-Priyanka, Madhurima. IDEA of WIRELESS LEASH Your devices go…. Wherever you go!!

Slides:



Advertisements
Similar presentations
INTRODUCTION TO Wi-Fi TECHNOLOGY.
Advertisements

Bluetooth.
Computer Concepts – Illustrated 8th edition
Mobile Computing and Commerce And Pervasive Computing
1 UNIT I (Contd..) High-Speed LANs. 2 Introduction Fast Ethernet and Gigabit Ethernet Fast Ethernet and Gigabit Ethernet Fibre Channel Fibre Channel High-speed.
Follow the instruction to install the PC Suite from the SD card: 1.Go to the settings -> SD Card & phone storage -> Enable the mass storage only mode 2.Connect.
1 Security for Ad Hoc Network Routing. 2 Ad Hoc Networks Properties Mobile Wireless communication Medium to high bandwidth High variability of connection.
NORDUnet: Hannu H. Kari/HUT/CS/TMLPage 1/22 Mobility in the Wireless and Wired World Hannu H. KARI Helsinki University of Technology (HUT) professor/TML-laboratory/CS/HUT.
1 White Space use cases & requirements Gabor Bajko, Basavaraj Patil, Scott Probasco I-D: draft-probasco-paws-overview-usecases.
Universitá degli Studi di LAquila Mälardalens Högskola, Västerås 10th September 2009 Integrating Wireless Systems into Process Industry and Business Management.
Protocol layers and Wireshark Rahul Hiran TDTS11:Computer Networks and Internet Protocols 1 Note: T he slides are adapted and modified based on slides.
Networking at Home the Office and Globe
IEEE INFOCOM 2004 MultiNet: Connecting to Multiple IEEE Networks Using a Single Wireless Card.
1 Dynamic Interconnection Networks Buses CEG 4131 Computer Architecture III Miodrag Bolic.
1 The phone in the cloud Utilizing resources hosted anywhere Claes Nilsson.
Chat Buddy JPMA F2004 Final Project Participants : Priyadarsini Seetharaman Safuriat O. Johnson Supervisor: Associate Prof. Dr. Jørgen Staunstrup.
The Enterprise Business Center. #2 CyberSource Enterprise Business Center your payment processing dashboard ******** Log out security feature All tools.
M obile U ser I nterface Survey March 11, 2011 Hyojin Song.
Mobile Computing
25 July, 2014 Hailiang Mei, TU/e Computer Science, System Architecture and Networking 1 Hailiang Mei Remote Terminal Management.
1 Wireless and Mobile Networks Part 2 November 25, 2008 Department of Electrical and Computer Engineering University of Western Ontario ECE 436a Networking:
Getting Familiar with Web Pages 1 2 The Internet Worldwide collection of interconnected computer networks that enables businesses, organizations, governments,
Dynamic Location Discovery in Ad-Hoc Networks
Why to learn OSI reference Model? The answer is too simple that It tells us that how communication takes place between computers on internet but how??
Sattam Al-Sahli – Emad Al-Hemyari –
310KM Mobile Commerce Applications Tutorial 8 Team Assignment and Presentation Group Member: Lee Cheuk LunLeung Tsz Ho Li Ka WaiChu Cheuk Ming Wong Kei.
Adaptive Security for Wireless Sensor Networks Master Thesis – June 2006.
CPET 260 Bluetooth. What is Bluetooth? Not IEEE (Wi-Fi) or HomeRF Originally designed to replace wires Short-range, lower-power wireless technology.
A Comparison of Bluetooth and competing technologies
Senior Design Project 2004/2005 Web Enabled Calling Number Delivery Daniel St. Clair Barron Shurn Professor Soules 10/28/2004.
Bluetooth Introduction The Bluetooth Technology
Chapter 10 Remote Access and Wireless Networking Business Issues Logical & Physical Topology Technology: Hardware & Software, & Wireless Personnel Communication.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Bluetooth based home automation system N.Sriskanthan, F.Tan, K. Karande Microprocessors and Microsystems 26(2002) Presenter: Bui Phuong Nhung.
