High Performence SDWLAN
High Performence SDWLAN
High Performence SDWLAN
The next research project defining progress in state of the art is from the
German Innovation Laboratories for Telecommunication Networks in 2014 [25]. They
created the architecture called AeroFlux which is built upon an Odin framework. The
architecture is built on two layers of the control plane. One layer is represented by
an element that controls frequent events near the point where they occur, close to
the data plane, and that is why it is called Near-Sighted Controller (NSC). A general
event that needs a "helicopter" view of the network is controlled by a Global
Controller (GC), a logically centralized part of the control layer. As part of the
AeroFlux [26] architecture, the Light Virtual Access Points (LVAPs) are defined for
each physical AP. LVAPs have stored associations of the station (e.g., each client
station has one LVAP) and authentication status, as well as the OpenFlow rules. On
the individual APs, a Radio Agent (RA) is installed which processes LVAPs. When
the client station handoffs between APs, GC asks NSC to move LVAP to this new
AP. The handover process does not need an additional authentication. This is
achieved by extended OpenFlow rules called Wireless Datapath Transmission rules
(WDTX) which define per-flow 802.11 properties. The test results show transition
times of approximately 20 ms, which is a very good result. On the other hand, this
approach uses a huge number of devices in the control layer generating a lot of
signaling messages and that reduces WLAN data payload throughput. This study is
one of the main sources of an inspiration in solving the project and points out that
modern times increasingly require WLANs to be centrally managed.
A natural evolution of AeroFlux is OpenSDWN [27]. OpenSDWN uses LVAP
from Odin and extends it to NFV and three new features: (i) unified programmability
and abstractions of virtualized APs and virtualized middleboxes to handle and
migrate per-client state; (ii) programmable datapath to control per-flow wireless
transmission settings; (iii) participatory interface to allow users to define priorities
and policies. AeroFlux and OpenSDWN define today's state of the technology for an
open source solution for the management of 802.11 architectures.
2.8. Summary
The solutions analyzed in this section illustrate the drawbacks and challenges of
connecting SDN and IEEE 802.11 technologies which need to be addressed. The
scientific challenges are: scalability in means of using any non-vendor specific
hardware components and controllers which can be distributed; management
options to entirely adjust all controlling to your specific needs and avoid
interferences and collisions; fully use OpenFlow standard advantages (e.g.,
Experimenter messages) to improve security, clean the architecture and make it
transparent. SDN security is a big challenge because its programmable aspect
presents a complex set of problems to cope with. In this context, wireless networks
are more vulnerable than fixed wired networks since broadcast wireless channels
easily allow message eavesdropping and injection. Security is minimally specified in
SDN; thus, the OpenFlow specification does not describe the security format to
ensure data integrity [2]. SDN security will require more sophisticated encryption and
authentication mechanisms to prevent hackers. In developing solutions to address
the myriad of security challenges in SDNs, we need to cope with one primary
challenging issue: managing the trade-offs between the network security and
performance.
In this article we try to target management options, usage of OpenFlow
standard specification and security issues. We are not trying to target scalability
separately because that challenge is not fully within our scope and we explained
why in the Introduction.
3. The Architecture of Proposed SDN Network
This section presents the SDN architecture for the IEEE 802.11 wireless
infrastructure. It includes architecture design, description of components and
explanation of proposed SDN network. Our approach uses a concept of the virtual
access point to simplify management and ensure client mobility without a
requirement of modification at client side. Our architecture design goals are
providing simplified management and client mobility. Moreover, we keep in mind the
following goals:
• maximize 802.11 throughput;
• efficiently perform SDN management signaling and creating resources to better
manage a wireless and a wired part of a network;
• provide fast seamless handover even for delay sensitive applications;
• improve WLAN security.
3.1. High-level Architecture
Our approach supports three standard layers of the SDN architecture:
Application, Control, and Infrastructure. Our contribution is focused on the client's
mobility and authentication that both run at the application layer. Communication
between the application layer and the control layer is provided by API. The API
modules are running in the SDN controller. Floodlight SDN controller was used in
our implementation.
Communication between the control layer and the infrastructure layer is
performed by an OpenFlow protocol [28], which represents SDN standard in the
scientific area and specifies mechanisms for its extension. In order to improve a flow
processing on WTP, we have extended the OpenFlow protocol. The extension
simplifies wireless management in the SDN architecture and unifies wireless and
wired management to one control channel. Furthermore, the infrastructure layer is
divided into two sublayers for wired and wireless parts. The transport sublayer
represents a wired part of the network and radio sublayer for a wireless part of the
802.11 network infrastructure. Transport and radio sublayers are linked via the WTP
component. This component represents an edge forwarder, considering a wired part
point of view (Transport sublayer). The architecture is primarily focused on
802.11 standard, but the Radio sublayer can be used for other wireless technologies
e.g., Bluetooth, 802.15.4. The Radio sublayer's protocol is untouched which results
in ability to use even current devices. Additionally, the behavior of devices in the
Radio sublayer is possible to change only via WTP component in accordance with
802.11 standard.
