Estimation of Interference in Wi-Fi Networks
|
|
|
- Bridget Carpenter
- 10 years ago
- Views:
Transcription
1 Estimation of Interference in Wi-Fi Networks Prajakta D. Patil 1, M. M. Wankhade 2 Student, E & TC, Sinhgad College of Engineering, Pune, India 1 Professor, E & TC, Sinhgad College of Engineering, Pune, India 2 ISSN (Online) Abstract: The rapid proliferation of wireless devices has led to an increased usage of Wi-Fi. But at the same time, the issue of interference in highly loaded scenarios cannot be neglected. Interference is a major cause of degradation of capacity and thus performance in wireless networks. The knowledge, of which links in the network interfere with one another, and to what extent, is important to improve, or even to estimate the performance of these networks. This paper presents a technique to estimate the interference in Wi-Fi networks with the help of hidden Markov model. Wireless traffic traces are captured through sniffer and analysed using a machine learning approach to conclude about the carrier-sense relationship between network nodes. To add to it, an estimation of deferral probabilities helps to understand the interference relationships. The effectiveness of the technique is evaluated using ns2 simulation which shows that this method expresses interference relations with the help of metrics such as probability of deferral, packet delivery ratio etc. in a better manner. Keywords: protocol, interference, hidden Markov model, carrier sense. I. INTRODUCTION Wireless networks such as have enjoyed an increased adoption rate in recent years, and their deployed base continues to grow. Initially envisioned to support mobile devices, wireless has also proved popular in more static settings that involve PCs and laptops in homes and offices as it removes the hassle of wiring. Wi-Fi performance degrades due to wireless interference in loaded networking scenarios [10] [11]. A fundamental issue in these networks is interference, in which transmissions from one sender-receiver pair affectthose of other pairs. The achievable capacity of a wireless network is interference limited [1]. Interference defines the spatial boundaries for spectrum reuse, and it directly impacts the assignment of senders to channels [2], network capacity [1], and routing choices [3]. Research has been done in the past to understand the wireless interference in theory; real network deployments are yet to implement it. This paper presents a technique to understand and estimate the wireless interference between network nodes and links. The goal is to accomplish this passively i.e. without placing any monitoring device at the access point or without installing monitoring software on clients. This is done because active measurements affect (and are affected by) network traffic. The passive method includes creating a Wi-Fi network scenario using ns2 simulator. The wireless frame traces are captured by sniffer, which are then analysed to get information about interference relations. Fig. 1 shows the overview of the approach. Fig.1 Overview of approach One way of estimating interference among links in a wireless network can be described informally as below: If a set of wireless links is given, determining whether (and by how much) their aggregate throughput will decrease in two cases. First, when all the links are active simultaneously and second, when they are active individually. Comparing both these cases will lead to the conclusion [5]. Interference is considered as degradation in performance or disruption of communication. Interference impacts the sender by reducing its maximum sending rate, and it impacts the receiver by reducing the probability of receiving a packet successfully by causing collisions [4]. Fig. 2 shows the sender-side interference and receiver-side interference in the transmission from two senders. Fig. 2 Transmission from two senders [6] The packet trace is analysed to infer about the interference relations in terms of probability of deferral and probability of collision. In wireless networks, interference is better expressed interms of probabilities because of the inherent fluctuation ofthe signal power due to fading effects and probabilisticdependency of error rates with signal to interference plusnoise ratio (SINR). Therefore, sender-side interference is expressed in terms of probability of deferral [6]. II. RELATED WORK Interference can be readily measured by placing saturated traffic on two links simultaneously and measuring the aggregate throughput. The amount of interference is indicated by the decrease in throughput due to the interference from the other transmission. This approach is done with few measurements Copyright to IJARCCE DOI /IJARCCE
2 than required in [5]. Some methods require active measurements as in [7]. The other methods follow some modelling steps to reduce the number of measurements. The approach followed is 1) measure Received Signal Strength(RSS) on each link by broadcast transmission of beacons, 2) carry out a profiling study describing the deferral and packet capture behaviour, 3) develop a suitable MAC-layer model. The above steps lead to the estimation of interference between active links and link capacities in presence of interfering traffic [6]. Charles Reis, et al. [8] present practical models for physical layer behaviours of packet reception and carrier sense with interference in static wireless networks. The inputs to these models are measurements from a real network. The basic idea is to perform measurements in an N-node network with N trials. Each sender transmits in turn and receiver s measure RSSI values and packet counts which are easily achievable with the help of wireless cards. The low-level models for packet reception and carrier sense are formulated by considering to the conventional idea of SINR (signal to interference plus noise ratio). The characteristics are investigated, both in a controlled setting with attenuators built on a network. Packet delivery and interference are predicted by the models for different sets of transmitters with similar node placements. Jitendra Padhye, et.al [5] proposes a simple empirical estimation methodology that can predict pairwise interference using few measurements. This method can be applied to any wireless network having omnidirectional antennas. The metrics defined in this paper are Link Interference Ratio (LIR) and Broadcast Interference Ratio (BIR). LIR is defined to be the ratio of aggregate throughput of the links when they are active simultaneously, to their aggregate throughput when they are active individually. This metric takes values between 0 and 1. The value of LIR when 1 indicates that the links do not interfere because the aggregate throughput does not decrease inspite of both the links being active at the same time. BIR is the ratio of the combined delivery rates to the individual delivery rate i.e. the total delivery rate with a pair of nodes as the sender to the delivery rate with a single node as the sender. The supposition is that the BIR is a good approximation of LIR. Lili Qui, et.al [9] develops a general model in the presence of interference from other nodes in the network which estimates the throughput between arbitrary pairs of nodes. The measurements required for the model are taken from the underlying network to be more accurate compared to the abstract RF propagation model. The proposed model in this paper consists of three components - a) An N-node Markov model, b) A model of packet-level loss rates, c) Sender and receiver model with unicast transmissions. The model in this paper takes RF profile and traffic demands as inputs and provides the sending and receiving rates of each node as output. The concept of one-hop traffic is focused in this paper, which is the traffic sent over only one hop and not routed further. A. Problem statement III. METHODOLOGY In networks, interference can occur either at the senderside or at receiver side. The sender-side interferenceleads to delay of the transmission due to carrier sensing. It also reduces the sender s sending capacity by being in its carrier sense range. In case of receiver-side interference, overlapped packet transmissions cause collisions at the receiver. This results in retransmission. Both the cases require the sender to go through a backoff period in addition, when the medium is sensed idle which leads to decrease in the throughput capacity of the network [6]. B. Objectives To attain the objective of estimating the interference relations between nodes, the following goal has to be met. The goal is to 1) identify instances where a pair of nodes attempt to transmit simultaneously, and 2) infer the deferral behavior of node during such instances. C. Approach The basic approach consists of modeling the MAClayer operations of two sender nodes in the network via a Markov chain. The parameters of this chain i.e. the state transition probabilities are estimated from the trace using the method based on Hidden Markov Model. These parameters can help to conclude about the deferral probabilities. The MAC-layer operations of each sender node (say X or Y) can be modelled via a Markov chain. A sender node, say X, is found in one of the following four states - idle, backoff, defer, and transmit. The essence of the MAC protocol lies in these four states. Fig. 3 shows state transition diagram for a single sender. CS = 0 (CS =1) means that the carrier is sensed idle (busy). Q = 0 (Q =1) means that the interface packet queue is empty (nonempty). The interframe spacing s (e.g., DIFS) are purposely ignored to keep the chain simple. In the rest of the paper, the four states are denoted as I, B, D, and T for the sake of simplicity [6]. Fig. 3 State transition diagram for a single sender [6] Since the state transitions of the Markov chain for a given sender is impacted by the transmissions from other nodes, a Markov model of a single sender is not enough to get the complete picture of the network behavior. Instead, a combined Markov model needs to be considered. Since the focus is mainly on determining the pair wise interference relationships, a combined Markov chain for only a pair of nodes, say X and Y is considered. Each state in this Markov chain is a two-tuple consisting of the states of X and Y. For example, the state where X transmits and Y defers would be (T, D). Out of 16 possible states in theory, five states are not legal (e.g., [D, D], [D, B] etc.), leaving 11 possible states [6]. Fig. 4 shows the combined Markov chain for two nodes. The state transition probabilities between certain states in this Markov chain are determined by the deferral probabilities Copyright to IJARCCE DOI /IJARCCE
