SlideShare a Scribd company logo
1 of 6
Download to read offline
D.C. Wyld, et al. (Eds): CCSEA 2011, CS & IT 02, pp. 18–23, 2011.
© CS & IT-CSCP 2011 DOI : 10.5121/csit.2011.1203
AN EXPANDED BLUETOOTH NETWORK-A
SOLUTION TO THE SHORT RANGE BLUETOOTH
COMMUNICATION
Preetha K G
Department of Information Technology,
Rajagiri School of Engineering & Technology, Cochin, India
preetha_kg@rajagiritech.ac.in
ABSTRACT
Bluetooth is a short range, low power, low cost wireless communication technology designed to
connect phones, laptops and PDAs. The greater availability of portable devices with Bluetooth
connectivity imposes wireless connection between enabled devices. This paper considers the
problems of Bluetooth communication and also proposes a new expanded network to overcome
the basic limitation of Bluetooth devices that is the range constraint. This creates a network of
devices that will include laptops, set top devices and also mobile phones. The main purpose of
this proposal is to establish a network will enable the users to communicate outside the range
without any range constraint.
KEYWORDS
Bluetooth, Pico net, Scatter net, Frequency hoping, ISM
1. INTRODUCTION
Mobility originated from the desire to move either toward resources or away from scarcity.
Mobile computing is concerned about the movement of physical devices, user applications and
mobile agents. Bluetooth technology developed by Ericsson Mobile Communications and it
replace the cables used to connect devices, with one universal short-range radio link. These radio
waves are operating in the unlicensed ISM band and also having 2.45 GHz frequency. Bluetooth
uses a spread-spectrum frequency-hopping technique which takes a narrowband signal and
spreads it over a broader portion of the available radio frequency band. . This prevents the
interference with other devices. Since only the intended receiver is aware of the transmitter’s
hopping pattern, only that receiver can make sense of the data being transmitted. This technique
ensures Bluetooth’s security and limits interference.
The Bluetooth technology eliminates the need for cables, connectors. So the expenses for cables
and connectors are reduced, which gives large economic benefit [1]. Bluetooth devices are very
small so that it can be attached to any device without reducing its portability. Bluetooth devices
are low cost devices and the utilization of power is also very less. The effective range of
Bluetooth devices is 32 feet (10 meters). A major challenge lies in Bluetooth communication is
this range constraint. This paper studies the basic limitation of Bluetooth communication and also
presents a possible solution for this. The paper tries to explore the basic routing algorithm and it
can be used for expanding the range of Bluetooth devices.
Computer Science & Information Technology (CS & IT) 19
The rest of this paper is organized as follows. Section 2 gives the overview of Bluetooth
technology. Section 3 describes the complexities involved in Bluetooth communication. A brief
description of the proposed protocol is given in section 4. Salient features of new protocol are
described in section in 5. The application and the area of significance are discussed in section 6
and conclusion is given in section 7.
2. BLUETOOTH ARCHITECTURE-AN OVERVIEW
Bluetooth is the term used to describe the protocol of a short range (10 meter) communication. It
places an important roll in wireless communication. The goal of Bluetooth specification is the
uniform structure for a wide range of devices to connect and communicate with each other. These
specifications are developed and licensed by the Bluetooth Special Interest Group (SIG). The
Bluetooth SIG consists of companies in the areas of telecommunication, computing, networking,
and consumer electronics. The data transfer rate of Bluetooth is 1Mbps. The Bluetooth
specification can support three synchronous voice channels at 64 Kbps each. Bluetooth devices
typically require 1mW of power to operate.
Bluetooth devices are organized as a network of two to eight devices called Pico nets. A
Bluetooth piconet consists of a single master device and one or more slave devices. Each node in
the Pico net uses the same frequency hopping technique. A slave or master in one Pico net can
communicate with the master or slave in other Pico net. This bridging structure is termed as
scatter net (Figure 1). In addition to seven slave nodes in the Pico net, there can be up to 255
nodes in the network. The Bluetooth model is working under the concept of Bluetooth protocol
stack. Bluetooth network is divided into different layers as shown in (Figure 2). It has many
protocols groups loosely into layers. This layering structure is different from any other reference
model. The radio layer is somewhat similar to the physical layer of internet model. By using
frequency hoping technique reduce the interferences. Base band layer is roughly equivalent to
Mac sub layer in internet. In this TDMA is used as the access method. Single slave and multiple
slave communication is possible in this layer. There are two links used for communication.
Synchronous connection oriented and asynchronous connection less. Next layer is the L2CAP
layer. Multiplexing, Segmentation and Reassembly, QOS and group management are the main
