1,052 results on '"802.11"'
Search Results
2. Evaluation of the Capabilities of LDPC Codes for Network Applications in the 802.11ax Standard
- Author
-
Boiko, Juliy, Pyatin, Ilya, Eromenko, Oleksander, Karpova, Lesya, Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, Joby, P. P., editor, Alencar, Marcelo S., editor, and Falkowski-Gilski, Przemyslaw, editor
- Published
- 2024
- Full Text
- View/download PDF
3. "The real ethernet": The transnational history of global Wi-Fi connectivity.
- Author
-
Rikitianskaia, Maria
- Subjects
- *
WIRELESS Internet , *IEEE 802.11 (Standard) , *WORLD history , *DATA transmission systems ,EUROPE-United States relations - Abstract
Wi-Fi is an integral and invaluable part of our media practices. Wireless networks are blended into our media environment and, in terms of infrastructural importance, have become comparable with electricity or water. This article offers a new transnational perspective on the underexplored history of IEEE 802.11 standards by focusing on the tensions between the United States and Europe in terms of development trajectories of wireless technology. The goal is to analyze the standardization of wireless networking through a transnational lens and to contribute to enhanced understanding of the global proliferation of Wi-Fi technology. Four particular aspects of the transnational development of Wi-Fi technology are discussed: the rivalry between US and European standards, the constitutive choice to focus on data transmission, radio spectrum availability, and the peculiarities of network authentication. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
4. Wireless Latency Shift Keying.
- Author
-
Johnson, Jacob, Palacios, Ashton, Arvonen, Cody, and Lundrigan, Philip
- Subjects
WIRELESS sensor networks ,TRUST ,PROBLEM solving ,DETECTORS ,INTERNET of things - Abstract
IEEE 802.11 (WiFi) only has two modes of trust---complete trust or complete untrust. The lack of nuance leaves no room for sensors that a user does not fully trust but wants to connect to their network, such as a WiFi sensor. Solutions exist, but they require advanced knowledge of network administration. We solve this problem by introducing a new way of modulating data in the latency of the network, called Latency Shift Keying. We use specific characteristics of the WiFi protocol to carefully control the latency of just one device on the network. We build a transmitter, receiver, and modulation scheme that is designed to encode data in the latency of a network. We develop an application, Wicket, that solves the WiFi trust issue using Latency Shift Keying to create a new security association between an untrusted WiFi sensor and a wired device on the trusted network. We evaluate its performance and show that it works in many network conditions and environments. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
5. RETRACTED CHAPTER: Review on 5G and Wi-Fi 6 Wireless Internet Connectivity
- Author
-
Srivastava, Satish Surendra, Makh, Sanjay, Rodge, P. R., Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, Fong, Simon, editor, Dey, Nilanjan, editor, and Joshi, Amit, editor
- Published
- 2023
- Full Text
- View/download PDF
6. A Comparative Study of Different FANET 802.11 Wireless Protocols with Different Data Loads
- Author
-
Ghassan A. qasmarrogy and Areen Jamal Fadhil
- Subjects
fanet ,data rate ,wireless protocols ,routing protocols ,802.11 ,bandwidth ,Science - Abstract
IEEE 802.11 based Wireless Local Area Networks (WLANs) are becoming popular in home, enterprise and public access areas primarily due to their low cost, simplicity of installation and high data rates. While WLANs continue to be predominantly data centric, there is growing interest in using WLANs for voice and text data especially in enterprise markets. In this paper, a comprehensive analysis comparison to measure the delay, throughput packet loss and retransmission attempts was done to different scenarios using different trending wireless protocols such as 802.11n (2.4GHz, 5GHz), 802.11g, 802.11b, 802.11a while transferring low and high data load in FANET, with two major routing protocols AODV, and OLSR. As concluded in the result, recent wireless technology 802.11n with frequency band such of 2.4GHz can give better performance as they transfer higher data rates with longer distances and frequency band of 5GHz with higher data rate and less distance than 2.4GHz.
- Published
- 2023
- Full Text
- View/download PDF
7. Anten ba băng sử dụng cấu trúc kết hợp DGS-SIW cho các thiết bị WiFi-6E/ WiFi-7 và V2X trong các ứng dụng IoE
- Author
-
Dương Thị Thanh Tú and Nguyễn Văn Hòa
- Subjects
siw (substrate integrated waveguide) ,dgs (defected ground structure) ,anten ba băng ,802.11 ,Technology - Abstract
IoE (Internet of Everything) là xu hướng kết nối mọi thứ vào mạng internet, điều này đòi hỏi các chuẩn công nghệ mới với các yêu cầu cao về độ rộng băng thông, độ linh hoạt trong sử dụng băng tần. Trong bài báo này, một anten ba băng được đề xuất dựa trên cấu trúc anten phẳng nhằm đơn giản về chế tạo và dễ dàng tích hợp trong các mạch thu phát. Anten sử dụng cấu trúc mặt phẳng đất khuyết DGS (Defected Ground Structure) để chủ động tối ưu từng tần số cộng hưởng. Kết hợp với cấu trúc ống dẫn sóng tích hợp trên chất nền SIW (Substrate Integrated Waveguide), anten đề xuất có đặc tính ngăn chặn rò rỉ bức xạ của điện trường, mang lại sự cải thiện về hiệu suất, hệ số khuếch đại cũng như độ cộng hưởng cực đại trên từng băng tần hoạt động. Cộng hưởng tại ba băng tần 2,4GHz, 5GHz và 5,9 GHz với độ lợi cao, băng thông rộng, anten ba băng DGS-SIW có thể sử dụng cho các thiết bị đầu cuối theo các chuẩn không dây tiên tiến như 802.11ax, be, bd, …
- Published
- 2023
8. 차세대 Wi-Fi 8 개발 방향 전망.
- Author
-
Young-myoung Kang
- Subjects
WIRELESS Internet ,STANDARDIZATION - Abstract
Emerging immersive and delay-sensitive applications such as AR, VR, and XR are driving the fast development of the next generation Wi-Fi 8 standard. Whereas Wi-Fi 7 have focused on extremely fast transmission, Wi-Fi 8 aims to ensure reliability. We first explore the technical requirements, current standardization status, new features, use cases, and research challenges for the IEEE 802.11bn ultra-high reliability (UHR), which is the foundation of Wi-Fi 8. We then investigate the innovative key features such as distributed Multi-link operation, determinism, and AP coordination. Finally, we suggest how these could be adopted in the coordination framework, one of the core protocol solutions of the Wi-Fi 8. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
9. Performance Analysis of Aggregation-Enabled IEEE 802.11 WLANs With Variable Aggregation Size
- Author
-
Shinnazar Seytnazarov, Dong Geun Jeong, and Wha Sook Jeon
- Subjects
802.11 ,802.11n ,802.11ac ,802.11ax ,A-MPDU ,frame aggregation ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Aggregation-enabled wireless local area network (WLAN) technologies such as IEEE 802.11n and 802.11ac are deployed densely for wireless access to the high-speed Internet. Conventional approaches for performance modeling of 802.11n/ac assume fully saturated traffic, where stations always have enough packets to transmit aggregate frames of full or fixed aggregation size. However, such an assumption is unrealistic, since stations usually transmit aggregate frames with different aggregation sizes depending on several dynamic factors, such as offered traffic load, number of active stations, transmission rate, and random backoff time. In this work, we propose a new performance model of aggregation-enabled 802.11n/ac WLANs for different traffic loads and buffer sizes with the assumption that stations always have at least one packet to transmit. Unlike conventional models where stations always contend to transmit aggregate frames of maximum or other fixed aggregation size, the proposed model dynamically determines the aggregation size based on given offered traffic load, number of stations, transmission rate, and random backoff process. Performance evaluations showed that the proposed model produces remarkably accurate performance estimates for throughput, especially for higher traffic loads.
