2018 Blu
2018 Blu
2018 Blu
June 5, 2018.
Digital Object Identifier 10.1109/ACCESS.2018.2834479
ABSTRACT Industrial wireless sensor networks (IWSNs) are used to acquire sensor data that need real-
time processing, therefore they require predictable behavior and real-time guarantees. To be cost effective,
IWSNs are also expected to be low cost and low power. In this context, Bluetooth low energy (BLE)
is a promising technology, as it allows implementing low-cost industrial networks. As BLE is a short-
range technology, a multihop mesh network is needed to cover a large area. Nevertheless, the recently
published Bluetooth mesh networking specifications do not provide support for real-time communications
over multihop mesh networks. To overcome this limitation, this paper proposes the multihop real-time
BLE (MRT-BLE) protocol, a real-time protocol developed on top of BLE, that allows for bounded packet
delays over mesh networks. MRT-BLE also provides priority support. This paper describes in detail the
MRT-BLE protocol and how to implement it on commercial-off-the-shelf devices. Two kinds of performance
evaluation for the MRT-BLE protocol are provided. The first one is a worst case end-to-end delay analysis,
while the second one is based on the experimental results obtained through measurements on a real testbed.
INDEX TERMS Bluetooth low energy, industrial wireless sensor networks, real-time, wireless mesh
networks.
I. INTRODUCTION AND MOTIVATION solutions for BLE. Unfortunately, such specifications do not
Bluetooth Low Energy [1] is a wireless technology intended provide support for real-time communications over multi-hop
for low-power, low-cost, low-complexity short-range com- mesh networks.
munications, that represents an interesting solution for To overcome the above discussed limitations, thus enabling
implementing Industrial Wireless Sensor Networks (IWSN). BLE to be introduced in industrial environments, this paper
In fact, BLE provides lower energy consumption compared proposes the Multi-hop Real-time BLE (MRT-BLE), that is a
to other wireless technologies adopted for industrial appli- real-time protocol, developed on top of BLE, able to realize
cations [2], [3]. Moreover, thanks to the low cost of devices low-cost IWSN with mesh topologies.
and to their diffusion, BLE is a good candidate for sev- The MRT-BLE protocol is connection-oriented, unlike
eral industrial applications [4]. However, the BLE specifica- the Bluetooth mesh networking specifications [8], which
tions [1], [5], [6] do not include support for real-time traffic, are defined as connectionless communications. There are
thus the BLE standard is not suitable for IWSN, which require two reasons for this choice. Firstly, the connection-oriented
bounded packet delays. A recent work [7] has provided a approach provides a higher throughput than the connection-
configuration method for the BLE standard to guarantee less one, as packets can be transmitted more frequently.
bounded packet latencies over star networks. As BLE is a Secondly, in the connection-oriented approach, 37 channels
short-range technology, a multi-hop mesh network is needed can be exploited for channel hopping, instead of the 3 chan-
to cover a large area. However, mesh topologies are not nels that can be used for connection-less advertising. This
foreseen in the new Bluetooth version 5 specification [6]. entails a lower channel collision probability and therefore
The Bluetooth Smart Mesh Working Group has recently a higher reliability. The MRT-BLE protocol adopts a Time
introduced the Bluetooth mesh networking specifications [8], Division Multiple Access (TDMA) approach that exploits a
which define the requirements to enable mesh networking transmission allocation scheme able to support the timely
2169-3536
2018 IEEE. Translations and content mining are permitted for academic research only.
VOLUME 6, 2018 Personal use is also permitted, but republication/redistribution requires IEEE permission. 26505
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
L. Leonardi et al.: MRT Communications Over BLE IWSN
exchange of multi-hop real-time data packets. This paper IEEE 802.15.4 and BLE improve reliability and that cooper-
builds upon the approach proposed in [7], that outlines a ative solutions are required to achieve coexistence. In [17] an
protocol working on top of BLE. Such a protocol allows extension of the BLE channel access scheme in connection
to maintain bounded latencies over mesh networks. How- state that is based on the listen-before-talk mechanism is
ever, in the work in [7] the approach is merely sketched. proposed. The numerical results in the paper show that the
The ability of taking advantage of the Client Characteristic proposed scheme reduces the average transmission delay.