3 between X and Y. For example, transition probabilities from state (B,B) to state (T,D) or (T,B) would depend on deferral probability of Y with respect to X. This can be explained with the help of an example. Assume that Y carrier senses X (or Y can sense X s transmission) perfectly. Then when X moves from B to T state (i.e., starts transmitting as soon as the backoff interval is over), Y must also move from B to D as it defers to X s transmission by freezing its backoff countdown timer. If instead Y never carrier senses X, it will remain in the B state. The deferral probability of X and Y depends on the number of instances when either of the nodes moves to D state [6]. Fig. 4 Markov model of the combined MAC layer behaviour of two nodes [6] The state transition probabilities of the combined Markov chain depend on the deferral behaviour between the two nodes under consideration. Thus, if the unknown state transition probabilities are learned, the deferral relations are got as a result. The states of the Markov chain are not directly visible in the trace. Instead a set of observation symbols are visible. Four observation symbols are possible in the trace depending on whether X or Y transmits: i: neither X, nor Y transmitting x: X transmits y: Y transmits xy: both X and Y transmit Each of the 11 states in this Markov chain is mapped to one of the four observation symbols. This mapping is not unique as more than one state can map to the same observation symbol. For example, both states (I, I) and (B, B) map to the symbol i. Similarly, both (B,T) and (D,T) map to symbol y. Each packet in the packet trace is time stamped with the arrival time at the sniffer along with other information including the id of the sender, size of the packet, and the rate at which it wastransmitted. This information in the trace is parsed to obtain the sequence of observation symbols for the two senders under consideration [6]. D. Interference relations Transitions into any state with a defer component (i.e., states such as (D, *) and (*, D) indicate interference. Similarly, the absence of interference is indicated by transitions into any state of the set {(B, T) (T, B) (T, T)}. Thus the sender side interference can be interpreted as the total probability of transition into the interfering states. The deferral probability, p d, is given by- Equation 1 captures the probability of being in the interfering states when one of the two nodes is transmitting. A symmetric link is assumed in this case between a node pair [6]. Collisions due to the receiver-side interference can be detected by tracking retransmissions in the trace. The retransmitted packets can be identified with the help of the retransmit bit in the frame header. A retransmitted frame, say R, can be correlated back to the original frame, say P, that has not been received correctly as both these frames carry the same sequence number. A potential cause of collision is overlapping of P with any frame S, sent by a different sender. If P does not overlap with any other frame, the packet loss is due to wireless channel errors rather than collisions. Sufficient statistics need to be built up to determine receiver-side interference because of the probabilistic nature of packet capture. This is because frames like S and P even when overlapping may not always result in a collision. Thus, the receiver-side interference between two links or the probability of collision pc can be determined as the ratio of the collision count and the overlapped-frame count [6]. IV. SIMULATION AND RESULTS Simulation is carried out with the help of Network simulator version 2.34 and Fedora as the operating system. The simulation parameters are shown in Table wireless scenarios is created wherein 50 nodes are considered. Sniffer is used which captures the traffic trace. Evaluation is carried out by comparing the technique of this paper with profile [7] and window based schemes [6] used in the past. TABLE I SIMULATION PARAMETERS Parameters Values Terrain area 1000 X 1000 No. of nodes 50 Energy 100 joules Data rate 2 Mbps Packet size 512 bytes Simulation time 200 Traffic is created using CBR as the application traffic and the transport agent used is UDP. The performance metrics are as follows: A. Packet Delivery Ratio The packet delivery ratio (PDR) is defined as a ratio of numbers of data packets reached to target over the network to number of packets generated. A high packet delivery ratio indicates that the numbers of lost packets are less. Fig. 5 demonstrates that the lost packets for HMM method are less compared to the profile and window based scheme. As a result, the receiver-side interference is low for HMM method. Copyright to IJARCCE DOI /IJARCCE
4 Fig. 7 shows the throughput of the PMIWN_HMM method to be high, compared to the profile and window method. Better throughput indicates that the interference is less. D. Routing overhead It refers to the data bits added to user-transmitted data, for carrying routing information and error correcting and operational instructions. The value of routing overhead in the protocol should be low. Fig. 8 shows that the routing overhead for the HMM method is minimum compared to the profile and window schemes. Fig. 5. PDR v/s No. of interval B. Probability of deferral (p d ) This parameter indicates about the delayed transmission of the sender node. Fig. 6. Scenario v/s Probability of deferral It essentially captures the probability of being in the interfering states when one of the two nodes is transmitting. Thus, the probability of deferral should be low. As the probability of deferral is low, sender-side interference is less with HMM method compared to profile and window based scheme. Fig. 6 shows graph of probability of deferral for different scenarios. C. Throughput Throughput is defined as the in data packets received by sink nodes to time from first packets generated at a source to last packet received by sink nodes. The greater value of throughput states superior performance. Fig. 8. No. of interval v/s routing overhead V. CONCLUSION The estimation of interference in an network is carried out with the help of hidden Markov model. The estimation of deferral probability at the sender-side plays a major role in inferring the interference in the network links. The advantage of this technique is that it is passive and does not disturb the live network. The performance metrics show that the technique used in this paper is effective compared to the profile and window schemes. There is indeed some limitation of the technique because the deferral behavior is estimated assuming only pairwise interference and has ignored physical interference arguing that the improvement in accuracy is relatively minor. Moreover, interference relationship can be used for efficient network design and capacity allocation. This interference can contribute to the total physical interference in the network which can increase the user experience. ACKNOWLEDGMENT I am indeed thankful to my guide Prof. M. M. Wankhade for her able guidance to complete this paper. I extend my special thanks to Head of Department of Electronics and Telecommunications Dr. M. B. Mali who extended the preparatory steps of this paper-work. I am also thankful to the Principal Dr. S. D. Lokhande, Sinhgad College of Engineering for his valued support and faith on me. Fig. 7. Throughput v/s no. of interval Copyright to IJARCCE DOI /IJARCCE
5 REFERENCES [1] K. Jain, J. Padhye, V. N. Padmanabhan, and L. Qiu,. Impact of interference on multi-hop wireless network performance, in Mobi Com, [2] A. Raniwala and T. Chiueh. Architecture and algorithms for an IEEE based multi-channel wireless mesh network, in IEEE INFOCOM, Mar [3] D. De Couto, D. Aguayo, J. Bicket, and R. Morris, Ahigh-throughput path metric for multi-hop wireless routing, in MobiCom, Sept [4] A. Kashyap, S. Ganguly, and S. R. Das, Characterizing Interference in Wireless Mesh Networks unpublished. [5] J. Padhye, S. Agarwal, V. Padmanabhan, L. Qiu, A. Rao, and B. Zill, Estimation of Link Interference in Static Multi-Hop Wireless Networks, Proc. Internet Measurement Conf. (IMC), 2005 [6] U. Paul, A. Kashyap, R. Maheshwari, and S. R. Das, Passive Measurement of Interference in WiFi networks with Application in Misbehavior Detection, in IEEE Transactions on Mobile Computing, Vol. 12, No.3, March 2013 [7] A. Kashyap, S. Ganguly, and S.R. Das, A Measurement-Based Approach to Modeling Link Capacity in Based Wireless Networks, Proc. ACM MobiCom, 2007 [8] C. Reis, R. Mahajan, M. Rodrig, D. Wetherall, and J. Zahorjan, Measurement-Based Models of Delivery and Interference in Static Wireless Networks, in Proc. ACM SIGCOMM, 2006 [9] L. Qiu, Y. Zhang, F. Wang, M.K. Han, and R. Mahajan, A General Model of Wireless Interference, Proc. ACM MobiCom, [10] A.P. Jardosh, K.N. Ramachandran, K.C. Almeroth, and E.M. Belding- Royer, Understanding Congestion in IEEE b Wireless Networks, Proc. ACM SIGCOMM, 2005 [11] M. Rodrig, C. Reis, R. Mahajan, D. Wetherall, and J. Zahorjan, Measurement-Based Characterization of in a Hotspot Setting, Proc. ACM SIGCOMM, Copyright to IJARCCE DOI /IJARCCE
Detecting MAC Layer Misbehavior in Wifi Networks By Co-ordinated Sampling of Network Monitoring
Detecting MAC Layer Misbehavior in Wifi Networks By Co-ordinated Sampling of Network Monitoring M.Shanthi 1, S.Suresh 2 Dept. of Computer Science and Engineering, Adhiyamaan college of Engineering, Hosur,
CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs)
CS6956: Wireless and Mobile Networks Lecture Notes: //05 IEEE 80. Wireless Local Area Networks (WLANs) CSMA/CD Carrier Sense Multi Access/Collision Detection detects collision and retransmits, no acknowledgement,
Detecting MAC Layer Misbehavior in Wi-Fi Networks by Co-ordinated Sampling of Network Monitoring
Detecting MAC Layer Misbehavior in Wi-Fi Networks by Co-ordinated Sampling of Network Monitoring G. Premkumar 1, C.V inoth 2, R. Srinivasan 3 Dept. of IT, PSV College of Engineering and Technology, Krishnagri,
Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction
Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit
Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks
Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks 1 Mr. Praveen S Patil, 2 Mr. Rabinarayan Panda, 3 Mr. Sunil Kumar R D 1,2,3 Asst. Professor, Department of MCA, The Oxford College of Engineering,
Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation
Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation Changsu Suh, Young-Bae Ko, and Jai-Hoon Kim Graduate School of Information and Communication, Ajou University, Republic of Korea
Efficient Load Balancing Routing in Wireless Mesh Networks
ISSN (e): 2250 3005 Vol, 04 Issue, 12 December 2014 International Journal of Computational Engineering Research (IJCER) Efficient Load Balancing Routing in Wireless Mesh Networks S.Irfan Lecturer, Dept
IEEE 802.11 Ad Hoc Networks: Performance Measurements
IEEE 8. Ad Hoc Networks: Performance Measurements G. Anastasi Dept. of Information Engineering University of Pisa Via Diotisalvi - 56 Pisa, Italy Email: [email protected] E. Borgia, M. Conti, E.
