BlueStar: Enabling Efficient Integration between Bluetooth WPANs and IEEE 802.11 WLANs
←
→
Page content transcription
If your browser does not render page correctly, please read the page content below
Mobile Networks and Applications 9, 409–422, 2004 2004 Kluwer Academic Publishers. Manufactured in The Netherlands. BlueStar: Enabling Efficient Integration between Bluetooth WPANs and IEEE 802.11 WLANs CARLOS DE M. CORDEIRO ∗ , SACHIN ABHYANKAR, RISHI TOSHIWAL and DHARMA P. AGRAWAL OBR Research Center for Distributed and Mobile Computing, Department of ECECS, P.O. Box 210030, University of Cincinnati, Cincinnati, OH 45221-0030, USA Abstract. Bluetooth is a radio technology for Wireless Personal Area Networking (WPAN) operating in the 2.4 GHz ISM frequency band. So far, there has been little research on how Bluetooth-enabled devices can effectively and efficiently have uninterrupted access to wide area networks (WAN) such as the Internet. We introduce a novel architecture (BlueStar) whereby selected Bluetooth devices, called Bluetooth Wireless Gateways (BWGs), are also IEEE 802.11 enabled so that these BWGs could serve as egress/ingress points to/from the IEEE 802.11 wireless network. We propose mitigating interference between Bluetooth and IEEE 802.11, by employing a hybrid approach of adaptive frequency hopping (AFH) and Bluetooth carrier sense (BCS) of the channels. AFH labels channels as “bad” or “good”, and Bluetooth devices only access those channels in the “good” state, whereas BCS is used to avoid collision by sensing the channel prior to any transmission. By combining AFH and BCS, we drastically minimize the effect of the worst-case interference scenario wherein both a Bluetooth and an IEEE 802.11 interface are co-located in a single device. BlueStar enables Bluetooth devices, belonging to either a piconet or a scatternet, to access the WAN through the BWG without the need for any fixed Bluetooth access points, while utilizing widely deployed base of IEEE 802.11 networks. Moreover, we define the protocol stack employed by BlueStar as well as indicate how BWGs efficiently manage their capacity allocation through the different systems. We also mathematically derive an upper bound on the number BWGs needed in a Bluetooth scatternet so that uninterrupted access to all Bluetooth devices could be provided. Keywords: analytical modeling, architecture, Bluetooth, carrier sensing, frequency hopping, gateway, IEEE 802.11, interference, protocol stack, simulation 1. Introduction WLAN, empowering low-cost, short-range devices to access the global Internet infrastructure through the use of WLAN- Bluetooth [1,5] is a wireless communication technology that based high-powered transmitters. It is also possible that Blue- provides short-range, semi-autonomous radio network con- tooth devices might access the WAN through a 3G cellular nections, and offers the ability to establish ad hoc net- infrastructure like Universal Mobile Telecommunication Sys- works [8], called piconets. It has also been chosen to serve tem (UMTS) and cdma2000 [3]. However, from the point of as the baseline of the IEEE 802.15.1 standard for wireless view of cost and performance, it is advantageous for Blue- personal area networks (WPANs) [3]. A WPAN is defined tooth devices to have access to the WAN through a WLAN as the connection among personal devices, allowing informa- system where a WLAN infrastructure is readily available. In tion exchange over short ranges. Eventually, this WPAN can these scenarios, Bluetooth (or WPAN) devices would only be integrated with large wide area networks (WANs) to pro- make use of the cellular network infrastructure where WLAN vide Internet connectivity in addition to access among these coverage is not provided. devices. An important challenge in defining the BlueStar architec- As previous studies have pointed out [7,11,13,23,34], it ture is that both Bluetooth and WLANs employ the same is much likely that Bluetooth devices and IEEE 802.11 [19] 2.4 GHz ISM band and can possibly impact the perfor- wireless local area networks (WLANs) stations (in this mance [1,7,12,17]. We refer to the interference generated work we use the term WLAN and IEEE 802.11/802.11b in- by WLAN devices over the Bluetooth channel as persistent terchangeably) operating in the 2.4 GHz ISM (industrial- interference [7], while the presence of multiple piconets in scientific-medical) frequency band should be able to coexist the vicinity creates interference [7,9,11,23,34] referred to as as well as cooperate with each other, and access each other’s intermittent interference [7,9]. resources. These technologies are complementary to each To combat both of these interference sources and provide other and such an integrated environment is envisioned that effective coexistence, we propose to employ a unique hybrid Bluetooth devices obtain information through the WLAN, approach of adaptive frequency hopping (AFH) [14] and a and ultimately the Internet. These cooperative requirements new mechanism called Bluetooth carrier sense (BCS) in Blue- have encouraged us to propose an intuitive architecture, called Star. AFH seeks to mitigate persistent interference by scan- BlueStar, whereby few selected Bluetooth devices, called ning the channels during a monitoring period and labeling Bluetooth wireless gateways (BWG), are also members of a them as “good” or “bad”, based on whether the packet error ∗ Contact author. rate (PER) of the channel is below or above a given threshold.
