scholarly journals Caracterização do Uso de uma Rede Sem Fio de Grande Porte Distribuída por uma Ampla Área

Author(s):  
Luiz Claudio Schara Magalhães ◽  
Diogo Menezes Ferrazani Mattos

Managing wireless networks is challenging due to the requirement of ensuring good performance while coexisting with other networks. This paper analyses a production wireless network that is also used for research. The wireless network at Universidade Federal Fluminense uses home grown technology which was funded by RNP in the SCIFI work group, which is composed of a software controller and low cost access points compatible with OpenWRT. The analysis of the wireless network is performed modeling the network as a directed graph, in which nodes are the access points and edges represent vicinity. Algorithms for choosing the wireless channel in order to maximize performance by minimizing interference both by access points which are controlled or not by the system. The characteristics of associations of user devices to the wireless network are shown. The results of the analysis show that, after the installation of new channel, up to 75% of unmanaged networks in the vicinity of an access point switch their channel to adapt to the new wireless configuration.

Author(s):  
Nurul I. Sarkar

Teaching wireless networking fundamentals is often difficult because many students appear to find the subject technical, and dry when presented in traditional lecture format. To overcome this problem, we provide an opportunity for experiential learning where students can learn wireless networking fundamentals by hands-on practical activities using low-cost Wi-Fi (wireless fidelity) devices such as wireless cards and access points. Students can easily set up and configure networks using wireless cards and access points more effectively. By measuring network performance such as throughput and end-to-end delays, students are able to gain a deeper understanding of wireless networking. The effectiveness of Wi-Fi-based practical activities has been evaluated by students and the teaching team. This chapter reports on the overall effectiveness of teaching and learning of wireless network using radially available low-cost Wi-Fi cards and access points.


2018 ◽  
Vol 7 (2.15) ◽  
pp. 58
Author(s):  
Mohamad Nur Haziq Mohd Safri ◽  
Wan Nor Shuhadah Wan Nik ◽  
Zarina Mohamad ◽  
Mumtazimah Mohamad

In the past five decades, computer network has kept up growing with the increases of its complexity. In such situation, the management, monitoring and maintenance of such computer network requires special attention to ensure optimal network access capability is achieved. Wireless network traffic analysis is a process of recording, studying and analyzing packets in wireless network for network performance analysis purposes. In some cases, the quality of network access performance can be very low without knowing the actual problem. Therefore, in this paper, the performance of wireless network traffic is proposed to be analyzed by using a Raspberry Pi which further able to send an alert to network admin to lessen the downtime. Raspberry Pi is a low cost, a small and portable size of a computer board that can be used to plug-in to monitor, keyboard, mouse, pen drive, etc. In this project, a MyTraceroute (MTR) program is installed on the Raspberry Pi to capture the IP of the Access Point (AP) and show packets loss percentage in the network. The results will be saved in the form of text file and sent to network admin by using email. The solution proposed in this paper is able to support solution to a problem on efficient monitoring, managing and maintaining wireless network traffics.    


T-Comm ◽  
2021 ◽  
Vol 15 (7) ◽  
pp. 28-33
Author(s):  
Albina Y. Sharifullina ◽  
◽  
Roman R. Galyamov ◽  
Rimma S. Zaripova ◽  
◽  
...  

This article discusses the stages of development, characteristics of a wireless local area network Wi-Fi, options for its topology and equipment used. Currently, there are such different types of wireless networks as Wireless Wide Area Network, Wireless Metropolitan Area Networks (Wireless Neighborhood Area Network), Wireless Local Area Network, Wireless Personal Area Network. Each of the listed wireless networks has its own specific range and application. Wireless LAN Wi-Fi refers to the Wireless Local Area Network. The first wireless LAN standard, Wi-Fi, was approved in 1997. From the moment of their appearance to the present day, the following standards of this network have appeared: 802.11a, 802.11b, 802.11g, 802.11n, 802.11ac, 802.11ad, 802.11ax. For each standard, the speeds and frequency ranges at which the data transmission was carried out are indicated, and the technologies on which they are built are described. Wireless LAN Wi-Fi has three topologies: 1) Ad-Hoc (point-to-point) or Independent Basic Service Set; 2) Basic Service Set (“client / server”) and 3) Extended Service Set (“extended service areas”). To build a Wi-Fi network, network adapters, access points, routers, ADSL modems, Wi-Fi phones, Wi-Fi antennas, Wi-Fi repeaters are used. Wi-Fi adapters are used by devices that do not have a built-in Wi-Fi module. Wi-Fi access points are designed for organizing wireless access within a local network. Wi-Fi routers are designed to route traffic on a computer network. ADSL modems are used to access the Internet over a telephone line. Wi-Fi repeaters are used to expand the coverage of a wireless network using already installed equipment. Wi-Fi phones are wireless IP phones. Wi-Fi antennas are used to extend the range of a wireless network.


