Design of Simulation-Based Laboratories for Teaching Wireless Network Technologies

Similar documents
Introduction to Wide-Area WiFi. AfNOG 2009 Wireless Tutorials Cairo

LEARNING COMPUTER SYSTEMS VULNERABILITIES EXPLOITATION THROUGH PENETRATION TEST EXPERIMENTS

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols

Security Threats in Mobile Ad Hoc Networks

Spring Final Project Report

A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract

Keywords Ad hoc-network protocol, ad hoc cloud computing, performance analysis, simulation models, OPNET 14.5

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

Figure 1: Bandwidth and coverage of wireless technologies [2].

Wireless Network Standard and Guidelines

Wireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN:

Demystifying Wireless for Real-World Measurement Applications

Wireless LAN Concepts

OPNET Network Simulator

TOPOLOGIES NETWORK SECURITY SERVICES

Development of an Intrusion Detection and Prevention Course Project Using Virtualization Technology. Te-Shun Chou East Carolina University, USA

Wireless LANs vs. Wireless WANs

CHAPTER 1 INTRODUCTION

Computer Networking. Definitions. Introduction

Developing an Efficient Remote Lab Environment for Online IDS Courses 1

Ashok Kumar Gonela MTech Department of CSE Miracle Educational Group Of Institutions Bhogapuram.

communication over wireless link handling mobile user who changes point of attachment to network

Wireless Network Standard

NWA1120 Series. User s Guide. Quick Start Guide. Wireless LAN Ceiling Mountable PoE Access Point. Default Login Details

Basic Wireless Infrastructure and Topologies

Tranzeo s EnRoute500 Performance Analysis and Prediction

Group 12 Lee, Tony Nguyen, Anthony Truong, Henson

Remote Home Security System Based on Wireless Sensor Network Using NS2

Future Stars. Grade X Manual Chapter 1 Networking and Telecommunication. telecommunication. Telephones, telegrams, radios and televisions help

PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS

Enabling Remote Access to Computer Networking Laboratories for Distance Education

ENSC 427: COMMUNICATION NETWORKS Simulation and Analysis of Wi-Fi Performance in campus network

AN INTERWORKING IMPLEMENTATION AND PERFORMANCE EVALUATION IN IEEE S BASED CAMPUS MESH NETWORKS

Mobile and Sensor Systems

Quality of Service Analysis of Video Conferencing over WiFi and Ethernet Networks

AC : WORK-IN-PROGRESS: CREATING AN INTRUSION DE- TECTION EXPERIMENTAL ENVIRONMENT USING CLOUD-BASED VIR- TUALIZATION TECHNOLOGY

Enterprise VoIP Services over Mobile Ad-Hoc Technologies

Chapter 7 Low-Speed Wireless Local Area Networks

Networking. Introduction. Types of Wireless Networks. A Build-It-Ourselves Guide to Wireless Mesh Networks

Network Technology CMP-354-TE. TECEP Test Description

Security for Ad Hoc Networks. Hang Zhao

Achieving Energy Efficiency in MANETs by Using Load Balancing Approach

Networking Systems (10102)

EKT 331/4 COMMUNICATION NETWORK

Including Real Networking Hardware in the Modeling and Simulation (M&S) Environment.

Analysis of Performance of VoIP

Throughput Maximization in Wireless LAN with Load Balancing Approach and Cell Breathing

Creatix g Adapter CTX405 V.1/V.2 User Manual

Analysis and Simulation of VoIP LAN vs. WAN WLAN vs. WWAN

Cisco Packet Tracer 6.3 Frequently Asked Questions

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance

DATA SECURITY 1/12. Copyright Nokia Corporation All rights reserved. Ver. 1.0

Networking: Certified Wireless Network Administrator Wi Fi Engineering CWNA

ECE/CS 372 introduction to computer networks. Lecture 13

Comprehensive Evaluation of AODV, DSR, GRP, OLSR and TORA Routing Protocols with varying number of nodes and traffic applications over MANETs

Keywords- manet, routing protocols, aodv, olsr, grp,data drop parameter.

