On The Method and Performance Evaluation of A Hybrid Mesh-Tree Topology

Similar documents
TPSF+: A New Two-Phase Scatternet Formation Algorithm for Bluetooth Ad Hoc Networks

FORMATION OF SCATTERNETS WITH HETEROGENEOUS BLUETOOTH DEVICES

Secured network formation for self-organized personal area network

ASYNCHRONOUS FORMATION OF NON-HIERARCHICAL BLUETOOTH SCATTERNETS

Enabling Secure Ad-hoc Group Collaboration over Bluetooth Scatternets Somil Asthana ( ) Dimitris Kalfonos (

A Scatternet Formation Protocol for Ad hoc Networks of Bluetooth Devices

Tsung-Chuan Huang* Chu-Sing Yang. Chao-Chieh Huang. Sheng-Wen Bai

A Reduce Identical Composite Event Transmission Algorithm for Wireless Sensor Networks

Networks. 1 Introduction

BGN: A novel scatternet formation algorithm for bluetooth-based sensor networks

The Improved WCMRP Protocol for Mobile Wireless Sensor Networks

Heuristic Clustering Algorithms in Ad hoc Networks

Distributed Self-Healing Bluetooth Scatternet Formation

Special Issue on Self-organisation in Mobile Networking

A New Approach to Efficient Bluetooth Scatternet Formation In Adhoc Wireless Network

Performance comparison of Bluetooth scatternet formation protocols for multi-hop networks

A self-organising protocol for Bluetooth scatternet formation SUMMARY

Protocol Based on Mobile Agents

Distributed, Robust and Self-Organizing Bluetooth Scatternet Formation

A Dynamic and Distributed Scatternet Formation Protocol for Real-life Bluetooth Scatternets

A Routing Protocol and Energy Efficient Techniques in Bluetooth Scatternets

Comparative Performance Evaluation of Scatternet Formation Protocols for Networks of Bluetooth Devices

A location-aware multicasting protocol for Bluetooth Location Networks

An On-Demand Bluetooth Scatternet Formation Algorithm

BlueCube: Constructing a hypercube parallel computing and communication environment over Bluetooth radio systems

Locally Optimal Scatternet Topologies for Bluetooth Ad Hoc Networks

IT is widely anticipated that fourth-generation wireless

Time-efficient Algorithms for the Outdegree Limited Bluetooth Scatternet Formation Problem

Proper Relay Reduction And Route Breakage Prediction In Blueooth Scatternet Scheduling

A NOVEL DISTRIBUTED PROTOCOL FOR RANDOMLY DEPLOYED CLUSTERED BASED WIRELESS SENSOR NETWORK:

Bluetooth Information Exchange Network

Authenticated Key Agreement Without Using One-way Hash Functions Based on The Elliptic Curve Discrete Logarithm Problem

Energy Optimized Routing Algorithm in Multi-sink Wireless Sensor Networks

Performance Evaluation of Routing Protocols in Wireless Mesh Networks. Motlhame Edwin Sejake, Zenzo Polite Ncube and Naison Gasela

An Enhanced General Self-Organized Tree-Based Energy- Balance Routing Protocol (EGSTEB) for Wireless Sensor Network

Routing protocols in WSN

Novel Cluster Based Routing Protocol in Wireless Sensor Networks

Dynamic Minimal Spanning Tree Routing Protocol for Large Wireless Sensor Networks

Two Algorithms of Image Segmentation and Measurement Method of Particle s Parameters

A Quota Transfer Protocol for Upstream Transmissions in Wireless Mesh Networks

Sensor Application for Museum Guidance

Link Repairing for Inter-Piconet Communication Technique in Bluetooth Scatternet

A Simple Sink Mobility Support Algorithm for Routing Protocols in Wireless Sensor Networks

THE rapid adoption of the Internet and mobile wireless

Model the P2P Attack in Computer Networks

Research on the Checkpoint Server Selection Strategy Based on the Mobile Prediction in Autonomous Vehicular Cloud

Bluetooth Scatternet Formation for Single-hop Ad Hoc Networks Based on Virtual Positions

Blind Signature Scheme Based on Elliptic Curve Cryptography

GMNF-DVMRP: AN ENHANCED VERSION OF DISTANCE VECTOR MULTICAST ROUTING PROTOCOL

An Energy-Efficient Scatternet Formation Algorithm for Bluetooth-Based Sensor Networks

Energy-efficient Data Dissemination in Wireless Sensor Networks

Time Slot Assignment Algorithms for Reducing Upstream Latency in IEEE j Networks

IEEE s ESS Mesh Networking

Some Ad Hoc Network Characteristics Effects on the Performance of On-Demand Routing Protocols

Forming Connected Topologies in Bluetooth Adhoc Networks An Algorithmic Perspective

An Effective Solution for Bluetooth Adhoc Networking

SECURE AND EFFICIENT HYBRID APPROACH FOR DATA TRANSMISSION IN ZIGBEE NETWORK

A Survey on Path Weight Based routing Over Wireless Mesh Networks

A Color-theory-based Energy Efficient Routing Algorithm for Wireless Sensor Networks

Wireless Ad-Hoc Networks

WaterChat: A Group Chat Application Based on Opportunistic Mobile Social Networks

A Two-Phase Scatternet Formation Protocol for Bluetooth Wireless Personal Area Networks

Ubiquitous computing has added a new feature,

Energy Efficient Clustering Protocol for Wireless Sensor Network

Introduction to Mobile Ad hoc Networks (MANETs)

Selecting transition process for WLAN security

A new BlueRing scatternet topology for Bluetooth with its formation, routing, and maintenance protocols

Enhancement of Hierarchy Cluster-Tree Routing for Wireless Sensor Network

An Energy Efficient Data Dissemination Algorithm for Wireless Sensor Networks

Architecture and Prototyping of an based Self-Organizing Hierarchical Ad-Hoc Wireless Network (SOHAN)

An Enhancement of Mobile IP by Home Agent Handover

Performance Comparison of MANETs Routing Protocols for Dense and Sparse Topology

Mobile Message Passing using a Scatternet Framework

SPATIAL CORRELATION BASED CLUSTERING ALGORITHM FOR RANDOM AND UNIFORM TOPOLOGY IN WSNs

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Bluetooth Scatternet Formation for Single-hop Ad Hoc Networks Based on Virtual Positions

Battery Power Management Routing Considering Participation Duration for Mobile Ad Hoc Networks

Performance Evaluation of MANET through NS2 Simulation

1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol

Interference Minimization in Topology Control for Ad Hoc Networks

Inter-Cluster Communication in Wireless Sensor Networks

Performance analysis of QoS-Oriented Distributed Routing protocols for wireless networks using NS-2.35

CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION

Ad Hoc Routing Protocols and Issues

Arbee L.P. Chen ( 陳良弼 )

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks

Figure 1. Clustering in MANET.

NETWORK FORMATION AND ROUTING FOR MULTI HOP WIRELESS AD HOC NETWORKS

Geospatial Information Service Based on Ad Hoc Network

Research on Ad Hoc-based Routing Algorithm for Wireless Body Sensor Network

IEEE s Multihop MAC. Mateusz Wielgosz

A PROTOCOL SUITE FOR WIRELESS PERSONAL AREA NETWORKS

An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol

H-MMAC: A Hybrid Multi-channel MAC Protocol for Wireless Ad hoc Networks

Routing and Channel Assignment for Multicast in Multi- Channel Multi-Radio Wireless Mesh Networks

Principles of Wireless Sensor Networks

A Weighted-Density Connected Dominating Set Data Gathering Algorithm for Wireless Sensor Networks

FPOC: A Channel Assignment Strategy Using Four Partially Overlapping Channels in WMNs

The Memetic Algorithm for The Minimum Spanning Tree Problem with Degree and Delay Constraints

Zone-based Proactive Source Routing Protocol for Ad-hoc Networks

Transcription:

