A QUANTITATIVE ANALYSIS OF HANDOVER TIME AT MAC LAYER FOR WIRELESS MOBILE NETWORKS

Similar documents
Quantification of Capacity and Transmission Delay for Mobile Ad Hoc Networks (MANET)

Performance analysis of Internet applications over an adaptive IEEE MAC architecture

University of Würzburg Institute of Computer Science Research Report Series. Performance Comparison of Handover Mechanisms in Wireless LAN Networks

Wireless Protocols. Training materials for wireless trainers

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks

Computer Communication III

Mohammad Hossein Manshaei 1393

Wireless MACs: MACAW/802.11

Chapter 12 Multiple Access 12.1

Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

Collision Probability in Saturated IEEE Networks

Mohamed Khedr.

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

Wireless Networks (MAC)

COEXISTENCE MODEL OF ZIGBEE& IEEE b (WLAN) IN UBIQUITOUS NETWORK ENVIRONMENT

Improving Channel Scanning Procedures for WLAN Handoffs 1

Investigating MAC-layer Schemes to Promote Doze Mode in based WLANs

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA

Prioritization scheme for QoS in IEEE e WLAN

ECE 4450:427/527 - Computer Networks Spring 2017

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function

Impact of IEEE n Operation on IEEE Operation

Transmission Control Protocol over Wireless LAN

TCP over Wireless. Protocols and Networks Hadassah College Spring 2018 Wireless Dr. Martin Land 1

The MAC layer in wireless networks

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

because all web objects are not cacheable [3]. Data compression algorithms are applied on the information content of the web object.

PERFORMANCE EVALUATION OF AODV AND DSR ROUTING PROTOCOLS IN MANET NETWORKS

Data Communication & Networks G Session 5 - Main Theme Wireless Networks. Dr. Jean-Claude Franchitti

Wireless LANs. ITS 413 Internet Technologies and Applications

Media Access Control in Ad Hoc Networks

Wireless Medium Access Control Protocols

CSE 461: Wireless Networks

Lesson 2-3: The IEEE x MAC Layer

Multiple Access Links and Protocols

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

Collision Free and Energy Efficient MAC protocol for Wireless Networks

Department of Electrical and Computer Systems Engineering

November 1998 doc.: IEEE /378 IEEE P Wireless LANs Extension of Bluetooth and Direct Sequence Interference Model.

Performance Comparison of IEEE e EDCA and b DCF Under Non- Saturation Condition using Network Simulator

IEEE P Wireless LANs Impact of Bluetooth on Direct Sequence. Abstract

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

Multichannel Outage-aware MAC Protocols for Wireless Networks

Enhancements and Performance Evaluation of Wireless Local Area Networks

King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering

Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for Heterogeneous Wireless Sensor Networks

Lecture 16: QoS and "

Last Lecture: Data Link Layer

Data and Computer Communications. Chapter 13 Wireless LANs

Lecture 6. Reminder: Homework 2, Programming Project 2 due on Thursday. Questions? Tuesday, September 13 CS 475 Networks - Lecture 6 1

A Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment

An Efficient Scheduling Scheme for High Speed IEEE WLANs

Ethernet. Lecture 6. Outline. Ethernet - Physical Properties. Ethernet - Physical Properties. Ethernet

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

IEEE Technical Tutorial. Introduction. IEEE Architecture

Call Admission Control for IEEE Contention Access Mechanism

MAC in /20/06

Enhancing the DCF mechanism in noisy environment

The Impact of Transmission Overheads on IEEE Throughput: Analysis and Simulation

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

NMA Radio Networks Network Level: Medium Access Control Roberto Verdone

MAC Research Highlight

Data Communications. Data Link Layer Protocols Wireless LANs

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD.

