SlideShare a Scribd company logo
1 of 2
Download to read offline
International Association of Scientific Innovation and Research (IASIR)
(An Association Unifying the Sciences, Engineering, and Applied Research)
International Journal of Software and Web Sciences (IJSWS)
www.iasir.net
IJSWS 14-458; © 2014, IJSWS All Rights Reserved Page 58
ISSN (Print): 2279-0063
ISSN (Online): 2279-0071
Piconet
Dr. Himani Goyal1
, Sandeep.D*2
Venu.R*3
Raghavendra Pokuri *4
, Sandeep Kathula *5
, Naveen Battula *6
*1
Dean , Dept.of Electronics and Communications, *2,*3,*4,*5,*6,
Student
MLR Institute of Technology, Dundigal, Hyderabad-43 Telangana, India
_________________________________________________________________________________________
Abstract: Bluetooth, the wireless protocol which uses a short range radio technology to simplify data
transmission among internet devices over short distances facilitates a typical way to connect and exchange
information between two or more devices through the creation of wireless Personal Area Networks (PANs)
whose specifications are licensed by Bluetooth SIG (Special Interest Group) thereby supporting a dynamic
topology known as piconet or PAN. A piconet can be visualized as an ad-hoc computer network of devices
which use the protocols of Bluetooth technology.
Keywords: Piconet, Scatternet, Master-Slave, Bluetooth.
__________________________________________________________________________________________
I. Introduction
A piconet is a formation of network units. Piconet is a combination of PICO and NET, where PICO signifies
very small or one-trillionth whereas NET signifies network. More often than not, 'piconet' signifies the very
concept of 'PAN'(Personal Area Network). The Bluetooth protocols permit only one master device to
interconnect with up to 7 active slave devices. A piconet is thus formed when at least two devices connect say a
portable PC and a mobile phone.
II. Description
When two devices come within an acceptable range of each other, a Bluetooth link becomes feasible. Thus, in
compliance to perfect specifications, one of the devices plays the role of MASTER whereas the other device
plays the role of SLAVE. The master device determines not only the frequency hopping patterns but also the
phases for propitious hopping sequences. In a single piconet, there can be only one master. At any given time of
interval, a slave can take the form of either of the following nodes: a) Active node, b) Sniff node, c) Hold node,
and d) Park Node
III. Scatternet Formation
Bluetooth devices can simultaneously participate in multiple piconets because of the time-division nature of
resources. Such a device could be a master of one piconet and slave in another piconet, or slave in both the
piconets. However, the device cannot be a master in both the piconets. Such an interaction of multiple piconets
is known as a scatternet. A scatternet is a connected set of piconets and each piconet consists of single master
and multiple slaves (set of slaves). A slave can take part in another piconet which is within the proximity to
establish a communication link. One misconception about bluetooth specification is that, per piconet a
maximum of 8 devices can (1 master+ 7 slaves) only can be present or involve in communication. However, the
truth is that there can be at the most 7 ACTIVE slaves whereas there can be any number of parked slaves in a
piconet (up to 255 pragmatically). The master has the capability to “swap out” active slaves for parked slaves.
By swapping, master can manage piconets in order to connect large number of devices.
Himani Goyal et al., International Journal of Software and Web Sciences, 10(1), September-November, 2014, pp. 58-59
IJSWS 14-458; © 2014, IJSWS All Rights Reserved Page 59
IV. Limitation
By installing a fake bluetooth access point, bluetooth internet access point may be affected. A device may have
similar name as the actual access point thereby configuring and allowing the same PIN number. Thus, the
internet can be accessed from a fake bluetooth access point. Moreover, hackers can exploit mobile owner's via
bluetooth. Consider the two standard commands that are sufficient for stealing the phonebook information from
a T610 mobile phone of Sony Ericsson: (1) hcitool command and (2) obexftp command. Another risk is that
the pairing process is implemented in wide variety of mobiles, i.e., the list of discovered devices on the mobile
phones may not display the actual bluetooth address or may display some other name of the located device. An
authorized user has complete idea regarding the resources available. Hence the probability of the authorized user
committing a crime can never be proscribed.
V. Conclusions
A device which is enabled by bluetooth technology operates either as slave or a master if it desires to
communicate with other devices. Multiple bluetooth enabled devices may communicate internally within a
specific geographic location, thereby forming a piconet, with their time slots controlled on a time-division
multiplexing basis by the master and all follow the frequency hopping patterns of the master. A star topology is
thus used in bluetooth piconets, in which, the master device is placed at the center of the star, which
communicates with the slaves present. By using bridge nodes, interpiconet communication is possible.
Acknowledgements
The authors are indebted to Professor Ujjwala Rekha of JNTU, Hyderabad for her continued cooperation and patronage. In particular, we are
grateful to Sharath Devata of JNTUH, Computer Science Department for his everlasting motivation. F.A would like to extend his deepest
appreciation to his parents for their sustained support. S.A would like to appreciate the guidance given by supervisors as well as other panels
especially for their valuable, stimulating suggestions. Last but not the least, T.A would like to acknowledge with much appreciation the
crucial role of all research scholars of Computer Science Engineering Department of JNTU-Hyderabad.
References
1. Fundamentals of Mobile Computing by Patnaik, Prasant Kumar, Mall, Rajib, PHI learning.
2. Mobile Computing -Technology, Applications and Service Creation by Ashok k Talukder, Roopa Yavagal, McGraw Hill.
3. Mobile Communications by Jochen Schiller,PHI/Pearson Education,2/e,2003.
4. Wireless Communications and Networks, PHI/Pearson Education,2002.
5. Principles of Wireless Networks by Kaveh Pahlavan, Prasanth Krishnamoorthy, PHI/Pearson Education,2003.
6. Principles of Mobile Computing by Uwe Hansmann, Lothar Merk,Martin S.Nicklons and Thomas Stober, Springer, New
York,2003.
7. Mobile Communication Systems by Hazysztof Wesolowshi, John Wiley and Sons Ltd,2002.
About the Authors
First Author: Raghavendra Pokuri is a final year Computer Science Engineering student pursuing his Bachelors in Technology from JNTU-
Hyderabad. His fields of interests include research on the captivating subjects of Mobile computing, Data Mining and Data Warehousing,
ad-hoc &sensor networks and extensive C& Java programming.
Second Author: Sandeep Kathula is a final year Computer Science engineering student pursuing his Bachelors in Technology from the
esteemed college of JNTU-Hyderabad. His fields of interest include extensive research on Mobile communications, Information retrieval
systems, Data Mining and Warehousing, SQL programming and Web Programming.
Third Author: Naveen Battula is a final year Computer Science Engineering student pursuing his Bachelors in Technology from JNTU-
Hyderabad. His fields of interest include substantial research on Database Transactions and Concurrency control, Mobile App development,
Storage and Indexing algorithms, Schema Refinement and Relational Calculus.

