WiSlow: A WiFi Network Performance Troubleshooting Tool for End Users
|
|
|
- Edgar Stevens
- 10 years ago
- Views:
Transcription
1 WiSlow: A WiFi Network Performance Troubleshooting Tool for End Users Kyung-Hwa Kim Columbia University New York, NY, USA [email protected] Hyunwoo Nam Columbia University New York, NY, USA [email protected] Henning Schulzrinne Columbia University New York, NY, USA [email protected] Abstract The increasing number of 82. APs and wireless devices results in more contention, which causes unsatisfactory WiFi network performance. In addition, non-wifi devices sharing the same spectrum with 82. networks such as microwave ovens, cordless phones, and baby monitors severely interfere with WiFi networks. Although the problem sources can be easily removed in many cases, it is difficult for end users to identify the root cause. We introduce WiSlow, a software tool that diagnoses the root causes of poor WiFi performance with user-level network probes and leverages peer collaboration to identify the location of the causes. We elaborate on two main methods: packet loss analysis and 82. ACK pattern analysis. I. INTRODUCTION Today, it is common for households to put together home wireless networks with a private wireless router (access point) that supports multiple wireless devices. However, the increasing usage of wireless networks inevitably results in more contention and interference, which causes unsatisfactory WiFi performance. There are two main sources of performance degradation. First, WiFi devices connected to the same AP or nearby APs that use the same channel can cause packet collisions, i.e., channel contention. Second, non-wifi devices such as microwave ovens, cordless phones, and baby monitors emit severe interference because these devices operate on the same 2.4 GHz spectrum as 82.b/g [6]. Although these problem sources can be easily removed in many cases (e.g., by relocating the baby monitor, choosing a different channel, or moving to the 5 GHz band), it is difficult for technically nonsavvy users to even notice the existence of channel contention or non-wifi interference. Instead, properly working routers or service providers are frequently misidentified as the culprit while the actual root cause remains unidentified. However, isolating the root causes of poor WiFi performance is nontrivial, even for a network expert, because they show very similar symptoms at the user level, and special devices are required in order to investigate the lower layers of the protocol stack. We introduce WiSlow ( Why is my WiFi slow? ), a software tool that diagnoses the root causes of poor WiFi performance with user-level network probes and leverages peer collaboration to identify their location. We focus on building software that does not require any additional spectrum analysis hardware (unlike, e.g., WiSpy [4], AirSleuth [2], or AirMaestro []). In addition, WiSlow does not depend on a specific network adapter such as the Atheros chipset, which were used to achieve similar goals in other studies [], []. WiSlow runs on a typical end user s machine. Currently, it runs on any machine that supports wireless packet sniffing enabled by the 82. monitor mode. We trace behaviors of 82. networks such as retries, Frame Checksum Sequence (FCS) errors, packet loss, and bit rate adaption, which can be observed on ordinary operating systems. Our experimental results show that the statistical patterns of the above variables vary depending on the problem sources. For example, in the case of non-wifi interference, we observed a greater number of retried packets, fewer FCS errors, and larger variations in the bit rates compared to channel contention. Correlating these variables, we can categorize the sources of performance problems into several distinct groups. In addition, the non- WiFi devices such as baby monitors, cordless phones, and microwave ovens have different patterns when the number of UDP packets and 82. ACKs are plotted over time. In this study, we elaborate on two main methods: packet loss analysis and 82. ACK pattern analysis. To improve the accuracy of the algorithm, WiSlow also uses a heuristic method that considers the history of interference episodes and matches it to the common usage characteristics of various devices (e.g., microwave ovens are often used intermittently for periods of 5 3 minutes, whereas baby monitors are used continuously) to ascertain the source of the problem. Based on our experimental results and heuristic methods, we have developed an algorithm that successfully distinguishes channel contention from non-wifi interference and infers the product type of the offending device. We believe that this technology will be useful to end users since it can inform them of what needs to be done in order to improve the performance of their networks whether to upgrade their Internet bandwidth or remove a device that is emitting the interference. In non-wifi interference scenarios, another goal is to identify the location of the source of interference. Although it is difficult to pinpoint the exact physical location of the source without the support of hardware or APs, we can infer the relative location of the problem source by collaborating with other end users connected to the same wireless network. WiSlow collects patterns of variables from peers and determines whether others observe the interference at the same time. If all the machines observe it, it is highly likely that the problematic source is close to the wireless AP. However, if only one of the peers observes the interference, the source is likely to be located close to that peer. Our experimental results clearly show that this approach is feasible. In summary, WiSlow uses information obtained from captured packets and other users to (i) distinguish channel contention from non-wifi interference, (ii) infer the product
2 type of the interfering device (e.g., a microwave oven, cordless phone, or baby monitor), and (iii) point out the approximate location of the source of interference. We developed and evaluated an implementation of WiSlow that diagnoses the cause of WiFi performance degradation and returns reports to users such as It appears that a baby monitor located close to your router is interfering with your WiFi network. The remainder of this paper is structured as follows. In Section II, we describe the common sources of WiFi performance degradation. In Section III, we discuss the restrictions of an end user s environment and how WiSlow attempts to overcome them. Section IV explains the detailed methods of WiSlow. Finally, Section VII summarizes our conclusions. II. BACKGROUND Common sources of WiFi performance degradation include: WiFi channel contention: degradation due to a channel crowded by multiple WiFi devices that compete to transmit data through an AP. In addition, interference due to nearby APs that are using the same channel or adjacent channels cause the similar performance problems since the APs share the limited capacity of the channel. We use the term contention in this paper to refer to this type of performance degradation. Non-WiFi interference: interference due to non-wifi devices that use the same 2.4 GHz spectrum as the 82.b/g networks such as microwave ovens, cordless phones, baby monitors, and Bluetooth devices. In this paper, we use the term interference to refer to this type of degradation. Weak signal: when the signal is not strong enough due to distance or obstacles, packets can be lost or corrupted. Although the extent varies, all the above sources result in severe performance degradation some of them even drop the TCP/UDP throughput to almost zero []. In this study, we focus on WiFi channel contention and common non-wifi interference sources. III. CHALLENGES In this section, we describe several difficulties analyzing wireless networks due to end users restricted conditions such as limited hardware capabilities and lack of monitoring data. A. Inaccurate RSSI and SINR measurement Received Signal Strength Indication (RSSI) and Signal-to- Interference-plus-Noise Ratio (SINR) are generally considered to be the key factors that indicate the quality of a wireless link. However, according to Vlavianos et al. [2], RSSI inaccurately captures the link quality and it is difficult to accurately compute SINR with commodity wireless cards, thus they are not appropriate when estimating the quality of the link. We also observed a similar result when monitoring RSSI and SINR values. We placed various types of interference sources close to the AP and measured the values on a general client machine. In Figure a, RSSI values with a baby monitor were consistently higher than a cordless phone, which should be We used a MacBook Pro 23 (network card: AirPort Extreme, chipset: Broadcom BCM43 series) in this measurement CLEAN DSSS PHONE MICROWAVE OVEN Values (a) RSSI measurement CLEAN DSSS PHONE MICROWAVE OVEN Values (b) SINR measurement Fig. : Cumulative distribution functions of RSSI and SINR values reversed when the measured UDP throughput is considered. In, Figure b, the SINR values with a cordless phone were higher than even a no-interference case. Furthermore, these results varied for each experiment. Based on this observation, we