Upload
alfred-neal
View
215
Download
0
Tags:
Embed Size (px)
Citation preview
Formation, Routing, and Maintenance ProtocFormation, Routing, and Maintenance Protocols ols for the BlueRing Scatternet of Bluetfor the BlueRing Scatternet of Bluetoothsooths
Ting-Yu Lin, Yu-Chee Tseng, Keng-Ming Chang and Chun-Liang TuHawaii Int’l Conf. on System Sciences (HICSS), 2003.
speaker : Chi-Chih Wu
OutlineOutline
• IntroductionIntroduction• The BlueRing Formation ProtocolThe BlueRing Formation Protocol• The BlueRing Routing ProtocolThe BlueRing Routing Protocol• The BlueRing Maintenance ProtocolThe BlueRing Maintenance Protocol• Analysis and Simulation ResultsAnalysis and Simulation Results• ConclusionsConclusions
• Review of BluetoothReview of Bluetooth– MasterMaster– SlaveSlave– PiconetPiconet– ScatternetScatternet– RelayRelay– Operational ModesOperational Modes
• ActiveActive• SniffSniff• HoldHold• ParkPark
– Frequency-Hopping ChannelFrequency-Hopping Channel
Introduction(1/3)Introduction(1/3)
1
43
2
5
6
7
Introduction(2/3)Introduction(2/3)• BlueRingBlueRing
– Scatternet StructureScatternet Structure• A Cycle of PiconetsA Cycle of Piconets
– Similar to the IEEE 802.5 token-ringSimilar to the IEEE 802.5 token-ring– BridgeBridge : : relay packetsrelay packets
• SniffSniff• HoldHold• ParkPark
Introduction(3/3)Introduction(3/3)• BlueRingBlueRing
– BlueRing Architecture’s FeaturesBlueRing Architecture’s Features•Stateless (no routing table)Stateless (no routing table)•Scalable to median-sizeScalable to median-size(50-70(50-70 devices)devices) scatternet scatternet
– Focuses of the PaperFocuses of the Paper•PAN (personal area network)PAN (personal area network)• IndoorIndoor•Low-powerLow-power•Low-complexityLow-complexity•Short-rangeShort-range
The BlueRing Formation Protocol(1/The BlueRing Formation Protocol(1/3)3)
• Network ArchitectureNetwork Architecture– A Cycle of PiconetsA Cycle of Piconets– DirectionDirection :: clock-wiseclock-wise– Upstream PiconetUpstream Piconet– Downstream PiconetDownstream Piconet– Upstream BridgeUpstream Bridge– Downstream BridgeDownstream Bridge– Assume that all Bluetooth devices are Assume that all Bluetooth devices are within the within the
radio coverage of each otherradio coverage of each other
1
23
4
6
5
Inquiry : P4
Inquiry Scan : 1-P4
Inquiry : P2
Inquiry Scan : 1-P2
The BlueRing Formation Protocol(2/The BlueRing Formation Protocol(2/3)3)
• Initial FormationInitial Formation
Inquiry : P1
Inquiry Scan : 1-P1
LEADER
The BlueRing Formation Protocol(3/The BlueRing Formation Protocol(3/3)3)
• Initial FormationInitial Formation
MASTER1 2
3
14
16
5
11
6
13
15
4
7
9
8
1210
MASTER
MASTER
MASTER
MASTER
MASTER
Leader
The BlueRing Routing Protocol(1/The BlueRing Routing Protocol(1/5)5)• Packet Relaying ProceduresPacket Relaying Procedures
– Relay bitRelay bit• Packet needs to be RelayedPacket needs to be Relayed
– Dirty bitDirty bit• Master touches packetMaster touches packet
– DADA(dest BD_ADDR)(dest BD_ADDR)
– SASA(source BD_ADDR)(source BD_ADDR)
Access Access CodeCode
HeaderHeader PayloadPayload
PayloaPayload d headerheader
Relay bitRelay bit Dirty Dirty bitbit
Payload (data)Payload (data)
PayloaPayload d headerheader
RelaRelay bity bit
DirtDirty bity bit
DA(dest BDA(dest BD_ADDR)D_ADDR)
SA(source SA(source BD_ADDBD_ADDR)R)
Payload (data)Payload (data)
1 1
1 1 48 48
PACKET
Single-hop communication
multi-hop communication
The BlueRing Routing Protocol(2/The BlueRing Routing Protocol(2/5)5)
The BlueRing Routing Protocol(3/The BlueRing Routing Protocol(3/5)5)
The BlueRing Routing Protocol(4/The BlueRing Routing Protocol(4/5)5)
ssdd
Payload Payload headerheader
11 00 dddd ssss Payload (data)Payload (data)
Payload Payload headerheader
11 11 dddd ssss Payload (data)Payload (data)
Payload Payload headerheader
11 11 dddd ssss Payload (data)Payload (data)
Payload Payload headerheader
11 11 dddd ssss Payload (data)Payload (data)
Payload Payload headerheader
11 11 dddd ssss Payload (data)Payload (data)
Payload Payload headerheader
00 11 dddd ssss Payload (data)Payload (data)
relayrelay dirtydirty DADA SASA
The BlueRing Routing Protocol(5/The BlueRing Routing Protocol(5/5)5)• Bridging PolicyBridging Policy
– TTbb :: threshold value in a bridgethreshold value in a bridge– TTmm :: threshold value in a masterthreshold value in a master– TToutout :: timeout value to switch piconettimeout value to switch piconet
• From Upstream to DownstreamFrom Upstream to Downstream– Exceeds TExceeds Tbb– TToutout expires expires
• From Downstream to UpstreamFrom Downstream to Upstream– Buffered packets have been drainedBuffered packets have been drained– Exceeds TExceeds Tmm
master
birdge
master
Piconet B
Piconet A
The BlueRing Maintenance Protocol(1The BlueRing Maintenance Protocol(1/3)/3)
• Single-Point FailureSingle-Point Failure– A Control Bit Called A Control Bit Called
DirectionDirection– OptionalOptional
• A List of Destination A List of Destination AddressesAddresses
s
dPayload Payload headerheader
RelaRelay y bitbit
Dirty Dirty bitbit
Direction Direction bitbit
DADA SASA Payload Payload (data)(data)
The BlueRing Maintenance Protocol(2The BlueRing Maintenance Protocol(2/3)/3)
• Multi-Point FailureMulti-Point Failure– GIACGIAC– DIACDIAC11 and DIAC and DIAC22
• 63 reserved DIACs63 reserved DIACs– No two critical points fail simultaneouslyNo two critical points fail simultaneously– BirdgeBirdge Missing Missing– Master MissingMaster Missing– PiconetPiconet Splitting Splitting
• Split_request packetSplit_request packet
The BlueRing Maintenance Protocol(2The BlueRing Maintenance Protocol(2/3)/3)
The BlueRing Maintenance Protocol(2The BlueRing Maintenance Protocol(2/3)/3)
The BlueRing Maintenance Protocol(3The BlueRing Maintenance Protocol(3/3)/3)
Analysis and Simulation Analysis and Simulation Results(1/8)Results(1/8)
Analysis and Simulation Analysis and Simulation Results(2/8)Results(2/8)
Analysis and Simulation Analysis and Simulation Results(3/8)Results(3/8)
Analysis and Simulation Analysis and Simulation Results(4/8)Results(4/8)
Analysis and Simulation Analysis and Simulation Results(5/8)Results(5/8)
Analysis and Simulation Analysis and Simulation Results(6/8)Results(6/8)
Analysis and Simulation Analysis and Simulation Results(7/8)Results(7/8)
Analysis and Simulation Analysis and Simulation Results(8/8)Results(8/8)
ConclusionsConclusions
• Future WorksFuture Works– Analyzing the fault toleranceAnalyzing the fault tolerance– Devise mechanisms to deal with more than Devise mechanisms to deal with more than
one simultaneous failureone simultaneous failure– A real implementation of BlueRingA real implementation of BlueRing
DiscussionsDiscussions
• Routing HopsRouting Hops– Clock-wise DirectionClock-wise Direction
• Relay ProcedureRelay Procedure– QosQos
• Initial FormationInitial Formation– LeaderLeader– MasterMaster
• Maintenance ProtocolMaintenance Protocol