Third-Party Handshake Protocol for Efficient Peer Discovery and

Download Report

Transcript Third-Party Handshake Protocol for Efficient Peer Discovery and

Slide 1

Third-Party Handshake Protocol for
Efficient Peer Discovery
and Route Optimization in
IEEE 802.15.3 WPANs
Authors:
Zhanping Yin * Victor C. M. Leung
Published:
ACM/ MONET 2006
Presented by:
Gautam S. Thakur

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

WPAN
• A WPAN (wireless personal area network) is a
personal area network - a network for
interconnecting devices centered around an
individual person's workspace
• A very short range ~10 mtrs. E.g. Bluetooth
• Proposed operating frequencies are around
2.4 GHz in digital modes.
• The objective is to facilitate seamless

operation among home or business devices
and systems.

Ultra-Wideband
• A physical layer technology
• For, short distance communication with high
data rate and short transmission range.
• Lower power requirement and pulsed data
• UWB transmission over extremely wide
unlicensed radio spectrum  3.1 – 10.6 GHz.
• Over results in
– Less interference
– Wire-like performance for indoor wireless
environment.

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Overview of 802.15.3
• Why 802.15.3 ?
• The 802.15.3 Wireless Space
• 802.15.3 Overview and Components

Overview of 802.15.3
[Why 802.15.3 ?]
• Motivated by the increasing demand of wireless
communications with






Ubiquitous network connectivity
Low cost and low power consumption -> WPAN
High data rate(HDR)
Quality of Service(QoS) support
Comparison with other short to medium range wireless
technologies
• Wireless LAN (WLAN)
– High cost and power consumption, no hard QoS guarantee

• WPANs-Bluetooth (802.15.1) and ZigBee(802.15.4)
– Data rate too low

• Applications of 802.15.3
– Virtual wireless multimedia connectivity
• Video/audio distribution

– High speed data transfer

Overview of 802.15.3
[ 802.15.3 = Wireless Multimedia ]

Overview of 802.15.3
[ The 802 Wireless Space ]

IEEE 802.15.3 Overview
• High date rate and low
power
• Mainly works within a
piconet with dynamic
DEV membership
• Ad hoc topology with
centralized control by
the PNC
• Connection oriented
peer-to-peer
communications
• Support for multimedia
quality of service(QoS)
• Multiple power
management modes
• Security

Formation of an 802.15.3 piconet
• The basic component
is the DEV
– One DEV is required to
assume the role of the
piconet coordinator
(PNC) of the piconet.
– The PNC provides the
basic timing sync for the
piconet with the beacon.
– Additionally, the PNC
manages the quality of
service (QoS)
requirements, power
save modes and access
control to the piconet.

Formation of an 802.15.3 piconet (2)
• PNC supports ad
hoc peer-to-peer
connections
• PNC provides
timing for
synchronization of
DEVs within the
piconet, performs
admission control,
allocates network
resources etc

Formation of a Piconet (3)
• All DEVs within radio coverage of the PNC
can then associate with it to form a piconet.
• Then starts the peer discovery.
• Some DEV pairs in the piconet may be out of

range of each other, and as a result, direct
peer-to-peer connection is unavailable
between them. This results in network layer
discovery methods

Superframe format
• Timing and data transmissions in the piconet
are based on the superframe
• The superframe has three parts
– Beacon: Control information, Allocates CTA,
Synchronization
– Contention Access Period (CAP): via CSMA/CA, file xfer
– Channel Time Allocation Period (CTAP)

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Peer discovery and connectivity issue
• An 802.15.3 piconet supports ad hoc
communications between peer DEVs.
• Peer discovery is crucial to its operation.
• The DEVs shall be able to obtain information
about the services and capabilities of other
DEVs in the piconet at any time by
information discovery commands.
• Peer information is needed before a source
DEV can send any data to a destination DEV,
or generate channel time requests (CTRq) to
the PNC.

1
2

5

3

4

6

9

7

8

10

13

11

14

12

15

PNC

Src_DEV

Dest_DEV

PNC Info. Request command
SIFS
Imm-ACK

SIFS
PNC Information command
SIFS
Imm-ACK
SIFS

Probe Request Command
SIFS
Imm-ACK
SIFS
Probe Response Command
SIFS
Imm-ACK
RIFS

1. NOT receive the Imm-Ack
2. Cannot distinguish out-of-range
transmission and collision
3. Perform backoff retransmission
for collision repeatedly

DEV – 1

PNC

Dev 2 is outside the
range of Dev1 and
vise-versa

1. NOT receive Probe Request
command

DEV - 2

Existing Issues with IEEE 802.15.3











Peer discovery is crucial to piconet
operations.
Standard peer discovery is
unreliable and leads to substantial
delays for unreachable DEV pairs
Full piconet connectivity is not
guaranteed with only direct peerto-peer communications
The standard 802.15.3 MAC does
not take advantage of the unique
ranging capabilities enabled by
UWB
Connections are in peer-to-peer
manner without consider of
possible route optimizations
MAC modeling and performance
evaluation
Stream time scheduling methods
not defined in the standard





DEV_1 cannot communicate with
DEV_4 in peer-to-peer manner
For traffic between DEV_1 and
DEV_3, is it better to forward via
PNC than the direct connection?
What is the optimal path and data
rate between DEV_3 and DEV_5?

Using network layer routing
• Each hop request a
CTA slot seperately.
• PNC treat each hop as
independent traffic
stream

• Effect: Failure in an
intermediate hop
breaks the
connections, but PNC
assumes that an
independent stream is
terminated. Keeps
allocating CTAs for
other hops untill it is
eventually notified by
all participating DEV

Using MAC layer forwarding
• With explicit MAC
layer forwarding,
PNC knows that
these hops belongs
to one connection.
• Better adjusting
downstream and
upstream CTAs.

• Effect: reroute the
traffic is the
intermediate node
fails, and releasing
all CTAs if source
of destination
terminates.

Some Observations
• Peer discover is essential
to piconet operations
and communication
between DEVs
• Full piconet connectivity
cannot be guaranteed
• Some DEV pairs may be
out of range of each
other
• Mac layer routing fails
but is better then IP
routing.

• Remember, 802.15.3 has
centralized topology. So
what ??
• Using PNC, any devices
is two-hop count away
only.
• Can use the central
management capability
to discover simpler and
less costly MAC route

Proposed peer discovery protocol
with forwarding route optimization
• The PNC can always act as a first hop to
connect non-intersecting range DEVs
• However, a betterment can be done in the
frame forwarding by choosing another
DEV closer in distance to the source and
destination to forward the frame.
• All routes are limited to two hops only.

Algorithm
• If the Desti_DEV is reachable, sending PNC
Information Request and Response exchange is
redundant.
• So, Src_DEV send Probe Request command to the
Dest_DEV.
• If Dest_DEV receives the command, it returns an
Imm-ACK after a SIFS and then the Probe Response
command as in standard protocol operations.
• At the same time, the third party, i.e., the PNC, shall
actively monitor the frame exchange.
• Upon receiving a Probe Request, the PNC checks the
destination ID (Dest_ID) field in the MAC header.

Algorithm (2)
• If the Dest_ID is not associated in the piconet, the PNC
send an Imm-ACK to the Src_DEV after SIFS, followed
by a PNC Information command with an empty
Information Element (IE) to notify the source that
destination does not exist.
• Otherwise, instead of ignoring the Probe Request frame,
the PNC waits for the Imm-ACK from the destination
DEV.
• If no Imm-ACK arrives after a backoff inter-frame space
(BIFS), which is the sum of a SIFS and a clear channel
assessment detect time (CCADetectTime), the PNC
realizes that the destination DEV cannot hear the source.
• The PNC then immediately send an Imm-ACK to the
source, followed by a PNC Information command with
the route information. (an optimized route information in
sent)

SRC_DEV send Probe
Request command to
DEST_DEV & PNC listens

SIFS
Imm-ACK

Probe Response command

SIFS (Imm-ACK)

PNC also listen

DEST_DEV
hears?

YES

DEST_DEV
responds

No
No

DEST_DEV
ID
Present?

Yes, Timeout (BIFS)

Send Imm-ACK & route
information to source

Yes and
DEST_DEV sent Imm-ACK

Do Nothing, monitor if
DEST_DEV crash.

Forward the data to
the router node

Algorithm (3)
[Route calculation]
• Most wireless networks today employ a multirate PHY (e.g., UWB in 802.15.3a) that
supports a set of data rate dependent
modulation/coding parameters.
• Due to the extremely low power consumption
requirement of WPAN devices, the achievable
data rate drops dramatically when the
distance increases.
• The data rate can be modeled as a discrete
function of transmission distance d between
two DEVs:

Algorithm (3)
Rate ( d )  S i ;
R i  1  d  R i ;1  i  m
where, R m

1

 0 , R i is the transmiss

and S 1 and S m are the minimum

ion range of rate S i ;

and maximum

data

rates, respective ly. If d is greater th an R 1, then Rate(d)
and the DEVs have no connectivi

ty

0

Algorithm (4)
• Since the PNC can monitor all commands exchanged
during the CAP, it can learn the data rates between
reachable DEV pairs and store them in an n x n rate
matrix (RM), where
• n is the total number of DEVs within the piconet. DEV
is assigned a unique DEV_ID in the piconet
RM ij is the link rate based on the current informatio
obtained

from the commands

DEV i and DEV j . RM

ij

exchanged

 0 if DEV i and DEV

are out of range or the rate informatio
not available

between

yet, and RM

ij

n is

  if i  j .

j

n

Algorithm (5)
• All DEVs transmit with the maximum
allowable power when sending data. Since the
wireless links are symmetric in nature, clearly
RMij = RMji.
• Based on the current rate information stored
in RM, for an unreachable pair DEVi and
DEVj, the PNC can determine the optimal
(two-hop) route that has the minimum
transmission time, i.e., the best route employs
DEVk for MAC layer forwarding, where k
minimizes:

Algorithm (6)
min(

1
RM



ik
k [ 0 , n  1 ]

1
RM

)
kj

• Alleviates the traffic load on the PNC
• Discovers a current optimal two-hop MAC layer
forwarding path given by existing rate information
without introducing any extra overhead
• If the connection is broken, the PNC can
immediately reroute the traffic to a current
optimal path, or terminate the connection by deallocating all corresponding CTAs.

Discussion
• Original case:
Causes
retransmission

• 3PHP: data sent via
2-hop route if
PNC_ID exists

Dest_ID

Dest_ID

• Normal Transmission (Imm_Ack)

• Normal Transmission (Imm_Ack)

XXX FRAME LOST XXXX

PNC_ID

• Causes retransmission

• Sent Via 2–hop route (Imm_Ack)

PNC

Src_DEV
PNC Info. Request command

Probe Request Command

BIFS
Imm-ACK
SIFS

PNC Information command with Route Info.

Imm-ACK

RIFS

Dest_DEV

SIFS

3PHP-Node

DEV – 1

DEV - 2

PNC

Observations
• With 3PHP, peer discovery requires only one
round of frame exchange.
• Fully utilized the broadcast nature,
centralized control, ad-hoc communication,
and efficient peer discovery.
• Save the futile back-off retransmission for
unreachable destination.
• Guaranteed full piconet connectivity. (no
network layer routing required)
• On demand routing
• More then BIFS waiting. (include RIFS) Conclusion

Performance Evaluations
[Intra-piconet no connection probability]
• Intra-piconet no
connection
probability

• Common Overlap
Area function
COLA(R, r, x):
Represent the
intersection of two
circles with radii R
and r (r e R),
respectively, which
centers are
separated by
distance x

Performance Evaluations (2)
[Intra-piconet no connection probability]

Performance Evaluations (3)
[Intra-piconet no connection probability]
• The probability of no direct connection
between two DEVs in a piconet is

Performance Evaluations (4)
[Peer Discovery delay analysis]


# of Frame Transmission




Expected
Contention Time



Expected Packet
Delay

Performance Evaluations (5)
[Peer Discovery delay analysis]


Expected routing
failure probability

• Expected successful peer discovery
delays are given by

Simulation and Numerical Results
• No connection probability as a function of
coverage range ratio

Simulation and Numerical Results (2)
• Peer discovery delay vs. conditional
collision probability

Simulation and Numerical Results (3)
• Piconet peer discovery time vs. coverage
range ratio

Simulation and Numerical Results (4)
• Piconet peer discovery failure probability
with standard method

Simulation and Numerical Results (5)
• Two-hop forwarding route optimization
ratio vs. piconet radius

Simulation and Numerical Results (6)
• Expected data between directly unreachable
pairs in piconets with 20 DEVs

Conclusion
• Underlying fact: peer-to-peer data delivery in
802.15.3 WPANs
• Existing MAC layer peer discovery methods
cannot guarantee full connectivity between
DEVs within a piconet through direct peerto-peer connections if the piconet operates
with a radius larger than half of the
maximum transmission distance. (~ 41.3%)
• If Mac fails, use the expensive network layer
routing.

Conclusion (2)
• Used the central control topology
• Routing in 2-hop with single round of
control frame exchange
• 3PHP achieves 25– 37% faster peer
discovery time over the standard MAC
• Route optimization algorithm in the PNC
to provide the best MAC layer forwarding
routes by self-learning the available rate
information between DEVs.

References


IEEE Standard 802.15.3, “Wireless medium access control (MAC) and physical
layer (PHY) specifications for high rate wireless personal area networks
(WPANs),”Sept. 2003.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery in IEEE 802.15.3 WPANs,”in Proc. IEEE BroadNets2005, Boston, MA,
Oct. 2005.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery and Route Optimization in IEEE 802.15.3WPANs,”accepted for
publication in ACM/KluwerJ. Mobile Networks and Applications, Nov. 2005.



Z. Yin and V.C.M. Leung, “Connection Data Rate Optimization of IEEE 802.15.3
Scatternetswith Multi-rate Carriers,”IEEE ICC’06, Istanbul, Turkey, June 2006.



Zhanping Yin and Victor C.M. Leung, “Introduction to IEEE 802.15.3 High Rate
Wireless Personal Area Network (WPAN)”, Electrical and Computer Engineering
University of British Columbia

Thank You



Slide 2

Third-Party Handshake Protocol for
Efficient Peer Discovery
and Route Optimization in
IEEE 802.15.3 WPANs
Authors:
Zhanping Yin * Victor C. M. Leung
Published:
ACM/ MONET 2006
Presented by:
Gautam S. Thakur

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

WPAN
• A WPAN (wireless personal area network) is a
personal area network - a network for
interconnecting devices centered around an
individual person's workspace
• A very short range ~10 mtrs. E.g. Bluetooth
• Proposed operating frequencies are around
2.4 GHz in digital modes.
• The objective is to facilitate seamless

operation among home or business devices
and systems.

Ultra-Wideband
• A physical layer technology
• For, short distance communication with high
data rate and short transmission range.
• Lower power requirement and pulsed data
• UWB transmission over extremely wide
unlicensed radio spectrum  3.1 – 10.6 GHz.
• Over results in
– Less interference
– Wire-like performance for indoor wireless
environment.

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Overview of 802.15.3
• Why 802.15.3 ?
• The 802.15.3 Wireless Space
• 802.15.3 Overview and Components

Overview of 802.15.3
[Why 802.15.3 ?]
• Motivated by the increasing demand of wireless
communications with






Ubiquitous network connectivity
Low cost and low power consumption -> WPAN
High data rate(HDR)
Quality of Service(QoS) support
Comparison with other short to medium range wireless
technologies
• Wireless LAN (WLAN)
– High cost and power consumption, no hard QoS guarantee

• WPANs-Bluetooth (802.15.1) and ZigBee(802.15.4)
– Data rate too low

• Applications of 802.15.3
– Virtual wireless multimedia connectivity
• Video/audio distribution

– High speed data transfer

Overview of 802.15.3
[ 802.15.3 = Wireless Multimedia ]

Overview of 802.15.3
[ The 802 Wireless Space ]

IEEE 802.15.3 Overview
• High date rate and low
power
• Mainly works within a
piconet with dynamic
DEV membership
• Ad hoc topology with
centralized control by
the PNC
• Connection oriented
peer-to-peer
communications
• Support for multimedia
quality of service(QoS)
• Multiple power
management modes
• Security

Formation of an 802.15.3 piconet
• The basic component
is the DEV
– One DEV is required to
assume the role of the
piconet coordinator
(PNC) of the piconet.
– The PNC provides the
basic timing sync for the
piconet with the beacon.
– Additionally, the PNC
manages the quality of
service (QoS)
requirements, power
save modes and access
control to the piconet.

Formation of an 802.15.3 piconet (2)
• PNC supports ad
hoc peer-to-peer
connections
• PNC provides
timing for
synchronization of
DEVs within the
piconet, performs
admission control,
allocates network
resources etc

Formation of a Piconet (3)
• All DEVs within radio coverage of the PNC
can then associate with it to form a piconet.
• Then starts the peer discovery.
• Some DEV pairs in the piconet may be out of

range of each other, and as a result, direct
peer-to-peer connection is unavailable
between them. This results in network layer
discovery methods

Superframe format
• Timing and data transmissions in the piconet
are based on the superframe
• The superframe has three parts
– Beacon: Control information, Allocates CTA,
Synchronization
– Contention Access Period (CAP): via CSMA/CA, file xfer
– Channel Time Allocation Period (CTAP)

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Peer discovery and connectivity issue
• An 802.15.3 piconet supports ad hoc
communications between peer DEVs.
• Peer discovery is crucial to its operation.
• The DEVs shall be able to obtain information
about the services and capabilities of other
DEVs in the piconet at any time by
information discovery commands.
• Peer information is needed before a source
DEV can send any data to a destination DEV,
or generate channel time requests (CTRq) to
the PNC.

1
2

5

3

4

6

9

7

8

10

13

11

14

12

15

PNC

Src_DEV

Dest_DEV

PNC Info. Request command
SIFS
Imm-ACK

SIFS
PNC Information command
SIFS
Imm-ACK
SIFS

Probe Request Command
SIFS
Imm-ACK
SIFS
Probe Response Command
SIFS
Imm-ACK
RIFS

1. NOT receive the Imm-Ack
2. Cannot distinguish out-of-range
transmission and collision
3. Perform backoff retransmission
for collision repeatedly

DEV – 1

PNC

Dev 2 is outside the
range of Dev1 and
vise-versa

1. NOT receive Probe Request
command

DEV - 2

Existing Issues with IEEE 802.15.3











Peer discovery is crucial to piconet
operations.
Standard peer discovery is
unreliable and leads to substantial
delays for unreachable DEV pairs
Full piconet connectivity is not
guaranteed with only direct peerto-peer communications
The standard 802.15.3 MAC does
not take advantage of the unique
ranging capabilities enabled by
UWB
Connections are in peer-to-peer
manner without consider of
possible route optimizations
MAC modeling and performance
evaluation
Stream time scheduling methods
not defined in the standard





DEV_1 cannot communicate with
DEV_4 in peer-to-peer manner
For traffic between DEV_1 and
DEV_3, is it better to forward via
PNC than the direct connection?
What is the optimal path and data
rate between DEV_3 and DEV_5?

Using network layer routing
• Each hop request a
CTA slot seperately.
• PNC treat each hop as
independent traffic
stream

• Effect: Failure in an
intermediate hop
breaks the
connections, but PNC
assumes that an
independent stream is
terminated. Keeps
allocating CTAs for
other hops untill it is
eventually notified by
all participating DEV

Using MAC layer forwarding
• With explicit MAC
layer forwarding,
PNC knows that
these hops belongs
to one connection.
• Better adjusting
downstream and
upstream CTAs.

• Effect: reroute the
traffic is the
intermediate node
fails, and releasing
all CTAs if source
of destination
terminates.

Some Observations
• Peer discover is essential
to piconet operations
and communication
between DEVs
• Full piconet connectivity
cannot be guaranteed
• Some DEV pairs may be
out of range of each
other
• Mac layer routing fails
but is better then IP
routing.

• Remember, 802.15.3 has
centralized topology. So
what ??
• Using PNC, any devices
is two-hop count away
only.
• Can use the central
management capability
to discover simpler and
less costly MAC route

Proposed peer discovery protocol
with forwarding route optimization
• The PNC can always act as a first hop to
connect non-intersecting range DEVs
• However, a betterment can be done in the
frame forwarding by choosing another
DEV closer in distance to the source and
destination to forward the frame.
• All routes are limited to two hops only.

Algorithm
• If the Desti_DEV is reachable, sending PNC
Information Request and Response exchange is
redundant.
• So, Src_DEV send Probe Request command to the
Dest_DEV.
• If Dest_DEV receives the command, it returns an
Imm-ACK after a SIFS and then the Probe Response
command as in standard protocol operations.
• At the same time, the third party, i.e., the PNC, shall
actively monitor the frame exchange.
• Upon receiving a Probe Request, the PNC checks the
destination ID (Dest_ID) field in the MAC header.

Algorithm (2)
• If the Dest_ID is not associated in the piconet, the PNC
send an Imm-ACK to the Src_DEV after SIFS, followed
by a PNC Information command with an empty
Information Element (IE) to notify the source that
destination does not exist.
• Otherwise, instead of ignoring the Probe Request frame,
the PNC waits for the Imm-ACK from the destination
DEV.
• If no Imm-ACK arrives after a backoff inter-frame space
(BIFS), which is the sum of a SIFS and a clear channel
assessment detect time (CCADetectTime), the PNC
realizes that the destination DEV cannot hear the source.
• The PNC then immediately send an Imm-ACK to the
source, followed by a PNC Information command with
the route information. (an optimized route information in
sent)

SRC_DEV send Probe
Request command to
DEST_DEV & PNC listens

SIFS
Imm-ACK

Probe Response command

SIFS (Imm-ACK)

PNC also listen

DEST_DEV
hears?

YES

DEST_DEV
responds

No
No

DEST_DEV
ID
Present?

Yes, Timeout (BIFS)

Send Imm-ACK & route
information to source

Yes and
DEST_DEV sent Imm-ACK

Do Nothing, monitor if
DEST_DEV crash.

Forward the data to
the router node

Algorithm (3)
[Route calculation]
• Most wireless networks today employ a multirate PHY (e.g., UWB in 802.15.3a) that
supports a set of data rate dependent
modulation/coding parameters.
• Due to the extremely low power consumption
requirement of WPAN devices, the achievable
data rate drops dramatically when the
distance increases.
• The data rate can be modeled as a discrete
function of transmission distance d between
two DEVs:

Algorithm (3)
Rate ( d )  S i ;
R i  1  d  R i ;1  i  m
where, R m

1

 0 , R i is the transmiss

and S 1 and S m are the minimum

ion range of rate S i ;

and maximum

data

rates, respective ly. If d is greater th an R 1, then Rate(d)
and the DEVs have no connectivi

ty

0

Algorithm (4)
• Since the PNC can monitor all commands exchanged
during the CAP, it can learn the data rates between
reachable DEV pairs and store them in an n x n rate
matrix (RM), where
• n is the total number of DEVs within the piconet. DEV
is assigned a unique DEV_ID in the piconet
RM ij is the link rate based on the current informatio
obtained

from the commands

DEV i and DEV j . RM

ij

exchanged

 0 if DEV i and DEV

are out of range or the rate informatio
not available

between

yet, and RM

ij

n is

  if i  j .

j

n

Algorithm (5)
• All DEVs transmit with the maximum
allowable power when sending data. Since the
wireless links are symmetric in nature, clearly
RMij = RMji.
• Based on the current rate information stored
in RM, for an unreachable pair DEVi and
DEVj, the PNC can determine the optimal
(two-hop) route that has the minimum
transmission time, i.e., the best route employs
DEVk for MAC layer forwarding, where k
minimizes:

Algorithm (6)
min(

1
RM



ik
k [ 0 , n  1 ]

1
RM

)
kj

• Alleviates the traffic load on the PNC
• Discovers a current optimal two-hop MAC layer
forwarding path given by existing rate information
without introducing any extra overhead
• If the connection is broken, the PNC can
immediately reroute the traffic to a current
optimal path, or terminate the connection by deallocating all corresponding CTAs.

Discussion
• Original case:
Causes
retransmission

• 3PHP: data sent via
2-hop route if
PNC_ID exists

Dest_ID

Dest_ID

• Normal Transmission (Imm_Ack)

• Normal Transmission (Imm_Ack)

XXX FRAME LOST XXXX

PNC_ID

• Causes retransmission

• Sent Via 2–hop route (Imm_Ack)

PNC

Src_DEV
PNC Info. Request command

Probe Request Command

BIFS
Imm-ACK
SIFS

PNC Information command with Route Info.

Imm-ACK

RIFS

Dest_DEV

SIFS

3PHP-Node

DEV – 1

DEV - 2

PNC

Observations
• With 3PHP, peer discovery requires only one
round of frame exchange.
• Fully utilized the broadcast nature,
centralized control, ad-hoc communication,
and efficient peer discovery.
• Save the futile back-off retransmission for
unreachable destination.
• Guaranteed full piconet connectivity. (no
network layer routing required)
• On demand routing
• More then BIFS waiting. (include RIFS) Conclusion

Performance Evaluations
[Intra-piconet no connection probability]
• Intra-piconet no
connection
probability

• Common Overlap
Area function
COLA(R, r, x):
Represent the
intersection of two
circles with radii R
and r (r e R),
respectively, which
centers are
separated by
distance x

Performance Evaluations (2)
[Intra-piconet no connection probability]

Performance Evaluations (3)
[Intra-piconet no connection probability]
• The probability of no direct connection
between two DEVs in a piconet is

Performance Evaluations (4)
[Peer Discovery delay analysis]


# of Frame Transmission




Expected
Contention Time



Expected Packet
Delay

Performance Evaluations (5)
[Peer Discovery delay analysis]


Expected routing
failure probability

• Expected successful peer discovery
delays are given by

Simulation and Numerical Results
• No connection probability as a function of
coverage range ratio

Simulation and Numerical Results (2)
• Peer discovery delay vs. conditional
collision probability

Simulation and Numerical Results (3)
• Piconet peer discovery time vs. coverage
range ratio

Simulation and Numerical Results (4)
• Piconet peer discovery failure probability
with standard method

Simulation and Numerical Results (5)
• Two-hop forwarding route optimization
ratio vs. piconet radius

Simulation and Numerical Results (6)
• Expected data between directly unreachable
pairs in piconets with 20 DEVs

Conclusion
• Underlying fact: peer-to-peer data delivery in
802.15.3 WPANs
• Existing MAC layer peer discovery methods
cannot guarantee full connectivity between
DEVs within a piconet through direct peerto-peer connections if the piconet operates
with a radius larger than half of the
maximum transmission distance. (~ 41.3%)
• If Mac fails, use the expensive network layer
routing.

Conclusion (2)
• Used the central control topology
• Routing in 2-hop with single round of
control frame exchange
• 3PHP achieves 25– 37% faster peer
discovery time over the standard MAC
• Route optimization algorithm in the PNC
to provide the best MAC layer forwarding
routes by self-learning the available rate
information between DEVs.

References


IEEE Standard 802.15.3, “Wireless medium access control (MAC) and physical
layer (PHY) specifications for high rate wireless personal area networks
(WPANs),”Sept. 2003.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery in IEEE 802.15.3 WPANs,”in Proc. IEEE BroadNets2005, Boston, MA,
Oct. 2005.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery and Route Optimization in IEEE 802.15.3WPANs,”accepted for
publication in ACM/KluwerJ. Mobile Networks and Applications, Nov. 2005.



Z. Yin and V.C.M. Leung, “Connection Data Rate Optimization of IEEE 802.15.3
Scatternetswith Multi-rate Carriers,”IEEE ICC’06, Istanbul, Turkey, June 2006.



Zhanping Yin and Victor C.M. Leung, “Introduction to IEEE 802.15.3 High Rate
Wireless Personal Area Network (WPAN)”, Electrical and Computer Engineering
University of British Columbia

Thank You



Slide 3

Third-Party Handshake Protocol for
Efficient Peer Discovery
and Route Optimization in
IEEE 802.15.3 WPANs
Authors:
Zhanping Yin * Victor C. M. Leung
Published:
ACM/ MONET 2006
Presented by:
Gautam S. Thakur

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

WPAN
• A WPAN (wireless personal area network) is a
personal area network - a network for
interconnecting devices centered around an
individual person's workspace
• A very short range ~10 mtrs. E.g. Bluetooth
• Proposed operating frequencies are around
2.4 GHz in digital modes.
• The objective is to facilitate seamless

operation among home or business devices
and systems.

Ultra-Wideband
• A physical layer technology
• For, short distance communication with high
data rate and short transmission range.
• Lower power requirement and pulsed data
• UWB transmission over extremely wide
unlicensed radio spectrum  3.1 – 10.6 GHz.
• Over results in
– Less interference
– Wire-like performance for indoor wireless
environment.

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Overview of 802.15.3
• Why 802.15.3 ?
• The 802.15.3 Wireless Space
• 802.15.3 Overview and Components

Overview of 802.15.3
[Why 802.15.3 ?]
• Motivated by the increasing demand of wireless
communications with






Ubiquitous network connectivity
Low cost and low power consumption -> WPAN
High data rate(HDR)
Quality of Service(QoS) support
Comparison with other short to medium range wireless
technologies
• Wireless LAN (WLAN)
– High cost and power consumption, no hard QoS guarantee

• WPANs-Bluetooth (802.15.1) and ZigBee(802.15.4)
– Data rate too low

• Applications of 802.15.3
– Virtual wireless multimedia connectivity
• Video/audio distribution

– High speed data transfer

Overview of 802.15.3
[ 802.15.3 = Wireless Multimedia ]

Overview of 802.15.3
[ The 802 Wireless Space ]

IEEE 802.15.3 Overview
• High date rate and low
power
• Mainly works within a
piconet with dynamic
DEV membership
• Ad hoc topology with
centralized control by
the PNC
• Connection oriented
peer-to-peer
communications
• Support for multimedia
quality of service(QoS)
• Multiple power
management modes
• Security

Formation of an 802.15.3 piconet
• The basic component
is the DEV
– One DEV is required to
assume the role of the
piconet coordinator
(PNC) of the piconet.
– The PNC provides the
basic timing sync for the
piconet with the beacon.
– Additionally, the PNC
manages the quality of
service (QoS)
requirements, power
save modes and access
control to the piconet.

Formation of an 802.15.3 piconet (2)
• PNC supports ad
hoc peer-to-peer
connections
• PNC provides
timing for
synchronization of
DEVs within the
piconet, performs
admission control,
allocates network
resources etc

Formation of a Piconet (3)
• All DEVs within radio coverage of the PNC
can then associate with it to form a piconet.
• Then starts the peer discovery.
• Some DEV pairs in the piconet may be out of

range of each other, and as a result, direct
peer-to-peer connection is unavailable
between them. This results in network layer
discovery methods

Superframe format
• Timing and data transmissions in the piconet
are based on the superframe
• The superframe has three parts
– Beacon: Control information, Allocates CTA,
Synchronization
– Contention Access Period (CAP): via CSMA/CA, file xfer
– Channel Time Allocation Period (CTAP)

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Peer discovery and connectivity issue
• An 802.15.3 piconet supports ad hoc
communications between peer DEVs.
• Peer discovery is crucial to its operation.
• The DEVs shall be able to obtain information
about the services and capabilities of other
DEVs in the piconet at any time by
information discovery commands.
• Peer information is needed before a source
DEV can send any data to a destination DEV,
or generate channel time requests (CTRq) to
the PNC.

1
2

5

3

4

6

9

7

8

10

13

11

14

12

15

PNC

Src_DEV

Dest_DEV

PNC Info. Request command
SIFS
Imm-ACK

SIFS
PNC Information command
SIFS
Imm-ACK
SIFS

Probe Request Command
SIFS
Imm-ACK
SIFS
Probe Response Command
SIFS
Imm-ACK
RIFS

1. NOT receive the Imm-Ack
2. Cannot distinguish out-of-range
transmission and collision
3. Perform backoff retransmission
for collision repeatedly

DEV – 1

PNC

Dev 2 is outside the
range of Dev1 and
vise-versa

1. NOT receive Probe Request
command

DEV - 2

Existing Issues with IEEE 802.15.3











Peer discovery is crucial to piconet
operations.
Standard peer discovery is
unreliable and leads to substantial
delays for unreachable DEV pairs
Full piconet connectivity is not
guaranteed with only direct peerto-peer communications
The standard 802.15.3 MAC does
not take advantage of the unique
ranging capabilities enabled by
UWB
Connections are in peer-to-peer
manner without consider of
possible route optimizations
MAC modeling and performance
evaluation
Stream time scheduling methods
not defined in the standard





DEV_1 cannot communicate with
DEV_4 in peer-to-peer manner
For traffic between DEV_1 and
DEV_3, is it better to forward via
PNC than the direct connection?
What is the optimal path and data
rate between DEV_3 and DEV_5?

Using network layer routing
• Each hop request a
CTA slot seperately.
• PNC treat each hop as
independent traffic
stream

• Effect: Failure in an
intermediate hop
breaks the
connections, but PNC
assumes that an
independent stream is
terminated. Keeps
allocating CTAs for
other hops untill it is
eventually notified by
all participating DEV

Using MAC layer forwarding
• With explicit MAC
layer forwarding,
PNC knows that
these hops belongs
to one connection.
• Better adjusting
downstream and
upstream CTAs.

• Effect: reroute the
traffic is the
intermediate node
fails, and releasing
all CTAs if source
of destination
terminates.

Some Observations
• Peer discover is essential
to piconet operations
and communication
between DEVs
• Full piconet connectivity
cannot be guaranteed
• Some DEV pairs may be
out of range of each
other
• Mac layer routing fails
but is better then IP
routing.

• Remember, 802.15.3 has
centralized topology. So
what ??
• Using PNC, any devices
is two-hop count away
only.
• Can use the central
management capability
to discover simpler and
less costly MAC route

Proposed peer discovery protocol
with forwarding route optimization
• The PNC can always act as a first hop to
connect non-intersecting range DEVs
• However, a betterment can be done in the
frame forwarding by choosing another
DEV closer in distance to the source and
destination to forward the frame.
• All routes are limited to two hops only.

Algorithm
• If the Desti_DEV is reachable, sending PNC
Information Request and Response exchange is
redundant.
• So, Src_DEV send Probe Request command to the
Dest_DEV.
• If Dest_DEV receives the command, it returns an
Imm-ACK after a SIFS and then the Probe Response
command as in standard protocol operations.
• At the same time, the third party, i.e., the PNC, shall
actively monitor the frame exchange.
• Upon receiving a Probe Request, the PNC checks the
destination ID (Dest_ID) field in the MAC header.

Algorithm (2)
• If the Dest_ID is not associated in the piconet, the PNC
send an Imm-ACK to the Src_DEV after SIFS, followed
by a PNC Information command with an empty
Information Element (IE) to notify the source that
destination does not exist.
• Otherwise, instead of ignoring the Probe Request frame,
the PNC waits for the Imm-ACK from the destination
DEV.
• If no Imm-ACK arrives after a backoff inter-frame space
(BIFS), which is the sum of a SIFS and a clear channel
assessment detect time (CCADetectTime), the PNC
realizes that the destination DEV cannot hear the source.
• The PNC then immediately send an Imm-ACK to the
source, followed by a PNC Information command with
the route information. (an optimized route information in
sent)

SRC_DEV send Probe
Request command to
DEST_DEV & PNC listens

SIFS
Imm-ACK

Probe Response command

SIFS (Imm-ACK)

PNC also listen

DEST_DEV
hears?

YES

DEST_DEV
responds

No
No

DEST_DEV
ID
Present?

Yes, Timeout (BIFS)

Send Imm-ACK & route
information to source

Yes and
DEST_DEV sent Imm-ACK

Do Nothing, monitor if
DEST_DEV crash.

Forward the data to
the router node

Algorithm (3)
[Route calculation]
• Most wireless networks today employ a multirate PHY (e.g., UWB in 802.15.3a) that
supports a set of data rate dependent
modulation/coding parameters.
• Due to the extremely low power consumption
requirement of WPAN devices, the achievable
data rate drops dramatically when the
distance increases.
• The data rate can be modeled as a discrete
function of transmission distance d between
two DEVs:

Algorithm (3)
Rate ( d )  S i ;
R i  1  d  R i ;1  i  m
where, R m

1

 0 , R i is the transmiss

and S 1 and S m are the minimum

ion range of rate S i ;

and maximum

data

rates, respective ly. If d is greater th an R 1, then Rate(d)
and the DEVs have no connectivi

ty

0

Algorithm (4)
• Since the PNC can monitor all commands exchanged
during the CAP, it can learn the data rates between
reachable DEV pairs and store them in an n x n rate
matrix (RM), where
• n is the total number of DEVs within the piconet. DEV
is assigned a unique DEV_ID in the piconet
RM ij is the link rate based on the current informatio
obtained

from the commands

DEV i and DEV j . RM

ij

exchanged

 0 if DEV i and DEV

are out of range or the rate informatio
not available

between

yet, and RM

ij

n is

  if i  j .

j

n

Algorithm (5)
• All DEVs transmit with the maximum
allowable power when sending data. Since the
wireless links are symmetric in nature, clearly
RMij = RMji.
• Based on the current rate information stored
in RM, for an unreachable pair DEVi and
DEVj, the PNC can determine the optimal
(two-hop) route that has the minimum
transmission time, i.e., the best route employs
DEVk for MAC layer forwarding, where k
minimizes:

Algorithm (6)
min(

1
RM



ik
k [ 0 , n  1 ]

1
RM

)
kj

• Alleviates the traffic load on the PNC
• Discovers a current optimal two-hop MAC layer
forwarding path given by existing rate information
without introducing any extra overhead
• If the connection is broken, the PNC can
immediately reroute the traffic to a current
optimal path, or terminate the connection by deallocating all corresponding CTAs.

Discussion
• Original case:
Causes
retransmission

• 3PHP: data sent via
2-hop route if
PNC_ID exists

Dest_ID

Dest_ID

• Normal Transmission (Imm_Ack)

• Normal Transmission (Imm_Ack)

XXX FRAME LOST XXXX

PNC_ID

• Causes retransmission

• Sent Via 2–hop route (Imm_Ack)

PNC

Src_DEV
PNC Info. Request command

Probe Request Command

BIFS
Imm-ACK
SIFS

PNC Information command with Route Info.

Imm-ACK

RIFS

Dest_DEV

SIFS

3PHP-Node

DEV – 1

DEV - 2

PNC

Observations
• With 3PHP, peer discovery requires only one
round of frame exchange.
• Fully utilized the broadcast nature,
centralized control, ad-hoc communication,
and efficient peer discovery.
• Save the futile back-off retransmission for
unreachable destination.
• Guaranteed full piconet connectivity. (no
network layer routing required)
• On demand routing
• More then BIFS waiting. (include RIFS) Conclusion

Performance Evaluations
[Intra-piconet no connection probability]
• Intra-piconet no
connection
probability

• Common Overlap
Area function
COLA(R, r, x):
Represent the
intersection of two
circles with radii R
and r (r e R),
respectively, which
centers are
separated by
distance x

Performance Evaluations (2)
[Intra-piconet no connection probability]

Performance Evaluations (3)
[Intra-piconet no connection probability]
• The probability of no direct connection
between two DEVs in a piconet is

Performance Evaluations (4)
[Peer Discovery delay analysis]


# of Frame Transmission




Expected
Contention Time



Expected Packet
Delay

Performance Evaluations (5)
[Peer Discovery delay analysis]


Expected routing
failure probability

• Expected successful peer discovery
delays are given by

Simulation and Numerical Results
• No connection probability as a function of
coverage range ratio

Simulation and Numerical Results (2)
• Peer discovery delay vs. conditional
collision probability

Simulation and Numerical Results (3)
• Piconet peer discovery time vs. coverage
range ratio

Simulation and Numerical Results (4)
• Piconet peer discovery failure probability
with standard method

Simulation and Numerical Results (5)
• Two-hop forwarding route optimization
ratio vs. piconet radius

Simulation and Numerical Results (6)
• Expected data between directly unreachable
pairs in piconets with 20 DEVs

Conclusion
• Underlying fact: peer-to-peer data delivery in
802.15.3 WPANs
• Existing MAC layer peer discovery methods
cannot guarantee full connectivity between
DEVs within a piconet through direct peerto-peer connections if the piconet operates
with a radius larger than half of the
maximum transmission distance. (~ 41.3%)
• If Mac fails, use the expensive network layer
routing.

Conclusion (2)
• Used the central control topology
• Routing in 2-hop with single round of
control frame exchange
• 3PHP achieves 25– 37% faster peer
discovery time over the standard MAC
• Route optimization algorithm in the PNC
to provide the best MAC layer forwarding
routes by self-learning the available rate
information between DEVs.

References


IEEE Standard 802.15.3, “Wireless medium access control (MAC) and physical
layer (PHY) specifications for high rate wireless personal area networks
(WPANs),”Sept. 2003.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery in IEEE 802.15.3 WPANs,”in Proc. IEEE BroadNets2005, Boston, MA,
Oct. 2005.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery and Route Optimization in IEEE 802.15.3WPANs,”accepted for
publication in ACM/KluwerJ. Mobile Networks and Applications, Nov. 2005.



Z. Yin and V.C.M. Leung, “Connection Data Rate Optimization of IEEE 802.15.3
Scatternetswith Multi-rate Carriers,”IEEE ICC’06, Istanbul, Turkey, June 2006.



Zhanping Yin and Victor C.M. Leung, “Introduction to IEEE 802.15.3 High Rate
Wireless Personal Area Network (WPAN)”, Electrical and Computer Engineering
University of British Columbia

Thank You



Slide 4

Third-Party Handshake Protocol for
Efficient Peer Discovery
and Route Optimization in
IEEE 802.15.3 WPANs
Authors:
Zhanping Yin * Victor C. M. Leung
Published:
ACM/ MONET 2006
Presented by:
Gautam S. Thakur

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

WPAN
• A WPAN (wireless personal area network) is a
personal area network - a network for
interconnecting devices centered around an
individual person's workspace
• A very short range ~10 mtrs. E.g. Bluetooth
• Proposed operating frequencies are around
2.4 GHz in digital modes.
• The objective is to facilitate seamless

operation among home or business devices
and systems.

Ultra-Wideband
• A physical layer technology
• For, short distance communication with high
data rate and short transmission range.
• Lower power requirement and pulsed data
• UWB transmission over extremely wide
unlicensed radio spectrum  3.1 – 10.6 GHz.
• Over results in
– Less interference
– Wire-like performance for indoor wireless
environment.

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Overview of 802.15.3
• Why 802.15.3 ?
• The 802.15.3 Wireless Space
• 802.15.3 Overview and Components

Overview of 802.15.3
[Why 802.15.3 ?]
• Motivated by the increasing demand of wireless
communications with






Ubiquitous network connectivity
Low cost and low power consumption -> WPAN
High data rate(HDR)
Quality of Service(QoS) support
Comparison with other short to medium range wireless
technologies
• Wireless LAN (WLAN)
– High cost and power consumption, no hard QoS guarantee

• WPANs-Bluetooth (802.15.1) and ZigBee(802.15.4)
– Data rate too low

• Applications of 802.15.3
– Virtual wireless multimedia connectivity
• Video/audio distribution

– High speed data transfer

Overview of 802.15.3
[ 802.15.3 = Wireless Multimedia ]

Overview of 802.15.3
[ The 802 Wireless Space ]

IEEE 802.15.3 Overview
• High date rate and low
power
• Mainly works within a
piconet with dynamic
DEV membership
• Ad hoc topology with
centralized control by
the PNC
• Connection oriented
peer-to-peer
communications
• Support for multimedia
quality of service(QoS)
• Multiple power
management modes
• Security

Formation of an 802.15.3 piconet
• The basic component
is the DEV
– One DEV is required to
assume the role of the
piconet coordinator
(PNC) of the piconet.
– The PNC provides the
basic timing sync for the
piconet with the beacon.
– Additionally, the PNC
manages the quality of
service (QoS)
requirements, power
save modes and access
control to the piconet.

Formation of an 802.15.3 piconet (2)
• PNC supports ad
hoc peer-to-peer
connections
• PNC provides
timing for
synchronization of
DEVs within the
piconet, performs
admission control,
allocates network
resources etc

Formation of a Piconet (3)
• All DEVs within radio coverage of the PNC
can then associate with it to form a piconet.
• Then starts the peer discovery.
• Some DEV pairs in the piconet may be out of

range of each other, and as a result, direct
peer-to-peer connection is unavailable
between them. This results in network layer
discovery methods

Superframe format
• Timing and data transmissions in the piconet
are based on the superframe
• The superframe has three parts
– Beacon: Control information, Allocates CTA,
Synchronization
– Contention Access Period (CAP): via CSMA/CA, file xfer
– Channel Time Allocation Period (CTAP)

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Peer discovery and connectivity issue
• An 802.15.3 piconet supports ad hoc
communications between peer DEVs.
• Peer discovery is crucial to its operation.
• The DEVs shall be able to obtain information
about the services and capabilities of other
DEVs in the piconet at any time by
information discovery commands.
• Peer information is needed before a source
DEV can send any data to a destination DEV,
or generate channel time requests (CTRq) to
the PNC.

1
2

5

3

4

6

9

7

8

10

13

11

14

12

15

PNC

Src_DEV

Dest_DEV

PNC Info. Request command
SIFS
Imm-ACK

SIFS
PNC Information command
SIFS
Imm-ACK
SIFS

Probe Request Command
SIFS
Imm-ACK
SIFS
Probe Response Command
SIFS
Imm-ACK
RIFS

1. NOT receive the Imm-Ack
2. Cannot distinguish out-of-range
transmission and collision
3. Perform backoff retransmission
for collision repeatedly

DEV – 1

PNC

Dev 2 is outside the
range of Dev1 and
vise-versa

1. NOT receive Probe Request
command

DEV - 2

Existing Issues with IEEE 802.15.3











Peer discovery is crucial to piconet
operations.
Standard peer discovery is
unreliable and leads to substantial
delays for unreachable DEV pairs
Full piconet connectivity is not
guaranteed with only direct peerto-peer communications
The standard 802.15.3 MAC does
not take advantage of the unique
ranging capabilities enabled by
UWB
Connections are in peer-to-peer
manner without consider of
possible route optimizations
MAC modeling and performance
evaluation
Stream time scheduling methods
not defined in the standard





DEV_1 cannot communicate with
DEV_4 in peer-to-peer manner
For traffic between DEV_1 and
DEV_3, is it better to forward via
PNC than the direct connection?
What is the optimal path and data
rate between DEV_3 and DEV_5?

Using network layer routing
• Each hop request a
CTA slot seperately.
• PNC treat each hop as
independent traffic
stream

• Effect: Failure in an
intermediate hop
breaks the
connections, but PNC
assumes that an
independent stream is
terminated. Keeps
allocating CTAs for
other hops untill it is
eventually notified by
all participating DEV

Using MAC layer forwarding
• With explicit MAC
layer forwarding,
PNC knows that
these hops belongs
to one connection.
• Better adjusting
downstream and
upstream CTAs.

• Effect: reroute the
traffic is the
intermediate node
fails, and releasing
all CTAs if source
of destination
terminates.

Some Observations
• Peer discover is essential
to piconet operations
and communication
between DEVs
• Full piconet connectivity
cannot be guaranteed
• Some DEV pairs may be
out of range of each
other
• Mac layer routing fails
but is better then IP
routing.

• Remember, 802.15.3 has
centralized topology. So
what ??
• Using PNC, any devices
is two-hop count away
only.
• Can use the central
management capability
to discover simpler and
less costly MAC route

Proposed peer discovery protocol
with forwarding route optimization
• The PNC can always act as a first hop to
connect non-intersecting range DEVs
• However, a betterment can be done in the
frame forwarding by choosing another
DEV closer in distance to the source and
destination to forward the frame.
• All routes are limited to two hops only.

Algorithm
• If the Desti_DEV is reachable, sending PNC
Information Request and Response exchange is
redundant.
• So, Src_DEV send Probe Request command to the
Dest_DEV.
• If Dest_DEV receives the command, it returns an
Imm-ACK after a SIFS and then the Probe Response
command as in standard protocol operations.
• At the same time, the third party, i.e., the PNC, shall
actively monitor the frame exchange.
• Upon receiving a Probe Request, the PNC checks the
destination ID (Dest_ID) field in the MAC header.

Algorithm (2)
• If the Dest_ID is not associated in the piconet, the PNC
send an Imm-ACK to the Src_DEV after SIFS, followed
by a PNC Information command with an empty
Information Element (IE) to notify the source that
destination does not exist.
• Otherwise, instead of ignoring the Probe Request frame,
the PNC waits for the Imm-ACK from the destination
DEV.
• If no Imm-ACK arrives after a backoff inter-frame space
(BIFS), which is the sum of a SIFS and a clear channel
assessment detect time (CCADetectTime), the PNC
realizes that the destination DEV cannot hear the source.
• The PNC then immediately send an Imm-ACK to the
source, followed by a PNC Information command with
the route information. (an optimized route information in
sent)

SRC_DEV send Probe
Request command to
DEST_DEV & PNC listens

SIFS
Imm-ACK

Probe Response command

SIFS (Imm-ACK)

PNC also listen

DEST_DEV
hears?

YES

DEST_DEV
responds

No
No

DEST_DEV
ID
Present?

Yes, Timeout (BIFS)

Send Imm-ACK & route
information to source

Yes and
DEST_DEV sent Imm-ACK

Do Nothing, monitor if
DEST_DEV crash.

Forward the data to
the router node

Algorithm (3)
[Route calculation]
• Most wireless networks today employ a multirate PHY (e.g., UWB in 802.15.3a) that
supports a set of data rate dependent
modulation/coding parameters.
• Due to the extremely low power consumption
requirement of WPAN devices, the achievable
data rate drops dramatically when the
distance increases.
• The data rate can be modeled as a discrete
function of transmission distance d between
two DEVs:

Algorithm (3)
Rate ( d )  S i ;
R i  1  d  R i ;1  i  m
where, R m

1

 0 , R i is the transmiss

and S 1 and S m are the minimum

ion range of rate S i ;

and maximum

data

rates, respective ly. If d is greater th an R 1, then Rate(d)
and the DEVs have no connectivi

ty

0

Algorithm (4)
• Since the PNC can monitor all commands exchanged
during the CAP, it can learn the data rates between
reachable DEV pairs and store them in an n x n rate
matrix (RM), where
• n is the total number of DEVs within the piconet. DEV
is assigned a unique DEV_ID in the piconet
RM ij is the link rate based on the current informatio
obtained

from the commands

DEV i and DEV j . RM

ij

exchanged

 0 if DEV i and DEV

are out of range or the rate informatio
not available

between

yet, and RM

ij

n is

  if i  j .

j

n

Algorithm (5)
• All DEVs transmit with the maximum
allowable power when sending data. Since the
wireless links are symmetric in nature, clearly
RMij = RMji.
• Based on the current rate information stored
in RM, for an unreachable pair DEVi and
DEVj, the PNC can determine the optimal
(two-hop) route that has the minimum
transmission time, i.e., the best route employs
DEVk for MAC layer forwarding, where k
minimizes:

Algorithm (6)
min(

1
RM



ik
k [ 0 , n  1 ]

1
RM

)
kj

• Alleviates the traffic load on the PNC
• Discovers a current optimal two-hop MAC layer
forwarding path given by existing rate information
without introducing any extra overhead
• If the connection is broken, the PNC can
immediately reroute the traffic to a current
optimal path, or terminate the connection by deallocating all corresponding CTAs.

Discussion
• Original case:
Causes
retransmission

• 3PHP: data sent via
2-hop route if
PNC_ID exists

Dest_ID

Dest_ID

• Normal Transmission (Imm_Ack)

• Normal Transmission (Imm_Ack)

XXX FRAME LOST XXXX

PNC_ID

• Causes retransmission

• Sent Via 2–hop route (Imm_Ack)

PNC

Src_DEV
PNC Info. Request command

Probe Request Command

BIFS
Imm-ACK
SIFS

PNC Information command with Route Info.

Imm-ACK

RIFS

Dest_DEV

SIFS

3PHP-Node

DEV – 1

DEV - 2

PNC

Observations
• With 3PHP, peer discovery requires only one
round of frame exchange.
• Fully utilized the broadcast nature,
centralized control, ad-hoc communication,
and efficient peer discovery.
• Save the futile back-off retransmission for
unreachable destination.
• Guaranteed full piconet connectivity. (no
network layer routing required)
• On demand routing
• More then BIFS waiting. (include RIFS) Conclusion

Performance Evaluations
[Intra-piconet no connection probability]
• Intra-piconet no
connection
probability

• Common Overlap
Area function
COLA(R, r, x):
Represent the
intersection of two
circles with radii R
and r (r e R),
respectively, which
centers are
separated by
distance x

Performance Evaluations (2)
[Intra-piconet no connection probability]

Performance Evaluations (3)
[Intra-piconet no connection probability]
• The probability of no direct connection
between two DEVs in a piconet is

Performance Evaluations (4)
[Peer Discovery delay analysis]


# of Frame Transmission




Expected
Contention Time



Expected Packet
Delay

Performance Evaluations (5)
[Peer Discovery delay analysis]


Expected routing
failure probability

• Expected successful peer discovery
delays are given by

Simulation and Numerical Results
• No connection probability as a function of
coverage range ratio

Simulation and Numerical Results (2)
• Peer discovery delay vs. conditional
collision probability

Simulation and Numerical Results (3)
• Piconet peer discovery time vs. coverage
range ratio

Simulation and Numerical Results (4)
• Piconet peer discovery failure probability
with standard method

Simulation and Numerical Results (5)
• Two-hop forwarding route optimization
ratio vs. piconet radius

Simulation and Numerical Results (6)
• Expected data between directly unreachable
pairs in piconets with 20 DEVs

Conclusion
• Underlying fact: peer-to-peer data delivery in
802.15.3 WPANs
• Existing MAC layer peer discovery methods
cannot guarantee full connectivity between
DEVs within a piconet through direct peerto-peer connections if the piconet operates
with a radius larger than half of the
maximum transmission distance. (~ 41.3%)
• If Mac fails, use the expensive network layer
routing.

Conclusion (2)
• Used the central control topology
• Routing in 2-hop with single round of
control frame exchange
• 3PHP achieves 25– 37% faster peer
discovery time over the standard MAC
• Route optimization algorithm in the PNC
to provide the best MAC layer forwarding
routes by self-learning the available rate
information between DEVs.

References


IEEE Standard 802.15.3, “Wireless medium access control (MAC) and physical
layer (PHY) specifications for high rate wireless personal area networks
(WPANs),”Sept. 2003.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery in IEEE 802.15.3 WPANs,”in Proc. IEEE BroadNets2005, Boston, MA,
Oct. 2005.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery and Route Optimization in IEEE 802.15.3WPANs,”accepted for
publication in ACM/KluwerJ. Mobile Networks and Applications, Nov. 2005.



Z. Yin and V.C.M. Leung, “Connection Data Rate Optimization of IEEE 802.15.3
Scatternetswith Multi-rate Carriers,”IEEE ICC’06, Istanbul, Turkey, June 2006.



Zhanping Yin and Victor C.M. Leung, “Introduction to IEEE 802.15.3 High Rate
Wireless Personal Area Network (WPAN)”, Electrical and Computer Engineering
University of British Columbia

Thank You



Slide 5

Third-Party Handshake Protocol for
Efficient Peer Discovery
and Route Optimization in
IEEE 802.15.3 WPANs
Authors:
Zhanping Yin * Victor C. M. Leung
Published:
ACM/ MONET 2006
Presented by:
Gautam S. Thakur

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

WPAN
• A WPAN (wireless personal area network) is a
personal area network - a network for
interconnecting devices centered around an
individual person's workspace
• A very short range ~10 mtrs. E.g. Bluetooth
• Proposed operating frequencies are around
2.4 GHz in digital modes.
• The objective is to facilitate seamless

operation among home or business devices
and systems.

Ultra-Wideband
• A physical layer technology
• For, short distance communication with high
data rate and short transmission range.
• Lower power requirement and pulsed data
• UWB transmission over extremely wide
unlicensed radio spectrum  3.1 – 10.6 GHz.
• Over results in
– Less interference
– Wire-like performance for indoor wireless
environment.

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Overview of 802.15.3
• Why 802.15.3 ?
• The 802.15.3 Wireless Space
• 802.15.3 Overview and Components

Overview of 802.15.3
[Why 802.15.3 ?]
• Motivated by the increasing demand of wireless
communications with






Ubiquitous network connectivity
Low cost and low power consumption -> WPAN
High data rate(HDR)
Quality of Service(QoS) support
Comparison with other short to medium range wireless
technologies
• Wireless LAN (WLAN)
– High cost and power consumption, no hard QoS guarantee

• WPANs-Bluetooth (802.15.1) and ZigBee(802.15.4)
– Data rate too low

• Applications of 802.15.3
– Virtual wireless multimedia connectivity
• Video/audio distribution

– High speed data transfer

Overview of 802.15.3
[ 802.15.3 = Wireless Multimedia ]

Overview of 802.15.3
[ The 802 Wireless Space ]

IEEE 802.15.3 Overview
• High date rate and low
power
• Mainly works within a
piconet with dynamic
DEV membership
• Ad hoc topology with
centralized control by
the PNC
• Connection oriented
peer-to-peer
communications
• Support for multimedia
quality of service(QoS)
• Multiple power
management modes
• Security

Formation of an 802.15.3 piconet
• The basic component
is the DEV
– One DEV is required to
assume the role of the
piconet coordinator
(PNC) of the piconet.
– The PNC provides the
basic timing sync for the
piconet with the beacon.
– Additionally, the PNC
manages the quality of
service (QoS)
requirements, power
save modes and access
control to the piconet.

Formation of an 802.15.3 piconet (2)
• PNC supports ad
hoc peer-to-peer
connections
• PNC provides
timing for
synchronization of
DEVs within the
piconet, performs
admission control,
allocates network
resources etc

Formation of a Piconet (3)
• All DEVs within radio coverage of the PNC
can then associate with it to form a piconet.
• Then starts the peer discovery.
• Some DEV pairs in the piconet may be out of

range of each other, and as a result, direct
peer-to-peer connection is unavailable
between them. This results in network layer
discovery methods

Superframe format
• Timing and data transmissions in the piconet
are based on the superframe
• The superframe has three parts
– Beacon: Control information, Allocates CTA,
Synchronization
– Contention Access Period (CAP): via CSMA/CA, file xfer
– Channel Time Allocation Period (CTAP)

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Peer discovery and connectivity issue
• An 802.15.3 piconet supports ad hoc
communications between peer DEVs.
• Peer discovery is crucial to its operation.
• The DEVs shall be able to obtain information
about the services and capabilities of other
DEVs in the piconet at any time by
information discovery commands.
• Peer information is needed before a source
DEV can send any data to a destination DEV,
or generate channel time requests (CTRq) to
the PNC.

1
2

5

3

4

6

9

7

8

10

13

11

14

12

15

PNC

Src_DEV

Dest_DEV

PNC Info. Request command
SIFS
Imm-ACK

SIFS
PNC Information command
SIFS
Imm-ACK
SIFS

Probe Request Command
SIFS
Imm-ACK
SIFS
Probe Response Command
SIFS
Imm-ACK
RIFS

1. NOT receive the Imm-Ack
2. Cannot distinguish out-of-range
transmission and collision
3. Perform backoff retransmission
for collision repeatedly

DEV – 1

PNC

Dev 2 is outside the
range of Dev1 and
vise-versa

1. NOT receive Probe Request
command

DEV - 2

Existing Issues with IEEE 802.15.3











Peer discovery is crucial to piconet
operations.
Standard peer discovery is
unreliable and leads to substantial
delays for unreachable DEV pairs
Full piconet connectivity is not
guaranteed with only direct peerto-peer communications
The standard 802.15.3 MAC does
not take advantage of the unique
ranging capabilities enabled by
UWB
Connections are in peer-to-peer
manner without consider of
possible route optimizations
MAC modeling and performance
evaluation
Stream time scheduling methods
not defined in the standard





DEV_1 cannot communicate with
DEV_4 in peer-to-peer manner
For traffic between DEV_1 and
DEV_3, is it better to forward via
PNC than the direct connection?
What is the optimal path and data
rate between DEV_3 and DEV_5?

Using network layer routing
• Each hop request a
CTA slot seperately.
• PNC treat each hop as
independent traffic
stream

• Effect: Failure in an
intermediate hop
breaks the
connections, but PNC
assumes that an
independent stream is
terminated. Keeps
allocating CTAs for
other hops untill it is
eventually notified by
all participating DEV

Using MAC layer forwarding
• With explicit MAC
layer forwarding,
PNC knows that
these hops belongs
to one connection.
• Better adjusting
downstream and
upstream CTAs.

• Effect: reroute the
traffic is the
intermediate node
fails, and releasing
all CTAs if source
of destination
terminates.

Some Observations
• Peer discover is essential
to piconet operations
and communication
between DEVs
• Full piconet connectivity
cannot be guaranteed
• Some DEV pairs may be
out of range of each
other
• Mac layer routing fails
but is better then IP
routing.

• Remember, 802.15.3 has
centralized topology. So
what ??
• Using PNC, any devices
is two-hop count away
only.
• Can use the central
management capability
to discover simpler and
less costly MAC route

Proposed peer discovery protocol
with forwarding route optimization
• The PNC can always act as a first hop to
connect non-intersecting range DEVs
• However, a betterment can be done in the
frame forwarding by choosing another
DEV closer in distance to the source and
destination to forward the frame.
• All routes are limited to two hops only.

Algorithm
• If the Desti_DEV is reachable, sending PNC
Information Request and Response exchange is
redundant.
• So, Src_DEV send Probe Request command to the
Dest_DEV.
• If Dest_DEV receives the command, it returns an
Imm-ACK after a SIFS and then the Probe Response
command as in standard protocol operations.
• At the same time, the third party, i.e., the PNC, shall
actively monitor the frame exchange.
• Upon receiving a Probe Request, the PNC checks the
destination ID (Dest_ID) field in the MAC header.

Algorithm (2)
• If the Dest_ID is not associated in the piconet, the PNC
send an Imm-ACK to the Src_DEV after SIFS, followed
by a PNC Information command with an empty
Information Element (IE) to notify the source that
destination does not exist.
• Otherwise, instead of ignoring the Probe Request frame,
the PNC waits for the Imm-ACK from the destination
DEV.
• If no Imm-ACK arrives after a backoff inter-frame space
(BIFS), which is the sum of a SIFS and a clear channel
assessment detect time (CCADetectTime), the PNC
realizes that the destination DEV cannot hear the source.
• The PNC then immediately send an Imm-ACK to the
source, followed by a PNC Information command with
the route information. (an optimized route information in
sent)

SRC_DEV send Probe
Request command to
DEST_DEV & PNC listens

SIFS
Imm-ACK

Probe Response command

SIFS (Imm-ACK)

PNC also listen

DEST_DEV
hears?

YES

DEST_DEV
responds

No
No

DEST_DEV
ID
Present?

Yes, Timeout (BIFS)

Send Imm-ACK & route
information to source

Yes and
DEST_DEV sent Imm-ACK

Do Nothing, monitor if
DEST_DEV crash.

Forward the data to
the router node

Algorithm (3)
[Route calculation]
• Most wireless networks today employ a multirate PHY (e.g., UWB in 802.15.3a) that
supports a set of data rate dependent
modulation/coding parameters.
• Due to the extremely low power consumption
requirement of WPAN devices, the achievable
data rate drops dramatically when the
distance increases.
• The data rate can be modeled as a discrete
function of transmission distance d between
two DEVs:

Algorithm (3)
Rate ( d )  S i ;
R i  1  d  R i ;1  i  m
where, R m

1

 0 , R i is the transmiss

and S 1 and S m are the minimum

ion range of rate S i ;

and maximum

data

rates, respective ly. If d is greater th an R 1, then Rate(d)
and the DEVs have no connectivi

ty

0

Algorithm (4)
• Since the PNC can monitor all commands exchanged
during the CAP, it can learn the data rates between
reachable DEV pairs and store them in an n x n rate
matrix (RM), where
• n is the total number of DEVs within the piconet. DEV
is assigned a unique DEV_ID in the piconet
RM ij is the link rate based on the current informatio
obtained

from the commands

DEV i and DEV j . RM

ij

exchanged

 0 if DEV i and DEV

are out of range or the rate informatio
not available

between

yet, and RM

ij

n is

  if i  j .

j

n

Algorithm (5)
• All DEVs transmit with the maximum
allowable power when sending data. Since the
wireless links are symmetric in nature, clearly
RMij = RMji.
• Based on the current rate information stored
in RM, for an unreachable pair DEVi and
DEVj, the PNC can determine the optimal
(two-hop) route that has the minimum
transmission time, i.e., the best route employs
DEVk for MAC layer forwarding, where k
minimizes:

Algorithm (6)
min(

1
RM



ik
k [ 0 , n  1 ]

1
RM

)
kj

• Alleviates the traffic load on the PNC
• Discovers a current optimal two-hop MAC layer
forwarding path given by existing rate information
without introducing any extra overhead
• If the connection is broken, the PNC can
immediately reroute the traffic to a current
optimal path, or terminate the connection by deallocating all corresponding CTAs.

Discussion
• Original case:
Causes
retransmission

• 3PHP: data sent via
2-hop route if
PNC_ID exists

Dest_ID

Dest_ID

• Normal Transmission (Imm_Ack)

• Normal Transmission (Imm_Ack)

XXX FRAME LOST XXXX

PNC_ID

• Causes retransmission

• Sent Via 2–hop route (Imm_Ack)

PNC

Src_DEV
PNC Info. Request command

Probe Request Command

BIFS
Imm-ACK
SIFS

PNC Information command with Route Info.

Imm-ACK

RIFS

Dest_DEV

SIFS

3PHP-Node

DEV – 1

DEV - 2

PNC

Observations
• With 3PHP, peer discovery requires only one
round of frame exchange.
• Fully utilized the broadcast nature,
centralized control, ad-hoc communication,
and efficient peer discovery.
• Save the futile back-off retransmission for
unreachable destination.
• Guaranteed full piconet connectivity. (no
network layer routing required)
• On demand routing
• More then BIFS waiting. (include RIFS) Conclusion

Performance Evaluations
[Intra-piconet no connection probability]
• Intra-piconet no
connection
probability

• Common Overlap
Area function
COLA(R, r, x):
Represent the
intersection of two
circles with radii R
and r (r e R),
respectively, which
centers are
separated by
distance x

Performance Evaluations (2)
[Intra-piconet no connection probability]

Performance Evaluations (3)
[Intra-piconet no connection probability]
• The probability of no direct connection
between two DEVs in a piconet is

Performance Evaluations (4)
[Peer Discovery delay analysis]


# of Frame Transmission




Expected
Contention Time



Expected Packet
Delay

Performance Evaluations (5)
[Peer Discovery delay analysis]


Expected routing
failure probability

• Expected successful peer discovery
delays are given by

Simulation and Numerical Results
• No connection probability as a function of
coverage range ratio

Simulation and Numerical Results (2)
• Peer discovery delay vs. conditional
collision probability

Simulation and Numerical Results (3)
• Piconet peer discovery time vs. coverage
range ratio

Simulation and Numerical Results (4)
• Piconet peer discovery failure probability
with standard method

Simulation and Numerical Results (5)
• Two-hop forwarding route optimization
ratio vs. piconet radius

Simulation and Numerical Results (6)
• Expected data between directly unreachable
pairs in piconets with 20 DEVs

Conclusion
• Underlying fact: peer-to-peer data delivery in
802.15.3 WPANs
• Existing MAC layer peer discovery methods
cannot guarantee full connectivity between
DEVs within a piconet through direct peerto-peer connections if the piconet operates
with a radius larger than half of the
maximum transmission distance. (~ 41.3%)
• If Mac fails, use the expensive network layer
routing.

Conclusion (2)
• Used the central control topology
• Routing in 2-hop with single round of
control frame exchange
• 3PHP achieves 25– 37% faster peer
discovery time over the standard MAC
• Route optimization algorithm in the PNC
to provide the best MAC layer forwarding
routes by self-learning the available rate
information between DEVs.

References


IEEE Standard 802.15.3, “Wireless medium access control (MAC) and physical
layer (PHY) specifications for high rate wireless personal area networks
(WPANs),”Sept. 2003.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery in IEEE 802.15.3 WPANs,”in Proc. IEEE BroadNets2005, Boston, MA,
Oct. 2005.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery and Route Optimization in IEEE 802.15.3WPANs,”accepted for
publication in ACM/KluwerJ. Mobile Networks and Applications, Nov. 2005.



Z. Yin and V.C.M. Leung, “Connection Data Rate Optimization of IEEE 802.15.3
Scatternetswith Multi-rate Carriers,”IEEE ICC’06, Istanbul, Turkey, June 2006.



Zhanping Yin and Victor C.M. Leung, “Introduction to IEEE 802.15.3 High Rate
Wireless Personal Area Network (WPAN)”, Electrical and Computer Engineering
University of British Columbia

Thank You



Slide 6

Third-Party Handshake Protocol for
Efficient Peer Discovery
and Route Optimization in
IEEE 802.15.3 WPANs
Authors:
Zhanping Yin * Victor C. M. Leung
Published:
ACM/ MONET 2006
Presented by:
Gautam S. Thakur

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

WPAN
• A WPAN (wireless personal area network) is a
personal area network - a network for
interconnecting devices centered around an
individual person's workspace
• A very short range ~10 mtrs. E.g. Bluetooth
• Proposed operating frequencies are around
2.4 GHz in digital modes.
• The objective is to facilitate seamless

operation among home or business devices
and systems.

Ultra-Wideband
• A physical layer technology
• For, short distance communication with high
data rate and short transmission range.
• Lower power requirement and pulsed data
• UWB transmission over extremely wide
unlicensed radio spectrum  3.1 – 10.6 GHz.
• Over results in
– Less interference
– Wire-like performance for indoor wireless
environment.

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Overview of 802.15.3
• Why 802.15.3 ?
• The 802.15.3 Wireless Space
• 802.15.3 Overview and Components

Overview of 802.15.3
[Why 802.15.3 ?]
• Motivated by the increasing demand of wireless
communications with






Ubiquitous network connectivity
Low cost and low power consumption -> WPAN
High data rate(HDR)
Quality of Service(QoS) support
Comparison with other short to medium range wireless
technologies
• Wireless LAN (WLAN)
– High cost and power consumption, no hard QoS guarantee

• WPANs-Bluetooth (802.15.1) and ZigBee(802.15.4)
– Data rate too low

• Applications of 802.15.3
– Virtual wireless multimedia connectivity
• Video/audio distribution

– High speed data transfer

Overview of 802.15.3
[ 802.15.3 = Wireless Multimedia ]

Overview of 802.15.3
[ The 802 Wireless Space ]

IEEE 802.15.3 Overview
• High date rate and low
power
• Mainly works within a
piconet with dynamic
DEV membership
• Ad hoc topology with
centralized control by
the PNC
• Connection oriented
peer-to-peer
communications
• Support for multimedia
quality of service(QoS)
• Multiple power
management modes
• Security

Formation of an 802.15.3 piconet
• The basic component
is the DEV
– One DEV is required to
assume the role of the
piconet coordinator
(PNC) of the piconet.
– The PNC provides the
basic timing sync for the
piconet with the beacon.
– Additionally, the PNC
manages the quality of
service (QoS)
requirements, power
save modes and access
control to the piconet.

Formation of an 802.15.3 piconet (2)
• PNC supports ad
hoc peer-to-peer
connections
• PNC provides
timing for
synchronization of
DEVs within the
piconet, performs
admission control,
allocates network
resources etc

Formation of a Piconet (3)
• All DEVs within radio coverage of the PNC
can then associate with it to form a piconet.
• Then starts the peer discovery.
• Some DEV pairs in the piconet may be out of

range of each other, and as a result, direct
peer-to-peer connection is unavailable
between them. This results in network layer
discovery methods

Superframe format
• Timing and data transmissions in the piconet
are based on the superframe
• The superframe has three parts
– Beacon: Control information, Allocates CTA,
Synchronization
– Contention Access Period (CAP): via CSMA/CA, file xfer
– Channel Time Allocation Period (CTAP)

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Peer discovery and connectivity issue
• An 802.15.3 piconet supports ad hoc
communications between peer DEVs.
• Peer discovery is crucial to its operation.
• The DEVs shall be able to obtain information
about the services and capabilities of other
DEVs in the piconet at any time by
information discovery commands.
• Peer information is needed before a source
DEV can send any data to a destination DEV,
or generate channel time requests (CTRq) to
the PNC.

1
2

5

3

4

6

9

7

8

10

13

11

14

12

15

PNC

Src_DEV

Dest_DEV

PNC Info. Request command
SIFS
Imm-ACK

SIFS
PNC Information command
SIFS
Imm-ACK
SIFS

Probe Request Command
SIFS
Imm-ACK
SIFS
Probe Response Command
SIFS
Imm-ACK
RIFS

1. NOT receive the Imm-Ack
2. Cannot distinguish out-of-range
transmission and collision
3. Perform backoff retransmission
for collision repeatedly

DEV – 1

PNC

Dev 2 is outside the
range of Dev1 and
vise-versa

1. NOT receive Probe Request
command

DEV - 2

Existing Issues with IEEE 802.15.3











Peer discovery is crucial to piconet
operations.
Standard peer discovery is
unreliable and leads to substantial
delays for unreachable DEV pairs
Full piconet connectivity is not
guaranteed with only direct peerto-peer communications
The standard 802.15.3 MAC does
not take advantage of the unique
ranging capabilities enabled by
UWB
Connections are in peer-to-peer
manner without consider of
possible route optimizations
MAC modeling and performance
evaluation
Stream time scheduling methods
not defined in the standard





DEV_1 cannot communicate with
DEV_4 in peer-to-peer manner
For traffic between DEV_1 and
DEV_3, is it better to forward via
PNC than the direct connection?
What is the optimal path and data
rate between DEV_3 and DEV_5?

Using network layer routing
• Each hop request a
CTA slot seperately.
• PNC treat each hop as
independent traffic
stream

• Effect: Failure in an
intermediate hop
breaks the
connections, but PNC
assumes that an
independent stream is
terminated. Keeps
allocating CTAs for
other hops untill it is
eventually notified by
all participating DEV

Using MAC layer forwarding
• With explicit MAC
layer forwarding,
PNC knows that
these hops belongs
to one connection.
• Better adjusting
downstream and
upstream CTAs.

• Effect: reroute the
traffic is the
intermediate node
fails, and releasing
all CTAs if source
of destination
terminates.

Some Observations
• Peer discover is essential
to piconet operations
and communication
between DEVs
• Full piconet connectivity
cannot be guaranteed
• Some DEV pairs may be
out of range of each
other
• Mac layer routing fails
but is better then IP
routing.

• Remember, 802.15.3 has
centralized topology. So
what ??
• Using PNC, any devices
is two-hop count away
only.
• Can use the central
management capability
to discover simpler and
less costly MAC route

Proposed peer discovery protocol
with forwarding route optimization
• The PNC can always act as a first hop to
connect non-intersecting range DEVs
• However, a betterment can be done in the
frame forwarding by choosing another
DEV closer in distance to the source and
destination to forward the frame.
• All routes are limited to two hops only.

Algorithm
• If the Desti_DEV is reachable, sending PNC
Information Request and Response exchange is
redundant.
• So, Src_DEV send Probe Request command to the
Dest_DEV.
• If Dest_DEV receives the command, it returns an
Imm-ACK after a SIFS and then the Probe Response
command as in standard protocol operations.
• At the same time, the third party, i.e., the PNC, shall
actively monitor the frame exchange.
• Upon receiving a Probe Request, the PNC checks the
destination ID (Dest_ID) field in the MAC header.

Algorithm (2)
• If the Dest_ID is not associated in the piconet, the PNC
send an Imm-ACK to the Src_DEV after SIFS, followed
by a PNC Information command with an empty
Information Element (IE) to notify the source that
destination does not exist.
• Otherwise, instead of ignoring the Probe Request frame,
the PNC waits for the Imm-ACK from the destination
DEV.
• If no Imm-ACK arrives after a backoff inter-frame space
(BIFS), which is the sum of a SIFS and a clear channel
assessment detect time (CCADetectTime), the PNC
realizes that the destination DEV cannot hear the source.
• The PNC then immediately send an Imm-ACK to the
source, followed by a PNC Information command with
the route information. (an optimized route information in
sent)

SRC_DEV send Probe
Request command to
DEST_DEV & PNC listens

SIFS
Imm-ACK

Probe Response command

SIFS (Imm-ACK)

PNC also listen

DEST_DEV
hears?

YES

DEST_DEV
responds

No
No

DEST_DEV
ID
Present?

Yes, Timeout (BIFS)

Send Imm-ACK & route
information to source

Yes and
DEST_DEV sent Imm-ACK

Do Nothing, monitor if
DEST_DEV crash.

Forward the data to
the router node

Algorithm (3)
[Route calculation]
• Most wireless networks today employ a multirate PHY (e.g., UWB in 802.15.3a) that
supports a set of data rate dependent
modulation/coding parameters.
• Due to the extremely low power consumption
requirement of WPAN devices, the achievable
data rate drops dramatically when the
distance increases.
• The data rate can be modeled as a discrete
function of transmission distance d between
two DEVs:

Algorithm (3)
Rate ( d )  S i ;
R i  1  d  R i ;1  i  m
where, R m

1

 0 , R i is the transmiss

and S 1 and S m are the minimum

ion range of rate S i ;

and maximum

data

rates, respective ly. If d is greater th an R 1, then Rate(d)
and the DEVs have no connectivi

ty

0

Algorithm (4)
• Since the PNC can monitor all commands exchanged
during the CAP, it can learn the data rates between
reachable DEV pairs and store them in an n x n rate
matrix (RM), where
• n is the total number of DEVs within the piconet. DEV
is assigned a unique DEV_ID in the piconet
RM ij is the link rate based on the current informatio
obtained

from the commands

DEV i and DEV j . RM

ij

exchanged

 0 if DEV i and DEV

are out of range or the rate informatio
not available

between

yet, and RM

ij

n is

  if i  j .

j

n

Algorithm (5)
• All DEVs transmit with the maximum
allowable power when sending data. Since the
wireless links are symmetric in nature, clearly
RMij = RMji.
• Based on the current rate information stored
in RM, for an unreachable pair DEVi and
DEVj, the PNC can determine the optimal
(two-hop) route that has the minimum
transmission time, i.e., the best route employs
DEVk for MAC layer forwarding, where k
minimizes:

Algorithm (6)
min(

1
RM



ik
k [ 0 , n  1 ]

1
RM

)
kj

• Alleviates the traffic load on the PNC
• Discovers a current optimal two-hop MAC layer
forwarding path given by existing rate information
without introducing any extra overhead
• If the connection is broken, the PNC can
immediately reroute the traffic to a current
optimal path, or terminate the connection by deallocating all corresponding CTAs.

Discussion
• Original case:
Causes
retransmission

• 3PHP: data sent via
2-hop route if
PNC_ID exists

Dest_ID

Dest_ID

• Normal Transmission (Imm_Ack)

• Normal Transmission (Imm_Ack)

XXX FRAME LOST XXXX

PNC_ID

• Causes retransmission

• Sent Via 2–hop route (Imm_Ack)

PNC

Src_DEV
PNC Info. Request command

Probe Request Command

BIFS
Imm-ACK
SIFS

PNC Information command with Route Info.

Imm-ACK

RIFS

Dest_DEV

SIFS

3PHP-Node

DEV – 1

DEV - 2

PNC

Observations
• With 3PHP, peer discovery requires only one
round of frame exchange.
• Fully utilized the broadcast nature,
centralized control, ad-hoc communication,
and efficient peer discovery.
• Save the futile back-off retransmission for
unreachable destination.
• Guaranteed full piconet connectivity. (no
network layer routing required)
• On demand routing
• More then BIFS waiting. (include RIFS) Conclusion

Performance Evaluations
[Intra-piconet no connection probability]
• Intra-piconet no
connection
probability

• Common Overlap
Area function
COLA(R, r, x):
Represent the
intersection of two
circles with radii R
and r (r e R),
respectively, which
centers are
separated by
distance x

Performance Evaluations (2)
[Intra-piconet no connection probability]

Performance Evaluations (3)
[Intra-piconet no connection probability]
• The probability of no direct connection
between two DEVs in a piconet is

Performance Evaluations (4)
[Peer Discovery delay analysis]


# of Frame Transmission




Expected
Contention Time



Expected Packet
Delay

Performance Evaluations (5)
[Peer Discovery delay analysis]


Expected routing
failure probability

• Expected successful peer discovery
delays are given by

Simulation and Numerical Results
• No connection probability as a function of
coverage range ratio

Simulation and Numerical Results (2)
• Peer discovery delay vs. conditional
collision probability

Simulation and Numerical Results (3)
• Piconet peer discovery time vs. coverage
range ratio

Simulation and Numerical Results (4)
• Piconet peer discovery failure probability
with standard method

Simulation and Numerical Results (5)
• Two-hop forwarding route optimization
ratio vs. piconet radius

Simulation and Numerical Results (6)
• Expected data between directly unreachable
pairs in piconets with 20 DEVs

Conclusion
• Underlying fact: peer-to-peer data delivery in
802.15.3 WPANs
• Existing MAC layer peer discovery methods
cannot guarantee full connectivity between
DEVs within a piconet through direct peerto-peer connections if the piconet operates
with a radius larger than half of the
maximum transmission distance. (~ 41.3%)
• If Mac fails, use the expensive network layer
routing.

Conclusion (2)
• Used the central control topology
• Routing in 2-hop with single round of
control frame exchange
• 3PHP achieves 25– 37% faster peer
discovery time over the standard MAC
• Route optimization algorithm in the PNC
to provide the best MAC layer forwarding
routes by self-learning the available rate
information between DEVs.

References


IEEE Standard 802.15.3, “Wireless medium access control (MAC) and physical
layer (PHY) specifications for high rate wireless personal area networks
(WPANs),”Sept. 2003.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery in IEEE 802.15.3 WPANs,”in Proc. IEEE BroadNets2005, Boston, MA,
Oct. 2005.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery and Route Optimization in IEEE 802.15.3WPANs,”accepted for
publication in ACM/KluwerJ. Mobile Networks and Applications, Nov. 2005.



Z. Yin and V.C.M. Leung, “Connection Data Rate Optimization of IEEE 802.15.3
Scatternetswith Multi-rate Carriers,”IEEE ICC’06, Istanbul, Turkey, June 2006.



Zhanping Yin and Victor C.M. Leung, “Introduction to IEEE 802.15.3 High Rate
Wireless Personal Area Network (WPAN)”, Electrical and Computer Engineering
University of British Columbia

Thank You



Slide 7

Third-Party Handshake Protocol for
Efficient Peer Discovery
and Route Optimization in
IEEE 802.15.3 WPANs
Authors:
Zhanping Yin * Victor C. M. Leung
Published:
ACM/ MONET 2006
Presented by:
Gautam S. Thakur

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

WPAN
• A WPAN (wireless personal area network) is a
personal area network - a network for
interconnecting devices centered around an
individual person's workspace
• A very short range ~10 mtrs. E.g. Bluetooth
• Proposed operating frequencies are around
2.4 GHz in digital modes.
• The objective is to facilitate seamless

operation among home or business devices
and systems.

Ultra-Wideband
• A physical layer technology
• For, short distance communication with high
data rate and short transmission range.
• Lower power requirement and pulsed data
• UWB transmission over extremely wide
unlicensed radio spectrum  3.1 – 10.6 GHz.
• Over results in
– Less interference
– Wire-like performance for indoor wireless
environment.

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Overview of 802.15.3
• Why 802.15.3 ?
• The 802.15.3 Wireless Space
• 802.15.3 Overview and Components

Overview of 802.15.3
[Why 802.15.3 ?]
• Motivated by the increasing demand of wireless
communications with






Ubiquitous network connectivity
Low cost and low power consumption -> WPAN
High data rate(HDR)
Quality of Service(QoS) support
Comparison with other short to medium range wireless
technologies
• Wireless LAN (WLAN)
– High cost and power consumption, no hard QoS guarantee

• WPANs-Bluetooth (802.15.1) and ZigBee(802.15.4)
– Data rate too low

• Applications of 802.15.3
– Virtual wireless multimedia connectivity
• Video/audio distribution

– High speed data transfer

Overview of 802.15.3
[ 802.15.3 = Wireless Multimedia ]

Overview of 802.15.3
[ The 802 Wireless Space ]

IEEE 802.15.3 Overview
• High date rate and low
power
• Mainly works within a
piconet with dynamic
DEV membership
• Ad hoc topology with
centralized control by
the PNC
• Connection oriented
peer-to-peer
communications
• Support for multimedia
quality of service(QoS)
• Multiple power
management modes
• Security

Formation of an 802.15.3 piconet
• The basic component
is the DEV
– One DEV is required to
assume the role of the
piconet coordinator
(PNC) of the piconet.
– The PNC provides the
basic timing sync for the
piconet with the beacon.
– Additionally, the PNC
manages the quality of
service (QoS)
requirements, power
save modes and access
control to the piconet.

Formation of an 802.15.3 piconet (2)
• PNC supports ad
hoc peer-to-peer
connections
• PNC provides
timing for
synchronization of
DEVs within the
piconet, performs
admission control,
allocates network
resources etc

Formation of a Piconet (3)
• All DEVs within radio coverage of the PNC
can then associate with it to form a piconet.
• Then starts the peer discovery.
• Some DEV pairs in the piconet may be out of

range of each other, and as a result, direct
peer-to-peer connection is unavailable
between them. This results in network layer
discovery methods

Superframe format
• Timing and data transmissions in the piconet
are based on the superframe
• The superframe has three parts
– Beacon: Control information, Allocates CTA,
Synchronization
– Contention Access Period (CAP): via CSMA/CA, file xfer
– Channel Time Allocation Period (CTAP)

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Peer discovery and connectivity issue
• An 802.15.3 piconet supports ad hoc
communications between peer DEVs.
• Peer discovery is crucial to its operation.
• The DEVs shall be able to obtain information
about the services and capabilities of other
DEVs in the piconet at any time by
information discovery commands.
• Peer information is needed before a source
DEV can send any data to a destination DEV,
or generate channel time requests (CTRq) to
the PNC.

1
2

5

3

4

6

9

7

8

10

13

11

14

12

15

PNC

Src_DEV

Dest_DEV

PNC Info. Request command
SIFS
Imm-ACK

SIFS
PNC Information command
SIFS
Imm-ACK
SIFS

Probe Request Command
SIFS
Imm-ACK
SIFS
Probe Response Command
SIFS
Imm-ACK
RIFS

1. NOT receive the Imm-Ack
2. Cannot distinguish out-of-range
transmission and collision
3. Perform backoff retransmission
for collision repeatedly

DEV – 1

PNC

Dev 2 is outside the
range of Dev1 and
vise-versa

1. NOT receive Probe Request
command

DEV - 2

Existing Issues with IEEE 802.15.3











Peer discovery is crucial to piconet
operations.
Standard peer discovery is
unreliable and leads to substantial
delays for unreachable DEV pairs
Full piconet connectivity is not
guaranteed with only direct peerto-peer communications
The standard 802.15.3 MAC does
not take advantage of the unique
ranging capabilities enabled by
UWB
Connections are in peer-to-peer
manner without consider of
possible route optimizations
MAC modeling and performance
evaluation
Stream time scheduling methods
not defined in the standard





DEV_1 cannot communicate with
DEV_4 in peer-to-peer manner
For traffic between DEV_1 and
DEV_3, is it better to forward via
PNC than the direct connection?
What is the optimal path and data
rate between DEV_3 and DEV_5?