410 CORDEIRO ET AL. BCS takes care of the intermittent interference by mandating 2. Bluetooth overview that before any Bluetooth packet transmission, the transmitter The details of the Bluetooth system, architecture and proto- has to sense the channel to determine the presence of any on- cols are defined in [5]. A brief overview is provided here going activity. This channel sensing is performed during the for completeness. Bluetooth is a short-range (up to 10 m) turn around time of the current slot, and it does not require any wireless technology aimed at replacing cables that connect changes to the current Bluetooth slot structure. According to phones, laptops, and other portable devices. Bluetooth op- the IEEE 802.15 Coexistence Task Group 2 terminology [18], erates in the ISM frequency band starting at 2.402 GHz and BlueStar would be classified as a non-collaborative solution ending at 2.483 GHz in USA and most European countries. in the sense that the Bluetooth and the WLAN system operate A total of 79 RF channels of 1 MHz width are defined, where independently, with no exchange of information (as a matter the raw data rate is 1 Mbit/s. A Time Division Multiplexing of fact, this is required by the Federal Communications Com- (TDD) technique divides the channel into 625 µs slots and, mission regulations for the license-free bands). This lack of with a 1 Mbit/s symbol rate, a slot can carry up to 625 bits. information does not, however, have any impact on the per- Transmission occurs in packets that occupy 1, 3 and 5 slots formance of BlueStar. In fact we show that by employing the as depicted in figure 1. Each packet is transmitted on a differ- BlueStar architecture, we can approximately double the per- ent hop frequency with a maximum frequency hopping rate formance of the regular Bluetooth. of 1600 hops/s. Other studies [2,23] have proposed the use of Bluetooth ac- Bluetooth operates on a Master-Slave concept wherein the cess points (BAP), thereby making it totally dependent on a Master periodically polls the Slave devices and only after re- short-range fixed infrastructure. Our proposed BlueStar takes ceiving such a poll is a Slave allowed to transmit. The Mas- advantage of the widely available WLAN installed base as ter for a particular set of connections is defined as the device many organizations have spent hundreds of thousands of dol- that initiated the connections. A Master device can directly lars (including personnel training) building their WLAN in- control up to seven active Slave devices in what is defined as frastructure, and it is advantageous to use pre-existing WLAN a piconet. Multiple piconets can be linked together through infrastructure. This can easily support long-range, large-scale common Bluetooth devices to form a scatternet. mobility as well as provide uninterrupted access to Bluetooth The Bluetooth specification defines two distinct types of devices. The architecture of Bluetooth and WLAN enabled links for the support of voice and data applications, namely, devices proposed here is an intuitive and practical solution SCO (synchronous connection-oriented) and ACL (asynchro- to this ad hoc issue, and even though such an arrangement nous connectionless). The first link type supports point to has been evaluated in [13], no mechanism or architecture has point voice switched circuits while the latter supports sym- been used to mitigate interference between the Bluetooth and metric as well as asymmetric data transmission. This work the WLAN. Here, we not only define an architecture and its mainly considers the use of ACL packets since they are in- protocol stack, but also identify and propose two mechanisms tended to support data applications and do not have prescribed (AFH and BCS) that enable effective and efficient coexistence time slot allocations as opposed to SCO packets. The ACL of Bluetooth and WLAN within a single device. link allows the use of 1-, 3-, and 5-slot data packets (figure 1) The industry has also been making efforts towards inte- with the optional use of FEC (forward error correction). DMx grating Bluetooth and WLAN [25,27,28]. However, most (data medium-rate) packets provide a 2/3 FEC hamming code recent solutions do not tackle the issue of simultaneous op- and DHx (data high-rate) packets carry no FEC coding at all, eration of Bluetooth and WLANs, that is, either Bluetooth where x = 1, 3, or 5, depending on the number of slots it oc- or WLANs – but not both – can access (i.e., be active) the cupies. Table 1 presents the possible ACL link packet types wireless medium at a time, as only a single card is available. with their respective characteristics. Moreover, this implies that additional integrated cards have to be acquired. The architecture we propose here enables si- multaneous operation by using existing WLAN hardware in- frastructure, while relying on the availability of Bluetooth in- terfaces. The remainder of this paper is organized as follows. Sec- tion 2 provides an introduction to the Bluetooth technology, whereas section 3 elaborates on the proposed BlueStar ar- Figure 1. Packet transmission in Bluetooth. chitecture, including a novel combination of AFH and BCS Table 1 Asynchronous connectionless (ACL) packet overview. to handle both intermittent and persistent interferences, as well as it presents the capacity allocation scheme employed Type User payload FEC Symmetric Asymmetric (bytes) (Kbps) (Kbps) in BlueStar. Next, section 4 discusses our simulation envi- ronment. The performance of BlueStar in a Bluetooth-only DM1 0−17 Yes 108.0 108.8 108.8 DH1 0−27 No 172.8 172.8 172.8 scenario is then shown in section 5, while section 6 evaluates DM3 0−121 Yes 256.0 384.0 54.4 BlueStar in a combined IEEE 802.11 and Bluetooth environ- DH3 0−183 No 384.0 576.0 86.4 ment. Section 7 discusses placement issues of BWGs. Finally DM5 0−224 Yes 286.7 477.8 36.3 DH5 0−339 No 432.6 721.0 57.6 section 8 concludes this paper.
BLUESTAR: ENABLING EFFICIENT INTEGRATION 411 3. The proposed BlueStar architecture ture is shown in figure 2(b), where the protocol stack is pre- sented for each of its entities. As we can see, BlueStar reuses The proposed architecture is expected to be capable of access- existing protocols wherever possible. Note that other opti- ing networked information, especially through a WAN such mized protocol stacks have been proposed to serve specific as the Internet. This allows dynamic content to be delivered applications [29], while the architecture we adopt does not to the piconets and to the devices that may not otherwise have have such restriction. In order for Bluetooth devices to be such WAN access, but can communicate with other Bluetooth directly addressed, we assume that every Bluetooth device devices that do have access, either within the piconet or scat- possesses an IP address and any of the well-known routing ternet. This would also enable network sharing among wire- algorithms [20,26] is available. Hence, we can conclude that less and wired devices not only within the local network, but the BWGs may be better served by a layer (either software or also across the WAN. We address this problem by a novel dedicated hardware) above the Bluetooth and WLAN radio architecture called BlueStar to provide Bluetooth access to cards which is responsible, among other things, for receiving the WAN and take advantage of the existing IEEE 802.11 packets and forwarding (including routing) them through the WLANs. We call these selected devices – which possess both corresponding wireless system. a WLAN interface and a Bluetooth interface – as Bluetooth A crucial challenge in the design of BlueStar is to enable wireless gateways (BWGs). BlueStar allows piconets to be an efficient and concurrent operation of both Bluetooth and formed around a portable device, such as a notebook or a per- WLANs as they both employ the same 2.4 GHz ISM band. To sonal digital assistant (PDA), and have wide-area connectiv- combat the interference sources, BlueStar employs a unique ity as well. Figure 2(a) illustrates the BlueStar architecture hybrid approach of an adaptive frequency hopping (AFH) and with a scatternet, composed of total of four piconet, where the Bluetooth carrier sense (BCS). Below we describe how each piconet has several slaves (indicated by the letter Si,j ) such schemes are implemented in BlueStar. and one master (indicated by the letter Mi ). In this figure, two BWGs provide the scatternet Bluetooth devices access 3.1. Bluetooth carrier sense (BCS) to the local WLAN which, in turn, provides communication to the local LAN, MAN, or WAN, and possibly the Internet. BlueStar employs carrier sense so that intermittent-like in- BlueStar opens up new possibilities for the Bluetooth WPAN terference can be avoided. The current Bluetooth specifi- technology, as it enables Bluetooth devices to communicate cation [5] does not have any provision for carrier sensing. with virtually any other entity on the Internet. However, with increased receiver sensitivity and the wide- The interaction between the Bluetooth network and the spread use of Bluetooth in unpredictable environments and outside world is managed by the BWGs. Two possible new applications, it is quite likely that carrier sensing may protocol stacks to carry IP packets over Bluetooth could have to be considered for inclusion in the Bluetooth specifi- be employed within BWGs. The first option is to trans- cation. Moreover, carrier sensing is fundamental to any ef- mit IP packets over point-to-point protocol (PPP) over ficient interference mitigation with other technologies using RFCOMM [5], by taking advantage of the fact that PPP is the same ISM frequency band, and among Bluetooth piconets already implemented in most mobile devices. However, such themselves. Contrary to IEEE 802.11, Bluetooth carrier arrangement has been found to be highly inefficient given its sensing would be much simpler due to the nature of its MAC redundancy [5]. Therefore, the Bluetooth SIG [5] has pub- protocol [9,11,22]. Therefore, in this work we assume that lished a native way for carrying IP traffic over Bluetooth Bluetooth devices possess a sensing capability. by a protocol called Bluetooth network encapsulation pro- We incorporate BCS into Bluetooth without any modifi- tocol (BNEP) wherein IP packets are encapsulated in Eth- cations to the current slot structure. As stated in section 2, ernet packets which are then carried over Bluetooth links. with a symbol rate of 1 Mbit/s a Bluetooth slot can carry up In BlueStar we have opted for the latter and such architec- to 625 bits. However, to allow the Bluetooth transmitter and (a) (b) Figure 2. (a) BlueStar proposed architecture. (b) Protocol stack for each entity.
