Performance Analysis for Channel Utilization in Wireless LAN

Similar documents
MECHANIZING WIRELESS LAN (WLAN) USING COMPRESSION TECHNIQUES

A Study on Delay, Throughput and Traffic Measurement for Wi-Fi Connected Stations Based on MAC Sublayer

Mohamed Khedr.

MAC. Fall Data Communications II 1

Unit 7 Media Access Control (MAC)

Wireless LAN -Architecture

Empirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks

Wireless LANs. ITS 413 Internet Technologies and Applications

MAC in /20/06

Wireless Communication and Networking CMPT 371

Enhancements and Performance Evaluation of Wireless Local Area Networks

Data Communications. Data Link Layer Protocols Wireless LANs

Lecture 16: QoS and "

Local Area Networks NETW 901

Wireless Communication and Networking CMPT 371

Transmission Control Protocol over Wireless LAN

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Fall 2018 CMSC417 Set 1 1

Rahman 1. Application

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

Mobile Communications Chapter 7: Wireless LANs

Analyzing the Impact of DCF and PCF on WLAN Network Standards a, b and g

Outline. CS5984 Mobile Computing. IEEE 802 Architecture 1/7. IEEE 802 Architecture 2/7. IEEE 802 Architecture 3/7. Dr. Ayman Abdel-Hamid, CS5984

A Performance Analysis of IEEE Networks in the Presence of Hidden Stations

Data and Computer Communications. Chapter 13 Wireless LANs

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking

Introduction to Wireless Networking CS 490WN/ECE 401WN Winter Lecture 4: Wireless LANs and IEEE Part II

Figure.2. Hidden & Exposed node problem

ECE442 Communications Lecture 3. Wireless Local Area Networks

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018

Performance analysis of Internet applications over an adaptive IEEE MAC architecture

Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15

Efficient Power MAC Protocol in Ad-hoc Network s

CS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay

CMPE 257: Wireless and Mobile Networking

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks

ICE 1332/0715 Mobile Computing (Summer, 2008)

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Logical Link Control (LLC) Medium Access Control (MAC)

An Efficient Scheduling Scheme for High Speed IEEE WLANs

Computer Communication III

CSE 461: Wireless Networks

The MAC layer in wireless networks

Wireless Local Area Networks. Networks: Wireless LANs 1

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

Overview : Computer Networking. Spectrum Use Comments. Spectrum Allocation in US Link layer challenges and WiFi WiFi

Delivering Voice over IEEE WLAN Networks

Guide to Wireless Communications, Third Edition. Objectives

Multiple Access Links and Protocols

Wireless Local Area Network (IEEE )

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD.

Computer Networks. Wireless LANs

ECEN 5032 Data Networks Medium Access Control Sublayer

CSMA/CA BASED AD-HOC NETWORK USING MAC PROTOCOL

3.1. Introduction to WLAN IEEE

Master thesis 60 credits

The MAC layer in wireless networks

Department of Electrical and Computer Systems Engineering

EVALUATION OF BACK-OFF ALGORITHM PERFORMANCE OF MAC LAYER IEEE WLAN

Outline / Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless. Regular Ethernet CSMA/CD

Media Access Control in Ad Hoc Networks

CMPE 257: Wireless and Mobile Networking

Wireless technology Principles of Security

Wireless# Guide to Wireless Communications. Objectives

Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs

A Survey on Modified RTS/CTS Mechanism

ISSN: International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012

CSE 6811 Ashikur Rahman

Topic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach

Lecture 25: CSE 123: Computer Networks Alex C. Snoeren. HW4 due NOW

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS

Advanced Computer Networks WLAN

Wireless LAN. Access Point. Provides network connectivity over wireless media

IEEE Technical Tutorial. Introduction. IEEE Architecture

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du

Institute of Electrical and Electronics Engineers (IEEE) IEEE standards

15-441: Computer Networking. Wireless Networking

Lesson 2-3: The IEEE x MAC Layer

Strengthening Unlicensed Band Wireless Backhaul

Wireless Local Area Networks (WLANs) Part I

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

Accountability of WMNs using BEB Algorithm

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

Chapter 6 Wireless and Mobile Networks

Wireless Protocols. Training materials for wireless trainers

Nomadic Communications WLAN MAC Fundamentals

Introduction to IEEE

Wireless Networked Systems

Mobile and Sensor Systems

Dynamic Power Control MAC Protocol in Mobile Adhoc Networks

Throughput Improvement by Adjusting RTS Transmission Range for W-LAN Ad Hoc Network