- Published
- 2023
- Full Text
- View/download PDF
10. Obfuscation of Human Micro-Doppler Signatures in Passive Wireless RADAR
- Author
-
Antonios Argyriou
- Subjects
802.11 ,human activity classification ,micro-Doppler ,OFDM ,passive WiFi RADAR ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
When wireless communication signals impinge on a moving human they are affected by micro-Doppler. A passive receiver of the resulting signals can calculate the spectrogram that produces different signatures depending on the human activity. This constitutes a significant privacy breach when the human is unaware of it. This paper presents a methodology for preventing this when we want to do so by injecting into the transmitted signal frequency variations that obfuscate the micro-Doppler signature. We assume a system that uses orthogonal frequency division multiplexing (OFDM) and a passive receiver that estimates the spectrogram based on the instantaneous channel state information (CSI). We analyze the impact of our approach on the received signal and we propose two strategies that do not affect the demodulation of the digital communication signal at the intended receiver. To evaluate the performance of our approach we use an IEEE 802.11-based OFDM system and realistic human signal reflection models.
- Published
- 2023
- Full Text
- View/download PDF
11. Resource Exhaustion Attack Detection Scheme for WLAN Using Artificial Neural Network.
- Author
-
Abdallah, Abdallah Elhigazi, Hamdan, Mosab, Razak, Shukor Abd, Ghalib, Fuad A., Hamzah, Muzaffar, Khan, Suleman, Babikir Ali, Siddiq Ahmed, Khairi, Mutaz H. H., and Salih, Sayeed
- Subjects
ARTIFICIAL neural networks ,WIRELESS LANs ,RADIO waves ,DATA transmission systems ,ACCESS control - Abstract
IEEE 802.11 Wi-Fi networks are prone to many denial of service (DoS) attacks due to vulnerabilities at the media access control (MAC) layer of the 802.11 protocol. Due to the data transmission nature of the wireless local area network (WLAN) through radio waves, its communication is exposed to the possibility of being attacked by illegitimate users. Moreover, the security design of the wireless structure is vulnerable to versatile attacks. For example, the attacker can imitate genuine features, rendering classification-based methods inaccurate in differentiating between real and false messages. Although many security standards have been proposed over the last decades to overcome many wireless network attacks, effectively detecting such attacks is crucial in today’s real-world applications. This paper presents a novel resource exhaustion attack detection scheme (READS) to detect resource exhaustion attacks effectively. The proposed scheme can differentiate between the genuine and fake management frames in the early stages of the attack such that access points can effectively mitigate the consequences of the attack. The scheme is built through learning from clustered samples using artificial neural networks to identify the genuine and rogue resource exhaustion management frames effectively and efficiently in the WLAN. The proposed scheme consists of four modules which make it capable to alleviates the attack impact more effectively than the related work. The experimental results show the effectiveness of the proposed technique by gaining an 89.11% improvement compared to the existing works in terms of detection. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
12. Deep-Learning-Based Carrier Frequency Offset Estimation and Its Cross-Evaluation in Multiple-Channel Models.
- Author
-
Wang, Zhenyi, Wei, Shengyun, Zou, Li, Liao, Feifan, Lang, Weimin, and Li, Yuanzhuo
- Subjects
- *
WIRELESS communications , *MULTIPATH channels , *WIRELESS communications performance , *SIGNAL-to-noise ratio - Abstract
The most widely used Wi-Fi wireless communication system, which is based on OFDM, is currently developing quickly. The receiver must, however, accurately estimate the carrier frequency offset between the transmitter and the receiver due to the characteristics of the OFDM system that make it sensitive to carrier frequency offset. The autocorrelation of training symbols is typically used by the conventional algorithm to estimate the carrier frequency offset. Although this method is simple to use and low in complexity, it has poor estimation performance at low signal-to-noise ratios, which has a significant negative impact on the performance of the wireless communication system. Meanwhile, the design of the communication physical layer using deep-learning-based (DL-based) methods is receiving more and more attention but is rarely used in carrier frequency offset estimation. In this paper, we propose a DL-based carrier frequency offset (CFO) model architecture for 802.11n standard OFDM systems. With regard to multipath channel models with varied degrees of multipath fadding, the estimation error of the proposed model is 70.54% lower on average than that of the conventional method under 802.11n standard channel models, and the DL-based method can outperform the estimation range of conventional methods. Besides, the model trained in one channel environment and tested in another was cross-evaluated to determine which models could be used for deployment in the real world. The cross-evaluation demonstrates that the DL-based model can perform well over a large class of channels without extra training when trained under the worst-case (most severe) multipath channel model. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
13. Evaluation of a Long-Distance IEEE 802.11ah Wireless Technology in Linux Using Docker Containers
- Author
-
Daniils Aleksandrovs-Moisejs, Aleksandrs Ipatovs, Elans Grabs, and Dmitrijs Rjazanovs
- Subjects
linux ,ns-3 ,docker ,wi-fi halow ,ieee ,wireless ,802.11 ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Wireless technologies are essential for modern people to maintain uninterrupted connection to the Internet. The most popular standards for wireless technologies are standards of the IEEE 802.11 family. Currently, data transmission rate achievable by IEEE 802.11ac or 802.11ax standards can reach up to 10 Gbit/s. Different IEEE standards have specific data transmission rates. For example, the IEEE 802.11ah standard or Wi-Fi HaLow (code name) operates in the 900 MHz band, which is an unlicensed frequency band below 1 GHz, and is called the “Sub-1-GHz” range. In theory, this standard can provide coverage range of up to 543 meters indoors and data transfer rate of up to 347 Mbit/s (using a maximum of four spatial streams and 16 MHz channel bandwidth). The great benefit of the 802.11ah standard is low energy consumption, which enables communication between devices from the Internet of Things (IoT) over long distances without using a lot of energy. The Wi-Fi HaLow standard is being studied by the authors of the presented article in the ns-3 network simulation program with the 802.11ah module installed and implemented in Docker containers, VirtualBox Virtual Machines (VMs) with a running Linux operating system. During the simulations, results were obtained for the Docker containers simulation with a limited number of stations over different simulation times. These results have been studied in different scenarios. In the scenarios, the results of the Wi-Fi HaLow network simulation were converted into another simulation time, and thus were compared with each other.