Performance Evaluation of The Split Transmission in Multihop Wireless Networks
Performance Evaluation of The Split Transmission in Multihop Wireless Networks Wanqing Tu and Vic Grout Centre for Applied Internet Research, School of Computing and Communications Technology, Glyndwr
Student, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India
Volume 5, Issue 6, June 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A New Protocol
CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
Algorithms for Interference Sensing in Optical CDMA Networks
Algorithms for Interference Sensing in Optical CDMA Networks Purushotham Kamath, Joseph D. Touch and Joseph A. Bannister {pkamath, touch, joseph}@isi.edu Information Sciences Institute, University of Southern
Figure 1. The Example of ZigBee AODV Algorithm
TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.2, February 2014, pp. 1528 ~ 1535 DOI: http://dx.doi.org/10.11591/telkomnika.v12i2.3576 1528 Improving ZigBee AODV Mesh Routing Algorithm
An Experimental Study of Throughput for UDP and VoIP Traffic in IEEE 802.11b Networks
An Experimental Study of Throughput for UDP and VoIP Traffic in IEEE 82.11b Networks Sachin Garg [email protected] Avaya Labs Research Basking Ridge, NJ USA Martin Kappes [email protected] Avaya Labs Research
A Routing Metric for Load-Balancing in Wireless Mesh Networks
A Routing Metric for Load-Balancing in Wireless Mesh Networks Liang Ma and Mieso K. Denko Department of Computing and Information Science University of Guelph, Guelph, Ontario, Canada, N1G 2W1 email: {lma02;mdenko}@uoguelph.ca
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.
A Wireless Mesh Network NS-3 Simulation Model: Implementation and Performance Comparison With a Real Test-Bed
A Wireless Mesh Network NS-3 Simulation Model: Implementation and Performance Comparison With a Real Test-Bed Dmitrii Dugaev, Eduard Siemens Anhalt University of Applied Sciences - Faculty of Electrical,
PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET USING DIRECTIONAL ANTENNA
International Research Journal of Engineering and Technology (IRJET) e-issn: -00 Volume: 0 Issue: 0 Oct-01 www.irjet.net p-issn: -00 PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET
CSMA/CA. Information Networks p. 1
Information Networks p. 1 CSMA/CA IEEE 802.11 standard for WLAN defines a distributed coordination function (DCF) for sharing access to the medium based on the CSMA/CA protocol Collision detection is not
COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra
DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS
DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate
Routing Analysis in Wireless Mesh Network with Bandwidth Allocation
International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 8958, Volume-2, Issue-3, February 213 Routing Analysis in Wireless Mesh Network with Bandwidth Allocation T.S. Starlin, D.
other. A B AP wired network
1 Routing and Channel Assignment in Multi-Channel Multi-Hop Wireless Networks with Single-NIC Devices Jungmin So + Nitin H. Vaidya Department of Computer Science +, Department of Electrical and Computer
Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh
Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh, Ph.D. [email protected] Mesh 2008, Cap Esterel, France 1 Abstract Abundant hidden node collisions and correlated channel access
A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE 802.11
A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE 802.11 Christian Röhl, Hagen Woesner, Adam Wolisz * Technical University Berlin Telecommunication Networks Group {roehl,
Mobile Computing/ Mobile Networks
Mobile Computing/ Mobile Networks TCP in Mobile Networks Prof. Chansu Yu Contents Physical layer issues Communication frequency Signal propagation Modulation and Demodulation Channel access issues Multiple
II RELATED PROTOCOLS. Dynamic Source Routing (DSR)
ENERGY AWEAR LOAD BALANCING IN MOBILE AD HOC NETWORK Prof. Uma Nagaraj Computer Engineering Maharashtra Academy of Engg. Alandi (D) Pune, India Shwetal Patil (Student) Computer Engineering Maharashtra
A Catechistic Method for Traffic Pattern Discovery in MANET
A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer
Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1
Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1 Ankit Jindal 1, Charanjeet Singh 2, Dharam Vir 3 PG Student [ECE], Dept. of ECE, DCR University of Science &
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,
Seamless Congestion Control over Wired and Wireless IEEE 802.11 Networks
Seamless Congestion Control over Wired and Wireless IEEE 802.11 Networks Vasilios A. Siris and Despina Triantafyllidou Institute of Computer Science (ICS) Foundation for Research and Technology - Hellas
How To Determine The Capacity Of An 802.11B Network
Capacity of an IEEE 802.11b Wireless LAN supporting VoIP To appear in Proc. IEEE Int. Conference on Communications (ICC) 2004 David P. Hole and Fouad A. Tobagi Dept. of Electrical Engineering, Stanford
AN IMPROVED SNOOP FOR TCP RENO AND TCP SACK IN WIRED-CUM- WIRELESS NETWORKS
AN IMPROVED SNOOP FOR TCP RENO AND TCP SACK IN WIRED-CUM- WIRELESS NETWORKS Srikanth Tiyyagura Department of Computer Science and Engineering JNTUA College of Engg., pulivendula, Andhra Pradesh, India.
Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III
Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III CS: 647 Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins
ISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September
Analysis and Implementation of IEEE 802.11 MAC Protocol for Wireless Sensor Networks Urmila A. Patil, Smita V. Modi, Suma B.J. Associate Professor, Student, Student Abstract: Energy Consumption in Wireless
Achieving Load Balancing in Wireless Mesh Networks Through Multiple Gateways
Abstract Achieving Load Balancing in Wireless Mesh Networks Through Multiple Gateways Deepti Nandiraju, Lakshmi Santhanam, Nagesh Nandiraju, and Dharma P. Agrawal Center for Distributed and Mobile Computing,
Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]
IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks
IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks Zhibin Wu, Sachin Ganu and Dipankar Raychaudhuri WINLAB, Rutgers University 2006-11-16 IAB Research Review, Fall 2006 1 Contents
10. Wireless Networks
Computernetzwerke und Sicherheit (CS221) 10. Wireless Networks 1. April 2011 omas Meyer Departement Mathematik und Informatik, Universität Basel Chapter 6 Wireless and Mobile Networks (with changes CS221
Multipath Load Balancing in Multi-hop Wireless Networks
Multipath Load Balancing in Multi-hop Wireless Networks Evan P. C. Jones, Martin Karsten, and Paul A. S. Ward, University of Waterloo, Canada Abstract Multi-hop wireless networks have the potential to
Collision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC
The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?
Cluster-based Multi-path Routing Algorithm for Multi-hop Wireless Network
International Journal of Future Generation Communication and Networking 67 Cluster-based Multi-path Routing Algorithm for Multi-hop Wireless Network Jie Zhang, Choong Kyo Jeong, Goo Yeon Lee, Hwa Jong
Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN
Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN Rachana Ballal 1, S.Girish 2 4 th sem M.tech, Dept.of CS&E, Sahyadri College of Engineering and Management, Adyar, Mangalore, India
Load Balancing Routing in Multi-Channel Hybrid Wireless Networks with Single Network Interface
Load Balancing Routing in Multi-Channel Hybrid Wireless Networks with Single Network Interface Jungmin So Nitin H. Vaidya Coordinated Science Laboratory, University of Illinois at Urbana-Champaign Email:
{p t [D1t(p t ) + D2t(p t )]}. Proposition 1. With a dynamic centralized pricing mechanism, p cen
On Profitability and Efficiency of Wireless Mesh Networks Fang Fang, College of Business Administration, Cal State San Marcos, [email protected]; Lili Qiu, Department of Computer Science, The Univ of
SJBIT, Bangalore, KARNATAKA
A Comparison of the TCP Variants Performance over different Routing Protocols on Mobile Ad Hoc Networks S. R. Biradar 1, Subir Kumar Sarkar 2, Puttamadappa C 3 1 Sikkim Manipal Institute of Technology,
Performance Evaluation of Wired and Wireless Local Area Networks
International Journal of Engineering Research and Development ISSN: 2278-067X, Volume 1, Issue 11 (July 2012), PP.43-48 www.ijerd.com Performance Evaluation of Wired and Wireless Local Area Networks Prof.