duties of the L2CAP layer.
Figure 1.Scatternet
20 Computer Science & Information Technology (CS & IT)
Figure 2.Bluetooth Layers
Bluetooth networking transmits data via low-power radio waves. It communicates on an
International agreed frequency (ISM) of 2.45 gigahertz. A Time Division Multiplexing (TDD)
technique is used in this communication. This divides the channel into 625p slots and, with a 1
MBPS symbol rate, a slot can carry up to 625 bits. Transmission occurs in packets and each
packet is transmitted on a different hop frequency with a maximum frequency hopping rate of
1600 hops/s. Based on output power rating Bluetooth devices are divided into three classes. Most
powerful devices are in class 1 category. These can have up to 100 mW of power, and a range of
about 40 m - 100 m (130 - 330 ft). Class 2 devices are lower power, with up to 2.5 mW of power
and a range of about 15 m - 30 m (50 - 100 ft). Third category is class 3. This uses less power up
to 1 mW and a range of about 5 m - 10 m (16 - 33 ft). Most of the Bluetooth devices will fall
under class 2 or class 3.
3. DRAWBACK AND CHALLENGES IN BLUETOOTH COMMUNICATION
The present scenario using Bluetooth has many drawbacks. Data can be transmitted only over
short distances, network overloading may occur, if one path is busy then we have to wait till the
path is cleared, data transmission rate will be slow if network is busy etc are some of the
obscurity in Bluetooth network. The devices in the network have low power. So this low power
limits the range of a Bluetooth device to about 10 meters (32 feet paper). Even with the low
power, Bluetooth doesn't require line of sight between communicating devices. The nodes in Pico
net are classified into four categories according to their states. These are active, idle, parked and
sniffing. Data exchange takes place only between active nodes but the nodes periodically change
its states. This imposes a greater challenge in Bluetooth design. Which node is selected as a
master, and how many nodes that can be used to connect to other Pico net are the challenging
areas.
Bluetooth is primarily intended to facilitate short range data transfer using low power. The main
disadvantage of this technology is the nodes involve in the data transfer have to be very near each
other. Because of this range constraint most of the time the greater number of Bluetooth enabled
devices are inactive. So the communication throughput is decreased. In this paper we are
concentrating on the range limitation of Bluetooth communication and we are trying to expand
the range by using the enabled intermediate devices.
Computer Science & Information Technology (CS & IT) 21
4. EXPANDING THE RANGE-A NEW SOLUTION
The main goal of this paper is to overcome the basic limitation of Bluetooth devices. The range of
Bluetooth devices are usually of 10 meters. This range restriction is overcome by allowing a
device to another device outside its range through an intermediary device, which has access to
both the devices (figure 3).
First step of expansion is to establish a network. To set up the network each device broadcast a
list of accessible devices within its range. Each device updates their table of accessible devices
according to this list. Each device prepared a list of other devices that can be accessed directly or
indirectly. If a device wishes to send a message to another device in this list, a path is found
through intermediary device through which the destination can be reached and forwards the
message to the first device in the path. But the intermediate devices dynamically choose the path
through which the message is forwarded depending upon the traffic and availability of devices.
Figure 3.Expanding range using intermediate device
5. SALIENT FEATURES OF NEW SOFTWARE
This paper tries to expand the range of Bluetooth data transfer by involving intermediate devices
between the sender and receiver. A message from the source goes to one or more intermediate
device finally ends up at destination. This is typically considers as a client server architecture.
The device which sends the data is the client and receives the data is the server. The client node
expands its network by searching for the Bluetooth enabled device in its range. All devices
continue this searching for devices within the range until the destination is reached. A model of
the proposed system is in the figure 4.
Figure 4.Model for the proposed system
22 Computer Science & Information Technology (CS & IT)
This network consists of devices of smaller speed and relatively smaller network. The routing
algorithm I have chosen is distance vector routing algorithm. The operation of the algorithm is as
follows. When a node starts it can directly access its immediate neighbours. Each node creates a
list of nodes that can be accessible. Each node, on a regular basis, sends to each neighbour its own
current idea of the total cost to get to all the destinations it knows of. Cost is determined by the
number of nodes in the path. The neighbouring nodes examine this information and update their
routing table accordingly. Over time, all the nodes in the network will discover the best next hop
for all destinations, and the best total cost.
