Honours Project Report. Smart Wireless Mesh Network

Size: px
Start display at page:

Download "Honours Project Report. Smart Wireless Mesh Network"

Transcription

1 Honours Project Report Smart Wireless Mesh Network Routing using I-BATMAN Richard Maliwatu Supervised by: Dr. Antoine Bagula Category Min Max Chosen 1 Requirement Analysis and Design Theoretical Analysis Experiment Design and Execution System Development and implementation Results, Findings and Conclusion Aim Formulation and Background Work Quality of Report Writing and Presentation Adherence to Project Proposal and Quality of Deliverables Overall general project evaluation Total Marks Department of Computer Science University of Cape Town 2012

2 Abstract The traditional wireless mesh networks are made up of nodes consisting of a single fixed communication channel for routing traffic. These nodes operate in the heavily congested ISM band and are affected by interference from other devices operating in the same frequency band. Despite the dynamicity of the environment, the traditional wireless mesh nodes are unable to vary their transmission and reception parameters such as transmit-power, carrier-frequency, and modulation strategy. On the other hand, the new paradigm of wireless mesh networks consists of smart nodes that are capable of sensing their spectral environment. The sensed information can be shared with other nodes and harnessed to optimize for some overall goal such as, achieving a cognitive routing model, network capacity or minimizing interference with other signals. In this report we investigate ways of quantifying the amount of interference being experienced by a particular node. We do this by considering the wireless network interface card properties which vary with changes in the wireless environment. For simplicity, we focus on locally measurable quantities using commodity wireless network interface cards. This includes, the RSSI, noise and channel busy time for a given interval. We observe from the experiment results that RSSI stays almost constant despite a significant increase in the amount of radio frequency interference. We also calculate the channel busy fraction from the channel busy time for a given time interval. We observe a sharp rise in the channel busy fraction as we increase the activity of the interferer. Using the hello packets of the existing protocol called Better Approach to Mobile Ad hoc Networking (BATMAN), information gathered from the nodes environment is piggybacked. We refer to the resulting protocol as Interference-aware BATMAN (I-BATMAN). Each node keeps a log of the received interference information about all its neighbours. When forwarding packets, the node uses the extra information about its neighbours to penalise links that are experiencing high levels of interference. We compare the performance of BATMAN and I-BATMAN: I- BATMAN outperforms BATMAN by a margin in terms of reduced packet delay but at the expense of increased packet loss.

3 Table of Contents 1 Introduction Background Routing in wireless mesh networks Cognitive nodes Cognitive routing Frequency management Interference in networks Interference models Signal strength values Measuring interference A general model of wireless interference COIM MIC iaware Discussion of the reviewed literature Adopted interference model Conclusion on the background chapter Design Introduction Design constraints Software and hardware needed for implementation Mesh network Mesh nodes Multi-radio configuration Interference estimation and metric design.. 18 i

4 3.5 Experiment design Exposing nodes to controlled interference Interference aware routing Interference mitigation Design summary Implementation Introduction Mesh node hardware specification Mode of operation Mesh node software specification Bridging the gap between kernel space driver and the user-space program Interference measurement Link quality indicators available from user-space SINR Channel busy fraction Accessing the hardware registers Using virtual interfaces Factoring interference into the BATMAN routing metric Channel selection Interference mitigation/adaptation Discussion on the implementation Performance testing Introduction Preliminary experiments Experiment one: determine the base values Experiment two: determine the best indicators for measuring interference Experiment three: determine indicator sensitivity to non interference Interference measurement results Discussion on the interference measurement.. 40 ii

5 5.5 Test-bed description and protocol testing Conclusion Future work Physical/MAC layer optimisation Classifying the nature or source of interference Determining the level of interference that amounts to poor communication Channel hopping References iii

6 List of Figures Figure 3.1: wireless links. 20 Figure 4.1: Alix 2d2 board Figure 4.2: CM9-GP mini PCI wireless interface card 25 Figure 4.3: Alix board casing Figure 4.4: Interference ranges are longer than transmission ranges Figure 4.5: Network graph Figure 5.1: Sender, receiver and interferer experiment setup 37 Figure 5.2 Test-bed topology iv

7 List of Tables Table 5.1: Wireless statistics of node B when the interferer is turned off. 37 Table 5.2: Wireless statistics of node B while the interferer is turned on Table 5.3: Wireless statistics of node B with microwave oven turned on Table 5.4: Comparison of packet delay, packet loss and route flapping. 42 v

8 Chapter 1 Introduction Wireless Mesh Networks (WMN) are an emerging significant new technology envisaged to extend Internet access and other networking services in personal, local, campus, and metropolitan areas. The WMN popularity is due in part to their low upfront costs, rapid deployability, and suitability for hard-to-wire buildings and terrain. The key separating feature of mesh networks is the multi-hop relaying of packets across wireless links for communication between the participating nodes. The type of mesh network architecture being considered here is often referred to as infrastructure mesh [1]. Infrastructure mesh network architecture is the type of mesh network in which the end-user devices such as Personal Digital Assistants (PDAs) and laptops do not participate in the packet relay. Instead, mesh routers form a mesh of self-configuring, selfhealing links among themselves. Wireless mesh networks suffer numerous challenges such as traffic congestion due to limited bandwidth and interference due to the shared nature of the wireless medium and from other devices operating in the same frequency band. Currently, much effort is expended on the IEEE medium access control (MAC) layer to fully exploit novel physical (PHY) layer techniques. Nevertheless, in multi-hop scenarios where the quality of the links is constantly changing, performance depends on the routing protocol to properly choose optimal routes [2]. The aim of this project is to design and implement a wireless mesh routing protocol which modifies the routing decisions of a node based on the analysis of its spectrum environment. The project builds upon the state of the art wireless models which have been enabled by the advances in wireless technology. Our project has a specific focus on the implementation of cognitive routing in the emerging multi-radio multi-channel mesh networks of the future. The main tasks involved in this project are: i. Designing of cognitive nodes that learn about the interference in their environment. Quantifying this interference using appropriate models and designing a routing metric based on this. 1

9 ii. Designing and implementing a cognitive routing protocol in which the spectrum information gathered from the nodes environment is piggybacked on the existing protocol called BATMAN (Better Approach to Mobile Ad Hoc Networking). We refer to the resulting protocol as Interference-aware BATMAN (I-BATMAN). To clarify for the purposes of this report, please note that a channel is an assigned frequency range which a radio may use for data transmission; a collection of channels is termed a frequency spectrum (or when the context is clear, simply spectrum). Channel capacity is the upper bound on reliable throughput available to a node transmitting over a channel. When we use the term spectrum environment we mean the busyness (great or small) of the channel the node is transmitting over, and of other channels. This project attempts to address routing in the next generation wireless mesh networks. Our approach consists of designing and implementing smart nodes capable of sensing their spectrum environment upon which routing decisions would be made with the objective of achieving a cognitive routing protocol. The information about the spectrum environment is piggybacked over existing routing protocols such as BATMAN. In other words the routing metric assimilates this information and uses it to determine the properties of routes from which new routing decisions can be made thereby optimizing the overall routing process. The focus of this report is to investigate the following: i. Ways of quantifying the amount of interference being experienced by a particular node. ii. Efficient ways of sharing the information about interference among the nodes so as to influence the routing process. iii. Whether factoring interference in the routing metric enhances the routing process. The goal of any routing protocol is to determine the best path. Cognition at the PHY/MAC layer can be used to determine the path with the least amount of interference - in other words, a better path. However, we need to either come up with a scheme of sharing this information among the nodes without increasing overhead traffic, or, in the spirit of the BATMAN protocol, restrict this information to only the node itself to assist in its routing decisions. Furthermore, there is need to 2

10 balance the tasks of sensing and routing to avoid incurring excessive processing costs. That is to say, improving the quality of routing through sensing should not overly affect other aspects of networking such that there might be worse performance. 3

11 Chapter 2 Background 2.1 Routing in Wireless Mesh Networks Wireless Mesh Networks (WMN) are envisaged to extend Internet access and other networking services in personal, local, campus, and metropolitan areas. The key separating feature of mesh networks is the multi-hop relaying of packets across wireless links for communication between the participating nodes. However such networks suffer numerous challenges such as traffic congestion due to limited bandwidth and interference from other ISM band users [3], [4]. Many approaches such as directional and smart antennas, multiple input multiple output (MIMO) systems, and multi-radio/multi-channel systems have in recent years been proposed to increase capacity and flexibility of wireless systems [1], [5]. Smart wireless mesh network builds upon advanced wireless models enabled by the recent advances in the wireless technology and protocols to deliver improved quality of service. Smart wireless mesh networks consist of nodes that use cognition to gather information about their spectral environment and use this information to optimize some overall goal. Possible goals include achieving an optimal network capacity, minimizing interference with other signals, or providing robust security or jamming protection [6]. The aim of this project is to design mesh nodes that are capable of measuring the amount of interference in their environment so that this information can be used for routing purposes. The need to factor interference in the routing metric comes from the fact that an increase in interference reduces throughput as demonstrated in [7]. There is no standard way of measuring interference in available literature. Instead, most approaches characterise interference using its manifestations such as latency, jitter and packet loss, etc. However, building a routing metric around such approaches require probes or extra traffic which results in increased overhead traffic. The majority of existing routing metrics are highly sensitive to traffic load and detect congestion through the packet loss probability. However, packet loss does not always provide accurate 4

12 information and can result in low-throughput routing decisions, either by selecting congested paths or by filtering-out non-congested paths [8]. The routing mechanism requires an accurate estimate of channel congestion level associated with a route in order to perform as predicted. We need to estimate channel congestion and have this information shared among the nodes so that packets are routed over least congested links. In addition, this must be done without generating extra traffic or incurring excess processor overhead to achieve an overall improvement in performance. 2.2 Cognitive nodes Cognitive node is a term being used to refer to a node with cognitive radio capabilities. Cognitive radios are fully programmable wireless devices that can sense their environment and dynamically adapt their transmission waveform, channel access method, spectrum use, and networking protocols as needed for good network and application performance [9]. The majority of research in cognitive radio technology has been motivated by the need to establish and maintain reliable communication while utilizing the radio spectrum in an efficient manner as well as the need to minimize human interaction in the deployment and maintenance of the wireless infrastructure. From the definition, it is evident that cognitive radio technology in general encompasses a wide range of degrees of cognition. Suffice to say, cognitive radio may be categorized according to the set of parameters or the parts of the spectrum considered in determining the transmission and reception changes. The author of [10] summarizes the tasks of a cognitive radio as follows: i. Radio-scene analysis, which encompasses the following: estimation of interference temperature of the radio environment; detection of spectrum holes. ii. Channel identification, which encompasses the following: estimation of channel-state information (CSI); prediction of channel capacity for use by the transmitter. iii. Transmit-power control and dynamic spectrum management. There are many practical applications of cognitive radio such as dynamic channel allocation to alleviate spectrum scarcity. However, this paper is primarily concerned with the use of cognitive 5

13 nodes in a wireless mesh network in order to achieve a cognitive routing model. This could be achieved by piggybacking the radio-scene analysis information such as interference temperature over the routing protocol control messages to influence the routing strategy. 2.3 Cognitive routing In recent years different metrics and protocols have been proposed by researchers to improve wireless mesh routing. The authors of [2] propose a taxonomy for WMN routing protocols with four classes: ad hoc-based; controlled-flooding; traffic-aware; and opportunistic, where classes are differentiated based on procedures employed in route discovery and maintenance. In a continued quest for improved routing in wireless mesh networks, the effect of introducing cognitive mechanisms in the routing module of a wireless network have been investigated. The results show that multi-user interference awareness as provided by the cognitive functions may improve network performance [11]. More recently, several routing protocols that make use of the nodes cognitive capabilities have been proposed to improve wireless mesh routing. These include Multi-hop Single-transceiver CRN Routing Protocol (MSCRP) in which nodes initiate route discovery procedure by broadcasting a Route Request (RREQ), which piggybacks the available channel information [12]; Spectrum Aware Mesh Routing (SAMER) protocol which exploits the available spectrum opportunistically and attempts to balance between long-term route stability and short-term opportunistic performance [13]; Opportunistic Service Differentiation Routing Protocol (OSDRP) for the dynamic cognitive radio networks [14]. Unlike all the other routing protocols considered so far, OSDRP is a cross-layer routing protocol which addresses a situation where the average available duration of the communication channel might be much shorter than the communication time. The other challenge facing wireless mesh networks is traffic congestion due to limited available bandwidth for supporting the large number of nodes in close proximity. This problem can be alleviated by the cognitive radio paradigm that aims at devising spectrum sensing and management techniques, thereby allowing radios to intelligently locate and use frequencies other than those in the 2.4GHz ISM band. An analytical model is proposed in [3] that allows mesh routers to estimate the power in a given channel and location due to neighbouring wireless LAN 6