The architecture components (Figure 1) providing all key functionalities for the
management of
802.11 network infrastructure are the following:
• Authentication server—provides standard authentication server for WPA2
Enterprise authentication. This component communicates with the SDN
Controller via Radius protocol.
• High-level abstraction framework—provides a high-level abstraction for
programmers to simplify the development and improvement of new services to
the network. A mapping of high-level functions to the OpenFlow control
messages is not introduced in this work. Solutions like [10] already provide some
level of abstraction.
• SDN Controller—represents the main central control component in the
architecture due to the fact that the control plane is situated in it. The SDN
controller contains applications which provide network services. These
applications are on top of the SDN controller and communicate between them.
The SDN controller is implementation dependent. The used Floodlight controller
allows applications to be built on REST API or as a module.
• Mobility service—contains decision making for performing handover and modifies
the client's traffic flow to a new WTP. The VAP management is performed by
this service. This management contains all VAPs in the network with their
position (WTP identification) and statistics.
• Authentication service—ensures an authenticator role for WPA2 PSK or WPA2
Enterprise authentication. It has to store all encryption keys for all client
stations. These keys are distributed to the Encryption and Decryption
component (EnDeC). Within this application we have a key management to
ensure the mentioned functionality.
• SDN forwarder—rep) resents a standard SDN OpenFlow forwarder without any
modification. It contains a forwarding plan of the network and supports only a
wired network. In our case it is Ethernet.
• Encryption and Decryption component (EnDeC)—is a new component in the
architecture for WPA2 encryption and decryption functionality. This functionality
was moved from WTP to this new specialized component. This movement is
done with the goal to increase security and unload access point.
• Wireless Termination Point—represents the access point for client stations.
This component has restricted 802.11 functionality because some of the 802.11
functions are moved to other components (to SDN controller and EnDeC). The
encryption keys are not stored in WTP which results in improved security
because despite an attacker having physical access to WTP he is not able to
get the encryption keys. The WTP user a Split-MAC mode [29]. A list with
802.11 functionalities is depicted in Table 1.
Figure 1. High-level architecture.
Table 1. Distribution of the 802.11 functionality.
The Authentication server and SDN forwarder components provide standard
functionality without modification. The Split-MAC mode divides 802.11 functionalities
into the following three components: WTP, SDN controller, EnDeC (Table 1). The
WTP builds 802.11 data frames and generates 802.11 control and management
frames (e.g., ACK, beacon). This functionality is assigned to WTP in order to unload
the SDN controller and forward payload data fast to the client station. To achieve
this, it was necessary to extend the OpenFlow protocol in order to set
communication between WTP and SDN controller. The communication includes
necessary data for the 802.11 network infrastructure management. The
management and authentication for network infrastructure are performed by the
SDN controller.
The encryption and decryption of client station payload are performed by
EnDeC. EnDeC processes Additional Authentication Data (AAD) headers. AAD
provides input parameters for WPA2 setup and protects the integrity of 802.11
frames. A detailed process flow is described in Section 3.3.
3.2. OpenFlow Extensions
In this part, the proposed OpenFlow extensions are described. All extensions
follow the OpenFlow specification and the implementation details of the extensions
are available on Github [30]. The OpenFlow protocol links the forwarding plane with
the control plane placed in the SDN controller. The OpenFlow forwarder contains
one or more flow tables for packet forwarding. Flow entry consists of match field,
counters and a set of instructions to apply to matching packets. The instructions
contain actions for packet operations. The communication between the SDN
controller and the OpenFlow forwarder is performed via a control channel. In the
architecture, we bring 802.11 extensions for these features:
• Packet type—provides additional information related to a received packet on a
port. It is necessary for correct packet handling within OpenFlow switch packet
processing. In the architecture, two types of the packet can be received in the
WTP component: 802.11 frames; Ethernet frames. Therefore, it is necessary to
distinguish between them. As a result, a new packet type was defined for
recognizing Ethernet frames from 802.11 frames.
• Instructions—contains information for processing the received packet. It contains
actions to discard, modify, queue, or forward the packets. There is missing
trigger functionality which allows one to generate control messages from WTP
to the SDN controller based on received 802.11 frame. For this purpose, we
introduce new trigger instruction: generating OpenFlow message based on
received 802.11 frames. The generating is important for managing states of the
client station and fast handover process.
• Matches—defines fields of a packet which can be compared within flow entries.
New matches are designed for 802.11 frames because original matches were
proposed for Ethernet frames. The matches are required for correct evaluation
rules against processed packet in the OpenFlow forwarder.
• Messages—serve to exchange information between the SDN controller and the
SDN forwarder. For managing 802.11 functionalities of our architecture we
propose new OpenFlow messages to control the wireless part of the network
infrastructure. The new OpenFlow messages are developed for communication
between the SDN controller, WTP and EnDeC. The OpenFlow messages
between the SDN controller and WTP serve for connection management. The
OpenFlow messages between the SDN controller and EnDeC distribute the
encryption keys for accesses of the client stations into 802.11 network
infrastructure. The most important messages are add VAP, remove VAP, probe
information, messages for statistics, add key, remove key. There are other
messages which help manage the wireless part of the network.
All these features are focused on bringing efficiency of wireless network
management via one control channel and the same packet processing as in the
wired part of the network. The other solutions use OpenFlow protocol only for wired
part of the network.
3.3. OpenFlow Protocol Process Flow for Wireless Network Part
This subsection describes a process flow for our extension of OpenFlow
protocol. It considers processes for message flows between:
• SDN controller ^ WTP,
• SDN controller ^ EnDeC.
3.3.1. Association Process
Well-functioning association process is a cornerstone for dynamic provisioning
of network resources. The association process is depicted in the flow chart (Figure
2). Please note that applications with network services are already considered in the
SDN controller for clearer understanding. The association process can be described
in the following steps:
(1) As an initial step, a client station sends a Probe request frame for access
to the 802.11 network infrastructure. The WTP receives it and resends this
request to the SDN controller in a Probe information message. This message
contains a station MAC address. The SDN controller confirms connection
permission for the client station request. This permission is given according to
compliance with the stations' MAC address list. In case of denied access to the
network, the SDN controller does not generate a message for rejected
permission to WTP. If access to the 802.11 network infrastructure is granted,
the SDN controller generates unique BSSID for the client station and sends
VAP to the WTP. This VAP does not contain a client station IP address
because the IP address assignment is performed later. The WTP receives VAP
and generates a Probe response frame. This Probe response frame is sent from the WTP
to the client station. The Probe response frame BBSID field is set based on VAP that
is assigned to the client station.
(2) In the next step, the client station sends an Authentication frame. The
authentication frame content is set to open. The WTP performs the
authentication and generates a response for the client station. WPA2
Enterprise authentication is performed later.
(3) In the third step the client station is associated with VAP. This
association is performed by sending an Association request frame to the WTP. The
WTP generates an Association response frame for the client station. The WTP sends
this response to the client station and in parallel, it sends information about
results of this step to the SDN controller. This information is sent in an Association
information message to the SDN controller and provides information related to the
wireless part of the network. If the WTP rejects association request frame from the
client station, the SDN controller immediately deletes the VAP. The functionality
of automatic response for the Authentication frame and Association request frame is
situated on WTP because the SDN controller decides about allowed connection
in the first step (Probe request) and does not perform it again. Additionally, the SDN
controller controls the connection through WPA2.
(4) In this step, the client station is successfully associated with its VAP on
the WTP. The client station needs to authenticate toward an authentication
server and is also assigned an IP address. These two processes are
independent. The authenticator role is moved to the SDN controller for full
control over the authentication and for security improvement. The supplicant
and the authentication server roles are the same as in the standard
architecture. EAPOL and DHCP communications are forwarded to the SDN
controller. This is needed for full control over the network. In the; EAPOL case,
it is needed because tire; SDN controller is an authenticator and encryption
functionality is moved to the EnDeC component The SDN controller distributes
encryption keys to EnDeC. The traffic forwarding; rules are set to WTP after
successful client station authentication bo the SDN controller. In the DHCP
case, all DHCP messages are transferred to the DHCP server via the SDN
controller. The DHCP server can be situated within the SDN controller or can
be standalone. The SDN controller extracts the client station's IP address and
adds it to VAP management. The same action is done. by the WTP.
3.3.2.Handover Process
The handover is performed by the SDN controller that manages the migration of
VAP between WTPs. The SDN controller performs handover according to statistics
from the WTPs. The handover process is depicted in Figure 3. Our implementation
considers signal strength as a key performance parameter for handover but in the
future work we will present more sophisticated handover algorithms based on other
data like AP toad and number of associated client stations.
