ASYNCHRONOUS FORMATION OF NON-HIERARCHICAL BLUETOOTH SCATTERNETS

advertisement
ASYNCHRONOUS FORMATION OF NON-HIERARCHICAL BLUETOOTH
SCATTERNETS
Paal Engelstad, Tore E. Jonvik, Do Van Thanh,
University of Oslo (UniK) / Telenor R&D, 1331 Fornebu, Norway
{Paal.Engelstad, tore-erling.jonvik, thanh-van.do}@telenor.com
ABSTRACT
A Bluetooth ad-hoc network consists of Bluetooth
devices interconnected into piconets and piconets
interconnected into scatternets. The specification has not
yet addressed the issue of algorithms for scatternet
formation. Some algorithms have been proposed, but they
are either synchronous, they work only with strongly
connected topologies, or they are master-slave based and
hierarchical of nature. Instead, we propose two alternative
algorithms - one slave-slave-based and one master-slave
based - as a new non-hierarchical approach to
asynchronous scatternet formation on weakly underlying
topologies. Simulations demonstrate that the nonhierarchical asynchronous algorithms form scatternet
structures that are more efficient than those formed by
existing hierarchical proposals. Furthermore, the slaveslave-based algorithm forms scatternet structures that are
considerably more efficient than structures based on
master-slave bridges.
1.
INTRODUCTION
Bluetooth is an open specification for short-range
wireless communication, and is designed for imposing low
battery drain on the wireless terminal. Originally, it was
intended for cable replacement between two devices, but the
specification has gradually been extended to meet the
demand for ad-hoc networking [1]. Due to low
manufacturing costs (down to 5 USD/ Bluetooth chip)
Bluetooth based networks are expected to be the preferred
solution to build inexpensive ad-hoc networks, including
Personal Area Networks (PANs).
A Bluetooth ad-hoc network consists of Bluetooth
devices interconnected into piconets and piconets
interconnected into scatternets. The Bluetooth specification
outlines how two Bluetooth devices interconnect and form a
piconet. When two devices come into each other’s
communication range, they detect each other by first going
through an INQUIRY phase. The following PAGE phase
allows the devices to start establishing a connection. One of
the devices obtains the role of a master, while the other
becomes a slave. Each piconet consists of one master, and
maximum 255 slaves. However, the number of active slaves
in a piconet cannot exceed seven.
Although a device can be master of maximum one
piconet, it can be slave in a number of different piconets, or
master in one piconet and slave in others. Hence, two
piconets can be interconnected if one piconet master is also
slave of the other piconet (i.e. as a master-slave bridge), or
if one device is slave of both piconets (i.e. as a slave-slave
bridge).
No convincing algorithm exists for scatternet
formation, and it is an issue not yet addressed by the
Bluetooth specification. Scatternet formation algorithms
should be based on the following two basic criteria:
1. Weakly connected underlying topologies: A realistic
scatternet formation algorithm should not assume a
strongly connected underlying topology where each
node may connect to any other node in the scatternet.
Instead, the algorithm should work even when there
might be at least two nodes in the same scatternet that
are out of each other’s radio range.
2. Asynchronous scatternet formation: An algorithm
should not mandate that all nodes start forming the
scatternet at the same time (e.g. in terms of an
algorithm comprising several distinct phases). Such
synchronous formations would probably be difficult to
co-ordinate in real usage scenarios. Instead, Bluetooth
devices should be able to enter or leave the scatternet
one by one and at any time. In these events, topology
changes should be handled locally and not propagated
throughout the scatternet.
A number of algorithms have been proposed, including
Bluetooth Topology Construction Protocol (BTCP) [2],
Bluetrees [3], Bluenets [4], LMS [5] and Tree Scatternet
Formation (TSF) [6]. Unfortunately, all of them, except
TSF, are synchronous algorithms or assume strongly
connected underlying topologies. Furthermore, they are
mainly based on using master-slave bridges to form
hierarchical structures.
In this paper, however, we show that non-hierarchical
scatternets are more efficient. Furthermore, non-hierarchical
scatternets open up for structures that are meshed by using
slave-slave-bridges to interconnect the piconets. Indeed,
many researchers, including Bhagwat and Rao [7], argue
that bridges of the master-slave type is wasteful because all
communication in a piconet mastered by the bridge will be
suspended while the master-slave is in the slave role.
The objective of our work was therefore to develop
non-hierarchical and asynchronous scatternet formation
schemes based entirely on master-slave bridges and on
http://folk.uio.no/paalee/
slave-slave-bridges, and compare them with existing
hierarchical master-slave based algorithms. It was natural to
compare our new schemes with TSF, since this is the only
existing proposal that meets the aforementioned criteria.
2.
FRAMEWORK
In addition to being asynchronous and to
accommodating weakly connected device topologies,
algorithms should be designed by a number of principles
targeted at enhancing the efficiency of the resulting
scatternet [2, 4]:
a.
b.
c.
Minimal Piconet Overlap: Two piconets should be
connected by at most one bridge node.
Minimal Bridge Degree: A bridge node should
participate in at most two piconets, i.e. each slaveslave bridge is slave of exactly two masters, while
each master-slave bridge is slave of exactly one other
master or master-slave.
Piconet Size: The algorithm should limit (and
possibly optimize) the size of piconets, i.e. the
number of slaves assigned to one master. Bluetooth
does not allow more than seven slaves per master.
Based on these assumptions and design principles, we
developed the role-state diagram depicted in Figure 1,
which describes how regular nodes participate in scatternet
formation.
cannot connect to more nodes, as was stated by the Piconet
Size design principle above. Hence, interconnections of
nodes result in transitions along the right-directed arrows of
Figure 1. When a node disconnects (e.g. it moves or shuts
down) the transitions go in reverse, i.e. along the leftdirected arrows of Figure 1.
A role-transition matrix can be used to describe state
transitions in the role-state diagram. The role-transition
matrix in Figure 2, for example, describes the transitions of
the TSF algorithm.
Figure 2: Role-transition matrix for TSF, which generates only ms-bridges
(i.e. no ss-bridges). For simplicity, we have only showed the roletransitions for nodes that interconnects (i.e. represented by the rightdirected arrows in Figure 1.)
TSF allows a free node (F) to connect to other free
nodes as shown in role-transition 1. Furthermore, according
to role-transitions 2, 5, 6 and 21 of Figure 2, a free node is
also allowed to connect to a leaf node (i.e. a slave S) or an
intermediate node (i.e. a master-slave bridge ms) of an
established scatternet tree. The free node then becomes a
new leaf node. If it connects through a leaf node, this node
turns into an intermediate node as shown in role-transition 2
and 6. Furthermore, two scatternet trees can combine into
one scatternet tree only by allowing tree-roots (which are
the only masters in the scatternet forest) to interconnect.
When two roots connect, one remains the root of the
combined tree (i.e. a master M), while the other becomes an
intermediate node (i.e. a master-slave bridge). This is
handled by role-transition 13 (Figure 2).
3.
Figure 1: Role-state diagram for scatternet formation. For right-directed
arrows, x represents the role of the node connected to, i.e. x∈{F, M, S, ms}.
For left-directed arrows, x represents the role of the node that disconnects.
At some point in time every device starts out as a free
node F (Figure 1). When it eventually encounters and
connects to another device it becomes either master (i.e. in
role-state M) or slave (i.e. in role-state S) of the new
connection. When a slave or master connects to a node of
another piconet, it may obtain an additional slave-role or
master-role and become an ss- or ms-bridge between the
two piconets. The Minimal Bridge Degree design principle
prohibits that a node obtains more than two roles. When a
Master or master-slave has connected to seven slaves, it
becomes filled (denoted as M' and ms', respectively) and
http://www.unik.no/personer/paalee
TWO ALTERNATIVE NON-HIERARCHICAL
ASYNCHRONOUS ALGORITHMS
3.1. Master-slave-based Scatternet Formation (MSF)
If one is not bound to the hierarchical approach, one
may let a master (or a root in a TSF scatternet) not only
connect to another master (or root), but also connect to free
nodes, slaves or master-slave bridges. Hence, the resulting
scatternet will not be hierarchical, but highly meshed.
We constructed a non-hierarchical master-slave-based
scatternet formation algorithm by allowing such
connections. To derive non-hierarchical scatternets that are
comparable to those of TSF, we mandated that these
connections never produce slave-slave bridges.
