Improving Simultaneous Voice and Data Performance in Bluetooth Systems

Size: px
Start display at page:

Download "Improving Simultaneous Voice and Data Performance in Bluetooth Systems"

Transcription

1 Improving Simultaneous Voice and Data Performance in Bluetooth Systems Abstract In the Bluetooth system, isochronous applications, such as voice and audio, are carried by Synchronous Connection Oriented (SCO) links. SCO packets are regularly scheduled every two, four, or six time slots and enjoy preemptive priority over data-bearing Asynchronous Connection-Less (ACL) packets. The residual bandwidth available to simultaneous data services is often insufficient for many types of applications, even under perfect channel conditions. In this paper, we introduce a novel methodology where isochronous audio traffic is carried over ACL links to obtain higher simultaneous data throughputs while strictly adhering to the 64 Kbps isochronous service quality guaranteed by SCO links. Simulation results are presented for a variety of channel conditions verifying that this technique improves both the throughput for data services and the quality of voice services. I. INTRODUCTION Bluetooth enabled devices exchange data and voice with one another over short distances. Application scenarios for Bluetooth include data applications such as file transfers and local area network (LAN) access, as well as audio applications such as streaming music and voice calls, like those defined in the Headset and Cordless Telephone Profiles [1] of the Bluetooth specification [2]. Traditional support for isochronous audio services, such as voice or music delivery, in Bluetooth exacts a heavy toll on the bandwidth available for simultaneous data services. For example, the maximal user throughput supported by Bluetooth is Kbps. However, using traditional audio delivery methods over an ideal loss-less channel, the maximal user throughput available to a data service operating simultaneously with a 64 Kbps voice link is only Kbps, as will be shown later. This means that supporting one voice link, which represents less than 9% of the total available bandwidth, reduces the remaining available link capacity by over 46%. This indicates a large inefficiency and motivates the search for more efficient ways of handling simultaneous voice and data services in realistic Bluetooth channels. Earlier work has focused primarily on the effects of scheduling while considering pure data applications without addressing isochronous requirements [3][4]. In this paper, we introduce the Voice over Asynchronous Connectionless Links (VoACL) methodology that maintains isochronous quality requirements, improves audio fidelity, and most importantly, improves the throughput available to simultaneous data services. The paper is organized as follows; Section B provides an overview of Bluetooth, Sections C and D introduce VoACL and the VoACL algorithms, Section E describes the simulation David Famolari and Farooq Anjum Telcordia Technologies South St, Morristown, NJ environment, Section F presents performance results, and Section G concludes the paper. II. THE BLUETOOTH SYSTEM The Bluetooth system, architecture, and protocols are defined in detail in [2] and expanded on in [5] and [6]. A brief overview is provided here. Upper layer data is passed down to the baseband and radio layers where it is placed in packets and transmitted over the air interface. Information is modulated at a rate of 1 Mbps and transmitted in one of 79 1-MHz channels in the GHz band. Signals are frequency hopped through the 79 channels at the rate of 1600 hops per second with one hop per time slot; making the length of each time slot 625 µsecs. Bluetooth technology is based on a master-slave concept where the master device controls data transmissions through a polling procedure. The master is defined as the device that initiates the connection. A collection of slave devices associated with a single master device is referred to as a piconet. The master dictates packet transmissions within a piconet according to a time-slot process. The channel is divided into time slots that are numbered according to an internal clock running on the master. A time division duplex (TDD) scheme is used where the master and slaves alternatively transmit packets, where even numbered time slots are reserved for master-slave transmissions, while odd numbered time slots are reserved for slave-master transmissions. Bluetooth uses single-slot voice packets and multi-slot data packets that can occupy one, three, or five time slots. During the transmission of a packet the frequency remains constant; so the frequency hop rate equals the packet transmission rate. There are two classes of link-level connections in Bluetooth, each with their own class of allowable baseband packets. Next we describe each of these link-level connection types. Synchronous Connection Oriented (SCO) Links Synchronous Connection Oriented (SCO) links are intended to carry isochronous voice traffic and require that a SCO-type packet occupy every two, four, or six Bluetooth time slots. There are three types of SCO packets defined thus far in the Bluetooth specification namely, HV1, HV2, and HV3 packets 2, which carry 10, 20, and 30 bytes of user information respectively. All SCO packet types occupy one slot length. These values and slot arrangements where chosen to meet an isochronous quality target of 64 Kbps speech. It should be noted that using an HV1 packet type, which requires a 1 This work was supported by Toshiba America Research Inc. (TARI) and the authors would like to thank TARI for their contributions and encouragement. 2 Bluetooth also specifies a dual voice/data packet, called a DV packet, which carries at most 10 bytes of user data along with 10 bytes of voice information. We do not consider DV packets in this work.

