Friday, October 31, 2014

How Smartphones Communicate Using Bluetooth


How Bluetooth Works

In the modern age of digital electronics, wireless access to different devices are inevitable. If you buy Smartphone you'll notice that it uses this same kind of technology, but how does this work? Here is an explanation of the whole bluetooth mystery.

Bluetooth devices will normally operate at 2.4 GHZ
in the license free, globally available ISM radio
band.  The advantage to this band includes worldwide
availability and compatibility.  A disadvantage to
this however, is that the devices must share this
band with other RF emitters.  This includes
automobile security systems, other wireless devices,
and other noise sources, such as microwaves.

To overcome this challenge, Bluetooth employs a
fast frequency hopping scheme and therefore uses
shorter packets than other standards within the
ISM band.  This scheme helps to make Bluetooth
communication more robust and more secure.

Frequency hopping
Frequency hopping is basically jumping from frequency
to frequency within the ISM radio band.  After a
bluetooth device sends or receives a packet, it
and the device (or devices) it's communicating with
hop to another frequency before the next packet is
sent.  This scheme offers three advantages:
1.  Allows Bluetooth devices to use the
entirety of the available ISM band, while never
transmitting from a fixed frequency for more than a
short period of time.  This helps insure that
Bluetooth conforms to the ISM restrictions on the
transmission quantity per frequency.
2.  Ensures that any interference won't
last long.  Any packet that doesn't arrive safely
to its destination can be resent to the next
frequency.
3.  Provides a base level of security as
it's very hard for an eavesdropping device to predict
which frequency the Bluetooth devices will use
next.

The connected devices however, must agree upon the
frequency they will use next.  The specification
in Bluetooth ensures this in two ways.  First, it
defines a master and slave type relationship between
bluetooth devices.  Next, it specifies an algorithm
that uses device specific information when
calculating the frequency hop sequences.

A Bluetooth device that operates in master mode can
communicate with up to seven devices that are set in
slave mode.  To each of the slaves, the master
Bluetooth device will send its own unique address
and the value of its own internal clock.  The
information sent is then used to calculate the
frequency hop sequences.

Because the master device and each of the slave
devices use the same algorithm with the same initial
input, the connected devices will always arrive
together at the next frequency that they have agreed
upon.

As a replacement for cable technology, it's no
wonder that Bluetooth devices are usually battery
powered, such as wireless mice and battery powered
cell phones.  To conserve the power, most devices
operate in low power.  This helps to give Bluetooth
devices a range of around 5 - 10 meters.

This range is far enough for wireless communication
but close enough to avoid drawing too much power
from the power source of the device.


Bluetooth And Infared


With new electrical devices being produced every day,
the problem of connecting things is becoming more
and more complex in nature.  The system that comprises
computers and other electronics makes use of varieties
of wires, cables, etc.

These parts will communicate through light beams,
lasers, radio signals, and infrared.  The problem
however, is the devices and technology is often the
connection between each component.  Therefore, most
electronic systems aren't used to their full extent
due to the problems and imperfections.

To help simplify things, a solution was created -
the solution of Bluetooth.  Bluetooth is wireless
and automatic, offering users a variety of features
that have simplified the art of connection.  Bluetooth
has revolutionized the standard methods of connecting
things to enabling almost anything to be connected
to a single system.

Aside from Bluetooth, there are other ways of
connecting wireless devices.  One example of such
is the IR or infrared.  Infrared allows low frequency
light waves to transmit signals to another component.
This technology is easy to create and the cost of
putting the IR device into a system is rather low.

Infrared technology is a one to one process.  Due
to the limitation, you may only send signals from one
device to another, similar to a television set and
remote control.  You can only transmit signals
between the two although not with a seperate system.

Aside from the fact that these two natures of
infrared are obstacles to acquiring results, these
same qualities have worked in advantage to the
connection.  Infrared devices need to be lined up
directly, meaning too little interference can occur
between the transmitters and receivers.

