Diagnosing Wireless Packet Losses in : Collision or Weak Signal?

Size: px
Start display at page:

Download "Diagnosing Wireless Packet Losses in : Collision or Weak Signal?"

Transcription

1 Diagnosing Wireless Packet Losses in : Collision or Weak Signal? Shravan Rayanchu Arunesh Mishra Dheeraj Agrawal Sharad Saha Suman Banerjee Wisconsin Wireless and NetworkinG Systems (WiNGS) Lab University of Wisconsin Madison INFOCOM 2008

2 The Goal Distinguishing between collision and weak signal Consider a wireless link:

3 The Goal Distinguishing between collision and weak signal Consider a wireless link:

4 The Goal Distinguishing between collision and weak signal Consider a wireless link: Q. What caused the packet loss?

5 The Goal Distinguishing between collision and weak signal Wireless Errors

6 The Goal Distinguishing between collision and weak signal Collision Wireless Errors

7 The Goal Distinguishing between collision and weak signal Wireless Errors Collision Weak Signal

8 The Goal Distinguishing between collision and weak signal Wireless Errors Collision Weak Signal Q. Can we discern between these two?

9 Collision vs. Weak Signal Q. Why is it important to distinguish between errors?

10 Collision vs. Weak Signal Q. Why is it important to distinguish between errors?

11 Collision vs. Weak Signal Q. Why is it important to distinguish between errors?

12 Collision vs. Weak Signal Q. Why is it important to distinguish between errors?

13 Collision vs. Weak Signal Inferring the cause of error Collision Detection is hard! Given an error packet, can we conduct a post-mortem?

14 Collision vs. Weak Signal Inferring the cause of error Collision Detection is hard! Given an error packet, can we conduct a post-mortem?

15 Collision vs. Weak Signal Inferring the cause of error Collision Detection is hard! Given an error packet, can we conduct a post-mortem?

16 Collision vs. Weak Signal Inferring the cause of error Collision Detection is hard! Given an error packet, can we conduct a post-mortem? Example

17 Collision vs. Weak Signal Inferring the cause of error Collision Detection is hard! Given an error packet, can we conduct a post-mortem? Example

18 Collision vs. Weak Signal Inferring the cause of error Collision Detection is hard! Given an error packet, can we conduct a post-mortem? Example

19 A Simple Approach

20 A Simple Approach

21 A Simple Approach Metrics used to discern the cause: Received signal strength (RSS) Bit error rate (BER) Error rate per symbol (EPS) Symbol error rate (SER) Symbol error burst length (S-Score)

22 A Simple Approach Metrics used to discern the cause: Received signal strength (RSS) Bit error rate (BER) Error rate per symbol (EPS) Symbol error rate (SER) Symbol error burst length (S-Score)

23 A Simple Approach Metrics used to discern the cause: Received signal strength (RSS) Bit error rate (BER) Error rate per symbol (EPS) Symbol error rate (SER) Symbol error burst length (S-Score)

24 A Simple Approach Metrics used to discern the cause: Received signal strength (RSS) Bit error rate (BER) Error rate per symbol (EPS) Symbol error rate (SER) Symbol error burst length (S-Score)

25 Metrics : Intuition Bit Error Rate (BER) Percentage of total bits in error

26 Metrics : Intuition Bit Error Rate (BER) Percentage of total bits in error

27 Metrics : Intuition Bit Error Rate (BER) Percentage of total bits in error Collision:

28 Metrics : Intuition Bit Error Rate (BER) Percentage of total bits in error Collision:

29 Metrics : Intuition Bit Error Rate (BER) Percentage of total bits in error (Higher in collision?) Received Signal Strength (RSS) RSS (S+I/n)

30 Metrics : Intuition Bit Error Rate (BER) Percentage of total bits in error (Higher in collision?) Received Signal Strength (RSS) RSS (S+I/n)

31 Metrics : Intuition Bit Error Rate (BER) Percentage of total bits in error (Higher in collision?) Received Signal Strength (RSS) RSS (S+I/n) (Lower in weak signal?)

32 Metrics : Intuition Symbol Error Rate (SER) Percentage of symbols which are in error

33 Metrics : Intuition Symbol Error Rate (SER) Percentage of symbols which are in error

34 Metrics : Intuition Symbol Error Rate (SER) Percentage of symbols which are in error

35 Metrics : Intuition Symbol Error Rate (SER) Percentage of symbols which are in error (Higher in collision?) SER = 5/10 = 0.5

36 Metrics : Intuition Symbol Error Rate (SER) Percentage of symbols which are in error (Higher in collision?) Error Per Symbol (EPS) Percentage of bits in error averaged over the symbols which are in error

37 Metrics : Intuition Symbol Error Rate (SER) Percentage of symbols which are in error (Higher in collision?) Error Per Symbol (EPS) Percentage of bits in error averaged over the symbols which are in error

38 Metrics : Intuition Symbol Error Rate (SER) Percentage of symbols which are in error (Higher in collision?) Error Per Symbol (EPS) Percentage of bits in error averaged over the symbols which are in error

39 Metrics : Intuition Symbol Error Rate (SER) Percentage of symbols which are in error (Higher in collision?) Error Per Symbol (EPS) Percentage of bits in error averaged over the symbols which are in error (Higher in collision?)

