You are on page 1of 5

2nd International Conference on Emerging Trends in Computer and Image Processing (ICETCIP'2012) June 30-July 1, 2012 Bali

Location Based Computation Sharing Framework for Mobile Devices


Samiul. Islam, Boraq. Ammourah, and Mohamad. Mahmoud

Abstract Third generation and fourth generation mobile


devices are providing various online services and applications to facilitate users with their rich web interfaces. Limited computing power and shorter battery life of mobile devices caused computation intensive application components to migrate to the external computing resources. By elastic resource provisioning and the ability to support large scale service deployment, mobile cloud computing introduced an attractive platform for offloading the computational processes among mobile devices. In this paper we proposed a location based computation sharing framework for mobile devices in which mobile devices locating in the same cell can share their processing power. We introduced a certification technique by which all mobile devices within 10 meters ranges can share their processing power using Bluetooth technique without traditional 2 step verification process.

todays mobile phones and smart phones and we have proposed our process sharing framework for mobile devices, based on this technology. In section II and III of this paper, we have provided an overview of cellular network and working principle of Bluetooth. We have described our proposed framework in section IV. Section VI contains some part of evaluation of our framework and we concluded with section VII. II. OVERVIEW OF CELLULAR NETWORK Modern mobile phone networks use cells (Fig. 1) because radio frequencies are a limited, shared resource. Cell-sites and handsets change frequency under computer control and use low power transmitters so that a limited number of radio frequencies can be simultaneously used by many callers with less interference. A cellular radio system provides a wireless connection to the public telephone network for any user location within the radio range of the system. The term mobile has traditionally been used to classify a radio terminal that can be moved during communication. Cellular systems accommodate a large number of mobile units over a large area within a limited frequency spectrum [3].

Keywords Bluetooth Connectivity, Computational Process Sharing, Mobile Computing, Wireless Ad-hoc Network. I. INTRODUCTION ECHNOLOGICAL advance in radio communication introduced to us with wireless ad-hoc networks. These are self-organizing networks that are formed from wireless devices communicating with each other without the need of any infrastructure. In these networks, each device (or node) works as a terminal and a router at the same time. The nodes are allowed to join or leave the network at any time. Nodes may also move from one geographical position to another at any time. Different wireless radio technologies were proposed to enable wireless ad hoc networks; one of them is Bluetooth [1]. The technology is promising in many ways. First, Bluetooth devices are efficient with respect to power consumption. Second, Bluetooth devices use a communication mechanism that is noise-resistant and robust against interference with neighboring Bluetooth devices. Third, the cost of Bluetooth radio devices is relatively low. Bluetooth also offers ad-hoc networking capabilities [2]. These advantages of Bluetooth led its deployment in a wide range of
Samiul. Islam is with the Department of Computer Science, College of Computer Science and Information System in Najran University, Najran, Saudi Arabia (phone: +966 75428610 ; Mobile: +966 501343118; e-mail: samiul80@gmail.com). Boraq. Ammourah is with the Department of Computer Science, College of Computer Science and Information System in Najran University, Najran, Saudi Arabia (phone: +966 75428615 ; Mobile: +966569596556; e-mail: mr.boraq@gmail.com). Mohamad. Mahmoud is with the MIS department in Salman bin Abdulaziz University, Hot at Bani, Tamim, Saudi Arabia. (Phone: +966 543170968; email: m_awni1983@yahoo.co.uk ).

Fig.1 Mobile cell architecture.

A cellular network is used by the mobile phone operator to achieve both coverage and capacity for their subscribers. Large geographic areas are split into smaller cells to avoid line-of-sight signal loss and to support a large number of active phones in that area. All of the cell sites are connected to telephone exchanges (or switches), which in turn connect to the public telephone network. Each cell contains at least a

156

2nd International Conference on Emerging Trends in Computer and Image Processing (ICETCIP'2012) June 30-July 1, 2012 Bali
Legend: M- Master device, S- Slave device

