Wireless Networking Projects - UMIACS · Horus Technology • Signal-Strength (RSSI) Based Approach...

39
Wireless Networking Projects Ashok K. Agrawala Udaya Shankar University of Maryland

Transcript of Wireless Networking Projects - UMIACS · Horus Technology • Signal-Strength (RSSI) Based Approach...

Page 1: Wireless Networking Projects - UMIACS · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available, e.g. Ekahau, PanGo • A few research groups

Wireless Networking Projects

Ashok K. AgrawalaUdaya Shankar

University of Maryland

Page 2: Wireless Networking Projects - UMIACS · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available, e.g. Ekahau, PanGo • A few research groups

Participants

• Ashok Agrawala• Udaya Shankar• Students

– Moustafa– Jihwang– Tamar– Andre– Arun– Bao – …

Page 3: Wireless Networking Projects - UMIACS · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available, e.g. Ekahau, PanGo • A few research groups

Activities

• WLAN Location Determination– Horus Technology– Nuzzer Technology for passive determination of location

• Energy Efficient On-Demand Routing• Enhancements of BEB in 802.11 in Noisy Environment• Traffic Characterization- 802.11b MAC layer• Z-Iteration Time-Step Simulation

Page 4: Wireless Networking Projects - UMIACS · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available, e.g. Ekahau, PanGo • A few research groups

Location DeterminationHorus Technology

• Signal-Strength (RSSI) Based Approach

• A few commercially available, e.g. Ekahau, PanGo• A few research groups working on it

• Horus results significantly better than all

• Licensed by Fujitsu and deployed in a shopping center application

Page 5: Wireless Networking Projects - UMIACS · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available, e.g. Ekahau, PanGo • A few research groups

Comparison With Other Systems: RADAR

0%

10%

20%

30%

40%

50%

60%

70%

80%

90%

100%

0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

Distance (Feet)

CD

F RadarHorus

Average=1.38

Average=29.79

Horus

Page 6: Wireless Networking Projects - UMIACS · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available, e.g. Ekahau, PanGo • A few research groups

Comparison With Other Systems: Ekahau

Average StdevEkahau 10.400 5.692Horus Old 4.257 3.582Horus New 2.14995 1.619684

Horus

Page 7: Wireless Networking Projects - UMIACS · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available, e.g. Ekahau, PanGo • A few research groups

Baltimore Convention Center Test

• Large Open Hall 150’ by 150’

0.000.100.200.300.400.500.600.700.800.901.00

0 2 4 6 8 10 12 14 16 18 20 22 24 26 28 30 32 34 36 38

Distance (Foot)Pr

obab

ility

Average: 4.8Median: 3.3Stdev: 5.2

Horus

Page 8: Wireless Networking Projects - UMIACS · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available, e.g. Ekahau, PanGo • A few research groups

Passive Determination of Location Nuzzer Technology

Ashok K. AgrawalaMoustafa YoussefLeila Shahamatdar

University of Maryland

Page 9: Wireless Networking Projects - UMIACS · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available, e.g. Ekahau, PanGo • A few research groups

Problem

• Can the location of a person be determined without the person carrying an active device, e.g. NIC or RFID ?

• The presence of a person affects the RF field and thus the RSSI.

Nuzzer

Page 10: Wireless Networking Projects - UMIACS · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available, e.g. Ekahau, PanGo • A few research groups

Results to date

• Conducted controlled experiments in a vault – no outside RF interference

• Placed two APs and two laptops with NICs at selected locations

• Initially nobody in the room• Then a person stands at 4 locations which are 3 feet apart.

