performance modeling and analysis of bluetooth networks polling, scheduling, and traffic control

319 863 0
performance modeling and analysis of bluetooth networks polling, scheduling, and traffic control

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

AU3157_half title 6/14/05 10:36 AM Page 1 PERFORMANCE MODELING AND ANALYSIS OF BLUETOOTH NETWORKS © 2006 by Taylor & Francis Group, LLC. AUERBACH PUBLICATIONS www.auerbach-publications.com To Order Call: 1-800-272-7737 • Fax: 1-800-374-3401 E-mail: orders@crcpress.com Agent-Based Manufacturing and Control Systems: New Agile Manufacturing Solutions for Achieving Peak Performance Massimo Paolucci and Roberto Sacile ISBN: 1574443364 Curing the Patch Management Headache Felicia M. Nicastro ISBN: 0849328543 Cyber Crime Investigator's Field Guide, Second Edition Bruce Middleton ISBN: 0849327687 Disassembly Modeling for Assembly, Maintenance, Reuse and Recycling A. J. D. Lambert and Surendra M. Gupta ISBN: 1574443348 The Ethical Hack: A Framework for Business Value Penetration Testing James S. Tiller ISBN: 084931609X Fundamentals of DSL Technology Philip Golden, Herve Dedieu, and Krista Jacobsen ISBN: 0849319137 The HIPAA Program Reference Handbook Ross Leo ISBN: 0849322111 Implementing the IT Balanced Scorecard: Aligning IT with Corporate Strategy Jessica Keyes ISBN: 0849326214 Information Security Fundamentals Thomas R. Peltier, Justin Peltier, and John A. Blackley ISBN: 0849319579 Information Security Management Handbook, Fifth Edition, Volume 2 Harold F. Tipton and Micki Krause ISBN: 0849332109 Introduction to Management of Reverse Logistics and Closed Loop Supply Chain Processes Donald F. Blumberg ISBN: 1574443607 Maximizing ROI on Software Development Vijay Sikka ISBN: 0849323126 Mobile Computing Handbook Imad Mahgoub and Mohammad Ilyas ISBN: 0849319714 MPLS for Metropolitan Area Networks Nam-Kee Tan ISBN: 084932212X Multimedia Security Handbook Borko Furht and Darko Kirovski ISBN: 0849327733 Network Design: Management and Technical Perspectives, Second Edition Teresa C. Piliouras ISBN: 0849316081 Network Security Technologies, Second Edition Kwok T. Fung ISBN: 0849330270 Outsourcing Software Development Offshore: Making It Work Tandy Gold ISBN: 0849319439 Quality Management Systems: A Handbook for Product Development Organizations Vivek Nanda ISBN: 1574443526 A Practical Guide to Security Assessments Sudhanshu Kairab ISBN: 0849317061 The Real-Time Enterprise Dimitris N. Chorafas ISBN: 0849327776 Software Testing and Continuous Quality Improvement, Second Edition William E. Lewis ISBN: 0849325242 Supply Chain Architecture: A Blueprint for Networking the Flow of Material, Information, and Cash William T. Walker ISBN: 1574443577 The Windows Serial Port Programming Handbook Ying Bai ISBN: 0849322138 OTHER AUERBACH PUBLICATIONS © 2006 by Taylor & Francis Group, LLC. AU3157_title 6/14/05 10:34 AM Page 1 Boca Raton London New York Singapore PERFORMANCE MODELING AND ANALYSIS OF BLUETOOTH NETWORKS POLLING, SCHEDULING, AND TRAFFIC CONTROL JELENA MISIC VOJISLAV B. MISIC © 2006 by Taylor & Francis Group, LLC. Published in 2006 by Auerbach Publications Taylor & Francis Group 6000 Broken Sound Parkway NW, Suite 300 Boca Raton, FL 33487-2742 © 2006 by Taylor & Francis Group, LLC Auerbach is an imprint of Taylor & Francis Group No claim to original U.S. Government works Printed in the United States of America on acid-free paper 10987654321 International Standard Book Number-10: 0-8493-3157-9 (Hardcover) International Standard Book Number-13: 978-0-8493-3157-2 (Hardcover) Library of Congress Card Number 2005045358 This book contains information obtained from authentic and highly regarded sources. Reprinted material is quoted with permission, and sources are indicated. A wide variety of references are listed. Reasonable efforts have been made to publish reliable data and information, but the author and the publisher cannot assume responsibility for the validity of all materials or for the consequences of their use. No part of this book may be reprinted, reproduced, transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, microfilming, and recording, or in any information storage or retrieval system, without written permission from the publishers. For permission to photocopy or use material electronically from this work, please access www.copyright.com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC) 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that provides licenses and registration for a variety of users. For organizations that have been granted a photocopy license by the CCC, a separate system of payment has been arranged. Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for identification and explanation without intent to infringe. Library of Congress Cataloging-in-Publication Data Misic, Jelena. Performance modeling and analysis of Bluetooth networks : polling, scheduling, and traffic control / Jelena Misic, Vojislav B. Misic. p. cm. Includes bibliographical references and index. ISBN 0-8493-3157-9 (alk. paper) 1. Bluetooth technology. 