Documente Academic
Documente Profesional
Documente Cultură
net/publication/225131180
CITATIONS READS
44 643
3 authors:
Enrico Gregori
Italian National Research Council
135 PUBLICATIONS 4,313 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Raffaele Bruno on 24 November 2015.
Abstract. The paper focuses on one of the emerging technologies for constructing a Mobile ad hoc network: Bluetooth. Bluetooth can be
exploited on small scales, to build ad hoc wireless Personal Area Networks (WPAN), i.e., networks that connect devices placed inside a
circle with radius of 10 m. The Bluetooth technology is just starting to appear on the market and its architecture and protocols are not widely
known. For this reason, the first part of the paper contains a tutorial-oriented description of the Bluetooth architecture and protocols. In
addition, in the paper we extensively discuss the performance of this technology by investigating, through simulation, the main performance
figures: the protocol efficiency (channel utilization), the response time, and the system power (i.e., the ratio between throughput and delay).
Specifically, the performance analysis focuses on the algorithms for scheduling the transmissions in a Bluetooth network. The Bluetooth
Specification indicates a Round Robin scheduler as possible solution, that is each slaves is polled in a consecutive order. For this reason,
we first study in depth the performance figures of a Bluetooth network with a Round Robin scheduler. Our results point out the inefficient
Bluetooth behavior under asymmetric traffic conditions. To solve this problem we propose and analyze an innovative scheduling algorithm
specifically tailored to the Bluetooth characteristic. This algorithm, named efficient double-cycle (EDC), dynamically adapts the polling
frequency to the traffic conditions. A performance study indicates that our EDC scheduler always outperforms the Round Robin scheduler.
Keywords: wireless PANs, ad hoc networks, MAC protocol, scheduling, performance evaluation
This coordination is achieved by means of control informa- Bluetooth devices adopt the 48-bit addressing scheme de-
tion that is carried explicitly by control messages traveling fined by the IEEE 802 standard. From a logical standpoint,
along the medium. Specifically, the Bluetooth MAC behaves Bluetooth belongs to the contention-free token-based multi-
as a polling system [8]. Hence, the MAC protocol schedul- access networks. In a Bluetooth network, one station has the
ing algorithm by determining the order in which stations are role of master and all other Bluetooth stations are slaves. The
polled, is the main element to determine the network effi- master decides which slave is the one to have the access to
ciency. The Bluetooth Specification indicates a Round Robin the channel. More precisely, a slave is authorized to deliver
scheduler as a possible solution, i.e., each slave is polled in a a single packet to the master only if it has received a polling
consecutive order. However our performance studies, with a message from the master. The units that share the same chan-
Round Robin scheduler, indicate an inefficient Bluetooth be- nel (i.e., are synchronized to the same master) form a piconet,
havior when the traffic in the network is asymmetric. The the fundamental building block of a Bluetooth network. A pi-
original contribution of this paper is the proposal and eval- conet has a gross bit rate of 1 Mbps that represents the chan-
uation of an efficient scheduling algorithm named Efficient nel capacity before considering the overhead introduced by
Double-Cycle (EDC). Our algorithm preserves the fairness the adopted protocols and polling scheme.
typical of a Round Robin scheme but reduces the polling A piconet contains a master station and up to seven active
overheads. This is achieved by tuning the polling order to (i.e., participating in data exchange) slaves contemporarily.
the network traffic conditions to limit the channel-bandwidth Independent piconets with overlapping coverage areas form a
wastage caused by the polling of empty stations. A perfor- scatternet when at least a unit participates to data exchange
mance study indicates that our EDC scheduler outperforms in more than one piconet. It is worth pointing out that a unit
the Round Robin scheduler. Specifically, we show that our can be active in more than one piconet, but can be master into
algorithm (when compared with Round Robin) increases the only one. A slave may communicate with different piconets
network efficiency and at the same time reduces the user re- only in a time-multiplexing mode. This means that, for any
sponse time. time instant, it can only transmit on a single piconet because it
The design of a scheduler suitable for the Bluetooth MAC has to change its synchronization parameters before listening
layer was also considered by Johansson et al. that propose to different channels.
a Fair Exhaustive Polling (FEP) [14]. Similarly to our al-
gorithm, FEP tries to avoid the polling of inactive stations. 2.1. The Bluetooth architecture
Specifically, they define the meaning of active and inactive
state for the slaves, and introduce polling sub cycles where The main aim of the Bluetooth Specification is to guarantee
only the active slaves are polled in a Round Robin fashion. the interoperability between different applications by support-
Our algorithm further extends this idea (i) by separating the ing any kind of service and providing the mean to imple-
scheduling of the uplink and downlink transmissions, and ment them (service discovery, connection oriented, connec-
(ii) by adopting a truncated binary exponential-backoff algo- tion less links). This is achievable only if a common Blue-
rithm to determine the amount of time an inactive slave is tooth data link and physical layer is used. As we can see
removed from the polling cycle. in figure 1, the complete protocol stack contains a Bluetooth
The paper is organized as follows. Section 2 introduces core of Bluetooth-specific protocols (dark green protocols in
the Bluetooth technology. In particular we concentrates on the figure) and non-Bluetooth-specific protocols.