14 traffic, thus creating a virtual map in space and frequency domains. However, [15] explains that power estimation alone often generates false alarms triggered by unintended signals because the detector cannot differentiate signal types and so, the use of sophisticated techniques in order to capture the temporal and spatial variations in the radio environment is suggested. One alternative digital signal processing technique might be the cyclostationary feature detection described in [16] which has the ability to differentiate modulated signals, interference and noise in low signal to noise ratios. Furthermore, for multi-hop wireless mesh network, where cost of the radios and battery consumption are not limiting factors, [17] proposes the use of coordinated multiple wireless network cards tuned to non-overlapping frequency channels. This optimizes channel capacity by allowing nodes to receive and transmit simultaneously. However, according to [18], when the node has multiple radios, the shortest path algorithm does not perform very well. 2.4 Frequency management Current wireless networks are characterized by a static spectrum allocation policy, where governmental agencies within a given geographical jurisdiction assign wireless spectrum to license holders on a long-term basis. However, a large portion of the assigned spectrum is used sporadically, leading to underutilization of a significant amount of spectrum [19]. Furthermore, technical changes such as the switchover to digital television leaves some frequencies unused [20]. The White Space Coalition, IEEE Working Group and other proposals have advocated the use of white spaces availed by the departure of analogue TV to provide wireless broadband Internet access [21]. Some of the early ideas proposed included hard-coding wireless devices with a database of all licensed bands such as TV stations. However this is not a viable long term solution because of possible alterations to licensed spectrum allocations after the devices have been manufactured. In addition, such an approach could affect other open frequency technologies in unpredictable ways. Therefore, Dynamic Spectrum Access (DSA) techniques have recently been proposed to alleviate these spectrum utilization inefficiencies [22]. 7

15 Dynamic spectrum access can be enabled by cognitive radio technology which allows the unlicensed user to utilize the licensed channel in an opportunistic manner. In order to meet the diverse quality of service (QoS) requirements of various applications and handle the dynamicity of available spectrum, it is required that each user in the cognitive radio network meet the following conditions: Determine which portions of the spectrum are available Select the best available channel Coordinate access to this channel with other users Vacate the channel when a licensed user is detected. An attempt to meet the above conditions gives rise to four spectrum management challenges which must be addressed in order to achieve dynamic spectrum access which are Spectrum sensing, Spectrum decision, Spectrum sharing and Spectrum mobility [23]. A taxonomy has been provided in [24] where dynamic access is categorized broadly as dynamic exclusive model, open sharing model or hierarchical access model. Dynamic spectrum access is relatively a new phenomenon with much of the research still underway. The primary purpose of this paper is to explore the wide range of cognitive radio capabilities that can be harnessed to improve the routing process in wireless mesh networks. 2.5 Interference in networks There is a large number of devices out there but, since the devices follow the same protocol, they tend to work cooperatively. However, the many other devices operating in the unlicensed band affect the devices. These non types of interference typically do not work cooperatively with devices, and can cause significant loss of throughput. In addition, they can cause secondary effects such as rate back-off, in which retransmissions caused by interference trick the devices into thinking that they should use lower data rates than appropriate. The interference associated with Wireless links operating in the unlicensed spectrum may be categorised broadly as follows: 8

16 Uncontrolled interference which results from non-cooperating entities external to the network that use the same frequency band but do not participate in the MAC protocol used by network nodes. Controlled interference which results from the broadcast nature of wireless links where a transmission in one link in the network interferes with the transmission in neighbouring links depending on factors such as network topology, traffic in neighbouring nodes, etc. Further distinction can be made between intra-path interference and inter-path interference. Intra-path interference refers to interference resulting from transmissions on different links in a path whereas Inter-path interference refers to interference resulting from transmissions on links in separate paths [25]. An ideal measure of interference is one that considers all possible sources and causes of interference. 2.6 Interference measurement models There are two main interference models available in literature: the protocol model; and the physical model. The physical model, also known as the SINR (signal-to-interference-and-noise-ratio) model, is based on practical transceiver designs of communication systems that treat interference as noise. Under the physical model, a transmission is successful if and only if SINR at the intended receiver exceeds a threshold so that the transmitted signal can be decoded with an acceptable bit error probability [26]. On the other hand, under the protocol model, a transmission is considered successful when a node falls inside the transmission range of its intended transmitter and falls outside the interference range of unintended transmitters. The protocol model has been widely used in literature due to its simplicity and ability to mimic CSMA/CA network behaviour. However, there are arguments concerning the accuracy of the protocol model as well as its flexibility [26]. The physical model has the advantage of being less restrictive in that it does not employ the concept of transmission range or interference range and 9

17 is not restricted to any medium access mechanism. The physical model only depends on the signal strength values. 2.7 Signal strength values The IEEE standard defines a mechanism by which Radio Frequency energy is to be measured by the circuitry on a wireless network interface card. This numeric value is an integer with an allowable range of 0 to 255 called the Receive Signal Strength Indicator (RSSI). In reality, vendors do not measure 256 different signal levels. Instead, each vendor s network interface card has a specific maximum RSSI value ( RSSI_Max ). For example, Cisco chooses to measure 101 separate values for RF energy, and their RSSI_Max is 100. Symbol uses an RSSI_Max value of 31. The Atheros chipset uses an RSSI_Max value of 60. Therefore, it can be seen that the RF energy level reported by a particular vendor s NIC will range between 0 and RSSI_Max [27]. In MadWifi, which is a universal driver for Atheros-based wireless cards, the reported RSSI is the difference between the signal level and the noise level for each packet. Therefore, the reported RSSI is equivalent to the Signal-to-Noise Ratio and as such the terms can be used interchangeably. However, this does not hold for other drivers. This goes without saying that the actual signal strength values obtained at a particular node depends on the type of wireless NIC and the driver in use. 2.8 Measuring interference A general model of wireless interference The general model of wireless interference proposed in [28] takes radio dependent inputs namely, CCA (clear channel assessment) threshold, radio sensitivity, thermal noise, SINR threshold and measured inputs such as RSSI to calculate the throughput and packet loss rate between two nodes. The model focuses on one-hop traffic demands, which means that traffic is sent over one hop and not routed any further. In addition, the model requires use of custom traffic. 10

18 2.8.2 COIM Channel Occupancy Interference Model (COIM) used in [7] estimates interference based on the channel occupancy using the carrier sensing mechanism while possible interfering nodes are utilizing the shared carrier. Channel occupancy is a value describing what fraction of a fixed interval the medium was sensed busy at a particular node. This can be measured by directly accessing the hardware registers for carrier sensing of the wireless network interface card. The activity on the medium is monitored for a specified interval and the corresponding channel occupancy is calculated. However, getting the register values for the cycle time and the channel busy time is only supported by a few Atheros-based network adapters and might not be possible with other chipsets MIC The Metric of Interference and Channel Switching proposed in [29] captures the shared nature of the wireless medium and exploits the extra resources available from multi-radio/multi-channel nodes. MIC consists of two components namely IRU (Interference-aware Resource Usage) and CSC (Channel Switching Cost). IRU and CSC represent two characteristics of mesh networks. The IRU captures the effects of inter-flow interference and the differences in the transmission rates and loss ratios of wireless links, while CSC captures the impact of intra-flow interference. In using this metric for load balanced routing, interference is taken into account by configuring each node in the network to log the fraction of channel busy time at its location, which indicates channel utilization [30] iaware The interference aware routing metric proposed in [25] uses the physical interference model to capture the interference experienced by links in the network. Interference is estimated based on the signal strength, sending rate and the background noise. The proposed method considers both controlled and uncontrolled interference and measures the parameters of the model using online data traffic. 11

19 2.9 Discussion of the reviewed literature The existing WLAN measurements and information about them are inadequate to move ahead to the next generation of WLAN. IEEE k-2008 is a new standard that provides information on measurements such as channel load intended to improve the way traffic is distributed within a network [31]. In an k compliant network, if the AP with the strongest signal is loaded to capacity, wireless devices connect to one of the underutilized APs despite having a weaker signal. The overall throughput is greater because the network resources are used more efficiently. The general wireless interference model proposed in [28] provides good insight into the general use of the physical model. The model has the disadvantage of requiring custom traffic to implement and being focussed on one hop traffic demands. This makes it unsuitable for mesh networks characterised by multi-hop relaying of packets. Wireless network interface card manufacturers have recognized the need for the card to directly estimate the channel load. Atheros WLAN chipsets is one such example of a wireless NIC which provides direct access to channel load information. The information provided by the Atheros proprietary interface indicates the fraction of time in which the wireless channel is detected busy due to the node s own activity or the neighbours activity. Routing metrics that do not take this quantity into account can yield low throughput by routing over congested paths or by filteringout non-congested paths [8]. The busy time fraction is an additional factor essential to discover high throughput paths, especially under congested conditions. The channel occupancy interference model used in [7] uses fraction of busy time to estimate interference experienced by a node. The model is aimed at predicting interference which in its strict sense is ideal for network planning purposes rather than routing metric design. However, the work presented introduces an important concept: sanity check. The channel occupancy is measured when the network is completely silent i.e. no traffic being generated. This value is then used to determine the level below which, the channel occupancy would have to be considered as noise generated by the environment. 12

20 Other approaches have been used to incorporate interference in the routing metric such as MIC [29] by scaling the link cost with the number of interfering neighbours. But as was observed in the experiments [25], the degree of interference caused by each interfering node is not the same but instead depends on the amount of traffic generated by the interfering node. However the proposed metric has the advantage of capitalising on extra resources from multi-radio/multichannel where available Adopted Interference model Out of the literature reviewed, the most closely related work was found in [25]. The physical model has been used because it does not depend on the medium access mechanism but instead relying on the signal strength values easily obtainable using regular wireless cards. In addition, the physical model has the advantage of measuring the parameters using online data without requiring special traffic which would otherwise increase the overhead. In order to quantify the amount of interference being experienced by a particular node as a result of sharing the communication channel with cooperating and non-cooperating entities, the method used in [25] uses three key interference parameters namely: i. Signal strength ii. Background noise iii. Sending rate The signal strength can be obtained from the wireless card driver whereas the background noise has to be read from a particular card register. The hostap [25] driver also requires modification in order to report the sending rate Conclusion on background chapter Interference is cited throughout literature as one of the major causes of performance degradation in Wireless Mesh Networks. Interference estimation experienced by nodes has been used in solutions for channel assignment, routing and so forth. The performance of these solutions depends on the procedure and accuracy of the interference estimation. The majority of work done in investigating the impact of interference on performance have assumed the existence of 13

21 interference measurements and as such do not dwell much on the methods needed in estimating interference. This may be satisfactory for network planning purposes. The literature provides us with several techniques that can be used to improve the performance of a wireless mesh network. Particularly, the use of routing metrics that take into account the status of the spectral environment have been shown to deliver better route discovery and increased throughput in wireless mesh networks. However, incorporating cognition in the design of routing algorithms and protocols raises several new challenges related to efficiencies in route discovery, route stability and exchange of control information. In addition, implementing a cognitive routing model requires the nodes to sense the environment with a high degree of accuracy in order to avoid performance degradation due to false detections. Thus high quality sensing devices are needed alongside efficient spectrum sensing algorithms. However, increasing cognition generally increases complexity and may increase the amount of overhead traffic required for cooperation with other nodes. Furthermore, sensing and packet transmission cannot be done simultaneously in a single-radio node. Cognitive nodes have to stop transmitting while sensing, which may decrease spectrum efficiency. Therefore, spectrum efficiency and sensing accuracy is an important balance to strike. Using multiple radios enables simultaneous sensing and packet transmission but, at the expense of a complex routing algorithm. 14

22 Chapter 3 Design 3.1 Introduction The aim of this project is to design and implement a wireless mesh routing protocol which takes interference into account in determining optimal paths between two nodes. The majority of wireless mesh routing protocols are adaptations from ad-hoc network protocols. These protocols are concerned with ensuring the existence of a link rather than determining the quality of the link. We are interested in finding out whether a routing protocol can consider sending packets over links experiencing the least amount of interference as an added way of ensuring better throughput and less delay. Just to clarify, this research is not aimed at determining the impact of interference in wireless networks. A lot of work has been done in that direction [32], and research shows that equipment is susceptible to interference patterns from difference sources. The experimental approach is necessary in meeting the project objectives. To that end, a test bed will be used to facilitate testing and evaluation of results. This chapter briefly discusses the design constraints influencing some of the design choices, the software and hardware required for implementation and also describes the nature of experiments that will be conducted and how these will be conducted. Interference mitigation techniques have also been described. 3.2 Design constraints Firstly, the interference sensing module will be integrated into the existing mesh routing protocol called Better Approach to Mobile Ad hoc Networking (BATMAN) [33]. BATMAN was originally written in C programming language and highly optimized for embedded devices. This means that the overall architecture has to follow the original design to minimise the amount of changes to effect the proposed enhancements. In addition, since the evaluation is going to be done on the resulting protocol as a whole, it is important that the interference estimation mechanism be implemented efficiently without incurring excess gain penalties. Secondly, we 15

