Department of Information Engineering
University of Padova, Italy
Mathematical Analysis of
Bluetooth Energy
Efficiency
Andrea Zanella, Silvano Pupolin
{zanella, pupolin}@dei.unipd.it
COST273 Barcelona, 15-17 January 2003
Outline of the contents
Motivations & Purposes
Bluetooth reception
mechanism
System Model
Results
Conclusions
COST273, Barcelona, 15-17 January, 2003
TD (03)-028
What & Why…
Motivations &
Purposes
COST273, Barcelona, 15-17 January, 2003
TD (03)-028
Motivations
Bluetooth was designed to be integrated in portable battery
driven electronic devices
Energy Saving is a key issue!
Bluetooth Baseband aims to achieve high energy efficiency:
Units periodically scan radio channel for valid packets
Scanning takes just the time for a valid packet to be recognized
Units that are not addressed by any valid packet are active for less
than 10% of the time
COST273, Barcelona, 15-17 January, 2003
TD (03)-028
Aims of the work
Although reception mechanism is well defined, many
aspects still need to be investigated:
What’s the energy efficiency achieved by multi-slot packets?
What’s the role plaid by the receiver-correlator margin parameter?
What’s the amount of energy drained by Master and Slave units?
Our aim is to provide answers to such questions! How?
Capture system dynamic by means of a FSMC
Define appropriate reward functions (Data, Energy, Time)
Resort to renewal reward analysis to compute system performance
COST273, Barcelona, 15-17 January, 2003
TD (03)-028
What standard says…
Bluetooth reception
mechanism
COST273, Barcelona, 15-17 January, 2003
TD (03)-028
Access Code field
72
54
AC
HEC
access code packet header
0-2745
PAYL
CRC
payload
Access Code (AC)
AC field is used for synchronization and piconet identification
All packet exchanged in a piconet have same AC
Bluetooth receiver correlates the incoming bit stream against the
expected synchronization word:
AC is recognized if correlator output exceeds a given threshold
AC does check HEAD is received
AC does NOT check reception stops and pck is immediately discarded
COST273, Barcelona, 15-17 January, 2003
TD (03)-028
Receiver-Correlator Margin
S: Receiver–correlator margin
Determines the selectivity of the
receiver with respect to packets
containing errors
Low S strong selectivity
risk of dropping packets that could
be successfully recovered
High S weak selectivity
risk of receiving an entire packet
that contains unrecoverable errors
COST273, Barcelona, 15-17 January, 2003
TD (03)-028
Packet HEADer field
72
54
AC
HEC
access code packet header
0-2745
PAYL
CRC
payload
Packet Header (HEAD)
Contains:
Destination address
Packet type
ARQN flags: used for piggy-backing ACK information
Header checksum field (HEC): used to check HEAD integrity
HEC does check PAYL is received
HEC does NOT check reception stops and pck is immediately discarded
COST273, Barcelona, 15-17 January, 2003
TD (03)-028
Packet PAYLoad field
72
54
AC
HEC
access code packet header
0-2745
PAYL
CRC
payload
Payload (PAYL)
DH: High capacity unprotected packet types
DM: Medium capacity FEC protected packet types
(15,10) Hamming code
CRC field is used to check PAYL integrity:
CRC does check positive acknowledged is return (piggy-back)
CRC does NOT check negative acknowledged is return (piggy-back)
COST273, Barcelona, 15-17 January, 2003
TD (03)-028
Conditioned probabilities
AC
72 bits
DHn: Unprotected
2-time bit rep.
(1/3 FEC)
ReceiverCorrelator
Margin (S)
HEC
DMn: (15,10) Hamming
FEC
PAYLOAD
54 bits
CRC
h=2202745 bits
0: BER
DHn : PLok 0 1 0 h
DMn : PLok 0 15 0 1 0 14 1 0 15
HECok 0 3 0 1 0 1 0
ACok 0
COST273, Barcelona, 15-17 January, 2003
2
h 15
3 18
72 j
0 1 0 72 j
j
j 0
S
TD (03)-028
Retransmissions
A
B
B
B
B
B
NAK
MASTER
ACK
G
SLAVE
A
F
X
H
H
B
X
DPCK
DPCK
Automatic Retransmission Query (ARQ):
Each data packet is transmitted and retransmitted until positive
acknowledge is returned by the destination
Negative acknowledgement is implicitly assumed!
Errors on return packet determine transmission of duplicate packets
Slave filters out duplicate packets by checking their sequence number
Slave never transmits duplicate packets!
Slave can transmit when it receives a Master packet
Master packet piggy-backs the ACK/NACK for previous Slave transmission
Slave retransmits only when needed!
