You are on page 1of 8

JOURNAL OF COMPUTING, VOLUME 2, ISSUE 12, DECEMBER 2010, ISSN 2151-9617

HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/
WWW.JOURNALOFCOMPUTING.ORG 25

A Study on Local Area Network Access Point


Using Bluetooth Devices
M.Sughasiny, Dr.R.Dhanapal

Abstract— Purpose of this paper is to enable the user who possesses only a Bluetooth PC card, to receive network services
(such as browsing the Web using a Web browser). These services will be provided to the user by another computer, also has a
Bluetooth card and connected to the network via standard network card. The user moves around, which has some potential
servers. Once, this would be close enough to one of them, can connect through automatically. This is fulfilling the client
software, installed on the user's computer and the server software, installed on a second computer, connected to the network.

Index Terms— Bluetooth PC Card, Local Area Network (LAN) and User Interface (UI)

——————————  ——————————

1 INTRODUCTION
This paper shows the analysis and implementation of a (i)LAN access point— This Bluetooth device provides
Bluetooth device discovery with LAN access capability. service access to LANs supporting various link-layer pro-
Device discovery and connection establishment are fun- tocols.
damental to communication between two Bluetooth (BT)
devices. We give an analytical model of the time it takes (ii)LAN data terminal— this is a PPP client device that
for the master in a piconet to discover one slave. We show requests for access to the LAN through the LAN access
that, how discovery time is affected by point service access to LANs supporting various link-
layer protocols.
(i) the presence of multiple potential slaves, and
(ii) changes in the maximum backoff limit  The objective is to enable the user, in his possession a
laptop without a network connection is available, be con-
Our proposed handoff scheme eliminates the inquiry pro- nected and receive services from the standard. The user
cedure and only requires paging procedure during a must have a Bluetooth card and must be in the range of
handoff. We have implemented a prototype of Bluetooth up to about 10 m from another computer on which soft-
device discovery system with LAN access capability by ware is installed in server. The client software is always
our proposed scheme. Normally the device discovery will looking for Server, which it can connect. Once, server is
initiate the establishment of a Data Terminal (DT) connec- found, the client software get connection and start the
tion to the LAN select a suitable PPP/RFCOMM service flow of information at the moment, the user performs an
that it provides. action (like requesting a Web Log).The server software is
passive wait until client software that is supposed to con-
The LAN access profile (LAP) describes how PPP connec- tact it. When software is installed client relationship with
tions can be set up over RFCOMM for Bluetooth devices server, then it will be a short protocol of the connection
discovery to get connected and access LAN services. It between the two sides after the server is ready to receive
also defines how connected devices in a Pico net can form information from the client.
an independent LAN by using the same PPP connection
mechanisms. 2 PAPER DESCRIPTION
There are two roles defined for the Bluetooth devices Wireless connection is fulfilling paper to LAN via Blu-
supporting LAP. etooth components. Access to LAN is by using the serv-
er's network card. Communication between the clients to
————————————————
LAP is above the RFCOMM layer. Defining and imple-
 M.Sughasiny is with the Department of Computer Science,Research menting a business project user and server applications.
Scholar,Bharathiar University.
The server is realized on a computer with access to the
 Dr.R.Dhanapal is with the Department of Computer Application,
Eswari Engg. College ,Affliated to Anna University.
Internet or intranet - Nat. Bluetooth client server waits
when it comes to connecting to the server initiates and
proposes “the LAP-service”. The relationship between

© 2010 Journal of Computing Press, NY, USA, ISSN 2151-9617


http://sites.google.com/site/journalofcomputing/
JOURNAL OF COMPUTING, VOLUME 2, ISSUE12, DECEMBER 2010, ISSN 2151-9617
HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/
WWW.JOURNALOFCOMPUTING.ORG 26

units - Powered by Bluetooth and once established server 2) Establishment of server-client relationship.
and client server provides the client computer, unable to
connect to the Internet. 3) Implementation of master-server switch.

4) Assign the necessary network resources to client to


connect to a network by the server.