More Related Content

Similar to Piconet Formation and Scatternet

Location based information sharing system for mobile devices
Location based information sharing system for mobile devicesLocation based information sharing system for mobile devices
Location based information sharing system for mobile deviceseSAT Journals
 
Fundamental Concept of Internet of Things
Fundamental Concept of Internet of ThingsFundamental Concept of Internet of Things
Fundamental Concept of Internet of ThingsIRJET Journal
 
RPL AND COAP PROTOCOLS, EXPERIMENTAL ANALYSIS FOR IOT: A CASE STUDY
RPL AND COAP PROTOCOLS, EXPERIMENTAL ANALYSIS FOR IOT: A CASE STUDYRPL AND COAP PROTOCOLS, EXPERIMENTAL ANALYSIS FOR IOT: A CASE STUDY
RPL AND COAP PROTOCOLS, EXPERIMENTAL ANALYSIS FOR IOT: A CASE STUDYijasuc
 
RPL AND COAP PROTOCOLS, EXPERIMENTAL ANALYSIS FOR IOT: A CASE STUDY
RPL AND COAP PROTOCOLS, EXPERIMENTAL ANALYSIS FOR IOT: A CASE STUDYRPL AND COAP PROTOCOLS, EXPERIMENTAL ANALYSIS FOR IOT: A CASE STUDY
RPL AND COAP PROTOCOLS, EXPERIMENTAL ANALYSIS FOR IOT: A CASE STUDYijasuc
 
RPL AND COAP PROTOCOLS, EXPERIMENTAL ANALYSIS FOR IOT: A CASE STUDY
RPL AND COAP PROTOCOLS, EXPERIMENTAL ANALYSIS FOR IOT: A CASE STUDYRPL AND COAP PROTOCOLS, EXPERIMENTAL ANALYSIS FOR IOT: A CASE STUDY
RPL AND COAP PROTOCOLS, EXPERIMENTAL ANALYSIS FOR IOT: A CASE STUDYijasuc
 
A survey on various technologies available for Smart lab based on Internet of...
A survey on various technologies available for Smart lab based on Internet of...A survey on various technologies available for Smart lab based on Internet of...
A survey on various technologies available for Smart lab based on Internet of...IJSRD
 
Data Communication in Internet of Things: Vision, Challenges and Future Direc...
Data Communication in Internet of Things: Vision, Challenges and Future Direc...Data Communication in Internet of Things: Vision, Challenges and Future Direc...
Data Communication in Internet of Things: Vision, Challenges and Future Direc...TELKOMNIKA JOURNAL
 
An Event-based Middleware for Syntactical Interoperability in Internet of Th...
An Event-based Middleware for Syntactical Interoperability  in Internet of Th...An Event-based Middleware for Syntactical Interoperability  in Internet of Th...
An Event-based Middleware for Syntactical Interoperability in Internet of Th...IJECEIAES
 
Iaetsd bluetooth based smart sensor networks
Iaetsd bluetooth based smart sensor networksIaetsd bluetooth based smart sensor networks
Iaetsd bluetooth based smart sensor networksIaetsd Iaetsd
 
Multimedia based IoT-centric smart framework for eLearning paradigm Muhammad ...
Multimedia based IoT-centric smart framework for eLearning paradigm Muhammad ...Multimedia based IoT-centric smart framework for eLearning paradigm Muhammad ...
Multimedia based IoT-centric smart framework for eLearning paradigm Muhammad ...eraser Juan José Calderón
 
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdfHOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdfKanagarajanSwamiappa
 
IRJET -Securing Data in Distributed System using Blockchain and AI
IRJET -Securing Data in Distributed System using Blockchain and AIIRJET -Securing Data in Distributed System using Blockchain and AI
IRJET -Securing Data in Distributed System using Blockchain and AIIRJET Journal
 
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...IJCSIS Research Publications
 
RT-RCT: an online tool for real-time retrieval of connected things
RT-RCT: an online tool for real-time retrieval of connected thingsRT-RCT: an online tool for real-time retrieval of connected things
RT-RCT: an online tool for real-time retrieval of connected thingsjournalBEEI
 
OPTIMIZING SMART THINGS ADDRESSING THROUGH THE ZIGBEE-BASED INTERNET OF THINGS
OPTIMIZING SMART THINGS ADDRESSING THROUGH THE ZIGBEE-BASED INTERNET OF THINGSOPTIMIZING SMART THINGS ADDRESSING THROUGH THE ZIGBEE-BASED INTERNET OF THINGS
OPTIMIZING SMART THINGS ADDRESSING THROUGH THE ZIGBEE-BASED INTERNET OF THINGSIJCNCJournal
 
IoT–smart contracts in data trusted exchange supplied chain based on block ch...
IoT–smart contracts in data trusted exchange supplied chain based on block ch...IoT–smart contracts in data trusted exchange supplied chain based on block ch...
IoT–smart contracts in data trusted exchange supplied chain based on block ch...IJECEIAES
 

Similar to Piconet Formation and Scatternet (20)

7 (1)
7 (1)7 (1)
7 (1)
 
Location based information sharing system for mobile devices
Location based information sharing system for mobile devicesLocation based information sharing system for mobile devices
Location based information sharing system for mobile devices
 
Fundamental Concept of Internet of Things
Fundamental Concept of Internet of ThingsFundamental Concept of Internet of Things
Fundamental Concept of Internet of Things
 
RPL AND COAP PROTOCOLS, EXPERIMENTAL ANALYSIS FOR IOT: A CASE STUDY
RPL AND COAP PROTOCOLS, EXPERIMENTAL ANALYSIS FOR IOT: A CASE STUDYRPL AND COAP PROTOCOLS, EXPERIMENTAL ANALYSIS FOR IOT: A CASE STUDY
RPL AND COAP PROTOCOLS, EXPERIMENTAL ANALYSIS FOR IOT: A CASE STUDY
 
RPL AND COAP PROTOCOLS, EXPERIMENTAL ANALYSIS FOR IOT: A CASE STUDY
RPL AND COAP PROTOCOLS, EXPERIMENTAL ANALYSIS FOR IOT: A CASE STUDYRPL AND COAP PROTOCOLS, EXPERIMENTAL ANALYSIS FOR IOT: A CASE STUDY
RPL AND COAP PROTOCOLS, EXPERIMENTAL ANALYSIS FOR IOT: A CASE STUDY
 
RPL AND COAP PROTOCOLS, EXPERIMENTAL ANALYSIS FOR IOT: A CASE STUDY
RPL AND COAP PROTOCOLS, EXPERIMENTAL ANALYSIS FOR IOT: A CASE STUDYRPL AND COAP PROTOCOLS, EXPERIMENTAL ANALYSIS FOR IOT: A CASE STUDY
RPL AND COAP PROTOCOLS, EXPERIMENTAL ANALYSIS FOR IOT: A CASE STUDY
 
A survey on various technologies available for Smart lab based on Internet of...
A survey on various technologies available for Smart lab based on Internet of...A survey on various technologies available for Smart lab based on Internet of...
A survey on various technologies available for Smart lab based on Internet of...
 
Data Communication in Internet of Things: Vision, Challenges and Future Direc...
Data Communication in Internet of Things: Vision, Challenges and Future Direc...Data Communication in Internet of Things: Vision, Challenges and Future Direc...
Data Communication in Internet of Things: Vision, Challenges and Future Direc...
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
An Event-based Middleware for Syntactical Interoperability in Internet of Th...
An Event-based Middleware for Syntactical Interoperability  in Internet of Th...An Event-based Middleware for Syntactical Interoperability  in Internet of Th...
An Event-based Middleware for Syntactical Interoperability in Internet of Th...
 
Iaetsd bluetooth based smart sensor networks
Iaetsd bluetooth based smart sensor networksIaetsd bluetooth based smart sensor networks
Iaetsd bluetooth based smart sensor networks
 
Multimedia based IoT-centric smart framework for eLearning paradigm Muhammad ...
Multimedia based IoT-centric smart framework for eLearning paradigm Muhammad ...Multimedia based IoT-centric smart framework for eLearning paradigm Muhammad ...
Multimedia based IoT-centric smart framework for eLearning paradigm Muhammad ...
 