2 transmission every second Bluetooth time slot, precludes the use of any other services in that piconet. Three features distinguish SCO links. First, SCO packets enjoy preemptive priority over all other Bluetooth packets used to convey user information. This feature guarantees SCO links a minimum level of access to the channel. Second, SCO packets do not contain a CRC value, are not acknowledged, are never retransmitted, and are never discarded. Packets that are corrupted by channel errors are simply played out as they are received; so bit-errors in SCO packets result in degraded voice quality. Lastly, SCO links do not follow the normal masterslave polling scheme. A slave participating in a SCO connection does not require a poll by the master device before transmitting a SCO packet. Asynchronous Connection-Less (ACL) Links The second class of link-level connections in Bluetooth is Asynchronous Connection-Less (ACL) links. These links employ packets that occupy one, three, and five time slots. ACL packets come in two varieties, a high-rate variety that employs no Forward Error Control (FEC) and a low-rate variety that sacrifices some user information for error resiliency by employing a 2/3 FEC code in its payload. The high-rate ACL packets are referred to as DH1, DH3, and DH5 packets, distinguished by the number of slots they occupy, and carry 27, 183, and 339 bytes of user payload information respectively. The low-rate ACL packets are referred to as DM1, DM3, and DM5 packets, which carry 17, 121, and 224 bytes of user payload respectively. ACL connections are not regularly scheduled and are governed by explicit notification through the master device. Slave devices can only transmit ACL packets when they have been specifically addressed in the preceding master-slave transmission slot. Each ACL packet contains a 16-bit CRC code for error detection. ACL packets require explicit acknowledgement from the receiver and will be retransmitted under a stop-andwait ARQ scheme until they are successfully delivered or reach a system-defined time out value. The simultaneous operation of SCO links with ACL links limits the throughput available to data applications. This is because SCO packets enjoy a preemptive priority over ACL packets and are guaranteed access to every second, fourth, or sixth time slot. An active SCO link precludes the use of fiveslot packets for data-bearing ACL links, leaving only the less efficient one- and three-slot packets. This is an unfavorable situation with respect to active data links. Even using the most data friendly HV3 SCO packets and considering an ideal lossless channel, the maximal bandwidth that can be achieved occurs when one DH3 packet is sent between consecutive HV3 packets. This results in transferring 183 payload bytes every six Bluetooth timeslots, or 3.75 ms, for a total bit rate of Kbps. This is a drop-off of more than 46% from the maximal Bluetooth link rates of Kbps and motivates more efficient techniques for the simultaneous support of data and voice. III. VOACL The VoACL technique improves voice quality while allowing greater simultaneous bit rates, by intelligent scheduling of voice-bearing packets. This flexibility is made possible by the use of ACL links as a voice bearer. Bluetooth typically uses 64 Kbps log PCM voice coding with either A-law or µ-law compression. It maintains 64 Kbps by transmitting 30 bytes every 3.75 ms. VoACL maintains the required 64 kbps by extending the 3.75 ms time horizon to 20 ms and sending 160 voice bytes within that time. A 20 ms frame is a common frame size found in other wireless voice systems such as IS-95 cellular CDMA based systems [7]. In the Bluetooth technology, 20 ms corresponds to exactly 32 time slots. We refer to these 32 slots as a superframe. The goal of VoACL is to use ACL packets to convey voice information at the start of every superframe. ACL packets can carry more information and incur less overhead penalties than SCO packets. VoACL then uses the remainder of the superframe to transmit user data. This frees the piconet link from the preemptive priority of SCO packets and allows simultaneous data services greater access to the medium, which increases data throughputs. Furthermore, voice information sent in this fashion is protected by a CRC code and can be retransmitted in the event of channel errors while maintaining the strict isochronous delivery requirements. Under a SCO voice delivery scheme, voice information is never retransmitted and is always delivered to the audio device regardless of bit errors. However, with VoACL a balance can be struck between offering good quality voice and high throughputs by employing retransmission limits. It should be noted that employing VoACL requires slight buffering at the receiver that will add to the overall delay of the system. IV. VOACL ALGORITHMS The VoACL algorithm will construct an ACL packet from native voice bytes at the start of every superframe. We refer to these packets as VoACL-voice packets, and each one carries 160 voice bytes. Three ACL baseband packet types have sufficient payloads to carry this voice load in a single packet, namely DH5, DM5, and DH3 packets. The DH5 packets, however, offer no benefit over DH3 packets for this type of transaction and waste two baseband slots. Therefore we consider only the cases where VoACL-voice packets are of type DH3 and DM5. We refer to these packets as VoACL- DH3 and VoACL-DM5, respectively. A packet cycle is defined as the minimum number of slots used to convey both an ACL packet and its acknowledgement. This represents the minimum amount of time that must transpire between two consecutive ACL packet transmissions. The packet cycle for 3-slot and 5-slot packets is then four and six slots, respectively. A superframe always begins with the transmission of a VoACL-voice packet. In the VoACL-DH3 case there will be 28 (32-4) slots remaining in the superframe, while the VoACL-DM5 case leaves 26 (32-6) slots. The VoACL

3 algorithm uses these residual slots to provide simultaneous data services. Figure 1 illustrates this concept for both the VoACL- DM5 and VoACL-DH3 cases. Also shown is the traditional SCO voice delivery method using HV3 packets. Packets in Figure 1 labeled V1, V2, etc., denote voicebearing packets, while packets labeled D1, D2, etc., denote data-bearing packets. The baseband packets used to deliver data were chosen to maximize the amount of data transmitted in the superframe. In the simulations that follow we allow for different arrangements of the data-bearing packets. are not dropped, but rather have their contents passed to the audio device, which is how SCO packets are handled. We refer to this case as the delivered case to distinguish it from the normal ACL mode of operation, or dropped case. B. VoACL Data Traffic Any of the ACL baseband packets can be used to carry data information within the VoACL strategy. We specifically address the case where data is carried primarily with DH5, DM5, DH3, and DM3 packet types. These packet types will leave some extra slots at the end of the superframe; the fiveslot packets will leave two-slots in each superframe, while the three-slot packets will leave 4-slots. We choose to fill these residual superframe slots with DH1 packets. V. SIMULATIONS Figure 1: VoACL slot arrangements A. VoACL Voice traffic A variety of scheduling strategies can be employed within the residual superframe slots. We discuss two specific mechanisms that assign a transmission priority to either voice or data traffic. 1. VoACL - Voice Priority Operating in the voice priority mode, lost VoACL-voice packets will be retransmitted until received correctly, or until the superframe ends. This scheduling scheme places a higher priority on delivering voice information than on providing simultaneous data throughputs and will exhaust an entire superframe, if necessary, to deliver a single VoACL-voice packet. This may be a favorable approach when transferring important voice information in bad channels, as it affords at least eight transmission attempts in the case of VoACL-DH3 and five in the case of VoACL-DM5. 2. VoACL Data Priority The data priority scheme places a premium on supporting simultaneous data applications. In this scheme, VoACL-voice packets are not retransmitted and all of the residual superframe slots are devoted to the transfer of data. This ensures that a voice application will not interfere with simultaneous data applications and guarantees a minimum level of access to the medium for data traffic. When a received VoACL-voice packet does not pass the CRC test in the data priority mode, it will not be retransmitted. One way to handle such an instance is to silently discard the packet, and in fact this is what the Bluetooth specification requires for ACL packet types. However, we also explore an alternative fate for corrupted VoACL-voice packets where they We consider a single piconet comprised of a master and a single slave. The master has infinite amounts of native voice and data traffic to send to the slave. We consider a perfect reverse channel such that all acknowledgements are received correctly. This can be justified based on the small size of the return packets used for acknowledgement. The channel was modeled by a bit-error-rate (BER) randomly chosen from a Rayleigh distribution with a fixed parameter. All bits within a single packet were considered to be statistically independent of one another. Since all packet types have the same overheads, we considered only the packet payloads when determining packet losses. A new channel instance was chosen for each Bluetooth packet transmission from the same Rayleigh distribution. The Rayleigh parameter used to generate the distribution was then varied upwards to 10e-4 to simulate a range of channel conditions from ideal (error-free) to highly error-prone. MATLAB was used to simulate each of the different scenarios and all simulation points are the average of 25 trials taken over 3200 slots. VI. RESULTS Figures 2 and 3 show the resulting throughput performance of the data connection when data packets are of DH5 and DM5 type respectively. The x-axis represents the Rayleigh parameter used to represent the channel. The HV3 case represents a traditional SCO link, sending DH3 data packets, and provides a baseline for judging performance. Here we can see that in good channels (small Rayleigh parameters) all VoACL strategies perform better than the standard HV3 voice method. As the channel worsens, however, the VoACL strategy where DH5 packets are used for data begins to under-perform the standard HV3 voice method. This is due to the increased number of data packets that are lost and require retransmission. When DM5 packets are used for data, as in Figure 3, the degrading channel has a less pronounced effect. DM5 packets are more resilient and require fewer retransmissions. The VoACL-DH3 voice priority case exhibits the most dramatic decline in quality because frequent errors in the DH3 VoACLvoice packets consume more superframe slots for voice

