SlideShare a Scribd company logo
Research Inventy: International Journal Of Engineering And Science
Vol.3, Issue 2 (May 2013), PP 28-30
Issn(e): 2278-4721, Issn(p):2319-6483, Www.Researchinventy.Com
28
A Fast Handoff Scheme of Ieee 802.11 Wireless Networks
1
Jyoti Sachan, 2
Anant Kr. Jaiswal
1
(Amity University)
2
(Amity University)
ABSTRACT - The Handoff delay is one of the major problems in Wireless Network (WLN) that needs to be
solved in order to allow time-critical and real-time applications run continuously during handoff. We have
developed a fast handoff scheme called NodeScan (or MobileScan) to provide a novel use of channel scanning
latency by employing open system authentication. This scheme comprises two steps: firstly a client device takes
advantage of the WMN architecture to maintain a list of active mesh nodes. Secondly when handoff is required,
a client transmits Authentication Request frames to all mobile nodes (MNs) from the list instead of broadcasting
Probe Request frames as in an active scan to discover the available MNs. This fast handoff scheme is feasible by
upgrading the software only on the client side. This paper compares the theoretical handoff latency of Mesh
Scan with other approaches and we demonstrate the effectiveness of our through experiment.
KEYWORDS – Handoff, Wireless LAN, IEEE 802.11, NodeScan, Mobile Node
I. INTRODUCTION
A traditional wireless network deployment involves Access Points (AP) with overlapping coverage
zones where each AP has a wired network connection. WMNs only require a few of the MNs to have wired
network connections and allowing all others to forward packets over multiple wireless hops. In this paper, we
are concerned with an IEEE 802.11a network which operates in the 5.3 GHz frequency band. A practical
problem with WMNs occurs when a connection transition (handoff) from one MN to another MN is required for
mobile client to maintain network connectivity when a mobile client moves away from one MN and closer to
another one. Ideally, handoff should be completely transparent to mobile client to support real-time traffic such
as interactive VoIP or video conferencing. The handoff procedure aims to reduce this time as much as possible
so that the upper layers do not notice the connectivity interruption. However, Under the IEEE 802.11 WLAN
standard, there are three steps involved in the handoff process: Discovery, Authentication and Re-association.
Previous works reported that the standard handoff incurs latency of the order of hundreds of milliseconds to
several seconds. Moreover, the discovery step accounts for more than 90% of this latency [1]. In this paper, we
present an experimental fast handoff scheme called NodeScan to reduce the latency associated with node by
using open system authentication where no key exchange is involved. The fast handoff scheme uses a client-side
control mechanism which requires a client software upgrade. The experiments are performed on an wireless
mesh testbed which uses open system key authentication. All measurements are taken from the system kernel
layer to ensure accuracy. The basic idea behind NodeScan is to take advantage of the WMN architecture where
all the MNs are required to cache a list of mesh node at client side, and exploit multiple Authentication Request
frames to find the next mesh node within same mesh network. In this paper, we compare the theoretical handoff
time required by NodeScan with other approaches and demonstrate the effectiveness of our system through
experiment.
The rest of this paper is organized as follows. In Section II, we describe the background (link-layer
handoff procedure in IEEE 802.11 wireless networks) of the handoff and present a discovery latency analysis.
Section III introduces the experimental testbed wireless interface driver. In section IV, we describe our
experimental method to improve the efficiency of discovery. Section V presents the details of our
implementation on Linux box and experimental results. Section VI concludes the paper and outlines our future
work in this area.
.
II. BACKGROUND
The Link-layer handoff refers to the change of the mesh node to which a station is connected in a
WMN. In the case of IEEE 802.11a WLANs it implies an interruption of data frame transmission. The duration
of this interruption is called handoff latency. For the purposes of this work we divide handoff into two phases:
Scanning and Execution. The scanning phase is used to acquire information about the available APs in each
channel. In the IEEE 802.11 standard, there are two methods used: passive scanning and active scanning. In
passive scanning, a mobile client listens for beacon frames on one channel at a time.
