367 research outputs found

    A New Method of User Association in Wireless Mesh Networks

    Get PDF
    The IEEE 802.11 based wireless mesh networks (WMNs) are becoming the promising technology to provide last-mile broadband Internet access to the users. In order to access the Internet through the pre-deployed WMN, the user has to associate with one of the access points (APs) present in the network. In WMN, it is very common that the user device can have multiple APs in its vicinity. Since the user performance majorly depends on the associated AP, how to select the best AP is always remaining as a challenging research problem in WMN. The traditional method of AP selection is based on received signal strength (RSS) and it is proven inefficient in the literature as the method does not consider AP load, channel conditions, etc. This paper proposes a new method of user association in WMN such that the user selects the AP based on achievable end-to-end throughput measured in the presence of other interfering APs. The proposed association metric is independent of routing protocol and routing metric used in WMN. The simulation results show that our method outperforms the RSS based AP selection method in WMN

    Capacity Analysis of IEEE 802.11ah WLANs for M2M Communications

    Full text link
    Focusing on the increasing market of the sensors and actuators networks, the IEEE 802.11ah Task Group is currently working on the standardization of a new amendment. This new amendment will operate at the sub-1GHz band, ensure transmission ranges up to 1 Km, data rates above 100 kbps and very low power operation. With IEEE 802.11ah, the WLANs will offer a solution for applications such as smart metering, plan automation, eHealth or surveillance. Moreover, thanks to a hierarchical signalling, the IEEE 802.11ah will be able to manage a higher number of stations (STAs) and improve the 802.11 Power Saving Mechanisms. In order to support a high number of STAs, two different signalling modes are proposed, TIM and Non-TIM Offset. In this paper we present a theoretical model to predict the maximum number of STAs supported by both modes depending on the traffic load and the data rate used. Moreover, the IEEE 802.11ah performance and energy consumption for both signalling modes and for different traffic patterns and data rates is evaluated. Results show that both modes achieve similar Packet Delivery Ratio values but the energy consumed with the TIM Offset is, in average, a 11.7% lower.Comment: Multiple Access Communications 201

    LINK ADAPTATION IN WIRELESS NETWORKS: A CROSS-LAYER APPROACH

    Get PDF
    Conventional Link Adaptation Techniques in wireless networks aim to overcome harsh link conditions caused by physical environmental properties, by adaptively regulating modulation, coding and other signal and protocol specific parameters. These techniques are essential for the overall performance of the networks, especially for environments where the ambient noise level is high or the noise level changes rapidly. Link adaptation techniques answer the questions of What to change? and When to change? in order to improve the present layer performance. Once these decisions are made, other layers are expected to function perfectly with the new communication channel conditions. In our work, we have shown that this assumption does not always hold; and provide two mechanisms that lessen the negative outcomes caused by these decisions. Our first solution, MORAL, is a MAC layer link adaptation technique which utilizes the physical transmission information in order to create differentiation between wireless users with different communication capabilities. MORAL passively collects information from its neighbors and re-aligns the MAC layer parameters according to the observed conditions. MORAL improves the fairness and total throughput of the system through distributing the mutually shared network assets to the wireless users in a fairer manner, according to their capabilities. Our second solution, Data Rate and Fragmentation Aware Ad-hoc Routing protocol, is a network layer link adaptation technique which utilizes the physical transmission information in order to differentiate the wireless links according to their communication capabilities. The proposed mechanism takes the physical transmission parameters into account during the path creation process and produces energy-efficient network paths. The research demonstrated in this dissertation contributes to our understanding of link adaptation techniques and broadens the scope of such techniques beyond simple, one-step physical parameter adjustments. We have designed and implemented two cross-layer mechanisms that utilize the physical layer information to better adapt to the varying channel conditions caused by physical link adaptation mechanisms. These mechanisms has shown that even though the Link Adaptation concept starts at the physical layer, its effects are by no means restricted to this layer; and the wireless networks can benefit considerably by expanding the scope of this concept throughout the entire network stack