- Published
- 2022
- Full Text
- View/download PDF
14. Quality Efficiency of VoIP Application Using Hybrid Co-ordination Function
- Author
-
Tiwari, Neha, Rishi, O. P., Das, Swagatam, Series Editor, Bansal, Jagdish Chand, Series Editor, Singh, T P, editor, Tomar, Ravi, editor, Choudhury, Tanupriya, editor, Perumal, Thinagaran, editor, and Mahdi, Hussain Falih, editor
- Published
- 2021
- Full Text
- View/download PDF
15. A 600 mV + 12 dBm IIP3 CMOS LNA with G m Smoothening Auxiliary Path for 2.4 GHz Wireless Applications
- Author
-
Sharath Babu Rao, D., Sumalatha, V., Chlamtac, Imrich, Series Editor, Haldorai, Anandakumar, editor, Ramu, Arulmurugan, editor, Mohanram, Sudha, editor, and Chen, Mu-Yen, editor
- Published
- 2021
- Full Text
- View/download PDF
16. Joint Link Rate Selection and Adaptive Forward Error Correction for High-Rate Wireless Multicast
- Author
-
Thomas Geithner, Fikret Sivrikaya, and Sahin Albayrak
- Subjects
802.11 ,forward error correction ,network coding ,rate sampling ,reliable multicast ,transmission rate control ,Telecommunication ,TK5101-6720 ,Transportation and communications ,HE1-9990 - Abstract
Multicast communication over wireless networks has many potential applications, such as real-time audiovisual content distribution or digital signage systems with multiple remote terminals. However, today’s common 802.11 networks cannot fully support such applications at the link layer due to the technical challenges in achieving both high transmission rate and high reliability for multicast data transfers. Those challenges primarily emerge from the inapplicability of immediate acknowledgment mechanisms of unicast transmissions to the multicast case and the need for finding a common transmission rate for all receivers with diverse channel conditions. The research literature in this domain mainly addresses the problem at the higher layers of the protocol stack. In this article, we present a novel approach that combines wireless link rate selection with an adaptive packet-level Forward Error Correction (FEC) mechanism in order to achieve high-rate and highly reliable multicast in 802.11 wireless networks. The integration of FEC into the 802.11 MAC layer allows direct interaction between the transmission rate and the coding scheme. As a result, potential packet losses caused by higher link rates can be compensated by the adjustable redundancy provided by FEC. In combination with an aggregated receiver feedback mechanism, this yields improved transmission efficiency and reliability for wireless multicast. We investigate this approach in a simulation environment under a realistic wireless channel model in various application scenarios with up to 50 receivers. The results represent significant performance improvements, in terms of throughput, channel utilization, and packet loss, over the state-of-the-art methods for reliable wireless multicast.
- Published
- 2022
- Full Text
- View/download PDF
17. Smart Preliminary Channel Access to Support Real-Time Traffic in Wi-Fi Networks.
- Author
-
Chemrov, Kirill, Bankov, Dmitry, Khorov, Evgeny, and Lyakhov, Andrey
- Subjects
WIRELESS Internet ,ELECTRONIC paper - Abstract
Real-time applications (RTA) are an important use case for IEEE 802.11be, a new amendment to the Wi-Fi standard. This amendment introduces new complicated mechanisms to provide low delay and high reliability for RTA, but many of them are not supported by legacy devices that may be present in future Wi-Fi networks. In contrast, the preliminary channel access (PCA) method is designed to satisfy strict RTA requirements even in the presence of legacy devices and does not require significant changes to the Wi-Fi protocol. However, it significantly reduces the capacity for non-RTA traffic. This paper introduces a Smart PCA method, which improves the performance of all the stations in scenarios with multiple RTA stations. Extensive simulation shows that the Smart PCA method guarantees low delays for intensive RTA traffic in these scenarios. Moreover, it doubles the network capacity for the stations with non-RTA traffic. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
18. Site Survey and Analysis of the Student Barracks in the Campus Area
- Author
-
Muhawech, Abd Rahman Subhi and Muhawech, Abd Rahman Subhi
- Abstract
Wireless networking has evolved into being such a smooth, convenient and quick method to get connected to the world wide web, you just connect to the wireless device, and in a matter of seconds, boom, you’re on the internet! The best part of it is not having to use any of those corny copper cables to connect to the internet like how it is done traditionally. There are five student-barracks located in the campus area, and here we use the shared wireless network to connect ourselves to the internet. The students living in these barracks are complaining about having bad experiences with the wireless network. The experienced issues include sudden disruption of connection, very low download speeds and extreme delays during the usage of real-time applications. This thesis is to determine the issue with the wireless network of the student barracks. Afterwards, viable solutions to mitigate and prevent these issues will be presented and discussed. Furthermore, solutions to the found problems in the wireless network will be brought up. The base for these solutions is built by interpreting the results of the measurements and thorough the analysis that is to be carried out in the barracks. Along with the discussion of the solutions, a plan will be presented with the aim of improving the barrack’s wireless network.
- Published
- 2024
19. Deauthentication and Disassociation Detection and Mitigation Scheme Using Artificial Neural Network
- Author
-
Abdallah, Abdallah Elhigazi, Razak, Shukor Abd, Ghalib, Fuad A., Kacprzyk, Janusz, Series Editor, Pal, Nikhil R., Advisory Editor, Bello Perez, Rafael, Advisory Editor, Corchado, Emilio S., Advisory Editor, Hagras, Hani, Advisory Editor, Kóczy, László T., Advisory Editor, Kreinovich, Vladik, Advisory Editor, Lin, Chin-Teng, Advisory Editor, Lu, Jie, Advisory Editor, Melin, Patricia, Advisory Editor, Nedjah, Nadia, Advisory Editor, Nguyen, Ngoc Thanh, Advisory Editor, Wang, Jun, Advisory Editor, Saeed, Faisal, editor, Mohammed, Fathey, editor, and Gazem, Nadhmi, editor
- Published
- 2020
- Full Text
- View/download PDF
20. Practical Comparison of Communication Technologies Suitable for Field Robotics
- Author
-
Hybl, Matous, Jilek, Tomas, Zalud, Ludek, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Woeginger, Gerhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Mazal, Jan, editor, Fagiolini, Adriano, editor, and Vasik, Petr, editor
- Published
- 2020
- Full Text
- View/download PDF
21. Best of Both Worlds: Detecting Application Layer Attacks through 802.11 and Non-802.11 Features.
- Author
-
Chatzoglou, Efstratios, Kambourakis, Georgios, Smiliotopoulos, Christos, and Kolias, Constantinos
- Subjects
- *
COMPUTER network protocols , *DEEP learning , *MACHINE learning , *RECEIVER operating characteristic curves , *SCIENTIFIC community , *WIRELESS Internet - Abstract
Intrusion detection in wireless and, more specifically, Wi-Fi networks is lately increasingly under the spotlight of the research community. However, the literature currently lacks a comprehensive assessment of the potential to detect application layer attacks based on both 802.11 and non-802.11 network protocol features. The investigation of this capacity is of paramount importance since Wi-Fi domains are often used as a stepping stone by threat actors for unleashing an ample variety of application layer assaults. In this setting, by exploiting the contemporary AWID3 benchmark dataset along with both shallow and deep learning machine learning techniques, this work attempts to provide concrete answers to a dyad of principal matters. First, what is the competence of 802.11-specific and non-802.11 features when used separately and in tandem in detecting application layer attacks, say, website spoofing? Second, which network protocol features are the most informative to the machine learning model for detecting application layer attacks? Without relying on any optimization or dimensionality reduction technique, our experiments, indicatively exploiting an engineered feature, demonstrate a detection performance up to 96.7% in terms of the Area under the ROC Curve (AUC) metric. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
