Optimizing Packet Size via Maximizing Throughput Efficiency of ARQ on Bluetooth ACL Data Communication Link

Size: px
Start display at page:

Download "Optimizing Packet Size via Maximizing Throughput Efficiency of ARQ on Bluetooth ACL Data Communication Link"

Transcription

1 Proceedings of the 5th WSEAS Int. Conf. on APPLIED INFOATICS and COUNICATIONS, alta, September -7, 25 (pp24-28 Optimizing Pacet Size via aximizing Throughput Efficiency of AQ on Bluetooth ACL Data Communication Lin LI XIANG, KALU PIYANATH UDAGEPOLA, YANG XIAO ZONG School of Computer Science and Technology Harbin Institute of Technology No.92, West Da-Zhi Street, Harbin, Heilongjiang P CHINA Abstract: Based on the acnowledgement history of the most recently transmitted pacets, an estimate of the channel bit error rate is made, based on which an optimal pacet size can be selected through maximizing the expected throughput efficiency of AQ protocol on Bluetooth ACL data communication lin. Simulation results show that this method wors very well even with a short observation history. Key words: Bluetooth; AQ; ACL; SCO; Throughput Efficiency; BE Introduction Bluetooth (BT [,2,3] is a short-range radio lin intended to be a cable replacement between portable and/or fixed electronic devices. Two types of transmission lins, synchronous connection oriented (SCO and asynchronous connectionless (ACL lins are used. SCO lin is a symmetric point to point lin supporting time-bounded voice traffic. SCO pacets are transmitted over reserved intervals without being polled. ACL lin is a point to multipoint lin between master and all slaves in the piconet and can use all the remaining slots of the channel not used for SCO lin. Bluetooth is a frequency hopping system which can support multiple communication channels in a common area (each channel is defined by a unique frequency hopping sequence. Frequency hopping is used in such a way that the radio is turned to the same frequency for the entire duration of the pacet, but then changes to a different frequency each time it transmits a new pacet or retransmits an erroneous pacet. Since the fading and interference in the new frequency channel will be significantly different than that of the previous one, the use of frequency hopping with AQ provides an effective method of diversity. Automatic epeat equest (AQ protocols are designed to remove transmission errors from data communications systems. When used over relatively high bit-error rate lins (e.g., -5 or higher such as wireless or satellite lins, their performance is sensitive to the pacet size used in the transmission. When too large a pacet size is employed, there is an increased need for retransmissions, while too small a pacet size is inefficient because of the fixed overhead required per pacet. When an AQ scheme is to be used at the lin layer over a relatively high error-rate lin, the pacet size should be chosen based on the error-rate. In this paper, we concern with choosing optimal pacet payload length on the Bluetooth ACL data communication lins, in terms of maximizing the throughput efficiency of AQ protocol based on the acnowledgement history of the most recently transmitted pacets. That is, given the number of pacets that required retransmission, an estimate of the channel bit error rate is made, based on which a pacet size is chosen to maximizes the expected throughput efficiency of the data lin protocol. 2 Bluetooth Data Pacets In Bluetooth, the data on the piconet channel is conveyed in pacets. The general pacet format is shown in Figure. Each pacet consists of 3 entities: the access code, the header, and the payload. In fig., the number of bits per entity is indicated.

2 Proceedings of the 5th WSEAS Int. Conf. on APPLIED INFOATICS and COUNICATIONS, alta, September -7, 25 (pp24-28 The access code and header are of fixed size: 72 bits and 54 bits respectively. The payload length can range from zero to a maximum of 2745 bits. Different pacet types have been defined. Pacets may consist of the (shortened access code only, of the access code header, or of the access code header payload. Data in Bluetooth can be transmitted asynchronously using ACL pacets. In this paper, we mainly focus on ACL pacets data transfer used in asynchronously connections, such as summarized in Tab., seven ACL pacet types are defined in the Bluetooth. D stands for Data-edium rate, and DH for Data-High rate. D pacets are all 2/3-FEC encoded to tolerate possible transmission errors. Not encoded by FEC, DH pacets are more error-vulnerable, but it can carry more information. Among seven pacets all but one of these pacet types (AUX use a cyclic redundancy chec (CC code and automatic repeat request (AQ for error control. The AUX pacet is similar to DH, but it has no CC code and can t be re retransmitted, so we don t tae the AUX pacet into consideration. Table Summary of Bluetooth ACL data pacets Type Payload User CC FEC Header(bytes Payload(bytes (bits D /3 DH no D /3 DH no D /3 DH no AUX -29 no no Then, the six ACL pacet types have total maximum payload length as follows: D:24 DH:24 D3: DH3:496 D5:2745 DH5: Selecting Optimal Pacet Size 3. Throughput Efficiency of AQ Protocol A protocol performance is usually characterized by many parameters which are defined by the communication system requirements. The most important parameters are the probability of receiving a message without errors and the protocol throughput efficiency. There are several definitions of the protocol throughput efficiency. ost frequently it is defined as the ratio of the mean number of information bits successfully accepted by the receiver to the number of bits that could have been transmitted during the same time interval [4]. To do so we must first derive an expression for the throughput efficiency of the AQ protocol. The expressions derived in this section assume the use of an optimal AQ protocol in that only pacets containing errors are retransmitted. The throughput efficiency of AQ scheme that uses pacets having n bits of information bits is determined by [5] : η = ( / ( n where, the first term /n of the above expression represents the ratio of information bits to total bits in a pacet, and represents the average number of transmission attempts per pacet. Assuming that the AQ scheme retransmits a pacet until the acnowledgement of a successful reception, the average number of attempts,, needed to successfully transmit one pacet is given by [6] : = (-p+2 p (-p+3 p p (-p+ = p where, p is the pacet error rate. So, for a given p, the throughput efficiency of AQ that uses pacets having n bits of information bits is given by: η = ( (- p (3 n 3.2 Choosing Pacet Size based on History of Transmitted Pacets In Bluetooth wireless connection, in order to guarantee reliable transmission an automatic repeat request (AQ mechanism is adopted. That is, the receiving side sends bac special control frame as the acnowledgement or negative acnowledgement (ACK/NACK to the input. In case of losing frame or acnowledgement message, the timer will send out timeout signal when the timer has expired, and to remind other side that some problems have happened and this frame must be retransmitted. At the same time, receiver must be capable of distinguishing (2 2

3 Proceedings of the 5th WSEAS Int. Conf. on APPLIED INFOATICS and COUNICATIONS, alta, September -7, 25 (pp24-28 between retransmitted and new frame. With an automatic repeat request scheme in Bluetooth specification, D, DH and the data field of DV pacets are transmitted and retransmitted until acnowledgement of a successful reception is returned by the destination (or timeout is exceeded. The acnowledgement information is included in the header of the return pacet, so-called piggy-bacing. To determine whether the payload is correct or not, a cyclic redundancy chec (CC code is added to the pacet. The AQ scheme only wors on the payload in the pacet (only that payload which has a CC. The pacet header and the voice payload are not protected by the AQ scheme. Supposed the BE(bit error rate is b, and, the number of retransmission requests out of the last pacet transmissions, and ' is the payload size used in the previous transmissions. The expected throughput efficiency η ( of AQ protocol pacets is given by [7] : ( p ( p ( p η ( (4 n ( ( p ( p where = b b ( p ' is the pacet error rate of pacets transmission. The pacet error rate, p, for DH pacets is [6,8] : = ( b (5 p ecalling that D pacets are protected by a (, Hamming code (encoded with a 2/3 bloc FEC, i.e., in every bloc, bits are used to encode bits of data, which is capable of correcting one bit error per bit code bloc. The payload is correctly decoded provided that all code blocs contain one or fewer errors. The pacet error rate, p, for D pacets can be approximated as: p 4 / = (( + b( (6 Combining equations (4 (6, we can get η ( for DH and D pacets respectively as: '( ( ( ( ( ( η ( = b [ ] (7 ' '( n ( b ( ( ( 4 / 4 ' / 4 '( / (( + b( ( ( (( + b( (( + b( η ( = b [ ] 4 ' / 4 '( / n ( + + b ( (( b( (( b( (8 where, n=+26. It is now possible to choose the value of, the payload length to be used in future transmissions, so that the ' throughput efficiency of the AQ protocol is maximized. This can be done by choosing the value of that maximizes equation (7 or (8 for a value of that is equal to the number of retransmission requests that occurred during the previous transmissions using the payload size '. 4 Simulation esults Usually, the solution way of the maximization problem for η ( in equation (7 or (8 is difficult; However, for specific values of, and ' equation (7 or (8 can be solved numerically. An optimal value for can now be found using numerical search algorithms. Since the numerical evaluation of this integral is very intensive, a comprehensive search for the optimal value of is not practical. Instead, a restricted search using select values for can be performed. Such a search, for example, can consider values of that are a multiple of ; thereby significantly reducing the complexity of the search. Such a restricted search has little impact on the performance of the protocol since values of that are within bits of the optimal bloc size should result in near-optimal performance. In figure 2, we plot the optimal payload size when a history of 5 previously transmitted bit pacets payload is considered. As can be seen from the fig.2 (a, for DH pacets transmission, when the previous fifty transmissions resulted in no errors the payload length can be maximized to 2744 bits (the maximization throughput efficiency can be gotten at payload length of 32 bits. When one and two errors occurred the payload length can be increased to 2 and 7 bits respectively. When three errors occurred the payload length can be ept at bits and when more than three errors occur the payload length is reduced. As depicted in fig.2 (, for D pacets transmission, when the previous fifty transmissions resulted in no errors the payload length can be maximized to be 2745 bits (the maximization throughput efficiency can be gotten at pacet payload length of 44 bits. When one, two and three errors occurred the payload length can be increased to 25, 9 and 6 bits respectively and when more than three errors occur the payload length is reduced. 3

4 Proceedings of the 5th WSEAS Int. Conf. on APPLIED INFOATICS and COUNICATIONS, alta, September -7, 25 (pp Throughput Efficiency = = 3 = 5 = 8 = = 2 b (bit error rate b (bit error rate (a ( Fig.3 ean throughput efficiency of algorithm for various b. (ad H pacet. (D pacet. Throughput Efficiency = =3 =5 =8 = =2 Let opt ( be the optimal value of chosen for a given value of out of the last pacet transmissions. The efficiency of the AQ protocol with that value of can be computed according to equation (3 combined with equation (5 or (6. Then it can be averaged over the distribution of given b to yield the performance of AQ for a given value of b. Fig.3 shows the mean throughput efficiency of AQ with various values of and b, and a previous pacet payload length of bits. As can be seen from the figure, whether it is D or D pacets transmission, good performance is obtained with a history of just 75 bits payload size (5 pacets at pacet payload size of bits. When b is higher than -5, more of history is required to obtain a reasonable estimate of throughput efficiency for D pacets transmission; but for DH pacets transmission, the situation is quite different, only few or the least history of pacets transfer is required to obtain high throughput efficiency. In the previous fifty pacets transmission with payload length of bits, select optimizing pacet size under different retransmission pacets, fig.4 compares mean throughout efficiency of AQ during DH and D pacets transmission for various b. It is important to note that the performance of AQ is much more vulnerable to DH pacets when b is high. That is, when b is high the use of DH or D pacet type can have a disastrous effect on the throughput efficiency, and D pacets transfer can produce higher throughput efficiency than DH pacets. When b is low, small variations in the throughput efficiency from the different bit error rate b, pacet types (DH/D. So in a high error rate environment, it is better to tae D pacets as data transmission, which accords with the capability of D to tolerate high transmission error rate. Oppositely, in a low error rate environment, it is better to tae DH pacets as data transmission, it is because not decoded by 2/3-FEC DH pacets have relatively higher data transfer rate than D pacets data transmission. 4

