Providing Mobile LAN Access Capability for Bluetooth Devices

Size: px
Start display at page:

Download "Providing Mobile LAN Access Capability for Bluetooth Devices"

Transcription

1 Providing Mobile LAN Access Capability for Devices Shih-Yen Chiu Hsung-Pin Chang Department of Computer and Information Science National Chiao Tung University Hsinchu, Taiwan, ROC Ruei-Chuan Chang Abstract In this paper, we design and implement a system with mobile LAN access capability. First, by adding a virtual network interface card (NIC) driver between IP and protocol stack, users can use their devices to access the LAN resources via the access points. Besides, to accommodate with the mobility characteristics in network, we also propose a new handoff scheme. Instead of passively waiting for a handoff indication by the expiration of link supervision timer, in this paper, we detect a handoff actively and promptly by measuring the RSSI (Receive Signal Strength Indication) value. In addition, our proposed handoff scheme eliminates the inquiry procedure and only requires paging procedure during a handoff. We have implemented a prototype of system with mobile LAN access capability by our proposed scheme. Experimented results show that the handoff duration is significant reduced than the normal scheme. 1. Introduction With the tremendous progress of personal mobile communication technologies, wireless communication devices are becoming smaller and cheaper to be portable and affordable for a wide range of end users. is such a wireless communication standard that provides cheap but powerful communication technology [4-5]. As stated in [4], network is intended following the vision of a truly low-cost, low-power, single chip radio-based cable replacement. Therefore, the specification is proposed to get ride of the cumbersome cable connections and configuration procedures to facilitate on-demand connectivity among devices. Nevertheless, devices would also be connected to local area networks (LAN) via access point. Thus, clients not only get wireless access to the information provided locally but even access to the resource resided in the internet, such as printing, file storage etc. In this paper, we design and implement a system with mobile LAN access capability. Although a LAN access profile is provided in specification [5], however, a RFCOMM layer must be implemented to emulate a serial line on top of protocol stack. Then, the Point-to-Point protocol (PPP) is performed over RFCOMM to allow TCP/IP operating on the network. In other words, the cable replacement scenario and dialup network mechanism are combined to provide with LAN access capability. However, this would result in an extra overhead since the introduction of two protocol layers, PPP and RFCOMM. Besides, the dialup network cannot deal with roaming as the link of PPP is assumed static. As the mobility characteristics of devices, users may move between different access points. Therefore, how to minimize the handoff duration poses a challenge in the design of a system. As mentioned above, LAN access profile does not take the user mobility into consideration since, in dialup network, the link is assumed fixed. Thus, in [2], the authors proposed a handoff approach that uses role switch scheme to minimize the handoff duration. Nevertheless, in their proposed scheme, the handoff duration involves inquiry and paging procedures and, unfortunately, the inquiry procedure is very time consuming. Besides, they rely on the expiration of supervision timer to detect a possible handoff. However, it is difficult to select a suitable supervision timer value. Furthermore, their system is built on an emulation system that the link is emulated over an Ethernet connection. In this paper, we first design and implement a system with LAN access capability. Instead of using the LAN access profile, we insert a virtual NIC driver between IP and protocol stack (). Thus, the device can pretends itself as an Ethernet adaptor to the upper layer protocols and applications. Consequently, legacy applications can access the LAN resources over devices without any modification. Besides, to accommodate with the mobility characteristics of users, a new handoff scheme is proposed that only demands paging procedure during handoff. As a result, handoff duration can be significantly reduced. In addition, in previous approach, they reply on the expiration of link supervision timer to detect a possible handoff. However, it is not easy to select a suitable value of link supervision timer. In this paper,

2 instead of passively waiting the handoff procedure to be invoked by the timeout of supervision timer, we make use of the RSSI (Receive Signal Strength Indication) mechanism to actively and promptly detect a handoff once the link strength is detected weak. The remainder of this paper is organized as follows. In Section 2, we give a brief introduction of technology. Section 3 reviews the related work. The implementation of virtual NIC driver and proposed handoff scheme are presented in Section 4. Section 5 gives the experimental results. Finally, Section 6 summarizes this paper and provides future work. 2. Overview is a low-power, low-cost and short-range wireless communication technology in the 2.4 GHz ISM (Industrial, Scientific and Medical) RF band. uses FHSS (Frequency Hopping Spread Spectrum) scheme with hoping rate of 1,600 hops per second to minimize the effects of signal interference. The transmission range is 10 meters and can be extended up to 100 meters by providing a power amplifier. can offer a speed up to 1Mbps. To identify the identity of a device, each device has a 48-bit BD ( Device) address, which has the same length as the MAC (Media Access Control) address of IEEE 802.x family. Communication between devices follows a strict master-slave scheme. Each master device can have up to 7 active slaves and forms a so-called piconet. Between each master-slave pair, two different links can be provided. One is the SCO (Synchronous Connection Oriented) and the other is the ACL (Asynchronous Connectionless Link) link. The SCO link is typically used for voice communication and ACL link is used for data communication. For ACL links, a slave can transmit packets only after the master sends a packet addressed to it. Note that, slaves cannot transmit packets directly, i.e., the communication between slaves must go through the master device indirectly. Further introduction of technology can be seen in [3, 8-9] Specification The 1.1 specification, which is released in February 2001, consists of two parts: core and profiles Core Specification. Figure 1 shows the protocol stack. The RF (Radio Frequency) defines the physical characteristics of the RF link, e.g., channel arrangement, permissible transmit power levels, and receiver sensitivity level. The baseband specification defines the device discovery, link formation, and synchronous and asynchronous communication with peer host. To provide a reliable wireless link, fast ARQ (Automatic Repeat Request), CRC (Cyclic Redundancy Check) and FEC (Forward Error Correction) are combined with the frequency hopping scheme in Baseband to detect and resolve packet errors or loses during transmission. A pplication RFCOMM Audio Data SDP HCI Link M anager Basband RF Control LM P Figure 1. Protocol Stack The Link Manager uses the LMP (Link Manager Protocol) to manage the physical link by negotiating and configuring the parameters of a physical link. The (Logical Link Control and Adaption Protocol) is responsible for providing logical links to the upper layer protocols. The tasks it deals with include SAR (Segmentation and Reassembly), protocol multiplexing and negotiation of QoS (Quality of Services) parameters. HCI (Host Command Interface) is the interfaceindependent command interface between hosts and devices. Thus, the software stack on the host can communicate with the hardware via the HCI commands. However, if all of the protocols are included in a single chip, e.g. the control chip of a wireless keyboard, the can directly control the Link Manager to manage the physical link and HCI layer is unnecessary. The RFCOMM protocol emulates a serial line and thus legacy protocols and applications that use the COM port for communication can use the devices with no or little modification Profile Specification. After the specification of core network protocol stack, a variety of applications can then uses the services offered by the stack to provide devices with diverse functionality and capacity. For interoperability issues, SIG thus defines 13 profile specifications to facilitate interoperability [5]. In this section, we focus on the LAN access profile.

3 ME Application TCP/UDP PPP IP SDP RFCOMM LMP Baseband LMP PPP Network PPP SDP RFCOMM Baseband ME LAN Figure 2. LAN access Profile Application TCP/UDP IP LAN As stated above, uses RFCOMM to emulate a serial line, i.e., RS-232 cable connection, on top of protocol stack to allow legacy applications continuous operating over the devices. LAN access profile utilizes this feature and then introduces PPP to run on top of RFCOMM since PPP expects a serial line interface from the lower layer. Figure 2 shows the protocol stack in the LAN access profile. The left is a host, the middle is a access point and the right is a machine in the local area network. As PPP provides a packet-oriented interface to the upper layer, TCP/IP protocol stacks can be supported on top of PPP. In other words, TCP/IP protocol stack utilizes the underlying PPP and RFCOMM as the link and physical layers for transmission. Notably, RFCOMM just emulate a serial line while the actual physical transmission is via the wireless network. Thus, LAN access profile incorporates the dialup network with the protocol stack to achieve LAC access capability. 2.2 Buletooth Discovery and Connection Procedure The Baseband Specification defines point-to-point connection establishment as a two-step procedures [4]. First, the inquiry procedure is used to discover other devices. Then the paging procedure is subsequently used to synchronize these two devices. Once the paging process is completed, the device moves to the connection state. The inquiry procedure is an asymmetric process; it involves two types of nodes each performing different actions. We call these two types of nodes as sender and receiver. To find a device, the sender will move into the inquiry state that generates an inquiry hopping sequence and broadcasts inquiry messages. Notably, the hopping sequence is based on the local device s clock and the chosen inquiry access code. In contrast, to be discoverable from sender, receivers will periodically enter the inquiry scan state that hop according to the inquiry scan hopping sequence, which is also derived from the local clock and inquiry access code. Once the receiver performing the inquiry scan receives the inquiry message, it replies with a response message after a random backoff to avoid collision from other devices. The response message includes the receiver s BD address and internal clock setting, which is used by the following paging procedure. Similar to the inquiry procedure, paging procedure is also an asymmetric process. The sender enters the paging state while the receiver enters the paging scan mode. Different from the inquiry procedure, the page message is unicasted to the receiver since the receiver s BD address and clock setting has been obtained from the inquiry procedure. In contrast, the sender must broadcast the inquiry message. As a result, the reply to a page message does not require a random backoff delay. After the completion of paging procedure, these two devices are synchronized and move to the connection state. As stated in the Bleutooth specification, the inquiry state may have to last for seconds unless the inquiry collects enough response and determines to abort the inquiry state earlier [4]. The formula of how to derive the value of can be seen in [4, 13]. In order words, in an error-free environment, inquiry procedure would at most spend seconds to discover the desired devices, which is unacceptable during handoff. In contrast, if the paging procedure is activated immediately after the inquiry procedure, which is the normal case during connection establishment, the duration of a paging procedure is around 1~2 second [4, 13]. Thus, compared with the inquiry procedure, the duration of paging procedure is quite short. 3. Related Work In 1999, Albrecht et al. proposed the mobility issues on OSI layer 3 for a network [1]. In the proposed scheme, they use Cellular IP [12] to solve the micro mobility problem and Mobile IP for macro mobility. In 2000, they further proposed the solution to the layer 2 mobility [2]. When a device wants to anticipate a piconet, it performs the inquiry and paging procedure to find the access point and synchronize with it. On the contrary, the access point has to periodically enter inquiry scan mode and page scan mode to respond to the new anticipated device. Therefore, during the establishment of a connection, a mobile host acts as a master while access points act as slaves (Here, we assume the sender is a master and receiver is a slave). This is because that the inquiry and paging states take a substantial amount of time compared to the inquiry scan and paging scan states and,

4 during this time, none of the slave devices can send or receive data. Thus, if the access point acts as a master, this would result in a long silence time interval that none of any slave host can send/receive packets. After the connection is established, a role switch is performed that the mobile host becomes a slave and the access point becomes the master to coordinate the communication in its piconet. However, in their proposed scheme, hosts will face a substantial amount of link broken time since the inquiry procedure is very time consuming. Besides, they rely on the link supervision timer to detect a possible handoff. Once the timer is expired, they assume a handoff is occurred. Nevertheless, it is difficult to determine a suitable value for the timer. A too small value would tear down a connection too early while a too large value would regard a broken link as still alive and increase the handoff duration. Since device discovery is a time-intensive phase of the connection establishment procedure, in [13], the authors proposed the use of IrDA (Infrared Data Association) to accelerate the connection establishment. In their proposed scheme, an IrDA connection is first established between two devices both equipped with IrDA capability. Then, the device discovery information is exchanged via the established IrDA connection. As a result, the device can bypass the time-intensive device discovery procedure. However, IrDA has its limitation in that it is short distance and requires line-of-sight between devices. Besides, both access point and devices must both equip with IrDA capability. 4. Design and Implementation In this section, we present the design and implementation of providing mobile LAN access capability for devices. Section 4.1 introduces the mechanism to provide LAN access capability for users. In Section 4.2, the proposed handoff algorithm is presented Providing LAN Access Capability for Devices To reduce the extra overhead of protocol processing in PPP and RFCOMM, in this paper, a more efficient approach is adopted that runs the TCP/IP protocol stack directly on top of protocol stack, which is similar to the solution in [2]. By adding a virtual network interface card (NIC) driver, which is called BTH ( Ethernet) in the paper, between IP and, TCP/IP BTH(MH) HCI Linux Protocol Stack Virtual NIC Driver Protocol Stack TCP/IP BTH(AP) HCI Figure 3. The proposed protocol stack for LAN access capability the IP packets can then be sent/received by the device. Figure 3 shows the integrated protocol stack. BTH thus hides the specific details from TCP/IP and pretends itself as an Ethernet device driver, while the actual communication is via the network. Therefore, IP packets are sent to the BTH and BTH uses the logical link provided by to transmit these packets. According to the different roles between devices and access points, the function of BTH between device and access point is distinct and is called as BTH(MH) and BTH(AP) respectively. For BTH(MH), once a packet is received, instead of triggering a interrupt, the will call the callback function which is registered before by the BTH(MH) to indicate the BTH(MH) the arrival of a new packet. Then, the BTH(MH) calls the receive function provided by to read the packet. If a packet is sent from upper layer, the BTH(MH) just call the send function provided by to transmit this packet. For BTH(AP), besides the function provided in BTH(MH), it must read the address field and decide how to forward this packet. If the packet is destined to a machine in LAN, the access point will forward the packet to the local area network. In contrast, if the packet is addressed to one of the devices, the access point forwards this packet to the corresponding device. If the packet is addressed to the access point itself, the packet is processed as described in BTH(MH). As a result, our approach gives a more efficient way to provide LAN access capability for device Handoff Scheme Before describing the proposed handoff algorithm, we first disclose the composition of handoff duration in a network. The duration of a handoff can be split into three phases:

5 I. Detect a broken link that indicates a possible handoff. II. Search for a new access point to reconnect by the inquiry procedure. III. Synchronize to the new access point by paging procedure. Paging procedure is necessary for synchronization with the new access point. Besides, as stated in Section 2, the duration of paging procedure is quite short compared with inquiry procedure. Thus, we strive to eliminate the time to detect a broken link and the inquiry procedure. is not intended to behave as a cellular system that provides fast and seamless handoff scheme. There is no beacon mechanism that can tell mobile clients in which cell they currently reside. Thus, in [2], a device recognizes a possible handoff passively if a link is detected broken by the expiration of link supervision timer. However, it is difficult to select a suitable value for link supervision timer. A too small value will cause a short silence to be considered as a handoff and perform the unnecessary paging and inquiry procedures. In contrast, a too large value will result in a late response to a handoff. provides a RSSI mechanism for determining the current link s signal strength. Thus, instead of passive waiting for the link supervision timer expires, we detect the handoff actively by periodically querying the RSSI value of a link in the access point. Once the value is smaller than a predefined threshold, an ongoing handoff is then detected. Besides, inquiry procedure is time consuming and, if it can be omitted, handoff duration can be significantly reduced. Figure 4 shows the steps of a handoff. Once a handoff is detected by access point, it disconnects the link with the mobile host (1). Then, this access point broadcasts the BD address of the host to the neighboring access points (2). After that, the neighboring access points tries to reconnect to the roaming host by the paging procedure (3).Once a paging succeeds, this access point will inform other access points to stop their paging procedures. (1) Access Point 1 (2) Mobile Device (3) Access Point 2 5. Experimental Results In this section, the performance of the system with LAN access capability is evaluated. The experimental platform is shown in Table 1. Both the access point and mobile host run on the Linux Kernel Besides, the Linux Kernel of access point is patched with Linux Ethernet Bridging for forwarding functionality Handoff Duration The handoff time has a significant impact to the protocols (e.g. TCP/IP) and user applications above protocol stack [6]. A shorter handoff time can result in a better system performance. The handoff duration is measured from the disconnection of a link to the reconnection of the link. We ignore the time of broadcast handoff messages from one access point to the other access point since it incurred very little overhead. The average handoff time is seconds TCP Performance in the Network Second, we measure the TCP performance in the Network by Netperf benchmark [10-11]. Figure 5 shows the TCP processing performance (transaction/second) between a device and a access point. The y-axis represents that ratio of send packet size to response packet size. In Figure 6, we measure the response time of ping application. Although the handoff time is in average, however, the TCP will encounter a further degraded performance. This is because that the slow start and exponential backoff design methodology of TCP. Thus, researchers are strives to propose schemes to improve TCP performance during handoff. Some literatures addressed this issue can be seen in [6-7]. Hardware Specificaiton Access Point 1 Access Point 2 Table 1. The experimental platform. CPU Ethernet Network Adaptor Celeron 566 (RAM 128 MB) Pentium 120 (RAM 64MB) Mobile Host Pentium II 300 (RAM 32MB) Ne2000 Compatible Network Adapter Ne2000 Compatible Network Adapter N.A. Module Ericsson Module(RS232) Ericsson Module(RS232) Ericsson Module(RS232)

6 Figure 5. Throughput improvement under different number of random requests Figure 6. Throughput improvement under different number of sequential requests 6. Conclusions and Future Work In this paper, we design and implement a system with mobile LAN access capability. First, to resolve the drawbacks of LAN access profile, we implement a virtual NIC driver to provide users with LAN access capability. Then, a handoff scheme is proposed that eliminates the inquiry procedure, which is the most time consuming procedure during handoff. Besides, instead of using the supervision timer to detect a possible handoff, the proposed handoff scheme uses the RSSI mechanism to detect an ongoing handoff actively and promptly. However, in our proposed scheme, the paging procedure is performed in the access point and the data transmission activity is ceasing during this duration since the access point acts as a master in its piconet. In contrast, if a module having the role switch capability is available, the paging procedure would be performed in the mobile stations as proposed in [2]. Nevertheless, the Ericsson module does not have the role switch ability. Besides, once a handoff is detected by an access point, all the neighboring access points must perform paging procedure to page the roaming mobile client. However, since paging requires nearly all of a device s bandwidth, the access points are not able to serve any other client during this time. As a result, the planning of access points should avoid one access point is directly connected by many other access points. Since a master can only support up to seven active slaves, to support more active slaves, a access point (acting as a master) can equip with more transceiver. However, as the FHSS scheme adopted in the Blutooth, these transceiver would interfere with each other. Our feature work would derive a hopping scheme that eliminates the interference between adjacent transceiver. Acknowledge We would like to thank Da-Wai Chang, Ming-Xian Jiang and Rong-Jyh Kang for the help of implementation of protocol stack. References [1] M. Albrcht, M. Frank, P. Martini, M. Schetelig, A. Vilavaara, A. Wenzel, IP Services over : Leading the Way to a New Mobility, Proceeding of the 24 th Conference on Local Computer Networks, Lowell, MA, October 1999, pp [2] Simon Baatz, et. al., Handoff Support for Mobility with IP over, Proceeding of the 25 th Conference on Local Computer Networks, November 2000, pp [3] Chatschik Bisdikian, An Overview of the Wireless Technology, IEEE Communications Magazine, Dec [4] SIG, Specification of the System Core, [5] SIG, Specification of the System Profiles, [6] K. Brown, S. Singh, M-TCP: TCP for Mobile Cellular Networks, ACM Computer Communications Review, Vol. 27, No. 5, 1997, pp [7] R. Caceres, L. Iftode, Improving the Performance of Reliable Transport Protocols in Mobile Computing Environments, IEEE Journal on Selected Area in Communications, Vol. 13, No. 5, June 1995, pp [8] Jaap C. Haartsen, The Radio System, IEEE Personal Communicaitons, Vol. 7, No. 1, February 2000, pp [9] J. Hartsen et al., : Visions, Goals, and Architecture, ACM Computer Communications Review, Vol. 4, No. 2, 1998, pp [10] Hewlett-Packard Company, Netperf: A Network Performance Benchmark, February, [11] [12] A. G. Valko, Cellular IP: A New Approach to Internet Host Mobility, Computer Communication Review, Vol. 29, No. 1, January 1999, pp [13] Ryan W. Woodings, Derek D. Joos, Trevor Clifton, Charles D. Knutson, Rapid Heterogeneous Ad Hoc Connection Establishment: Accelerating Inquiry Using IrDA,

Bluetooth: Short-range Wireless Communication

Bluetooth: Short-range Wireless Communication Bluetooth: Short-range Wireless Communication Wide variety of handheld devices Smartphone, palmtop, laptop Need compatible data communication interface Complicated cable/config. problem Short range wireless

More information

ENRNG3076 : Oral presentation BEng Computer and Communications Engineering

ENRNG3076 : Oral presentation BEng Computer and Communications Engineering Jean Parrend ENRNG3076 : Oral presentation BEng Computer and Communications Engineering 1 Origin 2 Purpose : Create a cable replacement standard for personal area network Handle simultaneously both data

More information

Amarjeet Singh. February 7, 2012

Amarjeet Singh. February 7, 2012 Amarjeet Singh February 7, 2012 References Bluetooth Protocol Architecture v.1 www.bluetooth.org http://www.tutorial-reports.com/wireless/bluetooth/ Slides from last class uploaded on the course website

More information

Inside Bluetooth. Host. Bluetooth. Module. Application RFCOMM SDP. Transport Interface. Transport Bus. Host Controller Interface

Inside Bluetooth. Host. Bluetooth. Module. Application RFCOMM SDP. Transport Interface. Transport Bus. Host Controller Interface Inside Bluetooth Application Host Application Host Audio (SCO) RFCOMM SDP Data (ACL) Control API and Legacy Support Modules Bluetooth HCI Driver Transport Interface Physical I/F Transport Bus Bluetooth

More information

12/2/09. Mobile and Ubiquitous Computing. Bluetooth Networking" George Roussos! Bluetooth Overview"

12/2/09. Mobile and Ubiquitous Computing. Bluetooth Networking George Roussos! Bluetooth Overview Mobile and Ubiquitous Computing Bluetooth Networking" George Roussos! g.roussos@dcs.bbk.ac.uk! Bluetooth Overview" A cable replacement technology! Operates in the unlicensed ISM band at 2.4 GHz! Frequency

More information

CS263: Wireless Communications and Sensor Networks

CS263: Wireless Communications and Sensor Networks CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 6: Bluetooth and 802.15.4 October 12, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Bluetooth Standard for Personal Area

More information

CS4/MSc Computer Networking. Lecture 13: Personal Area Networks Bluetooth

CS4/MSc Computer Networking. Lecture 13: Personal Area Networks Bluetooth CS4/MSc Computer Networking Lecture 13: Personal Area Networks Bluetooth Computer Networking, Copyright University of Edinburgh 2005 BlueTooth Low cost wireless connectivity for Personal Area Networks

More information

By FaaDoOEngineers.com

By FaaDoOEngineers.com ABSTRACT The seemingly endless entanglement of data wires connecting today s electronic devices has become slightly less jumbled with the introduction of Bluetooth technology and the creation of a wireless

More information

Guide to Wireless Communications, 3 rd Edition. Objectives

Guide to Wireless Communications, 3 rd Edition. Objectives Guide to Wireless Communications, 3 rd Edition Chapter 5 Wireless Personal Area Networks Objectives Describe a wireless personal area network (WPAN) List the different WPAN standards and their applications

More information

ALL SAINTS COLLEGE OF TECHNOLOGY, BHOPAL

ALL SAINTS COLLEGE OF TECHNOLOGY, BHOPAL BLUETOOTH Amita Tiwari IIIrd Semester amitaasct@gmail.com Sunil Kumar IIIrd Semester sunilasct@gmail.com ALL SAINTS COLLEGE OF TECHNOLOGY, BHOPAL ABSTRACT Blue tooth is a standard developed by a group

More information

[A SHORT REPORT ON BLUETOOTH TECHNOLOGY]

[A SHORT REPORT ON BLUETOOTH TECHNOLOGY] 2011 [A SHORT REPORT ON BLUETOOTH TECHNOLOGY] By Ram Kumar Bhandari 1. Introduction Bluetooth Technology A Technical Report Bluetooth is a short-ranged wire-less communication technology implementing the

More information

Bluetooth Tutorial. Bluetooth Introduction. Bluetooth Technology

Bluetooth Tutorial. Bluetooth Introduction. Bluetooth Technology Bluetooth Tutorial Bluetooth strives to remove the never ending maze of wires which provide a communication link between different electronic devices, through a short range wireless solution. Consider

More information

Local Area Networks NETW 901

Local Area Networks NETW 901 Local Area Networks NETW 901 Lecture 6 IEEE 802.15.1 - Bluetooth Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 The 802.15 Family Target environment: communication of personal

More information

e-pg Pathshala Quadrant 1 e-text

e-pg Pathshala Quadrant 1 e-text e-pg Pathshala Subject : Computer Science Module: Bluetooth Paper: Computer Networks Module No: CS/CN/37 Quadrant 1 e-text In our journey on networks, we are now exploring wireless networks. We looked

More information

UNIT 5 P.M.Arun Kumar, Assistant Professor, Department of IT, Sri Krishna College of Engineering and Technology, Coimbatore.

UNIT 5 P.M.Arun Kumar, Assistant Professor, Department of IT, Sri Krishna College of Engineering and Technology, Coimbatore. Communication Switching Techniques UNIT 5 P.M.Arun Kumar, Assistant Professor, Department of IT, Sri Krishna College of Engineering and Technology, Coimbatore. Bluetooth Techniques References 1. Wireless

More information

Feasibility of a Bluetooth Based Structural Health Monitoring Telemetry System

Feasibility of a Bluetooth Based Structural Health Monitoring Telemetry System Feasibility of a Bluetooth Based Structural Health Monitoring Telemetry System Item Type text; Proceedings Authors Uchil, Vilas; Kosbar, Kurt Publisher International Foundation for Telemetering Journal

More information

Bluetooth. Bluetooth Radio

Bluetooth. Bluetooth Radio Bluetooth Bluetooth is an open wireless protocol stack for low-power, short-range wireless data communications between fixed and mobile devices, and can be used to create Personal Area Networks (PANs).

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY Shaila Kharde,, 2013; Volume 1(8): 969-978 INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK UNDER WATER EMBEDDED BLUETOOTH DATA

More information

Introduction to Wireless Networking ECE 401WN Spring 2009

Introduction to Wireless Networking ECE 401WN Spring 2009 I. Overview of Bluetooth Introduction to Wireless Networking ECE 401WN Spring 2009 Lecture 6: Bluetooth and IEEE 802.15 Chapter 15 Bluetooth and IEEE 802.15 What is Bluetooth? An always-on, short-range

More information

Implementation of Bluetooth Data Exchange System onto ARM for Intra Underwater Vehicle (UV) Communication

Implementation of Bluetooth Data Exchange System onto ARM for Intra Underwater Vehicle (UV) Communication Implementation of Bluetooth Data Exchange System onto ARM for Intra Underwater Vehicle (UV) Communication 1 C. R. S. Murthy, 2 A.SivaKumar, 3 B.Ch. Mouli, 4 G. Srilatha 1,4 Dept. of E.C.E, Sir C.R.R. College

More information

Bluetooth. Quote of the Day. "I don't have to be careful, I've got a gun. -Homer Simpson. Stephen Carter March 19, 2002

Bluetooth. Quote of the Day. I don't have to be careful, I've got a gun. -Homer Simpson. Stephen Carter March 19, 2002 Bluetooth Stephen Carter March 19, 2002 Quote of the Day "I don't have to be careful, I've got a gun. -Homer Simpson 1 About Bluetooth Developed by a group called Bluetooth Special Interest Group (SIG),

More information

Wireless# Guide to Wireless Communications. Objectives

Wireless# Guide to Wireless Communications. Objectives Wireless# Guide to Wireless Communications Chapter 6 High Rate Wireless Personal Area Networks Objectives Define a high rate wireless personal area network (HR WPAN) List the different HR WPAN standards

More information

System Level Analysis of the Bluetooth standard

System Level Analysis of the Bluetooth standard System Level Analysis of the standard Massimo Conti, Daniele Moretti Università Politecnica delle Marche, via Brecce Bianche, I-60131, Ancona, Italy Abstract The SystemC modules of the Link Manager Layer

More information

MOBILE COMPUTING. Jan-May,2012. ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala.

MOBILE COMPUTING. Jan-May,2012. ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala. WPAN: Bluetooth MOBILE COMPUTING Jan-May,2012 ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala Email-alakroy.nerist@gmail.com EM Spectrum ISM band 902 928 Mhz 2.4 2.4835 Ghz 5.725 5.85 Ghz LF MF

More information

SE 4C03 Winter 2005 Bluetooth Wireless Network Technology

SE 4C03 Winter 2005 Bluetooth Wireless Network Technology SE 4C03 Winter 2005 Bluetooth Wireless Network Technology Researcher: Daren Tan Shen Hau Last Revised: April 4, 2005 Bluetooth As everyone will ask, what is Bluetooth? Bluetooth is a new technology that

More information

Computer Networks II Advanced Features (T )

Computer Networks II Advanced Features (T ) Computer Networks II Advanced Features (T-110.5111) Bluetooth, PhD Assistant Professor DCS Research Group Based on slides previously done by Matti Siekkinen, reused with permission For classroom use only,

More information

Introduction to Bluetooth Wireless Technology

Introduction to Bluetooth Wireless Technology Introduction to Bluetooth Wireless Technology Jon Inouye Staff Software Engineer Mobile Platforms Group Intel Corporation Bluetooth Bluetooth is is a a trademark trademark owned owned by by Bluetooth Bluetooth

More information

Sensor Application for Museum Guidance

Sensor Application for Museum Guidance Sensor Application for Museum Guidance Radka Dimitrova a a TU,Dresden, Germany, e-mail: dimitrova@ifn.et.tu-dresden.de Abstract - This article examines the conditions for successful communication and power

More information

Master. Slave. Master. Slaves. TCP/IP Traffic with Efficient Bluetooth Technology. Shafqat Hameed 1, Umar F.Khan 2, *Muhammad Saleem 3

Master. Slave. Master. Slaves. TCP/IP Traffic with Efficient Bluetooth Technology. Shafqat Hameed 1, Umar F.Khan 2, *Muhammad Saleem 3 / Traffic with Efficient Bluetooth Technology Shafqat Hameed 1, Umar F.Khan 2, *Muhammad Saleem 3 1,3 National University of Sciences and Technology (NUST), Pakistan 2 University of Bradford, Bradford,

More information

101seminartopics.com. Bluetooth Based Smart Sensor Networks

101seminartopics.com. Bluetooth Based Smart Sensor Networks Bluetooth Based Smart Sensor Networks ABSTRACT Dragging the world towards wireless galaxy Various sensors are already in a broad use today as part of different devices or as standalone devices connected

More information

Bluetooth. The Bluetooth Vision. Universal Wireless Connectivity. Universal Wireless Connectivity

Bluetooth. The Bluetooth Vision. Universal Wireless Connectivity. Universal Wireless Connectivity 1 2 The Vision Universal wireless connectivity Replace existing cables with radio Connect systems that have been separate Ubiquitous computing environment Intelligent devices performing distributed services

More information

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS IEEE 802.11 The standard defines a wireless physical interface and the MAC layer while LLC layer is defined in 802.2. The standardization process, started in 1990, is still going on; some versions are:

More information

Ethernet. Lecture 6. Outline. Ethernet - Physical Properties. Ethernet - Physical Properties. Ethernet

Ethernet. Lecture 6. Outline. Ethernet - Physical Properties. Ethernet - Physical Properties. Ethernet Lecture 6 Ethernet Reminder: Homework 2, Programming Project 2 due on 9/20/12. Thick-net Thin-net Twisted Pair Thursday, September 13 CS 475 Networks - Lecture 6 1 Thursday, September 13 CS 475 Networks

More information

Bluetooth Demystified

Bluetooth Demystified Bluetooth Demystified S-72.4210 Postgraduate Course in Radio Communications Er Liu liuer@cc.hut.fi -10 Content Outline Bluetooth History Bluetooth Market and Applications Bluetooth Protocol Stacks Radio

More information

On-Demand BlueTooth: Experience integrating BlueTooth in Connection Diversity

On-Demand BlueTooth: Experience integrating BlueTooth in Connection Diversity On-Demand BlueTooth: Experience integrating BlueTooth in Connection Diversity Jean Tourrilhes Mobile and Media Systems Laboratory HP Laboratories Palo Alto HPL-2003-51 March 17 th, 2003* E-mail: jt@hpl.hp.com

More information

Analysis of UDP Performance over Bluetooth

Analysis of UDP Performance over Bluetooth Analysis of UDP Performance over Bluetooth Martin Connolly, Cormac J. Sreenan University College Cork Department of Computer Science Email: cjs@cs.ucc.ie Abstract The Bluetooth protocol is one of the better-known

More information

Guide to Wireless Communications, Third Edition. Objectives

Guide to Wireless Communications, Third Edition. Objectives Guide to Wireless Communications, Third Edition Chapter 7 Low-Speed Wireless Local Area Networks Objectives Describe how WLANs are used List the components and modes of a WLAN Describe how an RF WLAN works

More information

Bluetooth Wireless Technology meets CAN

Bluetooth Wireless Technology meets CAN Bluetooth Wireless Technology meets CAN Matthias Fuchs esd electronic system design GmbH, Hannover, Germany To access mobile and moving CAN fieldbus systems a wireless approach is often a good solution.

More information

A COLLOCATED APPROACH FOR COEXISTENCE RESOLUTION IN WIRELESS HOME NETWORKING

A COLLOCATED APPROACH FOR COEXISTENCE RESOLUTION IN WIRELESS HOME NETWORKING A COLLOCATED APPROACH FOR COEXISTENCE RESOLUTION IN WIRELESS HOME NETWORKING Md Enamul Islam, Sanjay Jha, Dr. Paul W.H. Kwan, Monzurur Rahman School of Mathematics, Statistics and Computer Science, University

More information

Introducing Bluetooth

Introducing Bluetooth Chapter 1 Introducing Bluetooth In This Chapter From the beginning, Bluetooth technology was intended to hasten the convergence of voice and data to handheld devices, such as cellular telephones and portable

More information

Solving the Interference Problem due to Wireless LAN for Bluetooth Transmission Using a Non- Collaborative Mechanism. Yun-Ming, Chiu 2005/6/09

Solving the Interference Problem due to Wireless LAN for Bluetooth Transmission Using a Non- Collaborative Mechanism. Yun-Ming, Chiu 2005/6/09 Solving the Interference Problem due to Wireless LAN for Bluetooth Transmission Using a Non- Collaborative Mechanism Yun-Ming, Chiu 2005/6/09 Outline Overview Survey of Bluetooth Structure of Bluetooth

More information

Embedded Systems. 8. Communication

Embedded Systems. 8. Communication Embedded Systems 8. Communication Lothar Thiele 8-1 Contents of Course 1. Embedded Systems Introduction 2. Software Introduction 7. System Components 10. Models 3. Real-Time Models 4. Periodic/Aperiodic

More information

Redes Inalámbricas Tema 2.B Wireless PANs: Bluetooth

Redes Inalámbricas Tema 2.B Wireless PANs: Bluetooth Redes Inalámbricas Tema 2.B Wireless PANs: Bluetooth Bluetooh Acknowledgments: Foo Chun Choong, Ericsson Research / Cyberlab Singapore, and Open Source Software Lab, ECE Dept, NUS Máster de Ingeniería

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK CONTROLLING PC THROUGH MOBILE PHONE MISS. MUKTA N. PATIL, PROF. SHEETAL P. GAWANDE

More information

Image acquisition and Communication

Image acquisition and Communication Image acquisition and Communication Developements around the ACME Fox Board E. Pamba Capo-ChiChi 1,2,G. Weisenhorn 1,J-M. Friedt 3,4 H. Guyennet 1,2 1 Department of Computer Science University of Franche-Comte

More information

Efficient Multicast Schemes for Mobile Multiparty Gaming Applications

Efficient Multicast Schemes for Mobile Multiparty Gaming Applications Efficient Multicast Schemes for Mobile Multiparty Gaming Applications P6-6th semester 2006 Group 681 - ComNet Aalborg University 9th March 2006 Institut for elektroniske systemer Fr. Bajers Vej 7 Telefon

More information

Lecture 6. Reminder: Homework 2, Programming Project 2 due on Thursday. Questions? Tuesday, September 13 CS 475 Networks - Lecture 6 1

Lecture 6. Reminder: Homework 2, Programming Project 2 due on Thursday. Questions? Tuesday, September 13 CS 475 Networks - Lecture 6 1 Lecture 6 Reminder: Homework 2, Programming Project 2 due on Thursday. Questions? Tuesday, September 13 CS 475 Networks - Lecture 6 1 Outline Chapter 2 - Getting Connected 2.1 Perspectives on Connecting

More information

Overview of Bluetooth

Overview of Bluetooth Wireless Application Programming with J2ME and Bluetooth Page 1 http://developers.sun.com/techtopics/mobility/midp/articles/bluetooth1/ Dec 19, 2004 Article Wireless Application Programming with J2ME and

More information

On-Demand BlueTooth: Experience integrating BlueTooth in Connection Diversity

On-Demand BlueTooth: Experience integrating BlueTooth in Connection Diversity On-Demand BlueTooth: Experience integrating BlueTooth in Connection Diversity Jean Tourrilhes Mobile and Media Systems Laboratory HP Laboratories Palo Alto HPL-2003-178 August 22 nd, 2003* E-mail: jt@hpl.hp.com

More information

University of Würzburg Institute of Computer Science Research Report Series. Performance Comparison of Handover Mechanisms in Wireless LAN Networks

University of Würzburg Institute of Computer Science Research Report Series. Performance Comparison of Handover Mechanisms in Wireless LAN Networks University of Würzburg Institute of Computer Science Research Report Series Performance Comparison of Handover Mechanisms in Wireless LAN Networks Rastin Pries and Klaus Heck Report No. 339 September 2004

More information

Wireless Networked Systems

Wireless Networked Systems Wireless Networked Systems CS 795/895 - Spring 2013 Lec #7: Medium Access Control WPAN, Bluetooth, ZigBee Tamer Nadeem Dept. of Computer Science Bluetooth Page 2 Spring 2013 CS 795/895 - Wireless Networked

More information

Wireless Sensor Networks

Wireless Sensor Networks Wireless Sensor Networks 11th Lecture 29.11.2006 Christian Schindelhauer schindel@informatik.uni-freiburg.de 1 Bluetooth in WSN? There are several commercially available MAC protocol/products Wi-Fi Bluetooth

More information

Implementing A Bluetooth Stack on UEFI

Implementing A Bluetooth Stack on UEFI Implementing A Bluetooth Stack on UEFI Tony C.S. Lo Senior Manager American Megatrends Inc. presented by UEFI Plugfest October 2014 Agenda Introduction Bluetooth Architecture UEFI Bluetooth Stack Summary

More information

CIS 632 / EEC 687 Mobile Computing

CIS 632 / EEC 687 Mobile Computing CIS 632 / EEC 687 Mobile Computing TCP in Mobile Networks Prof. Chansu Yu Contents Physical layer issues Communication frequency Signal propagation Modulation and Demodulation Channel access issues Multiple

More information

Communication Systems. WPAN: Bluetooth. Page 1

Communication Systems. WPAN: Bluetooth. Page 1 Communication Systems WPAN: Bluetooth Page 1 Outline Historical perspective Piconet Scatternet Lattency modes Applications Page 2 Bluetooth Bluetooth (BT) wireless technology is a short-range communications

More information

Bluetooth PCI Adapter

Bluetooth PCI Adapter Table of Contents 1 Introduction...2 2 Installation...2 2.1 Software Installation...2 2.1.1 Installation on Windows 95/98/ME/2000/XP...2 2.1.2 Installation on Windows NT...3 2.1.3 Installation on Linux...3

More information

Chapter 10: Wireless LAN & VLANs

Chapter 10: Wireless LAN & VLANs Chapter 10: Wireless LAN & VLANs Abdullah Konak School of Information Sciences and Technology Penn State Berks Wireless Transmission for LAN Radio Frequency Transmission (RF) Infrared Transmission 2 1

More information

Dominique Chomienne & Michel Eftimakis NewLogic

Dominique Chomienne & Michel Eftimakis NewLogic Dominique Chomienne & Michel Eftimakis NewLogic Bluetooth is a trademark owned by the Bluetooth SIG, and licenced to NewLogic Page 1 Tutorial Agenda Bluetooth Marketing view Bluetooth network topology

More information

SIMULATION BASED ANALYSIS OF BLUETOOTH NETWORKS. M. Subramani and M. Ilyas

SIMULATION BASED ANALYSIS OF BLUETOOTH NETWORKS. M. Subramani and M. Ilyas SIMULATION BASED ANALYSIS OF BLUETOOTH NETWORKS M. Subramani and M. Ilyas College of Engineering Florida Atlantic University Boca Raton, Florida 33431 {msubrama@cse.fau.edu, ilyas@fau.edu} Abstract Many

More information

A Scatternet Formation Protocol for Ad hoc Networks of Bluetooth Devices

A Scatternet Formation Protocol for Ad hoc Networks of Bluetooth Devices A Scatternet Formation Protocol for Ad hoc Networks of Bluetooth Devices Stefano Basagni Dept. of Electrical and Computer Engineering Northeastern University E-mail: basagni@ece.neu.edu Chiara Petrioli

More information

Module 5. Embedded Communications. Version 2 EE IIT, Kharagpur 1

Module 5. Embedded Communications. Version 2 EE IIT, Kharagpur 1 Module 5 Embedded Communications Version 2 EE IIT, Kharagpur 1 Lesson 27 Wireless Communication Version 2 EE IIT, Kharagpur 2 Instructional Objectives After going through this lesson the student would

More information

Wireless and Mobile Networks 7-2

Wireless and Mobile Networks 7-2 Wireless and Mobile Networks EECS3214 2018-03-26 7-1 Ch. 6: Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected

More information

Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs

Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer 1 Wireless Local Area Networks (WLANs) The proliferation of laptop computers and other mobile devices (PDAs and cell phones)

More information

ECS-087: Mobile Computing

ECS-087: Mobile Computing ECS-087: Mobile Computing TCP over wireless TCP and mobility Most of the Slides borrowed from Prof. Sridhar Iyer s lecture IIT Bombay Diwakar Yagyasen 1 Effect of Mobility on Protocol Stack Application:

More information

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Five Problems Encoding/decoding Framing Error Detection Error Correction Media Access Five Problems Encoding/decoding Framing

More information

Wireless Communications

Wireless Communications 4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:

More information

Learning Objectives. Introduction. Advantages of WLAN. Information Technology. Mobile Computing. Module: Wireless Local Area Network: IEEE 802.

Learning Objectives. Introduction. Advantages of WLAN. Information Technology. Mobile Computing. Module: Wireless Local Area Network: IEEE 802. Information Technology Mobile Computing Module: Wireless Local Area Network: IEEE 802.11 Learning Objectives Introduction to Wireless Local Area Network Advantages of WLAN Types of WLAN IEEE 802.11 standards

More information

Extending or Interconnecting LANS. Physical LAN segment. Virtual LAN. Forwarding Algorithm 11/9/15. segments. VLAN2, Port3. VLAN1, Port1.

Extending or Interconnecting LANS. Physical LAN segment. Virtual LAN. Forwarding Algorithm 11/9/15. segments. VLAN2, Port3. VLAN1, Port1. Physical LAN segment q Hosts connected on the same physical LAN segment q Same subnet; L2 forwarding q ARP (IPè MAC) L2 frame (S, D), send q Scale? Extending or Interconnecting LANS q q q Why not just

More information

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018 WiFi Networks: IEEE 802.11b Wireless LANs Carey Williamson Department of Computer Science University of Calgary Winter 2018 Background (1 of 2) In many respects, the IEEE 802.11b wireless LAN (WLAN) standard

More information

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices

More information

Wireless LANs. The Protocol Stack The Physical Layer The MAC Sublayer Protocol The Frame Structure Services 802.

Wireless LANs. The Protocol Stack The Physical Layer The MAC Sublayer Protocol The Frame Structure Services 802. Wireless LANs The 802.11 Protocol Stack The 802.11 Physical Layer The 802.11 MAC Sublayer Protocol The 802.11 Frame Structure Services 56 802.11 The 802.11 Working Group The IEEE 802.11 was formed in July

More information

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu Chapter 5 Ad Hoc Wireless Network Jang Ping Sheu Introduction Ad Hoc Network is a multi-hop relaying network ALOHAnet developed in 1970 Ethernet developed in 1980 In 1994, Bluetooth proposed by Ericsson

More information

Bluetooth technology, developed by Ericsson Mobile Communications, a. worldwide telecommunications company based in Sweden, is fast becoming the

Bluetooth technology, developed by Ericsson Mobile Communications, a. worldwide telecommunications company based in Sweden, is fast becoming the Bluetooth technology, developed by Ericsson Mobile Communications, a worldwide telecommunications company based in Sweden, is fast becoming the worldwide standard for short-range wireless communication.

More information

Wireless Local Area Networks. Networks: Wireless LANs 1

Wireless Local Area Networks. Networks: Wireless LANs 1 Wireless Local Area Networks Networks: Wireless LANs 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices (PDAs and cell phones) created an obvious application

More information

Wireless networks. Wireless Network Taxonomy

Wireless networks. Wireless Network Taxonomy Wireless networks two components to be considered in deploying applications and protocols wireless links ; mobile computing they are NOT the same thing! wireless vs. wired links lower bandwidth; higher

More information

A Routing Protocol and Energy Efficient Techniques in Bluetooth Scatternets

A Routing Protocol and Energy Efficient Techniques in Bluetooth Scatternets A Routing Protocol and Energy Efficient Techniques in Bluetooth Scatternets Balakrishna J. Prabhu and A. Chockalingam Department of Electrical Communication Engineering Indian Institute of Science, Bangalore

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 10 CMPE 257 Spring'15 1 Student Presentations Schedule May 21: Sam and Anuj May 26: Larissa

More information

AT THE END OF THIS SECTION, YOU SHOULD HAVE AN UNDERSTANDING OF THE

AT THE END OF THIS SECTION, YOU SHOULD HAVE AN UNDERSTANDING OF THE Wireless Technology AT THE END OF THIS SECTION, YOU SHOULD HAVE AN UNDERSTANDING OF THE UNDERLYING WIRELESS TECHNOLOGIES. References 2 The physical layer provides mechanical, electrical, l functional,

More information

The Problem of Bluetooth Pollution and Accelerating Connectivity in Bluetooth Ad-Hoc Networks

The Problem of Bluetooth Pollution and Accelerating Connectivity in Bluetooth Ad-Hoc Networks The Problem of Bluetooth Pollution and Accelerating Connectivity in Bluetooth Ad-Hoc Networks Somil Asthana Department of Computer Science State University of New York Buffalo, NY 14226 asthana@cse.buffalo.edu

More information

Modulation. Propagation. Typical frequency bands

Modulation. Propagation. Typical frequency bands References Wireless Technology 2 AT THE END OF THIS SECTION, YOU SHOULD HAVE AN UNDERSTANDING OF THE UNDERLYING WIRELESS TECHNOLOGIES. The physical layer provides mechanical, electrical, l functional,

More information

Bluetooth. Renato Lo Cigno

Bluetooth. Renato Lo Cigno Bluetooth Renato Lo Cigno www.dit.unitn.it/locigno/teaching ...Copyright Quest opera è protetta dalla licenza Creative Commons NoDerivs- NonCommercial. Per vedere una copia di questa licenza, consultare:

More information

Multiple Access in Cellular and Systems

Multiple Access in Cellular and Systems Multiple Access in Cellular and 802.11 Systems 1 GSM The total bandwidth is divided into many narrowband channels. (200 khz in GSM) Users are given time slots in a narrowband channel (8 users) A channel

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

Wireless# Guide to Wireless Communications. Objectives

Wireless# Guide to Wireless Communications. Objectives Wireless# Guide to Wireless Communications Chapter 7 Low-Speed Wireless Local Area Networks Objectives Describe how WLANs are used List the components and modes of a WLAN Describe how an RF WLAN works

More information

An Architecture for Underwater Networks

An Architecture for Underwater Networks An Architecture for Underwater Networks Mandar Chitre Acoustic Research Laboratory, National University of Singapore Lee Freitag Woods Hole Oceanographic Institution Ethem Sozer Massachusetts Institute

More information

IP Mobility vs. Session Mobility

IP Mobility vs. Session Mobility IP Mobility vs. Session Mobility Securing wireless communication is a formidable task, something that many companies are rapidly learning the hard way. IP level solutions become extremely cumbersome when

More information

Topic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach

Topic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach Topic 2b Wireless MAC Chapter 7 Wireless and Mobile Networks Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith Ross Pearson/Addison Wesley April 2016 7-1 Ch. 7: Background: # wireless

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

Mobile and Sensor Systems

Mobile and Sensor Systems Mobile and Sensor Systems Lecture 2: Mobile Medium Access Control Protocols and Wireless Systems Dr Cecilia Mascolo In this lecture We will describe medium access control protocols and wireless systems

More information

Multiplexed Serial Wireless Connectivity for Palmtop Computers

Multiplexed Serial Wireless Connectivity for Palmtop Computers Multiplexed Serial Wireless Connectivity for Palmtop Computers Ibrahim Korpeoglu, Pravin Bhagwat, Chatschik Bisdikian, Mahmoud Naghshineh Computer Science Department University of Maryland College Park,

More information

Strengthening Unlicensed Band Wireless Backhaul

Strengthening Unlicensed Band Wireless Backhaul be in charge Strengthening Unlicensed Band Wireless Backhaul Use TDD/TDMA Based Channel Access Mechanism WHITE PAPER Strengthening Unlicensed Band Wireless Backhaul: Use TDD/TDMA Based Channel Access Mechanism

More information

Lecture 16: Wireless Networks

Lecture 16: Wireless Networks &6( *UDGXDWH1HWZRUNLQJ :LQWHU Lecture 16: Wireless Networks Geoffrey M. Voelker :LUHOHVV1HWZRUNLQJ Many topics in wireless networking Transport optimizations, ad hoc routing, MAC algorithms, QoS, mobility,

More information

Wireless LAN. Access Point. Provides network connectivity over wireless media

Wireless LAN. Access Point. Provides network connectivity over wireless media LAN Technologies 802.11 Wireless LAN Network connectivity to the legacy wired LAN Access Point Desktop with PCI 802.11 LAN card Laptop with PCMCIA 802.11 LAN card Provides network connectivity over wireless

More information

Last Lecture: Data Link Layer

Last Lecture: Data Link Layer Last Lecture: Data Link Layer 1. Design goals and issues 2. (More on) Error Control and Detection 3. Multiple Access Control (MAC) 4. Ethernet, LAN Addresses and ARP 5. Hubs, Bridges, Switches 6. Wireless

More information

OSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print,

OSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print, ANNEX B - Communications Protocol Overheads The OSI Model is a conceptual model that standardizes the functions of a telecommunication or computing system without regard of their underlying internal structure

More information

Special Course in Computer Science: Local Networks. Lecture

Special Course in Computer Science: Local Networks. Lecture Special Course in Computer Science: Local Networks Lecture 11 16.5.2012 Roadmap of the Course So far Basic telecom concepts General study of LANs Local Networks Ethernet Token bus Token ring ATM LAN Wi-Fi

More information

MI-BPS (Wireless Networks) FIT - CTU

MI-BPS (Wireless Networks) FIT - CTU Evropský sociální fond Praha & EU: Investujeme do vaší budoucnosti MI-BPS (Wireless Networks) FIT - CTU Alex Moucha Lecture 8 - Piconets, Scatternets, Bluetooth, Zigbee 1 Piconet an ad-hoc network linking

More information

Personal Area Networking over Bluetooth

Personal Area Networking over Bluetooth Personal Area Networking over Bluetooth Pravin Bhagwat Networking Research Group AT&T Labs - Research pravin@acm.org ACM Mobicom 2000 Half day tutorial Aug 06, 2000 Boston, MA Bluetooth A cable replacement

More information

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University Wireless and WiFi Daniel Zappala CS 460 Computer Networking Brigham Young University Wireless Networks 2/28 mobile phone subscribers now outnumber wired phone subscribers similar trend likely with Internet

More information

TELEPHONY CONTROL PROTOCOL SPECIFICATION

TELEPHONY CONTROL PROTOCOL SPECIFICATION Part F:3 TELEPHONY CONTROL PROTOCOL SPECIFICATION TCS Binary This document describes the Bluetooth Telephony Control protocol Specification Binary (TCS Binary), using a bit-oriented protocol. This protocol

More information