Professional Documents
Culture Documents
HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/
WWW.JOURNALOFCOMPUTING.ORG 25
Abstract— Purpose of this paper is to enable the user who possesses only a Bluetooth PC card, to receive network services
(such as browsing the Web using a Web browser). These services will be provided to the user by another computer, also has a
Bluetooth card and connected to the network via standard network card. The user moves around, which has some potential
servers. Once, this would be close enough to one of them, can connect through automatically. This is fulfilling the client
software, installed on the user's computer and the server software, installed on a second computer, connected to the network.
Index Terms— Bluetooth PC Card, Local Area Network (LAN) and User Interface (UI)
—————————— ——————————
1 INTRODUCTION
This paper shows the analysis and implementation of a (i)LAN access point— This Bluetooth device provides
Bluetooth device discovery with LAN access capability. service access to LANs supporting various link-layer pro-
Device discovery and connection establishment are fun- tocols.
damental to communication between two Bluetooth (BT)
devices. We give an analytical model of the time it takes (ii)LAN data terminal— this is a PPP client device that
for the master in a piconet to discover one slave. We show requests for access to the LAN through the LAN access
that, how discovery time is affected by point service access to LANs supporting various link-
layer protocols.
(i) the presence of multiple potential slaves, and
(ii) changes in the maximum backoff limit The objective is to enable the user, in his possession a
laptop without a network connection is available, be con-
Our proposed handoff scheme eliminates the inquiry pro- nected and receive services from the standard. The user
cedure and only requires paging procedure during a must have a Bluetooth card and must be in the range of
handoff. We have implemented a prototype of Bluetooth up to about 10 m from another computer on which soft-
device discovery system with LAN access capability by ware is installed in server. The client software is always
our proposed scheme. Normally the device discovery will looking for Server, which it can connect. Once, server is
initiate the establishment of a Data Terminal (DT) connec- found, the client software get connection and start the
tion to the LAN select a suitable PPP/RFCOMM service flow of information at the moment, the user performs an
that it provides. action (like requesting a Web Log).The server software is
passive wait until client software that is supposed to con-
The LAN access profile (LAP) describes how PPP connec- tact it. When software is installed client relationship with
tions can be set up over RFCOMM for Bluetooth devices server, then it will be a short protocol of the connection
discovery to get connected and access LAN services. It between the two sides after the server is ready to receive
also defines how connected devices in a Pico net can form information from the client.
an independent LAN by using the same PPP connection
mechanisms. 2 PAPER DESCRIPTION
There are two roles defined for the Bluetooth devices Wireless connection is fulfilling paper to LAN via Blu-
supporting LAP. etooth components. Access to LAN is by using the serv-
er's network card. Communication between the clients to
————————————————
LAP is above the RFCOMM layer. Defining and imple-
M.Sughasiny is with the Department of Computer Science,Research menting a business project user and server applications.
Scholar,Bharathiar University.
The server is realized on a computer with access to the
Dr.R.Dhanapal is with the Department of Computer Application,
Eswari Engg. College ,Affliated to Anna University.
Internet or intranet - Nat. Bluetooth client server waits
when it comes to connecting to the server initiates and
proposes “the LAP-service”. The relationship between
units - Powered by Bluetooth and once established server 2) Establishment of server-client relationship.
and client server provides the client computer, unable to
connect to the Internet. 3) Implementation of master-server switch.
•Making Inquiry to find components BT range CONTROL - The unit is used to boot - LAP, meets with
•LAP service detection protocol using SDP SDP requests the SERVICE CONFIGURATION, respon-
•Establishing contact RFCOMM/L2CAP between DT sible for communication with the LAN.
(Data Terminal) and LAP
•Assign an IP address to DT. RFCOMM DRIVER - pipeline transfer of information
•IP packets flow in both directions. between components of the BT.
•Disconnect contact initiated by either party.
SERVICE CONFIGURATION - Initializing service
attributes, SDP is used as the interface.
3 Architecture- BTClient
Layer 1
Server
Agent
Server
5.1 Bluetooth Layer Module - Layer 1
Director of the value of the agents
Agent creates a layer 2 when he passes a request to open This object responds to events, arriving Bluetooth unit.
a new connection. Each event is received escalated function Serv-
er_Main_State_Machine Server function.Server is the ma-
Agent chine function modes, the number of steps executed by a
boot and then taking care of traffic information. Startup
Created (by the server) when the layer 2 seeks to create a phases are:
new connection.When a package reaches the destination
computer, pass it to layer 2.When a package comes from 1. HCI_CONFIGURE_PORT_CNF - Boot HCI layer.
layer 2, sending it to the destination computer.
2. COM_START_CNF - One application in SCM.
5 SOFTWARE ARCHITECTURE –BLOCK SCHEME
3. SCM_REGISTER_CNF - Making Argystartzia in SCM
The client software consists of the following objects:
and generating the stack.
1. Layer 1 - This layer handles in events, reach the Blu-
4. HCI_WRITE_VOICE_SETTINGS_CNF - the end of the
etooth unit.
boot stack.
