Beruflich Dokumente
Kultur Dokumente
Throughput (Mbps)
will show lower throughput. The path length of an
inter group communication pair can be reduced by 140
NumberOfCP
defined as a reciprocal of the number of CPs whose
traffic passes through the link. A link that has the TotalNetworkFlow = ∑ IndividualFlowOfCPi
i
lowest link capacity per CP becomes a bottleneck in a
IndividualFlowOfCPi = min Link j CapacityPerCPi
scatternet because the performance of each CP will be j
bound by a link with the lowest link capacity.
Calculating link capacity per CP is done in two
4.3. Tunnel Selection Scheme
stages. In the first stage, we count the number of CPs
whose traffic passes a link and take an inverse of it.
In this section, we will explain a scatternet
For example, in Figure 2(a), if we assume that all
interconnection procedure that selects tunnels between
source-destination pairs send data, there will be three
two social groups wanting
CPs: (u, v), (u, w), (v, w). (u, v) and (u, w) will use
interconnection.(interconnection procedure 에 대한
link A while (u, w), (v, w) will use link B. Therefore
설명을 넣으라는 것이 아니라 그 procedure 가 어
the link capacity per CP of A is 1/2 and that of B is
떤 형태로 구현되느냐 하는 것을 교수님이 질문하
also 1/2. In the next stage, we calculate the weighted 신 것 같습니다. 즉 그 프로시져가 어떤 응용 프로
link capacity per CP that considers the number of 그램의 일부인지 아니면 프로토콜 스택의 일부인
branches. The weighted link capacity per CP is the 지. 만약 후자라면 누가 그것을 trigger 하는지 등
link capacity per CP divided by the number of 을 설명해야 한다는 것이죠. 아래에도 그냥 그림
branches of neighbor nodes. Between two neighbor 만 들어 있는데 추가 또는 변경되는 구성요소가
nodes constituting a link, we only consider the node 뭔지 그리고 그 역할이 무엇인지 얘기하지 않으면
with more branches. (Here, we assume that each node 이해하기가 힘들겠지요.) If two social groups need
spends the same amount of time with any link.) In to be connected, one of the users such as the leader of
Figure 2(b), since node x and node y has two links, if a group initiates the interconnection procedure with
the load per link for link C is 1/8, its weighted load his or her Bluetooth device. This device becomes a
per link is (1/8)/2 = 1/16. Since node y has 2 links representative node of a group. The interconnection
while node z has 3 links, if link D’s load per link is procedure sends a connection request to the scatternet
1/9, its weighted load per link is (1/9)/3 = 1/27. formation component of the Bluetooth stack with the
A B counterpart scatternet’s identifier. The same procedure
u v w happens in the counterpart scatternet. The scatternet
formation component starts an inquiry procedure with
(a)
Bluetooth which results in a link between the two
representative nodes. One of these nodes that receives
an inquiry packet becomes a master representative
node and the other one does a slave representative representative nodes should be removed except when
node. it is a tunnel.
5. Evaluations
Yangwoo Ko @ ICU 님의 말:
Maneshi 논문에서 CG 부분은 달랑 한두 패러그래
프 뿐이고
Yangwoo Ko @ ICU 님의 말:
아이디어 차원에서만 얘기한거라 구체적으로비교
하기가 사실상 어렵다는 얘기를 좀 넣으면 어떨지
요?
HCI (and scatternet formation
procedure) thodlee 님의 말:
고양우씨가 제시한 것은 perf evaluation 에서 얘
기하면
thodlee 님의 말:
되겠네요
The scatternet formation component is notified via Our simulation is based on Blueware [9] which
a callback at the end of the link establishment implements most of the functions that a Bluetooth
procedure. The callback function of the slave device should provide, and also supports an
representative node sends its scatternet topology to the implementation of TSF. Table 1 compares two cases:
master representative node. Discovering the scatternet group-aware scatternet and group-oblivious
topology is out of this paper’s scope, but this scatternets. A group-aware scatternet refers to a
information is easily obtainable. For example, all scatternet that is an interconnection of a set of socially
nodes know the overall topology in SHAPER [5], and grouped devices while a group-oblivious scatternet
the root remembers the topology in TSF. refers to a scatternet that is formed by connecting all
Upon receiving the topology of the counterpart devices within an area. The group-aware scatternet
scatternet, the master representative node computes formation simulations start with 20 Bluetooth devices
which set of tunnels maximizes the proposed metric. and form two small sized scatternets, each of them
After computation, it sends the result to the slave having 10 devices. Two scatternets are then
representative node. Each representative node sends a interconnected by a set of tunnels that have the highest
tunnel establishment command to the first tunnel node metric values. The group-oblivious scatternet
candidate. Two tunnel node candidates establish a link formation simulations start with 20 devices and form a
or a tunnel using the same link establishment different topology according to a different seed
procedure explained above. A tunnel node candidate number. We repeat the simulations with different
reports its success or failure of the tunnel traffic patterns 20 times for a given topology. We set
establishment to the representative node of its group. the number of intra-group traffic twice of that of inter-
After receiving the result of tunnel establishment, the group traffic since we assume that intra-group
representative node initiates additional tunnel members will communicate more frequently. This
establishment if needed. Otherwise, it ends the traffic pattern is applied to the rest of the paper.