40 Metrics : Intuition Symbol Error Rate (SER) Percentage of symbols which are in error (Higher in collision?) Error Per Symbol (EPS) Percentage of bits in error averaged over the symbols which are in error (Higher in collision?) S-Score Measure of number of consecutive symbols in error

41 Metrics : Intuition Symbol Error Rate (SER) Percentage of symbols which are in error (Higher in collision?) Error Per Symbol (EPS) Percentage of bits in error averaged over the symbols which are in error (Higher in collision?) S-Score Measure of number of consecutive symbols in error

42 Metrics : Intuition Symbol Error Rate (SER) Percentage of symbols which are in error (Higher in collision?) Error Per Symbol (EPS) Percentage of bits in error averaged over the symbols which are in error (Higher in collision?) S-Score Measure of number of consecutive symbols in error

43 Metrics : Intuition Symbol Error Rate (SER) Percentage of symbols which are in error (Higher in collision?) Error Per Symbol (EPS) Percentage of bits in error averaged over the symbols which are in error (Higher in collision?) S-Score Measure of number of consecutive symbols in error

44 Metrics : Intuition Symbol Error Rate (SER) Percentage of symbols which are in error (Higher in collision?) Error Per Symbol (EPS) Percentage of bits in error averaged over the symbols which are in error (Higher in collision?) S-Score Measure of number of consecutive symbols in error S-Score = n i=1 B i 2

45 Summary of Approach

46 Experiment Design Causing errors due to weak signal Weak Signal Environment free of other transmissions Enabled reception of packets in error Client mobility induced errors due to dynamic channel conditions

47 Experiment Design Causing collisions Collisions Disabled backoffs, enabled reception of packets in error Packet logs at the receivers are synchronized using common packets Collisions are identified using overlap in packet transmission times

48 Empirical Results : BER 100 S( 24, 36,48 ) 80 CDF (%) C( 24,36,48 ) Bit Error Rate (BER) 98% of weak signal packets have a BER of 12% or less 26% of collision packets have BER of 12% or less Cutoff value of 12% BER: Detects 74% of collisions with 2% false positives

49 Empirical Results : EPS CDF (%) S( 24, 36, 48) C( 24, 36, 48) Error Rate Per Symbol (EPS) 98% of weak signal packets have an EPS of 22% or less 30% of collision packets have the same EPS of 22% or less.

50 A Metric-Vote Scheme Metric-Vote Output a collision if any of the metrics vote for a collision

51 A Metric-Vote Scheme Metric-Vote Output a collision if any of the metrics vote for a collision Performance Table: Accuracy for Collision/Weak Signal BER EPS S-Score Metric-Vote Collision Weak Signal Accuracy: % of weak signal (or collision) packets which are correctly identified

52 Some Observations Why is the accuracy low for collision packets?

53 Some Observations Why is the accuracy low for collision packets? Strong Capture Effect

54 Some Observations Why is the accuracy low for collision packets? Strong Capture Effect

55 Some Observations Why is the accuracy low for collision packets? Strong Capture Effect Colliding Packet Size

56 A Joint Metric : SER-EPS Symbol Error Rate (SER) Signal Collision (1400,1400) Collision (1400,200) Error Per Symbol (EPS)

57 Reference Implementation Platforms: Linux based laptop, Netgear SPH101 VoWiFi phone COLLision Inferencing Engine (COLLIE) AP relays the error packet back to the client Client performs collision inferencing COLLIE based Link Adaptation Enhanced Auto Rate Fallback to make it collision-aware

58 Results (1) Mobile Scenario Mobile Client, Presence of other traffic Throughput (kbps) w/ COLLIE w/o COLLIE Time (secs) Throughput improvement 30%

59 Results (2) Collision Scenario Static client, Presence of additional collision sources Throughput (kbps) w/o COLLIE w COLLIE Run1 Run2 Run3 Throughput improvement as high as 60%

60 Results (3) Voice call emulation Netgear SPH-101 VoWiFi phone using TI chipset and proprietary rate adaptation algorithm Avg Retransmissions (%) w/o COLLIE w COLLIE Slow Medium High Reduction in wasted retransmissions 40%

61 Summary and Future Work Summary We addressed the fundamental question of what caused a packet to be in error collision or weak signal? Distinguishing between errors lead to improvement in throughput, energy efficiency Future Work Design better metrics Design a low overhead protocol Study the impact of non interference sources Enhance/design link adaptation mechanisms

62 Questions?

63 Backup slides

64 Empirical Results : Other Metrics S-Score Cutoff value of 500: 98% of signal packets and 26% of collision packets RSS High variation Delivery probability is a function of S/(I + n) instead of (S + I)/n, receiver sensitivity

65 Empirical Results : RSS CDF (%) S( 24,36,48) C( 24,36,48 ) RSS 98% of packets in error due to weak signal have an RSS of about -73 dbm or less 10% of packets suffering collision have RSS of -73 dbm or less

66 Empirical Results : S-Score 100 CDF (%) S( 24, 36, 48) C(24, 36, 48) S Score 98% of the weak signal packets have an S-Score of 500 or less 26% collision packets have an S-Score of 500 or less

67 Multi-AP Assistance Collision Detection Accuracy Basic Multi AP Basic Multi AP Basic Multi AP Basic Multi AP High Capture Effect (Multi AP approach improves accuracy) Low Capture Effect (Basic approach works well) APs are synchronized (using opportunistic common packet receptions) Information about packet reception is aggregated at the COLLIE server

Computer Sciences Department

Computer Sciences Department Computer Sciences Department Diagnosing Wireless Packet Losses in 82.11: Separating Collision from Weak Signal Shravan Rayanchu Arunesh Mishra Dheeraj Agrawal Sharad Saha Suman Banerjee Technical Report

More information

PIE in the Sky : Online Passive Interference Estimation for Enterprise WLANs

PIE in the Sky : Online Passive Interference Estimation for Enterprise WLANs WiNGS Labs PIE in the Sky : Online Passive Interference Estimation for Enterprise WLANs * Nokia Research Center, Palo Alto Shravan Rayanchu, Suman Banerjee University of Wisconsin-Madison Konstantina Papagiannaki

More information

A Measurement Study of a Commercial-grade Urban WiFi Mesh

A Measurement Study of a Commercial-grade Urban WiFi Mesh A Measurement Study of a Commercial-grade Urban WiFi Mesh Vladimir Brik Shravan Rayanchu Sharad Saha Sayandeep Sen Vivek Shrivastava Suman Banerjee Wisconsin Wireless and NetworkinG Systems (WiNGS) Lab

More information

Rate Adaptation in

Rate Adaptation in Rate Adaptation in 802.11 SAMMY KUPFER Outline Introduction Intuition Basic techniques Techniques General Designs Robust Rate Adaptation for 802.11 (2006) Efficient Channel aware Rate Adaptation in Dynamic

More information

Subject: Adhoc Networks

Subject: Adhoc Networks ISSUES IN AD HOC WIRELESS NETWORKS The major issues that affect the design, deployment, & performance of an ad hoc wireless network system are: Medium Access Scheme. Transport Layer Protocol. Routing.