412 CORDEIRO ET AL. Figure 3. Carrier sensing mechanism in Bluetooth. Figure 4. Timing of two Bluetooth packets on different piconets. Bluetooth receiver devices to change from Rx to Tx mode Next, we analyze the nature of intermittent interference. and make the frequency synthesizer tune to the next chan- As we have seen earlier, packet transmission in different pi- nel frequency, a 259 µs turn around time is left at the end conets are asynchronous and are transmitted with period Tp , of the last slot. With current improvements in the Bluetooth which depends upon the Bluetooth packet type p. For in- chip design [5] and the need for backward compatibility, the stance, if p is equal to DH1 or DM1 we have that Tp = Bluetooth device in the near future will keep part of this turn 2 · slotsize, where slotsize is the size of a Bluetooth slot, and around time unused as idle, hence enabling it to perform some is equal to 625 µsec. Figure 4 illustrates the timing of two other useful tasks. This turn around period is illustrated in Bluetooth packets p and z generated at piconets i and j with the figure 3 as well as our BCS proposal, where the dashed sizes Sp,i and Sz,j , respectively. block denotes the sense window of size WBCS . Before starting The probability of packet collision between piconets i packet transmission, the next channel is checked (i.e., sense) and j , pc (i, j ), is the probability of packet overlap both in in the turn around time of the current slot. If the next channel time and frequency. Therefore, if we assume that any packet is busy or becomes busy during the sense window, the sender collision incurs packet loss (strong interference) [7,9], we simply withholds any attempt for packet transmission, skips have that: the channel, and waits for the next chance. Otherwise, packet pc (i, j ) = (Sp,i + Sz,j )/ max slotsperpacket(p), transmission is carried out. A direct consequence of this ap- 1 proach is that, eventually, an ARQ (automatic retransmission slotsperpacket(z) + 1 · slotsize · , (1) request) packet will be sent when the slot is clear and the C communication is carried out. Algorithms to guarantee that where C is the number of available frequency channels and devices withdrawing their transmissions in a previous polling is equal to 79 in most countries [5]. Moreover, the function cycle will eventually have a fair share of time in the following slotsperpacket(X) gives the number of slots occupied by a cycles are out of scope of this paper, while we have used an Bluetooth packet X, and max(p, q) returns the largest value approach similar to [15] for our implementation (detailed in of two numbers p and q. We can extend this analysis by de- section 4). riving the packet collision probability in a network comprised
BLUESTAR: ENABLING EFFICIENT INTEGRATION 413 Figure 5. Packet collision and withdrawal probabilities for different slot length packets. of N piconets. The packet collision probability with a packet gregate throughput for Bluetooth with BCS becomes: originated at the ith piconet is given by: SBCS (X) = µ(X)N N−1 p̄c (i) = 1 − 1 − pc (i, j ) . (2) ACKinbits(X) + sizeinbits(X) + 2WBCS 1 N−1 × 1− · . (slotsperpacket(X) + 1) · slotsize C Let us now derive the equations for BCS. For the ith pi- (5) conet, the packet withdrawal probability is the probability of sense window overlap with the packet from any other pi- Figure 5 depicts the packet collision and withdrawal proba- conets. Therefore, the packet withdrawal probability of Blue- bilities for all three Bluetooth slot length packets as a function tooth with BCS can be written as: of the number of piconets, and WBCS = 50 µs. Such an analy- sis of a high number of piconets (up to 200) is crucial given N−1 the new wave of applications of Bluetooth in wireless sen- WBCS + Sz,j 1 p̄w (i) = 1− 1− · . sor networks [21,24,31] where thousands of sensors equipped (slotsperpacket(z) + 1) · slotsize C (3) with Bluetooth interfaces are to be employed, hence requiring Aggregate throughput is another important performance hundreds of piconets to be formed and operate with minimum measure when you consider a collection of piconets operat- interference amongst each other [9]. Thus, the analyses car- ing in a proximity. In Bluetooth, data packets are followed ried out in this paper also have these sorts of scalable applica- by an acknowledgement in the opposite direction from the re- tions in mind. As we can see from figure 5, even though both cipient. Thus, we can obtain the aggregate throughput of N packet probabilities increase with the number of piconets, the piconets relative to a Bluetooth packet X as given by: packet withdrawal probability increases at a slower rate, in- dicating that a large fraction of packet collisions are being S(X)=µ(X)N avoided with the adoption of BCS. Moreover, the rate of in- crease is also distinct for different slot length packets. 2(ACKinbits(X) + sizeinbits(X)) 1 N−1 Figures 6(a) and 6(b) respectively illustrate the aggregate × 1− · , (slotsperpacket(X) + 1) · slotsize C throughput for ordinary Bluetooth and Bluetooth with BCS (4) for the same value of WBCS . A mere glance of these two figures reveals that Bluetooth with BCS practically doubles where ACKinbits(X) and sizeinbits(X) are the size in bits of the available throughput for most packet types. For instance, the acknowledgement and data packet type X, with µ(X) using DH3 packets with ordinary Bluetooth, the maximum at- being the nominal throughput of X (see table 1). The ac- tainable throughput with 60 piconets is of 8.03 Mbps, whereas knowledgement information is included in the header of the Bluetooth with BCS achieves a bandwidth of up to 15.2 Mbps return packet, and hence called piggy-backing. In our analy- with 110 piconets in the network. Thus, Bluetooth with BCS sis, we consider the case where acknowledgements do not not only significantly increases the overall throughput but also carry payload information, thereby making ACKinbits(X) in enables a larger number of nearby piconets to operate effi- equation (4) always equal to 126 bits [5]. Similarly, the ag- ciently.
