Bluetooth networking to get data to a central data sink



Similar documents
Development of a new service using Wi-Fi Direct

Mobile Devices: Server and Management Lesson 05 Service Discovery

9-1-1 FREQUENTLYASKED QUESTIONS

Analysis of Methods for Mobile Device Tracking. David Nix Chief Scientific Advisor

Hello viewers, welcome to today s lecture on cellular telephone systems.

Design and Implementation of Ad-hoc Communication and Application on Mobile Phone Terminals

SSVP SIP School VoIP Professional Certification

Dynamic Source Routing in Ad Hoc Wireless Networks

Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing.

Discovering Computers Chapter 9 Communications and Networks

Performance of Symmetric Neighbor Discovery in Bluetooth Ad Hoc Networks

SPYTEC 3000 The system for GSM communication monitoring

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring Mike Freedman

Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks

EPL 657 Wireless Networks

Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation

1. What is the main difference between the X3 micro and other Bluetooth headsets? 3. How does the X3 micro use the Bluetooth technology?

A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE

NEWSLETTER. So the world didn t end...what now? Psychic Medium Carmel Joy Baird. Many people were preparing for the end of the world

Device Discovery in Short-Range Wireless Ad Hoc Networks

Mapping of Services on Bluetooth Radio Networks

Wireless Broadband Access

Version 2.3. Operations Manual for Users, Agents and Merchants

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES

Chapter 9. Communications and Networks. McGraw-Hill/Irwin. Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved.

Wireless Ethernet LAN (WLAN) General a/802.11b/802.11g FAQ

Cellular Analysis for Legal Professionals Larry E. Daniel Digital Forensic Examiner and Cellular Analyst EnCE, DFCP, BCE, ACE, CTNS, AME

A Study of Network assisted Device-to- Device Discovery Algorithms, a Criterion for Mode Selection and a Resource Allocation Scheme

Wireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN:

Guideline for stresstest Page 1 of 6. Stress test

A First Course in Wireless Networks and Telecommunication Systems Aslam Safla

- Cognitive Radio (CR) technology is a promising emerging technology that enables a more efficient usage of

VTOL UAV. Design of the On-Board Flight Control Electronics of an Unmanned Aerial Vehicle. Árvai László, ZMNE. Tavaszi Szél 2012 ÁRVAI LÁSZLÓ, ZMNE

Dynamic Load Balance Algorithm (DLBA) for IEEE Wireless LAN

SSVVP SIP School VVoIP Professional Certification

Electromagnetic Spectrum (3kHz 300GHz)

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

Bluetooth for device discovery. Networking Guide

HOW W I R E L E S S T E C H N O L O G Y WORKS

From Self-Organising Mechanisms to Design Patterns

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

EETS 8316 Wireless Networks Fall 2013

Bluetooth wireless technology basics

Bluetooth 4.0 Solutions for Apple ios Devices. Bluegiga Technologies

Hybrid Energy Efficient Distributed Protocol for Heterogeneous Wireless Sensor Network

Fumigation.com (408)

Nokia Call Connect v1.1 for Cisco User s Guide. Part Number: N Rev 003 Issue 1

Cid Santos Luis Matos. Introduction to AllJoyn

Metrics for Detection of DDoS Attacks

The Mobile app. Introduction. Phones that support the Mobile app. In this section

IST STREP Project. Deliverable D3.3.1u Middleware User s Guide Multi-Radio Device Management Layer.

CELL PHONE FACTS AND TIPS

Self-completion surveys via mobile phones

Wireless LAN Concepts

Networking 4 Voice and Video over IP (VVoIP)

User Manual GSM Alarm System. All rights reserved by Delta Security Co., Ltd

Improving SCADA Operations Using Wireless Instrumentation

RMON, the New SNMP Remote Monitoring Standard Nathan J. Muller

Nomadic Positioning Services for a Mobile Services Platform

Indoor Triangulation System. Tracking wireless devices accurately. Whitepaper

ProCurve Networking. Troubleshooting WLAN Connectivity. Technical White paper

Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007.

Implementation of Virtual Local Area Network using network simulator

From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks. Loreto Pescosolido

International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 3, Issue 6, June 2014

CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012

English version. Installation Windows XP and Vista. LW311 Sweex Wireless LAN Cardbus Adapter 300 Mbps

SECURE COMMUNICATIONS Crypto products

Bluetooth usage with Architecture view & security measures

Hosts Address Auto Configuration for Mobile Ad Hoc Networks

Development of a GSM based Control System for Electrical Appliances

ECE/CS 372 introduction to computer networks. Lecture 13

ENABLING WIRELESS DATA COMMUNICATION IN CONSTRUCTION MANAGEMENT SYSTEM

The ALERT OPC SERVER enables you, among other things, to monitor the application, data servers, tags, tag groups, users and groups.

REMOTE TELEMETRY UNITS FOR CONTINUOUS WATER QUALITY MONITORING: AN EXAMPLE FROM SILVERSTREAM LANDFILL Mike Millar, Geotechnics Ltd ABSTRACT

Security in Ad Hoc Network

About Me" List of Lectures" In This Course" Mobile and Sensor Systems. Lecture 1: Introduction to Wireless Systems" " Dr. Cecilia Mascolo" "

Response Time Analysis

SERVICE DISCOVERY AND MOBILITY MANAGEMENT

Guide to Wireless Communications. Digital Cellular Telephony. Learning Objectives. Digital Cellular Telephony. Chapter 8

A mobile monitoring and alert SMS system with remote configuration A case study for android and the fused location provider

Achieving Energy Efficiency in MANETs by Using Load Balancing Approach

How GPS works? WHAT IS GPS? HOW TRACKING WORKS?

Transcription:

Bluetooth networking to get data to a central data sink By: Bradley Clayton Supervised by: Alfredo Terzoli and Peter Wentworth http://www.cs.ru.ac.za/research/students/g01c2974/ g01c2974@campus.ru.ac.za Recap What do we want to do? + = Collect interactions between animals Using short range Bluetooth radios Using Ad-hoc networks to collect data from animals Focus of this project: Focus on the data collection at strategic points (watering holes) Advantages of Bluetooth: Low power consumption Data capabilities Small in size 1

Current Tracking Technologies VHF, GPS, GMS or GPS and GSM Large and heavy Consume a large amount of power Transmits a simple signal over a long distance Human probe effect Is hindered by trees above an animal Transmits over a long range Relies on nearby cell phone towers Collars are big Pin-points an exact location but does not tell us who else was there. Current Tracking Technologies Little Bluetooth Robots Bluetooth enabled Robots Let loose in a 1000x1000cm room Position information was exchanged via scatternets Collisions depended on the performance of the scatternet 2

Piconets Piconets 3

Scatternets Shared Termonology: The Degree of a device is the number of piconets to which the device belongs. Piconets and Scatternets 4

Migration and Merging Shared Migration and Merging Shared 5

Migration and Merging Migration and Merging 6

Identified Risk and Outcomes RISKS: Will we be able to get the windows Bluetooth SDK to work with our r devices? Will we be able to get into Bluetooth and have full control over it? The Widcomm SDK looks like the only option with the devices we have. h Will it work? Will we have to control Piconets and Scatternets ourselves? Will the current state of Bluetooth technology support what we want w to do? Outcomes: No, And the Windows SDK only allows basic Bluetooth profiles and sockets. Yes! Yes! The Widcomm SDK allowed us to make use of all the Bluetooth profiles as well as access to different levels of the Bluetooth stack. No. Bluetooth devices collect them self s s into Piconets and Scatternets on their own. Is this a good or a bad thing? Stay tuned! More happened before we found the answer to this question. The AWIS Simulator Developed while we did not have an SDK Simulates our system Enables us to scale the system Tested our communication algorithms and gave us an idea on how we should develop the real system when we finally found a suitable SDK 7

The AWIS Simulator Simulated Variables: Battery Life Memory Sizes Rate of generated redundant data Random movement of devices Encounter collection protocols The AWIS Tag The client side of the network Is tied to an animal Collects and swaps encounters (Adam s area of research) Deposits encounters at upload stations via piconets and scatternets 8

The AWIS Tag Device inquiry Service Discovery Notes Upload and AWISTag services Check if the Upload service was found AND if we have any closed encounters Send the encounters to the upload station An encounter can be in one of four states, Open, Closed, Uploaded and Deleted. The Upload Station Advertise the upload service and wait Allow a connecting client (AWISTag( AWISTag) Accept closed encounters from the client Send these closed encounters, via TCP/IP, to a central point. 9

The Final System Will the current state of Bluetooth technology support what we want to do? YES! We are successfully realizing encounters through the use of Bluetooth inquiries. And we are successfully depositing closed encounters. 10

BUT Not all the time It takes 10 seconds to do a proper Bluetooth device inquiry It takes 2 or more seconds to do a service discovery on each inquired device It takes 10 to 40 seconds to upload closed encounters to an access point. Sometimes devices, although physically present, are not found during the inquiry Sometimes services, although present, are not discovered. In conclusion Our system works! Bluetooth does not broadcast data like a LAN. Animals need to stay put for a while. There is a risk that encounter data can be lost. Lost encounter data may not be noted However, redundancy does reduce encounter loss. 11

In conclusion We now have a good understanding of Bluetooth. Bluetooth is getting better all the time. Bluetooth standards need to be followed a little better. More data management can be written into the AWIS system to counter these small issues. Makes nice future improvement work. Any Questions? 12