You are on page 1of 11

1

Distributed Topology Construction of Bluetooth


Wireless Personal Area Networks
Theodoros Salonidis, Member, IEEE, Pravin Bhagwat,
Leandros Tassiulas, Member, IEEE, and Richard LaMaire

Abstract a common channel and which nodes should act as relays, for-
Bluetooth, a wireless technology based on a frequency hopping warding traffic from one channel to another. The channel as-
physical layer, enables portable devices to form short-range wire- signment should be performed so that all constraints posed by
less ad hoc networks. Bluetooth hosts are not able to communi-
cate unless they have previously discovered each other through
the underlying physical layer are satisfied, while ensuring that
synchronization of their timing and frequency hopping patterns. the resultant topology is connected.
Thus, even if all nodes are within proximity of each other, only We address an instance of the above problem which occurs in
those nodes which are synchronized with the transmitter can hear Bluetooth-based ad hoc networks, known as scatternets. Blue-
the transmission. To support any-to-any communication, nodes tooth [1] is a promising technology that aims to support wireless
must be synchronized so that the pairs of nodes, which can com-
municate with each other, form a connected graph. connectivity among cell phones, headsets, PDAs, digital cam-
Using Bluetooth as an example, we first provide deeper insights eras, and laptop computers. Initially, the technology will be
into the issue of link establishment in frequency hopping wireless used as a replacement for cables, but in due time, solutions for
systems. We then introduce an asynchronous distributed protocol point-to-multipoint and multi-hop networking will evolve.
that begins with nodes having no knowledge of their surroundings Bluetooth is a frequency hopping system which defines mul-
and terminates with the formation of a connected network topol-
ogy satisfying all constraints posed by Bluetooth. An attractive
tiple channels for communication (each channel defined by a
protocol feature is its ease in implementation using the communi- different frequency hopping sequence). A group of devices
cation primitives offered by the Bluetooth Specification. sharing a common channel is called a piconet. Each piconet
has a master unit which selects a frequency hopping sequence
Index Terms Frequency Hopping, Bluetooth, Topology Con-
struction, Scatternet for the piconet and controls access to the channel. Other partici-
pants of the group, known as slave units, are synchronized to the
hopping sequence of the piconet master. Within a piconet, the
I. I NTRODUCTION channel is shared using a slotted Time Division Duplex (TDD)
protocol where a master uses a polling protocol to allocate time-
An ad hoc network is a wireless network formed by nodes slots to slave nodes. The maximum number of slaves that can
that cooperate with each other to forward packets in the net- simultaneously be active in a piconet is seven.
work. Most experimental ad hoc networks to date have been Multiple piconets can co-exist in a common area because
built on top of single-channel, broadcast-based 802.11 wireless each piconet uses a different hopping sequence. Piconets can
LANs or IR LANs. In such networks, all nodes within direct also be interconnected via bridge nodes to form a larger ad hoc
communication range of each other share a common channel network known as a scatternet. Bridge nodes are capable of
using a CSMA MAC protocol. In addition, multi-hop routing timesharing between multiple piconets, receiving data from one
is used as a means for forwarding packets beyond the commu- piconet and forwarding it to another. There is no restriction on
nication range of the sources transmitter. Since a single chan- the role a bridge node can play in each piconet it participates
nel is used throughout the network, the topology of the ad hoc in. A bridge can be a master in one piconet and slave in others
network is implicitly (and uniquely) determined by distance re- (M/S bridge) or a slave in multiple piconets (S/S bridge).
lationship among the participating nodes.
Piconet 2
We aim to address a problem that arises when multiple chan- A A A Piconet 3
nels are available for communication in an ad hoc network. The E B
B B E E
problem is determining which subgroup of nodes should share
Piconet 1
This work was supported by an IBM University Partnership Award. C D C C
D D
T. Salonidis is with the Department of Electrical and Computer Engineering,
Rice University. (e-mail: thsalon@ece.rice.edu).
L. Tassiulas is with the Department of Computer and Communications Engi-
neering, University of Thessaly, Volos Greece and the Department of Electrical (a) (b) (c)
and Computer Engineering, University of Maryland, College Park, USA. (e-
mail: leandros@inf.uth.gr) Fig. 1. (a) Single channel topology. (b),(c) Different configurations according
P. Bhagwat is with Wibhu Technologies, the Department of Computer Sci- to the Bluetooth multi-channel topology model.
ence and Engineering, I.I.T. Kanpur, India and WINLAB Rutgers University,
New Brunswick, USA. (e-mail: pravin@acm.org).
R. LaMaire was with the IBM T.J. Watson Research Center when this work It is possible to organize a given set of Bluetooth devices in
was performed. many different configurations. Figures 1(b) and 1(c) show two
2

