Accountability of WMNs using BEB Algorithm

Similar documents
E-BEB Algorithm to Improve Quality of Service on Wireless Ad-Hoc Networks

Mohamed Khedr.

Lecture 16: QoS and "

A Comparative Analysis on Backoff Algorithms to Optimize Mobile Network

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

Performance Analysis for Channel Utilization in Wireless LAN

N-BEB: New Binary Exponential Back-off Algorithm for IEEE

Wireless LANs. ITS 413 Internet Technologies and Applications

Local Area Networks NETW 901

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

Mohammad Hossein Manshaei 1393

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE WIRELESS NETWORKS

Performance analysis of Internet applications over an adaptive IEEE MAC architecture

Wireless Local Area Network (IEEE )

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

Transmission Control Protocol over Wireless LAN

Hands-On Exercises: IEEE Standard

Adaptive Backoff Algorithm for IEEE MAC Protocol

OPNET based Performance Evaluation of WIMAX Network with WIMAX Management using Different QoS

Analysis of IEEE e for QoS Support in Wireless LANs

Department of Electrical and Computer Systems Engineering

Wireless LAN. Access Point. Provides network connectivity over wireless media

Performance Analysis of TCP LBA and TCP TAHOE Approaches in g Standard Savreet KaurBrar 1, Sandeep Singh Kang 2

Enhancements and Performance Evaluation of Wireless Local Area Networks

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Wireless LAN -Architecture

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking

CS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay

Wireless Local Area Networks. Networks: Wireless LANs 1

Analyzing the Impact of DCF and PCF on WLAN Network Standards a, b and g

EVALUATION OF BACK-OFF ALGORITHM PERFORMANCE OF MAC LAYER IEEE WLAN

IEEE e QoS for Wireless LAN:

Data and Computer Communications. Chapter 13 Wireless LANs

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks

CSE 461: Wireless Networks

Throughput Improvement by Adjusting RTS Transmission Range for W-LAN Ad Hoc Network

Multiple Access Links and Protocols

CSMA based Medium Access Control for Wireless Sensor Network

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

A Study on Delay, Throughput and Traffic Measurement for Wi-Fi Connected Stations Based on MAC Sublayer

Mobile Communications Chapter 7: Wireless LANs

IEEE MAC Sublayer (Based on IEEE )

Wireless Communication and Networking CMPT 371

Performance Evaluation of Routing Protocols in Wireless Mesh Networks. Motlhame Edwin Sejake, Zenzo Polite Ncube and Naison Gasela

Computer Networks. Wireless LANs

CMPE 257: Wireless and Mobile Networking

Wireless Local Area Networks (WLANs) Part I

Wireless MACs: MACAW/802.11

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm

Mobile & Wireless Networking. Lecture 7: Wireless LAN

IEEE s ESS Mesh Networking

Review of Medium Access Control protocol for MANET

Wireless Communications

Delivering Voice over IEEE WLAN Networks

Pessimistic Backoff for Mobile Ad hoc Networks

Performance Analysis of FTP, HTTP and Database for IEEE802.11, IEEE802.11a, IEEE802.11b and IEEE802.11g using OPNET Simulator

Link Layer: Retransmissions

ICE 1332/0715 Mobile Computing (Summer, 2008)

Delay Performance Evaluation of WIFI Release (IEEE a, b, g and n) Using OPNET for Data Types (Voice, , File Transfer, Video Convergence)

Data Communications. Data Link Layer Protocols Wireless LANs

Reliable Multicast Scheme Based on Busy Signal in Wireless LANs

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

Institute of Electrical and Electronics Engineers (IEEE) IEEE standards

CS263: Wireless Communications and Sensor Networks

Performance anomaly of b

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS

Performance evaluation and enhancement of WLAN

An Efficient Scheduling Scheme for High Speed IEEE WLANs

Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs

A Modified Medium Access Control Algorithm for Systems with Iterative Decoding

and coverage as the nodes can act both as clients and routers. In this paper, the clients are distributed using four different

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD.

