<<

Optimizing the Topology of Personal Area Networks Marco Ajmone Marsan, Carla F. Chiasserini, Antonio Nucci, Giuliana Carello, Luigi De Giovanni

Abstract— In this paper, we address the problem of determin- ing an optimal topology for Bluetooth Wireless Personal Area Networks (BT-WPANs). In BT-WPANs, multiple communication channels are available, thanks to the use of a frequency hopping technique. The way network nodes are grouped to share the same channel, and which nodes are selected to bridge traffic from a channel to another, has a significant impact on the capacity and the throughput of the system, as well as the nodes’ battery life- time. The determination of an optimal topology is thus extremely important; nevertheless, to the best of our knowledge, this prob- lem is tackled here for the first time. Our optimization approach is based on a model derived from constraints that are specific to the BT-WPAN technology, but the level of abstraction of the model is such that it can be related to the slave slave & bridge more general field of ad hoc networking. By using a min-max for- mulation, we find the optimal topology that provides full network master master & bridge connectivity, fulfills the traffic requirements and the constraints posed by the system specification, and minimizes the traffic load of Fig. 1. BT-WPAN topology. the most congested in the network, or equivalently its energy consumption. Results show that a topology optimized for some traffic requirements is also remarkably robust to changes in the traffic pattern. Due to the problem complexity, the optimal so- Master and slaves send and receive traffic alternatively, so as lution is attained in a centralized manner. Although this implies to provide full-duplex connections, and slaves are entitled to severe limitations, a centralized solution can be applied whenever transmit only when polled by the master. It is intuitive that the a network coordinator is elected, and provides a useful term of master is subject to higher traffic load, and thus higher energy comparison for any distributed heuristics. consumption, relative to slaves. Figure 1 shows an example of BT-WPAN topology, where overlapping piconets are deployed. Being a master or a slave I. INTRODUCTION is only a logical state for nodes. A unit can participate in two IRELESS Personal Area Networks (WPANs) is a new or more overlying piconets, although it can be master in one W wireless technology, which provides short-range con- piconet only. A master or a slave involved in the activity of nectivity between battery-operated portable devices, such more than one piconets can act as a bridge, allowing piconets as mobile phones, headsets and personal digital assistants. to form a larger network, a so-called scatternet. Because of WPANs are intended to operate at the 2.4 GHz ISM (Industrial, the use of different hopping sequences, a bridge cannot be ac- Scientific, Medical) band, where no license is required, using a tive in more than one piconet at a time; thus, bridges have to FHSS (Frequency Hopping ) technique. This switch between piconets on a time division basis, and, while technology is based on the Bluetooth specification [1] and will switching, they must re-synchronize with the current piconet. become an IEEE standard under the denomination of 802.15 This implies a significant overhead that may severely effect the WPANs [2]. system performance. Bluetooth WPANs (BT-WPANs) are typically used to turn One of the most challenging problems in deploying a BT- battery-operated stand-alone devices located in the range of WPAN consists in forming a scatternet that meets the con- about 10 m into networked equipment. The network nodes are straints posed by the system specifications and the traffic re- organized into piconets, each of them composed of one master quirements. The way nodes are grouped into piconets, and device and up to seven active slaves, which are allowed to com- which nodes are selected as masters or bridges, has a signifi- municate with the master only. Each piconet uses a different cant impact on the capacity and the throughput of the system, frequency hopping sequence derived from the master address. as well as on the nodes’ battery lifetime – a crucial factor in net- work connectivity [3], [4], [5]. Knowing which topology opti- This work was supported by the Italian Ministry for University and Research through project RAMON. mizes the BT-WPAN performance is therefore of fundamental M. Ajmone Marsan, C. F. Chiasserini and A. Nucci are with Dipar- importance. timento di Elettronica, Politecnico di Torino, Torino, Italy. E-mail: So far, little research activity was devoted to algorithms for

ajmone,chiasserini,nucci ¡ @polito.it. G. Carello and L. De Giovanni are with Dipartimento di Automatica e Informatica, Politecnico di Torino, Torino, Italy. the generation of efficient topologies for BT-WPANs, and for- E-mail: [email protected], [email protected]. mer work dealing with more general wireless ad hoc systems