Configuration Descriptor (CCCD) in order to enable/disable Several studies investigated the BLE discovery phase,
connection is mentioned, but nothing is said about the timing which plays a critical role in the networks with dynamic
of this mechanism. Moreover, the work in [7] does not address topology. For instance, Cho et al. [18] address the influ-
the implementation of the MRT-BLE on Commercial-Off- ence of parameter settings on the latency and energy perfor-
The-Shelves (COTS) devices. Instead, this paper aims to mance of the discovery process. A mechanism to enhance
describe in detail how the MRT-BLE works, address the the discovery phase for BLE devices is proposed in [19].
timing of the connection enabling/disabling, introduce the The mechanism aims at avoiding collisions during the adver-
support for packet priority, and offer two kinds of evaluation. tisement process, so as to achieve lower latency and energy
The first one is based on measurements obtained in a realistic consumption.
scenario, while the second one is a worst-case end-to-end Modern BLE radio transceivers allow to partition the net-
delay analysis. The contribution of the paper consists in the work bandwidth between the BLE and another user-defined
MRT-BLE mechanism itself and the relevant timing analysis protocol. Marinoni et al. [20] show the feasibility of a dual-
that represents a useful tool for the network designers, since protocol approach and its capability to support a custom real-
it allows them to assess whether a feasible schedule for a time protocol running on top of the raw radio layer. The
given flow set can be found or not. In the negative case, proposed real-time protocol introduces a bounded overhead
the timing analysis helps designers in the re-engineering and can be implemented in specific devices able to support
process, allowing them to see the effects of changing the two different protocols.
flow periods or paths along the network. To the best of our In order to increase the communication coverage of BLE,
knowledge, this is the first work that proposes and assesses a Kim et al. [21], Jung et al. [22], Zenker et al. [23], and
mechanism to provide real-time multi-hop communications Hortelano et al. [24] proposed different methods prior to
over BLE through assessment in a real scenario. The paper the publication of the Bluetooth mesh networking specifi-
is organized as follows. Section II overviews related work, cations. For instance, Kim et al. [21] proposes a method to
while Section III summarizes BLE and the most relevant fea- implement a BLE network with a tree topology to extend
tures exploited by the proposed protocol. Section IV presents the coverage to other wireless sensor networks. A cluster-
the MRT-BLE protocol design, while Section V provides based on-demand routing protocol to support multihop com-
a timing analysis of the protocol. Section VI describes an munication in Bluetooth low energy ad hoc networks is
implementation of the MRT-BLE protocol on real devices and proposed in [22]. In [23] the applicability of BLE for
presents some experimental results. Finally, Section VII gives mesh-enabled applications is addressed. The results, obtained
our conclusions and hints for future work. using a prototype of the proprietary BLE-based CSRmesh
protocol [25], show that BLE mesh is a promising tech-
II. RELATED WORK nology for mesh applications, but that more studies are
Bluetooth Low Energy (BLE) is one of the most inter- needed to fully exploit its potential. Hortelano et al. [24]
esting solutions for short-range communications, thanks present a new mesh proposal based on the proprietary
to its low-cost, high throughput, broad compatibility with BLE-based CSRmesh protocol, that exploits a connection-
mobile devices, and low-power properties. BLE is gaining less network and tries to overcome some limitations of
ground in specific sectors, for instance, energy manage- the CSRmesh network (e.g. the scalability, the high num-
ment for smart homes [9], [10], food manufacturing and ber of retransmissions). Finally, Darroudi and Gomez [26]
traceability [11], [12], and also in applications, such survey state-of-the-art BLE mesh network solutions and dis-
as machine monitoring and structural health monitoring, cuss their advantages and drawbacks.
in which other technologies, e.g., the IEEE 802.15.4 standard, The IP support has recently turned BLE into a poten-
proved to be effective and efficient too [13], [14]. In [15] the tial candidate for a broad range of applications including
IEEE 802.15.4 and BLE protocols are evaluated in terms of healthcare, wearable devices, home automation, and Inter-
service ratio, delay, and energy efficiency under IPv6 traffic. net of Things (IoT) [27]–[29]. The delay performance of
Some studies analyzed the BLE system behavior in BLE for time-critical applications is addressed in [30]. The
wireless environments under realistic operating conditions. work analytically models the delay for connection-oriented
In particular, the work in [16] addresses the coexistence applications under different bit error conditions. The works
of IEEE 802.15.4, BLE and IEEE 802.11 through analysis in [31] and [4] explored the BLE suitability for industrial
and experiments to determine the effect of cross-technology and process automation communications and for time-critical
interference on the wireless network reliability. The paper Industrial IoT (IIoT) applications, respectively. In particular,
concludes that the MAC layer mechanisms of both the last one [4] presents a retransmission scheme able
A. LINK LAYER
The operation of the BLE Link Layer (LL) can be described
through a state machine with the following states: Standby,
Advertising, Scanning, Initiating, and Connection. The Link
Layer may run multiple state machine instances and each
FIGURE 1. The BLE protocol stack.