A Fast Handoff Scheme Of Ieee…
29
Beacon frames are normally broadcast by MN every 100ms. In active scanning, the mobile client
broadcasts probe request frames and waits for probe response frames on each channel. The execution phase is
the phase when the mobile client exchanges information and establishes a physical connection with the MN. It
involves authentication and re-association. Authentication verifies the identity between client and MN. The
standard defines two algorithms: open system authentication and shared key authentication. The time required
for authentication takes one round trip time (RTT) for open system or twice RTT for shared key. Re-association
follows after successful authentication where the client is assigned a proper association identity and required
resources by new MN. The re-association delay takes one RTT. RTT is the time corresponding to the
transmission time of a probe request frame and an ACK response frame between two nodes. Four timestamps
are required to calculate RTT using equation (1):
RTT= (T 21 T11) + (T 22 T12) (1)
In this paper we assume as shown in Figure 1. (T11 is the timestamp of the probe request frame that is
transmitted from Node A, T21 is the times that the request frame from Node A is received by Node B, T22 and
T21 are similar to T11 and T21) RTT depends on a number of factors that includes the network load,
interference and contention.
Fig. 1: Round Trip Time.
III. SYSTEM DESCRIPTION
All experiments have been carried out using the CNRI wireless mesh testbed [13]. This testbed is a
multi-purpose networking experimental platform which consists of 17 IEEE 802.11abg based mesh nodes,
located around the Focus building in DIT. Each Mesh Node uses Soekris net 4521 boards as hardware platform
and NETGEAR WAG511 wireless adapter cards. It runs under the Pebble Linux distribution as software
platform and uses madwifi version 0.9.4 as the wireless network interface driver. Further information about the
CNRI mesh testbed can be obtained from http://mesh.cnri.dit.ie.
IV. EXPERIMENTAL SETUP
NodeScan comprises two steps: First the mobile client is given a list of available mesh node
information called a SmartList. Secondly, when handoff is required, the mobile client performs a unicast scan by
transmitting Authentication Request frames to the each of the MNs on the list to discover the next MN for
handoff to. SmartList is where the MN information stores and manages the MNs. The list is ordered where a
MN’s position on the list depends on its Received Signal Strength Indications (RSSI) value. The MN with the
highest RSSI value will be put at the top of the list in order to provide fast handoff to the best available MN in
real-time. The MN information can be easily added to and stored onto mobile client when a mobile client joins a
particular WMN for the first time. The MN’s RSSI is provided in real-time by listening to beacon frame from all
Mesh Nodes. NodeScan does not generate any overhead during handoff and so does not produce any
communication performance degradation, nor require modifications to the protocols.
V. HANDOFF PROCEDURE
In our system, the handoff procedure is performed with the following steps. When handoff is required
the mobile client transmits an Authentication Request to each of the MNs on the SmartList. This is in
accordance with the 802.11 standard which allows for authentication with multiple MNs. When the first
Authentication Response frame is received, mobile client stops transmitting Authentication Request to the rest
of the MNs on the SmartList and re-associates with the MN which sends the first Authentication Response.
A Fast Handoff Scheme Of Ieee…
30
In the case where no Authentication Response is received after Authentication Requests have been
transmitted to all MNs in the SmartList, the mobile client will perform active scanning to try to discover any
available wireless networks. The NodeScan algorithm is shown in Figure 2. In terms of the NodeScan
algorithmic delay and assuming at least one MN is available, we have equation (2) where M is the number of
Authentication Request frames transmitted. In the best case scenario the first MN from the SmartList is the next
MN to re-associate with, so the delay is 2 * RTT. The worst case will be there is no available MN and the
mobile client carries out an active scanning.