23 must be able to implement it on commodity wireless network interface cards (NICs) without changing their MAC or PHY layer implementations. 3.3 Software and Hardware needed for implementation As mentioned in the preceding section, the implementation is going to be done using commodity wireless network cards plugged into a computer running Linux. We will use the supporting drivers to every extent possible. Programming changes to the drivers and additional module for added function is going to be done in C using the GNU Compiler Collection (GCC) which comes with Ubuntu Linux distribution. 3.4 Mesh network The wireless mesh network test bed will be setup in the honours lab of the Computer Science building. The Mesh test bed will consist of a 3 x 4 wireless node grid. A small number of nodes should suffice because the scope of work does not include testing for scalability. Due to the nature of the experiments, tests are going to be carried out during quiet times i.e. when there is the least amount of external spectral influence in the room Mesh nodes Except for the laptop which will be used to monitor the activities, each node consists of an Alix.2d2 board [34] with a 500MHz AMD Geode processor and 256MB DDR RAM. Each board is also equipped with a CM9-GP radio card for wireless connectivity. The CM9 radio is based on the Atheros AR5212 chipset and is compatible with the Linux wireless software and is presumably easy to setup. The CM9 wireless card supports a number of modes, allowing a wide variety of test scenarios and connectivity options. It supports the IEEE a/b/g, IEEE g Super Mode, and IEEE a Turbo Mode. It is also highly configurable with WPA and WEP security options, transmission power control, and dynamic frequency selection support. This card provides enough features for the current implementation as well as for future improvements, expansions, or tests. 16

24 It is desirous to equip each node with an IEEE a/b/g card because, a bandwidth difference of 10MHz can be obtained when switching between IEEE b and IEEE a. Hence, by making some nodes use their IEEE a cards (20MHz width) while the others use their IEEE b cards (30MHz width), we will be able to experiment with different scenarios in which band switching/selections occurs across bands with different widths as mentioned in [35]. In addition, there is a distribution of Linux specifically meant for Alix boards Debian for Alix. Debian for Alix is the operating system of choice because of its light weight, easy of installation and wider online support. Furthermore, this distribution of Linux comes with the required wireless card drivers which support Atheros based wireless cards. This will lessen implementation complexities Multi-Radio configuration A selected pair of nodes will each be configured with two wireless network interface cards, one primary and another secondary card. The primary wireless network interface card is for the regular transmission and reception of packets. The secondary wireless network interface card allows us to overcome the limitations of current driver architectures which do not allow us to perform certain kind of monitoring for a given mode of operation. The secondary card will be tuned to the same channel as the primary wireless network interface card so that it is able to pickup all the packets in that channel. With this configuration, we are able to monitor the following parameters regardless of the mode of operation: Signal strength, transmission rate, MAC sequence number and length of all frames received Type of packet errors (e.g., CRC, PHY errors) Medium-busy periods as sensed by the wireless network interface card. This is the time during which there are active transmissions on the channel using any technology. MAC-busy time. This is the time during which transmissions are active. This is computed using packets decoded in the packet trace clients that can be heard [36]. This information is useful in understanding what is going on in the node s wireless environment 17

25 Using multiple wireless network interface cards will also help us explore channel hoping as a way of mitigating interference. The secondary card serves as a means of coordinating the nodes or maintaining connectivity on the previous channel while the primary card hops to a different channel and waits for the entire network to converge to a common channel Interference estimation and Metric design Radio frequency interference around the node can be estimated by monitoring wireless network interface card properties whose values change as the interference level varies. These values include the RSSI, noise, sending rate and channel busy time. The routing metric design was based on the analytical model that captures the MAC protocol operations to predict both throughput and delay of multi-hop flows [8]. The main idea is to use a locally measurable quantity namely channel busy fraction to capture both inter-flow and intra-flow interference. All existing routing metrics are highly sensitive to traffic load and are capable of detecting congestion using the packet loss probability. However, packet loss alone does not always provide accurate information and may lead to low-throughput routing decision, either by selecting congested paths or by filtering-out non-congested paths. Under congested conditions, the busy fraction is an additional factor useful in discovering high throughput paths [8]. 3.5 Experiment design In meeting the goal of measuring interference experienced by each node, in line with the overall objective of designing and implementing an interference aware mesh routing protocol, the following tasks will have to be performed. Firstly, we will have to perform a sanity check as described in [7]. In other words, we will have to take note of the values for properties such as channel occupancy and signal strength while our mesh test bed is completely silent i.e. with no traffic being generated. This can be achieved by performing the tests late in the night in a room where potential sources of interference are controlled. Once this floor has been established, any changes in the values will be attributed to some spectrum activity. Because of the presence of other wireless networks in the building, the bulk of experiments will have to be done during times when there is little external wireless traffic such as late in the night. 18

26 3.5.1 Exposing nodes to controlled interference After establishing the floor values, the next step is to monitor the accuracy of the interference estimation mechanism. This is going to be done by exposing a particular node to controlled interference. There are several ways to expose the effects of interference. However, we are interested in controlled-interference because of the need for reproducibility of experiments. It is a generally accepted scientific practice that experimental results should be reproducible by others. The following methods of generating controlled interference will be used: i. The interference can be introduced by an operation as simple as moving a hand around the antenna. The amount of fluids in muscle tissue of the hand is expected to affect the RSSI and other wireless characteristics. ii. Using the microwave oven (wide-band interference) in close proximity with the node iii. Bluetooth (narrow-band interference) iv. Internally configuring a node to receive excessive traffic or alternatively, using a program to continuously send modulated data. If the interference sensing mechanism performs as expected, all of the above actions aimed at artificially exposing a node to controlled interference are expected to vary the properties being used to quantify interference above the floor values such as SINR or the channel busy fraction explained in detail in chapter 4. In case the interferer cannot be placed close to the node that we need to interfere with, we may decide to use multiple interferers to increase the level of generated noise. This can be done by exploiting the additive interference property that states that the total interference is the sum (in db) of each individual interferer. The additive interference property applies when using multiple nodes as interferers. In other words if one of the interfering nodes rises its transmission power by 3 dbm, the overall noise floor is expected to increase approximately in the order of 3 db. However, it is hard to obtain an exact increase of interference, due to the unpredictability of radio propagation among the interferers. It may just be easier to control the additive interference at low transmission powers than use a single interferer a high transmission power. 19

27 3.6 Interference aware routing Once we are satisfied with the interference estimation mechanism and have this information piggybacked onto the routing protocol, we are interested in observing the effect on the routing pattern. We are particularly interested is determine whether or not incorporating this information in the routing metric translates in improved overall network performance being ensuring that packets are routed over links with better throughput and least delay. Consider the wireless links in figure 3.1 below. Suppose node 1 has a packet to send to node 6. Node 1 knows about node 3, node 2 and node 4 as its neighbours. If node 1 further knows the estimated level of interference being experienced by each of its neighbours, we are interested in having node 1 weigh the links with this extra piece of information alongside Figure 3.1: wireless links Interference mitigation The unlicensed Industrial, Scientific and Medical (ISM) band does not require coordination among the deployed devices. The regulations by the Federal Communications Commission (FCC) and the International Telecommunication Union (ITU) such as limiting transmission power and requiring devices to spread their signals promotes co-existence among devices that use the ISM band. Furthermore, wireless technologies often employ MAC and PHY layer mechanisms in addition to the basic FCC or ITU regulations to enhance the co-existence. For instance, Bluetooth adaptively hops frequencies to lessen the impact of interference on networks. 20

28 The mechanism already used by to mitigate noise and interference include i.a MAC protocol that avoids collisions; ii.lower transmission rates that accommodate signal-to-interference-plus-noise (SINR) ratios; iii.signal spreading that tolerates narrow-band fading and interference; and iv.phy layer coding for error correction. However, despite these mechanisms put in place to promote co-existence, wireless networks by their nature still suffer the consequences of interference. As a matter of fact, generic mechanism aimed at accommodating other transmitters such as carrier sense also increases susceptibility to interference from other technologies [37]. Therefore, mitigation techniques are required to obliterate the effects of selfish or malicious interferers i.e. devices that use their own protocol for their own sole benefit or wireless jamming that takes up the communication channel without doing any useful work. According to the experiments carried out in [37], mitigation techniques employed in software such as changing packet sizes, rates, modulations, Clear Channel Assessment (CCA) thresholds and modes, adding Forward Error Correction (FEC) and measures expected to mitigate interference such as high sender transmit power, high receiver selectivity have been shown to be ineffective due to reception path limitations. The researchers suggest channel hopping i.e. switching to a pseudo-random channel rapidly and occupy it for a short period before switching again as the most effective way to gracefully tolerate interference without requiring major hardware changes. Separating the interferer and receiver by 5MHz or more has been shown to substantially mitigate the effects of interference. We are interested in exploring the performance gains provided by channel switching as a way of tolerating interference. 3.8 Design summary This chapter recaps the project objectives and points out some of the steps that will be taken to realise an interference aware wireless mesh routing protocol. Details of the hardware to be used and the series of preliminary tests that will be carried out and how these will be carried out have also been given. The chapter goes on to describe channel hoping as the ultimate avenue towards 21

29 interference mitigation by separating the center frequency of an channel between the node and the interferer. 22

30 Chapter 4 Implementation 4.1 Introduction This chapter provides details of how the interference sensing component of the wireless mesh routing protocol was implemented. The objective was to implement a module that gathered wireless activity statistics for a particular node. This information is then shared among the nodes participating in the mesh network so that routing decisions take this information into account as an added indicator of good quality links over which to forward packets. Radio frequency interference cannot be measured but can be estimated by monitoring its manifestations. There are four primary metrics for capturing the quality of a wireless link. These are RSSI (Received Signal Strength Indication), SINR (Signal-to-Interference-plus-Noise Ratio), PDR (Packet- Delivery Ratio), and BER (Bit-Error Rate) [38]. PDR provides a good characterisation of the link quality. However, this is highly dependent on the packet size as well as the transmission rate. BER provides a better characterisation of the link quality but, this requires repeated computation over time. Therefore we decided to focus on RSSI and SINR because PDR and BER would require extra probing traffic to compute. The aim was to obtain wireless network interface card statistics while the nodes are connected in ad-hoc mode. The statistics can then be used to estimate the amount of interference being experienced by the node. The estimated level of interference can then be integrated into the mesh routing protocol metric. We decided to extend the existing protocol BATMAN [33]. BATMAN routes packets across links over which it has received the highest number of hello packets called originator messages or OGMs. Once we have a measure of interference let us call it IR, the biggest challenge was to correlate IR with the OGM count. In contrast with other routing protocols in which the metric is an expression of throughput by a specified function, BATMAN characterizes the link by the number of OGMs received. The protocol tries to increase the probability of packet delivery by forwarding packets across the link over which the node has received many OGMs faster. 23

31 4.2 Mesh node hardware specification Apart from the laptop which was used to configure the nodes, monitor the activities and take measurements, each node is an Alix.2D2 system board [34] consisting of a 500MHz AMD Geode LX800 Central Processing Unit and 256MB DDR RAM as shown in figure 4.1 Each board is also equipped with a Wistron NeWeb CM9-GP wireless card using the straight-type Omini antenna connected to the card using the N-type female Straight + U.FL pigtail for wireless connectivity. The CM9 wireless card shown in figure 4.2 is based on the Atheros AR5212 chipset and is compatible with the Linux wireless software and is supported by open source drivers such as Madwifi [39]. The Atheros based chipset with associated driver provides a lot of wireless statistics which is useful in meeting our project objective of implementing nodes that gather information about their wireless environment. In our implementation we used the Ath5k driver which is a newer driver version based on the Madwifi project. By using an open source driver such as Ath5k, undesired features can be disabled, required features added and the driver recompiled and loaded to meet the demands of the experiment. Just as already mentioned in the design section, the CM9-GP wireless card is feature-rich and supports a number of modes, allowing a wide variety of test scenarios and connectivity options. It supports IEEE a/b/g, IEEE g Super Mode, and IEEE a Turbo Mode. It is also highly configurable with WPA and WEP security options, transmission power control, and dynamic frequency selection support. The CM9-GP card provides enough features for the current implementation as well as for future improvements, expansions, or tests. For purposes of meshing the nodes, we had to run the cards in b ad-hoc mode to allow each node to connect with each of its neighbours. Furthermore, due to room space constraints, at each node an antenna with 5 dbi gain requires connection to the wireless network adaptor via a 30 db attenuator. This induces a path loss of 60 db between the sending node and the receiving node. Attenuating the radio signal forces a multi-hop environment in a relatively small space. Without using attenuators a soccer field sized space might be required to force multi-hoping for a relatively small number of nodes. 24

32 Figure 4.1: Alix 2D2 system board. Figure 4.2: CM9-GP mini PCI wireless network interface card Figure 4.3: Alix board casing 4.3 Mode of operation It is desirous to equip each node with an IEEE a/b/g card. A card that supports multiple modes of operation means that we can experiment with different modes without changing the equipment a operates in the 5 GHz band providing a maximum rate of 54M bits/second. 25

33 The 5 GHz band is less crowded compared to the 2.4 GHz band in which b operates. In the 5GHz band, there is less interference from cordless phones, microwave ovens, and neighbours but, due to legacy systems in the 5GHz band there are regulatory issues in some countries [35]. The higher frequency of a compared to b shortens the range of a networks. The higher frequency also means a signals have more difficulty penetrating walls and other obstructions b operates in the 2.4GHz band as earlier mentioned, with a maximum rate of up to 11M bits/second. On the other hand, g tries to combine the best features of a and b. The g offers rates of up to 54M bits/second using the 2.4GHz frequency band. The lower frequency means that g networks have a longer range compared to a. 4.4 Mesh node software specification There is a distribution of Linux specifically meant for Alix boards called Debian for Alix [40]. Debian for Alix is the operating system of choice because of its light weight, easy of installation and wide online support. Furthermore, this distribution of Linux comes with Ath5k wireless drivers which supports the CM9-GP mini PCI wireless network interface cards that we had. Using a distribution of Linux with most of what is required lessens test bed implementation complexities. Furthermore, the decision to use the Ath5k driver is motivated by the fact that it is open source and as such can be extended to provide added wireless network interface card functionality within the limits of the hardware implementation. In order to be able to gather the wireless statistics needed to estimate interference in the nodes environment, we had to install an updated version of Ath5k driver. Ath5k driver is a complete free and open source wireless driver for Atheros based wireless chipset versions AR5xxx in the Linux Kernel. Unlike the generic Linux wireless drivers, the Ath5k driver has the advantage of providing user-space programs access to the card s hardware registers through the driver s hardware abstraction layer. In order to obtain statistics such as channel busy time we also had to upgrade the Linux Wireless Extension version from version 0.9 to version