example configurations in which nodes in a Bluetooth network coordinator can then use a centralized algorithm to form a con-
can be arranged. All nodes are assumed to be in radio proximity nected scatternet topology.
of each other. In Figure 1(b) all nodes are part of a single pi- We present a version of BTCP optimized for the single-hop
conet. Figure 1(c) illustrates another configuration where node case (i.e. all nodes are within wireless range of each other).
A is master of piconet 1, node E is master of piconet 3, node This is a valid assumption for Wireless Personal Area Networks
B is an M/S bridge (master of piconet 2 and a slave of piconet (WPANs), currently considered by the IEEE 802.15 standard
1), node D is a slave of piconet 1 and node C is an S/S bridge [21]. Compared to other forms of ad hoc networks, such as Mo-
(slave in piconets 2 and 3). In contrast to these scatternet config- bile Ad Hoc Networks (MANETs) or sensor networks, WPANs
urations the node interconnection topology in a single channel are characterized by a relatively small number of low-power
system will be a complete graph (Fig. 1(a)) since all nodes will devices operating within a limited geographic area (e.g. a con-
hear each others transmissions. ference room). In addition to connectivity, WPAN applications
Given a collection of Bluetooth devices, an explicit topology require scatternet formation in a short amount of time that is
construction protocol is needed for forming piconets, assign- tolerable by a human user.
ing slaves to piconets, and interconnecting piconets via bridges Zero-knowledge distributed scatternet formation has also
such that the resulting scatternet is connected. Such a protocol been addressed in [11][14][17]. Similar to BTCP, the protocols
should be asynchronous, distributed and may start with nodes are distributed and are targeted for single-hop environments.
not having any information about their surroundings. However, they construct and re-arrange the scatternet topology
The problem of constructing distributed self-organizing net- as links are discovered. Bipartite, tree and ring topologies are
works has been addressed in the past [2][3][4][5][6][7][8]. All constructed by the protocols in [11], [14] and [17], respectively.
approaches assume existence of a broadcast channel through Compared to [11][14][17], BTCP is more flexible in construct-
which neighborhood or control information can become avail- ing the topology because it uses a centralized algorithm for the
able. The Bluetooth setting introduces two unique challenges: role assignment phase.
first, no broadcast channel exists for facilitating the exchange Apart from scatternet initialization, incremental protocols for
of any control information, including proximity information; scatternet maintenance and reformation have recently been pro-
second, even if proximity information is available, the piconet posed in [18][19]. Liu et. al. consider a specific application
membership constraint renders the formation of a connected context where scatternet formation is triggered by a broadcast
topology a very challenging task. route discovery procedure initiated by a source node [20].
The scatternet formation problem was introduced in [9] and The remainder of the paper is organized as follows: Section
subsequently addressed in [10] [11] [12] [13] [14] [15] [16] II introduces the asymmetric link establishment protocol as de-
[17][18] [19][20]. Degree-constrained scatternet formation for fined by the Bluetooth Specification. In Section III we propose
multi-hop topologies has been investigated in [10][12][13][16]. and analyze the symmetric link establishment protocol. Sec-
The problem is NP-complete for some instances and can be tions IV and V describe the WPAN application requirements
solved by a polynomial algorithm under certain assumptions and detailed operation of BTCP, respectively. Since the total
[16]. All proposed solutions in [10][12][13][16] are distributed: number of participants is not known, each node uses a timeout
starting with the sole knowledge of their one-hop neighbors, the to assume leader election termination. The timeout introduces
nodes perform role assignments on their adjacent links to reach a correctness-delay tradeoff in the network formation. Using
a connected topology that satisfies the Bluetooth connectivity the delay analysis of Section III we show in Section VI how
requirements. to best choose the protocol parameters in order to maximize
The scatternet formation problem becomes significantly the probability of forming a connected scatternet while mini-
harder if nodes start with no knowledge about their surround- mizing delays. Section VII provides a detailed survey of the
ings. The discovery channel is a frequency hopping sequence; state-of-the-art in Bluetooth scatternet formation. Section VIII
nodes in proximity need to synchronize both their timing and concludes the paper.
frequency hopping patterns before being able to communicate.
In this setting, even the formation of individual links becomes II. L INK ESTABLISHMENT IN B LUETOOTH
an issuedelays are random and can be arbitrarily large if no Bluetooth link establishment is a two-step process that in-
proper measures are taken. volves the Inquiry and Paging procedures [1]. Both proce-
In this paper (an extended version of [9]) we introduce and dures are asymmetric, involving two types of nodes that per-
analyze a randomized symmetric protocol that yields link es- form different actions: during Inquiry, senders discover and
tablishment delay with predictable statistical properties. Such a collect neighborhood information provided by receivers; dur-
protocol is necessary for pairs of identical devices or in situa- ing Paging, senders connect to previously discovered receivers.
tions when any external means for selecting initial device states When senders and receivers use the same (Inquiry or Pag-
are not available. We then propose the Bluetooth Topology ing) frequency hopping sequence 1 , they will most likely start
Construction Protocol (BTCP), an asynchronous distributed at different frequency hops derived from their local clock read-
protocol that extends the point-to-point symmetric mechanism ings. To overcome this frequency uncertainty senders and re-
to the case of several nodes. BTCP is based on a distributed ceivers hop at different rates. A receiver changes hops slowly
leader election process where proximity information is discov- 1 N , the number of frequencies in the inquiry or page hopping set, is equal
f
ered in a progressive manner and eventually accumulated to an to 32 for systems operating in Europe and US and 16 for systems operating in
elected coordinator node. Given a view of the topology, the Japan, Spain and France.
3

(every 1.28s), listening for sender messages; a sender transmits


at a much higher rate (every 625s) while listening in-between
transmissions for an answer. The term Frequency Synchroniza-
tion delay (FS delay) refers to the time needed until the sender
transmits on which the frequency the receiver is currently lis-
tening2 .
The functional difference between the two procedures is that
Inquiry uses a universal frequency hopping sequence while
Paging uses a common point-to-point frequency hopping se-
quence. Using a universal frequency hopping sequence, a
sender node effectively broadcasts an Inquiry Access Code
(IAC) packet that can be heard by receiver nodes listening for
such a packet. During the paging procedure, a sender uses a re-
ceivers page hopping sequence and effectively unicasts a De-
vice Access Code (DAC) packet to be heard only by this re-
ceiver. Hence, Inquiry involves many units where a sender can
discover more than one receiver while Paging involves only two
units where a sender pages and connects to a specific receiver.

Fig. 2. The Bluetooth asymmetric link establishment protocol.


A. The Asymmetric Protocol
The asymmetric Bluetooth link establishment protocol (Fig.
2) begins by the sender entering the INQUIRY state and the Thus, the overall delay of the asymmetric link establishment
receiver entering the INQUIRY SCAN state. After an initial FS protocol can be approximated by:
delay, the sender transmits on the frequency hop the receiver
R = 2F S + RB (1)
is listening to. Upon reception of the IAC packet, the receiver
sleeps for a random time interval (called RB delay), uniformly where F S and RB are uniform random variables in
distributed between 0 and r max (= 639.375ms). The random [0, Tcoverage ] and [0, rmax ], respectively.
back-off is performed to avoid collision at the sender in case
two or more receivers were listening on the same frequency hop
III. A S YMMETRIC L INK E STABLISHMENT P ROTOCOL
and responded simultaneously.
When the receiver wakes up, it tunes to the hop it was lis- The asymmetric protocol yields a short link establishment
tening before the back-off occurred. After a second FS delay, delay3 provided that the sender and receiver roles are pre-
an IAC packet is received; the receiver replies with an FHS assigned. In an ad hoc network setting this may not be pos-
packet and starts listening on its page hopping sequence by en- sible. For example, in a conference room scenario, users are
tering the PAGE SCAN state. The FHS packet contains the not able to explicitly assign sender and receiver roles on their
identity and clock of the receiver. Upon reception of the FHS devices. They just press a button and expect to connect with
packet, the sender initiates the Paging procedure by entering their peers.
the PAGE state. The identity and clock in the FHS packet are Links can be automatically established using the following
used to determine the receivers page hopping sequence and symmetric mechanism: When a node is powered on, it arbitrar-
current listening hop, respectively. Thus, when paging follows ily assumes sender or receiver role by entering the INQUIRY or
inquiry, the FS delay is eliminated and the sender transmits a INQUIRY SCAN state, respectively. The node remains in the
DAC packet on the receivers listening hop. selected state for a period of time. If during this time no con-
The remaining control messages are exchanged in consec- nection is established, it switches to the opposite state. State
utive slots of 625s each. The receiver replies with a DAC alteration continues until a connection occurs.
packet. The sender transmits a FHS packet to let the receiver Nodes execute the protocol independently; they will be able
determine its channel hopping sequence and phase. The re- to connect only during intervals where they are in opposite
ceiver acknowledges with another DAC packet and becomes states. During such an interval, the asymmetric protocol is au-
the link slave. As soon as the sender receives the DAC ac- tomatically executed. The sender will become aware of the
knowledgment, it becomes the link master. After an additional receiver only when it receives the FHS packet after a random
POLL/NULL packet exchange, the synchronized nodes may delay R (given by eq. (1)). If during this time the sender in-
start exchanging data. dependently switches to the receiver state, connection will not
Figure 2 illustrates the components of the overall protocol occur. On the receiver end, the reception of the IAC packets,
delay. The Inquiry delay consists of one RB delay and two FS back-off activity and transmission of FHS packets are not com-
delays. Since the FS delay is bypassed when paging follows in- municated to the upper layers of the Bluetooth stack. Since
quiry, paging delay (6 slots, 625s each) is assumed negligible. we can only have explicit control at the upper layers and since
2 The time needed by the sender to cover the entire inquiry hopping frequency 3 According to eq. (1), the maximum delay of the asymmetric protocol is
set is Tcoverage = Nf 625 s which is 10 ms (20 ms) for the 16 (32) rmax + 2 Tcoverage = 639.375 ms + 40 ms = 679.375 ms for the
hop system. 32-hop system and 659.375 ms for the 16-hop system.
4