22. Reviewing wireless broadband technologies in the peak smartphone era: 6G versus Wi-Fi 7 and 8.
- Author
-
Oughton, Edward, Geraci, Giovanni, Polese, Michele, Shah, Vijay, Bubley, Dean, and Blue, Scott
- Subjects
- *
WIRELESS communications , *BROADBAND communication systems , *DATA analysis , *SPECTRUM allocation , *INTERNET - Abstract
With the arrival of the peak smartphone era, users are upgrading their smartphones less frequently, and data growth is decelerating. To ensure effective spectrum management decisions, policy makers require a thorough understanding of prospective wireless broadband technologies, current trends and emerging issues. Here, we review the sixth cellular generation ('6G'), in comparison to two new Wi-Fi standards, including IEEE 802.11be ('Wi-Fi 7') and IEEE 802.11bn ('Wi-Fi 8'). We identify three emerging issues necessary for successful telecommunication policy. Firstly, evidenced-based policy making needs to be able to measure effectively how much demand takes place where and how. Thus, new datasets are needed reflecting real usage by different wireless broadband technologies, for indoor and outdoor users. Secondly, with data consumption growth slowing, there needs to be an urgent reassessment of spectrum demand versus allocation. Past forecasts do not reflect recent data and regulators urgently need to re-evaluate the implications for spectrum management. Finally, regulators need new and improved Lifecycle Impact Assessment metrics of cellular versus Wi-Fi architectures, to support successful policy decisions which mitigate energy and emissions impacts. • The rate of data growth is slowing in the peak smartphone era. • Policy issues associated with 6G, Wi-Fi 7 and Wi-Fi 8 are identified and evaluated. • New datasets are required measuring where and how demand takes place. • Spectrum managers need to urgently reassess spectrum demand versus allocation. • Lifecycle Impact Assessment metrics are required for future 6G and Wi-Fi architectures. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
23. Evaluation of a Long-Distance IEEE 802.11ah Wireless Technology in Linux Using Docker Containers.
- Author
-
Aleksandrovs-Moisejs, Daniils, Ipatovs, Aleksandrs, Grabs, Elans, and Rjazanovs, Dmitrijs
- Subjects
LINUX operating systems ,IEEE 802.11 (Standard) ,STEVEDORES ,WIRELESS LANs ,LONG-distance running ,INTERNET access ,DATA transmission systems ,SHIPPING containers - Abstract
Wireless technologies are essential for modern people to maintain uninterrupted connection to the Internet. The most popular standards for wireless technologies are standards of the IEEE 802.11 family. Currently, data transmission rate achievable by IEEE 802.11ac or 802.11ax standards can reach up to 10 Gbit/s. Different IEEE standards have specific data transmission rates. For example, the IEEE 802.11ah standard or Wi-Fi HaLow (code name) operates in the 900 MHz band, which is an unlicensed frequency band below 1 GHz, and is called the "Sub-1-GHz" range. In theory, this standard can provide coverage range of up to 543 meters indoors and data transfer rate of up to 347 Mbit/s (using a maximum of four spatial streams and 16 MHz channel bandwidth). The great benefit of the 802.11ah standard is low energy consumption, which enables communication between devices from the Internet of Things (IoT) over long distances without using a lot of energy. The Wi-Fi HaLow standard is being studied by the authors of the presented article in the ns-3 network simulation program with the 802.11ah module installed and implemented in Docker containers, VirtualBox Virtual Machines (VMs) with a running Linux operating system. During the simulations, results were obtained for the Docker containers simulation with a limited number of stations over different simulation times. These results have been studied in different scenarios. In the scenarios, the results of the Wi-Fi HaLow network simulation were converted into another simulation time, and thus were compared with each other. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
24. Wireless Lan Performance Enhancement Using Double Deep Q-Networks.
- Author
-
Asaf, Khizra, Khan, Bilal, and Kim, Ga-Young
- Subjects
REINFORCEMENT learning ,WIRELESS LANs ,ACCESS control ,DEEP learning - Abstract
Due to the exponential growth in the use of Wi-Fi networks, it is necessary to study its usage pattern in dense environments for which the legacy IEEE 802.11 MAC (Medium Access Control) protocol was not specially designed. Although 802.11ax aims to improve Wi-Fi performance in dense scenarios due to modifications in the physical layer (PHY), however, MAC layer operations remain unchanged, and are not capable enough to provide stable performance in dense scenarios. Potential applications of Deep Learning (DL) to Media Access Control (MAC) layer of WLAN has now been recognized due to their unique features. Deep Reinforcement Learning (DRL) is a technique focused on behavioral sensitivity and control philosophy. In this paper, we have proposed an algorithm for setting optimal contention window (CW) under different network conditions called DRL-based Contention Window Optimization (DCWO). The proposed algorithm operates in three steps. In the initial step, Wi-Fi is being controlled by the 802.11 standards. In the second step, the agent makes the decisions concerning the value of CW after the TRAIN procedure for the proposed algorithm. The final phase begins after the training, defined by a time duration specified by the user. Now, the agent is fully trained, and no updates will be no longer received. Now the CW is updated via the OPTIMIZE process of DCWO. We have selected total network throughput, instantaneous network throughput, fairness index, and cumulative reward, and compared our proposed scheme DCWO with the Centralized Contention window Optimization with DRL (CCOD). Simulation results show that DCWO with Double Deep Q-Networks (DDQN) performs better than CCOD with (i) Deep Deterministic Policy Gradient (DDPG) and (ii) Deep Q-Network (DQN). More specifically, DCWO with DDQN gives on average 28% and 23% higher network throughput than CCOD in static and dynamic scenarios. Whereas in terms of instantaneous network throughput DCWO gives around 10% better results than the CCOD. DCWO achieves almost near to optimal fairness in static scenarios and better than DQN and DDPG with CCOD in dynamic scenarios. Similarly, while the cumulative reward achieved by DCWO is almost the same with CCOD with DDPG, the uptrend of DCWO is still encouraging. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
25. The Performance Evaluation of IEEE 802.11 for Different Sized DCF WLAN Under Unsaturated Condition
- Author
-
Abrosimov, Leonid, Rudenkova, Margarita, Barbosa, Simone Diniz Junqueira, Editorial Board Member, Filipe, Joaquim, Editorial Board Member, Ghosh, Ashish, Editorial Board Member, Kotenko, Igor, Editorial Board Member, Zhou, Lizhu, Editorial Board Member, Vishnevskiy, Vladimir M., editor, Samouylov, Konstantin E., editor, and Kozyrev, Dmitry V., editor
- Published
- 2019
- Full Text
- View/download PDF
26. Survey of Passengers’ Origin-Destination in Public Transportation Networks Using Wi-Fi
- Author
-
Ribeiro, João, Zúquete, André, Sargento, Susana, Barbosa, Simone Diniz Junqueira, Editorial Board Member, Filipe, Joaquim, Editorial Board Member, Ghosh, Ashish, Editorial Board Member, Kotenko, Igor, Editorial Board Member, Yuan, Junsong, Editorial Board Member, Zhou, Lizhu, Editorial Board Member, Donnellan, Brian, editor, Klein, Cornel, editor, Helfert, Markus, editor, and Gusikhin, Oleg, editor