Using network layer routing
• Each hop request a
CTA slot seperately.
• PNC treat each hop as
independent traffic
stream

• Effect: Failure in an
intermediate hop
breaks the
connections, but PNC
assumes that an
independent stream is
terminated. Keeps
allocating CTAs for
other hops untill it is
eventually notified by
all participating DEV

Using MAC layer forwarding
• With explicit MAC
layer forwarding,
PNC knows that
these hops belongs
to one connection.
• Better adjusting
downstream and
upstream CTAs.

• Effect: reroute the
traffic is the
intermediate node
fails, and releasing
all CTAs if source
of destination
terminates.

Some Observations
• Peer discover is essential
to piconet operations
and communication
between DEVs
• Full piconet connectivity
cannot be guaranteed
• Some DEV pairs may be
out of range of each
other
• Mac layer routing fails
but is better then IP
routing.

• Remember, 802.15.3 has
centralized topology. So
what ??
• Using PNC, any devices
is two-hop count away
only.
• Can use the central
management capability
to discover simpler and
less costly MAC route

Proposed peer discovery protocol
with forwarding route optimization
• The PNC can always act as a first hop to
connect non-intersecting range DEVs
• However, a betterment can be done in the
frame forwarding by choosing another
DEV closer in distance to the source and
destination to forward the frame.
• All routes are limited to two hops only.

Algorithm
• If the Desti_DEV is reachable, sending PNC
Information Request and Response exchange is
redundant.
• So, Src_DEV send Probe Request command to the
Dest_DEV.
• If Dest_DEV receives the command, it returns an
Imm-ACK after a SIFS and then the Probe Response
command as in standard protocol operations.
• At the same time, the third party, i.e., the PNC, shall
actively monitor the frame exchange.
• Upon receiving a Probe Request, the PNC checks the
destination ID (Dest_ID) field in the MAC header.

Algorithm (2)
• If the Dest_ID is not associated in the piconet, the PNC
send an Imm-ACK to the Src_DEV after SIFS, followed
by a PNC Information command with an empty
Information Element (IE) to notify the source that
destination does not exist.
• Otherwise, instead of ignoring the Probe Request frame,
the PNC waits for the Imm-ACK from the destination
DEV.
• If no Imm-ACK arrives after a backoff inter-frame space
(BIFS), which is the sum of a SIFS and a clear channel
assessment detect time (CCADetectTime), the PNC
realizes that the destination DEV cannot hear the source.
• The PNC then immediately send an Imm-ACK to the
source, followed by a PNC Information command with
the route information. (an optimized route information in
sent)

SRC_DEV send Probe
Request command to
DEST_DEV & PNC listens

SIFS
Imm-ACK

Probe Response command

SIFS (Imm-ACK)

PNC also listen

DEST_DEV
hears?

YES

DEST_DEV
responds

No
No

DEST_DEV
ID
Present?

Yes, Timeout (BIFS)

Send Imm-ACK & route
information to source

Yes and
DEST_DEV sent Imm-ACK

Do Nothing, monitor if
DEST_DEV crash.

Forward the data to
the router node

Algorithm (3)
[Route calculation]
• Most wireless networks today employ a multirate PHY (e.g., UWB in 802.15.3a) that
supports a set of data rate dependent
modulation/coding parameters.
• Due to the extremely low power consumption
requirement of WPAN devices, the achievable
data rate drops dramatically when the
distance increases.
• The data rate can be modeled as a discrete
function of transmission distance d between
two DEVs:

Algorithm (3)
Rate ( d )  S i ;
R i  1  d  R i ;1  i  m
where, R m

1

 0 , R i is the transmiss

and S 1 and S m are the minimum

ion range of rate S i ;

and maximum

data

rates, respective ly. If d is greater th an R 1, then Rate(d)
and the DEVs have no connectivi

ty

0

Algorithm (4)
• Since the PNC can monitor all commands exchanged
during the CAP, it can learn the data rates between
reachable DEV pairs and store them in an n x n rate
matrix (RM), where
• n is the total number of DEVs within the piconet. DEV
is assigned a unique DEV_ID in the piconet
RM ij is the link rate based on the current informatio
obtained

from the commands

DEV i and DEV j . RM

ij

exchanged

 0 if DEV i and DEV

are out of range or the rate informatio
not available

between

yet, and RM

ij

n is

  if i  j .

j

n

Algorithm (5)
• All DEVs transmit with the maximum
allowable power when sending data. Since the
wireless links are symmetric in nature, clearly
RMij = RMji.
• Based on the current rate information stored
in RM, for an unreachable pair DEVi and
DEVj, the PNC can determine the optimal
(two-hop) route that has the minimum
transmission time, i.e., the best route employs
DEVk for MAC layer forwarding, where k
minimizes:

Algorithm (6)
min(

1
RM



ik
k [ 0 , n  1 ]

1
RM

)
kj

• Alleviates the traffic load on the PNC
• Discovers a current optimal two-hop MAC layer
forwarding path given by existing rate information
without introducing any extra overhead
• If the connection is broken, the PNC can
immediately reroute the traffic to a current
optimal path, or terminate the connection by deallocating all corresponding CTAs.

Discussion
• Original case:
Causes
retransmission

• 3PHP: data sent via
2-hop route if
PNC_ID exists

Dest_ID

Dest_ID

• Normal Transmission (Imm_Ack)

• Normal Transmission (Imm_Ack)

XXX FRAME LOST XXXX

PNC_ID

• Causes retransmission

• Sent Via 2–hop route (Imm_Ack)

PNC

Src_DEV
PNC Info. Request command

Probe Request Command

BIFS
Imm-ACK
SIFS

PNC Information command with Route Info.

Imm-ACK

RIFS

Dest_DEV

SIFS

3PHP-Node

DEV – 1

DEV - 2

PNC

Observations
• With 3PHP, peer discovery requires only one
round of frame exchange.
• Fully utilized the broadcast nature,
centralized control, ad-hoc communication,
and efficient peer discovery.
• Save the futile back-off retransmission for
unreachable destination.
• Guaranteed full piconet connectivity. (no
network layer routing required)
• On demand routing
• More then BIFS waiting. (include RIFS) Conclusion

Performance Evaluations
[Intra-piconet no connection probability]
• Intra-piconet no
connection
probability

• Common Overlap
Area function
COLA(R, r, x):
Represent the
intersection of two
circles with radii R
and r (r e R),
respectively, which
centers are
separated by
distance x

Performance Evaluations (2)
[Intra-piconet no connection probability]

Performance Evaluations (3)
[Intra-piconet no connection probability]
• The probability of no direct connection
between two DEVs in a piconet is

Performance Evaluations (4)
[Peer Discovery delay analysis]


# of Frame Transmission




Expected
Contention Time



Expected Packet
Delay

Performance Evaluations (5)
[Peer Discovery delay analysis]


Expected routing
failure probability

• Expected successful peer discovery
delays are given by

Simulation and Numerical Results
• No connection probability as a function of
coverage range ratio

Simulation and Numerical Results (2)
• Peer discovery delay vs. conditional
collision probability

Simulation and Numerical Results (3)
• Piconet peer discovery time vs. coverage
range ratio

Simulation and Numerical Results (4)
• Piconet peer discovery failure probability
with standard method

Simulation and Numerical Results (5)
• Two-hop forwarding route optimization
ratio vs. piconet radius

Simulation and Numerical Results (6)
• Expected data between directly unreachable
pairs in piconets with 20 DEVs

Conclusion
• Underlying fact: peer-to-peer data delivery in
802.15.3 WPANs
• Existing MAC layer peer discovery methods
cannot guarantee full connectivity between
DEVs within a piconet through direct peerto-peer connections if the piconet operates
with a radius larger than half of the
maximum transmission distance. (~ 41.3%)
• If Mac fails, use the expensive network layer
routing.

Conclusion (2)
• Used the central control topology
• Routing in 2-hop with single round of
control frame exchange
• 3PHP achieves 25– 37% faster peer
discovery time over the standard MAC
• Route optimization algorithm in the PNC
to provide the best MAC layer forwarding
routes by self-learning the available rate
information between DEVs.

References


IEEE Standard 802.15.3, “Wireless medium access control (MAC) and physical
layer (PHY) specifications for high rate wireless personal area networks
(WPANs),”Sept. 2003.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery in IEEE 802.15.3 WPANs,”in Proc. IEEE BroadNets2005, Boston, MA,
Oct. 2005.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery and Route Optimization in IEEE 802.15.3WPANs,”accepted for
publication in ACM/KluwerJ. Mobile Networks and Applications, Nov. 2005.



Z. Yin and V.C.M. Leung, “Connection Data Rate Optimization of IEEE 802.15.3
Scatternetswith Multi-rate Carriers,”IEEE ICC’06, Istanbul, Turkey, June 2006.



Zhanping Yin and Victor C.M. Leung, “Introduction to IEEE 802.15.3 High Rate
Wireless Personal Area Network (WPAN)”, Electrical and Computer Engineering
University of British Columbia

Thank You



Slide 8

Third-Party Handshake Protocol for
Efficient Peer Discovery
and Route Optimization in
IEEE 802.15.3 WPANs
Authors:
Zhanping Yin * Victor C. M. Leung
Published:
ACM/ MONET 2006
Presented by:
Gautam S. Thakur

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

WPAN
• A WPAN (wireless personal area network) is a
personal area network - a network for
interconnecting devices centered around an
individual person's workspace
• A very short range ~10 mtrs. E.g. Bluetooth
• Proposed operating frequencies are around
2.4 GHz in digital modes.
• The objective is to facilitate seamless

operation among home or business devices
and systems.

Ultra-Wideband
• A physical layer technology
• For, short distance communication with high
data rate and short transmission range.
• Lower power requirement and pulsed data
• UWB transmission over extremely wide
unlicensed radio spectrum  3.1 – 10.6 GHz.
• Over results in
– Less interference
– Wire-like performance for indoor wireless
environment.

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Overview of 802.15.3
• Why 802.15.3 ?
• The 802.15.3 Wireless Space
• 802.15.3 Overview and Components

Overview of 802.15.3
[Why 802.15.3 ?]
• Motivated by the increasing demand of wireless
communications with






Ubiquitous network connectivity
Low cost and low power consumption -> WPAN
High data rate(HDR)
Quality of Service(QoS) support
Comparison with other short to medium range wireless
technologies
• Wireless LAN (WLAN)
– High cost and power consumption, no hard QoS guarantee

• WPANs-Bluetooth (802.15.1) and ZigBee(802.15.4)
– Data rate too low

• Applications of 802.15.3
– Virtual wireless multimedia connectivity
• Video/audio distribution

– High speed data transfer

Overview of 802.15.3
[ 802.15.3 = Wireless Multimedia ]

Overview of 802.15.3
[ The 802 Wireless Space ]

IEEE 802.15.3 Overview
• High date rate and low
power
• Mainly works within a
piconet with dynamic
DEV membership
• Ad hoc topology with
centralized control by
the PNC
• Connection oriented
peer-to-peer
communications
• Support for multimedia
quality of service(QoS)
• Multiple power
management modes
• Security

Formation of an 802.15.3 piconet
• The basic component
is the DEV
– One DEV is required to
assume the role of the
piconet coordinator
(PNC) of the piconet.
– The PNC provides the
basic timing sync for the
piconet with the beacon.
– Additionally, the PNC
manages the quality of
service (QoS)
requirements, power
save modes and access
control to the piconet.

Formation of an 802.15.3 piconet (2)
• PNC supports ad
hoc peer-to-peer
connections
• PNC provides
timing for
synchronization of
DEVs within the
piconet, performs
admission control,
allocates network
resources etc

Formation of a Piconet (3)
• All DEVs within radio coverage of the PNC
can then associate with it to form a piconet.
• Then starts the peer discovery.
• Some DEV pairs in the piconet may be out of

range of each other, and as a result, direct
peer-to-peer connection is unavailable
between them. This results in network layer
discovery methods

Superframe format
• Timing and data transmissions in the piconet
are based on the superframe
• The superframe has three parts
– Beacon: Control information, Allocates CTA,
Synchronization
– Contention Access Period (CAP): via CSMA/CA, file xfer
– Channel Time Allocation Period (CTAP)

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Peer discovery and connectivity issue
• An 802.15.3 piconet supports ad hoc
communications between peer DEVs.
• Peer discovery is crucial to its operation.
• The DEVs shall be able to obtain information
about the services and capabilities of other
DEVs in the piconet at any time by
information discovery commands.
• Peer information is needed before a source
DEV can send any data to a destination DEV,
or generate channel time requests (CTRq) to
the PNC.

1
2

5

3

4

6

9

7

8

10

13

11

14

12

15

PNC

Src_DEV

Dest_DEV

PNC Info. Request command
SIFS
Imm-ACK

SIFS
PNC Information command
SIFS
Imm-ACK
SIFS

Probe Request Command
SIFS
Imm-ACK
SIFS
Probe Response Command
SIFS
Imm-ACK
RIFS

1. NOT receive the Imm-Ack
2. Cannot distinguish out-of-range
transmission and collision
3. Perform backoff retransmission
for collision repeatedly

DEV – 1

PNC

Dev 2 is outside the
range of Dev1 and
vise-versa

1. NOT receive Probe Request
command

DEV - 2

Existing Issues with IEEE 802.15.3











Peer discovery is crucial to piconet
operations.
Standard peer discovery is
unreliable and leads to substantial
delays for unreachable DEV pairs
Full piconet connectivity is not
guaranteed with only direct peerto-peer communications
The standard 802.15.3 MAC does
not take advantage of the unique
ranging capabilities enabled by
UWB
Connections are in peer-to-peer
manner without consider of
possible route optimizations
MAC modeling and performance
evaluation
Stream time scheduling methods
not defined in the standard





DEV_1 cannot communicate with
DEV_4 in peer-to-peer manner
For traffic between DEV_1 and
DEV_3, is it better to forward via
PNC than the direct connection?
What is the optimal path and data
rate between DEV_3 and DEV_5?

Using network layer routing
• Each hop request a
CTA slot seperately.
• PNC treat each hop as
independent traffic
stream

• Effect: Failure in an
intermediate hop
breaks the
connections, but PNC
assumes that an
independent stream is
terminated. Keeps
allocating CTAs for
other hops untill it is
eventually notified by
all participating DEV

Using MAC layer forwarding
• With explicit MAC
layer forwarding,
PNC knows that
these hops belongs
to one connection.
• Better adjusting
downstream and
upstream CTAs.

• Effect: reroute the
traffic is the
intermediate node
fails, and releasing
all CTAs if source
of destination
terminates.

Some Observations
• Peer discover is essential
to piconet operations
and communication
between DEVs
• Full piconet connectivity
cannot be guaranteed
• Some DEV pairs may be
out of range of each
other
• Mac layer routing fails
but is better then IP
routing.

• Remember, 802.15.3 has
centralized topology. So
what ??
• Using PNC, any devices
is two-hop count away
only.
• Can use the central
management capability
to discover simpler and
less costly MAC route

Proposed peer discovery protocol
with forwarding route optimization
• The PNC can always act as a first hop to
connect non-intersecting range DEVs
• However, a betterment can be done in the
frame forwarding by choosing another
DEV closer in distance to the source and
destination to forward the frame.
• All routes are limited to two hops only.

Algorithm
• If the Desti_DEV is reachable, sending PNC
Information Request and Response exchange is
redundant.
• So, Src_DEV send Probe Request command to the
Dest_DEV.
• If Dest_DEV receives the command, it returns an
Imm-ACK after a SIFS and then the Probe Response
command as in standard protocol operations.
• At the same time, the third party, i.e., the PNC, shall
actively monitor the frame exchange.
• Upon receiving a Probe Request, the PNC checks the
destination ID (Dest_ID) field in the MAC header.

Algorithm (2)
• If the Dest_ID is not associated in the piconet, the PNC
send an Imm-ACK to the Src_DEV after SIFS, followed
by a PNC Information command with an empty
Information Element (IE) to notify the source that
destination does not exist.
• Otherwise, instead of ignoring the Probe Request frame,
the PNC waits for the Imm-ACK from the destination
DEV.
• If no Imm-ACK arrives after a backoff inter-frame space
(BIFS), which is the sum of a SIFS and a clear channel
assessment detect time (CCADetectTime), the PNC
realizes that the destination DEV cannot hear the source.
• The PNC then immediately send an Imm-ACK to the
source, followed by a PNC Information command with
the route information. (an optimized route information in
sent)

SRC_DEV send Probe
Request command to
DEST_DEV & PNC listens

SIFS
Imm-ACK

Probe Response command

SIFS (Imm-ACK)

PNC also listen

DEST_DEV
hears?

YES

DEST_DEV
responds

No
No

DEST_DEV
ID
Present?

Yes, Timeout (BIFS)

Send Imm-ACK & route
information to source

Yes and
DEST_DEV sent Imm-ACK

Do Nothing, monitor if
DEST_DEV crash.

Forward the data to
the router node

Algorithm (3)
[Route calculation]
• Most wireless networks today employ a multirate PHY (e.g., UWB in 802.15.3a) that
supports a set of data rate dependent
modulation/coding parameters.
• Due to the extremely low power consumption
requirement of WPAN devices, the achievable
data rate drops dramatically when the
distance increases.
• The data rate can be modeled as a discrete
function of transmission distance d between
two DEVs:

Algorithm (3)
Rate ( d )  S i ;
R i  1  d  R i ;1  i  m
where, R m

1

 0 , R i is the transmiss

and S 1 and S m are the minimum

ion range of rate S i ;

and maximum

data

rates, respective ly. If d is greater th an R 1, then Rate(d)
and the DEVs have no connectivi

ty

0

Algorithm (4)
• Since the PNC can monitor all commands exchanged
during the CAP, it can learn the data rates between
reachable DEV pairs and store them in an n x n rate
matrix (RM), where
• n is the total number of DEVs within the piconet. DEV
is assigned a unique DEV_ID in the piconet
RM ij is the link rate based on the current informatio
obtained

from the commands

DEV i and DEV j . RM

ij

exchanged

 0 if DEV i and DEV

are out of range or the rate informatio
not available

between

yet, and RM

ij

n is

  if i  j .

j

n

Algorithm (5)
• All DEVs transmit with the maximum
allowable power when sending data. Since the
wireless links are symmetric in nature, clearly
RMij = RMji.
• Based on the current rate information stored
in RM, for an unreachable pair DEVi and
DEVj, the PNC can determine the optimal
(two-hop) route that has the minimum
transmission time, i.e., the best route employs
DEVk for MAC layer forwarding, where k
minimizes:

Algorithm (6)
min(

1
RM



ik
k [ 0 , n  1 ]

1
RM

)
kj

• Alleviates the traffic load on the PNC
• Discovers a current optimal two-hop MAC layer
forwarding path given by existing rate information
without introducing any extra overhead
• If the connection is broken, the PNC can
immediately reroute the traffic to a current
optimal path, or terminate the connection by deallocating all corresponding CTAs.

Discussion
• Original case:
Causes
retransmission

• 3PHP: data sent via
2-hop route if
PNC_ID exists

Dest_ID

Dest_ID

• Normal Transmission (Imm_Ack)

• Normal Transmission (Imm_Ack)

XXX FRAME LOST XXXX

PNC_ID

• Causes retransmission

• Sent Via 2–hop route (Imm_Ack)

PNC

Src_DEV
PNC Info. Request command

Probe Request Command

BIFS
Imm-ACK
SIFS

PNC Information command with Route Info.

Imm-ACK

RIFS

Dest_DEV

SIFS

3PHP-Node

DEV – 1

DEV - 2

PNC

Observations
• With 3PHP, peer discovery requires only one
round of frame exchange.
• Fully utilized the broadcast nature,
centralized control, ad-hoc communication,
and efficient peer discovery.
• Save the futile back-off retransmission for
unreachable destination.
• Guaranteed full piconet connectivity. (no
network layer routing required)
• On demand routing
• More then BIFS waiting. (include RIFS) Conclusion

Performance Evaluations
[Intra-piconet no connection probability]
• Intra-piconet no
connection
probability

• Common Overlap
Area function
COLA(R, r, x):
Represent the
intersection of two
circles with radii R
and r (r e R),
respectively, which
centers are
separated by
distance x

Performance Evaluations (2)
[Intra-piconet no connection probability]

Performance Evaluations (3)
[Intra-piconet no connection probability]
• The probability of no direct connection
between two DEVs in a piconet is

Performance Evaluations (4)
[Peer Discovery delay analysis]


# of Frame Transmission




Expected
Contention Time



Expected Packet
Delay

Performance Evaluations (5)
[Peer Discovery delay analysis]


Expected routing
failure probability

• Expected successful peer discovery
delays are given by

Simulation and Numerical Results
• No connection probability as a function of
coverage range ratio

Simulation and Numerical Results (2)
• Peer discovery delay vs. conditional
collision probability

Simulation and Numerical Results (3)
• Piconet peer discovery time vs. coverage
range ratio

Simulation and Numerical Results (4)
• Piconet peer discovery failure probability
with standard method

Simulation and Numerical Results (5)
• Two-hop forwarding route optimization
ratio vs. piconet radius

Simulation and Numerical Results (6)
• Expected data between directly unreachable
pairs in piconets with 20 DEVs

Conclusion
• Underlying fact: peer-to-peer data delivery in
802.15.3 WPANs
• Existing MAC layer peer discovery methods
cannot guarantee full connectivity between
DEVs within a piconet through direct peerto-peer connections if the piconet operates
with a radius larger than half of the
maximum transmission distance. (~ 41.3%)
• If Mac fails, use the expensive network layer
routing.

Conclusion (2)
• Used the central control topology
• Routing in 2-hop with single round of
control frame exchange
• 3PHP achieves 25– 37% faster peer
discovery time over the standard MAC
• Route optimization algorithm in the PNC
to provide the best MAC layer forwarding
routes by self-learning the available rate
information between DEVs.

References


IEEE Standard 802.15.3, “Wireless medium access control (MAC) and physical
layer (PHY) specifications for high rate wireless personal area networks
(WPANs),”Sept. 2003.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery in IEEE 802.15.3 WPANs,”in Proc. IEEE BroadNets2005, Boston, MA,
Oct. 2005.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery and Route Optimization in IEEE 802.15.3WPANs,”accepted for
publication in ACM/KluwerJ. Mobile Networks and Applications, Nov. 2005.



Z. Yin and V.C.M. Leung, “Connection Data Rate Optimization of IEEE 802.15.3
Scatternetswith Multi-rate Carriers,”IEEE ICC’06, Istanbul, Turkey, June 2006.



Zhanping Yin and Victor C.M. Leung, “Introduction to IEEE 802.15.3 High Rate
Wireless Personal Area Network (WPAN)”, Electrical and Computer Engineering
University of British Columbia

Thank You



Slide 9

Third-Party Handshake Protocol for
Efficient Peer Discovery
and Route Optimization in
IEEE 802.15.3 WPANs
Authors:
Zhanping Yin * Victor C. M. Leung
Published:
ACM/ MONET 2006
Presented by:
Gautam S. Thakur

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

WPAN
• A WPAN (wireless personal area network) is a
personal area network - a network for
interconnecting devices centered around an
individual person's workspace
• A very short range ~10 mtrs. E.g. Bluetooth
• Proposed operating frequencies are around
2.4 GHz in digital modes.
• The objective is to facilitate seamless

operation among home or business devices
and systems.

Ultra-Wideband
• A physical layer technology
• For, short distance communication with high
data rate and short transmission range.
• Lower power requirement and pulsed data
• UWB transmission over extremely wide
unlicensed radio spectrum  3.1 – 10.6 GHz.
• Over results in
– Less interference
– Wire-like performance for indoor wireless
environment.

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Overview of 802.15.3
• Why 802.15.3 ?
• The 802.15.3 Wireless Space
• 802.15.3 Overview and Components

Overview of 802.15.3
[Why 802.15.3 ?]
• Motivated by the increasing demand of wireless
communications with






Ubiquitous network connectivity
Low cost and low power consumption -> WPAN
High data rate(HDR)
Quality of Service(QoS) support
Comparison with other short to medium range wireless
technologies
• Wireless LAN (WLAN)
– High cost and power consumption, no hard QoS guarantee

• WPANs-Bluetooth (802.15.1) and ZigBee(802.15.4)
– Data rate too low

• Applications of 802.15.3
– Virtual wireless multimedia connectivity
• Video/audio distribution

– High speed data transfer

Overview of 802.15.3
[ 802.15.3 = Wireless Multimedia ]

Overview of 802.15.3
[ The 802 Wireless Space ]

IEEE 802.15.3 Overview
• High date rate and low
power
• Mainly works within a
piconet with dynamic
DEV membership
• Ad hoc topology with
centralized control by
the PNC
• Connection oriented
peer-to-peer
communications
• Support for multimedia
quality of service(QoS)
• Multiple power
management modes
• Security

Formation of an 802.15.3 piconet
• The basic component
is the DEV
– One DEV is required to
assume the role of the
piconet coordinator
(PNC) of the piconet.
– The PNC provides the
basic timing sync for the
piconet with the beacon.
– Additionally, the PNC
manages the quality of
service (QoS)
requirements, power
save modes and access
control to the piconet.

Formation of an 802.15.3 piconet (2)
• PNC supports ad
hoc peer-to-peer
connections
• PNC provides
timing for
synchronization of
DEVs within the
piconet, performs
admission control,
allocates network
resources etc

Formation of a Piconet (3)
• All DEVs within radio coverage of the PNC
can then associate with it to form a piconet.
• Then starts the peer discovery.
• Some DEV pairs in the piconet may be out of

range of each other, and as a result, direct
peer-to-peer connection is unavailable
between them. This results in network layer
discovery methods

Superframe format
• Timing and data transmissions in the piconet
are based on the superframe
• The superframe has three parts
– Beacon: Control information, Allocates CTA,
Synchronization
– Contention Access Period (CAP): via CSMA/CA, file xfer
– Channel Time Allocation Period (CTAP)

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Peer discovery and connectivity issue
• An 802.15.3 piconet supports ad hoc
communications between peer DEVs.
• Peer discovery is crucial to its operation.
• The DEVs shall be able to obtain information
about the services and capabilities of other
DEVs in the piconet at any time by
information discovery commands.
• Peer information is needed before a source
DEV can send any data to a destination DEV,
or generate channel time requests (CTRq) to
the PNC.

1
2

5

3

4

6

9

7

8

10

13

11

14

12

15

PNC

Src_DEV

Dest_DEV

PNC Info. Request command
SIFS
Imm-ACK

SIFS
PNC Information command
SIFS
Imm-ACK
SIFS

Probe Request Command
SIFS
Imm-ACK
SIFS
Probe Response Command
SIFS
Imm-ACK
RIFS

1. NOT receive the Imm-Ack
2. Cannot distinguish out-of-range
transmission and collision
3. Perform backoff retransmission
for collision repeatedly

DEV – 1

PNC

Dev 2 is outside the
range of Dev1 and
vise-versa

1. NOT receive Probe Request
command

DEV - 2

Existing Issues with IEEE 802.15.3











Peer discovery is crucial to piconet
operations.
Standard peer discovery is
unreliable and leads to substantial
delays for unreachable DEV pairs
Full piconet connectivity is not
guaranteed with only direct peerto-peer communications
The standard 802.15.3 MAC does
not take advantage of the unique
ranging capabilities enabled by
UWB
Connections are in peer-to-peer
manner without consider of
possible route optimizations
MAC modeling and performance
evaluation
Stream time scheduling methods
not defined in the standard





DEV_1 cannot communicate with
DEV_4 in peer-to-peer manner
For traffic between DEV_1 and
DEV_3, is it better to forward via
PNC than the direct connection?
What is the optimal path and data
rate between DEV_3 and DEV_5?

Using network layer routing
• Each hop request a
CTA slot seperately.
• PNC treat each hop as
independent traffic
stream

• Effect: Failure in an
intermediate hop
breaks the
connections, but PNC
assumes that an
independent stream is
terminated. Keeps
allocating CTAs for
other hops untill it is
eventually notified by
all participating DEV

Using MAC layer forwarding
• With explicit MAC
layer forwarding,
PNC knows that
these hops belongs
to one connection.
• Better adjusting
downstream and
upstream CTAs.

• Effect: reroute the
traffic is the
intermediate node
fails, and releasing
all CTAs if source
of destination
terminates.

Some Observations
• Peer discover is essential
to piconet operations
and communication
between DEVs
• Full piconet connectivity
cannot be guaranteed
• Some DEV pairs may be
out of range of each
other
• Mac layer routing fails
but is better then IP
routing.

• Remember, 802.15.3 has
centralized topology. So
what ??
• Using PNC, any devices
is two-hop count away
only.
• Can use the central
management capability
to discover simpler and
less costly MAC route

Proposed peer discovery protocol
with forwarding route optimization
• The PNC can always act as a first hop to
connect non-intersecting range DEVs
• However, a betterment can be done in the
frame forwarding by choosing another
DEV closer in distance to the source and
destination to forward the frame.
• All routes are limited to two hops only.

Algorithm
• If the Desti_DEV is reachable, sending PNC
Information Request and Response exchange is
redundant.
• So, Src_DEV send Probe Request command to the
Dest_DEV.
• If Dest_DEV receives the command, it returns an
Imm-ACK after a SIFS and then the Probe Response
command as in standard protocol operations.
• At the same time, the third party, i.e., the PNC, shall
actively monitor the frame exchange.
• Upon receiving a Probe Request, the PNC checks the
destination ID (Dest_ID) field in the MAC header.

Algorithm (2)
• If the Dest_ID is not associated in the piconet, the PNC
send an Imm-ACK to the Src_DEV after SIFS, followed
by a PNC Information command with an empty
Information Element (IE) to notify the source that
destination does not exist.
• Otherwise, instead of ignoring the Probe Request frame,
the PNC waits for the Imm-ACK from the destination
DEV.
• If no Imm-ACK arrives after a backoff inter-frame space
(BIFS), which is the sum of a SIFS and a clear channel
assessment detect time (CCADetectTime), the PNC
realizes that the destination DEV cannot hear the source.
• The PNC then immediately send an Imm-ACK to the
source, followed by a PNC Information command with
the route information. (an optimized route information in
sent)

SRC_DEV send Probe
Request command to
DEST_DEV & PNC listens

SIFS
Imm-ACK

Probe Response command

SIFS (Imm-ACK)

PNC also listen

DEST_DEV
hears?

YES

DEST_DEV
responds

No
No

DEST_DEV
ID
Present?

Yes, Timeout (BIFS)

Send Imm-ACK & route
information to source

Yes and
DEST_DEV sent Imm-ACK

Do Nothing, monitor if
DEST_DEV crash.

Forward the data to
the router node

Algorithm (3)
[Route calculation]
• Most wireless networks today employ a multirate PHY (e.g., UWB in 802.15.3a) that
supports a set of data rate dependent
modulation/coding parameters.
• Due to the extremely low power consumption
requirement of WPAN devices, the achievable
data rate drops dramatically when the
distance increases.
• The data rate can be modeled as a discrete
function of transmission distance d between
two DEVs:

Algorithm (3)
Rate ( d )  S i ;
R i  1  d  R i ;1  i  m
where, R m

1

 0 , R i is the transmiss

and S 1 and S m are the minimum

ion range of rate S i ;

and maximum

data

rates, respective ly. If d is greater th an R 1, then Rate(d)
and the DEVs have no connectivi

ty

0

Algorithm (4)
• Since the PNC can monitor all commands exchanged
during the CAP, it can learn the data rates between
reachable DEV pairs and store them in an n x n rate
matrix (RM), where
• n is the total number of DEVs within the piconet. DEV
is assigned a unique DEV_ID in the piconet
RM ij is the link rate based on the current informatio
obtained

from the commands

DEV i and DEV j . RM

ij

exchanged

 0 if DEV i and DEV

are out of range or the rate informatio
not available

between

yet, and RM

ij

n is

  if i  j .

j

n

Algorithm (5)
• All DEVs transmit with the maximum
allowable power when sending data. Since the
wireless links are symmetric in nature, clearly
RMij = RMji.
• Based on the current rate information stored
in RM, for an unreachable pair DEVi and
DEVj, the PNC can determine the optimal
(two-hop) route that has the minimum
transmission time, i.e., the best route employs
DEVk for MAC layer forwarding, where k
minimizes:

Algorithm (6)
min(

1
RM



ik
k [ 0 , n  1 ]

1
RM

)
kj

• Alleviates the traffic load on the PNC
• Discovers a current optimal two-hop MAC layer
forwarding path given by existing rate information
without introducing any extra overhead
• If the connection is broken, the PNC can
immediately reroute the traffic to a current
optimal path, or terminate the connection by deallocating all corresponding CTAs.

Discussion
• Original case:
Causes
retransmission

• 3PHP: data sent via
2-hop route if
PNC_ID exists

Dest_ID

Dest_ID

• Normal Transmission (Imm_Ack)

• Normal Transmission (Imm_Ack)

XXX FRAME LOST XXXX

PNC_ID

• Causes retransmission

• Sent Via 2–hop route (Imm_Ack)

PNC

Src_DEV
PNC Info. Request command

Probe Request Command

BIFS
Imm-ACK
SIFS

PNC Information command with Route Info.

Imm-ACK

RIFS

Dest_DEV

SIFS

3PHP-Node

DEV – 1

DEV - 2

PNC

Observations
• With 3PHP, peer discovery requires only one
round of frame exchange.
• Fully utilized the broadcast nature,
centralized control, ad-hoc communication,
and efficient peer discovery.
• Save the futile back-off retransmission for
unreachable destination.
• Guaranteed full piconet connectivity. (no
network layer routing required)
• On demand routing
• More then BIFS waiting. (include RIFS) Conclusion

Performance Evaluations
[Intra-piconet no connection probability]
• Intra-piconet no
connection
probability

• Common Overlap
Area function
COLA(R, r, x):
Represent the
intersection of two
circles with radii R
and r (r e R),
respectively, which
centers are
separated by
distance x

Performance Evaluations (2)
[Intra-piconet no connection probability]

Performance Evaluations (3)
[Intra-piconet no connection probability]
• The probability of no direct connection
between two DEVs in a piconet is

Performance Evaluations (4)
[Peer Discovery delay analysis]


# of Frame Transmission




Expected
Contention Time



Expected Packet
Delay

Performance Evaluations (5)
[Peer Discovery delay analysis]


Expected routing
failure probability

• Expected successful peer discovery
delays are given by

Simulation and Numerical Results
• No connection probability as a function of
coverage range ratio

Simulation and Numerical Results (2)
• Peer discovery delay vs. conditional
collision probability

Simulation and Numerical Results (3)
• Piconet peer discovery time vs. coverage
range ratio

Simulation and Numerical Results (4)
• Piconet peer discovery failure probability
with standard method

Simulation and Numerical Results (5)
• Two-hop forwarding route optimization
ratio vs. piconet radius

Simulation and Numerical Results (6)
• Expected data between directly unreachable
pairs in piconets with 20 DEVs

Conclusion
• Underlying fact: peer-to-peer data delivery in
802.15.3 WPANs
• Existing MAC layer peer discovery methods
cannot guarantee full connectivity between
DEVs within a piconet through direct peerto-peer connections if the piconet operates
with a radius larger than half of the
maximum transmission distance. (~ 41.3%)
• If Mac fails, use the expensive network layer
routing.

Conclusion (2)
• Used the central control topology
• Routing in 2-hop with single round of
control frame exchange
• 3PHP achieves 25– 37% faster peer
discovery time over the standard MAC
• Route optimization algorithm in the PNC
to provide the best MAC layer forwarding
routes by self-learning the available rate
information between DEVs.

References


IEEE Standard 802.15.3, “Wireless medium access control (MAC) and physical
layer (PHY) specifications for high rate wireless personal area networks
(WPANs),”Sept. 2003.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery in IEEE 802.15.3 WPANs,”in Proc. IEEE BroadNets2005, Boston, MA,
Oct. 2005.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery and Route Optimization in IEEE 802.15.3WPANs,”accepted for
publication in ACM/KluwerJ. Mobile Networks and Applications, Nov. 2005.



Z. Yin and V.C.M. Leung, “Connection Data Rate Optimization of IEEE 802.15.3
Scatternetswith Multi-rate Carriers,”IEEE ICC’06, Istanbul, Turkey, June 2006.



Zhanping Yin and Victor C.M. Leung, “Introduction to IEEE 802.15.3 High Rate
Wireless Personal Area Network (WPAN)”, Electrical and Computer Engineering
University of British Columbia

Thank You



Slide 10

Third-Party Handshake Protocol for
Efficient Peer Discovery
and Route Optimization in
IEEE 802.15.3 WPANs
Authors:
Zhanping Yin * Victor C. M. Leung
Published:
ACM/ MONET 2006
Presented by:
Gautam S. Thakur

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

WPAN
• A WPAN (wireless personal area network) is a
personal area network - a network for
interconnecting devices centered around an
individual person's workspace
• A very short range ~10 mtrs. E.g. Bluetooth
• Proposed operating frequencies are around
2.4 GHz in digital modes.
• The objective is to facilitate seamless

operation among home or business devices
and systems.

Ultra-Wideband
• A physical layer technology
• For, short distance communication with high
data rate and short transmission range.
• Lower power requirement and pulsed data
• UWB transmission over extremely wide
unlicensed radio spectrum  3.1 – 10.6 GHz.
• Over results in
– Less interference
– Wire-like performance for indoor wireless
environment.

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Overview of 802.15.3
• Why 802.15.3 ?
• The 802.15.3 Wireless Space
• 802.15.3 Overview and Components

Overview of 802.15.3
[Why 802.15.3 ?]
• Motivated by the increasing demand of wireless
communications with






Ubiquitous network connectivity
Low cost and low power consumption -> WPAN
High data rate(HDR)
Quality of Service(QoS) support
Comparison with other short to medium range wireless
technologies
• Wireless LAN (WLAN)
– High cost and power consumption, no hard QoS guarantee

• WPANs-Bluetooth (802.15.1) and ZigBee(802.15.4)
– Data rate too low

• Applications of 802.15.3
– Virtual wireless multimedia connectivity
• Video/audio distribution

– High speed data transfer

Overview of 802.15.3
[ 802.15.3 = Wireless Multimedia ]

Overview of 802.15.3
[ The 802 Wireless Space ]

IEEE 802.15.3 Overview
• High date rate and low
power
• Mainly works within a
piconet with dynamic
DEV membership
• Ad hoc topology with
centralized control by
the PNC
• Connection oriented
peer-to-peer
communications
• Support for multimedia
quality of service(QoS)
• Multiple power
management modes
• Security

Formation of an 802.15.3 piconet
• The basic component
is the DEV
– One DEV is required to
assume the role of the
piconet coordinator
(PNC) of the piconet.
– The PNC provides the
basic timing sync for the
piconet with the beacon.
– Additionally, the PNC
manages the quality of
service (QoS)
requirements, power
save modes and access
control to the piconet.

Formation of an 802.15.3 piconet (2)
• PNC supports ad
hoc peer-to-peer
connections
• PNC provides
timing for
synchronization of
DEVs within the
piconet, performs
admission control,
allocates network
resources etc

Formation of a Piconet (3)
• All DEVs within radio coverage of the PNC
can then associate with it to form a piconet.
• Then starts the peer discovery.
• Some DEV pairs in the piconet may be out of

range of each other, and as a result, direct
peer-to-peer connection is unavailable
between them. This results in network layer
discovery methods

Superframe format
• Timing and data transmissions in the piconet
are based on the superframe
• The superframe has three parts
– Beacon: Control information, Allocates CTA,
Synchronization
– Contention Access Period (CAP): via CSMA/CA, file xfer
– Channel Time Allocation Period (CTAP)

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Peer discovery and connectivity issue
• An 802.15.3 piconet supports ad hoc
communications between peer DEVs.
• Peer discovery is crucial to its operation.
• The DEVs shall be able to obtain information
about the services and capabilities of other
DEVs in the piconet at any time by
information discovery commands.
• Peer information is needed before a source
DEV can send any data to a destination DEV,
or generate channel time requests (CTRq) to
the PNC.

1
2

5

3

4

6

9

7

8

10

13

11

14

12

15

PNC

Src_DEV

Dest_DEV

PNC Info. Request command
SIFS
Imm-ACK

SIFS
PNC Information command
SIFS
Imm-ACK
SIFS

Probe Request Command
SIFS
Imm-ACK
SIFS
Probe Response Command
SIFS
Imm-ACK
RIFS

1. NOT receive the Imm-Ack
2. Cannot distinguish out-of-range
transmission and collision
3. Perform backoff retransmission
for collision repeatedly

DEV – 1

PNC

Dev 2 is outside the
range of Dev1 and
vise-versa

1. NOT receive Probe Request
command

DEV - 2

Existing Issues with IEEE 802.15.3











Peer discovery is crucial to piconet
operations.
Standard peer discovery is
unreliable and leads to substantial
delays for unreachable DEV pairs
Full piconet connectivity is not
guaranteed with only direct peerto-peer communications
The standard 802.15.3 MAC does
not take advantage of the unique
ranging capabilities enabled by
UWB
Connections are in peer-to-peer
manner without consider of
possible route optimizations
MAC modeling and performance
evaluation
Stream time scheduling methods
not defined in the standard





DEV_1 cannot communicate with
DEV_4 in peer-to-peer manner
For traffic between DEV_1 and
DEV_3, is it better to forward via
PNC than the direct connection?
What is the optimal path and data
rate between DEV_3 and DEV_5?

Using network layer routing
• Each hop request a
CTA slot seperately.
• PNC treat each hop as
independent traffic
stream

• Effect: Failure in an
intermediate hop
breaks the
connections, but PNC
assumes that an
independent stream is
terminated. Keeps
allocating CTAs for
other hops untill it is
eventually notified by
all participating DEV

Using MAC layer forwarding
• With explicit MAC
layer forwarding,
PNC knows that
these hops belongs
to one connection.
• Better adjusting
downstream and
upstream CTAs.

• Effect: reroute the
traffic is the
intermediate node
fails, and releasing
all CTAs if source
of destination
terminates.

Some Observations
• Peer discover is essential
to piconet operations
and communication
between DEVs
• Full piconet connectivity
cannot be guaranteed
• Some DEV pairs may be
out of range of each
other
• Mac layer routing fails
but is better then IP
routing.

• Remember, 802.15.3 has
centralized topology. So
what ??
• Using PNC, any devices
is two-hop count away
only.
• Can use the central
management capability
to discover simpler and
less costly MAC route

Proposed peer discovery protocol
with forwarding route optimization
• The PNC can always act as a first hop to
connect non-intersecting range DEVs
• However, a betterment can be done in the
frame forwarding by choosing another
DEV closer in distance to the source and
destination to forward the frame.
• All routes are limited to two hops only.

Algorithm
• If the Desti_DEV is reachable, sending PNC
Information Request and Response exchange is
redundant.
• So, Src_DEV send Probe Request command to the
Dest_DEV.
• If Dest_DEV receives the command, it returns an
Imm-ACK after a SIFS and then the Probe Response
command as in standard protocol operations.
• At the same time, the third party, i.e., the PNC, shall
actively monitor the frame exchange.
• Upon receiving a Probe Request, the PNC checks the
destination ID (Dest_ID) field in the MAC header.

Algorithm (2)
• If the Dest_ID is not associated in the piconet, the PNC
send an Imm-ACK to the Src_DEV after SIFS, followed
by a PNC Information command with an empty
Information Element (IE) to notify the source that
destination does not exist.
• Otherwise, instead of ignoring the Probe Request frame,
the PNC waits for the Imm-ACK from the destination
DEV.
• If no Imm-ACK arrives after a backoff inter-frame space
(BIFS), which is the sum of a SIFS and a clear channel
assessment detect time (CCADetectTime), the PNC
realizes that the destination DEV cannot hear the source.
• The PNC then immediately send an Imm-ACK to the
source, followed by a PNC Information command with
the route information. (an optimized route information in
sent)

SRC_DEV send Probe
Request command to
DEST_DEV & PNC listens

SIFS
Imm-ACK

Probe Response command

SIFS (Imm-ACK)

PNC also listen

DEST_DEV
hears?

YES

DEST_DEV
responds

No
No

DEST_DEV
ID
Present?

Yes, Timeout (BIFS)

Send Imm-ACK & route
information to source

Yes and
DEST_DEV sent Imm-ACK

Do Nothing, monitor if
DEST_DEV crash.

Forward the data to
the router node

Algorithm (3)
[Route calculation]
• Most wireless networks today employ a multirate PHY (e.g., UWB in 802.15.3a) that
supports a set of data rate dependent
modulation/coding parameters.
• Due to the extremely low power consumption
requirement of WPAN devices, the achievable
data rate drops dramatically when the
distance increases.
• The data rate can be modeled as a discrete
function of transmission distance d between
two DEVs:

Algorithm (3)
Rate ( d )  S i ;
R i  1  d  R i ;1  i  m
where, R m

1

 0 , R i is the transmiss

and S 1 and S m are the minimum

ion range of rate S i ;

and maximum

data

rates, respective ly. If d is greater th an R 1, then Rate(d)
and the DEVs have no connectivi

ty

0

Algorithm (4)
• Since the PNC can monitor all commands exchanged
during the CAP, it can learn the data rates between
reachable DEV pairs and store them in an n x n rate
matrix (RM), where
• n is the total number of DEVs within the piconet. DEV
is assigned a unique DEV_ID in the piconet
RM ij is the link rate based on the current informatio
obtained

from the commands

DEV i and DEV j . RM

ij

exchanged

 0 if DEV i and DEV

are out of range or the rate informatio
not available

between

yet, and RM

ij

n is

  if i  j .

j

n

Algorithm (5)
• All DEVs transmit with the maximum
allowable power when sending data. Since the
wireless links are symmetric in nature, clearly
RMij = RMji.
• Based on the current rate information stored
in RM, for an unreachable pair DEVi and
DEVj, the PNC can determine the optimal
(two-hop) route that has the minimum
transmission time, i.e., the best route employs
DEVk for MAC layer forwarding, where k
minimizes:

Algorithm (6)
min(

1
RM



ik
k [ 0 , n  1 ]

1
RM

)
kj

• Alleviates the traffic load on the PNC
• Discovers a current optimal two-hop MAC layer
forwarding path given by existing rate information
without introducing any extra overhead
• If the connection is broken, the PNC can
immediately reroute the traffic to a current
optimal path, or terminate the connection by deallocating all corresponding CTAs.

Discussion
• Original case:
Causes
retransmission

• 3PHP: data sent via
2-hop route if
PNC_ID exists

Dest_ID

Dest_ID

• Normal Transmission (Imm_Ack)

• Normal Transmission (Imm_Ack)

XXX FRAME LOST XXXX

PNC_ID

• Causes retransmission

• Sent Via 2–hop route (Imm_Ack)

PNC

Src_DEV
PNC Info. Request command

Probe Request Command

BIFS
Imm-ACK
SIFS

PNC Information command with Route Info.

Imm-ACK

RIFS

Dest_DEV

SIFS

3PHP-Node

DEV – 1

DEV - 2

PNC

Observations
• With 3PHP, peer discovery requires only one
round of frame exchange.
• Fully utilized the broadcast nature,
centralized control, ad-hoc communication,
and efficient peer discovery.
• Save the futile back-off retransmission for
unreachable destination.
• Guaranteed full piconet connectivity. (no
network layer routing required)
• On demand routing
• More then BIFS waiting. (include RIFS) Conclusion

Performance Evaluations
[Intra-piconet no connection probability]
• Intra-piconet no
connection
probability

• Common Overlap
Area function
COLA(R, r, x):
Represent the
intersection of two
circles with radii R
and r (r e R),
respectively, which
centers are
separated by
distance x

Performance Evaluations (2)
[Intra-piconet no connection probability]

Performance Evaluations (3)
[Intra-piconet no connection probability]
• The probability of no direct connection
between two DEVs in a piconet is

Performance Evaluations (4)
[Peer Discovery delay analysis]


# of Frame Transmission




Expected
Contention Time



Expected Packet
Delay

Performance Evaluations (5)
[Peer Discovery delay analysis]


Expected routing
failure probability

• Expected successful peer discovery
delays are given by

Simulation and Numerical Results
• No connection probability as a function of
coverage range ratio

Simulation and Numerical Results (2)
• Peer discovery delay vs. conditional
collision probability

Simulation and Numerical Results (3)
• Piconet peer discovery time vs. coverage
range ratio

Simulation and Numerical Results (4)
• Piconet peer discovery failure probability
with standard method

Simulation and Numerical Results (5)
• Two-hop forwarding route optimization
ratio vs. piconet radius

Simulation and Numerical Results (6)
• Expected data between directly unreachable
pairs in piconets with 20 DEVs

Conclusion
• Underlying fact: peer-to-peer data delivery in
802.15.3 WPANs
• Existing MAC layer peer discovery methods
cannot guarantee full connectivity between
DEVs within a piconet through direct peerto-peer connections if the piconet operates
with a radius larger than half of the
maximum transmission distance. (~ 41.3%)
• If Mac fails, use the expensive network layer
routing.

Conclusion (2)
• Used the central control topology
• Routing in 2-hop with single round of
control frame exchange
• 3PHP achieves 25– 37% faster peer
discovery time over the standard MAC
• Route optimization algorithm in the PNC
to provide the best MAC layer forwarding
routes by self-learning the available rate
information between DEVs.

References


IEEE Standard 802.15.3, “Wireless medium access control (MAC) and physical
layer (PHY) specifications for high rate wireless personal area networks
(WPANs),”Sept. 2003.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery in IEEE 802.15.3 WPANs,”in Proc. IEEE BroadNets2005, Boston, MA,
Oct. 2005.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery and Route Optimization in IEEE 802.15.3WPANs,”accepted for
publication in ACM/KluwerJ. Mobile Networks and Applications, Nov. 2005.



Z. Yin and V.C.M. Leung, “Connection Data Rate Optimization of IEEE 802.15.3
Scatternetswith Multi-rate Carriers,”IEEE ICC’06, Istanbul, Turkey, June 2006.



Zhanping Yin and Victor C.M. Leung, “Introduction to IEEE 802.15.3 High Rate
Wireless Personal Area Network (WPAN)”, Electrical and Computer Engineering
University of British Columbia

Thank You



Slide 11

Third-Party Handshake Protocol for
Efficient Peer Discovery
and Route Optimization in
IEEE 802.15.3 WPANs
Authors:
Zhanping Yin * Victor C. M. Leung
Published:
ACM/ MONET 2006
Presented by:
Gautam S. Thakur

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

WPAN
• A WPAN (wireless personal area network) is a
personal area network - a network for
interconnecting devices centered around an
individual person's workspace
• A very short range ~10 mtrs. E.g. Bluetooth
• Proposed operating frequencies are around
2.4 GHz in digital modes.
• The objective is to facilitate seamless

operation among home or business devices
and systems.

Ultra-Wideband
• A physical layer technology
• For, short distance communication with high
data rate and short transmission range.
• Lower power requirement and pulsed data
• UWB transmission over extremely wide
unlicensed radio spectrum  3.1 – 10.6 GHz.
• Over results in
– Less interference
– Wire-like performance for indoor wireless
environment.

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Overview of 802.15.3
• Why 802.15.3 ?
• The 802.15.3 Wireless Space
• 802.15.3 Overview and Components

Overview of 802.15.3
[Why 802.15.3 ?]
• Motivated by the increasing demand of wireless
communications with






Ubiquitous network connectivity
Low cost and low power consumption -> WPAN
High data rate(HDR)
Quality of Service(QoS) support
Comparison with other short to medium range wireless
technologies
• Wireless LAN (WLAN)
– High cost and power consumption, no hard QoS guarantee

• WPANs-Bluetooth (802.15.1) and ZigBee(802.15.4)
– Data rate too low

• Applications of 802.15.3
– Virtual wireless multimedia connectivity
• Video/audio distribution

– High speed data transfer

Overview of 802.15.3
[ 802.15.3 = Wireless Multimedia ]

Overview of 802.15.3
[ The 802 Wireless Space ]

IEEE 802.15.3 Overview
• High date rate and low
power
• Mainly works within a
piconet with dynamic
DEV membership
• Ad hoc topology with
centralized control by
the PNC
• Connection oriented
peer-to-peer
communications
• Support for multimedia
quality of service(QoS)
• Multiple power
management modes
• Security

Formation of an 802.15.3 piconet
• The basic component
is the DEV
– One DEV is required to
assume the role of the
piconet coordinator
(PNC) of the piconet.
– The PNC provides the
basic timing sync for the
piconet with the beacon.
– Additionally, the PNC
manages the quality of
service (QoS)
requirements, power
save modes and access
control to the piconet.

Formation of an 802.15.3 piconet (2)
• PNC supports ad
hoc peer-to-peer
connections
• PNC provides
timing for
synchronization of
DEVs within the
piconet, performs
admission control,
allocates network
resources etc

Formation of a Piconet (3)
• All DEVs within radio coverage of the PNC
can then associate with it to form a piconet.
• Then starts the peer discovery.
• Some DEV pairs in the piconet may be out of

range of each other, and as a result, direct
peer-to-peer connection is unavailable
between them. This results in network layer
discovery methods

Superframe format
• Timing and data transmissions in the piconet
are based on the superframe
• The superframe has three parts
– Beacon: Control information, Allocates CTA,
Synchronization
– Contention Access Period (CAP): via CSMA/CA, file xfer
– Channel Time Allocation Period (CTAP)

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Peer discovery and connectivity issue
• An 802.15.3 piconet supports ad hoc
communications between peer DEVs.
• Peer discovery is crucial to its operation.
• The DEVs shall be able to obtain information
about the services and capabilities of other
DEVs in the piconet at any time by
information discovery commands.
• Peer information is needed before a source
DEV can send any data to a destination DEV,
or generate channel time requests (CTRq) to
the PNC.

1
2

5

3

4

6

9

7

8

10

13

11

14

12

15

PNC

Src_DEV

Dest_DEV

PNC Info. Request command
SIFS
Imm-ACK

SIFS
PNC Information command
SIFS
Imm-ACK
SIFS

Probe Request Command
SIFS
Imm-ACK
SIFS
Probe Response Command
SIFS
Imm-ACK
RIFS

1. NOT receive the Imm-Ack
2. Cannot distinguish out-of-range
transmission and collision
3. Perform backoff retransmission
for collision repeatedly

DEV – 1

PNC

Dev 2 is outside the
range of Dev1 and
vise-versa

1. NOT receive Probe Request
command

DEV - 2

Existing Issues with IEEE 802.15.3











Peer discovery is crucial to piconet
operations.
Standard peer discovery is
unreliable and leads to substantial
delays for unreachable DEV pairs
Full piconet connectivity is not
guaranteed with only direct peerto-peer communications
The standard 802.15.3 MAC does
not take advantage of the unique
ranging capabilities enabled by
UWB
Connections are in peer-to-peer
manner without consider of
possible route optimizations
MAC modeling and performance
evaluation
Stream time scheduling methods
not defined in the standard





DEV_1 cannot communicate with
DEV_4 in peer-to-peer manner
For traffic between DEV_1 and
DEV_3, is it better to forward via
PNC than the direct connection?
What is the optimal path and data
rate between DEV_3 and DEV_5?

Using network layer routing
• Each hop request a
CTA slot seperately.
• PNC treat each hop as
independent traffic
stream

• Effect: Failure in an
intermediate hop
breaks the
connections, but PNC
assumes that an
independent stream is
terminated. Keeps
allocating CTAs for
other hops untill it is
eventually notified by
all participating DEV

Using MAC layer forwarding
• With explicit MAC
layer forwarding,
PNC knows that
these hops belongs
to one connection.
• Better adjusting
downstream and
upstream CTAs.

• Effect: reroute the
traffic is the
intermediate node
fails, and releasing
all CTAs if source
of destination
terminates.

Some Observations
• Peer discover is essential
to piconet operations
and communication
between DEVs
• Full piconet connectivity
cannot be guaranteed
• Some DEV pairs may be
out of range of each
other
• Mac layer routing fails
but is better then IP
routing.

• Remember, 802.15.3 has
centralized topology. So
what ??
• Using PNC, any devices
is two-hop count away
only.
• Can use the central
management capability
to discover simpler and
less costly MAC route

Proposed peer discovery protocol
with forwarding route optimization
• The PNC can always act as a first hop to
connect non-intersecting range DEVs
• However, a betterment can be done in the
frame forwarding by choosing another
DEV closer in distance to the source and
destination to forward the frame.
• All routes are limited to two hops only.

Algorithm
• If the Desti_DEV is reachable, sending PNC
Information Request and Response exchange is
redundant.
• So, Src_DEV send Probe Request command to the
Dest_DEV.
• If Dest_DEV receives the command, it returns an
Imm-ACK after a SIFS and then the Probe Response
command as in standard protocol operations.
• At the same time, the third party, i.e., the PNC, shall
actively monitor the frame exchange.
• Upon receiving a Probe Request, the PNC checks the
destination ID (Dest_ID) field in the MAC header.

Algorithm (2)
• If the Dest_ID is not associated in the piconet, the PNC
send an Imm-ACK to the Src_DEV after SIFS, followed
by a PNC Information command with an empty
Information Element (IE) to notify the source that
destination does not exist.
• Otherwise, instead of ignoring the Probe Request frame,
the PNC waits for the Imm-ACK from the destination
DEV.
• If no Imm-ACK arrives after a backoff inter-frame space
(BIFS), which is the sum of a SIFS and a clear channel
assessment detect time (CCADetectTime), the PNC
realizes that the destination DEV cannot hear the source.
• The PNC then immediately send an Imm-ACK to the
source, followed by a PNC Information command with
the route information. (an optimized route information in
sent)

SRC_DEV send Probe
Request command to
DEST_DEV & PNC listens

SIFS
Imm-ACK

Probe Response command

SIFS (Imm-ACK)

PNC also listen

DEST_DEV
hears?

YES

DEST_DEV
responds

No
No

DEST_DEV
ID
Present?

Yes, Timeout (BIFS)

Send Imm-ACK & route
information to source

Yes and
DEST_DEV sent Imm-ACK

Do Nothing, monitor if
DEST_DEV crash.

Forward the data to
the router node

Algorithm (3)
[Route calculation]
• Most wireless networks today employ a multirate PHY (e.g., UWB in 802.15.3a) that
supports a set of data rate dependent
modulation/coding parameters.
• Due to the extremely low power consumption
requirement of WPAN devices, the achievable
data rate drops dramatically when the
distance increases.
• The data rate can be modeled as a discrete
function of transmission distance d between
two DEVs:

Algorithm (3)
Rate ( d )  S i ;
R i  1  d  R i ;1  i  m
where, R m

1

 0 , R i is the transmiss

and S 1 and S m are the minimum

ion range of rate S i ;

and maximum

data

rates, respective ly. If d is greater th an R 1, then Rate(d)
and the DEVs have no connectivi

ty

0

Algorithm (4)
• Since the PNC can monitor all commands exchanged
during the CAP, it can learn the data rates between
reachable DEV pairs and store them in an n x n rate
matrix (RM), where
• n is the total number of DEVs within the piconet. DEV
is assigned a unique DEV_ID in the piconet
RM ij is the link rate based on the current informatio
obtained

from the commands

DEV i and DEV j . RM

ij

exchanged

 0 if DEV i and DEV

are out of range or the rate informatio
not available

between

yet, and RM

ij

n is

  if i  j .

j

n

Algorithm (5)
• All DEVs transmit with the maximum
allowable power when sending data. Since the
wireless links are symmetric in nature, clearly
RMij = RMji.
• Based on the current rate information stored
in RM, for an unreachable pair DEVi and
DEVj, the PNC can determine the optimal
(two-hop) route that has the minimum
transmission time, i.e., the best route employs
DEVk for MAC layer forwarding, where k
minimizes:

Algorithm (6)
min(

1
RM



ik
k [ 0 , n  1 ]

1
RM

)
kj

• Alleviates the traffic load on the PNC
• Discovers a current optimal two-hop MAC layer
forwarding path given by existing rate information
without introducing any extra overhead
• If the connection is broken, the PNC can
immediately reroute the traffic to a current
optimal path, or terminate the connection by deallocating all corresponding CTAs.

Discussion
• Original case:
Causes
retransmission

• 3PHP: data sent via
2-hop route if
PNC_ID exists

Dest_ID

Dest_ID

• Normal Transmission (Imm_Ack)

• Normal Transmission (Imm_Ack)

XXX FRAME LOST XXXX

PNC_ID

• Causes retransmission

• Sent Via 2–hop route (Imm_Ack)

PNC

Src_DEV
PNC Info. Request command

Probe Request Command

BIFS
Imm-ACK
SIFS

PNC Information command with Route Info.

Imm-ACK

RIFS

Dest_DEV

SIFS

3PHP-Node

DEV – 1

DEV - 2

PNC

Observations
• With 3PHP, peer discovery requires only one
round of frame exchange.
• Fully utilized the broadcast nature,
centralized control, ad-hoc communication,
and efficient peer discovery.
• Save the futile back-off retransmission for
unreachable destination.
• Guaranteed full piconet connectivity. (no
network layer routing required)
• On demand routing
• More then BIFS waiting. (include RIFS) Conclusion

Performance Evaluations
[Intra-piconet no connection probability]
• Intra-piconet no
connection
probability

• Common Overlap
Area function
COLA(R, r, x):
Represent the
intersection of two
circles with radii R
and r (r e R),
respectively, which
centers are
separated by
distance x

Performance Evaluations (2)
[Intra-piconet no connection probability]

Performance Evaluations (3)
[Intra-piconet no connection probability]
• The probability of no direct connection
between two DEVs in a piconet is

Performance Evaluations (4)
[Peer Discovery delay analysis]


# of Frame Transmission




Expected
Contention Time



Expected Packet
Delay

Performance Evaluations (5)
[Peer Discovery delay analysis]


Expected routing
failure probability

• Expected successful peer discovery
delays are given by

Simulation and Numerical Results
• No connection probability as a function of
coverage range ratio

Simulation and Numerical Results (2)
• Peer discovery delay vs. conditional
collision probability

Simulation and Numerical Results (3)
• Piconet peer discovery time vs. coverage
range ratio

Simulation and Numerical Results (4)
• Piconet peer discovery failure probability
with standard method

Simulation and Numerical Results (5)
• Two-hop forwarding route optimization
ratio vs. piconet radius

Simulation and Numerical Results (6)
• Expected data between directly unreachable
pairs in piconets with 20 DEVs

Conclusion
• Underlying fact: peer-to-peer data delivery in
802.15.3 WPANs
• Existing MAC layer peer discovery methods
cannot guarantee full connectivity between
DEVs within a piconet through direct peerto-peer connections if the piconet operates
with a radius larger than half of the
maximum transmission distance. (~ 41.3%)
• If Mac fails, use the expensive network layer
routing.

Conclusion (2)
• Used the central control topology
• Routing in 2-hop with single round of
control frame exchange
• 3PHP achieves 25– 37% faster peer
discovery time over the standard MAC
• Route optimization algorithm in the PNC
to provide the best MAC layer forwarding
routes by self-learning the available rate
information between DEVs.

References


IEEE Standard 802.15.3, “Wireless medium access control (MAC) and physical
layer (PHY) specifications for high rate wireless personal area networks
(WPANs),”Sept. 2003.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery in IEEE 802.15.3 WPANs,”in Proc. IEEE BroadNets2005, Boston, MA,
Oct. 2005.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery and Route Optimization in IEEE 802.15.3WPANs,”accepted for
publication in ACM/KluwerJ. Mobile Networks and Applications, Nov. 2005.



Z. Yin and V.C.M. Leung, “Connection Data Rate Optimization of IEEE 802.15.3
Scatternetswith Multi-rate Carriers,”IEEE ICC’06, Istanbul, Turkey, June 2006.



Zhanping Yin and Victor C.M. Leung, “Introduction to IEEE 802.15.3 High Rate
Wireless Personal Area Network (WPAN)”, Electrical and Computer Engineering
University of British Columbia

Thank You



Slide 12

Third-Party Handshake Protocol for
Efficient Peer Discovery
and Route Optimization in
IEEE 802.15.3 WPANs
Authors:
Zhanping Yin * Victor C. M. Leung
Published:
ACM/ MONET 2006
Presented by:
Gautam S. Thakur

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

WPAN
• A WPAN (wireless personal area network) is a
personal area network - a network for
interconnecting devices centered around an
individual person's workspace
• A very short range ~10 mtrs. E.g. Bluetooth
• Proposed operating frequencies are around
2.4 GHz in digital modes.
• The objective is to facilitate seamless

operation among home or business devices
and systems.

Ultra-Wideband
• A physical layer technology
• For, short distance communication with high
data rate and short transmission range.
• Lower power requirement and pulsed data
• UWB transmission over extremely wide
unlicensed radio spectrum  3.1 – 10.6 GHz.
• Over results in
– Less interference
– Wire-like performance for indoor wireless
environment.

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Overview of 802.15.3
• Why 802.15.3 ?
• The 802.15.3 Wireless Space
• 802.15.3 Overview and Components

Overview of 802.15.3
[Why 802.15.3 ?]
• Motivated by the increasing demand of wireless
communications with






Ubiquitous network connectivity
Low cost and low power consumption -> WPAN
High data rate(HDR)
Quality of Service(QoS) support
Comparison with other short to medium range wireless
technologies
• Wireless LAN (WLAN)
– High cost and power consumption, no hard QoS guarantee

• WPANs-Bluetooth (802.15.1) and ZigBee(802.15.4)
– Data rate too low

• Applications of 802.15.3
– Virtual wireless multimedia connectivity
• Video/audio distribution

– High speed data transfer

Overview of 802.15.3
[ 802.15.3 = Wireless Multimedia ]

Overview of 802.15.3
[ The 802 Wireless Space ]

IEEE 802.15.3 Overview
• High date rate and low
power
• Mainly works within a
piconet with dynamic
DEV membership
• Ad hoc topology with
centralized control by
the PNC
• Connection oriented
peer-to-peer
communications
• Support for multimedia
quality of service(QoS)
• Multiple power
management modes
• Security

Formation of an 802.15.3 piconet
• The basic component
is the DEV
– One DEV is required to
assume the role of the
piconet coordinator
(PNC) of the piconet.
– The PNC provides the
basic timing sync for the
piconet with the beacon.
– Additionally, the PNC
manages the quality of
service (QoS)
requirements, power
save modes and access
control to the piconet.

Formation of an 802.15.3 piconet (2)
• PNC supports ad
hoc peer-to-peer
connections
• PNC provides
timing for
synchronization of
DEVs within the
piconet, performs
admission control,
allocates network
resources etc

Formation of a Piconet (3)
• All DEVs within radio coverage of the PNC
can then associate with it to form a piconet.
• Then starts the peer discovery.
• Some DEV pairs in the piconet may be out of

range of each other, and as a result, direct
peer-to-peer connection is unavailable
between them. This results in network layer
discovery methods

Superframe format
• Timing and data transmissions in the piconet
are based on the superframe
• The superframe has three parts
– Beacon: Control information, Allocates CTA,
Synchronization
– Contention Access Period (CAP): via CSMA/CA, file xfer
– Channel Time Allocation Period (CTAP)

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Peer discovery and connectivity issue
• An 802.15.3 piconet supports ad hoc
communications between peer DEVs.
• Peer discovery is crucial to its operation.
• The DEVs shall be able to obtain information
about the services and capabilities of other
DEVs in the piconet at any time by
information discovery commands.
• Peer information is needed before a source
DEV can send any data to a destination DEV,
or generate channel time requests (CTRq) to
the PNC.

1
2

5

3

4

6

9

7

8

10

13

11

14

12

15

PNC

Src_DEV

Dest_DEV

PNC Info. Request command
SIFS
Imm-ACK

SIFS
PNC Information command
SIFS
Imm-ACK
SIFS

Probe Request Command
SIFS
Imm-ACK
SIFS
Probe Response Command
SIFS
Imm-ACK
RIFS

1. NOT receive the Imm-Ack
2. Cannot distinguish out-of-range
transmission and collision
3. Perform backoff retransmission
for collision repeatedly

DEV – 1

PNC

Dev 2 is outside the
range of Dev1 and
vise-versa

1. NOT receive Probe Request
command

DEV - 2

Existing Issues with IEEE 802.15.3











Peer discovery is crucial to piconet
operations.
Standard peer discovery is
unreliable and leads to substantial
delays for unreachable DEV pairs
Full piconet connectivity is not
guaranteed with only direct peerto-peer communications
The standard 802.15.3 MAC does
not take advantage of the unique
ranging capabilities enabled by
UWB
Connections are in peer-to-peer
manner without consider of
possible route optimizations
MAC modeling and performance
evaluation
Stream time scheduling methods
not defined in the standard





DEV_1 cannot communicate with
DEV_4 in peer-to-peer manner
For traffic between DEV_1 and
DEV_3, is it better to forward via
PNC than the direct connection?
What is the optimal path and data
rate between DEV_3 and DEV_5?

Using network layer routing
• Each hop request a
CTA slot seperately.
• PNC treat each hop as
independent traffic
stream

• Effect: Failure in an
intermediate hop
breaks the
connections, but PNC
assumes that an
independent stream is
terminated. Keeps
allocating CTAs for
other hops untill it is
eventually notified by
all participating DEV

Using MAC layer forwarding
• With explicit MAC
layer forwarding,
PNC knows that
these hops belongs
to one connection.
• Better adjusting
downstream and
upstream CTAs.

• Effect: reroute the
traffic is the
intermediate node
fails, and releasing
all CTAs if source
of destination
terminates.

Some Observations
• Peer discover is essential
to piconet operations
and communication
between DEVs
• Full piconet connectivity
cannot be guaranteed
• Some DEV pairs may be
out of range of each
other
• Mac layer routing fails
but is better then IP
routing.

• Remember, 802.15.3 has
centralized topology. So
what ??
• Using PNC, any devices
is two-hop count away
only.
• Can use the central
management capability
to discover simpler and
less costly MAC route

Proposed peer discovery protocol
with forwarding route optimization
• The PNC can always act as a first hop to
connect non-intersecting range DEVs
• However, a betterment can be done in the
frame forwarding by choosing another
DEV closer in distance to the source and
destination to forward the frame.
• All routes are limited to two hops only.

Algorithm
• If the Desti_DEV is reachable, sending PNC
Information Request and Response exchange is
redundant.
• So, Src_DEV send Probe Request command to the
Dest_DEV.
• If Dest_DEV receives the command, it returns an
Imm-ACK after a SIFS and then the Probe Response
command as in standard protocol operations.
• At the same time, the third party, i.e., the PNC, shall
actively monitor the frame exchange.
• Upon receiving a Probe Request, the PNC checks the
destination ID (Dest_ID) field in the MAC header.

Algorithm (2)
• If the Dest_ID is not associated in the piconet, the PNC
send an Imm-ACK to the Src_DEV after SIFS, followed
by a PNC Information command with an empty
Information Element (IE) to notify the source that
destination does not exist.
• Otherwise, instead of ignoring the Probe Request frame,
the PNC waits for the Imm-ACK from the destination
DEV.
• If no Imm-ACK arrives after a backoff inter-frame space
(BIFS), which is the sum of a SIFS and a clear channel
assessment detect time (CCADetectTime), the PNC
realizes that the destination DEV cannot hear the source.
• The PNC then immediately send an Imm-ACK to the
source, followed by a PNC Information command with
the route information. (an optimized route information in
sent)

SRC_DEV send Probe
Request command to
DEST_DEV & PNC listens

SIFS
Imm-ACK

Probe Response command

SIFS (Imm-ACK)

PNC also listen

DEST_DEV
hears?

YES

DEST_DEV
responds

No
No

DEST_DEV
ID
Present?

Yes, Timeout (BIFS)

Send Imm-ACK & route
information to source

Yes and
DEST_DEV sent Imm-ACK

Do Nothing, monitor if
DEST_DEV crash.

Forward the data to
the router node

Algorithm (3)
[Route calculation]
• Most wireless networks today employ a multirate PHY (e.g., UWB in 802.15.3a) that
supports a set of data rate dependent
modulation/coding parameters.
• Due to the extremely low power consumption
requirement of WPAN devices, the achievable
data rate drops dramatically when the
distance increases.
• The data rate can be modeled as a discrete
function of transmission distance d between
two DEVs:

Algorithm (3)
Rate ( d )  S i ;
R i  1  d  R i ;1  i  m
where, R m

1

 0 , R i is the transmiss

and S 1 and S m are the minimum

ion range of rate S i ;

and maximum

data

rates, respective ly. If d is greater th an R 1, then Rate(d)
and the DEVs have no connectivi

ty

0

Algorithm (4)
• Since the PNC can monitor all commands exchanged
during the CAP, it can learn the data rates between
reachable DEV pairs and store them in an n x n rate
matrix (RM), where
• n is the total number of DEVs within the piconet. DEV
is assigned a unique DEV_ID in the piconet
RM ij is the link rate based on the current informatio
obtained

from the commands

DEV i and DEV j . RM

ij

exchanged

 0 if DEV i and DEV

are out of range or the rate informatio
not available

between

yet, and RM

ij

n is

  if i  j .

j

n

Algorithm (5)
• All DEVs transmit with the maximum
allowable power when sending data. Since the
wireless links are symmetric in nature, clearly
RMij = RMji.
• Based on the current rate information stored
in RM, for an unreachable pair DEVi and
DEVj, the PNC can determine the optimal
(two-hop) route that has the minimum
transmission time, i.e., the best route employs
DEVk for MAC layer forwarding, where k
minimizes:

Algorithm (6)
min(

1
RM



ik
k [ 0 , n  1 ]

1
RM

)
kj

• Alleviates the traffic load on the PNC
• Discovers a current optimal two-hop MAC layer
forwarding path given by existing rate information
without introducing any extra overhead
• If the connection is broken, the PNC can
immediately reroute the traffic to a current
optimal path, or terminate the connection by deallocating all corresponding CTAs.

Discussion
• Original case:
Causes
retransmission

• 3PHP: data sent via
2-hop route if
PNC_ID exists

Dest_ID

Dest_ID

• Normal Transmission (Imm_Ack)

• Normal Transmission (Imm_Ack)

XXX FRAME LOST XXXX

PNC_ID

• Causes retransmission

• Sent Via 2–hop route (Imm_Ack)

PNC

Src_DEV
PNC Info. Request command

Probe Request Command

BIFS
Imm-ACK
SIFS

PNC Information command with Route Info.

Imm-ACK

RIFS

Dest_DEV

SIFS

3PHP-Node

DEV – 1

DEV - 2

PNC

Observations
• With 3PHP, peer discovery requires only one
round of frame exchange.
• Fully utilized the broadcast nature,
centralized control, ad-hoc communication,
and efficient peer discovery.
• Save the futile back-off retransmission for
unreachable destination.
• Guaranteed full piconet connectivity. (no
network layer routing required)
• On demand routing
• More then BIFS waiting. (include RIFS) Conclusion

Performance Evaluations
[Intra-piconet no connection probability]
• Intra-piconet no
connection
probability

• Common Overlap
Area function
COLA(R, r, x):
Represent the
intersection of two
circles with radii R
and r (r e R),
respectively, which
centers are
separated by
distance x

Performance Evaluations (2)
[Intra-piconet no connection probability]

Performance Evaluations (3)
[Intra-piconet no connection probability]
• The probability of no direct connection
between two DEVs in a piconet is

Performance Evaluations (4)
[Peer Discovery delay analysis]


# of Frame Transmission




Expected
Contention Time



Expected Packet
Delay

Performance Evaluations (5)
[Peer Discovery delay analysis]


Expected routing
failure probability

• Expected successful peer discovery
delays are given by

Simulation and Numerical Results
• No connection probability as a function of
coverage range ratio

Simulation and Numerical Results (2)
• Peer discovery delay vs. conditional
collision probability

Simulation and Numerical Results (3)
• Piconet peer discovery time vs. coverage
range ratio

Simulation and Numerical Results (4)
• Piconet peer discovery failure probability
with standard method

Simulation and Numerical Results (5)
• Two-hop forwarding route optimization
ratio vs. piconet radius

Simulation and Numerical Results (6)
• Expected data between directly unreachable
pairs in piconets with 20 DEVs

Conclusion
• Underlying fact: peer-to-peer data delivery in
802.15.3 WPANs
• Existing MAC layer peer discovery methods
cannot guarantee full connectivity between
DEVs within a piconet through direct peerto-peer connections if the piconet operates
with a radius larger than half of the
maximum transmission distance. (~ 41.3%)
• If Mac fails, use the expensive network layer
routing.

Conclusion (2)
• Used the central control topology
• Routing in 2-hop with single round of
control frame exchange
• 3PHP achieves 25– 37% faster peer
discovery time over the standard MAC
• Route optimization algorithm in the PNC
to provide the best MAC layer forwarding
routes by self-learning the available rate
information between DEVs.

References


IEEE Standard 802.15.3, “Wireless medium access control (MAC) and physical
layer (PHY) specifications for high rate wireless personal area networks
(WPANs),”Sept. 2003.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery in IEEE 802.15.3 WPANs,”in Proc. IEEE BroadNets2005, Boston, MA,
Oct. 2005.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery and Route Optimization in IEEE 802.15.3WPANs,”accepted for
publication in ACM/KluwerJ. Mobile Networks and Applications, Nov. 2005.



Z. Yin and V.C.M. Leung, “Connection Data Rate Optimization of IEEE 802.15.3
Scatternetswith Multi-rate Carriers,”IEEE ICC’06, Istanbul, Turkey, June 2006.



Zhanping Yin and Victor C.M. Leung, “Introduction to IEEE 802.15.3 High Rate
Wireless Personal Area Network (WPAN)”, Electrical and Computer Engineering
University of British Columbia

Thank You



Slide 13

Third-Party Handshake Protocol for
Efficient Peer Discovery
and Route Optimization in
IEEE 802.15.3 WPANs
Authors:
Zhanping Yin * Victor C. M. Leung
Published:
ACM/ MONET 2006
Presented by:
Gautam S. Thakur

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

WPAN
• A WPAN (wireless personal area network) is a
personal area network - a network for
interconnecting devices centered around an
individual person's workspace
• A very short range ~10 mtrs. E.g. Bluetooth
• Proposed operating frequencies are around
2.4 GHz in digital modes.
• The objective is to facilitate seamless

operation among home or business devices
and systems.

Ultra-Wideband
• A physical layer technology
• For, short distance communication with high
data rate and short transmission range.
• Lower power requirement and pulsed data
• UWB transmission over extremely wide
unlicensed radio spectrum  3.1 – 10.6 GHz.
• Over results in
– Less interference
– Wire-like performance for indoor wireless
environment.

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Overview of 802.15.3
• Why 802.15.3 ?
• The 802.15.3 Wireless Space
• 802.15.3 Overview and Components

Overview of 802.15.3
[Why 802.15.3 ?]
• Motivated by the increasing demand of wireless
communications with






Ubiquitous network connectivity
Low cost and low power consumption -> WPAN
High data rate(HDR)
Quality of Service(QoS) support
Comparison with other short to medium range wireless
technologies
• Wireless LAN (WLAN)
– High cost and power consumption, no hard QoS guarantee

• WPANs-Bluetooth (802.15.1) and ZigBee(802.15.4)
– Data rate too low

• Applications of 802.15.3
– Virtual wireless multimedia connectivity
• Video/audio distribution

– High speed data transfer

Overview of 802.15.3
[ 802.15.3 = Wireless Multimedia ]

Overview of 802.15.3
[ The 802 Wireless Space ]

IEEE 802.15.3 Overview
• High date rate and low
power
• Mainly works within a
piconet with dynamic
DEV membership
• Ad hoc topology with
centralized control by
the PNC
• Connection oriented
peer-to-peer
communications
• Support for multimedia
quality of service(QoS)
• Multiple power
management modes
• Security

Formation of an 802.15.3 piconet
• The basic component
is the DEV
– One DEV is required to
assume the role of the
piconet coordinator
(PNC) of the piconet.
– The PNC provides the
basic timing sync for the
piconet with the beacon.
– Additionally, the PNC
manages the quality of
service (QoS)
requirements, power
save modes and access
control to the piconet.

Formation of an 802.15.3 piconet (2)
• PNC supports ad
hoc peer-to-peer
connections
• PNC provides
timing for
synchronization of
DEVs within the
piconet, performs
admission control,
allocates network
resources etc

Formation of a Piconet (3)
• All DEVs within radio coverage of the PNC
can then associate with it to form a piconet.
• Then starts the peer discovery.
• Some DEV pairs in the piconet may be out of

range of each other, and as a result, direct
peer-to-peer connection is unavailable
between them. This results in network layer
discovery methods

Superframe format
• Timing and data transmissions in the piconet
are based on the superframe
• The superframe has three parts
– Beacon: Control information, Allocates CTA,
Synchronization
– Contention Access Period (CAP): via CSMA/CA, file xfer
– Channel Time Allocation Period (CTAP)

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Peer discovery and connectivity issue
• An 802.15.3 piconet supports ad hoc
communications between peer DEVs.
• Peer discovery is crucial to its operation.
• The DEVs shall be able to obtain information
about the services and capabilities of other
DEVs in the piconet at any time by
information discovery commands.
• Peer information is needed before a source
DEV can send any data to a destination DEV,
or generate channel time requests (CTRq) to
the PNC.

1
2

5

3

4

6

9

7

8

10

13

11

14

12

15

PNC

Src_DEV

Dest_DEV

PNC Info. Request command
SIFS
Imm-ACK

SIFS
PNC Information command
SIFS
Imm-ACK
SIFS

Probe Request Command
SIFS
Imm-ACK
SIFS
Probe Response Command
SIFS
Imm-ACK
RIFS

1. NOT receive the Imm-Ack
2. Cannot distinguish out-of-range
transmission and collision
3. Perform backoff retransmission
for collision repeatedly

DEV – 1

PNC

Dev 2 is outside the
range of Dev1 and
vise-versa

1. NOT receive Probe Request
command

DEV - 2

Existing Issues with IEEE 802.15.3











Peer discovery is crucial to piconet
operations.
Standard peer discovery is
unreliable and leads to substantial
delays for unreachable DEV pairs
Full piconet connectivity is not
guaranteed with only direct peerto-peer communications
The standard 802.15.3 MAC does
not take advantage of the unique
ranging capabilities enabled by
UWB
Connections are in peer-to-peer
manner without consider of
possible route optimizations
MAC modeling and performance
evaluation
Stream time scheduling methods
not defined in the standard





DEV_1 cannot communicate with
DEV_4 in peer-to-peer manner
For traffic between DEV_1 and
DEV_3, is it better to forward via
PNC than the direct connection?
What is the optimal path and data
rate between DEV_3 and DEV_5?

Using network layer routing
• Each hop request a
CTA slot seperately.
• PNC treat each hop as
independent traffic
stream

• Effect: Failure in an
intermediate hop
breaks the
connections, but PNC
assumes that an
independent stream is
terminated. Keeps
allocating CTAs for
other hops untill it is
eventually notified by
all participating DEV

Using MAC layer forwarding
• With explicit MAC
layer forwarding,
PNC knows that
these hops belongs
to one connection.
• Better adjusting
downstream and
upstream CTAs.

• Effect: reroute the
traffic is the
intermediate node
fails, and releasing
all CTAs if source
of destination
terminates.

Some Observations
• Peer discover is essential
to piconet operations
and communication
between DEVs
• Full piconet connectivity
cannot be guaranteed
• Some DEV pairs may be
out of range of each
other
• Mac layer routing fails
but is better then IP
routing.

• Remember, 802.15.3 has
centralized topology. So
what ??
• Using PNC, any devices
is two-hop count away
only.
• Can use the central
management capability
to discover simpler and
less costly MAC route

Proposed peer discovery protocol
with forwarding route optimization
• The PNC can always act as a first hop to
connect non-intersecting range DEVs
• However, a betterment can be done in the
frame forwarding by choosing another
DEV closer in distance to the source and
destination to forward the frame.
• All routes are limited to two hops only.

Algorithm
• If the Desti_DEV is reachable, sending PNC
Information Request and Response exchange is
redundant.
• So, Src_DEV send Probe Request command to the
Dest_DEV.
• If Dest_DEV receives the command, it returns an
Imm-ACK after a SIFS and then the Probe Response
command as in standard protocol operations.
• At the same time, the third party, i.e., the PNC, shall
actively monitor the frame exchange.
• Upon receiving a Probe Request, the PNC checks the
destination ID (Dest_ID) field in the MAC header.

Algorithm (2)
• If the Dest_ID is not associated in the piconet, the PNC
send an Imm-ACK to the Src_DEV after SIFS, followed
by a PNC Information command with an empty
Information Element (IE) to notify the source that
destination does not exist.
• Otherwise, instead of ignoring the Probe Request frame,
the PNC waits for the Imm-ACK from the destination
DEV.
• If no Imm-ACK arrives after a backoff inter-frame space
(BIFS), which is the sum of a SIFS and a clear channel
assessment detect time (CCADetectTime), the PNC
realizes that the destination DEV cannot hear the source.
• The PNC then immediately send an Imm-ACK to the
source, followed by a PNC Information command with
the route information. (an optimized route information in
sent)

SRC_DEV send Probe
Request command to
DEST_DEV & PNC listens

SIFS
Imm-ACK

Probe Response command

SIFS (Imm-ACK)

PNC also listen

DEST_DEV
hears?

YES

DEST_DEV
responds

No
No

DEST_DEV
ID
Present?

Yes, Timeout (BIFS)

Send Imm-ACK & route
information to source

Yes and
DEST_DEV sent Imm-ACK

Do Nothing, monitor if
DEST_DEV crash.

Forward the data to
the router node

Algorithm (3)
[Route calculation]
• Most wireless networks today employ a multirate PHY (e.g., UWB in 802.15.3a) that
supports a set of data rate dependent
modulation/coding parameters.
• Due to the extremely low power consumption
requirement of WPAN devices, the achievable
data rate drops dramatically when the
distance increases.
• The data rate can be modeled as a discrete
function of transmission distance d between
two DEVs:

Algorithm (3)
Rate ( d )  S i ;
R i  1  d  R i ;1  i  m
where, R m

1

 0 , R i is the transmiss

and S 1 and S m are the minimum

ion range of rate S i ;

and maximum

data

rates, respective ly. If d is greater th an R 1, then Rate(d)
and the DEVs have no connectivi

ty

0

Algorithm (4)
• Since the PNC can monitor all commands exchanged
during the CAP, it can learn the data rates between
reachable DEV pairs and store them in an n x n rate
matrix (RM), where
• n is the total number of DEVs within the piconet. DEV
is assigned a unique DEV_ID in the piconet
RM ij is the link rate based on the current informatio
obtained

from the commands

DEV i and DEV j . RM

ij

exchanged

 0 if DEV i and DEV

are out of range or the rate informatio
not available

between

yet, and RM

ij

n is

  if i  j .

j

n

Algorithm (5)
• All DEVs transmit with the maximum
allowable power when sending data. Since the
wireless links are symmetric in nature, clearly
RMij = RMji.
• Based on the current rate information stored
in RM, for an unreachable pair DEVi and
DEVj, the PNC can determine the optimal
(two-hop) route that has the minimum
transmission time, i.e., the best route employs
DEVk for MAC layer forwarding, where k
minimizes:

Algorithm (6)
min(

1
RM



ik
k [ 0 , n  1 ]

1
RM

)
kj

• Alleviates the traffic load on the PNC
• Discovers a current optimal two-hop MAC layer
forwarding path given by existing rate information
without introducing any extra overhead
• If the connection is broken, the PNC can
immediately reroute the traffic to a current
optimal path, or terminate the connection by deallocating all corresponding CTAs.

Discussion
• Original case:
Causes
retransmission

• 3PHP: data sent via
2-hop route if
PNC_ID exists

Dest_ID

Dest_ID

• Normal Transmission (Imm_Ack)

• Normal Transmission (Imm_Ack)

XXX FRAME LOST XXXX

PNC_ID

• Causes retransmission

• Sent Via 2–hop route (Imm_Ack)

PNC

Src_DEV
PNC Info. Request command

Probe Request Command

BIFS
Imm-ACK
SIFS

PNC Information command with Route Info.