we need to devise a symmetric protocol without modifying the 4 is a comparative plot of E[T c ] as a function of the mean state
Bluetooth Specification, we assume that the receiver becomes residence interval. Both distributions yield U-shaped curves.
aware of the sender only after paging and link establishment. Very small and very large mean state residence intervals yield
The symmetric protocol operation is depicted in Figure 3. high delays. For very small state residence intervals, many
During each on interval X n , the asymmetric protocol restarts short on intervals are needed until connection occurs. For
execution. Connection is established only if the generated ran- very large state residence intervals, the high delay is due to the
dom delay R n is less than Xn . Since R is random, the num- uncertainty in the initial state assignment: if the nodes start at
ber of on intervals needed until connection will be random. the same state, they will wait for a large off interval before the
Therefore, the symmetric protocol is expected to have a ran- first on interval occurs. The exponential distribution yields a
dom delay, typically greater than the delay of the asymmetric lower delay for large mean state residence intervals. However,
protocol. both distributions perform similarly in the minimum delay re-
gion: for a mean state residence interval of 600 ms the average
delay is approximately 1 s. This is approximately three times
... S I S I S I S
greater than the average delay of the asymmetric protocol given
Unit 1 by eq. (1) ( r max /2 = 319.688ms).
I S I S I
Unit 2
t0 2000

Expected link formation delay (ms)


1800
Merged
1600
Schedule X1 X2 X3 X4 X5 X6 X7 X8 X9 X10 X11
1400
R 1200
Tc 1000
800
Fig. 3. The symmetric link establishment protocol: Each node alternates inde- 600
pendently between INQUIRY (I) and INQUIRY SCAN (S) states. Connection
can be established only during the intervals where nodes are in opposite states. 400
The time interval Tc from t0 up to the point where the two units are in opposite 200
states for a sufficient amount of time is the link establishment delay. 0
50 200 400 550 650 800 1000 2000 3000 4000
Several interesting questions arise regarding the performance mean state residence time (ms)
of such a symmetric protocol. Should the state residence inter-
vals be constant or random? How can link establishment delay uniform exponential
be minimized?
First, assume the nodes switch states according to a schedule Fig. 4. Symmetric protocol: Average link establishment delay for uniformly
of period T . Since the state residence intervals are constant, the and exponentially distributed state residence intervals.
on intervals of the merged process X n in Figure 3 are also
constant. For a specific protocol run, the on intervals can be We have also investigated whether using a different mean
arbitrarily small and the unsuccessful executions of the asym- state residence interval per state yields a lower delay. In this
metric protocol can be many; the delay, then, will be arbitrarily case we use simulations for determining E[T c ]. Figure 5 de-
large. This undesirable phenomenon also holds for an average picts E[Tc ] with respect to the INQUIRY mean state residence
protocol run (see [22] for a formal proof). interval I . Each curve corresponds to the INQUIRY SCAN
Alternatively, let the state residence intervals form an i.i.d.mean state residence interval S being r I . We observe that
random process Z n with mean E[Z] and variance V [Z]. If there is no benefit in using different mean state residence inter-
E[Z] and V [Z] are finite, the mean and variance of the link vals: In the minimum delay region of all curves the r = 1
establishment delay T c are finite and given by: curve yields the lowest average delay.
The randomized symmetric mechanism guarantees auto-
E[X] (E[X|R > X] + E[X])(1 p) matic link establishment between two Bluetooth devices in fi-
E[Tc ] = + + E[R] (2) nite mean time. When more than two devices need to form a
2 p
scatternet on the fly, a protocol must be devised on top of
V [X] (V [X|R > X] + V [X])(1 p) this mechanism. This protocol must yield a connected topology
V [Tc ] = + + V [R] (3) with high probability while doing so in minimum time. The
2 p
delay analysis of the point-to-point symmetric mechanism will
where R is the random link establishment delay of the asym- provide a valuable tool for balancing these conflicting objec-
metric protocol, X n is the interval process formed by merging tives.
the state switching times of the two random alternating sched-
ules, and p = P [R X] (See Appendix I for proof).
IV. S CATTERNET FORMATION
Equations (2) and (3) hold for any distribution of finite mean
and variance. We have derived the analytical expressions for Our motivation for the scatternet formation problem arises
the cases of exponential and uniform distributions [22]. Figure from a conference meeting scenario. Suppose that several
5

R2 Each node will be either master or slave on all its adja-


6000
cent links: The Bluetooth Specification does not prevent a
Expected link formation delay (ms)

5000 node being master in one piconet and slave in others (M/S
bridge); However, M/S bridges may result in high delays:
4000 when the master visits other piconets as slave, no commu-
nication can occur in the piconet it controls. Therefore, we
3000
use only S/S bridges to interconnect piconets. Note that
with this restriction the resulting topology will be bipartite.
2000

1000 R3 A bridge node will connect only two piconets: A bridge


node forwards data by switching between piconets in a time
0 division manner. A portable device may have limited pro-
200 400 600 800 1000 2000 3000 4000 5000 cessing capabilities. A maximum degree of two relieves
Inquiry State mean residence time (ms) the bridge from being an overloaded crossroad of multi-
r=0.25 r=0.5 r=1 r=2 r=4 ple originated data transfers. In addition, the slot overhead
incurred by switching multiple piconet time references is
Fig. 5. Symmetric protocol, uniform distribution: Link formation delay for minimized [23] [24].
different mean residence intervals per state (r = S = 1 curves) vs. link R4 Every piconet will be connected to all other piconets
I
formation delay for equal mean residence intervals per state (r = 1 curve). through S/S bridges: A fully-connected scatternet in its
initial state provides higher robustness against topology
changes. Also, according to this property, no routing is
users wish to form an ad hoc network using their Bluetooth de- needed: every master can reach every other master through
vices. Each user powers on his/her device and expects to see a bridge node and every slave can reach every other node
a network established message after a short period of time. via its master in at most 3 hops.
After this message appears, the user will be able to exchange R5 Any two piconets will share only one bridge: This con-
information with every other user. The high-level description dition is used for computing the minimum number of pi-
of this application, embodies the elements of a successful scat- conets and for fast protocol termination. Two masters may
ternet formation protocol: later use a topology maintenance protocol to share more
Network establishment must be performed in a distributed than one bridges.
manner. Each device must start operating asynchronously R6 Given all previous constraints, the scatternet will have
on its own without any prior knowledge of the identities or the minimum number of piconets: The motivation for
number of nodes participating in the process. this criterion is similar to finding the minimum number of
Network establishment delay must be tolerable by the end- routers in an ad hoc network [8]: A minimum number of
user and minimized as much as possible. piconets translates to an easier scatternet to control.
Upon completion, the protocol must yield a connected
scatternet that satisfies the Bluetooth degree constraint of
V. T HE B LUETOOTH T OPOLOGY C ONSTRUCTION
7 slaves per piconet.
P ROTOCOL (BTCP)
In addition to satisfying connectivity, a desirable protocol fea-
ture would be to shape the scatternet topology according to BTCP is based on a leader election process. Leader elec-
application-specific performance criteria. For example, a node tion is an important tool for breaking symmetry in a distributed
may need to assume different roles in different application sce- system. Since the nodes start asynchronously and without any
narios. Also, due to its own nature, a node may pose more knowledge of the number of participating nodes, an elected co-
restrictive degree constraints: a Palm Pilot may not have the ordinator will be able to control the process and ensure that the
processing power to be a master of a 7-slave piconet. Criteria resulting topology will satisfy the scatternet formation criteria.
may also exist in the form of traffic requirements to be satisfied The protocol consists of 3 phases:
by the nodes participating in the network construction process.
The definition of scatternet formation criteria is itself an open A. Phase I: Coordinator Election
research issue that is heavily dependent on the envisioned appli- Phase I consists of an asynchronous distributed election of a
cations. Our approach takes this issue into account by collect- coordinator node that will eventually know the count, identities
ing information about the participating nodes at a single point and clocks of all nodes participating in the topology construc-
before the scatternet is actually formed. tion process.
In absence of any scatternet formation criteria, and in Each node has an integer variable called VOTES. Upon
order to design a simpler and faster protocol, we propose the power-on, a node initializes VOTES to 1, and starts executing
following default properties that the resulting topology will the symmetric link establishment protocol using a randomized
satisfy: schedule.
Any two nodes that discover each other and connect enter
R1 Each master will have at most seven slaves: The con- a one-on-one confrontation by comparing their VOTES. The
straint posed by the Bluetooth Specification. node with the larger VOTES wins the confrontation. If the
6

VOTES are equal, the winner is the node with the larger Blue- After role assignment, the coordinator constructs for every
tooth address. The loser provides the winner with all the FHS master X (and itself) a connectivity list set (SLAVESLIST(X),
packets (i.e. identities and clocks) of the nodes it has won thus BRIDGELIST(X)). Each list contains contains FHS packets
far. Then, it disconnects and enters the PAGE SCAN state. In (id+clock) to aid the designated master to page its assigned
this way, it will hear only page messages from nodes that will slaves instantaneously. Next, the coordinator pages and con-
page it in the future. This action eliminates the loser from the nects to the nodes it selected as masters. (Recall that at the
leader election and prepares it for the next phases of the proto- end of Phase I the rest of the nodes wait in the PAGE SCAN
col. Upon receiving the FHS packets, the winner increases its state). A temporary piconet is formed with the coordinator as
VOTES by the loser VOTES and continues participating in the master and the designated masters as slaves 4 . The coordinator
leader election by resuming execution of the symmetric proto- transmits to each designated master its connectivity list set and
col. instructs the designated masters to start phase III; then it dis-
If N nodes are participating in the leader election, there will connects the temporary piconet and starts phase III as a master.
be N 1 confrontations. The winner of the N 1 st confronta-
tion becomes the coordinator. At this final state, the rest of the
nodes are in the PAGE SCAN state, waiting to be paged by a C. Phase III: Connection Establishment
node that has information about them. Phase III is initiated by the designated masters (including the
coordinator). Each master pages and connects to the slaves and
B. Phase II: Role Determination bridges provided in its SLAVESLIST and BRIDGELIST, re-
spectively. As soon as a node is notified by its master that it
After the election of Phase I, the coordinator has acquired is a bridge, it waits to be paged by its second master (require-
the identities and clocks of all nodes participating in scatternet ment R3). When this happens, the bridge node sends a CON-
formation. The coordinator initiates Phase II by checking if the NECTED notification to its masters. When a master receives a
number of nodes N is less than 8. If this is the case, it pages and CONNECTED notification from all its assigned bridges, a fully
connects to all other nodes that are waiting in PAGE SCAN; a connected scatternet of P piconets is guaranteed to be formed
single piconet is formed with the coordinator as master and the and the protocol terminates The protocol operation is depicted
rest of the nodes as slaves. In this special case, the protocol in Figure 6.
terminates at this point.
If N 8, several piconets must be formed and intercon-
nected via bridge nodes. Given the global view of the network, D. Leader election termination
the coordinator can decide on the role each node will perform
The most time-consuming part of the protocol is the leader
in the final scatternet. Node-specific scatternet formation crite-
election phase. Phases II and III involve only paging and con-
ria can be communicated to the coordinator during the election
necting, which happen instantaneously due to the previous in-
process as well as the FHS information. Such criteria can be
quiry procedures.
used to derive topologies that satisfy specific optimality objec-
Ideally, election should stop as soon as the coordinator is
tives in addition to connectivity. Marsan et al. [25] have devised
elected. However, since a node is not aware of the total number
a centralized role assignment algorithm that minimizes the en-
of participants, it will never know whether or not it is the winner
ergy consumption of the most overloaded node subject to node
of the election. Each node maintains a state alteration timeout
traffic requirements.
variable called ALT TIMEOUT. ALT TIMEOUT is set upon
In absence of specific requirements we will use the default
power-on and reset each time the node wins a confrontation
criteria R1-R6. The minimum number of piconets P satisfying
and restarts the symmetric link establishment protocol. When
R1-R5 is given by:
ALT TIMEOUT expires, the node assumes it is the elected co-
  ordinator.
17 289 8N It is important to determine an appropriate value for
P = , 1 N 36 (4)
2 ALT TIMEOUT. A very large value will result in a node having
(The proof can be found in [22]). Equation (4) holds for N won the competition and continuing alternating without know-
up to 36 devices; we believe this is a sufficiently large number ing it is the only one left. This implies in a very slow Phase
for the envisioned WPAN application scenarios. Note that this I, and a very slow scatternet formation protocol. On the other
restriction holds if we need to satisfy all criteria R1-R6. A hand, using a very short ALT TIMEOUT, several nodes may
larger number of nodes can be supported by either not requiring assume the role of coordinator; this will result in a discon-
a minimum P (R6) or by relaxing on one or more of the other nected scatternet. We address this issue using the following
criteria (R1-R5). observation: the link formation delay between any two out of
N alternating nodes is statistically less than the delay of only
The coordinator selects itself and P 1 nodes as the desig- two alternating nodes. Thus, the delay analysis of the two-node
nated masters and P (P21) other nodes to be S/S bridges. The symmetric link establishment protocol can be used to provide a
tight estimate for ALT TIMEOUT.
remaining N (P + P (P21) ) nodes are assigned as pure
slaves; they are equally distributed among the coordinator and 4 According to eq. (4), P is always less than seven and the temporary piconet
the rest of the masters. can always be formed.
7


deviation V [Tc ] of the two-node link establishment delay as
a function of the mean state residence interval.

