2003/03/14 An Efficient Link Polling Policy by Pattern Matching for Bluetooth Piconets Ting-Yu Lin, Yu-Chee Tseng, and Yuan-Ting Lu Department of Computer.

Slides:



Advertisements
Similar presentations
A 2 -MAC: An Adaptive, Anycast MAC Protocol for Wireless Sensor Networks Hwee-Xian TAN and Mun Choon CHAN Department of Computer Science, School of Computing.
Advertisements

Sep. 18, 2003Chung-Hsien Hsu A Dynamic Slot Assignment Scheme for Slave-to-Slave and Multicast-like Communication in Bluetooth Personal Area Networks C.
LECTURE 11 CT1303 LAN. DYNAMIC MAC PROTOCOL No fixed assignment for transmission media or any network resources.. It allows transmission when needed.
2005/12/06OPLAB, Dept. of IM, NTU1 Optimizing the ARQ Performance in Downlink Packet Data Systems With Scheduling Haitao Zheng, Member, IEEE Harish Viswanathan,
Design and Analysis of Data Communication Problems in Bluetooth Wireless Personal-Area Networks Ting-Yu Lin ( 林亭佑 ) Department of Communication Engineering.
A serve flow management strategy for IEEE BWA system in TDD mode Hsin-Hsien Liu
Hasan SÖZER1 Data Scheduling and SAR for Bluetooth MAC Manish Kalia, Deepak Bansal, Rajeev Shorey IBM India Research Laboratory.
Ncue-csie1 A QoS Guaranteed Multipolling Scheme for Voice Traffic in IEEE Wireless LANs Der-Jiunn Deng 、 Chong-Shuo Fan 、 Chao-Yang Lin Speaker:
Bluenet a New Scatternet Formation Scheme * Huseyin Ozgur Tan * Zifang Wang,Robert J.Thomas, Zygmunt Haas ECE Cornell Univ*
A Routing Vector Method (RVM) for Routing Bluetooth Scatternets Pravin Bhagwat IBM.Thomas J. Watson Research Center,Yorktown Heights,NY.
Bluetooth Scatternets: An Enhanced Adaptive Scheduling Schema Simon Baatz Matthias Frank Carmen Kühl Peter Martini Christoph Scholz presented by Metin.
1 Algorithms for Bandwidth Efficient Multicast Routing in Multi-channel Multi-radio Wireless Mesh Networks Hoang Lan Nguyen and Uyen Trang Nguyen Presenter:
Pipelined Two Step Iterative Matching Algorithms for CIOQ Crossbar Switches Deng Pan and Yuanyuan Yang State University of New York, Stony Brook.
Buffer Management for Shared- Memory ATM Switches Written By: Mutlu Apraci John A.Copelan Georgia Institute of Technology Presented By: Yan Huang.
A Generalized Processor Sharing Approach to Flow Control in Integrated Services Networks: The Single-Node Case Abhay K. Parekh, Member, IEEE, and Robert.
Modeling & Simulation of Bluetooth MAC protocol COE543 Term Project Spring 2003 Submitted by: H.M.Asif (ID# )
Doc.: IEEE /134r0 Submission 5/00 Nada Golmie, NISTSlide 1 IEEE P Working Group for Wireless Personal Area Networks Update on the MAC Coexistence.
Bluetooth: Introduction
BY ALEX GARCIA Scheduling in Bluetooth Networks. Introduction Bluetooth  Used to interconnect mobile devices into a Personal area ad hoc network (PAN).
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
Providing Delay Guarantees in Bluetooth Rachid Ait Yaiz and Geert Heijenk International Conference on Distributed Computing Systems Workshops (ICDCSW’03)
Bluetooth Techniques ECE 591. Overview  Universal short-range wireless capability  Uses 2.4-GHz band  Available globally for unlicensed users  Devices.
Department of Information Engineering University of Padova, ITALY Performance Analysis of Limited–1 Polling in a Bluetooth Piconet A note on the use of.
Enhancing Bluetooth TCP Throughput via Packet Type Adaptation Ling-Jyh Chen, Rohit Kapoor, M. Y. Sanadidi, Mario Gerla Dept. of Computer Science, UCLA.
ACN: RED paper1 Random Early Detection Gateways for Congestion Avoidance Sally Floyd and Van Jacobson, IEEE Transactions on Networking, Vol.1, No. 4, (Aug.
Nov Chung-Hsien Hsu1 Round Robin with Look Ahead: A New Scheduling Algorithm for Bluetooth Daqing Yang, Gouri Nair, Balaji Sivaramakrishnan, Harishkumar.
Department of Information Engineering University of Padova, ITALY A Soft QoS scheduling algorithm for Bluetooth piconets {andrea.zanella, daniele.miorandi,
Energy-Saving Scheduling in IEEE e Networks Chia-Yen Lin, and Hsi-Lu Chao Department of Computer Science National Chiao Tung University.
Data and Computer Communications Chapter 11 – Asynchronous Transfer Mode.
