SlideShare a Scribd company logo
2nd International Conference on Emerging Trends in Computer and Image Processing (ICETCIP'2012) June 30-July 1, 2012 Bali




                      Location Based Computation Sharing
                        Framework for Mobile Devices
                                   Samiul. Islam, Boraq. Ammourah, and Mohamad. Mahmoud


                                                                                 today’s mobile phones and smart phones and we have
  Abstract— Third generation and fourth generation mobile                        proposed our process sharing framework for mobile devices,
devices are providing various online services and applications to                based on this technology.
facilitate users with their rich web interfaces. Limited computing                  In section II and III of this paper, we have provided an
power and shorter battery life of mobile devices caused computation
                                                                                 overview of cellular network and working principle of
intensive application components to migrate to the external
computing resources. By elastic resource provisioning and the ability            Bluetooth. We have described our proposed framework in
to support large scale service deployment, mobile cloud computing                section IV. Section VI contains some part of evaluation of our
introduced an attractive platform for offloading the computational               framework and we concluded with section VII.
processes among mobile devices. In this paper we proposed a
location based computation sharing framework for mobile devices in                           II. OVERVIEW OF CELLULAR NETWORK
which mobile devices locating in the same cell can share their
processing power. We introduced a certification technique by which                  Modern mobile phone networks use cells (Fig. 1) because
all mobile devices within 10 meters ranges can share their processing            radio frequencies are a limited, shared resource. Cell-sites and
power using Bluetooth technique without traditional 2 step                       handsets change frequency under computer control and use
verification process.                                                            low power transmitters so that a limited number of radio
                                                                                 frequencies can be simultaneously used by many callers with
  Keywords— Bluetooth Connectivity, Computational Process                        less interference. A cellular radio system provides a wireless
Sharing, Mobile Computing, Wireless Ad-hoc Network.
                                                                                 connection to the public telephone network for any user
                                                                                 location within the radio range of the system. The term mobile
                         I. INTRODUCTION
                                                                                 has traditionally been used to classify a radio terminal that can

T    ECHNOLOGICAL advance in radio communication
     introduced to us with wireless ad-hoc networks. These are
self-organizing networks that are formed from wireless
                                                                                 be moved during communication. Cellular systems
                                                                                 accommodate a large number of mobile units over a large area
                                                                                 within a limited frequency spectrum [3].
devices communicating with each other without the need of
any infrastructure. In these networks, each device (or node)
works as a terminal and a router at the same time. The nodes
are allowed to join or leave the network at any time. Nodes
may also move from one geographical position to another at
any time. Different wireless radio technologies were proposed
to enable wireless ad hoc networks; one of them is Bluetooth
[1]. The technology is promising in many ways. First,
Bluetooth devices are efficient with respect to power
consumption. Second, Bluetooth devices use a communication
mechanism that is noise-resistant and robust against
interference with neighboring Bluetooth devices. Third, the
cost of Bluetooth radio devices is relatively low. Bluetooth
also offers ad-hoc networking capabilities [2]. These                                               Fig.1 Mobile cell architecture.
advantages of Bluetooth led its deployment in a wide range of
                                                                                    A cellular network is used by the mobile phone operator to
   Samiul. Islam is with the Department of Computer Science, College of          achieve both coverage and capacity for their subscribers.
Computer Science and Information System in Najran University, Najran,            Large geographic areas are split into smaller cells to avoid
Saudi Arabia (phone: +966 75428610 ; Mobile: +966 501343118; e-mail:             line-of-sight signal loss and to support a large number of
samiul80@gmail.com).
   Boraq. Ammourah is with the Department of Computer Science, College           active phones in that area. All of the cell sites are connected
of Computer Science and Information System in Najran University, Najran,         to telephone exchanges (or switches), which in turn connect to
Saudi Arabia (phone: +966 75428615 ; Mobile: +966569596556; e-mail:              the public telephone network. Each cell contains at least a
mr.boraq@gmail.com).
   Mohamad. Mahmoud is with the MIS department in Salman bin Abdulaziz
University, Hot at Bani, Tamim, Saudi Arabia. (Phone: +966 543170968; e-
mail: m_awni1983@yahoo.co.uk ).

                                                                           156
2nd International Conference on Emerging Trends in Computer and Image Processing (ICETCIP'2012) June 30-July 1, 2012 Bali


                                                                                Legend:    M- Master device,   S- Slave device




                                                                                                M               S
                                                                                     S                                            M

                                                                                                      S                 S
                                                                                            S
                                                                                                                            S

                                                                                         Piconet- A                  Piconet- B

                                                                                            Fig. 3 Scatternet in a mobile cell
        Fig. 2 Communication of BTS and mobile phones
                                                                        i.e. a node can be a master in one piconet and a slave in
base transceiver station (BTS), under which all cell phones of          another. This permits the connection of several piconets as the
that cell are registered. The base transceiver station, or BTS,         nodes functioning in master/slave mode act gateways between
contains the equipment for transmitting and receiving radio             piconets. In the Bluetooth concept the network topology
signals (transceivers), antennas, and equipment for encrypting          resulting by the connection of piconets is called a scatternet
and decrypting communications with the base station                     (Fig. 3). A node can be active in only one piconet at time, and
controller (BSC). Fig. 2 shows BTS functionality in a simple            to operate as a member of another piconet, a node must switch
manner.                                                                 to the hopping frequency sequence of the other piconet [5].
   The base station subsystem (BSS) is the section of a                    The Bluetooth Core Specification provides for the
traditional cellular telephone network which is responsible for         connection of two or more piconets to form a scatternet, in
handling traffic and signaling between a mobile phone and               which certain devices simultaneously play the master role in
the network switching subsystem. The BSS carries                        one piconet and the slave role in another. A master Bluetooth
out transcoding of speech channels, allocation of radio                 device can communicate with a maximum of seven devices in
channels to mobile phones, paging, transmission                         a piconet (an ad-hoc computer network using Bluetooth
and reception over the air interface and many other tasks               technology), though not all devices reach this maximum. The
related to the radio network. Typically a BTS will have several         devices can switch roles, by agreement, and the slave can
transceivers (TRXs) which allow it to serve several different           become the master.
frequencies and different sectors of the cell (in the case of
sectorized base stations). A BTS is controlled by a parent base            A. Operations
station controller via the base station control function (BCF).            Bluetooth uses a radio technology called frequency-hopping
The BCF is implemented as a discrete unit or even                       spread spectrum, which chops up the data being sent and
incorporated in a TRX in compact base stations. The BCF                 transmits chunks of it on up to 79 bands (1 MHz each;
provides an operations and maintenance (O&M) connection to              centered from 2402 to 2480 MHz) in the range 2,400–
the network management system (NMS), and manages                        2,483.5 MHz (allowing for guard bands). This range is in the
operational states of each TRX, as well as software handling            globally unlicensed Industrial, Scientific and Medical (ISM)
and alarm collection. The basic structure and functions of the          2.4 GHz short-range radio frequency band. It usually performs
BTS remains the same regardless of the wireless technologies            800 hops per second, with AFH enabled [6].
[4].                                                                       Bluetooth operation relies on packet-based protocol with
                                                                        a master-slave structure. One master may communicate with
           III. BLUETOOTH: WORKING PRINCIPLE                            up to 7 slaves in a piconet; all devices share the master's clock.
   Bluetooth is a short-range radio technology that enables             Packet exchange is based on the basic clock, defined by the
wireless connectivity between mobile devices. When two                  master, which ticks at 312.5 µs intervals. Two clock ticks
Bluetooth devices come into each other’s communication                  make up a slot of 625 µs; two slots make up a slot pair of 1250
range, one of them assumes the role of master of the                    µs. In the simple case of single-slot packets the master
communication and the other becomes the slave. This simple              transmits in even slots and receives in odd slots; the slave,
“one hop” network is called a piconet, and may include up to            conversely, receives in even slots and transmits in odd slots.
seven active slaves connected to one master. As a matter of             Packets may be 1, 3 or 5 slots long but in all cases the master-
fact, there is no limit on the maximum number of slaves                 transmit will begin in even slots and the slave-transmit in odd
connected to one master but only seven of them can be active            slots. The master chooses which slave device to address;
at time, others have to be in so called parked state. The               typically, it switches rapidly from one device to another in
specification also allows multiple roles for the same device,           a round-robin fashion. Since it is the master that chooses
                                                                        which slave to address, whereas a slave is (in theory) supposed