Appl. Math. Inf. Sci. 6. 2S pp. 547S-551S (2012) Applied Mathematics & Information Sciences An International Journal @ 2012 NSP Natural Sciences Publishing Cor. On The Method and Performance Evaluation of A Hybrid Mesh-Tree Topology Chih-Min Yu 1 and Hung-Yen Huang 2 1,2 Department of Communication Engineering, Chung Hua University, Hsinchu, 30012, Taiwan Corresponding author: Email: ycm@chu.edu.tw 1 Received 01 July 2011; Revised 02 August 2011; Accepted 02 September 2011 Published online: 1 January 2012 Abstract: In this paper, a hybrid mesh-tree topology construction for Bluetooth ad hoc network is proposed. The hybrid mesh-tree constructs a mesh-shaped topology in one dense area that is extended by tree-shaped topology to the other sparse areas. First, a designated root constructs a tree-shaped subnet, and then propagates a constant k in its downstream direction to determine new roots. Each new root asks its upstream master to start a return connection to convert the first tree-shaped subnet into a mesh-shaped subnet. At the same time, each new root repeats the same procedure as the root to build its own tree-shaped subnet until the whole scatternet is formed. As a result, the mesh subnet size can be controlled by appropriated selecting the k parameter. Simulation results show that the hybrid mesh-tree achieves better network performance than bluehrt does. As a result, the optimal k value can be determined, and the hybrid mesh-tree generates an efficient scatternet configuration. Keywords: Bluetooth, Ad-hoc networks, Scatternet formation. 1 Introduction Bluetooth is emerging as a potential technology for short-range wireless ad hoc network. This technology enables the design of low power, low cost, and short-range radio that can be embedded in existing portable devices. Initially, Bluetooth technology is designed as a cable replacement solution among portable and fixed electronic devices. Today, people tend to use a number of mobile devices such as cellular phones, PDA s, digital cameras, laptop computers, and so on. Consequently, there exists a strong demand for connecting these devices into networks. As a result, Bluetooth might become an ideal candidate for the construction of ad hoc personal area networks. A Bluetooth-based multihop ad hoc network brings a number of challenges. In addition to the methods of device discovery for a node to participate in multiple piconets, the scatternet formation algorithm is a major technical issue. The scatternet formation algorithm deals with the problem of how to construct individual piconets and connect them together into a scatternet. Depending on the purpose of a scatternet, a number of different topology models [1] can be generated. These scatternet topology models are shown in Figure 1, and can be generally classified as the tree hierarchy (TH) [2]-[4], the master/ mesh (MSM) [5]-[6], the master/ ring (MSR) [7]-[9], and the / ring. (a) Slave/Slave Mesh (SSM) (d) Masler/Slave Ring (MSR) Master Slave/Slave Bridge (b) Master/Slave Mesh (MSM) Masler\Slave Bridge (e)slave/slave Ring (SSR) (c)tree Hierarchy (TH) Figure 1: Scatternet topology models of Bluetooth networks Bluetree [2] is the first scatternet formation protocol to build a tree hierarchy (TH) for Bluetooth Slave

