You are currently viewing a new version of our website. To view the old version click .
Sensors
  • Article
  • Open Access

23 December 2014

Analysis of Latency Performance of Bluetooth Low Energy (BLE) Networks

,
,
,
,
,
and
1
School of Computer Science and Engineering, Kyungpook National University, Daegu 702-701, Korea
2
Software R&D Center, Samsung Electronics Co., Ltd., Suwon 443-742, Korea
*
Author to whom correspondence should be addressed.
This article belongs to the Special Issue Wireless Sensor Networks and the Internet of Things

Abstract

Bluetooth Low Energy (BLE) is a short-range wireless communication technology aiming at low-cost and low-power communication. The performance evaluation of classical Bluetooth device discovery have been intensively studied using analytical modeling and simulative methods, but these techniques are not applicable to BLE, since BLE has a fundamental change in the design of the discovery mechanism, including the usage of three advertising channels. Recently, there several works have analyzed the topic of BLE device discovery, but these studies are still far from thorough. It is thus necessary to develop a new, accurate model for the BLE discovery process. In particular, the wide range settings of the parameters introduce lots of potential for BLE devices to customize their discovery performance. This motivates our study of modeling the BLE discovery process and performing intensive simulation. This paper is focused on building an analytical model to investigate the discovery probability, as well as the expected discovery latency, which are then validated via extensive experiments. Our analysis considers both continuous and discontinuous scanning modes. We analyze the sensitivity of these performance metrics to parameter settings to quantitatively examine to what extent parameters influence the performance metric of the discovery processes.

1. Introduction

Bluetooth Low Energy (BLE) is a new wireless communication technology for short-range communication with enhanced low-cost and low-power properties. A major and fundamental change has been made in the BLE radio architecture to enable short-range communication in BLE [14]. BLE has a very low power consumption rate with a similar communication range. Devices that use BLE for communication are normally powered by coin-cell batteries and it can be operated for months and even for years [1,2].

BLE technology provides support of novel data transfer functionality and hence it can be used in sensor technologies for transmitting bulk data [3]. The BLE technology offers a more advanced and robust connectivity by re-establishing the connections with the devices once they come back into the range of each other. This novel data transfer functionality make BLE more favorable for short-range communication in wireless sensor networks.

Recently, most technologies are using the ISM band for communication and hence it has become more congested and crowded, therefore, BLE uses a frequency-hopping mechanism in both its advertising and data channels to avoid congestion during communication. The classical Bluetooth has 79 channels, each of which has a width of 1 MHz, while the BLE is designed to operate on 2.4 GHz ISM band using 40 channels, each with a width of 2 MHz. Out of these 40 channels, three channels, that is channels number 37, 38, and 39, are used for broadcasting purposes, i.e., device discovery, etc., and the remaining 37 channels are responsible for data transmission. The device discovery process is more simplified by designing a concise state-machine which also helps in supporting the power saving functionality [3,5].

These properties of BLE make it more favorable for short-range communication technologies. The Bluetooth Special Interest Group (SIG) recommended a number of markets for BLE technology such as Body Area Networks (BAN) and Internet of Things (IoT), these includes automotive, consumer electronics, health issues and wellness, sports activities and fitness, and smart homes [6].

Since BLE is developed for these short-range wireless applications, a fast and convenient discovery process becomes as one of the important feature which can be addressed and attached to the existing BLE technologies. The BLE standard clearly elaborated and published the communication process but many areas still need to be studied and researched such as the device discovery latency and energy efficiency of the system [4]. The BLE technology recommended a wide range of parameter settings for the device discovery mechanism and its proper tuning to balance and optimize the performance for a wide range of applications in context of latency and energy consumption [3].

Keeping these challenges in mind, this paper focuses on the discovery process of BLE networks, and an analytical model is proposed to investigate the discovery probability, as well as expected discovery latency, which are then validated via extensive simulation experiments. In addition, we also analyze the sensitivity of those performance metrics to quantitatively evaluate to what extent parameter setting would influence the performance metrics.

The rest of this paper is organized as follows: related work covering the classical Bluetooth standards and BLE device discovery process is presented in Section 2. A comprehensive detailed overview of BLE and its discovery mechanism are provided in Section 3. An analytical model for the BLE process is presented in Section 4. Section 5 validates our model, and finally conclusions are given in Section 6.

3. Background of BLE Discovery

3.1. Operation of BLE

A BLE device may operate in three different modes depending on required functionality: advertising, scanning and initiating, as shown in Figure 1. A device in advertising mode, named advertiser, periodically transmits advertising information in three advertising channels (index = 37, 38, 39) [3]. As shown in Figure 1a, an advertiser keeps sending ADV_IND Packet Data Units (PDUs) in sequence over each of the three advertising channels in advertising event, which is composed by a fixed AdvInterval (hereafter denoted by τAI) and a pseudo-random AdvDelay (hereafter denoted by δ) generated by the Link Layer [2,3]. The random variety AdvDelay to the advertising interval is used to separate the advertisement interval when two or more advertisers are getting close [3]. Since BLE advertisers set the time randomly between consecutive advertising PDUs, advertisings on the three channels become completely asynchronous, then the successful advertising probability will reach an optimum value [3,11]. If all advertisers are set with the same advertising interval between consecutive advertising PDUs, then collisions on the first channel will pass to the second and the third channels [3,11].

Figure 1. Advertising and scanning process for device discovery [5]. (a) Advertising process; (b) Scanning process.

Generally, there are two kinds of advertising events for BLE: undirected and directed. The undirected advertising event contains ADV_IND, which is used for detecting unknown devices yet allows different responses [11]. Different from undirected events, the directed advertising event is used for establishing connections with already known devices. It contains just one PDU type ADV_DIRECT_IND, and has no defined random delay between advertising events [11]. According to the standard, the AdvInterval should be an integer multiple of 0.625 ms in the range of 20 ms to 10.24 s, the AdvDelay should be within the range of 0 ms to 10 ms. According to the specification, an advertisement period for each channel (denoted by τWA) shall be less than or equal to 10 ms [11]. After each sending of the advertising packets, the advertiser will be listening on the same channel for a while to check if there is a response coming from any scanner [4].

On the other hand, a BLE device in scanning mode, named scanner, periodically scans the advertising channels and listens to advertising information of advertisers [5]. On receiving an advertising channel packet, the scanner will send back a response. As shown in Figure 1b, by each ScanInterval (denoted by τSI) the scanner scans on a different advertising channel for the duration of ScanWindow (denoted by τSW) [5]. According to the standard, the ScanInterval and ScanWindow should be less than or equal to 10.24 s. Table 1 shows the list of major timing parameters specified in BLE standard.

Table 1. List of major timing parameters.

The scanner shares a similar process except that they can only respond to specific types of advertising packets. For example, the scanner responds to ADV_SCAN_IND PDU by transmitting a SCAN_REQ to request additional information of the advertiser. If the advertiser receives a SCAN_REQ that contains its device address from a scanner allowed by the advertising filter policy, it shall reply with SCAN_RSP PDU on the same advertising channel index [2,5]. Hereinafter, however, we generically refer to both ADV_SCAN_IND and ADV_DIRECT_IND just as “ADV_IND” since the distinction between them is irrelevant to our analysis. In addition, since multiple scanners may respond to an advertiser simultaneously, back-off procedures are used by each scanner to minimize collision [5].

3.2. Types of BLE PDU

Some details about packets related to discovery are presented in terms of the format and the length, which are important factors for discovery analysis. A BLE link layer packet has four components: preamble, access address, PDU and Cyclic Redundancy Check (CRC). The PDU has different types, and is further composed of a header and a payload. The packet length is decided by the length of the payload, ranging from 0 octets to 37 octets [3].

As previously described, the advertiser sends an ADV_IND over each advertising channel and is listening on the same channel to respond to SCAN_REQ from any scanner. The scanning procedure is defined as an operation where the scanner replies a SCAN_REQ PDU upon receiving an ADV_IND from the advertiser on the same advertising channel. The time needed for handshaking control messages in the scanning procedure is denoted by TS (=TSCAN_REQ + TSCAN_RSP + 2TIFS) as shown in Figure 2. Figure 2 shows the list of PDU transmission times and handshaking times for exchanging control messages between the advertiser and the scanner for device discovery, which are derived from the length of each PDU over bit rate (1 Mbps).

Figure 2. Control messages for discovery process and their transmission times.

