skip to main content
10.1145/1614320.1614353acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
research-article

CENTAUR: realizing the full potential of centralized wlans through a hybrid data path

Published:20 September 2009Publication History

ABSTRACT

Enterprise WLANs have made a dramatic shift towards centralized architectures in the recent past. The reasons for such a change have been ease of management and better design of various control and security functions. The data path of WLANs, however, continues to use the distributed, random-access model, as defined by the popular DCF mechanism of the 802.11 standard. While theoretical results indicate that a centrally scheduled data path can achieve higher efficiency than its distributed counterpart, the likely complexity of such a solution has inhibited practical consideration. In this paper, we take a fresh, implementation and deployment oriented, view in understanding data path choices in enterprise WLANs. We perform extensive measurements to characterize the impact of various design choices, like scheduling granularity on the performance of a centralized scheduler, and identify regions where such a centralized scheduler can provide the best gains.

Our detailed evaluation with scheduling prototypes deployed on two different wireless testbeds indicates that DCF is quite robust in many scenarios, but centralization can play a unique role in 1) mitigating hidden terminals - scenarios which may occur infrequently, but become pain points when they do and 2) exploiting exposed terminals - scenarios which occur more frequently, and limit the potential of successful concurrent transmissions. Motivated by these results, we design and implement CENTAUR - a hybrid data path for enterprise WLANs, that combines the simplicity and ease of DCF with a limited amount of centralized scheduling from a unique vantage point. Our mechanisms do not require client cooperation and can support legacy 802.11 clients.

References

  1. Cisco Wireless Control System. http://www.cisco.com/en/US/products/ps6305/.Google ScholarGoogle Scholar
  2. Intel pro/wireless network connection for mobile. http://www.intel.com/network/connectivity/products.Google ScholarGoogle Scholar
  3. N. Ahmed, U. Ismail, S. Keshav, and K. Papagiannaki. Online estimation of rf interference. In ACM CoNext, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. N. Ahmed, U. Ismail, K. Papagiannaki, and S. Keshav. Measuring multi-parameter conflict graphs for 802.11 networks. Mobile Computing and Communications Review 2009.Google ScholarGoogle Scholar
  5. M. Andrews. A survey of scheduling theory in wireless data networks. In IMA summer workshop on wireless comm., 2005.Google ScholarGoogle Scholar
  6. A. Balasubramanian, R. Mahajan, A. Venkataramani, B. N. Levine, and J. Zahorjan. Interactive wifi connectivity for moving vehicles. SIGCOMM 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Y. Bejerano and R. Bhatia. MiFi: a framework for fairness and QoS assurance in current IEEE 802.11 networks with multiple access points. In IEEE INFOCOM, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  8. V. Bhargavan, A. Demers, S. Shenker, and L. Zhang. MACAW: A Media Access Protocol for Wirelesss LANs. In SIGCOMM, 94. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Y. chung Cheng, J. Bellardo, P. Benkau, A. C. Snoeren, G. M. Voelker, and S. Savage. Jigsaw: Solving the puzzle of enterprise 802.11 analysis. In ACM SIGCOMM, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. J. Eriksson, S. Agarwal, P. Bahl, and J. Padhye. Feasibility study of mesh networks for all-wireless offices. In MobiSys, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. E. P. Evaluation, S. Choi, J. Prado, S. Shankar, and N. S. Mangold. Ieee 802.11e contention-based channel access. pages 1151--1156, 2003.Google ScholarGoogle Scholar
  12. S. Gollakota and D. Katabi. Zigzag decoding: Combating hidden terminals in wireless networks. In ACM SIGCOMM, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. D. Halperin, T. Anderson, and D. Wetherall. Taking the sting out of carrier sense: interference cancellation for wireless lans. In ACM MobiCom, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. V. Kanodia, C. Li, A. Sabharwal, B. Sadeghi, and E. Knightly. Distributed multi-hop scheduling and medium access with delay and throughput constraints. In ACM Mobicom, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. P. Karn. Maca - a new channel access method for packet radio. In ARRL/CRRL Amateur Radio Computer Networking Conf., 1990.Google ScholarGoogle Scholar
  16. S. Katti, S. Gollakota, and D. Katabi. Embracing wireless interference: Analog network coding. In ACM SIGCOMM, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. J. Kim, S. Kim, S. Choi, and D. Qiao. Cara: Collision-aware rate adaptation for ieee 802.11 wlans. INFOCOM 2006.Google ScholarGoogle ScholarCross RefCross Ref
  18. R. R. Kompella, S. Ramabhadran, I. Ramani, and A. C. Snoeren. Cooperative packet scheduling via pipelining in 802.11 wireless networks. In in Proceedings of ACM SIGCOMM E-WIND, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. R. Murty, J. Padhye, R. Chandra, A. Wolman, and B. Zill. Designing high performance enterprise wi-fi networks. In NSDI, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. R. Murty, J. Padhye, A. Wolman, and M. Welsh. An Architecture for Extensible Wireless LANs. In ACM Hotnets, 2008.Google ScholarGoogle Scholar
  21. T. Nandagopal, T.-E. Kim, X. Gao, and V. Bharghavan. Achieving mac layer fairness in wireless packet networks. In MobiCom'00. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. M. Rodrig, C. Reis, R. Mahajan, D. Wetherall, J. Zahorjan, and E. Lazowska. CRAWDAD data set uw/sigcomm2004.Google ScholarGoogle Scholar
  23. P. Thornycroft. Designed for speed: Network infrastructure in an 802.11n world. In Aruba Networks white paper, 2007.Google ScholarGoogle Scholar
  24. F. Tobagi and L. Kleinrock. Packet switching in radio channels : Part ii - the hidden terminal problem in carrier sense multiple access and the busy tone solution. IEEE Transactions on Communications, (12), Dec. 1975.Google ScholarGoogle Scholar
  25. N. Vaidya, P. Bahl, and S. Gupta. Distributed fair scheduling in a wireless lan. In ACM MobiCom, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. M. Vutukuru, K. Jamieson, and H. Balakrishnan. Harnessing Exposed Terminals in Wireless Networks. In NSDI, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. White-paper from Aruba Networks. Advanced RF management for wireless grids. http://www.arubanetworks.com/pdf/rf-for-grids.pdf.Google ScholarGoogle Scholar
  28. White-paper from Meru Networks. Microcell deployments: Making a bad problem worse for pervasive wireless LAN deployments. http://www.merunetworks.com/pdf/whitepapers/.Google ScholarGoogle Scholar
  29. White-paper from Meru Networks. Virtual cells: The only scalable multi-channel deployment. http://www.merunetworks.com/pdf/whitepapers/.Google ScholarGoogle Scholar
  30. S. H. Y. Wong, H. Yang, S. Lu, and V. Bharghavan. Robust rate adaptation for 802.11 wireless networks. In MobiCom '06. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. CENTAUR: realizing the full potential of centralized wlans through a hybrid data path

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        MobiCom '09: Proceedings of the 15th annual international conference on Mobile computing and networking
        September 2009
        368 pages
        ISBN:9781605587028
        DOI:10.1145/1614320

        Copyright © 2009 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 20 September 2009

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate440of2,972submissions,15%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader