17
Unwanted Link Layer Traffic in Large IEEE 802.11 Wireless Network By Naga V K Akkineni

Unwanted Link Layer Traffic in Large IEEE 802.11 Wireless Network By Naga V K Akkineni

Embed Size (px)

Citation preview

Page 1: Unwanted Link Layer Traffic in Large IEEE 802.11 Wireless Network By Naga V K Akkineni

Unwanted Link Layer Traffic in

Large IEEE 802.11 Wireless Network

By

Naga V K Akkineni

Page 2: Unwanted Link Layer Traffic in Large IEEE 802.11 Wireless Network By Naga V K Akkineni

Introduction

IEEE 802.11 based WLAN’s rapid growth.

Problems – Limited number of Orthogonal

Channels.

Unwanted Traffic – To maintain connectivity and

high quality client service.

Link layer Traffic - Overhead stems from

mechanisms that initiate, maintain, and change

client-AP connectivity

Page 3: Unwanted Link Layer Traffic in Large IEEE 802.11 Wireless Network By Naga V K Akkineni

Two mechanisms contribute to unwanted traffic in

wireless networks.

Keepalive traffic that is used to maintain client-AP

associations in the absence of data traffic.

The probing mechanism used by clients to frequently

collect neighbor information.

Page 4: Unwanted Link Layer Traffic in Large IEEE 802.11 Wireless Network By Naga V K Akkineni

Problems and DeficienciesKey implementation deficiencies in frame

retransmissions, frame sizes and rate adaptation in congested networks

Client overhead increases with the increase in network density.

Two types of overhead mechanisms that are prominent in a congested network - probes and keepalive packets.

Handoff rates increase with an increase in network utilization, even in the absence of mobility.

Page 5: Unwanted Link Layer Traffic in Large IEEE 802.11 Wireless Network By Naga V K Akkineni

Overview of IEEE 802.11 Frame Types

802.11 Standard defines three frame types. Management Control Data

Page 6: Unwanted Link Layer Traffic in Large IEEE 802.11 Wireless Network By Naga V K Akkineni
Page 7: Unwanted Link Layer Traffic in Large IEEE 802.11 Wireless Network By Naga V K Akkineni

Handoff Procedure

Client authenticating. Successful Authentication ---> Association request with information. AP allocates resources for client and sends its information like association ID and data rates. After Authenticating and associating it can communicate with other clients through AP as well.

Layer 2 (L2) handoff. 4phases. Triggering, Discovery, Selection, Commitment.

Page 8: Unwanted Link Layer Traffic in Large IEEE 802.11 Wireless Network By Naga V K Akkineni
Page 9: Unwanted Link Layer Traffic in Large IEEE 802.11 Wireless Network By Naga V K Akkineni

Traffic Analysis 802.11 DCF(Data Collection Framework) protocol

uses CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance). If node wants to transmit a frame carrier sensing must be done to check weather medium is busy. If the medium is not busy, the node transmits the packet. If the channel is busy, then the node backs off for a specific interval known as the backoff interval.

Page 10: Unwanted Link Layer Traffic in Large IEEE 802.11 Wireless Network By Naga V K Akkineni

Backoff IntervalFor every slot time that the channel is not busy,

the BO is decremented. The node transmits the packet when the backoff

timer reaches zero. If this transmission results in a collision, maximum length of backoff interval doubles.

Page 11: Unwanted Link Layer Traffic in Large IEEE 802.11 Wireless Network By Naga V K Akkineni

Keepalive Traffic: 1. Keepalive signal is a short message sent at regular intervals to keep a connection alive. 2. Used in Persistent HTTP/1.1 connections. 3. Generally large number of null data frames transmitted by the clients to the access point that were then acknowledged by the AP. 3. A null frame is essentially a data frame subtype with zero bytes of data. 4. Mobile devices in order to maintain to maintain battery power goes into sleep mode and losses its connection with AP’s. 5. At this moment of time the applications which require long-lived connections between servers and clients maintains keepalive messages.

Page 12: Unwanted Link Layer Traffic in Large IEEE 802.11 Wireless Network By Naga V K Akkineni

Probe Traffic: 1. A client broadcasts probe requests when it needs to obtain information on which APs are in range. 2. Any AP that receives this request sends a probe response containing information necessary for association, such as capability information and supported data rates. 3. Probe requests are sent when a client disconnects or roams from the AP with which it is associated. 4. A client also probes the medium periodically to check which APs are in the vicinity, and whether it is still associated with the AP with the strongest signal.

Page 13: Unwanted Link Layer Traffic in Large IEEE 802.11 Wireless Network By Naga V K Akkineni

5. This aggressive probing is beneficial when clients are mobile.6. The delay is large enough to deteriorate application performance, especially delay sensitive applications such as voice.7. Instead of being reactive to packet loss, clients are proactive in probing the medium and collecting neighbor information.8. Aggressive probing of the medium in a static, congested network imposes unnecessary overhead and leads to inefficient medium utilization.

Page 14: Unwanted Link Layer Traffic in Large IEEE 802.11 Wireless Network By Naga V K Akkineni

Handoff Analysis When a client wishes to associate with a different AP, a handoff process is initiated. Handoff trigger is the first stage of handoff wherein a client identifies the need to look for another AP. The implementation of this mechanism is left to vendors, however, it is usually a reaction to one or more of the following: 1) consecutive missed beacons 2) unacknowledged packets 3) beacon frame loss or quality degradation

Page 15: Unwanted Link Layer Traffic in Large IEEE 802.11 Wireless Network By Naga V K Akkineni

As a result of frequent probing and implementations that use packet loss information to trigger handoffs, one can expect a high rate of handoffs in a congested network.

The throughput rates should be taken care of even client spends enough time in handoff procedure.

Page 16: Unwanted Link Layer Traffic in Large IEEE 802.11 Wireless Network By Naga V K Akkineni

ConclusionFinally, handoff mechanisms should be adaptive to congestion losses. Use of packet loss information to trigger handoffs creates in a high rate of handoffs, even in the absence of mobility. Many of the handoffs that occurred to other APs impacted the clients negatively. Schemes that use signal strength trends to detect disconnection, and schemes that incorporate network information such as load or loss rates, are needed.

Page 17: Unwanted Link Layer Traffic in Large IEEE 802.11 Wireless Network By Naga V K Akkineni

Queries?

Thank You !!!