scholarly journals Wireless Access Points Placement Analysis on WI-FI Signal Coverage with BAYESIAN Probability Method

Author(s):  
Mahbub Puba Fawzan ◽  
Bambang Sugiantoro

Wireless networks in a room are strongly influenced by interference. To overcome the interference and so that the performance from the wireless network is getting better, then optimization is done. There are several types of propagation that can interfere with the performance of wireless networks, which include the number of transmitters (access points), free space loss, Received Signal Strength (RSSI), coverage that can be served, measuring attenuation on barriers (concrete walls, soft partitions, doors, and floors).This research is an analytical study where the purpose of this study is to determine the position of access point a good in the Shari'ah Faculty Building and the Law using the method of Bayesian probability. The first stage of this research is to determine the distance of the signal reception to find out the strength of the signal with manual random sampling so that the data obtained varies. The second stage is to determine the position of the access point with a choice of several points so that the best position can be compared based on the plan of the Syari'ah Faculty and Law Building. The last step is calculating probability by the method of Bayesian probability.The results of this study are the position of the access point best on the 3rd floor, namely at position B with a probability value of 13 while on the 4th floor the position of access the point best in position A with a value of 10, position D with a value of 13 and position E with a value of 13. The most influential propagation in the Syari'ah Faculty Building and the Law is a concrete wall with a size of 60% reducing the magnitude of the signal emitted.(Abstract)

2017 ◽  
Vol 2 (2) ◽  
pp. 81
Author(s):  
Bambang Sugiantoro ◽  
Mahbub Puba Fawzan

The wireless network indoors is strongly influenced by the presence of interference. To overcome such interference and to improve the performance of wireless networks, then the optimization is done. There are several kinds of propagation that can interfere with the performance of the wireless network, which includes the number of transmitters (access point), free space loss, Received Signal Stength (RSSI), coverage that can be served, measuring attenuation at the barrier (concrete wall, soft partition, door, and floor).This research is an analysis research where the purpose of this research is to determine the position of good access point at Faculty of Shari'ah and Law Building using bayesian probability method. The first stage of this research is to determine the distance of signal reception to know the strength of the weak signal with manual random sampling so that the data obtained vary. The second stage is to determine the position of the access point with a choice of several points in order to be able to compare the best position based on the floor plan of the Faculty of Shari'ah and Law. The last stage is to calculate probability with Bayesian probability method.Result of this research is the position of the best access point on the 3rd floor that is at position B with probability value 13 while on floor 4 the best access point position at position A with value 10, position D with value 13 and position E with value 13. The most influential propagation in the Faculty of Shari'ah and Law Building is a concrete wall with a large 60% reducing the mass of radiated signals.


Author(s):  
Marion Olubunmi Adebiyi ◽  
Egbe Egbe Adeka ◽  
Florence A. Oladeji ◽  
Roseline Oluwaseun Ogundokun ◽  
Micheal Olaolu Arowolo ◽  
...  

<span>Wireless networks came into the computing world replacing the costlier and more complex wired method of connecting numerous equipment in the same or different location via the use of cables. It provides the user devices a connection to one another and the greater internet via connections to access points. Generally, 802.11 access point products follow a default strongest signal first approach in selecting user devices or nodes to connect to the access point or overlapping access points. This standard does not make provisions for even distribution of load and hence the quality of service and the throughput in areas of congestion would be reduced. This article brings forward two algorithms used in load balancing and they include round-robin technique and the weighted round-robin technique to be used in the simulation of the distribution of the load amongst the access points with the results collated and compared to clearly show which algorithm is best suited to be used as a standard for access point load distribution.</span>