The technology behind Bluetooth works by transmitting
signals through low frequency radio signals.  The
path of communication is working on 2.45 GHz, which
is the same frequency band used in ISM devices.

Bluetooth Personal Area Networks


A personal area network, or PAN, is a collection of communication technology devices within the range of one person. When communication between these devices is wireless, the acronym becomes WPAN, or wireless personal area network. In reality, and for all practical purposes, most personal area networks are wireless. For our purposes, this article will consider personal area networks as being wireless.

As opposed to Local Area Networks and Wide Area Networks, the personal area network operates in a relatively short range, usually up to a maximum of thirty feet. The most common method of connection is through Bluetooth wireless technology. Bluetooth technology holds several key advantages over Wi-Fi in ease of use, as it is not necessary to configure each component and requires considerably less power to operate.

Unlike infrared networks, Bluetooth also doesn’t require objects to be in alignment in order to communicate. The huge practical advantage to the end user is the ability to transmit both voice and data between devices without the use of wires or USB cabling.

A Bluetooth enabled wireless personal network, also known as a piconet, can wirelessly connect a minimum of two and a maximum of eight devices. In a piconet, one device acts as the master device to connect with up to seven active devices. Data is communicated from the master device to another (slave) device. The role of master device rapidly switches to any device in the PAN which is in the process of data transfer.

A Bluetooth device has the ability to seek out and communicate with any compatible device within the immediate area.

Probably the earliest and most common example of a Bluetooth personal area network is the use of a wireless headset and cellular phone. Another popular use is that of the wireless mouse and keyboard. However, the potential for convenience and productivity of a wireless personal network extend well beyond early uses. Data can easily be synchronized and transmitted wirelessly between PDA, personal computer and cellular phone. Bluetooth wireless printers and fax machines are a great convenience to laptop users. Photos from digital cameras and cell phones can be downloaded. Wireless headphones paired with portable music devices make music enjoyment hassle free. The list goes on, and is limited only by the creativity of the user and limitations of the physical devices. As personal area network technology improves, one can expect the use and capability of wireless personal devices to expand well into the future.

Bluetooth In Iphone


Following its immensely successful Apple iPods, Apple has now come up with yet another hot selling product which is the iPhone that has all of the functionality of cell phones as also an iPod wide screen having touch controls and best of all an Internet enabled device that makes communicating with the outside world a real breeze. One of the more endearing features that you will appreciate in these new iPhones is the iPhone Bluetooth which allows users to talk without the need of wired headsets and which comes with a number of handy features as well.

The iPhone Bluetooth headset has just one button that allows users to receive their phone calls with simple intuition as well. Furthermore, you can get as much as 5.5 hours of talking time with as many as seventy-two hours standby time and this is made possible by its batteries that are made from lithium-ion and which are not only rechargeable but also in-built as well.

Now that the iPhone Bluetooth on Apple has begun to slowly become available it is good to know that it is no more than a minimalist accessory though it still has some very useful features as well, especially when the headset is connected to the dock that is dual charging and you are able to also see the headset charge along with the iPhone’s own charge to let you know when the iPhone Bluetooth is ready for use. And, for an additional twenty-nine dollars you can also get the iPhone Bluetooth Travel cable and also a set of replacement stereo headphones.

In any case, one cannot help but like the iPhone Bluetooth which is also light and simple while the design is very attractive though some would consider it a bit over priced and also not living up to its true potential, and this is something that may not go down to well because after paying one hundred twenty-nine dollars for your iPhone Bluetooth, you would expect that it gives nothing less than high-end performance.

However, you can still take two calls by pushing a button in order to hold an existing call while taking the second call and then all you need to do is push as well as hold the button till it emits a beep to let you know the existing call is over after which you can revert back to the call on hold. And, pairing the Bluetooth with your iPhone is not a real problem given that it has been designed to pair well with your iPhone.


Bluetooth, Smartphones And Apple


Bluetooth, Smartphones And Apple

Laptops are the firsts ones to use bluetooth technology. But technology is inevitable and today, more and more gadgets, such as smartphones uses the same technology to communicate with other devices.

