Understanding and Mitigating the Impact of RF Interference on 802

Slides:



Advertisements
Similar presentations
Interference Avoidance and Control Ramki Gummadi (MIT) Joint work with Rabin Patra (UCB) Hari Balakrishnan (MIT) Eric Brewer (UCB)
Advertisements

1 Understanding and Mitigating the Impact of RF Interference on Networks Ramki Gummadi (MIT), David Wetherall (UW) Ben Greenstein (IRS), Srinivasan.
VSMC MIMO: A Spectral Efficient Scheme for Cooperative Relay in Cognitive Radio Networks 1.
IE 419/519 Wireless Networks Lecture Notes #6 Spread Spectrum.
Anatomy of Radio LAN Onno W. Purbo
David Ripplinger, Aradhana Narula-Tam, Katherine Szeto AIAA 2013 August 21, 2013 Scheduling vs Random Access in Frequency Hopped Airborne.
Wireless Networks and Spread Spectrum Technologies.
Wireless Networks. Anatomy of a radio LAN The radio modem –Analog transmitter The MAC controller –Interface to transmitter –At least partly in hardware.
Ramki Gummadi (MIT), David Wetherall (UW) Ben Greenstein (IRS), Srinivasan Seshan (CMU) Presented by Lei Yang in CS595H, W08 1 Understanding and Mitigating.
Performance of DS-CDMA Protocols in Wireless LANS M.Parikh, P.Sharma, R.Garg, K. Chandra, C. Thompson Center for Advanced Computation and Telecommunications.
CDMA X RTT Overview. Global 3G Evolution.
5-1 Data Link Layer r Today, we will study the data link layer… r This is the last layer in the network protocol stack we will study in this class…
802.11b Vulnerabilities, Ad-Hoc Mode, RF Jamming and Receiver Design Ritesh H Shukla Graduate Student ECE Dept Under the Guidance of Prof. William R Michalson.
1 Understanding and Mitigating the Impact of RF Interference on Networks Ramki Gummadi (MIT), David Wetherall (UW) Ben Greenstein (IRS), Srinivasan.
ESTeem Training Class Radio Technology Overview. Radio Basics Terminology – Familiarization with radio expressions Basic Components – Transmitter – Receiver.
SourceSync: A Distributed Architecture for Sender Diversity Hariharan Rahul Haitham Hassanieh Dina Katabi.
Design Considerations & Emerging Standards.  Carrier Sense Multiple Access / Collision Detect.  Practical limit on Nodes per collision domain.
Combating Cross-Technology Interference Shyamnath Gollakota Fadel Adib Dina Katabi Srinivasan Seshan.
Packet Loss Characterization in WiFi-based Long Distance Networks Authors : Anmol Sheth, Sergiu Nedevschi, Rabin Patra, Lakshminarayanan Subramanian [INFOCOM.
Jamming and Anti-Jamming in IEEE based WLANs Ravi Teja C 4/9/2009 TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.:
Wireless Networking & Mobile Computing CS 752/852 - Spring 2012 Tamer Nadeem Dept. of Computer Science Lec #7: MAC Multi-Rate.
Network Coding Testbed Jeremy Bergan, Ben Green, Alex Lee.
Signal Propagation Propagation: How the Signal are spreading from the receiver to sender. Transmitted to the Receiver in the spherical shape. sender When.
W.lilakiatsakun.  Radio Wave Fundamental  Radio Wave Attributes  RF System Component  RF Signal Propagation  RF Mathematics.
1 Physical Layer ผศ. ดร. อนันต์ ผลเพิ่ม Asst. Prof. Anan Phonphoem, Ph.D. Computer Engineering Department.
Joint PHY-MAC Designs and Smart Antennas for Wireless Ad-Hoc Networks CS Mobile and Wireless Networking (Fall 2006)
CWNA Guide to Wireless LANs, Second Edition Chapter Four IEEE Physical Layer Standards.
Chapter 6-Wireless Networks and Spread Spectrum Technology Frequency bands, channels and technologies.
CWNA Guide to Wireless LANs, Second Edition Chapter Four IEEE Physical Layer Standards.
Doc.: n-proposal-statistical-channel-error-model.ppt Submission Jan 2004 UCLA - STMicroelectronics, Inc.Slide 1 Proposal for Statistical.
CWNA Guide to Wireless LANs, Second Edition Chapter Four IEEE Physical Layer Standards Modified.
Outsourcing Coordination and Management of Home Wireless Access Points through an Open API Ashish Patro Prof. Suman Banerjee University of Wisconsin Madison.
Cross-Layer Approach to Wireless Collisions Dina Katabi.
Doc.: IEEE /0992r1 Submission September 2008 John R. Barr, Motorola Inc.Slide 1 20/40 MHz 11n Interference on Bluetooth Date: Authors:
1 Spread Spectrum Technology. 2 What is Spread Spectrum(SS) Spread Spectrum (SS) technology was first introduced by military as a way of sending secure.
Why PHY Really Matters Hari Balakrishnan MIT CSAIL August 2007 Joint work with Kyle Jamieson and Ramki Gummadi.
CRMA: Collision Resistant Multiple Access Lili Qiu University of Texas at Austin Joint work with Tianji Li, Mi Kyung Han, Apurv Bhartia, Eric Rozner, Yin.
Networks and Mobile Systems Research Group MIT Laboratory for Computer Science nms.lcs.mit.edu RadioActive Networks: Robust Wireless Communications John.
Dirk Grunwald Dept. of Computer Science, ECEE and ITP University of Colorado, Boulder.
Doc.: IEEE /0992r0 Submission September 2008 John R. Barr, Motorola Inc.Slide 1 20/40 MHz 11n Interference on Bluetooth Date: Authors:
Computer Engineering and Networks, College of Engineering, Majmaah University LAN TECHNOLOGIES Mohammed Saleem Bhat CEN-444 Networks Structure.
Wireless Communication
Media Access Methods MAC Functionality CSMA/CA with ACK
Multiple Access Techniques for Wireless Communication
Proposal for Statistical Channel Error Model
Wireless LANs Wireless proliferating rapidly.
Wireless Networks.
A Wireless LAN technologies IEEE
Wireless Sensor Networks 5th Lecture
A Rate-Adaptive MAC Protocol for Multi-Hop Wireless Networks
Spread Spectrum L.Tahani Aljehani.
CS 457 – Lecture 7 Wireless Networks
An Overview of ax Greg Kamer – Consulting Systems Engineer.
Measuring the Reliability of WiFi Networks
Colorado School of Mines
15-744: Computer Networking
Interference Avoidance and Control
Chapter 6 Medium Access Control Protocols and Local Area Networks
Network Coding Testbed
basics Richard Dunn CSE July 2, 2003.
May 2001 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [PHY proposal for the Low Rate Standard]
Understanding the Real-World Performance of Carrier Sense
Wireless Mesh Networks
RushNet: Practical Traffic Prioritization for Saturated Wireless Sensor Networks Chieh-Jan Mike Liang†, Kaifei Chen‡, Nissanka Bodhi Priyantha†, Jie Liu†,
Building A Network: Cost Effective Resource Sharing
CSMA/CN: Carrier Sense Multiple Access with Collision Notification
Wireless LAN Technologies and Products
TX Mask Shoulders vis-à-vis ACI
Investigation of Voice Traffic in Wi-Fi Environment
Multi-rate Medium Access Control
Presentation transcript:

