BLUETOOTH is a low-power, open standard for implementing

Size: px
Start display at page:

Download "BLUETOOTH is a low-power, open standard for implementing"

Transcription

1 Proceedings of the 39th Hawaii International Conference on System Sciences - 26 Bluetooth Discovery with Multiple Inquirers Brian S. Peterson, Rusty O. Baldwin, and Richard A. Raines Department of Electrical and Computer Engineering, Air Force Institute of Technology, USA Brian.Peterson@wpafb.af.mil, Rusty.Baldwin@afit.edu, Richard Raines@afit.edu Abstract Although the discovery time between a pair of Bluetooth devices has been well characterized, the impact of multiple inquiring devices on the discovery time has not. Discovery time must be considered when forming or maintaining Bluetooth networks with multiple inquiring devices. The presence of a second inquiring device can significantly delay, and even preclude, the discovery of a scanning device by an inquiring node. When a scan window opens, each inquiring device does not have an equal likelihood of discovering the scanning node since one inquirer may consistently transmit on the scan frequency before the other. The discovery time probability density function with multiple inquiring devices is presented. I. INTRODUCTION BLUETOOTH is a low-power, open standard for implementing PANs [][2]. It is a popular protocol with 4 million Bluetooth-enabled phones shipped worldwide and over, new Bluetooth products being developed by more than 2, companies [3]. It uses a slow hop frequency hopping spread spectrum scheme with 79 -MHz frequency slots (23 in some countries) in the 2.4 GHz band. Members of a Bluetooth piconet hop together among the 79 frequencies (numbered -78) with a sequence that is a function of the master s free-running counter (CLK) and the first 28 bits of the master s 48 bit address. A Bluetooth device must be discovered and incorporated into a Bluetooth network, or piconet, to follow the piconet s hop sequence. The master of a Bluetooth piconet coordinates time-division duplex transmissions of up to seven active slaves by alternating between master and slave transmissions in 625 μs time slots. The discovery process requires the piconet master to be in the inquiry substate when a potential slave device is in the inquiry scan substate. Although a piconet is limited to eight active devices, piconets can be connected into scatternets by nodes that are members of multiple piconets [4]. The discovery time between an inquiring and scanning device has been fully characterized [5]. Furthermore, the expected inquiry time for multiple devices alternating between inquiring and scanning has been characterized with some simplifying assumptions [6]. However, neither characterization considers the impact of the dependencies of multiple inquiring devices hop patterns on the inquiry time. Due to the limited hop patterns, a second inquiring device can prevent an inquiring device from discovering a scanning node. In Section II, the Bluetooth discovery process is presented. The interaction of inquiry hop sequence is discussed in Section III and the discovery time probability density functions (pdfs) with multiple inquiring devices are presented in Section IV. II. BACKGROUND A Bluetooth node enters the inquiry substate for a period of time to discover other nodes to form a piconet; the inquiring node acts as the master. Bluetooth devices typically use the specification recommended.24 s as the inquiry period [2][6][7]. A node in the inquiry scan substate, in contrast, searches for nodes in the inquiry substate to form a piconet; the scanning node acts as a slave. A. Inquiry Substate A device in the inquiry substate transmits inquiry packets on two pseudo-random frequencies during a normal packet time slot. Inquiry packets consist of a 68 bit General Inquiry Access Code (GIAC) or Dedicated Inquiry Access Code (DIAC). The GIAC is used when searching for any Bluetooth device. A node may use one of several DIACs to search for devices with specific characteristics [][2]. The inquiring device waits for a response 625 μs later on the same frequencies from a prospective slave device in the inquiry scan substate. The inquiring device continues this process while collecting responses until the inquiry period is complete or an acceptable number of devices have been discovered. The device may leave the inquiry substate to service synchronous (SCO) links or to immediately page a discovered device. The page process uses the response from a discovered device to contact prospective slaves and incorporate them into the piconet. An inquiring device may also wait until the inquiry period is complete to page devices that are accepted into the piconet. Although some have recommended that a device enter the inquiry substate on a regular basis [2][6][8], others only inquire when explicitly commanded [9]. The inquiry substate uses a 32-frequency partition of the 79 frequencies similar to that used by a piconet in the connection state [2]. Unlike in the connection state, however, this partition remains constant. A node uses an address associated with the GIAC (i.e., 9E8B33 6 ) or one of the DIACs to generate the frequency hopping sequence. This address determines the 32- frequency subset used by the inquiry/inquiry scan substates. Although generated using the resident CLK and the GIAC (or DIAC) address, the hop sequence within the partition appears random to an outside observer. The 32 frequencies used by the GIAC hop sequence are spread across the Bluetooth spectrum by a spreading process in the final stage of the /6/$2. (C) 26 IEEE