34 4.5 Bridging the gap between kernel space driver and the user-space program The wireless network driver runs in kernel-space of the Linux operating system. In order for user-space program to communicate with the kernel-space driver, the Linux cfg80211 netlink API [41] is required. The nl80211 and cfg80211 provide the communication API between userspace and kernel-space. The Linux Wireless Extensions are deprecated. The cfg80211 is the new Linux wireless configuration API that replaces the Wireless Extensions. 4.6 Interference measurement Interference in wireless networks is known to reduce throughput, increase delay and generally degrade performance. The aim was to estimate the amount of interference experienced by a node at any given time. In a wireless mesh network setting, if the level of interference around each node is known, the routing protocol can then be made to route packets over links with less interference. In order to estimate the level of interference being experienced by a node, we had to consider properties of the wireless NIC that vary with the changes in the node s wireless environment. Two approaches were considered namely the, SINR and the channel busy fraction. SINR and Channel busy fraction are explained in detail in section 4.8 and section 4.9. One inherent challenge when it comes to measuring interference is that the interfering range is normally longer than the transmission range. To explain this aspect, consider figure 4.4. Node C is not in the transmission range of node A so node C not able to receive packets from node A. Due to this differences in the transmission and interference ranges node C is not able to detect interference from node A. In a mesh network with large number of nodes this undetected interference summed together can lead to performance disruption. Interference range of Node A Transmission range of Node A Node A Node B Node C Figure 4.4: Interference ranges are longer than transmission ranges 27

35 4.7 Link quality indicators available from user-space Some of the wireless NIC properties available to us as link quality indicators using wireless tools such as the deprecated iwconfig or the new wireless configuration utility iw include: Signal strength Noise Channel busy time Channel active time Radio frequency signal strength represents the power level being received at the antenna. In other words, when a signal is sent from point A, it starts off with the maximum transmission power which gradually reduces as the signal propagates towards point B. The signal strength at the receiver indicates how much of what was sent is left at the time of reception. The signal strength is usually represented using one of four measurement units namely mw (milliwatts), dbm ( db -milliwatts), RSSI (Received Signal Strength Indicator), and a percentage measurement [42]. The signal strength is affected by the distance between the nodes and other factors in the wireless environment. The signal strength value between two nodes can be used to characterise the quality of the link. The range of values and actual behaviour depends on the implementation but generally, the higher the signal strength (or the smaller the absolute value where the value is reported as a negative value), the better the link quality. The noise value obtainable using wireless tools indicates the background noise in the wireless environment when there are no packets being received or sent. This value can be used to estimate the level of interference in the environment. The noise value can be used as indicative of the level of wireless activity in the background of the wireless node. An increase in interference is expected to increase the noise value. The results of how these properties behave in the presence of interference are presented in chapter 5. Channel busy time shows the number of slots that were sensed busy due to successful or unsuccessful transmission whereas, the channel active time represents the total number of slots that have passed. These values were used to calculate the channel busy fraction as explained in section

36 4.8 SINR The results of the work presented in [43] brings a number of issues to light. Firstly, the work proves that interference from various sources reduces the Packet Delivery Ratio (PDR) where PDR is defined as the ratio of the number of packets sent to the number of packets received over a wireless link. The work compares the performance of three measurement based interference models namely, RSSI, SNR and SINR. The results obtained therein shows that an interference model that utilizes the SINR accurately predicts performance with a maximum root-mean-square error (RMSE) of 10.8% across all their evaluations. In contrast, interference models that rely on the SNR profile and the RSS profile perform poorly, with a maximum RMSE of 61.7% and 66.1% respectively. It is for this reason that we decided to consider the SINR model. Signal to Interference and Noise Ratio (SINR) represents the extent to which the power of the received signal exceeds the sum of noise plus interference at the receiver. Formally SINR is defined as: S/( (I + NF) where S is the signal power of the sender, I is the sum of interference power from multiple interferers transmitting at the same time as the sender node, and NF is the noise floor at the receiver. SINR is an appropriate metric for quantifying the quality of a link. While the SINR can be an accurate predictor of link quality, it is hard (if not impossible) to measure the exact SINR value using commodity wireless network interface cards. There are questions surrounding the measurement of interference and noise used in the definition of SINR [38]. Regular wireless cards off the shelf do not report the SINR during the reception of a packet and thus, the instantaneous SINR value cannot be easily computed. During packet reception, only the RSSI is provided. The SINR estimate may be derived from the RSSI value for a particular value. However, this method inherits all of the shortcomings of RSSI. The shortcomings of the RSSI are explained in chapter 5 as we explain the behaviour of these properties in the presence of interference. 29

37 4.9 Channel busy fraction In response to the shortcomings and challenges associated with accurate measurement of SINR, we decided to consider the channel busy fraction as well as an alternative way of estimating the channel load around the node. Given a time interval, channel busy fraction measures the fraction of the time in which the channel was sensed busy regardless of the cause. The channel busy fraction is usually expressed as a percentage. An increase in interference would ideally cause an increase in the channel busy fraction. Channel busy fraction can be obtained from the IEEE k [31] channel load report (supported by some of the newer Atheros-based wireless network cards). The wireless cards we had do not support the IEEE k. However, the chipset s registers provide the values needed to compute the channel busy fraction. Particularly, the registers PROFCNT_RXCLR (0x80f4) and PROFCNT_CYCLE (0x80f8) provide information about the number of times the medium was sensed busy based on the MAC s clear-channel assessment (CCA) and the total number of timeslots respectively. The PROFCNT_RXCLR register increases when the energy detected on the channel measures above the carrier sense threshold whereas, the PROFCNT_CYCLE register can be thought of as a clock which increments on each clock cycle. In other words, given a set of timeslots as stored in the PROFCNT_CYCLE register, the PROFCNT_RXCLR contains the number of timeslots that were sensed busy due to the node s own transmission or other wireless activity in the same frequency band. The user-space utility iw refers to values stored in the PROFCNT_RXCLR and PROFCNT_CYCLE registers as channel busy time and channel active time respectively. From this point on, we use the terms channel busy time and channel active time to refer to the two profile count registers. The channel busy time based on CCA is part of the MAC protocol and can be obtained from any wireless network interface card whereas, the cycle time is only provided by the newer Atheros-based wireless cards. There is no mention in the literature reviewed of any other vendor whose wireless cards provide the cycle time. 30

38 4.10 Accessing the hardware registers In Linux, it is difficult to gain access to hardware registers from user-space programs. Hardware registers are best accessed using kernel-level code. The benefit of using the Ath5k driver is that it provides direct access to hardware registers from user-space. User-space utility programs such as iw use the cfg80211 [41] API to communicate with the driver. The iw commands such as iw dev wlan0 survey dump and iw dev wlan0 link where wlan0 is the name of the wireless interface, provides wireless statistics such as channel busy time, channel active time, signal strength, noise etc. In order to get the values that are needed to estimate interference around a node, rather than reinvent the wheel, the iw commands were embedded inside C code using the popen function. The user-space code was then written to periodically trigger the iw commands, read the output line by line, extract the required values and calculate the channel busy fraction as shown below: Channel busy fraction = (channel busy time)/(channel active time) The channel busy fraction is then written to a log file from which the routing module can read and piggyback onto the hello packet and share the information with the neighbours Using virtual interfaces The initial design was to fit two wireless network interface cards in each of the nodes where one card is designated for packet transmission while the other one is used for interference sensing purposes. However, we did not have sufficient wireless network interface cards. Fortunately, the mac80211 subsystem in the Linux kernel supports multiple wireless interfaces to be created with one physical wireless card. This could allow one node to connect to multiple networks at once using multiple virtual interfaces using a single physical wireless card. As a matter of fact, using multiple wireless cards with no in-built antennas require careful attenuation to prevent interference between the two antennas in the same node when the antennas are placed close to each other. One reason for doing this might be to enable multiple networking protocols to run simultaneously by associating each one of them to a particular virtual interface. In the absence of multiple wireless cards per node, we decided to create virtual interfaces instead. We created a virtual interface and used it to collect the wireless statistics needed to have an estimate of the interference in the environment. Multiple virtual interfaces can run in different 31

39 modes. This is important because, in order to setup a mesh test-bed, the nodes have to run in adhoc mode. However, some of the wireless statistics may not be available whilst running in adhoc mode. Therefore, we created one virtual interface and ran it in monitor mode. Monitor mode is a passive-only mode. An interface that is in monitor mode does not take part in any packet transmission. Just as the name suggests, this mode is useful in monitoring what is going on on the network because all incoming packets are handed over to the host computer completely unfiltered. Running the network card in monitor mode allows the collection of wireless statistics which is useful in estimating the channel utilisation. However, this is at an increase in the processing overhead because the operating system has to decode all packets in the channel Factoring interference into the BATMAN routing metric Before giving a description of how interference was factored into the BATMAN routing protocol, it is important to give a brief description of how BATMAN works and how the algorithm weighs the links. First of all BATMAN does not keep the entire network routing information. Instead, each node only knows the next best hop to the destination. For example, consider the mesh network depicted below. If node 1 needs to send a packet to node 6, it can do this via node 2, node 3 or node 4. Node 1 will weigh the links based on the number of originator messages received from node 6. Node 1 will forward the packet to the neighbour from whom it has received the highest number of originator messages from node Figure 4.5: network graph. 32

40 BATMAN uses OGM count to characterise the quality of the link and maximise the probability of delivering a message. It is a gain metric in that, a link with a higher OGM count is preferred over a link with less OGM count. In our implementation, we let each node keep a log file containing a measure of interference around each of its neighbours. This measure is then used to penalise links with a high OGM count but high interference level as estimated by the SINR or channel busy fraction. As pointed out in previous sections, one challenge associated with working with these values is that they are hardware and driver specific. In other words, under the same wireless environment conditions, wireless network cards from two different vendors are likely to give different values for the RSSI for example. Therefore, to make valid evaluation of I-BATMAN i.e. interference aware BATMAN, we have to ensure that all the nodes are using the same type of wireless network interface cards and associated driver Channel selection The channel selection was done manually. In order to determine which channel to use, we measured the channel busy fraction in the 2.4 GHz frequency band on all the nodes while the network was silent, in other words, while there was no traffic being generated. We observed on channel 11 the channel busy fraction of between 0 and 0.7 for all nodes. With this observation, we could set the channel busy fraction floor at 0.7. This means that busy fraction below the floor value was considered as noise generated by the environment whereas, busy fraction above the 0.7 mark was attributed to the wireless network activity Interference mitigation/adaptation Radio Frequency interference remains an issue in wireless networking. It inhibits performance, creates security vulnerability and causes wireless network instability. However, you cannot just make it go away or disappear. The first step towards interference mitigation is to first determine the magnitude of change corresponding to a poor level of communication. It is important to determine the set of values that represent good, acceptable, or poor level of communication. 33

41 The first hunch at interference mitigation is to consider varying sender transmit power and other operational parameters. However, interference occurs at the receiver and so, obvious measures that might be expected to mitigate interference are not helpful due to reception path limitations. It was not in the scope of the project to evaluate interference mitigation techniques but according to the work presented in [37], making the following adjustments: high sender transmit power; large channel bandwidth compared to a narrowband interferer; high receiver selectivity; and multi-antenna and spatial diversity techniques used in the new n do not gracefully tolerate interference. This is due to commodity wireless NIC s vulnerabilities ranging from MAC layer driver implementation strategies to PHY layer frequency implementation strategies which cannot be overcome by simply changing operational parameter Discussion on the implementation The above method of factoring interference in the routing metric is quite simplistic. There are no units of measurement but, the estimated value should suffice because the quantity is being used in relative terms. However, for credible test results, uniform hardware and software configuration is required across the test-bed so we can have a consistent calibration of values. Furthermore, RSSI, SINR, Packet Delivery Ration (PDR), Bit Error Rate (BER) have been used throughout literature as metrics to provide an average estimation of the link quality over a period of time. The question of which one is the best metric is a question of horses for courses. The work presented in [38] answers a more precise question: which is the appropriate metric to use, and under what conditions? Their work shows that none of the metrics is generic enough to be employed in all applications. Each metric has advantages and limitations. 34

42 Chapter 5 Performance testing 5.1 Introduction Before integrating the interference sensing module into I-BATMAN, three sets of experiments were carried out as a preliminary in order to determine the properties of the wireless network card that can be used to characterise interference. It was important to verify that the method used to estimate interference around the node s environment provided a measure that varies correctly with variations in the wireless activity in the same frequency band. The aim was to ensure that the method used captured interference caused by other network nodes as well as other devices operating in the same frequency band such as the microwave oven. The nodes consisted of Alix boards running Debian for Alix kernel version fitted with CM9-GP wireless network cards and used the Ath5k driver. The Ath5k driver is an open source wireless card driver that supports certain Atheros-based chipsets. The Ath5k driver allows userspace programs to access the card s hardware registers and because it is open source, the driver can in any case be modified to meet the requirements. There is no explicit interference value in the wireless statistics. Interference is inferred from other wireless activity indicators. The wireless network card comes with the following indicators accessible from user-space: RSSI, noise, channel busy time for a given time interval. There are other indicators but we decided to focus on those properties which do not require extra probing traffic and that could be monitored in real-time. 5.2 Preliminary experiments Experiment one: determine the base values The objective of experiment one was to determine the floor values of the above indicators namely RSSI, noise and channel busy fraction in a quiet environment i.e. in the absence of interference. This was done with a simple network of two nodes connected together by the BATMAN protocol. The RSSI, noise, channel busy time and channel active time were then successively noted. Table 5.1 shows the values of the measurements. 35

43 5.2.2 Experiment two: determine the best indicators for measuring interference The objective of the second experiment was to determine which indicators could be used to determine the level of interference. The experiment consisted of two nodes connected to each other in ad-hoc mode and an interferer. The interferer was a laptop connected to the Access Point using the same channel as the two nodes. Interference was exposed to the nodes by inducing an excessive amount of transmission between the laptop and the Access point. This is referred to as a packet-storm technique [44]. The interference indicators were then monitored to determine the behaviour in the presence of an interferer. This type of interference is based on four independent variables namely the transmission power, the packet length, the elapsed time between broadcasted packets, and the distance of the interferer from the node to be interfered with. The results of the measurements are shown in table 5.2. One problem with the packet-storm technique is that you cannot control the exact time at which packets are transmitted. Packets are sent in the wireless medium after a certain amount of CPU and physical layer operations. Even with a deep understanding of the implementation details of the lower layers, it is difficult to achieve a continuous batch transmission of packets. In other words, the problem could be stated as lack of continuous carrier. Given a long temporal window, it may appear that the interference or noise generated by the packet storm is continuous, but we have in reality some cases in which packets collide with the other ongoing transmissions, and some other cases in which there are gaps left by the processing operation of CPU and PHY [44]. The biggest advantage of using the packet storm technique is that it allows you to create the same kind of interference that may be generated by several transmissions from neighbouring nodes Experiment three: determine indicator sensitivity to non interference Experiment three was setup identically the same as experiment two. The only difference was the type of interferer introduced. In experiment three, a running microwave oven was used as an interferer instead. This was to determine the behaviour of the indicators in the presence of interference that is not decoded as packets. The results are shown in table 5.3. In all the three experiments, a total of fifty readings were taken in ten second intervals and the results are shown in tables The tables show only the last five readings to show the 36

44 general pattern. It is advisable to take at least thirty readings because if fewer readings are taken, the nodes may exhibit inconsistencies. The experiments were carried out in b mode. Node A Node B Sender Receiver Interferer Figure 5.1: Sender, receiver and interferer experiment setup. 5.3 Interference measurement results Table 5.1: shows the wireless statistics of node B when the interferer is turned off. RSSI (dbm) Noise (dbm) Channel busy time (ms) Channel active time (ms) Channel busy fraction = (Channel busy time)/ (Channel active time)

45 Table 5.2: shows the wireless statistics of node B while the interferer is turned on. RSSI (dbm) Noise (dbm) Channel busy time (ms) Channel active time (ms) Channel busy fraction = (Channel busy time)/ (Channel active time) Table 5.3: shows the wireless statistics of node B with the microwave oven turned on. RSSI Noise Channel busy time Channel Channel busy fraction = (dbm) (dbm) (ms) active time (Channel busy time)/ (ms) (Channel active time) From the obtained results, the observed RSSI value on the link remains almost constant even in the thick of interference. The RSSI value ranges between -64dBm and -71dBm and varies in a fashion that seems independent of the interference pattern. The small variations may be due to shadow fading which is usually modelled as a random process. This observation agrees with the results found in literature [43] in which the RSSI profile mapped to the packet delivery ratio (PDR) was compared with SNR and SINR profiles. The RSSI remained constant but the Packet Delivery Ratio dropped significantly as the amount if interference increased thus demonstrating the impact of interference on the reliability of packet receptions. This behaviour of RSSI may be explained by the fact that the RSSI, reported from a packet reception, does not represents the 38

46 energy observed at the antenna throughout the reception of the whole packet. Instead, RSSI is measured between the start of frame delimiter and the end of PLCP (Physical Layer Convergence Protocol) header. In other words, RSSI represents received signal strength only during the reception of the PLCP preamble and PLCP header. The PLCP preamble allows the receiver to synchronize with the transmitter for correct reception. An attempt to decode the packet is made only upon the correct reception of the PLCP header. If the PLCP reception fails due to interference, the RSSI will simply not be recorded. In addition, even if the rest of the packet (besides the PLCP) is affected by interference, the RSSI will still remain at a fairly stable value, since it was computed during the preceding PLCP transmission. Therefore, RSSI alone is inadequate in quantifying the average link quality over a period of time especially when running in b because it does not capture the amount of destructive interference on the links [38]. The RSSI value is known to behave differently when running the wireless card in a. However, this was not experimentally verified. On the other hand, throughout the experiment process the noise value reported by the node with the interferer turned on or off is a constant -95dBm. This is a vendor implementation issue. Furthermore, there are hardware registers in Atheros-based chipset called profile count registers which can be accessed using the Ath5k driver. These registers contain statistics about the recent channel activity. We were particularly interested in three of the profile count registers namely AR5K_PROFCNT_RXCLR, AR5K_PROFCNT_TX and AR5K_PROFCNT_CYCLE. The AR5K_PROFCNT_RXCLR register increases when the energy detected on the channel measures above the carrier sense threshold. The AR5K_PROFCNT_TX register increases whenever the card is transmitting packets. The AR5K_PROFCNT_CYCLE register acts like a clock, incrementing on each clock cycle. The values stored in the profile count registers AR5K_PROFCNT_RXCLR, AR5K_PROFCNT_TX, AR5K_PROFCNT_CYCLE are referred to as channel busy time, channel transmit time and channel active time respectively. From the obtained results, we observed that while the interferer was on, there was an increase in both channel busy time and channel transmit time. Because the two nodes are close enough to pick up on the interferer s traffic, node B s channel busy time increased with almost the same margin as the interferer. But, node B s channel transmit time did not increase significantly because the node was not taking part in the packet transmission. Similar results can be observed 39

47 when the microwave is used as the interferer in the experiment. When the microwave was turned on, the node s channel busy time increased significantly. This proves that even though some radio frequency interference cannot be decoded as packets, they still affect the channel busy time when they operate around the same frequency as the wireless network card. All these experiments were carried out late at night when the computer science honours lab was presumed completely quiet. The observed results confirm that the channel busy time increases whenever the channel is occupied. The results further confirm that the increase can be caused by other network nodes when they transmit as well as other devices operating in the same frequency band. Therefore, if we take channel busy fraction to be: Channel busy fraction =(channel busy time)/(channel active time) the channel busy time increases whenever the channel is occupied for the observed time slots. We can safely say that for a given time interval channel busy fraction increases when there is an increase in interference and reduces when there is no interference. 5.4 Discussion on the interference measurement For purposes of optimising a proactive wireless mesh routing protocol, it is desirous to obtain the values needed to compute the channel busy fraction in real-time. However, we can only obtained these values by sending read requests to the hardware registers. Therefore, the values are not read in real-time with a strict sense. Furthermore, sampling frequency is a trade-off between accuracy and performance overhead. Increasing the sampling rate increases the accuracy of the results but at the expense of increased processing overhead. In addition, the workings of the operating system may also affect the time between the read request and the time that the request is served. At times the operating system may not service the requests instantly. Furthermore, the inherent challenge in simultaneous read requests to the hardware registers means that we cannot read the registers at the exact same time and so, the obtained channel busy time and cycle time may not be a precise association. However, when the interference measurement is factored in the mesh routing protocol and used in a test-bed with uniform hardware and software configuration across the nodes, we still expect credible results because the value is being used in relative terms. In addition, there are other factors that affect the radio behaviour such as 40

48 temperature. Therefore, for a test-bed implementation with all the nodes in a single room, we assume that the internal temperature for all the radios across the nodes is the same. 5.5 Test-bed description and Protocol testing Some of the precautions taken during the evaluation of the resulting protocol include putting the nodes on an even surface to maintain equal height for all nodes. This is important because having the nodes at different heights could introduce different fading properties, which can in turn influence the link qualities among the nodes. In addition, the nodes have to be placed equidistant from each other Figure 5.2 test-bed topology. The initial plan was to use a 3 x 4 grid mesh test-bed but, due to resource constraints, the proof of concept was performed on a mesh network consisting of 4 nodes as show above. In I- BATMAN we decided to use the SNR interference model because of its simplicity. From the preliminary interference measurement experiments carried out, it is hard to vary the SNR using commodity wireless network interface card running in b mode with consistent reproducibility using the packet-storm technique. Therefore, in order to generate customized interference to vary the SNR across the nodes in a reproducible manner, we had to use a Catennas [44]. A Cantenna is a homemadeable directional antenna which lets you direct the interference to specific targeted nodes by careful rotation. We were able to degrade the SNR by waving an aluminium foil around the antenna of one node for five seconds and then the moving on to the other for the duration of the tests. The performance of I-BATAMAN was compared with the original BATMAN. We were particularly interested in finding out how I-BATMAN performed in terms of packet delay, 41

49 packet loss and route flapping. The following measurement processes were used for each of the metrics mentioned above. Packet delay: standard 84 byte packets were sent. The ping tool reports the round trip time as well as the standard deviation. Packet loss: The ping tool also reports the amount of packet loss that occurred over the duration of the ping test Route flapping: Using the ping tool with the R option to record the round trip route taken by an ICMP packet, we can detect how many route changes occurred during a set period of time by looking for changes in the route reports. Table 5.4 shows the results obtained over a total of forty tests carried out. Table 5.4: comparison of packet delay, packet loss and route flapping. Protocol Packet delay (ms) Packet loss (%) Route flapping BATMAN Mean Standard deviation Sample variance Minimum Maximum Count I-BATMAN Mean Standard deviation Sample variance Minimum Maximum Count From the obtained results, we see I-BATMAN doing better in terms of packet delay but is outperformed in terms of packet loss and route flapping. 42

50 Chapter 6 Conclusion The project demonstrates the feasibility of the next generation wireless mesh networks. In order to prove the concept, mesh nodes that gathered information about their environment were implemented. In particularly, mesh nodes were designed to estimate the amount of radio frequency interference in their environment. The interference was estimated using locally measurable values namely RSSI, noise, channel busy time and channel active time using commodity wireless network interface card. The simple SNR model does not reflect the levels of interference because the RSSI does not vary significantly with a significant increase in interference. For instance in the experiments carried out, even with a microwave oven (a known interferer) running in close proximity with the node, there was no significant change in the RSSI. The channel load report supported only by k compliant wireless cards provides information about the channel utilization k is part of the family of specification intended to improve the flow of traffic in the network. Although the CM9-GP cards used in the test-bed do not support the k, we were able to read the appropriate values from specific registers and compute the channel busy fraction as channel busy time/cycle time. The channel busy fraction provides a better indication of the channel busyness. There are many other manifestations of radio frequency interference that can be used to derive a finer grain of the interference measurement. But not all would be appropriate for real-time optimization such as in a routing protocol. Due to variations in the wireless network card hardware and driver implementations by different vendors, the model used to quantify interference holds only when you use a uniform type of hardware across the network. The findings are hardware-specific and only concrete for the hardware investigated. Furthermore, it is hard for a node to gather information about its wireless environment using a single wireless interface card. It is better to use multiple radios where one gets used for regular packet transmission while the other is used to gather wireless statistics. We were able to 43

51 workaround this limitation by using virtual interfaces i.e. creating multiple logical interfaces associated with a single physical interface. When the interference information experienced by each node was shared among mesh nodes by piggybacking onto the mesh routing protocol we called I-BATMAN (Interference aware Better Approach To Mobile and Ad hoc Networks), I-BATMAN out-performed BATMAN in terms of packet delay. Furthermore, I-BATMAN experienced more route flapping which is expected due to increased sensitivity. The increased route flapping also resulted in increased packet loss. 6.1 Future work Nodes that monitor wireless statistics and come up with a measure of radio frequency interference have been implement. Due to time constraints, not all desired elements were implemented. The resulting protocol I-BATMAN has exhibited higher sensitivity to SNR in comparison with the original BATMAN. The increased sensitivity means that I-BATMAN changes routes more frequently which results in less packet delay because I-BATMAN discovers better quality links. But the increased routing flapping also increases the packet loss. Therefore, future works include fine-tuning I-BATMAN to strike the perfect balance between protocol sensitivity to changes in the quality of the links and the need for reduced route flapping to avoid excess packet loss. The other elements to consider in future work include lower layer optimisation. 6.2 Physical/MAC layer optimization In any networking system, it is critical that the physical layer operates properly. When the physical layer is not operating properly, the higher protocol layers tend to operate in inefficient and sometimes confusing ways. The potential for physical layer problems is much worse with wireless networks. Unlike their wired counterpart where you worry about the physical layer issues only the first time you plug in the cable and expect it to work day after day, the wireless environment is totally different. With wireless networks, the quality of the physical connection can change hour by hour, as people introduce other devices or obstructions into the environment Classifying the nature or the source of interference 44