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

Enhanced Protection Mechanism for Wireless LAN to Reduce Protocol Overhead

Ethernet Switches Bridges on Steroids. Ethernet Switches. IEEE Wireless LAN. Ad Hoc Networks

Lecture 24: CSE 123: Computer Networks Stefan Savage. HW4 due NOW

Developing an Innovative Mobile and Wireless Networks Course

Chapter 6 Medium Access Control Protocols and Local Area Networks

Multiple Access in Cellular and Systems

Link Layer. (continued)

Transcription:

Performance Analysis for Channel Utilization in Wireless LAN Shweta Singh Naresh Chandra Arun Kumar Tripathi ABSTRACT Wireless network plays an important role in field of communication. Now a days people are always eager to access the data at any time of moment. The wireless network allows to access the Internet from anywhere at any time. The connectivity can be easily established via devices such as smartphones, laptops, etc. this paper simulates a campus WLAN using OPNET IT GURU EDUCATIONAL VERSION 14.5. Depending on certain justified scenarios the evaluation has been done onto stations participating in the network. Also, performance of the network is measured on parameters such as congestion, delay, throughput, Traffic, Load in wireless environment. The paper discusses about how to handle the channel performance issues using different access mechanisms. Keywords Wireless LAN, TCP Connection, Congestion, Delay, Throughput, Traffic, Load, RTS, CTS, Retransmission, Media Access Delay, CSMA/CA, NAV. 1. INTRODUCTION Wireless network is based on IEEE 802.11[1] standard and evolved in late nineties. The deployment of wireless technology changed the thinking of the generation, leading the people to access the information onto the network. This provides the facility to bring closer to the anything, anytime, anywhere promise of mobile networking. One of the requirements of the IEEE 802.11 standard is to handle the devices with the concept of mobility i.e. the devices as mobile stations in Wireless Local Area Network (WLAN). Mobile stations are devices that can easily make use of WLAN [2] in motion. IEEE802.11 standard was made to accomplish the services that were commonly found in wired networks such as throughput, reliable data delivery, and continuous network connections. This standard performs at Medium Access Control (MAC) [3] sublayer and three PHY (physical) layers. Using the two underlined classes of MAC technique, to implement the structure of network; Point Co-ordination Function (PCF): co-ordinates the network channel and Distributed Co-ordination Function (DCF): employs CSMA/CA [4] technique. Both these classes utilize the virtual carrier-sense mechanism by means of Network Allocation Vector (NAV) in which each station can predict the future traffic onto the medium. Point Co-ordination Function: It is a MAC technique in which priority is being provided to the channel access mechanism. It is located above the DCF and hence enhances the DCF through a new co-ordination function, called Hybrid Co-ordination Function (HCF). The Access Point (AP) in the network acts as Point Coordinator (PC) that manages the channel access using poling mechanism, to determine which station is to initiate the transmission. Distributed Co-ordination Function: It is a fundamental technique of IEEE 802.11 based WLAN standard which employs CSMA/CA technique with binary exponential back-off algorithm. Every station, in this mechanism, is allowed to sense the medium to transmit and defers to sense till medium is available. It facilitates the communication through short Request-to-Send / Clear-to-Send RTS/CTS [5] frames including positive ACK for successful delivery to the destination device. This does not solve the hidden/exposed terminal problem. The configurations [6] supported by WLAN can be categorized as follows: A) Ad-hoc Network: The network is said to be ad-hoc as it does not rely on existing infrastructure, such as routers in managed wireless networks. Under this, all devices consists equal status on a network. B) Infrastructure BSS: BSS comes in two flavors: Independent BSS, ad-hoc with no APs and Infrastructure BSS, includes both APs and stations. C) Extended Service Set: This is a set of two or more BSSs sharing same network name, security credentials and also, providing translation between 802.3 and 802.11. D) Wireless Backbone: This binds up the various pieces of network, hence providing a path for information exchange between different LANs or sub networks. Instead, there are some problems that are concerned with the wireless network. Out of which few of them can be as stated below: a) The Hidden Terminal Problem: This occurs when a node is visible from a wireless AP, but not from other nodes communicating with that AP. The problem can be observed easily for radius>50m. Fig.1 represents the hidden terminal architecture. Figure 1: The Hidden Terminal Problem 40

