scholarly journals Development and research of Wi-Fi network for receiving and transmitting telemechanical information in the training laboratory

Author(s):  
B. Orobchuk ◽  
V. Koval

The article deals with the issues of research, development and implementation of local area wireless networks in the educational process, especially with the study of the signal level for data transmission control of the local wireless network indoors. The controlled telemechanics unit uses wired systems for communication of the operator with various sensors and actuators, which creates certain difficulties and risks for the operator working in site of the telemechanics unit. The article considers a potential use of wireless technologies in the educational process, which demonstrates how to secure the operator and reduce the time to bypass all the sensors of the actuators, as well as to develop a short-range wireless subsystem.

T-Comm ◽  
2021 ◽  
Vol 15 (7) ◽  
pp. 28-33
Author(s):  
Albina Y. Sharifullina ◽  
◽  
Roman R. Galyamov ◽  
Rimma S. Zaripova ◽  
◽  
...  

This article discusses the stages of development, characteristics of a wireless local area network Wi-Fi, options for its topology and equipment used. Currently, there are such different types of wireless networks as Wireless Wide Area Network, Wireless Metropolitan Area Networks (Wireless Neighborhood Area Network), Wireless Local Area Network, Wireless Personal Area Network. Each of the listed wireless networks has its own specific range and application. Wireless LAN Wi-Fi refers to the Wireless Local Area Network. The first wireless LAN standard, Wi-Fi, was approved in 1997. From the moment of their appearance to the present day, the following standards of this network have appeared: 802.11a, 802.11b, 802.11g, 802.11n, 802.11ac, 802.11ad, 802.11ax. For each standard, the speeds and frequency ranges at which the data transmission was carried out are indicated, and the technologies on which they are built are described. Wireless LAN Wi-Fi has three topologies: 1) Ad-Hoc (point-to-point) or Independent Basic Service Set; 2) Basic Service Set (“client / server”) and 3) Extended Service Set (“extended service areas”). To build a Wi-Fi network, network adapters, access points, routers, ADSL modems, Wi-Fi phones, Wi-Fi antennas, Wi-Fi repeaters are used. Wi-Fi adapters are used by devices that do not have a built-in Wi-Fi module. Wi-Fi access points are designed for organizing wireless access within a local network. Wi-Fi routers are designed to route traffic on a computer network. ADSL modems are used to access the Internet over a telephone line. Wi-Fi repeaters are used to expand the coverage of a wireless network using already installed equipment. Wi-Fi phones are wireless IP phones. Wi-Fi antennas are used to extend the range of a wireless network.


2018 ◽  
Author(s):  
Kiramat

This document is about techniques in which the performance and reliability of a wireless network can be improved. We will discuss the cooperative communication system, how it operates and its security issues. Also, the future of the diversity in wireless networks will be analysed [1]. In cooperative networks, the data is transmitted from sender to receiver via intermediate nodes called relays. The main objective is to consider the pros and cons of relaying techniques in order to improve wireless local area networks (WLANs) [2].


2014 ◽  
Vol 989-994 ◽  
pp. 4590-4593
Author(s):  
Heng Jun Zhu ◽  
Rui Wang

In the campus WLAN wireless networks, transfer speed of network data is attracted great attention of users. How to solve conflict problem occurred in the network data transmission process has become the main goal of the campus WLAN network optimization. This paper presents campus WLAN wireless networks conflict resolution based channel mapping anti-collision algorithm. According to the amount of data to be transmitted in the network, the data length is estimated to provide conflict resolution with support data. On the basis of the channel mapping anti-collision algorithm related theory, conflict resolution model is established. Experimental results show that the proposed algorithm used in resolving conflict in campus WLAN wireless network can reduce the probability of data conflict happened in channel, so as to improve the performance of campus WLAN wireless network.


2021 ◽  
Vol 2074 (1) ◽  
pp. 012031
Author(s):  
Hong Lv ◽  
Weina Huang

Abstract The use of wireless network for remote data collection can provide a fast and reliable wireless data transmission channel for those monitoring points involving a wide area and scattered equipment layout with the help of its large coverage and high communication quality. This article analyzes the characteristics and advantages of wireless networks, and then discusses the networking scheme for remote data collection using wireless networks, and analyzes the reliability of network transmission. Finally, some program fragments on the server side are given.


