Continuous network discovery using Opportunistic Scanning

Similar documents
EETS 8316 Wireless Networks Fall 2013

Real-Time Communication in IEEE Wireless Mesh Networks: A Prospective Study

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS

Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks

Voice-over-Wi-Fi Implementation with Single Stream n

Wireless LAN Services for Hot-Spot

Modeling and Simulation of Quality of Service in VoIP Wireless LAN

How To Understand Wireless Network Quality Of Service (Qos) In E

Cooperative Handoff in Wireless Networks

A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE Wireless Local Area Networks (WLANs)

Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh

Introduction VOIP in an Network VOIP 3

Adaptive DCF of MAC for VoIP services using IEEE networks

Multichannel Virtual Access Points for Seamless Handoffs in IEEE Wireless Networks

A Neighborhood Awareness Method for Handoff Assistance in Wireless Networks

HO Policies for Combined WLAN/UMTS Networks

Performance Analysis and Comparison between Legacy-PSM and U-APSD

Handover Management based on the Number of Retries for VoIP on WLANs

DeuceScan: Deuce-Based Fast Handoff Scheme in IEEE Wireless Networks

Performance Analysis and Comparison between Legacy-PSM and U-APSD

A O T. Heterogeneous Networks and Mobility User Perspective. Agententechnologien in der Telekommunikation Sommersemester Lecture

Mobility Management Technique for Real Time Traffic in Networks

TCOM 370 NOTES LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL

ANALYSIS OF VOICE OVER IP DURING VERTICAL HANDOVERS IN HETEROGENEOUS WIRELESS AND MOBILE NETWORKS

Video Transmission over Wireless LAN. Hang Liu

Aspects of Coexistence Between WiFi and HSDPA

CS698T Wireless Networks: Principles and Practice

Demystifying Wi-Fi Roaming

Scanning Delays in Networks

Configuration Notes Trapeze Networks Infrastructure in Ascom VoWiFi System

A Software Architecture for Simulating IEEE e HCCA

Markku Renfors. Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak

Wiereless LAN

Passive Discovery Algorithms

A survey on Spectrum Management in Cognitive Radio Networks

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

MultiNet: Connecting to Multiple IEEE Networks Using a Single Wireless Card

Performance of Symmetric Neighbor Discovery in Bluetooth Ad Hoc Networks

Copyright 2014 Luxul. All rights reserved. All trademarks and registered trademarks are property of respective holders.

Analysis of Effect of Handoff on Audio Streaming in VOIP Networks

Dynamic Load Balance Algorithm (DLBA) for IEEE Wireless LAN

Mobility Management Advanced

FOMA (R) /Wireless LAN Dual Terminals, Wireless LAN Technology

WiLink 8 Solutions. Coexistence Solution Highlights. Oct 2013

VoIP Session Capacity Expansion with Packet Transmission Suppression Control in Wireless LAN

Lecture 17: Wireless Networking"

Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network

Analysis and Simulation of VoIP LAN vs. WAN WLAN vs. WWAN

An End-to-End Measurement-Based Admission Control Policy for VoIP over Wireless Networks

VoIP over Wireless Opportunities and Challenges

Analysis and Enhancement of QoS in Cognitive Radio Network for Efficient VoIP Performance

QoS-aware MPDU Aggregation of IEEE n WLANs for VoIP Services

SBSCET, Firozpur (Punjab), India

White paper. Cisco Compatible Extensions: Client Benefits on a Cisco WLAN

ISSN: ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September

Ring Local Area Network. Ring LANs

II. IEEE802.11e EDCA OVERVIEW

Reducing MAC Layer Handoff Latency in IEEE Wireless LANs

Scheduling Video Stream Transmissions for Distributed Playback over Mobile Cellular Networks

Lab Exercise Objective. Requirements. Step 1: Fetch a Trace

How To Determine The Capacity Of An B Network

Department of Computer Science Columbia University

How To Make A Multi-User Communication Efficient

How To Understand The Power Of A Network On A Microsoft Ipa 2.5 (Ipa) (Ipam) (Networking) 2 (Ipom) 2(2

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Wireless LAN Concepts

TECHNICAL NOTE. GoFree WIFI-1 web interface settings. Revision Comment Author Date 0.0a First release James Zhang 10/09/2012

VoIP in Mika Nupponen. S Postgraduate Course in Radio Communications 06/04/2004 1

A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks

Philippe Klein. avb-phkl qos-overview

IJMIE Volume 2, Issue 7 ISSN:

Wireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN:

119, Munjiro, Yuseong-gu, Daejeon, Korea. {neofaith, mckim, torshong, 2 InfraLab, Korea Telecom

Wireless Technologies for the 450 MHz band

Introduction. Voice over WLAN Challenges

PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks

QoS issues in Voice over IP

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)

Enhanced Power Saving for IEEE WLAN with Dynamic Slot Allocation

FORTH-ICS / TR-375 March Experimental Evaluation of QoS Features in WiFi Multimedia (WMM)

IEEE frame format

Performance Analysis of Scheduling Algorithms

Requirements and Service Scenarios for QoS enabled Mobile VoIP Service

The Wireless Network Road Trip

Virtualization for Load Balancing on IEEE Networks

WiMAX System-Level Simulation for Application Performance Analysis

Section 6-Functional Requirements for IEEE m

Unlicensed Mobile Access (UMA) Handover and Packet Data Performance Analysis

LTE BACKHAUL REQUIREMENTS: A REALITY CHECK

TCP in Wireless Networks

Integrating IP-based Micro-Mobility in Future Cellular Multimedia Networks

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

Enhancing WLAN MAC Protocol performance using Differentiated VOIP and Data Services Strategy

Advanced Wireless LAN VoIP Technology

Mac Protocols for Wireless Sensor Networks

Measuring Data and VoIP Traffic in WiMAX Networks

ZIGBEE ECGR-6185 Advanced Embedded Systems. Charlotte. University of North Carolina-Charlotte. Chaitanya Misal Vamsee Krishna

Transcription:

Continuous network discovery using Opportunistic Scanning Authors: Date: 2009-11-17 Slide 1

Abstract This presentation is in response to WNG requesting more information on the capability of 802.11 to support seamless handover / network discovery in order to enable in the long term the support of (highly) mobile users. It explores how IEEE 802.11 Power Save can be used in combination with passive scanning to continuously scan for available networks in the STA s proximity. The presented approach assures that even though passive scanning is used, the interruption time experienced on application level (above MAC) is short enough to support real time application QoS constrains. Slide 2

IEEE 802.11: From nomadic to mobile wireless access there is a market IEEE 802.11 is still a nomadic wireless access technology (def. by ITU-R F.1399-1) but mobile wireless access service models are one major aspect of future markets. Beyond nomadic: we do it today but we are not mobile Wi-Fi IP mobile phone (not only in-house phone) Wi-Fi on a car (high context navigation) Wi-Fi on a train (passenger services) Wi-Fi real-time audio (anywhere anytime) Wi-Fi real-time video (anywhere anytime) skype, etc., It is feasible: in a lot of existing WiFi Areas, STAs receive a signal from several APs at any time Source: 11-09/1000r1 [6] Slide 3

PHY What needs to be explored MAC Fast Handover for mobile (vehicular) users 11k can already reduce the latency Other schemes, e.g.: background scanning Include mobility support in 802.11? Are existing mechanisms sufficient? WNG Straw Polls Y N More Dis. Abst. Should 802.11 proceed to mobile communication [6] 8 0 15 0 Should IEEE 802.11 WNG receive further presentations on the topic of enhancement technology for vehicular communications? [7] 13 0 18 This talk: feasibility & performance analysis of continuous background scanning with 802.11 Slide 4

Why frequent / continuous network discovery? Network discovery: detecting (other) systems / networks / technologies Examples: Alternative systems to conduct a handover to Due to mobility / service constraints Homogeneous Heterogeneous (software-defined radio, single NIC) Regularly listen to channel to evaluate, e.g. interference conditions etc. Detect primary users if operating in white space Network discovery is required to be conducted in parallel to ongoing communication either due to juridical or performance constraints How to conduct network discovery without affecting the ongoing communication upholding the QoS constraints of real-time applications, in a simple, effective, and implementable way? How does the scanning scheme effect the performance of the system (other stations)? Slide 5

Contributions Present the concept of Opportunistic Scanning Show how Opportunistic Scanning can be applied to IEEE 802.11 in an entirely standard compliant way Performance evaluation of Opportunistic Scanning considering all the protocol overhead induced for using 802.11 power save as a signaling protocol Theoretical performance limits of Opportunistic Scanning minimal achievable service interruption Classify the success probability of Opportunistic Scanning in order to find an existing network Effect of (heavy) background load on the reliability of Opportunistic Scanning Performance of Opportunistic Scanning within a VoIP scenario Slide 6

Network Discovery Phases Link not available to transmit packets of ongoing communication Network Discovery Pause ongoing com. Optional Packet loss acceptable? Netw. Discovery after loss of connectivity Specific to technology Detect other systems /networks / technologies IEEE 802.11: receive a beacon Resume ongoing com. Optional Packet loss acceptable? Netw. Discovery after loss of connectivity Specific to technology Assumptions -> Opportunistic Scanning Approach: a/ Interruption of Link does not affect QoS of higher layer applications if interruption time is shorter than a given (application specific) threshold. b/ Technology to be discovered regularly emits a detectable pattern Slide 7

Opportunistic Scanning Conduct network discovery regularly at time intervals not affecting the QoS constraints of higher layer applications being smaller than the rate at which the detectable pattern is transmitted finding a technology becomes a stochastic process Constraint: do not impose any load on the channel where other devices are to be detected Important if approach shall scale Occasionally not allowed by juridical requirements Detectable Pattern Detectable Pattern Detectable Pattern Detectable Pattern Data Xchange Data Xchange Data Xchange Data Xchange This technology independent approach has to be applied to a specific technology by deciding on a signaling mechanisms / protocol for pausing & resuming communication Deciding which other technologies to detect In the following: apply Opportunistic Scanning to IEEE 802.11 Slide 8

Using Power Save to pause ongoing communication Wait for beacon to wake up AP STA B e a c T I M data exchan sleep signaling ge DA Go TA sleep A C K B e a c T I M Scan other channel during sleep... B e a c Sleep duration (=n BI) T I M B e a c T I M ps poll data exchange D A T A Wait for beacon Active wakeup signaling Slide 9 Power saving as a signaling protocol for opportunistic Scanning seems feasible for real time applications Smallest achievable service interruption determines performance limit

Theoretical Performance Limit Two cases: a/ Null-Data for signaling b/ VoIP application G711 realistic limit in case of bad reception PSM is feasible for using real time applications, if packet IAT is greater than technical limit in case of good reception t min-psm smallest supportable IAT : 1.25ms approx. 2.75ms for low MCS Analytical derived results, formulas given in [1] Opportunistic Scanning in combination with 802.11 power save can be applied to real-time services Slide 10

Analysis: Time required to find a beacon beacon is received STA in overlap of two APs Tries to discover AP2 using Opscan No interference, no other BG-traffic Beacon transmission not synchronized with scanning process Signaling carried in Null Data Frames Analytical Results: n B Δt beacon t offset Δt scan ( t scan t beacon Δt scan (n B :number of beacon frames) Slide 11 ) n scan n B Δt beacon t offset Δt scan Details given in [1]

Influence of Scan Interval SI = 13ms (BeaconInterval = 100ms) Passive scan SI = 11ms P [ X t ] SI = 17ms SI = 7ms - Opportunistic Scanning: - SI = 13ms: P=1 t>0.2s - E [Receive beacon] = 0.078s - legacy passive scan: - P=1 t>0.1s - E [Receive beacon] = 0.050s t : scan time [s] Slide 12

The upper bounds of these results represent a guarantee to detect existing Access Points on other frequencies in parallel to any ongoing communication on the originating channel while assuring the QoS constrains of the application at a given probability. Open: Stability of approach against increased network load? Slide 13

November 2009 Influence of background load Evaluate Performance of Opportunistic Scanning in (high) load situations Delayed beacons Delayed channel access time for both, signaling and data transmission Number of supportable STAs Simulation-based performance evaluation Two APs having overlapping coverage, operating on different channels One STA within overlap, associated with one AP Stepwise add STAs (one to each AP at a time) uniformly distributed within coverage of AP of corresponding AP All STAs employ the OP Scanning scheme 13ms scanning interval (also evaluated for 23, 31, and 51ms) 100ms Beacon interval No rate adaptation, rate fixed to 11Mbps Have a VoIP flow G711 20ms packetization Simulations run with OpnetModeler/Wireless Slide 14

No BG load (single STA): comparison with analysis IATs of VoIP packets clustered around 13 & 26 ms Median: 20ms; P(IAT<50)ms Can be handled with singlepacket playout buffer Probability to find beacon Simulation almost reaches theoretical performance Difference du to time required to transmit VoIP data (analysis based on sending NULL Data packets) Slide 15

Addition of BG-Load: Packet Loss & IAT Up to 9 BG-STAs (=10 in total): no packet loss Only one STA less than can be supported without Opportunistic Scanning [2,3] BG-Traffic delays medium access media access less deterministic / more evenly distributed Median remains at 20ms for 9 BG- STAs or less; also P(IAT<50ms)=1 Slide 16

Details on Protocol Performance Data exchange duration vs. scan duration Increased backload more frequently several packets in the queue burst of packets in PS-Poll sequence effective scan duration reduced (sometimes, even no scan at all) Slide 17

Probability to find Beacon within given time span BG-load has very low influence on time to find a beacon for a reliability of 60% or less For high reliability (>99%), Opportunistic Scanning can still guarantee detection of existing beacons in less than 1.8s This detection guarantee is always achieved while guaranteeing a median IAT of 20 ms for the given scenario (VoIP connection) Slide 18

Summary Opportunistic scanning can offer continuous network discovery while restricting service interruption times to a level not affecting higher layer real-time applications and can be implemented without modifying the 802.11 standard Further work: the missing step Nomadic Users Mobile Users Where are the performance limits of Opportunistic Scanning for (very) high velocities? Preliminary results show, that there is an impact... A future study group for (high) mobility support has to carefully evaluate existing and new mechanisms for several velocities / for a set of very well defined scenarios. Slide 19

References [1] M. Emmelmann, S. Wiethölter, and H.-T. Lim. Opportunistic Scanning: Interruption-Free Network Topology Discovery for Wireless Mesh Networks. In Porc. of International Symposium on a World of Wireless, Mobile and Multimedia Networks (IEEE WoWMoM), Kos, Greece, June 15-19, 2009. (available online at http:// www.emmelmann.org/pages/publications.html) [2] Garg et al. Can I add a VoIP call [3] S. Wiethölter, "Virtual Utilization and VoIP Capacity of WLANs Supporting a Mix of Data Rates", Technical Report TKN-05-004, Telecommunication Networks Group, Technische Universität Berlin, September 2005. [4] M. Emmelmann, S. Wiethölter, and H.-T. Lim. A management method for communication devices and a communication device employing opportunistic scanning for architecture, system and technology discovery. Pending Patent US 61/186,528. [5] M. Emmelmann, S. Wiethölter, and H.-T. Lim. Influence of Network Load on the Performance of Opportunistic Scanning. In Proc. of IEEE Conference on Local Computer Networks (LCN), Zürich, Switzerland, Oct 20-23, 2009. ISBN 978-1-4244-4487-8. (available online at http://www.emmelmann.org/pages/publications.html) [6] Hitoshi Morioka, Hirshi Mano, and Hiroki Nakano. IEEE 802.11 for high speed mobility. IEEE 802.11 WNG SC, Doc. # 11-09/1000r0. Hawaii, USA, September 2009. [7] Woon Cho, Sang Woo Lee, and Hyun Seo Oh. Enhancement Technology for Vehicular Communication. IEEE 802.11 WNG SC, Doc. # 11-09/832r2. Hawaii, USA, September 15, 2009. Slide 20

Questions? Straw Poll Should IEEE 802.11 WNG receive further presentations analyzing if existing mechanism can be used to support seamless handoff for (highly) mobile users? Yes: 21 No: 0 Abstain: 4 Slide 21

Annex: Further simulation results Influence of beacon interval on probability to detect a beacon with Opportunistic Scanning Slide 22

Probability to detect a beacon: Influence of Beacon Interval (BI) Scan Interval: 20ms (typical for VoIP G711 20ms packetization) BI = 101ms BI = 30ms BI = 150ms BI = 199ms P [ X n ] BI = 100ms P [ X n ] BI = 103ms BI = 109ms BI = 60ms n: #scanning attempts n: #scanning attempts Small BIs better but If BI and SI are not prime to each other, beacon s reception cannot be guaranteed Using primes as BIs guarantees that success (eventually) Smalest value not necessarily the best choice Slide 23