Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus...

90
Wireless Networking Projects Ashok K. Agrawala Udaya Shankar University of Maryland

Transcript of Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus...

Page 1: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

Wireless Networking Projects

Ashok K. AgrawalaUdaya Shankar

University of Maryland

Page 2: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

Participants

• Ashok Agrawala• Udaya Shankar• Moustafa Youssef• Students

– Adel– Jihwang– Tamer– Andre– Arun– Bao – …

Page 3: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

Activities

• Location Determination– Adhoc

• PinPoint and Extensions– Infrastructure Based

• Horus Technology• Nuzzer Technology for passive determination of location

• Energy Efficient On-Demand Routing• Enhancements to DCF

– BEB in 802.11 in Noisy Environment– Location Aware Enhancements

• WiFi Traffic Characterization

Page 4: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

Location Determination in AdHocEnvironments

• There is no infrastructure • There are no anchors – nodes with known locations

• Need to determine the range – distance between two nodes– PinPoint Technology

• Integrated view– SALAM – A Scalable Anchor-free Location Algorithm for a

heterogeneous Network

Page 5: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

PinPoint

Current Hardware – Client node

Page 6: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

Motivation

A locally centralized algorithm should be a good compromise between accuracy, communication overhead, depending on the size of the cluster and the location of the cluster head.

SALAM

• Locally centralized algorithms scale well with increased network size

• They are robust to network partitioning and node failure.

• They can achieve acceptable accuracy compared to a centralized approach.

Page 7: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

System Architecture

Command Node

Gateway Node

Sensor Node

Boundary Node

Command Node

Command Node

SALAM

Page 8: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

Phase I: Network Bootstrapping

• Node Discovery– Discover nodes that are K-hops (cluster radius) away from gateway node.– Build a breadth first spanning tree rooted at the gateway node.

Range Estimation - PinPoint

Cluster Formation

SALAM

Page 9: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

Phase II: Local Location Discovery

R1 R2

R1

X-axis

R2Y-axis

Gateway Node

Sensor NodeReference Node

Boundary Node

Each gateway node has inter-node distance matrix D for the nodes that are within K-hops.

Build a local map for the cluster.

SALAM

Page 10: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

Phase III: Integrated View

R1 R2

R1

X-axis

R2Y-axis

X-axis

Y-axisR2 R1

R1

X-axis

R2Y-axis

Y-axis

X-axis

SALAM

Page 11: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

Experimental SetupSALAM

• 1000 different topologies, different cluster size ranging from 20-60 nodes per cluster

• Nodes are randomly placed according to a uniform distribution on a 100x100 area

• Varying transmission range to achieve different node degree (6-14)

• Different coordinate system radius (1-4)• Range Error: N(0, σ2), where σ2 ranges from 0.1-1

Page 12: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

The Effect of Connectivity on Accuracy

As node degree increases, range errors become very insignificant.

0

10

20

30

40

50

60

6 7 8 9 10 11 12 13 14

Average Node Degree (d)

Med

ian

Erro

r (%

R)

σ2=0 .1 σ2=0 .5 σ2=1

L= 4

SALAM

Page 13: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

The Effect of Coordinate System Radius on Accuracy

Decrease in accuracy is linearlinear in “LL”.A jump in the range error variance from .5 to 1 caused little impact

compared to the increase for .1 to .5. Such observation stresses the importance of employing a good range measurements technology.

0

1

2

3

4

5

6

7

8

9

1 2 3 4

Coordinate System Radius (L)

Med

ian

Erro

r (%

R)

σ2=0.1 σ2=0.5 σ2=1

d= 10

SALAM

Page 14: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

The Effect of Connectivity on Convergence Latency

0

10

20

30

40

50

60

70

80

6 7 8 9 10 11 12 13 14

Average Node Degree (d)

Num

ber O

f Ite

ratio

nsσ2=0.1σ2=0.5σ2=1

L= 4

SALAM

Page 15: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

The Effect of Coordinate System Radius on Convergence Latency

0

10

20

30

40

50

60

1 2 3 4

Coordinate System Radius (L)

Num

ber

of It

erat

ionsσ2=1 σ2=0.5 σ2=0.1

d= 10

SALAM

Page 16: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

ConclusionSALAM

• Developing a cluster-based anchor-free localization algorithm for as hoc sensor networks:

– Network bootstrapping (the OK clustering algorithm)– Local location discovery (formulating a LSE model to minimize

the intra-cluster cumulative errors)– Global location discovery (finding the best order of

transformations)

• Analyzing the effect of different parameters on the performance of the system.