Furthermore, by disallowing connections between
masters, we paved the way for a simple and efficient link
formation scheme (Figure 3). The resulting algorithm is
hereafter referred to as the Master-slave-based Scatternet
Formation algorithm (MSF).
may connect to other nodes as a master, i.e. as a result
of an INQUIRY. Hence, the master-slave (ms) in
Figure 3 has an outgoing arrow.
The role-transition diagram of MSF has been omitted due to
space limitations.
Figure 3. Link formation scheme for MSF. An outgoing arrow denotes that
the type of node may perform INQUIRY, while an incoming arrow denotes
that the type of node may perform INQUIRY-SCAN. Connection setup is
possible by matching incoming and outgoing arrows. (Link connection for
ss-nodes has been included for completeness, although ss-bridges are not
anticipated to be present in a scatternet formed by MSF.)
An outgoing arrow from a node in Figure 3 illustrates a
node that may perform INQUIRY while an incoming arrow
to a node illustrates a node that may perform INQUIRYSCAN. All nodes use the same IAC, e.g. the General
Inquiry Access Code (GIAC) [1]. Hence, a connection is
possible by matching an outgoing arrow (INQUIRY) in
Figure 3, with any other incoming arrow (INQUIRYSCAN).
MSF is realized by mandating - in line with the original
Bluetooth specification - that a node that connects from the
INQUIRY search state becomes the master of the
connection, while a node that connects from the INQUIRYSCAN search state becomes the slave.
The connection setup scheme is derived by the
following arguments:
1.
2.
3.
4.
5.
Free nodes (F) should be able to connect to scatternet
nodes (i.e. slaves, masters and/or master-slaves) as well
as to each other. Hence, free nodes must alternate
between INQUIRY and INQUIRY-SCAN. This is
illustrated in Figure 3 by both an outgoing and an
incoming arrow.
Due to the Maximum Bridge Degree design principle,
slave-slaves, if any, cannot connect to other nodes.
Similarly, masters and master-slaves filled with seven
slaved cannot connect to other nodes. Hence, the ss-,
M'-, and ms'- nodes in Figure 3 has neither an outgoing
nor an incoming arrow.
In a scatternet without ss-bridges, slaves cannot obtain
another slave-role of a connection. However, it may
obtain a master-role (i.e. connect by INQUIRY), and
become a master-slave. This is illustrated in Figure 3
by outgoing arrows pointing out from the slave (S).
In a scatternet generating ms-bridges, masters should
obtain another slave-role when connecting to other
nodes (i.e. by connecting in INQUIRY-SCAN), and
become a master-slave as a result of connection setup.
Figure 3 illustrates this by incoming arrows pointing
towards the master (M).
Due to the Maximum Bridge Degree design principle,
master-slaves cannot obtain another slave-role, but they
3.2. Slave-slave-based Scatternet Formation (SSF)
It was natural to develop also a slave-slave-based
algorithm with nearly the same capabilities as TSF and
MSF. Hence, we constructed an algorithm, which in
contrast to the TSF and MSF algorithms never produces
master-slave bridges. This restriction means that unlike for
MSF, masters have no way of connecting to other masters
or master-slaves, but may connect to slaves. In this case, the
connected master remains a master, while the slave
connected to becomes a slave-slave. The resulting algorithm
is hereafter referred to as the Slave-slave-based Scatternet
Formation algorithm (SSF).
The link formation scheme for SSF (Figure 4) is similar
to the scheme of MSF described above. Hence, a node that
connects from the INQUIRY search state becomes the
master of the connection, while a node that connects from
the INQUIRY-SCAN search state becomes the slave.
Figure 4. The link formation scheme of SSF. An outgoing arrow pointing
from a role-state means that a node in this role-state may enter the
INQUIRY search state. An incoming arrow, on the other hand, means that
it may enter the INQUIRY-SCAN search state. Link formation is possible
by matching incoming and outgoing arrows. (Link formation for ms-nodes
has been included for completeness, although ms-bridges are not
anticipated to be present in a scatternet formed by SSF.)
The link formation scheme for SSF is derived by
similar arguments as for MSF, except:
3.
4.