Nuzzer

Page 11: Wireless Networking Projects - UMIACS · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available, e.g. Ekahau, PanGo • A few research groups

Experimental Setup and Results

AP2

AP3L5

L4

Experiment 1

AP2 AP3

L5 L4

Experiment 2

AP2

AP3L5

L4

Experiment 3

AP2

AP3

L4

L5

Experiment 4

10.36585%err

510err

4410correct

4920total

Training set = SET1

13.76016%err

677err

4243correct

4920total

Training set = SET2

Nuzzer

Page 12: Wireless Networking Projects - UMIACS · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available, e.g. Ekahau, PanGo • A few research groups

Energy Efficient Routing

EER

Page 13: Wireless Networking Projects - UMIACS · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available, e.g. Ekahau, PanGo • A few research groups

Energy-Efficient On-Demand Routing Protocols

• Motivation– Energy is a scarce resource– Transmissions consumes large portion of node energy– Noise Error Rate Retransmission Energy Consumption

S

D

b

a

c

5

2 3

2 2

1• To reduce energy consumption, we need reduce the number of retransmissions.

• In ad hoc networks, paths with low number of retransmissions along the hops minimize the end-to-end energy consumption.

• Develop mechanism for AODV protocol using IEEE 802.11 as MAC layer to construct energy-efficient paths.

EER

Page 14: Wireless Networking Projects - UMIACS · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available, e.g. Ekahau, PanGo • A few research groups

Link Cost with 802.11 Fragmentation

• Optimum fragment size is:

Energy consumption for each transmitted bit where o1=250bio2=300bits, and v=1unit

• Cost of transmitting L bits using fragments of k bits:

1

2

3

4

5

6

120001000080006000400020000

Ene

rgy

per B

it

Fragment Size (bits)

p = 4.0E-04p = 2.0E-04p = 1.0E-04p = 0.5E-04p = 0.0E-00

v: transmission energy per bit

p: bit error rate over the link

o1: bits: transmitted separately with each fragment and are not considered as a part of the fragment bits (e.g. PLCP preamble bits, PLCP header, ACK frame).o2: transmitted within each fragment (e.g., frame header, frame CRC).

EER

Page 15: Wireless Networking Projects - UMIACS · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available, e.g. Ekahau, PanGo • A few research groups

Simulation Results

1e-04

0.001

0.01

0.1

1

6.5E-125.2E-123.9E-122.6E-121.3E-120

Ave

rage

Ene

rgy

/ Bit

(J)

Noise (W)

Grid topology, UDP flows, Fixed Noise

SD_fix SD_varRA_fix RA_var

0

2000

4000

6000

8000

10000

12000

6.5E-125.2E-123.9E-122.6E-121.3E-120

# of

Pac

kets

Noise (W)

Grid topology, UDP flows, Fixed Noise

RA_varRA_fix SD_varSD_fix

0

2000

4000

6000

8000

10000

12000

13.0E-1210.4E-127.8E-125.2E-122.6E-120

# of

Pac

kets

Noise (W)

Mobile topology (20 m/s), UDP flows, Fixed Noise

RA_varRA_fix SD_varSD_fix

1e-04

0.001

13.0E-1210.4E-127.8E-125.2E-122.6E-120

Ave

rage

Ene

rgy

/ Bit

(J)

Noise (W)

Mobile topology (20 m/s), UDP flows, Fixed Noise

SD_fix SD_varRA_fix RA_var

EER

Page 16: Wireless Networking Projects - UMIACS · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available, e.g. Ekahau, PanGo • A few research groups

Enhancing 802.11 for Noisy Environments

ENE

Page 17: Wireless Networking Projects - UMIACS · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available, e.g. Ekahau, PanGo • A few research groups

Enhancement of IEEE 802.11 DCF in Noisy Environments

– In noisy environments, large number of unsuccessful transmissions are due to noise corruption (error rates).

– IEEE 802.11 doesn’t differentiate between packet loss due to packet collision or packet error.

BEB doubles CW range in the cases of packet errors unnecessary large idle slots performance degradation

– Analytically study the performance of the IEEE 802.11 performance in noise environment.

– Propose an enhanced BEB mechanism to enhance the standard 802.11 BEB mechanism (BEBnaive) to be capable of differentiating between the collision loss and the error loss

BEB will double the contention window only for the case of the collision (BEBsmart).