5) Traffic control server-client information.

Paper demonstrated the use of LAP by client-side brows-


er connects through a Web server. Client sends the re-
quests (eg HTTP GET request) only means the server
computer Bluetooth, where the server receives the request
to connect to the Internet and returns the responses de- CONTROL - the component responsible for the boot,
sired customer.Implementation of LAN Access Point In- making inquiry, the use of SDP process, control of
ternet using the new Bluetooth technology, this project construction and finish with RFCOMM/L2CAP.
which will work server environment using NT and pro-
vide the appropriate hardware, Internet connectivity Blu- SERVICE BROWSER - controlled by the CONTROL, run
etooth devices who want this service. The server will be by the SDP protocol parameters provided by
able to give this service a few instruments Bluetooth pa- the CONTROL.
rallel.
RFCOMM DRIVER - pipe data between components of
Steps to create a LAN connection: the BT.

•Making Inquiry to find components BT range CONTROL - The unit is used to boot - LAP, meets with
•LAP service detection protocol using SDP SDP requests the SERVICE CONFIGURATION, respon-
•Establishing contact RFCOMM/L2CAP between DT sible for communication with the LAN.
(Data Terminal) and LAP
•Assign an IP address to DT. RFCOMM DRIVER - pipeline transfer of information
•IP packets flow in both directions. between components of the BT.
•Disconnect contact initiated by either party.
SERVICE CONFIGURATION - Initializing service
attributes, SDP is used as the interface.

3 Architecture- BTClient
Layer 1

o Boot the Bluetooth unit.


o Search the LAP server using SDP.
o LAP Boot Server connection with the renewal in
case of disconnection.
o Sending and receiving packets with the Blutooth
unit second.
Functional definition of the program:
Layer 2
1) Search Services with inquiry LAN access and SDP (by
the client). Used as an interface between the agents for layer 1.Moves

© 2010 Journal of Computing Press, NY, USA, ISSN 2151-9617


http://sites.google.com/site/journalofcomputing/
JOURNAL OF COMPUTING, VOLUME 2, ISSUE 12, DECEMBER 2010, ISSN 2151-9617
HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/
WWW.JOURNALOFCOMPUTING.ORG 27
27
to Layer 1 packets received what-agents. uses objects and Client Agent Client Handler.
Transfer packages to agents received from layer 1.

Server

Listening on the port assigned to communicating with the


browser and creating agent when the browser creates a
new connection.

Agent

1. Created (by the server) when the browser wants to


create a new connection and Browsers when a package
arrives, pass it to layer
Fig 4. Software Block Architecture
2. When a package comes from layer 2, sending it to the
browser. 3. BTLayer2DataObserver - pure virtual class, and han-
dles data in, coming to her.
4 Architecture-– BTServer
4. BTLayer2CmdObserver - pure virtual class, and han-
Layer 1 dles requests related to agents.
 Boot the Bluetooth unit.
 One unit about LAP on SDP. 5. BTServer - an object that listens on port 1080 as soon as
 Contact gift than any client. he detects a request to open a new connection object is
 Boot client relationship with the LAP. create a Client Agent, to handle this connection.
 Sending and receiving packets with the Blu-
etooth unit second. 6. Client Agent - this object is created for each new con-
nection and responsible to all the data that comes to him
Layer 2 from the call layer 2. Additionally, it puts all data, comes
to him from layer 2 to the contract.
Used as an interface between the agents for layer 1.Moves
to Layer 1 packets received what-agents. 7. Client Handler - this object is responsible for object crea-
Transfer packages to agents received from layer 1. tion BTServer process requests Sliding Client Agent objects.

Server
5.1 Bluetooth Layer Module - Layer 1
Director of the value of the agents
Agent creates a layer 2 when he passes a request to open This object responds to events, arriving Bluetooth unit.
a new connection. Each event is received escalated function Serv-
er_Main_State_Machine Server function.Server is the ma-
Agent chine function modes, the number of steps executed by a
boot and then taking care of traffic information. Startup
Created (by the server) when the layer 2 seeks to create a phases are:
new connection.When a package reaches the destination
computer, pass it to layer 2.When a package comes from 1. HCI_CONFIGURE_PORT_CNF - Boot HCI layer.
layer 2, sending it to the destination computer.
2. COM_START_CNF - One application in SCM.
5 SOFTWARE ARCHITECTURE –BLOCK SCHEME
3. SCM_REGISTER_CNF - Making Argystartzia in SCM
The client software consists of the following objects:
and generating the stack.
1. Layer 1 - This layer handles in events, reach the Blu-
4. HCI_WRITE_VOICE_SETTINGS_CNF - the end of the
etooth unit.
boot stack.
2. Layer 2 - This layer handles data in, runs both ways
5. COM_FILL_PDL_CNF - Finish the Profile One.
between layer 1. In addition, it handles data in, passing in
both directions between the HTTP browsers. To do this it

© 2010 Journal of Computing Press, NY, USA, ISSN 2151-9617


http://sites.google.com/site/journalofcomputing/
JOURNAL OF COMPUTING, VOLUME 2, ISSUE12, DECEMBER 2010, ISSN 2151-9617
HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/
WWW.JOURNALOFCOMPUTING.ORG 28

When the startup phase ended, you can begin to transfer 2. Error - This function is called when the machine func-
data over the RFCOMM layer. tion Client Unknown modes of failure comes into the sys-
tem. This function contains an infinite loop.

3. Send Data - This function is called from the machine


when it is interested states to send a package to the
server. Function checks whether to-Layer 2 has a package
ready. If there is a package, it is sent by COM_DataSend
function (which is an internal function of the stack). If
there is no package, end function timer starts. When the
time expires on the timer, you will machine states to
TIMEOUT_EVT.

4. SendDataAgain - This function is called from the ma-


chine states when it comes to COM_DATA_CNF_NEG,
The server does not initiate the beginning of the relation- which means that the package arrived in the last ack sent
ship, but waiting for her from-client. Transfer the pack- to. Function will send the package back as a function
ages to the following conditions are machine modes: Send Data above.

1. COM_CONNECT_IND - the machine comes to this 5. Start Session - This function does boot information of
situation when the client makes any contact with her. Af- the Bluetooth unit.
ter exit from this state, the server will transfer packets in
both directions. Layer 2

2. COM_DATA_IND - the machine comes to this situa- This object handles data traffic between Layer 1 and type
tion when the package reaches the Bluetooth unit on the Client Agent objects. Because, he connects the number of
other side. In this situation, the package will be trans- agents with a layer one single process, there are two de-
ferred to layer 2. In addition, the system tries to send a partments which treat this problem:
package to the other side. If there is no packet transmis-
sion, the machine will wait for a certain amount of time 1. Command - because, there is a need to identify every
and try again to send a package. packet, which passes between the agents and the layer 1,
each package comes from some get-agent header, which
3. COM_DATA_CNF - machine reaches this state when it will be a unique identifier of the agent (it accepts the
ack on the package, sent to the Bluetooth unit second. In agent when it was created) type package runs. Depart-
this mode the system try to get a package from Layer 2 to ment contains the following fields:
send it to the Bluetooth unit second. If there is no packet
transmission, the machine will wait for a certain amount a. the buffer - This field contains the contents of the pack-
of time and try again to send a package. age.

4. TIMEOUT_EVT - the machine comes to this situation b. length - length of buffer field.
after, ending time, where she was waiting for the new
package was not from layer 2. In this mode the system c. cmd - type of message information (data, open, close,
tries to get back a package from layer 2. reset).

5. COM_DATA_CNF_NEG - the machine comes to this d. channelId - unique channel number of the agent.
situation when the arrived ack packet. In this mode the
system try to resend the same package. There are several functions the department for the treat-
ment of object:
In addition, there is Layer 1 in the following functions:
i. setData - changes the contents of field buffer (and up-
1. CLIENT_Init - This function performs a different boot dates the length field).
the client and Ericsson stack.
ii. getPacket - back to the command key type variable
void *.