52 Throughout this project, radio frequency interference was treated as inadvertently due entirely by the collocated nature of the ISM band. However, it is evident that radio frequency interference can be intentionally caused using wireless jammers or subverted devices by someone with malicious intent. Therefore, it is important to design nodes that have an idea of where the interference is coming from so that an appropriate mitigation strategy can be adopted. While it is very hard to pinpoint the exact device causing interference due to the many sources of interference, it is generally possible to place the interference into general categories such as interference, Bluetooth interference, microwave interference, etc. The framework presented in [36] illustrates the principles involved in performing this categorisation using local measurements Determining the level of interference that amounts to poor communication Determining a measure of interference that amounts to poor communication is the first step towards employing a mitigation strategy. This can easily be done by repurposing the experiment illustrated in figure 5.1: a sender, a receiver and an interferer. The channel busy fraction at the receiver can be measurement periodically while the interferer is active. The ping tool can also be used at the sender to measure packet loss for example. The aim is to determine the value of channel busy fraction which amounts to poor communication performance as indicated by the percentage of packet loss. Since channel busy fraction is the fraction of the time the channel was sensed busy to successful or unsuccessful transmissions, it is important to determine when the increase in the channel busy fraction is caused by the node s own activity or by an interferer. Channel busy fraction being equal to (channel busy time)/(channel active time), we can subtract the node s send and receive time from the channel busy time. In other words, out of the time that the channel was sensed busy, we subtract the time that the node spent sending or receiving packets. The remaining channel busy time is busy time due to an interferer. Once the level of interference that amounts to unacceptable quality of communication between the nodes is established, a mitigation strategy such as channel hopping described below can then be employed. 45

53 6.2.3 Channel hopping The interference measured by the nodes was used to implement interference-aware routing in a wireless mesh network. However it is desirous to implement additional optimization at the lower layers. The Medium Access Control protocol implemented in wireless hardware already allows devices to share the communication medium. However, this holds only for nodes taking part in the MAC protocol. Future work should include channel hopping as the ultimate interference mitigation technique. Among the considerations to be made is the use of multiple wireless cards in each node with one card for data transmission and the other one for control and coordination purposes. While the nodes may easily be made to hop from one channel to the other, the challenge lies in establishing a distributed or centralised coordination scheme for nodes to switch to the same channel and an error correction mechanism to recover the data that might be lost while the nodes converge to a common channel. By and large, even though the nodes can detect non signals and be made to use a different channel, this approach does not solve all the problems that are out there. For examples some interfering devices such as Bluetooth devices, cordless phones, FH devices and jamming emissions are broadband. So it is not possible to totally change channels away from these devices, they are everywhere in the band. 46

54 7.0 References [1] X. U. W. Ang, K. Iyon, and I. Nc, A Survey on Wireless Mesh Networks, IEEE Communications Magazine, vol. 43, no. 9, pp , [2] M. E. M. Campista et al., Routing Metrics and Protocols for Wireless Mesh Networks, IEEE Network, vol. 22, no. 1, pp. 6-12, [3] K. R. Chowdhury and I. F. Akyildiz, Spectrum Access, IEEE Journal on selected areas in communication, vol. 26, no. 1, pp , [4] P. Kyasanur and N. H. Vaidya, Capacity of multi-channel wireless networks, in Proceedings of the 11th annual international conference on Mobile computing and networking - MobiCom 05, 2005, p. 43. [5] A. Raniwala, K. Gopalan, and T.-cker Chiueh, Centralized Channel Assignment and Routing Algorithms for Multi-Channel Wi reless Mesh Networks, Mobile Computing and Communication, vol. 8, no. 2, pp , [6] T. Charles, C. Iii, and J. Katz, Dynamic Spectrum Access in Cognitive Radio Networks, University of Maryland, [7] F. Juraschek, B. Blywis, and M. Gunes, Measurement-Based Interference Modeling Using Channel Occupancy in Wireless Mesh Networks, in IEEE International Symposium on World of Wireless, Mobile and Multimedia Networks, 2012, pp [8] M. Garetto, T. Salonidis, A. Saha, and E. Knightly, Identifying High Throughput Paths in Mesh Networks: Amodel based Approach, in IEEE International conference on network protocols, 2007, pp [9] D. R. Peter Steenkiste, Douglas Sicker, Gary Minden, Future Directions in Cognitive Radio Network Research NSF Workshop Report, Arlington, Virginia, [10] S. Haykin, Cognitive Radio: Brain-Empowered Wireless Communications, IEEE Selected Areas in Communication, vol. 23, no. 2, pp , [11] M.-G. Di Benedetto and L. De Nardis, Cognitive routing models in UWB networks, in rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008), 2008, pp [12] H. Ma, L. Zheng, and X. Ma, Spectrum Aware Routing for Multi-Hop Cognitive Radio Networks with a Single Transceiver, in rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications, 2008, pp

55 [13] I. Pefkianakis, S. H. Y. Wong, and S. Lu, SAMER: Spectrum Aware Mesh Routing in Cognitive Radio Networks, in rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2008, pp [14] K. C. How, M. Ma, and Y. Qin, An Opportunistic Service Differentiation, in IEEE Globecom, 2010, pp [15] I. F. Akyildiz, W.-yeol Lee, M. C. Vuran, and S. Mohanty, A Survey on Spectrum Management in Cognitive Radio Networks, IEEE Communications Magazine, vol. 46, no 1. April, pp , [16] D. Cabric, S. M. Mishra, and R. W. Brodersen, Implementation issues in spectrum sensing for cognitive radios, in Conference Record of the Thirty-Eighth Asilomar Conference on Signals, Systems and Computers, 2004, vol. 1, pp [17] A. Adya, P. Bahl, J. Padhye, A. Wolman, and L. Zhou, A Multi-Radio Unification Protocol for IEEE Wireless Networks, in First International Conference on Broadband Networks, 2004, pp [18] R. Draves, J. Padhye, and B. Zill, Routing in multi-radio, multi-hop wireless mesh networks, in 10th annual international conference on Mobile computing and networking - MobiCom, 2004, p [19] U. F. C. C. S. P. T. Force, Report of the Spectrum Efficiency Working Group, USA, [20] K. Harrison, S. M. Mishra, and A. Sahai, How Much White-Space Capacity is There?, in 2010 IEEE Symposium on New Frontiers in Dynamic Spectrum (DySPAN), 2010, pp [21] C. Cordeiro et al., IEEE : The First Worldwide Wireless Standard based on Cognitive Radios, in 2005 First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005, pp [22] S. Geirhofer and L. Tong, Dynamic Spectrum Access in the Time Domain: Modeling and Exploiting White Space, IEEE Communications Magazine, vol. 45, no. 5, pp , [23] I. F. Akyildiz, W.-Y. Lee, M. C. Vuran, and S. Mohanty, NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey, Computer Networks, vol. 50, no. 13, pp , Sep [24] B. M. Sadler, A Survey of Dynamic Spectrum Access, IEEE Signal Processing Magazine, vol. 24, no. 3, pp , May

56 [25] A. P. Subramanian, M. M. Buddhikot, and S. Miller, Interference Aware Routing in Multi-Radio Wireless Mesh Networks, in 2nd IEEE Workshop, 2006, pp [26] Y. T. Hou, Y. Shi, and J. Liu, How to Correctly Use the Protocol Interference Model for Multi-hop Wireless Networks, in MobiHoc, 2009, pp [27] J. Bardwell, Converting Signal Strength Percentage to dbm Values. November. WildPackets, p. 5, [28] L. Qiu, F. Wang, and M. K. Han, A General Model of Wireless Interference, in MobiCom, 2007, pp [29] Y. Yang, J. Wang, and R. Kravets, Designing Routing Metrics for Mesh Networks, in IEEE Workshop on wireless mesh networks, 2005, pp [30] Y. Yang, J. Wang, and R. Kravets, Interference-aware Load Balancing for Multihop Wireless Networks. Computer Science Research and Tech Reports, pp. 1-16, [31] S. Kerry, P. Al, S. McCann, T.-kheong Tan, and T. Cole, IEEE Std k-2008 (Amendment to IEEE Std ) IEEE Standard for Information Technology Telecommunications and Information exchange between systems, local and metropolitan area networks specific requirements. IEEE Computer Society, New York, pp. 4-5, [32] K. Jain, J. Padhye, V. N. Padmanabhan, and L. Qiu, Impact of Interference on Multi-Hop Wireless Network Performance, Wireless Networks, vol. 11, no. 4, pp , [33] D. Johnson and C. Aichele, A simple pragmatic approach to mesh routing using BATMAN, in 2nd IFIP International Symposium on Wireless Communication and Information Technology in Developing Countries, 2008, pp [34] PC Engine, Alix2d2, Product specification, [Online]. Available: [35] C. Edmonds, D. Joiner, S. Springer, K. Stephen, and B. Hamdaoui, Cognitive Wireless Mesh Network Testbed, in Wireless Communications and Mobile Computing Conference, 2008, pp [36] K. Lakshminarayanan, S. Seshan, and P. Steenkiste, Understanding Performance in Heterogeneous Environments, in The 2nd ACM SIGCOMM workshop on Home networks, 2011, pp [37] S. S. Gummadi, Ramakrishna, David Wetherall, Ben Greenstein, Understanding and Mitigating the Impact of RF Interference on Networks, in SIGCOMM conference on Applications, technologies, architectures, and protocols for computer communications, 2007, pp

57 [38] L. Kong, I. Broustis, S. V. Krishnamurthy, and M. Faloutsos, Assessing Link Quality in IEEE Wireless Networks: Which is the Right Metric? in IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications, 2008, pp [39] Madwifi, Madwifi, Madwifi Project, [Online]. Available: [40] Debian, Debian for Alix, Debian, [Online]. Available: [41] Netlink, nl80211, Linux Wireless, [Online]. Available: [42] J. Bardwell, You Believe You Understand What You Think I Said The Truth About Signal And Noise Metrics. Connect802 Corporation, pp. 5-7, [43] W. L. Tan, P. Hu, and M. Portmann, Experimental Evaluation of Measurement-based SINR Interference Models, in IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, 2012, pp [44] C. A. Boano, Z. He, Y. Li, T. Voigt, M. Zuniga, and A. Willig, Controllable radio interference for experimental and testing purposes in Wireless Sensor Networks, in IEEE 34th Conference on Local Computer Networks, 2009, pp

A survey on Spectrum Management in Cognitive Radio Networks

A survey on Spectrum Management in Cognitive Radio Networks A survey on Spectrum Management in Cognitive Radio Networks Ian F. Akyildiz, Won-Yeol Lee, Mehmet C. Vuran, Shantidev Mohanty Georgia Institute of Technology Communications Magazine, vol 46, April 2008,

More information

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit

More information

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility

More information

From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks. Loreto Pescosolido

From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks. Loreto Pescosolido From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks Loreto Pescosolido Spectrum occupancy with current technologies Current wireless networks, operating in either

More information

A survey on Wireless Mesh Networks

A survey on Wireless Mesh Networks A survey on Wireless Mesh Networks IF Akyildiz, X Wang - Communications Magazine, IEEE, 2005 Youngbin Im [email protected] 2007.10.15. Contents Introduction to WMNs Network architecture Critical design

More information

SmartDiagnostics Application Note Wireless Interference

SmartDiagnostics Application Note Wireless Interference SmartDiagnostics Application Note Wireless Interference Publication Date: May 27, 2015 KCF Technologies, Inc. Background The SmartDiagnostics wireless network is an easy to install, end-to-end machine

More information

Rapid Prototyping of a Frequency Hopping Ad Hoc Network System

Rapid Prototyping of a Frequency Hopping Ad Hoc Network System Rapid Prototyping of a Frequency Hopping Ad Hoc Network System Martin Braun, Nico Otterbach, Jens Elsner, and Friedrich K. Jondral Communications Engineering Lab, Karlsruhe Institute of Technology (KIT),

More information

communication over wireless link handling mobile user who changes point of attachment to network

communication over wireless link handling mobile user who changes point of attachment to network Wireless Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers! computer nets: laptops, palmtops, PDAs, Internet-enabled phone promise anytime untethered Internet

More information

Bluetooth voice and data performance in 802.11 DS WLAN environment

Bluetooth voice and data performance in 802.11 DS WLAN environment 1 (1) Bluetooth voice and data performance in 802.11 DS WLAN environment Abstract In this document, the impact of a 20dBm 802.11 Direct-Sequence WLAN system on a 0dBm Bluetooth link is studied. A typical

More information

Real-Time Communication in IEEE 802.11 Wireless Mesh Networks: A Prospective Study

Real-Time Communication in IEEE 802.11 Wireless Mesh Networks: A Prospective Study in IEEE 802.11 : A Prospective Study January 2011 Faculty of Engineering of the University of Porto Outline 1 Introduction 2 3 4 5 in IEEE 802.11 : A Prospective Study 2 / 28 Initial Considerations Introduction

More information

Municipal Mesh Network Design

Municipal Mesh Network Design White Paper Municipal Mesh Network Design Author: Maen Artimy 1 Summary This document provides a wireless mesh network design for the downtown area of the Town of Wolfville, Nova Scotia. This design serves

More information

Propsim enabled Mobile Ad-hoc Network Testing

Propsim enabled Mobile Ad-hoc Network Testing www.anite.com Propsim enabled Mobile Ad-hoc Network Testing Anite is now part of Keysight Technologies Lab-based, end-to-end performance testing of systems using Propsim MANET channel emulation A Mobile

More information

CS263: Wireless Communications and Sensor Networks

CS263: Wireless Communications and Sensor Networks CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA

More information

IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks

IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks Zhibin Wu, Sachin Ganu and Dipankar Raychaudhuri WINLAB, Rutgers University 2006-11-16 IAB Research Review, Fall 2006 1 Contents

More information

Defining the Smart Grid WAN

Defining the Smart Grid WAN Defining the Smart Grid WAN WHITE PAPER Trilliant helps leading utilities and energy retailers achieve their smart grid visions through the Trilliant Communications Platform, the only communications platform

More information

Dynamic Reconfiguration & Efficient Resource Allocation for Indoor Broadband Wireless Networks

Dynamic Reconfiguration & Efficient Resource Allocation for Indoor Broadband Wireless Networks Dynamic Reconfiguration & Efficient Resource Allocation for Indoor Broadband Wireless Networks Tim Farnham, Brian Foxon* Home Communications Department HP Laboratories Bristol HPL-98-123 June, 1998 broadband,

More information

Solving the Wireless Mesh Multi-Hop Dilemma

Solving the Wireless Mesh Multi-Hop Dilemma Access/One Network White Paper Solving the Wireless Mesh Multi-Hop Dilemma 210-0008-01 Executive Summary 1 Introduction 2 Approaches to Wireless Mesh 4 The Multi-Hop Dilemma 6 Executive Summary A New Breed

More information

Intelligent Channel Bonding in 802.11n WLANs

Intelligent Channel Bonding in 802.11n WLANs Intelligent Channel Bonding in 82.n WLANs Lara Deek, Eduard Garcia-Villegas, Elizabeth Belding, Sung-Ju Lee, Kevin Almeroth UC Santa Barbara, UPC-BarcelonaTECH, Narus Inc. [email protected], [email protected],

More information

Networking: Certified Wireless Network Administrator Wi Fi Engineering CWNA

Networking: Certified Wireless Network Administrator Wi Fi Engineering CWNA coursemonster.com/uk Networking: Certified Wireless Network Administrator Wi Fi Engineering CWNA View training dates» Overview This new market-leading course from us delivers the best in Wireless LAN training,

More information

Demystifying Wireless for Real-World Measurement Applications

Demystifying Wireless for Real-World Measurement Applications Proceedings of the IMAC-XXVIII February 1 4, 2010, Jacksonville, Florida USA 2010 Society for Experimental Mechanics Inc. Demystifying Wireless for Real-World Measurement Applications Kurt Veggeberg, Business,

More information

EPL 657 Wireless Networks

EPL 657 Wireless Networks EPL 657 Wireless Networks Some fundamentals: Multiplexing / Multiple Access / Duplex Infrastructure vs Infrastructureless Panayiotis Kolios Recall: The big picture... Modulations: some basics 2 Multiplexing

More information

Maximizing Range and Battery Life in Low-Cost Wireless Networks

Maximizing Range and Battery Life in Low-Cost Wireless Networks Maximizing Range and Battery Life in Low-Cost Wireless Networks The proliferation of cost-effective wireless technology has led to the rise of entirely new types of networks across a wide range of applications

More information

Lab Exercise 802.11. Objective. Requirements. Step 1: Fetch a Trace

Lab Exercise 802.11. Objective. Requirements. Step 1: Fetch a Trace Lab Exercise 802.11 Objective To explore the physical layer, link layer, and management functions of 802.11. It is widely used to wireless connect mobile devices to the Internet, and covered in 4.4 of

More information

Wireless Technologies for the 450 MHz band

Wireless Technologies for the 450 MHz band Wireless Technologies for the 450 MHz band By CDG 450 Connectivity Special Interest Group (450 SIG) September 2013 1. Introduction Fast uptake of Machine- to Machine (M2M) applications and an installed

More information

Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh

Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh, Ph.D. [email protected] Mesh 2008, Cap Esterel, France 1 Abstract Abundant hidden node collisions and correlated channel access

More information

LoRa FAQs. www.semtech.com 1 of 4 Semtech. Semtech Corporation LoRa FAQ

LoRa FAQs. www.semtech.com 1 of 4 Semtech. Semtech Corporation LoRa FAQ LoRa FAQs 1.) What is LoRa Modulation? LoRa (Long Range) is a modulation technique that provides significantly longer range than competing technologies. The modulation is based on spread-spectrum techniques

More information

Frequency Hopping Spread Spectrum (FHSS) vs. Direct Sequence Spread Spectrum (DSSS) in Broadband Wireless Access (BWA) and Wireless LAN (WLAN)

Frequency Hopping Spread Spectrum (FHSS) vs. Direct Sequence Spread Spectrum (DSSS) in Broadband Wireless Access (BWA) and Wireless LAN (WLAN) FHSS vs. DSSS page 1 of 16 Frequency Hopping Spread Spectrum (FHSS) vs. Direct Sequence Spread Spectrum (DSSS) in Broadband Wireless Access (BWA) and Wireless LAN (WLAN) by Sorin M. SCHWARTZ Scope In 1997

More information

TOWARDS STUDYING THE WLAN SECURITY ISSUES SUMMARY

TOWARDS STUDYING THE WLAN SECURITY ISSUES SUMMARY TOWARDS STUDYING THE WLAN SECURITY ISSUES SUMMARY SUBMITTED TO THE KUMAUN UNIVERSITY, NAINITAL BY MANOJ CHANDRA LOHANI FOR THE AWARD OF THE DEGREE OF DOCTOR OF PHILOSOPHY IN COMPUTER SCIENCE UNDER THE

More information

Technology White Paper Capacity Constrained Smart Grid Design

Technology White Paper Capacity Constrained Smart Grid Design Capacity Constrained Smart Grid Design Smart Devices Smart Networks Smart Planning EDX Wireless Tel: +1-541-345-0019 I Fax: +1-541-345-8145 I [email protected] I www.edx.com Mark Chapman and Greg Leon EDX Wireless

More information

GTER 26 tudo o que você. quer saber sobre 802.11n

GTER 26 tudo o que você. quer saber sobre 802.11n GTER 26 tudo o que você (não) quer saber sobre 802.11n Luiz Eduardo Dos Santos CISSP CWNE CEH GISP GCIH Sr. Systems & Security Engineer Americas hello agenda evolution of wi-fi what makes 11n what actually

More information

Discussion Paper Category 6 vs Category 5e Cabling Systems and Implications for Voice over IP Networks

Discussion Paper Category 6 vs Category 5e Cabling Systems and Implications for Voice over IP Networks Discussion Paper Category 6 vs Category 5e Cabling Systems and Implications for Voice over IP Networks By Galen Udell Belden CDT Networking 2006 Category 6 vs Category 5e Cabling Systems and Implications

More information

Efficient Load Balancing Routing in Wireless Mesh Networks

Efficient Load Balancing Routing in Wireless Mesh Networks ISSN (e): 2250 3005 Vol, 04 Issue, 12 December 2014 International Journal of Computational Engineering Research (IJCER) Efficient Load Balancing Routing in Wireless Mesh Networks S.Irfan Lecturer, Dept

More information

What s so smart about Smart-hopping?

What s so smart about Smart-hopping? What s so smart about Smart-hopping? A closer look at some of the key technology decisions behind the IntelliVue Smart-hopping WMTS band Introduction The IntelliVue Smart-hopping WMTS band opens up a world

More information

Wi-Fi and Bluetooth - Interference Issues

Wi-Fi and Bluetooth - Interference Issues Wi-Fi and Bluetooth - Interference Issues January 2002 1 Introduction Because both Wi-Fi and Bluetooth wireless technology share spectrum and will often be located in close physical proximity to one another,

More information

Security in Ad Hoc Network

Security in Ad Hoc Network Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops

More information

How To Provide Qos Based Routing In The Internet

How To Provide Qos Based Routing In The Internet CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this

More information

Site Survey and RF Design Validation

Site Survey and RF Design Validation CHAPTER 8 Site Survey Introduction In the realm of wireless networking, careful planning is essential to ensure that your wireless network performs in a manner that is consistent with Cisco s design and

More information

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).

More information

A Routing Metric for Load-Balancing in Wireless Mesh Networks

A Routing Metric for Load-Balancing in Wireless Mesh Networks A Routing Metric for Load-Balancing in Wireless Mesh Networks Liang Ma and Mieso K. Denko Department of Computing and Information Science University of Guelph, Guelph, Ontario, Canada, N1G 2W1 email: {lma02;mdenko}@uoguelph.ca

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

Wave Relay System and General Project Details

Wave Relay System and General Project Details Wave Relay System and General Project Details Wave Relay System Provides seamless multi-hop connectivity Operates at layer 2 of networking stack Seamless bridging Emulates a wired switch over the wireless

More information

HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper

HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper Rev 1.0 HIPAA Security Considerations for Broadband Fixed Wireless Access Systems This white paper will investigate

More information

LTE, WLAN, BLUETOOTHB

LTE, WLAN, BLUETOOTHB LTE, WLAN, BLUETOOTHB AND Aditya K. Jagannatham FUTURE Indian Institute of Technology Kanpur Commonwealth of Learning Vancouver 4G LTE LTE (Long Term Evolution) is the 4G wireless cellular standard developed

More information

Planning for 802.11ac Adoption with Ekahau Site Survey 6.0

Planning for 802.11ac Adoption with Ekahau Site Survey 6.0 Planning for 802.11ac Adoption with Ekahau Site Survey 6.0 1 P a g e w w w. e k a h a u. c o m / e s s Introduction to 802.11ac The emerging next generation Wi-Fi standard IEEE 802.11ac aims to break the

More information

Multi-Channel Wireless Networks: Capacity, Protocols, and Experimentation (with Net-X) Nitin Vaidya

Multi-Channel Wireless Networks: Capacity, Protocols, and Experimentation (with Net-X) Nitin Vaidya Multi-Channel Wireless Networks: Capacity, Protocols, and Experimentation (with Net-X) Nitin Vaidya University of Illinois at Urbana-Champaign www.crhc.uiuc.edu/wireless Joint work with Pradeep Kyasanur,

More information

APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM

APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM 152 APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM A1.1 INTRODUCTION PPATPAN is implemented in a test bed with five Linux system arranged in a multihop topology. The system is implemented

More information

VoIP on WLAN, QoS issues and VoIP specifics

VoIP on WLAN, QoS issues and VoIP specifics ETSI STQ Workshop Compensating for Packet Loss in Real-Time Applications, Feb 2003 VoIP on WLAN, QoS issues and VoIP specifics Alan Duric Sen. Systems Architect SIP/email: [email protected]

More information

Routing in Multi-Channel Multi-Interface Ad Hoc Wireless Networks

Routing in Multi-Channel Multi-Interface Ad Hoc Wireless Networks Routing in Multi-Channel Multi-Interface Ad Hoc Wireless Networks Technical Report, December 4 Pradeep Kyasanur Dept. of Computer Science, and Coordinated Science Laboratory, University of Illinois at

More information

Interference Measurements on Performance Degradation between Colocated IEEE 802.11g/n and IEEE 802.15.4 Networks

Interference Measurements on Performance Degradation between Colocated IEEE 802.11g/n and IEEE 802.15.4 Networks Interference Measurements on Performance Degradation between Colocated IEEE 802.11g/n and IEEE 802.15.4 Networks Marina Petrova, Lili Wu, Petri Mähönen and Janne Riihijärvi Department of Wireless Networks,

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION 21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless

More information

QoS issues in Voice over IP

QoS issues in Voice over IP COMP9333 Advance Computer Networks Mini Conference QoS issues in Voice over IP Student ID: 3058224 Student ID: 3043237 Student ID: 3036281 Student ID: 3025715 QoS issues in Voice over IP Abstract: This

More information

Broadband Networks. Prof. Dr. Abhay Karandikar. Electrical Engineering Department. Indian Institute of Technology, Bombay. Lecture - 29.