Mesh Networks. Abdus Salam ICTP, February 2004 Schoolon DigitalRadio Communications for Research and Training in Developing Countries

Conducting a WLAN Site Survey and Implementation for the Cisco Unified Wireless Network

Wireless Ethernet LAN (WLAN) General a/802.11b/802.11g FAQ

Wireless LAN g USB Adapter

WiFi. Is for Wireless Fidelity Or IEEE Standard By Greg Goldman. WiFi 1

Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System

The Analysis and Simulation of VoIP

A B S T R A C T. Index Trems- Wi-Fi P2P, WLAN, Mobile Telephony, Piconet I. INTRODUCTION

Security in Wireless Local Area Network

TECHNICAL NOTE. GoFree WIFI-1 web interface settings. Revision Comment Author Date 0.0a First release James Zhang 10/09/2012

Protection Ripple in ERP WLANs White Paper

Service Level Analysis of Video Conferencing over Wireless Local Area Network

LAB 1: Evaluating Internet Connection Choices for a Small Home PC Network

SBSCET, Firozpur (Punjab), India

Chapter 9A. Network Definition. The Uses of a Network. Network Basics

Analysis of Effect of Handoff on Audio Streaming in VOIP Networks

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

Design and Implementation of Ad-hoc Communication and Application on Mobile Phone Terminals

The WestNet Advantage: -- Textbooks, ebooks, ecourses -- Instructor Resourse Center -- Student Resource Center

ENSC 427: Communication Networks

Chapter 11 Cloud Application Development

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

DIR-806A. Wireless AC750 Multi-Function Router. DUAL BAND Simultaneous operation in 5GHz band and 2.4GHz band, a/b/g/n/ac compatible

OPNET - Network Simulator

LTE, WLAN, BLUETOOTHB

SUNYIT. Reaction Paper 2. Measuring the performance of VoIP over Wireless LAN

PERFORMANCE ANALYSIS OF WLAN STANDARDS FOR VIDEO CONFERENCING APPLICATIONS

mlab: A Mobile Ad Hoc Network Test Bed

Information Technology Career Field Pathways and Course Structure

CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required

"ASM s INTERNATIONAL E-Journal on Ongoing Research in Management and IT"

Enhance student s learning with an aid of simulation software to understand Computer Networking Undergraduate courses.

DOS ATTACKS IN INTRUSION DETECTION AND INHIBITION TECHNOLOGY FOR WIRELESS COMPUTER NETWORK

White Paper. D-Link International Tel: (65) , Fax: (65) Web:

Case Study of Wireless Networking for Small Business

ENSC 427: Communication Networks. Analysis of Voice over IP performance on Wi-Fi networks

Introduction Chapter 1. Uses of Computer Networks

Link Layer and Network Layer Security for Wireless Networks

New Program Development on Networking Information Technology

CompTIA Network+ (Exam N10-005)

Transcription:

Design of Simulation-Based Laboratories for Teaching Wireless Network Technologies Te-Shun Chou 1, Philip J. Lunsford 1, and Keith Thomson 2 1 Department of Technology Systems, 2 College of Engineering and Technology East Carolina University, Greenville, NC Abstract Five wireless network labs were developed and used in a wireless communications undergraduate course. The labs were designed using the simulation software Optimized Network Engineering Tools (OPNET) Modeler. The software was installed in a number of virtual desktops within a desktop virtualization environment for students conducting lab experiments. The labs provided students with hands-on experience in terms of wireless network configuration, implementation, and evaluation. The complete procedure provided a strong theoretical knowledge in the field of wireless networks and enhanced students practical skills for advancement in the current and future wireless communication job market. 1. Introduction Wireless communication technologies are a huge part of our daily lives. People use their personal laptops to surf the Internet and cell phones to send emails and text messages. Welltrained professionals with knowledge of wireless networks are in high demand. We developed a set of laboratories in wireless networks to provide students with hands-on experience in terms of wireless network configuration, implementation, and evaluation. The exercises not only provide a strong theoretical knowledge in the field of wireless networks, but also enhance students practical skills for advancement in current and future wireless communication job markets. In a university environment, wireless network experiments that use physical devices are constrained by limited resources, the high cost of actual hardware devices, and the problems associated with potential conflicts with the university production wireless environment. In contrast, simulation tools provide a simulated experimental environment for carrying out handson lab activities [1-3]. In this project five labs were designed using the simulation tool OPNET Modeler [4]. This approach not only saved money in purchasing real physical wireless devices, but also reduced development time in the creation of different wireless networks. With the use of a simulation tool, a complex wireless network infrastructure can be easily implemented and its topology can be quickly changed when needed. The licensed OPNET Modeler software was acquired at no charge from Riverbed under its University Teaching Program. It was installed in a number of virtual desktops within VMware

View [5], a desktop virtualization environment. With its remote desktop capabilities to users, the lab benefits both on-campus and distance education (DE) students by enabling them to perform lab experiments anytime and anywhere, without competing for limited laboratory classroom space available on campus, thus increasing efficiency and effectivity. This paper is organized as follows: Section 2 presents the developed labs. Section 3 discusses the online survey statistics result. Conclusions and future work are described in the last section. 2. Project Design In previous wireless communications courses, a variety of assignments were included to help students understand wireless technologies. Examples include investigation of access point (AP) signal strength, research of wireless security, Wi-Fi site surveys, wireless packet analysis, evaluation of wireless network analyzers, and analog and digital signal modulation techniques. In order to enhance students understanding of topologies of wireless networks, a project consisting of a series of labs was implemented during the fall 2013 semester. Detailed instructional lab manuals were developed so that students could carry out hands-on activities in a step-by-step fashion. These activities included wireless network creation, network parameter customization, network simulation, and simulation result analysis. The complete procedure not only provided students with a strong theoretical knowledge in the field of wireless communications but also included challenging exercises that students could investigate and solve. In addition, the project offered students hands-on skills for adaptation to the current and future wireless communications job market. This project included only five wireless labs but more will be developed in the future. It included three basic network architectures of IEEE802.11 Wireless Local Area Network (WLAN) configurations: Basic Service Set (BSS), Extended Service Set (ESS), and Independent Basic Service Set (IBSS). All of the five labs were designed using OPNET Modeler. The software was installed in a number of virtual desktops hosted by VMware View thus allowing access to any student logged into any one of the desktops supplied by the pool of virtual desktops. The implementation of each lab is divided into three steps: network creation, statistics collection, and result analysis. In general, three methods can be used to create a network topology model in the first step: importing the topology, using rapid configuration, or dragging objects from the active palette into the displayed workspace. In each lab, the third method (dragging objects) is used to select the desired network topology, define the network size, and include preferable wireless devices. The application definition model and the traffic profile definition model are included for specifying what application and what traffic volume are to be used in the network (e.g. heavy/light web browsing, email, telnet, and ftp). Additionally parameters such as application supported services, IEEE WLAN standards, data rate, routing protocols, and transmitter power are configured by the student. After building the network architecture, network simulation begins and statistics of individual wireless devices (object statistics) and statistics of the entire network (global statistics) are collected in the second step. Example statistics include the following: data dropped, data traffic received and sent, delay, load, and throughput. Finally, the results are analyzed when the simulation is completed.

2.1. WLAN BSS Lab WLAN technology provides connections between wireless mobile devices and an AP. It is defined in the IEEE 802.11 standards but often marketed under the term Wi-Fi based on certification of the Wi-Fi Alliance. The most popular standards include 802.11a, 802.11b, 802.11g, and 802.11n that operate in the unlicensed 2.4GHz ISM band and the 5GHz U-NII band. With the variant of standards, the WLAN technologies have been successfully applied to a variety of applications, such as home use wireless routers, temperature monitoring and smoke detection systems in factories, and Internet access Wi-Fi hotspots located in public places such as hotels, restaurants, and airports. For this lab the learning objectives are: Understand the technologies of IEEE 802.11 standard used in WLAN Observe the behavior of AP, fixed and mobile wireless devices in WLAN The lab involves simulations of WLAN configuration BSS. BSS network, also called infrastructure mode, includes a single AP that associates with multiple wireless devices. The AP acts as a central transmitter and receiver to control all the traffic inside the BSS. The lab is divided into two sub-labs. In sub-lab 1, students study the simplest BSS network configuration that includes a single AP and one fixed wireless device. In sub-lab 2, students study a geographical area of a BSS that includes a group of fixed wireless devices and a mobile wireless device all served by a single AP. In the lab exercise, the mobile wireless device moves relative to the fixed AP; therefore, students can study the changing signal strength between the device and the AP. During the simulation, the discrete event simulation option is utilized to record the behavior of all the events occurring in every device within the network. Figures 1 and 2 show the network architectures of the two sub-labs. Figure 1. Network Architecture of the WLAN BSS Sub-Lab 1

2.2. WLAN Roaming Lab Figure 2. Network Architecture of the WLAN BSS Sub-Lab 2 A network comprised of a set of two or more interconnected BSSs is called an ESS. This architecture consists of more than one interconnected AP over a wider area. Inside an ESS, the wireless devices are capable of roaming from one BSS to another, therefore extending their range of mobility. The learning objectives of this lab are: Simulate the behavior of roaming and handoff among APs Observe the data traffic of APs and wireless device in ESS In this lab, the wireless network is an ESS consisting of four BSSs. The network is comprised of a central bridge connecting four APs and a destination host. A mobile wireless device generates packets sent to the destination host. The device is set to initially associate with an AP and travels in a clockwise direction to visit the other three APs. At the end of the simulation, the device finishes its tour and goes back to the original starting point. During the roaming, the wireless device is expected to connect to all four APs while it is traversing the trajectory. Figure 3 illustrates the network architecture.

2.3. WLAN Jamming Lab Figure 3. Network Architecture of the WLAN Roaming Lab Wireless networks are vulnerable to attacks and have become one of the major targets of hackers today. In wireless networks, malicious attacks can easily be launched due to a lack of a packet filtering mechanism in network traffic. Among different kinds of attacks, a Denial of Service (DoS) attack is simple to implement. This kind of attack attempts to disrupt a target in order to restrict access by legitimate users to the network. If a wireless network encounters a DoS attack, the attack will progressively reduce the functionality of the victim and negatively impact the overall performance of the network. The learning objectives of this laboratory are: Simulate DoS attack to crush a target by using jamming technique Study the efforts of a DoS attack to mobile devices In this lab, a DoS attack using a frequency-swept jammer provided by OPNET Modeler is studied. The jammer is designed to emit a continuous radio signal using the same spectrum of the APs. Different power levels of the jammer are set to study the behavior of the mobile device and APs before and after jamming. Parameters, such as delay, dropped packets, throughput, and load, are examined. Figure 4 demonstrates the network architecture.

Figure 4. Network Architecture of the WLAN Jamming Lab 2.4. Wireless Ad-Hoc Network Lab IBSS is a type of ad-hoc network. It is a decentralized wireless network that excludes the APs. Wireless devices communicate with each other in a peer-to-peer fashion without involving a central management point. Devices can also act as routers to forward data from one network node to another. The learning objectives of this lab are: Learn to implement a mobile ad-hoc network (MANET) using the IEEE 802.11 standard Gain an understanding of different routing algorithms in wireless ad-hoc networks Evaluate and analyze network performance A wireless mobile ad-hoc network (MANET) can be implemented with an IBSS network. It includes a set of mobile wireless devices. Each device can move freely and independently in any physical direction. Also, each is capable of forwarding received traffic by reconfiguring its link to other devices. In this lab the MANET in an office of size 100 meters by 100 meters is studied. A group of mobile wireless devices are included in the network and connected wirelessly to a Gateway using the IEEE802.11n standard at 65Mbps. An IP Cloud is included to simulate data flow over a Wide Area Network (WAN). Three applications, video conferencing (high resolution), ftp (high load), and http (heavy browsing) are hosted by a Point-to-Point (PPP) Server. The Gateway communicates over the IP Cloud to the PPP Server via PPP T1 duplex links. Five routing protocols (Ad Hoc On-Demand Distance Vector Routing (AODV), Optimized Link State Routing Protocol (OLSR), Temporally-Ordered Routing Algorithm (TORA), Gateway Routing Protocol (GRP), and Dynamic Source Routing (DSR)) are compared and analyzed. Figure 5 displays the network architecture.

3. Evaluation Figure 5. Network Architecture of the Wireless Mobile Ad-Hoc Network Lab The online survey shown in Table 1 was administered during the end of the fall 2013 semester. Five categories were designed in the survey and a total of 17 questions were included. The objective of the survey was to evaluate the project s effectiveness in order to improve the lab instructional manual in the future. A five-level Likert scale was used. Available responses were: strongly disagree, disagree, neutral, agree, and strongly agree. At the end of the semester 12 questionnaires from the on-campus class and 15 questionnaires from the DE class were successfully collected. Figures 6 and 7 summarize the results. Table 1. Survey Questions Category 1 Lab Environment Q1.1 I have no difficulties logging into the lab environment to conduct the lab activities. Q1.2 This VMWare View provides a simulated realistic network environment. Category 2 Lab Manual Q2.1 The steps shown in the instructional lab manuals are clear and easy to follow. Q2.2 The lab manual provides all of the necessary information in order to conduct lab activities. Q2.3 The learning objectives of labs are clearly described. Category 3 Analysis Q3.1 I understand how to select statistics parameters (e.g. load, delay, and throughput) in order to generate simulation diagrams. Q3.2 I know how to configure required network attributes (e.g. application definition and supported profile) for simulating a wireless network.

