Unwanted Link Layer Traffic in Large IEEE 802.11 Wireless Network By Naga V K Akkineni.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

Advantage Century Telecommunication Corp. AIL: Actively Intelligent Link-Layer Handoff Guo-Yuan Mikko Wang
Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
1 An Approach to Real-Time Support in Ad Hoc Wireless Networks Mark Gleeson Distributed Systems Group Dept.
An Energy-efficient MAC protocol for Wireless Sensor Networks Wei Ye, John Heidemann, Deborah Estrin.
– Wireless PHY and MAC Stallings Types of Infrared FHSS (frequency hopping spread spectrum) DSSS (direct sequence.
CSMA/CA in IEEE Physical carrier sense, and Virtual carrier sense using Network Allocation Vector (NAV) NAV is updated based on overheard RTS/CTS/DATA/ACK.
Experimental Measurement of VoIP Capacity in IEEE WLANs Sangho Shin Henning Schulzrinne Department of Computer Science Columbia University.
PEDS September 18, 2006 Power Efficient System for Sensor Networks1 S. Coleri, A. Puri and P. Varaiya UC Berkeley Eighth IEEE International Symposium on.
CWNA Guide to Wireless LANs, Second Edition Chapter Five IEEE Media Access Control and Network Layer Standards 1.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
Self Organization and Energy Efficient TDMA MAC Protocol by Wake Up For Wireless Sensor Networks Zhihui Chen; Ashfaq Khokhar ECE/CS Dept., University of.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
Mobile IP: Introduction Reference: “Mobile networking through Mobile IP”; Perkins, C.E.; IEEE Internet Computing, Volume: 2 Issue: 1, Jan.- Feb. 1998;
Adapted from: Computer Networking, Kurose/Ross 1DT066 Distributed Information Systems Chapter 6 Wireless, WiFi and mobility.
protocol continued. DCF The basic idea is non-persistent. Can do an optimization: For a new packet (Q len = 0), the sender needs only wait for.
CWNA Guide to Wireless LANs, Second Edition Chapter Five IEEE Media Access Control and Network Layer Standards.
A Multichain Backoff Mechanism for IEEE WLANs Alkesh Patel & Hemant Patel ECE 695 – Leading Discussion By : Shiang- Rung Ye and Yu-Chee Tseng.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
Doc.: IEEE /0569 Submission May 2012 Slide 1Lin Cai et al,Huawei. Differentiated Initial Link Setup Date: 05/02/2012 Authors: NameAffiliationsAddressPhone .
Qian Zhang Department of Computer Science HKUST Advanced Topics in Next- Generation Wireless Networks Transport Protocols in Ad hoc Networks.
1 Dynamic Adaption of DCF and PCF mode of IEEE WLAN Abhishek Goliya Guided By: Prof. Sridhar Iyer Dr. Leena-Chandran Wadia MTech Dissertation.
1 Computer Communication & Networks Lecture 13 Datalink Layer: Local Area Network Waleed Ejaz
IEEE High Rate WPAN - MAC functionalities & Power Save Mode Mobile Network Lab. 정상수, 한정애.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
CWNA Guide to Wireless LANs, Second Edition
The University of Bolton School of Business & Creative Technologies Wireless Networks Introduction 1.
Voice Capacity analysis over Introducing VoIP and WLans IEEE based Wireless Local Area Networks (WLANs) are becoming popular While WLANs.
Why Visual Sensor Network & SMAC Implementation Group Presentation Raghul Gunasekaran.
IEEE Wireless LAN Standard. Medium Access Control-CSMA/CA IEEE defines two MAC sublayers Distributed coordination function (DCF) Point coordination.
November 4, 2003APOC 2003 Wuhan, China 1/14 Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs Presented by Ruibiao Qiu Department of Computer.
Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs K.Murugan, B.Dushyanth, E.Gunasekaran S.Arivuthokai, RS.Bhuvaneswaran, S.Shanmugavel.
An Empirical Analysis of the IEEE MAC Layer Handoff Process Arunesh Mishra Minho Shin William Arbaugh University of Maryland,College Park,MD.
Medium Access Control Sub Layer
Multiple Access.
Chapter 6 Multiple Radio Access
Lecture # 13 Computer Communication & Networks. Today’s Menu ↗Last Lecture Review ↗Wireless LANs ↗Introduction ↗Flavors of Wireless LANs ↗CSMA/CA Wireless.
Token-DCF, COMSNET(2013) -> MOBICOM(2014). Introduction ▣ To improve standard MAC protocol of IEEE for WLAN. ▣ S-MAC, A-MAC, SPEED-MAC, and etc.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
WIRELESS COMMUNICATION Husnain Sherazi Lecture 1.
An Energy Efficient MAC Protocol for Wireless LANs, E.-S. Jung and N.H. Vaidya, INFOCOM 2002, June 2002 吳豐州.
A Multi-Channel Cooperative MIMO MAC Protocol for Wireless Sensor Networks(MCCMIMO) MASS 2010.
CO5023 Wireless Networks. Varieties of wireless network Wireless LANs: the main topic for this week. Consists of making a single-hop connection to an.
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
MAC Sublayer MAC layer tasks: – Control medium access – Roaming, authentication, power conservation Traffic services – DCF (Distributed Coordination.
Quality of Service Schemes for IEEE Wireless LANs-An Evaluation 主講人 : 黃政偉.
S-MAC Taekyoung Kwon. MAC in sensor network Energy-efficient Scalable –Size, density, topology change Fairness Latency Throughput/utilization.
CSMA/CA Simulation  Course Name: Networking Level(UG/PG): UG  Author(s) : Amitendu Panja, Veedhi Desai  Mentor: Aruna Adil *The contents in this ppt.
Distributed-Queue Access for Wireless Ad Hoc Networks Authors: V. Baiamonte, C. Casetti, C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di.
PAC: Perceptive Admission Control for Mobile Wireless Networks Ian D. Chakeres Elizabeth M. Belding-Royer.
LA-MAC: A Load Adaptive MAC Protocol for MANETs IEEE Global Telecommunications Conference(GLOBECOM )2009. Presented by Qiang YE Smart Grid Subgroup Meeting.
Wireless LAN Requirements (1) Same as any LAN – High capacity, short distances, full connectivity, broadcast capability Throughput: – efficient use wireless.
IEEE MAC protocol Jaehoon Woo KNU Real-Time Systems Lab. KNU Real-Time Systems Lab.
IEEE Wireless LAN. Wireless LANs: Characteristics Types –Infrastructure based –Ad-hoc Advantages –Flexible deployment –Minimal wiring difficulties.
MAC Protocols for Sensor Networks
Introduction Wireless devices offering IP connectivity
Lab 7 – CSMA/CD (Data Link Layer Layer)
Lecture 27 WLAN Part II Dr. Ghalib A. Shah
TCP and MAC interplay in Wireless Ad Hoc Networks
Net301 lecture9 11/5/2015 Lect 9 NET301.
Goal Control the amount of traffic in the network
Department of Computer Science Southern Illinois University Carbondale CS441-Mobile & Wireless Computing IEEE Standard.
Data Communication Networks
Wireless LAN Simulation IEEE MAC Protocol
Muhammad Niswar Graduate School of Information Science
Investigating Mac Power Consumption in Wireless Sensor Network
Enhanced Backoff Scheme in CSMA/CA for IEEE
Chapter 6 Multiple Radio Access.
Presentation transcript:

Unwanted Link Layer Traffic in Large IEEE Wireless Network By Naga V K Akkineni

Introduction IEEE based WLAN’s rapid growth. Problems – Limited number of Orthogonal Channels. Unwanted Traffic – To maintain connectivity and high quality client service. Link layer Traffic - Overhead stems from mechanisms that initiate, maintain, and change client-AP connectivity

Two mechanisms contribute to unwanted traffic in wireless networks.  Keepalive traffic that is used to maintain client-AP associations in the absence of data traffic.  The probing mechanism used by clients to frequently collect neighbor information.

Problems and Deficiencies Key implementation deficiencies in frame retransmissions, frame sizes and rate adaptation in congested networks Client overhead increases with the increase in network density. Two types of overhead mechanisms that are prominent in a congested network - probes and keepalive packets. Handoff rates increase with an increase in network utilization, even in the absence of mobility.

Overview of IEEE Frame Types Standard defines three frame types.  Management  Control  Data

Handoff Procedure Client authenticating. Successful Authentication ---> Association request with information. AP allocates resources for client and sends its information like association ID and data rates. After Authenticating and associating it can communicate with other clients through AP as well. Layer 2 (L2) handoff. 4phases. Triggering, Discovery, Selection, Commitment.

Traffic Analysis DCF(Data Collection Framework) protocol uses CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance). If node wants to transmit a frame carrier sensing must be done to check weather medium is busy. If the medium is not busy, the node transmits the packet. If the channel is busy, then the node backs off for a specific interval known as the backoff interval.

Backoff Interval For every slot time that the channel is not busy, the BO is decremented. The node transmits the packet when the backoff timer reaches zero. If this transmission results in a collision, maximum length of backoff interval doubles.

Keepalive Traffic: 1. Keepalive signal is a short message sent at regular intervals to keep a connection alive. 2. Used in Persistent HTTP/1.1 connections. 3. Generally large number of null data frames transmitted by the clients to the access point that were then acknowledged by the AP. 3. A null frame is essentially a data frame subtype with zero bytes of data. 4. Mobile devices in order to maintain to maintain battery power goes into sleep mode and losses its connection with AP’s. 5. At this moment of time the applications which require long- lived connections between servers and clients maintains keepalive messages.

Probe Traffic: 1. A client broadcasts probe requests when it needs to obtain information on which APs are in range. 2. Any AP that receives this request sends a probe response containing information necessary for association, such as capability information and supported data rates. 3. Probe requests are sent when a client disconnects or roams from the AP with which it is associated. 4. A client also probes the medium periodically to check which APs are in the vicinity, and whether it is still associated with the AP with the strongest signal.

5. This aggressive probing is beneficial when clients are mobile. 6. The delay is large enough to deteriorate application performance, especially delay sensitive applications such as voice. 7. Instead of being reactive to packet loss, clients are proactive in probing the medium and collecting neighbor information. 8. Aggressive probing of the medium in a static, congested network imposes unnecessary overhead and leads to inefficient medium utilization.

Handoff Analysis When a client wishes to associate with a different AP, a handoff process is initiated. Handoff trigger is the first stage of handoff wherein a client identifies the need to look for another AP. The implementation of this mechanism is left to vendors, however, it is usually a reaction to one or more of the following: 1) consecutive missed beacons 2) unacknowledged packets 3) beacon frame loss or quality degradation

As a result of frequent probing and implementations that use packet loss information to trigger handoffs, one can expect a high rate of handoffs in a congested network. The throughput rates should be taken care of even client spends enough time in handoff procedure.

Conclusion  Finally, handoff mechanisms should be adaptive to congestion losses.  Use of packet loss information to trigger handoffs creates in a high rate of handoffs, even in the absence of mobility.  Many of the handoffs that occurred to other APs impacted the clients negatively.  Schemes that use signal strength trends to detect disconnection, and schemes that incorporate network information such as load or loss rates, are needed.

Queries? Thank You !!!