Customer center

We are a boutique essay service, not a mass production custom writing factory. Let us create a perfect paper for you today!

Example research essay topic: Opportunities And Threats Wireless Communication - 724 words

NOTE: Free essay sample provided on this page should be used for references or sample purposes only. The sample essay is available to anyone, so any direct quoting without mentioning the source will be considered plagiarism by schools, colleges and universities that use plagiarism detection software. To get a completely brand-new, plagiarism-free essay, please use our essay writing service.
One click instant price quote

Bluetooth Bluetooth technology was originally developed to replace the cable connections and thus giving more flexibility while operating various devices. Initially launched in 1998, the Bluetooth Special Interest Group (SIG) has now attracted more than 2500 member companies 1. Currently the Bluetooth technology is introduced by the three application models. The first model of the Bluetooth usage is the wireless connection of various devices.

A group of devices can also communicate in a temporal network, so-called pico-networking; when Bluetooth enabled devices become widespread a third usage model may be realized, namely Bluetooth networking over access points. There are several solutions to connect devices without the cable. Infrared connection has been known for a certain time. There are certain disadvantages of the infrared communications.

The most important is the short range of operation (a) and (b) the devices should be at sight. The Bluetooth wireless communication is based on a short-range radio technology. The devices can operate at a distance of 10 m and they may not be at sight. The Bluetooth technology may be used for several devices to communicate at a time. For example the Bluetooth may be used for the file exchange at a meeting room. Currently almost all applications of the Bluetooth are restricted by the cable replacement in communication only.

The use of the Bluetooth devices for the networking access is restricted by the limited amount of the devices in the market available to work with the Bluetooth technology. The Bluetooth technology creates a bridge between the mobile communicative devices and computers, laptops etc. The idea is to create a single digital wireless protocol to address end-user problems arising from proliferation of various mobile devices 2. The Bluetooth technology offers the optimum solution in terms of economy for low-to-medium speed connectivity. The Bluetooth has a huge number of applications. There are myriad applications for wireless personal area networks, and there could easily be 1. 5 billion Bluetooth devices by 2005, said Michael Hentschel, Managing Director of Tech Vest Ventures 3.

The spread of the Bluetooth technology is expected to influence the market of the telecommunication devices. The amount of the Bluetooth enabled devices will be growing steadily. The technology opens the new horizons for the cellular phones, laptops, desktop computers. There were a lot of speculations regarding the level of the information security while implementing the Bluetooth technology. The developers of the Bluetooth devices pay special attention to providing the information security.

It is understandable that the technology may be useless if appropriate level of security is not provided. Product developers that use Bluetooth wireless technology in their products have several options for implementing security. There are three modes of security for Bluetooth access between two devices. They are: Security Mode 1: non-secure, Security Mode 2: Service level enforced security and Security Mode 3: link level enforced security 4. Unfortunately, the Bluetooth devices can be accessible as any other computer / network devices by the spammers, hackers etc. Blue jacking is a way of spamming the Bluetooth devices.

Normally the bluejackets can not retrieve data from the device. The bluejackets send some short information, normally personal cards and if the phone owner reacts they ping the phone and if the owner add the contacts of the bluejacket he may receive spam as in regular wireless communication. More dangerous vulnerability that may happen to the Bluetooth devices is blue bugging. The skillful hackers can gain access to data stored on a Bluetooth enabled phone using Bluetooth wireless technology without alerting the phones user of the connection made to the device 5. It is easier to cope with the Bluetooth hackers than with the Internet ones because such hacker should be at a distance of operating the device, i. e. 10 meters.

The manufacturers of the Bluetooth devices upgrade the security of their products and made them resistible to blue bugging and blue jacking. In spite of some disadvantages of the Bluetooth based devices the technology is very promising and the use of it will be growing steadily. Citation Bluetooth Opportunities and Threats from a Market Perspective Jeff Stripp, Ibid Wireless Security Ibid Bibliography Bluetooth Opportunities and Threats from a Market Perspective, available at web retrieved 17. 11. 2005 Jeff Stripp, Bluetooth: Value Adds and Opportunities, available at web retrieved 17. 11. 2005 Wireless Security, available at web retrieved 17. 11. 2005


Free research essays on topics related to: wireless communication, opportunities and threats, information security, wireless technology, short range

Research essay sample on Opportunities And Threats Wireless Communication

Writing service prices per page

  • $18.85 - in 14 days
  • $19.95 - in 3 days
  • $23.95 - within 48 hours
  • $26.95 - within 24 hours
  • $29.95 - within 12 hours
  • $34.95 - within 6 hours
  • $39.95 - within 3 hours
  • Calculate total price

Our guarantee

  • 100% money back guarantee
  • plagiarism-free authentic works
  • completely confidential service
  • timely revisions until completely satisfied
  • 24/7 customer support
  • payments protected by PayPal

Secure payment

With EssayChief you get

  • Strict plagiarism detection regulations
  • 300+ words per page
  • Times New Roman font 12 pts, double-spaced
  • FREE abstract, outline, bibliography
  • Money back guarantee for missed deadline
  • Round-the-clock customer support
  • Complete anonymity of all our clients
  • Custom essays
  • Writing service

EssayChief can handle your

  • essays, term papers
  • book and movie reports
  • Power Point presentations
  • annotated bibliographies
  • theses, dissertations
  • exam preparations
  • editing and proofreading of your texts
  • academic ghostwriting of any kind

Free essay samples

Browse essays by topic:

Stay with EssayChief! We offer 10% discount to all our return customers. Once you place your order you will receive an email with the password. You can use this password for unlimited period and you can share it with your friends!

Academic ghostwriting

About us

© 2002-2024 EssayChief.com