In a scatternet generating ss-bridges, slaves should
obtain another slave-role when connecting to other
nodes (i.e. by connecting in INQUIRY-SCAN), and
hence become a slave-slave as a result of the
formation of a new link. Figure 4 illustrates this by
incoming arrows pointing towards the slave (S).
In a scatternet without ms-bridges, a master cannot
obtain another slave-role as a result of formation of a
link to another node. However, it may remain a master
of the new connection (i.e. connect by INQUIRY).
Figure 4 illustrates this by outgoing arrows pointing
out from the Master (M).
5.
Due to the Minimal Bridge Degree design principle, a
master-slave, if any, cannot obtain another slave-role,
but it may connect to other nodes as a master, i.e. as a
result of an INQUIRY. Hence, the master-slave (ms)
in Figure 4 has an outgoing arrow. For completeness,
we have shown master-slaves in Figure 4, although a
scatternet formed only by SSF, will not contain any
master-slave bridges.
The role-transition diagram of SSF has been omitted due to
space limitations.
4.
node in the same scatternet, the less is the communication
session’s consumption of network bandwidth and the less is
the delay imposed on the session. Furthermore, fewer hops
on average mean a more meshed network with lower
probability that communicating pairs of nodes communicate
over the same node, i.e. an indication that communication is
spread more evenly throughout the network. Hence, the
average shortest path (ASP) represents a way to assess
scatternet topology with respect to communication
efficiency [4].
The ASP-ratio is defined as the ASP of a scatternet
relative to theoretical minimal limit ASP0:
EVALUATION OF FORMATION ALGORITHMS
4.1. Sets of evaluation criteria
The effectiveness of a specific scatternet formation
scheme comprises two parts. The first part is an assessment
of how efficient the scatternet formation algorithm is in
terms of overhead and delay (i.e. during the process of
scatternet formation). Our proposed schemes do not require
any reconfigurations or coordination throughout the
scatternet. Instead, they are straightforward - and very
efficient - unit-time schemes where overhead and delay are
of little importance.
The second part relates to the efficiency of the
operation of scatternets formed by the algorithm, (i.e. after
and as a result of the topology created by the scatternet
formation process). For the latter part, we have developed
evaluation metrics to assess the topology formed by any
scatternet formation algorithm. We present these evaluation
criteria in the following sub-sections.
4.2. Number of disconnected scatternets (Connectivityratio)
Since the purpose of scatternet formation is to ensure
connectivity for communication between devices, an overall
goal is to maximize connectivity. Thus, an algorithm should
interconnect a given set of nodes into as few N disconnected
scatternets as possible. It is evident that the theoretical
lower limit, N0, of the number of disconnected scatternets
formed by any algorithm, is found by traversing the
visibility graph, as defined in [4], instead of traversing the
links formed by the scatternet algorithm. Hence, the
connectivity-ratio, rconn, defined as
rconn = N/N0
(1)
gives a good measure of the overall connectivity provided
by the scatternet formation algorithm.
4.3. Average Shortest Path (ASP-ratio)
Apart from ensuring connectivity, scatternet formation
algorithm should also ensure efficient communication
between devices within the formed scatternets. The fewer
hops a node must traverse to communicate with another
rasp = ASP/ASP0
(2)
ASP0 is found by traversing the links of the visibility graph
between the scatternet nodes, instead of the links formed by
the scatternet algorithm.
4.4. Scatternet structure (Role-state ratios)
How M-, S-, ss- and ms- roles are distributed
throughout the scatternet nodes might also influence the
communication efficiency in the scatternet.
The piconet density, rp, is given by rp= nm/n. Here nm is
the total number of masters (i.e. the total number of
piconets) and n is the total number of nodes in the
scatternet. Unnecessary high piconet density might result in
more radio interference and less bandwidth to each piconet.
The slave degree, rsd= nsr/nm is the total number of
slave-roles nsr per master, derived from the number of pure
slaves, ns, the number of slave-slaves, nss, and the number of
master-slaves, nms, in the scatternet. A too high ns means
that piconet bandwidth is shared between unnecessary many
slaves, leaving little bandwidth to each slave. A too low ns,
on the other hand, means higher piconet density and higher
radio interference. Wang et al. [4] argue that the optimal
configuration is around five slaves per master.
Finally the slave-slave ratio, rss= nss/nm, and the masterslave ratio, rms= nms/nm, measure the average number of
slave-slaves per piconet and the average number of masterslaves per piconet, respectively.