VI. IMPLEMENTATION DETAILS
We implemented the SmartList within the kernel driver (madwifi 0.9.4) [14]. The changes in madwifi
driver are the minimum required to support NodeScan by using SmartList. All processes are carried out in
kernel layer to provide stable and fast handoff in this prototype implementation. In the madwifi driver, a new
structure is implemented to create single linked list as SmartList. A command line input method (ioctls) is also
implemented to provide a flexible way to add Mesh Node information. We created a new information state to
trigger SmartList to reorder the MN position to make the best MN on top of SmartList. The management frame
retry and management frame backoff count are minimized to provide fast Authentication Request transmission.
In the original madwifi driver, the same Authentication Request will be retransmitted 11 times if an
Authentication Request does not get response from MN where it waits for 1 second before transmitting the next
Authentication Request. They can cause significant delay so the management frame retry is set to zero and
management frame backoff count is set to one millisecond when a fast handoff is triggered.
VII. CONCLUSION
We have developed a fast handoff scheme, called NodeScan to improve handoff within WMN, by
using a novel usage of the open system authentication scan to reduce channel scanning latency. NodeScan
maintains a list of MNs in SmartList, and performs unicast scanning by transmitting authentication request
frame to discover available MN and perform handoff instead of broadcasting probe request frame. In this paper
we have shown a significant reduction in handoff latency of our approach through implementation and
experiments. Our future work will be concerned with implementing real-time list of MNs at the MN side, and
the MN provides accurate mesh node list.
REFERENCES
[1] A. Mishra, et al.: "An Empirical Analysis of the IEEE 802.11 MAC Layer Handoff Process, " ACM SIGCOMM Computer
Communication Review.
[2] Diane Tang and Mary Baker, "Analysis of a Metropolitan- Area Wireless Network," ACM/Kluwer Wireless Networks. Special
issue: Selected Papers from Mobicom'99, vol. 8, no. 2/3, pp. 107-120, 2002.
[3] B. Chambers, “The grid roofnet: a rooftop ad hocwireless network," 2002. h
[4] John C. Bicket, Daniel Aguayo, Sanjit Biswas, and Robert Morris, "Architecture and evaluation of an unplanned 802.11b mesh
network.," in MOBICOM, 2005, pp. 31-42.
[5] Locusworld," http://locustworld.com
[6] Tropos networks," http://www.tropos.com
[7] Extricom," http://www.extricom.com
[8] Cisco," http://www.cisco.com/en/
[9] Arunesh Mishra, Minho Shin, and William Arbaugh, "An empirical analysis of the IEEE 802.11 MAC layer hando_ process,"
SIGCOMM Comput. Commun. Rev., vol. 33, no. 2, pp. 93-102, 2003.
[10] Ishwar Ramani and Stefan Savage, "Syncscan: Practical Fast Hando_ for 802.11 Infrastructure Networks," in Proc. Of IEEE
INFOCOM, march 2005.M.
[11] V. Brik, et al.: "Eliminating handoff latencies in 802.11 WLANs using multiple radios: Applications, experience, and evaluation,
ACM/USENIX IMC 2005, USA, October 2005.
[12] M. Jeong, et al.: "Fast active scan for measurement and handoff, "Technical report, DoCoMo USA Labs, May 2003.
[13] CNRI Wireless Mesh Testbed. Available at http://www.cnri.dit.ie/research.mesh.testbed.html
[14] MadWifi - a Linux kernel device driver for Wireless LAN

More Related Content

PDF
Paper id 36201515
PDF
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
PDF
Sustainable Lightweight Wireless Communication Stack
PDF
Alleviate exposed node issues in wireless mesh network (wmn) using a novel ap...
PDF
Securing AODV Routing Protocol in MANET to Detect Wormhole Attack Using NMAC ...
PDF
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...
PDF
Safe Trust Alert Routing in MANET
PDF
security in wireless sensor networks
Paper id 36201515
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
Sustainable Lightweight Wireless Communication Stack
Alleviate exposed node issues in wireless mesh network (wmn) using a novel ap...
Securing AODV Routing Protocol in MANET to Detect Wormhole Attack Using NMAC ...
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...