Multiple Access Protocols

The effect of Mobile IP handoffs on the performance of TCP

A Study on Delay, Throughput and Traffic Measurement for Wi-Fi Connected Stations Based on MAC Sublayer

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross

Solutions to Performance Problems in VoIP Over a Wireless LAN

The IEEE Distributed Coordination Function in Small-Scale Ad-Hoc Wireless LANs

The MAC layer in wireless networks

Evaluation of the backoff procedure of Homeplug MAC vs. DCF

A Comparative Analysis on Backoff Algorithms to Optimize Mobile Network

Unit 7 Media Access Control (MAC)

Ad Hoc b Cooperative Protocols: Performance in a Slow Fading Channel

Project Report: QoS Enhancement for Real-Time Traffic in IEEE WLAN

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

CSC 4900 Computer Networks: Wireless Networks

Vertical Handoff Characterization for SIP and msctp Based UMTS-WLAN Integration Solutions

Performance evaluation of Cooperative MAC and ZRP in Cooperative Communication Networking Environment

Shared Access Networks Wireless. 1/27/14 CS mywireless 1

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF

THE IEEE standard was created in 2003, and its

Introduction to Wireless Networking CS 490WN/ECE 401WN Winter Lecture 4: Wireless LANs and IEEE Part II

Markov Chains and Multiaccess Protocols: An. Introduction

IMPACT OF PACKET SIZE ON THE PERFORMANCE OF IEEE FOR WIRELESS SENSOR NETWORK

Supporting VBR VoIP Traffic in IEEE WLAN in PCF Mode

Wireless LAN -Architecture

An efficient trigger to improve intra-wifi handover performance

Probabilistic Worst-Case Response-Time Analysis for the Controller Area Network

ECEN 5032 Data Networks Medium Access Control Sublayer

Different QoS Based TORA Reactive Routing Protocol using OPNET 14.5

June 20th, École Polytechnique, Paris, France. A mean-field model for WLANs. Florent Cadoux. IEEE single-cell WLANs

P B 1-P B ARRIVE ATTEMPT RETRY 2 1-(1-P RF ) 2 1-(1-P RF ) 3 1-(1-P RF ) 4. Figure 1: The state transition diagram for FBR.

CHAPTER 5 PROPAGATION DELAY

Transcription:

A QUANTITATIVE ANALYSIS OF HANDOVER TIME AT MAC LAYER FOR WIRELESS MOBILE NETWORKS Syed S. Rizvi 1, Aasia Riasat 2, and Khaled M. Elleithy 3 1 Computer Science and Engineering Department, University of Bridgeport, Bridgeport, CT, USA srizvi@bridgeport.edu 2 Department of Computer Science, Institute of Business Management, Karachi, Pakistan aasia.riasat@iobm.edu.pk 3 Computer Science and Engineering Department, University of Bridgeport, Bridgeport, CT, USA elleithy@bridgeport.edu ABSTRACT Extensive studies have been carried out for reducing the handover time of wireless mobile network at medium access control (MAC) layer. However, none of them show the impact of reduced handover time on the overall performance of wireless mobile networks. This paper presents a quantitative analysis to show the impact of reduced handover time on the performance of wireless mobile networks. The proposed quantitative model incorporates many critical performance parameters involve in reducing the handover time for wireless mobile networks. In addition, we analyze the use of active scanning technique with comparatively shorter beacon interval time in a handoff process. Our experiments verify that the active scanning can reduce the overall handover time at MAC layer if comparatively shorter beacon intervals are utilized for packet transmission. The performance measures adopted in this paper for experimental verifications are network throughput under different network loads. KEYWORDS Handover time, medium access control, detection phase latency time, wireless mobile networks 1. INTRODUCTION A Handoff occurs in IEEE 802.11b when a mobile station moves beyond the radio range of one access point (AP) and enters in another coverage area at the MAC layer. During the handoff, management frames are exchanged between the station (STA) and the AP. Consequently, there is a latency involved in the handoff process during which the STA is unable to send or receive traffic. On the other hand, our measurements are not only shown that the latencies are very high but also shown that they vary significantly for the same configuration of stations and AP. In this paper, we use full scan handoff to denote the original active handoff scheme of the wireless card which scans all channels consecutively in the discovery phase. Most improvements to the active scan handoff strive to scan fewer channels. This is called as selective scan handoff. The authors of [1] proposed a MAC layer fast handoff. They use selective scan to record the scan results in the AP cache for future use. However, in the case of incorrect cached information, the handoff latency is the same as that of the full scan handoff. Recently, a fast scan handoff 21

scheme is proposed [2]. Instead of broadcasting the probe request frame to all APs, the probe request frame is sent to a specific AP who will be the sole responder. However, this scheme needs to change both the wireless mobile stations and the AP. 2. MATHEMATICAL MODEL FOR REDUCING THE HANDOVER TIME This section presents a mathematical model that incorporates many critical performance measurements to show the impact of reduced handover time on wireless mobile networks. The performance of the cells permits the use of the real time services when the MAC scheduler is modified [3]. However, our study focuses on the optimization of the second method. We have observed in our measurements that stations firstly assume collision and retransmit several times. If transmission remains unsuccessful, then radio fading is assumed and the link is probed by sending probe requests. We present an argument that stations must start the search phase as soon as collision can be excluded as reason for failure. If the actual reason was a temporary signal fading, the selected AP s search would likely be the current one and the handoff will not be executed. Thus, a key factor in our detection algorithm is the number of collisions that a frame can suffer before it is transmitted. 2.1.Proposed Mathematical Model for the Collision Detection and Avoidance We use the probability distribution function (PDF) to approximate the number of collisions for both saturated and non-saturated cases. The proposed probabilistic approach assumes that the STAs must start the search phase as soon as collision can be excluded as reason for failure. If the actual reason was a temporary signal fading, the selected AP after the search would likely be the current one and the handoff will not be executed. According to PDF, if we assume that a random variable X represents a collision per frame transmission, then X should lie within a certain range representing by R. We assume that the value of R belongs to an interval of two values representing as VMIN and V. This argument leads us to the following mathematical expression: X { V, V } where R { V, V } (1) MIN MIN By further extending (1), we can approximate the probability that X lies in the ideal interval: P( X ) { V, V } = F V F V (2) MIN MIN Where F represents the PDF and P is the probability that X lies within the defined interval for collision avoidance. Based on (1) and (2), one can produce the PDF for the collision avoidance as shown in (3): R F ( R) = P{ X R} (3) R If we further assume that the system consists of K users, then (1) and (3) be used to approximate the probability of collision per frame transmission. In other words, by reversing the order of probabilities given in (1) and (3) with respect to the ideal range shown in (2), we can approximate the number of total collisions as follows. 22

R i R+ 1 { X R } = ( 1 ) @(1 ) (4) P P P P R 1 where the sign @ represents the estimated value and the term ( 1 P ) + can be considered as a normalization term to ensure that the probability of each random backoff time follows a valid PDF. The random backoff time will be discussed later in detail. In addition, R will be any real number representing the number of STAs ready to transmit the frames. The range of R is provided in (2). In order to derive a generic equation that includes both detection and avoidance, we can now combine our four equations that yield the following result: j= 0 P{ X R} P P P P j= 0 i F ( ) { } 1 { } ( 1 ) (1 ) R R = P X R + X R = @ (5) Equation (5) consists of both the probability of detection and collision avoidance characteristics. For the sake of simulation, we assume that there are n numbers of STAs that are transmitting a fixed packet size of typically 40 bytes using an ideal channel. Fig. 1 shows a regular case of packet transmission when only a limited number of users are transmitting at one time. In addition, for Fig. 1 we run our simulation multiple times for different values of n. In order to address the worst case scenario, we consider n number of STAs with an additional assumption that all STAs have data to transmit all the time via an ideal channel (i.e., the standard IEEE 802.11 MAC [1]) as shown in Fig. 2. It should be noted in Fig. 2 that the probability of collision increases as we increase the probability of transmission per frame. However, the performance degradation was small compared to the increase in probability of Figure 1. PDF versus number of collision per frame with ideal channel condition for a nonsaturated condition 23

Figure 2. PDF versus number of collision per frame with ideal channel condition for a saturated condition packet transmission. Fig. 1 shows that three consecutive collisions is a rare event, even in saturation as shown in Fig. 2. This implies that there is no need to explicitly probe the link. The same conditions that we used throughout our measurements, this time would be around 3 ms, which are approximately leads to 300. In order to compute the minimum channel time, we follow the classical theory of Slotted Aloha protocol [4]. That is, each STA listens to the channel before the transmission of the frames. If the channel is busy, it defers the transmission with a certain probability. On the other hand, if the channel is free for a certain time (called DIFS, Distributed Inter Frame Space, in the standard [3]), then the STA can transmit the frames. In addition, when the channel is busy, each node waits for a random amount of time and then periodically listen the channel to find possible DIFS. This random wait-time can be considered as a random backoff time that each node needs to experience during the high contention. Since each STA can only transmit during a certain slot, this random backoff time is, therefore, a multiple of slot times. In addition, we also assume that there is no propagation time and response generation time involve in the computation of minimum channel time. The above discussion leads us to the following mathematical expression: Min DIFS RB S ( ) ( ) + ( ) CT Time Time (6) where Min ( CT ) referees to minimum channel time, DIFS, RB Time represents random backoff time, and the parameter S Time indicates the length of the slot. We can approximate the ideal range of Min ( CT ) as follows: APR Min( CT ) DIFS 24