M S S S

S M S S

Piconet- A

Piconet- B

Fig. 2 Communication of BTS and mobile phones

Fig. 3 Scatternet in a mobile cell

base transceiver station (BTS), under which all cell phones of that cell are registered. The base transceiver station, or BTS, contains the equipment for transmitting and receiving radio signals (transceivers), antennas, and equipment for encrypting and decrypting communications with the base station controller (BSC). Fig. 2 shows BTS functionality in a simple manner. The base station subsystem (BSS) is the section of a traditional cellular telephone network which is responsible for handling traffic and signaling between a mobile phone and the network switching subsystem. The BSS carries out transcoding of speech channels, allocation of radio channels to mobile phones, paging, transmission and reception over the air interface and many other tasks related to the radio network. Typically a BTS will have several transceivers (TRXs) which allow it to serve several different frequencies and different sectors of the cell (in the case of sectorized base stations). A BTS is controlled by a parent base station controller via the base station control function (BCF). The BCF is implemented as a discrete unit or even incorporated in a TRX in compact base stations. The BCF provides an operations and maintenance (O&M) connection to the network management system (NMS), and manages operational states of each TRX, as well as software handling and alarm collection. The basic structure and functions of the BTS remains the same regardless of the wireless technologies [4]. III. BLUETOOTH: WORKING PRINCIPLE Bluetooth is a short-range radio technology that enables wireless connectivity between mobile devices. When two Bluetooth devices come into each others communication range, one of them assumes the role of master of the communication and the other becomes the slave. This simple one hop network is called a piconet, and may include up to seven active slaves connected to one master. As a matter of fact, there is no limit on the maximum number of slaves connected to one master but only seven of them can be active at time, others have to be in so called parked state. The specification also allows multiple roles for the same device,

i.e. a node can be a master in one piconet and a slave in another. This permits the connection of several piconets as the nodes functioning in master/slave mode act gateways between piconets. In the Bluetooth concept the network topology resulting by the connection of piconets is called a scatternet (Fig. 3). A node can be active in only one piconet at time, and to operate as a member of another piconet, a node must switch to the hopping frequency sequence of the other piconet [5]. The Bluetooth Core Specification provides for the connection of two or more piconets to form a scatternet, in which certain devices simultaneously play the master role in one piconet and the slave role in another. A master Bluetooth device can communicate with a maximum of seven devices in a piconet (an ad-hoc computer network using Bluetooth technology), though not all devices reach this maximum. The devices can switch roles, by agreement, and the slave can become the master. A. Operations Bluetooth uses a radio technology called frequency-hopping spread spectrum, which chops up the data being sent and transmits chunks of it on up to 79 bands (1 MHz each; centered from 2402 to 2480 MHz) in the range 2,400 2,483.5 MHz (allowing for guard bands). This range is in the globally unlicensed Industrial, Scientific and Medical (ISM) 2.4 GHz short-range radio frequency band. It usually performs 800 hops per second, with AFH enabled [6]. Bluetooth operation relies on packet-based protocol with a master-slave structure. One master may communicate with up to 7 slaves in a piconet; all devices share the master's clock. Packet exchange is based on the basic clock, defined by the master, which ticks at 312.5 s intervals. Two clock ticks make up a slot of 625 s; two slots make up a slot pair of 1250 s. In the simple case of single-slot packets the master transmits in even slots and receives in odd slots; the slave, conversely, receives in even slots and transmits in odd slots. Packets may be 1, 3 or 5 slots long but in all cases the mastertransmit will begin in even slots and the slave-transmit in odd slots. The master chooses which slave device to address; typically, it switches rapidly from one device to another in a round-robin fashion. Since it is the master that chooses which slave to address, whereas a slave is (in theory) supposed

157

2nd International Conference on Emerging Trends in Computer and Image Processing (ICETCIP'2012) June 30-July 1, 2012 Bali

to listen in each receive slot, being a master is a lighter burden than being a slave. Bluetooth devices can be in 3 different power classes [7], [8]: Class 3: The lowest power, the max. range of this is 10m Class 2: Max range is about 50m (150ft) Class 1: Max range is about 100m (300ft) These ranges (Table-I) can be affected by environmental conditions i.e. furniture, walls, people so ranges can easily be reduced. Bluetooth is not a line of sight connection so it can be used through walls and floors.
TABLE I BLUETOOTH CLASSES