2 Proceedings of the 39th Hawaii International Conference on System Sciences - 26 Frequency Hop Selection Kernel [2]. Placement within the spectrum is irrelevant for analysis and this spreading stage is ignored. Thus, the frequencies used by the inquiry substate for the GIAC address are designated as -5 and 53-78, rather than the Bluetooth frequency spectrum designations used after the spreading process which doubles the frequency number modulo 79 (i.e.,,2,4,6,8,,27,29,3,...77) [2]. This set of 32 frequencies is further segmented by the inquiry procedure into two 6-frequency trains, A and B. A device in the inquiry substate chooses the A or B train for initial transmission and switches between the trains every 2.56 s. The train used initially is not significant [2] and the initial train selection process is implementation specific. The frequencies within these trains change over time as shown in Figure where the A train are the frequencies in the white boxes and the B train are the frequencies in the shaded boxes. The 6 frequencies in a train at a given instant are called the train s membership []. A frequency entering the A train is shown as a thick bordered box and a frequency switching to the B train is shaded with a left-hash. The trains exchange one member every.28 s based on bit changes in the free-running counter, completely swapping membership every 2.48 s. As membership changes, the swapped frequencies retain their position in the transmitted train. Thus each train consists of only 32 possible sequences. t s t +.28 s t s t s t +5.2 s t s t s t s t +.24 s t +.52 s t +2.8 s t +4.8 s t s t s t s t +9.2 s t s t s First Frequency Lower Range Re-ordered Frequencies A-train B-train Fig.. Shifting of the inquiry trains [] Second Frequency Upper Range A-train addition for that cycle B-train addition for that cycle B. Inquiry scan/inquiry response substates A device enters the inquiry scan substate to make itself available to discovery by an inquiring device. To account for the hop sequence randomness, the scanning device only changes frequency every.28 s. Since the scan frequency changes every.28 s, and the train changes every 2.56 s, most implementations only scan for.25 ms [2][] and then move to the connection (i.e., normal operation) or a standby state for the remainder of the.28 s. Using a scan of length.25 ms rather than ms compensates for any timing misalignment and allows the scanning device to receive at least one full inquiry train sequence. When an inquiry packet is received during a standard inquiry scan, the scanning device waits 625 μs and enters the inquiry response substate to return a FHS packet to the master [2]. The FHS packet contains the slave device address and CLK values. The inquiring device either continues transmitting packets for the duration of the inquiry substate dwell time to find other neighboring devices or jumps to the page substate to immediately page the scanning device before continuing to inquire. After transmitting the FHS packet, the scanning device advances the scan frequency by adding an additional.28 s offset to the CLK, waits a back-off time uniformly distributed on [, ms], and re-enters the inquiry scan substate. Before doing so, it is allowed to enter the page scan substate in case the inquiring device immediately pages it. In v. of the specification, a FHS packet is not sent until after the device waits for the back-off period to elapse and receives a second inquiry packet. This was shown to cause unnecessary delay with little reduction in FHS packet collisions [5][2]. Additionally, an interlaced scan was added in v.2 of the specification in which the scan window is immediately followed by a scan using a frequency from the other train. In the standard inquiry scan substate, a new scan frequency is used every.28 s based on the scanning device s CLK. Inquiry scan frequencies change over time resulting in the scan frequency staying within the same inquiry train as shown in Figure 2 []. For example, at t =, the scan frequency is 6 and in the A train. At t =.52 s, frequency 6 is in the B train. However, the scan frequency has shifted to 7, which is in the A train, even though it was in the B train at t =. Since the scan frequency changes every.28 s, a device typically opens a window every.28 s when in the inquiry scan substate. The scan frequency used at the beginning of a scan window is assumed to be the frequency used for the entire scan window. This prevents loss of scan capability due to oscillator re-tuning during the window. s.28 s 2.56 s 3.84 s 5.2 s 6.4 s 7.68 s 8.96 s.24 s.52 s 2.8 s 4.8 s 5.36 s 6.64 s 7.92 s 9.2 s 2.48 s Re-ordered Frequencies A-train Random Inquiry Scan frequency B-train Fig. 2. Inquiry scan frequency remaining in a train [] C. Discovery Using the standard inquiry scan, the inquiry time distribution is shown in Figure 3 for an isolated inquiring/scanning pair. When a device begins inquiring, the time until the scanning device opens a scan window is uniformly distributed 2

3 Proceedings of the 39th Hawaii International Conference on System Sciences - 26 on [,.28 s]. Since a scan window may already be open when the inquiry begins, the inquiry packet is received uniformly distributed on [,.28 s] if the scan frequency is in the train used (probability.5). If not, the train changes at 2.56 s and the inquiry packet is received uniformly on [2.56 s, 3.84 s]. Exceptions occur with.275 probability, when the membership of the train changes during the scan window [5]..4 Inq2 inquiry hop sequence Inq inquiry hop sequence Scan Window Frequency = 64 Inq inquiry hop sequence b) Fig. 4. Inq2 receives inquiry packet.3 f TI (t).2. 6 (s) in the following analytical model of one of many conditional pdfs which comprise the inquiry time pdf. Consider the event, M, that Inq begins inquiring with a train containing the scan frequency of an arbitrary scanning device. The scanning frequency is equally likely to be in either train giving Fig. 3. f TI (t) Unconditional probability density for the standard inquiry scan, P (M) =.5. () III. HOP SEQUENCE INTERACTION When multiple devices inquire, discovery time may increase. When two nodes, Inq and Inq2, enter the inquiry substate simultaneously and use the train containing the scan frequency, discovery by one of the nodes will be delayed since a scanning node can only respond to one inquirer and then enters the back-off period (and possibly the page scan substate) before scanning again. If Inq uses the train not containing the scan frequency, the scanning node will receive its inquiry packet uniformly on [2.56 s, 3.84 s] unless the scanning frequency changes trains when the scan frequency offset advances by an additional.28 s after each FHS packet is transmitted. In this case, Inq s packet is received immediately after the back-off period is complete after the transmission of an FHS packet to Inq2. The limited number of inquiry train sequences further complicates determining the discovery time. If Inq and Inq2 both use train that contain the scan frequency, the scanning device may consistently receive packets from and respond to Inq2 each time a scan window opens until Inq2 uses a train not containing the scan frequency or the scan window begins just before Inq transmits its inquiry packet on the scan frequency. For example, when Inq2 transmits on the scan frequency slightly before Inq, there is a small interval where the scan window can open and receive Inq s packet as shown in Figure 4a. On the other hand, when the nodes use the scan frequency 9 time-slots apart as shown in Figure 4b, each node has an equal probability of being the first to use the scan frequency within a scan window. Although the relationship between the hop sequences is well defined, an analytical model depicting the inquiry time with n inquirers is not feasible due to the numerous relationships between membership changes and train changes and the multiple back-off periods that must be included when discovery is delayed due to other inquiring devices. This is illustrated The scanning device opens a scan window at a time uniformly distributed on [,.28 s]. The pdf of the time the scan window initially open is designated f T (t). IfInq2 inquires with a train not containing the scan frequency when the scan window opens (which occurs with probability.5), the scanning device is discovered at a time uniformly distributed on [,.28 s] as shown in Figure 5a. If Inq2 is inquiring with a train containing the scan frequency when the scan window opens, Inq2 may discover the device first. Unconditionally, (i.e., with no knowledge of when Inq and Inq2 transmit the scan frequency) the probability that Inq discovers the scanning node first when both nodes trains contain the scan frequency is.5. If Inq2 discovers the node first, the next opportunity for Inq to discover the scanning node occurs when it opens a scan window after the back-off period elapses. Since the back-off period, with pdf f TBO (t), is uniform on [,.64 s], the time the scan window will re-open is the convolution f TBO (t) f T (t) as shown in Figure 5b. During a back-off period, several events can occur that affect the probability Inq discovers the node when the scan window re-opens: Inq due to the scan frequency offset (with probability.625), Inq2 due to the scan frequency offset (with probability.625), Inq due to the CLK change (with probability.6), Inq2 due to the CLK change (with probability.6), the membership of Inq can change so the scan frequency is no longer in Inq s train (with probability.6), the membership of Inq2 can change so the scan frequency is no longer in Inq2 s train (with probability.6), and Inq2 can switch the train used (with probability.25). 3

