Optimizing the hotspot performances by using load and resource balancing method

Similar documents
Energy consumption model on WiMAX subscriber station

UDP-Lite Enhancement Through Checksum Protection

Measuring the power consumption of social media applications on a mobile device

Model of load balancing using reliable algorithm with multi-agent system

Load balancing factor using greedy algorithm in the routing protocol for improving internet access

Minimizing Energy Consumption on Mobile Phone by Rearranging Transport Protocol Load

Efficient Node Reconfiguration in Mobile Ad Hoc Networks (MANETs) for Wireless Internet Access Point Connection

Monitoring and Indentification Packet in Wireless With Deep Packet Inspection Method

File text security using Hybrid Cryptosystem with Playfair Cipher Algorithm and Knapsack Naccache-Stern Algorithm

Efficient Handoff using Mobile IP and Simplified Cellular IP

A New Load Balancing Procedure in IEEE WLANs

Optimization of Data Communication on Air Control Device Based on Internet of Things with Application of HTTP and MQTT Protocols

Optimization Model of K-Means Clustering Using Artificial Neural Networks to Handle Class Imbalance Problem

Fast Learning for Big Data Using Dynamic Function

MODIFIED VERTICAL HANDOFF DECISION ALGORITHM FOR IMPROVING QOS METRICS IN HETEROGENEOUS NETWORKS

The Observation of Bahasa Indonesia Official Computer Terms Implementation in Scientific Publication

The Role of Participatory Design in Mobile Application Development

HETEROGENEOUS NETWORKS BASED ON SAW AND WPM METHODS

Two-Stage orders sequencing system for mixedmodel

Conveyor Performance based on Motor DC 12 Volt Eg-530ad-2f using K-Means Clustering

Prime Numbers Comparison using Sieve of Eratosthenes and Sieve of Sundaram Algorithm

Autonomous Infrastructure Wireless Networks: A Perspective on 4G

Design of Smart Home Systems Prototype Using MyRIO

Application Marketing Strategy Search Engine Optimization (SEO)

An Implementation of RC4 + Algorithm and Zig-zag Algorithm in a Super Encryption Scheme for Text Security

Concept of Analysis and Implementation of Burst On Mikrotik Router

Standalone Mobile Application for Shipping Services Based on Geographic Information System and A-Star Algorithm

Feature weighting using particle swarm optimization for learning vector quantization classifier

Application of Augmented Reality Technology in Workshop Production Management

An efficient handover and channel management approach in integrated network

QoS and Radio Resource Management in 3G and Beyond Systems. Oriol Sallent Kideok Cho

Development of Smart Home System to Controlling and Monitoring Electronic Devices using Microcontroller

SSL/TLS Vulnerability Detection Using Black Box Approach

University of Würzburg Institute of Computer Science Research Report Series. Performance Comparison of Handover Mechanisms in Wireless LAN Networks

A CDCA-TRACE MAC PROTOCOL FRAMEWORK IN MOBILE AD-HOC NETWORK

Optimized Paging Cache Mappings for efficient location management Hyun Jun Lee, Myoung Chul Jung, and Jai Yong Lee

Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5

Last Lecture: Data Link Layer

A Scalable Content- Addressable Network

Implementation of pattern generation algorithm in forming Gilmore and Gomory model for two dimensional cutting stock problem

Alternative Improving the Quality of Sub-Voltage Transmission System using Static Var Compensator

Reducing a congestion with introduce the greedy algorithm on traffic light control

Chapter 9 Introduction to Networks

A NOVEL APPROACH FOR PREDICTING MOVEMENT OF MOBILE USERS BASED ON DATA MINING TECHNIQUES

Personal Computer-less (PC-less) Microcontroller Training Kit

Performance analysis of parallel de novo genome assembly in shared memory system

LiRa: a WLAN architecture for Visible Light Communication with a Wi-Fi uplink

Introducing RF3D WiFi Planner Version 2

Grouping the community health center patients based on the disease characteristics using C4.5 decision tree

