skip to main content
10.1145/1160987.1161002acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
Article

An empirical analysis of heterogeneity in IEEE 802.11 MAC protocol implementations and its implications

Published:29 September 2006Publication History

ABSTRACT

Wireless LAN (WLAN) market consists of IEEE 802.11 MAC standard conformant devices (e.g., access points (APs), client adapters) from multiple vendors. Certain third party certifications such as those specified by the Wi-Fi alliance have been widely used by vendors to ensure basic conformance to the 802.11 standard, thus leading to the expectation that the available devices exhibit identical MAC level behavior. In this paper, however, we present what we believe to be the first ever set of experimental results that highlight the fact that WLAN devices from different vendors in the market can have heterogeneous MAC level behavior. Specifically, we demonstrate with examples and data that in certain cases, devices may not be conformant with the 802.11 standard while in other cases, they may differ in significant details that are not a part of mandatory specifications of the standard. We argue that heterogeneous MAC implementations can adversely impact WLAN operations leading to unfair bandwidth allocation, potential break-down of related MAC functionality and difficulties in provisioning the capacity of a WLAN. However, on the positive side, MAC level heterogeneity can be useful in applications such as vendor/model level device fingerprinting.

References

  1. Cisco Systems Inc., www.cisco.com.Google ScholarGoogle Scholar
  2. D-link Systems Inc., www.dlink.com.Google ScholarGoogle Scholar
  3. Intel Corporation, www.intel.com.Google ScholarGoogle Scholar
  4. Netgear Inc., www.netgear.com.Google ScholarGoogle Scholar
  5. 3Com Inc., www.3com.com.Google ScholarGoogle Scholar
  6. Proxim Inc., www.proxim.com.Google ScholarGoogle Scholar
  7. IEEE 802.11 Standard, Wireless LAN Medium Access Control (MAC) and Physical layer (PHY) Specifications, 1999.Google ScholarGoogle Scholar
  8. Wi-Fi Alliance, www.wifialliance.comGoogle ScholarGoogle Scholar
  9. Wi-Fi CERTIFIED®: The Safe Buy, October 5 2004, http://www.wi-fi.org/white_papers/whitepaper-100504-wifisafebuy/.Google ScholarGoogle Scholar
  10. Hagen Woesner et al., Modified backoff algorithms for DFWMAC's distributed coordination function, Proc. of 2nd ITG Fachtagung Mobile Kommunikation '95, Neu-Ulm, Germany, September 1995.Google ScholarGoogle Scholar
  11. Byung-Jae Kwak et al., "Performance Analysis of Exponential Backoff", IEEE/ACM Transactions on Networking, Vol 13, Issue 2, April 2005 Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Prism Wireless LAN, http://www.intersil.com/globespanvirata/.Google ScholarGoogle Scholar
  13. G. Bianchi, "Performance Analysis of the IEEE 802.11 Distributed Coordination Function", IEEE Journal on Selected Areas in Communications, Vol 18, No. 3, March 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. F. Cali, M. Conti, E. Gregori, "IEEE 802.11 Wireless LAN: Capacity analysis and protocol enhancement", In Proc. of Infocom' 98, San Francisco, USA, 1998.Google ScholarGoogle Scholar
  15. Ping Chung Ng et al., "Experimental Study of Hidde-Node Problem in IEEE802.11 Wireless Networks", Poster Presentation, SIGCOMM 2005, PA, USAGoogle ScholarGoogle Scholar
  16. Joshua Wright, "Detecting Wireless LAN MAC Address Spoofing", http://www.polarcove.com/whitepapers/detectwireless.pdf.Google ScholarGoogle Scholar
  17. IEEE 802.11e Standard, Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications: Amendment 8: Medium Access Control (MAC) Quality of Service Enhancements, 2005, http://grouper.ieee.org/groups/802/11/.Google ScholarGoogle Scholar

Index Terms

  1. An empirical analysis of heterogeneity in IEEE 802.11 MAC protocol implementations and its implications

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        WiNTECH '06: Proceedings of the 1st international workshop on Wireless network testbeds, experimental evaluation & characterization
        September 2006
        134 pages
        ISBN:1595935398
        DOI:10.1145/1160987

        Copyright © 2006 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 29 September 2006

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • Article

        Acceptance Rates

        Overall Acceptance Rate63of100submissions,63%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader