Wireless Home Networks based on a Hierarchical Bluetooth Scatternet Architecture



Similar documents
Wireless Personal Area Networks (WPANs)

New protocol concept for wireless MIDI connections via Bluetooth

WPAN. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Bluetooth voice and data performance in DS WLAN environment

Wireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN:

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring Mike Freedman

Architecture of distributed network processors: specifics of application in information security systems

TDM & FDM Overlays on Bluetooth

Communication Networks. MAP-TELE 2011/12 José Ruela

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *

Tecnologías Inalámbricas.

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak

Possible Applications

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Recent technological innovations and declining prices for personal computers (PCs) and

Electromagnetic Spectrum (3kHz 300GHz)

Customer Specific Wireless Network Solutions Based on Standard IEEE

LIN (Local Interconnect Network):

DESIGN AND VERIFICATION OF LSR OF THE MPLS NETWORK USING VHDL

THE BCS PROFESSIONAL EXAMINATIONS BCS Level 5 Diploma in IT. October 2009 EXAMINERS' REPORT. Computer Networks

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.

Professur Technische Informatik Prof. Dr. Wolfram Hardt. Network Standards. and Technologies for Wireless Sensor Networks. Karsten Knuth

Design and Implementation of Ad-hoc Communication and Application on Mobile Phone Terminals

A NOVEL RESOURCE EFFICIENT DMMS APPROACH

Hello viewers, welcome to today s lecture on cellular telephone systems.

communication over wireless link handling mobile user who changes point of attachment to network

Demystifying Wireless for Real-World Measurement Applications

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Figure 1. The Example of ZigBee AODV Algorithm

Routing Protocol for Mobile Ad-hoc Wireless Networks

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Wireless Local Area Networking For Device Monitoring

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

Wi-Fi and Bluetooth - Interference Issues

2. IP Networks, IP Hosts and IP Ports

Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007.

VHICLE-TO-VEHICLE (V2V) communication can promote

APPLICATION NOTE. AVR2130: Lightweight Mesh Developer Guide. Atmel MCU Wireless. Features. Description

An Extended AODV Protocol to Support Mobility in Hybrid Networks

LoRa FAQs. 1 of 4 Semtech. Semtech Corporation LoRa FAQ

Wireless Technologies for the 450 MHz band

Course 1. General view on the fixed telephone network. Digital networks. General aspects. Definitions.

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

ZIGBEE ECGR-6185 Advanced Embedded Systems. Charlotte. University of North Carolina-Charlotte. Chaitanya Misal Vamsee Krishna

Dynamic Reconfiguration & Efficient Resource Allocation for Indoor Broadband Wireless Networks

Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network

SBrT 299. J = J 0 + ( D(i 1,i) J 0)

RESOURCE ALLOCATION FOR INTERACTIVE TRAFFIC CLASS OVER GPRS

LTE, WLAN, BLUETOOTHB

CHAPTER 1 1 INTRODUCTION

1. Public Switched Telephone Networks vs. Internet Protocol Networks

Computer Networks. Wireless and Mobile Networks. László Böszörményi Computer Networks Mobile - 1

Influence of Load Balancing on Quality of Real Time Data Transmission*

White Paper. Requirements of Network Virtualization

Intelligent Agents for Routing on Mobile Ad-Hoc Networks

VXLAN: Scaling Data Center Capacity. White Paper

Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network

An Active Packet can be classified as

10CS64: COMPUTER NETWORKS - II

Ethernet. Ethernet. Network Devices

Performance Comparison of Mixed Protocols Based on EIGRP, IS-IS and OSPF for Real-time Applications

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

Radio Resource Allocation in GSM/GPRS Networks

Telecommunications, Networks, and Wireless Computing

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Network Security. Chapter 9 Integrating Security Services into Communication Architectures

Process Control and Automation using Modbus Protocol

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Appendix A: Basic network architecture

Chapter 9. IP Secure

ECE/CS 372 introduction to computer networks. Lecture 13

Research Article ISSN Copyright by the authors - Licensee IJACIT- Under Creative Commons license 3.0

Chapter 2 - The TCP/IP and OSI Networking Models

Spring Final Project Report

In-Vehicle Networking

WAN Data Link Protocols

Performance Evaluation of VANETs with Multiple Car Crashes in Different Traffic Conditions

- Cognitive Radio (CR) technology is a promising emerging technology that enables a more efficient usage of

Adaptive RTP/UDP/IP Header Compression for VoIP over Bluetooth

Defining the Smart Grid WAN

Re-Engineering Campus-Wide Internet Telephony Using Voice over Internet Protocol

Chapter 4 Connecting to the Internet through an ISP

Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network

What is CSG150 about? Fundamentals of Computer Networking. Course Outline. Lecture 1 Outline. Guevara Noubir noubir@ccs.neu.

What is DECT? DECT stands for Digital Enhanced Cordless Telecommunications.

(Refer Slide Time: 02:17)

What is VLAN Routing?

Network Mobility Support Scheme on PMIPv6 Networks

UPPER LAYER SWITCHING

AN1066. MiWi Wireless Networking Protocol Stack CONSIDERATIONS INTRODUCTION TERMINOLOGY FEATURES

Environmental Monitoring: Guide to Selecting Wireless Communication Solutions

Wharf T&T Limited Report of Wireless LAN Technology Trial Version: 1.0 Date: 26 Jan Wharf T&T Limited. Version: 1.0 Date: 26 January 2004

APPLICATION NOTE. Atmel AT02845: Coexistence between ZigBee and Other 2.4GHz Products. Atmel MCU Wireless. Description. Features

Transcription:

Wireless Home Networks based on a Hierarchical Bluetooth Scatternet Architecture W. Lilakiatsakun'. 2, A. Seneviratne' I School of Electrical Engineering and Telecommunication University of New South Wales, Sydney, Australia. 2 Department of Computer Engineering Mahanakorn University of Technology 51 Cheum-Sampam Rd, Nong Chok, Bangkok 10530, Thailand. w.lila@ee.unsw.edu.au. a.seneviratne@unsw.edu.au Abstract Wireless home networking is being addressed by numerous groups such as the HomeRF working group, and the Bluetooth consortium. Of these, Bluetooth technology promises a wider acceptance in term of home networking in the near future. The potential of easily embedding Bluetooth technology in communication devices, computing devices and home appliances make it a more attractive alternative to SWAP[I]. Although the layer up to the data link layer has been standardized by the Bluetooth consortium, how complete home networking solutions can be realized, is still not clear. This paper addresses this aspect, and proposes a way to establish complete home network deploying Bluetooth technology of 721 Kbps provided by Bluetooth is adequate for most data exchanges in a home environment. Finally, voice can also be supported at 64 Kbits per second. Even though, the operating frequency band is at 2.4GHz, the unlicensed band Industrial Scientific-Medical(ISM), Bluetooth still provides means to cope with several unpredictable sources of interference such as cordless phones and microwave ovens. Frequency-hop spread spectrum techniques are applied with a high hopping rate and short packet lengths (1600 hop/s for single slot packets) for noise immunity. Thus Bluetooth technology is quite suitable for a home wireless-networking environment. 1. Introduction In the future, houses will be fully instrumented, which will enable the occupants obtain and process information from the instrument for control, security and management purposes. For example, the status of the heating system, whether it is turned on or off or, the status of the home security system should be able to be monitored remotely. Furthermore, it will provide the infrastructure for connecting the conventional computers and peripheral devices that will be common in households. This scenario is schematically shown in Fig. 1 However, the success of such a system depends significantly on ability of the instruments to be networked at low cost. It is anticipated that Bluetooth will provide this networking capability for a number of reasons. Firstly, Bluetooth devices are small, provides wireless connectivity, and are low cost. Secondly, due to its powerful communication ability, it facilitates easy information exchange. Thirdly, it enables the creation, and modification of network in real time. This enables the network to be set up easily. In addition, the bandwidth Figure 1: Home scenario Despite all its advantages, at present, the Bluetooth specification only covers up to the link layer. Higher layer protocols which are required for intra and inter-piconet communication have not been defined. This severely limits the flexibility of the Bluetooth networks that can be realized. However, if a protocol can be specified for fully supporting intra and inter-piconet communication, the realization of home wireless networks will become 1531-2216101 $10.00 0 2001 IEEE 48 1

significantly easier. In this paper we present such a protocol and illustrates its viability. 2. Piconets and Scatternets Bluetooth units that are within the range of each other can set up ad hoc connections. Devices can share a channel and form a piconet. One device becomes a master regulating traffic between the other devices attached to that piconet. The devices other than the master are regarded as slaves. This master-slave configuration introduces a number of restrictions. Furthermore, slaves can not establish a connection themselves, only the master can make connections. Each piconet generates its own hop sequence using the master identity and clock. Two types of links have been defined which allows the support of voice and data services. Synchronous connection-oriented (SCO) links aimed at supporting voice services reserve two consecutive slots at fixed intervals. Asynchronous connectionless (ACL) links aimed at supporting data services use a master unit directed polling scheme. This is schematically shown in Figure 2. Maser Slave1 Slave2 Figure 2: SCO and ACL links in a piconet with one master and two slaves As mentioned earlier, units that share the same area and are within range of one another can establish ad hoc connections between themselves. This is used for the formation of a scatternet, a group of piconets. Intercommunication between piconets in a scatternet is provided on a time division multiplex basis. That is, a unit can sequentially participate in different piconets, however can only be active in one piconet at a time This is shown in Figure 3. Figure 3: An example of a scatternet 3. Bluetooth Home Network Architecture Since Bluetooth has been designed as short-range radio interfacing, normally a range of 10 meters, and a maximum of eight active devices can be attached to a piconet. The home networks however need a much larger coverage than 10 meters and also may be required to support more than 8 active devices. Thus, a scatternet, which is d.esigned for a home network, need to overcome these restrictions of standard Bluetooth scatternets. Bluetooth provides flexibility in establishing an ad hoc network. 'Thus the formation of scatternet can be quite complex. This leads to numerous problems. Firstly, in term of communication, routing protocol between piconets becomes complicated. Secondly, the number of hops and communication delay become unpredictable. To ovwcome these drawbacks we propose the method specifying the formation of scatternet in a particular fashion. The proposal is to use of a two level piconet hierarchy when forming a scatternet. The level 1 piconets are used for communication among themselves. To distinguish them from standard piconets we refer to them as personal area networks (PANs). The level 2 piconet is primarily used for providing interconnectivity (routing) of PANs. To distinguish this we refer to it as a routing area network (RAN). A slave in each PAN is also a slave of its RAN. These slaves act as gateways, between the PANs and their respective RANs and are called the gateway slaves. In PANs devices that act as the master and gateway slave are fixed. The other nodes can be mobile devices. The master of the RAN acts as a router and have to be fixed devices as well. This two level Bluetooth home network architecture is depicted in Figure 4. 482

The first field, COM (Communication Type) selects the type of communication. The types of communication supported are shown in Table 1. Figure 4: Bluetooth Home Network Architecture The Network is initially created as a RAN. The master node of the RAN will elect its slaves and assigns them an address. This address becomes the Piconet Addresses (PA) of that node. The slave member nodes of the RAN will be in a parked state, and will wait for a page from the master of PAN it belongs to. In addition to the above, each slave of a PAN is given a number as Device Address (DA). The combination of PA and DA are used in routing protocol in order to uniquely indicate a source and destination node in a packet header. 4 Routing Protocol Routing protocol for Bluetooth scatternets has already been proposed [2]. This protocol is suitable for short lived and small sized network. However, as explained earlier, home networks will have a longer life-time and will be larger in size. Therefore, the protocol proposed in [2] cannot be used.. To overcome this we proposed the use of new protocol. The operation of the protocols is described in section 4.2. 4.1 Protocol Header Format The header format of the proposal protocol is shown as Figure 5. It consists of 2 byte layer 3 header with 8 fields Table 1 : Communication in proposed architecture l+l Meaning Reserved PAN-PAN Not used The second field is the M (Master Flag). This defines whether the packet is of a master node within the destination network. If this bit is set, the master of a PAN in destination network will treat received packet as its own. The third field is the SW(Switch Flag). This is used for switching between PANS and RANs. When Switch Flag is set, it is switched from PAN to a RAN or vice versa, i.e. - any slave which receives the packet, will automatically pass it to either the RAN or PAN its connected. If it is not set, the packet belongs to the receiving slave. The fourth field, the Destination Piconet Address (DPA), used for indicating which piconet is to be routed. The fifth field, the Destination Device Address (DDA) indicates the address of the destination node within given piconet defined by DPA. In case of value is zero, means PAN broadcasting. The sixth field, the Source Piconet Address (SPA) indicating to the received devices which piconet transmitted the packet. The seventh field, the Source Device Address (SDA) indicates the originating device within given piconet defined by SPA. SPA-SDA and DPA-DDA, are used to specify a unique source and destination node. Finally, the payload is the information from higher layer such as application functions, control information and so on. 4.2 Protocol Operation Figure 5: Packet Header Format Two modes of communications are supported in our proposed architecture: intra-piconet referred as PAN communication, and inter-piconet referred as PAN-PAN communication. Both unicast and broadcast communication will be supported. Similarly to other protocols, a destination device address (DDA) zero is 483