physical and data link layers. Then, section 3 presents a com- The Bluetooth core protocols comprise exclusively Blue-
plete performance analysis for a Bluetooth piconet adopting tooth-specific protocols. In the next subsections we describe
a Round Robin polling scheme for the channel access. In in details the Bluetooth Baseband and Radio layers. The radio
section 4 we propose and evaluate our scheduling algorithm. layer provides the physical links among Bluetooth devices,
Concluding remarks are summarized in section 5. while the Baseband layer provides a transport service of pack-
ets on the physical link. This service is exploited by the other
Bluetooth data link layer protocol, i.e., the L2CAP, to permit
2. Bluetooth technology architecture and protocols
Repeat Request (ARQ) scheme is adopted to assure data in- and identification. In particular, after a physical link is estab-
tegrity. lished, it is identified through a Channel Access Code (CAC)
Channel access. As stated before, the channel access is that is derived from the master clock and its Bluetooth de-
managed according to a polling scheme. The master decides vice address. The CAC permits the devices to identify pack-
which slave is the only one to have the access to the channel ets coming from a piconet which they don’t belong to. The
by sending to him a packet. The master packet may contain header integrity is doubly protected. Firstly, a HEC is intro-
data or can simply be a polling packet. When the slave re- duced, and then the total header is encoded with a rate 1/3
ceives a packet from the master it is authorized to transmit FEC.
in the next time slot. For SCO links the master periodically The AM_ADDR, that is the address, is 3-bit long, and
polls the corresponding slave. Polling is asynchronous for hence it is possible to have only seven active slaves (the all
ACL links. zero sequence is a broadcast address). The ARQN and SEQN
Figure 3 presents a possible pattern of transmissions in a bits are used for the ARQ scheme and are meaningful only
piconet with a master and two slaves. Slave1 has both a SCO for ACL packets. The different kinds of packets, i.e., con-
(dark-gray packets) and an ACL (light-gray packets) link with trol packets, ACL packets and SCO packets, are distinguished
the master, while Slave2 has an ACL link only (medium-gray through the TYPE bits.
packets). In this example the SCO link is periodically polled The SCO packets, denoted by HVy, are never retransmit-
by the master every six slots, while ACL links are polled asyn- ted and the payload isn’t protected by a CRC. The subscript
chronously. Furthermore, the size of the packets on an ACL y indicates how many SCO connections may be concurrently
link is constrained by the presence of SCO links. For ex- active. In addition, to these three pure SCO packets, a DV
ample, in the figure the master sends a multi-slot packet to packet is defined which can carry asynchronous data but is
Slave2, which, in turn, can reply with a single-slot packet still recognized on SCO links.
only, because the successive slots are reserved for the SCO The ACL packets are of two different groups, one denoted
link. DMx and the other one denoted DHx. The former has a pay-
The general format of Bluetooth packets is shown in fig- load encoded with a rate 2/3 FEC and the latter hasn’t got a
ure 4. As we can observe three main parts characterize the FEC encoding. The subscript x stands for the number of slots
packet. The Access Code (AC) is used for synchronization that are necessary to transmit the packet. All ACL packets
have a CRC field for checking the payload integrity. ACL
packets have also a payload-header and a payload-CRC field.
The payload header is one or two bytes long, depending on
packet type, and it specifies: (i) the logical channel (i.e., if
the packet is a LMP message, or the start of an L2CAP mes-
sage, or the continuation fragment of an L2CAP message),
(ii) the user payload length, and (iii) the flow control on the
logical channels. Tables 1 and 2 summarize SCO and ACL
Figure 3. Packet transmissions on SCO and ACL links.
packet characteristics, respectively. In addition, the tables re-
port, assuming a piconet with two only devices, the maximum
Table 1
SCO packets.
Figure 4. Bluetooth packet structure (fields’ length in bits). a Items followed by “D” relate to data field only.
Table 2
ACL packets.
Type User payload FEC CRC Symmetric max rate Asymmetric max rate (kbps)
(bytes) (kbps) Forward Reverse
channel throughput for symmetric and asymmetric communi- finite size BS and the queued packets are served according to a
cations. FCFS policy. Large L2CAP packets must be segmented into
smaller Baseband packets before their transmission. A new
2.1.3. Baseband routines for the ad hoc networking L2CAP packet cannot be served till all fragments (generated
The Bluetooth technology has been devised for providing a during the segmentation) of the previous L2CAP packet have
flexible wireless connectivity among digital devices. Before been successfully transmitted. The segmentation procedure
starting a data transmission a Bluetooth unit needs to discover is accomplished, just before the transmission, in such a way
if any other Bluetooth unit is in its operating space. To do to generate the minimum number of Baseband packets. In
this, a Bluetooth unit enters the inquiry state. In this state, particular let be xL2CAP the number of bytes to be sent, then
it continuously sends an inquiry message, i.e., a packet with a new DHx packet will be created with a user payload UP,
only the access code. A station responds to the inquiry by according to the following procedure:
exploiting a random access protocol.
xL2CAP 27 ⇒ DH1 with UP = xL2CAP,
After an inquiry, a Bluetooth unit has discovered the Blue-
tooth addresses of the other Bluetooth units located in its radio 27 < xL2CAP 183 ⇒ DH3 with UP = xL2CAP , (1)
coverage area, and has collected an estimation of their clocks. xL2CAP > 183 ⇒ DH5 with UP = min{xL2CAP, 339}.