- Published
- 2019
- Full Text
- View/download PDF
27. Performance Evaluation of an IPv6 IoT Network Based on 802.11 Standard
- Author
-
Sahye, Toshan Kumar, Sandooyea, Wakeel, Mungur, Avinash, Angrisani, Leopoldo, Series Editor, Arteaga, Marco, Series Editor, Panigrahi, Bijaya Ketan, Series Editor, Chakraborty, Samarjit, Series Editor, Chen, Jiming, Series Editor, Chen, Shanben, Series Editor, Chen, Tan Kay, Series Editor, Dillmann, Rüdiger, Series Editor, Duan, Haibin, Series Editor, Ferrari, Gianluigi, Series Editor, Ferre, Manuel, Series Editor, Hirche, Sandra, Series Editor, Jabbari, Faryar, Series Editor, Jia, Limin, Series Editor, Kacprzyk, Janusz, Series Editor, Khamis, Alaa, Series Editor, Kroeger, Torsten, Series Editor, Liang, Qilian, Series Editor, Martin, Ferran, Series Editor, Ming, Tan Cher, Series Editor, Minker, Wolfgang, Series Editor, Misra, Pradeep, Series Editor, Möller, Sebastian, Series Editor, Mukhopadhyay, Subhas, Series Editor, Ning, Cun-Zheng, Series Editor, Nishida, Toyoaki, Series Editor, Pascucci, Federica, Series Editor, Qin, Yong, Series Editor, Seng, Gan Woon, Series Editor, Speidel, Joachim, Series Editor, Veiga, Germano, Series Editor, Wu, Haitao, Series Editor, Zhang, Junjie James, Series Editor, Fleming, Peter, editor, Lacquet, Beatrys Margaretha, editor, Sanei, Saeid, editor, Deb, Kalyanmoy, editor, and Jakobsson, Andreas, editor
- Published
- 2019
- Full Text
- View/download PDF
28. Designing an Intelligent Jammer for Targeted 802.11b/g/n based Network Devices
- Author
-
Binjola, Swastik, Agrawal, Aayushi, Rawat, Suraj, Nagrath, Preeti, Kacprzyk, Janusz, Series Editor, Bhattacharyya, Siddhartha, editor, Hassanien, Aboul Ella, editor, Gupta, Deepak, editor, Khanna, Ashish, editor, and Pan, Indrajit, editor
- Published
- 2019
- Full Text
- View/download PDF
29. Attention to Wi-Fi Diversity: Resource Management in WLANs With Heterogeneous APs
- Author
-
Jose Saldana, Jose Ruiz-Mas, Julian Fernandez-Navajas, Jose Luis Salazar Riano, Jean-Philippe Javaudin, Jean-Michel Bonnamy, and Mael Le Dizes
- Subjects
802.11 ,seamless handoff ,software defined wireless network ,wireless LAN ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Many home networks integrate a small number (typically 2-4) of Wi-Fi Access Points (APs), with heterogeneous characteristics: different 802.11 variants, capabilities and security schemes. This paper proposes the consideration of these specific characteristics in order to improve the management of network resources. Three use cases are presented in order to showcase the potential benefits. By the use of a user-space AP, which works in coordination with a controller, the network is able to assign each connected station to the AP that best fits with its characteristics. The system also manages security, avoiding the need of adding specific elements for authentication, encryption or decryption. Extensions are proposed to an existing protocol that defines the communication between the AP and the controller, in order to communicate and store the specific characteristics of each AP and end device. This includes new association and handoff schemes that do not introduce any additional delay. The system has been implemented in a real environment, and a battery of tests has been run using three hardware platforms of different characteristics. The results show that handoffs between bands are possible, and estimate the processing delays, the Round-Trip Time and the handoff delay, which is small enough in order not to produce any significant disruption to the user (10-50 ms). Finally, the scenarios of interest have been replicated in a simulation environment, showing that significant benefits can be achieved if the specific characteristics of each AP and station are considered.
- Published
- 2021
- Full Text
- View/download PDF
30. Towards Optimizing WLANs Power Saving: Context-Aware Listen Interval
- Author
-
Ahmed Saeed and Mario Kolberg
- Subjects
802.11 ,energy consumption ,power save mode (PSM) ,NS2 ,wireless local area network (WLAN) ,Wi-Fi ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Despite the rapid growth of Wireless Local Area Networks (WLANs), the energy consumption caused by wireless communication remains a significant factor in reducing the battery life of power-constrained wireless devices. To reduce the energy consumption, static and adaptive power saving mechanisms have been deployed in WLANs. However, some inherent drawbacks and limitations remain. We have developed the concept of Context-Aware Listen Interval (CALI), in which the wireless network interface, with the aid of a Machine Learning (ML) classification model, sleeps and awakes based on the level of network activity of each application. In this paper we develop the power saving modes of CALI. The experimental results show that CALI consumes up to 75% less power when compared to the currently deployed power saving mechanism on the latest generation of smartphones, and up to 14% less energy when compared to Pyles’ et al. SAPSM power saving approach, which also employs an ML classifier.
- Published
- 2021
- Full Text
- View/download PDF
31. Performance evaluation of congestion aware transmission opportunity scheduling scheme for 802.11 wireless LANs
- Author
-
D. Srinivasa Rao and V. Berlin Hency
- Subjects
802.11 ,WLAN ,Internet ,TXOP ,CA-TXOP ,Congestion ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
In the last two decades, Wireless Local Area Networks (WLANs) based on 802.11 have become crucial in offering Internet services with high data transmission rates. Under crowded scenarios like airports, shopping centers, and stadiums, WLANs can be easily congested due to their random access nature and limited operational capability. This may result in a reduced user multimedia experience. With a proper Transmission Opportunity (TXOP) allocation and scheduling scheme, the user service quality could be improved under such scenarios. In this paper, a Congestion-Aware Transmission Opportunity (CA-TXOP) scheme is proposed, allocating transmission resources by considering network level congestion and information like buffer status, channel quality, and data rates. The CA-TXOP scheme prioritizes congested and noncongested user stations and improves the overall network performance. Simulation results show that the CA-TXOP scheme attained 45%, 35%, and 20% enhancement compared with Fixed, Bi-level, and FRA-TXOP scheduling schemes. Such scheme applies to future congested scenarios like smart buildings and organizations that require satisfying video quality to all the user stations.
- Published
- 2021
- Full Text
- View/download PDF
32. High-Accuracy Localization Using IEEE 802.11 WiFi Legacy Preamble
- Author
-
Sean M. Ellison and Jeffrey A. Nanzer
- Subjects
802.11 ,joint radar-communication ,localization ,radcom ,ranging ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
We explore the use of synchronization bits from a standard 802.11 preamble for high-accuracy localization. The multi-tone short training field present in 802.11 standards that use a Legacy preamble is investigated in comparison to a common remote sensing waveform known as the stepped frequency waveform that shares similar waveform characteristics to the preamble. We present the 802.11 standard and the connection to the stepped frequency waveform, derive the theoretical lower bound on the short training field, present a comparison of simulated results, and present experimental wireless measurements demonstrating ranging accuracies on the order of 1.9 mm.
