370 likes | 479 Vues
This work presents a comprehensive analysis of Quality of Service (QoS) in Wireless Local Area Networks (WLANs), highlighting the significant impact of physical-layer capture on throughput fairness. It discusses the Z-iteration method for fast performance evaluation of heterogeneous TCP/IP networks, offering an alternative to traditional packet-level simulations. The paper explores both explicit and implicit congestion control methods relative to signal strength, addressing how differences in signal can lead to unfair throughput. Additionally, assertional security analysis is briefly discussed, framing a holistic view of network performance and security metrics.
E N D
WLAN:QoS, Z-iteration, andAssertional Security Analysis A.Udaya Shankar Computer Science Dept and UMIACS University of Maryland shankar@cs.umd.edu
Outline • QoS • Z-iteration (performance evaluation) • Assertional Security Analysis A.U.Shankar --- LTS
Outline • QoS Compensating for “physical capture” effect in WLANs • Z-iteration (performance evaluation) • Assertional Security Analysis A.U.Shankar --- LTS
QoS: Throughput fairness • Throughput fairness in 802.11 depends on • MAC access mechanism • Physical-layer characteristics • Most studies downplay physical-layer effect and focus on the MAC CSMA/CA/BEB • We discovered that physical-layer capture is the dominant factor in throughput fairness A.U.Shankar --- LTS
Physical-layer capture effect • Physical-layer capture efffect: • When two frames collide at a receiver, the receiver can extract the stronger frame • Capture occurs consistently for even a few dBm difference in frame signal strengths • Capture occurs frequently in WLANs (due to multipath and fading). A.U.Shankar --- LTS
Ad-hoc Mode Experiments source 1 source 2 sniffer • Sources broadcasting in ad-hoc mode • no beacons, ACKs, and retransmissions • MAC-layer effect minimized • Results • 8% of frames collided • 90% of collisions had capture • 8% higher throughput for stronger station A.U.Shankar --- LTS
Ad-hoc Mode Experiments Signal strengths Throughputs A.U.Shankar --- LTS
Infrastructure Mode Experimentswithout RTS/CTS source 1 source 2 AP sniffer sniffer sink • Results • Weaker station retransmitted 5% of frames • Stronger station retransmitted 0.5% of frames • Stronger station had 7% higher throughput A.U.Shankar --- LTS
Infrastructure Mode Experimentswithout RTS/CTS Throughputs Signal strengths A.U.Shankar --- LTS
Infrastructure Mode Experimentswith RTS/CTS source 1 source 2 AP sniffer sniffer sink • Results • Each station retransmitted under 0.1% data frames • Weaker station retransmitted 5% of RTS frames • Stronger station retransmitted 0.1% of RTS frames • Stronger station had 12% higher throughput A.U.Shankar --- LTS
QoS: Compensating for Capture • Congestion control based on signal strength • Explicit control • Source controls its send rate based on its signal strength at AP • Implicit control • AP delays packets of stronger sources, thereby inciting transport layer congestion control to throttle down A.U.Shankar --- LTS
QoS: Conclusions • Physical-layer capture is a major cause of MAC throughput unfairness. • Resulting unfairness as high as 12% in favor of station with stronger signal. • Any QoS scheme must account for differing signal strengths of sources. • Investigating explicit and implicit schemes. • Invention disclosure. A.U.Shankar --- LTS
Outline • QoS • Z-iteration Fast evaluation of instantaneous peformance metrics of wireless/wireline networks • Assertional Security Analysis A.U.Shankar --- LTS
Z-iteration: Introduction • Fast evaluation of heterogenous TCP/IP networks • Current evaluation methods are not adequate • analytical methods are inaccurate and coarse • packet-level simulators are slow (e.g. ns, opnet) • Do not capture real-world features • 802.11 rate-switching • Platform dependencies (timers, scheduling) • Goal: Evaluation method that is as accurate as packet-level simulation but much faster • Approach: Based on fast approximate solutions of time-dependent queuing models A.U.Shankar --- LTS
Z-iteration Approach • TCP/IP networks modeled by a queuing network • Traffic modeled by time-dependent stochastic process • Time-dependency: natural modeling of adaptive control (congestion, routing, admission, link scheduling, ...) • Queuing differential equations solved rapidly using Z-iteration approximations • Obtain time evolution of instantaneous ensemble metrics at each link for each connection • average_queue_size(t), blocking(t), utilization(t), … • Validation against ns simulation A.U.Shankar --- LTS
