Measuring the Reliability of WiFi Networks

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

Hidden Terminal Problem and Exposed Terminal Problem in Wireless MAC Protocols.
Medium Access Issues David Holmer
SELF-ORGANIZING MEDIA ACCESS MECHANISM OF A WIRELESS SENSOR NETWORK AHM QUAMRUZZAMAN.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
Contents IEEE MAC layer operation Basic CSMA/CA operation
Explicit and Implicit Pipelining in Wireless MAC Nitin Vaidya University of Illinois at Urbana-Champaign Joint work with Xue Yang, UIUC.
1 An Approach to Real-Time Support in Ad Hoc Wireless Networks Mark Gleeson Distributed Systems Group Dept.
1 of 56 Idle Sense: An Optimal Access Method for High Throughput and Fairness in Rate Diverse Wireless LANs Martin HeusseFranck Rosseau Romaric GuillierAndrzej.
MAC Layer (Mis)behaviors Christophe Augier - CSE Summer 2003.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 7th Lecture Christian Schindelhauer.
Ethernet: CSMA/CD (Carrier Sense Multiple Access with Collision Detection) Access method: method of controlling how network nodes access communications.
Cooperative MIMO in Wireless Networks: Where are we? Srikanth Krishnamurthy.
MAC Protocol By Ervin Kulenica & Chien Pham.
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
Wireless scheduling analysis (With ns3) By Pradeep Prathik Saisundatr.
Packet Loss Characterization in WiFi-based Long Distance Networks Authors : Anmol Sheth, Sergiu Nedevschi, Rabin Patra, Lakshminarayanan Subramanian [INFOCOM.
Jamming and Anti-Jamming in IEEE based WLANs Ravi Teja C 4/9/2009 TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.:
Unwanted Link Layer Traffic in Large IEEE Wireless Network By Naga V K Akkineni.
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
1 Dynamic Adaption of DCF and PCF mode of IEEE WLAN Abhishek Goliya Guided By: Prof. Sridhar Iyer Dr. Leena-Chandran Wadia MTech Dissertation.
A Cooperative Diversity- Based Robust MAC Protocol in wireless Ad Hoc Networks Sangman Moh, Chansu Yu Chosun University, Cleveland State University Korea,
MOJO: A Distributed Physical Layer Anomaly Detection System for WLANs Richard D. Gopaul CSCI 388.
Multiple Access.
TCP-Cognizant Adaptive Forward Error Correction in Wireless Networks
Improving Loss Resilience with Multi- Radio Diversity in Wireless Networks by Allen Miu, Hari Balakrishnan and C.E. Koksal Appeared in ACM MOBICOM 2005,
IEEE Ad Hoc Mode: Measurement studies Marco Conti Computer Networks Dept., IIT CNR
Ch 12. Multiple Access. Multiple Access for Shared Link Dedicated link – Point-to-point connection is sufficient Shared link – Link is not dedicated –
WIRELESS COMMUNICATION Husnain Sherazi Lecture 1.
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
Wireless LAN Requirements (1) Same as any LAN – High capacity, short distances, full connectivity, broadcast capability Throughput: – efficient use wireless.
Discovering Sensor Networks: Applications in Structural Health Monitoring Summary Lecture Wireless Communications.
1 A Throughput Enhancement Handover Algorithm for WiMAX Network Architecture Hao-Ming Chang and Gwo-Jong Yu Graduate School of Mathematical Sciences, Aletheia.
Mingze Zhang, Mun Choon Chan and A. L. Ananda School of Computing
Airmail: A Link-layer Protocol for Wireless Networks
MAC Protocols for Sensor Networks
Media Access Methods MAC Functionality CSMA/CA with ACK
Introduction Wireless devices offering IP connectivity
Instructor Materials Chapter 6 Building a Home Network
EA C451 (Internetworking Technologies)
David S. L. Wei Joint Work with Alex Chia-Chun Hsu and C.-C. Jay Kuo
The University of Adelaide, School of Computer Science
Error analysis and low-cost error correction for the crowded wireless 2.4 GHz band Mark Grossman ’11, Jens Mache Lewis & Clark College 1.
Wireless LANs Wireless proliferating rapidly.
Idle sense.
Multiple Access Mahesh Jangid Assistant Professor JVW University.
Xors in the air Sachin Katti, Hariharan Rahul, Wenjun Hu, Dina Katabi, Muriel Medard, Jon Crowcroft.
Channel Allocation (MAC)
Ken Gunnells, Ph.D. - Networking Paul Crigler - Programming
Net301 lecture9 11/5/2015 Lect 9 NET301.
Services of DLL Framing Link access Reliable delivery
IEEE MAC Functionality
Learning Objectives After interacting with this Learning Object, the learner will be able to: Explain the process of collision detection in CSMA/CD.
Characterization of Wireless Networks in the Home
Department of Computer Science Southern Illinois University Carbondale CS441-Mobile & Wireless Computing IEEE Standard.
basics Richard Dunn CSE July 2, 2003.
The Impact of Multihop Wireless Channel on TCP Performance
Performance Evaluation of an Integrated-service IEEE Network
Understanding the Real-World Performance of Carrier Sense
Is for “Wireless Fidelity” Or IEEE Standard By Greg Goldman
Maximizing MAC Throughputs by Dynamic RTS-CTS Threshold
Submission Title: [Distributed Contention Access Scheme]
Wireless Range Testing
The System Issues of Rate Adaptation
CARRIER SENSE MULTIPLE ACCESS (CSMA)
Chapter 6 Multiple Radio Access.
Characterization of Wireless Networks in the Home
Channel usage in NGV: follow-up
Chapter 15 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Presentation transcript:

Measuring the Reliability of 802.11 WiFi Networks Kevin Lee, David Murray, Terry Koziniec and Michael Dixon Nottingham Trent University and Murdoch University ITA 2015 Kevin Lee, Nottingham Trent University

Kevin Lee, Nottingham Trent University Motivation Over 50% of the transmission time in WiFi Networks is used to ensure that errors are corrected/detected Even with these efforts, loss rates in prior measurement studies have varied between 5% and 45% This was an exploratory research study to find out if there were any factors which correlated with packet losses We lose frames because the bit errors are too high to be corrected by the forward error correction (FEC) mechanism. Which means packet repeat requests happen… But what are the events which cause these bit errors? ITA 2015 Kevin Lee, Nottingham Trent University

Frame loss Possibility: Collisions WiFi networks use a CSMA/CA protocol called Distributed Coordination Function (DCF) to share the medium. All stations seeking access to the medium will pick a random number and count down to zero. If a node counts to zero, it will begin transmitting (below) All other stations, will overhear the transmission and defer access. If two nodes pick the same random number and begin transmitting simultaneously, the result will be a collision (above) ITA 2015 Kevin Lee, Nottingham Trent University

Frame loss Possibility: Hidden Nodes Transmission errors can also be caused by hidden nodes This occurs when two competing stations cannot overhear each others transmission The mechanism to circumvent hidden nodes is called RTS/CTS but is turned off by default in most access points because it is too inefficient The authors have not found any experimental evidence or observations investigating how commonly hidden node problems occur ITA 2015 Kevin Lee, Nottingham Trent University

Frame loss Possibility: Background Interference Background wireless noise can be caused by various non-802.11 2.4GHz co-existing network types such as Bluetooth or Zigbee There are also many other sources of interference which may arise from non data communications devices such as microwave ovens and cordless phones ITA 2015 Kevin Lee, Nottingham Trent University

Frame loss Possibility: Aggressive Rate Control Wireless links actively modify the transmission rate by changing the Modulation and Coding Scheme (MCS) which determines the number of bits per symbol and amount of FEC. A frequently used open source rate control mechanism called Minstrel rate control algorithm continuously probes the optimal data rate limit and a degree of packet loss is not only inevitable, but a necessary consequence of finding and utilising the most efficient rate. While it is difficult to know the precise usage of different rate control algorithms in current 802.11 WiFi networks, it is likely that most algorithms will allow or cause a degree of packet loss. ITA 2015 Kevin Lee, Nottingham Trent University