Link Layer state machine allows only one active state at a
time. When two devices are engaged in a connection, they can
play the master or the slave role. The master is the device that
to fulfill the reliability and timeliness requirements of initiates the connection and coordinates the medium access,
IIoT applications. periodically polling the slaves in a Time Division Multiple
The above mentioned literature indicates that it is worth- Access (TDMA) way.
while investigating novel extensions and configurations of The master controls the timing of the connection
BLE to make it more suitable for industrial environments. events (CE), i.e., the synchronization points for the master
For instance, in [7], a configuration method for the BLE and the slave. Since two devices must be tuned to the same
standard that guarantees bounded packet latencies with star RF channel to communicate and the Link Layer may use one
topologies was proposed, together with a new protocol for physical channel at a given time, the master and slave shall
BLE-based mesh topologies that is able to provide bounded also determine the data channel index for each connection
latencies. However, Patti et al. [7] leave for future work event to reduce the collisions. A physical channel collision
both the development of the proposed solution on COTS is possible because many BLE devices can independently
devices and the protocol assessment in a realistic multi-hop operate within the same spatial and temporal area, and the
scenario. Comparing with the work in [7], that simply outlines number of physical channels (up to 37) is limited, thus two
the MRT-BLE idea, this paper turns the idea into a pro- independent BLE devices may have their transceivers tuned
tocol, characterizing in detail the mechanisms to guarantee to the same physical channel.
bounded latencies on multihop communications and their The start time of a connection event, called an Anchor
timing. This paper also provides a timing analysis for multi- Point (AP), is the instant at which the master shall start to
hop communications to compute the worst-case end-to-end transmit a packet to the slave. During a connection event,
delay of periodic packets. In addition, this work addresses the the master and the slave send and receive packets alternately.
MRT-BLE protocol implementation on COTS devices and Consecutive packet transmissions are separated by an Inter
assesses the end-to-end delay performance in a realistic Frame Space (IFS), whose duration is 150 µs. A connection
multi-hop scenario. The measured delay values are compared event is considered open as long as both devices keep sending
with the computed worst-case end-to-end delays obtained packets. If none of the devices has data to transmit, the slave
through the analysis in Section V. As it will be shown, switches to the sleep mode until the next AP.
the theoretical upper bounds are found compliant with the The BLE specifications define two timing parameters for
measured values. connection events, i.e., the Connection Interval (CI) and the
The proposed MRT-BLE protocol differs from the Blue- Connection Slave Latency (CSL). The CI represents the time
tooth mesh networking specifications [8] as the latter are interval that regularly spaces the start times of connection
defined as connectionless communications, based on the events. The second parameter, the Connection Slave Latency,
GAP Broadcaster and Observer roles, while the MRT-BLE defines the number of consecutive connection events that a
protocol is connection-oriented and offers support for real- slave has to skip, while remaining in sleep mode, when it does
time communications over multi-hop mesh networks. not need to communicate with the master.
Several BLE implementations [32] require a guard
III. BLE SUMMARY band (GB) between the connection events to cope with the
The Bluetooth Low Energy core system architecture includes synchronization accuracy, and the master shall ensure that a
an RF transceiver and a protocol stack, shown in Fig. 1, that connection event closes at least one guard band before the
enable BLE devices to connect and exchange data. anchor point of the next connection event. Moreover, such
The lowest system layers are grouped into a subsystem BLE implementations provide configurable parameters to set
known as the Controller. This is a common implementation the maximum duration of each connection event. The master
FIGURE 6. Solution to the overlapping CE problem with a master/slave FIGURE 8. Solution to the overlapping CE problem in the shared slave
shared device. topology.
The proposed protocol does not implement a mechanism always active as no slot collisions can occur. The number of
to dynamically configure the network topology, it makes CIs in the two timeslices that a node can use to transmit data
the configuration offline. This aspect will be investigated in packets on a shared link is denoted by Xci and is equal for all
future works. the shared links in the network. In the example Xci is set to 2
and in fact sl21 and sl32 are active for only two CIs (sl21 in
V. TIMING ANALYSIS timeslice 1 and sl32 in timeslice 2).
The analysis here proposed deals with the calculation of the To disable one link and enable the other one, the trans-
worst-case end-to-end delay (hereinafter worst-case response mission of four packets is needed, i.e., two to disable one
time) of periodically transmitted packets belonging to a flow. link (write_request and write_response) and two to enable the
The resulting worst-case end-to-end delay for each flow rep- other one. According to the BLE specifications [1] , request
resents a lower bound for the minimum deadline that allows and response may be scheduled within a single CE. Many
a feasible schedule for each flow. The analysis can be used to implementations, such as the ST BlueNRG-MS devices [33],
assess the feasibility, under a static priority assignment, of a take four connection intervals to complete the entire pro-
flow set comparing the worst-case response time of each flow cedure, as they transmit only one request or response in
with the corresponding relative deadline. Table 1 summarizes each CI. In the analysis such an interval is called Tsw. For
the notation used in the analysis. example, in the ST BlueNRG-MS devices the Tsw of a node
A connection between a master and a slave is defined as to enable/disable the connection of the i-th shared link is
a link. A link is a bidirectional connection denoted by lxy calculated as
(where x is the index of the node acting as a master for the
link and y the index of the slave). In the proposed approach Tsw(i) = 2 × NL(i) × Tci, (1)
for each link the duration of one CE is offline configured so where NL(i) for the i-th shared link is defined as the max-
as to allow the transmission of one packet between the slave imum between the number of shared links of the master
and the master plus one packet between the master and the and the number of shared links of the slave. The NL value
slave. The connection intervals for all links have to be set for no shared links is 0. Equation (1) evaluates two times
with the same duration and allow the communication between NL(i), because the transmission of two packets, i.e., one
all slaves and the master of a sub-network once. A link in write_request and one write_response packets, is required
which at least one of the two connecting nodes is shared to disable/enable one link. Note that, the ST BlueNRG-MS
between two sub-networks is defined as a shared link (slxy ). devices [33] take two connection intervals to transmit one
As discussed in Sect. IV, in the proposed approach, the time request and one response (i.e., only one request or response
is divided into two timeslices. In each timeslice, a node with is transmitted in each CI).
shared links alternates the connection with one sub-network The time interval in which the entire schedule, for the i-th
at a time. Fig. 10 shows an example of the network timings. link, repeats is called Cycle Time (Tc), and it is calculated as
In the example the Node 2 acts as a master for the shared (
link sl21 and as a slave for sl32 . l34 is a link between two NL(i) > 0 ⇒ 2 × Xci × Tci + 2 × Tsw(i)
Tc(i) = (2)
nodes that are connected to only one sub-network, so l34 is NL(i) = 0 ⇒ Tci.
(f )
To calculate Qt (li ), the longest time wi (X ) the i-th link
has to wait to see X consecutive start times is calculated as
(
NL(i) > 0 ⇒ (S + 1)Tc(i) − (Xci − 1 − O)Tci
wi (X ) =
NL(i) = 0 ⇒ X × Tci.
(5)
where S is quotient of the Euclidean division of X − 1 by Xci
and O is the remainder, i.e., X − 1 = SXci + O. For instance,
in the case of Figures 10 and 11, the link sl21 has Xci = 2 and
FIGURE 12. The implemented topology.
Tc(sl21 ) = 12 Tci, so for X = 3 we have S = 1 and O = 0.
Therefore, the link sl21 has to wait for wsl21 (3) = 2Tc − (2 −
1)Tci = 23Tci. In fact, looking at the example in Fig. 10, if a packet on the i-th link is lower than or equal to the number of
packet to be transmitted in sl21 arrives when the second CI has start times available for the i-th link [35].
f (f )
just started, it will be transmitted after 11 Tci, i.e., Tc(sl21 ) − Once the Xj value has been found, the worst-case Qt (li )
(Xci − 1)Tci. is calculated as
To apply the busy period approach we first calculate the (f ) f
Qt (li )worst = wi (Xj ). (9)
number of packets of the f -th flow generated in any interval
of length t, i.e., VI. IMPLEMENTATION OF THE MRT-BLE PROTOCOL
t ON COTS DEVICES
If (t) = . (6) In order to show the feasibility of the proposed pro-
Pf
tocol on COTS hardware, we implemented it on the
f
Then, we calculate the largest number (Xj ) of start times that X-NUCLEO-IDB05A1 devices produced by STMicroelec-
are needed to transmit the i-th packet, which is given by the tronics. These devices are equipped with communication
f
smallest value of Xj that satisfies the following equation modules that are compliant with the Bluetooth Specifica-
tions v4.1, i.e., the SPBTLE-RF BlueNRG-MS ones.
f f
X X
Xj = 1 + Ik (wi (Xj )) + 1. (7) The testbed is composed of eight devices, as shown
prio(k)>prio(j) prio(k)=prio(j), in Fig. 12.
k6=j
Each device acts as both a GATT client and a GATT
In equation (7), 1 is the start time required to transmit the server. Bidirectional communication consists in transmis-
packet, while the parameter Xj encompasses the following sions initiated by the GATT servers, which update their
sources of interference: exposed attributes and send them through notifications. In the
1) The k-th higher priority packets (i.e., prio(k) > prio(j)) implemented topology, there are three linked sub-networks
that compete with the j-th packet for the transmission and the devices S2, S3 and MS1 are shared nodes. As the mas-
in the i-th link. ters of the linked sub-networks are not synchronized, connec-
2) The packets with the same priority as the j-th packet tion events may overlap at the shared nodes. The mechanism
that compete with it for the transmission in the i-th link described in Section IV starts after the node MS1 has received
(in this case a FIFO policy is adopted). a synchronization packet from node M1.
