Back to Search Start Over

Secured Communication Using Bluetooth.

Authors :
Alam, Mahtab
Kabiru, Muhammad
Maikudi, Usman Ahmad
Source :
IUP Journal of Telecommunications; Aug2020, Vol. 12 Issue 3, p7-15, 9p
Publication Year :
2020

Abstract

Bluetooth technology legitimates the topology (piconets) which collects the slaves controlled by master on ad hoc network. Collection of one or more piconets in Bluetooth network is called scatternet. This technology is based on the devices connected for communication at low-powered and short-ranged network application. It is a replacement of wire technology with cordless devices. Bluetooth technology is specification of wireless personal area which connects several devices and exchanges data between mobile phones at very low power consumption. The communication protocols have the feature of complexity of linking address. It is always ready to work in any form either as master or slave, if additional devices are attached in the network. The slave device gets permission to attain period and synchronization if it has been asked by the master device. The intercommunication between multiple Bluetooth devices within an assumed environmental situation is termed as 'piconet', with their meticulous time slots on a period partition multiplexing base by the master device and the subordinate devices bounded by the master. Reserve distributions are determined by the master and dynamically replicate the data to the desired system. The enrichment in the established Minnesota Multiphasic Personality Inventory (MMPI) structure creates it a respectable possibility for scatternet requests. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
09755551
Volume :
12
Issue :
3
Database :
Complementary Index
Journal :
IUP Journal of Telecommunications
Publication Type :
Academic Journal
Accession number :
146862485