If it wants to activate a new connection it has to distribute its
own Bluetooth device address and clock, and this is the aim of Within the master N local transmission queues are imple-
paging routines. The unit that starts paging is automatically mented, where N is the number of active slaves. Each master
elected the master of the new connection, and the paged unit local queue has a finite size BM and the queued packets are
is the slave. served according to a FCFS policy. When an L2CAP packet
When a connection is established, the active slaves have is completely received by the master, the master accomplishes
to maintain the synchronization. This is carried out by ac- the reassembly procedure, then it extracts the encapsulated IP
tive slaves simply listening to the channel at every master-to- packet and forms a new L2CAP packet for the slave that is
slave slot because only the CAC is necessary and every kind the destination of that IP traffic. The master puts the new
of packets is usable for this purpose. Further details about the L2CAP packet in the local queue reserved to the slave that is
ad hoc networking features for the Bluetooth technology, can the destination of that packet. In the transmission phase the
be found in [2]. master behaves in the same way of slaves. The master and the
slaves transmit the ACL packets according to the Bluetooth
transmission scheme described in the previous sections.
3. Performance evaluation of Bluetooth The slave to be polled by the master is selected by the
scheduling algorithm. The Bluetooth Specification indicates
The maximum asymmetric throughput of 723.2 kbps reported as possible solution the Round Robin polling algorithm:
in table 2 is only a reference value. The real through- slaves are polled in a cyclic order. In our simulator we have
put depends on many factors, e.g., flow-control mechanisms implemented both the Round Robin polling algorithm and the
adopted by upper layers (preliminary results can be found in Efficient Double-Cycle (EDC) algorithm that is explained in
[15,16]), characteristics of ingoing traffic, segmentation over- section 4.
head introduced by each layer, and so on. The main target of
this work is not to analyze the interaction of the Bluetooth 3.2. Traffic characterization
technology with transport mechanisms of upper layer pro-
tocols, but to evaluate the Bluetooth Baseband layer perfor- A realistic characterization of the traffic in a PAN is quite
mances in a WPAN environment where several point-to-point difficult due to the lack of an exact knowledge of the future
connections are established. applications based upon the Bluetooth technology. What we
Hereafter, the performance evaluation of Bluetooth has have modeled is the distribution of the traffic among the slaves
been carried out by simulation. Results presented in this sec- in a piconet, rather than the correlation between the arrival
tion have been obtained by applying the independent replica- times of consecutive packets. The ability to effectively react
tion technique with a 90% confidence level. In the following to various traffic distributions among slaves is one of the most
sections we will describe the network and traffic models, and important features of a scheduling algorithm in an highly dy-
the performance indices. namic scenario like a Bluetooth piconet.
We have modeled the intra-piconet communications, i.e.,
3.1. The piconet model no traffic comes (goes) from (to) the outside of the piconet.
Each slave is a source of IP packets and the interarrival
The simulated network topology is constituted by a single times between consecutive packet generations are exponen-
piconet with a master and six slaves. Each slave has an IP tially distributed, hence the IP packet arrival process is Pois-
packet generator. When an IP packet is created (according to sonian. The packet length is uniformly distributed in the
a specific arrival process) by the slave, it is encapsulated into range from 500 to 1500 bytes.
an L2CAP packet that adds the 4-byte L2CAP header, and it Let us introduce some notation adopted hereafter. For each
is sent to the local transmission queue. This local queue has a slave Si , i = 1, . . . , N, we denote with γUPi the average of-
122 BRUNO, CONTI AND GREGORI
Table 3
fered load of Si towards the master, and with γDW i the average
Description of traffic scenarios.
offered load of the master towards Si . We will refer to the ag-
gregated offered load from all slaves towards the master with Symmetric case Asymmetric case
OLUP , and we will refer to the aggregated offered load from Uplink loads distribution
the master towards all slaves with OLDW . Since we have con- x T = [1/N, . . . , 1/N ] x T = [0.9, 0.1/(N − 1), . . . , 0.1/(N − 1)]
sidered only a closed piconet, i.e., all the traffic is generated
Addressing matrix
by the slaves, we have OLUP = OLDW . If we indicate with
pij = 1/(N − 1) pij = 1/(N − 1)
x(i) the fraction of OLUP that is generated by Si , then we
have:
N 3.3. Performance indices
γUPi = x(i) · OLUP , x(i) = 1, i = 1, . . . , N.
i=1 One of the performance indices we use to evaluate the effi-
Furthermore, if we indicate with pij the fraction of ongoing ciency of the MAC protocol is the channel utilization, which
traffic from Si that is addressed to Sj , and by noting that Si is defined as the fraction of channel bandwidth used by suc-
cannot send traffic towards itself, we have: cessfully transmitted messages. This fraction is known as the
utilization of the channel, and the maximum value it can at-
N
N
tain is known as the capacity of the MAC protocol [7,8]. It is
γDW i = pj i γUPj , pii = 0, pij = 1, worth noting that by multiplying the capacity and the channel
j =1 j =1 speed we obtain the network maximum throughput. For this
i = 1, . . . , N. reason in the following we refer to the throughput figures to
measure the protocol efficiency.