A NOVEL RESOURCE EFFICIENT DMMS APPROACH
A NOVEL RESOURCE EFFICIENT DMMS APPROACH FOR NETWORK MONITORING AND CONTROLLING FUNCTIONS Golam R. Khan 1, Sharmistha Khan 2, Dhadesugoor R. Vaman 3, and Suxia Cui 4 Department of Electrical and Computer
A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks
1 A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks Yang Song, Bogdan Ciubotaru, Member, IEEE, and Gabriel-Miro Muntean, Member, IEEE Abstract Limited battery capacity
Voice Service Support over Cognitive Radio Networks
Voice Service Support over Cognitive Radio Networks Ping Wang, Dusit Niyato, and Hai Jiang Centre For Multimedia And Network Technology (CeMNeT), School of Computer Engineering, Nanyang Technological University,
Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms
Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms Kirill Krinkin Open Source and Linux lab Saint Petersburg, Russia [email protected] Eugene Kalishenko Saint Petersburg
CS263: Wireless Communications and Sensor Networks
CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET MR. ARVIND P. PANDE 1, PROF. UTTAM A. PATIL 2, PROF. B.S PATIL 3 Dept. Of Electronics Textile and Engineering
Routing in Multi-Channel Multi-Interface Ad Hoc Wireless Networks
Routing in Multi-Channel Multi-Interface Ad Hoc Wireless Networks Technical Report, December 4 Pradeep Kyasanur Dept. of Computer Science, and Coordinated Science Laboratory, University of Illinois at
Dynamic Load Balance Algorithm (DLBA) for IEEE 802.11 Wireless LAN
Tamkang Journal of Science and Engineering, vol. 2, No. 1 pp. 45-52 (1999) 45 Dynamic Load Balance Algorithm () for IEEE 802.11 Wireless LAN Shiann-Tsong Sheu and Chih-Chiang Wu Department of Electrical
Lecture 17: 802.11 Wireless Networking"
Lecture 17: 802.11 Wireless Networking" CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Lili Qiu, Nitin Vaidya Lecture 17 Overview" Project discussion Intro to 802.11 WiFi Jigsaw discussion
RT-QoS for Wireless ad-hoc Networks of Embedded Systems
RT-QoS for Wireless ad-hoc Networks of Embedded Systems Marco accamo University of Illinois Urbana-hampaign 1 Outline Wireless RT-QoS: important MA attributes and faced challenges Some new ideas and results
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
A Well-organized Dynamic Bandwidth Allocation Algorithm for MANET
A Well-organized Dynamic Bandwidth Allocation Algorithm for MANET S.Suganya Sr.Lecturer, Dept. of Computer Applications, TamilNadu College of Engineering, Coimbatore, India Dr.S.Palaniammal Prof.& Head,
An Investigation of the Impact of Signal Strength on Wi-Fi Link Throughput through Propagation Measurement. Eric Cheng-Chung LO
An Investigation of the Impact of Signal Strength on Wi-Fi Link Throughput through Propagation Measurement Eric Cheng-Chung LO A dissertation submitted to Auckland University of Technology in partial fulfillment
MAC Scheduling for High Throughput Underwater Acoustic Networks
MAC Scheduling for High Throughput Underwater Acoustic Networks Yang Guan Chien-Chung Shen Department of Computer and Information Sciences University of Delaware, Newark, DE, USA {yguan,cshen}@cis.udel.edu
Performance Analysis of the IEEE 802.11 Wireless LAN Standard 1
Performance Analysis of the IEEE. Wireless LAN Standard C. Sweet Performance Analysis of the IEEE. Wireless LAN Standard Craig Sweet and Deepinder Sidhu Maryland Center for Telecommunications Research
Packet Queueing Delay in Wireless Networks with Multiple Base Stations and Cellular Frequency Reuse
Packet Queueing Delay in Wireless Networks with Multiple Base Stations and Cellular Frequency Reuse Abstract - Cellular frequency reuse is known to be an efficient method to allow many wireless telephone
Security in Ad Hoc Network
Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops
LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks
LANs Local Area Networks via the Media Access Control (MAC) SubLayer 1 Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring 2 Network Layer
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification LEKSHMI.M.R Department of Computer Science and Engineering, KCG College of Technology Chennai,
CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006
CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)
Securing MANET Using Diffie Hellman Digital Signature Scheme
Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 [email protected] 2
Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman
1 Wireless Networks Reading: Sec5on 2.8 COS 461: Computer Networks Spring 2011 Mike Freedman hep://www.cs.princeton.edu/courses/archive/spring11/cos461/ 2 Widespread Deployment Worldwide cellular subscribers
IJMIE Volume 2, Issue 7 ISSN: 2249-0558
Evaluating Performance of Audio conferencing on Reactive Routing Protocols for MANET Alak Kumar Sarkar* Md. Ibrahim Abdullah* Md. Shamim Hossain* Ahsan-ul-Ambia* Abstract Mobile ad hoc network (MANET)
APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM
152 APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM A1.1 INTRODUCTION PPATPAN is implemented in a test bed with five Linux system arranged in a multihop topology. The system is implemented
Wireless LAN Concepts
Wireless LAN Concepts Wireless LAN technology is becoming increasingly popular for a wide variety of applications. After evaluating the technology, most users are convinced of its reliability, satisfied
Simulation-Based Comparisons of Solutions for TCP Packet Reordering in Wireless Network
Simulation-Based Comparisons of Solutions for TCP Packet Reordering in Wireless Network 作 者 :Daiqin Yang, Ka-Cheong Leung, and Victor O. K. Li 出 處 :Wireless Communications and Networking Conference, 2007.WCNC
802.11 Wireless LAN Protocol CS 571 Fall 2006. 2006 Kenneth L. Calvert All rights reserved
802.11 Wireless LAN Protocol CS 571 Fall 2006 2006 Kenneth L. Calvert All rights reserved Wireless Channel Considerations Stations may move Changing propagation delays, signal strengths, etc. "Non-transitive"
The Monitoring of Ad Hoc Networks Based on Routing
The Monitoring of Ad Hoc Networks Based on Routing Sana Ghannay, Sonia Mettali Gammar, Farouk Kamoun CRISTAL Laboratory ENSI, University of Manouba 21 Manouba - Tunisia {chnnysn,sonia.gammar}@ensi.rnu.tn,
Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR
Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR GUIDOUM AMINA University of SIDI BEL ABBES Department of Electronics Communication Networks,
Real-Time Traffic Support in Heterogeneous Mobile Networks
Real-Time Traffic Support in Heterogeneous Mobile Networks Yuan Sun Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara {suny, ebelding}@cs.ucsb.edu Xia Gao
A MAC Protocol for Mobile Ad Hoc Networks Using Directional Antennas
A MAC Protocol for Mobile Ad Hoc Networks Using Directional Antennas A. Nasipuri, S. Ye, J. You, and R. E. Hiromoto Division of Computer Science The University of Texas at San Antonio San Antonio, TX 78249-0667
Security Scheme for Distributed DoS in Mobile Ad Hoc Networks
Security Scheme for Distributed DoS in Mobile Ad Hoc Networks Sugata Sanyal 1, Ajith Abraham 2, Dhaval Gada 3, Rajat Gogri 3, Punit Rathod 3, Zalak Dedhia 3 and Nirali Mody 3 1 School of Technology and
TCP in Wireless Networks
Outline Lecture 10 TCP Performance and QoS in Wireless s TCP Performance in wireless networks TCP performance in asymmetric networks WAP Kurose-Ross: Chapter 3, 6.8 On-line: TCP over Wireless Systems Problems
An Experimental Performance Analysis of MAC Multicast in 802.11b Networks for VoIP Traffic
An Experimental Performance Analysis of MAC Multicast in 82.11b Networks for VoIP Traffic Martin Kappes DoCoMo Euro-Labs Landsberger Str. 312, 8687 Munich, Germany [email protected] Keywords: IEEE
CELL BREATHING FOR LOAD BALANCING IN WIRELESS LAN
International Journal of Wireless Communications and Networking 3(1), 2011, pp. 21-25 CELL BREATHING FOR LOAD BALANCING IN WIRELESS LAN R. Latha and S. Radhakrishnan Rajalakshmi Engineering College, Thandalam,
AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK
Abstract AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK Mrs. Amandeep Kaur, Assistant Professor, Department of Computer Application, Apeejay Institute of Management, Ramamandi, Jalandhar-144001, Punjab,
Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks
Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks Ayman Wazwaz, Computer Engineering Department, Palestine Polytechnic University, Hebron, Palestine, [email protected] Duaa sweity
CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012
CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012 Important: The solutions to the homework problems from the course book have been provided by the authors.
QoS issues in Voice over IP
COMP9333 Advance Computer Networks Mini Conference QoS issues in Voice over IP Student ID: 3058224 Student ID: 3043237 Student ID: 3036281 Student ID: 3025715 QoS issues in Voice over IP Abstract: This
Cross Layer TCP Congestion Control Load Balancing Technique in MANET
Cross Layer TCP Congestion Control Load Balancing Technique in MANET Nidhi Shukla 1, Neelesh Gupta 2, Naushad Parveen 3 1 M.Tech Scholar (ECE), 2 Prof & Head (ECE), 3 Asst. Prof. ( ECE), Department of
Protocolo IEEE 802.15.4. Sergio Scaglia SASE 2012 - Agosto 2012
Protocolo IEEE 802.15.4 SASE 2012 - Agosto 2012 IEEE 802.15.4 standard Agenda Physical Layer for Wireless Overview MAC Layer for Wireless - Overview IEEE 802.15.4 Protocol Overview Hardware implementation
A TCP-like Adaptive Contention Window Scheme for WLAN
A TCP-like Adaptive Contention Window Scheme for WLAN Qixiang Pang, Soung Chang Liew, Jack Y. B. Lee, Department of Information Engineering The Chinese University of Hong Kong Hong Kong S.-H. Gary Chan