A node wants to send message to another node in the network first it check whether this node is in
the range of the sender. If so then it can directly send message. Otherwise it will set a path to the
destination through the intermediate devices. Each device sends their accessible device to its
neighbours so the sender can calculate the shortest path to the destination. Once the routing path
is finalised then sender node can access the destination. Each intermediate node in the path is
involved in the routing process and each will be aware of the data transmission.
In any Bluetooth data transfer the nodes are not fixed so any node can move from the network
and new node can come up at any time. If any node is added to the network then it finds its
immediate neighbours and prepares its routing table. And this routing table is send to all nodes
that can be directly accessible. If any node wishes to move out of the network then it send a
withdraw message to their immediate nodes. In both cases all nodes update their routing table
accordingly. If any node updates its routing table then inform their neighbours and send the
routing table to them.
When a node send a packet to another node in the network if it reaches correctly at the destination
then it will send the acknowledgement. If the sender does not get the acknowledgement before the
timer turned off then the route discovery process is repeated. Sender must send the same packet
through another shortest route if the current route does not exist. The path selection is crucial and
is to be selected depends on the shortest path criteria and load balancing criteria.
6. APPLICATIONS AND AREA OF SIGNIFICANTS
With the development of Bluetooth technology, many Bluetooth devices come into our living,
such as Bluetooth earphone, Bluetooth home-network etc. Recently, the Bluetooth technology is
the fastest growing technology which enables devices to connect and communicate. Data
dissemination is the main application intended to the Bluetooth network. We can send text
messages as well as picture messages to any Bluetooth enabled devices via Bluetooth
communication. Bluetooth is actually the replacement of traditional wired serial communication
in test equipment, GPS receivers and medical equipment.
The popular use of Bluetooth technology is wireless control and communication between any
devices with Bluetooth capability. The devices can be cell phone, mouse, keyboard, cordless
headset, camera, PDA, printer, computer etc. Bluetooth can also help different devices to
communicate with each other. For example, if you have a phone, a PDA, and a computer and all
the three devices have Bluetooth capabilities, then with the support of appropriate software on
each device you can look up a phone number on your PDA and then place a call direct from the
laptop or PDA without touching your cell phone. Ad hoc networking and remote control are the
significant applications. Another attractive application is wireless networking between PCs in a
confined space where little bandwidth is required. By using Bluetooth communication technology
transfer of files between devices via OBEX is possible.
Computer Science & Information Technology (CS & IT) 23
7. CONCLUSIONS
In this paper, I have listed out the common shortcomings of Bluetooth data transmission.
Efficiency of connection establishment has been analysed and suggested a method to overcome
the basic limitation of Bluetooth communication that is the range constraint. With this new
network, the range of the devices that can be accessible is expanded. This expansion is done
through the enabled intermediate devices. When a device tries to connect to other devices, first it
finds the devices that can be accessed directly or indirectly. Then it can establish a path to the
destination through the intermediate devices and forward the message.
REFERENCES
[1] Alessi, S. M., and Trollip, S R(2001), Multimedia for learning. A pearson Education Company
[2] Andrew S.Tanenbaum ,Computer Networks (Fourth Edition):, Pearson Education, Asia/ PHI
[3] Callaghan, J. (2002), "Inside Intranets & Extranets: Knowledge Management AND the Struggle for
Power", Palgrave Macmillan, ISBN 0-333-98743-8
[4] David Alex Lamb; Electronic Mail: The Basics, 1999.
[5] Haartsen, “The Bluetooth radio system”, IEEE Personal Communications Magazine, vol.7, no.1,
pp.28-36, 2000
[6] Matt, Marc Simon and Ilker, An introduction to open source software-A Guide
[7] Pelgrum,W. J:1996, The Educational Potential of New Information Technologies
[8] THE HINDU-Online edition of India's National Newspaper, Monday, Oct 28, 2002
[9] Unwin, Tim (2009). ICT4D: Information and Communication Technology for Development,
Cambridge University Press. ISBN 9780521712361
Authors
Mrs. Preetha K G completed her B Tech and M
Tech in Computer Science and Engineering form
Calicut University and Dr. MGR University in
the year 1999 and 2007 respectively. She is
associated with Rajagiri School of Engineering
& Technology, Cochin, India as an Assistant
professor in Department of Information
Technology. She has around 10 years of
academic experience. Currently she is perusing
PhD at Cochin University of Science
& Technology. Her area of research is
optimizing routing in Wireless Networks.

