Optimizing Packet Size via Maximizing Throughput Efficiency of ARQ on Bluetooth ACL Data Communication Link
|
|
- Jeffrey Doyle
- 6 years ago
- Views:
Transcription
1 Proceedings of the 5th WSEAS Int. Conf. on APPLIED INFOATICS and COUNICATIONS, alta, September -7, 25 (pp24-28 Optimizing Pacet Size via aximizing Throughput Efficiency of AQ on Bluetooth ACL Data Communication Lin LI XIANG, KALU PIYANATH UDAGEPOLA, YANG XIAO ZONG School of Computer Science and Technology Harbin Institute of Technology No.92, West Da-Zhi Street, Harbin, Heilongjiang P CHINA Abstract: Based on the acnowledgement history of the most recently transmitted pacets, an estimate of the channel bit error rate is made, based on which an optimal pacet size can be selected through maximizing the expected throughput efficiency of AQ protocol on Bluetooth ACL data communication lin. Simulation results show that this method wors very well even with a short observation history. Key words: Bluetooth; AQ; ACL; SCO; Throughput Efficiency; BE Introduction Bluetooth (BT [,2,3] is a short-range radio lin intended to be a cable replacement between portable and/or fixed electronic devices. Two types of transmission lins, synchronous connection oriented (SCO and asynchronous connectionless (ACL lins are used. SCO lin is a symmetric point to point lin supporting time-bounded voice traffic. SCO pacets are transmitted over reserved intervals without being polled. ACL lin is a point to multipoint lin between master and all slaves in the piconet and can use all the remaining slots of the channel not used for SCO lin. Bluetooth is a frequency hopping system which can support multiple communication channels in a common area (each channel is defined by a unique frequency hopping sequence. Frequency hopping is used in such a way that the radio is turned to the same frequency for the entire duration of the pacet, but then changes to a different frequency each time it transmits a new pacet or retransmits an erroneous pacet. Since the fading and interference in the new frequency channel will be significantly different than that of the previous one, the use of frequency hopping with AQ provides an effective method of diversity. Automatic epeat equest (AQ protocols are designed to remove transmission errors from data communications systems. When used over relatively high bit-error rate lins (e.g., -5 or higher such as wireless or satellite lins, their performance is sensitive to the pacet size used in the transmission. When too large a pacet size is employed, there is an increased need for retransmissions, while too small a pacet size is inefficient because of the fixed overhead required per pacet. When an AQ scheme is to be used at the lin layer over a relatively high error-rate lin, the pacet size should be chosen based on the error-rate. In this paper, we concern with choosing optimal pacet payload length on the Bluetooth ACL data communication lins, in terms of maximizing the throughput efficiency of AQ protocol based on the acnowledgement history of the most recently transmitted pacets. That is, given the number of pacets that required retransmission, an estimate of the channel bit error rate is made, based on which a pacet size is chosen to maximizes the expected throughput efficiency of the data lin protocol. 2 Bluetooth Data Pacets In Bluetooth, the data on the piconet channel is conveyed in pacets. The general pacet format is shown in Figure. Each pacet consists of 3 entities: the access code, the header, and the payload. In fig., the number of bits per entity is indicated.
2 Proceedings of the 5th WSEAS Int. Conf. on APPLIED INFOATICS and COUNICATIONS, alta, September -7, 25 (pp24-28 The access code and header are of fixed size: 72 bits and 54 bits respectively. The payload length can range from zero to a maximum of 2745 bits. Different pacet types have been defined. Pacets may consist of the (shortened access code only, of the access code header, or of the access code header payload. Data in Bluetooth can be transmitted asynchronously using ACL pacets. In this paper, we mainly focus on ACL pacets data transfer used in asynchronously connections, such as summarized in Tab., seven ACL pacet types are defined in the Bluetooth. D stands for Data-edium rate, and DH for Data-High rate. D pacets are all 2/3-FEC encoded to tolerate possible transmission errors. Not encoded by FEC, DH pacets are more error-vulnerable, but it can carry more information. Among seven pacets all but one of these pacet types (AUX use a cyclic redundancy chec (CC code and automatic repeat request (AQ for error control. The AUX pacet is similar to DH, but it has no CC code and can t be re retransmitted, so we don t tae the AUX pacet into consideration. Table Summary of Bluetooth ACL data pacets Type Payload User CC FEC Header(bytes Payload(bytes (bits D /3 DH no D /3 DH no D /3 DH no AUX -29 no no Then, the six ACL pacet types have total maximum payload length as follows: D:24 DH:24 D3: DH3:496 D5:2745 DH5: Selecting Optimal Pacet Size 3. Throughput Efficiency of AQ Protocol A protocol performance is usually characterized by many parameters which are defined by the communication system requirements. The most important parameters are the probability of receiving a message without errors and the protocol throughput efficiency. There are several definitions of the protocol throughput efficiency. ost frequently it is defined as the ratio of the mean number of information bits successfully accepted by the receiver to the number of bits that could have been transmitted during the same time interval [4]. To do so we must first derive an expression for the throughput efficiency of the AQ protocol. The expressions derived in this section assume the use of an optimal AQ protocol in that only pacets containing errors are retransmitted. The throughput efficiency of AQ scheme that uses pacets having n bits of information bits is determined by [5] : η = ( / ( n where, the first term /n of the above expression represents the ratio of information bits to total bits in a pacet, and represents the average number of transmission attempts per pacet. Assuming that the AQ scheme retransmits a pacet until the acnowledgement of a successful reception, the average number of attempts,, needed to successfully transmit one pacet is given by [6] : = (-p+2 p (-p+3 p p (-p+ = p where, p is the pacet error rate. So, for a given p, the throughput efficiency of AQ that uses pacets having n bits of information bits is given by: η = ( (- p (3 n 3.2 Choosing Pacet Size based on History of Transmitted Pacets In Bluetooth wireless connection, in order to guarantee reliable transmission an automatic repeat request (AQ mechanism is adopted. That is, the receiving side sends bac special control frame as the acnowledgement or negative acnowledgement (ACK/NACK to the input. In case of losing frame or acnowledgement message, the timer will send out timeout signal when the timer has expired, and to remind other side that some problems have happened and this frame must be retransmitted. At the same time, receiver must be capable of distinguishing (2 2
3 Proceedings of the 5th WSEAS Int. Conf. on APPLIED INFOATICS and COUNICATIONS, alta, September -7, 25 (pp24-28 between retransmitted and new frame. With an automatic repeat request scheme in Bluetooth specification, D, DH and the data field of DV pacets are transmitted and retransmitted until acnowledgement of a successful reception is returned by the destination (or timeout is exceeded. The acnowledgement information is included in the header of the return pacet, so-called piggy-bacing. To determine whether the payload is correct or not, a cyclic redundancy chec (CC code is added to the pacet. The AQ scheme only wors on the payload in the pacet (only that payload which has a CC. The pacet header and the voice payload are not protected by the AQ scheme. Supposed the BE(bit error rate is b, and, the number of retransmission requests out of the last pacet transmissions, and ' is the payload size used in the previous transmissions. The expected throughput efficiency η ( of AQ protocol pacets is given by [7] : ( p ( p ( p η ( (4 n ( ( p ( p where = b b ( p ' is the pacet error rate of pacets transmission. The pacet error rate, p, for DH pacets is [6,8] : = ( b (5 p ecalling that D pacets are protected by a (, Hamming code (encoded with a 2/3 bloc FEC, i.e., in every bloc, bits are used to encode bits of data, which is capable of correcting one bit error per bit code bloc. The payload is correctly decoded provided that all code blocs contain one or fewer errors. The pacet error rate, p, for D pacets can be approximated as: p 4 / = (( + b( (6 Combining equations (4 (6, we can get η ( for DH and D pacets respectively as: '( ( ( ( ( ( η ( = b [ ] (7 ' '( n ( b ( ( ( 4 / 4 ' / 4 '( / (( + b( ( ( (( + b( (( + b( η ( = b [ ] 4 ' / 4 '( / n ( + + b ( (( b( (( b( (8 where, n=+26. It is now possible to choose the value of, the payload length to be used in future transmissions, so that the ' throughput efficiency of the AQ protocol is maximized. This can be done by choosing the value of that maximizes equation (7 or (8 for a value of that is equal to the number of retransmission requests that occurred during the previous transmissions using the payload size '. 4 Simulation esults Usually, the solution way of the maximization problem for η ( in equation (7 or (8 is difficult; However, for specific values of, and ' equation (7 or (8 can be solved numerically. An optimal value for can now be found using numerical search algorithms. Since the numerical evaluation of this integral is very intensive, a comprehensive search for the optimal value of is not practical. Instead, a restricted search using select values for can be performed. Such a search, for example, can consider values of that are a multiple of ; thereby significantly reducing the complexity of the search. Such a restricted search has little impact on the performance of the protocol since values of that are within bits of the optimal bloc size should result in near-optimal performance. In figure 2, we plot the optimal payload size when a history of 5 previously transmitted bit pacets payload is considered. As can be seen from the fig.2 (a, for DH pacets transmission, when the previous fifty transmissions resulted in no errors the payload length can be maximized to 2744 bits (the maximization throughput efficiency can be gotten at payload length of 32 bits. When one and two errors occurred the payload length can be increased to 2 and 7 bits respectively. When three errors occurred the payload length can be ept at bits and when more than three errors occur the payload length is reduced. As depicted in fig.2 (, for D pacets transmission, when the previous fifty transmissions resulted in no errors the payload length can be maximized to be 2745 bits (the maximization throughput efficiency can be gotten at pacet payload length of 44 bits. When one, two and three errors occurred the payload length can be increased to 25, 9 and 6 bits respectively and when more than three errors occur the payload length is reduced. 3
4 Proceedings of the 5th WSEAS Int. Conf. on APPLIED INFOATICS and COUNICATIONS, alta, September -7, 25 (pp Throughput Efficiency = = 3 = 5 = 8 = = 2 b (bit error rate b (bit error rate (a ( Fig.3 ean throughput efficiency of algorithm for various b. (ad H pacet. (D pacet. Throughput Efficiency = =3 =5 =8 = =2 Let opt ( be the optimal value of chosen for a given value of out of the last pacet transmissions. The efficiency of the AQ protocol with that value of can be computed according to equation (3 combined with equation (5 or (6. Then it can be averaged over the distribution of given b to yield the performance of AQ for a given value of b. Fig.3 shows the mean throughput efficiency of AQ with various values of and b, and a previous pacet payload length of bits. As can be seen from the figure, whether it is D or D pacets transmission, good performance is obtained with a history of just 75 bits payload size (5 pacets at pacet payload size of bits. When b is higher than -5, more of history is required to obtain a reasonable estimate of throughput efficiency for D pacets transmission; but for DH pacets transmission, the situation is quite different, only few or the least history of pacets transfer is required to obtain high throughput efficiency. In the previous fifty pacets transmission with payload length of bits, select optimizing pacet size under different retransmission pacets, fig.4 compares mean throughout efficiency of AQ during DH and D pacets transmission for various b. It is important to note that the performance of AQ is much more vulnerable to DH pacets when b is high. That is, when b is high the use of DH or D pacet type can have a disastrous effect on the throughput efficiency, and D pacets transfer can produce higher throughput efficiency than DH pacets. When b is low, small variations in the throughput efficiency from the different bit error rate b, pacet types (DH/D. So in a high error rate environment, it is better to tae D pacets as data transmission, which accords with the capability of D to tolerate high transmission error rate. Oppositely, in a low error rate environment, it is better to tae DH pacets as data transmission, it is because not decoded by 2/3-FEC DH pacets have relatively higher data transfer rate than D pacets data transmission. 4
5 Proceedings of the 5th WSEAS Int. Conf. on APPLIED INFOATICS and COUNICATIONS, alta, September -7, 25 (pp DH D Conclusion This paper introduces a method to select the optimal pacet payload length used by Bluetooth ACL data lin layer. The throughput efficiency of AQ protocol is given based on retransmission history. So, given pacet transmission record we can choose the pacet size such that the expected throughput efficiency of the AQ protocol is maximized under different channel BEs (bit error rates. Simulation results show that the method wors very well even with a short observation history (5 pacets at size of bits payload, total 75 bits payload transfer. In a high error rate environment, it is better to tae D pacets as data transmission; but in a low error rate environment, it is better to tae DH pacets as data transmission to improve the data transfer rate. IEEE-ussia Conferences icrowave Electronics: easurements, Identification (EIA'2, Novosibirs, ussia, 2, pp [6] L.J. Chen,. Kapoor,.Y. Sanadidi,. Gerla, Enhancing bluetooth TCP throughput via lin layer pacet adaptation, in: Proc. of the 24 IEEE International Conference on Communications (ICC 24, Paris, France, 24. [7] E. odiano, An adaptive algorithm for optimizing the pacet size used in wireless AQ protocols. Wireless Networs, 999, 5: [8].C. Valenti,. obert, and J. H. eed, On the throughput of bluetooth data transmissions, in: Proc. of the IEEE Wireless Commun. and Networing Conf., Orlando, USA, 22, eferences: [] Bluetooth SIG, Specification of the Bluetooh System, version., Feb.2. [2] J.Harrtsen, The bluetooth radio system, IEEE Personal Communicatios, Feb.2, 7(: [3] X. Li, X.Z. Yang, ebluescatter: an Energy-Efficient Ad Hoc Networ Formation Algorithm over Bluetooth, WSEAS Transactions on Information Science and Applications, 25, 8(2, pp [4] W. Turin, Throughput analysis of the Go-Bac-N protocol in fading radio channels. IEEE Journal on Selected Areas in Communications, 999, 7(5, pp [5] V.P. Pribylov and G.A. Chernetsy, Throughput efficiency of automatic repeat request algorithm with selective reject in communication lins with great signal propagation delay, in: Proc. of the 3-rd 5
Bluetooth ACL Packet Selection Via Maximizing the Expected Throughput Efficiency of ARQ Protocol
Bluetooth ACL Packet Selection Via aximizing the Expected Throughput Efficiency of AQ Protocol Xiang Li 1,2,*, an-tian Li 1, Zhen-Guo Gao 2, and Li-Ning Sun 1 1 obot esearch Institute, Harbin Institute
More informationIEEE P Working Group for Wireless Personal Area Networks TM
IEEE P802.15 Working Group for Wireless Personal Area Networks TM SCORT - An Alternative to the Bluetooth SCO Link for Voice Operation in an Interference Environment Slide 1 Bluetooth SCO Link The Bluetooth
More informationImproving Simultaneous Voice and Data Performance in Bluetooth Systems
Improving Simultaneous Voice and Data Performance in Bluetooth Systems Abstract In the Bluetooth system, isochronous applications, such as voice and audio, are carried by Synchronous Connection Oriented
More informationUNIT 5 P.M.Arun Kumar, Assistant Professor, Department of IT, Sri Krishna College of Engineering and Technology, Coimbatore.
Communication Switching Techniques UNIT 5 P.M.Arun Kumar, Assistant Professor, Department of IT, Sri Krishna College of Engineering and Technology, Coimbatore. Bluetooth Techniques References 1. Wireless
More informationData Link Control Protocols
Protocols : Introduction to Data Communications Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 23 May 2012 Y12S1L07, Steve/Courses/2012/s1/its323/lectures/datalink.tex,
More informationADAPTIVE PACKET SELECTION ALGORITHM FOR BLUETOOTH DATA PACKETS
Proceedings of the 6th WSEAS International Conference on Applied Computer Science, Hangzhou, China, April 15-17, 2007 160 ADAPTIVE PACKET SELECTION ALGORITHM FOR BLUETOOTH DATA PACKETS RADOSVETA SOKULLU
More informationEnhancing Bluetooth TCP Throughput via Link Layer Packet Adaptation
Enhancing Bluetooth TCP Throughput via Link Layer Packet Adaptation Ling-Jyh Chen, Rohit Kapoor, M. Y. Sanadidi, Mario Gerla UCLA Computer Science Department, Los Angeles, CA 995, USA {cclljj, rohitk,
More informationEnergy Evaluation for Bluetooth Link Layer Packet Selection Scheme
European Wireless 29 1 Energy Evaluation for Bluetooth Link Layer Packet Selection Scheme Gian Paolo Perrucci and Morten V. Pedersen and Tatiana K. Madsen and Frank H.P. Fitzek Department of Electronic
More informationCROSS-LAYER APPROACHES TO WIRELESS COMMUNICATIONS AND NETWORKING
Proceedings of the 4th Annual ISC Research Symposium ISCRS 2010 April 21, 2010, Rolla, Missouri CROSS-LAYER APPROACHES TO WIRELESS COMMUNICATIONS AND NETWORKING Chaitri Aroskar caa279@mst.edu Y.R.Zheng
More informationCorrect Bluetooth EDR FEC Performance with SEC-DAEC Decoding
Correct Bluetooth EDR FEC Performance with SEC-DAEC Decoding R. Razavi, M. Fleury and M. Ghanbari By selecting from Bluetooth s Enhanced Data Rate (EDR) packet types according to channel conditions, optimal
More informationSIMULATION BASED ANALYSIS OF BLUETOOTH NETWORKS. M. Subramani and M. Ilyas
SIMULATION BASED ANALYSIS OF BLUETOOTH NETWORKS M. Subramani and M. Ilyas College of Engineering Florida Atlantic University Boca Raton, Florida 33431 {msubrama@cse.fau.edu, ilyas@fau.edu} Abstract Many
More informationImproving Bluetooth EDR Data Throughput Using FEC and Interleaving
Improving Bluetooth EDR Data Throughput Using FEC and Interleaving Ling-Jyh Chen 1, Tony Sun 2, and Yung-Chih Chen 1 1 Institute of Information Science, Academia Sinica, Taipei 11529, Taiwan {cclljj, ycchen}@iis.sinica.edu.tw
More informationGuide to Wireless Communications, 3 rd Edition. Objectives
Guide to Wireless Communications, 3 rd Edition Chapter 5 Wireless Personal Area Networks Objectives Describe a wireless personal area network (WPAN) List the different WPAN standards and their applications
More informationLocal Area Networks NETW 901
Local Area Networks NETW 901 Lecture 6 IEEE 802.15.1 - Bluetooth Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 The 802.15 Family Target environment: communication of personal
More informatione-pg Pathshala Quadrant 1 e-text
e-pg Pathshala Subject : Computer Science Module: Bluetooth Paper: Computer Networks Module No: CS/CN/37 Quadrant 1 e-text In our journey on networks, we are now exploring wireless networks. We looked
More informationPerformance of UMTS Radio Link Control
Performance of UMTS Radio Link Control Qinqing Zhang, Hsuan-Jung Su Bell Laboratories, Lucent Technologies Holmdel, NJ 77 Abstract- The Radio Link Control (RLC) protocol in Universal Mobile Telecommunication
More informationCS263: Wireless Communications and Sensor Networks
CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 6: Bluetooth and 802.15.4 October 12, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Bluetooth Standard for Personal Area
More informationAd Hoc Nets - MAC layer. Part II TDMA and Polling
Ad Hoc Nets - MAC layer Part II TDMA and Polling More MAC Layer protocols Bluetooth Piconet: a polling/tdma scheme Cluster TDMA: based on TDMA (with random access and reserved slots) research protocol
More informationClass-based Packet Scheduling Policies for Bluetooth
Class-based Packet Scheduling Policies for Bluetooth Vishwanath Sinha, D. Raveendra Babu Department of Electrical Engineering Indian Institute of Technology, Kanpur - 08 06, INDIA vsinha@iitk.ernet.in,
More informationNovember 1998 doc.: IEEE /378 IEEE P Wireless LANs Extension of Bluetooth and Direct Sequence Interference Model.
IEEE P802.11 Wireless LANs Extension of Bluetooth and 802.11 Direct Sequence Interference Model Date: November 11, 1998 Author: Jim Zyren Harris Semiconductor Melbourne, FL, USA Phone: (407)729-4177 Fax:
More informationAd hoc and Sensor Networks Chapter 6: Link layer protocols. Holger Karl
Ad hoc and Sensor Networks Chapter 6: Link layer protocols Holger Karl Goals of this chapter Link layer tasks in general Framing group bit sequence into packets/frames Important: format, size Error control
More informationCommunication Systems. WPAN: Bluetooth. Page 1
Communication Systems WPAN: Bluetooth Page 1 Outline Historical perspective Piconet Scatternet Lattency modes Applications Page 2 Bluetooth Bluetooth (BT) wireless technology is a short-range communications
More informationIntroduction to Wireless Networking ECE 401WN Spring 2009
I. Overview of Bluetooth Introduction to Wireless Networking ECE 401WN Spring 2009 Lecture 6: Bluetooth and IEEE 802.15 Chapter 15 Bluetooth and IEEE 802.15 What is Bluetooth? An always-on, short-range
More informationSimulation of Bluetooth Network
Simulation of Bluetooth Network Lennart Lagerstedt Stockholm, 2003 Master of Science Thesis Project The Department of Microelectronics and Information Technology, Royal Institute of Technology (KTH) Lennart
More informationMultiple Access Protocols
Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just
More informationBluetooth Demystified
Bluetooth Demystified S-72.4210 Postgraduate Course in Radio Communications Er Liu liuer@cc.hut.fi -10 Content Outline Bluetooth History Bluetooth Market and Applications Bluetooth Protocol Stacks Radio
More informationA Routing Protocol and Energy Efficient Techniques in Bluetooth Scatternets
A Routing Protocol and Energy Efficient Techniques in Bluetooth Scatternets Balakrishna J. Prabhu and A. Chockalingam Department of Electrical Communication Engineering Indian Institute of Science, Bangalore
More information(12) Patent Application Publication (10) Pub. No.: US 2001/ A1
(19) United States US 2001.0002906A1 (12) Patent Application Publication (10) Pub. No.: US 2001/0002906A1 Rune (43) Pub. Date: Jun. 7, 2001 (54) METHOD AND ARRANGEMENT INA COMMUNICATION NETWORK (75) Inventor:
More informationBluetooth: Short-range Wireless Communication
Bluetooth: Short-range Wireless Communication Wide variety of handheld devices Smartphone, palmtop, laptop Need compatible data communication interface Complicated cable/config. problem Short range wireless
More informationBy FaaDoOEngineers.com
ABSTRACT The seemingly endless entanglement of data wires connecting today s electronic devices has become slightly less jumbled with the introduction of Bluetooth technology and the creation of a wireless
More informationIntroduction to Bluetooth Wireless Technology
Introduction to Bluetooth Wireless Technology Jon Inouye Staff Software Engineer Mobile Platforms Group Intel Corporation Bluetooth Bluetooth is is a a trademark trademark owned owned by by Bluetooth Bluetooth
More informationIntroduction to Bluetooth
Introduction to Bluetooth Kirsten Matheus The idea behind Bluetooth The problems when trying to realize the idea The solutions used in Bluetooth How well the solutions work 12.06.2003 1 he Idea Behind
More informationPerformance Evaluation of Bluetooth Links in the Presence of Specific Types of Interference
Vol:1, No:3, 27 Performance Evaluation of Bluetooth Links in the Presence of Specific Types of Interference Radosveta Sokullu and Engin Karatepe International Science Index, Electrical and Computer Engineering
More informationMOBILE COMPUTING. Bluetooth 9/20/15. CSE 40814/60814 Fall Basic idea
OBILE COUTING CE 40814/60814 Fall 2015 Bluetooth Basic idea Universal radio interface for ad-hoc wireless connectivity Interconnecting computer and peripherals, handheld devices, DAs, cell phones replacement
More informationWireless Sensornetworks Concepts, Protocols and Applications. Chapter 5b. Link Layer Control
Wireless Sensornetworks Concepts, Protocols and Applications 5b Link Layer Control 1 Goals of this cha Understand the issues involved in turning the radio communication between two neighboring nodes into
More informationImproving Wireless Link Throughput via Interleaved FEC
Improving Wireless Link Throughput via Interleaved FEC Ling-Jyh Chen, Tony Sun, M. Y. Sanadidi, Mario Gerla UCLA Computer Science Department, Los Angeles, CA 90095, USA {cclljj, tonysun, medy, gerla}@cs.ucla.edu
More informationEfficient Multicast Schemes for Mobile Multiparty Gaming Applications
Efficient Multicast Schemes for Mobile Multiparty Gaming Applications P6-6th semester 2006 Group 681 - ComNet Aalborg University 9th March 2006 Institut for elektroniske systemer Fr. Bajers Vej 7 Telefon
More informationPerformance Simulation of TCP/IP over a Bluetooth Ad-hoc Network
Performance Simulation of TCP/IP over a Bluetooth Ad-hoc Network Niklas Johansson, Maria Kihl and Ulf Körner Department of Communication Systems, Lund University, Sweden (niklasj, maria, ulfk)@telecom.lth.se
More informationA Modified Medium Access Control Algorithm for Systems with Iterative Decoding
A Modified Medium Access Control Algorithm for Systems with Iterative Decoding Inkyu Lee Carl-Erik W. Sundberg Sunghyun Choi Dept. of Communications Eng. Korea University Seoul, Korea inkyu@korea.ac.kr
More informationAn Efficient Tool for the Evaluation of the Impact of WiFi Interference on Bluetooth Performance
1 An Efficient Tool for the Evaluation of the Impact of WiFi Interference on Bluetooth Performance Madani Zeghdoud 1, Pascal Cordier 1, and Michel Terré 2 1 France Telecom R&D, Issy les Moulineaux, France.
More informationDelayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology
Delayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology Prashant Kumar Gupta M.Tech. Scholar, Computer Networks, Bhilai Institute of Technology, Durg (C.G.), India
More informationModule 6 STILL IMAGE COMPRESSION STANDARDS
Module 6 STILL IMAGE COMPRESSION STANDARDS Lesson 19 JPEG-2000 Error Resiliency Instructional Objectives At the end of this lesson, the students should be able to: 1. Name two different types of lossy
More informationA Study of Wireless Compressed Digitalaudio
A Study of Wireless Compressed Digital Transmission Andreas Floros 1, Marios Koutroubas 2, Nicolas-Alexander Tatlas 2 and John Mourjopoulos 2 1 ATMEL Hellas S.A., Patras Science Park, Platani, 26 500 Patras,
More informationA Dynamic Slot Assignment Scheme for Slave-to-Slave and Multicast-like Communication in Bluetooth Personal Area Networks
A Dynamic Slot Assignment Scheme for Slave-to-Slave and Multicast-like Communication in Bluetooth Personal Area Networks Carlos Cordeiro, Sachin Abhyankar, and Dharma P. Agrawal OBR Center for Distributed
More informationCHAPTER 5 PROPAGATION DELAY
98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,
More informationA Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem
2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC) A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for
More informationMaster. Slave. Master. Slaves. TCP/IP Traffic with Efficient Bluetooth Technology. Shafqat Hameed 1, Umar F.Khan 2, *Muhammad Saleem 3
/ Traffic with Efficient Bluetooth Technology Shafqat Hameed 1, Umar F.Khan 2, *Muhammad Saleem 3 1,3 National University of Sciences and Technology (NUST), Pakistan 2 University of Bradford, Bradford,
More informationMultiple Access Links and Protocols
Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet
More informationWITH the evolution and popularity of wireless devices,
Network Coding with Wait Time Insertion and Configuration for TCP Communication in Wireless Multi-hop Networks Eiji Takimoto, Shuhei Aketa, Shoichi Saito, and Koichi Mouri Abstract In TCP communication
More informationComparing Bluetooth HDP and SPP for Mobile Health Devices
Comparing Bluetooth HDP and SPP for Mobile Health Devices Jad Noueihed, Robert Diemer, Samarjit Chakraborty and Stefanie Biala Institute for Real-Time Computer Systems, TU Munich Vodafone Group R&D Germany,
More informationPolitecnico di Milano Scuola di Ingegneria Industriale e dell Informazione. Link Layer. Fundamentals of Communication Networks
Politecnico di Milano Scuola di Ingegneria Industriale e dell Informazione Link Layer Fundamentals of Communication Networks Data Link layer o It is the first logical layer in the protocol stack o Functions
More informationCHAPTER 6 PILOT/SIGNATURE PATTERN BASED MODULATION TRACKING
CHAPTER 6 PILOT/SIGNATURE PATTERN BASED MODULATION TRACKING 6.1 TRANSMITTER AND RECEIVER Each modulated signal is preceded by a unique N bit pilot sequence (Manton, JH 2001). A switch in the transmitter
More informationWireless multipoint communication for optical sensors in the industrial environment using the new Bluetooth standard
Wireless multipoint communication for optical sensors in the industrial environment using the new Bluetooth standard Stephan Hussmann*a, Wing Yan Laua, Terry ChUa, Markus Grothofb aschool of Engineering,
More informationWireless Communications
4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:
More informationA COLLOCATED APPROACH FOR COEXISTENCE RESOLUTION IN WIRELESS HOME NETWORKING
A COLLOCATED APPROACH FOR COEXISTENCE RESOLUTION IN WIRELESS HOME NETWORKING Md Enamul Islam, Sanjay Jha, Dr. Paul W.H. Kwan, Monzurur Rahman School of Mathematics, Statistics and Computer Science, University
More informationBhopal, , India 3 M.Tech Scholor,Department Of Computer Science, BIST Bhopal. Bhopal, , India
Indirect Mobile Data Transfer Under Bluetooth Protocol 1 Pramod Kumar Maurya, 2 Gireesh Dixit, 3 Jay Prakash Maurya 1 M.Tech Scholor, 2 HOD, Department Of Computer Science, MPM, Bhopal, Bhopal, 462021,
More informationBy N.Golmie Presented by: Sushanth Divvela
By N.Golmie Presented by: Sushanth Divvela 1 Agenda Introduction WPAN WLAN Simulation Models Simulation results Concluding remarks 2 Introduc.on Coexistence of WPAN and WLAN Performance evaluation WLAN
More informationTOPOLOGY CONTROL IN MOBILE AD HOC NETWORKS WITH COOPERATIVE COMMUNICATIONS
IEEE 2012 Transactions on Wireless Communications, Volume: 9, Issue: 2 TOPOLOGY CONTROL IN MOBILE AD HOC NETWORKS WITH COOPERATIVE COMMUNICATIONS Abstract Cooperative communication has received tremendous
More informationWireless Sensor Networks
Wireless Sensor Networks 11th Lecture 29.11.2006 Christian Schindelhauer schindel@informatik.uni-freiburg.de 1 Bluetooth in WSN? There are several commercially available MAC protocol/products Wi-Fi Bluetooth
More informationAmarjeet Singh. February 7, 2012
Amarjeet Singh February 7, 2012 References Bluetooth Protocol Architecture v.1 www.bluetooth.org http://www.tutorial-reports.com/wireless/bluetooth/ Slides from last class uploaded on the course website
More informationInvestigation on OLSR Routing Protocol Efficiency
Investigation on OLSR Routing Protocol Efficiency JIRI HOSEK 1, KAROL MOLNAR 2 Department of Telecommunications Faculty of Electrical Engineering and Communication, Brno University of Technology Purkynova
More informationChannel Adaptive ACK Mechanism in IEEE Wireless Personal Area Networks
Channel Adaptive ACK Mechanism in IEEE 802.15.3 Wireless Personal Area Networks Jong-In Lee 28 August 2008 Broadband Communication Laboratory Korea University FISC 2008 Outline Introduction System model
More informationCS4/MSc Computer Networking. Lecture 13: Personal Area Networks Bluetooth
CS4/MSc Computer Networking Lecture 13: Personal Area Networks Bluetooth Computer Networking, Copyright University of Edinburgh 2005 BlueTooth Low cost wireless connectivity for Personal Area Networks
More informationPROPOSAL OF MULTI-HOP WIRELESS LAN SYSTEM FOR QOS GUARANTEED TRANSMISSION
PROPOSAL OF MULTI-HOP WIRELESS LAN SYSTEM FOR QOS GUARANTEED TRANSMISSION Phuc Khanh KIEU, Shinichi MIYAMOTO Graduate School of Engineering, Osaka University 2-1 Yamada-oka, Suita, Osaka, 565-871 JAPAN
More informationReliable Communication using Packet Coding for Underwater Acoustic Channels
Reliable Communication using Packet Coding for Underwater Acoustic Channels Rameez Ahmed and Milica Stojanovic Northeastern University, Boston, MA 02115, USA Email: rarameez@ece.neu.edu, millitsa@ece.neu.edu
More informationA Theoretical Evaluation of the G-TOR Hybrid ARQ Protocol
A Theoretical Evaluation of the G-TOR Hybrid ARQ Protocol Glenn E. Prescott, WB@SKX Phil Anderson, W@X ABSTRACT The recently-introduced G-TOR protocol for HF data communications employs several features
More informationSENSOR-MAC CASE STUDY
SENSOR-MAC CASE STUDY Periodic Listen and Sleep Operations One of the S-MAC design objectives is to reduce energy consumption by avoiding idle listening. This is achieved by establishing low-duty-cycle
More informationReal-time performance evaluation of Bluetooth ARQ protocol
248 JOURNAL OF COMMUNICATIONS SOFTWARE AND SYSTEMS, VOL. 3, NO. 4, DECEMBER 27 Real-time performance evaluation of Bluetooth ARQ protocol Fabrice PEYRARD Abstract: These research tass present a measurement
More informationA Guide. Wireless Network Library Bluetooth
A Guide to the Wireless Network Library Conforming to Standard v1.1 SystemView by ELANIX Copyright 1994-2005, Eagleware Corporation All rights reserved. Eagleware-Elanix Corporation 3585 Engineering Drive,
More informationUDP-Lite Enhancement Through Checksum Protection
IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS UDP-Lite Enhancement Through Checksum Protection To cite this article: Suherman et al 2017 IOP Conf. Ser.: Mater. Sci. Eng. 180
More informationA MAC Protocol based on Dynamic Time Adjusting in Wireless MIMO Networks
212 7th International ICST Conference on Communications and Networking in China (CHINACOM) A MAC Protocol based on Dynamic Time Adjusting in Wireless MIMO Networks Yang Qin*, Xiaoxiong Zhong, Li Li, Zhenhua
More informationExperimental Assessment of Media Synchronization Quality in IEEE b under Bluetooth Interference
Experimental Assessment of Media Synchronization Quality in IEEE 802.11b under Bluetooth Interference Masami KATO, Hirotsugu OKURA, Kiyoshige ITO and Shuji TASAKA Digital Systems Development Center BU,
More informationEmbedded Systems. 8. Communication
Embedded Systems 8. Communication Lothar Thiele 8-1 Contents of Course 1. Embedded Systems Introduction 2. Software Introduction 7. System Components 10. Models 3. Real-Time Models 4. Periodic/Aperiodic
More informationEnergy Efficiency Maximization for Wireless Sensor Networks
Energy Efficiency Maximization for Wireless Sensor Networks Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwjoe@hanyang.ac.kr Abstract. Because of the remote nature
More informationLinks Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame
Links Reading: Chapter 2 CS 375: Computer Networks Thomas Bressoud 1 Goals of Todayʼs Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared
More informationChapter 6 Digital Data Communications Techniques
Chapter 6 Digital Data Communications Techniques Asynchronous and Synchronous Transmission timing problems require a mechanism to synchronize the transmitter and receiver receiver samples stream at bit
More informationsflow Agent Contents 14-1
14 sflow Agent Contents Overview..................................................... 14-2 Flow Sampling by the sflow Agent........................... 14-2 Counter Polling by the sflow Agent...........................
More informationToward a Reliable Data Transport Architecture for Optical Burst-Switched Networks
Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks Dr. Vinod Vokkarane Assistant Professor, Computer and Information Science Co-Director, Advanced Computer Networks Lab University
More informationMaximizing the Lifetime of Clustered Wireless Sensor Network VIA Cooperative Communication
Vol., Issue.3, May-June 0 pp--7 ISSN: - Maximizing the Lifetime of Clustered Wireless Sensor Network VIA Cooperative Communication J. Divakaran, S. ilango sambasivan Pg student, Sri Shakthi Institute of
More information4. Error correction and link control. Contents
//2 4. Error correction and link control Contents a. Types of errors b. Error detection and correction c. Flow control d. Error control //2 a. Types of errors Data can be corrupted during transmission.
More informationCOMPUTER NETWORK Model Test Paper
Model Test Paper Question no. 1 is compulsory. Attempt all parts. Q1. Each question carries equal marks. (5*5 marks) A) Difference between Transmission Control Protocol (TCP) and User Datagram Protocol.
More informationImproving the performance of Bluetooth piconets with synchronous and asynchronous traffic
Improving the performance of Bluetooth piconets with synchronous and asynchronous traffic Vojislav B. Mišić, Jelena Mišić, and Ka Lok Chan Abstract The Bluetooth specification allows both asynchronous
More informationWireless Local Area Network. Internet Protocol Suite
Wireless Local Area Network Internet Protocol Suite Application layer File transfer protocol Telnet Hypertext transfer protocol Transport layer Network layer Host-tonetwork layer User datagram protocol
More informationA Rate-adaptive MAC Protocol Based on TCP Throughput for Ad Hoc Networks in fading channels
A Rate-adaptive MAC Protocol Based on TCP Throughput for Ad Hoc Networks in fading channels Shoko Uchida, Katsuhiro Naito, Kazuo Mori, and Hideo Kobayashi Department of Electrical and Electronic Engineering,
More informationDynamic Traffic Congestion Control Scheme in MANET with Cooperative Communication
Dynamic Traffic Congestion Control Scheme in MANET with Cooperative Communication P.Deepa 1, Dr. P.S.K Patra 2 1 Department of Computer Science and Engineering, 2 Head of the Department, Agni College of
More informationAn Adaptive Scheduling Algorithm for Bluetooth Ad-hoc Networks
An Adaptive Scheduling Algorithm for Bluetooth Ad-hoc Networks Raymond Y.L. Lee and Vincent W.S. Wong Department of Electrical and Computer Engineering The University of British Columbia,Vancouver, BC,
More informationIN this letter we focus on OpenFlow-based network state
1 On the Impact of Networ State Collection on the Performance of SDN Applications Mohamed Aslan, and Ashraf Matrawy Carleton University, ON, Canada Abstract Intelligent and autonomous SDN applications
More informationSIMULATION FRAMEWORK MODELING
CHAPTER 5 SIMULATION FRAMEWORK MODELING 5.1 INTRODUCTION This chapter starts with the design and development of the universal mobile communication system network and implementation of the TCP congestion
More informationCHAPTER 12 BLUETOOTH AND IEEE
CHAPTER 12 BLUETOOTH AND IEEE 802.15 These slides are made available to faculty in PowerPoint form. Slides can be freely added, modified, and deleted to suit student needs. They represent substantial work
More informationET3110 Networking and Communications UNIT 2: Communication Techniques and Data Link Control Protocol skong@itt-tech.edutech.edu Learning Objectives Identify methods of detecting errors. Use Hamming code
More informationSystems. Roland Kammerer. 10. November Institute of Computer Engineering Vienna University of Technology. Communication Protocols for Embedded
Communication Roland Institute of Computer Engineering Vienna University of Technology 10. November 2010 Overview 1. Definition of a protocol 2. Protocol properties 3. Basic Principles 4. system communication
More informationBluetooth. Bluetooth Radio
Bluetooth Bluetooth is an open wireless protocol stack for low-power, short-range wireless data communications between fixed and mobile devices, and can be used to create Personal Area Networks (PANs).
More informationDynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks
Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks Dodda Sunitha Dr.A.Nagaraju Dr. G.Narsimha Assistant Professor of IT Dept. Central University
More informationVideo Streaming Over Multi-hop Wireless Networks
Video Streaming Over Multi-hop Wireless Networks Hao Wang Dept. of Computer Information System, Cameron University hwang@cameron.edu Andras Farago, Subbarayan Venkatesan Dept. of Computer Science, The
More informationObjectives of the Bluetooth Technology
Bluetooth Origin of the name Harald I Bleutooth (in Danish, Harald Blåtand) (b. c. 910 d. c. 987), king of Denmark was credited with the first unification of Denmark and Norway Ericsson, inspired on the
More informationoriginal standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS
IEEE 802.11 The standard defines a wireless physical interface and the MAC layer while LLC layer is defined in 802.2. The standardization process, started in 1990, is still going on; some versions are:
More informationAnalysis of TCP Latency over Wireless Links Supporting FEC/ARQ-SR for Error Recovery
Analysis of TCP Latency over Wireless Links Supporting FEC/ARQ-SR for Error Recovery Raja Abdelmoumen CRISTAL Laboratory, Tunisia Email: Raja.Abdelmoumen@ensi.rnu.tn Chadi Barakat Projet Planète, INRIA-Sophia
More informationS Capacity enhancement methods for radio interface ARQ Schemes
ARQ Schemes, March 26 2004 1 S-72.630 Capacity enhancement methods for radio interface ARQ Schemes Markku Liinaharja March 25, 2004 ARQ Schemes, March 26 2004 2 Outline Classification of error control
More informationENGI 4557 Digital Communications Practice Problems 2017 (Part 2)
ENGI 4557 Digital Communications Practice Problems 207 (Part 2) H = n p i log 2 ( ) p i C = W log 2 ( + S N ) SNR = 6m + 0 log 0 ( 3σ2 x V ) 2 SNR = 6m 0 ( ) n n! = k k!(n k)! x = σ 2 = + + x p(x)dx (x
More informationSystem Level Analysis of the Bluetooth standard
System Level Analysis of the standard Massimo Conti, Daniele Moretti Università Politecnica delle Marche, via Brecce Bianche, I-60131, Ancona, Italy Abstract The SystemC modules of the Link Manager Layer
More information