Safe Trust Alert Routing in MANET
security in wireless sensor networks

What's hot (20)

PDF
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...
PDF
Fs3610481053
PDF
Improved SCTP Scheme To Overcome Congestion Losses Over Manet
PDF
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
PDF
GEOGRAPHIC INFORMATION-BASED ROUTING OPTIMIZATION USING GA FOR CLUSTER-BASED ...
PDF
Various Techniques Used in Wireless Sensor Networks for Data Transfer
PDF
REDUCING HANDOVER DELAY BY PRESELECTIVE SCANNING USING GPS
PDF
AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...
PDF
Message Authentication And Source Privacy Using BAC Technique In Wireless Sen...
PDF
INTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENT
PDF
32 marycherian 336-349
PDF
Ar03302620266
PDF
Software-Defined Networking Changes for the Paradigm for Mission-Critical Ope...
PDF
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
PDF
AODV protocol and Black Hole attack
PDF
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
PPTX
Threats in wireless sensor networks
PDF
Impact of black hole attack on aodv routing protocol
PDF
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
PDF
Performance Evaluation of Wormhole Attack In AODV
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...
Fs3610481053
Improved SCTP Scheme To Overcome Congestion Losses Over Manet
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
GEOGRAPHIC INFORMATION-BASED ROUTING OPTIMIZATION USING GA FOR CLUSTER-BASED ...
Various Techniques Used in Wireless Sensor Networks for Data Transfer
REDUCING HANDOVER DELAY BY PRESELECTIVE SCANNING USING GPS
AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...
Message Authentication And Source Privacy Using BAC Technique In Wireless Sen...
INTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENT
32 marycherian 336-349
Ar03302620266
Software-Defined Networking Changes for the Paradigm for Mission-Critical Ope...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
AODV protocol and Black Hole attack
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
Threats in wireless sensor networks
Impact of black hole attack on aodv routing protocol
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
Performance Evaluation of Wormhole Attack In AODV
Ad

Viewers also liked (6)

PDF
Research Inventy : International Journal of Engineering and Science
PDF
Research Inventy : International Journal of Engineering and Science
PPTX
Marketing Ask an Expert (Oregon State University)
PDF
B03208016
DOC
References may2011
PPTX
Serendipity: a platform to discover and visualize data from OER
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
Marketing Ask an Expert (Oregon State University)
B03208016
References may2011
Serendipity: a platform to discover and visualize data from OER
Ad

Similar to E032028030 (20)

PDF
Paper id 2720145
PDF
call for papers, research paper publishing, where to publish research paper, ...
PDF
Enhanced Seamless Handoff Using Multiple Access Points in Wireless Local Area...
PDF
Enhanced Seamless Handoff Using Multiple Access Points in Wireless Local Area...
PPTX
3gwireless
PDF
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
PDF
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
PPTX
QOS oriented vho scheme for wifi and wimax overlay networks
PDF
PDF
Gf2411221128
PPTX
802.11 mgt-opern
PDF
Lh3420492054
PDF
Mobility management in heterogeneous wireless networks
PDF
Soft handover scheme for wsn nodes using media independent handover functions
PDF
11.soft handover scheme for wsn nodes using media independent handover functions
PDF
MINIMIZATION OF HANDOFF LATENCY BY CO-ORDINATE EVALUATION METHOD USING GPS BA...
PDF
Minimization of Handoff Latency by Co-ordinate Evaluation Method Using GPS Ba...
PDF
MINIMIZATION OF HANDOFF LATENCY BY CO-ORDINATE EVALUATION METHOD USING GPS BA...
PPT
3gwireless
PDF
Analysis of Handoff techniques used for hybrid networks: cellular/WLAN
Paper id 2720145
call for papers, research paper publishing, where to publish research paper, ...
Enhanced Seamless Handoff Using Multiple Access Points in Wireless Local Area...
Enhanced Seamless Handoff Using Multiple Access Points in Wireless Local Area...
