Caso de Éxito
Transcription
Caso de Éxito
Caso de Éxito Organización en la que se ha implantado el proyecto: Universidad Politécnica de Valencia TITULO: Diseño óptimo de la red inalámbrica y sistema automático de reubicación de usuarios para balancear la carga de la red Antecedentes/Problemática Desde el inicio de la creación de tecnología inalámbrica para su uso en el entorno local, tanto el sector empresarial como el académico han vislumbrado las grandes posibilidades que ésta podía ofrecer. Tras la publicación del estándar IEEE 802.11 en 1997 y la creación de la alianza Wi-fi en 1999 para promover, asesorar y certificar los productos de redes de área local inalámbricos de alta velocidad, muchas empresas e instituciones han optado por las redes inalámbricas de área local para permitir el acceso a su red de datos y a Internet. En la universidad Politécnica de Valencia, desde el inicio de su planificación, se ha perseguido el objetivo de proveer el 100% de cobertura en todos sus campus. Actualmente cuenta con 575 APs para ofrecer servicio a más de 41.000 personas entre alumnos, profesores, investigadores y personal de servicios. En la actualidad provee ampliamente servicios de Telefonía, Televisión y video bajo demanda y se están incorporando sistemas automáticos de reubicación de usuarios con el objetivo de balancear la carga de la red inalámbrica y permitir mayor aprovechamiento del ancho de banda disponible. Además son numerosas las aplicaciones que se pueden obtener a partir de los datos obtenidos de la propia red inalámbrica. Un gran ejemplo de ello es el estudio de la cantidad de desplazamientos entre los distintos edificios que existen dentro de toda la universidad. Objetivos El despliegue de una red inalámbrica grandes dimensiones con múltiples edificios tropieza con una serie de dificultades. Algunas se intuyen a priori y otras se descubren durante el estudio para su implantación. En cualquiera de los casos, para poder desarrollar con éxito un proyecto de tal envergadura es necesario contar con una estrategia de trabajo correcta. Estas estrategias que denominaremos “Directivas de Estudio”, se deben aplicar en cada uno de los edificios a estudiar y son las siguientes [1] [2]. • Estudio e inspección detallada del edificio, tanto visualmente mediante un recorrido del mismo, como con el estudio de los planos. • Realización de una serie de medidas iniciales para obtener la media de atenuación de señal por pared. • Realización de los cálculos para la obtención de la distancia de cobertura de un punto de acceso WLAN en función de las paredes que atraviesa [3]. • Establecer el número de puntos de acceso WLAN necesarios por planta y diseñar el mapa de coberturas teóricamente. • Situar los puntos de acceso en los lugares elegidos y comprobar que la cobertura se ajusta al diseño teórico calculado, verificando su viabilidad. • En caso que no se consiguiera la cobertura estimada recolocar los puntos de acceso o añadir más. • Hacer una planificación de canales adecuada para evitar interferencias, así como re-asignar canales adecuadamente para evitar interferencias. La Universidad Politécnica de Valencia tiene 3 campus principales, Campus de vera, Campus de Alcoy y Campus de Gandia. Sólo en el Campus de Vera se cuenta con 50 edificios repartidos en 2 kilómetros cuadrados. Tras el despliegue de red, se han añadido sistemas en la red que permiten aprovechar de manera eficaz dicha red Valores Añadidos: Sistema de estudio de la movilidad en el Campus Utilizando redes inalámbricas [7] Desarrollo de un sistema de balanceo por usuario para Telefonía IP en redes de área local inalámbricas [4] [5] Aprovechándonos de la tecnología inalámbrica, se pueden obtener muchos beneficios. Uno de ellos es el estudio de la movilidad de los usuarios en la red cuando existe prácticamente una cobertura total en todo el campus. En la Universidad Politécnica de Valencia, a través de la red inalámbrica diseñada en los 2 kilómetros cuadrados del campus principal (Campus de Vera) y en los campus de Alcoi y Gandia, hemos podido observar cuales son los sitios más visitados, detectar la mejor situación en caso de haber puntos críticos, si las personas se tienen que desplazar a lugares muy lejanos de sus despachos, etc. Este sistema nos ha permitido observar dónde se deberían localizar las impresoras de red, servidores, salones de reuniones, etc. e incluso añadir más puntos de acceso debido a la afluencia de usuarios a un lugar determinado. La movilidad de los usuarios también permite saber cual es su comportamiento en cuanto a los lugares más visitados o a múltiples desplazamientos entre edificios lejanos. Además, el sistema permite ver la movilidad de los profesores y alumnos entre los diferentes campus. Uno de los mayores beneficios que se obtienen es que se puede utilizar para relocalizar servicios y departamentos dentro del campus con el objetivo de evita demasiados desplazamientos. La telefonía IP en redes de área local Inalámbricas se está haciendo cada vez más popular debido a que permite un ahorro de coste considerable. A pesar de que las redes de área local inalámbricas de gran extensión, proveen alta disponibilidad y redundancia, carecen de suficiente ancho de banda cuando hay muchos dispositivos conectados. En nuestra red estamos implementando un sistema que reasigna la conexión del dispositivo de telefonía IP inalámbrico a otro punto de acceso cuando el sistema detecta que éste está sobresaturado. Hemos diseñado el algoritmo necesario para lleva a cabo este sistema y las medidas obtenidas del sistema muestran que se realiza de manera óptima, en muy poco tiempo y transparente para los usuarios sin haber consumo extra de ancho de banda en la red. Se puede leer más sobre este sistema desarrollado en la referencia [4]. Para el test y prueba de rendimiento del sistema en la red de inalámbrica de la Universidad Politécnica de Valencia se utilizó una centralita de código abierto Asterix y teléfonos duales Wifi (SmartPhones). Podemos decir que cada punto de acceso soporta, teóricamente, 144 teléfonos IP, utilizando la codificación de audio G.711 y por tanto, utilizando el sistema de reubicación, todos los estudiantes, profesores y personal de servicios de la Universidad de Valencia pueden disfrutar de dicho servicio. Dicho estudio se puede observar en [5]. IPTV en la red inalámbrica de Universidad Politécnica de Valencia [6] la Uno de los servicios multimedia ofertados en la red de la Universidad politécnica de Valencia es la televisión sobre IP. Este servicio funciona correctamente sobre la red cableada, pero suelen existir algunos problemas en la red inalámbrica, sobre todo cuando los usuarios transitan a lo largo del campus. Nosotros hemos propuesto una solución basada en servidor para minimizar la pérdida de paquetes y reducir la pérdida de servicio cuando existe roaming entre puntos de acceso en la red inalámbrica. Este sistema se basa en la modificación de los protocolos multicast para que los dispositivos elijan el mejor punto de acceso multicast. . Referencias [1] Jaime Lloret Mauri y Jose Javier López Monfort. Despliegue de Redes WLAN de Gran Extensión, el Caso de la Universidad Politécnica de Valencia. XVIII. La Coruña (España). 10-12 de Septiembre de 2003 [2] Jaime Lloret Mauri, Jose Javier López Monfort y Germán Ramos. Wireless LAN Deployment in Large Extension Areas: The Case of a University Campus. Communication Systems and Networks 2003. Benalmádena, Málaga (España). 8-10 de Septiembre de 2003 [3] Jaime Lloret, Jose J. López, Carlos Turró y Santiago Flores. A Fast Design Model for Indoor Radio Coverage in the 2.4 GHz Wireless LAN. 1st International Symposium on Wireless Communication Systems 2004 (ISWCS'04). Port Louis (Isla Mauricio). 20-22 de Septiembre de 2004. [4] Miguel Garcia, Diana Bri, Carlos Turró, Jaime Lloret. A User-Balanced System for IP Telephony in WLAN. The Second International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies (UBICOMM 2008). Valencia (España). 29 septiembre - 4 octubre de 2008. [5] Miguel Edo, Miguel Garcia, Carlos Turro and Jaime Lloret. IP Telephony development and performance over IEEE 802.11g WLAN. The Fifth International Conference on Networking and Services (ICNS 2009). Valencia (España). 20-25 de Abril 2009. [6] Alejandro Canovas, Fernando Boronat, Carlos Turro and Jaime Lloret. Multicast TV over WLAN in a University Campus Network. The Fifth International Conference on Networking and Services (ICNS 2009). Valencia (España). 20-25 de Abril 2009. [7] Miguel Garcia, Sandra Sendra, Carlos Turro, Jaime Lloret. People Mobility Study in a University Campus using WLANs. The third International Conference on Mobile Ubiquitous Computing, Systems, Services and technologies (UBICOMM 2009). Sliema (Malta). 11-16 de Octubre de 2009. DESPLIEGUE DE REDES WLAN DE GRAN EXTENSION: EL CASO DE LA UNIVERSIDAD POLITECNICA DE VALENCIA Jaime Lloret Mauri Departamento de Comunicaciones Universidad Politécnica de Valencia e-mail : jlloret@dcom.upv.es Abstract- This article deals with the issues related with the deployment of wireless LAN (WLAN) of great extension. Specifically, the studies and works developed towards the set-up of the campus WLAN of the Universidad Politécnica de Valencia are presented. The paper includes the solutions taken for solving difficulties and provides a structured method consisting on different phases which has been applied as a working strategy in this work and would be useful in future WLAN deployments. Colour maps with the radio coverage of different buildings are presented. Also wall absorption indoor and interference between channels are discussed. The minimization in the quantity of WLAN Access Points has been an important premise in this work, in order to minimize budget and interferences. Now, the university network is on the installation phase according to the guidelines o this work I. INTRODUCCIÓN Desde su aparición en el mercado las redes locales inalámbricas (WLAN) basadas en el estándar 802.11b, [1] [2], han experimentado un crecimiento de mercado espectacular, tanto por las prestaciones que ofrecen como por el bajo coste que tienen hoy en día los equipos de transmisión. La instalación de una de estas redes en un pequeño entorno doméstico o de oficina no supone una gran complicación técnica, más allá de enchufar los equipos e instalar el software necesario en los ordenadores a enlazar. Sin embargo, cuando los requisitos exigidos a estas redes aumentan, por ejemplo cubrir una distancia mayor o bien proporcionar cobertura más allá de una vivienda o planta de un edificio, el usuario se encuentra con ciertas limitaciones técnicas que requieren un estudio detallado de la instalación y que se escapan del sencillo concepto del ‘plug-and-play’ al que está acostumbrado dicho consumidor de equipos informáticos y de multimedia. Sin embargo la complicación todavía pueda aumentar más, cuando lo que se quiere es cubrir un área muy extensa que incluye varios edificios así como espacios abiertos. Uno de estos casos, es la cobertura completa de un campus universitario. Sin duda es un caso muy interesante, dado el interés que puede despertar a los habitantes de una Universidad la posibilidad de conseguir cobertura de red en José Javier López Monfort Departamento de Comunicaciones Universidad Politécnica de Valencia e-mail : jjlopez@dcom.upv.es cualquier lugar del campus, para conectar su ordenador portátil o incluso su ordenador de mano. Internacionalmente estas redes inalámbricas estan muy desarrolladas, existiendo proyectos muy interesantes, fomentados a veces por ayuntamientos que quieren dotar de cobertura a sus vecinos, como por comunidades de usuarios que deciden establecer su propia red particular [3]. Existen numerosas posibilidades en el uso de esta tecnología [4] que no requiere licencia para operar. Por todo ello resulta indispensable que las universidades y en concreto la Universidad Politécnica de Valencia, cuenten con ésta tecnología de futuro. II. ESTRATEGIAS DE TRABAJO El despliegue de una red de las dimensiones que se pretende tropieza con una serie de dificultades. Algunas se intuyen a priori y otras se descubren durante el estudio para su implantación. En cualquiera de los casos, para poder desarrollar con éxito un proyecto de tal envergadura es necesario contar con una estrategia de trabajo correcta. Estas estrategias que denominaremos “Directivas de Estudio”, se aplicarán en cada uno de los edificios a estudiar y son las siguientes. • Estudio e inspección detallada del edificio, tanto visualmente mediante un recorrido del mismo, como con el estudio de los planos. • Realización de una serie de medidas iniciales para obtener la media de atenuación de señal por pared (se detalla en el punto III). • Realización de los cálculos para la obtención de la distancia de cobertura de un punto de acceso WLAN en función de las paredes que atraviesa. • Establecer el número de puntos de acceso WLAN necesarios por planta y diseñar el mapa de coberturas teóricamente. • Situar los puntos de acceso en los lugares elegidos y comprobar que la cobertura se ajusta al diseño teórico calculado, verificando su viabilidad. • En caso que no se consiguiera la cobertura estimada recolocar los puntos de acceso o añadir más. III. PÉRDIDAS DE PROPAGACIÓN EN LAS PAREDES Un efecto propio de los edificios que no ocurre en exteriores, son las pérdidas de propagación por causa de las paredes. Este efecto, junto con el multicamino, resultan muy difíciles de evaluar y existen muchos trabajos publicados sobre modelos matemáticos de propagación en interiores. Sin embargo a efectos prácticos de diseño, podemos recurrir a sencillos modelos estadísticos de absorción de las paredes, para intentar predecir cuantas paredes puede llegar a atravesar la señal WLAN sin perder la conectividad. Existe otro aspecto ha tener en cuenta y que hemos comprobado a lo largo de toda la campaña de medidas en el campus. Consiste en el distinto comportamiento que presentan las paredes de edificios diferentes. Esto es debido a los diferentes materiales y/o técnicas constructivas que se emplean en cada edificio. Es por ello, que en cada uno de los edificios hay que estimar la atenuación de las paredes. La técnica que se ha empleado consiste en localizar en el edificio, a ser posible, una zona de paredes consecutivas (generalmente un pasillo de despachos contiguos), fig. 2. Una vez localizado se miden las atenuaciones de las paredes situando trasmisor y receptor a un metro de la pared y a cada uno de los lados. Se miden dichas atenuaciones y posteriormente se calcula una media, que será la que no servirá para atenuación del resto de paredes del edificio. La tabla siguiente muestra un ejemplo de los resultados obtenidos es uno de los edificios. Fig. 1. Paredes consecutivas utilizadas en las medidas de la atenuación media de las paredes de un edificio. Pared Pérdidas [dB] 0-1 7.98 2-3 6.04 4-5 7.16 6-7 2.34 8-9 0.03 10-11 2.36 12-13 4.62 Media 4.36 Con ayuda de la información obtenida y aplicando la ecuación de propagación, es posible calcular una tabla que proporcionará información sobre la distancia que se puede alcanzar en función del número de paredes que se atraviesan. 1 pared 2 paredes 3 paredes 4 paredes 5 paredes Distancia (m) 85 60 49 42 38 Hay que señalar que durante las medidas se comprobó que en los baños y sanitarios, la señal perdía mucha potencia, habiendo casos en los que se llegó a perder hasta incluso 20 dB. De acuerdo estas medidas, se concluye que esto es debido a la absorción de las cañerías que atraviesan las paredes en estos lugares. Por tanto, durante la realización del diseño se deberá tener en cuenta que si estamos en una zona alejada del punto de acceso que se supone debe dar cobertura en un lugar, y justo antes tenemos unos sanitarios, ascensores o escaleras, la experiencia nos indica que en estos casos la señal recibida va sea de menor potencia que si fuera una habitación normal. La propagación de la señal entre plantas contiguas de un edificio es muy baja, debido al forjado metálico que las separa que actúa a modo de pantalla. Aunque si nos encontramos justo encima del PA de la planta inferior o viceversa se consigue recibir algo, la señal se atenúa rápidamente en cuanto nos alejamos. Sólo se consigue un buen paso de señal entre plantas si el edificio dispone de patios interiores acristalados (deslunados, tragaluces) y el PA se sitúa allí. Esta opción se ha ensayado con éxito en edificios que reunían dichas condiciones ahorrando PAs, pero no es posible aplicarla en la mayoría. Por otro lado, el residuo de propagación entre plantas puede dar lugar a interferencias entre canales en algunos puntos, por lo que tendremos que diseñar un plan de frecuencias adecuado, como se explica en el punto siguiente. IV. INTERFERENCIAS ENTRE CANALES El estándar 802.11b dispone de 13 canales dentro de la banda ISM que se corresponden con 13 frecuencias de la portadora para los países que adoptan la directiva de la ETSI Sin embargo el ancho de espectro utilizado por cada canal se solapa con los canales adyacentes causando interferencias. Las interferencias son mayores cuanto más cerca estén los canales. La siguiente tabla muestra el nivel de dichas interferencias, clasificado en tres niveles. Adyacentes Canal 1 2 3 4 5 6 7 8 9 10 11 12 13 1 2 3 4 5 6 7 8 9 10 11 12 13 Canales que causan interferencias Canales con riesgo a interferencias Canales con poca o ninguna interferencia Atendiendo a la tabla anterior, si tenemos que seleccionar el máximo número de canales simultáneos sin ninguna interferencia, usaremos los canales: 1 – 5 – 9 – 13. Sin embargo si toleramos una ligera interferencia que en la práctica no degrada el sistema usaremos: 1 – 4 – 7 – 10 – 13. Por tanto esta segunda opción es mucho más eficiente ya que proporciona un canal más, totalizando 5. Para poder reutilizar estos canales, tendremos que alejarnos lo suficiente para que la interferencia sea nula, tanto desde un punto de vista horizontal como vertical. La figura 2 muestra como distribuir 4 canales en un área horizontal repitiendo canales para minimizar las interferencias. Cada color representa uno de los 4 canales sin interferencias entre sí. En la figura 3 se realiza lo propio, pero teniendo en cuenta las plantas de un edificio. Tras estos estudios previos y con los parámetros de propagación, se evalúa si con un sólo punto de acceso estratégicamente colocado se puede cubrir una planta del edificio. Si resulta inviable se estudia con dos puntos de acceso. En ningún caso se han necesitado tres. Posteriormente al estudio teórico se comprueba in-situ la cobertura calculada teóricamente con un PA de pruebas. Cabe la posibilidad de que la señal no llegue tan lejos cómo se esperaba, o que por lo contrario, ésta sea capaz de llegar a puntos que en un principio y teóricamente no parecían factibles. Esto se debe fundamentalmente al efecto del multicamino, muy difícil de evaluar teóricamente. Si la disparidad es muy grande, se puede plantear en función de estas medidas, añadir un PA más en caso de falta de cobertura o bien eliminar un PA en caso de sobrar. Al finalizar el estudio de cada edificio se presentan dos cifras