client-centric strategies for dealing with interference and congestion in ieee 802.11 wireless...
DESCRIPTION
Client-Centric Strategies for dealing with Interference and Congestion in IEEE 802.11 Wireless Networks By: Udayan Das Adviser: Cynthia Hood. Overview. Introduction – Wireless Background Related Work / Motivation Detecting Interference – Experimental Work Ongoing / Future Work - PowerPoint PPT PresentationTRANSCRIPT
![Page 1: Client-Centric Strategies for dealing with Interference and Congestion in IEEE 802.11 Wireless Networks By: Udayan Das Adviser: Cynthia Hood](https://reader035.vdocuments.us/reader035/viewer/2022062501/5681684b550346895dde4229/html5/thumbnails/1.jpg)
1
Client-Centric Strategies for dealing with Interference and Congestion in
IEEE 802.11 Wireless Networks
By: Udayan DasAdviser: Cynthia Hood
![Page 2: Client-Centric Strategies for dealing with Interference and Congestion in IEEE 802.11 Wireless Networks By: Udayan Das Adviser: Cynthia Hood](https://reader035.vdocuments.us/reader035/viewer/2022062501/5681684b550346895dde4229/html5/thumbnails/2.jpg)
2
Overview
Introduction – Wireless Background Related Work / Motivation Detecting Interference – Experimental Work Ongoing / Future Work
Mitigating Interference Conclusions
![Page 3: Client-Centric Strategies for dealing with Interference and Congestion in IEEE 802.11 Wireless Networks By: Udayan Das Adviser: Cynthia Hood](https://reader035.vdocuments.us/reader035/viewer/2022062501/5681684b550346895dde4229/html5/thumbnails/3.jpg)
3
Introduction - Wireless
Popularity of Wireless Devices – especially ones based on IEEE 802.11 Suite of Protocols.
IEEE 802.11: In unlicensed 2.4-GHz ISM Band (802.11b/g) and
unlicensed ISM/UNII Band (802.11a) – therefore there is the problem of interference from other devices
Shared Channel BW – Contention-Based mechanism – so there is the problem of Congestion.
Terminology: Stations/Nodes/Clients, APs, BSS...
![Page 4: Client-Centric Strategies for dealing with Interference and Congestion in IEEE 802.11 Wireless Networks By: Udayan Das Adviser: Cynthia Hood](https://reader035.vdocuments.us/reader035/viewer/2022062501/5681684b550346895dde4229/html5/thumbnails/4.jpg)
4
Introduction - Interference
Problem: Number of different devices use the unlicensed Bands: Ex: Bluetooth devices, ZigBee devices, Cordless
Phones, Wireless Mice & Keyboards, Baby Monitors etc.
Problem: Other devices release unwanted radiation in the Bands: Ex: Microwave.
![Page 5: Client-Centric Strategies for dealing with Interference and Congestion in IEEE 802.11 Wireless Networks By: Udayan Das Adviser: Cynthia Hood](https://reader035.vdocuments.us/reader035/viewer/2022062501/5681684b550346895dde4229/html5/thumbnails/5.jpg)
5
Related Work
Wireless Monitoring: Li et al [2], Yeo et al [3], & Henderson/Kotz [4] discuss Tools and Techniques – HW, SW, Basic Issues.
Monitoring Case Studies: Yeo et al [5] & [6], Kotz/Essein [7] & Balachandran et al [8] discuss monitoring experiments in Public wireless LANs such as a campus LAN.
![Page 6: Client-Centric Strategies for dealing with Interference and Congestion in IEEE 802.11 Wireless Networks By: Udayan Das Adviser: Cynthia Hood](https://reader035.vdocuments.us/reader035/viewer/2022062501/5681684b550346895dde4229/html5/thumbnails/6.jpg)
6
Related Work
Effect of wireless variability on Higher Layers: Li et al [9] and Vacirca/Cuomo [10].
Effect on TCP: Subramaniam et al [11] discuss using Simulation the effect of Interference on TCP.
