How To Write A Wireless Network Protocol For Rural Communication In India



Similar documents
WiFiRE: Wireless Broadband Access for Rural Area

Modelling Quality of Service in IEEE Networks

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?

Introduction VOIP in an Network VOIP 3

Computer Networks CS321

SSVP SIP School VoIP Professional Certification

FORTH-ICS / TR-375 March Experimental Evaluation of QoS Features in WiFi Multimedia (WMM)

Network Simulation Traffic, Paths and Impairment

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

DL TC72 Communication Protocols: HDLC, SDLC, X.25, Frame Relay, ATM

Performance optimization of mobile WiMAX netwoks for VoIP streams

VoIP-Kapazität im Relay erweiterten IEEE System

UPPER LAYER SWITCHING

Figure 1: Bandwidth and coverage of wireless technologies [2].

Unit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos sguinez@utalca.cl

From Fieldbus to toreal Time Ethernet

CT LANforge WiFIRE Chromebook a/b/g/n WiFi Traffic Generator with 128 Virtual STA Interfaces

Transport and Network Layer

Data Link Protocols. TCP/IP Suite and OSI Reference Model

SSVVP SIP School VVoIP Professional Certification

Implementing VoIP support in a VSAT network based on SoftSwitch integration

Networking 4 Voice and Video over IP (VVoIP)

ICOM : Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM

CS263: Wireless Communications and Sensor Networks

Per-Flow Queuing Allot's Approach to Bandwidth Management

Analysis of Effect of Handoff on Audio Streaming in VOIP Networks

International Journal of Advance Engineering and Research Development. QoS Analysis of VOIP Traffic over WiMAX

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Technical Support Information Belkin internal use only

Latency on a Switched Ethernet Network

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

WiLink 8 Solutions. Coexistence Solution Highlights. Oct 2013

STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT

Chapter 2 - The TCP/IP and OSI Networking Models

VOIP over Space Networks

A Transport Protocol for Multimedia Wireless Sensor Networks

Improving the VoIP Capacity in WiMAX Networks

Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network

CT LANforge-FIRE VoIP Call Generator

Adaptive DCF of MAC for VoIP services using IEEE networks

Ethernet. Ethernet. Network Devices

Architecture of distributed network processors: specifics of application in information security systems

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

How To Analyze The Security On An Ipa Wireless Sensor Network

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs

D1.2 Network Load Balancing

Based on Computer Networking, 4 th Edition by Kurose and Ross

Chapter 3 ATM and Multimedia Traffic

Configure A VoIP Network

IEEE Broadband Wireless Access Working Group. ATM Based MAC Layer Proposal for the Air Interface Specification

1 Introduction to mobile telecommunications

CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY

Overview of Computer Networks

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

Exam 1 Review Questions

Multichannel Virtual Access Points for Seamless Handoffs in IEEE Wireless Networks

Transport Layer Protocols

Ajay Gummalla-July 2001

Optimization of VoIP over e EDCA based on synchronized time

UIP1868P User Interface Guide

Voice Over Internet Protocol(VoIP)

Performance Analysis of VoIP Codecs over Wi-Fi and WiMAX Networks

How To Design A Layered Network In A Computer Network

ADSL or Asymmetric Digital Subscriber Line. Backbone. Bandwidth. Bit. Bits Per Second or bps

CSE 3461 / 5461: Computer Networking & Internet Technologies

Software Engineering 4C03 VoIP: The Next Telecommunication Frontier

Analysis of Open Source Drivers for IEEE WLANs

EETS 8316 Wireless Networks Fall 2013

Chapter 5. Data Communication And Internet Technology

Network Configuration Setup Guide. Air4G-W

Chapter 7 Low-Speed Wireless Local Area Networks

Design of PSTN-VoIP Gateway with inbuilt PBX & SIP extensions for wireless medium

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

TCOM 370 NOTES LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL

CSCI 362 Computer and Network Security

Communication Networks. MAP-TELE 2011/12 José Ruela

Clearing the Way for VoIP

Advanced VSAT Solutions Bridge Point-to-Multipoint (BPM) Overview

Introduction To Computer Networking

What is CSG150 about? Fundamentals of Computer Networking. Course Outline. Lecture 1 Outline. Guevara Noubir noubir@ccs.neu.

Frequently Asked Questions

Broadband Networks. Prof. Dr. Abhay Karandikar. Electrical Engineering Department. Indian Institute of Technology, Bombay. Lecture - 29.