4. Analytical Model

We investigate the performance of the BLE device discovery from the perspective of theoretical model in full accordance with the BLE specification to investigate performance metrics. We first present an analytical model for the probability of device discovery, which will be used as a basis to derive an analytical model for mean discovery latency. The sensitivity index is evaluated to what extent parameter settings influence those performance metrics. The proposed analytical analysis is derived on investigating the cases where a particular pair of the advertiser and scanner (called A1 and S1) successfully discover each other and establish a connection between them. Different from other wireless networks, BLE exploits three advertising channels and employs tiny-sized frames, and advertisers do not examine the channel state before transmission, that is, the medium is accessed in a completely unsynchronized manner [4].

According to BLE standard, an advertiser sends an ADV_IND at the beginning of each advertising period (denoted by τWA) per advertising channel. The advertiser changes its advertising channel in a circular way (37→38→39→37…) with a period of τWA, and the scanner also changes its scanning channel in the same way every ScanInterval (with a period of τSI). We consider both continuous and discontinuous scanning modes to build analytical models. In the continuous scanning mode, BLE device scans each advertising channel without sleeping (therefore, τSW = τSI) as shown in Figure 3. On the contrary, the discontinuous scanning refers to a mode in which BLE device alternatively repeats scanning and sleeping every ScanInterval. So, τSW should be shorter than τSI in the discontinuous scanning mode as illustrated in Figure 3. We introduce a duty cycle to express how long a BLE device spends time on scanning process during a given ScanInterval. The duty cycle is defined as the proportion of time during which a BLE device is waking up for scanning, and is denoted by ρ = τSWSI. There is no doubt that 0 ≤ ρ ≤ 1. In particular, ρ becomes equal to one in the continuous scanning mode.

Figure 3. Continuous scanning (τSI = τSW) and discontinuous scanning (τSI > τSW) (a) A continuous scanning without sleeping (τSI = τSW); (b) Discontinuous scanning (τSI > τSW).

It should be noted that τWA is usually much longer than the handshaking time needed to exchange control packets for discovery. For example, the advertiser spends about 0.6 ms to exchange SCAN_REQ and SCAN_RSP between any scanner on each advertising channel for device discovery, so we can assume that the advertiser A1 has enough time to exchange control packets after sending an ADV_IND to successfully discover S1 and establish a connection.

4.1. Probability of Successful Discovery

We define six events to clearly express under what conditions advertiser A1 can successfully discover S1, as listed in Table 2. Using these events, we can derive situations where A1 can successfully discover S1.

Table 2. Events used for analysis of the device discovery process.

4.1.1. 1:1 Network

In order to clearly elaborate the proposed analytical model, considering a network, in which one device acts as an advertiser and other works as a scanner. For successful discovery, the advertiser should rendezvous with the scanner at one of three advertising channels (37, 38, and 39). This case can be expressed by E1 ∩ E4 using events in Table 2.

At the same time, the scanner should have a sufficient residual time to interact with the advertiser by handshaking of control messages after receiving an ADV_IND, so the advertiser can successfully discover the scanner if the following case is satisfied as shown in Figure 4.

Figure 4. Case (E1 ∩ E4) for successful discovery in 1:1 network.

The probability that the scanner rendezvous with the advertiser on receipt of the first ADV_IND is given by C 3 1 ( 1 3 ) 2 C 3 1 is the probability of selecting a specific channel out of three channels (37, 38 and 39). Assuming that the scanner receives the first ADV_IND at an arbitrary time instance of t0, the residual time until completion of ScanWindow is given by (τSWt0). For successful discovery, the scanner should reply to ADV_IND with a SCAN_REQ message and should receive a SCAN_RSP from the advertiser within the residual time. In other words, the scanner should have a sufficient residual time greater than TS (=TSCAN_REQ + TSCAN_RSP + 2TIFS) until completion of ScanWindow for exchanging control messages with the advertiser. The probability that there is sufficient residual time is given by τ S W T S τ S I under assumption of continuous scanning scenario. So, we have the probability of successful discovery on the first advertising channel α1,by:

α 1 = PROB ( E 1 E 4 ) = C 3 1 ( 1 3 ) 2 { ρ ( T S τ S I ) }

Since the advertiser sends another ADV_IND on the next advertising channel after a duration of τWA, the scanner receives the second ADV_IND att0 + τWA, so, the residual time for the second ADV_IND until completion of ScanWindow is (a τSI + τSWt0 − τWA) where a = τ W A τ S I (⌊x⌋ means the largest integer not greater than x) as shown in Figure 4. The probability that the scanner has enough time for handshaking control messages for the second ADV_IND until completion of ScanWindow is given by ( a τ S I + τ S W τ W A T S τ S I ). Since the probability that the scanner rendezvous with the advertiser on receipt of the second ADV_IND is given by C 3 1 ( 1 3 ) 2, we have the probability of discovery successful on the second advertising channel by:

α 2 = ( 1 3 ) ( a + ρ τ W A τ S I T S τ S I )

Similarly, the arrival time of the third ADV_IND at the scanner is t0 + 2τWA, and thus the residual time for the third ADV_IND until completion of the ScanWindow is given by (bτSI + τSWt0 − 2τWA) where b = 2 τ W A τ S I . Thus, we have the probability of discovery successful on the third advertising channel by:

α 3 = ( 1 3 ) ( b + ρ 2 τ W A τ S I T S τ S I )

We can rewrite Equations (1)(3) into a more compact form as follows:

α k = ( 1 3 ) ( ( k 1 ) τ W A τ S I + ρ ( k 1 ) τ W A τ S I T S τ S I ) , ( k = 1 , 2 , 3 )

If τSI = τWA, we can see that α1 = α2 = α3 from Equation (4).

4.1.2. 1:2 Networks

Assume that there are three BLE devices in the network, and one device acts as an advertiser and the other two (called S1 and S2) work as scanners. In this case, the advertiser can successfully discover the scanner S1 if one of the following cases is satisfied as shown in Figure 5:

Figure 5. Cases for successful discovery in 1:2 networks (a) Case 2 (E1 ∩ E2 ∩ E4)); (b) Case 3 ( E 1 E 2 ¯ E 4 E 5).

We can easily get the probability of case 2 by:

PROB ( E 1 E 2 E 4 ) = C 3 1 ( 1 3 ) 2 ( 2 3 ) { ρ ( T S τ S W ) }

The advertiser and two scanners can rendezvous at one of three advertising channels with a probability of C 3 1 ( 1 3 ) 3. The probability that only S1 has a sufficient residual time for handshaking control messages is given by τ S W τ S τ S I. And, the probability that S2 cannot send any message since its residual time is shorter than TS is given by ( T IFS τ S I ). So, we get the probability of case 3 by:

PROB ( E 1 E 2 ¯ E 4 E 5 ) = C 3 1 ( 1 3 ) 3 ( τ S W T S τ S I ) ( T IFS τ S I )
where E 2 ¯ means the complementary event of E2.

Now, we have:

α k = ( 1 3 ) 2 ( ( k 1 ) τ W A τ S I + ρ ( k 1 ) τ W A τ S I T S τ S I ) ( 3 ρ + T IFS τ S I ) ( k = 1 , 2 , 3 )
where a = τ W A τ S I and b = 2 τ W A τ S I as previously defined.

4.1.3. M:N Network

Now, we inspect a more general case for a network with (N+M) BLE devices, where M devices (called A1, A2, …, AM) act as advertisers and the other N devices (called S1, S2, …, SN) work as scanners. In this case, the advertiser A1 can successfully discover S1 if one of four cases shown in Figure 6 is satisfied.

Figure 6. Cases for successful discovery in M:N network. (a) Case 4 (E1 ∩ E2 ∩ E3 ∩ E4); (b) Case 5 ( E 1 E 2 ¯ E 3 E 4 E 5); (c) Case 6 ( E 1 E 2 E 3 ¯ E 4 E 6); (d) Case 7 ( E 1 E 2 ¯ E 3 ¯ E 4 E 5 E 6).

