654 results on '"Piconet"'
Search Results
2. WPANs Technologies Beginning
- Author
-
A. M. El-Bendary, Mohsen and A. M. El-Bendary, Mohsen
- Published
- 2018
- Full Text
- View/download PDF
3. IMPLEMENTED TO BLUETOOTH CONNECTIONS - FIXED SITUATION
- Author
-
Nirmla Sharma
- Subjects
Bluetooth ,Connection ,Piconet ,techniques and Wireless networks ,Computer engineering. Computer hardware ,TK7885-7895 ,Information technology ,T58.5-58.64 - Abstract
Bluetooth has basically complete requirement for short collection wireless transportations consuming unrestricted manufacturing, technical, medicinal (ISM) 2.4GHz wireless group. Bluetooth works on seventy-nine frequencies in 2.4GHz group by 1MHz transporter arrangement. Individually scheme completes occurrence skipping with 1600 hops/s in Pseudo Random method. Bluetooth relates Frequency Hopping Systems (FHSS) used for intervention modification Frequency Hopping Code Division Multiple Access (FH-CDMA for departure of systems). Additional feature is described in this paper around Bluetooth's radio layer. An actual significant term in setting of Bluetooth has Piconet. A Piconet has gathering of Bluetooth strategies which were corresponding to similar skipping arrangement. Bluetooth connections are implemented by different techniques. These techniques are using to wireless networks.
- Published
- 2018
- Full Text
- View/download PDF
4. Intelligent Agent-Based Assessment of a Resilient Multi-hop Routing Protocol for Dynamic WSN.
- Author
-
Mateo Sanguino, Tomás de J., Navarro Lozano, Eduardo, and Sánchez Alcántara, Manuel
- Subjects
WIRELESS sensor networks ,ROUTING algorithms ,INTELLIGENT agents ,ENVIRONMENTAL monitoring ,COMMUNICATIONS software ,KEY performance indicators (Management) - Abstract
Wireless sensor networks (WSN) constitute a current field of interest in which the major concerns are related to mobility, spatial distribution, connectivity and dynamic creation of networks between autonomous nodes for cooperative detection and data transfer in diverse areas (e.g., healthcare, environmental or industrial monitoring). To this end, the present work describes the theoretical and practical development of a communication protocol for WSNs based on Bluetooth. The interaction between mobile nodes is performed with a multi-hop scheme in response to traffic needs without requiring a scatternet formation procedure. The interest of this algorithm—based on the concept of routing vector—is that it was designed to withstand changes in the node distribution for high-mobility scenarios, thus allowing the implementation of a robust data routing in low-resource microcontrolled devices with no operability loss. As the main contribution, we present the hardware and software implementation of the communication protocol in real devices along several case studies. With this aim, a long-term experimentation in a dense scenario has been carried out through an intelligent agent-based approach to formally validate the protocol considering three different performance metrics: packet delivery ratio, feedback overhead and round-trip time. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
5. Application of Wireless Personal Area Networks to a Ship Area Piconet
- Author
-
Jeon, Dong-Keun, Lee, Yeonwoo, Kim, Kyung-Ho, Kim, Kuinam J., editor, and Wattanapongsakorn, Naruemon, editor
- Published
- 2015
- Full Text
- View/download PDF
6. Implementation of Scatternet in an Intelligent IoT Gateway
- Author
-
Mohan, Lakshmi, Jinesh, M. K., Bipin, K., Harikrishnan, P., Sathyadevan, Shiju, Kacprzyk, Janusz, Series editor, Satapathy, Suresh Chandra, editor, Govardhan, A., editor, Raju, K. Srujan, editor, and Mandal, J. K., editor
- Published
- 2015
- Full Text
- View/download PDF
7. A Power Management Scheme with SDMA for WPANs
- Author
-
Wang, Neng-Chung, Hsu, Chun-Ching, Wen, Chih-Cheng, Juang, Jengnan, editor, Chen, Cheng-Yi, editor, and Yang, Cheng-Fu, editor
- Published
- 2014
- Full Text
- View/download PDF
8. An Approach of Making Telephony in a Local Wireless Environment: Application to Bluetooth Technology
- Author
-
Guy Gaspard, Nono Louenkam, Ndié, Thomas Djotio, Akan, Ozgur, Series editor, Bellavista, Paolo, Series editor, Cao, Jiannong, Series editor, Dressler, Falko, Series editor, Ferrari, Domenico, Series editor, Gerla, Mario, Series editor, Kobayashi, Hisashi, Series editor, Palazzo, Sergio, Series editor, Sahni, Sartaj, Series editor, Shen, Xuemin (Sherman), Series editor, Stan, Mircea, Series editor, Xiaohua, Jia, Series editor, Zomaya, Albert, Series editor, Coulson, Geoffrey, Series editor, Jonas, Karl, editor, Rai, Idris A., editor, and Tchuente, Maurice, editor
- Published
- 2013
- Full Text
- View/download PDF
9. Design and Implement Privet Chatting Over Bluetooth for Wide Area
- Author
-
Karzan H. shareef, Aysar A. Abdulrahman, and Ahmed F. Fadhil
- Subjects
bluetooth ,piconet ,scatternet ,netbeans ,Science - Abstract
The mobile applications have become one of the important applications in human life, and it was widely used during the last ten years. Mobile devices can be used to do various tasks, such as browsing the internet, sending or receiving emails, and performing other tasks. Bluetooth technology is considered as one of the important specifications that were added to mobile phones during the current century where the user can use it for data and image transmission and others. One of the important applications of Bluetooth, which appeared in the last years, is the conversation via Bluetooth where users can hold short conversations using this technique. One of the most important benefits of Bluetooth technology is that it's free to send and receive messages. While the disadvantages of this application is that it is short-term, since users must be within the scope of the Bluetooth service which is (7 - 9 meters) to be able to send messages and use it. In this paper, we will design and implement a private conversation via Bluetooth software which has the ability to work within biggest scopeby taking advantage of the properties of the (Scatternet). Each user of the application can be a crossroads for the other users. In other words, if there is, for example, users (a) and (b) 7 meters away from each other, and a third user (c) appeared within 12 meters of the first user (a). In this case, the third user (c) can be connected to the first user through the user (b). In other words, the second user (b) would be an intermediary between the first user (a) and the third user (c). So, we have been solved the distance limit problem for using the Bluetooth application. In addition, the users are now able to chat as a group (not just peer-to-peer) in a private room with a wide range using the piconet and scatternet characteristics. Netbeans 5.5, Java 2 Micro Edition (J2ME), Bluetooth API (JSR-82), Nokia Pc Suites are the tools and technologies that have been used through building this application.
- Published
- 2016
- Full Text
- View/download PDF
10. A Servey on Bluetooth Scatternet Formation
- Author
-
Singh, Pratibha, Agrawal, Sonu, Wyld, David C., editor, Wozniak, Michal, editor, Chaki, Nabendu, editor, Meghanathan, Natarajan, editor, and Nagamalai, Dhinaharan, editor
- Published
- 2011
- Full Text
- View/download PDF
11. Topology Control and Routing in Ad Hoc Networks
- Author
-
Carr-Motyckova, Lenka, Navarra, Alfredo, Johansson, Tomas, Unger, Walter, Koster, Arie, editor, and Muñoz, Xavier, editor
- Published
- 2010
- Full Text
- View/download PDF
12. Wireless Bluetooth Communications Combine with Secure Data Transmission Using ECDH and Conference Key Agreements
- Author
-
Lin, Hua-Yi, Chiang, Tzu-Chiang, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Doug, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Hsu, Ching-Hsien, editor, Yang, Laurence T., editor, Park, Jong Hyuk, editor, and Yeo, Sang-Soo, editor
- Published
- 2010
- Full Text
- View/download PDF
13. IMPLEMENTED TO BLUETOOTH CONNECTIONS - FIXED SITUATION.
- Author
-
Sharma, Nirmla
- Subjects
BLUETOOTH technology ,CODE division multiple access - Abstract
Bluetooth has basically complete requirement for short collection wireless transportations consuming unrestricted manufacturing, technical, medicinal (ISM) 2.4GHz wireless group. Bluetooth works on seventy-nine frequencies in 2.4GHz group by 1MHz transporter arrangement. Individually scheme completes occurrence skipping with 1600 hops/s in Pseudo Random method. Bluetooth relates Frequency Hopping Systems (FHSS) used for intervention modification Frequency Hopping Code Division Multiple Access (FH-CDMA for departure of systems). Additional feature is described in this paper around Bluetooth's radio layer. An actual significant term in setting of Bluetooth has Piconet. A Piconet has gathering of Bluetooth strategies which were corresponding to similar skipping arrangement. Bluetooth connections are implemented by different techniques. These techniques are using to wireless networks. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
14. Hybrid Bluetooth Scatternet Routing
- Author
-
Persson, Karl E., Manivannan, D., Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Nierstrasz, Oscar, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Sudan, Madhu, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Vardi, Moshe Y., Series editor, Weikum, Gerhard, Series editor, Zhang, Daqing, editor, Portmann, Marius, editor, Tan, Ah-Hwee, editor, and Indulska, Jadwiga, editor
- Published
- 2009
- Full Text
- View/download PDF
15. Bluetooth ACL Packet Selection Via Maximizing the Expected Throughput Efficiency of ARQ Protocol
- Author
-
Li, Xiang, Li, Man-Tian, Gao, Zhen-Guo, Sun, Li-Ning, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Doug, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Bubak, Marian, editor, van Albada, Geert Dick, editor, Dongarra, Jack, editor, and Sloot, Peter M. A., editor
- Published
- 2008
- Full Text
- View/download PDF
16. RNG-Based Scatternet Formation Algorithm for Small-Scale Ad-Hoc Networks
- Author
-
Cho, Chungho, Kim, Gwanghyun, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Rangan, C. Pandu, editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Doug, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Okadome, Takeshi, editor, Yamazaki, Tatsuya, editor, and Makhtari, Mounir, editor
- Published
- 2007
- Full Text
- View/download PDF
17. Reducing Inter-piconet Delay for Large-Scale Bluetooth Scatternets
- Author
-
Yu, Chang Wu, Yu, Kun-Ming, Lin, Shu Ling, Carbonell, Jaime G., editor, Siekmann, J\'org, editor, Washio, Takashi, editor, Zhou, Zhi-Hua, editor, Huang, Joshua Zhexue, editor, Hu, Xiaohua, editor, Li, Jinyan, editor, Xie, Chao, editor, He, Jieyue, editor, Zou, Deqing, editor, Li, Kuan-Ching, editor, and Freire, Mário M., editor
- Published
- 2007
- Full Text
- View/download PDF
18. Energy Efficient PNC Selection Procedure for the IEEE 802.15.3-Based HR-WPAN
- Author
-
Choi, EunChang, Huh, JaeDoo, Kim, Soo-Joong, Choi, WoongChul, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Dough, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Zhou, Xiaobo, editor, Sokolsky, Oleg, editor, Yan, Lu, editor, Jung, Eun-Sun, editor, Shao, Zili, editor, Mu, Yi, editor, Lee, Dong Chun, editor, Kim, Dae Young, editor, Jeong, Young-Sik, editor, and Xu, Cheng-Zhong, editor
- Published
- 2006
- Full Text
- View/download PDF
19. Automatic Gateway Selection in Bluetooth Scatternet
- Author
-
Shin, Jin-Wook, Yoon, Sook, Chang, Jin-Young, Park, Dong-Sun, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Dough, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Yang, Laurence T., editor, Guo, Minyi, editor, Gao, Guang R., editor, and Jha, Niraj K., editor
- Published
- 2004
- Full Text
- View/download PDF
20. Introduction to Wireless Local Area Networks
- Author
-
Kiang, Jean-Fu and Kiang, Jean-Fu
- Published
- 2004
- Full Text
- View/download PDF
21. Differentiated Service Support in Wireless Networks With Multibeam Antennas
- Author
-
L. Rajya Lakshmi and Biplab Sikdar
- Subjects
Computer science ,Wireless network ,Heuristic (computer science) ,business.industry ,Wireless ad hoc network ,Node (networking) ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,05 social sciences ,Local area network ,050801 communication & media studies ,020206 networking & telecommunications ,Throughput ,02 engineering and technology ,Differentiated service ,0508 media and communications ,Piconet ,0202 electrical engineering, electronic engineering, information engineering ,Electrical and Electronic Engineering ,business ,Computer network - Abstract
Multibeam antenna arrays (MBAAs) have the capability to improve the capacity of a wireless network by facilitating simultaneous transmissions to multiple users. However, in practical deployments of wireless personal or local area networks (WPANs/WLANs) where piconet coordinators or access points (PNCs/APs) are deployed with MBAAs, it is quite likely to observe non-uniform node densities in various regions. To optimally utilize MBAAs in such scenarios, concurrent transmission scheduling in WPANs/WLANs is formulated as a multi-objective optimization problem. Then, a practical heuristic transmission scheduler that aims to maximize the number of concurrent communications by dynamically configuring the directions of beams is proposed. In addition, a service tag based fair scheduler is also proposed to achieve weighted fairness in WPANs/WLANs with MBAAs. Our results show that the performance improvements provided by the proposed heuristic scheduler are higher for antennas with lower beamwidths, and as the non-uniformity in the network increases, the traffic supported in the network increases in the range 24–41%, compared to the existing methods. The proposed service tag based scheduler can further improve the network throughput and achieve better fairness at the cost of a few beam direction reconfigurations, as compared to the existing methods and our heuristic scheduler.
- Published
- 2021
- Full Text
- View/download PDF
22. Architectural Challenges in Designing of Data Transaction System for Short Range Communication
- Author
-
C., Kamani Krunalkumar, R., Kathiriya Dhaval, and V., Virparia Paresh
- Published
- 2012
23. A Loop Reduction Method Utilizing Public Device Addresses of Master Terminals in Connection Procedures of Multiple Piconets for Bluetooth MANETs
- Author
-
Yoshiaki Kakuda, Eitaro Kohno, Haruki Ishizaki, and Ryohei Saka
- Subjects
Terminal (telecommunication) ,Network packet ,business.industry ,Computer science ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Mobile ad hoc network ,Flooding (computer networking) ,law.invention ,Reduction (complexity) ,Bluetooth ,Piconet ,law ,Transfer (computing) ,business ,Computer network - Abstract
Currently, research on Bluetooth-based mobile ad hoc networks (hereinafter referred to as Bluetooth MANETs) is being conducted. As an application of Bluetooth MANETs, a grass-root disaster information propagation system has been studied for the purpose of information distribution following disasters. Bluetooth standards include Classic Bluetooth (hereinafter referred to as Classic), which can transfer relatively large data packets, and Bluetooth Low Energy (hereinafter referred to as BLE), which can work with relatively low power consumption. So far, a rapid connection establishment method that combines Classic and BLE in a complementary manner (hereinafter referred to as the existing method) and the flooding-based data packet transfer method with delay- and disruption- tolerance have been proposed. In the existing method, a Bluetooth MANET is constructed by connecting multiple piconets, which consist of one master and multiple slaves. In the existing method, loops are easily formed in a Bluetooth MANET due to the establishment of connections between slave terminals in a piconet in an environment with high terminal density. Therefore, when the flooding-based data packet transfer method is used in the existing method, the amount of data packets increases and the processing load on the terminals increases. In this paper, we proposed a method to reduce the number of loops by controlling the connection establishment between slave terminals in a piconet for Bluetooth MANETs (hereinafter referred to as our proposed method). In addition, we have evaluated the effect of our proposed method on data packet transfer through simulation experiments. As a result, we confirmed that our proposed method can reduce the number of loops and the number of data packet transmissions while maintaining the time to complete the data packet dissemination at the same level as the existing method.
- Published
- 2021
- Full Text
- View/download PDF
24. Predator: A Distributed Location Service and Example Applications
- Author
-
Weatherall, J. N., Hopper, A., Goos, Gerhard, editor, Hartmanis, Juris, editor, van Leeuwen, Jan, editor, Streitz, Norbert A., editor, Siegel, Jane, editor, Hartkopf, Volker, editor, and Konomi, Shin’ichi, editor
- Published
- 1999
- Full Text
- View/download PDF
25. PACTA: A Portfolio Theory Based Approach for QoS Aware Resource Allocation in mmWave Networks
- Author
-
Sanjay K. Bose, Ratnajit Bhattacharjee, and Arijit Bhattacharjee
- Subjects
Access network ,Computer science ,business.industry ,Quality of service ,020206 networking & telecommunications ,02 engineering and technology ,Computer Science Applications ,Piconet ,Modeling and Simulation ,0202 electrical engineering, electronic engineering, information engineering ,Resource allocation ,Portfolio ,Resource management ,Electrical and Electronic Engineering ,business ,Modern portfolio theory ,Communication channel ,Computer network - Abstract
An ultra-dense millimetre wave (mmWave) access network operating on IEEE 802.15.3c based simultaneously operated piconet (SOP) architecture offers an effective way to operate high data-rate IoT-networks while overcoming the challenges of beam-blockage and high propagation loss which characterize these systems. The SOP architecture permits coexistence of multiple mmWave piconets by allowing a piconet controller (PNC) to share its channel time with multiple PNCs, using periodically updated private channel time allocations (p-CTAs). However, due to beam blockage, the p-CTA demands within the piconets change dynamically and often cause a mismatch between the demanded and the assigned p-CTAs leading to suboptimal resource allocation and wastage of network resources. To overcome these problems, this letter proposes a QoS aware risk-sensitive approach for p-CTA assignment. It uses multiple QoS parameters as performance metrics and employs the portfolio allocation theory to dynamically determine the optimal p-CTA distribution. By judiciously allocating p-CTAs over a portfolio of SOPs, the proposed approach minimizes the risk of p-CTA mismatch for each piconet and mitigates the wastage of network resources.
- Published
- 2020
- Full Text
- View/download PDF
26. 어린이 동선 환경정보 수집하기 위한 블루투스 동시접속 기술 설계.
- Author
-
황성규
- Abstract
Bluetooth has been developed to be applied over the course of several versions in different environments. Especially low is moving to address the constraints, it gives a high utilization rate is faster than the Zigbee wireless LAN communication. To gather information on children's environmental copper transition to multiple versions. There is one limitation of Bluetooth requirements to effectively apply the information collected by Bluetooth. At the same time need to collect several information actions, Bluetooth can not connect to one of only seven Slave Master. In this paper, in order to take advantage of the many benefits of Bluetooth to gather the information by operating the Bluetooth operates in Beacon deliver packets of 168 bits, and the pairing between the master and slave unnecessarily generate a regular signal a large number of connections simultaneously Information We consider how to apply the effective policy that can be collected. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
27. CBS: constraint-based approach for scheduling in bluetooth networks
- Author
-
Shengsheng Yu, Jingli Zhou, and Gang Jiang
- Subjects
piconet ,scatternet ,bluetooth ,ad hoc network ,constraint - based ,scheduling ,Computer engineering. Computer hardware ,TK7885-7895 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
In Bluetooth networks, devices are organized into small piconets and large scatternets, and each node acts as the role of master, slave or gateway. Due to dynamic topology changes, different bandwidth available and unpredictable interference of media in Bluetooth networks, the congestion of data flow will inevitably emerges on the link, and the gateway has to switch between piconets on a time division basis, so its presence in the different piconet has to be controlled by scheduling mechanism such as inter- and intra -piconet scheduling. However, the time division in gateways will limit the network capacity and introduce bottleneck points in the network, and the switch between piconets will prevent the packet from transmitting smoothly and efficiently. Most of the published work on Bluetooth scheduling has focused on the polling scheme between master and slaves. In this paper, we put our approach on the inner constraints of Bluetooth networks and present a constraint-based scheduler (CBS), to adaptively cater to the changing role of each node throughout Bluetooth ad hoc networks, thereby it will save time and definitely enhance fairness and efficiency on packet scheduling in Bluetooth environment.
- Published
- 2004
28. Analysis and Performance Evaluation of Bluetooth Low Energy Piconet Network
- Author
-
Aydin M. Saeed and Ziyad Khalaf Farej
- Subjects
Matching (graph theory) ,business.industry ,Computer science ,Piconet ,Payload (computing) ,Wireless ,Byte ,Topology (electrical circuits) ,Throughput ,Interval (mathematics) ,business ,Computer network - Abstract
This paper presents the performance analysis of Bluetooth Low Energy (BLE) IEEE 802.15.1 standard in the piconet topology networks. The performance of the BLE network is analyzed in terms of connection interval (CI) and the number of slaves (NS) by using OMNET++ (v4.6) simulator. In the performance investigation process Data Length Extension (DLE) features is used with an application payload size of 60 bytes in order to achieve the best performance in a BLE (P2P) network. The modeled networks and due to the nature of short-range BLE wireless communication show a good matching between analytical and simulation results. For Single-Slave (or one like) piconet the obtained maximum simulation throughput is 478.7 kbps when a connection interval of (7.5) ms is used.
- Published
- 2020
- Full Text
- View/download PDF
29. 60 GHz kablosuz kişisel ağlar için esnek kılavuz işaret tasarımı
- Author
-
Tunçer Baykaş
- Subjects
Computer science ,wpan ,Mühendislik ,interference ,Throughput ,Interference (wave propagation) ,lcsh:Agriculture ,Engineering ,Piconet ,Girişim ,60 GHz,WPAN,Interference,Piconet controller ,lcsh:Technology (General) ,Wireless ,ComputerSystemsOrganization_SPECIAL-PURPOSEANDAPPLICATION-BASEDSYSTEMS ,İşaret Penceresi ,lcsh:Agriculture (General) ,Kişisel Ağlar ,business.industry ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,lcsh:S ,General Medicine ,60 ghz ,lcsh:S1-972 ,Beacon ,60 GHz,Kişisel ağlar,Girişim,İşaret penceresi ,lcsh:T1-995 ,piconet controller ,business ,Computer network - Abstract
In thispaper we investigate the effect of different beaconing strategies for wirelesspersonal area networks. Beacons are used by network coordinators to indicatethe existence of the networks. A long beacon range protects the devices frominterference of neighboring networks. Nevertheless increased protection reducesnumber of possible networks in an area and increases number of devices pernetwork. We investigate the effect of the beacon range in terms of throughputin IEEE 802.15.3c based 60 GHz WPANs. Long range beacons enable %20 more, whileallowing %40 less networks. throughput In addition we are suggesting a flexiblebeacon system which can adjust the piconet protection. In certain situations,flexible beaconing both increase the troughput of protected link and the total numberof networks in the area., Bumakalede farklı kılavuz işaret stratejilerinin kablosuz kişisel ağların başarımınaolan etkisini incelenmiştir. Ağ koordinatörleri kılavuz işaretleri, ağınvarlığını belirtmek için kullanırlar. Eğer kılavuz işaretinin menzili uzunsa,komşu ağlarda bulunan cihazlardan daha az girişim alınır. Fakat bu durum bellibir alanda sınırlı sayıda ağa izin verip ağ başına düşen cihaz sayısınıarttırır. Kılavuz işaretinin ağ kapasitesine olan etkisini incelemek için IEEE802.15.3c tabanlı 60 GHz kişisel ağları seçtik. Uzun haberleşme menzili olankılavuzlar girişim altında olan cihazlara yaklaşık %20 daha fazla kapasitesağlamakla beraber çok daha az sayıda ağa izin vermektedir. Ayrıca bu çalışmadakablosuz ağın girişimden korunması için esnek bir kılavuz işaret sistemiönerilmiştir. Esnek kılavuz işaretleri hem girişime dayanıklılık sağlarken hemde toplam kablosuz ağ sayısını yüksek tutmaktadır.
- Published
- 2019
30. Priority-based adaptive frequency hopping for Bluetooth in multi-piconet environments.
- Author
-
Wang, Yang, Lu, Jianhua, and Ge, Ning
- Abstract
In this paper, we propose a new adaptive frequency hopping (AFH) scheme, Priority-based AFH (PAFH), for Bluetooth by introducing traffic prioritization to provide better QoS for the traffic of high priority in multi-piconet environments, especially under severe self-interference. To provide differentiated QoS, PAFH pre-classifies the whole band into non-overlapping sub hopsets that correspond to traffics of different priorities. Once the PER is higher than a predetermined threshold, the algorithm is triggered and the piconet shrinks its hopset to the corresponding sub hopset according to the traffic priority. In case of the congested condition after reducing the hopset, the piconets with a higher priority monitor their own PER periodically and have the privilege to employ a hopset restoration mechanism. Based on the PER before and after the adjustment, these piconets can change their hopsets adaptively between the sub hopset and the complete one by applying a greedy algorithm. Further, the operation of PAFH is distributed and is totally compatible with the existing specifications. Simulation results show that PAFH significantly outperforms conventional schemes. [ABSTRACT FROM PUBLISHER]
- Published
- 2013
- Full Text
- View/download PDF
31. Voice over IP via Bluetooth/Wi-Fi Peer to Peer.
- Author
-
Sundar, S., Krishna Kumar, M., Selvinpremkumar, P., and Chinnadurai, M.
- Abstract
The concept of voice transferring from one mobile to another mobile using Bluetooth/ WIFI connectivity is discussed in this paper. Bluetooth is the connection which can be used as a link to share data among devices within a Personal Area Network. Now-a-days mobile phones come with Bluetooth facilities. Wi-Fi is a WLAN standard which is used to share data over the transmission range larger than Bluetooth. Wi-Fi can also be used to share the voice from one mobile to another by receiving the data from one mobile (user) and sending the data to the destination user. The basic concept behind this data transferring is VOIP (voice over protocol).Voice telephony over mobile is currently supported at a cost using service provider such as GSM, or using IP service provider at cheaper cost. The purpose of this research is to design and implement a telephony program that uses WIFI in p2p (Peer-to-Peer) or WLAN (Wireless Local Area Network) as a means of communication between mobile phones at no cost. The system will allow users to search for other individuals within WIFI range and to establish free p2p voice connections, or to establish virtual connection through Access Points (AP), as well as giving the option to user to use GSM in the case of no WIFI connectivity is available. A novel algorithm is introduced to convert mobile number into IP address and use it as a mean for contacting other mobile over p2p or AP using WIFI technology. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
32. A Performance Study for Power Management Schemes in WPANs.
- Author
-
Wang, Neng-Chung and Wen, Chih-Cheng
- Abstract
In this paper, we present a performance study for power management schemes in WPANs. Power management is an important issue for short-range communication in WPANs. We conduct the performance evaluation with the total wakeup times and the probability achieving the lower bound. Simulation results show that the performance of MDS outperforms that of standard. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
33. An efficient power management scheme with SDMA for IEEE 802.15.3 WPANs.
- Author
-
Wang, Neng ‐ Chung and Wen, Chih ‐ Cheng
- Subjects
- *
WIRELESS personal area networks , *SPACE division multiple access , *ZIGBEE , *MOBILE communication systems , *WIRELESS communications , *COMPUTER simulation - Abstract
SUMMARY IEEE 802.15.3 is devised for short-distance wireless connectivity within a wireless personal area network (WPAN). In WPANs, a power management (PM) mechanism is used for power saving. The PM enables devices to sleep for one or more superframes in order to conserve power. Space division multiple access (SDMA) is a new technology to optimize performance of current and future mobile communication systems. In this paper, we propose an SDMA-based PM scheme, called enhanced min-degree searching (EMDS) for WPANs. EMDS orders the streams among multiple devices to minimize the total wake-up times. In this scheme, every device that can transmit data at the same time is checked using the SDMA. The total wake-up times will be reduced substantially if the majority of the devices can transmit data at the same time. Simulation results show that the performance of the proposed EMDS outperforms that of the existing approaches. Copyright © 2013 John Wiley & Sons, Ltd. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
34. Bluetooth Enabled Ad-hoc Networks: Performance Evaluation of a Self-healing Scatternet Formation Protocol
- Author
-
Rade Trimceski
- Subjects
Scatternet ,Engineering ,business.industry ,Wireless ad hoc network ,Duplex (telecommunications) ,Network topology ,law.invention ,Bluetooth ,law ,Piconet ,Frequency-hopping spread spectrum ,Wireless ,business ,Computer network - Abstract
Bluetooth wireless technology is a robust short-range communications system designed for low power (10 meter range) and low cost. It operates in the 2.4 GHz Industrial Scientific Medical (ISM) band and it employs two techniques for minimizing interference: a frequency hopping scheme which nominally splits the 2.400 - 2.485 GHz band in 79 frequency channels and a time division duplex (TDD) scheme which is used to switch to a new frequency channel on 625 μs boundaries. During normal operation a Bluetooth device will be active on a different frequency channel every 625 μs, thus minimizing the chances of continuous interference impacting the performance of the system. The smallest unit of a Bluetooth network is called a piconet, and can have a maximum of eight nodes. Bluetooth devices must assume one of two roles within a piconet, master or slave, where the master governs quality of service and the frequency hopping schedule within the piconet and the slave follows the master’s schedule. A piconet must have a single master and up to 7 active slaves. By allowing devices to have roles in multiple piconets through time multiplexing, i.e. slave/slave or master/slave, the Bluetooth technology allows for interconnecting multiple piconets into larger networks called scatternets. The Bluetooth technology is explored in the context of enabling ad-hoc networks. The Bluetooth specification provides flexibility in the scatternet formation protocol, outlining only the mechanisms necessary for future protocol implementations. A new protocol for scatternet formation and maintenance - mscat - is presented and its performance is evaluated using a Bluetooth simulator. The free variables manipulated in this study include device activity and the probabilities of devices performing discovery procedures. The relationship between the role a device has in the scatternet and it’s probability of performing discovery was examined and related to the scatternet topology formed. The results show that mscat creates dense network topologies for networks of 30, 50 and 70 nodes. The mscat protocol results in approximately a 33% increase in slaves/piconet and a reduction of approximately 12.5% of average roles/node. For 50 node scenarios the set of parameters which creates the best determined outcome is unconnected node inquiry probability (UP) = 10%, master node inquiry probability (MP) = 80% and slave inquiry probability (SP) = 40%. The mscat protocol extends the Bluetooth specification for formation and maintenance of scatternets in an ad-hoc network.
- Published
- 2020
- Full Text
- View/download PDF
35. A Real-time Emotion Recognition System Based on an AI System-On-Chip Design
- Author
-
Cheng-Jie Yang, Wai-Chi Fang, and Wei-Chih Li
- Subjects
Artificial neural network ,business.industry ,Computer science ,Speech recognition ,05 social sciences ,030204 cardiovascular system & hematology ,Chip ,Convolutional neural network ,050105 experimental psychology ,03 medical and health sciences ,ComputingMethodologies_PATTERNRECOGNITION ,0302 clinical medicine ,Piconet ,Wireless ,0501 psychology and cognitive sciences ,System on a chip ,Enhanced Data Rates for GSM Evolution ,business ,Affective computing - Abstract
In this paper, we developed and integrated a realtime emotion recognition system using an AI system-on-chip design. The emotion recognition platform combined three different physiological signals, Electroencephalogram (EEG), electrocardiogram (ECG), and photoplethysmogram (PPG) as the classification resources. A 3-to-1 Bluetooth piconet was deployed to transmit all physiological signals on a single platform access point and to make use of low power wireless technologies. The system then integrated an AI computing chip with a convolution neural network (CNN) structure to classify three emotions, happiness, anger, and sadness. The average accuracy for a subject-independent classification reached 72.66%. The proposed system was integrated with the RISC-V processor and AI SOC to implement real-time monitoring and classification on edge.
- Published
- 2020
- Full Text
- View/download PDF
36. An AI-Edge Platform with Multimodal Wearable Physiological Signals Monitoring Sensors for Affective Computing Applications
- Author
-
Nicolas Fahier, Wai-Chi Fang, Cheng-Jie Yang, Wei-Chih Li, and Chang-Yuan He
- Subjects
Computer science ,business.industry ,Feature extraction ,Short-time Fourier transform ,Wearable computer ,Convolutional neural network ,ComputingMethodologies_PATTERNRECOGNITION ,Piconet ,Photoplethysmogram ,Preprocessor ,Computer vision ,Artificial intelligence ,business ,Affective computing - Abstract
In this paper, we developed and integrated an AI-edge emotion recognition platform using multiple wearable physiological signals sensors: Electroencephalogram (EEG), electrocardiogram (ECG), and photoplethysmogram (PPG) sensors. The emotion recognition platform used two combined machine learning approaches based on two systems input and preprocessing: An EEG-based emotion recognition system and an ECG/PPG-based system. The EEG-based system is a convolution neural network (CNN) that classifies three emotions, happiness, anger and sadness. The inputs of the CNN are extracted from the EEG signals using short-time Fourier transform (STFT), and the average accuracy for a subject-independent classification reached 76.94%. The ECG/PPG-based system used a similar CNN with an extracted features vector as input. The subject-dependent ECG/PPG classification system reached an average accuracy of 76.8%. The proposed system was integrated using the RISC-V processor and FPGA platforms to implement realtime monitoring and classification on edge. A 3-to-1 Bluetooth piconet was deployed to transmit all physiological signals on a single platform access point and to make use of low power wireless technologies.
- Published
- 2020
- Full Text
- View/download PDF
37. Distributed Algorithms for QoS in Wireless Ad Hoc Networks Under the Primary Interference Model
- Author
-
Ashwin Ganesan
- Subjects
Wireless network ,Computer science ,business.industry ,Wireless ad hoc network ,Quality of service ,Node (networking) ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,020302 automobile design & engineering ,020206 networking & telecommunications ,02 engineering and technology ,Admission control ,0203 mechanical engineering ,Piconet ,Distributed algorithm ,0202 electrical engineering, electronic engineering, information engineering ,Bandwidth (computing) ,Wireless ,business ,Computer network - Abstract
Consider a wireless network consisting of a set of wireless nodes and a set of communication links, where each communication link corresponds to a pair of nodes that are within communication radius of each other. Under the primary interference model, two communication links cannot be active at the same time if they are incident to a common node. This model of interference arises in Bluetooth networks, where transmissions between a master node and slave nodes in a piconet are scheduled by time-division duplexing, and in CDMA systems when each node is equipped with a single transceiver. Each communication link has a certain minimum bandwidth quality-of-service requirement. The admission control problem is to determine whether the network has sufficient resources to satisfy the bandwidth requirements. In this work, distributed algorithms are proposed for this admission control problem, and performance guarantees of these distributed algorithms are given. If each node has knowledge of a certain global parameter, then a distributed algorithm for flow admission control is given which has the same performance as an optimal, centralized algorithm, i.e. the distributed algorithm gives a condition that is both necessary and sufficient for a set of flow rates to be feasible.
- Published
- 2020
- Full Text
- View/download PDF
38. Even Black Cats Cannot Stay Hidden in the Dark: Full-band De-anonymization of Bluetooth Classic Devices
- Author
-
Paul Patras, Margus Lind, Francesco Gringoli, Marco Cominelli, and Guevara Noubir
- Subjects
021110 strategic, defence & security studies ,Information privacy ,Tethering ,business.industry ,Computer science ,Network security ,computer.internet_protocol ,Frame (networking) ,0211 other engineering and technologies ,020206 networking & telecommunications ,02 engineering and technology ,law.invention ,Bluetooth ,Piconet ,law ,0202 electrical engineering, electronic engineering, information engineering ,Wireless ,business ,Wireless sensor network ,computer ,Bluetooth Low Energy ,Computer network - Abstract
Bluetooth Classic (BT) remains the de facto connectivity technology in car stereo systems, wireless headsets, laptops, and a plethora of wearables, especially for applications that require high data rates, such as audio streaming, voice calling, tethering, etc. Unlike in Bluetooth Low Energy (BLE), where address randomization is a feature available to manufactures, BT addresses are not randomized because they are largely believed to be immune to tracking attacks. We analyze the design of BT and devise a robust de-anonymization technique that hinges on the apparently benign information leaking from frame encoding, to infer a piconet’s clock, hopping sequence, and ultimately the Upper Address Part (UAP) of the master device’s physical address, which are never exchanged in clear. Used together with the Lower Address Part (LAP), which is present in all frames transmitted, this enables tracking of the piconet master, thereby debunking the privacy guarantees of BT. We validate this attack by developing the first Software-defined Radio (SDR) based sniffer that allows full BT spectrum analysis (79 MHz) and implements the proposed de-anonymization technique. We study the feasibility of privacy attacks with multiple testbeds, considering different numbers of devices, traffic regimes, and communication ranges. We demonstrate that it is possible to track BT devices up to 85 meters from the sniffer, and achieve more than 80% device identification accuracy within less than 1 second of sniffing and 100% detection within less than 4 seconds. Lastly, we study the identified privacy attack in the wild, capturing BT traffic at a road junction over 5 days, demonstrating that our system can re-identify hundreds of users and infer their commuting patterns.
- Published
- 2020
- Full Text
- View/download PDF
39. Node Mutual Authentication Based on Trust-Assessment Model in the IoT-Sensor Networks
- Author
-
KimHongSeop
- Subjects
business.industry ,Piconet ,Computer science ,Node (networking) ,Mutual authentication ,business ,Internet of Things ,Wireless sensor network ,Computer network - Published
- 2018
- Full Text
- View/download PDF
40. NUPFA: A Novel Nonuniform Power Formation Algorithm for BLE Mesh Networks
- Author
-
Chih-Min Yu, Jian-Ping Lin, and Li-Chun Wang
- Subjects
Routing protocol ,Scatternet ,Computer Networks and Communications ,Computer science ,Network packet ,Mesh networking ,020206 networking & telecommunications ,02 engineering and technology ,Network topology ,Computer Science Applications ,law.invention ,Bluetooth ,Hardware and Architecture ,law ,Piconet ,Signal Processing ,0202 electrical engineering, electronic engineering, information engineering ,Routing (electronic design automation) ,Algorithm ,Information Systems - Abstract
This study presents a novel nonuniform power formation algorithm (NUPFA) for Bluetooth low-energy (BLE) networks. With two stages, NUPFA constructs the scatternet in a distributed manner. In the first stage, the master and slave nodes discover each other using low-level power to form an initial scatternet. In the second stage, each master alternatively scans or advertises using normal power to interconnect dual links among any two piconets until the whole scatternet is constructed. Using nonuniform power configuration, an energy-efficient scatternet is generated, since packet transmission power can be reduced in each piconet to minimize overall power consumption. With additional scatternet links, more routing paths can be utilized to reduce the path length and enhance network efficiency. simulation results show that compared with the existing cluster-based on-demand routing protocol (CORP) and Bluetooth Mesh schemes, the NUPFA protocol achieves superior energy efficiency for packet transmission. Also, the dual link features can effectively reduce packet latency, thereby improving the overall performance of BLE mesh networks.
- Published
- 2021
- Full Text
- View/download PDF
41. How to Secure Our Bluetooth Insecure World!
- Author
-
Kaur, Satwant
- Subjects
- *
AD hoc computer networks , *BASEBAND , *BLUETOOTH technology , *DENIAL of service attacks , *WIRELESS LANs - Abstract
The number of Bluetooth Devices has increased to billions. However, the Bluetooth Technology continues to have inherent vulnerabilities and is subject to security attacks. In this column ''Pushing Frontiers with the First Lady of Emerging Technologies'', Dr. Satwant Kaur explains how her vision of how this Bluetooth Insecure World can be secured. She discusses the widespread use of this technology in all fields, the internals of Bluetooth Technology LE, its security mechanisms, its vulnerabilities and attacks, and details critical steps needed to help protect data and devices in Bluetooth transmissions. [ABSTRACT FROM AUTHOR]
- Published
- 2013
- Full Text
- View/download PDF
42. Feedback-assisted MAC protocol for real time traffic in high rate wireless personal area networks.
- Author
-
Byung-Seo Kim, Sung Kim, Yuguang Fang, and Tan Wong
- Subjects
- *
COMPUTER networks , *ACCESS control , *SECURITY systems , *WIRELESS communications , *NETWORK performance , *ALGORITHMS - Abstract
During the past decade, there has been much standardization effort for indoor or shot-range networks, as communication devices and applications for such networks populate. As a prominent example of these activities, the IEEE 802.15.3 Task Group (TG) published a standard for high-rate wireless personal area network (HR-WPAN). To support strictly timed multimedia services, the TG adopts a time-slotted channel access protocol controlled by a central device (DEV). Although the channel time allocation algorithm plays a key role in deciding the network performance, it remains unspecified in the standard. Therefore, in this paper, we propose a novel feedback-assisted channel time allocation method for HR-WPAN. After initial channel times are allocated based on packet inter-arrival time statistics, the allocation is dynamically adjusted by utilizing feedback information from each DEV. The feedback information includes the buffer status, the packet transmission delay, and the physical transmission rate. By utilizing this feedback information, the central DEV can allocate sufficient channel time for transmissions of pending packets from a DEV. Moreover, the allocated channel times can be synchronized to the packet arrival times so that the overall transmission delay is reduced. To cope with time-varying wireless channels, a dynamic rate selection algorithm assisted by physical layer information is proposed in this paper. Performance evaluation is carried out through extensive simulations, from which significant performance enhancements are observed. [ABSTRACT FROM AUTHOR]
- Published
- 2010
- Full Text
- View/download PDF
43. An Adaptive Traffic-Aware Polling and Scheduling Algorithm for Bluetooth Piconets.
- Author
-
Ching-Fang Hsu and Chien-Yu Liu
- Subjects
- *
BLUETOOTH technology , *WIRELESS communications , *PACKET switching , *TIME perception , *BANDWIDTHS , *TRAFFIC patterns , *ALGORITHMS , *SIMULATION methods & models , *TECHNICAL specifications - Abstract
According to Bluetooth specifications, communications between slave devices within a piconet are controlled by its master node. In other words, a master node has to be involved in all packet exchange activities in its associated piconet. Consequently, how to determine the polling sequence and how to estimate service time for individual slave nodes are two critical intrapiconet missions to a master and are usually categorized as the intrapiconet polling and scheduling problem. Obviously, a good polling sequence can reduce the average packet delay, whereas accurate service time estimation would result in better throughput performance. Furthermore, the packet delay of intrapiconet transmission is mostly caused by the inadequate behavior in which the master node polls an idle slave since other nonidle slaves belonging to the same piconet have to wait for the completion of such POLL/NULL packet transmissions. Certainly, unnecessary pollings would cause bandwidth utilization reduction as well. Therefore, the adaptability to traffic pattern is a necessary condition to a good intrapiconet polling and scheduling algorithm. In this paper, we proposed a traffic-aware algorithm to deal with the polling and scheduling issue within a piconet. The objective of our work is to maximize the throughput performance and to reduce the average intrapiconet packet delay as simultaneously as possible. As expected, the simulation results verify that our work designs an intrapiconet scheduling scheme with low delay and high throughput, which is adaptive to various traffic scenarios as well. [ABSTRACT FROM AUTHOR]
- Published
- 2010
- Full Text
- View/download PDF
44. STUDI DAN UJI COBA TEKNOLOGI BLUETOOTH SEBAGAI ALTERNATIF KOMUNIKASI DATA NIRKABEL
- Author
-
Yulia Yulia and Leo Willyanto Santoso
- Subjects
Bluetooth ,Bluetooth Protocol Stack ,Piconet ,Data Communication ,Wireless. ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
Bluetooth is a new emerging technology. This technology gives significant changes for electronic devices that we are using. If we look around, a keyboard is connected to a computer. So does a printer, a mouse, a monitor and so on. This condition creates a problem of so many scattered wires installed in the offices, houses and other places. Another problem is how to inspect the damaging or boken wires. In this paper, we will have a discussion on specific applications of bluetooth such as services provided by the bluetooth technology; bluetooth method - how bluetooth devices make connections in a piconet; as well as investigation on bluetooth protocol stack. Bluetooth has succesfully built easy connection among devices from many vendor without using cables, with less power dan money. By using bluetooth, we can build small network or Piconet, consisting of several devices without cables. Abstract in Bahasa Indonesia : Bluetooth adalah suatu teknologi baru yang mulai dikenal dan digunakan. Teknologi ini memberikan perubahan yang signifikan terhadap peralatan elektronik yang kita gunakan. Jika kita melihat sekeliling kita dimana keyboard dihubungkan pada komputer. Demikian juga halnya dengan printer, mouse, monitor dan lain sebagainya. Semua peralatan itu dihubungkan dengan menggunakan kabel. Akibatnya terjadi masalah banyak kabel yang dibutuhkan di kantor, rumah atau tempat-tempat lainnya. Masalah lain yang ditemui adalah bagaimana menelusuri kabel-kabel yang terpasang jika ada suatu kesalahan atau kerusakan. Bluetooth memperbaiki penggunaan teknologi kabel yang cenderung menyulitkan ini dengan cara menghubungkan beberapa peralatan tanpa menggunakan kabel. Pada karya tulis ini, dibahas aplikasi spesifik bluetooth, antara lain servis-servis apa saja yang disediakan oleh teknologi bluetooth; cara kerja bluetooth yaitu bagaimana bluetooth device melakukan koneksi di dalam sebuah piconet serta bluetooth protocol stack. Bluetooth telah berhasil memudahkan koneksi antar beberapa alat dari berbagai vendor tanpa kabel dengan tenaga yang kecil serta biaya yang ringan. Dengan bluetooth dapat dibentuk sebuah jaringan kecil atau Piconet yang terdiri dari beberapa peralatan dan sekali lagi, tanpa memerlukan kabel. Kata kunci: Bluetooth, Bluetooth Protocol Stack, Piconet, Komunikasi data, Nirkabel.
- Published
- 2004
45. A Priority Gated Round Robin Polling Scheme for Bluetooth Piconets.
- Author
-
Ibrahim, Asmaa, Rizk, Rawya, and Mabmoud, Gamal
- Subjects
BLUETOOTH technology ,PERSONAL communication service systems ,WIRELESS communications ,TELECOMMUNICATION systems ,BIT rate ,DATA transmission systems ,SIMULATION methods & models ,INFORMATION technology - Abstract
Bluetooth is a wireless access technology where polling is used to share bandwidth among the nodes. In this paper, a new polling scheme for intra-piconet scheduling in Bluetooth piconets, Priority Gated Round Robin, is proposed. The performance of this algorithm is analyzed via simulation in different cases such as different Segmentation And Reassembly algorithms, different packet sizes, and variable number of slaves and is compared with the traditional Gated Round Robin algorithm. Simulation results demonstrate that the new scheme achieves better performance over the existing Gated Round Robin scheme. [ABSTRACT FROM AUTHOR]
- Published
- 2008
46. An Adaptive Interpiconet Scheduling Algorithm Based on HOLD Mode in Bluetooth Scatternets.
- Author
-
Ching-Fang Hsu and Shu-Ming Hsu
- Subjects
- *
WIRELESS communications , *TELECOMMUNICATION systems , *CELL phone systems , *ALGORITHMS , *BLUETOOTH technology , *DATA transmission systems , *DIGITAL communications , *ELECTRONIC data processing - Abstract
To efficiently relay packets between associated piconets in an arbitrary-sized scatternet, an adaptive interpiconet scheduling algorithm is a requisite in a bridge. In this paper, we proposed a new interpiconet scheduling algorithm based on the HOLD mode-a power-saving mode of Bluetooth-to reduce the average interpiconet packet delay while increasing the utilization of a bridge. Generally speaking, interpiconet packet delay mainly results from the phenomenon that a bridge stays in one piconet without any interpicoriet transmission activity in progress while other associated piconets are waiting for the bridge to deal with iiiterpiconet packets. Thus, our proposed scheme estimates the time duration for which the bridge should stay in each piconet according to the traffic pattern so that the bridge can avoid being idle as possible. In particular, neither Bluetooth specification modifications nor any extra devices are needed to integrate our proposed interpiconet scheduling algorithm. Finally, the simulation results show the superiority of our proposed scheme, including low average delay, high throughput, and remarkable scalability. [ABSTRACT FROM AUTHOR]
- Published
- 2008
- Full Text
- View/download PDF
47. Cross-layer optimization in ultra wideband networks.
- Author
-
Wu, Qi, Bi, JingPing, Guo, ZiHua, Xiong, YongQiang, Zhang, Qian, and Li, ZhongCheng
- Abstract
Ultra wideband (UWB) network brings both chance and challenge to personal area wireless communications. Compared with other IEEE 802 small range wireless protocols (such as WLAN and Bluetooth), UWB has both extremely high bandwidth (up to 480 Mbps) and low radiation. Moreover, the structured MAC layer of UWB is the fundamental difference to WLAN. The top one is that only when two UWB devices belong to the same piconet can they communicate with each other directly, which means that we must jointly consider topology formation and routing when deploying UWB networks because the interaction between routing and topology formation makes separate optimization ineffective. This paper tries to optimize UWB network from a cross-layer point of view. Specifically, given device spatial distribution and traffic requirement, we want to form piconets and determine routing jointly, to maximize the overall throughput. We formulate the problem of joint optimization to mixed-integer programming and give a practical lower bound that is very close to the theoretical upper bound in our simulation. Furthermore, our lower bound is much better than an algorithm that only considers topology formation in UWB networks. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
48. On Link Scheduling in Dual-Hop 60-GHz mmWave Networks
- Author
-
Sastry Kompella, Zhifeng He, Ananthram Swami, and Shiwen Mao
- Subjects
Engineering ,Computational complexity theory ,Computer Networks and Communications ,Aerospace Engineering ,050801 communication & media studies ,Data_CODINGANDINFORMATIONTHEORY ,02 engineering and technology ,Hop (networking) ,law.invention ,Scheduling (computing) ,0508 media and communications ,Piconet ,Relay ,law ,Computer Science::Networking and Internet Architecture ,0202 electrical engineering, electronic engineering, information engineering ,Electrical and Electronic Engineering ,Computer Science::Information Theory ,Decomposition principle ,business.industry ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,05 social sciences ,020206 networking & telecommunications ,Automotive Engineering ,business ,Computer network - Abstract
We tackle the problem of minimizing the maximum expected delivery time of all transmission pairs in 60 GHz mmWave networks. The network is dual-hop with multiple transmitter-receiver pairs, relays, and a centralized controller (termed PicoNet coordinator). We jointly optimize relay and link selection for the transmitter–receiver pairs to minimize delivery time, while the reflected non-line-of-sight transmission links are exploited to get around obstacles. To reduce computational complexity, we develop a decomposition principle to transform the joint-optimization problem into a link selection subproblem and a relay assignment subproblem when there are a sufficient amount of relays. A tight performance bound for the proposed algorithm is proved. We also develop a heuristic scheme to handle the case when there are no enough relays. The superior performance of our proposed algorithms is validated with extensive simulations and comparisons with benchmark schemes.
- Published
- 2017
- Full Text
- View/download PDF
49. Adaptive Role Switching Protocol for Improving Scatternet Performance in Bluetooth Radio Networks.
- Author
-
Chih-Yung Chang and Hsu-Ruey Chang
- Subjects
- *
COMPUTER network protocols , *SWITCHING theory , *WIRELESS communications , *HOME computer networks , *BLUETOOTH technology , *ROUTING (Computer network management) - Abstract
Bluetooth has been considered as a high potential technology for providing wireless communication in a home-networking environment. In a Bluetooth network, it is difficult to control or predefine a scatternet structure because that the scatternet is formed using a distributed procedure, with the master and slave connected at random. A badly structured scatternet exhibits the following characteristics. Firstly, too many bridges in the scatternet will create a guard slot overhead associated with bridge switching among the participated piconets, increasing the probability of packet loss. Secondly, too many piconets in a communicative range will cause packet collision and thus degrade the performance. Unnecessary piconets also lengthen the routing path and transmission delay. This work proposes a distributed scatternet reconstruction protocol for dynamically reorganizing the scatternet topology. By applying the role switching operation, the unnecessary bridges and the piconet can be dynamically removed and hence, improve the packet error rate, save guard slots, and reduce the average routing length. Experimental results reveal that the proposed protocol significantly improves the performance of a Bluetooth scatternet. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
50. BlueCube: Constructing a hypercube parallel computing and communication environment over Bluetooth radio systems
- Author
-
Chang, Chao-Tsun, Chang, Chih-Yung, and Sheu, Jang-Ping
- Subjects
- *
CELL phone systems , *PARALLEL computers , *BLUETOOTH technology , *NETWORK routers - Abstract
Abstract: In parallel computing structures, Hypercubes [P. J. Wan, L. W. Liu, Y. Yang, Optimal routing based on the super-topology in Hypercube WDM networks, 1999, pp. 142–149] and [Y. R. Leu, S. Y. Kuo, A fault-tolerant tree communication scheme for hypercube systems, IEEE Trans. Comput. 45(6) (1996) 643–650] have many advantages: they support parallel computing, provide disjoint paths, and tolerate faults. If devices with computing capabilities can be linked as a Hypercube by taking advantage of Bluetooth radio''s features, then an efficient communication and high-performance computing environment can be established by applying currently used algorithms. A Bluetooth device randomly searches for and connects with other devices, using time-consuming inquiry/inquiry scan and page/page scan operation and hence, results in an uncontrolled scatternet topology and inefficient communications. The present work proposes a three-stage distributed construction protocol for rapidly organizing a Hypercube computing environment that was constructed from Bluetooth devices. The proposed protocol governs the construction of links, the assigning of roles and the formation of the scatternet in order to efficiently construct a Hypercube structure. The constructed scatternet easily enables Bluetooth devices to establish a routing path, tolerate faults and create disjoint paths, and thus, achieves parallel and distributed computing in a Bluetooth wireless environment. Experimental results reveal that the proposed protocol can set up a scatternet that is appropriate for parallel computing and communications. [Copyright &y& Elsevier]
- Published
- 2006
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.