Department of Information Engineering University of Padova, ITALY Performance Analysis of Limited–1 Polling in a Bluetooth Piconet A note on the use of.

Slides:



Advertisements
Similar presentations
E&CE 418: Tutorial-4 Instructor: Prof. Xuemin (Sherman) Shen
Advertisements

Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
Lecture 6  Calculating P n – how do we raise a matrix to the n th power?  Ergodicity in Markov Chains.  When does a chain have equilibrium probabilities?
Department of Information Engineering University of Padova, Italy COST273 Sep , 2002 Lisboa TD (02)-146 Handover procedures in a Bluetooth network.
1 Chapter 3 Transport Layer Computer Networking: A Top Down Approach 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July A note on the use.
Department of Information Engineering University of Padova, Italy On the Impact of Fading and Inter-piconet Interference on Bluetooth Performance A note.
13 –Routing Protocols Network Layer4-1. Network Layer4-2 Chapter 4 Network Layer Computer Networking: A Top Down Approach Featuring the Internet, 3 rd.
Tyrrhenina Workshop, Sept University of Padova Wireless Internet Access: the BT approach Study Goals & Talk summary Aims Evaluation of FTP performance.
1 Cooperative Communications in Networks: Random coding for wireless multicast Brooke Shrader and Anthony Ephremides University of Maryland October, 2008.
ECS 152A Acknowledgement: slides from S. Kalyanaraman & B.Sikdar
Consider the M/M/1 queue Arrival process: Poi( t) Service distribution: Poi(  t) One server, infinite queue length possible Prob(arrival in small interval.
Ncue-csie1 A QoS Guaranteed Multipolling Scheme for Voice Traffic in IEEE Wireless LANs Der-Jiunn Deng 、 Chong-Shuo Fan 、 Chao-Yang Lin Speaker:
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross.
1 Performance Evaluation of Computer Networks Objectives  Introduction to Queuing Theory  Little’s Theorem  Standard Notation of Queuing Systems  Poisson.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 7th Lecture Christian Schindelhauer.
WPMC 2003 Yokosuka, Kanagawa (Japan) October 2003 Department of Information Engineering University of Padova, ITALY On Providing Soft-QoS in Wireless.
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross.
Rensselaer Polytechnic Institute © Shivkumar Kalvanaraman & © Biplab Sikdar1 ECSE-4730: Computer Communication Networks (CCN) Network Layer Performance.
6: Wireless and Mobile Networks Wireless LANs.
WCNC 2008 March 31 - April 3 Las Vegas Department of Information Engineering University of Padova, ITALY Throughput and Energy Efficiency of Bluetooth.
7/3/2015© 2007 Raymond P. Jefferis III1 Queuing Systems.
Submission doc.: IEEE /1452r0 November 2014 Leif Wilhelmsson, EricssonSlide 1 Frequency selective scheduling in OFDMA Date: Authors:
Queuing Networks: Burke’s Theorem, Kleinrock’s Approximation, and Jackson’s Theorem Wade Trappe.
Introduction1-1 CS 325 Computer Networks Sami Rollins Fall 2005.
Lesson 11: Solved M/G/1 Exercises
Flow Models and Optimal Routing. How can we evaluate the performance of a routing algorithm –quantify how well they do –use arrival rates at nodes and.
Lesson 9: Advanced M/G/1 Methods and Examples Giovanni Giambene Queuing Theory and Telecommunications: Networks and Applications 2nd edition, Springer.
Psy B07 Chapter 1Slide 1 ANALYSIS OF VARIANCE. Psy B07 Chapter 1Slide 2 t-test refresher  In chapter 7 we talked about analyses that could be conducted.
Copyright warning. COMP5348 Lecture 6: Predicting Performance Adapted with permission from presentations by Alan Fekete.
WPMC 2003 Yokosuka, Kanagawa (Japan) October 2003 Department of Information Engineering University of Padova, ITALY A Soft-QoS Scheduling Algorithm.
COST273, Barcelona, January, 2003 Department of Information Engineering University of Padova, Italy Mathematical Analysis of Bluetooth Energy Efficiency.
Introduction to Operations Research
Lecture 14 – Queuing Networks Topics Description of Jackson networks Equations for computing internal arrival rates Examples: computation center, job shop.
NETE4631:Capacity Planning (2)- Lecture 10 Suronapee Phoomvuthisarn, Ph.D. /
Chapter 1 Introduction Circuit/Packet Switching Protocols Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley,