More information

CHAPTER 5 PROPAGATION DELAY

CHAPTER 5 PROPAGATION DELAY 98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,

More information

Architecture and Evaluation of an Unplanned b Mesh Network

Architecture and Evaluation of an Unplanned b Mesh Network Architecture and Evaluation of an Unplanned 802.11b Mesh Network John Bicket, Daniel Aguayo, Sanjit Biswas, and Robert Morris MIT CSAIL (MobiCom 05) slides by Jong-Kwon Lee, presented by Fallon Chen May

More information

Page 1. Overview : Wireless Networks Lecture 15: WiFi Self-Organization. Client throughput. What determines client performance?

Page 1. Overview : Wireless Networks Lecture 15: WiFi Self-Organization. Client throughput. What determines client performance? Overview 18-759: Wireless Networks Lecture 15: WiFi Self-Organization Dina Papagiannaki & Peter Steenkiste Departments of Computer Science and Electrical and Computer Engineering Spring Semester 2009 http://www.cs.cmu.edu/~prs/wireless09/

More information

Outline. Multi-Channel Reliability and Spectrum Usage in Real Homes Empirical Studies for Home-Area Sensor Networks. Smart Grid

Outline. Multi-Channel Reliability and Spectrum Usage in Real Homes Empirical Studies for Home-Area Sensor Networks. Smart Grid Multi-Channel Reliability and Spectrum Usage in Real Homes Empirical Studies for Home-Area Sensor Networks Experimental methodology Empirical study in homes Spectrum study of existing wireless signals

More information

StripComm. Interference-resilient Cross-technology Communication in Coexisting Environments. Tsinghua University. Xiaolong Zheng, Yuan He, Xiuzhen Guo

StripComm. Interference-resilient Cross-technology Communication in Coexisting Environments. Tsinghua University. Xiaolong Zheng, Yuan He, Xiuzhen Guo StripComm Interference-resilient Cross-technology Communication in Coexisting Environments Xiaolong Zheng, Yuan He, Xiuzhen Guo Tsinghua University Wireless Coexistence Heterogeneous devices coexist Contention

More information

Chapter 7 CONCLUSION

Chapter 7 CONCLUSION 97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in

More information

MAC protocols. Lecturer: Dmitri A. Moltchanov

MAC protocols. Lecturer: Dmitri A. Moltchanov MAC protocols Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/kurssit/tlt-2616/ OUTLINE: Problems for MAC to deal with; Design goals; Classification of MAC protocols Contention-based

More information

Bridging Link Power Asymmetry in Mobile Whitespace Networks Sanjib Sur and Xinyu Zhang

Bridging Link Power Asymmetry in Mobile Whitespace Networks Sanjib Sur and Xinyu Zhang Bridging Link Power Asymmetry in Mobile Whitespace Networks Sanjib Sur and Xinyu Zhang University of Wisconsin - Madison 1 Wireless Access in Vehicles Wireless network in public vehicles use existing infrastructure

More information

Computer Communication III

Computer Communication III Computer Communication III Wireless Media Access IEEE 802.11 Wireless LAN Advantages of Wireless LANs Using the license free ISM band at 2.4 GHz no complicated or expensive licenses necessary very cost

More information

Strengthening Unlicensed Band Wireless Backhaul

Strengthening Unlicensed Band Wireless Backhaul be in charge Strengthening Unlicensed Band Wireless Backhaul Use TDD/TDMA Based Channel Access Mechanism WHITE PAPER Strengthening Unlicensed Band Wireless Backhaul: Use TDD/TDMA Based Channel Access Mechanism

More information

Observing Home Wireless Experience through WiFi APs

Observing Home Wireless Experience through WiFi APs Observing Home Wireless Experience through WiFi APs Ashish Patro* Srinivas Govindan Prof. Suman Banerjee University of Wisconsin Madison *patro@cs.wisc.edu Dense residenfal WLANs today Apartment Building

More information

Concurrent-MAC: Increasing Concurrent Transmissions in Dense Wireless LANs

Concurrent-MAC: Increasing Concurrent Transmissions in Dense Wireless LANs Concurrent-MAC: Increasing Concurrent Transmissions in Dense Wireless LANs Ghazale Hosseinabadi and Nitin Vaidya Department of ECE and Coordinated Science Lab. University of Illinois at Urbana-Champaign

More information

IEEE P Wireless LANs Impact of Bluetooth on Direct Sequence. Abstract

IEEE P Wireless LANs Impact of Bluetooth on Direct Sequence. Abstract IEEE P802.11 Wireless LANs Impact of Bluetooth on 802.11 Direct Sequence Date: September 15, 1998 Author: Greg Ennis Ennis Associates 16331 Englewood Ave. Los Gatos CA 95032 USA Phone: (408) 358-5544 Fax:

More information

Markov Chains and Multiaccess Protocols: An. Introduction

Markov Chains and Multiaccess Protocols: An. Introduction Markov Chains and Multiaccess Protocols: An Introduction Laila Daniel and Krishnan Narayanan April 8, 2012 Outline of the talk Introduction to Markov Chain applications in Communication and Computer Science