Developing Control System of Electrical Devices with Operational Expense Prediction

Hole Feature on Conical Face Recognition for Turning Part Model

Wireless LANs. ITS 413 Internet Technologies and Applications

Attendance fingerprint identification system using arduino and single board computer

SENSE AND CACHE A NOVEL CACHING SCHEME FOR MOBILE USERS IN A CELLULAR NETWORK

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

Probe Request based Load Balancing Metric with Timely Handoffs for WLANs

Enhanced Fast BSS Transition on Enterprise WLAN with SDN-based Distribution System

Network Infrastructure

ON THE CELL BREATHING TECHNIQUE TO REDUCE CONGESTION APPLYING BANDWIDTH LIMITATION

Open Access Research on Algorithms of Spatial-Temporal Multi-Channel Allocation Based on the Greedy Algorithm for Wireless Mesh Network

On Admission of VoIP Calls Over Wireless Mesh Network

REDUCTION OF NETWORK CONGESTION IN M2M COMMUNICATION

Performance Evaluation of Wireless n Using Level 2 and Level 3 Mobility

Wireless Technologies

Vertical Handover in Vehicular Ad-hoc Networks A Survey

Methods for Channel Assignment in Infrastructure based WLAN-A Survey

Simulation of the effectiveness evaluation process of security systems

Vigenere cipher algorithm modification by adopting RC6 key expansion and double encryption process

Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks

Analyzing traffic source impact on returning visitors ratio in information provider website

Analysis of the Coverage Area of the Access Point Using Netspot Simulation

Improving Channel Scanning Procedures for WLAN Handoffs 1

An Adaptive Bandwidth Reservation Scheme for Multimedia Mobile Cellular Networks

CSMA based Medium Access Control for Wireless Sensor Network

Journal of Physics: Conference Series PAPER OPEN ACCESS. To cite this article: B E Zaiwani et al 2018 J. Phys.: Conf. Ser.

Research on Scalable Zigbee Wireless Sensor Network Expansion Solution

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem

IEEE in the Large: Observations at an IETF Meeting

CEN 538 Wireless LAN & MAN Networks

Introduction to Wireless Networking CS 490WN/ECE 401WN Winter Lecture 4: Wireless LANs and IEEE Part II

THE penetration of IEEE based wireless networks. WIANI: Wireless Infrastructure and Ad-Hoc Network Integration

Department of Electrical and Computer Systems Engineering

Interoperability framework for communication between processes running on different mobile operating systems

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function

The application of EOQ and lead time crashing cost models in material with limited life time (Case study: CN-235 Aircraft at PT Dirgantara Indonesia)

Modeling and optimization of transmission and processing of data in an information computer network

Competency Assessment Parameters for System Analyst Using System Development Life Cycle

Dynamic Power Control MAC Protocol in Mobile Adhoc Networks

Dr./ Ahmed Mohamed Rabie Sayed

WLAN a-z 2010/02/15. (C) Herbert Haas

Evaluation of End-to-End TCP performance over WCDMA

presented by: [ THE TECHNOLOGY LIAISON TEAM ORKTS CUHK ]

The recognition of female voice based on voice registers in singing techniques in real-time using hankel transform method and macdonald function

Empirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks

Undercut feature recognition for core and cavity generation

Learning Objectives. Introduction. Advantages of WLAN. Information Technology. Mobile Computing. Module: Wireless Local Area Network: IEEE 802.