Understanding and Mitigating the Impact of RF Interference on 802 Understanding and Mitigating the Impact of RF Interference on 802.11 Networks Ramki Gummadi (MIT), David Wetherall (UW) Ben Greenstein (IRS), Srinivasan Seshan (CMU) Hello and good afternoon, everyone. Welcome to the first talk of the last session. My name is Ramki, and I’m going to be talking to you today about how we can better understand and mitigate the effects of RF interference on 802.11 networks. This is joint work with David Wetherall from UW, Ben Greenstein from IRS, which stands for Intel Research Seattle and not Internal Revenue Service, and Srini Seshan from CMU.

Growing interference in unlicensed bands Anecdotal evidence of problems, but how severe? Characterize how 802.11 operates under interference in practice Other 802.11 The main problem we’re concerned with today is the impact of growing RF interference in unlicensed spectrum such as the 2.4GHz band used by 802.11. There has recently been a spate of anecdotal reports about the increasing severity of RF interference problems on the operation of wireless networks such as 802.11, but we don’t yet clearly know what the magnitude or the trend of the problem is. So, we would like to characterize how 802.11 performs under interference in reality. Today, an 802.11 network has to contend with other 802.11 networks, as well as with other wireless devices that share the same spectrum, such as cordless phones, microwave ovens, car alarm systems, bluetooth, and a growing variety of other unlicensed band devices.

What do we expect? Throughput to decrease linearly with interference There to be lots of options for 802.11 devices to tolerate interference Bit-rate adaptation Power control FEC Packet size variation Spread-spectrum processing Transmission and reception diversity Theory Throughput (linear) The standard SINR or (Signal to Interference and Noise Ratio) model predicts that throughput should decrease linearly with interferer power. The interferer power is on a log-scale. If this standard model holds in practice, then 802.11 devices have a variety of options at their disposal to tolerate interference gracefully. For example, they can change the bit rate at which they transmit, they can change the transmission power, they can use forward error correction, they can use smaller packets, and exploit various diversity techniques for transmission and reception, such as using multi-antenna systems. Interferer power (log-scale)

Key questions for this talk How damaging can a low-power and/or narrow-band interferer be? How can today’s hardware tolerate interference well? What 802.11 options work well, and why? The key questions before us are whether 802.11 copes well with different types of low-power and/or narrow-band interferers, and which of the 802.11 options work well in practice, and why.

What we see Effects of interference more severe in practice Theory Caused by hardware limitations of commodity cards, which theory doesn’t model Theory Throughput (linear) Practice The most interesting result we see is that the effects of interference are more severe in practice than theory would predict. There is a large gap between theory and practice at both low-end and high-end of the interference range. In fact, we find that the link throughput can drop to zero at medium to high end of the interference range. Such a rapid and severe degradation in performance is caused by several hardware limitations of commodity cards, which are not adequately modeled by theory. Interferer power (log-scale)

Talk organization Characterizing the impact of interference Tolerating interference today

Experimental setup Access Point UDP flow 802.11 Interferer 802.11 Client Our setup is a controlled testbed within an office building consisting of 802.11 transmitter and receiver that use different commodity cards. They exchange UDP flows. Interferers are various types of wireless devices such as an 802.11 interferer that can output arbitrary modulated 802.11 bit patterns, ZigBee sensor nodes, cordless phones, and camera jammers. They represent both worst-case natural and adversarial interferers arising in practice. The interferer varies in power as its physical distance to the 802.11 link changes. In order to simulate the effects of such an interferer in a controlled manner, we use hardware attenuators to vary the output power. The picture here shows such an attenuated 802.11 interferer.

Preamble Detector/ Header CRC-16 Checker 802.11 receiver path PHY MAC PHY MAC Amplifier control To RF Amplifiers AGC RF Signal Analog signal ADC Data (includes beacons) Timing Recovery Barker Correlator Demodulator Descrambler 6-bit samples Preamble Detector/ Header CRC-16 Checker Receiver SYNC SFD CRC Payload For example, when three consecutive beacons from the AP are lost by the MAC layer, the link is commonly assumed to be dead. PHY header Extend SINR model (in paper) to capture these vulnerabilities Interested in worst-case natural or adversarial interference

Timing recovery interference Interferer sends continuous SYNC pattern Interferes with packet acquisition (PHY reception errors) Weak interferer Moderate interferer Log-scale We found an interferer that sends a continuous sync pattern

Dynamic range selection Interferer sends on-off random patterns (5ms/1ms) AGC selects a low-gain amplifier that has high processing noise (packet CRC errors) Narrow-band interferer udp Drops preciptously for both narrowband and low power (e.g. -20dbm)

Header processing interference Interferer sends continuous 16-bit Start Frame Delimiters Affects PHY header processing (header CRC errors) Unsynchronized interferer This interference pattern impacts the timing recovery module before the receiver has locked onto the packet, which means that typical packet processing improvements such as spread-spectrum gains or packet capture are ineffective.

Interference mitigation options Lower the bit rate Decrease the packet size Choose a different modulation scheme Leverage multipath (802.11n) Move to a clear channel

Impact of 802.11 parameters Rate adaptation, packet sizes, FEC, and varying CCA parameters do not help With and without FEC Changing CCA mode Rate adaptation FEC doesn’t help because the additional coding gain of 4dB or so doesn’t offset the 30dB or more of loss caused by affecting the AGC. We next show bit-rate adaptation performance. The previous results showed performance of the lowest-rate (1Mbps) 802.11b, so using faster bit rates doesn’t help. CCA doesn’t help because the bad throughput is because of losses, not deferrals. Finally, changing the packet size only provides an SINR gain of at most 4dB or so, which isn’t enough to offset the losses caused by interfering with the AGC. Changing packet size

Impact of 802.11g/n No significant performance improvement High throughputs without interference Significant drops with weak interferer

Impact of frequency separation But, even small frequency separation (i.e., adjacent 802.11 channel) helps Channel hopping to mitigate interference? 5MHz separation (good performance) Being slightly off channel can improve throughput significantly

Talk organization Characterizing the impact of interference Tolerating interference today

Rapid channel hopping Use existing hardware Design dictated by radio PHY and MAC properties (synchronization, scanning, and switching latencies) Design must accommodate adversarial and natural interference  channel hopping Test with an oracle-based adversary Design overview Packet loss during switching + adversary’s search speed  10ms dwell period Next hop is determined using a secure hash chain Triggered only when heavy packet loss is detected Guarding against observed interference, pick an idle channel. We want to design our system to withstand worst-case adversarial attack. This would be for someone to follow you.

Evaluation of channel hopping Good TCP & UDP performance, low loss rate Weak interference, 17% degradation Moderate interference, 1Mbps throughput

Evaluation of channel hopping Acceptable throughput even with multiple interferers Three orthogonal 802.11 interferers Linear scale Interferers

Conclusions Lot of previous work on RF interference We show 802.11 NICs have additional PHY and MAC fragilities Interference causes substantial degradation in commodity NICs Even weak and narrow-band interferers are surprisingly effective Changing 802.11 parameters does not mitigate interference, but rapid channel hopping can

Thanks! Questions? ramki@csail.mit.edu

Channel hopping performance breakdown Few losses, low multiple retransmits

Related work RF interference and jamming (narrow-band jamming, demodulator interference) We expose additional vulnerabilities in receive path 802.11 DoS (e.g., CCA, association, and authentication attacks) We target PHY instead of MAC Slow channel hopping (e.g., SSCH, MAXchop, 802.11 FH) Rapid channel hopping uses both direct-sequence and frequency hopping to tolerate agile adversaries

Evaluation Setup CP P3 C3 AP Z P2 C2 C1 J P1