More information

Spectrum Management in Cognitive Radio Networks

Spectrum Management in Cognitive Radio Networks Spectrum Management in Cognitive Radio Networks Jul 14,2010 Instructor: professor m.j omidi 1/60 BY : MOZHDEH MOLA & ZAHRA ALAVIKIA Contents Overview: Cognitive Radio Spectrum Sensing Spectrum Decision

More information

Wireless MACs: MACAW/802.11

Wireless MACs: MACAW/802.11 Wireless MACs: MACAW/802.11 Mark Handley UCL Computer Science CS 3035/GZ01 Fundamentals: Spectrum and Capacity A particular radio transmits over some range of frequencies; its bandwidth, in the physical

More information

Collisions & Virtual collisions in IEEE networks

Collisions & Virtual collisions in IEEE networks Collisions & Virtual collisions in IEEE 82.11 networks Libin Jiang EE228a project report, Spring 26 Abstract Packet collisions lead to performance degradation in IEEE 82.11 [1] networks. The carrier-sensing

More information

ECE 598HH: Special Topics in Wireless Networks and Mobile Systems

ECE 598HH: Special Topics in Wireless Networks and Mobile Systems ECE 598HH: Special Topics in Wireless Networks and Mobile Systems Lecture 21: Opportunistic Routing Haitham Hassanieh *These slides are courtesy of Dina Katabi 1 Lecture Outline Single Path Routing Opportunistic

More information

B. Bellalta Mobile Communication Networks

B. Bellalta Mobile Communication Networks IEEE 802.11e : EDCA B. Bellalta Mobile Communication Networks Scenario STA AP STA Server Server Fixed Network STA Server Upwnlink TCP flows Downlink TCP flows STA AP STA What is the WLAN cell performance

More information

Performance Evaluation and Design Improvement of Media Access Control Protocols for Broadband Wireless Local Loop

Performance Evaluation and Design Improvement of Media Access Control Protocols for Broadband Wireless Local Loop Performance Evaluation and Design Improvement of Media Access Control Protocols for Broadband Wireless Local Loop Mihir Thaker Masters Thesis Presentation Department of Electrical Engineering and Computer

More information

Page 1. EEC173B/ECS152C, Spring Wireless Mesh Networks. Wireless LAN or Cellular Networks. Introduction Flow Control Issues Rate Adaptation

Page 1. EEC173B/ECS152C, Spring Wireless Mesh Networks. Wireless LAN or Cellular Networks. Introduction Flow Control Issues Rate Adaptation EEC173B/ECS152C, Spring 2009 Wireless LAN or Cellular Networks Wireless Mesh Networks Introduction Flow Control Issues Rate Adaptation Access point Infrastructure Network (Internet) PSTN Network Base station

More information

Packet-Level Diversity From Theory to Practice: An based Experimental Investigation

Packet-Level Diversity From Theory to Practice: An based Experimental Investigation Packet-Level Diversity From Theory to Practice: An 802.11- based Experimental Investigation E. Vergetis, E. Pierce, M. Blanco and R. Guérin University of Pennsylvania Department of Electrical & Systems

More information

Patrick Verkaik Yuvraj Agarwal, Rajesh Gupta, Alex C. Snoeren

Patrick Verkaik Yuvraj Agarwal, Rajesh Gupta, Alex C. Snoeren Patrick Verkaik Yuvraj Agarwal, Rajesh Gupta, Alex C. Snoeren UCSD NSDI April 24, 2009 1 Voice over IP (VoIP) and WiFi increasingly popular Cell phones with WiFi + VoIP: iphone (+ Skype, Fring, icall,..)

More information

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV CS: 647 Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins University

More information

Performance Analysis of TCP and UDP-based Applications in a IEEE deployed Network

Performance Analysis of TCP and UDP-based Applications in a IEEE deployed Network Performance Analysis of TCP and UDP-based Applications in a IEEE 82.16 deployed Network Hemant Kumar Rath 1 and Abhay Karandikar 2 1 TCS Networks Lab, Bangalore 56 66, India, Email:hemant.rath@tcs.com

More information

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking Wireless Challenges 15-441: Computer Networking Lecture 25: Wireless Networking Force us to rethink many assumptions Need to share airwaves rather than wire Don t know what hosts are involved Host may

More information

Towards Secure Localization Using Wireless Congruity

Towards Secure Localization Using Wireless Congruity Towards Secure Localization Using Wireless Arunesh Mishra, Shravan Rayanchu, Ashutosh Shukla, Suman Banerjee University of Wisconsin, Madison. Email: {arunesh, shravan, shukla, suman}@cs.wisc.edu. Abstract

More information

Co-existence of WiFi and ZigBee

Co-existence of WiFi and ZigBee Co-existence of WiFi and ZigBee Kang G. Shin The University of Michigan Joint work with Xinyu Zhang ACM MobiHoc 2011 Applying Autonomics to Create an Intelligent, Ubiquitous Environment Slide 1 Coexistence

More information

Tools for Evaluating Bluetooth Coexistence with Other 2.4GHz ISM Devices

Tools for Evaluating Bluetooth Coexistence with Other 2.4GHz ISM Devices Tools for Evaluating Bluetooth Coexistence with Other 2.4GHz ISM Devices Ivan Howitt, University of Wisconsin Milwaukee Jose Gutierrez, Eaton Corporation Innovation Center Vinay Mitter, University of Wisconsin

More information

Synchronous Two-Phase Rate and Power Control in WLANs

Synchronous Two-Phase Rate and Power Control in WLANs Synchronous Two-Phase Rate and Power Control in 802.11 WLANs Kishore Ramachandran, Ravi Kokku, Honghai Zhang, and Marco Gruteser WINLAB, Rutgers University and NEC Laboratories America Towards All-Wireless