                                                                  157
2nd International Conference on Emerging Trends in Computer and Image Processing (ICETCIP'2012) June 30-July 1, 2012 Bali


to listen in each receive slot, being a master is a lighter burden           state, they do not have addresses, but only listen enough to
than being a slave.                                                          keep their synchronization with the master and check for
   Bluetooth devices can be in 3 different power classes [7],                broadcast messages.
[8]:
                                                                                C. Security Method
Class 3: The lowest power, the max. range of this is 10m
Class 2: Max            range is about 50m (150ft)                              Authentication ensures the identity of Bluetooth devices. It
Class 1: Max range is about 100m (300ft)                                     authenticates the device at the other end of the link.
These ranges (Table-I) can be affected by environmental                      Authentication is accomplished by using a stored link key or
conditions i.e. furniture, walls, people so ranges can easily be             by pairing (entering a PIN). Pairing is a procedure that
reduced. Bluetooth is not a line of sight connection so it can be            authenticates two devices based on a common passkey,
used through walls and floors.                                               thereby creating a trusted relationship between those devices.
                                                                             An arbitrary but identical passkey must be entered on both
                           TABLE I                                           devices. As long as both devices are paired, the pairing
                      BLUETOOTH CLASSES                                      procedure is not required when connecting those devices again
                  Maximum permitted power Range                              (the existing link key is used for authentication). Devices
        Class                                                                without any input method, like headsets, have fixed passkeys.
                  (mW)       (dBm)        (m)
                                                                                Authorization is a process of deciding if a device is allowed
        Class 1 100               20               ~100                      to have access to a specific service. User interaction may be
        Class 2 2.5               4                ~10                       required unless the remote device has been marked as
                                                                             "trusted." Usually the user can set authorization on/off to
        Class 3 1                 0                ~5                        every remote device separately. Authorization always requires
The effective range varies due to propagation conditions,                    authentication.
material coverage, production sample variations, antenna                        Encryption protects communication against eavesdropping.
configurations and battery conditions. In most cases the                     For example, it ensures that nobody can listen to what a laptop
effective range of class 2 devices is extended if they connect               transmits to a phone. The length of the encryption key can be
to a class 1 transceiver, compared to a pure class 2 network.                between 8 and 128 bits.
This is accomplished by the higher sensitivity and
transmission power of Class 1 devices.                                                        IV. PROPOSED FRAMEWORK
   B. Connection Protocols                                                      All mobile devices under a BTS can be grouped in a
   Bluetooth connections are established via the following                   multiple piconets, where the number of piconets depends on
techniques [9], [10]:                                                        the cell size of that specific BTS depending on geographical
   Standby: Devices not connected in a piconet are in standby                position. Each piconet can contain maximum n number of
mode. In this mode, they listen for messages every 1.28 s over               mobile devices at any given time, where 0≤ n. When an
32 hop frequencies (fewer in Japan, Spain, and France).                      application initiates in any node of a piconet of our proposed
   Page/inquiry: If a device wishes to make a connection with                framework, it has been marked as an active node and acquire a
another device, it sends out a page message if the address is                certificate from local BTS with a time stamp for that node.
known, or an inquiry followed by a page message if it is                     When an active node has been selected, it discovers the idle
unknown. The master unit sends out 16 identical page                         nodes asynchronously within its piconet and use the certificate
messages on 16 hop frequencies to the slave unit. If there is no             to create a private channel with the idle nodes to share their
response, the master retransmits on the other 16 hop                         processing powers. If the time stamp of an active node
frequencies. The inquiry method requires an extra response                   exceeds the duration more than 300 seconds, and/or the
from the slave unit, since the address is unknown to the master              number of idle nodes drop below a level m, where 1≤ m≤7,
unit.                                                                        the active node share its processes with the other available idle
   Active: Data transmission occurs.                                         nodes in different piconets through BTS. The proposed
   Hold: When either the master or slave wishes, a hold mode                 framework is composed of several algorithms implemented in
is established or no data is transmitted in order to conserve                middle layer of BTS and in the application layer of cell
power. Otherwise, there is a constant data exchange. A typical               phones. Those can be categorized as mentioned in later sub
reason for going into hold mode is the connection of several                 sections.
piconets.                                                                       A. Certificates:
   Sniff: The sniff mode, applicable only to slave units, is for                Subscriber, MS (Mobile Station) or mobile phone connects
power conservation, though not at as reduced a level as hold.                to mobile network through BTS. When a mobile phone
During this mode, the slave does not take an active role in the              switches on, it registers with the corresponding BTS of its cell.
piconet, but listens at a reduced level. This is usually a                   In our proposed framework, during the registration process of
programmable setting.                                                        mobile devices, it will acquire a certificate from the
   Park: Park mode is a more reduced level of activity than the              corresponding BTS, containing subscriber’s information and
hold mode. The slave is synchronized to the piconet, thus not                service provider’s information. This certificate authenticated
requiring full reactivation, but is not part of the traffic. In this

                                                                       158
2nd International Conference on Emerging Trends in Computer and Image Processing (ICETCIP'2012) June 30-July 1, 2012 Bali