3gwireless
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
QOS oriented vho scheme for wifi and wimax overlay networks
Gf2411221128
802.11 mgt-opern
Lh3420492054
Mobility management in heterogeneous wireless networks
Soft handover scheme for wsn nodes using media independent handover functions
11.soft handover scheme for wsn nodes using media independent handover functions
MINIMIZATION OF HANDOFF LATENCY BY CO-ORDINATE EVALUATION METHOD USING GPS BA...
Minimization of Handoff Latency by Co-ordinate Evaluation Method Using GPS Ba...
MINIMIZATION OF HANDOFF LATENCY BY CO-ORDINATE EVALUATION METHOD USING GPS BA...
3gwireless
Analysis of Handoff techniques used for hybrid networks: cellular/WLAN

More from inventy (20)

PDF
Experimental Investigation of a Household Refrigerator Using Evaporative-Cool...
PDF
Copper Strip Corrossion Test in Various Aviation Fuels
PDF
Additional Conservation Laws for Two-Velocity Hydrodynamics Equations with th...
PDF
Comparative Study of the Quality of Life, Quality of Work Life and Organisati...
PDF
A Study of Automated Decision Making Systems
PDF
Crystallization of L-Glutamic Acid: Mechanism of Heterogeneous β -Form Nuclea...
PDF
Evaluation of Damage by the Reliability of the Traction Test on Polymer Test ...
PDF
Application of Kennelly’model of Running Performances to Elite Endurance Runn...
PDF
Development and Application of a Failure Monitoring System by Using the Vibra...
PDF
The Management of Protected Areas in Serengeti Ecosystem: A Case Study of Iko...
PDF
Size distribution and biometric relationships of little tunny Euthynnus allet...
PDF
Removal of Chromium (VI) From Aqueous Solutions Using Discarded Solanum Tuber...
PDF
Effect of Various External and Internal Factors on the Carrier Mobility in n-...
PDF
Transient flow analysis for horizontal axial upper-wind turbine
PDF
Choice of Numerical Integration Method for Wind Time History Analysis of Tall...
PDF
Impacts of Demand Side Management on System Reliability Evaluation
PDF
Reliability Evaluation of Riyadh System Incorporating Renewable Generation
PDF
The effect of reduced pressure acetylene plasma treatment on physical charact...
PDF
Experimental Investigation of Mini Cooler cum Freezer
PDF
Growth and Magnetic properties of MnGeP2 thin films
Experimental Investigation of a Household Refrigerator Using Evaporative-Cool...
Copper Strip Corrossion Test in Various Aviation Fuels
Additional Conservation Laws for Two-Velocity Hydrodynamics Equations with th...
Comparative Study of the Quality of Life, Quality of Work Life and Organisati...
A Study of Automated Decision Making Systems
Crystallization of L-Glutamic Acid: Mechanism of Heterogeneous β -Form Nuclea...
Evaluation of Damage by the Reliability of the Traction Test on Polymer Test ...
Application of Kennelly’model of Running Performances to Elite Endurance Runn...
Development and Application of a Failure Monitoring System by Using the Vibra...
The Management of Protected Areas in Serengeti Ecosystem: A Case Study of Iko...
Size distribution and biometric relationships of little tunny Euthynnus allet...
Removal of Chromium (VI) From Aqueous Solutions Using Discarded Solanum Tuber...
Effect of Various External and Internal Factors on the Carrier Mobility in n-...
Transient flow analysis for horizontal axial upper-wind turbine
Choice of Numerical Integration Method for Wind Time History Analysis of Tall...
Impacts of Demand Side Management on System Reliability Evaluation
Reliability Evaluation of Riyadh System Incorporating Renewable Generation
The effect of reduced pressure acetylene plasma treatment on physical charact...
Experimental Investigation of Mini Cooler cum Freezer
Growth and Magnetic properties of MnGeP2 thin films

Recently uploaded (20)

PDF
Spectral efficient network and resource selection model in 5G networks
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Encapsulation theory and applications.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
cuic standard and advanced reporting.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Machine learning based COVID-19 study performance prediction
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
Cloud computing and distributed systems.