5.
SIMULATIONS AND COMPARISONS
5.1. Simulations of scatternet formation
By simulations we placed Bluetooth devices on random
locations in a 30m-by-30m square. For simplicity, a node
was allowed to communicate with all other nodes located
within 10m - this is represented by arcs in the visibility
graph - and with no nodes outside this range. Nodes were
placed one by one inside the square. Each time a node
appeared in the square, the scatternet formation algorithm
was run on the node and scatternet configuration in the
square. The resulting scatternet configuration was used as a
starting point when the next node arrived in the square.
Nodes appeared to a maximum of 40 nodes. This simulation
run was repeated 100 times for each scatternet algorithm
simulated. Simulations were done using Matlab.
Upon a node’s arrival in the square, the node detected
and started connecting to an arbitrary of its neighboring
nodes in accordance with the scatternet formation algorithm
simulated. After an arriving node connected and attached to
another node as a free node (F), it continued detecting and
connecting to another arbitrarily selected neighbor, using
the slave (S) or master (M) role it obtained as a result of the
first connection. (Whether it became slave or master
depends on the role of the node it connected to, and could
be read directly from the role transition matrix of the
scatternet formation algorithm simulated.) It continued
detecting and connecting to neighbors until it had tried
connecting to all of its neighbors.
5.2. Comparison by simulations
Simulations showed that TSF had considerably worse
connectivity ratio than both non-hierarchical alternative
algorithms MSF and SSF (Figure 5). The reason is that the
strictly hierarchical approach puts strong restrictions on
how nodes can interconnect, and many forms of
interconnections are prohibited. TSF allows two scatternet
trees to combine into one scatternet tree only by direct
connection between the two scatternet-roots.
of each scatternet. Thus, the more nodes added to an ss-only
system, the better the connectivity! Indeed, the connectivity
ratios of SSF approached 1 as the number of nodes, n,
increased (Figure 5).
Scatternets with bridges only of the master-slave type,
on the other hand, are mainly populated by slaves and
master-slaves. As the number of nodes in the system
increases, a new free node will easily connect to a slave of
an existing scatternet, and become a slave. Hence, it will not
worsen the situation by creating new disconnected
scatternets. However, when the free node has become slave
of one scatternet, it may not connect to slaves or masterslaves of other scatternets and thereby heal
disconnectedness. Indeed, the connectivity ratios for MSF
and TSF flattened out and stabilized as the number of
nodes, n, increased (Figure 5).
For each set of simulations with one scatternet
algorithm we collected all scatternets formed and grouped
them by the number of nodes in the scatternet. For each
group of scatternets, we calculated the average ASP ratio
(Figure 6).
Figure 6. The two non-hierarchical algorithms, MSF and SSF, yield better
shortest path performance than TSF does. The ss-bridge based algorithm,
SSF, performs better than do the ms- based algorithms, TSF and MSF.
Figure 5. The two non-hierarchical algorithms, MSF and SSF, yield better
connectivity performance than the hierarchical TSF algorithm does. The ssbased algorithm, SSF, performs better than do the ms- based algorithms,
TSF and MSF.
Furthermore, we observed that the slave-slave-based
algorithm, SSF, performed better than the master-slavebased algorithms, MSF and TSF (Figure 5). Simulations
showed that scatternets with only ss-bridges are mainly
populated with masters, slaves and slave-slave bridges.
Hence, when a new free node arrives, it may easily
interconnect two disconnected scatternets by connecting to
one slave of each scatternet or by connecting to one master
Figure 6 shows that the non-hierarchical schemes
produce scatternets with
fewer hops between
communicating nodes on average than the hierarchical
algorithm does. The reason is that hierarchical scatternets
force communication along a tree structure, while the nonhierarchical algorithms, MSF and SSF, are more meshed
and can provide more direct paths. Furthermore, the slaveslave-based algorithm produces the flattest and most
efficient scatternet topologies even when compared to the
non-hierarchical ms-based algorithm, MSF (except for
scatternets with between 3 and 6 nodes, where MSF
scatternets performed slightly better).