used for broadcasts, and non zeros DDA's are used for unicast communications. 4.2.1 PAN or Intra-Piconet communication All nodes in a piconet, can communicate with each other. However, all traffic is driven by the master node,. Thus, the master-slave communication requires only one hop. Whereas slave-slave communication will requires two hops, none from the slave-to the master, and another from the master to the slave. The this mode of PAN communication is shown in Figure 6. maximum hops for a PAN-PAN communication is 6 hops as shown in Figure 7. In Figure 7, a notation of Slave#m/n, is used, where m is the address of piconet, assigned by the master RAN node, and n is the address of device assigned by the master PAN node. The term of X in tables is the unspecified meaning or don't care term. \ PAN#4/ PANM Figure 6: An example of PAN communication Table 2: the packet header of PAN communication Figure 7: An example of PAN-PAN communication Table 3: The packet header of PAN-PAN communication Pih shvcni t ~~ata Mater to Slaven2 COM M SW DPA DDA SPA SDA 11 n I I 2 I I o I) n I 2 I I I Path 1 COM 1 M I SW I DPA I DDA I SPA I SDA I Let us assume that slave #1 in Figure 6 wants to send packets to slave#:! which is within the same piconet. First, slave#l creates packet header as shown in the first row of Table 2. It will first put its own piconet and device address in the SPA and SDA respectively. COM is defined as 0 to indicate intra PAN communication. DPA is same as SPA, and 1 implies that the source and destination node are in same piconet. DDA, 2, informs the master the identity of the destination node. M is set to zero to indicate that it is slave-slave communication, with the master acting as a switching node. When a packet is transmitted by the master, the SW flag is assigned by it as follows. If the COM field is 0 that means the destination node is within its piconet, the SW flag will be set to zero. Otherwise it will be set to 1. Receiving slave nodes, will only look at the SW flag. If it is zero, slave will treat packets as its own. 4.2.2 PAN-PAN or Inter-piconet communication The traffic between piconets is regulated by a RAN master node as well as by a PAN master node. The 0 0 0 3 3 I I Assume that slave#l of PAN#l wants to send the packets to slave#3 of PAN#3. The operation of the protocol along each hop is summarized in Table 3. The first row of Table 1. shows a COM field 2, as it's a PAN- PAN communication packet. M is zero because the to the destination is not the master node. DDA and DPA are set to 3 as they indicate destination node and the destination piconet. ]?inally, SDA and SPA are set to 1, as they indicate source node and originating piconet. When the packet is received by the master node of PAN1 it first examines COM field. As COM field is set to 2, it will recognize that the received packet is not of its piconet. Therefore:, it will decrease COM field by one and alter SW to 1, and forward this packet to gateway slave. The gateway slave will check whether SW is set to 0. If it is not zero, slave node will relay the packet to the to the 484

master of the other piconet it is a member of, ie. the RAN. When the packet arrives at the master node of RAN, it again checks the COM field. In the case when it is non-zero, the master node decreases the COM, and forwards the packet to a slave node defined by the DPA. The slave processes the packet in a similar manner when it was received from the RAN master node. Finally, when the packet reaches the master node of the destination piconet, it will perform as PAN communication. As can be seen from Table 3, the master nodes only need a forwarding function, and the ability to compare and modify two fields, COM and SW. The COM field will be decreased by one after the packet header is processed by master nodes. SW flag will be assigned by master node to be one whenever the hop will have to change from PAN to RAN or vice versa. When the last hop is reached, this flag will have to be 0. That means the next node is the destination and no more packet forwarding is required. The gateway slave nodes simply provide switching functionality and the functionality necessary to decide whether to forward the packet or not. The forwarding decision is done using the SW field. When packets arrive, SW flag is checked. If this flag is set, the gateway slave has to switch itself to join with another piconet and send the packet to the new master, otherwise the packet is owned by receiving slaves. [2] P.Bhagwat, A.Segal1, A routing Vector Method (RVM) for Routing in Bluetooth Scatternets, Mobile Multimedia Communications, 1999. (MoMuC 99), 1999 IEEE International Workshop on 1999, pp.375-379 [3] M.Kalia, S.Garg, R.Shorey, Efficient Policies for Increasing Capacity in Blutooth: An Indoor Pico-Cellular Wireless System, Vehicular Technology Conference Proceedings, V01.2,2000, pp.907-91 1 5 Conclusion We have proposed method of extending the coverage of Bluetooth networks for the home networks which require wider coverage,. and the support of a larger number of nodes. This overcomes the problems of pic0 and sctternet architecture that have been proposed for Bluetooth networks, using a hierarchical network architecture. The only limitation of our architecture is that the master and salve gateway nodes, need to be fixed. We do not believe that will be a serious limitation as all devices in a home network need not be mobile. We believe this approach should be able support a greater number of nodes: at least 64 active nodes. More than nodes can be added by means of parkedunparked state seamlessly [3]. Furthermore, we can provide deterministic delays using this approach. We are in the process of simulating the operation of the proposed architecture, and the early results indicate that it provides an efficient way of providing larger coverage for Bluetooth based networks efficiently. 6 References [I J http:nwww.hornerf.or&ech 485