Competitive Queue Policies for Differentiated Services Seminar in Packet Networks1 Competitive Queue Policies for Differentiated Services William.
On Reducing Broadcast Redundancy in Wireless Ad Hoc Network Author: Wei Lou, Student Member, IEEE, and Jie Wu, Senior Member, IEEE From IEEE transactions.
An Energy-Efficient MAC Protocol for Wireless Sensor Networks Qingchun Ren and Qilian Liang Department of Electrical Engineering, University of Texas at.
Overload Prediction Based on Delay in Wireless OFDMA Systems E. O. Lucena, F. R. M. Lima, W. C. Freitas Jr and F. R. P. Cavalcanti Federal University of.
Efficient Peer-to-Peer Communications in Bluetooth YounSuk KIM, KyungHun JANG, KyunHyon TCHAH IEICE TRANS. COMMUN. speaker : jenchi.
A Fast Handoff Scheme For IP over Bluetooth Sang-Hsu Chung, Hyunsoo Yoon, and Jung-Wan Cho Department of Electrical Engineering & Computer Science Divison.
Multi-Power-Level Energy Saving Management for Passive Optical Networks Speaker: Chia-Chih Chien Advisor: Dr. Ho-Ting Wu Date: 2015/03/25 1.
Lectured By: Vivek Dimri Asst Professor CSE Deptt. SET.
An Energy Efficient MAC Protocol for Wireless LANs, E.-S. Jung and N.H. Vaidya, INFOCOM 2002, June 2002 吳豐州.
Doc.: IEEE /66r0 Submission March 2000 Nada Golmie, NISTSlide 1 IEEE P Working Group for Wireless Personal Area Networks WPAN Coexistence.
Bluetooth In 1994, the L. M. Ericsson company became interested in connecting its mobile phones to other devices without cables. A SIG (Special Interest.
A+MAC: A Streamlined Variable Duty-Cycle MAC Protocol for Wireless Sensor Networks 1 Sang Hoon Lee, 2 Byung Joon Park and 1 Lynn Choi 1 School of Electrical.
Bluetooth: Quality of Service Reference: “QoS based scheduling for incorporating variable rate coded voice in Bluetooth”; Chawla, S.; Saran, H.; Singh,
Turkmen Canli ± and Ashfaq Khokhar* Electrical and Computer Engineering Department ± Computer Science Department* The University of Illinois at Chicago.
Utilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks Shih-Hsien Yang, Hung-Wei Tseng, Eric Hsiao-Kuang Wu, and Gen-Huey Chen Computer.
A Pseudo Random Coordinated Scheduling Algorithm for Bluetooth Scatternets MobiHoc 2001.
An Energy Efficient Sleep Scheduling Considering QoS Diversity for IEEE e Wireless Networks Speaker: Wun-Cheng Li IEEE ICC 2010 Jen-Jee Chen, Jia-Ming.
Algorithms for Routing and Centralized Scheduling in IEEE Mesh Networks Harish Shetiya and Vinod Sharma Department of Electrical Communication Engineering.
DR-MPCP: Delayed REPORT message for MultiPoint Control Protocol in EPON Speaker: Chia-Chih Chien Advisor: Dr. Ho-Ting Wu Date: 2015/11/26 1.
1 TCOM 5143 Lecture 10 Centralized Networks: Time Delay and Cost Tradeoffs.
Bluetooth.
SERENA: SchEduling RoutEr Nodes Activity in wireless ad hoc and sensor networks Pascale Minet and Saoucene Mahfoudh INRIA, Rocquencourt Le Chesnay.
A Two-Tier Heterogeneous Mobile Ad Hoc Network Architecture and Its Load-Balance Routing Problem C.-F. Huang, H.-W. Lee, and Y.-C. Tseng Department of.
University of Padova Department of Information Engineering On the Optimal Topology of Bluetooth Piconets: Roles Swapping Algorithms Daniele Miorandi &
A Flexible Scatternet- wide scheduling Algorithm for Bluetooth Wensheng Zhang and Guohong Cao IPCCC 2002.
Courtesy Piggybacking: Supporting Differentiated Services in Multihop Mobile Ad Hoc Networks Wei LiuXiang Chen Yuguang Fang WING Dept. of ECE University.
Providing QoS in IP Networks
Shou-Chih Lo and Chia-Wei Tseng National Dong Hwa University A Novel Multi-channel MAC Protocol for Wireless Ad Hoc Networks VTC 2007-spring.
A Strategy to Compute the InfiniBand Arbitration Tables
SSN College of Engineering
Topics discussed in this section:
David S. L. Wei Joint Work with Alex Chia-Chun Hsu and C.-C. Jay Kuo
CT301 LECTURE 8.
Channel Control Interim substates for adding new slaves
Channel Allocation (MAC)
Wireless NETWORKS NET 434 Topic No 7 Bluetooth-IEEE802.15
Wireless NETWORKS NET 434 Topic No 7 Bluetooth-IEEE802.15
Analysis and Evaluation of a New MAC Protocol
Scheduling Algorithms in Broad-Band Wireless Networks
Qingwen Liu, Student Member, IEEE Xin Wang, Member, IEEE,
Bluetooth- L2CAP & Baseband Layer
Presentation transcript:

2003/03/14 An Efficient Link Polling Policy by Pattern Matching for Bluetooth Piconets Ting-Yu Lin, Yu-Chee Tseng, and Yuan-Ting Lu Department of Computer Science and Information Engineering National Chiao-Tung University National Central University Hawaii International Conference on System Sciences (HICSS’03) Speaker: Chung-Hsien Hsu

2003/03/14 Outline  Introduction  Preliminaries  The Pattern Matching Polling (PMP) Policy for one master-slave pair for one master-slave pair for multiple master-slave pairs for multiple master-slave pairs  Performance  Conclusions

2003/03/14 Introduction  Two physical links are supported in Bluetooth: ACL (Asynchronous ConnectionLess) ACL (Asynchronous ConnectionLess) For data traffic.For data traffic. Packets:Packets: DH1, DH3, DH5, DM1, DM3, DM5, AUX1. DH1, DH3, DH5, DM1, DM3, DM5, AUX1. SCO (Synchronous Connection Oriented) SCO (Synchronous Connection Oriented) For time-bounded voice communication.For time-bounded voice communication. Packets:Packets: HV1 (High-quality Voice) : carrying 10 information bytes. HV1 (High-quality Voice) : carrying 10 information bytes. HV2 : carrying 20 information bytes. HV2 : carrying 20 information bytes. HV3 : carrying 30 information bytes. HV3 : carrying 30 information bytes.

2003/03/14 Introduction (cont.)  [3] “MAC Scheduling Policies with Reduced Power Consumption and Bounded Packet Delay for Centrally Controlled TDD Wireless Networks”, (ICC’01) Proposing a learning function to predict the polling interval for each master-slave pair. Proposing a learning function to predict the polling interval for each master-slave pair. Advantage: Advantage: Bandwidth waste is reduced.Bandwidth waste is reduced. Saving energy.Saving energy. Bounded packet delay is guaranteed.Bounded packet delay is guaranteed. Drawback: Drawback: Learning function is pretty complex.Learning function is pretty complex. The cost of control messages could be significant.The cost of control messages could be significant.

