University Graduate Center ASYNCHRONOUS FORMATION OF NON-HIERARCHICAL BLUETOOTH SCATTERNETS Paal Engelstad ( )

Slides:



Advertisements
Similar presentations
Bluetooth.
Advertisements

Design of a reliable communication system for grid-style traffic light networks Junghoon Lee Dept. of Computer science and statistics Jeju National University.
Communications Research Centre (CRC) Defence R&D Canada – Ottawa 1 Properties of Mobile Tactical Radio Networks on VHF Bands Li Li & Phil Vigneron Communications.
Márk FélegyháziMaster’s Thesis Development and Evaluation of a Dynamic Bluetooth Network Formation Procedure Márk Félegyházi, György Miklós Ericsson Research,
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
BLUETOOTH TM :A new radio interface providing ubiquitous connectivity Jaap C.Haartsen Ericssion Radio System B.V IEEE.
Sattam Al-Sahli – Emad Al-Hemyari –
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 11th Lecture Christian Schindelhauer.
Hasan SÖZER1 Data Scheduling and SAR for Bluetooth MAC Manish Kalia, Deepak Bansal, Rajeev Shorey IBM India Research Laboratory.
CPET 260 Bluetooth. What is Bluetooth? Not IEEE (Wi-Fi) or HomeRF Originally designed to replace wires Short-range, lower-power wireless technology.
© Honglei Miao: Presentation in Ad-Hoc Network course (19) Minimal CDMA Recoding Strategies in Power-Controlled Ad-Hoc Wireless Networks Honglei.
Mechanisms for Quick Bluetooth Device Discovery Jehn-Ruey Jiang, Bing-Rong Lin, and Yu-Chee Tseng Presented by Jehn-Ruey Jiang.
Bluenet a New Scatternet Formation Scheme * Huseyin Ozgur Tan * Zifang Wang,Robert J.Thomas, Zygmunt Haas ECE Cornell Univ*
Adaptive Self-Configuring Sensor Network Topologies ns-2 simulation & performance analysis Zhenghua Fu Ben Greenstein Petros Zerfos.
A Routing Vector Method (RVM) for Routing Bluetooth Scatternets Pravin Bhagwat IBM.Thomas J. Watson Research Center,Yorktown Heights,NY.
Scatternet Formation in Bluetooth CSC 457 Bill Scherer November 8, 2001.
Maximizing the Lifetime of Wireless Sensor Networks through Optimal Single-Session Flow Routing Y.Thomas Hou, Yi Shi, Jianping Pan, Scott F.Midkiff Mobile.
Presented by Hasan SOZER1 A Pseudo Random Coordinated Scheduling Algorithm for Bluetooth Scatternets Andras Racz, Gyorgy Miklos, Ferenc Kubinszky, Andras.
presented by Hasan SÖZER 1 JUMP Mode A Dynamic Window-based Scheduling Framework for Bluetooth Scatternets Niklas Johansson Fredrik Alriksson.
1 25\10\2010 Unit-V Connecting LANs Unit – 5 Connecting DevicesConnecting Devices Backbone NetworksBackbone Networks Virtual LANsVirtual LANs.
1 Algorithms for Bandwidth Efficient Multicast Routing in Multi-channel Multi-radio Wireless Mesh Networks Hoang Lan Nguyen and Uyen Trang Nguyen Presenter:
Yanyan Yang, Yunhuai Liu, and Lionel M. Ni Department of Computer Science and Engineering, Hong Kong University of Science and Technology IEEE MASS 2009.
1 The Orphan Problem in ZigBee- based Wireless Sensor Networks IEEE Trans. on Mobile Computing (also in MSWiM 2007) Meng-Shiuan Pan and Yu-Chee Tseng Department.
Bluetooth Introduction The Bluetooth Technology
Modeling & Simulation of Bluetooth MAC protocol COE543 Term Project Spring 2003 Submitted by: H.M.Asif (ID# )
Overview of Wireless LANs Use wireless transmission medium Issues of high prices, low data rates, occupational safety concerns, & licensing requirements.
A Distributed Scheduling Algorithm for Real-time (D-SAR) Industrial Wireless Sensor and Actuator Networks By Kiana Karimpour.
Bluetooth Background Ericsson, IBM, Intel, Nokia, and Toshiba
Distributed Topology Construction of Bluetooth Personal Area Networks Theodoros Salonidis, Pravin Bhagwat, Leandros Tassiulas and Richard LaMaire.
A Bluetooth Scatternet-Route Structure for Multihop Ad Hoc Networks Yong Liu, Myung J. Lee, and Tarek N. Saadawi 2003 IEEE Journal on Selected Areas in.
Bluetooth Techniques ECE 591. Overview  Universal short-range wireless capability  Uses 2.4-GHz band  Available globally for unlicensed users  Devices.
1 Multicast Algorithms for Multi- Channel Wireless Mesh Networks Guokai Zeng, Bo Wang, Yong Ding, Li Xiao, Matt Mutka Michigan State University ICNP 2007.
Doc.: IEEE /033r2 Submission July 1999 Simon Baatz, University of BonnSlide 1 Integration of Bluetooth into LAN Environments Simon Baatz, Matthias.
