LAB PROJECT Nº1 1 INTRODUCTION REDES MÓVEIS E SEM FIOS , MEEC PERFORMANCE OF WIRELESS PERSONAL AREA NETWORKS

Similar documents
CARA: Collision-Aware Rate Adaptation for IEEE WLANs. Presented by Eric Wang

PIE in the Sky : Online Passive Interference Estimation for Enterprise WLANs

Wireless MACs: MACAW/802.11

Wireless Medium Access Control Protocols

IEEE Consumer Communications & Networking Conference (CCNC) 2008, Las Vegas, USA

SENSOR-MAC CASE STUDY

CHAPTER 5 PROPAGATION DELAY

Aloha and slotted aloha

Computer Communication III

Wireless networks. Wireless Network Taxonomy

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking

CHAPTER 5 THROUGHPUT, END-TO-END DELAY AND UTILIZATION ANALYSIS OF BEACON ENABLED AND NON-BEACON ENABLED WSN

Multiple Access in Cellular and Systems

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA

ECEN Final Exam Fall Instructor: Srinivas Shakkottai

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS

MAC LAYER. Murat Demirbas SUNY Buffalo

CSE 461: Wireless Networks

Mohammad Hossein Manshaei 1393

Measurements in the wireless

Sample solution to Midterm

Wireless Local Area Networks. Networks: Wireless LANs 1

CDMA-Based MAC Protocol for Wireless Ad Hoc Networks

MAC Essentials for Wireless Sensor Networks

CARA: Collision-Aware Rate Adaptation for IEEE WLANs

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

Chapter - 1 INTRODUCTION

MAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users

Subject: Adhoc Networks

Concurrent-MAC: Increasing Concurrent Transmissions in Dense Wireless LANs

Strengthening Unlicensed Band Wireless Backhaul

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

Implementation of WiFiRe PHY Sectorization in OPNET

EE 122: Ethernet and

Mobile Communications Chapter 7: Wireless LANs

COMP/ELEC 429/556 Introduction to Computer Networks

Final Exam: Mobile Networking (Part II of the course Réseaux et mobilité )

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu

Random Assignment Protocols

Figure.2. Hidden & Exposed node problem

By N.Golmie Presented by: Sushanth Divvela

15-441: Computer Networking. Wireless Networking

DOMINO: A System to Detect Greedy Behavior in IEEE Hotspots

Shared Access Networks Wireless. 1/27/14 CS mywireless 1

Fu-Yi Hung ALL RIGHTS RESERVED

CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA)

CONTENTION BASED PROTOCOLS WITH RESERVATION MECHANISMS

Qos support and adaptive video

Ethernet. Introduction. CSE 3213 Fall 2011

UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks

Converged Access: Wireless AP and RF

OPNET Editors and Features

ECE 4450:427/527 - Computer Networks Spring 2017

University of Würzburg Institute of Computer Science Research Report Series. Performance Comparison of Handover Mechanisms in Wireless LAN Networks

Wireless LAN -Architecture

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

More wireless: Sensor networks and TCP on mobile hosts

Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD.

Monitoring and Managing the Network (Pharos Control)

Monitoring the Network (CPE and WBS)

Interference avoidance in wireless multi-hop networks 1

Department of Electrical and Computer Systems Engineering

Delayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology

AERONAUTICAL CHANNEL SIMULATION IN NETWORK SIMULATORS FOR INCORPORATION INTO OPNET

CS 515 Mobile and Wireless Networking Final Exam Fall

Department of EECS - University of California at Berkeley EECS122 - Introduction to Communication Networks - Spring 2005 Final: 5/20/2005

ISSN: International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012

Data Communications. Data Link Layer Protocols Wireless LANs

CMPE 257: Wireless and Mobile Networking

Ad Hoc WLAN Throughput Improvement by Reduction of RTS Range Emilia Weyulua, Taro Iwabuchib, Misu Takeshic, Masaki Hanadad, Moo Wan Kime

Vorlesung Kommunikationsnetze Research Topics: QoS in VANETs

CS 716: Introduction to communication networks. - 8 th class; 17 th Aug Instructor: Sridhar Iyer IIT Bombay

COEXISTENCE MODEL OF ZIGBEE& IEEE b (WLAN) IN UBIQUITOUS NETWORK ENVIRONMENT

Local Area Networks NETW 901

Ad Hoc b Cooperative Protocols: Performance in a Slow Fading Channel

Wireless Communication and Networking CMPT 371

Maximum Traffic Scheduling and Capacity Analysis for IEEE High Data Rate MAC Protocol

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

COMP3331/9331 XXXX Computer Networks and Applications Final Examination (SAMPLE SOLUTIONS)

Mohamed Khedr.

Monitoring Mobility Express Network

Practical Lazy Scheduling in Wireless Sensor Networks. Ramana Rao Kompella and Alex C. Snoeren

Collision Free and Energy Efficient MAC protocol for Wireless Networks

TMMAC: A TDMA Based Multi-Channel MAC Protocol using a Single. Radio Transceiver for Mobile Ad Hoc Networks

Data and Computer Communications. Chapter 13 Wireless LANs

CHAPTER 4 CROSS LAYER INTERACTION

Wireless Communication and Networking CMPT 371

Final Exam for ECE374 05/03/12 Solution!!

CHAPTER 1 INTRODUCTION

Homework #4. Due: December 2, 4PM. CWND (#pkts)

Multiple Access Links and Protocols

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

A Measurement Study of Multiplicative Overhead Effects in Wireless Networks

CS 515 Mobile and Wireless Networking Final Exam Solutions Fall

Data Communications. Automatic Repeat Request Medium Access Control

Lecture 15 Networking Fundamentals. Today s Plan

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

Transcription:

LAB PROJECT Nº1 REDES MÓVEIS E SEM PERFORMANCE OF WIRELESS PERSONAL AREA NETWORKS 1 INTRODUCTION The performance of wireless networks is highly dependent of physical phenomena, such as path loss, shadowing, absorption, scattering, diffraction and fading. The shared nature of the wireless medium makes communication even more difficult, since wireless stations must share or compete for the available bandwidth. Transmission errors caused by collisions and/or Signalto-Noise-plus-Interference-Ratio (SNIR) degradation due to interfering devices, are very common in contention based Wireless Local Area Network (WLAN) or Wireless Personal Area Network (WPAN) technologies, such as those based on IEEE 802.11 or IEEE 802.15.4. This lab project aims to study some of the factors that affect WPAN performance by means of simple tests implemented in the OMNET++ simulator. Throughout this document, the students shall be asked to build simulation script files. Although the main guidelines for scenario construction are provided, additional procedures may be necessary, which require initiative from the students. The students shall also be asked to answer questions regarding the simulated network environment and performance results. The answers shall be included in the report, which is due on the first Sunday after the end of the project. Together with the report, the students must deliver all the scripts and spread sheets that resulted from their work. 1 P á g i n a

2 WORK DESCRIPTION The fixed wireless access performance analysis shall be done in several steps, in which relevant independent variables shall be analyzed. 2.1 Impact of Distance in Point-to-Point Communications Within the OMNET++ IDE, add the IEEE802154 project to inet/examples/wireless. Modify the example, so that there are only two hosts: host[0] and host[1] (see Figure 1). Since the objective of this experiment is to measure the impact of distance on the communications performance, we need to use a static mobility model allowing us to set the precise locations of the nodes on the scenario map. The required mobility model is the StationaryMobility, instead of StaticConcentricMobility that comes in the original example (see omnetpp.ini). In order to be able to freely assign node positions from the omnetpp.ini file, the initfromdisplaystring attribute of the mobility modules, should be set to false. Node positions are set using the initialx and initialy attributes of the mobility modules. Figure 1: Modified IEEE802154 example. Using the example that was just built, answer the following questions in your report: Q2.1.1) In this example, the used propagation model is the Log-Distance path loss model, which is here called the BrakpointPathLoss model. You can find it in inet/src/inet/physicallayer/pathloss. Annalise BreakpointPathLoss.ned and BreakpointPathLoss.cc, namely the method BreakpointPathLoss::computePathLoss. Match the parameters with the Log-Distance path loss model parameters. Explain how the received power is calculated. Q2.1.2) Based on your answer to Q2.1.1, calculate the maximum communication range (indicated by the blue circle) with the default parameters. How can you control the latter from omnetpp.ini? Note: you may have a look at the BreakpointPathLoss::computeRange function. You 2 P á g i n a

