367 research outputs found
A New Method of User Association in Wireless Mesh Networks
The IEEE 802.11 based wireless mesh networks (WMNs) are becoming the promising technology to provide last-mile broadband Internet access to the users. In order to access the Internet through the pre-deployed WMN, the user has to associate with one of the access points (APs) present in the network. In WMN, it is very common that the user device can have multiple APs in its vicinity. Since the user performance majorly depends on the associated AP, how to select the best AP is always remaining as a challenging research problem in WMN. The traditional method of AP selection is based on received signal strength (RSS) and it is proven inefficient in the literature as the method does not consider AP load, channel conditions, etc. This paper proposes a new method of user association in WMN such that the user selects the AP based on achievable end-to-end throughput measured in the presence of other interfering APs. The proposed association metric is independent of routing protocol and routing metric used in WMN. The simulation results show that our method outperforms the RSS based AP selection method in WMN
Capacity Analysis of IEEE 802.11ah WLANs for M2M Communications
Focusing on the increasing market of the sensors and actuators networks, the
IEEE 802.11ah Task Group is currently working on the standardization of a new
amendment. This new amendment will operate at the sub-1GHz band, ensure
transmission ranges up to 1 Km, data rates above 100 kbps and very low power
operation. With IEEE 802.11ah, the WLANs will offer a solution for applications
such as smart metering, plan automation, eHealth or surveillance. Moreover,
thanks to a hierarchical signalling, the IEEE 802.11ah will be able to manage a
higher number of stations (STAs) and improve the 802.11 Power Saving
Mechanisms. In order to support a high number of STAs, two different signalling
modes are proposed, TIM and Non-TIM Offset. In this paper we present a
theoretical model to predict the maximum number of STAs supported by both modes
depending on the traffic load and the data rate used. Moreover, the IEEE
802.11ah performance and energy consumption for both signalling modes and for
different traffic patterns and data rates is evaluated. Results show that both
modes achieve similar Packet Delivery Ratio values but the energy consumed with
the TIM Offset is, in average, a 11.7% lower.Comment: Multiple Access Communications 201
LINK ADAPTATION IN WIRELESS NETWORKS: A CROSS-LAYER APPROACH
Conventional Link Adaptation Techniques in wireless networks aim to overcome harsh link conditions caused by physical environmental properties, by adaptively regulating modulation, coding and other signal and protocol specific parameters. These techniques are essential for the overall performance of the networks, especially for environments where the ambient noise level is high or the noise level changes rapidly.
Link adaptation techniques answer the questions of What to change? and When to change? in order to improve the present layer performance. Once these decisions are made, other layers are expected to function perfectly with the new communication channel conditions. In our work, we have shown that this assumption does not always hold; and provide two mechanisms that lessen the negative outcomes caused by these decisions.
Our first solution, MORAL, is a MAC layer link adaptation technique which utilizes the physical transmission information in order to create differentiation between wireless users with different communication capabilities. MORAL passively collects information from its neighbors and re-aligns the MAC layer parameters according to the observed conditions. MORAL improves the fairness and total throughput of the system through distributing the mutually shared network assets to the wireless users in a fairer manner, according to their capabilities.
Our second solution, Data Rate and Fragmentation Aware Ad-hoc Routing protocol, is a network layer link adaptation technique which utilizes the physical transmission information in order to differentiate the wireless links according to their communication capabilities. The proposed mechanism takes the physical transmission parameters into account during the path creation process and produces energy-efficient network paths.
The research demonstrated in this dissertation contributes to our understanding of link adaptation techniques and broadens the scope of such techniques beyond simple, one-step physical parameter adjustments. We have designed and implemented two cross-layer mechanisms that utilize the physical layer information to better adapt to the varying channel conditions caused by physical link adaptation mechanisms. These mechanisms has shown that even though the Link Adaptation concept starts at the physical layer, its effects are by no means restricted to this layer; and the wireless networks can benefit considerably by expanding the scope of this concept throughout the entire network stack
Measuring the service level in the 2.4 GHz ISM band
In this report we provide the findings of the 2.4 GHz service level research. Here service level means the following: can all devices in the 2.4 GHz band fulfill their communication needs. In other words this corresponds to the overall Quality of Service (QoS). The project is a short research exploratory project of about 400 hours in collaboration with Agentschap Telecom, the Dutch Radiocommunications Agency. First of all a survey has been made to investigate which measurement methods can be used to assess the service level in the 2.4 GHz. Here the focus is on IEEE 802.11b/g/n (WiFi) systems. The service level can be measured at several levels of the OSI model: spectrum sensing (physical layer) and packet sniffers (datalink layer). Power level measurements are used to assess the utilization of the 2.4 GHz ISM band. On the other hand packet sniffers are an appropriate method to measure congestion and to pinpoint problems. Secondly, in this project the interferer mechanisms of several sources (microwave, wireless A/V transmitter, Bluetooth, second WiFi network) have been measured in a controlled environment. It turns out that interferers not only increase retry rate, but also trigger unwanted WiFi mechanisms; especially the hidden node mechanism (Request To Send (RTS)/Clear To Send (CTS) packets). So this means that the CTS/RTS control packets, but also the retry rate can be used to identify congestion. The spectrum measurement results allow to identify which interferer source causes congestion. Finally, also a measurement setup is presented that allows to measure the service level. In addition, initial measurements are provided of live environments (college room, office room, city centre). The results show inefficient use of the wireless medium in certain scenarios, due to a large frame rate of management and control packets compared to the data frame rate. In a busy WiFi environment (college room) only 20% of all frames are data frames. Of these data frames only 1/10 are actual data frames as most data frames are so-called null frames; used to keep a WiFi connection alive in power save mode. From all frames about 70% are control frames of which most are ACK frames and in less extend CTS/RTS frames. More research is required to identify the reasons for the high number of control frames. It is likely that there is significant interference, probably due to the many WiFi devices. This is also depicted by the retry frame rate (7%). Combining spectrum sensing with packet sniffing seems to be a good method to assess the service level in the 2.4 GHz ISM band. However, the interferer mechanisms that occur between WiFi networks, WiFi devices and other technologies are complex. More research is needed to enhance the developed proof-of-concept demonstrator and to have a better understanding of the interferer mechanisms in WiFi systems
