scholarly journals Bluehoc-based simulation study of user data throughput in Bluetooth-enabled devices

Author(s):  
Syed Rahat

Bluetooth technology aims at allowing short-range communication between portable and/or fixed devices. It uses short-range radio links to replace cables between Bluetooth-enabled devices. In this way, it is similar in purpose to the Infrared Data Association (IrDA), however, Bluetooth is a radio frequency (RF) technology utilizing the unlicensed 2.5 GHz industrial, scientific, and medical (ISM) band. The key features of Bluetooth technology are robustness, low power and low cost with its primary market for data and voice transfer between communication devices and PCs. In this project, a simulation study is done with three major goals in mind: (i) to gather expertise on and evaluate a Bluetooth simulation tool called Bluehoc for further use, (ii) to gather measurements of some Bluetooth characteristics such as throughput in post connection state and (ii) to describe a model that can be used to get maximum throughput for voice and data applications. We also review some of the key aspects in Bluetooth simulation and present models of the Bluetooth devices to get maximum throughput. We show that user data transfer rate (throughput) between Bluetooth master and slaves is effected by distance, number of slaves and slave's start time.

2021 ◽  
Author(s):  
Syed Rahat

Bluetooth technology aims at allowing short-range communication between portable and/or fixed devices. It uses short-range radio links to replace cables between Bluetooth-enabled devices. In this way, it is similar in purpose to the Infrared Data Association (IrDA), however, Bluetooth is a radio frequency (RF) technology utilizing the unlicensed 2.5 GHz industrial, scientific, and medical (ISM) band. The key features of Bluetooth technology are robustness, low power and low cost with its primary market for data and voice transfer between communication devices and PCs. In this project, a simulation study is done with three major goals in mind: (i) to gather expertise on and evaluate a Bluetooth simulation tool called Bluehoc for further use, (ii) to gather measurements of some Bluetooth characteristics such as throughput in post connection state and (ii) to describe a model that can be used to get maximum throughput for voice and data applications. We also review some of the key aspects in Bluetooth simulation and present models of the Bluetooth devices to get maximum throughput. We show that user data transfer rate (throughput) between Bluetooth master and slaves is effected by distance, number of slaves and slave's start time.


2021 ◽  
Vol 15 (01) ◽  
pp. 01-09
Author(s):  
Yingying Chen ◽  
Bo Liu ◽  
Hongbo Liu ◽  
Yudong Yao

This paper explores a low-cost portable visible light communication (VLC) system to support the increasing needs of lightweight mobile applications. VLC grows rapidly in the past decade for many applications (e.g., indoor data transmission, human sensing, and visual MIMO) due to its RF interference immunity and inherent high security. However, most existing VLC systems heavily rely on fixed infrastructures with less adaptability to emerging lightweight mobile applications. This work proposes Light Storage, a portable VLC system takes the advantage of commercial smartphone flashlights as the transmitter and a solar panel equipped with both data reception and energy harvesting modules as the receiver. Light Storage can achieve concurrent data transmission and energy harvesting from the visible light signals. It develops multi-level light intensity data modulation to increase data throughput and integrates the noise reduction functionality to allow portability under various lighting conditions. The system supports synchronization together with adaptive error correction to overcome both the linear and non-linear signal offsets caused by the low time-control ability from the commercial smartphones. Finally, the energy harvesting capability in Light Storage provides sufficient energy support for efficient short range communication. Light Storage is validated in both indoor and outdoor environments and can achieve over 98% data decoding accuracy, demonstrating the potential as an important alternative to support low-cost and portable short range communication.


2012 ◽  
Vol 2012 ◽  
pp. 1-11 ◽  
Author(s):  
Yinan Yu ◽  
Jian Yang ◽  
Tomas McKelvey ◽  
Borys Stoew

Ultrawideband (UWB) technology has many advantages compared to its narrowband counterpart in many applications. We present a new compact low-cost UWB radar for indoor and through-wall scenario. The focus of the paper is on the development of the signal processing algorithms for ranging and tracking, taking into account the particular properties of the UWB CMOS transceiver and the radiation characteristics of the antennas. Theoretical analysis for the algorithms and their evaluations by measurements are presented in the paper. The ranging resolution of this UWB radar has achieved 1-2 mm RMS accuracy for a moving target in indoor environment over a short range, and Kalman tracking algorithm functions well for the through-wall detection.


