Access Point Selection Strategy for Large-Scale Wireless Local Area Networks

Author(s):  
Lei Du ◽  
Yong Bai ◽  
Lan Chen
Author(s):  
P.L. RAMTEKE ◽  
D.N. CHOUDHARY

The computer network connection without wire or any cable is referring as wireless network. These wireless local area networks are popular for its worldwide applications. It has covered wide scale wireless local area network. The large scale systems to all applicable areas make large numbers of wireless termination and covering very much area. To reduce the complexity associated with server management, Information Technology organizations begins the process of centralizing servers. It used with architecture principles of centralized management requirement for network to scale, network architecture needs to be able to support enhanced services in addition to just raw connectivity, distributed processing is required both for scalability ability and services, network support continuously increase the level of throughputs etc. Wireless LAN product architectures have evolved from single autonomous access points to systems, consisting of a centralized Access Controller and Wireless Termination Points. The basic goal of centralized control architectures is to move access control, including user authentication and authorization, mobility & radio management, from one access point to centralized controller. The Wireless network Control Protocol allows for access and control of large-scale wireless local area networks. It can allows management of these networks, Control and Provisioning of Wireless Access Points In computer networking, a wireless access point is a device that allows wireless devices to connect to wired network using Wi-Fi, Bluetooth or related standards. The WAP usually connects to a router via a wired network, and can relay data between the wireless devices such as computers or printers and wired devices on the network.


2013 ◽  
Vol 18 (4) ◽  
pp. 553-566 ◽  
Author(s):  
Wendong Ge ◽  
Shanzhi Chen ◽  
Hong Ji ◽  
Xi Li ◽  
Victor C. M. Leung

SIMULATION ◽  
2020 ◽  
Vol 96 (12) ◽  
pp. 939-956 ◽  
Author(s):  
Anisa Allahdadi ◽  
Ricardo Morla ◽  
Jaime S Cardoso

Despite the growing popularity of 802.11 wireless networks, users often suffer from connectivity problems and performance issues due to unstable radio conditions and dynamic user behavior, among other reasons. Anomaly detection and distinction are in the thick of major challenges that network managers encounter. The difficulty of monitoring broad and complex Wireless Local Area Networks, that often requires heavy instrumentation of the user devices, makes anomaly detection analysis even harder. In this paper we exploit 802.11 access point usage data and propose an anomaly detection technique based on Hidden Markov Model (HMM) and Universal Background Model (UBM) on data that is inexpensive to obtain. We then generate a number of network anomalous scenarios in OMNeT++/INET network simulator and compare the detection outcomes with those in baseline approaches—RawData and Principal Component Analysis. The experimental results show the superiority of HMM and HMM-UBM models in detection precision and sensitivity.


2013 ◽  
Vol E96.B (12) ◽  
pp. 2986-2997 ◽  
Author(s):  
Md. Ezharul ISLAM ◽  
Nobuo FUNABIKI ◽  
Toru NAKANISHI ◽  
Kan WATANABE

Sign in / Sign up

Export Citation Format

Share Document