COST273, Barcelona, 15-17 January, 2003
TD (03)-028
Mathematical Analysis
System Model
COST273, Barcelona, 15-17 January, 2003
TD (03)-028
Mathematical Model
System dynamic can be modelled by means of a discrete time
independent process {en} with state space E
Each state corresponds to a specific system behaviour
For each state Ej E, we define the following reward functions
Dj(x)= Average amount of data delivered by unit x{M,S}
Wj(x)= Average amount of energy consumed by unit x{M,S}
Tj= Average amount of time spent in state Ej
Denoting by j the probability of event Ej, the average amount of reward
earned in state Ej is given by:
D
( x)
( x)
D
j j
E j E
COST273, Barcelona, 15-17 January, 2003
W
( x)
jW j( x)
E j E
T
T
j j
E j E
TD (03)-028
System Dynamic
We need to determine:
State space E
System behaviour in each Ej E
System dynamic depends on the packet reception
events that occur at Slave and Master units
Let us first focus on events that may occur during
the reception of a single packet
COST273, Barcelona, 15-17 January, 2003
TD (03)-028
Packet reception events
Let us define the following basic packet reception events
ACer: AC does not check
HECer: AC does check & HEC does not
Packet is recognized but PAYL contains unrecoverable errors
CRCok: AC & HEC & CRC do check
Packet is not recognized
CRCer: AC & HEC do check, CRC does not
Packet is not recognized
Packet is successfully received
Furthermore, we introduce the following notation
Recognition Error: RECer={ACer or HECer}
Recognition OK:
RECok={CRCer or CRCok}
COST273, Barcelona, 15-17 January, 2003
TD (03)-028
Basic reception events (1)
Looking at the reception status of both the downlink (master to slave) and uplink (slave to
master) packets, we can identify four basic reception events
r1: both downlink and uplink packet are recognized by the slave and master unit,
respectively
(S )
(M )
r1 RECok
RECok
r2: downlink packet is not recognized by the slave unit (uplink packet is not returned)
r2 RECer( S )
r3: downlink packet is recognized by the slave unit, but PAYL is not correct, uplink
packet is not recognized by the master unit
r3 CRCer( S ) RECer( M )
r4: downlink packet is successfully received by the slave unit, uplink packet is not
recognized by the master unit
(S )
r4 CRCok
RECer( M )
COST273, Barcelona, 15-17 January, 2003
TD (03)-028
Basic reception events (2)
Note that,
Basic events are disjoint:
i, j 1,2,3,4, i j, ri r j
Their probabilities adds to one:
4
Pr( r ) 1
i
i 1
The occurrence of each basic event determines a specific
system dynamic for a given number of steps
We define a state Ei to each basic event ri: ri Ei
State Ei collects the system dynamic after the occurrence of the
basic event ri
COST273, Barcelona, 15-17 January, 2003
TD (03)-028
Notations
Let us introduce some notation:
Dxn= downlink (Master to Slave) packet type, n=1,3,5
Dym= uplink (Slave to Master) packet type,
L(Dxn) = number of data bits carried by the Dxn packet type
wTX(X)= amount of power consumed by transmitting packet field X
wRX(X)= amount of power consumed by receiving packet field X
w0= average amount of power consumed by the receiving unit in
m=1,3,5
case the incoming packet is not recognized, i.e., RECer occurs:
w0 wRX AC wRX HEADPrHECer RECer
COST273, Barcelona, 15-17 January, 2003
TD (03)-028
System Dynamic: E1
MASTER
Transmission
Reception
(S )
RECok
(M )
RECok
SLAVE
T1
wRX Dxn
Rewards earned in state E1 are given by:
Time spent is E1
Energy consumed by Master
Energy consumed by Slave
Data delivered by Master
Data delivered by Slave
COST273, Barcelona, 15-17 January, 2003
wTX Dym
T1 (n m)Tslot
W1( S ) wRX Dxn wTX D ym
W1( M ) wTX Dxn wRX D ym
Pr CRC
(S )
(S )
D1( M ) LDxn Pr CRCok
RECok
D1( S ) L D ym
(M )
ok
(M )
RECok
TD (03)-028
System Dynamic: E2
MASTER
Transmission
Reception
RECer(S )
SLAVE
wRX AC
T2
Rewards earned in state E2 are given by:
w0
Time spent is E2
T2 (n 1)Tslot
Energy consumed by Master
W2( M ) wTX Dxn wRX AC
Energy consumed by Slave
W2( S ) w0 wRX ACn 2
Data delivered by Master
D2( M ) 0
Data delivered by Slave
D2( S ) 0
COST273, Barcelona, 15-17 January, 2003
TD (03)-028
System Dynamic: E3
MASTER
Transmission
Reception
(S )
RECok
RECer(M )
SLAVE