Analysis of M/M/c/N Queuing System With Balking, Reneging and Synchronous Vacations Dequan Yue Department of Statistics, College of Sciences Yanshan University,
Enhancing Bluetooth TCP Throughput via Packet Type Adaptation Ling-Jyh Chen, Rohit Kapoor, M. Y. Sanadidi, Mario Gerla Dept. of Computer Science, UCLA.
Introduction to Queueing Theory
Introduction1-1 Chapter 1 Computer Networks and the Internet Computer Networking: A Top Down Approach Featuring the Internet, 2 nd edition. Jim Kurose,
Department of Information Engineering University of Padova, ITALY A Soft QoS scheduling algorithm for Bluetooth piconets {andrea.zanella, daniele.miorandi,
Ali Movaghar Winter 2009 Modeling and Analysis of Computer Networks (Delay Models in Data Networks)
Transport Layer3-1 Chapter 3 Transport Layer Computer Networking: A Top Down Approach 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July A.
University of Padova Department of Information Engineering On the Optimal Topology of Bluetooth Piconets: Roles Swapping Algorithms Med-Hoc-Net 2002, Chia.
WPMC 2003 Yokosuka, Kanagawa (Japan) October 2003 Department of Information Engineering University of Padova, ITALY On Providing Soft-QoS in Wireless.
yahoo.com SUT-System Level Performance Models yahoo.com SUT-System Level Performance Models8-1 chapter11 Single Queue Systems.
1 Performance Analysis of the Distributed Coordination Function under Sporadic Traffic joint work with C.-F. Chiasserini (Politecnico di Torino)
Before The Canned Slides r What sort of things did you learn from Mikes talk on Friday? r Mini-homework this week: create a wiki page with cross-referenced.
State N 2.6 The M/M/1/N Queueing System: The Finite Buffer Case.
7 May Performance Comparison of Scheduling Algorithms for Multimedia Traffic over High-Rate WPANs A note on the use of these ppt slides: We’re making.
WPMC 2003 Yokosuka, Kanagawa (Japan) October 2003 Department of Information Engineering University of Padova, ITALY On Providing Soft-QoS in Wireless.
Department of Information Engineering University of Padova, ITALY Mathematical Analysis of IEEE Energy Efficiency. A note on the use of these ppt.
Constructions of Optical Priority Queues Jay Cheng Department of Electrical Engineering & Institute of Communications Engineering National Tsing Hua University.
WPMC 2003 Yokosuka, Kanagawa (Japan) October 2003 Department of Information Engineering University of Padova, ITALY Mathematical Analysis of Bluetooth.
Maciej Stasiak, Mariusz Głąbowski Arkadiusz Wiśniewski, Piotr Zwierzykowski Model of the Nodes in the Packet Network Chapter 10.
Submission doc.: IEEE 11-14/0866r0 July 2014 Johan Söder, Ericsson ABSlide 1 Traffic modeling and system capacity performance measure Date:
A note on the use of these ppt slides: We’re making these slides freely available to all, hoping they might be of use for researchers and/or students.
1 Chapter 4 Fundamental Queueing System. 2 3 Ref: Mischa Schwartz “Telecommunication Networks” Addison-Wesley publishing company 1988.
University of Padova Department of Information Engineering On the Optimal Topology of Bluetooth Piconets: Roles Swapping Algorithms A note on the use of.
802.11e EDCA WLN 2005 Sydney, Nov Paal E. Engelstad (presenter) UniK / Telenor R&D Olav N. Østerbø Telenor R&D
Indian Institute of Technology Bombay 1 Communication Networks Prof. D. Manjunath
1 Chapter 4 Fundamental Queueing System
University of Padova Department of Information Engineering On the Optimal Topology of Bluetooth Piconets: Roles Swapping Algorithms Daniele Miorandi &
Courtesy Piggybacking: Supporting Differentiated Services in Multihop Mobile Ad Hoc Networks Wei LiuXiang Chen Yuguang Fang WING Dept. of ECE University.
Wireless Packet Scheduling With Soft Deadlines Aditya Dua and Nicholas Bambos Department of Electrical Engineering Stanford University ICC 2007.
Joint Routing and Scheduling Optimization in Wireless Mesh Networks with Directional Antennas A. Capone, I. Filippini, F. Martignon IEEE international.
Balancing Uplink and Downlink Delay of VoIP Traffic in WLANs
Much More About Markov Chains
Lecture on Markov Chain
CSE 550 Computer Network Design
Switch Performance Analysis and Design Improvements
Presentation transcript:

Department of Information Engineering University of Padova, ITALY Performance Analysis of Limited–1 Polling in a Bluetooth Piconet A note on the use of these ppt slides: We’re making these slides freely available to all, hoping they might be of use for researchers and/or students. They’re in PowerPoint form so you can add, modify, and delete slides (including this one) and slide content to suit your needs. In return for use, we only ask the following: If you use these slides (e.g., in a class, presentations, talks and so on) in substantially unaltered form, that you mention their source. If you post any slides in substantially unaltered form on a www site, that you note that they are adapted from (or perhaps identical to) our slides, and put a link to the authors webpage: Thanks and enjoy! A note on the use of these ppt slides: We’re making these slides freely available to all, hoping they might be of use for researchers and/or students. They’re in PowerPoint form so you can add, modify, and delete slides (including this one) and slide content to suit your needs. In return for use, we only ask the following: If you use these slides (e.g., in a class, presentations, talks and so on) in substantially unaltered form, that you mention their source. If you post any slides in substantially unaltered form on a www site, that you note that they are adapted from (or perhaps identical to) our slides, and put a link to the authors webpage: Thanks and enjoy!

Department of Information Engineering University of Padova, ITALY Performance Analysis of Limited–1 Polling in a Bluetooth Piconet {daniele.miorandi, Daniele Miorandi, Andrea Zanella CITSA’05, Orlando, July 2005 Special Interest Group on NEtworking & Telecommunications

CITSA05, Orlando (Florida), July, 2005 Outline of the contents  Motivations & Purposes  Bluetooth Basic  System Model  Performance Analysis  Concluding Remarks

CITSA05, Orlando (Florida), July, 2005 What and Why… Motivations & Purposes

CITSA05, Orlando (Florida), July, 2005 Motivations  Analytical models for Bluetooth systems permit  Performance estimation (packet delay statistics)‏  Buffer dimensioning (queue length statistics)‏  Segmentation and reassembly strategy (packet type selection)‏  Recently, some models have been proposed for simple scenarios with multi-slot packets [Bruno,Misic]  Approximate delay estimation using M/G/1 queues with vacations  Exact analysis for symmetric systems (equally loaded nodes) only  Literature still lacks a mathematical model that takes into consideration multislot packets and asymmetric traffic load among nodes

CITSA05, Orlando (Florida), July, 2005 Aim of the study  Providing an approximate performance analysis in case of  Use of multi-slot packets  Asymmetric and unbalanced traffic matrix

CITSA05, Orlando (Florida), July, 2005 What the standard says… Bluetooth basic

CITSA05, Orlando (Florida), July, 2005 Bluetooth piconet piconet  Two up to eight Bluetooth units sharing the same channel form a piconet  In each piconet, a unit acts as master, the others act as slaves centralized polling scheme  Channel access is based on a centralized polling scheme Time-division- duplex  Full-duplex is supported by Time-division- duplex (TDD), with time slots of T=0.625 ms active slave master parked slave standby slave1 slave2 slave3 master

CITSA05, Orlando (Florida), July, 2005 Multi-slot packets  Data packets can be:  1, 3, or 5 slot long  Unprotected or 2/3 FEC protected  Unprotected packet formats (DH)  higher data capacity  more subject to errors  Protected packet formats (DM):  medium data capacity  higher protection against errors

CITSA05, Orlando (Florida), July, 2005 Mathematical Model System Model for Ideal Channels

CITSA05, Orlando (Florida), July, 2005 Downlink master queues (one per slave)‏ Uplink slaves queues System Model  Number of units  N-1 slaves and 1 master  System model  2N-2 interacting queues  Traffic model  Packets arrive at link i,j as a marked Poisson process of rate λ i,j and weights  ij (l), l=1,3,5  Only single-hop communications  Pure Round Robin (PRR)‏  One packet polling cycle  One packet per queue is served per polling cycle random duration  Polling cycle has a random duration depending on the size of the packets found waiting at each queue-head N-1

CITSA05, Orlando (Florida), July, 2005 Cycle Time Queue service time (B 0,1 )‏ Queue service time (B 1,0 )‏ Cycle Time (T C )‏ B i,j : part of the cycle time spent in serving queue (i,j)‏ T C : time required to complete a polling cycle P i,j (0): probability of empty (i,j) queue  i,j : load factor of (i,j) queue Little’s law

CITSA05, Orlando (Florida), July, 2005  According to the head of the queue packet type we have  Empty queue: B ij = 1 slot (POLL or NULL packet)‏  DH1 or DM1: B ij = 1 slot  DH3 or DM3: B ij = 3 slots  DH5 or DM5: B ij = 5 slots  Taking expectations we get  Average service time for (i,j) queue: b ij =E[B ij ]  Average cycle time  Putting pieces together, we get a system of 2N-2 equations Cycle Time Statistics

CITSA05, Orlando (Florida), July, 2005 Average cycle time  Solving the system we easily get

CITSA05, Orlando (Florida), July, 2005 Delay time Slave 1 Slave 2 Slave k Vacancy delay (V i,j )‏ Slave 1 Slave 2 Slave k Queue delay (Q ij )‏ Slave 1 Slave 2 Slave k Transmission time (Z i,j )‏ Cycle Time (T C )‏

CITSA05, Orlando (Florida), July, 2005  Let W ij be the access delay for link (i,j), i.e., the time spent in the queue before entering the service  The access delay W ij can be expressed as where  V i,j : vacancy time time between the packet arrival and the instant the queue gets the service  Q i,j : queue delay time for getting rid of all the packets found in the queue  Hence, the packet delay D ij for link (i,j) will be given by Packet Delay

CITSA05, Orlando (Florida), July, 2005  The queue delay Q ij can be expressed as follows  where  L i,j : number of queued packets at the packet arrival epoch  U ij (k): inter-visit time for the k-th queued packet at (i,j) queue time for getting rid of all the packets found in the queue  NOTE: U ij (k) is a special polling cycle, since it refers to the specific case in which at least a packet is waiting in the (i,j) queue  Assuming U ij (k) to be independent of packet index k we get Queue Delay Queue service time obtained with

CITSA05, Orlando (Florida), July, 2005 Equivalent load factor  Once again we get a system of equations  that solves for

CITSA05, Orlando (Florida), July, 2005 Laplace-Stieltjes Transform (LST)‏  Applying LST & assuming delay components to be independent we get  Packet service time  Number of queued packets  Queue delay  Queue service time  Inter-visit time  Access delay The LST of the vacancy time is still missing…

CITSA05, Orlando (Florida), July, 2005 Vacancy Time  The LST of the vacancy time, V * i,j (s) can be  either derived extending the method proposed by Ibe&Cheng [COMM89]… random look theory  or approximated by applying the random look theory (much easier!)‏  This approximation allows to get a closed form expression of the average packet delay

CITSA05, Orlando (Florida), July, 2005 Results (1)‏  We checked the accuracy of our approximated model for balanced scenarios, for which exact solution is known  N=4,  (1)=  (3)=1/9,  (5)=7/9  Queues are equally loaded  Symmetric Traffic  Remark: the proposed model closely approximates the exact result also for high traffic loads

CITSA05, Orlando (Florida), July, 2005 Results (2)‏  Balanced asymmetric scenarios  N=4,  (1)=  (3)=1/9,  (5)=7/9  Queues are equally loaded  Download Traffic only  Remark: the accuracy of the proposed model is even more clear for asymmetric scenarios

CITSA05, Orlando (Florida), July, 2005 Results (3)‏  Unbalanced scenarios  N=4,  (1)=  (3)=  (5)=1/3   0,1 =  1,0 =  0,2 =  2,0 =0.3   0,3 =  3,0 =0.9

CITSA05, Orlando (Florida), July, 2005 Conclusions & Future work  Summary  Simple mathematical model for ideal Bluetooth links with unbalanced load has been presented  Average packet delay estimations given by the model closely approximates the exact results in balanced scenario, largely improving the models previously presented in the literature  The model seems to offer rather good performance estimation also in unbalanced scenarios  Next steps  Model can be extended to error-prone links  A fading channel model might be considered  Remark: this might exacerbate the interdependency among the queues, making the model less accurate

CITSA05, Orlando (Florida), July, 2005 That’s all! Thanks for your attention!