the device with a device generated 64 bit encrypted security               finding other devices listening to the same frequency hop at
key. An active node shares this key in the idle node discovery             the same time. The inquirer keeps alternating in a range of
process within the piconets. During the link establishment                 frequencies - 32 out of the 79 available hops known to all the
process and data exchange process between these two types of               devices. On the opposite side of the connection, a node that
nodes, the security key will automatically authorize an active             wants to be discovered has to switch to the query scan state
node to send and retrieve its data from an idle node without               and keeps listening to ID packets generated from the inquirers.
prompting the user.                                                        The scanner switches between the frequencies hops at a slower
                                                                           rate than the inquirer’s in order to increase the chance of
   B. Discover idle nodes with timestamp:
                                                                           finding each other in the same hop. When the scanner receives
   We require time synchronization between mobile nodes.                   one of those ID packets, it replies to it with a special packet
We assume clock ticking speeds of different nodes to be                    called the FHS [11], [12] packet. An FHS packet contains its
comparable. It means that when a idle node B i receives a clock            address and its clock value. The clock value is used for
value from an active node A i , node B i can synchronize with              synchronization purposes to make the link establishment
node A i , using A i ’s clock value. There is no globally common           procedure faster. In the paging procedures, the active node
clock for the mobile network, say MN. Assume that MN has                   switches to the page state and the idle must switch to the page
M channels available for its operations. Let this channel set be           scan state. Using the information obtained from the FHS
Cglobal = {C1, C2 , ... , CM}.                                             packet, the active node adds an offset value to its clock to have
   Each node in MN is assigned a unique identifier (Node ID)               the same clock value of the idle node so they are both become
in the range 1 to N. Each node knows its unique Node ID, but               synchronized to each other. After that, the active node
does not know how many other nodes there are and what their                attempts to contact the idle node by broadcasting again a
IDs are. Nodes are equipped with one transceiver (Transmitter              number of ID packets. If the idle node listens to one of these
& Receiver) capable of either receiving or transmitting at any             ID packets, it replies with another ID packet and go to the idle
given time. Nodes know about the global channel set Cglobal                response state. When this ID packet is received by the active
and the value of N. Also each node finds its set of usable                 node, it changes its state to the active response state. Then, the
channels (available channel set) by a periodic scanning                    active node sends an FHS packet.
mechanism. We assume nodes can detect collisions. An active
node transmits and receives alternatively on each channel of                                      V. RELATED WORK
its available channel set. During the transmit period it sends a
                                                                              Salonidis et. al. presents a distributed topology construction
query referred to as Active Node Query (ANQ) with node ID,
                                                                           scheme in Bluetooth networks [13]. The basic assumption
clock value of the node, available channel set and remaining
                                                                           behind the scheme is that all nodes are within transmission
time in ANQ. Every ANQ has limited time validity, Q t .
                                                                           range of each other. The nodes conduct a leader election
During the receiving period, inquiring node listens on the
                                                                           algorithm. The winner knows the identity of all nodes and uses
same channel that it transmitted previously, for duration of Q t .
                                                                           this information to design the desired topology. Existing
If a valid reply (Query Reply) is received, the queering node
                                                                           service discovery protocols such as Universal Plug and Play
sends an Acknowledgment (Ack) message, during the current
                                                                           (UPnP) [14], Service Location Protocol (SLP) [15] and
receiving period or during the next receiving period, on the
                                                                           Salutation focused on auto configuration issues allowing
same channel that it received the reply. Upon receiving a
                                                                           devices to automatically join the network and learn about its
Query Reply message, inquiring node discovers the sender of
                                                                           capabilities. However such approaches were designed for
the Query Reply.
                                                                           resource rich networks and are not suitable for resource
   C. Sharing and synchronization of process:                              constrained systems. Energy efficient service discovery has
   Bluetooth operates in the range of frequencies 2.4000 GHz               been done using power efficient wake-up scheduling
to 2.4835 GHz. It divides the medium to 79 channels each of 1              protocols, such as [16][17][18]. Bhagwat et al. presents a
MHz. The rest of the available frequencies are considered as               source routing mechanism for Bluetooth networks [19]. Das et
lower and upper band edges, in order to comply with the radio              al. [20] and Johanson et al. [21] present distributed scheduling
regulations of different countries. To establish a link between            policies for Bluetooth networks. Existing middleware
an active and idle node, the communicating nodes must                      solutions for wireless sensor networks usually have plug-in
perform two operations; the first is the query; in which one               system [22] for service discovery protocols or use their own
node gets the address of (or discovers) another node. The                  mechanisms [23]. TeenyLime [23] is a data-sharing
second is the paging, in which a link is constructed. The                  middleware designed for mobile sensors. It uses an operational
specifications of Bluetooth state that for one node to discover            setting where sensors are fixed and relatively powerful mobile
others, it must switch to the query state, and then, keeps                 sinks are used to collect data from sensors.
broadcasting small special packets (of 68 bits size), called the
ID packets. The contents of these packets are common to all                                       VI. EVALUATION
Bluetooth devices, and although called ID packets, they do not               Evaluation of certificate is our future work. The time
contain the identity of their senders. The inquirer’s ID packets           duration of idle node discovery procedure has been evaluated
must be broadcast in different frequency hops in hope of


                                                                     159
2nd International Conference on Emerging Trends in Computer and Image Processing (ICETCIP'2012) June 30-July 1, 2012 Bali


in a simulated environment. Discovery of each idle node is                           [5]    Gergely V. Záruba, Stefano Basagni and Imrich Chlamtac: Bluetrees –
                                                                                            Scatternet Formation to Enable Bluetooth-Based Ad Hoc Networks,
marked as T 1 and presented by (1).                                                         IEEE, 2001, ISBN 0-7803-7097-1.
                                                                                     [6]    http://www.radio-electronics.com/info/wireless/bluetooth/radio-
                               T 1 =2 Q t (M+1)M                        (1)                 interface-modulation.php.
                                                                                     [7]    Albert Huang and Larry Rudolph, Bluetooth for Programmers, 2005.
   The simulation was done by using the R [20] statistical
                                                                                     [8]    http://www.althos.com/tutorial/Bluetooth-tutorial-RF-Power-
package assuming that a network with 3 channels (M = 3).                                    Classes.html.
Also consider two nodes (A and B) in the network with                                [9]    K. Sand, Bluetooth, Tik-111.550 Seminar on Multimedia,
available channel sets A = {3}, B = {1,2,3}. The T1 duration                                Telecommunications Software and Multimedia Laboratory, Helsinki
                                                                                            University of Technology, Finland, March 1999.
is shown in the fig. 4.                                                              [10]   J. Haarsten, Bluetooth —the universal radio interface for adhoc wireless
              2Qt                                                                           connectivity, Ericsson Review 3 (4) (1988) 1 – 5. available
                                                                                            at http://www.ericsson.se/Review/er3 _ 98/art1/art1.html.
                                                                                     [11]   T. Salonidis, P. Bhagwat, L. Tassiulas, R. LaMaire, Distributed
                                                                                            Topology Construction of Bluetooth Personal Area Networks,
                                                                                            Proceedings. IEEE, Volume: 3, 2001, pp. 1577-1586, IEEE INFOCOM
                                                                                            2001.
                                                                                     [12]   A. El-Hoiydi, Interference Between Bluetooth Networks – Upper Bound
                2Qt (M+1)                                                                   on the Packet Error Rate, IEEE Communications Letters, Vol. 5, No. 6,
                                                                                            pp. 245-247, June 2001.
                                                                                     [13]   T. Salonidis, P. Bhagwat, L. Tassiulas, and R. Lamaire. Distributed
                                 T1 =2 Qt (M+1)M
                                                                                            topology construction of Bluetooth personal area networks. In
                      Fig. 4 T 1 duration for 3 channels                                    Proceedings of INFOCOM’2001, 2001.
                                                                                     [14]   Universal plug and play. http://www. upnp.org/.
                                                                                     [15]   E. Guttman. Service location protocol: Automatic discovery of IP
   We have evaluated our sharing and synchronization                                        network services. IEEE Internet Computing, 3(4):71-80, 1999.
algorithm in a simulated state with maximum 30 nodes. The                            [16]   W. Ye, J. Heidemann, and D. Estrin. Medium access control with
                                                                                            coordinated adaptive sleeping for wireless sensor networks. IEEE/ACM
result shows (fig. 5) the processing performance with time.
                                                                                            Trans. Netw. 12(3):493-506, 2004.
We assumed that every node has its own unique ID and a                               [17]   J. Polastre, J. Hill, and D. Culler. Versatile low power media access for
direct connection method has been used instead of certificate                               wireless sensor networks. In SenSys'04: 2nd international conference on
technique to evaluate their performances.                                                   Embedded networked sensor systems, pages 95-107, New York, 2004.
                                                                                     [18]   W. Ye, F. Silva, and J. Heidemann. Ultra-low duty cycle mac with
                                                                                            scheduled channel polling. In SenSys'06: Proceedings of the 4th
                                                                                            international conference on Embedded networked sensor systems, pages
                                                                                            321-334, New York, NY, USA, 2006. ACM Press.
                                                                      30             [19]   P. Bhagwat and R. Seigal. A routing vector method (RVM) for routing
                                                                      20                    in Bluetooth scatternets. In IEEE International Workshop on Mobile
                                                                      10                    Multimedia Communications (MoMuC’99), San Diego, CA, Nov 1999.
                                                                                     [20]   A. Das, A. Ghose, A. Razdan, H. Saran, and R. Shorey. Enhancing
                                                                                            performance of asynchronous data traffic over the Bluetooth wireless ad-
                                                                                            hoc network. INFOCOM’2001, Anchorage, AK, April 2001.
                                                                                     [21]   N. Johansson, Korner, and L. Tassiulas. A distributed scheduling
                                                                                            algorithm for a Bluetooth scatternet. ITC’2001, Salvador, Brazil, Dec.
                Fig. 5 Shared process performance measure                                   2001.
                                                                                     [22]   W. Heinzelman, A. Murphy, H. Carvalho, and M. Perillo. Middleware to
                                                                                            support sensor network applications, 2004.
                            VII. CONCLUSION                                          [23]   C. Curino, M. Giani, M. Giorgetta, and A. Giusti. Tiny lime: Bridging
   We have evaluated our result partially for idle node                                     mobile and sensor networks through middleware. In Tiny Lime:
                                                                                            Bridging Mobile and Sensor Networks through Middleware. March 8-
discovery and process sharing. Future work involved                                         12, 2005.
implementation and evaluation of certification algorithm,
Synchronization with BTS to share processing with the idle
node of different piconets within the same cell.. Few critical
concerns also need to be considered in future work, e.g. when
two active nodes try to share an idle node in concurrent time.
Fault tolerance mechanism need to be implemented as any
shared node can be switched of or change location without
prior notice.

