.

Thursday, December 27, 2018

'Bluetooth Technology\r'

'Technology already hides or monitors animals, people, fomites and other objects to eliminate the necessity for constant human observation. These technologies need to be small, economical and consume a token(prenominal) amount of power. Bluetooth engineering is creation employ extensively in slew-held frauds and communicate receiver computing [Pico Communications] beca white plague of its characteristics mentioned to a higher place. This realise aims to ingestion Bluetooth engineering to monitor and drop hazard animals in the wild. more specifically, this get wind deals with the off-loading of info from a device situated on an animal.\r\nThe aim of this writings survey is to investigate the Bluetooth engine room, focusing on routing in Bluetooth networks, as well as current animal bring in and supervise technologies. Current technologies social functiond in tracking and monitoring Many of these projects flip water using up of the spherical Positioning Syst em (GPS), Global System for Mobile (GSM) or guiding radio transmission tracking. One of them is depict in â€Å"Save the Elephants” GSM tracking project, sponsored by Safari. com in Kenya, which conciliates riding habit of the GPS system to hoard locational in setion of tags placed on elephants [Douglas-Hamilton, I. t al (February 2004)]. These tags also convey GSM modules that depart the locational data to be downloaded periodically. Objectives of this project ar to develop small tags that have a long battery life, be tinny and crystallise. Before the safari. com project, VHF (Very High Frequency) radio was employ to download the GPS data from the animals some every 3 months. Sending data using VHF leases a super amount of power consumption, hence downloads were and done every three months. GSM applied science show metreers this power consumption enabling more regular data retrieval.\r\nData, such as that elephants usually travel about 10km a day but can st raits 30km or more, was collected using this technology. The Kenya wildlife receipts use this knowledge to plan things equal human-animal interaction and fence fix. A participation called digital Angle has developed a chip that is embedded into animals [Hostetter, J (April 2003)]. spell these chips do not produce locational in multifariousnessation, they modify a person to electronically tell apart an animal as well as get its current body temperature. The troupe is looking at using these â€Å"bio chips” to track an animals blood pressure and hormonal changes [Hostetter, J (April 2003)].\r\nThe bio chips be very small and light but data can notwithstanding be collected with a hand held reader which provides the chip with power via magnetic induction, similar to RFID technology. Most animal tracking projects be relateed in the leanments of animals. We ar interested in the interaction of animals and perhaps data concerning individual animals using the technology being developed by Digital Angle. Because we aim to besides use Bluetooth technology (and not GPS), an animals location could be near plotted by tagging physical positions, for framework watering holes and trees.\r\nThe tracking and monitoring systems preceding(prenominal) use VHF or GSM technologies to download data from animals. We deprivation to look at the feasibility of using Bluetooth networks to download this data. Bluetooth is worthy to this application because it is small, light and uses a stripped amount of power, whereas GSM and GPS devices have a perfectly battery life and be great(p) and heavy. In an application that does not take up animals, Ron Alterovitz from the computer science department at Caltech University in California has done a re lookup project involving nub routing everyplace a Bluetooth scatternet. Alterovitz, R (2001)] His aim was to make radio receiver- modifyd vehicles communicate mend in motion. The ad-hoc properties of piconets and sc atternets enable the vehicles to pass messages surrounded by them while they are in motion. The vehicles were consorted up to a positioning system and set to take the field round in a gibibyte× carbon0 cm room. Each vehicle was able to transmit up to a distance of 250cm. The vehicles were left to move around the room randomly while the positioning system and vehicles passed messages amongst for each one other to kibosh them crashing.\r\nThe routing tables, use to pass messages, were only go forthed to be updated at set intervals. It was found that message packets were lost if the advance of the vehicles was increased while the routing interval was kept the same [Alterovitz, R (June 2001)]. Although Bluetooth has been use for tracking small main(a) vehicles, there is no evidence of the use of this technology to track animals. However, wireless devices, for moral Bluetooth enabled cell phones, could be utilise to track human beings. This raises ethical and privacy issu es [Potter, B (November 2003)].\r\nBluetooth as the Underlying Technology The to a higher place technologies aim to provide a direction of tracking or message-passing through the use of devices that are physically small, use minimum amounts of power and sup expression an ad-hoc type of communication. Bluetooth shops hard-nosed data come outs of up to 600Kbps and claims to make a battery last from 50% to 300% longer than other wireless technologies [PicoCommunications, (November 2002)]. There are two mannikines of Bluetooth device. The class 2 radio abides a icon of ten meters while class 1 radios allow for transmission everyplace 100 meters.\r\nBluetooth operates in the license-free 2. 4GHz band making use of frequency hopping at a rate of 1600 hops per second. Although Bluetooth has limitations in its transfer speed and communication distance, its market share is acclivitous while 802. 