• Analyzing error accumulation (inter-/intra-cluster).• Compare the performance of the proposed system with

other anchor-free systems.

Page 17: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

Location DeterminationHorus Technology

• Signal-Strength (RSSI) Based Approach

• A few commercially available, e.g. Ekahau, PanGo• A few research groups working on it

• Horus results significantly better than all

• Licensed by Fujitsu and deployed in a shopping center application

Page 18: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

Comparison With Other Systems: RADAR

0%

10%

20%

30%

40%

50%

60%

70%

80%

90%

100%

0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

Distance (Feet)

CD

F RadarHorus

Average=1.38

Average=29.79

Horus

Page 19: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

Comparison With Other Systems: Ekahau

Average StdevEkahau 10.400 5.692Horus Old 4.257 3.582Horus New 2.14995 1.619684

Horus

Page 20: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

Baltimore Convention Center Test

• Large Open Hall 150’ by 150’

0.000.100.200.300.400.500.600.700.800.901.00

0 2 4 6 8 10 12 14 16 18 20 22 24 26 28 30 32 34 36 38

Distance (Foot)Pr

obab

ility

Average: 4.8Median: 3.3Stdev: 5.2

Horus

Page 21: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

Recent Enhancements

• Speed and Direction Estimation• Latency Reduction• Barrier Detection

• “Click and Connect”

• DEMO!!

Horus

Page 22: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

Passive Determination of Location Nuzzer Technology

Ashok K. AgrawalaMoustafa Youssef

University of Maryland

Page 23: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

Passive Object Recognition Problem

• Can the location of a person/object be determined without the person carrying an active device, e.g. a NIC or an RFID ?

• Are the changes in RSSI sufficient for this purpose ??

• Nuzzer Technology

Nuzzer

Page 24: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

Initial Experiments

• Conducted controlled experiments in a bank vault – “no” outside RF interference

• Placed two APs and two laptops with NICs at selected locations

• Initially nobody in the room• Then a person stands at 4 locations which are 3 feet apart.

Nuzzer

Page 25: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

Experimental Setup and Results

10.36585%err

510err

4410correct

4920total

Training set = SET1

13.76016%err

677err

4243correct

4920total

Training set = SET2

Experiment 1 MV DAta

0

10

20

30

40

50

60

1 192 383 574 765 956 1147 1338 1529 1720 1911 2102 2293 2484 2675 2866 3057 3248 3439 3630 3821 4012 4203 4394 4585 4776 4967

Seq No

RSS

I

Series1

Series2

Series3

Series4

AP2

AP3L5

L4

Experiment 1

Nuzzer

Page 26: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

Nuzzer Indoors

• Initial results – > 85% accuracy– Can improve by using better techniques

• Performance limited by the accuracy/repeatability of RSSI measurements

• Can we use this approach outdoors to detect objects– Vehicles in a protected zone – Railroad track, Pipeline,…

Nuzzer

Page 27: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

Nuzzer Outdoors

Car Test

-90

-80

-70

-60

-50

-40

-30

-20

-10

01 57 113 169 225 281 337 393 449 505 561 617 673 729 785 841 897 953 1009 1065 1121 1177

Packet No

RSS

ISeries1

Car Coming ByPerson Coming By

Nuzzer

Page 28: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

Characteristics of RF Fields

• Need to understand the characteristics of RF fields – Multipath effects

• Reflection• Refraction• Scattering• Diffusion

– How are they affected by the presence of objects• Humans• Metal Objects

• Need a good model

Nuzzer

Page 29: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

Radio Wave Propagation

• Signal Intensity

• x = distance from source• J0 = signal amplitude at source• f= frequency(2.4 GHz) • D=Exponent value contributing to decay of signal as a

function of distance x• c= speed of light in free space

)2(0 )()( fxciD exJxJ π−=

Nuzzer

Page 30: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

Wave Propagation Model

• Consider a 3D rectangular box• One transmitter• One receiver• Take into account

