Your Questions About Bluetooth Technology Definition

Charles asks…

plz give details about bluetooth scatternet?

for my project plz give the requirments and implementation details of bluetooth scatternet …and the operations we can perform by that ….thnkz in advance ….

dknol answers:

“Bluetooth is defined as a layer protocol architecture consisting of core protocols, cable replacement protocols, telephony control protocols, and adopted protocols.” Mandatory protocols for all Bluetooth stacks are: LMP, L2CAP and SDP. Additionally, these protocols are almost universally supported: HCI and RFCOMM.
To use Bluetooth wireless technology, a device must be able to interpret certain Bluetooth profiles, which are definitions of possible applications and specify general behaviors that Bluetooth enabled devices use to communicate with other Bluetooth devices. There are a wide range of Bluetooth profiles that describe many different types of applications or use cases for devices.
A master Bluetooth device can communicate with up to seven devices in a piconet. The devices can switch roles, by agreement, and the slave can become the master at any time.

At any given time, data can be transferred between the master and one other device (except for the little-used broadcast mode). The master chooses which slave device to address; typically, it switches rapidly from one device to another in a round-robin fashion.

The Bluetooth Core Specification provides for the connection of two or more piconets to form a scatternet, in which certain devices serve as bridges, simultaneously playing the master role in one piconet and the slave role in another.

Many USB Bluetooth adapters or “dongles” are available, some of which also include an IrDA adapter. Older (pre-2003) Bluetooth dongles, however, have limited capabilities, offering only the Bluetooth Enumerator and a less-powerful Bluetooth Radio incarnation. Such devices can link computers with Bluetooth with a distance of 100 meters, but they do not offer much in the way of services that modern adapters do.

A scatternet is a type of ad-hoc computer network consisting of two or more piconets. Both of the terms ‘scatternet' and ‘piconet' are typically applied to Bluetooth wireless technology.

Description of a Scatternet
A piconet is the type of connection that is formed between two or more Bluetooth-enabled devices such as modern cell phones or PDAs. Bluetooth enabled devices are “peer units” in that they are able to act as either master or slave. However, when a piconet is formed between two or more devices, one device takes the role of ‘master', and all other devices assume a ‘slave' role for synchronization reasons. Piconets have a 3-bit address space, which limits the maximum size of a piconet to 8 devices (23 = 8), i.e. 1 master and 7 slaves.

A scatternet is a number of interconnected piconets that supports communication between more than 8 devices. Scatternets can be formed when a member of one piconet (either the master or one of the slaves) elects to participate as a slave in a second, separate piconet. The device participating in both piconets can relay data between members of both ad-hoc networks. However, the basic bluetooth protocol does not support this relaying – the host software of each device would need to manage it. Using this approach, it is possible to join together numerous piconets into a large scatternet, and to expand the physical size of the network beyond Bluetooth's limited range.

Currently there are very few actual implementations of scatternets due to limitations of Bluetooth and the MAC address protocol. However, there is a growing body of research being conducted with the goal of developing algorithms to efficiently form scatternets.

Future Applications
Scatternets have the potential to bring the interconnectivity of the Internet to the physical world through wireless devices. A number of companies have attempted to launch social networking and dating services that leverage early scatternet implementations (see Bluedating). Scatternets can also be used to enable ad-hoc communication and interaction between autonomous robots and other devices.

Susan asks…

I want an HP laptop, which one is good?

