Skip to main content

Piconet and Scatternet

                                 Piconet and Scatternet

        Transfer a data to various people  its become most important now a days. There are a lots of methods are available to  share to data or transfer to data.But I explain here about the Bluetooth  Piconet and Scatternet.

  1. Piconet:  
        Piconet gets its name fro the world "pico". Pico means a very small.
        A piconet is nothing but small network. Using this network we can share the data or transfer the data .Its one ad-hoc network.Which links a wireless user group of devices,using Bluetooth technology.
        Piconet is formed at least two devices such as portable PC and a cellular phone to connect. Ad maximum 8 to need to make this network.When network is established, one device act as master and other as salve.
    
   

       A piconet sometime called as PAN. Because its range just 10 Meter.

   2. Scatternet:

         Scatter means in various direction.
         Scatternet is type of Bluetooth technology. which consist two or more piconets. This Bluetooth 
   network type allows many devices to share the same network area.
         The sactternert is bridge between the different  piconets.


Comments

Post a Comment

Popular posts from this blog

Deep Web

                                               Deep Web                           The internet is known as a most important searching platform. We are use the Internet for various activities like a searching a information, listening a music,watching a various videos and all other so many activities. For that we can use a various search engine like a google,being,yahoo etc.Now-a-days google and like a other search engine makes a part of our day-to-day life.                        If you want a search a any information then most we uses a platforms like a Google,yahoo etc. This search engines is our first choice its hit in mind suddenly. This is also called "Surface web" .  But another is most important option for all this is the which give...

Dumpster Diving

                                     Dumpster Diving        Attacker does not launch their attack without any information. This information gets from targets trash.        If attacker gets the information from the targets trash is called Dumpster Diving.Its belongs to the Social Engineering.      In the dumpster diving the attacker search the small data in trash and it get very sticky information like a pin number,username,password etc,.       In computer security dumpster diving is like a dumping. That means the rubbish unwanted waste,unwanted materials etc,.           How to avoid Dumpster Diving? Avoid throwing sensitive information in the trash. Company should have some polices about to destroy trash. Company should contain trash container.