Clustered Coordinator SABTS (CC-SABTS) for Beacon Transmission in IEEE LR-WPAN

Femto-Matching: Efficient Traffic Offloading in Heterogeneous Cellular Networks

An implementation of super-encryption using RC4A and MDTM cipher algorithms for securing PDF Files on android

Double Threshold Based Load Balancing Approach by Using VM Migration for the Cloud Computing Environment

Transcription:

IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Optimizing the 802.11 hotspot performances by using load and resource balancing method To cite this article: C J Napitupulu et al 2018 IOP Conf. Ser.: Mater. Sci. Eng. 420 012128 View the article online for updates and enhancements. This content was downloaded from IP address 148.251.232.83 on 22/11/2018 at 07:56

Optimizing the 802.11 hotspot performances by using load and resource balancing method C J Napitupulu, P Sihombing, S Suherman Universitas Sumatera Utara, Medan, Indonesia suherman@usu.ac.id Abstract. The 802.11 networks have been commonly used for public internet access. Most 802.11 hotspots have more than one access point in an area. When these access points belong to the same network, users may choose anyone it connects to. In order to enhance the access services, some methods have been proposed. The methods allocate users to certain access point to avoid crowded and collided access. The method is referred to as load balancing. The existing work in load balancing are usually based on traffic balancing as well as cell breathing. The first one is the most common method as the cell breathing applies power reduction while electromagnetic wave travels anywhere and access point are usually in distance of low power transmitter. This paper proposes load and resource balancing where the client allocation is not only based on its load but also the access point resource. The simulation evaluation shows that the proposed method outperforms the existing one by reducing delay by 0.9%, increasing throughput up to 715 kbps and the collision probability reduces by 0.068% in average. 1. Introduction Wireless local area network (WLAN) is the 802.11 based network infrastructure that connecting (computer) clients to the internet. WLANs have been daily need both in houses or offices. It is easy to find wireless local area networks (WLANs) anywhere now [1], [2]. The WLAN area is called the hotspot. The hotspots usually contain more than one network access point. When access points belong to the same network operator, access point migration and roaming are possible. Incoming users can be connected to any access point while the existing client that experiences network disturbances or congestion can be reallocate to other access point [3]. These network connection is arranged automatically by the network infrastructure by using certain network balancing algorithm. Without this connection management, users may choose the preferred network access point (that could be overloaded), while the non-popular ones may experience under loaded. Some researchers propose the load balancing methods. Among them, Velayos [4] performs load balancing by connecting access points to a backbone network so that each access point can interact to others sharing their load information. The software within access point calculates its load and compares it to the average load belongs to all access point. If it is under loaded, new client is allowed to connect through it. This method improves previous work where the processing centralized server manages the load balancing [5]. The weakness of [4] idea is the low network capability is treated similarly. The other method [6] implements cell breathing where the overloaded access point reduces its transmitting power. By doing that, the lost connection users should find other access point. However, this may interrupt the existing communication. Work in [7] overcome the problem by separating beacon and data Content from this work may be used under the terms of the Creative Commons Attribution 3.0 licence. Any further distribution of this work must maintain attribution to the author(s) and the title of the work, journal citation and DOI. Published under licence by Ltd 1

transmitting power, so that existing communication keeps flowing but changes connecting access point afterwards. The main weakness of cell breathing is that multi power level transmitter is required within the access point transmitter. This also affects the advance technique which the adaptive code and modulation (ACM), where signal level determines the rate of modulation. Clients may experience speed reduction as the connecting access point reduces it transmitting power. This paper focuses on improving load balancing without cell breathing by considering the network resources. As 802.11 network advances, there are many variants exist, including 802.11a, 802.11b, 802.11g, 802.11ac, 802.11n and other standards. By these technology existences, access points may have different capabilities. So that the same load balancing treatment without resource consideration does not optimizes the network performances. 2. The proposed method This paper focuses on developing AP selection for the newly joining user. The proposed method expands the lowest method proposed by [4]by considering the maximum throughput in each AP. It is aimed at accommodating the variety provided by the 802.11 standards, which offer various speeds (bitrates). As in the lowest load [4], AP shares the balance index through the network backbone which is defined as : β = ( B i) 2 ( B i 2 ) (1) where B i is the current through put of the i th of APs. The balance index is 1 if all Aps havethe same load. The P load is classified into 3 types: overload, balance or under load based on average load L: L = n i=0 B i n The proposed method expands the criteria by considering the maximum throughput offered by the AP. If it is assumed that B i is thecurrent throughput of the i th AP, and the maximum capability of the current AP is B i Max, then the utility is given by: The AP allocation is based on the smallest utility, min (μ i ). (2) μ i = B imax B i (3) 3. Research method In order to evaluate the proposed method, simulation code and simulation scenario designed. The simulation code was assembled by using Java programming language. The nodes created as well as their traffics. Transmission number and rates were defined in each node. Simulation time divided into slots. In each slot, random selection defined randomly to choose the transmitting nodes with given back-off time. The successful transmitting node selected, and the number transmitted bytes calculated based on the node speed. Delay, collision rate and throughput recorded though out slot execution. The process is following the graph shown in figure 1. The existing methods to compare were the random selection and the lowest load methods. 2