Im getting a laptop but the problem is i dont know a good laptop. I want an HP thats not too big. Thanks

dknol answers:

I have used this product and it performs really well
1)HP Pavilion dm4-1060us 14.1-Inch Laptop
*Intel Core i5-430M processor 2.26GHz with Turbo Boost Technology up to 2.53 GHz; 4GB DDR3 *System Memory – Max supported = 8GB;
*14.0 inch diagonal High-Definition HP BrightView LED Display (1366 x 768); Intel HD Graphics with up to 1696MB total graphics memory;
*Brushed aluminum finish with the stream design in argento; HP TrueVision Webcam with integrated digital microphone;
*Integrated 10/100/1000 Gigabit Ethernet LAN (RJ-45 connector); Wireless LAN 802.11b/g/n WLAN & Bluetooth
*3 Universal Serial Bus 2.0, 3rd port shared with eSATA; 1 HDMI; 1 eSATA + USB 2.0; 1 VGA; 1 RJ -45; 1 Headphone-out; 1 Microphone-in
*HP SimplePass with integrated fingerprint reader; 5-in-1 integrated Digital Media Reader
*SuperMulti 8X DVD±R/RW with Double Layer Support; Dolby Advanced Audio with Altec Lansing speakers

Also check out at ebay there are many good reatilers selling this product at good price

Michael asks…

Where could i find the listings of top technologies of 2005/2006?

dknol answers:

Here are the top 10 most important technology issues for 2006, along with their definitions. New items for this year are noted as such.

1. Information Security: The hardware, software, processes, and procedures in place to protect information systems from internal and external threats. It includes routers, perimeter firewalls, IP strategy, intrusion detection and reporting, content filtering, anti-virus, anti-spyware, password management, vulnerability assessment, patch management, personal firewalls, wireless security strategies, data encryption, locked facilities and user education.

2. Assurance and Compliance Applications (e.g., SOX 404, ERM): Collaboration and compliance tools that enable various stakeholders to monitor, document, assess, test and report on compliance with specified controls.

3. Disaster and Business Continuity Planning: The development, monitoring, and updating of the process by which organizations plan for continuity of their business in the event of a loss of business information resources due to impairments such as theft, virus infestation, weather damage, accidents, or other malicious destruction. This also includes business continuation and contingency planning.

4. IT Governance: IT governance is a structure of relationships and processes to direct and control the enterprise in order to achieve the enterprise's goals by adding value, while still balancing risk versus return over IT and its processes.

5. Privacy Management: Privacy encompasses the rights and obligations of individuals and organizations with respect to the collection, use, disclosure, and retention of personal information. As more information and processes are being converted to a digital format, this information must be protected from unauthorized users and from unauthorized usage by those with access to the data. This includes complying with local, state, national and international laws.

6. Digital Identity and Authentication Technologies: A way to ensure users are who they say they are—that the user who attempts to perform functions in a system is in fact the user who is authorized to do so. This includes hardware and software solutions that enable the electronic verification of a user’s identity or a message’s validity, for example, digital certificates. This technology includes the use of bar codes, magnetic stripe, biometrics, tokens and access control for authentication, non-repudiation, and authorization.

7. Wireless Technologies: Connectivity and transfer of data between devices via the airwaves, i.e. Without physical connectivity. Wireless technologies include Bluetooth (PAN), infrared, WiFi (802.11 WLAN), Wi-Max (802.16), 2.5G & 3G (WWAN) and, satellite.

8. Application and Data Integration: Using current and emerging technologies, including .NET, web-services, Java, XML (the foundation for XBRL) and Ajax, to facilitate integration of data between heterogeneous applications. In its most basic format, XBRL focuses on the agreement to improve gathering, analyzing and sharing business reporting data. For example updating a field in one application and have it automatically synchronize with other applications. This allows organizations to select and seamlessly integrate “best of breed” applications.

9. Paperless Digital Technologies: Document and content management includes the process of capturing, indexing, storing, retrieving, searching, and managing documents electronically including database management (PDF and other formats). Knowledge management then brings structure and control to this information, allowing organizations to harness the intellectual capital contained in the underlying data.

10. Spyware Detection and Removal: Technology that detects and removes programs attempting to covertly gather and transmit confidential user information without his or her knowledge or permission. Spyware applications are typically bundled as a hidden component of freeware or shareware programs or attached to malicious websites. Once installed, spyware can monitor user activity, gather information about e-mail addresses, passwords, and credit card numbers in the background, then transmit this information to someone else. Spyware can include Remote Access Trojans (RAT) and root kits.