More information

Towards a Robust Protocol Stack for Diverse Wireless Networks Arun Venkataramani

Towards a Robust Protocol Stack for Diverse Wireless Networks Arun Venkataramani Towards a Robust Protocol Stack for Diverse Wireless Networks Arun Venkataramani (in collaboration with Ming Li, Devesh Agrawal, Deepak Ganesan, Aruna Balasubramanian, Brian Levine, Xiaozheng Tie at UMass

More information

Performance of DSMA/CD in CDPD Networks

Performance of DSMA/CD in CDPD Networks Performance of DSMA/CD in CDPD Networks Riikka Susitaival Networking Laboratory, Helsinki University of Technology Email: Riikka.Susitaival@hut.fi November 23, 2002 Abstract Cellular Digital Packet Data

More information

Joint PHY/MAC Based Link Adaptation for Wireless LANs with Multipath Fading

Joint PHY/MAC Based Link Adaptation for Wireless LANs with Multipath Fading Joint PHY/MAC Based Link Adaptation for Wireless LANs with Multipath Fading Sayantan Choudhury and Jerry D. Gibson Department of Electrical and Computer Engineering University of Califonia, Santa Barbara

More information

Wireless virtualization Soyoung Park

Wireless virtualization Soyoung Park Wireless virtualization 2007.11.14 Soyoung Park sypark@mmlab.snu.ac.kr Contents Wireless virtualization Virtualization technique Simple implementation Wireless virtualization on commodity 802.11 hardware

More information

On the Importance of Using Appropriate Link-to-System Level Interfaces for the Study of Link Adaptation

On the Importance of Using Appropriate Link-to-System Level Interfaces for the Study of Link Adaptation On the Importance of Using Appropriate Link-to-System Level Interfaces for the Study of Link Adaptation Javier Gozalvez and John Dunlop Department of Electronic and Electrical Engineering, University of

More information

Lottery Scheduling for Flexible and Fine-grained Bandwidth Management in Wireless LANs

Lottery Scheduling for Flexible and Fine-grained Bandwidth Management in Wireless LANs Lottery Scheduling for Flexible and Fine-grained Bandwidth Management in Wireless LANs Shravan Rayanchu Sharad Saha Department of Computer Sciences, University of Wisconsin, Madison, WI 537, USA {shravan,

More information

DOMINO: A System to Detect Greedy Behavior in IEEE Hotspots

DOMINO: A System to Detect Greedy Behavior in IEEE Hotspots DOMINO: A System to Detect Greedy Behavior in IEEE 802.11 Hotspots By Maxim Raya, Jean-Pierre Hubaux, Imad Aad Laboratory for computer Communications and Applications(LCA) School of Computer and Communication

More information

Implementation and simulation of OLSR protocol with QoS in Ad Hoc Networks

Implementation and simulation of OLSR protocol with QoS in Ad Hoc Networks Implementation and simulation of OLSR protocol with QoS in Ad Hoc Networks Mounir FRIKHA, Manel MAAMER Higher School of Communication of Tunis (SUP COM), Network Department, m.frikha@supcom.rnu.tn ABSTRACT

More information

APPLICATION NOTE. XCellAir s Wi-Fi Radio Resource Optimization Solution. Features, Test Results & Methodology

APPLICATION NOTE. XCellAir s Wi-Fi Radio Resource Optimization Solution. Features, Test Results & Methodology APPLICATION NOTE XCellAir s Wi-Fi Radio Resource Optimization Solution Features, Test Results & Methodology Introduction Multi Service Operators (MSOs) and Internet service providers have been aggressively

More information

Efficient Transmission of H.264 Video over WLANs

Efficient Transmission of H.264 Video over WLANs Efficient Transmission of H.264 Video over WLANs Yaser P. Fallah March 2007 UBC 1 Multimedia Communications Multimedia applications are becoming increasingly popular Video on mobile devices (cell phones,

More information

Random Access. 1. Aloha. 2. Slotted Aloha 3. CSMA 4. CSMA/CD

Random Access. 1. Aloha. 2. Slotted Aloha 3. CSMA 4. CSMA/CD Random Access 1. Aloha 2. Slotted Aloha 3. CSMA 4. CSMA/CD Background Communication medium B No Collision collision A C Modern Local Area Networks (LANs) operate as follows Users are connected to communication

More information

Wireless Router at Home

Wireless Router at Home Wireless Router at Home 192.168.1.2 192.168.1.1 Modem 192.168.1.3 120.6.46.15 telephone line to ISP 192.168.1.4 Internet connection with public IP internal LAN with private IPs 192.168.1.5 Wireless All-in-one

More information

Data Communications. Automatic Repeat Request Medium Access Control

Data Communications. Automatic Repeat Request Medium Access Control Data Communications Automatic Repeat Request Medium Access Control Handling Error Cases Automatic Repeat request(arq), also known as Automatic Repeat Query, is an error-control method ARQ uses acknowledgements

More information

A Client-driven Approach for Channel Management in Wireless LANs

A Client-driven Approach for Channel Management in Wireless LANs A Client-driven Approach for Channel Management in Wireless LANs Arunesh Mishra Vladimir Brik Suman Banerjee Aravind Srinivasan William Arbaugh CS Dept, University of Maryland, College Park, USA.{arunesh,srin,waa}@cs.umd.edu.