845 Chih-Min Yu, Hung-Yen Huang: On The Method and Performance Evaluation ad hoc network. It adopts one or a few root nodes to start the formation of a scatternet. The resulting topology is tree-shaped and it uses master/ nodes to serve as relays throughout the whole scatternet. Although its spanning tree architecture achieves a minimum number of connection links between any two nodes, its tree-shaped topology is not reliable under dynamic topological changes [11]. In addition, the algorithm can be implemented easily but the root node is likely to become the bottleneck. Bluenet [10] and Bluestar [11][12] are good master/ mesh (MSM) examples. Bluenet sets up a scatternet in a distributed fashion and it shows that a mesh-like architecture achieves higher information-carrying capacity than a tree-shaped one. In BlueStars, each node initially executes an inquiry procedure in a distributed fashion to discover its neighboring devices, then a number of masters are selected based on the number of their neighbors, and finally a number of gateways are selected by these masters and a mesh-like scatternet is formed. The MSM model may use master/ or / nodes as relays to increase scatternet performance with additional protocol complexity. In [13], a bluehrt is proposed to combine both the tree hierarchy (TH) and ring topology. The hybrid ring tree (bluehrt) is composed of three algorithms: discovery, role assignment and connection algorithms, which form Bluetooth networks. During the inquiry phase, a discovery algorithm compares the addresses of all Bluetooth devices and selects a root as a leader with the largest amount of addresses. In the role assignment algorithm, the root assigns master nodes and / bridges in the ring area, as well as master/ nodes for the tree topology. In the connection phase, all master and master/ nodes start to page their s and connect the scatternet to a hybrid ring tree topology. To retain the advantages while combating the limitations of both mesh-shaped and tree-shaped topology, a hybrid mesh-tree formation method is proposed. This method uses a designated root to propagate constant k in its downstream direction in order to construct the mesh-shaped topology and determine the new roots for its descendant TH nodes. Then, each new root starts to build its own tree subnet until the entire scatternet is formed. As a result, the mesh subnet size can be controlled by the appropriate selection of the k parameter. 2 Hybrid Mesh-Tree Method The hybrid mesh-tree assumes that a set of Bluetooth nodes is randomly distributed in a specific geographical area and all nodes are not necessary within the radio range. In order to construct a multihop scatternet, two additional assumptions are made. One is that every node is aware of the number and the identity of its neighbors upon completing the boot procedure. The other assumption is that there is at least one path between any two nodes in the network. At the beginning, a new root selection process is designed in the designated root to determine new roots on a tier-by-tier basis in the downstream direction (out from the designated root) during scatternet formation. Then, each new root constructs and coordinates its own local tree-shaped subnet. In addition, a return connection algorithm is used for the first root to convert its tree-shaped subnet into the mesh-shaped subnet. The hybrid mesh-tree scatternet formation algorithm is described as follows. With a new root selection process, the designated root sets constant k as a parameter. With the k parameter, the first root pages up to seven neighboring s to form a piconet. The detail diagram of master is shown in Figure 2. Then each then switches its role to master (called M/S node) and pages additional s. These new masters decrease k by 1 and continue to propagate the k parameter in the downstream direction. Afterwards, the new masters begin to page up to seven neighboring s and connect their s to form their own piconets. Finally, each new master will switch to return mode and wait for the return signal notification. Master Layer counter=k 1 hop node? state? Wait message Figure 2: The master diagram In this method, when the (k)th master is reached, k=0. The master becomes a new root and the k propagating process stops here. The root selection process continues until all new roots are selected. Then, the tree-shaped subnet of the designated root

Chih-Min Yu, Hung-Yen Huang: On The Method and Performance Evaluation 845 is created. The detail diagram of is shown in Figure 3. Slave scan (Slave node) Is M/S? Wait Message tice 1 hop node? state? M/S connection Figure 3: The diagram Role switch to M/S Layer Counter=0? (M/S node) After each new root is determined, it notifies its upstream masters to start a return connection procedure to connect with additional master/ (M/S) nodes. During the return connection procedure, each returning M/S node alternately switches its state between page and page scan activities to connect with the other M/S nodes. This procedure is operated iteratively until the designated root is reached. The detail diagram of M/S return connection is shown in Figure 4. As a result, the tree-shaped subnet of the designated root is converted into a mesh-shaped subnet. M/S connection message probability >0.5? Afterwards, the new masters begin to page up to seven neighboring s and connect their s to form their own piconets. This procedure is operated iteratively until the leaf nodes of the tree are reached. When the leaf nodes of M/S cannot page and connect any other nodes, the M/S nodes change their role to nodes and the algorithm stops here. As a result, the mesh-shaped topology of the designated root is formed and each new root manages its own tree-shaped subnet. It is assumed that when two or more masters try to connect with a, this node will be affiliated with the master node whose page signal reaches it first. After finishing the scatternet formation, a hybrid mesh-tree architecture is formed, the immediate master/ (M/S) nodes function as relays, and only the leaf nodes play the role of. Here, k=2 was used in Figure 5 as an example to describe the hybrid mesh-tree scatternet formation process. At the beginning, the designated root connects with the first tier masters, as shown in Figure 5(a). Then the first tier masters decrease k by one and continue to connect with their downstream masters. When the second tier masters are reached and the counter limit k=0, these masters become new roots, as shown in Figure 5(b). The tree-shaped subnet of the designated root is created. (a) (b) R Root Master/Slave formed in the return connection process Tree connection scan 1 hop node? (M/S node) (c) (d) Figure 5: Scatternet formation process of hybrid meshtree Role switch to M/S Figure 4: The M/S return connection diagram At the same time, the new roots start to page and connect up to seven neighboring nodes to form their piconets. Then, the paged s switch their roles to master (called M/S nodes). These new roots ask their upstream masters to start the return connection procedure until is reached. The topology of the designated root is finished and generates a mesh-shaped subnet. At the same time, these new roots start to page new s and connect with their immediate downstream masters (leafs in this example), as shown in Figure 5(c), to build their own tree-shaped subnets. Finally, the mesh-shaped topology of the designated root is