Equation (7) has not simple solution, as the Xj term appears Any time the shared slaves, i.e., S2 and S3, note (following
both in the Left-hand-side (LHS) and in the Right-hand- a GATT event) that MS1 has modified one of their exposed
side (RHS) of the equation under the ceiling operator. Thus, attributes (the descriptor of one of their characteristics), they
the calculation of Xj is performed by the following iterations will enable or disable the connections with M2. In particular,
(0) if MS1 has enabled the connections with S2 and S3, both
Xj
f
=1 of them will disable the connections with M2. Conversely,
f (v+1) X f (v)
if MS1 has disabled the connections with S2 and S3, both of
Xj =1+ Ik (wi (Xj ))
them will enable the connections with M2.
prio(k)>prio(j)
X (8) Fig. 13 shows the timing of the masters M1, MS1 and M2 in
+ 1. the topology in Fig. 12. The semi-transparent rectangles rep-
prio(k)=prio(j), resent the timeslices during which the depicted connections
k6=j
are disabled.
f (v) Fig. 13 shows that the node MS1 in the initial phase
Iteration starts with Xj = 1, with v = 0, as the packet to be
enables only the connection with the master M1. Once
f (v)
transmitted requires one start time. Then Xj is iteratively the sync packet, sent from node M1, is received by the
calculated until the LHS is equal to the RHS, i.e., until the node MS1, the mechanism of enabling/disabling the connec-
interference stops growing. Equation (8) is proved to con- tions starts. Each device implements as many priority queues
verge if the number of start times required to transmit every as the number of established connections managed by the
FIGURE 13. Timing of the masters. up to five master connections and one advertising or scan-
ning interval (they are mutually exclusive in a CI). In each
connection interval, the connected devices exchange only one
packet in their CE. The Tce is sized so as to take into account
the time to transmit one packet and any possible Link Layer
retransmission.
On the final destination (i.e., the actuator S1) a specific
check is implemented to verify that no packet is lost.
The following subsections present the results of the
measurements performed to assess the feasibility of the
MRT-BLE approach on COTS devices and to analyze
FIGURE 14. The considered scenario. the application level end-to-end delay experienced by multi-
hop real-time data exchanges.
MRT-BLE sublayer. Each priority queue contains the out-
bound packets for a specific connection. The insertion into A. PACKET END-TO-END DELAY
a given queue occurs, using a static routing function, when This subsection presents the results of experimental measure-
a packet is generated or when a node receives a packet to ments of the packet end-to-end (e2e) delay as a function of the
forward. A backup path can be provided for each flow. The number of hops from the source to the final destination. Note
priority of packets can be assigned according to a config- that, in the following, the hop count is obtained summing up
urable criterion. In this scenario we dynamically assigned the the number of traversed links and the node S1 is assumed to
priority of packets according to the hop count, i.e., the number be the final destination for all the packets.
of hops that the packet has traversed. This way, we can The relevant network parameters are summarized
favor the packets that have to traverse more links to reach in Table 2. The Tce parameter was set to accommodate the
the destination, thus avoiding to excessively increase their transmission of a packet plus the potential retransmissions,
end-to-end delay. For example, on the node MS1, a packet while Tci is equal to the duration of five connection events
with source S4 (two hops) has a higher priority than a packet plus the scanning interval. As the calculated Tsw(i) for
with source M2 (one hop). When, on a device acting as a enabling/disabling the connection is really high (e.g., the Tsw
GATT server, a GATT event reports that a connection has for the link slMS1S2 in Fig. 14 is 180ms according Eq. (1)), Xci
been enabled, the device is allowed to send one packet for was set to 4 to reduce the network end-to-end delay. In fact,
each enabled connection every connection interval. Before as S2, S3, S4, S5, M2, and MS1 generate one packet with
sending a packet, each device has to check which connection destination S1 every second, the node MS1 should forward
is enabled and then transmits the highest priority packet from six packets to M1 (the only device connected with S1). Con-
the queue of the enabled connection. sequently, an overhead of 180ms for each packet would cause
The realized testbed, shown in Fig. 14, consists of seven a large end-to-end delay increase. Setting Xci equal to 4 in
sensors (M1, MS1, S2, S3, M2, S4 and S5) and one sink (S1) this case significantly reduces the overhead of the proposed
that collects the data from all the sensors. Our implementation mechanism, i.e., 180ms every four packet transmissions.
does not include the application layer of the sink that receives We defined seven flows (one from each node, except the
and processes the received data. sink) generated with a period of 1s and with a 30-byte pay-
The arrows in Fig. 14 show the direction of the data trans- load. The parameters of the flows are shown in Table 3.
mission flows. As it can be seen, the nodes M1 and MS1 are The routing paths determine which packets actually interfere
a potential bottleneck in the realized mesh network. with the packets originated by a given node. The interfence
In the simulated scenario, the sensors generate a new is due to the waiting times in the outbound queues of the
packet every second. Furthermore, the used devices permit intermediate nodes that the packets traverse to reach the final
to set the maximum duration of each connection event (Tce). destination.
For each connection, the duration of the connection interval The assessed metric here adopted is the packet end-to-end
Tci was set to 30ms and the Tce was set to 5ms to allow delay at the application layer, defined as the time difference
for the assigned Link Layer slot. If both the application queue
and BLE queue are empty, the packet will be delivered to
destination within 30ms (Tci).