Thomas asks…

Is this a good gaming desktop/desktop in general?

I have a HP 15.6″ Envy Notebook 8GB RAM, 750GB HD and heres the info on it

Includes Envy 15-3040NR notebook, eight-cell lithium-ion battery, AC adapter, Software Fundamentals Home Edition
2.2GHz second-generation Intel Core i7-2670QM processor, up to 3.1GHz with Turbo Boost
15.6″ diagonal Radiance Full HD Infinity LED-backlit display with 1920x1080p resolution
750GB 7200 RPM SATA hard drive with HP ProtectSmart
SuperMulti DVD burner
802.11a/b/g/n Wi-Fi
Bluetooth technology
Intel Wireless Display/WiDi-ready
Radeon HD 7690M switchable graphics with 1024MB GDDR5, up to 5093MB total graphics memory
Beats Audio with six speakers, subwoofer
HP TrueVision HD webcam, mic
10/100/1000 ethernet
SD, MMC memory card reader
Two USB 3.0 ports
USB 2.0, HDMI, DisplayPort, RJ-45 ports
Two headphone jacks
Mic jack
Kensington MicroSaver lock slot
Genuine Windows 7 Home Premium, 64-bit
Microsoft Office 2010 Starter
2 years of Norton Internet Security 2012
Measures approximately 15″L x 9-5/8″W x 1-1/8″H; weighs 5.79 lbs
UL listed adapter; 1-year LMW
Made in China

All it does is lag and chop on video's and gets super hot. So I am getting a desktop with the below specs.

CPU: Intel® Core™ i7-3770K 3.50 GHz 8MB Intel Smart Cache LGA1155 (All Venom OC Certified)

HDD: 2TB (2TBx1) SATA-III 6.0Gb/s 64MB Cache 7200RPM HDD [+0] (Single Drive)
MEMORY: 16GB (4GBx4) DDR3/1600MHz Dual Channel Memory [+65] (Kingston HyperX [+0])

MOTHERBOARD: * [CrossFireX] GIGABYTE GA-Z77-HD3 Intel Z77 Chipset DDR3 ATX Mainboard w/ IRST, Ultra Durable 4 Classic, 7.1 HD Audio, GbLAN, 2x Gen3 PCIe x16, 2x PCIe x1 & 2 PCI (Extreme OC Certified)


VIDEO: NVIDIA GeForce GTX 660 2GB 16X PCIe 3.0 Video Card (Major Brand Powered by NVIDIA)

Just wondering if this is real good?

dknol answers:

Honestly, that looks pretty excessive and pricey. If you're not already going to you might want to look into building you own computer with some of these. There's no way you're going to need all of that except for Battlefield 3 and Borderlands 2, you might want to look into 1tb drive (If you need more a $70 external is the answer, 12 gb of RAM, move to an intel that does 3.1 ghz overclocking but then get a motherboard with two pins and use 8 cores instead of four, screw the sound card, you just need the cheapest integrated one you can get your hands on, Look into a 560 ti graphics card it's going to be way cheaper and you won't notice any differences.
These changes will probably save you $500 and you won't notice any game differences because anything over 64 fps will look the same to you.

Carol asks…

What is the RAM of acer laptop?

Does anyone know what's the RAM for laptop Acer Aspire 2920-7A2G32Mn? I looked for it but could not find it.

dknol answers:


Operating System Genuine Microsoft® Windows Vista® Home Premium

Processor and Core Logic Intel® Centrino® processor technology
Intel® Core™2 Duo processor T5850 (2.16GHz Processor), supporting Intel® 64 architecture
Intel® 960GM Express Chipset