                              REFERENCES
[1]   Bluetooth Core Specifications v2.1 + EDR,www.bluetooth.com.
[2]   Ahmed Jedda, The Device Discovery in Bluetooth Scatternet Formation
      Algorithms, Ottawa-Carleton Institute for Computer Science, University
      Of Ottawa, Canada, 2009.
[3]   Kamil Sh. Zigangirov, Theory of Code Division Multiple Access
      Communication, ISBN 0-471-45712-4, Institute of Electrical and
      Electronics Engineers, 2004.
[4]   http://en.wikipedia.org/wiki/Base_transceiver_station.




                                                                               160

More Related Content

What's hot

4G LTE Paper Group 9
4G LTE Paper Group 94G LTE Paper Group 9
4G LTE Paper Group 9eel4514team9
 
Mobile computing notes and material
Mobile computing notes and materialMobile computing notes and material
Mobile computing notes and materialSDMCET DHARWAD
 
Project Report (Basic Telecom) BSNL
Project Report (Basic Telecom) BSNLProject Report (Basic Telecom) BSNL
Project Report (Basic Telecom) BSNLPankaj Purbey
 
Overview of handover decision strategies in heterogeneous networks by narendr...
Overview of handover decision strategies in heterogeneous networks by narendr...Overview of handover decision strategies in heterogeneous networks by narendr...
Overview of handover decision strategies in heterogeneous networks by narendr...Narendra Prajapati
 
BSNL training report
BSNL training reportBSNL training report
BSNL training reportravi kant
 
Mobileinternet tomai-romana-2010
Mobileinternet tomai-romana-2010Mobileinternet tomai-romana-2010
Mobileinternet tomai-romana-2010Alexandra Rosca
 
Fookune ndss gsm (1)
Fookune ndss gsm (1)Fookune ndss gsm (1)
Fookune ndss gsm (1)Bhuwan Gupta
 
telecommunication
telecommunicationtelecommunication
telecommunicationsaroj455
 
Cellular Communication Report
Cellular Communication ReportCellular Communication Report
Cellular Communication ReportPrashant Gajendra
 
Bsnl project
Bsnl projectBsnl project
Bsnl projectnibedan
 
Gsm fundamentals
Gsm fundamentalsGsm fundamentals
Gsm fundamentalsmichaelugo
 
Bluetooth Technology Paper Presentation
Bluetooth Technology Paper PresentationBluetooth Technology Paper Presentation
Bluetooth Technology Paper Presentationguestac67362
 
Capacity planning in cellular network
Capacity planning in cellular networkCapacity planning in cellular network
Capacity planning in cellular networkShrutika Oswal
 

What's hot (20)

[11] Nu P 07 1
[11] Nu P 07 1[11] Nu P 07 1
[11] Nu P 07 1
 
4G LTE Paper Group 9
4G LTE Paper Group 94G LTE Paper Group 9
4G LTE Paper Group 9
 
It6601 mobile computing unit 3
It6601 mobile computing unit 3It6601 mobile computing unit 3
It6601 mobile computing unit 3
 
Mobile computing notes and material
Mobile computing notes and materialMobile computing notes and material
Mobile computing notes and material
 
Project Report (Basic Telecom) BSNL
Project Report (Basic Telecom) BSNLProject Report (Basic Telecom) BSNL
Project Report (Basic Telecom) BSNL
 
ADVANCED TELECOM BSNL
ADVANCED TELECOM BSNLADVANCED TELECOM BSNL
ADVANCED TELECOM BSNL
 
Overview of handover decision strategies in heterogeneous networks by narendr...
Overview of handover decision strategies in heterogeneous networks by narendr...Overview of handover decision strategies in heterogeneous networks by narendr...
Overview of handover decision strategies in heterogeneous networks by narendr...
 
BSNL training report
BSNL training reportBSNL training report
BSNL training report
 
Mobileinternet tomai-romana-2010
Mobileinternet tomai-romana-2010Mobileinternet tomai-romana-2010
Mobileinternet tomai-romana-2010
 
Fookune ndss gsm (1)
Fookune ndss gsm (1)Fookune ndss gsm (1)
Fookune ndss gsm (1)
 
telecommunication
telecommunicationtelecommunication
telecommunication
 
Cellular Communication Report
Cellular Communication ReportCellular Communication Report
Cellular Communication Report
 
Bsnl project
Bsnl projectBsnl project
Bsnl project
 
Gsm fundamentals
Gsm fundamentalsGsm fundamentals
Gsm fundamentals
 
Bluetooth Technology Paper Presentation
Bluetooth Technology Paper PresentationBluetooth Technology Paper Presentation
Bluetooth Technology Paper Presentation
 
Seminar on BSNL
Seminar on BSNLSeminar on BSNL
Seminar on BSNL
 
Mobile computing unit 1
Mobile computing unit 1Mobile computing unit 1
Mobile computing unit 1
 