The experimental results show that the path of these pack-
ets in the considered scenario (i.e., the one in Fig. 14) and
the priority policy bound to three connection intervals the
between the packet generation time at the source and the waiting time for the Link Layer transmission of the packets
reception time at the receiver, measured at the application originating from M1. Consequently, the end-to-end delay for
layer. The end-to-end delay is measured by a third device, these packets is lower than 120ms (i.e., 4*Tci).
hard-wired to both the source and the destination nodes, as the Fig. 16 shows the end-to-end delay distribution for the
difference between the packet reception time (i.e. when the packets originating from the node MS1 (i.e., two-hop
receiver node sets up a pin) and the packet generation time packets).
(i.e., when the source node sets up a pin). Almost all these packets reach the final destination in
According to the timing analysis in Section V, the worst less than 390ms. Fig. 16 shows that a low percentage of
case response-time (WCRT) values are shown in Table 4. packets (lower than 4%) with source node MS1 reach the final
These values represent the upper bound of the expected destination within 420ms. This delay mainly consists of the
end-to-end delay for each flow. waiting times in the queues due to the interference of higher
Fig. 15 gives the end-to-end delay distribution for the priority packets, i.e., the packets originating from the other
packets generated by node M1 (i.e., single-hop), that shows source nodes (i.e., all of them but M1), that accumulated more
the percentage of packets that experienced the plotted end-to- hops on their way.
end delay values. Fig. 17 shows the end-to-end delay distribution for the
As it is shown in Fig. 15, every packet generated by the packets with source node S3 (i.e., three-hop packets).
node M1 was delivered to the destination (S1) within 120ms. Almost all these packets (i.e., 95% of them) reach the
The measured delay is only due to the waiting time that a final destination within 810ms. A very limited percent-
packet experiences in the queue before transmission. Note age of packets (about 1%) arrived to destination within
that the node M1 can transmit a packet every connection about 1170ms.
interval, as the connection with the node S1 is always enabled. Fig. 18 shows the end-to-end delay distribution for the
The delay experienced by the packet with source M1 is a packets with source node M2 (i.e., four-hop packets).
multiple of Tci (depending on the number of higher priority Almost all of the packets (about 95%) were delivered to
packets enqueued in the priority queue) plus the waiting time the final destination within 1050ms. An end-to-end delay
obtained in experiments on a real testbed. To the best of [13] J. Medina-García, T. Sánchez-Rodríguez, J. A. G. Galán, A. Delgado,
our knowledge, in the literature there are no other mecha- F. Gómez-Bravo, and R. Jiménez, ‘‘A wireless sensor system for real-time
monitoring and fault detection of motor arrays,’’ Sensors, vol. 17, no. 3,
nisms supporting real-time communication over BLE mesh p. 469, 2017.
networks. Other approaches addressing mesh topologies over [14] L. Leonardi, G. Patti, F. Battaglia, and L. Lo Bello, ‘‘Simulative assess-
BLE (e.g., Mesh BLE [8]) work in a best-effort way, there- ments of the IEEE 802.15.4 CSMA/CA with priority channel access in
structural health monitoring scenarios,’’ in Proc. IEEE 15th Int. Conf. Ind.
fore, they can be more bandwidth-efficient and may also Informat. (INDIN), Emden, Germany, Jul. 2017, pp. 375–380.
provide better average performance than MRT-BLE, but [15] P. Trelsmo, P. Di Marco, P. Skillermark, R. Chirikov, and J. Östman,
they cannot temporally isolate time-critical flows and can- ‘‘Evaluating IPv6 connectivity for IEEE 802.15.4 and Bluetooth low
energy,’’ in Proc. Wireless Commun. Netw. Conf. Workshops (WCNCW),
not guarantee end-to-end delay bounds to individual flows. San Francisco, CA, USA, Mar. 2017, pp. 1–6.
As a result, these approaches cannot cope with the real- [16] R. Natarajan, P. Zand, and M. Nabi, ‘‘Analysis of coexistence between
time requirements of industrial communications. For this IEEE 802.15. 4, BLE and IEEE 802.11 in the 2.4 GHz ISM band,’’ in
Proc. 42nd Annu. Conf. IEEE Ind. Electron. Soc. (IECON), Firenze, Italy,
reason, no meaningful performance comparison between Oct. 2016, pp. 6025–6032.