9000
8000
7000
(a) (b) (c)

Tavg+Tstd (ms)
6000
Alternating node
5000
Coordinator/master node 4000

PAGE SCAN/slave node 3000

S/S bridge node


2000
1000
A is master of B
(d) (e) 0
200 400 600 800 1000 2000 3000 4000 5000 6000 7000 8000 9000
Fig. 6. BTCP operation: (a) Start of Phase I: All nodes start alternating trying mean state residence time (ms)
to discover other nodes in wireless proximity. (b) End of phase I: Coordinator
has been elected. Given N=16 coordinator computes P = 3 using eq. (4). mean standard deviation
Next, the masters, bridges and slaves are selected accordingly. (c) Phase II:
Coordinator forms a temporary piconet with the designated masters and sends
them their connectivity lists. (d) Phase III: Each master pages the nodes speci- Fig. 7. Nodes alternate with state residence intervals drawn from a uniform
 dis-
fied within its connectivity list. (e) The scatternet is formed. tribution of mean msec. The mean E[Tc ] and standard deviation V [Tc ]
of the delay of the symmetric protocol for two nodes are plotted as a function
of .
VI. EXPERIMENTS
A. Emulating Bluetooth Given E[Tc ] and V [Tc ], ALT TIMEOUT is determined by
the following empirical formula:
We have implemented BTCP on top of an existing prototype 
implementation that emulates the Bluetooth environment on a ALT T IM EOU T = E[Tc ] + V [Tc ] + rmax (5)
Linux platform. The emulator is used instead of actual devices According to Figure 7, for every mean state residence interval,
because current Bluetooth hardware does not adequately sup- the standard deviation is comparable to the mean. This indicates
port scatternet functionality 5. The emulator also allows testing that the distribution of T c is not centered around the mean and
the protocol for a wide range of parameters and for a large num- 
justifies the inclusion of the term V (Tc ) in eq. (5). The term
ber of nodes. rmax was determined by experimentation. During many pro-
Each Bluetooth host is implemented as a Linux process con- tocol runs, the following frequent phenomenon was observed:
sisting of two interacting modules. The Bluetooth Baseband after the N 2nd confrontation, the winner A would start alter-
(BB) module emulates in software the Inquiry, Paging and pi- nating by resetting ALT TIMEOUT while another node B was
conet switching procedures, as defined in the Bluetooth Base- in SLEEP mode due to a previous back-off. A and B were the
band specification [26]. The BTCP module interacts with the last nodes in the election process and would start trying to form
BB module through Bluetooth Host Controller Interface (HCI) the N 1st connection only after B woke up. The term r max is
functions [27]. The use of HCI functions allow us to later re- the upper bound on the back-off interval of the asymmetric pro-
place the BB module with an actual Bluetooth unit. tocol and was included in eq. (5) to take this case into account.
The wireless medium is simulated by a N f -hop channel pro- In the experiments we use a mean state residence interval
cess. The channel process is responsible for the exchange of of 600ms, which, according to Fig. 7 and eq. (5) yields a
IAC and FHS packets during the inquiry and paging procedures. minimum ALT TIMEOUT of 2527.223ms.
It also simulates the occasional frequency collisions and FS de-
lays. Note that the channel process is not similar to a CSMA
broadcast channel since the senders and receivers cannot per- C. Protocol Performance
form any carrier sensing or any form of intelligent back-off. All We use the average scatternet formation delay and the prob-
Bluetooth host processes are connected to the N f -hop channel ability of connection as the protocol performance metrics. The
process and execute the scatternet formation protocol. scatternet formation delay is dominated by the delay to elect
the coordinator (Phase I). Phases II and III are very fast since
B. Determining ALT TIMEOUT they involve only paging and connection establishment. With-
out loss of accuracy we will represent the overall scatternet for-
Using the the Periodic Inquiry Mode HCI command [27], it mation delay by the leader election delay.
is possible to program Bluetooth units to alternate between IN- We also distinguish between the ideal and actual leader
QUIRY and INQUIRY SCAN with uniformly distributed state election delays, termed as T ideal and Tactual , respectively.
residence intervals. Figure 7 plots the mean E[T c ] and standard Tideal is the delay from the time when the first node is powered-
5 Some Bluetooth chipsets from CSR (www.csr.com) provide limited scatter- on until the coordinator is elected. It is ideal in the sense that
net supportonly M/S bridges participating in at most two piconets. the protocol would terminate at this point had the nodes known
8

the number of participants; however, a node will assume it is illustrated by a constant delay offset between the curves for a
the coordinator after an additional delay of ALT TIMEOUT. fixed N .
Therefore, the actual scatternet formation delay T actual is given
1st arrival 2nd arrival 3rd arrival Nth arrival
by:
t0
Tactual = Tideal + ALT T IM EOU T (6) L1
L2
The probability of connection is the fraction of experiments
LN-1
where only a single node assumes the role of coordinator. This
metric depends on the value of ALT TIMEOUT. The higher W
ALT TIMEOUT is, the higher the probability of connection, Fig. 9. The device power-on arrival process. The first user arrives at t0 .
but the longer the scatternet formation delay. Each user i arrives after an interval Li , drawn from a truncated exponential
distribution of mean p and upper bound W .

9000
No offset exp1000 exp2000
The timeout can be viewed as a delay overhead due to the
8000
need for a distributed algorithm. A large ALT TIMEOUT
7000
will yield a connected scatternet with higher probability, but
6000 will accumulate a larger actual connection delay T actual . Fig-
Tideal (ms)

5000 ure 10 illustrates this trade-off by depicting the probability


4000 of connection (timeout efficiency) for several candidate val-
ues of ALT TIMEOUT. For all application scenarios, the time-
3000
out efficiency initially increases rapidly with ALT TIMEOUT
2000 and then reaches a steady state. It is clear that the value
1000 of ALT TIMEOUT where the curves start stabilizing is at
0 2500 msvery close to the value 2527.223 ms chosen by our
2 4 6 8 10 12 14 16 18 20 22 24 26 28 30 empirical formula (eq. (5)).
Number of nodes N