4 Proceedings of the 39th Hawaii International Conference on System Sciences - 26 b) c) f T (t M) f T (t M)* f TBO (t) f TD (t M) Fig. 5. Discovery time distribution when inquiry packet is received during the first scan window b) when inquiry packet is received during the second scan window after being discovered first by another inquirer c) in the presence of another inquirer when M occurs Since these events are not mutually exclusive, the conditional distribution including each combination is complex. If the scan frequency is no longer in the train used by Inq, Inq cannot discover the device until after it changes trains at t =2.56 s (unless Inq2 continues to discover the device, advancing the device s scan frequency offset until it is back in the train used by Inq). If Inq2 discovers the device when the scan window reopens, the scanning device again waits for a back-off period before opening a scan window once again. Assuming none of the events listed above occur during any of the back-off periods and that each inquiring node has an equal likelihood discovering the scanning node when a scan window opens, the discovery time pdf for Inq before the train change at t =2.56 sis f TD (t M {T D < 2.56 s}) = 3f T (t) + f T (t) f TBO (t) + (2) 4 8 f T (t) f TBO (t) f TBO (t) +... (3) 6 and is shown in Figure 5c. Under these circumstances, the probability that Inq discovers the node before the train change at t = 2.56 s is.99. However, due to the relationships of the scan frequencies within each train, it is unlikely that each inquiring node has an equal likelihood of discovering the scanning node when a scan window opens. When Inq does not initially contain the scan frequency (i.e., P (M)), the conditional distributions are more complex since Inq2 may initially contain the scan frequency and cause the scanning node to go through back-off periods and advance the scan frequency offset and possibly into the train initially used by Inq. Considering this and the possibility of the events listed above which may occur during each back-off period, analytically deriving the discovery time distribution is deemed impractical. IV. RESULTS Since an analytical model is not feasible, a simulation model must be used to model the inquiry time with multiple inquirers, rather than be used solely to verify a derived model. A Matlab simulation was developed which simulated a single scanning node over a perfect channel in the presence of multiple inquiring devices. Although not an exact model, this provides an estimate of the discover time pdf which provides developers an estimate of the delay that multiple inquirers can cause. It also provides an estimate of the devices that may not be discovered by a specific inquirer due to the presence of other inquirers. Discovery time is defined as the time needed for an inquiring device (Inq) to receive an FHS packet from the scanning node. Since Inq may never discover the scanning node if another inquiring device consistently transmits on the scan frequency immediately before Inq and changes trains simultaneously with Inq, the simulation ends at 5 s. It is unlikely that Bluetooth devices will transmit longer than.24 s due the the interference generated and power considerations [5]. The simulation was run using 25 randomly generated scanning devices with random CLK values and up to five inquiring devices. A scanning device and inquiring device were randomly generated for each set of simulation runs and a baseline inquiry time was determined. The CLK/address settings for each preceding simulation were repeated in each subsequent run as additional inquirers were added in subsequent simulation runs. Thus, the inquiry times in the 5 simulation runs were comparable for each scanning device. When Inq was the first device to discover the scanning node, the discovery time was the same as when no other inquirers were present. When another inquirer discovered the scanning node first, the Inq was generally delayed as shown in Figure 6, although it was occasionally accelerated when M occurred but the scan frequency offset change caused the scan frequency to shift into the train before the change at t =2.56 s. The percentage of devices that are not discovered within 5 s rises quickly as additional devices inquire as shown in Table I. V. CONCLUSIONS Although the single inquiring device inquiry time has been well characterized, the effect of multiple inquirers is difficult 4

5 Proceedings of the 39th Hawaii International Conference on System Sciences - 26 b) Simulation pmf Simulation pmf Inquiry time (s) No other inquirers One other inquirer No other inquirers Rises to.6 Four other inquirers Inquiry time (s) Fig. 6. Inquiry time pmf with one other inquiring node b) four other inquiring nodes [9] B. Peterson, R. Baldwin, and R. Raines, Packet Error Rate Distribution Between Random Bluetooth Piconet Pairs, accepted to Wireless Personal Communications. [] B. Peterson, R. Baldwin, and R. Raines, Inquiry Packet Interference in Bluetooth Scatternets, in ACM Mobile Computing and Communications Review, pp Volume 8, Issue 2, April 24. [] O. Kasten and M. Langheinrich, First Experiences with Bluetooth in the Smart-It s Distributed Sensor Network, in Proceedings of the International Conference on Parallel Architectures and Compilation Techniques, 2, Sept. 2. [2] G. Zaruba, Accerlated Neighbor Discovery in Bluetooth Based Personal Area Networks, in Proceedings of the 22 International Conference on Parallel and Distributed Processing TEchniques and Applications (PDPTA 2), Las Vegas, NV, USA, Jun, 22. TABLE I INQUIRY TIME WITH MULTIPLE INQUIRERS Inquiring Devices Mean Inquiry % not found after 5 s to model and has not been considered. Due to the relationship between inquiry hop sequences, the impact extends beyond the independent probability that one device delays discovery by another simply because it discovers a scanning node first. The presence of a second inquirer may in fact prevent a inquiring device from discovering a scanning node until the second node leaves the inquiry substate. As the number of inquiring devices increases, the probability that a specific inquirer will not be able to discover a scanning device rises significantly. This relationship must be considered for scatternet formation as well as scatternet maintenance analysis. REFERENCES [] Specif ication of the Bluetooth System, Core Version., Bluetooth SIG, 999. [Online]. Available: [2] Specif ication of the Bluetooth System, Core Version.2, Bluetooth SIG, Nov 23. [Online]. Available: [3] L. Godell, M. Nordan, T. Lapolla, M. Mendez WLAN And Bluetooth Update: Beyond The Hype, [Online]. Available: [4] D. Jayanna, and G.V. Zaruba, A Dynamic and Distributed Scatternet Formation Protocol for Real-life Bluetooth Scatternets, in Proceedings of the 38th Hawaii International Conference on System Sciences, Hawaii, USA, Jan, 25. [5] B. Peterson, R. Baldwin, and J. Kharoufeh, Bluetooth Inquiry Characterization and Selection, accepted to IEEE Transactions on Mobile Computing. [6] G. Zaruba and V. Gupta, Simplified Bluetooth Device Discovery Analysis and Simulation, in Proceedings of the 37th Hawaii International Conference on System Sciences, Hawaii, USA, Jan, 24. [7] R. Woodings, D.Joos, T. Clifton, and C. Knutson, Rapid Heterogeneous Ad Hoc Connection Establishment: Accelerating Bluetooth Inquiry Using IrDA, Proceedings of the Third Annual IEEE Wireless Communications and Networking Conference (WCNC 2), Orlando, Florida, Mar 22. [8] T. Salonidis, P. Bhagwat, L. Tassiulas, and R. LaMaire, Distributed Topology Construction of Bluetooth Personal Area Networks, in Proceedings of IEEE INFOCOM 2, Anchorage, Alaska, Apr 2. 5