More Related Content

What's hot

Chapter 7 principles of data communication
Chapter 7   principles of data communicationChapter 7   principles of data communication
Chapter 7 principles of data communicationN. A. Sutisna
 
Telecommunications and networks
Telecommunications and networksTelecommunications and networks
Telecommunications and networksSopon Tumchota
 
Telecommunications and networks
Telecommunications and networksTelecommunications and networks
Telecommunications and networksBikash Kumar
 
Ct3210321037
Ct3210321037Ct3210321037
Ct3210321037IJMER
 
Data Communication and Computer Networking Part # 2
Data Communication and Computer Networking Part # 2Data Communication and Computer Networking Part # 2
Data Communication and Computer Networking Part # 2Quaid-i-Azam University
 
Analysis of Handoff techniques used for hybrid networks: cellular/WLAN
Analysis of Handoff techniques used for hybrid networks: cellular/WLAN  Analysis of Handoff techniques used for hybrid networks: cellular/WLAN
Analysis of Handoff techniques used for hybrid networks: cellular/WLAN IJORCS
 
15EC44T unit 1 data communication and networking
15EC44T unit 1 data communication and networking15EC44T unit 1 data communication and networking
15EC44T unit 1 data communication and networkingshrinivasgnaik
 
Internship Presentation B.Tech Communication Networks
Internship Presentation B.Tech Communication NetworksInternship Presentation B.Tech Communication Networks
Internship Presentation B.Tech Communication NetworksKalyan Acharjya
 
Telecommunication and network
Telecommunication and networkTelecommunication and network
Telecommunication and networkNirajan Silwal
 
Lesson 5 data communication and networking (136 kb)
Lesson 5   data communication and networking (136 kb)Lesson 5   data communication and networking (136 kb)
Lesson 5 data communication and networking (136 kb)IMRAN KHAN
 
Data Communication & Network
Data Communication & NetworkData Communication & Network
Data Communication & NetworkMaulen Bale
 
Dcn(data communication and computer network)
Dcn(data communication and computer network)Dcn(data communication and computer network)
Dcn(data communication and computer network)Ramakrishna kapa
 
Chapter 8 the role of networking in manufacturing
Chapter 8   the role of networking in manufacturingChapter 8   the role of networking in manufacturing
Chapter 8 the role of networking in manufacturingN. A. Sutisna
 
Chapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and NetworksChapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and NetworksShafaan Khaliq Bhatti
 
Chapter 5 introduction to computer communication networks
Chapter 5   introduction to computer communication networksChapter 5   introduction to computer communication networks
Chapter 5 introduction to computer communication networksN. A. Sutisna
 
A Review on Cooperative Communication Protocols in Wireless World
A Review on Cooperative Communication  Protocols in Wireless World A Review on Cooperative Communication  Protocols in Wireless World
A Review on Cooperative Communication Protocols in Wireless World ijwmn
 

What's hot (20)

Chapter 7 principles of data communication
Chapter 7   principles of data communicationChapter 7   principles of data communication
Chapter 7 principles of data communication
 
Telecommunications and networks
Telecommunications and networksTelecommunications and networks
Telecommunications and networks
 
Telecommunications and networks
Telecommunications and networksTelecommunications and networks
Telecommunications and networks
 
Ct3210321037
Ct3210321037Ct3210321037
Ct3210321037
 
Dcn introduction
Dcn introductionDcn introduction
Dcn introduction
 
Data Communication and Computer Networking Part # 2
Data Communication and Computer Networking Part # 2Data Communication and Computer Networking Part # 2
Data Communication and Computer Networking Part # 2
 
Analysis of Handoff techniques used for hybrid networks: cellular/WLAN
Analysis of Handoff techniques used for hybrid networks: cellular/WLAN  Analysis of Handoff techniques used for hybrid networks: cellular/WLAN
Analysis of Handoff techniques used for hybrid networks: cellular/WLAN
 
15EC44T unit 1 data communication and networking
15EC44T unit 1 data communication and networking15EC44T unit 1 data communication and networking
15EC44T unit 1 data communication and networking
 
Internship Presentation B.Tech Communication Networks
Internship Presentation B.Tech Communication NetworksInternship Presentation B.Tech Communication Networks
Internship Presentation B.Tech Communication Networks
 
Telecommunication and network
Telecommunication and networkTelecommunication and network
Telecommunication and network
 
Lesson 5 data communication and networking (136 kb)
Lesson 5   data communication and networking (136 kb)Lesson 5   data communication and networking (136 kb)
Lesson 5 data communication and networking (136 kb)
 
Data Communication & Network
Data Communication & NetworkData Communication & Network
Data Communication & Network
 
Trends of it
Trends of itTrends of it
Trends of it
 
Dcn(data communication and computer network)
Dcn(data communication and computer network)Dcn(data communication and computer network)
Dcn(data communication and computer network)
 
Chapter 8 the role of networking in manufacturing
Chapter 8   the role of networking in manufacturingChapter 8   the role of networking in manufacturing
Chapter 8 the role of networking in manufacturing
 
Data Communication & Networking
Data Communication & Networking Data Communication & Networking
Data Communication & Networking
 
Chapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and NetworksChapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and Networks
 
Chapter 5 introduction to computer communication networks
Chapter 5   introduction to computer communication networksChapter 5   introduction to computer communication networks
Chapter 5 introduction to computer communication networks
 
Case study of wireless networking for small business
Case study of wireless networking for small businessCase study of wireless networking for small business
Case study of wireless networking for small business
 
A Review on Cooperative Communication Protocols in Wireless World
A Review on Cooperative Communication  Protocols in Wireless World A Review on Cooperative Communication  Protocols in Wireless World
A Review on Cooperative Communication Protocols in Wireless World
 

Similar to AN EXPANDED BLUETOOTH NETWORK-A SOLUTION TO THE SHORT RANGE BLUETOOTH COMMUNICATION

A Novel Solution To The Short Range Bluetooth Communication
A Novel Solution To The Short Range Bluetooth Communication   A Novel Solution To The Short Range Bluetooth Communication
A Novel Solution To The Short Range Bluetooth Communication pijans
 
A Modern Study of Bluetooth Wireless Technology
A Modern Study of Bluetooth Wireless Technology A Modern Study of Bluetooth Wireless Technology
A Modern Study of Bluetooth Wireless Technology ijcseit
 
Bluetooth technology_new.pptx
Bluetooth technology_new.pptxBluetooth technology_new.pptx
Bluetooth technology_new.pptxSumitSabale4
 
Bluetooth Technology By Volkan Sevindik
Bluetooth Technology By Volkan SevindikBluetooth Technology By Volkan Sevindik
Bluetooth Technology By Volkan Sevindikvsevindik
 
siddharth bt ppt.pptx
siddharth bt ppt.pptxsiddharth bt ppt.pptx
siddharth bt ppt.pptxHindujaBairi
 
Bluetooth, RFID and WiMAX Technologies
Bluetooth, RFID and WiMAX TechnologiesBluetooth, RFID and WiMAX Technologies
Bluetooth, RFID and WiMAX TechnologiesMukesh Chinta
 
Bluetooth Technology -- detailed explanation
Bluetooth Technology -- detailed explanation Bluetooth Technology -- detailed explanation
Bluetooth Technology -- detailed explanation Siva Pradeep Bolisetti
 
Blue star seminar report dated 18 march
Blue star seminar report dated 18 marchBlue star seminar report dated 18 march
Blue star seminar report dated 18 marchbhadreshagm
 
Iaetsd bluetooth based smart sensor networks
Iaetsd bluetooth based smart sensor networksIaetsd bluetooth based smart sensor networks
Iaetsd bluetooth based smart sensor networksIaetsd Iaetsd
 
Overview of Bluetooth technology
Overview of Bluetooth technologyOverview of Bluetooth technology
Overview of Bluetooth technologySuman Bhattacharyya
 
Presentation about Bluetooth and working principles.pptx
Presentation about Bluetooth and working principles.pptxPresentation about Bluetooth and working principles.pptx
Presentation about Bluetooth and working principles.pptxMugabo4
 

Similar to AN EXPANDED BLUETOOTH NETWORK-A SOLUTION TO THE SHORT RANGE BLUETOOTH COMMUNICATION (20)

A Novel Solution To The Short Range Bluetooth Communication
A Novel Solution To The Short Range Bluetooth Communication   A Novel Solution To The Short Range Bluetooth Communication
A Novel Solution To The Short Range Bluetooth Communication
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
 
A Modern Study of Bluetooth Wireless Technology
A Modern Study of Bluetooth Wireless Technology A Modern Study of Bluetooth Wireless Technology
A Modern Study of Bluetooth Wireless Technology
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth technology_new.pptx
Bluetooth technology_new.pptxBluetooth technology_new.pptx
Bluetooth technology_new.pptx
 
Arthi.pptx
Arthi.pptxArthi.pptx
Arthi.pptx
 
Khetarpal
KhetarpalKhetarpal
Khetarpal
 
Bluetooth Technology By Volkan Sevindik
Bluetooth Technology By Volkan SevindikBluetooth Technology By Volkan Sevindik
Bluetooth Technology By Volkan Sevindik
 
siddharth bt ppt.pptx
siddharth bt ppt.pptxsiddharth bt ppt.pptx
siddharth bt ppt.pptx
 
Bluetooth, RFID and WiMAX Technologies
Bluetooth, RFID and WiMAX TechnologiesBluetooth, RFID and WiMAX Technologies
Bluetooth, RFID and WiMAX Technologies
 
Bluetooth Technology -- detailed explanation
Bluetooth Technology -- detailed explanation Bluetooth Technology -- detailed explanation
Bluetooth Technology -- detailed explanation
 
IoT Network Technologies
IoT Network TechnologiesIoT Network Technologies
IoT Network Technologies
 
Blue star seminar report dated 18 march
Blue star seminar report dated 18 marchBlue star seminar report dated 18 march
Blue star seminar report dated 18 march
 
Bluetooth
Bluetooth Bluetooth
Bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Iaetsd bluetooth based smart sensor networks
Iaetsd bluetooth based smart sensor networksIaetsd bluetooth based smart sensor networks
Iaetsd bluetooth based smart sensor networks
 
Overview of Bluetooth technology
Overview of Bluetooth technologyOverview of Bluetooth technology
Overview of Bluetooth technology
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Presentation about Bluetooth and working principles.pptx
Presentation about Bluetooth and working principles.pptxPresentation about Bluetooth and working principles.pptx
Presentation about Bluetooth and working principles.pptx
 