Interference Bluetooth etc: Golmie et al [12] & [13] discuss interference effects theoretically.
![Page 7: Client-Centric Strategies for dealing with Interference and Congestion in IEEE 802.11 Wireless Networks By: Udayan Das Adviser: Cynthia Hood](https://reader035.vdocuments.us/reader035/viewer/2022062501/5681684b550346895dde4229/html5/thumbnails/7.jpg)
7
Related Work / Motivation
The effect of Interference has not been studied in detail. Effects on Higher Layer Performance Detecting Interference
Gummadi et al [14] has experimental work on interference and also discusses Mitigation Similar to our work Differences in methods used – Interference
Sources etc. Mitigation Methods not practical
![Page 8: Client-Centric Strategies for dealing with Interference and Congestion in IEEE 802.11 Wireless Networks By: Udayan Das Adviser: Cynthia Hood](https://reader035.vdocuments.us/reader035/viewer/2022062501/5681684b550346895dde4229/html5/thumbnails/8.jpg)
8
Motivation To show experimentally the effect of Interference
– interference can be detected Once detected, we need to devise simple
methods to counter it's negative effects. Quick & Easy Implementation Wide-spread deployment (acceptance) Limited or No Change to IEEE 802.11 Standards
Intuitively, moving to a different channel is the best approach, and we propose methods to do this in a simple manner – looking at the problem from a client's perspective.
![Page 9: Client-Centric Strategies for dealing with Interference and Congestion in IEEE 802.11 Wireless Networks By: Udayan Das Adviser: Cynthia Hood](https://reader035.vdocuments.us/reader035/viewer/2022062501/5681684b550346895dde4229/html5/thumbnails/9.jpg)
9
Interference - Detection
Conducted a series of experiments to demonstrate the effect of interference on Wireless Network Performance: Effect on Higher Layer Protocol (UDP/TCP)
performance How does degradation occur? – is it linear? Etc What can we use to categorically say that
interference exists on the channel?
![Page 10: Client-Centric Strategies for dealing with Interference and Congestion in IEEE 802.11 Wireless Networks By: Udayan Das Adviser: Cynthia Hood](https://reader035.vdocuments.us/reader035/viewer/2022062501/5681684b550346895dde4229/html5/thumbnails/10.jpg)
10
Interference – Detection - UDP
Experimental Set-up
![Page 11: Client-Centric Strategies for dealing with Interference and Congestion in IEEE 802.11 Wireless Networks By: Udayan Das Adviser: Cynthia Hood](https://reader035.vdocuments.us/reader035/viewer/2022062501/5681684b550346895dde4229/html5/thumbnails/11.jpg)
11
Interference – Detection - UDP
Experimental Set-up: Ad-Hoc connection between two laptops using
channel 6 – 2.437 GHz. UDP Packet Generator – which constantly sends
UDP packets to the receiver. Collect packet traces at both ends (using Ethereal).
Introduce Interference (Sine Wave from Wave Generator) at center of Channel 6 center of Channel 5 (2.432 GHz) – Adjacent Channel center of Channel 4 (2.427 GHz) – Edge of Channel 6
Similar experiment with TCP (Video Traffic).