Simulation also showed that the number of slaves per
master in a scatternet formed by TSF, is comparable with
that of the MSF algorithm, while it is considerably higher
for the SSF algorithm (Figure 7). The main reason is that
the two former algorithms use only ms-bridges and hence
each bridge introduces a new piconet, in contrast to the
latter algorithm, which uses only ss-bridges.
For all algorithms, the number of slaves per piconet is
far below the Bluetooth limit of maximum seven active
slaves per master. However, SSF is closer to the value of 5
slaves per master, which is claimed to be optimal by several
researchers [4].
topologies (i.e. when not all scatternet devices are within
radio range of each other).
Our simulations demonstrated that non-hierarchical
algorithms form scatternet topologies that are considerably
more efficient, in terms of connectivity and average shortest
path, than those formed by comparable master-slave-based
algorithms.
Researchers have emphasized that slave-slave bridges
are probably more optimal than using master slave-bridges,
in terms of efficient bridge management. Our simulations
also supported the advantages of slave-slave based
scatternets. Indeed, the slave-slave based scatternet
formation algorithm proved to have the highest ability to
accommodate connectivity between nodes.
A number of other proposed algorithms have
implemented measures to avoid that piconets are filled with
seven slaves. Our simulations indicate that such measures
might not be necessary.
The work presented in this paper should be extended to
compare with the quite large number of proposed scatternet
formation algorithms other than only TSF. Further work is
also required to translate the ASP-metrics proposed in this
paper into concrete communication performance on a
Bluetooth scatternet.
REFERENCES
Figure 7. Comparing average number of slaves per piconet of SSF with
that of the master-slave-based algorithms TSF and MSF. For all three
algorithms the average number of slaves per master is below the Bluetooth
limit of maximum seven active slaves per master.
Finally, we investigated the importance of the slavedegree limit of maximum seven slaves per master. We
eliminated the slave-degree limit and simulated within a
square of only 7m-by-7m, which corresponds to a strongly
connected topology with the highest probability of filling a
piconet with many slaves.
With 30 nodes, less than 0.1 % of the piconets formed
by TSF and MSF obtained more than seven slaves.
Similarly, only 11% of the piconets formed by SSF with 30
fully connected nodes obtained more than seven slaves.
Hence, the limit of seven slaves per master has little
importance for the asynchronous formation algorithms that
we studied. Many proposed scatternet formation algorithms
are based on reconfiguration of the scatternet when a new
node connects to avoid that a piconet is filled with seven
slaves. Our simulations, however, indicate that
reconfiguration might not be necessary.
6.
CONCLUDING REMARKS
We have argued that a scatternet formation algorithm
should allow for asynchronous scatternet formation, and it
should work well on weakly connected underlying
[1] “Specification of the Bluetooth System,” Bluetooth Special
Interest Group document, http://www.bluetooth.com/, Dec.
1999.
[2] Salonidis et al. ”Proximity Awareness and Ad Hoc
Network Establishment in Bluetooth”, Technical Research
Report, http://www.isr.umd.edu/CSHCN, 2001.
[3] Zaruba, G.V., Basagni, S., Chlamtac, I., “Bluetrees –
Scatternet Formation to Enable Bluetooth-Based Ad Hoc
Networks”, In Proceedings of the IEEE International
Conference on Communications (ICC) 2001, Helsinki,
Finland, June 2001.
[4] Wang, Z., Thomas, R.J., Haas, Z., “Bluenet – a New
Scatternet Formation Scheme”, 35th Hawaii International
Conference on System Science (HICSS-35), Big Island
Hawaii, January 7-10, 2002.
[5] Law, C., Mehta, A.K., Sui, K. -Y., “Performance of a New
Bluetooth Scatternet Formation Protocol”, In Proc. of the
ACM Symposium on Mobile Ad Hoc Networking and
Computing (MobiHoc) 2001, Long Beach, CA, USA, Oct.
2001.
[6] Tan et al., ”Forming Scatternets from Bluetooth Personal
Area Networks”, MIT Technical Report, MIT-LCS-TR826,
http://nms.lcs.mit.edu/projects/blueware/body.htm,
October 2001.
[7] Bhagwat, P and Rao, S.P., ”On the characterization of
Bluetooth scatternet topologies”, MobiHoc 2000,
http://www.cs.umd.edu/
pravin/bluetooth, June 2000.
Download