3,891 research outputs found

    Throughput optimization strategies for large-scale wireless LANs

    Get PDF
    Thanks to the active development of IEEE 802.11, the performance of wireless local area networks (WLANs) is improving by every new edition of the standard facilitating large enterprises to rely on Wi-Fi for more demanding applications. The limited number of channels in the unlicensed industrial scientific medical frequency band however is one of the key bottlenecks of Wi-Fi when scalability and robustness are points of concern. In this paper we propose two strategies for the optimization of throughput in wireless LANs: a heuristic derived from a theoretical model and a surrogate model based decision engine

    Thirty Years of Machine Learning: The Road to Pareto-Optimal Wireless Networks

    Full text link
    Future wireless networks have a substantial potential in terms of supporting a broad range of complex compelling applications both in military and civilian fields, where the users are able to enjoy high-rate, low-latency, low-cost and reliable information services. Achieving this ambitious goal requires new radio techniques for adaptive learning and intelligent decision making because of the complex heterogeneous nature of the network structures and wireless services. Machine learning (ML) algorithms have great success in supporting big data analytics, efficient parameter estimation and interactive decision making. Hence, in this article, we review the thirty-year history of ML by elaborating on supervised learning, unsupervised learning, reinforcement learning and deep learning. Furthermore, we investigate their employment in the compelling applications of wireless networks, including heterogeneous networks (HetNets), cognitive radios (CR), Internet of things (IoT), machine to machine networks (M2M), and so on. This article aims for assisting the readers in clarifying the motivation and methodology of the various ML algorithms, so as to invoke them for hitherto unexplored services as well as scenarios of future wireless networks.Comment: 46 pages, 22 fig

    Automatic best wireless network selection based on key performance indicators

    Get PDF
    Introducing cognitive mechanisms at the application layer may lead to the possibility of an automatic selection of the wireless network that can guarantee best perceived experience by the final user. This chapter investigates this approach based on the concept of Quality of Experience (QoE), by introducing the use of application layer parameters, namely Key Performance Indicators (KPIs). KPIs are defined for different traffic types based on experimental data. A model for an ap- plication layer cognitive engine is presented, whose goal is to identify and select, based on KPIs, the best wireless network among available ones. An experimenta- tion for the VoIP case, that foresees the use of the One-way end-to-end delay (OED) and the Mean Opinion Score (MOS) as KPIs is presented. This first implementation of the cognitive engine selects the network that, in that specific instant, offers the best QoE based on real captured data. To our knowledge, this is the first example of a cognitive engine that achieves best QoE in a context of heterogeneous wireless networks

    A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends

    Full text link
    This paper examines the security vulnerabilities and threats imposed by the inherent open nature of wireless communications and to devise efficient defense mechanisms for improving the wireless network security. We first summarize the security requirements of wireless networks, including their authenticity, confidentiality, integrity and availability issues. Next, a comprehensive overview of security attacks encountered in wireless networks is presented in view of the network protocol architecture, where the potential security threats are discussed at each protocol layer. We also provide a survey of the existing security protocols and algorithms that are adopted in the existing wireless network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term evolution (LTE) systems. Then, we discuss the state-of-the-art in physical-layer security, which is an emerging technique of securing the open communications environment against eavesdropping attacks at the physical layer. We also introduce the family of various jamming attacks and their counter-measures, including the constant jammer, intermittent jammer, reactive jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the integration of physical-layer security into existing authentication and cryptography mechanisms for further securing wireless networks. Finally, some technical challenges which remain unresolved at the time of writing are summarized and the future trends in wireless security are discussed.Comment: 36 pages. Accepted to Appear in Proceedings of the IEEE, 201

    Wi-Fi Offload: Tragedy of the Commons or Land of Milk and Honey?

    Full text link
    Fueled by its recent success in provisioning on-site wireless Internet access, Wi-Fi is currently perceived as the best positioned technology for pervasive mobile macro network offloading. However, the broad transitions of multiple collocated operators towards this new paradigm may result in fierce competition for the common unlicensed spectrum at hand. In this light, our paper game-theoretically dissects market convergence scenarios by assessing the competition between providers in terms of network performance, capacity constraints, cost reductions, and revenue prospects. We will closely compare the prospects and strategic positioning of fixed line operators offering Wi-Fi services with respect to competing mobile network operators utilizing unlicensed spectrum. Our results highlight important dependencies upon inter-operator collaboration models, and more importantly, upon the ratio between backhaul and Wi-Fi access bit-rates. Furthermore, our investigation of medium- to long-term convergence scenarios indicates that a rethinking of control measures targeting the large-scale monetization of unlicensed spectrum may be required, as otherwise the used free bands may become subject to tragedy-of-commons type of problems.Comment: Workshop on Spectrum Sharing Strategies for Wireless Broadband Services, IEEE PIMRC'13, to appear 201
    • …
    corecore