2. Network performance (Telecommunication) I. Misic, Vojislav B. II. Title TJ5103.3.M57 2005 004.6'2—dc22 2005045358 Visit the Taylor & Francis Web site at http://www.taylorandfrancis.com and the Auerbach Publications Web site at http://www.auerbach-publications.com Taylor & Francis Group is the Academic Division of T&F Informa plc. AU3157_Discl.fm Page 1 Tuesday, June 14, 2005 10:32 AM © 2006 by Taylor & Francis Group, LLC. to Bratislav and Velibor © 2006 by Taylor & Francis Group, LLC. Contents 1 Introduction to Bluetooth 1.1 Lower layers of the architecture: RF and baseband 1.2 Higher layers of the architecture: LMP and L2CAP 1.3 Data transport and link types 1.4 Connection state and related modes 1.5 Piconet formation: inquiry and paging 2 Intra-piconet polling schemes 2.1 Bluetooth communications and intra-piconet polling 2.2 Classification of polling schemes 2.3 Onsegmentationandreassemblypolicies 2.4 Piconet model and performance indicators 3 Analysis of polling schemes 3.1 Performance of exhaustive service 3.2 Performance of 1-limited service 3.3 E-limited polling 3.4 Access and downlink delay 4 The impact of finite buffers 4.1 Queue length distribution in imbedded Markov points 4.2 Uplink queue length distribution 4.3 Experimental results 5 Admission control 5.1 Admission control based on queue stability 5.2 Admission control based on access delay 5.3 Admission control based on cycle time 6 Performance of TCP traffic 6.1 System model and related work 6.2 TCPwindowsize 6.3 Queueing analysis of the token bucket filter 6.4 The outgoing queue at the baseband level 6.5 Performance assessment © 2006 by Taylor & Francis Group, LLC. 7 Piconets with synchronous traffic 7.1 Why the built-in SCO links are bad 7.2 pSCO: an improved scheme for synchronous traffic 7.3 Performance of the pSCO scheme 8 Adaptive polling and predefined delay bounds 8.1 Adaptive bandwidth allocation 8.2 Adaptive polling with cycle control: the ACLS scheme 8.3 ACLS performance 8.4 Improving the performance of ACLS 9 Scatternet formation 9.1 Introduction 9.2 BSFinsingle-hopnetworks 9.3 BSF in multi-hop networks 9.4 Conclusions 10 Bridge topologies and scheduling 10.1 Bridge topologies 10.2 Approaches to bridge scheduling 10.3 Bridge scheduling in practice 10.4 The queueing model and traffic assumptions 11 Rendezvous-based bridge scheduling 11.1 MS bridge topology 11.2 Packetdelays:theMSbridgecas 11.3 Performance of the MS bridge 11.4 SS bridge topology 11.5 Packetdelays:theSSbridgecase 11.6 Performance of the SS bridge 12 Adaptive bridge scheduling 12.1 Minimizationofdelays 12.2 Adaptive management: the case of the MS bridge 12.3 Adaptive management: the case of the SS bridge 13 Walk-in bridge scheduling 13.1 Scatternet model 13.2 Service,vacation,andcycletimes 13.3 Calculating the packet delays 13.4 Stability considerations 13.5 Scalability © 2006 by Taylor & Francis Group, LLC. 14 Scatternet with finite buffers 14.1 Scatternet model with finite buffers 14.2 Uplink/downlink queue length distribution in Markov points 14.3 Service,vacation,andcycletimes 14.4 Blocking probability and packet delays 14.5 Simulationresults A Probability generating functions and Laplace transforms References © 2006 by Taylor & Francis Group, LLC. List of Figures 1.1 Basic blocks of the Bluetooth core system architecture 1.2 Bluetooth piconet is a group of devices within the radio range that share the physical radio channel 1.3 TDD master-slave communication in Bluetooth. Gray triangles de- note data packets, white triangles denote empty (POLL and NULL) packets 1.4 Generic data transport architecture 1.5 Overview of transport architecture entities and hierarchy 1.6 Connection states and modes 1.7 Pertaining to the operation of the HOLD mode 1.8 Message exchange during the negotiation of the switch to HOLD mode 1.9 Pertaining to the operation of the SNIFF mode 1.10 Message exchange to negotiate and terminate SNIFF mode 2.1 Bluetooth piconet as a single-server, multiple-input polling system 2.2 BNEP protocol stack, adapted from [Bluetooth SIG, 2001a] 2.3 BNEP Ethernet packet segmentation 2.4 The queueing model of the Bluetooth piconet 3.1 Timing diagram of exhaustive polling 3.2 Pertaining to the concept of server vacation 3.3 Timingdiagramof1-limitedpolling 3.4 End-to-end delay (in units of T = 625µs) vs. packet burst arrival rate λ and mean burst size B 3.5 Performance of exhaustive and 1-limited polling schemes 3.6 TimingdiagramofE-limitedpolling 3.7 Probabilities that the slave uplink queue contains 0, 1, or 2 packets upon return from the vacation as functions of the total piconet load andvariationofloadamongtheslaves 3.8 Mean cycle time C as a function of the total piconet load and varia- tionofloadamongtheslaves 3.9 Analytical and simulation results for access and end-to-end delay as functionsofburstarrivalrateandmeanburstsize. 3.10 Packet delays as functions of mean burst size and the polling param- eter M © 2006 by Taylor & Francis Group, LLC. 3.11 Optimal value of M as the function of mean burst size B 4.1 Queueing model of a single piconet with finite buffers 4.2 Blocking probability at the master buffer as the function of piconet load ρ 4.3 Performance of the finite slave uplink buffer as the function of pi- conet load ρ 4.4 Performance of the finite slave uplink buffer as the function of mean burst size B 4.5 Blocking probability at the master buffer as the function of mean burst size B 4.6 Performance of finite slave uplink buffer as the function of the polling parameter M 4.7 Performance of finite master buffer as the function of the polling parameter M 5.1 Pertaining to the operation of the QS admission control scheme 5.2 Pertaining to the operation of AD admission control scheme 5.3 Pertaining to the operation of CT admission control scheme 6.1 Architectural blocks of the Bluetooth L2CAP layer 6.2 The path of the TCP segment and its acknowledgment. 