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdfHOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
 
IRJET -Securing Data in Distributed System using Blockchain and AI
IRJET -Securing Data in Distributed System using Blockchain and AIIRJET -Securing Data in Distributed System using Blockchain and AI
IRJET -Securing Data in Distributed System using Blockchain and AI
 
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
 
RT-RCT: an online tool for real-time retrieval of connected things
RT-RCT: an online tool for real-time retrieval of connected thingsRT-RCT: an online tool for real-time retrieval of connected things
RT-RCT: an online tool for real-time retrieval of connected things
 
Iot
IotIot
Iot
 
U - 4 Emerging.pptx
U - 4 Emerging.pptxU - 4 Emerging.pptx
U - 4 Emerging.pptx
 
OPTIMIZING SMART THINGS ADDRESSING THROUGH THE ZIGBEE-BASED INTERNET OF THINGS
OPTIMIZING SMART THINGS ADDRESSING THROUGH THE ZIGBEE-BASED INTERNET OF THINGSOPTIMIZING SMART THINGS ADDRESSING THROUGH THE ZIGBEE-BASED INTERNET OF THINGS
OPTIMIZING SMART THINGS ADDRESSING THROUGH THE ZIGBEE-BASED INTERNET OF THINGS
 
IoT–smart contracts in data trusted exchange supplied chain based on block ch...
IoT–smart contracts in data trusted exchange supplied chain based on block ch...IoT–smart contracts in data trusted exchange supplied chain based on block ch...
IoT–smart contracts in data trusted exchange supplied chain based on block ch...
 

Recently uploaded

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 

Recently uploaded (20)