100
Fig. 8. Average ideal scatternet formation delay for various application scenar-
ios. Units alternate according to uniformly distributed state residence intervals 90
Timeout Efficiency (%)

of 600 ms on the average. Each data point is the average of 10,000 runs. 80
70
The protocol delay performance is summarized in Figure 8. 60
The no offset curve corresponds to T ideal when all nodes start 50
alternating simultaneously. Delay increases with the number of 40
nodes in a sub-linear manner. This is due to the multiple one- 30
on-one confrontations occurring in parallel during the leader 20
election process. This behavior is a desirable property of a scat- 10
ternet formation protocol. We wouldnt like for example the 0
delay increasing linearly with N . The delay ranges from 1 s to 1000 1500 2000 2500 3000 3500 4000 4500 5000
3 s for N = 2 to N = 30 nodes. Timeout (ms)
The no offset curve yields very small delays partly because No offset exp1000 exp2000
all nodes start participating in the network formation at the
same time instant. In a real world scenario, users will power
Fig. 10. Timeout efficiency: Each bar graph is the probability of connection,
on their devices in an asynchronous manner. We model the averaged over N=5,10,20 and 30 nodes (10000 runs for each N ).
power-ons as a Poisson arrival process within a W = 10 s ap-
plication window: after the first user, each user i arrives after When an upper bound estimate exists on the number of nodes
an exponentially distributed delay L i of mean p and truncated participating in the protocol, the combination of Figures 8 and
within the W = 10 s application window. The truncated expo- 10 provides practical guidelines. For example, if the expected
nential distribution is preferred to others (e.g. uniform) because number of nodes is 30 and an ALT TIMEOUT of 2500ms
it spreads the arrivals over the entire application window. The is used, the average delay experienced by each user will be
process is shown in Figure 9. 3000ms + 2500ms = 5.5s (Fig. 8) and a connected scatternet
The curves exp1000 and exp2000 in Figure 8 illustrate will be formed with a probability of 96.13% in the no offset
Tideal when each user is expected to arrive after the first user application scenario (Fig. 10).
within p = 1 s and p = 2 s on the average, respectively.
As p increases, the system becomes more asynchronous and
less one-on-one confrontations occur in parallel. This yields VII. R ELATED W ORK
an increase in the scatternet formation delay. Nevertheless, the The scatternet formation problem can be summarized as fol-
protocols immunity to the increase of N is preserved. This is lows: Given the network visibility graph induced by the nodes
9

wireless proximity, establish a subset of master/slave links such rounds of fixed length where nodes assume sender and receiver
that the resulting communication graph is connected and satis- roles with a certain probability. The round length is assumed
fies the Bluetooth degree constraints. sufficiently large to guarantee connection of two nodes that start
Using a Minimum Spanning Tree (MST) framework, Guerin in opposite states. However, synchronous operation is diffi-
et. al. [16] show that the scatternet formation problem is NP- cult to support in a zero-knowledge setting. Tan et. al. [14]
complete for general visibility graphs 6. When nodes are dis- propose an asynchronous incremental protocol that creates tree
tributed on a 2-dimensional plane (Euclidean visibility graphs), fragments, continuously merged to yield a single tree topology.
the problem can be solved by a MST construction algorithm of BTCP is both distributed and asynchronous; it also provides
polynomial complexity 7. This is because every node belonging more flexibility in forming the final WPAN topology due to its
to a Euclidean MST has at most 6 adjacent linksless than the centralized role assignment phase.
Bluetooth constraint of 7. Incremental scatternet formation for multi-hop visibility
Most proposed solutions to the scatternet formation problem graphs has recently been considered in [18][19]. In [18] each
are distributed. The protocols can be classified according to the node uses a set of local role assignment rules on discovered
initial information available to the nodes and the structure of links to maintain the Bluetooth degree constraint. The lo-
the generated topologies. cal rules do not target global scatternet connectivity. In [19],
In [10][16][12] [13][15] the nodes start with a-priori knowl- Cuomo et. al. focus on the creation of tree topologies by ex-
edge of their one-hop neighbors. Zaruba et. al. [10] present tending [14] for multi-hop euclidean visibility graphs. Degree
a protocol for Euclidean visibility graphs where a designated constraints are taken into account using the geometric argument
root node initiates scatternet formation and forms a tree topol- of [10]. Connectivity properties of the resulting tree topologies
ogy. A geometric argument 8 is used to re-assign roles on links are evaluated through simulations.
in case some nodes exceed the degree constraints during the for- A recent work by Liu et. al. [20] considers multi-hop scat-
mation process. Guerin et. al. [16] propose a heuristic of low ternet formation within a specific application context: topology
communication complexity for construction of tree topologies discovery and construction are triggered by a broadcast route
in Euclidean visibility graphs. The approach requires knowl- discovery procedure initiated by a source node. This applica-
edge of the neighbor coordinates, provided by GPS hardware at tion requires the source be aware of the destination. Modifi-
each node. cations to the Bluetooth specification are proposed for senders
Li and Stojmenovic [15] generate connected non-tree scat- being able to broadcast their address during inquiry. Initial in-
ternet topologies for the Euclidean case. The protocol applies quiry states are assumed preassigned: the source node starts as
Yao structure, which requires knowledge of the neighbor co- sender while the rest start as receivers.
ordinates. Petrioli and Basagni [13] trade off the cost of extra
GPS hardware by extending the required initial knowledge to VIII. C ONCLUSIONS AND D ISCUSSION
two hops. They combine clustering techniques with the geo- In ad hoc networks using frequency hopping technology,
metric argument of [10] to yield connected non-tree scatternet nodes can be grouped in multiple communication channels.
topologies. Bluenet [12] is a heuristic protocol for the con- This physical layer setting provides a new way of viewing
struction of non-tree scatternet topologies from arbitrary (non- higher layer functions like topology construction. Motivated by
Euclidean) visibility graphs. A comparative performance eval- this environment and using the Bluetooth technology as our re-
uation of some of the above protocols can be found in [28]. search vehicle, we first study the Bluetooth standard asymmet-
The problem certainly does not become easier when the ric sender-receiver point to point link establishment scheme
nodes start with no knowledge about their surroundings. Due and then propose a symmetric mechanism for establishing a
to the random discovery delays it is hard to make any deter- connection without any role pre-assignment. Based on the
ministic claims regarding connectivity, even for the Euclidean ad hoc link formation mechanism we present BTCP, a dis-
case. It is not straightforward to extend the multi-hop protocols tributed topology construction protocol where nodes start asyn-
in [10][16][12] [13][15] to the zero-knowledge setting because chronously without any prior neighborhood information and
they assume static topologies and do not operate in an incre- result in a network satisfying the connectivity constraints im-
mental manner. posed by the Bluetooth technology. The protocol is centered
On the other hand, BTCP and the protocols in [11][14][17], on a leader election process where a coordinator is elected in a
are targeted for the zero-knowledge setting but are currently re- distributed fashion and consequently assigns roles to the rest of
stricted to the single-hop environment (the visibility graph is the nodes in the system.
complete). Law et. al. [11] and Zhang et. al. [17] aim at BTCP was tested under a conference scenario where users
constructing bipartite and ring topologies, respectively. It is an- arrive in a room and try to form a scatternet by turning on their
alytically shown that the resulting topologies will be connected Bluetooth-enabled devices. An attractive feature of the protocol
with high probability. Both protocols operate in synchronous is that the network formation delay is sub-linear with the num-
6 NP-completeness holds if a node is forced to act as master or slave to all its ber of participating nodes (implying that the users dont need
adjacent links. It has not been determined whether the same result holds if M/S to wait proportionately longer when more users are present).
bridges are allowed. Although the delay is small, each node must have an estimate
7 The MST is constructed by considering as edge weights the distances be-
of how long it must participate in the protocol before assuming
tween nodes in the visibility graph
8 In a Euclidean graph, if a node has more than 5 neighbors, then at least two protocol termination. A conservative estimate of the timeout
of them are within wireless proximity of each other. will introduce unnecessary delays in network formation while
10