© 2010 Journal of Computing Press, NY, USA, ISSN 2151-9617


http://sites.google.com/site/journalofcomputing/
JOURNAL OF COMPUTING, VOLUME 2, ISSUE 12, DECEMBER 2010, ISSN 2151-9617
HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/
WWW.JOURNALOFCOMPUTING.ORG 29
29
iii. unpack - performs the opposite action to getPacket. function contains an infinite loop.
2. Queue - line standard is intended to store the messages
that come what-agents to the point where Layer 1 would 3. SendData - This function is called from the machine
want to send a message and then pulling messages from when it is interested states to send a package to the client.
the queue. Function checks whether to-Layer 2 has a package ready.
If there is a package, it is sent by COM_DataSend func-
Working with layer 1 are carried out through the follow- tion (which is an internal function of the stack). If there is
ing functions: no package, end function timer starts. When the time ex-
pires on the timer, you will machine states to TIME-
1. ProcessBuffer - This function is called from an object OUT_EVT.
layer 1 when it has data, which reached the Bluetooth
unit on the second. The data reaches a variable void *. 4. SendDataAgain - This function is called from the ma-
Function will make the data command object and thereby chine states when it comes to COM_DATA_CNF_NEG,
confirmed the information on the message type (field which means that the package arrived in the last ack sent
cmd). In addition, from a field channelId can know the to. Function will send the package back as a function
agent, which is intended message. The function handles SendData above.
on 4 types of messages:
5.2 Bluetooth Layer Module - Layer 2
a. the data - contents of the message is transmitted to the
appropriate agent. This object handles data traffic between Layer 1 and type
ServerAgent objects. Because, he connects the number of
b. Open - ignores the message from the function, place agents with a layer one single process, there are two de-
lamb-server is not trying to open new connections. partments which treat this problem:

c. close - the right agent will be closed. 1. Command - because, there is a need to identify every
packet, which passes between the agents and the layer 1,
d. reset - will be a function ResetNotifyConnection. each package comes from some get-agent header, which
will be a unique identifier of the agent (it accepts the
2. GetBuffer2Transmit - This function is called from an agent when it was created) type package runs. Depart-
object layer 1 when he wants to send a package to the ment contains the following fields:
server. The function will check the head of the queue and
return its contents (if the queue is not empty). a. the buffer - This field contains the contents of the pack-
age.
3. OpenChannel - this function called when a new agent. b. length - length of buffer field.
The function add-agent in the use of agents (m_channels) c. cmd - type of message information (data, open, close,
to send an open-server (in fact, put the message line). reset).
d. channelId - unique channel number of the agent.
4. CloseChannel - This function is called when we want to
close one channel. The function will remove the agent There are several functions the department for the
array the m_channels send close message to server. treatment of object:

5. SendData - This function is called from the agent when a. the setData - changes the contents of field buffer (and
it has data to send to the server. Function insert the in- updates the length field).
formation into the command object to, it would be possi-
ble to identify the agent, who sent the package on the b. getPacket - back to the command key type variable
other side will function as a package. void *.

6. ResetNotifyConnection - This function is called when c. unpack - performs the opposite action to getPacket.
you want to reboot your system. Close all functions the
agents. 2. Queue - line standard is intended to store the messages
that come what-agents to the point where Layer 1 would
1. SERVER_Init - This function performs a different boot want to send a message and then pulling messages from
the server and Ericsson stack. the queue.

2. Error - This function is called when the Server machine Working with layer 1 are carried out through the follow-
function modes of failure comes into the system. This ing functions:

© 2010 Journal of Computing Press, NY, USA, ISSN 2151-9617


http://sites.google.com/site/journalofcomputing/
JOURNAL OF COMPUTING, VOLUME 2, ISSUE12, DECEMBER 2010, ISSN 2151-9617
HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/
WWW.JOURNALOFCOMPUTING.ORG 30

Department ServerAgent this class inherits.