PDF
NewMind AI Monthly Chronicles - July 2025
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Electronic commerce courselecture one. Pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Network Security Unit 5.pdf for BCA BBA.
Spectral efficient network and resource selection model in 5G networks
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Encapsulation theory and applications.pdf
Encapsulation_ Review paper, used for researhc scholars
cuic standard and advanced reporting.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
Machine learning based COVID-19 study performance prediction
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Cloud computing and distributed systems.
NewMind AI Monthly Chronicles - July 2025
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
NewMind AI Weekly Chronicles - August'25 Week I
Unlocking AI with Model Context Protocol (MCP)
20250228 LYD VKU AI Blended-Learning.pptx
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Dropbox Q2 2025 Financial Results & Investor Presentation
Electronic commerce courselecture one. Pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
Network Security Unit 5.pdf for BCA BBA.

E032028030

  • 1. Research Inventy: International Journal Of Engineering And Science Vol.3, Issue 2 (May 2013), PP 28-30 Issn(e): 2278-4721, Issn(p):2319-6483, Www.Researchinventy.Com 28 A Fast Handoff Scheme of Ieee 802.11 Wireless Networks 1 Jyoti Sachan, 2 Anant Kr. Jaiswal 1 (Amity University) 2 (Amity University) ABSTRACT - The Handoff delay is one of the major problems in Wireless Network (WLN) that needs to be solved in order to allow time-critical and real-time applications run continuously during handoff. We have developed a fast handoff scheme called NodeScan (or MobileScan) to provide a novel use of channel scanning latency by employing open system authentication. This scheme comprises two steps: firstly a client device takes advantage of the WMN architecture to maintain a list of active mesh nodes. Secondly when handoff is required, a client transmits Authentication Request frames to all mobile nodes (MNs) from the list instead of broadcasting Probe Request frames as in an active scan to discover the available MNs. This fast handoff scheme is feasible by upgrading the software only on the client side. This paper compares the theoretical handoff latency of Mesh Scan with other approaches and we demonstrate the effectiveness of our through experiment. KEYWORDS – Handoff, Wireless LAN, IEEE 802.11, NodeScan, Mobile Node I. INTRODUCTION A traditional wireless network deployment involves Access Points (AP) with overlapping coverage zones where each AP has a wired network connection. WMNs only require a few of the MNs to have wired network connections and allowing all others to forward packets over multiple wireless hops. In this paper, we are concerned with an IEEE 802.11a network which operates in the 5.3 GHz frequency band. A practical problem with WMNs occurs when a connection transition (handoff) from one MN to another MN is required for mobile client to maintain network connectivity when a mobile client moves away from one MN and closer to another one. Ideally, handoff should be completely transparent to mobile client to support real-time traffic such as interactive VoIP or video conferencing. The handoff procedure aims to reduce this time as much as possible so that the upper layers do not notice the connectivity interruption. However, Under the IEEE 802.11 WLAN standard, there are three steps involved in the handoff process: Discovery, Authentication and Re-association. Previous works reported that the standard handoff incurs latency of the order of hundreds of milliseconds to several seconds. Moreover, the discovery step accounts for more than 90% of this latency [1]. In this paper, we present an experimental fast handoff scheme called NodeScan to reduce the latency associated with node by using open system authentication where no key exchange is involved. The fast handoff scheme uses a client-side control mechanism which requires a client software upgrade. The experiments are performed on an wireless mesh testbed which uses open system key authentication. All measurements are taken from the system kernel layer to ensure accuracy. The basic idea behind NodeScan is to take advantage of the WMN architecture where all the MNs are required to cache a list of mesh node at client side, and exploit multiple Authentication Request frames to find the next mesh node within same mesh network. In this paper, we compare the theoretical handoff time required by NodeScan with other approaches and demonstrate the effectiveness of our system through experiment. The rest of this paper is organized as follows. In Section II, we describe the background (link-layer handoff procedure in IEEE 802.11 wireless networks) of the handoff and present a discovery latency analysis. Section III introduces the experimental testbed wireless interface driver. In section IV, we describe our experimental method to improve the efficiency of discovery. Section V presents the details of our implementation on Linux box and experimental results. Section VI concludes the paper and outlines our future work in this area. . II. BACKGROUND The Link-layer handoff refers to the change of the mesh node to which a station is connected in a WMN. In the case of IEEE 802.11a WLANs it implies an interruption of data frame transmission. The duration of this interruption is called handoff latency. For the purposes of this work we divide handoff into two phases: Scanning and Execution. The scanning phase is used to acquire information about the available APs in each channel. In the IEEE 802.11 standard, there are two methods used: passive scanning and active scanning. In passive scanning, a mobile client listens for beacon frames on one channel at a time.