may also need some radio parameters defined in inet/src/inet/physicallayer/ieee802154/ Ieee802154NarrowbandScalarRadio.ned. Q.2.1.3) Measure the impact of distance, packet size and use of acknowledgements on: Application throughput (in kbit/s), Application message latency (s) Average Signal-to-Noise-plus-Interference-Ratio (SNIR) Number of missed Acknowledgements per frame transmission attempt, at the MAC layer. Explain the obtained results. The considered distances between host[1] (sender) and host[0] (receiver) should be 5 equally spaced points between 10m and the maximum transmission range. For each distance, three packet sizes should be considered: 10 and 80 octets. Moreovever, for each distance and packet size combination, results should be taken with and without MAC layer ACK. You will need to manipulate parameters of the application (IIPvXTrafficGenerator). You can find its parameter definitions at src/inet/applications/generic/ IIPvXTrafficGenerator.ned. You will also have to turn MAC layer ACK on and off. You can check the MAC layer parameters at src/inet/linklayer/ieee802154/ Ieee802154NarrowbandMac.ned. Note: you should not change the files under the src folder; all simulation configurations are performed from the omnetpp.ini file. The results should be presented in three charts (throughput, latency and SNIR), each with two curves, one curve for each packet size. Each point in the chart should correspond to to the average over 3 trials, using different random seeds, setting the traffic stream duration of the application to 6 seconds 1. The confidence intervals for the points in the chart should be represented as error bars, or presented in a table. Please read Section 10.4.6 of the OMNET++ User Manual in order to get more info on how to repeat experiments with different random seeds. Explain the results. The chart represented in Figure 2 is an example of what the intended graphics should look like (note: the curves were invented for illustration purposes and do not conform to actual results). 1 Not to be confused with the overall simulation time limit. 3 P á g i n a

Throughput [kbit/s] REDES MÓVEIS E SEM 6000 5000 4000 3000 2000 1000 0-1000 0 100 200 300 400 500 600 700 Distance [m] 20 octets 500 octets 1000 octets Figure 2: Example of chart exemplifying throughput as a function of distance between nodes. 4 P á g i n a

2.2 Hidden Terminal and Exposed Terminal Problems Within the OMNET++ IDE, duplicate the modified IEEE802154 example, renaming it IEEE802154_cs. Perform the following experiments: Q2.2.1) Setup a network formed by four stations, A, B, C and D, configuring the topology and data flows in such a way as to simulate the exposed terminal problem. Note that the MAC layer acknowledgements must be switched off. Consider packet sizes of 10, and 80 octets. a) What is the average throughput for each packet size (average over 5 trials, traffic generation time of 20 seconds)? Note: the sending application should be configured to generate a data rate that saturates the network. b) How would you solve the exposed terminal problem? Q2.2.2) Setup a network formed by four stations A, B, C and D, placed in a linear topology, where A sends data to B and C sends data to D, all at maximum possible rate. Consider packet sizes of 10 and 80 octets. MAC layer acknowledgements should now be switched on. a) Measure the average throughput and number of collisions for each packet size (average over 5 trials, traffic generation time of 20 seconds), when all the stations are within communications range of each other. b) Repeat a), but at this time, B is within range of A, C is within range of B and D is within range of C. All the other combinations are out-of-range. Explain the results. 5 P á g i n a

2.3 Performance of IEEE 802.15.4 under Contention Within the OMNET++ IDE, duplicate the IEEE802154 example, renaming it IEEE802154_star. Modify the example so that a variable number of sender hosts are deployed in circle topology around the receiver, host[0]. All the nodes should be within communications range of each other. The incremental angle for each client is 1 degree. Other modifications may be required, which are not specified in this document. Perform the following experiments: Q2.3.1) Measure the average application throughput, as well as the number of missed MAC acknowledgements per MAC frame transmission, for the following numbers of sender nodes: 1, 10, 25, 50 (average over 5 trials, application traffic generation time of 20 seconds). Consider packet sizes of 10 and 80 octets. Explain the results. Note: the sending application should be configured to generate a data rate that saturates the network. Q2.3.2) Using the results from Q.2.3.1, compare the application and MAC throughputs. Explain the found differences. 6 P á g i n a

3 GRADING Grading of the responses shall be performed according to Table 1. Table 1: Grading of LAB1 responses. Question Value Q2.1.1 1.0 Q2.1.2 1.0 Q2.1.3 3.0 Q2.2.1.a 3.0 Q2.2.1.b 2.0 Q.2.2.2.a 3.0 Q2.2.2.b 2.0 Q2.3.1 3.0 Q2.3.2 2.0 REDES MÓVEIS E SEM The organization of the delivered report and scenario files contributes with 0.0-3.0 negative points to the final mark. 7 P á g i n a