BY ALEX GARCIA Scheduling in Bluetooth Networks. Introduction Bluetooth  Used to interconnect mobile devices into a Personal area ad hoc network (PAN).

Slides:



Advertisements
Similar presentations
DISTRIBUTED MULTIMEDIA SYSTEMS
Advertisements

Switching Technology presented by Hussain Ahmad BA-Abdullah. Fawaz abdullah AL-Amri. prof : Adel Ali.
BY PAYEL BANDYOPADYAY WHAT AM I GOING TO DEAL ABOUT? WHAT IS AN AD-HOC NETWORK? That doesn't depend on any infrastructure (eg. Access points, routers)
BLUETOOTH TM :A new radio interface providing ubiquitous connectivity Jaap C.Haartsen Ericssion Radio System B.V IEEE.
Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
TDMA Scheduling in Wireless Sensor Networks
Z-MAC: a Hybrid MAC for Wireless Sensor Networks Injong Rhee, Ajit Warrier, Mahesh Aia and Jeongki Min Dept. of Computer Science, North Carolina State.
Department of Information Engineering University of Padova, Italy COST273 Sep , 2002 Lisboa TD (02)-146 Handover procedures in a Bluetooth network.
Multiple access What if multiple machines are sharing the same link?
Distributed Control Algorithms for Service Differentiation in Wireless Packet Networks Michael Barry, Andrew T Campbell, Andras Veres
Priority Scheduling and Buffer Management for ATM Traffic Shaping Authors: Todd Lizambri, Fernando Duran and Shukri Wakid Present: Hongming Wu.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Hasan SÖZER1 Data Scheduling and SAR for Bluetooth MAC Manish Kalia, Deepak Bansal, Rajeev Shorey IBM India Research Laboratory.
Ncue-csie1 A QoS Guaranteed Multipolling Scheme for Voice Traffic in IEEE Wireless LANs Der-Jiunn Deng 、 Chong-Shuo Fan 、 Chao-Yang Lin Speaker:
Lecture 11. Matching A set of edges which do not share a vertex is a matching. Application: Wireless Networks may consist of nodes with single radios,
Bluenet a New Scatternet Formation Scheme * Huseyin Ozgur Tan * Zifang Wang,Robert J.Thomas, Zygmunt Haas ECE Cornell Univ*
1 QoS Schemes for IEEE Wireless LAN – An Evaluation by Anders Lindgren, Andreas Almquist and Olov Schelen Presented by Tony Sung, 10 th Feburary.
A Routing Vector Method (RVM) for Routing Bluetooth Scatternets Pravin Bhagwat IBM.Thomas J. Watson Research Center,Yorktown Heights,NY.
CS352- Link Layer Dept. of Computer Science Rutgers University.
“On the Integration of MPEG-4 streams Pulled Out of High Performance Mobile Devices and Data Traffic over a Wireless Network” Spyros Psychis, Polychronis.
Presented by Hasan SOZER1 A Pseudo Random Coordinated Scheduling Algorithm for Bluetooth Scatternets Andras Racz, Gyorgy Miklos, Ferenc Kubinszky, Andras.
presented by Hasan SÖZER 1 JUMP Mode A Dynamic Window-based Scheduling Framework for Bluetooth Scatternets Niklas Johansson Fredrik Alriksson.
Medium Access Control Sublayer
Pipelined Two Step Iterative Matching Algorithms for CIOQ Crossbar Switches Deng Pan and Yuanyuan Yang State University of New York, Stony Brook.
Bluetooth Introduction The Bluetooth Technology
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
1 Adaptive QoS Framework for Wireless Sensor Networks Lucy He Honeywell Technology & Solutions Lab No. 430 Guo Li Bin Road, Pudong New Area, Shanghai,
جلسه دهم شبکه های کامپیوتری به نــــــــــــام خدا.
Distributed Topology Construction of Bluetooth Personal Area Networks Theodoros Salonidis, Pravin Bhagwat, Leandros Tassiulas and Richard LaMaire.
Presented By: Vasantha Lakshmi Gutha Graduate student (CS) Course: CENG 5931 University of Houston-Clear Lake Spring 2011.
CONGESTION CONTROL and RESOURCE ALLOCATION. Definition Resource Allocation : Process by which network elements try to meet the competing demands that.
Multimedia Support for Wireless W-CDMA with Dynamic Spreading By Ju Wang Mehmet Ali Elicin And Jonathan C.L. Liu Lecture by Seth Caplan.
Improving Capacity and Flexibility of Wireless Mesh Networks by Interface Switching Yunxia Feng, Minglu Li and Min-You Wu Presented by: Yunxia Feng Dept.
1 Flow Identification Assume you want to guarantee some type of quality of service (minimum bandwidth, maximum end-to-end delay) to a user Before you do.