Vip bsnl.ppt1
Vip bsnl.ppt1Vip bsnl.ppt1
Vip bsnl.ppt1
 
Capacity planning in cellular network
Capacity planning in cellular networkCapacity planning in cellular network
Capacity planning in cellular network
 
41 45
41 4541 45
41 45
 

Similar to Paper

An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...
An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...
An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...pijans
 
Introduction to Mobile adhoc-network
Introduction to Mobile adhoc-networkIntroduction to Mobile adhoc-network
Introduction to Mobile adhoc-networkSanjeev Kumar Jaiswal
 
A Review Of Development In Wireless Communication
A Review Of Development In Wireless CommunicationA Review Of Development In Wireless Communication
A Review Of Development In Wireless CommunicationEmily Smith
 
wireless communication ppt.pptx
wireless communication ppt.pptxwireless communication ppt.pptx
wireless communication ppt.pptxNidhiChandra24
 
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKS
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKSTHE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKS
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKSijwmn
 
Blackhole attack in Manet
Blackhole attack in ManetBlackhole attack in Manet
Blackhole attack in ManetProf Ansari
 
presentation on mobile computing
presentation on mobile computingpresentation on mobile computing
presentation on mobile computingBalakumar232
 
Study on Infrastructure Developments of Mobile Generations
Study on Infrastructure Developments of Mobile GenerationsStudy on Infrastructure Developments of Mobile Generations
Study on Infrastructure Developments of Mobile Generationsijtsrd
 
Comparative Study on Mobile Switching Center of Mobile Generations
Comparative Study on Mobile Switching Center of Mobile GenerationsComparative Study on Mobile Switching Center of Mobile Generations
Comparative Study on Mobile Switching Center of Mobile Generationsijtsrd
 
Iaetsd bluetooth based smart sensor networks
Iaetsd bluetooth based smart sensor networksIaetsd bluetooth based smart sensor networks
Iaetsd bluetooth based smart sensor networksIaetsd Iaetsd
 
A Secure QOS Distributed Routing Protocol for Hybrid Wireless Networks
A Secure QOS Distributed Routing Protocol for Hybrid Wireless NetworksA Secure QOS Distributed Routing Protocol for Hybrid Wireless Networks
A Secure QOS Distributed Routing Protocol for Hybrid Wireless Networksiosrjce
 
A secure qos distributed routing protocol for hybrid wireless networks
A secure qos distributed routing protocol for hybrid wireless networksA secure qos distributed routing protocol for hybrid wireless networks
A secure qos distributed routing protocol for hybrid wireless networksAAKASH S
 
TopologicalPlanningandDesignofHeterogeneousMobileNetworksinDenseAreas.pdf
TopologicalPlanningandDesignofHeterogeneousMobileNetworksinDenseAreas.pdfTopologicalPlanningandDesignofHeterogeneousMobileNetworksinDenseAreas.pdf
TopologicalPlanningandDesignofHeterogeneousMobileNetworksinDenseAreas.pdfBrianJanAdela3
 
Analysis of Handoff techniques used for hybrid networks: cellular/WLAN
Analysis of Handoff techniques used for hybrid networks: cellular/WLAN  Analysis of Handoff techniques used for hybrid networks: cellular/WLAN
Analysis of Handoff techniques used for hybrid networks: cellular/WLAN IJORCS
 
Mobile computing
Mobile computingMobile computing
Mobile computingSaranyaK68
 
Review of Mobile Ad Hoc Network Protocols
Review of Mobile Ad Hoc Network ProtocolsReview of Mobile Ad Hoc Network Protocols
Review of Mobile Ad Hoc Network Protocolsiosrjce
 

Similar to Paper (20)

An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...
An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...
An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...
 
Introduction to Mobile adhoc-network
Introduction to Mobile adhoc-networkIntroduction to Mobile adhoc-network
Introduction to Mobile adhoc-network
 
A Review Of Development In Wireless Communication
A Review Of Development In Wireless CommunicationA Review Of Development In Wireless Communication
A Review Of Development In Wireless Communication
 
wireless communication ppt.pptx
wireless communication ppt.pptxwireless communication ppt.pptx
wireless communication ppt.pptx
 
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKS
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKSTHE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKS
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKS
 
Blackhole attack in Manet
Blackhole attack in ManetBlackhole attack in Manet
Blackhole attack in Manet
 
presentation on mobile computing
presentation on mobile computingpresentation on mobile computing
presentation on mobile computing
 
Study on Infrastructure Developments of Mobile Generations
Study on Infrastructure Developments of Mobile GenerationsStudy on Infrastructure Developments of Mobile Generations
Study on Infrastructure Developments of Mobile Generations
 
Comparative Study on Mobile Switching Center of Mobile Generations
Comparative Study on Mobile Switching Center of Mobile GenerationsComparative Study on Mobile Switching Center of Mobile Generations
Comparative Study on Mobile Switching Center of Mobile Generations
 
Iaetsd bluetooth based smart sensor networks
Iaetsd bluetooth based smart sensor networksIaetsd bluetooth based smart sensor networks
Iaetsd bluetooth based smart sensor networks
 
40120140503011
4012014050301140120140503011
40120140503011
 
H017225058
H017225058H017225058
H017225058
 
A Secure QOS Distributed Routing Protocol for Hybrid Wireless Networks
A Secure QOS Distributed Routing Protocol for Hybrid Wireless NetworksA Secure QOS Distributed Routing Protocol for Hybrid Wireless Networks
A Secure QOS Distributed Routing Protocol for Hybrid Wireless Networks
 
A secure qos distributed routing protocol for hybrid wireless networks
A secure qos distributed routing protocol for hybrid wireless networksA secure qos distributed routing protocol for hybrid wireless networks
A secure qos distributed routing protocol for hybrid wireless networks
 
TopologicalPlanningandDesignofHeterogeneousMobileNetworksinDenseAreas.pdf
TopologicalPlanningandDesignofHeterogeneousMobileNetworksinDenseAreas.pdfTopologicalPlanningandDesignofHeterogeneousMobileNetworksinDenseAreas.pdf
TopologicalPlanningandDesignofHeterogeneousMobileNetworksinDenseAreas.pdf
 
Analysis of Handoff techniques used for hybrid networks: cellular/WLAN
Analysis of Handoff techniques used for hybrid networks: cellular/WLAN  Analysis of Handoff techniques used for hybrid networks: cellular/WLAN
Analysis of Handoff techniques used for hybrid networks: cellular/WLAN
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
12.7.2018
12.7.201812.7.2018
12.7.2018
 
Review of Mobile Ad Hoc Network Protocols
Review of Mobile Ad Hoc Network ProtocolsReview of Mobile Ad Hoc Network Protocols
Review of Mobile Ad Hoc Network Protocols
 
A017220112
A017220112A017220112
A017220112
 

Recently uploaded

Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Thierry Lestable
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2DianaGray10
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backElena Simperl
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyJohn Staveley
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesThousandEyes
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...Product School
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...Product School
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsExpeed Software
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...Product School
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀DianaGray10
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Product School
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...Product School
 

Recently uploaded (20)

Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT Professionals
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 