The handover process flow is initiated at the SDN controller. The SDN controller
generates a Remove VAP message to the old WTP (WTP1 in Figure 3) and sends
an Add VAP to the new WTP (WTP2 in Figure 3). Then the SDN controller changes
client station data flows in the wired part of the network to the new' WTP. The client
station still sends data to its BSSID. The VAP with the same BSSID is moved to the
new WTP. "Tile VAP migration is transparent to the client station.
Figure 5. Data flow between two client stations in the same 802.11 network.
Encrypted data has to be transferred between WTP and EnDeC with AAD
(Additional Authentication Data) which is also protected against modification. The
length of AAD is from 22B to 30B depending on the presence of an Address 4 field
(6B) and QoS control field (2B). In our architecture we do not use Address 4. The
AAD creates 22B or 24B overhead in the wired part of the network. The 802.11
header is not compatible with Ethernet and therefore, we need to tunnel this data
(AAD + data). The L2 tunnel is enough for this purpose. We use the 802.1ah [31]
protocol called "Mac in Mac" for L2 tunneling. This protocol creates additional
overhead because header has 22B and Ethernet has 14B. The total overhead for
transferred data is 30B or 32B between the WTP and the EnDeC. This overhead
allows transfer of only 1468B or 1470B data in Ethernet. The architecture can use
ICMP protocol to set MTU to one of the mentioned values. Another solution is to use
Jumbo frames between the WTP and the EnDeC.
4. Proof-of-Concept Validation
In this section, correctness and performance of our solution is evaluated under
Colored Petri Nets and two real world scenarios. Design of our testbed is initially
presented. Furthermore, test requirements are summarized for architecture
evaluation. According to the summarized test requirements, two critical real-world
scenarios were defined with regard to delay sensitive traffic and congestion. Finally,
test measurements were performed and evaluated for both scenarios.
4.1. Model of Proof of the Architecture Design
Development of our SDN architecture for IEEE 802.11 wireless infrastructure
represents the development and implementation of a complex process. In parallel,
the behavior of the whole WLAN infrastructure is quite a complex ecosystem. The
proposed architecture can be characterized as a concurrent system due to
simultaneously executing software components, applications, operations, processes
which rely on communication and resource sharing. Colored Petri Nets (CPNs) [32]
are a mathematical instrument for modeling and design validation especially for
protocol validation and packet switched networks e.g., [33]. The correctness of the
communication protocol design can be confirmed by this tool. Therefore, the initial
Proof-of-concept of our SDN architecture was done with CPN.
Prior to the implementation of our architecture, we built a model to prove our
design. Our aim was to validate all process flows between all the components of the
proposed architecture and demonstrate the scalability of the entire network and
radio resources control. The model consists of client stations, two WTPs, the SDN
controller, and the EnDeC. CSMA/CA mechanism, DHCP message exchange
between a client station and a DHCP server and messages for WPA2 authentication
were simplified because they are well-known processes, which have been already
evaluated. DHCP and WPA2 messages are replaced by the simple request and
reply. Our model uses symbolic names for addresses and protocols.
The model includes two layers. The first layer consists of all SDN architecture
components (Figure 6) and their interconnections. The second layer contains a
functional description of SDN components. Our extension of OpenFlow is included.
This hierarchy was used to simplify the extension of the model with other
components. Additionally, all components can be modified without any necessary
changes of connections between components. We have validated our design under
following standard use cases in 802.11 networks including full message flows
between the SDN controller and WTP, the SDN controller and EnDeC. The
validation test case includes: association and disassociation processes, add and
update encryptions key, seamless handover. The evaluation of the use cases was
performed based on Colored Petri Nets properties liveness, boundedness and
reachability. Additionally, we verified states of the model against expected states.
Finally, our model is available online on Github [30].
Figure 6. Interconnections of architecture components in Petri nets.
T
> TAddVAP > fsame loss
Remove VAP
(2)
was set to 0.2 ms. The transmission time T f was set to 0.329 ms for 1500-byte
trans er
payload based on standard 802.11g with Tx rate 54 Mbps. The result of Equation (3)
was 14 frames and this value was not exceeded during simulation. The results for
T = 5 ms and T jn = 0.2 ms are shown in Table 2 and Figure 7, and impacted frames
max m
were in the range from 1.32 % to 1.58 %. For T = 20 ms and T i = 0.2 ms impacted
max m n
frames achieved an average of 6.26 %. The model does not consider frame
retransmissions which results in less frame loss but increases delay.
