google.com, pub-9642538525640344, DIRECT, f08c47fec0942fa0 Bluetooth Chatting App for Communicaton System - Bluetooth app

Advertisement

Main Ad Main Ad

Bluetooth Chatting App for Communicaton System - Bluetooth app

Software Interfaces Bluetooth App

First both users get the app from play store and installed in android phone, tab, and pc. After installation, both users first register on the app and then verified his valid email and password. After this user makes a profile on this app to use for communication purpose to each other. The sender sends a message to the receiver for communication. The receiver receives a private key message from sender then he verified his own private key is authenticated. In this app, we use the Bluetooth version is 4.2. We used radio waves frequency as a resource. 

The Bluetooth ISM band is 2.400 to 2.485. We use tools for app JAVA (for use programming) and SQLite (for use data store) database. We use libraries is BLE (Bluetooth Low Energy). Using this app user no need network and internet-only required an app for communication purpose audio, video calling, files sharing and chatting. Using this app system can be connected to multiple devices on this application.

Communications Interfaces of Bluetooth


























After installation app on android phone creating an account and make a valid profile with full name and date of birth then sign in with email ID and password. Using this app for communication purpose no need any cost. Using for communication third party can be attacked for sniffing information of the user. We use the RSA algorithm (Rivest Shamir and Adelman) to save data for the third party. RSA means works for public and private cryptographic. It provides data security. We need for internet if we get data from one place to another. The public key such as a key that we to tell all of us. And private keys are the things we cannot tell anyone. But in this case, we tell all everyone.


communication interface of bluetooth

System Features

The first time Bluetooth introduce 2.0 versions in Ericson mobile phone with the very slow transfer data rate. After this Bluetooth has updated his version with the passage of time, Now the Bluetooth version is 5.0 which is the most high-frequency speed to transfer data source to a destination within a seconds. The first Bluetooth version in the Ericson phone has low range indoor range 10m and after the current range is 800ft to connect the device and transfer data. When Bluetooth introduce first-time transfer data is 1Mbps and the current version is 5.0 with transfer data is 2Mbps within any disturb and wired. Message component that’s provided with a short message one device to another and give a notification for alert people what to do?

system feature of bluetooth

Performance Requirements

In 19 century Bluetooth data transfer less 1 M bit/s. Now he became currently transfer speed is 1 M bit/s. which is increasingly fast data transmit and decrease the time-consuming. It makes more interest for the users due to high speed to transfer data source to destination. In the last version, the range is very restricted but now he became 4 times large. In this way using Bluetooth users a send data with 2 time’s high speed and time response became low.  In last Bluetooth can connect with a single device which is difficult for the users to communicate more than one people. Now it became Bluetooth connect more than one device at the same time. In the last version, Bluetooth can be hack by the third-party interfere easily but now he can’t access easily hack because we use the RSA algorithm.


performance requirement of bluetooth


Safety Requirements

We use radio waves frequency which is harmful to human life. It can damage the heart and human pulse so avoid the long time call on that app. Using radio waves frequency became harmful because it creates cancer disease. In any case, if we call, do not leave the call active. It can cause many diseases. In this app, we don’t require any cable for data sharing so that it is not harmful to sending data. It is authenticated because we use a private key to pair devices with each other. Third-party cannot interfere due to using a specific key for the receiver.

Plain text

This text is of two, one calls rich and second of plain text. The text can also be used by the plain text. We use bold, italic, font size and formatting style of the text that we write. This text is called bold text. These are called italic text. This text also has a simple text. To see this, we use the ASCII code. First of all, we are encryption our text and then the decryption. And finally, we get to the text in the form of plain text. This way is another way that we can convert again the plain text into the plain text.

Cypher text

A cypher data is used to encryption to cypher data. Also, we use a cipher to hide our data. To use encryption, we read to tell our system about a cleartext. Just as the system read the Plain Text. He encrypts it. It can also be implicated to change an alphabet with someone else. As such, we will give it a name as alphabet we have to change.

Keys

Cryptographic is an algorithm that changes the plain text into the ciphertext. For this method, we use the private key. We all have a private and another public key. The private key is only with us. And everyone who has public keys is with everyone. When we get data from someone, we are sour from our private key. When data goes to another, he looks at this data by logging in to his private key.

Encryption cypher

A cypher is used to hide any text, symbol. It does the text encryption. As soon as the system has a plain text, He transforms it into a cypher. Encryption cyphers text so that the user can understand it from easily.

Decryption cypher

Plain Text is of two types. The first type of text is called the encryption text. And the second type of text is called decryption text. This is also the work of the same cypher and after bringing the text into a plain text. It's a method of conversion. After being a text editor it is encryption.

Software Quality Attributes

Adaptability

This application is better than WhatsApp. Because the user will have to pay no charge to call or text message on it. WhatsApp needs some money to talk on the app. But the Bluetooth will not have any charge by the user.

Availability

It is easily install on android phone, pc, tablet and any other devices. We use RSA algorithm in our app so that third party cannot interfere with that device. It installs once a time in android than he cannot require any updating or another tool.

Portability

It is not required any port, cable and pin to connect pc, android, and tablet for communication purpose. It is installed any device like an android phone then we cannot require any cost network internet for communication.

Reusability

When user forgot his password then simply delete app and again download the app from play store and reinstall it and sign in with a valid email and password or make a new profile for reusability. When a user installs this app and verified during profile and giving valid information. If already register then get a notification from the database. If he is not registering than he completes valid user name, password, and date of birth etc.

Usability

It is easy to use for any person (businessman, employees, non-technical person) because not required any mechanism or tough profile.

Business Rules

User

The user simply interacts with this app. It is installed easily from google play store to system mobile etc.

Sender

First of all sender to check the receiver is online or offline. If the receiver is online than the sender is sending the message to the receiver. The sender is the send a message for communication to the other person and shares the information of work.

Communication medium

First of all sender send the original message to receiver for connectivity and then message send encrypt than the encryption send to cypher is convert into the unreadable form of a message. After the unreadable message to obtain then receive the other the person in decryption form to use the private key to convert into the readable form of the original message.

Receiver

The receiver is receive the message from the sender and install (app) store into a database for permanently document to use any time of reading the data. After the received message from the sender then response the sender as feedback.










Post a Comment

0 Comments