1 Optical Burst Switching (OBS). 2 Optical Internet IP runs over an all-optical WDM layer –OXCs interconnected by fiber links –IP routers attached to.
MARCH : A Medium Access Control Protocol For Multihop Wireless Ad Hoc Networks 성 백 동
Department of Information Engineering University of Padova, ITALY A Soft QoS scheduling algorithm for Bluetooth piconets {andrea.zanella, daniele.miorandi,
Admission Control and Scheduling for QoS Guarantees for Variable-Bit-Rate Applications on Wireless Channels I-Hong Hou P.R. Kumar University of Illinois,
Hybrid OFDMA/CSMA Based Medium Access Control for Next- Generation Wireless LANs Yaser Pourmohammadi Fallah, Salman Khan, Panos Nasiopoulos, Hussein Alnuweiri.
WPMC 2003 Yokosuka, Kanagawa (Japan) October 2003 Department of Information Engineering University of Padova, ITALY On Providing Soft-QoS in Wireless.
Competitive Queue Policies for Differentiated Services Seminar in Packet Networks1 Competitive Queue Policies for Differentiated Services William.
An Adaptive Energy-Efficient and Low- Latency MAC for Data Gathering in Wireless Sensor Networks Gang Lu, Bhaskar Krishnamachari, and Cauligi S. Raghavendra.
STUMP: Exploiting Position Diversity in the Staggered TDMA Underwater MAC Protocol Kurtis Kredo II, Petar Djukic, Prasant Mohapatra IEEE INFOCOM 2009.
WPMC 2003 Yokosuka, Kanagawa (Japan) October 2003 Department of Information Engineering University of Padova, ITALY On Providing Soft-QoS in Wireless.
Multi-Power-Level Energy Saving Management for Passive Optical Networks Speaker: Chia-Chih Chien Advisor: Dr. Ho-Ting Wu Date: 2015/03/25 1.
Ch 12. Multiple Access. Multiple Access for Shared Link Dedicated link – Point-to-point connection is sufficient Shared link – Link is not dedicated –
An Energy Efficient MAC Protocol for Wireless LANs, E.-S. Jung and N.H. Vaidya, INFOCOM 2002, June 2002 吳豐州.
QOS in Passive Optical Networks Ali Razmkhah Akbar Ghaffarpour Rahbar Computer Networks Research Lab, Sahand University of Technology Dec
Bluetooth In 1994, the L. M. Ericsson company became interested in connecting its mobile phones to other devices without cables. A SIG (Special Interest.
Unit III Bandwidth Utilization: Multiplexing and Spectrum Spreading In practical life the bandwidth available of links is limited. The proper utilization.
A Two-Phase Scatternet Formation Protocol for Bluetooth Wireless Personal Area Networks Yoji Kawamoto, Vincent W.S. Wong, and Victor C.M. Leung Bluetooth.
A Pseudo Random Coordinated Scheduling Algorithm for Bluetooth Scatternets MobiHoc 2001.
Quality of Service Schemes for IEEE Wireless LANs-An Evaluation 主講人 : 黃政偉.
Mitigating starvation in Wireless Ad hoc Networks: Multi-channel MAC and Power Control Adviser : Frank, Yeong-Sung Lin Presented by Shin-Yao Chen.
Bluetooth.
Wireless Networks: Physical and Link Layers Wired Typically point-to- point connections Interference effects are not significant Not power constrained.
SERENA: SchEduling RoutEr Nodes Activity in wireless ad hoc and sensor networks Pascale Minet and Saoucene Mahfoudh INRIA, Rocquencourt Le Chesnay.
Rate-Adaptive MAC Protocol in High-Rate Personal Area Networks Byung-Seo Kim, Yuguang Fang and Tan F. Wong Department of Electrical and Computer Engineering.
A Flexible Scatternet- wide scheduling Algorithm for Bluetooth Wensheng Zhang and Guohong Cao IPCCC 2002.
Courtesy Piggybacking: Supporting Differentiated Services in Multihop Mobile Ad Hoc Networks Wei LiuXiang Chen Yuguang Fang WING Dept. of ECE University.
2. Data Link Layer: Medium Access Control. Scheduling.
MEDIUM ACCESS CONTROL PROTOCOL
Channel Allocation (MAC)
BLUETOOTH (I) Bluetooth technology aims at so-called ad hoc piconets, which are local area networks with a very limited coverage and without the need for.
CprE 458/558: Real-Time Systems
Javad Ghaderi, Tianxiong Ji and R. Srikant
Subject Name: Adhoc Networks Subject Code: 10CS841
Dr. John P. Abraham Professor UTPA
Multiple Access Control (MAC) Protocols
Satellite Packet Communications A UNIT -V Satellite Packet Communications.
Presentation transcript:

