Bluetooth is a wireless technology standard used to exchange data over short distances. The data is exchanged from fixed and mobile devices by creating Personal Area Network with security at high level. Bluetooth was originally conceived as a wireless alternate to RS-232 cables. It resolves the problems synchronization by connecting several devices.
What is Bluetooth SIG?
Bluetooth Special Interest Group (SIG)
Bluetooth wireless technology is revolutionizing personal connectivity by providing freedom from wired connections. It is a specification for a small-form factor, low-cost radio solution providing links between mobile computers, mobile phones, other portable handheld devices and automobiles, as well as connectivity to the Internet. The Bluetooth SIG, comprised of leaders in the telecommunications, computing, automotive and consumer electronics industries, is driving development of the technology and bringing it to market. The Bluetooth SIG includes Promoter member companies Agere, Ericsson, IBM, Intel, Microsoft, Motorola, Nokia and Toshiba, and thousands of Associate and Adopter member companies. The Bluetooth SIG, Inc. headquarters are located in Overland Park, Kansas, U.S.A.
Bluetooth is called a cable replacement technology. Explain.
Blue tooth allows Personal Area Networks without the cables. It provides connectivity to many mobiles users at a time for sharing without wires. Blue tooth chip is designed for replacing cables by transmitting the information at a special frequency from sender to receiver.
How secure a Bluetooth device is?
Bluetooth uses the SAFER+ algorithm for authentication and key generation. The E0 stream cipher is used for encrypting packets. This makes eavesdropping on Bluetooth-enabled devices more difficult.
Explain about TCP flow control
TCP utilizes a flow control protocol from one end to another end for avoiding the sender to send data too quickly for the TCP receiver to receive and process it in a reliable manner. Machines of diverse network can communicate quickly by having the flow control mechanism.
TCP utilizes a sliding window flow control protocol. In every TCP segment, the receiver is specified in a receive window field, the additional received data that is to buffer for the connection. When a window of size 0 is advertised by a receiver, the data sending is stopped by the sender and starts the persist timer. The TCP dead lock situation is protected by the persist timer. The TCP sender sends the packet and the receiver sends the acknowledgement with the new size of window, at the time of expiring the persist timer.