1. ProcessBuffer - This function is called from an object
layer 1 when it has data, which reached the Bluetooth BTLayer2CmdObserver
unit on the second.
This is pure virtual class. Classes inheriting from nurses
The data reaches a variable void *. Function will make the in-agents. There are two functions:
data command object and thereby confirmed the informa-
tion on the message type (field cmd). In addition, from a 1. openRequest - This function takes care of opening a
field channelId can know the agent, which is intended new agent.
message. The function handles on 4 types of messages:
2. closeRequest - This function handles the closing agent
a. the data - contents of the message is transmitted to the of some sort.
appropriate agent.

b. open - the function request from BTServer (responsible


6 IMPLEMENTATION BTSERVER INHERITS THIS
for managing the agents) to create a new agent, to handle
CLASS
this connection. If and BTServer agent could not open
new message will be sent to close the other side.
BTServer
c. close - the right agent will be closed.
This department manages the value of the agents in the
d. reset - will be a function ResetNotifyConnection. server and for this she inherits from BTLay-
er2CmdObserver virtual. The department is responsible
2. GetBuffer2Transmit - This function is called from an for creating and closing agents fulfills the following func-
object layer 1 when he wants to send a package to the tions (which she inherits from BTLayer2CmdObserver)
server. The function will check the head of the queue and
return its contents (if the queue is not empty). 1. openRequest - This function initializes a new agent
puts him channelId unique.
3. OpenChannel - this function called when a new agent.
The function will add the-agent in the use of agents 2. closeRequest - This function closes a particular agent
(m_channels) and send message to client open (in fact, based on his channelId. The function searches for the
put the message line). agent in the use of agents and deletes it.

4. CloseChannel - This function is called when we want ServerAgent


to close one channel. The function will remove the agent
array the m_channels send close message to client. This department handles a single connection. To this end
she inherits from BTLayer2DataObserver. The depart-
5. SendData - This function is called from the agent when ment is responsible for creating the engagement with the
it has data to send to client. Function insert the informa- target computer to transfer packages from. The Depart-
tion into the command object to, it would be possible to ment has two classes for handling a call:
identify the agent, who sent the package on the other
side. Will function as a package 1. Receiver - This class is thread, whose job to listen to the
open socket with the target computer package when it
6. ResetNotifyConnection - This function is called when arrives, it must forward it to ServerAgent. There are two
you want to reboot your system. Close all functions the class functions:
agents. a. the PerformIO - this function fulfills the listening socket
to open. When a package arrives on the socket, is a call to
7. ResetConnection - This function calls to ResetNotify- SendData of layer 2.
Connection then sends a reset message to the other side.
b. AbortIO - This function closes the open socket with the
5.3 BTLayer2DataObserver destination computer.
This is pure virtual class. It exists only one function - Da-
taArrive. She called at a time, comes with the package for 2. item_t - This class fulfills part of a second Features: buf
the object to deal with it. (which is a string) and len (length of the string).
In ServerAgent Receiver type object exists and also there
is a item_t line that contains the packages, came from the

© 2010 Journal of Computing Press, NY, USA, ISSN 2151-9617


http://sites.google.com/site/journalofcomputing/
JOURNAL OF COMPUTING, VOLUME 2, ISSUE 12, DECEMBER 2010, ISSN 2151-9617
HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/
WWW.JOURNALOFCOMPUTING.ORG 31
31
Layer 2 and waiting to send to target computer. If variable connected is true, the function sends the pack-
age on the open socket
In ServerAgent functions are:
4. ParseInitPacket - This function accepts as input the
1. DataArrive - This function is called from layer 2 when first eight houses, sent in creating the connection and re-
the package has arrived, designed for a specific agent. turns the IP address and port number. Also, it returns a
Function as what the message. value, indicating success or failure of the function.