![Page 12: Client-Centric Strategies for dealing with Interference and Congestion in IEEE 802.11 Wireless Networks By: Udayan Das Adviser: Cynthia Hood](https://reader035.vdocuments.us/reader035/viewer/2022062501/5681684b550346895dde4229/html5/thumbnails/12.jpg)
12
UDP - Results
PRR (Center)
84
86
88
90
92
94
96
98
100
-100 -90 -80 -70 -60 -50 -40
Interference (dBm)
PRR
![Page 13: Client-Centric Strategies for dealing with Interference and Congestion in IEEE 802.11 Wireless Networks By: Udayan Das Adviser: Cynthia Hood](https://reader035.vdocuments.us/reader035/viewer/2022062501/5681684b550346895dde4229/html5/thumbnails/13.jpg)
13
UDP - Results
PRR (1st Adjacent Channel)
84
86
88
90
92
94
96
98
100
-100 -90 -80 -70 -60 -50 -40
Interference (dBm)
PRR
![Page 14: Client-Centric Strategies for dealing with Interference and Congestion in IEEE 802.11 Wireless Networks By: Udayan Das Adviser: Cynthia Hood](https://reader035.vdocuments.us/reader035/viewer/2022062501/5681684b550346895dde4229/html5/thumbnails/14.jpg)
14
UDP - Results
PRR (2nd Adjacent Channel)
84
86
88
90
92
94
96
98
100
-100 -90 -80 -70 -60 -50 -40
Interference (dBm)
PRR
![Page 15: Client-Centric Strategies for dealing with Interference and Congestion in IEEE 802.11 Wireless Networks By: Udayan Das Adviser: Cynthia Hood](https://reader035.vdocuments.us/reader035/viewer/2022062501/5681684b550346895dde4229/html5/thumbnails/15.jpg)
15
UDP – Results
1.697 Mbps4.701.05-75
1.717 Mbps10.521.12-70
1.684 Mbps3.551.04-65
1.666 Mbps7.461.08-60
1.594 Mbps3.861.04-55
867.60 Kbps20.911.26-50
8.93 Kbps65.522.90-45
UDP ThroughputEstimated
ACK Drop RateUDP RetriesInterference (dBm)
![Page 16: Client-Centric Strategies for dealing with Interference and Congestion in IEEE 802.11 Wireless Networks By: Udayan Das Adviser: Cynthia Hood](https://reader035.vdocuments.us/reader035/viewer/2022062501/5681684b550346895dde4229/html5/thumbnails/16.jpg)
16
UDP - Results
UDP Throughput (kbps)
0.00200.00400.00600.00800.00
1000.001200.001400.001600.001800.002000.00
-80 -70 -60 -50 -40
![Page 17: Client-Centric Strategies for dealing with Interference and Congestion in IEEE 802.11 Wireless Networks By: Udayan Das Adviser: Cynthia Hood](https://reader035.vdocuments.us/reader035/viewer/2022062501/5681684b550346895dde4229/html5/thumbnails/17.jpg)
17
UDP - Results
ACK Drop Rate
0.0010.0020.0030.0040.0050.0060.0070.00
-80 -75 -70 -65 -60 -55 -50 -45 -40
Interference (dBm)
![Page 18: Client-Centric Strategies for dealing with Interference and Congestion in IEEE 802.11 Wireless Networks By: Udayan Das Adviser: Cynthia Hood](https://reader035.vdocuments.us/reader035/viewer/2022062501/5681684b550346895dde4229/html5/thumbnails/18.jpg)
18
TCP - Results
TCP Throughput
0.00
50.00
100.00
150.00
200.00
250.00
-90 -80 -70 -60 -50 -40 -30
![Page 19: Client-Centric Strategies for dealing with Interference and Congestion in IEEE 802.11 Wireless Networks By: Udayan Das Adviser: Cynthia Hood](https://reader035.vdocuments.us/reader035/viewer/2022062501/5681684b550346895dde4229/html5/thumbnails/19.jpg)
19
Results - Analysis
Clearly, the performance degradation is not linear with increasing interference. After -50-dBm we see rapid degradation in
performance. This degradation alone cannot be used to identify
interference, as this may have been caused by congestion. Degradation is more rapid for UDP throughput,
and for MAC-Layer Information – ACK Drop Rate. BUT: it doesn't matter what causes performance
degradation – Interference / Congestion.
![Page 20: Client-Centric Strategies for dealing with Interference and Congestion in IEEE 802.11 Wireless Networks By: Udayan Das Adviser: Cynthia Hood](https://reader035.vdocuments.us/reader035/viewer/2022062501/5681684b550346895dde4229/html5/thumbnails/20.jpg)
20
Results – Analysis & Conclusion We have observed that beyond -50dBm
connection shows a susceptibility to break-down. In fact, at -45dBm connection does not remain alive
for entire trace period. We observed the same behavior for TCP. “Break-down of connection is the best indicator of
interference!” Comparison with Gummadi et al [14]:
Similar performance degradation (at different power levels)
No effect of Adjacent Channel – PRISM Interferer Do not mention connection breakdown
![Page 21: Client-Centric Strategies for dealing with Interference and Congestion in IEEE 802.11 Wireless Networks By: Udayan Das Adviser: Cynthia Hood](https://reader035.vdocuments.us/reader035/viewer/2022062501/5681684b550346895dde4229/html5/thumbnails/21.jpg)
21
Mitigation
Basic Philosophy: Moving to a different Channel is best.
Re-association decision: Find a new channel/AP to associate to- Without cooperation from AP With cooperation from AP
Packet Tracing will be used again to estimate channel conditions
Then a selection is made based on maximum available bandwidth Usually choices are available
![Page 22: Client-Centric Strategies for dealing with Interference and Congestion in IEEE 802.11 Wireless Networks By: Udayan Das Adviser: Cynthia Hood](https://reader035.vdocuments.us/reader035/viewer/2022062501/5681684b550346895dde4229/html5/thumbnails/22.jpg)
22
Mitigation – Typical Scenario “Choices are available!” –
About 60 APs
![Page 23: Client-Centric Strategies for dealing with Interference and Congestion in IEEE 802.11 Wireless Networks By: Udayan Das Adviser: Cynthia Hood](https://reader035.vdocuments.us/reader035/viewer/2022062501/5681684b550346895dde4229/html5/thumbnails/23.jpg)
23
Ongoing Work:Mitigation - Un-cooperated Method:
Collect channel state information by doing a passive scan for 5 seconds, less (1-second as above) when running time-sensitive applications such as audio.
Calculate per channel usage by adding the DATA column for all APs on a particular channel.
Select an AP on the least utilized channel after yielding to AP selection (preferred network) policy.
Select an AP with the highest available signal strength among the possible candidates.
![Page 24: Client-Centric Strategies for dealing with Interference and Congestion in IEEE 802.11 Wireless Networks By: Udayan Das Adviser: Cynthia Hood](https://reader035.vdocuments.us/reader035/viewer/2022062501/5681684b550346895dde4229/html5/thumbnails/24.jpg)
24
Ongoing Work:Mitigation - Un-cooperated Packet Tracing example using Kismet.
![Page 25: Client-Centric Strategies for dealing with Interference and Congestion in IEEE 802.11 Wireless Networks By: Udayan Das Adviser: Cynthia Hood](https://reader035.vdocuments.us/reader035/viewer/2022062501/5681684b550346895dde4229/html5/thumbnails/25.jpg)
25
Ongoing Work:Mitigation - Un-cooperated
Example: Channel 1: Clients: 0; BW Usage: 0. Channel 6: Clients: 4; BW Usage: 29.5 Kbps. Channel 11: Clients: 0; BW Usage: 0.
Channel 1 or 11 is a better option than Channel 6. However, channel 6 has most APs, and
considering an AP policy (ex: IIT) channel 6 will still be selected; channel 6 usage is still low.
![Page 26: Client-Centric Strategies for dealing with Interference and Congestion in IEEE 802.11 Wireless Networks By: Udayan Das Adviser: Cynthia Hood](https://reader035.vdocuments.us/reader035/viewer/2022062501/5681684b550346895dde4229/html5/thumbnails/26.jpg)
26
Future Work:Mitigation – Cooperation from AP
AP records information on Network state: Channel Utilization Percentage Traffic: Audio, Video and Data
This information is broadcast in BEACON frame
Method: Same as before, but calculations are based on AP
advertised information
![Page 27: Client-Centric Strategies for dealing with Interference and Congestion in IEEE 802.11 Wireless Networks By: Udayan Das Adviser: Cynthia Hood](https://reader035.vdocuments.us/reader035/viewer/2022062501/5681684b550346895dde4229/html5/thumbnails/27.jpg)
27
Future Work:Mitigation – Cooperation from AP
Benefit: Beacons are used, upto 5 Beacons can be used, the
period is less than 1 second. On the other hand, it gives a more long term view of
network state because AP information is time averaged.
Therefore recent changes in Network State will have less effect.
Better to have Pessimistic Averaging scheme
![Page 28: Client-Centric Strategies for dealing with Interference and Congestion in IEEE 802.11 Wireless Networks By: Udayan Das Adviser: Cynthia Hood](https://reader035.vdocuments.us/reader035/viewer/2022062501/5681684b550346895dde4229/html5/thumbnails/28.jpg)
28
Conclusions
Demonstrated effect of Interference experimentally
Switching to a different channel is the best way to Mitigate interference and congestion
Packet Tracing can be used to make association decisions after interference/congestion has been detected
![Page 29: Client-Centric Strategies for dealing with Interference and Congestion in IEEE 802.11 Wireless Networks By: Udayan Das Adviser: Cynthia Hood](https://reader035.vdocuments.us/reader035/viewer/2022062501/5681684b550346895dde4229/html5/thumbnails/29.jpg)
29
Contributions: Experimental study of the effect of
interference on higher layer performance Demonstrating how Packet-Tracing can be used
to estimate Network/Channel State This can be used in making association decisions
Publication: DySpan 2007: “Client Channel Selection for Optimal Capacity in IEEE 802.11 Wireless Networks.” with J.T. MacDonald & D. Roberson
Follow-Up Paper to be submitted to DySpan '08
![Page 30: Client-Centric Strategies for dealing with Interference and Congestion in IEEE 802.11 Wireless Networks By: Udayan Das Adviser: Cynthia Hood](https://reader035.vdocuments.us/reader035/viewer/2022062501/5681684b550346895dde4229/html5/thumbnails/30.jpg)
30
Questions?
![Page 31: Client-Centric Strategies for dealing with Interference and Congestion in IEEE 802.11 Wireless Networks By: Udayan Das Adviser: Cynthia Hood](https://reader035.vdocuments.us/reader035/viewer/2022062501/5681684b550346895dde4229/html5/thumbnails/31.jpg)
31
References:1)J. T. MacDonald, U. Das, and D. A. Roberson, “Client Channel Selection for Optimal Capacity in IEEE 802.11 Wireless Networks.” In proceedings of the IEEE International Symposium on Dynamic Spectrum Access Networks (DySpan 2007), Dublin, Ireland, April 2007.2)F. Li, M. Li, R. Lu, H. Wu, M. Claypool, and R. Kinicki, “Tools and Techniques for Measurement of IEEE 802.11 Wireless Networks.” In Proceedings of the Second International Workshop On Wireless Network Measurement (WiNMee), Boston, MA, USA, April 20063)J. Yeo, S. Banerjee and A. Agrawala. “Measuring Traffic on the Wireless Medium: Experience and Pitfalls.” CS-TR 4421. Department of Computer Science, University of Maryland, Wise’04.4)T. Henderson and D. Kotz. “Measuring Wireless LANs.” In R. Shorey, A. L. Ananda, M. C. Chan, and W. T. Ooi, editors, Mobile, Wireless and Sensor Networks: Technology Applications and Future Directions, pages 5–27. New York, NY, 2006.5)J. Yeo, M. Youssef, and A. Agrawala, “A Framework for Wireless LAN Monitoring and its Applications.'' in ACM Workshop on Wireless Security (WiSe 2004) in conjunction with ACM MobiCom 2004, Philadelphia, PA, USA, Oct. 2004.