Next, we need to compute the values of maximum channel time which might work as the upper threshold value. Since 10 STAs per cell seem to be an adequate number to achieve a good cell throughput [5], we have simulated the different beacon interval with OPNET to figure out the suitable max channel time. Based on our experiments, we conclude that the best value for maximum channel time is 10 milliseconds. The last step is to compute the total search time. According to the IEEE standard [1], each STA requires to scan all available channels during active scan. The available channels include both busy channels (B) and free channels (F). Also, the time to scan a busy channel is not necessarily the same as to scan a free channel. This, therefore, leads us to a simple mathematical expression for the total search time: SETime = TB ( B) + TF ( F ) where the left hand side of this expression represents the total search time, and TB and TF represents the time required to scan a busy and free channels, respectively. The last step is to compute the maximum channel time and the total search time. The available channels include both busy channels (B) and free channels (F). The total search time will be based on the total time required to scan both busy and free channels. This leads to the following equation: TB = ( 2 P( ) ) + ( Max( ) ), TF = ( 2P Delay CT ( Delay) ) + ( Min( CT ) ) (7) If we assume that we have an ideal minimum time for scanning free channels, then the following mathematical expressions must be true: TB = ( 2P( Delay ) ) + Max( CT ) ( ) ( 2 ( ) ) ( ) ( ) T P DIFS RB S F = + + Delay Time Time (8) SETime = ( 2P( ) ) + ( Max( ) )( B) Delay CT + ( 2P( Delay) ) + ( DIFS ) + ( RBTime STime )( F ) (9) The above minimum channel time and the maximum channel time provides the best searching result as compared to the current network cards provides. Specifically, we can use (9) to approximate the total scanning time involves in the search phase. Next section shows the effect of our proposed mathematical model in terms of load balancing, throughput, and transmission delay. 3. PERFORMANCE ANALYSIS OF THE PROPOSED MATHEMATICAL MODEL The performance measures adopted in this paper are network load, throughput, and the media access delay. The system is modeled in OPNET for both lightly and heavily loaded networks. Fig. 3 is based on our mathematical derivation that simulates the search-timer for the Min- Channel. The result of this simulation should fall between 670ms and 1024ms. The lowest threshold value has been derived from standard industry and IEEE has given the constant factors [1]. The upper threshold value, however, is suggested based on the maximum latency involved in the given wireless mobile network. It can be evident in Fig. 3 that below 670ms there is no significant improvement. However, for such a short period of time (i.e., below 670ms), it would likely decrease the overall network efficiency. This is due to the fact that below 670ms, it is more likely that channels will be more quickly declared as empty channels where as the maximum latency time will gradually increase 25

Figure 3. Network load with different values of beacon interval versus time resulting in overall poor performance of the network. It should also be noted in Fig. 3 that as we increase the minimum threshold to 1024ms, this increases the overall network traffic. Fig. 4 shows a comparison of throughput versus network traffic. It can be clearly seen in Fig. 4 that as we linearly increase the network traffic, the overall throughput of the system decreases. In other words, an increase in minimum channel time becomes one of the reasons for a decrease in overall network throughput. It should also be noted that the results of Fig. 4 is not only the experimental verification of the results of Fig. 3 but also provide some better and technical insight in the increase of throughput. In addition, the overall system throughput decreases sharply, however, it makes some spikes during the random intervals. It can be evident in Fig. 4 that the overall throughput increases significantly with respect to the varying network load represented in Fig. 3. 4. CONCLUSION In this paper, we have proposed a mathematical model that can be used to effectively reduce the handover time of WLAN at MAC layer. Specifically, we proposed a mathematical model for collision detection and avoidance as well as for search phase. Our simulation results verify that the utilization of probabilistic approach with the active scanning yields lower latency for each detection and search phases provided that if we utilize the appropriate values of some critical parameters such as the beacon interval, minimum and the maximum search times. Both simulation and numerical results of this paper demonstrate that the reduced handover time at MAC layer provides better load balancing, high throughput, and minimum frame transmission delay. 26

