72 research outputs found

    IEEE 802.11ax: challenges and requirements for future high efficiency wifi

    Get PDF
    The popularity of IEEE 802.11 based wireless local area networks (WLANs) has increased significantly in recent years because of their ability to provide increased mobility, flexibility, and ease of use, with reduced cost of installation and maintenance. This has resulted in massive WLAN deployment in geographically limited environments that encompass multiple overlapping basic service sets (OBSSs). In this article, we introduce IEEE 802.11ax, a new standard being developed by the IEEE 802.11 Working Group, which will enable efficient usage of spectrum along with an enhanced user experience. We expose advanced technological enhancements proposed to improve the efficiency within high density WLAN networks and explore the key challenges to the upcoming amendment.Peer ReviewedPostprint (author's final draft

    Contention resolution in wi-fi 6-enabled internet of things based on deep learning

    Get PDF
    Internet of Things (IoT) is expected to vastly increase the number of connected devices. As a result, a multitude of IoT devices transmit various information through wireless communication technology, such as the Wi-Fi technology, cellular mobile communication technology, low-power wide-area network (LPWAN) technology. However, even the latest Wi-Fi technology is still ready to accommodate these large amounts of data. Accurately setting the contention window (CW) value significantly affects the efficiency of the Wi-Fi network. Unfortunately, the standard collision resolution used by IEEE 802.11ax networks is nonscalable; thus, it cannot maintain stable throughput for an increasing number of stations, even when Wi-Fi 6 has been designed to improve performance in dense scenarios. To this end, we propose a CW control strategy for Wi-Fi 6 systems. This strategy leverages deep learning to search for optimal configuration of CW under different network conditions. Our deep neural network is trained by data generated from a Wi-Fi 6 simulation system with some varying key parameters, e.g., the number of nodes, short interframe space (SIFS), distributed interframe space (DIFS), and data transmission rate. Numerical results demonstrated that our deep learning scheme could always find the optimal CW adjustment multiple by adaptively perceiving the channel competition status. The finalized performance of our model has been significantly improved in terms of system throughput, average transmission delay, and packet retransmission rate. This makes Wi-Fi 6 better adapted to the access of a large number of IoT devices. © 2014 IEEE

    Developing a Systematic Process for Mobile Surveying and Analysis of WLAN security

    Get PDF
    Wireless Local Area Network (WLAN), familiarly known as Wi-Fi, is one of the most used wireless networking technologies. WLANs have rapidly grown in popularity since the release of the original IEEE 802.11 WLAN standard in 1997. We are using our beloved wireless internet connection for everything and are connecting more and more devices into our wireless networks in every form imaginable. As the number of wireless network devices keeps increasing, so does the importance of wireless network security. During its now over twenty-year life cycle, a multitude of various security measures and protocols have been introduced into WLAN connections to keep our wireless communication secure. The most notable security measures presented in the 802.11 standard have been the encryption protocols Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA). Both encryption protocols have had their share of flaws and vulnerabilities, some of them so severe that the use of WEP and the first generation of the WPA protocol have been deemed irredeemably broken and unfit to be used for WLAN encryption. Even though the aforementioned encryption protocols have been long since deemed fatally broken and insecure, research shows that both can still be found in use today. The purpose of this Master’s Thesis is to develop a process for surveying wireless local area networks and to survey the current state of WLAN security in Finland. The goal has been to develop a WLAN surveying process that would at the same time be efficient, scalable, and easily replicable. The purpose of the survey is to determine to what extent are the deprecated encryption protocols used in Finland. Furthermore, we want to find out in what state is WLAN security currently in Finland by observing the use of other WLAN security practices. The survey process presented in this work is based on a WLAN scanning method called Wardriving. Despite its intimidating name, wardriving is simply a form of passive wireless network scanning. Passive wireless network scanning is used for collecting information about the surrounding wireless networks by listening to the messages broadcasted by wireless network devices. To collect our research data, we conducted wardriving surveys on three separate occasions between the spring of 2019 and early spring of 2020, in a typical medium-sized Finnish city. Our survey results show that 2.2% out of the located networks used insecure encryption protocols and 9.2% of the located networks did not use any encryption protocol. While the percentage of insecure networks is moderately low, we observed during our study that private consumers are reluctant to change the factory-set default settings of their wireless network devices, possibly exposing them to other security threats

