1 Client-Centric Strategies for dealing with Interference and Congestion in IEEE 802.11 Wireless Networks By: Udayan Das Adviser: Cynthia Hood.

Slides:



Advertisements
Similar presentations
1 Understanding and Mitigating the Impact of RF Interference on Networks Ramki Gummadi (MIT), David Wetherall (UW) Ben Greenstein (IRS), Srinivasan.
Advertisements

Doc.: IEEE /0604r1 Submission May 2014 Slide 1 Modeling and Evaluating Variable Bit rate Video Steaming for ax Date: Authors:
Restricted Slow-Start for TCP William Allcock 1,2, Sanjay Hegde 3 and Rajkumar Kettimuthu 1,2 1 Argonne National Laboratory 2 The University of Chicago.
Natural Selection in Peer-to-Peer Streaming: From the Cathedral to the Bazaar Vivek Shrivastava, Suman Banerjee University of Wisconsin-Madison, USA ACM.
1 What's happening in Networking Research Today? Prasad Calyam, OARnet OARTech Presentation, Dec 8 th, 2004.
Presented at ICC 2012 – Wireless Network Symposium – June 14 th 2012.
College of Engineering Optimal Access Point Selection and Channel Assignment in IEEE Networks Sangtae Park Advisor: Dr. Robert Akl Department of.
Application, Network and Link Layer Measurements of Streaming Video over a Wireless Campus Network Passive & Active Measurement Workshop 05 Boston, MA,
Ramki Gummadi (MIT), David Wetherall (UW) Ben Greenstein (IRS), Srinivasan Seshan (CMU) Presented by Lei Yang in CS595H, W08 1 Understanding and Mitigating.
Analysis of an IEEE Network Activity during a Small Workshop Zhe Zhou, Mark Claypool, and Robert Kinicki Computer Science, Worcester Polytechnic.
Wi-Fi Technology.
Performance Analysis of the Intertwined Effects between Network Layers for g Transmissions Wireless Multimedia Networking and Performance Modeling.
Windows Streaming Media Performance Analysis on a IEEE g Residential Network The Seventh International Conferences on Wireless and Optical Communications.
Characterization by Measurement of a CDMA 1x EVDO Network Presenter: Mingzhe Li Wireless Internet Conference (WICON’06) Boston, Massachusetts,
The 4th IEEE International Conference on Broadband Communications, Networks and Systems (BROADNETS) Raleigh, NC, USA September 10-13, 2007 Measuring Queue.
Fair Sharing of MAC under TCP in Wireless Ad Hoc Networks Mario Gerla Computer Science Department University of California, Los Angeles Los Angeles, CA.
WBest: a Bandwidth Estimation Tool for IEEE Wireless Networks Presented by Feng Li Mingzhe Li, Mark Claypool, and.
IEEE in the Large: Observations at the IETF Meeting Henning Schulzrinne, Andrea G. Forte, Sangho Shin Department of Computer Science Columbia University.
1 Emulating AQM from End Hosts Presenters: Syed Zaidi Ivor Rodrigues.
Effects of a Bad Channel on the overall WLAN Performance. CS577 Advanced Networking Spring 05 Ashish Samant, Jon Gretarsson, Feng Li {Asamant, jontg,
IEEE Wireless Communication Magazine Design and Performance of an Enhanced IEEE MAC Protocol for Multihop Coverage Extension Frank H.P. Fitzek, Diego.
Performance Analysis of the Intertwined Effects between Network Layers for g Transmissions Wireless Multimedia Networking and Performance Modeling.
1 Understanding and Mitigating the Impact of RF Interference on Networks Ramki Gummadi (MIT), David Wetherall (UW) Ben Greenstein (IRS), Srinivasan.
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
Receiver-driven Layered Multicast Paper by- Steven McCanne, Van Jacobson and Martin Vetterli – ACM SIGCOMM 1996 Presented By – Manoj Sivakumar.
Network Simulation Internet Technologies and Applications.
Packet Loss Characterization in WiFi-based Long Distance Networks Authors : Anmol Sheth, Sergiu Nedevschi, Rabin Patra, Lakshminarayanan Subramanian [INFOCOM.
Jani Pousi Supervisor: Jukka Manner Espoo,
COGNITIVE RADIO FOR NEXT-GENERATION WIRELESS NETWORKS: AN APPROACH TO OPPORTUNISTIC CHANNEL SELECTION IN IEEE BASED WIRELESS MESH Dusit Niyato,
ECE 424 Embedded Systems Design Networking Connectivity Chapter 12 Ning Weng.
Unwanted Link Layer Traffic in Large IEEE Wireless Network By Naga V K Akkineni.
CCH: Cognitive Channel Hopping in Vehicular Ad Hoc Networks Brian Sung Chul Choi, Hyungjune Im, Kevin C. Lee, and Mario Gerla UCLA Computer Science Department.