conclude that RSSI and SINR values captured by a general wireless cards do not correctly represent the level of interference. Therefore, we do not use these metrics for other purposes besides as a hint in the case of an extremely weak signal. B. No specific network adapter or driver We do not make any assumptions about the specific network adapters or drivers that end users may have. Some Atheros chipsets, which are widely used in research studies, support a spectral scan that provides a spectrum analysis of multiple frequency ranges. Rayanchu et al. developed Airshark [] and WiFiNet [] leveraging this feature to distinguish non-wifi interferers using a commodity network card without specialized hardware. Since our tool aims to provide the best estimation of the problem source, if the user happens to have this specific network adapter, WiSlow can adopt the same approach. However, to the best of our knowledge, only a few chipsets currently provide this feature. In addition, we failed to discover references to this feature for any OS other than Linux. Since there are hundreds of products that use a different chipset and/or OS, it is impractical to assume that a general end user has this specific setup. Therefore, we focus instead on analyzing the quality of a link using user-controllable protocols such as UDP and 82. packets. Because the mechanisms of these protocols are not significantly different for many WiFi devices, we believe WiSlow can help a wider range of end users. C. Difficulties in obtaining multiple channel information Without special hardware or a particular network adapter, it is still possible to measure signal strength by monitoring 82. packets. In addition, signal information from multiple frequency bands can be obtained by channel switching. It may help to identify the signal signature of each interfering device. However, without the specialized functionalities of some wireless cards, the AP must be reset whenever the channels are switched. This is not practical for general client machines, not only because it takes a while to scan all the channels, but also because the frequencies given for the signal samples are not at a sufficiently fine-grained resolution. Therefore, we assume that we can only observe a fixed channel of the network. The disadvantage of this approach is that it may fail to detect some interferers that operate within another range of
3 frequencies. However, it is reasonable for WiSlow to ignore this case because there is no motivation from an end user s perspective to detect these interferers if the interference does not overlap with his/her WiFi network. D. Lack of monitoring data Another restriction in the end-user environment is the lack of a monitoring history. If we assume that we have been monitoring the machine up to the moment when a performance problem happens, the diagnosis will be easier because we can obtain several important clues such as the average quality of the network s usual performance, the time when the problem started, and whether it has happened in the recent past. However, although the overhead of network monitoring is not heavy on modern machines, it is difficult to expect that end users will continuously run such a tool. The more common scenario is that a user launches a troubleshooting tool like WiSlow and requests a diagnostic only after he/she has noticed a severe performance problem. Therefore, we need to design the tool assuming little or no previous monitoring data. In the next section, it is explained how WiSlow estimates the problem source without knowing the baseline quality of the network. IV. WISLOW In this section, we elaborate on the details of probing methods for identifying the root causes of network interference. First, to investigate the behavior of WiFi networks in each problem scenario, we artificially inject problems while transmitting UDP packets between a client (laptop) and an AP, capturing every packet on the client. Then, we trace the transport layer (UDP), the 82. MAC layer, and some useraccessible 82. PHY layer information to ascertain each problematic scenario s interference levels and characteristics. To capture 82. packets, WiSlow leverages the monitor mode that provides the Radiotap [3] header, a standard for 82. frame information. The headers are used to extract the lower layer information such as FCS errors and bit rates. Sniffing the wireless packets is supported by most Linux and all Mac OS X machines without additional driver or kernel modification. Therefore, if we can successfully characterize each performance-degrading source by probing the transmitted packets, the same probes will enable WiSlow to identify the problem on most platforms. However, it is not always possible to capture wireless packets on some types of OS, e.g., Microsoft Windows [5]. Instead, Windows provides several APIs that report 82. packet statistics to user applications. Those APIs enable WiSlow to run on Windows because they provide all the information that WiSlow must extract from the 82. packets. In summary, WiSlow can operate properly if the client s machine supports wireless packet sniffing or provides a set of appropriate APIs. In the following sections, we explain WiSlow s two main diagnostic methods, packet loss analysis and ACK pattern analysis. A. Packet loss analysis First, we found that each problem source varies in their packet loss characteristics, represented by three statistics: ) the number of 82. retries, 2) the number of FCS errors, and 3) the bit rates. In each experiment, we measured these values on a client laptop while downloading MB of packets from an AP. The values were recorded for each KB of UDP packets received. Thus, we collected a total of, samples for each experiment. We repeated this experiment for different scenarios including channel contention and non-wifi interferences. To simulate channel contention, we set up several laptops sending bulk UDP packets to the AP. To generate non-wifi interference, we placed each interfering device (baby monitors, microwave ovens, and cordless phones) close to the AP (about 2 cm) and measured the effect on the client placed at various distances from the AP, e.g., 5 m, m, and 2 m. (In this study, we did not consider the simultaneous interference of multiple devices.) Note that the client downloaded MB of UDP packets for each experiment to collect a statistically meaningful amount of samples, but when actually probing on an end user s machine, WiSlow only needs to transmit MBytes of packets to identify the root cause, which takes reasonable amount of time (2 5 s) for a problem diagnosis application. ) Retry and bit rate: Since an 82. retry and bit rate reduction are both initiated by a packet loss, their temporal changes are closely correlated; when a packet loss occurs, the bit rate decreases by the 82. rate adaption algorithm. The probability of packet loss then decreases due to the reduced bit rate, which lowers the number of retries. After that, the bit rate gradually increases again due to the reduced packet loss, which leads to a higher probability of packet loss and retries. In other words, if contention or interference exists, it causes packet losses, and then the bit rate and number of retried packets repeatedly fluctuate during the subsequent data transmission. The more interference, the more the fluctuations are observed. 2) FCS errors: Another variable that we trace is the number of FCS errors. Intuitively, it can be predicted that non- WiFi interference introduces more FCS errors than channel contention or a no-interference environment because the packet corruptions are likely to occur more frequently when a medium is noisy. However, in our experiment, it turned out that a large number of FCS errors are not necessarily correlated with severe interference. On the contrary, we often observed that fewer FCS errors occur with severe non-wifi interference (e.g., interference of a baby monitor) than with channel contention or even a no-interference environment (Figure 2a). This paradox can be explained by the low bit rates in the interference case, which implies that a smaller number of bits are transmitted in the same bandwidth. Consequently, the number of FCS errors alone is not enough to characterize interference sources. 3) Packet loss estimation: As we stated above, although the number of retries, bit rate, and FCS errors are affected by the current state of the wireless network, they often show very different statistics for each experiment set. We conjecture several reasons; the environment is not exactly the same in every experiment, the occurrence of packet loss is probabilistic rather than deterministic, and the individual variables fluctuate over time, affecting each other and leading to different statistics for a certain period of time. Therefore, it would be more reasonable to compare the combinations of these statistics together instead of investigating each variable individually and consider the distributions of the samples rather than their temporal changes. First, since the retries occur when the packets are lost as well as when FCS errors happen, we can estimate the amount of actual packet loss by subtracting the number of FCS errors from the number of retries (Equation ).