Author(s):  
Westi Yulia Pusvita ◽  
Yasdinul Huda

This research originated from the quality of the wifi.id internet network in the area of Air Tawar which is varied and more suitable for locations that are farther away than the access points. This study aims to find the quality of the wifi.id internet network in the Air Tawar area, and to obtain the results of delay, packet loss, and throughput generated in measuring the quality of the wifi.id network and compare it with the TIPHON standard. This research is a descriptive research. The population of this study is the wifi.id access point in the Air Tawar  area with a research sample of three wifi.id access point locations on Air Tawar. This research was conducted by measuring the quality of wifi.id using the axence nettols 5 application for 10 days in the morning, afternoon and evening. From  the results of the research after analysis obtained: (1) The best delay measurement is on Jl. Gajah TP 1 with a value of 8.5 ms and the worst on Jl. Parkit TP 4 with a value of 64.8 ms. (2) The best packet loss measurement is on Jl. Gajah TP 1 with a value of 0.1% and the worst on Jl. Parkit TP 4 with a value of 25.2%. (3) The best throughput measurements can be found at Jl. Gajah TP 1 with a value of 93.04% and the worst on Jl. Parkit TP 4 with a value of 45.21%. Keywords: Delay, Packet loss, Throughput, TIPHON, Axence Nettols 5


2021 ◽  
Vol 3 (11) ◽  
pp. 144-154
Author(s):  
Roman Korolkov

One of the most serious security threats to wireless local area networks (WLANs) in recent years is rogue access points that intruders use to spy on and attack. Due to the open nature of the wireless transmission medium, an attacker can easily detect the MAC addresses of other devices, commonly used as unique identifiers for all nodes in the network, and implement a spoofing attack, creating a rogue access point, the so-called "Evil Twin". The attacker goal is to connect legitimate users to a rogue access point and gain access to confidential information. This article discusses the concept, demonstrates the practical implementation and analysis of the “Evil Twin” attack. The algorithm of the intruder's actions, the scenario of attack on the client, and also procedure for setting up the program-implemented rogue access point is shown. It has been proven that the implementation of the attack is possible due to the existence of several access points with the same service set identifier and MAC address in the same area, allowed by 802.11 standard. The reasons for failure operation of the network and possible interception of information as a result of the attack are identified, methods of detecting rogue access points are analyzed. During the experiment, observations of the 802.11 frames showed that there were deviations in the behavior of beacon frames at the time of the "Evil Twin" attack. First, the number of beacon frames coming from the access point which succumbed to the attack is increasing. Secondly, the traffic analyzer detected significant fluctuations in the values of the received signal level, which simultaneously come from a legitimate and rogue access point, which allows to distinguish two groups of beacon frames. The "Evil Twin" attack was implemented and researched using Aircrack-ng – a package of software for auditing wireless networks, and Wireshark – network traffic analyzer. In the future, the results obtained can be used to improve methods of protection against intrusion into wireless networks, in order to develop effective systems for detecting and preventing intrusions into WLAN.


2019 ◽  
Vol 2 (1) ◽  
pp. 155-164
Author(s):  
Ichsan Wiratama ◽  
Putu Sugiartawan

The access point configuration used for wireless connections in Amikom is manually configured one by one. Each access point is configured using several SSIDs based on the department that will connect to the access point. The use of multiple SSIDs in one access point turned out to have a bad effect on network performance, from the test results, for access points configured with more than four SSIDs, the connection was very slow. The security standard used for connection from the user to the access point is WPA Personal, where WPA Personal can be said to be very weak because for each SSID it will use the same user and password for all users, this is often the cause of access leaks. To improve network security and make it easier for the author to do maintenance on the network, the author tries to use the IEEE 802.1X protocol that is connected with RADIUS and access point controllers so that the configuration and maintenance of wireless networks can be centralized, user administration and passwords can also be centralized server radius and also a better level of security using WPA Enterprise security in the IEEE 802.1X protocol.


2020 ◽  
Vol 6 (12) ◽  
pp. 2352-2362
Author(s):  
S. Benakli ◽  
Y. Bouafia ◽  
M. Oudjene ◽  
K. Benyahi ◽  
A. Hamri

The main objective of this article is to apply a simplified model to simulate the overall behavior of a reinforced concrete wall without the need to explicitly represent the reinforcing bars in the model nor the progressive degradations of the concrete in tension. The model takes into account the fictitious laws of the material, in order to estimate the capacity of the studied model and its performance to simulate the complex behavior of concrete. The law of the fictitious behavior of reinforced concrete tie rods is based on the shape of the adhesion curve between steel and concrete. Relationships covering the cracking stage up to the elastic limit of steel are proposed according to the properties of concrete and steel materials, the percentage of steel. An analytical computational model is then implemented in the Matlab programming language. Necessary transformations for the integration of the law of fictitious average behavior of steel in the Abaqus software were carried out thus making it possible to make a considerable advance from the point of view of validation of the developed law. The general formulation of the tension law applies to sections where the reinforcements are distributed so that the resistance of the entire section is mobilized. Hence the need to introduce an effective area around the rebars for the application of the fictitious tension law to reinforced concrete walls. Numerical simulations have been validated using an example of reinforced concrete wall subjected to a quasi-static loading. Load-displacement responses are compared and the numerical results approaches well the experimental one. By using the law of the fictitious diagram of the concrete and by defining the effective tensile zone of the wall, the model makes it possible to save a considerable time of calculation compared to a traditional calculation in EF on Abaqus. Doi: 10.28991/cej-2020-03091622 Full Text: PDF


2018 ◽  
Author(s):  
Luiz Claudio Schara Magalhães ◽  
Diogo Menezes Ferrazani Mattos

Managing wireless networks is challenging due to the requirement of ensuring good performance while coexisting with other networks. This paper analyses a production wireless network that is also used for research. The wireless network at Universidade Federal Fluminense uses home grown technology which was funded by RNP in the SCIFI work group, which is composed of a software controller and low cost access points compatible with OpenWRT. The analysis of the wireless network is performed modeling the network as a directed graph, in which nodes are the access points and edges represent vicinity. Algorithms for choosing the wireless channel in order to maximize performance by minimizing interference both by access points which are controlled or not by the system. The characteristics of associations of user devices to the wireless network are shown. The results of the analysis show that, after the installation of new channel, up to 75% of unmanaged networks in the vicinity of an access point switch their channel to adapt to the new wireless configuration.


INGENIO ◽  
2020 ◽  
Vol 3 (2) ◽  
pp. 15-25
Author(s):  
Mario Chavez Estrella ◽  
Robert Enríquez-Reyes ◽  
Giovanny Cadena Flores ◽  
Milton G. Mocayo Unda
Keyword(s):  

El presente artículo tiene como finalidad mostrar información completa, precisa y en tiempo real, sobre la movilidad de los usuarios en un campus, identificando tipos de usuarios y sus características, todo esto mediante una plataforma informática constituida por dos aplicaciones un API especializado en el almacenamiento de la data depurada hacia una base de datos relacional, y una aplicación web que presenta información al usuario final. Dicha plataforma se desarrolla mediante el uso de tecnologías y herramientas de código abierto. La información entregada procede de los Access Points instalados en la red de comunicaciones del campus, la cual, mediante tratamiento informático, es anonimizada, almacenada, depurada y clasificada para su posterior análisis. Como caso de estudio se ha implementado la aplicación en el contexto universitario específicamente en la Universidad Central del Ecuador.


2019 ◽  
Vol 15 (2) ◽  
pp. 188
Author(s):  
Rukiyah Rukiyah ◽  
Ana Irhandayaningsih ◽  
Lydia Christiani

Introduction. Radio Boekoe as a community that affected by the determination of information technology, adapts through the deconstruction process of information dissemination access points by utilizing hybrid media. This study aims to discuss the deconstruction process of information dissemination access points on Radio Boekoe.Research methods. This research used a qualitative method with case study approach. The process of collecting data involved observations, interviews, and documentation studies. The informants are the founder, manager and volunteer of Radio Boekoe.Data Analysis. The research data was analyzed with the stages of reduction, display, and drawing conclusions.Results and Discussion. The deconstruction process of information access points on Radio Boekoe occurred through the use of hybrid media. The deconstruction process of the information access point was expanded to the process of adding information access capacity in the form of Bale Black Box co-working space.Conclusions. The process of deconstruction of information access points on Radio Boekoe occurs through the shifting of local access points in the form of the Gelaran Iboekoe to global hybrid media-based access in the form of internet radio. Furthermore, it is recommended to conduct a research to examine the effectiveness of using hybrid media to expand information access points.


Sign in / Sign up

Export Citation Format

Share Document