In the same way as previously, we get:

PROB ( E 1 E 2 E 3 E 4 ) = C 3 1 ( 1 3 ) 2 ( 2 3 ) M + N 2 ( τ S W T S τ S I ) = ( 1 3 ) ( 2 3 ) M + N 2 ( ρ T S τ S I ) PROB ( E 1 E 2 ¯ E 3 E 4 E 5 ) = C 3 1 ( 1 3 ) 2 ( 2 3 ) M 1 ( τ S W T S τ S I ) { k = 1 N 1 C N 1 k ( 1 3 ) k ( τ S I τ S W T IFS τ S I ) k ( 2 3 ) N 1 k } = ( 1 3 ) N ( 2 3 ) M 1 ( ρ T S τ S I ) [ ( 3 ρ + T IFS τ S I ) N 1 2 N 1 ]
PROB ( E 1 E 2 E 3 ¯ E 4 E 6 ) = C 3 1 ( 1 3 ) 2 ( 2 3 ) N 1 ( τ S W T S τ S I ) { k = 1 M 1 C M 1 k ( 1 3 ) k ( τ S I 2 T S τ S I ) k ( 2 3 ) M 1 k } = ( 1 3 ) M ( 2 3 ) N 1 ( ρ T S τ S I ) [ ( 3 2 T S τ S I ) M 1 2 M 1 ]
PROB ( E 1 E 2 ¯ E 3 ¯ E 4 E 5 E 6 ) = C 3 1 ( 1 3 ) 2 ( τ S W T S τ S I ) { k = 1 M 1 C M 1 k ( 1 3 ) k ( τ S I 2 T S τ S I ) k ( 2 3 ) M 1 k } { k = 1 N 1 C N 1 k ( 1 3 ) k ( τ S I τ S W + T IFS τ S I ) k ( 2 3 ) N 1 k }
= ( 1 3 ) M + N 1 ( ρ T S τ S I ) [ ( 3 2 T S τ S I ) M 1 2 M 1 ] [ ( 3 ρ + T IFS τ S I ) N 1 2 N 1 ]

Summing Equations (8)(11), we have the probability of successful discovery on the first advertising channel by:

α 1 = ( 1 3 ) M + N 1 ( ρ T S τ S I ) ( 3 2T S τ S I ) M 1 ( 3 ρ + T IFS τ S I ) N 1

The above equation becomes identical to Equation (4), by substitute M = 1 and N = 1, respectively, in Equation (12). Similarly, we can get the probability of successful discovery on the second and third advertising channel, respectively, by

α k = ( 1 3 ) M + N 1 ( ( k 1 ) τ S W τ S I + ρ ( k 1 ) τ W A τ S I T S τ S I ) ( 3 2 T S τ S I ) M 1 ( 3 ρ + T IFS τ S I ) N 1 ( k = 1 , 2 , 3 )

4.2. Expected Discovery Latency

The discovery latency is defined as the interval for the advertiser from entering into the first advertising event by sending an ADV_IND until it successfully receives a SCAN_REQ from the scanner as illustrated in Figure 7. The time to successful discovery depends on the number of failures experienced in attempts during the discovery process as shown in Table 3, where α1, α2, α3 means the probability of successful discovery on the first, the second, and the third advertising channel, respectively, as previously discussed.

Figure 7. Discovery latency.
Table 3. Elapsed time to successful discovery and the corresponding probability.

From Table 3, we can get the expected discovery latency, denoted by πD, by:

π D = i = 1 ( 1 α 1 ) i 1 ( 1 α 2 ) i 1 ( 1 α 3 ) i 1 α 1 { ( i 1 ) ( τ A I + δ max 2 ) + τ W A } + i = 1 ( 1 α 1 ) i ( 1 α 2 ) i 1 ( 1 α 3 ) i 1 α 2 { ( i 1 ) ( τ A I + δ max 2 ) + 2 τ W A } + i = 1 ( 1 α 1 ) i ( 1 α 2 ) i ( 1 α 3 ) i 1 α 3 { ( i 1 ) ( τ A I + δ max 2 ) + 3 τ W A }

Using algebra i = 0 i x i = x d d x ( i = 0 x i ) = x ( 1 x ) 2, we get:

π D = [ ( 1 α 1 ) ( 1 α 2 ) ( 1 α 3 ) 1 ( 1 α 1 ) ( 1 α 2 ) ( 1 α 3 ) ] ( τ A I + δ max 2 ) + [ 1 + ( 1 α 1 ) + ( 1 α 1 ) ( 1 α 2 ) 3 ( 1 α 1 ) + ( 1 α 2 ) ( 1 α 3 ) 1 ( 1 α 1 ) ( 1 α 2 ) ( 1 α 3 ) ] τ W A

The expected discovery latency of M:N networks can be determined using Equation (13) respectively, by substituting the corresponding probability of successful discovery in Equation (15).