2003/03/14 Introduction (cont.)  [2] “Efficient Polling Schemes for Bluetooth Picocells”, (ICC’01) Three polling schemes: Three polling schemes: Pure Round Robin (PRR)Pure Round Robin (PRR) A fixed serving order. A fixed serving order. Exhaustive Round Robin (ERR)Exhaustive Round Robin (ERR) A fixed serving order A fixed serving order Exhausting each master-slave pair’s payloads in both sides in each polling. Exhausting each master-slave pair’s payloads in both sides in each polling. Exhaustive Pseudo-cyclic Master queue length (EMP)Exhaustive Pseudo-cyclic Master queue length (EMP) Similar to ERR except. Similar to ERR except. Polling order is dynamically adjusted in each round based on the master’s queues for slaves. Polling order is dynamically adjusted in each round based on the master’s queues for slaves.

2003/03/14 Introduction (cont.)  [4] “Enhancing Performance of Asynchronous Data Traffic over the Bluetooth Wireless Ad-hoc Network”, (INFOCOM’01) Defining a flow bit for each master-slave pair. Defining a flow bit for each master-slave pair. Three polling strategies: Three polling strategies: Adaptive Flow-based Polling (AFP)Adaptive Flow-based Polling (AFP) Dynamically adjusts each slave’s polling interval based on the corresponding flow bit. Dynamically adjusts each slave’s polling interval based on the corresponding flow bit. Whenever the flow bit is 1, the polling interval is reduced to the minimum Whenever the flow bit is 1, the polling interval is reduced to the minimum Whenever a poll is replied by a NULL packet, the polling interval is doubled if a certain upper bound is not exceeded. Whenever a poll is replied by a NULL packet, the polling interval is doubled if a certain upper bound is not exceeded. Sticky PollingSticky Polling num_sticky : the maximum number of consecutive polls. num_sticky : the maximum number of consecutive polls. Under the condition that the corresponding flow bit is 1. Under the condition that the corresponding flow bit is 1. Sticky Adaptive Flow-based Polling (StickyAFP)Sticky Adaptive Flow-based Polling (StickyAFP)

2003/03/14 Introduction (cont.)  Deficiencies: They all fail to address the asymmetry of traffics between masters and slaves. They all fail to address the asymmetry of traffics between masters and slaves. The different packet types provided by Bluetooth are not fully exploited to match the traffic need. The different packet types provided by Bluetooth are not fully exploited to match the traffic need.  The ultimate foal of this proposing paper: To reduce the unfilled, or even null, payloads in each packet. To reduce the unfilled, or even null, payloads in each packet. The traffic asymmetry problem can be properly handled.The traffic asymmetry problem can be properly handled.

2003/03/14 Preliminaries  Bluetooth Data Packets  The ACL Link Polling Problem

2003/03/14 Preliminaries – Bluetooth Data Packets  Summary of Bluetooth ACL data packets. Bandwidth efficiency : DH5 > DH3 > DM5 > DM3 > AUX1 > DH1 > DM1

2003/03/14 Preliminaries – The ACL Link Polling Problem  Environment assumption: In a Piconet. In a Piconet. The average traffic arrival rates of each master-slave pair are known. The average traffic arrival rates of each master-slave pair are known. From history.From history. By approximation.By approximation.  Goal: To determine a good polling policy To determine a good polling policy To increase bandwidth efficiency while keeping delays low. To increase bandwidth efficiency while keeping delays low.

2003/03/14 Traffic loads TypeUser Payload (bytes) Bandwidth Efficiency (bytes/slot) DH DH DH 將 load 收集到接近 DH5 payload 所需的時間 單位 : slots 傳送的 DH5 packet 中所裝的資料量 In every slots, the master will poll the slave with DH5 packet. The slave returns bytes with a smallest possible packet of slots, where Bandwidth efficiency is = If 3 If 5 otherwise

2003/03/14 The Pattern Matching Polling (PMP) Policy  Basic idea Using different combinations of Bluetooth packet types to match the traffic characteristics of masters and slaves. Using different combinations of Bluetooth packet types to match the traffic characteristics of masters and slaves. Only DH1/DH3/DH5 will be used. Only DH1/DH3/DH5 will be used.

2003/03/14 The Pattern Matching Polling (PMP) Policy (cont.)  Symbol definition λ M : the traffic loads of master (unit: bytes/slot) λ M : the traffic loads of master (unit: bytes/slot) λ S : the traffic loads of slave (unit: bytes/slot) λ S : the traffic loads of slave (unit: bytes/slot) λ H : max{λ M, λ S } λ H : max{λ M, λ S } λ L : min{λ M, λ S } λ L : min{λ M, λ S } ρ : traffic ratio = λ H /λ L ρ : traffic ratio = λ H /λ L N H : the units with loads λ H N H : the units with loads λ H N L : the units with loads λ L N L : the units with loads λ L Polling Pattern : a sequence of packet types that will be Polling Pattern : a sequence of packet types that will be exchanged by a master-slave pair. exchanged by a master-slave pair.

2003/03/14 The Pattern Matching Polling (PMP) Policy (cont.)  A length-k pattern consists of two k-tuples: (H 1, H 2,…, H k ) : the packet types used by unit N H (H 1, H 2,…, H k ) : the packet types used by unit N H (L 1, L 2,…, L k ) : the packet types used by unit N L (L 1, L 2,…, L k ) : the packet types used by unit N L The sequence of packets (H 1, L 1, H 2, L 2, …, H k, L k ) The sequence of packets (H 1, L 1, H 2, L 2, …, H k, L k ) will be exchanged by N H and N L

2003/03/14 The Pattern Matching Polling (PMP) Policy (cont.) Master Slave λ M = 20 (bytes/slot) λ S = 2 (bytes/slot) λ H = max{λ M, λ S } = 20 λ L = min{λ M, λ S } = 2 ρ = λ H /λ L = 20/2 = 10 Assuming k = 1 H1H1 L1L1 339/183 DH5 DH3 16 slots

2003/03/14 The Pattern Matching Polling (PMP) Policy (cont.) Assuming k = 2 Master Slave DH5DH3 DH1

2003/03/14 The Pattern Matching Polling (PMP) Policy (cont.)

2003/03/14 The Pattern Matching Polling (PMP) Policy (cont.) The basic idea is to fill the payloads of all available packets as much as possible. 27 for i =1 183 for i =3 339 for i =5

2003/03/14 The Pattern Matching Polling (PMP) Policy (cont.)  Bandwidth efficiency

2003/03/14 Poling Policy for One Master-Slave Pair Step 1 : Initially, let t = 0 and i = 1 Step 2 : Define j = ((i-1) mod k ) + 1 The next polling is expected to appear Γ j times slots after t, where Step 3 : If j = k, then move t ahead by setting t = t + T, where Finally, let i = i + 1 and go to Step 2. ( until the master determines the traffic loads have changed.) Γ j = for j = 1, …, k -1 for j = k

2003/03/14 Assuming K = 3 The best pattern is (5, 3) for the master (1, 1) for the slave. Step 1. Initially, let t = 0 and i = 1 Step 2. j = ((i – 1) mod k ) + 1 = ((1-1) mod 2 ) + 1 = 1 Γ j = for j = 1, …, k -1 for j = k Γ 1 = 16 Step 3. i = i + 1 = 2 j = ((i – 1) mod k ) + 1 = ((2-1) mod 2 ) + 1 = 2 Γ j = for j = 1, …, k -1 for j = k Γ 2 = 26 about 23% batter than the “ naïve greedy policy ” !!

2003/03/14 Poling Policy for One Master-Slave Pair (cont.)  In practice, traffics may not be as regular as we expected, in some cases bursty traffic may appear. Defining an overflow bit to prevent buffer overloading. Defining an overflow bit to prevent buffer overloading. Whenever an entity finds it buffer reaching a threshold value,Whenever an entity finds it buffer reaching a threshold value, it set to TRUE. it set to TRUE. Entity will ignore the polling pattern and immediately sends out a DH5 packet to relieve its backlog.Entity will ignore the polling pattern and immediately sends out a DH5 packet to relieve its backlog.

2003/03/14 Poling Policy for One Master-Slave Pair (cont.)  Assuming the buffer status is checked whenever an entity is scheduled to transmit data.  The overflow bit will be piggybacked in the DH5 packets to inform the other entity.  When seeing overflow = 1 The entity does not have the overflow situation also stops its pre- defined pattern. The entity does not have the overflow situation also stops its pre- defined pattern. Selecting a packet type that can cover as many queued data as possible. Selecting a packet type that can cover as many queued data as possible.

2003/03/14 Poling Policy for Multiple Master- Slave Pairs  The master should place all polling activities in a time line and conduct polling one by one.  The rules of polling priorities: For two overlapping polling activities: For two overlapping polling activities: Comparing their leading slots.Comparing their leading slots. When the leading slots are the same: When the leading slots are the same: The last polling in a polling pattern has a higher priority.The last polling in a polling pattern has a higher priority. If case of ties in both of the above rules: If case of ties in both of the above rules: Comparing their AM_ADDRs.Comparing their AM_ADDRs.

2003/03/14 Performance  Two measurement metrics are evaluated: Bandwidth efficiency. Bandwidth efficiency. Average delay time. Average delay time.  Evaluation: The master keeps separate buffers for slaves. The master keeps separate buffers for slaves. Buffer size : 2048 bytes Buffer size : 2048 bytes Buffer threshold : 80% Buffer threshold : 80% Each experiment lasts for 80,000 time slots. Each experiment lasts for 80,000 time slots. The bursty traffic occurs in average every 3000 slots. The bursty traffic occurs in average every 3000 slots. Instant increase of 2048 * 0.8 = 1638 bytes to a buffer. Instant increase of 2048 * 0.8 = 1638 bytes to a buffer.

2003/03/14 Performance (cont.)  Three other policies are compared: NGP ( Naïve Greedy Protocol ) NGP ( Naïve Greedy Protocol ) ERR ( Exhaustive Round Robin ) ERR ( Exhaustive Round Robin ) StickyAFP ( Sticky Adaptive Flow-based Polling) StickyAFP ( Sticky Adaptive Flow-based Polling) The initial polling interval P 0 = 14 (slots).The initial polling interval P 0 = 14 (slots). The maximum allowable polling interval P max = 56 (slots).The maximum allowable polling interval P max = 56 (slots). The flow bit is set to TRUE whenever the buffer exceeds 80%.The flow bit is set to TRUE whenever the buffer exceeds 80%. The parameter num_sticky = 16 packets.The parameter num_sticky = 16 packets.

2003/03/14

Performance (cont.)  Simulating seven slaves in a piconet.  Arrival rate: λ H1 /λ L1 = 2 λ H1 /λ L1 = 2 λ H2 /λ L2 = 4 λ H2 /λ L2 = 4 λ H3 /λ L3 = 6 λ H3 /λ L3 = 6 λ H4 /λ L4 = 8 λ H4 /λ L4 = 8 λ H5 /λ L5 = 10 λ H5 /λ L5 = 10 λ H6 /λ L6 = 12 λ H6 /λ L6 = 12 λ H7 /λ L7 = 14 λ H7 /λ L7 = 14 λ: the total piconet traffic load

2003/03/14

Conclusions  Proposing an efficient PMP policy for ACL connections in a Bluetooth piconet.  The master judiciously selects a polling pattern that can best utilize the network bandwidth.  The PMP policy has properly addressed th asymmetry of up- and down-link traffics and the various packet types of Bluetooth are fully exploited.  A pattern length of K=3 or 4 can already perform very well.