an aggressive estimate may leave the network disconnected. resulting from the merged state switches of N 1 (t) and N2 (t).
Our analysis of the delay statistics of the symmetric link forma- The interval process X n induced by N (t) is i.i.d. [29].
tion protocol provides a tight estimate of the appropriate time- Case A: Let t0 be such that the nodes start in opposite states.
out value, making the protocol fast while ensuring high proba- In this case, for each n odd, connection will occur only if the de-
bility of scatternet connectedness. lay Rn of the asymmetric protocol is less than X n . Since each
Throughout the design of BTCP our aim was to build a proto- of Rn and Xn are i.i.d. and independent with respect to each
col which can run on top of Bluetooth hardware. Our modular other, this is equivalent to a coin-toss experiment with probabil-
implementation runs in a Bluetooth emulated environment; it ity of connection-success p = P [X R]. Let the composite
can later be used on Bluetooth devices with adequate support (on+off) interval Y n corresponding to a failure be defined
of scatternet functionality. as:
The protocol needs to be extended for the multi-hop case. 
Xn + Xn+1 if Rn > Xn
The leader election mechanism can serve as a building block Yn = , n = 2k + 1, k 0 (7)
0 otherwise
for discovering, connecting partial topology views and then
merging them in larger components. A possible implementa- The overall connection establishment delay T copp when nodes
tion of this idea is as follows: During the election process a start in opposite states is:
node maintains a topology map in addition to the FHS packets

N
of the nodes it has won so far. After a one-on-one confronta- Tcopp = Yn + RN +1 (8)
tion, the loser communicates its FHS packets and topology map n=1
to the winner. Before starting alternating, the winner pages
the nodes indicated in the loser topology map. (Temporary) where N is the number of failures until a success occurs and
connections will be established only with the paged nodes that is geometrically distributed with parameter p = P [R X].
are within proximity of the winner. This results in the winner Thus, the average delay can be computed as follows:
node updating its local topology map; this process continues
until the node loses a one-on-one confrontation or becomes the E[Tcopp ] = E[E[Tcopp ]|N ] + E[R]


coordinator. The coordinator uses a centralized algorithm to
produce an optimized scatternet based on the discovered topol- = E[Tcopp |N = n] P [N = n] + E[R]
n=0
ogy graph. Using this modified leader election mechanism, it
is likely that multiple leaders will be elected and form scatter-  n
= E[ Yi ] P [N = n] + E[R]
net clusters with no nodes in common. The clusters are further
n=0 i=1
discovered and merged using a new leader election process op-

erating at the cluster level. = n E[Yi ] P [N = n] + E[R]
Given a set of nodes with zero knowledge of each other n=0
that need to form quickly an initial connected ad hoc network, = E[Yi ] E[N ] + E[R]
BTCP focuses on minimizing the connection delay while pro-
= (E[X|R > X] + E[X]) E[N ] + E[R]
viding connectedness with high probability. This is a desired
property in application scenarios where ad hoc networks con-
tinuously connect (birth), perform a coordinated function for (E[X|R > X] + E[X])(1 p)
a short amount of time (live) and disconnect(die); connection E[Tcopp ] = + E[R] (9)
p
setup delays should be a small fraction of these birth-live-die
cycles. Keeping this network operation model in mind, alterna- Case B: Let t0 be such that the nodes start at the same state.
tive methods for topology construction need to be studied and The only difference with case A is that the first off interval
compared in terms of delay with the one presented here. introduces a constant delay factor on the overall delay. There-
In addition to zero-knowledge network initialization, the ref- fore:
ormation of an existing network in the face of dynamic changes Tcsame = X + Tcopp (10)
can be viewed as a separate but equally important issue. Af-
ter network connection, a separate topology maintenance and where Tcopp is given by eq. (8). Then,
optimization protocol need to be run to accommodate mobil-
E[Tcsame ] = E[X] + E[Tcopp ] (11)
ity and/or nodes entering and leaving the network while ensur-
ing that the scatternet is reformed accordingly. Such a protocol
should be the subject of future research efforts. Since t0 is arbitrary, cases A and B are equiprobable. Thus,
E[Tc ] = 12 E[Tcopp ] + 12 E[Tcsame ]. Using eq. (9) and eq. (11),
we reach eq. (2) for E[T c ].
A PPENDIX I
P ROOF OF EQUATIONS (2) AND (3)
To derive the variance V [T c ], observe that eq. (8) and eq.
Let Ni (t) be the number of state switches of node i from time (10) are sums of independent random variables. Therefore, the
t0 up to time t (Fig. 3). N i (t) is a renewal process induced by linearity of variance holds in the same way as linearity of ex-
the i.i.d. interval process Z n . Since the units alternate indepen- pectation. Repeating the same calculation as in E[T c ], we reach
dently, N1 (t) and N2 (t) are independent. Let N (t) be process the desired eq. (3) for V [T c ].
11

