Performance Simulation of TCP/IP over a Bluetooth Ad-hoc Network

Size: px
Start display at page:

Download "Performance Simulation of TCP/IP over a Bluetooth Ad-hoc Network"

Transcription

1 Performance Simulation of TCP/IP over a Bluetooth Ad-hoc Network Niklas Johansson, Maria Kihl and Ulf Körner Department of Communication Systems, Lund University, Sweden (niklasj, maria, ulfk)@telecom.lth.se Keywords. Ad-hoc networks, Bluetooth, TCP/IP, Simulation. Abstract. Bluetooth is a short-range radio link which originally was developed to eliminate cables between portable and/or fixed communicating devices. Bluetooth wireless technology is a de facto standard, as well as a specification for small-form factor, low-cost, short range radio links between mobile PCs, mobile phones and other portable devices. Today Bluetooth is a true ad-hoc wireless network intended for both synchronous traffic, e.g. voice, and asynchronous traffic, e.g. IP-based data traffic. In this paper we analyse the efficiency of the Bluetooth concept when carrying TCP/IP traffic. The analysis is carried out by means of simulations where the essential mechanisms in the Bluetooth protocols as well as those in the IP and TCP Vegas protocols are modelled in detail. A number of scenarios are presented and analysed and we show that TCP throughput can be kept quite high over the normally noisy radio channel, not at least due to the effective ARQ in Bluetooth where retransmissions are made immediately after a packet error. 1. Introduction Wireless ad-hoc networks have gained much attention during the last couple of years. The Bluetooth short-range radio link, which was originally developed to eliminate the cables between various electronic devices, is today a true wireless ad-hoc network intended for both synchronous traffic, e.g voice, and asynchronous traffic, e.g. IP-based data traffic. Bluetooth was presented in February 1998 by its five original promoters: Ericsson, Nokia, IBM, Toshiba and Intel. Late last year another four companies: 3Com, Lucent Technologies, Microsoft and Motorola joined the group of the five promoters and these nine companies now lead the Bluetooth Special Interest Group (SIG). Another 1400 companies have now joined the SIG. It is estimated that before year 2002, Bluetooth will be a built-in feature in more than 100 million mobile phones and in several million other communication devices, ranging from headsets and portable PC s to desktop computers, notebooks and digital cameras. For more information, see [5]. Though ad-hoc networks have gained much attention lately not that many papers have focused on how well these wireless networks can carry TCP/IP traffic. The research has mainly been focused on routing (see, for example, Johnson [20]). Perkins [21] examined how mobile-ip could be used in ad-hoc networks. Davies et al. [22] suggested that token passing should be used in the MAC protocols for wireless LANs. However, only a few papers have examined Bluetooth. Haartsen [6] gives a good introduction to the technology used in Bluetooth (see also the Bluetooth Specification ver. 1.0 [7]). Johansson et al. [1][2][3][4] presents and examines a number of different network usage cases for Bluetooth.

2 Wireless data networks must be protected by efficient ARQ schemes as the radio channel generally suffers from high packet error rates. Retransmissions of data link packets normally lead to increased delays, especially if MAC protocols based on contention are used. The Bluetooth MAC protocol is based on polling, and as retransmissions are made immediately after a packet error, end-to-end delays due to retransmissions are normally kept short. To ensure a reliable end-to-end performance the Transmission Control Protocol (TCP) is today widely used. With TCP a reliable, in-sequence delivery of packets is normally guaranteed (see, for instance, Stevens [11]). TCP also provides an efficient congestion control mechanism in that it uses a dynamic sliding window to control the rate at which packets are transmitted. The original congestion control scheme by Jacobson [10] has been further developed and now we see more effective schemes, adopted for todays networks, i.e. TCP Reno (see, for example, Allman et al. [9]) and TCP Vegas (see, Brakmo and Peterson [8]). In this paper we use the TCP Vegas protocol. Numerous papers have examined the performance of TCP over wireless links. Augé and Aspas [15], Lakshman and Madhow [19] and Gerla et al. [17] found that TCP does not work well in wireless environments. However, these papers assumed that there were no link layer retransmission schemes. Chaskar et al. [16] showed that a suitable link level error recovery mechanism may improve the TCP performance in wireless networks. Ludwig and Rathonyi [14] developed a link layer enhancement for GSM. Chandran et al. [18] suggested a feedback scheme for ad-hoc networks. Both Wong and Leung [12] and Chockalingam et al. [13] examined ARQ schemes for the link layer in wireless networks. In this paper we present a detailed analysis of how Bluetooth can carry a mix of UDP and TCP traffic. In [4], we examined a piconet with two terminals exchanging TCP/IP traffic. In this paper we investigate larger piconets, i.e piconets with several nodes. In such networks the heavy load on the master node may cause long delays and packet losses for the slaves. The master node uses the Fair Exhaustive Polling (FEP) scheme, developed in [3], to control the traffic. We find that Bluetooth is well suited to carry this traffic mix and that both high throughput and low delays can be achieved also when the radio channel has a high packet error probability. 2. Physical and Data Link Layers in Bluetooth As mentioned in the introduction, Bluetooth is a new Ad-Hoc Network concept, intended to be the ad-hoc network connecting all sorts of portable devices from laptops and PDAs to 3rd generation wireless telecommunication terminals, digital cameras, video projectors, etc. The first two layers in the OSI-model comprise the Baseband protocol, the Link Manager Protocol (LMP) and the Logical Link control and Adaptation Protocol (L2CAP) (see Figure 2). In Bluetooth a so called piconet is set up when two or more terminals (up to 8) communicate via the same 1 Mbps radio channel. One of the units acts as a master, thus controlling the traffic in the piconet, and the others are referred to as slaves. The Bluetooth baseband protocol offers circuit switched as well as packet switched connections. In both cases a Time-Division Duplex scheme for full duplex transmission is used. SCO links (Synchronous Connection Oriented) may be set up and are guaranteed a certain capacity in that the master reserves every n:th slot for such a connection. In this paper we focus on the packet switched service for which so called time slots that are ms long are used. Here

3 High level protocol or applications High level protocol or applications Network Layer Network Layer LMP L2CAP L2CAP LMP Baseband Data Link Baseband Physical Figure 1. The Bluetooth protocol stack. the time slots are dynamically allocated to so called ACL links (Asynchronous Connection- Less). The master controls the traffic on the radio channel by polling the slaves. An ARQ scheme handles the retranmission of packets in error. If a packet is not acknowledged a retransmission takes place immediately, and thus, delays due to errors are marginal. Though the system offers a gross bitrate of 1 Mbps the upper limit for an asymmetric link is 721 kbps and 57.6 kbps respectively and that of a symmetric is limited to kbps in each direction. Furthermore a fast frequency hopping is used to avoid interference with other piconets or with other non Bluetooth devices that may operate in the same frequency band. On the data link layer, two protocols, the Link Manager Protocol (LMP) and the Logical Link Control and Adaptation Protocol (L2CAP) are most essential. The LMP is used for link set-up and control and is not further discussed in this paper. The L2CAP provides connectionoriented and connectionless data services to upper layer protocols. For a more detailed description of the system, the reader is referred to [7]. 3. Simulation Model We have developed a detailed simulation model containing both Bluetooth and TCP/UDP/IP. Our investigations here are primarily based on five communicating devices, some of them sending UDP/IP traffic while others send bursty TCP/IP traffic. 3.1 Transmission Procedures Device #1 Device #2 Data segments are generated at an application layer according to some arrival process and are directly transmitted to the appropriate transmission layer, i.e. either TCP or UDP. The segments are put in the TCP(UDP) sender buffer, where they are delayed at least D TCP(UDP) seconds. This delay models the processing needed to add a TCP(UDP) header. When the window