Now we can easily define a vectorial notation by introducing
The capacity is used to evaluate the efficiency of MAC pro-
the following quantities:
tocol algorithms, however from the user standpoint other per-
– vectors of uplink loads and downlink loads as: formance figures are needed to measure the Quality of Service
(QoS). The most commonly used performance measure is the
T
γUP = [γUP1 . . . γUPN ], T
γDW = [γDW1 . . . γDWN ]; delay, which can be defined in several forms [5,8] depending
on the time instants considered during its measurement (ac-
– vector of uplink loads distribution and addressing matrix
cess delay, queuing delay, propagation delay, etc.). In com-
as:
puter networks the response time, defined as the time between
x T = x(1) . . . x(2) , P = {pij }. the generation of a message at the sending station and its re-
ception at the destination station, is the best figure to measure
By exploiting this compact notation, the distribution of on- the QoS perceived by the users. However, it depends on the
going traffic from the slaves and ingoing traffic towards the amount of buffering inside the network and it is not always
slaves is exhaustively described by the following expressions: meaningful to evaluate a shared-medium technology. For ex-
γUP = OLUP x, γDW = PT γUP . ample, during congested periods, the buffers fill up and the
response time does not depend on the network technology but
Each different couple of addressing matrix and vector of up- it is just a function of the buffer length. For this reason, in
link loads distribution will correspond to different profiles for this paper, we also estimate the MAC delay. The MAC delay
the uplink and downlink loads. In the section related to the of a station in a LAN is the time between the instant at which
performance analysis we have considered two different sce- a packet comes to the head of the station transmission queue
narios that can be recognized as representative of completely and the end of the packet transmission [8].
different applications. The first scenario has been called Sym- The two main indices we have identified, throughput and
metric Case because all slaves produces the same amount of response time, cannot be both maximized at the same time.
traffic, and distribute their ongoing traffic uniformly among We can try to increase as much as possible the throughput in
all possible destinations. The second scenario has been called order to maximize the bandwidth utilization, but it would be
Asymmetric Case because a single station produced the 90% also reasonable to decrease the response time in order to im-
of OLUP . As in the symmetric case, the slave-generated traffic prove the promptness of the transmission service perceived
is uniformly spread among all possible destinations. by the users. These two different targets are competing each
We believe that the symmetric case models a typical coop- other: an increase in the system utilization deteriorates the
erative application were each participant has the same role response time. A single combined measure of these two per-
(e.g., during multicasting video-streaming), and the asym- formance indexes is the power that is defined as the ratio be-
metric case models an application that operates in a typical tween the throughput and the response time of the system [9].
server-client fashion (e.g., during information retrieval). Ta- The power can be considered a nice criterion for the evalua-
ble 3 summarizes the vector components of uplink loads dis- tion of scheduling algorithms because its maximum value is a
tribution and the addressing matrix elements that correspond trade-off between promptness and efficiency. In the following
to the previous described scenarios. we will formalize the power concept for a Bluetooth piconet.
BLUETOOTH 123
Let us now introduce some notations. We define as it should avoid treating unfairly slaves with small amounts of
MACUPi and MACDW i the average MAC delay experienced traffic with respect to heavily-loaded slaves.
by the IP packets that traverse the link from Si to the mas-
ter, and from the master to Si , respectively. In particular the 3.4. Numerical results
power PUPi is associated to the link from Si to the master, and
the power PDW i is associated to the link from the master to Si . The performance evaluation of Round Robin polling algo-
PUPi and PDW i have the following definitions: rithm has been carried out by simulations in which we assume
γUPi γDW i an ideal channel with no transmission errors. This assump-
PUPi = , PDW i = . (2) tion has been done in order to analyze the protocol in ideal
MACUPi MACDW i
conditions and to highlight the constraints due to the adopted
Equations (2) define the power index for a link analyzed in transmission scheme. Within each simulation we have uti-
isolation. The definition of a power index that expresses the lized the DH type for ACL packets, and the buffer sizes are
behavior of the overall piconet requires the introduction of the BS = 15000 bytes and BM = 15000 bytes. The use of buffers
average aggregate throughput γ and of an average delay D of with a finite size is necessary to perform correct simulations
the system. In fact we can consider the following definition of steady state even in overload conditions.