Performance of Symmetric Neighbor Discovery in Bluetooth Ad Hoc Networks

Performance of Symmetric Neighbor Discovery in Bluetooth Ad Hoc Networks Performance of Symmetric Neighbor Discovery in Bluetooth Ad Hoc Networks Diego Bohman, Matthias Frank, Peter Martini, Christoph Scholz Institute of Computer Science IV, University of Bonn, Römerstraße

More information

Analysis of the Bluetooth device discovery protocol

Analysis of the Bluetooth device discovery protocol DOI 10.1007/s11276-008-0142-1 Analysis of the Bluetooth device discovery protocol Goutam Chakraborty Æ Kshirasagar Naik Æ Debasish Chakraborty Æ Norio Shiratori Æ David Wei Ó Springer Science+Business

More information

AIR FORCE INSTITUTE OF TECHNOLOGY

AIR FORCE INSTITUTE OF TECHNOLOGY DEVICE DISCOVERY IN FREQUENCY HOPPING WIRELESS AD HOC NETWORKS DISSERTATION Brian S. Peterson, Major, USAF AFIT/DS/ENG/04-06 DEPARTMENT OF THE AIR FORCE AIR UNIVERSITY AIR FORCE INSTITUTE OF TECHNOLOGY

More information

A Formal Analysis of Bluetooth Device Discovery

A Formal Analysis of Bluetooth Device Discovery A Formal Analysis of Bluetooth Device Discovery Marie Duflot, Marta Kwiatkowska, Gethin Norman and David Parker School of Computer Science, University of Birmingham, Birmingham, B15 2TT, UK Abstract. This

More information

- Cognitive Radio (CR) technology is a promising emerging technology that enables a more efficient usage of

- Cognitive Radio (CR) technology is a promising emerging technology that enables a more efficient usage of An Asynchronous Neighbor Discovery Algorithm for Cognitive Radio Networks Short Paper Chanaka J. Liyana Arachchige, S. Venkatesan and Neeraj Mittal Erik Jonsson School of Engineering and Computer Science

More information

Analysis of Bluetooth Device Discovery and Some Speedup Mechanisms

Analysis of Bluetooth Device Discovery and Some Speedup Mechanisms Analysis of Bluetooth Device Discovery and Some Speedup Mechanisms Jehn-Ruey Jiang, Bing-Rong Lin, and Yu-Chee Tseng Department of Computer Science and Information Engineering National Central University,

More information

Improving Bluetooth Network Performance Through A Time-Slot Leasing Approach

Improving Bluetooth Network Performance Through A Time-Slot Leasing Approach Improving Bluetooth Network Performance Through A Time-Slot Leasing Approach Wensheng Zhang, Hao Zhu, and Guohong Cao Department of Computer Science and Engineering The Pennsylvania State University University

More information

Wireless Personal Area Networks (WPANs)

Wireless Personal Area Networks (WPANs) Wireless Personal Area Networks (WPANs) Bluetooth, ZigBee Contents Introduction to the IEEE 802 specification family Concept of ISM frequency band Comparison between different wireless technologies ( and

More information

Efficient Energy Consumption and Exponential Computing in Bluetooth

Efficient Energy Consumption and Exponential Computing in Bluetooth Pers Ubiquit Comput (2003) 7: 91 101 DOI 10.1007/s00779-003-0233-z ORIGINAL ARTICLE Frank Siegemund Æ Michael Rohs Rendezvous layer protocols for Bluetooth-enabled smart devices Received: 14 January 2003

More information

Wireless Home Networks based on a Hierarchical Bluetooth Scatternet Architecture

Wireless Home Networks based on a Hierarchical Bluetooth Scatternet Architecture Wireless Home Networks based on a Hierarchical Bluetooth Scatternet Architecture W. Lilakiatsakun'. 2, A. Seneviratne' I School of Electrical Engineering and Telecommunication University of New South Wales,

More information

Bluetooth voice and data performance in 802.11 DS WLAN environment

Bluetooth voice and data performance in 802.11 DS WLAN environment 1 (1) Bluetooth voice and data performance in 802.11 DS WLAN environment Abstract In this document, the impact of a 20dBm 802.11 Direct-Sequence WLAN system on a 0dBm Bluetooth link is studied. A typical

More information

TDM & FDM Overlays on Bluetooth

TDM & FDM Overlays on Bluetooth TDM & FDM Overlays on Bluetooth Abdelshakour Abuzneid, Sarosh Patel Viqar U.Mohammed, Varun Kumar Godula Department of Computer Science & Engineering University of Bridgeport {abuzneid, saroshp,vmohamme,vgodula}@bridgeport.edu

More information

BlueMesh: Degree-Constrained Multi-Hop Scatternet Formation for Bluetooth Networks

BlueMesh: Degree-Constrained Multi-Hop Scatternet Formation for Bluetooth Networks Mobile Networks and Applications 9, 33 47, 2004 2004 Kluwer Academic Publishers. Manufactured in The Netherlands. BlueMesh: Degree-Constrained Multi-Hop Scatternet Formation for Bluetooth Networks CHIARA

More information

Device and Service Discovery in Bluetooth Networks

Device and Service Discovery in Bluetooth Networks Master Thesis MEE 01-28 Device and Service Discovery in Bluetooth Networks & This thesis is presented as a part of the Master of Science degree in Electrical Engineering with emphasis on Telecommunication

More information

Wireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN:

Wireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN: WLAN: Wireless LAN Make use of a wireless transmission medium Tipically restricted in their diameter: buildings, campus, single room etc.. The global goal is to replace office cabling and to introduce

More information

Professur Technische Informatik Prof. Dr. Wolfram Hardt. Network Standards. and Technologies for Wireless Sensor Networks. Karsten Knuth 16.07.