tunneled scatternet formation. Group-aware scatternet records a higher average
As described above, tunnels are established one TCP throughput for intra-group traffic and shows
after another. There are two reasons for sequential lower variance as well. Lower variance means that the
construction of tunnels. First, if several devices throughput distribution among CPs is closer to an
transmit an inquiry packet simultaneously to establish average, so a group-aware scatternet permits CPs to
links, packets will probably collide and thus no link share network capacity more fairly. In addition to
could be constructed. Second, the tunnel establishment overall performance, group-aware scatternets offer
procedure sometime fails due to the absence of a higher bandwidth to intra-group traffic without
counterpart device or for other reasons. Therefore, the sacrificing much inter-group traffic.
representative node should know if tunnel
establishment succeeds or fails so that it can decide Table 1. Performance comparison of group aware
whether to move to the next tunnel setup or to select scatternets and group unaware scatternet
another tunnel candidate. Once all tunnels are
established, a temporary interconnection link between
Group aware Group unaware Communicating Group (CG), a group of devices that
Inter Intra Inter Intra frequently communicate, and a scatternet constructed
group group group group according to CG shows high throughput. Identifying
traffic traffic traffic traffic CGs takes quite amount time compared to the session
Average TCP time in pervasive computing environments and
Throughput 29.1 52.8 34.8 33.7 identified CGs become obsolete quickly. ( 이 에 대 한
(Kbps) 우 리 의 방 법 요 약 ; ) Therefore we propose to use
Standard social group as an alternative of CG. And if there are
deviation for 55.7 65.9 72.1 77.3 occasional needs to communicate across social groups,
all CPs we interconnect them through tunnels. We also
introduce a metric that is useful for selecting a set of
tunnels that interconnect two social groups. Our
5.2. Relation between the metric and TCP
metric takes into consideration the number of hops
throughput and branches, and the link capacity per
communication pair. ( 성 능 평 가 결 과 요 약 ;)
This section shows the relation between the Simulation results demonstrate that a scatternet
proposed metric and the TCP throughput, which is formed by our scheme shows higher performance than
depicted in Figure 3. The y axis is the average TCP group-oblivious scatternets formed by an existing
throughput of inter-group traffic from 20 experiments scatternet formation scheme. We also show that the
and the x axis is the metric value of a given tunneled proposed metric and the TCP throughput have a close
scatternet. We can conclude that the proposed metric and positive correlation.
is suitable for evaluating a tunneled scatternet since We compare the performance between group-aware
the proposed metric and the TCP throughput of inter- scatternets and group-oblivious scatternets, both of
group traffic has a positive correlation. them are based on TSF. Additional experiments are
needed to demonstrate that our scheme is also an
improvement compared to other scatternet formation
schemes besides TSF.
7. References
[1] Bluetooth Specification Version 1.1, Bluetooth Special
Interest Group, http://www.bluetooth.com, February 2001.
[2] B. Wang, J. Bodily, and S. K. S. Gupta, “Supporting
Persistent Social Groups in Ubiquitous Computing
Environments Using Context-Aware Ephemeral Group
Service”, in Proceedings of the Second IEEE Annual
Conference on PERCOM 2004.
[3] C. Petrioli, and S. Basagni, “Degree-constrained
multihop scatternet formation for Bluetooth networks”,
Figure 3. Relation between the proposed metric and IEEE Globecom 2002, Taipei, Taiwan, November 2002.
the TCP throughput of inter-group traffic [4] Z. Wang, R. J. Thomas, and Z. Haas, “Bluenet - a new
scatternet formation scheme”, HICSS-35, Big Island,
Hawaii, January 2002.
6. Conclusion [5] F. Cuomo, G. D. Bacco, and T. Melodia, “Shaper: a self-
healing algorithm producing multi-hop bluetooth
(많은 수의 디바이스가 연결되는 스캐터넷 에 scatternets”, IEEE Globecom 2003, San Francisco USA,
서 의 formation 문 제 점 제 시 ; ) Most of scatternet December 2003.
formation schemes form a scatternet by connecting all [6] G. Tan, A. Miu, J. Guttag, and H. Balakrishnan, “An
devices within an area, so frequently communicating efficient scatternet formation algorithm for dynamic
pairs devices cannot occupy obtain reasonable capacity environments”, in IASTED International Conference on
Communications and Computer Networks, Boston, MA,
due to long average path lengths. (average 가 커진다
November 2002.
고 해서 꼭 나쁜건 아니죠. 자주 통신하는 놈들이 [7] T. Melodia and F. Cuomo, “Ad hoc networking with
가까이 있으면 되니까. 이상적인 CG 의 경우. Bluetooth: key metrics and distributed protocols for
앞의 어디선가 설명한 것 처럼 자주 통신하는 장 scatternet formation”, Ad Hoc Networks, vol. 2, no. 2, pp.
치인데도 서로 멀리 떨어지는 “경우도 있다.” 그 109–202, April 2004.
런 경우에는 문제가 된다. 안그러고 이렇게 얘기 [8] M. Kalia, S. Garg, and R. Shorey, “Scatternet structure
하면 항상 문제가 된다고 과장되고 얘기하는 것으 and inter-piconet communication in the Bluetooth system”,
로 비칩니다.) Manish et al. [8] proposes the use of a
in IEEE National Conference on Communications New [9] G. Tan, “Blueware:Bluetooth Simulator for NS.” MIT
Dehli, India, 2000. Lab. Comput. Sci., Cambridge, MA, October 2002.