4 CONTENTION MICROWAVE OVEN EAs (a) The number of FCS errors per KB.8.6 CLEAN CONTENTION LOSS CLEAN AVAILABLE BITRATE (a) Bit rates and the estimated packet loss with different interference sources EAs (b) The number of estimated packet loss per KB Fig. 2: The CDFs of the number of FCS errors and packet loss. N P acketloss = N Retries N F CSerrors () We found that this estimated number of packet losses more reliably represents the level of interference than the individual statistics of retries and FCS errors. In other words, it showed relatively constant results on multiple experiments, while the others varied for each experiment. Figure 2b shows the cumulative distribution function (CDF) of the estimated number of packet loss, where it can be seen that a baby monitor (video transmitter) causes the most severe amount of packet loss while contention and cordless phones cause a relatively small amount of packet loss. Since baby monitors send video and audio data at the same time, they use more bandwidth than cordless phones that send audio only, thus causing more interference. Channel contention has less packet loss because of the 82. collision-avoidance functions such as random back-off and RTS/CTS that force each client to occupy the medium in separate time slots. In this case, the divided time slots caused the degradation of throughput, rather than noise from other sources. (The impact of a hidden terminal is not considered in this section.) Furthermore, we found that the correlation between bit rate and the estimated number of packet losses shows clearer differences among various problem sources. In Figure 3a, the majority of the samples from clean environment are distributed in a healthy zone (higher bit rate and low packet loss) while the samples of baby monitors and microwave ovens are widely dispersed on the coordinate plane. WiSlow uses the correlation of these two variables to distinguish the level of interference. Although the problem sources each have their own distribution patterns on the above scatter plot, an end user cannot infer a root cause by simply matching the measured statistics with the results of our experiments. This is because (b) Bit rates and the estimated packet loss with the same device, a baby monitor, in different environment Fig. 3: The distribution of the correlation of bit rates and the estimated packet loss the measurement of a wireless network is highly affected by the client s own environment such as distance from the AP, signal power, or fading (multi-path and shadowing). In other words, even though they have the same type of problem, the statistics of the measured metrics can vary depending on each end user s own situation. Note that this is the reason why simple measurements such as the higher-layer throughput (e.g., TCP or UDP) or number of 82. retries are not enough to identify the level of interference and the type of interferers. Therefore, to apply our approach to end users, it is important that the measured statistics are independent of the underlying environment. We found that even if the underlying environment changes, the extent of the area, where a set of samples (correlated packet loss and bit rate) are dispersed, remains similar if the problem source is the same. Figure 3b shows that even though the two groups of samples from discrete environments are distributed on different spots on the plane, their extent is similar. Thus, we first quantify how widely the samples are dispersed by calculating the Euclidean distances between each sample and the mean. Figure 4 compares the CDFs obtained from two experiments that were conducted with the same baby monitor in two discrete environments. The CDFs of packet loss estimation (Figure 4a) and bit rates (Figure 4b) show different distributions while the CDFs of the Euclidean distances of the samples to the mean show similar distribution (Figure 4c). Therefore, WiSlow can use the above CDFs of the distances to identify the root causes of network interference. We prepare these CDFs of each problem source in advance, which are obtained from our experiments. Then, WiSlow traces the
5 .8.6 Ex Ex2.8.6 Ex Ex2.8.6 Ex Ex EAs (a) The estimated number of packet loss MBps (b) Bit rates Distance (c) Distance Fig. 4: The CDFs obtained from two experiments with the same baby monitor in different environment. MB of UDP packets were transmitted from the AP and the values were sampled every KB Group3 Group Group Distance Fig. 5: The packet loss analysis groups the problem sources into three groups: ) a clean environment, 2) contention and FHSS cordless phones, and 3) microwave ovens and baby monitors wireless packets on an end user s machine, generates a CDF of the distances, and compares it to the pre-obtained CDFs of each problem source. For the convenience of identification, we group the problem sources into three groups by the shape of the CDFs: no interferers (group ), light interferers (group 2), and heavy interferers (group 3). Each group has its representative CDFs that are determined by multiple experiments (Figure 5). In our data sets, group indicates a clean environment, group 2 includes channel contention and FHSS cordless phones, and group 3 contains microwave ovens and baby monitors. WiSlow examines which representative CDF is the most similar one to the user s CDF. To compare the CDFs, WiSlow uses the Two-Sample KolmogorovSmirnov test (K-S test), a widely used statistical method that tests whether the two empirical CDFs obtained from separate experiments have the same distribution [9]. If the p-value of this test is close to, the two CDFs are likely to come from the same distribution, however, if the p-value is close to, they are likely to come from different distributions. Since the K-S test not only considers the average and variance of the samples but also takes into account the shape of the CDFs, it best fits the purpose of WiSlow where it is used to pick the most similar distribution from multiple data sets. B. ACK Pattern Analysis The first method is able to determine which type of loss pattern a problem source has. However, because multiple problem sources are categorized into each group, we need another method that further narrows down the root causes. In this section, we explain the second method, designed to distinguish several detailed characteristics of non-wifi devices such as frequency hopping and duty cycle. ) Probing method: WiSlow sends bulk UDP packets to the AP and counts the received 82. ACKs to check the quality of a wireless link within a given period. In order to detect patterns on the scale of milliseconds, we use a very small size of UDP packets (2 bytes) that reduces potential delays such as propagation and processing delays, and we transmit as many UDP packets as possible to reduce the intervals between samples. As a result, we received 7 ACKs per millisecond with an average number of 2.7 in a clean environment. In the following sections, we describe the results of the above method when performed with various non-wifi interferers, and we explain how WiSlow identifies the devices based on the results. 2) Duty cycle (microwave ovens): Microwave ovens generate severe interference in almost every channel of the 2.4 GHz band. We identify this heavy interferer using its duty cycle, which is the ratio of the active duration to the pulse period. It is known that the duty cycle of microwave ovens is fixed at.5 and the dwell time is 6.6 ms (6 Hz) 2 [7]. This implies that it stays in the ON mode (producing microwaves) for the first 8.3 ms and the OFF mode for the next 8.3 ms. This feature can be observed by various means such as using a spectrum analyzer [4] or by signal measurement []. Our hypothesis was that a user-level probe could also detect this on-off pattern if the network packets were monitored on a millisecond timescale because the packets would be lost only when the interferer was active (on mode). To validate this assumption, we implemented the above method and plotted the number of successfully received 82. ACKs per millisecond. As a result, a clearly perceptible waveform with a.5 duty cycle is observed in Figure 6a; the number of ACKs is over five for the first 8 ms and zero during the next 8 ms. This pattern repeats while the microwave oven is running. This result becomes clearer when it is converted to the frequency domain (Figure 6b). The highest peak is at 6 Hz, which means the exact cycle is 6.6 ms. This number is exactly the same as the known duty cycle of microwave ovens. Consequently, if a perceptible cycle is detected from this probing method and the period matches a well-known value, WiSlow determines that the current interference is due to a 2 This frequency could be 5 Hz in other countries (e.g., Europe and most of Asia) where 5 Hz AC power is used.