Table 2. Measurements of handover impact on transmitted frames
Number Average Impacted
Numberof
AverageFrame Numberof Frame
NumberofLost of Handoverswith NumberofSent Frames
Measurement Lossduring Handoverswith Duplicity
Frames Duplicity Duplicit4y7 Frames during
Handover[%] FrameLoss during
Frames Frames Scenario
Handover
1 251 5.12 49 232 4.94 47 30545 1.58
2 235 4.89 49 184 3.2 47 30531 2.37
3 223 5.86 38 197 4.02 49 3 0 5 5 2
30 5 4 2 2.37
4 269 5.38 50 135 3.29 41 30552 1.32
5 263 4.87 54 209 4.75 44 30537 9.54
6 285 5.38 53 170 4.47 38 30 5 3 5
3 0 5 3 4 9.49
7 250 5.68 44 206 4.12 50 30534 9.49
8 212 5.89 36 221 4.51 49 30535 1.41
9 262 45[.35 49 194 4.31 45 30553 9.49
10 259 5.63 46 217 5.16 42 30535 1.55
The network element of the wired network part was represented by a hub. We
know that in real network topology, there is no hut). Our goal was to see the
performance of pure SDN architecture with wireless elements avoiding the influence
of other peripherals like a switch, router, etc. We also wanted to evaluate our VAP
implementation.
Traffic flows were generated with Distributed Internet Traffic Generator (D-ITG)
and for the congestion scenario, we used JPerf
(https://sourceforge.net/projects/iperf/files/jperf/) JPerf is a GUI interface to iPerf
traffic generator suitable for the end to end throughput measurements. D-ITG
generates traffic flows for packet switched networks. D-ITG includes models for real-
time communication traffic . IPerf is used for active measurements of the maximum
achievable bandwidth on IP networks. It measures throughput between two
endpoints.
4.3. Proposed Scenarios for Real Environment Testing
Test requirements were designed to show the performance of our architecture.
In the next step, test scenarios were defined according to test requirements. For
evaluation of the SDN WLAN infrastructure, two crucial aspects are client's mobility
(seamless handover) and the highest achievable throughput between a station and
an AP. Therefore, two scenarios were defined to show that our proposed solution
works well in terms of latency and throughput, with frequently induced handovers,
and that unifying management flows into one control channel does not introduce any
delay increase. Furthermore, tests were performed under simulation of real-world
conditions with interference from the neighboring APs. The proof done under these
condition shows how the processes might work and that is why we did not clean it
out of the surrounding influences. Within the proof-of-concept validation the whole
environment was credible. The Figure of interferences is on Github [30]. In the proof
of concept, we used only existing devices without change of MAC or physical layer,
which conform with existing 802.11 standards.
In the first scenario, data flows of interactive multiplayer first-person shooter
game were used. We wanted an easily reproducible scenario. According to the
previous work [34] we used D-ITG model for Quake3 which is one of the most delay
sensitive scenarios. Delay sensitivity is defined through the network performance
parameters delay and jitter. This scenario is not sensitive to packet loss up to 40%
[35]. In parallel, we enforce multiple seamless handovers between testbed APs to
investigate handover influence.
Handovers were set according to the pedestrian model [36] as well as Cisco
study on Location-Aware WLAN [37]. In the pedestrian model, walking in a passage
has a velocity of around 1.0 ± 0.02 m/s. From the Cisco study, a distance among
APs should be between 11 and 22 m in most indoor locations for real-time
applications. However, they also mention the overlap of wireless cells, which should
be around 20%. According to our tests, the longest distance from AP where we had
a Cisco mentioned minimum signal level of -67 dBm suitable for real-time
application was 17 m. Applying these numbers mathematically, we have calculated
an inter-access point distance to 30 m and an estimated cell size of 17 m. The
overlap is 24%. When we consider previous calculations, we set the handover
interval to 15 seconds. The handover is accomplished with the forced handoff of
VAP between APs. In this scenario we are trying to reflect reality, because the
Doppler effect is negligible for the 802.11g standard at used modulation and
bandwidth. The handovers were repeated six times to exclude possible outliers and
obtain results reflecting sufficient statistics. We have performed 8 measurements
with 100 seconds duration. Across all the tests we have achieved the average delay
of 8.3 ms, jitter of 1.5 ms and packet loss of 0.54 %. In the Figure 9, results from one
of the measurements are depicted. By analyzing the plot and logs we found out that
the maximum delay is 98 ms, the average delay is 5.2 ms, jitter is 1.2 ms and 0.30
% of packets were dropped. We can also observe that the handover does not
introduce any notable delay and all the delay peaks are, to our knowledge, caused
by external interferences.
When we insert our averaged results to MOS formula for a Quake model [35], it
returns 4.18 (the scale is 0 to 5, the higher is better). Note that 'tine? model was
studied for Quake IV and we used it for Quake 3, but there are no significant