state, they do not have addresses, but only listen enough to keep their synchronization with the master and check for broadcast messages. C. Security Method Authentication ensures the identity of Bluetooth devices. It authenticates the device at the other end of the link. Authentication is accomplished by using a stored link key or by pairing (entering a PIN). Pairing is a procedure that authenticates two devices based on a common passkey, thereby creating a trusted relationship between those devices. An arbitrary but identical passkey must be entered on both devices. As long as both devices are paired, the pairing procedure is not required when connecting those devices again (the existing link key is used for authentication). Devices without any input method, like headsets, have fixed passkeys. Authorization is a process of deciding if a device is allowed to have access to a specific service. User interaction may be required unless the remote device has been marked as "trusted." Usually the user can set authorization on/off to every remote device separately. Authorization always requires authentication. Encryption protects communication against eavesdropping. For example, it ensures that nobody can listen to what a laptop transmits to a phone. The length of the encryption key can be between 8 and 128 bits. IV. PROPOSED FRAMEWORK All mobile devices under a BTS can be grouped in a multiple piconets, where the number of piconets depends on the cell size of that specific BTS depending on geographical position. Each piconet can contain maximum n number of mobile devices at any given time, where 0 n. When an application initiates in any node of a piconet of our proposed framework, it has been marked as an active node and acquire a certificate from local BTS with a time stamp for that node. When an active node has been selected, it discovers the idle nodes asynchronously within its piconet and use the certificate to create a private channel with the idle nodes to share their processing powers. If the time stamp of an active node exceeds the duration more than 300 seconds, and/or the number of idle nodes drop below a level m, where 1 m7, the active node share its processes with the other available idle nodes in different piconets through BTS. The proposed framework is composed of several algorithms implemented in middle layer of BTS and in the application layer of cell phones. Those can be categorized as mentioned in later sub sections. A. Certificates: Subscriber, MS (Mobile Station) or mobile phone connects to mobile network through BTS. When a mobile phone switches on, it registers with the corresponding BTS of its cell. In our proposed framework, during the registration process of mobile devices, it will acquire a certificate from the corresponding BTS, containing subscribers information and service providers information. This certificate authenticated
158

Class

Maximum permitted power Range (m) (mW) (dBm) 20 4 0 ~100 ~10 ~5

Class 1 100 Class 2 2.5 Class 3 1

The effective range varies due to propagation conditions, material coverage, production sample variations, antenna configurations and battery conditions. In most cases the effective range of class 2 devices is extended if they connect to a class 1 transceiver, compared to a pure class 2 network. This is accomplished by the higher sensitivity and transmission power of Class 1 devices. B. Connection Protocols Bluetooth connections are established via the following techniques [9], [10]: Standby: Devices not connected in a piconet are in standby mode. In this mode, they listen for messages every 1.28 s over 32 hop frequencies (fewer in Japan, Spain, and France). Page/inquiry: If a device wishes to make a connection with another device, it sends out a page message if the address is known, or an inquiry followed by a page message if it is unknown. The master unit sends out 16 identical page messages on 16 hop frequencies to the slave unit. If there is no response, the master retransmits on the other 16 hop frequencies. The inquiry method requires an extra response from the slave unit, since the address is unknown to the master unit. Active: Data transmission occurs. Hold: When either the master or slave wishes, a hold mode is established or no data is transmitted in order to conserve power. Otherwise, there is a constant data exchange. A typical reason for going into hold mode is the connection of several piconets. Sniff: The sniff mode, applicable only to slave units, is for power conservation, though not at as reduced a level as hold. During this mode, the slave does not take an active role in the piconet, but listens at a reduced level. This is usually a programmable setting. Park: Park mode is a more reduced level of activity than the hold mode. The slave is synchronized to the piconet, thus not requiring full reactivation, but is not part of the traffic. In this

2nd International Conference on Emerging Trends in Computer and Image Processing (ICETCIP'2012) June 30-July 1, 2012 Bali

the device with a device generated 64 bit encrypted security key. An active node shares this key in the idle node discovery process within the piconets. During the link establishment process and data exchange process between these two types of nodes, the security key will automatically authorize an active node to send and retrieve its data from an idle node without prompting the user. B. Discover idle nodes with timestamp: We require time synchronization between mobile nodes. We assume clock ticking speeds of different nodes to be comparable. It means that when a idle node B i receives a clock value from an active node A i , node B i can synchronize with node A i , using A i s clock value. There is no globally common clock for the mobile network, say MN. Assume that MN has M channels available for its operations. Let this channel set be Cglobal = {C1, C2 , ... , CM}. Each node in MN is assigned a unique identifier (Node ID) in the range 1 to N. Each node knows its unique Node ID, but does not know how many other nodes there are and what their IDs are. Nodes are equipped with one transceiver (Transmitter & Receiver) capable of either receiving or transmitting at any given time. Nodes know about the global channel set Cglobal and the value of N. Also each node finds its set of usable channels (available channel set) by a periodic scanning mechanism. We assume nodes can detect collisions. An active node transmits and receives alternatively on each channel of its available channel set. During the transmit period it sends a query referred to as Active Node Query (ANQ) with node ID, clock value of the node, available channel set and remaining time in ANQ. Every ANQ has limited time validity, Q t . During the receiving period, inquiring node listens on the same channel that it transmitted previously, for duration of Q t . If a valid reply (Query Reply) is received, the queering node sends an Acknowledgment (Ack) message, during the current receiving period or during the next receiving period, on the same channel that it received the reply. Upon receiving a Query Reply message, inquiring node discovers the sender of the Query Reply. C. Sharing and synchronization of process: Bluetooth operates in the range of frequencies 2.4000 GHz to 2.4835 GHz. It divides the medium to 79 channels each of 1 MHz. The rest of the available frequencies are considered as lower and upper band edges, in order to comply with the radio regulations of different countries. To establish a link between an active and idle node, the communicating nodes must perform two operations; the first is the query; in which one node gets the address of (or discovers) another node. The second is the paging, in which a link is constructed. The specifications of Bluetooth state that for one node to discover others, it must switch to the query state, and then, keeps broadcasting small special packets (of 68 bits size), called the ID packets. The contents of these packets are common to all Bluetooth devices, and although called ID packets, they do not contain the identity of their senders. The inquirers ID packets must be broadcast in different frequency hops in hope of
159