Imm-ACK

RIFS

Dest_DEV

SIFS

3PHP-Node

DEV – 1

DEV - 2

PNC

Observations
• With 3PHP, peer discovery requires only one
round of frame exchange.
• Fully utilized the broadcast nature,
centralized control, ad-hoc communication,
and efficient peer discovery.
• Save the futile back-off retransmission for
unreachable destination.
• Guaranteed full piconet connectivity. (no
network layer routing required)
• On demand routing
• More then BIFS waiting. (include RIFS) Conclusion

Performance Evaluations
[Intra-piconet no connection probability]
• Intra-piconet no
connection
probability

• Common Overlap
Area function
COLA(R, r, x):
Represent the
intersection of two
circles with radii R
and r (r e R),
respectively, which
centers are
separated by
distance x

Performance Evaluations (2)
[Intra-piconet no connection probability]

Performance Evaluations (3)
[Intra-piconet no connection probability]
• The probability of no direct connection
between two DEVs in a piconet is

Performance Evaluations (4)
[Peer Discovery delay analysis]


# of Frame Transmission




Expected
Contention Time



Expected Packet
Delay

Performance Evaluations (5)
[Peer Discovery delay analysis]


Expected routing
failure probability

• Expected successful peer discovery
delays are given by

Simulation and Numerical Results
• No connection probability as a function of
coverage range ratio

Simulation and Numerical Results (2)
• Peer discovery delay vs. conditional
collision probability

Simulation and Numerical Results (3)
• Piconet peer discovery time vs. coverage
range ratio

Simulation and Numerical Results (4)
• Piconet peer discovery failure probability
with standard method

Simulation and Numerical Results (5)
• Two-hop forwarding route optimization
ratio vs. piconet radius

Simulation and Numerical Results (6)
• Expected data between directly unreachable
pairs in piconets with 20 DEVs

Conclusion
• Underlying fact: peer-to-peer data delivery in
802.15.3 WPANs
• Existing MAC layer peer discovery methods
cannot guarantee full connectivity between
DEVs within a piconet through direct peerto-peer connections if the piconet operates
with a radius larger than half of the
maximum transmission distance. (~ 41.3%)
• If Mac fails, use the expensive network layer
routing.

Conclusion (2)
• Used the central control topology
• Routing in 2-hop with single round of
control frame exchange
• 3PHP achieves 25– 37% faster peer
discovery time over the standard MAC
• Route optimization algorithm in the PNC
to provide the best MAC layer forwarding
routes by self-learning the available rate
information between DEVs.

References


IEEE Standard 802.15.3, “Wireless medium access control (MAC) and physical
layer (PHY) specifications for high rate wireless personal area networks
(WPANs),”Sept. 2003.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery in IEEE 802.15.3 WPANs,”in Proc. IEEE BroadNets2005, Boston, MA,
Oct. 2005.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery and Route Optimization in IEEE 802.15.3WPANs,”accepted for
publication in ACM/KluwerJ. Mobile Networks and Applications, Nov. 2005.



Z. Yin and V.C.M. Leung, “Connection Data Rate Optimization of IEEE 802.15.3
Scatternetswith Multi-rate Carriers,”IEEE ICC’06, Istanbul, Turkey, June 2006.



Zhanping Yin and Victor C.M. Leung, “Introduction to IEEE 802.15.3 High Rate
Wireless Personal Area Network (WPAN)”, Electrical and Computer Engineering
University of British Columbia

Thank You



Slide 14

Third-Party Handshake Protocol for
Efficient Peer Discovery
and Route Optimization in
IEEE 802.15.3 WPANs
Authors:
Zhanping Yin * Victor C. M. Leung
Published:
ACM/ MONET 2006
Presented by:
Gautam S. Thakur

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

WPAN
• A WPAN (wireless personal area network) is a
personal area network - a network for
interconnecting devices centered around an
individual person's workspace
• A very short range ~10 mtrs. E.g. Bluetooth
• Proposed operating frequencies are around
2.4 GHz in digital modes.
• The objective is to facilitate seamless

operation among home or business devices
and systems.

Ultra-Wideband
• A physical layer technology
• For, short distance communication with high
data rate and short transmission range.
• Lower power requirement and pulsed data
• UWB transmission over extremely wide
unlicensed radio spectrum  3.1 – 10.6 GHz.
• Over results in
– Less interference
– Wire-like performance for indoor wireless
environment.

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Overview of 802.15.3
• Why 802.15.3 ?
• The 802.15.3 Wireless Space
• 802.15.3 Overview and Components

Overview of 802.15.3
[Why 802.15.3 ?]
• Motivated by the increasing demand of wireless
communications with






Ubiquitous network connectivity
Low cost and low power consumption -> WPAN
High data rate(HDR)
Quality of Service(QoS) support
Comparison with other short to medium range wireless
technologies
• Wireless LAN (WLAN)
– High cost and power consumption, no hard QoS guarantee

• WPANs-Bluetooth (802.15.1) and ZigBee(802.15.4)
– Data rate too low

• Applications of 802.15.3
– Virtual wireless multimedia connectivity
• Video/audio distribution

– High speed data transfer

Overview of 802.15.3
[ 802.15.3 = Wireless Multimedia ]

Overview of 802.15.3
[ The 802 Wireless Space ]

IEEE 802.15.3 Overview
• High date rate and low
power
• Mainly works within a
piconet with dynamic
DEV membership
• Ad hoc topology with
centralized control by
the PNC
• Connection oriented
peer-to-peer
communications
• Support for multimedia
quality of service(QoS)
• Multiple power
management modes
• Security

Formation of an 802.15.3 piconet
• The basic component
is the DEV
– One DEV is required to
assume the role of the
piconet coordinator
(PNC) of the piconet.
– The PNC provides the
basic timing sync for the
piconet with the beacon.
– Additionally, the PNC
manages the quality of
service (QoS)
requirements, power
save modes and access
control to the piconet.

Formation of an 802.15.3 piconet (2)
• PNC supports ad
hoc peer-to-peer
connections
• PNC provides
timing for
synchronization of
DEVs within the
piconet, performs
admission control,
allocates network
resources etc

Formation of a Piconet (3)
• All DEVs within radio coverage of the PNC
can then associate with it to form a piconet.
• Then starts the peer discovery.
• Some DEV pairs in the piconet may be out of

range of each other, and as a result, direct
peer-to-peer connection is unavailable
between them. This results in network layer
discovery methods

Superframe format
• Timing and data transmissions in the piconet
are based on the superframe
• The superframe has three parts
– Beacon: Control information, Allocates CTA,
Synchronization
– Contention Access Period (CAP): via CSMA/CA, file xfer
– Channel Time Allocation Period (CTAP)

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Peer discovery and connectivity issue
• An 802.15.3 piconet supports ad hoc
communications between peer DEVs.
• Peer discovery is crucial to its operation.
• The DEVs shall be able to obtain information
about the services and capabilities of other
DEVs in the piconet at any time by
information discovery commands.
• Peer information is needed before a source
DEV can send any data to a destination DEV,
or generate channel time requests (CTRq) to
the PNC.

1
2

5

3

4

6

9

7

8

10

13

11

14

12

15

PNC

Src_DEV

Dest_DEV

PNC Info. Request command
SIFS
Imm-ACK

SIFS
PNC Information command
SIFS
Imm-ACK
SIFS

Probe Request Command
SIFS
Imm-ACK
SIFS
Probe Response Command
SIFS
Imm-ACK
RIFS

1. NOT receive the Imm-Ack
2. Cannot distinguish out-of-range
transmission and collision
3. Perform backoff retransmission
for collision repeatedly

DEV – 1

PNC

Dev 2 is outside the
range of Dev1 and
vise-versa

1. NOT receive Probe Request
command

DEV - 2

Existing Issues with IEEE 802.15.3











Peer discovery is crucial to piconet
operations.
Standard peer discovery is
unreliable and leads to substantial
delays for unreachable DEV pairs
Full piconet connectivity is not
guaranteed with only direct peerto-peer communications
The standard 802.15.3 MAC does
not take advantage of the unique
ranging capabilities enabled by
UWB
Connections are in peer-to-peer
manner without consider of
possible route optimizations
MAC modeling and performance
evaluation
Stream time scheduling methods
not defined in the standard





DEV_1 cannot communicate with
DEV_4 in peer-to-peer manner
For traffic between DEV_1 and
DEV_3, is it better to forward via
PNC than the direct connection?
What is the optimal path and data
rate between DEV_3 and DEV_5?

Using network layer routing
• Each hop request a
CTA slot seperately.
• PNC treat each hop as
independent traffic
stream

• Effect: Failure in an
intermediate hop
breaks the
connections, but PNC
assumes that an
independent stream is
terminated. Keeps
allocating CTAs for
other hops untill it is
eventually notified by
all participating DEV

Using MAC layer forwarding
• With explicit MAC
layer forwarding,
PNC knows that
these hops belongs
to one connection.
• Better adjusting
downstream and
upstream CTAs.

• Effect: reroute the
traffic is the
intermediate node
fails, and releasing
all CTAs if source
of destination
terminates.

Some Observations
• Peer discover is essential
to piconet operations
and communication
between DEVs
• Full piconet connectivity
cannot be guaranteed
• Some DEV pairs may be
out of range of each
other
• Mac layer routing fails
but is better then IP
routing.

• Remember, 802.15.3 has
centralized topology. So
what ??
• Using PNC, any devices
is two-hop count away
only.
• Can use the central
management capability
to discover simpler and
less costly MAC route

Proposed peer discovery protocol
with forwarding route optimization
• The PNC can always act as a first hop to
connect non-intersecting range DEVs
• However, a betterment can be done in the
frame forwarding by choosing another
DEV closer in distance to the source and
destination to forward the frame.
• All routes are limited to two hops only.

Algorithm
• If the Desti_DEV is reachable, sending PNC
Information Request and Response exchange is
redundant.
• So, Src_DEV send Probe Request command to the
Dest_DEV.
• If Dest_DEV receives the command, it returns an
Imm-ACK after a SIFS and then the Probe Response
command as in standard protocol operations.
• At the same time, the third party, i.e., the PNC, shall
actively monitor the frame exchange.
• Upon receiving a Probe Request, the PNC checks the
destination ID (Dest_ID) field in the MAC header.

Algorithm (2)
• If the Dest_ID is not associated in the piconet, the PNC
send an Imm-ACK to the Src_DEV after SIFS, followed
by a PNC Information command with an empty
Information Element (IE) to notify the source that
destination does not exist.
• Otherwise, instead of ignoring the Probe Request frame,
the PNC waits for the Imm-ACK from the destination
DEV.
• If no Imm-ACK arrives after a backoff inter-frame space
(BIFS), which is the sum of a SIFS and a clear channel
assessment detect time (CCADetectTime), the PNC
realizes that the destination DEV cannot hear the source.
• The PNC then immediately send an Imm-ACK to the
source, followed by a PNC Information command with
the route information. (an optimized route information in
sent)

SRC_DEV send Probe
Request command to
DEST_DEV & PNC listens

SIFS
Imm-ACK

Probe Response command

SIFS (Imm-ACK)

PNC also listen

DEST_DEV
hears?

YES

DEST_DEV
responds

No
No

DEST_DEV
ID
Present?

Yes, Timeout (BIFS)

Send Imm-ACK & route
information to source

Yes and
DEST_DEV sent Imm-ACK

Do Nothing, monitor if
DEST_DEV crash.

Forward the data to
the router node

Algorithm (3)
[Route calculation]
• Most wireless networks today employ a multirate PHY (e.g., UWB in 802.15.3a) that
supports a set of data rate dependent
modulation/coding parameters.
• Due to the extremely low power consumption
requirement of WPAN devices, the achievable
data rate drops dramatically when the
distance increases.
• The data rate can be modeled as a discrete
function of transmission distance d between
two DEVs:

Algorithm (3)
Rate ( d )  S i ;
R i  1  d  R i ;1  i  m
where, R m

1

 0 , R i is the transmiss

and S 1 and S m are the minimum

ion range of rate S i ;

and maximum

data

rates, respective ly. If d is greater th an R 1, then Rate(d)
and the DEVs have no connectivi

ty

0

Algorithm (4)
• Since the PNC can monitor all commands exchanged
during the CAP, it can learn the data rates between
reachable DEV pairs and store them in an n x n rate
matrix (RM), where
• n is the total number of DEVs within the piconet. DEV
is assigned a unique DEV_ID in the piconet
RM ij is the link rate based on the current informatio
obtained

from the commands

DEV i and DEV j . RM

ij

exchanged

 0 if DEV i and DEV

are out of range or the rate informatio
not available

between

yet, and RM

ij

n is

  if i  j .

j

n

Algorithm (5)
• All DEVs transmit with the maximum
allowable power when sending data. Since the
wireless links are symmetric in nature, clearly
RMij = RMji.
• Based on the current rate information stored
in RM, for an unreachable pair DEVi and
DEVj, the PNC can determine the optimal
(two-hop) route that has the minimum
transmission time, i.e., the best route employs
DEVk for MAC layer forwarding, where k
minimizes:

Algorithm (6)
min(

1
RM



ik
k [ 0 , n  1 ]

1
RM

)
kj

• Alleviates the traffic load on the PNC
• Discovers a current optimal two-hop MAC layer
forwarding path given by existing rate information
without introducing any extra overhead
• If the connection is broken, the PNC can
immediately reroute the traffic to a current
optimal path, or terminate the connection by deallocating all corresponding CTAs.

Discussion
• Original case:
Causes
retransmission

• 3PHP: data sent via
2-hop route if
PNC_ID exists

Dest_ID

Dest_ID

• Normal Transmission (Imm_Ack)

• Normal Transmission (Imm_Ack)

XXX FRAME LOST XXXX

PNC_ID

• Causes retransmission

• Sent Via 2–hop route (Imm_Ack)

PNC

Src_DEV
PNC Info. Request command

Probe Request Command

BIFS
Imm-ACK
SIFS

PNC Information command with Route Info.

Imm-ACK

RIFS

Dest_DEV

SIFS

3PHP-Node

DEV – 1

DEV - 2

PNC

Observations
• With 3PHP, peer discovery requires only one
round of frame exchange.
• Fully utilized the broadcast nature,
centralized control, ad-hoc communication,
and efficient peer discovery.
• Save the futile back-off retransmission for
unreachable destination.
• Guaranteed full piconet connectivity. (no
network layer routing required)
• On demand routing
• More then BIFS waiting. (include RIFS) Conclusion

Performance Evaluations
[Intra-piconet no connection probability]
• Intra-piconet no
connection
probability

• Common Overlap
Area function
COLA(R, r, x):
Represent the
intersection of two
circles with radii R
and r (r e R),
respectively, which
centers are
separated by
distance x

Performance Evaluations (2)
[Intra-piconet no connection probability]

Performance Evaluations (3)
[Intra-piconet no connection probability]
• The probability of no direct connection
between two DEVs in a piconet is

Performance Evaluations (4)
[Peer Discovery delay analysis]


# of Frame Transmission




Expected
Contention Time



Expected Packet
Delay

Performance Evaluations (5)
[Peer Discovery delay analysis]


Expected routing
failure probability

• Expected successful peer discovery
delays are given by

Simulation and Numerical Results
• No connection probability as a function of
coverage range ratio

Simulation and Numerical Results (2)
• Peer discovery delay vs. conditional
collision probability

Simulation and Numerical Results (3)
• Piconet peer discovery time vs. coverage
range ratio

Simulation and Numerical Results (4)
• Piconet peer discovery failure probability
with standard method

Simulation and Numerical Results (5)
• Two-hop forwarding route optimization
ratio vs. piconet radius

Simulation and Numerical Results (6)
• Expected data between directly unreachable
pairs in piconets with 20 DEVs

Conclusion
• Underlying fact: peer-to-peer data delivery in
802.15.3 WPANs
• Existing MAC layer peer discovery methods
cannot guarantee full connectivity between
DEVs within a piconet through direct peerto-peer connections if the piconet operates
with a radius larger than half of the
maximum transmission distance. (~ 41.3%)
• If Mac fails, use the expensive network layer
routing.

Conclusion (2)
• Used the central control topology
• Routing in 2-hop with single round of
control frame exchange
• 3PHP achieves 25– 37% faster peer
discovery time over the standard MAC
• Route optimization algorithm in the PNC
to provide the best MAC layer forwarding
routes by self-learning the available rate
information between DEVs.

References


IEEE Standard 802.15.3, “Wireless medium access control (MAC) and physical
layer (PHY) specifications for high rate wireless personal area networks
(WPANs),”Sept. 2003.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery in IEEE 802.15.3 WPANs,”in Proc. IEEE BroadNets2005, Boston, MA,
Oct. 2005.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery and Route Optimization in IEEE 802.15.3WPANs,”accepted for
publication in ACM/KluwerJ. Mobile Networks and Applications, Nov. 2005.



Z. Yin and V.C.M. Leung, “Connection Data Rate Optimization of IEEE 802.15.3
Scatternetswith Multi-rate Carriers,”IEEE ICC’06, Istanbul, Turkey, June 2006.



Zhanping Yin and Victor C.M. Leung, “Introduction to IEEE 802.15.3 High Rate
Wireless Personal Area Network (WPAN)”, Electrical and Computer Engineering
University of British Columbia

Thank You



Slide 15

Third-Party Handshake Protocol for
Efficient Peer Discovery
and Route Optimization in
IEEE 802.15.3 WPANs
Authors:
Zhanping Yin * Victor C. M. Leung
Published:
ACM/ MONET 2006
Presented by:
Gautam S. Thakur

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

WPAN
• A WPAN (wireless personal area network) is a
personal area network - a network for
interconnecting devices centered around an
individual person's workspace
• A very short range ~10 mtrs. E.g. Bluetooth
• Proposed operating frequencies are around
2.4 GHz in digital modes.
• The objective is to facilitate seamless

operation among home or business devices
and systems.

Ultra-Wideband
• A physical layer technology
• For, short distance communication with high
data rate and short transmission range.
• Lower power requirement and pulsed data
• UWB transmission over extremely wide
unlicensed radio spectrum  3.1 – 10.6 GHz.
• Over results in
– Less interference
– Wire-like performance for indoor wireless
environment.

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Overview of 802.15.3
• Why 802.15.3 ?
• The 802.15.3 Wireless Space
• 802.15.3 Overview and Components

Overview of 802.15.3
[Why 802.15.3 ?]
• Motivated by the increasing demand of wireless
communications with






Ubiquitous network connectivity
Low cost and low power consumption -> WPAN
High data rate(HDR)
Quality of Service(QoS) support
Comparison with other short to medium range wireless
technologies
• Wireless LAN (WLAN)
– High cost and power consumption, no hard QoS guarantee

• WPANs-Bluetooth (802.15.1) and ZigBee(802.15.4)
– Data rate too low

• Applications of 802.15.3
– Virtual wireless multimedia connectivity
• Video/audio distribution

– High speed data transfer

Overview of 802.15.3
[ 802.15.3 = Wireless Multimedia ]

Overview of 802.15.3
[ The 802 Wireless Space ]

IEEE 802.15.3 Overview
• High date rate and low
power
• Mainly works within a
piconet with dynamic
DEV membership
• Ad hoc topology with
centralized control by
the PNC
• Connection oriented
peer-to-peer
communications
• Support for multimedia
quality of service(QoS)
• Multiple power
management modes
• Security

Formation of an 802.15.3 piconet
• The basic component
is the DEV
– One DEV is required to
assume the role of the
piconet coordinator
(PNC) of the piconet.
– The PNC provides the
basic timing sync for the
piconet with the beacon.
– Additionally, the PNC
manages the quality of
service (QoS)
requirements, power
save modes and access
control to the piconet.

Formation of an 802.15.3 piconet (2)
• PNC supports ad
hoc peer-to-peer
connections
• PNC provides
timing for
synchronization of
DEVs within the
piconet, performs
admission control,
allocates network
resources etc

Formation of a Piconet (3)
• All DEVs within radio coverage of the PNC
can then associate with it to form a piconet.
• Then starts the peer discovery.
• Some DEV pairs in the piconet may be out of

range of each other, and as a result, direct
peer-to-peer connection is unavailable
between them. This results in network layer
discovery methods

Superframe format
• Timing and data transmissions in the piconet
are based on the superframe
• The superframe has three parts
– Beacon: Control information, Allocates CTA,
Synchronization
– Contention Access Period (CAP): via CSMA/CA, file xfer
– Channel Time Allocation Period (CTAP)

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Peer discovery and connectivity issue
• An 802.15.3 piconet supports ad hoc
communications between peer DEVs.
• Peer discovery is crucial to its operation.
• The DEVs shall be able to obtain information
about the services and capabilities of other
DEVs in the piconet at any time by
information discovery commands.
• Peer information is needed before a source
DEV can send any data to a destination DEV,
or generate channel time requests (CTRq) to
the PNC.

1
2

5

3

4

6

9

7

8

10

13

11

14

12

15

PNC

Src_DEV

Dest_DEV

PNC Info. Request command
SIFS
Imm-ACK

SIFS
PNC Information command
SIFS
Imm-ACK
SIFS

Probe Request Command
SIFS
Imm-ACK
SIFS
Probe Response Command
SIFS
Imm-ACK
RIFS

1. NOT receive the Imm-Ack
2. Cannot distinguish out-of-range
transmission and collision
3. Perform backoff retransmission
for collision repeatedly

DEV – 1

PNC

Dev 2 is outside the
range of Dev1 and
vise-versa

1. NOT receive Probe Request
command

DEV - 2

Existing Issues with IEEE 802.15.3











Peer discovery is crucial to piconet
operations.
Standard peer discovery is
unreliable and leads to substantial
delays for unreachable DEV pairs
Full piconet connectivity is not
guaranteed with only direct peerto-peer communications
The standard 802.15.3 MAC does
not take advantage of the unique
ranging capabilities enabled by
UWB
Connections are in peer-to-peer
manner without consider of
possible route optimizations
MAC modeling and performance
evaluation
Stream time scheduling methods
not defined in the standard





DEV_1 cannot communicate with
DEV_4 in peer-to-peer manner
For traffic between DEV_1 and
DEV_3, is it better to forward via
PNC than the direct connection?
What is the optimal path and data
rate between DEV_3 and DEV_5?

Using network layer routing
• Each hop request a
CTA slot seperately.
• PNC treat each hop as
independent traffic
stream

• Effect: Failure in an
intermediate hop
breaks the
connections, but PNC
assumes that an
independent stream is
terminated. Keeps
allocating CTAs for
other hops untill it is
eventually notified by
all participating DEV

Using MAC layer forwarding
• With explicit MAC
layer forwarding,
PNC knows that
these hops belongs
to one connection.
• Better adjusting
downstream and
upstream CTAs.

• Effect: reroute the
traffic is the
intermediate node
fails, and releasing
all CTAs if source
of destination
terminates.

Some Observations
• Peer discover is essential
to piconet operations
and communication
between DEVs
• Full piconet connectivity
cannot be guaranteed
• Some DEV pairs may be
out of range of each
other
• Mac layer routing fails
but is better then IP
routing.

• Remember, 802.15.3 has
centralized topology. So
what ??
• Using PNC, any devices
is two-hop count away
only.
• Can use the central
management capability
to discover simpler and
less costly MAC route

Proposed peer discovery protocol
with forwarding route optimization
• The PNC can always act as a first hop to
connect non-intersecting range DEVs
• However, a betterment can be done in the
frame forwarding by choosing another
DEV closer in distance to the source and
destination to forward the frame.
• All routes are limited to two hops only.

Algorithm
• If the Desti_DEV is reachable, sending PNC
Information Request and Response exchange is
redundant.
• So, Src_DEV send Probe Request command to the
Dest_DEV.
• If Dest_DEV receives the command, it returns an
Imm-ACK after a SIFS and then the Probe Response
command as in standard protocol operations.
• At the same time, the third party, i.e., the PNC, shall
actively monitor the frame exchange.
• Upon receiving a Probe Request, the PNC checks the
destination ID (Dest_ID) field in the MAC header.

Algorithm (2)
• If the Dest_ID is not associated in the piconet, the PNC
send an Imm-ACK to the Src_DEV after SIFS, followed
by a PNC Information command with an empty
Information Element (IE) to notify the source that
destination does not exist.
• Otherwise, instead of ignoring the Probe Request frame,
the PNC waits for the Imm-ACK from the destination
DEV.
• If no Imm-ACK arrives after a backoff inter-frame space
(BIFS), which is the sum of a SIFS and a clear channel
assessment detect time (CCADetectTime), the PNC
realizes that the destination DEV cannot hear the source.
• The PNC then immediately send an Imm-ACK to the
source, followed by a PNC Information command with
the route information. (an optimized route information in
sent)

SRC_DEV send Probe
Request command to
DEST_DEV & PNC listens

SIFS
Imm-ACK

Probe Response command

SIFS (Imm-ACK)

PNC also listen

DEST_DEV
hears?

YES

DEST_DEV
responds

No
No

DEST_DEV
ID
Present?

Yes, Timeout (BIFS)

Send Imm-ACK & route
information to source

Yes and
DEST_DEV sent Imm-ACK

Do Nothing, monitor if
DEST_DEV crash.

Forward the data to
the router node

Algorithm (3)
[Route calculation]
• Most wireless networks today employ a multirate PHY (e.g., UWB in 802.15.3a) that
supports a set of data rate dependent
modulation/coding parameters.
• Due to the extremely low power consumption
requirement of WPAN devices, the achievable
data rate drops dramatically when the
distance increases.
• The data rate can be modeled as a discrete
function of transmission distance d between
two DEVs:

Algorithm (3)
Rate ( d )  S i ;
R i  1  d  R i ;1  i  m
where, R m

1

 0 , R i is the transmiss

and S 1 and S m are the minimum

ion range of rate S i ;

and maximum

data

rates, respective ly. If d is greater th an R 1, then Rate(d)
and the DEVs have no connectivi

ty

0

Algorithm (4)
• Since the PNC can monitor all commands exchanged
during the CAP, it can learn the data rates between
reachable DEV pairs and store them in an n x n rate
matrix (RM), where
• n is the total number of DEVs within the piconet. DEV
is assigned a unique DEV_ID in the piconet
RM ij is the link rate based on the current informatio
obtained

from the commands

DEV i and DEV j . RM

ij

exchanged

 0 if DEV i and DEV

are out of range or the rate informatio
not available

between

yet, and RM

ij

n is

  if i  j .

j

n

Algorithm (5)
• All DEVs transmit with the maximum
allowable power when sending data. Since the
wireless links are symmetric in nature, clearly
RMij = RMji.
• Based on the current rate information stored
in RM, for an unreachable pair DEVi and
DEVj, the PNC can determine the optimal
(two-hop) route that has the minimum
transmission time, i.e., the best route employs
DEVk for MAC layer forwarding, where k
minimizes:

Algorithm (6)
min(

1
RM



ik
k [ 0 , n  1 ]

1
RM

)
kj

• Alleviates the traffic load on the PNC
• Discovers a current optimal two-hop MAC layer
forwarding path given by existing rate information
without introducing any extra overhead
• If the connection is broken, the PNC can
immediately reroute the traffic to a current
optimal path, or terminate the connection by deallocating all corresponding CTAs.

Discussion
• Original case:
Causes
retransmission

• 3PHP: data sent via
2-hop route if
PNC_ID exists

Dest_ID

Dest_ID

• Normal Transmission (Imm_Ack)

• Normal Transmission (Imm_Ack)

XXX FRAME LOST XXXX

PNC_ID

• Causes retransmission

• Sent Via 2–hop route (Imm_Ack)

PNC

Src_DEV
PNC Info. Request command

Probe Request Command

BIFS
Imm-ACK
SIFS

PNC Information command with Route Info.

Imm-ACK

RIFS

Dest_DEV

SIFS

3PHP-Node

DEV – 1

DEV - 2

PNC

Observations
• With 3PHP, peer discovery requires only one
round of frame exchange.
• Fully utilized the broadcast nature,
centralized control, ad-hoc communication,
and efficient peer discovery.
• Save the futile back-off retransmission for
unreachable destination.
• Guaranteed full piconet connectivity. (no
network layer routing required)
• On demand routing
• More then BIFS waiting. (include RIFS) Conclusion

Performance Evaluations
[Intra-piconet no connection probability]
• Intra-piconet no
connection
probability

• Common Overlap
Area function
COLA(R, r, x):
Represent the
intersection of two
circles with radii R
and r (r e R),
respectively, which
centers are
separated by
distance x

Performance Evaluations (2)
[Intra-piconet no connection probability]

Performance Evaluations (3)
[Intra-piconet no connection probability]
• The probability of no direct connection
between two DEVs in a piconet is

Performance Evaluations (4)
[Peer Discovery delay analysis]


# of Frame Transmission




Expected
Contention Time



Expected Packet
Delay

Performance Evaluations (5)
[Peer Discovery delay analysis]


Expected routing
failure probability

• Expected successful peer discovery
delays are given by

Simulation and Numerical Results
• No connection probability as a function of
coverage range ratio

Simulation and Numerical Results (2)
• Peer discovery delay vs. conditional
collision probability

Simulation and Numerical Results (3)
• Piconet peer discovery time vs. coverage
range ratio

Simulation and Numerical Results (4)
• Piconet peer discovery failure probability
with standard method

Simulation and Numerical Results (5)
• Two-hop forwarding route optimization
ratio vs. piconet radius

Simulation and Numerical Results (6)
• Expected data between directly unreachable
pairs in piconets with 20 DEVs

Conclusion
• Underlying fact: peer-to-peer data delivery in
802.15.3 WPANs
• Existing MAC layer peer discovery methods
cannot guarantee full connectivity between
DEVs within a piconet through direct peerto-peer connections if the piconet operates
with a radius larger than half of the
maximum transmission distance. (~ 41.3%)
• If Mac fails, use the expensive network layer
routing.

Conclusion (2)
• Used the central control topology
• Routing in 2-hop with single round of
control frame exchange
• 3PHP achieves 25– 37% faster peer
discovery time over the standard MAC
• Route optimization algorithm in the PNC
to provide the best MAC layer forwarding
routes by self-learning the available rate
information between DEVs.

References


IEEE Standard 802.15.3, “Wireless medium access control (MAC) and physical
layer (PHY) specifications for high rate wireless personal area networks
(WPANs),”Sept. 2003.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery in IEEE 802.15.3 WPANs,”in Proc. IEEE BroadNets2005, Boston, MA,
Oct. 2005.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery and Route Optimization in IEEE 802.15.3WPANs,”accepted for
publication in ACM/KluwerJ. Mobile Networks and Applications, Nov. 2005.



Z. Yin and V.C.M. Leung, “Connection Data Rate Optimization of IEEE 802.15.3
Scatternetswith Multi-rate Carriers,”IEEE ICC’06, Istanbul, Turkey, June 2006.



Zhanping Yin and Victor C.M. Leung, “Introduction to IEEE 802.15.3 High Rate
Wireless Personal Area Network (WPAN)”, Electrical and Computer Engineering
University of British Columbia

Thank You



Slide 16

Third-Party Handshake Protocol for
Efficient Peer Discovery
and Route Optimization in
IEEE 802.15.3 WPANs
Authors:
Zhanping Yin * Victor C. M. Leung
Published:
ACM/ MONET 2006
Presented by:
Gautam S. Thakur

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

WPAN
• A WPAN (wireless personal area network) is a
personal area network - a network for
interconnecting devices centered around an
individual person's workspace
• A very short range ~10 mtrs. E.g. Bluetooth
• Proposed operating frequencies are around
2.4 GHz in digital modes.
• The objective is to facilitate seamless

operation among home or business devices
and systems.

Ultra-Wideband
• A physical layer technology
• For, short distance communication with high
data rate and short transmission range.
• Lower power requirement and pulsed data
• UWB transmission over extremely wide
unlicensed radio spectrum  3.1 – 10.6 GHz.
• Over results in
– Less interference
– Wire-like performance for indoor wireless
environment.

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Overview of 802.15.3
• Why 802.15.3 ?
• The 802.15.3 Wireless Space
• 802.15.3 Overview and Components

Overview of 802.15.3
[Why 802.15.3 ?]
• Motivated by the increasing demand of wireless
communications with






Ubiquitous network connectivity
Low cost and low power consumption -> WPAN
High data rate(HDR)
Quality of Service(QoS) support
Comparison with other short to medium range wireless
technologies
• Wireless LAN (WLAN)
– High cost and power consumption, no hard QoS guarantee

• WPANs-Bluetooth (802.15.1) and ZigBee(802.15.4)
– Data rate too low

• Applications of 802.15.3
– Virtual wireless multimedia connectivity
• Video/audio distribution

– High speed data transfer

Overview of 802.15.3
[ 802.15.3 = Wireless Multimedia ]

Overview of 802.15.3
[ The 802 Wireless Space ]

IEEE 802.15.3 Overview
• High date rate and low
power
• Mainly works within a
piconet with dynamic
DEV membership
• Ad hoc topology with
centralized control by
the PNC
• Connection oriented
peer-to-peer
communications
• Support for multimedia
quality of service(QoS)
• Multiple power
management modes
• Security

Formation of an 802.15.3 piconet
• The basic component
is the DEV
– One DEV is required to
assume the role of the
piconet coordinator
(PNC) of the piconet.
– The PNC provides the
basic timing sync for the
piconet with the beacon.
– Additionally, the PNC
manages the quality of
service (QoS)
requirements, power
save modes and access
control to the piconet.

Formation of an 802.15.3 piconet (2)
• PNC supports ad
hoc peer-to-peer
connections
• PNC provides
timing for
synchronization of
DEVs within the
piconet, performs
admission control,
allocates network
resources etc

Formation of a Piconet (3)
• All DEVs within radio coverage of the PNC
can then associate with it to form a piconet.
• Then starts the peer discovery.
• Some DEV pairs in the piconet may be out of

range of each other, and as a result, direct
peer-to-peer connection is unavailable
between them. This results in network layer
discovery methods

Superframe format
• Timing and data transmissions in the piconet
are based on the superframe
• The superframe has three parts
– Beacon: Control information, Allocates CTA,
Synchronization
– Contention Access Period (CAP): via CSMA/CA, file xfer
– Channel Time Allocation Period (CTAP)

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Peer discovery and connectivity issue
• An 802.15.3 piconet supports ad hoc
communications between peer DEVs.
• Peer discovery is crucial to its operation.
• The DEVs shall be able to obtain information
about the services and capabilities of other
DEVs in the piconet at any time by
information discovery commands.
• Peer information is needed before a source
DEV can send any data to a destination DEV,
or generate channel time requests (CTRq) to
the PNC.

1
2

5

3

4

6

9

7

8

10

13

11

14

12

15

PNC

Src_DEV

Dest_DEV

PNC Info. Request command
SIFS
Imm-ACK

SIFS
PNC Information command
SIFS
Imm-ACK
SIFS

Probe Request Command
SIFS
Imm-ACK
SIFS
Probe Response Command
SIFS
Imm-ACK
RIFS

1. NOT receive the Imm-Ack
2. Cannot distinguish out-of-range
transmission and collision
3. Perform backoff retransmission
for collision repeatedly

DEV – 1

PNC

Dev 2 is outside the
range of Dev1 and
vise-versa

1. NOT receive Probe Request
command

DEV - 2

Existing Issues with IEEE 802.15.3











Peer discovery is crucial to piconet
operations.
Standard peer discovery is
unreliable and leads to substantial
delays for unreachable DEV pairs
Full piconet connectivity is not
guaranteed with only direct peerto-peer communications
The standard 802.15.3 MAC does
not take advantage of the unique
ranging capabilities enabled by
UWB
Connections are in peer-to-peer
manner without consider of
possible route optimizations
MAC modeling and performance
evaluation
Stream time scheduling methods
not defined in the standard





DEV_1 cannot communicate with
DEV_4 in peer-to-peer manner
For traffic between DEV_1 and
DEV_3, is it better to forward via
PNC than the direct connection?
What is the optimal path and data
rate between DEV_3 and DEV_5?

Using network layer routing
• Each hop request a
CTA slot seperately.
• PNC treat each hop as
independent traffic
stream

• Effect: Failure in an
intermediate hop
breaks the
connections, but PNC
assumes that an
independent stream is
terminated. Keeps
allocating CTAs for
other hops untill it is
eventually notified by
all participating DEV

Using MAC layer forwarding
• With explicit MAC
layer forwarding,
PNC knows that
these hops belongs
to one connection.
• Better adjusting
downstream and
upstream CTAs.

• Effect: reroute the
traffic is the
intermediate node
fails, and releasing
all CTAs if source
of destination
terminates.

Some Observations
• Peer discover is essential
to piconet operations
and communication
between DEVs
• Full piconet connectivity
cannot be guaranteed
• Some DEV pairs may be
out of range of each
other
• Mac layer routing fails
but is better then IP
routing.

• Remember, 802.15.3 has
centralized topology. So
what ??
• Using PNC, any devices
is two-hop count away
only.
• Can use the central
management capability
to discover simpler and
less costly MAC route

Proposed peer discovery protocol
with forwarding route optimization
• The PNC can always act as a first hop to
connect non-intersecting range DEVs
• However, a betterment can be done in the
frame forwarding by choosing another
DEV closer in distance to the source and
destination to forward the frame.
• All routes are limited to two hops only.

Algorithm
• If the Desti_DEV is reachable, sending PNC
Information Request and Response exchange is
redundant.
• So, Src_DEV send Probe Request command to the
Dest_DEV.
• If Dest_DEV receives the command, it returns an
Imm-ACK after a SIFS and then the Probe Response
command as in standard protocol operations.
• At the same time, the third party, i.e., the PNC, shall
actively monitor the frame exchange.
• Upon receiving a Probe Request, the PNC checks the
destination ID (Dest_ID) field in the MAC header.

Algorithm (2)
• If the Dest_ID is not associated in the piconet, the PNC
send an Imm-ACK to the Src_DEV after SIFS, followed
by a PNC Information command with an empty
Information Element (IE) to notify the source that
destination does not exist.
• Otherwise, instead of ignoring the Probe Request frame,
the PNC waits for the Imm-ACK from the destination
DEV.
• If no Imm-ACK arrives after a backoff inter-frame space
(BIFS), which is the sum of a SIFS and a clear channel
assessment detect time (CCADetectTime), the PNC
realizes that the destination DEV cannot hear the source.
• The PNC then immediately send an Imm-ACK to the
source, followed by a PNC Information command with
the route information. (an optimized route information in
sent)

SRC_DEV send Probe
Request command to
DEST_DEV & PNC listens

SIFS
Imm-ACK

Probe Response command

SIFS (Imm-ACK)

PNC also listen

DEST_DEV
hears?

YES

DEST_DEV
responds

No
No

DEST_DEV
ID
Present?

Yes, Timeout (BIFS)

Send Imm-ACK & route
information to source

Yes and
DEST_DEV sent Imm-ACK

Do Nothing, monitor if
DEST_DEV crash.

Forward the data to
the router node

Algorithm (3)
[Route calculation]
• Most wireless networks today employ a multirate PHY (e.g., UWB in 802.15.3a) that
supports a set of data rate dependent
modulation/coding parameters.
• Due to the extremely low power consumption
requirement of WPAN devices, the achievable
data rate drops dramatically when the
distance increases.
• The data rate can be modeled as a discrete
function of transmission distance d between
two DEVs:

Algorithm (3)
Rate ( d )  S i ;
R i  1  d  R i ;1  i  m
where, R m

1

 0 , R i is the transmiss

and S 1 and S m are the minimum

ion range of rate S i ;

and maximum

data

rates, respective ly. If d is greater th an R 1, then Rate(d)
and the DEVs have no connectivi

ty

0

Algorithm (4)
• Since the PNC can monitor all commands exchanged
during the CAP, it can learn the data rates between
reachable DEV pairs and store them in an n x n rate
matrix (RM), where
• n is the total number of DEVs within the piconet. DEV
is assigned a unique DEV_ID in the piconet
RM ij is the link rate based on the current informatio
obtained

from the commands

DEV i and DEV j . RM

ij

exchanged

 0 if DEV i and DEV

are out of range or the rate informatio
not available

between

yet, and RM

ij

n is

  if i  j .

j

n

Algorithm (5)
• All DEVs transmit with the maximum
allowable power when sending data. Since the
wireless links are symmetric in nature, clearly
RMij = RMji.
• Based on the current rate information stored
in RM, for an unreachable pair DEVi and
DEVj, the PNC can determine the optimal
(two-hop) route that has the minimum
transmission time, i.e., the best route employs
DEVk for MAC layer forwarding, where k
minimizes:

Algorithm (6)
min(

1
RM



ik
k [ 0 , n  1 ]

1
RM

)
kj

• Alleviates the traffic load on the PNC
• Discovers a current optimal two-hop MAC layer
forwarding path given by existing rate information
without introducing any extra overhead
• If the connection is broken, the PNC can
immediately reroute the traffic to a current
optimal path, or terminate the connection by deallocating all corresponding CTAs.

Discussion
• Original case:
Causes
retransmission

• 3PHP: data sent via
2-hop route if
PNC_ID exists

Dest_ID

Dest_ID

• Normal Transmission (Imm_Ack)

• Normal Transmission (Imm_Ack)

XXX FRAME LOST XXXX

PNC_ID

• Causes retransmission

• Sent Via 2–hop route (Imm_Ack)

PNC

Src_DEV
PNC Info. Request command

Probe Request Command

BIFS
Imm-ACK
SIFS

PNC Information command with Route Info.

Imm-ACK

RIFS

Dest_DEV

SIFS

3PHP-Node

DEV – 1

DEV - 2

PNC

Observations
• With 3PHP, peer discovery requires only one
round of frame exchange.
• Fully utilized the broadcast nature,
centralized control, ad-hoc communication,
and efficient peer discovery.
• Save the futile back-off retransmission for
unreachable destination.
• Guaranteed full piconet connectivity. (no
network layer routing required)
• On demand routing
• More then BIFS waiting. (include RIFS) Conclusion

Performance Evaluations
[Intra-piconet no connection probability]
• Intra-piconet no
connection
probability

• Common Overlap
Area function
COLA(R, r, x):
Represent the
intersection of two
circles with radii R
and r (r e R),
respectively, which
centers are
separated by
distance x

Performance Evaluations (2)
[Intra-piconet no connection probability]

Performance Evaluations (3)
[Intra-piconet no connection probability]
• The probability of no direct connection
between two DEVs in a piconet is

Performance Evaluations (4)
[Peer Discovery delay analysis]


# of Frame Transmission




Expected
Contention Time



Expected Packet
Delay

Performance Evaluations (5)
[Peer Discovery delay analysis]


Expected routing
failure probability

• Expected successful peer discovery
delays are given by

Simulation and Numerical Results
• No connection probability as a function of
coverage range ratio

Simulation and Numerical Results (2)
• Peer discovery delay vs. conditional
collision probability

Simulation and Numerical Results (3)
• Piconet peer discovery time vs. coverage
range ratio

Simulation and Numerical Results (4)
• Piconet peer discovery failure probability
with standard method

Simulation and Numerical Results (5)
• Two-hop forwarding route optimization
ratio vs. piconet radius

Simulation and Numerical Results (6)
• Expected data between directly unreachable
pairs in piconets with 20 DEVs

Conclusion
• Underlying fact: peer-to-peer data delivery in
802.15.3 WPANs
• Existing MAC layer peer discovery methods
cannot guarantee full connectivity between
DEVs within a piconet through direct peerto-peer connections if the piconet operates
with a radius larger than half of the
maximum transmission distance. (~ 41.3%)
• If Mac fails, use the expensive network layer
routing.

Conclusion (2)
• Used the central control topology
• Routing in 2-hop with single round of
control frame exchange
• 3PHP achieves 25– 37% faster peer
discovery time over the standard MAC
• Route optimization algorithm in the PNC
to provide the best MAC layer forwarding
routes by self-learning the available rate
information between DEVs.

References


IEEE Standard 802.15.3, “Wireless medium access control (MAC) and physical
layer (PHY) specifications for high rate wireless personal area networks
(WPANs),”Sept. 2003.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery in IEEE 802.15.3 WPANs,”in Proc. IEEE BroadNets2005, Boston, MA,
Oct. 2005.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery and Route Optimization in IEEE 802.15.3WPANs,”accepted for
publication in ACM/KluwerJ. Mobile Networks and Applications, Nov. 2005.



Z. Yin and V.C.M. Leung, “Connection Data Rate Optimization of IEEE 802.15.3
Scatternetswith Multi-rate Carriers,”IEEE ICC’06, Istanbul, Turkey, June 2006.



Zhanping Yin and Victor C.M. Leung, “Introduction to IEEE 802.15.3 High Rate
Wireless Personal Area Network (WPAN)”, Electrical and Computer Engineering
University of British Columbia

Thank You



Slide 17

Third-Party Handshake Protocol for
Efficient Peer Discovery
and Route Optimization in
IEEE 802.15.3 WPANs
Authors:
Zhanping Yin * Victor C. M. Leung
Published:
ACM/ MONET 2006
Presented by:
Gautam S. Thakur

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

WPAN
• A WPAN (wireless personal area network) is a
personal area network - a network for
interconnecting devices centered around an
individual person's workspace
• A very short range ~10 mtrs. E.g. Bluetooth
• Proposed operating frequencies are around
2.4 GHz in digital modes.
• The objective is to facilitate seamless

operation among home or business devices
and systems.

Ultra-Wideband
• A physical layer technology
• For, short distance communication with high
data rate and short transmission range.
• Lower power requirement and pulsed data
• UWB transmission over extremely wide
unlicensed radio spectrum  3.1 – 10.6 GHz.
• Over results in
– Less interference
– Wire-like performance for indoor wireless
environment.

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Overview of 802.15.3
• Why 802.15.3 ?
• The 802.15.3 Wireless Space
• 802.15.3 Overview and Components

Overview of 802.15.3
[Why 802.15.3 ?]
• Motivated by the increasing demand of wireless
communications with






Ubiquitous network connectivity
Low cost and low power consumption -> WPAN
High data rate(HDR)
Quality of Service(QoS) support
Comparison with other short to medium range wireless
technologies
• Wireless LAN (WLAN)
– High cost and power consumption, no hard QoS guarantee

• WPANs-Bluetooth (802.15.1) and ZigBee(802.15.4)
– Data rate too low

• Applications of 802.15.3
– Virtual wireless multimedia connectivity
• Video/audio distribution

– High speed data transfer

Overview of 802.15.3
[ 802.15.3 = Wireless Multimedia ]

Overview of 802.15.3
[ The 802 Wireless Space ]

IEEE 802.15.3 Overview
• High date rate and low
power
• Mainly works within a
piconet with dynamic
DEV membership
• Ad hoc topology with
centralized control by
the PNC
• Connection oriented
peer-to-peer
communications
• Support for multimedia
quality of service(QoS)
• Multiple power
management modes
• Security

Formation of an 802.15.3 piconet
• The basic component
is the DEV
– One DEV is required to
assume the role of the
piconet coordinator
(PNC) of the piconet.
– The PNC provides the
basic timing sync for the
piconet with the beacon.
– Additionally, the PNC
manages the quality of
service (QoS)
requirements, power
save modes and access
control to the piconet.

Formation of an 802.15.3 piconet (2)
• PNC supports ad
hoc peer-to-peer
connections
• PNC provides
timing for
synchronization of
DEVs within the
piconet, performs
admission control,
allocates network
resources etc

Formation of a Piconet (3)
• All DEVs within radio coverage of the PNC
can then associate with it to form a piconet.
• Then starts the peer discovery.
• Some DEV pairs in the piconet may be out of

range of each other, and as a result, direct
peer-to-peer connection is unavailable
between them. This results in network layer
discovery methods

Superframe format
• Timing and data transmissions in the piconet
are based on the superframe
• The superframe has three parts
– Beacon: Control information, Allocates CTA,
Synchronization
– Contention Access Period (CAP): via CSMA/CA, file xfer
– Channel Time Allocation Period (CTAP)

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Peer discovery and connectivity issue
• An 802.15.3 piconet supports ad hoc
communications between peer DEVs.
• Peer discovery is crucial to its operation.
• The DEVs shall be able to obtain information
about the services and capabilities of other
DEVs in the piconet at any time by
information discovery commands.
• Peer information is needed before a source
DEV can send any data to a destination DEV,
or generate channel time requests (CTRq) to
the PNC.

1
2

5

3

4

6

9

7

8

10

13

11

14

12

15

PNC

Src_DEV

Dest_DEV

PNC Info. Request command
SIFS
Imm-ACK

SIFS
PNC Information command
SIFS
Imm-ACK
SIFS

Probe Request Command
SIFS
Imm-ACK
SIFS
Probe Response Command
SIFS
Imm-ACK
RIFS

1. NOT receive the Imm-Ack
2. Cannot distinguish out-of-range
transmission and collision
3. Perform backoff retransmission
for collision repeatedly

DEV – 1

PNC

Dev 2 is outside the
range of Dev1 and
vise-versa

1. NOT receive Probe Request
command

DEV - 2

Existing Issues with IEEE 802.15.3











Peer discovery is crucial to piconet
operations.
Standard peer discovery is
unreliable and leads to substantial
delays for unreachable DEV pairs
Full piconet connectivity is not
guaranteed with only direct peerto-peer communications
The standard 802.15.3 MAC does
not take advantage of the unique
ranging capabilities enabled by
UWB
Connections are in peer-to-peer
manner without consider of
possible route optimizations
MAC modeling and performance
evaluation
Stream time scheduling methods
not defined in the standard





DEV_1 cannot communicate with
DEV_4 in peer-to-peer manner
For traffic between DEV_1 and
DEV_3, is it better to forward via
PNC than the direct connection?
What is the optimal path and data
rate between DEV_3 and DEV_5?

Using network layer routing
• Each hop request a
CTA slot seperately.
• PNC treat each hop as
independent traffic
stream

• Effect: Failure in an
intermediate hop
breaks the
connections, but PNC
assumes that an
independent stream is
terminated. Keeps
allocating CTAs for
other hops untill it is
eventually notified by
all participating DEV

Using MAC layer forwarding
• With explicit MAC
layer forwarding,
PNC knows that
these hops belongs
to one connection.
• Better adjusting
downstream and
upstream CTAs.

• Effect: reroute the
traffic is the
intermediate node
fails, and releasing
all CTAs if source
of destination
terminates.

Some Observations
• Peer discover is essential
to piconet operations
and communication
between DEVs
• Full piconet connectivity
cannot be guaranteed
• Some DEV pairs may be
out of range of each
other
• Mac layer routing fails
but is better then IP
routing.

• Remember, 802.15.3 has
centralized topology. So
what ??
• Using PNC, any devices
is two-hop count away
only.
• Can use the central
management capability
to discover simpler and
less costly MAC route

Proposed peer discovery protocol
with forwarding route optimization
• The PNC can always act as a first hop to
connect non-intersecting range DEVs
• However, a betterment can be done in the
frame forwarding by choosing another
DEV closer in distance to the source and
destination to forward the frame.
• All routes are limited to two hops only.

Algorithm
• If the Desti_DEV is reachable, sending PNC
Information Request and Response exchange is
redundant.
• So, Src_DEV send Probe Request command to the
Dest_DEV.
• If Dest_DEV receives the command, it returns an
Imm-ACK after a SIFS and then the Probe Response
command as in standard protocol operations.
• At the same time, the third party, i.e., the PNC, shall
actively monitor the frame exchange.
• Upon receiving a Probe Request, the PNC checks the
destination ID (Dest_ID) field in the MAC header.

Algorithm (2)
• If the Dest_ID is not associated in the piconet, the PNC
send an Imm-ACK to the Src_DEV after SIFS, followed
by a PNC Information command with an empty
Information Element (IE) to notify the source that
destination does not exist.
• Otherwise, instead of ignoring the Probe Request frame,
the PNC waits for the Imm-ACK from the destination
DEV.
• If no Imm-ACK arrives after a backoff inter-frame space
(BIFS), which is the sum of a SIFS and a clear channel
assessment detect time (CCADetectTime), the PNC
realizes that the destination DEV cannot hear the source.
• The PNC then immediately send an Imm-ACK to the
source, followed by a PNC Information command with
the route information. (an optimized route information in
sent)

SRC_DEV send Probe
Request command to
DEST_DEV & PNC listens

SIFS
Imm-ACK

Probe Response command

SIFS (Imm-ACK)

PNC also listen

DEST_DEV
hears?

YES

DEST_DEV
responds

No
No

DEST_DEV
ID
Present?

Yes, Timeout (BIFS)

Send Imm-ACK & route
information to source

Yes and
DEST_DEV sent Imm-ACK

Do Nothing, monitor if
DEST_DEV crash.

Forward the data to
the router node

Algorithm (3)
[Route calculation]
• Most wireless networks today employ a multirate PHY (e.g., UWB in 802.15.3a) that
supports a set of data rate dependent
modulation/coding parameters.
• Due to the extremely low power consumption
requirement of WPAN devices, the achievable
data rate drops dramatically when the
distance increases.
• The data rate can be modeled as a discrete
function of transmission distance d between
two DEVs:

Algorithm (3)
Rate ( d )  S i ;
R i  1  d  R i ;1  i  m
where, R m

1

 0 , R i is the transmiss

and S 1 and S m are the minimum

ion range of rate S i ;

and maximum

data

rates, respective ly. If d is greater th an R 1, then Rate(d)
and the DEVs have no connectivi

ty

0

Algorithm (4)
• Since the PNC can monitor all commands exchanged
during the CAP, it can learn the data rates between
reachable DEV pairs and store them in an n x n rate
matrix (RM), where
• n is the total number of DEVs within the piconet. DEV
is assigned a unique DEV_ID in the piconet
RM ij is the link rate based on the current informatio
obtained

from the commands

DEV i and DEV j . RM

ij

exchanged

 0 if DEV i and DEV

are out of range or the rate informatio
not available

between

yet, and RM

ij

n is

  if i  j .

j

n

Algorithm (5)
• All DEVs transmit with the maximum
allowable power when sending data. Since the
wireless links are symmetric in nature, clearly
RMij = RMji.
• Based on the current rate information stored
in RM, for an unreachable pair DEVi and
DEVj, the PNC can determine the optimal
(two-hop) route that has the minimum
transmission time, i.e., the best route employs
DEVk for MAC layer forwarding, where k
minimizes:

Algorithm (6)
min(

1
RM



ik
k [ 0 , n  1 ]

1
RM

)
kj

• Alleviates the traffic load on the PNC
• Discovers a current optimal two-hop MAC layer
forwarding path given by existing rate information
without introducing any extra overhead
• If the connection is broken, the PNC can
immediately reroute the traffic to a current
optimal path, or terminate the connection by deallocating all corresponding CTAs.

Discussion
• Original case:
Causes
retransmission

• 3PHP: data sent via
2-hop route if
PNC_ID exists

Dest_ID

Dest_ID

• Normal Transmission (Imm_Ack)

• Normal Transmission (Imm_Ack)

XXX FRAME LOST XXXX

PNC_ID

• Causes retransmission

• Sent Via 2–hop route (Imm_Ack)

PNC

Src_DEV
PNC Info. Request command

Probe Request Command

BIFS
Imm-ACK
SIFS

PNC Information command with Route Info.

Imm-ACK

RIFS

Dest_DEV

SIFS

3PHP-Node

DEV – 1

DEV - 2

PNC

Observations
• With 3PHP, peer discovery requires only one
round of frame exchange.
• Fully utilized the broadcast nature,
centralized control, ad-hoc communication,
and efficient peer discovery.
• Save the futile back-off retransmission for
unreachable destination.
• Guaranteed full piconet connectivity. (no
network layer routing required)
• On demand routing
• More then BIFS waiting. (include RIFS) Conclusion

Performance Evaluations
[Intra-piconet no connection probability]
• Intra-piconet no
connection
probability

• Common Overlap
Area function
COLA(R, r, x):
Represent the
intersection of two
circles with radii R
and r (r e R),
respectively, which
centers are
separated by
distance x

Performance Evaluations (2)
[Intra-piconet no connection probability]

Performance Evaluations (3)
[Intra-piconet no connection probability]
• The probability of no direct connection
between two DEVs in a piconet is

Performance Evaluations (4)
[Peer Discovery delay analysis]


# of Frame Transmission




Expected
Contention Time



Expected Packet
Delay

Performance Evaluations (5)
[Peer Discovery delay analysis]


Expected routing
failure probability

• Expected successful peer discovery
delays are given by

Simulation and Numerical Results
• No connection probability as a function of
coverage range ratio

Simulation and Numerical Results (2)
• Peer discovery delay vs. conditional
collision probability

Simulation and Numerical Results (3)
• Piconet peer discovery time vs. coverage
range ratio

Simulation and Numerical Results (4)
• Piconet peer discovery failure probability
with standard method

Simulation and Numerical Results (5)
• Two-hop forwarding route optimization
ratio vs. piconet radius

Simulation and Numerical Results (6)
• Expected data between directly unreachable
pairs in piconets with 20 DEVs

Conclusion
• Underlying fact: peer-to-peer data delivery in
802.15.3 WPANs
• Existing MAC layer peer discovery methods
cannot guarantee full connectivity between
DEVs within a piconet through direct peerto-peer connections if the piconet operates
with a radius larger than half of the
maximum transmission distance. (~ 41.3%)
• If Mac fails, use the expensive network layer
routing.

Conclusion (2)
• Used the central control topology
• Routing in 2-hop with single round of
control frame exchange
• 3PHP achieves 25– 37% faster peer
discovery time over the standard MAC
• Route optimization algorithm in the PNC
to provide the best MAC layer forwarding
routes by self-learning the available rate
information between DEVs.

References


IEEE Standard 802.15.3, “Wireless medium access control (MAC) and physical
layer (PHY) specifications for high rate wireless personal area networks
(WPANs),”Sept. 2003.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery in IEEE 802.15.3 WPANs,”in Proc. IEEE BroadNets2005, Boston, MA,
Oct. 2005.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery and Route Optimization in IEEE 802.15.3WPANs,”accepted for
publication in ACM/KluwerJ. Mobile Networks and Applications, Nov. 2005.



Z. Yin and V.C.M. Leung, “Connection Data Rate Optimization of IEEE 802.15.3
Scatternetswith Multi-rate Carriers,”IEEE ICC’06, Istanbul, Turkey, June 2006.



Zhanping Yin and Victor C.M. Leung, “Introduction to IEEE 802.15.3 High Rate
Wireless Personal Area Network (WPAN)”, Electrical and Computer Engineering
University of British Columbia

Thank You



Slide 18

Third-Party Handshake Protocol for
Efficient Peer Discovery
and Route Optimization in
IEEE 802.15.3 WPANs
Authors:
Zhanping Yin * Victor C. M. Leung
Published:
ACM/ MONET 2006
Presented by:
Gautam S. Thakur

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

WPAN
• A WPAN (wireless personal area network) is a
personal area network - a network for
interconnecting devices centered around an
individual person's workspace
• A very short range ~10 mtrs. E.g. Bluetooth
• Proposed operating frequencies are around
2.4 GHz in digital modes.
• The objective is to facilitate seamless

operation among home or business devices
and systems.

Ultra-Wideband
• A physical layer technology
• For, short distance communication with high
data rate and short transmission range.
• Lower power requirement and pulsed data
• UWB transmission over extremely wide
unlicensed radio spectrum  3.1 – 10.6 GHz.
• Over results in
– Less interference
– Wire-like performance for indoor wireless
environment.

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Overview of 802.15.3
• Why 802.15.3 ?
• The 802.15.3 Wireless Space
• 802.15.3 Overview and Components

Overview of 802.15.3
[Why 802.15.3 ?]
• Motivated by the increasing demand of wireless
communications with






Ubiquitous network connectivity
Low cost and low power consumption -> WPAN
High data rate(HDR)
Quality of Service(QoS) support
Comparison with other short to medium range wireless
technologies
• Wireless LAN (WLAN)
– High cost and power consumption, no hard QoS guarantee

• WPANs-Bluetooth (802.15.1) and ZigBee(802.15.4)
– Data rate too low

• Applications of 802.15.3
– Virtual wireless multimedia connectivity
• Video/audio distribution

– High speed data transfer

Overview of 802.15.3
[ 802.15.3 = Wireless Multimedia ]

Overview of 802.15.3
[ The 802 Wireless Space ]

IEEE 802.15.3 Overview
• High date rate and low
power
• Mainly works within a
piconet with dynamic
DEV membership
• Ad hoc topology with
centralized control by
the PNC
• Connection oriented
peer-to-peer
communications
• Support for multimedia
quality of service(QoS)
• Multiple power
management modes
• Security

Formation of an 802.15.3 piconet
• The basic component
is the DEV
– One DEV is required to
assume the role of the
piconet coordinator
(PNC) of the piconet.
– The PNC provides the
basic timing sync for the
piconet with the beacon.
– Additionally, the PNC
manages the quality of
service (QoS)
requirements, power
save modes and access
control to the piconet.

Formation of an 802.15.3 piconet (2)
• PNC supports ad
hoc peer-to-peer
connections
• PNC provides
timing for
synchronization of
DEVs within the
piconet, performs
admission control,
allocates network
resources etc

Formation of a Piconet (3)
• All DEVs within radio coverage of the PNC
can then associate with it to form a piconet.
• Then starts the peer discovery.
• Some DEV pairs in the piconet may be out of

range of each other, and as a result, direct
peer-to-peer connection is unavailable
between them. This results in network layer
discovery methods

Superframe format
• Timing and data transmissions in the piconet
are based on the superframe
• The superframe has three parts
– Beacon: Control information, Allocates CTA,
Synchronization
– Contention Access Period (CAP): via CSMA/CA, file xfer
– Channel Time Allocation Period (CTAP)

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Peer discovery and connectivity issue
• An 802.15.3 piconet supports ad hoc
communications between peer DEVs.
• Peer discovery is crucial to its operation.
• The DEVs shall be able to obtain information
about the services and capabilities of other
DEVs in the piconet at any time by
information discovery commands.
• Peer information is needed before a source
DEV can send any data to a destination DEV,
or generate channel time requests (CTRq) to
the PNC.

1
2

5

3

4

6

9

7

8

10

13

11

14

12

15

PNC

Src_DEV

Dest_DEV

PNC Info. Request command
SIFS
Imm-ACK

SIFS
PNC Information command
SIFS
Imm-ACK
SIFS

Probe Request Command
SIFS
Imm-ACK
SIFS
Probe Response Command
SIFS
Imm-ACK
RIFS

1. NOT receive the Imm-Ack
2. Cannot distinguish out-of-range
transmission and collision
3. Perform backoff retransmission
for collision repeatedly

DEV – 1

PNC

Dev 2 is outside the
range of Dev1 and
vise-versa

1. NOT receive Probe Request
command

DEV - 2

Existing Issues with IEEE 802.15.3











Peer discovery is crucial to piconet
operations.
Standard peer discovery is
unreliable and leads to substantial
delays for unreachable DEV pairs
Full piconet connectivity is not
guaranteed with only direct peerto-peer communications
The standard 802.15.3 MAC does
not take advantage of the unique
ranging capabilities enabled by
UWB
Connections are in peer-to-peer
manner without consider of
possible route optimizations
MAC modeling and performance
evaluation
Stream time scheduling methods
not defined in the standard





DEV_1 cannot communicate with
DEV_4 in peer-to-peer manner
For traffic between DEV_1 and
DEV_3, is it better to forward via
PNC than the direct connection?
What is the optimal path and data
rate between DEV_3 and DEV_5?

Using network layer routing
• Each hop request a
CTA slot seperately.
• PNC treat each hop as
independent traffic
stream

• Effect: Failure in an
intermediate hop
breaks the
connections, but PNC
assumes that an
independent stream is
terminated. Keeps
allocating CTAs for
other hops untill it is
eventually notified by
all participating DEV

Using MAC layer forwarding
• With explicit MAC
layer forwarding,
PNC knows that
these hops belongs
to one connection.
• Better adjusting
downstream and
upstream CTAs.

• Effect: reroute the
traffic is the
intermediate node
fails, and releasing
all CTAs if source
of destination
terminates.

Some Observations
• Peer discover is essential
to piconet operations
and communication
between DEVs
• Full piconet connectivity
cannot be guaranteed
• Some DEV pairs may be
out of range of each
other
• Mac layer routing fails
but is better then IP
routing.

• Remember, 802.15.3 has
centralized topology. So
what ??
• Using PNC, any devices
is two-hop count away
only.
• Can use the central
management capability
to discover simpler and
less costly MAC route

Proposed peer discovery protocol
with forwarding route optimization
• The PNC can always act as a first hop to
connect non-intersecting range DEVs
• However, a betterment can be done in the
frame forwarding by choosing another
DEV closer in distance to the source and
destination to forward the frame.
• All routes are limited to two hops only.

Algorithm
• If the Desti_DEV is reachable, sending PNC
Information Request and Response exchange is
redundant.
• So, Src_DEV send Probe Request command to the
Dest_DEV.
• If Dest_DEV receives the command, it returns an
Imm-ACK after a SIFS and then the Probe Response
command as in standard protocol operations.
• At the same time, the third party, i.e., the PNC, shall
actively monitor the frame exchange.
• Upon receiving a Probe Request, the PNC checks the
destination ID (Dest_ID) field in the MAC header.

Algorithm (2)
• If the Dest_ID is not associated in the piconet, the PNC
send an Imm-ACK to the Src_DEV after SIFS, followed
by a PNC Information command with an empty
Information Element (IE) to notify the source that
destination does not exist.
• Otherwise, instead of ignoring the Probe Request frame,
the PNC waits for the Imm-ACK from the destination
DEV.
• If no Imm-ACK arrives after a backoff inter-frame space
(BIFS), which is the sum of a SIFS and a clear channel
assessment detect time (CCADetectTime), the PNC
realizes that the destination DEV cannot hear the source.
• The PNC then immediately send an Imm-ACK to the
source, followed by a PNC Information command with
the route information. (an optimized route information in
sent)

SRC_DEV send Probe
Request command to
DEST_DEV & PNC listens

SIFS
Imm-ACK

Probe Response command

SIFS (Imm-ACK)

PNC also listen

DEST_DEV
hears?

YES

DEST_DEV
responds

No
No

DEST_DEV
ID
Present?

Yes, Timeout (BIFS)

Send Imm-ACK & route
information to source

Yes and
DEST_DEV sent Imm-ACK

Do Nothing, monitor if
DEST_DEV crash.

Forward the data to
the router node

Algorithm (3)
[Route calculation]
• Most wireless networks today employ a multirate PHY (e.g., UWB in 802.15.3a) that
supports a set of data rate dependent
modulation/coding parameters.
• Due to the extremely low power consumption
requirement of WPAN devices, the achievable
data rate drops dramatically when the
distance increases.
• The data rate can be modeled as a discrete
function of transmission distance d between
two DEVs:

Algorithm (3)
Rate ( d )  S i ;
R i  1  d  R i ;1  i  m
where, R m

1

 0 , R i is the transmiss

and S 1 and S m are the minimum

ion range of rate S i ;

and maximum

data

rates, respective ly. If d is greater th an R 1, then Rate(d)
and the DEVs have no connectivi

ty

0

Algorithm (4)
• Since the PNC can monitor all commands exchanged
during the CAP, it can learn the data rates between
reachable DEV pairs and store them in an n x n rate
matrix (RM), where
• n is the total number of DEVs within the piconet. DEV
is assigned a unique DEV_ID in the piconet
RM ij is the link rate based on the current informatio
obtained

from the commands

DEV i and DEV j . RM

ij

exchanged

 0 if DEV i and DEV

are out of range or the rate informatio
not available

between

yet, and RM

ij

n is

  if i  j .

j

n

Algorithm (5)
• All DEVs transmit with the maximum
allowable power when sending data. Since the
wireless links are symmetric in nature, clearly
RMij = RMji.
• Based on the current rate information stored
in RM, for an unreachable pair DEVi and
DEVj, the PNC can determine the optimal
(two-hop) route that has the minimum
transmission time, i.e., the best route employs
DEVk for MAC layer forwarding, where k
minimizes:

Algorithm (6)
min(

1
RM



ik
k [ 0 , n  1 ]

1
RM

)
kj

• Alleviates the traffic load on the PNC
• Discovers a current optimal two-hop MAC layer
forwarding path given by existing rate information
without introducing any extra overhead
• If the connection is broken, the PNC can
immediately reroute the traffic to a current
optimal path, or terminate the connection by deallocating all corresponding CTAs.

Discussion
• Original case:
Causes
retransmission

• 3PHP: data sent via
2-hop route if
PNC_ID exists

Dest_ID

Dest_ID

• Normal Transmission (Imm_Ack)

• Normal Transmission (Imm_Ack)

XXX FRAME LOST XXXX

PNC_ID

• Causes retransmission

• Sent Via 2–hop route (Imm_Ack)

PNC

Src_DEV
PNC Info. Request command

Probe Request Command

BIFS
Imm-ACK
SIFS

PNC Information command with Route Info.

Imm-ACK

RIFS

Dest_DEV

SIFS

3PHP-Node

DEV – 1

DEV - 2

PNC

Observations
• With 3PHP, peer discovery requires only one
round of frame exchange.
• Fully utilized the broadcast nature,
centralized control, ad-hoc communication,
and efficient peer discovery.
• Save the futile back-off retransmission for
unreachable destination.
• Guaranteed full piconet connectivity. (no
network layer routing required)
• On demand routing
• More then BIFS waiting. (include RIFS) Conclusion

Performance Evaluations
[Intra-piconet no connection probability]
• Intra-piconet no
connection
probability

• Common Overlap
Area function
COLA(R, r, x):
Represent the
intersection of two
circles with radii R
and r (r e R),
respectively, which
centers are
separated by
distance x

Performance Evaluations (2)
[Intra-piconet no connection probability]

Performance Evaluations (3)
[Intra-piconet no connection probability]
• The probability of no direct connection
between two DEVs in a piconet is

Performance Evaluations (4)
[Peer Discovery delay analysis]


# of Frame Transmission




Expected
Contention Time



Expected Packet
Delay

Performance Evaluations (5)
[Peer Discovery delay analysis]


Expected routing
failure probability

• Expected successful peer discovery
delays are given by

Simulation and Numerical Results
• No connection probability as a function of
coverage range ratio

Simulation and Numerical Results (2)
• Peer discovery delay vs. conditional
collision probability

Simulation and Numerical Results (3)
• Piconet peer discovery time vs. coverage
range ratio

Simulation and Numerical Results (4)
• Piconet peer discovery failure probability
with standard method

Simulation and Numerical Results (5)
• Two-hop forwarding route optimization
ratio vs. piconet radius

Simulation and Numerical Results (6)
• Expected data between directly unreachable
pairs in piconets with 20 DEVs

Conclusion
• Underlying fact: peer-to-peer data delivery in
802.15.3 WPANs
• Existing MAC layer peer discovery methods
cannot guarantee full connectivity between
DEVs within a piconet through direct peerto-peer connections if the piconet operates
with a radius larger than half of the
maximum transmission distance. (~ 41.3%)
• If Mac fails, use the expensive network layer
routing.

Conclusion (2)
• Used the central control topology
• Routing in 2-hop with single round of
control frame exchange
• 3PHP achieves 25– 37% faster peer
discovery time over the standard MAC
• Route optimization algorithm in the PNC
to provide the best MAC layer forwarding
routes by self-learning the available rate
information between DEVs.

References


IEEE Standard 802.15.3, “Wireless medium access control (MAC) and physical
layer (PHY) specifications for high rate wireless personal area networks
(WPANs),”Sept. 2003.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery in IEEE 802.15.3 WPANs,”in Proc. IEEE BroadNets2005, Boston, MA,
Oct. 2005.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery and Route Optimization in IEEE 802.15.3WPANs,”accepted for
publication in ACM/KluwerJ. Mobile Networks and Applications, Nov. 2005.



Z. Yin and V.C.M. Leung, “Connection Data Rate Optimization of IEEE 802.15.3
Scatternetswith Multi-rate Carriers,”IEEE ICC’06, Istanbul, Turkey, June 2006.



Zhanping Yin and Victor C.M. Leung, “Introduction to IEEE 802.15.3 High Rate
Wireless Personal Area Network (WPAN)”, Electrical and Computer Engineering
University of British Columbia

Thank You



Slide 19

Third-Party Handshake Protocol for
Efficient Peer Discovery
and Route Optimization in
IEEE 802.15.3 WPANs
Authors:
Zhanping Yin * Victor C. M. Leung
Published:
ACM/ MONET 2006
Presented by:
Gautam S. Thakur

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

WPAN
• A WPAN (wireless personal area network) is a
personal area network - a network for
interconnecting devices centered around an
individual person's workspace
• A very short range ~10 mtrs. E.g. Bluetooth
• Proposed operating frequencies are around
2.4 GHz in digital modes.
• The objective is to facilitate seamless

operation among home or business devices
and systems.

Ultra-Wideband
• A physical layer technology
• For, short distance communication with high
data rate and short transmission range.
• Lower power requirement and pulsed data
• UWB transmission over extremely wide
unlicensed radio spectrum  3.1 – 10.6 GHz.
• Over results in
– Less interference
– Wire-like performance for indoor wireless
environment.

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Overview of 802.15.3
• Why 802.15.3 ?
• The 802.15.3 Wireless Space
• 802.15.3 Overview and Components

Overview of 802.15.3
[Why 802.15.3 ?]
• Motivated by the increasing demand of wireless
communications with






Ubiquitous network connectivity
Low cost and low power consumption -> WPAN
High data rate(HDR)
Quality of Service(QoS) support
Comparison with other short to medium range wireless
technologies
• Wireless LAN (WLAN)
– High cost and power consumption, no hard QoS guarantee

• WPANs-Bluetooth (802.15.1) and ZigBee(802.15.4)
– Data rate too low

• Applications of 802.15.3
– Virtual wireless multimedia connectivity
• Video/audio distribution

– High speed data transfer

Overview of 802.15.3
[ 802.15.3 = Wireless Multimedia ]

Overview of 802.15.3
[ The 802 Wireless Space ]

IEEE 802.15.3 Overview
• High date rate and low
power
• Mainly works within a
piconet with dynamic
DEV membership
• Ad hoc topology with
centralized control by
the PNC
• Connection oriented
peer-to-peer
communications
• Support for multimedia
quality of service(QoS)
• Multiple power
management modes
• Security

Formation of an 802.15.3 piconet
• The basic component
is the DEV
– One DEV is required to
assume the role of the
piconet coordinator
(PNC) of the piconet.
– The PNC provides the
basic timing sync for the
piconet with the beacon.
– Additionally, the PNC
manages the quality of
service (QoS)
requirements, power
save modes and access
control to the piconet.

Formation of an 802.15.3 piconet (2)
• PNC supports ad
hoc peer-to-peer
connections
• PNC provides
timing for
synchronization of
DEVs within the
piconet, performs
admission control,
allocates network
resources etc

Formation of a Piconet (3)
• All DEVs within radio coverage of the PNC
can then associate with it to form a piconet.
• Then starts the peer discovery.
• Some DEV pairs in the piconet may be out of

range of each other, and as a result, direct
peer-to-peer connection is unavailable
between them. This results in network layer
discovery methods

Superframe format
• Timing and data transmissions in the piconet
are based on the superframe
• The superframe has three parts
– Beacon: Control information, Allocates CTA,
Synchronization
– Contention Access Period (CAP): via CSMA/CA, file xfer
– Channel Time Allocation Period (CTAP)

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Peer discovery and connectivity issue
• An 802.15.3 piconet supports ad hoc
communications between peer DEVs.
• Peer discovery is crucial to its operation.
• The DEVs shall be able to obtain information
about the services and capabilities of other
DEVs in the piconet at any time by
information discovery commands.
• Peer information is needed before a source
DEV can send any data to a destination DEV,
or generate channel time requests (CTRq) to
the PNC.

1
2

5

3

4

6

9

7

8

10

13

11

14

12

15

PNC

Src_DEV

Dest_DEV

PNC Info. Request command
SIFS
Imm-ACK

SIFS
PNC Information command
SIFS
Imm-ACK
SIFS

Probe Request Command
SIFS
Imm-ACK
SIFS
Probe Response Command
SIFS
Imm-ACK
RIFS

1. NOT receive the Imm-Ack
2. Cannot distinguish out-of-range
transmission and collision
3. Perform backoff retransmission
for collision repeatedly

DEV – 1

PNC

Dev 2 is outside the
range of Dev1 and
vise-versa

1. NOT receive Probe Request
command

DEV - 2

Existing Issues with IEEE 802.15.3











Peer discovery is crucial to piconet
operations.
Standard peer discovery is
unreliable and leads to substantial
delays for unreachable DEV pairs
Full piconet connectivity is not
guaranteed with only direct peerto-peer communications
The standard 802.15.3 MAC does
not take advantage of the unique
ranging capabilities enabled by
UWB
Connections are in peer-to-peer
manner without consider of
possible route optimizations
MAC modeling and performance
evaluation
Stream time scheduling methods
not defined in the standard





DEV_1 cannot communicate with
DEV_4 in peer-to-peer manner
For traffic between DEV_1 and
DEV_3, is it better to forward via
PNC than the direct connection?
What is the optimal path and data
rate between DEV_3 and DEV_5?

Using network layer routing
• Each hop request a
CTA slot seperately.
• PNC treat each hop as
independent traffic
stream

• Effect: Failure in an
intermediate hop
breaks the
connections, but PNC
assumes that an
independent stream is
terminated. Keeps
allocating CTAs for
other hops untill it is
eventually notified by
all participating DEV

Using MAC layer forwarding
• With explicit MAC
layer forwarding,
PNC knows that
these hops belongs
to one connection.
• Better adjusting
downstream and
upstream CTAs.

• Effect: reroute the
traffic is the
intermediate node
fails, and releasing
all CTAs if source
of destination
terminates.

Some Observations
• Peer discover is essential
to piconet operations
and communication
between DEVs
• Full piconet connectivity
cannot be guaranteed
• Some DEV pairs may be
out of range of each
other
• Mac layer routing fails
but is better then IP
routing.

• Remember, 802.15.3 has
centralized topology. So
what ??
• Using PNC, any devices
is two-hop count away
only.
• Can use the central
management capability
to discover simpler and
less costly MAC route

Proposed peer discovery protocol
with forwarding route optimization
• The PNC can always act as a first hop to
connect non-intersecting range DEVs
• However, a betterment can be done in the
frame forwarding by choosing another
DEV closer in distance to the source and
destination to forward the frame.
• All routes are limited to two hops only.

Algorithm
• If the Desti_DEV is reachable, sending PNC
Information Request and Response exchange is
redundant.
• So, Src_DEV send Probe Request command to the
Dest_DEV.
• If Dest_DEV receives the command, it returns an
Imm-ACK after a SIFS and then the Probe Response
command as in standard protocol operations.
• At the same time, the third party, i.e., the PNC, shall
actively monitor the frame exchange.
• Upon receiving a Probe Request, the PNC checks the
destination ID (Dest_ID) field in the MAC header.

Algorithm (2)
• If the Dest_ID is not associated in the piconet, the PNC
send an Imm-ACK to the Src_DEV after SIFS, followed
by a PNC Information command with an empty
Information Element (IE) to notify the source that
destination does not exist.
• Otherwise, instead of ignoring the Probe Request frame,
the PNC waits for the Imm-ACK from the destination
DEV.
• If no Imm-ACK arrives after a backoff inter-frame space
(BIFS), which is the sum of a SIFS and a clear channel
assessment detect time (CCADetectTime), the PNC
realizes that the destination DEV cannot hear the source.
• The PNC then immediately send an Imm-ACK to the
source, followed by a PNC Information command with
the route information. (an optimized route information in
sent)

SRC_DEV send Probe
Request command to
DEST_DEV & PNC listens

SIFS
Imm-ACK

Probe Response command

SIFS (Imm-ACK)

PNC also listen

DEST_DEV
hears?

YES

DEST_DEV
responds

No
No

DEST_DEV
ID
Present?

Yes, Timeout (BIFS)

Send Imm-ACK & route
information to source

Yes and
DEST_DEV sent Imm-ACK

Do Nothing, monitor if
DEST_DEV crash.

Forward the data to
the router node

Algorithm (3)
[Route calculation]
• Most wireless networks today employ a multirate PHY (e.g., UWB in 802.15.3a) that
supports a set of data rate dependent
modulation/coding parameters.
• Due to the extremely low power consumption
requirement of WPAN devices, the achievable
data rate drops dramatically when the
distance increases.
• The data rate can be modeled as a discrete
function of transmission distance d between
two DEVs:

Algorithm (3)
Rate ( d )  S i ;
R i  1  d  R i ;1  i  m
where, R m

1

 0 , R i is the transmiss

and S 1 and S m are the minimum

ion range of rate S i ;

and maximum

data

rates, respective ly. If d is greater th an R 1, then Rate(d)
and the DEVs have no connectivi

ty

0

Algorithm (4)
• Since the PNC can monitor all commands exchanged
during the CAP, it can learn the data rates between
reachable DEV pairs and store them in an n x n rate
matrix (RM), where
• n is the total number of DEVs within the piconet. DEV
is assigned a unique DEV_ID in the piconet
RM ij is the link rate based on the current informatio
obtained

from the commands

DEV i and DEV j . RM

ij

exchanged

 0 if DEV i and DEV

are out of range or the rate informatio
not available

between

yet, and RM

ij

n is

  if i  j .

j

n

Algorithm (5)
• All DEVs transmit with the maximum
allowable power when sending data. Since the
wireless links are symmetric in nature, clearly
RMij = RMji.
• Based on the current rate information stored
in RM, for an unreachable pair DEVi and
DEVj, the PNC can determine the optimal
(two-hop) route that has the minimum
transmission time, i.e., the best route employs
DEVk for MAC layer forwarding, where k
minimizes:

Algorithm (6)
min(

1
RM



ik
k [ 0 , n  1 ]

1
RM

)
kj

• Alleviates the traffic load on the PNC
• Discovers a current optimal two-hop MAC layer
forwarding path given by existing rate information
without introducing any extra overhead
• If the connection is broken, the PNC can
immediately reroute the traffic to a current
optimal path, or terminate the connection by deallocating all corresponding CTAs.

Discussion
• Original case:
Causes
retransmission

• 3PHP: data sent via
2-hop route if
PNC_ID exists

Dest_ID

Dest_ID

• Normal Transmission (Imm_Ack)

• Normal Transmission (Imm_Ack)

XXX FRAME LOST XXXX

PNC_ID

• Causes retransmission

• Sent Via 2–hop route (Imm_Ack)

PNC

Src_DEV
PNC Info. Request command

Probe Request Command

BIFS
Imm-ACK
SIFS

PNC Information command with Route Info.

Imm-ACK

RIFS

Dest_DEV

SIFS

3PHP-Node

DEV – 1

DEV - 2

PNC

Observations
• With 3PHP, peer discovery requires only one
round of frame exchange.
• Fully utilized the broadcast nature,
centralized control, ad-hoc communication,
and efficient peer discovery.
• Save the futile back-off retransmission for
unreachable destination.
• Guaranteed full piconet connectivity. (no
network layer routing required)
• On demand routing
• More then BIFS waiting. (include RIFS) Conclusion

Performance Evaluations
[Intra-piconet no connection probability]
• Intra-piconet no
connection
probability

• Common Overlap
Area function
COLA(R, r, x):
Represent the
intersection of two
circles with radii R
and r (r e R),
respectively, which
centers are
separated by
distance x

Performance Evaluations (2)
[Intra-piconet no connection probability]

Performance Evaluations (3)
[Intra-piconet no connection probability]
• The probability of no direct connection
between two DEVs in a piconet is

Performance Evaluations (4)
[Peer Discovery delay analysis]


# of Frame Transmission




Expected
Contention Time



Expected Packet
Delay

Performance Evaluations (5)
[Peer Discovery delay analysis]


Expected routing
failure probability

• Expected successful peer discovery
delays are given by

Simulation and Numerical Results
• No connection probability as a function of
coverage range ratio

Simulation and Numerical Results (2)
• Peer discovery delay vs. conditional
collision probability

Simulation and Numerical Results (3)
• Piconet peer discovery time vs. coverage
range ratio

Simulation and Numerical Results (4)
• Piconet peer discovery failure probability
with standard method

Simulation and Numerical Results (5)
• Two-hop forwarding route optimization
ratio vs. piconet radius

Simulation and Numerical Results (6)
• Expected data between directly unreachable
pairs in piconets with 20 DEVs

Conclusion
• Underlying fact: peer-to-peer data delivery in
802.15.3 WPANs
• Existing MAC layer peer discovery methods
cannot guarantee full connectivity between
DEVs within a piconet through direct peerto-peer connections if the piconet operates
with a radius larger than half of the
maximum transmission distance. (~ 41.3%)
• If Mac fails, use the expensive network layer
routing.

Conclusion (2)
• Used the central control topology
• Routing in 2-hop with single round of
control frame exchange
• 3PHP achieves 25– 37% faster peer
discovery time over the standard MAC
• Route optimization algorithm in the PNC
to provide the best MAC layer forwarding
routes by self-learning the available rate
information between DEVs.

References


IEEE Standard 802.15.3, “Wireless medium access control (MAC) and physical
layer (PHY) specifications for high rate wireless personal area networks
(WPANs),”Sept. 2003.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery in IEEE 802.15.3 WPANs,”in Proc. IEEE BroadNets2005, Boston, MA,
Oct. 2005.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery and Route Optimization in IEEE 802.15.3WPANs,”accepted for
publication in ACM/KluwerJ. Mobile Networks and Applications, Nov. 2005.



Z. Yin and V.C.M. Leung, “Connection Data Rate Optimization of IEEE 802.15.3
Scatternetswith Multi-rate Carriers,”IEEE ICC’06, Istanbul, Turkey, June 2006.



Zhanping Yin and Victor C.M. Leung, “Introduction to IEEE 802.15.3 High Rate
Wireless Personal Area Network (WPAN)”, Electrical and Computer Engineering
University of British Columbia

Thank You



Slide 20

Third-Party Handshake Protocol for
Efficient Peer Discovery
and Route Optimization in
IEEE 802.15.3 WPANs
Authors:
Zhanping Yin * Victor C. M. Leung
Published:
ACM/ MONET 2006
Presented by:
Gautam S. Thakur

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

WPAN
• A WPAN (wireless personal area network) is a
personal area network - a network for
interconnecting devices centered around an
individual person's workspace
• A very short range ~10 mtrs. E.g. Bluetooth
• Proposed operating frequencies are around
2.4 GHz in digital modes.
• The objective is to facilitate seamless

operation among home or business devices
and systems.

Ultra-Wideband
• A physical layer technology
• For, short distance communication with high
data rate and short transmission range.
• Lower power requirement and pulsed data
• UWB transmission over extremely wide
unlicensed radio spectrum  3.1 – 10.6 GHz.
• Over results in
– Less interference
– Wire-like performance for indoor wireless
environment.

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Overview of 802.15.3
• Why 802.15.3 ?
• The 802.15.3 Wireless Space
• 802.15.3 Overview and Components

Overview of 802.15.3
[Why 802.15.3 ?]
• Motivated by the increasing demand of wireless
communications with






Ubiquitous network connectivity
Low cost and low power consumption -> WPAN
High data rate(HDR)
Quality of Service(QoS) support
Comparison with other short to medium range wireless
technologies
• Wireless LAN (WLAN)
– High cost and power consumption, no hard QoS guarantee

• WPANs-Bluetooth (802.15.1) and ZigBee(802.15.4)
– Data rate too low

• Applications of 802.15.3
– Virtual wireless multimedia connectivity
• Video/audio distribution

– High speed data transfer

Overview of 802.15.3
[ 802.15.3 = Wireless Multimedia ]

Overview of 802.15.3
[ The 802 Wireless Space ]

IEEE 802.15.3 Overview
• High date rate and low
power
• Mainly works within a
piconet with dynamic
DEV membership
• Ad hoc topology with
centralized control by
the PNC
• Connection oriented
peer-to-peer
communications
• Support for multimedia
quality of service(QoS)
• Multiple power
management modes
• Security

Formation of an 802.15.3 piconet
• The basic component
is the DEV
– One DEV is required to
assume the role of the
piconet coordinator
(PNC) of the piconet.
– The PNC provides the
basic timing sync for the
piconet with the beacon.
– Additionally, the PNC
manages the quality of
service (QoS)
requirements, power
save modes and access
control to the piconet.