- Published
- 2020
- Full Text
- View/download PDF
33. NOMA-Based 802.11n for Industrial Automation
- Author
-
Jon Montalban, Eneko Iradier, Pablo Angueira, Oscar Seijo, and Inaki Val
- Subjects
802.11 ,Factory Automation ,IWSN ,local area networks ,NOMA ,P-NOMA Process Automation ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Industry 4.0 and Industrial Internet refer to the expected revolution in production, utility management and, in general, fully automated, interconnected and digitally managed industrial ecosystems. One of the key enablers for Industry 4.0 lies on reliable and timely exchange of information and large scale deployment of wireless communications in industry facilities. Wireless will bring solutions to overcome the main drawbacks of the current wired systems: lack of mobility, deployment costs, cable damage dependency and scalability. However, the strict requirements in reliability and latency of use cases such as Factory Automation (FA) and Process Automation (PA) are still a major challenge and a barrier for massive deployment of currently available wireless standards. This paper proposes a PHY/MAC wireless communication solution for FA and PA based on Non-Orthogonal Multiple Access (NOMA) in combination with the 802.11n standard. The communication system proposed aims at delivering two different sets of services. The first service class is composed of Critical Services (CS) with strict restrictions in reliability and latency. The same communication system should convey also a second group of services, referred as Best Effort (BE) with more relaxed boundary conditions. The proposal theoretical background, a detailed transmission-reception architecture, the physical layer performance and the MAC level system reliability are presented in this paper. The solution provides significantly better reliability and higher flexibility than TDMA systems, jointly with a predictable control-cycle latency.
- Published
- 2020
- Full Text
- View/download PDF
34. Parallel PPDU Transmission Mechanism for Wideband Wireless LANs
- Author
-
Shinnazar Seytnazarov, Dong Geun Jeong, and Wha Sook Jeon
- Subjects
802.11 ,wireless local area network (WLAN) ,channel bonding ,wide channel access ,parallel transmission ,narrowband collision ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
When the preambles of a wideband 802.11n/ac frame transmission are affected by a collision with a 20MHz frame on one of the subchannels, a receiver might fail to decode the whole wideband frame. Experimental evaluations with off-the-shelf 802.11n hardware showed that the vulnerability of wideband frame transmission to a narrowband collision/interference is a real problem. To mitigate the severe impact of narrowband collision/interference on wideband transmission, we propose to transmit several 20MHz frames in parallel instead of a single wideband frame so that a narrowband collision on one of the subchannels affects only the parallel frame transmitted on that subchannel. Performance evaluations demonstrated that the proposed parallel frame transmission scheme significantly improves the throughput and delay performance of wideband transmissions under different traffic and channel conditions. While the throughput performance of the proposed scheme for saturated traffic conditions was analytically validated, extensive simulation-based evaluations showed that the proposed scheme achieves great performance improvement for unsaturated traffic conditions and hidden node environment.
- Published
- 2020
- Full Text
- View/download PDF
35. Deep-Learning-Based Carrier Frequency Offset Estimation and Its Cross-Evaluation in Multiple-Channel Models
- Author
-
Zhenyi Wang, Shengyun Wei, Li Zou, Feifan Liao, Weimin Lang, and Yuanzhuo Li
- Subjects
carrie frequency offset ,deep learning ,OFDM ,802.11 ,Information technology ,T58.5-58.64 - Abstract
The most widely used Wi-Fi wireless communication system, which is based on OFDM, is currently developing quickly. The receiver must, however, accurately estimate the carrier frequency offset between the transmitter and the receiver due to the characteristics of the OFDM system that make it sensitive to carrier frequency offset. The autocorrelation of training symbols is typically used by the conventional algorithm to estimate the carrier frequency offset. Although this method is simple to use and low in complexity, it has poor estimation performance at low signal-to-noise ratios, which has a significant negative impact on the performance of the wireless communication system. Meanwhile, the design of the communication physical layer using deep-learning-based (DL-based) methods is receiving more and more attention but is rarely used in carrier frequency offset estimation. In this paper, we propose a DL-based carrier frequency offset (CFO) model architecture for 802.11n standard OFDM systems. With regard to multipath channel models with varied degrees of multipath fadding, the estimation error of the proposed model is 70.54% lower on average than that of the conventional method under 802.11n standard channel models, and the DL-based method can outperform the estimation range of conventional methods. Besides, the model trained in one channel environment and tested in another was cross-evaluated to determine which models could be used for deployment in the real world. The cross-evaluation demonstrates that the DL-based model can perform well over a large class of channels without extra training when trained under the worst-case (most severe) multipath channel model.