– Direct line of Sight– Six reflected Waves

• Validate the model with empirical measurements

Nuzzer

Page 31: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

Model Validation

• Measurements along one corridor• Optimal Model values mostly

within one sigma of the measured values

Nuzzer

Page 32: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

2D Signal Plots – Corridor – XY PlaneNuzzer

LOS Only Reflections Only

Combined

Page 33: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

2D Signal plots – YZ PlaneNuzzer

Page 34: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

Effect of an Object on RF Field

• Initial model of an object– Block

• Rectangular• Spherical

– Empirical• Measurements with a person

at a known location• Conducted measurements in

the corridor

Nuzzer

-44.6right-45.3929

-40.8behind-41.9157

-36.7left-38.7981

-41.2Front-42.2258

-44.7-45.3929

MeasuredEstimated

Page 35: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

Model of Signal Strength

• Account for variabilities– Temporal

• Due to noise in receive circuits• Movement of objects

– Spatial• Variability due to multipath affects

• Use the results to improve Horus and Nuzzer• Placement of Transmitters and Receivers

– Avoid “holes”– Assess effectiveness of the locations

Nuzzer

Page 36: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

Applications

• Home– Security

• Location of intruder• Internet intimation

• Office– Monitoring in the night at no additional costs

• Outdoors– Pipelines– Railroad tracks– Parking lots– …

Nuzzer

Page 37: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

Energy Efficient Routing

EER

Page 38: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

Introduction

• Motivation– Energy is a scarce resource– Transmissions consumes large portion of node energy– Noise Error Rate Retransmission Energy Consumption

S

D

b

a

c

5

2 3

2 2

1• To reduce energy consumption, we need reduce the number of retransmissions.

• In ad hoc networks, paths with low number of retransmissions along the hops minimize the end-to-end energy consumption.

• Develop mechanism for AODV protocol using IEEE 802.11 as MAC layer to construct energy-efficient paths.

EER

Page 39: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

IEEE 802.11 Fragmentation

• Fragmentation bits overhead:– o1 bits: transmitted separately with each fragment and are not considered as a part of

the fragment bits (e.g. PLCP preamble bits, PLCP header, ACK frame).

– o2 bits: transmitted within each fragment (e.g., frame header, frame CRC).

• Fragmentation mechanism:– A Frame will be fragmented to

frames with length no longer that aFragmentThreshold.

– Each fragmented frame is sent as independent transmission.

– Each is separately acknowledged.– Retransmissions occur per fragment.

EER

Page 40: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

Link Cost with 802.11 Fragmentation

• Optimum fragment size is:

Energy consumption for each transmitted bit where o1=250bits,o2=300bits, and v=1unit

• Cost of transmitting L bits using fragments of k bits:

1

2

3

4

5

6

120001000080006000400020000

Ene

rgy

per B

it

Fragment Size (bits)

p = 4.0E-04p = 2.0E-04p = 1.0E-04p = 0.5E-04p = 0.0E-00

v: transmission energy per bit

p: bit error rate over the link

o1: bits: transmitted separately with each fragment and are not considered as a part of the fragment bits (e.g. PLCP preamble bits, PLCP header, ACK frame).o2: transmitted within each fragment (e.g., frame header, frame CRC).

EER

Page 41: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

Bit Error Rate Estimation in AODV

• Link cost is calculated at the receiver side onlyLink bit error rate needs to be estimated at the receiver side only.

• Estimation mechanisms:– Probe Packets

• Each node broadcasts a probe packet periodically.• Each probe has a sequence number.• Receiver can track the number of dropped packets

estimate the bit error rare– Signal-to-Noise Ratio (SNR = 10*log(Pr/N))

• Bit error modeled as function of SNR of the link

• Each node is capable of measuring the SNR for each received packet.– AODV uses periodic Hello packets each t sec jittered by up to ±0.25t.

EER

Page 42: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

S

D

b

a

c

5

2 3

2 2

1

• Construct forward path from S to D

AODV in Noisy Environments

Page 43: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

AODV in Noisy Environments

S

D

b

a

c

5

2 3

2 2

1

RREQForward path

C=0

• Construct forward path from S to D– S broadcasts RREQ augmented with a cost field, C, initialized to Zero– Each node receives RREQ

• Updates the cost filed by the link cost • Stores the backward path to S

Backward path

Page 44: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

AODV in Noisy Environments

S

D

b

a

c

5

2 3

2 2

1

RREQForward path

C=5

C=2Backward path

• Construct forward path from S to D– S broadcasts RREQ augmented with a cost field, C, initialized to Zero– Each node receives RREQ