R EFERENCES [26] BluetoothSIG, Bluetooth Baseband Specification, version 1.2, in


www.bluetooth.com.
[1] BluetoothSIG, Specification of the Bluetooth system, version 1.2, in
[27] , Bluetooth Host Controller Interface Functional Specification, ver-
www.bluetooth.com.
sion 1.2, in www.bluetooth.com.
[2] D. Baker and A. Ephremides, The architectural organization of a packet [28] S. Basagni, R. Bruno, and C. Petrioli, A Performance comparison of
radio network via a distributed algorithm, Proc. IEEE Transactions on Scatternet Formation Protocols for Networks of Bluetooth Devices. in
Communications, vol. 29, pp. 16941701, 1981. Proc. IEEE Conference on Pervasive Computing and Communications
[3] A. Ephremides, J. Wieselthier, and D. Baker, A design concept for reli- (PerCom), Dallas Fort-Worth, TX, March 2003, pp. 341350.
able mobile radio networks with frequency hopping signaling, Proc. of [29] K. Trivedi, Probability and Statistics with reliability queuing and Com-
IEEE, vol. 75, no. 1, pp. 5673, 1987. puter Science Applications.
[4] T. Robertazzi and P. Sarachik, Self-Organizing Communication Net-
works, IEEE Communications Magazine, vol. 24, no. 1, 1986.
[5] M. Gerla and T. Tsai, Multicluster, mobile multimedia radio network, Theodoros Salonidis (S98-M 04) is a Post-doctoral
Proc. ACM Baltzer Journal of Wireless Networks, vol. 1, pp. 25565, Au- Research Associate in the Department of Electrical
gust 1995. and Computer Engineering at Rice University. He
[6] C. Lin and M. Gerla, Adaptive Clustering for Mobile Wireless Net- received the Diploma in Electronic and Computer
works, Proc. IEEE Journal on Selected Areas in Communications, Engineering from the Technical University of Crete,
vol. 15, no. 7, pp. 12651275, 1997. Greece in 1997 and the M.S. and Ph.D. degrees in
[7] R. Ramanathan and R. Hain, Topology Control of Multihop Radio Net- Electrical and Computer Engineering from the Uni-
works using Transmit Power Adjustment, in Proc. IEEE INFOCOM, Tel versity of Maryland, College Park in 1999 and 2004,
Aviv, Israel, March 2000. respectively. During one year (1999-2000) he was a
[8] A. Parekh, Selecting Routers in Ad Hoc wireless networks, in Research Intern at IBM T.J. Watson Research Cen-
SBT/IEEE International Telecommunications Symposium, Acapulco, ter, New York. His current research interests include
Mexico, August 1994. resource allocation, topology control, and Quality of Service provisioning in
[9] T. Salonidis, P. Bhagwat, L. Tassiulas, and R. LaMaire, Distributed wireless networks. He is a member of IEEE, ACM, and the Technical Chamber
Topology Construction of Bluetooth Personal Area Networks, in Proc. of Greece.
IEEE INFOCOM, Anchorage, AK, April 2001.
[10] G. Zaruba, S. Basagni, and I. Chlamtac, Bluetrees - scatternet forma-
tion to enable Bluetooth-based ad hoc networks, in Proc. International Pravin Bhagwat is an entrepreneur and a researcher
Conference on Computer Communications (ICC), St. Petersburg, Russia, in the area of wireless and mobile networking. He
June 2001. is the Co-founder and Chief Technology Officer of
[11] C. Law, A. Mehta, and K. Siu, Performance of a new Bluetooth scat- Wibhu Technologies, a wireless networking startup
ternet formation protocol, in Proc. ACM MOBIHOC, Long Beach, CA, based in Pune and Sunnyvale, California. Pravin also
October 2001. holds adjunct faculty appointments at computer sci-
[12] Z. Wang, R. Thomas, and Z. Haas, Bluenet-a New Scatternet Formation ence department, IIT Kanpur and at WINLAB, Rut-
Scheme, in Proc. HICSS, Big Island, Hawaii, January 2002. gers University, New Jersey. Prior to founding Wibhu
Technologies, Pravin worked as the principal archi-
[13] C. Petrioli and S. Basagni, Degree-Constrained Multihop Scatternet For-
tect at a wireless networking startup based in New
mation for Bluetooth Networks, in Proc. GLOBECOM, Taipei, Taiwan,
Jersey and as a technology consultant in the Network-
November 2002.
ing Research group at AT&T Research. Pravin started his research career at
[14] G. Tan, A. Miu, J. Guttag, and H. Balakrishnan, An Efficient Scatter-
IBM Thomas J. Watson Research Center, New York. He actively serves on
net Formation Algorithm for Dynamic Environments, in Proc. IASTED
program committees of networking conferences and has published numerous
Communications and Computer Networks (CCN), Cambridge, MA,
technical papers and patents in the area of mobile computing and wireless com-
November 2002.
munication. He is the Associate Editor of IEEE Transactions on Mobile Com-
[15] X. Li and I. Stojmenovic, Partial Delaunay triangulation and degree-
puting and has also served as a guest editor of IEEE Network. Pravin has a
limited localized Bluetooth scatternet formation, in Proc. AD-HOC Net-
B.Tech. in Computer Science from IIT Kanpur and an MS/PhD in computer
wOrks and Wireless (ADHOC-NOW), Toronto, Canada, September 2002,
science from the University of Maryland, College Park, USA.
pp. 1732.
[16] R. Guerin, J. Rank, S. Sarkar, and E. Vergetis, Forming Connected
Topologies in Bluetooth Adhoc Networks, in Proc. International Tele- Leandros Tassiulas (S89, M91) was born in 1965,
traffic Congress (ITC), Berlin, Germany, September 2003. in Katerini, Greece. He obtained the Diploma in
[17] H. Zhang, J. Hou, and L. Sha, A Bluetooth Loop Scatternet Formation Electrical Engineering from the Aristotelian Univer-
Algorithm, in Proc. International Conference on Computer Communi- sity of Thessaloniki, Thessaloniki, Greece in 1987,
cations (ICC), Anchorage, AK, May 2003, pp. 11741180. and the M.S. and Ph.D. degrees in Electrical Engi-
[18] C. Chiasserini, M. Ajmone-Marsan, E. Baralis, and P. Garza, Towards neering from the University of Maryland, College
Feasible Distributed Topology Formation Algorithms for Bluetooth-based Park in 1989 and 1991 respectively. He is Professor
WPANs, in 36th Hawaii International Conference on System Science in the Department of Computer and Telecommuni-
(HICSS-36), Big Island, HI, January 2003. cations Engineering, University of Thessaly, Greece
[19] F. Cuomo, G. DiBacco, and T. Melodia, SHAPER: a self-healing algo- and Research Professor in the Department of Elec-
rithm producing multi-hop bluetooth scatternets. in Proc. GLOBECOM, trical and Computer Engineering and the Institute
San Fransisco, CA, December 2003, pp. 236240. for Systems Research, University of Maryland College Park since 2001. He
[20] Y. Liu, M. Lee, and T. Saadawi, A Bluetooth Scatternet-route Structure has held positions as Assistant Professor at Polytechnic University New York
for Multihop Ad Hoc Networks, Proc. IEEE Journal on Selected Areas (1991-95), Assistant and Associate Professor University of Maryland College
in Communications, vol. 21, pp. 229239, February 2003. Park (1995-2001) and Professor University of Ioannina Greece (1999-2001).
[21] I. . W. G. for WPAN, IEEE 802.15 Std. Specification, 2002, in His research interests are in the field of computer and communication networks
http://grouper.ieee.org/groups/802/15/. with emphasis on fundamental mathematical models, architectures and pro-
[22] T. Salonidis, P. Bhagwat, L. Tassiulas, and R. LaMaire, Proximity tocols of wireless systems, sensor networks, high-speed internet and satellite
Awareness and Ad Hoc Network Establishment in Bluetooth, Technical communications. Dr. Tassiulas received a National Science Foundation (NSF)
Report, Institute of Systems Research (ISR), University of Maryland, vol. Research Initiation Award in 1992, an NSF CAREER Award in 1995 an Office
TR 2001-10, p. http://www.isr.umd.edu/TechReports, 2001. of Naval Research, Young Investigator Award in 1997 and a Bodosaki Founda-
[23] G. Miklos, Z. Turanyi, A. Valko, and P. Johansson, Performance Aspects tion award in 1999 and the INFOCOM 94 best paper award.
of Bluetooth Scatternet Formation, in Proc. ACM MOBIHOC, Boston,
MA, August 2000.
[24] T. Salonidis and L. Tassiulas, Performance issues of Bluetooth scatter-
nets and other asynchronous TDMA ad hoc networks, in Proc. Interna-
tional Workshop on Mobile Multimedia Communications (MoMuC), Mu-
nich, Germany, October 2003.
[25] M. Marsan, C. Chiasserini, A. Nucci, and G. Carello, Optimizing the
topology of bluetooth wireless personal area networks, in Proc. IEEE
INFOCOM, New York City, NY, June 2002.

You might also like