25 research outputs found

    A PROTOCOL SUITE FOR WIRELESS PERSONAL AREA NETWORKS

    Get PDF
    A Wireless Personal Area Network (WPAN) is an ad hoc network that consists of devices that surround an individual or an object. BluetoothÂź technology is especially suitable for formation of WPANs due to the pervasiveness of devices with BluetoothÂź chipsets, its operation in the unlicensed Industrial, Scientific, Medical (ISM) frequency band, and its interference resilience. BluetoothÂź technology has great potential to become the de facto standard for communication between heterogeneous devices in WPANs. The piconet, which is the basic BluetoothÂź networking unit, utilizes a Master/Slave (MS) configuration that permits only a single master and up to seven active slave devices. This structure limitation prevents BluetoothÂź devices from directly participating in larger Mobile Ad Hoc Networks (MANETs) and Wireless Personal Area Networks (WPANs). In order to build larger BluetoothÂź topologies, called scatternets, individual piconets must be interconnected. Since each piconet has a unique frequency hopping sequence, piconet interconnections are done by allowing some nodes, called bridges, to participate in more than one piconet. These bridge nodes divide their time between piconets by switching between Frequency Hopping (FH) channels and synchronizing to the piconet\u27s master. In this dissertation we address scatternet formation, routing, and security to make BluetoothÂź scatternet communication feasible. We define criteria for efficient scatternet topologies, describe characteristics of different scatternet topology models as well as compare and contrast their properties, classify existing scatternet formation approaches based on the aforementioned models, and propose a distributed scatternet formation algorithm that efficiently forms a scatternet topology and is resilient to node failures. We propose a hybrid routing algorithm, using a bridge link agnostic approach, that provides on-demand discovery of destination devices by their address or by the services that devices provide to their peers, by extending the Service Discovery Protocol (SDP) to scatternets. We also propose a link level security scheme that provides secure communication between adjacent piconet masters, within what we call an Extended Scatternet Neighborhood (ESN)

    Distributed Construction and Maintenance of Bandwidth-Efficient Bluetooth Scatternets

    Get PDF
    Bluetooth networks can be constructed as piconets or scatternets depending on the number of nodes in the network. Although piconet construction is a well-defined process specified in Bluetooth standards, scatternet construction policies and algorithms are not well specified. Among many solution proposals for this problem, only a few of them focus on efficient usage of bandwidth in the resulting scatternets. In this paper, we propose a distributed algorithm for the scatternet construction problem, that dynamically constructs and maintains a scatternet based on estimated traffic flow rates between nodes. The algorithm is adaptive to changes and maintains a constructed scatternet for bandwidth-efficiency when nodes come and go or when traffic flow rates change. Based on simulations, the paper also presents the improvements in bandwidth-efficiency provided by the proposed algorithm

    A survey on Bluetooth multi-hop networks

    Get PDF
    Bluetooth was firstly announced in 1998. Originally designed as cable replacement connecting devices in a point-to-point fashion its high penetration arouses interest in its ad-hoc networking potential. This ad-hoc networking potential of Bluetooth is advertised for years - but until recently no actual products were available and less than a handful of real Bluetooth multi-hop network deployments were reported. The turnaround was triggered by the release of the Bluetooth Low Energy Mesh Profile which is unquestionable a great achievement but not well suited for all use cases of multi-hop networks. This paper surveys the tremendous work done on Bluetooth multi-hop networks during the last 20 years. All aspects are discussed with demands for a real world Bluetooth multi-hop operation in mind. Relationships and side effects of different topics for a real world implementation are explained. This unique focus distinguishes this survey from existing ones. Furthermore, to the best of the authors’ knowledge this is the first survey consolidating the work on Bluetooth multi-hop networks for classic Bluetooth technology as well as for Bluetooth Low Energy. Another individual characteristic of this survey is a synopsis of real world Bluetooth multi-hop network deployment efforts. In fact, there are only four reports of a successful establishment of a Bluetooth multi-hop network with more than 30 nodes and only one of them was integrated in a real world application - namely a photovoltaic power plant. © 2019 The Author

    Distributed algorithms for dynamic topology construction and their applications

    Get PDF
    Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2004.Includes bibliographical references (p. 155-162).(cont.) of piconets is close to optimal, and any device is a member of at most two piconets.We introduce new distributed algorithms that dynamically construct network topologies. These algorithms not only adapt to dynamic topologies where nodes join and leave, but also actively set up and remove links between the nodes, to achieve certain global graph properties. First, we present a novel distributed algorithm for constructing overlay networks that are composed of d Hamilton cycles. The protocol is decentralized as no globally-known server is required. With high probability, the constructed topologies are expanders with O(logd n) diameters and ... second largest eigenvalues. Our protocol exploits the properties of random walks on expanders. A new node can join the network in O(logd n) time with O(dlogd n) messages. A node can leave in O(1) time with O(d) messages. Second, we investigate a layered construction of the random expander networks that can implement a distributed hash table. Layered expanders can achieve degree-optimal routing at O(log n/log log n) time, where each node has O(log n) neighbors. We also analyze a self-balancing scheme for the layered networks. Third, we study the resource discovery problem, in which a network of machines discover one another by making network connections. We present two randomized algorithms to solve the resource discovery problem in O(log n) time. Fourth, we apply the insight gained from the resource discovery algorithms on general networks to ad hoc wireless networks. A Bluetooth ad hoc network can be formed by interconnecting piconets into scatternets. We present and analyze a new randomized distributed protocol for Bluetooth scatternet formation. We prove that our protocol achieves O(log n) time complexity and O(n) message complexity. In the scatternets formed by our protocol, the numberby Ching Law.Ph.D

    Distributed On-Line Schedule Adaptation for Balanced Slot Allocation in Bluetooth Scatternets and other Wireless Ad-Hoc Network Architectures

    Get PDF
    In this paper we propose an algorithm for design and on the fly modification of the schedule of an ad-hoc wireless network in order to provide fair service guarantees under topological changes. The primary objective is to derive a distributed coordination method for schedule construction and modification in Bluetooth scatternets. The algorithm proposed here has wider applicability, to any wireless ad-hoc network that operates under a schedule where the transmissions at each slot are explicitly specified over a time period of length T. First we introduce a fluid model of the system where the conflict avoidance requirements of neighboring links are relaxed while the aspect of local channel sharing is captured. In that model we propose an algorithm where the nodes asynchronously re-adjust the rates allocated to their adjacent links based only on local information. We prove that from any initial condition the algorithm finds the max-min fair rate allocation in the fluid model. Hence if the iteration is performed constantly the rate allocation will track the optimal even in regimes of constant topology changes. Then we consider the slotted system and propose a modification method that applies directly on the slotted schedule, emulating the effect of the rate re-adjusment iteration of the fluid model. Through extensive experiments in networks with fixed and time varying topologies we show that the latter algorithm achieves balanced rate allocation in the actual slotted system that are very close to the max-min fair rates. The experiments show also that the algorithm is very robust on topology variations, with very good tracking properties of the max-min fair rate allocation

    Constructing energy efficient bluetooth scatternets for wireless sensor networks

    Get PDF
    Cataloged from PDF version of article.The improvements in the area of wireless communication and micro-sensor technology have made the deployment of thousands, even millions, of low cost and low power sensor nodes in a region of interest a reality. After deploying sensor nodes in a target region of interest, which can be inaccessible by people, people can collect useful data from the region remotely. The sensor nodes use wireless communication and can collaborate with each other. However, sensor nodes are battery powered and therefore they have limited energy and lifetime. This makes energy as the main resource problem in sensor networks. The design process for sensor networks has to consider energy constraints as the main factor to extend the lifetime of the network. The wireless technology used for communication among sensor nodes can affect the lifetime of the network, since different technologies have different energy consumption parameters. Bluetooth, being low power and low cost, is a good candidate for being the underlying wireless connectivity technology for sensor networks tailored for various applications. But in order to build a large network of Bluetooth-enabled sensor nodes, we have to first form a Bluetooth scatternet. The topology of the Bluetooth scatternet affects the routing scheme to be used over that topology to collect and route informaton from sensor nodes to a base station. And routing scheme, in turn, affects how much energy is consumed during transport of information. Therefore, it is important to build a Bluetooth scatternet wisely to reduce and balance the energy consumption, hence extend the lifetime of a sensor network. In this thesis work, we propose a new Bluetooth scatternet formation algorithm to be used in Bluetooth-based sensor networks. Our algorithm is based on first computing a shortest path tree from the base station to all sensor nodes and then solving the degree constraint problem so that the degree of each node in the network is not greater than seven (a Bluetooth constraint). We also propose a balancing algorithm over the degree constrained tree to balance the energy consumption of the nodes that are closer to the base station. The closer nodes are the nodes that will consume more energy in the network since all traffic has to be forwarded over these nodes. Our simulation results show that our proposed algorithm improves the lifetime of the network by trying to reduce the energy consumed during data transfer and also by balancing the load among the nodes.Saginbekov, SainM.S

    Wireless body sensor networks for health-monitoring applications

    Get PDF
    This is an author-created, un-copyedited version of an article accepted for publication in Physiological Measurement. The publisher is not responsible for any errors or omissions in this version of the manuscript or any version derived from it. The Version of Record is available online at http://dx.doi.org/10.1088/0967-3334/29/11/R01

    A study of mobile phone ad hoc networks via bluetooth with different routing protocols

    Get PDF
    The growth of mobile computing is changing the way people communicate. Mobile devices, especially mobile phones, have become cheaper and more powerful, and are able to run more applications and provide networking services. Mobile phones use fixed cellular infrastructure such as base stations and transmission towers to enable users to share multimedia content and access the internet at any time or place. However, using the internet is costly. Therefore, one of the solutions is to create impromptu ad hoc networks to share information among users. Such networks are infrastructureless and self-organising, much like mobile ad hoc networks. This dissertation therefore investigates how mobile phones with low-power Bluetooth technology can be used to create ad hoc networks that connect mobile phones and allow them to share information. The mobile phones should be able organise themselves for multi-hop communication. Routing becomes important in order to achieve effciency in data communication. Several existing routing protocols were developed and evaluated for this network to determine how effciently they deliver data and deal with network disruptions such as a device moving out of transmission range. Representative routing protocols in mobile ad hoc networking, peer-to-peer networks and publish/subscribe systems were evaluated according to performance metrics defidened in the research, namely total traffc, data traffc, control traffc, delay, convergence time, and positive response. Prototypes for Nokia phones were developed and tested in a small ad hoc network. For practical networking setup, a simple routing protocol that uses the limited mobile phone resources effciently would be better than a sophisticated routing protocol that keeps routing information about the network participants

    Effects of Data Replication on Data Exfiltration in Mobile Ad hoc Networks Utilizing Reactive Protocols

    Get PDF
    A swarm of autonomous UAVs can provide a significant amount of ISR data where current UAV assets may not be feasible or practical. As such, the availability of the data the resides in the swarm is a topic that will benefit from further investigation. This thesis examines the impact of le replication and swarm characteristics such as node mobility, swarm size, and churn rate on data availability utilizing reactive protocols. This document examines the most prominent factors affecting the networking of nodes in a MANET. Factors include network routing protocols and peer-to-peer le protocols. It compares and contrasts several open source network simulator environments. Experiment implementation is documented, covering design considerations, assumptions, and software implementation, as well as detailing constant, response and variable factors. Collected data is presented and the results show that in swarms of sizes of 30, 45, and 60 nodes, le replication improves data availability until network saturation is reached, with the most significant benefit gained after only one copy is made. Mobility, churn rate, and swarm density all influence the replication impact

    File Tracking For Mobile Devices

    Get PDF
    Since 2010, the smart device has become an integral part of people’s daily lives. The popularity of smart devices has increased dramatically. However, as the number of devices owned by an individual user increases, so does the risk of data leakage and loss. This problem has started to draw attention because the data contained on smart devices tends to be personal or sensitive in nature. Many people have so much data on their devices that they have no idea as to what they are missing when a device is lost. Although there are already some solutions for data recovery, a data backup system on a remote server, these solutions are not accessible in the non-Internet environment. Development of a data recovery system that is accessible in the non-Internet environment is essential because of the constraints of mobile devices, such as unreliable network. This research proposes an architecture that allows the data recovery in both Internet (cloud) and Non-Internet (local) network by using diïŹ€erent connection technologies. A data tracking mechanism has also been designed to monitor data ïŹ‚ow among multiple devices, such as the cloud server, mobile devices, and tablets. Additionally, a synchronization system has been developed to ensure the consistency of tracking information. By designing and implementing this architecture, the two problems regarding to the data: "what is where" and "who has what" are resolved
    corecore