0-7803-7476-2/02/$17.00 (c) 2002 IEEE.

is not applicable. For instance, approaches based on the nodes’ another can be posed in the same way, under the constraints of

position,¢ as the one proposed in [6], are suitable for networks the specific and traffic requirements [4]. that use a single , such as 802.11 wire- The remainder of this paper is organized as follows. Sec- less LANs, but cannot be applied to BT-WPANs where multi- tion II describes the network scenario and states the problem ple channels are made available by the FH scheme [4]. Algo- under study; Section III presents an Integer Linear Program- rithms proposed in the context of multihop wireless networks, ming (ILP) formulation of the problem. Numerical results are that control the topology by varying the nodes’ transmit power presented and discussed in Section IV. Section V concludes the [3], [7], [8], are not applicable as well. Indeed, BT-WPANs de- paper and points to some aspects that will be subject of future vices use a very low output power (namely, equal to 1 mW) and research. typically do not perform power control1. The issue of determining an optimal topology specifically for II. PROBLEM STATEMENT BT-WPANs is discussed in [4] but is not actually addressed there. The first attempt at finding a solution to the problem In BT-WPANs, connection establishment is a two-step proce- is represented by the work in [5]. Due to the problem complex- dure. By relaying on a universal frequency hopping sequence, ity, the authors adopt a statistical approach, i.e., they generate first an inquiry protocol is used to let a node discover the units random topologies and study the effect of the topology parame- located in its proximity, then a paging protocol is used to estab- ters on the system performance, deriving some useful insights: lish the communication link between two units. The unit that the overhead and the number of links established be- initiates the procedure acts as the master of the connection, and tween nodes are found to have a major impact on throughput, the other unit as a slave, although roles can be exchanged later while slightly less important is the number of piconets that are on. A master or slave can become a slave in another piconet by created. being paged by the master of the other piconet; also, a unit par- In this paper, we solve the problem of forming an optimal ticipating in one piconet can page the master or slave of another BT-WPAN topology that minimizes the traffic load of the most piconet. In this case, the master or slave unit acts as a bridge congested node in the network, or equivalently its energy con- between the two overlapping piconets [1].

sumption, and is such that: In this paper, we refer to a master as a node that is assigned

¥ § 1) full network connectivity is guaranteed; to ¤ piconets and is the master in one of them, to a slave as

2) system specifications are met; a slave node that is assigned to one piconet only, and to a bridge

¥ 3) the traffic requirements are fulfilled; as a node that is assigned to ¤ overlapping piconets and is 4) specific restrictions are met, that may exist on the role a slave in all of them. that some nodes can play. Being BT-WPAN technology intended for local connectivity To the best of our knowledge, this problem was not solved so of battery-driven equipment, it supports low-power implemen- far. tations. The output power of BT-WPAN devices is limited to We provide a min-max formulation of the optimization prob- 1 mW and the entire radio tranceiver is designed for low power lem, and we solve it in a centralized manner, since the problem consumption. The major factor influencing the nodes’ energy complexity and the large number of parameters involved seem consumption becomes the amount of transmitted, received, and to prohibit a distributed approach. This is certainly a limitation processed traffic rather than the between of the proposed formulation. However, besides providing an and receiver. Notice that masters and bridges are therefore the upper bound to any topology derived through distributed heuris- nodes that experience the highest energy consumption in the tics, the centralized optimal solution can be applied whenever a network. network coordinator is elected. The work in [4] is an example Designing the BT-WPAN topology means determining the of asynchronous distributed protocol that can be used to select set of communication links between node pairs that are used a coordinator, which is in charge of determining the role of all to route traffic from each source to the corresponding destina- nodes in the scatternet. Our scheme can be thought of as part tion node. Consider a set of network nodes; we look at the of this protocol, and executed at the coordinator node to deter- topology formation problem as one of optimizing a chosen per- mine the optimal topology. Clearly, whenever there are signifi- formance metric under a given set of constraints. We select cant modifications in the network composition, the coordinator as performance metric to be minimized, the traffic load of the needs to solve the problem for the new network configuration. most congested node, or equivalently its energy consumption, However, our results show that the attained topology is surpris- and we require that the optimal BT-WPAN topology meets the ingly robust to changes in the traffic pattern. following constraints. Finally, although our model specifically addresses the issue 1) Full network connectivity. There must be at least one of topology design in BT-WPANs, the level of abstraction is between any two nodes in the network. This implies such that it can be applied to the more general case of ad hoc that all the masters have to be connected to each other, networks when multiple channel communications are available. either through master or bridge nodes; instead, slaves can The problem of determining which nodes share the same chan- communicate with any node in the network through the nel and which nodes have to bridge traffic from a channel to master they are connected with.