ENE

Page 18: Wireless Networking Projects - UMIACS · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available, e.g. Ekahau, PanGo • A few research groups

BEBsmart Implementation (Basic access)

– When ACK is missing, nodes doubles the contention window with probability (1 – p) and resets its CW to W0 with probability p.

– Each node measures its τ every T time slots.– If τ > τideal too frequent transmissions

few idle slots Decrease p by δ– If τ < τideal too few transmissions

large idle slots Increase p by δ

• Using a Markov chain model to model BEB, we calculate the probability a node transmits in a randomly chosen time slot, τ.

• Mechanism:– Each node case calculate τideal

– Each node maintains a parameter p, initially set to zero. 0

0.02

0.04

0.06

0.08

0.1

0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8

Tau

valu

e

Packet Error Rate (Pe)

smart_bebnaive_beb

ENE

Page 19: Wireless Networking Projects - UMIACS · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available, e.g. Ekahau, PanGo • A few research groups

Simulation Results

• p is the percentage of the dropped packet assigned to the noise corruptions only.

– From the maintained parameter p, a node can estimate its packet error rate pe

0

0.2

0.4

0.6

0.8

1

0 20 40 60 80 100 120 140 160

Prob

abili

ty

Time (sec)

Actual PeEst. Pe by station 1Est. Pe by station 2Est. Pe by station 3

0

10

20

30

40

50

60

70

80

0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8

Goo

dput

Enh

ance

men

t

Packet Error Rate (Pe)

AnalyticalSimulation (T=1000)Simulation (T=5000)

Simulation (T=10000)Simulation (T=20000)Simulation (T=30000)

• 10 nodes transmitting data packets of size 500 bytes at data rate 22Mbps where δ = 0.01.

ENE

Page 20: Wireless Networking Projects - UMIACS · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available, e.g. Ekahau, PanGo • A few research groups

802.11 DCF Location Aware

• Capture phenomena:– Successful reception of the stronger frame in a

collision– A frame is captured if its detected power Pr exceeds

the joint interfering power Pi of I interfering powers by a minimum capture ratio α

21

R

3 4

I

• Problem Statement:– Contention based MAC protocols are based on CSMA.– A node transmits a packet if and only if the medium is sensed to be free.– A node should not block its transmission when the medium is busy, but it has to

block its transmission only when its transmission corrupts the ongoing transmission(s).

ENE

Page 21: Wireless Networking Projects - UMIACS · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available, e.g. Ekahau, PanGo • A few research groups

Analysis of Capture Effect

• We analytically studied the probability a node, detecting ongoing transmissions, can transmit without corrupting any of these ongoing transmissions.

0

0.2

0.4

0.6

0.8

1

50 100 150 200 250 300 350 400 450 500

Pro

babi

lity

No. of Nodes

Anl. P_2Anl. P_1Anl. P_bSim. P_2Sim. P_1Sim. P_b

0

0.1

0.2

0.3

0.4

0.5

50 100 150 200 250 300 350 400 450 500

Pro

babi

lity

No. of Nodes

tau/T=0.01 (with assump.)tau/T=0.01tau/T=0.02tau/T=0.03tau/T=0.04tau/T=0.01tau/T=0.10

ENE

Page 22: Wireless Networking Projects - UMIACS · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available, e.g. Ekahau, PanGo • A few research groups

802.11 MAC Traffic Characterization

MacTC

Page 23: Wireless Networking Projects - UMIACS · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available, e.g. Ekahau, PanGo • A few research groups

Measurement Setup

• Location: 4th floor, A.V.Williams Bldg• Duration: Feb 9 (Monday) 0 am – Feb 22 (Sunday) 12 pm (2 weeks)• Target traffic: Wireless LAN traffic of one umd AP (at Rm. 4149) on

channel 6• Methodology:

– Three wireless sniffers at Rm. 4140 (closest to the AP), Rm. 4166, and Rm. 4132

– Wireless sniffers capture MAC traffics – Merging three sniffers to reduce the measurement losses

MacTC

Page 24: Wireless Networking Projects - UMIACS · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available, e.g. Ekahau, PanGo • A few research groups

MAC Traffic Characterization

1. MAC Traffic • Number of frames, Bytes

2. MAC Transmission Errors• Retransmissions / number of frames

3. MAC Frame Types4. MAC Frame Size Distribution5. PHY Layer

• Data rate and signal strength

MacTC

Page 25: Wireless Networking Projects - UMIACS · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available, e.g. Ekahau, PanGo • A few research groups

Two-week Pattern per MAC Type (in number of frames per second)

On Wed 18,Internet Wormspreads.