Paper

  • 1. 2nd International Conference on Emerging Trends in Computer and Image Processing (ICETCIP'2012) June 30-July 1, 2012 Bali Location Based Computation Sharing Framework for Mobile Devices Samiul. Islam, Boraq. Ammourah, and Mohamad. Mahmoud today’s mobile phones and smart phones and we have Abstract— Third generation and fourth generation mobile proposed our process sharing framework for mobile devices, devices are providing various online services and applications to based on this technology. facilitate users with their rich web interfaces. Limited computing In section II and III of this paper, we have provided an power and shorter battery life of mobile devices caused computation overview of cellular network and working principle of intensive application components to migrate to the external computing resources. By elastic resource provisioning and the ability Bluetooth. We have described our proposed framework in to support large scale service deployment, mobile cloud computing section IV. Section VI contains some part of evaluation of our introduced an attractive platform for offloading the computational framework and we concluded with section VII. processes among mobile devices. In this paper we proposed a location based computation sharing framework for mobile devices in II. OVERVIEW OF CELLULAR NETWORK which mobile devices locating in the same cell can share their processing power. We introduced a certification technique by which Modern mobile phone networks use cells (Fig. 1) because all mobile devices within 10 meters ranges can share their processing radio frequencies are a limited, shared resource. Cell-sites and power using Bluetooth technique without traditional 2 step handsets change frequency under computer control and use verification process. low power transmitters so that a limited number of radio frequencies can be simultaneously used by many callers with Keywords— Bluetooth Connectivity, Computational Process less interference. A cellular radio system provides a wireless Sharing, Mobile Computing, Wireless Ad-hoc Network. connection to the public telephone network for any user location within the radio range of the system. The term mobile I. INTRODUCTION has traditionally been used to classify a radio terminal that can T ECHNOLOGICAL advance in radio communication introduced to us with wireless ad-hoc networks. These are self-organizing networks that are formed from wireless be moved during communication. Cellular systems accommodate a large number of mobile units over a large area within a limited frequency spectrum [3]. devices communicating with each other without the need of any infrastructure. In these networks, each device (or node) works as a terminal and a router at the same time. The nodes are allowed to join or leave the network at any time. Nodes may also move from one geographical position to another at any time. Different wireless radio technologies were proposed to enable wireless ad hoc networks; one of them is Bluetooth [1]. The technology is promising in many ways. First, Bluetooth devices are efficient with respect to power consumption. Second, Bluetooth devices use a communication mechanism that is noise-resistant and robust against interference with neighboring Bluetooth devices. Third, the cost of Bluetooth radio devices is relatively low. Bluetooth also offers ad-hoc networking capabilities [2]. These Fig.1 Mobile cell architecture. advantages of Bluetooth led its deployment in a wide range of A cellular network is used by the mobile phone operator to Samiul. Islam is with the Department of Computer Science, College of achieve both coverage and capacity for their subscribers. Computer Science and Information System in Najran University, Najran, Large geographic areas are split into smaller cells to avoid Saudi Arabia (phone: +966 75428610 ; Mobile: +966 501343118; e-mail: line-of-sight signal loss and to support a large number of samiul80@gmail.com). Boraq. Ammourah is with the Department of Computer Science, College active phones in that area. All of the cell sites are connected of Computer Science and Information System in Najran University, Najran, to telephone exchanges (or switches), which in turn connect to Saudi Arabia (phone: +966 75428615 ; Mobile: +966569596556; e-mail: the public telephone network. Each cell contains at least a mr.boraq@gmail.com). Mohamad. Mahmoud is with the MIS department in Salman bin Abdulaziz University, Hot at Bani, Tamim, Saudi Arabia. (Phone: +966 543170968; e- mail: m_awni1983@yahoo.co.uk ). 156
  • 2. 2nd International Conference on Emerging Trends in Computer and Image Processing (ICETCIP'2012) June 30-July 1, 2012 Bali Legend: M- Master device, S- Slave device M S S M S S S S Piconet- A Piconet- B Fig. 3 Scatternet in a mobile cell Fig. 2 Communication of BTS and mobile phones i.e. a node can be a master in one piconet and a slave in base transceiver station (BTS), under which all cell phones of another. This permits the connection of several piconets as the that cell are registered. The base transceiver station, or BTS, nodes functioning in master/slave mode act gateways between contains the equipment for transmitting and receiving radio piconets. In the Bluetooth concept the network topology signals (transceivers), antennas, and equipment for encrypting resulting by the connection of piconets is called a scatternet and decrypting communications with the base station (Fig. 3). A node can be active in only one piconet at time, and controller (BSC). Fig. 2 shows BTS functionality in a simple to operate as a member of another piconet, a node must switch manner. to the hopping frequency sequence of the other piconet [5]. The base station subsystem (BSS) is the section of a The Bluetooth Core Specification provides for the traditional cellular telephone network which is responsible for connection of two or more piconets to form a scatternet, in handling traffic and signaling between a mobile phone and which certain devices simultaneously play the master role in the network switching subsystem. The BSS carries one piconet and the slave role in another. A master Bluetooth out transcoding of speech channels, allocation of radio device can communicate with a maximum of seven devices in channels to mobile phones, paging, transmission a piconet (an ad-hoc computer network using Bluetooth and reception over the air interface and many other tasks technology), though not all devices reach this maximum. The related to the radio network. Typically a BTS will have several devices can switch roles, by agreement, and the slave can transceivers (TRXs) which allow it to serve several different become the master. frequencies and different sectors of the cell (in the case of sectorized base stations). A BTS is controlled by a parent base A. Operations station controller via the base station control function (BCF). Bluetooth uses a radio technology called frequency-hopping The BCF is implemented as a discrete unit or even spread spectrum, which chops up the data being sent and incorporated in a TRX in compact base stations. The BCF transmits chunks of it on up to 79 bands (1 MHz each; provides an operations and maintenance (O&M) connection to centered from 2402 to 2480 MHz) in the range 2,400– the network management system (NMS), and manages 2,483.5 MHz (allowing for guard bands). This range is in the operational states of each TRX, as well as software handling globally unlicensed Industrial, Scientific and Medical (ISM) and alarm collection. The basic structure and functions of the 2.4 GHz short-range radio frequency band. It usually performs BTS remains the same regardless of the wireless technologies 800 hops per second, with AFH enabled [6]. [4]. Bluetooth operation relies on packet-based protocol with a master-slave structure. One master may communicate with III. BLUETOOTH: WORKING PRINCIPLE up to 7 slaves in a piconet; all devices share the master's clock. Bluetooth is a short-range radio technology that enables Packet exchange is based on the basic clock, defined by the wireless connectivity between mobile devices. When two master, which ticks at 312.5 µs intervals. Two clock ticks Bluetooth devices come into each other’s communication make up a slot of 625 µs; two slots make up a slot pair of 1250 range, one of them assumes the role of master of the µs. In the simple case of single-slot packets the master communication and the other becomes the slave. This simple transmits in even slots and receives in odd slots; the slave, “one hop” network is called a piconet, and may include up to conversely, receives in even slots and transmits in odd slots. seven active slaves connected to one master. As a matter of Packets may be 1, 3 or 5 slots long but in all cases the master- fact, there is no limit on the maximum number of slaves transmit will begin in even slots and the slave-transmit in odd connected to one master but only seven of them can be active slots. The master chooses which slave device to address; at time, others have to be in so called parked state. The typically, it switches rapidly from one device to another in specification also allows multiple roles for the same device, a round-robin fashion. Since it is the master that chooses which slave to address, whereas a slave is (in theory) supposed 157
