Ensuring cyber security and high data transmission speed in wireless networks
DOI:
https://doi.org/10.18372/2225-5036.30.20357Keywords:
protection, efficiency, adaptive modulation, buffering, video stream, wireless data transmission, single-stream video content, wireless networks, Bluetooth, security, performance, optimization, productivity, interrelationAbstract
The paper investigates the problem of ensuring a balance between information security and data transmission performance in wireless communications, in particular in the context of Bluetooth technology. The relevance of the topic is due to the growing demands on the speed and reliability of video stream transmission, which is becoming critically important in the context of the
development of modern information and communication systems. The article analyzes the technical features of Bluetooth, in particular the IEEE 802.15.1 standard, which provides energy-efficient data transmission over short distances. The relevance of the
topic is due to the growing demands on the speed and reliability of video streaming, which is becoming critical in the development of modern information and communication systems. The article analyzes the technical features of Bluetooth, in particular the IEEE
802.15.1 standard, which provides energy-efficient data transmission over short distances. The main characteristics of Bluetooth are
considered, including the star network topology, frequency range, modulation methods and signal power that affect data transmission performance. Particular attention is paid to adaptive modulation and buffering methods that improve transmission quality in conditions of radio frequency interference and obstacles. Data protection mechanisms that can be integrated into wireless networks are also analyzed to prevent security threats such as unauthorized access and data interception. The proposed solutions take into account the features of Bluetooth Low Energy (BLE), which makes them particularly effective for IoT applications. The conclusions of the paper emphasize the importance of an integrated approach to resource management in wireless communications, which allows for stable, secure, and productive operation of information systems, in particular in an ever-changing threat environment.