On Wed 20,8-hour dataare lost.

MacTC

• From-AP and To-AP traffics have the same shape.

• From-AP has 5 (12) times larger than To-AP in number of frames (in bytes)

• Maximum throughput within 1.5 Mbps (because channel 6 is shared with two other APs)

Page 26: Wireless Networking Projects - UMIACS · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available, e.g. Ekahau, PanGo • A few research groups

Transmission Errors

• TX-Error = Number of Retransmissions / Number of Frames

• Retransmissions examined using MAC Retry field in MAC header at each frame

• More TX-errors in To-AP traffic than From-AP traffic. Why?– AP has better H/W than STA.– STAs do not adapt sending data rate (possibly an anomaly).

• Higher variability of TX-error in To-AP traffic than From-AP traffic

MacTC

Page 27: Wireless Networking Projects - UMIACS · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available, e.g. Ekahau, PanGo • A few research groups

MAC Frame Types

• Out of Data/Management frames, Data frames (50.7%) and Beacons (46.5%) dominate

• From-AP traffic has larger avg. frame size (410 Bytes) than To-AP traffic (165 Bytes).

• (Re-)Association Request is sent at 1 Mbps but (Re-) Association Response is sent at 11 Mbps.

• Some Management frames experience severe retransmissions (up to 65%)– Probe Response, Re-Association Request, and Power-Save

MacTC

Page 28: Wireless Networking Projects - UMIACS · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available, e.g. Ekahau, PanGo • A few research groups

Anomalies of 802.11 Protocol Severe ReTX of Management Frames

• Reasons– Probe Response: STA sent Probe Request and quickly switched to other

APs on other channels.– Re-Association Request: mismatch of STA’s data rate (1Mbps) and AP’s

(11Mbps).– Power-Save Poll: STA in sleep mode cannot synchronize with AP.

MacTC

Page 29: Wireless Networking Projects - UMIACS · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available, e.g. Ekahau, PanGo • A few research groups

PHY Layer

• Examine Data rate and Signal Strength, which we can obtain in Prism2 header in each frame.

• In From-AP traffic, AP sends most frames at low data rate.

• In To-AP traffic, each STA sends most frames at high data rate.

• Observe no correlation between STA’s sending data rate and signal strength received by the AP.

• (Anomaly) Client STAs do not adapt data rate according to the signal condition.

MacTC

Page 30: Wireless Networking Projects - UMIACS · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available, e.g. Ekahau, PanGo • A few research groups

No Correlation between STA’s Data Rate and Signal Strength Received by AP

MacTC

Page 31: Wireless Networking Projects - UMIACS · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available, e.g. Ekahau, PanGo • A few research groups

Time-Step Network Simulation

Andrzej KochutUdaya Shankar

University of Maryland, College Park

TSS

Page 32: Wireless Networking Projects - UMIACS · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available, e.g. Ekahau, PanGo • A few research groups

Introduction• Goal: Fast accurate performance evaluation tool for computer networks

– Handles general control schemes (time- and state-dependent)• Packet-level simulation:

– Handles general control scheme precisely but prohibitively expensive• Steady-state exact queuing models

– Handles only simple models; no transient metrics• Time-dependent exact queuing model

– Only very simple systems; no state-dependent control• Time-dependent stochastic model (fluid and diffusion approximations)

– Handles time-dependent, but not state-dependent control

• Approach: Combine discrete-event simulation with diffusion approximation– Accurate, inexpensive, handles time- and state-dependent control

TSS

Page 33: Wireless Networking Projects - UMIACS · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available, e.g. Ekahau, PanGo • A few research groups