£ 2) System specification. The number of nodes participating BT-WPAN applications can be in the range of 10 or 100 m; however, the typical usage model is in the range of 10 m. Power control is only used by in a piconet cannot be greater than a given value, and the devices operating in the range of 100 m. distance between each master-slave pair must be less than

0-7803-7476-2/02/$17.00 (c) 2002 IEEE.

(  *   #

the maximum piconet radius. Also, a node can be master For each source-destination pair , and for each pair

         in¢ one piconet only. of nodes , we introduce the following 3) System complexity. In order to keep the network com- variables,

plexity small, the number of formed piconets is limited to

§ (  *     

F h

g if connection is routed on arc

a fixed value. [

$ B @ (3)

4) Traffic requirement. The network must support the de- otherwise h

sired source-destination connections. F

g

5 i $ & B so that the set @ defines the connection path through 5) Constraints on the nodes’ role. Constraints on the role

the network for any connection in # . that some nodes can have in the network may exist. A node may need to act as either a slave or a master, de- pending on the application it is able to support, and on B. Optimization Problem

the nature of the device. For instance, nodes that are gate- Consider a set of network nodes with distance  and

ways to the fixed network should be chosen as masters. a set of source-destination connections, # , with traffic matrix

; .

Given the set of routing variables i , the traffic load of the

III. ILP FORMULATION

   generic node  , is defined as the sum of the incoming In this section, first we introduce our notation and definitions, and outgoing traffic that  has to handle. For each connection

then we describe the mathematical formulation of the problem

(  *   #  , we have that the load of node is

and the topology constraints. Finally, an example of how the

q

p

F h F h F h g

optimization procedure works is given. g

r t

$ E F > F h w q r t E F > F h

@ @ B

@ (4) B A. Notation and Definitions

where the first term is the amount of traffic related to connection

  

(  *  

The BT-WPAN is represented as , where is the set that node receives, and the second term represents the 

of network nodes and is the matrix containing the values of traffic that  has to forward to the next node in the connection

p

F h

         

the distances between any two nodes .Let be #

path. By adding @ over all the connections in , we obtain

the set of traffic sources and be the set of destination nodes. the load of node  as

"

, ! and denote the numbers of nodes, sources and desti-

p p

F h

@ $ x

r |

 }

nations, respectively, while MAX is the maximum radius of a @ (5)

y h z

piconet. F

$ & (  *  - (    *  5 We define # as the set of source-

We define as the network bottleneck the node that experiences

$ 8 # 8 destination connections, and 6 as the total number of

connections that have to be routed through the network. We as- the highest traffic load, i.e., whose traffic load,  ,is

p t

sume that just one route is used for each source-destination pair. r

@  $  ‚ ƒ

} (6)

@

$ & > @ B 5 Let ; be the traffic matrix indicating the information rate on each source-destination connection, normalized to the

Our objective is to select the network topology so as to obtain

 (   network capacity. For each traffic source ( , we take the

the optimal BT-WPAN topology, which minimizes the traffic F total average traffic rate, denoted by E , as an input parameter load of the most congested node, i.e., its energy consumption, to the problem.

while guaranteeing the desired throughput. This is defined to

  

For each node  , three binary variables are defined: „

H be the optimization problem identified as :

@ @ J @  , I and , which are equal to 1 if node is a master, a bridge

or a slave, respectively, and are equal to 0 otherwise. We denote

F h

g r  ‘

the maximum number of piconets by K MAX and the maximum

 i 5 „ -  † ;  & E F   5  & 

@ B

‡ ˆ Š ‹ Ž

number of active nodes that can be assigned to a piconet by  L

MAX. Since a piconet includes one and only one master, we

F h

g

@ B @ B

& Z 5  & ^ 5  & 5

B } subject to constraints on @ (7) refer to the generic piconet  through its master node. The set

of nodes that are forced to be masters is indicated by M , with

Z @ B 5

Constraints on assignment variables & are as follows.

