1 / 17

Unwanted Link Layer Traffic in Large IEEE 802.11 Wireless Network

Unwanted Link Layer Traffic in Large IEEE 802.11 Wireless Network . By Naga V K Akkineni. Introduction. IEEE 802.11 based WLAN’s rapid growth. Problems – Limited number of Orthogonal Channels. Unwanted Traffic – To maintain connectivity and high quality client service.

seoras
Download Presentation

Unwanted Link Layer Traffic in Large IEEE 802.11 Wireless Network

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Unwanted Link Layer Traffic in Large IEEE 802.11 Wireless Network By Naga V K Akkineni

  2. Introduction • IEEE 802.11 based WLAN’s rapid growth. • Problems – Limited number of Orthogonal Channels. • Unwanted Traffic – To maintain connectivity and high quality client service. • Link layer Traffic - Overhead stems from mechanisms that initiate, maintain, and change client-AP connectivity

  3. Two mechanisms contribute to unwanted traffic in wireless networks. • Keepalive traffic that is used to maintain client-AP associations in the absence of data traffic. • The probing mechanism used by clients to frequently collect neighbor information.

  4. Problems and Deficiencies • Key implementation deficiencies in frame retransmissions, frame sizes and rate adaptation in congested networks • Client overhead increases with the increase in network density. • Two types of overhead mechanisms that are prominent in a congested network - probes and keepalive packets. • Handoff rates increase with an increase in network utilization, even in the absence of mobility.

  5. Overview of IEEE 802.11 Frame Types • 802.11 Standard defines three frame types. • Management • Control • Data

  6. Handoff Procedure • Client authenticating. • Successful Authentication ---> Association request with information. • AP allocates resources for client and sends its • information like association ID and data rates. • After Authenticating and associating it can communicate with other clients through AP as well. • Layer 2 (L2) handoff. • 4phases. • Triggering, Discovery, Selection, Commitment.

  7. TrafficAnalysis • 802.11 DCF(Data Collection Framework) protocol uses CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance). • If node wants to transmit a frame carrier sensing must be done to check weather medium is busy. • If the medium is not busy, the node transmits the packet. • If the channel is busy, then the node backs off for a specific interval known as the backoff interval.

  8. Backoff Interval • For every slot time that the channel is not busy, the BO is decremented. • The node transmits the packet when the backoff timer reaches zero. If this transmission results in a collision, maximum length of backoff interval doubles.

  9. Keepalive Traffic: 1. Keepalive signal is a short message sent at regular intervals to keep a connection alive. 2. Used in Persistent HTTP/1.1 connections. 3. Generally large number of null data frames transmitted by the clients to the access point that were then acknowledged by the AP. 3. A null frame is essentially a data frame subtype with zero bytes of data. 4. Mobile devices in order to maintain to maintain battery power goes into sleep mode and losses its connection with AP’s. 5. At this moment of time the applications which require long-lived connections between servers and clients maintains keepalive messages.

  10. Probe Traffic: 1. A client broadcasts probe requests when it needs to obtain information on which APs are in range. 2. Any AP that receives this request sends a probe response containing information necessary for association, such as capability information and supported data rates. 3. Probe requests are sent when a client disconnects or roams from the AP with which it is associated. 4. A client also probes the medium periodically to check which APs are in the vicinity, and whether it is still associated with the AP with the strongest signal.

  11. 5. This aggressive probing is beneficial when clients are mobile. 6. The delay is large enough to deteriorate application performance, especially delay sensitive applications such as voice. 7. Instead of being reactive to packet loss, clients are proactive in probing the medium and collecting neighbor information. 8. Aggressive probing of the medium in a static, congested network imposes unnecessary overhead and leads to inefficient medium utilization.

  12. Handoff Analysis • When a client wishes to associate with a different AP, a handoff process is initiated. • Handoff trigger is the first stage of handoff wherein a client identifies the need to look for another AP. • The implementation of this mechanism is left to vendors, however, it is usually a reaction to one or more of the following: • 1) consecutive missed beacons • 2) unacknowledged packets • 3) beacon frame loss or quality degradation

  13. As a result of frequent probing and implementations that use packet loss information to trigger handoffs, one can expect a high rate of handoffs in a congested network. • The throughput rates should be taken care of even client spends enough time in handoff procedure.

  14. Conclusion • Finally, handoff mechanisms should be adaptive to congestion losses. • Use of packet loss information to trigger handoffs creates in a high rate of handoffs, even in the absence of mobility. • Many of the handoffs that occurred to other APs impacted the clients negatively. • Schemes that use signal strength trends to detect disconnection, and schemes that incorporate network information such as load or loss rates, are needed.

  15. Queries? Thank You !!!

More Related