Hybrid time-step simulation

• Consider a single communication link• Want to generate sample paths efficiently

N(t)

K

N(t)

time0

sample path

TSS

Page 34: Wireless Networking Projects - UMIACS · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available, e.g. Ekahau, PanGo • A few research groups

Hybrid time-step simulation

N(t)

t0 t0 + ∆ t0 + 2 ∆

KN(t)

time0

probability density

N(t0)

N(t0+∆)

• Divide time axis into small intervals ∆• For interval [t0, t0 + ∆] choose N(t0 + ∆) randomly

based on N(t0) and arrival and service processes• Repeat for successive time intervals

TSS

Page 35: Wireless Networking Projects - UMIACS · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available, e.g. Ekahau, PanGo • A few research groups

Hybrid time-step simulation

• Time/state dependent sources undergo state changes at every ∆ (∆≈ time scale of upper-layer control, e.g., RTT for TCP)

• Discrete events are not packet transmissions but time steps• Captures state-dependent control because sample-path is explicit• Diffusion approximation [Kolomogorov] to obtain Prob[ N(t+∆) | N(t) ]

– Arrival and service processes defined by time-varying mean and variance

N(t)

t0 t0 + ∆ t0 + 2 ∆

KN(t)

time0

N(t0+∆)N(t0+2∆)

N(t0)

TSS

Page 36: Wireless Networking Projects - UMIACS · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available, e.g. Ekahau, PanGo • A few research groups

Extension to network of queues

• For each interval [ t, t + ∆ ]– Approximate queue departure and internal flows by renewal processes

characterized by the first two moments– Routing probabilities determined by queue occupancy

• Formulate equations for merging and splitting flows

Source 1

Source 2

Source 3

Sink 1

Sink 2

Sink 3

Split point Merge point

TSS

Page 37: Wireless Networking Projects - UMIACS · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available, e.g. Ekahau, PanGo • A few research groups

Example: Queue size prob density

• GI/D/1/40 queue, λ=800, cA=1, and µ=810, N(t) = 2, ∆=0.05

0

0.02

0.04

0.06

0.08

0.1

0.12

0.14

0 5 10 15 20 25 30

Prob

abili

ty

Queue size

Analytical resultSimulation result

TSS

Page 38: Wireless Networking Projects - UMIACS · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available, e.g. Ekahau, PanGo • A few research groups

Example: TSS vs. packet-level simulation

• GI(t)/D/1/300 queue, uniform arrival dist, µ=1900• Computation time of one run:

– 10 Mbps link - simulation 1.5 sec., hybrid 0.1 sec.– 100 Mbps link - simulation 15 sec., hybrid 0.1 sec.

• Time-step simulator converges faster due to smaller probability space

0

500

1000

1500

2000

2500

Arr

ival

rate

(pkt

s./se

c.)

Time (sec.) 0 1 2 3 4 5 6 7

Arrival rate

0

50

100

150

200

250

300 Time-stepped run #1

Time (sec.) 3 2 1 0 4 5 6 7

N(t)

Time-stepped run #2

0

50

100

150

200

250

300 Simulation run #1

N(t)

Time (sec.) 0 1 2 3 4 5 6 7

Simulation run #2

1K runs

100 runs

0

50

100

150

200

250

300

0 1 2 3 4 5 6 7Time (sec.)

Time-stepped solverSimulation

Ense

mbl

e ave

rage

of N

(t)

TSS

Page 39: Wireless Networking Projects - UMIACS · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available, e.g. Ekahau, PanGo • A few research groups

Time-step simulation - Conclusions

• Time-stepped simulation using diffusion approximation • Fast and accurate alternative to packet-level (discrete-event) simulation• Computational complexity not affected by increasing link bandwidth• Handles state-dependent control schemes• Yields time-dependent evolution of performance metrics

• Future research plans– Extend queue model to handle wireless links (802.11)– Extend to other router disciplines (RED, AQM, CBQ) – Optimize numerical computation – Detailed comparisons with simulation for large networks

TSS