M 8 O K

8 MAX; the set of nodes that are forced to be slaves is

R

H

8 Q 8 O K

indicated by Q , with MAX.

w I @ w J @ $ § –  

@ (8)

        

For each pair of nodes , we define the set of

H

r t

@ B O J B w 8 8 ™ I B w 8 8 ™ B –  

Z (9)

$ & Z @ B 5

assignment variables, W , as follows

@

R R

H

§  

r t @ B B B

Z ¥ J  

if is assigned to master – (10)

[

@ B $ Z (1)

otherwise @

H

@ @ $ @ –  

Z (11)

\ $ & ^ @ B 5

and the set of flow variables, ,as H

@ B ™ œ @ B O  ™ @ –    

Z MAX (12)

[

L

H

^ @ B `    $ a 

r t

™ @ –   @ B O if there exists any flow from to and Z MAX (13)

[ (2)

B

@ B $ ^ otherwise.

0-7803-7476-2/02/$17.00 (c) 2002 IEEE.

H H

B @ B @ B @

w Z –     w w Z ¥

as follows.

R

F h F h

g g

$ a 

 (14)

r t r t

$ § – (  *   #  ( $ a *

@ B B @ q q

R R R

H H

B B

@ Z @ w Z B O ž B Z @ B –     Ÿ 

$ (

 (23)

 $ a   Ÿ

R R

F h F h

g g

r t r t

$ § – (  *   #  ( $ a *

@ B B @

$ a Ÿ

 (15)

B B

 $ *

H (24)

r t

O K

@ MAX (16)

R

[

F h F h

@

g g

r t r t

$ – (  *   #  ( $ a *

@ B B @

H

B B

r

$ 8 M 8

@ (17)

    $ a (  *

– (25)

@

F h

g

O Z @ F w Z F @ – (  *   #  –   @

F (26)

r ¡

J @ $ 8 Q 8

} (18)

F h

@

g

O Z @ h w Z h @ – (  *   #  –   h

@ (27)

F h

g

^ @ B w ^ B @ – (  *   #  –    

Constraint (8) ensures that a node is either a master, or a slave O @ B

or a bridge. Constraint (9) ensures that a slave is assigned to

$ a (   $ a *  (28)

one master at most; (10) ensures that a slave or a master are

F h

g

r t

O § – (  *   #  –   B assigned to one piconet at least, while a bridge is assigned to @ (29)

two piconets at least; (11) forces a master to be assigned to it- B

self. According to requirement 2 in Section II, inequality (12)

F h F h

g g

w O § – (  *   #  –    

@ B @ } forbids assigning a node to a master if their distance is greater B (30)

than  MAX, and (13) limits the number of nodes assigned to a pi-

L Equations (23)-(25) are constraints on flow conservation and 

conet to MAX. Given that nodes  and are masters, (14) forces

(  *   # (

ensure that for each there is a route connecting to

   the assignment of  to if is assigned to ; (15) prevents cycles * . Inequalities (26) and (27) allow a connection to be routed

among sets of three nodes which are either masters or bridges:

      

through edge only if and communicate, i.e., either is

 Ÿ

if master  is assigned to master , node cannot be assigned

 

assigned to  ,or is assigned to . A connection can be routed 

to both  and . Notice that this constraint is not posed by the

    through a pair of nodes , which are masters or bridges,

system specification, but was introduced in order to keep the

    if edge belongs to the graph connecting all the masters complexity of the network topology small. Based on criteria 3 (28). Constraints (29) and (30) guarantee that - routes

and 5, constraint (16) guarantees that the total number of mas- are established. M ters is less than or equal to K MAX, and (17) forces nodes in to be masters. Constraint (18) forces nodes in set Q to be slaves. C. Remarks Next, in order to meet requirement 1 in Section II, we con- It can be shown that problem „ is at least as complex as

sider a graph connecting all the masters in the network. The the Geometric Connected Dominating Set problem, which is

^ @ B 5 constraints on the flow variables & , guarantee that all mas- proven to be NP-complete [9]; hence „ is NP-complete. ters are connected to each other either through master or bridge