Performance modeling of a bottleneck node in an IEEE 802.11 ad-hoc network
This paper presents a performance analysis of wireless ad-hoc networks, with IEEE 802.11 as the underlying Wireless LAN technology. WLAN has, due to the fair radio resource sharing at the MAC-layer, the tendency to share the capacity equally amongst the active nodes, irrespective of their loads. An inherent drawback of this sharing policy is that a node that serves as a relay-node for multiple flows is likely to become a bottleneck. This paper proposes to model such a bottleneck by a fluid-flow model. Importantly, this is a model at the flow-level: flows arrive at the bottleneck node, and are served according to the sharing policy mentioned above. Assuming Poisson initiations of new flow transfers, we obtain insightful, robust, and explicit expressions for characteristics related to the overall flow transfer time, the buffer occupancy, and the packet delay at the bottleneck node. The analysis is enabled by a translation of the buffer dynamics at the bottleneck node in terms of an M/G/1 queueing model. We conclude the paper by an assessment of the impact of alternative sharing policies (which can be obtained by the IEEE 802.11E version), in order to improve the performance of the bottleneck
Recommended from our members
Design of rate-adaptive MAC and medium aware routing protocols for multi-rate, multi-hop wireless networks
This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University.The IEEE 802.11 standard conformant wireless communication stations have multi-rate transmission capability. To achieve greater communication efficiency, multi-rate capable stations use rateadaptation to select appropriate transmission rate according to variations in the channel quality. The
thesis presents two rate-adaptation schemes, each belonging to one of the two classes of rateadaptation schemes i.e.(1) the frame-transmission statistics based schemes, and (2) Signal-to-Noise Ratio (SNR) based, closed loop schemes. The SNR-based rate-adaptation scheme, proposed in this thesis uses a novel mechanism of delivering a receiverâs feedback to a transmitter; without requiring any modification in the standard frames as suggested by existing research. The frame-transmissionstatistics
based rate adaptation solution uses an on-demand incremental strategy for selecting a
rate-selection threshold. This solution is based on a cross-layer communication framework, where the rate-adaptation module uses information to/from the Application layer along with relevant information from the Medium Access Control (MAC) sub-layer. The proposed solutions are highly responsive when compared with existing rate-adaptation schemes; responsiveness is one of the key
factors in the design of such protocols. The novel feedback mechanism makes it possible to achieve frame-loss differentiation with just three frames, avoiding the use of Request To Send/ Clear To Send (RTS/CTS) frames and further delays in this process. Performance tests have affirmed that the
proposed rate-adaptation schemes are energy efficient; with efficiency up to 19% in specific test scenarios. In terms of throughput and frame loss-differentiation mechanisms, the proposed schemes have shown significantly better performance.Routing protocols for Mobile Ad-Hoc Networks (MANETs) use broadcast frames during the
route discovery process. The 802.11 mandates the use of different transmission rates for broadcast
and unicast (data-) frames. In many cases it causes creation of communication gray zones, where stations which are marked as âreachable neighboursâ using the broadcast frames (using lower transmission rate) are not accessible during normal, unicast communication (mainly at a higher
rate). Similarly, higher device density, interference and mobility cause variable medium access delays. The IEEE 802.11e introduces four different MAC level queues for four access categories, maintaining service priority within the queues; which implies that frames from a higher priority
queue are serviced more frequently than those belonging to lower priority queues. Such an enhancement at the MAC sub-layer introduces uneven queuing delays. Conventional routing protocols are unaware of such MAC specific constraints and as a result these factors are not considered which result in severe performance deterioration. To meet such challenges, the thesis presents a medium aware distance vector (MADV) routing protocol for MANETs. MADV uses MAC and physical layer (PHY) specific information in the route metric and maintains a separate route per-AC-per-destination in its routing tables. The MADV-metric can be incorporated into various routing rotocols and its applicability is determined by the possibility of provision of MAC dependent arameters that are used to determine the hop-by-hop MADV-metric values. Simulation tests and omparison with existing MANET protocols demonstrate the effectiveness of incorporating the medium dependent parameters and show that MADV is significantly better in terms of end-to-end
delay and throughput
IEEE 802.11 user fingerprinting and its applications for intrusion detection
AbstractEasy associations with wireless access points (APs) give users temporal and quick access to the Internet. It needs only a few seconds to take their machines to hotspots and do a little configuration in order to have Internet access. However, this portability becomes a double-edged sword for ignorant network users. Network protocol analyzers are typically developed for network performance analysis. Nonetheless, they can also be used to reveal userâs privacy by classifying network traffic. Some characteristics in IEEE 802.11 traffic particularly help identify users. Like actual human fingerprints, there are also unique traffic characteristics for each network user. They are called network user fingerprints, by tracking which more than half of network users can be connected to their traffic even with medium access control (MAC) layer pseudonyms. On the other hand, the concept of network user fingerprint is likely to be a powerful tool for intrusion detection and computer/digital forensics. As with actual criminal investigations, comparison of sampling data to training data may increase confidence in criminal specification. This article focuses on a survey on a user fingerprinting technique of IEEE 802.11 wireless LAN traffic. We also summarize some of the researches on IEEE 802.11 network characteristic analysis to figure out rogue APs and MAC protocol misbehaviors
- âŠ