• Updates the cost filed by the link cost • Stores the backward path to S

– Each node accepts RREQ with lower cost and rebroadcasts it

Page 45: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

AODV in Noisy Environments

S

D

b

a

c

5

2 3

2 2

1

RREQForward path

Backward path

C=5

C=4

RREP

C=1

C=3

C=5

• Construct forward path from S to D– S broadcasts RREQ augmented with a cost field, C, initialized to Zero– Each node receives RREQ

• Updates the cost filed by the link cost • Stores the backward path to Each node accepts RREQ with lower cost and rebroadcasts it

– RREP follow the backward path, contains• Partial cost to D• Optimum fragment over

the transmitted link

Page 46: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

AODV in Noisy Environments

S

D

b

a

c

5

2 3

2 2

1

RREQForward path

Backward pathRREP

C=1

C=3C=5

• Construct forward path from S to D– S broadcasts RREQ augmented with a cost field, C, initialized to Zero– Each node receives RREQ

• Updates the cost filed by the link cost • Stores the backward path to Each node accepts RREQ with lower cost and rebroadcasts it

– RREP follow the backward path, contains• Partial cost to D• Optimum fragment over

the transmitted link

Page 47: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

Performance Evaluation

• NS-2, simulation parameters– 49 nodes– Area of 700mX700m– 12 UDP flows, 1500 bytes each 0.2 sec

• Routing schemes– AODV Standard (SD_fix, SD_var)– Energy-Aware (EA_fix, EA_var)– Retransmission-Aware (RA_fix, RA_var)

• 250 seconds simulation 50 seconds warm up• Flows start in serial with gap of 5 seconds.• Each point in the results is the average of 10 runs. • Cost of single bit transmission over a link is 60µJ.

EER

Page 48: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

Performance Evaluation

• Noise Models– Region partitioned into small square grids (50 x 50 each). – Grid’s noise is Gaussian noise with µ and σ– µ is chosen to vary between Nmin and Nmax

• Fixed noise environment: Nmin is equal to Nmax [0.0, 20.0x10-11] W.• Random noise Environment: Nmin=0.0W Nmax between [0.0, 20.0x10-11] W.

– σ is chosen to be equal to (0.1x µ)W.

EER

Page 49: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

Grid Topologies

0

2000

4000

6000

8000

10000

12000

6.0E-114.8E-113.6E-112.4E-111.2E-110

# of

Pac

kets

Noise (W)

Grid topology, UDP flows, Fixed Noise

RA_varRA_fix EA_varEA_fix SD_varSD_fix

1e-04

0.001

0.01

0.1

1

6.0E-114.8E-113.6E-112.4E-111.2E-110

Ave

rage

Ene

rgy

/ Bit

(J)

Noise (W)

Grid topology, UDP flows, Fixed Noise

SD_fix SD_varEA_fix EA_varRA_fix RA_var

EER

Page 50: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

Mobile Topologies

0

2000

4000

6000

8000

10000

12000

12.0E-119.6E-117.2E-114.8E-112.4E-110

# of

Pac

kets

Noise (W)

Mobile topology (20 m/s), UDP flows, Fixed Noise

RA_varRA_fix EA_varEA_fix SD_varSD_fix

1e-04

0.001

12.0E-119.6E-117.2E-114.8E-112.4E-110

Ave

rage

Ene

rgy

/ Bit

(J)

Noise (W)

Mobile topology (20 m/s), UDP flows, Fixed Noise

SD_fix SD_varEA_fix EA_varRA_fix RA_var

EER

Page 51: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

Conclusion

• Our modifications and techniques can be ported and easily implemented on other routing protocols.

• Performance gains of our schemes will be magnified as the average path length becomes large, in large scale networks (hundreds or thousands of nodes).

• Other estimation mechanisms • We assumed that the network noises characteristics are fixed during the

network life time. Such assumption may not be true in some environments. Therefore, we need to develop mechanisms that discover and redirect the current flow to a new optimum path as soon as it changes.

EER

Page 52: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

Enhancing 802.11 for Noisy Environments

ENE

Page 53: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

Enhancement of IEEE 802.11 DCF in Noisy Environments

• In noisy environments, large number of unsuccessful transmissions are due to noise corruption

• IEEE 802.11 doesn’t differentiate between packet loss due to packet collision or packet error.

