Performance of Symmetric Neighbor Discovery in Bluetooth Ad Hoc Networks
|
|
|
- Rosamund Johnston
- 10 years ago
- Views:
Transcription
1 Performance of Symmetric Neighbor Discovery in Bluetooth Ad Hoc Networks Diego Bohman, Matthias Frank, Peter Martini, Christoph Scholz Institute of Computer Science IV, University of Bonn, Römerstraße 164, D Bonn {bohman matthew martini Abstract: Ad hoc networking with Bluetooth requires an efficient way of discovering neighbor devices. Based on real-world measurements and simulations we are deriving optimal parameters for symmetric ad hoc neighbor discovery using standard Bluetooth procedures. 1 Introduction Bluetooth is one of the candidate technologies for the implementation of wireless mobile ad hoc networks (MANETs). The first step of building ad hoc networks with any technology of course is neighbor discovery. Unlike the popular WLAN technology ad hoc neighbor discovery with Bluetooth is a non-trivial task due to the frequency hopping MAC scheme of Bluetooth. This paper presents simulation and measurement results that show how to optimally use the standard neighbor discovery procedures of Bluetooth in order to perform ad hoc symmetric neighbor discovery. The experiments were performed with recent Bluetooth hardware conforming to Bluetooth version 1.1 (cf. [Blu1]). Previous work on Bluetooth network formation (e.g. [ZBC1], [WTH2], [TMGB2]) concentrates on the network formation protocol and the resulting topology but does not discuss the underlying neighbor discovery method. To our best knowledge this is the first work that optimizes Bluetooth neighbor discovery using real-world devices. 2 Bluetooth Neighbor Discovery Procedures The frequency hopping MAC makes neighbor discovery with Bluetooth significantly more complex than with single-channel technologies such as WLAN. As every device hops independently through the frequency space, a device that wants to discover its neighbors does not know which frequency to send on. Therefore, the Bluetooth specification ([Blu1]) defines the so-called inquiry procedure which helps to overcome this frequency uncertainty.
2 2.1 Standard Neighbor Discovery The inquiry procedure defined for Bluetooth is an asymmetric process: A device that wants to be discoverable enters the inquiry scan mode whereas the other device enters the inquiry mode in order to discover its neighbors. Inquiry is conducted on 32 of the 79 Bluetooth frequencies. Devices in inquiry scan mode listen on a fixed frequency which is changed every 1.28 s. As the discovering device does not know which frequency its neighbors are currently on, it repeatedly cycles through 16 frequencies f i [f center 7,f center +8]around a certain center frequency f center. This set of frequencies is called a train. If the device to be discovered happens to listen on one of the 16 frequencies of train A then it may receive so-called ID packets from the discovering device. Depending on the clock offset between the two devices it may be necessary for the discovering device to switch from train A to train B which includes the other 16 frequencies. The discovering device switches trains every 2.56 s. The overall duration of the inquiry procedure consists of two major components: a frequency synchronization delay and a random backoff. If both devices are on the same train, it will last at most 16 slots (1 ms) until the discovering device hits the correct frequency. Otherwise, up to 2.56 s have to pass in order for the discovering device to switch to the correct train B. Before sending an inquiry response, the scanning device enters a random backoff period, which may last up to 64 ms. 2.2 Symmetric Neighbor Discovery Classical Bluetooth applications assume predefined roles for individual devices which at the same time leads to predefined neighbor discovery roles. For example, in an access point scenario it is usually the mobile device that tries to discover access points by using the inquiry procedure while access points make themselves discoverable by periodically turning on inquiry scan mode. In contrast to this, in ad hoc networking situations usually all devices are assumed to be equal. This demands for a symmetric method of neighbor discovery. Note that it is not sufficient to simply turn on inquiry periodically since intervals between two devices might align so badly that discovery between devices may take arbitrarily long or fail altogether (cf. [SBTL1]). Salonidis et al. (cf. [SBTL1]) present and analyze a symmetric method for neighbor discovery where each device consecutively switches between the inquiry and inquiry scan mode. The residence time in each mode is a random variable that has been assumed to be either uniform or exponential. Salonidis et al. analytically derived that an expected neighbor discovery time of about 1 s would be feasible if the mean residence time was set to 6 ms. However, these findings could not be verified in practice using current devices conforming to the Bluetooth specification version 1.1 (cf. [Blu1]). This is due to the fact that Salonidis et al. did not take the existence of two different inquiry trains (cf. section 2.1)
3 into account. In real life the sender (performing inquiry) sometimes needs to wait for 2.56 s until it starts sending on the correct inquiry train and even gets a chance to find the other device. The random inquiry mode process for the symmetric neighbor discovery is visualized in figure 1. We assume that the time a device stays in a phase (inquiry or inquiry scan) consists of a fixed part (min phase) and a variable part (var phase). In contrast to min phase (which is a fixed value) var phase is a random variable distributed either uniformly or exponentially. The mean value of var phase is denoted as var mean. Figure 1: Random inquiry mode process. 3 Simulation Study and Experimental Results Section 2.2 clearly showed that the symmetric Bluetooth neighbor discovery process is more complex than assumed by Salonidis et al. in [SBTL1]. According to these authors a mean neighbor discovery time of about 1 s is claimed to be achievable. This section presents simulation as well as measurement results revealing that the neighbor discovery time with real Bluetooth hardware is significantly higher. Furthermore, optimal parameters for the random inquiry mode process (cf. section 2.2) are derived. 3.1 Scenario The experimental setup consists of two USB Bluetooth devices from MSI which include a BlueCore2 chip from CSR with recent firmware. These devices independently switch between inquiry and inquiry scan mode according to the chosen inquiry mode process. The neighbor discovery delay is measured as the time between starting the random process on the first device and discovery of the second device by the first one. In order to find optimal parameters, a simplified simulation environment was created that enabled us to explore a larger parameter space very quickly. This simulation very accurately models the inquiry and inquiry scan procedures of Bluetooth version 1.1 including the different inquiry trains and the random backoff. However, it does not model all the details down to the slot level which means that e.g. radio interference effects are ignored.
4 3.2 Results Figure 2 shows experimental and simulation results for the mean neighbor discovery time using a uniform distribution for var phase. The simulation model seems to match reality quite accurately. Note that the mean neighbor discovery time stays above 4 s until min phase + 2var mean exceeds 2.56 s. This is due to the fact that in this case only inquiry train A is activated by the sender and thus only 5% of all neighbor discoveries are successful. Unsuccessful neighbor discoveries have been accounted for with 15 s in both the simulation as well as the experimental study. Figure 3 shows measurement and simulation results with min phase fixed to.25 s with the uniform and exponential distribution for var phase. The exponential distribution performs better for var mean between.5 and 2 s. This is due to the fact that the exponential distribution has no upper bound and thus train B is used in some cases even for low valuesofvarmean. However, for var mean larger than 2 s both distributions show similar performances. mean neighbor discovery time [s] simulation measurement min_phase [s] var_mean [s] Figure 2: Mean neighbor discovery time: Simulation and measurement results. In order to obtain best results for the neighbor discovery delay it is advisable to select a small value for min phase (e.g..25 s) and a value between 2 s and 3 s for var mean. This yields average neighbor discovery delays of about 8 s. 4 Summary and Further Work Simulation and experimental results for the symmetric neighbor discovery in Bluetooth ad hoc networks have been presented. It has been shown that the simulation matches reality quite accurately. The results allowed us to derive optimal parameters that lead to a mean neighbor discovery delay of about 8 s.