Performance Comparison of Ad Hoc Routing Protocols over IEEE DCF and TDMA MAC Layer Protocols

3.1. Introduction to WLAN IEEE

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

Novel Techniques for Fair Rate Control in Wireless Mesh Networks

CS698T Wireless Networks: Principles and Practice

Impact of IEEE n Operation on IEEE Operation

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

Introduction to Wireless Networking CS 490WN/ECE 401WN Winter Lecture 4: Wireless LANs and IEEE Part II

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross

The MAC layer in wireless networks

Wireless networks. Wireless Network Taxonomy

Performance evaluation of Cooperative MAC and ZRP in Cooperative Communication Networking Environment

A Finite State Model for IEEE Wireless LAN MAC DCF

Overview : Computer Networking. Spectrum Use Comments. Spectrum Allocation in US Link layer challenges and WiFi WiFi

Unit 7 Media Access Control (MAC)

Chapter 6 Wireless and Mobile Networks

Performance Analysis of AODV Routing Protocol with and without Malicious Attack in Mobile Adhoc Networks

Implementation of Quality of Services (QoS) for Based Wireless Mesh Network

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay

Chapter 12 Multiple Access 12.1

Padovan Sequence based Backoff Algorithm for Improved Wireless Medium Access in MANETs

The MAC layer in wireless networks

Shared Access Networks Wireless. 1/27/14 CS mywireless 1

T. P. Meenaa, A. Selvaraj Muthayammal Engineering College, Rasipuram, Rasipuram, Tamil Nadu, India

Transcription:

Accountability of WMNs using BEB Algorithm Shafi Jasuja Department of Information Technology Chandigarh Engineering College, Landran, Mohali, Punjab, India Parminder Singh Department of Information Technology Chandigarh Engineering College, Landran, Mohali, Punjab, India Abstract- Wireless mesh networks (WMNs) has the ability of dynamic self-organization, self-configuration and selfhealing. These features facilitate quick deployment, easy maintenance, low cost and high scalability. These also provide cost effective solutions for internet facilities which has led to their popularity. There is an access of shared medium by all the existing nodes in the network. It may lead to collisions when multiple nodes access the medium simultaneously, thereby increasing the congestion in network. The Binary Exponential Back-off Algorithm will control the shared medium access and helps to reduce collisions and congestion in the network. Keywords: Binary Exponential Back-off, Contention Window, DIFS, IEEE 802.11, SIFS, Wireless Mesh Network. I. INTRODUCTION Wireless mesh network (WMN) is a collection of nodes connected in a wireless fashion and communicating through mesh topology. It is a self-organized and self-configured network. It consists of two types of nodes, Mesh Clients, which are the wireless devices like mobile phones, laptops etc. and Mesh Routers, which are responsible for forwarding the traffic within the network or among other connected networks [13]. Mesh routers serve as the backbone in these networks. Some mesh routers have the extended functionality of gateways/bridges, which enhances their capability of connecting with other networks. They have minimum mobility and support multi-hop routing. Sometimes, mesh clients can also act as routers in the network. The range within which the radio nodes communicate as a single network is termed as Mesh cloud [13].Wireless mesh networking is also a type of ad-hoc networking but with enhanced capabilities like more reliability, more robust, easy network maintenance, inter-operability with other type of networks, service area coverage etc [1]. Wireless mesh networks can be Decentralized, in which there is no central controller in the network to monitor and control the communication or Centralized, in which there is a central controlling node in the network to monitor the communications [13].These networks offer a great extent of redundancy and are thereby, very reliable networks. Whenever any node in the network fails, it doesn t affect the other communicating nodes because each node is connected to multiple nodes, thereby, making it easier to build up an alternate route to the destination. Since these networks support multi-hop routing, they help to carry out communications at very large distances through intermediary nodes, which perform routing/packet forwarding. WMN is a promising wireless technology for a wide variety of applications like broadband home networking, community and neighborhood networking, enterprise networking etc and is gaining a wide popularity because it needs minimal upfront investments. Another advantage of WMNs is that these can be deployed incrementally, one node at a time, as needed [2]. II.IEEE 802.11 STANDARDS The original IEEE 802.11 standard was first published in 1997 with an aim to define Medium Access Control (MAC) layer and Physical (PHY) layer specifications for wireless connectivity for fixed, portable and moving stations within local area. It also describes wireless LAN architecture, including functions and services required by compliant IEEE 802.11 devices to operate within different possible types of Wireless LAN configurations defined in the standard. Further, this standard was modified and extended to support new features and functionalities of security, QoS (Quality of Service), better data transmission rates etc [4]. The additional IEEE 802.11 Standards are as listed below: Volume 5 Issue 2 April 2015 405 ISSN: 2319 1058

