32 research outputs found

    Opportunistic Use of Client Repeaters to Improve Performance of WLANs

    Get PDF
    Currently deployed IEEE 802.11WLANs (Wi-Fi networks) share access point (AP) bandwidth on a per-packet basis. However, the various stations communicating with the AP often have different signal qualities, resulting in different transmission rates. This induces a phenomenon known as the rate anomaly problem, in which stations with lower signal quality transmit at lower rates and consume a significant majority of airtime, thereby dramatically reducing the throughput of stations transmitting at high rates. We propose a practical, deployable system, called SoftRepeater, in which stations cooperatively address the rate anomaly problem. Specifically, higher-rate Wi-Fi stations opportunistically transform themselves into repeaters for stations with low data-rates when transmitting to/from the AP. The key challenge is to determine when it is beneficial to enable the repeater functionality. In this paper, we propose an initiation protocol that ensures that repeater functionality is enabled only when appropriate. Also, our system can run directly on top of today's 802.11 infrastructure networks. We also describe a novel, zero-overhead network coding scheme that further alleviates undesirable symptoms of the rate anomaly problem. We evaluate our system using simulation and testbed implementation, and find that SoftRepeater can improve cumulative throughput by up to 200%

    A software framework for alleviating the effects of MAC-aware jamming attacks in wireless access networks

    Get PDF
    The IEEE 802.11 protocol inherently provides the same long-term throughput to all the clients associated with a given access point (AP). In this paper, we first identify a clever, low-power jamming attack that can take advantage of this behavioral trait: the placement of a lowpower jammer in a way that it affects a single legitimate client can cause starvation to all the other clients. In other words, the total throughput provided by the corresponding AP is drastically degraded. To fight against this attack, we design FIJI, a cross-layer anti-jamming system that detects such intelligent jammers and mitigates their impact on network performance. FIJI looks for anomalies in the AP load distribution to efficiently perform jammer detection. It then makes decisions with regards to optimally shaping the traffic such that: (a) the clients that are not explicitly jammed are shielded from experiencing starvation and, (b) the jammed clients receive the maximum possible throughput under the given conditions. We implement FIJI in real hardware; we evaluate its efficacy through experiments on two wireless testbeds, under different traffic scenarios, network densities and jammer locations. We perform experiments both indoors and outdoors, and we consider both WLAN and mesh deployments. Our measurements suggest that FIJI detects such jammers in realtime and alleviates their impact by allocating the available bandwidth in a fair and efficient way. © Springer Science+Business Media

    Enhanced snr-based admission control algorithm for vehicular ad-hoc network

    Get PDF
    Vehicular Ad-hoc Network (VANET) becomes a fundamental subcategory of mobile ad-hoc networks that provides vehicles to communicate with each other and with roadside infrastructure smartly. Data traffic in VANET can be categorized into safety and non-safety, where safety is a very critical point and non-safety is related to entertainment. Various VANET performance challenges are considered in terms of Quality of Service (QoS) which cause performance degradation as performance anomaly where high rates of vehicles wait for the low rates of vehicle transmitting time and starvation problem where some vehicles cannot transfer their data. Three main achievements have been accomplished. Starting with the impact of the increasing vehicle speed on performance anomaly problem consequences has been investigated. Followed by high-speed effects on data delivery is illustrated and how 802.11p has outperformed 802.11 in terms of data delivery is also demonstrated. Lastly, starvation problem is investigated where results showed increased data loss when vehicle nodes unable to deliver data correctly. Finally, a QoS-aware Signal to Noise Ratio (SNR) admission control mechanism (QASAC) is proposed to handle the performance anomaly problem while maintaining the QoS levels for high and low traffics. This can result in wasting throughput and cause data loss. The investigation results show that 802.11p has enhanced the number of dropped packets up to 70%. Also, the 802.11p end to end delay has decreased up to 12% less than the results of the 802.11 MAC protocol. The packet delivery ratio has been enhanced by up to 41% by 802.11p. The starvation problem investigation phase shows that 802.11p perform better than 802.11 which mainly affected by the increased speed of the vehicle. QASAC assigned different SNR values to different vehicles group based on the sending SNR values and in each group. Unlike recently proposed admission control in VANET networks, the proposed architecture differentiate between both high priority and low priority traffic QASAC has been compared against the latest SNR based admission control mechanism. QASAC has enhanced the performance of data delivery up to 23% in terms of data dropping rates for high priority traffic