BY ALEX GARCIA Scheduling in Bluetooth Networks

Introduction Bluetooth  Used to interconnect mobile devices into a Personal area ad hoc network (PAN).  Short-range radio technology operating in an industrial-scientific- medical (ISM) band at 2.45 GHz Piconet  Two or more nodes sharing the same channel where 1 unit acts as a master and the other units up to seven act as slaves Scatternet  Established by linking several piconets together to yield a global wireless ad hoc network. Bridge  Delivers interpiconet messages between two neighboring piconets

Piconet Scheduling Schemes Pure Round Robin (PRR)  A fixed cyclic order is defined, and a single chance to transmit is given to each master-slave queue pair. Exhaustive Round Robin (ERR)  A fixed order is defined like PRR, but the master does not switch to the next pair until the master and slave queues are empty Exhaustive Pseudocyclic Master queue length (EPM)  A dynamic cyclic order is defined at the beginning of each cycle according to a decreasing master-to-slave queue length order.

Piconet Scheduling Schemes Limited Round Robin (LRR)  Similar to ERR except that the maximum number of transmission per cycle allows to get a limit on the cycle length and to avoid the unbounded cycle length. Limited and Weighted Round Robin (LWRR)  Each slave is assigned a weight.  Each time a slave is polled without data exchange between master and slave, the weight of the slave is reduced by 1.  Otherwise it is increased by 1 up to the maximum priority

Results for Scheduling Schemes Pure round robin shows the worst performance when the traffic is low and but a lower delay at higher traffic Exhaustive round robin is the exact opposite when it comes to traffic load Both LRR and LWRR can perform well in both conditions A better scheme Fair Exhaustive Polling (FEP) which surpassed

Fair Exhaustive Polling Main idea is to poll slaves that probably have nothing to send as seldom as possible There is an active state and an inactive state  Initially all slaves are placed in the active state  During a polling, if the slave has no information to send and the master has no information to send to that slave, it is placed in the inactive state  Whenever the master has something to send, the slave is placed back into the active state  If a slave’s maximum polling interval timer has expired, then the slave is moved back into the active state FEP acts as an exhaustive scheduler at low loads and as a round robin scheduler at high loads

Causes of Reduction in Efficiency in Polling-based Communication Slaves that have no data to transmit may be unnecessarily polled, while other slaves with data to transmit may have to wait to be polled At the time of an expected poll, one of the nodes of a master-slave node pair may not be present in the piconet  The slave that is being polled is not listening or the master that is expected to poll is not polling

Soft Coordination Scheme Nodes decide their presence based on local information Cannot guarantee conflict-free participation of bridging nodes, however, they have a significantly reduced complexity Pseudorandom Coordinated Scatternet Scheduling (PCSS) algorithm  Coordination is achieved by implicit rules in the communication without the need of exchanging explicit control information

Pseudorandom Coordinated Scatternet Scheduling (PCSS) Algorithm Consists of two key components Checkpoints mechanism  A designed Bluetooth frame  Master node actively checks its slave by sending a packet to the slave at corresponding checkpoint and waiting for a response from the slave  The slave nodes passively checks its master by listening to the master at the checkpoint and sending a response packet  Nodes remain active on each checkpoint until there is user data in the master-to-slave or slave-to-master directions or until it has to leave for a next checkpoint on one of its other links

Pseudorandom Coordinated Scatternet Scheduling (PCSS) Algorithm Dynamic Adjustment  The positions of checkpoints are assigned on given link following a pseudorandom sequence that is generated based on the Bluetooth clock of the master and the MAC address of the slave  This guarantees the same sequence will by generated by both nodes in a master-slave pair, while sequences belonging to different node pairs will be different  This makes sure that different links of a node will collide only occasionally