More from cscpconf

ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR cscpconf
 
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATIONcscpconf
 
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...cscpconf
 
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIESPROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIEScscpconf
 
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGICA SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGICcscpconf
 
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS cscpconf
 
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS cscpconf
 
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTICTWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTICcscpconf
 
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINDETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINcscpconf
 
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...cscpconf
 
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEMIMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEMcscpconf
 
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...cscpconf
 
AUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEWAUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEWcscpconf
 
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORKCLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORKcscpconf
 
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...cscpconf
 
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATAPROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATAcscpconf
 
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCHCHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCHcscpconf
 
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...cscpconf
 
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGESOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGEcscpconf
 
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTGENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTcscpconf
 

More from cscpconf (20)

ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
 
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
 
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
 
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIESPROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
 
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGICA SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
 
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
 
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
 
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTICTWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
 
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINDETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
 
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
 
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEMIMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
 
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
 
AUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEWAUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEW
 
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORKCLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
 
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
 
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATAPROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
 
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCHCHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
 
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
 
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGESOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
 
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTGENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
 

Recently uploaded

Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 

Recently uploaded (20)

Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 

AN EXPANDED BLUETOOTH NETWORK-A SOLUTION TO THE SHORT RANGE BLUETOOTH COMMUNICATION

  • 1. D.C. Wyld, et al. (Eds): CCSEA 2011, CS & IT 02, pp. 18–23, 2011. © CS & IT-CSCP 2011 DOI : 10.5121/csit.2011.1203 AN EXPANDED BLUETOOTH NETWORK-A SOLUTION TO THE SHORT RANGE BLUETOOTH COMMUNICATION Preetha K G Department of Information Technology, Rajagiri School of Engineering & Technology, Cochin, India preetha_kg@rajagiritech.ac.in ABSTRACT Bluetooth is a short range, low power, low cost wireless communication technology designed to connect phones, laptops and PDAs. The greater availability of portable devices with Bluetooth connectivity imposes wireless connection between enabled devices. This paper considers the problems of Bluetooth communication and also proposes a new expanded network to overcome the basic limitation of Bluetooth devices that is the range constraint. This creates a network of devices that will include laptops, set top devices and also mobile phones. The main purpose of this proposal is to establish a network will enable the users to communicate outside the range without any range constraint. KEYWORDS Bluetooth, Pico net, Scatter net, Frequency hoping, ISM 1. INTRODUCTION Mobility originated from the desire to move either toward resources or away from scarcity. Mobile computing is concerned about the movement of physical devices, user applications and mobile agents. Bluetooth technology developed by Ericsson Mobile Communications and it replace the cables used to connect devices, with one universal short-range radio link. These radio waves are operating in the unlicensed ISM band and also having 2.45 GHz frequency. Bluetooth uses a spread-spectrum frequency-hopping technique which takes a narrowband signal and spreads it over a broader portion of the available radio frequency band. . This prevents the interference with other devices. Since only the intended receiver is aware of the transmitter’s hopping pattern, only that receiver can make sense of the data being transmitted. This technique ensures Bluetooth’s security and limits interference. The Bluetooth technology eliminates the need for cables, connectors. So the expenses for cables and connectors are reduced, which gives large economic benefit [1]. Bluetooth devices are very small so that it can be attached to any device without reducing its portability. Bluetooth devices are low cost devices and the utilization of power is also very less. The effective range of Bluetooth devices is 32 feet (10 meters). A major challenge lies in Bluetooth communication is this range constraint. This paper studies the basic limitation of Bluetooth communication and also presents a possible solution for this. The paper tries to explore the basic routing algorithm and it can be used for expanding the range of Bluetooth devices.