6 Magnitude EAs Time x 4 (a) Time domain (Microwave oven) Magnitude 6 x (b) domain (Microwave oven) (c) Time domain (Microwave oven) - top frequencies Fig. 6: The number of 82. ACKs per KB of UDP packets with interference of a microwave oven particular type of device (e.g., 6 Hz for microwave ovens). 3) hopping (baby monitors): The duty cycle of typical video transmitters such as wireless camera is known as one []. It means that they send and receive data constantly, implying that they continuously interfere with WiFi networks without any off period. Baby monitors, which transmit video and audio data constantly, also have a similar characteristic. Therefore, intuitively, we do not expect to observe similar ACK patterns as those observed in the microwave oven experiment. However, when converting the plot from the time domain to the frequency domain, we observe another notable pattern. Figure 7a shows that there are multiple high peaks set apart by a specific interval, i.e., 43 Hz (occurring at 43, 86, 29, and 72 Hz). This is in contrast to the microwave ovens that showed only one significantly high peak at 6 Hz (Figure 6b). We conjecture that these peaks are caused by frequency hopping; a frequency hopper switches its frequency periodically, and interference occurs when it hops to a nearby frequency of the current WiFi channel. However, the frequency-hopping device does not necessarily return to the same frequency at a regular period because the frequency of the next hop is randomly chosen. This randomness instead creates diverse cycles with different periods. However, these periods are multiples of a specific number due to the fixed hopping interval. For clarity, we plot a quantized time-domain graph (Figure 7b) that is converted back from the frequency-domain graph. We used the highest frequencies from Figure 7a. In the time-domain graph, the number of ACKs (y-axis) fluctuates periodically, however, note that the heights of the peaks vary. The possible explanation is as follows: the number of ACKs is large when the device hops far from the current WiFi channel and is relatively small when it hops to a nearby frequency. If the device hops into the exact range of the WiFi channel, the number of 82. ACKs drops almost to zero. In other words, there are multiple levels of interference, which depend on how closely in frequency the device hops to the frequency used by the WiFi channel. These multiple levels of interference create several pulses that have different magnitudes and frequencies. Finally, because the hopping interval is fixed, the frequencies of the created pulses are synchronized such that the periods of the cycles are multiples of a specific value. Consequently, we can distinguish frequency-hopping devices by determining whether the number of 82. ACKs has multiple high peaks with a certain interval in the frequency domain. We check this by linear regression of the peak frequencies; if the correlation coefficient is greater than.9, Magnitude 6 x (a) A baby monitor: frequency domain Magnitude 6 x (c) A cordless phone: frequency domain (b) A baby monitor: time domain - top frequencies (d) A cordless phone: time domain - top frequencies Fig. 7: The number of 82. ACKs per KB of UDP packets with a baby monitor and a cordless phone we consider it to be a frequency-hopping device. However, it is obvious that we cannot conclude that every frequency-hopping device is a specific type of device such as a baby monitor. Therefore, WiSlow needs to take into account the results of both the first method and this second method to identify the problem source precisely. For example, if a problem source is classified as group 3 (by the first method) and a frequency hopper (by the second method), we consider it to be a baby monitor. Of course, it is still possible that another type of device not discussed in this study has the same characteristics as a baby monitor. We discuss this case in Section??. 4) Fixed frequency (analog cordless phones): Typical analog cordless phones use a fixed frequency, so they usually interfere only with a small number of channels. (The analog phones we tested only interfered with Channel.) Because they do not change frequency, severe interference occurs if the current WiFi channel overlaps with the frequency of the phone. In addition, their duty cycle is usually one, which implies that no ACK cycle exists. In our experiments, the
7 No Interference Interference Source Loss Type = A Loss Type = B Packet Analysis Probe 3 Clean Contention WiFi Interference A Probe B Audio (Voice) Loss Type = B, ACK Cycle = hopping Hopping Non-WiFi Interference Fixed Fixed ACK cycle (duty cycle = a, a<) Probe 2 Video + Audio (Voice) Loss Type = C, ACK Cycle = hopping No ACK cycle (duty cycle = ) Fig. 8: The classification of problem sources by WiSlow s methods UDP throughput stayed very low and no explicit ACK cycle (no hopping) was observed, as expected. Therefore, WiSlow determines an analog cordless phone as the interferer if there is severe UDP throughput degradation but no explicit ACK cycle or duty cycle is detected. However, this could be true of other fixed frequency devices such as wireless video cameras that are not discussed in this paper. Currently, when WiSlow detects this type of device, it informs the user that a fixed frequency device has been detected, and suggests that several devices could be the cause, such as analog cordless phones and wireless video cameras. 5) Mixed (hopping and duty cycle): A Hopping Spread Spectrum (FHSS) phone is another example of a device that explicitly shows the hopping patterns that we described above. In addition, it is known that some FHSS phones have a specific pulse interval, which was verified by Rayanchu et al. [] using signal measurement. We also confirmed this feature with our user-level probes. Figure 7c shows the frequency domain of 82. ACKs. It shows similar patterns as the microwave ovens (low duty cycle devices) rather than the baby monitors (frequency-hopping devices) even though it also uses frequency hopping. This is because the duty cycle influences the shape of the waveform more than the hopping effect. Therefore, it is possible to use this duty cycle to distinguish the FHSS cordless phones as we did for the microwave ovens. In this case, we use the frequencies, and 2 Hz, to determine the FHSS cordless phone interference. However, to the best of our knowledge, there is no standard regarding the period of the duty cycle for FHSS cordless phones. This means it can vary depending on the product. Therefore, if a duty cycle is detected but the period is an unknown value, WiSlow fails to identify the exact product type. In this case, we provide our best estimate of the problem source by listing a possible set of candidates. V. LOCATING INTERFERING DEVICES Once WiSlow detects non-wifi interference and identifies the type of device causing it, the next step is to locate its physical location. Device localization has been investigated intensively in many research fields. A number of research studies on indoor location tracking have tried to pinpoint the location of client laptops or smartphones using various meth- Fig. 9: Probing for localizing an interference source ods cite. WiFiNet [] pinpoints the location of the interference source using multiple APs that use Airshark []. Although we leverage a similar cooperative diagnosis approach, we focus on the collaboration of multiple end users instead of APs. However, it is not easy to pinpoint the exact physical location of the source by end users because they cannot obtain precise signal information. Instead, we attempt to infer the relative location of the problem source. The basic mechanism is that an end user (probing client) first requests multiple cooperative clients to perform WiSlow diagnostics as described in previous sections. Then it checks whether the other client machines observe the same interference as itself. If all the cooperative client machines observe a particular type of interference at the same time, it is likely that the problematic source is close to the AP because this would affect the entire wireless network. However, if only one of the clients observes the interference, the source is highly likely to be located close to that client. A. Cooperative Probing Figure 9 illustrates the details of the cooperative probing approach. We assume that the clients already have WiSlow installed and have contact information of the others, i.e., IP address and port number. Each probing process takes about 3-4 s; thus, it took a few minutes to collect the results from the three clients in our experiment. Then, WiSlow checks whether the other clients have also detected the same type of interference. VI. RELATED WORK Airshark [] uses a commodity WiFi network adapter to identify interference sources. It leverages a spectral scan to obtain signal information from multiple frequency ranges. It identifies the interference sources very accurately (over 95) by analyzing the spectrum data using various methods. However, it is not easy to apply this approach for typical end users because collecting high-resolution signal samples across the spectrum is impossible if the network card does not support this functionality. WiFiNet [] identifies the impact of non-wifi interference and finds its location using observations from multiple APs that are running Airshark. Although the authors briefly mention that WiFiNet could be used by end users, they focus more on building infrastructure using APs, while WiSlow focuses on end users and their cooperation to identify the location of the interference source.