  • 3. 2nd International Conference on Emerging Trends in Computer and Image Processing (ICETCIP'2012) June 30-July 1, 2012 Bali to listen in each receive slot, being a master is a lighter burden state, they do not have addresses, but only listen enough to than being a slave. keep their synchronization with the master and check for Bluetooth devices can be in 3 different power classes [7], broadcast messages. [8]: C. Security Method Class 3: The lowest power, the max. range of this is 10m Class 2: Max range is about 50m (150ft) Authentication ensures the identity of Bluetooth devices. It Class 1: Max range is about 100m (300ft) authenticates the device at the other end of the link. These ranges (Table-I) can be affected by environmental Authentication is accomplished by using a stored link key or conditions i.e. furniture, walls, people so ranges can easily be by pairing (entering a PIN). Pairing is a procedure that reduced. Bluetooth is not a line of sight connection so it can be authenticates two devices based on a common passkey, used through walls and floors. thereby creating a trusted relationship between those devices. An arbitrary but identical passkey must be entered on both TABLE I devices. As long as both devices are paired, the pairing BLUETOOTH CLASSES procedure is not required when connecting those devices again Maximum permitted power Range (the existing link key is used for authentication). Devices Class without any input method, like headsets, have fixed passkeys. (mW) (dBm) (m) Authorization is a process of deciding if a device is allowed Class 1 100 20 ~100 to have access to a specific service. User interaction may be Class 2 2.5 4 ~10 required unless the remote device has been marked as "trusted." Usually the user can set authorization on/off to Class 3 1 0 ~5 every remote device separately. Authorization always requires The effective range varies due to propagation conditions, authentication. material coverage, production sample variations, antenna Encryption protects communication against eavesdropping. configurations and battery conditions. In most cases the For example, it ensures that nobody can listen to what a laptop effective range of class 2 devices is extended if they connect transmits to a phone. The length of the encryption key can be to a class 1 transceiver, compared to a pure class 2 network. between 8 and 128 bits. This is accomplished by the higher sensitivity and transmission power of Class 1 devices. IV. PROPOSED FRAMEWORK B. Connection Protocols All mobile devices under a BTS can be grouped in a Bluetooth connections are established via the following multiple piconets, where the number of piconets depends on techniques [9], [10]: the cell size of that specific BTS depending on geographical Standby: Devices not connected in a piconet are in standby position. Each piconet can contain maximum n number of mode. In this mode, they listen for messages every 1.28 s over mobile devices at any given time, where 0≤ n. When an 32 hop frequencies (fewer in Japan, Spain, and France). application initiates in any node of a piconet of our proposed Page/inquiry: If a device wishes to make a connection with framework, it has been marked as an active node and acquire a another device, it sends out a page message if the address is certificate from local BTS with a time stamp for that node. known, or an inquiry followed by a page message if it is When an active node has been selected, it discovers the idle unknown. The master unit sends out 16 identical page nodes asynchronously within its piconet and use the certificate messages on 16 hop frequencies to the slave unit. If there is no to create a private channel with the idle nodes to share their response, the master retransmits on the other 16 hop processing powers. If the time stamp of an active node frequencies. The inquiry method requires an extra response exceeds the duration more than 300 seconds, and/or the from the slave unit, since the address is unknown to the master number of idle nodes drop below a level m, where 1≤ m≤7, unit. the active node share its processes with the other available idle Active: Data transmission occurs. nodes in different piconets through BTS. The proposed Hold: When either the master or slave wishes, a hold mode framework is composed of several algorithms implemented in is established or no data is transmitted in order to conserve middle layer of BTS and in the application layer of cell power. Otherwise, there is a constant data exchange. A typical phones. Those can be categorized as mentioned in later sub reason for going into hold mode is the connection of several sections. piconets. A. Certificates: Sniff: The sniff mode, applicable only to slave units, is for Subscriber, MS (Mobile Station) or mobile phone connects power conservation, though not at as reduced a level as hold. to mobile network through BTS. When a mobile phone During this mode, the slave does not take an active role in the switches on, it registers with the corresponding BTS of its cell. piconet, but listens at a reduced level. This is usually a In our proposed framework, during the registration process of programmable setting. mobile devices, it will acquire a certificate from the Park: Park mode is a more reduced level of activity than the corresponding BTS, containing subscriber’s information and hold mode. The slave is synchronized to the piconet, thus not service provider’s information. This certificate authenticated requiring full reactivation, but is not part of the traffic. In this 158
  • 4. 2nd International Conference on Emerging Trends in Computer and Image Processing (ICETCIP'2012) June 30-July 1, 2012 Bali the device with a device generated 64 bit encrypted security finding other devices listening to the same frequency hop at key. An active node shares this key in the idle node discovery the same time. The inquirer keeps alternating in a range of process within the piconets. During the link establishment frequencies - 32 out of the 79 available hops known to all the process and data exchange process between these two types of devices. On the opposite side of the connection, a node that nodes, the security key will automatically authorize an active wants to be discovered has to switch to the query scan state node to send and retrieve its data from an idle node without and keeps listening to ID packets generated from the inquirers. prompting the user. The scanner switches between the frequencies hops at a slower rate than the inquirer’s in order to increase the chance of B. Discover idle nodes with timestamp: finding each other in the same hop. When the scanner receives We require time synchronization between mobile nodes. one of those ID packets, it replies to it with a special packet We assume clock ticking speeds of different nodes to be called the FHS [11], [12] packet. An FHS packet contains its comparable. It means that when a idle node B i receives a clock address and its clock value. The clock value is used for value from an active node A i , node B i can synchronize with synchronization purposes to make the link establishment node A i , using A i ’s clock value. There is no globally common procedure faster. In the paging procedures, the active node clock for the mobile network, say MN. Assume that MN has switches to the page state and the idle must switch to the page M channels available for its operations. Let this channel set be scan state. Using the information obtained from the FHS Cglobal = {C1, C2 , ... , CM}. packet, the active node adds an offset value to its clock to have Each node in MN is assigned a unique identifier (Node ID) the same clock value of the idle node so they are both become in the range 1 to N. Each node knows its unique Node ID, but synchronized to each other. After that, the active node does not know how many other nodes there are and what their attempts to contact the idle node by broadcasting again a IDs are. Nodes are equipped with one transceiver (Transmitter number of ID packets. If the idle node listens to one of these & Receiver) capable of either receiving