Load dynamic balancing algorithm based on software defined wireless network for different access points

2021 ◽  
Author(s):  
Yi Yang ◽  
Hao Su ◽  
Qian Zhang
Author(s):  
Nurul I. Sarkar

Teaching wireless networking fundamentals is often difficult because many students appear to find the subject technical, and dry when presented in traditional lecture format. To overcome this problem, we provide an opportunity for experiential learning where students can learn wireless networking fundamentals by hands-on practical activities using low-cost Wi-Fi (wireless fidelity) devices such as wireless cards and access points. Students can easily set up and configure networks using wireless cards and access points more effectively. By measuring network performance such as throughput and end-to-end delays, students are able to gain a deeper understanding of wireless networking. The effectiveness of Wi-Fi-based practical activities has been evaluated by students and the teaching team. This chapter reports on the overall effectiveness of teaching and learning of wireless network using radially available low-cost Wi-Fi cards and access points.


2006 ◽  
Vol 5 (2) ◽  
pp. 144-156 ◽  
Author(s):  
Feng Zhang ◽  
T.C. Todd ◽  
Dongmei Zhao ◽  
V. Kezys

T-Comm ◽  
2021 ◽  
Vol 15 (7) ◽  
pp. 28-33
Author(s):  
Albina Y. Sharifullina ◽  
◽  
Roman R. Galyamov ◽  
Rimma S. Zaripova ◽  
◽  
...  

This article discusses the stages of development, characteristics of a wireless local area network Wi-Fi, options for its topology and equipment used. Currently, there are such different types of wireless networks as Wireless Wide Area Network, Wireless Metropolitan Area Networks (Wireless Neighborhood Area Network), Wireless Local Area Network, Wireless Personal Area Network. Each of the listed wireless networks has its own specific range and application. Wireless LAN Wi-Fi refers to the Wireless Local Area Network. The first wireless LAN standard, Wi-Fi, was approved in 1997. From the moment of their appearance to the present day, the following standards of this network have appeared: 802.11a, 802.11b, 802.11g, 802.11n, 802.11ac, 802.11ad, 802.11ax. For each standard, the speeds and frequency ranges at which the data transmission was carried out are indicated, and the technologies on which they are built are described. Wireless LAN Wi-Fi has three topologies: 1) Ad-Hoc (point-to-point) or Independent Basic Service Set; 2) Basic Service Set (“client / server”) and 3) Extended Service Set (“extended service areas”). To build a Wi-Fi network, network adapters, access points, routers, ADSL modems, Wi-Fi phones, Wi-Fi antennas, Wi-Fi repeaters are used. Wi-Fi adapters are used by devices that do not have a built-in Wi-Fi module. Wi-Fi access points are designed for organizing wireless access within a local network. Wi-Fi routers are designed to route traffic on a computer network. ADSL modems are used to access the Internet over a telephone line. Wi-Fi repeaters are used to expand the coverage of a wireless network using already installed equipment. Wi-Fi phones are wireless IP phones. Wi-Fi antennas are used to extend the range of a wireless network.


Author(s):  
Isaac Chin Eian ◽  
Ka Yong Lim ◽  
Majesty Xiao Li Yeap ◽  
Hui Qi Yeo ◽  
Fatima Z

In recent years, wireless networks have undoubtedly become a convenient way to connect to the Internet and provide connection to everyone in any corner of the world. In fact, in this era, people are connected to the internet almost everyday and wireless networks give us this privilege in a seamless manner. A wireless network normally consists of access points and nodes where the access points are responsible to amplify the wireless signals, while the nodes are the gadgets that are receiving these signals. However, with such great convenience provided, many challenges are also faced by the users and stakeholders. With no physical connection to devices, wireless networks are evidently more vulnerable to invisible cyber attacks. In this research paper, it the security issues that cause issues in the wireless networks are discussed. Furthermore, an analytical review of privacy challenges found in these networks is performed; these challenges are segregated into security issues and privacy issues. The paper will then present the methods used in conducting a survey and gathering the research results along with further discussion on the results obtained through this study. Finally, a suitable solution is proposed to prevent and overcome the intrusions faced in terms of security and privacy in wireless network scenarios through detection and response mechanism for mitigation of the problems.


2019 ◽  
Vol 2 (2) ◽  
pp. 20
Author(s):  
Ahmad Tantoni ◽  
Mohammad Taufan Asri Zaen

The wireless network at STMIK Lombok is connected to the local server network and the internet with the spread of access points in several buildings. In some parts of the building have different strengths and the access point or wireless signal strengths, some have broad and strong signal coverage, but there are also areas that have limited / weak signal coverage, even no wireless or blank-spot signal. This blank spot can be caused by many obstacles, including walls, tiles, trees, and others. Based on observations at STMIK Lombok, wireless signal coverage has not been able to cover the entire campus building area; many are unstable and tend to be weak. Therefore, wireless management research was conducted by mapping the SSID access point which is expected to offer/give a solution so that the wireless signal can cover all STMIK Lombok campus buildings. Wireless management by mapping SSID access points on STMIK Lombok provides a solution for location placement and number of access points to be installed so that the campus area of ​​STMIK Lombok can be covered by wireless networks. Keywords : wireless, wireless network, mapping SSID, access point, MikroTik


Sign in / Sign up

Export Citation Format

Share Document