7 research outputs found

    Performance analysis of single-slave Bluetooth piconets under cochannel interference

    Get PDF
    We present an analytical model for single-slave Bluetooth piconets when the coexistence of multiple interfering devices produces collisions. Closed-form expressions for the channel throughput and the mean packet delay are obtained, including the time spent waiting on the node's queue. The effect of propagation losses and asynchronous piconets are also discussed. The results of the analysis are validated through simulation.Ministerio de Ciencia y Tecnología TIC2001-1868-C03-02Ministerio de Ciencia y Tecnología TIC2000-0087-P4-0

    Soft real-time communications over Bluetooth under interferences from ISM devices

    Get PDF
    Bluetooth is a suitable technology to support soft real-time applications like multimedia streams at the personal area network level. In this paper, we analytically evaluate the worst-case deadline failure probability of Bluetooth packets under co-channel interference as a way to provide statistical guarantees when transmitting soft real-time traffic using ACL links. We consider the interference from independent Bluetooth devices, as well as from other devices operating in the ISM band like 802.11b/g and Zigbee. Finally, we show as an example how to use our model to obtain some results for the transmission of a voice stream.Ministerio de Ciencia y Tecnología TIC2001-1868-C03-0

    Bluetooth performance in the presence of 802.11b WLAN

    Full text link

    RSSI Based Indoor Passive Localization for Intrusion Detection and Tracking

    Get PDF
    A real time system for intrusion detection and tracking based on wireless sensor network technology is designed by using the IITH mote which is de- veloped and designed in IIT Hyderabad as the communication module in the network.This paper describes the Device-Free Passive Localization system based on RSSI.The main objective of this paper is to design a DFP Local- ization system that is easily redeployable, recon�gurable, easy to use, and operates in real time. In addition the detection of humans is to be done.The em- bedded intrusion detection algorithm is designed so that it is able to cope with the limited resources, in terms of computational power and available memory space, of the microcontroller unit (MCU) found in the nodes. and various challenges and problem faced during the real test bed deployment and also proposed solutions to overcome them.We presented an alternative algo- rithm based on the minimum Euclidean distance classi�er.our result shows that the localization accuracy of this system is increased when using the proposed algorith

    Co-existence of wireless communication systems in ISM bands: An analytical study

    Get PDF
    Ph.DDOCTOR OF PHILOSOPH

    Power-Constrained Fuzzy Logic Control of Video Streaming over a Wireless Interconnect

    Get PDF
    Wireless communication of video, with Bluetooth as an example, represents a compromise between channel conditions, display and decode deadlines, and energy constraints. This paper proposes fuzzy logic control (FLC) of automatic repeat request (ARQ) as a way of reconciling these factors, with a 40% saving in power in the worst channel conditions from economizing on transmissions when channel errors occur. Whatever the channel conditions are, FLC is shown to outperform the default Bluetooth scheme and an alternative Bluetooth-adaptive ARQ scheme in terms of reduced packet loss and delay, as well as improved video quality

    Wireless Technologies in Factory Automation

    Get PDF
    corecore