Bluetooth

1742 Words4 Pages

Over the past few years we as a race have become overly dependent on technology, which has compelled us to develop electronic devises that allow us to transfer and share data more rapidly and securely. However, this task of connecting different technologies has not been painless as most devices come with different operating systems, parts, connectors, and protocols that need to be considered and taken care of before developing any new devices. As a result, it has been a challenge to produce new technologies and protocols to allow these devices to connect easily. One such solution is Bluetooth will allows devices to connect wirelessly over a short range. However, like any other wireless networking, Bluetooth is also prone to various types of hacking.

What is Bluetooth?

Bluetooth is a device that uses radio communication to wirelessly connect electronic devices such as cell phones, portable computers, and portable handheld devices to connect to one another as well as to the Internet. According to Wikipedia.org “the communication distance ranges from about 1 meter to a maximum of 100 meters.” This suggests that the network is created using low powered radio waves. Devices using Bluetooth are able to transfer data at a rate of 1 Mbps. Bluetooth technology was established to replace cable networking and to establish communication over short ranges.

How does Bluetooth work?

Standard Bluetooth technology uses radio waves to create a wireless network between devices. In order to do this, a Bluetooth-chip is fit into the consumer’s electronic device and peripherals to communicate at a special frequency with each other. The chip consists of a transmitter and a receiver known as a transceiver. The transmitter chip transmits data thro...

... middle of paper ...

...e in the form of business cards.

Rob Schneirderman in his article about communication security, very rightly points out that “more than 20 million handheld PDA’s and a billion mobile phones are in use today, yet few corporations have security policies in place to administer the use and protection of their wireless data.” Bluetooth is a wireless technology and it is prone to many flaws and security problems, but when used carefully, it can really be advantageous to the world of IT and users in general. Users concerned with security will have to give up a few conveniences in order to ensure they receive secure data. Increasingly, manufacturers of Bluetooth devices understand the balance between security and convenience and are trying to design their devices in ways that encourage users to be more secure about the information they receive and send through their device.

Open Document