2016 ◽  
Vol 25 (2) ◽  
pp. 220-226 ◽  
Author(s):  
Yadong Yin ◽  
Lihong Zhang ◽  
Yuanting Yang

2005 ◽  
Vol 37 (1) ◽  
pp. 127-132 ◽  
Author(s):  
P. Jedrusik ◽  
H. Schulze ◽  
C. D. Claussen ◽  
K. Golka

2010 ◽  
Vol 2010 ◽  
pp. 1-12 ◽  
Author(s):  
Vesa A. Korhonen ◽  
Ritva Pyykkönen

We discuss how a short-range wireless communication service implemented for modern mobile communication devices can provide additional value for both the consumer and the service/product provider. When used as an information search tool, such systems allow services and products being promoted at the location they are available. For the customer, it may provide a “digitally augmented vision”, an enhanced view to the current environment. With data filtering and search rules, this may provide a self-manageable context, where the user's own personal environment and preferences to the features available in the current surroundings cooperate with a direct connection to the web-based social media. A preliminary design for such service is provided. The conclusion is that the method can generate additional revenue to the company and please the customers' buying process. In addition to the marketing, the principles described here are also applicable to other forms of human interaction.


2021 ◽  
Vol 17 (4) ◽  
pp. 1-38
Author(s):  
Takayuki Fukatani ◽  
Hieu Hanh Le ◽  
Haruo Yokota

With the recent performance improvements in commodity hardware, low-cost commodity server-based storage has become a practical alternative to dedicated-storage appliances. Because of the high failure rate of commodity servers, data redundancy across multiple servers is required in a server-based storage system. However, the extra storage capacity for this redundancy significantly increases the system cost. Although erasure coding (EC) is a promising method to reduce the amount of redundant data, it requires distributing and encoding data among servers. There remains a need to reduce the performance impact of these processes involving much network traffic and processing overhead. Especially, the performance impact becomes significant for random-intensive applications. In this article, we propose a new lightweight redundancy control for server-based storage. Our proposed method uses a new local filesystem-based approach that avoids distributing data by adding data redundancy to locally stored user data. Our method switches the redundancy method of user data between replication and EC according to workloads to improve capacity efficiency while achieving higher performance. Our experiments show up to 230% better online-transaction-processing performance for our method compared with CephFS, a widely used alternative system. We also confirmed that our proposed method prevents unexpected performance degradation while achieving better capacity efficiency.


Author(s):  
Aimeric Bisognin ◽  
Ana Arboleya ◽  
Diane Titz ◽  
Romain Pilard ◽  
Daniel Gloria ◽  
...  

2021 ◽  
Vol 21 (4) ◽  
pp. 1-23
Author(s):  
Bin Yuan ◽  
Chen Lin ◽  
Deqing Zou ◽  
Laurence Tianruo Yang ◽  
Hai Jin

The rapid development of the Internet of Things has led to demand for high-speed data transformation. Serving this purpose is the Tactile Internet, which facilitates data transfer in extra-low latency. In particular, a Tactile Internet based on software-defined networking (SDN) has been broadly deployed because of the proven benefits of SDN in flexible and programmable network management. However, the vulnerabilities of SDN also threaten the security of the Tactile Internet. Specifically, an SDN controller relies on the network status (provided by the underlying switches) to make network decisions, e.g., calculating a routing path to deliver data in the Tactile Internet. Hence, the attackers can compromise the switches to jeopardize the SDN and further attack Tactile Internet systems. For example, an attacker can compromise switches to launch distributed denial-of-service attacks to overwhelm the SDN controller, which will disrupt all the applications in the Tactile Internet. In pursuit of a more secure Tactile Internet, the problem of abnormal SDN switches in the Tactile Internet is analyzed in this article, including the cause of abnormal switches and their influences on different network layers. Then we propose an approach that leverages the messages sent by all switches to identify abnormal switches, which adopts a linear structure to store historical messages at a relatively low cost. By mapping each flow message to the flow establishment model, our method can effectively identify malicious SDN switches in the Tactile Internet and thus enhance its security.


Sign in / Sign up

Export Citation Format

Share Document