8 Kanuparthy et al. [8] proposed an approach similar to WiSlow in terms of using user-level information to identify interference sources. They distinguished congestion (channel contention) by measuring the one-way delay of different sizes of packets. Then, they investigated the delay patterns to distinguish a hidden terminal from a weak signal. While this study focused on congestion, weak signals, and hidden terminals, WiSlow focuses on not only congestion and signals but also the detailed identification of non-wifi interference sources. VII. CONCLUSION We designed WiSlow, a WiFi performance trouble shooting application, specialized to detect non-wifi interferences. WiSlow distinguishes 82. channel contention from non-wifi interference and identifies the type of interfering devices. We introduced two main methods: packet loss analysis and 82. ACK pattern analysis. These methods uses user-accessible packet trace information such as UDP and 82. ACKs. In addition, WiSlow leverages peer collaboration to identify the physical location of the sources of WiFi performance degradation. REFERENCES [] AirMaestro. [Online; accessed May 23]. [2] AirSleuth. [Online; accessed May 23]. [3] Radiotap. [Online; accessed May 23]. [4] Wi-Spy. [Online; accessed May 23]. [5] WLAN packet capture. [Online; accessed May 23]. [6] S. Gollakota, F. Adib, D. Katabi, and S. Seshan. Clearing the RF smog: making 82.n robust to cross-technology interference. In Proc. of ACM SIGCOMM, Toronto, Ontario, Canada, Aug. 2. [7] A. Kamerman and N. Erkocevic. Microwave oven interference on wireless lans operating in the 2.4 GHz ISM band. In Proc. of PIMRC 97, Helsinki, Finland, Sep [8] P. Kanuparthy, C. Dovrolis, K. Papagiannaki, S. Seshan, and P. Steenkiste. Can user-level probing detect and diagnose common home-wlan pathologies. Computer Communication Review, 42():7 5, 22. [9] F. J. Massey Jr. The Kolmogorov-Smirnov test for goodness of fit. Journal of the American statistical Association, 46(253):68 78, 95. [] S. Rayanchu, A. Patro, and S. Banerjee. Airshark: Detecting non-wifi RF devices using commodity WiFi hardware. In Proc. of ACM IMC, Berlin, Germany, Nov. 2. [] S. Rayanchu, A. Patro, and S. Banerjee. Catching whales and minnows using WiFiNet: Deconstructing non-wifi interference using WiFi hardware. In Proc. of USENIX NSDI 2, San Jose, CA, USA, Apr. 22. [2] A. Vlavianos, L. K. Law, I. Broustis, S. V. Krishnamurthy, and M. Faloutsos. Assessing link quality in IEEE 82. wireless networks: Which is the right metric? In Proc. of PIMRC 8, Cannes, France, Sep. 28.
WiSlow: A Wi-Fi Network Performance Troubleshooting Tool for End Users
WiSlow: A Wi-Fi Network Performance Troubleshooting Tool for End Users Kyung-Hwa Kim, Hyunwoo Nam and Henning Schulzrinne Department of Computer Science, Columbia University, New York, NY Department of
Optimizing Wireless Networks.
from the makers of inssider Optimizing Wireless Networks. Over the past few years, MetaGeek has created tools to help users optimize their wireless networks. MetaGeek s tools help visualize the physical
COAP: A Software-Defined Approach for Managing Residential Wireless Gateways
COAP: A Software-Defined Approach for Managing Residential Wireless Gateways 1 OVERVIEW Wireless gateways (eg, Access Points, wireless Set-Top Boxes) act as the primary mode of internet access in most
Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction
Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit
Lab Exercise 802.11. Objective. Requirements. Step 1: Fetch a Trace
Lab Exercise 802.11 Objective To explore the physical layer, link layer, and management functions of 802.11. It is widely used to wireless connect mobile devices to the Internet, and covered in 4.4 of
The ArubaOS Spectrum Analyzer Module
Tech Brief Enterprise The ArubaOS Spectrum Analyzer Module The ArubaOS Spectrum Analyzer Module Tech Brief Table of Contents Introduction... 2 Visibility into the non-802.11 Spectrum... 2 Features... 3
Interference Identification Guide. Table of Contents
Interference Identification Guide This document is a guide to help IT professionals optimize the performance of wireless networks by using spectrum analysis tools to identify sources of wireless interference.
Unmatched RF Spectrum Analysis
Datasheet: AirMagnet Spectrum XT AirMagnet Spectrum XT is the industry s first professional spectrum analyzer solution that combines in-depth RF analysis with real-time WLAN information for quicker and
Performance Measurement of Wireless LAN Using Open Source
Performance Measurement of Wireless LAN Using Open Source Vipin M Wireless Communication Research Group AU KBC Research Centre http://comm.au-kbc.org/ 1 Overview General Network Why Network Performance
Bluetooth voice and data performance in 802.11 DS WLAN environment
1 (1) Bluetooth voice and data performance in 802.11 DS WLAN environment Abstract In this document, the impact of a 20dBm 802.11 Direct-Sequence WLAN system on a 0dBm Bluetooth link is studied. A typical
Wi-Fi and Bluetooth - Interference Issues
Wi-Fi and Bluetooth - Interference Issues January 2002 1 Introduction Because both Wi-Fi and Bluetooth wireless technology share spectrum and will often be located in close physical proximity to one another,
SmartDiagnostics Application Note Wireless Interference
SmartDiagnostics Application Note Wireless Interference Publication Date: May 27, 2015 KCF Technologies, Inc. Background The SmartDiagnostics wireless network is an easy to install, end-to-end machine
CS263: Wireless Communications and Sensor Networks
CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA
Frequency Hopping Spread Spectrum (FHSS) vs. Direct Sequence Spread Spectrum (DSSS) in Broadband Wireless Access (BWA) and Wireless LAN (WLAN)
FHSS vs. DSSS page 1 of 16 Frequency Hopping Spread Spectrum (FHSS) vs. Direct Sequence Spread Spectrum (DSSS) in Broadband Wireless Access (BWA) and Wireless LAN (WLAN) by Sorin M. SCHWARTZ Scope In 1997
Omni Antenna vs. Directional Antenna
Omni Antenna vs. Directional Antenna Document ID: 82068 Contents Introduction Prerequisites Requirements Components Used Conventions Basic Definitions and Antenna Concepts Indoor Effects Omni Antenna Pros
Do You See What I See (DYSWIS)
Do You See What I See (DYSWIS) Introduction: DYSWIS is a system that leverages distributed network nodes to gather network management information for fault isolation and diagnosis. This project extends
Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh
Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh, Ph.D. [email protected] Mesh 2008, Cap Esterel, France 1 Abstract Abundant hidden node collisions and correlated channel access
VOICE OVER WI-FI CAPACITY PLANNING
VOICE OVER WI-FI CAPACITY PLANNING Version 1.0 Copyright 2003 Table of Contents Introduction...3 Wi-Fi RF Technology Options...3 Spectrum Availability and Non-Overlapping Wi-Fi Channels...4 Limited
Lecture 17: 802.11 Wireless Networking"
Lecture 17: 802.11 Wireless Networking" CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Lili Qiu, Nitin Vaidya Lecture 17 Overview" Project discussion Intro to 802.11 WiFi Jigsaw discussion
Real-Time Spectrum Analysis for Troubleshooting 802.11n/ac WLAN Devices
Real-Time Spectrum Analysis for Troubleshooting 802.11n/ac WLAN Devices Application Brief 802.11 WLAN devices operate in the license-exempt 2.4 GHz ISM and 5 GHz UNII bands, where they must share spectrum
Broadband Networks. Prof. Dr. Abhay Karandikar. Electrical Engineering Department. Indian Institute of Technology, Bombay. Lecture - 29.