By solving „ , we obtain the optimal BT-WPAN topology, ¢ nodes. We take a master, denoted by H , as the origin of the which minimizes the traffic load of the most congested node, graph; every other master is a sink node. Notice that any mas- i.e., its energy consumption, while guaranteeing the desired

ter can be taken as origin of the graph and that the solution of

(  *  throughput. Then, for any source-destination pair ,we problem „ does not depend on which master node is chosen. can verify whether an alternative route exists by using the fol-

We have H

@ @ @ @ B

I ^ lowing procedure. We fix variables J s, s, s, and sto

the values that they take in the solution of „ , while we set to 0

R R

H

F h

g

r t r t

^ @ B ^ B @ $ @ –   B

the variables @ whose value is equal to 1 in the solution. By

[

B B

„ §

$ a

 (19) doing so, we generate a new problem, , in which the solution

q

R R

„ „ §

H ¢ H ¢

¢ obtained by solving is forbidden. If is feasible, its solu-

r t r t

q r t B ^ B $

^ (20)

(  * 

tion provides a new route for ; otherwise, it is proved that

B B

(  * 

an alternative route for does not exist.

@ B O K ™ Z @ B w Z B @  –    

^ MAX (21) Finally, we observe that we did not include in the model any

[

@ @

^ $ –   } (22) constraint related to the capacity of the network nor of the sin- gle radio link; constraints related to the system capacity can be

Constraints (19) and (20) guarantee flow conservation, i.e., they verified a posteriori. This is motivated by the fact that, even ¢ ensure that the flow originated in H reaches every master in the if a solution does not meet the capacity constraints, it suggests

network. Inequality (21) ensures that there is no flow between how much we should scale the traffic down in order to attain a

    node  and node if neither is assigned to nor is assigned feasible topology.

to  . Constraint (22) forces the flow between a node and itself to be equal to 0. D. An Example Finally, given the source-destination connections that the net- For the sake of clarity, here we present an instance of the work has to support, the constraints on the routing variables are optimization problem. We assume that network nodes are in-

0-7803-7476-2/02/$17.00 (c) 2002 IEEE.

TABLE I 10 INPUT PARAMETERS. Master Slave

Bridge

L

K  M 8 Q 8 6 MAX MAX MAX

2

ª ¢ ©

1

«

& ¬  § ¬ 5 20 15 4 8 ¨ 0 14 10 4 3 11 TABLE II 13 ROUTING OF NETWORK CONNECTIONS. 0

Connection Traffic Routes No. hops 19

[ [

 §  &  § ®  ¬  § 5 0.291 3 17

[ 9

§  § ž  & §   § ¯  § ž 5 0.066 3

16

 § ¬  &  § ¯  °  § ¬ 5

0.764 3 [ [ 6

7

ž   & ž  § ¯  5

0.081 2 12

[ [ [ 5

15

®  §  & ®  ¬  § ®   § ¯  § 5

0.063 5 18 8

¬  § ²  & ¬  § ² 5

0.295 1

³  § ¯  & ³  § ¬  °  § ¯ 5 0.946 3

[ 0

§ §  ®  & § §   § ®  ¬  ® 5 0.328 4

0 10

§  ¬  & §  ¬ 5

0.077 1

§ ¯   & § ¯  5

0.872 1 Fig. 2. Optimal topology obtained for the input parameters in Table I and the

[

§ ž  ²  & § ž  § ¯   § ®  ¬  ² 5

0.548 5 traffic demand in Table II.

§ ²  °  & § ²  ¬  ° 5 0.518 2

[ TABLE III

§ ¬  § ®  & § ¬  °  § ¯   § ® 5 0.504 4

TOTAL TRAFFIC THROUGH MASTERS AND BRIDGES.

