WiSlow: A Wi-Fi Network Performance Troubleshooting Tool for End Users
|
|
|
- Mabel Summers
- 10 years ago
- Views:
Transcription
1 WiSlow: A Wi-Fi Network Performance Troubleshooting Tool for End Users Kyung-Hwa Kim, Hyunwoo Nam and Henning Schulzrinne Department of Computer Science, Columbia University, New York, NY Department of Electrical Engineering, Columbia University, New York, NY Abstract Slow Internet connectivity is often caused by poor Wi-Fi performance. The main reasons of such performance degradation include channel contention and non-wi-fi interference. Although these problem sources can be easily removed in many cases once they are discovered, it is difficult for end users to identify the sources of such interference. We investigated the characteristics of different sources that can degrade Wi-Fi performance, and developed WiSlow, a software tool that diagnoses the root causes of poor Wi-Fi performance using user-level network probes, and leveraging peer collaboration to identify the physical location of these causes. WiSlow uses two main methods: packet loss analysis and 8. ACK number analysis. The accuracy of WiSlow exceeds 9% when the sources are close to Wi-Fi devices. Also, our experiment proves that the collaborative approach is feasible for determining the relative location of an interfering device. I. INTRODUCTION Today, it is common for households to put together home networks with a private wireless router (access point) that supports multiple wireless devices. However, the increasing usage of wireless networks inevitably results in more contention and interference, which causes unsatisfactory Wi-Fi performance. Furthermore, non-wi-fi devices such as microwave ovens, cordless phones, and baby monitors severely interfere with Wi- Fi networks because these devices operate on the same.4 GHz spectrum as 8.b/g []. Although these problem sources can be easily removed in many cases (e.g., by relocating the interfering device, choosing a different channel, or moving to the 5 GHz band), it is difficult for technically non-savvy users to even notice the existence of channel contention or interference caused by non-wi-fi devices (non-wi-fi interference). Instead, properly working routers or service providers are frequently misidentified as the culprit while the actual root cause remains unidentified. However, isolating the root causes of poor Wi-Fi performance is nontrivial, even for a network expert, because they show very similar symptoms at the user level, and special devices are required in order to investigate the lower layers of the protocol stack. We introduce WiSlow ( Why is my Wi-Fi slow? ), a software tool that diagnoses the root causes of poor Wi-Fi performance with user-level network probes and leverages peer collaboration to identify their physical locations. In other words, the goal of this tool is to report the problem source to users such as It appears that a baby monitor located close to your router is interfering with your Wi-Fi network. We focus on building software that does not require any additional spectrum analysis hardware (unlike, e.g., WiSpy [], AirSleuth [3], or AirMaestro [4]). In addition, WiSlow does /4/$3. c 4 IEEE not depend on a specific network adapter such as the Atheros chipsets, which were used to achieve similar goals in other studies [5], [6]. These features enable WiSlow to run on common end-user machines. First, we investigate behaviors of 8. networks such as retries, frame check sequence (FCS) errors, packet loss, and bit rate adaption, which can be observed on ordinary operating systems. Our experimental results show that the statistical patterns of the above variables vary depending on the problem sources. For example, with the interference that caused by non-wi-fi devices, we observed a greater number of retried packets, fewer FCS errors, and larger variations in the bit rates compared to channel contention. Correlating these variables, we can categorize the sources of performance problems into several distinct groups. In addition, the non-wi-fi devices such as baby monitors, cordless phones, and microwave ovens show different patterns when the number of UDP packets and 8. ACKs are plotted over time. Based on these observations, we developed two methods: packet loss analysis and 8. ACK pattern analysis. These methods successfully distinguish channel contention from non-wi-fi interference and infer the product type of the interfering device. We believe that this technology will be useful to end users since it can inform them of what needs to be done in order to improve the performance of their networks whether to change the Wi-Fi channel or remove a device that is emitting the interference. In non-wi-fi interference scenarios, another goal is to identify the physical location of the source of interference. Although it is difficult to pinpoint the exact physical location of the source without a spectrum analyzer or additional support of wireless access points (APs), we could infer the relative location of the problem source by collaborating with other end users connected to the same wireless network. WiSlow collects probing results from peers and determines whether others observe the interference. If all the machines observe the same interference, it is highly likely that the problematic source is close to the wireless AP. However, if only one of the peers observes the interference, the source is likely to be located close to that peer. Our experimental results clearly show that this approach is feasible. In summary, WiSlow (i) distinguishes channel contention from non-wi-fi interference, (ii) infers the product type of the interfering device (e.g., a microwave oven, cordless phone, or baby monitor) by analyzing network packets, and finally (iii) points out the approximate location of the source of interference by exploiting user collaboration. We evaluated WiSlow with various interference sources and it showed quite high diagnostic accuracy. It also proved that our approach locating the interference source is feasible.
2 The remainder of this paper is structured as follows. In Section II, we describe the common sources of Wi-Fi performance degradation. In Section III, we discuss the restrictions of an end user s environment and how WiSlow attempts to overcome them. Section IV explains the detailed methods of WiSlow and Section VI evaluates our approach. II. BACKGROUND Common sources that cause Wi-Fi performance degradation include: Wi-Fi channel contention: degradation due to a channel crowded by multiple Wi-Fi devices that compete to transmit data through an AP. It also includes interference due to nearby APs that are using the same channel or adjacent channels. Non-Wi-Fi interference: interference due to non-wi-fi devices that use the same.4 GHz spectrum as the 8.b/g networks. The devices include microwave ovens, cordless phones, baby monitors, and Bluetooth devices. Weak signal: when the signal is not strong enough due to distance or obstacles, packets can be lost or corrupted. Although the extent varies, all the above sources result in severe performance degradation some of them even drop the TCP/UDP throughput to almost zero [5]. In this study, we focus on Wi-Fi channel contention and common non-wi-fi interference sources. III. CHALLENGES In this section, we describe the reasons why analyzing wireless networks is difficult for end users. A. Inaccurate RSSI and SINR measurements Received signal strength indication (RSSI) and Signal-tointerference-plus-noise ratio (SINR) are generally considered to be the key factors that indicate the quality of a wireless link. However, according to Vlavianos et al. [7], RSSI inaccurately captures the link quality and it is difficult to accurately compute SINR with commodity wireless cards. We also observed a similar result when monitoring RSSI and SINR values during our experiments. We placed various types of interference sources close to the AP and measured the values on a general client machine. In Figure a, RSSI values with a baby monitor were higher than those obtained from a nointerference environment, which should be reversed when the measured UDP throughput is considered. In Figure b, the SINR values with a cordless phone were also higher than those obtained from a no-interference case. Furthermore, these results varied for each experiment. Based on this observation, we conclude that RSSI and SINR values captured by a general end-user s wireless card do not correctly represent the level of interference. B. No specific network adapter or driver We do not make any assumptions about the specific network adapters or drivers that end users may have. Some Atheros chipsets, which are widely used in research studies, support a spectral scan that provides a spectrum analysis of multiple frequency ranges. Rayanchu et al. developed Airshark [5] and WiFiNet [6] leveraging this feature to distinguish non-wi-fi interferers using a commodity network card without We used a MacBook Pro 3 (network card: AirPort Extreme, chipset: Broadcom BCM43 series) in this measurement RSSI (dbm) SINR (dbm) (a) RSSI measurement (b) SINR measurement Fig. : The s of RSSI and SINR values specialized hardware. Although this approach achieved quite high accuracy in identifying the interfering devices, to the best of our knowledge, only a few chipsets (e.g., Atheros) currently provide this feature. In addition, we failed to discover references to this feature for any operating system (OS) other than Linux. Since there are hundreds of products that use a different chipset and/or OS, it is impractical to assume that a general end user has this specific setup. Therefore, we focus instead on analyzing the quality of a link observing useraccessible packets such as UDP and 8. packets. Because the mechanisms of these protocols are not significantly different for many Wi-Fi devices, we believe that WiSlow s userlevel approach can help a wider range of end users. C. Lack of monitoring data Another restriction in the end-user environment is the lack of a monitoring history. If we assume that we have been monitoring the machine up to the moment when a performance problem happens, the diagnosis will be easier because we can obtain several important clues such as the average quality of the link, the time when the problem started, and whether it has happened in the recent past. However, although the overhead of network monitoring is not heavy on modern machines, it is difficult to expect that end users will continuously run such a tool. The more common scenario is that a user launches a troubleshooting tool like WiSlow and requests a diagnostic only after he/she has noticed a severe performance problem. Therefore, we need to design the tool assuming little or no previous monitoring data. In the next section, we explain how WiSlow estimates the problem source without knowing the baseline quality of the network. IV. WISLOW In this section, we elaborate on the details of probing methods. First, to investigate the behavior of Wi-Fi networks in each problem scenario, we artificially inject problems while transmitting UDP packets between a client (laptop) and an AP. We capture every packet on the client machine, and then trace the transport layer (UDP), the 8. MAC layer, and some user-accessible 8. PHY layer information to ascertain each problematic scenario s interference levels and characteristics. To capture 8. packets, WiSlow uses monitor mode of wireless adapters. It provides the Radiotap [8] header, which is a standard for 8. frame information. The headers are used to extract the lower layer information such as FCS errors and bit rates. Sniffing the wireless packets is supported by most Linux and all Mac OS X machines without additional drivers or kernel modification. Therefore, if we can successfully characterize each performance-degrading source by probing the transmitted packets, the same probes will enable WiSlow to identify the problem sources on most platforms. However,
3 The number of retries per KB (a) The of number of 8. retries Available bit rates (Mbit/s) (b) The of available bit rates Fig. : 8. statistics with various interference sources 3 4 The number of FCS errors per KB (c) The of FCS errors it is not always possible to capture wireless packets on some types of OS, e.g., Microsoft Windows [9]. Instead, Windows provides several APIs that report 8. packet statistics to user applications. Those APIs enable WiSlow to run on Windows because they provide all the information that WiSlow must extract from the 8. packets. In the following sections, we explain WiSlow s two main diagnostic methods: packet loss analysis and 8. ACK pattern analysis. A. Method : packet loss analysis First, we found that each problem source varies in their packet loss characteristics, represented by three statistics: ) the number of 8. retries, ) the available bit rates, and 3) the number of FCS errors. In each experiment, we measured these values on a client laptop while downloading UDP packets from an AP. The values were recorded for each KB of UDP packets received. We repeated this experiment for different scenarios including channel contention and non-wi-fi interference. To simulate channel contention, we set up several laptops sending bulk UDP packets to the AP. To generate non- Wi-Fi interference, we placed each interfering device (baby monitors, microwave ovens, and cordless phones) close to the AP (about cm) and measured the effect on the client placed at various distances from the AP. (In this study, we did not consider the combined interference of multiple devices.) Note that the client downloaded MB of UDP packets for each experiment to collect a statistically meaningful amount of samples, but when actually probing on an end user s machine, WiSlow only needs to transmit 5 MBytes of UDP packets to identify the root cause, which takes a reasonable amount of time ( 3 s). Retry and available bit rate: Since an 8. retry and bit rate reduction are both initiated by a packet loss, their temporal changes are closely correlated; when a packet loss occurs, the bit rate decreases by the 8. rate adaptation algorithm []. The probability of packet loss then decreases due to the reduced bit rate, which lowers the number of retries. After that, the bit rate gradually increases again owing to the reduced packet loss, which leads to a higher probability of packet loss and retries. In other words, if contention or interference exists, it causes packet losses, and then the bit rate and the number of retried packets repeatedly fluctuate during the subsequent data transmission. Because of this fluctuation, the measured statistics of retries and bit rates do not represent the characteristics of interference sources correctly. Figure a and b shows that the cumulative distribution functions (s) of the values do not distinguish each device except the baby monitor. Frame check sequence errors: Another variable that we trace is the number of FCS errors per byte. In our experiments, we counted the number of FCS errors per KB of data. Intuitively, it can be predicted that non-wi-fi interference introduces more FCS errors than channel contention or a nointerference environment. This is because the packet corruptions are likely to occur more frequently when a medium is noisy. However, in our experiment, it turned out that a large number of FCS errors are not necessarily correlated with severe interference. On the contrary, we often observed that fewer FCS errors occur in a severe interference environment (e.g., interference caused by a baby monitor) than in a nointerference environment (Figure c). This paradox can be explained by the low bit rates in the interference case, which implies that a smaller number of bits are transmitted in the same bandwidth. Consequently, the number of FCS errors per byte alone is not sufficient to characterize interference sources. ) Packet loss estimation: As we stated above, although the number of retries, bit rate, and FCS errors are affected by the current state of the wireless network, they often show very different statistics for each experiment set. We conjecture several reasons; the environment is not exactly the same in every experiment, the occurrence of packet loss is probabilistic rather than deterministic, and the individual variables fluctuate over time, affecting each other and leading to different statistics for a certain period of time. Therefore, it would be more reasonable to compare the combinations of these statistics together instead of investigating each variable individually. There are two cases that can cause a retry. First, a packet was not delivered, i.e., it was lost. Second, a packet was delivered but it had an FCS error. We can estimate the number of packets lost (the first case) by subtracting the number of FCS errors from the number of retries (Eq. ). N P acketloss = N Retries N F CSerrors () We found that this estimated number of packet losses represents the level of interference more reliably than the individual statistics of retries, bit rates and FCS errors. In other words, the number of packet losses provides relatively consistent results in repeated experiments, while the others varied for each experiment. Figure 3 shows that the of the estimated number of packet loss clearly distinguishes each device compared to the s in Figure. It can be seen that a baby monitor causes the most severe amount of packet loss while cordless phones cause a relatively small amount of packet loss. Since baby monitors send video and audio data at the same time, they use more bandwidth than cordless
4 The number of packet loss per KB Fig. 3: The s of the estimated packet loss Packet loss Available bit rates (Mbit/s) (a) Different interference sources (b) The same device, a baby monitor, in different environments Fig. 4: The distribution of the correlation of bit rates and the estimated packet loss phones that send audio only, thus causing more interference. Channel contention shows less packet loss because of the 8. collision-avoidance functions such as random back-off and RTS/CTS that force each client to occupy the medium in separate time slots. In this case, the degradation of throughput is caused by the shared medium rather than noise from other sources. Furthermore, we found that the correlation between bit rate and the estimated number of packet losses shows clearer differences among various problem sources. In Figure 4a, the majority of the samples from a clean environment are distributed in a healthy zone (higher bit rate and lower packet loss) while the samples of baby monitors and microwave ovens are widely dispersed. WiSlow uses the correlation of these two variables to distinguish the level of interference. As described above, the problem sources each have their own distribution patterns on the scatter plot. However, an end user cannot infer a root cause by simply matching the measured statistics with the results of our experiments. This is because the measurement of a wireless network is highly affected by the client s own environment such as a distance from the AP, signal power, or fading (multi-path and shadowing). In other ex. ex The number of packet loss per KB (a) The estimated number of packet loss ex. ex. 3 4 Euclidean distance, d(bit rate, packet loss) (b) The Euclidean distance between each sample and the mean Fig. 5: The s obtained from two experiments with the same baby monitor in different environment. words, even though they have the same type of problem, the statistics of the measured metrics can vary depending on each end user s own situation. Note that this is the reason why simple measurements such as the higher-layer throughput (e.g., TCP or UDP) or number of 8. retries are not enough to identify the level of interference and the type of interferers. We found that even