Formation of an 802.15.3 piconet (2)
• PNC supports ad
hoc peer-to-peer
connections
• PNC provides
timing for
synchronization of
DEVs within the
piconet, performs
admission control,
allocates network
resources etc

Formation of a Piconet (3)
• All DEVs within radio coverage of the PNC
can then associate with it to form a piconet.
• Then starts the peer discovery.
• Some DEV pairs in the piconet may be out of

range of each other, and as a result, direct
peer-to-peer connection is unavailable
between them. This results in network layer
discovery methods

Superframe format
• Timing and data transmissions in the piconet
are based on the superframe
• The superframe has three parts
– Beacon: Control information, Allocates CTA,
Synchronization
– Contention Access Period (CAP): via CSMA/CA, file xfer
– Channel Time Allocation Period (CTAP)

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Peer discovery and connectivity issue
• An 802.15.3 piconet supports ad hoc
communications between peer DEVs.
• Peer discovery is crucial to its operation.
• The DEVs shall be able to obtain information
about the services and capabilities of other
DEVs in the piconet at any time by
information discovery commands.
• Peer information is needed before a source
DEV can send any data to a destination DEV,
or generate channel time requests (CTRq) to
the PNC.

1
2

5

3

4

6

9

7

8

10

13

11

14

12

15

PNC

Src_DEV

Dest_DEV

PNC Info. Request command
SIFS
Imm-ACK

SIFS
PNC Information command
SIFS
Imm-ACK
SIFS

Probe Request Command
SIFS
Imm-ACK
SIFS
Probe Response Command
SIFS
Imm-ACK
RIFS

1. NOT receive the Imm-Ack
2. Cannot distinguish out-of-range
transmission and collision
3. Perform backoff retransmission
for collision repeatedly

DEV – 1

PNC

Dev 2 is outside the
range of Dev1 and
vise-versa

1. NOT receive Probe Request
command

DEV - 2

Existing Issues with IEEE 802.15.3











Peer discovery is crucial to piconet
operations.
Standard peer discovery is
unreliable and leads to substantial
delays for unreachable DEV pairs
Full piconet connectivity is not
guaranteed with only direct peerto-peer communications
The standard 802.15.3 MAC does
not take advantage of the unique
ranging capabilities enabled by
UWB
Connections are in peer-to-peer
manner without consider of
possible route optimizations
MAC modeling and performance
evaluation
Stream time scheduling methods
not defined in the standard





DEV_1 cannot communicate with
DEV_4 in peer-to-peer manner
For traffic between DEV_1 and
DEV_3, is it better to forward via
PNC than the direct connection?
What is the optimal path and data
rate between DEV_3 and DEV_5?

Using network layer routing
• Each hop request a
CTA slot seperately.
• PNC treat each hop as
independent traffic
stream

• Effect: Failure in an
intermediate hop
breaks the
connections, but PNC
assumes that an
independent stream is
terminated. Keeps
allocating CTAs for
other hops untill it is
eventually notified by
all participating DEV

Using MAC layer forwarding
• With explicit MAC
layer forwarding,
PNC knows that
these hops belongs
to one connection.
• Better adjusting
downstream and
upstream CTAs.

• Effect: reroute the
traffic is the
intermediate node
fails, and releasing
all CTAs if source
of destination
terminates.

Some Observations
• Peer discover is essential
to piconet operations
and communication
between DEVs
• Full piconet connectivity
cannot be guaranteed
• Some DEV pairs may be
out of range of each
other
• Mac layer routing fails
but is better then IP
routing.

• Remember, 802.15.3 has
centralized topology. So
what ??
• Using PNC, any devices
is two-hop count away
only.
• Can use the central
management capability
to discover simpler and
less costly MAC route

Proposed peer discovery protocol
with forwarding route optimization
• The PNC can always act as a first hop to
connect non-intersecting range DEVs
• However, a betterment can be done in the
frame forwarding by choosing another
DEV closer in distance to the source and
destination to forward the frame.
• All routes are limited to two hops only.

Algorithm
• If the Desti_DEV is reachable, sending PNC
Information Request and Response exchange is
redundant.
• So, Src_DEV send Probe Request command to the
Dest_DEV.
• If Dest_DEV receives the command, it returns an
Imm-ACK after a SIFS and then the Probe Response
command as in standard protocol operations.
• At the same time, the third party, i.e., the PNC, shall
actively monitor the frame exchange.
• Upon receiving a Probe Request, the PNC checks the
destination ID (Dest_ID) field in the MAC header.

Algorithm (2)
• If the Dest_ID is not associated in the piconet, the PNC
send an Imm-ACK to the Src_DEV after SIFS, followed
by a PNC Information command with an empty
Information Element (IE) to notify the source that
destination does not exist.
• Otherwise, instead of ignoring the Probe Request frame,
the PNC waits for the Imm-ACK from the destination
DEV.
• If no Imm-ACK arrives after a backoff inter-frame space
(BIFS), which is the sum of a SIFS and a clear channel
assessment detect time (CCADetectTime), the PNC
realizes that the destination DEV cannot hear the source.
• The PNC then immediately send an Imm-ACK to the
source, followed by a PNC Information command with
the route information. (an optimized route information in
sent)

SRC_DEV send Probe
Request command to
DEST_DEV & PNC listens

SIFS
Imm-ACK

Probe Response command

SIFS (Imm-ACK)

PNC also listen

DEST_DEV
hears?

YES

DEST_DEV
responds

No
No

DEST_DEV
ID
Present?

Yes, Timeout (BIFS)

Send Imm-ACK & route
information to source

Yes and
DEST_DEV sent Imm-ACK

Do Nothing, monitor if
DEST_DEV crash.

Forward the data to
the router node

Algorithm (3)
[Route calculation]
• Most wireless networks today employ a multirate PHY (e.g., UWB in 802.15.3a) that
supports a set of data rate dependent
modulation/coding parameters.
• Due to the extremely low power consumption
requirement of WPAN devices, the achievable
data rate drops dramatically when the
distance increases.
• The data rate can be modeled as a discrete
function of transmission distance d between
two DEVs:

Algorithm (3)
Rate ( d )  S i ;
R i  1  d  R i ;1  i  m
where, R m

1

 0 , R i is the transmiss

and S 1 and S m are the minimum

ion range of rate S i ;

and maximum

data

rates, respective ly. If d is greater th an R 1, then Rate(d)
and the DEVs have no connectivi

ty

0

Algorithm (4)
• Since the PNC can monitor all commands exchanged
during the CAP, it can learn the data rates between
reachable DEV pairs and store them in an n x n rate
matrix (RM), where
• n is the total number of DEVs within the piconet. DEV
is assigned a unique DEV_ID in the piconet
RM ij is the link rate based on the current informatio
obtained

from the commands

DEV i and DEV j . RM

ij

exchanged

 0 if DEV i and DEV

are out of range or the rate informatio
not available

between

yet, and RM

ij

n is

  if i  j .

j

n

Algorithm (5)
• All DEVs transmit with the maximum
allowable power when sending data. Since the
wireless links are symmetric in nature, clearly
RMij = RMji.
• Based on the current rate information stored
in RM, for an unreachable pair DEVi and
DEVj, the PNC can determine the optimal
(two-hop) route that has the minimum
transmission time, i.e., the best route employs
DEVk for MAC layer forwarding, where k
minimizes:

Algorithm (6)
min(

1
RM



ik
k [ 0 , n  1 ]

1
RM

)
kj

• Alleviates the traffic load on the PNC
• Discovers a current optimal two-hop MAC layer
forwarding path given by existing rate information
without introducing any extra overhead
• If the connection is broken, the PNC can
immediately reroute the traffic to a current
optimal path, or terminate the connection by deallocating all corresponding CTAs.

Discussion
• Original case:
Causes
retransmission

• 3PHP: data sent via
2-hop route if
PNC_ID exists

Dest_ID

Dest_ID

• Normal Transmission (Imm_Ack)

• Normal Transmission (Imm_Ack)

XXX FRAME LOST XXXX

PNC_ID

• Causes retransmission

• Sent Via 2–hop route (Imm_Ack)

PNC

Src_DEV
PNC Info. Request command

Probe Request Command

BIFS
Imm-ACK
SIFS

PNC Information command with Route Info.

Imm-ACK

RIFS

Dest_DEV

SIFS

3PHP-Node

DEV – 1

DEV - 2

PNC

Observations
• With 3PHP, peer discovery requires only one
round of frame exchange.
• Fully utilized the broadcast nature,
centralized control, ad-hoc communication,
and efficient peer discovery.
• Save the futile back-off retransmission for
unreachable destination.
• Guaranteed full piconet connectivity. (no
network layer routing required)
• On demand routing
• More then BIFS waiting. (include RIFS) Conclusion

Performance Evaluations
[Intra-piconet no connection probability]
• Intra-piconet no
connection
probability

• Common Overlap
Area function
COLA(R, r, x):
Represent the
intersection of two
circles with radii R
and r (r e R),
respectively, which
centers are
separated by
distance x

Performance Evaluations (2)
[Intra-piconet no connection probability]

Performance Evaluations (3)
[Intra-piconet no connection probability]
• The probability of no direct connection
between two DEVs in a piconet is

Performance Evaluations (4)
[Peer Discovery delay analysis]


# of Frame Transmission




Expected
Contention Time



Expected Packet
Delay

Performance Evaluations (5)
[Peer Discovery delay analysis]


Expected routing
failure probability

• Expected successful peer discovery
delays are given by

Simulation and Numerical Results
• No connection probability as a function of
coverage range ratio

Simulation and Numerical Results (2)
• Peer discovery delay vs. conditional
collision probability

Simulation and Numerical Results (3)
• Piconet peer discovery time vs. coverage
range ratio

Simulation and Numerical Results (4)
• Piconet peer discovery failure probability
with standard method

Simulation and Numerical Results (5)
• Two-hop forwarding route optimization
ratio vs. piconet radius

Simulation and Numerical Results (6)
• Expected data between directly unreachable
pairs in piconets with 20 DEVs

Conclusion
• Underlying fact: peer-to-peer data delivery in
802.15.3 WPANs
• Existing MAC layer peer discovery methods
cannot guarantee full connectivity between
DEVs within a piconet through direct peerto-peer connections if the piconet operates
with a radius larger than half of the
maximum transmission distance. (~ 41.3%)
• If Mac fails, use the expensive network layer
routing.

Conclusion (2)
• Used the central control topology
• Routing in 2-hop with single round of
control frame exchange
• 3PHP achieves 25– 37% faster peer
discovery time over the standard MAC
• Route optimization algorithm in the PNC
to provide the best MAC layer forwarding
routes by self-learning the available rate
information between DEVs.

References


IEEE Standard 802.15.3, “Wireless medium access control (MAC) and physical
layer (PHY) specifications for high rate wireless personal area networks
(WPANs),”Sept. 2003.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery in IEEE 802.15.3 WPANs,”in Proc. IEEE BroadNets2005, Boston, MA,
Oct. 2005.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery and Route Optimization in IEEE 802.15.3WPANs,”accepted for
publication in ACM/KluwerJ. Mobile Networks and Applications, Nov. 2005.



Z. Yin and V.C.M. Leung, “Connection Data Rate Optimization of IEEE 802.15.3
Scatternetswith Multi-rate Carriers,”IEEE ICC’06, Istanbul, Turkey, June 2006.



Zhanping Yin and Victor C.M. Leung, “Introduction to IEEE 802.15.3 High Rate
Wireless Personal Area Network (WPAN)”, Electrical and Computer Engineering
University of British Columbia

Thank You



Slide 21

Third-Party Handshake Protocol for
Efficient Peer Discovery
and Route Optimization in
IEEE 802.15.3 WPANs
Authors:
Zhanping Yin * Victor C. M. Leung
Published:
ACM/ MONET 2006
Presented by:
Gautam S. Thakur

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

WPAN
• A WPAN (wireless personal area network) is a
personal area network - a network for
interconnecting devices centered around an
individual person's workspace
• A very short range ~10 mtrs. E.g. Bluetooth
• Proposed operating frequencies are around
2.4 GHz in digital modes.
• The objective is to facilitate seamless

operation among home or business devices
and systems.

Ultra-Wideband
• A physical layer technology
• For, short distance communication with high
data rate and short transmission range.
• Lower power requirement and pulsed data
• UWB transmission over extremely wide
unlicensed radio spectrum  3.1 – 10.6 GHz.
• Over results in
– Less interference
– Wire-like performance for indoor wireless
environment.

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Overview of 802.15.3
• Why 802.15.3 ?
• The 802.15.3 Wireless Space
• 802.15.3 Overview and Components

Overview of 802.15.3
[Why 802.15.3 ?]
• Motivated by the increasing demand of wireless
communications with






Ubiquitous network connectivity
Low cost and low power consumption -> WPAN
High data rate(HDR)
Quality of Service(QoS) support
Comparison with other short to medium range wireless
technologies
• Wireless LAN (WLAN)
– High cost and power consumption, no hard QoS guarantee

• WPANs-Bluetooth (802.15.1) and ZigBee(802.15.4)
– Data rate too low

• Applications of 802.15.3
– Virtual wireless multimedia connectivity
• Video/audio distribution

– High speed data transfer

Overview of 802.15.3
[ 802.15.3 = Wireless Multimedia ]

Overview of 802.15.3
[ The 802 Wireless Space ]

IEEE 802.15.3 Overview
• High date rate and low
power
• Mainly works within a
piconet with dynamic
DEV membership
• Ad hoc topology with
centralized control by
the PNC
• Connection oriented
peer-to-peer
communications
• Support for multimedia
quality of service(QoS)
• Multiple power
management modes
• Security

Formation of an 802.15.3 piconet
• The basic component
is the DEV
– One DEV is required to
assume the role of the
piconet coordinator
(PNC) of the piconet.
– The PNC provides the
basic timing sync for the
piconet with the beacon.
– Additionally, the PNC
manages the quality of
service (QoS)
requirements, power
save modes and access
control to the piconet.

Formation of an 802.15.3 piconet (2)
• PNC supports ad
hoc peer-to-peer
connections
• PNC provides
timing for
synchronization of
DEVs within the
piconet, performs
admission control,
allocates network
resources etc

Formation of a Piconet (3)
• All DEVs within radio coverage of the PNC
can then associate with it to form a piconet.
• Then starts the peer discovery.
• Some DEV pairs in the piconet may be out of

range of each other, and as a result, direct
peer-to-peer connection is unavailable
between them. This results in network layer
discovery methods

Superframe format
• Timing and data transmissions in the piconet
are based on the superframe
• The superframe has three parts
– Beacon: Control information, Allocates CTA,
Synchronization
– Contention Access Period (CAP): via CSMA/CA, file xfer
– Channel Time Allocation Period (CTAP)

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Peer discovery and connectivity issue
• An 802.15.3 piconet supports ad hoc
communications between peer DEVs.
• Peer discovery is crucial to its operation.
• The DEVs shall be able to obtain information
about the services and capabilities of other
DEVs in the piconet at any time by
information discovery commands.
• Peer information is needed before a source
DEV can send any data to a destination DEV,
or generate channel time requests (CTRq) to
the PNC.

1
2

5

3

4

6

9

7

8

10

13

11

14

12

15

PNC

Src_DEV

Dest_DEV

PNC Info. Request command
SIFS
Imm-ACK

SIFS
PNC Information command
SIFS
Imm-ACK
SIFS

Probe Request Command
SIFS
Imm-ACK
SIFS
Probe Response Command
SIFS
Imm-ACK
RIFS

1. NOT receive the Imm-Ack
2. Cannot distinguish out-of-range
transmission and collision
3. Perform backoff retransmission
for collision repeatedly

DEV – 1

PNC

Dev 2 is outside the
range of Dev1 and
vise-versa

1. NOT receive Probe Request
command

DEV - 2

Existing Issues with IEEE 802.15.3











Peer discovery is crucial to piconet
operations.
Standard peer discovery is
unreliable and leads to substantial
delays for unreachable DEV pairs
Full piconet connectivity is not
guaranteed with only direct peerto-peer communications
The standard 802.15.3 MAC does
not take advantage of the unique
ranging capabilities enabled by
UWB
Connections are in peer-to-peer
manner without consider of
possible route optimizations
MAC modeling and performance
evaluation
Stream time scheduling methods
not defined in the standard





DEV_1 cannot communicate with
DEV_4 in peer-to-peer manner
For traffic between DEV_1 and
DEV_3, is it better to forward via
PNC than the direct connection?
What is the optimal path and data
rate between DEV_3 and DEV_5?

Using network layer routing
• Each hop request a
CTA slot seperately.
• PNC treat each hop as
independent traffic
stream

• Effect: Failure in an
intermediate hop
breaks the
connections, but PNC
assumes that an
independent stream is
terminated. Keeps
allocating CTAs for
other hops untill it is
eventually notified by
all participating DEV

Using MAC layer forwarding
• With explicit MAC
layer forwarding,
PNC knows that
these hops belongs
to one connection.
• Better adjusting
downstream and
upstream CTAs.

• Effect: reroute the
traffic is the
intermediate node
fails, and releasing
all CTAs if source
of destination
terminates.

Some Observations
• Peer discover is essential
to piconet operations
and communication
between DEVs
• Full piconet connectivity
cannot be guaranteed
• Some DEV pairs may be
out of range of each
other
• Mac layer routing fails
but is better then IP
routing.

• Remember, 802.15.3 has
centralized topology. So
what ??
• Using PNC, any devices
is two-hop count away
only.
• Can use the central
management capability
to discover simpler and
less costly MAC route

Proposed peer discovery protocol
with forwarding route optimization
• The PNC can always act as a first hop to
connect non-intersecting range DEVs
• However, a betterment can be done in the
frame forwarding by choosing another
DEV closer in distance to the source and
destination to forward the frame.
• All routes are limited to two hops only.

Algorithm
• If the Desti_DEV is reachable, sending PNC
Information Request and Response exchange is
redundant.
• So, Src_DEV send Probe Request command to the
Dest_DEV.
• If Dest_DEV receives the command, it returns an
Imm-ACK after a SIFS and then the Probe Response
command as in standard protocol operations.
• At the same time, the third party, i.e., the PNC, shall
actively monitor the frame exchange.
• Upon receiving a Probe Request, the PNC checks the
destination ID (Dest_ID) field in the MAC header.

Algorithm (2)
• If the Dest_ID is not associated in the piconet, the PNC
send an Imm-ACK to the Src_DEV after SIFS, followed
by a PNC Information command with an empty
Information Element (IE) to notify the source that
destination does not exist.
• Otherwise, instead of ignoring the Probe Request frame,
the PNC waits for the Imm-ACK from the destination
DEV.
• If no Imm-ACK arrives after a backoff inter-frame space
(BIFS), which is the sum of a SIFS and a clear channel
assessment detect time (CCADetectTime), the PNC
realizes that the destination DEV cannot hear the source.
• The PNC then immediately send an Imm-ACK to the
source, followed by a PNC Information command with
the route information. (an optimized route information in
sent)

SRC_DEV send Probe
Request command to
DEST_DEV & PNC listens

SIFS
Imm-ACK

Probe Response command

SIFS (Imm-ACK)

PNC also listen

DEST_DEV
hears?

YES

DEST_DEV
responds

No
No

DEST_DEV
ID
Present?

Yes, Timeout (BIFS)

Send Imm-ACK & route
information to source

Yes and
DEST_DEV sent Imm-ACK

Do Nothing, monitor if
DEST_DEV crash.

Forward the data to
the router node

Algorithm (3)
[Route calculation]
• Most wireless networks today employ a multirate PHY (e.g., UWB in 802.15.3a) that
supports a set of data rate dependent
modulation/coding parameters.
• Due to the extremely low power consumption
requirement of WPAN devices, the achievable
data rate drops dramatically when the
distance increases.
• The data rate can be modeled as a discrete
function of transmission distance d between
two DEVs:

Algorithm (3)
Rate ( d )  S i ;
R i  1  d  R i ;1  i  m
where, R m

1

 0 , R i is the transmiss

and S 1 and S m are the minimum

ion range of rate S i ;

and maximum

data

rates, respective ly. If d is greater th an R 1, then Rate(d)
and the DEVs have no connectivi

ty

0

Algorithm (4)
• Since the PNC can monitor all commands exchanged
during the CAP, it can learn the data rates between
reachable DEV pairs and store them in an n x n rate
matrix (RM), where
• n is the total number of DEVs within the piconet. DEV
is assigned a unique DEV_ID in the piconet
RM ij is the link rate based on the current informatio
obtained

from the commands

DEV i and DEV j . RM

ij

exchanged

 0 if DEV i and DEV

are out of range or the rate informatio
not available

between

yet, and RM

ij

n is

  if i  j .

j

n

Algorithm (5)
• All DEVs transmit with the maximum
allowable power when sending data. Since the
wireless links are symmetric in nature, clearly
RMij = RMji.
• Based on the current rate information stored
in RM, for an unreachable pair DEVi and
DEVj, the PNC can determine the optimal
(two-hop) route that has the minimum
transmission time, i.e., the best route employs
DEVk for MAC layer forwarding, where k
minimizes:

Algorithm (6)
min(

1
RM



ik
k [ 0 , n  1 ]

1
RM

)
kj

• Alleviates the traffic load on the PNC
• Discovers a current optimal two-hop MAC layer
forwarding path given by existing rate information
without introducing any extra overhead
• If the connection is broken, the PNC can
immediately reroute the traffic to a current
optimal path, or terminate the connection by deallocating all corresponding CTAs.

Discussion
• Original case:
Causes
retransmission

• 3PHP: data sent via
2-hop route if
PNC_ID exists

Dest_ID

Dest_ID

• Normal Transmission (Imm_Ack)

• Normal Transmission (Imm_Ack)

XXX FRAME LOST XXXX

PNC_ID

• Causes retransmission

• Sent Via 2–hop route (Imm_Ack)

PNC

Src_DEV
PNC Info. Request command

Probe Request Command

BIFS
Imm-ACK
SIFS

PNC Information command with Route Info.

Imm-ACK

RIFS

Dest_DEV

SIFS

3PHP-Node

DEV – 1

DEV - 2

PNC

Observations
• With 3PHP, peer discovery requires only one
round of frame exchange.
• Fully utilized the broadcast nature,
centralized control, ad-hoc communication,
and efficient peer discovery.
• Save the futile back-off retransmission for
unreachable destination.
• Guaranteed full piconet connectivity. (no
network layer routing required)
• On demand routing
• More then BIFS waiting. (include RIFS) Conclusion

Performance Evaluations
[Intra-piconet no connection probability]
• Intra-piconet no
connection
probability

• Common Overlap
Area function
COLA(R, r, x):
Represent the
intersection of two
circles with radii R
and r (r e R),
respectively, which
centers are
separated by
distance x

Performance Evaluations (2)
[Intra-piconet no connection probability]

Performance Evaluations (3)
[Intra-piconet no connection probability]
• The probability of no direct connection
between two DEVs in a piconet is

Performance Evaluations (4)
[Peer Discovery delay analysis]


# of Frame Transmission




Expected
Contention Time



Expected Packet
Delay

Performance Evaluations (5)
[Peer Discovery delay analysis]


Expected routing
failure probability

• Expected successful peer discovery
delays are given by

Simulation and Numerical Results
• No connection probability as a function of
coverage range ratio

Simulation and Numerical Results (2)
• Peer discovery delay vs. conditional
collision probability

Simulation and Numerical Results (3)
• Piconet peer discovery time vs. coverage
range ratio

Simulation and Numerical Results (4)
• Piconet peer discovery failure probability
with standard method

Simulation and Numerical Results (5)
• Two-hop forwarding route optimization
ratio vs. piconet radius

Simulation and Numerical Results (6)
• Expected data between directly unreachable
pairs in piconets with 20 DEVs

Conclusion
• Underlying fact: peer-to-peer data delivery in
802.15.3 WPANs
• Existing MAC layer peer discovery methods
cannot guarantee full connectivity between
DEVs within a piconet through direct peerto-peer connections if the piconet operates
with a radius larger than half of the
maximum transmission distance. (~ 41.3%)
• If Mac fails, use the expensive network layer
routing.

Conclusion (2)
• Used the central control topology
• Routing in 2-hop with single round of
control frame exchange
• 3PHP achieves 25– 37% faster peer
discovery time over the standard MAC
• Route optimization algorithm in the PNC
to provide the best MAC layer forwarding
routes by self-learning the available rate
information between DEVs.

References


IEEE Standard 802.15.3, “Wireless medium access control (MAC) and physical
layer (PHY) specifications for high rate wireless personal area networks
(WPANs),”Sept. 2003.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery in IEEE 802.15.3 WPANs,”in Proc. IEEE BroadNets2005, Boston, MA,
Oct. 2005.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery and Route Optimization in IEEE 802.15.3WPANs,”accepted for
publication in ACM/KluwerJ. Mobile Networks and Applications, Nov. 2005.



Z. Yin and V.C.M. Leung, “Connection Data Rate Optimization of IEEE 802.15.3
Scatternetswith Multi-rate Carriers,”IEEE ICC’06, Istanbul, Turkey, June 2006.



Zhanping Yin and Victor C.M. Leung, “Introduction to IEEE 802.15.3 High Rate
Wireless Personal Area Network (WPAN)”, Electrical and Computer Engineering
University of British Columbia

Thank You



Slide 22

Third-Party Handshake Protocol for
Efficient Peer Discovery
and Route Optimization in
IEEE 802.15.3 WPANs
Authors:
Zhanping Yin * Victor C. M. Leung
Published:
ACM/ MONET 2006
Presented by:
Gautam S. Thakur

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

WPAN
• A WPAN (wireless personal area network) is a
personal area network - a network for
interconnecting devices centered around an
individual person's workspace
• A very short range ~10 mtrs. E.g. Bluetooth
• Proposed operating frequencies are around
2.4 GHz in digital modes.
• The objective is to facilitate seamless

operation among home or business devices
and systems.

Ultra-Wideband
• A physical layer technology
• For, short distance communication with high
data rate and short transmission range.
• Lower power requirement and pulsed data
• UWB transmission over extremely wide
unlicensed radio spectrum  3.1 – 10.6 GHz.
• Over results in
– Less interference
– Wire-like performance for indoor wireless
environment.

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Overview of 802.15.3
• Why 802.15.3 ?
• The 802.15.3 Wireless Space
• 802.15.3 Overview and Components

Overview of 802.15.3
[Why 802.15.3 ?]
• Motivated by the increasing demand of wireless
communications with






Ubiquitous network connectivity
Low cost and low power consumption -> WPAN
High data rate(HDR)
Quality of Service(QoS) support
Comparison with other short to medium range wireless
technologies
• Wireless LAN (WLAN)
– High cost and power consumption, no hard QoS guarantee

• WPANs-Bluetooth (802.15.1) and ZigBee(802.15.4)
– Data rate too low

• Applications of 802.15.3
– Virtual wireless multimedia connectivity
• Video/audio distribution

– High speed data transfer

Overview of 802.15.3
[ 802.15.3 = Wireless Multimedia ]

Overview of 802.15.3
[ The 802 Wireless Space ]

IEEE 802.15.3 Overview
• High date rate and low
power
• Mainly works within a
piconet with dynamic
DEV membership
• Ad hoc topology with
centralized control by
the PNC
• Connection oriented
peer-to-peer
communications
• Support for multimedia
quality of service(QoS)
• Multiple power
management modes
• Security

Formation of an 802.15.3 piconet
• The basic component
is the DEV
– One DEV is required to
assume the role of the
piconet coordinator
(PNC) of the piconet.
– The PNC provides the
basic timing sync for the
piconet with the beacon.
– Additionally, the PNC
manages the quality of
service (QoS)
requirements, power
save modes and access
control to the piconet.

Formation of an 802.15.3 piconet (2)
• PNC supports ad
hoc peer-to-peer
connections
• PNC provides
timing for
synchronization of
DEVs within the
piconet, performs
admission control,
allocates network
resources etc

Formation of a Piconet (3)
• All DEVs within radio coverage of the PNC
can then associate with it to form a piconet.
• Then starts the peer discovery.
• Some DEV pairs in the piconet may be out of

range of each other, and as a result, direct
peer-to-peer connection is unavailable
between them. This results in network layer
discovery methods

Superframe format
• Timing and data transmissions in the piconet
are based on the superframe
• The superframe has three parts
– Beacon: Control information, Allocates CTA,
Synchronization
– Contention Access Period (CAP): via CSMA/CA, file xfer
– Channel Time Allocation Period (CTAP)

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Peer discovery and connectivity issue
• An 802.15.3 piconet supports ad hoc
communications between peer DEVs.
• Peer discovery is crucial to its operation.
• The DEVs shall be able to obtain information
about the services and capabilities of other
DEVs in the piconet at any time by
information discovery commands.
• Peer information is needed before a source
DEV can send any data to a destination DEV,
or generate channel time requests (CTRq) to
the PNC.

1
2

5

3

4

6

9

7

8

10

13

11

14

12

15

PNC

Src_DEV

Dest_DEV

PNC Info. Request command
SIFS
Imm-ACK

SIFS
PNC Information command
SIFS
Imm-ACK
SIFS

Probe Request Command
SIFS
Imm-ACK
SIFS
Probe Response Command
SIFS
Imm-ACK
RIFS

1. NOT receive the Imm-Ack
2. Cannot distinguish out-of-range
transmission and collision
3. Perform backoff retransmission
for collision repeatedly

DEV – 1

PNC

Dev 2 is outside the
range of Dev1 and
vise-versa

1. NOT receive Probe Request
command

DEV - 2

Existing Issues with IEEE 802.15.3











Peer discovery is crucial to piconet
operations.
Standard peer discovery is
unreliable and leads to substantial
delays for unreachable DEV pairs
Full piconet connectivity is not
guaranteed with only direct peerto-peer communications
The standard 802.15.3 MAC does
not take advantage of the unique
ranging capabilities enabled by
UWB
Connections are in peer-to-peer
manner without consider of
possible route optimizations
MAC modeling and performance
evaluation
Stream time scheduling methods
not defined in the standard





DEV_1 cannot communicate with
DEV_4 in peer-to-peer manner
For traffic between DEV_1 and
DEV_3, is it better to forward via
PNC than the direct connection?
What is the optimal path and data
rate between DEV_3 and DEV_5?

Using network layer routing
• Each hop request a
CTA slot seperately.
• PNC treat each hop as
independent traffic
stream

• Effect: Failure in an
intermediate hop
breaks the
connections, but PNC
assumes that an
independent stream is
terminated. Keeps
allocating CTAs for
other hops untill it is
eventually notified by
all participating DEV

Using MAC layer forwarding
• With explicit MAC
layer forwarding,
PNC knows that
these hops belongs
to one connection.
• Better adjusting
downstream and
upstream CTAs.

• Effect: reroute the
traffic is the
intermediate node
fails, and releasing
all CTAs if source
of destination
terminates.

Some Observations
• Peer discover is essential
to piconet operations
and communication
between DEVs
• Full piconet connectivity
cannot be guaranteed
• Some DEV pairs may be
out of range of each
other
• Mac layer routing fails
but is better then IP
routing.

• Remember, 802.15.3 has
centralized topology. So
what ??
• Using PNC, any devices
is two-hop count away
only.
• Can use the central
management capability
to discover simpler and
less costly MAC route

Proposed peer discovery protocol
with forwarding route optimization
• The PNC can always act as a first hop to
connect non-intersecting range DEVs
• However, a betterment can be done in the
frame forwarding by choosing another
DEV closer in distance to the source and
destination to forward the frame.
• All routes are limited to two hops only.

Algorithm
• If the Desti_DEV is reachable, sending PNC
Information Request and Response exchange is
redundant.
• So, Src_DEV send Probe Request command to the
Dest_DEV.
• If Dest_DEV receives the command, it returns an
Imm-ACK after a SIFS and then the Probe Response
command as in standard protocol operations.
• At the same time, the third party, i.e., the PNC, shall
actively monitor the frame exchange.
• Upon receiving a Probe Request, the PNC checks the
destination ID (Dest_ID) field in the MAC header.

Algorithm (2)
• If the Dest_ID is not associated in the piconet, the PNC
send an Imm-ACK to the Src_DEV after SIFS, followed
by a PNC Information command with an empty
Information Element (IE) to notify the source that
destination does not exist.
• Otherwise, instead of ignoring the Probe Request frame,
the PNC waits for the Imm-ACK from the destination
DEV.
• If no Imm-ACK arrives after a backoff inter-frame space
(BIFS), which is the sum of a SIFS and a clear channel
assessment detect time (CCADetectTime), the PNC
realizes that the destination DEV cannot hear the source.
• The PNC then immediately send an Imm-ACK to the
source, followed by a PNC Information command with
the route information. (an optimized route information in
sent)

SRC_DEV send Probe
Request command to
DEST_DEV & PNC listens

SIFS
Imm-ACK

Probe Response command

SIFS (Imm-ACK)

PNC also listen

DEST_DEV
hears?

YES

DEST_DEV
responds

No
No

DEST_DEV
ID
Present?

Yes, Timeout (BIFS)

Send Imm-ACK & route
information to source

Yes and
DEST_DEV sent Imm-ACK

Do Nothing, monitor if
DEST_DEV crash.

Forward the data to
the router node

Algorithm (3)
[Route calculation]
• Most wireless networks today employ a multirate PHY (e.g., UWB in 802.15.3a) that
supports a set of data rate dependent
modulation/coding parameters.
• Due to the extremely low power consumption
requirement of WPAN devices, the achievable
data rate drops dramatically when the
distance increases.
• The data rate can be modeled as a discrete
function of transmission distance d between
two DEVs:

Algorithm (3)
Rate ( d )  S i ;
R i  1  d  R i ;1  i  m
where, R m

1

 0 , R i is the transmiss

and S 1 and S m are the minimum

ion range of rate S i ;

and maximum

data

rates, respective ly. If d is greater th an R 1, then Rate(d)
and the DEVs have no connectivi

ty

0

Algorithm (4)
• Since the PNC can monitor all commands exchanged
during the CAP, it can learn the data rates between
reachable DEV pairs and store them in an n x n rate
matrix (RM), where
• n is the total number of DEVs within the piconet. DEV
is assigned a unique DEV_ID in the piconet
RM ij is the link rate based on the current informatio
obtained

from the commands

DEV i and DEV j . RM

ij

exchanged

 0 if DEV i and DEV

are out of range or the rate informatio
not available

between

yet, and RM

ij

n is

  if i  j .

j

n

Algorithm (5)
• All DEVs transmit with the maximum
allowable power when sending data. Since the
wireless links are symmetric in nature, clearly
RMij = RMji.
• Based on the current rate information stored
in RM, for an unreachable pair DEVi and
DEVj, the PNC can determine the optimal
(two-hop) route that has the minimum
transmission time, i.e., the best route employs
DEVk for MAC layer forwarding, where k
minimizes:

Algorithm (6)
min(

1
RM



ik
k [ 0 , n  1 ]

1
RM

)
kj

• Alleviates the traffic load on the PNC
• Discovers a current optimal two-hop MAC layer
forwarding path given by existing rate information
without introducing any extra overhead
• If the connection is broken, the PNC can
immediately reroute the traffic to a current
optimal path, or terminate the connection by deallocating all corresponding CTAs.

Discussion
• Original case:
Causes
retransmission

• 3PHP: data sent via
2-hop route if
PNC_ID exists

Dest_ID

Dest_ID

• Normal Transmission (Imm_Ack)

• Normal Transmission (Imm_Ack)

XXX FRAME LOST XXXX

PNC_ID

• Causes retransmission

• Sent Via 2–hop route (Imm_Ack)

PNC

Src_DEV
PNC Info. Request command

Probe Request Command

BIFS
Imm-ACK
SIFS

PNC Information command with Route Info.

Imm-ACK

RIFS

Dest_DEV

SIFS

3PHP-Node

DEV – 1

DEV - 2

PNC

Observations
• With 3PHP, peer discovery requires only one
round of frame exchange.
• Fully utilized the broadcast nature,
centralized control, ad-hoc communication,
and efficient peer discovery.
• Save the futile back-off retransmission for
unreachable destination.
• Guaranteed full piconet connectivity. (no
network layer routing required)
• On demand routing
• More then BIFS waiting. (include RIFS) Conclusion

Performance Evaluations
[Intra-piconet no connection probability]
• Intra-piconet no
connection
probability

• Common Overlap
Area function
COLA(R, r, x):
Represent the
intersection of two
circles with radii R
and r (r e R),
respectively, which
centers are
separated by
distance x

Performance Evaluations (2)
[Intra-piconet no connection probability]

Performance Evaluations (3)
[Intra-piconet no connection probability]
• The probability of no direct connection
between two DEVs in a piconet is

Performance Evaluations (4)
[Peer Discovery delay analysis]


# of Frame Transmission




Expected
Contention Time



Expected Packet
Delay

Performance Evaluations (5)
[Peer Discovery delay analysis]


Expected routing
failure probability

• Expected successful peer discovery
delays are given by

Simulation and Numerical Results
• No connection probability as a function of
coverage range ratio

Simulation and Numerical Results (2)
• Peer discovery delay vs. conditional
collision probability

Simulation and Numerical Results (3)
• Piconet peer discovery time vs. coverage
range ratio

Simulation and Numerical Results (4)
• Piconet peer discovery failure probability
with standard method

Simulation and Numerical Results (5)
• Two-hop forwarding route optimization
ratio vs. piconet radius

Simulation and Numerical Results (6)
• Expected data between directly unreachable
pairs in piconets with 20 DEVs

Conclusion
• Underlying fact: peer-to-peer data delivery in
802.15.3 WPANs
• Existing MAC layer peer discovery methods
cannot guarantee full connectivity between
DEVs within a piconet through direct peerto-peer connections if the piconet operates
with a radius larger than half of the
maximum transmission distance. (~ 41.3%)
• If Mac fails, use the expensive network layer
routing.

Conclusion (2)
• Used the central control topology
• Routing in 2-hop with single round of
control frame exchange
• 3PHP achieves 25– 37% faster peer
discovery time over the standard MAC
• Route optimization algorithm in the PNC
to provide the best MAC layer forwarding
routes by self-learning the available rate
information between DEVs.

References


IEEE Standard 802.15.3, “Wireless medium access control (MAC) and physical
layer (PHY) specifications for high rate wireless personal area networks
(WPANs),”Sept. 2003.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery in IEEE 802.15.3 WPANs,”in Proc. IEEE BroadNets2005, Boston, MA,
Oct. 2005.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery and Route Optimization in IEEE 802.15.3WPANs,”accepted for
publication in ACM/KluwerJ. Mobile Networks and Applications, Nov. 2005.



Z. Yin and V.C.M. Leung, “Connection Data Rate Optimization of IEEE 802.15.3
Scatternetswith Multi-rate Carriers,”IEEE ICC’06, Istanbul, Turkey, June 2006.



Zhanping Yin and Victor C.M. Leung, “Introduction to IEEE 802.15.3 High Rate
Wireless Personal Area Network (WPAN)”, Electrical and Computer Engineering
University of British Columbia

Thank You



Slide 23

Third-Party Handshake Protocol for
Efficient Peer Discovery
and Route Optimization in
IEEE 802.15.3 WPANs
Authors:
Zhanping Yin * Victor C. M. Leung
Published:
ACM/ MONET 2006
Presented by:
Gautam S. Thakur

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

WPAN
• A WPAN (wireless personal area network) is a
personal area network - a network for
interconnecting devices centered around an
individual person's workspace
• A very short range ~10 mtrs. E.g. Bluetooth
• Proposed operating frequencies are around
2.4 GHz in digital modes.
• The objective is to facilitate seamless

operation among home or business devices
and systems.

Ultra-Wideband
• A physical layer technology
• For, short distance communication with high
data rate and short transmission range.
• Lower power requirement and pulsed data
• UWB transmission over extremely wide
unlicensed radio spectrum  3.1 – 10.6 GHz.
• Over results in
– Less interference
– Wire-like performance for indoor wireless
environment.

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Overview of 802.15.3
• Why 802.15.3 ?
• The 802.15.3 Wireless Space
• 802.15.3 Overview and Components

Overview of 802.15.3
[Why 802.15.3 ?]
• Motivated by the increasing demand of wireless
communications with






Ubiquitous network connectivity
Low cost and low power consumption -> WPAN
High data rate(HDR)
Quality of Service(QoS) support
Comparison with other short to medium range wireless
technologies
• Wireless LAN (WLAN)
– High cost and power consumption, no hard QoS guarantee

• WPANs-Bluetooth (802.15.1) and ZigBee(802.15.4)
– Data rate too low

• Applications of 802.15.3
– Virtual wireless multimedia connectivity
• Video/audio distribution

– High speed data transfer

Overview of 802.15.3
[ 802.15.3 = Wireless Multimedia ]

Overview of 802.15.3
[ The 802 Wireless Space ]

IEEE 802.15.3 Overview
• High date rate and low
power
• Mainly works within a
piconet with dynamic
DEV membership
• Ad hoc topology with
centralized control by
the PNC
• Connection oriented
peer-to-peer
communications
• Support for multimedia
quality of service(QoS)
• Multiple power
management modes
• Security

Formation of an 802.15.3 piconet
• The basic component
is the DEV
– One DEV is required to
assume the role of the
piconet coordinator
(PNC) of the piconet.
– The PNC provides the
basic timing sync for the
piconet with the beacon.
– Additionally, the PNC
manages the quality of
service (QoS)
requirements, power
save modes and access
control to the piconet.

Formation of an 802.15.3 piconet (2)
• PNC supports ad
hoc peer-to-peer
connections
• PNC provides
timing for
synchronization of
DEVs within the
piconet, performs
admission control,
allocates network
resources etc

Formation of a Piconet (3)
• All DEVs within radio coverage of the PNC
can then associate with it to form a piconet.
• Then starts the peer discovery.
• Some DEV pairs in the piconet may be out of

range of each other, and as a result, direct
peer-to-peer connection is unavailable
between them. This results in network layer
discovery methods

Superframe format
• Timing and data transmissions in the piconet
are based on the superframe
• The superframe has three parts
– Beacon: Control information, Allocates CTA,
Synchronization
– Contention Access Period (CAP): via CSMA/CA, file xfer
– Channel Time Allocation Period (CTAP)

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Peer discovery and connectivity issue
• An 802.15.3 piconet supports ad hoc
communications between peer DEVs.
• Peer discovery is crucial to its operation.
• The DEVs shall be able to obtain information
about the services and capabilities of other
DEVs in the piconet at any time by
information discovery commands.
• Peer information is needed before a source
DEV can send any data to a destination DEV,
or generate channel time requests (CTRq) to
the PNC.

1
2

5

3

4

6

9

7

8

10

13

11

14

12

15

PNC

Src_DEV

Dest_DEV

PNC Info. Request command
SIFS
Imm-ACK

SIFS
PNC Information command
SIFS
Imm-ACK
SIFS

Probe Request Command
SIFS
Imm-ACK
SIFS
Probe Response Command
SIFS
Imm-ACK
RIFS

1. NOT receive the Imm-Ack
2. Cannot distinguish out-of-range
transmission and collision
3. Perform backoff retransmission
for collision repeatedly

DEV – 1

PNC

Dev 2 is outside the
range of Dev1 and
vise-versa

1. NOT receive Probe Request
command

DEV - 2

Existing Issues with IEEE 802.15.3











Peer discovery is crucial to piconet
operations.
Standard peer discovery is
unreliable and leads to substantial
delays for unreachable DEV pairs
Full piconet connectivity is not
guaranteed with only direct peerto-peer communications
The standard 802.15.3 MAC does
not take advantage of the unique
ranging capabilities enabled by
UWB
Connections are in peer-to-peer
manner without consider of
possible route optimizations
MAC modeling and performance
evaluation
Stream time scheduling methods
not defined in the standard





DEV_1 cannot communicate with
DEV_4 in peer-to-peer manner
For traffic between DEV_1 and
DEV_3, is it better to forward via
PNC than the direct connection?
What is the optimal path and data
rate between DEV_3 and DEV_5?

Using network layer routing
• Each hop request a
CTA slot seperately.
• PNC treat each hop as
independent traffic
stream

• Effect: Failure in an
intermediate hop
breaks the
connections, but PNC
assumes that an
independent stream is
terminated. Keeps
allocating CTAs for
other hops untill it is
eventually notified by
all participating DEV

Using MAC layer forwarding
• With explicit MAC
layer forwarding,
PNC knows that
these hops belongs
to one connection.
• Better adjusting
downstream and
upstream CTAs.

• Effect: reroute the
traffic is the
intermediate node
fails, and releasing
all CTAs if source
of destination
terminates.

Some Observations
• Peer discover is essential
to piconet operations
and communication
between DEVs
• Full piconet connectivity
cannot be guaranteed
• Some DEV pairs may be
out of range of each
other
• Mac layer routing fails
but is better then IP
routing.

• Remember, 802.15.3 has
centralized topology. So
what ??
• Using PNC, any devices
is two-hop count away
only.
• Can use the central
management capability
to discover simpler and
less costly MAC route

Proposed peer discovery protocol
with forwarding route optimization
• The PNC can always act as a first hop to
connect non-intersecting range DEVs
• However, a betterment can be done in the
frame forwarding by choosing another
DEV closer in distance to the source and
destination to forward the frame.
• All routes are limited to two hops only.

Algorithm
• If the Desti_DEV is reachable, sending PNC
Information Request and Response exchange is
redundant.
• So, Src_DEV send Probe Request command to the
Dest_DEV.
• If Dest_DEV receives the command, it returns an
Imm-ACK after a SIFS and then the Probe Response
command as in standard protocol operations.
• At the same time, the third party, i.e., the PNC, shall
actively monitor the frame exchange.
• Upon receiving a Probe Request, the PNC checks the
destination ID (Dest_ID) field in the MAC header.

Algorithm (2)
• If the Dest_ID is not associated in the piconet, the PNC
send an Imm-ACK to the Src_DEV after SIFS, followed
by a PNC Information command with an empty
Information Element (IE) to notify the source that
destination does not exist.
• Otherwise, instead of ignoring the Probe Request frame,
the PNC waits for the Imm-ACK from the destination
DEV.
• If no Imm-ACK arrives after a backoff inter-frame space
(BIFS), which is the sum of a SIFS and a clear channel
assessment detect time (CCADetectTime), the PNC
realizes that the destination DEV cannot hear the source.
• The PNC then immediately send an Imm-ACK to the
source, followed by a PNC Information command with
the route information. (an optimized route information in
sent)

SRC_DEV send Probe
Request command to
DEST_DEV & PNC listens

SIFS
Imm-ACK

Probe Response command

SIFS (Imm-ACK)

PNC also listen

DEST_DEV
hears?

YES

DEST_DEV
responds

No
No

DEST_DEV
ID
Present?

Yes, Timeout (BIFS)

Send Imm-ACK & route
information to source

Yes and
DEST_DEV sent Imm-ACK

Do Nothing, monitor if
DEST_DEV crash.

Forward the data to
the router node

Algorithm (3)
[Route calculation]
• Most wireless networks today employ a multirate PHY (e.g., UWB in 802.15.3a) that
supports a set of data rate dependent
modulation/coding parameters.
• Due to the extremely low power consumption
requirement of WPAN devices, the achievable
data rate drops dramatically when the
distance increases.
• The data rate can be modeled as a discrete
function of transmission distance d between
two DEVs:

Algorithm (3)
Rate ( d )  S i ;
R i  1  d  R i ;1  i  m
where, R m

1

 0 , R i is the transmiss

and S 1 and S m are the minimum

ion range of rate S i ;

and maximum

data

rates, respective ly. If d is greater th an R 1, then Rate(d)
and the DEVs have no connectivi

ty

0

Algorithm (4)
• Since the PNC can monitor all commands exchanged
during the CAP, it can learn the data rates between
reachable DEV pairs and store them in an n x n rate
matrix (RM), where
• n is the total number of DEVs within the piconet. DEV
is assigned a unique DEV_ID in the piconet
RM ij is the link rate based on the current informatio
obtained

from the commands

DEV i and DEV j . RM

ij

exchanged

 0 if DEV i and DEV

are out of range or the rate informatio
not available

between

yet, and RM

ij

n is

  if i  j .

j

n

Algorithm (5)
• All DEVs transmit with the maximum
allowable power when sending data. Since the
wireless links are symmetric in nature, clearly
RMij = RMji.
• Based on the current rate information stored
in RM, for an unreachable pair DEVi and
DEVj, the PNC can determine the optimal
(two-hop) route that has the minimum
transmission time, i.e., the best route employs
DEVk for MAC layer forwarding, where k
minimizes:

Algorithm (6)
min(

1
RM



ik
k [ 0 , n  1 ]

1
RM

)
kj

• Alleviates the traffic load on the PNC
• Discovers a current optimal two-hop MAC layer
forwarding path given by existing rate information
without introducing any extra overhead
• If the connection is broken, the PNC can
immediately reroute the traffic to a current
optimal path, or terminate the connection by deallocating all corresponding CTAs.

Discussion
• Original case:
Causes
retransmission

• 3PHP: data sent via
2-hop route if
PNC_ID exists

Dest_ID

Dest_ID

• Normal Transmission (Imm_Ack)

• Normal Transmission (Imm_Ack)

XXX FRAME LOST XXXX

PNC_ID

• Causes retransmission

• Sent Via 2–hop route (Imm_Ack)

PNC

Src_DEV
PNC Info. Request command

Probe Request Command

BIFS
Imm-ACK
SIFS

PNC Information command with Route Info.

Imm-ACK

RIFS

Dest_DEV

SIFS

3PHP-Node

DEV – 1

DEV - 2

PNC

Observations
• With 3PHP, peer discovery requires only one
round of frame exchange.
• Fully utilized the broadcast nature,
centralized control, ad-hoc communication,
and efficient peer discovery.
• Save the futile back-off retransmission for
unreachable destination.
• Guaranteed full piconet connectivity. (no
network layer routing required)
• On demand routing
• More then BIFS waiting. (include RIFS) Conclusion

Performance Evaluations
[Intra-piconet no connection probability]
• Intra-piconet no
connection
probability

• Common Overlap
Area function
COLA(R, r, x):
Represent the
intersection of two
circles with radii R
and r (r e R),
respectively, which
centers are
separated by
distance x

Performance Evaluations (2)
[Intra-piconet no connection probability]

Performance Evaluations (3)
[Intra-piconet no connection probability]
• The probability of no direct connection
between two DEVs in a piconet is

Performance Evaluations (4)
[Peer Discovery delay analysis]


# of Frame Transmission




Expected
Contention Time



Expected Packet
Delay

Performance Evaluations (5)
[Peer Discovery delay analysis]


Expected routing
failure probability

• Expected successful peer discovery
delays are given by

Simulation and Numerical Results
• No connection probability as a function of
coverage range ratio

Simulation and Numerical Results (2)
• Peer discovery delay vs. conditional
collision probability

Simulation and Numerical Results (3)
• Piconet peer discovery time vs. coverage
range ratio

Simulation and Numerical Results (4)
• Piconet peer discovery failure probability
with standard method

Simulation and Numerical Results (5)
• Two-hop forwarding route optimization
ratio vs. piconet radius

Simulation and Numerical Results (6)
• Expected data between directly unreachable
pairs in piconets with 20 DEVs

Conclusion
• Underlying fact: peer-to-peer data delivery in
802.15.3 WPANs
• Existing MAC layer peer discovery methods
cannot guarantee full connectivity between
DEVs within a piconet through direct peerto-peer connections if the piconet operates
with a radius larger than half of the
maximum transmission distance. (~ 41.3%)
• If Mac fails, use the expensive network layer
routing.

Conclusion (2)
• Used the central control topology
• Routing in 2-hop with single round of
control frame exchange
• 3PHP achieves 25– 37% faster peer
discovery time over the standard MAC
• Route optimization algorithm in the PNC
to provide the best MAC layer forwarding
routes by self-learning the available rate
information between DEVs.

References


IEEE Standard 802.15.3, “Wireless medium access control (MAC) and physical
layer (PHY) specifications for high rate wireless personal area networks
(WPANs),”Sept. 2003.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery in IEEE 802.15.3 WPANs,”in Proc. IEEE BroadNets2005, Boston, MA,
Oct. 2005.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery and Route Optimization in IEEE 802.15.3WPANs,”accepted for
publication in ACM/KluwerJ. Mobile Networks and Applications, Nov. 2005.



Z. Yin and V.C.M. Leung, “Connection Data Rate Optimization of IEEE 802.15.3
Scatternetswith Multi-rate Carriers,”IEEE ICC’06, Istanbul, Turkey, June 2006.



Zhanping Yin and Victor C.M. Leung, “Introduction to IEEE 802.15.3 High Rate
Wireless Personal Area Network (WPAN)”, Electrical and Computer Engineering
University of British Columbia

Thank You



Slide 24

Third-Party Handshake Protocol for
Efficient Peer Discovery
and Route Optimization in
IEEE 802.15.3 WPANs
Authors:
Zhanping Yin * Victor C. M. Leung
Published:
ACM/ MONET 2006
Presented by:
Gautam S. Thakur

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

WPAN
• A WPAN (wireless personal area network) is a
personal area network - a network for
interconnecting devices centered around an
individual person's workspace
• A very short range ~10 mtrs. E.g. Bluetooth
• Proposed operating frequencies are around
2.4 GHz in digital modes.
• The objective is to facilitate seamless

operation among home or business devices
and systems.

Ultra-Wideband
• A physical layer technology
• For, short distance communication with high
data rate and short transmission range.
• Lower power requirement and pulsed data
• UWB transmission over extremely wide
unlicensed radio spectrum  3.1 – 10.6 GHz.
• Over results in
– Less interference
– Wire-like performance for indoor wireless
environment.

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Overview of 802.15.3
• Why 802.15.3 ?
• The 802.15.3 Wireless Space
• 802.15.3 Overview and Components

Overview of 802.15.3
[Why 802.15.3 ?]
• Motivated by the increasing demand of wireless
communications with






Ubiquitous network connectivity
Low cost and low power consumption -> WPAN
High data rate(HDR)
Quality of Service(QoS) support
Comparison with other short to medium range wireless
technologies
• Wireless LAN (WLAN)
– High cost and power consumption, no hard QoS guarantee

• WPANs-Bluetooth (802.15.1) and ZigBee(802.15.4)
– Data rate too low

• Applications of 802.15.3
– Virtual wireless multimedia connectivity
• Video/audio distribution

– High speed data transfer

Overview of 802.15.3
[ 802.15.3 = Wireless Multimedia ]

Overview of 802.15.3
[ The 802 Wireless Space ]

IEEE 802.15.3 Overview
• High date rate and low
power
• Mainly works within a
piconet with dynamic
DEV membership
• Ad hoc topology with
centralized control by
the PNC
• Connection oriented
peer-to-peer
communications
• Support for multimedia
quality of service(QoS)
• Multiple power
management modes
• Security

Formation of an 802.15.3 piconet
• The basic component
is the DEV
– One DEV is required to
assume the role of the
piconet coordinator
(PNC) of the piconet.
– The PNC provides the
basic timing sync for the
piconet with the beacon.
– Additionally, the PNC
manages the quality of
service (QoS)
requirements, power
save modes and access
control to the piconet.

Formation of an 802.15.3 piconet (2)
• PNC supports ad
hoc peer-to-peer
connections
• PNC provides
timing for
synchronization of
DEVs within the
piconet, performs
admission control,
allocates network
resources etc

Formation of a Piconet (3)
• All DEVs within radio coverage of the PNC
can then associate with it to form a piconet.
• Then starts the peer discovery.
• Some DEV pairs in the piconet may be out of

range of each other, and as a result, direct
peer-to-peer connection is unavailable
between them. This results in network layer
discovery methods

Superframe format
• Timing and data transmissions in the piconet
are based on the superframe
• The superframe has three parts
– Beacon: Control information, Allocates CTA,
Synchronization
– Contention Access Period (CAP): via CSMA/CA, file xfer
– Channel Time Allocation Period (CTAP)

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Peer discovery and connectivity issue
• An 802.15.3 piconet supports ad hoc
communications between peer DEVs.
• Peer discovery is crucial to its operation.
• The DEVs shall be able to obtain information
about the services and capabilities of other
DEVs in the piconet at any time by
information discovery commands.
• Peer information is needed before a source
DEV can send any data to a destination DEV,
or generate channel time requests (CTRq) to
the PNC.

1
2

5

3

4

6

9

7

8

10

13

11

14

12

15

PNC

Src_DEV

Dest_DEV

PNC Info. Request command
SIFS
Imm-ACK

SIFS
PNC Information command
SIFS
Imm-ACK
SIFS

Probe Request Command
SIFS
Imm-ACK
SIFS
Probe Response Command
SIFS
Imm-ACK
RIFS

1. NOT receive the Imm-Ack
2. Cannot distinguish out-of-range
transmission and collision
3. Perform backoff retransmission
for collision repeatedly

DEV – 1

PNC

Dev 2 is outside the
range of Dev1 and
vise-versa

1. NOT receive Probe Request
command

DEV - 2

Existing Issues with IEEE 802.15.3











Peer discovery is crucial to piconet
operations.
Standard peer discovery is
unreliable and leads to substantial
delays for unreachable DEV pairs
Full piconet connectivity is not
guaranteed with only direct peerto-peer communications
The standard 802.15.3 MAC does
not take advantage of the unique
ranging capabilities enabled by
UWB
Connections are in peer-to-peer
manner without consider of
possible route optimizations
MAC modeling and performance
evaluation
Stream time scheduling methods
not defined in the standard





DEV_1 cannot communicate with
DEV_4 in peer-to-peer manner
For traffic between DEV_1 and
DEV_3, is it better to forward via
PNC than the direct connection?
What is the optimal path and data
rate between DEV_3 and DEV_5?

Using network layer routing
• Each hop request a
CTA slot seperately.
• PNC treat each hop as
independent traffic
stream

• Effect: Failure in an
intermediate hop
breaks the
connections, but PNC
assumes that an
independent stream is
terminated. Keeps
allocating CTAs for
other hops untill it is
eventually notified by
all participating DEV

Using MAC layer forwarding
• With explicit MAC
layer forwarding,
PNC knows that
these hops belongs
to one connection.
• Better adjusting
downstream and
upstream CTAs.

• Effect: reroute the
traffic is the
intermediate node
fails, and releasing
all CTAs if source
of destination
terminates.

Some Observations
• Peer discover is essential
to piconet operations
and communication
between DEVs
• Full piconet connectivity
cannot be guaranteed
• Some DEV pairs may be
out of range of each
other
• Mac layer routing fails
but is better then IP
routing.

• Remember, 802.15.3 has
centralized topology. So
what ??
• Using PNC, any devices
is two-hop count away
only.
• Can use the central
management capability
to discover simpler and
less costly MAC route

Proposed peer discovery protocol
with forwarding route optimization
• The PNC can always act as a first hop to
connect non-intersecting range DEVs
• However, a betterment can be done in the
frame forwarding by choosing another
DEV closer in distance to the source and
destination to forward the frame.
• All routes are limited to two hops only.

Algorithm
• If the Desti_DEV is reachable, sending PNC
Information Request and Response exchange is
redundant.
• So, Src_DEV send Probe Request command to the
Dest_DEV.
• If Dest_DEV receives the command, it returns an
Imm-ACK after a SIFS and then the Probe Response
command as in standard protocol operations.
• At the same time, the third party, i.e., the PNC, shall
actively monitor the frame exchange.
• Upon receiving a Probe Request, the PNC checks the
destination ID (Dest_ID) field in the MAC header.

Algorithm (2)
• If the Dest_ID is not associated in the piconet, the PNC
send an Imm-ACK to the Src_DEV after SIFS, followed
by a PNC Information command with an empty
Information Element (IE) to notify the source that
destination does not exist.
• Otherwise, instead of ignoring the Probe Request frame,
the PNC waits for the Imm-ACK from the destination
DEV.
• If no Imm-ACK arrives after a backoff inter-frame space
(BIFS), which is the sum of a SIFS and a clear channel
assessment detect time (CCADetectTime), the PNC
realizes that the destination DEV cannot hear the source.
• The PNC then immediately send an Imm-ACK to the
source, followed by a PNC Information command with
the route information. (an optimized route information in
sent)

SRC_DEV send Probe
Request command to
DEST_DEV & PNC listens

SIFS
Imm-ACK

Probe Response command

SIFS (Imm-ACK)

PNC also listen

DEST_DEV
hears?

YES

DEST_DEV
responds

No
No

DEST_DEV
ID
Present?

Yes, Timeout (BIFS)

Send Imm-ACK & route
information to source

Yes and
DEST_DEV sent Imm-ACK

Do Nothing, monitor if
DEST_DEV crash.

Forward the data to
the router node

Algorithm (3)
[Route calculation]
• Most wireless networks today employ a multirate PHY (e.g., UWB in 802.15.3a) that
supports a set of data rate dependent
modulation/coding parameters.
• Due to the extremely low power consumption
requirement of WPAN devices, the achievable
data rate drops dramatically when the
distance increases.
• The data rate can be modeled as a discrete
function of transmission distance d between
two DEVs:

Algorithm (3)
Rate ( d )  S i ;
R i  1  d  R i ;1  i  m
where, R m

1

 0 , R i is the transmiss

and S 1 and S m are the minimum

ion range of rate S i ;

and maximum

data

rates, respective ly. If d is greater th an R 1, then Rate(d)
and the DEVs have no connectivi

ty

0

Algorithm (4)
• Since the PNC can monitor all commands exchanged
during the CAP, it can learn the data rates between
reachable DEV pairs and store them in an n x n rate
matrix (RM), where
• n is the total number of DEVs within the piconet. DEV
is assigned a unique DEV_ID in the piconet
RM ij is the link rate based on the current informatio
obtained

from the commands

DEV i and DEV j . RM

ij

exchanged

 0 if DEV i and DEV

are out of range or the rate informatio
not available

between

yet, and RM

ij

n is

  if i  j .

j

n

Algorithm (5)
• All DEVs transmit with the maximum
allowable power when sending data. Since the
wireless links are symmetric in nature, clearly
RMij = RMji.
• Based on the current rate information stored
in RM, for an unreachable pair DEVi and
DEVj, the PNC can determine the optimal
(two-hop) route that has the minimum
transmission time, i.e., the best route employs
DEVk for MAC layer forwarding, where k
minimizes:

Algorithm (6)
min(

1
RM



ik
k [ 0 , n  1 ]

1
RM

)
kj

• Alleviates the traffic load on the PNC
• Discovers a current optimal two-hop MAC layer
forwarding path given by existing rate information
without introducing any extra overhead
• If the connection is broken, the PNC can
immediately reroute the traffic to a current
optimal path, or terminate the connection by deallocating all corresponding CTAs.

Discussion
• Original case:
Causes
retransmission

• 3PHP: data sent via
2-hop route if
PNC_ID exists

Dest_ID

Dest_ID

• Normal Transmission (Imm_Ack)

• Normal Transmission (Imm_Ack)

XXX FRAME LOST XXXX

PNC_ID

• Causes retransmission

• Sent Via 2–hop route (Imm_Ack)

PNC

Src_DEV
PNC Info. Request command

Probe Request Command

BIFS
Imm-ACK
SIFS

PNC Information command with Route Info.

Imm-ACK

RIFS

Dest_DEV

SIFS

3PHP-Node

DEV – 1

DEV - 2

PNC

Observations
• With 3PHP, peer discovery requires only one
round of frame exchange.
• Fully utilized the broadcast nature,
centralized control, ad-hoc communication,
and efficient peer discovery.
• Save the futile back-off retransmission for
unreachable destination.
• Guaranteed full piconet connectivity. (no
network layer routing required)
• On demand routing
• More then BIFS waiting. (include RIFS) Conclusion

Performance Evaluations
[Intra-piconet no connection probability]
• Intra-piconet no
connection
probability

• Common Overlap
Area function
COLA(R, r, x):
Represent the
intersection of two
circles with radii R
and r (r e R),
respectively, which
centers are
separated by
distance x

Performance Evaluations (2)
[Intra-piconet no connection probability]

Performance Evaluations (3)
[Intra-piconet no connection probability]
• The probability of no direct connection
between two DEVs in a piconet is

Performance Evaluations (4)
[Peer Discovery delay analysis]


# of Frame Transmission




Expected
Contention Time



Expected Packet
Delay

Performance Evaluations (5)
[Peer Discovery delay analysis]


Expected routing
failure probability

• Expected successful peer discovery
delays are given by

Simulation and Numerical Results
• No connection probability as a function of
coverage range ratio

Simulation and Numerical Results (2)
• Peer discovery delay vs. conditional
collision probability

Simulation and Numerical Results (3)
• Piconet peer discovery time vs. coverage
range ratio

Simulation and Numerical Results (4)
• Piconet peer discovery failure probability
with standard method

Simulation and Numerical Results (5)
• Two-hop forwarding route optimization
ratio vs. piconet radius

Simulation and Numerical Results (6)
• Expected data between directly unreachable
pairs in piconets with 20 DEVs

Conclusion
• Underlying fact: peer-to-peer data delivery in
802.15.3 WPANs
• Existing MAC layer peer discovery methods
cannot guarantee full connectivity between
DEVs within a piconet through direct peerto-peer connections if the piconet operates
with a radius larger than half of the
maximum transmission distance. (~ 41.3%)
• If Mac fails, use the expensive network layer
routing.

Conclusion (2)
• Used the central control topology
• Routing in 2-hop with single round of
control frame exchange
• 3PHP achieves 25– 37% faster peer
discovery time over the standard MAC
• Route optimization algorithm in the PNC
to provide the best MAC layer forwarding
routes by self-learning the available rate
information between DEVs.

References


IEEE Standard 802.15.3, “Wireless medium access control (MAC) and physical
layer (PHY) specifications for high rate wireless personal area networks
(WPANs),”Sept. 2003.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery in IEEE 802.15.3 WPANs,”in Proc. IEEE BroadNets2005, Boston, MA,
Oct. 2005.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery and Route Optimization in IEEE 802.15.3WPANs,”accepted for
publication in ACM/KluwerJ. Mobile Networks and Applications, Nov. 2005.



Z. Yin and V.C.M. Leung, “Connection Data Rate Optimization of IEEE 802.15.3
Scatternetswith Multi-rate Carriers,”IEEE ICC’06, Istanbul, Turkey, June 2006.



Zhanping Yin and Victor C.M. Leung, “Introduction to IEEE 802.15.3 High Rate
Wireless Personal Area Network (WPAN)”, Electrical and Computer Engineering
University of British Columbia

Thank You



Slide 25

Third-Party Handshake Protocol for
Efficient Peer Discovery
and Route Optimization in
IEEE 802.15.3 WPANs
Authors:
Zhanping Yin * Victor C. M. Leung
Published:
ACM/ MONET 2006
Presented by:
Gautam S. Thakur

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

WPAN
• A WPAN (wireless personal area network) is a
personal area network - a network for
interconnecting devices centered around an
individual person's workspace
• A very short range ~10 mtrs. E.g. Bluetooth
• Proposed operating frequencies are around
2.4 GHz in digital modes.
• The objective is to facilitate seamless

operation among home or business devices
and systems.

Ultra-Wideband
• A physical layer technology
• For, short distance communication with high
data rate and short transmission range.
• Lower power requirement and pulsed data
• UWB transmission over extremely wide
unlicensed radio spectrum  3.1 – 10.6 GHz.
• Over results in
– Less interference
– Wire-like performance for indoor wireless
environment.

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Overview of 802.15.3
• Why 802.15.3 ?
• The 802.15.3 Wireless Space
• 802.15.3 Overview and Components

Overview of 802.15.3
[Why 802.15.3 ?]
• Motivated by the increasing demand of wireless
communications with






Ubiquitous network connectivity
Low cost and low power consumption -> WPAN
High data rate(HDR)
Quality of Service(QoS) support
Comparison with other short to medium range wireless
technologies
• Wireless LAN (WLAN)
– High cost and power consumption, no hard QoS guarantee

• WPANs-Bluetooth (802.15.1) and ZigBee(802.15.4)
– Data rate too low

• Applications of 802.15.3
– Virtual wireless multimedia connectivity
• Video/audio distribution

– High speed data transfer

Overview of 802.15.3
[ 802.15.3 = Wireless Multimedia ]

Overview of 802.15.3
[ The 802 Wireless Space ]

IEEE 802.15.3 Overview
• High date rate and low
power
• Mainly works within a
piconet with dynamic
DEV membership
• Ad hoc topology with
centralized control by
the PNC
• Connection oriented
peer-to-peer
communications
• Support for multimedia
quality of service(QoS)
• Multiple power
management modes
• Security

Formation of an 802.15.3 piconet
• The basic component
is the DEV
– One DEV is required to
assume the role of the
piconet coordinator
(PNC) of the piconet.
– The PNC provides the
basic timing sync for the
piconet with the beacon.
– Additionally, the PNC
manages the quality of
service (QoS)
requirements, power
save modes and access
control to the piconet.

Formation of an 802.15.3 piconet (2)
• PNC supports ad
hoc peer-to-peer
connections
• PNC provides
timing for
synchronization of
DEVs within the
piconet, performs
admission control,
allocates network
resources etc

Formation of a Piconet (3)
• All DEVs within radio coverage of the PNC
can then associate with it to form a piconet.
• Then starts the peer discovery.
• Some DEV pairs in the piconet may be out of

range of each other, and as a result, direct
peer-to-peer connection is unavailable
between them. This results in network layer
discovery methods

Superframe format
• Timing and data transmissions in the piconet
are based on the superframe
• The superframe has three parts
– Beacon: Control information, Allocates CTA,
Synchronization
– Contention Access Period (CAP): via CSMA/CA, file xfer
– Channel Time Allocation Period (CTAP)

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Peer discovery and connectivity issue
• An 802.15.3 piconet supports ad hoc
communications between peer DEVs.
• Peer discovery is crucial to its operation.
• The DEVs shall be able to obtain information
about the services and capabilities of other
DEVs in the piconet at any time by
information discovery commands.
• Peer information is needed before a source
DEV can send any data to a destination DEV,
or generate channel time requests (CTRq) to
the PNC.

1
2

5

3

4

6

9

7

8

10

13

11

14

12

15

PNC

Src_DEV

Dest_DEV

PNC Info. Request command
SIFS
Imm-ACK

SIFS
PNC Information command
SIFS
Imm-ACK
SIFS

Probe Request Command
SIFS
Imm-ACK
SIFS
Probe Response Command
SIFS
Imm-ACK
RIFS

1. NOT receive the Imm-Ack
2. Cannot distinguish out-of-range
transmission and collision
3. Perform backoff retransmission
for collision repeatedly

DEV – 1

PNC

Dev 2 is outside the
range of Dev1 and
vise-versa

1. NOT receive Probe Request
command

DEV - 2

Existing Issues with IEEE 802.15.3











Peer discovery is crucial to piconet
operations.
Standard peer discovery is
unreliable and leads to substantial
delays for unreachable DEV pairs
Full piconet connectivity is not
guaranteed with only direct peerto-peer communications
The standard 802.15.3 MAC does
not take advantage of the unique
ranging capabilities enabled by
UWB
Connections are in peer-to-peer
manner without consider of
possible route optimizations
MAC modeling and performance
evaluation
Stream time scheduling methods
not defined in the standard





DEV_1 cannot communicate with
DEV_4 in peer-to-peer manner
For traffic between DEV_1 and
DEV_3, is it better to forward via
PNC than the direct connection?
What is the optimal path and data
rate between DEV_3 and DEV_5?

Using network layer routing
• Each hop request a
CTA slot seperately.
• PNC treat each hop as
independent traffic
stream

• Effect: Failure in an
intermediate hop
breaks the
connections, but PNC
assumes that an
independent stream is
terminated. Keeps
allocating CTAs for
other hops untill it is
eventually notified by
all participating DEV

Using MAC layer forwarding
• With explicit MAC
layer forwarding,
PNC knows that
these hops belongs
to one connection.
• Better adjusting
downstream and
upstream CTAs.

• Effect: reroute the
traffic is the
intermediate node
fails, and releasing
all CTAs if source
of destination
terminates.

Some Observations
• Peer discover is essential
to piconet operations
and communication
between DEVs
• Full piconet connectivity
cannot be guaranteed
• Some DEV pairs may be
out of range of each
other
• Mac layer routing fails
but is better then IP
routing.

• Remember, 802.15.3 has
centralized topology. So
what ??
• Using PNC, any devices
is two-hop count away
only.
• Can use the central
management capability
to discover simpler and
less costly MAC route

Proposed peer discovery protocol
with forwarding route optimization
• The PNC can always act as a first hop to
connect non-intersecting range DEVs
• However, a betterment can be done in the
frame forwarding by choosing another
DEV closer in distance to the source and
destination to forward the frame.
• All routes are limited to two hops only.

Algorithm
• If the Desti_DEV is reachable, sending PNC
Information Request and Response exchange is
redundant.
• So, Src_DEV send Probe Request command to the
Dest_DEV.
• If Dest_DEV receives the command, it returns an
Imm-ACK after a SIFS and then the Probe Response
command as in standard protocol operations.
• At the same time, the third party, i.e., the PNC, shall
actively monitor the frame exchange.
• Upon receiving a Probe Request, the PNC checks the
destination ID (Dest_ID) field in the MAC header.

Algorithm (2)
• If the Dest_ID is not associated in the piconet, the PNC
send an Imm-ACK to the Src_DEV after SIFS, followed
by a PNC Information command with an empty
Information Element (IE) to notify the source that
destination does not exist.
• Otherwise, instead of ignoring the Probe Request frame,
the PNC waits for the Imm-ACK from the destination
DEV.
• If no Imm-ACK arrives after a backoff inter-frame space
(BIFS), which is the sum of a SIFS and a clear channel
assessment detect time (CCADetectTime), the PNC
realizes that the destination DEV cannot hear the source.
• The PNC then immediately send an Imm-ACK to the
source, followed by a PNC Information command with
the route information. (an optimized route information in
sent)

SRC_DEV send Probe
Request command to
DEST_DEV & PNC listens

SIFS
Imm-ACK

Probe Response command

SIFS (Imm-ACK)

PNC also listen

DEST_DEV
hears?

YES

DEST_DEV
responds

No
No

DEST_DEV
ID
Present?

Yes, Timeout (BIFS)

Send Imm-ACK & route
information to source

Yes and
DEST_DEV sent Imm-ACK

Do Nothing, monitor if
DEST_DEV crash.

Forward the data to
the router node

Algorithm (3)
[Route calculation]
• Most wireless networks today employ a multirate PHY (e.g., UWB in 802.15.3a) that
supports a set of data rate dependent
modulation/coding parameters.
• Due to the extremely low power consumption
requirement of WPAN devices, the achievable
data rate drops dramatically when the
distance increases.
• The data rate can be modeled as a discrete
function of transmission distance d between
two DEVs:

Algorithm (3)
Rate ( d )  S i ;
R i  1  d  R i ;1  i  m
where, R m

1

 0 , R i is the transmiss

and S 1 and S m are the minimum

ion range of rate S i ;

and maximum

data

rates, respective ly. If d is greater th an R 1, then Rate(d)
and the DEVs have no connectivi

ty

0

Algorithm (4)
• Since the PNC can monitor all commands exchanged
during the CAP, it can learn the data rates between
reachable DEV pairs and store them in an n x n rate
matrix (RM), where
• n is the total number of DEVs within the piconet. DEV
is assigned a unique DEV_ID in the piconet
RM ij is the link rate based on the current informatio
obtained

from the commands

DEV i and DEV j . RM

ij

exchanged

 0 if DEV i and DEV

are out of range or the rate informatio
not available

between

yet, and RM

ij

n is

  if i  j .

j

n

Algorithm (5)
• All DEVs transmit with the maximum
allowable power when sending data. Since the
wireless links are symmetric in nature, clearly
RMij = RMji.
• Based on the current rate information stored
in RM, for an unreachable pair DEVi and
DEVj, the PNC can determine the optimal
(two-hop) route that has the minimum
transmission time, i.e., the best route employs
DEVk for MAC layer forwarding, where k
minimizes:

Algorithm (6)
min(

1
RM



ik
k [ 0 , n  1 ]

1
RM

)
kj

• Alleviates the traffic load on the PNC
• Discovers a current optimal two-hop MAC layer
forwarding path given by existing rate information
without introducing any extra overhead
• If the connection is broken, the PNC can
immediately reroute the traffic to a current
optimal path, or terminate the connection by deallocating all corresponding CTAs.

Discussion
• Original case:
Causes
retransmission

• 3PHP: data sent via
2-hop route if
PNC_ID exists

Dest_ID

Dest_ID

• Normal Transmission (Imm_Ack)

• Normal Transmission (Imm_Ack)

XXX FRAME LOST XXXX

PNC_ID

• Causes retransmission

• Sent Via 2–hop route (Imm_Ack)

PNC

Src_DEV
PNC Info. Request command

Probe Request Command

BIFS
Imm-ACK
SIFS

PNC Information command with Route Info.

Imm-ACK

RIFS

Dest_DEV

SIFS

3PHP-Node

DEV – 1

DEV - 2

PNC

Observations
• With 3PHP, peer discovery requires only one
round of frame exchange.
• Fully utilized the broadcast nature,
centralized control, ad-hoc communication,
and efficient peer discovery.
• Save the futile back-off retransmission for
unreachable destination.
• Guaranteed full piconet connectivity. (no
network layer routing required)
• On demand routing
• More then BIFS waiting. (include RIFS) Conclusion

Performance Evaluations
[Intra-piconet no connection probability]
• Intra-piconet no
connection
probability

• Common Overlap
Area function
COLA(R, r, x):
Represent the
intersection of two
circles with radii R
and r (r e R),
respectively, which
centers are
separated by
distance x

Performance Evaluations (2)
[Intra-piconet no connection probability]

Performance Evaluations (3)
[Intra-piconet no connection probability]
• The probability of no direct connection
between two DEVs in a piconet is

Performance Evaluations (4)
[Peer Discovery delay analysis]


# of Frame Transmission




Expected
Contention Time



Expected Packet
Delay

Performance Evaluations (5)
[Peer Discovery delay analysis]


Expected routing
failure probability

• Expected successful peer discovery
delays are given by

Simulation and Numerical Results
• No connection probability as a function of
coverage range ratio

Simulation and Numerical Results (2)
• Peer discovery delay vs. conditional
collision probability

Simulation and Numerical Results (3)
• Piconet peer discovery time vs. coverage
range ratio

Simulation and Numerical Results (4)
• Piconet peer discovery failure probability
with standard method

Simulation and Numerical Results (5)
• Two-hop forwarding route optimization
ratio vs. piconet radius

Simulation and Numerical Results (6)
• Expected data between directly unreachable
pairs in piconets with 20 DEVs

Conclusion
• Underlying fact: peer-to-peer data delivery in
802.15.3 WPANs
• Existing MAC layer peer discovery methods
cannot guarantee full connectivity between
DEVs within a piconet through direct peerto-peer connections if the piconet operates
with a radius larger than half of the
maximum transmission distance. (~ 41.3%)
• If Mac fails, use the expensive network layer
routing.

Conclusion (2)
• Used the central control topology
• Routing in 2-hop with single round of
control frame exchange
• 3PHP achieves 25– 37% faster peer
discovery time over the standard MAC
• Route optimization algorithm in the PNC
to provide the best MAC layer forwarding
routes by self-learning the available rate
information between DEVs.

References


IEEE Standard 802.15.3, “Wireless medium access control (MAC) and physical
layer (PHY) specifications for high rate wireless personal area networks
(WPANs),”Sept. 2003.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery in IEEE 802.15.3 WPANs,”in Proc. IEEE BroadNets2005, Boston, MA,
Oct. 2005.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery and Route Optimization in IEEE 802.15.3WPANs,”accepted for
publication in ACM/KluwerJ. Mobile Networks and Applications, Nov. 2005.



Z. Yin and V.C.M. Leung, “Connection Data Rate Optimization of IEEE 802.15.3
Scatternetswith Multi-rate Carriers,”IEEE ICC’06, Istanbul, Turkey, June 2006.



Zhanping Yin and Victor C.M. Leung, “Introduction to IEEE 802.15.3 High Rate
Wireless Personal Area Network (WPAN)”, Electrical and Computer Engineering
University of British Columbia

Thank You



Slide 26

Third-Party Handshake Protocol for
Efficient Peer Discovery
and Route Optimization in
IEEE 802.15.3 WPANs
Authors:
Zhanping Yin * Victor C. M. Leung
Published:
ACM/ MONET 2006
Presented by:
Gautam S. Thakur

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

WPAN
• A WPAN (wireless personal area network) is a
personal area network - a network for
interconnecting devices centered around an
individual person's workspace
• A very short range ~10 mtrs. E.g. Bluetooth
• Proposed operating frequencies are around
2.4 GHz in digital modes.
• The objective is to facilitate seamless

operation among home or business devices
and systems.

Ultra-Wideband
• A physical layer technology
• For, short distance communication with high
data rate and short transmission range.
• Lower power requirement and pulsed data
• UWB transmission over extremely wide
unlicensed radio spectrum  3.1 – 10.6 GHz.
• Over results in
– Less interference
– Wire-like performance for indoor wireless
environment.

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Overview of 802.15.3
• Why 802.15.3 ?
• The 802.15.3 Wireless Space
• 802.15.3 Overview and Components

Overview of 802.15.3
[Why 802.15.3 ?]
• Motivated by the increasing demand of wireless
communications with






Ubiquitous network connectivity
Low cost and low power consumption -> WPAN
High data rate(HDR)
Quality of Service(QoS) support
Comparison with other short to medium range wireless
technologies
• Wireless LAN (WLAN)
– High cost and power consumption, no hard QoS guarantee

• WPANs-Bluetooth (802.15.1) and ZigBee(802.15.4)
– Data rate too low

• Applications of 802.15.3
– Virtual wireless multimedia connectivity
• Video/audio distribution

– High speed data transfer

Overview of 802.15.3
[ 802.15.3 = Wireless Multimedia ]

Overview of 802.15.3
[ The 802 Wireless Space ]

IEEE 802.15.3 Overview
• High date rate and low
power
• Mainly works within a
piconet with dynamic
DEV membership
• Ad hoc topology with
centralized control by
the PNC
• Connection oriented
peer-to-peer
communications
• Support for multimedia
quality of service(QoS)
• Multiple power
management modes
• Security

Formation of an 802.15.3 piconet
• The basic component
is the DEV
– One DEV is required to
assume the role of the
piconet coordinator
(PNC) of the piconet.
– The PNC provides the
basic timing sync for the
piconet with the beacon.
– Additionally, the PNC
manages the quality of
service (QoS)
requirements, power
save modes and access
control to the piconet.

Formation of an 802.15.3 piconet (2)
• PNC supports ad
hoc peer-to-peer
connections
• PNC provides
timing for
synchronization of
DEVs within the
piconet, performs
admission control,
allocates network
resources etc

Formation of a Piconet (3)
• All DEVs within radio coverage of the PNC
can then associate with it to form a piconet.
• Then starts the peer discovery.
• Some DEV pairs in the piconet may be out of

range of each other, and as a result, direct
peer-to-peer connection is unavailable
between them. This results in network layer
discovery methods

Superframe format
• Timing and data transmissions in the piconet
are based on the superframe
• The superframe has three parts
– Beacon: Control information, Allocates CTA,
Synchronization
– Contention Access Period (CAP): via CSMA/CA, file xfer
– Channel Time Allocation Period (CTAP)

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Peer discovery and connectivity issue
• An 802.15.3 piconet supports ad hoc
communications between peer DEVs.
• Peer discovery is crucial to its operation.
• The DEVs shall be able to obtain information
about the services and capabilities of other
DEVs in the piconet at any time by
information discovery commands.
• Peer information is needed before a source
DEV can send any data to a destination DEV,
or generate channel time requests (CTRq) to
the PNC.

1
2

5

3

4

6

9

7

8

10

13

11

14

12

15

PNC

Src_DEV

Dest_DEV

PNC Info. Request command
SIFS
Imm-ACK

SIFS
PNC Information command
SIFS
Imm-ACK
SIFS

Probe Request Command
SIFS
Imm-ACK
SIFS
Probe Response Command
SIFS
Imm-ACK
RIFS

1. NOT receive the Imm-Ack
2. Cannot distinguish out-of-range
transmission and collision
3. Perform backoff retransmission
for collision repeatedly

DEV – 1

PNC

Dev 2 is outside the
range of Dev1 and
vise-versa

1. NOT receive Probe Request
command

DEV - 2

Existing Issues with IEEE 802.15.3











Peer discovery is crucial to piconet
operations.
Standard peer discovery is
unreliable and leads to substantial
delays for unreachable DEV pairs
Full piconet connectivity is not
guaranteed with only direct peerto-peer communications
The standard 802.15.3 MAC does
not take advantage of the unique
ranging capabilities enabled by
UWB
Connections are in peer-to-peer
manner without consider of
possible route optimizations
MAC modeling and performance
evaluation
Stream time scheduling methods
not defined in the standard





DEV_1 cannot communicate with
DEV_4 in peer-to-peer manner
For traffic between DEV_1 and
DEV_3, is it better to forward via
PNC than the direct connection?
What is the optimal path and data
rate between DEV_3 and DEV_5?

Using network layer routing
• Each hop request a
CTA slot seperately.
• PNC treat each hop as
independent traffic
stream

• Effect: Failure in an
intermediate hop
breaks the
connections, but PNC
assumes that an
independent stream is
terminated. Keeps
allocating CTAs for
other hops untill it is
eventually notified by
all participating DEV

Using MAC layer forwarding
• With explicit MAC
layer forwarding,
PNC knows that
these hops belongs
to one connection.
• Better adjusting
downstream and
upstream CTAs.

• Effect: reroute the
traffic is the
intermediate node
fails, and releasing
all CTAs if source
of destination
terminates.

Some Observations
• Peer discover is essential
to piconet operations
and communication
between DEVs
• Full piconet connectivity
cannot be guaranteed
• Some DEV pairs may be
out of range of each
other
• Mac layer routing fails
but is better then IP
routing.

• Remember, 802.15.3 has
centralized topology. So
what ??
• Using PNC, any devices
is two-hop count away
only.
• Can use the central
management capability
to discover simpler and
less costly MAC route

Proposed peer discovery protocol
with forwarding route optimization
• The PNC can always act as a first hop to
connect non-intersecting range DEVs
• However, a betterment can be done in the
frame forwarding by choosing another
DEV closer in distance to the source and
destination to forward the frame.
• All routes are limited to two hops only.

Algorithm
• If the Desti_DEV is reachable, sending PNC
Information Request and Response exchange is
redundant.
• So, Src_DEV send Probe Request command to the
Dest_DEV.
• If Dest_DEV receives the command, it returns an
Imm-ACK after a SIFS and then the Probe Response
command as in standard protocol operations.
• At the same time, the third party, i.e., the PNC, shall
actively monitor the frame exchange.
• Upon receiving a Probe Request, the PNC checks the
destination ID (Dest_ID) field in the MAC header.

