О. В. Фёдорова е. В. Мезина е. В. Хамис английский язык в сфере информационных технологий и коммуникаций учебное пособие



бет110/128
Дата02.01.2022
өлшемі0.79 Mb.
#454247
түріУчебное пособие
1   ...   106   107   108   109   110   111   112   113   ...   128
ПОСОБИЕ ИИТиК Федорова,Мезина, Хамис 2014

Protection Technology

Bluetooth has the protection technology of the transmitted data which ha\e been built-in m protocol. Depending on carried out tasks, three modes of protection in which are stipulated can there is a device.



Security mode 1 (non secure), the device cannot independently initiate protective procedures.

Security mode 2 (service level enforced security), the device does not initiate protective procedures yet is not established and the connection is not adjusted After the connection is established, the procedures of protection are obligatory, and are defined i determined) by a type and requirements of used services.

Security mode 3 (link level enforced security), the protective procedures are initiated during an establishment and tuning of connection. If the removed device can not fulfill the requirements of protection, the connection is not established.

Of course, that Security mode 3 and 2 can be used together, that is at first protected connection is established, and then it is protected according to the requirements and opportunities of a concrete service

Basis of Bluetooth safety system, used in Security mode 3, is the concept of a session key, or Bond. The session key generates during connection of two devices, and is used for identification and enciphering of the transmitted data. For a key generation most various components, both meanings, beforehand known for both devices, and physical addresses of devices can be used. Combining protection at a level of connection with protection at a level of the applications (where any of existing on today systems of protection of the data can be used absolute) it is possible to create the reliably enough protected connections. But from the point of view of protected connection's construction, obvious weakness of Bluetooth stay an opportunity of interception of the traffic, and for this purpose will not necessary to use specific equipment. However, this problem is not new, and now often it is necessary to use open networks, like the Internet, where the interception of the traffic is possible, care of the closed data.

Digital house

If competent use Bluetooth technologies, it can really turn human life. Already now at exhibitions the printers with Bluetooth are demonstrated which should not be connected to the computer, enough to bring it in a room to switch on in the socket, and it is possible to begin to print. Same correctly and in the return order, enough enter a room with notebook equipped Bluetooth in hands, and at once it is possible to use the printer, enter a local network for an exchange of files and documents, to use the Internet connection. RJ-45 is socket for notebook, which can be met in some planes and airports soon should depart in the past.Some illustrations with an exhibition Comdex Fall: Toshiba.





Достарыңызбен бөлісу:
1   ...   106   107   108   109   110   111   112   113   ...   128




©dereksiz.org 2024
әкімшілігінің қараңыз

    Басты бет