ﻻ يوجد ملخص باللغة العربية
To address 5G challenges, IEEE 802.11 is currently developing new amendments to the Wi-Fi standard, the most promising of which is 802.11ax. A key scenario considered by the developers of this amendment is dense and overlapped networks typically present in residential buildings, offices, airports, stadiums, and other places of a modern city. Being crucial for Wi-Fi hotspots, the hidden station problem becomes even more challenging for dense and overlapped networks, where even access points (APs) can be hidden. In this case, user stations can experience continuous collisions of beacons sent by different APs, which can cause disassociation and break Internet access. In this paper, we show that beacon collisions are rather typical for residential networks and may lead to unexpected and irreproducible malfunction. We investigate how often beacon collisions occur, and describe a number of mechanisms which can be used to avoid beacon collisions in dense deployment. Specifically, we pay much attention to those mechanisms which are currently under consideration of the IEEE 802.11ax group.
Ultra Reliable Low Latency Communications (URLLC) is an important challenge for the next generation wireless networks, which poses very strict requirements to the delay and packet loss ratio. Satisfaction is hardly possible without introducing additi
Data traffic over cellular networks is exhibiting an ongoing exponential growth, increasing by an order of magnitude every year and has already surpassed voice traffic. This increase in data traffic demand has led to a need for solutions to enhance c
We show experimentally that workload-based AP-STA associations can improve system throughput significantly. We present a predictive model that guides optimal resource allocations in dense Wi-Fi networks and achieves 72-77% of the optimal throughput w
The application of Machine Learning (ML) techniques to complex engineering problems has proved to be an attractive and efficient solution. ML has been successfully applied to several practical tasks like image recognition, automating industrial opera
We unveil the existence of a vulnerability in Wi-Fi, which allows an adversary to remotely launch a Denial-of-Service (DoS) attack that propagates both in time and space. This vulnerability stems from a coupling effect induced by hidden nodes. Cascad