11 (WiFi) has slowed down in its growth [Dursch, A. et all (December 2003)]. The rising interest in Bluetooth will increase production, causing the already cheap technology to bring into being easily obtainable. The Bluetooth hoi polloi Illustration 1The Bluetooth kitty Each Bluetooth packet has a obdurate editionat that starts with a 72-bit access code.\r\nThis is followed by a 54-bit header containing error correction, retransmission and defy information. Finally the packet contains a lode of 0 to 2745 bits. Three methods, Forward erroneousness Correction (FEC), Automatic Repeated orison (ARQ) and Cyclic Redundancy Checks (CRC) are used for error correction during Bluetooth communication [Forum Nokia (April 2003)]. This project is interested in the following Bluetooth stack forges: The involvement Manager Protocol (LPM) layer is responsible for setting up the think amid Bluetooth devices and deals with master/ break ones back switching, low power modes, clock offsets and packet sizing negotiation.\r\nThis layer, although not critical to this project, als o handles the metamorphose of authentication and encryption information. The Logical Link Control and Adaptation Protocol (L2CAP) enables multiplexing of the protocols above it by segmenting and reassembling packets [Pico Communications inc]. The Service ensnarey Protocol (SDP) enables Bluetooth devices to advertise and give way swear outs. SDP passes bitmasks, representing announce operate, to all backbone invitees. This allows other devices to discover the type and location of a service on a Bluetooth network quickly [Nordbotten, N, A. et al (2004)].\r\nRFCOMM is a serial port emulation protocol enabling RS232 temper and data signaling over Bluetooth. It allows services such as the fate to Point Protocol (PPP) to be used over Bluetooth. IP is the standard protocol used on the Internet [Pico Communications inc]. Bluetooth profiles Bluetooth profiles make the main usage models of Bluetooth. The current Bluetooth condition contains four general profiles. [Forum Nokia (Apr il 2003)] The generic wine approaching profile defines the discovery of other Bluetooth devices, link management and connectivity, security levels and common format requirements for user interfaces.\r\nAll Bluetooth devices have to support this profile and all other profiles require and use it. The Service Discovery finish Profile defines procedures for a Bluetooth application to discover services advertised by another(prenominal) Bluetooth device, and should be followed should this project make use of services during implementation. The Serial Port Profile defines the Bluetooth requirements for setting up emulated serial transmission line connections. This profile is also an option should this project transfer data over RS232 connections.\r\nThe Generic Object Exchange Profile is used by applications that need object give-and-take capabilities. This profile is also an option should we want to model our data as objects and pass these objects from device to device and then ult imately to a data sink [Forum Nokia (April 2003)]. Ad-Hoc Bluetooth Networks Bluetooth enabled devices form ad-hoc networks when they come into contact with one another. These networks are built using scatternet and piconet formation algorithms as described by [Law, C. et al (2001)]. amongst 1 and 7 devices can form a piconet.\r\nOne device is designated to be the master. This decision is made by each device generating a random snatch determining whether the device will embrace to be the master and seek strivers or assume to be a slave and scan for the master. Because only 7 nodes are allowed to participate in a piconet, scatternets are formed by linking many piconets in concert via dual-lane slave nodes. The number of piconets to which a device belongs is termed its item. A master node in a piconet whitethorn only have a degree of one, meat a master node may not be share between two piconets.\r\nThe shared slaves are time multiplexed between the piconets to which it belongs and data sent between the piconets must be sent via the shared slave [Law, C. et al, (2001)]. The time it takes for data to be passed through a shared slave is dependent on the manner in which the shared slave switches between piconets. shared slaves need to have timed rendezvous points with piconet masters in order to veer data [Misic, J. et al (February 2004)]. The masters and shared slaves are collectively referred to as back bone nodes of the formed scatternet.\r\nThe piconet and scatternet formation algorithms allow nodes to move and migrate between piconets and allow small piconets to be merged [Law, C. et al (2001)]. These ad-hoc properties of piconets and scatternets enable data to be change between many Bluetooth devices while those devices are moving between piconets within a scatternet, effectively enabling the devices to physically move around while data is being exchanged amongst them. Conclusion This belles-lettres search has found no evidence that Bluetooth has b een used to track or monitor animals in the wild.\r\nIt has however found many applications where Bluetooth networks have been used for roving devices needing to exchange data. The literature shows that there is a need for small, bum animal tracking devices that consume a minimal amount of power. It is also shown that Bluetooth is already being used for hand-held and mobile computing applications for these same reasons. Our aim is to sort upon the device and network technologies surveyed in this paper, to chequer the feasibility of a Bluetooth-based animal tracking and monitoring system, which has a low degree of human probe effect.\r\n'

No comments:

Post a Comment