414 CORDEIRO ET AL. (a) (b) Figure 6. (a) Aggregate throughput for ordinary Bluetooth. (b) Aggregate throughput for Bluetooth with BCS. Figure 7. Potential packet collisions between IEEE 802.11 and Bluetooth. 3.2. Bluetooth adaptive frequency hopping (AFH) as “good”. All devices within a piconet carry out this proce- dure and when the piconet master request this, the slaves send A careful observation reveals that some packet collisions are their measured “good” and “bad” channel marks. The master, still not detected by BCS. Given that a IEEE 802.11 DATA in turn, conducts a referendum process based on information frame has a maximum size of up to 2346 octets [19] and collected by itself and provided by the slaves. The final map- a Bluetooth slot occupies 625 bits (with 366 bits of actual ping sequence is then determined and sent back to each slave transmitted data), we conclude that, in the worst case, a IEEE device, which follow this new sequence thereafter. We have 802.11 DATA frame can overlap with up to 30 Bluetooth implemented this scheme by a bitmap comprising of 79 bits slots (RTS-CTS-ACK are much smaller in size and hence do where a one indicates that a frequency can be used while a not overlap with so many Bluetooth slots). Figure 7 shows zero indicates otherwise [14]. Note that devices conduct the two potential cases of packet collisions. Although the IEEE AFH procedure periodically in order to account for the case 802.11 WLAN senses the channel before transmission, it can- where the piconet – or some piconet devices – may have left not sense the Bluetooth activities [6], since the Bluetooth sig- WLAN radio coverage. The overall effect on Bluetooth is that nal is narrowband and low power as compared to WLANs. the total number of available channels C decreases as some Therefore, when the Bluetooth packet (from piconet i) is channels may be labeled as “bad”. The only impact on our ahead of the WLAN, packet collision (with the next IEEE previous analytical model of section 3.1 is that the value of C 802.11 packet) takes place even after employing BCS. On the in equation (2) changes periodically with the re-evaluation of other hand, when the WLAN packet is ahead of the Bluetooth the channels by the AFH mechanism, and will always be at packet BCS successfully senses activity in the medium and most equal to 79. withdraws packet transmission (see figure 7). To cope up with this type of interference, called persistent 3.3. Capacity allocation scheme interference, BlueStar employs AFH [14], which turns out to be an effective method for handling persistent interference. The way BWGs multiplex their capacity has to be carefully In our implementation of AFH, Bluetooth devices scan every coordinated. To do that, we employ a scheme where the time T SCAN seconds for each of the 79 channels used by Blue- slice of a BWG in a system is proportional to the number of tooth and collect PER statistics. If the PER is above a thresh- devices in that system (this scheme is an enhanced version of old PERTHRES , it is labeled as “bad”; otherwise it is labeled the one presented in [15]). In the BlueStar architecture, the
BLUESTAR: ENABLING EFFICIENT INTEGRATION 415 BWGs have to act as forwarding units between the wireless about two times larger than the transmission range [10,32]. systems besides serving as source or destination for their own More specifically, in our simulations we consider the trans- applications. Thus, a BWG must spend a proportional amount mission range to be 10 m and the interfering range to be 22 m. of time in receiving data as in forwarding it. Obviously, be- It may be noted that, from now on, we consider an IEEE cause of mismatch in packet sizes and the eventual segmenta- 802.11b DSSS (Direct Sequence Spread Spectrum) running tion and reassembly overheads, the time spent in one network at 11 Mbps for all our simulations and discussions. Also, may not be exactly the time spent in the other. Since a BWG we have developed a hybrid Bluetooth-802.11 model that has can be present only in one piconet at a time, the total capacity been incorporated into the BWGs. a BWG can provide to the users it serves is bounded by half the piconet capacity. This prevents the fair distribution of the capacity when a BWG serves more than half the total number 5. Bluetooth-only simulation environment of users in the scatternet. For example, consider now a BWG of a piconet, say P1 , in Our initial experiment employs an environment comprised of the network. If this BWG serves a fraction f of the slaves, only Bluetooth devices without any external sources of inter- then it spends a fraction of time equal to the minimum of f ference. Therefore, since we are mainly concerned with inter- and 0.5 in P1 . Thus, if f is greater than 0.5, the slaves served mittent interference and BCS, AFH is not employed. Figure 8 by the BWG gets less than their fair share. As explained ear- illustrates the topology used for this evaluation which is sim- lier, the total time spent by the BWG in, say, two other pi- ilar to the one employed in [9]. Within a total area of 500 m conets it belongs to should be equal to that spent in P1 . This × 500 m, we have considered a network composed initially time is distributed between these two piconets in a fair man- of 10 piconets. For each of the twenty simulation runs, we ner, depending upon the total number of users served by each increase the number of piconets by 10 up to a total of 200 pi- of them, where the total number of users is the sum of the conets, where each piconet comprises of four devices. During users in the piconet and those served by the other BWG in the each simulation, each piconet master establishes a CBR (con- piconet. stant bit rate) connection with each of its slaves with a MTU Therefore, the system divides its bandwidth amongst the (maximum transfer unit) of 512 bytes (thus, segmentation is slaves as fairly as possible. In particular, if the number of performed into Bluetooth baseband packets), and the trans- slaves in the piconets is distributed in a uniform manner (i.e., mission lasts for the entire simulation length of 300 seconds. the number of slaves served by one BWG is not greater than Regarding the BCS implementation, we set the sense window half of the total number of slaves), the system gives each slave size WBCS = 50 µs. an equal amount of bandwidth towards the IEEE 802.11 net- Figure 9 depicts the packet collision and withdrawal prob- work. If there is a change in the number of slaves in any abilities obtained through simulation and the ones obtained piconet, the polling cycle and the capacity allocation are ad- analytically (section 3.1). As we can see, our simulation re- justed as described. sults closely match with the analytical one. Bluetooth with BCS greatly reduces the number of collisions and defers packet transmission until a safe channel is found. Similarly, 4. Simulation of BlueStar figures 10(a) and (b) present the aggregate throughput for the scenario simulated corresponding to the ordinary Blue- We have implemented all functionalities of BlueStar in the tooth and Bluetooth with BCS, respectively. As we had al- network simulator (ns-2) [33] and BlueHoc [4], an open- ready estimated by our analytical model, Bluetooth with BCS source Bluetooth simulator provided by IBM. Since BlueHoc practically doubles the maximum bandwidth achieved by only provides the basic functionality of Bluetooth, we have the normal Bluetooth implementation. While the maximum made considerable extensions to this simulator. In addition, throughput achieved by Bluetooth is of the order of 8 Mbps we consider that the interfering range of Bluetooth devices is when there are 60 piconets in the network, Bluetooth with Figure 8. Bluetooth-only network topology model.
