EasyManuals Logo

Zebra CC600 Product Reference Guide

Zebra CC600
134 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #95 background imageLoading...
Page #95 background image
Wireless
93
When AFH is enabled, the Bluetooth radio “hops around” (instead of through) the 802.11b high-rate
channels. AFH coexistence allows enterprise devices to operate in any infrastructure.
The Bluetooth radio in this device operates as a Class 2 device power class. The maximum output power
is 2.5 mW and the expected range is 10 m (32.8 ft). A definition of ranges based on power class is difficult
to obtain due to power and device differences, and whether in open space or closed office space.
NOTE: It is not recommended to perform Bluetooth wireless technology inquiry when high rate 802.11b op-
eration is required.
Security
The current Bluetooth specification defines security at the link level. Application-level security is not
specified. This allows application developers to define security mechanisms tailored to their specific need.
Link-level security occurs between devices, not users, while application-level security can be implemented
on a per-user basis. The Bluetooth specification defines security algorithms and procedures required to
authenticate devices, and if needed, encrypt the data flowing on the link between the devices. Device
authentication is a mandatory feature of Bluetooth while link encryption is optional.
Pairing of Bluetooth devices is accomplished by creating an initialization key used to authenticate the
devices and create a link key for them. Entering a common personal identification number (PIN) in the
devices being paired generates the initialization key. The PIN is never sent over the air. By default, the
Bluetooth stack responds with no key when a key is requested (it is up to user to respond to the key
request event). Authentication of Bluetooth devices is based-upon a challenge-response transaction.
Bluetooth allows for a PIN or passkey used to create other 128-bit keys used for security and encryption.
The encryption key is derived from the link key used to authenticate the pairing devices. Also worthy of
note is the limited range and fast frequency hopping of the Bluetooth radios that makes long-distance
eavesdropping difficult.
Recommendations are:
Perform pairing in a secure environment
Keep PIN codes private and do not store the PIN codes in the device
Implement application-level security.
Bluetooth Profiles
The device supports the Bluetooth services listed.
Table 12 Bluetooth Profiles
Profile Description
Service Discovery Protocol
(SDP)
Handles the search for known and specific services as well as
general services.
Serial Port Profile (SPP) Allows use of RFCOMM protocol to emulate serial cable connection
between two Bluetooth peer devices. For example, connecting the
device to a printer.
Object Push Profile (OPP) Allows the device to push and pull objects to and from a push
server.
Advanced Audio Distribution
Profile (A2DP)
Allows the device to stream stereo-quality audio to a wireless
headset or wireless stereo speakers.

Table of Contents

Other manuals for Zebra CC600

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Zebra CC600 and is the answer not in the manual?

Zebra CC600 Specifications

General IconGeneral
BrandZebra
ModelCC600
CategoryTouchscreen
LanguageEnglish

Related product manuals