4 allows it, TCP sends the segments to the IP layer. In case of UDP, the packet is directly transmitted to the IP layer after being delayed. At the IP layer, segments are delayed another D IP second and thereafter passed on to the L2CAP layer. L2CAP delays segments D L2CAP seconds, divides them into Bluetooth packets and sends them to the Bluetooth Baseband where they are further delayed at least D Base seconds. The Baseband transmits the packets according to the Bluetooth transmission scheme described earlier. Transmitted Baseband packets may be lost due to bit errors. Errors are modelled with a constant loss probability, herein called Packet Error Probability (PEP). When the receiver s Baseband layer receives a correct packet it is delayed D Base seconds and then sent to L2CAP where it is delayed another D L2CAP seconds. L2CAP reassembles the Bluetooth packets into IP segments and sends them to the IP layer. Here the segments are delayed D IP seconds and thereafter passed on to either the TCP(UDP) layer or to the L2CAP layer depending on whether the node is a destination or an intermediate node. The only intermediate node present in the simulated scenario is the master node, that relays traffic between two of its slaves. At the TCP layer, segments are delayed another D TCP seconds, but not passed on to the Application layer until TCP has sent an ACK for the segment in question. In case of UDP the segment is delayed D UDP seconds and then passed to the application layer directly. In [1], [2] and [3] the importance of multislot packets to increase throughput and keeping the delays low have been addressed, and based on these studies we find it advisable to use long, uncoded packet types for data transmission since they have the largest ideal throughput. 3.2 Data Packet Formats A segment that arrives at the L2CAP layer consists of three parts: A TCP or UDP header, an IP header and payload. As in [4], we aim for a total segment size as close as possible to 1500 bytes (i.e the Ethernet packet size) for the TCP segments. The only constraint is that segments should fit into a number of Bluetooth packets. The TCP header is 32 bytes instead of the normal 20 bytes where the extra 12 bytes are necessary for the window flow control calculations in TCP Vegas. The IP header is 20 bytes. L2CAP adds another 4 bytes as channel identification and packet length. With a payload of 1429 bytes, i.e. a total segment size of 1485 bytes, the TCP segment fits into 55 Bluetooth packets of type DH1. Normally, the ACKs are piggy-backed on TCP segments going in the opposite direction. On those occasions when there is no TCP segment going in the opposite direction within the stipulated time, a separate ACK has to be sent. A separate ACK, which consists of the headers only, is divided into 3 DH1 packets. With an UDP header of 4 bytes and a payload of 36 bytes (measured trace), i.e. a total segment size of 60 bytes, the UDP segment fits into 3 DH1 packets. 3.3 Model Parameters In the simulations all TCP and UDP segments are of the same size, herein called Data Segment Size (DSS) and Voice Segment Size (VSS) respectively. Furthermore, the maximum receiver window and the lower and upper bounds in the window adjustment algorithm (a and

5 b) are set as in [8]. All other parameters are set to what we believe are realistic values for this system. The model parameters are shown in Table 1. Table 1. Model parameters. Parameter Value Data Segment Size (DSS) 1429 bytes Voice Segment Size (VSS) 36 bytes Maximum receiver window (Max rwnd) 12 segments, i.e kbytes Total buffer size on Bluetooth layer 15 kbytes Segment delay on TCP layer (D TCP ) 1 µs Segment delay on IP layer (D IP ) 1 µs Segment delay on L2CAP layer (D L2CAP ) Packet delay on Baseband layer (D Base ) 1 ms 1 ms Lower bound in TCP Vegas window adjustment (a) 1 Upper bound in TCP Vegas window adjustment (b) 3 Packet error probability Investigations The objective of the investigations is to examine how Bluetooth handles a mix of TCP and UDP traffic. 4.1 Arrival Process The arrival process determines how the application layer delivers data to the TCP layer. TCP Arrival Process. This process is modelled by an Interrupted Bernoulli Process (IBP) (see Figure 2). p and q are the transition probabilities and λ is the probability for a packet generation in a slot. The latter is set to zero in the OFF state and one in the ON state. The time slots for the traffic generator is aligned with the time slots for the modelled piconet. p 1-p) OFF ON (1-q) Figure 2. The Interrupted Bernoulli Process. λ =0 q λ =1

6 The squared coefficient of variation, C 2, for the packet arrival times are used as a measure of burstiness in the simulations. For the IBP used in this paper, C 2 is given below 2 2q pq C = q2 ( p+ q) 2 UDP Arrival Process. An UDP trace serves as the arrival process for the UDP traffic. Measurements were performed at the Department of Communication Systems, Lund University. A Linux station running the program tcpdump was used to observe the voice traffic in between two stations. All UDP packets to the stations were captured during a period of approximately 1 hour and the packet sizes were logged to a file together with a time-stamp. The measurements have an accuracy of 1 µs. 4.2 Simulations In this paper we examine a number of scenarios where a master and four slaves within a pico net communicates, see Figure 2. In general, one of the slaves and the master have set up a UDP/IP connection. In parallel, two of the slaves have set up a TCP/IP connection that is relayed via the master. Finally the fourth slave and the master have a TCP/IP connection. We have observed that the delays experienced by the TCP traffic sometimes tend to be very large. To be able to understand why we experience long delays even for moderate loads, we measured the delays on the application layers between two communicating devices but also the delays between the TCP-layers respectively (See Table 2). In this way we where able to se how the TCP window flow control and the TCP ACK procedure effected the delays. When the receiving TCP protocol gets a packet, acknowledgements are sometimes delayed due to the fact that it is sometimes favourable to send acknowledgements piggybacked. Under certain circumstances this tends to increase delays at the application level. To be able to see how the UDP traffic effects the TCP traffic we also simulated a case where only the TCP traffic sources where active. UDP Slave 1 Master Entity 2 Master Entity 1 TCP Slave 2 Slave 3 TCP Slave 4 Figure 3. Simulated model

7 For all four cases in Table 2 we have chosen two different values of the squared coefficient of variation, C 2, set to 1 and 5 respectively. Table 2. Simulated cases Case # Case 1 Case 2 Case 3 Case 4 Description All traffic sources active. Traffic measurements from application to application (Solid line) UDP traffic source set to zero. Traffic measurements from application to application (Dotted Line) All traffic sources active. Traffic measurements from application to TCP (Slash-Dotted line) All traffic sources active. Traffic measurements from TCP to TCP (Dotted line) 5. Results and Discussion Figures 4 to 6 show delays when the TCP connections carry applications with low burstiness, e.g. C 2 equals 1. In Figure 2 the delay for the TCP-packets leaving the master for the fourth slave is drawn as a function of the pico-net load in kbps. Here four different delay curves are plotted. The upper one corresponds to Case 1. We see that the delay decreases with load up to a certain level, but then increases again. This is so due to that the acknowledgment can just seldom be piggybacked when the load is low. TCP then waits until there is a new ``tick, which comes regularly every 500 ms, before it sends an acknowledgment. When the load increases, more and more acknowledgments are piggy-backed on TCP segments in the opposite direction. However, when the load is further increased the delay increases as packets are frequently queued up in different buffers along the path. The second curve from the top (the dotted curve) shows the delay when the UDP traffic between slave one and the master is set to zero (Case 2). As can be seen here, when compar Delay (ms) Goodput (kbit/s) Figure 4. Average delays between the master and slave four when C 2 =1.