Broadband Networks Prof. Dr. Abhay Karandikar Electrical Engineering Department Indian Institute of Technology, Bombay Lecture - 29 Voice over IP So, today we will discuss about voice over IP and internet
WLAN Spectrum Analyzer Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 2013-05-10
WLAN Spectrum Analyzer Technology White Paper Issue 01 Date 2013-05-10 HUAWEI TECHNOLOGIES CO., LTD. 2013. All rights reserved. No part of this document may be reproduced or transmitted in any form or
THE BCS PROFESSIONAL EXAMINATIONS BCS Level 5 Diploma in IT. October 2009 EXAMINERS' REPORT. Computer Networks
THE BCS PROFESSIONAL EXAMINATIONS BCS Level 5 Diploma in IT October 2009 EXAMINERS' REPORT Computer Networks General Comments The responses to questions were of marginally better quality than April 2009
Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman
1 Wireless Networks Reading: Sec5on 2.8 COS 461: Computer Networks Spring 2011 Mike Freedman hep://www.cs.princeton.edu/courses/archive/spring11/cos461/ 2 Widespread Deployment Worldwide cellular subscribers
Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks
Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks 1 Mr. Praveen S Patil, 2 Mr. Rabinarayan Panda, 3 Mr. Sunil Kumar R D 1,2,3 Asst. Professor, Department of MCA, The Oxford College of Engineering,
VOIP under: WLAN 802.11g. VS Telephone Landline. ENSC 427 Team 1 Luke Dang [email protected] Jason Tsai [email protected] Jeffrey Tam jta6@sfu.
VOIP under: WLAN 802.11g and Ethernet connection VS Telephone Landline ENSC 427 Team 1 Luke Dang [email protected] Jason Tsai [email protected] Jeffrey Tam [email protected] Project Website: www.sfu.ca/~kta2 2 Introduction
Algorithms for Interference Sensing in Optical CDMA Networks
Algorithms for Interference Sensing in Optical CDMA Networks Purushotham Kamath, Joseph D. Touch and Joseph A. Bannister {pkamath, touch, joseph}@isi.edu Information Sciences Institute, University of Southern
Wireless Network Standard and Guidelines
Wireless Network Standard and Guidelines Purpose The standard and guidelines listed in this document will ensure the uniformity of wireless network access points and provide guidance for monitoring, maintaining
Wireless LAN Concepts
Wireless LAN Concepts Wireless LAN technology is becoming increasingly popular for a wide variety of applications. After evaluating the technology, most users are convinced of its reliability, satisfied
Centralized WLAN Troubleshooting
WHITE PAPER Centralized WLAN Troubleshooting Maximizing Wireless Network Availability Wireless Local Area Networks (WLAN) have proliferated within the enterprise. The business efficiencies realized though
APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM
152 APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM A1.1 INTRODUCTION PPATPAN is implemented in a test bed with five Linux system arranged in a multihop topology. The system is implemented
A TCP-like Adaptive Contention Window Scheme for WLAN
A TCP-like Adaptive Contention Window Scheme for WLAN Qixiang Pang, Soung Chang Liew, Jack Y. B. Lee, Department of Information Engineering The Chinese University of Hong Kong Hong Kong S.-H. Gary Chan
Dynamic Reconfiguration & Efficient Resource Allocation for Indoor Broadband Wireless Networks
Dynamic Reconfiguration & Efficient Resource Allocation for Indoor Broadband Wireless Networks Tim Farnham, Brian Foxon* Home Communications Department HP Laboratories Bristol HPL-98-123 June, 1998 broadband,
Site Survey and RF Design Validation
CHAPTER 8 Site Survey Introduction In the realm of wireless networking, careful planning is essential to ensure that your wireless network performs in a manner that is consistent with Cisco s design and
Measuring the service level in the 2.4 GHz ISM band
Measuring the service level in the 2.4 GHz ISM band Internal report Jan-Willem van Bloem and Roel Schiphorst University of Twente Department of Electrical Engineering, Mathematics & Computer Science (EEMCS)
CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs)
CS6956: Wireless and Mobile Networks Lecture Notes: //05 IEEE 80. Wireless Local Area Networks (WLANs) CSMA/CD Carrier Sense Multi Access/Collision Detection detects collision and retransmits, no acknowledgement,
WLAN Positioning Technology White Paper
WLAN Positioning Technology White Paper Issue 1.0 Date 2014-04-24 HUAWEI TECHNOLOGIES CO., LTD. 2014. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any
White Paper. Wireless Network Considerations for Mobile Collaboration
White Paper Wireless Network Considerations for Mobile Collaboration Table of Contents I. Introduction... 3 II. Wireless Considerations... 4 Channel Selection... 4 Interference... 4 Coverage... 5 Covering
Clearing the Way for VoIP
Gen2 Ventures White Paper Clearing the Way for VoIP An Alternative to Expensive WAN Upgrades Executive Overview Enterprises have traditionally maintained separate networks for their voice and data traffic.
TamoSoft Throughput Test
TAKE CONTROL IT'S YOUR SECURITY TAMOSOFT df TamoSoft Throughput Test Help Documentation Version 1.0 Copyright 2011-2014 TamoSoft Contents Contents... 2 Introduction... 3 Overview... 3 System Requirements...