Algorithm (2)
• If the Dest_ID is not associated in the piconet, the PNC
send an Imm-ACK to the Src_DEV after SIFS, followed
by a PNC Information command with an empty
Information Element (IE) to notify the source that
destination does not exist.
• Otherwise, instead of ignoring the Probe Request frame,
the PNC waits for the Imm-ACK from the destination
DEV.
• If no Imm-ACK arrives after a backoff inter-frame space
(BIFS), which is the sum of a SIFS and a clear channel
assessment detect time (CCADetectTime), the PNC
realizes that the destination DEV cannot hear the source.
• The PNC then immediately send an Imm-ACK to the
source, followed by a PNC Information command with
the route information. (an optimized route information in
sent)

SRC_DEV send Probe
Request command to
DEST_DEV & PNC listens

SIFS
Imm-ACK

Probe Response command

SIFS (Imm-ACK)

PNC also listen

DEST_DEV
hears?

YES

DEST_DEV
responds

No
No

DEST_DEV
ID
Present?

Yes, Timeout (BIFS)

Send Imm-ACK & route
information to source

Yes and
DEST_DEV sent Imm-ACK

Do Nothing, monitor if
DEST_DEV crash.

Forward the data to
the router node

Algorithm (3)
[Route calculation]
• Most wireless networks today employ a multirate PHY (e.g., UWB in 802.15.3a) that
supports a set of data rate dependent
modulation/coding parameters.
• Due to the extremely low power consumption
requirement of WPAN devices, the achievable
data rate drops dramatically when the
distance increases.
• The data rate can be modeled as a discrete
function of transmission distance d between
two DEVs:

Algorithm (3)
Rate ( d )  S i ;
R i  1  d  R i ;1  i  m
where, R m

1

 0 , R i is the transmiss

and S 1 and S m are the minimum

ion range of rate S i ;

and maximum

data

rates, respective ly. If d is greater th an R 1, then Rate(d)
and the DEVs have no connectivi

ty

0

Algorithm (4)
• Since the PNC can monitor all commands exchanged
during the CAP, it can learn the data rates between
reachable DEV pairs and store them in an n x n rate
matrix (RM), where
• n is the total number of DEVs within the piconet. DEV
is assigned a unique DEV_ID in the piconet
RM ij is the link rate based on the current informatio
obtained

from the commands

DEV i and DEV j . RM

ij

exchanged

 0 if DEV i and DEV

are out of range or the rate informatio
not available

between

yet, and RM

ij

n is

  if i  j .

j

n

Algorithm (5)
• All DEVs transmit with the maximum
allowable power when sending data. Since the
wireless links are symmetric in nature, clearly
RMij = RMji.
• Based on the current rate information stored
in RM, for an unreachable pair DEVi and
DEVj, the PNC can determine the optimal
(two-hop) route that has the minimum
transmission time, i.e., the best route employs
DEVk for MAC layer forwarding, where k
minimizes:

Algorithm (6)
min(

1
RM



ik
k [ 0 , n  1 ]

1
RM

)
kj

• Alleviates the traffic load on the PNC
• Discovers a current optimal two-hop MAC layer
forwarding path given by existing rate information
without introducing any extra overhead
• If the connection is broken, the PNC can
immediately reroute the traffic to a current
optimal path, or terminate the connection by deallocating all corresponding CTAs.

Discussion
• Original case:
Causes
retransmission

• 3PHP: data sent via
2-hop route if
PNC_ID exists

Dest_ID

Dest_ID

• Normal Transmission (Imm_Ack)

• Normal Transmission (Imm_Ack)

XXX FRAME LOST XXXX

PNC_ID

• Causes retransmission

• Sent Via 2–hop route (Imm_Ack)

PNC

Src_DEV
PNC Info. Request command

Probe Request Command

BIFS
Imm-ACK
SIFS

PNC Information command with Route Info.

Imm-ACK

RIFS

Dest_DEV

SIFS

3PHP-Node

DEV – 1

DEV - 2

PNC

Observations
• With 3PHP, peer discovery requires only one
round of frame exchange.
• Fully utilized the broadcast nature,
centralized control, ad-hoc communication,
and efficient peer discovery.
• Save the futile back-off retransmission for
unreachable destination.
• Guaranteed full piconet connectivity. (no
network layer routing required)
• On demand routing
• More then BIFS waiting. (include RIFS) Conclusion

Performance Evaluations
[Intra-piconet no connection probability]
• Intra-piconet no
connection
probability

• Common Overlap
Area function
COLA(R, r, x):
Represent the
intersection of two
circles with radii R
and r (r e R),
respectively, which
centers are
separated by
distance x

Performance Evaluations (2)
[Intra-piconet no connection probability]

Performance Evaluations (3)
[Intra-piconet no connection probability]
• The probability of no direct connection
between two DEVs in a piconet is

Performance Evaluations (4)
[Peer Discovery delay analysis]


# of Frame Transmission




Expected
Contention Time



Expected Packet
Delay

Performance Evaluations (5)
[Peer Discovery delay analysis]


Expected routing
failure probability

• Expected successful peer discovery
delays are given by

Simulation and Numerical Results
• No connection probability as a function of
coverage range ratio

Simulation and Numerical Results (2)
• Peer discovery delay vs. conditional
collision probability

Simulation and Numerical Results (3)
• Piconet peer discovery time vs. coverage
range ratio

Simulation and Numerical Results (4)
• Piconet peer discovery failure probability
with standard method

Simulation and Numerical Results (5)
• Two-hop forwarding route optimization
ratio vs. piconet radius

Simulation and Numerical Results (6)
• Expected data between directly unreachable
pairs in piconets with 20 DEVs

Conclusion
• Underlying fact: peer-to-peer data delivery in
802.15.3 WPANs
• Existing MAC layer peer discovery methods
cannot guarantee full connectivity between
DEVs within a piconet through direct peerto-peer connections if the piconet operates
with a radius larger than half of the
maximum transmission distance. (~ 41.3%)
• If Mac fails, use the expensive network layer
routing.

Conclusion (2)
• Used the central control topology
• Routing in 2-hop with single round of
control frame exchange
• 3PHP achieves 25– 37% faster peer
discovery time over the standard MAC
• Route optimization algorithm in the PNC
to provide the best MAC layer forwarding
routes by self-learning the available rate
information between DEVs.

References


IEEE Standard 802.15.3, “Wireless medium access control (MAC) and physical
layer (PHY) specifications for high rate wireless personal area networks
(WPANs),”Sept. 2003.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery in IEEE 802.15.3 WPANs,”in Proc. IEEE BroadNets2005, Boston, MA,
Oct. 2005.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery and Route Optimization in IEEE 802.15.3WPANs,”accepted for
publication in ACM/KluwerJ. Mobile Networks and Applications, Nov. 2005.



Z. Yin and V.C.M. Leung, “Connection Data Rate Optimization of IEEE 802.15.3
Scatternetswith Multi-rate Carriers,”IEEE ICC’06, Istanbul, Turkey, June 2006.



Zhanping Yin and Victor C.M. Leung, “Introduction to IEEE 802.15.3 High Rate
Wireless Personal Area Network (WPAN)”, Electrical and Computer Engineering
University of British Columbia

Thank You



Slide 27

Third-Party Handshake Protocol for
Efficient Peer Discovery
and Route Optimization in
IEEE 802.15.3 WPANs
Authors:
Zhanping Yin * Victor C. M. Leung
Published:
ACM/ MONET 2006
Presented by:
Gautam S. Thakur

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

WPAN
• A WPAN (wireless personal area network) is a
personal area network - a network for
interconnecting devices centered around an
individual person's workspace
• A very short range ~10 mtrs. E.g. Bluetooth
• Proposed operating frequencies are around
2.4 GHz in digital modes.
• The objective is to facilitate seamless

operation among home or business devices
and systems.

Ultra-Wideband
• A physical layer technology
• For, short distance communication with high
data rate and short transmission range.
• Lower power requirement and pulsed data
• UWB transmission over extremely wide
unlicensed radio spectrum  3.1 – 10.6 GHz.
• Over results in
– Less interference
– Wire-like performance for indoor wireless
environment.

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Overview of 802.15.3
• Why 802.15.3 ?
• The 802.15.3 Wireless Space
• 802.15.3 Overview and Components

Overview of 802.15.3
[Why 802.15.3 ?]
• Motivated by the increasing demand of wireless
communications with






Ubiquitous network connectivity
Low cost and low power consumption -> WPAN
High data rate(HDR)
Quality of Service(QoS) support
Comparison with other short to medium range wireless
technologies
• Wireless LAN (WLAN)
– High cost and power consumption, no hard QoS guarantee

• WPANs-Bluetooth (802.15.1) and ZigBee(802.15.4)
– Data rate too low

• Applications of 802.15.3
– Virtual wireless multimedia connectivity
• Video/audio distribution

– High speed data transfer

Overview of 802.15.3
[ 802.15.3 = Wireless Multimedia ]

Overview of 802.15.3
[ The 802 Wireless Space ]

IEEE 802.15.3 Overview
• High date rate and low
power
• Mainly works within a
piconet with dynamic
DEV membership
• Ad hoc topology with
centralized control by
the PNC
• Connection oriented
peer-to-peer
communications
• Support for multimedia
quality of service(QoS)
• Multiple power
management modes
• Security

Formation of an 802.15.3 piconet
• The basic component
is the DEV
– One DEV is required to
assume the role of the
piconet coordinator
(PNC) of the piconet.
– The PNC provides the
basic timing sync for the
piconet with the beacon.
– Additionally, the PNC
manages the quality of
service (QoS)
requirements, power
save modes and access
control to the piconet.

Formation of an 802.15.3 piconet (2)
• PNC supports ad
hoc peer-to-peer
connections
• PNC provides
timing for
synchronization of
DEVs within the
piconet, performs
admission control,
allocates network
resources etc

Formation of a Piconet (3)
• All DEVs within radio coverage of the PNC
can then associate with it to form a piconet.
• Then starts the peer discovery.
• Some DEV pairs in the piconet may be out of

range of each other, and as a result, direct
peer-to-peer connection is unavailable
between them. This results in network layer
discovery methods

Superframe format
• Timing and data transmissions in the piconet
are based on the superframe
• The superframe has three parts
– Beacon: Control information, Allocates CTA,
Synchronization
– Contention Access Period (CAP): via CSMA/CA, file xfer
– Channel Time Allocation Period (CTAP)

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Peer discovery and connectivity issue
• An 802.15.3 piconet supports ad hoc
communications between peer DEVs.
• Peer discovery is crucial to its operation.
• The DEVs shall be able to obtain information
about the services and capabilities of other
DEVs in the piconet at any time by
information discovery commands.
• Peer information is needed before a source
DEV can send any data to a destination DEV,
or generate channel time requests (CTRq) to
the PNC.

1
2

5

3

4

6

9

7

8

10

13

11

14

12

15

PNC

Src_DEV

Dest_DEV

PNC Info. Request command
SIFS
Imm-ACK

SIFS
PNC Information command
SIFS
Imm-ACK
SIFS

Probe Request Command
SIFS
Imm-ACK
SIFS
Probe Response Command
SIFS
Imm-ACK
RIFS

1. NOT receive the Imm-Ack
2. Cannot distinguish out-of-range
transmission and collision
3. Perform backoff retransmission
for collision repeatedly

DEV – 1

PNC

Dev 2 is outside the
range of Dev1 and
vise-versa

1. NOT receive Probe Request
command

DEV - 2

Existing Issues with IEEE 802.15.3











Peer discovery is crucial to piconet
operations.
Standard peer discovery is
unreliable and leads to substantial
delays for unreachable DEV pairs
Full piconet connectivity is not
guaranteed with only direct peerto-peer communications
The standard 802.15.3 MAC does
not take advantage of the unique
ranging capabilities enabled by
UWB
Connections are in peer-to-peer
manner without consider of
possible route optimizations
MAC modeling and performance
evaluation
Stream time scheduling methods
not defined in the standard





DEV_1 cannot communicate with
DEV_4 in peer-to-peer manner
For traffic between DEV_1 and
DEV_3, is it better to forward via
PNC than the direct connection?
What is the optimal path and data
rate between DEV_3 and DEV_5?

Using network layer routing
• Each hop request a
CTA slot seperately.
• PNC treat each hop as
independent traffic
stream

• Effect: Failure in an
intermediate hop
breaks the
connections, but PNC
assumes that an
independent stream is
terminated. Keeps
allocating CTAs for
other hops untill it is
eventually notified by
all participating DEV

Using MAC layer forwarding
• With explicit MAC
layer forwarding,
PNC knows that
these hops belongs
to one connection.
• Better adjusting
downstream and
upstream CTAs.

• Effect: reroute the
traffic is the
intermediate node
fails, and releasing
all CTAs if source
of destination
terminates.

Some Observations
• Peer discover is essential
to piconet operations
and communication
between DEVs
• Full piconet connectivity
cannot be guaranteed
• Some DEV pairs may be
out of range of each
other
• Mac layer routing fails
but is better then IP
routing.

• Remember, 802.15.3 has
centralized topology. So
what ??
• Using PNC, any devices
is two-hop count away
only.
• Can use the central
management capability
to discover simpler and
less costly MAC route

Proposed peer discovery protocol
with forwarding route optimization
• The PNC can always act as a first hop to
connect non-intersecting range DEVs
• However, a betterment can be done in the
frame forwarding by choosing another
DEV closer in distance to the source and
destination to forward the frame.
• All routes are limited to two hops only.

Algorithm
• If the Desti_DEV is reachable, sending PNC
Information Request and Response exchange is
redundant.
• So, Src_DEV send Probe Request command to the
Dest_DEV.
• If Dest_DEV receives the command, it returns an
Imm-ACK after a SIFS and then the Probe Response
command as in standard protocol operations.
• At the same time, the third party, i.e., the PNC, shall
actively monitor the frame exchange.
• Upon receiving a Probe Request, the PNC checks the
destination ID (Dest_ID) field in the MAC header.

Algorithm (2)
• If the Dest_ID is not associated in the piconet, the PNC
send an Imm-ACK to the Src_DEV after SIFS, followed
by a PNC Information command with an empty
Information Element (IE) to notify the source that
destination does not exist.
• Otherwise, instead of ignoring the Probe Request frame,
the PNC waits for the Imm-ACK from the destination
DEV.
• If no Imm-ACK arrives after a backoff inter-frame space
(BIFS), which is the sum of a SIFS and a clear channel
assessment detect time (CCADetectTime), the PNC
realizes that the destination DEV cannot hear the source.
• The PNC then immediately send an Imm-ACK to the
source, followed by a PNC Information command with
the route information. (an optimized route information in
sent)

SRC_DEV send Probe
Request command to
DEST_DEV & PNC listens

SIFS
Imm-ACK

Probe Response command

SIFS (Imm-ACK)

PNC also listen

DEST_DEV
hears?

YES

DEST_DEV
responds

No
No

DEST_DEV
ID
Present?

Yes, Timeout (BIFS)

Send Imm-ACK & route
information to source

Yes and
DEST_DEV sent Imm-ACK

Do Nothing, monitor if
DEST_DEV crash.

Forward the data to
the router node

Algorithm (3)
[Route calculation]
• Most wireless networks today employ a multirate PHY (e.g., UWB in 802.15.3a) that
supports a set of data rate dependent
modulation/coding parameters.
• Due to the extremely low power consumption
requirement of WPAN devices, the achievable
data rate drops dramatically when the
distance increases.
• The data rate can be modeled as a discrete
function of transmission distance d between
two DEVs:

Algorithm (3)
Rate ( d )  S i ;
R i  1  d  R i ;1  i  m
where, R m

1

 0 , R i is the transmiss

and S 1 and S m are the minimum

ion range of rate S i ;

and maximum

data

rates, respective ly. If d is greater th an R 1, then Rate(d)
and the DEVs have no connectivi

ty

0

Algorithm (4)
• Since the PNC can monitor all commands exchanged
during the CAP, it can learn the data rates between
reachable DEV pairs and store them in an n x n rate
matrix (RM), where
• n is the total number of DEVs within the piconet. DEV
is assigned a unique DEV_ID in the piconet
RM ij is the link rate based on the current informatio
obtained

from the commands

DEV i and DEV j . RM

ij

exchanged

 0 if DEV i and DEV

are out of range or the rate informatio
not available

between

yet, and RM

ij

n is

  if i  j .

j

n

Algorithm (5)
• All DEVs transmit with the maximum
allowable power when sending data. Since the
wireless links are symmetric in nature, clearly
RMij = RMji.
• Based on the current rate information stored
in RM, for an unreachable pair DEVi and
DEVj, the PNC can determine the optimal
(two-hop) route that has the minimum
transmission time, i.e., the best route employs
DEVk for MAC layer forwarding, where k
minimizes:

Algorithm (6)
min(

1
RM



ik
k [ 0 , n  1 ]

1
RM

)
kj

• Alleviates the traffic load on the PNC
• Discovers a current optimal two-hop MAC layer
forwarding path given by existing rate information
without introducing any extra overhead
• If the connection is broken, the PNC can
immediately reroute the traffic to a current
optimal path, or terminate the connection by deallocating all corresponding CTAs.

Discussion
• Original case:
Causes
retransmission

• 3PHP: data sent via
2-hop route if
PNC_ID exists

Dest_ID

Dest_ID

• Normal Transmission (Imm_Ack)

• Normal Transmission (Imm_Ack)

XXX FRAME LOST XXXX

PNC_ID

• Causes retransmission

• Sent Via 2–hop route (Imm_Ack)

PNC

Src_DEV
PNC Info. Request command

Probe Request Command

BIFS
Imm-ACK
SIFS

PNC Information command with Route Info.

Imm-ACK

RIFS

Dest_DEV

SIFS

3PHP-Node

DEV – 1

DEV - 2

PNC

Observations
• With 3PHP, peer discovery requires only one
round of frame exchange.
• Fully utilized the broadcast nature,
centralized control, ad-hoc communication,
and efficient peer discovery.
• Save the futile back-off retransmission for
unreachable destination.
• Guaranteed full piconet connectivity. (no
network layer routing required)
• On demand routing
• More then BIFS waiting. (include RIFS) Conclusion

Performance Evaluations
[Intra-piconet no connection probability]
• Intra-piconet no
connection
probability

• Common Overlap
Area function
COLA(R, r, x):
Represent the
intersection of two
circles with radii R
and r (r e R),
respectively, which
centers are
separated by
distance x

Performance Evaluations (2)
[Intra-piconet no connection probability]

Performance Evaluations (3)
[Intra-piconet no connection probability]
• The probability of no direct connection
between two DEVs in a piconet is

Performance Evaluations (4)
[Peer Discovery delay analysis]


# of Frame Transmission




Expected
Contention Time



Expected Packet
Delay

Performance Evaluations (5)
[Peer Discovery delay analysis]


Expected routing
failure probability

• Expected successful peer discovery
delays are given by

Simulation and Numerical Results
• No connection probability as a function of
coverage range ratio

Simulation and Numerical Results (2)
• Peer discovery delay vs. conditional
collision probability

Simulation and Numerical Results (3)
• Piconet peer discovery time vs. coverage
range ratio

Simulation and Numerical Results (4)
• Piconet peer discovery failure probability
with standard method

Simulation and Numerical Results (5)
• Two-hop forwarding route optimization
ratio vs. piconet radius

Simulation and Numerical Results (6)
• Expected data between directly unreachable
pairs in piconets with 20 DEVs

Conclusion
• Underlying fact: peer-to-peer data delivery in
802.15.3 WPANs
• Existing MAC layer peer discovery methods
cannot guarantee full connectivity between
DEVs within a piconet through direct peerto-peer connections if the piconet operates
with a radius larger than half of the
maximum transmission distance. (~ 41.3%)
• If Mac fails, use the expensive network layer
routing.

Conclusion (2)
• Used the central control topology
• Routing in 2-hop with single round of
control frame exchange
• 3PHP achieves 25– 37% faster peer
discovery time over the standard MAC
• Route optimization algorithm in the PNC
to provide the best MAC layer forwarding
routes by self-learning the available rate
information between DEVs.

References


IEEE Standard 802.15.3, “Wireless medium access control (MAC) and physical
layer (PHY) specifications for high rate wireless personal area networks
(WPANs),”Sept. 2003.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery in IEEE 802.15.3 WPANs,”in Proc. IEEE BroadNets2005, Boston, MA,
Oct. 2005.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery and Route Optimization in IEEE 802.15.3WPANs,”accepted for
publication in ACM/KluwerJ. Mobile Networks and Applications, Nov. 2005.



Z. Yin and V.C.M. Leung, “Connection Data Rate Optimization of IEEE 802.15.3
Scatternetswith Multi-rate Carriers,”IEEE ICC’06, Istanbul, Turkey, June 2006.



Zhanping Yin and Victor C.M. Leung, “Introduction to IEEE 802.15.3 High Rate
Wireless Personal Area Network (WPAN)”, Electrical and Computer Engineering
University of British Columbia

Thank You



Slide 28

Third-Party Handshake Protocol for
Efficient Peer Discovery
and Route Optimization in
IEEE 802.15.3 WPANs
Authors:
Zhanping Yin * Victor C. M. Leung
Published:
ACM/ MONET 2006
Presented by:
Gautam S. Thakur

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

WPAN
• A WPAN (wireless personal area network) is a
personal area network - a network for
interconnecting devices centered around an
individual person's workspace
• A very short range ~10 mtrs. E.g. Bluetooth
• Proposed operating frequencies are around
2.4 GHz in digital modes.
• The objective is to facilitate seamless

operation among home or business devices
and systems.

Ultra-Wideband
• A physical layer technology
• For, short distance communication with high
data rate and short transmission range.
• Lower power requirement and pulsed data
• UWB transmission over extremely wide
unlicensed radio spectrum  3.1 – 10.6 GHz.
• Over results in
– Less interference
– Wire-like performance for indoor wireless
environment.

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Overview of 802.15.3
• Why 802.15.3 ?
• The 802.15.3 Wireless Space
• 802.15.3 Overview and Components

Overview of 802.15.3
[Why 802.15.3 ?]
• Motivated by the increasing demand of wireless
communications with






Ubiquitous network connectivity
Low cost and low power consumption -> WPAN
High data rate(HDR)
Quality of Service(QoS) support
Comparison with other short to medium range wireless
technologies
• Wireless LAN (WLAN)
– High cost and power consumption, no hard QoS guarantee

• WPANs-Bluetooth (802.15.1) and ZigBee(802.15.4)
– Data rate too low

• Applications of 802.15.3
– Virtual wireless multimedia connectivity
• Video/audio distribution

– High speed data transfer

Overview of 802.15.3
[ 802.15.3 = Wireless Multimedia ]

Overview of 802.15.3
[ The 802 Wireless Space ]

IEEE 802.15.3 Overview
• High date rate and low
power
• Mainly works within a
piconet with dynamic
DEV membership
• Ad hoc topology with
centralized control by
the PNC
• Connection oriented
peer-to-peer
communications
• Support for multimedia
quality of service(QoS)
• Multiple power
management modes
• Security

Formation of an 802.15.3 piconet
• The basic component
is the DEV
– One DEV is required to
assume the role of the
piconet coordinator
(PNC) of the piconet.
– The PNC provides the
basic timing sync for the
piconet with the beacon.
– Additionally, the PNC
manages the quality of
service (QoS)
requirements, power
save modes and access
control to the piconet.

Formation of an 802.15.3 piconet (2)
• PNC supports ad
hoc peer-to-peer
connections
• PNC provides
timing for
synchronization of
DEVs within the
piconet, performs
admission control,
allocates network
resources etc

Formation of a Piconet (3)
• All DEVs within radio coverage of the PNC
can then associate with it to form a piconet.
• Then starts the peer discovery.
• Some DEV pairs in the piconet may be out of

range of each other, and as a result, direct
peer-to-peer connection is unavailable
between them. This results in network layer
discovery methods

Superframe format
• Timing and data transmissions in the piconet
are based on the superframe
• The superframe has three parts
– Beacon: Control information, Allocates CTA,
Synchronization
– Contention Access Period (CAP): via CSMA/CA, file xfer
– Channel Time Allocation Period (CTAP)

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Peer discovery and connectivity issue
• An 802.15.3 piconet supports ad hoc
communications between peer DEVs.
• Peer discovery is crucial to its operation.
• The DEVs shall be able to obtain information
about the services and capabilities of other
DEVs in the piconet at any time by
information discovery commands.
• Peer information is needed before a source
DEV can send any data to a destination DEV,
or generate channel time requests (CTRq) to
the PNC.

1
2

5

3

4

6

9

7

8

10

13

11

14

12

15

PNC

Src_DEV

Dest_DEV

PNC Info. Request command
SIFS
Imm-ACK

SIFS
PNC Information command
SIFS
Imm-ACK
SIFS

Probe Request Command
SIFS
Imm-ACK
SIFS
Probe Response Command
SIFS
Imm-ACK
RIFS

1. NOT receive the Imm-Ack
2. Cannot distinguish out-of-range
transmission and collision
3. Perform backoff retransmission
for collision repeatedly

DEV – 1

PNC

Dev 2 is outside the
range of Dev1 and
vise-versa

1. NOT receive Probe Request
command

DEV - 2

Existing Issues with IEEE 802.15.3











Peer discovery is crucial to piconet
operations.
Standard peer discovery is
unreliable and leads to substantial
delays for unreachable DEV pairs
Full piconet connectivity is not
guaranteed with only direct peerto-peer communications
The standard 802.15.3 MAC does
not take advantage of the unique
ranging capabilities enabled by
UWB
Connections are in peer-to-peer
manner without consider of
possible route optimizations
MAC modeling and performance
evaluation
Stream time scheduling methods
not defined in the standard





DEV_1 cannot communicate with
DEV_4 in peer-to-peer manner
For traffic between DEV_1 and
DEV_3, is it better to forward via
PNC than the direct connection?
What is the optimal path and data
rate between DEV_3 and DEV_5?

Using network layer routing
• Each hop request a
CTA slot seperately.
• PNC treat each hop as
independent traffic
stream

• Effect: Failure in an
intermediate hop
breaks the
connections, but PNC
assumes that an
independent stream is
terminated. Keeps
allocating CTAs for
other hops untill it is
eventually notified by
all participating DEV

Using MAC layer forwarding
• With explicit MAC
layer forwarding,
PNC knows that
these hops belongs
to one connection.
• Better adjusting
downstream and
upstream CTAs.

• Effect: reroute the
traffic is the
intermediate node
fails, and releasing
all CTAs if source
of destination
terminates.

Some Observations
• Peer discover is essential
to piconet operations
and communication
between DEVs
• Full piconet connectivity
cannot be guaranteed
• Some DEV pairs may be
out of range of each
other
• Mac layer routing fails
but is better then IP
routing.

• Remember, 802.15.3 has
centralized topology. So
what ??
• Using PNC, any devices
is two-hop count away
only.
• Can use the central
management capability
to discover simpler and
less costly MAC route

Proposed peer discovery protocol
with forwarding route optimization
• The PNC can always act as a first hop to
connect non-intersecting range DEVs
• However, a betterment can be done in the
frame forwarding by choosing another
DEV closer in distance to the source and
destination to forward the frame.
• All routes are limited to two hops only.

Algorithm
• If the Desti_DEV is reachable, sending PNC
Information Request and Response exchange is
redundant.
• So, Src_DEV send Probe Request command to the
Dest_DEV.
• If Dest_DEV receives the command, it returns an
Imm-ACK after a SIFS and then the Probe Response
command as in standard protocol operations.
• At the same time, the third party, i.e., the PNC, shall
actively monitor the frame exchange.
• Upon receiving a Probe Request, the PNC checks the
destination ID (Dest_ID) field in the MAC header.

Algorithm (2)
• If the Dest_ID is not associated in the piconet, the PNC
send an Imm-ACK to the Src_DEV after SIFS, followed
by a PNC Information command with an empty
Information Element (IE) to notify the source that
destination does not exist.
• Otherwise, instead of ignoring the Probe Request frame,
the PNC waits for the Imm-ACK from the destination
DEV.
• If no Imm-ACK arrives after a backoff inter-frame space
(BIFS), which is the sum of a SIFS and a clear channel
assessment detect time (CCADetectTime), the PNC
realizes that the destination DEV cannot hear the source.
• The PNC then immediately send an Imm-ACK to the
source, followed by a PNC Information command with
the route information. (an optimized route information in
sent)

SRC_DEV send Probe
Request command to
DEST_DEV & PNC listens

SIFS
Imm-ACK

Probe Response command

SIFS (Imm-ACK)

PNC also listen

DEST_DEV
hears?

YES

DEST_DEV
responds

No
No

DEST_DEV
ID
Present?

Yes, Timeout (BIFS)

Send Imm-ACK & route
information to source

Yes and
DEST_DEV sent Imm-ACK

Do Nothing, monitor if
DEST_DEV crash.

Forward the data to
the router node

Algorithm (3)
[Route calculation]
• Most wireless networks today employ a multirate PHY (e.g., UWB in 802.15.3a) that
supports a set of data rate dependent
modulation/coding parameters.
• Due to the extremely low power consumption
requirement of WPAN devices, the achievable
data rate drops dramatically when the
distance increases.
• The data rate can be modeled as a discrete
function of transmission distance d between
two DEVs:

Algorithm (3)
Rate ( d )  S i ;
R i  1  d  R i ;1  i  m
where, R m

1

 0 , R i is the transmiss

and S 1 and S m are the minimum

ion range of rate S i ;

and maximum

data

rates, respective ly. If d is greater th an R 1, then Rate(d)
and the DEVs have no connectivi

ty

0

Algorithm (4)
• Since the PNC can monitor all commands exchanged
during the CAP, it can learn the data rates between
reachable DEV pairs and store them in an n x n rate
matrix (RM), where
• n is the total number of DEVs within the piconet. DEV
is assigned a unique DEV_ID in the piconet
RM ij is the link rate based on the current informatio
obtained

from the commands

DEV i and DEV j . RM

ij

exchanged

 0 if DEV i and DEV

are out of range or the rate informatio
not available

between

yet, and RM

ij

n is

  if i  j .

j

n

Algorithm (5)
• All DEVs transmit with the maximum
allowable power when sending data. Since the
wireless links are symmetric in nature, clearly
RMij = RMji.
• Based on the current rate information stored
in RM, for an unreachable pair DEVi and
DEVj, the PNC can determine the optimal
(two-hop) route that has the minimum
transmission time, i.e., the best route employs
DEVk for MAC layer forwarding, where k
minimizes:

Algorithm (6)
min(

1
RM



ik
k [ 0 , n  1 ]

1
RM

)
kj

• Alleviates the traffic load on the PNC
• Discovers a current optimal two-hop MAC layer
forwarding path given by existing rate information
without introducing any extra overhead
• If the connection is broken, the PNC can
immediately reroute the traffic to a current
optimal path, or terminate the connection by deallocating all corresponding CTAs.

Discussion
• Original case:
Causes
retransmission

• 3PHP: data sent via
2-hop route if
PNC_ID exists

Dest_ID

Dest_ID

• Normal Transmission (Imm_Ack)

• Normal Transmission (Imm_Ack)

XXX FRAME LOST XXXX

PNC_ID

• Causes retransmission

• Sent Via 2–hop route (Imm_Ack)

PNC

Src_DEV
PNC Info. Request command

Probe Request Command

BIFS
Imm-ACK
SIFS

PNC Information command with Route Info.

Imm-ACK

RIFS

Dest_DEV

SIFS

3PHP-Node

DEV – 1

DEV - 2

PNC

Observations
• With 3PHP, peer discovery requires only one
round of frame exchange.
• Fully utilized the broadcast nature,
centralized control, ad-hoc communication,
and efficient peer discovery.
• Save the futile back-off retransmission for
unreachable destination.
• Guaranteed full piconet connectivity. (no
network layer routing required)
• On demand routing
• More then BIFS waiting. (include RIFS) Conclusion

Performance Evaluations
[Intra-piconet no connection probability]
• Intra-piconet no
connection
probability

• Common Overlap
Area function
COLA(R, r, x):
Represent the
intersection of two
circles with radii R
and r (r e R),
respectively, which
centers are
separated by
distance x

Performance Evaluations (2)
[Intra-piconet no connection probability]

Performance Evaluations (3)
[Intra-piconet no connection probability]
• The probability of no direct connection
between two DEVs in a piconet is

Performance Evaluations (4)
[Peer Discovery delay analysis]


# of Frame Transmission




Expected
Contention Time



Expected Packet
Delay

Performance Evaluations (5)
[Peer Discovery delay analysis]


Expected routing
failure probability

• Expected successful peer discovery
delays are given by

Simulation and Numerical Results
• No connection probability as a function of
coverage range ratio

Simulation and Numerical Results (2)
• Peer discovery delay vs. conditional
collision probability

Simulation and Numerical Results (3)
• Piconet peer discovery time vs. coverage
range ratio

Simulation and Numerical Results (4)
• Piconet peer discovery failure probability
with standard method

Simulation and Numerical Results (5)
• Two-hop forwarding route optimization
ratio vs. piconet radius

Simulation and Numerical Results (6)
• Expected data between directly unreachable
pairs in piconets with 20 DEVs

Conclusion
• Underlying fact: peer-to-peer data delivery in
802.15.3 WPANs
• Existing MAC layer peer discovery methods
cannot guarantee full connectivity between
DEVs within a piconet through direct peerto-peer connections if the piconet operates
with a radius larger than half of the
maximum transmission distance. (~ 41.3%)
• If Mac fails, use the expensive network layer
routing.

Conclusion (2)
• Used the central control topology
• Routing in 2-hop with single round of
control frame exchange
• 3PHP achieves 25– 37% faster peer
discovery time over the standard MAC
• Route optimization algorithm in the PNC
to provide the best MAC layer forwarding
routes by self-learning the available rate
information between DEVs.

References


IEEE Standard 802.15.3, “Wireless medium access control (MAC) and physical
layer (PHY) specifications for high rate wireless personal area networks
(WPANs),”Sept. 2003.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery in IEEE 802.15.3 WPANs,”in Proc. IEEE BroadNets2005, Boston, MA,
Oct. 2005.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery and Route Optimization in IEEE 802.15.3WPANs,”accepted for
publication in ACM/KluwerJ. Mobile Networks and Applications, Nov. 2005.



Z. Yin and V.C.M. Leung, “Connection Data Rate Optimization of IEEE 802.15.3
Scatternetswith Multi-rate Carriers,”IEEE ICC’06, Istanbul, Turkey, June 2006.



Zhanping Yin and Victor C.M. Leung, “Introduction to IEEE 802.15.3 High Rate
Wireless Personal Area Network (WPAN)”, Electrical and Computer Engineering
University of British Columbia

Thank You



Slide 29

Third-Party Handshake Protocol for
Efficient Peer Discovery
and Route Optimization in
IEEE 802.15.3 WPANs
Authors:
Zhanping Yin * Victor C. M. Leung
Published:
ACM/ MONET 2006
Presented by:
Gautam S. Thakur

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

WPAN
• A WPAN (wireless personal area network) is a
personal area network - a network for
interconnecting devices centered around an
individual person's workspace
• A very short range ~10 mtrs. E.g. Bluetooth
• Proposed operating frequencies are around
2.4 GHz in digital modes.
• The objective is to facilitate seamless

operation among home or business devices
and systems.

Ultra-Wideband
• A physical layer technology
• For, short distance communication with high
data rate and short transmission range.
• Lower power requirement and pulsed data
• UWB transmission over extremely wide
unlicensed radio spectrum  3.1 – 10.6 GHz.
• Over results in
– Less interference
– Wire-like performance for indoor wireless
environment.

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Overview of 802.15.3
• Why 802.15.3 ?
• The 802.15.3 Wireless Space
• 802.15.3 Overview and Components

Overview of 802.15.3
[Why 802.15.3 ?]
• Motivated by the increasing demand of wireless
communications with






Ubiquitous network connectivity
Low cost and low power consumption -> WPAN
High data rate(HDR)
Quality of Service(QoS) support
Comparison with other short to medium range wireless
technologies
• Wireless LAN (WLAN)
– High cost and power consumption, no hard QoS guarantee

• WPANs-Bluetooth (802.15.1) and ZigBee(802.15.4)
– Data rate too low

• Applications of 802.15.3
– Virtual wireless multimedia connectivity
• Video/audio distribution

– High speed data transfer

Overview of 802.15.3
[ 802.15.3 = Wireless Multimedia ]

Overview of 802.15.3
[ The 802 Wireless Space ]

IEEE 802.15.3 Overview
• High date rate and low
power
• Mainly works within a
piconet with dynamic
DEV membership
• Ad hoc topology with
centralized control by
the PNC
• Connection oriented
peer-to-peer
communications
• Support for multimedia
quality of service(QoS)
• Multiple power
management modes
• Security

Formation of an 802.15.3 piconet
• The basic component
is the DEV
– One DEV is required to
assume the role of the
piconet coordinator
(PNC) of the piconet.
– The PNC provides the
basic timing sync for the
piconet with the beacon.
– Additionally, the PNC
manages the quality of
service (QoS)
requirements, power
save modes and access
control to the piconet.

Formation of an 802.15.3 piconet (2)
• PNC supports ad
hoc peer-to-peer
connections
• PNC provides
timing for
synchronization of
DEVs within the
piconet, performs
admission control,
allocates network
resources etc

Formation of a Piconet (3)
• All DEVs within radio coverage of the PNC
can then associate with it to form a piconet.
• Then starts the peer discovery.
• Some DEV pairs in the piconet may be out of

range of each other, and as a result, direct
peer-to-peer connection is unavailable
between them. This results in network layer
discovery methods

Superframe format
• Timing and data transmissions in the piconet
are based on the superframe
• The superframe has three parts
– Beacon: Control information, Allocates CTA,
Synchronization
– Contention Access Period (CAP): via CSMA/CA, file xfer
– Channel Time Allocation Period (CTAP)

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Peer discovery and connectivity issue
• An 802.15.3 piconet supports ad hoc
communications between peer DEVs.
• Peer discovery is crucial to its operation.
• The DEVs shall be able to obtain information
about the services and capabilities of other
DEVs in the piconet at any time by
information discovery commands.
• Peer information is needed before a source
DEV can send any data to a destination DEV,
or generate channel time requests (CTRq) to
the PNC.

1
2

5

3

4

6

9

7

8

10

13

11

14

12

15

PNC

Src_DEV

Dest_DEV

PNC Info. Request command
SIFS
Imm-ACK

SIFS
PNC Information command
SIFS
Imm-ACK
SIFS

Probe Request Command
SIFS
Imm-ACK
SIFS
Probe Response Command
SIFS
Imm-ACK
RIFS

1. NOT receive the Imm-Ack
2. Cannot distinguish out-of-range
transmission and collision
3. Perform backoff retransmission
for collision repeatedly

DEV – 1

PNC

Dev 2 is outside the
range of Dev1 and
vise-versa

1. NOT receive Probe Request
command

DEV - 2

Existing Issues with IEEE 802.15.3











Peer discovery is crucial to piconet
operations.
Standard peer discovery is
unreliable and leads to substantial
delays for unreachable DEV pairs
Full piconet connectivity is not
guaranteed with only direct peerto-peer communications
The standard 802.15.3 MAC does
not take advantage of the unique
ranging capabilities enabled by
UWB
Connections are in peer-to-peer
manner without consider of
possible route optimizations
MAC modeling and performance
evaluation
Stream time scheduling methods
not defined in the standard





DEV_1 cannot communicate with
DEV_4 in peer-to-peer manner
For traffic between DEV_1 and
DEV_3, is it better to forward via
PNC than the direct connection?
What is the optimal path and data
rate between DEV_3 and DEV_5?

Using network layer routing
• Each hop request a
CTA slot seperately.
• PNC treat each hop as
independent traffic
stream

• Effect: Failure in an
intermediate hop
breaks the
connections, but PNC
assumes that an
independent stream is
terminated. Keeps
allocating CTAs for
other hops untill it is
eventually notified by
all participating DEV

Using MAC layer forwarding
• With explicit MAC
layer forwarding,
PNC knows that
these hops belongs
to one connection.
• Better adjusting
downstream and
upstream CTAs.

• Effect: reroute the
traffic is the
intermediate node
fails, and releasing
all CTAs if source
of destination
terminates.

Some Observations
• Peer discover is essential
to piconet operations
and communication
between DEVs
• Full piconet connectivity
cannot be guaranteed
• Some DEV pairs may be
out of range of each
other
• Mac layer routing fails
but is better then IP
routing.

• Remember, 802.15.3 has
centralized topology. So
what ??
• Using PNC, any devices
is two-hop count away
only.
• Can use the central
management capability
to discover simpler and
less costly MAC route

Proposed peer discovery protocol
with forwarding route optimization
• The PNC can always act as a first hop to
connect non-intersecting range DEVs
• However, a betterment can be done in the
frame forwarding by choosing another
DEV closer in distance to the source and
destination to forward the frame.
• All routes are limited to two hops only.

Algorithm
• If the Desti_DEV is reachable, sending PNC
Information Request and Response exchange is
redundant.
• So, Src_DEV send Probe Request command to the
Dest_DEV.
• If Dest_DEV receives the command, it returns an
Imm-ACK after a SIFS and then the Probe Response
command as in standard protocol operations.
• At the same time, the third party, i.e., the PNC, shall
actively monitor the frame exchange.
• Upon receiving a Probe Request, the PNC checks the
destination ID (Dest_ID) field in the MAC header.

Algorithm (2)
• If the Dest_ID is not associated in the piconet, the PNC
send an Imm-ACK to the Src_DEV after SIFS, followed
by a PNC Information command with an empty
Information Element (IE) to notify the source that
destination does not exist.
• Otherwise, instead of ignoring the Probe Request frame,
the PNC waits for the Imm-ACK from the destination
DEV.
• If no Imm-ACK arrives after a backoff inter-frame space
(BIFS), which is the sum of a SIFS and a clear channel
assessment detect time (CCADetectTime), the PNC
realizes that the destination DEV cannot hear the source.
• The PNC then immediately send an Imm-ACK to the
source, followed by a PNC Information command with
the route information. (an optimized route information in
sent)

SRC_DEV send Probe
Request command to
DEST_DEV & PNC listens

SIFS
Imm-ACK

Probe Response command

SIFS (Imm-ACK)

PNC also listen

DEST_DEV
hears?

YES

DEST_DEV
responds

No
No

DEST_DEV
ID
Present?

Yes, Timeout (BIFS)

Send Imm-ACK & route
information to source

Yes and
DEST_DEV sent Imm-ACK

Do Nothing, monitor if
DEST_DEV crash.

Forward the data to
the router node

Algorithm (3)
[Route calculation]
• Most wireless networks today employ a multirate PHY (e.g., UWB in 802.15.3a) that
supports a set of data rate dependent
modulation/coding parameters.
• Due to the extremely low power consumption
requirement of WPAN devices, the achievable
data rate drops dramatically when the
distance increases.
• The data rate can be modeled as a discrete
function of transmission distance d between
two DEVs:

Algorithm (3)
Rate ( d )  S i ;
R i  1  d  R i ;1  i  m
where, R m

1

 0 , R i is the transmiss

and S 1 and S m are the minimum

ion range of rate S i ;

and maximum

data

rates, respective ly. If d is greater th an R 1, then Rate(d)
and the DEVs have no connectivi

ty

0

Algorithm (4)
• Since the PNC can monitor all commands exchanged
during the CAP, it can learn the data rates between
reachable DEV pairs and store them in an n x n rate
matrix (RM), where
• n is the total number of DEVs within the piconet. DEV
is assigned a unique DEV_ID in the piconet
RM ij is the link rate based on the current informatio
obtained

from the commands

DEV i and DEV j . RM

ij

exchanged

 0 if DEV i and DEV

are out of range or the rate informatio
not available

between

yet, and RM

ij

n is

  if i  j .

j

n

Algorithm (5)
• All DEVs transmit with the maximum
allowable power when sending data. Since the
wireless links are symmetric in nature, clearly
RMij = RMji.
• Based on the current rate information stored
in RM, for an unreachable pair DEVi and
DEVj, the PNC can determine the optimal
(two-hop) route that has the minimum
transmission time, i.e., the best route employs
DEVk for MAC layer forwarding, where k
minimizes:

Algorithm (6)
min(

1
RM



ik
k [ 0 , n  1 ]

1
RM

)
kj

• Alleviates the traffic load on the PNC
• Discovers a current optimal two-hop MAC layer
forwarding path given by existing rate information
without introducing any extra overhead
• If the connection is broken, the PNC can
immediately reroute the traffic to a current
optimal path, or terminate the connection by deallocating all corresponding CTAs.

Discussion
• Original case:
Causes
retransmission

• 3PHP: data sent via
2-hop route if
PNC_ID exists

Dest_ID

Dest_ID

• Normal Transmission (Imm_Ack)

• Normal Transmission (Imm_Ack)

XXX FRAME LOST XXXX

PNC_ID

• Causes retransmission

• Sent Via 2–hop route (Imm_Ack)

PNC

Src_DEV
PNC Info. Request command

Probe Request Command

BIFS
Imm-ACK
SIFS

PNC Information command with Route Info.

Imm-ACK

RIFS

Dest_DEV

SIFS

3PHP-Node

DEV – 1

DEV - 2

PNC

Observations
• With 3PHP, peer discovery requires only one
round of frame exchange.
• Fully utilized the broadcast nature,
centralized control, ad-hoc communication,
and efficient peer discovery.
• Save the futile back-off retransmission for
unreachable destination.
• Guaranteed full piconet connectivity. (no
network layer routing required)
• On demand routing
• More then BIFS waiting. (include RIFS) Conclusion

Performance Evaluations
[Intra-piconet no connection probability]
• Intra-piconet no
connection
probability

• Common Overlap
Area function
COLA(R, r, x):
Represent the
intersection of two
circles with radii R
and r (r e R),
respectively, which
centers are
separated by
distance x

Performance Evaluations (2)
[Intra-piconet no connection probability]

Performance Evaluations (3)
[Intra-piconet no connection probability]
• The probability of no direct connection
between two DEVs in a piconet is

Performance Evaluations (4)
[Peer Discovery delay analysis]


# of Frame Transmission




Expected
Contention Time



Expected Packet
Delay

Performance Evaluations (5)
[Peer Discovery delay analysis]


Expected routing
failure probability

• Expected successful peer discovery
delays are given by

Simulation and Numerical Results
• No connection probability as a function of
coverage range ratio

Simulation and Numerical Results (2)
• Peer discovery delay vs. conditional
collision probability

Simulation and Numerical Results (3)
• Piconet peer discovery time vs. coverage
range ratio

Simulation and Numerical Results (4)
• Piconet peer discovery failure probability
with standard method

Simulation and Numerical Results (5)
• Two-hop forwarding route optimization
ratio vs. piconet radius

Simulation and Numerical Results (6)
• Expected data between directly unreachable
pairs in piconets with 20 DEVs

Conclusion
• Underlying fact: peer-to-peer data delivery in
802.15.3 WPANs
• Existing MAC layer peer discovery methods
cannot guarantee full connectivity between
DEVs within a piconet through direct peerto-peer connections if the piconet operates
with a radius larger than half of the
maximum transmission distance. (~ 41.3%)
• If Mac fails, use the expensive network layer
routing.

Conclusion (2)
• Used the central control topology
• Routing in 2-hop with single round of
control frame exchange
• 3PHP achieves 25– 37% faster peer
discovery time over the standard MAC
• Route optimization algorithm in the PNC
to provide the best MAC layer forwarding
routes by self-learning the available rate
information between DEVs.

References


IEEE Standard 802.15.3, “Wireless medium access control (MAC) and physical
layer (PHY) specifications for high rate wireless personal area networks
(WPANs),”Sept. 2003.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery in IEEE 802.15.3 WPANs,”in Proc. IEEE BroadNets2005, Boston, MA,
Oct. 2005.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery and Route Optimization in IEEE 802.15.3WPANs,”accepted for
publication in ACM/KluwerJ. Mobile Networks and Applications, Nov. 2005.



Z. Yin and V.C.M. Leung, “Connection Data Rate Optimization of IEEE 802.15.3
Scatternetswith Multi-rate Carriers,”IEEE ICC’06, Istanbul, Turkey, June 2006.



Zhanping Yin and Victor C.M. Leung, “Introduction to IEEE 802.15.3 High Rate
Wireless Personal Area Network (WPAN)”, Electrical and Computer Engineering
University of British Columbia

Thank You



Slide 30

Third-Party Handshake Protocol for
Efficient Peer Discovery
and Route Optimization in
IEEE 802.15.3 WPANs
Authors:
Zhanping Yin * Victor C. M. Leung
Published:
ACM/ MONET 2006
Presented by:
Gautam S. Thakur

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

WPAN
• A WPAN (wireless personal area network) is a
personal area network - a network for
interconnecting devices centered around an
individual person's workspace
• A very short range ~10 mtrs. E.g. Bluetooth
• Proposed operating frequencies are around
2.4 GHz in digital modes.
• The objective is to facilitate seamless

operation among home or business devices
and systems.

Ultra-Wideband
• A physical layer technology
• For, short distance communication with high
data rate and short transmission range.
• Lower power requirement and pulsed data
• UWB transmission over extremely wide
unlicensed radio spectrum  3.1 – 10.6 GHz.
• Over results in
– Less interference
– Wire-like performance for indoor wireless
environment.

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Overview of 802.15.3
• Why 802.15.3 ?
• The 802.15.3 Wireless Space
• 802.15.3 Overview and Components

Overview of 802.15.3
[Why 802.15.3 ?]
• Motivated by the increasing demand of wireless
communications with






Ubiquitous network connectivity
Low cost and low power consumption -> WPAN
High data rate(HDR)
Quality of Service(QoS) support
Comparison with other short to medium range wireless
technologies
• Wireless LAN (WLAN)
– High cost and power consumption, no hard QoS guarantee

• WPANs-Bluetooth (802.15.1) and ZigBee(802.15.4)
– Data rate too low

• Applications of 802.15.3
– Virtual wireless multimedia connectivity
• Video/audio distribution

– High speed data transfer

Overview of 802.15.3
[ 802.15.3 = Wireless Multimedia ]

Overview of 802.15.3
[ The 802 Wireless Space ]

IEEE 802.15.3 Overview
• High date rate and low
power
• Mainly works within a
piconet with dynamic
DEV membership
• Ad hoc topology with
centralized control by
the PNC
• Connection oriented
peer-to-peer
communications
• Support for multimedia
quality of service(QoS)
• Multiple power
management modes
• Security

Formation of an 802.15.3 piconet
• The basic component
is the DEV
– One DEV is required to
assume the role of the
piconet coordinator
(PNC) of the piconet.
– The PNC provides the
basic timing sync for the
piconet with the beacon.
– Additionally, the PNC
manages the quality of
service (QoS)
requirements, power
save modes and access
control to the piconet.

Formation of an 802.15.3 piconet (2)
• PNC supports ad
hoc peer-to-peer
connections
• PNC provides
timing for
synchronization of
DEVs within the
piconet, performs
admission control,
allocates network
resources etc

Formation of a Piconet (3)
• All DEVs within radio coverage of the PNC
can then associate with it to form a piconet.
• Then starts the peer discovery.
• Some DEV pairs in the piconet may be out of

range of each other, and as a result, direct
peer-to-peer connection is unavailable
between them. This results in network layer
discovery methods

Superframe format
• Timing and data transmissions in the piconet
are based on the superframe
• The superframe has three parts
– Beacon: Control information, Allocates CTA,
Synchronization
– Contention Access Period (CAP): via CSMA/CA, file xfer
– Channel Time Allocation Period (CTAP)

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Peer discovery and connectivity issue
• An 802.15.3 piconet supports ad hoc
communications between peer DEVs.
• Peer discovery is crucial to its operation.
• The DEVs shall be able to obtain information
about the services and capabilities of other
DEVs in the piconet at any time by
information discovery commands.
• Peer information is needed before a source
DEV can send any data to a destination DEV,
or generate channel time requests (CTRq) to
the PNC.

1
2

5

3

4

6

9

7

8

10

13

11

14

12

15

PNC

Src_DEV

Dest_DEV

PNC Info. Request command
SIFS
Imm-ACK

SIFS
PNC Information command
SIFS
Imm-ACK
SIFS

Probe Request Command
SIFS
Imm-ACK
SIFS
Probe Response Command
SIFS
Imm-ACK
RIFS

1. NOT receive the Imm-Ack
2. Cannot distinguish out-of-range
transmission and collision
3. Perform backoff retransmission
for collision repeatedly

DEV – 1

PNC

Dev 2 is outside the
range of Dev1 and
vise-versa

1. NOT receive Probe Request
command

DEV - 2

Existing Issues with IEEE 802.15.3











Peer discovery is crucial to piconet
operations.
Standard peer discovery is
unreliable and leads to substantial
delays for unreachable DEV pairs
Full piconet connectivity is not
guaranteed with only direct peerto-peer communications
The standard 802.15.3 MAC does
not take advantage of the unique
ranging capabilities enabled by
UWB
Connections are in peer-to-peer
manner without consider of
possible route optimizations
MAC modeling and performance
evaluation
Stream time scheduling methods
not defined in the standard





DEV_1 cannot communicate with
DEV_4 in peer-to-peer manner
For traffic between DEV_1 and
DEV_3, is it better to forward via
PNC than the direct connection?
What is the optimal path and data
rate between DEV_3 and DEV_5?

Using network layer routing
• Each hop request a
CTA slot seperately.
• PNC treat each hop as
independent traffic
stream

• Effect: Failure in an
intermediate hop
breaks the
connections, but PNC
assumes that an
independent stream is
terminated. Keeps
allocating CTAs for
other hops untill it is
eventually notified by
all participating DEV

Using MAC layer forwarding
• With explicit MAC
layer forwarding,
PNC knows that
these hops belongs
to one connection.
• Better adjusting
downstream and
upstream CTAs.

• Effect: reroute the
traffic is the
intermediate node
fails, and releasing
all CTAs if source
of destination
terminates.

Some Observations
• Peer discover is essential
to piconet operations
and communication
between DEVs
• Full piconet connectivity
cannot be guaranteed
• Some DEV pairs may be
out of range of each
other
• Mac layer routing fails
but is better then IP
routing.

• Remember, 802.15.3 has
centralized topology. So
what ??
• Using PNC, any devices
is two-hop count away
only.
• Can use the central
management capability
to discover simpler and
less costly MAC route

Proposed peer discovery protocol
with forwarding route optimization
• The PNC can always act as a first hop to
connect non-intersecting range DEVs
• However, a betterment can be done in the
frame forwarding by choosing another
DEV closer in distance to the source and
destination to forward the frame.
• All routes are limited to two hops only.

Algorithm
• If the Desti_DEV is reachable, sending PNC
Information Request and Response exchange is
redundant.
• So, Src_DEV send Probe Request command to the
Dest_DEV.
• If Dest_DEV receives the command, it returns an
Imm-ACK after a SIFS and then the Probe Response
command as in standard protocol operations.
• At the same time, the third party, i.e., the PNC, shall
actively monitor the frame exchange.
• Upon receiving a Probe Request, the PNC checks the
destination ID (Dest_ID) field in the MAC header.

Algorithm (2)
• If the Dest_ID is not associated in the piconet, the PNC
send an Imm-ACK to the Src_DEV after SIFS, followed
by a PNC Information command with an empty
Information Element (IE) to notify the source that
destination does not exist.
• Otherwise, instead of ignoring the Probe Request frame,
the PNC waits for the Imm-ACK from the destination
DEV.
• If no Imm-ACK arrives after a backoff inter-frame space
(BIFS), which is the sum of a SIFS and a clear channel
assessment detect time (CCADetectTime), the PNC
realizes that the destination DEV cannot hear the source.
• The PNC then immediately send an Imm-ACK to the
source, followed by a PNC Information command with
the route information. (an optimized route information in
sent)

SRC_DEV send Probe
Request command to
DEST_DEV & PNC listens

SIFS
Imm-ACK

Probe Response command

SIFS (Imm-ACK)

PNC also listen

DEST_DEV
hears?

YES

DEST_DEV
responds

No
No

DEST_DEV
ID
Present?

Yes, Timeout (BIFS)

Send Imm-ACK & route
information to source

Yes and
DEST_DEV sent Imm-ACK

Do Nothing, monitor if
DEST_DEV crash.

Forward the data to
the router node

Algorithm (3)
[Route calculation]
• Most wireless networks today employ a multirate PHY (e.g., UWB in 802.15.3a) that
supports a set of data rate dependent
modulation/coding parameters.
• Due to the extremely low power consumption
requirement of WPAN devices, the achievable
data rate drops dramatically when the
distance increases.
• The data rate can be modeled as a discrete
function of transmission distance d between
two DEVs:

Algorithm (3)
Rate ( d )  S i ;
R i  1  d  R i ;1  i  m
where, R m

1

 0 , R i is the transmiss

and S 1 and S m are the minimum

ion range of rate S i ;

and maximum

data

rates, respective ly. If d is greater th an R 1, then Rate(d)
and the DEVs have no connectivi

ty

0

Algorithm (4)
• Since the PNC can monitor all commands exchanged
during the CAP, it can learn the data rates between
reachable DEV pairs and store them in an n x n rate
matrix (RM), where
• n is the total number of DEVs within the piconet. DEV
is assigned a unique DEV_ID in the piconet
RM ij is the link rate based on the current informatio
obtained

from the commands

DEV i and DEV j . RM

ij

exchanged

 0 if DEV i and DEV

are out of range or the rate informatio
not available

between

yet, and RM

ij

n is

  if i  j .

j

n

Algorithm (5)
• All DEVs transmit with the maximum
allowable power when sending data. Since the
wireless links are symmetric in nature, clearly
RMij = RMji.
• Based on the current rate information stored
in RM, for an unreachable pair DEVi and
DEVj, the PNC can determine the optimal
(two-hop) route that has the minimum
transmission time, i.e., the best route employs
DEVk for MAC layer forwarding, where k
minimizes:

Algorithm (6)
min(

1
RM



ik
k [ 0 , n  1 ]

1
RM

)
kj

• Alleviates the traffic load on the PNC
• Discovers a current optimal two-hop MAC layer
forwarding path given by existing rate information
without introducing any extra overhead
• If the connection is broken, the PNC can
immediately reroute the traffic to a current
optimal path, or terminate the connection by deallocating all corresponding CTAs.

Discussion
• Original case:
Causes
retransmission

• 3PHP: data sent via
2-hop route if
PNC_ID exists

Dest_ID

Dest_ID

• Normal Transmission (Imm_Ack)

• Normal Transmission (Imm_Ack)

XXX FRAME LOST XXXX

PNC_ID

• Causes retransmission

• Sent Via 2–hop route (Imm_Ack)

PNC

Src_DEV
PNC Info. Request command

Probe Request Command

BIFS
Imm-ACK
SIFS

PNC Information command with Route Info.

Imm-ACK

RIFS

Dest_DEV

SIFS

3PHP-Node

DEV – 1

DEV - 2

PNC

Observations
• With 3PHP, peer discovery requires only one
round of frame exchange.
• Fully utilized the broadcast nature,
centralized control, ad-hoc communication,
and efficient peer discovery.
• Save the futile back-off retransmission for
unreachable destination.
• Guaranteed full piconet connectivity. (no
network layer routing required)
• On demand routing
• More then BIFS waiting. (include RIFS) Conclusion

Performance Evaluations
[Intra-piconet no connection probability]
• Intra-piconet no
connection
probability

• Common Overlap
Area function
COLA(R, r, x):
Represent the
intersection of two
circles with radii R
and r (r e R),
respectively, which
centers are
separated by
distance x

Performance Evaluations (2)
[Intra-piconet no connection probability]

Performance Evaluations (3)
[Intra-piconet no connection probability]
• The probability of no direct connection
between two DEVs in a piconet is

Performance Evaluations (4)
[Peer Discovery delay analysis]


# of Frame Transmission




Expected
Contention Time



Expected Packet
Delay

Performance Evaluations (5)
[Peer Discovery delay analysis]


Expected routing
failure probability

• Expected successful peer discovery
delays are given by

Simulation and Numerical Results
• No connection probability as a function of
coverage range ratio

Simulation and Numerical Results (2)
• Peer discovery delay vs. conditional
collision probability

Simulation and Numerical Results (3)
• Piconet peer discovery time vs. coverage
range ratio

Simulation and Numerical Results (4)
• Piconet peer discovery failure probability
with standard method

Simulation and Numerical Results (5)
• Two-hop forwarding route optimization
ratio vs. piconet radius

Simulation and Numerical Results (6)
• Expected data between directly unreachable
pairs in piconets with 20 DEVs

Conclusion
• Underlying fact: peer-to-peer data delivery in
802.15.3 WPANs
• Existing MAC layer peer discovery methods
cannot guarantee full connectivity between
DEVs within a piconet through direct peerto-peer connections if the piconet operates
with a radius larger than half of the
maximum transmission distance. (~ 41.3%)
• If Mac fails, use the expensive network layer
routing.

Conclusion (2)
• Used the central control topology
• Routing in 2-hop with single round of
control frame exchange
• 3PHP achieves 25– 37% faster peer
discovery time over the standard MAC
• Route optimization algorithm in the PNC
to provide the best MAC layer forwarding
routes by self-learning the available rate
information between DEVs.

References


IEEE Standard 802.15.3, “Wireless medium access control (MAC) and physical
layer (PHY) specifications for high rate wireless personal area networks
(WPANs),”Sept. 2003.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery in IEEE 802.15.3 WPANs,”in Proc. IEEE BroadNets2005, Boston, MA,
Oct. 2005.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery and Route Optimization in IEEE 802.15.3WPANs,”accepted for
publication in ACM/KluwerJ. Mobile Networks and Applications, Nov. 2005.



Z. Yin and V.C.M. Leung, “Connection Data Rate Optimization of IEEE 802.15.3
Scatternetswith Multi-rate Carriers,”IEEE ICC’06, Istanbul, Turkey, June 2006.



Zhanping Yin and Victor C.M. Leung, “Introduction to IEEE 802.15.3 High Rate
Wireless Personal Area Network (WPAN)”, Electrical and Computer Engineering
University of British Columbia

Thank You



Slide 31

Third-Party Handshake Protocol for
Efficient Peer Discovery
and Route Optimization in
IEEE 802.15.3 WPANs
Authors:
Zhanping Yin * Victor C. M. Leung
Published:
ACM/ MONET 2006
Presented by:
Gautam S. Thakur

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

WPAN
• A WPAN (wireless personal area network) is a
personal area network - a network for
interconnecting devices centered around an
individual person's workspace
• A very short range ~10 mtrs. E.g. Bluetooth
• Proposed operating frequencies are around
2.4 GHz in digital modes.
• The objective is to facilitate seamless

operation among home or business devices
and systems.

Ultra-Wideband
• A physical layer technology
• For, short distance communication with high
data rate and short transmission range.
• Lower power requirement and pulsed data
• UWB transmission over extremely wide
unlicensed radio spectrum  3.1 – 10.6 GHz.
• Over results in
– Less interference
– Wire-like performance for indoor wireless
environment.

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Overview of 802.15.3
• Why 802.15.3 ?
• The 802.15.3 Wireless Space
• 802.15.3 Overview and Components

Overview of 802.15.3
[Why 802.15.3 ?]
• Motivated by the increasing demand of wireless
communications with






Ubiquitous network connectivity
Low cost and low power consumption -> WPAN
High data rate(HDR)
Quality of Service(QoS) support
Comparison with other short to medium range wireless
technologies
• Wireless LAN (WLAN)
– High cost and power consumption, no hard QoS guarantee

• WPANs-Bluetooth (802.15.1) and ZigBee(802.15.4)
– Data rate too low

• Applications of 802.15.3
– Virtual wireless multimedia connectivity
• Video/audio distribution

– High speed data transfer

Overview of 802.15.3
[ 802.15.3 = Wireless Multimedia ]

Overview of 802.15.3
[ The 802 Wireless Space ]

IEEE 802.15.3 Overview
• High date rate and low
power
• Mainly works within a
piconet with dynamic
DEV membership
• Ad hoc topology with
centralized control by
the PNC
• Connection oriented
peer-to-peer
communications
• Support for multimedia
quality of service(QoS)
• Multiple power
management modes
• Security

Formation of an 802.15.3 piconet
• The basic component
is the DEV
– One DEV is required to
assume the role of the
piconet coordinator
(PNC) of the piconet.
– The PNC provides the
basic timing sync for the
piconet with the beacon.
– Additionally, the PNC
manages the quality of
service (QoS)
requirements, power
save modes and access
control to the piconet.

Formation of an 802.15.3 piconet (2)
• PNC supports ad
hoc peer-to-peer
connections
• PNC provides
timing for
synchronization of
DEVs within the
piconet, performs
admission control,
allocates network
resources etc

Formation of a Piconet (3)
• All DEVs within radio coverage of the PNC
can then associate with it to form a piconet.
• Then starts the peer discovery.
• Some DEV pairs in the piconet may be out of

range of each other, and as a result, direct
peer-to-peer connection is unavailable
between them. This results in network layer
discovery methods

Superframe format
• Timing and data transmissions in the piconet
are based on the superframe
• The superframe has three parts
– Beacon: Control information, Allocates CTA,
Synchronization
– Contention Access Period (CAP): via CSMA/CA, file xfer
– Channel Time Allocation Period (CTAP)

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Peer discovery and connectivity issue
• An 802.15.3 piconet supports ad hoc
communications between peer DEVs.
• Peer discovery is crucial to its operation.
• The DEVs shall be able to obtain information
about the services and capabilities of other
DEVs in the piconet at any time by
information discovery commands.
• Peer information is needed before a source
DEV can send any data to a destination DEV,
or generate channel time requests (CTRq) to
the PNC.

1
2

5

3

4

6

9

7

8

10

13

11

14

12

15

PNC

Src_DEV

Dest_DEV

PNC Info. Request command
SIFS
Imm-ACK

SIFS
PNC Information command
SIFS
Imm-ACK
SIFS

Probe Request Command
SIFS
Imm-ACK
SIFS
Probe Response Command
SIFS
Imm-ACK
RIFS

1. NOT receive the Imm-Ack
2. Cannot distinguish out-of-range
transmission and collision
3. Perform backoff retransmission
for collision repeatedly

DEV – 1

PNC

Dev 2 is outside the
range of Dev1 and
vise-versa

1. NOT receive Probe Request
command

DEV - 2

Existing Issues with IEEE 802.15.3











Peer discovery is crucial to piconet
operations.
Standard peer discovery is
unreliable and leads to substantial
delays for unreachable DEV pairs
Full piconet connectivity is not
guaranteed with only direct peerto-peer communications
The standard 802.15.3 MAC does
not take advantage of the unique
ranging capabilities enabled by
UWB
Connections are in peer-to-peer
manner without consider of
possible route optimizations
MAC modeling and performance
evaluation
Stream time scheduling methods
not defined in the standard





DEV_1 cannot communicate with
DEV_4 in peer-to-peer manner
For traffic between DEV_1 and
DEV_3, is it better to forward via
PNC than the direct connection?
What is the optimal path and data
rate between DEV_3 and DEV_5?

Using network layer routing
• Each hop request a
CTA slot seperately.
• PNC treat each hop as
independent traffic
stream

• Effect: Failure in an
intermediate hop
breaks the
connections, but PNC
assumes that an
independent stream is
terminated. Keeps
allocating CTAs for
other hops untill it is
eventually notified by
all participating DEV

Using MAC layer forwarding
• With explicit MAC
layer forwarding,
PNC knows that
these hops belongs
to one connection.
• Better adjusting
downstream and
upstream CTAs.

• Effect: reroute the
traffic is the
intermediate node
fails, and releasing
all CTAs if source
of destination
terminates.

Some Observations
• Peer discover is essential
to piconet operations
and communication
between DEVs
• Full piconet connectivity
cannot be guaranteed
• Some DEV pairs may be
out of range of each
other
• Mac layer routing fails
but is better then IP
routing.

• Remember, 802.15.3 has
centralized topology. So
what ??
• Using PNC, any devices
is two-hop count away
only.
• Can use the central
management capability
to discover simpler and
less costly MAC route

Proposed peer discovery protocol
with forwarding route optimization
• The PNC can always act as a first hop to
connect non-intersecting range DEVs
• However, a betterment can be done in the
frame forwarding by choosing another
DEV closer in distance to the source and
destination to forward the frame.
• All routes are limited to two hops only.

Algorithm
• If the Desti_DEV is reachable, sending PNC
Information Request and Response exchange is
redundant.
• So, Src_DEV send Probe Request command to the
Dest_DEV.
• If Dest_DEV receives the command, it returns an
Imm-ACK after a SIFS and then the Probe Response
command as in standard protocol operations.
• At the same time, the third party, i.e., the PNC, shall
actively monitor the frame exchange.
• Upon receiving a Probe Request, the PNC checks the
destination ID (Dest_ID) field in the MAC header.

Algorithm (2)
• If the Dest_ID is not associated in the piconet, the PNC
send an Imm-ACK to the Src_DEV after SIFS, followed
by a PNC Information command with an empty
Information Element (IE) to notify the source that
destination does not exist.
• Otherwise, instead of ignoring the Probe Request frame,
the PNC waits for the Imm-ACK from the destination
DEV.
• If no Imm-ACK arrives after a backoff inter-frame space
(BIFS), which is the sum of a SIFS and a clear channel
assessment detect time (CCADetectTime), the PNC
realizes that the destination DEV cannot hear the source.
• The PNC then immediately send an Imm-ACK to the
source, followed by a PNC Information command with
the route information. (an optimized route information in
sent)

SRC_DEV send Probe
Request command to
DEST_DEV & PNC listens

SIFS
Imm-ACK

Probe Response command

SIFS (Imm-ACK)

PNC also listen

DEST_DEV
hears?

YES

DEST_DEV
responds

No
No

DEST_DEV
ID
Present?

Yes, Timeout (BIFS)

Send Imm-ACK & route
information to source

Yes and
DEST_DEV sent Imm-ACK

Do Nothing, monitor if
DEST_DEV crash.

Forward the data to
the router node

Algorithm (3)
[Route calculation]
• Most wireless networks today employ a multirate PHY (e.g., UWB in 802.15.3a) that
supports a set of data rate dependent
modulation/coding parameters.
• Due to the extremely low power consumption
requirement of WPAN devices, the achievable
data rate drops dramatically when the
distance increases.
• The data rate can be modeled as a discrete
function of transmission distance d between
two DEVs:

Algorithm (3)
Rate ( d )  S i ;
R i  1  d  R i ;1  i  m
where, R m

1

 0 , R i is the transmiss

and S 1 and S m are the minimum

ion range of rate S i ;

and maximum

data

rates, respective ly. If d is greater th an R 1, then Rate(d)
and the DEVs have no connectivi

ty

0

Algorithm (4)
• Since the PNC can monitor all commands exchanged
during the CAP, it can learn the data rates between
reachable DEV pairs and store them in an n x n rate
matrix (RM), where
• n is the total number of DEVs within the piconet. DEV
is assigned a unique DEV_ID in the piconet
RM ij is the link rate based on the current informatio
obtained

from the commands

DEV i and DEV j . RM

ij

exchanged

 0 if DEV i and DEV

are out of range or the rate informatio
not available

between

yet, and RM

ij

n is

  if i  j .

j

n

Algorithm (5)
• All DEVs transmit with the maximum
allowable power when sending data. Since the
wireless links are symmetric in nature, clearly
RMij = RMji.
• Based on the current rate information stored
in RM, for an unreachable pair DEVi and
DEVj, the PNC can determine the optimal
(two-hop) route that has the minimum
transmission time, i.e., the best route employs
DEVk for MAC layer forwarding, where k
minimizes:

Algorithm (6)
min(

1
RM



ik
k [ 0 , n  1 ]

1
RM

)
kj

• Alleviates the traffic load on the PNC
• Discovers a current optimal two-hop MAC layer
forwarding path given by existing rate information
without introducing any extra overhead
• If the connection is broken, the PNC can
immediately reroute the traffic to a current
optimal path, or terminate the connection by deallocating all corresponding CTAs.

Discussion
• Original case:
Causes
retransmission

• 3PHP: data sent via
2-hop route if
PNC_ID exists

Dest_ID

Dest_ID

• Normal Transmission (Imm_Ack)

• Normal Transmission (Imm_Ack)

XXX FRAME LOST XXXX

PNC_ID

• Causes retransmission

• Sent Via 2–hop route (Imm_Ack)

PNC

Src_DEV
PNC Info. Request command

Probe Request Command

BIFS
Imm-ACK
SIFS

PNC Information command with Route Info.

Imm-ACK

RIFS

Dest_DEV

SIFS

3PHP-Node

DEV – 1

DEV - 2

PNC

Observations
• With 3PHP, peer discovery requires only one
round of frame exchange.
• Fully utilized the broadcast nature,
centralized control, ad-hoc communication,
and efficient peer discovery.
• Save the futile back-off retransmission for
unreachable destination.
• Guaranteed full piconet connectivity. (no
network layer routing required)
• On demand routing
• More then BIFS waiting. (include RIFS) Conclusion

Performance Evaluations
[Intra-piconet no connection probability]
• Intra-piconet no
connection
probability

• Common Overlap
Area function
COLA(R, r, x):
Represent the
intersection of two
circles with radii R
and r (r e R),
respectively, which
centers are
separated by
distance x

Performance Evaluations (2)
[Intra-piconet no connection probability]

Performance Evaluations (3)
[Intra-piconet no connection probability]
• The probability of no direct connection
between two DEVs in a piconet is

Performance Evaluations (4)
[Peer Discovery delay analysis]


# of Frame Transmission




Expected
Contention Time



Expected Packet
Delay

Performance Evaluations (5)
[Peer Discovery delay analysis]


Expected routing
failure probability

• Expected successful peer discovery
delays are given by

Simulation and Numerical Results
• No connection probability as a function of
coverage range ratio

Simulation and Numerical Results (2)
• Peer discovery delay vs. conditional
collision probability

Simulation and Numerical Results (3)
• Piconet peer discovery time vs. coverage
range ratio

Simulation and Numerical Results (4)
• Piconet peer discovery failure probability
with standard method

Simulation and Numerical Results (5)
• Two-hop forwarding route optimization
ratio vs. piconet radius

Simulation and Numerical Results (6)
• Expected data between directly unreachable
pairs in piconets with 20 DEVs

Conclusion
• Underlying fact: peer-to-peer data delivery in
802.15.3 WPANs
• Existing MAC layer peer discovery methods
cannot guarantee full connectivity between
DEVs within a piconet through direct peerto-peer connections if the piconet operates
with a radius larger than half of the
maximum transmission distance. (~ 41.3%)
• If Mac fails, use the expensive network layer
routing.

Conclusion (2)
• Used the central control topology
• Routing in 2-hop with single round of
control frame exchange
• 3PHP achieves 25– 37% faster peer
discovery time over the standard MAC
• Route optimization algorithm in the PNC
to provide the best MAC layer forwarding
routes by self-learning the available rate
information between DEVs.

References


IEEE Standard 802.15.3, “Wireless medium access control (MAC) and physical
layer (PHY) specifications for high rate wireless personal area networks
(WPANs),”Sept. 2003.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery in IEEE 802.15.3 WPANs,”in Proc. IEEE BroadNets2005, Boston, MA,
Oct. 2005.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery and Route Optimization in IEEE 802.15.3WPANs,”accepted for
publication in ACM/KluwerJ. Mobile Networks and Applications, Nov. 2005.



Z. Yin and V.C.M. Leung, “Connection Data Rate Optimization of IEEE 802.15.3
Scatternetswith Multi-rate Carriers,”IEEE ICC’06, Istanbul, Turkey, June 2006.



Zhanping Yin and Victor C.M. Leung, “Introduction to IEEE 802.15.3 High Rate
Wireless Personal Area Network (WPAN)”, Electrical and Computer Engineering
University of British Columbia

Thank You



Slide 32

Third-Party Handshake Protocol for
Efficient Peer Discovery
and Route Optimization in
IEEE 802.15.3 WPANs
Authors:
Zhanping Yin * Victor C. M. Leung
Published:
ACM/ MONET 2006
Presented by:
Gautam S. Thakur

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

WPAN
• A WPAN (wireless personal area network) is a
personal area network - a network for
interconnecting devices centered around an
individual person's workspace
• A very short range ~10 mtrs. E.g. Bluetooth
• Proposed operating frequencies are around
2.4 GHz in digital modes.
• The objective is to facilitate seamless

operation among home or business devices
and systems.

Ultra-Wideband
• A physical layer technology
• For, short distance communication with high
data rate and short transmission range.
• Lower power requirement and pulsed data
• UWB transmission over extremely wide
unlicensed radio spectrum  3.1 – 10.6 GHz.
• Over results in
– Less interference
– Wire-like performance for indoor wireless
environment.

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Overview of 802.15.3
• Why 802.15.3 ?
• The 802.15.3 Wireless Space
• 802.15.3 Overview and Components

Overview of 802.15.3
[Why 802.15.3 ?]
• Motivated by the increasing demand of wireless
communications with






Ubiquitous network connectivity
Low cost and low power consumption -> WPAN
High data rate(HDR)
Quality of Service(QoS) support
Comparison with other short to medium range wireless
technologies
• Wireless LAN (WLAN)
– High cost and power consumption, no hard QoS guarantee

• WPANs-Bluetooth (802.15.1) and ZigBee(802.15.4)
– Data rate too low

• Applications of 802.15.3
– Virtual wireless multimedia connectivity
• Video/audio distribution

– High speed data transfer

Overview of 802.15.3
[ 802.15.3 = Wireless Multimedia ]

Overview of 802.15.3
[ The 802 Wireless Space ]

IEEE 802.15.3 Overview
• High date rate and low
power
• Mainly works within a
piconet with dynamic
DEV membership
• Ad hoc topology with
centralized control by
the PNC
• Connection oriented
peer-to-peer
communications
• Support for multimedia
quality of service(QoS)
• Multiple power
management modes
• Security

Formation of an 802.15.3 piconet
• The basic component
is the DEV
– One DEV is required to
assume the role of the
piconet coordinator
(PNC) of the piconet.
– The PNC provides the
basic timing sync for the
piconet with the beacon.
– Additionally, the PNC
manages the quality of
service (QoS)
requirements, power
save modes and access
control to the piconet.

Formation of an 802.15.3 piconet (2)
• PNC supports ad
hoc peer-to-peer
connections
• PNC provides
timing for
synchronization of
DEVs within the
piconet, performs
admission control,
allocates network
resources etc

Formation of a Piconet (3)
• All DEVs within radio coverage of the PNC
can then associate with it to form a piconet.
• Then starts the peer discovery.
• Some DEV pairs in the piconet may be out of

range of each other, and as a result, direct
peer-to-peer connection is unavailable
between them. This results in network layer
discovery methods

Superframe format
• Timing and data transmissions in the piconet
are based on the superframe
• The superframe has three parts
– Beacon: Control information, Allocates CTA,
Synchronization
– Contention Access Period (CAP): via CSMA/CA, file xfer
– Channel Time Allocation Period (CTAP)

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Peer discovery and connectivity issue
• An 802.15.3 piconet supports ad hoc
communications between peer DEVs.
• Peer discovery is crucial to its operation.
• The DEVs shall be able to obtain information
about the services and capabilities of other
DEVs in the piconet at any time by
information discovery commands.
• Peer information is needed before a source
DEV can send any data to a destination DEV,
or generate channel time requests (CTRq) to
the PNC.

1
2

5

3

4

6

9

7

8

10

13

11

14

12

15

PNC

Src_DEV

Dest_DEV

PNC Info. Request command
SIFS
Imm-ACK

SIFS
PNC Information command
SIFS
Imm-ACK
SIFS

Probe Request Command
SIFS
Imm-ACK
SIFS
Probe Response Command
SIFS
Imm-ACK
RIFS

1. NOT receive the Imm-Ack
2. Cannot distinguish out-of-range
transmission and collision
3. Perform backoff retransmission
for collision repeatedly

DEV – 1

PNC

Dev 2 is outside the
range of Dev1 and
vise-versa

1. NOT receive Probe Request
command

DEV - 2

Existing Issues with IEEE 802.15.3











Peer discovery is crucial to piconet
operations.
Standard peer discovery is
unreliable and leads to substantial
delays for unreachable DEV pairs
Full piconet connectivity is not
guaranteed with only direct peerto-peer communications
The standard 802.15.3 MAC does
not take advantage of the unique
ranging capabilities enabled by
UWB
Connections are in peer-to-peer
manner without consider of
possible route optimizations
MAC modeling and performance
evaluation
Stream time scheduling methods
not defined in the standard





DEV_1 cannot communicate with
DEV_4 in peer-to-peer manner
For traffic between DEV_1 and
DEV_3, is it better to forward via
PNC than the direct connection?
What is the optimal path and data
rate between DEV_3 and DEV_5?

Using network layer routing
• Each hop request a
CTA slot seperately.
• PNC treat each hop as
independent traffic
stream

• Effect: Failure in an
intermediate hop
breaks the
connections, but PNC
assumes that an
independent stream is
terminated. Keeps
allocating CTAs for
other hops untill it is
eventually notified by
all participating DEV

Using MAC layer forwarding
• With explicit MAC
layer forwarding,
PNC knows that
these hops belongs
to one connection.
• Better adjusting
downstream and
upstream CTAs.

• Effect: reroute the
traffic is the
intermediate node
fails, and releasing
all CTAs if source
of destination
terminates.

Some Observations
• Peer discover is essential
to piconet operations
and communication
between DEVs
• Full piconet connectivity
cannot be guaranteed
• Some DEV pairs may be
out of range of each
other
• Mac layer routing fails
but is better then IP
routing.

• Remember, 802.15.3 has
centralized topology. So
what ??
• Using PNC, any devices
is two-hop count away
only.
• Can use the central
management capability
to discover simpler and
less costly MAC route

Proposed peer discovery protocol
with forwarding route optimization
• The PNC can always act as a first hop to
connect non-intersecting range DEVs
• However, a betterment can be done in the
frame forwarding by choosing another
DEV closer in distance to the source and
destination to forward the frame.
• All routes are limited to two hops only.

Algorithm
• If the Desti_DEV is reachable, sending PNC
Information Request and Response exchange is
redundant.
• So, Src_DEV send Probe Request command to the
Dest_DEV.
• If Dest_DEV receives the command, it returns an
Imm-ACK after a SIFS and then the Probe Response
command as in standard protocol operations.
• At the same time, the third party, i.e., the PNC, shall
actively monitor the frame exchange.
• Upon receiving a Probe Request, the PNC checks the
destination ID (Dest_ID) field in the MAC header.

Algorithm (2)
• If the Dest_ID is not associated in the piconet, the PNC
send an Imm-ACK to the Src_DEV after SIFS, followed
by a PNC Information command with an empty
Information Element (IE) to notify the source that
destination does not exist.
• Otherwise, instead of ignoring the Probe Request frame,
the PNC waits for the Imm-ACK from the destination
DEV.
• If no Imm-ACK arrives after a backoff inter-frame space
(BIFS), which is the sum of a SIFS and a clear channel
assessment detect time (CCADetectTime), the PNC
realizes that the destination DEV cannot hear the source.
• The PNC then immediately send an Imm-ACK to the
source, followed by a PNC Information command with
the route information. (an optimized route information in
sent)

SRC_DEV send Probe
Request command to
DEST_DEV & PNC listens

SIFS
Imm-ACK

Probe Response command

SIFS (Imm-ACK)

PNC also listen

DEST_DEV
hears?

YES

DEST_DEV
responds

No
No

DEST_DEV
ID
Present?

Yes, Timeout (BIFS)

Send Imm-ACK & route
information to source

Yes and
DEST_DEV sent Imm-ACK

Do Nothing, monitor if
DEST_DEV crash.

Forward the data to
the router node

Algorithm (3)
[Route calculation]
• Most wireless networks today employ a multirate PHY (e.g., UWB in 802.15.3a) that
supports a set of data rate dependent
modulation/coding parameters.
• Due to the extremely low power consumption
requirement of WPAN devices, the achievable
data rate drops dramatically when the
distance increases.
• The data rate can be modeled as a discrete
function of transmission distance d between
two DEVs:

Algorithm (3)
Rate ( d )  S i ;
R i  1  d  R i ;1  i  m
where, R m

1

 0 , R i is the transmiss

and S 1 and S m are the minimum

ion range of rate S i ;

and maximum

data

rates, respective ly. If d is greater th an R 1, then Rate(d)
and the DEVs have no connectivi

ty

0

Algorithm (4)
• Since the PNC can monitor all commands exchanged
during the CAP, it can learn the data rates between
reachable DEV pairs and store them in an n x n rate
matrix (RM), where
• n is the total number of DEVs within the piconet. DEV
is assigned a unique DEV_ID in the piconet
RM ij is the link rate based on the current informatio
obtained

from the commands

DEV i and DEV j . RM

ij

exchanged

 0 if DEV i and DEV

are out of range or the rate informatio
not available

between

yet, and RM

ij

n is

  if i  j .

j

n

Algorithm (5)
• All DEVs transmit with the maximum
allowable power when sending data. Since the
wireless links are symmetric in nature, clearly
RMij = RMji.
• Based on the current rate information stored
in RM, for an unreachable pair DEVi and
DEVj, the PNC can determine the optimal
(two-hop) route that has the minimum
transmission time, i.e., the best route employs
DEVk for MAC layer forwarding, where k
minimizes:

Algorithm (6)
min(

1
RM



ik
k [ 0 , n  1 ]

1
RM

)
kj

• Alleviates the traffic load on the PNC
• Discovers a current optimal two-hop MAC layer
forwarding path given by existing rate information
without introducing any extra overhead
• If the connection is broken, the PNC can
immediately reroute the traffic to a current
optimal path, or terminate the connection by deallocating all corresponding CTAs.

Discussion
• Original case:
Causes
retransmission

• 3PHP: data sent via
2-hop route if
PNC_ID exists

Dest_ID

Dest_ID

• Normal Transmission (Imm_Ack)

• Normal Transmission (Imm_Ack)

XXX FRAME LOST XXXX

PNC_ID

• Causes retransmission

• Sent Via 2–hop route (Imm_Ack)

PNC

Src_DEV
PNC Info. Request command

Probe Request Command

BIFS
Imm-ACK
SIFS

PNC Information command with Route Info.

Imm-ACK

RIFS

Dest_DEV

SIFS

3PHP-Node

DEV – 1

DEV - 2

PNC

Observations
• With 3PHP, peer discovery requires only one
round of frame exchange.
• Fully utilized the broadcast nature,
centralized control, ad-hoc communication,
and efficient peer discovery.
• Save the futile back-off retransmission for
unreachable destination.
• Guaranteed full piconet connectivity. (no
network layer routing required)
• On demand routing
• More then BIFS waiting. (include RIFS) Conclusion

Performance Evaluations
[Intra-piconet no connection probability]
• Intra-piconet no
connection
probability

• Common Overlap
Area function
COLA(R, r, x):
Represent the
intersection of two
circles with radii R
and r (r e R),
respectively, which
centers are
separated by
distance x

Performance Evaluations (2)
[Intra-piconet no connection probability]

Performance Evaluations (3)
[Intra-piconet no connection probability]
• The probability of no direct connection
between two DEVs in a piconet is

Performance Evaluations (4)
[Peer Discovery delay analysis]


# of Frame Transmission




Expected
Contention Time



Expected Packet
Delay

Performance Evaluations (5)
[Peer Discovery delay analysis]


Expected routing
failure probability

• Expected successful peer discovery
delays are given by

Simulation and Numerical Results
• No connection probability as a function of
coverage range ratio

Simulation and Numerical Results (2)
• Peer discovery delay vs. conditional
collision probability

Simulation and Numerical Results (3)
• Piconet peer discovery time vs. coverage
range ratio

Simulation and Numerical Results (4)
• Piconet peer discovery failure probability
with standard method

Simulation and Numerical Results (5)
• Two-hop forwarding route optimization
ratio vs. piconet radius

Simulation and Numerical Results (6)
• Expected data between directly unreachable
pairs in piconets with 20 DEVs

Conclusion
• Underlying fact: peer-to-peer data delivery in
802.15.3 WPANs
• Existing MAC layer peer discovery methods
cannot guarantee full connectivity between
DEVs within a piconet through direct peerto-peer connections if the piconet operates
with a radius larger than half of the
maximum transmission distance. (~ 41.3%)
• If Mac fails, use the expensive network layer
routing.