MRT-BLE and such approaches can be made for the pur- [17] M. H. Dwijaksara, W. S. Jeon, and D. G. Jeong, ‘‘A channel access scheme
poses of this paper. The MRT-BLE protocol is a connection- for Bluetooth low energy to support delay-sensitive applications,’’ in Proc.
oriented protocol, as the main aim here was on ensuring a 27th Annu. Int. Symp. Pers., Indoor, Mobile Radio Commun. (PIMRC),
Valencia, Spain, Sep. 2016, pp. 1–6.
bounded packet delivery delay over multihop mesh IWSN. [18] K. Cho, G. Park, W. Cho, J. Seo, and K. Han, ‘‘Performance analysis
The protocol therefore foresees that the network topology of device discovery of Bluetooth low energy (BLE) networks,’’ Comput.
is offline configured. This feature limits the applicability of Commun., vol. 81, pp. 72–85, May 2016.
[19] J. Seo, K. Cho, W. Cho, G. Park, and K. Han, ‘‘A discovery scheme based
MRT-BLE to IWSN that are not characterized by the presence on carrier sensing in self-organizing Bluetooth low energy networks,’’
of mobile nodes. Future works will therefore investigate a J. Netw. Comput. Appl., vol. 65, pp. 72–83, Apr. 2016.
dynamic configuration mechanism to allow for both more [20] M. Marinoni, A. Biondi, P. Buonocunto, G. Franchino, D. Cesarini, and
G. Buttazzo, ‘‘Real-time analysis and design of a dual protocol support
flexibility and the free movement of nodes. Another line for Bluetooth LE devices,’’ IEEE Trans. Ind. Informat., vol. 13, no. 1,
of investigation includes a dynamic topology management pp. 80–91, Feb. 2017.
mechanism, as the one proposed in [38], and a stochastic [21] J. Kim, S. Kang, and J. Park, ‘‘Bluetooth-based tree topology network for
wireless industrial applications,’’ in Proc. 15th Int. Conf. Control, Autom.
response-time analysis able to take into account also aperi- System, Busan, South Korea, Oct. 2015, pp. 1305–1308.
odic traffic flows. [22] C. Jung, K. Kim, J. Seo, B. N. Silva, and K. Han, ‘‘Topology configuration
and multihop routing protocol for Bluetooth low energy networks,’’ IEEE
Access, vol. 5, pp. 9587–9598, May 2017.
REFERENCES [23] P. Zenker, S. Krug, M. Binhack, and J. Seitz, ‘‘Evaluation of BLE
[1] Bluetooth Core Specification Version 4.1, Bluetooth SIG, Kirkland, WA, Mesh capabilities: A case study based on CSRMesh,’’ in Proc. 8th Int.
USA, Dec. 2013. Conf. Ubiquitous Future Netw. (ICUFN), Vienna, Austria, Jul. 2016,
[2] M. Siekkinen, M. Hiienkari, J. K. Nurminen, and J. Nieminen, ‘‘How pp. 790–795.
low energy is Bluetooth low energy? Comparative measurements with [24] D. Hortelano, T. Olivares, M. C. Ruiz, C. Garrido-Hidalgo, and V. López,
ZigBee/802.15.4,’’ in Proc. IEEE Wireless Commun. Netw. Conf. Work- ‘‘From sensor networks to Internet of Things. Bluetooth low energy, a
shops (WCNCW), Apr. 2012, pp. 232–237. standard for this evolution,’’ Sensors, vol. 17, no. 2, p. 372, 2017.
[3] E. Toscano and L. L. Bello, ‘‘Comparative assessments of IEEE [25] Qualcomm Bluetooth Low Energy Solutions, CSRmesh and CSR1010
802.15.4/ZigBee and 6LoWPAN for low-power industrial WSNs in real- (Datasheet 87-CE855-1 Rev A), Qualcomm Int., San Diego, CA, USA,
istic scenarios,’’ in Proc. 9th IEEE Int. Workshop Factory Commun. Syst. Sep. 2016.
(WFCS), May 2012, pp. 115–124. [26] S. M. Darroudi and C. Gomez, ‘‘Bluetooth low energy mesh networks:
[4] R. Rondon, M. Gidlund, and K. Landernas, ‘‘Evaluating Bluetooth low A survey,’’ Sensors, vol. 17, no. 7, p. 1467, 2017.
energy suitability for time-critical industrial IoT applications,’’ Int. J. [27] S. Raza, P. Misra, Z. He, and T. Voigt, ‘‘Bluetooth smart: An enabling
Wireless Inf. Netw., vol. 24, no. 3, pp. 278–290, Sep. 2017. technology for the Internet of Things,’’ in Proc. 11th Int. Conf. Wireless
[5] Bluetooth Core Specification Version 4.2, Bluetooth SIG, Kirkland, WA, Mobile Comput., Netw. Commun. (WiMob), Abu Dhabi, UAE, Oct. 2015,
USA, Dec. 2014. pp. 155–162.
[6] Bluetooth Core Specification Version 5.0, Bluetooth SIG, Kirkland, WA, [28] T. Zhang, J. Lu, F. Hu, and Q. Hao, ‘‘Bluetooth low energy for wearable
USA, Dec. 2016. sensor-based healthcare systems,’’ in Proc. IEEE Healthcare Innov. Conf.