de PA necesarios: una para asegurar una cobertura del 100% en toda el área y otra que viene dada por el intento de economizar puntos de acceso, que asegurando una cobertura del 95% reduce el número de PA necesarios en torno al 10%. En la figura 4 a) y b) se muestran las medidas finales de cobertura para dos edificios del campus cubiertos por un PA y dos PA respectivamente. Se puede apreciar que se ha sacrificado la cobertura en algunas zonas extremas con el fin de no incrementar el número de PA. Fig. 2. Distribución óptima de 4 canales en un área horizontal. planta 4 Respecto a los exteriores, también se han realizado estudios de cobertura. En estos casos los cálculos son más sencillos puesto que no se presentan obstáculos. En la figura 4 c) se muestra la cobertura del paseo central de la Universidad. En estos casos se sustituye el monopolo integrado del los PA por una antena exterior de mayor ganancia. En este caso se ha solucionado empleando dos antenas de cobertura sectorial VI. CONCLUSIONES planta 1 Fig. 3. Distribución óptima de 4 canales en un edificio. V. RESULTADOS DE LAS MEDIDAS DE COBERTURA Siguiendo las directivas de estudio mencionadas en el punto II, se han estudiado la totalidad de los edificios del campus de Valencia de la Universidad Politécnica de Valencia. En total son más de 50 edificios de múltiples plantas que se extienden sobre un campus de unos 2 kilómetros cuadrados. Como se describe en el punto II, la primera parte del trabajo ha sido el estudio de los planos de los edificios y una inspección de los mismos. Tras ello se han efectuado unas pruebas de atenuación de paredes. Ha resultado sorprendente durante el estudio comprobar la gran variabilidad que presenta la atenuación de paredes entre edificios. El hecho de que el campus de la UPV se haya ido construyendo a lo largo de mucho tiempo y el que los materiales y las técnicas constructivas hayan evolucionado a lo largo de este periodo contribuye decisivamente a ello. Mediante este trabajo se ha realizado un estudio exhaustivo y completo de la cobertura de un campus Universitario. Como resultado del mismo se obtienen los lugares óptimos para el emplazamiento de los PA wireless y mapas de cobertura de todos los edificios del campus, así como de exteriores. Finalmente, se ha desarrollado un método de trabajo que ha resultado satisfactorio y que podrá contribuir positivamente en otros estudios similares en el fututo. Actualmente se está en proceso de instalación de la red en el campus de la UPV en base a este trabajo. AGRADECIMIENTOS Los autores quieren agradecer al Centro de Proceso de Datos de la U.P.V. y en especial a Carlos Turró, por la colaboración mantenida en este proyecto. REFERENCIAS [1] M.S. Gast, "802.11 wireless networks : the definitive guide", Ed. O'Reilly, Sebastopol, 2002 [2] B. O'Hara, "The IEEE 802.11 handbook : a designer's companion", IEEE Press, New York, 1999 [3] http://www.wirelessanarchy.com/ [4] http://www.gaips.upv.es/ a) Primera planta del edificio de la Biblioteca b) Primera planta del edificio de la Escuela de Telecomunicaciones c) Cobertura de exteriores. Paseo y Ágora. –30 > S > -50 dBm –50 >S > -70 dBm –70 >S > -80 dBm Fig. 4. Resultados de cobertura en diferentes edificios del campus S < -80dBm WIRELESS LAN DEPLOYMENT IN LARGE EXTENSION AREAS: THE CASE OF A UNIVERSITY CAMPUS Jaime Lloret, Jose J. Lopez, Germán Ramos Department of Communications & Department of Electronics Polytechnic University of Valencia Ctra Nazaret-Oliva s/n, 46730 GRAO DE GANDIA Spain Abstract This article deals with the issues related to the deployment of wireless LAN (WLAN) of large extension. Specifically, the studies and works developed towards the set-up of the campus WLAN of the Polytechnic University of Valencia are presented. The paper includes the solutions used to solve difficulties and provides a structured method consisting of different phases which have been applied as a working strategy in this work and would be useful in future WLAN deployments. Color maps with radio coverage of different buildings are presented. In addition, indoor wall absorption and interference between channels are discussed. The minimization in the quantity of WLAN Access Points has been an important premise in this work, in order to minimize budget and interferences. Now, the university network is in the installation phase, according to the guidelines of this work. Key Words WLAN, wall loss, radio coverage, 802.11 1. Introduction Since the market appearance of the wireless local area networks (WLAN) based on the 802.11b standard, [1] [2], a spectacular market growth has been experienced, due to the features they offer and the low costs of the transmission equipment of today. The installation of one of these networks in a little house or office environment is very easy, and is not technically complex. Nevertheless, when the requirements demanded from this network increase, for example, to cover a greater distance or more than one house or floor of a building, the user has to face several technical limitations that require a more in depth study of the installation. However, this complication could increase when to cover a vast area with several buildings and open areas inside is needed. One example of this situation is a university campus where is very interesting to the students. It brings them the possibility of having a network connection wherever they are, and use their laptops or handheldcomputers furnished with wireless cards. Internationally, these wireless networks are widely developed with interesting projects, sometimes promoted by the city councils that want to offer coverage to its neighbors, or by groups of users that want to establish their own particular network [3]. There are many possibilities for using this technology and a license is not necessary to work with it. 2. Working strategies The deployment of a network of this dimension is faced with several problems. Some of them are easy to find a priori for, but others appear during the specific implantation study. To develop a big project like this successfully, it is always necessary to use a correct work strategy from the very beginning. These strategies we will call “Study Directives”, and will be applied to each building of the network. These directives are: • A visual study and inspection of the building through walking around them, and using the plans. • The carrying out of an initial set of measures to obtain the mean attenuation of the signal across the walls (this topic is developed at point 3). • The carrying out of calculations to obtain the coverage distance of a WLAN access point as a function of the walls that it needs to cross (point 3). • Establish the WLAN access point numbers needed by the floor, and design the theoretical coverage maps. • Locate the access points of the selected ones and check that the coverage adjusts to the theoretical design to validate its viability. • If the estimated coverage is not obtained, replace the access points or add some new ones. 3. Propagation losses in the walls The three main mechanisms of radio propagation are attributed to reflection, diffraction, and dispersion. These three effects cause distortions in the radio signal that suffers attenuation due to losses in its propagation [4]. Common effects on the buildings that do not appear in free field are losses through the walls, roofs, and floors. This effect, together with the multipath and diffraction caused by the corners, is very difficult to evaluate, and there are many publications about mathematical models of indoor radio propagation [5][6][7]. The propagation losses value is given in the next equation, where the effect of the losses due to multipath effect is added [8] [9]: Gtx and Grx = Antenna gains (at the transmitting and receiving sides). 20log(4π/λ) propagation loss at 1 meter in free field. Lms = Multipath loss. According to the equipment used (AP power rated at 16 dBm, and both antennas at 2 dBi), the power received at 1 meter from the AP is: Prx1m = -40 dBm (3) The method employed for estimating wall absorption consists of locating an area of consecutive walls (usually a corridor of office rooms) in the building. L(dB) = Lo + 10n log(d) + kF + IW + Lms Lo = power losses (dB) at a distance of 1m (40 dB at 2.4 GHz frequency) n = attenuation variation index with the distance (n=2) d = distance between transmitter and receiver k = number of plants that the signal crosses F = losses through the floors I = number of walls that the signal crosses W = wall losses Lms = multipath effect losses Nevertheless, from a practical design point of view, we will use simple statistical models of the wall’s absorption in order to predict how many walls the WLAN signal will be able to cross whilst maintaining connectivity. The reception power (applied to a wireless network of these characteristics) is given by the following equation when the propagation of the signal crosses i: Pr = Ptxap + Gtx + Grx – 20log d – 20 log (4π/λ) – Σ Lpi – Lms (1) Pr = Received power Ptxap = Transmitted power by the access point Gtx = Transmitter gain Grx = Receiver gain d = Distance between transmitter and receiver 20 log (4π/λ) = 40 dB for 2.4 GHz ΣLpi = Propagation losses due to the walls Lms = Propagation losses due to multipath effect The value of Lms has been estimated by means of field measures, obtaining a value of between 12 dB and 20 dB. In order to assure coverage, the worse case scenario corresponding to 20 dB was taken in this work. Next, the received power at a distance of 1 meter from the wireless access point is calculated: Prx1m = Ptxap+Gtx+Grx-20log(4π/λ) –Lms Ptxap = Transmitted power by the access point (2) Fig. 1. Consecutive walls used in the measurements for obtaining the mean loss through the walls of a building. According to figure 1, the transmitter is located at a fixed position ‘0’, 1 meter apart from the wall and a series of measures are taken at points 1-3-5-…-13 using a wireless card connected to a laptop, and signal monitoring software. Using equation (1), (2) and (3), it is deduced: Pr=Prx1m -20log(d) – ΣPi. So it is possible to calculate the loss through the first wall. L0-1 = -40 – 20 log (d) – Pr1 Pr1 is the received power at point ‘1’ and d=2 in this case. In order to compute the loss at the second wall: L2-3 = -40 – 20 log (d) – Pr3 – L0-1 Where Pr2 is the received power at point ‘3’ and d=4.5 in this case (wall separation is 2.5 meters for all rooms). After measuring the losses through each wall, a mean value is computed. This mean value will be employed as a value of reference for all the walls of this building. The next table shows the values of attenuation obtained from a specific building. As can be seen, not all of the walls produce the same attenuation in spite of the fact that they are made from the same materials. This variation is produced by the multipath effect (which is unknown). Obtaining a mean value the error caused by multipath effect is reduced. Wall 0-1 2-3 4-5 6-7 8-9 10-11 12-13 Mean Loss [dB] 7.98 6.04 7.16 2.34 0.03 2.36 4.62 4.36 Next, we are ready to estimate the number of walls the wireless signal can cross without loss of connection. Below is the deduced expression for threshold power: Pu = Treshold power Lp = Loss per wall n = number of walls crossed The following expression can be used to obtain the number of walls that the signal can cross within a specific threshold power: Prx1m − 20 log d − Pu Lp And this other expression provides the maximum distance as a function of the number of crossed walls: d = 10 Prx1 m − n · L p − Pu 20 Applying last equation, a table that shows the maximum distance allowed as a function of number of walls crossed by the signal is shown below. The power threshold is fixed at -80 dBm, which is the typical sensitivity value for the majority of commercial wireless LAN cards (at a transmission speed of 11 Mbps). 1 wall 2 walls 3 walls 4 walls 5 walls Distance (m) 85 60 1 7 2 5.25 3 6.5 4 6 5 8.20 Afterwards, a check on resemblances between the models and the real measures taken in the buildings was carried out. The validity of these models was confirmed. The next table shows the results obtained in various buildings: Pu =Prx1m – 20 log (d) – n.Lp n = Model Lp (dB) 49 42 38 It would be interesting to notice an irregular behavior in the signal attenuation when crossing a wall next to a toilet. Is this case, the loss caused by these walls is significantly greater than that caused by the common walls of the building. This loss can be as great as 20 dB. The pipes embedded in the walls of these pieces probably cause this behavior. Consequently, special treatment of these walls can be taken in the computation of coverage in the building. As a rule of thumb placement of access points in the proximities of toilets must be avoided, so a big area of poor coverage will be created on the other side of the toilet. It is understandable that different buildings built in different periods and with different building techniques will have different wall attenuation characteristics. Consequently, the study of wall loss would be made in each building of the campus. However, in order to save field measures in all the campus buildings, they have been classified according to the building techniques and material employed for construction. After some fieldwork, five different models have been established. All the buildings are matched with one on these models: Building Sports DCAN EUITI I3 DOEFFC 5I 5D 5E 1B Architecture 1E Computer Sc. Faculty 1F DSIC 1G EUI ETSA Block 2 ETSIA Block 3 3A - 2E 3M Fine Arts Mean value Mean 7 5.25 6.41 6.12 6.47 6.33 6.53 6.6 5.83 6.81 7.35 6.32 4.66 5.62 5.19 8.21 6.29 Model 1 2 3 4 3 3 3 3 4 1 1 3 2 4 2 5 The mean value has also been obtained. It can be used in case of unknowing the model classification of the building. After obtaining the loss of signal power due to the wall, next step is to examine the building plane to be covered with access points. With the obtained data the wireless coverage can be designed from the far away points on the map. As shown in figure 4a, the intersection between the cover zones designed will be the zone where the access point would be installed. The propagation signal between adjoining floors in a building is quite low, due to metal wrought between that acts as a front. Although if you are exactly above the AP of the inferior plant or vice versa, it is possible to receive a slight signal, and the signal attenuates quickly as soon as you go away. A good sign is only achieved between plants if the building has crystal interior patios (crystal skylights) and the AP is located there. This option has been carried out with success in buildings that gathered these conditions, saving APs, but it is not possible to apply it to most of them. As an example of this, the building of the Higher Polytechnic School of Gandia (figure 4b), where advantage has been taken of the crystal skylights to minimize the number of access points. On the other hand, the residual propagation between plants can cause interferences between channels in some points, so an appropriate plan of frequencies is needed, and it is explained in the following point. 4. Interferences between channels The 802.11b standard (in ETSI countries) provides 13 channels inside the ISM band, which belong to 13 frequencies between 2412 MHz and 2472 MHz. However, the spectrum width used by each channel is overlapped by the adjacent channels, causing interferences. These interferences are higher in closer channels. The following table shows the level of interference classified in three levels. Adjacent 1 2 3 4 5 6 7 8 9 10 11 12 13 Ch 1 2 3 4 5 6 7 8 9 10 11 12 13 Interferences between channels Risk of interferences between channels Few or no interference between channels Concerning the previous table, in order to select the maximum number of simultaneous channels without any interference, the channels: 1 - 5 - 9 – 13 must be used. However, if a slight interference that does not degrade the system in the practice is tolerated the channels 1 - 4 7 - 10 – 13 can be used. This second option provides one usable channel more, 5 in total. To be able to reuse these channels, you would have to go far away enough to have no interference, from the horizontal and the vertical points of view. Figure 2 shows how to distribute 4 channels over a horizontal area, repeating channels to minimize interference. Each color represents one of the 4 channels without interferences between them. In figure 3 is demonstrated the same as before but taking into account the floors of the building. 5. Outdoor coverage study Outdoors, it should be considered that you could have different types of antennas (directional, omni-directional, etc.) to offer the highest coverage. Once the different radiation antenna diagrams have been studied, the position, the height, and the angle of inclination would be Fig 2. An optimal 4-channel distribution over a horizontal area. Floor 4 Floor 1 Figure 3. Optimal 4-channel distribution in a building. chosen to install and cover the desired area. In this case the antennas were placed where it was necessary to have good coverage. To find the corresponding mathematical calculation, the following equation can be used: Perceived = Ptxap + Gtx + Grx – Lprop Ptxap = Power transmitted by the AP. Gtx = Transmitter gain. Grx = Receiver gain. Lprop = 20log(4πd/λ) propagation losses 6. Measurement results Despite there are available WLAN design software [10], we used our own strategic following the study's directive mentioned at point 2. All the buildings on the campus of the Polytechnic University of Valencia have been studied. There are more than 50 buildings with quite a lot of plants spread over two square kilometers. The first part of this work consisted on measure walls attenuation and the second one was the study of it in the planes of the buildings. During the study, it has been interesting to contrast the different wall attenuation values among buildings. The campus of the Polytechnic University of Valencia has been built over different time periods and the materials and the constructive techniques that have evolved along this period have affected decisively in the development of this work. After these previous studies, and with the propagation parameters obtained, it is checked if only one AP can cover all the floor of the building. If it is not possible, it is tried using two AP. Afterwards, the covering, theoretically calculated, is tested in situ through a test of AP. It is possible the signal does not to arrive as far as expected, or otherwise, it is possible that it arrives at areas that initially and theoretically did not seem feasible. It is due to the multipath effect, and it is very difficult to evaluate theoretically. If there is a high disparity between design and in situ measures, you can add or remove one AP if it is needed. In the final report of each building, two results are presented regarding the number of AP used: the first one ensures 100% coverage of the whole area, and the second one economizes the number of access points assuring a 95% coverage and reducing the number of necessary AP to around 10%. In figure 4c and 4d measurements for the final coverage of two building using one and two AP are shown. It can be appreciated that in some extreme areas coverage has been sacrificed with the purpose of not increase the number of AP. Outdoor coverage studies have also been carried out. In these cases, calculations are easier due to the fact that obstacles are not presented. In figure 4e coverage of the central walk of the University campus is shown. In these cases, the integrated monopole of the AP is substituted by more external antennas. It has been solved using two sectorial antennas in particular, although in figure 4e the alternative of a single omni-directional antenna is also shown. 