BEB doubles CW range in the cases of packet errors unnecessary large idle slots performance degradation

• Propose a new mechanism to enhance the standard 802.11 BEB mechanism (BEBnaive) capable of differentiating between the collision loss and the error loss

BEB will double the contention window only for the case of the collision (BEBsmart).

ENE

Page 54: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

BEBsmart Implementation (Basic access)

– When ACK is missing, node doubles the contention window with probability (1 –p) and resets its CW to W0 with probability p.

– Each node measures its τ every T time slots.– If τ > τideal too frequent transmissions

few idle slots Decrease p by δ– If τ < τideal too few transmissions

large idle slots Increase p by δ

• Using a Markov chain model to model BEB, we calculate the probability a node transmits in a randomly chosen time slot, τ.

• Mechanism:– Each node calculates τideal

– Each node maintains a parameter p, initially set to zero. 0

0.02

0.04

0.06

0.08

0.1

0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8

Tau

valu

e

Packet Error Rate (Pe)

smart_bebnaive_beb

ENE

Page 55: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

Simulation Results

• p is the percentage of the dropped packet assigned to the noise corruptions only.

– From the maintained parameter p, a node can estimate its packet error rate pe

0

0.2

0.4

0.6

0.8

1

0 20 40 60 80 100 120 140 160

Prob

abili

ty

Time (sec)

Actual PeEst. Pe by station 1Est. Pe by station 2Est. Pe by station 3

0

10

20

30

40

50

60

70

80

0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8

Goo

dput

Enh

ance

men

t

Packet Error Rate (Pe)

AnalyticalSimulation (T=1000)Simulation (T=5000)

Simulation (T=10000)Simulation (T=20000)Simulation (T=30000)

• 10 nodes transmitting data packets of size 500 bytes at data rate 22Mbps where δ = 0.01.

ENE

Page 56: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

Location-aware Enhanced DCF(LED)

Page 57: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

Introduction

• IEEE 802.11 DCF is based on Carrier Sense Multiple Access (CSMA)mechanism

– a station may transmit if and only if the medium is sensed to be idle.– not efficient in shared channel use due to its overcautious approach.

• Capture Effect: – When two transmissions are received by the same receiver, the signals of

stronger transmission will capture the receiver modem, and signals of the weaker transmission will be rejected as noise.

• Capture Model:– Captures a particular transmission if the received

energy Pr sufficiently exceeds all n other combined received energy. This ratio α is called the capture ratio.

LED

Page 58: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

Introduction (contd’)

EXAMPLE• Two concurrent connections share the same

wireless communication channel. The first from station 2 to station 1 and the second is from station 3 to station 4

• In IEEE 802.11 DCF, once a connection seizes the channel, the other connection would have detected the carrier signals of this connection and remain blocked.

• However, if stations are positioned in such a way that the energy levels of stations 3 and 4’s transmissions as measured at stations 1 and 2 are not strong enough that stations 1 and 2 can still capture each other’s transmissions both connections can go simultaneously

LED

Page 59: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

Analysis of Blocking Probabilities with Capture Effect

0

0.2

0.4

0.6

0.8

1

50 100 150 200 250 300 350 400 450 500

Prob

abili

ty

No. of Nodes

Anl. P_2Anl. P_1Anl. P_bSim. P_2Sim. P_1Sim. P_b

0

0.1

0.2

0.3

0.4

0.5

50 100 150 200 250 300 350 400 450 500

Prob

abili

ty

No. of Nodes

tau/T=0.01 (with assump.)tau/T=0.01tau/T=0.02tau/T=0.03tau/T=0.04tau/T=0.01tau/T=0.10

• Using a conservative model, we analytically studied the probability a node, detecting on going transmissions, can transmit without corrupting others.

• Verified the analytical results using simulation. • Studied a realistic model using simulation.

LED

Page 60: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

LED Mechanism

• Physical Layer Design– Unlike regular IEEE 802.11 PHY designs, a receiver is able to correctly

detect and capture a strong frame regardless of the current state of the receiver, for example, “Message-In-A-Message” (MIM) support.

• MAC Layer Design– insert a block of information called ENH (“Enhanced”) as part of the PLCP

header to provide the additional information needed for the LED.– When other stations overhearing ENH information, they are able to better

assess whether their own transmissions may harm this ongoing delivery or not.