M(t)/M(t)/* Queuing Networks (t) (t) • Start from the flow equation • If we can express B(t) and U(t) in terms of N(t), we would have a single differential equation per queue • For anetwork of queues, each queue i has • So a network of n queues is modeled by n differential equations A.U.Shankar --- LTS
M(t)/M(t)/* Queuing Networks A.U.Shankar --- LTS
M(t)/M(t)/* Queuing Networks A.U.Shankar --- LTS
TCP/IP Networks • Model link by variation of M(t)/M(t)/1/K equations • Model TCP sources by profiles. • Profile of a TCP source: function that describesinst. throughput versus inst. loss rate andinst. roundtrip time. A.U.Shankar --- LTS
Drop-Tail Example 2: 30 nodes, mid-load A.U.Shankar --- LTS
Drop-Tail Example 3&4: 100 nodes - topology A.U.Shankar --- LTS
Drop-Tail Example 3: 100 nodes, mid-load Evaluation time: Z-iteration: 16 sec, ns: 71 - 930 sec A.U.Shankar --- LTS
Drop-Tail Example 4: 100 nodes, high-load Evaluation time: Z-iteration: 29 sec,ns: 146 - 2150 sec A.U.Shankar --- LTS
Summary • Fast accurate time evolution of performance metrics of time-dependent queuing networks • Straightforward modeling of adaptive control mechanisms • Short-term real-time prediction of network traffic • Profiles: natural way to model real-life sources • Extensions • RED, CBQ, ... • WLANs A.U.Shankar --- LTS
Z-iteration for WLAN networks • Model 802.11 sources by profiles • Profile of a 802.11 source: Instantaneous throughput as function of • Number of active stations • Desired and achieved instantaneous rates of active stations • Signal strengths of active stations at AP A.U.Shankar --- LTS
Profile: Experimental Setup source 1 .... sniffer AP/sink source N • Workload • UDP sources to preclude any control effects. • Sending rate keeps firmware queue full. A.U.Shankar --- LTS
General Observations • Susceptible to severe capture-effect • Starvation occurs routinely for more than 8 stations • Rate Switching Algorithm • Station switches to lower transmission rate if there is a packet loss • AP is not bottleneck in processing A.U.Shankar --- LTS
Specific Results • Maximum Instantaneous Throughput for single station is 6.45 Mbps, out of a bit rate of 11 Mbps • Due to DIFS + Backoff • Throughput falls rapidly with number of stations at high load • Susceptible to capture-effect A.U.Shankar --- LTS
Profile of 802.11b (preliminary) N=2 N=3 N=4 Instantaneous Throughput Background Traffic A.U.Shankar --- LTS
Clustering in 802.11 profiles Per-station inst. throughput (pkts/sec) Overall inst. throughput (pkts/sec) A.U.Shankar --- LTS
Outline • QoS • Z-iteration • Assertional Security Analysis Framework for specification, verification, and testing of concurrent systems A.U.Shankar --- LTS
Concurrent System: Cooks in a Kitchen A.U.Shankar --- LTS
Example concurrent system executions • Single-process concurrent system execution • Two-process concurrent system execution A.U.Shankar --- LTS
SESF (services and systems framework) • Systems and Services specified by programs • service defines acceptable sequences of interactions • service is executable, not constrained by platform • SESF program explicitly indicates • events: atomically-executed statements • externally-controlled events • progress expected (of platform/service) • Service satisfaction • composite program of system and service • Compositionality A.U.Shankar --- LTS
Assertional Analysis and Testing • Analysis • Properties expressed by assertions • invariants, leads-to, • Assertions proved by proof rules or operational reasoning • Routing, transport, concurrency control • Testing • single process: threads and function calls • multi-process: distributed processes and RMI • Transport layer A.U.Shankar --- LTS
Assertions of Security • confined(key, vset) • predicate: true iff value key is confined to variable set vset • vset models principals, systems, ... • handles authentication, confidentiality, ... • Proof rules • Hoare-triple: {predicate} statement {predicate} • {confined(k, v)} x := k {confined(k, v U {x})} • {confined(k, v)} one-way-func(k) {confined(k, v)} A.U.Shankar --- LTS
Future Work • QoS • Control mech compensating for signal-strength • Z-iteration (performance evaluation) • 802.11b profiles • Evaluation of QoS mechanisms • Assertional Security Analysis • Assertions and proof system for security • 802.11 authentication, key distribution, ... A.U.Shankar --- LTS