7. Conclusions In this work, a complete study of the coverage of a University campus has been developed. As a result of this study, the optimal locations for the wireless AP are obtained, and indoor and outdoor coverage maps for all the buildings of the campus are drawn. Finally, a working method has been developed providing quite satisfactory results. It could be able to contribute positively in other similar studies in the future. At the moment, the wireless network in the campus of the Polytechnic University of Valencia is in the deployment phase following the guidelines of this work. 8. Acknowledges The authors want to thank the Computer Center of the Polytechnic University of Valencia and especially to Carlos Turró, for his collaboration maintained throughout this project. References [1] M.S. Gast, "802.11 wireless networks: the definitive guide", Ed. O'Reilly, Sebastopol, 2002 [2] B. O'Hara, "The IEEE 802.11 handbook: a designer's companion", IEEE Press, New York, 1999 [3] http://www.valenciawireless.org [4] http://www.sss-mag.com/indoor.html [5] C.C. Chiu and S.W. Lin, "Coverage prediction in indoor wireless communications," IEICE Trans. Commun.,vol. E79-B,no.9,pp. 1346-1350,Sep. 1996 [6] W.C. Chang, C.H. Ko, Y.H. Lee, S.T. Sheu, Y.J. Zheng,"A Novel Prediction System for Wireless LAN Based on the Genetic Algorithm and Neural Network", Proc. IEEE 24th Conference on Local Computer Networks, Oct. 1999, Lowell, Ma, USA [7] R. A. Valenzuela, "A Ray Tracing Approach to Predicting Indoor Wireless Transmission", IEEE Vehicular Technology Conference, Secaucus NJ, May 18-20, 1993, 214 – 218 [8] http://www.sss-mag.com/pdf/1propagation.pdf [9] José Maria Hernando Rábanos “Transmisión por radio”, Editorial C.E. Ramón Areces S.A., 1997 [10] S.J. Fortune, D.M. Gay, B.W. Kernighan, O. Landron, R. A. Valenzuela, M.H. Wright, WISE Design of Indoor Wireless Systems, IEEE Computational Science and Engineering, 2, 1, pp. 5868 (Spring, 1995). a) Access point place choice. b) Higher Polytechnic School of Gandia lower and first floors of A building c) Library. First floor d) Higher Technical School of Telecommunications Engineering building. First floor e) Outdoor coverage. Walkway and Agora with 2 directive antennas and with 1 omni-directional antenna. –30 > S > -50 dBm –50 >S > -70 dBm –70 >S > -80 dBm Fig. 4. Covering results in different campus buildings S < -80dBm A Fast Design Model for Indoor Radio Coverage in the 2.4 GHz Wireless LAN Jaime Lloret, Jose J. López, Carlos Turró, Santiago Flores Department of Communications Universidad Politécnica de Valencia, Camino Vera s/n 46022 Valencia, SPAIN jlloret@dcom.upv.es Abstract—In this paper, an empiric radio coverage model for indoor wireless LAN is presented. This model has been tried out in a vast series of large extension buildings obtaining successful results. The objective of the model is to facilitate the radio design work of a wireless LAN by means of straightforward calculations, because the use of statistical methods is very time consuming, and difficult to put in practice at most situations. Our model is based on a derivation of the free field propagation equation taking into account the building structure and its materials and it has been tested on a large scale design of a WLAN network of over 400 access points. Finally, the paper includes the guidelines to setup a home, building, University campus, or city wireless LAN easily in three simple steps. Key Words-WLAN, wall loss, radio coverage, 802.11, 2.4 GHz I. INTRODUCTION Since the launch of the wireless local area networks (WLAN) based on the 802.11b and 802.11g standard, a spectacular market growth has been experienced, due to the features offered and to the low costs of the necessary transmission equipment. Installation of one of these networks at home or in an office environment is straightforward, and technically affordable [1] [2] [3]. Nevertheless, when the requirements demanded to this network increase, for example, to cover a great area, more than one house or different floors in a building, the user has to face several technical limitations that require more in depth study of the installation. Additionally, this complication could increase a bit more when the full coverage a vast area with several buildings is needed. In this case, statistical models and ray tracing based methods are not always affordable. Furthermore, results of analytical and statistical methods can be unimplementable due to the real structure of the building and even to aesthetical considerations. On the other hand, wireless networks are widely developed around the world with interesting projects, sometimes promoted by the city councils that want to offer coverage to its neighbors, or by groups of users that want to establish their own particular network. There are many possibilities for using this unlicensed radio band technology, and simple models like the presented one, will be useful for these tasks. This paper is structured as follows: Section 2 describes the general approach of our model. Section 3 details the calculations involved. Section 4 is devoted to the field testing and finally section 5 concludes the paper. II. GENERAL APPROACH The deployment of vast extension WLAN is faced with several problems. To develop a big project successfully, it is always necessary to use a smart work strategy from the very beginning that could minimize the design effort. We call that, “Design steps”, and will be applied to each building of the network. These steps are: 1) Visual study and inspection of the building through walking around them, and using its floor plan. 2) To carry out an initial set of measures to obtain an estimate of wall propagation losses. 3) Try a suitable location for each access point and carry out the calculations in order to estimate the coverage across the building, as a function of the obstructing walls in the light of sight and the distance to the access point. Step three is then repeated until a suitable location for all access points has been reached. Fig. 1 illustrates this approach. III. WALL AND FLOOR PROPAGATION LOSSES The three main mechanisms of radio propagation are attributed to reflection, diffraction, and dispersion. These three effects cause distortions in the radio signal that suffers attenuation due to losses in its propagation [4]. Common effects on the buildings that do not appear in free field are losses through the walls, roofs, and floors. This effect, together with the multipath and diffraction caused by the corners, is very difficult to evaluate, and there are many publications about mathematical models of indoor radio propagation [4] [5] [6]. The propagation losses value is given in equation (1), where the effect of the losses due to multipath effect is added [7] [8]: L(dB) = Lo+10n log(d)+ΣKiFi+ΣIjWj+Lms Where: (1) Figure 2. Consecutive walls used in the measurements, and check points for obtaining the mean loss through the walls of a building. Figure 1. Design step 1: Initial set of measures to estimate wall propagation losses. Lo = power losses (dB) at a distance of 1m (40.2 dB at 2.44 GHz frequency) n = attenuation variation index with the distance (n=2) d = distance between transmitter and receiver Ki = number of floors of kind i in the propagation path Fi = attenuation of one floor of kind i. Ij = number of walls of kind j in the propagation path Wj = attenuation factor of one wall of kind j Lms = Propagation losses due to multipath propagation and light of sight interferences effect. There are a lot of studies devoted to the characterization of propagation losses through building materials (walls [10] [11] and floors [12]) or studies focused to solutions for specific buildings [13] [14]. It has also been demonstrated the dependence of the attenuation respect to the angle of interception with the wall or floor [15][16]. Nevertheless, from a practical design point of view, we will use simple statistical models of the wall’s absorption in order to predict how many walls the WLAN signal will be able to cross whilst maintaining connectivity. As shown on section four, this simple method will provide fairly good estimations. So, as stated in our general approach, we will begin by measuring the propagation loss of each type of wall in our environment. To do this, we will locate an area of consecutive walls (usually a corridor of office rooms) in the building, as shown in Fig. 1. According to Fig. 2, the transmitter is located at a fixed position ‘0’, 1 meter apart from the wall and a series of measures are taken at points 1-3-5-…-13 using a wireless card connected to a laptop, and signal monitoring software. Using equation (1) it is possible to calculate the loss through the first wall. L0-1 = Lo – 20 log (d) – Pr1 + Lms1 (2) multipath propagation losses we compute a mean value. This mean will be employed as a reference for all the walls of this type. Next table shows the values of attenuation obtained from a specific building. As can be seen, not all of the walls produce the same attenuation in spite of the fact that they are made from the same materials. This variation is produced by the multipath propagation and light of sight effects. By obtaining a mean value we reduce that source of error. Results can be seen on TABLE I. TABLE I. Wall losses, and mean value. Wall 0-1 2-3 4-5 Mean (Lp) It is notable to remark that we obtain a value adjusted to that obtained on references [10] and [11], but using a very simple process. Now, we are ready to estimate the number of walls the wireless signal can cross without loss of connection. The deduced expression for the threshold power follows: Pu =Prx1m – 20 log (d) – ΣLipi (3) Where Lo = 40.2 dB and Pr2 is the received power at point ‘3’ and d = 4.5 meters in this case (wall separation is 2.5 meters for all rooms). So, to obtain a suitable value without (4) Prx1m = Power received at 1meter d = Distance between the transmitter and the receiver ΣLipi = Propagation losses due to the walls of kind i The following expression can be used to obtain the number of walls that the signal can cross within a specific threshold power: n= Prx1m − 20 log d − Pu Pr1 is the received power at point ‘1’ and d = 2 meters in this case. In order to compute the loss at the second wall: L2-3 = Lo – 20 log (d) – Pr3 – L0-1 + Lms2 - Lms1 Loss [dB] -1.021 15.352 2.802 5.711 ∑L P i i (5) And this other expression provides the maximum distance as a function of the number of crossed walls: d = 10 Prx1 m − n · ∑ L i Pi − Pu 20 (6) Figure 3. Design step 2A: Attempts for a suitable access point location by estimation of the coverage across the building. As an example of application, the TABLE II shows the maximum distance allowed as a function of the number of same type walls crossed by the signal. The power threshold is fixed at -80 dBm, which is the typical sensitivity value for the majority of commercial wireless LAN cards (at a transmission speed of 11 Mbps). TABLE II. Maximum distance allowed as a function of traversed walls. 1 wall 2 walls 3 walls 4 walls Distance (m) 50.64 14.19 13.60 7.05 It would be interesting to notice an irregular behavior in the signal attenuation when crossing a wall next to a toilet. Is this case, the loss caused by these walls is significantly greater than the caused by the rest of the walls in the building. This loss can be as great as 20 dB. The pipes embedded in the walls of these pieces probably cause this behavior. Consequently, special treatment of these walls can be taken in the computation of coverage of the building. As a rule of thumb placement of access points in the proximities of toilets must be avoided, so a big area of poor coverage will be created on the other side of the toilet (as it is shown in Fig. 3). Additionally it must be taken into account the metallic objects (rails, fences, statues, etc.) in the direct path, in these cases the measure suffers errors above +/-2 dB. Now, the building map and the wall losses mean value are only needed in order to design the coverage area as it is shown in Fig. 3 and Fig. 4. IV. PRACTICAL VS THEORETICAL MEASUREMENTS All the buildings on the campus of the Polytechnic University of Valencia have been studied. There are more than 50 buildings with quite a lot of floors spread over two square kilometers. It is understandable that different buildings built in different periods and with different building techniques will have different wall attenuation characteristics. Consequently, the study of wall loss would be made in each building of a extended area. So, in order to save field measures in all the campus buildings, they have been classified according to the building techniques and material employed for construction. A check on resemblances between the models and the real measures taken in the buildings was carried out. The validity Figure 4. Design step 2B: Attempts for a suitable access point location by estimation of the coverage across the building. of these models was confirmed. The TABLE III shows the results obtained for standard brick walls in different year-ofconstruction buildings: TABLE III. Attenuation mean value for different campus buildings. Building Sports DCAN EUITI I3 DOEFFC 5I 5D 5E 1B Architecture 1E Computer Sc. Faculty 1F DSIC 1G EUI ETSA Block 2 ETSIA Block 3 3A – 2E 3M Fine Arts Mean value Mean 7 5.25 6.41 6.12 6.47 6.33 6.53 6.6 5.83 6.81 7.35 6.32 4.66 5.62 5.19 8.21 6.29 A global mean value has also been obtained. It can be used in case of unknowing the model classification of the building. After obtaining the loss of signal power due to the wall, next step is to examine the building map to be covered with access points. With the obtained data, the wireless coverage can be designed from the far away points on the map. As shown in Fig. 5, the intersection between the cover zones designed will be the zone where the access point would be installed, Fig. 6. Now, in order to validate the model, a series of field measures has been taken in different points in the building and compared with the predicted ones using our model. As it is shown in TABLE IV, the error is comprised in the range between +/- 3dB, which should be enough for the majority of the situations. The standard deviation of the error is comprised between 1.6 and 1.9 dB, depending of the building. As illustration example, the measures obtained for two typical buildings between the 50 studied are shown. Figure 5. Selection of the access point placement taking into account wall losses. To assure a suitable reception for all wireless cards, we limit the power range at -80 dBm for 802.11b, and -68 dBm for 802.11g, so measures further from that point are not taken into account. The propagation signal between adjoining floors in a building is quite low, due to metal wrought between that acts as a front. Although if you are exactly above the AP of the inferior plant or vice versa, it is possible to receive a slight signal, and the signal attenuates quickly as soon as you go away. A good sign is only achieved between plants if the building has crystal skylights and the AP is located there. We have used our model in a 3D fashion to get a good estimate on these cases. On the other hand, the residual propagation between plants can cause interferences between channels in some points, so an appropriate 3D frequency planning is needed. To conclude, we present in Fig. 7 an example of the prediction maps obtained using the proposed model. Figure 6. Access point placement and coverage area. TABLE IV. Model prediction, compared with field measure and error, for two different buildings. Building A Model predict. -63.88 -66.61 -76.19 -68.79 -79.62 -79.62 -77.24 -69.04 -73.89 -67.54 -77.84 -76.89 -77.00 -66.77 -68.27 -64.90 -68.44 -76.53 -76.95 Measured -62 -67 -79 -68 -79 79 -75 -71 -71 -64 -79 -74 -79 -68 -66 -64 -67 -77 -74 Model predict. -70.28 -76.19 -77.72 -75.16 -67.27 -73.73 -70.28 -74.61 -77.56 -74.57 -74.97 -63.93 -69.55 -77.47 Measured -73 -76 -78 -74 -65 -74 -69 -77 -76 -77 -78 -65 -67 -75 Error 1.88 -0.39 -2.81 0.79 0.62 0.62 2.24 -1,96 2.89 3.54 1.16 2.89 2.00 1.23 2.27 0.90 1.44 -0.47 2.95 Building B Figure 7. Example of the prediction maps obtained using the proposed model: [-30,-50 dBm] ]-50,-70 dBm] ]-70,-80 dBm] < -80 dBm Error -2.72 0.19 -0.28 1.16 2.27 -0.27 1.28 -2.39 1.56 -2.43 -3.03 -1.07 2.55 2.47 V. CONCLUSIONS An empiric radio coverage model for indoor wireless LAN based on a straightforward derivation of the free field propagation equation taking into account just the walls traversed has been presented and validated. This validation has been done extensively in different buildings built in different periods and with different building techniques. We have found that our model produces better approximations when the wall attenuation factor of a building is correctly selected from the database of constructive materials collected during the project. Nevertheless, this is not critical, and quite profitable and close to reality results can be obtained using a general value. It has been compared the predicted value respect to the measured one. The conclusion is that our model produce errors generally under +/- 3dB, with a standard deviation around 1.8 dB. An exhaustive and successfully campaign of field measures, on more than 50 building in the campus of the Universidad Politecnica de Valencia (Spain) guarantee its usability and employment in future projects. Our model has been used for the design of the wireless deployment using the standards 802.11b and 802.11g at our University campus. It is applicable to other Universities, office buildings, etc. ACKNOWLEDGEMENTS We want to acknowledge all the students that participate in the exhaustive field measurement campaign for their valuable effort, and to the University Computer Center for their support in this initiative. REFERENCES [1] Jeffrey Wheat, Designing a Wireless Network, Syngress Publishing, Rockland, 2001 [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] M.S. Gast, 802.11 wireless networks: the definitive guide, Ed. O'Reilly, Sebastopol, 2002 B. O'Hara, The IEEE 802.11 handbook: a designer's companion, IEEE Press, New York, 1999 C.C. Chiu and S.W. Lin, “Coverage prediction in indoor wireless communications”, IEICE Trans. Commun.,vol. E79-B,no.9,pp. 13461350,Sep. 1996 W.C. Chang, C.H. Ko, Y.H. Lee, S.T. Sheu, Y.J. Zheng, "A Novel Prediction System for Wireless LAN Based on the Genetic Algorithm and Neural Network", Proc. IEEE 24th Conference on Local Computer Networks, Oct. 1999, Lowell, Ma, USA Rappaport, Theodore S., Wireless Communications: Principles and Practice, Prentice Hall Publications, NJ, 1996. R. A. Valenzuela, "A Ray Tracing Approach to Predicting Indoor Wireless Transmission", IEEE Vehicular Technology Conference, Secaucus NJ, May 18-20, 1993, 214 – 218 T. Frühwirth, J.R. Molwitz and P. Brisset, “Planning Cordless Business Communication Systems”, IEEE Expert Magazine, Special Track on Intelligent Telecommunications, February 1996 F. Agelet, A. Formella, J. Rabanos, F. de Vicente and F. Fontan, “Efficient Ray-Tracing Acceleration Techniques for Radio Propagation Modeling”, IEEE Trans Vehicular Tech, 49 #6 p. 2069 John C. Stein, Indoor Radio WLAN Performance Part II: Range Performance in a Dense Office Environment, Harris Semiconductor (Intersil) Robert Wilson, Propagation Losses Through Common Building Materials 2.4 GHz vs 5 GHz. Magis networks Inc. http://www.magisnetworks.com/pdf/cto_notes/E10589PropagationLosse s.pdf D. Suwattana, J. Santiyanon, T. Laopetcharat, “Study on the Performance of Wireless Local Area Network in a Multistory Environment with 8-PSK TCM”, International Technical Conference On Circuits/ Systems, Computers and Communications J. S. Davis II, Measurements in Cory Hall at UC Berkeley. http://www.wireless.per.nl:202/multimed/cdrom97/2_4ghz.htm Dan Dobkin, Indoor Propagation and Wavelength, WJ Communications, 2002 http://www.wj.com/pdf/techpubs/Indoor_prop_and_80211.pdf R.F. Rudd, “building penetration loss for slant-paths at l-, s- and cband”, International Conference on Antennas and Propagation, March 2003 Adi Shamir; “An Introduction to Radio Waves Propagation: Generic Terms, Indoor Propagation and Practical Approaches to Path Loss Calculations, Including Examples”, RF Waves - White Paper. http://www.wtwo.net/testowo/rfwaves/ A User-Balanced System for IP Telephony in WLANs Miguel Garcia1, Diana Bri2, Carlos Turró3, Jaime Lloret4 Polytechnic University of Valencia, Spain 1 migarpi@posgrado.upv.es,2diabrmo@posgrado.upv.es,3turro@cc.upv.es,4jlloret@dcom.upv.es Abstract Wireless IP telephony is becoming very popular between the users of large Wireless Local Area Networks (WLANs). This increment has been mainly caused because it allows cost savings. Although, large WLANs use to provide high availability and redundancy, WLANs lack on the available throughput when there are many IP telephony users. In this paper we will present a system that reallocates IP telephony devices when the system detects that an AP is overloaded. The algorithm and the frames used for our proposal are described. Measurements taken show how the bandwidth consumed is transferred from an access point to another when our proposal is running. Finally, we will show the time needed to re-associate remainder users. 1. Introduction In last years, WLANs are reaching much popularity by their main advantages: mobility, low cost technology and large scalability [1]. When the appeared, users only transmitted best effort information. But, now, WLANs are used for many types of traffic such as: data traffic, multimedia traffic, telephony traffic, etc. When we talk about telephony traffic in WLAN, we identify this traffic with VoIP (Voice over Internet Protocol) or IP telephony. IP telephony is defined as transmission of voice and fax phone calls over a packet-based IP data network [2]. This service is a substitute for the fixed-line telephony service which has become a commodity. There are two fundamental attributes for users: price and quality of service. These features are basics to compete with fixed-line telephony. Nowadays, IP telephony subscriber numbers don’t stop increasing, 120% from 2005 to the first half of 2006, reaching to 155,401 users in June 2006 and so on [3]. But most of IP telephony users are still more innovative than potential users. Although, this kind of telephony will be the most used in the future, there is needed to improve some of its features (e.g. the quality of service because the delay is very critical in voice services). In this work we will analyse the need of reallocating remainder users that sometimes may exist in large WLANs. Then, we will describe our proposal and how it performs. We will show the evaluation of our proposal in the WLAN of the Polytechnic University of Valencia. The remainder of the paper is structured as follows. Section 2 describes some related works. The section 3 formulates the problem that we have when there are a lot of users connected to an unique access point and it is required a bandwidth to initiate an IP call. Our proposal is explained in section 4. The performance evaluation and the measurements of the system are shown in section 5. Finally, in section 6, we conclude the paper giving the benefits of our proposal. 2. Related works Today, there are many works where the authors talk about wireless IP telephony as a system that improves the communications between users [4]. The IP telephony and VoIP concepts are closed. In many of the papers that we are going to see, the authors write about VoIP, but the voice transmission mechanism presented is used by the IP telephony. When we talk about IP telephony and WLAN, first we need to know whether it is possible the use of IP telephony on IEEE 802.11 b/g wireless networks. Theoretical studies shown in [5] [6] give that in most cases these types of wireless networks meet the requirements of IP telephony. On the other hand, there are some practical studies. Dutta et al. in [7] checked the performance of wireless Internet telephony in depth. In this work we observe the behaviour of the IP telephony when there is another type of traffic in the network. In [8], Hederson et al. presented a study about data traffic in a wireless network of 550 access points and 7000 users. In this paper we can see the increase of VoIP traffic on WLAN in last years. The authors have also studied the mobility of users and noted that the user does not depend on a fixed position. In addition, they did a study about the amount of corporative network ingoing and outgoing VoIP traffic, average length of calls, total VoIP traffic, etc. These communication systems operate properly via Internet when there is a control of users connecting to the network. One way to perform this task is the admission control. Reference [9] presents an admission control system of IP calls to obtain a QoS adequate. In [10] there is a similar work but in this case there is a system of VoIP over ADSL. These systems must keep always the user connected. When the system discards a user in the admission control when the user is trying to connect to an access point (AP), it must be reassigned to another AP. In [11] the authors present a study of the access selection problem in a multi-access wireless network. They propose an access selection solution, in which the arriving users as well as a few ingoing users are reassigned according to the new systems’ conditions. This solution selects candidate users to a vertical handover and anticipates the user context transfer. We have not found any work where there is a system of balance of users to improve the wireless IP telephony. Because of it, in this work we submit a user-balanced system that improves the performance of the network when we have a sensitive communications that need to have a QoS adequate end to end. 3. Problem formulation One of the main drawbacks of the WLANs in the 2.4 GHz band is their bandwidth when it is compared with wired networks. Since their appearance, the available bandwidth has been increased continuously as new coding techniques have been applied. It has gone from 1 Mbps up to 108 Mbps (currently offered by some specific vendors when an extra codification is applied). The bandwidth of the deployed WLANs is shared by different type of users with specific bandwidth requirements [8]. The Polytechnic University of Valencia is 40 years old. It is currently formed by 3 campuses and the main campus has around 50 buildings spread out in 2 km2. There are around 4,000 researchers and educational personnel, around 1,500 staff and around 35,000 students in the three campuses. The WLAN of the Polytechnic University of Valencia [12] is formed by 575 access points (AP), 33 APs are in the Campus of Gandia, 42 APs are in the Campus of Alcoy and 500 APs are in the main Campus (Campus de Vera). In the WLAN of our university the type of traffic going through the access points is mainly: • Http. • Smtp, Pop3 and Imap4. • Chat protocols. • File transfers protocols. • Multimedia streaming. • VoIP and IP telephony protocols. • Other traffic. Figure 1 shows the evolution of the number of users during 500 hours in a regular indoor access point of the Polytechnic University of Valencia. It gives the number of users use to vary from 0 to 149. The average value during this time was 9 users. The most critical protocols are the VoIP and IP Telephony protocols, because there has not to be packet loss and delays between packets. The bandwidth requirements for the G.711 coding are 64 Kbps bitstream for a signal sampled at 8 kHz [13]. Moreover, at this bitstream we must add the control traffic that H.323/SIP introduces in the network. Because the available bandwidth of an access point is shared between the devices connected to it, there may not be enough available bandwidth to offer the required Quality of Service for the IP telephony devices. In order to avoid this problem, it is needed a system to avoid having too much IP telephones on the same access point. We propose to establish a minimum throughput threshold and when the number of devices connected to the access point makes to achieve this threshold an IP telephony devices has to be thrown from the access point. This IP telephony device will be reassociated automatically to another access point balancing the load of the whole system. 4. Proposal Our proposal is based on the network architecture shown in Figure 2. This network is formed by IP telephony devices connected to the access points. These APs are connected to the wired network through switches. Finally, there is a server which is responsible for managing the number of users that are associated with each access point. In the proposed user-balanced system, the IP telephony devices used WPA instead of WEP (as security protocols) because it prevents the user having to do the re-association and validation process every time it leaves an access point. In WPA these processes are automatic. 160 140 Switch 120 Number of Users 100 Acces Point A 80 Switch Acces Point B Database Server 60 Acces Point C 40 20 0 0 100 200 300 400 500 Hours IP phone IP phone Figure 1. Number of users in an AP during 500 hours. Figure 2. Network architecture of our user-balanced system. Router(config)#dot11 association mac-list 770 Router(config)#access-list 770 deny $mac-list 0000.0000.0000 Router(config)#access-list 770 permit 0000.0000.0000 ffff.ffff.ffff Router(config)#exit Router#clear dot11 client $mac-list case of an affirmative response, the IP telephony device A will remain in that AP. If not, the algorithm waits 2 seconds and clears the access mac-list from the APi letting the IP telephony device A reassociate and the IP telephony device will be marked in the server database as unmovable for next rounds. Our algorithm has three main processes. These are the following: • Association process: When a client comes online, it broadcast a probe request. All APs that receive this request will respond with information about the AP such as RF hops to the backbone, load, and so on. If more than one AP replies, then the client will decide which AP to associate with, based on the information returned from the AP. In order to maintain the association, APs broadcast ‘beacons’ at periodic intervals. A beacon contains details similar to that in the probe response. The client listens to all APs in their coverage area and builds an information table about the APs. The association process is illustrated in figure 4. • IP telephony device maintenance decision: Using SNMP, the AP informs the server about its associated clients, so the server registers the new clients in its database. The server maintains a database of the clients associated to each access point related with their signal strength and their signal quality. When the server registers an IP telephony device and calculates that the throughput of that AP reaches a threshold, it looks for the IP telephony device in the middle coverage range and throws it from this access point using the code shown in figure 5. • Re-Association process: When an IP telephony device is threw from an AP, it will try to authenticate to a new AP automatically. The reassociation process is shown in figure 6. If the server doesn’t find its MAC address in any neighbouring access point for 2 seconds, it erases the access mac-list from the AP. Figure 3. Code to throw an IP telephony devices. The server is constantly receiving SNMP traps from the APs and the switches, and thus it knows how many stations and IP telephony devices, and their signal level, are in each AP. On the other hand, the server can calculate the available throughput in every AP. Then, when the available throughput of an AP has reached a minimum threshold in this AP, the server selects an IP telephony device to move to another AP. It is based on the signal level reported by the APs for each client (it is given by the command “show dot11radio associations all-clients” in an Cisco Aironet Access Point). A very high signal level means that the phone is very close to the AP and it is probably not in the roaming range, so we select an IP phone with a signal level less than a threshold value. A very far client could mean that this access point is the most close and the last one to be associated. So, our algorithm selects those phones that are in the middle range. In order to move an IP telephony device, named A, from an AP, named i, the server selects the MAC address of the IP telephony device A in the APi, then it sends an message to the access point to throw that IP telephony device. It doesn’t allow the IP telephony device to associate again to that access point. It is done by creating an access mac-list which doesn’t allow that MAC to associate to APi. Then it is disassociated the IP telephony device A from APi. The phone will reassociate to another AP in its coverage range automatically. The code used in a Cisco Aironet access point to perform these tasks is shown in figure 3. Maybe the IP telephony device A can’t associate to another AP. In order to take into account this, the sever enquiries neighbouring APs to know if the IP telephony device has associated to anyone of them. In Calculate Throughput Yes ¿Action needed? Select Phone to move Phone A Find AP Phone A AP i is attached to Block A association at AP i Disassociate A from AP i Receive Data ¿Is A attached to any AP? Yes No Unblock A association at AP i Mark A as unmovable Wait a little time No Figure 5. User-balanced algorithm Database Server Database Server Acces Point A Acces Point B Steps to Association: Client sends probe. Acces Point A Acces Point B APs send Probe Response. Steps to Re-association: Database server send a disassocite IP telephony device from AP (A) Client evaluates AP response selects best AP. Adapter listens for beacons from APs. Client sends authentication request to select AP (A). Adapter evaluates AP beacons, selects best AP. AP (A) confirms authentication. Adapter sends association request to selected AP (B). Clients sends association request to select AP (A). AP (B) confirms association and registers adapter. AP (A) confirms association and registers client in the database server. Initial Connection to an Access Point Figure 4. Association process. 5. Deployment and measurements 5.1. Test bench In order to show the performance of our proposal, we made several types of measurements. The devices used in our test bench were Cisco Aironet access points series 1100 and Cisco Catalyst 2950T-24 switches with 100BaseT links. We separated part of the real network in order to take the most accurate measurements in a closed environment without the interference of external devices and to avoid variations due to external factors. We used Asterisk [14], an Open source PBX, in order to register the IP telephony devices. The number of IP telephony devices and the test procedure is described in the next subsections. This system is designed to be executed even when a conversation is running. This situation is the most critical, for this reason the following measures are made when there are several conversations running. 5.2. Re-association time measurements. 5.2.1. In different Access Points. This section gives the time taken by an IP telephony device to reassociate to another access point. We have AP (B) informs AP (A) of association with AP (B). Roamign from Access Point A to Access Point B Figure 6. Re-association process. measured just a unique IP device to know the effect of our proposal. In figure 7 it is shown that IP telephony device starts to transmit in the fourth second. In the second 15 the device is threw of the AP. The peak indicates the disassociation process. The peak has a value of 25 KB/s approximately. Then we observe that there is an interval of 3 seconds where there is not data transmission, this is due to the re-association process. In the figure 8 obtained the same measurement for the process described in figure 7. In this case we got the number of packets per second. The change of AP implied a peak of around 300 packets per second. 5.2.2. In the same Access Point. This section shows the time needed by an IP telephony device to reassociate to the same AP. The procedure is the same of the last section, but this time the access point lets the device to reassociate to it. In the figure 9 we can observe that in the 15th second there is a reassociation. When the reassociation is conducted in the same AP, there is only needed 2 seconds to reassociate. Comparing these measurements with the ones given by figure 7 we see that when the reassociation process is conducted between different APs, there are more delay and more control traffic. Figure 10 shows the same behaviour, obtaining a peak of 41 packets per second. 25000 350 300 20000 Packets/s Bytes/s 250 15000 10000 5000 200 150 100 50 0 0 0 10 20 30 40 50 0 60 10 20 Se conds Figure 7. Bytes/s in the network. 40 50 60 50 60 Figure 8. Packets/s in the network. 20000 45 18000 40 16000 35 14000 30 Packets/s Bytes/s 30 Seconds 12000 10000 8000 6000 25 20 15 4000 10 2000 5 0 0 0 10 20 30 40 50 60 0 10 Seconds Figure 9. Bytes/s in the network. 5.3. Bandwidth measurements. 