1 An Empirical Analysis of the IEEE 802.11 MAC Layer Handoff Process Arunesh Mishra Minho Shin William Arbaugh University of Maryland College Park,MD,USA.

Slides:



Advertisements
Similar presentations
IEEE INFOCOM 2004 MultiNet: Connecting to Multiple IEEE Networks Using a Single Wireless Card.
Advertisements

IEEE Overview Mustafa Ergen UC Berkeley
Advantage Century Telecommunication Corp. AIL: Actively Intelligent Link-Layer Handoff Guo-Yuan Mikko Wang
Medium Access Control Onno W. Purbo
IEEE Overview Onno W. Purbo
Inter-Subnet Mobile IP Handoffs in b Wireless LANs Albert Hasson.
CSMA/CA in IEEE Physical carrier sense, and Virtual carrier sense using Network Allocation Vector (NAV) NAV is updated based on overheard RTS/CTS/DATA/ACK.
© Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS591 – Wireless & Network Security.
Fast Handoff for Seamless Wireless Mesh Networks Yair Amir, Claudiu Danilov, Michael Hilsdale, Raluca Musaloiu-Elefteri, Nilo Rivera Distributed Systems.
Handoff in Hybrid Mobile Data Networks Vijay Dadlani.
CWNA Guide to Wireless LANs, Second Edition Chapter Five IEEE Media Access Control and Network Layer Standards 1.
Wireless Networking WAN Design Module-06 Jerry Bernardini Community College of Rhode Island 6/18/20151Wireless Networking J. Bernardini.
An Initial Security Analysis of the IEEE 802.1x Standard Tsai Hsien Pang 2004/11/4.
Ethernet: CSMA/CD (Carrier Sense Multiple Access with Collision Detection) Access method: method of controlling how network nodes access communications.
1 A Hybrid Channel Scan Mechanism for Improved VoIP Handoff Performance in WLANs Jeng-Ji Huang, Sen-Ching Chang Department of Applied Electronics.
VoIP over Wireless LANs Sangho Shin Ph.D. Candidate Department of Computer Science Columbia University.
Fast Wireless Handoff in Networks Sangho Shin Andrea G. Forte Anshuman S. Rawat Henning Schulzrinne.
Wireless Networking WAN Design Module-06
Handoff Delay for b Wireless LANs Masters Project defense Anshul Jain Committee: Dr. Henning Schulzrinne, Columbia University Dr. Zongming Fei, University.
Probing in using Neighbor Graphs Minho Shin, Arunesh Mishra, William Arbaugh University of Maryland.
Wireless Local Area Networks (WLAN)
IEEE Wireless LAN Standard
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
Voice Traffic Performance over Wireless LAN using the Point Coordination Function Wei Supervisor: Prof. Sven-Gustav Häggman Instructor: Researcher Michael.
Network Security Wireless LAN. Network Security About WLAN  IEEE standard  Use wireless transmission medium such as radio, microwave, infrared.
Module 4 - Networking MIS5122: Enterprise Architecture for the IT Auditor.
CWNA Guide to Wireless LANs, Second Edition Chapter Five IEEE Media Access Control and Network Layer Standards.
A Study on Dynamic Load Balance for IEEE b Wireless LAN Proc. 8th International Conference on Advances in Communication & Control, COMCON 8, Rethymna,
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless Router LAN Switching and Wireless – Chapter 7.
IEEE Project started by IEEE for setting standard for LAN. This project started in (1980, February), Name given to project is year and month.
CWNA Guide to Wireless LANs, Second Edition
Maintaining Performance while Saving Energy on Wireless LANs Ronny Krashinsky Term Project
Doc.: IEEE /0377r1 Submission March 2004 Areg Alimian CMC, Bernard Aboba MicrosoftSlide 1 Analysis of Roaming Techniques Areg Alimian Communication.
The University of Bolton School of Business & Creative Technologies Wireless Networks Introduction 1.
Wireless Access avoid collisions: 2 + nodes transmitting at same time CSMA - sense before transmitting –don’t collide with ongoing transmission by other.
Doc.: IEEE /540 Submission July 2003 Arunesh Mishra, Min-ho Shin, William Arbaugh, Insun Lee, Kyunghun Jang. Fast handoffs using Fixed Channel.
Wireless Network Security and Interworking
An Empirical Analysis of the IEEE MAC Layer Handoff Process Arunesh Mishra Minho Shin William Arbaugh University of Maryland,College Park,MD.
1 Service Charge and Energy- Aware Vertical Handoff in Integrated IEEE e/ Networks Youngkyu Choi and Sunghyun Choi School of Electrical Engineering.
Lecture 24 Wireless Network Security
IEEE j Relay-Based Wireless Access Networks VASKEN GENC, SEAN MURPHY, YANG YU, AND JOHN MURPHY, UNIVERSITY COLLEGE DUBLIN SCHOOL OF COMPUTER SCIENCE.
WIRELESS COMMUNICATION Husnain Sherazi Lecture 1.
Mozafar Bag-Mohammadi University of Ilam
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 24 “Wireless Network Security”.
Universität Karlsruhe Institut für Telematik ECE 591
WLAN.
Doc.: IEEE /008r0 Submission January 2003 N. Cam-Winget, D. Smith, K. AmannSlide 1 Proposed new AKM for Fast Roaming Nancy Cam-Winget, Cisco Systems.
WLAN 1. IEEE Overview Adopted in 1997 Defines: MAC sublayer MAC management protocols and services Physical (PHY) layers – IR – FHSS – DSSS.
A Cooperative ONU Sleep Method for Reducing Latency and Energy Consumption of STA in Smart-FiWi Networks Speaker: Chia-Chih Chien Advisor: Dr. Ho-Ting.
Copyright © 2003 OPNET Technologies, Inc. Confidential, not for distribution to third parties. Wireless LANs Session
COMP2322 Lab 1 Introduction to Wireless LAN Weichao Li Apr. 8, 2016.
Doc.: IEEE / i Submission July 2003 Petroni,Arbaugh WAA Associates, LLC.Slide 1 An Empirical Analysis of the 4- way Hand-shake 1 Nick.
IEEE Wireless LAN Standard
IEEE Wireless LAN. Wireless LANs: Characteristics Types –Infrastructure based –Ad-hoc Advantages –Flexible deployment –Minimal wiring difficulties.
Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1.
1 Wireless Networks Lecture 26 Wireless LAN / IEEE Dr. Ghalib A. Shah.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Wireless LANs.
Andrea G. Forte Sangho Shin Henning Schulzrinne
Context Caching using Neighbor Graphs for Fast Handoffs in a Wireless Network Arunesh Mishra Min-ho Shin William A. Arbaugh Computer Science Department.
Fast MAC Layer Handoff in Networks
M. Kassab, A. Belghith, J. Bonnin, S. Sassi
Wireless Ad Hoc/Sensor Networks: From IEEE 802
The Network Beacon Announcement scanning method
Wireless Mesh Networks
CSE 4905 Network Security Overview
AP Discovery Discussion
Analysis of Roaming Techniques
WLAN Paging and Idle Mode
WLAN Paging and Idle Mode
WLAN Paging and Idle Mode
Presentation transcript:

1 An Empirical Analysis of the IEEE MAC Layer Handoff Process Arunesh Mishra Minho Shin William Arbaugh University of Maryland College Park,MD,USA ACM SIGCOMM Computer Communications Review Volume 33, Issue 2 (April 2003) Speaker: Yu Yung-Lin

2 Outline Introduction Handoff process Design of the experiments Experiment Result Analysis of the probe phase Conclusion

3 Introduction Present an empirical study of this handoff process The primary contributor to the overall handoff process is probe Discuss optimizations on the probe phase

4 Introduction Wireless LAN architecture Wireless LAN Station (STA) Access Points (AP) Basic Service Set (BSS) Distribution System (DS) Extended Service Set (ESS).

5 Introduction Two different ways to configure a network Ad-hoc No structure Every node can talk to each otherInfrastructure Fixed APs with which mobile nodes can communicate APs are connected to DS

6 Handoff process Definition –Mobile node moves from coverage area of one AP to that of another AP Handoff process can be divided into two distinct logical steps –Discovery –Reauthentication

7 Handoff process Discovery –The client needs to find the potential APs –Accomplished by a MAC layer function: scan The card listens for beacon message on assigned channels. Created a candidate set of APs prioritized –Two scanning mode Passive Active

8 Handoff process Reauthentication –The STA attempts to reauthenticate to an AP according to the priority list –Authentication and a reassociation to the posterior AP (new-AP) –Transfer of credentials and other state information from the old-AP to new-AP This can be achieved through IAPP

9 Handoff process

10 Design of the experiments The wireless network environment –The umd network 35 Cisco350 APs distributed on channel 1,6,11 Open authentication –The nist network 17 Soekris APs distributed on channel 1,6,11 Open authentication –The cswireless network 8 Lucent APs on other 8 different channels Use WEP

11 Design of the experiments The sniffer system –For umd and nist network(APs are on 1,6,11) Two linux machines –One with one wireless NIC –One with two wireless NICs Sniffing the 3 channels –For cswireless network Six linux machines –One with one wireless NIC –Five with two wireless NIC Sniffing all 11 channels

12 Design of the experiments The clients –IBM Thinkpad T30 with P-IV and 512MB RAM with three different NICs Lucent Orinoco Cisco 340 ZoomAir prism 2.5

13 Experiments Result Probe delay accounts for more than 90% of the overall handoff delay

14 Experiments Result The wireless hardware used affects the handoff latency

15 Experiments Result Different wireless cards follow different sequence –ZoomAir and Lucent Different procedure From the Cisco NIC

16 Analysis of the probe phase Probe-wait latency –STA waits on one channel after sending the probe request Total probe delay : t N*MinChannelTime≤ t ≤ N*MaxChannelTime

17 Analysis of the probe phase Probe-wait Optimizations

18 Analysis of the probe phase Improvement –Set MinChannelTime = 6.5ms –Set MaxChannelTime = 11ms –We can get the probe delay on 11 channel 11ms * 11 channels = 121 ms

19 Analysis of the probe phase

20 Conclusion Contribution –Detailed analysis of the handoff process Optimizing two parameters to improve the handoff latency Future work –Reduce the latency of the handoff within acceptable bounds for VoIP on WLAN