4.3. Sensitivity Analysis

In order to investigate to what extent parameter setting influences the performance metrics, The sensitivity index (SQ,x) is defined as follows:

S Q , x = ( Δ Q Q ) γ
where x and Q mean a parameter and a performance metric, respectively, and ΔQ means the change in the performance metric Q when the value of the parameter x is changed by a factor of γ. In other words, ΔQ means how much the performance metric Q will be changed when the value of the parameter x is changed from a value h to h(1 + γ), so ΔQ/Q indicates the ratio of change in the performance metric Q as the value of the parameter x is changed from h to h(1 + γ). Thus, the sensitivity index SQ,x indicates the extent to how much a performance metric Q is affected as the value of a parameter x is changed. In our analysis, the value of γ is given by −0.5 < γ < 0.5. A larger value of SQ,x indicates a stronger sensitivity. For example, if SQ,x = 2.0, it means that the performance metric Q is highly affected by x as much as double of γ. If SQ,x = 1.0, it means that Q is affected by x in the same ratio as γ. If SQ,x = 0.5, it means that Q is influenced by x as much as half of γ. In that case, Q is relatively insensitive to parameter x. On the other hand, if SQ,x = −0.5, it means that Q is inversely affected by x as much as the half of γ. If SQ,x = −1.0, it means that Q is inversely affected by x in the identical ratio as γ. In this subsection, we present sensitivity of performance metrics in 1:N network as an example.

By substitution of τSW with τSW(1 + γ) and subtraction in Equation (13), we can get Δα1 by:

Δ α 1 = ( 1 3 ) N { τ S W ( 1 + γ ) τ S I T S τ S I } { 3 τ S W ( 1 + γ ) τ S I T IFS τ S I } N 1 ( 1 3 ) N ( τ S W τ S I T S τ S I ) ( 3 τ S W τ S I + T IFS τ S I )

Thus, the sensitivity of discovery probability (Sα1,SW) becomes:

S α 1 , S W = ( Δ α 1 α 1 ) γ

We can also find the sensitivity of the expected discovery latency to τAI in M:N network using Equations (13) and (15):

S D , A I = ( Δ π D π D ) γ = ( 1 α 1 ) ( 1 α 2 ) ( 1 α 3 ) 1 ( 1 α 1 ) ( 1 α 2 ) ( 1 α 3 )

Similarly, the sensitivity of the expected discovery latency to other parameters is obtained such as τSW and τWA in M:N network using Equations (13) and (15), but we do not present the final expressions of SD,SW and SD,WA since they have very complicated forms since α1, α2, α3 are functions of τSW and τWA as seen in Equation (13).

5. Simulation Validation

In order to validate the analytical models, we have developed a BLE simulation program which fully complies with the BLE specification. The simulative settings are in accordance with the standard definition as previously described, and we compare the analytical results with those obtained via simulations. We simulate over 10 times for each scenario to get the average results, where parameter settings are selected with values listed in Table 4.

Table 4. Simulation parameters and their values.

Figures 8 show the results of performance evaluation relating to the discovery probability, respectively, in terms of different sets of parameters such as τAI, τWA, and τSW in BLE network. The graphs are obtained by varying one parameter while setting the other two parameters to their default values listed in Table 4. From these figures, it is first found the theoretical curves practically coincide with the simulation results over the entire range of parameters. We can see that the discovery probability is very low, although there are not so many devices in the network. For example, the scanner experiences the success probability of about 0.3 in discovering process in even 1:1 network, which is totally different from the behavior of other wireless networks. This is because BLE devices can be synchronized with one of three advertising channels with a probability of 1/3 to discover each other. Further, as the number of devices increases in the network, the discovery process fails more frequently due to collision of the abundant control packets, such as SCAN_REQ, SCAN_RSP, during discovery process.