  • 2. Computer Science & Information Technology (CS & IT) 19 The rest of this paper is organized as follows. Section 2 gives the overview of Bluetooth technology. Section 3 describes the complexities involved in Bluetooth communication. A brief description of the proposed protocol is given in section 4. Salient features of new protocol are described in section in 5. The application and the area of significance are discussed in section 6 and conclusion is given in section 7. 2. BLUETOOTH ARCHITECTURE-AN OVERVIEW Bluetooth is the term used to describe the protocol of a short range (10 meter) communication. It places an important roll in wireless communication. The goal of Bluetooth specification is the uniform structure for a wide range of devices to connect and communicate with each other. These specifications are developed and licensed by the Bluetooth Special Interest Group (SIG). The Bluetooth SIG consists of companies in the areas of telecommunication, computing, networking, and consumer electronics. The data transfer rate of Bluetooth is 1Mbps. The Bluetooth specification can support three synchronous voice channels at 64 Kbps each. Bluetooth devices typically require 1mW of power to operate. Bluetooth devices are organized as a network of two to eight devices called Pico nets. A Bluetooth piconet consists of a single master device and one or more slave devices. Each node in the Pico net uses the same frequency hopping technique. A slave or master in one Pico net can communicate with the master or slave in other Pico net. This bridging structure is termed as scatter net (Figure 1). In addition to seven slave nodes in the Pico net, there can be up to 255 nodes in the network. The Bluetooth model is working under the concept of Bluetooth protocol stack. Bluetooth network is divided into different layers as shown in (Figure 2). It has many protocols groups loosely into layers. This layering structure is different from any other reference model. The radio layer is somewhat similar to the physical layer of internet model. By using frequency hoping technique reduce the interferences. Base band layer is roughly equivalent to Mac sub layer in internet. In this TDMA is used as the access method. Single slave and multiple slave communication is possible in this layer. There are two links used for communication. Synchronous connection oriented and asynchronous connection less. Next layer is the L2CAP layer. Multiplexing, Segmentation and Reassembly, QOS and group management are the main duties of the L2CAP layer. Figure 1.Scatternet
  • 3. 20 Computer Science & Information Technology (CS & IT) Figure 2.Bluetooth Layers Bluetooth networking transmits data via low-power radio waves. It communicates on an International agreed frequency (ISM) of 2.45 gigahertz. A Time Division Multiplexing (TDD) technique is used in this communication. This divides the channel into 625p slots and, with a 1 MBPS symbol rate, a slot can carry up to 625 bits. Transmission occurs in packets and each packet is transmitted on a different hop frequency with a maximum frequency hopping rate of 1600 hops/s. Based on output power rating Bluetooth devices are divided into three classes. Most powerful devices are in class 1 category. These can have up to 100 mW of power, and a range of about 40 m - 100 m (130 - 330 ft). Class 2 devices are lower power, with up to 2.5 mW of power and a range of about 15 m - 30 m (50 - 100 ft). Third category is class 3. This uses less power up to 1 mW and a range of about 5 m - 10 m (16 - 33 ft). Most of the Bluetooth devices will fall under class 2 or class 3. 3. DRAWBACK AND CHALLENGES IN BLUETOOTH COMMUNICATION The present scenario using Bluetooth has many drawbacks. Data can be transmitted only over short distances, network overloading may occur, if one path is busy then we have to wait till the path is cleared, data transmission rate will be slow if network is busy etc are some of the obscurity in Bluetooth network. The devices in the network have low power. So this low power limits the range of a Bluetooth device to about 10 meters (32 feet paper). Even with the low power, Bluetooth doesn't require line of sight between communicating devices. The nodes in Pico net are classified into four categories according to their states. These are active, idle, parked and sniffing. Data exchange takes place only between active nodes but the nodes periodically change its states. This imposes a greater challenge in Bluetooth design. Which node is selected as a master, and how many nodes that can be used to connect to other Pico net are the challenging areas. Bluetooth is primarily intended to facilitate short range data transfer using low power. The main disadvantage of this technology is the nodes involve in the data transfer have to be very near each other. Because of this range constraint most of the time the greater number of Bluetooth enabled devices are inactive. So the communication throughput is decreased. In this paper we are concentrating on the range limitation of Bluetooth communication and we are trying to expand the range by using the enabled intermediate devices.
  • 4. Computer Science & Information Technology (CS & IT) 21 4. EXPANDING THE RANGE-A NEW SOLUTION The main goal of this paper is to overcome the basic limitation of Bluetooth devices. The range of Bluetooth devices are usually of 10 meters. This range restriction is overcome by allowing a device to another device outside its range through an intermediary device, which has access to both the devices (figure 3). First step of expansion is to establish a network. To set up the network each device broadcast a list of accessible devices within its range. Each device updates their table of accessible devices according to this list. Each device prepared a list of other devices that can be accessed directly or indirectly. If a device wishes to send a message to another device in this list, a path is found through intermediary device through which the destination can be reached and forwards the message to the first device in the path. But the intermediate devices dynamically choose the path through which the message is forwarded depending upon the traffic and availability of devices. Figure 3.Expanding range using intermediate device 5. SALIENT FEATURES OF NEW SOFTWARE This paper tries to expand the range of Bluetooth data transfer by involving intermediate devices between the sender and receiver. A message from the source goes to one or more intermediate device finally ends up at destination. This is typically considers as a client server architecture. The device which sends the data is the client and receives the data is the server. The client node expands its network by searching for the Bluetooth enabled device in its range. All devices continue this searching for devices within the range until the destination is reached. A model of the proposed system is in the figure 4. Figure 4.Model for the proposed system