2. RunSync - This function moves the line and as long as 5. CreateRetBuf - This function accepts input to the first 8
it contains packages, she calls a function ProcessBuffer, contract houses bool variable. If the variable is true, the
taking care package. After reading to ProcessBuffer, it function changes the second house value '90 '(indicates
deletes the package from the queue. success). If the variable is false, the function changes the
second house value '91 '(indicates failure). Function call is
3. ProcessBuffer ‐ This function takes care of creating a  made from a function ProcessBuffer.
connection with the destination computer and pass pack‐
ets to it. When you create a new connection using socks  6. putData - This function puts a message queue.
4.0, there is a fixed structure and the first homes, are sent 
7. getData - This function takes a message from the
to the application: 
queue.

8. abort - This function closes the Receiver object and the


agent itself.
 

6 CONCLUSION

This paper implemented the possibility to use network


services without any connection to stationary. Type of
connection is almost transparent to the user. The user to
  define the socks, server, which he uses only In addition,
  the rate of data transfer is unlikely.
ServerAgent exist in a variable, called connected and in-
dicates whether the connection creation phase ended. During the paper revealed a number of problems:
Contract creation phase includes the receipt of the first
houses and opening socket. All a function of the con- 1. Paper was implemented over the stack of the company
nected condition tested. If it is false, copied the houses, Ericsson. The stack is very rigid and closed-source, so that
which were called into the buffer to the point, which were you can not make significant changes.
already eight houses (which are the first 8 houses). The
houses then are called up to the appearance of the charac- 2. The Bluetooth hardware, which we used is not reliable
ter following the ASCII value of his is 0. This character and need to format it whenever you start the software.
marks the end the username field.
3. The hardware does not meet the high transmission
When this character is called a function ParseInitPacket. rates. These butchers are required when the user tries to
This function returns the IP address and port number of access the HTML page, which contains objects such as
the destination computer. Function tries to connect to the images in addition to text. In this situation the number of
target computer using the IP address and the port. If lo- connections opened by several agents.
gin is successful, is a function CreateRetBuf, which
creates a package to send back to client. Excellent pack-
age, creating the connection was successful. If the connec-
7 FUTURE ENHANCEMENTS
tion failed or in which ParseInitPacket failed, is a function
CreateRetBuf, which creates a package to send back to 1. Replacement of layer 1 for open source can improve
client. In this case, stated in the package, creating the system performance. Again, the stack of company
connection failed. Ericsson is closed source and therefore very limited.

2. It can be used as a basis for paper and other papers

© 2010 Journal of Computing Press, NY, USA, ISSN 2151-9617


http://sites.google.com/site/journalofcomputing/
JOURNAL OF COMPUTING, VOLUME 2, ISSUE12, DECEMBER 2010, ISSN 2151-9617
HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/
WWW.JOURNALOFCOMPUTING.ORG 32

will be implemented over Bluetooth. Similarly you can 170.


implement FTP, print server, etc…

[11] Howitt, I.; Seung Yong Ham,“Site Specific WLAN and WPAN
Coexistence Evaluation”,Wireless Communications and Network-
8 REFERENCES ing, 2003. WCNC 2003. 2003 IEEE , 2003 , Page(s): 1487 - 1491 vol.3.

