THROUGHPUT AND LATENCY PERFORMANCE OF IEEE 802.11E WITH 802.11A, 802.11B, AND 802.11G PHYSICAL LAYERS
MetadataShow full item record
RightsCopyright © International Foundation for Telemetering
Collection InformationProceedings from the International Telemetering Conference are made available by the International Foundation for Telemetering and the University of Arizona Libraries. Visit http://www.telemetry.org/index.php/contact-us if you have questions about items in this collection.
AbstractIEEE 802.11e is an amendment of the medium-access control (MAC) layer of the standard for wireless local area networking IEEE 802.11. The goal of 802.11e is to provide 802.11 networks with Quality of Service (QoS). 802.11 has three physical layers (PHY) of practical importance: 802.11b, 802.11a, and 802.11g. 802.11a and 802.11g provide data rates between 6 and 54 Mbps, and 802.11b provides data rates of 5.5 Mbps and 11 Mbps. However these data rates are not the actual throughput. The actual throughput that a user will experience will be lower. The throughput depends on both the PHY and MAC layers. It is important to estimate what exactly is the throughput when the physical layer is 802.11a, 802.11b, or 802.11g, and the MAC layer is 802.11e. In other words, how does providing QoS change the throughput for each of the three physical layers? In this paper we provide answers to this problem. Analytic formulae are derived. The maximum achievable throughput and minimum delay involved in data transfers are determined. The obtained results have further significance for the design of high-throughput wireless protocols.
SponsorsInternational Foundation for Telemetering
Showing items related by title, author, creator and subject.
An Anomaly Behavior Analysis Methodology for Network Centric SystemsHariri, Salim; Alipour, Hamid Reza; Akoglu, Ali; Wang Roveda, Janet; Hariri, Salim; Rozenblit, Jerzy; Lysecky, Roman (The University of Arizona., 2013)Information systems and their services (referred to as cyberspace) are ubiquitous and touch all aspects of our life. With the exponential growth in cyberspace activities, the number and complexity of cyber-attacks have increased significantly due to an increase in the number of applications with vulnerabilities and the number of attackers. Consequently, it becomes extremely critical to develop efficient network Intrusion Detection Systems (IDS) that can mitigate and protect cyberspace resources and services against cyber-attacks. On the other hand, since each network system and application has its own specification as defined in its protocol, it is hard to develop a single IDS which works properly for all network protocols. The keener approach is to design customized detection engines for each protocol and then aggregate the reports from these engines to define the final security state of the system. In this dissertation, we developed a general methodology based on data mining, statistical analysis and protocol semantics to perform anomaly behavior analysis and detection for network-centric systems and their protocols. In our approach, we develop runtime models of protocol's state transitions during a time interval ΔΤ. We consider any n consecutive messages in a session during the time interval ΔΤ as an n-transition pattern called n-gram. By applying statistical analysis over these n-gram patterns we can accurately model the normal behavior of any protocol. Then we use the amount of the deviation from this normal model to quantify the anomaly score of the protocol activities. If this anomaly score is higher than a well-defined threshold the system marks that activity as a malicious activity. To validate our methodology, we have applied it to two different protocols: DNS (Domain Name System) at the application layer and the IEEE 802.11(WiFi) at the data link layer, where we have achieved good detection results (>95%) with low detection errors (<0.1%).
Wireless Local Area Network for Data Telemetry from Fast Moving NodesBamberger, Robert J.; Barrett, George R.; Nichols, Robert A.; Burbank, Jack L.; Lauss, Mark H.; Johns Hopkins University; U.S. Army Yuma Proving Ground (International Foundation for Telemetering, 2002-10)A Wireless Local Area Network (WLAN) based system called 2-Way Robust Acquisition of Data (2-RAD) is being developed to telemeter data from a number of fast moving airborne platforms to ground collection points distributed over a large test range. The Johns Hopkins University Applied Physics Laboratory (JHU/APL) is analyzing a 2-RAD prototype currently in operation at the U.S. Army Yuma Proving Ground (YPG) that uses an IEEE 802.11b WLAN infrastructure. Preliminary analysis efforts at JHU/APL indicate that the Doppler shift from fast movers, and the system radio link margin, do not preclude IEEE 802.11b from being used for 2 -RAD.
Tracking Multiple Airborne 802.11b Wireless Local Area Networks to Extend the Internet to Aircrafts in FlightWei, Mei Y.; Billings, Donald; Leung, Joseph G.; Aoyagi, Michio; NASA (International Foundation for Telemetering, 2003-10)Wireless local area networks (WLANs) enable the extension of the Internet to aircrafts in flight. To establish this wireless network segment, commercial-of-the-shelve (COTS) 802.11b wireless Ethernet bridges were used. Wireless Ethernet bridges were chosen over optical wireless technology and Internet protocol (IP) satellite modems mainly because of their lower costs, ease and flexibility of implementation. Additionally, 802.11b wireless networks allow a wide range of mobile data devices such as laptop computers and personal digital assistance high-speed wireless access to critical information and applications resided on the aircrafts networks. Since 802.11b WLAN media is shared and traffic generated by other users will degrade the overall performance of the network. With the continual wide spread use of 802.11b WLAN, an aircraft in flight will experience network congestions and poor performance across all the frequency channels. The congestion and poor performance issues can be minimized by tracking the airborne wireless LAN using highly directional antenna and RF filtering. The method of tracking multiple 802.11 wirelesses LAN and the RF subsystem will be described. The applications of 802.11b wireless networks to man and unmanned aircrafts flight research will be discussed.