Professur Technische Informatik Prof. Dr. Wolfram Hardt. Network Standards. and Technologies for Wireless Sensor Networks. Karsten Knuth 16.07. Network Standards and Technologies for Wireless Sensor Networks Karsten Knuth 16.07.2008 Index 1. Motivation 2. Introduction 3. Bluetooth 4. ZigBee 5. nanonet 6. Roundup 16.07.2008 Network Standards 2

More information

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006 CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)

More information

Monitoring for Handover from TDD to GSM

Monitoring for Handover from TDD to GSM Agenda Item: Source: Title: Document for: Siemens Monitoring for Handover from TDD to GSM Handover Preparation Monitoring for Handover from TDD to GSM The intention of this document is an explanation of

More information

A Mechanism for Quick Bluetooth Device Discovery

A Mechanism for Quick Bluetooth Device Discovery Mechanism for Quick luetooth Device Discovery Jehn-Ruey Jiang, ing-rong Lin, and Yu-Chee Tseng Department of Information Management Hsuan-Chuang University, Taiwan Department of Computer Science and Information

More information

Wi-Fi and Bluetooth - Interference Issues

Wi-Fi and Bluetooth - Interference Issues Wi-Fi and Bluetooth - Interference Issues January 2002 1 Introduction Because both Wi-Fi and Bluetooth wireless technology share spectrum and will often be located in close physical proximity to one another,

More information

CS263: Wireless Communications and Sensor Networks

CS263: Wireless Communications and Sensor Networks CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA

More information

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit

More information

Device Discovery in Short-Range Wireless Ad Hoc Networks

Device Discovery in Short-Range Wireless Ad Hoc Networks Device Discovery in Short-Range Wireless Ad Hoc Networks Petar Popovski Tatiana Kozlova Liljana Gavrilovska Ramjee Prasad Center for Personkommunikation, Aalborg University Fredrik Bajers Vej 7A5, DK-922

More information

Tecnologías Inalámbricas.

Tecnologías Inalámbricas. Tecnologías Inalámbricas. Why is Wireless Security Different? There are four major differences for wireless services: Bandwidth Allowable error rates Latency Power Constraints Secure Mobile Devices Characteristics

More information

Rapid Heterogeneous Connection Establishment: Accelerating Bluetooth Inquiry Using IrDA

Rapid Heterogeneous Connection Establishment: Accelerating Bluetooth Inquiry Using IrDA Rapid Heterogeneous Connection Establishment: Accelerating Bluetooth Inquiry Using IrDA Ryan Woodings, Derek Joos, Trevor Clifton, Charles D. Knutson Department of Computer Science Brigham Young University

More information

SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS

SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS Sonia Waharte, Kevin Ritzenthaler and Raouf Boutaba University of Waterloo, School of Computer Science 00, University Avenue West,

More information

ZIGBEE 802.15.4. ECGR-6185 Advanced Embedded Systems. Charlotte. University of North Carolina-Charlotte. Chaitanya Misal Vamsee Krishna

ZIGBEE 802.15.4. ECGR-6185 Advanced Embedded Systems. Charlotte. University of North Carolina-Charlotte. Chaitanya Misal Vamsee Krishna ECGR-6185 Advanced Embedded Systems ZIGBEE 802.15.4 University of North Carolina-Charlotte Charlotte Chaitanya Misal Vamsee Krishna WPAN A personal area network (PAN) is a computer network used for communication

More information

WPAN. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

WPAN. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1 Contents Bluetooth (IEEE 802.15.1) Network topology FHSS operation Link delivery services System architecture & protocols Usage models ZigBee (IEEE 802.15.4) Network topology Physical layer operation CSMA/CA

More information

Scatternet - Part 1 Baseband vs. Host Stack Implementation. White paper

Scatternet - Part 1 Baseband vs. Host Stack Implementation. White paper Scatternet - Part 1 Baseband vs. Host Stack Implementation White paper Ericsson Technology Licensing June 2004 Contents 1....Abstract 3 2.... Introduction 4 3.... Scatternet user case 5 4.... Interoperability

More information

WI-FI VS. BLUETOOTH TWO OUTSTANDING RADIO TECHNOLOGIES FOR DEDICATED PAYMENT APPLICATION

WI-FI VS. BLUETOOTH TWO OUTSTANDING RADIO TECHNOLOGIES FOR DEDICATED PAYMENT APPLICATION WI-FI VS. BLUETOOTH TWO OUTSTANDING RADIO TECHNOLOGIES FOR DEDICATED PAYMENT APPLICATION Ingenico is often asked: what are the differences between Bluetooth and Wi-Fi technologies, which is the best one,

More information

Cellular Analysis of Network Adhoc Networks, Adaptive Algorithms and Mean Discovery

Cellular Analysis of Network Adhoc Networks, Adaptive Algorithms and Mean Discovery IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 1, NO. 11, NOVEMBER 2006 1 Adaptive Energy Conserving Algorithms for Neighbor Discovery in Opportunistic Bluetooth Networks Catalin Drula, Cristiana

More information

ENHANCING MOBILE PEER-TO-PEER ENVIRONMENT WITH NEIGHBORHOOD INFORMATION

ENHANCING MOBILE PEER-TO-PEER ENVIRONMENT WITH NEIGHBORHOOD INFORMATION ENHANCING MOBILE PEER-TO-PEER ENVIRONMENT WITH NEIGHBORHOOD INFORMATION Arto Hämäläinen and Jari Porras Lappeenranta University of Technology Laboratory of Communications Engineering P.O. Box 20 53851

More information

Fast and Energy Efficient Neighbour Discovery for Opportunistic Networking with Bluetooth

Fast and Energy Efficient Neighbour Discovery for Opportunistic Networking with Bluetooth Fast and Energy Efficient Neighbour Discovery for Opportunistic Networking with Bluetooth by Cătălin Drulă A thesis submitted in conformity with the requirements for the degree of Master of Science Graduate

More information

Probabilistic Protocols for Node Discovery in Ad Hoc Multi-channel Broadcast Networks

Probabilistic Protocols for Node Discovery in Ad Hoc Multi-channel Broadcast Networks Probabilistic Protocols for Node Discovery in Ad Hoc Multi-channel Broadcast Networks G Alonso 1, E Kranakis 2, C Sawchuk 2, R Wattenhofer 1, and P Widmayer 1 1 Department of Computer Science, Swiss Federal

More information

EPL 657 Wireless Networks

EPL 657 Wireless Networks EPL 657 Wireless Networks Some fundamentals: Multiplexing / Multiple Access / Duplex Infrastructure vs Infrastructureless Panayiotis Kolios Recall: The big picture... Modulations: some basics 2 Multiplexing

More information

Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation

Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation Changsu Suh, Young-Bae Ko, and Jai-Hoon Kim Graduate School of Information and Communication, Ajou University, Republic of Korea

More information

EETS 8316 Wireless Networks Fall 2013

EETS 8316 Wireless Networks Fall 2013 EETS 8316 Wireless Networks Fall 2013 Lecture: WiFi Discovery, Powersave, and Beaconing http://lyle.smu.edu/~skangude/eets8316.html Shantanu Kangude skangude@lyle.smu.edu Discovery and Beaconing Discovery?