Bluetooth And Apple The new Apple powerbook G4 are among the first computers to offer Bluetooth technology 2.0+EDR. The 2.0+EDR technology, which still backwards compatible with 1.0, is up to three times faster than previous versions, offering maximum data rate transfers of up to 3 MBps. Being the first company to certify a system with 2.0+EDR, Apple continues to make great use of the Bluetooth technology.

Full support In addition to the powerbook G4 portables, there are other Bluetooth enabled computers available from Apple, including the iBook, iMac G5, eMac, and the Power Mac G5.

Making life easier When you turn the Bluetooth feature on, your Mac can easily perform a file transfer or even a synchronization. From the Bluetooth selection menu, you can choose to either send a file or browse devices, quickly and easily. Or, you can click the sync button in iSync to update your cell phone or Palm OS handheld.

The Mac and GSM/GPRS mobile phone with Bluetooth work to make each other more useful. By using iSync, you can keep your phone updated without having to type any info, as you can keep the information in the more manageable address book on your Mac instead.

You can also use your Bluetooth enabled Mac to print documents and digital images to select a printer that also supports the technology of Bluetooth. Or, you can also use a headset to talk to your friends during an iChat session.

Your Mac also has the ability to use Bluetooth technology to communicate with your Palm OS handheld. This way, you can perform a HotSync operation without using any cables. You can also send your business card or calendar events directly to someone else's handheld usingthe technology of Bluetooth.

The implementation of Bluetooth by Apple is the latest in a series of moves that have caused great shift in the computer industry. Apple established USB as the standard interface with the launching of the first Mac back in 1998.

Since then, Apple established the 802.11 wireless standard of networking with the launch of the iBook and AirPort in 1999. During 2003, Apple launched AirPort Extreme, which was based on the new 802.11g high speed technology of wireless.

Now, Bluetooth helps to further strengthen the dominant position of the Mac in wireless communications, helping to preserve Apple's reputation for being the first to market with innovative technology that integrates right into the operating system.


Bluetooth


What is Bluetooth

If you have recently purchased a cellphone you may have been told whether or not your device was Bluetooth capable. Bluetooth technology enables a completely wireless headset that attaches onto the ear of the user. It allows the user to communicate hands free with no additional wires. Bluetooth technology prides itself on being very secure and having privacy as one of its main focuses. The device looks almost space age like something out of Star Wars since it fits directly on the ear and is very small like most advanced technology.

Why Own a Bluetooth?

The most obvious reason to own a Bluetooth is for the ability to talk hands free while moving around or driving. Many state are beginning to implement traffic laws that forbid the usage of cellphones without a hands free device. Bluetooth technology will become all important for people that are on the go that need to reach the home or office while driving. Not to mention they are very convenient while shopping at the supermarket and one forgets what they were supposed to purchase. It allows the user to call home to find out what needed to be purchased.

About Bluetooth Technology

Bluetooth comes equipped with a 2.45 GHz which is a tranceiver that sends and receives in an unused frequency. It is able to be accessed around the world. Also, each bluetooth has its own 48 bit address. The connections are in the format of point to point or multipoint in nature. The furthest range allowed is ten meters at this time, so it is a short range wireless device. Data travels at a speed of one megabit a second.

How Bluetooth Can be Used

Bluetooth is by far not just to be used as a hands free device for a cellphone. In addition, Bluetooth can allow for the exchange of information between multiple devices such as: digital cameras, GPS receivers, laptops, mobile phones, PC's, printers, and video game consoles. The communication passes through a secure, short-range radio frequency. It is licensed on a global level.


Securing Your Computer System


Today, more and more people are using their computers for everything from communication to online banking and investing to shopping. As we do these things on a more regular basis, we open ourselves up to potential hackers, attackers and crackers. While some may be looking to phish your personal information and identity for resale, others simply just want to use your computer as a platform from which to attack other unknowing targets. Below are a few easy, cost-effective steps you can take to make your computer more secure.

1. Always make backups of important information and store in a safe place separate from your computer.

2. Update and patch your operating system, web browser and software frequently. If you have a Windows operating system, start by going to www.windowsupdate.microsoft.com and running the update wizard. This program will help you find the latest patches for your Windows computer. Also go to www.officeupdate.microsoft.com to locate possible patches for your Office programs.

3. Install a firewall. Without a good firewall, viruses, worms, Trojans, malware and adware can all easily access your computer from the Internet. Consideration should be given to the benefits and differences between hardware and software based firewall programs.

4. Review your browser and email settings for optimum security. Why should you do this? Active-X and JavaScript are often used by hackers to plant malicious programs into your computers. While cookies are relatively harmless in terms of security concerns, they do still track your movements on the Internet to build a profile of you. At a minimum set your security setting for the “internet zone” to High, and your “trusted sites zone” to Medium Low.

5. Install antivirus software and set for automatic updates so that you receive the most current versions.

6. Do not open unknown email attachments. It is simply not enough that you may recognize the address from which it originates because many viruses can spread from a familiar address.

7. Do not run programs from unknown origins. Also, do not send these types of programs to friends and coworkers because they contain funny or amusing stories or jokes. They may contain a Trojans horse waiting to infect a computer.

8. Disable hidden filename extensions. By default, the Windows operating system is set to “hide file extensions for known file types”. Disable this option so that file extensions display in Windows. Some file extensions will, by default, continue to remain hidden, but you are more likely to see any unusual file extensions that do not belong.

9. Turn off your computer and disconnect from the network when not using the computer. A hacker can not attack your computer when you are disconnected from the network or the computer is off.

10. Consider making a boot disk on a floppy disk in case your computer is damaged or compromised by a malicious program. Obviously, you need to take this step before you experience a hostile breach of your system.

Security For Your Computer


With the uncertainty that exists in the World Wide Web at the present time, every computer must have some security device in place. Viruses and other such software can be detrimental to the life of your computer and can be contracted from virtually anywhere on the Internet. Since these elements are very difficult to immunize once they have infiltrated the surface of your hard drive, it is imperative that they be stopped before they have the chance to do so. Hence having security devices and software in place on your computer is a must, as it can easily detect threats allow you to deal with any problems that may arise with relative ease.

Of particular threat to your computer is spyware. It is basically like a virus in that is spreads throughout your computer however, spyware, as its name suggests, invades the privacy of the personal computer. Thus, the purchase antispyware software is essential in securing your computer from potential threats. Some operating systems are actually equipped with a security center built-in already. This means that when you purchase the computer and operating system software you already have the services of the security center at your disposal. Such services commonly include the ability of an administrator to monitor activity throughout the system as well as potentially block hazardous material on the internet from being viewed by other users, the ability to manage automatic updates and what's more the ability to enquire about the status of antivirus software.

Many of these pre-installed security mechanisms also come equipped with a firewall. A firewall is essentially a , which protects against incoming threats whether they are in the form of infections or hijackers. Without the aid of a firewall an automated hijacker could hack into your system in a matter of minutes while you are connected to the Internet, completely unaware of what is happening to your computer.


Security A 21st Century Concern


Security is of major concern in today's world as the world has become increasingly complex and easily accessible, especially via the internet and email. One of the most important issues facing people regarding security today is in regards to computers. Most of the security issues in relation to computer viruses and worms, Trojan horses, and the like, are geared predominantly to the PC consumer market.

Ranging from running adware to hijacking browsers, infecting computers with malware and spyware programs that run massive spam emails, act as servers, completely overtake computers, steal personal information including social security and identity numbers, personal residence information, age, demographics, as well as credit card and banking information, to running pornographic material and ads, the amount and variety of spyware and adware threats that pose security issues to computers, have compounded in the last few years, exploding the increase of security violations.

One of the most prevalent penetrators through computer firewalls and security systems, is the computer worm. Defined in the Oxford dictionary as a self-replicating program able to propagate itself across network, typically having a detrimental effect. Computer worms primarily replicate on networks, but they represent a subclass of computer viruses. With the wide variety of computer worms and viruses, researchers differ on the exact definitions of computer worms.

The network-oriented infection strategy is indeed a primary difference between viruses and computer worms. Moreover, worms usually do not need to infect files but propagate as standalone programs. Additionally, several worms can take control of remote systems without any help from the users, usually exploiting a vulnerability or set of vulnerabilities.

Each computer worm has a few essential components, such as the target locator and the infection propagator modules, as well as a few other non-essential modules, such as the remote control, update interface, life-cycle manager, and payload routines. The worm needs to be able to find new targets to spread rapidly on the network. Most worms search your system to discover e-mail addresses and simply send copies of themselves to such addresses, a highly convenient system for attackers looking to break into a corporate firewall. Most corporations typically need to allow e-mail messages across the corporate firewalls, thereby allowing an easy penetration point for the worm. Many worms deploy techniques to scan the network for nodes on the IP level and even "fingerprint" the remote system to check whether such a system might be vulnerable.

Another important component of a worm is remote control using a communication module. Without such a module, the worm's author cannot control the worm network by sending control messages to the worm copies. An update or plug-in interface is an important feature of advanced worms to update the worm's code on an already-compromised system.

The attacker is interested in changing the behavior of the worm and even sending new infection strategies to as many compromised nodes as possible. The quick introduction of new infection vectors is especially dangerous. Many worms have bugs in their life-cycle manager component and continue to run without ever stopping.


Online Casinos: List of the Most Graphic


Online casinos are plenty and they differ when it comes to the amount of games, customer service, free cash they hand out and many other features that pertain to the legally binding contract between the player and the casino. But there are other features that are usually ignored by those reviewing the many online casinos available online, and it is precisely one of these features: the graphic quality of the site, that we have examined.

Want to play online games and have a great time? Play at these graphically enhanced online casinos:

1) Golden Casino
Offering new casino software and a bonus of 555 dollars would be enough to want me to play there, but once I downloaded the game system, I gasped. The layout of their hall reminds me of that of Caesars Palace, and once, you start playing (with life-like images) you fell as if you were standing in a real casino! And, as if that was not enough, the tables are covered with a lace-like surface that increases the casino ambience and takes it to another level completely. In addition, Golden Casino is loosely affiliated with some of the top names in the casino industry today such as Golden Palace and others.

2) Crystal Palace
Striking because of its blue contours and curves, Crystal Palace not only offers a graphic display that reminds you of a desert oasis or a car rally, but it also uses a correct and colourful combination of colours in order to create the total graphic experience. It is not enough that their games are fast, flash-oriented and versatile, each one can be played using different graphic displays and settings thus boggling the mind with peace that helps you concentrate solely on the game you are playing. They are one of the major slot machine initiators, and their slots are perfectly matched between a light and slot experience.

3) Club USA Casino
Appearing at first hazy and blurry with a tinge of dark green, you will not even hope for what comes next. Once you download the games, sign up and login, please keep your mouth closed. They give you seven hundred dollars for the chance of floating through casino space. In addition, their graphic display is set up in such a way that each block supersedes the one that came before it, thus, creating a window-like graphic view where each object stands out more than the one behind it.

4) Royal Vegas Casino
Vegas online has come alive. Yes. That is what you feel when you start playing through this online casino. The lights are real, the machines too and if that was not enough, the graphics are unbelievably custom-made for those who have been to Las Vegas. The strip is just as it would appear if you were standing at the corner.

5) Roxy Palace
Designed to copy the feel of a casino entrance with its huge amount of lights and neons, Roxy Palace takes another step forward when it comes to the graphic game display that they offer. Each game has a different ambience, and the graphics are so clear and well-defined that you can even make out the writing on the billboards.

Conclusion:
When I want to play at online casinos I look out for those online casinos that offer a high graphic interface. And each of the above online casinos are graphically designed to ensure you enjoy a great online casinos experience. Pick one of them and enjoy your online gaming experience.