2013 ◽  
Vol 423-426 ◽  
pp. 2621-2624
Author(s):  
Kun Qi Wang ◽  
Lei Xiong ◽  
Bao Chen Yang ◽  
Chen Cong Meng

A wireless video transmission system is put forward in this paper. It is constituted by 3G wireless networks and ARM11. Collecting video data is used by V4L2 technology, and the H.264 video codec is used by S3C6410 processors the MFC module. The video codec is sent to remote monitoring center via 3G wireless network. The System can complete video capture, coding, wireless transmission and decoding, and displaying on the LCD. The experiment show the system can achieve wireless remote monitoring.


2018 ◽  
Author(s):  
Kiramat

This document is about techniques in which the performance and reliability of a wireless network can be improved. We will discuss the cooperative communication system, how it operates and its security issues. Also, the future of the diversity in wireless networks will be analysed. In cooperative networks, the data is transmitted from sender to receiver via intermediate nodes called relays. The main objective is to consider the pros and cons of relaying techniques in order to improve wireless local area networks (WLANs)[1].


Author(s):  
Edith N. Ekwem ◽  
Kashif Nisar

A network whose interconnections between nodes are implemented without using wires is referred to as wireless network and is usually related to a telecommunication network. As related to wired local area network, wireless channels are error-prone. Performance study and optimization of Wireless Local Area Network (WLAN) becomes more essential as its gaining popularity. For performance modelling and evaluation of wireless networks, computer simulation has become one of most widespread tools. While numerous network simulators exist for building a variety of network models, selecting a good network simulator tool is vital in modelling and performance study of wireless networks. Optimized Network Engineering Tools (OPNET) Modeller available to academic institutions at no cost is becoming one of the most widespread network simulators. In this study, the authors used OPNET Modeller 14.5 simulator tool to develop and validate a model for campus based WLAN. The results are expected to display that OPNET Modeller offers credible simulation outcomes close to a genuine system. The effect of network parameters such as the processing time on the performance metrics such as delay and throughput of the various scenarios in the entire network was investigated. The analysis of the results from the simulations carried out can assist the management of computer centre that manages the network in identifying the bottleneck node on the network and for future network capacity building. However, this wireless network involves too many numbers of users which OPNET is not capable to simulate; the authors limited the network to only users in the computer building.


Nowadays, security of wireless local area networks (WLANs) is the biggest concern for many organizations. Protecting wireless networks from unauthorized users is a major concern to be addressed. The broadcasting nature of the wireless networks makes it vulnerable to carry different types of attacks. Main wireless threats are man in the middle attack, eavesdropping, evil twin attack and replay attack etc. In this paper Replay Attack threat is highlighted. An attacker can use many different tools available freely on the internet to carry this type of attack. We propose a methodology to detect the Replay attack. In this paper a variant of replay attack called address resolution replay attack is discussed. To carry this attack Ettercap tool is used. In this type of attack, attacker floods the wireless network with ARP traffic. So the performance of the wireless network degrades. To detect ARP request/replay attack our proposed method uses protocol field and nature of frame field. A Replay attack in which all the traffic captured and replayed is also discussed. To detect this type of attack, main parameters which are considered are the number of retransmitted packets, number of duplicate ACK and number of TCP spurious retransmitted packet. Keywords: MITM, RAP, RSSI, RTT


2015 ◽  
Vol 14 (6) ◽  
pp. 5809-5813
Author(s):  
Abhishek Prabhakar ◽  
Amod Tiwari ◽  
Vinay Kumar Pathak

Wireless security is the prevention of unauthorized access to computers using wireless networks .The trends in wireless networks over the last few years is same as growth of internet. Wireless networks have reduced the human intervention for accessing data at various sites .It is achieved by replacing wired infrastructure with wireless infrastructure. Some of the key challenges in wireless networks are Signal weakening, movement, increase data rate, minimizing size and cost, security of user and QoS (Quality of service) parameters... The goal of this paper is to minimize challenges that are in way of our understanding of wireless network and wireless network performance.


Sign in / Sign up

Export Citation Format

Share Document