§ ³  § °  & § ³  ¬  § ²  § ¬  § ° 5

0.100 4

§ °  § ³  & § °  § ¬  § ²  ¬  § ³ 5 0.891 4 Node Total traffic

7 0.596

µ ´ dependently, identically, and uniformly distributed in a ´

[ 13 0.587

$ § region with ´ distance units, and the input parameters to the problem are as reported in Table I. Note that nodes 7 and 17 0.514 17 are forced to act as masters. The active source-destination 9 0.495 connections and the associated traffic are listed in the first two 0 0.350 columns of Table II. 16 0.307 15 0.279

The optimal topology attained by solving problem „ is shown in Figure 2, where continuous lines represent the node- master assignments and dotted lines delimit the picocells’ area. Table III. Columns 3-4 of Table II report for each network connection the selected route, along with the corresponding number of hops. From the problem solution we have that, besides nodes 7 and IV. NUMERICAL RESULTS 17, nodes 0 and 13 are chosen as masters. In fact, the optimiza- The numerical results presented in this section are derived

tion procedure selects a number of masters equal to K MAX,so by using the input parameters reported in Table I. We assume

F $ E – (   E that the masters’ traffic load is reduced. Masters 0 and 13 are E , with a varying parameter of the system. directly connected to each other, while masters 7 and 17 have Plots are derived by averaging the results obtained from sev- to be connected to other masters through bridge nodes because eral runs, each of them corresponding to a different instance they are not located in overlapping areas. of the random variables of the system model. Each problem Nodes 9, 15 and 16 are selected as bridges. Observe that instance is solved by using the software tool CPLEX, which bridge 9 would be sufficient to provide connectivity for the solves mixed integer problems by applying a branch and bound whole network; however, by electing also 15 and 16 as bridges, algorithm [10]. By using a Pentium II 266 MHz, the compu-

the load of bridge 9 and master 13 decreases. For instance, tation time per instance is equal to 7268.31 s on average and

[

 § ®  ¬ 5

connection (11,6) is routed through nodes & instead of equal to 14086.74 s in the worst case.

[

&  § ¯  °  ¬ 5 being routed on , thus avoiding 13 and 9 to be over- Figure 3 shows the traffic load of the bottleneck node,  ,

loaded. as a function of the average source rate, E . For each value

Although in (6) the maximum traffic load is computed over of E , results are plotted for two different cases. Results la- all network nodes, the bottleneck node is likely to be either a beled in the plot by OPT are derived by assuming that for master or a bridge. In this example, the bottleneck is master each problem instance the traffic matrix is known and opti- 7, giving the objective function a value of 0.596, as shown in mizing the topology for such a traffic scenario. Results la-

0-7803-7476-2/02/$17.00 (c) 2002 IEEE.

5 5 OPT A OPT A OPT W OPT W Var-0.1 A CL A Var-0.1 W CL W 4 Var-0.3 A 4 Var-0.3 W Var-0.5 A Var-0.5 W

3 3

º º

2 2 Load of the bottleneck node (B) Load of the bottleneck node (B) 1 1

0 0 0.05 0.2 0.35 0.5 0.05 0.2 0.35 0.5

Average source traffic rate (ρ) Average source traffic rate (ρ)

¼ » ¼ Fig. 3. Traffic load of the bottleneck node (» ) vs. the average source rate ( ). Fig. 4. Traffic load of the bottleneck node ( ) vs. the average source rate ( ).

Curves labeled by OPT are derived for the optimal topology when the traffic For each value of ¼ , curves labeled by CL are obtained for a topology optimized

½ ¾ ¿ À Á Â ¿ À Ã Â ¿ À Ä matrix is known. Results labeled by Var-½ ( ) are obtained for a particular instance of the traffic matrix and by varying both the source-

for the same topology and source-destination connections, but introducing a destination connections and their traffic rates. Results are compared with the

Å Æ

variance equal to ½ in the traffic load. Labels and indicate the average performance derived under the network conditions for which the topology has Æ and the worst case performance, respectively, over different instances. been optimized (labeled by OPT). Labels Å and indicate the average and

the worst case performance, respectively, obtained from different runs.

