Are All Bits Equal? – Experimental Study of IEEE 802.11 Communication Bit Errors

نویسندگان

  • Bo Han
  • Lusheng Ji
  • Seungjoon Lee
  • Bobby Bhattacharjee
  • Robert R. Miller
چکیده

In IEEE 802.11 Wireless LAN (WLAN) systems, techniques such as acknowledgement, retransmission and transmission rate adaptation are frame-level mechanisms designed for combating transmission errors. Recently practical sub-frame level schemes, such as frame combining and partial packet recovery, have been proposed by the research community. In this paper, we present experimental results obtained from our bit error study for identifying sub-frame error patterns, because we believe that identifiable bit error patterns can potentially introduce new opportunities in channel coding, network coding, forward error correction (FEC) and frame combining mechanisms. We have constructed a number of IEEE 802.11 WLAN testbeds and conducted extensive experiments to study the characteristics of bit errors and their location distribution. Our measurement results identify three bit error patterns: the slope-line, saw-line and finger patterns. Conventional wisdom dictates that bit error probability is the result of channel conditions and ought to follow corresponding distribution. However, our experimental results show that the slope-line and finger patterns are not induced by channel conditions. Among these three patterns, we have verified that the slope-line and saw-line patterns are present in WLAN transmissions in different physical environments and across different WLAN hardware platforms. We also discuss our current hypotheses for the reasons behind these bit error probability patterns and how identifying these patterns may help improve the robustness of WLAN transmission.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Using Random Bit Authentication to Defend IEEE 802.11 DoS Attacks

IEEE 802.11 networks are insecure. Wired Equivalent Privacy (WEP), the security mechanism used in 802.11, was proved to be vulnerable. IEEE 802.11i, the security enhancement, concentrates only on integrity and confidentiality of transmitted frames. Either version did not properly handle the network availability. Because management frames are not authenticated, {802.11, 802.11i} networks are sus...

متن کامل

Allowing bit errors in speech over wireless LANs

Wireless LANs are becoming commonplace because of their ease in providing mobile communication. As use of IEEE 802.11 continues to expand, support for voice will Preprint submitted to Elsevier Science 2 December 2004 become a desirable feature. Supporting voice conversations over a packet network is more challenging than over current circuit switched wired networks. These challenges are particu...

متن کامل

802.11 MAC Protocol with Selective Error Detection for Speech Transmission

The IEEE 802.11 standard currently does not offer support to exploit the unequal perceptual importance of multimedia bitstreams. All packets affected by channel errors, in fact, are simply discarded, irrespective of the position and percentage of corrupted bits. The objective of this paper is to investigate the effect of bit error tolerance in WLAN speech communications. More specifically, we i...

متن کامل

Performance assessment of Hamming Code

Hamming codes can detect up to two simultaneous bit errors, and correct single-bit errors; thus, reliable communication is possible when the Hamming distance between the transmitted and received bit patterns is less than or equal to one. By contrast, the simple parity code cannot correct errors, and can only detect an odd number of errors. We will analyze hamming code with simulations (using Ha...

متن کامل

Selected CRC Polynomials Can Correct Errors and Thus Reduce Retransmission

For wireless sensor networks, minimizing communication is crucial to improve energy consumption and thus lifetime. Whereas the standard way to deal with transmission errors is retransmission (automatic repeat request ARQ), in this paper we investigate an alternative: correcting bit errors using Cyclic Redundancy Checks CRCs (which are already used for error detection). Selected CRC polynomials ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011