FORMATION OF SCATTERNETS WITH HETEROGENEOUS BLUETOOTH DEVICES

Size: px
Start display at page:

Download "FORMATION OF SCATTERNETS WITH HETEROGENEOUS BLUETOOTH DEVICES"

Transcription

1 FORMATION OF SCATTERNETS WITH HETEROGENEOUS BLUETOOTH DEVICES Paal Engelstad, Do Van Thanh, Tore E. Jonvik University of Oslo (UniK) / Telenor R&D, 1331 Fornebu, Norway {Paal.Engelstad, Thanh-van.Do, Tore-erling.Jonvik }@telenor.com ABSTRACT Bluetooth is an open specification for short-range wireless communication. It has gradually been extended to meet the demand for personal ad-hoc networking. A Bluetooth ad-hoc network consists of Bluetooth devices interconnected into piconets and piconets interconnected into scatternets. A number of scatternet formation algorithms have been proposed, but none has yet taken into account that Bluetooth devices may have very different capabilities. We have explored how three proposed scatternet formation algorithms perform when a share of the scatternet devices have low-capabilities and cannot forward packets. Simulations illustrated how the efficiency of the scatternet topology is deteriorated as the share of low-capability devices increases. We have also evaluated each algorithm with respect to its capability to accommodate low-capability devices in the scatternet. 1. INTRODUCTION Bluetooth is a technology for short-range wireless communication, and is designed for imposing low battery drain on the wireless terminal. Originally, it was intended for cable replacement between two devices, but the specification has gradually been extended to meet the demand for ad-hoc networking [1]. Due to low manufacturing costs (down to 5 USD/ Bluetooth chip) it is economically feasible to incorporate Bluetooth not only into computing devices, such as PDAs, mobile phones and portable PCs, but also into low-capability devices, such as head-sets, micro-displays and various sensors. A Bluetooth ad-hoc network consists of Bluetooth devices often of widely different capabilities - interconnected into piconets and piconets interconnected into scatternets. The Bluetooth specification outlines how two Bluetooth devices interconnect and form a piconet. When two devices come into each other s communication range, they detect each other by first going through an INQUIRY phase. The following PAGE phase allows the devices to start establishing a connection. One of the devices obtains the role of a master, while the other becomes a slave. Each piconet consists of only one master, and maximum 255 slaves. However, the number of active slaves in a piconet cannot exceed seven. Although a device can only be master of maximum one piconet, it can be slave in a number of different piconets, or master in one piconet and slave in others. Hence, two piconets can be interconnected if one piconet master is also slave of the other piconet (i.e. as a masterslave bridge), or if one device is slave of both piconets (i.e. as a slave-slave bridge). It is anticipated that some low-capability devices might not participate in the scatternet at the same level as more advanced computing devices do. For example, due to low battery capacity, little memory or little processing power, some low-capability devices may not be capable or willing to forward packets on behalf of other nodes. They are bound to participate in scatternets as slaves while only more advanced computing devices may assume the role of a master, master-slave-bridge or slave-slave bridge. None of the existing algorithms proposed for Bluetooth scatternet formation takes the aspect of heterogeneous devices into consideration. We have therefore studied the performance of three proposed algorithms when low-capability devices are present. Amongst a wide number of proposed algorithms for scatternet formation, we chose three algorithms based on the following two basic criteria: 1. Weakly connected underlying topologies: A realistic scatternet formation algorithm should not assume a strongly connected underlying topology where each node may connect to any other node in the scatternet. Instead, the algorithm should work even when there might be at least two nodes in the same scatternet that are out of each other s radio range. 2. Asynchronous scatternet formation: The algorithms should not mandate that all nodes start forming the scatternet at the same time (e.g. in terms of an algorithm comprising several distinct phases). Such synchronous formations would probably be difficult to co-ordinate in real usage scenarios. Instead, a Bluetooth device should be able to enter or leave the scatternet at any time. In these events, topology changes should be handled locally and not propagated throughout the scatternet. The resulting three algorithms that we have examined were Tree Scatternet Formation (TSF), Slave-slave-based Scatternet Formation (SSF) and Master-slave-based Scatternet Formation (MSF) [2] [3]. They are all asynchronous and designed for work well, even for weakly connected underlying topologies. The next section outlines relevant work on scatternet formation. Section 3 presents the framework that we

2 developed for the investigation of scatternets formation with heterogeneous devices. Based on this framework, we performed simulations. Simulation results are presented in Section 4. Finally, we present the conclusions of our work in Section RELATED WORK 2.1. Bluetooth link formation The link formation process is specified in the Bluetooth baseband specification [1]. The link formation comprises an Inquiry phase followed by a Page phase. In both phases the hopping pattern is limited to 32 frequencies (or only 16 frequencies in a few countries). The Inquiry process allows a master node to discover and collect clock and address information about neighboring devices. The page process uses this information to establish a bidirectional frequency hopping communication channel. master receives the response and establishes a connection with the slave Related work on scatternet formation Miklos et al. [4] undertook an early study on scatternet formation. They used heuristics to generate scatternets with some desirable properties, and evaluated them by means of simulations. Johansson et al. [5] performed link-layer simulations of piconets. Later Salonidis et al. [6] presented a symmetric link formation scheme where no configuration of potential master or slave roles is necessary. Instead, each node alternates between the INQUIRY and INQUIRY SCAN states (Figure 2). Figure 2. The symmetric link formation scheme proposed by Salonidis et al. [6] Figure 1. Connection State Diagram for Bluetooth link formation During the Inquiry process a potential master (i.e. the device to be the master of the connection to be formed) will first have to enter the INQUIRY state, while a potential slave will have to enter the INQUIRY SCAN state (Figure 1). A device in the former state alternates between transmitting short identity-packets containing an Inquiry Access Code (IAC) and listening for responses. A node in the latter state, on the other hand, listens for packets from devices in the INQUIRY state, performs an IAC check and responds when appropriate with an Inquiry Response Message containing the device address and other device specific information. Once the Inquiry is successful, the potential master enters the PAGING state and tries to establish a connection with the specified potential slave. Meanwhile, the potential slave has shifted to the PAGE SCAN state. It receives a Paging packet from the potential master and processes the Device Access Code. If appropriate, it returns a response to the master and finally enters the connection state. The Using this scheme, they also proposed the Bluetooth Topology Construction Protocol (BTCP) [6]. BTCP comprise an initial procedure in which a scatternet leader is first elected. The election phase means that BTCP is a synchronous protocol (although devices are allowed to act in a distributed fashion). The election algorithm also requires a strongly connected underlying topology in which each node is in direct communication distance with every other node in the scatternet. After election, the elected leader determines the scatternet topology and instructs other devices on how to form the scatternet. As the resulting topology is not detailed by the protocol, BTCP represent an election protocol more than a complete scatternet formation algorithm. On the contrary, the Bluetree algorithm, proposed by Zaruba et al. [7], assumes that a node knows a-priori whether it is a scatternet leader (or root ) or not. It then uses some distributed spanning tree algorithms to form a hierarchical scatternet tree of master-slave bridges rooted at the scatternet leader. Since the root initiates the scatternet formation while other devices must wait to be paged, the formation algorithm is synchronous. However, unlike BTCP, it does not require a strongly connected underlying topology. Zaruba et al. also proposed to use slave-slave bridges to interconnect different Bluetrees. Wang et al. [8]