Kevin Lee, Nottingham Trent University Research Aim This paper re-examines transmission success rates and the range of factors that correlate with packet losses. Careful analysis may provide clues to help locate the predominant cause of packet loss. Understanding why wireless networks lose packets is very important and it is possible that much needed experimentation in this area has been neglected due to the methodological difficulties in obtaining data from which generalised conclusions can be made. The significance of this study is the volume of wireless packet captures which have been obtained from a wide range of network types and the analysis of loss rates against modulation, frame size and airtime. ITA 2015 Kevin Lee, Nottingham Trent University

Kevin Lee, Nottingham Trent University Study Methods Both passive and active methods involved the use of monitor mode 802.11 network cards to capture over the air traffic. Monitor mode allows the capture of raw link layer information. A Power over Ethernet Raspberry Pi was used to capture and save the data to a 32GB USB drive This device was placed less than 1m away from the access point and only transmissions from the AP were used for analysis ITA 2015 Kevin Lee, Nottingham Trent University

Kevin Lee, Nottingham Trent University Methods: passive The goal of this study was to obtain real world measurements on packet losses in WiFi networks. Two approaches were taken: passive and active The passive approach captures the effects of a wide range of devices and settings We captured the transmission from 7 different University and home WiFi Access points (for a week) We looked for any packet loss from the AP (look for retransmission bit) Murdoch University Ethics permit No: 2014/149 ITA 2015 Kevin Lee, Nottingham Trent University

Kevin Lee, Nottingham Trent University Methods: active The active method trades the range of devices and settings for greater control over the variables in use We captured the data that was being triggered by a single randomly planted device which generated ICMP transmissions based on a computer script We were able to control the packet size in the active tests We observed the packet loss in only these packets (of the size and from the AP to the active device) ITA 2015 Kevin Lee, Nottingham Trent University

Results: Coding Rate (passive) The table above shows the coding rate for 802.11a/g/n transmissions. The figure below shows that frames using more sophisticated coding methods suffer from fewer losses ITA 2015 Kevin Lee, Nottingham Trent University

Results: Frame Size (passive +active) The table to the right shows the packet loss rate for packets in the passive measurement study - only frames <200 bytes and >1400 bytes were found in significant quantities The active test shown enabled control of the packet sizes so different sizes were tested in equal proportions The frame loss rate did not change significantly with the frame size ITA 2015 Kevin Lee, Nottingham Trent University

Kevin Lee, Nottingham Trent University Results: Airtime The figures to the right shows how the frame loss rate changed with the air time The top figure shows the results of the passive test whereas the lower figure shows the results of the active test. Note the logarithmic scale Packets that spend less time in the air are less likely to get lost… (due to modulation and airtime – not packet size) ITA 2015 Kevin Lee, Nottingham Trent University

Concluding Remarks (1/2) The number of packet losses occurring, in this and prior measurement studies large and requires serious consideration. This study suggests that frames, which spend less time in the air, were less likely to be lost Frames transmitted at high data rates, were also more likely to be successful than those transmitted at low data rates. Both the passive and active studies found that the size of the packet, in bytes, did not significantly effect the probability of loss. ITA 2015 Kevin Lee, Nottingham Trent University

Concluding Remarks (2/2) While this study alone does not permit any strong conclusions about the precise cause of packet loss, there are implications for a number of research areas. As the results suggest that the frame size has little effect on the loss rate, we suggest that larger wireless frames, may have a highly beneficial effect on overall throughputs. If packet loss does not increase significantly with larger packets the the Internets MTU could be increased with significant performance benefits ITA 2015 Kevin Lee, Nottingham Trent University

Kevin Lee, Nottingham Trent University Future work Future research could investigate the extent to which the packet size effects the loss rate in 3G and 4G networks. If the major cause of frame loss was hidden nodes or continuous background noise then losses would have increased exponentially with the size. As this did not occur we suggest that there must be other reasons for losses in the capture Future work will try to investigate the preamble, as well as head on collisions (picking the same contention slot) - failures in both these mechanisms would be size agnostic A direction of work involves isolating the Wifi AP from all radio. ITA 2015 Kevin Lee, Nottingham Trent University

Thank you Any Questions? ITA 2015 Kevin Lee, Nottingham Trent University