FORTH-ICS / TR-375 March 2006. Experimental Evaluation of QoS Features in WiFi Multimedia (WMM)
FORTH-ICS / TR-375 March 26 Experimental Evaluation of QoS Features in WiFi Multimedia (WMM) Vasilios A. Siris 1 and George Stamatakis 1 Abstract We investigate the operation and performance of WMM (WiFi
Universal Form-factor. Wi Fi Troubleshooting Made Easy
AirMedic USB AirMedic USB is a powerful, easy-touse and affordable spectrum analysis tool that brings Wi-Fi troubleshooting to entry-level users. Built upon AirMagnet expertise in Wi-Fi troubleshooting,
Protocolo IEEE 802.15.4. Sergio Scaglia SASE 2012 - Agosto 2012
Protocolo IEEE 802.15.4 SASE 2012 - Agosto 2012 IEEE 802.15.4 standard Agenda Physical Layer for Wireless Overview MAC Layer for Wireless - Overview IEEE 802.15.4 Protocol Overview Hardware implementation
Analysis of Immunity by RF Wireless Communication Signals
64 PIERS Proceedings, Guangzhou, China, August 25 28, 2014 Analysis of Immunity by RF Wireless Communication Signals Hongsik Keum 1, Jungyu Yang 2, and Heung-Gyoon Ryu 3 1 EletroMagneticwave Technology
CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006
CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)
Airshark: Detecting Non-WiFi RF Devices using Commodity WiFi Hardware
Airshark: Detecting Non-WiFi RF Devices using Commodity WiFi Hardware Shravan Rayanchu, Ashish Patro, Suman Banerjee {shravan, patro, suman}@cs.wisc.edu University of Wisconsin, Madison, USA ABSTRACT In
Intelligent Channel Bonding in 802.11n WLANs
Intelligent Channel Bonding in 82.n WLANs Lara Deek, Eduard Garcia-Villegas, Elizabeth Belding, Sung-Ju Lee, Kevin Almeroth UC Santa Barbara, UPC-BarcelonaTECH, Narus Inc. [email protected], [email protected],
Enabling third-party apps in home gateways for. (through virtualization, edge computing, SDN, and RF management) Suman Banerjee ([email protected].
Enabling third-party apps in home gateways for and (through virtualization, edge computing, SDN, and RF management) Suman Banerjee ([email protected]) 1 IoT and smart home apps IoT and smart home apps
Dynamic Load Balance Algorithm (DLBA) for IEEE 802.11 Wireless LAN
Tamkang Journal of Science and Engineering, vol. 2, No. 1 pp. 45-52 (1999) 45 Dynamic Load Balance Algorithm () for IEEE 802.11 Wireless LAN Shiann-Tsong Sheu and Chih-Chiang Wu Department of Electrical
Scanning Delays in 802.11 Networks
Scanning Delays in 802.11 Networks David Murray Murdoch University [email protected] Michael Dixon Murdoch University [email protected] Terry Koziniec Murdoch University [email protected]
Hacking. Aims. Naming, Acronyms, etc. Sources
Free Technology Workshop Hacking Hands on with wireless LAN routers, packet capture and wireless security Organised by Steven Gordon Bangkadi 3 rd floor IT Lab 10:30-13:30 Friday 18 July 2014 http://ict.siit.tu.ac.th/moodle/.-----.-----.-----..----.
Characterizing Wireless Network Performance
Characterizing Wireless Network Performance Ruckus Wireless Black Paper Accurate performance testing for wireless networks requires understanding how to test for worst case scenarios As expensive and inconvenient
How To Determine The Capacity Of An 802.11B Network
Capacity of an IEEE 802.11b Wireless LAN supporting VoIP To appear in Proc. IEEE Int. Conference on Communications (ICC) 2004 David P. Hole and Fouad A. Tobagi Dept. of Electrical Engineering, Stanford
ALLION USA INTERNET SERVICE PROVIDER WIRELESS GATEWAY COMPETITIVE ANALYSIS
ALLION USA INTERNET SERVICE PROVIDER WIRELESS GATEWAY COMPETITIVE ANALYSIS Date: 4/25/2013 Rev 1.0 Visit our Web Site at: www.allionusa.com 1 Introduction Internet Service Providers (ISP) have a number
Crestron Best Practices for Installation and Setup of Crestron RF Products Reference Guide
Crestron Best Practices for Installation and Setup of Crestron RF Products Reference Guide The specific patents that cover Crestron products are listed at patents.crestron.com. Crestron, the Crestron logo,
ZyXEL Smart Antenna - The solution to Wi-Fi challenges
ZyXEL Smart Antenna - The solution to Wi-Fi challenges White Paper Edition 1, Apr/2015 2 0 1 5 Z y X E L C o m m u n i c a t i o n s C o r p o r a t i o n, A l l R i g h t s R e s e r v e d. Executive
Final for ECE374 05/06/13 Solution!!
1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -
AN1200.04. Application Note: FCC Regulations for ISM Band Devices: 902-928 MHz. FCC Regulations for ISM Band Devices: 902-928 MHz
AN1200.04 Application Note: FCC Regulations for ISM Band Devices: Copyright Semtech 2006 1 of 15 www.semtech.com 1 Table of Contents 1 Table of Contents...2 1.1 Index of Figures...2 1.2 Index of Tables...2
Expert Reference Series of White Papers. Wireless Bandwidth Not Necessarily as Advertised 1-800-COURSES. www.globalknowledge.com
Expert Reference Series of White Papers Wireless Bandwidth Not Necessarily as Advertised 1-800-COURSES www.globalknowledge.com Wireless Bandwidth Not Necessarily as Advertised Ted Rohling, Global Knowledge
communication over wireless link handling mobile user who changes point of attachment to network
Wireless Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers! computer nets: laptops, palmtops, PDAs, Internet-enabled phone promise anytime untethered Internet
White Paper. D-Link International Tel: (65) 6774 6233, Fax: (65) 6774 6322. E-mail: [email protected]; Web: http://www.dlink-intl.
Introduction to Voice over Wireless LAN (VoWLAN) White Paper D-Link International Tel: (65) 6774 6233, Fax: (65) 6774 6322. Introduction Voice over Wireless LAN (VoWLAN) is a technology involving the use
Dynamic Source Routing in Ad Hoc Wireless Networks
Dynamic Source Routing in Ad Hoc Wireless Networks David B. Johnson David A. Maltz Computer Science Department Carnegie Mellon University 5000 Forbes Avenue Pittsburgh, PA 15213-3891 [email protected] Abstract
Quality of Service Testing in the VoIP Environment
Whitepaper Quality of Service Testing in the VoIP Environment Carrying voice traffic over the Internet rather than the traditional public telephone network has revolutionized communications. Initially,
D1.2 Network Load Balancing
D1. Network Load Balancing Ronald van der Pol, Freek Dijkstra, Igor Idziejczak, and Mark Meijerink SARA Computing and Networking Services, Science Park 11, 9 XG Amsterdam, The Netherlands June [email protected],[email protected],
CHAPTER 1 1 INTRODUCTION
CHAPTER 1 1 INTRODUCTION 1.1 Wireless Networks Background 1.1.1 Evolution of Wireless Networks Figure 1.1 shows a general view of the evolution of wireless networks. It is well known that the first successful
Multichannel Virtual Access Points for Seamless Handoffs in IEEE 802.11 Wireless Networks
Multichannel Virtual Access Points for Seamless Handoffs in IEEE 8. Wireless Networks Maria Eugenia Berezin, Franck Rousseau, Andrzej Duda Grenoble Institute of Technology, CNRS Grenoble Informatics Laboratory
Wireless Home Networks based on a Hierarchical Bluetooth Scatternet Architecture
Wireless Home Networks based on a Hierarchical Bluetooth Scatternet Architecture W. Lilakiatsakun'. 2, A. Seneviratne' I School of Electrical Engineering and Telecommunication University of New South Wales,
10. Wireless Networks
Computernetzwerke und Sicherheit (CS221) 10. Wireless Networks 1. April 2011 omas Meyer Departement Mathematik und Informatik, Universität Basel Chapter 6 Wireless and Mobile Networks (with changes CS221
Wireless Technologies for Automation
Wireless Technologies for Automation Prof. Dr.-Ing. Jörg F. Wollert Wireless Technologies for Automation Why using wireless communication? Pros and cons in wireless networks Embedded Wireless Hardware
Multicast Video Streaming over WiFi Networks: Impact of Multipath Fading and Interference
Multicast Video Streaming over WiFi Networks: Impact of Multipath Fading and Interference Shafqat Ur Rehman, Thierry Turletti, and Walid Dabbous INRIA Sophia Antipolis, France {shafqat-ur.rehman, thierry.turletti,
Wi-Fi Capacity Analysis for 802.11ac and 802.11n: Theory & Practice
Wi-Fi Capacity Analysis for 802.11ac and 802.11n: Theory & Practice By Timo Vanhatupa, Ph.D. Senior Research Scientist at Ekahau Contents Introduction Why capacity matters with Wi-Fi... 3 Part 1: Modeling
High-Density Wi-Fi. Application Note
High-Density Wi-Fi Application Note Table of Contents Background... 3 Description... 3 Theory of Operation... 3 Application Examples... Tips and Recommendations... 7 2 Background One of the biggest challenges
Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks
Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks Ayman Wazwaz, Computer Engineering Department, Palestine Polytechnic University, Hebron, Palestine, [email protected] Duaa sweity
Rapid Prototyping of a Frequency Hopping Ad Hoc Network System
Rapid Prototyping of a Frequency Hopping Ad Hoc Network System Martin Braun, Nico Otterbach, Jens Elsner, and Friedrich K. Jondral Communications Engineering Lab, Karlsruhe Institute of Technology (KIT),
TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)
TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) *Slides adapted from a talk given by Nitin Vaidya. Wireless Computing and Network Systems Page
PERFORMANCE ANALYSIS OF LOW RATE WIRELESS TECHNOLOGIES FOR MEDICAL APPLICATIONS. N. Golmie, D. Cypher, O. Rebala
PERFORMANCE ANALYSIS OF LOW RATE WIRELESS TECHNOLOGIES FOR MEDICAL APPLICATIONS N. Golmie, D. Cypher, O. Rebala National Institute of Standards and Technology, 100 Bureau Drive, Gaithersburg, Maryland
NetComm Wireless NP920 Dual Band WiFi USB Adapter. User Guide
NetComm Wireless NP920 Dual Band WiFi USB Adapter User Guide Contents Preface... 3 Important Safety Instructions... 3 Introduction... 4 Overview... 4 Features... 4 Package Contents... 5 Minimum System
Spectrum Analysis How-To Guide
Spectrum Analysis How-To Guide MOTOROLA SOLUTIONS and the Stylized M Logo are registered in the US Patent & Trademark Office. Motorola Solutions, Inc. 2012. All rights reserved. Spectrum Analysis 3 Contents
An Experimental Study of Throughput for UDP and VoIP Traffic in IEEE 802.11b Networks
An Experimental Study of Throughput for UDP and VoIP Traffic in IEEE 82.11b Networks Sachin Garg [email protected] Avaya Labs Research Basking Ridge, NJ USA Martin Kappes [email protected] Avaya Labs Research
Measure wireless network performance using testing tool iperf
Measure wireless network performance using testing tool iperf By Lisa Phifer, SearchNetworking.com Many companies are upgrading their wireless networks to 802.11n for better throughput, reach, and reliability,
Unlicensed Mobile Access (UMA) Handover and Packet Data Performance Analysis
Unlicensed Mobile Access (UMA) Handover and Packet Data Performance Analysis Andres Arjona Nokia Siemens Networks [email protected] Hannu Verkasalo Helsinki University of Technology [email protected]
High-Speed TCP Performance Characterization under Various Operating Systems
High-Speed TCP Performance Characterization under Various Operating Systems Y. Iwanaga, K. Kumazoe, D. Cavendish, M.Tsuru and Y. Oie Kyushu Institute of Technology 68-4, Kawazu, Iizuka-shi, Fukuoka, 82-852,
Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation
Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation Changsu Suh, Young-Bae Ko, and Jai-Hoon Kim Graduate School of Information and Communication, Ajou University, Republic of Korea
Admission Control for VoIP Traffic in IEEE 802.11 Networks
Admission Control for VoIP Traffic in IEEE 802.11 Networks Sachin Garg Avaya Labs Basking Ridge, NJ 07920 Email: [email protected] Martin Kappes Avaya Labs Basking Ridge, NJ 07920 Email: [email protected]
Wireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ
Wireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ Q: What is a Wireless LAN (WLAN)? Q: What are the benefits of using a WLAN instead of a wired network connection? Q: Are Intel WLAN products
Security in Wireless Local Area Network
Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET 2006) Breaking Frontiers and Barriers in Engineering: Education, Research and Practice 21-23 June
Best Practices for Wireless Site Design
Best Practices for Wireless Site Design A Technology Whitepaper Table of ContentS Are Site Surveys Really Required? 1 AirMagnet Approach to Wireless Site Design 1 Phase I: Preparation Phase 1 Phase II:
Network Simulation Traffic, Paths and Impairment
Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating
Wireless Medical Telemetry Laboratory
Wireless Medical Telemetry Laboratory 0 Introduction The development of wireless medical telemetry has become an increasingly popular application in recent years. As the elderly population continues to
WI-FI VS. BLUETOOTH TWO OUTSTANDING RADIO TECHNOLOGIES FOR DEDICATED PAYMENT APPLICATION
WI-FI VS. BLUETOOTH TWO OUTSTANDING RADIO TECHNOLOGIES FOR DEDICATED PAYMENT APPLICATION Ingenico is often asked: what are the differences between Bluetooth and Wi-Fi technologies, which is the best one,
Bandwidth Estimation using Passive Monitoring for WLANs Case Study Report
Bandwidth Estimation using Passive Monitoring for WLANs Case Study Report Investing in the future by working together for a sustainable and competitive region Bandwidth Estimation using Passive Monitoring
II. IEEE802.11e EDCA OVERVIEW
The 18th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC'7) CACITY IMPROVEMENT OF WIRELESS LAN VOIP USING DISTRIBUTED TRANSMISSION SCHEDULING Kei Igarashi,
