Integration of BLUETOOTH with SECURITY SYSTEM

Posted on July 30th, 2010 by Ron Gibson


Share |

Computer is the backbone of Security System as because it can store, manage and Simplify the toughest job. In the setup of a Computer, several peripherals are used such as Printer, Scanners, Keyboard, Mouse, Speaker and other input & output devices.  Wired Communication is very common from several years till today. It requires a long intercepting cable stretched all over the way from port to port. It is a bit messy and not preferred everywhere in a Hi-Fi setup. Now a days it becomes a trend to use wireless mouse, keyboard and other peripherals. With the help of a dongle attached on a USB port of CPU we are operating several devices at a time.

This is a new generation of advancement is Bluetooth Technology which helps us in simplifying our work like anything. Bluetooth technology is a wireless protocol that connects electronic devices while they are close to each another. Instead of creating a local-area network (LAN) or a wide-area network (WAN), Bluetooth creates a personal-area network (PAN). Bluetooth technology is also compatible with personal computers, laptops, printers, GPS receivers, digital cameras, telephones, video game consoles and more for various practical functions. Bluetooth uses a radio technology called frequency-hopping spread spectrum, which chops up the data being sent and transmits chunks of it on up to 79 bands of 1 MHz width in the range 2402-2480 MHz. Bluetooth is a packet-based protocol with a master-slave structure. One master may communicate with up to 7 slaves in a piconet; all devices share the master’s clock.

Bluetooth is essentially a networking standard that works at two levels:

  • It provides agreement at the physical level — Bluetooth is a radio-frequency standard.
  • It provides agreement at the protocol level, where products have to agree on when bits are sent, how many will be sent at a time, and how the parties in a conversation can be sure that the message received is the same as the message sent.

Access Control Systems

Bluetooth is helpful because, Bluetooth can be used to wirelessly synchronize and transfer data among devices. Bluetooth can be thought of as a cable replacement technology. Typical uses include automatically synchronizing contact and calendar information among desktop, notebook and palmtop computers without connecting cables. Bluetooth can also be used to access a network or the Internet with a notebook computer by connecting wirelessly to a cellular phone. Bluetooth doesn’t require line of sight between communicating devices. The walls in your house won’t stop a Bluetooth signal, making the standard useful for controlling several devices in different rooms.

Types of Bluetooth Devices

Bluetooth Dongle

Bluetooth Dongle helps you to connect all other peripherals in the setup of your Security System. It consists of USB port and can be attached to any Computer. It will receive all the data from installed Security System devices in the Periphery.

Bluetooth Headset

Bluetooth headsets are mainly used with compatible cell phones, place the headset on your ear and surf through all the CCTV Monitors. You could also connect to a dongle on a personal computer and use it for voice conferencing.

Bluetooth KVM:

KVM is known as Keyboard Video Mouse, it is a hardware device that allows a user to control multiple computers from a single keyboard, video monitor and mouse. We can connect a monitor, keyboard, and mouse to the console port on the KVM device and the computers to the other ports. A KVM switch is useful where there are multiple computers, but no need for a dedicated keyboard, monitor and mouse for each one. They are extremely helpful in Server management.

Bluetooth Speaker:

Speaker is an Output Device which can be used to get the output in the form of audio alarm. In the case of intrusion we can set a warning tone or alarm which gets activated as a symbol that someone is doing something unauthorized activity. If it is Bluetooth enabled then it will be more comfortable for an administrator to install it on a better location wherever he/she wants.

Bluetooth Transreceiver:

It a two way communication device used for communication from both the ends. It has inbuilt Transmitter as well as Receiver. An administrator sitting in a server room can deploy orders to others security personals in the perimeter area.

Bluetooth GPS:

Basically Bluetooth GPS is an antenna designed to receive GPS signals from GPS satellites. A bluetooth GPS will wirelessly transmit GPS data to a bluetooth enabled device such as a PDA, Smartphone, laptop, UMPC etc. Together with the right Navigation Software, you can turn these devices into a turn by turn GPS Navigation Unit.

Bluetooth Printer:

Printer is a hardware which is used to generate a hard copy of certain data usually on physical print media such as paper. It can be used to generate Receipt, Gate pass or Badge in case of Visitor Monitoring System or any other form of Security.

Bluetooth keyboard & Mouse:

Keyboard in an Input device which uses an arrangement of buttons, acting as a mechanical lever which is used to print a character which is printed on the individual keys. In normal use in security System it is used to input textual information and numeric data.

Mouse is also an input device and also known as pointing device. It has the capability to detect the motion in two dimensions. It has two buttons and can be operated by clicking. The mouse’s motion typically translates into the motion of a cursor on a display, which allows for fine control of a graphical user interface.



114 Responses to “Integration of BLUETOOTH with SECURITY SYSTEM”

  1. Band Saws For Sale Says:

    WordPress really might be something.

  2. Ron Gibson Says:

    Exactly, I am agree with you..

  3. Aiko Raeside Says:

    I thik that not everybody thing something about storage heaters (in polish piece akumulacyjne). Please read somethin about it. That is realy cheap electric heater.
    You can heat big house and your bild for electric will be low.

    Regards.
    Eugene Ukena

  4. shearinna Says:

    t’s such a great site. cool, very stimulating!!!

    ——-

    Opony
    Pozycjonowanie

  5. st inv Says:

    You can definitely see your enthusiasm within the work you write….

    The world hopes for much more passionate writers like you who aren?ˉt scared to say how they believe. Always go best after your heart….

  6. droid x phone case Says:

    I just subscribed to your RSS feed, not sure if I did it precisely though? Solid article by the way.

  7. Flossie Roseman Says:

    Please visit my site:
    samochody maіolitraїowe
    Regards.

  8. Moist Heating pad Says:

    Do you mind if I use your site as a source in my paper? Thx! Jessi

  9. Ron Gibson Says:

    Hi Jessi. Yes, you can use the content of article where ever you want.

  10. Iwatchsystems Says:

    Iwatchsystems…

    […] something about iwatchsystems[…]…

  11. Versace Says:

    Hey, I determined your blog while searching on Google your place looks real interesting, I’ll bookmark your site. Keep up the good work!…

  12. Tools Says:

    Very nice!…

    I couldnt have said it any better to be honest! keep up the awesome work. You are very talented & I only wish I could write as good as you do :)

  13. www Says:

    I love this blog. Its great. Keep it up man….

  14. Unlock Mobile phones Says:

    Buddy Torreson…

    It¡¦s actually a cool and useful piece of information. I¡¦m satisfied that you just shared this useful information with us. Please keep us informed like this. Thanks for sharing….

Leave a Reply