z m 1 n 1
T3
Rewards earned in state E3 are given by:
T3 (n 1)z 1Tslot
in , m
2, n 5, m 3;
1, n m 1;
0 otherwise
Time spent is E3
Energy consumed by Master
W3( M ) wTX Dxn z 1 w0 wRX AC z
Energy consumed by Slave
W3( S ) wRX Dxn wTX D ym wRX AC in, m
Data delivered by Master
D3( M ) 0
Data delivered by Slave
D3( S ) 0
COST273, Barcelona, 15-17 January, 2003
TD (03)-028
System Dynamic: E4
T4
State E4 is entered when r4 event occurs:
Downlink packet is perfectly received, while uplink packet is not recognized
Master keeps retransmitting duplicate pcks until a return pck is recognized
Slave listens only for AC and HEAD fields of duplicate packets and returns an
uplink packet for each duplicate packet it recognizes
State E4 is left when r1 event occurs:
Both downlink and uplink packets are recognized by the respective units
COST273, Barcelona, 15-17 January, 2003
TD (03)-028
Performance Analysis
Results
COST273, Barcelona, 15-17 January, 2003
TD (03)-028
Performance Indexes
From the renewal reward analysis, we can evaluate the
following performance indexes
Goodput: G
Amount of data successfully delivered per unit of time
D D
G lim
T
(S )
D
(M )
T
Energy Efficiency:
Amount of data successfully delivered per unit of energy consumed
D D D
lim
(S )
(M )
W
W W
(S )
COST273, Barcelona, 15-17 January, 2003
(M )
TD (03)-028
AWGN channel: M>S
Asymmetric connection: M>S
Data flows from Master to Slave
SNRdB<14, G 0
SNRdB=1418, DMn outperforms DHn
SNRdB>18, DHn achieves better G
Energy efficiency curves resemble
Goodput curves
However, performance gap between
Dx5 and Dx3 pck types is reduced
COST273, Barcelona, 15-17 January, 2003
TD (03)-028
AWGN channel: S>M
Asymmetric connection: S>M
Data flows from Slave to Master
Swapping Master and Slave role:
DM5 & DM3 Goodput increases up to 15 %
Other pck types do not improve, but neither
loose performance…
GS M
G
GM S
Energy efficiency improvement for DM5 &
Dm3 pcks is up to 22 %
S M
M S
However, for greater SNR values,
performance improvement is lower…
COST273, Barcelona, 15-17 January, 2003
TD (03)-028
Rayleigh channel: M>S
Performance in Rayleigh channels is
drastically reduced!
SNRdB<14, G 0
SNRdB<18, DMn & DHn types achieve
similar performance
SNRdB>18, DH5 achieves higher G
Energy efficiency curves resemble
Goodput curves
Curves shape is smoother than for AWGN
COST273, Barcelona, 15-17 January, 2003
TD (03)-028
Rayleigh channel: S>M
G
GS M
GM S
For Rayleigh fading channel, S>M
configuration is much better performing
than M>S configuration, for almost all the
packet types
DM5 & DM3 Goodput increases up to 55 %
DH5 & DH3 Goodput increases up to 15 %
S M
M S
All the packet types improve energy
efficiency performance
For DM5 & DM3, Δ up to 88 %!!!
For DH5 & DH3, Δ up to 20 %
COST273, Barcelona, 15-17 January, 2003
TD (03)-028
Impact of parameter S
The receiver correlator margin S has strong impact on system performance
G improves for high S values (from 30% up to 230% for SNRdB=15)
improves for DMn and DH1 types
slightly decreases for DH5 & DH3 types (less 6 % performance loss)
Relaxing AC selectivity is convenient, since G gain is much higher than loss
Impact of S, however, rapidly reduces for SNRdB>15
COST273, Barcelona, 15-17 January, 2003
TD (03)-028
Conclusions
Average traffic rate shows a tradeoff between different packet types
Unprotected and long types yield better Goodput for SNR> 18
For lower SNR, better performance are achieved by short and protected formats
Performance gap between protected and unprotected formats is drastically reduced in
fading channels
Slave to Master configuration yields performance improvement in terms of both
Goodput and Energy Efficiency
Server (slave) never retransmits pcks that were already received by the client (master)
Parameter S may significantly impact on performance
Short and Protected packet types improve performance with S
Long and Unprotected packet types show less dependence on this parameter
Results may be exploited to design energy–efficient algorithms for the piconet
management
COST273, Barcelona, 15-17 January, 2003
TD (03)-028
That’s all!
Thanks for you
attention!
COST273, Barcelona, 15-17 January, 2003
TD (03)-028
© Copyright 2026 Paperzz