5.3.1. When the IP telephony devices are in the same AP. Then, we measured the traffic in a network where there were 7 IP telephony devices, connected to an AP1, talking with 7 IP telephony devices that were connected with AP2. In this case we connected an IP telephony device every 5 seconds and, when all of them were working, we waited 1 minute to see how the network performed. In figure 11 we observe that every 5 seconds the bandwidth used increases due to the connection of the devices. When the system converges (in the 31th second) we obtain an average load of 53326.4 Bytes/s. The average number of packages obtained in figure 12 when the network converges is around 94.5 packets/s. 5.3.2. When there are AP re-associations. This subsection shows how involves the traffic when there are 7 IP telephony devices calling while our proposed system is running. They start the call every 5 seconds sequentially. The 7 IP telephony devices are joined to an access point and they try to call to 7 IP telephony devices in a second access point. The system throws some of them as they appear in the network in order to balance dynamically the load. The system makes the IP telephony devices join the second access point in order to join the first one. In figure 13 we can see that the bytes/s in the backbone is quite lower than the one obtained in the previous section. 20 30 Seconds 40 Figure 10. Packets/s in the network. When the network has converged, there are around 26251.7 Bytes/s. Figure 14 shows the number of packets per second while our proposed system is running. When the network has converged, there is an average value of 49.3 packets per second although there are sporadic peaks due to IP telephony protocol issues. 6. Conclusions In this paper we have proposed a new user-balanced system for wireless IP telephony. It is currently used in the Polytechnic University of Valencia WLAN. This system is based on collecting information on a server from the various IP telephony devices. With this information, the system is responsible for associating the IP phones to the APs who possess best features. Then we have made measurements to check the system operation. The measurements show that the system has a good behaviour. When the IP telephony device performs a reassociation process among APs, the time since the disassociation until the proper functioning of the application is 3 seconds. When the device is disassociated and becomes associated with the same AP only spend 2 seconds. On the other hand, our measurements show that there is less traffic in the backbone when the system is running. As the system is based on the devices of the network rather than on the IP Telephony software or even on the IP Telephony devices, the same results will be obtained in our system when an access point fails down. 70000 120 60000 100 Packets/s 50000 Bytes/s 40000 30000 80 60 40 20000 20 10000 0 0 0 10 20 30 40 50 Seconds 60 70 80 0 90 10 30 40 50 Seconds 60 70 80 90 80 90 Figure 12. Packets/s in the network. Figure 11. Bytes/s in the network. 80000 900 70000 800 700 Packets/s 60000 50000 Bytes/s 20 40000 30000 600 500 400 300 20000 200 10000 100 0 0 0 10 20 30 40 50 Seconds 60 70 80 90 Figure 13. Bytes/s in the network. One of our future works is create a rule to calculate the number of IP telephony devices when this system is running. Currently we are improving the system, to be able to link the device according to a Wi-Fi positioning system such as the one developed by the same authors in reference [15]. On the other hand we have implemented the same type of handoff for regular devices when they cause too much load on one AP. 7. References [1] Kit-Sang Tang, Kim-Fung Man and S. Kwong, Wireless Communication Network Design in IC Factory, IEEE Transactions on industrial electronics, vol. 48, nº. 2, pp. 452459, Hong Kong, April 2001. [2] O. Hersent, D. Gurle, and J-P. Petit. IP Telephony. Addison Wesley, 2000. [3] I. D. Constantiou and K. Kautz, Economic factors and diffusion of IP telephony: Empirical evidence from an advanced market, Pergamon Press, Inc., Telecommunications Policy, Vol. 32, Issue 3-4, pp.197–211, NY, April 2008. [4] M. Hassan, A. Nayandoro, M. Atiquzzaman. Internet telephony: services, technical challenges, and products. IEEE Communications Magazine, vol.38, no.4, pp.96-103, April 2000. [5] D.P. Hole, F.A. Tobagi, "Capacity of an IEEE 802.11b wireless LAN supporting VoIP" IEEE International Conference on Communications 2004, vol.1, pp. 196-201, 20-24, Paris (France), June 2004. [6] L. Cai, Y. Xiao, X. Shen and J. W. Mark, “Voice Over IP-Theory and Practice”. International Journal of Communication Systems, vol. 19, Issue 4, pp. 491-508. 13 April 2006. 0 10 20 30 40 50 Seconds 60 70 Figure 14. Packets/s in the network. [7] A. Dutta, P. Agrawal, S. Das, et al., “Realizing mobile wireless Internet telephony and streaming multimedia testbed”, Computer Communications, vol. 27, Issue 8, May 2004, Pages 725-738. [8] T. Henderson, D. Kotz, and I. Abyzov, The changing usage of a mature campus-wide wireless network. 10th Annual international Conference on Mobile Computing and Networking, Philadelphia, USA, Sep 26 – Oct 1, 2004. [9] István Szabó. On call admission control for IP telephony in best effort networks. Computer Communications, vol. 26, Issue 4, pp. 304-313, March 2003. [10] A. Ram, L. A. DaSilva and S. Varadarajan, Admission control by implicit signaling in support of voice over IP over ADSL. Computer Networks, vol. 44, Issue 6, pp. 757-772, April 2004. [11] V. A. de Sousa, R. A. de O. Neto, F. de S. Chaves, L. S. Cardoso, F. R. P. Cavalcanti. Access selection with connection reallocation for multi-access networks. International Telecommunications Symposium, pp.615-619, 3-6 Sept. 2006 [12] Jaime Lloret Mauri, Jose Javier López Monfort y Germán Ramos, Wireless LAN Deployment in Large Extension Areas: The Case of a University Campus, Communication Systems and Networks 2003, Benalmádena, Málaga (Spain), September 2003. [13] ITU-T Rec. G.711. General Aspects of Digital Transmission Systems Terminal Equipments - Pulse Code Modulation (PCM) of Voice Frequencies. 1972. [14] Jim Van Meggelen, Leif Madsen & Jared smith. Asterisk: The future of the telephony. O’Reilly. USA. 2005. [15] Miguel Garcia, Carlos Martinez, Jesus Tomas and Jaime Lloret, Wireless Sensors self-location in an Indoor WLAN environment, International Conference on Sensor Technologies and Applications (SENSORCOMM 2007), Valencia (Spain), October 14-20, 2007. IP Telephony development and performance over IEEE 802.11g WLAN Miguel Edo1, Miguel Garcia2, Carlos Turro3 and Jaime Lloret4 Universidad Politécnica de Valencia, Camino Vera s/n, 46022, Valencia (Spain) 1 miedmon@epsg.upv.es;2migarpi@posgrado.upv.es;3turro@cc.upv.es;4jlloret@dcom.upv.es Abstract With the adoption of the Wireless LAN technology as one of the main ways to access the enterprise network, IP services have found another place where they can be implemented. In this paper we will show the test and performance used to develop the IP telephony network over the 802.11g wireless LAN of the Polytechnic University of Valencia. In order to make these measurements, we have used the Open Source PBX & Telephony Platform: Asterisk and SmartPhones. We will show the results obtained about the delay, the jitter and the number of lost packets when the SmartPhones are in the same wireless cell and when they are roaming. Finally, we will calculate the amount of IP phones that can be working in a single access point and the bandwidth wasted in different cases. This work can be used to design VoIP and IP telephony wireless networks and to design wireless IP phones relocation algorithms. 1. Introduction IP telephony, or VoIP (Voice over IP), enables voice communications over networks based on the Internet Protocol (IP). Therefore, it allows significant advantages. On one hand, IP phones communications within the intranet are free. This is most interesting for companies or institutions which have several branches or for mobile employers who are moving inside the intranet with their mobile devices. On the other hand, the huge investments that have to be done by the companies or institutions to purchase a Private Branch Exchange (PBX) can be reduced by using PBXs based on free software. They provide the same functionality as a traditional PBX. From several years ago, wireless networks have been achieving great popularity because the deployment of these networks are low cost while provide us quite mobility and scalability [1]. These networks have evolved quickly to meet the needs of these users: more security and bandwidth. It is therefore evolved from IEEE802.11b, which is used to supply a theoretical bandwidth of 11Mbps, to IEEE802.11a and IEEE802.11g [2] which provides a theoretical bandwidth of 54Mbps. This technology is always in progress. Although IP telephony was firstly deployed for the wired network, it can also be deployed on the wireless network. One of the main advantages of the IP telephony over a wireless network is that it allows mobility of the people while they are talking. Currently, most PDA's and SmartPhones incorporate Wireless LANs connectivity that is a considerable advantage because such devices can be used as either cell or VoIP phone. It is a very important feature because as long as we have WLAN coverage we will be able to make VoIP calls. In this paper we will show how an IEEE 802.11g WLAN performs using IP telephony with a PBX: Asterisk [3]. The rest of the paper is as follows. Section 2 gives previous studies and implementations of IP Telephony. Section 3 shows the network deployment and the main features of the IP PBX. In Section 4, we will show the measurements of the delay, jitter, packet loss and bandwidth for different scenarios. Finally, section 5 will present the conclusions. 2. Related Work In the literature, we can find several publications dealing with IP telephony over wireless networks. In some sections there is a discussion about the ability of the IEEE 802.11b/g networks to handle VoIP traffic. In such papers there are theoretical studies on the feasibility of IP telephony over WLAN [4] [5] and also, in some of them, the quality of calls using different audio codecs G.711 and G.719 [4] is checked. In other papers, the behavior of IP telephony over WLAN, when these wireless networks have another kind of traffic, is analyzed [6]. Furthermore, some studies have been conducted on IP Telephony Asterisk-based PBX [7], where an experimental assessment of the IEEE 802.11b standard to support VoIP on a wired network has been carried out. Nevertheless, none of the studies aforementioned has dealt with IEEE 802.11g networks. Neither any of them have studied how roaming affect the phones or the required bandwidth for the phones to have enough quality of service. Eventually, none of these considerations have been applied to the SmartPhones case. UPV Network Asterisk AP Cisco Aironet 1130AG 3. Network Deployment and IP PBX The WLAN of the Polytechnic University of Valencia [8] is formed by 575 access points (APs) spread in 3 campuses. 33 of them are in the Campus of Gandia, 42 APs are in the Campus of Alcoy and 500 APs are in the main Campus (Campus de Vera). The access points are Cisco Aironet 1130AG Series APs which use IEEE 802.11a/b/g standard and provide speeds up to 108Mbps. They are installed to allow the users a continuous coverage as they roam throughout a facility. They incorporate the 802.11i IEEE-Compliant standard (WPA2-Certified and WPA-Certified) which allows interoperability with other manufacturers. The coverage of each access point varies between 30 m at 54 Mbps and 137 m at 1 Mbps for indoor environments. The IP Telephony PBX is a server that runs a software desktop application. Asterisk is a freesoftware application (under GPL) performing a function as a regular telephone PBX. Such as many PBX, it is possible to connect a specific amount of phones to make calls between each other and even to connect to a VoIP provider or to the PSTN (Public Switched Telephone Network). The basic package of Asterisk includes many features that were previously available only in expensive proprietary systems such as creation of extensions, sending voice messages to e-mails, conference calls, voice interactive menus and automatic call distribution. Asterisk supports various VoIP protocols including SIP (Session Initiation Protocol) [9]. SIP is a protocol for controlling and signaling systems used primarily in IP Telephony which was developed by the IETF (RFC 3261). The protocol allows to start, to modify and to finalize multimedia sessions with one or more participants and its greatest advantage lies in its both simplicity and consistency. The audio codecs supported be the Asterisk are the following ones: G.711 ulaw, alaw G.711, G.723.1, G.726, G.729, GSM, iLBC, LPC10, Speex. IP PBX IP Phone Nokia E65 Figure 1. Network architecture. 4. Real Measurements In this section we will show the measurements carried out in our experiment to evaluate the network performance. 4.1. Test Bench In order to test the network performance and analyze which features offers, we will use two SmartPhones Nokia E65 and an Asterisk VoIP telephone PBX. The SmartPhones will be connected to the Asterisk PBX through the wireless network of the Polytechnic University of Valencia. The IP telephones incorporate the IEEE 802.11g standard and WPA encryption. This is necessary because the connection to the wireless network of the Polytechnic University of Valencia is established by using IEEE 802.11g, WPA encryption with Protected EAP (PEAP) and EAP-MSCHAP v2 authentication, thus ensuring a secure communication. These phones support the SIP protocol which we use to connect with the Asterisk PBX. The packages that have been captured for further study are RTP packets on UDP/IP using the network analyzer Wireshark [10]. As for the audio codec, we will use the G.711. This codec will give us the best voice quality as it does not use any compression. It is the same codec used by the network ISDN (Integrated Service Digital Network) and the sound quality is like a conventional telephone. It also has the lowest latency since there is no need for compression, which leads to less processing load. 50 45 Call3 Call5 Call9 Call7 50 Max Delay (ms) 40 35 35 30 25 20 15 30 25 20 15 10 10 5 5 0 0 2 4 6 8 10 12 14 16 Time (s) 18 20 22 24 26 28 0 30 Call1 Call2 Call3 Call4 Call5 Call6 Call7 Call8 Call9 Fig 3. Delay average and maximum delay per call. Fig 2. Measures of the call delay 6 Call1 Call3 Call5 Call7 6 Call9 5 Jitter average (ms) Max Jitter (ms) 5 4 Jitter (ms) Jitter (ms) Delay average (ms) 45 Delay (ms) Delay (ms) 40 Call1 3 2 4 3 2 1 1 0 0 2 4 6 8 10 12 14 16 Time (s) 18 20 22 24 26 28 30 Fig 4. Measures of the call jitter 4.2 30 second call In order to analyze the performance and quality of calls we have made 9 calls of 30 second each one, testing the delay, jitter, bandwidth and packet loss. The packets are captured from the IP Phone to the Asterisk PBX. 0 Call1 Call2 Call3 Call4 Call5 Call6 Call7 Call8 Call9 Fig 5. Jitter average and maximum jitter per call. 6ms and is maintained almost constant all the time around 1 ms. In Figure 5 we have an average of the jitter and maximum jitter per call. In the graph we see that the jitter in none of the 9 calls exceeds 6 ms giving an average of 1.11418 ms jitter and 3.9244 ms of maximum jitter average. 4.2.1 Delay tests 4.2.3 Lost packets testing The Figure 2 shows the data obtained in the delay measurements. It only shows 5 out of 9 calls because we want the graph to be understandable. As we can see, the 5 calls are around 30 second long and none of them exceed 50ms delay. In Figure 3 we have the highest average delay and delay per call. Visually we can see that the average delay time is around 20ms. Performing the overall average of 9 calls we obtain a delay of 19.6767 ms and the average maximum delay is 39.0122 ms 4.2.2 Jitter testing In Figure 4 we can see the results of tests done about Jitter. In neither of the cases, the jitter exceeds In Figure 6 we can see the results of the tests carried out concerning lost packets. In calls 1 and 2 we can see how the number of lost packets grows rapidly around 14 seconds after the call starts because the IP phone buffer is filled up. Nevertheless, under no circumstances is this packet loss appreciable during the communication. In the following figures 7 and 8 we can see that the packet loss in calls is very high. The packet loss average is 162.22 packages: a 12.39 % packet lost. Although it may seem a very high rate, this does not affect the conversation. The 9 calls have been of excellent quality. The transmitted packets average is 1329.77 for the 9 30-second calls. 16 14 Call1 Call3 Call5 Call7 1600 Call9 Lost Packets 12 Lost Packets Lost packets Packets/Call average 1400 10 8 1200 1000 800 6 600 4 400 2 200 0 0 2 4 6 8 10 12 14 16 Time (s) 18 20 22 24 26 28 0 30 Call1 25,00% Call2 Call3 Call4 Call5 Call6 Call7 Call9 60 Lost Packets average (%) Call1 Call2 50 Delay (ms) 20,00% Lost Packets Call8 Fig 7. Transmitted packets and lost packets per call. Fig. 6. Extent the packets lost in the calls. 15,00% 10,00% 40 30 20 10 5,00% 0 0 0,00% Call1 Call2 Call3 Call4 Call5 Call6 Call7 Call8 Call9 Fig 8. Percentage of lost packets per call. 4.4. Roaming testing It has done the same procedure as in section 4.2 but in this case we have made two calls. One of the phones is static in an Access Point and the other is moving around the wireless network at the UPV in the Campus of Gandia. The data displayed on the following points are those obtained from the phone on the move. 4.4.1 Testing Delay The figure 9 shows the data obtained in the analysis of the delay in testing Roaming. As we can see the same thing that happens in figure 1, the delay is kept around 20 ms but in this case because the information has to go through many more network equipment ranges between 25 ms and 15 ms with an average of 19.7803 ms very similar to data obtained in section 4.2.1. In this test, the maximum average delay is 49.92 ms whereas it was 39.0122 ms in the 30-second calls between the two phones using the same Access Point. 4.4.2 Jitter Testing In figure 10 we can see the data obtained in the analysis of jitter in the roaming test. As shown in the figure, jitter is around 0.5 and 1.5 ms very similar to tests carried out in section 4.2.2 with the difference in 30 60 90 120 150 180 210 Time (ms) 240 270 300 330 360 Fig 9. Extent of the delay in Roaming this case that the maximum jitter average of 3.9244 ms increases to 6.03ms. On the other hand, the average jitter has not increased over the average obtained in section 4.2.2: 1.0626 ms this time, which is a positive development. 4.4.3 Lost packets test In figure 11 we can see the data obtained in the analysis of roaming calls regarding lost packets. As in previous points, we have something similar to what happened in the 30-second calls. In this case we have a lost packet average per call of 8.00 % without causing any problem in this communication. On the other hand, the maximum packet loss is caused at times when the buffer is full in the IP phones. As we can see, these maximum losses are equidistant. 4.5. Test of effective bandwidth In figure 12 we show the test of effective bandwidth in the network of the Polytechnic University of Valencia. These tests show us that we have a capacity of around 20000 Kbps with an average of 18514.31 Kbps in the IEEE 802.11g wireless network. Then, in the following paragraphs we will see the bandwidth occupied by IP phones and then will calculate the amount of IP phones that theoretically might work in this wireless network. 