908 research outputs found

    Spectrum Utilization and Congestion of IEEE 802.11 Networks in the 2.4 GHz ISM Band

    Get PDF
    Wi-Fi technology, plays a major role in society thanks to its widespread availability, ease of use and low cost. To assure its long term viability in terms of capacity and ability to share the spectrum efficiently, it is of paramount to study the spectrum utilization and congestion mechanisms in live environments. In this paper the service level in the 2.4 GHz ISM band is investigated with focus on todays IEEE 802.11 WLAN systems with support for the 802.11e extension. Here service level means the overall Quality of Service (QoS), i.e. can all devices fulfill their communication needs? A crosslayer approach is used, since the service level can be measured at several levels of the protocol stack. The focus is on monitoring at both the Physical (PHY) and the Medium Access Control (MAC) link layer simultaneously by performing respectively power measurements with a spectrum analyzer to assess spectrum utilization and packet sniffing to measure the congestion. Compared to traditional QoS analysis in 802.11 networks, packet sniffing allows to study the occurring congestion mechanisms more thoroughly. The monitoring is applied for the following two cases. First the influence of interference between WLAN networks sharing the same radio channel is investigated in a controlled environment. It turns out that retry rate, Clear-ToSend (CTS), Request-To-Send (RTS) and (Block) Acknowledgment (ACK) frames can be used to identify congestion, whereas the spectrum analyzer is employed to identify the source of interference. Secondly, live measurements are performed at three locations to identify this type of interference in real-live situations. Results show inefficient use of the wireless medium in certain scenarios, due to a large portion of management and control frames compared to data content frames (i.e. only 21% of the frames is identified as data frames)

    Characterization of Unplanned Metropolitan Wireless Networks

    Get PDF
    Mobile Internet penetration has grown steadily over the last few years. Although most of today’s users have access through their 3G Mobile Operators, there are still regions that are under-covered for various reasons. Wireless Mesh Networks (WMN) can play an important role by providing the means to fully cover those underserved regions. Due to their intrinsic nature, WMN require a critical mass of nodes belonging to the mesh in order to be effective. In this paper we present a study conducted in Aveiro, Portugal which intends to draw some conclusions on the feasibility of deploying a WMN in small to medium cities based on the cooperation of its inhabitants and on off-the-shelf wireless equipment

    Overhearing the Wireless Interface for 802.11-based Positioning Systems

    Full text link
    Not only the proliferation of 802.11, but also the capability to determine the position of mobile devices make 802.11 highly appealing for many application areas. Typically, a mobile device that wants to know its position regularly performs active or passive scans to obtain the signal strength measurements of neighboring access points. Active and passive scanning are survey techniques originally intended to be performed once in a while to learn about the presence and signal reception quality of access points within communication range. Based on this survey the best suitable access point is selected as the gateway to the wired network. However, so far, no investigations are known to have been launched into how regular scanning affects concurrent data transmissions from an end-user point of view. In this paper, we explore how common data communication is affected while actively or passively scanning at the same time. We found that with an active scanning interval of less than 2 seconds the network conditions such as throughput and round trip delay are insufficient for interactive applications. The same is true for passive scanning if a scanning interval of less than 7 seconds is chosen. Furthermore, we present a novel scan scheme called Monitor Sniffing to reduce client service disruptions. Monitor Sniffing exploits the fact that 802.11 operates on overlapping channels by overhearing the wireless interface. We have implemented our Monitor Sniffing algorithm using commodity 802.11g hardware, and we demonstrate that it is faster than active and passive scanning and does not disturb concurrent data communication. Finally, our approach only requires software modifications on the client side, making the adoption process quite easy

    Experimental Study on Key Generation for Physical Layer Security in Wireless Communications

    Get PDF
    This paper presents a thorough experimental study on key generation principles, i.e., temporal variation, channel reciprocity, and spatial decorrelation, through a testbed constructed by using wireless open-access research platform. It is the first comprehensive study through: 1) carrying out a number of experiments in different multipath environments, including an anechoic chamber, a reverberation chamber, and an indoor office environment, which represents little, rich, and moderate multipath, respectively; 2) considering static, object moving, and mobile scenarios in these environments, which represents different levels of channel dynamicity; and 3) studying two most popular channel parameters, i.e., channel state information and received signal strength. Through results collected from over a hundred tests, this paper offers insights to the design of a secure and efficient key generation system. We show that multipath is essential and beneficial to key generation as it increases the channel randomness. We also find that the movement of users/objects can help introduce temporal variation/randomness and help users reach an agreement on the keys. This paper complements existing research by experiments constructed by a new hardware platform

    On the Asymptotic Validity of the Decoupling Assumption for Analyzing 802.11 MAC Protocol

    Get PDF
    Performance evaluation of the 802.11 MAC protocol is classically based on the decoupling assumption, which hypothesizes that the backoff processes at different nodes are independent. This decoupling assumption results from mean field convergence and is generally true in transient regime in the asymptotic sense (when the number of wireless nodes tends to infinity), but, contrary to widespread belief, may not necessarily hold in stationary regime. The issue is often related with the existence and uniqueness of a solution to a fixed point equation; however, it was also recently shown that this condition is not sufficient; in contrast, a sufficient condition is a global stability property of the associated ordinary differential equation. In this paper, we give a simple condition that establishes the asymptotic validity of the decoupling assumption for the homogeneous case. We also discuss the heterogeneous and the differentiated service cases and formulate a new ordinary differential equation. We show that the uniqueness of a solution to the associated fixed point equation is not sufficient; we exhibit one case where the fixed point equation has a unique solution but the decoupling assumption is not valid in the asymptotic sense in stationary regime.Comment: 16 pages, 4 figures, accepted for publication in IEEE Transactions on Information Theor
    corecore