17 research outputs found

    Real-Time Misbehavior Detection in IEEE 802.11e Based WLANs

    Full text link
    The Enhanced Distributed Channel Access (EDCA) specification in the IEEE 802.11e standard supports heterogeneous backoff parameters and arbitration inter-frame space (AIFS), which makes a selfish node easy to manipulate these parameters and misbehave. In this case, the network-wide fairness cannot be achieved any longer. Many existing misbehavior detectors, primarily designed for legacy IEEE 802.11 networks, become inapplicable in such a heterogeneous network configuration. In this paper, we propose a novel real-time hybrid-share (HS) misbehavior detector for IEEE 802.11e based wireless local area networks (WLANs). The detector keeps updating its state based on every successful transmission and makes detection decisions by comparing its state with a threshold. We develop mathematical analysis of the detector performance in terms of both false positive rate and average detection rate. Numerical results show that the proposed detector can effectively detect both contention window based and AIFS based misbehavior with only a short detection window.Comment: Accepted to IEEE Globecom 201

    Experimental Tuning of AIFSN and CWmin Parameters to Prioritize Voice over Data Transmission in 802.11e WLAN Networks

    Get PDF
    In this paper we experimentally study the impact of two EDCA parameters, namely AIFSN and CWmin, on a mixed voice/data wireless transmission. In particular we investigate how the tuning of these parameters affects both the voice transmission quality and background data throughput. We predict end-to-end voice transmission quality from time varying transmission impairments using the latest Appendix to the ITU-T E-model. Our experimental results show that the tuning of the EDCA parameters can be used to successfully prioritize voice transmission over data in real 802.11e networks. We also demonstrate that the AIFSN parameter more effectively protects voice calls against background data traffic than CWmin. To the best of our knowledge, this is the first experimental investigation on tuning of MAC layer parameters in a real 802.11e WLAN network from the perspective of end-to-end voice transmission quality and end user satisfaction

    A Dynamic Multimedia User-Weight Classification Scheme for IEEE_802.11 WLANs

    Full text link
    In this paper we expose a dynamic traffic-classification scheme to support multimedia applications such as voice and broadband video transmissions over IEEE 802.11 Wireless Local Area Networks (WLANs). Obviously, over a Wi-Fi link and to better serve these applications - which normally have strict bounded transmission delay or minimum link rate requirement - a service differentiation technique can be applied to the media traffic transmitted by the same mobile node using the well-known 802.11e Enhanced Distributed Channel Access (EDCA) protocol. However, the given EDCA mode does not offer user differentiation, which can be viewed as a deficiency in multi-access wireless networks. Accordingly, we propose a new inter-node priority access scheme for IEEE 802.11e networks which is compatible with the EDCA scheme. The proposed scheme joins a dynamic user-weight to each mobile station depending on its outgoing data, and therefore deploys inter-node priority for the channel access to complement the existing EDCA inter-frame priority. This provides efficient quality of service control across multiple users within the same coverage area of an access point. We provide performance evaluations to compare the proposed access model with the basic EDCA 802.11 MAC protocol mode to elucidate the quality improvement achieved for multimedia communication over 802.11 WLANs.Comment: 15 pages, 8 figures, 3 tables, International Journal of Computer Networks & Communications (IJCNC

    Sobre la justicia en las redes IEEE 802.11e: desincronización de su mecanismo de acceso al medio

    Get PDF
    Since the advent of the first IEEE 802.11 standard, several papers have proposed means of providing QoS to IEEE 802.11 networks and evaluate various traffic-prioritization mechanisms. Nevertheless, studies on the assignment of AIFS times defined in IEEE 802.11e reveal that the various priority levels work in a synchronized manner. The studies show that, under large loads of high-priority traffic, EDCA starves low-priority frames, which is undesirable. We argue that QoS traffic needs to be prioritized, but users sending best-effort frames should also obtain the expected service. High-priority traffic can also suffer performance degradation when using EDCA because of heavy loads of low-priority frames. Thus, we have proposed a mechanism based on desynchronizing the IEEE 802.11e working procedure. It prevents stations that belong to different priority classes from attempting simultaneous transmission, prioritizes independent collision groups and achieves better short-term and long-term channel access fairness. We have evaluated the proposal based on extensive analytical and simulation results. It prevents the strangulation of low-priority traffic, and, moreover, reduces the degradation of high-priority traffic with the increased presence of low-priority frames.Peer Reviewe

    Design of State-based Schedulers for a Network of Control Loops

    Full text link
    For a closed-loop system, which has a contention-based multiple access network on its sensor link, the Medium Access Controller (MAC) may discard some packets when the traffic on the link is high. We use a local state-based scheduler to select a few critical data packets to send to the MAC. In this paper, we analyze the impact of such a scheduler on the closed-loop system in the presence of traffic, and show that there is a dual effect with state-based scheduling. In general, this makes the optimal scheduler and controller hard to find. However, by removing past controls from the scheduling criterion, we find that certainty equivalence holds. This condition is related to the classical result of Bar-Shalom and Tse, and it leads to the design of a scheduler with a certainty equivalent controller. This design, however, does not result in an equivalent system to the original problem, in the sense of Witsenhausen. Computing the estimate is difficult, but can be simplified by introducing a symmetry constraint on the scheduler. Based on these findings, we propose a dual predictor architecture for the closed-loop system, which ensures separation between scheduler, observer and controller. We present an example of this architecture, which illustrates a network-aware event-triggering mechanism.Comment: 17 pages, technical repor

    MAC Access Delay of IEEE 802.11 DCF

    Full text link

    An Intelligent V2I-Based Traffic Management System

    Get PDF
    International audienceVehicles equipped with intelligent systems designed to prevent accidents, such as collision warning systems (CWSs) or lane-keeping assistance (LKA), are now on the market. The next step in reducing road accidents is to coordinate such vehicles in advance not only to avoid collisions but to improve traffic flow as well. To this end, vehicle-to-infrastructure (V2I) communications are essential to properly manage traffic situations. This paper describes the AUTOPIA approach toward an intelligent traffic management system based on V2I communications. A fuzzy-based control algorithm that takes into account each vehicle's safe and comfortable distance and speed adjustment for collision avoidance and better traffic flow has been developed. The proposed solution was validated by an IEEE-802.11p-based communications study. The entire system showed good performance in testing in real- world scenarios, first by computer simulation and then with real vehicles

    A cross-layer approach for WLAN voice capacity planning

    Full text link
    corecore