Cross-Layer-Based Adaptive Traffic Control Protocol for Bluetooth Wireless Networks
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2017, Vol 8, Issue 6
Abstract
Bluetooth technology is particularly designed for a wireless personal area network that is low cost and less energy consuming. Efficient transmission between different Bluetooth nodes depends on network formation. An inefficient Bluetooth topology may create a bottleneck and a delay in the network when data is routed. To overcome the congestion problem of Bluetooth networks, a Cross-layer-based Adaptive Traffic Control (CATC) protocol is proposed in this paper. The proposed protocol is working on backup device utilization and network restructuring. The proposed CATC is divided into two parts; the first part is based on intra-piconet traffic control, while the second part is based on inter-piconet traffic control. The proposed CATC protocol controls the traffic load on the master node by network restructuring and the traffic load of the bridge node by activating a Fall-Back Bridge (FBB). During the piconet restructuring, the CATC performs the Piconet Formation within Piconet (PFP) and Scatternet Formation within Piconet (SFP). The PFP reconstructs a new piconet in the same piconet for the devices which are directly within the radio range of each other. The SFP reconstructs the scatternet within the same piconet if the nodes are not within the radio range. Simulation results are proof that the proposed CATC improves the overall performance and reduces control overhead in a Bluetooth network.
Authors and Affiliations
Sabeen Tahir, Sheikh Tahir Bakhsh
Comparison and Analysis of Different Software Cost Estimation Methods
Software cost estimation is the process of predicting the effort required to develop a software system. The basic input for the software cost estimation is coding size and set of cost drivers, the output is Effort in ter...
Combating the Looping Behavior: A Result of Routing Layer Attack
Routing layer is one of the most important layers of the network stack. In wireless ad hoc networks, it becomes more significant because nodes act as relay nodes or routers in the network. This characteristic puts them a...
Heuristics Applied to Mutation Testing in an Impure Functional Programming Language
The task of elaborating accurate test suites for pro-gram testing can be an extensive computational work. Mutation testing is not immune to the problem of being a computational and time-consuming task so that it has foun...
A Solution for the Uniform Integration of Field Devices in an Industrial Supervisory Control and Data Acquisition System
Supervisory Control and Data Acquisition (SCADA) systems are increasingly used solutions for monitoring and controlling various industrial processes. The existence of a large number of communication protocols helps to de...
Sentiment Analysis on Twitter Data using KNN and SVM
Millions of users share opinions on various topics using micro-blogging every day. Twitter is a very popular micro-blogging site where users are allowed a limit of 140 characters; this kind of restriction makes the users...