for the system power: By exploiting (1), given an IP packet of length k, it is pos-
γ sible to determine the set (k) of ACL packets that are gener-
PSystem = , (3) ated by its segmentation. We indicate with Nx(k) the number of
D (k)
(k) packets of type DHx , and with τIP the time (expressed
where γ is equal to the sum of and γDW i , with i = 1, . . . , N. as a number of time slots) the channel is used to transmit an
The choice of D leaves some degree of freedom as different (k)
IP packet. Hence, τIP has the following expression:
definitions for D may highlight different aspects of the sys-
(k)
tem. The simplest choice for D is to consider the average τIP = x · Nx(k) .
system response time τ . It is worth noting that τ corresponds x∈{1,3,5}
to the average end-to-end delay experienced by IP packets. In
this case, equation (3) can be written as: Finally, to determine the number of time slots to transmit
N an IP packet, τIP , we need to select the IP packet-length
[γUPi + γDW i ] distribution. For example, in figure 5 we have plotted the
P1 = i=1 .
τ Pr{τIP = m}, i.e., the probability mass function of τIP , for
an IP packet-length uniformly distributed in the range from
P1 provides a criteria to analyze the system performance
500to 1500 bytes. The mean value of τIP , say τ̄IP , is equal
from the user standpoint as the delay added to its data-packet
to m m Pr{τIP = m}. In the considered case, we have
stream is the most important figure for the single user. More-
τ̄IP = 15.998 time slots.
over, we want to evaluate the effectiveness of scheduling al-
The maximum values of aggregate throughput, γMAX , and
gorithms that operate at the Baseband layer. So we introduce
MAC (i.e., average aggregate MAC delay) are obviously ob-
a second definition for the power. In this second case D is the
tained in the asymptotic condition, i.e., when there is always a
weighted sum of MACUPi and MACDW i , where the weights
queued packet in the master and in the slaves local queues. In
are the fraction of total bandwidth used by each link, that is:
this case no NULL packets are sent and the channel is com-
pletely loaded.
1
N
D= [γUPi MACUPi + γDW i MACDW i ]. (4)
γ
i=1
Proof. The maximum value of MAC is obtained when all slaves E[Fi ] = E[F ] where E[F ] is the average length of a
slaves and the master queues always contain at least a packet fragment. Hence,
ready for transmission. In this case, given a tagged queue,
say i, and by denoting with MACi,m the MAC delay of the MACi = 2N · E[F ] · E[]. (L.6)
mth IP packet transmitted from queue i, and with MACi the Finally, by applying the same type of reasoning we used to
average MAC delay of queue i, it follows that derive (L.4) from (L.1) we can show that E[F ]·E[] = τ̄IP ·ts
MACi,1 + MACi,2 + · · · + MACi,h and hence the lemma is proved.
MAC = MACi = lim .
h→∞ h
(L.1) By applying, the Lemma 1 in our case study with N = 6
Now we note that active slaves we have:
where m is the number of fragments required to transmit the It is worth noting that these analytical results derived for a
mth IP packet, and Cj(i,m) is the polling cycle during which is completely loaded piconet (i.e., a piconet where there is al-
transmitted the j th fragment of the mth IP packet. Hence, ways at least a packet waiting to be transmitted in all the
slaves’ and master’s queues) are confirmed by the following
MACi = lim C1(i,1) + C2(i,1) + · · · + C (i,1)
1
+ C1(i,2) simulative analysis.
h→∞ In figure 6 we plot the aggregate throughput that is achiev-
(i,2) (i,2) (i,h)
+ C2 + · · · + C2 + · · · + C1 able in the symmetric and asymmetric case. It is known that
(i,h)
the Round Robin polling algorithm is the best policy when the
+ C2(i,h) + · · · + C h
h . (L.3) system is symmetric and completely loaded, and the plotted
curves confirm that. However, it is also clear that the Round
Let us now divide the numerator and the denominator of (L.3) Robin polling algorithm is very inefficient under asymmet-
by n, where n is the number of polling cycles required to ric condition because the master continues to poll slaves that
transmit the h IP packets. Hence, (L.3) becomes have no traffic to send, and this behavior implies a bandwidth
MACi = E[C] · E[], (L.4) wastage. In the asymmetric scenario the Slave1 local queue
saturates, i.e., there are packet losses due to buffer overflow,
where E[C] is the average length of a polling cycle and E[] when the offered load is equal to 400 kbps. By increasing the
is the average number of fragments in which an IP packet is OL beyond 400 kbps, the throughput performance increases
segmented, or, in other words, the average number of polling very slowly.
cycles required to transmit an IP packet. In figures 7(a) and (b) we plot the MAC measured in
2N the symmetric and asymmetric case, respectively. Moreover
in figure 7(b) we plot also the MACUP for Slave1 (heavily
E[C] = E Fi = 2N · E[Fi ], (L.5)
loaded) and Slave2 (lightly loaded). We can notice that in
i=1
the symmetric case, when the OL is equal to the maximum
where Fi is the length of a fragment transmitted from queue i throughput, the MAC reaches its maximum value. It could
and 2N is the number of queues in our piconet with N active appear erroneous that the MAC decreases when the piconet is
slaves. As the IP packet-length distribution is the same for all heavily loaded, but this is a side effect of the finite buffer size.