Figure 4. WLAN throughput versus probe request/response transmission time 4. REFERENCES [1] S. Shin, G. Forte, S. Rawat, and H. Schulzrinne, Reducing MAC layer Handoff Latency in IEEE 802.11 wireless LANs, in MOBIWAC 04: Proceedings of the second international workshop on Mobility management & wireless access protocols, pp. 19 26, New York, NY, USA, 2004. ACM Press. [2] M. Jeong, F. Watanabe, and T. Kawahara, Fast Active Scan for Measurement and Handoff, Technical report, DoCoMo USA Labs, Contribution to IEEE 802, May 2003. [3] G. Bianchi, Performance analysis of the IEEE 802.11 Distributed Coordination Function, Selected Areas in Communications, IEEE Journal, Vol. 18, Issue 3, pp. 535 547, Mar 2000. [4] D. Geun and W. Sook, Performance of an Exponential Backoff Scheme for Slotted-ALOHA protocol in local wireless Environment, IEEE transactions on vehicular technology, 1995, vol. 44, pp. 470-479, 1995. [5] S. Shin, G. Forte, S. Rawat, and H. Schulzrinne, Reducing MAC layer Handoff Latency in IEEE 802.11 wireless LANs, in MOBIWAC 04: Proceedings of the second international workshop on Mobility management & wireless access protocols, pp. 19 26, New York, NY, USA, 2004. ACM Press. 27

Authors SYED S. RIZVI is a Ph.D. student of Computer Engineering at University of Bridgeport. He received a B.S. in Computer Engineering from Sir Syed University of Engineering and Technology and an M.S. in Computer Engineering from Old Dominion University in 2001 and 2005 respectively. In the past, he has done research on bioinformatics projects where he investigated the use of Linux based cluster search engines for finding the desired proteins in input and outputs sequences from multiple databases. For last one year, his research focused primarily on the modeling and simulation of wide range parallel/distributed systems and the web based training applications. Syed Rizvi is the author/co-authors of 73 scholarly publications in various areas. His current research focuses on the design, implementation and comparisons of algorithms in the areas of multiuser communications, multipath signals detection, multi-access interference estimation, computational complexity and combinatorial optimization of multiuser receivers, peer-to-peer networking, and reconfigurable coprocessor and FPGA based architectures. AASIA RIASAT is an Assistant Professor of Computer Science at Institute of Business Management (IOBM) since May 2006. She received an M.S.C. in Computer Science from the University of Sindh, and an M.S in Computer Science from Old Dominion University in 1999, and 2005, respectively. For last one year, she is working as one of the active members of the wireless and mobile communications (WMC) lab research group of University of Bridgeport, Bridgeport CT. In WMC research group, she is mainly responsible for simulation design for all the research work. Aasia Riasat is the author or co-author of more than 30 scholarly research papers in various areas. Her research interests include modeling and simulation for parallel and distributed systems, webbased visualization, virtual reality, data compression, and algorithms optimization. Khaled Elleithy received the B.Sc. degree in computer science and automatic control from Alexandria University in 1983, the MS Degree in computer networks from the same university in 1986, and the MS and Ph.D. degrees in computer science from The Center for Advanced Computer Studies at the University of Louisiana at Lafayette in 1988 and 1990, respectively. From 1983 to 1986, he was with the Computer Science Department, Alexandria University, Egypt, as a lecturer. From September 1990 to May 1995 he worked as an assistant professor at the Department of Computer Engineering, King Fahd University of Petroleum and Minerals, Dhahran, Saudi Arabia. From May 1995 to December 2000, he has worked as an Associate Professor in the same department. In January 2000, Dr. Elleithy has joined the Department of Computer Science and Engineering in University of Bridgeport as an associate professor. Dr. Elleithy published more than seventy research papers in international journals and conferences. He has research interests are in the areas of computer networks, network security, mobile communications, and formal approaches for design and verification. 28