Distributed systems – Part 2  Bluetooth – 2 nd set of slides Anila Mjeda.
Communications & Networks
Presentation on Osi & TCP/IP MODEL
INTRODUCTION Bluetooth technology is code name for Personal Area Network (PAN) technology that makes it extremely easy to connect a mobile, computing device.
Bluetooth Background Ericsson, IBM, Intel, Nokia, and Toshiba
ErdOS: An energy-aware social operating system Further Reading: (*) Narseo Vallina-Rodriguez, Pan Hui, Jon Crowcroft, Andrew Rice. “Exhausting Battery.
1 Protect Against Spywares – SpywareBlaster. 2 Content Introduction – - What is Spyware? - Danger - Sign of Trouble Solution Cleaning -- Spybot Protection.
Wireless Ad Hoc Podcasting. Ad hoc ad hoc network typically refers to a system of network requiring little or no planning a decentralized type of wireless.
Bluetooth Address or Name Sharing By Joseph Charboneau.
Bluetooth Techniques ECE 591. Overview  Universal short-range wireless capability  Uses 2.4-GHz band  Available globally for unlicensed users  Devices.
By Jonathan….and Darion……….. Reliability Windows File Protection protects core system files from being overwritten by application installs. Driver certification.
Seung-Hoon Lee, Sewook Jung, Alexander Chang, Dea-Ki Cho, and Mario Gerla Network Research Lab Department of Computer Science University of California,
© 2005 Avaya Inc. All rights reserved. Using Context-Awareness and User Negotiation for Intelligent Dialing in Enterprise Communications Amogh Kavimandan.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Doc.: IEEE /033r2 Submission July 1999 Simon Baatz, University of BonnSlide 1 Integration of Bluetooth into LAN Environments Simon Baatz, Matthias.
BLUETOOTH BASED LOCATION SYSTEM SULAIMAN AL AWAD HANI AL RUWAILI.
Geneva, Switzerland, 11 June 2012 Switching and routing in Future Network John Grant Nine Tiles
Bluetooth Techniques Chapter 15. Overview of Bluetooth Initially developed by Swedish mobile phone maker in 1994 to let laptop computers make calls over.
발표자 : 현근수 Bluetooth. Overview wireless protocol short-range communications technology single digital wireless protocol connecting multiple devices mobile.
Team Topic Presentation Team 6 BLUETOOTH What is Bluetooth? Cable Replacement Automatic Connectivity Hidden Computing Few Examples: 1.Automatic Door.
BLUETOOTH WIRELESS TECHNOLOGY
A Fast Handoff Scheme For IP over Bluetooth Sang-Hsu Chung, Hyunsoo Yoon, and Jung-Wan Cho Department of Electrical Engineering & Computer Science Divison.
Focus On Bluetooth Security Presented by Kanij Fatema Sharme.
Bluetooth In 1994, the L. M. Ericsson company became interested in connecting its mobile phones to other devices without cables. A SIG (Special Interest.
JPMA PROJECT PRESENTATION (ITU) 1 INTRODUCTION BLUETOOTH CHAT DESIGN JAVA ON MOBILE DEVICE Presenters Benjamin Boateng Abass Omer Venkateshwar Rao Namilakonda.
Introduction.
Sonal Jain, IT-BHU Bluetooth Mobile Ad Hoc Networks Sonal Jain B.Tech (IV), Electrical Engg. Dept.,ITBHU IEEE SPAVes Sept 14, 15 Institute.
Bluetooth Technology -Prepared By Jasmin Patel -Guided By Jagruti Goswami.
Bluetooth Technology -Prepared By Jasmin Patel -Guided By Jagruti Goswami.
BLUETOOTH THE STANDARD & ISSUES.
Channel Control Interim substates for adding new slaves
A Wireless LAN technologies IEEE
Bluetooth Profiles.
BLUETOOTH Personal Area Networking [ PAN ] over Bluetooth
Network Controllable MP3 Player
Presentation transcript:

-Priyanka, Madhurima

IDEA of WIRELESS LEASH Your devices go…. Wherever you go!!

Project Goal Fast and easy device discovery Maintain Proximity Power EfficientContext Aware Blue Connect

Fast and easy device discovery Maintain Proximity Power EfficientContext Aware Blue Connect Using Visual Tags to Bypass Bluetooth Device Discovery -Priyanka Using Visual Tags to Bypass Bluetooth Device Discovery -Priyanka Bluetooth Tracking without Discoverability- Madhurima Bluetooth Tracking without Discoverability- Madhurima

BLUETOOTH TRACKING WITHOUT DISCOVERABILITY Location and Context Awareness LoCA,2009 Tokyo, Japan

Aim: Indoor Location Tracking Locate user in a building Tracking of users in timescale Tracking of Multiple Users Easy to use. Existing hardware.

Existing work and proposed solution WiFi: – High power demand – Set up and maintainance – Handset requires WiFi ON Bluetooth (RSS, FingerPrint) – Beacons – Scan takes 10.24s – Privacy Solution: Track Bluetooth Device without making Discoverable Contribution: Faster Connection Setup and Monitoring

Bluetooth Connection L2CAP ( Logical Link Control and Adaptation Protocol ) Protocol, Segmentation and reassembly ACL (Asynchronous Connectionless Link) Packet Switched Link

Bluetooth Connection Procedure Inquiry Scan Inquiry Response (remote device's address and clock) Manual Device SelectionPagingConnection

Why Bluetooth Discovery takes so long? A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A B B B B B B B B B B B B B B B B B B B B B B B B B B B B B B B B 16 Channel A frequencies 16 Channel B frequencies A A A A A A A A A A A A A A A A A A A A A A A A 256 times in 1 iteration B B B B B B B B B B B B B B B B B B B B B B Inquiry scan

Paging A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A Master Slave T scan T window 10.24ms 11.25ms B B B B B B B B B B B B B B B B B B B B B B B B B B B B B B B B

Connection Monitoring RSSI Received Signal Strength Indicator – Monitor rate can be 1Hz Link Quality (LQ) – Require no extra data Echo response time – Monitor Rate – 40ms – Requires more Battery Power RSSIRSSI Distance(m)

Power Consumption

Conclusion Positive Faster Update Rate. Variable Update Rate. No Scanning. Privacy Negative Devices must be Known. Connection Limits.

Using Visual Tags to Bypass Bluetooth Device Discovery By D. Scott, R. Sharp, A. Madhavapeddy, E. Upton - ACM SIGMOBILE Mobile Computing and Communications Review, Priyanka Bagade

Standard Bluetooth Device Discovery Model – takes 10.43s to complete in error free environment BD_ADDR Inquiry John Alice Bob Martin

Select Photo Device Discovery Device Selection Select Photo Select Physical Device Standard Bluetooth Device Discovery Comparison of Standard Bluetooth Device Discovery and Tag-Based Device Discovery Tag-Based Device Discovery

Sync Marker Check Sum BD_ADDR Application Specific Data Tag Reading Visual Tag – System Architecture 48 bits 15 bits 63 bits

Download Music using Bluetooth Download Music Track 2

Tag-based Connection Establishment and Content Selection Web Server Camera Phone Service Attribute Transaction HTTP Response BD_ADDR, File ID Service Search Request HTTP Get

Performance Evaluation Speed

Performance Evaluation(Contd.) Usability – Number of button presses reduced Conventional system ~ 10 -> Device and item selection Visual tag system – just 1 !!! Capture the visual tag Scalability – Performance does not get affected by increase in number of neighborhood Bluetooth devices and number of options provided by Mobile service Security – Authentication and privacy are provided using digital signature and Bluetooths connection level encryption

Usage Scenarios Stock Querying

Usage Scenarios(Contd.) Use of Visual tags to quickly learn Server configuration

Usage Scenarios(Contd.) Active Visual Tags – Generated Dynamically from a PC display Tested in marketing posters used for events in Europe

Conclusion Introduces new approach to maximize the potential of an already popular device (Bluetooth and Camera phones) PROS Reduces Bluetooth Device Discovery time significantly Provides convenient way to select a required service from number of mobile services Easy to implement as relies entirely on commodity hardware CONS Requires camera phone Data capacity is very less as compared to RFID

Summing it all… Visual Tags to Obtain BD_Address Bluetooth tracking without discoverability Synchronization for paging and proximity monitoring

References [1] D. Scott, R. Sharp, A. Madhavapeddy, E. Upton, Using visual tags to bypass Bluetooth device discovery, ACM SIGMOBILE Mobile Computing and Communications Review, v.9 n.1, January 2005 [doi> / ] [2] S. Hay and R. Harle, Bluetooth tracking without discoverability, LoCA 2009: Proceedings of the 4th International Symposium on Location and Context Awareness,