BLUETOOTH 125
(a) (a)
(b) (b)
Figure 7. MAC delay performance of a piconet (a) symmetric case and Figure 8. End-to-end delay performance in a piconet (a) symmetric case and
(b) asymmetric case. (b) asymmetric case.
In fact, when the piconet is heavy loaded the local queues are tively. Moreover, in figure 8(b) we plot also the end-to-end
saturated and the probability to discard long packets is higher delay for IP packets generated by Slave1 (heavily loaded) and
than the probability to discard short packets. This means that Slave2 (lightly loaded). We can notice that the end-to-end
the average length of queued packets decreases, hence even delay increases together with the offered load, due to the in-
the MAC decreases (in the symmetric case, with an OL that crease in the number of queued packets. The end-to-end delay
is two times γMAX , we have measured an average length of for Slave1 is significantly higher than the one for Slave2 be-
queued packets equal to 850 bytes). cause in the Slave2 local queue there are few packets than in
In the asymmetric case the MAC curve shows a flat slope the Slave1 local queue.
for OL grater than 400 kbps because the throughput in- To summarize this set of numerical results in figures 9(a)
creases very slowly. Moreover, the MACUP1 is lower than the and (b) we plot P1 and P2 , respectively. The P1 curves present
MACUP2 . This is due to the fact that, during the transmission a maximum that corresponds to the optimal operating point
of an IP packet generated in a lightly loaded slave, it is high from the P1 -index standpoint. We can observe that in the
the probability to have a contemporary transmission of an IP asymmetric case the optimal condition is reached for a lower
packet generated in the heavily loaded slave. On the other offered load than the symmetric case. Moreover, the P1 curve
hand, during the transmission of an IP packet generated in in the asymmetric case is above the P1 curve in symmetric
heavily loaded slave, the probability to have a contemporary case only for heavily loaded piconet.
transmission on an IP packet generated in a lightly loaded The P2 curves show a different behavior. In particular,
slave is very small. The average aggregate MAC, MAC, is we can observe that in the symmetric case a maximum for
lower than MACUP1 and MACUP2 . This happens because the power still exists, and it is reached for an OL equal to
MAC is computed taking into consideration also the transmis- 400 kbps, whereas in the asymmetric case the P2 curve is
sions on the downlink and MAC delays in the downlink are a growing function. We believe that this behavior is due to
lower than the MAC delays in the uplink. the inefficiency of Round Robin algorithm for the asymmet-
In figures 8(a) and (b) we plot the average end-to-end de- ric scenario that implies piconet is very far from optimum op-
lay measured in the symmetric and asymmetric case, respec- erating point with respect to the P2 -index standpoint. This
126 BRUNO, CONTI AND GREGORI
70. Empty_Cycle: 4.2. Numerical comparison between Round Robin and EDC
71. next = (next + 1)MOD N ;
72. Cycle_End = TRUE; In this section we report the numerical results obtained with
73 exit EDC in the same set of simulations performed in section 3.4.
By exploiting these numerical results we will point out the
The master polls the next slave [line 71]. Cycle_End is performance enhancement achieved by EDC, with respect to
settled TRUE [line 72] in order to execute an update of E(Dw) the performance indices introduced in section 3.3. During all
and E(Up) at the beginning of next cycle. simulations we have assumed wMAX = 32.
At the end of each Sk ’s packet reception, the master up- In figures 10(a) and (b) we plot the aggregate throughput
dates its polling interval ck and its polling window wk with achieved by the Round Robin algorithm and EDC in the sym-
the following procedure: metric and asymmetric case, respectively. We can observe
that in the symmetric case EDC behaves exactly as the Round
74. if (<payload>==NULL) Robin algorithm from a throughput standpoint. Instead in the
then wk = min{wMAX , (2 × wk )}; asymmetric case EDC is much better than the Round Robin
75. else wk = 1; algorithm because it reduces the number of NULL messages
76. ck = wk ; received by the master from the lightly loaded slaves.
77. end In figures 11(a) and (b) we plot the MAC achieved by the
Round Robin algorithm and EDC in the symmetric and asym-
If Sk sends a packet with a null payload, then its polling win- metric case, respectively. In the symmetric case, EDC be-
dow wk is doubled till a maximum value wMAX is reached; haves exactly as the Round Robin algorithm only if the pi-
otherwise wk is settled to be 1. The polling interval ck takes conet is heavy loaded, because in this case with probability
the wk value. one we always have a packet in the master and slaves’ local
(a) (b)
Figure 10. Aggregate throughput comparison (a) symmetric case and (b) asymmetric case.
(a) (b)
Figure 11. Aggregate MAC delay comparison (a) symmetric case and (b) asymmetric case.