6.3 CharacteristicsofTCPwindowsize 6.4 Pertaining to the analysis of the token bucket filter 6.5 TCP performance as the function of the buffer size S, in the piconet withtwoslaves 6.6 TCP performance as the function of the polling parameter M,inthe piconet with two slaves 6.7 TCP performance as the function of token rate, in the piconet with twoslaves 6.8 TCP performance as the function of the buffer size S, in the piconet withsevenslaves 6.9 TCP performance as functions of token rate and the polling parame- ter M, in the piconet with seven slaves 7.1 Timing of SCO communications with different packet types 7.2 Timing of pseudo-SCO links 7.3 Mean access delay for asynchronous traffic in the presence of pSCO connections as the function of M and B 7.4 Optimal value of M as a function of the mean burst size B 7.5 End-to-end delay for ACL traffic in the presence of pSCO connec- tions with DH3 packets, as the function of M and B. 7.6 Maximum achievable data rate (in bps) under E-limited service with M = 2, as a function of polling interval and mean burst size © 2006 by Taylor & Francis Group, LLC. [...]... possible answers and their relative advantages and disadvantages It should come as no surprise, then, that a number of researchers have focused their attention on the performance analysis of Bluetooth networks and on algorithms that complement the of cial Bluetooth specification, striving toward better understanding © 2006 by Taylor & Francis Group, LLC of the operation of Bluetooth networks and, consequently,... should poll its slaves and details of the operation of Bluetooth scatternets, in particular the scheduling of shared devices – bridges All of these are vital factors that affect both the design of Bluetooth devices-hardware, software, and firmware – but also the design, operation, and performance of Bluetooth networks As a result, the developers as well as users are left with a number of open issues but... tasks, and a number of Bluetooth- enabled devices have appeared on the market In order to facilitate the development and acceptance of Bluetooth devices, systems, and applications, the development and promotion of Bluetooth technology has been coordinated through the Bluetooth Special Interest Group (SIG) The Bluetooth SIG was founded in 1999 by Agere Systems, IBM, Intel, Microsoft, Motorola, Nokia, and. .. the interaction of Bluetooth networks with one another, as well as with other wireless networks operating in the same frequency band In most succinct terms, the goal of this book is twofold: first, to provide insights into the performance of Bluetooth networks using a dual foundation of rigorous analytical approach based on queueing theory and discrete event simulation Second, to propose and validate solutions... piconets, and it starts with an overview of intra-piconet polling techniques in Chapter 2 The queueing theoretic analysis of exhaustive, 1limited, and E-limited polling is presented in Chapter 3 This analysis assumes that the device buffers are of infinite size; the impact of finite device buffers on performance is dealt with in Chapter 4 The next two Chapters discuss the issue of admission control and the performance. .. Introduction to Bluetooth In this Chapter we will describe the basic operation of the Bluetooth core system and outline the most important characteristics of Bluetooth communications, in particular those that are relevant to our main goal – performance analysis of Bluetooth networks It may be interesting to note that the Bluetooth specification has undergone a few major updates, the most recent of cial one... the baseband controller and link manager that provides a uniform method of accessing the Bluetooth baseband capabilities 1.1 Lower layers of the architecture: RF and baseband The RF unit performs the functions corresponding to the PHY (physical layer) of the IEEE 802.11 protocol stack [IEEE, 2001] It operates in the unlicensed ISM (Industrial, Scientific and Medical) band at 2.4 GHz A total of 79 RF... basic tenets of data communication in Bluetooth piconets As will be seen, the Bluetooth networks operate in a rather different manner from other wireless networks Therefore, the known performance analysis results from other wireless networks cannot be directly applied in the Bluetooth environment, and in-depth analyses of the performance are necessary To that end, we will also review and roughly classify... immediate succession) and that the action of polling the slave and obtaining its response takes time, even when there are no data packets to send in either direction The polling scheme is obviously the main determinant of performance of Bluetooth piconets (It is also one of the main determinants of performance of Bluetooth scatternets, as will be seen later.) Note that the terms “polling” and “scheduling”... treatment of Bluetooth data communications; while far from being exhaustive—version 2.0 of the Bluetooth specification has over 1,200 pages!—the information presented in Chapter 1 should equip the readers with basic tenets of Bluetooth data communications and allow them to easily follow subsequent discussions The remainder of the book consists of two parts The first part is devoted to performance analysis of . Page 1 Boca Raton London New York Singapore PERFORMANCE MODELING AND ANALYSIS OF BLUETOOTH NETWORKS POLLING, SCHEDULING, AND TRAFFIC CONTROL JELENA MISIC VOJISLAV B. MISIC © 2006 by Taylor &. trademarks, and are used only for identification and explanation without intent to infringe. Library of Congress Cataloging-in-Publication Data Misic, Jelena. Performance modeling and analysis of Bluetooth. Piconet model and performance indicators 3 Analysis of polling schemes 3.1 Performance of exhaustive service 3.2 Performance of 1-limited service 3.3 E-limited polling 3.4 Access and downlink