if the underlying environment changes, the extent of the area over which a set of samples (correlated packet loss and bit rate) are dispersed remains similar if the problem source is the same. Figure 4b shows that even though the two groups of samples from discrete environments are distributed on different spots on the coordinate plane, their extent is similar. Thus, we first quantify how widely the samples are dispersed by calculating the Euclidean distances between each sample and the mean ( p (M x S x ) +(M y S y ), mean = (M x,m y ), sample =(S x,s y )). Figure 5 compares the s obtained from two experiments that were conducted with the same baby monitor in two discrete environments. The s of packet loss estimation (Figure 5a) show different distributions while the s of the Euclidean distances between the samples and the mean show similar distribution (Figure 5b). Therefore, WiSlow can use the s of the Euclidean distances to identify the root causes of network interference. We prepare these s of each problem source in advance, which are obtained from our experiments. Then, WiSlow traces the wireless packets on an end user s machine, generates a of the distances, and compares it to the pre-obtained s of each problem source. For the convenience of identification, we group the problem sources into three groups by the shape of the s: no interferers (group ), light interferers (group ), and heavy interferers (group 3). Each group has its representative s that are determined by multiple experiments (Figure 6). In our data sets, group indicates a no-interference environment, group includes channel contention and cordless phones that use frequency-hopping spread spectrum (FHSS), and group 3 contains microwave ovens and baby monitors. WiSlow examines which representative is the most similar one to the measured on the user s machine. To compare the s, WiSlow uses the two-sample Kolmogorov- Smirnov test (K-S test), a widely used statistical method that tests whether two empirical s obtained from separate experiments have the same distribution []. If the p-value of this test is close to, the two s are likely to come from the same distribution, however, if the p-value is close to, they are likely to come from different distributions. Since the K-S test not only considers the average and variance of the samples but also takes into account the shape of the s, it best fits the purpose of WiSlow where it is used to pick the most similar distribution from multiple data sets. Our evaluation proves that
5 Group Group Group3 5 5 Euclidean distance, d(bit rate, packet loss) Fig. 6: Three groups categorized by the packet loss analysis: ) a nointerference environment, ) contention and FHSS cordless phones, and 3) microwave ovens and baby monitors The number of 8. ACKs Magnitude OFF ON Time (milliseconds) x 4 6 x (a) Time domain Frequency (Hz) (b) Frequency domain Fig. 7: The number of 8. ACKs with interference of a microwave oven the approach explained above successfully distinguishes these groups, minimizing the impact of the end user s underlying environment. B. Method : 8. ACK pattern analysis The first method is able to determine which type of loss pattern a problem source has. However, because multiple problem sources are categorized into each group, we need another method that further narrows down the root causes. In this section, we explain the second method, designed to distinguish several detailed characteristics of non-wi-fi devices such as frequency hopping and duty cycle. WiSlow sends bulk UDP packets to the AP and counts the received 8. ACKs to check the quality of a wireless link within a given period. In order to detect patterns on the scale of milliseconds, we use a very small size of UDP packets ( bytes) that reduces potential delays such as propagation and processing delays, and we transmit as many UDP packets as possible to reduce the intervals between samples. As a result, we received 7 ACKs per millisecond. In the following sections, we describe the results of the above method when performed with various non-wi-fi interferers, and we explain how WiSlow identifies the devices based on the results. ) Duty cycle (microwave ovens): s generate severe interference in almost every channel of the.4 GHz band. We identify this heavy interferer using its duty cycle, which is the ratio of the active duration to the pulse period. It is known that the duty cycle of microwave ovens is 5% and the dwell time is 6.6 ms (6 Hz) []. This implies that it stays in the ON mode (producing microwaves) for the first 8.3 ms and the OFF mode for the next 8.3 ms. This feature can be observed by various means such as using a spectrum analyzer [] or by signal measurement [5]. Our hypothesis was that a user-level probe could also detect this on-off pattern if the network packets were monitored on a millisecond timescale because the packets would be lost only when the interferer was active (on mode). To validate this assumption, we implemented the above method and plotted the number of successfully received 8. ACKs per millisecond. As a result, a clearly perceptible waveform with a 5% duty cycle is observed (Figure 7a); the number of ACKs is over five for the first 8 ms and zero during the next 8 ms. This pattern repeats while the microwave oven is running. This result becomes clearer when it is converted to the frequency domain (Figure 7b) using a fast Fourier transform (FFT). The highest peak is at 6 Hz, which means the cycle is 6.6 ms. This number is exactly the same as the known duty cycle of microwave ovens. Consequently, if a perceptible cycle is detected from this probing method and the period matches a well-known value, WiSlow determines that the current interference is due to a particular type of device (e.g., 6 Hz for microwave ovens). ) Frequency hopping (baby monitors and cordless phones): The duty cycle of typical audio and video transmitters such as baby monitors is known to be %. It means that they send and receive data constantly, implying that they continuously interfere with Wi-Fi networks without any off period. Therefore, intuitively, we do not expect to observe similar ACK patterns as those observed in the microwave oven experiment. However, when converting the plot from the time domain to the frequency domain, we observe another notable pattern. Figure 8a shows that there are multiple high peaks set apart by a specific interval, i.e., 43 Hz (occurring at 43, 86, 9, and 7 Hz). This is in contrast to the microwave ovens that showed only one significant peak at 6 Hz (Figure 7b). We conjecture that these peaks are caused by frequency hopping; a frequency hopper switches its frequency periodically, and interference occurs when it hops to a nearby frequency of the current Wi-Fi channel. Since the frequency-hopping chooses the next frequency using a pseudorandom sequence, it creates diverse pulses with different magnitudes, that are randomly positioned in the ACK number plot. For clarity, we plot a quantized time-domain graph (Figure 8b) that is converted back from the frequency-domain graph. We used the highest frequencies from Figure 8a. In the time-domain graph, the number of ACKs (y-axis) fluctuates periodically, however, note that the heights of the peaks vary. The possible explanation is as follows: the number of ACKs is large when the device hops This frequency could be 5 Hz in other countries (e.g., Europe and most of Asia) where 5 Hz AC power is used.
6 6 Magnitude 4 x 4 3 Method Group No-interference Channel Method Group High channel Occupancy Frequency (Hz) (a) A baby monitor: frequency domain (b) A baby monitor: time domain - top frequencies Method Group Method Hopping Frequency Hopping Non-Wi-Fi Interference Fixed Frequency Method Duty cycle = 5%, ACK number frequency = 6 Hz Magnitude 4 x Frequency (Hz) (c) An FHSS cordless phone: frequency domain (d) An FHSS cordless phone: time domain - top frequencies Fig. 8: The number of 8. ACKs per KB of UDP packets with a baby monitor and a cordless phone far from the current Wi-Fi channel, and it is relatively small when it hops to a nearby frequency. If the device hops into the exact range of the Wi-Fi channel, the number of 8. ACKs drops almost to zero. In other words, there are multiple levels of interference, which depend on how closely in frequency the device hops to the frequency used by the Wi-Fi channel. These multiple levels of interference create several pulses that have different magnitudes and frequencies. Finally, because the hopping interval of the device is fixed, the frequencies of the created pulses are synchronized such that the periods of the cycles are multiples of a specific value. The FHSS cordless phone, which also uses the frequency hopping technique, showed a similar result multiple peaks with a fixed interval, Hz (Figure 8). This verifies that our method is suitable to identify frequency hopping devices. Consequently, we can distinguish frequency-hopping devices by determining whether the number of 8. ACKs has multiple high peaks with a certain interval in the frequency domain. We check this by linear regression of the peak frequencies; if the correlation coefficient is greater than.99, we consider it to be a frequency-hopping device. 3) Fixed frequency (analog cordless phones): Since typical analog cordless phones use a fixed frequency, they usually interfere only with a small number of channels. (The analog phones we tested only interfered with Channel.) Because they do not change frequency, severe interference occurs if the current Wi-Fi channel overlaps with the frequency of the phone. In addition, their duty cycle is close to %, which implies that no ACK cycle exists. In our experiments, the UDP throughput stayed very low and no explicit ACK cycle (no hopping) was observed, as expected. Therefore, WiSlow concludes that an analog cordless phone is the interferer if there is a heavy interference pattern but no explicit ACK cycle or duty cycle is detected. Then, we can inform the user that switching the Wi-Fi channel can improve the performance in this case because this kind of device is likely to affect only a FHSS cordless phones s Method Group 3 Method Duty cycle = % No ACK cycle Analog cordless phone Microwave Ovens Fig. 9: The classification of problem sources by WiSlow s methods few channels. 4) Bluetooth: Bluetooth is another widely used wireless standard that operates in the.4 GHz spectrum. Hopping within the entire.4 GHz band, it interferes with every channel of an 8. network. However, algorithms such as Adapted Frequency Hopping (AFH), which is used to automatically avoid busy channels, mitigate this interference. Consequently, Bluetooth inconsiderably affects the performance of 8. networks. In a measurement by Rayanchu et al. [5], Bluetooth was shown to degrade the UDP throughput by about % as a worst case. Since we also verified that Bluetooth does not interfere much with 8.g networks based on our experimental result, we excluded Bluetooth in our identification algorithm. C. Classification WiSlow takes into account the combination of the results from the first method (packet loss analysis) and the second method (ACK pattern analysis) to identify the device type precisely. For example, the result of the first method is Group 3 and that of the second method is frequency-hopping, we consider the problem source to be a baby monitor. In addition, WiSlow looks into the source and destination addresses of the captured 8. packets in order to examine the channel occupancy rate. If the channel is highly occupied by other clients or nearby APs, but WiSlow does not detect any non- Wi-Fi interference, it considers the root cause to be channel contention. Figure 9 describes the classification algorithm that WiSlow uses to conclude the root cause. Currently, we aim to provide the best estimate of suspicious devices that we are aware of, but we believe that more types of devices can be covered easily once they are characterized in a similar manner. V. LOCATING INTERFERING DEVICES In this section, we describe a method to determine the physical locations of interfering devices. A number of research studies on indoor location tracking have attempted to pinpoint the location of laptops or smartphones through various methods [3] [5]. While these studies focus on locating client devices using signal information such as RSSI and SINR values, we focus on locating interference sources using multiple collaborative end-user devices. Compared to locating Wi-Fi devices, there are several difficulties in locating non-wi-fi devices for end users. First, it is impossible to obtain measurement data such as RSSI and throughput from such devices (e.g., microwave ovens neither monitor signals,
7 7 nor communicate with Wi-Fi devices). Second, owing to the limited capability of the hardware, end-user devices cannot detect signals emitted from the devices precisely. To overcome these circumstances, we leverage multiple Wi-Fi devices; a probing client (end-user machine) requests cooperative clients to perform a WiSlow diagnostics as described in previous sections. It then receives the diagnostic result containing the type of detected device and its interference strength from each client. We calculate the interference strength using the magnitude of the particular ACK number frequency that was used to detect the device, as described in the previous section (Method ). For example, the interference strength of a microwave oven can be determined based on a magnitude of 6 Hz in the FFT of the ACK number analysis. In the case of an FHSS device, it can be determined by the sum of the magnitudes of the multiple frequencies caused by the frequency hopping pattern. After collecting the strength values from the clients, we use the same method of obtaining the center of mass to find the location of the interference. If the interference strength detected by a particular client is greater than the interference strength detected by other clients, it means that the interference source is closer to that client. Therefore, interference strength can be considered equivalent to the mass in the formula of the center of mass. WiSlow first obtains the coordinates of cooperative clients based on the input from end users and calculates the coordinates of the interference source using the following formula. M i = mx f i (kx), R = np k= M i i= i= nx M i r i () M i is the strength of interference on the ith client and f i denotes the function of the measured magnitudes for each frequency, kx, where x is the smallest frequency caused by the interfering device. The coordinate of the interference source, R, can be calculated based on the sum of each client s weighted (M i ) coordinates (r i ). VI. EVALUATION In this section, we describe the accuracy of WiSlow in identifying the root cause of a Wi-Fi performance problem. First, we placed a laptop 8 m away from an AP, where Wi-Fi performance is not affected by weak signal strength. Then, we located the interfering devices between them, one at a time. We repeated the experiments altering the distance between the interfering device and the AP. We ran WiSlow on the laptop 5 times each at six different locations (a total of 9 measurements for each interfering device) and counted the number of times that WiSlow correctly diagnosed the root cause. First, without considering the type of the non-wi-fi device, we tested the capability of WiSlow to distinguish between no-interference, channel contention, and non-wi-fi interference. We evaluate the diagnostic accuracy and the false positive rate (type-i error) of WiSlow for each problem source. The diagnostic accuracy of a problem source P is the ratio of the number of correct diagnostics to the total number of experiments in which P is injected as a problem source. The false positive rate of P is the ratio of the number of cases that the cause is misidentified as P to the total number of experiments in which P is not actually the cause. Injected Problem Distance from the AP Accuracy False Positive No interference -.% 4.% Channel contention - 9.%.5% Non-Wi-Fi. m.% interference.5 m 97.8% (baby monitor,. m 8.% cordless phone,.5 m 8.%. m 73.3% and microwave oven).5 m 68.9% 3.9% TABLE I: The accuracy of WiSlow for distinguishing between a clean environment, channel contention, and non-wi-fi interference Table I shows that WiSlow successfully distinguishes them with high accuracy (over 9% for no-interference and channel contention). In the non-wi-fi interference case, the accuracy was also over 9% when the interfering device was close to the AP; however, it notably decreased when the distance between the AP and the device increased. We found that this inaccuracy was mostly caused by the FHSS cordless phones. In the following sections, we explain the reason for this inaccuracy and the method WiSlow employed to reduce it. A. Identifying the root cause Table II shows the detailed diagnostic results of identifying each type of non-wi-fi device. First, WiSlow could clearly detect interference caused by a microwave oven regardless of the distance (average 98%). In our extra experiments, WiSlow could detect the duty cycle of the microwave oven even when located relatively far from the AP and laptop ( m and 6 m). However, in these cases, since the microwave oven did not severely interfere with the Wi-Fi network, we do not elaborate further on the results in the present paper. Second, the diagnostic accuracy of detecting baby monitors was also very high when it was close to the AP. However, it dropped to under 6.7% when the distance was greater than m (Table II). In most cases, it was misidentified as a FHSS cordless phone, which contributed the high false positive rate of this device (4.8%). This result occurred because these two devices have the same characteristic (frequency hopping), and WiSlow considers their level of interference to distinguish them. In other words, if a baby monitor is far from a Wi-Fi device and causes less interference, it can mislead WiSlow s identification. The accuracy of detecting FHSS cordless phones was also low when it was not close to the AP (6.7% at.5 m). However, this was because the cordless phone caused insignificant interference at this spot; the average UDP throughput was 3.8 Mb/s at.5 m (the average throughput with no interference was 4 Mb/s in the same environment). With this small interference, WiSlow did not observe the expected hopping patterns. As a result, the majority of incorrect diagnostic results were no interference, which explains its high false positive rate (4.%) shown in Table I. The low accuracy of detecting baby monitors and FHSS cordless phones can be improved if we take into account their specific ACK number frequency values, which were discussed in Section IV-B. Recall that the ACK number frequencies of the baby monitor were a multiple of 43 Hz, and those of the FHSS cordless phone were a multiple of Hz. When WiSlow is adapted to consider these specific values, the detection accuracy increases dramatically. Table III shows that the accuracy was % most of the time, except when
8 8 Non-Wi-Fi Interference Microwave oven Baby monitor FHSS Cordless phone Distance from the AP Avg. Throughput Diagnostic Accuracy. m 7.54 Mb/s %.5 m 8.5 Mb/s %. m 8.96 Mb/s %.5 m 9.33 Mb/s %. m 9.3 Mb/s %.5 m 8.9 Mb/s 93.3 %. m.5 Mb/s %.5 m 3.6 Mb/s 73.3 %. m 4.79 Mb/s 6.7 %.5 m 4.49 Mb/s 6.7 %. m 4.8 Mb/s 6.7 %.5 m 5.7 Mb/s. %. m 6.76 Mb/s 8. %.5 m 9.65 Mb/s 86.7 %. m. Mb/s 4. %.5 m.5 Mb/s 4. %. m.44 Mb/s 3.3 %.5 m 3.8 Mb/s 6.7 % False Positive.4 %. % 4.8 % 5 3 B Schapiro Bldg. 7 th Floor (a) Experiment scenario of locating interference Up 4 A C TABLE II: The accuracy of WiSlow for identifying non-wi-fi devices Non-Wi-Fi Interference Baby monitor Cordless phone Distance from the AP Diagnostic Accuracy. m %.5 m %. m %.5 m %. m %.5 m %. m %.5 m %. m %.5 m 66.7%. m 6.7%.5 m 6.7% TABLE III: The accuracy of WiSlow for identifying baby monitors and cordless phones the FHSS cordless phone was placed at locations farther than.5 m 3. However, the disadvantage of this approach is that WiSlow needs to learn the ACK number frequency value of the particular product in advance because the pattern depends on each model. It appears to be impractical to collect the patterns from every product. However, we found that different models of the same type of product likely have common characteristics. For example, we tested four FHSS cordless phones produced by two different manufacturers 4, and each one showed the same ACK number frequencies (multiples of Hz). Therefore, we believe that collecting a small amount of information can cover the majority of devices if they follow the industry standards or use similar technologies. In conclusion, WiSlow successfully detected the root cause of Wi-Fi performance degradation with a high probability (over 9%) in most cases, although it frequently misidentified the type of certain non-wi-fi interfering devices when they were not located near the Wi-Fi device. However, this inaccuracy can be removed if we take into account the pre-obtained ACK number pattern of each device. B. Locating interfering devices We set up three laptops and one 8.g AP in a building at Columbia University. We placed a baby monitor between them and changed its location over time. Figure a illustrates our experimental scenario. The circled numbers indicate the movement path of the baby monitor. We ran WiSlow each 3 These inaccuracies can be ignored because the throughput shows there was actually no interference even though the cordless phone was active 4 Motorola and Panasonic (b) A real-time result of WiSlow Fig. : Locating the interference source time the location was changed. Figure b shows an actual real-time screenshot of WiSlow detecting the location of the baby monitor. For the first location, laptops A and B reported no interference, but laptop C detected the baby monitor successfully. For the second location, the three laptops all detected the baby monitor and reported similar interference strengths because the interference source was close to the AP, and thus the entire wireless network was affected by the baby monitor. In this particular case, WiSlow could infer that the problem source was likely to be a device placed near the AP. For the third location, only laptop B detected the baby monitor, and thus WiSlow placed the baby monitor icon close to laptop B. For the fourth location, the three laptops all detected the baby monitor, but the measured interference strengths were distinct. Therefore, based on Equation, WiSlow pointed the location of the baby monitor as being relatively close to laptop B. For the last spot, since none of the laptops detected any interference, only a green check icon was displayed, which indicates that the state of the network is good. This experiment proves that our approach is feasible for finding the relative location of an interfering device. Although WiSlow shows errors of several meters in pinpointing a location, we believe that this level of error is not critical for a home network environment. VII. RELATED WORK Airshark [5] uses a commodity Wi-Fi network adapter to identify the source of interference. It leverages a spectral scan to obtain signal information from multiple frequency ranges. It identifies the interference sources very accurately (over 95%) by analyzing the spectrum data using various methods. However, we suppose that it would be difficult to
9 9 apply this approach for typical end users because collecting high-resolution signal samples across the spectrum is impossible if the network card does not support this functionality. WiFiNet [6] identifies the impact of non-wi-fi interference and finds its location using observations from multiple APs that are running Airshark. However, this approach seems difficult to be used in a common home network environment that has a single AP. In contrast, WiSlow focuses on identifying the location of the interference source by cooperating end users. Kanuparthy et al. [6] propose an approach similar to WiSlow in terms of using user-level information. They distinguish congestion (channel contention) from hidden terminals and low SNR by measuring the one-way delay of different packet sizes. They then investigate the delay patterns to distinguish hidden terminals from low SNR. While their approach intentionally avoids using layer- information, WiSlow actively exploits 8. information in order to obtain a more detailed identification (e.g., device type causing the interference). Spectrum MRI [7] also isolates interference problems. The authors discuss that the link occupancy and retransmission rate is different depending on the sources of interference. They measure and compare those metrics to identify Bluetooth, channel congestion and the slow link on same AP problem. Sundaresan at el. [8] present a tool that identifies whether a performance bottleneck exists inside the home network or on the access link by measuring variation of packet interarrival time. It also evaluates the state of the wireless link by monitoring the bitrate and throughput on an AP. While this tool focuses on identifying where a bottleneck exists, WiSlow focuses on identifying the type of interference source within the wireless network. VIII. DISCUSSION AND FUTURE WORK A. 8.n 8.n uses both.4 and 5 GHz bands. Although fewer non-wi-fi devices are operating at 5 GHz, and thus less interference presently exists at that band, Cisco has anticipated that more devices will use the 5 GHz band in the future, and therefore a similar interference will likely occur [9]. We believe that our basic approach will also be feasible for discovering non-wi-fi interference sources at 5 GHz if customized to an 8.n environment. B. Ad-Hoc mode and mobile devices We also tested WiSlow on an ad-hoc network using two laptops, which enables WiSlow to run independently without communicating with an AP. Since ad-hoc networks also use the same 8. protocol, we did not see any differences from the experiments with an AP. We expect that using WiSlow with ad-hoc networks will be especially helpful in independently discovering nearby interference sources when used with multiple mobile devices such as smartphones. IX. CONCLUSION We designed WiSlow, a Wi-Fi performance trouble shooting application, specialized to detect non-wi-fi interference. WiSlow distinguishes 8. channel contention from non-wi- Fi interference, and identifies the type of interfering devices present. WiSlow was designed to exploit user-level probing only, which enables a software-only approach. For this purpose, we developed two novel methods that use user-accessible packet information such as UDP and 8. ACKs. The accuracy of WiSlow exceeds 9% when the sources are close to a Wi-Fi device. WiSlow becomes less accurate when the devices are located farther. However, this inaccuracy can be removed if we take into account the known characteristics of each device. Also, we proved that the collaborative approach is feasible for determining the relative location of an interfering device. X. ACKNOWLEDGMENT This material is based upon work supported by the National Science Foundation under Grant No. CNS REFERENCES [] S. Gollakota, F. Adib, D. Katabi, and S. Seshan, Clearing the RF smog: making 8.n robust to cross-technology interference, in Proc. of ACM SIGCOMM, Toronto, Ontario, Canada, Aug.. [] Wi-Spy, [Online; accessed May 3]. [3] AirSleuth, [Online; accessed May 3]. [4] AirMaestro, [Online; accessed May 3]. [5] S. Rayanchu, A. Patro, and S. Banerjee, Airshark: Detecting non-wifi RF Devices Using Commodity WiFi Hardware, in Proc. of ACM IMC, Berlin, Germany, Nov.. [6] S. Rayanchu, A. Patro, and S. Banerjee, Catching Whales and Minnows Using WiFiNet: Deconstructing non-wifi Interference Using WiFi Hardware, in Proc. of USENIX NSDI, San Jose, CA, USA, Apr.. [7] A. Vlavianos, L. K. Law, I. Broustis, S. V. Krishnamurthy, and M. Faloutsos, Assessing link quality in IEEE 8. wireless networks: Which is the right metric? in Proc. of PIMRC, Cannes, France, Sep. 8. [8] Radiotap, [Online; accessed May 3]. [9] WLAN packet capture, WLAN, [Online; accessed May 3]. [] S. Biaz and S. Wu, Rate adaptation algorithms for IEEE 8. networks: A survey and comparison, in Proc. of IEEE ISCC, Marrakech, Morocco, 8. [] F. J. Massey Jr, The Kolmogorov-Smirnov test for goodness of fit, Journal of the American statistical Association, vol. 46, no. 53, pp , 95. [] A. Kamerman and N. Erkocevic, interference on wireless LANs operating in the.4 GHz ISM band, in Proc. of PIMRC, Helsinki, Finland, Sep [3] G. V. Zàruba, M. Huber, F. A. Kamangar, and I. Chlamtac, Indoor location tracking using RSSI readings from a single Wi-Fi access point, Wireless Networks, vol. 3, no., pp. 35, Apr. 7. [4] A. Ali, L. Latiff, and N. Fisal, GPS-free indoor location tracking in mobile ad hoc network (MANET) using RSSI, in Proc. of IEEE RFM, Selangor, Malaysia, Oct. 4. [5] J. Hightower, R. Want, and G. Borriello, SpotON: An indoor 3D location sensing technology based on RF signal strength, Technical Report, UW CSE --, University of Washington, Seattle, WA, vol.,. [6] P. Kanuparthy, C. Dovrolis, K. Papagiannaki, S. Seshan, and P. Steenkiste, Can user-level probing detect and diagnose common home-wlan pathologies, Computer Communication Review, vol. 4, no., pp. 7 5,. [7] A. Baid, S. Mathur, I. Seskar, S. Paul, A. Das, and D. Raychaudhuri, Spectrum MRI: Towards diagnosis of multi-radio interference in the unlicensed band, in Proc. of IEEE WCNC, Quintana-Roo, Mexico, Mar.. [8] S. Sundaresan, Y. Grunenberger, N. Feamster, D. Papagiannaki, D. Levin, and R. Teixeira, WTF? Locating performance problems in home networks, in SCS Technical Report; GT-CS-3-3, Jun. 3. [9] Myths of Wi-Fi Interference, [Online; accessed July 3].
