How things work
How Does Bluetooth Work: The Working Principle In Simple Terms
How things work
This article explains the working principle behind Bluetooth technology. This article details how Bluetooth works in simple language. In focuses of the definition of Bluetooth technology, the principle behind the working of Bluetooth etc. It also explains safety and security as far as Bluetooth is concerned. Further it details the tips for Bluetooth security. Read on to know more.
What is Bluetooth?
Usually, when two electronic devises communicate with each other, they use cables, infrared rays, WiFi etc. These are some of the various complicated methods used in connecting one device to another.
is a similar technology, which is used to connect one electronic device to another, without the usage of any wires and cables. It is a wireless technology to send and receive data between two devices.
Coinage of the term Bluetooth
etymology of word Bluetooth
is interesting. An interesting fact about the Bluetooth technology is that it is named after King Harold Bluetooth, who was the King of Denmark during 10th century. It was him who united countries like Denmark and Norway. The name Bluetooth was chosen for the technology because it is countries like Denmark which dominates the Bluetooth communication industry. Another reason for the naming is that Bluetooth technology integrates two electronic devices just as King Bluetooth did in the late 9th century.
How does Bluetooth technology work?
What are Bluetooth adapters? How do they work?
Bluetooth works by the simple principle of sending and receiving data in the form of radio waves. Every Bluetooth enabled device has a card-like attachment known as the Bluetooth adapter. It is this Bluetooth adapter that sends and receives data. A Bluetooth adapter has a particular range of connection. One electronic adaptor can notice another Bluetooth device only if the second device is present within the range of the first device. When they are within the range, they can strike up a connection between themselves. Striking up of connection between two Bluetooth devices are known as paring of devices.
How is the data sent between two Bluetooth devices?
The radio-wave connection between two devices is used to send and receive data between two Bluetooth devices. The data send and received at a time is equal to 720 Kilo bytes per second. There are 79 frequency channels of a frequency 2.45 Giga Hertz through which the devices send and receive data to each other. When two devices are trying to be paired, they are actually searching for a common frequency through which they can send and receive data. When such a frequency is discovered, the devices are "found". The connecting of two devices does not hamper the connecting of two other devices because they usually use different channels of frequency and hence do not overlap. In simple terms, this is the
principle behind Bluetooth technology
What is piconet? How is it related to Bluetooth?
One merit of Bluetooth technology is that it allows more than two devices to be sharing information at the same time. When more than two electronic devices enter into the process of sending and receiving data, they form a small network like that of a computer network. Such a micro-network of electronic devices is called a Piconet. In a piconet, there will be more than two devices. The maximum number of devices that a single piconet can accommodate is seven. Any one of these devices acts as the superior device, or the Master device. It is the master device that initiates the action, or "give the order to begin" the action. The other devices are known as slave units. They act according to the instructions given by the Master unit. A Bluetooth device can either act as the Master or as the Slave, depending upon the situation. A device can enter a piconet and leave a piconet. When more than one piconets join together, it is termed a scatternet.
Is Bluetooth safe and secure?
As we all know, wireless connections are always more prone to attacks than wired connections. Wired connections occur through a medium which is generally accessible only to the devices engaged in communication. Attacks, for example, a virus can enter a device only if it is present in one of the devices that is engaged in open. Nowadays, even this type of connections are not as secure as they used to be, but a wireless connection is always more vulnerable. Bluetooth being a wireless technology, cannot be said to be secure. Nowadays we hear the incidents where Bluetooth devices are hacked. To prevent this,
measures are necessary.
Bluetooth security: How to keep it secure and safe?
Switch on the Bluetooth when you need to send or receive data. Do not keep it turned on always. This can prevent chances of hacking.
When a Bluetooth device tries to send data to your device, usually a message will show up, asking you to confirm the reception. Do it only if you know who is sending the data.
Install a good antivirus program in your mobile device.
Install a good program in your system as well. Harmful software can enter your device from system as well when you transfer data.
Do not use Wireless technology like Bluetooth to send confidential data.
These are some of the specific ways through which you can
keep your Bluetooth device safe
and keep your data secure.
How To Get Internet Connection Via Mobile Bluetooth To Computer For Browsing
Read related articles:
Did you like this resource? Share it with your friends and show your love!
Responses to "How Does Bluetooth Work: The Working Principle In Simple Terms"
Guest Author: Saint Apic 16 Jun 2014
Thanks very much for the article. I need something more than this, I really want to know everything about the Bluetooth. How it was formed, what material was used, the program (if possible I want to see the codes) controlling it, the working principles behind it, the programming language used? If I can get answers to these I'll be very grateful. Thanks
Notify me by email when others post comments to this article.
Do not include your name, "with regards" etc in the comment. Write detailed comment, relevant to the topic.
No HTML formatting and links to other web sites are allowed.
This is a strictly moderated site. Absolutely no spam allowed.
to fill automatically.
(Will not be published, but
to validate comment)
Type the numbers and letters shown on the left.
Subscribe to Email
Get Jobs by Email
Forum posts by Email
Articles by Email
Awards & Gifts
Vijay Kumar ...
Last 7 Days
Hafeezur Rahman P
ISC Technologies, Kochi - India. © All Rights Reserved.