- Published
- 2023
- Full Text
- View/download PDF
36. STREAM: Medium Access Control With Station Presence Awareness in Crowded Networks.
- Author
-
Esubonteng, Paa Kwesi and Rojas-Cessa, Roberto
- Abstract
In this article, we propose a medium access control (MAC) scheme, called STation pREsence-Aware MAC (STREAM), that offers equal contention opportunities to the stations in a network. STREAM is designed to preserve its performance in crowded and high-traffic networks. The scheme improves channel access, utilization, and service fairness of stations. STREAM detects collided transmissions or idle events in the network to estimate the number of active stations. STREAM sets the contention period as a function of the number of stations in the network. As a result, the number of contention opportunities is enlarged and the access to the transmission channel in the network is improved. In this way, STREAM overcomes the performance degradation of IEEE 802.11 under heavy traffic and crowded networks. We analyze the throughput of STREAM, fairness of service, and the probability that a station experiences collisions as a function of the number of stations in the network. We also present performance evaluations and comparisons with IEEE 802.11 and other high-performing schemes. We extend the application of STREAM on traffic with different priorities and quality of service. Our evaluations show that STREAM outperforms IEEE 802.11 and the compared schemes. We show that STREAM is an ideal candidate as a fallback mechanism for IEEE 802.11 under overwhelming conditions. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
37. Head to Head Battle of TV White Space and WiFi for Connecting Developing Regions
- Author
-
Johnson, David, Zlobinsky, Natasha, Lysko, Albert, Lamola, Magdeline, Hadzic, Senka, Maliwatu, Richard, Densmore, Melissa, Akan, Ozgur, Series editor, Bellavista, Paolo, Series editor, Cao, Jiannong, Series editor, Coulson, Geoffrey, Series editor, Dressler, Falko, Series editor, Ferrari, Domenico, Series editor, Gerla, Mario, Series editor, Kobayashi, Hisashi, Series editor, Palazzo, Sergio, Series editor, Sahni, Sartaj, Series editor, Shen, Xuemin Sherman, Series editor, Stan, Mircea, Series editor, Xiaohua, Jia, Series editor, Zomaya, Albert Y., Series editor, Bissyande, Tegawendé F., editor, and Sie, Oumarou, editor
- Published
- 2018
- Full Text
- View/download PDF
38. Effective Wireless Communications for V2G Applications and Objects in Motion
- Author
-
Krivchenkov, Aleksandr, Krainyukov, Alexander, Saltanovs, Rodion, Kacprzyk, Janusz, Series editor, Kabashkin, Igor, editor, Yatskiv, Irina, editor, and Prentkovskis, Olegas, editor
- Published
- 2018
- Full Text
- View/download PDF
39. Practical Evaluation of Passive COTS Eavesdropping in 802.11b/n/ac WLAN
- Author
-
Antonioli, Daniele, Siby, Sandra, Tippenhauer, Nils Ole, Hutchison, David, Series Editor, Kanade, Takeo, Series Editor, Kittler, Josef, Series Editor, Kleinberg, Jon M., Series Editor, Mattern, Friedemann, Series Editor, Mitchell, John C., Series Editor, Naor, Moni, Series Editor, Pandu Rangan, C., Series Editor, Steffen, Bernhard, Series Editor, Terzopoulos, Demetri, Series Editor, Tygar, Doug, Series Editor, Weikum, Gerhard, Series Editor, Capkun, Srdjan, editor, and Chow, Sherman S. M., editor
- Published
- 2018
- Full Text
- View/download PDF
40. Smart Preliminary Channel Access to Support Real-Time Traffic in Wi-Fi Networks
- Author
-
Kirill Chemrov, Dmitry Bankov, Evgeny Khorov, and Andrey Lyakhov
- Subjects
real-time applications ,Wi-Fi ,802.11 ,low delay ,reliability ,preliminary channel access ,Information technology ,T58.5-58.64 - Abstract
Real-time applications (RTA) are an important use case for IEEE 802.11be, a new amendment to the Wi-Fi standard. This amendment introduces new complicated mechanisms to provide low delay and high reliability for RTA, but many of them are not supported by legacy devices that may be present in future Wi-Fi networks. In contrast, the preliminary channel access (PCA) method is designed to satisfy strict RTA requirements even in the presence of legacy devices and does not require significant changes to the Wi-Fi protocol. However, it significantly reduces the capacity for non-RTA traffic. This paper introduces a Smart PCA method, which improves the performance of all the stations in scenarios with multiple RTA stations. Extensive simulation shows that the Smart PCA method guarantees low delays for intensive RTA traffic in these scenarios. Moreover, it doubles the network capacity for the stations with non-RTA traffic.
- Published
- 2022
- Full Text
- View/download PDF
41. Towards Optimizing WLANs Power Saving: Novel Context-Aware Network Traffic Classification Based on a Machine Learning Approach
- Author
-
Ahmed Saeed and Mario Kolberg
- Subjects
802.11 ,energy consumption ,machine learning (ML) ,power save mode (PSM) ,traffic classification ,WLAN ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Energy is a vital resource in wireless computing systems. Despite the increasing popularity of wireless local area networks (WLANs), one of the most important outstanding issues remains the power consumption caused by wireless network interface controller. To save this energy and reduce the overall power consumption of wireless devices, most approaches proposed to-date are focused on static and adaptive power saving modes. Existing literature has highlighted several issues and limitations in regards to their power consumption and performance degradation, warranting the need for further enhancements. In this paper, we propose a novel context-aware network traffic classification approach based on machine learning (ML) classifiers for optimizing WLAN power saving. The levels of traffic interaction in the background are contextually exploited for application of ML classifiers. Finally, the classified output traffic is used to optimize our proposed context-aware listen interval power saving modes. A real-world dataset is recorded, based on nine smartphone applications’ network traffic, reflecting different types of network behavior and interaction. This is used to evaluate the performance of eight ML classifiers in this initial study. The comparative results show that more than 99% of accuracy can be achieved. This paper indicates that ML classifiers are suited for classifying smartphone applications’ network traffic based on the levels of interaction in the background.
- Published
- 2019
- Full Text
- View/download PDF
42. Best of Both Worlds: Detecting Application Layer Attacks through 802.11 and Non-802.11 Features
- Author
-
Efstratios Chatzoglou, Georgios Kambourakis, Christos Smiliotopoulos, and Constantinos Kolias
- Subjects
intrusion detection systems ,802.11 ,Wi-Fi ,network security ,machine learning ,Chemical technology ,TP1-1185 - Abstract
Intrusion detection in wireless and, more specifically, Wi-Fi networks is lately increasingly under the spotlight of the research community. However, the literature currently lacks a comprehensive assessment of the potential to detect application layer attacks based on both 802.11 and non-802.11 network protocol features. The investigation of this capacity is of paramount importance since Wi-Fi domains are often used as a stepping stone by threat actors for unleashing an ample variety of application layer assaults. In this setting, by exploiting the contemporary AWID3 benchmark dataset along with both shallow and deep learning machine learning techniques, this work attempts to provide concrete answers to a dyad of principal matters. First, what is the competence of 802.11-specific and non-802.11 features when used separately and in tandem in detecting application layer attacks, say, website spoofing? Second, which network protocol features are the most informative to the machine learning model for detecting application layer attacks? Without relying on any optimization or dimensionality reduction technique, our experiments, indicatively exploiting an engineered feature, demonstrate a detection performance up to 96.7% in terms of the Area under the ROC Curve (AUC) metric.
- Published
- 2022
- Full Text
- View/download PDF
43. Detection of Rogue Access Point Using Various Parameters
- Author
-
Sandeep Vanjale, Mane, P. B., Kacprzyk, Janusz, Series editor, Satapathy, Suresh Chandra, editor, Bhateja, Vikrant, editor, and Joshi, Amit, editor
- Published
- 2017
- Full Text
- View/download PDF
44. A Novel Collision Analysis for Multiple-Subcarrier Frequency-Domain Contention
- Author
-
Zeng, Yu, Zhao, Qinglin, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Weikum, Gerhard, Series editor, Ma, Liran, editor, Khreishah, Abdallah, editor, Zhang, Yan, editor, and Yan, Mingyuan, editor