More information

New protocol concept for wireless MIDI connections via Bluetooth

New protocol concept for wireless MIDI connections via Bluetooth Wireless MIDI over Bluetooth 1 New protocol concept for wireless MIDI connections via Bluetooth CSABA HUSZTY, GÉZA BALÁZS Dept. of Telecommunications and Media Informatics, Budapest University of Technology

More information

Accelerating Service Discovery in Ad-hoc Zero Configuration Networking

Accelerating Service Discovery in Ad-hoc Zero Configuration Networking Accelerating Service Discovery in Ad-hoc Zero Configuration Networking Se Gi Hong, Suman Srinivasan and Henning Schulzrinne Columbia University, New York, NY {segihong, sumans, hgs}@cs.columbia.edu Abstract

More information

How To Make A Multi-User Communication Efficient

How To Make A Multi-User Communication Efficient Multiple Access Techniques PROF. MICHAEL TSAI 2011/12/8 Multiple Access Scheme Allow many users to share simultaneously a finite amount of radio spectrum Need to be done without severe degradation of the

More information

Electromagnetic Spectrum (3kHz 300GHz)

Electromagnetic Spectrum (3kHz 300GHz) Wireless Communication Serial communication Allocated a frequency of operation Could be a range of frequencies Regulated by FCC (Federal Communications Commission) in US Unfortunately, allocations are

More information

PERFORMANCE ANALYSIS OF THE IEEE 802.15.4 BASED ECG MONITORING NETWORK

PERFORMANCE ANALYSIS OF THE IEEE 802.15.4 BASED ECG MONITORING NETWORK PERFORMANCE ANALYSIS OF THE IEEE 802.15.4 BASED ECG MONITORING NETWORK Xuedong Liang 1,2 1 Department of Informatics University of Oslo Oslo, Norway email: xuedonl@ifi.uio.no Ilangko Balasingham 2 2 The

More information

Performance Evaluation of a Bluetooth Channel Estimation Algorithm

Performance Evaluation of a Bluetooth Channel Estimation Algorithm Performance Evaluation of a Bluetooth Channel Estimation Algorithm N. Golmie National Institute of Standards and Technology Gaithersburg, Maryland 2899 Abstract Since Bluetooth devices have to share the

More information

TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL

TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL 1. Local Area Networks TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL These are networks spanning relatively short distances (e.g. within one building) for local point-to-point and point-to-multipoint

More information

A Non-beaconing ZigBee Network Implementation and Performance Study

A Non-beaconing ZigBee Network Implementation and Performance Study A Non-beaconing ZigBee Network Implementation and Performance Study Magnus Armholt Email: magnus.armholt@tut.fi Sakari Junnila Email: sakari.junnila@tut.fi Irek Defee Email: irek.defee@tut.fi Abstract

More information

Rapid Prototyping of a Frequency Hopping Ad Hoc Network System

Rapid Prototyping of a Frequency Hopping Ad Hoc Network System Rapid Prototyping of a Frequency Hopping Ad Hoc Network System Martin Braun, Nico Otterbach, Jens Elsner, and Friedrich K. Jondral Communications Engineering Lab, Karlsruhe Institute of Technology (KIT),

More information

Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks

Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks Implementation of a Lightweight Advertisement and Discovery Protocol for Mobile Ad hoc Networks Wenbin Ma * Department of Electrical and Computer Engineering 19 Memorial Drive West, Lehigh University Bethlehem,

More information

Algorithms for Interference Sensing in Optical CDMA Networks

Algorithms for Interference Sensing in Optical CDMA Networks Algorithms for Interference Sensing in Optical CDMA Networks Purushotham Kamath, Joseph D. Touch and Joseph A. Bannister {pkamath, touch, joseph}@isi.edu Information Sciences Institute, University of Southern

More information

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP) TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) *Slides adapted from a talk given by Nitin Vaidya. Wireless Computing and Network Systems Page

More information

ITL BULLETIN FOR AUGUST 2012

ITL BULLETIN FOR AUGUST 2012 ITL BULLETIN FOR AUGUST 2012 SECURITY OF BLUETOOTH SYSTEMS AND DEVICES: UPDATED GUIDE ISSUED BY THE NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY (NIST) Shirley Radack, Editor Computer Security Division

More information

Protocolo IEEE 802.15.4. Sergio Scaglia SASE 2012 - Agosto 2012

Protocolo IEEE 802.15.4. Sergio Scaglia SASE 2012 - Agosto 2012 Protocolo IEEE 802.15.4 SASE 2012 - Agosto 2012 IEEE 802.15.4 standard Agenda Physical Layer for Wireless Overview MAC Layer for Wireless - Overview IEEE 802.15.4 Protocol Overview Hardware implementation

More information

PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks

PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks Sinem Coleri and Pravin Varaiya Department of Electrical Engineering and Computer Science University of California,

More information

Dynamic Source Routing in Ad Hoc Wireless Networks

Dynamic Source Routing in Ad Hoc Wireless Networks Dynamic Source Routing in Ad Hoc Wireless Networks David B. Johnson David A. Maltz Computer Science Department Carnegie Mellon University 5000 Forbes Avenue Pittsburgh, PA 15213-3891 dbj@cs.cmu.edu Abstract

More information

Dynamic Reconfiguration & Efficient Resource Allocation for Indoor Broadband Wireless Networks

Dynamic Reconfiguration & Efficient Resource Allocation for Indoor Broadband Wireless Networks Dynamic Reconfiguration & Efficient Resource Allocation for Indoor Broadband Wireless Networks Tim Farnham, Brian Foxon* Home Communications Department HP Laboratories Bristol HPL-98-123 June, 1998 broadband,

More information

Lecture 17: 802.11 Wireless Networking"

Lecture 17: 802.11 Wireless Networking Lecture 17: 802.11 Wireless Networking" CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Lili Qiu, Nitin Vaidya Lecture 17 Overview" Project discussion Intro to 802.11 WiFi Jigsaw discussion

More information

... neither PCF nor CA used in practice

... neither PCF nor CA used in practice IEEE 802.11 MAC CSMA/CA with exponential backoff almost like CSMA/CD drop CD CSMA with explicit ACK frame added optional feature: CA (collision avoidance) Two modes for MAC operation: Distributed coordination

More information

MOBILE devices with short range wireless network. Adaptive Energy Conserving Algorithms for Neighbor Discovery in Opportunistic Bluetooth Networks

MOBILE devices with short range wireless network. Adaptive Energy Conserving Algorithms for Neighbor Discovery in Opportunistic Bluetooth Networks 96 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 25, NO. 1, JANUARY 2007 Adaptive Energy Conserving Algorithms for Neighbor Discovery in Opportunistic Bluetooth Networks Catalin Drula, Cristiana