416 CORDEIRO ET AL. Figure 9. Simulation of packet collision and withdrawal probabilities. (a) (b) Figure 10. Aggregate throughput for (a) ordinary Bluetooth; (b) Bluetooth with BCS. BCS goes up to 15.5 Mbps for a total of 90 piconets. Thus, we network model for evaluating Bluetooth and 802.11 interfer- see that not only BCS can drastically increase throughput but ence has been employed in [16]. In figure 11, the horizontal also enable efficient support of a larger number of co-located plane depicts the Bluetooth plane with Bluetooth devices dis- piconets. tributed uniformly in the plane in an area of 500 m × 500 m. Similar to earlier simulations, we have considered a network initially comprising of 10 piconets, and increase the number 6. Combined Bluetooth and WLAN simulation of piconets in steps of 10 till 200 piconets. The number of de- environment vices per piconet is uniformly chosen between 4 and 8, and we In this section we carry out experiments with both intermit- have only considered Bluetooth DH5 packets. In figure 11, pi- tent and persistent interferences. For that, we utilize the im- conet 1 holds the slave device S assuming the role of BWG, plementations of both BCS and AFH. and located at the center of the Bluetooth plane, which is also the intersection of the vertical WLAN axis, and the horizon- 6.1. TCP/IP traffic simulation tal Bluetooth plane axis. This particular piconet has a slave in the logical origin of the plane and its master 5 m away from it. We now discuss details of BlueStar simulations in a real sce- Contrary to the previous simulations, the application layer of nario where TCP/IP applications are put into use. A similar the piconet devices consists of FTP sessions established be-
BLUESTAR: ENABLING EFFICIENT INTEGRATION 417 tween masters and slaves using the same parameters. Within • Scenario D: This scenario models the opposite situation piconet 1, the BWG is responsible for relaying FTP pack- as described in scenario C. In other words, it is the case ets forwarded by the master M to the WLAN AP, which in where the BWG simultaneously transmits data packets to turn possesses a sink agent to receive these packets and per- both the Bluetooth devices and the WLAN AP. form measurements. In other words, the traffic between the As for the WLAN axis, it is composed of an AP, located at WLAN AP and Bluetooth network also consists of FTP traf- (0, 200) m, which has a radio range of 250 m [19]. As em- fic. For this study, we set the offered load in each piconet ployed in other studies [13], the WLAN packet payload is set to 30% of its total capacity, and assume Bluetooth stations to to 11776 bits while the packet header is set to 224 bits, result- be stationary as currently assumed by BlueHoc [4]. We have ing in a total size of approximately 1.5 KByte. The analysis selected and analyzed four possible scenarios as follows: of the impact of the WLAN packet size on Bluetooth is out of • Scenario A: The flow of data packets is from the WLAN scope of this paper (study of the performance of a WLAN net- AP to the BWG, reflecting an application where Bluetooth work for different WLAN packet sizes can be found in [35]). devices downloading contents from the WAN; For each simulation, we conducted a total of five 300 seconds iterations, and these runs are averaged to give the final results. • Scenario B: This scenario is the opposite of the previous Table 2 shows the values used to configure the BlueStar sim- one with the Bluetooth devices uploading information to ulation, while table 3 summarizes the WLAN parameters. the WAN, i.e., the flow of data packets is from the BWG Figures 12–15 show two different views of the same simu- to the WLAN AP; lation for the four scenarios considered. While figures 12(a), • Scenario C: A BWG might find itself in a situation where 13(a), 14(a), and 15(a) depict the average link through- it simultaneously receives data packets from both the put achieved within piconet 1, figures 12(b), 13(b), 14(b), WLAN AP and the Bluetooth devices in order to synchro- and 15(b) show its relative PER (packet error rate) for the nize information in the BWG; same scenarios. In general, we can see that the PER increases and the throughput decreases due to an increase in the inter- ference level as more piconets are added. As we can see from the figures, for the regular Blue- tooth implementation, scenarios B and D experience a size- Table 2 BlueStar simulation parameter setting. WBCS 50 µs PERTHRES 15% TSCAN 20 s Table 3 IEEE 802.11/WLAN simulation parameter setting. CW_min 16 CW_max 1024 Packet header 224 bits Payload size 11776 bits Figure 11. WLAN and Bluetooth network simulation model. (a) (b) Figure 12. (a) Throughput in scenario A. (b) PER in scenario A.
418 CORDEIRO ET AL. (a) (b) Figure 13. (a) Throughput in scenario B. (b) PER in scenario B. (a) (b) Figure 14. (a) Throughput in scenario C. (b) PER in scenario C. (a) (b) Figure 15. (a) Throughput in scenario D. (b) PER in scenario D. able degradation in throughput as compared to scenarios A PER as depicted in the respective figures 13(b) and 15(b). On and C, with scenario B having the largest impact. This is par- the other hand, in scenarios A and C the BWG is sending ticularly true in these scenarios because when the BWG is acknowledgments (ACKs) to the AP, therefore reducing the transmitting data packets towards the AP, there is a high per- probability of packets being corrupted. The reason why sce- sistent interference in the Bluetooth network causing a high nario B suffers a higher performance drop (and higher PER)
BLUESTAR: ENABLING EFFICIENT INTEGRATION 419 (a) (b) Figure 16. Aggregate throughput in (a) scenario C; (b) scenario D. than scenario D is because the WLAN transmissions corrupt nario A the WLAN transmissions have been corrupting the the Bluetooth data packets in scenario B, while in scenario D Bluetooth ACK packets, while in scenario C Bluetooth data only Bluetooth ACK packets are susceptible to be corrupted packets are more impacted. Therefore, scenario A performs by WLAN transmissions. Therefore, since the ACK packets slightly better due to the shorter and less frequent duration of are small in size as compared to data packets, they are more the ACK packets. likely to be successfully received during the off-cycle of the Moreover, it is also important to highlight the performance WLAN transmission, resulting in the scenario B experiencing of AFH as it outperforms BCS under a small number of pi- an extremely high PER as can be seen from figure 13(b). conets, since most of the interference is of persistent type. Now let us analyze the behavior the AFH, BCS, and However, as the number of piconets increase, and hence the BlueStar for the same scenarios B and D. Since these scenar- intermittent interference level, the performance of AFH de- ios are more impacted by persistent interference, AFH is ef- grades and BCS becomes more efficient both in terms of PER fective for a larger number of piconets until it reaches a point and throughput. More specifically, in scenarios B and D AFH where the intermittent interference levels becomes significant. is more efficient than BCS up to 90 and 72 piconets respec- At these points, BCS performs better by effectively mitigat- tively, whereas in scenarios A and C AFH performs better ing intermittent interference sources. Also note that, despite when the number of piconets is approximately less than 55. the high interference levels, BlueStar, employing both AFH In all scenarios, BlueStar achieves the best throughput and and BCS, accomplishes enhanced performance by achieving the lowest PER by taking advantage of both AFH and BCS. the highest throughput and lowest PER. As for scenarios A As a final experiment, we have selected scenarios C and and C, AFH is now effective only for a smaller number of D and have collected the aggregate throughput for the entire piconets as the larger impact comes from intermittent inter- Bluetooth network for the same simulation set up. The results ference. Similarly, BlueStar obtains best results, although it are shown in figures 16(a) and (b). Similar to earlier results, is slightly affected in scenarios B and D due to the high per- we observe a higher drop in throughput for scenario D, es- sistent interference levels. pecially for the ordinary Bluetooth implementation. As ex- Note that in scenarios A and C (especially in scenario A) pected, AFH outperforms BCS when most of the interference the regular Bluetooth implementation shows performance is of persistent type, however degrades nearly at the same rate sometimes comparable to that of the AFH scheme, which as the ordinary Bluetooth implementation when the number is primarily due to the TCP congestion control mechanisms of piconets become larger than 50 and 65 for scenarios C employed in the WLAN interface. When collisions in the and D, respectively. Likewise, BlueStar approximately dou- WLAN traffic occur, the frame has to be completely retrans- bles the throughput achieved in Bluetooth by combining AFH mitted as IEEE 802.11 WLANs do not employ any kind of and BCS. FEC (forward error correction). Therefore, upon packet colli- sion, the TCP timers expire, resulting in the congestion win- dow being set to 1 MSS (maximum segment size) and the 7. Discussion on placement and number of BWGs slow-start algorithm being executed. This situation effec- tively allows Bluetooth devices to capture the channel and use In this section we discuss how many BWGs are needed to them for its transmissions. At the time TCP reestablishes its provide adequate and uninterrupted coverage to all devices in transmission rate, the Bluetooth devices would have already a Bluetooth scatternet, as well as where to place these BWGs. performed its packet transmissions. This kind of situation has We refer to these as the placement and the number problems. been more frequent in scenario A than in C because in sce- As a matter of fact, this is a very important and natural is-
420 CORDEIRO ET AL. (a) (b) (c) (d) Figure 17. Scheme for the number of BWGs. (a) One BWG for each pair of two piconets. (b) New piconet resulting in the addition of one more BWG. (c) New piconet resulting in the addition of two more BWGs. (d) A scatternet composed of 19 piconets. sue for any organization that aims to implement an architec- range covered by such antennas approximates a circle. The ture such as BlueStar in its domain. For this discussion, we addition of another piconet to the scatternet of figure 17(a) do not consider the case where devices in one piconet may could result in two distinct configurations as depicted in fig- reach BWGs in other piconets by using some kind of multi- ures 17(b) and (c). While in figure 17(b) the addition of a hop wireless routing protocol. Rather, we handle this problem piconet resulted in the addition of only one more BWG, the by devising a model that gives us an upper bound on the num- same piconet might also result in the addition of two more ber of BWGs that would be needed to efficiently provide full BWGs as shown in figure 17(c). In other words, the topology coverage to the Bluetooth devices. In other words, we carry of interconnection has influence on the number of resulting out a worst-case analysis. BWGs. However, since we are interested in an upper bound We make few assumptions about the placement of a BWG (worst-case) on the number