scholarly journals OVERVIEW OF WIRELESS NETWORK CONTROL PROTOCOL IN SMART PHONE DEVICES

Author(s):  
P.L. RAMTEKE ◽  
D.N. CHOUDHARY

The computer network connection without wire or any cable is referring as wireless network. These wireless local area networks are popular for its worldwide applications. It has covered wide scale wireless local area network. The large scale systems to all applicable areas make large numbers of wireless termination and covering very much area. To reduce the complexity associated with server management, Information Technology organizations begins the process of centralizing servers. It used with architecture principles of centralized management requirement for network to scale, network architecture needs to be able to support enhanced services in addition to just raw connectivity, distributed processing is required both for scalability ability and services, network support continuously increase the level of throughputs etc. Wireless LAN product architectures have evolved from single autonomous access points to systems, consisting of a centralized Access Controller and Wireless Termination Points. The basic goal of centralized control architectures is to move access control, including user authentication and authorization, mobility & radio management, from one access point to centralized controller. The Wireless network Control Protocol allows for access and control of large-scale wireless local area networks. It can allows management of these networks, Control and Provisioning of Wireless Access Points In computer networking, a wireless access point is a device that allows wireless devices to connect to wired network using Wi-Fi, Bluetooth or related standards. The WAP usually connects to a router via a wired network, and can relay data between the wireless devices such as computers or printers and wired devices on the network.

SIMULATION ◽  
2020 ◽  
Vol 96 (12) ◽  
pp. 939-956 ◽  
Author(s):  
Anisa Allahdadi ◽  
Ricardo Morla ◽  
Jaime S Cardoso

Despite the growing popularity of 802.11 wireless networks, users often suffer from connectivity problems and performance issues due to unstable radio conditions and dynamic user behavior, among other reasons. Anomaly detection and distinction are in the thick of major challenges that network managers encounter. The difficulty of monitoring broad and complex Wireless Local Area Networks, that often requires heavy instrumentation of the user devices, makes anomaly detection analysis even harder. In this paper we exploit 802.11 access point usage data and propose an anomaly detection technique based on Hidden Markov Model (HMM) and Universal Background Model (UBM) on data that is inexpensive to obtain. We then generate a number of network anomalous scenarios in OMNeT++/INET network simulator and compare the detection outcomes with those in baseline approaches—RawData and Principal Component Analysis. The experimental results show the superiority of HMM and HMM-UBM models in detection precision and sensitivity.


2013 ◽  
Vol E96.B (12) ◽  
pp. 2986-2997 ◽  
Author(s):  
Md. Ezharul ISLAM ◽  
Nobuo FUNABIKI ◽  
Toru NAKANISHI ◽  
Kan WATANABE

2014 ◽  
Vol 2014 ◽  
pp. 1-7 ◽  
Author(s):  
Dangui Yan ◽  
Chengchang Zhang ◽  
Honghua Liao ◽  
Lisheng Yang ◽  
Ping Li ◽  
...  

Aiming at the problem of inefficiency of wireless local area networks (WLAN) access point (AP) deployment in urban environment, a new algorithm for AP deployment based on physical distance and channel isolation (DPDCI) is proposed. First, it detects the position information of deployed APs and then calculates the interference penalty factor combined with physical distance and channel isolation, and finally gets the optimal location and channel of the new AP through the genetic algorithm. Comparing with NOOCA algorithm and NOFA-2 algorithm, the results of numerical simulation show that the new algorithm can minimize the mutual interference between basic service sets (BSS), can ensure the maximum of throughput based on quality of service (QoS) in BSS, and can effectively improve the system performance.


Sign in / Sign up

Export Citation Format

Share Document