More information

Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica

Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica 802.11 Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica Reference 1. A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner online: http://www.sss-mag.com/pdf/802_11tut.pdf

More information

Eliminating Handoff latencies in WLANs using Multiple Radios: Applications, Experience, and Evaluation

Eliminating Handoff latencies in WLANs using Multiple Radios: Applications, Experience, and Evaluation Eliminating Handoff latencies in 802.11 WLANs using Multiple Radios: Applications, Experience, and Evaluation Vladimir Brik, Arunesh Mishra, Suman Banerjee Presented by: Ibrahim Ben Mustafa For Wireless

More information

Dynamic Rate Adaptation in IEEE WLANs

Dynamic Rate Adaptation in IEEE WLANs Dynamic Rate Adaptation in IEEE 802.11 WLANs SongYiLin@ICT August 10, 2008 References [1] On the Performance Characteristics of WLANs: Revisited (SIGMETRICS 2005) [2] CARA: Collision-Aware Rate Adaptation

More information

An Analysis of Wireless Network Coding for Unicast Sessions: The Case for Coding-Aware Routing

An Analysis of Wireless Network Coding for Unicast Sessions: The Case for Coding-Aware Routing An Analysis of Wireless Network Coding for Unicast Sessions: The Case for Coding-Aware Routing Sudipta Sengupta Shravan Rayanchu,2 Suman Banerjee 2 Bell Laboratories, Lucent Technologies, Murray Hill,

More information

3 Steps for Managing RF Interference Challenges

3 Steps for Managing RF Interference Challenges WHITE PAPER 3 Steps for Managing RF Interference Challenges TABLE OF CONTENTS» Introduction» STEP ONE: Identify non-wi-fi interferers» STEP TWO: Locate non-wi-fi interferers» STEP THREE: Identify Wi-Fi

More information

Quality of Service (QoS) Settings on AP541N Access Point

Quality of Service (QoS) Settings on AP541N Access Point Quality of Service (QoS) Settings on AP541N Access Point Objective Quality of Service (QoS) is a technique used to achieve better performance for a computer network and is also used to enhance the quality

More information

November 1998 doc.: IEEE /378 IEEE P Wireless LANs Extension of Bluetooth and Direct Sequence Interference Model.

November 1998 doc.: IEEE /378 IEEE P Wireless LANs Extension of Bluetooth and Direct Sequence Interference Model. IEEE P802.11 Wireless LANs Extension of Bluetooth and 802.11 Direct Sequence Interference Model Date: November 11, 1998 Author: Jim Zyren Harris Semiconductor Melbourne, FL, USA Phone: (407)729-4177 Fax:

More information

Wireless TCP Performance Issues

Wireless TCP Performance Issues Wireless TCP Performance Issues Issues, transport layer protocols Set up and maintain end-to-end connections Reliable end-to-end delivery of data Flow control Congestion control Udp? Assume TCP for the

More information

Introduction to CDMA ALOHA. 3. Access Control Techniques for CDMA ALOHA

Introduction to CDMA ALOHA. 3. Access Control Techniques for CDMA ALOHA Introduction to CDMA ALOHA 3. Access Control Techniques for CDMA ALOHA Takaya Yamazato Center for Information Media Studies, Nagoya University Nagoya 464-01, Japan yamazato@nuee.nagoya-u.ac.jp CDMA ALOHA

More information

Strategies and Guidelines for Improving Wireless Local Area Network Performance

Strategies and Guidelines for Improving Wireless Local Area Network Performance Strategies and Guidelines for Improving Wireless Local Area Network Performance Dr Nurul Sarkar Associate Professor School of Computing and Mathematical Sciences nurul.sarkar@aut.ac.nz 2 Outline of Talk

More information

A Measurement Study of Multiplicative Overhead Effects in Wireless Networks

A Measurement Study of Multiplicative Overhead Effects in Wireless Networks A Measurement Study of Multiplicative Overhead Effects in Wireless Joseph Camp, Vincenzo Mancuso, Omer Gurewitz, and Edward W. Knightly INFOCOM 2008 http://networks.rice.edu System: Large-scale, Multi-tier

More information

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem Medium Access Control IEEE 802.11, Token Rings Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 9/15/06 CS/ECE 438 - UIUC, Fall 2006 1 9/15/06 CS/ECE

More information

Impact of transmission errors on TCP performance. Outline. Random Errors

Impact of transmission errors on TCP performance. Outline. Random Errors Impact of transmission errors on TCP performance 1 Outline Impact of transmission errors on TCP performance Approaches to improve TCP performance Classification Discussion of selected approaches 2 Random

More information

Wireless Network Security Spring 2011

Wireless Network Security Spring 2011 Wireless Network Security 14-814 Spring 2011 Patrick Tague Feb 15, 2011 SURVEY: MAC Layer Misbehavior Announcements I'd like to talk with each project team in the next week to get a quick progress update

More information

On Admission of VoIP Calls Over Wireless Mesh Network

On Admission of VoIP Calls Over Wireless Mesh Network On Admission of VoIP Calls Over Wireless Mesh Network Hung-yu Wei Department of Electrical Engineering National Taiwan University Taipei, Taiwan {hywei}@ntu.edu.tw Kyungtae Kim, Anand Kashyap and Samrat

More information

Effect of Payload Length Variation and Retransmissions on Multimedia in a WLANs

Effect of Payload Length Variation and Retransmissions on Multimedia in a WLANs Effect of Payload Length Variation and Retransmissions on Multimedia in 8.a WLANs Sayantan Choudhury Dept. of Electrical and Computer Engineering sayantan@ece.ucsb.edu Jerry D. Gibson Dept. of Electrical

More information

Interference-Aware Wireless Network Optimization

Interference-Aware Wireless Network Optimization Interference-Aware Wireless Network Optimization Yin Zhang University of Texas at Austin yzhang@cs.utexas.edu Joint work with Lili Qiu and Ratul Mahajan IPAM Internet MRA Workshops IV 11/17/2008 Motivation

