Bluetooth wireless technology is a cable replacement technology that provides
wireless communication between portable devices, desktop devices and peripherals.
It is used to swap data and synchronize files between devices without having to
connect each other with cable. The wireless link has a range of 10m which offers
the user mobility. This technology can be used to make wireless data connection
to conventional local area networks (LAN) through an access point. There is no
need for the user to open an application or press button to initiate a process.
Bluetooth wireless technology is always on and runs in the background. Bluetooth
devices scan for other Bluetooth devices and when these devices are in range they
start to exchange messages so they can become aware of each others capabilities.
These devices do not require a line of sight to transmit data with each other.
Within a few years about 80 percent
of the mobile phones are expected to carry the Bluetooth chip. The Bluetooth transceiver
operates in the globally available unlicensed ISM radio band of 2.4GHz. The ISM
bands include frequency range at 902MHz to 928MHz and 2.4GHz to 2.484GHZ which
do not require operator license from a regulatory agency. This means that Bluetooth
technology can be used virtually anywhere in the world. Another type of wireless
technology that is being used nowadays is infrared signals. The choice of using
either one of the wireless technology will depend on the application for which
it is being used. Bluetooth is an economical, wireless solution that is convenient,
reliable, easy to use and operates over a longer distance than infrared. The initial
development started in 1994 by Ericsson. Bluetooth now has a special interest
group (SIG) which has 1800 companies worldwide. Bluetooth technology enables voice
and data transmission in a short-range radio.
There is a wide range of devises which can be connected easily and quickly without
the need for cables. Soon people world over will enjoy the convenience, speed
and security of instant wireless connection. Bluetooth is expected to be embedded
in hundreds of millions mobile phones, PCs, laptops and a whole range of other
electronic devices in the next few years. This is mainly because of the elimination
of cables and this makes the work environment look and feel comfortable and inviting.
In 1994, Ericsson Mobile Communication
initiated a study to investigate the feasibility of a low power, low cost radio
interface between mobile phones and their accessories. The aim of the study was
to find a way to eliminate cables between mobile phones and PC cards, headsets,
desktops and other devices. The study was part of a large project investigating
how different communication devices could be connected to the cellular network
via a mobile phone. Ericsson's work in this area caught the attention of IBM,
Intel, Nokia, and Toshiba. The companies formed the special interest group (SIG)
in May 1998, which grew to over 1500 member companies by April 2000. The company
jointly developed the Bluethooth 1.0 specifications, which was released in July
The engineers at Ericsson
code-named the new wireless technology Bluetooth to honor a 10th century Viking
king in Denmark. Harald Bluetooth reigned from 940 to 985 and is credited not
only with uniting that country, but with establishing Christianity there as well.
Harald's name was actually Blåtand, which roughly translates into English
as 'Bluetooth'. This has nothing to do with the color of his teeth- some claim
he neither brushed, nor flossed. Blåtand actually referred to Harald's very
dark hair, which was unusual for Viking. Other Viking states included Norway and
Sweden, which is the connection with Ericsson (literally, Eric's son) and its
selection of Bluetooth as the code- name for this wireless technology
You may also like this : Sniffer for detecting lost mobiles, Mobile Phone Cloning, Nano Cars Into The Robotics , Mind-Reading Computer, Intelligent Speed Adaptation , Global Wireless E-Voting , E-Cash Payment System , Cyborgs, Brain Fingerprinting , Biometrics in SECURE e-transaction , X- Internet , Surface Computer, Green Cloud , Digital Jewelry , Brain Gate , Palm Vein Technology , 5 Pen PC Technology , iDEN , Hi-Fi, Packet Sniffers, Brain Chips , Phishing , Pill Camera, Blue Brain , Biometric Voting System , 3D Television , 3D password, Gi-Fi , Graphical Password Authentication, 4G Broadband , Finger Tracking , Eye Movement-Based Human Computer Interaction Techniques , Ethical Hacking, Secure ATM by Image Processing , Dynamic Languages ,In-Vehicle Networking , Plastic Memory , Protein Memory , Setting up a LAN using Linux , UMTS , Money Pad, The Future Wallet , Low Power UART Design , SPECT , Buffer overflow attack , Hurd , Intel Centrino Mobile Technology , MPEG Video Compression , Survivable Networks Systems , Self Organizing Maps , Mobile IP,IT Seminar Reports, PPT and PDF.