BLUETOOTH is a low-power, open standard for implementing
|
|
- Hortense Marshall
- 8 years ago
- Views:
Transcription
1 Proceedings of the 39th Hawaii International Conference on System Sciences - 26 Bluetooth Discovery with Multiple Inquirers Brian S. Peterson, Rusty O. Baldwin, and Richard A. Raines Department of Electrical and Computer Engineering, Air Force Institute of Technology, USA Brian.Peterson@wpafb.af.mil, Rusty.Baldwin@afit.edu, Richard Raines@afit.edu Abstract Although the discovery time between a pair of Bluetooth devices has been well characterized, the impact of multiple inquiring devices on the discovery time has not. Discovery time must be considered when forming or maintaining Bluetooth networks with multiple inquiring devices. The presence of a second inquiring device can significantly delay, and even preclude, the discovery of a scanning device by an inquiring node. When a scan window opens, each inquiring device does not have an equal likelihood of discovering the scanning node since one inquirer may consistently transmit on the scan frequency before the other. The discovery time probability density function with multiple inquiring devices is presented. I. INTRODUCTION BLUETOOTH is a low-power, open standard for implementing PANs [][2]. It is a popular protocol with 4 million Bluetooth-enabled phones shipped worldwide and over, new Bluetooth products being developed by more than 2, companies [3]. It uses a slow hop frequency hopping spread spectrum scheme with 79 -MHz frequency slots (23 in some countries) in the 2.4 GHz band. Members of a Bluetooth piconet hop together among the 79 frequencies (numbered -78) with a sequence that is a function of the master s free-running counter (CLK) and the first 28 bits of the master s 48 bit address. A Bluetooth device must be discovered and incorporated into a Bluetooth network, or piconet, to follow the piconet s hop sequence. The master of a Bluetooth piconet coordinates time-division duplex transmissions of up to seven active slaves by alternating between master and slave transmissions in 625 μs time slots. The discovery process requires the piconet master to be in the inquiry substate when a potential slave device is in the inquiry scan substate. Although a piconet is limited to eight active devices, piconets can be connected into scatternets by nodes that are members of multiple piconets [4]. The discovery time between an inquiring and scanning device has been fully characterized [5]. Furthermore, the expected inquiry time for multiple devices alternating between inquiring and scanning has been characterized with some simplifying assumptions [6]. However, neither characterization considers the impact of the dependencies of multiple inquiring devices hop patterns on the inquiry time. Due to the limited hop patterns, a second inquiring device can prevent an inquiring device from discovering a scanning node. In Section II, the Bluetooth discovery process is presented. The interaction of inquiry hop sequence is discussed in Section III and the discovery time probability density functions (pdfs) with multiple inquiring devices are presented in Section IV. II. BACKGROUND A Bluetooth node enters the inquiry substate for a period of time to discover other nodes to form a piconet; the inquiring node acts as the master. Bluetooth devices typically use the specification recommended.24 s as the inquiry period [2][6][7]. A node in the inquiry scan substate, in contrast, searches for nodes in the inquiry substate to form a piconet; the scanning node acts as a slave. A. Inquiry Substate A device in the inquiry substate transmits inquiry packets on two pseudo-random frequencies during a normal packet time slot. Inquiry packets consist of a 68 bit General Inquiry Access Code (GIAC) or Dedicated Inquiry Access Code (DIAC). The GIAC is used when searching for any Bluetooth device. A node may use one of several DIACs to search for devices with specific characteristics [][2]. The inquiring device waits for a response 625 μs later on the same frequencies from a prospective slave device in the inquiry scan substate. The inquiring device continues this process while collecting responses until the inquiry period is complete or an acceptable number of devices have been discovered. The device may leave the inquiry substate to service synchronous (SCO) links or to immediately page a discovered device. The page process uses the response from a discovered device to contact prospective slaves and incorporate them into the piconet. An inquiring device may also wait until the inquiry period is complete to page devices that are accepted into the piconet. Although some have recommended that a device enter the inquiry substate on a regular basis [2][6][8], others only inquire when explicitly commanded [9]. The inquiry substate uses a 32-frequency partition of the 79 frequencies similar to that used by a piconet in the connection state [2]. Unlike in the connection state, however, this partition remains constant. A node uses an address associated with the GIAC (i.e., 9E8B33 6 ) or one of the DIACs to generate the frequency hopping sequence. This address determines the 32- frequency subset used by the inquiry/inquiry scan substates. Although generated using the resident CLK and the GIAC (or DIAC) address, the hop sequence within the partition appears random to an outside observer. The 32 frequencies used by the GIAC hop sequence are spread across the Bluetooth spectrum by a spreading process in the final stage of the /6/$2. (C) 26 IEEE
2 Proceedings of the 39th Hawaii International Conference on System Sciences - 26 Frequency Hop Selection Kernel [2]. Placement within the spectrum is irrelevant for analysis and this spreading stage is ignored. Thus, the frequencies used by the inquiry substate for the GIAC address are designated as -5 and 53-78, rather than the Bluetooth frequency spectrum designations used after the spreading process which doubles the frequency number modulo 79 (i.e.,,2,4,6,8,,27,29,3,...77) [2]. This set of 32 frequencies is further segmented by the inquiry procedure into two 6-frequency trains, A and B. A device in the inquiry substate chooses the A or B train for initial transmission and switches between the trains every 2.56 s. The train used initially is not significant [2] and the initial train selection process is implementation specific. The frequencies within these trains change over time as shown in Figure where the A train are the frequencies in the white boxes and the B train are the frequencies in the shaded boxes. The 6 frequencies in a train at a given instant are called the train s membership []. A frequency entering the A train is shown as a thick bordered box and a frequency switching to the B train is shaded with a left-hash. The trains exchange one member every.28 s based on bit changes in the free-running counter, completely swapping membership every 2.48 s. As membership changes, the swapped frequencies retain their position in the transmitted train. Thus each train consists of only 32 possible sequences. t s t +.28 s t s t s t +5.2 s t s t s t s t +.24 s t +.52 s t +2.8 s t +4.8 s t s t s t s t +9.2 s t s t s First Frequency Lower Range Re-ordered Frequencies A-train B-train Fig.. Shifting of the inquiry trains [] Second Frequency Upper Range A-train addition for that cycle B-train addition for that cycle B. Inquiry scan/inquiry response substates A device enters the inquiry scan substate to make itself available to discovery by an inquiring device. To account for the hop sequence randomness, the scanning device only changes frequency every.28 s. Since the scan frequency changes every.28 s, and the train changes every 2.56 s, most implementations only scan for.25 ms [2][] and then move to the connection (i.e., normal operation) or a standby state for the remainder of the.28 s. Using a scan of length.25 ms rather than ms compensates for any timing misalignment and allows the scanning device to receive at least one full inquiry train sequence. When an inquiry packet is received during a standard inquiry scan, the scanning device waits 625 μs and enters the inquiry response substate to return a FHS packet to the master [2]. The FHS packet contains the slave device address and CLK values. The inquiring device either continues transmitting packets for the duration of the inquiry substate dwell time to find other neighboring devices or jumps to the page substate to immediately page the scanning device before continuing to inquire. After transmitting the FHS packet, the scanning device advances the scan frequency by adding an additional.28 s offset to the CLK, waits a back-off time uniformly distributed on [, ms], and re-enters the inquiry scan substate. Before doing so, it is allowed to enter the page scan substate in case the inquiring device immediately pages it. In v. of the specification, a FHS packet is not sent until after the device waits for the back-off period to elapse and receives a second inquiry packet. This was shown to cause unnecessary delay with little reduction in FHS packet collisions [5][2]. Additionally, an interlaced scan was added in v.2 of the specification in which the scan window is immediately followed by a scan using a frequency from the other train. In the standard inquiry scan substate, a new scan frequency is used every.28 s based on the scanning device s CLK. Inquiry scan frequencies change over time resulting in the scan frequency staying within the same inquiry train as shown in Figure 2 []. For example, at t =, the scan frequency is 6 and in the A train. At t =.52 s, frequency 6 is in the B train. However, the scan frequency has shifted to 7, which is in the A train, even though it was in the B train at t =. Since the scan frequency changes every.28 s, a device typically opens a window every.28 s when in the inquiry scan substate. The scan frequency used at the beginning of a scan window is assumed to be the frequency used for the entire scan window. This prevents loss of scan capability due to oscillator re-tuning during the window. s.28 s 2.56 s 3.84 s 5.2 s 6.4 s 7.68 s 8.96 s.24 s.52 s 2.8 s 4.8 s 5.36 s 6.64 s 7.92 s 9.2 s 2.48 s Re-ordered Frequencies A-train Random Inquiry Scan frequency B-train Fig. 2. Inquiry scan frequency remaining in a train [] C. Discovery Using the standard inquiry scan, the inquiry time distribution is shown in Figure 3 for an isolated inquiring/scanning pair. When a device begins inquiring, the time until the scanning device opens a scan window is uniformly distributed 2
3 Proceedings of the 39th Hawaii International Conference on System Sciences - 26 on [,.28 s]. Since a scan window may already be open when the inquiry begins, the inquiry packet is received uniformly distributed on [,.28 s] if the scan frequency is in the train used (probability.5). If not, the train changes at 2.56 s and the inquiry packet is received uniformly on [2.56 s, 3.84 s]. Exceptions occur with.275 probability, when the membership of the train changes during the scan window [5]..4 Inq2 inquiry hop sequence Inq inquiry hop sequence Scan Window Frequency = 64 Inq inquiry hop sequence b) Fig. 4. Inq2 receives inquiry packet.3 f TI (t).2. 6 (s) in the following analytical model of one of many conditional pdfs which comprise the inquiry time pdf. Consider the event, M, that Inq begins inquiring with a train containing the scan frequency of an arbitrary scanning device. The scanning frequency is equally likely to be in either train giving Fig. 3. f TI (t) Unconditional probability density for the standard inquiry scan, P (M) =.5. () III. HOP SEQUENCE INTERACTION When multiple devices inquire, discovery time may increase. When two nodes, Inq and Inq2, enter the inquiry substate simultaneously and use the train containing the scan frequency, discovery by one of the nodes will be delayed since a scanning node can only respond to one inquirer and then enters the back-off period (and possibly the page scan substate) before scanning again. If Inq uses the train not containing the scan frequency, the scanning node will receive its inquiry packet uniformly on [2.56 s, 3.84 s] unless the scanning frequency changes trains when the scan frequency offset advances by an additional.28 s after each FHS packet is transmitted. In this case, Inq s packet is received immediately after the back-off period is complete after the transmission of an FHS packet to Inq2. The limited number of inquiry train sequences further complicates determining the discovery time. If Inq and Inq2 both use train that contain the scan frequency, the scanning device may consistently receive packets from and respond to Inq2 each time a scan window opens until Inq2 uses a train not containing the scan frequency or the scan window begins just before Inq transmits its inquiry packet on the scan frequency. For example, when Inq2 transmits on the scan frequency slightly before Inq, there is a small interval where the scan window can open and receive Inq s packet as shown in Figure 4a. On the other hand, when the nodes use the scan frequency 9 time-slots apart as shown in Figure 4b, each node has an equal probability of being the first to use the scan frequency within a scan window. Although the relationship between the hop sequences is well defined, an analytical model depicting the inquiry time with n inquirers is not feasible due to the numerous relationships between membership changes and train changes and the multiple back-off periods that must be included when discovery is delayed due to other inquiring devices. This is illustrated The scanning device opens a scan window at a time uniformly distributed on [,.28 s]. The pdf of the time the scan window initially open is designated f T (t). IfInq2 inquires with a train not containing the scan frequency when the scan window opens (which occurs with probability.5), the scanning device is discovered at a time uniformly distributed on [,.28 s] as shown in Figure 5a. If Inq2 is inquiring with a train containing the scan frequency when the scan window opens, Inq2 may discover the device first. Unconditionally, (i.e., with no knowledge of when Inq and Inq2 transmit the scan frequency) the probability that Inq discovers the scanning node first when both nodes trains contain the scan frequency is.5. If Inq2 discovers the node first, the next opportunity for Inq to discover the scanning node occurs when it opens a scan window after the back-off period elapses. Since the back-off period, with pdf f TBO (t), is uniform on [,.64 s], the time the scan window will re-open is the convolution f TBO (t) f T (t) as shown in Figure 5b. During a back-off period, several events can occur that affect the probability Inq discovers the node when the scan window re-opens: Inq due to the scan frequency offset (with probability.625), Inq2 due to the scan frequency offset (with probability.625), Inq due to the CLK change (with probability.6), Inq2 due to the CLK change (with probability.6), the membership of Inq can change so the scan frequency is no longer in Inq s train (with probability.6), the membership of Inq2 can change so the scan frequency is no longer in Inq2 s train (with probability.6), and Inq2 can switch the train used (with probability.25). 3
4 Proceedings of the 39th Hawaii International Conference on System Sciences - 26 b) c) f T (t M) f T (t M)* f TBO (t) f TD (t M) Fig. 5. Discovery time distribution when inquiry packet is received during the first scan window b) when inquiry packet is received during the second scan window after being discovered first by another inquirer c) in the presence of another inquirer when M occurs Since these events are not mutually exclusive, the conditional distribution including each combination is complex. If the scan frequency is no longer in the train used by Inq, Inq cannot discover the device until after it changes trains at t =2.56 s (unless Inq2 continues to discover the device, advancing the device s scan frequency offset until it is back in the train used by Inq). If Inq2 discovers the device when the scan window reopens, the scanning device again waits for a back-off period before opening a scan window once again. Assuming none of the events listed above occur during any of the back-off periods and that each inquiring node has an equal likelihood discovering the scanning node when a scan window opens, the discovery time pdf for Inq before the train change at t =2.56 sis f TD (t M {T D < 2.56 s}) = 3f T (t) + f T (t) f TBO (t) + (2) 4 8 f T (t) f TBO (t) f TBO (t) +... (3) 6 and is shown in Figure 5c. Under these circumstances, the probability that Inq discovers the node before the train change at t = 2.56 s is.99. However, due to the relationships of the scan frequencies within each train, it is unlikely that each inquiring node has an equal likelihood of discovering the scanning node when a scan window opens. When Inq does not initially contain the scan frequency (i.e., P (M)), the conditional distributions are more complex since Inq2 may initially contain the scan frequency and cause the scanning node to go through back-off periods and advance the scan frequency offset and possibly into the train initially used by Inq. Considering this and the possibility of the events listed above which may occur during each back-off period, analytically deriving the discovery time distribution is deemed impractical. IV. RESULTS Since an analytical model is not feasible, a simulation model must be used to model the inquiry time with multiple inquirers, rather than be used solely to verify a derived model. A Matlab simulation was developed which simulated a single scanning node over a perfect channel in the presence of multiple inquiring devices. Although not an exact model, this provides an estimate of the discover time pdf which provides developers an estimate of the delay that multiple inquirers can cause. It also provides an estimate of the devices that may not be discovered by a specific inquirer due to the presence of other inquirers. Discovery time is defined as the time needed for an inquiring device (Inq) to receive an FHS packet from the scanning node. Since Inq may never discover the scanning node if another inquiring device consistently transmits on the scan frequency immediately before Inq and changes trains simultaneously with Inq, the simulation ends at 5 s. It is unlikely that Bluetooth devices will transmit longer than.24 s due the the interference generated and power considerations [5]. The simulation was run using 25 randomly generated scanning devices with random CLK values and up to five inquiring devices. A scanning device and inquiring device were randomly generated for each set of simulation runs and a baseline inquiry time was determined. The CLK/address settings for each preceding simulation were repeated in each subsequent run as additional inquirers were added in subsequent simulation runs. Thus, the inquiry times in the 5 simulation runs were comparable for each scanning device. When Inq was the first device to discover the scanning node, the discovery time was the same as when no other inquirers were present. When another inquirer discovered the scanning node first, the Inq was generally delayed as shown in Figure 6, although it was occasionally accelerated when M occurred but the scan frequency offset change caused the scan frequency to shift into the train before the change at t =2.56 s. The percentage of devices that are not discovered within 5 s rises quickly as additional devices inquire as shown in Table I. V. CONCLUSIONS Although the single inquiring device inquiry time has been well characterized, the effect of multiple inquirers is difficult 4
5 Proceedings of the 39th Hawaii International Conference on System Sciences - 26 b) Simulation pmf Simulation pmf Inquiry time (s) No other inquirers One other inquirer No other inquirers Rises to.6 Four other inquirers Inquiry time (s) Fig. 6. Inquiry time pmf with one other inquiring node b) four other inquiring nodes [9] B. Peterson, R. Baldwin, and R. Raines, Packet Error Rate Distribution Between Random Bluetooth Piconet Pairs, accepted to Wireless Personal Communications. [] B. Peterson, R. Baldwin, and R. Raines, Inquiry Packet Interference in Bluetooth Scatternets, in ACM Mobile Computing and Communications Review, pp Volume 8, Issue 2, April 24. [] O. Kasten and M. Langheinrich, First Experiences with Bluetooth in the Smart-It s Distributed Sensor Network, in Proceedings of the International Conference on Parallel Architectures and Compilation Techniques, 2, Sept. 2. [2] G. Zaruba, Accerlated Neighbor Discovery in Bluetooth Based Personal Area Networks, in Proceedings of the 22 International Conference on Parallel and Distributed Processing TEchniques and Applications (PDPTA 2), Las Vegas, NV, USA, Jun, 22. TABLE I INQUIRY TIME WITH MULTIPLE INQUIRERS Inquiring Devices Mean Inquiry % not found after 5 s to model and has not been considered. Due to the relationship between inquiry hop sequences, the impact extends beyond the independent probability that one device delays discovery by another simply because it discovers a scanning node first. The presence of a second inquirer may in fact prevent a inquiring device from discovering a scanning node until the second node leaves the inquiry substate. As the number of inquiring devices increases, the probability that a specific inquirer will not be able to discover a scanning device rises significantly. This relationship must be considered for scatternet formation as well as scatternet maintenance analysis. REFERENCES [] Specif ication of the Bluetooth System, Core Version., Bluetooth SIG, 999. [Online]. Available: [2] Specif ication of the Bluetooth System, Core Version.2, Bluetooth SIG, Nov 23. [Online]. Available: [3] L. Godell, M. Nordan, T. Lapolla, M. Mendez WLAN And Bluetooth Update: Beyond The Hype, [Online]. Available: [4] D. Jayanna, and G.V. Zaruba, A Dynamic and Distributed Scatternet Formation Protocol for Real-life Bluetooth Scatternets, in Proceedings of the 38th Hawaii International Conference on System Sciences, Hawaii, USA, Jan, 25. [5] B. Peterson, R. Baldwin, and J. Kharoufeh, Bluetooth Inquiry Characterization and Selection, accepted to IEEE Transactions on Mobile Computing. [6] G. Zaruba and V. Gupta, Simplified Bluetooth Device Discovery Analysis and Simulation, in Proceedings of the 37th Hawaii International Conference on System Sciences, Hawaii, USA, Jan, 24. [7] R. Woodings, D.Joos, T. Clifton, and C. Knutson, Rapid Heterogeneous Ad Hoc Connection Establishment: Accelerating Bluetooth Inquiry Using IrDA, Proceedings of the Third Annual IEEE Wireless Communications and Networking Conference (WCNC 2), Orlando, Florida, Mar 22. [8] T. Salonidis, P. Bhagwat, L. Tassiulas, and R. LaMaire, Distributed Topology Construction of Bluetooth Personal Area Networks, in Proceedings of IEEE INFOCOM 2, Anchorage, Alaska, Apr 2. 5
Performance of Symmetric Neighbor Discovery in Bluetooth Ad Hoc Networks
Performance of Symmetric Neighbor Discovery in Bluetooth Ad Hoc Networks Diego Bohman, Matthias Frank, Peter Martini, Christoph Scholz Institute of Computer Science IV, University of Bonn, Römerstraße
More informationAnalysis of the Bluetooth device discovery protocol
DOI 10.1007/s11276-008-0142-1 Analysis of the Bluetooth device discovery protocol Goutam Chakraborty Æ Kshirasagar Naik Æ Debasish Chakraborty Æ Norio Shiratori Æ David Wei Ó Springer Science+Business
More informationAIR FORCE INSTITUTE OF TECHNOLOGY
DEVICE DISCOVERY IN FREQUENCY HOPPING WIRELESS AD HOC NETWORKS DISSERTATION Brian S. Peterson, Major, USAF AFIT/DS/ENG/04-06 DEPARTMENT OF THE AIR FORCE AIR UNIVERSITY AIR FORCE INSTITUTE OF TECHNOLOGY
More informationA Formal Analysis of Bluetooth Device Discovery
A Formal Analysis of Bluetooth Device Discovery Marie Duflot, Marta Kwiatkowska, Gethin Norman and David Parker School of Computer Science, University of Birmingham, Birmingham, B15 2TT, UK Abstract. This
More information- Cognitive Radio (CR) technology is a promising emerging technology that enables a more efficient usage of
An Asynchronous Neighbor Discovery Algorithm for Cognitive Radio Networks Short Paper Chanaka J. Liyana Arachchige, S. Venkatesan and Neeraj Mittal Erik Jonsson School of Engineering and Computer Science
More informationAnalysis of Bluetooth Device Discovery and Some Speedup Mechanisms
Analysis of Bluetooth Device Discovery and Some Speedup Mechanisms Jehn-Ruey Jiang, Bing-Rong Lin, and Yu-Chee Tseng Department of Computer Science and Information Engineering National Central University,
More informationImproving Bluetooth Network Performance Through A Time-Slot Leasing Approach
Improving Bluetooth Network Performance Through A Time-Slot Leasing Approach Wensheng Zhang, Hao Zhu, and Guohong Cao Department of Computer Science and Engineering The Pennsylvania State University University
More informationWireless Personal Area Networks (WPANs)
Wireless Personal Area Networks (WPANs) Bluetooth, ZigBee Contents Introduction to the IEEE 802 specification family Concept of ISM frequency band Comparison between different wireless technologies ( and
More informationEfficient Energy Consumption and Exponential Computing in Bluetooth
Pers Ubiquit Comput (2003) 7: 91 101 DOI 10.1007/s00779-003-0233-z ORIGINAL ARTICLE Frank Siegemund Æ Michael Rohs Rendezvous layer protocols for Bluetooth-enabled smart devices Received: 14 January 2003
More informationWireless Home Networks based on a Hierarchical Bluetooth Scatternet Architecture
Wireless Home Networks based on a Hierarchical Bluetooth Scatternet Architecture W. Lilakiatsakun'. 2, A. Seneviratne' I School of Electrical Engineering and Telecommunication University of New South Wales,
More informationBluetooth voice and data performance in 802.11 DS WLAN environment
1 (1) Bluetooth voice and data performance in 802.11 DS WLAN environment Abstract In this document, the impact of a 20dBm 802.11 Direct-Sequence WLAN system on a 0dBm Bluetooth link is studied. A typical
More informationTDM & FDM Overlays on Bluetooth
TDM & FDM Overlays on Bluetooth Abdelshakour Abuzneid, Sarosh Patel Viqar U.Mohammed, Varun Kumar Godula Department of Computer Science & Engineering University of Bridgeport {abuzneid, saroshp,vmohamme,vgodula}@bridgeport.edu
More informationBlueMesh: Degree-Constrained Multi-Hop Scatternet Formation for Bluetooth Networks
Mobile Networks and Applications 9, 33 47, 2004 2004 Kluwer Academic Publishers. Manufactured in The Netherlands. BlueMesh: Degree-Constrained Multi-Hop Scatternet Formation for Bluetooth Networks CHIARA
More informationDevice and Service Discovery in Bluetooth Networks
Master Thesis MEE 01-28 Device and Service Discovery in Bluetooth Networks & This thesis is presented as a part of the Master of Science degree in Electrical Engineering with emphasis on Telecommunication
More informationWireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN:
WLAN: Wireless LAN Make use of a wireless transmission medium Tipically restricted in their diameter: buildings, campus, single room etc.. The global goal is to replace office cabling and to introduce
More informationProfessur Technische Informatik Prof. Dr. Wolfram Hardt. Network Standards. and Technologies for Wireless Sensor Networks. Karsten Knuth 16.07.
Network Standards and Technologies for Wireless Sensor Networks Karsten Knuth 16.07.2008 Index 1. Motivation 2. Introduction 3. Bluetooth 4. ZigBee 5. nanonet 6. Roundup 16.07.2008 Network Standards 2
More informationCSE331: Introduction to Networks and Security. Lecture 6 Fall 2006
CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)
More informationMonitoring for Handover from TDD to GSM
Agenda Item: Source: Title: Document for: Siemens Monitoring for Handover from TDD to GSM Handover Preparation Monitoring for Handover from TDD to GSM The intention of this document is an explanation of
More informationA Mechanism for Quick Bluetooth Device Discovery
Mechanism for Quick luetooth Device Discovery Jehn-Ruey Jiang, ing-rong Lin, and Yu-Chee Tseng Department of Information Management Hsuan-Chuang University, Taiwan Department of Computer Science and Information
More informationWi-Fi and Bluetooth - Interference Issues
Wi-Fi and Bluetooth - Interference Issues January 2002 1 Introduction Because both Wi-Fi and Bluetooth wireless technology share spectrum and will often be located in close physical proximity to one another,
More informationCS263: Wireless Communications and Sensor Networks
CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA
More informationAttenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction
Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit
More informationDevice Discovery in Short-Range Wireless Ad Hoc Networks
Device Discovery in Short-Range Wireless Ad Hoc Networks Petar Popovski Tatiana Kozlova Liljana Gavrilovska Ramjee Prasad Center for Personkommunikation, Aalborg University Fredrik Bajers Vej 7A5, DK-922
More informationTecnologías Inalámbricas.
Tecnologías Inalámbricas. Why is Wireless Security Different? There are four major differences for wireless services: Bandwidth Allowable error rates Latency Power Constraints Secure Mobile Devices Characteristics
More informationRapid Heterogeneous Connection Establishment: Accelerating Bluetooth Inquiry Using IrDA
Rapid Heterogeneous Connection Establishment: Accelerating Bluetooth Inquiry Using IrDA Ryan Woodings, Derek Joos, Trevor Clifton, Charles D. Knutson Department of Computer Science Brigham Young University
More informationSELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS
SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS Sonia Waharte, Kevin Ritzenthaler and Raouf Boutaba University of Waterloo, School of Computer Science 00, University Avenue West,
More informationZIGBEE 802.15.4. ECGR-6185 Advanced Embedded Systems. Charlotte. University of North Carolina-Charlotte. Chaitanya Misal Vamsee Krishna
ECGR-6185 Advanced Embedded Systems ZIGBEE 802.15.4 University of North Carolina-Charlotte Charlotte Chaitanya Misal Vamsee Krishna WPAN A personal area network (PAN) is a computer network used for communication
More informationWPAN. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Bluetooth (IEEE 802.15.1) Network topology FHSS operation Link delivery services System architecture & protocols Usage models ZigBee (IEEE 802.15.4) Network topology Physical layer operation CSMA/CA
More informationScatternet - Part 1 Baseband vs. Host Stack Implementation. White paper
Scatternet - Part 1 Baseband vs. Host Stack Implementation White paper Ericsson Technology Licensing June 2004 Contents 1....Abstract 3 2.... Introduction 4 3.... Scatternet user case 5 4.... Interoperability
More informationWI-FI VS. BLUETOOTH TWO OUTSTANDING RADIO TECHNOLOGIES FOR DEDICATED PAYMENT APPLICATION
WI-FI VS. BLUETOOTH TWO OUTSTANDING RADIO TECHNOLOGIES FOR DEDICATED PAYMENT APPLICATION Ingenico is often asked: what are the differences between Bluetooth and Wi-Fi technologies, which is the best one,
More informationCellular Analysis of Network Adhoc Networks, Adaptive Algorithms and Mean Discovery
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 1, NO. 11, NOVEMBER 2006 1 Adaptive Energy Conserving Algorithms for Neighbor Discovery in Opportunistic Bluetooth Networks Catalin Drula, Cristiana
More informationENHANCING MOBILE PEER-TO-PEER ENVIRONMENT WITH NEIGHBORHOOD INFORMATION
ENHANCING MOBILE PEER-TO-PEER ENVIRONMENT WITH NEIGHBORHOOD INFORMATION Arto Hämäläinen and Jari Porras Lappeenranta University of Technology Laboratory of Communications Engineering P.O. Box 20 53851
More informationFast and Energy Efficient Neighbour Discovery for Opportunistic Networking with Bluetooth
Fast and Energy Efficient Neighbour Discovery for Opportunistic Networking with Bluetooth by Cătălin Drulă A thesis submitted in conformity with the requirements for the degree of Master of Science Graduate
More informationProbabilistic Protocols for Node Discovery in Ad Hoc Multi-channel Broadcast Networks
Probabilistic Protocols for Node Discovery in Ad Hoc Multi-channel Broadcast Networks G Alonso 1, E Kranakis 2, C Sawchuk 2, R Wattenhofer 1, and P Widmayer 1 1 Department of Computer Science, Swiss Federal
More informationEPL 657 Wireless Networks
EPL 657 Wireless Networks Some fundamentals: Multiplexing / Multiple Access / Duplex Infrastructure vs Infrastructureless Panayiotis Kolios Recall: The big picture... Modulations: some basics 2 Multiplexing
More informationEnhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation
Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation Changsu Suh, Young-Bae Ko, and Jai-Hoon Kim Graduate School of Information and Communication, Ajou University, Republic of Korea
More informationEETS 8316 Wireless Networks Fall 2013
EETS 8316 Wireless Networks Fall 2013 Lecture: WiFi Discovery, Powersave, and Beaconing http://lyle.smu.edu/~skangude/eets8316.html Shantanu Kangude skangude@lyle.smu.edu Discovery and Beaconing Discovery?
More informationNew protocol concept for wireless MIDI connections via Bluetooth
Wireless MIDI over Bluetooth 1 New protocol concept for wireless MIDI connections via Bluetooth CSABA HUSZTY, GÉZA BALÁZS Dept. of Telecommunications and Media Informatics, Budapest University of Technology
More informationAccelerating Service Discovery in Ad-hoc Zero Configuration Networking
Accelerating Service Discovery in Ad-hoc Zero Configuration Networking Se Gi Hong, Suman Srinivasan and Henning Schulzrinne Columbia University, New York, NY {segihong, sumans, hgs}@cs.columbia.edu Abstract
More informationHow To Make A Multi-User Communication Efficient
Multiple Access Techniques PROF. MICHAEL TSAI 2011/12/8 Multiple Access Scheme Allow many users to share simultaneously a finite amount of radio spectrum Need to be done without severe degradation of the
More informationElectromagnetic Spectrum (3kHz 300GHz)
Wireless Communication Serial communication Allocated a frequency of operation Could be a range of frequencies Regulated by FCC (Federal Communications Commission) in US Unfortunately, allocations are
More informationPERFORMANCE ANALYSIS OF THE IEEE 802.15.4 BASED ECG MONITORING NETWORK
PERFORMANCE ANALYSIS OF THE IEEE 802.15.4 BASED ECG MONITORING NETWORK Xuedong Liang 1,2 1 Department of Informatics University of Oslo Oslo, Norway email: xuedonl@ifi.uio.no Ilangko Balasingham 2 2 The
More informationPerformance Evaluation of a Bluetooth Channel Estimation Algorithm
Performance Evaluation of a Bluetooth Channel Estimation Algorithm N. Golmie National Institute of Standards and Technology Gaithersburg, Maryland 2899 Abstract Since Bluetooth devices have to share the
More informationTCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL
1. Local Area Networks TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL These are networks spanning relatively short distances (e.g. within one building) for local point-to-point and point-to-multipoint
More informationA Non-beaconing ZigBee Network Implementation and Performance Study
A Non-beaconing ZigBee Network Implementation and Performance Study Magnus Armholt Email: magnus.armholt@tut.fi Sakari Junnila Email: sakari.junnila@tut.fi Irek Defee Email: irek.defee@tut.fi Abstract
More informationRapid Prototyping of a Frequency Hopping Ad Hoc Network System
Rapid Prototyping of a Frequency Hopping Ad Hoc Network System Martin Braun, Nico Otterbach, Jens Elsner, and Friedrich K. Jondral Communications Engineering Lab, Karlsruhe Institute of Technology (KIT),
More informationImplementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks
Implementation of a Lightweight Advertisement and Discovery Protocol for Mobile Ad hoc Networks Wenbin Ma * Department of Electrical and Computer Engineering 19 Memorial Drive West, Lehigh University Bethlehem,
More informationAlgorithms for Interference Sensing in Optical CDMA Networks
Algorithms for Interference Sensing in Optical CDMA Networks Purushotham Kamath, Joseph D. Touch and Joseph A. Bannister {pkamath, touch, joseph}@isi.edu Information Sciences Institute, University of Southern
More informationTCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)
TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) *Slides adapted from a talk given by Nitin Vaidya. Wireless Computing and Network Systems Page
More informationITL BULLETIN FOR AUGUST 2012
ITL BULLETIN FOR AUGUST 2012 SECURITY OF BLUETOOTH SYSTEMS AND DEVICES: UPDATED GUIDE ISSUED BY THE NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY (NIST) Shirley Radack, Editor Computer Security Division
More informationProtocolo IEEE 802.15.4. Sergio Scaglia SASE 2012 - Agosto 2012
Protocolo IEEE 802.15.4 SASE 2012 - Agosto 2012 IEEE 802.15.4 standard Agenda Physical Layer for Wireless Overview MAC Layer for Wireless - Overview IEEE 802.15.4 Protocol Overview Hardware implementation
More informationPEDAMACS: Power efficient and delay aware medium access protocol for sensor networks
PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks Sinem Coleri and Pravin Varaiya Department of Electrical Engineering and Computer Science University of California,
More informationDynamic Source Routing in Ad Hoc Wireless Networks
Dynamic Source Routing in Ad Hoc Wireless Networks David B. Johnson David A. Maltz Computer Science Department Carnegie Mellon University 5000 Forbes Avenue Pittsburgh, PA 15213-3891 dbj@cs.cmu.edu Abstract
More informationDynamic Reconfiguration & Efficient Resource Allocation for Indoor Broadband Wireless Networks
Dynamic Reconfiguration & Efficient Resource Allocation for Indoor Broadband Wireless Networks Tim Farnham, Brian Foxon* Home Communications Department HP Laboratories Bristol HPL-98-123 June, 1998 broadband,
More informationLecture 17: 802.11 Wireless Networking"
Lecture 17: 802.11 Wireless Networking" CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Lili Qiu, Nitin Vaidya Lecture 17 Overview" Project discussion Intro to 802.11 WiFi Jigsaw discussion
More information... neither PCF nor CA used in practice
IEEE 802.11 MAC CSMA/CA with exponential backoff almost like CSMA/CD drop CD CSMA with explicit ACK frame added optional feature: CA (collision avoidance) Two modes for MAC operation: Distributed coordination
More informationMOBILE devices with short range wireless network. Adaptive Energy Conserving Algorithms for Neighbor Discovery in Opportunistic Bluetooth Networks
96 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 25, NO. 1, JANUARY 2007 Adaptive Energy Conserving Algorithms for Neighbor Discovery in Opportunistic Bluetooth Networks Catalin Drula, Cristiana
More informationRouting Protocol for Mobile Ad-hoc Wireless Networks
86 I. M. BACARREZA NOGALES, ROUTING PROTOCOL FOR MOBILE AD-HOC WIRELESS NETWORKS Routing Protocol for Mobile Ad-hoc Wireless Networks Ivris Marcelo BACARREZA NOGALES Dept. of Radio Electronics, Czech Technical
More informationAdaptive DCF of MAC for VoIP services using IEEE 802.11 networks
Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks 1 Mr. Praveen S Patil, 2 Mr. Rabinarayan Panda, 3 Mr. Sunil Kumar R D 1,2,3 Asst. Professor, Department of MCA, The Oxford College of Engineering,
More informationVHICLE-TO-VEHICLE (V2V) communication can promote
THE IEEE FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT TRANSPORTATION SYSTEMS Space Division Multiple Access (SDMA) for Robust Ad hoc Vehicle Communication Networks Soheila V. Bana, Pravin Varaiya Abstract
More informationWireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman
1 Wireless Networks Reading: Sec5on 2.8 COS 461: Computer Networks Spring 2011 Mike Freedman hep://www.cs.princeton.edu/courses/archive/spring11/cos461/ 2 Widespread Deployment Worldwide cellular subscribers
More informationCHAPTER 1 1 INTRODUCTION
CHAPTER 1 1 INTRODUCTION 1.1 Wireless Networks Background 1.1.1 Evolution of Wireless Networks Figure 1.1 shows a general view of the evolution of wireless networks. It is well known that the first successful
More informationChapter 6 Bandwidth Utilization: Multiplexing and Spreading 6.1
Chapter 6 Bandwidth Utilization: Multiplexing and Spreading 6.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Note Bandwidth utilization is the wise use of
More informationOptimal Network Discovery Period for Energy- Efficient WLAN Offloading
Optimal Network Discovery Period for Energy- Efficient WLAN Offloading Dionysia Triantafyllopoulou, Tao Guo, and Klaus Moessner Centre for Communication Systems Research University of Surrey Guildford,
More informationWireless Local Area Networking For Device Monitoring
Wireless Local Area Networking For Device Monitoring by Colin Goldsmith Supervised By Professor Wendi Heinzelman A thesis submitted in partial fulfillment of the Requirements for the Degree of Masters
More informationFigure 1: cellular system architecture
Question 1: (30 marks) Consider a FDM cellular system with 120 cites, a frequency reuse factor of N=12, and 900 overall two-way channels. Omni-directional antennas are used: Figure 1 shows some of the
More informationBehavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
More informationADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks
ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks Surjya Ray, Ilker Demirkol and Wendi Heinzelman Department of Electrical and Computer Engineering University of Rochester, Rochester,
More informationCROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
More informationSmartDiagnostics Application Note Wireless Interference
SmartDiagnostics Application Note Wireless Interference Publication Date: May 27, 2015 KCF Technologies, Inc. Background The SmartDiagnostics wireless network is an easy to install, end-to-end machine
More informationWiLink 8 Solutions. Coexistence Solution Highlights. Oct 2013
WiLink 8 Solutions Coexistence Solution Highlights Oct 2013 1 Products on market with TI connectivity 2004 2007 2009-11 2013 Use cases: BT voice, WLAN data Features: TDM based operation Strict protection
More informationIN THIS PAPER, we study the delay and capacity trade-offs
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 5, OCTOBER 2007 981 Delay and Capacity Trade-Offs in Mobile Ad Hoc Networks: A Global Perspective Gaurav Sharma, Ravi Mazumdar, Fellow, IEEE, and Ness
More informationCS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs)
CS6956: Wireless and Mobile Networks Lecture Notes: //05 IEEE 80. Wireless Local Area Networks (WLANs) CSMA/CD Carrier Sense Multi Access/Collision Detection detects collision and retransmits, no acknowledgement,
More informationGSM and Similar Architectures Lesson 07 GSM Radio Interface, Data bursts and Interleaving
GSM and Similar Architectures Lesson 07 GSM Radio Interface, Data bursts and Interleaving 1 Space Division Multiple Access of the signals from the MSs A BTS with n directed antennae covers mobile stations
More informationDynamic Load Balance Algorithm (DLBA) for IEEE 802.11 Wireless LAN
Tamkang Journal of Science and Engineering, vol. 2, No. 1 pp. 45-52 (1999) 45 Dynamic Load Balance Algorithm () for IEEE 802.11 Wireless LAN Shiann-Tsong Sheu and Chih-Chiang Wu Department of Electrical
More informationVersion Date Author Changes - 6/24/2005 D. Liff Initial draft and release 1.0 11/18/2005 K. Adkins Minor spelling and format changes 1.
1 Version Date Author Changes - 6/24/2005 D. Liff Initial draft and release 1.0 11/18/2005 K. Adkins Minor spelling and format changes 1.1 08/19/2008 D. Liff Added 802.11.n information 1.2 11/09/2010 J.
More informationFig 1 Death rate in the last four years
Accident Prevention via Bluetooth Jyotika Kapur Abstract-In India there has been an increase of 17.4% in the total number of road accidents during the period of 2011-2012.This percentage has raised eyebrows
More informationWIRELESS INSTRUMENTATION TECHNOLOGY
BS&B WIRELESS, L.L.C. BS&B WIRELESS, L.L.C. WIRELESS INSTRUMENTATION TECHNOLOGY Printed February 2004 BS&B WIRELESS, L.L.C. 7422-B East 46th Place, Tulsa, OK74145 Phone: 918-622-5950 Fax: 918-665-3904
More informationLog-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network
Recent Advances in Electrical Engineering and Electronic Devices Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network Ahmed El-Mahdy and Ahmed Walid Faculty of Information Engineering
More informationWireless LAN Concepts
Wireless LAN Concepts Wireless LAN technology is becoming increasingly popular for a wide variety of applications. After evaluating the technology, most users are convinced of its reliability, satisfied
More informationIEEE 802.15.1 Simulation and BER Analysis under the Interference
IEEE 802.15.1 Simulation and BER Analysis under the Interference Zahir Aalam, S Vhatkar, B. K. Mishra Thakur College of Engineering & Technology, Kandivali (E), Mumbai 101, M.S. India ABSTRACT There is
More informationother. A B AP wired network
1 Routing and Channel Assignment in Multi-Channel Multi-Hop Wireless Networks with Single-NIC Devices Jungmin So + Nitin H. Vaidya Department of Computer Science +, Department of Electrical and Computer
More informationRecent technological innovations and declining prices for personal computers (PCs) and
Chapter 2 Bluetooth Transmission Technology 2.1 Introduction Recent technological innovations and declining prices for personal computers (PCs) and wireless phones are resulting in an emerging trend coined
More informationComputer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
More informationHello viewers, welcome to today s lecture on cellular telephone systems.
Data Communications Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture minus 31 Cellular Telephone Systems Hello viewers, welcome to today s lecture
More informationLoRaWAN. What is it? A technical overview of LoRa and LoRaWAN. Technical Marketing Workgroup 1.0
LoRaWAN What is it? A technical overview of LoRa and LoRaWAN Technical Marketing Workgroup 1.0 November 2015 TABLE OF CONTENTS 1. INTRODUCTION... 3 What is LoRa?... 3 Long Range (LoRa )... 3 2. Where does
More informationScheduling Enhanced Beacons in the IEEE 802.15.4e MAC for fast network formation
Scheduling Enhanced Beacons in the IEEE 802.15.4e MAC for fast network formation Elvis Vogli, Giuseppe Ribezzo, Luigi Alfredo Grieco, Gennaro Boggia Department of Electrical and Information Engineering
More informationInternational Journal of Advanced Research in Computer Science and Software Engineering
Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Survey on
More information3GPP Wireless Standard
3GPP Wireless Standard Shishir Pandey School of Technology and Computer Science TIFR, Mumbai April 10, 2009 Shishir Pandey (TIFR) 3GPP Wireless Standard April 10, 2009 1 / 23 3GPP Overview 3GPP : 3rd Generation
More informationAn Overview of ZigBee Networks
An Overview of ZigBee Networks A guide for implementers and security testers Matt Hillman Contents 1. What is ZigBee?... 3 1.1 ZigBee Versions... 3 2. How Does ZigBee Operate?... 3 2.1 The ZigBee Stack...
More informationCustomer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4
Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4 Michael Binhack, sentec Elektronik GmbH, Werner-von-Siemens-Str. 6, 98693 Ilmenau, Germany Gerald Kupris, Freescale Semiconductor
More informationHow To Understand The Gsm And Mts Mobile Network Evolution
Mobile Network Evolution Part 1 GSM and UMTS GSM Cell layout Architecture Call setup Mobility management Security GPRS Architecture Protocols QoS EDGE UMTS Architecture Integrated Communication Systems
More informationRole of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network
International Journal of Electronics Engineering, 3 (2), 2011, pp. 283 286 Serials Publications, ISSN : 0973-7383 Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network Gopindra
More informationContinuous network discovery using Opportunistic Scanning
Continuous network discovery using Opportunistic Scanning Authors: Date: 2009-11-17 Slide 1 Abstract This presentation is in response to WNG requesting more information on the capability of 802.11 to support
More informationNOVEL PRIORITISED EGPRS MEDIUM ACCESS REGIME FOR REDUCED FILE TRANSFER DELAY DURING CONGESTED PERIODS
NOVEL PRIORITISED EGPRS MEDIUM ACCESS REGIME FOR REDUCED FILE TRANSFER DELAY DURING CONGESTED PERIODS D. Todinca, P. Perry and J. Murphy Dublin City University, Ireland ABSTRACT The goal of this paper
More informationBluetooth Packet Sniffing Using Project Ubertooth. Dominic Spill dominicgs@gmail.com
Bluetooth Packet Sniffing Using Project Ubertooth Dominic Spill dominicgs@gmail.com Dominic Spill Bluesniff: Eve meets Alice and Bluetooth Usenix WOOT 07 Building a Bluetooth monitor Shmoo/Defcon/Toorcamp
More informationBluetooth networking to get data to a central data sink
Bluetooth networking to get data to a central data sink By: Bradley Clayton Supervised by: Alfredo Terzoli and Peter Wentworth http://www.cs.ru.ac.za/research/students/g01c2974/ g01c2974@campus.ru.ac.za
More informationDesign and Implementation of Ad-hoc Communication and Application on Mobile Phone Terminals
Design and Implementation of Ad-hoc Communication and Application on Mobile Phone Terminals Yujin Noishiki Hidetoshi Yokota Akira Idoue KDDI R&D Laboratories, Inc. 2-1-15 Ohara, Fujimino-Shi, Saitama,
More informationRESOURCE ALLOCATION FOR INTERACTIVE TRAFFIC CLASS OVER GPRS
RESOURCE ALLOCATION FOR INTERACTIVE TRAFFIC CLASS OVER GPRS Edward Nowicki and John Murphy 1 ABSTRACT The General Packet Radio Service (GPRS) is a new bearer service for GSM that greatly simplify wireless
More informationExpress Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh
Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh, Ph.D. benveniste@ieee.org Mesh 2008, Cap Esterel, France 1 Abstract Abundant hidden node collisions and correlated channel access
More information