Bluetooth Technology

  Home  Wireless  Bluetooth Technology


“Bluetooth Technology Interview questions and answers section will guide you about the remote hardware device bluetooth that is used with specially mobiles, laptops and many other famous devices. This wireless technology is very rapidly coverings the available hardware and in networking this every one must have a knowledge about the Bluetooth device. Here we will guide you about the details of bluetooth device.”



33 Bluetooth Technology Questions And Answers

21⟩ Are different brands of Bluetooth products compatible?

Yes. They have to. The Bluetooth Logo Certification Program requires Bluetooth products to interoperate with products manufactured by other vendors; those products that don’t interoperate will not be allowed to use the Bluetooth logo.

 176 views

25⟩ What is LMP (Link Management Protocol)?

Multiple data links are combined for the formation of a single traffic engineering link, for the purpose of scale ability. The in-band messaging is not restricted by the management of TE links, but can be utilized by using out-of-band techniques.

The Link Management Protocol runs between a pair of nodes and is utilized for managing TE links. LMP is specifically used for maintaining control channel connectivity, verifying the physical connectivity of the data links, correlating the link property information, suppressing downstream alarms and localizing the link failures for protection/restoration purposes.

 202 views

26⟩ Can you please explain the difference between Bluetooth and Infrared?

Connectivity:

One-to-one connections are made by infrared devices, while Bluetooth devices can form when all the devices have identified themselves to each other.

Versatility:

Bluetooth devices could work together; where as infrared devices need to be specially designed for specific devices.

Range:

Class 3 Bluetooth devices works at about 30 feet; while infrared is rated at 3 feet.

Orientation:

Infrared devices are direct line-of-sight; where as Bluetooth devices could communicate even in times of separation by obstacles. Security: Bluetooth is less secure than infrared due to the omni directional nature; where as infrared signals could only be intercepted by a device.

 206 views

27⟩ Describe LDAP and also define its uses?

Lightweight Directory Access Protocol is one of the directory service protocols. It runs over TCP/IP. LDAP directory services implements a client/server model. Directory data is available on one or more LDAP servers. The server responds with a pointer to another LDAP server.

Uses:

LDAP allows the users to access the information in the directory to change. Online telephone directories and email directories are some of the uses of LDAP. LDAP directory has utilities to modify, delete, and search the entries.

 236 views

29⟩ Define Bluetooth profiles?

Order to describe the way of implementing user models accomplishments, the profiles are developed. A number of user scenarios are described by the user models where Bluetooth performs the radio transmission. Profile stack describes the options in each protocol which are mandatory for each profile, and defines range of parameters for each protocol. The profiles are concerned for decreasing the risk of interoperability issues among various products of different manufacturers.

 206 views

30⟩ Define Bluetooth dongle?

Bluetooth dongle is a technology that enables a PC for point to multi-point friendly connectivity with other similar Bluetooth devices, like PDA, mobile phone. The devices enable the communication between devices within a range of 30 feet apprx.

Certain recent desktops and laptops are built-in with Bluetooth dongle to communicate. Bluetooth enables a single adapter to allow multiple devices for communicating with one system to another.

 180 views

31⟩ Define IP Spoofing?

Sending messages by intruder to a computer system with an IP address that indicates the message is sent from a trusted host, for gaining unauthorized access to computer systems. The hacker/intruder first utilize a variety of techniques for finding an IP address of a trusted host. Later he modifies the packet headers, in order to give an illusion that the packets are sent from the host.

 179 views

32⟩ Define DOS attack?

Denial Of Service attack. It attempts for making computer resources unavailable to its intended users. Its concerted efforts of a person are to prevent a site or service from functioning efficiently, temporarily or indefinitely. The target site categories are banks, credit card payment gateways and root name servers.

 195 views

33⟩ Define Cabir Worm?

Cabir worm is one of the malicious software, usually referred as malware. It utilizes Bluetooth technology for sending itself to another similarly vulnerable device. As it is self-replicative, is it classified as a worm.

Cabir worms are currently affects mobile phone which uses the Symbian Series 60 User Interface Platform and feature Bluetooth wireless technology.

 206 views