Title: Mathematical Analysis of Bluetooth Energy Efficiency
1Mathematical Analysis of Bluetooth Energy
Efficiency
Department of Information Engineering University
of Padova, Italy
- Andrea Zanella, Silvano Pupolin
zanella, pupolin_at_dei.unipd.it
COST273 Barcelona, 15-17 January 2003
2Outline of the contents
- Motivations Purposes
- Bluetooth reception mechanism
- System Model
- Results
- Conclusions
3What Why
Motivations Purposes
4Motivations
- Bluetooth was designed to be integrated in
portable battery driven electronic devices ? - Energy Saving is a key issue!
- Bluetooth Baseband aims to achieve high energy
efficiency - Units periodically scan radio channel for valid
packets - Scanning takes just the time for a valid packet
to be recognized - Units that are not addressed by any valid packet
are active for less than 10 of the time
5Aims of the work
- Although reception mechanism is well defined,
many aspects still need to be investigated - Whats the energy efficiency achieved by
multi-slot packets? - Whats the role plaid by the receiver-correlator
margin parameter? - Whats the amount of energy drained by Master and
Slave units? - Our aim is to provide answers to such questions!
How? - Capture system dynamic by means of a FSMC
- Define appropriate reward functions (Data,
Energy, Time) - Resort to renewal reward analysis to compute
system performance
6What standard says
Bluetooth reception mechanism
7Access Code field
PAYL
- Access Code (AC)
- AC field is used for synchronization and piconet
identification - All packet exchanged in a piconet have same AC
- Bluetooth receiver correlates the incoming bit
stream against the expected synchronization word - AC is recognized if correlator output exceeds a
given threshold - AC does check ? HEAD is received
- AC does NOT check ? reception stops and pck is
immediately discarded
8Receiver-Correlator Margin
- S Receivercorrelator margin
- Determines the selectivity of the receiver with
respect to packets containing errors - Low S ? strong selectivity
- risk of dropping packets that could be
successfully recovered - High S ? weak selectivity
- risk of receiving an entire packet that contains
unrecoverable errors
9Packet HEADer field
PAYL
- Packet Header (HEAD)
- Contains
- Destination address
- Packet type
- ARQN flags used for piggy-backing ACK
information - Header checksum field (HEC) used to check HEAD
integrity - HEC does check ? PAYL is received
- HEC does NOT check ? reception stops and pck is
immediately discarded
10Packet PAYLoad field
PAYL
- Payload (PAYL)
- DH High capacity unprotected packet types
- DM Medium capacity FEC protected packet types
- (15,10) Hamming code
- CRC field is used to check PAYL integrity
- CRC does check ? positive acknowledged is return
(piggy-back) - CRC does NOT check ? negative acknowledged is
return (piggy-back)
11Conditioned probabilities
DHn Unprotected DMn (15,10) Hamming FEC
2-time bit rep. (1/3 FEC)
Receiver- Correlator Margin (S)
AC
HEC
PAYLOAD
CRC
54 bits
72 bits
h220?2745 bits
?0 BER
12Retransmissions
NAK
MASTER
ACK
SLAVE
X
A
DPCK
B
X
DPCK
- Automatic Retransmission Query (ARQ)
- Each data packet is transmitted and retransmitted
until positive acknowledge is returned by the
destination - Negative acknowledgement is implicitly assumed!
- Errors on return packet determine transmission of
duplicate packets - Slave filters out duplicate packets by checking
their sequence number - Slave never transmits duplicate packets!
- Slave can transmit when it receives a Master
packet - Master packet piggy-backs the ACK/NACK for
previous Slave transmission - Slave retransmits only when needed!
13Mathematical Analysis
System Model
14Mathematical Model
- System dynamic can be modelled by means of a
discrete time independent process en with state
space E - Each state corresponds to a specific system
behaviour - For each state Ej ?E, we define the following
reward functions - Dj(x) Average amount of data delivered by unit
x?M,S - Wj(x) Average amount of energy consumed by unit
x?M,S - Tj Average amount of time spent in state Ej
- Denoting by ?j the probability of event Ej, the
average amount of reward earned in state Ej is
given by
15System Dynamic
- We need to determine
- State space E
- System behaviour in each Ej ?E
- System dynamic depends on the packet reception
events that occur at Slave and Master units - Let us first focus on events that may occur
during the reception of a single packet
16Packet reception events
- Let us define the following basic packet
reception events - ACer AC does not check
- Packet is not recognized
- HECer AC does check HEC does not
- Packet is not recognized
- CRCer AC HEC do check, CRC does not
- Packet is recognized but PAYL contains
unrecoverable errors - CRCok AC HEC CRC do check
- Packet is successfully received
- Furthermore, we introduce the following notation
- Recognition Error RECerACer or HECer
- Recognition OK RECokCRCer or CRCok
17Basic reception events (1)
- Looking at the reception status of both the
downlink (master to slave) and uplink (slave to
master) packets, we can identify four basic
reception events - r1 both downlink and uplink packet are
recognized by the slave and master unit,
respectively - r2 downlink packet is not recognized by the
slave unit (uplink packet is not returned) - r3 downlink packet is recognized by the slave
unit, but PAYL is not correct, uplink packet is
not recognized by the master unit - r4 downlink packet is successfully received by
the slave unit, uplink packet is not recognized
by the master unit
18Basic reception events (2)
- Note that,
- Basic events are disjoint
- Their probabilities adds to one
- The occurrence of each basic event determines a
specific system dynamic for a given number of
steps - We define a state Ei to each basic event ri ri ?