5 Proceedings of the 5th WSEAS Int. Conf. on APPLIED INFOATICS and COUNICATIONS, alta, September -7, 25 (pp DH D Conclusion This paper introduces a method to select the optimal pacet payload length used by Bluetooth ACL data lin layer. The throughput efficiency of AQ protocol is given based on retransmission history. So, given pacet transmission record we can choose the pacet size such that the expected throughput efficiency of the AQ protocol is maximized under different channel BEs (bit error rates. Simulation results show that the method wors very well even with a short observation history (5 pacets at size of bits payload, total 75 bits payload transfer. In a high error rate environment, it is better to tae D pacets as data transmission; but in a low error rate environment, it is better to tae DH pacets as data transmission to improve the data transfer rate. IEEE-ussia Conferences icrowave Electronics: easurements, Identification (EIA'2, Novosibirs, ussia, 2, pp [6] L.J. Chen,. Kapoor,.Y. Sanadidi,. Gerla, Enhancing bluetooth TCP throughput via lin layer pacet adaptation, in: Proc. of the 24 IEEE International Conference on Communications (ICC 24, Paris, France, 24. [7] E. odiano, An adaptive algorithm for optimizing the pacet size used in wireless AQ protocols. Wireless Networs, 999, 5: [8].C. Valenti,. obert, and J. H. eed, On the throughput of bluetooth data transmissions, in: Proc. of the IEEE Wireless Commun. and Networing Conf., Orlando, USA, 22, eferences: [] Bluetooth SIG, Specification of the Bluetooh System, version., Feb.2. [2] J.Harrtsen, The bluetooth radio system, IEEE Personal Communicatios, Feb.2, 7(: [3] X. Li, X.Z. Yang, ebluescatter: an Energy-Efficient Ad Hoc Networ Formation Algorithm over Bluetooth, WSEAS Transactions on Information Science and Applications, 25, 8(2, pp [4] W. Turin, Throughput analysis of the Go-Bac-N protocol in fading radio channels. IEEE Journal on Selected Areas in Communications, 999, 7(5, pp [5] V.P. Pribylov and G.A. Chernetsy, Throughput efficiency of automatic repeat request algorithm with selective reject in communication lins with great signal propagation delay, in: Proc. of the 3-rd 5

Bluetooth ACL Packet Selection Via Maximizing the Expected Throughput Efficiency of ARQ Protocol

Bluetooth ACL Packet Selection Via Maximizing the Expected Throughput Efficiency of ARQ Protocol Bluetooth ACL Packet Selection Via aximizing the Expected Throughput Efficiency of AQ Protocol Xiang Li 1,2,*, an-tian Li 1, Zhen-Guo Gao 2, and Li-Ning Sun 1 1 obot esearch Institute, Harbin Institute

More information

IEEE P Working Group for Wireless Personal Area Networks TM

IEEE P Working Group for Wireless Personal Area Networks TM IEEE P802.15 Working Group for Wireless Personal Area Networks TM SCORT - An Alternative to the Bluetooth SCO Link for Voice Operation in an Interference Environment Slide 1 Bluetooth SCO Link The Bluetooth

More information

Improving Simultaneous Voice and Data Performance in Bluetooth Systems

Improving Simultaneous Voice and Data Performance in Bluetooth Systems Improving Simultaneous Voice and Data Performance in Bluetooth Systems Abstract In the Bluetooth system, isochronous applications, such as voice and audio, are carried by Synchronous Connection Oriented

More information

UNIT 5 P.M.Arun Kumar, Assistant Professor, Department of IT, Sri Krishna College of Engineering and Technology, Coimbatore.

UNIT 5 P.M.Arun Kumar, Assistant Professor, Department of IT, Sri Krishna College of Engineering and Technology, Coimbatore. Communication Switching Techniques UNIT 5 P.M.Arun Kumar, Assistant Professor, Department of IT, Sri Krishna College of Engineering and Technology, Coimbatore. Bluetooth Techniques References 1. Wireless

More information

Data Link Control Protocols

Data Link Control Protocols Protocols : Introduction to Data Communications Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 23 May 2012 Y12S1L07, Steve/Courses/2012/s1/its323/lectures/datalink.tex,

More information

ADAPTIVE PACKET SELECTION ALGORITHM FOR BLUETOOTH DATA PACKETS

ADAPTIVE PACKET SELECTION ALGORITHM FOR BLUETOOTH DATA PACKETS Proceedings of the 6th WSEAS International Conference on Applied Computer Science, Hangzhou, China, April 15-17, 2007 160 ADAPTIVE PACKET SELECTION ALGORITHM FOR BLUETOOTH DATA PACKETS RADOSVETA SOKULLU

More information

Enhancing Bluetooth TCP Throughput via Link Layer Packet Adaptation

Enhancing Bluetooth TCP Throughput via Link Layer Packet Adaptation Enhancing Bluetooth TCP Throughput via Link Layer Packet Adaptation Ling-Jyh Chen, Rohit Kapoor, M. Y. Sanadidi, Mario Gerla UCLA Computer Science Department, Los Angeles, CA 995, USA {cclljj, rohitk,

More information

Energy Evaluation for Bluetooth Link Layer Packet Selection Scheme

Energy Evaluation for Bluetooth Link Layer Packet Selection Scheme European Wireless 29 1 Energy Evaluation for Bluetooth Link Layer Packet Selection Scheme Gian Paolo Perrucci and Morten V. Pedersen and Tatiana K. Madsen and Frank H.P. Fitzek Department of Electronic

More information

CROSS-LAYER APPROACHES TO WIRELESS COMMUNICATIONS AND NETWORKING

CROSS-LAYER APPROACHES TO WIRELESS COMMUNICATIONS AND NETWORKING Proceedings of the 4th Annual ISC Research Symposium ISCRS 2010 April 21, 2010, Rolla, Missouri CROSS-LAYER APPROACHES TO WIRELESS COMMUNICATIONS AND NETWORKING Chaitri Aroskar caa279@mst.edu Y.R.Zheng

More information

Correct Bluetooth EDR FEC Performance with SEC-DAEC Decoding

Correct Bluetooth EDR FEC Performance with SEC-DAEC Decoding Correct Bluetooth EDR FEC Performance with SEC-DAEC Decoding R. Razavi, M. Fleury and M. Ghanbari By selecting from Bluetooth s Enhanced Data Rate (EDR) packet types according to channel conditions, optimal