LED

Page 61: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

LED MechanismLED

Page 62: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

Performance Evaluation

• NS-2, simulation parameters– Variable number of nodes.– Area of 1000x1000m2

– UDP connections, 1000 bytes with different rate– Data rate is 11Mbps

• Schemes– Original IEEE 802.11– MACAW– LED_CS: a station receiving a frame it cannot decode, assumes its

transmission will not interfere with that ongoing delivery.– LED_RX: a station assumes its transmission will interfere with the ongoing

delivery under receiving a frame it cannot decode.• Capture ratio α is set to 5, Transmission Radius=250m, Interference

Radius=550m• Simulation time is 50 seconds.• Each point in the results is the average of 10 runs.

LED

Page 63: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

Performance Evaluation (contd’)

• Various number of connections, each with UDP rate of 20 packets per second.

LED

Page 64: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

Performance Evaluation (contd’)

• 50 UDP connections, each with various packet rates.

LED

Page 65: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

WiFi Traffic Characterization

WiFiTC

Page 66: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

Measurement Setup

• Location: 4th floor, A.V.Williams Bldg• Duration: Feb 9 (Monday) 0 am – Feb 22 (Sunday) 12 pm (2 weeks)• Target traffic: Wireless LAN traffic of one umd AP (at Rm. 4149) on

Channel 6• Methodology:

– Three wireless sniffers at Rm. 4140 (closest to the AP), Rm. 4166, and Rm. 4132

– Wireless sniffers capture MAC traffics – Merging three sniffers to reduce the measurement losses

WiFiTC

Page 67: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

802.11 Traffic Characterization

• Previous results: characterization of traffic, error, types, frame size, and data rate on only MAC layer

• New results: 1. Above-MAC Layer Characterization

• APP, IP, and LLC (Logical Link Control) Layer 2. Session Analysis

• Session: A traffic duration of a wireless STA sending/receiving, which is expired when the STA not send/receive for some time threshold (e.g. 30 minutes)

WiFiTC

Page 68: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

Above-MAC Traffic Characterization

• APP protocol mix– About 40% in bytes are housekeeping traffic (NetBios, boot protocol, etc) for

windows name/browse service and bootstrap, etc.– About 50% in bytes are used for well-known user applications (http, ssh, email, file

share, etc)– 76% of wireless STAs run Windows OS.

• IP protocol mix– 16% in number are used for VPN connection.

• LLC type mix– ARP (Address Resolution Protocol) traffic amounts to 19% in number, 6% in bytes.– IP frame size: From-AP has larger than To-AP due to (small) request/ (large)

response.

WiFiTC

Page 69: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

APP Protocol Histogram

Housekeeping traffic

Protocols of small percentageor unidentified protocols

WiFiTC

Page 70: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

OS Distribution

• Identified by analyzing TCP traffic with OS fingerprinting tool (p0f)

WiFiTC

Page 71: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

IP Protocol Histogram

VPN connection

WiFiTC

Page 72: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

LLC Type Histogram

Most are broadcast frames from other BSS.

WiFiTC

Page 73: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

LLC Type Histogram (in Bytes)

ARP has small frame size (see next slide)

WiFiTC

Page 74: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

LLC Average Frame Size

ARP has small frame size

Small requests / large responses

WiFiTC

Page 75: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

Session Analysis

• Session: A traffic duration of a wireless STA sending/receiving, which is expired when the STA does not send/receive for some time threshold (e.g. 30 minutes)

• Advantages: grouping into homogeneous traffic units helps characterization.

• Session Analysis– Per-protocol session analysis : aim to characterize each protocol traffic in

wireless LAN.– Session clustering analysis (on-going work) : aim to characterize a typical

one-AP wireless LAN traffic.

WiFiTC

Page 76: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

Per-Protocol Analysis

• Traffics in wireless LAN consists of– User traffic (34% in number of frames): generated by human users, e.g. HTTP, SSH,

IMAPS (email), ESP (vpn), etc.

– Broadcast traffic (53% in number of frames): generated by machines for requests to all, responses from any, e.g. NetBios (windows name/browse service), ARP (address resolution), MAC Probe, etc.

– Multicast traffic (13% in number of frames): generated by machines for requests to some, responses from them, e.g. Srvloc (service location), IGMP (group mgmt), ICMP (network discovery), etc.

WiFiTC

Page 77: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

User Protocol Session Characteristics

• 34% in number of frames.– http/https, ssh, imaps (email), esp (for vpn), etc.

• Typical Characteristics– High traffic– From-AP/To-AP traffics are well matched for unicast request/response.– Session duration: around 1 hour

• Other observations– IMAP spike

• Some IMAP sessions have as large traffic as order of 2.• Inferred to be email worm (W32.Netsky.B@mm)

WiFiTC

Page 78: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

User Protocol Sessions (HTTP)

Duration (sec) in Log scale

Traf

fic (N

umbe

r/sec

) in

Log

scal

e

CD

F (D

urat

ion)

From-AP and To-AP arewell matched.

Typical duration: 5 min ~ 1 hour

WiFiTC

Page 79: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

User Protocol Sessions (IMAPS)

Duration (sec) in Log scale

CD

F (D

urat

ion)

Traf

fic (N

umbe

r/sec

) in

Log

scal

e

Abnormally high email traffic

WiFiTC

Page 80: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

Broadcast Session Characteristics

• 53 % in number of frames.– Netbios, bootp, arp, probe, etc.

• Typical Characteristics– Medium traffic– Most traffic are From-AP, due to broadcast request/ unicast response.– Long session duration: longer than 2 hours

• Other observations– Long Probe sessions

• Some STAs in border of APs frequently and continuously (as long as 3 days!) send Probe Requests

• AP can hear Probe Request messages from even far-away STAs, sending Probe Responses.

WiFiTC

Page 81: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

Broadcast Sessions (ARP)

Duration (sec) in Log scale

CD

F (D

urat

ion)

Traf

fic (N

umbe

r/sec

) in

Log

scal

e

High-traffic, long-duration From-AP broadcast requests

Low-traffic unicast responses Typical duration:

30min~1 day

WiFiTC

Page 82: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

Broadcast Sessions (Probe)

Duration (sec) in Log scale

CD

F (D

urat

ion)

Traf

fic (N

umbe

r/sec

) in

Log

scal

e

Long-duration (up to 3 days)Probe Responses

WiFiTC

Page 83: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

Multicast Session Characteristics

• 13% in number of traffics.– srvloc, igmp, icmp, ipv6, etc.

• Typical Characteristics– Small traffic– Multicast traffic using well-known addresses: similar to broadcast – long

duration From-AP sessions.– Multicast traffic for network discovery: instant-lived sessions.

• Other observations– ICMP (ping) scans

• Some STA outside the target BSS sends ping messages to arbitrary, synthetic (multicast) addresses.

• Generate significant number of short (2-second) sessions.• Potentially malicious.

WiFiTC

Page 84: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

Multicast Sessions (srvloc) : when well-known multicast addresses

used

Duration (sec) in Log scale

CD

F (D

urat

ion)

Traf

fic (N

umbe

r/sec

) in

Log

scal

e

High-traffic, long-duration From-AP multicast requests

Low-traffic unicast responses

Similar to broadcasttraffic

WiFiTC

Page 85: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

Multicast Sessions (ICMP): for network discovery purpose

Duration (sec) in Log scale

CD

F (D

urat

ion)

Traf

fic (N

umbe

r/sec

) in

Log

scal

e

Typical duration: 1 sec ~ 15 min

High frequency (60%)of 2-second duration due to Ping scan

WiFiTC

Page 86: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

Mean Session Traffic (number/sec)WiFiTC

Page 87: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

Mean Session Duration (hour)WiFiTC

Page 88: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

Mean Number of Peers WiFiTC

Page 89: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

Session Clustering Analysis

• Generate sessions on all (protocol-mixed) traffic• Apply adaptive clustering algorithm with 4 features:

– From-AP number of frames/sec– To-AP number of frames/sec– Number of distinct peers– Session duration (sec)

• Successfully classify wireless LAN traffic into a small number of characteristic sets (clusters).

WiFiTC

Page 90: Wireless Networking Projects - UMIACS › partnerships › lts › wireless-ashok.pdf · Horus Technology • Signal-Strength (RSSI) Based Approach • A few commercially available,

Conclusion

• We characterize 2-week long WLAN traffics on:– MAC and above-MAC Characteristics– Session Characteristics

• Actual WLAN has– Significant volumes of broadcast/multicast traffic– Some potentially malicious traffic (e.g. IMAPS (email) spike, ICMP

(ping) scans)– Long-duration (as long as 3 days) Probe Response traffic

WiFiTC