b) RTS/CTS Mechanism: It is one of the optimal mechanisms that help to reduce frame collisions. This includes the Ack concept, but does not solve the exposed node problem. Fig.2 depicts the underlined RTS/CTS mechanism. Figure 2: RTS/CTS Mechanism c) Quality of Service: Measuring quantitatively the Quality of Service (QoS) [7] related to aspects of network services such as error rates, bandwidth, throughput, transmission delay, availability, etc. The wireless technology is commonly used in radio. It encompasses different types of fixed, mobile and portable applications, including two-way radios, cellular phones, Personal Digital Assistance (PDA) and wireless networking. 2. USEFUL WORK A WLAN is a wireless computer network that links up two or more devices using a wireless distribution method within a limited range such as a home, school, computer laboratory, or office building. This gives users the ability to move around in a particular coverage area and to easy access to information they want to. This becomes more popular in home as they are easy to install and use, also they may be made as free to employees for the organization. Wireless network operates using radio frequency technology. The cornerstone of the wireless network is a device named AP [8]. The primary job of an AP is to broadcast a wireless signal that computers can detect and tune into. In order to connect to an AP and join a wireless network, computers must be equipped with wireless network adapters. The IEEE802.11 has two basic modes of operation: ad-hoc mode and infrastructure mode. In ad-hoc mode, mobile units transmit directly peer-to-peer. In infrastructure mode, mobile units communicate through an AP that serves as a bridge to other networks (such as Internet or LAN). A) Peer-to-Peer: Here, stations communicate only Peer-To- Peer (P2P). This is accomplished using independent Basic Service Set (BSS). Wireless devices within range of each other can discover and communicate directly without involving central APs. If the signal strength cannot be read accurately then this mode can lead to the hidden terminal problem. B) Infrastructure: Ethernet (wired) connection is made onto the AP. A bridge can be used to connect with the network. A remote base station accepts connections from wireless clients and passes them to relay or main stations. WLAN are increasingly popular. Groups from fast food restaurants to libraries offer the Internet over the air for free, and the equipment to set one up in a home or office is increasingly becoming cheaper. The following displayed are few advantages of using a WLAN: a. Convenience: Connecting to them is as simple as logging onto a website. b. Expandability: It is cheaper and less complicated, giving people with a lot of area to offer connections to a simple way to do so. c. Availability of high reliability VoIP network services. 3. OPNET SIMULATION For the sake of simulation, we have setup a wireless local area network that accomplished mobility on the TCP performance. Also, it is examined how the hidden terminal problem is avoided by using Request to Send (RTS) and Clear to Send (CTS) frames. The key problem is to handle the mobile stations in the WLANs. IEEE802.11 utilizes the RTS and CTS frames in various circumstances further in order to minimize the collisions. Duration information in RTS/CTS frames are used to set in certain manner within the reception range, so as to solve the hidden sender because any station that sees the CTS frame knows that it is close to the receiver and, therefore, cannot transmit for the period of time indicated. In simulation, a WLAN set up with mobile workstations and in certain aspects, the destinations are also defined to all the stations configured. It is found to study the effect of mobility onto the mobile node. Also it will help in computing the minimized hidden node problem induced by mobility in WLANs. A) First Scenario: Simple DCF Mode In this scenario, WLAN is created 20 stations are made to be placed establishing wireless environment. These stations are made to operate in a DCF based environment. The threshold is being shared in between all the stations. Figure 3: Stations communicating in DCF mode with no Fragments. 41

B) Second Scenario: DCF Mode with Fragmentation In this scenario, WLAN is created with 20 wireless stations that are being provided with the functionality of DCF environment. The threshold [9] is being divided into smaller fragments. Under the fragmentation mechanism, the data packet received from a higher layer with a size greater than the threshold is being divided into smaller fragments. Fig. 3 represents that stations are communicating in DCF mode with Fragmentation. C) Third Scenario: Enhanced DCF with PCF Mechanism The PCF functionality in the first scenario (simple DCF mode), in a no fragmentation environment, is implemented here. Particular or even half of the stations are implemented using DCF and other half to the PCF technique. Fig. 3 represents that stations are communicating in enhanced DCF (PCF) [10] mode with no Fragmentation. D) Fourth Scenario: Enhanced DCF to PCF with Fragmentation Third scenario is enhanced here with the fragmentation functionality to better access the data packets flowing into the two specified modes (DCF and PCF). Fig. 3 represents that where stations are communicating in enhanced DCF (PCF) mode with Fragmentation. 4. ANALYSIS OF SIMULATION After implementing and running the simulation for four scenarios defined above, on considering different aspects for which it justify which devices performs better under what conditions. The analysis for different scenarios on different aspects is as following: 1) Delay: Fig.4, Fig.5a and Fig.5b show the delay that represents an end-to-end delay for all the packets received by WLAN MACs of all the WLAN nodes in the configured network. This depicts the medium access delay at source MAC, reception of all the individual fragment, and transfer of frames through AP, if enabled. Figure 5a: Delay in node_2 in WLAN depending upon MACs. Figure 5b: Delay in node_3 in WLAN depending upon MACs 2) Load: Fig.6 represents the total load encountered in WLAN in all nodes in the network. The load can include the insufficient space left in the layer packet buffer of the MAC. Figure 4: Delay in WLAN in all Scenarios. 42