Q3.3 I understand how to extract useful information by analyzing the simulation diagrams. Category 4 Overall Project Q4.1 I feel the learning objectives of labs are achieved. Q4.2 I feel the final project outcome met my initial expectations. Q4.3 I would rate the overall quality of the project as high. Q4.4 I am satisfied with the overall outcome of the project. Q4.5 I would rate the technical difficulty of the labs as difficult. Q4.6 I spent excessive time working on the labs. Category 5 Wireless Network Technologies Q5.1 I have a better understanding of different wireless network technologies after finishing the labs. Q5.2 It s a good strategy to imitate wireless networks by using a simulation tool, instead of using physical wireless devices. Q5.3 I believe I am able to apply the knowledge of wireless communications technologies to my future career. Figure 6. Survey Result of On-Campus Class Figure 7. Survey Result of the DE Class

The frequent responses of all five categories fell onto strongly agree and agree for both the oncampus and DE classes. Overall, students had very positive attitude toward the lab exercises and the learning objectives of the project. Students expressed that they neither had issues logging in nor experience slow connections. They agreed that OPNET running in the VMware View environment provided a detailed and realistic experimental environment. They indicated that the lab manuals were complete and easy to follow. After finishing the OPNET project, students were acquainted with creating wireless network topologies, understood the setup of the required parameters, and understood how to analyze the simulation results. Also, they agreed that the project provided useful information pertaining to wireless network technologies and the information would benefit them if they decide to pursue a career in wireless network design or implementation. In addition to the 17 questions, students were asked to provide one example where they have added to their knowledge from this project. Some of the responses were: In theory, I learned how to set up a network topology and simulate performance in order to determine what if any improvements should be made or what considerations for interference should be given. Specifically, I learned through the diagrams how to interpret throughput and delay., There was a lot learned with these labs, such as measuring statistics such as throughput, delay, number of hops per second exc. I also became a lot more familiar with the Opnet Modeler; if I were to use it again I would be comfortable creating and simulating as well as gathering the results., The entire experience was all new to me. I thought that the OPNET software was very helpful and amazing., and The mobile roaming node taught me a great deal about how a mobile device such as a smartphone interacts with a WLAN when moving through an environment. I had never quite understood what was referred to as roaming before doing the lab. 4. Conclusions and Future Work This paper presented a project that included five wireless network labs used in an undergraduate course. In each lab, a wireless network was analyzed using the OPNET Modeler simulator. Different scenarios of wireless networks were created, wireless traffic was generated and the behavior of the networks and individual wireless devices were inspected. The labs helped students develop their capabilities in creating and analyzing wireless network activities in real world scenarios. In the future, continuous revision of the labs and the instructional lab manuals will be made according to the feedback from students. Also, based on the experience of this project, more wireless labs related to networks (such as WiMax and Zigbee) and network issues (such as channel interface and the hidden node problem) may be developed. Acknowledgements This project was funded with support from The Engineering Technology Division (ETD) of the American Society for Engineering Education (ASEE). The authors would also like to thank Riverbed University Teaching Program for proving its OPNET Modeler software for free to our students conducting lab activities in the Department of Technology Systems at East Carolina University.

References [1] B. Sai Chand, K. Raghava Rao, and S. Sreedhar Babu, Exploration of New Simulation Tools for Wireless Sensor Networks, International Journal of Science and Research, Volume 2 Issue 4, pp. 269-273, April 2013. [2] Siddharth Singh and Naveen Hemrajani, Performance Evaluation of AODV Routing Protocol in Wireless Sensor Networks With the Constraints of Varying Terrain Areas by Varying Pause Time, International Journal of Emerging Trends & Technology in Computer Science, Volume 2, Issue 1, pp75-79, February 2013. [3] Ajay Singh and Pankaj Dashore, Packet Flow Analysis in Wireless Scenario, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 6, pp. 1530-1534, June 2013. [4] OPNET Modeler. http://www.riverbed.com/ (Retrieved August 2014) [5] VMware. http://www.vmware.com/ (Retrieved August 2014) Biographies Te-Shun Chou is an Associate Professor in the Department of Technology Systems at East Carolina University. He received his Bachelor degree in Electronics Engineering and both Master's degree and Doctoral degree in Electrical Engineering at Florida International University. His research interests include machine learning, wireless communications, and network security, especially intrusion detection and incident response. Philip J. Lunsford received a B.S. in Electrical Engineering and a M.S. in Electrical Engineering from Georgia Institute of Technology and a Ph.D. in Electrical Engineering from North Carolina State University. He is a registered professional engineer and is currently an Associate Professor at East Carolina University. His research interests include cyber security, telemedicine applications, network performance, and the cross-discipline application of technologies. Keith Thomson has been working in IT field for more than 20 years and served as a help desk analyst, field service engineer, and system administrator. Presently he works as an instructional technology consultant in the IT department of the College of Engineering and Technology at East Carolina University. He is one of the team members whose mission is to support the College s highly-virtualized IT infrastructure and enterprise storage.