Advanced Network Architecture Research Group 2001/11/149 th International Conference on Network Protocols Scalable Socket Buffer Tuning for High-Performance.
CS540/TE630 Computer Network Architecture Spring 2009 Tu/Th 10:30am-Noon Sue Moon.
College of Engineering WiFi and WCDMA Network Design Robert Akl, D.Sc. Department of Computer Science and Engineering Robert Akl, D.Sc. Department of Computer.
Beacons Impact study Thomas Deillon & Thin Nguyen July 23 rd 2014.
Fair Sharing of MAC under TCP in Wireless Ad Hoc Networks Mario Gerla Computer Science Department University of California, Los Angeles Los Angeles, CA.
K. Salah 1 Chapter 15 Wireless LANs. K. Salah 2 Figure 15.1 BSSs IEEE Specification for Wireless LAN: IEEE , which covers the physical and data.
How to start research V. Jayalakshmi. Why do we research? – To solve a problem – To satisfy an itch – To gain more market share/ Develop and improve –
A Smart Decision Model for Vertical Handoff Ling-Jyh Chen *, Tony Sun *, Benny Chen *, Venkatesh Rajendran †, Mario Gerla * * Department of Computer Science,
DISCERN: Cooperative Whitespace Scanning in Practical Environments Tarun Bansal, Bo Chen and Prasun Sinha Ohio State Univeristy.
A PRESENTATION ON “Wireless Networks”
Packet Dispersion in IEEE Wireless Networks Mingzhe Li, Mark Claypool and Bob Kinicki WPI Computer Science Department Worcester, MA 01609
Advanced Network Architecture Research Group 2001/11/74 th Asia-Pacific Symposium on Information and Telecommunication Technologies Design and Implementation.
Doc.: IEEE /0648r0 Submission May 2014 Chinghwa Yu et. al., MediaTekSlide 1 Performance Observation of a Dense Campus Network Date:
TCP with Variance Control for Multihop IEEE Wireless Networks Jiwei Chen, Mario Gerla, Yeng-zhong Lee.
Multi-Radio Integration for Heterogeneous IEEE Network Beyond 4G IEEE Presentation Submission Template (Rev. 9) Document Number: IEEE C /0015.
SenProbe: Path Capacity Estimation in Wireless Sensor Networks Tony Sun, Ling-Jyh Chen, Guang Yang M. Y. Sanadidi, Mario Gerla.
Sunhun Lee and Kwangsue Chung School of Electronics Engineering, Kwangwoon University 22 nd International Conference on Advanced Information Networking.
Outsourcing Coordination and Management of Home Wireless Access Points through an Open API Ashish Patro Prof. Suman Banerjee University of Wisconsin Madison.
Outsourcing Coordination and Management of Home Wireless Access Points through an Open API Ashish Patro* Prof. Suman Banerjee University of Wisconsin Madison.
Performance Evaluation of Mobile Hotspots in Densely Deployed WLAN Environments Presented by Li Wen Fang Personal Indoor and Mobile Radio Communications.
Doc.: IEEE /00144r0 Submission 3/01 Nada Golmie, NISTSlide 1 IEEE P Working Group for Wireless Personal Area Networks Dialog with FCC Nada.
1 Apricot2001 Effectiveness of VLAN Chan Wai Kok Faculty of Information Technology Salim Beg Faculty of Engineering.
Partially Overlapped Channels Not Considered Harmful Arunesh Mishra, Vivek Shrivastava, Suman Banerjee, William Arbaugh (ACM SIGMetrics 2006) Slides adapted.
Doc.: IEEE /0433r0 SubmissionSlide 1 Date: Presenter: MAC Protocol to Support Dynamic Bandwidth for aj (60GHz) Xiaoming Peng.
Doc.: IEEE /117 Submission 11/99 Nada Golmie, NISTSlide 1 IEEE P Working Group for Wireless Personal Area Networks MAC Performance Evaluation.
1 Spectrum Co-existence of IEEE b and a Networks using the CSCC Etiquette Protocol Xiangpeng Jing and Dipankar Raychaudhuri, WINLAB Rutgers.
Wireless LAN Requirements (1) Same as any LAN – High capacity, short distances, full connectivity, broadcast capability Throughput: – efficient use wireless.
Wireless Technologies
IEEE e Performance Evaluation
TCP and MAC interplay in Wireless Ad Hoc Networks
WUR Discovery Frame and Discovery Channel
IEEE in the Large: Observations at the IETF Meeting
BlueScan: Boosting Wi-Fi Scanning Efficiency Using Bluetooth Radio
Follow-Up on WUR Discovery Frame and Discovery Channel
Title of Your Paper Names of Co-Authors
Follow-Up on WUR Discovery Frame and Discovery Channel
Dhruv Gupta EEC 273 class project Prof. Chen-Nee Chuah
Presentation transcript:

1 Client-Centric Strategies for dealing with Interference and Congestion in IEEE Wireless Networks By: Udayan Das Adviser: Cynthia Hood

2 Overview Introduction – Wireless Background Related Work / Motivation Detecting Interference – Experimental Work Ongoing / Future Work Mitigating Interference Conclusions

3 Introduction - Wireless Popularity of Wireless Devices – especially ones based on IEEE Suite of Protocols. IEEE : In unlicensed 2.4-GHz ISM Band (802.11b/g) and unlicensed ISM/UNII Band (802.11a) – therefore there is the problem of interference from other devices Shared Channel BW – Contention-Based mechanism – so there is the problem of Congestion. Terminology: Stations/Nodes/Clients, APs, BSS...

4 Introduction - Interference Problem: Number of different devices use the unlicensed Bands: Ex: Bluetooth devices, ZigBee devices, Cordless Phones, Wireless Mice & Keyboards, Baby Monitors etc. Problem: Other devices release unwanted radiation in the Bands: Ex: Microwave.

5 Related Work Wireless Monitoring: Li et al [2], Yeo et al [3], & Henderson/Kotz [4] discuss Tools and Techniques – HW, SW, Basic Issues. Monitoring Case Studies: Yeo et al [5] & [6], Kotz/Essein [7] & Balachandran et al [8] discuss monitoring experiments in Public wireless LANs such as a campus LAN.

6 Related Work Effect of wireless variability on Higher Layers: Li et al [9] and Vacirca/Cuomo [10]. Effect on TCP: Subramaniam et al [11] discuss using Simulation the effect of Interference on TCP. Interference Bluetooth etc: Golmie et al [12] & [13] discuss interference effects theoretically.

7 Related Work / Motivation The effect of Interference has not been studied in detail. Effects on Higher Layer Performance Detecting Interference Gummadi et al [14] has experimental work on interference and also discusses Mitigation Similar to our work Differences in methods used – Interference Sources etc. Mitigation Methods not practical

8 Motivation To show experimentally the effect of Interference – interference can be detected Once detected, we need to devise simple methods to counter it's negative effects. Quick & Easy Implementation Wide-spread deployment (acceptance) Limited or No Change to IEEE Standards Intuitively, moving to a different channel is the best approach, and we propose methods to do this in a simple manner – looking at the problem from a client's perspective.

9 Interference - Detection Conducted a series of experiments to demonstrate the effect of interference on Wireless Network Performance: Effect on Higher Layer Protocol (UDP/TCP) performance How does degradation occur? – is it linear? Etc What can we use to categorically say that interference exists on the channel?

10 Interference – Detection - UDP Experimental Set-up

11 Interference – Detection - UDP Experimental Set-up: Ad-Hoc connection between two laptops using channel 6 – GHz. UDP Packet Generator – which constantly sends UDP packets to the receiver. Collect packet traces at both ends (using Ethereal). Introduce Interference (Sine Wave from Wave Generator) at center of Channel 6 center of Channel 5 (2.432 GHz) – Adjacent Channel center of Channel 4 (2.427 GHz) – Edge of Channel 6 Similar experiment with TCP (Video Traffic).

12 UDP - Results

13 UDP - Results

14 UDP - Results

15 UDP – Results Mbps Mbps Mbps Mbps Mbps Kbps Kbps UDP Throughput Estimated ACK Drop RateUDP RetriesInterference (dBm)‏

16 UDP - Results

17 UDP - Results

18 TCP - Results

19 Results - Analysis Clearly, the performance degradation is not linear with increasing interference. After -50-dBm we see rapid degradation in performance. This degradation alone cannot be used to identify interference, as this may have been caused by congestion. Degradation is more rapid for UDP throughput, and for MAC-Layer Information – ACK Drop Rate. BUT: it doesn't matter what causes performance degradation – Interference / Congestion.

20 Results – Analysis & Conclusion We have observed that beyond -50dBm connection shows a susceptibility to break-down. In fact, at -45dBm connection does not remain alive for entire trace period. We observed the same behavior for TCP. “Break-down of connection is the best indicator of interference!” Comparison with Gummadi et al [14]: Similar performance degradation (at different power levels) No effect of Adjacent Channel – PRISM Interferer Do not mention connection breakdown

21 Mitigation Basic Philosophy: Moving to a different Channel is best. Re-association decision: Find a new channel/AP to associate to- Without cooperation from AP With cooperation from AP Packet Tracing will be used again to estimate channel conditions Then a selection is made based on maximum available bandwidth Usually choices are available

22 Mitigation – Typical Scenario “Choices are available!” –  About 60 APs

23 Ongoing Work: Mitigation - Un-cooperated Method: Collect channel state information by doing a passive scan for 5 seconds, less (1-second as above) when running time-sensitive applications such as audio. Calculate per channel usage by adding the DATA column for all APs on a particular channel. Select an AP on the least utilized channel after yielding to AP selection (preferred network) policy. Select an AP with the highest available signal strength among the possible candidates.

24 Ongoing Work: Mitigation - Un-cooperated Packet Tracing example using Kismet.

25 Ongoing Work: Mitigation - Un-cooperated Example: Channel 1: Clients: 0; BW Usage: 0. Channel 6: Clients: 4; BW Usage: 29.5 Kbps. Channel 11: Clients: 0; BW Usage: 0. Channel 1 or 11 is a better option than Channel 6. However, channel 6 has most APs, and considering an AP policy (ex: IIT) channel 6 will still be selected; channel 6 usage is still low.

26 Future Work: Mitigation – Cooperation from AP AP records information on Network state: Channel Utilization Percentage Traffic: Audio, Video and Data This information is broadcast in BEACON frame Method: Same as before, but calculations are based on AP advertised information

27 Future Work: Mitigation – Cooperation from AP Benefit: Beacons are used, upto 5 Beacons can be used, the period is less than 1 second. On the other hand, it gives a more long term view of network state because AP information is time averaged. Therefore recent changes in Network State will have less effect. Better to have Pessimistic Averaging scheme

28 Conclusions Demonstrated effect of Interference experimentally Switching to a different channel is the best way to Mitigate interference and congestion Packet Tracing can be used to make association decisions after interference/congestion has been detected

29 Contributions: Experimental study of the effect of interference on higher layer performance Demonstrating how Packet-Tracing can be used to estimate Network/Channel State This can be used in making association decisions Publication: DySpan 2007: “Client Channel Selection for Optimal Capacity in IEEE Wireless Networks.” with J.T. MacDonald & D. Roberson Follow-Up Paper to be submitted to DySpan '08

30 Questions?

31 References: 1)J. T. MacDonald, U. Das, and D. A. Roberson, “Client Channel Selection for Optimal Capacity in IEEE Wireless Networks.” In proceedings of the IEEE International Symposium on Dynamic Spectrum Access Networks (DySpan 2007), Dublin, Ireland, April )F. Li, M. Li, R. Lu, H. Wu, M. Claypool, and R. Kinicki, “ Tools and Techniques for Measurement of IEEE Wireless Networks.” In Proceedings of the Second International Workshop On Wireless Network Measurement (WiNMee), Boston, MA, USA, April )J. Yeo, S. Banerjee and A. Agrawala. “Measuring Traffic on the Wireless Medium: Experience and Pitfalls.” CS-TR Department of Computer Science, University of Maryland, Wise’04. 4)T. Henderson and D. Kotz. “Measuring Wireless LANs.” In R. Shorey, A. L. Ananda, M. C. Chan, and W. T. Ooi, editors, Mobile, Wireless and Sensor Networks: Technology Applications and Future Directions, pages 5–27. New York, NY, )J. Yeo, M. Youssef, and A. Agrawala, “A Framework for Wireless LAN Monitoring and its Applications.'' in ACM Workshop on Wireless Security (WiSe 2004) in conjunction with ACM MobiCom 2004, Philadelphia, PA, USA, Oct

32 References:  J. Yeo, M. Youssef, T. Henderson, A. Agrawala, “An Accurate Technique for Measuring the Wireless Side of Wireless Networks.” Papers presented at the 2005 workshop on Wireless traffic measurements and modeling, p.13-18, June 05-05, 2005, Seattle, Washington.  D. Kotz, K. Essien, “Analysis of a Campus-wide Wireless Network.” Proceedings of the 8th annual international conference on Mobile computing and networking, September 23-28, 2002, Atlanta, Georgia, USA.  A. Balachandran, G. M. Voelker, P. Bahl, P. V. Rangan, “Characterizing User Behavior and Network Performance in a Public Wireless LAN.” Proceedings of the 2002 ACM SIGMETRICS international conference on Measurement and modeling of computer systems, June 15-19, 2002, Marina Del Rey, California 9)F. Li, J. Chung, M. Li, H. Wu, M. Claypool, and R. Kinicki, “Application, Network and Link Layer Measurements of Streaming Video over a Wireless Campus Network.''Proceedings of the 6th Passive and Active Measurement Workshop (PAM), Boston, Massachusetts, USA, Apr ) F. Vacirca, and F. Cuomo, “Experimental Results on the Support of TCP over b: An Insight into Fairness Issues.” WONS 2006.

33 References: 11) V. Subramaniam, K. K. Ramakrishnan, S. Kalyanaram, and L. Ji, “Impact of Interference and Capture Effects in Wireless Networks on TCP.” Proceedings of the second international workshop on Wireless traffic measurements and modeling, ) N. Golmie, R.E.V. Dyck, A. Soltanin, A. Tonnerrre, and O. Rebala, “Interference Evaluation of Bluetooth and IEEE b Systems.” Wireless Networks, 9(3):201–211, ) N. Golmie and F. Mouveaux. “Interference in the 2.4 GHz ISM Band: Impact on the Bluetooth Access Control Performance.” In ICC, Helsinki, June ) R. Gummadi, D. Wetherall, B. Greenstein, S. Seshan, “Understanding and Mitigating the Impact of RF Interference on Networks.” In Proceedings of the ACM SIGCOMM 2007, Kyoto, Japan, Aug ) A. P. Jardosh, K. N. Ramachandran, K. C. Almeroth, and E. M. Belding-Royer, ``Understanding Congestion in IEEE b Wireless Networks.'' In Proceedings of the Internet Measurement Conference (IMC), Berkeley, CA, USA, Oct 2005.

34 Further Work: Focus on Bit-Errors – Develop Interference Models Case Studies on Implemented Mitigation Schemes Move to beyond Client-Centric Philosophy When Interference is detected, AP can make switching decision and inform Clients through the BEACON

35 The End