3 go one step further and propose a non-hierarchical (however, still synchronous) variation of Bluetrees. Unlike the previous proposals, the LMS algorithm, proposed by Law et al. [9] is an asynchronous approach in which a scatternet is built as nodes join the scatternet tree, and nodes can join anytime. The scatternet formation overhead is kept to a minimum since one node is designated the task to perform INQUIRY or INQUIRY SCAN on behalf of the whole scatternet. However, this scheme requires a strongly connected underlying topology. Tan et al. [2] proposed the Tree Scatternet Formation (TSF) algorithm. A hierarchical scatternet is formed asynchronously as nodes join the tree. Unlike LMS, the algorithm allows for a weakly connected underlying topology of devices. Two trees may combine into one tree as the roots of the trees get within communication range. Neither LMS nor TSF require the aforementioned symmetric link formation proposed by Salonidis et al. [6]. Finally, Engelstad et al. [3] proposed SSF and MSF as non-hierarchical counterparts to TSF. In addition to being asynchronous and accommodating weakly connected underlying topology of devices, these algorithms also obey two design principles targeted at enhancing the efficiency of the resulting scatternet [3, 6, 8]: a. Minimal Piconet Overlap: Two piconets should be connected by at most one bridge node. b. Minimal Bridge Degree: A bridge node should participate in at most two piconets, i.e. each slaveslave bridge is slave of exactly two masters, while each master-slave bridge is slave of exactly one other master or master-slave. Engelstad et al. [3] introduced a role-transition matrix to describe state transitions of asynchronous scatternet formation algorithms that are obeying the two aforementioned design principles. At some point in time every device starts out as a free node. A regular free node F may then encounter and connect to another device. Whether it becomes master (i.e. in role-state M) or slave (i.e. in role-state S) depends on the role of the node it connects to and can be read from the role-transition matrix of the scatternet formation algorithm. When a slave or master connects to a node of another piconet, it may obtain an additional slave-role or master-role and become a bridge between the two piconets. Whether it becomes a masterslave bridge (i.e. in role-state ms) or a slave-slave bridge (i.e. in role-state ss) can also be found from the roletransition matrix. The Maximum Bridge Degree design principle prohibits that a node obtains more than two roles. Thus, the upper part of the role-state diagram depicted in Figure 6 describes how regular nodes participate in scatternet formation [3]. An example of a role-transition matrix is shown in Figure 3. It describes the transitions of the hierarchical TSF algorithm. 'Before' refers to a node's state before interconnection, while 'after' refers to the resulting state. Note that if a node disconnects, on the other hand, the state transition will go in the opposite direction. Figure 3: Role-transition matrix for TSF. A more detailed matrix is provided in [3]. Since MSF, unlike TSF, is not bound to the hierarchical approach, a master is allowed to connect to free nodes, slaves or master-slave bridges, resulting in highly meshed scatternets. The latter connections always produce master-slave bridges, and no slave-slave bridges. The role-transition matrix of MSF is shown in Figure 4. It differs from that of TSF in role-transitions 3, 8, 11, 12, 13 and 23. Figure 4. Role-transition matrix for the MSF algorithm, which generates only ms-bridges. The matrix is simplified by omitting transitions with an ss-bridge in the initial state, since MSF results in scatternets without ssbridges. SSF - in contrast to TSF and MSF - never produces master-slave bridges in role-transitions 2, 6, 8 and 12. This restriction means that unlike in MSF, masters in SSF have no way of connecting to other masters or master-slaves, but may connect to slaves. In this case, the connected master remains a master, while the slave connected to becomes a slave-slave bridge. The role-transition matrix of SSF is shown in Figure 5. Figure 5. Role-transition matrix for the SSF algorithm, which generates only ss-bridges. The matrix has been simplified by omitting transitions with an ms-bridge or an ss-bridge in the initial state. How MSF and SSF are realized by using INQUIRY/INQUIRY-SCAN and PAGE/PAGE-SCAN is outlined in [3]. How TSF is realized is detailed in [2].

4 3. A FRAMEWORK FOR HETEROGENEOUS DEVICES To explore the ability of a scatternet formation algorithm to accommodate heterogeneous devices, we assumed that a predefined share of the devices were of low capabilities, and would only attach to scatternets as slaves. Compared to the framework in [3], we introduced two new roles; Low-capability Free node (lf) and Low-capability Slave (ls). A low-capability device starts out in the Lowcapability Free role-state (lf), while a high-capability computing device, starts out in the regular free role state F. When a Low-capability Free node lf encounters and connects to another node, it can only assume the role of a Low-capability Slave ls. A Low-capability Slave cannot connect to other devices. The lower part of the role-state diagram in Figure 6 illustrates how low-capability devices participate in scatternet formation. Figure 6: Role-state diagram for scatternet formation. (x represents the role of the node connected to, i.e. x {F, M, M', S, ms, ms', ss, lf, ls}. With two new roles, the role transition matrices in Figure 1, 2 and 3 must be expanded with additional transitions. These additional transitions are shown in Figure 7. Figure 7. Expanding the role-transition matrices by adding additional transitions. For simplicity transitions with a Low-capability Slave (ls) or a slave-slave (ss) in the initial state have been omitted. Transition a of Figure 7 means that two Lowcapability Free nodes cannot interconnect because both devices require to become slave of a connection. A Lowcapability Free node lf may, however, connect to a regular high-capability node, and become a slave. Transitions b, c, d and e show that the regular node connected to must become master of the new connection. SSF does not generate master-slave connections, and for this algorithm lf-nodes are thus not allowed to connect to regular slaves (transition c). For MSF and TSF, on the other hand, lfnodes can connect to regular slaves, which become masterslaves after the connection is set up. Hence, with the link formation scheme proposed for SSF and MSF in [3], lf-nodes will always go in INQUIRY- SCAN, and will not alternate between INQUIRY and INQUIRY-SCAN like regular free nodes. 4. SIMULATIONS 4.1. Simulation setup By simulations we placed Bluetooth devices in a 30mby-30m square. For simplicity, a node was allowed to communicate with all other nodes located within 10m. This is represented by arcs in the visibility graph as defined in [4] It was not allowed to communicate with any nodes outside this range. Nodes were placed in an arbitrary position inside the square, and they arrived one by one to a maximum of 40 nodes. Each arriving node was categorized either as a lowcapability node by a pre-determined probability P or as a regular node (by probability 1-P). The arriving node interacted with other nodes and scatternets already formed within the square, while obeying the rules of the scatternet formation algorithm simulated. The resulting scatternet configuration was used as a starting point when the next node arrived in the square. This simulation run was repeated 100 times. Simulations were done using Matlab. Upon the arrival of a node in the square, the arriving node detected and started connecting to an arbitrary of its neighboring nodes in accordance with the scatternet formation algorithm. It continued detecting and connecting to neighbors until it had tried connecting to all of its neighbors Evaluation metrics A number of different evaluation metrics can be used to assess the capability of an algorithm to accommodate heterogeneous devices [3]. Since the purpose of scatternet formation is to ensure connectivity for communication between devices, an overall goal is to maximize connectivity. Connectivity is a particularly significant evaluation parameter with the presence of low-capability devices, because such devices may easily become disconnected (e.g. if there are no masters or master-slaves to connect to). To maximize connectivity, an algorithm should interconnect a given set of nodes into as few disconnected scatternets, N, as possible. It is evident that the theoretical lower limit, N 0,, of the number of disconnected scatternets formed by any algorithm, is found by traversing the visibility graph, as defined in [4], instead of traversing the links formed by the scatternet algorithm. Hence, the connectivity-ratio, r conn, defined as

5 r conn = N/N 0 (1) gives a good measure of the overall connectivity provided by the scatternet formation algorithm. The same simulation configuration was run for all algorithms under study, and the average connectivity ratio was calculated for each algorithm and for each number of nodes in the square. A number of researchers emphasize that a low average shortest path (ASP) of a scatternet indicates an efficient scatternet topology ([3], [8]). The ASP-ratio is defined as the ASP of a scatternet relative to the minimal ASP, ASP 0 : r asp = ASP/ASP 0 (2) devices, a fully meshed slave-slave based algorithm (like SSF) is preferable. The connectivity performance of SSF is comparable with that of MSF for low node densities (i.e. few nodes in Figure 8), and better for higher node densities. (The advantages of a slave-slave-based approach as compared to master-slave based algorithms are explained further in [3].) TSF had considerably worse connectivity ratio than both SSF and MSF, due to the hierarchical nature of TSF. We continued simulating scenarios with non-zero probability P that an arriving node is a low-capability device. Figure 9 and 10 show the result for P =.50 and P =.75, respectively. ASP is found by traversing the links formed by the scatternet algorithm between the nodes only within one disconnected scatternet. ASP 0 is found by traversing the links of the visibility graph between the same set of nodes Simulation Results We performed a number of simulations scenarios, each scenario characterized with a given probability, P, that an arriving node would be a low-capability device. For each scenario, we plotted the connectivity ratio to see how the presence of low-capability devices influences scatternet connectivity. Figure 9. P =.50: With 50% low-capability devices, the slave-slave based approach (SSF) still provides better connectivity than the master-slave based approach (MSF). TSF is hardly capable to accommodate heterogeneous devices due to its hierarchical nature. Figure 8. P = 0: With only homogeneous devices, slave-slave based SSF has better connectivity performance as compared to master-slave-based MSF and TSF. (TSF is worse than MSF, mainly due to the hierarchical tree structure that TSF requires.) First we simulated a scenario with a probability of zero that an arriving node would be a low-capability device. This scenario corresponds to scatternet formation with homogenous Bluetooth devices [3]. Indeed, Figure 8 shows that the connectivity ratio is farther from the theoretical optimal connectivity ratio of one. With no low-capability

6 Figure 10. P =.75: In the extreme case with 75% low-capability devices, the slave-slave based approach (SSF) outperforms the master-slave based approaches (MSF and TSF). With an average 50% share of devices being of low capability (Figure 9), the connectivity of MSF deteriorates faster than that of SFF for low node densities (i.e. for few number of nodes in Figure 9). For higher node densities SSF deteriorates relatively faster than MSF, but not so much that MSF is preferable. In total, SSF performs better than MSF. We also observe that the strictly hierarchical approach, TSF, is hardly capable of accommodating heterogeneous devices, because a device that cannot transform from slave to master-slave will clog the hierarchical formation process. As an extreme scenario, we tested an average share of low-capability devices of 75% (Figure 10). We observed that the performance of the meshed master-slave-based MSF algorithm breaks down, while SSF on the contrary performs surprisingly well. We also found that with heterogeneous devices (P = 50%) there are no significant differences between the average shortest path performances of the three algorithms (Figure 11). Figure 11. P =.50: There are few significant differences between TSF, SSF and MSF with respect to the ASP-ratio. 5. SUMMARY AND CONCLUSIONS To our knowledge no work has yet been published on scatternet formation with respect to heterogeneous devices, although Bluetooth will be incorporated into devices of widely different capabilities. We have therefore developed a framework to investigate scatternet formation with heterogeneous devices, and performed simulations based on this framework. The presence of low-capability devices will influence the scatternet performance. When low-capability devices will only participate as slaves in scatternets, the scatternet formation algorithm must create topologies that easily accommodate connectivity for such devices. This is easily measured by the connectivity ratio [3]. We simulated three proposed algorithms for Bluetooth scatternet formation in different scenarios. Each scenario had a different average share of low-capability devices. TSF had little ability to accommodate low-capability devices, because a low-capability device will clog the hierarchical scatternet formation. The non-hierarchical algorithms, on the other hand, can be highly meshed, and rules to ensure a hierarchical structure are not present. Hence, the non-hierarchical algorithms showed considerably higher ability to accommodate low-capability devices. Of the non-hierarchal algorithms, the slave-slave based scatternet formation scheme, SSF, outperformed the scheme based on master-slave bridges, MSF. With no lowcapability devices, the SSF algorithm was preferable. When we then added low-capability devices to the system, the connectivity of MSF deteriorated faster than that of SFF, and MSF gradually broke down. SSF on the other hand, performed surprisingly well. Hence, out of the three algorithms we studied, the nonhierarchical, fully meshed slave-slave based approach to scatternet formation, SSF, were the only algorithm that was capable of accommodating scatternet formation of heterogeneous devices with acceptable performance. REFERENCES [1] Specification of the Bluetooth System, Bluetooth Special Interest Group document, Dec [2] Tan et al., Forming Scatternets from Bluetooth Personal Area Networks, MIT Technical Report, MIT-LCS-TR-826, October [3] Engelstad et al., Asynchronous formation of non-hierarchical Bluetooth scatternets, to appear in proceedings of 3G Wireless Conference 2003, In Press. [4] Miklos et al., Performance Aspects of Bluetooth Scatternet Formation, MobiHoc 2000, pp , June [5] Johansson et al., Short-range radio based ad-hoc networking: performance and properties. In Proceedings of the IEEE International Conference on Communications 1999, vol. 3, pp , [6] Salonidis et al. Proximity Awareness and Ad Hoc Network Establishment in Bluetooth, Technical Research Report, [7] Zaruba, G.V., Basagni, S., Chlamtac, I., Bluetrees Scatternet Formation to Enable Bluetooth-Based Ad Hoc Networks, In Proceedings of the IEEE International Conference on Communications (ICC) 2001, Helsinki, Finland, June [8] Wang, Z., Thomas, R.J., Haas, Z., Bluenet a New Scatternet Formation Scheme, 35th Hawaii International Conference on System Science (HICSS-35), Big Island Hawaii, January 7-10, [9] Law, C., Mehta, A.K., Sui, K. -Y., Performance of a New Bluetooth Scatternet Formation Protocol, In Proc. of the ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc) 2001, Long Beach, CA, USA, Oct

ASYNCHRONOUS FORMATION OF NON-HIERARCHICAL BLUETOOTH SCATTERNETS

ASYNCHRONOUS FORMATION OF NON-HIERARCHICAL BLUETOOTH SCATTERNETS ASYNCHRONOUS FORMATION OF NON-HIERARCHICAL BLUETOOTH SCATTERNETS Paal Engelstad, Tore E. Jonvik, Do Van Thanh, University of Oslo (UniK) / Telenor R&D, 1331 Fornebu, Norway {Paal.Engelstad, tore-erling.jonvik,

More information

On The Method and Performance Evaluation of A Hybrid Mesh-Tree Topology

On The Method and Performance Evaluation of A Hybrid Mesh-Tree Topology Appl. Math. Inf. Sci. 6. 2S pp. 547S-551S (2012) Applied Mathematics & Information Sciences An International Journal @ 2012 NSP Natural Sciences Publishing Cor. On The Method and Performance Evaluation

More information

A Scatternet Formation Protocol for Ad hoc Networks of Bluetooth Devices

A Scatternet Formation Protocol for Ad hoc Networks of Bluetooth Devices A Scatternet Formation Protocol for Ad hoc Networks of Bluetooth Devices Stefano Basagni Dept. of Electrical and Computer Engineering Northeastern University E-mail: basagni@ece.neu.edu Chiara Petrioli

More information

TPSF+: A New Two-Phase Scatternet Formation Algorithm for Bluetooth Ad Hoc Networks

TPSF+: A New Two-Phase Scatternet Formation Algorithm for Bluetooth Ad Hoc Networks : A New Two-Phase Scatternet Formation Algorithm for Bluetooth Ad Hoc Networks Chu Zhang, Vincent W.S. Wong, and Victor C.M. Leung Department of Electrical and Computer Engineering The University of British

More information

Networks. 1 Introduction

Networks. 1 Introduction Bluetrees-Scatternet Formation to Enable Bluetooth-Based Ad Hoc Networks Gergely V. ZBruba, Stefan0 Basagni, and Imrich Chlamtac Center for Advanced Telecommunications Systems and Services (CATSS) Erik

More information

A New Approach to Efficient Bluetooth Scatternet Formation In Adhoc Wireless Network

A New Approach to Efficient Bluetooth Scatternet Formation In Adhoc Wireless Network A New Approach to Efficient Bluetooth Scatternet Formation In Adhoc Wireless Network Hemali Kotak 1, Hiteishi Diwanji 2 1 A.V.P.T.I. /Comp. Deptt, RAJKOT,INDIA Email: Hemali@yahoo.com 2 L.D. ENGG. College/Comp.

More information

A Routing Protocol and Energy Efficient Techniques in Bluetooth Scatternets

A Routing Protocol and Energy Efficient Techniques in Bluetooth Scatternets A Routing Protocol and Energy Efficient Techniques in Bluetooth Scatternets Balakrishna J. Prabhu and A. Chockalingam Department of Electrical Communication Engineering Indian Institute of Science, Bangalore

More information

A Dynamic and Distributed Scatternet Formation Protocol for Real-life Bluetooth Scatternets

A Dynamic and Distributed Scatternet Formation Protocol for Real-life Bluetooth Scatternets A Dynamic and Distributed Scatternet Formation Protocol for Real-life Bluetooth Scatternets Deepak Jayanna, Gergely V. Záruba Department of Computer Science and Engineering, The University of Texas at

More information

Secured network formation for self-organized personal area network

Secured network formation for self-organized personal area network Secured network formation for self-organized personal area network Leping Huang, 2, Kaoru Sezaki, Hongyuan Chen 2, T.V.L.N Sivakumar 2, Yoshikatsu Nakagawa 2 Institute of Industrial Science, University

More information

BLUETOOTH PAN and external IP networks

BLUETOOTH PAN and external IP networks BLUETOOTH PAN and external IP networks 1 Tore E. ]j1jnvik, 2Paal Engelstad & 2 Do van Thanh 1. Unik - University of Oslo - Norway - tlf: +47 90199176 - torejoen@iji.uio.no 2. Telenor R&D - Norway - tif:

More information

Special Issue on Self-organisation in Mobile Networking

Special Issue on Self-organisation in Mobile Networking EUROPEAN TRANSACTIONS ON TELECOMMUNICATIONS Euro. Trans. Telecomms. 2005; 16:483 493 Published online in Wiley InterScience (www.interscience.wiley.com). DOI: 10.1002/ett.1064 Special Issue on Self-organisation

More information

A self-organising protocol for Bluetooth scatternet formation SUMMARY

A self-organising protocol for Bluetooth scatternet formation SUMMARY 1 1 1 1 1 0 1 0 EUROPEAN TRANSACTIONS ON TELECOMMUNICATIONS Euro. Trans. Telecomms. 00; 1:1 Published online in Wiley InterScience (www.interscience.wiley.com). DOI:.0/ett. A self-organising protocol for

More information

Distributed Self-Healing Bluetooth Scatternet Formation

Distributed Self-Healing Bluetooth Scatternet Formation Distributed Self-Healing Bluetooth Scatternet Formation K. Persson and D. Manivannan Laboratory for Advanced Networking Computer Science Department University of Kentucky Lexington, KY 40506 E-mail: {karl,mani}@cs.uky.edu

More information

Name Resolution in Mobile Ad-hoc Networks

Name Resolution in Mobile Ad-hoc Networks Name Resolution in Mobile Ad-hoc Networks Paal Engelstad, Do Van Thanh, Tore E. Jonvik University of Oslo (UniK) / Telenor R&D, 1331 Fornebu, Norway {Paal.Engelstad, thanh-van.do, tore-erling.jonvik}@telenor.com

More information

A Two-Phase Scatternet Formation Protocol for Bluetooth Wireless Personal Area Networks

A Two-Phase Scatternet Formation Protocol for Bluetooth Wireless Personal Area Networks A Two-hase Scatternet Formation rotocol for luetooth Wireless ersonal Area Networks Yoji Kawamoto 1, Vincent W.S. Wong 2, and Victor C.. Leung 2 1 Network & Software Technology Center, Sony Corporation,

More information

An On-Demand Bluetooth Scatternet Formation Algorithm

An On-Demand Bluetooth Scatternet Formation Algorithm An On-Demand Bluetooth catternet Formation Algorithm Elena Pagani, Gian Paolo Rossi, and tefano Tebaldi Computer cience Dept., Università degli tudi di Milano {pagani,rossi}@dico.unimi.it, tefano.tebaldi@unimi.it

More information

Distributed, Robust and Self-Organizing Bluetooth Scatternet Formation

Distributed, Robust and Self-Organizing Bluetooth Scatternet Formation 1 Distributed, Robust and Self-Organizing Bluetooth Scatternet Formation Navendu Jain Nitin Pabuwal B. N. Jain University of Texas at Austin Amazon Indian Institute of Technology, Delhi nav@cs.utexas.edu

More information

Performance comparison of Bluetooth scatternet formation protocols for multi-hop networks

Performance comparison of Bluetooth scatternet formation protocols for multi-hop networks Wireless Netw (2009) 15:209 226 DOI 10.1007/s11276-007-0036-7 Performance comparison of Bluetooth scatternet formation protocols for multi-hop networks Zhifang Wang Robert J. Thomas Zygmunt J. Haas Published

More information

Time-efficient Algorithms for the Outdegree Limited Bluetooth Scatternet Formation Problem

Time-efficient Algorithms for the Outdegree Limited Bluetooth Scatternet Formation Problem Time-efficient Algorithms for the Outdegree Limited Bluetooth Scatternet Formation Problem Ahmed Jedda, Guy-Vincent Jourdan and Hussein T. Mouftah School of Electrical Engineering and Computer Science

More information

Enabling Secure Ad-hoc Group Collaboration over Bluetooth Scatternets Somil Asthana ( ) Dimitris Kalfonos (

Enabling Secure Ad-hoc Group Collaboration over Bluetooth Scatternets Somil Asthana ( ) Dimitris Kalfonos ( Enabling ecure Ad-hoc Group Collaboration over Bluetooth catternets omil Asthana ( asthana@cse.buffalo.edu ) Dimitris Kalfonos ( dimitris.kalofonos@nokia.com ) Outline Introduction Related Work otivating

More information

Tsung-Chuan Huang* Chu-Sing Yang. Chao-Chieh Huang. Sheng-Wen Bai

Tsung-Chuan Huang* Chu-Sing Yang. Chao-Chieh Huang. Sheng-Wen Bai Int. J. Computational Science and Engineering, Vol. 2, Nos. 1/2, 2006 23 Hierarchical Grown Bluetrees (HGB): an effective topology for Bluetooth scatternets Tsung-Chuan Huang* Department of Electrical

More information

Distributed Topology Construction of Bluetooth Wireless Personal Area Networks

Distributed Topology Construction of Bluetooth Wireless Personal Area Networks 1 Distributed Topology Construction of Bluetooth Wireless Personal Area Networks Theodoros Salonidis, Member, IEEE, Pravin Bhagwat, Leandros Tassiulas, Member, IEEE, and Richard LaMaire Abstract Bluetooth,

More information

Protocol Based on Mobile Agents

Protocol Based on Mobile Agents Bluecouts: A catternet Formation Bluecouts: A catternet Formation ergio González-Valenzuela 1 on T. Vuong 2 Victor C. M. Leung 1 1 Department of Electrical and Computer Engineering 2 Department of Computer

More information

CONSTRUCTION AND EVALUATION OF MESHES BASED ON SHORTEST PATH TREE VS. STEINER TREE FOR MULTICAST ROUTING IN MOBILE AD HOC NETWORKS

CONSTRUCTION AND EVALUATION OF MESHES BASED ON SHORTEST PATH TREE VS. STEINER TREE FOR MULTICAST ROUTING IN MOBILE AD HOC NETWORKS CONSTRUCTION AND EVALUATION OF MESHES BASED ON SHORTEST PATH TREE VS. STEINER TREE FOR MULTICAST ROUTING IN MOBILE AD HOC NETWORKS 1 JAMES SIMS, 2 NATARAJAN MEGHANATHAN 1 Undergrad Student, Department

More information

Comparative Performance Evaluation of Scatternet Formation Protocols for Networks of Bluetooth Devices

Comparative Performance Evaluation of Scatternet Formation Protocols for Networks of Bluetooth Devices Wireless Networks 10, 197 213, 2004 2004 Kluwer Academic Publishers. Manufactured in The Netherlands. Comparative Performance Evaluation of Scatternet Formation Protocols for Networks of Bluetooth Devices

More information

BlueCube: Constructing a hypercube parallel computing and communication environment over Bluetooth radio systems

BlueCube: Constructing a hypercube parallel computing and communication environment over Bluetooth radio systems J. Parallel Distrib. Comput. 66 (2006) 1243 1258 www.elsevier.com/locate/jpdc BlueCube: Constructing a hypercube parallel computing and communication environment over Bluetooth radio systems Chao-Tsun

More information

Service Discovery and Name Resolution Architectures for On-Demand MANETs

Service Discovery and Name Resolution Architectures for On-Demand MANETs Service Discovery and Name Resolution Architectures for On-Demand MANETs Paal Engelstad, Yan Zheng, Tore Jønvik, Do Van Thanh University of Oslo (UniK) / Telenor R&D, 1331 Fornebu, Norway {Paal.Engelstad,

More information

An Energy-Efficient Scatternet Formation Algorithm for Bluetooth-Based Sensor Networks

An Energy-Efficient Scatternet Formation Algorithm for Bluetooth-Based Sensor Networks An Energy-Efficient Scatternet Formation Algorithm for Bluetooth-Based Sensor Networks Sain Saginbekov and Ibrahim Korpeoglu Department of Computer Engineering Bilkent University TR-06800 Ankara, Turkey

More information

MaCC: Supporting Network Formation and Routing in Wireless Personal Area Networks

MaCC: Supporting Network Formation and Routing in Wireless Personal Area Networks MaCC: Supporting Network ormation and Routing in Wireless Personal rea Networks Makoto Takizawa Hiroto ida Masato Saito Graduate School of Media and Governance, Keio University {makoto, haru, masato}@ht.sfc.keio.ac.jp

More information

Sensor Application for Museum Guidance

Sensor Application for Museum Guidance Sensor Application for Museum Guidance Radka Dimitrova a a TU,Dresden, Germany, e-mail: dimitrova@ifn.et.tu-dresden.de Abstract - This article examines the conditions for successful communication and power

More information

An Energy-efficient Multihop Scatternet Formation for Bluetooth Networks

An Energy-efficient Multihop Scatternet Formation for Bluetooth Networks An Energy-efficient Multihop Scatternet Formation for Bluetooth Networks LI XIANG, YANG XIAO ZONG School of Computer Science and Technology Harbin Institute of Technology No.92, West Da-Zhi Street, Harbin,

More information

Distributed Topology Construction of Bluetooth Personal Area Networks

Distributed Topology Construction of Bluetooth Personal Area Networks Distributed Topology Construction of Bluetooth Personal Area Networks Theodoros Salonidis 1, Pravin Bhagwat 2, Leandros Tassiulas 1, and Richard LaMaire 3 thsalon@glue.umd.edu, pravinb@research.att.com,

More information

Guide to Wireless Communications, 3 rd Edition. Objectives

Guide to Wireless Communications, 3 rd Edition. Objectives Guide to Wireless Communications, 3 rd Edition Chapter 5 Wireless Personal Area Networks Objectives Describe a wireless personal area network (WPAN) List the different WPAN standards and their applications

More information

MOBILE COMPUTING. Jan-May,2012. ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala.

MOBILE COMPUTING. Jan-May,2012. ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala. WPAN: Bluetooth MOBILE COMPUTING Jan-May,2012 ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala Email-alakroy.nerist@gmail.com EM Spectrum ISM band 902 928 Mhz 2.4 2.4835 Ghz 5.725 5.85 Ghz LF MF

More information

Locally Optimal Scatternet Topologies for Bluetooth Ad Hoc Networks

Locally Optimal Scatternet Topologies for Bluetooth Ad Hoc Networks Locally Optimal Scatternet Topologies for Bluetooth Ad Hoc Networks Tommaso Melodia, Francesca Cuomo INFOCOM Department, University of Rome La Sapienza Via Eudossiana 18 00184, Rome, ITALY tommaso@net.infocom.uniroma1.it

More information

Novel Cluster Based Routing Protocol in Wireless Sensor Networks

Novel Cluster Based Routing Protocol in Wireless Sensor Networks ISSN (Online): 1694-0784 ISSN (Print): 1694-0814 32 Novel Cluster Based Routing Protocol in Wireless Sensor Networks Bager Zarei 1, Mohammad Zeynali 2 and Vahid Majid Nezhad 3 1 Department of Computer

More information

A New Bluetooth Scatternet Formation Protocol

A New Bluetooth Scatternet Formation Protocol A New Bluetooth Scatternet Formation Protocol Ching Law, Amar K. Mehta, Kai-Yeung Siu Massachusetts Institute of Technology {ching,amar,siu}@list.mit.edu Abstract A Bluetooth ad hoc network can be formed

More information

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks The Impact of Clustering on the Average Path Length in Wireless Sensor Networks Azrina Abd Aziz Y. Ahmet Şekercioğlu Department of Electrical and Computer Systems Engineering, Monash University, Australia

More information

UNIT 5 P.M.Arun Kumar, Assistant Professor, Department of IT, Sri Krishna College of Engineering and Technology, Coimbatore.

UNIT 5 P.M.Arun Kumar, Assistant Professor, Department of IT, Sri Krishna College of Engineering and Technology, Coimbatore. Communication Switching Techniques UNIT 5 P.M.Arun Kumar, Assistant Professor, Department of IT, Sri Krishna College of Engineering and Technology, Coimbatore. Bluetooth Techniques References 1. Wireless

More information

Heuristic Clustering Algorithms in Ad hoc Networks

Heuristic Clustering Algorithms in Ad hoc Networks Heuristic Clustering Algorithms in Ad hoc Networks Artvin Çoruh University e-mail: nevin.aydin@gmail.com Volume 3 No 3 (2014) ISSN 2158-8708 (online) DOI 10.5195/emaj.2014.39 http://emaj.pitt.edu Abstract

More information

Mobile Message Passing using a Scatternet Framework

Mobile Message Passing using a Scatternet Framework International Journal of Computers, Communications & Control Vol. III (2008), No. 1, pp. 51-59 Mobile Message Passing using a Scatternet Framework Brendan J. Donegan, Daniel C. Doolan, Sabin Tabirca Abstract:

More information

Bluetooth Information Exchange Network

Bluetooth Information Exchange Network Bluetooth Information Exchange Network Xiaoning (Linda) Liu A thesis submitted to AUT University In partial fulfilment of the requirements for the degree of Master of Engineering (ME) October 2008 School

More information

Analysis of Multiple Trees on Path Discovery for Beacon-Based Routing Protocols

Analysis of Multiple Trees on Path Discovery for Beacon-Based Routing Protocols Analysis of Multiple Trees on Path Discovery for Beacon-Based Routing Protocols Baruch Awerbuch, David Holmer and Herbert Rubens Johns Hopkins University Department of Computer Science Baltimore, MD, USA

More information

The Problem of Bluetooth Pollution and Accelerating Connectivity in Bluetooth Ad-Hoc Networks

The Problem of Bluetooth Pollution and Accelerating Connectivity in Bluetooth Ad-Hoc Networks The Problem of Bluetooth Pollution and Accelerating Connectivity in Bluetooth Ad-Hoc Networks Somil Asthana Department of Computer Science State University of New York Buffalo, NY 14226 asthana@cse.buffalo.edu

More information

e-pg Pathshala Quadrant 1 e-text

e-pg Pathshala Quadrant 1 e-text e-pg Pathshala Subject : Computer Science Module: Bluetooth Paper: Computer Networks Module No: CS/CN/37 Quadrant 1 e-text In our journey on networks, we are now exploring wireless networks. We looked

More information

Heterogeneous Community-based Routing in Opportunistic Mobile Social Networks

Heterogeneous Community-based Routing in Opportunistic Mobile Social Networks Heterogeneous Community-based Routing in Opportunistic Mobile Social Networks Yunsheng Wang Kettering University Jie Wu Temple University Mingjun Xiao University of Science and Tech. of China Daqiang Zhang

More information

IN a mobile ad hoc network, nodes move arbitrarily.

IN a mobile ad hoc network, nodes move arbitrarily. IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 5, NO. 6, JUNE 2006 609 Distributed Cache Updating for the Dynamic Source Routing Protocol Xin Yu Abstract On-demand routing protocols use route caches to make

More information

An Effective Solution for Bluetooth Adhoc Networking

An Effective Solution for Bluetooth Adhoc Networking An Effective Solution for Bluetooth Adhoc Networking by Sijun Jia A THESIS SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF Master of Science in THE FACULTY OF GRADUATE STUDIES (Computer

More information

Multi-Tier Mobile Ad Hoc Routing

Multi-Tier Mobile Ad Hoc Routing Multi-Tier Mobile Ad Hoc Routing Bo Ryu Tim Andersen Tamer Elbatt Network Analysis and Systems Dept. HRL Laboratories, LLC. Malibu, CA, USA. {ryu,cellotim,telbatt}@wins.hrl.com Abstract We present a new

More information

101seminartopics.com. Bluetooth Based Smart Sensor Networks

101seminartopics.com. Bluetooth Based Smart Sensor Networks Bluetooth Based Smart Sensor Networks ABSTRACT Dragging the world towards wireless galaxy Various sensors are already in a broad use today as part of different devices or as standalone devices connected

More information

Adaptive Data Dissemination in Mobile ad-hoc Networks

Adaptive Data Dissemination in Mobile ad-hoc Networks Adaptive Data Dissemination in Mobile ad-hoc Networks Joos-Hendrik Böse, Frank Bregulla, Katharina Hahn, Manuel Scholz Freie Universität Berlin, Institute of Computer Science, Takustr. 9, 14195 Berlin

More information

Evaluating the Performance of Mobile Agent-Based Message Communication among Mobile Hosts in Large Ad Hoc Wireless Network

Evaluating the Performance of Mobile Agent-Based Message Communication among Mobile Hosts in Large Ad Hoc Wireless Network Evaluating the Performance of Mobile Agent-Based Communication among Mobile Hosts in Large Ad Hoc Wireless Network S. Bandyopadhyay Krishna Paul PricewaterhouseCoopers Limited Techna Digital Systems Sector

More information

Evaluation of Service Discovery Architectures for Mobile Ad Hoc Networks

Evaluation of Service Discovery Architectures for Mobile Ad Hoc Networks Evaluation of Service Discovery Architectures for Mobile Ad Hoc Networks P. E. Engelstad University of Oslo / Telenor R&D, Norway paal.engelstad@telenor.com Abstract Discovery of services and other named

More information

Capacity Assignment in Bluetooth Scatternets Optimal and Heuristic Algorithms

Capacity Assignment in Bluetooth Scatternets Optimal and Heuristic Algorithms Capacity Assignment in Bluetooth Scatternets Optimal and Heuristic Algorithms Gil Zussman and Adrian Segall Department of Electrical Engineering Technion Israel Institute of Technology Haifa 32000, Israel

More information

Embedded Systems. 8. Communication

Embedded Systems. 8. Communication Embedded Systems 8. Communication Lothar Thiele 8-1 Contents of Course 1. Embedded Systems Introduction 2. Software Introduction 7. System Components 10. Models 3. Real-Time Models 4. Periodic/Aperiodic

More information

An Empirical Study of Performance Benefits of Network Coding in Multihop Wireless Networks

An Empirical Study of Performance Benefits of Network Coding in Multihop Wireless Networks An Empirical Study of Performance Benefits of Network Coding in Multihop Wireless Networks Dimitrios Koutsonikolas, Y. Charlie Hu, Chih-Chun Wang School of Electrical and Computer Engineering, Purdue University,

More information

Distributed minimum spanning tree problem

Distributed minimum spanning tree problem Distributed minimum spanning tree problem Juho-Kustaa Kangas 24th November 2012 Abstract Given a connected weighted undirected graph, the minimum spanning tree problem asks for a spanning subtree with

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL 2.1 Topology Control in Wireless Sensor Networks Network topology control is about management of network topology to support network-wide requirement.

More information

Computer Networks II Advanced Features (T )

Computer Networks II Advanced Features (T ) Computer Networks II Advanced Features (T-110.5111) Bluetooth, PhD Assistant Professor DCS Research Group Based on slides previously done by Matti Siekkinen, reused with permission For classroom use only,

More information

forward packets do not forward packets

forward packets do not forward packets Power-aware Routing in Wireless Packet Networks Javier Gomez, Andrew T. Campbell Dept. of Electrical Engineering Columbia University, N 10027, USA Mahmoud Naghshineh, Chatschik Bisdikian IBM T.J. Watson

More information

ANewRoutingProtocolinAdHocNetworks with Unidirectional Links

ANewRoutingProtocolinAdHocNetworks with Unidirectional Links ANewRoutingProtocolinAdHocNetworks with Unidirectional Links Deepesh Man Shrestha and Young-Bae Ko Graduate School of Information & Communication, Ajou University, South Korea {deepesh, youngko}@ajou.ac.kr

More information

Communication Networks I December 4, 2001 Agenda Graph theory notation Trees Shortest path algorithms Distributed, asynchronous algorithms Page 1

Communication Networks I December 4, 2001 Agenda Graph theory notation Trees Shortest path algorithms Distributed, asynchronous algorithms Page 1 Communication Networks I December, Agenda Graph theory notation Trees Shortest path algorithms Distributed, asynchronous algorithms Page Communication Networks I December, Notation G = (V,E) denotes a

More information

AMRIS: A Multicast Protocol for Ad hoc Wireless Networks

AMRIS: A Multicast Protocol for Ad hoc Wireless Networks of AMRIS: A Multicast Protocol for Ad hoc Wireless Networks C.W. Wu, Y.C. Tay National University of Singapore wuchunwei@alum.comp.nus.edu.sg,tay@acm.org Abstract This paper introduces AMRIS, a new multicast

More information

Comparison of proposed path selection protocols for IEEE s WLAN mesh networks

Comparison of proposed path selection protocols for IEEE s WLAN mesh networks Comparison of proposed path selection protocols for IEEE 802.11s WLAN mesh networks Sana Ghannay, Sonia Mettali Gammar and Farouk Kamoun CRISTAL lab, National School of Computer Sciences, ENSI, 2010, Manouba

More information

IT is widely anticipated that fourth-generation wireless

IT is widely anticipated that fourth-generation wireless IEEE TRANSACTIONS ON COMPUTERS, VOL. 52, NO. 6, JUNE 2003 779 Configuring BlueStars: Multihop Scatternet Formation for Bluetooth Networks Chiara Petrioli, Member, IEEE, Stefano Basagni, Member, IEEE, and

More information

Draft Notes 1 : Scaling in Ad hoc Routing Protocols

Draft Notes 1 : Scaling in Ad hoc Routing Protocols Draft Notes 1 : Scaling in Ad hoc Routing Protocols Timothy X Brown University of Colorado April 2, 2008 2 Introduction What is the best network wireless network routing protocol? This question is a function

More information

Wireless Sensor Networks

Wireless Sensor Networks Wireless Sensor Networks 11th Lecture 29.11.2006 Christian Schindelhauer schindel@informatik.uni-freiburg.de 1 Bluetooth in WSN? There are several commercially available MAC protocol/products Wi-Fi Bluetooth

More information

Amarjeet Singh. February 7, 2012

Amarjeet Singh. February 7, 2012 Amarjeet Singh February 7, 2012 References Bluetooth Protocol Architecture v.1 www.bluetooth.org http://www.tutorial-reports.com/wireless/bluetooth/ Slides from last class uploaded on the course website

More information

Forming Connected Topologies in Bluetooth Adhoc Networks An Algorithmic Perspective

Forming Connected Topologies in Bluetooth Adhoc Networks An Algorithmic Perspective University of Pennsylvania ScholarlyCommons Departmental Papers (ESE) Department of Electrical & Systems Engineering August 2003 Forming Connected Topologies in Bluetooth Adhoc Networks An Algorithmic

More information

Routing protocols in WSN

Routing protocols in WSN Routing protocols in WSN 1.1 WSN Routing Scheme Data collected by sensor nodes in a WSN is typically propagated toward a base station (gateway) that links the WSN with other networks where the data can

More information

Interference Mitigation Technique for Performance Enhancement in Coexisting Bluetooth and WLAN

Interference Mitigation Technique for Performance Enhancement in Coexisting Bluetooth and WLAN 2012 International Conference on Information and Computer Networks (ICICN 2012) IPCSIT vol. 27 (2012) (2012) IACSIT Press, Singapore Interference Mitigation Technique for Performance Enhancement in Coexisting

More information

SERVICE DISCOVERY IN MOBILE PEER-TO-PEER ENVIRONMENT

SERVICE DISCOVERY IN MOBILE PEER-TO-PEER ENVIRONMENT SERVICE DISCOVERY IN MOBILE PEER-TO-PEER ENVIRONMENT Arto Hämäläinen Lappeenranta University of Technology P.O. Box 20, 53851 Lappeenranta, Finland arto.hamalainen@lut.fi Jari Porras Lappeenranta University

More information

Link Repairing for Inter-Piconet Communication Technique in Bluetooth Scatternet

Link Repairing for Inter-Piconet Communication Technique in Bluetooth Scatternet Link Repairing for Inter-Piconet Communication Technique in Bluetooth Scatternet Sabeen Tahir, Abas Md Said, and Sheikh Tahir Bakhsh Abstract A mobile ad-hoc network (MANET) is a collection of wireless

More information

Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks

Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks Mehdi Jalili, Islamic Azad University, Shabestar Branch, Shabestar, Iran mehdijalili2000@gmail.com Mohammad Ali

More information

Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks

Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks Mina Malekzadeh Golestan University Zohre Fereidooni Golestan University M.H. Shahrokh Abadi

More information

End-To-End Delay Optimization in Wireless Sensor Network (WSN)

End-To-End Delay Optimization in Wireless Sensor Network (WSN) Shweta K. Kanhere 1, Mahesh Goudar 2, Vijay M. Wadhai 3 1,2 Dept. of Electronics Engineering Maharashtra Academy of Engineering, Alandi (D), Pune, India 3 MITCOE Pune, India E-mail: shweta.kanhere@gmail.com,

More information

Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks

Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks Fatiha Djemili Tolba University of Haute Alsace GRTC Colmar, France fatiha.tolba@uha.fr Damien Magoni University

More information

Full file at

Full file at Guide to Networking Essentials, Fifth Edition 2-1 Chapter 2 Network Design Essentials At a Glance Instructor s Manual Table of Contents Overview Objectives s Quick Quizzes Class Discussion Topics Additional

More information

Introduction to Wireless Networking ECE 401WN Spring 2009

Introduction to Wireless Networking ECE 401WN Spring 2009 I. Overview of Bluetooth Introduction to Wireless Networking ECE 401WN Spring 2009 Lecture 6: Bluetooth and IEEE 802.15 Chapter 15 Bluetooth and IEEE 802.15 What is Bluetooth? An always-on, short-range

More information

A Dynamic Slot Assignment Scheme for Slave-to-Slave and Multicast-like Communication in Bluetooth Personal Area Networks

A Dynamic Slot Assignment Scheme for Slave-to-Slave and Multicast-like Communication in Bluetooth Personal Area Networks A Dynamic Slot Assignment Scheme for Slave-to-Slave and Multicast-like Communication in Bluetooth Personal Area Networks Carlos Cordeiro, Sachin Abhyankar, and Dharma P. Agrawal OBR Center for Distributed

More information

Introduction to Mobile Ad hoc Networks (MANETs)

Introduction to Mobile Ad hoc Networks (MANETs) Introduction to Mobile Ad hoc Networks (MANETs) 1 Overview of Ad hoc Network Communication between various devices makes it possible to provide unique and innovative services. Although this inter-device

More information

Bluetooth ACL Packet Selection Via Maximizing the Expected Throughput Efficiency of ARQ Protocol

Bluetooth ACL Packet Selection Via Maximizing the Expected Throughput Efficiency of ARQ Protocol Bluetooth ACL Packet Selection Via aximizing the Expected Throughput Efficiency of AQ Protocol Xiang Li 1,2,*, an-tian Li 1, Zhen-Guo Gao 2, and Li-Ning Sun 1 1 obot esearch Institute, Harbin Institute

More information

12/2/09. Mobile and Ubiquitous Computing. Bluetooth Networking" George Roussos! Bluetooth Overview"

12/2/09. Mobile and Ubiquitous Computing. Bluetooth Networking George Roussos! Bluetooth Overview Mobile and Ubiquitous Computing Bluetooth Networking" George Roussos! g.roussos@dcs.bbk.ac.uk! Bluetooth Overview" A cable replacement technology! Operates in the unlicensed ISM band at 2.4 GHz! Frequency

More information

Bluetooth: Short-range Wireless Communication

Bluetooth: Short-range Wireless Communication Bluetooth: Short-range Wireless Communication Wide variety of handheld devices Smartphone, palmtop, laptop Need compatible data communication interface Complicated cable/config. problem Short range wireless

More information

Investigating Race Conditions in Multi-Homed On Demand Ad Hoc Networks

Investigating Race Conditions in Multi-Homed On Demand Ad Hoc Networks Investigating Race Conditions in Multi-Homed On Demand Ad Hoc Networks Paal Engelstad, Geir Egeland, Do Van Thanh University of Oslo (UniK) / Telenor R&D, 1331 Fornebu, Norway {Paal.Engelstad, Geir.Egeland,

More information

Lecture Computer Networks

Lecture Computer Networks Prof. Dr. H. P. Großmann mit M. Rabel sowie H. Hutschenreiter und T. Nau Sommersemester 2012 Institut für Organisation und Management von Informationssystemen Lecture Computer Networks Networks for Multimedia

More information

An Industrial Employee Development Application Protocol Using Wireless Sensor Networks

An Industrial Employee Development Application Protocol Using Wireless Sensor Networks RESEARCH ARTICLE An Industrial Employee Development Application Protocol Using Wireless Sensor Networks 1 N.Roja Ramani, 2 A.Stenila 1,2 Asst.professor, Dept.of.Computer Application, Annai Vailankanni

More information

Forming Scatternets from Bluetooth Personal Area Networks

Forming Scatternets from Bluetooth Personal Area Networks MIT-LCS-TR-826, OCTOBER 21 1 Forming Scatternets from Bluetooth Personal Area Networks Godfrey Tan, Allen Miu, John Guttag and Hari Balakrishnan MIT Laboratory for Computer Science Abstract There is increasing

More information

Energy-Efficient Forwarding Strategies for Geographic Routing in Lossy Wireless Sensor Networks

Energy-Efficient Forwarding Strategies for Geographic Routing in Lossy Wireless Sensor Networks Energy-Efficient Forwarding Strategies for Geographic Routing in Lossy Wireless Sensor Networks K. Seada, M.Zuniga, A. Helmy and B. Krishnamachari Department of Electrical Engineering University of Southern

More information

Bluetooth Scatternet Formation for Single-hop Ad Hoc Networks Based on Virtual Positions

Bluetooth Scatternet Formation for Single-hop Ad Hoc Networks Based on Virtual Positions Bluetooth Scatternet Formation for Single-hop Ad Hoc Networks Based on Virtual Positions Yu Wang Dept. of Computer Science Illinois Institute of Technology Chicago, USA wangyu1@iit.edu Ivan Stojmenovic

More information

Accurate Time Synchronization for IEEE Based Wireless Networks

Accurate Time Synchronization for IEEE Based Wireless Networks Accurate Time Synchronization for IEEE 802.11-Based Wireless Networks Jui-Hao Chiang Advised by Prof. Tzi-cker Chiueh Stony Brook University, USA ICNP 2009 Outline Motivation IEEE 802.11 TSF Clock-Jumping

More information

Multiple-Metric Hybrid Routing Protocol for Heterogeneous Wireless Access Networks

Multiple-Metric Hybrid Routing Protocol for Heterogeneous Wireless Access Networks Multiple-Metric Hybrid Routing Protocol for Heterogeneous Wireless Access Networks Lijuan Cao Kashif Sharif Yu Wang Teresa Dahlberg Department of Computer Science, University of North Carolina at Charlotte,

More information

IMPACT OF LEADER SELECTION STRATEGIES ON THE PEGASIS DATA GATHERING PROTOCOL FOR WIRELESS SENSOR NETWORKS

IMPACT OF LEADER SELECTION STRATEGIES ON THE PEGASIS DATA GATHERING PROTOCOL FOR WIRELESS SENSOR NETWORKS IMPACT OF LEADER SELECTION STRATEGIES ON THE PEGASIS DATA GATHERING PROTOCOL FOR WIRELESS SENSOR NETWORKS Indu Shukla, Natarajan Meghanathan Jackson State University, Jackson MS, USA indu.shukla@jsums.edu,

More information

Polling in Bluetooth a Simplified Best Effort Case

Polling in Bluetooth a Simplified Best Effort Case Polling in Bluetooth a Simplified Best Effort Case Rachid Ait Yaiz University of Twente (Computer Science, TSS Group) Geert Heijenk University of Twente and Ericsson EuroLab Netherlands {yaiz,heijenk}@cs.utwente.nl

More information

A PROTOCOL SUITE FOR WIRELESS PERSONAL AREA NETWORKS

A PROTOCOL SUITE FOR WIRELESS PERSONAL AREA NETWORKS University of Kentucky UKnowledge University of Kentucky Doctoral Dissertations Graduate School 2009 A PROTOCOL SUITE FOR WIRELESS PERSONAL AREA NETWORKS Karl E. Persson University of Kentucky, karl@cs.uky.edu

More information

Performance Of OLSR Routing Protocol Under Different Route Refresh Intervals In Ad Hoc Networks

Performance Of OLSR Routing Protocol Under Different Route Refresh Intervals In Ad Hoc Networks Performance Of OLSR Routing Protocol Under Different Route Refresh Intervals In Ad Hoc Networks P.Suganthi Research Scholar Mother Teresa Women s University Kodaikanal, TamilNadu, India Dr.A.Tamilarasi

More information

BGN: A novel scatternet formation algorithm for bluetooth-based sensor networks

BGN: A novel scatternet formation algorithm for bluetooth-based sensor networks Mobile Information Systems 7 (2011) 93 106 93 DOI 10.3233/MIS-2011-0112 IOS Press BGN: A novel scatternet formation algorithm for bluetooth-based sensor networks Yongjun Li a, Hu Chen a, Rong Xie a and

More information

Delay Analysis of ML-MAC Algorithm For Wireless Sensor Networks

Delay Analysis of ML-MAC Algorithm For Wireless Sensor Networks Delay Analysis of ML-MAC Algorithm For Wireless Sensor Networks Madhusmita Nandi School of Electronics Engineering, KIIT University Bhubaneswar-751024, Odisha, India ABSTRACT The present work is to evaluate

More information

Time Synchronization of Cognitive Radio Networks

Time Synchronization of Cognitive Radio Networks Time Synchronization of Cognitive Radio Networks Jari Nieminen, Riku Jäntti Department of Communications and Networking Helsinki University of Technology, Finland {jari.nieminen, riku.jantti}@tkk.fi Lijun

More information