16 7 Call1 Call2 Call2 12 Lost Packets 5 Jitter (ms) Call1 14 6 10 4 3 2 8 6 4 1 2 0 0 0 30 60 90 120 150 180 210 Time (s) 240 270 300 330 0 360 30 60 90 120 150 180 210 Time (ms) 240 270 300 330 360 Fig. 11. Lost packets in roaming Fig 10. Measures on Roaming Jitter 120 20000 100 IP BW (Kbps) BW (Kbps) 15000 10000 80 60 40 5000 20 Call1 Call3 Call5 Call9 Call7 0 0 0 100 200 300 Time (s) 400 500 600 700 Fig 12: Effective bandwidth in the IEEE 802.11g network. 4.5.1 Bandwidth test using the G.711 audio codec At this point we are going to see the occupied bandwidth both by the set of the 9 of 30-second calls and by the roaming calls, using in both tests the audio codec G.711 In Figure 13, we can see how the calls 1 and 5 have a drop of bandwidth, this is due to packet loss because the buffer of the IP phone in both cases is full. This was explained earlier in paragraph 4.2.3. On the other side, in the moments where there is no loss of packets we can see that the bandwidth is around 80 and 110 Kbps with an average of 89Kbps. In figure 14 we can see the average bandwidth per call that is always between 100 and 120Kbps: concretely 110.0444 Kbps. This is very important because then we will calculate the theoretical number of phones that can operate on the wireless network of the UPV. In Figure 15, we may see something similar that happens with the 30-second call bandwidth. On this occasion, the bandwidth has a mean of 90.1559 Kbps very similar to 89Kbps in the 30 second’s average calls. On the other hand, what does vary significantly is the maximum bandwidth average which raises from 0 2 4 6 8 10 12 14 16 Time (s) 18 20 22 24 26 28 30 Fig. 13. Measures of the 30-second call bandwidth 110.0444 Kbps up to 128Kbps. This is very important in order to calculate the maximum number of phones. According to the paragraph above the effective bandwidth in the IEEE 802.11g network of the Polytechnic University of Valencia is 18514.31 Kbps. In our case, the maximum bandwidth that generates our phones when they were in a position to roaming (worst situation) was 128Kbps. Following these steps we can say that the theoretical number of phones that our wireless network support per access point is approximately 144. 5. Conclusions In conclusion, we can say that the IEEE 802.11g wireless network of the Polytechnic University of Valencia could, theoretically, support up to 144 IP phones per access point using the audio G.711 codec. This number would be obtained in an ideal situation where we had always this effective bandwidth with a small amount of external interference always in a network devoted solely to IP telephony without any other type of traffic. This can be improved thanks to the system proposed by the same authors of this paper [11]. 140 IP BW average (kbps) 140 Max IP BW (kbps) 100 100 IP BW (Kbps) 120 IP BW (Kbps) 120 80 60 80 60 40 40 20 20 Call1 Call2 0 0 Call1 Call2 Call3 Call4 Call5 Call6 Call7 Call8 Call9 0 30 Fig. 14. Measure of the maximum bandwidth average and maximum bandwidth per call. 30 Call Roaming Call Delay 19.67 ms 19.78 ms Jitter 1.41 ms 1.06 ms IP BW 89 Kbps 90.15 Kbps Lost Packet % 12.39% 8.00 % Table 1. Mean value of the data obtained in the tests aforementioned. On the one hand, we have realized that the average of the data obtained in both cases in discussion (the set of 9 30-second calls and the roaming calls) are very similar. This can be seen in Table 1. By contrast, in table 2 we can see as the maximum increases markedly in the roaming calls. This is due to the mobility of the user who makes a reassociation between different access points constantly necessary. We also consider it could be interesting to use SmartPhones with IP phones and WiFi connectivity. These phones have the ability to connect to a wireless network, and then use the same device to make VoIP and cellular calls. Our future work will be focused on carrying out performance tests connecting the Asterisk PBX with a standard PBX in order to make calls outside the Polytechnic University of Valencia. We will make those calls using the PSTN (Public Switched Telephone Network) and with another Asterisk’s supported audio codecs, e.g. G.723.1, G.726 and G.729. It will open new research lines about mixed standard mobile-wireless IP Telephony architectures. 6. References [1] Kit-Sang Tang, Kim Man-Fung and S. Kwong, Wireless Communication Network in IC Design Factory, IEEE. Transactions on industrial electronics, vol. 48, No. 2, pp. 452-459, Hong Kong, April 2001. 60 90 120 150 180 Time (s) 210 240 270 300 330 360 Fig. 15. Roaming bandwidth measures 30s Call Roaming Call Delay 39.01 ms 49.92 ms Jitter 3.92 ms 6.03 ms IP BW 110.04 Kbps 128 Kbps Table 2. Average of the maximum values. [2] IEEE 802.11. It is available in The Working Group for WLAN Standards www.ieee802.org/11/ [3] Asterisk. It is available enwww.asterisk.org [4] D.P. Hole, F.A. Tobagi, "Capacity of an IEEE 802.11b wireless LAN supporting VoIP" IEEE International Conference on Communications 2004, vol.1, pp. 196-201, 20-24, Paris (France), June 2004. [5] L. Cai, Y. Xiao, X. Shen and J. W. Mark, "Voice Over IP-Theory and Practice." International Journal of Communication Systems, vol. 19, Issue 4, pp. 491-508. 13 April 2006. [6] A. Dutta, P. Agrawal, S. Das, et al. "Realizing mobile wireless Internet telephony and streaming multimedia testbed," Computer Communications, vol. 27, Issue 8, May 2004, Pages 725-738. [7] G. Agreda, J. Gaviria. "EvaluaciónExperimental the Capacity of IEEE 802.11b support for VoIP." Converging technologies applied to mobile computing. Memories I2ComM 2006. Pp 28-39. [8] Jaime Lloret Mauri, Jose Javier López Monfort and German Ramos, Wireless LAN Deployment Extension in Large Areas: The Case of a University Campus, Communication Systems and Networks 2003, Benalmadena, Malaga (Spain), September 2003. [9] RFC 3261, SIP: Session Initiation Protocol. [10] Wireshark 1.0.4. It is available in www.wireshark.org [11] Miguel Garcia, Diana Bri, Carlos Turró, Jaime Lloret. A User-Balanced System for IP Telephony in WLANs. The Second International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, 2008. UBICOMM'08. Publication Date: Sept. 29 2008-Oct. 4 2008 On page (s): 251-256. Multicast TV over WLAN in a University Campus Network Alejandro Canovas1, Fernando Boronat2, Carlos Turro3, Jaime Lloret4 Polytechnic University of Valencia EPSG - IGIC Institute1,2,4 ASIC-UPV3 Ctra. Nazaret-Oliva, S/N Camino de Vera, S/N Grao de Gandia Valencia alcasol@epsg.upv.es1, {fboronat2,jlloret4}@dcom.upv.es, turro@cc.upv.es3 Abstract. One of the multimedia services offered by the campus network of the Polytechnic University of Valencia is TV over IP. This service works well in the devices connected directly to the wired network but we have detected some problems when the receivers access to the campus network through wireless IEEE 802.11, especially when devices roam across the Campus. In this paper we propose and evaluate a server-based solution to minimize the packet loss and reduce the lack of service when the mobile devices roam from an Access Point to another Access Point in the wireless network. This solution uses a location system to modify the behaviour of standard multicasting protocols in order to get a near-seamless multicast WiFi roaming. Keywords- IPTV, Multicast I. INTRODUCTION The Information and Communications Systems Area of the Polytechnic University of Valencia (UPV) is offering the TV over IP multicast service (IPTV) to all the members of the University since 2004 ([1]). With the integration of such a service together with data and voice over IP (VoIP), the UPV offers a complete Triple-play (voice, data & video) service to its members. The distribution of TV over the IP campus network reduces the costs in TV infrastructure en each new building of the campus. The service offered by the UPV to its members includes more than simple TV channels. It includes traditional Terrestrial or Satellite digital TV (Figure 1) and other Services such as Educational Channels, Event broadcasting, information channels. The structure of the campus network and the TV streaming infrastructure including wireless access will be presented later. Nevertheless, whereas we have detected that the service works well (provides good QoS) in wired receiver devices (i.e., connected directly to the wired network), on the contrary, some problems arise when the receivers are mobile devices (laptops, PDAs…) which are accessing to the campus network through wireless IEEE 802.11 Access Points (AP). The service doesn’t provide good QoS to those devices, especially when the devices are moving across the Campus. When roaming situations appear, lots of packets are lost and the service is stopped during a too long interval (half a minute, approximately), time needed to rearrange the multicast tree until the new AP. We can think that most of the possible scenarios for clients accessing IPTV services suggest that they will have low mobility during such sessions, but there may be brief periods of mobility as the user moves from one WLAN access area to another and so the problem of vertical handover needs to be addressed. In this paper we propose a preliminary solution that minimizes the number of lost packets and the duration of lack of service intervals when roaming situations are inevitable. Figure 1. UPV Television The rest of the paper is organized as follows. In Section 2, we discuss related work. In Section 3, we present the WI- FI University Campus Network and the infrastructure for TV Streaming. In Section 4, a possible solution of the problem detected when devices are roaming from one AP to another AP is outlined. Section 5 presents the results of the evaluation of the proposal. Section 6 presents our conclusions, discussing some future directions. Finally, the paper ends with the references. II. RELATED WORKS The way of supporting user mobility in IEEE 802.11 networks can have a strong effect on certain types of services. Roaming is the main cause for heavy packet loss error in wireless networks. As far as we know, the IEEE 802.11b standard for WLANs allows for handover between overlapping WLAN cells at the link layer. Since this only permits connection to one WLAN at a time, it falls into the category of hard handovers. During handover clients can not send or receive data and packets queued at the old WLAN will be lost, making it unsuitable for the handover of multimedia traffic. The roaming management produces temporary periods of high packet loss which affect bandwidth estimations and these underestimations reduce service performance during longer periods of time than those caused by the usual roaming process. For real-time video streaming, roaming directly affects the quality of video reception and impacts the user satisfaction. To date, most MAC protocols for wireless networks do not provide a reliable multicast service. For reliably multicasting packet over WLAN, it will be necessary to modify the MAC layer protocol to add recovery mechanism. Adding local recovery at the MAC layer can greatly improve the performance for multicast in wireless networks. Next-generation WLAN standard probably supports the more reliable multicast/broadcast scheme [2]. In the last years, we have found an intense research activity on the effects of WLAN over streaming services. There are multiple possible solutions to decrease the roaming effects in streaming services, ranging from modifications on current streaming service devices (clients and servers) to the design of new intermediate devices to avoid modifying the service devices. Here we present some outstanding solutions to improve the quality of such services, especially in roaming situations. The first option we can think of is the use of Mobile IP [3], which allows a Mobile Node (MN) to receive IP packets through a packet forwarding procedure, but handovers in Mobile IP are slow and packets can be lost during the handover procedure, making it unsuitable for the handover of video traffic. In [4], an advanced agent-based architecture to provide guaranteed quality to the Mobile users in a WLAN is presented for a VoD (Video on Demand) Service. In it, the Access Points manage the user’s mobility (handoff) and implement the management policies of the QoS (reservation, allocation and distribution of the bandwidth). The service architecture is based on intermediate elements (virtual servers) and client software modifications. In [5], a vertical soft handover scheme is presented, using jitter as the indicator for initiating the handover process. A method combining the benefits of multiple descriptions coding (MDC) and multipath routing is explained in [6] to improve the quality of streamed video in WLAN roaming situations. It incorporates channel status detection mechanism to decide which channel will be selected or multiple channels will be used to take advantage of path diversity to deliver the streaming video content. The loss-rate and round-trip time are used to determine the channel status by using active probing. In [7] we can find a proxy-based middleware that foresees client handoff and manages intermediate buffers between client and server to reduce the effects of the handover latency. The proxy manages an intermediate buffer that stores data during roaming to reduce packet loss. In [8], a solution to minimize all the negative effects of a roaming situation in a WLAN, based on a buffering scheme and the pro-active management of signalling control messages between clients and server, is proposed. It is based on off-the-shelf WiFi hardware and unmodified commercial streaming clients and servers. A Wireless Proxy (intermediate element) aware of the type of access network is used to manage client to server signalling. The results show that the use of such a transparent intermediate element filtering or forwarding client signalling messages significantly improves streaming service performance over WLANs. The results of the tests also show that maintaining an independent stable channel between server and proxy helps to reduce roaming effects over the interchanged data. Our solution, explained in Section 4, decreases the amount of lost packets during the roaming processes, by including a new intermediate device and using a WiFi location system. It doesn’t imply the modification of the server or clients sides and then is suitable to be implemented for any kind of networks. III. THE WI-FI UNIVERSITY CAMPUS NETWORK. TV STREAMING INFRASTRUCTURE As stated previously, Polytechnic University of Valencia has, for more than three years, a system for distributing IPTV for 38 simultaneous channels with MPEG-2 encoding at 4-Mbit/s over the network. Reception of TV channels is either from the user’s PC or, for conventional televisions with set-top-boxes (STB) connected to the IP network. This service is used in computers on the wired network without cuts or reception problems, using multicast services over the UPV campus network infrastructure, which allows access for 40,000 users at the University with L3 and L2 Gigabit and Fast Ethernet switches with for IGMP snooping support. This function intercepts multicast traffic intelligently to avoid the multicast flow where it is not necessary by knowing about multicast requirements reading IGMP report and IGMP join messages between the multicast routers and network PCs. A sample of the network infrastructure of the UPV used for IPTV services can be seen in Figure 2. Moreover, the University has an 802.11g wireless network, with over 500 APs deployed, which provides 100% coverage of the campus. Obviously, it is not possible to deploy directly a IPTV service to the WiFi network directly because of bandwidth involved. So, we have developed a testbed for providing IPTV services for mobile devices using a farm of PCs using open-source VLC encoder [9]. That PCs scale and compress on the fly each of the different TV channels with MPEG-4 codec at a speed of 256 kbps and a resolution of 320x240 pixels and recast those streams to the network with a new multicast group (one for each TV channel). This recoding enables receiving with an appropriate bandwidth via the University’s WiFi network as shown in figure 3. 