of BWGs, our task is simplified within a piconet and the scatternet organization, as illustrated by considering only the topology which results in the highest in figure 17. As a matter of simplicity, we propose a model interconnection, as exemplified in the sketch of figure 17(d). whereby the BWGs serve as bridge node between exactly two In Bluetooth, it is possible to have all eight devices of a neighboring piconets (as also assumed in [30]) and, there- piconet working as bridge nodes. For mathematical simplic- fore, we place them along the border between two piconets ity, we impose a restriction that only the master device is not as depicted in figure 17(a). Furthermore, we assume that pi- allowed to work as a BWG. Thus, among seven BWGs of a conets have a circular shape and are centered on the master, piconet, each BWG is shared by two piconets. It is clear that and that piconet devices are uniformly distributed around the we can have at most 7n/2 BWGs in a scatternet composed border of the piconet. This is a realistic assumption as Blue- of n piconets. In fact, the total number of BWGs required tooth devices possess omni directional antennas and the radio will be fewer than these as there is no need to have a BWG on
BLUESTAR: ENABLING EFFICIENT INTEGRATION 421 non-bridge devices as shown in the outer parts of figures 17(c) 8. Conclusions and future work and (d). We can formalize this fact by the following proposi- tions that set the upper bound on the number of BWGs needed There has been very little work on how Bluetooth-enabled throughout a scatternet. devices can have seamless and uninterrupted access to global networks such as the Internet. This paper introduces a novel Proposition 1. For a scatternet comprised of n (n > 0) pi- architecture called BlueStar, which employs a combination conets, where piconets have a circular (or near-circular) shape of adaptive frequency hopping and Bluetooth carrier sensing (see figure 17(b)), to efficiently provide advanced wide area services to Blue- √ the number of BWGs needed is at most 7n/2 − 24 n − 4. tooth devices. BlueStar can take advantage of the existing in- stalled base of IEEE 802.11 wireless networks by assigning Proof. Suppose that the radius of each piconet is R (see fig- selected Bluetooth devices, called Bluetooth wireless gate- ures 17(a) and (b)). Then, the total coverage of the n piconets ways (BWG), with IEEE 802.11 capabilities. These BWG are is about n · πR 2 . Since the piconets are organized as a circle responsible for providing uninterrupted access to the WAN, whose√radius R satisfies the equation πR 2 ≈ n · πR 2 , or such as the Internet, to the entire Bluetooth network (piconet R ≈ n · R, the estimated number of boundary piconets is: or scatternet). BlueStar is observed to greatly outperform ex- isting Bluetooth under different traffic conditions. The in- πR 2 − π(R − 2R)2 √ corporation of BlueStar into Bluetooth is simple, does not = 4 n−4 . (6) πR 2 incur much overhead, and hence is an excellent enabler for Since, according to our earlier assumption, each boundary co-existence and cooperation of Bluetooth and IEEE 802.11. piconet has at least four non-bridge devices with other poten- Future work in BlueStar includes defining a more elabo- tial piconets (see figure 17(d)), the number of bridge devices rate capacity allocation algorithm. In addition, we plan to √ investigate the correlation amongst the various simulation pa- is at most E = 7n − 44 n − 4. Therefore, the maximum number of BWGs for a scatternet comprised of n circular (or rameters in order to assess their impact on BCS and AFH. near-circular) shaped piconets is E/2 or: Mobility of both IEEE 802.11 and Bluetooth devices and its impact on both systems are also part of our future research. 7n √ −2 4 n−4 . (7) 2 Acknowledgements This work has been supported by the Ohio Board of Regents Proposition 2. For a scatternet comprised of n (n > 0) pi- Doctoral Enhancement Funds and the National Science Foun- √ the maximum number of BWGs needed is 7n/2 − conets, dation under grant CCR-113361. We would like to thank the 24 n − 4. anonymous referees for their valuable comments and sugges- tions. Proof. This follows directly from the previous proposition. Fewer boundary piconets imply fewer non-bridge devices or, in other words, more bridges and thus more required BWGs. References According to the basic geometry theory, for a given coverage area equal to that covered by n piconets, a circle will have the [1] D. Agrawal and Q.-A. Zeng, Introduction to Wireless and Mobile Sys- shortest perimeter. This means a circle will have the fewest tems (Brooks/Cole, 2002). [2] M. Albrecht, M. Frank, P. Martini, M. Schetelig, A. Vilavaara and boundary piconets among all possible shapes. Therefore, the A. Wenzel, IP services over Bluetooth: leading the way to a new mo- upper bound on the number of BWGs (U BWG ) needed in a bility, in: LCN’99 (1999) pp. 2–11. circular-shaped scatternet is also the upper bound on the num- [3] C. Bisdikian, An overview of the Bluetooth wireless technology, IEEE ber of BWGs needed in any-shaped scatternet. From proposi- Comm. Magazine (December 2001) 86–94. tion 1, we have that this upper bound is: [4] BlueHoc, IBM Bluetooth simulator, http://oss.software. ibm.com/developerworks/opensource/bluehoc/. 7n √ [5] Bluetooth SIG, Bluetooth specification, http://www. UBWG = −2 4 n−4 . bluetooth.com. 2 [6] R. Braley, I. Gifford and R. Heile, Wireless personal area network: an Proposition 2 means that any other shaped scatternet topol- overview of the IEEE P802.16 working group, Mobile Computing and ogy will require fewer BWGs as compared to the circular one. Comm. Review 4(1) (1999) 20–27. [7] C. Cordeiro and D. Agrawal, Employing dynamic segmentation for Therefore, through these last two propositions we have found effective co-located coexistence between Bluetooth and IEEE 802.11 a logical bound on the number of BWGs to be placed within WLANs, in: IEEE GLOBECOM, Taiwan (November 2002). a scatternet. Of course, one possible configuration would be [8] C. Cordeiro and D. Agrawal, Mobile ad hoc networking (a tutorial), to have each and every Bluetooth device with a WLAN inter- in: 20th Symposium on Computer Networks (May 2002) pp. 125–186, face, but this is neither cost-effective nor practical. We have http://www.ececs.uc.edu/∼cordeicm/. [9] C. Cordeiro, D. Agrawal and D. Sadok, Piconet interference modeling shown by propositions 1 and 2 that we can do better while and performance evaluation of Bluetooth MAC protocol, IEEE Trans- still providing full coverage to all Bluetooth devices. actions on Wireless Communications 2(6) (2003).