WiSlow: A WiFi Network Performance Troubleshooting Tool for End Users
WiSlow: A WiFi Network Performance Troubleshooting Tool for End Users Kyung-Hwa Kim Columbia University New York, NY, USA Email: [email protected] Hyunwoo Nam Columbia University New York, NY, USA
Optimizing Wireless Networks.
from the makers of inssider Optimizing Wireless Networks. Over the past few years, MetaGeek has created tools to help users optimize their wireless networks. MetaGeek s tools help visualize the physical
Lab Exercise 802.11. Objective. Requirements. Step 1: Fetch a Trace
Lab Exercise 802.11 Objective To explore the physical layer, link layer, and management functions of 802.11. It is widely used to wireless connect mobile devices to the Internet, and covered in 4.4 of
COAP: A Software-Defined Approach for Managing Residential Wireless Gateways
COAP: A Software-Defined Approach for Managing Residential Wireless Gateways 1 OVERVIEW Wireless gateways (eg, Access Points, wireless Set-Top Boxes) act as the primary mode of internet access in most
The ArubaOS Spectrum Analyzer Module
Tech Brief Enterprise The ArubaOS Spectrum Analyzer Module The ArubaOS Spectrum Analyzer Module Tech Brief Table of Contents Introduction... 2 Visibility into the non-802.11 Spectrum... 2 Features... 3
Bluetooth voice and data performance in 802.11 DS WLAN environment
1 (1) Bluetooth voice and data performance in 802.11 DS WLAN environment Abstract In this document, the impact of a 20dBm 802.11 Direct-Sequence WLAN system on a 0dBm Bluetooth link is studied. A typical
Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction
Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit
SmartDiagnostics Application Note Wireless Interference
SmartDiagnostics Application Note Wireless Interference Publication Date: May 27, 2015 KCF Technologies, Inc. Background The SmartDiagnostics wireless network is an easy to install, end-to-end machine
Performance Measurement of Wireless LAN Using Open Source
Performance Measurement of Wireless LAN Using Open Source Vipin M Wireless Communication Research Group AU KBC Research Centre http://comm.au-kbc.org/ 1 Overview General Network Why Network Performance
Unmatched RF Spectrum Analysis
Datasheet: AirMagnet Spectrum XT AirMagnet Spectrum XT is the industry s first professional spectrum analyzer solution that combines in-depth RF analysis with real-time WLAN information for quicker and
Interference Identification Guide. Table of Contents
Interference Identification Guide This document is a guide to help IT professionals optimize the performance of wireless networks by using spectrum analysis tools to identify sources of wireless interference.
Dynamic Reconfiguration & Efficient Resource Allocation for Indoor Broadband Wireless Networks
Dynamic Reconfiguration & Efficient Resource Allocation for Indoor Broadband Wireless Networks Tim Farnham, Brian Foxon* Home Communications Department HP Laboratories Bristol HPL-98-123 June, 1998 broadband,
Omni Antenna vs. Directional Antenna
Omni Antenna vs. Directional Antenna Document ID: 82068 Contents Introduction Prerequisites Requirements Components Used Conventions Basic Definitions and Antenna Concepts Indoor Effects Omni Antenna Pros
VOICE OVER WI-FI CAPACITY PLANNING
VOICE OVER WI-FI CAPACITY PLANNING Version 1.0 Copyright 2003 Table of Contents Introduction...3 Wi-Fi RF Technology Options...3 Spectrum Availability and Non-Overlapping Wi-Fi Channels...4 Limited
Wi-Fi and Bluetooth - Interference Issues
Wi-Fi and Bluetooth - Interference Issues January 2002 1 Introduction Because both Wi-Fi and Bluetooth wireless technology share spectrum and will often be located in close physical proximity to one another,
Site Survey and RF Design Validation
CHAPTER 8 Site Survey Introduction In the realm of wireless networking, careful planning is essential to ensure that your wireless network performs in a manner that is consistent with Cisco s design and
VOIP under: WLAN 802.11g. VS Telephone Landline. ENSC 427 Team 1 Luke Dang [email protected] Jason Tsai [email protected] Jeffrey Tam jta6@sfu.
VOIP under: WLAN 802.11g and Ethernet connection VS Telephone Landline ENSC 427 Team 1 Luke Dang [email protected] Jason Tsai [email protected] Jeffrey Tam [email protected] Project Website: www.sfu.ca/~kta2 2 Introduction
Algorithms for Interference Sensing in Optical CDMA Networks
Algorithms for Interference Sensing in Optical CDMA Networks Purushotham Kamath, Joseph D. Touch and Joseph A. Bannister {pkamath, touch, joseph}@isi.edu Information Sciences Institute, University of Southern
CS263: Wireless Communications and Sensor Networks
CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA
Real-Time Spectrum Analysis for Troubleshooting 802.11n/ac WLAN Devices
Real-Time Spectrum Analysis for Troubleshooting 802.11n/ac WLAN Devices Application Brief 802.11 WLAN devices operate in the license-exempt 2.4 GHz ISM and 5 GHz UNII bands, where they must share spectrum
Spectrum Analysis How-To Guide
Spectrum Analysis How-To Guide MOTOROLA SOLUTIONS and the Stylized M Logo are registered in the US Patent & Trademark Office. Motorola Solutions, Inc. 2012. All rights reserved. Spectrum Analysis 3 Contents
Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh
Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh, Ph.D. [email protected] Mesh 2008, Cap Esterel, France 1 Abstract Abundant hidden node collisions and correlated channel access
Frequency Hopping Spread Spectrum (FHSS) vs. Direct Sequence Spread Spectrum (DSSS) in Broadband Wireless Access (BWA) and Wireless LAN (WLAN)
FHSS vs. DSSS page 1 of 16 Frequency Hopping Spread Spectrum (FHSS) vs. Direct Sequence Spread Spectrum (DSSS) in Broadband Wireless Access (BWA) and Wireless LAN (WLAN) by Sorin M. SCHWARTZ Scope In 1997
Wireless Home Networks based on a Hierarchical Bluetooth Scatternet Architecture
Wireless Home Networks based on a Hierarchical Bluetooth Scatternet Architecture W. Lilakiatsakun'. 2, A. Seneviratne' I School of Electrical Engineering and Telecommunication University of New South Wales,
Analysis of Immunity by RF Wireless Communication Signals
64 PIERS Proceedings, Guangzhou, China, August 25 28, 2014 Analysis of Immunity by RF Wireless Communication Signals Hongsik Keum 1, Jungyu Yang 2, and Heung-Gyoon Ryu 3 1 EletroMagneticwave Technology
Broadband Networks. Prof. Dr. Abhay Karandikar. Electrical Engineering Department. Indian Institute of Technology, Bombay. Lecture - 29.
Broadband Networks Prof. Dr. Abhay Karandikar Electrical Engineering Department Indian Institute of Technology, Bombay Lecture - 29 Voice over IP So, today we will discuss about voice over IP and internet
Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman
1 Wireless Networks Reading: Sec5on 2.8 COS 461: Computer Networks Spring 2011 Mike Freedman hep://www.cs.princeton.edu/courses/archive/spring11/cos461/ 2 Widespread Deployment Worldwide cellular subscribers
Scanning Delays in 802.11 Networks
Scanning Delays in 802.11 Networks David Murray Murdoch University [email protected] Michael Dixon Murdoch University [email protected] Terry Koziniec Murdoch University [email protected]
Do You See What I See (DYSWIS)
Do You See What I See (DYSWIS) Introduction: DYSWIS is a system that leverages distributed network nodes to gather network management information for fault isolation and diagnosis. This project extends
Universal Form-factor. Wi Fi Troubleshooting Made Easy
AirMedic USB AirMedic USB is a powerful, easy-touse and affordable spectrum analysis tool that brings Wi-Fi troubleshooting to entry-level users. Built upon AirMagnet expertise in Wi-Fi troubleshooting,
APPLICATION NOTE. Atmel AT02845: Coexistence between ZigBee and Other 2.4GHz Products. Atmel MCU Wireless. Description. Features
APPLICATION NOTE Atmel AT02845: Coexistence between ZigBee and Other 2.4GHz Products Description Atmel MCU Wireless This document introduces all kinds of 2.4GHz RF products. It focuses on analysis of ZigBee
WLAN Positioning Technology White Paper
WLAN Positioning Technology White Paper Issue 1.0 Date 2014-04-24 HUAWEI TECHNOLOGIES CO., LTD. 2014. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any
APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM
152 APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM A1.1 INTRODUCTION PPATPAN is implemented in a test bed with five Linux system arranged in a multihop topology. The system is implemented
A TCP-like Adaptive Contention Window Scheme for WLAN
A TCP-like Adaptive Contention Window Scheme for WLAN Qixiang Pang, Soung Chang Liew, Jack Y. B. Lee, Department of Information Engineering The Chinese University of Hong Kong Hong Kong S.-H. Gary Chan
Measuring the service level in the 2.4 GHz ISM band
Measuring the service level in the 2.4 GHz ISM band Internal report Jan-Willem van Bloem and Roel Schiphorst University of Twente Department of Electrical Engineering, Mathematics & Computer Science (EEMCS)
High-Density Wi-Fi. Application Note
High-Density Wi-Fi Application Note Table of Contents Background... 3 Description... 3 Theory of Operation... 3 Application Examples... Tips and Recommendations... 7 2 Background One of the biggest challenges
Dynamic Source Routing in Ad Hoc Wireless Networks
Dynamic Source Routing in Ad Hoc Wireless Networks David B. Johnson David A. Maltz Computer Science Department Carnegie Mellon University 5000 Forbes Avenue Pittsburgh, PA 15213-3891 [email protected] Abstract
Lecture 17: 802.11 Wireless Networking"
Lecture 17: 802.11 Wireless Networking" CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Lili Qiu, Nitin Vaidya Lecture 17 Overview" Project discussion Intro to 802.11 WiFi Jigsaw discussion
Maximizing Throughput and Coverage for Wi Fi and Cellular
Maximizing Throughput and Coverage for Wi Fi and Cellular A White Paper Prepared by Sebastian Rowson, Ph.D. Chief Scientist, Ethertronics, Inc. www.ethertronics.com March 2012 Introduction Ask consumers
Rapid Prototyping of a Frequency Hopping Ad Hoc Network System
Rapid Prototyping of a Frequency Hopping Ad Hoc Network System Martin Braun, Nico Otterbach, Jens Elsner, and Friedrich K. Jondral Communications Engineering Lab, Karlsruhe Institute of Technology (KIT),
Crestron Best Practices for Installation and Setup of Crestron RF Products Reference Guide
Crestron Best Practices for Installation and Setup of Crestron RF Products Reference Guide The specific patents that cover Crestron products are listed at patents.crestron.com. Crestron, the Crestron logo,
Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]
TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)
TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) *Slides adapted from a talk given by Nitin Vaidya. Wireless Computing and Network Systems Page
Protocolo IEEE 802.15.4. Sergio Scaglia SASE 2012 - Agosto 2012
Protocolo IEEE 802.15.4 SASE 2012 - Agosto 2012 IEEE 802.15.4 standard Agenda Physical Layer for Wireless Overview MAC Layer for Wireless - Overview IEEE 802.15.4 Protocol Overview Hardware implementation
THE BCS PROFESSIONAL EXAMINATIONS BCS Level 5 Diploma in IT. October 2009 EXAMINERS' REPORT. Computer Networks
THE BCS PROFESSIONAL EXAMINATIONS BCS Level 5 Diploma in IT October 2009 EXAMINERS' REPORT Computer Networks General Comments The responses to questions were of marginally better quality than April 2009
Dynamic Load Balance Algorithm (DLBA) for IEEE 802.11 Wireless LAN
Tamkang Journal of Science and Engineering, vol. 2, No. 1 pp. 45-52 (1999) 45 Dynamic Load Balance Algorithm () for IEEE 802.11 Wireless LAN Shiann-Tsong Sheu and Chih-Chiang Wu Department of Electrical
Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks
Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks 1 Mr. Praveen S Patil, 2 Mr. Rabinarayan Panda, 3 Mr. Sunil Kumar R D 1,2,3 Asst. Professor, Department of MCA, The Oxford College of Engineering,
Multichannel Virtual Access Points for Seamless Handoffs in IEEE 802.11 Wireless Networks
Multichannel Virtual Access Points for Seamless Handoffs in IEEE 8. Wireless Networks Maria Eugenia Berezin, Franck Rousseau, Andrzej Duda Grenoble Institute of Technology, CNRS Grenoble Informatics Laboratory
Performance Monitoring on Networked Virtual Environments
ICC2129 1 Performance Monitoring on Networked Virtual Environments Christos Bouras, Eri Giannaka Abstract As networked virtual environments gain increasing interest and acceptance in the field of Internet
Wireless LAN Concepts
Wireless LAN Concepts Wireless LAN technology is becoming increasingly popular for a wide variety of applications. After evaluating the technology, most users are convinced of its reliability, satisfied
Final for ECE374 05/06/13 Solution!!
1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -
A Wireless Mesh Network NS-3 Simulation Model: Implementation and Performance Comparison With a Real Test-Bed
A Wireless Mesh Network NS-3 Simulation Model: Implementation and Performance Comparison With a Real Test-Bed Dmitrii Dugaev, Eduard Siemens Anhalt University of Applied Sciences - Faculty of Electrical,
Characterizing Wireless Network Performance
Characterizing Wireless Network Performance Ruckus Wireless Black Paper Accurate performance testing for wireless networks requires understanding how to test for worst case scenarios As expensive and inconvenient
An enhanced TCP mechanism Fast-TCP in IP networks with wireless links
Wireless Networks 6 (2000) 375 379 375 An enhanced TCP mechanism Fast-TCP in IP networks with wireless links Jian Ma a, Jussi Ruutu b and Jing Wu c a Nokia China R&D Center, No. 10, He Ping Li Dong Jie,
WLAN Spectrum Analyzer Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 2013-05-10
WLAN Spectrum Analyzer Technology White Paper Issue 01 Date 2013-05-10 HUAWEI TECHNOLOGIES CO., LTD. 2013. All rights reserved. No part of this document may be reproduced or transmitted in any form or
Ultra Wideband Signal Impact on IEEE802.11b Network Performance
Ultra Wideband Signal Impact on IEEE802.11b Network Performance Matti Hämäläinen 1, Jani Saloranta 1, Juha-Pekka Mäkelä 1, Tero Patana 2, Ian Oppermann 1 1 Centre for Wireless Communications (CWC), University
communication over wireless link handling mobile user who changes point of attachment to network
Wireless Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers! computer nets: laptops, palmtops, PDAs, Internet-enabled phone promise anytime untethered Internet
Multicast Video Streaming over WiFi Networks: Impact of Multipath Fading and Interference
Multicast Video Streaming over WiFi Networks: Impact of Multipath Fading and Interference Shafqat Ur Rehman, Thierry Turletti, and Walid Dabbous INRIA Sophia Antipolis, France {shafqat-ur.rehman, thierry.turletti,
SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS
SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS Sonia Waharte, Kevin Ritzenthaler and Raouf Boutaba University of Waterloo, School of Computer Science 00, University Avenue West,
Performance Evaluation of The Split Transmission in Multihop Wireless Networks
Performance Evaluation of The Split Transmission in Multihop Wireless Networks Wanqing Tu and Vic Grout Centre for Applied Internet Research, School of Computing and Communications Technology, Glyndwr
Enabling third-party apps in home gateways for. (through virtualization, edge computing, SDN, and RF management) Suman Banerjee ([email protected].
Enabling third-party apps in home gateways for and (through virtualization, edge computing, SDN, and RF management) Suman Banerjee ([email protected]) 1 IoT and smart home apps IoT and smart home apps
ENSC 427: Communication Networks. Analysis of Voice over IP performance on Wi-Fi networks
ENSC 427: Communication Networks Spring 2010 OPNET Final Project Analysis of Voice over IP performance on Wi-Fi networks Group 14 members: Farzad Abasi ([email protected]) Ehsan Arman ([email protected]) http://www.sfu.ca/~faa6
CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006
CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)
AP Physics 1 and 2 Lab Investigations
AP Physics 1 and 2 Lab Investigations Student Guide to Data Analysis New York, NY. College Board, Advanced Placement, Advanced Placement Program, AP, AP Central, and the acorn logo are registered trademarks
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,
Best Practices for Wireless Site Design
Best Practices for Wireless Site Design A Technology Whitepaper Table of ContentS Are Site Surveys Really Required? 1 AirMagnet Approach to Wireless Site Design 1 Phase I: Preparation Phase 1 Phase II:
Admission Control for VoIP Traffic in IEEE 802.11 Networks
Admission Control for VoIP Traffic in IEEE 802.11 Networks Sachin Garg Avaya Labs Basking Ridge, NJ 07920 Email: [email protected] Martin Kappes Avaya Labs Basking Ridge, NJ 07920 Email: [email protected]
Applying Active Queue Management to Link Layer Buffers for Real-time Traffic over Third Generation Wireless Networks
Applying Active Queue Management to Link Layer Buffers for Real-time Traffic over Third Generation Wireless Networks Jian Chen and Victor C.M. Leung Department of Electrical and Computer Engineering The
Intelligent Channel Bonding in 802.11n WLANs
Intelligent Channel Bonding in 82.n WLANs Lara Deek, Eduard Garcia-Villegas, Elizabeth Belding, Sung-Ju Lee, Kevin Almeroth UC Santa Barbara, UPC-BarcelonaTECH, Narus Inc. [email protected], [email protected],
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
FORTH-ICS / TR-375 March 2006. Experimental Evaluation of QoS Features in WiFi Multimedia (WMM)
FORTH-ICS / TR-375 March 26 Experimental Evaluation of QoS Features in WiFi Multimedia (WMM) Vasilios A. Siris 1 and George Stamatakis 1 Abstract We investigate the operation and performance of WMM (WiFi
PERFORMANCE ANALYSIS OF LOW RATE WIRELESS TECHNOLOGIES FOR MEDICAL APPLICATIONS. N. Golmie, D. Cypher, O. Rebala
PERFORMANCE ANALYSIS OF LOW RATE WIRELESS TECHNOLOGIES FOR MEDICAL APPLICATIONS N. Golmie, D. Cypher, O. Rebala National Institute of Standards and Technology, 100 Bureau Drive, Gaithersburg, Maryland
1 Lecture Notes 1 Interference Limited System, Cellular. Systems Introduction, Power and Path Loss
ECE 5325/6325: Wireless Communication Systems Lecture Notes, Spring 2015 1 Lecture Notes 1 Interference Limited System, Cellular Systems Introduction, Power and Path Loss Reading: Mol 1, 2, 3.3, Patwari
Clearing the Way for VoIP
Gen2 Ventures White Paper Clearing the Way for VoIP An Alternative to Expensive WAN Upgrades Executive Overview Enterprises have traditionally maintained separate networks for their voice and data traffic.
Troubleshooting WLAN Issues
Troubleshooting WLAN Issues AirWave Help Desk Guide Wireless LAN Troubleshooting for the Help Desk In a typical IT organization, it is the Help Desk s job to take incoming user support calls and determine
The influence of Wi-Fi on the operation of Bluetooth based wireless sensor networks in the Internet of Things
Faculty of Electrical Engineering, Mathematics & Computer Science The influence of Wi-Fi on the operation of Bluetooth based wireless sensor networks in the Internet of Things Jermain C. Horsman B.Sc.
CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs)
CS6956: Wireless and Mobile Networks Lecture Notes: //05 IEEE 80. Wireless Local Area Networks (WLANs) CSMA/CD Carrier Sense Multi Access/Collision Detection detects collision and retransmits, no acknowledgement,
AN1200.04. Application Note: FCC Regulations for ISM Band Devices: 902-928 MHz. FCC Regulations for ISM Band Devices: 902-928 MHz
AN1200.04 Application Note: FCC Regulations for ISM Band Devices: Copyright Semtech 2006 1 of 15 www.semtech.com 1 Table of Contents 1 Table of Contents...2 1.1 Index of Figures...2 1.2 Index of Tables...2
Inter-Cell Interference Coordination (ICIC) Technology
Inter-Cell Interference Coordination (ICIC) Technology Dai Kimura Hiroyuki Seki Long Term Evolution (LTE) is a promising standard for next-generation cellular systems targeted to have a peak downlink bit
Centralized WLAN Troubleshooting
WHITE PAPER Centralized WLAN Troubleshooting Maximizing Wireless Network Availability Wireless Local Area Networks (WLAN) have proliferated within the enterprise. The business efficiencies realized though
ALLION USA INTERNET SERVICE PROVIDER WIRELESS GATEWAY COMPETITIVE ANALYSIS
ALLION USA INTERNET SERVICE PROVIDER WIRELESS GATEWAY COMPETITIVE ANALYSIS Date: 4/25/2013 Rev 1.0 Visit our Web Site at: www.allionusa.com 1 Introduction Internet Service Providers (ISP) have a number
Bandwidth Estimation using Passive Monitoring for WLANs Case Study Report
Bandwidth Estimation using Passive Monitoring for WLANs Case Study Report Investing in the future by working together for a sustainable and competitive region Bandwidth Estimation using Passive Monitoring
Frequency Hopping Spread Spectrum PHY of the 802.11 Wireless LAN Standard. Why Frequency Hopping?
Frequency Hopping Spread Spectrum PHY of the 802.11 Wireless LAN Standard Presentation to IEEE 802 March 11, 1996 Naftali Chayat BreezeCom 1 Why Frequency Hopping? Frequency Hopping is one of the variants
Department of Electrical and Computer Engineering Ben-Gurion University of the Negev. LAB 1 - Introduction to USRP
Department of Electrical and Computer Engineering Ben-Gurion University of the Negev LAB 1 - Introduction to USRP - 1-1 Introduction In this lab you will use software reconfigurable RF hardware from National
Seamless Congestion Control over Wired and Wireless IEEE 802.11 Networks
Seamless Congestion Control over Wired and Wireless IEEE 802.11 Networks Vasilios A. Siris and Despina Triantafyllidou Institute of Computer Science (ICS) Foundation for Research and Technology - Hellas
Advanced Wireless LAN VoIP Technology
Wireless LAN VoIP QoS Advanced Wireless LAN VoIP Technology A technical overview is given of an optimal access point selection method and an autonomous distributed scheduling MAC method that take QoS into
Application of Adaptive Probing for Fault Diagnosis in Computer Networks 1
Application of Adaptive Probing for Fault Diagnosis in Computer Networks 1 Maitreya Natu Dept. of Computer and Information Sciences University of Delaware, Newark, DE, USA, 19716 Email: [email protected]
NetComm Wireless NP920 Dual Band WiFi USB Adapter. User Guide
NetComm Wireless NP920 Dual Band WiFi USB Adapter User Guide Contents Preface... 3 Important Safety Instructions... 3 Introduction... 4 Overview... 4 Features... 4 Package Contents... 5 Minimum System
Path Optimization in Computer Networks
Path Optimization in Computer Networks Roman Ciloci Abstract. The main idea behind path optimization is to find a path that will take the shortest amount of time to transmit data from a host A to a host
How To Determine The Capacity Of An 802.11B Network
Capacity of an IEEE 802.11b Wireless LAN supporting VoIP To appear in Proc. IEEE Int. Conference on Communications (ICC) 2004 David P. Hole and Fouad A. Tobagi Dept. of Electrical Engineering, Stanford
The Effect of Network Cabling on Bit Error Rate Performance. By Paul Kish NORDX/CDT
The Effect of Network Cabling on Bit Error Rate Performance By Paul Kish NORDX/CDT Table of Contents Introduction... 2 Probability of Causing Errors... 3 Noise Sources Contributing to Errors... 4 Bit Error