[1] M.Sughasiny, Dr.R.Dhanapal,”An Empirical Study on


AUTHOR BIBILIOGRAPHY
Enchanced Protocols for Improved Bluetooth Data
Transmission”, International Journal Of Advanced Re-
search In Computer Engineering,Vol 3, Number 2, M. Sughasiny is with the Department of Computer
2009,Page(s): 345-347. Science, Srimad Andavan Arts & Science College, Affi-
liated to Bharathidasan University ,Thiruchirapalli– 620
[2] Doufexi, A. Arumugam, A. Armour, S.; Nix , A.; “An 005,Tamil Nadu India, a research scholar pursuing Ph.D
Investigation of the Impact of Bluetooth Interference on in Computer Science from Bharathiar University .
the Performance of 802.11g Wireless Local Area Net-
Dr.R.Dhanapal obtained his Ph.D in Computer Science
works”, Vehicular Technology Conference, 2003. VTC 2003-Spring.
from Bharathidasan University, India. He is currently
The 57th IEEE Semiannual .
Professor of the Department of Computer Applications,
Easwari Engineering College, Affiliated to Anna Univer-
[3] Johansson, P.; Kazantzidis, M.; Kapoor, R.; Gerla,
sity of Technology Chennai, Tamil Nadu India. He has 25
M.,”Bluetooth: an enabler for personal area networking”,Network,
years of teaching, research and administrative experience.
IEEE Volume: 15 Issue: 5 .
Besides being Professor, he is also a prolific writer, having
authored twenty one books on various topics in Comput-
[4] Vangel, A.; Bakos, B.; Edvi, C.; Fodor, S.; Paller, G.;
er Science. His books have been prescribed as text books
Farkas, L.”Local Connectivity Solution over Bluetooth
in Barathidasan University and autonomous colleges affi-
and Wi-Fi”, Vehicular Technology Conference, 2003. VTC 2003-
liated to Bharathidasan University, Tiruchiraplli. He has
Spring. The 57th IEEE Semiannual, 2003 , Page(s): 680 - 684
served as Chairman of Board of Studies in Computer
vol.1
Science of Bharathidasan University, member of Board of
studies in Computer Science of several universities and
[5] Pechac, P.; Klepal, M.; Martinez, A.”Modeling and
autonomous colleges. Member of standing committee of
Optimization of Heterogeneous Wireless LAN”, Vehicular
Artificial Intelligence and Expert Systems of IASTED,
Technology Conference, 2004. VTC 2004- Fall. 2004, IEEE 60th 2004,
Canada and Senior Member of International Association
pages:4442-4445.
of Computer Science and Information Technology (IAC-
SIT), Singapore. He has Visited USA, Japan, Malaysia,
[6] Dahlberg, A.; Zepernick, H.-J.; Mercankosk, G.; Fied-
and Singapore for presenting papers in the International
ler,M.”Multi AP strategies for SCO traffic in a Bluetooth
conferences and to demonstrate the software developed
based wireless LAN”, Vehicular Technology Conference,VTC
by him. He is the recipient of the prestigious ‘Life-time
2003-Spring.The 57th IEEE Semiannual,2003.
Achievement’ and ‘Excellence’ Awards of Govt. of India.
He is serving as Principal Investigator of UGC sponsored
[7] Lee, C.; Helal, A.”Ns-based Bluetooth LAP simula-
innovative, major and minor research projects about 1.6
tor”, Local Computer Networks, 2001. Proceedings. LCN 2001. 26th
crore. He is the recognized supervisor for research pro-
Annual IEEE Conference on 2001 , Page(s): 525 – 532.
grammes in computer Science leading to Ph.D and MS by
research in several universities including Anna Universi-
[8] Jun Li; Bose, A.; Zhao, Y.Q.” The Study of Wireless
ty of Technology Chennai, Bharathiar University, and
Local Area Networks and Wireless Personal Area Net-
Manonmaniam Sundaranar University. He has got 51
works’, Electrical and Computer Engineering, 2005. Canadian Con-
papers on his credit in international and national journals.
ference on 2005,page(s)1415-1418.

[9] Shih-Yen Chiu Hsung-Pin Chang Ruei-Chuan


,“Providing Mobile LAN Access Capability for Bluetooth
Devices”, Parallel and Distributed Systems, 2002. Proceedings.
Ninth International ConferenceoIssue Date: 17-20 Dec. 2002.

[10] Goose, S.; Schneider, G.; Tanikella, R.; Mollenhauer,


H.; Menard, P.; Le Floc'h, Y.; Pillan, P.,’ “Scalable Blu-
etooth LAN Access Solution”, Mobile Data Management, 2002.
Proceedings. Third International Conference on 2002 ,page(s)169-

© 2010 Journal of Computing Press, NY, USA, ISSN 2151-9617


http://sites.google.com/site/journalofcomputing/

You might also like