Search results for "wifi"
showing 10 items of 30 documents
Hybrid VLC/WiFi Architectures with Priority Feedback Channels
2022
In this paper, we consider integrating Visible Light Communication (VLC) and WiFi technologies in an ultra-dense (massive) Internet of Things scenario, where WiFi links are used for complementing VLC links and vice-versa. Indeed, in case of mobility and/or bidirectional communications, limited coverage areas and self-generated interference can be an issue. We consider hybrid VLC/WiFi nodes where the VLC link is used for the majority of (data) traffic and the WiFi link is employed as a feedback channel (e.g. transmitting TCP ACKs). In presence of intense WiFi traffic, the WiFi network may be congested and thus, to fully exploit the VLC bandwidth, we discuss possible priority mechanisms to fu…
WIDAR: Bistatic WI-fi Detection And Ranging for off-the-shelf devices
2013
The huge spread of wireless networks and the success of location-aware applications require novel indoor po- sitioning mechanisms based on existing technologies such as IEEE 802.11. Taking inspiration from the RADAR, we propose WIDAR: a bistatic WI-fi Detection And Ranging system for off- the-shelf devices. WIDAR implementation is based on the USRP2 platform and is able to locate 802.11 stations while they operate in existing legacy networks. No substitution or repositioning of the Access Points is necessary. WIDAR works passively and does not expect any dedicated action from the target WiFi node. No airtime is wasted and the target cannot even detect that it is being ranged. Such features …
Achieving Fair Bandwidth Distribution in WiFi Networks: A Game Theoretical Approach
2011
International audience; Achieving fair bandwidth distribution among uplink and downlink ows in IEEE 802.11 infrastructure networks is a complex issue, due to the well-known features of the Distributed Coordination Function (DCF) which regulates the access to the shared medium. Indeed, the dynamic adaptation of the contention windows causes phenomena of short-term unfairness, while the use of homogeneous contention parameters among the contending nodes makes the aggregated downlink bandwidth equal to the uplink bandwidth of a single node. We propose a dynamic tuning of the contention parameters used by the nodes, based on simple network monitoring functionalities and rational strategies. Spe…
Making WiFi work in multi-hop topologies: Automatic negotiation and allocation of airtime
2015
We propose a solution for mitigating the performance impairments of CSMA/CA protocols in multi-hop topologies based on the dynamic adaptation of the contention process experienced by nodes in a wireless network. A distributed protocol is used to negotiate the channel airtime for a node as a function of the traffic requirements of its neighbourhood, taking into account bandwidth reserved for the control operations. A mechanism is provided for a node to tune its contention window depending on its allocated airtime. Different from previous schemes, a node's contention window is fixed in size unless the traffic requirements of its neighbourhood change. The scheme is implemented on legacy commer…
An Inter-Technology Communication Scheme for WiFi/ZigBee Coexisting Networks
2017
In this paper we show how inter-technology interference can be exploited to set-up a low-rate bi-directional communication channel between heterogeneous technologies, which coexist in ISM bands. In particular, we focus on WiFi and ZigBee networks, whose high density deployments make coexistence a critical issue. We monitor the transmission duration of the interference and, after recognizing ZigBee interference from WiFi off-the-shelf receivers, we precisely measure the channel busy intervals to map time duration to communication symbols. A similar approach is used on the ZigBee receivers for making the communication channel bidirectional. Extensive experimental results show the feasibility …
Interference Estimation in IEEE 802.11 Networks
2010
This article describes a technique for distinguishing and quantifying medium access control (MAC) and physical layer (PHY) interference in error-prone 802.11 networks. This technique, is fully distributed, allowing each station to estimate interference individually. The estimator is based on an extended Kalman filter coupled to a mechanism for revealing abrupt changes in state. The network state is a vector of two components, representing PHY interference, expressed in terms of channel-error rate, and MAC interference. Two distinct state models are considered. When PHY interference can be assumed to be constant for all stations, network congestion is expressed by the number of competing ter…
The Risks of WiFi Flexibility: Enabling and Detecting Cheating
2013
Flexibility is an important paradigm for future WiFi networks. However, it also opens the possibility for diverse methods of cheating, which users can perform to increase their throughput. Therefore, it is important to develop the necessary tools to mitigate such efforts. In this paper we first discuss the risks of flexibility in terms of misbehaviour. We then propose an architecture to detect misbehaviour and react by punishing the cheaters. The proposed architecture utilizes advanced passive monitoring, flexible WiFi software, and appropriate reasoning to detect cheating. We validate its performance and discuss means of punishment
A game theoretic approach to MAC design for infrastructure networks
2010
Wireless network operation intrinsically assumes different forms of cooperation among the network nodes, such as sharing a common wireless medium without interfering, relaying frames belonging to other nodes, controlling the transmission power for optimizing spectrum reuse, coding cooperatively multiple frames for improving information redundancy, and so on. For this reason, Game Theory has been extensively employed to model wireless networks. In particular, we propose a game-theoretic approach for defining a generalized medium access protocol for slotted contention-based channels. Contention-based channels are largely adopted in data networks, e.g. in WiFi and WiMax networks and in some em…
BusyBee: Low Rate WiFi-ZigBee Communications without Gateways
2014
Nowadays, the overcrowding of ISM bands is becoming an evident limitation for the performance and widespread us- age of 802.11 and 802.15.4 technologies. In this demo, we prove that it is possible to opportunistically exploit the inter- technology interference between 802.11 and 802.15.4 to build an unconventional low-rate communication channel and sig- nalling protocol, devised to improve the performance of each contending technology. Differently from previous solutions, inter-technology communications do not require the deploy- ment of a gateway with two network interfaces, but can be activated (when needed) directly between two heterogeneous nodes, e.g. a WiFi node and a ZigBee node. Thi…
On the effects of transmit power control on the energy consumption of WiFi network cards
2009
Transmit power control has been largely proposed as a solution to improve the performance of packet radio systems in terms of increased throughput, spatial reuse and battery lifetime for mobile terminals. However, the benefits of transmit power control schemes on these different performance figures may strongly depend on the employed PHY technology and channel access mechanism. In this paper, we focus on the effects of power control on the energy consumption of WiFi network cards. By means of several experimental tests carried out under different operation conditions and modulation schemes, we try to justify why the reduction of the transmission power has a marginal effect on the overall en…