    Efficient flooding for wireless mesh networks

    Get PDF
    Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2012.Cataloged from PDF version of thesis.Includes bibliographical references (p. 113-116).Flooding in wireless mesh networks involves distributing some data from one node to rest of the nodes in the network. This dissertation proposes UFlood, a flooding protocol for wireless mesh networks that targets large file transfers, such as software updates, where achieving high throughput (minimizing the time to complete the flood to all nodes) and low airtime (lower the time each node spends in transmitting packets, and thus lower the impact on other wireless traffic) are both important. The central challenge in good flooding performance is the choice of senders for each transmission opportunity. At each time during a flood, some parts of the network will have received more data than others. The set of best sending nodes lies along the boundaries between these regions, and evolves with time in ways that are difficult to predict. UFlood's key new idea is a distributed heuristic to dynamically choose the senders likely to lead to all nodes receiving the flooded data in the least time. The mechanism takes into account which data nearby receivers already have as well as inter-node channel quality. The mechanism includes a novel bit-rate selection algorithm that trades off the speed of high bit-rates against the larger number of nodes likely to receive low bit-rates. Unusually, UFlood uses both random network coding to increase the usefulness of each transmission and detailed feedback about what data each receiver already has; the feedback is critical in deciding which node's coded transmission will have the most benefit to receivers. The required feedback is potentially voluminous, but UFlood includes novel techniques to reduce its cost. The dissertation concludes that careful choice of senders allows UFlood to achieve 150% higher throughput than MORE, a known high-throughput flooding protocol, using 65% less time transmitting. UFlood uses 54% lower airtime than MNP, an existing flooding protocol to minimize airtime, and achieves 300% higher throughput.by Jayashree Subramanian.Ph.D

    Belaidžio ryšio tinklų terpės prieigos valdymo tyrimas

    Get PDF
    Over the years, consumer requirements for Quality of Service (QoS) has been growing exponentially. Recently, the ratification process of newly IEEE 802.11ad amendment to IEEE 802.11 was finished. The IEEE 802.11ad is the newly con-sumer wireless communication approach, which will gain high spot on the 5G evolution. Major players in wireless market, such as Qualcomm already are inte-grating solutions from unlicensed band, like IEEE 802.11ac, IEEE 802.11ad into their architecture of LTE PRO (the next evolutionary step for 5G networking) (Qualcomm 2013; Parker et al. 2015). As the demand is growing both in enter-prise wireless networking and home consumer markets. Consumers started to no-tice the performance degradation due to overcrowded unlicensed bands. The un-licensed bands such as 2.4 GHz, 5 GHz are widely used for up-to-date IEEE 802.11n/ac technologies with upcoming IEEE 802.11ax. However, overusage of the available frequency leads to severe interference issue and consequences in to-tal system performance degradation, currently existing wireless medium access method can not sustain the increasing intereference and thus wireless needs a new methods of wireless medium access. The main focal point of this dissertation is to improve wireless performance in dense wireless networks. In dissertation both the conceptual and multi-band wireless medium access methods are considered both from theoretical point of view and experimental usage. The introduction chapter presents the investigated problem and it’s objects of research as well as importance of dissertation and it’s scientific novelty in the unlicensed wireless field. Chapter 1 revises used literature. Existing and up-to-date state-of-the-art so-lution are reviewed, evaluated and key point advantages and disadvantages are analyzed. Conclusions are drawn at the end of the chapter. Chapter 2 describes theoretical analysis of wireless medium access protocols and the new wireless medium access method. During analysis theoretical simula-tions are performed. Conclusions are drawn at the end of the chapter. Chapter 3 is focused on the experimental components evaluation for multi-band system, which would be in line with theoretical concept investigations. The experimental results, showed that components of multi-band system can gain sig-nificant performance increase when compared to the existing IEEE 802.11n/ac wireless systems. General conclusions are drawn after analysis of measurement results
    corecore