3 Mbps 2 10 m 3.0 24 Mbps 3 1 m 4.0 Common applications for Bluetooth include the following: o Connecting peripheral devices (e.g., keyboard and mouse) o Wireless headphones and smartphone headsets o Peer-to-Peer communications (e.g., sharing data between a smartphone, notebook, and tablet) Bluetooth is also able to transmit audio and video data signals NFC (Near Field Communication) NFC enables communication between two devices that are in very close proximity with each other.
Image of page 49
Image of page 50
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern