71 research outputs found

    Detailed examination of a packet collision model for Bluetooth Low Energy advertising mode

    Get PDF
    The aim of this paper is to investigate the amount of energy that is required to successfully transmit information inside the Bluetooth Low Energy (BLE) advertising packets. There are applications that require more than one BLE node to simultaneously transmit data. The BLE protocol utilizes a specific communication method termed advertising mode to perform unidirectional broadcasts of data from the advertising devices. However, with an increased number of BLE devices advertising simultaneously, there will be inevitable packet collisions from the advertising devices. This results in a waste of energy, specifically in low-power applications where lower consumption is desirable to minimize the need for battery replacements. This paper examines a packet collision model for the BLE advertising mode with the results validated using experimental data. Our analysis shows that when the throughput of the BLE network starts to fall due to an increase in the number of packet collisions, the energy consumption of the BLE nodes increase exponentially with respect to the number of nodes

    Soft real-time communications over Bluetooth under interferences from ISM devices

    Get PDF
    Bluetooth is a suitable technology to support soft real-time applications like multimedia streams at the personal area network level. In this paper, we analytically evaluate the worst-case deadline failure probability of Bluetooth packets under co-channel interference as a way to provide statistical guarantees when transmitting soft real-time traffic using ACL links. We consider the interference from independent Bluetooth devices, as well as from other devices operating in the ISM band like 802.11b/g and Zigbee. Finally, we show as an example how to use our model to obtain some results for the transmission of a voice stream.Ministerio de Ciencia y Tecnología TIC2001-1868-C03-0

    Traffic integration in personal, local and geograhical wireless networks

    Get PDF
    Currently, users identify wireless networks with the first and second generation of cellular-telephony networks. Although voice and short messaging have driven the success of these networks so far, data and more sophisticated applications are emerging as the future driving forces for the extensive deployment of new wireless technologies. In this chapter we will consider future wireless technologies that will provide support to different types of traffic including legacy voice applications, Internet data traffic, and sophisticated multimedia applications. In the near future, wireless technologies will span from broadband wide-area technologies (such as satellite-based network and cellular networks) to local and personal area networks. Hereafter, for each class of networks, we will present the emerging wireless technologies for supporting service integration. Our overview will start by analyzing the Bluetooth technology that is the de-facto standard for Wireless Personal Area Networks (WPANs), i.e. networks that connect devices placed inside a circle with radius of 10 meters. Two main standards exist for Wireless Local Area Networks (WLANs): IEEE 802. and HiperLAN. In this chapter we focus on the IEEE 802.11 technology, as it is the technology currently available on the market. In this chapter, after a brief description of the IEEE 802.11 architecture, we will focus on the mechanisms that have been specifically designed to support delay sensitive traffics

    Device Discovery in Frequency Hopping Wireless Ad Hoc Networks

    Get PDF
    This research develops a method for efficient discovery of wireless devices for a frequency hopping spread spectrum, synchronous, ad hoc network comprised of clustered sub-networks. The Bluetooth wireless protocol serves as the reference protocol. The development of a discovery, or outreach, method for scatternets requires the characterization of performance metrics of Bluetooth piconets, many of which are unavailable in literature. Precise analytical models characterizing the interference caused to Bluetooth network traffic by inquiring devices, the probability mass function of packet error rates between arbitrary pairs of Bluetooth networks, and Bluetooth discovery time distribution are developed. Based on the characterized performance metrics, three scatternet outreach methods are developed and compared. Outreach methods which actively inquire on a regular basis, as proposed in literature, are shown to produce lower goodput, have greater mean packet delay, require more power, and cause significant delays in discovery. By passively remaining available for outreach, each of these disadvantages is avoided

    Scalable Spectrum Sharing Mechanism for Local Area Networks Deployment

    Get PDF

    Low-Power Wireless for the Internet of Things: Standards and Applications: Internet of Things, IEEE 802.15.4, Bluetooth, Physical layer, Medium Access Control,coexistence, mesh networking, cyber-physical systems, WSN, M2M

    Get PDF
    International audienceThe proliferation of embedded systems, wireless technologies, and Internet protocols have enabled the Internet of Things (IoT) to bridge the gap between the virtual and physical world through enabling the monitoring and actuation of the physical world controlled by data processing systems. Wireless technologies, despite their offered convenience, flexibility, low cost, and mobility pose unique challenges such as fading, interference, energy, and security, which must be carefully addressed when using resource-constrained IoT devices. To this end, the efforts of the research community have led to the standardization of several wireless technologies for various types of application domains depending on factors such as reliability, latency, scalability, and energy efficiency. In this paper, we first overview these standard wireless technologies, and we specifically study the MAC and physical layer technologies proposed to address the requirements and challenges of wireless communications. Furthermore, we explain the use of these standards in various application domains, such as smart homes, smart healthcare, industrial automation, and smart cities, and discuss their suitability in satisfying the requirements of these applications. In addition to proposing guidelines to weigh the pros and cons of each standard for an application at hand, we also examine what new strategies can be exploited to overcome existing challenges and support emerging IoT applications

    Thirty Years of Machine Learning: The Road to Pareto-Optimal Wireless Networks

    Full text link
    Future wireless networks have a substantial potential in terms of supporting a broad range of complex compelling applications both in military and civilian fields, where the users are able to enjoy high-rate, low-latency, low-cost and reliable information services. Achieving this ambitious goal requires new radio techniques for adaptive learning and intelligent decision making because of the complex heterogeneous nature of the network structures and wireless services. Machine learning (ML) algorithms have great success in supporting big data analytics, efficient parameter estimation and interactive decision making. Hence, in this article, we review the thirty-year history of ML by elaborating on supervised learning, unsupervised learning, reinforcement learning and deep learning. Furthermore, we investigate their employment in the compelling applications of wireless networks, including heterogeneous networks (HetNets), cognitive radios (CR), Internet of things (IoT), machine to machine networks (M2M), and so on. This article aims for assisting the readers in clarifying the motivation and methodology of the various ML algorithms, so as to invoke them for hitherto unexplored services as well as scenarios of future wireless networks.Comment: 46 pages, 22 fig

    A high bit rate flexible MAC protocol for monitoring applications using 60ghz radio technology

    Get PDF
    In recent years there has been a growing trend in optical wireless convergence. One particular aspect of this is 60 GHz radio-over-fiber technology. It is intended for use in wireless personal area networks. However, we think that the same technology could be used for monitoring applications in the indoor environment. It could be used to detect emergency situations or to detect intruders. We shall examine reasons why this choice might be a suitable one. We shall then propose a MAC layer protocol to accomplish this task. Since in case of emergency we might require to obtain data from only one node for an extended duration, flexibility in implementation is required. We shall develop an adaptive MAC protocol where this would be possible. We accomplish this by including two protocol modes called the Icarus mode, which is to be used in case of an emergency and the Resync mode which is used when normality is restored. A significant problem at high frequencies is that the beam becomes increasingly narrow and behaves more in a ray like condition. This implies that particularly in an indoor environment it is possible that the beam may be accidentally blocked. In this case the node must be able shift the beam in order to enable communication. We demonstrate three such strategies and offer a comparative analysis.M.S.Committee Chair: Chang, Gee-Kung; Committee Member: Barry , John; Committee Member: Gaylord, To
    corecore