    Wi-Fi QoS improvements for industrial automation

    Get PDF
    Digitalization caused a considerable increase in the use of industrial automation applications. Industrial automation applications use real-time traffic with strict requirements of connection of tens of devices, high-reliability, determinism, low-latency, and synchronization. The current solutions meeting these requirements are wired technologies. However, there is a need for wireless technologies for mobility,less complexity, and quick deployment. There are many studies on cellular technologies for industrial automation scenarios with strict reliability and latency requirements, but not many developments for wireless communications over unlicensed bands. Wireless Fidelity (Wi-Fi) is a commonly used and preferred technology in factory automation since it is supported by many applications and operates on a license free-band. However, there is still room for improving Wi-Fi systems performance for low-latency and high-reliable communication requirements in industrial automation use cases. There are various limitations in the current Wi-Fi system restraining the deployment for time-critical operations. For meeting the strict timing requirements of low delay and jitter in industrial automation applications, Quality of Service (QoS)in Wi-Fi needs to be improved. In this thesis, a new access category in Medium Access Control (MAC) layer for industrial automation applications is proposed.The performance improvement is analyzed with simulations, and a jitter definition for a Wi-Fi system is studied. Then, a fixed Modulation and Coding (MCS) link adaptation method and bounded delay is implemented for time-critical traffic in the simulation cases to observe performance changes. Finally, it is shown that the new access category with no backoff time can decrease the delay and jitter of time-critical applications. The improvements in Wi-Fi QoS are shown in comparison with the current standard, and additional enhancements about using a fixed modulation and coding scheme and implementation of a bounded delay are also analyzed in this thesi

    Belaidžio ryšio tinklų terpės prieigos valdymo tyrimas

    Get PDF
    Over the years, consumer requirements for Quality of Service (QoS) has been growing exponentially. Recently, the ratification process of newly IEEE 802.11ad amendment to IEEE 802.11 was finished. The IEEE 802.11ad is the newly con-sumer wireless communication approach, which will gain high spot on the 5G evolution. Major players in wireless market, such as Qualcomm already are inte-grating solutions from unlicensed band, like IEEE 802.11ac, IEEE 802.11ad into their architecture of LTE PRO (the next evolutionary step for 5G networking) (Qualcomm 2013; Parker et al. 2015). As the demand is growing both in enter-prise wireless networking and home consumer markets. Consumers started to no-tice the performance degradation due to overcrowded unlicensed bands. The un-licensed bands such as 2.4 GHz, 5 GHz are widely used for up-to-date IEEE 802.11n/ac technologies with upcoming IEEE 802.11ax. However, overusage of the available frequency leads to severe interference issue and consequences in to-tal system performance degradation, currently existing wireless medium access method can not sustain the increasing intereference and thus wireless needs a new methods of wireless medium access. The main focal point of this dissertation is to improve wireless performance in dense wireless networks. In dissertation both the conceptual and multi-band wireless medium access methods are considered both from theoretical point of view and experimental usage. The introduction chapter presents the investigated problem and it’s objects of research as well as importance of dissertation and it’s scientific novelty in the unlicensed wireless field. Chapter 1 revises used literature. Existing and up-to-date state-of-the-art so-lution are reviewed, evaluated and key point advantages and disadvantages are analyzed. Conclusions are drawn at the end of the chapter. Chapter 2 describes theoretical analysis of wireless medium access protocols and the new wireless medium access method. During analysis theoretical simula-tions are performed. Conclusions are drawn at the end of the chapter. Chapter 3 is focused on the experimental components evaluation for multi-band system, which would be in line with theoretical concept investigations. The experimental results, showed that components of multi-band system can gain sig-nificant performance increase when compared to the existing IEEE 802.11n/ac wireless systems. General conclusions are drawn after analysis of measurement results
    corecore