START Existing and the proposed method simpleentations Scenarios implementations Performance Evaluation FINISH Figure 1. Research flow process 4. The evaluation results The overall performances shows that the average delay of the proposed method outperforms the previous method by achieving 0.9% reduction. The collision probability reduces by 0.068% in average and throughput increases at least 715 Kbps. The performances plotted in figure 2. (a) Delay characteristic 3

(b) Collision characteristic (c) Throughput characteristic Figure 2. Overall performance By varying the number of active APs, the performance pattern is depicted in figure 3. Delay varies on AP numbers. The proposed method is table for various AP number, but the lowest load tends to have increasing delay. Meanwhile, the collision rate of the proposed method increases higher than the existing method, however, it does not influence the throughput as the successful transmitting ode sends data at higher speed as offered by the AP. 4

(a) Delay characteristic (b) Collision characteristic (c) Throughput characteristic Figure 3. Load balancer performances against number of AP 5. Conclusions This paper has proposed the expansion of the lowest load method in balancing access point allocation in 802.11. The methods add maximum throughput consideration of the pointed AP. 5

The results show that delayand throughput performances of the hotspot with multiple AP have been successfully improved. The proposed method reduces the average delay by 0.9%, increases the average throughput up to 715 kbps and reduces the collision probability reduces by 0.068% in average. References [1] S. Suherman, WiFi-Friendly Building to Enable WiFi Signal Indoor, Bull. Electr. Eng. Informatics, vol. 7, no. 2, 2018. [2] M. Al-Akaidi, A review on transport layer protocol performance for delivering video on an adhoc network, in IOP Conference Series: Materials Science and Engineering, 2017, p. Vol. 237, No. 1, 012018. [3] Magade, Krishnanjali A., and Abhijit Patankar. 2014. Techniques for Load Balancing in Wireless LAN s. International Conference on Communication and Signal Processing, ICCSP 2014 - Proceedings, no. 2248: 1831 36. https://doi.org/10.1109/iccsp.2014.695016. [4] H. Velayos, V. Aleo, and G. Karlsson, Load balancing in overlapping wireless LAN cells, 2004 IEEE Int. Conf. Commun. (IEEE Cat. No.04CH37577), vol. 7, no. c, pp. 3833 3836, 2004. [5] A. Balachandran, P. Bahl, and G. M. Voelker, Hot-spot congestion relief in public-area wireless networks, Proc. - 4th IEEE Work. Mob. Comput. Syst. Appl. WMCSA 2002, pp. 70 80, 2002. [6] O. K. V. Veeravalli, A Locally Optimal Handoff Algorithms for Cellular Communication, IEEE Trans. Veh. Technol., vol. 46, no. 3, pp. 603 609, 1997. [7] S. Wang, J. Huang, X. Cheng, and B. Chen, Coverage adjustment for load balancing with an AP service availability guarantee in WLANs, Wirel. Networks, vol. 20, no. 3, pp. 475 491, 2014. 6