5 7 6 min_phase =.25 s uniform (simulation) exponential (simulation) uniform (measurement) exponential (measurement) mean neighbor discovery time [s] var_mean [s] Figure 3: Mean neighbor discovery time: Simulation and measurement results for uniform and exponential distribution of var phase. Future work will use these results to implement and analyze automatic network formation algorithms for Bluetooth ad hoc networks. Furthermore, it will be very interesting to also study the improved neighbor discovery scheme of the current Bluetooth version 1.2 (cf. [Blu3]). References [Blu1] Bluetooth SIG: Specification of the Bluetooth System - Version 1.1, Specification Volume 1 & 2. February 21. [Blu3] Bluetooth SIG: Specification of the Bluetooth System - Version 1.2, Specification Volumes 3. November 23. [SBTL1] Salonidis, T., Bhagwat, P., Tassiulas, L., and LaMaire, R.: Distributed Topology Construction of Bluetooth Personal Area Networks. In: Proceedings of the 2 th Annual Joint Conference of the IEEE Computer and Communications Societies, INFOCOM 21. Anchorage, AL, USA. April 21. [TMGB2] Tan, G., Miu, A., Guttag, J., and Balakrishnan, H.: An Efficient Scatternet Formation Algorithm for Dynamic Environments. In: Proc. of IASTED International Conference on Communications and Computer Networks, CCN 22. Cambridge, MA, USA. November 22. [WTH2] Wang, Z., Thomas, R., and Haas, Z.: Bluenet A New Scatternet Formation Scheme. In: Proceedings of the 35 th Annual Hawaii International Conference on System Sciences, HICSS 2. volume 2. Big Island, Hawaii. January 22. [ZBC1] Záruba, G., Basagni, S., and Chlamtac, I.: BlueTrees Scatternet Formation to Enable Bluetooth-Based Personal Area Networks. In: Proceedings of the IEEE International Conference on Communications, ICC 21. Helsinki, Finland. June 21.
- Cognitive Radio (CR) technology is a promising emerging technology that enables a more efficient usage of
An Asynchronous Neighbor Discovery Algorithm for Cognitive Radio Networks Short Paper Chanaka J. Liyana Arachchige, S. Venkatesan and Neeraj Mittal Erik Jonsson School of Engineering and Computer Science
CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006
CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)
Routing Protocol for Mobile Ad-hoc Wireless Networks
86 I. M. BACARREZA NOGALES, ROUTING PROTOCOL FOR MOBILE AD-HOC WIRELESS NETWORKS Routing Protocol for Mobile Ad-hoc Wireless Networks Ivris Marcelo BACARREZA NOGALES Dept. of Radio Electronics, Czech Technical
Device Discovery in Short-Range Wireless Ad Hoc Networks
Device Discovery in Short-Range Wireless Ad Hoc Networks Petar Popovski Tatiana Kozlova Liljana Gavrilovska Ramjee Prasad Center for Personkommunikation, Aalborg University Fredrik Bajers Vej 7A5, DK-922
MultiNet: Connecting to Multiple IEEE 802.11 Networks Using a Single Wireless Card
MultiNet: Connecting to Multiple IEEE 802.11 Networks Using a Single Wireless Card Ranveer Chandra, Paramvir Pahl, Pradeep Bahl Cornell University & Microsoft Corp. Presented by Liang Chen Ideas Link 1
PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks
PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks Sinem Coleri and Pravin Varaiya Department of Electrical Engineering and Computer Science University of California,
Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4
Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4 Michael Binhack, sentec Elektronik GmbH, Werner-von-Siemens-Str. 6, 98693 Ilmenau, Germany Gerald Kupris, Freescale Semiconductor
Accelerating Service Discovery in Ad-hoc Zero Configuration Networking
Accelerating Service Discovery in Ad-hoc Zero Configuration Networking Se Gi Hong, Suman Srinivasan and Henning Schulzrinne Columbia University, New York, NY {segihong, sumans, hgs}@cs.columbia.edu Abstract
Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation
Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation Changsu Suh, Young-Bae Ko, and Jai-Hoon Kim Graduate School of Information and Communication, Ajou University, Republic of Korea
An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks
An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks Ayon Chakraborty 1, Swarup Kumar Mitra 2, and M.K. Naskar 3 1 Department of CSE, Jadavpur University, Kolkata, India 2 Department of
A Link-state QoS Routing Protocol for Ad Hoc Networks
A Link-state QoS Routing Protocol for Ad Hoc Networks Anelise Munaretto 1 Hakim Badis 2 Khaldoun Al Agha 2 Guy Pujolle 1 1 LIP6 Laboratory, University of Paris VI, 8, rue du Capitaine Scott, 75015, Paris,
Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks
Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks 1 Mr. Praveen S Patil, 2 Mr. Rabinarayan Panda, 3 Mr. Sunil Kumar R D 1,2,3 Asst. Professor, Department of MCA, The Oxford College of Engineering,
Wireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN:
WLAN: Wireless LAN Make use of a wireless transmission medium Tipically restricted in their diameter: buildings, campus, single room etc.. The global goal is to replace office cabling and to introduce
Multi-service Load Balancing in a Heterogeneous Network with Vertical Handover
1 Multi-service Load Balancing in a Heterogeneous Network with Vertical Handover Jie Xu, Member, IEEE, Yuming Jiang, Member, IEEE, and Andrew Perkis, Member, IEEE Abstract In this paper we investigate
ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks
ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks Surjya Ray, Ilker Demirkol and Wendi Heinzelman Department of Electrical and Computer Engineering University of Rochester, Rochester,
DeuceScan: Deuce-Based Fast Handoff Scheme in IEEE 802.11 Wireless Networks
: Deuce-Based Fast Handoff Scheme in IEEE 82.11 Wireless Networks Yuh-Shyan Chen, Chung-Kai Chen, and Ming-Chin Chuang Department of Computer Science and Information Engineering National Chung Cheng University,
Prediction of DDoS Attack Scheme
Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and
CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs)
CS6956: Wireless and Mobile Networks Lecture Notes: //05 IEEE 80. Wireless Local Area Networks (WLANs) CSMA/CD Carrier Sense Multi Access/Collision Detection detects collision and retransmits, no acknowledgement,
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS Reza Azizi Engineering Department, Bojnourd Branch, Islamic Azad University, Bojnourd, Iran [email protected]
SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS
SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS Sonia Waharte, Kevin Ritzenthaler and Raouf Boutaba University of Waterloo, School of Computer Science 00, University Avenue West,
Performance Evaluation of Priority based Contention- MAC in Mobile Ad-Hoc Networks
International Journal of Computer Applications (975 7) Volume 5 No.1, June 11 Performance Evaluation of Priority based Contention- MAC in Mobile Ad-Hoc Networks Soni Sweta Arun Nahar Sanjeev Sharma ABSTRACT
CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS
137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of
Logitech Advanced 2.4 GHz Technology
Logitech Advanced 2.4 GHz Technology Revision 1.1H March 2, 2009 TABLE OF CONTENTS 1 INTRODUCTION... 3 2 SYSTEM OVERVIEW... 4 2.1 NETWORK TOPOLOGY...4 2.2 MAIN FEATURES...4 3 ASSOCIATION MODEL... 5 4 ENCRYPTION...
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.
Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]
Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction
Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit
Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network
International Journal of Electronics Engineering, 3 (2), 2011, pp. 283 286 Serials Publications, ISSN : 0973-7383 Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network Gopindra
A TCP-like Adaptive Contention Window Scheme for WLAN
A TCP-like Adaptive Contention Window Scheme for WLAN Qixiang Pang, Soung Chang Liew, Jack Y. B. Lee, Department of Information Engineering The Chinese University of Hong Kong Hong Kong S.-H. Gary Chan
Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software
Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
Fibonacci Backoff Algorithm for Mobile Ad Hoc Networks
Fibonacci Backoff Algorithm for Mobile Ad Hoc Networks Saher S Manaseer Mohamed Ould-Khaoua Lewis M Mackenzie Department of Computing Science University of Glasgow, Glasgow G 8RZ, UK {saher, mohamed, lewis}@dcs.gla.ac.uk
Quick Start Guide v1.0. This Quick Start Guide is relevant to Laird s BT800, BT810 and BT820 Bluetooth modules.
v1.0 This is relevant to Laird s BT800, BT810 and BT820 Bluetooth modules. INTRODUCTION The Linux operating system, and Android by extension, has excellent USB support for a variety of devices. This makes
MAC Algorithms in Wireless Networks
Department of Computing Science Master Thesis MAC Algorithms in Wireless Networks Applications, Issues and Comparisons Shoaib Tariq Supervisor: Dr. Jerry Eriksson Examiner: Dr. Per Lindström Dedicated
Wireless Home Networks based on a Hierarchical Bluetooth Scatternet Architecture
Wireless Home Networks based on a Hierarchical Bluetooth Scatternet Architecture W. Lilakiatsakun'. 2, A. Seneviratne' I School of Electrical Engineering and Telecommunication University of New South Wales,
A Mobility Tolerant Cluster Management Protocol with Dynamic Surrogate Cluster-heads for A Large Ad Hoc Network
A Mobility Tolerant Cluster Management Protocol with Dynamic Surrogate Cluster-heads for A Large Ad Hoc Network Parama Bhaumik 1, Somprokash Bandyopadhyay 2 1 Dept. of Information Technology, Jadavpur
Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR
Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR GUIDOUM AMINA University of SIDI BEL ABBES Department of Electronics Communication Networks,
Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks
Implementation of a Lightweight Advertisement and Discovery Protocol for Mobile Ad hoc Networks Wenbin Ma * Department of Electrical and Computer Engineering 19 Memorial Drive West, Lehigh University Bethlehem,
CSMA/CA. Information Networks p. 1
Information Networks p. 1 CSMA/CA IEEE 802.11 standard for WLAN defines a distributed coordination function (DCF) for sharing access to the medium based on the CSMA/CA protocol Collision detection is not
Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow
International Journal of Soft Computing and Engineering (IJSCE) Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow Abdullah Al Masud, Hossain Md. Shamim, Amina Akhter
Voice Service Support over Cognitive Radio Networks
Voice Service Support over Cognitive Radio Networks Ping Wang, Dusit Niyato, and Hai Jiang Centre For Multimedia And Network Technology (CeMNeT), School of Computer Engineering, Nanyang Technological University,
TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)
TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) *Slides adapted from a talk given by Nitin Vaidya. Wireless Computing and Network Systems Page
Wireless Personal Area Networks (WPANs)
Wireless Personal Area Networks (WPANs) Bluetooth, ZigBee Contents Introduction to the IEEE 802 specification family Concept of ISM frequency band Comparison between different wireless technologies ( and
A VIRTUALIZATION ARCHITECTURE FOR WIRELESS NETWORK CARDS
A VIRTUALIZATION ARCHITECTURE FOR WIRELESS NETWORK CARDS A Dissertation Presented to the Faculty of the Graduate School of Cornell University in Partial Fulfillment of the Requirements for the Degree of
Protocol Design for Neighbor Discovery in AD-HOC Network
International Journal of Electronic and Electrical Engineering. ISSN 0974-2174 Volume 7, Number 9 (2014), pp. 915-922 International Research Publication House http://www.irphouse.com Protocol Design for
Professur Technische Informatik Prof. Dr. Wolfram Hardt. Network Standards. and Technologies for Wireless Sensor Networks. Karsten Knuth 16.07.
Network Standards and Technologies for Wireless Sensor Networks Karsten Knuth 16.07.2008 Index 1. Motivation 2. Introduction 3. Bluetooth 4. ZigBee 5. nanonet 6. Roundup 16.07.2008 Network Standards 2
Dynamic Load Balance Algorithm (DLBA) for IEEE 802.11 Wireless LAN
Tamkang Journal of Science and Engineering, vol. 2, No. 1 pp. 45-52 (1999) 45 Dynamic Load Balance Algorithm () for IEEE 802.11 Wireless LAN Shiann-Tsong Sheu and Chih-Chiang Wu Department of Electrical
A Study of Network assisted Device-to- Device Discovery Algorithms, a Criterion for Mode Selection and a Resource Allocation Scheme
A Study of Network assisted Device-to- Device Discovery Algorithms, a Criterion for Mode Selection and a Resource Allocation Scheme ANASTASIOS THANOS KTH Information and Communication Technology Master
... neither PCF nor CA used in practice
IEEE 802.11 MAC CSMA/CA with exponential backoff almost like CSMA/CD drop CD CSMA with explicit ACK frame added optional feature: CA (collision avoidance) Two modes for MAC operation: Distributed coordination
Logitech Advanced 2.4 GHz Technology With Unifying Technology
Logitech Advanced 2.4 GHz Technology Revision 070709 July 7, 2009 TABLE OF CONTENTS 1 INTRODUCTION: THE MOVE TO WIRELESS PERIPHERALS IN BUSINESS...3 2 SYSTEM OVERVIEW...4 2.1 NETWORK TOPOLOGY...4 2.2 MAIN
How To Determine The Capacity Of An 802.11B Network
Capacity of an IEEE 802.11b Wireless LAN supporting VoIP To appear in Proc. IEEE Int. Conference on Communications (ICC) 2004 David P. Hole and Fouad A. Tobagi Dept. of Electrical Engineering, Stanford
RESOURCE ALLOCATION FOR INTERACTIVE TRAFFIC CLASS OVER GPRS
RESOURCE ALLOCATION FOR INTERACTIVE TRAFFIC CLASS OVER GPRS Edward Nowicki and John Murphy 1 ABSTRACT The General Packet Radio Service (GPRS) is a new bearer service for GSM that greatly simplify wireless
A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks
1 A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks Yang Song, Bogdan Ciubotaru, Member, IEEE, and Gabriel-Miro Muntean, Member, IEEE Abstract Limited battery capacity
Performance Evaluation of The Split Transmission in Multihop Wireless Networks
Performance Evaluation of The Split Transmission in Multihop Wireless Networks Wanqing Tu and Vic Grout Centre for Applied Internet Research, School of Computing and Communications Technology, Glyndwr
EETS 8316 Wireless Networks Fall 2013
EETS 8316 Wireless Networks Fall 2013 Lecture: WiFi Discovery, Powersave, and Beaconing http://lyle.smu.edu/~skangude/eets8316.html Shantanu Kangude [email protected] Discovery and Beaconing Discovery?
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET MR. ARVIND P. PANDE 1, PROF. UTTAM A. PATIL 2, PROF. B.S PATIL 3 Dept. Of Electronics Textile and Engineering
Tecnologías Inalámbricas.
Tecnologías Inalámbricas. Why is Wireless Security Different? There are four major differences for wireless services: Bandwidth Allowable error rates Latency Power Constraints Secure Mobile Devices Characteristics
Scalable Source Routing
Scalable Source Routing January 2010 Thomas Fuhrmann Department of Informatics, Self-Organizing Systems Group, Technical University Munich, Germany Routing in Networks You re there. I m here. Scalable
Survey on Load balancing protocols in MANET S (mobile ad-hoc networks)
Survey on Load balancing protocols in MANET S (mobile ad-hoc networks) Ramandeep Kaur 1, Gagandeep Singh 2, Sahil Vashist 3 1 M.tech Research Scholar, Department of Computer Science & Engineering, Chandigarh
Intelligent Agents for Routing on Mobile Ad-Hoc Networks
Intelligent Agents for Routing on Mobile Ad-Hoc Networks Y. Zhou Dalhousie University [email protected] A. N. Zincir-Heywood Dalhousie University [email protected] Abstract This paper introduces a new agent-based
WPAN. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Bluetooth (IEEE 802.15.1) Network topology FHSS operation Link delivery services System architecture & protocols Usage models ZigBee (IEEE 802.15.4) Network topology Physical layer operation CSMA/CA
TDM & FDM Overlays on Bluetooth
TDM & FDM Overlays on Bluetooth Abdelshakour Abuzneid, Sarosh Patel Viqar U.Mohammed, Varun Kumar Godula Department of Computer Science & Engineering University of Bridgeport {abuzneid, saroshp,vmohamme,vgodula}@bridgeport.edu
Rapid Prototyping of a Frequency Hopping Ad Hoc Network System
Rapid Prototyping of a Frequency Hopping Ad Hoc Network System Martin Braun, Nico Otterbach, Jens Elsner, and Friedrich K. Jondral Communications Engineering Lab, Karlsruhe Institute of Technology (KIT),
NOVEL PRIORITISED EGPRS MEDIUM ACCESS REGIME FOR REDUCED FILE TRANSFER DELAY DURING CONGESTED PERIODS
NOVEL PRIORITISED EGPRS MEDIUM ACCESS REGIME FOR REDUCED FILE TRANSFER DELAY DURING CONGESTED PERIODS D. Todinca, P. Perry and J. Murphy Dublin City University, Ireland ABSTRACT The goal of this paper
Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh
Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh, Ph.D. [email protected] Mesh 2008, Cap Esterel, France 1 Abstract Abundant hidden node collisions and correlated channel access
Performance Evaluation of the IEEE 802.11p WAVE Communication Standard
Performance Evaluation of the IEEE 8.p WAVE Communication Standard Stephan Eichler ([email protected]), Institute of Communication Networks, Technische Universität München Abstract In order to provide Dedicated
Influences of Communication Disruptions on Decentralized Routing in Transport Logistics
Influences of Communication Disruptions on Decentralized Routing in Transport Logistics Bernd Scholz-Reiter, Christian Zabel BIBA Bremer Institut für Produktion und Logistik GmbH University of Bremen Hochschulring
Lecture 17: 802.11 Wireless Networking"
Lecture 17: 802.11 Wireless Networking" CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Lili Qiu, Nitin Vaidya Lecture 17 Overview" Project discussion Intro to 802.11 WiFi Jigsaw discussion
Dynamic Source Routing in Ad Hoc Wireless Networks
Dynamic Source Routing in Ad Hoc Wireless Networks David B. Johnson David A. Maltz Computer Science Department Carnegie Mellon University 5000 Forbes Avenue Pittsburgh, PA 15213-3891 [email protected] Abstract
PulsON RangeNet / ALOHA Guide to Optimal Performance. Brandon Dewberry, CTO
TIME DOMAIN PulsON RangeNet / ALOHA Guide to Optimal Performance Brandon Dewberry, CTO 320-0318A November 2013 4955 Corporate Drive, Suite 101, Huntsville, Alabama 35805 Phone: 256.922.9229 Fax: 256.922.0387
EPL 657 Wireless Networks
EPL 657 Wireless Networks Some fundamentals: Multiplexing / Multiple Access / Duplex Infrastructure vs Infrastructureless Panayiotis Kolios Recall: The big picture... Modulations: some basics 2 Multiplexing
On the Synchronization of Co-Located IEEE 802.15.4 Networks for IoT Applications
On the Synchronization of Co-Located IEEE 802.15.4 Networks for IoT Applications Falko Dressler and Noorsalwati Nordin Dept. of Computer Science, University of Paderborn, Germany Institute of Computer
Medium Access Control with Dynamic Frame Length in Wireless Sensor Networks
Journal of Information Processing Systems, Vol.6, No.4, December 2010 DOI : 10.3745/JIPS.2010.6.4.501 Medium Access Control with Dynamic Frame Length in Wireless Sensor Networks Dae-Suk Yoo* and Seung
other. A B AP wired network
1 Routing and Channel Assignment in Multi-Channel Multi-Hop Wireless Networks with Single-NIC Devices Jungmin So + Nitin H. Vaidya Department of Computer Science +, Department of Electrical and Computer
Bluetooth voice and data performance in 802.11 DS WLAN environment
1 (1) Bluetooth voice and data performance in 802.11 DS WLAN environment Abstract In this document, the impact of a 20dBm 802.11 Direct-Sequence WLAN system on a 0dBm Bluetooth link is studied. A typical
mlab: A Mobile Ad Hoc Network Test Bed
mlab: A Mobile Ad Hoc Network Test Bed A. Karygiannis and E. Antonakakis National Institute of Standards and Technology {karygiannis, manos}@nist.gov Abstract Over the last few years, research in the area
Low-rate TCP-targeted Denial of Service Attack Defense
Low-rate TCP-targeted Denial of Service Attack Defense Johnny Tsao Petros Efstathopoulos University of California, Los Angeles, Computer Science Department Los Angeles, CA E-mail: {johnny5t, pefstath}@cs.ucla.edu
Location-Aided Routing (LAR) in mobile ad hoc networks
Wireless Networks 6 (2000) 307 321 307 Location-Aided Routing (LAR) in mobile ad hoc networks Young-Bae Ko and Nitin H. Vaidya Department of Computer Science, Texas A&M University, College Station, TX
CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
