Cart (Loading....) | Create Account
Close category search window
 

Traffic analysis for QoS provisioning in Bluetooth ad hoc network

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Hasbullah, H. ; Dept. of Comput. & Inf. Sci., Univ. Teknol. PETRONAS, Tronoh ; Sulaiman, S. ; Said, A.M.

Traffic from real-time and multimedia interactive applications are known to be bursty. With this behavior, they are said to associate with self-similar property, by which they can no longer be expressed as Poisson distribution, but following power law distribution such as Pareto. Bursty traffic has a direct impact on network performance. Thus, if the self-similar property can be captured at earlier stage before submission to network, a specific mechanism could be applied at a sender node such that a more regulated traffic could be obtained. As a result, deterministic network performance could be attained, and thus allowing QoS guarantees be granted to users. However, this can only be effectively done with support of a source traffic analysis. Hence, the objectives of this paper are two folds: first is to identify the reason for burstiness, and second is to determine if the self-similar property can be removed from the source traffic. By executing these two, a traffic analysis shall be produced. Video traces of Jurassic Park and Soccer were simulated in a Bluetooth ad hoc network environment and were checked against a set of criteria for self-similarity. It was found that, in the first place, self-similar behavior is indeed associated with bursty traffic. Secondly, the number of packets produced from SAR segmentation protocol is the reason for the heavy-tailed distribution of the source traffic. Finally, the SAR protocol was found unable to eliminate the self-similar property from a bursty traffic flow.

Published in:

Telecommunication Networks and Applications Conference, 2007. ATNAC 2007. Australasian

Date of Conference:

2-5 Dec. 2007

Need Help?


IEEE Advancing Technology for Humanity About IEEE Xplore | Contact | Help | Terms of Use | Nondiscrimination Policy | Site Map | Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest professional association for the advancement of technology.
© Copyright 2014 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.