  • 2. A Fast Handoff Scheme Of Ieee… 29 Beacon frames are normally broadcast by MN every 100ms. In active scanning, the mobile client broadcasts probe request frames and waits for probe response frames on each channel. The execution phase is the phase when the mobile client exchanges information and establishes a physical connection with the MN. It involves authentication and re-association. Authentication verifies the identity between client and MN. The standard defines two algorithms: open system authentication and shared key authentication. The time required for authentication takes one round trip time (RTT) for open system or twice RTT for shared key. Re-association follows after successful authentication where the client is assigned a proper association identity and required resources by new MN. The re-association delay takes one RTT. RTT is the time corresponding to the transmission time of a probe request frame and an ACK response frame between two nodes. Four timestamps are required to calculate RTT using equation (1): RTT= (T 21 T11) + (T 22 T12) (1) In this paper we assume as shown in Figure 1. (T11 is the timestamp of the probe request frame that is transmitted from Node A, T21 is the times that the request frame from Node A is received by Node B, T22 and T21 are similar to T11 and T21) RTT depends on a number of factors that includes the network load, interference and contention. Fig. 1: Round Trip Time. III. SYSTEM DESCRIPTION All experiments have been carried out using the CNRI wireless mesh testbed [13]. This testbed is a multi-purpose networking experimental platform which consists of 17 IEEE 802.11abg based mesh nodes, located around the Focus building in DIT. Each Mesh Node uses Soekris net 4521 boards as hardware platform and NETGEAR WAG511 wireless adapter cards. It runs under the Pebble Linux distribution as software platform and uses madwifi version 0.9.4 as the wireless network interface driver. Further information about the CNRI mesh testbed can be obtained from http://mesh.cnri.dit.ie. IV. EXPERIMENTAL SETUP NodeScan comprises two steps: First the mobile client is given a list of available mesh node information called a SmartList. Secondly, when handoff is required, the mobile client performs a unicast scan by transmitting Authentication Request frames to the each of the MNs on the list to discover the next MN for handoff to. SmartList is where the MN information stores and manages the MNs. The list is ordered where a MN’s position on the list depends on its Received Signal Strength Indications (RSSI) value. The MN with the highest RSSI value will be put at the top of the list in order to provide fast handoff to the best available MN in real-time. The MN information can be easily added to and stored onto mobile client when a mobile client joins a particular WMN for the first time. The MN’s RSSI is provided in real-time by listening to beacon frame from all Mesh Nodes. NodeScan does not generate any overhead during handoff and so does not produce any communication performance degradation, nor require modifications to the protocols. V. HANDOFF PROCEDURE In our system, the handoff procedure is performed with the following steps. When handoff is required the mobile client transmits an Authentication Request to each of the MNs on the SmartList. This is in accordance with the 802.11 standard which allows for authentication with multiple MNs. When the first Authentication Response frame is received, mobile client stops transmitting Authentication Request to the rest of the MNs on the SmartList and re-associates with the MN which sends the first Authentication Response.