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 

Piconet Formation and Scatternet

  • 1. International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Software and Web Sciences (IJSWS) www.iasir.net IJSWS 14-458; © 2014, IJSWS All Rights Reserved Page 58 ISSN (Print): 2279-0063 ISSN (Online): 2279-0071 Piconet Dr. Himani Goyal1 , Sandeep.D*2 Venu.R*3 Raghavendra Pokuri *4 , Sandeep Kathula *5 , Naveen Battula *6 *1 Dean , Dept.of Electronics and Communications, *2,*3,*4,*5,*6, Student MLR Institute of Technology, Dundigal, Hyderabad-43 Telangana, India _________________________________________________________________________________________ Abstract: Bluetooth, the wireless protocol which uses a short range radio technology to simplify data transmission among internet devices over short distances facilitates a typical way to connect and exchange information between two or more devices through the creation of wireless Personal Area Networks (PANs) whose specifications are licensed by Bluetooth SIG (Special Interest Group) thereby supporting a dynamic topology known as piconet or PAN. A piconet can be visualized as an ad-hoc computer network of devices which use the protocols of Bluetooth technology. Keywords: Piconet, Scatternet, Master-Slave, Bluetooth. __________________________________________________________________________________________ I. Introduction A piconet is a formation of network units. Piconet is a combination of PICO and NET, where PICO signifies very small or one-trillionth whereas NET signifies network. More often than not, 'piconet' signifies the very concept of 'PAN'(Personal Area Network). The Bluetooth protocols permit only one master device to interconnect with up to 7 active slave devices. A piconet is thus formed when at least two devices connect say a portable PC and a mobile phone. II. Description When two devices come within an acceptable range of each other, a Bluetooth link becomes feasible. Thus, in compliance to perfect specifications, one of the devices plays the role of MASTER whereas the other device plays the role of SLAVE. The master device determines not only the frequency hopping patterns but also the phases for propitious hopping sequences. In a single piconet, there can be only one master. At any given time of interval, a slave can take the form of either of the following nodes: a) Active node, b) Sniff node, c) Hold node, and d) Park Node III. Scatternet Formation Bluetooth devices can simultaneously participate in multiple piconets because of the time-division nature of resources. Such a device could be a master of one piconet and slave in another piconet, or slave in both the piconets. However, the device cannot be a master in both the piconets. Such an interaction of multiple piconets is known as a scatternet. A scatternet is a connected set of piconets and each piconet consists of single master and multiple slaves (set of slaves). A slave can take part in another piconet which is within the proximity to establish a communication link. One misconception about bluetooth specification is that, per piconet a maximum of 8 devices can (1 master+ 7 slaves) only can be present or involve in communication. However, the truth is that there can be at the most 7 ACTIVE slaves whereas there can be any number of parked slaves in a piconet (up to 255 pragmatically). The master has the capability to “swap out” active slaves for parked slaves. By swapping, master can manage piconets in order to connect large number of devices.
  • 2. Himani Goyal et al., International Journal of Software and Web Sciences, 10(1), September-November, 2014, pp. 58-59 IJSWS 14-458; © 2014, IJSWS All Rights Reserved Page 59 IV. Limitation By installing a fake bluetooth access point, bluetooth internet access point may be affected. A device may have similar name as the actual access point thereby configuring and allowing the same PIN number. Thus, the internet can be accessed from a fake bluetooth access point. Moreover, hackers can exploit mobile owner's via bluetooth. Consider the two standard commands that are sufficient for stealing the phonebook information from a T610 mobile phone of Sony Ericsson: (1) hcitool command and (2) obexftp command. Another risk is that the pairing process is implemented in wide variety of mobiles, i.e., the list of discovered devices on the mobile phones may not display the actual bluetooth address or may display some other name of the located device. An authorized user has complete idea regarding the resources available. Hence the probability of the authorized user committing a crime can never be proscribed. V. Conclusions A device which is enabled by bluetooth technology operates either as slave or a master if it desires to communicate with other devices. Multiple bluetooth enabled devices may communicate internally within a specific geographic location, thereby forming a piconet, with their time slots controlled on a time-division multiplexing basis by the master and all follow the frequency hopping patterns of the master. A star topology is thus used in bluetooth piconets, in which, the master device is placed at the center of the star, which communicates with the slaves present. By using bridge nodes, interpiconet communication is possible. Acknowledgements The authors are indebted to Professor Ujjwala Rekha of JNTU, Hyderabad for her continued cooperation and patronage. In particular, we are grateful to Sharath Devata of JNTUH, Computer Science Department for his everlasting motivation. F.A would like to extend his deepest appreciation to his parents for their sustained support. S.A would like to appreciate the guidance given by supervisors as well as other panels especially for their valuable, stimulating suggestions. Last but not the least, T.A would like to acknowledge with much appreciation the crucial role of all research scholars of Computer Science Engineering Department of JNTU-Hyderabad. References 1. Fundamentals of Mobile Computing by Patnaik, Prasant Kumar, Mall, Rajib, PHI learning. 2. Mobile Computing -Technology, Applications and Service Creation by Ashok k Talukder, Roopa Yavagal, McGraw Hill. 3. Mobile Communications by Jochen Schiller,PHI/Pearson Education,2/e,2003. 4. Wireless Communications and Networks, PHI/Pearson Education,2002. 5. Principles of Wireless Networks by Kaveh Pahlavan, Prasanth Krishnamoorthy, PHI/Pearson Education,2003. 6. Principles of Mobile Computing by Uwe Hansmann, Lothar Merk,Martin S.Nicklons and Thomas Stober, Springer, New York,2003. 7. Mobile Communication Systems by Hazysztof Wesolowshi, John Wiley and Sons Ltd,2002. About the Authors First Author: Raghavendra Pokuri is a final year Computer Science Engineering student pursuing his Bachelors in Technology from JNTU- Hyderabad. His fields of interests include research on the captivating subjects of Mobile computing, Data Mining and Data Warehousing, ad-hoc &sensor networks and extensive C& Java programming. Second Author: Sandeep Kathula is a final year Computer Science engineering student pursuing his Bachelors in Technology from the esteemed college of JNTU-Hyderabad. His fields of interest include extensive research on Mobile communications, Information retrieval systems, Data Mining and Warehousing, SQL programming and Web Programming. Third Author: Naveen Battula is a final year Computer Science Engineering student pursuing his Bachelors in Technology from JNTU- Hyderabad. His fields of interest include substantial research on Database Transactions and Concurrency control, Mobile App development, Storage and Indexing algorithms, Schema Refinement and Relational Calculus.