Conclusion (2)
• Used the central control topology
• Routing in 2-hop with single round of
control frame exchange
• 3PHP achieves 25– 37% faster peer
discovery time over the standard MAC
• Route optimization algorithm in the PNC
to provide the best MAC layer forwarding
routes by self-learning the available rate
information between DEVs.

References


IEEE Standard 802.15.3, “Wireless medium access control (MAC) and physical
layer (PHY) specifications for high rate wireless personal area networks
(WPANs),”Sept. 2003.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery in IEEE 802.15.3 WPANs,”in Proc. IEEE BroadNets2005, Boston, MA,
Oct. 2005.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery and Route Optimization in IEEE 802.15.3WPANs,”accepted for
publication in ACM/KluwerJ. Mobile Networks and Applications, Nov. 2005.



Z. Yin and V.C.M. Leung, “Connection Data Rate Optimization of IEEE 802.15.3
Scatternetswith Multi-rate Carriers,”IEEE ICC’06, Istanbul, Turkey, June 2006.



Zhanping Yin and Victor C.M. Leung, “Introduction to IEEE 802.15.3 High Rate
Wireless Personal Area Network (WPAN)”, Electrical and Computer Engineering
University of British Columbia

Thank You



Slide 33

Third-Party Handshake Protocol for
Efficient Peer Discovery
and Route Optimization in
IEEE 802.15.3 WPANs
Authors:
Zhanping Yin * Victor C. M. Leung
Published:
ACM/ MONET 2006
Presented by:
Gautam S. Thakur

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

WPAN
• A WPAN (wireless personal area network) is a
personal area network - a network for
interconnecting devices centered around an
individual person's workspace
• A very short range ~10 mtrs. E.g. Bluetooth
• Proposed operating frequencies are around
2.4 GHz in digital modes.
• The objective is to facilitate seamless

operation among home or business devices
and systems.

Ultra-Wideband
• A physical layer technology
• For, short distance communication with high
data rate and short transmission range.
• Lower power requirement and pulsed data
• UWB transmission over extremely wide
unlicensed radio spectrum  3.1 – 10.6 GHz.
• Over results in
– Less interference
– Wire-like performance for indoor wireless
environment.

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Overview of 802.15.3
• Why 802.15.3 ?
• The 802.15.3 Wireless Space
• 802.15.3 Overview and Components

Overview of 802.15.3
[Why 802.15.3 ?]
• Motivated by the increasing demand of wireless
communications with






Ubiquitous network connectivity
Low cost and low power consumption -> WPAN
High data rate(HDR)
Quality of Service(QoS) support
Comparison with other short to medium range wireless
technologies
• Wireless LAN (WLAN)
– High cost and power consumption, no hard QoS guarantee

• WPANs-Bluetooth (802.15.1) and ZigBee(802.15.4)
– Data rate too low

• Applications of 802.15.3
– Virtual wireless multimedia connectivity
• Video/audio distribution

– High speed data transfer

Overview of 802.15.3
[ 802.15.3 = Wireless Multimedia ]

Overview of 802.15.3
[ The 802 Wireless Space ]

IEEE 802.15.3 Overview
• High date rate and low
power
• Mainly works within a
piconet with dynamic
DEV membership
• Ad hoc topology with
centralized control by
the PNC
• Connection oriented
peer-to-peer
communications
• Support for multimedia
quality of service(QoS)
• Multiple power
management modes
• Security

Formation of an 802.15.3 piconet
• The basic component
is the DEV
– One DEV is required to
assume the role of the
piconet coordinator
(PNC) of the piconet.
– The PNC provides the
basic timing sync for the
piconet with the beacon.
– Additionally, the PNC
manages the quality of
service (QoS)
requirements, power
save modes and access
control to the piconet.

Formation of an 802.15.3 piconet (2)
• PNC supports ad
hoc peer-to-peer
connections
• PNC provides
timing for
synchronization of
DEVs within the
piconet, performs
admission control,
allocates network
resources etc

Formation of a Piconet (3)
• All DEVs within radio coverage of the PNC
can then associate with it to form a piconet.
• Then starts the peer discovery.
• Some DEV pairs in the piconet may be out of

range of each other, and as a result, direct
peer-to-peer connection is unavailable
between them. This results in network layer
discovery methods

Superframe format
• Timing and data transmissions in the piconet
are based on the superframe
• The superframe has three parts
– Beacon: Control information, Allocates CTA,
Synchronization
– Contention Access Period (CAP): via CSMA/CA, file xfer
– Channel Time Allocation Period (CTAP)

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Peer discovery and connectivity issue
• An 802.15.3 piconet supports ad hoc
communications between peer DEVs.
• Peer discovery is crucial to its operation.
• The DEVs shall be able to obtain information
about the services and capabilities of other
DEVs in the piconet at any time by
information discovery commands.
• Peer information is needed before a source
DEV can send any data to a destination DEV,
or generate channel time requests (CTRq) to
the PNC.

1
2

5

3

4

6

9

7

8

10

13

11

14

12

15

PNC

Src_DEV

Dest_DEV

PNC Info. Request command
SIFS
Imm-ACK

SIFS
PNC Information command
SIFS
Imm-ACK
SIFS

Probe Request Command
SIFS
Imm-ACK
SIFS
Probe Response Command
SIFS
Imm-ACK
RIFS

1. NOT receive the Imm-Ack
2. Cannot distinguish out-of-range
transmission and collision
3. Perform backoff retransmission
for collision repeatedly

DEV – 1

PNC

Dev 2 is outside the
range of Dev1 and
vise-versa

1. NOT receive Probe Request
command

DEV - 2

Existing Issues with IEEE 802.15.3











Peer discovery is crucial to piconet
operations.
Standard peer discovery is
unreliable and leads to substantial
delays for unreachable DEV pairs
Full piconet connectivity is not
guaranteed with only direct peerto-peer communications
The standard 802.15.3 MAC does
not take advantage of the unique
ranging capabilities enabled by
UWB
Connections are in peer-to-peer
manner without consider of
possible route optimizations
MAC modeling and performance
evaluation
Stream time scheduling methods
not defined in the standard





DEV_1 cannot communicate with
DEV_4 in peer-to-peer manner
For traffic between DEV_1 and
DEV_3, is it better to forward via
PNC than the direct connection?
What is the optimal path and data
rate between DEV_3 and DEV_5?

Using network layer routing
• Each hop request a
CTA slot seperately.
• PNC treat each hop as
independent traffic
stream

• Effect: Failure in an
intermediate hop
breaks the
connections, but PNC
assumes that an
independent stream is
terminated. Keeps
allocating CTAs for
other hops untill it is
eventually notified by
all participating DEV

Using MAC layer forwarding
• With explicit MAC
layer forwarding,
PNC knows that
these hops belongs
to one connection.
• Better adjusting
downstream and
upstream CTAs.

• Effect: reroute the
traffic is the
intermediate node
fails, and releasing
all CTAs if source
of destination
terminates.

Some Observations
• Peer discover is essential
to piconet operations
and communication
between DEVs
• Full piconet connectivity
cannot be guaranteed
• Some DEV pairs may be
out of range of each
other
• Mac layer routing fails
but is better then IP
routing.

• Remember, 802.15.3 has
centralized topology. So
what ??
• Using PNC, any devices
is two-hop count away
only.
• Can use the central
management capability
to discover simpler and
less costly MAC route

Proposed peer discovery protocol
with forwarding route optimization
• The PNC can always act as a first hop to
connect non-intersecting range DEVs
• However, a betterment can be done in the
frame forwarding by choosing another
DEV closer in distance to the source and
destination to forward the frame.
• All routes are limited to two hops only.

Algorithm
• If the Desti_DEV is reachable, sending PNC
Information Request and Response exchange is
redundant.
• So, Src_DEV send Probe Request command to the
Dest_DEV.
• If Dest_DEV receives the command, it returns an
Imm-ACK after a SIFS and then the Probe Response
command as in standard protocol operations.
• At the same time, the third party, i.e., the PNC, shall
actively monitor the frame exchange.
• Upon receiving a Probe Request, the PNC checks the
destination ID (Dest_ID) field in the MAC header.

Algorithm (2)
• If the Dest_ID is not associated in the piconet, the PNC
send an Imm-ACK to the Src_DEV after SIFS, followed
by a PNC Information command with an empty
Information Element (IE) to notify the source that
destination does not exist.
• Otherwise, instead of ignoring the Probe Request frame,
the PNC waits for the Imm-ACK from the destination
DEV.
• If no Imm-ACK arrives after a backoff inter-frame space
(BIFS), which is the sum of a SIFS and a clear channel
assessment detect time (CCADetectTime), the PNC
realizes that the destination DEV cannot hear the source.
• The PNC then immediately send an Imm-ACK to the
source, followed by a PNC Information command with
the route information. (an optimized route information in
sent)

SRC_DEV send Probe
Request command to
DEST_DEV & PNC listens

SIFS
Imm-ACK

Probe Response command

SIFS (Imm-ACK)

PNC also listen

DEST_DEV
hears?

YES

DEST_DEV
responds

No
No

DEST_DEV
ID
Present?

Yes, Timeout (BIFS)

Send Imm-ACK & route
information to source

Yes and
DEST_DEV sent Imm-ACK

Do Nothing, monitor if
DEST_DEV crash.

Forward the data to
the router node

Algorithm (3)
[Route calculation]
• Most wireless networks today employ a multirate PHY (e.g., UWB in 802.15.3a) that
supports a set of data rate dependent
modulation/coding parameters.
• Due to the extremely low power consumption
requirement of WPAN devices, the achievable
data rate drops dramatically when the
distance increases.
• The data rate can be modeled as a discrete
function of transmission distance d between
two DEVs:

Algorithm (3)
Rate ( d )  S i ;
R i  1  d  R i ;1  i  m
where, R m

1

 0 , R i is the transmiss

and S 1 and S m are the minimum

ion range of rate S i ;

and maximum

data

rates, respective ly. If d is greater th an R 1, then Rate(d)
and the DEVs have no connectivi

ty

0

Algorithm (4)
• Since the PNC can monitor all commands exchanged
during the CAP, it can learn the data rates between
reachable DEV pairs and store them in an n x n rate
matrix (RM), where
• n is the total number of DEVs within the piconet. DEV
is assigned a unique DEV_ID in the piconet
RM ij is the link rate based on the current informatio
obtained

from the commands

DEV i and DEV j . RM

ij

exchanged

 0 if DEV i and DEV

are out of range or the rate informatio
not available

between

yet, and RM

ij

n is

  if i  j .

j

n

Algorithm (5)
• All DEVs transmit with the maximum
allowable power when sending data. Since the
wireless links are symmetric in nature, clearly
RMij = RMji.
• Based on the current rate information stored
in RM, for an unreachable pair DEVi and
DEVj, the PNC can determine the optimal
(two-hop) route that has the minimum
transmission time, i.e., the best route employs
DEVk for MAC layer forwarding, where k
minimizes:

Algorithm (6)
min(

1
RM



ik
k [ 0 , n  1 ]

1
RM

)
kj

• Alleviates the traffic load on the PNC
• Discovers a current optimal two-hop MAC layer
forwarding path given by existing rate information
without introducing any extra overhead
• If the connection is broken, the PNC can
immediately reroute the traffic to a current
optimal path, or terminate the connection by deallocating all corresponding CTAs.

Discussion
• Original case:
Causes
retransmission

• 3PHP: data sent via
2-hop route if
PNC_ID exists

Dest_ID

Dest_ID

• Normal Transmission (Imm_Ack)

• Normal Transmission (Imm_Ack)

XXX FRAME LOST XXXX

PNC_ID

• Causes retransmission

• Sent Via 2–hop route (Imm_Ack)

PNC

Src_DEV
PNC Info. Request command

Probe Request Command

BIFS
Imm-ACK
SIFS

PNC Information command with Route Info.

Imm-ACK

RIFS

Dest_DEV

SIFS

3PHP-Node

DEV – 1

DEV - 2

PNC

Observations
• With 3PHP, peer discovery requires only one
round of frame exchange.
• Fully utilized the broadcast nature,
centralized control, ad-hoc communication,
and efficient peer discovery.
• Save the futile back-off retransmission for
unreachable destination.
• Guaranteed full piconet connectivity. (no
network layer routing required)
• On demand routing
• More then BIFS waiting. (include RIFS) Conclusion

Performance Evaluations
[Intra-piconet no connection probability]
• Intra-piconet no
connection
probability

• Common Overlap
Area function
COLA(R, r, x):
Represent the
intersection of two
circles with radii R
and r (r e R),
respectively, which
centers are
separated by
distance x

Performance Evaluations (2)
[Intra-piconet no connection probability]

Performance Evaluations (3)
[Intra-piconet no connection probability]
• The probability of no direct connection
between two DEVs in a piconet is

Performance Evaluations (4)
[Peer Discovery delay analysis]


# of Frame Transmission




Expected
Contention Time



Expected Packet
Delay

Performance Evaluations (5)
[Peer Discovery delay analysis]


Expected routing
failure probability

• Expected successful peer discovery
delays are given by

Simulation and Numerical Results
• No connection probability as a function of
coverage range ratio

Simulation and Numerical Results (2)
• Peer discovery delay vs. conditional
collision probability

Simulation and Numerical Results (3)
• Piconet peer discovery time vs. coverage
range ratio

Simulation and Numerical Results (4)
• Piconet peer discovery failure probability
with standard method

Simulation and Numerical Results (5)
• Two-hop forwarding route optimization
ratio vs. piconet radius

Simulation and Numerical Results (6)
• Expected data between directly unreachable
pairs in piconets with 20 DEVs

Conclusion
• Underlying fact: peer-to-peer data delivery in
802.15.3 WPANs
• Existing MAC layer peer discovery methods
cannot guarantee full connectivity between
DEVs within a piconet through direct peerto-peer connections if the piconet operates
with a radius larger than half of the
maximum transmission distance. (~ 41.3%)
• If Mac fails, use the expensive network layer
routing.

Conclusion (2)
• Used the central control topology
• Routing in 2-hop with single round of
control frame exchange
• 3PHP achieves 25– 37% faster peer
discovery time over the standard MAC
• Route optimization algorithm in the PNC
to provide the best MAC layer forwarding
routes by self-learning the available rate
information between DEVs.

References


IEEE Standard 802.15.3, “Wireless medium access control (MAC) and physical
layer (PHY) specifications for high rate wireless personal area networks
(WPANs),”Sept. 2003.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery in IEEE 802.15.3 WPANs,”in Proc. IEEE BroadNets2005, Boston, MA,
Oct. 2005.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery and Route Optimization in IEEE 802.15.3WPANs,”accepted for
publication in ACM/KluwerJ. Mobile Networks and Applications, Nov. 2005.



Z. Yin and V.C.M. Leung, “Connection Data Rate Optimization of IEEE 802.15.3
Scatternetswith Multi-rate Carriers,”IEEE ICC’06, Istanbul, Turkey, June 2006.



Zhanping Yin and Victor C.M. Leung, “Introduction to IEEE 802.15.3 High Rate
Wireless Personal Area Network (WPAN)”, Electrical and Computer Engineering
University of British Columbia

Thank You



Slide 34

Third-Party Handshake Protocol for
Efficient Peer Discovery
and Route Optimization in
IEEE 802.15.3 WPANs
Authors:
Zhanping Yin * Victor C. M. Leung
Published:
ACM/ MONET 2006
Presented by:
Gautam S. Thakur

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

WPAN
• A WPAN (wireless personal area network) is a
personal area network - a network for
interconnecting devices centered around an
individual person's workspace
• A very short range ~10 mtrs. E.g. Bluetooth
• Proposed operating frequencies are around
2.4 GHz in digital modes.
• The objective is to facilitate seamless

operation among home or business devices
and systems.

Ultra-Wideband
• A physical layer technology
• For, short distance communication with high
data rate and short transmission range.
• Lower power requirement and pulsed data
• UWB transmission over extremely wide
unlicensed radio spectrum  3.1 – 10.6 GHz.
• Over results in
– Less interference
– Wire-like performance for indoor wireless
environment.

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Overview of 802.15.3
• Why 802.15.3 ?
• The 802.15.3 Wireless Space
• 802.15.3 Overview and Components

Overview of 802.15.3
[Why 802.15.3 ?]
• Motivated by the increasing demand of wireless
communications with






Ubiquitous network connectivity
Low cost and low power consumption -> WPAN
High data rate(HDR)
Quality of Service(QoS) support
Comparison with other short to medium range wireless
technologies
• Wireless LAN (WLAN)
– High cost and power consumption, no hard QoS guarantee

• WPANs-Bluetooth (802.15.1) and ZigBee(802.15.4)
– Data rate too low

• Applications of 802.15.3
– Virtual wireless multimedia connectivity
• Video/audio distribution

– High speed data transfer

Overview of 802.15.3
[ 802.15.3 = Wireless Multimedia ]

Overview of 802.15.3
[ The 802 Wireless Space ]

IEEE 802.15.3 Overview
• High date rate and low
power
• Mainly works within a
piconet with dynamic
DEV membership
• Ad hoc topology with
centralized control by
the PNC
• Connection oriented
peer-to-peer
communications
• Support for multimedia
quality of service(QoS)
• Multiple power
management modes
• Security

Formation of an 802.15.3 piconet
• The basic component
is the DEV
– One DEV is required to
assume the role of the
piconet coordinator
(PNC) of the piconet.
– The PNC provides the
basic timing sync for the
piconet with the beacon.
– Additionally, the PNC
manages the quality of
service (QoS)
requirements, power
save modes and access
control to the piconet.

Formation of an 802.15.3 piconet (2)
• PNC supports ad
hoc peer-to-peer
connections
• PNC provides
timing for
synchronization of
DEVs within the
piconet, performs
admission control,
allocates network
resources etc

Formation of a Piconet (3)
• All DEVs within radio coverage of the PNC
can then associate with it to form a piconet.
• Then starts the peer discovery.
• Some DEV pairs in the piconet may be out of

range of each other, and as a result, direct
peer-to-peer connection is unavailable
between them. This results in network layer
discovery methods

Superframe format
• Timing and data transmissions in the piconet
are based on the superframe
• The superframe has three parts
– Beacon: Control information, Allocates CTA,
Synchronization
– Contention Access Period (CAP): via CSMA/CA, file xfer
– Channel Time Allocation Period (CTAP)

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Peer discovery and connectivity issue
• An 802.15.3 piconet supports ad hoc
communications between peer DEVs.
• Peer discovery is crucial to its operation.
• The DEVs shall be able to obtain information
about the services and capabilities of other
DEVs in the piconet at any time by
information discovery commands.
• Peer information is needed before a source
DEV can send any data to a destination DEV,
or generate channel time requests (CTRq) to
the PNC.

1
2

5

3

4

6

9

7

8

10

13

11

14

12

15

PNC

Src_DEV

Dest_DEV

PNC Info. Request command
SIFS
Imm-ACK

SIFS
PNC Information command
SIFS
Imm-ACK
SIFS

Probe Request Command
SIFS
Imm-ACK
SIFS
Probe Response Command
SIFS
Imm-ACK
RIFS

1. NOT receive the Imm-Ack
2. Cannot distinguish out-of-range
transmission and collision
3. Perform backoff retransmission
for collision repeatedly

DEV – 1

PNC

Dev 2 is outside the
range of Dev1 and
vise-versa

1. NOT receive Probe Request
command

DEV - 2

Existing Issues with IEEE 802.15.3











Peer discovery is crucial to piconet
operations.
Standard peer discovery is
unreliable and leads to substantial
delays for unreachable DEV pairs
Full piconet connectivity is not
guaranteed with only direct peerto-peer communications
The standard 802.15.3 MAC does
not take advantage of the unique
ranging capabilities enabled by
UWB
Connections are in peer-to-peer
manner without consider of
possible route optimizations
MAC modeling and performance
evaluation
Stream time scheduling methods
not defined in the standard





DEV_1 cannot communicate with
DEV_4 in peer-to-peer manner
For traffic between DEV_1 and
DEV_3, is it better to forward via
PNC than the direct connection?
What is the optimal path and data
rate between DEV_3 and DEV_5?

Using network layer routing
• Each hop request a
CTA slot seperately.
• PNC treat each hop as
independent traffic
stream

• Effect: Failure in an
intermediate hop
breaks the
connections, but PNC
assumes that an
independent stream is
terminated. Keeps
allocating CTAs for
other hops untill it is
eventually notified by
all participating DEV

Using MAC layer forwarding
• With explicit MAC
layer forwarding,
PNC knows that
these hops belongs
to one connection.
• Better adjusting
downstream and
upstream CTAs.

• Effect: reroute the
traffic is the
intermediate node
fails, and releasing
all CTAs if source
of destination
terminates.

Some Observations
• Peer discover is essential
to piconet operations
and communication
between DEVs
• Full piconet connectivity
cannot be guaranteed
• Some DEV pairs may be
out of range of each
other
• Mac layer routing fails
but is better then IP
routing.

• Remember, 802.15.3 has
centralized topology. So
what ??
• Using PNC, any devices
is two-hop count away
only.
• Can use the central
management capability
to discover simpler and
less costly MAC route

Proposed peer discovery protocol
with forwarding route optimization
• The PNC can always act as a first hop to
connect non-intersecting range DEVs
• However, a betterment can be done in the
frame forwarding by choosing another
DEV closer in distance to the source and
destination to forward the frame.
• All routes are limited to two hops only.

Algorithm
• If the Desti_DEV is reachable, sending PNC
Information Request and Response exchange is
redundant.
• So, Src_DEV send Probe Request command to the
Dest_DEV.
• If Dest_DEV receives the command, it returns an
Imm-ACK after a SIFS and then the Probe Response
command as in standard protocol operations.
• At the same time, the third party, i.e., the PNC, shall
actively monitor the frame exchange.
• Upon receiving a Probe Request, the PNC checks the
destination ID (Dest_ID) field in the MAC header.

Algorithm (2)
• If the Dest_ID is not associated in the piconet, the PNC
send an Imm-ACK to the Src_DEV after SIFS, followed
by a PNC Information command with an empty
Information Element (IE) to notify the source that
destination does not exist.
• Otherwise, instead of ignoring the Probe Request frame,
the PNC waits for the Imm-ACK from the destination
DEV.
• If no Imm-ACK arrives after a backoff inter-frame space
(BIFS), which is the sum of a SIFS and a clear channel
assessment detect time (CCADetectTime), the PNC
realizes that the destination DEV cannot hear the source.
• The PNC then immediately send an Imm-ACK to the
source, followed by a PNC Information command with
the route information. (an optimized route information in
sent)

SRC_DEV send Probe
Request command to
DEST_DEV & PNC listens

SIFS
Imm-ACK

Probe Response command

SIFS (Imm-ACK)

PNC also listen

DEST_DEV
hears?

YES

DEST_DEV
responds

No
No

DEST_DEV
ID
Present?

Yes, Timeout (BIFS)

Send Imm-ACK & route
information to source

Yes and
DEST_DEV sent Imm-ACK

Do Nothing, monitor if
DEST_DEV crash.

Forward the data to
the router node

Algorithm (3)
[Route calculation]
• Most wireless networks today employ a multirate PHY (e.g., UWB in 802.15.3a) that
supports a set of data rate dependent
modulation/coding parameters.
• Due to the extremely low power consumption
requirement of WPAN devices, the achievable
data rate drops dramatically when the
distance increases.
• The data rate can be modeled as a discrete
function of transmission distance d between
two DEVs:

Algorithm (3)
Rate ( d )  S i ;
R i  1  d  R i ;1  i  m
where, R m

1

 0 , R i is the transmiss

and S 1 and S m are the minimum

ion range of rate S i ;

and maximum

data

rates, respective ly. If d is greater th an R 1, then Rate(d)
and the DEVs have no connectivi

ty

0

Algorithm (4)
• Since the PNC can monitor all commands exchanged
during the CAP, it can learn the data rates between
reachable DEV pairs and store them in an n x n rate
matrix (RM), where
• n is the total number of DEVs within the piconet. DEV
is assigned a unique DEV_ID in the piconet
RM ij is the link rate based on the current informatio
obtained

from the commands

DEV i and DEV j . RM

ij

exchanged

 0 if DEV i and DEV

are out of range or the rate informatio
not available

between

yet, and RM

ij

n is

  if i  j .

j

n

Algorithm (5)
• All DEVs transmit with the maximum
allowable power when sending data. Since the
wireless links are symmetric in nature, clearly
RMij = RMji.
• Based on the current rate information stored
in RM, for an unreachable pair DEVi and
DEVj, the PNC can determine the optimal
(two-hop) route that has the minimum
transmission time, i.e., the best route employs
DEVk for MAC layer forwarding, where k
minimizes:

Algorithm (6)
min(

1
RM



ik
k [ 0 , n  1 ]

1
RM

)
kj

• Alleviates the traffic load on the PNC
• Discovers a current optimal two-hop MAC layer
forwarding path given by existing rate information
without introducing any extra overhead
• If the connection is broken, the PNC can
immediately reroute the traffic to a current
optimal path, or terminate the connection by deallocating all corresponding CTAs.

Discussion
• Original case:
Causes
retransmission

• 3PHP: data sent via
2-hop route if
PNC_ID exists

Dest_ID

Dest_ID

• Normal Transmission (Imm_Ack)

• Normal Transmission (Imm_Ack)

XXX FRAME LOST XXXX

PNC_ID

• Causes retransmission

• Sent Via 2–hop route (Imm_Ack)

PNC

Src_DEV
PNC Info. Request command

Probe Request Command

BIFS
Imm-ACK
SIFS

PNC Information command with Route Info.

Imm-ACK

RIFS

Dest_DEV

SIFS

3PHP-Node

DEV – 1

DEV - 2

PNC

Observations
• With 3PHP, peer discovery requires only one
round of frame exchange.
• Fully utilized the broadcast nature,
centralized control, ad-hoc communication,
and efficient peer discovery.
• Save the futile back-off retransmission for
unreachable destination.
• Guaranteed full piconet connectivity. (no
network layer routing required)
• On demand routing
• More then BIFS waiting. (include RIFS) Conclusion

Performance Evaluations
[Intra-piconet no connection probability]
• Intra-piconet no
connection
probability

• Common Overlap
Area function
COLA(R, r, x):
Represent the
intersection of two
circles with radii R
and r (r e R),
respectively, which
centers are
separated by
distance x

Performance Evaluations (2)
[Intra-piconet no connection probability]

Performance Evaluations (3)
[Intra-piconet no connection probability]
• The probability of no direct connection
between two DEVs in a piconet is

Performance Evaluations (4)
[Peer Discovery delay analysis]


# of Frame Transmission




Expected
Contention Time



Expected Packet
Delay

Performance Evaluations (5)
[Peer Discovery delay analysis]


Expected routing
failure probability

• Expected successful peer discovery
delays are given by

Simulation and Numerical Results
• No connection probability as a function of
coverage range ratio

Simulation and Numerical Results (2)
• Peer discovery delay vs. conditional
collision probability

Simulation and Numerical Results (3)
• Piconet peer discovery time vs. coverage
range ratio

Simulation and Numerical Results (4)
• Piconet peer discovery failure probability
with standard method

Simulation and Numerical Results (5)
• Two-hop forwarding route optimization
ratio vs. piconet radius

Simulation and Numerical Results (6)
• Expected data between directly unreachable
pairs in piconets with 20 DEVs

Conclusion
• Underlying fact: peer-to-peer data delivery in
802.15.3 WPANs
• Existing MAC layer peer discovery methods
cannot guarantee full connectivity between
DEVs within a piconet through direct peerto-peer connections if the piconet operates
with a radius larger than half of the
maximum transmission distance. (~ 41.3%)
• If Mac fails, use the expensive network layer
routing.

Conclusion (2)
• Used the central control topology
• Routing in 2-hop with single round of
control frame exchange
• 3PHP achieves 25– 37% faster peer
discovery time over the standard MAC
• Route optimization algorithm in the PNC
to provide the best MAC layer forwarding
routes by self-learning the available rate
information between DEVs.

References


IEEE Standard 802.15.3, “Wireless medium access control (MAC) and physical
layer (PHY) specifications for high rate wireless personal area networks
(WPANs),”Sept. 2003.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery in IEEE 802.15.3 WPANs,”in Proc. IEEE BroadNets2005, Boston, MA,
Oct. 2005.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery and Route Optimization in IEEE 802.15.3WPANs,”accepted for
publication in ACM/KluwerJ. Mobile Networks and Applications, Nov. 2005.



Z. Yin and V.C.M. Leung, “Connection Data Rate Optimization of IEEE 802.15.3
Scatternetswith Multi-rate Carriers,”IEEE ICC’06, Istanbul, Turkey, June 2006.



Zhanping Yin and Victor C.M. Leung, “Introduction to IEEE 802.15.3 High Rate
Wireless Personal Area Network (WPAN)”, Electrical and Computer Engineering
University of British Columbia

Thank You



Slide 35

Third-Party Handshake Protocol for
Efficient Peer Discovery
and Route Optimization in
IEEE 802.15.3 WPANs
Authors:
Zhanping Yin * Victor C. M. Leung
Published:
ACM/ MONET 2006
Presented by:
Gautam S. Thakur

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

WPAN
• A WPAN (wireless personal area network) is a
personal area network - a network for
interconnecting devices centered around an
individual person's workspace
• A very short range ~10 mtrs. E.g. Bluetooth
• Proposed operating frequencies are around
2.4 GHz in digital modes.
• The objective is to facilitate seamless

operation among home or business devices
and systems.

Ultra-Wideband
• A physical layer technology
• For, short distance communication with high
data rate and short transmission range.
• Lower power requirement and pulsed data
• UWB transmission over extremely wide
unlicensed radio spectrum  3.1 – 10.6 GHz.
• Over results in
– Less interference
– Wire-like performance for indoor wireless
environment.

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Overview of 802.15.3
• Why 802.15.3 ?
• The 802.15.3 Wireless Space
• 802.15.3 Overview and Components

Overview of 802.15.3
[Why 802.15.3 ?]
• Motivated by the increasing demand of wireless
communications with






Ubiquitous network connectivity
Low cost and low power consumption -> WPAN
High data rate(HDR)
Quality of Service(QoS) support
Comparison with other short to medium range wireless
technologies
• Wireless LAN (WLAN)
– High cost and power consumption, no hard QoS guarantee

• WPANs-Bluetooth (802.15.1) and ZigBee(802.15.4)
– Data rate too low

• Applications of 802.15.3
– Virtual wireless multimedia connectivity
• Video/audio distribution

– High speed data transfer

Overview of 802.15.3
[ 802.15.3 = Wireless Multimedia ]

Overview of 802.15.3
[ The 802 Wireless Space ]

IEEE 802.15.3 Overview
• High date rate and low
power
• Mainly works within a
piconet with dynamic
DEV membership
• Ad hoc topology with
centralized control by
the PNC
• Connection oriented
peer-to-peer
communications
• Support for multimedia
quality of service(QoS)
• Multiple power
management modes
• Security

Formation of an 802.15.3 piconet
• The basic component
is the DEV
– One DEV is required to
assume the role of the
piconet coordinator
(PNC) of the piconet.
– The PNC provides the
basic timing sync for the
piconet with the beacon.
– Additionally, the PNC
manages the quality of
service (QoS)
requirements, power
save modes and access
control to the piconet.

Formation of an 802.15.3 piconet (2)
• PNC supports ad
hoc peer-to-peer
connections
• PNC provides
timing for
synchronization of
DEVs within the
piconet, performs
admission control,
allocates network
resources etc

Formation of a Piconet (3)
• All DEVs within radio coverage of the PNC
can then associate with it to form a piconet.
• Then starts the peer discovery.
• Some DEV pairs in the piconet may be out of

range of each other, and as a result, direct
peer-to-peer connection is unavailable
between them. This results in network layer
discovery methods

Superframe format
• Timing and data transmissions in the piconet
are based on the superframe
• The superframe has three parts
– Beacon: Control information, Allocates CTA,
Synchronization
– Contention Access Period (CAP): via CSMA/CA, file xfer
– Channel Time Allocation Period (CTAP)

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Peer discovery and connectivity issue
• An 802.15.3 piconet supports ad hoc
communications between peer DEVs.
• Peer discovery is crucial to its operation.
• The DEVs shall be able to obtain information
about the services and capabilities of other
DEVs in the piconet at any time by
information discovery commands.
• Peer information is needed before a source
DEV can send any data to a destination DEV,
or generate channel time requests (CTRq) to
the PNC.

1
2

5

3

4

6

9

7

8

10

13

11

14

12

15

PNC

Src_DEV

Dest_DEV

PNC Info. Request command
SIFS
Imm-ACK

SIFS
PNC Information command
SIFS
Imm-ACK
SIFS

Probe Request Command
SIFS
Imm-ACK
SIFS
Probe Response Command
SIFS
Imm-ACK
RIFS

1. NOT receive the Imm-Ack
2. Cannot distinguish out-of-range
transmission and collision
3. Perform backoff retransmission
for collision repeatedly

DEV – 1

PNC

Dev 2 is outside the
range of Dev1 and
vise-versa

1. NOT receive Probe Request
command

DEV - 2

Existing Issues with IEEE 802.15.3











Peer discovery is crucial to piconet
operations.
Standard peer discovery is
unreliable and leads to substantial
delays for unreachable DEV pairs
Full piconet connectivity is not
guaranteed with only direct peerto-peer communications
The standard 802.15.3 MAC does
not take advantage of the unique
ranging capabilities enabled by
UWB
Connections are in peer-to-peer
manner without consider of
possible route optimizations
MAC modeling and performance
evaluation
Stream time scheduling methods
not defined in the standard





DEV_1 cannot communicate with
DEV_4 in peer-to-peer manner
For traffic between DEV_1 and
DEV_3, is it better to forward via
PNC than the direct connection?
What is the optimal path and data
rate between DEV_3 and DEV_5?

Using network layer routing
• Each hop request a
CTA slot seperately.
• PNC treat each hop as
independent traffic
stream

• Effect: Failure in an
intermediate hop
breaks the
connections, but PNC
assumes that an
independent stream is
terminated. Keeps
allocating CTAs for
other hops untill it is
eventually notified by
all participating DEV

Using MAC layer forwarding
• With explicit MAC
layer forwarding,
PNC knows that
these hops belongs
to one connection.
• Better adjusting
downstream and
upstream CTAs.

• Effect: reroute the
traffic is the
intermediate node
fails, and releasing
all CTAs if source
of destination
terminates.

Some Observations
• Peer discover is essential
to piconet operations
and communication
between DEVs
• Full piconet connectivity
cannot be guaranteed
• Some DEV pairs may be
out of range of each
other
• Mac layer routing fails
but is better then IP
routing.

• Remember, 802.15.3 has
centralized topology. So
what ??
• Using PNC, any devices
is two-hop count away
only.
• Can use the central
management capability
to discover simpler and
less costly MAC route

Proposed peer discovery protocol
with forwarding route optimization
• The PNC can always act as a first hop to
connect non-intersecting range DEVs
• However, a betterment can be done in the
frame forwarding by choosing another
DEV closer in distance to the source and
destination to forward the frame.
• All routes are limited to two hops only.

Algorithm
• If the Desti_DEV is reachable, sending PNC
Information Request and Response exchange is
redundant.
• So, Src_DEV send Probe Request command to the
Dest_DEV.
• If Dest_DEV receives the command, it returns an
Imm-ACK after a SIFS and then the Probe Response
command as in standard protocol operations.
• At the same time, the third party, i.e., the PNC, shall
actively monitor the frame exchange.
• Upon receiving a Probe Request, the PNC checks the
destination ID (Dest_ID) field in the MAC header.

Algorithm (2)
• If the Dest_ID is not associated in the piconet, the PNC
send an Imm-ACK to the Src_DEV after SIFS, followed
by a PNC Information command with an empty
Information Element (IE) to notify the source that
destination does not exist.
• Otherwise, instead of ignoring the Probe Request frame,
the PNC waits for the Imm-ACK from the destination
DEV.
• If no Imm-ACK arrives after a backoff inter-frame space
(BIFS), which is the sum of a SIFS and a clear channel
assessment detect time (CCADetectTime), the PNC
realizes that the destination DEV cannot hear the source.
• The PNC then immediately send an Imm-ACK to the
source, followed by a PNC Information command with
the route information. (an optimized route information in
sent)

SRC_DEV send Probe
Request command to
DEST_DEV & PNC listens

SIFS
Imm-ACK

Probe Response command

SIFS (Imm-ACK)

PNC also listen

DEST_DEV
hears?

YES

DEST_DEV
responds

No
No

DEST_DEV
ID
Present?

Yes, Timeout (BIFS)

Send Imm-ACK & route
information to source

Yes and
DEST_DEV sent Imm-ACK

Do Nothing, monitor if
DEST_DEV crash.

Forward the data to
the router node

Algorithm (3)
[Route calculation]
• Most wireless networks today employ a multirate PHY (e.g., UWB in 802.15.3a) that
supports a set of data rate dependent
modulation/coding parameters.
• Due to the extremely low power consumption
requirement of WPAN devices, the achievable
data rate drops dramatically when the
distance increases.
• The data rate can be modeled as a discrete
function of transmission distance d between
two DEVs:

Algorithm (3)
Rate ( d )  S i ;
R i  1  d  R i ;1  i  m
where, R m

1

 0 , R i is the transmiss

and S 1 and S m are the minimum

ion range of rate S i ;

and maximum

data

rates, respective ly. If d is greater th an R 1, then Rate(d)
and the DEVs have no connectivi

ty

0

Algorithm (4)
• Since the PNC can monitor all commands exchanged
during the CAP, it can learn the data rates between
reachable DEV pairs and store them in an n x n rate
matrix (RM), where
• n is the total number of DEVs within the piconet. DEV
is assigned a unique DEV_ID in the piconet
RM ij is the link rate based on the current informatio
obtained

from the commands

DEV i and DEV j . RM

ij

exchanged

 0 if DEV i and DEV

are out of range or the rate informatio
not available

between

yet, and RM

ij

n is

  if i  j .

j

n

Algorithm (5)
• All DEVs transmit with the maximum
allowable power when sending data. Since the
wireless links are symmetric in nature, clearly
RMij = RMji.
• Based on the current rate information stored
in RM, for an unreachable pair DEVi and
DEVj, the PNC can determine the optimal
(two-hop) route that has the minimum
transmission time, i.e., the best route employs
DEVk for MAC layer forwarding, where k
minimizes:

Algorithm (6)
min(

1
RM



ik
k [ 0 , n  1 ]

1
RM

)
kj

• Alleviates the traffic load on the PNC
• Discovers a current optimal two-hop MAC layer
forwarding path given by existing rate information
without introducing any extra overhead
• If the connection is broken, the PNC can
immediately reroute the traffic to a current
optimal path, or terminate the connection by deallocating all corresponding CTAs.

Discussion
• Original case:
Causes
retransmission

• 3PHP: data sent via
2-hop route if
PNC_ID exists

Dest_ID

Dest_ID

• Normal Transmission (Imm_Ack)

• Normal Transmission (Imm_Ack)

XXX FRAME LOST XXXX

PNC_ID

• Causes retransmission

• Sent Via 2–hop route (Imm_Ack)

PNC

Src_DEV
PNC Info. Request command

Probe Request Command

BIFS
Imm-ACK
SIFS

PNC Information command with Route Info.

Imm-ACK

RIFS

Dest_DEV

SIFS

3PHP-Node

DEV – 1

DEV - 2

PNC

Observations
• With 3PHP, peer discovery requires only one
round of frame exchange.
• Fully utilized the broadcast nature,
centralized control, ad-hoc communication,
and efficient peer discovery.
• Save the futile back-off retransmission for
unreachable destination.
• Guaranteed full piconet connectivity. (no
network layer routing required)
• On demand routing
• More then BIFS waiting. (include RIFS) Conclusion

Performance Evaluations
[Intra-piconet no connection probability]
• Intra-piconet no
connection
probability

• Common Overlap
Area function
COLA(R, r, x):
Represent the
intersection of two
circles with radii R
and r (r e R),
respectively, which
centers are
separated by
distance x

Performance Evaluations (2)
[Intra-piconet no connection probability]

Performance Evaluations (3)
[Intra-piconet no connection probability]
• The probability of no direct connection
between two DEVs in a piconet is

Performance Evaluations (4)
[Peer Discovery delay analysis]


# of Frame Transmission




Expected
Contention Time



Expected Packet
Delay

Performance Evaluations (5)
[Peer Discovery delay analysis]


Expected routing
failure probability

• Expected successful peer discovery
delays are given by

Simulation and Numerical Results
• No connection probability as a function of
coverage range ratio

Simulation and Numerical Results (2)
• Peer discovery delay vs. conditional
collision probability

Simulation and Numerical Results (3)
• Piconet peer discovery time vs. coverage
range ratio

Simulation and Numerical Results (4)
• Piconet peer discovery failure probability
with standard method

Simulation and Numerical Results (5)
• Two-hop forwarding route optimization
ratio vs. piconet radius

Simulation and Numerical Results (6)
• Expected data between directly unreachable
pairs in piconets with 20 DEVs

Conclusion
• Underlying fact: peer-to-peer data delivery in
802.15.3 WPANs
• Existing MAC layer peer discovery methods
cannot guarantee full connectivity between
DEVs within a piconet through direct peerto-peer connections if the piconet operates
with a radius larger than half of the
maximum transmission distance. (~ 41.3%)
• If Mac fails, use the expensive network layer
routing.

Conclusion (2)
• Used the central control topology
• Routing in 2-hop with single round of
control frame exchange
• 3PHP achieves 25– 37% faster peer
discovery time over the standard MAC
• Route optimization algorithm in the PNC
to provide the best MAC layer forwarding
routes by self-learning the available rate
information between DEVs.

References


IEEE Standard 802.15.3, “Wireless medium access control (MAC) and physical
layer (PHY) specifications for high rate wireless personal area networks
(WPANs),”Sept. 2003.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery in IEEE 802.15.3 WPANs,”in Proc. IEEE BroadNets2005, Boston, MA,
Oct. 2005.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery and Route Optimization in IEEE 802.15.3WPANs,”accepted for
publication in ACM/KluwerJ. Mobile Networks and Applications, Nov. 2005.



Z. Yin and V.C.M. Leung, “Connection Data Rate Optimization of IEEE 802.15.3
Scatternetswith Multi-rate Carriers,”IEEE ICC’06, Istanbul, Turkey, June 2006.



Zhanping Yin and Victor C.M. Leung, “Introduction to IEEE 802.15.3 High Rate
Wireless Personal Area Network (WPAN)”, Electrical and Computer Engineering
University of British Columbia

Thank You



Slide 36

Third-Party Handshake Protocol for
Efficient Peer Discovery
and Route Optimization in
IEEE 802.15.3 WPANs
Authors:
Zhanping Yin * Victor C. M. Leung
Published:
ACM/ MONET 2006
Presented by:
Gautam S. Thakur

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

WPAN
• A WPAN (wireless personal area network) is a
personal area network - a network for
interconnecting devices centered around an
individual person's workspace
• A very short range ~10 mtrs. E.g. Bluetooth
• Proposed operating frequencies are around
2.4 GHz in digital modes.
• The objective is to facilitate seamless

operation among home or business devices
and systems.

Ultra-Wideband
• A physical layer technology
• For, short distance communication with high
data rate and short transmission range.
• Lower power requirement and pulsed data
• UWB transmission over extremely wide
unlicensed radio spectrum  3.1 – 10.6 GHz.
• Over results in
– Less interference
– Wire-like performance for indoor wireless
environment.

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Overview of 802.15.3
• Why 802.15.3 ?
• The 802.15.3 Wireless Space
• 802.15.3 Overview and Components

Overview of 802.15.3
[Why 802.15.3 ?]
• Motivated by the increasing demand of wireless
communications with






Ubiquitous network connectivity
Low cost and low power consumption -> WPAN
High data rate(HDR)
Quality of Service(QoS) support
Comparison with other short to medium range wireless
technologies
• Wireless LAN (WLAN)
– High cost and power consumption, no hard QoS guarantee

• WPANs-Bluetooth (802.15.1) and ZigBee(802.15.4)
– Data rate too low

• Applications of 802.15.3
– Virtual wireless multimedia connectivity
• Video/audio distribution

– High speed data transfer

Overview of 802.15.3
[ 802.15.3 = Wireless Multimedia ]

Overview of 802.15.3
[ The 802 Wireless Space ]

IEEE 802.15.3 Overview
• High date rate and low
power
• Mainly works within a
piconet with dynamic
DEV membership
• Ad hoc topology with
centralized control by
the PNC
• Connection oriented
peer-to-peer
communications
• Support for multimedia
quality of service(QoS)
• Multiple power
management modes
• Security

Formation of an 802.15.3 piconet
• The basic component
is the DEV
– One DEV is required to
assume the role of the
piconet coordinator
(PNC) of the piconet.
– The PNC provides the
basic timing sync for the
piconet with the beacon.
– Additionally, the PNC
manages the quality of
service (QoS)
requirements, power
save modes and access
control to the piconet.

Formation of an 802.15.3 piconet (2)
• PNC supports ad
hoc peer-to-peer
connections
• PNC provides
timing for
synchronization of
DEVs within the
piconet, performs
admission control,
allocates network
resources etc

Formation of a Piconet (3)
• All DEVs within radio coverage of the PNC
can then associate with it to form a piconet.
• Then starts the peer discovery.
• Some DEV pairs in the piconet may be out of

range of each other, and as a result, direct
peer-to-peer connection is unavailable
between them. This results in network layer
discovery methods

Superframe format
• Timing and data transmissions in the piconet
are based on the superframe
• The superframe has three parts
– Beacon: Control information, Allocates CTA,
Synchronization
– Contention Access Period (CAP): via CSMA/CA, file xfer
– Channel Time Allocation Period (CTAP)

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Peer discovery and connectivity issue
• An 802.15.3 piconet supports ad hoc
communications between peer DEVs.
• Peer discovery is crucial to its operation.
• The DEVs shall be able to obtain information
about the services and capabilities of other
DEVs in the piconet at any time by
information discovery commands.
• Peer information is needed before a source
DEV can send any data to a destination DEV,
or generate channel time requests (CTRq) to
the PNC.

1
2

5

3

4

6

9

7

8

10

13

11

14

12

15

PNC

Src_DEV

Dest_DEV

PNC Info. Request command
SIFS
Imm-ACK

SIFS
PNC Information command
SIFS
Imm-ACK
SIFS

Probe Request Command
SIFS
Imm-ACK
SIFS
Probe Response Command
SIFS
Imm-ACK
RIFS

1. NOT receive the Imm-Ack
2. Cannot distinguish out-of-range
transmission and collision
3. Perform backoff retransmission
for collision repeatedly

DEV – 1

PNC

Dev 2 is outside the
range of Dev1 and
vise-versa

1. NOT receive Probe Request
command

DEV - 2

Existing Issues with IEEE 802.15.3











Peer discovery is crucial to piconet
operations.
Standard peer discovery is
unreliable and leads to substantial
delays for unreachable DEV pairs
Full piconet connectivity is not
guaranteed with only direct peerto-peer communications
The standard 802.15.3 MAC does
not take advantage of the unique
ranging capabilities enabled by
UWB
Connections are in peer-to-peer
manner without consider of
possible route optimizations
MAC modeling and performance
evaluation
Stream time scheduling methods
not defined in the standard





DEV_1 cannot communicate with
DEV_4 in peer-to-peer manner
For traffic between DEV_1 and
DEV_3, is it better to forward via
PNC than the direct connection?
What is the optimal path and data
rate between DEV_3 and DEV_5?

Using network layer routing
• Each hop request a
CTA slot seperately.
• PNC treat each hop as
independent traffic
stream

• Effect: Failure in an
intermediate hop
breaks the
connections, but PNC
assumes that an
independent stream is
terminated. Keeps
allocating CTAs for
other hops untill it is
eventually notified by
all participating DEV

Using MAC layer forwarding
• With explicit MAC
layer forwarding,
PNC knows that
these hops belongs
to one connection.
• Better adjusting
downstream and
upstream CTAs.

• Effect: reroute the
traffic is the
intermediate node
fails, and releasing
all CTAs if source
of destination
terminates.

Some Observations
• Peer discover is essential
to piconet operations
and communication
between DEVs
• Full piconet connectivity
cannot be guaranteed
• Some DEV pairs may be
out of range of each
other
• Mac layer routing fails
but is better then IP
routing.

• Remember, 802.15.3 has
centralized topology. So
what ??
• Using PNC, any devices
is two-hop count away
only.
• Can use the central
management capability
to discover simpler and
less costly MAC route

Proposed peer discovery protocol
with forwarding route optimization
• The PNC can always act as a first hop to
connect non-intersecting range DEVs
• However, a betterment can be done in the
frame forwarding by choosing another
DEV closer in distance to the source and
destination to forward the frame.
• All routes are limited to two hops only.

Algorithm
• If the Desti_DEV is reachable, sending PNC
Information Request and Response exchange is
redundant.
• So, Src_DEV send Probe Request command to the
Dest_DEV.
• If Dest_DEV receives the command, it returns an
Imm-ACK after a SIFS and then the Probe Response
command as in standard protocol operations.
• At the same time, the third party, i.e., the PNC, shall
actively monitor the frame exchange.
• Upon receiving a Probe Request, the PNC checks the
destination ID (Dest_ID) field in the MAC header.

Algorithm (2)
• If the Dest_ID is not associated in the piconet, the PNC
send an Imm-ACK to the Src_DEV after SIFS, followed
by a PNC Information command with an empty
Information Element (IE) to notify the source that
destination does not exist.
• Otherwise, instead of ignoring the Probe Request frame,
the PNC waits for the Imm-ACK from the destination
DEV.
• If no Imm-ACK arrives after a backoff inter-frame space
(BIFS), which is the sum of a SIFS and a clear channel
assessment detect time (CCADetectTime), the PNC
realizes that the destination DEV cannot hear the source.
• The PNC then immediately send an Imm-ACK to the
source, followed by a PNC Information command with
the route information. (an optimized route information in
sent)

SRC_DEV send Probe
Request command to
DEST_DEV & PNC listens

SIFS
Imm-ACK

Probe Response command

SIFS (Imm-ACK)

PNC also listen

DEST_DEV
hears?

YES

DEST_DEV
responds

No
No

DEST_DEV
ID
Present?

Yes, Timeout (BIFS)

Send Imm-ACK & route
information to source

Yes and
DEST_DEV sent Imm-ACK

Do Nothing, monitor if
DEST_DEV crash.

Forward the data to
the router node

Algorithm (3)
[Route calculation]
• Most wireless networks today employ a multirate PHY (e.g., UWB in 802.15.3a) that
supports a set of data rate dependent
modulation/coding parameters.
• Due to the extremely low power consumption
requirement of WPAN devices, the achievable
data rate drops dramatically when the
distance increases.
• The data rate can be modeled as a discrete
function of transmission distance d between
two DEVs:

Algorithm (3)
Rate ( d )  S i ;
R i  1  d  R i ;1  i  m
where, R m

1

 0 , R i is the transmiss

and S 1 and S m are the minimum

ion range of rate S i ;

and maximum

data

rates, respective ly. If d is greater th an R 1, then Rate(d)
and the DEVs have no connectivi

ty

0

Algorithm (4)
• Since the PNC can monitor all commands exchanged
during the CAP, it can learn the data rates between
reachable DEV pairs and store them in an n x n rate
matrix (RM), where
• n is the total number of DEVs within the piconet. DEV
is assigned a unique DEV_ID in the piconet
RM ij is the link rate based on the current informatio
obtained

from the commands

DEV i and DEV j . RM

ij

exchanged

 0 if DEV i and DEV

are out of range or the rate informatio
not available

between

yet, and RM

ij

n is

  if i  j .

j

n

Algorithm (5)
• All DEVs transmit with the maximum
allowable power when sending data. Since the
wireless links are symmetric in nature, clearly
RMij = RMji.
• Based on the current rate information stored
in RM, for an unreachable pair DEVi and
DEVj, the PNC can determine the optimal
(two-hop) route that has the minimum
transmission time, i.e., the best route employs
DEVk for MAC layer forwarding, where k
minimizes:

Algorithm (6)
min(

1
RM



ik
k [ 0 , n  1 ]

1
RM

)
kj

• Alleviates the traffic load on the PNC
• Discovers a current optimal two-hop MAC layer
forwarding path given by existing rate information
without introducing any extra overhead
• If the connection is broken, the PNC can
immediately reroute the traffic to a current
optimal path, or terminate the connection by deallocating all corresponding CTAs.

Discussion
• Original case:
Causes
retransmission

• 3PHP: data sent via
2-hop route if
PNC_ID exists

Dest_ID

Dest_ID

• Normal Transmission (Imm_Ack)

• Normal Transmission (Imm_Ack)

XXX FRAME LOST XXXX

PNC_ID

• Causes retransmission

• Sent Via 2–hop route (Imm_Ack)

PNC

Src_DEV
PNC Info. Request command

Probe Request Command

BIFS
Imm-ACK
SIFS

PNC Information command with Route Info.

Imm-ACK

RIFS

Dest_DEV

SIFS

3PHP-Node

DEV – 1

DEV - 2

PNC

Observations
• With 3PHP, peer discovery requires only one
round of frame exchange.
• Fully utilized the broadcast nature,
centralized control, ad-hoc communication,
and efficient peer discovery.
• Save the futile back-off retransmission for
unreachable destination.
• Guaranteed full piconet connectivity. (no
network layer routing required)
• On demand routing
• More then BIFS waiting. (include RIFS) Conclusion

Performance Evaluations
[Intra-piconet no connection probability]
• Intra-piconet no
connection
probability

• Common Overlap
Area function
COLA(R, r, x):
Represent the
intersection of two
circles with radii R
and r (r e R),
respectively, which
centers are
separated by
distance x

Performance Evaluations (2)
[Intra-piconet no connection probability]

Performance Evaluations (3)
[Intra-piconet no connection probability]
• The probability of no direct connection
between two DEVs in a piconet is

Performance Evaluations (4)
[Peer Discovery delay analysis]


# of Frame Transmission




Expected
Contention Time



Expected Packet
Delay

Performance Evaluations (5)
[Peer Discovery delay analysis]


Expected routing
failure probability

• Expected successful peer discovery
delays are given by

Simulation and Numerical Results
• No connection probability as a function of
coverage range ratio

Simulation and Numerical Results (2)
• Peer discovery delay vs. conditional
collision probability

Simulation and Numerical Results (3)
• Piconet peer discovery time vs. coverage
range ratio

Simulation and Numerical Results (4)
• Piconet peer discovery failure probability
with standard method

Simulation and Numerical Results (5)
• Two-hop forwarding route optimization
ratio vs. piconet radius

Simulation and Numerical Results (6)
• Expected data between directly unreachable
pairs in piconets with 20 DEVs

Conclusion
• Underlying fact: peer-to-peer data delivery in
802.15.3 WPANs
• Existing MAC layer peer discovery methods
cannot guarantee full connectivity between
DEVs within a piconet through direct peerto-peer connections if the piconet operates
with a radius larger than half of the
maximum transmission distance. (~ 41.3%)
• If Mac fails, use the expensive network layer
routing.

Conclusion (2)
• Used the central control topology
• Routing in 2-hop with single round of
control frame exchange
• 3PHP achieves 25– 37% faster peer
discovery time over the standard MAC
• Route optimization algorithm in the PNC
to provide the best MAC layer forwarding
routes by self-learning the available rate
information between DEVs.

References


IEEE Standard 802.15.3, “Wireless medium access control (MAC) and physical
layer (PHY) specifications for high rate wireless personal area networks
(WPANs),”Sept. 2003.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery in IEEE 802.15.3 WPANs,”in Proc. IEEE BroadNets2005, Boston, MA,
Oct. 2005.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery and Route Optimization in IEEE 802.15.3WPANs,”accepted for
publication in ACM/KluwerJ. Mobile Networks and Applications, Nov. 2005.



Z. Yin and V.C.M. Leung, “Connection Data Rate Optimization of IEEE 802.15.3
Scatternetswith Multi-rate Carriers,”IEEE ICC’06, Istanbul, Turkey, June 2006.



Zhanping Yin and Victor C.M. Leung, “Introduction to IEEE 802.15.3 High Rate
Wireless Personal Area Network (WPAN)”, Electrical and Computer Engineering
University of British Columbia

Thank You



Slide 37

Third-Party Handshake Protocol for
Efficient Peer Discovery
and Route Optimization in
IEEE 802.15.3 WPANs
Authors:
Zhanping Yin * Victor C. M. Leung
Published:
ACM/ MONET 2006
Presented by:
Gautam S. Thakur

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

WPAN
• A WPAN (wireless personal area network) is a
personal area network - a network for
interconnecting devices centered around an
individual person's workspace
• A very short range ~10 mtrs. E.g. Bluetooth
• Proposed operating frequencies are around
2.4 GHz in digital modes.
• The objective is to facilitate seamless

operation among home or business devices
and systems.

Ultra-Wideband
• A physical layer technology
• For, short distance communication with high
data rate and short transmission range.
• Lower power requirement and pulsed data
• UWB transmission over extremely wide
unlicensed radio spectrum  3.1 – 10.6 GHz.
• Over results in
– Less interference
– Wire-like performance for indoor wireless
environment.

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Overview of 802.15.3
• Why 802.15.3 ?
• The 802.15.3 Wireless Space
• 802.15.3 Overview and Components

Overview of 802.15.3
[Why 802.15.3 ?]
• Motivated by the increasing demand of wireless
communications with






Ubiquitous network connectivity
Low cost and low power consumption -> WPAN
High data rate(HDR)
Quality of Service(QoS) support
Comparison with other short to medium range wireless
technologies
• Wireless LAN (WLAN)
– High cost and power consumption, no hard QoS guarantee

• WPANs-Bluetooth (802.15.1) and ZigBee(802.15.4)
– Data rate too low

• Applications of 802.15.3
– Virtual wireless multimedia connectivity
• Video/audio distribution

– High speed data transfer

Overview of 802.15.3
[ 802.15.3 = Wireless Multimedia ]

Overview of 802.15.3
[ The 802 Wireless Space ]

IEEE 802.15.3 Overview
• High date rate and low
power
• Mainly works within a
piconet with dynamic
DEV membership
• Ad hoc topology with
centralized control by
the PNC
• Connection oriented
peer-to-peer
communications
• Support for multimedia
quality of service(QoS)
• Multiple power
management modes
• Security

Formation of an 802.15.3 piconet
• The basic component
is the DEV
– One DEV is required to
assume the role of the
piconet coordinator
(PNC) of the piconet.
– The PNC provides the
basic timing sync for the
piconet with the beacon.
– Additionally, the PNC
manages the quality of
service (QoS)
requirements, power
save modes and access
control to the piconet.

Formation of an 802.15.3 piconet (2)
• PNC supports ad
hoc peer-to-peer
connections
• PNC provides
timing for
synchronization of
DEVs within the
piconet, performs
admission control,
allocates network
resources etc

Formation of a Piconet (3)
• All DEVs within radio coverage of the PNC
can then associate with it to form a piconet.
• Then starts the peer discovery.
• Some DEV pairs in the piconet may be out of

range of each other, and as a result, direct
peer-to-peer connection is unavailable
between them. This results in network layer
discovery methods

Superframe format
• Timing and data transmissions in the piconet
are based on the superframe
• The superframe has three parts
– Beacon: Control information, Allocates CTA,
Synchronization
– Contention Access Period (CAP): via CSMA/CA, file xfer
– Channel Time Allocation Period (CTAP)

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Peer discovery and connectivity issue
• An 802.15.3 piconet supports ad hoc
communications between peer DEVs.
• Peer discovery is crucial to its operation.
• The DEVs shall be able to obtain information
about the services and capabilities of other
DEVs in the piconet at any time by
information discovery commands.
• Peer information is needed before a source
DEV can send any data to a destination DEV,
or generate channel time requests (CTRq) to
the PNC.

1
2

5

3

4

6

9

7

8

10

13

11

14

12

15

PNC

Src_DEV

Dest_DEV

PNC Info. Request command
SIFS
Imm-ACK

SIFS
PNC Information command
SIFS
Imm-ACK
SIFS

Probe Request Command
SIFS
Imm-ACK
SIFS
Probe Response Command
SIFS
Imm-ACK
RIFS

1. NOT receive the Imm-Ack
2. Cannot distinguish out-of-range
transmission and collision
3. Perform backoff retransmission
for collision repeatedly

DEV – 1

PNC

Dev 2 is outside the
range of Dev1 and
vise-versa

1. NOT receive Probe Request
command

DEV - 2

Existing Issues with IEEE 802.15.3











Peer discovery is crucial to piconet
operations.
Standard peer discovery is
unreliable and leads to substantial
delays for unreachable DEV pairs
Full piconet connectivity is not
guaranteed with only direct peerto-peer communications
The standard 802.15.3 MAC does
not take advantage of the unique
ranging capabilities enabled by
UWB
Connections are in peer-to-peer
manner without consider of
possible route optimizations
MAC modeling and performance
evaluation
Stream time scheduling methods
not defined in the standard





DEV_1 cannot communicate with
DEV_4 in peer-to-peer manner
For traffic between DEV_1 and
DEV_3, is it better to forward via
PNC than the direct connection?
What is the optimal path and data
rate between DEV_3 and DEV_5?

Using network layer routing
• Each hop request a
CTA slot seperately.
• PNC treat each hop as
independent traffic
stream

• Effect: Failure in an
intermediate hop
breaks the
connections, but PNC
assumes that an
independent stream is
terminated. Keeps
allocating CTAs for
other hops untill it is
eventually notified by
all participating DEV

Using MAC layer forwarding
• With explicit MAC
layer forwarding,
PNC knows that
these hops belongs
to one connection.
• Better adjusting
downstream and
upstream CTAs.

• Effect: reroute the
traffic is the
intermediate node
fails, and releasing
all CTAs if source
of destination
terminates.

Some Observations
• Peer discover is essential
to piconet operations
and communication
between DEVs
• Full piconet connectivity
cannot be guaranteed
• Some DEV pairs may be
out of range of each
other
• Mac layer routing fails
but is better then IP
routing.

• Remember, 802.15.3 has
centralized topology. So
what ??
• Using PNC, any devices
is two-hop count away
only.
• Can use the central
management capability
to discover simpler and
less costly MAC route

Proposed peer discovery protocol
with forwarding route optimization
• The PNC can always act as a first hop to
connect non-intersecting range DEVs
• However, a betterment can be done in the
frame forwarding by choosing another
DEV closer in distance to the source and
destination to forward the frame.
• All routes are limited to two hops only.

Algorithm
• If the Desti_DEV is reachable, sending PNC
Information Request and Response exchange is
redundant.
• So, Src_DEV send Probe Request command to the
Dest_DEV.
• If Dest_DEV receives the command, it returns an
Imm-ACK after a SIFS and then the Probe Response
command as in standard protocol operations.
• At the same time, the third party, i.e., the PNC, shall
actively monitor the frame exchange.
• Upon receiving a Probe Request, the PNC checks the
destination ID (Dest_ID) field in the MAC header.

Algorithm (2)
• If the Dest_ID is not associated in the piconet, the PNC
send an Imm-ACK to the Src_DEV after SIFS, followed
by a PNC Information command with an empty
Information Element (IE) to notify the source that
destination does not exist.
• Otherwise, instead of ignoring the Probe Request frame,
the PNC waits for the Imm-ACK from the destination
DEV.
• If no Imm-ACK arrives after a backoff inter-frame space
(BIFS), which is the sum of a SIFS and a clear channel
assessment detect time (CCADetectTime), the PNC
realizes that the destination DEV cannot hear the source.
• The PNC then immediately send an Imm-ACK to the
source, followed by a PNC Information command with
the route information. (an optimized route information in
sent)

SRC_DEV send Probe
Request command to
DEST_DEV & PNC listens

SIFS
Imm-ACK

Probe Response command

SIFS (Imm-ACK)

PNC also listen

DEST_DEV
hears?

YES

DEST_DEV
responds

No
No

DEST_DEV
ID
Present?

Yes, Timeout (BIFS)

Send Imm-ACK & route
information to source

Yes and
DEST_DEV sent Imm-ACK

Do Nothing, monitor if
DEST_DEV crash.

Forward the data to
the router node

Algorithm (3)
[Route calculation]
• Most wireless networks today employ a multirate PHY (e.g., UWB in 802.15.3a) that
supports a set of data rate dependent
modulation/coding parameters.
• Due to the extremely low power consumption
requirement of WPAN devices, the achievable
data rate drops dramatically when the
distance increases.
• The data rate can be modeled as a discrete
function of transmission distance d between
two DEVs:

Algorithm (3)
Rate ( d )  S i ;
R i  1  d  R i ;1  i  m
where, R m

1

 0 , R i is the transmiss

and S 1 and S m are the minimum

ion range of rate S i ;

and maximum

data

rates, respective ly. If d is greater th an R 1, then Rate(d)
and the DEVs have no connectivi

ty

0

Algorithm (4)
• Since the PNC can monitor all commands exchanged
during the CAP, it can learn the data rates between
reachable DEV pairs and store them in an n x n rate
matrix (RM), where
• n is the total number of DEVs within the piconet. DEV
is assigned a unique DEV_ID in the piconet
RM ij is the link rate based on the current informatio
obtained

from the commands

DEV i and DEV j . RM

ij

exchanged

 0 if DEV i and DEV

are out of range or the rate informatio
not available

between

yet, and RM

ij

n is

  if i  j .

j

n

Algorithm (5)
• All DEVs transmit with the maximum
allowable power when sending data. Since the
wireless links are symmetric in nature, clearly
RMij = RMji.
• Based on the current rate information stored
in RM, for an unreachable pair DEVi and
DEVj, the PNC can determine the optimal
(two-hop) route that has the minimum
transmission time, i.e., the best route employs
DEVk for MAC layer forwarding, where k
minimizes:

Algorithm (6)
min(

1
RM



ik
k [ 0 , n  1 ]

1
RM

)
kj

• Alleviates the traffic load on the PNC
• Discovers a current optimal two-hop MAC layer
forwarding path given by existing rate information
without introducing any extra overhead
• If the connection is broken, the PNC can
immediately reroute the traffic to a current
optimal path, or terminate the connection by deallocating all corresponding CTAs.

Discussion
• Original case:
Causes
retransmission

• 3PHP: data sent via
2-hop route if
PNC_ID exists

Dest_ID

Dest_ID

• Normal Transmission (Imm_Ack)

• Normal Transmission (Imm_Ack)

XXX FRAME LOST XXXX

PNC_ID

• Causes retransmission

• Sent Via 2–hop route (Imm_Ack)

PNC

Src_DEV
PNC Info. Request command

Probe Request Command

BIFS
Imm-ACK
SIFS

PNC Information command with Route Info.

Imm-ACK

RIFS

Dest_DEV

SIFS

3PHP-Node

DEV – 1

DEV - 2

PNC

Observations
• With 3PHP, peer discovery requires only one
round of frame exchange.
• Fully utilized the broadcast nature,
centralized control, ad-hoc communication,
and efficient peer discovery.
• Save the futile back-off retransmission for
unreachable destination.
• Guaranteed full piconet connectivity. (no
network layer routing required)
• On demand routing
• More then BIFS waiting. (include RIFS) Conclusion

Performance Evaluations
[Intra-piconet no connection probability]
• Intra-piconet no
connection
probability

• Common Overlap
Area function
COLA(R, r, x):
Represent the
intersection of two
circles with radii R
and r (r e R),
respectively, which
centers are
separated by
distance x

Performance Evaluations (2)
[Intra-piconet no connection probability]

Performance Evaluations (3)
[Intra-piconet no connection probability]
• The probability of no direct connection
between two DEVs in a piconet is

Performance Evaluations (4)
[Peer Discovery delay analysis]


# of Frame Transmission




Expected
Contention Time



Expected Packet
Delay

Performance Evaluations (5)
[Peer Discovery delay analysis]


Expected routing
failure probability

• Expected successful peer discovery
delays are given by

Simulation and Numerical Results
• No connection probability as a function of
coverage range ratio

Simulation and Numerical Results (2)
• Peer discovery delay vs. conditional
collision probability

Simulation and Numerical Results (3)
• Piconet peer discovery time vs. coverage
range ratio

Simulation and Numerical Results (4)
• Piconet peer discovery failure probability
with standard method

Simulation and Numerical Results (5)
• Two-hop forwarding route optimization
ratio vs. piconet radius

Simulation and Numerical Results (6)
• Expected data between directly unreachable
pairs in piconets with 20 DEVs

Conclusion
• Underlying fact: peer-to-peer data delivery in
802.15.3 WPANs
• Existing MAC layer peer discovery methods
cannot guarantee full connectivity between
DEVs within a piconet through direct peerto-peer connections if the piconet operates
with a radius larger than half of the
maximum transmission distance. (~ 41.3%)
• If Mac fails, use the expensive network layer
routing.

Conclusion (2)
• Used the central control topology
• Routing in 2-hop with single round of
control frame exchange
• 3PHP achieves 25– 37% faster peer
discovery time over the standard MAC
• Route optimization algorithm in the PNC
to provide the best MAC layer forwarding
routes by self-learning the available rate
information between DEVs.

References


IEEE Standard 802.15.3, “Wireless medium access control (MAC) and physical
layer (PHY) specifications for high rate wireless personal area networks
(WPANs),”Sept. 2003.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery in IEEE 802.15.3 WPANs,”in Proc. IEEE BroadNets2005, Boston, MA,
Oct. 2005.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery and Route Optimization in IEEE 802.15.3WPANs,”accepted for
publication in ACM/KluwerJ. Mobile Networks and Applications, Nov. 2005.



Z. Yin and V.C.M. Leung, “Connection Data Rate Optimization of IEEE 802.15.3
Scatternetswith Multi-rate Carriers,”IEEE ICC’06, Istanbul, Turkey, June 2006.



Zhanping Yin and Victor C.M. Leung, “Introduction to IEEE 802.15.3 High Rate
Wireless Personal Area Network (WPAN)”, Electrical and Computer Engineering
University of British Columbia

Thank You



Slide 38

Third-Party Handshake Protocol for
Efficient Peer Discovery
and Route Optimization in
IEEE 802.15.3 WPANs
Authors:
Zhanping Yin * Victor C. M. Leung
Published:
ACM/ MONET 2006
Presented by:
Gautam S. Thakur

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

WPAN
• A WPAN (wireless personal area network) is a
personal area network - a network for
interconnecting devices centered around an
individual person's workspace
• A very short range ~10 mtrs. E.g. Bluetooth
• Proposed operating frequencies are around
2.4 GHz in digital modes.
• The objective is to facilitate seamless

operation among home or business devices
and systems.

Ultra-Wideband
• A physical layer technology
• For, short distance communication with high
data rate and short transmission range.
• Lower power requirement and pulsed data
• UWB transmission over extremely wide
unlicensed radio spectrum  3.1 – 10.6 GHz.
• Over results in
– Less interference
– Wire-like performance for indoor wireless
environment.

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Overview of 802.15.3
• Why 802.15.3 ?
• The 802.15.3 Wireless Space
• 802.15.3 Overview and Components

Overview of 802.15.3
[Why 802.15.3 ?]
• Motivated by the increasing demand of wireless
communications with






Ubiquitous network connectivity
Low cost and low power consumption -> WPAN
High data rate(HDR)
Quality of Service(QoS) support
Comparison with other short to medium range wireless
technologies
• Wireless LAN (WLAN)
– High cost and power consumption, no hard QoS guarantee

• WPANs-Bluetooth (802.15.1) and ZigBee(802.15.4)
– Data rate too low

• Applications of 802.15.3
– Virtual wireless multimedia connectivity
• Video/audio distribution

– High speed data transfer

Overview of 802.15.3
[ 802.15.3 = Wireless Multimedia ]

Overview of 802.15.3
[ The 802 Wireless Space ]

IEEE 802.15.3 Overview
• High date rate and low
power
• Mainly works within a
piconet with dynamic
DEV membership
• Ad hoc topology with
centralized control by
the PNC
• Connection oriented
peer-to-peer
communications
• Support for multimedia
quality of service(QoS)
• Multiple power
management modes
• Security

Formation of an 802.15.3 piconet
• The basic component
is the DEV
– One DEV is required to
assume the role of the
piconet coordinator
(PNC) of the piconet.
– The PNC provides the
basic timing sync for the
piconet with the beacon.
– Additionally, the PNC
manages the quality of
service (QoS)
requirements, power
save modes and access
control to the piconet.

Formation of an 802.15.3 piconet (2)
• PNC supports ad
hoc peer-to-peer
connections
• PNC provides
timing for
synchronization of
DEVs within the
piconet, performs
admission control,
allocates network
resources etc

Formation of a Piconet (3)
• All DEVs within radio coverage of the PNC
can then associate with it to form a piconet.
• Then starts the peer discovery.
• Some DEV pairs in the piconet may be out of

range of each other, and as a result, direct
peer-to-peer connection is unavailable
between them. This results in network layer
discovery methods

Superframe format
• Timing and data transmissions in the piconet
are based on the superframe
• The superframe has three parts
– Beacon: Control information, Allocates CTA,
Synchronization
– Contention Access Period (CAP): via CSMA/CA, file xfer
– Channel Time Allocation Period (CTAP)

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Peer discovery and connectivity issue
• An 802.15.3 piconet supports ad hoc
communications between peer DEVs.
• Peer discovery is crucial to its operation.
• The DEVs shall be able to obtain information
about the services and capabilities of other
DEVs in the piconet at any time by
information discovery commands.
• Peer information is needed before a source
DEV can send any data to a destination DEV,
or generate channel time requests (CTRq) to
the PNC.

1
2

5

3

4

6

9

7

8

10

13

11

14

12

15

PNC

Src_DEV

Dest_DEV

PNC Info. Request command
SIFS
Imm-ACK

SIFS
PNC Information command
SIFS
Imm-ACK
SIFS

Probe Request Command
SIFS
Imm-ACK
SIFS
Probe Response Command
SIFS
Imm-ACK
RIFS

1. NOT receive the Imm-Ack
2. Cannot distinguish out-of-range
transmission and collision
3. Perform backoff retransmission
for collision repeatedly

DEV – 1

PNC

Dev 2 is outside the
range of Dev1 and
vise-versa

1. NOT receive Probe Request
command

DEV - 2

Existing Issues with IEEE 802.15.3











Peer discovery is crucial to piconet
operations.
Standard peer discovery is
unreliable and leads to substantial
delays for unreachable DEV pairs
Full piconet connectivity is not
guaranteed with only direct peerto-peer communications
The standard 802.15.3 MAC does
not take advantage of the unique
ranging capabilities enabled by
UWB
Connections are in peer-to-peer
manner without consider of
possible route optimizations
MAC modeling and performance
evaluation
Stream time scheduling methods
not defined in the standard





DEV_1 cannot communicate with
DEV_4 in peer-to-peer manner
For traffic between DEV_1 and
DEV_3, is it better to forward via
PNC than the direct connection?
What is the optimal path and data
rate between DEV_3 and DEV_5?

Using network layer routing
• Each hop request a
CTA slot seperately.
• PNC treat each hop as
independent traffic
stream

• Effect: Failure in an
intermediate hop
breaks the
connections, but PNC
assumes that an
independent stream is
terminated. Keeps
allocating CTAs for
other hops untill it is
eventually notified by
all participating DEV

Using MAC layer forwarding
• With explicit MAC
layer forwarding,
PNC knows that
these hops belongs
to one connection.
• Better adjusting
downstream and
upstream CTAs.

• Effect: reroute the
traffic is the
intermediate node
fails, and releasing
all CTAs if source
of destination
terminates.

Some Observations
• Peer discover is essential
to piconet operations
and communication
between DEVs
• Full piconet connectivity
cannot be guaranteed
• Some DEV pairs may be
out of range of each
other
• Mac layer routing fails
but is better then IP
routing.

• Remember, 802.15.3 has
centralized topology. So
what ??
• Using PNC, any devices
is two-hop count away
only.
• Can use the central
management capability
to discover simpler and
less costly MAC route

Proposed peer discovery protocol
with forwarding route optimization
• The PNC can always act as a first hop to
connect non-intersecting range DEVs
• However, a betterment can be done in the
frame forwarding by choosing another
DEV closer in distance to the source and
destination to forward the frame.
• All routes are limited to two hops only.

Algorithm
• If the Desti_DEV is reachable, sending PNC
Information Request and Response exchange is
redundant.
• So, Src_DEV send Probe Request command to the
Dest_DEV.
• If Dest_DEV receives the command, it returns an
Imm-ACK after a SIFS and then the Probe Response
command as in standard protocol operations.
• At the same time, the third party, i.e., the PNC, shall
actively monitor the frame exchange.
• Upon receiving a Probe Request, the PNC checks the
destination ID (Dest_ID) field in the MAC header.

Algorithm (2)
• If the Dest_ID is not associated in the piconet, the PNC
send an Imm-ACK to the Src_DEV after SIFS, followed
by a PNC Information command with an empty
Information Element (IE) to notify the source that
destination does not exist.
• Otherwise, instead of ignoring the Probe Request frame,
the PNC waits for the Imm-ACK from the destination
DEV.
• If no Imm-ACK arrives after a backoff inter-frame space
(BIFS), which is the sum of a SIFS and a clear channel
assessment detect time (CCADetectTime), the PNC
realizes that the destination DEV cannot hear the source.
• The PNC then immediately send an Imm-ACK to the
source, followed by a PNC Information command with
the route information. (an optimized route information in
sent)

SRC_DEV send Probe
Request command to
DEST_DEV & PNC listens

SIFS
Imm-ACK

Probe Response command

SIFS (Imm-ACK)

PNC also listen

DEST_DEV
hears?

YES

DEST_DEV
responds

No
No

DEST_DEV
ID
Present?

Yes, Timeout (BIFS)

Send Imm-ACK & route
information to source

Yes and
DEST_DEV sent Imm-ACK

Do Nothing, monitor if
DEST_DEV crash.

Forward the data to
the router node

Algorithm (3)
[Route calculation]
• Most wireless networks today employ a multirate PHY (e.g., UWB in 802.15.3a) that
supports a set of data rate dependent
modulation/coding parameters.
• Due to the extremely low power consumption
requirement of WPAN devices, the achievable
data rate drops dramatically when the
distance increases.
• The data rate can be modeled as a discrete
function of transmission distance d between
two DEVs:

Algorithm (3)
Rate ( d )  S i ;
R i  1  d  R i ;1  i  m
where, R m

1

 0 , R i is the transmiss

and S 1 and S m are the minimum

ion range of rate S i ;

and maximum

data

rates, respective ly. If d is greater th an R 1, then Rate(d)
and the DEVs have no connectivi

ty

0

Algorithm (4)
• Since the PNC can monitor all commands exchanged
during the CAP, it can learn the data rates between
reachable DEV pairs and store them in an n x n rate
matrix (RM), where
• n is the total number of DEVs within the piconet. DEV
is assigned a unique DEV_ID in the piconet
RM ij is the link rate based on the current informatio
obtained

from the commands

DEV i and DEV j . RM

ij

exchanged

 0 if DEV i and DEV

are out of range or the rate informatio
not available

between

yet, and RM

ij

n is

  if i  j .

j

n

Algorithm (5)
• All DEVs transmit with the maximum
allowable power when sending data. Since the
wireless links are symmetric in nature, clearly
RMij = RMji.
• Based on the current rate information stored
in RM, for an unreachable pair DEVi and
DEVj, the PNC can determine the optimal
(two-hop) route that has the minimum
transmission time, i.e., the best route employs
DEVk for MAC layer forwarding, where k
minimizes:

Algorithm (6)
min(

1
RM



ik
k [ 0 , n  1 ]

1
RM

)
kj

• Alleviates the traffic load on the PNC
• Discovers a current optimal two-hop MAC layer
forwarding path given by existing rate information
without introducing any extra overhead
• If the connection is broken, the PNC can
immediately reroute the traffic to a current
optimal path, or terminate the connection by deallocating all corresponding CTAs.

Discussion
• Original case:
Causes
retransmission

• 3PHP: data sent via
2-hop route if
PNC_ID exists

Dest_ID

Dest_ID

• Normal Transmission (Imm_Ack)

• Normal Transmission (Imm_Ack)

XXX FRAME LOST XXXX

PNC_ID

• Causes retransmission

• Sent Via 2–hop route (Imm_Ack)

PNC

Src_DEV
PNC Info. Request command

Probe Request Command

BIFS
Imm-ACK
SIFS

PNC Information command with Route Info.

Imm-ACK

RIFS

Dest_DEV

SIFS

3PHP-Node

DEV – 1

DEV - 2

PNC

Observations
• With 3PHP, peer discovery requires only one
round of frame exchange.
• Fully utilized the broadcast nature,
centralized control, ad-hoc communication,
and efficient peer discovery.
• Save the futile back-off retransmission for
unreachable destination.
• Guaranteed full piconet connectivity. (no
network layer routing required)
• On demand routing
• More then BIFS waiting. (include RIFS) Conclusion

Performance Evaluations
[Intra-piconet no connection probability]
• Intra-piconet no
connection
probability

• Common Overlap
Area function
COLA(R, r, x):
Represent the
intersection of two
circles with radii R
and r (r e R),
respectively, which
centers are
separated by
distance x

Performance Evaluations (2)
[Intra-piconet no connection probability]

Performance Evaluations (3)
[Intra-piconet no connection probability]
• The probability of no direct connection
between two DEVs in a piconet is

Performance Evaluations (4)
[Peer Discovery delay analysis]


# of Frame Transmission




Expected
Contention Time



Expected Packet
Delay

Performance Evaluations (5)
[Peer Discovery delay analysis]


Expected routing
failure probability

• Expected successful peer discovery
delays are given by

Simulation and Numerical Results
• No connection probability as a function of
coverage range ratio

Simulation and Numerical Results (2)
• Peer discovery delay vs. conditional
collision probability

Simulation and Numerical Results (3)
• Piconet peer discovery time vs. coverage
range ratio

Simulation and Numerical Results (4)
• Piconet peer discovery failure probability
with standard method

Simulation and Numerical Results (5)
• Two-hop forwarding route optimization
ratio vs. piconet radius

Simulation and Numerical Results (6)
• Expected data between directly unreachable
pairs in piconets with 20 DEVs

Conclusion
• Underlying fact: peer-to-peer data delivery in
802.15.3 WPANs
• Existing MAC layer peer discovery methods
cannot guarantee full connectivity between
DEVs within a piconet through direct peerto-peer connections if the piconet operates
with a radius larger than half of the
maximum transmission distance. (~ 41.3%)
• If Mac fails, use the expensive network layer
routing.

Conclusion (2)
• Used the central control topology
• Routing in 2-hop with single round of
control frame exchange
• 3PHP achieves 25– 37% faster peer
discovery time over the standard MAC
• Route optimization algorithm in the PNC
to provide the best MAC layer forwarding
routes by self-learning the available rate
information between DEVs.

References


IEEE Standard 802.15.3, “Wireless medium access control (MAC) and physical
layer (PHY) specifications for high rate wireless personal area networks
(WPANs),”Sept. 2003.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery in IEEE 802.15.3 WPANs,”in Proc. IEEE BroadNets2005, Boston, MA,
Oct. 2005.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery and Route Optimization in IEEE 802.15.3WPANs,”accepted for
publication in ACM/KluwerJ. Mobile Networks and Applications, Nov. 2005.



Z. Yin and V.C.M. Leung, “Connection Data Rate Optimization of IEEE 802.15.3
Scatternetswith Multi-rate Carriers,”IEEE ICC’06, Istanbul, Turkey, June 2006.



Zhanping Yin and Victor C.M. Leung, “Introduction to IEEE 802.15.3 High Rate
Wireless Personal Area Network (WPAN)”, Electrical and Computer Engineering
University of British Columbia

Thank You



Slide 39

Third-Party Handshake Protocol for
Efficient Peer Discovery
and Route Optimization in
IEEE 802.15.3 WPANs
Authors:
Zhanping Yin * Victor C. M. Leung
Published:
ACM/ MONET 2006
Presented by:
Gautam S. Thakur

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

WPAN
• A WPAN (wireless personal area network) is a
personal area network - a network for
interconnecting devices centered around an
individual person's workspace
• A very short range ~10 mtrs. E.g. Bluetooth
• Proposed operating frequencies are around
2.4 GHz in digital modes.
• The objective is to facilitate seamless

operation among home or business devices
and systems.

Ultra-Wideband
• A physical layer technology
• For, short distance communication with high
data rate and short transmission range.
• Lower power requirement and pulsed data
• UWB transmission over extremely wide
unlicensed radio spectrum  3.1 – 10.6 GHz.
• Over results in
– Less interference
– Wire-like performance for indoor wireless
environment.

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Overview of 802.15.3
• Why 802.15.3 ?
• The 802.15.3 Wireless Space
• 802.15.3 Overview and Components

Overview of 802.15.3
[Why 802.15.3 ?]
• Motivated by the increasing demand of wireless
communications with






Ubiquitous network connectivity
Low cost and low power consumption -> WPAN
High data rate(HDR)
Quality of Service(QoS) support
Comparison with other short to medium range wireless
technologies
• Wireless LAN (WLAN)
– High cost and power consumption, no hard QoS guarantee

• WPANs-Bluetooth (802.15.1) and ZigBee(802.15.4)
– Data rate too low

• Applications of 802.15.3
– Virtual wireless multimedia connectivity
• Video/audio distribution

– High speed data transfer

Overview of 802.15.3
[ 802.15.3 = Wireless Multimedia ]

Overview of 802.15.3
[ The 802 Wireless Space ]

IEEE 802.15.3 Overview
• High date rate and low
power
• Mainly works within a
piconet with dynamic
DEV membership
• Ad hoc topology with
centralized control by
the PNC
• Connection oriented
peer-to-peer
communications
• Support for multimedia
quality of service(QoS)
• Multiple power
management modes
• Security

Formation of an 802.15.3 piconet
• The basic component
is the DEV
– One DEV is required to
assume the role of the
piconet coordinator
(PNC) of the piconet.
– The PNC provides the
basic timing sync for the
piconet with the beacon.
– Additionally, the PNC
manages the quality of
service (QoS)
requirements, power
save modes and access
control to the piconet.

Formation of an 802.15.3 piconet (2)
• PNC supports ad
hoc peer-to-peer
connections
• PNC provides
timing for
synchronization of
DEVs within the
piconet, performs
admission control,
allocates network
resources etc

Formation of a Piconet (3)
• All DEVs within radio coverage of the PNC
can then associate with it to form a piconet.
• Then starts the peer discovery.
• Some DEV pairs in the piconet may be out of

range of each other, and as a result, direct
peer-to-peer connection is unavailable
between them. This results in network layer
discovery methods

Superframe format
• Timing and data transmissions in the piconet
are based on the superframe
• The superframe has three parts
– Beacon: Control information, Allocates CTA,
Synchronization
– Contention Access Period (CAP): via CSMA/CA, file xfer
– Channel Time Allocation Period (CTAP)

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Peer discovery and connectivity issue
• An 802.15.3 piconet supports ad hoc
communications between peer DEVs.
• Peer discovery is crucial to its operation.
• The DEVs shall be able to obtain information
about the services and capabilities of other
DEVs in the piconet at any time by
information discovery commands.
• Peer information is needed before a source
DEV can send any data to a destination DEV,
or generate channel time requests (CTRq) to
the PNC.