Broadband Networks. Prof. Dr. Abhay Karandikar. Electrical Engineering Department. Indian Institute of Technology, Bombay. Lecture - 29. Broadband Networks Prof. Dr. Abhay Karandikar Electrical Engineering Department Indian Institute of Technology, Bombay Lecture - 29 Voice over IP So, today we will discuss about voice over IP and internet

More information

An Algorithm for Automatic Base Station Placement in Cellular Network Deployment

An Algorithm for Automatic Base Station Placement in Cellular Network Deployment An Algorithm for Automatic Base Station Placement in Cellular Network Deployment István Törős and Péter Fazekas High Speed Networks Laboratory Dept. of Telecommunications, Budapest University of Technology

More information

ECE/CS 372 introduction to computer networks. Lecture 13

ECE/CS 372 introduction to computer networks. Lecture 13 ECE/CS 372 introduction to computer networks Lecture 13 Announcements: HW #4 hard copy due today Lab #5 posted is due Tuesday June 4 th HW #5 posted is due Thursday June 6 th Pickup midterms Acknowledgement:

More information

How To Make A Multi-User Communication Efficient

How To Make A Multi-User Communication Efficient Multiple Access Techniques PROF. MICHAEL TSAI 2011/12/8 Multiple Access Scheme Allow many users to share simultaneously a finite amount of radio spectrum Need to be done without severe degradation of the

More information

THE BCS PROFESSIONAL EXAMINATIONS BCS Level 5 Diploma in IT. October 2009 EXAMINERS' REPORT. Computer Networks

THE BCS PROFESSIONAL EXAMINATIONS BCS Level 5 Diploma in IT. October 2009 EXAMINERS' REPORT. Computer Networks THE BCS PROFESSIONAL EXAMINATIONS BCS Level 5 Diploma in IT October 2009 EXAMINERS' REPORT Computer Networks General Comments The responses to questions were of marginally better quality than April 2009

More information

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006 CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)

More information

Protocolo IEEE 802.15.4. Sergio Scaglia SASE 2012 - Agosto 2012

Protocolo IEEE 802.15.4. Sergio Scaglia SASE 2012 - Agosto 2012 Protocolo IEEE 802.15.4 SASE 2012 - Agosto 2012 IEEE 802.15.4 standard Agenda Physical Layer for Wireless Overview MAC Layer for Wireless - Overview IEEE 802.15.4 Protocol Overview Hardware implementation

More information

VOICE OVER WI-FI CAPACITY PLANNING

VOICE OVER WI-FI CAPACITY PLANNING VOICE OVER WI-FI CAPACITY PLANNING Version 1.0 Copyright 2003 Table of Contents Introduction...3 Wi-Fi RF Technology Options...3 Spectrum Availability and Non-Overlapping Wi-Fi Channels...4 Limited

More information

SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS

SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS Sonia Waharte, Kevin Ritzenthaler and Raouf Boutaba University of Waterloo, School of Computer Science 00, University Avenue West,

More information

Ultra Wideband Signal Impact on IEEE802.11b Network Performance

Ultra Wideband Signal Impact on IEEE802.11b Network Performance Ultra Wideband Signal Impact on IEEE802.11b Network Performance Matti Hämäläinen 1, Jani Saloranta 1, Juha-Pekka Mäkelä 1, Tero Patana 2, Ian Oppermann 1 1 Centre for Wireless Communications (CWC), University

More information

Wireless LAN Concepts

Wireless LAN Concepts Wireless LAN Concepts Wireless LAN technology is becoming increasingly popular for a wide variety of applications. After evaluating the technology, most users are convinced of its reliability, satisfied

More information

IEEE 802.11n Enterprise Class Wireless LAN?

IEEE 802.11n Enterprise Class Wireless LAN? Introduction Over the last decade Wi-Fi has advanced from a technology offering a maximum 2Mbps over-theair data rate, to 11Mbps and now to 54Mbps. The technology has been improved to include additions

More information

Tri-Band RF Transceivers for Dynamic Spectrum Access. By Nishant Kumar and Yu-Dong Yao

Tri-Band RF Transceivers for Dynamic Spectrum Access. By Nishant Kumar and Yu-Dong Yao Tri-Band RF Transceivers for Dynamic Spectrum Access By Nishant Kumar and Yu-Dong Yao Presentation outline Introduction to WISELAB Active work at WISELAB Tri-band test bed Elements of the test bed Experimentation

More information

An Overview of ZigBee Networks

An Overview of ZigBee Networks An Overview of ZigBee Networks A guide for implementers and security testers Matt Hillman Contents 1. What is ZigBee?... 3 1.1 ZigBee Versions... 3 2. How Does ZigBee Operate?... 3 2.1 The ZigBee Stack...

More information

Wireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ

Wireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ Wireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ Q: What is a Wireless LAN (WLAN)? Q: What are the benefits of using a WLAN instead of a wired network connection? Q: Are Intel WLAN products

More information

Chapter 7 Low-Speed Wireless Local Area Networks

Chapter 7 Low-Speed Wireless Local Area Networks Wireless# Guide to Wireless Communications 7-1 Chapter 7 Low-Speed Wireless Local Area Networks At a Glance Instructor s Manual Table of Contents Overview Objectives s Quick Quizzes Class Discussion Topics

More information

FORTH-ICS / TR-375 March 2006. Experimental Evaluation of QoS Features in WiFi Multimedia (WMM)

FORTH-ICS / TR-375 March 2006. Experimental Evaluation of QoS Features in WiFi Multimedia (WMM) FORTH-ICS / TR-375 March 26 Experimental Evaluation of QoS Features in WiFi Multimedia (WMM) Vasilios A. Siris 1 and George Stamatakis 1 Abstract We investigate the operation and performance of WMM (WiFi

More information

IEEE802.11ac: The Next Evolution of Wi-Fi TM Standards

IEEE802.11ac: The Next Evolution of Wi-Fi TM Standards QUALCOMM, Incorporated May 2012 QUALCOMM is a registered trademark of QUALCOMM Incorporated in the United States and may be registered in other Countries. Other product and brand names may be trademarks

More information

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs)

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs) CS6956: Wireless and Mobile Networks Lecture Notes: //05 IEEE 80. Wireless Local Area Networks (WLANs) CSMA/CD Carrier Sense Multi Access/Collision Detection detects collision and retransmits, no acknowledgement,

More information

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman 1 Wireless Networks Reading: Sec5on 2.8 COS 461: Computer Networks Spring 2011 Mike Freedman hep://www.cs.princeton.edu/courses/archive/spring11/cos461/ 2 Widespread Deployment Worldwide cellular subscribers

More information

Dynamic Load Balance Algorithm (DLBA) for IEEE 802.11 Wireless LAN

Dynamic Load Balance Algorithm (DLBA) for IEEE 802.11 Wireless LAN Tamkang Journal of Science and Engineering, vol. 2, No. 1 pp. 45-52 (1999) 45 Dynamic Load Balance Algorithm () for IEEE 802.11 Wireless LAN Shiann-Tsong Sheu and Chih-Chiang Wu Department of Electrical

More information

Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks

Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Kiruthiga S PG student, Coimbatore Institute of Engineering and Technology Anna University, Chennai,

More information

Applying Mesh Networking to Wireless Lighting Control

Applying Mesh Networking to Wireless Lighting Control White Paper Applying Mesh Networking to Wireless Lighting Control www.daintree.net Abstract Recent advances in wireless communications standards and energy-efficient lighting equipment have made it possible

More information

ZIGBEE 802.15.4. ECGR-6185 Advanced Embedded Systems. Charlotte. University of North Carolina-Charlotte. Chaitanya Misal Vamsee Krishna

ZIGBEE 802.15.4. ECGR-6185 Advanced Embedded Systems. Charlotte. University of North Carolina-Charlotte. Chaitanya Misal Vamsee Krishna ECGR-6185 Advanced Embedded Systems ZIGBEE 802.15.4 University of North Carolina-Charlotte Charlotte Chaitanya Misal Vamsee Krishna WPAN A personal area network (PAN) is a computer network used for communication

More information

- Cognitive Radio (CR) technology is a promising emerging technology that enables a more efficient usage of

- Cognitive Radio (CR) technology is a promising emerging technology that enables a more efficient usage of An Asynchronous Neighbor Discovery Algorithm for Cognitive Radio Networks Short Paper Chanaka J. Liyana Arachchige, S. Venkatesan and Neeraj Mittal Erik Jonsson School of Engineering and Computer Science

More information

Performance Evaluation of The Split Transmission in Multihop Wireless Networks

Performance Evaluation of The Split Transmission in Multihop Wireless Networks Performance Evaluation of The Split Transmission in Multihop Wireless Networks Wanqing Tu and Vic Grout Centre for Applied Internet Research, School of Computing and Communications Technology, Glyndwr

More information

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur Module 5 Broadcast Communication Networks Lesson 9 Cellular Telephone Networks Specific Instructional Objectives At the end of this lesson, the student will be able to: Explain the operation of Cellular

More information

Scanning Delays in 802.11 Networks

Scanning Delays in 802.11 Networks Scanning Delays in 802.11 Networks David Murray Murdoch University [email protected] Michael Dixon Murdoch University [email protected] Terry Koziniec Murdoch University [email protected]

More information

TECHNICAL NOTE. GoFree WIFI-1 web interface settings. Revision Comment Author Date 0.0a First release James Zhang 10/09/2012

TECHNICAL NOTE. GoFree WIFI-1 web interface settings. Revision Comment Author Date 0.0a First release James Zhang 10/09/2012 TECHNICAL NOTE GoFree WIFI-1 web interface settings Revision Comment Author Date 0.0a First release James Zhang 10/09/2012 1/14 Web interface settings under admin mode Figure 1: web interface admin log

More information

Metrics for Detection of DDoS Attacks

Metrics for Detection of DDoS Attacks Chapter 3 Metrics for Detection of DDoS Attacks The DDoS attacks are trying to interfere with the physical transmission and reception of wireless communications. Attacks are caused by jamming, exhaustion,

More information

Inter-Cell Interference Coordination (ICIC) Technology

Inter-Cell Interference Coordination (ICIC) Technology Inter-Cell Interference Coordination (ICIC) Technology Dai Kimura Hiroyuki Seki Long Term Evolution (LTE) is a promising standard for next-generation cellular systems targeted to have a peak downlink bit

More information

Wireless mesh networks: a survey

Wireless mesh networks: a survey Computer Networks 47 (2005) 445 487 www.elsevier.com/locate/comnet Wireless mesh networks: a survey Ian F. Akyildiz a, Xudong Wang b, *, Weilin Wang b a Broadband and Wireless Networking (BWN) Lab, School

More information

... neither PCF nor CA used in practice

... neither PCF nor CA used in practice IEEE 802.11 MAC CSMA/CA with exponential backoff almost like CSMA/CD drop CD CSMA with explicit ACK frame added optional feature: CA (collision avoidance) Two modes for MAC operation: Distributed coordination

More information

Lecture 17: 802.11 Wireless Networking"

Lecture 17: 802.11 Wireless Networking Lecture 17: 802.11 Wireless Networking" CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Lili Qiu, Nitin Vaidya Lecture 17 Overview" Project discussion Intro to 802.11 WiFi Jigsaw discussion

More information

High-Density Wi-Fi. Application Note

High-Density Wi-Fi. Application Note High-Density Wi-Fi Application Note Table of Contents Background... 3 Description... 3 Theory of Operation... 3 Application Examples... Tips and Recommendations... 7 2 Background One of the biggest challenges

More information

Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks

Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks 1 Mr. Praveen S Patil, 2 Mr. Rabinarayan Panda, 3 Mr. Sunil Kumar R D 1,2,3 Asst. Professor, Department of MCA, The Oxford College of Engineering,

More information

White Paper. Requirements of Network Virtualization

White Paper. Requirements of Network Virtualization White Paper on Requirements of Network Virtualization INDEX 1. Introduction 2. Architecture of Network Virtualization 3. Requirements for Network virtualization 3.1. Isolation 3.2. Network abstraction

More information

Performance Evaluation of Linux Bridge

Performance Evaluation of Linux Bridge Performance Evaluation of Linux Bridge James T. Yu School of Computer Science, Telecommunications, and Information System (CTI) DePaul University ABSTRACT This paper studies a unique network feature, Ethernet

More information

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP) TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) *Slides adapted from a talk given by Nitin Vaidya. Wireless Computing and Network Systems Page

More information

Guide for wireless environments

Guide for wireless environments Sanako Study Guide for wireless environments 1 Contents Sanako Study... 1 Guide for wireless environments... 1 What will you find in this guide?... 3 General... 3 Disclaimer... 3 Requirements in brief...

More information

Deliberant.com, 2011. Technology review

Deliberant.com, 2011. Technology review Technology review 11N advantages Parameter 802.11a/g 802.11n 2x2 Improvement factor Data rate, Mbps 108 300 2.7x Max throughput, h t Mbps 45 150 3.3x3 Spectral efficiency, bit/hz 1.125 3.75 3.3x Signal

More information

Performance Measurement of Wireless LAN Using Open Source

Performance Measurement of Wireless LAN Using Open Source Performance Measurement of Wireless LAN Using Open Source Vipin M Wireless Communication Research Group AU KBC Research Centre http://comm.au-kbc.org/ 1 Overview General Network Why Network Performance

More information

Wharf T&T Limited Report of Wireless LAN Technology Trial Version: 1.0 Date: 26 Jan 2004. Wharf T&T Limited. Version: 1.0 Date: 26 January 2004

Wharf T&T Limited Report of Wireless LAN Technology Trial Version: 1.0 Date: 26 Jan 2004. Wharf T&T Limited. Version: 1.0 Date: 26 January 2004 Wharf T&T Limited Version: 1.0 Date: 26 January 2004 This document is the property of Wharf T&T Limited who owns the copyright therein. Without the written consent of Wharf T&T Limited given by contract

More information

Wireless 802.11g CF Card User Manual

Wireless 802.11g CF Card User Manual Wireless 802.11g CF Card User Manual Version 1.0 Copyright statement No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, whether electronic,

More information