Ngày đăng: 04/07/2014, 07:10

Từ khóa liên quan

Mục lục

  • au3157_fm.pdf

    • PERFORMANCE MODELING AND ANALYSIS OF BLUETOOTH NETWORKS

      • Dedication

      • Contents

      • List of Figures

      • List of Tables

      • Preface

      • AU3157.pdf

        • Contents

        • PERFORMANCE MODELING AND ANALYSIS OF BLUETOOTH NETWORKS

          • Chapter 1 Introduction to Bluetooth

            • 1.1 Lower layers of the architecture: RF and baseband

            • 1.2 Higher layers of the architecture: LMP and L2CAP

            • 1.3 Data transport and link types

            • 1.4 Connection state and related modes

            • 1.5 Piconet formation: inquiry and paging

            • Chapter 2 Intra-piconet polling schemes

              • 2.1 Bluetooth communications and intra-piconet polling

              • 2.2 Classification of polling schemes

              • 2.3 On segmentation and reassembly policies

              • 2.4 Piconet model and performance indicators

              • Chapter 3 Analysis of polling schemes

                • 3.1 Performance of exhaustive service

                • 3.2 Performance of 1-limited service

                • 3.3 E-limited polling

                • 3.4 Access and downlink delay

                • Chapter 4 The impact of finite buffers

                  • 4.1 Queue length distribution in imbedded Markov points

Tài liệu cùng người dùng

Tài liệu liên quan