  • 5. 22 Computer Science & Information Technology (CS & IT) This network consists of devices of smaller speed and relatively smaller network. The routing algorithm I have chosen is distance vector routing algorithm. The operation of the algorithm is as follows. When a node starts it can directly access its immediate neighbours. Each node creates a list of nodes that can be accessible. Each node, on a regular basis, sends to each neighbour its own current idea of the total cost to get to all the destinations it knows of. Cost is determined by the number of nodes in the path. The neighbouring nodes examine this information and update their routing table accordingly. Over time, all the nodes in the network will discover the best next hop for all destinations, and the best total cost. A node wants to send message to another node in the network first it check whether this node is in the range of the sender. If so then it can directly send message. Otherwise it will set a path to the destination through the intermediate devices. Each device sends their accessible device to its neighbours so the sender can calculate the shortest path to the destination. Once the routing path is finalised then sender node can access the destination. Each intermediate node in the path is involved in the routing process and each will be aware of the data transmission. In any Bluetooth data transfer the nodes are not fixed so any node can move from the network and new node can come up at any time. If any node is added to the network then it finds its immediate neighbours and prepares its routing table. And this routing table is send to all nodes that can be directly accessible. If any node wishes to move out of the network then it send a withdraw message to their immediate nodes. In both cases all nodes update their routing table accordingly. If any node updates its routing table then inform their neighbours and send the routing table to them. When a node send a packet to another node in the network if it reaches correctly at the destination then it will send the acknowledgement. If the sender does not get the acknowledgement before the timer turned off then the route discovery process is repeated. Sender must send the same packet through another shortest route if the current route does not exist. The path selection is crucial and is to be selected depends on the shortest path criteria and load balancing criteria. 6. APPLICATIONS AND AREA OF SIGNIFICANTS With the development of Bluetooth technology, many Bluetooth devices come into our living, such as Bluetooth earphone, Bluetooth home-network etc. Recently, the Bluetooth technology is the fastest growing technology which enables devices to connect and communicate. Data dissemination is the main application intended to the Bluetooth network. We can send text messages as well as picture messages to any Bluetooth enabled devices via Bluetooth communication. Bluetooth is actually the replacement of traditional wired serial communication in test equipment, GPS receivers and medical equipment. The popular use of Bluetooth technology is wireless control and communication between any devices with Bluetooth capability. The devices can be cell phone, mouse, keyboard, cordless headset, camera, PDA, printer, computer etc. Bluetooth can also help different devices to communicate with each other. For example, if you have a phone, a PDA, and a computer and all the three devices have Bluetooth capabilities, then with the support of appropriate software on each device you can look up a phone number on your PDA and then place a call direct from the laptop or PDA without touching your cell phone. Ad hoc networking and remote control are the significant applications. Another attractive application is wireless networking between PCs in a confined space where little bandwidth is required. By using Bluetooth communication technology transfer of files between devices via OBEX is possible.
  • 6. Computer Science & Information Technology (CS & IT) 23 7. CONCLUSIONS In this paper, I have listed out the common shortcomings of Bluetooth data transmission. Efficiency of connection establishment has been analysed and suggested a method to overcome the basic limitation of Bluetooth communication that is the range constraint. With this new network, the range of the devices that can be accessible is expanded. This expansion is done through the enabled intermediate devices. When a device tries to connect to other devices, first it finds the devices that can be accessed directly or indirectly. Then it can establish a path to the destination through the intermediate devices and forward the message. REFERENCES [1] Alessi, S. M., and Trollip, S R(2001), Multimedia for learning. A pearson Education Company [2] Andrew S.Tanenbaum ,Computer Networks (Fourth Edition):, Pearson Education, Asia/ PHI [3] Callaghan, J. (2002), "Inside Intranets & Extranets: Knowledge Management AND the Struggle for Power", Palgrave Macmillan, ISBN 0-333-98743-8 [4] David Alex Lamb; Electronic Mail: The Basics, 1999. [5] Haartsen, “The Bluetooth radio system”, IEEE Personal Communications Magazine, vol.7, no.1, pp.28-36, 2000 [6] Matt, Marc Simon and Ilker, An introduction to open source software-A Guide [7] Pelgrum,W. J:1996, The Educational Potential of New Information Technologies [8] THE HINDU-Online edition of India's National Newspaper, Monday, Oct 28, 2002 [9] Unwin, Tim (2009). ICT4D: Information and Communication Technology for Development, Cambridge University Press. ISBN 9780521712361 Authors Mrs. Preetha K G completed her B Tech and M Tech in Computer Science and Engineering form Calicut University and Dr. MGR University in the year 1999 and 2007 respectively. She is associated with Rajagiri School of Engineering & Technology, Cochin, India as an Assistant professor in Department of Information Technology. She has around 10 years of academic experience. Currently she is perusing PhD at Cochin University of Science & Technology. Her area of research is optimizing routing in Wireless Networks.