    Measuring the service level in the 2.4 GHz ISM band

    Get PDF
    In this report we provide the findings of the 2.4 GHz service level research. Here service level means the following: can all devices in the 2.4 GHz band fulfill their communication needs. In other words this corresponds to the overall Quality of Service (QoS). The project is a short research exploratory project of about 400 hours in collaboration with Agentschap Telecom, the Dutch Radiocommunications Agency. First of all a survey has been made to investigate which measurement methods can be used to assess the service level in the 2.4 GHz. Here the focus is on IEEE 802.11b/g/n (WiFi) systems. The service level can be measured at several levels of the OSI model: spectrum sensing (physical layer) and packet sniffers (datalink layer). Power level measurements are used to assess the utilization of the 2.4 GHz ISM band. On the other hand packet sniffers are an appropriate method to measure congestion and to pinpoint problems. Secondly, in this project the interferer mechanisms of several sources (microwave, wireless A/V transmitter, Bluetooth, second WiFi network) have been measured in a controlled environment. It turns out that interferers not only increase retry rate, but also trigger unwanted WiFi mechanisms; especially the hidden node mechanism (Request To Send (RTS)/Clear To Send (CTS) packets). So this means that the CTS/RTS control packets, but also the retry rate can be used to identify congestion. The spectrum measurement results allow to identify which interferer source causes congestion. Finally, also a measurement setup is presented that allows to measure the service level. In addition, initial measurements are provided of live environments (college room, office room, city centre). The results show inefficient use of the wireless medium in certain scenarios, due to a large frame rate of management and control packets compared to the data frame rate. In a busy WiFi environment (college room) only 20% of all frames are data frames. Of these data frames only 1/10 are actual data frames as most data frames are so-called null frames; used to keep a WiFi connection alive in power save mode. From all frames about 70% are control frames of which most are ACK frames and in less extend CTS/RTS frames. More research is required to identify the reasons for the high number of control frames. It is likely that there is significant interference, probably due to the many WiFi devices. This is also depicted by the retry frame rate (7%). Combining spectrum sensing with packet sniffing seems to be a good method to assess the service level in the 2.4 GHz ISM band. However, the interferer mechanisms that occur between WiFi networks, WiFi devices and other technologies are complex. More research is needed to enhance the developed proof-of-concept demonstrator and to have a better understanding of the interferer mechanisms in WiFi systems

    Performance modeling of a bottleneck node in an IEEE 802.11 ad-hoc network

    Get PDF
    This paper presents a performance analysis of wireless ad-hoc networks, with IEEE 802.11 as the underlying Wireless LAN technology. WLAN has, due to the fair radio resource sharing at the MAC-layer, the tendency to share the capacity equally amongst the active nodes, irrespective of their loads. An inherent drawback of this sharing policy is that a node that serves as a relay-node for multiple flows is likely to become a bottleneck. This paper proposes to model such a bottleneck by a fluid-flow model. Importantly, this is a model at the flow-level: flows arrive at the bottleneck node, and are served according to the sharing policy mentioned above. Assuming Poisson initiations of new flow transfers, we obtain insightful, robust, and explicit expressions for characteristics related to the overall flow transfer time, the buffer occupancy, and the packet delay at the bottleneck node. The analysis is enabled by a translation of the buffer dynamics at the bottleneck node in terms of an M/G/1 queueing model. We conclude the paper by an assessment of the impact of alternative sharing policies (which can be obtained by the IEEE 802.11E version), in order to improve the performance of the bottleneck

    IEEE 802.11 user fingerprinting and its applications for intrusion detection

    Get PDF
    AbstractEasy associations with wireless access points (APs) give users temporal and quick access to the Internet. It needs only a few seconds to take their machines to hotspots and do a little configuration in order to have Internet access. However, this portability becomes a double-edged sword for ignorant network users. Network protocol analyzers are typically developed for network performance analysis. Nonetheless, they can also be used to reveal user’s privacy by classifying network traffic. Some characteristics in IEEE 802.11 traffic particularly help identify users. Like actual human fingerprints, there are also unique traffic characteristics for each network user. They are called network user fingerprints, by tracking which more than half of network users can be connected to their traffic even with medium access control (MAC) layer pseudonyms. On the other hand, the concept of network user fingerprint is likely to be a powerful tool for intrusion detection and computer/digital forensics. As with actual criminal investigations, comparison of sampling data to training data may increase confidence in criminal specification. This article focuses on a survey on a user fingerprinting technique of IEEE 802.11 wireless LAN traffic. We also summarize some of the researches on IEEE 802.11 network characteristic analysis to figure out rogue APs and MAC protocol misbehaviors
    • 

    corecore