System Memory 2GB of DDR II RAM

Display/Graphics 12.1″ WXGA Acer CrystalBrite™ TFT LCD, 1280 x 800 pixel resolution, 16.7 million colours, 16:10 viewing ratio, supporting simultaneous multi-window viewing on dual displays via Acer GridVista™
Intel® 960GM Express Chipet with integrated 3D Graphics, featuring Intel® Graphics Media Accelerator (GMA) X3100 with up to 358MB of Intel® Dynamic Video Memory Technology (DVMT) 4.0 (8 MB of dedicated system memory, up to 350 MB of shared system memory), supporting Microsoft® DirectX® 9.0
Dual independent display support
MEPG-2/DVD hardware-assisted capability
S-video/TV-out (NTSC/PAL) support
Acer Arcade™, featuring Acer CinemaVision™ and Acer ClearVision™ technologies

Storage Subsystem 320GB hard disc drive
5-in-1 card reader, supporting Secure Digital (SD), MultiMediaCard (MMC), Memory Stick® (MS), Memory Stick PRO™ (MS PRO), xD-Picture Card™ (xD)

Media Drive DVD-Super Multi Double-Layer drive (DVD+/-RW)

Dimensions & Weight 304 (W) x 223 (D) x 32/42 (H) mm
2.04 kg

Power Subsystem ACPI 3.0 CPU power management standard: supports Standby and Hibernation power-saving modes
44.4 W 4000 mAh 6-cell Li-ion battery pack
– 3.5-hour battery life1
– 2.5-hour charge system-off
– 3.5-hour charge-in-use
3-pin 65 W AC adapter

Keyboard and Pointing Device 84-/85-key keyboard with inverted “T” cursor layout, 2.5 mm (minimum) key travel
Touchpad pointing device
12 function keys, four cursor keys, two Windows® keys, hotkey controls, embedded numeric keypad, international language support
Empowering Key
Media keys (printed on keyboard): play/pause, stop, previous, next
Volume wheel
Easy-launch buttons: WLAN, Bluetooth®, email, Internet, Acer Arcade™

Audio Dolby®-certified surround sound system with two built-in stereo speakers and one subwoofer supporting low-frequency effects
Dolby® Home Theater™ audio enhancement featuring Dolby® Digital, Dolby® Digital Live, Dolby® Pro Logic® II, Dolby® Digital Stereo Creator, Dolby® Headphone and Dolby® Virtual Speaker technologies
High-definition audio support
MS-Sound compatible

Communication Interface Acer Video Conference, featuring integrated Acer Crystal Eye webcam, supporting enhanced Acer PrimaLite™ technology
Modem: 56K ITU V.92 with PTT approval, Wake-on-Ring ready
LAN: Gigabit Ethernet, Wake-on-LAN ready
WLAN: Intel® Wireless WiFi Link 4965AGN (dual-band quad-mode 802.11a/b/g/Draft-N) network connection, supporting Acer SignalUp™ with InviLink™ Nplify™ wireless technology
WPAN: Bluetooth® 2.0+EDR (Enhanced Data Rate)

I/O Interface 3 x USB 2.0 ports
1 x ExpressCard/54 slot
1 x 5-in-1 card reader (SD/MMC/MS/MS PRO/xD)
1 x External display VGA port
1 x S-video/TV-out (NTSC/PAL) port
1 x Headphones/speaker/line-out jack
1 x Microphone-in jack
1 x RJ-45 Ethernet port
1 x RJ-11 modem port
1 x DC-in jack for AC adapter

Software Acer Empowering Technology (Acer eNet, ePower, eAudio, ePresentation, eDataSecurity, eLock, eRecovery, eSettings Management)
Acer Arcade™ featuring Cinema, Video, Music, Acer HomeMedia
Acer Crystal Eye
Acer GridVista™
Acer GameZone
Acer Launch Manager
Acer Video Conference Manager
Adobe® Reader®
CyberLink® Power Producer®
Microsoft® Office 2007 60-Day Trial Preloaded
NTI CD Maker™

Optional Items2 512 MB / 1 GB DDR II soDIMM modules
6-cell Li-ion battery pack
3-pin 65 W AC adapter

Warranty 1-year limited local and International Traveller's (Carry-in) Warranty

Powered by Yahoo! Answers

This entry was posted in Default. Bookmark the permalink.