[7] G. Patti, L. Leonardi, and L. Lo Bello, ‘‘A Bluetooth Low Energy real-time (HIC), Oct. 2014, pp. 251–254.
protocol for industrial wireless mesh networks,’’ in Proc. 42nd Annu. Conf. [29] G. Pau, M. Collotta, and V. Maniscalco, ‘‘Bluetooth 5 energy management
IEEE Ind. Electron. Soc. (IECON), Firenze, Italy, Oct. 2016. through a Fuzzy-PSO solution for mobile devices of Internet of Things,’’
[8] Mesh Profile Specifications 1.0, Bluetooth SIG, Kirkland, WA, USA, Energies, vol. 10, no. 7, p. 992, 2017.
Jul. 2017. [30] R. Rondón, K. Landernäs, and M. Gidlund, ‘‘An analytical model of the
[9] M. Collotta and G. Pau, ‘‘A solution based on Bluetooth low energy effective delay performance for Bluetooth low energy,’’ in Proc. 27th
for smart home energy management,’’ Energies, vol. 8, no. 10, Annu. Int. Symp. Pers., Indoor, Mobile Radio Commun. (PIMRC), Valencia,
pp. 11916–11938, 2015. Spain, Sep. 2016, pp. 1–6.
[10] M. Collotta and G. Pau, ‘‘A novel energy management approach for smart [31] M. Grover, S. K. Pardeshi, N. Singh, and S. Kumar, ‘‘Bluetooth low energy
homes using Bluetooth low energy,’’ IEEE J. Sel. Areas Commun., vol. 33, for industrial automation,’’ in Proc. 2nd Int. Conf. Electron. Commun. Syst.
no. 12, pp. 2988–2996, Dec. 2015. (ICECS), Coimbatore, India, Feb. 2015, pp. 512–515.
[11] L. Lo Bello, O. Mirabella, and N. Torrisi, ‘‘Modelling and evaluating [32] BlueNRG, BlueNRG-MS Stacks Programming Guidelines (Programming
traceability systems in food manufacturing chains,’’ in Proc. 13th IEEE Manual PM0237), STMicroelectronics, Geneva, Switzerland, Dec. 2016.
Int. Workshops Enabling Technol., Infrastruct. Collaborat. Enterprises, [33] BlueNRG-MS Development Kits (User Manual UM1870), STMicroelec-
Jun. 2004, pp. 173–179. tronics, Geneva, Switzerland, May 2016.
[12] B. B. Sánchez, R. Alcarria, D. Martín, and T. Robles, ‘‘TF4SM: A frame- [34] G. A. Kaczynski, L. Lo Bello, and T. Nolte, ‘‘Deriving exact stochastic
work for developing traceability solutions in small manufacturing compa- response times of periodic tasks in hybrid priority-driven soft real-time sys-
nies,’’ Sensors, vol. 15, no. 11, pp. 29478–29510, 2015. [Online]. Avail- tems,’’ in Proc. IEEE Int. Conf. Emerg. Technol. Factory Autom. (ETFA),
able: http://www.mdpi.com/1424-8220/15/11/29478 Patras, Greece, Sep. 2007, pp. 101–110.
[35] M. Joseph and P. K. Pandya, ‘‘Finding response times in a real-time GAETANO PATTI received the M.S. and Ph.D.
system,’’ Comput. J., vol. 29, no. 5, pp. 390–395, Oct. 1986. degrees from the University of Catania, Italy,
[36] J. Lehoczky, ‘‘Fixed priority scheduling of periodic task sets with arbitrary in 2013 and 2017, respectively. He is currently
deadlines,’’ in Proc. IEEE Real-time Syst. Symp. (RTSS), Lake Buena Vista, a Post-Doctoral Researcher with the Department
FL, USA, Dec. 1990, pp. 201–209. of Electrical, Electronics, and Computer Engineer-
[37] R. I. Davis, A. Burns, R. J. Bril, and J. J. Lukkien, ‘‘Controller area network ing, University of Catania.
(CAN) schedulability analysis: Refuted, revisited and revised,’’ Real-Time He has co-authored over 20 papers published in
Syst., vol. 35, pp. 239–272, Jan. 2007.
the proceedings of international conferences and
[38] E. Toscano and L. L. Bello, ‘‘A topology management protocol with
in important international journals. Since 2012, he
bounded delay for Wireless Sensor Networks,’’ in Proc. IEEE Int. Conf.
Emerg. Technol. Factory Autom. (ETFA), Sep. 2008, pp. 942–951. has been focusing in the field of real-time indus-
trial networks, automotive networks, wireless sensor and actuator networks,
powerline communications and networks for mobile robot applications. He
is a member of the IEEE IES Technical Committee on Factory Automation
(Subcommittee on In-Vehicle Embedded Systems).