[ [ [

Z Z $ §  ¯  ²

} } beled by Var- ( } ) are obtained by maintain- indicate the average and the worst case performance, respec- ing for each instance the topology derived in the OPT case tively. and the same source-destination connections, but introducing The curve representing the average performance of the CL a variance equal to Z in the traffic flowing over each source- case is still remarkably close to the one referring to the OPT destination connection. For each source-destination connec- case; instead, a larger gap can be observed between curves rep- tion, the corresponding entry in the traffic matrix is an instance resenting the worst performance in the two cases. This was of a random variable uniformly distributed between 0 and 1. expected, since in this case the optimization is performed with This enables us to test the topology generated for given traffic very limited information about the traffic carried by the net-

conditions in network scenarios where only the average con- work. É nections’ rates are known. Labels È and denote the average Next, we introduce as performance metric of the BT-WPAN, and the worst case performance, respectively, that are obtained the nodes’ residual energy at the time instant when the bottle-

from the different runs. neck runs out of energy. We denote the residual energy of the ˆ

Looking at Figure 3, we notice that when the average perfor- generic network node by Ê . Let us assume that all network mance is considered, curves corresponding to any of the Var-Z nodes have the same initial amount of available energy, equal cases overlap the curves derived for the OPT case. This shows to 1. We consider the network lifetime to be the period from that the attained topology is surprisingly robust to changes in the time instant when the network starts functioning to the time the connections rate. When the worst case performance is con- instant when the first node runs out of energy, as first defined sidered, the load of the bottleneck node increases with the un- in [11]. Since the main factor to power consumption in BT- certainty introduced in the traffic demand. However, the perfor- WPANs is the amount of traffic received, transmitted, and pro-

mance derived in the Var-Z cases are still very close to that of cessed by the nodes, we can assume that the BT-WPAN lifetime

E

Ë   the OPT case, especially for small values of . is given by § , with being the bottleneck load. Hence, the Figure 4 shows the traffic load of the bottleneck as a func- total energy consumed by the generic node in the time span

tion of E , for a network scenario where only the average traf- corresponding to the network lifetime is given by the ratio of fic load of the network is known (labeled in the plot by CL). its traffic load to the load of the bottleneck node. The node’s The topology is optimized for a particular instance of the traf- residual energy is computed as the difference between the en- fic matrix and the network performance is computed as the ergy initially available at the node and the amount of energy it source-destination connections and their traffic rates are varied. has consumed. Sources and destinations are randomly chosen among the net- Table IV presents the mean and variance of the residual en-

work nodes. The results derived in the CL case are compared ergy and traffic load of the master and bridge nodes. Indeed, É with those obtained in the OPT case. Again, labels È and these nodes are the ones that determine the network perfor-

0-7803-7476-2/02/$17.00 (c) 2002 IEEE.

1.8

1.6

1.4

1.2 OPT 1 Va r-0.1 0.8 Va r-0.3 Va r-0.5 0.6 Node traffic load traffic Node 0.4

0.2

0 0-s 1-s 2-m 3-s 4-m 5-b 6-s 7-m 8-s 9-b 10-b 11-s 12-b 13-s 14-b 15-s 16-s 17-m 18-s 19-s Node configuration

Fig. 5. Traffic load of the network nodes for a topology attained as a solution to a particular instance of the optimization problem. The role of the nodes in the

topology is indicated as: m=master, b=bridge, s=slave. Results labeled by OPT refer to the network scenario for which the topology has been optimized. Results ½ labeled by Var-½ refer to the case where an uncertainty equal to has been introduced in the traffic demand.

TABLE IV 4. The results derived for the network scenario for which the

RESIDUAL ENERGY AND TRAFFIC LOAD OF MASTER AND BRIDGE NODES topology has been attained (labeled in the figure by OPT) are

¾ ¿ À Ã ½ FOR ¼ .THE SOURCE-DESTINATION CONNECTIONS ARE KNOWN;

compared with the results obtained when a variance equal to Z

IS THE VARIANCE INTRODUCED IN THE TRAFFIC DEMAND. is introduced in the traffic flowing over each source-destination

[ [ [

Z Z $ §  ¯  ²

} }

connection (labeled in the figure by Var- , } ).

ˆ ˆ

Ê Ê Z Ave. Var. Ave. Load Var. Load Notice that in this particular instance, the connections’ rates

0 0.358 0.103 0.990 0.246 generated for the Var-Z cases are lower than those in the traffic 0.1 0.451 0.105 0.668 0.181 matrix of the OPT case; thus, the load of the bottleneck node is

0.3 0.455 0.122 0.654 0.170 higher in the OPT case than in the Var-Z cases. We also observe 0.5 0.477 0.123 0.609 0.153 that the master nodes have the highest value of traffic load, and the difference between the load of masters and slaves is about one order of magnitude. mance, since they process more data, and hence consume more energy than slaves.