More information

Routing Protocol for Mobile Ad-hoc Wireless Networks

Routing Protocol for Mobile Ad-hoc Wireless Networks 86 I. M. BACARREZA NOGALES, ROUTING PROTOCOL FOR MOBILE AD-HOC WIRELESS NETWORKS Routing Protocol for Mobile Ad-hoc Wireless Networks Ivris Marcelo BACARREZA NOGALES Dept. of Radio Electronics, Czech Technical

More information

Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks

Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks 1 Mr. Praveen S Patil, 2 Mr. Rabinarayan Panda, 3 Mr. Sunil Kumar R D 1,2,3 Asst. Professor, Department of MCA, The Oxford College of Engineering,

More information

VHICLE-TO-VEHICLE (V2V) communication can promote

VHICLE-TO-VEHICLE (V2V) communication can promote THE IEEE FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT TRANSPORTATION SYSTEMS Space Division Multiple Access (SDMA) for Robust Ad hoc Vehicle Communication Networks Soheila V. Bana, Pravin Varaiya Abstract

More information

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman 1 Wireless Networks Reading: Sec5on 2.8 COS 461: Computer Networks Spring 2011 Mike Freedman hep://www.cs.princeton.edu/courses/archive/spring11/cos461/ 2 Widespread Deployment Worldwide cellular subscribers

More information

CHAPTER 1 1 INTRODUCTION

CHAPTER 1 1 INTRODUCTION CHAPTER 1 1 INTRODUCTION 1.1 Wireless Networks Background 1.1.1 Evolution of Wireless Networks Figure 1.1 shows a general view of the evolution of wireless networks. It is well known that the first successful

More information

Chapter 6 Bandwidth Utilization: Multiplexing and Spreading 6.1

Chapter 6 Bandwidth Utilization: Multiplexing and Spreading 6.1 Chapter 6 Bandwidth Utilization: Multiplexing and Spreading 6.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Note Bandwidth utilization is the wise use of

More information

Optimal Network Discovery Period for Energy- Efficient WLAN Offloading

Optimal Network Discovery Period for Energy- Efficient WLAN Offloading Optimal Network Discovery Period for Energy- Efficient WLAN Offloading Dionysia Triantafyllopoulou, Tao Guo, and Klaus Moessner Centre for Communication Systems Research University of Surrey Guildford,

More information

Wireless Local Area Networking For Device Monitoring

Wireless Local Area Networking For Device Monitoring Wireless Local Area Networking For Device Monitoring by Colin Goldsmith Supervised By Professor Wendi Heinzelman A thesis submitted in partial fulfillment of the Requirements for the Degree of Masters

More information

Figure 1: cellular system architecture

Figure 1: cellular system architecture Question 1: (30 marks) Consider a FDM cellular system with 120 cites, a frequency reuse factor of N=12, and 900 overall two-way channels. Omni-directional antennas are used: Figure 1 shows some of the

More information

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji

More information

ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks

ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks Surjya Ray, Ilker Demirkol and Wendi Heinzelman Department of Electrical and Computer Engineering University of Rochester, Rochester,

More information

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility

More information

SmartDiagnostics Application Note Wireless Interference

SmartDiagnostics Application Note Wireless Interference SmartDiagnostics Application Note Wireless Interference Publication Date: May 27, 2015 KCF Technologies, Inc. Background The SmartDiagnostics wireless network is an easy to install, end-to-end machine

More information

WiLink 8 Solutions. Coexistence Solution Highlights. Oct 2013

WiLink 8 Solutions. Coexistence Solution Highlights. Oct 2013 WiLink 8 Solutions Coexistence Solution Highlights Oct 2013 1 Products on market with TI connectivity 2004 2007 2009-11 2013 Use cases: BT voice, WLAN data Features: TDM based operation Strict protection

More information

IN THIS PAPER, we study the delay and capacity trade-offs

IN THIS PAPER, we study the delay and capacity trade-offs IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 5, OCTOBER 2007 981 Delay and Capacity Trade-Offs in Mobile Ad Hoc Networks: A Global Perspective Gaurav Sharma, Ravi Mazumdar, Fellow, IEEE, and Ness

More information

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs)

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs) CS6956: Wireless and Mobile Networks Lecture Notes: //05 IEEE 80. Wireless Local Area Networks (WLANs) CSMA/CD Carrier Sense Multi Access/Collision Detection detects collision and retransmits, no acknowledgement,

More information

GSM and Similar Architectures Lesson 07 GSM Radio Interface, Data bursts and Interleaving

GSM and Similar Architectures Lesson 07 GSM Radio Interface, Data bursts and Interleaving GSM and Similar Architectures Lesson 07 GSM Radio Interface, Data bursts and Interleaving 1 Space Division Multiple Access of the signals from the MSs A BTS with n directed antennae covers mobile stations

More information

Dynamic Load Balance Algorithm (DLBA) for IEEE 802.11 Wireless LAN

Dynamic Load Balance Algorithm (DLBA) for IEEE 802.11 Wireless LAN Tamkang Journal of Science and Engineering, vol. 2, No. 1 pp. 45-52 (1999) 45 Dynamic Load Balance Algorithm () for IEEE 802.11 Wireless LAN Shiann-Tsong Sheu and Chih-Chiang Wu Department of Electrical

More information

Version Date Author Changes - 6/24/2005 D. Liff Initial draft and release 1.0 11/18/2005 K. Adkins Minor spelling and format changes 1.

Version Date Author Changes - 6/24/2005 D. Liff Initial draft and release 1.0 11/18/2005 K. Adkins Minor spelling and format changes 1. 1 Version Date Author Changes - 6/24/2005 D. Liff Initial draft and release 1.0 11/18/2005 K. Adkins Minor spelling and format changes 1.1 08/19/2008 D. Liff Added 802.11.n information 1.2 11/09/2010 J.

