Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
англ яз в сфере комп.технологий.doc
Скачиваний:
13
Добавлен:
16.11.2019
Размер:
874.5 Кб
Скачать

Discoverable mode

The devices, being in this mode, always answer all inquiries, received by them.

Limited discoverable mode

In this mode there are devices which can answer inquiries only limited time, or should answer only at observance of the certain conditions.

Non-discoverable mode

The devices, taking place in this mode, as it is visible from the name of a mode, do not answer new inquiries.

But it is not all. Even if device finds out success, it can be in connectable mode or in non-connectable mode. In non-connectable mode the device does not allow to adjust some important parameters of connection, and, thus, though it can be revealed but to exchange the data with it, it will be impossible. If the device is in connectable mode, at this stage Bluetooth device agree among themselves about a used range of frequencies, size of pages, quantity both order of hops, and other physical parameters of connection

If the process of detection of devices has passed normally, new Bluetooth device receives a set of addresses accessible of Bluetooth devices, and it follows device name discovery, when the new device finds out names of all accessible Bluetooth devices from the list Everyone Bluetooth device should have the unique address (like as MAC-addresses at network payments), but at a level of the user not this address is usually used, and name of the device, which can be any, and it is no necessary to be global unique. The name of the Bluetooth device can be length up to 248 bytes, and use code page according to Unicode UTF-8 (at use UCS-2. the name can be short up to 82 symbols). The specification provides, that Bluetooth of the device are not obliged to accept more first 40 symbols of a name of another Bluetooth device. If Bluetooth the device has the limited size and limited computing power screen, quantity of symbols, which it will accept can be reduced up to 20.

Another major Bluetooth features is the automatic connection of Bluetooth devices to services given by others Bluetooth devices. Therefore, after there is a list of names and addresses, the search of accessible services given by accessible devices is carried out service discovery. The reception or granting any services are main courses of Bluetooth creation, therefore for search of possible services there is special protocol named is Service Discovery Protocol (SOP).

Protection technology

Bluetooth has the protection technology of the transmitted data which ha\e been built-in m protocol. Depending on carried out tasks, three modes of protection in which are stipulated can there is a device.

Security mode 1 (non secure), the device can not independently initiate protective procedures.

Security mode 2 (service level enforced security), the device does not initiate protective procedures yet is not established and the connection is not adjusted After the connection is established, the procedures of protection are obligatory, and are defined i determined) by a type and requirements of used services.

Security mode 3 (link level enforced security), the protective procedures are initiated during an establishment and tuning of connection. If the removed device can not fulfill the requirements of protection, the connection is not established.

Of course, that Security mode 3 and 2 can be used together, that is at first protected connection is established, and then it is protected according to the requirements and opportunities of a concrete service

Basis of Bluetooth safety system, used in Security mode 3, is the concept of a session key, or Bond. The session key generates during connection of two devices, and is used for identification and enciphering of the transmitted data. For a key generation most various components, both meanings, beforehand known for both devices, and physical addresses of devices can be used. Combining protection at a level of connection with protection at a level of the applications (where any of existing on today systems of protection of the data can be used absolute) it is possible to create the reliably enough protected connections. But from the point of view of protected connection's construction, obvious weakness of Bluetooth stay an opportunity of interception of the traffic, and for this purpose will not necessary to use specific equipment. However, this problem is not new, and now often it is necessary to use open networks, like the Internet, where the interception of the traffic is possible, care of the closed data.