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Understanding Latency in IP Telephony

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Troubleshooting Common Issues in VoIP

A Seamless Handover Mechanism for IEEE e Broadband Wireless Access

VoIP Bandwidth Considerations - design decisions

TCP/IP Protocol Suite. Marshal Miller Chris Chase

Region 10 Videoconference Network (R10VN)

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring Mike Freedman

OSBRiDGE 5XLi. Configuration Manual. Firmware 3.10R

Final for ECE374 05/06/13 Solution!!

The OSI and TCP/IP Models. Lesson 2

Transcription:

Emulation of WiFiRe protocol on LAN Janak Chandarana, Ranjith Madalapu, Sameer Kurkure, Shravan Hullur Anirudha Sahoo and Sridhar Iyer Department of Computer Science and Engineering, IIT Bombay Abstract WiFi Rural Extension (WiFiRe) is a MAC layer protocol especially designed to provide broadband communication in rural areas of India. It supports long range communication using 802.11b PHY and a MAC similar to 802.16d. In this paper, we describe the implementation of software stack as an emulation over Ethernet. Implementation is done using C sockets and allows a user to test basic MAC functions such as connection establishment, packet flow and header construction in absence of WiFiRe hardware. We believe that, WiFiRe protocol implemented as part of LAN emulation can be easily ported to the WiFiRe hardware. A. Motivation I. INTRODUCTION Long range wireless for data and voice connectivity is being considered as a viable and affordable solution for rural India. As described in [1], the average user can not spend more than Rs. 300 per month for Internet. There is a need for affordable and easily available system, using which broadband access can be spread to every village in India. WiFiRe [2] presents one such solution, using cheap 802.11b chipset but modifying the MAC for longer range and better efficiency. Initiatives reported in [3] and [4] address very similar issues. B. WiFiRe architecture WiFi Rural Extension (WiFiRe) [2] uses the licencefree 2.4 GHz spectrum and cheap 802.11b RF chipset to provide long-range wireless communication. It replaces 802.11b MAC mechanism (DCF/PCF) with a MAC similar to 802.16d, while retaining 802.11b PHY. WiFiRe follows star topology (Figure 1) - a Base Station (BS) at the fiber Point of Presence (PoP) and Subscriber Terminal () in the villages nearby. BS has six sectorised antennas covering area of 15-20 km. is connected to end users with different LAN technologies [5] and communicates with BS through directional antennas. Within a sector, WiFiRe follows time division multiplex (TDM) frame structure which is similar to 802.16d. sector 3 15-20 km sector 2 BS3 BS2 BS4 `c BS1 sector 1 Fig. 1. sector 4 BS5 BS6 sector 5 40m 2-3 km sector 6 WiFiRe Architecture WiFiRe is promoted by CEWiT India 1 and the project is spread across IIT Bombay, IIT Madras and IISc Bangalore. C. WiFiRe supports time division duplex (TDD) over single channel with multi-sector TDM mechanism to provide about 25Mbps (for both uplink and downlink) for a cell [2]. In TDD, the uplink ( to BS) and downlink (BS to ) share the same channel but are activated at different times. BS and operate in synchronization with each other. Time is divided into frames, which is further divided into downlink (DL) and uplink (UL) segments, which need not be of equal time intervals. DL is further divided into two major parts: beacons and actual downlink PDU. Every Beacon message (Figure 2) have control information followed by UL-MAP and DL- MAP in first DL pdu. These MAPs have the information about total available slots for s in all the sectors. All s will read the DL-MAP and search for their own - ID. If -ID is found, will wake up in that particular 1 The Center of Excellence in Wireless Technology (CEWiT) is an independent research organization set up by the Ministry of Information Technology, Government of India (MIT) in partnership with industry. 10m