- Published
- 2017
- Full Text
- View/download PDF
45. Finding the Sweet Spot for Frame Aggregation in 802.11 WLANs.
- Author
-
Saldana, Jose, Topal, Omer, Ruiz-Mas, Jose, and Fernandez-Navajas, Julian
- Abstract
This letter proposes an algorithm for the dynamic tuning of the maximum size of aggregated frames in 802.11 WLANs. Traffic flows with opposed requirements may coexist in these networks: traditional services as web browsing or file download that need high throughput, and services with real-time requirements that need low latency. The proposed algorithm allows the network manager to find an optimal balance (i.e. the “sweet spot” between throughput and latency: a “delay budget” can be assigned to real-time flows, with the objective of keeping the latency as close as possible to that budget, while penalizing the throughput of traditional services as little as possible. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
46. Wireless Lan Performance Enhancement Using Double Deep Q-Networks
- Author
-
Khizra Asaf, Bilal Khan, and Ga-Young Kim
- Subjects
WLAN ,802.11 ,DRL ,DDQN ,DCWO ,Technology ,Engineering (General). Civil engineering (General) ,TA1-2040 ,Biology (General) ,QH301-705.5 ,Physics ,QC1-999 ,Chemistry ,QD1-999 - Abstract
Due to the exponential growth in the use of Wi-Fi networks, it is necessary to study its usage pattern in dense environments for which the legacy IEEE 802.11 MAC (Medium Access Control) protocol was not specially designed. Although 802.11ax aims to improve Wi-Fi performance in dense scenarios due to modifications in the physical layer (PHY), however, MAC layer operations remain unchanged, and are not capable enough to provide stable performance in dense scenarios. Potential applications of Deep Learning (DL) to Media Access Control (MAC) layer of WLAN has now been recognized due to their unique features. Deep Reinforcement Learning (DRL) is a technique focused on behavioral sensitivity and control philosophy. In this paper, we have proposed an algorithm for setting optimal contention window (CW) under different network conditions called DRL-based Contention Window Optimization (DCWO). The proposed algorithm operates in three steps. In the initial step, Wi-Fi is being controlled by the 802.11 standards. In the second step, the agent makes the decisions concerning the value of CW after the TRAIN procedure for the proposed algorithm. The final phase begins after the training, defined by a time duration specified by the user. Now, the agent is fully trained, and no updates will be no longer received. Now the CW is updated via the OPTIMIZE process of DCWO. We have selected total network throughput, instantaneous network throughput, fairness index, and cumulative reward, and compared our proposed scheme DCWO with the Centralized Contention window Optimization with DRL (CCOD). Simulation results show that DCWO with Double Deep Q-Networks (DDQN) performs better than CCOD with (i) Deep Deterministic Policy Gradient (DDPG) and (ii) Deep Q-Network (DQN). More specifically, DCWO with DDQN gives on average 28% and 23% higher network throughput than CCOD in static and dynamic scenarios. Whereas in terms of instantaneous network throughput DCWO gives around 10% better results than the CCOD. DCWO achieves almost near to optimal fairness in static scenarios and better than DQN and DDPG with CCOD in dynamic scenarios. Similarly, while the cumulative reward achieved by DCWO is almost the same with CCOD with DDPG, the uptrend of DCWO is still encouraging.
- Published
- 2022
- Full Text
- View/download PDF
47. Instruction in 802.11 Technology in Online Virtual Labs.
- Author
-
Luse, Andy, Brown, Amanda, and Rursch, Julie
- Subjects
- *
COMPUTER security , *IEEE 802.11 (Standard) , *USB technology , *CONCEPT learning , *VIRTUAL reality , *TEACHING - Abstract
Contribution: A novel approach to remote instruction in 802.11 technology is described using the virtual lab technology. Background: Lab-based education has been a staple of computing education for decades. By interacting with the technology, students are able to gain a much greater understanding of the subject through hands-on activities. Recently, virtual labs have provided a mechanism to allow both co-located and online students access to these lab environments without the time, space, and monetary constraints of traditional labs. Computer networking and security is one area where virtual labs provide a highly useful testbed for learning security concepts. One problem is implementing virtual educational labs pertaining to 802.11 technologies given the inherently physical location-based nature of the wireless medium. Intended Outcomes: This article builds on work by others by developing and testing a new hybrid physical/virtual lab to enable students to learn concepts pertaining to 802.11 networking technologies remotely in a virtual lab setting. Application Design: The virtual lab environment uses the ESXi virtualization technology coupled with arrays of USB 802.11 adapters to enable the use of 802.11 technologies remotely. Findings: The experimental results show the proposed system to be as effective as a traditional physical lab environment with regards to usefulness, ease of use, satisfaction, self-efficacy, and exercise completion time. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
48. Performance evaluation of congestion aware transmission opportunity scheduling scheme for 802.11 wireless LANs.
- Author
-
Rao, D. Srinivasa and Hency, V. Berlin
- Subjects
WIRELESS LANs ,PRODUCTION scheduling ,DATA transmission systems ,BIT rate ,INTERNET - Abstract
In the last two decades, Wireless Local Area Networks (WLANs) based on 802.11 have become crucial in offering Internet services with high data transmission rates. Under crowded scenarios like airports, shopping centers, and stadiums, WLANs can be easily congested due to their random access nature and limited operational capability. This may result in a reduced user multimedia experience. With a proper Transmission Opportunity (TXOP) allocation and scheduling scheme, the user service quality could be improved under such scenarios. In this paper, a Congestion-Aware Transmission Opportunity (CA-TXOP) scheme is proposed, allocating transmission resources by considering network level congestion and information like buffer status, channel quality, and data rates. The CA-TXOP scheme prioritizes congested and noncongested user stations and improves the overall network performance. Simulation results show that the CA-TXOP scheme attained 45%, 35%, and 20% enhancement compared with Fixed, Bi-level, and FRA-TXOP scheduling schemes. Such scheme applies to future congested scenarios like smart buildings and organizations that require satisfying video quality to all the user stations. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
49. Performance Analysis of Synchronous Multi-Radio Multi-Link MAC Protocols in IEEE 802.11be Extremely High Throughput WLANs.
- Author
-
Song, Taewon and Kim, Taeyoon
- Subjects
WIRELESS LANs ,MARKOV processes ,ACCESS control ,STOCHASTIC processes ,PERFORMANCES - Abstract
The representative media access control (MAC) mechanism of IEEE 802.11 is a distributed coordination function (DCF), which operates based on carrier-sense multiple access with collision avoidance (CSMA/CA) with binary exponential backoff. The next amendment of IEEE 802.11 being developed for future Wi-Fi by the task group-be is called IEEE 802.11be, where the multi-link operation is mainly discussed when it comes to MAC layer operation. The multi-link operation discussed in IEEE 802.11be allows multi-link devices to establish multiple links and operate them simultaneously. Since the medium access on a link may affect the other links, and the conventional MAC mechanism has just taken account of a single link, the DCF should be used after careful consideration for multi-link operation. In this paper, we summarize the DCFs being reviewed to support the multi-radio multi-link operation in IEEE 802.11be and analyze their performance using the Markov chain model. Throughout the extensive performance evaluation, we summarize each MAC protocol's pros and cons and discuss essential findings of the candidate MAC protocols. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
50. Prototype of Monitoring and Alarm for the Detection of White Frosts in Rural Sectors of Sogamoso
- Author
-
Fabián Andrés Salamanca-Figueroa, Willmar Arbey Suarez- Rodrígez, and Christian Camilo Cárdenas-Gamboa
- Subjects
agricultura ,heladas ,IoT ,MQTT ,802.11 ,WiFi ,Engineering (General). Civil engineering (General) ,TA1-2040 ,Technology (General) ,T1-995 - Abstract
The next article shows of prototype of monitoring and alarm that it allows for the detection of white frost, which is the base to develop a prototype for detention and predictions of other types of frost. The device shows the atmospheric variables of temperature and humidity, this data is sent to a local server broker with Wifi protocol MQTT. This one retransmit the info to end devices like cellphones and laptops. The system is capable of alerting with an alarm and it allows for the events communication to different end devices. To do this was necessary to select the appropriate devices, technologies and protocols, design and validate them, emulating the appropriate temperature and humidity conditions.
- Published
- 2018
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.