1 G bp s Figure 2. Network communications for UPVTV 1G 1 s bp s bp G Figure 3. Multicast TV roaming setup Again, it is necessary to comment on the pre-requisite of IGMP snooping support by the network devices involved to prevent getting into a WiFi cell more multicast groups than the required ones. But this infrastructure cannot support roaming in an appropriate way, because if the user roams from AP to any other AP, multicast packet loss is unacceptable, because the new L2 switch doesn’t allow multicast packets to flow, and this effect is amplified by the usual requirement of coding systems in having a video key frame to be able to continue playing. This loss of connectivity is the problem we try to solve with our proposal. Now we have to clarify the concepts of soft handover and hard handover. While we can find these terms elsewhere in the literature in some senses, some specific meaning is required here. On the one hand, and in the context of our work, we consider soft handover as a handover in which the same data is delivered to the mobile device simultaneously via two access networks. This can be resource intensive but it reduces the probability of data loss during the handover. On the other hand, we consider a hard handover as the one in which data is streamed via one network at any time (at some specific time, a decision is made to receive the data through one specific network). Hard handover is more parsimonious with network resources but it can result in data loss at the user device, depending on how quickly the handover is made and how much data the device is transmitting/receiving. As mentioned above, the way IEEE 802.11 allows for handover between overlapping WLAN cells at the link layer causes packet loss, making it unsuitable for the handover of multimedia traffic. Moreover, after a hard handover the mobile device will not receive multicast due to the path is blocked by the IGMP snooping functionality. Finally there are many proposals for location on 802.11 networks. We use location from the network side, as proposed by the authors in [10], by means of power received by the APs and probably a field survey. We will use that location information to prepare multicast traffic in roaming situations. IV. OUTLINE OF MULTIMEDIA HANDOVER SCHEME As stated previously, our proposal solves packet loss on hard IEEE 802.11 roaming by combining location and network control in order to achieve near-seamless multicast roaming without requiring any 802.11 client behavior modification. Scheme is depicted on figure 3. When a client registers on a multicast group via an IGMP Join message, the first upstream multicast routers sends a SNMP message to a control server (through standard event notification process), in order to locate the position of that client (message number 1 in figure 4). This location system is based on Power measurements that are also sent to the control server trough SNMP messages too (message number 2 in figure 4). When a multicast client is about to leave a WiFi cell, the location systems send a message to the L2 switches in the new route from the multicast sender to the planned AP (message 3). This message must arrive to all L2 switches that will be in the path of the new multicast route to the predicted Access Point. In our real implementation with CISCO switches, that message sends a “ip igmp snooping vlan static” command to configure an L2 interface as a member of that multicast group. As far as we have no opportunity to deal directly with source code of CISCO operating system, we have simulated a Telnet session with prerecorded commands to send effectively the previously mentioned message. Anyway, the way we think it should be done is through a standard SNMP message. After this message we have two simultaneous multicast paths in which we have flowing the TV session. Then there are two possibilities: the first one is that the mobile roams as we have expected because of the information provided by the location system, or maybe the user has changed its mind (was my office locked?) and decides not to roam. In each solution, IGMP timers for multicast sessions will take care of the unused path and will delete it gracefully. So our proposal works correctly even for that kind of events. We have implemented this service on an infrastructure of APs and switches from Cisco Systems in a building of the university and we have made several tests of roaming in real wireless environments using this technology. The scenario is shown in figure 5. The laptop was running a VLC client ([9]) and a random TV channel was selected to be watched. The laptop characteristics are: Macbook Pro laptop under Leopard OS, Intel Core Duo 2,2 GHz, 4GB of RAM. It was equipped with interior Broadcom WLAN 802.11n adapter. The laptop started the playout in the coverage area of an AP (AP 1, in the figure) and moved along the corridor (following the arrow path) to the covering area of another AP (AP 2, in the figure). Our test transmission is a MPEG-4 video at 256 Kbps with a 320x240 pixels resolution, which is a bandwidth we have estimated correct for TV reception in mobile devices like PDAs and Smartphones. All the tests were made in two ways: one without including the improvement proposed and other with it. Due to paper extension limitations, we only show the results of one of the tests. Next, we present three figures with the results of lost packets (figure 6), jitter (figure 7) and bandwidth consumption (figure 8) measured during the session, using the Wireshark Network Protocol Analyzer Software (version 0.99.7). In them, we can observe that when we don’t implement the proposed improvement, the Mobile device reception of packets was interrupted from the second 81 to the second 115 (34 seconds later), instant in which it continued the playout of the TV sequence. This means an unacceptable lack of service of about 34 seconds (pause in the playout process and a skip effect with the loss of part of the TV sequence). AP2 Figure 4. Message flow for our proposal 5. EVALUATION Figure 5. Measurement scenario AP1 Lost Packets (packets) 3500 3000 2500 2000 1500 1000 500 0 0 20 40 60 Time (s) Normal Roaming 80 100 120 Improved Roaming Jitter (ms) Figure 6. Lost Packets 14 12 10 8 6 4 2 0 0 20 40 60 Time (s) Normal Roaming 80 100 120 Improved Roaming Figure 7. Jitter 3000 BW(Kbps) 2500 2000 1500 1000 500 0 0 20 40 60 Time (s) Normal Roaming 80 Improved Roaming Figure 8. Bandwith Consumption 100 120 The total amount of lost packets in this case, due to the roaming operation, was 3230 packets. On the other hand, when we implemented our proposal, in the mobile device the reception of packets was interrupted from the second 81 to the second 84 (3 seconds later), instant in which it continued the playout of the TV sequence. This means a quite short time of service interruption more tolerable by the users. The total amount of lost packets in this case, due to the roaming operation, was 422 packets (it means a reduction of the 87% regarding the number of lost packets in the previous test, without implementing the improvement). All the tests obtained similar results. So, we can conclude that with our improvement we reduce considerably the amount of lost packets and the duration of the interval without service due to the roaming operation. VI. CONCLUSIONS AND FUTURE WORK The distribution of IPTV is the natural evolution of the services offered by the Universities to their members. In the UPV there is a complete IPTV service, on the one hand, with satisfactory functionality QoS (and compatibility with other services) offered to the wired devices but, on the other hand, with unsatisfactory QoS offered to Mobile Devices. With the preliminary solution proposed in this paper we have reduced considerably the number of lost packets and the duration of the situations of lack of service due to the roaming situations, and without modifying the server and clients sides. It has been tested without background traffic load, so the effects over different levels of load have not been analyzed. Moreover, the study of multiple users performing roaming has not been done yet. Although our solution has proved valid it is not enough, we will continue investigating on it in order to reduce the lack of service period during the roaming and to reduce the number of lost packets. We will study the feasibility of a similar solution for 3G to WiFi roaming and WiFi to wimax roaming, because we have some extent of these technologies deployed across the campus and that kind of support will provide a new level of service for our users. On the other hand, Microsoft researchers in conjunction with some academics proposed in [11] a mechanism by which a single WLAN interface can be used to simultaneously access multiple WLANs. If future devices will have such functionality we can start the handover process through the second WLAN before losing connection to the previous one. With buffering techniques no packets or few packets will be lost. Moreover, other services such as access control and the characteristics of the audience of the service are not defined yet. At this stage, those subjects are being studied. REFERENCES [1] C. Turró, J. Pasamar, M. Jiménez y J. Busquets, “Using Intensively the Network: 152 Mbps of Multicast to Distribute TDT, Satellite and Educative Channels in the UPV”, Spanish National R&D Network Bulletin, PP. 77-80, December 2006-January 2007. [2] J. Ma, X. Feng, Y. Liu and B. Tang, "Video multicast over WLAN," IEEE International Symposium on Communications and Information Technology, ISCIT 2005, vol.2, pp. 1400-1403, 12-14 Oct. 2005. [3] C. Perkins, “IP mobility support”, RFC 2002, IETF, (1996). [4] D. Bruneo, M. Villari, A. Zaia, A. Puliafito, “VOD services for mobile wireless devices”, in Proc. of the Eighth IEEE international Symposium on Computers and Communications, ISCC03, June 30 July 03, 2003. [5] Cunningham, G., Perry, P., Murphy, L., "Soft, vertical handover of streamed video", Fifth IEE International Conference on 3G Mobile Communication Technologies, 3G 2004, pp. 432-436, 2004. [6] C-M. Chen, Y-C. Chen and C-W. Lin, “Seamless roaming in wireless networks for video streaming”, ISCAS (4) 2005, pp. 3255-3258. [7] P. Bellavista, A. Corradi and L. Foschini, “Application-level Middleware to Proactively Manage Handoff in Wireless Internet Multimedia”, 8th International Conference on Management of Multimedia Networks and Services, MMNS 2005, Barcelona, Spain, October 24-26, 2005. [8] M. Vilas, X. G. Paneda, D. Melendi, R. Garcia and V.G. Garcia, “Signalling Management to Reduce Roaming Effects over Streaming Services”. In Proc. of the 32nd EUROMICRO Conference on Software Engineering and Advanced Applications, EUROMICRO, pp. 398-405, August 29 - September 01, 2006. [9] VideoLAN - VLC Media Player, http://www.videolan.org [10] M. García, C. Martínez, J. Tomas and J. Lloret, “Wireless Sensors self-location in an Indoor WLAN environment”, International Conference on Sensor Technologies and Applications (SENSORCOMM 2007), Valencia (Spain), 14-20 October 2007. [11] R. Chandra, Pr. Bahl, and Pl. Bahl, “Multinet: connecting to multiple IEEE 802.11 networks using a single wireless card”, Proc. IEEE Infocom, (2004) People Mobility Behaviour Study in a University Campus using WLANs Sandra Sendra, Miguel Garcia, Carlos Turro, Jaime Lloret Universidad Politécnica de Valencia Camino Vera s/n, 46022, Valencia, Spain sansenco@posgrado.upv.es, migarpi@posgrado.upv.es, turro@cc.upv.es, jlloret@dcom.upv.es Abstract—Wireless Local Area Networks are becoming necessary in university campuses and enterprise areas. Taking advantage of this technology, many benefits can be obtained. One of them is the use of the user’s mobility information when there is ubiquity in the wireless network. This information can tell us which places are most visited, if people have to go to places that are far from their office, detect the best situation for critic points, etc. The study presented in this paper show us the case study of a university campus of two square kilometers and how we have taken advantage of the information gathered from the wireless network. This approach can be used by the enterprises to optimize the sites to place their resources (network printers, servers, meeting rooms, etc.). Furthermore, a network administrator will be able to relocate bandwidth in order to increase the comfort of the end users. Keywords-People Mobility; people behavior; people traking; WLANs I. INTRODUCTION Nowadays, wireless local area networks are widely implemented. The public organisms such as universities, governments, etc. are well known examples. These wireless networks are usually based on the IEEE 802.11 b/g standard [1]. The standard presents many advantages. We can emphasize some of them: • The use of a free band in the 2.4 GHz. • Speeds up to 54 Mbps. • The user’s comfort is bigger than wired networks. • Wireless networks allow the access of multiple computers with a smaller infrastructure cost. • The compatibility among different devices is very high, because of the organization Wi-Fi [2]. The IEEE 802.11 b/g networks present the intrinsic problems of any wireless technology. Some of them are: • The wireless connections bandwidth is smaller than in wired connections. • Are more prone to be attacked because they can be accessed from anywhere, although there are several methods to encrypt the communication. • The roaming can stop any communication between the devices of the network. • Wi-Fi is not compatible with other wireless technologies like Bluetooth [3], UMTS [4], etc. The wireless LAN network is mainly used to transmit data, but there are many other applications. One of the most well known applications is the indoor positioning system. The localization is made using the access point’s received signal strength and it is possible the use of different mathematical methods [5]. There are many other applications such to provide connectivity in meetings, wireless VoIP, wireless IPTV and so on. Most of them are a service guided to final client. In this paper, we use the data obtained from the WLAN in order to study the mobility of the users. The roaming information can be used to know the behaviour of the people in a place, to relocate the bandwidth and how they change from a building to another. This information will let us know the movement of the users, what buildings are most visited, etc. The rest of the paper is organized as follows. In section 2, we discuss the related work. Section 3 shows our university wireless network. People tracking measurements can be observed in section 4. Section 5 shows the people behavior in our campus wireless network. Finally, Section 6 presents our conclusion and future work. II. RELATED WORK We have found several works related with mobility people and tracking. Some of them are the following. In [6], Z. Chen et al. presented a system that works like an indoor GPS. It uses RFID and provides directional instructions for users while tracking things. It is called DynaTrack and consists of three key parts which are the RFID tags and readers, database servers that hold information about things’ location and the DynaTrack client side interface. This system uses a dynamic or static system tags, depending on if it is an object or a person. Also, they tell us that if an object, initially labeled as static, begins to move, the system is able to change its address dynamically. Another example about tracking system is the one presented by J.G. Markoulidakis et al. in [7]. In this paper, we can see a new system based in Third Generation Mobile Telecommunication Systems (TGMTS) and the three basic types of mobility models that are appropriate for the full range of the TGMTS design issues. They propose a methodological modeling approach called Integrated Mobility Modeling Tool (IMMT). IMMT tries to improve some aspects of other systems like the validation of the theoretical input assumptions and analytical models or the effect of the mobility model accuracy. The authors in [8] show the possibilities of utilizing RFID, Wi-Fi and BlueTooth wireless technologies in personnel/equipment tracking and mapping mine works of Pollyanna (underground mine in Oklahoma). Other wireless technologies, as the conventional satellite GPS technology, are not feasible there. They evaluate the advantages in the real-time location services (RTLS) technology to determine their applicability and limitations to underground mining at the Pollyanna. In [9], B. Issac et al. presented a predictive mobility management system which could make mobility on an IEEE 802.11 network more proactive with minimum loss and delay, when compared to existing schemes. Their proposal is focused on WLAN installations within a restricted campus and to predict the mobility path of a mobile node and use that information to lessen the handoff delay. A wireless indoor tracking system, based purely in software because no additional hardware is required, is described in [10]. It can be used to track and locate both moving and static WLAN-enabled devices inside a building. The system uses complex mathematic algorithms and determines the locations of the mobile devices according to the received signal strength from visible access points. The author categorizes the WLAN-based location determination algorithms, into two groups: deterministic and probabilistic algorithms. Finally, he concludes the paper making some reflections about the number of APs and their correct localization in order to obtain reliable results, among other things. There are other works that show a study and even try to imitate the human behavior movements through simulations. One of them is the paper presented by T. Liu et al. in [11]. They present a model in order to mimic human movement behavior. It is built as a two-level hierarchy in which the top level is the global mobility model or GMM (a deterministic model that is used to create intercell movements) and the bottom level is the local mobility model or LMM (a stochastic model with dynamically changing state variables to model intracell movement). Another example about simulation human behavior is given in the paper presented by C. Bettstetter [12]. It shows a model that can be used in simulations of mobile and wireless networks. He uses a combination of principles for direction and speed control to provide the movement of the users. It shows the calculation process to simulate changes of speed, stop-and-go behaviors or address control, among others. In summary, the works presented previously carried out studies only related with users' tracking, except for [11] and [12] that develop simulation models of people's mobility. In all of these papers, the buildings are considered as objects instead of groups of APs. This paper presents a different work; because we studied the users’ mobility through grouping APs in several buildings, no matter which person is. With these data we could relocate some services and the displacement of the users would be more efficient. III. WIRELESS NETWORK DESCRIPTION The Polytechnic University of Valencia is distributed on three Campuses. One of them is located in Valencia and contains about 80% of the students and staff of the University. It has a dimension of about three kilometers long and one kilometer wide. There are two smaller campuses in the nearby cities Gandia and Alcoy. There are around 4,000 researchers and educational personnel, around 1,500 staff and around 36,000 students among the three campuses. The distribution of students in each faculty is shown in Table 1. On these Campuses, a wireless IEEE 802.11 b/g network is deployed. It comprises more than 575 access points to get full coverage, including not only the buildings and offices, but the surrounding gardens and open space between these buildings. So, any person in the UPV can roam seamlessly between any locations. The distribution of these access points is: 33 APs are in the Campus of Gandia, 42 APs are in the Campus of Alcoy and 500 APs are in the main Campus (Campus de Vera). The APs are installed to allow the users a continuous coverage as they roam throughout a facility. The coverage of each access point varies between 30 m at 54 Mbps and 137 m at 1 Mbps for indoor environments. The access points are from Cisco Systems Inc. (models 1130, 1140 and 1300) and they are configured with three simultaneous SSIDs, one with VPN authentication, another one with 802.1X authentication and the last one interacted into the EDUROAM (European roaming project) for visitors. Any member of the University, and from others via EDUROAM, has free access to that wireless network. IV. PEOPLE TRACKING MEASUREMENTS It is quite complicated to predict if the students will visit more times some buildings than others. This study could be used to relocate some schools and services in order to obtain a more effective and efficient distribution or even to help planning the construction of a new university. In this section, the measurement process will be explained in order to analyze the number of users' change between buildings. A. Baseline measurement In order to gather information from the wireless network, the SNMP agent was activated in all wireless APs using only the required messages. Every time a MAC address is associated to an AP, it sends a SNMP trap message to a central server. This information is stored in a database to be processed and analyzed. First, APs are grouped according to the building where they are placed. This activity was not difficult because in our university each AP has an unique identifier, formed by the name from the building and the MAC address. All the APs in a building can be grouped easily using the same badge. The database contains several tables in order to analyze the information. There is a table that stores the day and the month of the information jointly with the AP DNS name