More information

SIMULATION BASED ANALYSIS OF BLUETOOTH NETWORKS. M. Subramani and M. Ilyas

SIMULATION BASED ANALYSIS OF BLUETOOTH NETWORKS. M. Subramani and M. Ilyas SIMULATION BASED ANALYSIS OF BLUETOOTH NETWORKS M. Subramani and M. Ilyas College of Engineering Florida Atlantic University Boca Raton, Florida 33431 {msubrama@cse.fau.edu, ilyas@fau.edu} Abstract Many

More information

Improving Bluetooth EDR Data Throughput Using FEC and Interleaving

Improving Bluetooth EDR Data Throughput Using FEC and Interleaving Improving Bluetooth EDR Data Throughput Using FEC and Interleaving Ling-Jyh Chen 1, Tony Sun 2, and Yung-Chih Chen 1 1 Institute of Information Science, Academia Sinica, Taipei 11529, Taiwan {cclljj, ycchen}@iis.sinica.edu.tw

More information

Guide to Wireless Communications, 3 rd Edition. Objectives

Guide to Wireless Communications, 3 rd Edition. Objectives Guide to Wireless Communications, 3 rd Edition Chapter 5 Wireless Personal Area Networks Objectives Describe a wireless personal area network (WPAN) List the different WPAN standards and their applications

More information

Local Area Networks NETW 901

Local Area Networks NETW 901 Local Area Networks NETW 901 Lecture 6 IEEE 802.15.1 - Bluetooth Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 The 802.15 Family Target environment: communication of personal

More information

e-pg Pathshala Quadrant 1 e-text

e-pg Pathshala Quadrant 1 e-text e-pg Pathshala Subject : Computer Science Module: Bluetooth Paper: Computer Networks Module No: CS/CN/37 Quadrant 1 e-text In our journey on networks, we are now exploring wireless networks. We looked

More information

Performance of UMTS Radio Link Control

Performance of UMTS Radio Link Control Performance of UMTS Radio Link Control Qinqing Zhang, Hsuan-Jung Su Bell Laboratories, Lucent Technologies Holmdel, NJ 77 Abstract- The Radio Link Control (RLC) protocol in Universal Mobile Telecommunication

More information

CS263: Wireless Communications and Sensor Networks

CS263: Wireless Communications and Sensor Networks CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 6: Bluetooth and 802.15.4 October 12, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Bluetooth Standard for Personal Area

More information

Ad Hoc Nets - MAC layer. Part II TDMA and Polling

Ad Hoc Nets - MAC layer. Part II TDMA and Polling Ad Hoc Nets - MAC layer Part II TDMA and Polling More MAC Layer protocols Bluetooth Piconet: a polling/tdma scheme Cluster TDMA: based on TDMA (with random access and reserved slots) research protocol

More information

Class-based Packet Scheduling Policies for Bluetooth

Class-based Packet Scheduling Policies for Bluetooth Class-based Packet Scheduling Policies for Bluetooth Vishwanath Sinha, D. Raveendra Babu Department of Electrical Engineering Indian Institute of Technology, Kanpur - 08 06, INDIA vsinha@iitk.ernet.in,

More information

November 1998 doc.: IEEE /378 IEEE P Wireless LANs Extension of Bluetooth and Direct Sequence Interference Model.

November 1998 doc.: IEEE /378 IEEE P Wireless LANs Extension of Bluetooth and Direct Sequence Interference Model. IEEE P802.11 Wireless LANs Extension of Bluetooth and 802.11 Direct Sequence Interference Model Date: November 11, 1998 Author: Jim Zyren Harris Semiconductor Melbourne, FL, USA Phone: (407)729-4177 Fax:

More information

Ad hoc and Sensor Networks Chapter 6: Link layer protocols. Holger Karl

Ad hoc and Sensor Networks Chapter 6: Link layer protocols. Holger Karl Ad hoc and Sensor Networks Chapter 6: Link layer protocols Holger Karl Goals of this chapter Link layer tasks in general Framing group bit sequence into packets/frames Important: format, size Error control

More information

Communication Systems. WPAN: Bluetooth. Page 1

Communication Systems. WPAN: Bluetooth. Page 1 Communication Systems WPAN: Bluetooth Page 1 Outline Historical perspective Piconet Scatternet Lattency modes Applications Page 2 Bluetooth Bluetooth (BT) wireless technology is a short-range communications

More information

Introduction to Wireless Networking ECE 401WN Spring 2009

Introduction to Wireless Networking ECE 401WN Spring 2009 I. Overview of Bluetooth Introduction to Wireless Networking ECE 401WN Spring 2009 Lecture 6: Bluetooth and IEEE 802.15 Chapter 15 Bluetooth and IEEE 802.15 What is Bluetooth? An always-on, short-range

More information

Simulation of Bluetooth Network

Simulation of Bluetooth Network Simulation of Bluetooth Network Lennart Lagerstedt Stockholm, 2003 Master of Science Thesis Project The Department of Microelectronics and Information Technology, Royal Institute of Technology (KTH) Lennart

More information

Multiple Access Protocols

Multiple Access Protocols Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just

More information

Bluetooth Demystified

Bluetooth Demystified Bluetooth Demystified S-72.4210 Postgraduate Course in Radio Communications Er Liu liuer@cc.hut.fi -10 Content Outline Bluetooth History Bluetooth Market and Applications Bluetooth Protocol Stacks Radio

More information

A Routing Protocol and Energy Efficient Techniques in Bluetooth Scatternets

A Routing Protocol and Energy Efficient Techniques in Bluetooth Scatternets A Routing Protocol and Energy Efficient Techniques in Bluetooth Scatternets Balakrishna J. Prabhu and A. Chockalingam Department of Electrical Communication Engineering Indian Institute of Science, Bangalore

More information

(12) Patent Application Publication (10) Pub. No.: US 2001/ A1

(12) Patent Application Publication (10) Pub. No.: US 2001/ A1 (19) United States US 2001.0002906A1 (12) Patent Application Publication (10) Pub. No.: US 2001/0002906A1 Rune (43) Pub. Date: Jun. 7, 2001 (54) METHOD AND ARRANGEMENT INA COMMUNICATION NETWORK (75) Inventor:

More information

Bluetooth: Short-range Wireless Communication

Bluetooth: Short-range Wireless Communication Bluetooth: Short-range Wireless Communication Wide variety of handheld devices Smartphone, palmtop, laptop Need compatible data communication interface Complicated cable/config. problem Short range wireless

More information

By FaaDoOEngineers.com

By FaaDoOEngineers.com ABSTRACT The seemingly endless entanglement of data wires connecting today s electronic devices has become slightly less jumbled with the introduction of Bluetooth technology and the creation of a wireless

More information

Introduction to Bluetooth Wireless Technology

Introduction to Bluetooth Wireless Technology Introduction to Bluetooth Wireless Technology Jon Inouye Staff Software Engineer Mobile Platforms Group Intel Corporation Bluetooth Bluetooth is is a a trademark trademark owned owned by by Bluetooth Bluetooth

More information

Introduction to Bluetooth

Introduction to Bluetooth Introduction to Bluetooth Kirsten Matheus The idea behind Bluetooth The problems when trying to realize the idea The solutions used in Bluetooth How well the solutions work 12.06.2003 1 he Idea Behind

More information

Performance Evaluation of Bluetooth Links in the Presence of Specific Types of Interference

Performance Evaluation of Bluetooth Links in the Presence of Specific Types of Interference Vol:1, No:3, 27 Performance Evaluation of Bluetooth Links in the Presence of Specific Types of Interference Radosveta Sokullu and Engin Karatepe International Science Index, Electrical and Computer Engineering

More information

MOBILE COMPUTING. Bluetooth 9/20/15. CSE 40814/60814 Fall Basic idea

MOBILE COMPUTING. Bluetooth 9/20/15. CSE 40814/60814 Fall Basic idea OBILE COUTING CE 40814/60814 Fall 2015 Bluetooth Basic idea Universal radio interface for ad-hoc wireless connectivity Interconnecting computer and peripherals, handheld devices, DAs, cell phones replacement

More information

Wireless Sensornetworks Concepts, Protocols and Applications. Chapter 5b. Link Layer Control

Wireless Sensornetworks Concepts, Protocols and Applications. Chapter 5b. Link Layer Control Wireless Sensornetworks Concepts, Protocols and Applications 5b Link Layer Control 1 Goals of this cha Understand the issues involved in turning the radio communication between two neighboring nodes into

More information

Improving Wireless Link Throughput via Interleaved FEC

Improving Wireless Link Throughput via Interleaved FEC Improving Wireless Link Throughput via Interleaved FEC Ling-Jyh Chen, Tony Sun, M. Y. Sanadidi, Mario Gerla UCLA Computer Science Department, Los Angeles, CA 90095, USA {cclljj, tonysun, medy, gerla}@cs.ucla.edu

More information

Efficient Multicast Schemes for Mobile Multiparty Gaming Applications

Efficient Multicast Schemes for Mobile Multiparty Gaming Applications Efficient Multicast Schemes for Mobile Multiparty Gaming Applications P6-6th semester 2006 Group 681 - ComNet Aalborg University 9th March 2006 Institut for elektroniske systemer Fr. Bajers Vej 7 Telefon

More information

Performance Simulation of TCP/IP over a Bluetooth Ad-hoc Network

Performance Simulation of TCP/IP over a Bluetooth Ad-hoc Network Performance Simulation of TCP/IP over a Bluetooth Ad-hoc Network Niklas Johansson, Maria Kihl and Ulf Körner Department of Communication Systems, Lund University, Sweden (niklasj, maria, ulfk)@telecom.lth.se

More information

A Modified Medium Access Control Algorithm for Systems with Iterative Decoding

A Modified Medium Access Control Algorithm for Systems with Iterative Decoding A Modified Medium Access Control Algorithm for Systems with Iterative Decoding Inkyu Lee Carl-Erik W. Sundberg Sunghyun Choi Dept. of Communications Eng. Korea University Seoul, Korea inkyu@korea.ac.kr

More information

An Efficient Tool for the Evaluation of the Impact of WiFi Interference on Bluetooth Performance

An Efficient Tool for the Evaluation of the Impact of WiFi Interference on Bluetooth Performance 1 An Efficient Tool for the Evaluation of the Impact of WiFi Interference on Bluetooth Performance Madani Zeghdoud 1, Pascal Cordier 1, and Michel Terré 2 1 France Telecom R&D, Issy les Moulineaux, France.

More information

Delayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology

Delayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology Delayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology Prashant Kumar Gupta M.Tech. Scholar, Computer Networks, Bhilai Institute of Technology, Durg (C.G.), India

More information

Module 6 STILL IMAGE COMPRESSION STANDARDS

Module 6 STILL IMAGE COMPRESSION STANDARDS Module 6 STILL IMAGE COMPRESSION STANDARDS Lesson 19 JPEG-2000 Error Resiliency Instructional Objectives At the end of this lesson, the students should be able to: 1. Name two different types of lossy

More information

A Study of Wireless Compressed Digitalaudio

A Study of Wireless Compressed Digitalaudio A Study of Wireless Compressed Digital Transmission Andreas Floros 1, Marios Koutroubas 2, Nicolas-Alexander Tatlas 2 and John Mourjopoulos 2 1 ATMEL Hellas S.A., Patras Science Park, Platani, 26 500 Patras,

More information

A Dynamic Slot Assignment Scheme for Slave-to-Slave and Multicast-like Communication in Bluetooth Personal Area Networks

A Dynamic Slot Assignment Scheme for Slave-to-Slave and Multicast-like Communication in Bluetooth Personal Area Networks A Dynamic Slot Assignment Scheme for Slave-to-Slave and Multicast-like Communication in Bluetooth Personal Area Networks Carlos Cordeiro, Sachin Abhyankar, and Dharma P. Agrawal OBR Center for Distributed

More information

CHAPTER 5 PROPAGATION DELAY

CHAPTER 5 PROPAGATION DELAY 98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,

More information

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC) A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for

More information

Master. Slave. Master. Slaves. TCP/IP Traffic with Efficient Bluetooth Technology. Shafqat Hameed 1, Umar F.Khan 2, *Muhammad Saleem 3

Master. Slave. Master. Slaves. TCP/IP Traffic with Efficient Bluetooth Technology. Shafqat Hameed 1, Umar F.Khan 2, *Muhammad Saleem 3 / Traffic with Efficient Bluetooth Technology Shafqat Hameed 1, Umar F.Khan 2, *Muhammad Saleem 3 1,3 National University of Sciences and Technology (NUST), Pakistan 2 University of Bradford, Bradford,

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

WITH the evolution and popularity of wireless devices,

WITH the evolution and popularity of wireless devices, Network Coding with Wait Time Insertion and Configuration for TCP Communication in Wireless Multi-hop Networks Eiji Takimoto, Shuhei Aketa, Shoichi Saito, and Koichi Mouri Abstract In TCP communication

More information

Comparing Bluetooth HDP and SPP for Mobile Health Devices

Comparing Bluetooth HDP and SPP for Mobile Health Devices Comparing Bluetooth HDP and SPP for Mobile Health Devices Jad Noueihed, Robert Diemer, Samarjit Chakraborty and Stefanie Biala Institute for Real-Time Computer Systems, TU Munich Vodafone Group R&D Germany,

More information

Politecnico di Milano Scuola di Ingegneria Industriale e dell Informazione. Link Layer. Fundamentals of Communication Networks

Politecnico di Milano Scuola di Ingegneria Industriale e dell Informazione. Link Layer. Fundamentals of Communication Networks Politecnico di Milano Scuola di Ingegneria Industriale e dell Informazione Link Layer Fundamentals of Communication Networks Data Link layer o It is the first logical layer in the protocol stack o Functions

More information

CHAPTER 6 PILOT/SIGNATURE PATTERN BASED MODULATION TRACKING

CHAPTER 6 PILOT/SIGNATURE PATTERN BASED MODULATION TRACKING CHAPTER 6 PILOT/SIGNATURE PATTERN BASED MODULATION TRACKING 6.1 TRANSMITTER AND RECEIVER Each modulated signal is preceded by a unique N bit pilot sequence (Manton, JH 2001). A switch in the transmitter

More information

Wireless multipoint communication for optical sensors in the industrial environment using the new Bluetooth standard

Wireless multipoint communication for optical sensors in the industrial environment using the new Bluetooth standard Wireless multipoint communication for optical sensors in the industrial environment using the new Bluetooth standard Stephan Hussmann*a, Wing Yan Laua, Terry ChUa, Markus Grothofb aschool of Engineering,

More information

Wireless Communications

Wireless Communications 4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:

More information

A COLLOCATED APPROACH FOR COEXISTENCE RESOLUTION IN WIRELESS HOME NETWORKING

A COLLOCATED APPROACH FOR COEXISTENCE RESOLUTION IN WIRELESS HOME NETWORKING A COLLOCATED APPROACH FOR COEXISTENCE RESOLUTION IN WIRELESS HOME NETWORKING Md Enamul Islam, Sanjay Jha, Dr. Paul W.H. Kwan, Monzurur Rahman School of Mathematics, Statistics and Computer Science, University

More information

Bhopal, , India 3 M.Tech Scholor,Department Of Computer Science, BIST Bhopal. Bhopal, , India

Bhopal, , India 3 M.Tech Scholor,Department Of Computer Science, BIST Bhopal. Bhopal, , India Indirect Mobile Data Transfer Under Bluetooth Protocol 1 Pramod Kumar Maurya, 2 Gireesh Dixit, 3 Jay Prakash Maurya 1 M.Tech Scholor, 2 HOD, Department Of Computer Science, MPM, Bhopal, Bhopal, 462021,

More information

By N.Golmie Presented by: Sushanth Divvela

By N.Golmie Presented by: Sushanth Divvela By N.Golmie Presented by: Sushanth Divvela 1 Agenda Introduction WPAN WLAN Simulation Models Simulation results Concluding remarks 2 Introduc.on Coexistence of WPAN and WLAN Performance evaluation WLAN

More information

TOPOLOGY CONTROL IN MOBILE AD HOC NETWORKS WITH COOPERATIVE COMMUNICATIONS

TOPOLOGY CONTROL IN MOBILE AD HOC NETWORKS WITH COOPERATIVE COMMUNICATIONS IEEE 2012 Transactions on Wireless Communications, Volume: 9, Issue: 2 TOPOLOGY CONTROL IN MOBILE AD HOC NETWORKS WITH COOPERATIVE COMMUNICATIONS Abstract Cooperative communication has received tremendous

More information

Wireless Sensor Networks

Wireless Sensor Networks Wireless Sensor Networks 11th Lecture 29.11.2006 Christian Schindelhauer schindel@informatik.uni-freiburg.de 1 Bluetooth in WSN? There are several commercially available MAC protocol/products Wi-Fi Bluetooth

More information

Amarjeet Singh. February 7, 2012

Amarjeet Singh. February 7, 2012 Amarjeet Singh February 7, 2012 References Bluetooth Protocol Architecture v.1 www.bluetooth.org http://www.tutorial-reports.com/wireless/bluetooth/ Slides from last class uploaded on the course website

More information

Investigation on OLSR Routing Protocol Efficiency

Investigation on OLSR Routing Protocol Efficiency Investigation on OLSR Routing Protocol Efficiency JIRI HOSEK 1, KAROL MOLNAR 2 Department of Telecommunications Faculty of Electrical Engineering and Communication, Brno University of Technology Purkynova

More information

Channel Adaptive ACK Mechanism in IEEE Wireless Personal Area Networks

Channel Adaptive ACK Mechanism in IEEE Wireless Personal Area Networks Channel Adaptive ACK Mechanism in IEEE 802.15.3 Wireless Personal Area Networks Jong-In Lee 28 August 2008 Broadband Communication Laboratory Korea University FISC 2008 Outline Introduction System model

More information

CS4/MSc Computer Networking. Lecture 13: Personal Area Networks Bluetooth

CS4/MSc Computer Networking. Lecture 13: Personal Area Networks Bluetooth CS4/MSc Computer Networking Lecture 13: Personal Area Networks Bluetooth Computer Networking, Copyright University of Edinburgh 2005 BlueTooth Low cost wireless connectivity for Personal Area Networks

More information

PROPOSAL OF MULTI-HOP WIRELESS LAN SYSTEM FOR QOS GUARANTEED TRANSMISSION

PROPOSAL OF MULTI-HOP WIRELESS LAN SYSTEM FOR QOS GUARANTEED TRANSMISSION PROPOSAL OF MULTI-HOP WIRELESS LAN SYSTEM FOR QOS GUARANTEED TRANSMISSION Phuc Khanh KIEU, Shinichi MIYAMOTO Graduate School of Engineering, Osaka University 2-1 Yamada-oka, Suita, Osaka, 565-871 JAPAN

More information

Reliable Communication using Packet Coding for Underwater Acoustic Channels

Reliable Communication using Packet Coding for Underwater Acoustic Channels Reliable Communication using Packet Coding for Underwater Acoustic Channels Rameez Ahmed and Milica Stojanovic Northeastern University, Boston, MA 02115, USA Email: rarameez@ece.neu.edu, millitsa@ece.neu.edu

More information

A Theoretical Evaluation of the G-TOR Hybrid ARQ Protocol

A Theoretical Evaluation of the G-TOR Hybrid ARQ Protocol A Theoretical Evaluation of the G-TOR Hybrid ARQ Protocol Glenn E. Prescott, WB@SKX Phil Anderson, W@X ABSTRACT The recently-introduced G-TOR protocol for HF data communications employs several features

More information

SENSOR-MAC CASE STUDY

SENSOR-MAC CASE STUDY SENSOR-MAC CASE STUDY Periodic Listen and Sleep Operations One of the S-MAC design objectives is to reduce energy consumption by avoiding idle listening. This is achieved by establishing low-duty-cycle

More information

Real-time performance evaluation of Bluetooth ARQ protocol

Real-time performance evaluation of Bluetooth ARQ protocol 248 JOURNAL OF COMMUNICATIONS SOFTWARE AND SYSTEMS, VOL. 3, NO. 4, DECEMBER 27 Real-time performance evaluation of Bluetooth ARQ protocol Fabrice PEYRARD Abstract: These research tass present a measurement

More information

A Guide. Wireless Network Library Bluetooth

A Guide. Wireless Network Library Bluetooth A Guide to the Wireless Network Library Conforming to Standard v1.1 SystemView by ELANIX Copyright 1994-2005, Eagleware Corporation All rights reserved. Eagleware-Elanix Corporation 3585 Engineering Drive,

More information

UDP-Lite Enhancement Through Checksum Protection

UDP-Lite Enhancement Through Checksum Protection IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS UDP-Lite Enhancement Through Checksum Protection To cite this article: Suherman et al 2017 IOP Conf. Ser.: Mater. Sci. Eng. 180

More information

A MAC Protocol based on Dynamic Time Adjusting in Wireless MIMO Networks

A MAC Protocol based on Dynamic Time Adjusting in Wireless MIMO Networks 212 7th International ICST Conference on Communications and Networking in China (CHINACOM) A MAC Protocol based on Dynamic Time Adjusting in Wireless MIMO Networks Yang Qin*, Xiaoxiong Zhong, Li Li, Zhenhua

More information

Experimental Assessment of Media Synchronization Quality in IEEE b under Bluetooth Interference

Experimental Assessment of Media Synchronization Quality in IEEE b under Bluetooth Interference Experimental Assessment of Media Synchronization Quality in IEEE 802.11b under Bluetooth Interference Masami KATO, Hirotsugu OKURA, Kiyoshige ITO and Shuji TASAKA Digital Systems Development Center BU,

More information

Embedded Systems. 8. Communication

Embedded Systems. 8. Communication Embedded Systems 8. Communication Lothar Thiele 8-1 Contents of Course 1. Embedded Systems Introduction 2. Software Introduction 7. System Components 10. Models 3. Real-Time Models 4. Periodic/Aperiodic

More information

Energy Efficiency Maximization for Wireless Sensor Networks

Energy Efficiency Maximization for Wireless Sensor Networks Energy Efficiency Maximization for Wireless Sensor Networks Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwjoe@hanyang.ac.kr Abstract. Because of the remote nature

More information

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame Links Reading: Chapter 2 CS 375: Computer Networks Thomas Bressoud 1 Goals of Todayʼs Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared

More information

Chapter 6 Digital Data Communications Techniques

Chapter 6 Digital Data Communications Techniques Chapter 6 Digital Data Communications Techniques Asynchronous and Synchronous Transmission timing problems require a mechanism to synchronize the transmitter and receiver receiver samples stream at bit

More information

sflow Agent Contents 14-1

sflow Agent Contents 14-1 14 sflow Agent Contents Overview..................................................... 14-2 Flow Sampling by the sflow Agent........................... 14-2 Counter Polling by the sflow Agent...........................

More information

Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks

Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks Dr. Vinod Vokkarane Assistant Professor, Computer and Information Science Co-Director, Advanced Computer Networks Lab University

More information

Maximizing the Lifetime of Clustered Wireless Sensor Network VIA Cooperative Communication

Maximizing the Lifetime of Clustered Wireless Sensor Network VIA Cooperative Communication Vol., Issue.3, May-June 0 pp--7 ISSN: - Maximizing the Lifetime of Clustered Wireless Sensor Network VIA Cooperative Communication J. Divakaran, S. ilango sambasivan Pg student, Sri Shakthi Institute of

More information

4. Error correction and link control. Contents

4. Error correction and link control. Contents //2 4. Error correction and link control Contents a. Types of errors b. Error detection and correction c. Flow control d. Error control //2 a. Types of errors Data can be corrupted during transmission.

More information

COMPUTER NETWORK Model Test Paper

COMPUTER NETWORK Model Test Paper Model Test Paper Question no. 1 is compulsory. Attempt all parts. Q1. Each question carries equal marks. (5*5 marks) A) Difference between Transmission Control Protocol (TCP) and User Datagram Protocol.

More information

Improving the performance of Bluetooth piconets with synchronous and asynchronous traffic

Improving the performance of Bluetooth piconets with synchronous and asynchronous traffic Improving the performance of Bluetooth piconets with synchronous and asynchronous traffic Vojislav B. Mišić, Jelena Mišić, and Ka Lok Chan Abstract The Bluetooth specification allows both asynchronous

More information

Wireless Local Area Network. Internet Protocol Suite

Wireless Local Area Network. Internet Protocol Suite Wireless Local Area Network Internet Protocol Suite Application layer File transfer protocol Telnet Hypertext transfer protocol Transport layer Network layer Host-tonetwork layer User datagram protocol

More information

A Rate-adaptive MAC Protocol Based on TCP Throughput for Ad Hoc Networks in fading channels

A Rate-adaptive MAC Protocol Based on TCP Throughput for Ad Hoc Networks in fading channels A Rate-adaptive MAC Protocol Based on TCP Throughput for Ad Hoc Networks in fading channels Shoko Uchida, Katsuhiro Naito, Kazuo Mori, and Hideo Kobayashi Department of Electrical and Electronic Engineering,

More information

Dynamic Traffic Congestion Control Scheme in MANET with Cooperative Communication

Dynamic Traffic Congestion Control Scheme in MANET with Cooperative Communication Dynamic Traffic Congestion Control Scheme in MANET with Cooperative Communication P.Deepa 1, Dr. P.S.K Patra 2 1 Department of Computer Science and Engineering, 2 Head of the Department, Agni College of

More information

An Adaptive Scheduling Algorithm for Bluetooth Ad-hoc Networks

An Adaptive Scheduling Algorithm for Bluetooth Ad-hoc Networks An Adaptive Scheduling Algorithm for Bluetooth Ad-hoc Networks Raymond Y.L. Lee and Vincent W.S. Wong Department of Electrical and Computer Engineering The University of British Columbia,Vancouver, BC,

More information

IN this letter we focus on OpenFlow-based network state

IN this letter we focus on OpenFlow-based network state 1 On the Impact of Networ State Collection on the Performance of SDN Applications Mohamed Aslan, and Ashraf Matrawy Carleton University, ON, Canada Abstract Intelligent and autonomous SDN applications

More information

SIMULATION FRAMEWORK MODELING

SIMULATION FRAMEWORK MODELING CHAPTER 5 SIMULATION FRAMEWORK MODELING 5.1 INTRODUCTION This chapter starts with the design and development of the universal mobile communication system network and implementation of the TCP congestion

More information

CHAPTER 12 BLUETOOTH AND IEEE

CHAPTER 12 BLUETOOTH AND IEEE CHAPTER 12 BLUETOOTH AND IEEE 802.15 These slides are made available to faculty in PowerPoint form. Slides can be freely added, modified, and deleted to suit student needs. They represent substantial work

More information

ET3110 Networking and Communications UNIT 2: Communication Techniques and Data Link Control Protocol skong@itt-tech.edutech.edu Learning Objectives Identify methods of detecting errors. Use Hamming code

More information

Systems. Roland Kammerer. 10. November Institute of Computer Engineering Vienna University of Technology. Communication Protocols for Embedded

Systems. Roland Kammerer. 10. November Institute of Computer Engineering Vienna University of Technology. Communication Protocols for Embedded Communication Roland Institute of Computer Engineering Vienna University of Technology 10. November 2010 Overview 1. Definition of a protocol 2. Protocol properties 3. Basic Principles 4. system communication

More information

Bluetooth. Bluetooth Radio

Bluetooth. Bluetooth Radio Bluetooth Bluetooth is an open wireless protocol stack for low-power, short-range wireless data communications between fixed and mobile devices, and can be used to create Personal Area Networks (PANs).

More information

Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks

Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks Dodda Sunitha Dr.A.Nagaraju Dr. G.Narsimha Assistant Professor of IT Dept. Central University

More information

Video Streaming Over Multi-hop Wireless Networks

Video Streaming Over Multi-hop Wireless Networks Video Streaming Over Multi-hop Wireless Networks Hao Wang Dept. of Computer Information System, Cameron University hwang@cameron.edu Andras Farago, Subbarayan Venkatesan Dept. of Computer Science, The

More information

Objectives of the Bluetooth Technology

Objectives of the Bluetooth Technology Bluetooth Origin of the name Harald I Bleutooth (in Danish, Harald Blåtand) (b. c. 910 d. c. 987), king of Denmark was credited with the first unification of Denmark and Norway Ericsson, inspired on the

More information

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS IEEE 802.11 The standard defines a wireless physical interface and the MAC layer while LLC layer is defined in 802.2. The standardization process, started in 1990, is still going on; some versions are:

More information

Analysis of TCP Latency over Wireless Links Supporting FEC/ARQ-SR for Error Recovery

Analysis of TCP Latency over Wireless Links Supporting FEC/ARQ-SR for Error Recovery Analysis of TCP Latency over Wireless Links Supporting FEC/ARQ-SR for Error Recovery Raja Abdelmoumen CRISTAL Laboratory, Tunisia Email: Raja.Abdelmoumen@ensi.rnu.tn Chadi Barakat Projet Planète, INRIA-Sophia

More information

S Capacity enhancement methods for radio interface ARQ Schemes

S Capacity enhancement methods for radio interface ARQ Schemes ARQ Schemes, March 26 2004 1 S-72.630 Capacity enhancement methods for radio interface ARQ Schemes Markku Liinaharja March 25, 2004 ARQ Schemes, March 26 2004 2 Outline Classification of error control

More information

ENGI 4557 Digital Communications Practice Problems 2017 (Part 2)

ENGI 4557 Digital Communications Practice Problems 2017 (Part 2) ENGI 4557 Digital Communications Practice Problems 207 (Part 2) H = n p i log 2 ( ) p i C = W log 2 ( + S N ) SNR = 6m + 0 log 0 ( 3σ2 x V ) 2 SNR = 6m 0 ( ) n n! = k k!(n k)! x = σ 2 = + + x p(x)dx (x

More information

System Level Analysis of the Bluetooth standard

System Level Analysis of the Bluetooth standard System Level Analysis of the standard Massimo Conti, Daniele Moretti Università Politecnica delle Marche, via Brecce Bianche, I-60131, Ancona, Italy Abstract The SystemC modules of the Link Manager Layer

More information