422 CORDEIRO ET AL. [10] C. Cordeiro, S. Das and D. Agrawal, COPAS: Dynamic contention- Carlos de Morais Cordeiro received his Ph.D. in balancing to enhance the performance of TCP over multi-hop wireless computer science and engineering in 2004 from the networks, in: IEEE IC3 N (October 2002). University of Cincinnati, OH, and his M.S. and B.Sc. [11] C. Cordeiro, D. Sadok and D. Agrawal, Piconet interference modeling in computer science in 1998 and 2000, respectively, and performance evaluation of Bluetooth MAC protocol, in: Proceed- from the Federal University of Pernambuco, Brazil. ings of IEEE GLOBECOM, San Antonio, USA (2001). He is presently a research associate in the Center for [12] M. Fainberg and D. Goodman, Analysis of the interference between Distributed and Mobile Computing at the University IEEE 802.11b and Bluetooth systems, in: The IEEE VTC Fall 2001 of Cincinnati. His research interests and papers are (October 2001). mostly in the area of wireless and mobile communi- [13] D. Famolari, Link performance of an embedded Bluetooth personal cations including ad hoc and sensor networks, rout- area network, in: Proceedings of ICC’01, Helsinki (June 2001). ing and MAC protocol design and evaluation, directional antenna systems, [14] H. Gan and B. Treister, Adaptive frequency hopping implementation multicast, TCP over wireless, and short-range radio communication such as proposals for IEEE 802.15.1/2 WPAN, IEEE 802.15-00/367r0 (2000). Bluetooth. He has pending patents involving Bluetooth and IEEE 802.11, [15] M. Gerla, Y. Lee, R. Kapoor, T. Kwon and A. Zanella, UMTS-TDD: and has delivered tutorials in areas such as wireless broadband and mobile A solution for Internetworking Bluetooth piconets in indoor environ- ad hoc and sensor networks. He has prior work experience with IBM in San ments, in: Proceedings of ISCC (July 2002). Jose, CA, and is an IEEE member. [16] N. Golmie, R.E. Dyck and A. Soltanian, Bluetooth and 802.11b in- E-mail: cordeicm@ececs.uc.edu terference: simulation model and system result, IEEE 802.15/195r0 (2001). [17] N. Golmie and F. Mouveaux, Interference in the 2.4 GHz ISM band: Sachin Abhyankar has concluded B.S. and M.S. Impact on the Bluetooth access control performance, in: Proceedings in computer science. He worked as a software en- of the IEEE ICC’01, Helsinki, Finland (June 2001). gineer for couple of years before joining the M.S. [18] IEEE 802.15 Coexistence Task Group 2, http://www.ieee802. program at the University of Cincinnati, where he org/15/pub/TG2.html. worked as a research assistant in the Center for Dis- [19] IEEE Std. 802-11, IEEE standard for wireless LAN medium access tributed and Mobile Computing in the area of wire- control (MAC) and physical layer (PHY) specification (June 1997). less ad hoc networks. He has published various [20] D. Johnson, D. Maltz, Y.-C. Hu and J. Jetcheva, The dynamic source papers related with wireless networks in magazines routing protocol for mobile ad hoc networks (DSR), IETF Internet- and conferences. Presently, he is working as a soft- Draft, draft-ietf-manet-dsr-06.txt (November 2001) (work in progress). ware developer for Qualcomm. [21] O. Kasten and M. Langheinrich, First experiences with Bluetooth in E-mail: sabhyank@ececs.uc.edu the Smart–Its distributed sensor network, in: Proceedings of the Work- shop on Ubiquitous Computing and Communications (PACT) (October Rishi Toshniwal has concluded B.S. and M.S. in 2001). computer science. He worked as a software en- [22] Y. Kim, B. Zhen and K. Jang, Hybrid of listen-before-talk and adap- gineer for couple of years before joining the M.S. tive frequency hopping for coexistence of Bluetooth and IEEE 802.11 program at the University of Cincinnati, where he WLAN, in: Proceedings of IEEE International Conference on Wireless worked as a research assistant in the Center for LANs and Home Networks (December 2001). Distributed and Mobile Computing in the area of [23] Y. Lim, J. Kim, S. Min and J. Ma, Performance evaluation of the wireless ad hoc networks. Besides his thesis on “Dy- Bluetooth-based public Internet access point, in: Proceedings of 15th namic configuration and load balancing in Bluetooth International Conference on Information Networking (2001). personal area networks”, he has published various [24] V. Mehta and M.E. Zarki, A Bluetooth based sensor network for civil papers related with wireless networks in magazines infrastructure health monitoring, Wireless Networks 10(4), Special Is- and conferences. Presently, he is working as a software developer in Epic sue on Ad-Hoc Networking (2004) 401–412. Systems Corporation in Madison. [25] Mobilian, Mobilian TrueRadio, http://www.mobilian.com. E-mail: rtoshniw@ececs.uc.edu [26] C. Perkins, E. Royer and S. Das, Ad hoc on demand distance vector routing (AODV), Internet Draft (March 2001) (work in progress). [27] Possio, Possion PX20, http://www.possio.com. Dharma P. Agrawal is the Ohio Board of Re- [28] Red-M, Genos wirelessware, http://www.red-m.com. gents Distinguished Professor of computer science [29] N. Rouhana and E. Horlait, BWIG: Bluetooth web Internet gateway, in: and computer engineering and the founding Proceedings of ISCC (July 2002). director of the Center for Distributed and Mobile [30] T. Salonidis, P. Bhagwat, L. Tassiulas and R. LaMaire, Distributed Computing at the University of Cincinnati, OH. He topology construction of Bluetooth personal area networks, in: Pro- has been a faculty member at the N.C. State Uni- ceedings of INFOCOM’2001 (April 2001). versity, Raleigh, NC (1982–1998) and the Wayne [31] F. Siegemund and M. Rohs, Rendezvous layer protocols for Bluetooth- State University, Detroit (1977–1982). His current enabled smart devices, in: Proceedings of the 1st International Confer- research interests include wireless and mobile net- ence on Architecture of Computing Systems (April 2002). works, distributed processing, and scheduling tech- [32] J. Sobrinho and A. Krishnakumar, Quality-of-service in ad hoc car- niques. He has authored a textbook Introduction to Wireless and Mobile Sys- rier sense multiple access wireless networks, IEEE J-SAC 17(8) (1999) tems published by Brooks/Cole in August 2002. Dr. Agrawal is an editor for 1353–1368. the Journal of Parallel and Distributed Systems and the International Journal [33] The network simulator (ns-2), http://www.isi.edu/nsnam/ of High Speed Computing. He has served as an editor of the IEEE Computer ns/. Magazine, and the IEEE Transactions on Computers. He has been the Pro- [34] S. Zurbes, W. Stahl, K. Matheus and J. Harrtsen, Radio network per- gram Chair and General Chair for numerous international conferences and formance of Bluetooth, in: Proceedings of IEEE ICC’2000, Vol. 3, meetings. He has received numerous certificates and awards from the IEEE pp. 1536–1567. Computer Society. He was selected for the “Third Millennium Medal” by the [35] J. Zyren, Reliability of IEEE 802.11 Hi Rate DSSS WLANs in a high IEEE for his outstanding contributions. He is a fellow of the IEEE, the ACM, density Bluetooth environment, White Paper, Harris Semiconductors and the AAAS. (June 1999). E-mail: dpa@ececs.uc.edu
You can also read