Architectural Challenges in Designing of Data Transaction System for Short Range Communication
Journal Title: International Journal of Management, IT and Engineering - Year 2012, Vol 2, Issue 8
Abstract
Bluetooth technology is intended primarily as a replacement of cables between electronic devices, as in Personal Area Networks (PANs), or for connecting the components of a computer system. In addition, larger topologies like ―scatternets‖ are targeting wider geographical area applications in colleges, universities, factories, warehouses, shopping malls and various sensor network applications. For scatternet formation and scheduling issues, less attention has been given to optimizing scatternet topologies. Sizing a scatternet in terms of minimizing the number of piconets has been addressed. The short range communication technologies like scatternet formation has not been formally defined in the Bluetooth SIG specifications. As a result, numerous protocols have been proposed. While modeling ad-hoc networking, in general, is complex, the additional restrictions imposed by the Bluetooth specifications—such as low cost of the device, low power consumption and network resilience while using piconets that have a maximum of seven active nodes—have created a significant challenges. This paper addresses the challenges of scatternet formation for multi-hop to Bluetooth based personal area and adhoc networks, with minimal communication overhead. In a multi-hop adhoc network, all wireless devices are in the radio vicinity of each other, e.g., electronic devices in a laboratory, or laptops in a conference room. In this paper we apply a method to multi hop networks, by showing that position information is then not needed. Each node can simply select a virtual position, and communicate it to all neighbors in the neighbor discovery phase. In this paper, architectural challenges during design of short range communication technologies are considered.
Authors and Affiliations
Kamani Krunalkumar C. , Kathiriya Dhaval R. and Virparia Paresh V.
slugKerberos Authentication Protocol Modeling Using NUSMV Model
Authentication is one of the biggest problem related to computer information security in the area of distributed environments. Various protocols are used for the authentication purpose such as Needham-Schroeder protoco...
Mentoring Programs: A Case Study of an Automative Company
The Company ran a mentoring program for the HIPOs(High Performers).As a part of its international development project aimed at leadership development, digital transformation and high performance culture need was felt...
Marketing strategies of Patanjali Ayurved (FMCG) in present market scenario
India is one of the biggest developing business sector with an aggregate populace over one billion. After post-progression the nearness of MNC indicating extraordinary rivalry among organizations for their item. They a...
Goal programming model with the deployment of ATMs machines random demand
We all have experienced the discomfort of waiting in a queue. Unfortunately, this phenomenon is becoming increasingly common in urban societies with increasing population. One of the problems of ATM machines is the lon...
RP – THE CHANGES TRENDS OF INFORMATION TECHNOLOGY
This research presents an overview of the Systems Applications and Products in Data Processing (SAP) Enterprise Resource Planning (ERP) implementation methodology and important tools that make SAP a complete solution t...