a) IEEE 802.11 a: This standard was released in 1999. It provides a new physical layer specification in 5GHz band to enable faster data transmission rates. The MAC layer specification is same as in the original standard. The new PHY layer specification uses Orthogonal Frequency Division Multiplexing (OFDM) system. It provides a wireless LAN with data payload communication capacity of 6, 9, 12, 18, 24, 36, 48, 54 Mbps. This standard defines 12 different channels for the operation of OFDM PHY [4]. b) IEEE 802.11 b: This standard, approved in September 1999, is a natural extension to the original standard. It serves the purpose of higher data transmission rates using the same 2.4 GHz ISM band. It provides 5.5 and 11 Mbps payload data rates in addition to 1 Mbps and 2Mbps data rates of the original standard. Additionally, mechanisms have also been defined that allow discovery and negotiation of a common transmission scheme between the two devices [4]. c) IEEE 802.11g: This standard was approved in June 2003 and it also operates in 2.4 GHz ISM band. It provides for increased data rates up to 54Mbps. An extended rate PHY (ERP) has been defined to achieve this increase [4]. 2.1. Comparison of various IEEE 802.11 standards The comparison of various IEEE standards [5] is as shown in table 1 below: Parameter/ Standard Bandwidth (MHz) Table 1: Comparison of IEEE 802.11 standards Frequency (GHz) Data rate (Mbps) No. of radio channels IEEE 802.11 (June 1997) IEEE 802.11a (Sept 1999) IEEE802.11b (Sept 1999) IEEE 802.11g (June 2003) 22 2.4 1,2 13 20 5 6,9,12,18,24.36.48.54 12 22 2.4 1,2,5.5,11 13 20 2.4 6,9,12,18,24,36,48,54 Additional 22,33 13 III. PROBLEM DEFINITION Wireless mesh networks are based on IEEE 802.11 standard and consist of multiple nodes and access points working in a shared medium. The resources in a shared medium are fixed and common for all stations communicating in the network. Therefore, there is a wide possibility that multiple stations may try to access the resources and the medium simultaneously which leads to collisions in the network. This type of situation increases time delays and prevents other stations to access the medium further until the collisions are resolved. Thus the performance of the network degrades. So there is need for a mechanism for an efficient access to the shared medium in order to minimise collisions. Secondly, in most approaches successful transmissions are marked by acknowledgement packets sent by the receiver to the sender within some specified time interval. The collisions in the network increase time delays and congest the network due to which acknowledgement timeout occurs for other communicating stations. In such time out situations the sender assumes that the packet has been either dropped or lost in the network, even though either the packet or its acknowledgement is struggling somewhere in the mid-way to reach the receiver/ sender respectively. So such packet and acknowledgement delays cause the sender to retransmit the packets again and again till it receives the acknowledgement. These re-transmitted packets also increase the network traffic and congestion. Therefore there is a need to have some limit for re-transmission. In order to overcome the above problems of shared medium, a binary exponential back-off algorithm has been adopted by IEEE 802.11. F. Cali et. al. [3] had proposed for using p-persistent MAC protocol, in which a station can transmit with probability p and refrain from transmitting with probability 1-p. The value of p was to be calculated at runtime and was to be updated after each successful transmission. The problem associated with this approach was complexity for computing the value of p and determining the state of network. Volume 5 Issue 2 April 2015 406 ISSN: 2319 1058