System (s) beacons Downlink Transmissions BS 1 DL Sub-Frame BS 2 BS 4 BS 5 Fig. 2. BS 3 BS 6 Uplink Transmissions Sector 1 Sector 4 Sector 2 Sector 5 UL Sub-Frame frame Sector 3 Sector 6 slot and receive the packet. transmits packets to BS according to UL-MAP [2]. s follows multi-sector TDD mechanism as illustrated in Figure 2. Connections established between BS and are identified by a 16 bit Connection Identifier (CID). Refer [2] for more details about. D. WiFiRe implementation Simulations have been done to check WiFiRe protocol s correctness, performance, scheduler design and few PHY related issues like antenna behavior [6]. We would like to test protocol behavior in actual implementation and emulation on LAN is the first step towards it. We are using layer-2 functionalities of C sockets to implement and test it on DIX 2 Ethernet based LAN. Emulator is carefully designed so that some modules are PHY dependent and some are PHY independent. PHY dependent modules will be replaced appropriately later on. E. Contributions There are two main contributions of this paper. (A) By doing emulation, we expect to encounter many implementation and system related issues which did not show up in simulation. This would help to improve WiFiRe protocol s correctness. We describe maintenance of soft timers, packet classification, VoIP on wireless, QoS and few other WiFiRe specific issues in subsequent sections. (B) We exploit the Ethernet network s parameters like frame size, MTU, collisions, propagation delay, to emulate a wireless link, even though they are different from 802.11. Such a link can be used to test new wireless protocol proposal, in absence of wireless hardware. A. testbed II. ARCHITECTURE Implementation of is done using C sockets on Linux platform. Program runs in user space (see section 2-E for a discussion). Linux terminals with 2 s each are working as BS and s. This whole scenario gives us emulation of actual protocol. Many network parameters like IP address, ARP cache, DNS, proxy settings are kept fixed to keep design as simple as possible. WiFiRe testbed (Figure 3) includes a BS with two s, an with two s, a server which acts as gateway, FTP, proxy and web server. Several end-users are connected to through Ethernet switch. BS is connected to using DIX based Ethernet cross cable. This link is treated as wireless link of WiFiRe. Subsequently, it will be replaced with the hardware for WiFiRe PHY. s is connected with end users via switch. BS is connected to server using and sends data to by other interface (). of and BS have plain 802.3 MAC based connectivity and it makes the network transparent for end users and (S) respectively. End-user clients send packets to, follows slot structure defined in the UL-MAP and sends packets to BS in designated slots. BS receives these packets, processes them using WiFiRe modules and forwards them to S as normal Ethernet packets. sends reply to BS, which forwards it to appropriate and finally, client receives the packets. B. Assumptions and limitations Both BS and are connected using a cross cable, which eliminates problems of propagation delays, ranging, synchronization and other such wireless specific issues. We assume that such issues will be taken care by underlying hardware in actual implementation. Implementation does not perform real ranging procedure as test-bed uses Ethernet cable where propa- Cross Cable BS Proxy 2 DIX frame (named after DEC, Intel, and Xerox) is a commonly used Ethernet standard today and has 16-bit type field Fig. 3. WiFiRe Test Bed

gation delay is not variable. In this scenario, Beacon transmission is enough for synchronization. Purpose of ranging here is to assign and transfer basic and primary CIDs only. As our emulation runs on Ethernet, and PCs are connected directly using RJ-45 cables, it can not get total flexibility on frame structure, size, CRC etc. This Ethernet link restricts size of individual packets and WiFiRe MPDUs as well. Due to absence of real hardware clock, software timers are used in implementation which guarantees precision up to milliseconds. BS_TABLE Timer Clock Timing Mechanism MC_TABLE Packet Classifier Set timers Raise SIGALRM DCID From CID Generator In Thread To Packet Controller From Scheduler Out Thread To C. Modules at BS and As shown in Figure 4, there are various modules in BS dedicated to different functions of. modules are explained in next paragraph but diagram is omitted due to space constrains. As expected, BS and have significantly different functionality in. BS MAC contains packet classifier, CID generator, packet controller, scheduler and timer clock. Packet classifier detects packet type, QoS requirements and connection details. It makes appropriate entries in the mapping table. CID generator module generates 16-bit CID for each new connection. These 16 bits are divided in subgroups, such that each group of bits represents -ID, ToS and client. Packet controller sends packets to outgoing queues, buffer queues or simply drops them based on MAC requirement. Scheduler keeps track of all connection s requirements and generates DL-MAP and UL-MAP. Both MAPs are sent in first slot of downlink segment to all s. Scheduler keeps dedicated slots for real-time traffic like VoIP. Timer clock reads UL-MAP and generates a sequence for packet reception. has simpler MAC compared to BS. has MAP parser, packet controller, connection classifier and CS layer. MAP parser reads both MAPs and prepares for uplink and downlink slots. Packet controller maintains incoming and outgoing queue, filled with raw IP packets. Packet controller takes inputs from parser for packet sequence. Connection classifier detects packets coming from different end-users and makes new dynamic service addition (DSA) request for each new connection. CS layer understands Ethernet and WiFiRe header, converts packets appropriately from WiFiRe to Ethernet and viceversa. BS and have similar modules for packet transmission and reception, CID tables and buffer queues. Implementation of these modules is done using wellknown strategies. Fig. 4. WiFiRe modules in BS D. Control and Data flow for various events Initially BS comes up and starts execution of its routine procedure of beacon broadcast, which is handled by packet controller. Whenever an comes up, it starts listening for a beacon. will go through ranging procedure, and finally get registered. is now ready to serve its client s requests, which were not served earlier. Timing mechanism module generates local sequence based on timer from DL-MAP/UL-MAP. This timing sequence is fed to the Clock to raise interrupts in the beginning of designated slots to wake up at required slot. Each maintains one table (-TABLE). The table entries include MAC address of client, CID and ToS. Each row of the table indicates unique connection from to BS. BS also maintains two tables: BS-TABLE and MC-TABLE. BS-TABLE entry includes BSID (indicates the sector), ID (indicates the ) and CID while MC- TABLE entry includes CID, client IP and ToS. Here, we give an example (Figure 5) of typical HTTP transaction to illustrate actions taken in at and BS. Whenever receives Ethernet packets from client(s), following actions are performed in uplink: 1) Packet classifier checks if received packet belongs to any existing connection by scanning table entries. If matched, goto to step 4. If no match found, then make new entry in the table with temporary CID. 2) creates DSA request and waits for DSA response from BS. Ethernet packet will be stored in the buffered queue till the response arrive. 3) Once receives DSA response, it updates the table entry in -TABLE with newly allocated CID.