![Page 32: Client-Centric Strategies for dealing with Interference and Congestion in IEEE 802.11 Wireless Networks By: Udayan Das Adviser: Cynthia Hood](https://reader035.vdocuments.us/reader035/viewer/2022062501/5681684b550346895dde4229/html5/thumbnails/32.jpg)
32
References:6) J. Yeo , M. Youssef , T. Henderson , A. Agrawala, “An Accurate Technique for
Measuring the Wireless Side of Wireless Networks.” Papers presented at the 2005 workshop on Wireless traffic measurements and modeling, p.13-18, June 05-05, 2005, Seattle, Washington.
7) D. Kotz , K. Essien, “Analysis of a Campus-wide Wireless Network.” Proceedings of the 8th annual international conference on Mobile computing and networking, September 23-28, 2002, Atlanta, Georgia, USA.
8) A. Balachandran , G. M. Voelker , P. Bahl , P. V. Rangan, “Characterizing User Behavior and Network Performance in a Public Wireless LAN.” Proceedings of the 2002 ACM SIGMETRICS international conference on Measurement and modeling of computer systems, June 15-19, 2002, Marina Del Rey, California
9) F. Li, J. Chung, M. Li, H. Wu, M. Claypool, and R. Kinicki, “Application, Network and Link Layer Measurements of Streaming Video over a Wireless Campus Network.''Proceedings of the 6th Passive and Active Measurement Workshop (PAM), Boston, Massachusetts, USA, Apr. 2005
10) F. Vacirca, and F. Cuomo, “Experimental Results on the Support of TCP over 802.11b: An Insight into Fairness Issues.” WONS 2006.
![Page 33: Client-Centric Strategies for dealing with Interference and Congestion in IEEE 802.11 Wireless Networks By: Udayan Das Adviser: Cynthia Hood](https://reader035.vdocuments.us/reader035/viewer/2022062501/5681684b550346895dde4229/html5/thumbnails/33.jpg)
33
References:11) V. Subramaniam, K. K. Ramakrishnan, S. Kalyanaram, and L. Ji, “Impact of
Interference and Capture Effects in 802.11 Wireless Networks on TCP.” Proceedings of the second international workshop on Wireless traffic measurements and modeling, 2006
12) N. Golmie, R.E.V. Dyck, A. Soltanin, A. Tonnerrre, and O. Rebala, “Interference Evaluation of Bluetooth and IEEE 802.11b Systems.” Wireless Networks, 9(3):201–211, 2003.
13) N. Golmie and F. Mouveaux. “Interference in the 2.4 GHz ISM Band: Impact on the Bluetooth Access Control Performance.” In ICC, Helsinki, June 2001.
14) R. Gummadi, D. Wetherall, B. Greenstein, S. Seshan, “Understanding and Mitigating the Impact of RF Interference on 802.11 Networks.” In Proceedings of the ACM SIGCOMM 2007, Kyoto, Japan, Aug 2007.
15) A. P. Jardosh, K. N. Ramachandran, K. C. Almeroth, and E. M. Belding-Royer,
``Understanding Congestion in IEEE 802.11b Wireless Networks.'' In Proceedings of the Internet Measurement Conference (IMC), Berkeley, CA, USA, Oct 2005.
![Page 34: Client-Centric Strategies for dealing with Interference and Congestion in IEEE 802.11 Wireless Networks By: Udayan Das Adviser: Cynthia Hood](https://reader035.vdocuments.us/reader035/viewer/2022062501/5681684b550346895dde4229/html5/thumbnails/34.jpg)
34
Further Work:
Focus on Bit-Errors – Develop Interference Models
Case Studies on Implemented Mitigation Schemes
Move to beyond Client-Centric Philosophy When Interference is detected, AP can
make switching decision and inform Clients through the BEACON
![Page 35: Client-Centric Strategies for dealing with Interference and Congestion in IEEE 802.11 Wireless Networks By: Udayan Das Adviser: Cynthia Hood](https://reader035.vdocuments.us/reader035/viewer/2022062501/5681684b550346895dde4229/html5/thumbnails/35.jpg)
35
The End