Maninder Kaur et. al [8] had given a mathematical solution to avoid congestion and analyse snoop behaviour in wired cum wireless network. A snoop protocol had been considered as a solution for problems faced by TCP in wireless networks. Snoop Protocol introduces a snoop agent at base stations which monitors packet flow, maintains a packet cache and thus recovers lost packets locally. P. Chatzimisios, et. al.[10] and J. A. Moura et. al. [6] have suggested an exponential decrease in the CW value, assuming a fixed scale for decrease. The network conditions were not taken into consideration for this. This was considered as better approach to reset CW value slowly on a successful transmission as it would deal better with the remaining congestion in network. The other stations would wait for some extra time before accessing the medium as compared to the standard algorithm, thus reducing chances of unexpected collisions. Maali Albalt et. al. had suggested a history based back-off algorithm in which the size of contention window was adjusted by taking into account the history of past trials for transmission [7]. Practically, maintaining history of previous trials in an extra variable and keeping it updated creates an extra overhead in the network. Tahiry Raza -off algorithm that relies only on local information, as successful transmissions and collisions under- gone by each station without taking advantage of the carrier sensing mechanism nor the packets that can be decoded. When the number of stations is not known, it is difficult for the protocol to have an optimal behavior. 3.1. Binary Exponential Back-off (BEB) Algorithm According to this algorithm, the waiting time of a station is increased exponentially if the medium is found busy. Alternately, it is set to minimum if a successful transmission takes place [7]. Each station senses the medium for the time interval consisting of DCF (Distributed coordination function) Inter Frame Space (DIFS) and current value of Back- off timer. DIFS [7] is calculated as: DIFS=SIFS + (2*SlotTime) (1) where SIFS (Short Inter Frame Space) is the time interval between data frame sent and the acknowledgement received. Back- off timer [7] is randomly picked in the range of current contention window of the station i.e. [0, CW-1]. If the station remains idle for an interval equal to DIFS, it can start its transmission procedure. There are two control packets used before the actual transmission: a) RTS(Request to Send) b) CTS(Clear to Send ) The station that needs to transmit sends RTS packet to the destined station and waits for the response, i.e., CTS packet from the receiver. DCF mechanism [7] is summarised as in Figure 1. After receiving the CTS packet, the sender actually transmits the data and waits for an acknowledgement. A positive acknowledgement is received in case of successful transmission and CW (Contention window) value is set to minimum [7], i.e, CWnew=CWmin (2) On the other hand, if the acknowledgement is not received within time period of AckTimeOut, it implies that collision has occurred. Then, re-transmission procedure is followed if the re-transmission limit is not reached. The re-transmission limit is as given below [7]: a) 7 for short frames b) 4 for long frames Volume 5 Issue 2 April 2015 407 ISSN: 2319 1058

Figure 1 DCF operation If the re-transmission limit is reached, the frame is dropped. If not, then CW value is increased exponentially. CWnew=min [2*CWold, CWmax] (3) If the station is sensed to be busy during DIFS interval, then it has to wait till the back-off interval. Therefore, Binary exponential back-off algorithm [9] can be summed up as in Figure 2. Figure 2 Binary Exponential Back-off Algorithm IV. PERFORMANCE EVALUATION The experiment for evaluating the performance of a wireless mesh network has been conducted using OPNET Simulator. A hybrid wireless mesh network has been considered with routers that form the backbone of the mesh and IEEE 802.11 wireless LAN stations. The Binary Exponential Back-off algorithm has been implemented to analyze the overall throughput and the delay in the network by carrying out simulations as discussed further. 4.1. Throughput Volume 5 Issue 2 April 2015 408 ISSN: 2319 1058