1
2

5

3

4

6

9

7

8

10

13

11

14

12

15

PNC

Src_DEV

Dest_DEV

PNC Info. Request command
SIFS
Imm-ACK

SIFS
PNC Information command
SIFS
Imm-ACK
SIFS

Probe Request Command
SIFS
Imm-ACK
SIFS
Probe Response Command
SIFS
Imm-ACK
RIFS

1. NOT receive the Imm-Ack
2. Cannot distinguish out-of-range
transmission and collision
3. Perform backoff retransmission
for collision repeatedly

DEV – 1

PNC

Dev 2 is outside the
range of Dev1 and
vise-versa

1. NOT receive Probe Request
command

DEV - 2

Existing Issues with IEEE 802.15.3











Peer discovery is crucial to piconet
operations.
Standard peer discovery is
unreliable and leads to substantial
delays for unreachable DEV pairs
Full piconet connectivity is not
guaranteed with only direct peerto-peer communications
The standard 802.15.3 MAC does
not take advantage of the unique
ranging capabilities enabled by
UWB
Connections are in peer-to-peer
manner without consider of
possible route optimizations
MAC modeling and performance
evaluation
Stream time scheduling methods
not defined in the standard





DEV_1 cannot communicate with
DEV_4 in peer-to-peer manner
For traffic between DEV_1 and
DEV_3, is it better to forward via
PNC than the direct connection?
What is the optimal path and data
rate between DEV_3 and DEV_5?

Using network layer routing
• Each hop request a
CTA slot seperately.
• PNC treat each hop as
independent traffic
stream

• Effect: Failure in an
intermediate hop
breaks the
connections, but PNC
assumes that an
independent stream is
terminated. Keeps
allocating CTAs for
other hops untill it is
eventually notified by
all participating DEV

Using MAC layer forwarding
• With explicit MAC
layer forwarding,
PNC knows that
these hops belongs
to one connection.
• Better adjusting
downstream and
upstream CTAs.

• Effect: reroute the
traffic is the
intermediate node
fails, and releasing
all CTAs if source
of destination
terminates.

Some Observations
• Peer discover is essential
to piconet operations
and communication
between DEVs
• Full piconet connectivity
cannot be guaranteed
• Some DEV pairs may be
out of range of each
other
• Mac layer routing fails
but is better then IP
routing.

• Remember, 802.15.3 has
centralized topology. So
what ??
• Using PNC, any devices
is two-hop count away
only.
• Can use the central
management capability
to discover simpler and
less costly MAC route

Proposed peer discovery protocol
with forwarding route optimization
• The PNC can always act as a first hop to
connect non-intersecting range DEVs
• However, a betterment can be done in the
frame forwarding by choosing another
DEV closer in distance to the source and
destination to forward the frame.
• All routes are limited to two hops only.

Algorithm
• If the Desti_DEV is reachable, sending PNC
Information Request and Response exchange is
redundant.
• So, Src_DEV send Probe Request command to the
Dest_DEV.
• If Dest_DEV receives the command, it returns an
Imm-ACK after a SIFS and then the Probe Response
command as in standard protocol operations.
• At the same time, the third party, i.e., the PNC, shall
actively monitor the frame exchange.
• Upon receiving a Probe Request, the PNC checks the
destination ID (Dest_ID) field in the MAC header.

Algorithm (2)
• If the Dest_ID is not associated in the piconet, the PNC
send an Imm-ACK to the Src_DEV after SIFS, followed
by a PNC Information command with an empty
Information Element (IE) to notify the source that
destination does not exist.
• Otherwise, instead of ignoring the Probe Request frame,
the PNC waits for the Imm-ACK from the destination
DEV.
• If no Imm-ACK arrives after a backoff inter-frame space
(BIFS), which is the sum of a SIFS and a clear channel
assessment detect time (CCADetectTime), the PNC
realizes that the destination DEV cannot hear the source.
• The PNC then immediately send an Imm-ACK to the
source, followed by a PNC Information command with
the route information. (an optimized route information in
sent)

SRC_DEV send Probe
Request command to
DEST_DEV & PNC listens

SIFS
Imm-ACK

Probe Response command

SIFS (Imm-ACK)

PNC also listen

DEST_DEV
hears?

YES

DEST_DEV
responds

No
No

DEST_DEV
ID
Present?

Yes, Timeout (BIFS)

Send Imm-ACK & route
information to source

Yes and
DEST_DEV sent Imm-ACK

Do Nothing, monitor if
DEST_DEV crash.

Forward the data to
the router node

Algorithm (3)
[Route calculation]
• Most wireless networks today employ a multirate PHY (e.g., UWB in 802.15.3a) that
supports a set of data rate dependent
modulation/coding parameters.
• Due to the extremely low power consumption
requirement of WPAN devices, the achievable
data rate drops dramatically when the
distance increases.
• The data rate can be modeled as a discrete
function of transmission distance d between
two DEVs:

Algorithm (3)
Rate ( d )  S i ;
R i  1  d  R i ;1  i  m
where, R m

1

 0 , R i is the transmiss

and S 1 and S m are the minimum

ion range of rate S i ;

and maximum

data

rates, respective ly. If d is greater th an R 1, then Rate(d)
and the DEVs have no connectivi

ty

0

Algorithm (4)
• Since the PNC can monitor all commands exchanged
during the CAP, it can learn the data rates between
reachable DEV pairs and store them in an n x n rate
matrix (RM), where
• n is the total number of DEVs within the piconet. DEV
is assigned a unique DEV_ID in the piconet
RM ij is the link rate based on the current informatio
obtained

from the commands

DEV i and DEV j . RM

ij

exchanged

 0 if DEV i and DEV

are out of range or the rate informatio
not available

between

yet, and RM

ij

n is

  if i  j .

j

n

Algorithm (5)
• All DEVs transmit with the maximum
allowable power when sending data. Since the
wireless links are symmetric in nature, clearly
RMij = RMji.
• Based on the current rate information stored
in RM, for an unreachable pair DEVi and
DEVj, the PNC can determine the optimal
(two-hop) route that has the minimum
transmission time, i.e., the best route employs
DEVk for MAC layer forwarding, where k
minimizes:

Algorithm (6)
min(

1
RM



ik
k [ 0 , n  1 ]

1
RM

)
kj

• Alleviates the traffic load on the PNC
• Discovers a current optimal two-hop MAC layer
forwarding path given by existing rate information
without introducing any extra overhead
• If the connection is broken, the PNC can
immediately reroute the traffic to a current
optimal path, or terminate the connection by deallocating all corresponding CTAs.

Discussion
• Original case:
Causes
retransmission

• 3PHP: data sent via
2-hop route if
PNC_ID exists

Dest_ID

Dest_ID

• Normal Transmission (Imm_Ack)

• Normal Transmission (Imm_Ack)

XXX FRAME LOST XXXX

PNC_ID

• Causes retransmission

• Sent Via 2–hop route (Imm_Ack)

PNC

Src_DEV
PNC Info. Request command

Probe Request Command

BIFS
Imm-ACK
SIFS

PNC Information command with Route Info.

Imm-ACK

RIFS

Dest_DEV

SIFS

3PHP-Node

DEV – 1

DEV - 2

PNC

Observations
• With 3PHP, peer discovery requires only one
round of frame exchange.
• Fully utilized the broadcast nature,
centralized control, ad-hoc communication,
and efficient peer discovery.
• Save the futile back-off retransmission for
unreachable destination.
• Guaranteed full piconet connectivity. (no
network layer routing required)
• On demand routing
• More then BIFS waiting. (include RIFS) Conclusion

Performance Evaluations
[Intra-piconet no connection probability]
• Intra-piconet no
connection
probability

• Common Overlap
Area function
COLA(R, r, x):
Represent the
intersection of two
circles with radii R
and r (r e R),
respectively, which
centers are
separated by
distance x

Performance Evaluations (2)
[Intra-piconet no connection probability]

Performance Evaluations (3)
[Intra-piconet no connection probability]
• The probability of no direct connection
between two DEVs in a piconet is

Performance Evaluations (4)
[Peer Discovery delay analysis]


# of Frame Transmission




Expected
Contention Time



Expected Packet
Delay

Performance Evaluations (5)
[Peer Discovery delay analysis]


Expected routing
failure probability

• Expected successful peer discovery
delays are given by

Simulation and Numerical Results
• No connection probability as a function of
coverage range ratio

Simulation and Numerical Results (2)
• Peer discovery delay vs. conditional
collision probability

Simulation and Numerical Results (3)
• Piconet peer discovery time vs. coverage
range ratio

Simulation and Numerical Results (4)
• Piconet peer discovery failure probability
with standard method

Simulation and Numerical Results (5)
• Two-hop forwarding route optimization
ratio vs. piconet radius

Simulation and Numerical Results (6)
• Expected data between directly unreachable
pairs in piconets with 20 DEVs

Conclusion
• Underlying fact: peer-to-peer data delivery in
802.15.3 WPANs
• Existing MAC layer peer discovery methods
cannot guarantee full connectivity between
DEVs within a piconet through direct peerto-peer connections if the piconet operates
with a radius larger than half of the
maximum transmission distance. (~ 41.3%)
• If Mac fails, use the expensive network layer
routing.

Conclusion (2)
• Used the central control topology
• Routing in 2-hop with single round of
control frame exchange
• 3PHP achieves 25– 37% faster peer
discovery time over the standard MAC
• Route optimization algorithm in the PNC
to provide the best MAC layer forwarding
routes by self-learning the available rate
information between DEVs.

References


IEEE Standard 802.15.3, “Wireless medium access control (MAC) and physical
layer (PHY) specifications for high rate wireless personal area networks
(WPANs),”Sept. 2003.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery in IEEE 802.15.3 WPANs,”in Proc. IEEE BroadNets2005, Boston, MA,
Oct. 2005.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery and Route Optimization in IEEE 802.15.3WPANs,”accepted for
publication in ACM/KluwerJ. Mobile Networks and Applications, Nov. 2005.



Z. Yin and V.C.M. Leung, “Connection Data Rate Optimization of IEEE 802.15.3
Scatternetswith Multi-rate Carriers,”IEEE ICC’06, Istanbul, Turkey, June 2006.



Zhanping Yin and Victor C.M. Leung, “Introduction to IEEE 802.15.3 High Rate
Wireless Personal Area Network (WPAN)”, Electrical and Computer Engineering
University of British Columbia

Thank You



Slide 40

Third-Party Handshake Protocol for
Efficient Peer Discovery
and Route Optimization in
IEEE 802.15.3 WPANs
Authors:
Zhanping Yin * Victor C. M. Leung
Published:
ACM/ MONET 2006
Presented by:
Gautam S. Thakur

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

WPAN
• A WPAN (wireless personal area network) is a
personal area network - a network for
interconnecting devices centered around an
individual person's workspace
• A very short range ~10 mtrs. E.g. Bluetooth
• Proposed operating frequencies are around
2.4 GHz in digital modes.
• The objective is to facilitate seamless

operation among home or business devices
and systems.

Ultra-Wideband
• A physical layer technology
• For, short distance communication with high
data rate and short transmission range.
• Lower power requirement and pulsed data
• UWB transmission over extremely wide
unlicensed radio spectrum  3.1 – 10.6 GHz.
• Over results in
– Less interference
– Wire-like performance for indoor wireless
environment.

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Overview of 802.15.3
• Why 802.15.3 ?
• The 802.15.3 Wireless Space
• 802.15.3 Overview and Components

Overview of 802.15.3
[Why 802.15.3 ?]
• Motivated by the increasing demand of wireless
communications with






Ubiquitous network connectivity
Low cost and low power consumption -> WPAN
High data rate(HDR)
Quality of Service(QoS) support
Comparison with other short to medium range wireless
technologies
• Wireless LAN (WLAN)
– High cost and power consumption, no hard QoS guarantee

• WPANs-Bluetooth (802.15.1) and ZigBee(802.15.4)
– Data rate too low

• Applications of 802.15.3
– Virtual wireless multimedia connectivity
• Video/audio distribution

– High speed data transfer

Overview of 802.15.3
[ 802.15.3 = Wireless Multimedia ]

Overview of 802.15.3
[ The 802 Wireless Space ]

IEEE 802.15.3 Overview
• High date rate and low
power
• Mainly works within a
piconet with dynamic
DEV membership
• Ad hoc topology with
centralized control by
the PNC
• Connection oriented
peer-to-peer
communications
• Support for multimedia
quality of service(QoS)
• Multiple power
management modes
• Security

Formation of an 802.15.3 piconet
• The basic component
is the DEV
– One DEV is required to
assume the role of the
piconet coordinator
(PNC) of the piconet.
– The PNC provides the
basic timing sync for the
piconet with the beacon.
– Additionally, the PNC
manages the quality of
service (QoS)
requirements, power
save modes and access
control to the piconet.

Formation of an 802.15.3 piconet (2)
• PNC supports ad
hoc peer-to-peer
connections
• PNC provides
timing for
synchronization of
DEVs within the
piconet, performs
admission control,
allocates network
resources etc

Formation of a Piconet (3)
• All DEVs within radio coverage of the PNC
can then associate with it to form a piconet.
• Then starts the peer discovery.
• Some DEV pairs in the piconet may be out of

range of each other, and as a result, direct
peer-to-peer connection is unavailable
between them. This results in network layer
discovery methods

Superframe format
• Timing and data transmissions in the piconet
are based on the superframe
• The superframe has three parts
– Beacon: Control information, Allocates CTA,
Synchronization
– Contention Access Period (CAP): via CSMA/CA, file xfer
– Channel Time Allocation Period (CTAP)

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Peer discovery and connectivity issue
• An 802.15.3 piconet supports ad hoc
communications between peer DEVs.
• Peer discovery is crucial to its operation.
• The DEVs shall be able to obtain information
about the services and capabilities of other
DEVs in the piconet at any time by
information discovery commands.
• Peer information is needed before a source
DEV can send any data to a destination DEV,
or generate channel time requests (CTRq) to
the PNC.

1
2

5

3

4

6

9

7

8

10

13

11

14

12

15

PNC

Src_DEV

Dest_DEV

PNC Info. Request command
SIFS
Imm-ACK

SIFS
PNC Information command
SIFS
Imm-ACK
SIFS

Probe Request Command
SIFS
Imm-ACK
SIFS
Probe Response Command
SIFS
Imm-ACK
RIFS

1. NOT receive the Imm-Ack
2. Cannot distinguish out-of-range
transmission and collision
3. Perform backoff retransmission
for collision repeatedly

DEV – 1

PNC

Dev 2 is outside the
range of Dev1 and
vise-versa

1. NOT receive Probe Request
command

DEV - 2

Existing Issues with IEEE 802.15.3











Peer discovery is crucial to piconet
operations.
Standard peer discovery is
unreliable and leads to substantial
delays for unreachable DEV pairs
Full piconet connectivity is not
guaranteed with only direct peerto-peer communications
The standard 802.15.3 MAC does
not take advantage of the unique
ranging capabilities enabled by
UWB
Connections are in peer-to-peer
manner without consider of
possible route optimizations
MAC modeling and performance
evaluation
Stream time scheduling methods
not defined in the standard





DEV_1 cannot communicate with
DEV_4 in peer-to-peer manner
For traffic between DEV_1 and
DEV_3, is it better to forward via
PNC than the direct connection?
What is the optimal path and data
rate between DEV_3 and DEV_5?

Using network layer routing
• Each hop request a
CTA slot seperately.
• PNC treat each hop as
independent traffic
stream

• Effect: Failure in an
intermediate hop
breaks the
connections, but PNC
assumes that an
independent stream is
terminated. Keeps
allocating CTAs for
other hops untill it is
eventually notified by
all participating DEV

Using MAC layer forwarding
• With explicit MAC
layer forwarding,
PNC knows that
these hops belongs
to one connection.
• Better adjusting
downstream and
upstream CTAs.

• Effect: reroute the
traffic is the
intermediate node
fails, and releasing
all CTAs if source
of destination
terminates.

Some Observations
• Peer discover is essential
to piconet operations
and communication
between DEVs
• Full piconet connectivity
cannot be guaranteed
• Some DEV pairs may be
out of range of each
other
• Mac layer routing fails
but is better then IP
routing.

• Remember, 802.15.3 has
centralized topology. So
what ??
• Using PNC, any devices
is two-hop count away
only.
• Can use the central
management capability
to discover simpler and
less costly MAC route

Proposed peer discovery protocol
with forwarding route optimization
• The PNC can always act as a first hop to
connect non-intersecting range DEVs
• However, a betterment can be done in the
frame forwarding by choosing another
DEV closer in distance to the source and
destination to forward the frame.
• All routes are limited to two hops only.

Algorithm
• If the Desti_DEV is reachable, sending PNC
Information Request and Response exchange is
redundant.
• So, Src_DEV send Probe Request command to the
Dest_DEV.
• If Dest_DEV receives the command, it returns an
Imm-ACK after a SIFS and then the Probe Response
command as in standard protocol operations.
• At the same time, the third party, i.e., the PNC, shall
actively monitor the frame exchange.
• Upon receiving a Probe Request, the PNC checks the
destination ID (Dest_ID) field in the MAC header.

Algorithm (2)
• If the Dest_ID is not associated in the piconet, the PNC
send an Imm-ACK to the Src_DEV after SIFS, followed
by a PNC Information command with an empty
Information Element (IE) to notify the source that
destination does not exist.
• Otherwise, instead of ignoring the Probe Request frame,
the PNC waits for the Imm-ACK from the destination
DEV.
• If no Imm-ACK arrives after a backoff inter-frame space
(BIFS), which is the sum of a SIFS and a clear channel
assessment detect time (CCADetectTime), the PNC
realizes that the destination DEV cannot hear the source.
• The PNC then immediately send an Imm-ACK to the
source, followed by a PNC Information command with
the route information. (an optimized route information in
sent)

SRC_DEV send Probe
Request command to
DEST_DEV & PNC listens

SIFS
Imm-ACK

Probe Response command

SIFS (Imm-ACK)

PNC also listen

DEST_DEV
hears?

YES

DEST_DEV
responds

No
No

DEST_DEV
ID
Present?

Yes, Timeout (BIFS)

Send Imm-ACK & route
information to source

Yes and
DEST_DEV sent Imm-ACK

Do Nothing, monitor if
DEST_DEV crash.

Forward the data to
the router node

Algorithm (3)
[Route calculation]
• Most wireless networks today employ a multirate PHY (e.g., UWB in 802.15.3a) that
supports a set of data rate dependent
modulation/coding parameters.
• Due to the extremely low power consumption
requirement of WPAN devices, the achievable
data rate drops dramatically when the
distance increases.
• The data rate can be modeled as a discrete
function of transmission distance d between
two DEVs:

Algorithm (3)
Rate ( d )  S i ;
R i  1  d  R i ;1  i  m
where, R m

1

 0 , R i is the transmiss

and S 1 and S m are the minimum

ion range of rate S i ;

and maximum

data

rates, respective ly. If d is greater th an R 1, then Rate(d)
and the DEVs have no connectivi

ty

0

Algorithm (4)
• Since the PNC can monitor all commands exchanged
during the CAP, it can learn the data rates between
reachable DEV pairs and store them in an n x n rate
matrix (RM), where
• n is the total number of DEVs within the piconet. DEV
is assigned a unique DEV_ID in the piconet
RM ij is the link rate based on the current informatio
obtained

from the commands

DEV i and DEV j . RM

ij

exchanged

 0 if DEV i and DEV

are out of range or the rate informatio
not available

between

yet, and RM

ij

n is

  if i  j .

j

n

Algorithm (5)
• All DEVs transmit with the maximum
allowable power when sending data. Since the
wireless links are symmetric in nature, clearly
RMij = RMji.
• Based on the current rate information stored
in RM, for an unreachable pair DEVi and
DEVj, the PNC can determine the optimal
(two-hop) route that has the minimum
transmission time, i.e., the best route employs
DEVk for MAC layer forwarding, where k
minimizes:

Algorithm (6)
min(

1
RM



ik
k [ 0 , n  1 ]

1
RM

)
kj

• Alleviates the traffic load on the PNC
• Discovers a current optimal two-hop MAC layer
forwarding path given by existing rate information
without introducing any extra overhead
• If the connection is broken, the PNC can
immediately reroute the traffic to a current
optimal path, or terminate the connection by deallocating all corresponding CTAs.

Discussion
• Original case:
Causes
retransmission

• 3PHP: data sent via
2-hop route if
PNC_ID exists

Dest_ID

Dest_ID

• Normal Transmission (Imm_Ack)

• Normal Transmission (Imm_Ack)

XXX FRAME LOST XXXX

PNC_ID

• Causes retransmission

• Sent Via 2–hop route (Imm_Ack)

PNC

Src_DEV
PNC Info. Request command

Probe Request Command

BIFS
Imm-ACK
SIFS

PNC Information command with Route Info.

Imm-ACK

RIFS

Dest_DEV

SIFS

3PHP-Node

DEV – 1

DEV - 2

PNC

Observations
• With 3PHP, peer discovery requires only one
round of frame exchange.
• Fully utilized the broadcast nature,
centralized control, ad-hoc communication,
and efficient peer discovery.
• Save the futile back-off retransmission for
unreachable destination.
• Guaranteed full piconet connectivity. (no
network layer routing required)
• On demand routing
• More then BIFS waiting. (include RIFS) Conclusion

Performance Evaluations
[Intra-piconet no connection probability]
• Intra-piconet no
connection
probability

• Common Overlap
Area function
COLA(R, r, x):
Represent the
intersection of two
circles with radii R
and r (r e R),
respectively, which
centers are
separated by
distance x

Performance Evaluations (2)
[Intra-piconet no connection probability]

Performance Evaluations (3)
[Intra-piconet no connection probability]
• The probability of no direct connection
between two DEVs in a piconet is

Performance Evaluations (4)
[Peer Discovery delay analysis]


# of Frame Transmission




Expected
Contention Time



Expected Packet
Delay

Performance Evaluations (5)
[Peer Discovery delay analysis]


Expected routing
failure probability

• Expected successful peer discovery
delays are given by

Simulation and Numerical Results
• No connection probability as a function of
coverage range ratio

Simulation and Numerical Results (2)
• Peer discovery delay vs. conditional
collision probability

Simulation and Numerical Results (3)
• Piconet peer discovery time vs. coverage
range ratio

Simulation and Numerical Results (4)
• Piconet peer discovery failure probability
with standard method

Simulation and Numerical Results (5)
• Two-hop forwarding route optimization
ratio vs. piconet radius

Simulation and Numerical Results (6)
• Expected data between directly unreachable
pairs in piconets with 20 DEVs

Conclusion
• Underlying fact: peer-to-peer data delivery in
802.15.3 WPANs
• Existing MAC layer peer discovery methods
cannot guarantee full connectivity between
DEVs within a piconet through direct peerto-peer connections if the piconet operates
with a radius larger than half of the
maximum transmission distance. (~ 41.3%)
• If Mac fails, use the expensive network layer
routing.

Conclusion (2)
• Used the central control topology
• Routing in 2-hop with single round of
control frame exchange
• 3PHP achieves 25– 37% faster peer
discovery time over the standard MAC
• Route optimization algorithm in the PNC
to provide the best MAC layer forwarding
routes by self-learning the available rate
information between DEVs.

References


IEEE Standard 802.15.3, “Wireless medium access control (MAC) and physical
layer (PHY) specifications for high rate wireless personal area networks
(WPANs),”Sept. 2003.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery in IEEE 802.15.3 WPANs,”in Proc. IEEE BroadNets2005, Boston, MA,
Oct. 2005.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery and Route Optimization in IEEE 802.15.3WPANs,”accepted for
publication in ACM/KluwerJ. Mobile Networks and Applications, Nov. 2005.



Z. Yin and V.C.M. Leung, “Connection Data Rate Optimization of IEEE 802.15.3
Scatternetswith Multi-rate Carriers,”IEEE ICC’06, Istanbul, Turkey, June 2006.



Zhanping Yin and Victor C.M. Leung, “Introduction to IEEE 802.15.3 High Rate
Wireless Personal Area Network (WPAN)”, Electrical and Computer Engineering
University of British Columbia

Thank You



Slide 41

Third-Party Handshake Protocol for
Efficient Peer Discovery
and Route Optimization in
IEEE 802.15.3 WPANs
Authors:
Zhanping Yin * Victor C. M. Leung
Published:
ACM/ MONET 2006
Presented by:
Gautam S. Thakur

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

WPAN
• A WPAN (wireless personal area network) is a
personal area network - a network for
interconnecting devices centered around an
individual person's workspace
• A very short range ~10 mtrs. E.g. Bluetooth
• Proposed operating frequencies are around
2.4 GHz in digital modes.
• The objective is to facilitate seamless

operation among home or business devices
and systems.

Ultra-Wideband
• A physical layer technology
• For, short distance communication with high
data rate and short transmission range.
• Lower power requirement and pulsed data
• UWB transmission over extremely wide
unlicensed radio spectrum  3.1 – 10.6 GHz.
• Over results in
– Less interference
– Wire-like performance for indoor wireless
environment.

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Overview of 802.15.3
• Why 802.15.3 ?
• The 802.15.3 Wireless Space
• 802.15.3 Overview and Components

Overview of 802.15.3
[Why 802.15.3 ?]
• Motivated by the increasing demand of wireless
communications with






Ubiquitous network connectivity
Low cost and low power consumption -> WPAN
High data rate(HDR)
Quality of Service(QoS) support
Comparison with other short to medium range wireless
technologies
• Wireless LAN (WLAN)
– High cost and power consumption, no hard QoS guarantee

• WPANs-Bluetooth (802.15.1) and ZigBee(802.15.4)
– Data rate too low

• Applications of 802.15.3
– Virtual wireless multimedia connectivity
• Video/audio distribution

– High speed data transfer

Overview of 802.15.3
[ 802.15.3 = Wireless Multimedia ]

Overview of 802.15.3
[ The 802 Wireless Space ]

IEEE 802.15.3 Overview
• High date rate and low
power
• Mainly works within a
piconet with dynamic
DEV membership
• Ad hoc topology with
centralized control by
the PNC
• Connection oriented
peer-to-peer
communications
• Support for multimedia
quality of service(QoS)
• Multiple power
management modes
• Security

Formation of an 802.15.3 piconet
• The basic component
is the DEV
– One DEV is required to
assume the role of the
piconet coordinator
(PNC) of the piconet.
– The PNC provides the
basic timing sync for the
piconet with the beacon.
– Additionally, the PNC
manages the quality of
service (QoS)
requirements, power
save modes and access
control to the piconet.

Formation of an 802.15.3 piconet (2)
• PNC supports ad
hoc peer-to-peer
connections
• PNC provides
timing for
synchronization of
DEVs within the
piconet, performs
admission control,
allocates network
resources etc

Formation of a Piconet (3)
• All DEVs within radio coverage of the PNC
can then associate with it to form a piconet.
• Then starts the peer discovery.
• Some DEV pairs in the piconet may be out of

range of each other, and as a result, direct
peer-to-peer connection is unavailable
between them. This results in network layer
discovery methods

Superframe format
• Timing and data transmissions in the piconet
are based on the superframe
• The superframe has three parts
– Beacon: Control information, Allocates CTA,
Synchronization
– Contention Access Period (CAP): via CSMA/CA, file xfer
– Channel Time Allocation Period (CTAP)

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Peer discovery and connectivity issue
• An 802.15.3 piconet supports ad hoc
communications between peer DEVs.
• Peer discovery is crucial to its operation.
• The DEVs shall be able to obtain information
about the services and capabilities of other
DEVs in the piconet at any time by
information discovery commands.
• Peer information is needed before a source
DEV can send any data to a destination DEV,
or generate channel time requests (CTRq) to
the PNC.

1
2

5

3

4

6

9

7

8

10

13

11

14

12

15

PNC

Src_DEV

Dest_DEV

PNC Info. Request command
SIFS
Imm-ACK

SIFS
PNC Information command
SIFS
Imm-ACK
SIFS

Probe Request Command
SIFS
Imm-ACK
SIFS
Probe Response Command
SIFS
Imm-ACK
RIFS

1. NOT receive the Imm-Ack
2. Cannot distinguish out-of-range
transmission and collision
3. Perform backoff retransmission
for collision repeatedly

DEV – 1

PNC

Dev 2 is outside the
range of Dev1 and
vise-versa

1. NOT receive Probe Request
command

DEV - 2

Existing Issues with IEEE 802.15.3











Peer discovery is crucial to piconet
operations.
Standard peer discovery is
unreliable and leads to substantial
delays for unreachable DEV pairs
Full piconet connectivity is not
guaranteed with only direct peerto-peer communications
The standard 802.15.3 MAC does
not take advantage of the unique
ranging capabilities enabled by
UWB
Connections are in peer-to-peer
manner without consider of
possible route optimizations
MAC modeling and performance
evaluation
Stream time scheduling methods
not defined in the standard





DEV_1 cannot communicate with
DEV_4 in peer-to-peer manner
For traffic between DEV_1 and
DEV_3, is it better to forward via
PNC than the direct connection?
What is the optimal path and data
rate between DEV_3 and DEV_5?

Using network layer routing
• Each hop request a
CTA slot seperately.
• PNC treat each hop as
independent traffic
stream

• Effect: Failure in an
intermediate hop
breaks the
connections, but PNC
assumes that an
independent stream is
terminated. Keeps
allocating CTAs for
other hops untill it is
eventually notified by
all participating DEV

Using MAC layer forwarding
• With explicit MAC
layer forwarding,
PNC knows that
these hops belongs
to one connection.
• Better adjusting
downstream and
upstream CTAs.

• Effect: reroute the
traffic is the
intermediate node
fails, and releasing
all CTAs if source
of destination
terminates.

Some Observations
• Peer discover is essential
to piconet operations
and communication
between DEVs
• Full piconet connectivity
cannot be guaranteed
• Some DEV pairs may be
out of range of each
other
• Mac layer routing fails
but is better then IP
routing.

• Remember, 802.15.3 has
centralized topology. So
what ??
• Using PNC, any devices
is two-hop count away
only.
• Can use the central
management capability
to discover simpler and
less costly MAC route

Proposed peer discovery protocol
with forwarding route optimization
• The PNC can always act as a first hop to
connect non-intersecting range DEVs
• However, a betterment can be done in the
frame forwarding by choosing another
DEV closer in distance to the source and
destination to forward the frame.
• All routes are limited to two hops only.

Algorithm
• If the Desti_DEV is reachable, sending PNC
Information Request and Response exchange is
redundant.
• So, Src_DEV send Probe Request command to the
Dest_DEV.
• If Dest_DEV receives the command, it returns an
Imm-ACK after a SIFS and then the Probe Response
command as in standard protocol operations.
• At the same time, the third party, i.e., the PNC, shall
actively monitor the frame exchange.
• Upon receiving a Probe Request, the PNC checks the
destination ID (Dest_ID) field in the MAC header.

Algorithm (2)
• If the Dest_ID is not associated in the piconet, the PNC
send an Imm-ACK to the Src_DEV after SIFS, followed
by a PNC Information command with an empty
Information Element (IE) to notify the source that
destination does not exist.
• Otherwise, instead of ignoring the Probe Request frame,
the PNC waits for the Imm-ACK from the destination
DEV.
• If no Imm-ACK arrives after a backoff inter-frame space
(BIFS), which is the sum of a SIFS and a clear channel
assessment detect time (CCADetectTime), the PNC
realizes that the destination DEV cannot hear the source.
• The PNC then immediately send an Imm-ACK to the
source, followed by a PNC Information command with
the route information. (an optimized route information in
sent)

SRC_DEV send Probe
Request command to
DEST_DEV & PNC listens

SIFS
Imm-ACK

Probe Response command

SIFS (Imm-ACK)

PNC also listen

DEST_DEV
hears?

YES

DEST_DEV
responds

No
No

DEST_DEV
ID
Present?

Yes, Timeout (BIFS)

Send Imm-ACK & route
information to source

Yes and
DEST_DEV sent Imm-ACK

Do Nothing, monitor if
DEST_DEV crash.

Forward the data to
the router node

Algorithm (3)
[Route calculation]
• Most wireless networks today employ a multirate PHY (e.g., UWB in 802.15.3a) that
supports a set of data rate dependent
modulation/coding parameters.
• Due to the extremely low power consumption
requirement of WPAN devices, the achievable
data rate drops dramatically when the
distance increases.
• The data rate can be modeled as a discrete
function of transmission distance d between
two DEVs:

Algorithm (3)
Rate ( d )  S i ;
R i  1  d  R i ;1  i  m
where, R m

1

 0 , R i is the transmiss

and S 1 and S m are the minimum

ion range of rate S i ;

and maximum

data

rates, respective ly. If d is greater th an R 1, then Rate(d)
and the DEVs have no connectivi

ty

0

Algorithm (4)
• Since the PNC can monitor all commands exchanged
during the CAP, it can learn the data rates between
reachable DEV pairs and store them in an n x n rate
matrix (RM), where
• n is the total number of DEVs within the piconet. DEV
is assigned a unique DEV_ID in the piconet
RM ij is the link rate based on the current informatio
obtained

from the commands

DEV i and DEV j . RM

ij

exchanged

 0 if DEV i and DEV

are out of range or the rate informatio
not available

between

yet, and RM

ij

n is

  if i  j .

j

n

Algorithm (5)
• All DEVs transmit with the maximum
allowable power when sending data. Since the
wireless links are symmetric in nature, clearly
RMij = RMji.
• Based on the current rate information stored
in RM, for an unreachable pair DEVi and
DEVj, the PNC can determine the optimal
(two-hop) route that has the minimum
transmission time, i.e., the best route employs
DEVk for MAC layer forwarding, where k
minimizes:

Algorithm (6)
min(

1
RM



ik
k [ 0 , n  1 ]

1
RM

)
kj

• Alleviates the traffic load on the PNC
• Discovers a current optimal two-hop MAC layer
forwarding path given by existing rate information
without introducing any extra overhead
• If the connection is broken, the PNC can
immediately reroute the traffic to a current
optimal path, or terminate the connection by deallocating all corresponding CTAs.

Discussion
• Original case:
Causes
retransmission

• 3PHP: data sent via
2-hop route if
PNC_ID exists

Dest_ID

Dest_ID

• Normal Transmission (Imm_Ack)

• Normal Transmission (Imm_Ack)

XXX FRAME LOST XXXX

PNC_ID

• Causes retransmission

• Sent Via 2–hop route (Imm_Ack)

PNC

Src_DEV
PNC Info. Request command

Probe Request Command

BIFS
Imm-ACK
SIFS

PNC Information command with Route Info.

Imm-ACK

RIFS

Dest_DEV

SIFS

3PHP-Node

DEV – 1

DEV - 2

PNC

Observations
• With 3PHP, peer discovery requires only one
round of frame exchange.
• Fully utilized the broadcast nature,
centralized control, ad-hoc communication,
and efficient peer discovery.
• Save the futile back-off retransmission for
unreachable destination.
• Guaranteed full piconet connectivity. (no
network layer routing required)
• On demand routing
• More then BIFS waiting. (include RIFS) Conclusion

Performance Evaluations
[Intra-piconet no connection probability]
• Intra-piconet no
connection
probability

• Common Overlap
Area function
COLA(R, r, x):
Represent the
intersection of two
circles with radii R
and r (r e R),
respectively, which
centers are
separated by
distance x

Performance Evaluations (2)
[Intra-piconet no connection probability]

Performance Evaluations (3)
[Intra-piconet no connection probability]
• The probability of no direct connection
between two DEVs in a piconet is

Performance Evaluations (4)
[Peer Discovery delay analysis]


# of Frame Transmission




Expected
Contention Time



Expected Packet
Delay

Performance Evaluations (5)
[Peer Discovery delay analysis]


Expected routing
failure probability

• Expected successful peer discovery
delays are given by

Simulation and Numerical Results
• No connection probability as a function of
coverage range ratio

Simulation and Numerical Results (2)
• Peer discovery delay vs. conditional
collision probability

Simulation and Numerical Results (3)
• Piconet peer discovery time vs. coverage
range ratio

Simulation and Numerical Results (4)
• Piconet peer discovery failure probability
with standard method

Simulation and Numerical Results (5)
• Two-hop forwarding route optimization
ratio vs. piconet radius

Simulation and Numerical Results (6)
• Expected data between directly unreachable
pairs in piconets with 20 DEVs

Conclusion
• Underlying fact: peer-to-peer data delivery in
802.15.3 WPANs
• Existing MAC layer peer discovery methods
cannot guarantee full connectivity between
DEVs within a piconet through direct peerto-peer connections if the piconet operates
with a radius larger than half of the
maximum transmission distance. (~ 41.3%)
• If Mac fails, use the expensive network layer
routing.

Conclusion (2)
• Used the central control topology
• Routing in 2-hop with single round of
control frame exchange
• 3PHP achieves 25– 37% faster peer
discovery time over the standard MAC
• Route optimization algorithm in the PNC
to provide the best MAC layer forwarding
routes by self-learning the available rate
information between DEVs.

References


IEEE Standard 802.15.3, “Wireless medium access control (MAC) and physical
layer (PHY) specifications for high rate wireless personal area networks
(WPANs),”Sept. 2003.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery in IEEE 802.15.3 WPANs,”in Proc. IEEE BroadNets2005, Boston, MA,
Oct. 2005.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery and Route Optimization in IEEE 802.15.3WPANs,”accepted for
publication in ACM/KluwerJ. Mobile Networks and Applications, Nov. 2005.



Z. Yin and V.C.M. Leung, “Connection Data Rate Optimization of IEEE 802.15.3
Scatternetswith Multi-rate Carriers,”IEEE ICC’06, Istanbul, Turkey, June 2006.



Zhanping Yin and Victor C.M. Leung, “Introduction to IEEE 802.15.3 High Rate
Wireless Personal Area Network (WPAN)”, Electrical and Computer Engineering
University of British Columbia

Thank You



Slide 42

Third-Party Handshake Protocol for
Efficient Peer Discovery
and Route Optimization in
IEEE 802.15.3 WPANs
Authors:
Zhanping Yin * Victor C. M. Leung
Published:
ACM/ MONET 2006
Presented by:
Gautam S. Thakur

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

WPAN
• A WPAN (wireless personal area network) is a
personal area network - a network for
interconnecting devices centered around an
individual person's workspace
• A very short range ~10 mtrs. E.g. Bluetooth
• Proposed operating frequencies are around
2.4 GHz in digital modes.
• The objective is to facilitate seamless

operation among home or business devices
and systems.

Ultra-Wideband
• A physical layer technology
• For, short distance communication with high
data rate and short transmission range.
• Lower power requirement and pulsed data
• UWB transmission over extremely wide
unlicensed radio spectrum  3.1 – 10.6 GHz.
• Over results in
– Less interference
– Wire-like performance for indoor wireless
environment.

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Overview of 802.15.3
• Why 802.15.3 ?
• The 802.15.3 Wireless Space
• 802.15.3 Overview and Components

Overview of 802.15.3
[Why 802.15.3 ?]
• Motivated by the increasing demand of wireless
communications with






Ubiquitous network connectivity
Low cost and low power consumption -> WPAN
High data rate(HDR)
Quality of Service(QoS) support
Comparison with other short to medium range wireless
technologies
• Wireless LAN (WLAN)
– High cost and power consumption, no hard QoS guarantee

• WPANs-Bluetooth (802.15.1) and ZigBee(802.15.4)
– Data rate too low

• Applications of 802.15.3
– Virtual wireless multimedia connectivity
• Video/audio distribution

– High speed data transfer

Overview of 802.15.3
[ 802.15.3 = Wireless Multimedia ]

Overview of 802.15.3
[ The 802 Wireless Space ]

IEEE 802.15.3 Overview
• High date rate and low
power
• Mainly works within a
piconet with dynamic
DEV membership
• Ad hoc topology with
centralized control by
the PNC
• Connection oriented
peer-to-peer
communications
• Support for multimedia
quality of service(QoS)
• Multiple power
management modes
• Security

Formation of an 802.15.3 piconet
• The basic component
is the DEV
– One DEV is required to
assume the role of the
piconet coordinator
(PNC) of the piconet.
– The PNC provides the
basic timing sync for the
piconet with the beacon.
– Additionally, the PNC
manages the quality of
service (QoS)
requirements, power
save modes and access
control to the piconet.

Formation of an 802.15.3 piconet (2)
• PNC supports ad
hoc peer-to-peer
connections
• PNC provides
timing for
synchronization of
DEVs within the
piconet, performs
admission control,
allocates network
resources etc

Formation of a Piconet (3)
• All DEVs within radio coverage of the PNC
can then associate with it to form a piconet.
• Then starts the peer discovery.
• Some DEV pairs in the piconet may be out of

range of each other, and as a result, direct
peer-to-peer connection is unavailable
between them. This results in network layer
discovery methods

Superframe format
• Timing and data transmissions in the piconet
are based on the superframe
• The superframe has three parts
– Beacon: Control information, Allocates CTA,
Synchronization
– Contention Access Period (CAP): via CSMA/CA, file xfer
– Channel Time Allocation Period (CTAP)

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Peer discovery and connectivity issue
• An 802.15.3 piconet supports ad hoc
communications between peer DEVs.
• Peer discovery is crucial to its operation.
• The DEVs shall be able to obtain information
about the services and capabilities of other
DEVs in the piconet at any time by
information discovery commands.
• Peer information is needed before a source
DEV can send any data to a destination DEV,
or generate channel time requests (CTRq) to
the PNC.

1
2

5

3

4

6

9

7

8

10

13

11

14

12

15

PNC

Src_DEV

Dest_DEV

PNC Info. Request command
SIFS
Imm-ACK

SIFS
PNC Information command
SIFS
Imm-ACK
SIFS

Probe Request Command
SIFS
Imm-ACK
SIFS
Probe Response Command
SIFS
Imm-ACK
RIFS

1. NOT receive the Imm-Ack
2. Cannot distinguish out-of-range
transmission and collision
3. Perform backoff retransmission
for collision repeatedly

DEV – 1

PNC

Dev 2 is outside the
range of Dev1 and
vise-versa

1. NOT receive Probe Request
command

DEV - 2

Existing Issues with IEEE 802.15.3











Peer discovery is crucial to piconet
operations.
Standard peer discovery is
unreliable and leads to substantial
delays for unreachable DEV pairs
Full piconet connectivity is not
guaranteed with only direct peerto-peer communications
The standard 802.15.3 MAC does
not take advantage of the unique
ranging capabilities enabled by
UWB
Connections are in peer-to-peer
manner without consider of
possible route optimizations
MAC modeling and performance
evaluation
Stream time scheduling methods
not defined in the standard





DEV_1 cannot communicate with
DEV_4 in peer-to-peer manner
For traffic between DEV_1 and
DEV_3, is it better to forward via
PNC than the direct connection?
What is the optimal path and data
rate between DEV_3 and DEV_5?

Using network layer routing
• Each hop request a
CTA slot seperately.
• PNC treat each hop as
independent traffic
stream

• Effect: Failure in an
intermediate hop
breaks the
connections, but PNC
assumes that an
independent stream is
terminated. Keeps
allocating CTAs for
other hops untill it is
eventually notified by
all participating DEV

Using MAC layer forwarding
• With explicit MAC
layer forwarding,
PNC knows that
these hops belongs
to one connection.
• Better adjusting
downstream and
upstream CTAs.

• Effect: reroute the
traffic is the
intermediate node
fails, and releasing
all CTAs if source
of destination
terminates.

Some Observations
• Peer discover is essential
to piconet operations
and communication
between DEVs
• Full piconet connectivity
cannot be guaranteed
• Some DEV pairs may be
out of range of each
other
• Mac layer routing fails
but is better then IP
routing.

• Remember, 802.15.3 has
centralized topology. So
what ??
• Using PNC, any devices
is two-hop count away
only.
• Can use the central
management capability
to discover simpler and
less costly MAC route

Proposed peer discovery protocol
with forwarding route optimization
• The PNC can always act as a first hop to
connect non-intersecting range DEVs
• However, a betterment can be done in the
frame forwarding by choosing another
DEV closer in distance to the source and
destination to forward the frame.
• All routes are limited to two hops only.

Algorithm
• If the Desti_DEV is reachable, sending PNC
Information Request and Response exchange is
redundant.
• So, Src_DEV send Probe Request command to the
Dest_DEV.
• If Dest_DEV receives the command, it returns an
Imm-ACK after a SIFS and then the Probe Response
command as in standard protocol operations.
• At the same time, the third party, i.e., the PNC, shall
actively monitor the frame exchange.
• Upon receiving a Probe Request, the PNC checks the
destination ID (Dest_ID) field in the MAC header.

Algorithm (2)
• If the Dest_ID is not associated in the piconet, the PNC
send an Imm-ACK to the Src_DEV after SIFS, followed
by a PNC Information command with an empty
Information Element (IE) to notify the source that
destination does not exist.
• Otherwise, instead of ignoring the Probe Request frame,
the PNC waits for the Imm-ACK from the destination
DEV.
• If no Imm-ACK arrives after a backoff inter-frame space
(BIFS), which is the sum of a SIFS and a clear channel
assessment detect time (CCADetectTime), the PNC
realizes that the destination DEV cannot hear the source.
• The PNC then immediately send an Imm-ACK to the
source, followed by a PNC Information command with
the route information. (an optimized route information in
sent)

SRC_DEV send Probe
Request command to
DEST_DEV & PNC listens

SIFS
Imm-ACK

Probe Response command

SIFS (Imm-ACK)

PNC also listen

DEST_DEV
hears?

YES

DEST_DEV
responds

No
No

DEST_DEV
ID
Present?

Yes, Timeout (BIFS)

Send Imm-ACK & route
information to source

Yes and
DEST_DEV sent Imm-ACK

Do Nothing, monitor if
DEST_DEV crash.

Forward the data to
the router node

Algorithm (3)
[Route calculation]
• Most wireless networks today employ a multirate PHY (e.g., UWB in 802.15.3a) that
supports a set of data rate dependent
modulation/coding parameters.
• Due to the extremely low power consumption
requirement of WPAN devices, the achievable
data rate drops dramatically when the
distance increases.
• The data rate can be modeled as a discrete
function of transmission distance d between
two DEVs:

Algorithm (3)
Rate ( d )  S i ;
R i  1  d  R i ;1  i  m
where, R m

1

 0 , R i is the transmiss

and S 1 and S m are the minimum

ion range of rate S i ;

and maximum

data

rates, respective ly. If d is greater th an R 1, then Rate(d)
and the DEVs have no connectivi

ty

0

Algorithm (4)
• Since the PNC can monitor all commands exchanged
during the CAP, it can learn the data rates between
reachable DEV pairs and store them in an n x n rate
matrix (RM), where
• n is the total number of DEVs within the piconet. DEV
is assigned a unique DEV_ID in the piconet
RM ij is the link rate based on the current informatio
obtained

from the commands

DEV i and DEV j . RM

ij

exchanged

 0 if DEV i and DEV

are out of range or the rate informatio
not available

between

yet, and RM

ij

n is

  if i  j .

j

n

Algorithm (5)
• All DEVs transmit with the maximum
allowable power when sending data. Since the
wireless links are symmetric in nature, clearly
RMij = RMji.
• Based on the current rate information stored
in RM, for an unreachable pair DEVi and
DEVj, the PNC can determine the optimal
(two-hop) route that has the minimum
transmission time, i.e., the best route employs
DEVk for MAC layer forwarding, where k
minimizes:

Algorithm (6)
min(

1
RM



ik
k [ 0 , n  1 ]

1
RM

)
kj

• Alleviates the traffic load on the PNC
• Discovers a current optimal two-hop MAC layer
forwarding path given by existing rate information
without introducing any extra overhead
• If the connection is broken, the PNC can
immediately reroute the traffic to a current
optimal path, or terminate the connection by deallocating all corresponding CTAs.

Discussion
• Original case:
Causes
retransmission

• 3PHP: data sent via
2-hop route if
PNC_ID exists

Dest_ID

Dest_ID

• Normal Transmission (Imm_Ack)

• Normal Transmission (Imm_Ack)

XXX FRAME LOST XXXX

PNC_ID

• Causes retransmission

• Sent Via 2–hop route (Imm_Ack)

PNC

Src_DEV
PNC Info. Request command

Probe Request Command

BIFS
Imm-ACK
SIFS

PNC Information command with Route Info.

Imm-ACK

RIFS

Dest_DEV

SIFS

3PHP-Node

DEV – 1

DEV - 2

PNC

Observations
• With 3PHP, peer discovery requires only one
round of frame exchange.
• Fully utilized the broadcast nature,
centralized control, ad-hoc communication,
and efficient peer discovery.
• Save the futile back-off retransmission for
unreachable destination.
• Guaranteed full piconet connectivity. (no
network layer routing required)
• On demand routing
• More then BIFS waiting. (include RIFS) Conclusion

Performance Evaluations
[Intra-piconet no connection probability]
• Intra-piconet no
connection
probability

• Common Overlap
Area function
COLA(R, r, x):
Represent the
intersection of two
circles with radii R
and r (r e R),
respectively, which
centers are
separated by
distance x

Performance Evaluations (2)
[Intra-piconet no connection probability]

Performance Evaluations (3)
[Intra-piconet no connection probability]
• The probability of no direct connection
between two DEVs in a piconet is

Performance Evaluations (4)
[Peer Discovery delay analysis]


# of Frame Transmission




Expected
Contention Time



Expected Packet
Delay

Performance Evaluations (5)
[Peer Discovery delay analysis]


Expected routing
failure probability

• Expected successful peer discovery
delays are given by

Simulation and Numerical Results
• No connection probability as a function of
coverage range ratio

Simulation and Numerical Results (2)
• Peer discovery delay vs. conditional
collision probability

Simulation and Numerical Results (3)
• Piconet peer discovery time vs. coverage
range ratio

Simulation and Numerical Results (4)
• Piconet peer discovery failure probability
with standard method

Simulation and Numerical Results (5)
• Two-hop forwarding route optimization
ratio vs. piconet radius

Simulation and Numerical Results (6)
• Expected data between directly unreachable
pairs in piconets with 20 DEVs

Conclusion
• Underlying fact: peer-to-peer data delivery in
802.15.3 WPANs
• Existing MAC layer peer discovery methods
cannot guarantee full connectivity between
DEVs within a piconet through direct peerto-peer connections if the piconet operates
with a radius larger than half of the
maximum transmission distance. (~ 41.3%)
• If Mac fails, use the expensive network layer
routing.

Conclusion (2)
• Used the central control topology
• Routing in 2-hop with single round of
control frame exchange
• 3PHP achieves 25– 37% faster peer
discovery time over the standard MAC
• Route optimization algorithm in the PNC
to provide the best MAC layer forwarding
routes by self-learning the available rate
information between DEVs.

References


IEEE Standard 802.15.3, “Wireless medium access control (MAC) and physical
layer (PHY) specifications for high rate wireless personal area networks
(WPANs),”Sept. 2003.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery in IEEE 802.15.3 WPANs,”in Proc. IEEE BroadNets2005, Boston, MA,
Oct. 2005.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery and Route Optimization in IEEE 802.15.3WPANs,”accepted for
publication in ACM/KluwerJ. Mobile Networks and Applications, Nov. 2005.



Z. Yin and V.C.M. Leung, “Connection Data Rate Optimization of IEEE 802.15.3
Scatternetswith Multi-rate Carriers,”IEEE ICC’06, Istanbul, Turkey, June 2006.



Zhanping Yin and Victor C.M. Leung, “Introduction to IEEE 802.15.3 High Rate
Wireless Personal Area Network (WPAN)”, Electrical and Computer Engineering
University of British Columbia

Thank You



Slide 43

Third-Party Handshake Protocol for
Efficient Peer Discovery
and Route Optimization in
IEEE 802.15.3 WPANs
Authors:
Zhanping Yin * Victor C. M. Leung
Published:
ACM/ MONET 2006
Presented by:
Gautam S. Thakur

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

WPAN
• A WPAN (wireless personal area network) is a
personal area network - a network for
interconnecting devices centered around an
individual person's workspace
• A very short range ~10 mtrs. E.g. Bluetooth
• Proposed operating frequencies are around
2.4 GHz in digital modes.
• The objective is to facilitate seamless

operation among home or business devices
and systems.

Ultra-Wideband
• A physical layer technology
• For, short distance communication with high
data rate and short transmission range.
• Lower power requirement and pulsed data
• UWB transmission over extremely wide
unlicensed radio spectrum  3.1 – 10.6 GHz.
• Over results in
– Less interference
– Wire-like performance for indoor wireless
environment.

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Overview of 802.15.3
• Why 802.15.3 ?
• The 802.15.3 Wireless Space
• 802.15.3 Overview and Components

Overview of 802.15.3
[Why 802.15.3 ?]
• Motivated by the increasing demand of wireless
communications with






Ubiquitous network connectivity
Low cost and low power consumption -> WPAN
High data rate(HDR)
Quality of Service(QoS) support
Comparison with other short to medium range wireless
technologies
• Wireless LAN (WLAN)
– High cost and power consumption, no hard QoS guarantee

• WPANs-Bluetooth (802.15.1) and ZigBee(802.15.4)
– Data rate too low

• Applications of 802.15.3
– Virtual wireless multimedia connectivity
• Video/audio distribution

– High speed data transfer

Overview of 802.15.3
[ 802.15.3 = Wireless Multimedia ]

Overview of 802.15.3
[ The 802 Wireless Space ]

IEEE 802.15.3 Overview
• High date rate and low
power
• Mainly works within a
piconet with dynamic
DEV membership
• Ad hoc topology with
centralized control by
the PNC
• Connection oriented
peer-to-peer
communications
• Support for multimedia
quality of service(QoS)
• Multiple power
management modes
• Security

Formation of an 802.15.3 piconet
• The basic component
is the DEV
– One DEV is required to
assume the role of the
piconet coordinator
(PNC) of the piconet.
– The PNC provides the
basic timing sync for the
piconet with the beacon.
– Additionally, the PNC
manages the quality of
service (QoS)
requirements, power
save modes and access
control to the piconet.

Formation of an 802.15.3 piconet (2)
• PNC supports ad
hoc peer-to-peer
connections
• PNC provides
timing for
synchronization of
DEVs within the
piconet, performs
admission control,
allocates network
resources etc

Formation of a Piconet (3)
• All DEVs within radio coverage of the PNC
can then associate with it to form a piconet.
• Then starts the peer discovery.
• Some DEV pairs in the piconet may be out of

range of each other, and as a result, direct
peer-to-peer connection is unavailable
between them. This results in network layer
discovery methods

Superframe format
• Timing and data transmissions in the piconet
are based on the superframe
• The superframe has three parts
– Beacon: Control information, Allocates CTA,
Synchronization
– Contention Access Period (CAP): via CSMA/CA, file xfer
– Channel Time Allocation Period (CTAP)

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Peer discovery and connectivity issue
• An 802.15.3 piconet supports ad hoc
communications between peer DEVs.
• Peer discovery is crucial to its operation.
• The DEVs shall be able to obtain information
about the services and capabilities of other
DEVs in the piconet at any time by
information discovery commands.
• Peer information is needed before a source
DEV can send any data to a destination DEV,
or generate channel time requests (CTRq) to
the PNC.

1
2

5

3

4

6

9

7

8

10

13

11

14

12

15

PNC

Src_DEV

Dest_DEV

PNC Info. Request command
SIFS
Imm-ACK

SIFS
PNC Information command
SIFS
Imm-ACK
SIFS

Probe Request Command
SIFS
Imm-ACK
SIFS
Probe Response Command
SIFS
Imm-ACK
RIFS

1. NOT receive the Imm-Ack
2. Cannot distinguish out-of-range
transmission and collision
3. Perform backoff retransmission
for collision repeatedly

DEV – 1

PNC

Dev 2 is outside the
range of Dev1 and
vise-versa

1. NOT receive Probe Request
command

DEV - 2

Existing Issues with IEEE 802.15.3











Peer discovery is crucial to piconet
operations.
Standard peer discovery is
unreliable and leads to substantial
delays for unreachable DEV pairs
Full piconet connectivity is not
guaranteed with only direct peerto-peer communications
The standard 802.15.3 MAC does
not take advantage of the unique
ranging capabilities enabled by
UWB
Connections are in peer-to-peer
manner without consider of
possible route optimizations
MAC modeling and performance
evaluation
Stream time scheduling methods
not defined in the standard





DEV_1 cannot communicate with
DEV_4 in peer-to-peer manner
For traffic between DEV_1 and
DEV_3, is it better to forward via
PNC than the direct connection?
What is the optimal path and data
rate between DEV_3 and DEV_5?

Using network layer routing
• Each hop request a
CTA slot seperately.
• PNC treat each hop as
independent traffic
stream

• Effect: Failure in an
intermediate hop
breaks the
connections, but PNC
assumes that an
independent stream is
terminated. Keeps
allocating CTAs for
other hops untill it is
eventually notified by
all participating DEV

Using MAC layer forwarding
• With explicit MAC
layer forwarding,
PNC knows that
these hops belongs
to one connection.
• Better adjusting
downstream and
upstream CTAs.

• Effect: reroute the
traffic is the
intermediate node
fails, and releasing
all CTAs if source
of destination
terminates.

Some Observations
• Peer discover is essential
to piconet operations
and communication
between DEVs
• Full piconet connectivity
cannot be guaranteed
• Some DEV pairs may be
out of range of each
other
• Mac layer routing fails
but is better then IP
routing.

• Remember, 802.15.3 has
centralized topology. So
what ??
• Using PNC, any devices
is two-hop count away
only.
• Can use the central
management capability
to discover simpler and
less costly MAC route

Proposed peer discovery protocol
with forwarding route optimization
• The PNC can always act as a first hop to
connect non-intersecting range DEVs
• However, a betterment can be done in the
frame forwarding by choosing another
DEV closer in distance to the source and
destination to forward the frame.
• All routes are limited to two hops only.

Algorithm
• If the Desti_DEV is reachable, sending PNC
Information Request and Response exchange is
redundant.
• So, Src_DEV send Probe Request command to the
Dest_DEV.
• If Dest_DEV receives the command, it returns an
Imm-ACK after a SIFS and then the Probe Response
command as in standard protocol operations.
• At the same time, the third party, i.e., the PNC, shall
actively monitor the frame exchange.
• Upon receiving a Probe Request, the PNC checks the
destination ID (Dest_ID) field in the MAC header.

Algorithm (2)
• If the Dest_ID is not associated in the piconet, the PNC
send an Imm-ACK to the Src_DEV after SIFS, followed
by a PNC Information command with an empty
Information Element (IE) to notify the source that
destination does not exist.
• Otherwise, instead of ignoring the Probe Request frame,
the PNC waits for the Imm-ACK from the destination
DEV.
• If no Imm-ACK arrives after a backoff inter-frame space
(BIFS), which is the sum of a SIFS and a clear channel
assessment detect time (CCADetectTime), the PNC
realizes that the destination DEV cannot hear the source.
• The PNC then immediately send an Imm-ACK to the
source, followed by a PNC Information command with
the route information. (an optimized route information in
sent)

SRC_DEV send Probe
Request command to
DEST_DEV & PNC listens

SIFS
Imm-ACK

Probe Response command

SIFS (Imm-ACK)

PNC also listen

DEST_DEV
hears?

YES

DEST_DEV
responds

No
No

DEST_DEV
ID
Present?

Yes, Timeout (BIFS)

Send Imm-ACK & route
information to source

Yes and
DEST_DEV sent Imm-ACK

Do Nothing, monitor if
DEST_DEV crash.

Forward the data to
the router node

Algorithm (3)
[Route calculation]
• Most wireless networks today employ a multirate PHY (e.g., UWB in 802.15.3a) that
supports a set of data rate dependent
modulation/coding parameters.
• Due to the extremely low power consumption
requirement of WPAN devices, the achievable
data rate drops dramatically when the
distance increases.
• The data rate can be modeled as a discrete
function of transmission distance d between
two DEVs:

Algorithm (3)
Rate ( d )  S i ;
R i  1  d  R i ;1  i  m
where, R m

1

 0 , R i is the transmiss

and S 1 and S m are the minimum

ion range of rate S i ;

and maximum

data

rates, respective ly. If d is greater th an R 1, then Rate(d)
and the DEVs have no connectivi

ty

0

Algorithm (4)
• Since the PNC can monitor all commands exchanged
during the CAP, it can learn the data rates between
reachable DEV pairs and store them in an n x n rate
matrix (RM), where
• n is the total number of DEVs within the piconet. DEV
is assigned a unique DEV_ID in the piconet
RM ij is the link rate based on the current informatio
obtained

from the commands

DEV i and DEV j . RM

ij

exchanged

 0 if DEV i and DEV

are out of range or the rate informatio
not available

between

yet, and RM

ij

n is

  if i  j .

j

n

Algorithm (5)
• All DEVs transmit with the maximum
allowable power when sending data. Since the
wireless links are symmetric in nature, clearly
RMij = RMji.
• Based on the current rate information stored
in RM, for an unreachable pair DEVi and
DEVj, the PNC can determine the optimal
(two-hop) route that has the minimum
transmission time, i.e., the best route employs
DEVk for MAC layer forwarding, where k
minimizes:

Algorithm (6)
min(

1
RM



ik
k [ 0 , n  1 ]

1
RM

)
kj

• Alleviates the traffic load on the PNC
• Discovers a current optimal two-hop MAC layer
forwarding path given by existing rate information
without introducing any extra overhead
• If the connection is broken, the PNC can
immediately reroute the traffic to a current
optimal path, or terminate the connection by deallocating all corresponding CTAs.

Discussion
• Original case:
Causes
retransmission

• 3PHP: data sent via
2-hop route if
PNC_ID exists

Dest_ID

Dest_ID

• Normal Transmission (Imm_Ack)

• Normal Transmission (Imm_Ack)

XXX FRAME LOST XXXX

PNC_ID

• Causes retransmission

• Sent Via 2–hop route (Imm_Ack)

PNC

Src_DEV
PNC Info. Request command

Probe Request Command

BIFS
Imm-ACK
SIFS

PNC Information command with Route Info.

Imm-ACK

RIFS

Dest_DEV

SIFS

3PHP-Node

DEV – 1

DEV - 2

PNC

Observations
• With 3PHP, peer discovery requires only one
round of frame exchange.
• Fully utilized the broadcast nature,
centralized control, ad-hoc communication,
and efficient peer discovery.
• Save the futile back-off retransmission for
unreachable destination.
• Guaranteed full piconet connectivity. (no
network layer routing required)
• On demand routing
• More then BIFS waiting. (include RIFS) Conclusion

Performance Evaluations
[Intra-piconet no connection probability]
• Intra-piconet no
connection
probability

• Common Overlap
Area function
COLA(R, r, x):
Represent the
intersection of two
circles with radii R
and r (r e R),
respectively, which
centers are
separated by
distance x

Performance Evaluations (2)
[Intra-piconet no connection probability]

Performance Evaluations (3)
[Intra-piconet no connection probability]
• The probability of no direct connection
between two DEVs in a piconet is

Performance Evaluations (4)
[Peer Discovery delay analysis]


# of Frame Transmission




Expected
Contention Time



Expected Packet
Delay

Performance Evaluations (5)
[Peer Discovery delay analysis]


Expected routing
failure probability

• Expected successful peer discovery
delays are given by

Simulation and Numerical Results
• No connection probability as a function of
coverage range ratio

Simulation and Numerical Results (2)
• Peer discovery delay vs. conditional
collision probability

Simulation and Numerical Results (3)
• Piconet peer discovery time vs. coverage
range ratio

Simulation and Numerical Results (4)
• Piconet peer discovery failure probability
with standard method

Simulation and Numerical Results (5)
• Two-hop forwarding route optimization
ratio vs. piconet radius

Simulation and Numerical Results (6)
• Expected data between directly unreachable
pairs in piconets with 20 DEVs

Conclusion
• Underlying fact: peer-to-peer data delivery in
802.15.3 WPANs
• Existing MAC layer peer discovery methods
cannot guarantee full connectivity between
DEVs within a piconet through direct peerto-peer connections if the piconet operates
with a radius larger than half of the
maximum transmission distance. (~ 41.3%)
• If Mac fails, use the expensive network layer
routing.

Conclusion (2)
• Used the central control topology
• Routing in 2-hop with single round of
control frame exchange
• 3PHP achieves 25– 37% faster peer
discovery time over the standard MAC
• Route optimization algorithm in the PNC
to provide the best MAC layer forwarding
routes by self-learning the available rate
information between DEVs.

References


IEEE Standard 802.15.3, “Wireless medium access control (MAC) and physical
layer (PHY) specifications for high rate wireless personal area networks
(WPANs),”Sept. 2003.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery in IEEE 802.15.3 WPANs,”in Proc. IEEE BroadNets2005, Boston, MA,
Oct. 2005.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery and Route Optimization in IEEE 802.15.3WPANs,”accepted for
publication in ACM/KluwerJ. Mobile Networks and Applications, Nov. 2005.



Z. Yin and V.C.M. Leung, “Connection Data Rate Optimization of IEEE 802.15.3
Scatternetswith Multi-rate Carriers,”IEEE ICC’06, Istanbul, Turkey, June 2006.



Zhanping Yin and Victor C.M. Leung, “Introduction to IEEE 802.15.3 High Rate
Wireless Personal Area Network (WPAN)”, Electrical and Computer Engineering
University of British Columbia

Thank You



Slide 44

Third-Party Handshake Protocol for
Efficient Peer Discovery
and Route Optimization in
IEEE 802.15.3 WPANs
Authors:
Zhanping Yin * Victor C. M. Leung
Published:
ACM/ MONET 2006
Presented by:
Gautam S. Thakur

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

WPAN
• A WPAN (wireless personal area network) is a
personal area network - a network for
interconnecting devices centered around an
individual person's workspace
• A very short range ~10 mtrs. E.g. Bluetooth
• Proposed operating frequencies are around
2.4 GHz in digital modes.
• The objective is to facilitate seamless

operation among home or business devices
and systems.

Ultra-Wideband
• A physical layer technology
• For, short distance communication with high
data rate and short transmission range.
• Lower power requirement and pulsed data
• UWB transmission over extremely wide
unlicensed radio spectrum  3.1 – 10.6 GHz.
• Over results in
– Less interference
– Wire-like performance for indoor wireless
environment.

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Overview of 802.15.3
• Why 802.15.3 ?
• The 802.15.3 Wireless Space
• 802.15.3 Overview and Components

Overview of 802.15.3
[Why 802.15.3 ?]
• Motivated by the increasing demand of wireless
communications with






Ubiquitous network connectivity
Low cost and low power consumption -> WPAN
High data rate(HDR)
Quality of Service(QoS) support
Comparison with other short to medium range wireless
technologies
• Wireless LAN (WLAN)
– High cost and power consumption, no hard QoS guarantee

• WPANs-Bluetooth (802.15.1) and ZigBee(802.15.4)
– Data rate too low

• Applications of 802.15.3
– Virtual wireless multimedia connectivity
• Video/audio distribution

– High speed data transfer

Overview of 802.15.3
[ 802.15.3 = Wireless Multimedia ]

Overview of 802.15.3
[ The 802 Wireless Space ]

IEEE 802.15.3 Overview
• High date rate and low
power
• Mainly works within a
piconet with dynamic
DEV membership
• Ad hoc topology with
centralized control by
the PNC
• Connection oriented
peer-to-peer
communications
• Support for multimedia
quality of service(QoS)
• Multiple power
management modes
• Security

Formation of an 802.15.3 piconet
• The basic component
is the DEV
– One DEV is required to
assume the role of the
piconet coordinator
(PNC) of the piconet.
– The PNC provides the
basic timing sync for the
piconet with the beacon.
– Additionally, the PNC
manages the quality of
service (QoS)
requirements, power
save modes and access
control to the piconet.

Formation of an 802.15.3 piconet (2)
• PNC supports ad
hoc peer-to-peer
connections
• PNC provides
timing for
synchronization of
DEVs within the
piconet, performs
admission control,
allocates network
resources etc

Formation of a Piconet (3)
• All DEVs within radio coverage of the PNC
can then associate with it to form a piconet.
• Then starts the peer discovery.
• Some DEV pairs in the piconet may be out of

range of each other, and as a result, direct
peer-to-peer connection is unavailable
between them. This results in network layer
discovery methods

Superframe format
• Timing and data transmissions in the piconet
are based on the superframe
• The superframe has three parts
– Beacon: Control information, Allocates CTA,
Synchronization
– Contention Access Period (CAP): via CSMA/CA, file xfer
– Channel Time Allocation Period (CTAP)

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Peer discovery and connectivity issue
• An 802.15.3 piconet supports ad hoc
communications between peer DEVs.
• Peer discovery is crucial to its operation.
• The DEVs shall be able to obtain information
about the services and capabilities of other
DEVs in the piconet at any time by
information discovery commands.
• Peer information is needed before a source
DEV can send any data to a destination DEV,
or generate channel time requests (CTRq) to
the PNC.

1
2

5

3

4

6

9

7

8

10

13

11

14

12

15

PNC

Src_DEV

Dest_DEV

PNC Info. Request command
SIFS
Imm-ACK

SIFS
PNC Information command
SIFS
Imm-ACK
SIFS

Probe Request Command
SIFS
Imm-ACK
SIFS
Probe Response Command
SIFS
Imm-ACK
RIFS

1. NOT receive the Imm-Ack
2. Cannot distinguish out-of-range
transmission and collision
3. Perform backoff retransmission
for collision repeatedly

DEV – 1

PNC

Dev 2 is outside the
range of Dev1 and
vise-versa

1. NOT receive Probe Request
command

DEV - 2

Existing Issues with IEEE 802.15.3











Peer discovery is crucial to piconet
operations.
Standard peer discovery is
unreliable and leads to substantial
delays for unreachable DEV pairs
Full piconet connectivity is not
guaranteed with only direct peerto-peer communications
The standard 802.15.3 MAC does
not take advantage of the unique
ranging capabilities enabled by
UWB
Connections are in peer-to-peer
manner without consider of
possible route optimizations
MAC modeling and performance
evaluation
Stream time scheduling methods
not defined in the standard





DEV_1 cannot communicate with
DEV_4 in peer-to-peer manner
For traffic between DEV_1 and
DEV_3, is it better to forward via
PNC than the direct connection?
What is the optimal path and data
rate between DEV_3 and DEV_5?

Using network layer routing
• Each hop request a
CTA slot seperately.
• PNC treat each hop as
independent traffic
stream

• Effect: Failure in an
intermediate hop
breaks the
connections, but PNC
assumes that an
independent stream is
terminated. Keeps
allocating CTAs for
other hops untill it is
eventually notified by
all participating DEV

Using MAC layer forwarding
• With explicit MAC
layer forwarding,
PNC knows that
these hops belongs
to one connection.
• Better adjusting
downstream and
upstream CTAs.

• Effect: reroute the
traffic is the
intermediate node
fails, and releasing
all CTAs if source
of destination
terminates.

Some Observations
• Peer discover is essential
to piconet operations
and communication
between DEVs
• Full piconet connectivity
cannot be guaranteed
• Some DEV pairs may be
out of range of each
other
• Mac layer routing fails
but is better then IP
routing.

• Remember, 802.15.3 has
centralized topology. So
what ??
• Using PNC, any devices
is two-hop count away
only.
• Can use the central
management capability
to discover simpler and
less costly MAC route

Proposed peer discovery protocol
with forwarding route optimization
• The PNC can always act as a first hop to
connect non-intersecting range DEVs
• However, a betterment can be done in the
frame forwarding by choosing another
DEV closer in distance to the source and
destination to forward the frame.
• All routes are limited to two hops only.

Algorithm
• If the Desti_DEV is reachable, sending PNC
Information Request and Response exchange is
redundant.
• So, Src_DEV send Probe Request command to the
Dest_DEV.
• If Dest_DEV receives the command, it returns an
Imm-ACK after a SIFS and then the Probe Response
command as in standard protocol operations.
• At the same time, the third party, i.e., the PNC, shall
actively monitor the frame exchange.
• Upon receiving a Probe Request, the PNC checks the
destination ID (Dest_ID) field in the MAC header.

Algorithm (2)
• If the Dest_ID is not associated in the piconet, the PNC
send an Imm-ACK to the Src_DEV after SIFS, followed
by a PNC Information command with an empty
Information Element (IE) to notify the source that
destination does not exist.
• Otherwise, instead of ignoring the Probe Request frame,
the PNC waits for the Imm-ACK from the destination
DEV.
• If no Imm-ACK arrives after a backoff inter-frame space
(BIFS), which is the sum of a SIFS and a clear channel
assessment detect time (CCADetectTime), the PNC
realizes that the destination DEV cannot hear the source.
• The PNC then immediately send an Imm-ACK to the
source, followed by a PNC Information command with
the route information. (an optimized route information in
sent)

SRC_DEV send Probe
Request command to
DEST_DEV & PNC listens

SIFS
Imm-ACK

Probe Response command

SIFS (Imm-ACK)

PNC also listen

DEST_DEV
hears?

YES

DEST_DEV
responds

No
No

DEST_DEV
ID
Present?

Yes, Timeout (BIFS)

Send Imm-ACK & route
information to source

Yes and
DEST_DEV sent Imm-ACK

Do Nothing, monitor if
DEST_DEV crash.

Forward the data to
the router node

Algorithm (3)
[Route calculation]
• Most wireless networks today employ a multirate PHY (e.g., UWB in 802.15.3a) that
supports a set of data rate dependent
modulation/coding parameters.
• Due to the extremely low power consumption
requirement of WPAN devices, the achievable
data rate drops dramatically when the
distance increases.
• The data rate can be modeled as a discrete
function of transmission distance d between
two DEVs:

Algorithm (3)
Rate ( d )  S i ;
R i  1  d  R i ;1  i  m
where, R m

1

 0 , R i is the transmiss

and S 1 and S m are the minimum

ion range of rate S i ;

and maximum

data

rates, respective ly. If d is greater th an R 1, then Rate(d)
and the DEVs have no connectivi

ty

0

Algorithm (4)
• Since the PNC can monitor all commands exchanged
during the CAP, it can learn the data rates between
reachable DEV pairs and store them in an n x n rate
matrix (RM), where
• n is the total number of DEVs within the piconet. DEV
is assigned a unique DEV_ID in the piconet
RM ij is the link rate based on the current informatio
obtained

from the commands

DEV i and DEV j . RM

ij

exchanged

 0 if DEV i and DEV

are out of range or the rate informatio
not available

between

yet, and RM

ij

n is

  if i  j .

j

n

Algorithm (5)
• All DEVs transmit with the maximum
allowable power when sending data. Since the
wireless links are symmetric in nature, clearly
RMij = RMji.
• Based on the current rate information stored
in RM, for an unreachable pair DEVi and
DEVj, the PNC can determine the optimal
(two-hop) route that has the minimum
transmission time, i.e., the best route employs
DEVk for MAC layer forwarding, where k
minimizes:

Algorithm (6)
min(

1
RM



ik
k [ 0 , n  1 ]

1
RM

)
kj

• Alleviates the traffic load on the PNC
• Discovers a current optimal two-hop MAC layer
forwarding path given by existing rate information
without introducing any extra overhead
• If the connection is broken, the PNC can
immediately reroute the traffic to a current
optimal path, or terminate the connection by deallocating all corresponding CTAs.

Discussion
• Original case:
Causes
retransmission

• 3PHP: data sent via
2-hop route if
PNC_ID exists

Dest_ID

Dest_ID

• Normal Transmission (Imm_Ack)

• Normal Transmission (Imm_Ack)

XXX FRAME LOST XXXX

PNC_ID

• Causes retransmission

• Sent Via 2–hop route (Imm_Ack)

PNC

Src_DEV
PNC Info. Request command

Probe Request Command

BIFS
Imm-ACK
SIFS

PNC Information command with Route Info.

Imm-ACK

RIFS

Dest_DEV

SIFS

3PHP-Node

DEV – 1

DEV - 2

PNC

Observations
• With 3PHP, peer discovery requires only one
round of frame exchange.
• Fully utilized the broadcast nature,
centralized control, ad-hoc communication,
and efficient peer discovery.
• Save the futile back-off retransmission for
unreachable destination.
• Guaranteed full piconet connectivity. (no
network layer routing required)
• On demand routing
• More then BIFS waiting. (include RIFS) Conclusion

Performance Evaluations
[Intra-piconet no connection probability]
• Intra-piconet no
connection
probability

• Common Overlap
Area function
COLA(R, r, x):
Represent the
intersection of two
circles with radii R
and r (r e R),
respectively, which
centers are
separated by
distance x

Performance Evaluations (2)
[Intra-piconet no connection probability]

Performance Evaluations (3)
[Intra-piconet no connection probability]
• The probability of no direct connection
between two DEVs in a piconet is

Performance Evaluations (4)
[Peer Discovery delay analysis]


# of Frame Transmission




Expected
Contention Time



Expected Packet
Delay

Performance Evaluations (5)
[Peer Discovery delay analysis]


Expected routing
failure probability

• Expected successful peer discovery
delays are given by

Simulation and Numerical Results
• No connection probability as a function of
coverage range ratio

Simulation and Numerical Results (2)
• Peer discovery delay vs. conditional
collision probability

Simulation and Numerical Results (3)
• Piconet peer discovery time vs. coverage
range ratio

Simulation and Numerical Results (4)
• Piconet peer discovery failure probability
with standard method

Simulation and Numerical Results (5)
• Two-hop forwarding route optimization
ratio vs. piconet radius

Simulation and Numerical Results (6)
• Expected data between directly unreachable
pairs in piconets with 20 DEVs

Conclusion
• Underlying fact: peer-to-peer data delivery in
802.15.3 WPANs
• Existing MAC layer peer discovery methods
cannot guarantee full connectivity between
DEVs within a piconet through direct peerto-peer connections if the piconet operates
with a radius larger than half of the
maximum transmission distance. (~ 41.3%)
• If Mac fails, use the expensive network layer
routing.

Conclusion (2)
• Used the central control topology
• Routing in 2-hop with single round of
control frame exchange
• 3PHP achieves 25– 37% faster peer
discovery time over the standard MAC
• Route optimization algorithm in the PNC
to provide the best MAC layer forwarding
routes by self-learning the available rate
information between DEVs.

References


IEEE Standard 802.15.3, “Wireless medium access control (MAC) and physical
layer (PHY) specifications for high rate wireless personal area networks
(WPANs),”Sept. 2003.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery in IEEE 802.15.3 WPANs,”in Proc. IEEE BroadNets2005, Boston, MA,
Oct. 2005.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery and Route Optimization in IEEE 802.15.3WPANs,”accepted for
publication in ACM/KluwerJ. Mobile Networks and Applications, Nov. 2005.



Z. Yin and V.C.M. Leung, “Connection Data Rate Optimization of IEEE 802.15.3
Scatternetswith Multi-rate Carriers,”IEEE ICC’06, Istanbul, Turkey, June 2006.



Zhanping Yin and Victor C.M. Leung, “Introduction to IEEE 802.15.3 High Rate
Wireless Personal Area Network (WPAN)”, Electrical and Computer Engineering
University of British Columbia

Thank You



Slide 45

Third-Party Handshake Protocol for
Efficient Peer Discovery
and Route Optimization in
IEEE 802.15.3 WPANs
Authors:
Zhanping Yin * Victor C. M. Leung
Published:
ACM/ MONET 2006
Presented by:
Gautam S. Thakur

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

WPAN
• A WPAN (wireless personal area network) is a
personal area network - a network for
interconnecting devices centered around an
individual person's workspace
• A very short range ~10 mtrs. E.g. Bluetooth
• Proposed operating frequencies are around
2.4 GHz in digital modes.
• The objective is to facilitate seamless

operation among home or business devices
and systems.

Ultra-Wideband
• A physical layer technology
• For, short distance communication with high
data rate and short transmission range.
• Lower power requirement and pulsed data
• UWB transmission over extremely wide
unlicensed radio spectrum  3.1 – 10.6 GHz.
• Over results in
– Less interference
– Wire-like performance for indoor wireless
environment.

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Overview of 802.15.3
• Why 802.15.3 ?
• The 802.15.3 Wireless Space
• 802.15.3 Overview and Components

Overview of 802.15.3
[Why 802.15.3 ?]
• Motivated by the increasing demand of wireless
communications with






Ubiquitous network connectivity
Low cost and low power consumption -> WPAN
High data rate(HDR)
Quality of Service(QoS) support
Comparison with other short to medium range wireless
technologies
• Wireless LAN (WLAN)
– High cost and power consumption, no hard QoS guarantee

• WPANs-Bluetooth (802.15.1) and ZigBee(802.15.4)
– Data rate too low

• Applications of 802.15.3
– Virtual wireless multimedia connectivity
• Video/audio distribution

– High speed data transfer

Overview of 802.15.3
[ 802.15.3 = Wireless Multimedia ]

Overview of 802.15.3
[ The 802 Wireless Space ]

IEEE 802.15.3 Overview
• High date rate and low
power
• Mainly works within a
piconet with dynamic
DEV membership
• Ad hoc topology with
centralized control by
the PNC
• Connection oriented
peer-to-peer
communications
• Support for multimedia
quality of service(QoS)
• Multiple power
management modes
• Security

Formation of an 802.15.3 piconet
• The basic component
is the DEV
– One DEV is required to
assume the role of the
piconet coordinator
(PNC) of the piconet.
– The PNC provides the
basic timing sync for the
piconet with the beacon.
– Additionally, the PNC
manages the quality of
service (QoS)
requirements, power
save modes and access
control to the piconet.

Formation of an 802.15.3 piconet (2)
• PNC supports ad
hoc peer-to-peer
connections
• PNC provides
timing for
synchronization of
DEVs within the
piconet, performs
admission control,
allocates network
resources etc

Formation of a Piconet (3)
• All DEVs within radio coverage of the PNC
can then associate with it to form a piconet.
• Then starts the peer discovery.
• Some DEV pairs in the piconet may be out of

range of each other, and as a result, direct
peer-to-peer connection is unavailable
between them. This results in network layer
discovery methods

Superframe format
• Timing and data transmissions in the piconet
are based on the superframe
• The superframe has three parts
– Beacon: Control information, Allocates CTA,
Synchronization
– Contention Access Period (CAP): via CSMA/CA, file xfer
– Channel Time Allocation Period (CTAP)

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Peer discovery and connectivity issue
• An 802.15.3 piconet supports ad hoc
communications between peer DEVs.
• Peer discovery is crucial to its operation.
• The DEVs shall be able to obtain information
about the services and capabilities of other
DEVs in the piconet at any time by
information discovery commands.
• Peer information is needed before a source
DEV can send any data to a destination DEV,
or generate channel time requests (CTRq) to
the PNC.

1
2

5

3

4

6

9

7

8

10

13

11

14

12

15

PNC

Src_DEV

Dest_DEV

PNC Info. Request command
SIFS
Imm-ACK

SIFS
PNC Information command
SIFS
Imm-ACK
SIFS

Probe Request Command
SIFS
Imm-ACK
SIFS
Probe Response Command
SIFS
Imm-ACK
RIFS

1. NOT receive the Imm-Ack
2. Cannot distinguish out-of-range
transmission and collision
3. Perform backoff retransmission
for collision repeatedly

DEV – 1

PNC

Dev 2 is outside the
range of Dev1 and
vise-versa

1. NOT receive Probe Request
command

DEV - 2

Existing Issues with IEEE 802.15.3











Peer discovery is crucial to piconet
operations.
Standard peer discovery is
unreliable and leads to substantial
delays for unreachable DEV pairs
Full piconet connectivity is not
guaranteed with only direct peerto-peer communications
The standard 802.15.3 MAC does
not take advantage of the unique
ranging capabilities enabled by
UWB
Connections are in peer-to-peer
manner without consider of
possible route optimizations
MAC modeling and performance
evaluation
Stream time scheduling methods
not defined in the standard





DEV_1 cannot communicate with
DEV_4 in peer-to-peer manner
For traffic between DEV_1 and
DEV_3, is it better to forward via
PNC than the direct connection?
What is the optimal path and data
rate between DEV_3 and DEV_5?

Using network layer routing
• Each hop request a
CTA slot seperately.
• PNC treat each hop as
independent traffic
stream

• Effect: Failure in an
intermediate hop
breaks the
connections, but PNC
assumes that an
independent stream is
terminated. Keeps
allocating CTAs for
other hops untill it is
eventually notified by
all participating DEV

Using MAC layer forwarding
• With explicit MAC
layer forwarding,
PNC knows that
these hops belongs
to one connection.
• Better adjusting
downstream and
upstream CTAs.

• Effect: reroute the
traffic is the
intermediate node
fails, and releasing
all CTAs if source
of destination
terminates.

Some Observations
• Peer discover is essential
to piconet operations
and communication
between DEVs
• Full piconet connectivity
cannot be guaranteed
• Some DEV pairs may be
out of range of each
other
• Mac layer routing fails
but is better then IP
routing.

• Remember, 802.15.3 has
centralized topology. So
what ??
• Using PNC, any devices
is two-hop count away
only.
• Can use the central
management capability
to discover simpler and
less costly MAC route

Proposed peer discovery protocol
with forwarding route optimization
• The PNC can always act as a first hop to
connect non-intersecting range DEVs
• However, a betterment can be done in the
frame forwarding by choosing another
DEV closer in distance to the source and
destination to forward the frame.
• All routes are limited to two hops only.

Algorithm
• If the Desti_DEV is reachable, sending PNC
Information Request and Response exchange is
redundant.
• So, Src_DEV send Probe Request command to the
Dest_DEV.
• If Dest_DEV receives the command, it returns an
Imm-ACK after a SIFS and then the Probe Response
command as in standard protocol operations.
• At the same time, the third party, i.e., the PNC, shall
actively monitor the frame exchange.
• Upon receiving a Probe Request, the PNC checks the
destination ID (Dest_ID) field in the MAC header.

Algorithm (2)
• If the Dest_ID is not associated in the piconet, the PNC
send an Imm-ACK to the Src_DEV after SIFS, followed
by a PNC Information command with an empty
Information Element (IE) to notify the source that
destination does not exist.
• Otherwise, instead of ignoring the Probe Request frame,
the PNC waits for the Imm-ACK from the destination
DEV.
• If no Imm-ACK arrives after a backoff inter-frame space
(BIFS), which is the sum of a SIFS and a clear channel
assessment detect time (CCADetectTime), the PNC
realizes that the destination DEV cannot hear the source.
• The PNC then immediately send an Imm-ACK to the
source, followed by a PNC Information command with
the route information. (an optimized route information in
sent)

SRC_DEV send Probe
Request command to
DEST_DEV & PNC listens

SIFS
Imm-ACK

Probe Response command

SIFS (Imm-ACK)

PNC also listen

DEST_DEV
hears?

YES

DEST_DEV
responds

No
No

DEST_DEV
ID
Present?

Yes, Timeout (BIFS)

Send Imm-ACK & route
information to source

Yes and
DEST_DEV sent Imm-ACK

Do Nothing, monitor if
DEST_DEV crash.

Forward the data to
the router node

Algorithm (3)
[Route calculation]
• Most wireless networks today employ a multirate PHY (e.g., UWB in 802.15.3a) that
supports a set of data rate dependent
modulation/coding parameters.
• Due to the extremely low power consumption
requirement of WPAN devices, the achievable
data rate drops dramatically when the
distance increases.
• The data rate can be modeled as a discrete
function of transmission distance d between
two DEVs:

Algorithm (3)
Rate ( d )  S i ;
R i  1  d  R i ;1  i  m
where, R m

1

 0 , R i is the transmiss

and S 1 and S m are the minimum

ion range of rate S i ;

and maximum

data

rates, respective ly. If d is greater th an R 1, then Rate(d)
and the DEVs have no connectivi

ty

0

Algorithm (4)
• Since the PNC can monitor all commands exchanged
during the CAP, it can learn the data rates between
reachable DEV pairs and store them in an n x n rate
matrix (RM), where
• n is the total number of DEVs within the piconet. DEV
is assigned a unique DEV_ID in the piconet
RM ij is the link rate based on the current informatio
obtained

from the commands

DEV i and DEV j . RM

ij

exchanged

 0 if DEV i and DEV

are out of range or the rate informatio
not available

between

yet, and RM

ij

n is

  if i  j .

j

n

Algorithm (5)
• All DEVs transmit with the maximum
allowable power when sending data. Since the
wireless links are symmetric in nature, clearly
RMij = RMji.
• Based on the current rate information stored
in RM, for an unreachable pair DEVi and
DEVj, the PNC can determine the optimal
(two-hop) route that has the minimum
transmission time, i.e., the best route employs
DEVk for MAC layer forwarding, where k
minimizes:

Algorithm (6)
min(

1
RM



ik
k [ 0 , n  1 ]

1
RM

)
kj

• Alleviates the traffic load on the PNC
• Discovers a current optimal two-hop MAC layer
forwarding path given by existing rate information
without introducing any extra overhead
• If the connection is broken, the PNC can
immediately reroute the traffic to a current
optimal path, or terminate the connection by deallocating all corresponding CTAs.