and the MAC that has been associated. Another table relates every access point with the building where it is placed. These tables allow us to make several queries such as: • MACs registered • Buildings with wireless access points • MACs in every building • MACs that roam between buildings • MACs that roam between buildings every day • MACs that roam between buildings every month • MACs associated to every AP during a day • MACs associated to every AP during a month • APs where each MAC has been associated in a day • APs where each MAC has been associated in a month TABLE I. PEOPLE REGISTERED IN EACH BUILDING Building E. Politecnica Superior de Alcoy E.T.S de Ingenieria de Informatica E.T.S. de Arquitectura E.T.S. de Gestión de la Edificación E.T.S. de Ingenieria del Diseño E.T.S. del Medio Rural y Enología E.T.S.I. de Agronomos E.T.S.I. de Caminos, Canales y Puertos E.T.S.I. de Telecomunicación E.T.S.I. de Geodesica, Cartografía y Topología E.T.S.I. de Industriales E. Politecnica Superior de Gandia F. de Administración y Dirección de Empresas F. de Bellas Artes Total People registered 2298 3240 3858 2920 4794 1074 1841 3145 1409 1027 3479 2320 2271 2334 36010 Once the queries can be performed, we can process the information. B. Data processing The people tracking measurement process is based on the number of people roaming among buildings. It is also measured where the people stops during a period of time. These measurements let us know the quantity of movements among all the buildings in the campus. In order to estimate the time that an user takes to go from the A building to another B building, we keep in mind that it could be the C building inside this itinerary. Roaming will exist among the A building, the C building and the B building, but the displacement will be considered from the building A to the B building. This study cannot be considered as a system of privacy intrusion, because this system does neither save a correspondence list of each person, nor their MAC addresses. Only the amount of movements is interesting. Once all APs of each building have been grouped, the roaming among the APs of the same building will not be taken into account because these movements are inside the same building and the user does not move among buildings. All these data has been stored in a database during a month to carry out this study. Firstly, the data have been purified because there was some information that was not useful to this study. These data have been taken daily and, therefore, we can show the information gathered during a regular day or show the information about monthly activity. In order to process the data we have used a spreadsheet Excel 2007 with the NodeXL tool [13]. NodeXL is an extendible toolkit for network overview, discovery and exploration. The core of NodeXL is a special Excel 2007 workbook template that structures data for network analysis and visualization. Six main worksheets currently form the template. There are worksheets for “Edges”, “Vertices”, and “Images” in addition to worksheets for “Clusters,” mappings of nodes to clusters (“Cluster Vertices”), and a global overview of the network’s metrics (“Overall Metrics”). As we will see in the following section, this software tool allows visualize the roaming among the buildings, the quantity of roaming made, filter the quantity of roaming, etc. NodeXL is a powerful tool that can help us analyze the behavior of the network. NodeXL aims to make analysis and visualization of network data easier by combining the common analysis and visualization functions with the familiar spreadsheet paradigm for data handling. The tool enables essential network analysis tasks and thus supports a wide audience of users in a broad range of network analysis scenarios. C. Roaming during a day in the Vera Campus Table II shows the numbers of changes among the buildings in one day. The rows represent the number of users that roam from that building to another. The situations where there is no mobility among a pair of buildings, that is, there is no MAC roaming between that two buildings in a day, are represented with a dash (-). The biggest value obtained in the user’s mobility during a day is carried out from the building “E.T.S. de Gestión en la Edificación” and the “E.T.S. Ingeniería Informñatica” (4912 roamings). This is because of the buildings situation. The easiest way to access the “E.T.S. Ingeniería Informática” building is through the “E.T.S. de Gestión de la edificación” building. Furthermore, this last building is located in front of a tram stop, so it is an entry zone to this part of the university. In Table II, it can be seen that “E.T.S. of Telecommunication” building has many roamings to other buildings. The reason is similar to the previous one, in front of this building there is also a tram stop and this building is located in the central area of the main campus. Among the “E.T.S. de Telecomunicación” and “E.T.S. de Caminos, Canales y Puertos” there are 2290 roamings in a day, this is because it is needed to cross the “E.T.S. de Telecomunicación” building to arrive to “E.T.S. de Caminos, Canales y Puertos” building. Another building that has a lot of roamings is the “E.T.S.I. Geodésica, Cartográfica y Topografía” building. In this case these roamings were caused because it is placed near the snack bar. This snack bar has wireless coverage thanks to the APs of the “E.T.S.I. Geodésica, Cartográfica y Topografía” building. We will see several movements related with this building in our studies. Lastly, among the “E.T.S.I. Caminos, Canales y Puertos” building and “E.T.S. Arquitectura” building there are 2202 roamings by day. These roamings are due to: a) the proximity between both buildings and b) the relationship of contents that are taught in both buildings. May be students and/or professors walk from one building to the other in order to carry out theoretical or practice classes. D. Roaming during a month in the Vera Campus Table III shows the roamming value carried out during a month among the buildings of the Vera Campus of the Polytechnic University of Valencia. In this Table the data movements from one building to another and viceversa have been added. That is, we have not considered the direction of the roaming. The maximum number of roamings in one month is carried out among the “E.T.S. de Gestión en la Edificación” building and “E.T.S. Ingeniería Informática” building. We explained why before. The number of roamings between “E.T.S. de Telecomunicación” and “E.T.S. de Caminos, Canales y Puertos” buildings was 26746. In this case roamings were due to the proximity of the buildings and because it is necessary to cross the building “E.T.S. de Telecomunicación” to arrive to “E.T.S. de Caminos, Canales y Puertos” when the people come from the tram. ― 15 4912 986 ― ― ― 111 195 ― 249 ― ― 137 200 ― ― ― ― 279 27 7 12 17 ― 9 ― 2 4 E.T.S. Medio Rural y ― Enologia E.T.S.I. Agronomos ― E.T.S.I. Caminos, Canales y 2 Puertos ― E.T.S.I. Telecomunicación 2 663 1379 1307 458 20 218 2270 4 94 12 32 491 742 537 475 ― 965 434 ― 16 7 20 7 ― 10 24 ― ― ― ― ― ― ― ― ― ― ― ― ― ― ― 86 ― ― ― 52 ― ― ― ― ― E.T.S.I. Geodesica, Cartografica y Topografía E.T.S.I. Industriales E. P. S. Gandia Facultad Administración y Dir. de Empresas Facultad Bellas Artes ― 24 4 ― ― ― ― 2202 ― ― ― 248 50 92 304 1 11 ― 47 40 ― ― ― ― ― 55 ― ― ― ― 47 49 E.T.S.I. de Geodesica, Cartografía y Top. ― 507 28 100 95 50 2 1047 12 5 76 4 72 ― E.T.S.I. Industriales E. P. S. Gandia F. de Administración y Dir. de Empresas 64 ― ― ― ― 163 315 1350 6704 845 8591 15180 17704 F. de Bellas Artes 341 ― 494 568 ― 96 10429 1276 F. de Adm.y Dirección de Empresas ― E. P. Superior de Gandia 42 E.T.S.I. de Industriales 40 ― 67 7344 E.T.S.I. de Geodesica, Cartografía y Top. 113 ― 136 7906 E.T.S.I. de Telecomunicación ― ― E.T.S.I. de Caminos, Canales y Puertos ― ― ― 701 ― E. P. S. Alcoy 67 378 389 161 2 E.T.S de Ingenieria de 15643 62768 5806 166 Informatica E.T.S. Arquitectura 13226 4163 267 E.T.S. de Gestión de la 5535 494 Edificación E.T.S. de Ingenieria del 98 Diseño E.T.S. del Medio Rural y Enología E.T.S.I. Agronomos E.T.S.I. de Caminos, Canales y Puertos E.T.S.I. de Telecomunicación E.T.S.I. de Agronomos ― ― E.T.S. de Ing. del Diseño E.T.S. del Medio Rural y Enología 428 ― 385 564 ― E.T.S. de Gestión de la Edificación ― 7 ROAMING BETWEEN BUILDINGS IN A MONTH. E.T.S. de Arquitectura ― ― E.T.S de Inge. de Informatica Facultad De Bellas Artes ― ― E. P. S. Gandia ― E.T.S.I. Agronomos ― E.T.S. Medio Rural Y Enologia ― E.T.S. De Ingenieria Del Diseño Facultad De Administración y Dirección de Empresas 6 E.T.S.I. Industriales E.T.S. Ingenieria del Diseño ― ― 1296 ― ― E.T.S.I. Telecomunicación ― ― E.T.S.I. Geodesica, Cartografica y Top. 3 E.T.S. Arquitectura E.T.S. Gestion en la Edificación ― TABLE III. E.T.S.I. Caminos, Canales y Puertos E.T.S Ingeniería Informática E.T.S. Arquitectura E. P. S. Alcoy E.T.S. Gestion en la Edificación E. P. S. Alcoy ROAMING BETWEEN BUILDINGS IN ONE DAY. E.T.S Ingeniería Informática TABLE II. 70 2 1231 3448 652 9314 502 670 7906 7531 15996 1572 8389 698 1837 2431 1914 3304 7644 3214 7804 334 3470 636 423 365 19 184 20 78 38 3104 3139 487 11437 572 965 708 26746 464 5811 557 577 958 7785 1054 1286 1181 767 979 1162 99 796 39 168 ― E. Roaming between Campuses Figure 1 shows the values of the roamings carried out among the different campuses of the Polytechnic University of Valencia during a month. These campueses are Escuela Politécnica Superior de Gandia (located in Gandia city), Escuela Politécnica Superior de Alcoy (located in Alcoy city), E.T.S. Medio Rural y Enología (located in one of the main avenues of Valencia City). 480 145 11086 161 230 10 There were also many changes between “E.T.S. Arquitectura” building and the “E.T.S. de Telecomunicación” building (17704 movements in a month). The “E.T.S. Ingeniería del Diseño” and “E.T.S.I. Industriales” buildings have also a lot of roamings. These buildings have many users registered (see Table I). There are many roamings between these buildings due to the likeness of the studies. It seems that there are many subjects imparted by the same department, so there are professors moving between these buildings indistinctly. “F. de Bellas Artes” building had less roamings. We think that it is because “fine arts” students do not have as much computers as the students of the other buildings. Lastly, “E.T.S. Medio Rural y Enología”, the “E.P.S. Alcoy”, and “E.P.S. Gandia” have very few movements between them (there are 1350 roamings among “E.P.S. Alcoy” and “E.P.S. Gandia”). This is because these buildings belong to different campus located in different cities. There are users that one day can be in a campus and, after some hours, they are in another campus. In this case there is a hard-roaming because the user loses the connection during a large time because the user is travelling. If we take into account the buildings of the Vera Campus we observe that the most number of roamings are between all the campuses and the Vera Campus. 1164 UPV Campus de VERA 1844 2768 5497 E.T.S. del Medio Rural y Enología Escuela Politécnica Superior de Alcoy 2 (Av. Vicente Blasco Ibáñez ) 20 Escuela Politécnica Superior de Gandia 1350 Figure 1. Roaming between Campuses The number of movements in a month between the Gandia's campus and the Vera's campus are 5497. It has been the highest value. There are quite a lot of movements between Gandia’s campus and Vera’s campus because they are relatively near (around 56 km.), there is a good public transport communication and many professors of Gandia's campus also work in Vera's campus. The number of roamings among “E.T.S. Medio Rural y Enología” and Vera's campus is 2768 and the roamings between Alcoy's campus and Vera's campus is quite lower (1844 roamings). We can see in Figure 1 that Vera's campus is the campus that receives more visits. This result is a prospective fact because Vera's campus is the main campus of our university and most of the formalities, solicitudes and administrative issues are made there. Lastly, we can see that 1350 movements per month are carrier out among "E.P.S. de Gandia" and "E.P.S. de Alcoy". The main reason of these movements is the existence of many professors that give classes in both campuses. V. TABLE IV. PEOPLE BEHAVIOR In this section, we will evaluate the users' movements by day in the Vera's campus. We will also analyze the number of changes carried out per user in a day. In Figure 2, the 5 highest roaming values between buildings are shown. The situation of more mobility is given among “FI” and “GE”. It has a value of 4912. In this figure, all of displacements shown have a higher value than 1834 movements/day. In this case, the movements are given among “IND”-“BIB”, “DSIC”-“EI”, “ARQ”-“BIB” and "CASALU”-“BIB”. With these data we can obtain some information. E.g. the students of “E.T.S. Arquitectura” and “E.T.S.I. Industriales” visit the university library more times than the other students of the university. On the other hand, there are many movements among the university library building and the “Student's house” building (this building is used by the students to study, to connect to Internet and to develop any activity). This movement is due to the vicinity of buildings (see Figure 2) and many users that are in one of the buildings usually visit the other building. In Figure 3, the 10 highest roaming values are shown. In this case, we have the 5 previous movements (see Figures 2) and 5 more. These 5 new displacements are carried out among “GE”-“DSIC”, “GE”-“ARQ”, “FI”-“EI”, “ARQ”-“ASIC” and “ARQ”“CCP”. The minimum number of roamings of all displacements seen in Figure 3 is 1483 per day. One of the buildings that had more movements is “ARQ” (E.T.S. Arquitectura). The main reason seems to be because some services are offered in this building. For example, this building has some snack bars, and there are some banks in the bottom plant. We can also find a hairdresser, bookstores, etc. and it can be found a great number of movements among this place and other buildings. Figure 4 represents all the Vera's campus movements during one day. Almost all of buildings have users' mobility. We can state that the wireless network of our university is very robust. This network can support the mobility of all users giving the appropriate service. Lastly, we analyzed the number of changes per person. This information is shown in table IV. Expression (1) is used to extract the number of changes per person. Changes Person = Total _ changes _ between _ buildings registered _ people _ Building _ 1 + registered _ people _ Building _ 2 (1) The buildings that have the biggest number of movements per person are “E.T.S. de Gestión en la Edificación” and “F. Informática” buildings. They obtained a value of 0.797 movements per person. The movements among “IND”-“BIB” and “ARQ”-“BIB” also possess a high number of changes per person, 0.644 and 0.608 respectively. VI. CONCLUSION AND FUTURE WORK In this article, we have presented a user mobility study based on the roaming of the MACs in the wireless network of the “Universidad Politécnica of Valencia”. We have studied those buildings with higher mobility in the campus. We have also studied the mobility between campuses. Buildings with Roaming FI-GE ARQ-BIB IND-BIB CCP-ARQ FI-EI GE-DSIC FI-DSIC EI-GE TEL-ARQ CASALU-ARQ CHANGES/PERSON BETWEEN SOME BUILDINGS . Registered People Building 1 3240 3858 3479 3145 3240 2920 3240 60 1409 ― Registered People Building 2 2920 ― ― 3852 60 40 40 2920 3858 3858 Changes Changes/person 4912 2344 2239 1772 1744 1705 1484 1380 1347 1308 0,797 0,608 0,644 0,253 0,528 0,576 0,452 0,381 0,256 0,339 Using the obtained data we can analyze the behavior of students and professors in the campus. This study let us build relocation bandwidth scenarios to increase the comfort of the end user, i.e., if we note that a set of users go far to an area, we could determine in detail where do they go. May be this information could be used to reallocate services and departments in the campus by changing their place or putting a branch near the appropriate place. This analysis will be the basis for a dynamic management and control system of the wireless network. According to the user mobility, the system will be able to give more bandwidth in those areas where there are more users, and the roaming system will be more efficient. REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] IEEE 802.11-2007 Standard. Available at http://standards.ieee.org/getieee802/download/802.11-2007.pdf Wi-Fi Alliance. Available at http://www.wi-fi.org/ [accessed, July 14, 2009] Bluetooth SIG. Specification of the Bluetooth system. Specification Version 1.1 (Feb. 2002). Bluetooth SIG. E. Dahlman, B. Gudmundson, M. Nilsson and J.Sköld, “UMTS/IMT-2000 based on Wideband CDMA”, IEEE Communications Magazine, vol. 36, pp 7080, September 1998. M. Garcia, J. Tomás, F. Boronat and J. Lloret, “The Development of Two Systems for Indoor Wireless Sensors Self-location”. Ad Hoc & Sensor Wireless Networks, vol. 8, num. 3-4, pp. 235-258. 2009. Z Chen and W Chew, “DynaTrack: Dynamic Directional Instructions for Tracking Assets and People in Office Environment”, Available in http://hci.stanford.edu/srk/cs377a-mobile/project/final/chen-chew.doc J.G.Markoulidakis, G.L.Lyberopoulos, D.F.Tsirkas, E.D.Sykas, “Mobility Modeling in Third Generation Mobile Telecommunication Systems”, IEEE Personal Communications, vol. 4, Issue. 4, pp 41-56. Aug. 1997. G. Radinovic and K. Kim, “ Feasibilty study of RFID/ Wi-Fi / BlueTooth wireless tracking system for underground mine mapping – Oklahoma”, In procedings of “Incorporating Geospatial Technologies into SMCRA Business Processes”, Atlanta, GA, March 25 – 27, 2008. B. Issac, K. Hamid and C.E.Tan, “Wireless Mobility Management with Prediction, Delay Reduction and Resource Management in 802.11 Networks”, IAENG International Journal of Computer Science, Vol.35, Issue 3. August 2008. R. Zhou, “ Wireless Indoor Tracking System (WITS)”, In proceedings of 12th in a series of conferences within the framework of the European University Information Systems Organisation (EUNIS), Tartu, Estonia. 28-30 June, 2006 T. Liu, P. Bahl and I. Chlamtac, “Mobility Modeling, Location Tracking, and Trajectory Prediction in Wireless ATM Networks”,IEEE Journal Selected Areas in Communications, Vol. 16, No. 6, pp. 922-936. August 1998. C. Bettstetter, “Mobility modeling in wireless networks: categorization, smooth movement, and border effects”, In proceedings of ACM SIGMOBILE Mobile Computing and Communications Review (MC2R), vol.5 no.3, p.55-66. Rome, Italy. 16-21 July 2001. M. Smith, B. Shneiderman, N. Milic-Frayling, E.M. Rodrigues, V. Barash, C. Dunne, T. Capone, A. Perer, and E. Gleave, "Analyzing (Social Media) Networks with NodeXL", In Proceedings of the Fourth International Conference on Communities and Technologies, C&T '09. The Pennsylvania State University, USA. June 25-27, 2009. Figure 2. 5 highest roaming values in Vera’s Campus Figure 3. 10 highest roaming values in Vera’s Campus Figure 4. All roaming values in the Vera’s Campus