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
An Energy Efficient Hierarchical Clustering Algorithm for Wireless Sensor Networks Seema Bandyopadhyay and Edward J. Coyle Presented by Yu Wang.
2007/03/26OPLAB, NTUIM1 A Proactive Tree Recovery Mechanism for Resilient Overlay Network Networking, IEEE/ACM Transactions on Volume 15, Issue 1, Feb.
Bluetooth Techniques Chapter 15. Overview of Bluetooth Initially developed by Swedish mobile phone maker in 1994 to let laptop computers make calls over.
TOPOLOGY MANAGEMENT IN COGMESH: A CLUSTER-BASED COGNITIVE RADIO MESH NETWORK Tao Chen; Honggang Zhang; Maggio, G.M.; Chlamtac, I.; Communications, 2007.
Bluetooth By Christian Doyle. Overview What is Bluetooth? What’s with the name? Establishing a connection Multiplexing Piconets Scatternets Architecture.
Team Topic Presentation Team 6 BLUETOOTH What is Bluetooth? Cable Replacement Automatic Connectivity Hidden Computing Few Examples: 1.Automatic Door.
BLUETOOTH WIRELESS TECHNOLOGY
BLUETOOTH THROUGHPUT IMPROVEMENT USING A SLAVE TO SLAVE PICONET FORMATION By Christophe Lafon and Tariq S Durrani Institute for Communications & Signal.
A Fast Handoff Scheme For IP over Bluetooth Sang-Hsu Chung, Hyunsoo Yoon, and Jung-Wan Cho Department of Electrical Engineering & Computer Science Divison.
Lectured By: Vivek Dimri Asst Professor CSE Deptt. SET.
Zaid A. Shafeeq Mohammed N. Al-Damluji Al-Ahliyya Amman University Amman - Jordan September
Doc.: IEEE /66r0 Submission March 2000 Nada Golmie, NISTSlide 1 IEEE P Working Group for Wireless Personal Area Networks WPAN Coexistence.
Bluetooth In 1994, the L. M. Ericsson company became interested in connecting its mobile phones to other devices without cables. A SIG (Special Interest.
A Two-Phase Scatternet Formation Protocol for Bluetooth Wireless Personal Area Networks Yoji Kawamoto, Vincent W.S. Wong, and Victor C.M. Leung Bluetooth.
Handoff Support for Mobility with IP over Bluetooth Simon Baatz, Matthias Frank, Rolf Gopffarth, Peter Martini, Markus Schetelig, Dmitri Kassatkine, Asko.
A Pseudo Random Coordinated Scheduling Algorithm for Bluetooth Scatternets MobiHoc 2001.
1 Optimizing the Topology of Bluetooth Wireless Personal Area Networks Marco Ajmone Marsan, Carla F. Chiasserini, Antonio Nucci, Giuliana Carello, Luigi.
Wireless Networks: Physical and Link Layers Wired Typically point-to- point connections Interference effects are not significant Not power constrained.
Reducing the Number of Hops between Communication Peers in a Bluetooth Scatternet Csaba Kiss Kalló, Carla-Fabiana Chiasserini, Roberto Battiti, Marco Ajmone.
A Flexible Scatternet- wide scheduling Algorithm for Bluetooth Wensheng Zhang and Guohong Cao IPCCC 2002.
Sonal Jain, IT-BHU Bluetooth Mobile Ad Hoc Networks Sonal Jain B.Tech (IV), Electrical Engg. Dept.,ITBHU IEEE SPAVes Sept 14, 15 Institute.
VADD: Vehicle-Assisted Data Delivery in Vehicular Ad Hoc Networks Zhao, J.; Cao, G. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 鄭宇辰
Abdul Rahman Al-Refai Zavnura Pingkan. Introduction Bluetooth is a wireless technology for short range data and/ or voice communication The communication.
1 A cable replacement technology 1 Mb/s symbol rate Range 10+ meters Single chip radio at low power & low price point Bluetooth.
Asstt. Professor Adeel Akram. Other Novel Routing Approaches Link reversal Aimed for highly dynamic networks Goal: to identify some path, as opposed.
What is Bluetooth? A cable-replacement technology that can be used to connect almost any device to any other device Radio interface enabling electronic.
Bluetooth for Ad-Hoc Networking
Wireless NETWORKS NET 434 Topic No 8 Wireless PANs ZiGBee NEtworks
BLUETOOTH THE STANDARD & ISSUES.
A Wireless LAN technologies IEEE
Wireless NETWORKS NET 434 Topic No 7 Bluetooth-IEEE802.15
Wireless NETWORKS NET 434 Topic No 7 Bluetooth-IEEE802.15
BLUETOOTH (I) Bluetooth technology aims at so-called ad hoc piconets, which are local area networks with a very limited coverage and without the need for.
Wireless NETWORKS NET 434 Topic No 7 Bluetooth-IEEE802.15
BLUETOOTH Personal Area Networking [ PAN ] over Bluetooth
Bluetooth – an Enabler for Personal Area Networking
Presentation transcript:

University Graduate Center ASYNCHRONOUS FORMATION OF NON-HIERARCHICAL BLUETOOTH SCATTERNETS Paal Engelstad ( ) Telenor R&D Tore Jønvik University of Oslo - Unik, and Do Van Thanh Telenor R&D World Wireless Congress 3Gwireless’2003 May 27th-30th, San Francisco

University Graduate Center Outline Motivation Bluetooth basics Automatic Piconet formation (Sapifo) Ethernet emulation (BNEP) PAN profile and roles IP alternatives discussion IP Solution Bluetooth Solution Conclution

University Graduate Center Characteristics of Bluetooth Operate at 2.4 GHz band at a data rate of 720kb/s Using Frequency Hopping Spread Spectrum dividing the frequency band 2,402-2,480 GHz into 79 channels available Radio transceivers hop from one channel to another in a pseudo-random manner determined by the master 625 µ s slot size, multi slot possible (3 and 5 slots)

University Graduate Center Bluetooth Stack:

University Graduate Center Hop sequence generation: Bluetooth 48-bit Device address (IEEE 802 Std):

University Graduate Center Piconet Support up to 8 devices in a Piconet (1 master and 7 slaves) Single master – Initiator becomes master – Controls communication – Set the clock and the hopping sequence Slave(s) – Follows master

University Graduate Center Procedure for communication between Bluetooth devices: Detect devices within radio range – The Inquiry procedure Connect to one of the detected devices – The Paging procedure Set up L2CAP connection – Start SDP to get the device capabilities

University Graduate Center Weakly connected underlying topologies: A realistic scatternet formation algorithm should not assume a strongly connected underlying topology where each node may connect to any other node in the scatternet. Instead, the algorithm should work even when there might be at least two nodes in the same scatternet that are out of each other’s radio range.

University Graduate Center Asynchronous scatternet formation: An algorithm should not mandate that all nodes start forming the scatternet at the same time (e.g. in terms of an algorithm comprising several distinct phases). Such synchronous formations would probably be difficult to co-ordinate in real usage scenarios. Instead, Bluetooth devices should be able to enter or leave the scatternet one by one and at any time. In these events, topology changes should be handled locally and not propagated throughout the scatternet.

University Graduate Center a. Minimal Piconet Overlap: Two piconets should be connected by at most one bridge node. b. Minimal Bridge Degree: A bridge node should participate in at most two piconets, i.e. each slave-slave bridge is slave of exactly two masters, while each master-slave bridge is slave of exactly one other master or master- slave. c. Piconet Size: The algorithm should limit (and possibly optimize) the size of piconets, i.e. the number of slaves assigned to one master. Bluetooth does not allow more than seven slaves per master.

University Graduate Center State diagram for scatternet formation

University Graduate Center

TSF Our approach attempts to form a scatternet topology which simplifies both scheduling and routing problems while minimizing the number of piconets which a relay node participates in (as opposed to the total number of piconets). We have developed an efficient topology formation algorithm, called TSF (for Tree Scatternet Formation), which assigns master/slave roles to nodes while connecting them in a tree structure. Our algorithm is both decentralized and self-healing, in that nodes can join and leave at any time without causing long disruptions in connectivity. It also decides dynamically and in a distributed fashion which nodes act as masters and which as slaves, thus avoiding manual configuration of roles to nodes or centralized decision making. Furthermore, our scheme does not require any communication between nodes already in the scatternet, using only Bluetooth's lower-layer primitives for detecting potential nodes to form links with and establish communication links.

University Graduate Center TWO ALTERNATIVE NON-HIERARCHICAL ASYNCHRONOUS ALGORITHMS Master-slave-based Scatternet Formation (MSF) Slave-slave-based Scatternet Formation (SSF)

University Graduate Center Link formation scheme for MSF.

University Graduate Center MSF 1. Free nodes (F) should be able to connect to scatternet nodes (i.e. slaves, masters and/or master-slaves) as well as to each other. Hence, free nodes must alternate between INQUIRY and INQUIRY-SCAN. This is illustrated in Figure 3 by both an outgoing and an incoming arrow. 2. Due to the Maximum Bridge Degree design principle, slave-slaves, if any, cannot connect to other nodes. Similarly, masters and master-slaves filled with seven slaved cannot connect to other nodes. Hence, the ss-, M'-, and ms'- nodes in Figure 3 has neither an outgoing nor an incoming arrow. 3. In a scatternet without ss-bridges, slaves cannot obtain another slave-role of a connection. However, it may obtain a master-role (i.e. connect by INQUIRY), and become a master-slave. This is illustrated in Figure 3 by outgoing arrows pointing out from the slave (S). 4. In a scatternet generating ms-bridges, masters should obtain another slave-role when connecting to other nodes (i.e. by connecting in INQUIRY-SCAN), and become a master-slave as a result of connection setup. Figure 3 illustrates this by incoming arrows pointing towards the master (M). 5. Due to the Maximum Bridge Degree design principle, master-slaves cannot obtain another slave-role, but they may connect to other nodes as a master, i.e. as a result of an INQUIRY. Hence, the master-slave (ms) in Figure 3 has an outgoing arrow.

University Graduate Center A simple MSF example Slave Sender Master Listener Slave Sender Free Node Sender/listener Slave Sender

University Graduate Center SSF The link formation scheme for SSF is derived by similar arguments as for MSF, except: 3. In a scatternet generating ss-bridges, slaves should obtain another slave-role when connecting to other nodes (i.e. by connecting in INQUIRY-SCAN), and hence become a slave-slave as a result of the formation of a new link. Figure 4 illustrates this by incoming arrows pointing towards the slave (S). 4. In a scatternet without ms-bridges, a master cannot obtain another slave-role as a result of formation of a link to another node. However, it may remain a master of the new connection (i.e. connect by INQUIRY). Figure 4 illustrates this by outgoing arrows pointing out from the Master (M). 5. Due to the Minimal Bridge Degree design principle, a master-slave, if any, cannot obtain another slave-role, but it may connect to other nodes as a master, i.e. as a result of an INQUIRY. Hence, the master-slave (ms) in Figure 4 has an outgoing arrow. For completeness, we have shown master- slaves in Figure 4, although a scatternet formed only by SSF, will not contain any master-slave bridges.

University Graduate Center A simple SSF example Slave Listener Master Sender Slave Listner Free Node Sender/listener Slave Listener

University Graduate Center Evaluation Sets of evaluation criteria The effectiveness of a specific scatternet formation scheme comprises two parts. The first part is an assessment of how efficient the scatternet formation algorithm is in terms of overhead and delay (i.e. during the process of scatternet formation). Our proposed schemes do not require any reconfigurations or coordination throughout the scatternet. Instead, they are straightforward - and very efficient - unit- time schemes where overhead and delay are of little importance. The second part relates to the efficiency of the operation of scatternets formed by the algorithm, (i.e. after and as a result of the topology created by the scatternet formation process). For the latter part, we have developed evaluation metrics to assess the topology formed by any scatternet formation algorithm. We present these evaluation criteria in the following sub-sections.

University Graduate Center Number of disconnected scatternets (Connectivity-ratio) – rconn = N/N0 Average Shortest Path (ASP-ratio) – rasp = ASP/ASP0 Scatternet structure (Role-state ratios) – rsd= nsr/nm – rp= nm/n – rss= nss/nm – rms= nms/nm

University Graduate Center

Comparing average number of slaves per piconet

University Graduate Center Conclusion have argued that a scatternet formation algorithm should allow for asynchronous scatternet formation, and it should work well on weakly connected underlying topologies (i.e. when not all scatternet devices are within radio range of each other). Our simulations demonstrated that non- hierarchical algorithms form scatternet topologies that are considerably more efficient, in terms of connectivity and average shortest path, than those formed by comparable master-slave- based algorithms. Researchers have emphasized that slave-slave bridges are probably more optimal than using master slave-bridges, in terms of efficient bridge management. Our simulations also supported the advantages of slave-slave based scatternets. Indeed, the slave- slave based scatternet formation algorithm proved to have the highest ability to accommodate connectivity between nodes. A number of other proposed algorithms have implemented measures to avoid that piconets are filled with seven slaves. Our simulations indicate that such measures might not be necessary. The work presented in this paper should be extended to compare with the quite large number of proposed scatternet formation algorithms other than only TSF. Further work is also required to translate the ASP-metrics proposed in this paper into concrete communication performance on a Bluetooth scatternet.