Consistent monitoring of Wi-Fi network topology

CBS | CoS | vpnshazam | Wifi | wireless
Consistent monitoring of Wi-Fi network topology

Consistent monitoring of Wi-Fi network topology

At present, all machines need to communicate with each other. For that reason, the use of the Internet
has become so fundamental for us over other technologies. However, this would never have been
possible if we did not have wireless media; that is, devices capable of linking through the air by
electromagnetic waves. Today, we’ll talk about reliable monitoring of Wi-Fi network topology.

In the area of Wi-Fi environments, it is common to refer to wireless links in terms of “short distances”
(for example, at home or in a company). From them, the devices connect to an access point, which is
responsible for providing the network service. All devices that need to connect wirelessly to the network
must use it.

One of the features that the access point has is the possibility of scanning the different Wi-Fi frequency
bands in which you can operate to discover. In the business environment, this functionality can be used
to find authorized or unauthorized access points, thus avoiding malicious or misconfigured Wi-Fi that
could harm users. Therefore, it is highly recommended to continuously monitor the access points that
are within the corresponding Wi-Fi area.

One of the fundamental problems when it comes to scanning Wi-Fi frequencies at an access point is that
it must provide an uninterrupted service to the stations. This contradicts the scanning process, since,
every time a scan is performed, devices must be inevitably interrupted in order to change the frequency
within the Wi-Fi band and discover other access points in external channels. Consequently, the end user
could perceive this service stop. It would be enough to make a video call. In fact, the interruption would
be noticeable by the user even if he used any type of application that works with the network in real
time and the packet loss is significant.

To address this problem, the access point would have to scan its entire band periodically and make a
channel change without deteriorating service quality. There are different feasible solutions in this
regard. One is to use an auxiliary radio that facilitates monitoring. Another possible alternative, that
instead of performing a full scan at a given time, is to perform a continuous scan.

CBS (Continuous Background Scanning) for VoW scanning and switching channels

The choice of a continuous scan is the result of wanting to avoid sweeping all frequencies in a single
moment of time, an action that would have a negative impact on the quality of service of the devcies.
Why? Simply, because the radio must change to all the channels of the frequency band and remain a
while listening to information frames of other access points.

In this context, the point must monitor the type of traffic carried out at all times. In most of the current
access points, the type of traffic is taken into account, with four CoS priority levels as a reference, where
VoIP and video streaming traffic are marked with the highest priority levels.

Based on this concept of “priority queues”, the access point will carry out the scan avoiding a change of
channel every time you have queued, voice or video traffic on the channel where you are using the
device.

As soon as the access point is free of this type of traffic, a change of channel takes place in a short time
in search of information messages of other access points on the external channel. Several scans of that
same channel will be carried out in short periods of time, so as to avoid deteriorating the quality of
service of the stations that are using the access point. The total listening time on a channel is the same
as without using CBS, but divided into shorter intervals that prevent the cutting of priority traffic.

Wi-Fi network topology monitoring

To obtain reliable Wi-Fi network topology monitoring with this scan model, the system relies on two
assumptions:

1. Access points periodically send AP information messages in an average interval of 100 ms.

2. The scan is performed continuously and the same external channel is scanned several times
before the end of the scan.

The configurable parameters in this scan model are the following:

 The scan time.

 The waiting time on each external channel.

 The rest time in which a channel change is not made within the interval of the scan itself.

These parameters are usually configurable and depend heavily on the number of devices and the kind of
CoS traffic to be used within the Wi-Fi network. The way to calibrate these parameters is usually to
perform the scan at the same time that VoIP traffic is being sent, and verify that there is no packet loss
and the network monitoring conforms to the real network topology.

VPNshazam is specialized in this area and in addition to providing virtual private network, we can
answer to all of your queries within a few minutes.

How to Obtain A Korean IP Address From Any Country?

Korean music and movie lovers, do you want to obtain a Korean IP? You can not access your desired Korean content (music, videos, TV programs, etc.)

How to Install VPN On Xbox One?

Installing a VPN on Xbox One saves online freedom and privacy, but it also lets you do a lot more than that.

What Is A Tunnel VPN? How Does VPN Tunnel Work?

A tunnel VPN is a secure and encrypted VPN connection. This connection is between your device and the public Internet. Your communication remains private

Tik Tok Teen Protection Guidelines for The Parents

Probably your children spend a lot of time on Tik Tok. We will explain everything to you on the Tik Tok Teen Protection Tips.

How to Access the Dark Web from Your Computer?

Do you want to know? How to access the dark web? Questions and fantasies are arising about what a human can find there on the dark web.

The Ultimate VPN Service Provider

Today’s era is rightly known as the Internet era. The adolescents of today are more familiar with the Icon of Internet explorer than their relatives. They grow with it and if they are angry, they put it in their status on the Net. When they are happy, then too they...

Tips for Job Search on the Internet

Looking for a job is always a delicate task that requires a lot of work and patience. Whether you are looking for a new position or an experienced job, you have all used the same tool: the Internet. It can be a good ally if you know how to use it, but it is a...

Is VPN required for IPTV ?

IPTV services are gaining popularity in recent times and are considered to be a good alternative to existing expensive cable subscriptions. With popularity comes pressure from content providers to throttle or restrict services. It could mean ISPs can throttle or even...

Does Public Trust The Internet?

Many cool things you read, watch and discover are form internet. Whether you have streamed a live game, checked out an amazing documentary or watched the latest news on your role model, whatever it may be; internet has played a major role in bringing the world to your...

All About Secure Messaging

Since late 1990s instant messaging has evolved a lot. Its evolution made it to secure messaging which is necessary in today's digital era. AIM was a messaging tool popular in 1990s and was used by kids to meet each other. Nowadays large number of conversations occur...