finding other devices listening to the same frequency hop at the same time. The inquirer keeps alternating in a range of frequencies - 32 out of the 79 available hops known to all the devices. On the opposite side of the connection, a node that wants to be discovered has to switch to the query scan state and keeps listening to ID packets generated from the inquirers. The scanner switches between the frequencies hops at a slower rate than the inquirers in order to increase the chance of finding each other in the same hop. When the scanner receives one of those ID packets, it replies to it with a special packet called the FHS [11], [12] packet. An FHS packet contains its address and its clock value. The clock value is used for synchronization purposes to make the link establishment procedure faster. In the paging procedures, the active node switches to the page state and the idle must switch to the page scan state. Using the information obtained from the FHS packet, the active node adds an offset value to its clock to have the same clock value of the idle node so they are both become synchronized to each other. After that, the active node attempts to contact the idle node by broadcasting again a number of ID packets. If the idle node listens to one of these ID packets, it replies with another ID packet and go to the idle response state. When this ID packet is received by the active node, it changes its state to the active response state. Then, the active node sends an FHS packet. V. RELATED WORK Salonidis et. al. presents a distributed topology construction scheme in Bluetooth networks [13]. The basic assumption behind the scheme is that all nodes are within transmission range of each other. The nodes conduct a leader election algorithm. The winner knows the identity of all nodes and uses this information to design the desired topology. Existing service discovery protocols such as Universal Plug and Play (UPnP) [14], Service Location Protocol (SLP) [15] and Salutation focused on auto configuration issues allowing devices to automatically join the network and learn about its capabilities. However such approaches were designed for resource rich networks and are not suitable for resource constrained systems. Energy efficient service discovery has been done using power efficient wake-up scheduling protocols, such as [16][17][18]. Bhagwat et al. presents a source routing mechanism for Bluetooth networks [19]. Das et al. [20] and Johanson et al. [21] present distributed scheduling policies for Bluetooth networks. Existing middleware solutions for wireless sensor networks usually have plug-in system [22] for service discovery protocols or use their own mechanisms [23]. TeenyLime [23] is a data-sharing middleware designed for mobile sensors. It uses an operational setting where sensors are fixed and relatively powerful mobile sinks are used to collect data from sensors. VI. EVALUATION Evaluation of certificate is our future work. The time duration of idle node discovery procedure has been evaluated

2nd International Conference on Emerging Trends in Computer and Image Processing (ICETCIP'2012) June 30-July 1, 2012 Bali

in a simulated environment. Discovery of each idle node is marked as T 1 and presented by (1). T 1 =2 Q t (M+1)M (1)

[5]

[6] [7] [8] [9]

The simulation was done by using the R [20] statistical package assuming that a network with 3 channels (M = 3). Also consider two nodes (A and B) in the network with available channel sets A = {3}, B = {1,2,3}. The T1 duration is shown in the fig. 4.
2Qt

[10]

[11]

[12] 2Qt (M+1) T1 =2 Qt (M+1)M [13]

Fig. 4 T 1 duration for 3 channels

We have evaluated our sharing and synchronization algorithm in a simulated state with maximum 30 nodes. The result shows (fig. 5) the processing performance with time. We assumed that every node has its own unique ID and a direct connection method has been used instead of certificate technique to evaluate their performances.