More information

CARA: Collision-Aware Rate Adaptation for IEEE WLANs. Presented by Eric Wang

CARA: Collision-Aware Rate Adaptation for IEEE WLANs. Presented by Eric Wang CARA: Collision-Aware Rate Adaptation for IEEE 802.11 WLANs Presented by Eric Wang 1 Outline Introduction Related Work Preliminaries CARA Performance Evaluation Conclusion and Future Work 2 Basic CSMA/CA

More information

Shravan Rayanchu W. Dayton St, Madison, WI (608) shravan

Shravan Rayanchu W. Dayton St, Madison, WI (608) shravan Shravan Rayanchu 1210 W. Dayton St, Madison, WI 53706. (608) 320-5639 shravan@cs.wisc.edu http://cs.wisc.edu/ shravan Education Ph.D., Computer Sciences, Thesis: Models and systems for understanding wireless

More information

WiZi-Cloud: Application-transparent Dual ZigBee-WiFi Radios for Low Power Internet Access

WiZi-Cloud: Application-transparent Dual ZigBee-WiFi Radios for Low Power Internet Access WiZi-Cloud: Application-transparent Dual ZigBee-WiFi Radios for Low Power Internet Access Tao Jin, Guevara Noubir, Bo Sheng College of Computer and Information Science Northeastern University InfoCom 2011,

More information

MAC protocols for ad hoc networks

MAC protocols for ad hoc networks MAC protocols for ad hoc networks Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/kurssit/tlt-2756/ OUTLINE: Problems for MAC to deal with; Design goals; Classification of

More information

Resource Estimation on Wireless Backhaul Networks (Invited Paper)

Resource Estimation on Wireless Backhaul Networks (Invited Paper) Resource Estimation on Wireless Backhaul Networks (Invited Paper) Irfan Sheriff, Prashanth Aravinda Kumar Acharya, and Elizabeth M. Belding Department of Computer Science, University of California, Santa

More information

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06

More information

The Importance of Being Opportunistic

The Importance of Being Opportunistic High Performance Switching and Routing Telecom Center Workshop: Sept 4, 1997. The Importance of Being Opportunistic Sachin Katti Dina Katabi, Wenjun Hu, Hariharan Rahul, and Muriel Medard Bandwidth is

More information

A Value Aware Approach for Wireless Media Delivery

A Value Aware Approach for Wireless Media Delivery A Value Aware Approach for Wireless Media Delivery Sayandeep Sen Neel Kamal Madabhushi Suman Banerjee University of Wisconsin-Madison Outline Motivation Case Study: Value aware MAC Value aware MAC design

More information

Measurement Driven Admission Control on Wireless Backhaul Networks

Measurement Driven Admission Control on Wireless Backhaul Networks Measurement Driven Admission Control on Wireless Backhaul Networks Irfan Sheriff, Prashanth Aravinda Kumar Acharya and Elizabeth M. Belding Email : {isherif f, acharya, ebelding}@cs.ucsb.edu Department

More information

CHAPTER 7 SIMULATION OBSERVATIONS

CHAPTER 7 SIMULATION OBSERVATIONS CHAPTER 7 CHAPTER 7 SIMULATION OBSERVATIONS Over a randomly distributed wireless network system with the specification is modeled with the suggested algorithms for communication from a selected source

More information

Wireless Networks (MAC)

Wireless Networks (MAC) 802.11 Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica 2016.03.18 CSIE, NTU Reference 1. A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner online: http://www.sss-mag.com/pdf/802_11tut.pdf

More information

TACKLING THE CHALLENGES OF WIRELESS INTERFERENCE AND COEXISTENCE

TACKLING THE CHALLENGES OF WIRELESS INTERFERENCE AND COEXISTENCE TACKLING THE CHALLENGES OF WIRELESS INTERFERENCE AND COEXISTENCE By Jun Huang A DISSERTATION Submitted to Michigan State University in partial fulfillment of the requirements for the degree of DOCTOR OF

More information

COAP: A So)ware- Defined Approach for Home WLAN Management though an Open API. Ashish Patro* Prof. Suman Banerjee

COAP: A So)ware- Defined Approach for Home WLAN Management though an Open API. Ashish Patro* Prof. Suman Banerjee COAP: A So)ware- Defined Approach for Home WLAN Management though an Open API Ashish Patro* Prof Suman Banerjee University of Wisconsin Madison *patro@cswiscedu Ashish Patro / COAP / MobiArch 2014 1 Dense

More information

Protection Schemes for 4G Multihop wireless Networks

Protection Schemes for 4G Multihop wireless Networks Protection Schemes for 4G Multihop wireless Networks Sridevi, Assistant Professor, Department of Computer Science, Karnatak University, Dharwad Abstract:-This paper describes the relay node protection

More information

Attack & Defense in Wireless Networks

Attack & Defense in Wireless Networks Attack & Defense in Wireless Networks John M. Shea April 22, 2008 Overview Wireless networks fundamentals vulnerabilities WING testbed Demonstration of Denial-of-Service Attack and Defense Classification:

More information

Configuring Advanced Radio Settings on the WAP371

Configuring Advanced Radio Settings on the WAP371 Article ID: 5069 Configuring Advanced Radio Settings on the WAP371 Objective Radio settings are used to configure the wireless radio antenna and its properties on the wireless access point (WAP) device

More information

Block-switched Networks: A New Paradigm for Wireless Transport

Block-switched Networks: A New Paradigm for Wireless Transport Block-switched Networks: A New Paradigm for Wireless Transport Ming Li, Devesh Agrawal, Deepak Ganesan, and Arun Venkataramani University of Massachusetts Amherst What You Buy vs. What You Get TCP performs

More information

Successive Interference Cancellation: A Back of the Envelope Perspective. Souvik Sen, Naveen Santhapuri, Romit Roy Choudhury, Srihari Nelakuditi