[ V. C ONCLUSIONS AND FUTURE WORK

E $ ¯

The results are derived for } for both the OPT and Var-

[

Z $ Z cases, as described above (in the table, corresponds to In this paper, we tackled the problem of determining an opti- the OPT case). mal topology for Bluetooth Wireless Personal Area Networks. The average value of the residual energy is minimum in the For this problem we provided an Integer Linear Programming

OPT case and increases with Z . In fact, the closer the network formulation, an example of solution, and some numerical re- scenario is to the one for which the topology has been opti- sults. mized, the longer is the network lifetime and the less is the The construction of an optimal topology for Bluetooth Net- residual energy at the nodes. On the contrary, the variance in works is particularly important, since the network lifetime crit-

residual energy does not significantly change as Z varies. ically depends on the amount of energy consumed by battery- Looking at the mean and variance of the nodes’ traffic load, operated terminals, and the latter is determined by the amount we notice that it is maximum in the OPT case and decreases of information handled by each device, hence by the network

as Z increases. Thus, minimizing the load of the bottleneck topology. does not correspond to minimizing the average value or the Results show that optimized topologies can be quite robust to variance of the masters and bridges’ load. This suggests that, changes in the traffic pattern. This is a very interesting feature, depending on the application supported by the BT-WPAN and since traffic forecasts used for the topology optimization are the nodes’ physical characteristics, a different objective func- bound to be only partly reliable. tion which leads to a better balance of the network traffic load The main limitation of our approach lies in the centralized might be desirable. nature of the optimization algorithm. However, it must be ob- Finally, Figure 5 shows the traffic load of all nodes for the served that a centralized solution can be applied whenever a topology attained by solving a particular instance of the op- network coordinator is elected; moreover, the availability of the timization problem. Masters, bridges, and slaves are denoted results of a centralized optimization provides a useful term of by m, b, and s, respectively. The network bottleneck is node comparison for any distributed heuristics. Nevertheless, the ob-

0-7803-7476-2/02/$17.00 (c) 2002 IEEE.

vious next step in our research in this field will be the iden-

tificationÌ of heuristic approaches for the construction of good topologies in a distributed fashion.

REFERENCES [1] Bluetooth Core Specification, http://www.bluetooth.com . [2] http://www.ieee802.org/15/ . [3] R. Ramanathan and R. Rosales-Hain, “Topology Control of Multihop Wireless Networks using Transmit Power Adjustment,” IEEE INFOCOM 2000, Tel Aviv, Israel, March 2000. [4] T. Salonidis, P. Bhagwat, L. Tassiulas, and R. LaMaire, “Distributed Topology Construction of Bluetooth Personal Area Networks,” IEEE IN- FOCOM 2001, Anchorage, Alaska, April 2001. [5] O. Miklos, A. Racz,´ Z. Turanyi,´ A. Valko,´ and P. Johansson, “Perfor- mance Aspects of Bluetooth Scatternet Formation,” First Annual Work- shop on Mobile and Ad Hoc Networking and (MobiHoc), Au- gust 2000, pp. 147–48. [6] V. Rodoplu and T. H. Meng, “Minimum Energy Mobile Wireless Net- works,” IEEE JSAC, vol. 17, no. 8, August 1999, pp. 1333-44. [7] L. Lu, “Topology Control for Multihop Networks,” IEEE Transactions on Communications, vol. 41, no. 10, October 1993, pp. 1474–81. [8] T. J. Kwon and M. Gerla, “Clustering with Power Control,” IEEE MIL- COM’99, Atlantic City, NJ, October-November 1999. [9] M. R. Garey and D. S. Johnson, Computer and Intractability, W. H. Free- man and Co., 1979. [10] CPLEX Optimization Inc., Using the CPLEX Callable Library, version 4.0, 1995. [11] J.-H. Chang and L. Tassiulas, “Energy Conserving Routing in Wireless ad hoc Networks,” IEEE INFOCOM 2000, Tel Aviv, Israel, March 2000.

0-7803-7476-2/02/$17.00 (c) 2002 IEEE.