Supervisor : Gil Zussman Dror Barash Eran Golani.

Slides:



Advertisements
Similar presentations
Scheduling in Web Server Clusters CS 260 LECTURE 3 From: IBM Technical Report.
Advertisements

Why to learn OSI reference Model? The answer is too simple that It tells us that how communication takes place between computers on internet but how??
Department of Information Engineering University of Padova, Italy COST273 Sep , 2002 Lisboa TD (02)-146 Handover procedures in a Bluetooth network.
Improvement on LEACH Protocol of Wireless Sensor Network
1 Introduction to Bluetooth v1.1 (Part I) Overview Radio Specification Baseband Specification LMP L2CAP.
Bluetooth Technology. What is Bluetooth? Bluetooth is a short- range communications technology that allows devices to communicate with each other without.
Supervisor : Gil Zussman Dror Barash Eran Golani.
The Museum Project The Museum Project Yoav Gvili & Asaf Stein Supervisor : Alexander Arlievsky.
CPET 260 Bluetooth. What is Bluetooth? Not IEEE (Wi-Fi) or HomeRF Originally designed to replace wires Short-range, lower-power wireless technology.
The Museum Project The Museum Project Yoav Gvili & Asaf Stein Supervisor : Alexander Arlievsky.
LAN Access Point Extension Pundik Dmitry & Blekhman Alexandr Directed by Konstantin Sinyuk Winter 2001/2 HSDSL Lab.
5: CPU-Scheduling1 Jerry Breecher OPERATING SYSTEMS SCHEDULING.
DISTRIBUTED CACHE SYSTEM EE SOFTWARE LAB, TECHNION By Shamil Nisimov Dror Bohrer Supervisor : Yaron Ben Shoshan Lab Engineer : David Ilana.
Internet Architecture Two computers, anywhere in the world, following certain hardware, software, protocol specifications, can communicate, reliably even.
Supervisor: Mr. Hai Vortman. The ultimate goal Creating a wireless sensor network using Bluetooth technology.
Bluetooth Simulation Developers: Eran Cohen Ran Zavhon Guide: Gil Zusman.
Bus Tracking System characterazation presentation Presented by: Gal gavish and Yuval Peled Supervisor: Hen Broodney Winter High Speed Digital.
Error Checking continued. Network Layers in Action Each layer in the OSI Model will add header information that pertains to that specific protocol. On.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—1-1 Building a Simple Network Understanding the Host-to-Host Communications Model.
1.5.1 Connecting peripherals. Ports Ports - cont Ps2 – Keyboard and mouse USB(Universal serial bus) – Keyboard, mouse, Printer, Scanner, digital Camera.
Graduate Operating Systems Mini-Project: Hacking Bluetooth In Linux Alan Joseph J Caceres.
Modeling & Simulation of Bluetooth MAC protocol COE543 Term Project Spring 2003 Submitted by: H.M.Asif (ID# )
Computer Architecture and Operating Systems CS 3230: Operating System Section Lecture OS-3 CPU Scheduling Department of Computer Science and Software Engineering.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Lecture 5 Operating Systems.
OPERATING SYSTEMS CPU SCHEDULING.  Introduction to CPU scheduling Introduction to CPU scheduling  Dispatcher Dispatcher  Terms used in CPU scheduling.
Building a Simple Serial Network © 2004 Cisco Systems, Inc. All rights reserved. Understanding the OSI Model INTRO v2.0—1-1.
Bluetooth POP3 Relay Project Benjamin Kennedy April 30 th, 2002.
Bluetooth Background Ericsson, IBM, Intel, Nokia, and Toshiba
1 I/O Management and Disk Scheduling Chapter Categories of I/O Devices Human readable Used to communicate with the user Printers Video display terminals.
1 Bandwidth Kevin Morrison Management Information Systems MWF 1-1:50pm.
Threads Many software packages are multi-threaded Web browser: one thread display images, another thread retrieves data from the network Word processor:
1 Chapter Overview Using the New Connection Wizard to configure network and Internet connections Using the New Connection Wizard to configure outbound.
Arguments for Cross-Layer Optimizations in Bluetooth Scatternets Bhaskaran Raman, EECS, U.C.Berkeley Pravin Bhagwat, AT&T Labs Research Srinivasan Seshan,
Distributed systems – Part 2  Bluetooth 4 Anila Mjeda.
Bluetooth Address or Name Sharing By Joseph Charboneau.
Bluetooth Techniques ECE 591. Overview  Universal short-range wireless capability  Uses 2.4-GHz band  Available globally for unlicensed users  Devices.
Computer Engineering and Networks Laboratory BTnodes A Distributed Environment for Prototyping Ad Hoc Networks Jan Beutel.
Transmission Control Protocol
King Fahd University of Petroleum & Minerals Electrical Engineering Department EE400 PROJECT Personal Area Networks Instructed by Dr.AlGhadbanPresenters.
MANETS Justin Champion Room C203, Beacon Building Tel 3292,
Bluetooth on CE. Mid - Presentation Roman Zoltsman & Oren Haggai Group /2001 Instructor: Nir Borenshtein HSDSL Lab. Technion.
A Comparative Study of Two Bluetooth APIs for Implementation in an Automated Wireless Identification System (AWIS) Sam Knights Rhodes University Supervisors:
발표자 : 현근수 Bluetooth. Overview wireless protocol short-range communications technology single digital wireless protocol connecting multiple devices mobile.
CS140 Project 1: Threads Slides by Kiyoshi Shikuma.
Protocols COM211 Communications and Networks CDA College Olga Pelekanou
Chapter 13 Session Layer. OSI Application Presentation Session Transport Network Data Link Physical Functions of Session Layer Interhost Communication.
Bluetooth In 1994, the L. M. Ericsson company became interested in connecting its mobile phones to other devices without cables. A SIG (Special Interest.
JPMA PROJECT PRESENTATION (ITU) 1 INTRODUCTION BLUETOOTH CHAT DESIGN JAVA ON MOBILE DEVICE Presenters Benjamin Boateng Abass Omer Venkateshwar Rao Namilakonda.
Introduction for Personal Area Networks including Infrared, Bluetooth, and Near-Field Communication. Presented By Valerie Lim.
Enterprise Network Systems TCP Mark Clements. 3 March 2008ENS 2 Last Week – Client/ Server Cost effective way of providing more computing power High specs.
Embedded Computer - Definition When a microcomputer is part of a larger product, it is said to be an embedded computer. The embedded computer retrieves.
A Flexible Scatternet- wide scheduling Algorithm for Bluetooth Wensheng Zhang and Guohong Cao IPCCC 2002.
Abdul Rahman Al-Refai Zavnura Pingkan. Introduction Bluetooth is a wireless technology for short range data and/ or voice communication The communication.
T. Vijaya Purnima  What is Bluetooth?  Bluetooth is a short-range wireless communications technology.  Why this name?  The 10th century.
Respected Ma’am & Dear friends
Created by :- prashant more prashant more. INTRODUCTION Bluetooth is wireless high speed data transfer technology over a short range ( meters).
BLUETOOTH LOW ENERGY Kieon Seong. Introduction  Chap 1. What is Bluetooth Low Energy? Difference Between Classic Bluetooth Device Types Design Goals.
Bluetooth 4.0: Low Energy.
Modularity Most useful abstractions an OS wants to offer can’t be directly realized by hardware Modularity is one technique the OS uses to provide better.
THE OSI MODEL By: Omari Dasent.
Information Protection & Cyber Security
How To Fix Printer Job Stuck in Print Queue?.  Most of the time, the HP printer won’t print from a computer because a print job stuck in the Windows.
Bluetooth, RFID, Data Link Layer Switching
“I don’t have to be careful, I’ve got a gun.”
Bluetooth Profiles.
Operating systems Process scheduling.
CPU SCHEDULING.
Windows Server Administration Fundamentals
Error Checking continued
Presentation transcript:

Supervisor : Gil Zussman Dror Barash Eran Golani

A growing need for short-range wireless applications. A need of “Electronic Artists” to introduce their art to visitors in exhibitions. Creating a Piconet based on a PPP network.

Learn Bluetooth Technology. Learn Ericsson’s Bluetooth Stack. Characterize and define a network solution for art transfer on the PPP based Bluetooth connections. Implement this solution on Windows Be scalable for usage in future project on Windows CE.

BlueTooth is a protocol for wireless communication (up to 10 meters). This protocol defines communication procedures. Bluetooth has a level modularity equivalent to OSI. BlueTooth is based on a Master/Slave relations, while the slaves synchronize and respond to the master and its requests.

The Artist will be the Master, while the visitors will be the slaves. The master will choose who is the next slave to connect to by certain algorithm. It won’t connect to other devices who don’t work in this certain protocol. A management algorithm defines how to make the inquiries, connections, disconnections and when.

The algorithm is based on the data the master holds about its slaves and will ensure: It won’t send to a certain slave the same picture again. It won’t send to a certain slave if the slave got to the limit of pictures the artist defined. Master will connect slaves using Round Robin policy. Before each new inquiry, it will check if the Master wanted to stop application.

After a defined number of connections, the master will make a new inquiry. Disconnection will occur when the slave doesn’t want this picture, after a picture transfer or when the slave has gone too far from the master.

A Data Structure (DS) is defined for : Master DS for connection information: 2 linked lists (fond_list and present_list), which hold the relevant fields. DS for his art: a pointer array with counter and linked list for each art. Slave DS for the art it gets : a directory to save all files in it.

There is a different GUI for the Master and Slave: Master Setup – a file tree for choosing files and their priorities. Operation – starting the algorithm. Slave Saving mechanism – a file tree to choose where to save the files arrived. Changing directories is possible during the application operation.

We have taken into consideration in our design important architectural decisions: Separating main algorithm. Enqueueing policy (found_list and present_list) Round Robin sending policy. Definition of max number of pictures and max number of connections between inquiries. Power-saving: checks before inquiries and not removing the whole present_list.

Because of these decisions, the application is: Modular. Scalable. Simple and easy to continue from. Well-managed. Power-saving. Fair and avoids starvation. Avoids getting stuck because of vicious slaves.

Implementing on Windows CE. AVL or Skip List to optimize the search time. Bonding options in device removal policy (present_list). Checking and showing battery condition.

We have learned a lot from this project: Introduced to Bluetooth Technology. Improved our planning and architecture defining skills. Learned to cope with problems of hardware devices. Faced with software problems (such as COM Technology). Dealt with working with Windows 2000 operating system.