2. Layer 2 - This layer handles data in, runs both ways
5. COM_FILL_PDL_CNF - Finish the Profile One.
between layer 1. In addition, it handles data in, passing in
both directions between the HTTP browsers. To do this it
When the startup phase ended, you can begin to transfer 2. Error - This function is called when the machine func-
data over the RFCOMM layer. tion Client Unknown modes of failure comes into the sys-
tem. This function contains an infinite loop.
1. COM_CONNECT_IND - the machine comes to this 5. Start Session - This function does boot information of
situation when the client makes any contact with her. Af- the Bluetooth unit.
ter exit from this state, the server will transfer packets in
both directions. Layer 2
2. COM_DATA_IND - the machine comes to this situa- This object handles data traffic between Layer 1 and type
tion when the package reaches the Bluetooth unit on the Client Agent objects. Because, he connects the number of
other side. In this situation, the package will be trans- agents with a layer one single process, there are two de-
ferred to layer 2. In addition, the system tries to send a partments which treat this problem:
package to the other side. If there is no packet transmis-
sion, the machine will wait for a certain amount of time 1. Command - because, there is a need to identify every
and try again to send a package. packet, which passes between the agents and the layer 1,
each package comes from some get-agent header, which
3. COM_DATA_CNF - machine reaches this state when it will be a unique identifier of the agent (it accepts the
ack on the package, sent to the Bluetooth unit second. In agent when it was created) type package runs. Depart-
this mode the system try to get a package from Layer 2 to ment contains the following fields:
send it to the Bluetooth unit second. If there is no packet
transmission, the machine will wait for a certain amount a. the buffer - This field contains the contents of the pack-
of time and try again to send a package. age.
4. TIMEOUT_EVT - the machine comes to this situation b. length - length of buffer field.
after, ending time, where she was waiting for the new
package was not from layer 2. In this mode the system c. cmd - type of message information (data, open, close,
tries to get back a package from layer 2. reset).
5. COM_DATA_CNF_NEG - the machine comes to this d. channelId - unique channel number of the agent.
situation when the arrived ack packet. In this mode the
system try to resend the same package. There are several functions the department for the treat-
ment of object:
In addition, there is Layer 1 in the following functions:
i. setData - changes the contents of field buffer (and up-
1. CLIENT_Init - This function performs a different boot dates the length field).
the client and Ericsson stack.
ii. getPacket - back to the command key type variable
void *.
c. close - the right agent will be closed. 1. Command - because, there is a need to identify every
packet, which passes between the agents and the layer 1,
d. reset - will be a function ResetNotifyConnection. each package comes from some get-agent header, which
will be a unique identifier of the agent (it accepts the
2. GetBuffer2Transmit - This function is called from an agent when it was created) type package runs. Depart-
object layer 1 when he wants to send a package to the ment contains the following fields:
server. The function will check the head of the queue and
return its contents (if the queue is not empty). a. the buffer - This field contains the contents of the pack-
age.
3. OpenChannel - this function called when a new agent. b. length - length of buffer field.
The function add-agent in the use of agents (m_channels) c. cmd - type of message information (data, open, close,
to send an open-server (in fact, put the message line). reset).
d. channelId - unique channel number of the agent.
4. CloseChannel - This function is called when we want to
close one channel. The function will remove the agent There are several functions the department for the
array the m_channels send close message to server. treatment of object:
5. SendData - This function is called from the agent when a. the setData - changes the contents of field buffer (and
it has data to send to the server. Function insert the in- updates the length field).
formation into the command object to, it would be possi-
ble to identify the agent, who sent the package on the b. getPacket - back to the command key type variable
other side will function as a package. void *.
6. ResetNotifyConnection - This function is called when c. unpack - performs the opposite action to getPacket.
you want to reboot your system. Close all functions the
agents. 2. Queue - line standard is intended to store the messages
that come what-agents to the point where Layer 1 would
1. SERVER_Init - This function performs a different boot want to send a message and then pulling messages from
the server and Ericsson stack. the queue.
2. Error - This function is called when the Server machine Working with layer 1 are carried out through the follow-
function modes of failure comes into the system. This ing functions:
2. RunSync - This function moves the line and as long as 5. CreateRetBuf - This function accepts input to the first 8
it contains packages, she calls a function ProcessBuffer, contract houses bool variable. If the variable is true, the
taking care package. After reading to ProcessBuffer, it function changes the second house value '90 '(indicates
deletes the package from the queue. success). If the variable is false, the function changes the
second house value '91 '(indicates failure). Function call is
3. ProcessBuffer ‐ This function takes care of creating a made from a function ProcessBuffer.
connection with the destination computer and pass pack‐
ets to it. When you create a new connection using socks 6. putData - This function puts a message queue.
4.0, there is a fixed structure and the first homes, are sent
7. getData - This function takes a message from the
to the application:
queue.
6 CONCLUSION
[11] Howitt, I.; Seung Yong Ham,“Site Specific WLAN and WPAN
Coexistence Evaluation”,Wireless Communications and Network-
8 REFERENCES ing, 2003. WCNC 2003. 2003 IEEE , 2003 , Page(s): 1487 - 1491 vol.3.