Author(s):  
Marion Olubunmi Adebiyi ◽  
Egbe Egbe Adeka ◽  
Florence A. Oladeji ◽  
Roseline Oluwaseun Ogundokun ◽  
Micheal Olaolu Arowolo ◽  
...  

<span>Wireless networks came into the computing world replacing the costlier and more complex wired method of connecting numerous equipment in the same or different location via the use of cables. It provides the user devices a connection to one another and the greater internet via connections to access points. Generally, 802.11 access point products follow a default strongest signal first approach in selecting user devices or nodes to connect to the access point or overlapping access points. This standard does not make provisions for even distribution of load and hence the quality of service and the throughput in areas of congestion would be reduced. This article brings forward two algorithms used in load balancing and they include round-robin technique and the weighted round-robin technique to be used in the simulation of the distribution of the load amongst the access points with the results collated and compared to clearly show which algorithm is best suited to be used as a standard for access point load distribution.</span>


Author(s):  
Isaac Chin Eian ◽  
Ka Yong Lim ◽  
Majesty Xiao Li Yeap ◽  
Hui Qi Yeo ◽  
Fatima Z

In recent years, wireless networks have undoubtedly become a convenient way to connect to the Internet and provide connection to everyone in any corner of the world. In fact, in this era, people are connected to the internet almost everyday and wireless networks give us this privilege in a seamless manner. A wireless network normally consists of access points and nodes where the access points are responsible to amplify the wireless signals, while the nodes are the gadgets that are receiving these signals. However, with such great convenience provided, many challenges are also faced by the users and stakeholders. With no physical connection to devices, wireless networks are evidently more vulnerable to invisible cyber attacks. In this research paper, it the security issues that cause issues in the wireless networks are discussed. Furthermore, an analytical review of privacy challenges found in these networks is performed; these challenges are segregated into security issues and privacy issues. The paper will then present the methods used in conducting a survey and gathering the research results along with further discussion on the results obtained through this study. Finally, a suitable solution is proposed to prevent and overcome the intrusions faced in terms of security and privacy in wireless network scenarios through detection and response mechanism for mitigation of the problems.


2019 ◽  
Vol 2 (2) ◽  
pp. 20
Author(s):  
Ahmad Tantoni ◽  
Mohammad Taufan Asri Zaen

The wireless network at STMIK Lombok is connected to the local server network and the internet with the spread of access points in several buildings. In some parts of the building have different strengths and the access point or wireless signal strengths, some have broad and strong signal coverage, but there are also areas that have limited / weak signal coverage, even no wireless or blank-spot signal. This blank spot can be caused by many obstacles, including walls, tiles, trees, and others. Based on observations at STMIK Lombok, wireless signal coverage has not been able to cover the entire campus building area; many are unstable and tend to be weak. Therefore, wireless management research was conducted by mapping the SSID access point which is expected to offer/give a solution so that the wireless signal can cover all STMIK Lombok campus buildings. Wireless management by mapping SSID access points on STMIK Lombok provides a solution for location placement and number of access points to be installed so that the campus area of ​​STMIK Lombok can be covered by wireless networks. Keywords : wireless, wireless network, mapping SSID, access point, MikroTik


2021 ◽  
Vol 3 (11) ◽  
pp. 144-154
Author(s):  
Roman Korolkov

One of the most serious security threats to wireless local area networks (WLANs) in recent years is rogue access points that intruders use to spy on and attack. Due to the open nature of the wireless transmission medium, an attacker can easily detect the MAC addresses of other devices, commonly used as unique identifiers for all nodes in the network, and implement a spoofing attack, creating a rogue access point, the so-called "Evil Twin". The attacker goal is to connect legitimate users to a rogue access point and gain access to confidential information. This article discusses the concept, demonstrates the practical implementation and analysis of the “Evil Twin” attack. The algorithm of the intruder's actions, the scenario of attack on the client, and also procedure for setting up the program-implemented rogue access point is shown. It has been proven that the implementation of the attack is possible due to the existence of several access points with the same service set identifier and MAC address in the same area, allowed by 802.11 standard. The reasons for failure operation of the network and possible interception of information as a result of the attack are identified, methods of detecting rogue access points are analyzed. During the experiment, observations of the 802.11 frames showed that there were deviations in the behavior of beacon frames at the time of the "Evil Twin" attack. First, the number of beacon frames coming from the access point which succumbed to the attack is increasing. Secondly, the traffic analyzer detected significant fluctuations in the values of the received signal level, which simultaneously come from a legitimate and rogue access point, which allows to distinguish two groups of beacon frames. The "Evil Twin" attack was implemented and researched using Aircrack-ng – a package of software for auditing wireless networks, and Wireshark – network traffic analyzer. In the future, the results obtained can be used to improve methods of protection against intrusion into wireless networks, in order to develop effective systems for detecting and preventing intrusions into WLAN.


2016 ◽  
Vol 2016 ◽  
pp. 1-8 ◽  
Author(s):  
Jaime Duque Domingo ◽  
Carlos Cerrada ◽  
Enrique Valero ◽  
J. A. Cerrada

This work presents a newIndoor Positioning System(IPS) based on the combination ofWiFi Positioning System(WPS) anddepth maps, for estimating the location of people. The combination of both technologies improves the efficiency of existing methods, based uniquely on wireless positioning techniques. While other positioning systems force users to wear special devices, the system proposed in this paper just requires the use ofsmartphones, besides the installation of RGB-D sensors in the sensing area. Furthermore, the system is not intrusive, being not necessary to know people’s identity. The paper exposes the method developed for putting together and exploiting both types of sensory information with positioning purposes: the measurements of the level of the signal received from different access points (APs) of the wireless network and thedepth mapsprovided by the RGB-D cameras. The obtained results show a significant improvement in terms of positioning with respect to common WiFi-based systems.


Author(s):  
S. B. Vanjal ◽  
Amol K. Kadam ◽  
Pramod A. Jadhav

Rogue Access Points (RAPs) is one of the leading security threats in current network scenario, if not properly handled in time could lead from minor network faults to serious network failure. Most of the current solutions to detect rogue access points are not automated and are dependent on a specific wireless technology. In this paper we propose the integrated solution for detection and eliminate the rogue access points. Rogue detection algorithm is also proposed. This Methodology has the following properties: (1) it doesn’t require any specialized hardware; (2) the proposed algorithm detects and completely eliminates the RAPs from network; Our proposed solution is effective and low cost.


2019 ◽  
Vol 2 (1) ◽  
pp. 155-164
Author(s):  
Ichsan Wiratama ◽  
Putu Sugiartawan

The access point configuration used for wireless connections in Amikom is manually configured one by one. Each access point is configured using several SSIDs based on the department that will connect to the access point. The use of multiple SSIDs in one access point turned out to have a bad effect on network performance, from the test results, for access points configured with more than four SSIDs, the connection was very slow. The security standard used for connection from the user to the access point is WPA Personal, where WPA Personal can be said to be very weak because for each SSID it will use the same user and password for all users, this is often the cause of access leaks. To improve network security and make it easier for the author to do maintenance on the network, the author tries to use the IEEE 802.1X protocol that is connected with RADIUS and access point controllers so that the configuration and maintenance of wireless networks can be centralized, user administration and passwords can also be centralized server radius and also a better level of security using WPA Enterprise security in the IEEE 802.1X protocol.


Sign in / Sign up

Export Citation Format

Share Document