More information

Fig 1 Death rate in the last four years

Fig 1 Death rate in the last four years Accident Prevention via Bluetooth Jyotika Kapur Abstract-In India there has been an increase of 17.4% in the total number of road accidents during the period of 2011-2012.This percentage has raised eyebrows

More information

WIRELESS INSTRUMENTATION TECHNOLOGY

WIRELESS INSTRUMENTATION TECHNOLOGY BS&B WIRELESS, L.L.C. BS&B WIRELESS, L.L.C. WIRELESS INSTRUMENTATION TECHNOLOGY Printed February 2004 BS&B WIRELESS, L.L.C. 7422-B East 46th Place, Tulsa, OK74145 Phone: 918-622-5950 Fax: 918-665-3904

More information

Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network

Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network Recent Advances in Electrical Engineering and Electronic Devices Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network Ahmed El-Mahdy and Ahmed Walid Faculty of Information Engineering

More information

Wireless LAN Concepts

Wireless LAN Concepts Wireless LAN Concepts Wireless LAN technology is becoming increasingly popular for a wide variety of applications. After evaluating the technology, most users are convinced of its reliability, satisfied

More information

IEEE 802.15.1 Simulation and BER Analysis under the Interference

IEEE 802.15.1 Simulation and BER Analysis under the Interference IEEE 802.15.1 Simulation and BER Analysis under the Interference Zahir Aalam, S Vhatkar, B. K. Mishra Thakur College of Engineering & Technology, Kandivali (E), Mumbai 101, M.S. India ABSTRACT There is

More information

other. A B AP wired network

other. A B AP wired network 1 Routing and Channel Assignment in Multi-Channel Multi-Hop Wireless Networks with Single-NIC Devices Jungmin So + Nitin H. Vaidya Department of Computer Science +, Department of Electrical and Computer

More information

Recent technological innovations and declining prices for personal computers (PCs) and

Recent technological innovations and declining prices for personal computers (PCs) and Chapter 2 Bluetooth Transmission Technology 2.1 Introduction Recent technological innovations and declining prices for personal computers (PCs) and wireless phones are resulting in an emerging trend coined

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

Hello viewers, welcome to today s lecture on cellular telephone systems.

Hello viewers, welcome to today s lecture on cellular telephone systems. Data Communications Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture minus 31 Cellular Telephone Systems Hello viewers, welcome to today s lecture

More information

LoRaWAN. What is it? A technical overview of LoRa and LoRaWAN. Technical Marketing Workgroup 1.0

LoRaWAN. What is it? A technical overview of LoRa and LoRaWAN. Technical Marketing Workgroup 1.0 LoRaWAN What is it? A technical overview of LoRa and LoRaWAN Technical Marketing Workgroup 1.0 November 2015 TABLE OF CONTENTS 1. INTRODUCTION... 3 What is LoRa?... 3 Long Range (LoRa )... 3 2. Where does

More information

Scheduling Enhanced Beacons in the IEEE 802.15.4e MAC for fast network formation

Scheduling Enhanced Beacons in the IEEE 802.15.4e MAC for fast network formation Scheduling Enhanced Beacons in the IEEE 802.15.4e MAC for fast network formation Elvis Vogli, Giuseppe Ribezzo, Luigi Alfredo Grieco, Gennaro Boggia Department of Electrical and Information Engineering

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Survey on

More information

3GPP Wireless Standard

3GPP Wireless Standard 3GPP Wireless Standard Shishir Pandey School of Technology and Computer Science TIFR, Mumbai April 10, 2009 Shishir Pandey (TIFR) 3GPP Wireless Standard April 10, 2009 1 / 23 3GPP Overview 3GPP : 3rd Generation

More information

An Overview of ZigBee Networks

An Overview of ZigBee Networks An Overview of ZigBee Networks A guide for implementers and security testers Matt Hillman Contents 1. What is ZigBee?... 3 1.1 ZigBee Versions... 3 2. How Does ZigBee Operate?... 3 2.1 The ZigBee Stack...

More information

Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4

Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4 Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4 Michael Binhack, sentec Elektronik GmbH, Werner-von-Siemens-Str. 6, 98693 Ilmenau, Germany Gerald Kupris, Freescale Semiconductor

More information

How To Understand The Gsm And Mts Mobile Network Evolution

How To Understand The Gsm And Mts Mobile Network Evolution Mobile Network Evolution Part 1 GSM and UMTS GSM Cell layout Architecture Call setup Mobility management Security GPRS Architecture Protocols QoS EDGE UMTS Architecture Integrated Communication Systems

More information

Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network

Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network International Journal of Electronics Engineering, 3 (2), 2011, pp. 283 286 Serials Publications, ISSN : 0973-7383 Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network Gopindra

More information

Continuous network discovery using Opportunistic Scanning

Continuous network discovery using Opportunistic Scanning Continuous network discovery using Opportunistic Scanning Authors: Date: 2009-11-17 Slide 1 Abstract This presentation is in response to WNG requesting more information on the capability of 802.11 to support

More information

NOVEL PRIORITISED EGPRS MEDIUM ACCESS REGIME FOR REDUCED FILE TRANSFER DELAY DURING CONGESTED PERIODS

NOVEL PRIORITISED EGPRS MEDIUM ACCESS REGIME FOR REDUCED FILE TRANSFER DELAY DURING CONGESTED PERIODS NOVEL PRIORITISED EGPRS MEDIUM ACCESS REGIME FOR REDUCED FILE TRANSFER DELAY DURING CONGESTED PERIODS D. Todinca, P. Perry and J. Murphy Dublin City University, Ireland ABSTRACT The goal of this paper

More information

Bluetooth Packet Sniffing Using Project Ubertooth. Dominic Spill dominicgs@gmail.com

Bluetooth Packet Sniffing Using Project Ubertooth. Dominic Spill dominicgs@gmail.com Bluetooth Packet Sniffing Using Project Ubertooth Dominic Spill dominicgs@gmail.com Dominic Spill Bluesniff: Eve meets Alice and Bluetooth Usenix WOOT 07 Building a Bluetooth monitor Shmoo/Defcon/Toorcamp

More information

Bluetooth networking to get data to a central data sink

Bluetooth networking to get data to a central data sink Bluetooth networking to get data to a central data sink By: Bradley Clayton Supervised by: Alfredo Terzoli and Peter Wentworth http://www.cs.ru.ac.za/research/students/g01c2974/ g01c2974@campus.ru.ac.za

More information

Design and Implementation of Ad-hoc Communication and Application on Mobile Phone Terminals

Design and Implementation of Ad-hoc Communication and Application on Mobile Phone Terminals Design and Implementation of Ad-hoc Communication and Application on Mobile Phone Terminals Yujin Noishiki Hidetoshi Yokota Akira Idoue KDDI R&D Laboratories, Inc. 2-1-15 Ohara, Fujimino-Shi, Saitama,

More information

RESOURCE ALLOCATION FOR INTERACTIVE TRAFFIC CLASS OVER GPRS

RESOURCE ALLOCATION FOR INTERACTIVE TRAFFIC CLASS OVER GPRS RESOURCE ALLOCATION FOR INTERACTIVE TRAFFIC CLASS OVER GPRS Edward Nowicki and John Murphy 1 ABSTRACT The General Packet Radio Service (GPRS) is a new bearer service for GSM that greatly simplify wireless

More information

Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh

Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh, Ph.D. benveniste@ieee.org Mesh 2008, Cap Esterel, France 1 Abstract Abundant hidden node collisions and correlated channel access

More information