C1 Cn Ethernet MAC header MAC1 MAC2 _TABLE Virtual wireless medium header BS & S MAC1 MAC3 MAC4 PHY1 PHY2 PHY3 PHY4 802.3 physical medium BS_TABLE Proxy Internet s Ethernet Packets WiFiRe Ethernet Packets Normal Ethernet Packets Fig. 5. BS MC_TAB Layering approach in WiFiRe emulation 4) removes existing Ethernet header from the packet. s CS layer creates a WiFiRe header (based on CID of the table entry) for raw IP packet PDUs. 5) transmits WiFiRe packet to BS through outgoing socket according to UL-MAP. Action at BS: 1) BS captures the packet from (Figure 3) using socket. 2) BS reads the WiFiRe header and updates the table with IP address to CID mapping entry. 3) Packet controller removes the WiFiRe header after making table entry and constructs an Ethernet MAC packet for proxy. 4) Transmits Ethernet packet to proxy, which ultimately forwards these packets to Internet and responds back to BS. 5) BS buffers the responses and send them in downlink frame according to DL-MAP. Similar steps happen for downlink as well. E. Discussion Implementation is done in C sockets instead of kernel for following reasons: A user level communication component, which provides direct access to low level communication (like putting bytes directly on PHY) mechanisms, bypasses operating systems complexity (like interrupts, sock-buff) in critical paths of communication. Overheads of kernel traps and memory copies along with various dependencies between user space and kernel space are avoided. LE S To develop a prototype when WiFiRe protocol still evolving and changing, it is difficult to change code and debug in kernel module frequently. III. INTEGRATING WITH HARDWARE In a typical implementation, such as WiMAX (802.16d), all the modules (MAC, RF, antenna, modem, and memory) are in same box [7]. Every component is closely coupled with each other and they exchange configuration parameters with each other. For example, memory has driver and API through which, it can store/retrieve data to/from buffer. This buffer is shared by MAC and PHY. In current WiFiRe implementation plan, and BS-PHY are separate from each other (Figure 6). PHY boards are being developed independently and require MAC frame to be delivered on Ethernet cable. Eventually, MAC and PHY will be integrated as single entity. Current hardware keeps six different s for six BSs. These six s are connected by single switch. This leads to Ethernet cable as single communication medium. All the non-wifire control messages such as 2 byte control data (explained later in this section) have to be transferred using same link. Extra control modules have to be written to handle such messages which adds to the complexity in implementation. WiFiRe frames are to be sent to this switch with destination address as a given BS-PHY MAC address. Frame structure and slot size is fixed. There is a centralized module which instructs all six BS-PHYs to synchronize with each other and send data as and when required. In our approach both BS-PHY and BS-MAC are separate from each other (Figure 6). There are various ways to transmit a frame which is built by Fig. 6. To TCP/IP Layer Ethernet MAC Base Station (BS) Ethernet Cable Ethernet Cable BS-PHY 1 2 3 4 5 A1 A2 A3 A4 A5 6 A6 BS hardware: proposed WiFiRe real system component