Discussion
• Original case:
Causes
retransmission

• 3PHP: data sent via
2-hop route if
PNC_ID exists

Dest_ID

Dest_ID

• Normal Transmission (Imm_Ack)

• Normal Transmission (Imm_Ack)

XXX FRAME LOST XXXX

PNC_ID

• Causes retransmission

• Sent Via 2–hop route (Imm_Ack)

PNC

Src_DEV
PNC Info. Request command

Probe Request Command

BIFS
Imm-ACK
SIFS

PNC Information command with Route Info.

Imm-ACK

RIFS

Dest_DEV

SIFS

3PHP-Node

DEV – 1

DEV - 2

PNC

Observations
• With 3PHP, peer discovery requires only one
round of frame exchange.
• Fully utilized the broadcast nature,
centralized control, ad-hoc communication,
and efficient peer discovery.
• Save the futile back-off retransmission for
unreachable destination.
• Guaranteed full piconet connectivity. (no
network layer routing required)
• On demand routing
• More then BIFS waiting. (include RIFS) Conclusion

Performance Evaluations
[Intra-piconet no connection probability]
• Intra-piconet no
connection
probability

• Common Overlap
Area function
COLA(R, r, x):
Represent the
intersection of two
circles with radii R
and r (r e R),
respectively, which
centers are
separated by
distance x

Performance Evaluations (2)
[Intra-piconet no connection probability]

Performance Evaluations (3)
[Intra-piconet no connection probability]
• The probability of no direct connection
between two DEVs in a piconet is

Performance Evaluations (4)
[Peer Discovery delay analysis]


# of Frame Transmission




Expected
Contention Time



Expected Packet
Delay

Performance Evaluations (5)
[Peer Discovery delay analysis]


Expected routing
failure probability

• Expected successful peer discovery
delays are given by

Simulation and Numerical Results
• No connection probability as a function of
coverage range ratio

Simulation and Numerical Results (2)
• Peer discovery delay vs. conditional
collision probability

Simulation and Numerical Results (3)
• Piconet peer discovery time vs. coverage
range ratio

Simulation and Numerical Results (4)
• Piconet peer discovery failure probability
with standard method

Simulation and Numerical Results (5)
• Two-hop forwarding route optimization
ratio vs. piconet radius

Simulation and Numerical Results (6)
• Expected data between directly unreachable
pairs in piconets with 20 DEVs

Conclusion
• Underlying fact: peer-to-peer data delivery in
802.15.3 WPANs
• Existing MAC layer peer discovery methods
cannot guarantee full connectivity between
DEVs within a piconet through direct peerto-peer connections if the piconet operates
with a radius larger than half of the
maximum transmission distance. (~ 41.3%)
• If Mac fails, use the expensive network layer
routing.

Conclusion (2)
• Used the central control topology
• Routing in 2-hop with single round of
control frame exchange
• 3PHP achieves 25– 37% faster peer
discovery time over the standard MAC
• Route optimization algorithm in the PNC
to provide the best MAC layer forwarding
routes by self-learning the available rate
information between DEVs.

References


IEEE Standard 802.15.3, “Wireless medium access control (MAC) and physical
layer (PHY) specifications for high rate wireless personal area networks
(WPANs),”Sept. 2003.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery in IEEE 802.15.3 WPANs,”in Proc. IEEE BroadNets2005, Boston, MA,
Oct. 2005.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery and Route Optimization in IEEE 802.15.3WPANs,”accepted for
publication in ACM/KluwerJ. Mobile Networks and Applications, Nov. 2005.



Z. Yin and V.C.M. Leung, “Connection Data Rate Optimization of IEEE 802.15.3
Scatternetswith Multi-rate Carriers,”IEEE ICC’06, Istanbul, Turkey, June 2006.



Zhanping Yin and Victor C.M. Leung, “Introduction to IEEE 802.15.3 High Rate
Wireless Personal Area Network (WPAN)”, Electrical and Computer Engineering
University of British Columbia

Thank You



Slide 46

Third-Party Handshake Protocol for
Efficient Peer Discovery
and Route Optimization in
IEEE 802.15.3 WPANs
Authors:
Zhanping Yin * Victor C. M. Leung
Published:
ACM/ MONET 2006
Presented by:
Gautam S. Thakur

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

WPAN
• A WPAN (wireless personal area network) is a
personal area network - a network for
interconnecting devices centered around an
individual person's workspace
• A very short range ~10 mtrs. E.g. Bluetooth
• Proposed operating frequencies are around
2.4 GHz in digital modes.
• The objective is to facilitate seamless

operation among home or business devices
and systems.

Ultra-Wideband
• A physical layer technology
• For, short distance communication with high
data rate and short transmission range.
• Lower power requirement and pulsed data
• UWB transmission over extremely wide
unlicensed radio spectrum  3.1 – 10.6 GHz.
• Over results in
– Less interference
– Wire-like performance for indoor wireless
environment.

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Overview of 802.15.3
• Why 802.15.3 ?
• The 802.15.3 Wireless Space
• 802.15.3 Overview and Components

Overview of 802.15.3
[Why 802.15.3 ?]
• Motivated by the increasing demand of wireless
communications with






Ubiquitous network connectivity
Low cost and low power consumption -> WPAN
High data rate(HDR)
Quality of Service(QoS) support
Comparison with other short to medium range wireless
technologies
• Wireless LAN (WLAN)
– High cost and power consumption, no hard QoS guarantee

• WPANs-Bluetooth (802.15.1) and ZigBee(802.15.4)
– Data rate too low

• Applications of 802.15.3
– Virtual wireless multimedia connectivity
• Video/audio distribution

– High speed data transfer

Overview of 802.15.3
[ 802.15.3 = Wireless Multimedia ]

Overview of 802.15.3
[ The 802 Wireless Space ]

IEEE 802.15.3 Overview
• High date rate and low
power
• Mainly works within a
piconet with dynamic
DEV membership
• Ad hoc topology with
centralized control by
the PNC
• Connection oriented
peer-to-peer
communications
• Support for multimedia
quality of service(QoS)
• Multiple power
management modes
• Security

Formation of an 802.15.3 piconet
• The basic component
is the DEV
– One DEV is required to
assume the role of the
piconet coordinator
(PNC) of the piconet.
– The PNC provides the
basic timing sync for the
piconet with the beacon.
– Additionally, the PNC
manages the quality of
service (QoS)
requirements, power
save modes and access
control to the piconet.

Formation of an 802.15.3 piconet (2)
• PNC supports ad
hoc peer-to-peer
connections
• PNC provides
timing for
synchronization of
DEVs within the
piconet, performs
admission control,
allocates network
resources etc

Formation of a Piconet (3)
• All DEVs within radio coverage of the PNC
can then associate with it to form a piconet.
• Then starts the peer discovery.
• Some DEV pairs in the piconet may be out of

range of each other, and as a result, direct
peer-to-peer connection is unavailable
between them. This results in network layer
discovery methods

Superframe format
• Timing and data transmissions in the piconet
are based on the superframe
• The superframe has three parts
– Beacon: Control information, Allocates CTA,
Synchronization
– Contention Access Period (CAP): via CSMA/CA, file xfer
– Channel Time Allocation Period (CTAP)

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Peer discovery and connectivity issue
• An 802.15.3 piconet supports ad hoc
communications between peer DEVs.
• Peer discovery is crucial to its operation.
• The DEVs shall be able to obtain information
about the services and capabilities of other
DEVs in the piconet at any time by
information discovery commands.
• Peer information is needed before a source
DEV can send any data to a destination DEV,
or generate channel time requests (CTRq) to
the PNC.

1
2

5

3

4

6

9

7

8

10

13

11

14

12

15

PNC

Src_DEV

Dest_DEV

PNC Info. Request command
SIFS
Imm-ACK

SIFS
PNC Information command
SIFS
Imm-ACK
SIFS

Probe Request Command
SIFS
Imm-ACK
SIFS
Probe Response Command
SIFS
Imm-ACK
RIFS

1. NOT receive the Imm-Ack
2. Cannot distinguish out-of-range
transmission and collision
3. Perform backoff retransmission
for collision repeatedly

DEV – 1

PNC

Dev 2 is outside the
range of Dev1 and
vise-versa

1. NOT receive Probe Request
command

DEV - 2

Existing Issues with IEEE 802.15.3











Peer discovery is crucial to piconet
operations.
Standard peer discovery is
unreliable and leads to substantial
delays for unreachable DEV pairs
Full piconet connectivity is not
guaranteed with only direct peerto-peer communications
The standard 802.15.3 MAC does
not take advantage of the unique
ranging capabilities enabled by
UWB
Connections are in peer-to-peer
manner without consider of
possible route optimizations
MAC modeling and performance
evaluation
Stream time scheduling methods
not defined in the standard





DEV_1 cannot communicate with
DEV_4 in peer-to-peer manner
For traffic between DEV_1 and
DEV_3, is it better to forward via
PNC than the direct connection?
What is the optimal path and data
rate between DEV_3 and DEV_5?

Using network layer routing
• Each hop request a
CTA slot seperately.
• PNC treat each hop as
independent traffic
stream

• Effect: Failure in an
intermediate hop
breaks the
connections, but PNC
assumes that an
independent stream is
terminated. Keeps
allocating CTAs for
other hops untill it is
eventually notified by
all participating DEV

Using MAC layer forwarding
• With explicit MAC
layer forwarding,
PNC knows that
these hops belongs
to one connection.
• Better adjusting
downstream and
upstream CTAs.

• Effect: reroute the
traffic is the
intermediate node
fails, and releasing
all CTAs if source
of destination
terminates.

Some Observations
• Peer discover is essential
to piconet operations
and communication
between DEVs
• Full piconet connectivity
cannot be guaranteed
• Some DEV pairs may be
out of range of each
other
• Mac layer routing fails
but is better then IP
routing.

• Remember, 802.15.3 has
centralized topology. So
what ??
• Using PNC, any devices
is two-hop count away
only.
• Can use the central
management capability
to discover simpler and
less costly MAC route

Proposed peer discovery protocol
with forwarding route optimization
• The PNC can always act as a first hop to
connect non-intersecting range DEVs
• However, a betterment can be done in the
frame forwarding by choosing another
DEV closer in distance to the source and
destination to forward the frame.
• All routes are limited to two hops only.

Algorithm
• If the Desti_DEV is reachable, sending PNC
Information Request and Response exchange is
redundant.
• So, Src_DEV send Probe Request command to the
Dest_DEV.
• If Dest_DEV receives the command, it returns an
Imm-ACK after a SIFS and then the Probe Response
command as in standard protocol operations.
• At the same time, the third party, i.e., the PNC, shall
actively monitor the frame exchange.
• Upon receiving a Probe Request, the PNC checks the
destination ID (Dest_ID) field in the MAC header.

Algorithm (2)
• If the Dest_ID is not associated in the piconet, the PNC
send an Imm-ACK to the Src_DEV after SIFS, followed
by a PNC Information command with an empty
Information Element (IE) to notify the source that
destination does not exist.
• Otherwise, instead of ignoring the Probe Request frame,
the PNC waits for the Imm-ACK from the destination
DEV.
• If no Imm-ACK arrives after a backoff inter-frame space
(BIFS), which is the sum of a SIFS and a clear channel
assessment detect time (CCADetectTime), the PNC
realizes that the destination DEV cannot hear the source.
• The PNC then immediately send an Imm-ACK to the
source, followed by a PNC Information command with
the route information. (an optimized route information in
sent)

SRC_DEV send Probe
Request command to
DEST_DEV & PNC listens

SIFS
Imm-ACK

Probe Response command

SIFS (Imm-ACK)

PNC also listen

DEST_DEV
hears?

YES

DEST_DEV
responds

No
No

DEST_DEV
ID
Present?

Yes, Timeout (BIFS)

Send Imm-ACK & route
information to source

Yes and
DEST_DEV sent Imm-ACK

Do Nothing, monitor if
DEST_DEV crash.

Forward the data to
the router node

Algorithm (3)
[Route calculation]
• Most wireless networks today employ a multirate PHY (e.g., UWB in 802.15.3a) that
supports a set of data rate dependent
modulation/coding parameters.
• Due to the extremely low power consumption
requirement of WPAN devices, the achievable
data rate drops dramatically when the
distance increases.
• The data rate can be modeled as a discrete
function of transmission distance d between
two DEVs:

Algorithm (3)
Rate ( d )  S i ;
R i  1  d  R i ;1  i  m
where, R m

1

 0 , R i is the transmiss

and S 1 and S m are the minimum

ion range of rate S i ;

and maximum

data

rates, respective ly. If d is greater th an R 1, then Rate(d)
and the DEVs have no connectivi

ty

0

Algorithm (4)
• Since the PNC can monitor all commands exchanged
during the CAP, it can learn the data rates between
reachable DEV pairs and store them in an n x n rate
matrix (RM), where
• n is the total number of DEVs within the piconet. DEV
is assigned a unique DEV_ID in the piconet
RM ij is the link rate based on the current informatio
obtained

from the commands

DEV i and DEV j . RM

ij

exchanged

 0 if DEV i and DEV

are out of range or the rate informatio
not available

between

yet, and RM

ij

n is

  if i  j .

j

n

Algorithm (5)
• All DEVs transmit with the maximum
allowable power when sending data. Since the
wireless links are symmetric in nature, clearly
RMij = RMji.
• Based on the current rate information stored
in RM, for an unreachable pair DEVi and
DEVj, the PNC can determine the optimal
(two-hop) route that has the minimum
transmission time, i.e., the best route employs
DEVk for MAC layer forwarding, where k
minimizes:

Algorithm (6)
min(

1
RM



ik
k [ 0 , n  1 ]

1
RM

)
kj

• Alleviates the traffic load on the PNC
• Discovers a current optimal two-hop MAC layer
forwarding path given by existing rate information
without introducing any extra overhead
• If the connection is broken, the PNC can
immediately reroute the traffic to a current
optimal path, or terminate the connection by deallocating all corresponding CTAs.

Discussion
• Original case:
Causes
retransmission

• 3PHP: data sent via
2-hop route if
PNC_ID exists

Dest_ID

Dest_ID

• Normal Transmission (Imm_Ack)

• Normal Transmission (Imm_Ack)

XXX FRAME LOST XXXX

PNC_ID

• Causes retransmission

• Sent Via 2–hop route (Imm_Ack)

PNC

Src_DEV
PNC Info. Request command

Probe Request Command

BIFS
Imm-ACK
SIFS

PNC Information command with Route Info.

Imm-ACK

RIFS

Dest_DEV

SIFS

3PHP-Node

DEV – 1

DEV - 2

PNC

Observations
• With 3PHP, peer discovery requires only one
round of frame exchange.
• Fully utilized the broadcast nature,
centralized control, ad-hoc communication,
and efficient peer discovery.
• Save the futile back-off retransmission for
unreachable destination.
• Guaranteed full piconet connectivity. (no
network layer routing required)
• On demand routing
• More then BIFS waiting. (include RIFS) Conclusion

Performance Evaluations
[Intra-piconet no connection probability]
• Intra-piconet no
connection
probability

• Common Overlap
Area function
COLA(R, r, x):
Represent the
intersection of two
circles with radii R
and r (r e R),
respectively, which
centers are
separated by
distance x

Performance Evaluations (2)
[Intra-piconet no connection probability]

Performance Evaluations (3)
[Intra-piconet no connection probability]
• The probability of no direct connection
between two DEVs in a piconet is

Performance Evaluations (4)
[Peer Discovery delay analysis]


# of Frame Transmission




Expected
Contention Time



Expected Packet
Delay

Performance Evaluations (5)
[Peer Discovery delay analysis]


Expected routing
failure probability

• Expected successful peer discovery
delays are given by

Simulation and Numerical Results
• No connection probability as a function of
coverage range ratio

Simulation and Numerical Results (2)
• Peer discovery delay vs. conditional
collision probability

Simulation and Numerical Results (3)
• Piconet peer discovery time vs. coverage
range ratio

Simulation and Numerical Results (4)
• Piconet peer discovery failure probability
with standard method

Simulation and Numerical Results (5)
• Two-hop forwarding route optimization
ratio vs. piconet radius

Simulation and Numerical Results (6)
• Expected data between directly unreachable
pairs in piconets with 20 DEVs

Conclusion
• Underlying fact: peer-to-peer data delivery in
802.15.3 WPANs
• Existing MAC layer peer discovery methods
cannot guarantee full connectivity between
DEVs within a piconet through direct peerto-peer connections if the piconet operates
with a radius larger than half of the
maximum transmission distance. (~ 41.3%)
• If Mac fails, use the expensive network layer
routing.

Conclusion (2)
• Used the central control topology
• Routing in 2-hop with single round of
control frame exchange
• 3PHP achieves 25– 37% faster peer
discovery time over the standard MAC
• Route optimization algorithm in the PNC
to provide the best MAC layer forwarding
routes by self-learning the available rate
information between DEVs.

References


IEEE Standard 802.15.3, “Wireless medium access control (MAC) and physical
layer (PHY) specifications for high rate wireless personal area networks
(WPANs),”Sept. 2003.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery in IEEE 802.15.3 WPANs,”in Proc. IEEE BroadNets2005, Boston, MA,
Oct. 2005.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery and Route Optimization in IEEE 802.15.3WPANs,”accepted for
publication in ACM/KluwerJ. Mobile Networks and Applications, Nov. 2005.



Z. Yin and V.C.M. Leung, “Connection Data Rate Optimization of IEEE 802.15.3
Scatternetswith Multi-rate Carriers,”IEEE ICC’06, Istanbul, Turkey, June 2006.



Zhanping Yin and Victor C.M. Leung, “Introduction to IEEE 802.15.3 High Rate
Wireless Personal Area Network (WPAN)”, Electrical and Computer Engineering
University of British Columbia

Thank You



Slide 47

Third-Party Handshake Protocol for
Efficient Peer Discovery
and Route Optimization in
IEEE 802.15.3 WPANs
Authors:
Zhanping Yin * Victor C. M. Leung
Published:
ACM/ MONET 2006
Presented by:
Gautam S. Thakur

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

WPAN
• A WPAN (wireless personal area network) is a
personal area network - a network for
interconnecting devices centered around an
individual person's workspace
• A very short range ~10 mtrs. E.g. Bluetooth
• Proposed operating frequencies are around
2.4 GHz in digital modes.
• The objective is to facilitate seamless

operation among home or business devices
and systems.

Ultra-Wideband
• A physical layer technology
• For, short distance communication with high
data rate and short transmission range.
• Lower power requirement and pulsed data
• UWB transmission over extremely wide
unlicensed radio spectrum  3.1 – 10.6 GHz.
• Over results in
– Less interference
– Wire-like performance for indoor wireless
environment.

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Overview of 802.15.3
• Why 802.15.3 ?
• The 802.15.3 Wireless Space
• 802.15.3 Overview and Components

Overview of 802.15.3
[Why 802.15.3 ?]
• Motivated by the increasing demand of wireless
communications with






Ubiquitous network connectivity
Low cost and low power consumption -> WPAN
High data rate(HDR)
Quality of Service(QoS) support
Comparison with other short to medium range wireless
technologies
• Wireless LAN (WLAN)
– High cost and power consumption, no hard QoS guarantee

• WPANs-Bluetooth (802.15.1) and ZigBee(802.15.4)
– Data rate too low

• Applications of 802.15.3
– Virtual wireless multimedia connectivity
• Video/audio distribution

– High speed data transfer

Overview of 802.15.3
[ 802.15.3 = Wireless Multimedia ]

Overview of 802.15.3
[ The 802 Wireless Space ]

IEEE 802.15.3 Overview
• High date rate and low
power
• Mainly works within a
piconet with dynamic
DEV membership
• Ad hoc topology with
centralized control by
the PNC
• Connection oriented
peer-to-peer
communications
• Support for multimedia
quality of service(QoS)
• Multiple power
management modes
• Security

Formation of an 802.15.3 piconet
• The basic component
is the DEV
– One DEV is required to
assume the role of the
piconet coordinator
(PNC) of the piconet.
– The PNC provides the
basic timing sync for the
piconet with the beacon.
– Additionally, the PNC
manages the quality of
service (QoS)
requirements, power
save modes and access
control to the piconet.

Formation of an 802.15.3 piconet (2)
• PNC supports ad
hoc peer-to-peer
connections
• PNC provides
timing for
synchronization of
DEVs within the
piconet, performs
admission control,
allocates network
resources etc

Formation of a Piconet (3)
• All DEVs within radio coverage of the PNC
can then associate with it to form a piconet.
• Then starts the peer discovery.
• Some DEV pairs in the piconet may be out of

range of each other, and as a result, direct
peer-to-peer connection is unavailable
between them. This results in network layer
discovery methods

Superframe format
• Timing and data transmissions in the piconet
are based on the superframe
• The superframe has three parts
– Beacon: Control information, Allocates CTA,
Synchronization
– Contention Access Period (CAP): via CSMA/CA, file xfer
– Channel Time Allocation Period (CTAP)

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Peer discovery and connectivity issue
• An 802.15.3 piconet supports ad hoc
communications between peer DEVs.
• Peer discovery is crucial to its operation.
• The DEVs shall be able to obtain information
about the services and capabilities of other
DEVs in the piconet at any time by
information discovery commands.
• Peer information is needed before a source
DEV can send any data to a destination DEV,
or generate channel time requests (CTRq) to
the PNC.

1
2

5

3

4

6

9

7

8

10

13

11

14

12

15

PNC

Src_DEV

Dest_DEV

PNC Info. Request command
SIFS
Imm-ACK

SIFS
PNC Information command
SIFS
Imm-ACK
SIFS

Probe Request Command
SIFS
Imm-ACK
SIFS
Probe Response Command
SIFS
Imm-ACK
RIFS

1. NOT receive the Imm-Ack
2. Cannot distinguish out-of-range
transmission and collision
3. Perform backoff retransmission
for collision repeatedly

DEV – 1

PNC

Dev 2 is outside the
range of Dev1 and
vise-versa

1. NOT receive Probe Request
command

DEV - 2

Existing Issues with IEEE 802.15.3











Peer discovery is crucial to piconet
operations.
Standard peer discovery is
unreliable and leads to substantial
delays for unreachable DEV pairs
Full piconet connectivity is not
guaranteed with only direct peerto-peer communications
The standard 802.15.3 MAC does
not take advantage of the unique
ranging capabilities enabled by
UWB
Connections are in peer-to-peer
manner without consider of
possible route optimizations
MAC modeling and performance
evaluation
Stream time scheduling methods
not defined in the standard





DEV_1 cannot communicate with
DEV_4 in peer-to-peer manner
For traffic between DEV_1 and
DEV_3, is it better to forward via
PNC than the direct connection?
What is the optimal path and data
rate between DEV_3 and DEV_5?

Using network layer routing
• Each hop request a
CTA slot seperately.
• PNC treat each hop as
independent traffic
stream

• Effect: Failure in an
intermediate hop
breaks the
connections, but PNC
assumes that an
independent stream is
terminated. Keeps
allocating CTAs for
other hops untill it is
eventually notified by
all participating DEV

Using MAC layer forwarding
• With explicit MAC
layer forwarding,
PNC knows that
these hops belongs
to one connection.
• Better adjusting
downstream and
upstream CTAs.

• Effect: reroute the
traffic is the
intermediate node
fails, and releasing
all CTAs if source
of destination
terminates.

Some Observations
• Peer discover is essential
to piconet operations
and communication
between DEVs
• Full piconet connectivity
cannot be guaranteed
• Some DEV pairs may be
out of range of each
other
• Mac layer routing fails
but is better then IP
routing.

• Remember, 802.15.3 has
centralized topology. So
what ??
• Using PNC, any devices
is two-hop count away
only.
• Can use the central
management capability
to discover simpler and
less costly MAC route

Proposed peer discovery protocol
with forwarding route optimization
• The PNC can always act as a first hop to
connect non-intersecting range DEVs
• However, a betterment can be done in the
frame forwarding by choosing another
DEV closer in distance to the source and
destination to forward the frame.
• All routes are limited to two hops only.

Algorithm
• If the Desti_DEV is reachable, sending PNC
Information Request and Response exchange is
redundant.
• So, Src_DEV send Probe Request command to the
Dest_DEV.
• If Dest_DEV receives the command, it returns an
Imm-ACK after a SIFS and then the Probe Response
command as in standard protocol operations.
• At the same time, the third party, i.e., the PNC, shall
actively monitor the frame exchange.
• Upon receiving a Probe Request, the PNC checks the
destination ID (Dest_ID) field in the MAC header.

Algorithm (2)
• If the Dest_ID is not associated in the piconet, the PNC
send an Imm-ACK to the Src_DEV after SIFS, followed
by a PNC Information command with an empty
Information Element (IE) to notify the source that
destination does not exist.
• Otherwise, instead of ignoring the Probe Request frame,
the PNC waits for the Imm-ACK from the destination
DEV.
• If no Imm-ACK arrives after a backoff inter-frame space
(BIFS), which is the sum of a SIFS and a clear channel
assessment detect time (CCADetectTime), the PNC
realizes that the destination DEV cannot hear the source.
• The PNC then immediately send an Imm-ACK to the
source, followed by a PNC Information command with
the route information. (an optimized route information in
sent)

SRC_DEV send Probe
Request command to
DEST_DEV & PNC listens

SIFS
Imm-ACK

Probe Response command

SIFS (Imm-ACK)

PNC also listen

DEST_DEV
hears?

YES

DEST_DEV
responds

No
No

DEST_DEV
ID
Present?

Yes, Timeout (BIFS)

Send Imm-ACK & route
information to source

Yes and
DEST_DEV sent Imm-ACK

Do Nothing, monitor if
DEST_DEV crash.

Forward the data to
the router node

Algorithm (3)
[Route calculation]
• Most wireless networks today employ a multirate PHY (e.g., UWB in 802.15.3a) that
supports a set of data rate dependent
modulation/coding parameters.
• Due to the extremely low power consumption
requirement of WPAN devices, the achievable
data rate drops dramatically when the
distance increases.
• The data rate can be modeled as a discrete
function of transmission distance d between
two DEVs:

Algorithm (3)
Rate ( d )  S i ;
R i  1  d  R i ;1  i  m
where, R m

1

 0 , R i is the transmiss

and S 1 and S m are the minimum

ion range of rate S i ;

and maximum

data

rates, respective ly. If d is greater th an R 1, then Rate(d)
and the DEVs have no connectivi

ty

0

Algorithm (4)
• Since the PNC can monitor all commands exchanged
during the CAP, it can learn the data rates between
reachable DEV pairs and store them in an n x n rate
matrix (RM), where
• n is the total number of DEVs within the piconet. DEV
is assigned a unique DEV_ID in the piconet
RM ij is the link rate based on the current informatio
obtained

from the commands

DEV i and DEV j . RM

ij

exchanged

 0 if DEV i and DEV

are out of range or the rate informatio
not available

between

yet, and RM

ij

n is

  if i  j .

j

n

Algorithm (5)
• All DEVs transmit with the maximum
allowable power when sending data. Since the
wireless links are symmetric in nature, clearly
RMij = RMji.
• Based on the current rate information stored
in RM, for an unreachable pair DEVi and
DEVj, the PNC can determine the optimal
(two-hop) route that has the minimum
transmission time, i.e., the best route employs
DEVk for MAC layer forwarding, where k
minimizes:

Algorithm (6)
min(

1
RM



ik
k [ 0 , n  1 ]

1
RM

)
kj

• Alleviates the traffic load on the PNC
• Discovers a current optimal two-hop MAC layer
forwarding path given by existing rate information
without introducing any extra overhead
• If the connection is broken, the PNC can
immediately reroute the traffic to a current
optimal path, or terminate the connection by deallocating all corresponding CTAs.

Discussion
• Original case:
Causes
retransmission

• 3PHP: data sent via
2-hop route if
PNC_ID exists

Dest_ID

Dest_ID

• Normal Transmission (Imm_Ack)

• Normal Transmission (Imm_Ack)

XXX FRAME LOST XXXX

PNC_ID

• Causes retransmission

• Sent Via 2–hop route (Imm_Ack)

PNC

Src_DEV
PNC Info. Request command

Probe Request Command

BIFS
Imm-ACK
SIFS

PNC Information command with Route Info.

Imm-ACK

RIFS

Dest_DEV

SIFS

3PHP-Node

DEV – 1

DEV - 2

PNC

Observations
• With 3PHP, peer discovery requires only one
round of frame exchange.
• Fully utilized the broadcast nature,
centralized control, ad-hoc communication,
and efficient peer discovery.
• Save the futile back-off retransmission for
unreachable destination.
• Guaranteed full piconet connectivity. (no
network layer routing required)
• On demand routing
• More then BIFS waiting. (include RIFS) Conclusion

Performance Evaluations
[Intra-piconet no connection probability]
• Intra-piconet no
connection
probability

• Common Overlap
Area function
COLA(R, r, x):
Represent the
intersection of two
circles with radii R
and r (r e R),
respectively, which
centers are
separated by
distance x

Performance Evaluations (2)
[Intra-piconet no connection probability]

Performance Evaluations (3)
[Intra-piconet no connection probability]
• The probability of no direct connection
between two DEVs in a piconet is

Performance Evaluations (4)
[Peer Discovery delay analysis]


# of Frame Transmission




Expected
Contention Time



Expected Packet
Delay

Performance Evaluations (5)
[Peer Discovery delay analysis]


Expected routing
failure probability

• Expected successful peer discovery
delays are given by

Simulation and Numerical Results
• No connection probability as a function of
coverage range ratio

Simulation and Numerical Results (2)
• Peer discovery delay vs. conditional
collision probability

Simulation and Numerical Results (3)
• Piconet peer discovery time vs. coverage
range ratio

Simulation and Numerical Results (4)
• Piconet peer discovery failure probability
with standard method

Simulation and Numerical Results (5)
• Two-hop forwarding route optimization
ratio vs. piconet radius

Simulation and Numerical Results (6)
• Expected data between directly unreachable
pairs in piconets with 20 DEVs

Conclusion
• Underlying fact: peer-to-peer data delivery in
802.15.3 WPANs
• Existing MAC layer peer discovery methods
cannot guarantee full connectivity between
DEVs within a piconet through direct peerto-peer connections if the piconet operates
with a radius larger than half of the
maximum transmission distance. (~ 41.3%)
• If Mac fails, use the expensive network layer
routing.

Conclusion (2)
• Used the central control topology
• Routing in 2-hop with single round of
control frame exchange
• 3PHP achieves 25– 37% faster peer
discovery time over the standard MAC
• Route optimization algorithm in the PNC
to provide the best MAC layer forwarding
routes by self-learning the available rate
information between DEVs.

References


IEEE Standard 802.15.3, “Wireless medium access control (MAC) and physical
layer (PHY) specifications for high rate wireless personal area networks
(WPANs),”Sept. 2003.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery in IEEE 802.15.3 WPANs,”in Proc. IEEE BroadNets2005, Boston, MA,
Oct. 2005.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery and Route Optimization in IEEE 802.15.3WPANs,”accepted for
publication in ACM/KluwerJ. Mobile Networks and Applications, Nov. 2005.



Z. Yin and V.C.M. Leung, “Connection Data Rate Optimization of IEEE 802.15.3
Scatternetswith Multi-rate Carriers,”IEEE ICC’06, Istanbul, Turkey, June 2006.



Zhanping Yin and Victor C.M. Leung, “Introduction to IEEE 802.15.3 High Rate
Wireless Personal Area Network (WPAN)”, Electrical and Computer Engineering
University of British Columbia

Thank You



Slide 48

Third-Party Handshake Protocol for
Efficient Peer Discovery
and Route Optimization in
IEEE 802.15.3 WPANs
Authors:
Zhanping Yin * Victor C. M. Leung
Published:
ACM/ MONET 2006
Presented by:
Gautam S. Thakur

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

WPAN
• A WPAN (wireless personal area network) is a
personal area network - a network for
interconnecting devices centered around an
individual person's workspace
• A very short range ~10 mtrs. E.g. Bluetooth
• Proposed operating frequencies are around
2.4 GHz in digital modes.
• The objective is to facilitate seamless

operation among home or business devices
and systems.

Ultra-Wideband
• A physical layer technology
• For, short distance communication with high
data rate and short transmission range.
• Lower power requirement and pulsed data
• UWB transmission over extremely wide
unlicensed radio spectrum  3.1 – 10.6 GHz.
• Over results in
– Less interference
– Wire-like performance for indoor wireless
environment.

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Overview of 802.15.3
• Why 802.15.3 ?
• The 802.15.3 Wireless Space
• 802.15.3 Overview and Components

Overview of 802.15.3
[Why 802.15.3 ?]
• Motivated by the increasing demand of wireless
communications with






Ubiquitous network connectivity
Low cost and low power consumption -> WPAN
High data rate(HDR)
Quality of Service(QoS) support
Comparison with other short to medium range wireless
technologies
• Wireless LAN (WLAN)
– High cost and power consumption, no hard QoS guarantee

• WPANs-Bluetooth (802.15.1) and ZigBee(802.15.4)
– Data rate too low

• Applications of 802.15.3
– Virtual wireless multimedia connectivity
• Video/audio distribution

– High speed data transfer

Overview of 802.15.3
[ 802.15.3 = Wireless Multimedia ]

Overview of 802.15.3
[ The 802 Wireless Space ]

IEEE 802.15.3 Overview
• High date rate and low
power
• Mainly works within a
piconet with dynamic
DEV membership
• Ad hoc topology with
centralized control by
the PNC
• Connection oriented
peer-to-peer
communications
• Support for multimedia
quality of service(QoS)
• Multiple power
management modes
• Security

Formation of an 802.15.3 piconet
• The basic component
is the DEV
– One DEV is required to
assume the role of the
piconet coordinator
(PNC) of the piconet.
– The PNC provides the
basic timing sync for the
piconet with the beacon.
– Additionally, the PNC
manages the quality of
service (QoS)
requirements, power
save modes and access
control to the piconet.

Formation of an 802.15.3 piconet (2)
• PNC supports ad
hoc peer-to-peer
connections
• PNC provides
timing for
synchronization of
DEVs within the
piconet, performs
admission control,
allocates network
resources etc

Formation of a Piconet (3)
• All DEVs within radio coverage of the PNC
can then associate with it to form a piconet.
• Then starts the peer discovery.
• Some DEV pairs in the piconet may be out of

range of each other, and as a result, direct
peer-to-peer connection is unavailable
between them. This results in network layer
discovery methods

Superframe format
• Timing and data transmissions in the piconet
are based on the superframe
• The superframe has three parts
– Beacon: Control information, Allocates CTA,
Synchronization
– Contention Access Period (CAP): via CSMA/CA, file xfer
– Channel Time Allocation Period (CTAP)

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Peer discovery and connectivity issue
• An 802.15.3 piconet supports ad hoc
communications between peer DEVs.
• Peer discovery is crucial to its operation.
• The DEVs shall be able to obtain information
about the services and capabilities of other
DEVs in the piconet at any time by
information discovery commands.
• Peer information is needed before a source
DEV can send any data to a destination DEV,
or generate channel time requests (CTRq) to
the PNC.

1
2

5

3

4

6

9

7

8

10

13

11

14

12

15

PNC

Src_DEV

Dest_DEV

PNC Info. Request command
SIFS
Imm-ACK

SIFS
PNC Information command
SIFS
Imm-ACK
SIFS

Probe Request Command
SIFS
Imm-ACK
SIFS
Probe Response Command
SIFS
Imm-ACK
RIFS

1. NOT receive the Imm-Ack
2. Cannot distinguish out-of-range
transmission and collision
3. Perform backoff retransmission
for collision repeatedly

DEV – 1

PNC

Dev 2 is outside the
range of Dev1 and
vise-versa

1. NOT receive Probe Request
command

DEV - 2

Existing Issues with IEEE 802.15.3











Peer discovery is crucial to piconet
operations.
Standard peer discovery is
unreliable and leads to substantial
delays for unreachable DEV pairs
Full piconet connectivity is not
guaranteed with only direct peerto-peer communications
The standard 802.15.3 MAC does
not take advantage of the unique
ranging capabilities enabled by
UWB
Connections are in peer-to-peer
manner without consider of
possible route optimizations
MAC modeling and performance
evaluation
Stream time scheduling methods
not defined in the standard





DEV_1 cannot communicate with
DEV_4 in peer-to-peer manner
For traffic between DEV_1 and
DEV_3, is it better to forward via
PNC than the direct connection?
What is the optimal path and data
rate between DEV_3 and DEV_5?

Using network layer routing
• Each hop request a
CTA slot seperately.
• PNC treat each hop as
independent traffic
stream

• Effect: Failure in an
intermediate hop
breaks the
connections, but PNC
assumes that an
independent stream is
terminated. Keeps
allocating CTAs for
other hops untill it is
eventually notified by
all participating DEV

Using MAC layer forwarding
• With explicit MAC
layer forwarding,
PNC knows that
these hops belongs
to one connection.
• Better adjusting
downstream and
upstream CTAs.

• Effect: reroute the
traffic is the
intermediate node
fails, and releasing
all CTAs if source
of destination
terminates.

Some Observations
• Peer discover is essential
to piconet operations
and communication
between DEVs
• Full piconet connectivity
cannot be guaranteed
• Some DEV pairs may be
out of range of each
other
• Mac layer routing fails
but is better then IP
routing.

• Remember, 802.15.3 has
centralized topology. So
what ??
• Using PNC, any devices
is two-hop count away
only.
• Can use the central
management capability
to discover simpler and
less costly MAC route

Proposed peer discovery protocol
with forwarding route optimization
• The PNC can always act as a first hop to
connect non-intersecting range DEVs
• However, a betterment can be done in the
frame forwarding by choosing another
DEV closer in distance to the source and
destination to forward the frame.
• All routes are limited to two hops only.

Algorithm
• If the Desti_DEV is reachable, sending PNC
Information Request and Response exchange is
redundant.
• So, Src_DEV send Probe Request command to the
Dest_DEV.
• If Dest_DEV receives the command, it returns an
Imm-ACK after a SIFS and then the Probe Response
command as in standard protocol operations.
• At the same time, the third party, i.e., the PNC, shall
actively monitor the frame exchange.
• Upon receiving a Probe Request, the PNC checks the
destination ID (Dest_ID) field in the MAC header.

Algorithm (2)
• If the Dest_ID is not associated in the piconet, the PNC
send an Imm-ACK to the Src_DEV after SIFS, followed
by a PNC Information command with an empty
Information Element (IE) to notify the source that
destination does not exist.
• Otherwise, instead of ignoring the Probe Request frame,
the PNC waits for the Imm-ACK from the destination
DEV.
• If no Imm-ACK arrives after a backoff inter-frame space
(BIFS), which is the sum of a SIFS and a clear channel
assessment detect time (CCADetectTime), the PNC
realizes that the destination DEV cannot hear the source.
• The PNC then immediately send an Imm-ACK to the
source, followed by a PNC Information command with
the route information. (an optimized route information in
sent)

SRC_DEV send Probe
Request command to
DEST_DEV & PNC listens

SIFS
Imm-ACK

Probe Response command

SIFS (Imm-ACK)

PNC also listen

DEST_DEV
hears?

YES

DEST_DEV
responds

No
No

DEST_DEV
ID
Present?

Yes, Timeout (BIFS)

Send Imm-ACK & route
information to source

Yes and
DEST_DEV sent Imm-ACK

Do Nothing, monitor if
DEST_DEV crash.

Forward the data to
the router node

Algorithm (3)
[Route calculation]
• Most wireless networks today employ a multirate PHY (e.g., UWB in 802.15.3a) that
supports a set of data rate dependent
modulation/coding parameters.
• Due to the extremely low power consumption
requirement of WPAN devices, the achievable
data rate drops dramatically when the
distance increases.
• The data rate can be modeled as a discrete
function of transmission distance d between
two DEVs:

Algorithm (3)
Rate ( d )  S i ;
R i  1  d  R i ;1  i  m
where, R m

1

 0 , R i is the transmiss

and S 1 and S m are the minimum

ion range of rate S i ;

and maximum

data

rates, respective ly. If d is greater th an R 1, then Rate(d)
and the DEVs have no connectivi

ty

0

Algorithm (4)
• Since the PNC can monitor all commands exchanged
during the CAP, it can learn the data rates between
reachable DEV pairs and store them in an n x n rate
matrix (RM), where
• n is the total number of DEVs within the piconet. DEV
is assigned a unique DEV_ID in the piconet
RM ij is the link rate based on the current informatio
obtained

from the commands

DEV i and DEV j . RM

ij

exchanged

 0 if DEV i and DEV

are out of range or the rate informatio
not available

between

yet, and RM

ij

n is

  if i  j .

j

n

Algorithm (5)
• All DEVs transmit with the maximum
allowable power when sending data. Since the
wireless links are symmetric in nature, clearly
RMij = RMji.
• Based on the current rate information stored
in RM, for an unreachable pair DEVi and
DEVj, the PNC can determine the optimal
(two-hop) route that has the minimum
transmission time, i.e., the best route employs
DEVk for MAC layer forwarding, where k
minimizes:

Algorithm (6)
min(

1
RM



ik
k [ 0 , n  1 ]

1
RM

)
kj

• Alleviates the traffic load on the PNC
• Discovers a current optimal two-hop MAC layer
forwarding path given by existing rate information
without introducing any extra overhead
• If the connection is broken, the PNC can
immediately reroute the traffic to a current
optimal path, or terminate the connection by deallocating all corresponding CTAs.

Discussion
• Original case:
Causes
retransmission

• 3PHP: data sent via
2-hop route if
PNC_ID exists

Dest_ID

Dest_ID

• Normal Transmission (Imm_Ack)

• Normal Transmission (Imm_Ack)

XXX FRAME LOST XXXX

PNC_ID

• Causes retransmission

• Sent Via 2–hop route (Imm_Ack)

PNC

Src_DEV
PNC Info. Request command

Probe Request Command

BIFS
Imm-ACK
SIFS

PNC Information command with Route Info.

Imm-ACK

RIFS

Dest_DEV

SIFS

3PHP-Node

DEV – 1

DEV - 2

PNC

Observations
• With 3PHP, peer discovery requires only one
round of frame exchange.
• Fully utilized the broadcast nature,
centralized control, ad-hoc communication,
and efficient peer discovery.
• Save the futile back-off retransmission for
unreachable destination.
• Guaranteed full piconet connectivity. (no
network layer routing required)
• On demand routing
• More then BIFS waiting. (include RIFS) Conclusion

Performance Evaluations
[Intra-piconet no connection probability]
• Intra-piconet no
connection
probability

• Common Overlap
Area function
COLA(R, r, x):
Represent the
intersection of two
circles with radii R
and r (r e R),
respectively, which
centers are
separated by
distance x

Performance Evaluations (2)
[Intra-piconet no connection probability]

Performance Evaluations (3)
[Intra-piconet no connection probability]
• The probability of no direct connection
between two DEVs in a piconet is

Performance Evaluations (4)
[Peer Discovery delay analysis]


# of Frame Transmission




Expected
Contention Time



Expected Packet
Delay

Performance Evaluations (5)
[Peer Discovery delay analysis]


Expected routing
failure probability

• Expected successful peer discovery
delays are given by

Simulation and Numerical Results
• No connection probability as a function of
coverage range ratio

Simulation and Numerical Results (2)
• Peer discovery delay vs. conditional
collision probability

Simulation and Numerical Results (3)
• Piconet peer discovery time vs. coverage
range ratio

Simulation and Numerical Results (4)
• Piconet peer discovery failure probability
with standard method

Simulation and Numerical Results (5)
• Two-hop forwarding route optimization
ratio vs. piconet radius

Simulation and Numerical Results (6)
• Expected data between directly unreachable
pairs in piconets with 20 DEVs

Conclusion
• Underlying fact: peer-to-peer data delivery in
802.15.3 WPANs
• Existing MAC layer peer discovery methods
cannot guarantee full connectivity between
DEVs within a piconet through direct peerto-peer connections if the piconet operates
with a radius larger than half of the
maximum transmission distance. (~ 41.3%)
• If Mac fails, use the expensive network layer
routing.

Conclusion (2)
• Used the central control topology
• Routing in 2-hop with single round of
control frame exchange
• 3PHP achieves 25– 37% faster peer
discovery time over the standard MAC
• Route optimization algorithm in the PNC
to provide the best MAC layer forwarding
routes by self-learning the available rate
information between DEVs.

References


IEEE Standard 802.15.3, “Wireless medium access control (MAC) and physical
layer (PHY) specifications for high rate wireless personal area networks
(WPANs),”Sept. 2003.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery in IEEE 802.15.3 WPANs,”in Proc. IEEE BroadNets2005, Boston, MA,
Oct. 2005.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery and Route Optimization in IEEE 802.15.3WPANs,”accepted for
publication in ACM/KluwerJ. Mobile Networks and Applications, Nov. 2005.



Z. Yin and V.C.M. Leung, “Connection Data Rate Optimization of IEEE 802.15.3
Scatternetswith Multi-rate Carriers,”IEEE ICC’06, Istanbul, Turkey, June 2006.



Zhanping Yin and Victor C.M. Leung, “Introduction to IEEE 802.15.3 High Rate
Wireless Personal Area Network (WPAN)”, Electrical and Computer Engineering
University of British Columbia

Thank You



Slide 49

Third-Party Handshake Protocol for
Efficient Peer Discovery
and Route Optimization in
IEEE 802.15.3 WPANs
Authors:
Zhanping Yin * Victor C. M. Leung
Published:
ACM/ MONET 2006
Presented by:
Gautam S. Thakur

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

WPAN
• A WPAN (wireless personal area network) is a
personal area network - a network for
interconnecting devices centered around an
individual person's workspace
• A very short range ~10 mtrs. E.g. Bluetooth
• Proposed operating frequencies are around
2.4 GHz in digital modes.
• The objective is to facilitate seamless

operation among home or business devices
and systems.

Ultra-Wideband
• A physical layer technology
• For, short distance communication with high
data rate and short transmission range.
• Lower power requirement and pulsed data
• UWB transmission over extremely wide
unlicensed radio spectrum  3.1 – 10.6 GHz.
• Over results in
– Less interference
– Wire-like performance for indoor wireless
environment.

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Overview of 802.15.3
• Why 802.15.3 ?
• The 802.15.3 Wireless Space
• 802.15.3 Overview and Components

Overview of 802.15.3
[Why 802.15.3 ?]
• Motivated by the increasing demand of wireless
communications with






Ubiquitous network connectivity
Low cost and low power consumption -> WPAN
High data rate(HDR)
Quality of Service(QoS) support
Comparison with other short to medium range wireless
technologies
• Wireless LAN (WLAN)
– High cost and power consumption, no hard QoS guarantee

• WPANs-Bluetooth (802.15.1) and ZigBee(802.15.4)
– Data rate too low

• Applications of 802.15.3
– Virtual wireless multimedia connectivity
• Video/audio distribution

– High speed data transfer

Overview of 802.15.3
[ 802.15.3 = Wireless Multimedia ]

Overview of 802.15.3
[ The 802 Wireless Space ]

IEEE 802.15.3 Overview
• High date rate and low
power
• Mainly works within a
piconet with dynamic
DEV membership
• Ad hoc topology with
centralized control by
the PNC
• Connection oriented
peer-to-peer
communications
• Support for multimedia
quality of service(QoS)
• Multiple power
management modes
• Security

Formation of an 802.15.3 piconet
• The basic component
is the DEV
– One DEV is required to
assume the role of the
piconet coordinator
(PNC) of the piconet.
– The PNC provides the
basic timing sync for the
piconet with the beacon.
– Additionally, the PNC
manages the quality of
service (QoS)
requirements, power
save modes and access
control to the piconet.

Formation of an 802.15.3 piconet (2)
• PNC supports ad
hoc peer-to-peer
connections
• PNC provides
timing for
synchronization of
DEVs within the
piconet, performs
admission control,
allocates network
resources etc

Formation of a Piconet (3)
• All DEVs within radio coverage of the PNC
can then associate with it to form a piconet.
• Then starts the peer discovery.
• Some DEV pairs in the piconet may be out of

range of each other, and as a result, direct
peer-to-peer connection is unavailable
between them. This results in network layer
discovery methods

Superframe format
• Timing and data transmissions in the piconet
are based on the superframe
• The superframe has three parts
– Beacon: Control information, Allocates CTA,
Synchronization
– Contention Access Period (CAP): via CSMA/CA, file xfer
– Channel Time Allocation Period (CTAP)

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Peer discovery and connectivity issue
• An 802.15.3 piconet supports ad hoc
communications between peer DEVs.
• Peer discovery is crucial to its operation.
• The DEVs shall be able to obtain information
about the services and capabilities of other
DEVs in the piconet at any time by
information discovery commands.
• Peer information is needed before a source
DEV can send any data to a destination DEV,
or generate channel time requests (CTRq) to
the PNC.

1
2

5

3

4

6

9

7

8

10

13

11

14

12

15

PNC

Src_DEV

Dest_DEV

PNC Info. Request command
SIFS
Imm-ACK

SIFS
PNC Information command
SIFS
Imm-ACK
SIFS

Probe Request Command
SIFS
Imm-ACK
SIFS
Probe Response Command
SIFS
Imm-ACK
RIFS

1. NOT receive the Imm-Ack
2. Cannot distinguish out-of-range
transmission and collision
3. Perform backoff retransmission
for collision repeatedly

DEV – 1

PNC

Dev 2 is outside the
range of Dev1 and
vise-versa

1. NOT receive Probe Request
command

DEV - 2

Existing Issues with IEEE 802.15.3











Peer discovery is crucial to piconet
operations.
Standard peer discovery is
unreliable and leads to substantial
delays for unreachable DEV pairs
Full piconet connectivity is not
guaranteed with only direct peerto-peer communications
The standard 802.15.3 MAC does
not take advantage of the unique
ranging capabilities enabled by
UWB
Connections are in peer-to-peer
manner without consider of
possible route optimizations
MAC modeling and performance
evaluation
Stream time scheduling methods
not defined in the standard





DEV_1 cannot communicate with
DEV_4 in peer-to-peer manner
For traffic between DEV_1 and
DEV_3, is it better to forward via
PNC than the direct connection?
What is the optimal path and data
rate between DEV_3 and DEV_5?

Using network layer routing
• Each hop request a
CTA slot seperately.
• PNC treat each hop as
independent traffic
stream

• Effect: Failure in an
intermediate hop
breaks the
connections, but PNC
assumes that an
independent stream is
terminated. Keeps
allocating CTAs for
other hops untill it is
eventually notified by
all participating DEV

Using MAC layer forwarding
• With explicit MAC
layer forwarding,
PNC knows that
these hops belongs
to one connection.
• Better adjusting
downstream and
upstream CTAs.

• Effect: reroute the
traffic is the
intermediate node
fails, and releasing
all CTAs if source
of destination
terminates.

Some Observations
• Peer discover is essential
to piconet operations
and communication
between DEVs
• Full piconet connectivity
cannot be guaranteed
• Some DEV pairs may be
out of range of each
other
• Mac layer routing fails
but is better then IP
routing.

• Remember, 802.15.3 has
centralized topology. So
what ??
• Using PNC, any devices
is two-hop count away
only.
• Can use the central
management capability
to discover simpler and
less costly MAC route

Proposed peer discovery protocol
with forwarding route optimization
• The PNC can always act as a first hop to
connect non-intersecting range DEVs
• However, a betterment can be done in the
frame forwarding by choosing another
DEV closer in distance to the source and
destination to forward the frame.
• All routes are limited to two hops only.

Algorithm
• If the Desti_DEV is reachable, sending PNC
Information Request and Response exchange is
redundant.
• So, Src_DEV send Probe Request command to the
Dest_DEV.
• If Dest_DEV receives the command, it returns an
Imm-ACK after a SIFS and then the Probe Response
command as in standard protocol operations.
• At the same time, the third party, i.e., the PNC, shall
actively monitor the frame exchange.
• Upon receiving a Probe Request, the PNC checks the
destination ID (Dest_ID) field in the MAC header.

Algorithm (2)
• If the Dest_ID is not associated in the piconet, the PNC
send an Imm-ACK to the Src_DEV after SIFS, followed
by a PNC Information command with an empty
Information Element (IE) to notify the source that
destination does not exist.
• Otherwise, instead of ignoring the Probe Request frame,
the PNC waits for the Imm-ACK from the destination
DEV.
• If no Imm-ACK arrives after a backoff inter-frame space
(BIFS), which is the sum of a SIFS and a clear channel
assessment detect time (CCADetectTime), the PNC
realizes that the destination DEV cannot hear the source.
• The PNC then immediately send an Imm-ACK to the
source, followed by a PNC Information command with
the route information. (an optimized route information in
sent)

SRC_DEV send Probe
Request command to
DEST_DEV & PNC listens

SIFS
Imm-ACK

Probe Response command

SIFS (Imm-ACK)

PNC also listen

DEST_DEV
hears?

YES

DEST_DEV
responds

No
No

DEST_DEV
ID
Present?

Yes, Timeout (BIFS)

Send Imm-ACK & route
information to source

Yes and
DEST_DEV sent Imm-ACK

Do Nothing, monitor if
DEST_DEV crash.

Forward the data to
the router node

Algorithm (3)
[Route calculation]
• Most wireless networks today employ a multirate PHY (e.g., UWB in 802.15.3a) that
supports a set of data rate dependent
modulation/coding parameters.
• Due to the extremely low power consumption
requirement of WPAN devices, the achievable
data rate drops dramatically when the
distance increases.
• The data rate can be modeled as a discrete
function of transmission distance d between
two DEVs:

Algorithm (3)
Rate ( d )  S i ;
R i  1  d  R i ;1  i  m
where, R m

1

 0 , R i is the transmiss

and S 1 and S m are the minimum

ion range of rate S i ;

and maximum

data

rates, respective ly. If d is greater th an R 1, then Rate(d)
and the DEVs have no connectivi

ty

0

Algorithm (4)
• Since the PNC can monitor all commands exchanged
during the CAP, it can learn the data rates between
reachable DEV pairs and store them in an n x n rate
matrix (RM), where
• n is the total number of DEVs within the piconet. DEV
is assigned a unique DEV_ID in the piconet
RM ij is the link rate based on the current informatio
obtained

from the commands

DEV i and DEV j . RM

ij

exchanged

 0 if DEV i and DEV

are out of range or the rate informatio
not available

between

yet, and RM

ij

n is

  if i  j .

j

n

Algorithm (5)
• All DEVs transmit with the maximum
allowable power when sending data. Since the
wireless links are symmetric in nature, clearly
RMij = RMji.
• Based on the current rate information stored
in RM, for an unreachable pair DEVi and
DEVj, the PNC can determine the optimal
(two-hop) route that has the minimum
transmission time, i.e., the best route employs
DEVk for MAC layer forwarding, where k
minimizes:

Algorithm (6)
min(

1
RM



ik
k [ 0 , n  1 ]

1
RM

)
kj

• Alleviates the traffic load on the PNC
• Discovers a current optimal two-hop MAC layer
forwarding path given by existing rate information
without introducing any extra overhead
• If the connection is broken, the PNC can
immediately reroute the traffic to a current
optimal path, or terminate the connection by deallocating all corresponding CTAs.

Discussion
• Original case:
Causes
retransmission

• 3PHP: data sent via
2-hop route if
PNC_ID exists

Dest_ID

Dest_ID

• Normal Transmission (Imm_Ack)

• Normal Transmission (Imm_Ack)

XXX FRAME LOST XXXX

PNC_ID

• Causes retransmission

• Sent Via 2–hop route (Imm_Ack)

PNC

Src_DEV
PNC Info. Request command

Probe Request Command

BIFS
Imm-ACK
SIFS

PNC Information command with Route Info.

Imm-ACK

RIFS

Dest_DEV

SIFS

3PHP-Node

DEV – 1

DEV - 2

PNC

Observations
• With 3PHP, peer discovery requires only one
round of frame exchange.
• Fully utilized the broadcast nature,
centralized control, ad-hoc communication,
and efficient peer discovery.
• Save the futile back-off retransmission for
unreachable destination.
• Guaranteed full piconet connectivity. (no
network layer routing required)
• On demand routing
• More then BIFS waiting. (include RIFS) Conclusion

Performance Evaluations
[Intra-piconet no connection probability]
• Intra-piconet no
connection
probability

• Common Overlap
Area function
COLA(R, r, x):
Represent the
intersection of two
circles with radii R
and r (r e R),
respectively, which
centers are
separated by
distance x

Performance Evaluations (2)
[Intra-piconet no connection probability]

Performance Evaluations (3)
[Intra-piconet no connection probability]
• The probability of no direct connection
between two DEVs in a piconet is

Performance Evaluations (4)
[Peer Discovery delay analysis]


# of Frame Transmission




Expected
Contention Time



Expected Packet
Delay

Performance Evaluations (5)
[Peer Discovery delay analysis]


Expected routing
failure probability

• Expected successful peer discovery
delays are given by

Simulation and Numerical Results
• No connection probability as a function of
coverage range ratio

Simulation and Numerical Results (2)
• Peer discovery delay vs. conditional
collision probability

Simulation and Numerical Results (3)
• Piconet peer discovery time vs. coverage
range ratio

Simulation and Numerical Results (4)
• Piconet peer discovery failure probability
with standard method

Simulation and Numerical Results (5)
• Two-hop forwarding route optimization
ratio vs. piconet radius

Simulation and Numerical Results (6)
• Expected data between directly unreachable
pairs in piconets with 20 DEVs

Conclusion
• Underlying fact: peer-to-peer data delivery in
802.15.3 WPANs
• Existing MAC layer peer discovery methods
cannot guarantee full connectivity between
DEVs within a piconet through direct peerto-peer connections if the piconet operates
with a radius larger than half of the
maximum transmission distance. (~ 41.3%)
• If Mac fails, use the expensive network layer
routing.

Conclusion (2)
• Used the central control topology
• Routing in 2-hop with single round of
control frame exchange
• 3PHP achieves 25– 37% faster peer
discovery time over the standard MAC
• Route optimization algorithm in the PNC
to provide the best MAC layer forwarding
routes by self-learning the available rate
information between DEVs.

References


IEEE Standard 802.15.3, “Wireless medium access control (MAC) and physical
layer (PHY) specifications for high rate wireless personal area networks
(WPANs),”Sept. 2003.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery in IEEE 802.15.3 WPANs,”in Proc. IEEE BroadNets2005, Boston, MA,
Oct. 2005.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery and Route Optimization in IEEE 802.15.3WPANs,”accepted for
publication in ACM/KluwerJ. Mobile Networks and Applications, Nov. 2005.



Z. Yin and V.C.M. Leung, “Connection Data Rate Optimization of IEEE 802.15.3
Scatternetswith Multi-rate Carriers,”IEEE ICC’06, Istanbul, Turkey, June 2006.



Zhanping Yin and Victor C.M. Leung, “Introduction to IEEE 802.15.3 High Rate
Wireless Personal Area Network (WPAN)”, Electrical and Computer Engineering
University of British Columbia

Thank You



Slide 50

Third-Party Handshake Protocol for
Efficient Peer Discovery
and Route Optimization in
IEEE 802.15.3 WPANs
Authors:
Zhanping Yin * Victor C. M. Leung
Published:
ACM/ MONET 2006
Presented by:
Gautam S. Thakur

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

WPAN
• A WPAN (wireless personal area network) is a
personal area network - a network for
interconnecting devices centered around an
individual person's workspace
• A very short range ~10 mtrs. E.g. Bluetooth
• Proposed operating frequencies are around
2.4 GHz in digital modes.
• The objective is to facilitate seamless

operation among home or business devices
and systems.

Ultra-Wideband
• A physical layer technology
• For, short distance communication with high
data rate and short transmission range.
• Lower power requirement and pulsed data
• UWB transmission over extremely wide
unlicensed radio spectrum  3.1 – 10.6 GHz.
• Over results in
– Less interference
– Wire-like performance for indoor wireless
environment.

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Overview of 802.15.3
• Why 802.15.3 ?
• The 802.15.3 Wireless Space
• 802.15.3 Overview and Components

Overview of 802.15.3
[Why 802.15.3 ?]
• Motivated by the increasing demand of wireless
communications with






Ubiquitous network connectivity
Low cost and low power consumption -> WPAN
High data rate(HDR)
Quality of Service(QoS) support
Comparison with other short to medium range wireless
technologies
• Wireless LAN (WLAN)
– High cost and power consumption, no hard QoS guarantee

• WPANs-Bluetooth (802.15.1) and ZigBee(802.15.4)
– Data rate too low

• Applications of 802.15.3
– Virtual wireless multimedia connectivity
• Video/audio distribution

– High speed data transfer

Overview of 802.15.3
[ 802.15.3 = Wireless Multimedia ]

Overview of 802.15.3
[ The 802 Wireless Space ]

IEEE 802.15.3 Overview
• High date rate and low
power
• Mainly works within a
piconet with dynamic
DEV membership
• Ad hoc topology with
centralized control by
the PNC
• Connection oriented
peer-to-peer
communications
• Support for multimedia
quality of service(QoS)
• Multiple power
management modes
• Security

Formation of an 802.15.3 piconet
• The basic component
is the DEV
– One DEV is required to
assume the role of the
piconet coordinator
(PNC) of the piconet.
– The PNC provides the
basic timing sync for the
piconet with the beacon.
– Additionally, the PNC
manages the quality of
service (QoS)
requirements, power
save modes and access
control to the piconet.

Formation of an 802.15.3 piconet (2)
• PNC supports ad
hoc peer-to-peer
connections
• PNC provides
timing for
synchronization of
DEVs within the
piconet, performs
admission control,
allocates network
resources etc

Formation of a Piconet (3)
• All DEVs within radio coverage of the PNC
can then associate with it to form a piconet.
• Then starts the peer discovery.
• Some DEV pairs in the piconet may be out of

range of each other, and as a result, direct
peer-to-peer connection is unavailable
between them. This results in network layer
discovery methods

Superframe format
• Timing and data transmissions in the piconet
are based on the superframe
• The superframe has three parts
– Beacon: Control information, Allocates CTA,
Synchronization
– Contention Access Period (CAP): via CSMA/CA, file xfer
– Channel Time Allocation Period (CTAP)

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Peer discovery and connectivity issue
• An 802.15.3 piconet supports ad hoc
communications between peer DEVs.
• Peer discovery is crucial to its operation.
• The DEVs shall be able to obtain information
about the services and capabilities of other
DEVs in the piconet at any time by
information discovery commands.
• Peer information is needed before a source
DEV can send any data to a destination DEV,
or generate channel time requests (CTRq) to
the PNC.

1
2

5

3

4

6

9

7

8

10

13

11

14

12

15

PNC

Src_DEV

Dest_DEV

PNC Info. Request command
SIFS
Imm-ACK

SIFS
PNC Information command
SIFS
Imm-ACK
SIFS

Probe Request Command
SIFS
Imm-ACK
SIFS
Probe Response Command
SIFS
Imm-ACK
RIFS

1. NOT receive the Imm-Ack
2. Cannot distinguish out-of-range
transmission and collision
3. Perform backoff retransmission
for collision repeatedly

DEV – 1

PNC

Dev 2 is outside the
range of Dev1 and
vise-versa

1. NOT receive Probe Request
command

DEV - 2

Existing Issues with IEEE 802.15.3











Peer discovery is crucial to piconet
operations.
Standard peer discovery is
unreliable and leads to substantial
delays for unreachable DEV pairs
Full piconet connectivity is not
guaranteed with only direct peerto-peer communications
The standard 802.15.3 MAC does
not take advantage of the unique
ranging capabilities enabled by
UWB
Connections are in peer-to-peer
manner without consider of
possible route optimizations
MAC modeling and performance
evaluation
Stream time scheduling methods
not defined in the standard





DEV_1 cannot communicate with
DEV_4 in peer-to-peer manner
For traffic between DEV_1 and
DEV_3, is it better to forward via
PNC than the direct connection?
What is the optimal path and data
rate between DEV_3 and DEV_5?

Using network layer routing
• Each hop request a
CTA slot seperately.
• PNC treat each hop as
independent traffic
stream

• Effect: Failure in an
intermediate hop
breaks the
connections, but PNC
assumes that an
independent stream is
terminated. Keeps
allocating CTAs for
other hops untill it is
eventually notified by
all participating DEV

Using MAC layer forwarding
• With explicit MAC
layer forwarding,
PNC knows that
these hops belongs
to one connection.
• Better adjusting
downstream and
upstream CTAs.

• Effect: reroute the
traffic is the
intermediate node
fails, and releasing
all CTAs if source
of destination
terminates.

Some Observations
• Peer discover is essential
to piconet operations
and communication
between DEVs
• Full piconet connectivity
cannot be guaranteed
• Some DEV pairs may be
out of range of each
other
• Mac layer routing fails
but is better then IP
routing.

• Remember, 802.15.3 has
centralized topology. So
what ??
• Using PNC, any devices
is two-hop count away
only.
• Can use the central
management capability
to discover simpler and
less costly MAC route

Proposed peer discovery protocol
with forwarding route optimization
• The PNC can always act as a first hop to
connect non-intersecting range DEVs
• However, a betterment can be done in the
frame forwarding by choosing another
DEV closer in distance to the source and
destination to forward the frame.
• All routes are limited to two hops only.

Algorithm
• If the Desti_DEV is reachable, sending PNC
Information Request and Response exchange is
redundant.
• So, Src_DEV send Probe Request command to the
Dest_DEV.
• If Dest_DEV receives the command, it returns an
Imm-ACK after a SIFS and then the Probe Response
command as in standard protocol operations.
• At the same time, the third party, i.e., the PNC, shall
actively monitor the frame exchange.
• Upon receiving a Probe Request, the PNC checks the
destination ID (Dest_ID) field in the MAC header.

Algorithm (2)
• If the Dest_ID is not associated in the piconet, the PNC
send an Imm-ACK to the Src_DEV after SIFS, followed
by a PNC Information command with an empty
Information Element (IE) to notify the source that
destination does not exist.
• Otherwise, instead of ignoring the Probe Request frame,
the PNC waits for the Imm-ACK from the destination
DEV.
• If no Imm-ACK arrives after a backoff inter-frame space
(BIFS), which is the sum of a SIFS and a clear channel
assessment detect time (CCADetectTime), the PNC
realizes that the destination DEV cannot hear the source.
• The PNC then immediately send an Imm-ACK to the
source, followed by a PNC Information command with
the route information. (an optimized route information in
sent)

SRC_DEV send Probe
Request command to
DEST_DEV & PNC listens

SIFS
Imm-ACK

Probe Response command

SIFS (Imm-ACK)

PNC also listen

DEST_DEV
hears?

YES

DEST_DEV
responds

No
No

DEST_DEV
ID
Present?

Yes, Timeout (BIFS)

Send Imm-ACK & route
information to source

Yes and
DEST_DEV sent Imm-ACK

Do Nothing, monitor if
DEST_DEV crash.

Forward the data to
the router node

Algorithm (3)
[Route calculation]
• Most wireless networks today employ a multirate PHY (e.g., UWB in 802.15.3a) that
supports a set of data rate dependent
modulation/coding parameters.
• Due to the extremely low power consumption
requirement of WPAN devices, the achievable
data rate drops dramatically when the
distance increases.
• The data rate can be modeled as a discrete
function of transmission distance d between
two DEVs:

Algorithm (3)
Rate ( d )  S i ;
R i  1  d  R i ;1  i  m
where, R m

1

 0 , R i is the transmiss

and S 1 and S m are the minimum

ion range of rate S i ;

and maximum

data

rates, respective ly. If d is greater th an R 1, then Rate(d)
and the DEVs have no connectivi

ty

0

Algorithm (4)
• Since the PNC can monitor all commands exchanged
during the CAP, it can learn the data rates between
reachable DEV pairs and store them in an n x n rate
matrix (RM), where
• n is the total number of DEVs within the piconet. DEV
is assigned a unique DEV_ID in the piconet
RM ij is the link rate based on the current informatio
obtained

from the commands

DEV i and DEV j . RM

ij

exchanged

 0 if DEV i and DEV

are out of range or the rate informatio
not available

between

yet, and RM

ij

n is

  if i  j .

j

n

Algorithm (5)
• All DEVs transmit with the maximum
allowable power when sending data. Since the
wireless links are symmetric in nature, clearly
RMij = RMji.
• Based on the current rate information stored
in RM, for an unreachable pair DEVi and
DEVj, the PNC can determine the optimal
(two-hop) route that has the minimum
transmission time, i.e., the best route employs
DEVk for MAC layer forwarding, where k
minimizes:

Algorithm (6)
min(

1
RM



ik
k [ 0 , n  1 ]

1
RM

)
kj

• Alleviates the traffic load on the PNC
• Discovers a current optimal two-hop MAC layer
forwarding path given by existing rate information
without introducing any extra overhead
• If the connection is broken, the PNC can
immediately reroute the traffic to a current
optimal path, or terminate the connection by deallocating all corresponding CTAs.

Discussion
• Original case:
Causes
retransmission

• 3PHP: data sent via
2-hop route if
PNC_ID exists

Dest_ID

Dest_ID

• Normal Transmission (Imm_Ack)

• Normal Transmission (Imm_Ack)

XXX FRAME LOST XXXX

PNC_ID

• Causes retransmission

• Sent Via 2–hop route (Imm_Ack)

PNC

Src_DEV
PNC Info. Request command

Probe Request Command

BIFS
Imm-ACK
SIFS

PNC Information command with Route Info.

Imm-ACK

RIFS

Dest_DEV

SIFS

3PHP-Node

DEV – 1

DEV - 2

PNC

Observations
• With 3PHP, peer discovery requires only one
round of frame exchange.
• Fully utilized the broadcast nature,
centralized control, ad-hoc communication,
and efficient peer discovery.
• Save the futile back-off retransmission for
unreachable destination.
• Guaranteed full piconet connectivity. (no
network layer routing required)
• On demand routing
• More then BIFS waiting. (include RIFS) Conclusion

Performance Evaluations
[Intra-piconet no connection probability]
• Intra-piconet no
connection
probability

• Common Overlap
Area function
COLA(R, r, x):
Represent the
intersection of two
circles with radii R
and r (r e R),
respectively, which
centers are
separated by
distance x

Performance Evaluations (2)
[Intra-piconet no connection probability]

Performance Evaluations (3)
[Intra-piconet no connection probability]
• The probability of no direct connection
between two DEVs in a piconet is

Performance Evaluations (4)
[Peer Discovery delay analysis]


# of Frame Transmission




Expected
Contention Time



Expected Packet
Delay

Performance Evaluations (5)
[Peer Discovery delay analysis]


Expected routing
failure probability

• Expected successful peer discovery
delays are given by

Simulation and Numerical Results
• No connection probability as a function of
coverage range ratio

Simulation and Numerical Results (2)
• Peer discovery delay vs. conditional
collision probability

Simulation and Numerical Results (3)
• Piconet peer discovery time vs. coverage
range ratio

Simulation and Numerical Results (4)
• Piconet peer discovery failure probability
with standard method

Simulation and Numerical Results (5)
• Two-hop forwarding route optimization
ratio vs. piconet radius

Simulation and Numerical Results (6)
• Expected data between directly unreachable
pairs in piconets with 20 DEVs

Conclusion
• Underlying fact: peer-to-peer data delivery in
802.15.3 WPANs
• Existing MAC layer peer discovery methods
cannot guarantee full connectivity between
DEVs within a piconet through direct peerto-peer connections if the piconet operates
with a radius larger than half of the
maximum transmission distance. (~ 41.3%)
• If Mac fails, use the expensive network layer
routing.

Conclusion (2)
• Used the central control topology
• Routing in 2-hop with single round of
control frame exchange
• 3PHP achieves 25– 37% faster peer
discovery time over the standard MAC
• Route optimization algorithm in the PNC
to provide the best MAC layer forwarding
routes by self-learning the available rate
information between DEVs.

References


IEEE Standard 802.15.3, “Wireless medium access control (MAC) and physical
layer (PHY) specifications for high rate wireless personal area networks
(WPANs),”Sept. 2003.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery in IEEE 802.15.3 WPANs,”in Proc. IEEE BroadNets2005, Boston, MA,
Oct. 2005.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery and Route Optimization in IEEE 802.15.3WPANs,”accepted for
publication in ACM/KluwerJ. Mobile Networks and Applications, Nov. 2005.



Z. Yin and V.C.M. Leung, “Connection Data Rate Optimization of IEEE 802.15.3
Scatternetswith Multi-rate Carriers,”IEEE ICC’06, Istanbul, Turkey, June 2006.



Zhanping Yin and Victor C.M. Leung, “Introduction to IEEE 802.15.3 High Rate
Wireless Personal Area Network (WPAN)”, Electrical and Computer Engineering
University of British Columbia

Thank You



Slide 51

Third-Party Handshake Protocol for
Efficient Peer Discovery
and Route Optimization in
IEEE 802.15.3 WPANs
Authors:
Zhanping Yin * Victor C. M. Leung
Published:
ACM/ MONET 2006
Presented by:
Gautam S. Thakur

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

WPAN
• A WPAN (wireless personal area network) is a
personal area network - a network for
interconnecting devices centered around an
individual person's workspace
• A very short range ~10 mtrs. E.g. Bluetooth
• Proposed operating frequencies are around
2.4 GHz in digital modes.
• The objective is to facilitate seamless

operation among home or business devices
and systems.

Ultra-Wideband
• A physical layer technology
• For, short distance communication with high
data rate and short transmission range.
• Lower power requirement and pulsed data
• UWB transmission over extremely wide
unlicensed radio spectrum  3.1 – 10.6 GHz.
• Over results in
– Less interference
– Wire-like performance for indoor wireless
environment.

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Overview of 802.15.3
• Why 802.15.3 ?
• The 802.15.3 Wireless Space
• 802.15.3 Overview and Components

Overview of 802.15.3
[Why 802.15.3 ?]
• Motivated by the increasing demand of wireless
communications with






Ubiquitous network connectivity
Low cost and low power consumption -> WPAN
High data rate(HDR)
Quality of Service(QoS) support
Comparison with other short to medium range wireless
technologies
• Wireless LAN (WLAN)
– High cost and power consumption, no hard QoS guarantee

• WPANs-Bluetooth (802.15.1) and ZigBee(802.15.4)
– Data rate too low

• Applications of 802.15.3
– Virtual wireless multimedia connectivity
• Video/audio distribution

– High speed data transfer

Overview of 802.15.3
[ 802.15.3 = Wireless Multimedia ]

Overview of 802.15.3
[ The 802 Wireless Space ]

IEEE 802.15.3 Overview
• High date rate and low
power
• Mainly works within a
piconet with dynamic
DEV membership
• Ad hoc topology with
centralized control by
the PNC
• Connection oriented
peer-to-peer
communications
• Support for multimedia
quality of service(QoS)
• Multiple power
management modes
• Security

Formation of an 802.15.3 piconet
• The basic component
is the DEV
– One DEV is required to
assume the role of the
piconet coordinator
(PNC) of the piconet.
– The PNC provides the
basic timing sync for the
piconet with the beacon.
– Additionally, the PNC
manages the quality of
service (QoS)
requirements, power
save modes and access
control to the piconet.

Formation of an 802.15.3 piconet (2)
• PNC supports ad
hoc peer-to-peer
connections
• PNC provides
timing for
synchronization of
DEVs within the
piconet, performs
admission control,
allocates network
resources etc

Formation of a Piconet (3)
• All DEVs within radio coverage of the PNC
can then associate with it to form a piconet.
• Then starts the peer discovery.
• Some DEV pairs in the piconet may be out of

range of each other, and as a result, direct
peer-to-peer connection is unavailable
between them. This results in network layer
discovery methods

Superframe format
• Timing and data transmissions in the piconet
are based on the superframe
• The superframe has three parts
– Beacon: Control information, Allocates CTA,
Synchronization
– Contention Access Period (CAP): via CSMA/CA, file xfer
– Channel Time Allocation Period (CTAP)

Presentation Topics
1. Definitions and Terminologies
2. Knowing IEEE 802.15.3
3. Current Standards for Peer Discovery in IEEE
802.15.3
4. Issues and roadblocks
1.
2.

Peer Discovery and connectivity
Ad hoc routing vs. MAC Layer forwarding

5. Proposed Peer Discovery protocol with forwarding
route optimization (FRO)
6. Performance Evaluations
1.
2.

Intra-piconet no connection probability
Peer discovery delay analysis

7. Simulations and numerical results
8. Conclusion and future goals

Peer discovery and connectivity issue
• An 802.15.3 piconet supports ad hoc
communications between peer DEVs.
• Peer discovery is crucial to its operation.
• The DEVs shall be able to obtain information
about the services and capabilities of other
DEVs in the piconet at any time by
information discovery commands.
• Peer information is needed before a source
DEV can send any data to a destination DEV,
or generate channel time requests (CTRq) to
the PNC.

1
2

5

3

4

6

9

7

8

10

13

11

14

12

15

PNC

Src_DEV

Dest_DEV

PNC Info. Request command
SIFS
Imm-ACK

SIFS
PNC Information command
SIFS
Imm-ACK
SIFS

Probe Request Command
SIFS
Imm-ACK
SIFS
Probe Response Command
SIFS
Imm-ACK
RIFS

1. NOT receive the Imm-Ack
2. Cannot distinguish out-of-range
transmission and collision
3. Perform backoff retransmission
for collision repeatedly

DEV – 1

PNC

Dev 2 is outside the
range of Dev1 and
vise-versa

1. NOT receive Probe Request
command

DEV - 2

Existing Issues with IEEE 802.15.3











Peer discovery is crucial to piconet
operations.
Standard peer discovery is
unreliable and leads to substantial
delays for unreachable DEV pairs
Full piconet connectivity is not
guaranteed with only direct peerto-peer communications
The standard 802.15.3 MAC does
not take advantage of the unique
ranging capabilities enabled by
UWB
Connections are in peer-to-peer
manner without consider of
possible route optimizations
MAC modeling and performance
evaluation
Stream time scheduling methods
not defined in the standard





DEV_1 cannot communicate with
DEV_4 in peer-to-peer manner
For traffic between DEV_1 and
DEV_3, is it better to forward via
PNC than the direct connection?
What is the optimal path and data
rate between DEV_3 and DEV_5?

Using network layer routing
• Each hop request a
CTA slot seperately.
• PNC treat each hop as
independent traffic
stream

• Effect: Failure in an
intermediate hop
breaks the
connections, but PNC
assumes that an
independent stream is
terminated. Keeps
allocating CTAs for
other hops untill it is
eventually notified by
all participating DEV

Using MAC layer forwarding
• With explicit MAC
layer forwarding,
PNC knows that
these hops belongs
to one connection.
• Better adjusting
downstream and
upstream CTAs.

• Effect: reroute the
traffic is the
intermediate node
fails, and releasing
all CTAs if source
of destination
terminates.

Some Observations
• Peer discover is essential
to piconet operations
and communication
between DEVs
• Full piconet connectivity
cannot be guaranteed
• Some DEV pairs may be
out of range of each
other
• Mac layer routing fails
but is better then IP
routing.

• Remember, 802.15.3 has
centralized topology. So
what ??
• Using PNC, any devices
is two-hop count away
only.
• Can use the central
management capability
to discover simpler and
less costly MAC route

Proposed peer discovery protocol
with forwarding route optimization
• The PNC can always act as a first hop to
connect non-intersecting range DEVs
• However, a betterment can be done in the
frame forwarding by choosing another
DEV closer in distance to the source and
destination to forward the frame.
• All routes are limited to two hops only.

Algorithm
• If the Desti_DEV is reachable, sending PNC
Information Request and Response exchange is
redundant.
• So, Src_DEV send Probe Request command to the
Dest_DEV.
• If Dest_DEV receives the command, it returns an
Imm-ACK after a SIFS and then the Probe Response
command as in standard protocol operations.
• At the same time, the third party, i.e., the PNC, shall
actively monitor the frame exchange.
• Upon receiving a Probe Request, the PNC checks the
destination ID (Dest_ID) field in the MAC header.

Algorithm (2)
• If the Dest_ID is not associated in the piconet, the PNC
send an Imm-ACK to the Src_DEV after SIFS, followed
by a PNC Information command with an empty
Information Element (IE) to notify the source that
destination does not exist.
• Otherwise, instead of ignoring the Probe Request frame,
the PNC waits for the Imm-ACK from the destination
DEV.
• If no Imm-ACK arrives after a backoff inter-frame space
(BIFS), which is the sum of a SIFS and a clear channel
assessment detect time (CCADetectTime), the PNC
realizes that the destination DEV cannot hear the source.
• The PNC then immediately send an Imm-ACK to the
source, followed by a PNC Information command with
the route information. (an optimized route information in
sent)

SRC_DEV send Probe
Request command to
DEST_DEV & PNC listens

SIFS
Imm-ACK

Probe Response command

SIFS (Imm-ACK)

PNC also listen

DEST_DEV
hears?

YES

DEST_DEV
responds

No
No

DEST_DEV
ID
Present?

Yes, Timeout (BIFS)

Send Imm-ACK & route
information to source

Yes and
DEST_DEV sent Imm-ACK

Do Nothing, monitor if
DEST_DEV crash.

Forward the data to
the router node

Algorithm (3)
[Route calculation]
• Most wireless networks today employ a multirate PHY (e.g., UWB in 802.15.3a) that
supports a set of data rate dependent
modulation/coding parameters.
• Due to the extremely low power consumption
requirement of WPAN devices, the achievable
data rate drops dramatically when the
distance increases.
• The data rate can be modeled as a discrete
function of transmission distance d between
two DEVs:

Algorithm (3)
Rate ( d )  S i ;
R i  1  d  R i ;1  i  m
where, R m

1

 0 , R i is the transmiss

and S 1 and S m are the minimum

ion range of rate S i ;

and maximum

data

rates, respective ly. If d is greater th an R 1, then Rate(d)
and the DEVs have no connectivi

ty

0

Algorithm (4)
• Since the PNC can monitor all commands exchanged
during the CAP, it can learn the data rates between
reachable DEV pairs and store them in an n x n rate
matrix (RM), where
• n is the total number of DEVs within the piconet. DEV
is assigned a unique DEV_ID in the piconet
RM ij is the link rate based on the current informatio
obtained

from the commands

DEV i and DEV j . RM

ij

exchanged

 0 if DEV i and DEV

are out of range or the rate informatio
not available

between

yet, and RM

ij

n is

  if i  j .

j

n

Algorithm (5)
• All DEVs transmit with the maximum
allowable power when sending data. Since the
wireless links are symmetric in nature, clearly
RMij = RMji.
• Based on the current rate information stored
in RM, for an unreachable pair DEVi and
DEVj, the PNC can determine the optimal
(two-hop) route that has the minimum
transmission time, i.e., the best route employs
DEVk for MAC layer forwarding, where k
minimizes:

Algorithm (6)
min(

1
RM



ik
k [ 0 , n  1 ]

1
RM

)
kj

• Alleviates the traffic load on the PNC
• Discovers a current optimal two-hop MAC layer
forwarding path given by existing rate information
without introducing any extra overhead
• If the connection is broken, the PNC can
immediately reroute the traffic to a current
optimal path, or terminate the connection by deallocating all corresponding CTAs.

Discussion
• Original case:
Causes
retransmission

• 3PHP: data sent via
2-hop route if
PNC_ID exists

Dest_ID

Dest_ID

• Normal Transmission (Imm_Ack)

• Normal Transmission (Imm_Ack)

XXX FRAME LOST XXXX

PNC_ID

• Causes retransmission

• Sent Via 2–hop route (Imm_Ack)

PNC

Src_DEV
PNC Info. Request command

Probe Request Command

BIFS
Imm-ACK
SIFS

PNC Information command with Route Info.

Imm-ACK

RIFS

Dest_DEV

SIFS

3PHP-Node

DEV – 1

DEV - 2

PNC

Observations
• With 3PHP, peer discovery requires only one
round of frame exchange.
• Fully utilized the broadcast nature,
centralized control, ad-hoc communication,
and efficient peer discovery.
• Save the futile back-off retransmission for
unreachable destination.
• Guaranteed full piconet connectivity. (no
network layer routing required)
• On demand routing
• More then BIFS waiting. (include RIFS) Conclusion

Performance Evaluations
[Intra-piconet no connection probability]
• Intra-piconet no
connection
probability

• Common Overlap
Area function
COLA(R, r, x):
Represent the
intersection of two
circles with radii R
and r (r e R),
respectively, which
centers are
separated by
distance x

Performance Evaluations (2)
[Intra-piconet no connection probability]

Performance Evaluations (3)
[Intra-piconet no connection probability]
• The probability of no direct connection
between two DEVs in a piconet is

Performance Evaluations (4)
[Peer Discovery delay analysis]


# of Frame Transmission




Expected
Contention Time



Expected Packet
Delay

Performance Evaluations (5)
[Peer Discovery delay analysis]


Expected routing
failure probability

• Expected successful peer discovery
delays are given by

Simulation and Numerical Results
• No connection probability as a function of
coverage range ratio

Simulation and Numerical Results (2)
• Peer discovery delay vs. conditional
collision probability

Simulation and Numerical Results (3)
• Piconet peer discovery time vs. coverage
range ratio

Simulation and Numerical Results (4)
• Piconet peer discovery failure probability
with standard method

Simulation and Numerical Results (5)
• Two-hop forwarding route optimization
ratio vs. piconet radius

Simulation and Numerical Results (6)
• Expected data between directly unreachable
pairs in piconets with 20 DEVs

Conclusion
• Underlying fact: peer-to-peer data delivery in
802.15.3 WPANs
• Existing MAC layer peer discovery methods
cannot guarantee full connectivity between
DEVs within a piconet through direct peerto-peer connections if the piconet operates
with a radius larger than half of the
maximum transmission distance. (~ 41.3%)
• If Mac fails, use the expensive network layer
routing.

Conclusion (2)
• Used the central control topology
• Routing in 2-hop with single round of
control frame exchange
• 3PHP achieves 25– 37% faster peer
discovery time over the standard MAC
• Route optimization algorithm in the PNC
to provide the best MAC layer forwarding
routes by self-learning the available rate
information between DEVs.

References


IEEE Standard 802.15.3, “Wireless medium access control (MAC) and physical
layer (PHY) specifications for high rate wireless personal area networks
(WPANs),”Sept. 2003.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery in IEEE 802.15.3 WPANs,”in Proc. IEEE BroadNets2005, Boston, MA,
Oct. 2005.



Z. Yin and V.C.M. Leung, “Third-Party Handshake Protocol for Efficient Peer
Discovery and Route Optimization in IEEE 802.15.3WPANs,”accepted for
publication in ACM/KluwerJ. Mobile Networks and Applications, Nov. 2005.



Z. Yin and V.C.M. Leung, “Connection Data Rate Optimization of IEEE 802.15.3
Scatternetswith Multi-rate Carriers,”IEEE ICC’06, Istanbul, Turkey, June 2006.



Zhanping Yin and Victor C.M. Leung, “Introduction to IEEE 802.15.3 High Rate
Wireless Personal Area Network (WPAN)”, Electrical and Computer Engineering
University of British Columbia

Thank You