Figure 6: Load in WLAN in all scenarios. Figure 8a: Retransmission attempted by the node_2 in WLAN environment. 3) Throughput: Fig.7 represents the total number of bits that are being forwarded from WLAN layer to the upper higher layers in all WLAN stations of the configured network. Figure 8b: Retransmission attempted by the node_3 in WLAN environment. Figure 7: Throughput in WLAN in all scenarios. 4) Retransmission Attempts: Fig.8 represents the retransmissions attempted by the stations in the WLAN environment. 5) Media Access Delay: The delay that has taken place in considering to the fixed wireless stations in a WLAN environment. This is concerned with the shorter access delays that has taken place while transmission. Fig. 9 represents the medium access delay for all the accesses made. 43

Figure 9: Media Access Delay in WLAN. 5. CONCLUSION In this paper simulates the two protocols, i.e. DCF and PCF that are responsible to act into the WLAN environment. These two protocols use the medium access mechanism based on IEEE 802.11 standard. Fig.7 represents that the load factor is decreased up to an extent as the two classes minimizes the total waiting time required in transmission of data packets. The fragmentation of threshold provides with the best transmission results, and also through fragmentation of threshold the load at packet buffer has minimized. Fig.7 clearly shows that the network is degraded using PCF mechanism that is a contention-free mechanism. This degradation can be reduced to an extent when implemented with the minimized polling structure at the AP that improves the throughput significantly. 6. REFERENCES [1] Wireless Ethernet Networking with 802.11b, an overview, http://www.homenethelp.com/802.11b/index.asp [2] Wireless Local Area Networks (WLAN), http://www.ictadvice.org.uk/downloads/wirelesslan_techn ical.doc [3] Shweta Singh, Priyanka Mudgal, Priyadarshini Chaudhary, and Prof. Arun Kr. Tripathi: Comparative analysis of Packet Loss in Extended LAN environment, International Journal of Computer Applications (IJCA), ISSN NO: 0975-8887, 20-April-2015. [4] Eustathia Ziouva, Theodore Antonakopoulos. CSMA/CA performance under high traffic conditions: Throughput and delay analysis. Computer Communications Vol: 25 Issue: 3 ISSN: 0140-3664 Date: 02/2002 Pages: 313 32 [5] K. Xu, M. Gerla, and S. Bae, How Effective is the IEEE 802.11 RTS/CTS Handshake in Ad Hoc Networks? IEEE GLOBECOM 02, Vol. 1, pp. 72-76, November 2002. [6] C. K. Toh, Ad Hoc Mobile Wireless Networks: Protocols and Systems, Prentice Hall, December 2001. [7] R.K.Nadesh, D.Sumathy, M. B. BenjulaAnbu Malar, Performance Analysis Of MANET (WLAN) Using Different Routing Protocols In Multi Service Environments-An Quantitative Study, Int. J. Advanced Networking and Applications Volume: 03, Issue: 02, Pages:1076-1079 (2011). [8] J. Weinmuller, H. Woesner, J. Ebert, A. Wolisz, Analyzing the RTS/CTS Mechanism in the DFWMAC Media Access Protocol for Wireless LANs, IFIP TC6 Workshop on Personal Wireless Communications, pp. 117-130, April 1995. [9] Rajan, R., Shipra, S. WLAN Performance Improvisation by Fine Tuning IEEE 802.11 Parameters, International Journal of Computer Applications, April 2012. [10] Wireless Central Coordinated Protocol (WiCCP), A Soft war Solution Of The Hidden Node Problem (http://patraswireless.net/software.html). IJCA TM : www.ijcaonline.org 44