885 Chih-Min Yu, Hung-Yen Huang: On The Method and Performance Evaluation formed and each new root manages its own treeshaped subnet, as shown in Figure 5(d). 3 Scatternet Performance In this section we simulate and compare the performance of the scatternet formation algorithms for hybrid mesh-tree and bluehrt. The comparisons are based on a set of metrics which we use to measure scatternet performance. A simulation program is written to evaluate the scatternet performance. The performance of scatternet formation algorithms is simulated and compared with both the hybrid mesh-tree and bluehrt. The ring-shaped topology of bluehrt contains only 3 nodes in the ring structure and the tree-shaped topology is extended by all the other nodes. In the scatternet performance simulation, it is assumed that Bluetooth nodes are randomly located within a rectangular area of 40 x 40, while a radio transmission range of 10 m is assumed, and the number of simulated nodes ranges from 40 to 160. A set of performance metrics is calculated by averaging over 50 randomly generated topologies for each simulated node number. The scatternet performance metrics include: the average number of nodes in a piconet, the average path length and the total link connections. The simulation results for both hybrid mesh-tree and bluehrt are shown as follows. Figure 6 shows the piconet efficiency (average number of nodes in a piconet) of the hybrid mesh-tree and bluehrt. With bluehrt, the piconet efficiency is less than two, since all nodes except the leaf nodes play the M/S role. With the same spanning tree topology, the hybrid mesh-tree achieves better piconet efficiency than bluehrt does, since each piconet can connect with more M/S nodes as its s during the return connection. hop length implies that it will take more time to deliver a packet. This metric usually provides a coarse estimation of the average packet transmission delay of the scatternet. In Figure 7, it can be seen that the hybrid meshtree achieves significant performance improvements in regard to the average hop length, compared to that of bluehrt. More return links can be connected among the M/S nodes as parameter k increases, thus the average path length among nodes can be reduced. In the hybrid mesh-tree, k=4 achieves the lowest hop length when the number of nodes ranges from 40 to 120, and k=5 achieves the best performance when the number of nodes is greater than 130. As a result, the optimum k value with the lowest average hop length varies according to the size of the network. Figure 7: Average path length in a scatternet The formation packets are counted as the total number of page packets in terms of the number of connecting links during scatternet formation. The link connections represent the aggregated connections, including the spanning tree links and return links of the network to improve the scatternet efficiency. In Figure 8, the hybrid mesh-tree spends more control packet overhead as a formation cost than bluehrt does. However, this control overhead is only generated during the scatternet formation phase. Figure 6: Average number of nodes in a piconet An average hop length between any two nodes is also calculated for these networks. A larger average Figure 8: Average number of formation packets