Figure 8. Probability of successful discovery on each advertising channel with various parameter settings. (a) The probability of successful discovery as the number of scanners increase (τSI = 10,240, τSW = 2560, τWA = 10, τAI = 1280, M = 5); (b) the probability of successful discovery as the number of advertisers increase (τSI = 10240, τSW = 2560, τWA = 10, τAI = 1280, N = 5); (c) the probability of the successful discovery as the ScanWindow (τSW) is varied is (τSI = 10,240, τWA = 10, τAI = 1280, M = 5, N = 5); (d) the probability of the successful discovery as τWA is varied (τSI = 10,240, τSW = 2560, τAI = 1280, M = 5, N = 5); (e) the probability of the successful discovery as AdvInterval (τAI) is varied (τSI = 10,240, τSW = 2560, τWA = 10, M = 5, N = 5).

It can be seen from following graphs, the discovery probability is somewhat comparatively affected by τWA and τSW. The scanning duration is only dependent on τSW and the number of scans per advertisement is determined by the ratio of τSW to τWA. As τSW increases, the probability that the scanner successfully discovers the advertiser increases very gradually when τSW < 100 ms, and remains almost constant when τSW exceeds 100 ms. This is because the scanner can stay a long time on each channel for scanning in spite of decreasing number of scans as τSW is increased. So, we can say that the scanner loses many chances of device discovery if τSW is shorter than the expectation needed by the advertiser. In particular, if τWA = τSW, α2 and α3 becomes identical to α1 which implies that discovery on the first channel will pass to the second and the third channel.

On the contrary, the discovery probability is not affected by τAI since this parameter influences neither scanning duration nor the number of scans. Instead, τAI is only used to determine when the advertiser initiates the next advertisement process. Figures 8 indicates that inappropriately setting of parameters significantly deteriorates the successful device discovery, respectively.

Figure 9 shows the mean discovery latency in terms of different sets of parameters, such as τAI, τWA, and τSW. We can find that the theoretical results match with the simulative ones over the entire range of parameters. The low success probability, as seen in Figures 8, causes a significant and exponential rise in the mean discovery latency as the number of BLE devices increased. As explained above, this is because of collisions of the abundant control packets. From the figure, an interesting thing can be discovered. The mean discovery latency decreases very gradually with τSW when τSW < 100 ms, and remains almost constant when τSW > 100 ms. And, the mean discovery latency is not affected much by τWA (a negligible change though). As previously described, τSW and τWA mainly affect the rendezvous chance of the advertiser and the scanner on one of three advertising channels, but they do not have a significant impact on the discovery latency. On the contrary, the mean discovery latency linearly increases with τAI. Since advertisers initiate the advertisement intervals according to the value of τAI, the discovery latency is strongly dependent on τAI. Figure 9 also indicates that the improper setting of parameters significantly deteriorates the discovery latency.

Figure 9. Mean discovery latency with various parameter settings. (a) The mean discovery latency as the number of scanners is increased (τSI = 10,240, τSW = 2560, τWA = 10, τAI = 1,280); (b) the mean discovery latency as the number of advertisers increase (τSI = 10,240, τSW = 2560, τWA = 10, τAI = 1280); (c) the mean discovery latency as ScanWindow (τSW) is varied (τSI = 10,240, τWA = 10, τAI = 1280, M = 5, N = 5); (d) the mean discovery latency as τWA is varied (τSI = 10,240, τSW = 2560, τAI = 1280, M = 5, N = 5); (e) the mean discovery latency as AdvInterval (τAI) is varied (τSI = 10,240, τSW = 2560, τWA = 10, M = 5, N = 5).

As for the sensitivity shown in Figure 10, it is shown that the theoretical results are practically the same with simulation results. The sensitivity of the mean discovery latency to τSW or τWA roughly remains around 0, which implies that change in τSW or τSW does not have a significant impact on the discovery latency. On the contrary, the sensitivity of discovery latency to τAI is almost 1 as γ is varied over a range from −0.5 to 0.5. This means that the discovery latency is identically proportional to τAI, which is in accordance with the results shown in Figures 9 and 10.

Figure 10. Sensitivity of mean discovery latency with various parameter setting. (a) The sensitivity of mean discovery latency to τSWSI = 10,240, τWA = 10, τAI = 1280, M = 5, N = 5); (b) the sensitivity of mean discovery latency to τWASI = 10,240, τSW = 2560, τAI = 1280, M = 5, N = 5); (c) the sensitivity of mean discovery latency to τAISI = 10,240, τSW = 2560, τWA = 10, M = 5, N = 5).