Ei - State Ei collects the system dynamic after the
occurrence of the basic event ri
19Notations
- Let us introduce some notation
- Dxn downlink (Master to Slave) packet type,
n1,3,5 - Dym uplink (Slave to Master) packet type,
m1,3,5 - L(Dxn) number of data bits carried by the Dxn
packet type - wTX(X) amount of power consumed by transmitting
packet field X - wRX(X) amount of power consumed by receiving
packet field X - w0 average amount of power consumed by the
receiving unit in case the incoming packet is not
recognized, i.e., RECer occurs
20System Dynamic E1
MASTER
Transmission
Reception
SLAVE
T1
- Rewards earned in state E1 are given by
- Time spent is E1
- Energy consumed by Master
- Energy consumed by Slave
- Data delivered by Master
- Data delivered by Slave
21System Dynamic E2
MASTER
Transmission
Reception
SLAVE
T2
- Rewards earned in state E2 are given by
- Time spent is E2
- Energy consumed by Master
- Energy consumed by Slave
- Data delivered by Master
- Data delivered by Slave
22System Dynamic E3
MASTER
Transmission
Reception
SLAVE
T3
- Rewards earned in state E3 are given by
- Time spent is E3
- Energy consumed by Master
- Energy consumed by Slave
- Data delivered by Master
- Data delivered by Slave
23System Dynamic E4
T4
- State E4 is entered when r4 event occurs
- Downlink packet is perfectly received, while
uplink packet is not recognized - Master keeps retransmitting duplicate pcks until
a return pck is recognized - Slave listens only for AC and HEAD fields of
duplicate packets and returns an uplink packet
for each duplicate packet it recognizes - State E4 is left when r1 event occurs
- Both downlink and uplink packets are recognized
by the respective units
24Performance Analysis
Results
25Performance Indexes
- From the renewal reward analysis, we can evaluate
the following performance indexes - Goodput G
- Amount of data successfully delivered per unit of
time - Energy Efficiency ?
- Amount of data successfully delivered per unit of
energy consumed
26AWGN channel MgtS
- Asymmetric connection MgtS
- Data flows from Master to Slave
- SNRdBlt14, G ? 0
- SNRdB14?18, DMn outperforms DHn
- SNRdBgt18, DHn achieves better G
- Energy efficiency curves resemble Goodput curves
- However, performance gap between Dx5 and Dx3 pck
types is reduced
27AWGN channel SgtM
- Asymmetric connection SgtM
- Data flows from Slave to Master
- Swapping Master and Slave role
- DM5 DM3 Goodput increases up to 15
- Other pck types do not improve, but neither loose
performance
- Energy efficiency improvement for DM5 Dm3 pcks
is up to 22 - However, for greater SNR values, performance
improvement is lower
28Rayleigh channel MgtS
- Performance in Rayleigh channels is drastically
reduced! - SNRdBlt14, G ? 0
- SNRdBlt18, DMn DHn types achieve similar
performance - SNRdBgt18, DH5 achieves higher G
- Energy efficiency curves resemble Goodput curves
- Curves shape is smoother than for AWGN
29Rayleigh channel SgtM
- For Rayleigh fading channel, SgtM configuration is
much better performing than MgtS configuration,
for almost all the packet types - DM5 DM3 Goodput increases up to 55
- DH5 DH3 Goodput increases up to 15
- All the packet types improve energy efficiency
performance - For DM5 DM3, ?? up to 88 !!!
- For DH5 DH3, ?? up to 20
30Impact of parameter S
- The receiver correlator margin S has strong
impact on system performance - G improves for high S values (from 30 up to 230
for SNRdB15) - ? improves for DMn and DH1 types
- ? slightly decreases for DH5 DH3 types (less 6
performance loss) - Relaxing AC selectivity is convenient, since G
gain is much higher than ? loss - Impact of S, however, rapidly reduces for
SNRdBgt15
31Conclusions
- Average traffic rate shows a tradeoff between
different packet types - Unprotected and long types yield better Goodput
for SNRgt 18 - For lower SNR, better performance are achieved by
short and protected formats - Performance gap between protected and unprotected
formats is drastically reduced in fading channels - Slave to Master configuration yields performance
improvement in terms of both Goodput and Energy
Efficiency - Server (slave) never retransmits pcks that were
already received by the client (master) - Parameter S may significantly impact on
performance - Short and Protected packet types improve
performance with S - Long and Unprotected packet types show less
dependence on this parameter - Results may be exploited to design
energyefficient algorithms for the piconet
management
32Thats all!
Thanks for you attention!