Successive Interference Cancellation: A Back of the Envelope Perspective. Souvik Sen, Naveen Santhapuri, Romit Roy Choudhury, Srihari Nelakuditi Successive Interference Cancellation: A Back of the Envelope Perspective Souvik Sen, Naveen Santhapuri, Romit Roy Choudhury, Srihari Nelakuditi Simple Case of Wireless Transmission T1 AP Decoding successful

More information

Uplink Traffic Control in Home Wireless Networks

Uplink Traffic Control in Home Wireless Networks Uplink Traffic Control in Home 802.11 Wireless Networks Yanlin Li Carnegie Mellon University yanlli@cmu.edu Dina Papagiannaki Telefonica Research dina@tid.es Anmol Sheth Technicolor Research anmol.sheth@technicolor.com

More information

Modeling and Simulating Packet Dispersion in Wireless Networks

Modeling and Simulating Packet Dispersion in Wireless Networks Worcester Polytechnic Institute Digital WPI Computer Science Faculty Publications Department of Computer Science 6 Modeling and Simulating Packet Dispersion in Wireless 8. Networks Mingzhe Li Worcester

More information

. 14 Byte for Acks. Due to this fact, the overhead is more relevant if the data contained in packets is sent to high rates:

. 14 Byte for Acks. Due to this fact, the overhead is more relevant if the data contained in packets is sent to high rates: QoS in IEEE 802.11 Issues Some issues are important for quality of service: the first one mentioned is the difference of performances expired by nodes based on their position in the network. Indeed, considering

More information

Diagnosing: Home Wireless & Wide-area Networks

Diagnosing: Home Wireless & Wide-area Networks Diagnosing: Home Wireless & Wide-area Networks Partha Kanuparthy, Constantine Dovrolis Georgia Institute of Technology 1 1 Two Parts Diagnosing home wireless networks [CCR 12] Joint work between GT, Telefonica,

More information

CWNP PW Certified Wireless Analysis Professional. Download Full Version :

CWNP PW Certified Wireless Analysis Professional. Download Full Version : CWNP PW0-270 Certified Wireless Analysis Professional Download Full Version : http://killexams.com/pass4sure/exam-detail/pw0-270 QUESTION: 50 ABC Company is having VoWiFi latency problems on their 802.11g

More information

EVALUATING ADJACENT CHANNEL INTERFERENCE IN IEEE NETWORKS

EVALUATING ADJACENT CHANNEL INTERFERENCE IN IEEE NETWORKS EVALUATING ADJACENT CHANNEL INTERFERENCE IN IEEE 802.11 NETWORKS Wee Lum Tan 1, Konstanty Bialkowski 1 1 Queensland Research Laboratory National ICT Australia Brisbane, QLD, Australia Email: {weelum.tan,

More information

IEEE P Working Group for Wireless Personal Area Networks TM

IEEE P Working Group for Wireless Personal Area Networks TM IEEE P802.15 Working Group for Wireless Personal Area Networks TM SCORT - An Alternative to the Bluetooth SCO Link for Voice Operation in an Interference Environment Slide 1 Bluetooth SCO Link The Bluetooth

More information

Quality of Service Mechanism for MANET using Linux Semra Gulder, Mathieu Déziel

Quality of Service Mechanism for MANET using Linux Semra Gulder, Mathieu Déziel Quality of Service Mechanism for MANET using Linux Semra Gulder, Mathieu Déziel Semra.gulder@crc.ca, mathieu.deziel@crc.ca Abstract: This paper describes a QoS mechanism suitable for Mobile Ad Hoc Networks

More information

Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs)

Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Project: IEEE P802.15 Working Group for Wireless Personal Area Networks (WPANs) Title: [Samsung-ETRI Merged MAC Proposal to TG8 CFC] Date Submitted: [5 May 2014] Source: [Seung-Hoon Park, Kyungkyu Kim,

More information

Link Quality based Association Mechanism in IEEE h compliant Wireless LANs

Link Quality based Association Mechanism in IEEE h compliant Wireless LANs Link Quality based Association Mechanism in IEEE 802.11h compliant Wireless LANs T. Korakis +, O. Ercetin α, S. Krishnamurthy, L. Tassiulas +, S. Tripathi ρ + Computer Engineering and Telecommunications

More information

Lecture 19. Principles behind data link layer services Framing Multiple access protocols

Lecture 19. Principles behind data link layer services Framing Multiple access protocols Link Layer Lecture 19 Principles behind data link layer services Framing Multiple access protocols ALOHA *The slides are adapted from ppt slides (in substantially unaltered form) available from Computer

More information

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC) A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for

More information

Simulated SA Throughput vs. p

Simulated SA Throughput vs. p Problem 1. Simulation of Slotted Aloha network (A) There are n stations in the network that are trying to transmit messages to an access point. (B) All the stations are synchronized and they are using

More information

MAC LAYER. Murat Demirbas SUNY Buffalo

MAC LAYER. Murat Demirbas SUNY Buffalo MAC LAYER Murat Demirbas SUNY Buffalo MAC categories Fixed assignment TDMA (Time Division), CDMA (Code division), FDMA (Frequency division) Unsuitable for dynamic, bursty traffic in wireless networks Random

More information

Link Estimation and Tree Routing

Link Estimation and Tree Routing Network Embedded Systems Sensor Networks Link Estimation and Tree Routing 1 Marcus Chang, mchang@cs.jhu.edu Slides: Andreas Terzis Outline Link quality estimation Examples of link metrics Four-Bit Wireless

More information

Announcements: Assignment 4 due now Lab 4 due next Tuesday Assignment 5 posted, due next Thursday

Announcements: Assignment 4 due now Lab 4 due next Tuesday Assignment 5 posted, due next Thursday ECE/CS 372 introduction to computer networks Lecture 15 Announcements: Assignment 4 due now Lab 4 due next Tuesday Assignment 5 posted, due next Thursday Credit for lecture slides to Professor Bechir Hamdaoui

More information