or transmitting at any ID packets, it replies with another ID packet and go to the idle given time. Nodes know about the global channel set Cglobal response state. When this ID packet is received by the active and the value of N. Also each node finds its set of usable node, it changes its state to the active response state. Then, the channels (available channel set) by a periodic scanning active node sends an FHS packet. mechanism. We assume nodes can detect collisions. An active node transmits and receives alternatively on each channel of V. RELATED WORK its available channel set. During the transmit period it sends a Salonidis et. al. presents a distributed topology construction query referred to as Active Node Query (ANQ) with node ID, scheme in Bluetooth networks [13]. The basic assumption clock value of the node, available channel set and remaining behind the scheme is that all nodes are within transmission time in ANQ. Every ANQ has limited time validity, Q t . range of each other. The nodes conduct a leader election During the receiving period, inquiring node listens on the algorithm. The winner knows the identity of all nodes and uses same channel that it transmitted previously, for duration of Q t . this information to design the desired topology. Existing If a valid reply (Query Reply) is received, the queering node service discovery protocols such as Universal Plug and Play sends an Acknowledgment (Ack) message, during the current (UPnP) [14], Service Location Protocol (SLP) [15] and receiving period or during the next receiving period, on the Salutation focused on auto configuration issues allowing same channel that it received the reply. Upon receiving a devices to automatically join the network and learn about its Query Reply message, inquiring node discovers the sender of capabilities. However such approaches were designed for the Query Reply. resource rich networks and are not suitable for resource C. Sharing and synchronization of process: constrained systems. Energy efficient service discovery has Bluetooth operates in the range of frequencies 2.4000 GHz been done using power efficient wake-up scheduling to 2.4835 GHz. It divides the medium to 79 channels each of 1 protocols, such as [16][17][18]. Bhagwat et al. presents a MHz. The rest of the available frequencies are considered as source routing mechanism for Bluetooth networks [19]. Das et lower and upper band edges, in order to comply with the radio al. [20] and Johanson et al. [21] present distributed scheduling regulations of different countries. To establish a link between policies for Bluetooth networks. Existing middleware an active and idle node, the communicating nodes must solutions for wireless sensor networks usually have plug-in perform two operations; the first is the query; in which one system [22] for service discovery protocols or use their own node gets the address of (or discovers) another node. The mechanisms [23]. TeenyLime [23] is a data-sharing second is the paging, in which a link is constructed. The middleware designed for mobile sensors. It uses an operational specifications of Bluetooth state that for one node to discover setting where sensors are fixed and relatively powerful mobile others, it must switch to the query state, and then, keeps sinks are used to collect data from sensors. broadcasting small special packets (of 68 bits size), called the ID packets. The contents of these packets are common to all VI. EVALUATION Bluetooth devices, and although called ID packets, they do not Evaluation of certificate is our future work. The time contain the identity of their senders. The inquirer’s ID packets duration of idle node discovery procedure has been evaluated must be broadcast in different frequency hops in hope of 159
  • 5. 2nd International Conference on Emerging Trends in Computer and Image Processing (ICETCIP'2012) June 30-July 1, 2012 Bali in a simulated environment. Discovery of each idle node is [5] Gergely V. Záruba, Stefano Basagni and Imrich Chlamtac: Bluetrees – Scatternet Formation to Enable Bluetooth-Based Ad Hoc Networks, marked as T 1 and presented by (1). IEEE, 2001, ISBN 0-7803-7097-1. [6] http://www.radio-electronics.com/info/wireless/bluetooth/radio- T 1 =2 Q t (M+1)M (1) interface-modulation.php. [7] Albert Huang and Larry Rudolph, Bluetooth for Programmers, 2005. The simulation was done by using the R [20] statistical [8] http://www.althos.com/tutorial/Bluetooth-tutorial-RF-Power- package assuming that a network with 3 channels (M = 3). Classes.html. Also consider two nodes (A and B) in the network with [9] K. Sand, Bluetooth, Tik-111.550 Seminar on Multimedia, available channel sets A = {3}, B = {1,2,3}. The T1 duration Telecommunications Software and Multimedia Laboratory, Helsinki University of Technology, Finland, March 1999. is shown in the fig. 4. [10] J. Haarsten, Bluetooth —the universal radio interface for adhoc wireless 2Qt connectivity, Ericsson Review 3 (4) (1988) 1 – 5. available at http://www.ericsson.se/Review/er3 _ 98/art1/art1.html. [11] T. Salonidis, P. Bhagwat, L. Tassiulas, R. LaMaire, Distributed Topology Construction of Bluetooth Personal Area Networks, Proceedings. IEEE, Volume: 3, 2001, pp. 1577-1586, IEEE INFOCOM 2001. [12] A. El-Hoiydi, Interference Between Bluetooth Networks – Upper Bound 2Qt (M+1) on the Packet Error Rate, IEEE Communications Letters, Vol. 5, No. 6, pp. 245-247, June 2001. [13] T. Salonidis, P. Bhagwat, L. Tassiulas, and R. Lamaire. Distributed T1 =2 Qt (M+1)M topology construction of Bluetooth personal area networks. In Fig. 4 T 1 duration for 3 channels Proceedings of INFOCOM’2001, 2001. [14] Universal plug and play. http://www. upnp.org/. [15] E. Guttman. Service location protocol: Automatic discovery of IP We have evaluated our sharing and synchronization network services. IEEE Internet Computing, 3(4):71-80, 1999. algorithm in a simulated state with maximum 30 nodes. The [16] W. Ye, J. Heidemann, and D. Estrin. Medium access control with coordinated adaptive sleeping for wireless sensor networks. IEEE/ACM result shows (fig. 5) the processing performance with time. Trans. Netw. 12(3):493-506, 2004. We assumed that every node has its own unique ID and a [17] J. Polastre, J. Hill, and D. Culler. Versatile low power media access for direct connection method has been used instead of certificate wireless sensor networks. In SenSys'04: 2nd international conference on technique to evaluate their performances. Embedded networked sensor systems, pages 95-107, New York, 2004. [18] W. Ye, F. Silva, and J. Heidemann. Ultra-low duty cycle mac with scheduled channel polling. In SenSys'06: Proceedings of the 4th international conference on Embedded networked sensor systems, pages 321-334, New York, NY, USA, 2006. ACM Press. 30 [19] P. Bhagwat and R. Seigal. A routing vector method (RVM) for routing 20 in Bluetooth scatternets. In IEEE International Workshop on Mobile 10 Multimedia Communications (MoMuC’99), San Diego, CA, Nov 1999. [20] A. Das, A. Ghose, A. Razdan, H. Saran, and R. Shorey. Enhancing performance of asynchronous data traffic over the Bluetooth wireless ad- hoc network. INFOCOM’2001, Anchorage, AK, April 2001. [21] N. Johansson, Korner, and L. Tassiulas. A distributed scheduling algorithm for a Bluetooth scatternet. ITC’2001, Salvador, Brazil, Dec. Fig. 5 Shared process performance measure 2001. [22] W. Heinzelman, A. Murphy, H. Carvalho, and M. Perillo. Middleware to support sensor network applications, 2004. VII. CONCLUSION [23] C. Curino, M. Giani, M. Giorgetta, and A. Giusti. Tiny lime: Bridging We have evaluated our result partially for idle node mobile and sensor networks through middleware. In Tiny Lime: Bridging Mobile and Sensor Networks through Middleware. March 8- discovery and process sharing. Future work involved 12, 2005. implementation and evaluation of certification algorithm, Synchronization with BTS to share processing with the idle node of different piconets within the same cell.. Few critical concerns also need to be considered in future work, e.g. when two active nodes try to share an idle node in concurrent time. Fault tolerance mechanism need to be implemented as any shared node can be switched of or change location without prior notice. REFERENCES [1] Bluetooth Core Specifications v2.1 + EDR,www.bluetooth.com. [2] Ahmed Jedda, The Device Discovery in Bluetooth Scatternet Formation Algorithms, Ottawa-Carleton Institute for Computer Science, University Of Ottawa, Canada, 2009. [3] Kamil Sh. Zigangirov, Theory of Code Division Multiple Access Communication, ISBN 0-471-45712-4, Institute of Electrical and Electronics Engineers, 2004. [4] http://en.wikipedia.org/wiki/Base_transceiver_station. 160