Chih-Min Yu, Hung-Yen Huang: On The Method and Performance Evaluation 885 4 Conclusion To retain the advantages while combating the limitations of both mesh-shaped and tree-shaped topology, a hybrid mesh-tree formation method is proposed. The hybrid mesh-tree constructs a meshshaped topology in one dense area that is extended by tree-shaped topology to the other sparse areas. This method uses a designated root to propagate constant k in its downstream direction in order to construct the mesh-shaped topology and determine the new roots for its descendant TH nodes. Then, each new root starts to build its own tree subnet until the entire scatternet is formed. Simulation results show that the hybrid mesh-tree achieves better network performance than bluehrt does. As a result, the mesh subnet size can be controlled by the appropriate selection of the k parameter and the hybrid mesh-tree generates an efficient scatternet configuration. Acknowledgements My heartfelt thanks to the support of the work by the National Science Council, Taiwan (NSC-99-2221-E-216-025). References [1] K. Persson, D. Manivannan, and M. Singhal, Bluetooth Scatternet Formation: Criteria, Models, and Classification. IEEE Consumer Communications and Networking Conference, (2004), 59-64. [2] Zaruba, G.V., Basagni, S.and Chlamtac, I. Bluetreesscatternet formation to enable Bluetooth-based ad hoc networks. IEEE International Conference on communications, vol.1, (2001), 273-277. [3] G. Tan, A. Miu, J. Guttag and H. Balakrishnan, Forming scatternets from Bluetooth personal area networks, MIT Technical Report, MIT-LCS-TR-826, (2001), 1-11. [4] Liu, Chung-Hsin and Zeng, Wen-Yan, The study for the extension of Bluetooth Tree network. International Conference on Information Sciences and Interaction Sciences, (2010), 392-397. [5] Chih-Min Yu, Shiang-Jiun Lin, and Chia-Chi Huang, On the Architecture and Performance of Blueweb: A Bluetooth-based Multihop Ad Hoc Network. IEICE Transaction on Communication, vol. E89-B,. 2, (2006), 482-489. [6] Chih-Min Yu and Chia-Chi Huang, On the Architecture Design and Performance Evaluation of A Configurable Blueweb Network. IEICE Transaction on Communication, vol. E96-B,. 2, (2007), 1104-1111. [7] T. lin, Y. Tseng, K. Chang, and C. Tu, Formation, Routing, and Maintenance Protocols for the BlueRing Scattemet of Bluetooths. International Conference on System Sciences, (2003), 313-322. [8] T. Hassan, Ring of Masters (ROM) A New Ring Structure for Bluetooth Scattemets. Master's thesis, (2004), 1279-1282. [9] Liu, Chung-Hsin and Shi-Wei Dai, The study for the extension of Bluetooth Ring network. International Conference on Multimedia and Information Technology, (2010), 127-130. [10] Zhifang Wang; Thomas, R.J.; and Haas, Z., Bluenet A New Scatternet Formation Scheme. Proceedings of the 35th Annual Hawaii International Conference on System Sciences, (2001), 779-787. [11] Stefano Basagni and Chiara Petrioli, Multihop Scatternet Formation for Bluetooth Networks. IEEE 55th Vehicular Technology Conference, Vol.1, (2002), 424-428. [12] Chiara Petrioli, Stefano Basagni, and Imrich Chlamtac, Configuring BlueStars: Multihop Scatternet Formation for Bluetooth Networks. IEEE Transaction on Computers, vol. 52, no.6, (2003), 779-790. [13] I. AI-Kassem, S. Sharafeddine, and Z. Dawy, BlueHRT: Hybrid Ring Tree Scatternet Formation in Bluetooth Networks. IEEE Symposium on Computers and Communications, (2009), 165-169. Chih-Min Yu was born in Taiwan. He received the B.S. degree in electrical engineering from Chung-Cheng Institute of Technology in 1989, and the M.S. and Ph.D. degrees in telecommunication engineering from National Chiao Tung University, in 1997 and 2006, respectively. In 2009, he joined the Chung-hua University, Hsinchu, Taiwan, where he is currently an assistant professor. His research interests include the mobile communication, wireless networks, and ad hoc networks. Hung-Yen Huang was born in Taiwan. He received the B.S. degree in electrical engineering from Taiwan Shoufu University in 2009, and the M.S. degrees in electrical engineering from Chung-hua University in 2011. His research interests include the cellular phone applications, sensor networks, and ad hoc networks.