4 retransmission. However each of VoACL voice strategies outperforms the baseline HV3 case when data packets are of type DM5. DH3 packets for data transmission will improve throughputs as the channel deteriorates. Figure 2: Data throughput for DH5 data packets Figure 4: Data throughput for DH3 data packets Figure 3: Data throughput for DM5 data packets In Figures 4 and 5 we plot the data throughputs observed when DH3 and DM3 packets are used for data traffic, respectively. In each case the baseline HV3 packets are used with either DH3 data packets, as in Figure 4, or DM3 data packets, as in Figure 5. Both show that when DM5 is used to carry VoACL-voice, there is very little difference between voice and data priority modes. This is due to the improved error rejection capability of DM5 packets relative to DH3 packets. DM5 packets are almost always delivered correctly the first time, and thus there is no perceived difference between the voice and data priority modes. Comparing Figures 2 and 4 we can get a sense of the effect that data packet size has on throughput in the VoACL schemes. Only in very good channels (those with Rayleigh parameters below 2e-4) does it make sense to carry voice traffic on DH5 packets. Since DH5 packets are longer then DH3 packets, they have a higher packet loss rate for a given bit-error rate. Using Figure 5: Data throughput for DM3 data packets We demonstrate the effect that VoACL has on voice quality in Figures 6 and 7. Here the number of corrupted bits delivered to the audio device is shown for each of the voice strategies versus an increasing Rayleigh parameter. The two methods for dealing with corrupted VoACL-voice packets that can no longer be retransmitted, due to either operating in the data priority mode or reaching the end of a superframe, are shown. Figure 6 illustrates the case where these packets are silently discarded, and thus no information is presented to the audio decoder. We represent this case by considering the entire voice payload to be corrupted. Figure 7 illustrates the case where these packets are delivered to the audio device despite the fact that their payloads do not pass a CRC check. However, in this situation we determine the number of bit errors actually present in the payload and consider all the other bits as useful voice information.

5 VII. CONCLUSION Figure 6: Number of voice errors when VoACL-voice packets are discarded In this paper we introduced a series of VoACL algorithms that use the ACL links to provide native voice support to Bluetooth devices. SCO links are traditionally used to deliver native voice and audio, however they require access to the shared medium on a frequent basis and limit the bandwidth, as well as the packet sizes, available to simultaneous data applications. VoACL offers a way to support both isochronous voice and data intensive applications by extending the time horizon and payload requirements so that 160 bytes of voice information is delivered every 32 Bluetooth slots. By using ACL links, VoACL offers a greater degree of scheduling freedom for larger sized packets, which dramatically improves the bandwidth available to simultaneous data applications. Flexible priority assignments between voice and data can be implemented easily in VoACL by allowing a varying number of retransmissions within a superframe. In this sense, we can better blend the isochronous benefits of SCO delivery mechanisms with the greater flexibility and throughputs offered by ACL links. VoACL allows for audio samples to be retransmitted, improving the quality of the audio output, while still adhering to the real-time delivery requirements. Simulation results show a marked reduction in the number of voice bit errors delivered, as well as significant improvements in simultaneous data throughputs, as compared to the standard SCO methods. VoACL, therefore can be an effective tool in improving performance of simultaneous voice and data applications in Bluetooth. REFERENCES Figure 7: Number of voice errors when VoACL-voice packets are delivered Both the figures show that DM5 voice delivery methods deliver excellent quality voice that is significantly better than the standard SCO HV3 delivery method. This is achieved by leveraging the retransmission mechanisms and FEC coding of DM5 packets. The DH3-data priority VoACL method, on the other hand, tends to deliver significantly worse voice quality compared to the baseline HV3 method for all types of channels. This is due to the large number of uncorrectable voice errors that occur within the DH3 VoACL-voice packet. By delivering packets to the audio device despite the fact that they have failed their CRC tests can improve the voice fidelity considerably. Figure 7 shows that the number of errors played out by the audio device in the VoACL-DH3 data priority case are reduced significantly. This technique also further separates the voice-priority techniques from the baseline HV3 method, particularly as the channel conditions deteriorate. [1] Specification of the Bluetooth System, Volume 2, version 1.1, February 22, [2] Specification of the Bluetooth System, Volume 1, version 1.1, February 22, [3] A. Das, A. Ghose, A. Razdan, H. Saran, R. Shorey, Enhancing performance of asynchronous data traffic over the Bluetooth wireless ad-hoc network, IEEE INFOCOM '2001, Alaska, USA, April [4] A. Capone, M. Gerla, R. Kapoor, Efficient polling schemes for Bluetooth piconets, IEEE ICC 01, Helsinki, Finland, June [5] B. Miller and C. Bisdikian. Bluetooth revealed. Prentice Hall, NJ, [6] J. Bray and C.F. Sturman. Bluetooth: Connect without cables. Prentice Hall, NJ, 2001 [7] TIA/EIA/IS A, Physical Layer Standard for cdma2000 Spread Spectrum Systems.

IEEE P Working Group for Wireless Personal Area Networks TM

IEEE P Working Group for Wireless Personal Area Networks TM IEEE P802.15 Working Group for Wireless Personal Area Networks TM SCORT - An Alternative to the Bluetooth SCO Link for Voice Operation in an Interference Environment Slide 1 Bluetooth SCO Link The Bluetooth

More information

UNIT 5 P.M.Arun Kumar, Assistant Professor, Department of IT, Sri Krishna College of Engineering and Technology, Coimbatore.

UNIT 5 P.M.Arun Kumar, Assistant Professor, Department of IT, Sri Krishna College of Engineering and Technology, Coimbatore. Communication Switching Techniques UNIT 5 P.M.Arun Kumar, Assistant Professor, Department of IT, Sri Krishna College of Engineering and Technology, Coimbatore. Bluetooth Techniques References 1. Wireless

More information

Inside Bluetooth. Host. Bluetooth. Module. Application RFCOMM SDP. Transport Interface. Transport Bus. Host Controller Interface

Inside Bluetooth. Host. Bluetooth. Module. Application RFCOMM SDP. Transport Interface. Transport Bus. Host Controller Interface Inside Bluetooth Application Host Application Host Audio (SCO) RFCOMM SDP Data (ACL) Control API and Legacy Support Modules Bluetooth HCI Driver Transport Interface Physical I/F Transport Bus Bluetooth

More information

CS263: Wireless Communications and Sensor Networks

CS263: Wireless Communications and Sensor Networks CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 6: Bluetooth and 802.15.4 October 12, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Bluetooth Standard for Personal Area

More information

CROSS-LAYER APPROACHES TO WIRELESS COMMUNICATIONS AND NETWORKING

CROSS-LAYER APPROACHES TO WIRELESS COMMUNICATIONS AND NETWORKING Proceedings of the 4th Annual ISC Research Symposium ISCRS 2010 April 21, 2010, Rolla, Missouri CROSS-LAYER APPROACHES TO WIRELESS COMMUNICATIONS AND NETWORKING Chaitri Aroskar caa279@mst.edu Y.R.Zheng

More information

ALL SAINTS COLLEGE OF TECHNOLOGY, BHOPAL

ALL SAINTS COLLEGE OF TECHNOLOGY, BHOPAL BLUETOOTH Amita Tiwari IIIrd Semester amitaasct@gmail.com Sunil Kumar IIIrd Semester sunilasct@gmail.com ALL SAINTS COLLEGE OF TECHNOLOGY, BHOPAL ABSTRACT Blue tooth is a standard developed by a group

More information

Local Area Networks NETW 901

Local Area Networks NETW 901 Local Area Networks NETW 901 Lecture 6 IEEE 802.15.1 - Bluetooth Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 The 802.15 Family Target environment: communication of personal

More information

Bluetooth: Short-range Wireless Communication

Bluetooth: Short-range Wireless Communication Bluetooth: Short-range Wireless Communication Wide variety of handheld devices Smartphone, palmtop, laptop Need compatible data communication interface Complicated cable/config. problem Short range wireless

More information

A Routing Protocol and Energy Efficient Techniques in Bluetooth Scatternets

A Routing Protocol and Energy Efficient Techniques in Bluetooth Scatternets A Routing Protocol and Energy Efficient Techniques in Bluetooth Scatternets Balakrishna J. Prabhu and A. Chockalingam Department of Electrical Communication Engineering Indian Institute of Science, Bangalore

More information

Performance Evaluation of Bluetooth Links in the Presence of Specific Types of Interference

Performance Evaluation of Bluetooth Links in the Presence of Specific Types of Interference Vol:1, No:3, 27 Performance Evaluation of Bluetooth Links in the Presence of Specific Types of Interference Radosveta Sokullu and Engin Karatepe International Science Index, Electrical and Computer Engineering

More information

Wireless Sensor Networks

Wireless Sensor Networks Wireless Sensor Networks 11th Lecture 29.11.2006 Christian Schindelhauer schindel@informatik.uni-freiburg.de 1 Bluetooth in WSN? There are several commercially available MAC protocol/products Wi-Fi Bluetooth

More information

Introduction to Wireless Networking ECE 401WN Spring 2009

Introduction to Wireless Networking ECE 401WN Spring 2009 I. Overview of Bluetooth Introduction to Wireless Networking ECE 401WN Spring 2009 Lecture 6: Bluetooth and IEEE 802.15 Chapter 15 Bluetooth and IEEE 802.15 What is Bluetooth? An always-on, short-range

More information

SIMULATION BASED ANALYSIS OF BLUETOOTH NETWORKS. M. Subramani and M. Ilyas

SIMULATION BASED ANALYSIS OF BLUETOOTH NETWORKS. M. Subramani and M. Ilyas SIMULATION BASED ANALYSIS OF BLUETOOTH NETWORKS M. Subramani and M. Ilyas College of Engineering Florida Atlantic University Boca Raton, Florida 33431 {msubrama@cse.fau.edu, ilyas@fau.edu} Abstract Many

More information

Guide to Wireless Communications, 3 rd Edition. Objectives

Guide to Wireless Communications, 3 rd Edition. Objectives Guide to Wireless Communications, 3 rd Edition Chapter 5 Wireless Personal Area Networks Objectives Describe a wireless personal area network (WPAN) List the different WPAN standards and their applications

More information

e-pg Pathshala Quadrant 1 e-text

e-pg Pathshala Quadrant 1 e-text e-pg Pathshala Subject : Computer Science Module: Bluetooth Paper: Computer Networks Module No: CS/CN/37 Quadrant 1 e-text In our journey on networks, we are now exploring wireless networks. We looked

More information

Enhancing Bluetooth TCP Throughput via Link Layer Packet Adaptation

Enhancing Bluetooth TCP Throughput via Link Layer Packet Adaptation Enhancing Bluetooth TCP Throughput via Link Layer Packet Adaptation Ling-Jyh Chen, Rohit Kapoor, M. Y. Sanadidi, Mario Gerla UCLA Computer Science Department, Los Angeles, CA 995, USA {cclljj, rohitk,

More information

CS4/MSc Computer Networking. Lecture 13: Personal Area Networks Bluetooth

CS4/MSc Computer Networking. Lecture 13: Personal Area Networks Bluetooth CS4/MSc Computer Networking Lecture 13: Personal Area Networks Bluetooth Computer Networking, Copyright University of Edinburgh 2005 BlueTooth Low cost wireless connectivity for Personal Area Networks

More information

ADAPTIVE PACKET SELECTION ALGORITHM FOR BLUETOOTH DATA PACKETS

ADAPTIVE PACKET SELECTION ALGORITHM FOR BLUETOOTH DATA PACKETS Proceedings of the 6th WSEAS International Conference on Applied Computer Science, Hangzhou, China, April 15-17, 2007 160 ADAPTIVE PACKET SELECTION ALGORITHM FOR BLUETOOTH DATA PACKETS RADOSVETA SOKULLU

More information

Bluetooth Demystified

Bluetooth Demystified Bluetooth Demystified S-72.4210 Postgraduate Course in Radio Communications Er Liu liuer@cc.hut.fi -10 Content Outline Bluetooth History Bluetooth Market and Applications Bluetooth Protocol Stacks Radio

More information

MOBILE COMPUTING. Bluetooth 9/20/15. CSE 40814/60814 Fall Basic idea

MOBILE COMPUTING. Bluetooth 9/20/15. CSE 40814/60814 Fall Basic idea OBILE COUTING CE 40814/60814 Fall 2015 Bluetooth Basic idea Universal radio interface for ad-hoc wireless connectivity Interconnecting computer and peripherals, handheld devices, DAs, cell phones replacement

More information

Delivering Voice over IEEE WLAN Networks

Delivering Voice over IEEE WLAN Networks Delivering Voice over IEEE 802.11 WLAN Networks Al Petrick, Jim Zyren, Juan Figueroa Harris Semiconductor Palm Bay Florida Abstract The IEEE 802.11 wireless LAN standard was developed primarily for packet

More information

Master. Slave. Master. Slaves. TCP/IP Traffic with Efficient Bluetooth Technology. Shafqat Hameed 1, Umar F.Khan 2, *Muhammad Saleem 3

Master. Slave. Master. Slaves. TCP/IP Traffic with Efficient Bluetooth Technology. Shafqat Hameed 1, Umar F.Khan 2, *Muhammad Saleem 3 / Traffic with Efficient Bluetooth Technology Shafqat Hameed 1, Umar F.Khan 2, *Muhammad Saleem 3 1,3 National University of Sciences and Technology (NUST), Pakistan 2 University of Bradford, Bradford,

More information

Bluetooth ACL Packet Selection Via Maximizing the Expected Throughput Efficiency of ARQ Protocol

Bluetooth ACL Packet Selection Via Maximizing the Expected Throughput Efficiency of ARQ Protocol Bluetooth ACL Packet Selection Via aximizing the Expected Throughput Efficiency of AQ Protocol Xiang Li 1,2,*, an-tian Li 1, Zhen-Guo Gao 2, and Li-Ning Sun 1 1 obot esearch Institute, Harbin Institute

More information

Optimizing Packet Size via Maximizing Throughput Efficiency of ARQ on Bluetooth ACL Data Communication Link

Optimizing Packet Size via Maximizing Throughput Efficiency of ARQ on Bluetooth ACL Data Communication Link Proceedings of the 5th WSEAS Int. Conf. on APPLIED INFOATICS and COUNICATIONS, alta, September -7, 25 (pp24-28 Optimizing Pacet Size via aximizing Throughput Efficiency of AQ on Bluetooth ACL Data Communication

More information

Bluetooth. Bluetooth Radio

Bluetooth. Bluetooth Radio Bluetooth Bluetooth is an open wireless protocol stack for low-power, short-range wireless data communications between fixed and mobile devices, and can be used to create Personal Area Networks (PANs).

More information

Introduction to Bluetooth

Introduction to Bluetooth Introduction to Bluetooth Kirsten Matheus The idea behind Bluetooth The problems when trying to realize the idea The solutions used in Bluetooth How well the solutions work 12.06.2003 1 he Idea Behind

More information

Amarjeet Singh. February 7, 2012

Amarjeet Singh. February 7, 2012 Amarjeet Singh February 7, 2012 References Bluetooth Protocol Architecture v.1 www.bluetooth.org http://www.tutorial-reports.com/wireless/bluetooth/ Slides from last class uploaded on the course website

More information

Class-based Packet Scheduling Policies for Bluetooth

Class-based Packet Scheduling Policies for Bluetooth Class-based Packet Scheduling Policies for Bluetooth Vishwanath Sinha, D. Raveendra Babu Department of Electrical Engineering Indian Institute of Technology, Kanpur - 08 06, INDIA vsinha@iitk.ernet.in,

More information

Improving the performance of Bluetooth piconets with synchronous and asynchronous traffic

Improving the performance of Bluetooth piconets with synchronous and asynchronous traffic Improving the performance of Bluetooth piconets with synchronous and asynchronous traffic Vojislav B. Mišić, Jelena Mišić, and Ka Lok Chan Abstract The Bluetooth specification allows both asynchronous

More information

Efficient Multicast Schemes for Mobile Multiparty Gaming Applications

Efficient Multicast Schemes for Mobile Multiparty Gaming Applications Efficient Multicast Schemes for Mobile Multiparty Gaming Applications P6-6th semester 2006 Group 681 - ComNet Aalborg University 9th March 2006 Institut for elektroniske systemer Fr. Bajers Vej 7 Telefon

More information

CHAPTER 12 BLUETOOTH AND IEEE

CHAPTER 12 BLUETOOTH AND IEEE CHAPTER 12 BLUETOOTH AND IEEE 802.15 These slides are made available to faculty in PowerPoint form. Slides can be freely added, modified, and deleted to suit student needs. They represent substantial work

More information

A simple adaptive MAC scheduling scheme for bluetooth scatternet

A simple adaptive MAC scheduling scheme for bluetooth scatternet Title A simple adaptive AC scheduling scheme for bluetooth scatternet Author(s) Liu, C; Yeung, KL Citation Ieee Vehicular Technology Conference,, v. 58 n. 4, p. 65-69 Issued Date URL http://hdl.handle.net/7/4645

More information

Improving Bluetooth EDR Data Throughput Using FEC and Interleaving

Improving Bluetooth EDR Data Throughput Using FEC and Interleaving Improving Bluetooth EDR Data Throughput Using FEC and Interleaving Ling-Jyh Chen 1, Tony Sun 2, and Yung-Chih Chen 1 1 Institute of Information Science, Academia Sinica, Taipei 11529, Taiwan {cclljj, ycchen}@iis.sinica.edu.tw

More information

Wireless Communications

Wireless Communications 4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:

More information

November 1998 doc.: IEEE /378 IEEE P Wireless LANs Extension of Bluetooth and Direct Sequence Interference Model.

November 1998 doc.: IEEE /378 IEEE P Wireless LANs Extension of Bluetooth and Direct Sequence Interference Model. IEEE P802.11 Wireless LANs Extension of Bluetooth and 802.11 Direct Sequence Interference Model Date: November 11, 1998 Author: Jim Zyren Harris Semiconductor Melbourne, FL, USA Phone: (407)729-4177 Fax:

More information

A Dynamic Slot Assignment Scheme for Slave-to-Slave and Multicast-like Communication in Bluetooth Personal Area Networks

A Dynamic Slot Assignment Scheme for Slave-to-Slave and Multicast-like Communication in Bluetooth Personal Area Networks A Dynamic Slot Assignment Scheme for Slave-to-Slave and Multicast-like Communication in Bluetooth Personal Area Networks Carlos Cordeiro, Sachin Abhyankar, and Dharma P. Agrawal OBR Center for Distributed

More information

Simulation of Bluetooth Network

Simulation of Bluetooth Network Simulation of Bluetooth Network Lennart Lagerstedt Stockholm, 2003 Master of Science Thesis Project The Department of Microelectronics and Information Technology, Royal Institute of Technology (KTH) Lennart

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

Computer Networks II Advanced Features (T )

Computer Networks II Advanced Features (T ) Computer Networks II Advanced Features (T-110.5111) Bluetooth, PhD Assistant Professor DCS Research Group Based on slides previously done by Matti Siekkinen, reused with permission For classroom use only,

More information

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the

More information

Improving Wireless Link Throughput via Interleaved FEC

Improving Wireless Link Throughput via Interleaved FEC Improving Wireless Link Throughput via Interleaved FEC Ling-Jyh Chen, Tony Sun, M. Y. Sanadidi, Mario Gerla UCLA Computer Science Department, Los Angeles, CA 90095, USA {cclljj, tonysun, medy, gerla}@cs.ucla.edu

More information

Ad Hoc Nets - MAC layer. Part II TDMA and Polling

Ad Hoc Nets - MAC layer. Part II TDMA and Polling Ad Hoc Nets - MAC layer Part II TDMA and Polling More MAC Layer protocols Bluetooth Piconet: a polling/tdma scheme Cluster TDMA: based on TDMA (with random access and reserved slots) research protocol

More information

By N.Golmie Presented by: Sushanth Divvela

By N.Golmie Presented by: Sushanth Divvela By N.Golmie Presented by: Sushanth Divvela 1 Agenda Introduction WPAN WLAN Simulation Models Simulation results Concluding remarks 2 Introduc.on Coexistence of WPAN and WLAN Performance evaluation WLAN

More information

Analysis of UDP Performance over Bluetooth

Analysis of UDP Performance over Bluetooth Analysis of UDP Performance over Bluetooth Martin Connolly, Cormac J. Sreenan University College Cork Department of Computer Science Email: cjs@cs.ucc.ie Abstract The Bluetooth protocol is one of the better-known

More information

TDM Backhaul Over Unlicensed Bands

TDM Backhaul Over Unlicensed Bands White Paper TDM Backhaul Over Unlicensed Bands advanced radio technology for native wireless tdm solution in sub-6 ghz Corporate Headquarters T. +972.3.766.2917 E. sales@radwin.com www.radwin.com PAGE

More information

Correct Bluetooth EDR FEC Performance with SEC-DAEC Decoding

Correct Bluetooth EDR FEC Performance with SEC-DAEC Decoding Correct Bluetooth EDR FEC Performance with SEC-DAEC Decoding R. Razavi, M. Fleury and M. Ghanbari By selecting from Bluetooth s Enhanced Data Rate (EDR) packet types according to channel conditions, optimal

More information

Bluetooth. Basic idea

Bluetooth. Basic idea Bluetooth Basic idea Universal radio interface for ad-hoc wireless connectivity Interconnecting computer and peripherals, handheld devices, DAs, cell phones replacement of IrDA Embedded in other devices,

More information

Feasibility of a Bluetooth Based Structural Health Monitoring Telemetry System

Feasibility of a Bluetooth Based Structural Health Monitoring Telemetry System Feasibility of a Bluetooth Based Structural Health Monitoring Telemetry System Item Type text; Proceedings Authors Uchil, Vilas; Kosbar, Kurt Publisher International Foundation for Telemetering Journal

More information

Bluetooth. Renato Lo Cigno

Bluetooth. Renato Lo Cigno Bluetooth Renato Lo Cigno www.dit.unitn.it/locigno/teaching ...Copyright Quest opera è protetta dalla licenza Creative Commons NoDerivs- NonCommercial. Per vedere una copia di questa licenza, consultare:

More information

System Level Analysis of the Bluetooth standard

System Level Analysis of the Bluetooth standard System Level Analysis of the standard Massimo Conti, Daniele Moretti Università Politecnica delle Marche, via Brecce Bianche, I-60131, Ancona, Italy Abstract The SystemC modules of the Link Manager Layer

More information

Energy Evaluation for Bluetooth Link Layer Packet Selection Scheme

Energy Evaluation for Bluetooth Link Layer Packet Selection Scheme European Wireless 29 1 Energy Evaluation for Bluetooth Link Layer Packet Selection Scheme Gian Paolo Perrucci and Morten V. Pedersen and Tatiana K. Madsen and Frank H.P. Fitzek Department of Electronic

More information

A Guide. Wireless Network Library Bluetooth

A Guide. Wireless Network Library Bluetooth A Guide to the Wireless Network Library Conforming to Standard v1.1 SystemView by ELANIX Copyright 1994-2005, Eagleware Corporation All rights reserved. Eagleware-Elanix Corporation 3585 Engineering Drive,

More information

Header Compression Capacity Calculations for Wireless Networks

Header Compression Capacity Calculations for Wireless Networks Header Compression Capacity Calculations for Wireless Networks Abstract Deployment of wireless transport in a data-centric world calls for a fresh network planning approach, requiring a balance between

More information

Introduction to Bluetooth Wireless Technology

Introduction to Bluetooth Wireless Technology Introduction to Bluetooth Wireless Technology Jon Inouye Staff Software Engineer Mobile Platforms Group Intel Corporation Bluetooth Bluetooth is is a a trademark trademark owned owned by by Bluetooth Bluetooth

More information

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP CS 5520/ECE 5590NA: Network Architecture I Spring 2008 Lecture 13: UDP and TCP Most recent lectures discussed mechanisms to make better use of the IP address space, Internet control messages, and layering

More information

Communication Systems. WPAN: Bluetooth. Page 1

Communication Systems. WPAN: Bluetooth. Page 1 Communication Systems WPAN: Bluetooth Page 1 Outline Historical perspective Piconet Scatternet Lattency modes Applications Page 2 Bluetooth Bluetooth (BT) wireless technology is a short-range communications

More information

Experimental Assessment of Media Synchronization Quality in IEEE b under Bluetooth Interference

Experimental Assessment of Media Synchronization Quality in IEEE b under Bluetooth Interference Experimental Assessment of Media Synchronization Quality in IEEE 802.11b under Bluetooth Interference Masami KATO, Hirotsugu OKURA, Kiyoshige ITO and Shuji TASAKA Digital Systems Development Center BU,

More information

Dominique Chomienne & Michel Eftimakis NewLogic

Dominique Chomienne & Michel Eftimakis NewLogic Dominique Chomienne & Michel Eftimakis NewLogic Bluetooth is a trademark owned by the Bluetooth SIG, and licenced to NewLogic Page 1 Tutorial Agenda Bluetooth Marketing view Bluetooth network topology

More information

Redes Inalámbricas Tema 2.B Wireless PANs: Bluetooth

Redes Inalámbricas Tema 2.B Wireless PANs: Bluetooth Redes Inalámbricas Tema 2.B Wireless PANs: Bluetooth Bluetooh Acknowledgments: Foo Chun Choong, Ericsson Research / Cyberlab Singapore, and Open Source Software Lab, ECE Dept, NUS Máster de Ingeniería

More information

lntroducing Service Differentiation in a Bluetooth Piconet

lntroducing Service Differentiation in a Bluetooth Piconet lntroducing Service Differentiation in a Bluetooth Piconet Antoine Mercier1 and Pascale Minet2 1 Ecole Centrale d'electronique, LACCSC, 53 rue de Grenelle, 75007 Paris, France mercierlece.fr 2 INRIA, Rocquencourt,

More information

PCs Closed! Cell Phones Off! Marketing Assistant Manager - Magic Lin

PCs Closed! Cell Phones Off! Marketing Assistant Manager - Magic Lin Bluetooth solution PCs Closed! Cell Phones Off! Marketing Assistant Manager - Magic Lin 林 lin.magic@tw.anritsu.com 0933-710-634 v.9 群 1 Bluetooth Core System Architecture 2 Bluetooth Core System Architecture_2

More information

Comparing Bluetooth HDP and SPP for Mobile Health Devices

Comparing Bluetooth HDP and SPP for Mobile Health Devices Comparing Bluetooth HDP and SPP for Mobile Health Devices Jad Noueihed, Robert Diemer, Samarjit Chakraborty and Stefanie Biala Institute for Real-Time Computer Systems, TU Munich Vodafone Group R&D Germany,

More information

A Study of Wireless Compressed Digitalaudio

A Study of Wireless Compressed Digitalaudio A Study of Wireless Compressed Digital Transmission Andreas Floros 1, Marios Koutroubas 2, Nicolas-Alexander Tatlas 2 and John Mourjopoulos 2 1 ATMEL Hellas S.A., Patras Science Park, Platani, 26 500 Patras,

More information

[A SHORT REPORT ON BLUETOOTH TECHNOLOGY]

[A SHORT REPORT ON BLUETOOTH TECHNOLOGY] 2011 [A SHORT REPORT ON BLUETOOTH TECHNOLOGY] By Ram Kumar Bhandari 1. Introduction Bluetooth Technology A Technical Report Bluetooth is a short-ranged wire-less communication technology implementing the

More information

An Efficient Link Polling Policy by Pattern Matching for Bluetooth Piconets

An Efficient Link Polling Policy by Pattern Matching for Bluetooth Piconets The Computer Journal, 47(2), The British Computer Society; all rights reserved An Efficient Link Polling Policy by Pattern Matching for Bluetooth Piconets Ting-Yu Lin 1, Yu-Chee Tseng 2 and Yuan-Ting Lu

More information

Joint PHY/MAC Based Link Adaptation for Wireless LANs with Multipath Fading

Joint PHY/MAC Based Link Adaptation for Wireless LANs with Multipath Fading Joint PHY/MAC Based Link Adaptation for Wireless LANs with Multipath Fading Sayantan Choudhury and Jerry D. Gibson Department of Electrical and Computer Engineering University of Califonia, Santa Barbara

More information

Quality of Service in the Home Networking Model

Quality of Service in the Home Networking Model Quality of Service in the Home Networking Model Abstract The market for home networking will soon see rapid growth. In addition to traditional data networking, this market will be driven by the desire

More information

Structure of the Lecture

Structure of the Lecture Structure of the Lecture Chapter 2 Technical Basics: Layer 1 Methods for Medium Access: Layer 2 Chapter 3 Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Networks: GSM, GPRS, UMTS Satellites

More information

SE 4C03 Winter 2005 Bluetooth Wireless Network Technology

SE 4C03 Winter 2005 Bluetooth Wireless Network Technology SE 4C03 Winter 2005 Bluetooth Wireless Network Technology Researcher: Daren Tan Shen Hau Last Revised: April 4, 2005 Bluetooth As everyone will ask, what is Bluetooth? Bluetooth is a new technology that

More information

An Integrated Approach to Scatternet Traffic Management in Bluetooth Ad Hoc Networks

An Integrated Approach to Scatternet Traffic Management in Bluetooth Ad Hoc Networks Title An Integrated Approach to Scatternet Traffic Management in Bluetooth Ad Hoc Networks Author(s) Shek, LLY; Kwok, YK Citation Proceedings - Ieee Computer Society's International Computer Software And

More information

CHAPTER TWO LITERATURE REVIEW

CHAPTER TWO LITERATURE REVIEW CHAPTER TWO LITERATURE REVIEW 2.1 Introduction. This chapter provides in detail about the multiple access technologies and the OCDMA system. It starts with a discussion on various existing multiple-access

More information

2. Modelling of telecommunication systems (part 1)

2. Modelling of telecommunication systems (part 1) 2. Modelling of telecommunication systems (part ) lect02.ppt S-38.45 - Introduction to Teletraffic Theory - Fall 999 2. Modelling of telecommunication systems (part ) Contents Telecommunication networks

More information

An Efficient Link Polling Policy by Pattern Matching for Bluetooth Piconets

An Efficient Link Polling Policy by Pattern Matching for Bluetooth Piconets An Efficient Link Polling Policy by Pattern Matching for Bluetooth Piconets Ting-Yu Lin 1, Yu-Chee Tseng 1, and Yuan-Ting Lu 2 1 Department of Computer Science and Information Engineering National Chiao-Tung

More information

Data Link Layer: Overview, operations

Data Link Layer: Overview, operations Data Link Layer: Overview, operations Chapter 3 1 Outlines 1. Data Link Layer Functions. Data Link Services 3. Framing 4. Error Detection/Correction. Flow Control 6. Medium Access 1 1. Data Link Layer

More information

Payload Length and Rate Adaptation for Throughput Optimization in Wireless LANs

Payload Length and Rate Adaptation for Throughput Optimization in Wireless LANs Payload Length and Rate Adaptation for Throughput Optimization in Wireless LANs Sayantan Choudhury and Jerry D. Gibson Department of Electrical and Computer Engineering University of Califonia, Santa Barbara

More information

Co-Channel Interference in Bluetooth Piconets

Co-Channel Interference in Bluetooth Piconets Co-Channel Interference in Bluetooth Piconets By Jamel Pleasant Lynch Jr. Committee Chairman: Dr. Brian Woerner ABSTRACT Bluetooth is an emerging short-range RF wireless voice and data communication technology

More information

A bandwidth-based polling scheme for QoS support in Bluetooth

A bandwidth-based polling scheme for QoS support in Bluetooth Computer Communications 27 (2004) 1236 1247 www.elsevier.com/locate/comcom A bandwidth-based polling scheme for QoS support in Bluetooth Chun-Chuan Yang*, Chin-Fu Liu Multimedia and Communications Laboratory,

More information

Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15

Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15 Lecture 23 Overview Last Lecture ADSL, ATM This Lecture Wireless Technologies (1) Wireless LAN, CSMA/CA, Bluetooth Source: chapters 6.2, 15 Next Lecture Wireless Technologies (2) Source: chapter 16, 19.3

More information

Multiple Access Protocols

Multiple Access Protocols Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just

More information

Bhopal, , India 3 M.Tech Scholor,Department Of Computer Science, BIST Bhopal. Bhopal, , India

Bhopal, , India 3 M.Tech Scholor,Department Of Computer Science, BIST Bhopal. Bhopal, , India Indirect Mobile Data Transfer Under Bluetooth Protocol 1 Pramod Kumar Maurya, 2 Gireesh Dixit, 3 Jay Prakash Maurya 1 M.Tech Scholor, 2 HOD, Department Of Computer Science, MPM, Bhopal, Bhopal, 462021,

More information

Solving the Interference Problem due to Wireless LAN for Bluetooth Transmission Using a Non- Collaborative Mechanism. Yun-Ming, Chiu 2005/6/09

Solving the Interference Problem due to Wireless LAN for Bluetooth Transmission Using a Non- Collaborative Mechanism. Yun-Ming, Chiu 2005/6/09 Solving the Interference Problem due to Wireless LAN for Bluetooth Transmission Using a Non- Collaborative Mechanism Yun-Ming, Chiu 2005/6/09 Outline Overview Survey of Bluetooth Structure of Bluetooth

More information

Module 6 STILL IMAGE COMPRESSION STANDARDS

Module 6 STILL IMAGE COMPRESSION STANDARDS Module 6 STILL IMAGE COMPRESSION STANDARDS Lesson 19 JPEG-2000 Error Resiliency Instructional Objectives At the end of this lesson, the students should be able to: 1. Name two different types of lossy

More information

Module 10 Frame Relay and ATM

Module 10 Frame Relay and ATM Module 10 Frame Relay and ATM 10.0 INTRODUCTION Multimedia is basically a heterogeneous service which is characterized by different traffic types and variable bandwidths. Specifically Video bandwidth has

More information

MOBILE COMPUTING. Jan-May,2012. ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala.

MOBILE COMPUTING. Jan-May,2012. ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala. WPAN: Bluetooth MOBILE COMPUTING Jan-May,2012 ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala Email-alakroy.nerist@gmail.com EM Spectrum ISM band 902 928 Mhz 2.4 2.4835 Ghz 5.725 5.85 Ghz LF MF

More information

LANs Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed

LANs Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed With relatively small bit errors Multiaccess Protocols Communication among

More information

An Efficient Tool for the Evaluation of the Impact of WiFi Interference on Bluetooth Performance

An Efficient Tool for the Evaluation of the Impact of WiFi Interference on Bluetooth Performance 1 An Efficient Tool for the Evaluation of the Impact of WiFi Interference on Bluetooth Performance Madani Zeghdoud 1, Pascal Cordier 1, and Michel Terré 2 1 France Telecom R&D, Issy les Moulineaux, France.

More information

ELEC 691X/498X Broadcast Signal Transmission Winter 2018

ELEC 691X/498X Broadcast Signal Transmission Winter 2018 ELEC 691X/498X Broadcast Signal Transmission Winter 2018 Instructor: DR. Reza Soleymani, Office: EV 5.125, Telephone: 848 2424 ext.: 4103. Office Hours: Wednesday, Thursday, 14:00 15:00 Slide 1 In this

More information

Bluetooth Wireless Technology meets CAN

Bluetooth Wireless Technology meets CAN Bluetooth Wireless Technology meets CAN Matthias Fuchs esd electronic system design GmbH, Hannover, Germany To access mobile and moving CAN fieldbus systems a wireless approach is often a good solution.

More information

G 364: Mobile and Wireless Networking. CLASS 2, Wed. Jan Stefano Basagni Spring 2004 M-W, 11:40am-1:20pm, 109 Rob

G 364: Mobile and Wireless Networking. CLASS 2, Wed. Jan Stefano Basagni Spring 2004 M-W, 11:40am-1:20pm, 109 Rob G 364: Mobile and Wireless Networking CLASS 2, Wed. Jan 7 2004 Stefano Basagni Spring 2004 M-W, 11:40am-1:20pm, 109 Rob Wireless Issues Architecture, communication model and duplexing define the framework

More information

WIRELESS TECHNOLOGIES

WIRELESS TECHNOLOGIES WIRELESS TECHNOLOGIES Bluetooth, ZigBee and ANT Thomas Aasebø OVERVIEW What are wireless sensor networks? What are personal area networks? What are these networks typically used for? Bluetooth, ZigBee

More information

Performance of Lucent CDMA2000 3G1X Packet Data Experimental System

Performance of Lucent CDMA2000 3G1X Packet Data Experimental System Performance of Lucent CDMA2 3G1X Packet Data Experimental System Gang Li, Ming Lu, Martin Meyers, Devesh Patel, James Stekas, and Andrea Tonello Bell Laboratories, Lucent Technologies Inc. 67 Whippany

More information

ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017 ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.4: Multiple Access Protocols Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527

More information

BASEBAND SPECIFICATION

BASEBAND SPECIFICATION Core System Package [Controller volume] Part B BASEBAND SPECIFICATION This document describes the specification of the Bluetooth link controller which carries out the baseband protocols and other lowlevel

More information

Wireless Local Area Network. Internet Protocol Suite

Wireless Local Area Network. Internet Protocol Suite Wireless Local Area Network Internet Protocol Suite Application layer File transfer protocol Telnet Hypertext transfer protocol Transport layer Network layer Host-tonetwork layer User datagram protocol

More information

Wireless multipoint communication for optical sensors in the industrial environment using the new Bluetooth standard

Wireless multipoint communication for optical sensors in the industrial environment using the new Bluetooth standard Wireless multipoint communication for optical sensors in the industrial environment using the new Bluetooth standard Stephan Hussmann*a, Wing Yan Laua, Terry ChUa, Markus Grothofb aschool of Engineering,

More information

Physical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan

Physical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan P Physical Layer Srinidhi Varadarajan Medium Access Links and Protocols Three types of links : point-to-point (single wire, e.g. PPP, SLIP) broadcast (shared wire or medium; e.g, Ethernet, Wavelan, etc.)

More information

Freescale Semiconductor, I

Freescale Semiconductor, I nc. Using the Bluetooth Audio Signal Processor (BTASP) for High-Quality Audio Performance Application Note AN2210/D Rev. 0, 12/2001 nc. Motorola reserves the right to make changes without further notice

More information

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection: 1 Topics 2 LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS Multiple access: CSMA/CD, CSMA/CA, token passing, channelization LAN: characteristics, i basic principles i Protocol architecture Topologies

More information

Personal Area Networking over Bluetooth

Personal Area Networking over Bluetooth Personal Area Networking over Bluetooth Pravin Bhagwat Networking Research Group AT&T Labs - Research pravin@acm.org ACM Mobicom 2000 Half day tutorial Aug 06, 2000 Boston, MA Bluetooth A cable replacement

More information

Special Course in Computer Science: Local Networks. Lecture

Special Course in Computer Science: Local Networks. Lecture Special Course in Computer Science: Local Networks Lecture 11 16.5.2012 Roadmap of the Course So far Basic telecom concepts General study of LANs Local Networks Ethernet Token bus Token ring ATM LAN Wi-Fi

More information