6. Conclusions

There is a significant increase in the applications of BLE in different areas, which is capable of making BLE one of the leading technologies for short-range communication in the next generation of networks. The Bluetooth standard defined the BLE communication model in a clear and detailed way, but still there are many other parts which can be addressed. Therefore, we create an accurate analytical model for these parts such as the discovery latency, as well as the discovery probability in BLE networks. These are then validated via extensive simulation experiments. We also analyze the sensitivity of those performance metrics to quantitatively evaluate to what extent parameter setting would influence the performance metrics. It is shown the theoretical results match the simulated ones. With increasing number of BLE devices, delays of device discovery show an exponential growth despite the usage of three advertising channels and tiny-sized frames. This implies that there exist severe contentions among multiple BLE devices. We find that the inappropriate parameter settings considerably impair the efficiency of BLE devices, and the wide range of BLE parameters provides high flexibility for BLE devices to be customized for different applications. As far as we know, this work is one of the first in-depth and accurate models for BLE discovery, including sensitivity analysis.

Acknowledgments

This research is funded by “Technology development for performance enhancement of BLE networks” Project by Samsung Electronics Co., Ltd.

Author Contributions

Keuchul Cho, Gisu Park, Wooseong Cho, Jihoon Seo and Kijun Han contributed to the theoretical analysis and proofs. Keuchul Cho, Wooseong Cho and Kijun Han contributed to the simulation. Woojin Park and Moonki Hong contributed to building the analytical models and validating their correctness.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Patel, M.; Wang, J. Applications, challenges, and prospective in emerging body area networking technologies. IEEE Wirel. Commun. 2010, 17, 80–88. [Google Scholar]
  2. Liu, J.; Chen, C. Energy Analysis of Neighbor Discovery in Bluetooth Low Energy Networks; Technical Report; Nokia Research Center/Radio System Lab: Beijing, China, 2012. [Google Scholar]
  3. Liu, J.; Chen, C.; Ma, Y. Modeling and performance analysis of device discovery in bluetooth low energy networks. Proceedings of the IEEE on Global Communications Conference (GLOBECOM), Anaheim, CA, USA, 3–7 December 2012; pp. 1538–1543.
  4. Liu, J.; Chen, C.; Ma, Y.; Xu, Y. Energy analysis of device discovery for bluetooth low energy. Proceedings of the 78th Vehicular Technology Conference (VTC Fall), Las Vegas, NV, USA, 2–5 September 2013; pp. 1–5.
  5. Liu, J.; Chen, C.; Ma, Y. Modeling neighbor discovery in bluetooth low energy networks. IEEE Commun. Lett. 2012, 16, 1439–1441. [Google Scholar]
  6. Bluetooth SIG, Bluetooth Core Specification Version 4.0. Specification of the Bluetooth System 2010.
  7. Duflot, M.; Kwiatkowska, M.; Norman, G.; Parker, D. A formal analysis of bluetooth device discovery. Int. J. Softw. Tools Technol. Transf. 2006, 8, 621–632. [Google Scholar]
  8. Drula, C.; Amza, C.; Rousseau, F.; Duda, A. Adaptive energy conserving algorithms for neighbor discovery in opportunistic bluetooth networks. IEEE J. Sel. Areas Commun. 2007, 25, 96–107. [Google Scholar]
  9. Basagni, S.; Bruno, R.; Petrioli, C. Device discovery in Bluetooth networks: A scatternet perspective. In NETWORKING 2002: Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications; Springer: Berlin/Hidelberg, Germany, 2002; pp. 1087–1092. [Google Scholar]
  10. Scott, D.; Sharp, R.; Madhavapeddy, A.; Upton, E. Using visual tags to bypass bluetooth device discovery. Mob. Comput. Commun. Rev. 2005, 9, 41–53. [Google Scholar]
  11. Liu, J.; Chen, C.; Ma, Y.; Xu, Y. Adaptive device discovery in bluetooth low energy networks. Proceedings of the 77th Vehicular Technology Conference (VTC Spring), Dresden, Germany, 2–5 June 2013; pp. 1–5.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.