BLUETOOTH 129
queues. When the piconet is lightly loaded EDC overcomes differences between the polling frequency of the slaves in the
the Round Robin algorithm due to the dynamic adaptation downlink direction, how we can observe in figure 12(b). It is
of the slaves’ polling-frequency to the slaves activity. In the worth noting that MACDW i is halved for all slaves.
asymmetric case, the EDC efficiency is evident. We can ob- The increase in the MAC delay experienced by the traffic
serve a halving of the aggregate MAC delay measured in the generated in the lightly loaded slaves does not imply a de-
piconet. crease in the transmission service perceived by the users. This
The dynamic behavior of a polling system is quite com- is clearly shown by the performance figures based on the end-
plex, and to better understand it in figures 12(a) and (b) we to-end delay. In particular in figures 13(a) and (b) we plot
plot the MAC delay measured in the uplink and downlink for the average end-to-end delay achieved by the Round Robin
the Slave1 (heavily loaded) and Slave2 (lightly loaded), re- algorithm and EDC in the symmetric and asymmetric case,
spectively. It is worth noting that the station MAC delay can respectively. We have adopted a logarithmic scale for the y-
be viewed as the speed at which the master serves the slave’s axis to highlight the improvement achieved with EDC both in
local transmission queue. the lightly loaded piconet (i.e., with small end-to-end delay)
From figure 12(a) we observe that EDC is able to adapt and in the heavily loaded piconet (i.e., with high end-to-end
to the different rates of the slaves’ packet generators. On av- delay). These results point out that the improvement in the
erage, Slave1 produces a traffic load nine times greater than aggregate throughput is not achieved by means of worsening
Slave2, hence EDC makes a significant difference between the delay performances perceived by users, but by using more
the polling frequency allotted to slaves in the uplink direc- efficiently the channel bandwidth. We can observe that, in
tion. As the ongoing traffic from the master is distributed the symmetric case, the end-to-end delay achieved with EDC
quite uniformly among all slaves, EDC makes no significant is lower than the one achieved with the Round Robin algo-
(a) (b)
Figure 12. Slaves’ MAC delay comparison (a) uplink and (b) downlink.
(a) (b)
Figure 13. End-to-end delay comparison (a) symmetric case and (b) asymmetric case.
130 BRUNO, CONTI AND GREGORI
(a) (b)
Figure 14. Power performance comparison (a) P1 vs. offered load and (b) P2 vs. offered load.
rithm even when the piconet is heavily loaded. We can ex- Results obtained are very promising but several research
plain this phenomenon by considering the probability to have issues need to be further investigated. Specifically we are
an empty local queue in the master. In particular, when OL is currently working in two main directions: optimal scheduler,
equal to 120% of γMAX , by applying the Round Robin and the TCP over Bluetooth.
EDC algorithms, the master local queue reserved for trans- In this paper we have shown that EDC is a promising di-
missions towards Slave1 is empty with probability 0.06394 rection for improving the efficiency of a Bluetooth network.
and 0.10017, respectively. However, EDC has been designed by adopting only a heuris-
We summarize this wide set of results by considering the tic criterion, i.e., reducing the number of polling attempts that
power indices. In figures 14(a) and (b) we plot P1 and P2 , do not produce useful transmissions. What we are now look-
respectively. We observe that, by adopting EDC, when OL is ing for is a criterion that formally identifies the optimal per-
lower then γMAX , the P1 curves for the symmetric and asym- formance that can be achieved for a given traffic characteriza-
metric scenarios are overlapping. This means that the trans- tion. More precisely we are working on analytical models to
mission service offered by the MAC layer it is the same, no identify, given a traffic characterization, the polling order that
matter of the traffic distribution. Furthermore, the maximum maximizes the power index. With this criterion we will try to
power achievable with EDC is significantly higher than the construct a scheduler that mimics the behavior of the optimal
one achievable with the Round Robin algorithm in both sce- one.
narios, due to the better resource utilization granted by EDC. The performance study presented in this paper has been
Similar considerations arise from the analysis of P2 curves. carried out without taking into consideration the impact of the
In particular, it is worth highlighting that with EDC also in Internet protocols on the traffic characteristics. Specifically
the asymmetric case it is possible to find a maximum for the we have assumed that the packet size corresponds to a typical
P2 function. IP packet but we have not taken into consideration the impact
of TCP control messages (ACK), and the impact of TCP flow
and congestion control mechanisms on the spacing between
5. Conclusions IP packets. This choice was done to study in a general case the
properties of the scheduling algorithms. It is left for further
The paper, after providing a tutorial description of the Blue- studies the performance of TCP when Bluetooth is the access
tooth technology has studied the performance evaluation of technology to Internet.
the Baseband transmission procedures. In particular we have
analyzed the efficiency of a Round Robin scheme for the
Medium Access Control protocol. This analysis has clearly References
shown the ineffectiveness of this scheme to face the require-
ments of a WPAN highly dynamic scenario. Therefore, we [1] M. Scott Corson, J.P. Macker and G.H. Cirincione, Internet-based mo-
bile ad hoc networking, IEEE Internet Computing (July–August 1999)
have proposed a new scheduling algorithm, named EDC that
63–70.
exploits master knowledge of local queues’ occupancy to [2] Specification of the Bluetooth System, Version 1.0B, December 1999.
avoid NULL packet transmission. EDC employs two polling [3] B.A. Miller and C. Bisdikian, Bluetooth Revealed (Prentice Hall,
cycles with different polling rules in such a way to guar- 2000).
antee a separate and fair treatment of uplink and downlink [4] J. Muller, Bluetooth Demystified (McGraw-Hill, 2000).
[5] J.L. Hammond and P.J.P. O’Reilly, Performance Analysis of Local
connections. At the same time, when compared to Round Computer Networks (Addison-Wesley Publishing Company, 1988).
Robin, EDC increases for aggregate network throughput and [6] W. Stallings, Local & Metropolitan Area Networks (Prentice Hall,
decreases the (MAC and End-to-End) delays. 1996).
BLUETOOTH 131
[7] J.F. Kurose, M. Schwartz and Y. Yemini, Multiple access protocols and Marco Conti received the Laurea degree in com-
time constraint communications, ACM Computing Surveys 16 (1984) puter science from the University of Pisa, Italy, in
43–70. 1987. In 1987 he joined the Networks and Dis-
[8] M. Conti, E. Gregori and L. Lenzini, Metropolitan Area Networks, tributed Systems department of CNUCE, an insti-
Springer Verlag Limited Series on Telecommunication Networks and tute of the Italian National Research Council (CNR)
Computer Systems (Springer, 1997). where is currently a senior researcher. He has writ-
[9] L. Kleinrock, Power and deterministic rules of thumb for probabilistic ten over 80 research papers in the areas of design,
problems in computer communications, IEEE Transactions on Infor- modeling and performance evaluation of computer-
mation Theory (1979). network architectures and protocols. His current
[10] J.C. Haartsen and S. Zurbes, Bluetooth voice and data performance research interests include Internet architecture and
in 802.11 DS WLAN environment, Technical Report, Ericsson, May protocols, wireless networks, mobile computing,
1999. multimedia systems, and QoS in packet switching
[11] S. Galli, K.D. Wong, B.J. Koshy and M. Barton, Bluetooth technology: networks. He is co-author of the book “Metropol-
Link performance and networking issues, in: Proc. European Wireless itan Area Networks” (Springer, London 1997). He
2000, Dresden, Germany, September 2000. was the coordinator of two minitracks (“Mobile ad-
[12] S. Zurbes, Consideration on link and system throughput of Bluetooth hoc networking” and “QoS in Web Services”) at the
networks, in: Proc. PIMRC 2000 (London, 2000) pp. 1315–1319. HICSS-34 conference. He is serving as a Co-Guest
[13] N. Johansson, U. Korner and P. Johansson, Wireless ad-hoc networking Editor for IEEE Transactions on Computers (special
with Bluetooth, in: Proc. Proceedings of Personal Wireless Communi- issue on “Quality of Service issues in Internet Web
cations, Copenhagen, March 1999. Services”) ACM Mobile Networks & Applications
[14] N. Johansson, U. Korner and P. Johansson, Performance evaluation of Journal (MONET) (special issue on “Mobile Ad-hoc
scheduling algorithm for Bluetooth, in: Proc. IFIP Broadband Com- Networks”) and the Cluster Computing Journal (spe-
munications, Hong Kong, November 1999. cial issue on “Mobile Ad-hoc Networking”). He is a
[15] N. Johansson, M. Kihl and U. Korner, TCP/IP over Bluetooth wireless member of the IEEE and IFIP WG 6.3 and WG 6.8.
ad-hoc network, in: Proc. IFIP Networking 2000, Paris (1999) pp. 799– E-mail: Marco.Conti@cnuce.cnr.it
810.
[16] M. Gerla, P. Johansson, R. Kapoor and F. Vatalaro, Bluetooth: “Last
Meter” technology for Nomadic wireless internetting, in: Proc. 12th
Tyrhennian International Workshop on Digital Communications.
Enrico Gregori received the Laurea in electronic engineering from the Uni-
versity of Pisa in 1980. He joined CNUCE, an institute of the Italian National
Research Council (CNR) in 1981. He is currently a CNR research director.
Raffaele Bruno has received his Laurea degree in In 1986 he held a visiting position in the IBM research center in Zurich work-
telecommunications engineering from the University ing on network software engineering and on heterogeneous networking. He
of Pisa, Italy, in 1999. He is currently working to- has contributed to several national and international projects on computer
ward his Ph.D. degree at the CNUCE Department in networking. He has authored a large number of papers in the area of com-
the National Council of Research, Pisa, Italy. His puter networks and has published in international journals and conference
research interests are in the areas of wireless and proceedings. His current research interests include: wireless access to Inter-
mobile networks with emphasis on efficient wireless net, wireless LANs, quality of service in packet-switching networks, energy
MAC protocols, scheduling algorithms for Internet saving protocols, evolution of TCP/IP protocols. He is on the editorial board
traffic integration and QoS. of the Cluster Computing Journal. He is a member of the IEEE.
E-mail: Raffaele.Bruno@guest.cnuce.cnr.it E-mail: Enrico.Gregori@cnuce.cnr.it