Network throughput is rate of successful message delivery over a communication channel. It is usually measured in bits per second [11]. From the results as shown in Figure 3 below, it is clear that network throughput is up to 7800 bits per second approximately when the simulation is run for about a minute and the average throughput during this time interval is 4000 bits per second approximately. Figure 3 Throughput of the Network 4.2. Delay Delay specifies how long it takes for bits of data to travel across the network from one node to another node [11].It represents the end to end delay of all the packets received by the wireless LAN MACs of all the WLAN nodes in the network and forwarded to the higher layer. The delay observed in the conducted experiment is as depicted in the Figure 4. The minimum delay of 0.00014s has been observed twice in the time interval of 40s-1. A maximum delay of 0.00082s has been observed just once in complete simulation period. Figure 4 Delay on the network V. CONCLUSION The BEB algorithm has helped to control the shared medium access by multiple nodes in the proposed wireless mesh network. As shown in the simulation results above, a good network throughput is achieved and the delay has been controlled in the network. Further, the performance of BEB algorithm can be improved by devising alternates for setting up contention window size, rather than setting it to a minimum value on successful transmission. REFERENCES [1] Akyildiz Ian F., Wang Xudo, Survey on Wireless Mesh Networks, IEEE Radio Communications, Vol. 43, No. 9, pp. s23-s30, September 2005 [2] Akyildiz Ian F., Wang Xudo, Weilin Wang, Wireless Mesh Networks: A survey, Elsevier, Vol. 47, No. 4 pp. 445-487, 1 January 2005 [3] F. Calì, M. Conti, and E. Gregori, IEEE 802.11 protocol: Design and performance evaluation of an adaptive back- off mechanism, IEEE Journal on Selected Areas in Communications, Vol. 18, No. 9, pp. 1774-1786, 2000. [4] Hongyi Wu, Yi Pan, Medium Access Control in Wireless Networks, Technology and Engineering, 2008 [5] IEEE 802.11 (2015). Available at: http://en.m.wikipedia.org/wiki/ieee_802.11 (Accessed on 2 January 2015) Volume 5 Issue 2 April 2015 409 ISSN: 2319 1058

[6] J. A. Moura and R. N. Marinheiro, MAC approaches for QoS enhancement in wireless LANs, Proceedings of JETC 2005, Lisbona, Portugal, November 2005. [7] Maali Albalt, Qassim Nasir, Adaptive Back off Algorithm for IEEE 802.11 MAC Protocol, Int. J. Communications, Network and System Sciences, Vol. 2, No. 4, pp. 249-324 July 2009 [8] Maninder Kaur, Parminder Singh, A Mathematical Approach to Avoid Congestion and to Analyse Snoop behaviour in Wired cum Wireless Network, International Journal of Engineering and Advanced Technology, Vol. 2, Issue 2, pp. 347-352 December 2012 [9] Mohammed Al-Hubaishi, Tariq Abdullah, Raed Alsaqour and Amine Berqia, E-BEB Algorithm to Improve Quality of Service on Wireless Ad-Hoc Networks, Research Journal of Applied Sciences, Engineering and Technology, pp. 807-812, April 01, 2012 [10] P. Chatzimisios, A.C.Boucouvalas, V.Vitsas, A.Vafiadis, A.Economidis and P.Huang, A simple and effective Backoff scheme for the IEEE 802.11 MAC protocol, Proceedings of CITSA 2005, Vol. 1, pp.48-53, July 2005. [11] Razan Al-Ani2 Mayyada HAmmoshi1, Using Opnet to teach students Computer Networking Subject, Tikrit Journal of Pure Science, Vol 1, 2010 [12] Tahiry Raza Algorithm for Wireless Ad Hoc Networks, Networking 2009, Vol. 5550, pp.416-428, 2009 [13] Wireless Mesh Network Available at http://en.m.wikipedia.org/wiki/wireless_mesh_network (Accessed: 1 Aug 2014) Volume 5 Issue 2 April 2015 410 ISSN: 2319 1058