Ideal Coordinated Scatternet Scheduler (ICSS) Used to evaluate the PCSS scheme Node has the following extra information about its neighbors  A node is aware of the already prescheduled transmission of its neighbors  A node is aware of the content of the transmission buffers of its neighbors After each package exchange on a given link the two nodes schedule the next package exchange, provided there is user data to be transmitted With the traffic dependent meeting point intensity adjustments, the throuput of PCSS quite closely match the results of the ideal ICSS algorithm

Uncoordinated Greedy Scatternet Scheduler (UGSS) Another scheme used to evaluate against PCSS Bluetooth nodes do not attempt to coordinate their meeting points; instead each node visits its neighbors in a random order Nodes switch continuously among their Bluetooth links in a greedy manner The greedy nature of the algorithm results in high power consumption of Bluetooth PCSS achieves higher throughput than the uncoordinated UGSS algorithm

Hard Coordinated Central Scheduling Scheme

Perfect Scheduling Problem for Scatternet

Perfect Scheduling Algorithm for Bipartite Scatternet

Example

Results Since the algorithm is reservation-based, they are suitable for multimedia and real-time traffic to obtain the guaranteed bandwidths along the communication routes Once the algorithm generates a feasible schedule from the set of link load requests, the assigned bandwidths are exclusively used for the requesting applications With bipartite scatternets that have no master bridge, the algorithm yields a perfect, feasible schedule which guarantees the exact amounts of bandwidth to the requesting applications

Scheduling Algorithm for General Scatternet When a scatternet allows master bridge as an integral part, the perfect scheduling problem has no solution Here is an example of a general scatternet that requires a subperfect scheduling algorithm

Piconet Scheduling Schemes Step 2 in load partition is not sufficient because of the existence of a master bridge that creates some odd cycle in the scatternet while even partitioning of link and nodal load is necessary for the perfect schedule Introduction of inclined links are necessary in order to solve this which pairs one unpaired entry on the row with another unpaired entry on the column of the master bridge

Example

Load_Partition_General The main difference to this procedure compared to its original is that entries that unpaired with any other node must be paired with a nonzero entry. For each master bridge whose load is presented by one row as a piconet master and another column as bridging slave interconnected two piconets, group an unpaired nonzero row entry with another unpaired nonzero column entry. Other than these two differences, the rest of the subperfect scheduling algorithm is similar to the perfect scheduling algorithm

QoS Perfomance Analysis Terms regarding Quality of Service (QoS):  Bandwidth – the amount of data transferred per unit time  Delay – deliver within a bounded time  Jitter – range of arrival time

Scatternet Traffic Model There are two classes of connection-oriented traffic  Constant bit rate (CBR) – guaranteed bandwidth, bounded delay, bounded jitter  Variable bit rate (VBR) – variable bandwidth, bounded delay, bounded jitter Examples of CBR  PCM, G.721, EVRC  Networked sensors and actuators Examples of VBR  MPEG4, H.263, and PNG

Scatternet Traffic Model CBR traffic schedule should satisfy two QoS conditions  The schedule contains a proper number of slots providing the required bandwidth  Scheduled slots are distributed evenly to meet delay and jitter requirements VBR traffic requirements are the same as CBR except they also:  The minimum bandwidth required by the application should be statically scheduled as a guarantee and the additional bandwidth is dynamically assigned by another scheme There is also statistical bursty rate (SBR) traffic which handles random, bursty phase and large delay/jitter  One example of SBR is file transfer since the due time does not exist,

Traffic-model Based Global Scheduling Scheme Rule 1: Bandwidth division  Total bandwidth for CBR and VBR traffic should be upper bounded to leave remaining bandwidth for SBR, protocal messages, and local traffic Rule 2: Instant rescheduling  The actual traffic is statically distributed because of mutual interference among independent traffic flows along routing paths and local delay in task scheduling  When data to be transferred on a link is less than the size of one logical slot, the unused slots should be rescheduled for other purposes such as local traffic

Traffic-model Based Global Scheduling Scheme Rule 3: Resolution for bandwidth competition  Messages with highest priorities are selected up to the available number of slots and transferred  The management protocol message has the highest priority followed by time-critical, real-time messages and so forth Rule 4: Dynamic slot assignment  Free slots can be assigned on-the-fly by the consent of both global and local traffic

Conclusion There are several ways to handle Bluetooth scheduling Each scheme used to handle the scheduling has different strengths and weaknesses depending on the amount of masters and slaves are being used