  • 3. A Fast Handoff Scheme Of Ieee… 30 In the case where no Authentication Response is received after Authentication Requests have been transmitted to all MNs in the SmartList, the mobile client will perform active scanning to try to discover any available wireless networks. The NodeScan algorithm is shown in Figure 2. In terms of the NodeScan algorithmic delay and assuming at least one MN is available, we have equation (2) where M is the number of Authentication Request frames transmitted. In the best case scenario the first MN from the SmartList is the next MN to re-associate with, so the delay is 2 * RTT. The worst case will be there is no available MN and the mobile client carries out an active scanning. VI. IMPLEMENTATION DETAILS We implemented the SmartList within the kernel driver (madwifi 0.9.4) [14]. The changes in madwifi driver are the minimum required to support NodeScan by using SmartList. All processes are carried out in kernel layer to provide stable and fast handoff in this prototype implementation. In the madwifi driver, a new structure is implemented to create single linked list as SmartList. A command line input method (ioctls) is also implemented to provide a flexible way to add Mesh Node information. We created a new information state to trigger SmartList to reorder the MN position to make the best MN on top of SmartList. The management frame retry and management frame backoff count are minimized to provide fast Authentication Request transmission. In the original madwifi driver, the same Authentication Request will be retransmitted 11 times if an Authentication Request does not get response from MN where it waits for 1 second before transmitting the next Authentication Request. They can cause significant delay so the management frame retry is set to zero and management frame backoff count is set to one millisecond when a fast handoff is triggered. VII. CONCLUSION We have developed a fast handoff scheme, called NodeScan to improve handoff within WMN, by using a novel usage of the open system authentication scan to reduce channel scanning latency. NodeScan maintains a list of MNs in SmartList, and performs unicast scanning by transmitting authentication request frame to discover available MN and perform handoff instead of broadcasting probe request frame. In this paper we have shown a significant reduction in handoff latency of our approach through implementation and experiments. Our future work will be concerned with implementing real-time list of MNs at the MN side, and the MN provides accurate mesh node list. REFERENCES [1] A. Mishra, et al.: "An Empirical Analysis of the IEEE 802.11 MAC Layer Handoff Process, " ACM SIGCOMM Computer Communication Review. [2] Diane Tang and Mary Baker, "Analysis of a Metropolitan- Area Wireless Network," ACM/Kluwer Wireless Networks. Special issue: Selected Papers from Mobicom'99, vol. 8, no. 2/3, pp. 107-120, 2002. [3] B. Chambers, “The grid roofnet: a rooftop ad hocwireless network," 2002. h [4] John C. Bicket, Daniel Aguayo, Sanjit Biswas, and Robert Morris, "Architecture and evaluation of an unplanned 802.11b mesh network.," in MOBICOM, 2005, pp. 31-42. [5] Locusworld," http://locustworld.com [6] Tropos networks," http://www.tropos.com [7] Extricom," http://www.extricom.com [8] Cisco," http://www.cisco.com/en/ [9] Arunesh Mishra, Minho Shin, and William Arbaugh, "An empirical analysis of the IEEE 802.11 MAC layer hando_ process," SIGCOMM Comput. Commun. Rev., vol. 33, no. 2, pp. 93-102, 2003. [10] Ishwar Ramani and Stefan Savage, "Syncscan: Practical Fast Hando_ for 802.11 Infrastructure Networks," in Proc. Of IEEE INFOCOM, march 2005.M. [11] V. Brik, et al.: "Eliminating handoff latencies in 802.11 WLANs using multiple radios: Applications, experience, and evaluation, ACM/USENIX IMC 2005, USA, October 2005. [12] M. Jeong, et al.: "Fast active scan for measurement and handoff, "Technical report, DoCoMo USA Labs, May 2003. [13] CNRI Wireless Mesh Testbed. Available at http://www.cnri.dit.ie/research.mesh.testbed.html [14] MadWifi - a Linux kernel device driver for Wireless LAN