from BS-MAC to respective BS-PHY such that each BS- PHY should knows when to transmit the data frame. We also need to optimize the PHY overhead, which is of 4 slots, for every new transmission at BS-PHY. Using concatenation we allocate all slots which belong to same BS consecutively, thereby reducing PHY overhead. We use a 2 byte control packet per DL-TB (down link transport block), having information <starting slot, number of consecutive slots> and then transmitted to BS-PHY. At BS-PHY, it reads the information present in control packet and does accordingly. Figure 7 shows how this approach works. Total DL frame is divided into groups (B1, B3, B5) and each group belongs to the respective BS-PHY. Beacons is transmitted to every BS-PHY. Down link Transport Blocks (DL-TB is a group of slots which belongs to the same BS. Each BS will have zero or more DL-TBs and this number depends on Ethernet packet size.) are created before inserting the WiFiRe frame into Ethernet packets. For example, when BS-PHY receives a Ethernet packet having a control packet <05,15>, it transmits from slot 5 to 19. This method has advantage of fixed size memory requirement at BS-PHY, minimal control and PHY overhead. However it increases the complexity of scheduler. Scheduler has to take care of constructing DL-TBs. IV. CHALLENGES In this section, we describe a few challenges that we faced during implementation of WiFiRe and our future directions. Detecting different traffic classes for QoS is not trivial. We created TCP-port based classification for RTP packets. We used 802.1Q aware clients and detected packets using MAC headers where cross-layering was not possible. BS and in our testbed are supposed to work as layer-2 devices. Because of Linux kernel inside BS and, services (like ARP and DNS) generate periodic packets which will get passed to WiFiRe s directly. These packets are misinterpreted as WiFiRe packets. Disabling these services is not an option, as they are shared by other 802.3 based. Additional WiFiRe modules to drop such packets is required. If we consider G.729 codec, for 10 ms voice, there is 40 byte of header (RTP, UDP and IP) and 10 bytes of voice data. For WiFiRe system, this overhead is very high and some solutions are considered. VoIP gateways, which add headers for outgoing packets and remove headers from incoming packets and VoIP compression using advanced codecs (like GIPS) have been considered as an option for future implementation. V. CONCLUSION In this paper we have described an implementation of WiFiRe as a LAN emulation over a test bed. WiFiRe packets can be monitored over the link between BS and to verify factual working of the protocol. We have tested it for multiple clients with single system. We have done emulation for one sector, for single BS and but it can be modified easily to accommodate multiple sectors and this work is underway. REFERENCES Slots in UL-Frame UL-Frame DL-TB: WiFiRe Data Packet BS-MAC DL-TB's, B1 Ethernet Packet Control packet Ethernet Packets Slots in DL-Frame Group B1 Group B3 Group B5 Beacon Ethernet Header DL-TB's, B3 DL-TB's, B5 DL-TB's, B BS-PHY's BS1 BS2 BS3 BS4 BS5 BS6 [1] Bhaskar Ramamurthi, Anand Kannan, Ashok Jhunjhunwala, Interim 3.5G broadband wireless system for India: Framework, requirement, performance needs, CEWiT Tech Report, 2005. [2] Sridhar Iyer, Krishna Paul, Anurag Kumar, Bhaskar Ramamurthy, WiFiRe: Medium Access Control (MAC) and Physical Layer (PHY) Specifications, CEWiT Tech Report, India, 2006. [3] P Bhagwat, B Raman, D Sanghi, Turning 802.11 Inside-Outs, ACM SIGCOMM Computer Communication Review, 2004. [4] Rabin Patra, Sergiu Nedevschi etc, WiLDNet: Design and Implementation of High Performance WiFi Based Long Distance Networks, USENIX NSDI, April, 2007. [5] J Chandarana, Sravana K, S Perur, R Rangarajan, S Sahasrabuddhe and S Iyer, VoIP-based Intra-village Teleconnectivity: An Architecture and Case Study, WISARD, COMSWARE, 2007. [6] Anitha Varghese, Design of a TDD Single Channel Multisector TDM MAC for a Single Cell WiFiRE System, MTech Thesis, IISc Bnagalore, 2006. [7] Intel Corporation, Intel PRO/Wireless 5116 Broadband Interface, 2007. Fig. 7. Consecutive allocation of DL slots for each BS