[14] [15] [16]

[17]

[18]

30 20 10

[19]

[20]

[21]

Fig. 5 Shared process performance measure


[22]

VII. CONCLUSION We have evaluated our result partially for idle node discovery and process sharing. Future work involved implementation and evaluation of certification algorithm, Synchronization with BTS to share processing with the idle node of different piconets within the same cell.. Few critical concerns also need to be considered in future work, e.g. when two active nodes try to share an idle node in concurrent time. Fault tolerance mechanism need to be implemented as any shared node can be switched of or change location without prior notice. REFERENCES
[1] [2] Bluetooth Core Specifications v2.1 + EDR,www.bluetooth.com. Ahmed Jedda, The Device Discovery in Bluetooth Scatternet Formation Algorithms, Ottawa-Carleton Institute for Computer Science, University Of Ottawa, Canada, 2009. Kamil Sh. Zigangirov, Theory of Code Division Multiple Access Communication, ISBN 0-471-45712-4, Institute of Electrical and Electronics Engineers, 2004. http://en.wikipedia.org/wiki/Base_transceiver_station.

[23]

Gergely V. Zruba, Stefano Basagni and Imrich Chlamtac: Bluetrees Scatternet Formation to Enable Bluetooth-Based Ad Hoc Networks, IEEE, 2001, ISBN 0-7803-7097-1. http://www.radio-electronics.com/info/wireless/bluetooth/radiointerface-modulation.php. Albert Huang and Larry Rudolph, Bluetooth for Programmers, 2005. http://www.althos.com/tutorial/Bluetooth-tutorial-RF-PowerClasses.html. K. Sand, Bluetooth, Tik-111.550 Seminar on Multimedia, Telecommunications Software and Multimedia Laboratory, Helsinki University of Technology, Finland, March 1999. J. Haarsten, Bluetooth the universal radio interface for adhoc wireless connectivity, Ericsson Review 3 (4) (1988) 1 5. available at http://www.ericsson.se/Review/er3 _ 98/art1/art1.html. T. Salonidis, P. Bhagwat, L. Tassiulas, R. LaMaire, Distributed Topology Construction of Bluetooth Personal Area Networks, Proceedings. IEEE, Volume: 3, 2001, pp. 1577-1586, IEEE INFOCOM 2001. A. El-Hoiydi, Interference Between Bluetooth Networks Upper Bound on the Packet Error Rate, IEEE Communications Letters, Vol. 5, No. 6, pp. 245-247, June 2001. T. Salonidis, P. Bhagwat, L. Tassiulas, and R. Lamaire. Distributed topology construction of Bluetooth personal area networks. In Proceedings of INFOCOM2001, 2001. Universal plug and play. http://www. upnp.org/. E. Guttman. Service location protocol: Automatic discovery of IP network services. IEEE Internet Computing, 3(4):71-80, 1999. W. Ye, J. Heidemann, and D. Estrin. Medium access control with coordinated adaptive sleeping for wireless sensor networks. IEEE/ACM Trans. Netw. 12(3):493-506, 2004. J. Polastre, J. Hill, and D. Culler. Versatile low power media access for wireless sensor networks. In SenSys'04: 2nd international conference on Embedded networked sensor systems, pages 95-107, New York, 2004. W. Ye, F. Silva, and J. Heidemann. Ultra-low duty cycle mac with scheduled channel polling. In SenSys'06: Proceedings of the 4th international conference on Embedded networked sensor systems, pages 321-334, New York, NY, USA, 2006. ACM Press. P. Bhagwat and R. Seigal. A routing vector method (RVM) for routing in Bluetooth scatternets. In IEEE International Workshop on Mobile Multimedia Communications (MoMuC99), San Diego, CA, Nov 1999. A. Das, A. Ghose, A. Razdan, H. Saran, and R. Shorey. Enhancing performance of asynchronous data traffic over the Bluetooth wireless adhoc network. INFOCOM2001, Anchorage, AK, April 2001. N. Johansson, Korner, and L. Tassiulas. A distributed scheduling algorithm for a Bluetooth scatternet. ITC2001, Salvador, Brazil, Dec. 2001. W. Heinzelman, A. Murphy, H. Carvalho, and M. Perillo. Middleware to support sensor network applications, 2004. C. Curino, M. Giani, M. Giorgetta, and A. Giusti. Tiny lime: Bridging mobile and sensor networks through middleware. In Tiny Lime: Bridging Mobile and Sensor Networks through Middleware. March 812, 2005.

[3]

[4]

160

You might also like