8 Delay (ms) Goodput (kbit/s) Figure 5. Average delays for the UDP traffic between the master and slave 1 when C 2 =1. ing the first two curves, the influence from the UDP traffic on the TCP traffic is rather modest. In the bottom of the diagram there are two plots that co-inside. These two plots also show the delays for the TCP/IP traffic between the master and slave 4 but here the delays are measured from the time the packets leave the application layer at the master (the second curve: from the time the packets leave the TCP layer at the master) until they are received at the TCP layer at slave 4, i.e. Case 3 and 4 respectively, not including the time until the acknowledgement is sent. Comparing the upper curve in the diagram with the two lower, we understand that the delay between the two application layers is significantly due either to the TCP window flow control or to the TCP ACK procedure, or perhaps both. By comparing the two lower we can conclude that the delays are inflicted by the TCP ACK procedure since these two curves coincide. Figure 2 shows the delays for the UDP traffic from the master to slave 1. Here only Case 1 is considered. We see that the UDP traffic experience very short delays even when the network is highly loaded, i.e. the UDP traffic is (almost) not effected by the TCP traffic. This is so due to the fact that there is no congestion control that slows down the stream of packets. The connection between slave 2 and slave 3 is relayed via the master, i.e. it has to utilize the link twice. Figure 2 shows the delays from slave 2 to slave 3. Here the upper curve shows the delays when all three sessions are active (Case 1), whereas the second curve from the top illustrates the case when the UDP traffic is cut off (Case 2). The two lower curves shows the delays for Case 3 and 4 respectively. We see that the delays are a bit higher than in Figure 2. This is naturally so since the link has to be traversed twice, though the delays are not increased more than 40% even under high load. The tendencies we saw in Figure 2 are here further noticeable. Figures 7 to 9 shows delays when the TCP connections carry applications with high burstiness. Here the squared coefficient of variation is set to 5. Figure 2 shows the delays for the TCP connection from the master to slave 4. The upper curve corresponds to Case 1. We see that the delays are higher than in the case when the data

9 Delay (ms) Goodput (kbit/s) Figure 6. AveragedelaysfortheTCPtrafficfromslave2toslave3whenC 2 = Delay (ms) Goodput (kbit/s) Figure 7. Average delays between the master and slave four when C 2 =5. segments where generated more smoothly, i.e. when C 2 =1. We also see that the delay does not decrease with the load since more packets can be piggybacked also for low loads. The dotted curve illustrates the delays when the UDP connection is cut off (Case 2). As in Figure 2, the influence from UDP traffic on the TCP traffic is only moderate. The two other curves show the delays from the application layer and from the TCP layer at the master to the TCP layer at the receiving slave, i.e. Case 3 and 4 respectively. We see that these two curves differ significantly as load increases. This was not observed in Figure 2 where the traffic was non bursty. The reason to why they differ in this case and not in the former is that the TCP window flow control is hardly never active when the traffic is nonbursty whereas it is when the traffic becomes more bursty and the queues becomes longer.

10 Delay (ms) Goodput (kbit/s) Figure 9. AveragedelaysfortheTCPtrafficfromslave2toslave3whenC 2 =5. Figure 2 resembles that of Figure 2, the only difference is that the delays are a bit higher for high loads, but still the UDP traffic is (almost) not effected by the TCP traffic Delay (ms) Goodput (kbit/s) Figure 8. Average delays for the UDP traffic between the master and slave 1 when C 2 =5. Figure 2, which shows the delays between slave 2 and slave 3, exhibits the same behaviour as Figure 2, though the delay is a bit higher as was the case when the squared coefficient of variation was equal to 1.

11 6. Conclusions Carrying TCP over wireless networks often leads to severe degradation in throughput and increased delays as the flow control mechanism in TCP reacts on delays introduced by retransmitting erroneous packets as if the network was congested. In this paper we have clearly demonstrated that the Bluetooth wireless ad-hoc network can handle a mix of TCP/IP and UDP/IP traffic very well also under high packet error probabilities. Throughput is kept high and end to end delays are within reasonable limits also for quite high loads. References [1] P. Johansson, N. Johansson, U. Körner, J. Elg and G. Svennarp, Short Range Radio Based Ad-hoc Networking: Performance and Properties, Proceedings of International Conference on Communications, Vancouver, Canada, June [2] N. Johansson, U. Körner and P. Johansson, Wireless Ad-hoc Networking with Bluetooth, Proceedings of Personal Wireless Communication, Copenhagen, March [3] N. Johansson, U. Körner and P. Johansson, Performance Evaluation of Scheduling Algorithms for Bluetooth, Proceedings of IFIP Broadband Communications, Hong Kong, Nov [4] N. Johansson, M. Kihl and U. Körner, TCP/IP over the Bluetooth Wireless Ad-hoc Network, AcceptedtoIFIPNetworking2000,Paris,May2000. [5] The Bluetooth Special Interest Group, Documentation available at [6] J. Haartsen, Bluetooth - The Universal Radio Interface for Ad-hoc, Wireless Connectivity, Ericsson Review, No.3, [7] Specification of the Bluetooth System, ver. 1.0, July [8] L.S. Brakmo and L.L. Peterson, TCP Vegas: End to End Congestion Avoidance on a Global Internet, IEEE Journal on Selected Areas in Communications, Vol.13, No. 8, Oct [9] M. Allman, V. Paxson and W. Stevens, TCP Congestion Control, RFC 2581, April [10] V. Jacobson, Congestion Avoidance and Control, ACM Sigcomm, Vol. 18, No.4, [11] W.R. Stevens, TCP/IP Illustrated, Volume 1: The Protocols, Addison-Wesley, [12] J.W.K. Wong and V.C.M. Leung, Improving End-to-End Performance of TCP Using Link-Layer Retransmissions over Mobile Internetworks, Proceedings of International Conference on Communications, Vancouver, Canada, June [13] A. Chockalingam, M. Zorzi and V. Tralli, Wireless TCP Performance with Link Layer FEC/ ARQ, Proceedings of International Conference on Communications, Vancouver, Canada, June [14] R. Ludwig and B. Rathonyi, Link Layer Enhancements for TCP/IP over GSM, Proceedings of Infocom 99, New York, USA, March [15] A.C. Augé and J.P. Aspas, TCP/IP over Wireless Links: Performance Evaluation, Proceedings of 48th Vehicular Technology Conference, May [16] H. Chaskar, T.V. Lakshman and U. Madhow, On the Design of Interfaces for TCP/IP over Wireless, Proceedings of IEEE Military Communications Conference, Oct

12 [17] M. Gerla, R. Bagrodia, L. Zhang, K. Tang and L. Wang, TCP over Wireless Multi-hop Protocols: Simulation and Experiments, Proceedings of International Conference on Communications, Vancouver, Canada, June [18] K. Chandran, S. Raghunathan, S. Venkatesan and R. Prakash, A Feedback Based Scheme for Improving TCP Performance in Ad-hoc Wireless Networks, Proceedings of 18th International Conference on Distributed Computing, [19] T.V. Lakshman and U. Madhow, The Performance of TCP/IP for Networks with High Bandwidth- Delay Products and Random Loss, IEEE/ACM Transactions on Networking, Vol.5, No.3, June [20] D.B. Johnson, Routing in Ad Hoc Networks of Mobile Hosts, Proceedings of IEEE Workshop on Mobile Computing and Applications, [21] C.E. Perkins, Mobile-IP, Ad-hoc Networking, and Nomadicity, Proceedings of 20th International Computer Software and Applications Conference, [22] R.L. Davies, R.M. Watson, A. Munro and M.H. Barton, Ad-hoc Wireless Networking: Contention Free Multiple Access, Proceedings of 5th IEE Conference on Telecommunications, Brighton, England, 1995.

Master. Slave. Master. Slaves. TCP/IP Traffic with Efficient Bluetooth Technology. Shafqat Hameed 1, Umar F.Khan 2, *Muhammad Saleem 3

Master. Slave. Master. Slaves. TCP/IP Traffic with Efficient Bluetooth Technology. Shafqat Hameed 1, Umar F.Khan 2, *Muhammad Saleem 3 / Traffic with Efficient Bluetooth Technology Shafqat Hameed 1, Umar F.Khan 2, *Muhammad Saleem 3 1,3 National University of Sciences and Technology (NUST), Pakistan 2 University of Bradford, Bradford,

More information

ALL SAINTS COLLEGE OF TECHNOLOGY, BHOPAL

ALL SAINTS COLLEGE OF TECHNOLOGY, BHOPAL BLUETOOTH Amita Tiwari IIIrd Semester amitaasct@gmail.com Sunil Kumar IIIrd Semester sunilasct@gmail.com ALL SAINTS COLLEGE OF TECHNOLOGY, BHOPAL ABSTRACT Blue tooth is a standard developed by a group

More information

e-pg Pathshala Quadrant 1 e-text

e-pg Pathshala Quadrant 1 e-text e-pg Pathshala Subject : Computer Science Module: Bluetooth Paper: Computer Networks Module No: CS/CN/37 Quadrant 1 e-text In our journey on networks, we are now exploring wireless networks. We looked

More information

CS4/MSc Computer Networking. Lecture 13: Personal Area Networks Bluetooth

CS4/MSc Computer Networking. Lecture 13: Personal Area Networks Bluetooth CS4/MSc Computer Networking Lecture 13: Personal Area Networks Bluetooth Computer Networking, Copyright University of Edinburgh 2005 BlueTooth Low cost wireless connectivity for Personal Area Networks

More information

Bluetooth: Short-range Wireless Communication

Bluetooth: Short-range Wireless Communication Bluetooth: Short-range Wireless Communication Wide variety of handheld devices Smartphone, palmtop, laptop Need compatible data communication interface Complicated cable/config. problem Short range wireless

More information

Local Area Networks NETW 901

Local Area Networks NETW 901 Local Area Networks NETW 901 Lecture 6 IEEE 802.15.1 - Bluetooth Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 The 802.15 Family Target environment: communication of personal

More information

UNIT 5 P.M.Arun Kumar, Assistant Professor, Department of IT, Sri Krishna College of Engineering and Technology, Coimbatore.

UNIT 5 P.M.Arun Kumar, Assistant Professor, Department of IT, Sri Krishna College of Engineering and Technology, Coimbatore. Communication Switching Techniques UNIT 5 P.M.Arun Kumar, Assistant Professor, Department of IT, Sri Krishna College of Engineering and Technology, Coimbatore. Bluetooth Techniques References 1. Wireless

More information

Ad Hoc Nets - MAC layer. Part II TDMA and Polling

Ad Hoc Nets - MAC layer. Part II TDMA and Polling Ad Hoc Nets - MAC layer Part II TDMA and Polling More MAC Layer protocols Bluetooth Piconet: a polling/tdma scheme Cluster TDMA: based on TDMA (with random access and reserved slots) research protocol

More information

CS263: Wireless Communications and Sensor Networks

CS263: Wireless Communications and Sensor Networks CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 6: Bluetooth and 802.15.4 October 12, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Bluetooth Standard for Personal Area

More information

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP CS 5520/ECE 5590NA: Network Architecture I Spring 2008 Lecture 13: UDP and TCP Most recent lectures discussed mechanisms to make better use of the IP address space, Internet control messages, and layering

More information

Delayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology

Delayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology Delayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology Prashant Kumar Gupta M.Tech. Scholar, Computer Networks, Bhilai Institute of Technology, Durg (C.G.), India

More information

Bluetooth. Bluetooth Radio

Bluetooth. Bluetooth Radio Bluetooth Bluetooth is an open wireless protocol stack for low-power, short-range wireless data communications between fixed and mobile devices, and can be used to create Personal Area Networks (PANs).

More information

SIMULATION BASED ANALYSIS OF BLUETOOTH NETWORKS. M. Subramani and M. Ilyas

SIMULATION BASED ANALYSIS OF BLUETOOTH NETWORKS. M. Subramani and M. Ilyas SIMULATION BASED ANALYSIS OF BLUETOOTH NETWORKS M. Subramani and M. Ilyas College of Engineering Florida Atlantic University Boca Raton, Florida 33431 {msubrama@cse.fau.edu, ilyas@fau.edu} Abstract Many

More information

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst EITF25 Internet Techniques and Applications L7: Internet Stefan Höst What is Internet? Internet consists of a number of networks that exchange data according to traffic agreements. All networks in Internet

More information

Rate Based Pacing with Various TCP Variants

Rate Based Pacing with Various TCP Variants International OPEN ACCESS Journal ISSN: 2249-6645 Of Modern Engineering Research (IJMER) Rate Based Pacing with Various TCP Variants Mr. Sreekanth Bandi 1, Mr.K.M.Rayudu 2 1 Asst.Professor, Dept of CSE,

More information

Bluetooth Demystified

Bluetooth Demystified Bluetooth Demystified S-72.4210 Postgraduate Course in Radio Communications Er Liu liuer@cc.hut.fi -10 Content Outline Bluetooth History Bluetooth Market and Applications Bluetooth Protocol Stacks Radio

More information

Data Link Control Protocols

Data Link Control Protocols Protocols : Introduction to Data Communications Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 23 May 2012 Y12S1L07, Steve/Courses/2012/s1/its323/lectures/datalink.tex,

More information

Improving TCP Performance over Wireless Networks using Loss Predictors

Improving TCP Performance over Wireless Networks using Loss Predictors Improving TCP Performance over Wireless Networks using Loss Predictors Fabio Martignon Dipartimento Elettronica e Informazione Politecnico di Milano P.zza L. Da Vinci 32, 20133 Milano Email: martignon@elet.polimi.it

More information

TCP based Receiver Assistant Congestion Control

TCP based Receiver Assistant Congestion Control International Conference on Multidisciplinary Research & Practice P a g e 219 TCP based Receiver Assistant Congestion Control Hardik K. Molia Master of Computer Engineering, Department of Computer Engineering

More information

Digital Communication Networks

Digital Communication Networks Digital Communication Networks MIT PROFESSIONAL INSTITUTE, 6.20s July 25-29, 2005 Professor Muriel Medard, MIT Professor, MIT Slide 1 Digital Communication Networks Introduction Slide 2 Course syllabus

More information

Cross-layer TCP Performance Analysis in IEEE Vehicular Environments

Cross-layer TCP Performance Analysis in IEEE Vehicular Environments 24 Telfor Journal, Vol. 6, No. 1, 214. Cross-layer TCP Performance Analysis in IEEE 82.11 Vehicular Environments Toni Janevski, Senior Member, IEEE, and Ivan Petrov 1 Abstract In this paper we provide

More information

Analysis of UDP Performance over Bluetooth

Analysis of UDP Performance over Bluetooth Analysis of UDP Performance over Bluetooth Martin Connolly, Cormac J. Sreenan University College Cork Department of Computer Science Email: cjs@cs.ucc.ie Abstract The Bluetooth protocol is one of the better-known

More information

Data Networks. Lecture 1: Introduction. September 4, 2008

Data Networks. Lecture 1: Introduction. September 4, 2008 Data Networks Lecture 1: Introduction September 4, 2008 Slide 1 Learning Objectives Fundamental aspects of network Design and Analysis: Architecture: layering, topology design, switching mechanisms Protocols:

More information

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties

More information

PERFORMANCE COMPARISON OF TCP VARIANTS FOR WIRELESS SENSOR NETWORKS

PERFORMANCE COMPARISON OF TCP VARIANTS FOR WIRELESS SENSOR NETWORKS PERFORMANCE COMPARISON OF TCP VARIANTS FOR WIRELESS SENSOR NETWORKS Nutan Bhati, Dr. Ashish Bansal Abstract: Mobile Ad hoc Networks (MANETs) are a collection of mobile nodes forming a dynamic autonomous

More information

Enhancing Bluetooth TCP Throughput via Link Layer Packet Adaptation

Enhancing Bluetooth TCP Throughput via Link Layer Packet Adaptation Enhancing Bluetooth TCP Throughput via Link Layer Packet Adaptation Ling-Jyh Chen, Rohit Kapoor, M. Y. Sanadidi, Mario Gerla UCLA Computer Science Department, Los Angeles, CA 995, USA {cclljj, rohitk,

More information

MOBILE COMPUTING. Bluetooth 9/20/15. CSE 40814/60814 Fall Basic idea

MOBILE COMPUTING. Bluetooth 9/20/15. CSE 40814/60814 Fall Basic idea OBILE COUTING CE 40814/60814 Fall 2015 Bluetooth Basic idea Universal radio interface for ad-hoc wireless connectivity Interconnecting computer and peripherals, handheld devices, DAs, cell phones replacement

More information

Improving Simultaneous Voice and Data Performance in Bluetooth Systems

Improving Simultaneous Voice and Data Performance in Bluetooth Systems Improving Simultaneous Voice and Data Performance in Bluetooth Systems Abstract In the Bluetooth system, isochronous applications, such as voice and audio, are carried by Synchronous Connection Oriented

More information

Class-based Packet Scheduling Policies for Bluetooth

Class-based Packet Scheduling Policies for Bluetooth Class-based Packet Scheduling Policies for Bluetooth Vishwanath Sinha, D. Raveendra Babu Department of Electrical Engineering Indian Institute of Technology, Kanpur - 08 06, INDIA vsinha@iitk.ernet.in,

More information

ENSC 835 project TCP performance over satellite links. Kenny, Qing Shao Grace, Hui Zhang

ENSC 835 project TCP performance over satellite links. Kenny, Qing Shao Grace, Hui Zhang ENSC 835 project TCP performance over satellite links Kenny, Qing Shao Qshao@cs.sfu.ca Grace, Hui Zhang Hzhange@cs.sfu.ca Road map Introduction to satellite communications Simulation implementation Window

More information

TCP PERFORMANCE FOR FUTURE IP-BASED WIRELESS NETWORKS

TCP PERFORMANCE FOR FUTURE IP-BASED WIRELESS NETWORKS TCP PERFORMANCE FOR FUTURE IP-BASED WIRELESS NETWORKS Deddy Chandra and Richard J. Harris School of Electrical and Computer System Engineering Royal Melbourne Institute of Technology Melbourne, Australia

More information

EVALUATING THE DIVERSE ALGORITHMS OF TRANSMISSION CONTROL PROTOCOL UNDER THE ENVIRONMENT OF NS-2

EVALUATING THE DIVERSE ALGORITHMS OF TRANSMISSION CONTROL PROTOCOL UNDER THE ENVIRONMENT OF NS-2 Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.157

More information

Bluetooth ACL Packet Selection Via Maximizing the Expected Throughput Efficiency of ARQ Protocol

Bluetooth ACL Packet Selection Via Maximizing the Expected Throughput Efficiency of ARQ Protocol Bluetooth ACL Packet Selection Via aximizing the Expected Throughput Efficiency of AQ Protocol Xiang Li 1,2,*, an-tian Li 1, Zhen-Guo Gao 2, and Li-Ning Sun 1 1 obot esearch Institute, Harbin Institute

More information

Bluetooth. Quote of the Day. "I don't have to be careful, I've got a gun. -Homer Simpson. Stephen Carter March 19, 2002

Bluetooth. Quote of the Day. I don't have to be careful, I've got a gun. -Homer Simpson. Stephen Carter March 19, 2002 Bluetooth Stephen Carter March 19, 2002 Quote of the Day "I don't have to be careful, I've got a gun. -Homer Simpson 1 About Bluetooth Developed by a group called Bluetooth Special Interest Group (SIG),

More information

Performance of LLC and TCP on GPRS Uplink with RLC Slot Level Retransmission

Performance of LLC and TCP on GPRS Uplink with RLC Slot Level Retransmission Performance of LLC and TCP on GPRS Uplink with RLC Slot Level Retransmission K. Premkumar and A. Chockalingam Wireless Research Lab (http://wrl.ece.iisc.ernet.in) Department of Electrical Communication

More information

Optimizing Packet Size via Maximizing Throughput Efficiency of ARQ on Bluetooth ACL Data Communication Link

Optimizing Packet Size via Maximizing Throughput Efficiency of ARQ on Bluetooth ACL Data Communication Link Proceedings of the 5th WSEAS Int. Conf. on APPLIED INFOATICS and COUNICATIONS, alta, September -7, 25 (pp24-28 Optimizing Pacet Size via aximizing Throughput Efficiency of AQ on Bluetooth ACL Data Communication

More information

Efficient Multicast Schemes for Mobile Multiparty Gaming Applications

Efficient Multicast Schemes for Mobile Multiparty Gaming Applications Efficient Multicast Schemes for Mobile Multiparty Gaming Applications P6-6th semester 2006 Group 681 - ComNet Aalborg University 9th March 2006 Institut for elektroniske systemer Fr. Bajers Vej 7 Telefon

More information

ENSC 835 project (2002) TCP performance over satellite links. Kenny, Qing Shao Grace, Hui Zhang

ENSC 835 project (2002) TCP performance over satellite links. Kenny, Qing Shao Grace, Hui Zhang ENSC 835 project (2002) TCP performance over satellite links Kenny, Qing Shao Qshao@cs.sfu.ca Grace, Hui Zhang Hzhange@cs.sfu.ca Road map Introduction to satellite communications Simulation implementation

More information

RD-TCP: Reorder Detecting TCP

RD-TCP: Reorder Detecting TCP RD-TCP: Reorder Detecting TCP Arjuna Sathiaseelan and Tomasz Radzik Department of Computer Science, King s College London, Strand, London WC2R 2LS {arjuna,radzik}@dcs.kcl.ac.uk Abstract. Numerous studies

More information

ADAPTIVE PACKET SELECTION ALGORITHM FOR BLUETOOTH DATA PACKETS

ADAPTIVE PACKET SELECTION ALGORITHM FOR BLUETOOTH DATA PACKETS Proceedings of the 6th WSEAS International Conference on Applied Computer Science, Hangzhou, China, April 15-17, 2007 160 ADAPTIVE PACKET SELECTION ALGORITHM FOR BLUETOOTH DATA PACKETS RADOSVETA SOKULLU

More information

ENSC 835 project (2002) TCP performance over satellite links. Kenny, Qing Shao Grace, Hui Zhang

ENSC 835 project (2002) TCP performance over satellite links. Kenny, Qing Shao Grace, Hui Zhang ENSC 835 project (2002) TCP performance over satellite links Kenny, Qing Shao Qshao@cs.sfu.ca Grace, Hui Zhang Hzhange@cs.sfu.ca Road map Introduction to satellite communications Simulation implementation

More information

Assignment 7: TCP and Congestion Control Due the week of October 29/30, 2015

Assignment 7: TCP and Congestion Control Due the week of October 29/30, 2015 Assignment 7: TCP and Congestion Control Due the week of October 29/30, 2015 I d like to complete our exploration of TCP by taking a close look at the topic of congestion control in TCP. To prepare for

More information

OSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print,

OSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print, ANNEX B - Communications Protocol Overheads The OSI Model is a conceptual model that standardizes the functions of a telecommunication or computing system without regard of their underlying internal structure

More information

Special Course in Computer Science: Local Networks. Lecture

Special Course in Computer Science: Local Networks. Lecture Special Course in Computer Science: Local Networks Lecture 11 16.5.2012 Roadmap of the Course So far Basic telecom concepts General study of LANs Local Networks Ethernet Token bus Token ring ATM LAN Wi-Fi

More information

Solving the Interference Problem due to Wireless LAN for Bluetooth Transmission Using a Non- Collaborative Mechanism. Yun-Ming, Chiu 2005/6/09

Solving the Interference Problem due to Wireless LAN for Bluetooth Transmission Using a Non- Collaborative Mechanism. Yun-Ming, Chiu 2005/6/09 Solving the Interference Problem due to Wireless LAN for Bluetooth Transmission Using a Non- Collaborative Mechanism Yun-Ming, Chiu 2005/6/09 Outline Overview Survey of Bluetooth Structure of Bluetooth

More information

Bluetooth Wireless Technology meets CAN

Bluetooth Wireless Technology meets CAN Bluetooth Wireless Technology meets CAN Matthias Fuchs esd electronic system design GmbH, Hannover, Germany To access mobile and moving CAN fieldbus systems a wireless approach is often a good solution.

More information

Feasibility of a Bluetooth Based Structural Health Monitoring Telemetry System

Feasibility of a Bluetooth Based Structural Health Monitoring Telemetry System Feasibility of a Bluetooth Based Structural Health Monitoring Telemetry System Item Type text; Proceedings Authors Uchil, Vilas; Kosbar, Kurt Publisher International Foundation for Telemetering Journal

More information

Wireless Communications

Wireless Communications 4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:

More information

Introduction to Protocols

Introduction to Protocols Chapter 6 Introduction to Protocols 1 Chapter 6 Introduction to Protocols What is a Network Protocol? A protocol is a set of rules that governs the communications between computers on a network. These

More information

The effect of Mobile IP handoffs on the performance of TCP

The effect of Mobile IP handoffs on the performance of TCP Mobile Networks and Applications 4 (1999) 131 135 131 The effect of Mobile IP handoffs on the performance of TCP Anne Fladenmuller a and Ranil De Silva b a Alcatel CIT, Software Department, Route de Nozay,

More information

Communication Systems. WPAN: Bluetooth. Page 1

Communication Systems. WPAN: Bluetooth. Page 1 Communication Systems WPAN: Bluetooth Page 1 Outline Historical perspective Piconet Scatternet Lattency modes Applications Page 2 Bluetooth Bluetooth (BT) wireless technology is a short-range communications

More information

TCP and UDP Fairness in Vehicular Ad hoc Networks

TCP and UDP Fairness in Vehicular Ad hoc Networks TCP and UDP Fairness in Vehicular Ad hoc Networks Forouzan Pirmohammadi 1, Mahmood Fathy 2, Hossein Ghaffarian 3 1 Islamic Azad University, Science and Research Branch, Tehran, Iran 2,3 School of Computer

More information

A Routing Protocol and Energy Efficient Techniques in Bluetooth Scatternets

A Routing Protocol and Energy Efficient Techniques in Bluetooth Scatternets A Routing Protocol and Energy Efficient Techniques in Bluetooth Scatternets Balakrishna J. Prabhu and A. Chockalingam Department of Electrical Communication Engineering Indian Institute of Science, Bangalore

More information

Problems and Solutions for the TCP Slow-Start Process

Problems and Solutions for the TCP Slow-Start Process Problems and Solutions for the TCP Slow-Start Process K.L. Eddie Law, Wing-Chung Hung The Edward S. Rogers Sr. Department of Electrical and Computer Engineering University of Toronto Abstract--In this

More information

IEEE P Working Group for Wireless Personal Area Networks TM

IEEE P Working Group for Wireless Personal Area Networks TM IEEE P802.15 Working Group for Wireless Personal Area Networks TM SCORT - An Alternative to the Bluetooth SCO Link for Voice Operation in an Interference Environment Slide 1 Bluetooth SCO Link The Bluetooth

More information

Polling in Bluetooth a Simplified Best Effort Case

Polling in Bluetooth a Simplified Best Effort Case Polling in Bluetooth a Simplified Best Effort Case Rachid Ait Yaiz University of Twente (Computer Science, TSS Group) Geert Heijenk University of Twente and Ericsson EuroLab Netherlands {yaiz,heijenk}@cs.utwente.nl

More information

Inside Bluetooth. Host. Bluetooth. Module. Application RFCOMM SDP. Transport Interface. Transport Bus. Host Controller Interface

Inside Bluetooth. Host. Bluetooth. Module. Application RFCOMM SDP. Transport Interface. Transport Bus. Host Controller Interface Inside Bluetooth Application Host Application Host Audio (SCO) RFCOMM SDP Data (ACL) Control API and Legacy Support Modules Bluetooth HCI Driver Transport Interface Physical I/F Transport Bus Bluetooth

More information

Performance Evaluation of Bluetooth Links in the Presence of Specific Types of Interference

Performance Evaluation of Bluetooth Links in the Presence of Specific Types of Interference Vol:1, No:3, 27 Performance Evaluation of Bluetooth Links in the Presence of Specific Types of Interference Radosveta Sokullu and Engin Karatepe International Science Index, Electrical and Computer Engineering

More information

Guide to Wireless Communications, 3 rd Edition. Objectives

Guide to Wireless Communications, 3 rd Edition. Objectives Guide to Wireless Communications, 3 rd Edition Chapter 5 Wireless Personal Area Networks Objectives Describe a wireless personal area network (WPAN) List the different WPAN standards and their applications

More information

Communication Networks

Communication Networks Communication Networks Spring 2018 Laurent Vanbever nsg.ee.ethz.ch ETH Zürich (D-ITET) April 30 2018 Materials inspired from Scott Shenker & Jennifer Rexford Last week on Communication Networks We started

More information

OPNET M-TCP model. Modupe Omueti

OPNET M-TCP model. Modupe Omueti OPNET M-TCP model Modupe Omueti momueti@cs.sfu.ca Communication Networks Laboratory http://www.ensc.sfu.ca/research/cnl School of Engineering Science Simon Fraser University Roadmap Introduction Motivation

More information

PCnet-FAST Buffer Performance White Paper

PCnet-FAST Buffer Performance White Paper PCnet-FAST Buffer Performance White Paper The PCnet-FAST controller is designed with a flexible FIFO-SRAM buffer architecture to handle traffic in half-duplex and full-duplex 1-Mbps Ethernet networks.

More information

SIMULATION BASED ANALYSIS OF THE INTERACTION OF END-TO-END AND HOP-BY-HOP FLOW CONTROL SCHEMES IN PACKET SWITCHING LANS

SIMULATION BASED ANALYSIS OF THE INTERACTION OF END-TO-END AND HOP-BY-HOP FLOW CONTROL SCHEMES IN PACKET SWITCHING LANS SIMULATION BASED ANALYSIS OF THE INTERACTION OF END-TO-END AND HOP-BY-HOP FLOW CONTROL SCHEMES IN PACKET SWITCHING LANS J Wechta, A Eberlein, F Halsall and M Spratt Abstract To meet the networking requirements

More information

Evaluation of a Queue Management Method for TCP Communications over Multi-hop Wireless Links

Evaluation of a Queue Management Method for TCP Communications over Multi-hop Wireless Links Evaluation of a Queue Management Method for TCP Communications over Multi-hop Wireless Links Satoshi Ohzahata and Konosuke Kawashima Department of Computer, Information and Communication Sciences, Tokyo

More information

Introduction to Open System Interconnection Reference Model

Introduction to Open System Interconnection Reference Model Chapter 5 Introduction to OSI Reference Model 1 Chapter 5 Introduction to Open System Interconnection Reference Model Introduction The Open Systems Interconnection (OSI) model is a reference tool for understanding

More information

Transmission Control Protocol. ITS 413 Internet Technologies and Applications

Transmission Control Protocol. ITS 413 Internet Technologies and Applications Transmission Control Protocol ITS 413 Internet Technologies and Applications Contents Overview of TCP (Review) TCP and Congestion Control The Causes of Congestion Approaches to Congestion Control TCP Congestion

More information

ECE 333: Introduction to Communication Networks Fall 2001

ECE 333: Introduction to Communication Networks Fall 2001 ECE 333: Introduction to Communication Networks Fall 2001 Lecture 28: Transport Layer III Congestion control (TCP) 1 In the last lecture we introduced the topics of flow control and congestion control.

More information

Evaluating the Eifel Algorithm for TCP in a GPRS Network

Evaluating the Eifel Algorithm for TCP in a GPRS Network Evaluating the Eifel Algorithm for TCP in a GPRS Network Andrei Gurtov University of Helsinki Finland e-mail: Andrei.Gurtov@cs.Helsinki.FI Reiner Ludwig Ericsson Research Germany e-mail: Reiner.Ludwig@Ericsson.com

More information

Bridging and Switching Basics

Bridging and Switching Basics CHAPTER 4 Bridging and Switching Basics This chapter introduces the technologies employed in devices loosely referred to as bridges and switches. Topics summarized here include general link-layer device

More information

TCP Flavors Simulation Evaluations over Noisy Environment

TCP Flavors Simulation Evaluations over Noisy Environment International Journal of Information Engineering and Applications 2018; 1(1): 11-17 http://www.aascit.org/journal/information TCP Flavors Simulation Evaluations over Noisy Environment Elsadig Gamaleldeen

More information

Improving TCP End to End Performance in Wireless LANs with Snoop Protocol

Improving TCP End to End Performance in Wireless LANs with Snoop Protocol Improving TCP End to End Performance in Wireless LANs with Snoop Protocol Dejan Jaksic, Zeljko Ilic and Alen Bazant Department of Telecommunications, Faculty of Electrical Engineering and Computing Unska

More information

Performance Analysis of TCP LBA and TCP TAHOE Approaches in g Standard Savreet KaurBrar 1, Sandeep Singh Kang 2

Performance Analysis of TCP LBA and TCP TAHOE Approaches in g Standard Savreet KaurBrar 1, Sandeep Singh Kang 2 Performance Analysis of TCP LBA and TCP TAHOE Approaches in 802.11g Standard Savreet KaurBrar 1, Sandeep Singh Kang 2 1 (MTechCSE Student, Chandigarh Engineering College Landran,India) 2 (Associate Professor

More information

Introduction to Wireless Networking ECE 401WN Spring 2009

Introduction to Wireless Networking ECE 401WN Spring 2009 I. Overview of Bluetooth Introduction to Wireless Networking ECE 401WN Spring 2009 Lecture 6: Bluetooth and IEEE 802.15 Chapter 15 Bluetooth and IEEE 802.15 What is Bluetooth? An always-on, short-range

More information

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE 802.11 NETWORKS Marek Natkaniec, Andrzej R. Pach Department of Telecommunications University of Mining and Metallurgy al. Mickiewicza 30, 30-059 Cracow

More information

CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments

CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments Stream Control Transmission Protocol (SCTP) uses the 32-bit checksum in the common header, by which a corrupted

More information

Redes Inalámbricas Tema 2.B Wireless PANs: Bluetooth

Redes Inalámbricas Tema 2.B Wireless PANs: Bluetooth Redes Inalámbricas Tema 2.B Wireless PANs: Bluetooth Bluetooh Acknowledgments: Foo Chun Choong, Ericsson Research / Cyberlab Singapore, and Open Source Software Lab, ECE Dept, NUS Máster de Ingeniería

More information

Intra-Piconet Polling Algorithms in Bluetooth

Intra-Piconet Polling Algorithms in Bluetooth Intra-Piconet Polling Algorithms in Bluetooth Jelena Mišić and Vojislav B. Mišić Bluetooth is an emerging standard for Wireless Personal Area Networks (WPANs): short range, ad hoc wireless networks [1].

More information

Operating Systems. 16. Networking. Paul Krzyzanowski. Rutgers University. Spring /6/ Paul Krzyzanowski

Operating Systems. 16. Networking. Paul Krzyzanowski. Rutgers University. Spring /6/ Paul Krzyzanowski Operating Systems 16. Networking Paul Krzyzanowski Rutgers University Spring 2015 1 Local Area Network (LAN) LAN = communications network Small area (building, set of buildings) Same, sometimes shared,

More information

Performance of UMTS Radio Link Control

Performance of UMTS Radio Link Control Performance of UMTS Radio Link Control Qinqing Zhang, Hsuan-Jung Su Bell Laboratories, Lucent Technologies Holmdel, NJ 77 Abstract- The Radio Link Control (RLC) protocol in Universal Mobile Telecommunication

More information

Simulation of Bluetooth Network

Simulation of Bluetooth Network Simulation of Bluetooth Network Lennart Lagerstedt Stockholm, 2003 Master of Science Thesis Project The Department of Microelectronics and Information Technology, Royal Institute of Technology (KTH) Lennart

More information

ECS 152A Computer Networks Instructor: Liu. Name: Student ID #: Final Exam: March 17, 2005

ECS 152A Computer Networks Instructor: Liu. Name: Student ID #: Final Exam: March 17, 2005 ECS 152A Computer Networks Instructor: Liu Name: Student ID #: Final Exam: March 17, 2005 Duration: 120 Minutes 1. The exam is closed book. However, you may refer to one sheet of A4 paper (double sided)

More information

EEC-682/782 Computer Networks I

EEC-682/782 Computer Networks I EEC-682/782 Computer Networks I Lecture 16 Wenbing Zhao w.zhao1@csuohio.edu http://academic.csuohio.edu/zhao_w/teaching/eec682.htm (Lecture nodes are based on materials supplied by Dr. Louise Moser at

More information

UNIT 2 TRANSPORT LAYER

UNIT 2 TRANSPORT LAYER Network, Transport and Application UNIT 2 TRANSPORT LAYER Structure Page No. 2.0 Introduction 34 2.1 Objective 34 2.2 Addressing 35 2.3 Reliable delivery 35 2.4 Flow control 38 2.5 Connection Management

More information

Comparison of Shaping and Buffering for Video Transmission

Comparison of Shaping and Buffering for Video Transmission Comparison of Shaping and Buffering for Video Transmission György Dán and Viktória Fodor Royal Institute of Technology, Department of Microelectronics and Information Technology P.O.Box Electrum 229, SE-16440

More information

TCP Optimal Performance in Wireless Networks Applications

TCP Optimal Performance in Wireless Networks Applications Journal of Computer Science 2 (5): 455-459, 2006 ISSN 1549-3636 2006 Science Publications TCP Optimal Performance in Wireless Networks Applications 2 Emad Qaddoura, 1 Abdelghani Daraiseh, 3 Wesam Al Mobaideen,

More information

CMSC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. October 11, 2018

CMSC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. October 11, 2018 CMSC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala Message, Segment, Packet, and Frame host host HTTP HTTP message HTTP TCP TCP segment TCP router router IP IP packet IP IP packet IP

More information

Multiple unconnected networks

Multiple unconnected networks TCP/IP Life in the Early 1970s Multiple unconnected networks ARPAnet Data-over-cable Packet satellite (Aloha) Packet radio ARPAnet satellite net Differences Across Packet-Switched Networks Addressing Maximum

More information

Enhancing Performance of Asynchronous Data Traffic over the Bluetooth Wireless Ad-hoc Network

Enhancing Performance of Asynchronous Data Traffic over the Bluetooth Wireless Ad-hoc Network Enhancing Performance of Asynchronous Data Traffic over the Bluetooth Wireless Ad-hoc Network Abhishek Das, Abhishek Ghose, Ashu Razdan, Huzur Saran y & Rajeev Shorey IBM India Research Laboratory, Block

More information

Internetworking Models The OSI Reference Model

Internetworking Models The OSI Reference Model Internetworking Models When networks first came into being, computers could typically communicate only with computers from the same manufacturer. In the late 1970s, the Open Systems Interconnection (OSI)

More information

ENRNG3076 : Oral presentation BEng Computer and Communications Engineering

ENRNG3076 : Oral presentation BEng Computer and Communications Engineering Jean Parrend ENRNG3076 : Oral presentation BEng Computer and Communications Engineering 1 Origin 2 Purpose : Create a cable replacement standard for personal area network Handle simultaneously both data

More information

Bluetooth. Basic idea

Bluetooth. Basic idea Bluetooth Basic idea Universal radio interface for ad-hoc wireless connectivity Interconnecting computer and peripherals, handheld devices, DAs, cell phones replacement of IrDA Embedded in other devices,

More information

Wireless Sensor Networks

Wireless Sensor Networks Wireless Sensor Networks 11th Lecture 29.11.2006 Christian Schindelhauer schindel@informatik.uni-freiburg.de 1 Bluetooth in WSN? There are several commercially available MAC protocol/products Wi-Fi Bluetooth

More information

Computer Networking Introduction

Computer Networking Introduction Computer Networking Introduction Halgurd S. Maghdid Software Engineering Department Koya University-Koya, Kurdistan-Iraq Lecture No.11 Chapter 3 outline 3.1 transport-layer services 3.2 multiplexing and

More information

Differentiating Congestion vs. Random Loss: A Method for Improving TCP Performance over Wireless Links

Differentiating Congestion vs. Random Loss: A Method for Improving TCP Performance over Wireless Links Differentiating Congestion vs. Random Loss: A Method for Improving TCP Performance over Wireless Links Christina Parsa J.J. Garcia-Luna-Aceves Computer Engineering Department Baskin School of Engineering

More information

COMPUTER NETWORKS MODEL QUESTION PAPER WITH SOLUTION. (c) Peer-to-peer processes are processes on two or more devices communicating at a

COMPUTER NETWORKS MODEL QUESTION PAPER WITH SOLUTION. (c) Peer-to-peer processes are processes on two or more devices communicating at a COMPUTER NETWORKS MODEL QUESTION PAPER WITH SOLUTION Q-1(a) In half-duplex transmission, only one entity can send at a time; in a full-duplex transmission, both entities can send at the same time. (b)

More information

CHAPTER 12 BLUETOOTH AND IEEE

CHAPTER 12 BLUETOOTH AND IEEE CHAPTER 12 BLUETOOTH AND IEEE 802.15 These slides are made available to faculty in PowerPoint form. Slides can be freely added, modified, and deleted to suit student needs. They represent substantial work

More information

Buffer Requirements for Zero Loss Flow Control with Explicit Congestion Notification. Chunlei Liu Raj Jain

Buffer Requirements for Zero Loss Flow Control with Explicit Congestion Notification. Chunlei Liu Raj Jain Buffer Requirements for Zero Loss Flow Control with Explicit Congestion Notification Chunlei Liu Raj Jain Department of Computer and Information Science The Ohio State University, Columbus, OH 432-277

More information

100 Mbps. 100 Mbps S1 G1 G2. 5 ms 40 ms. 5 ms

100 Mbps. 100 Mbps S1 G1 G2. 5 ms 40 ms. 5 ms The Influence of the Large Bandwidth-Delay Product on TCP Reno, NewReno, and SACK Haewon Lee Λ, Soo-hyeoung Lee, and Yanghee Choi School of Computer Science and Engineering Seoul National University San

More information

CIS 632 / EEC 687 Mobile Computing

CIS 632 / EEC 687 Mobile Computing CIS 632 / EEC 687 Mobile Computing TCP in Mobile Networks Prof. Chansu Yu Contents Physical layer issues Communication frequency Signal propagation Modulation and Demodulation Channel access issues Multiple

More information

IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 03, 2014 ISSN (online):

IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 03, 2014 ISSN (online): IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 03, 2014 ISSN (online): 2321-0613 Performance Evaluation of TCP in the Presence of in Heterogeneous Networks by using Network

More information