Consistent monitoring of Wi-Fi network topology

CBS | CoS | vpnshazam | Wifi | wireless
Consistent monitoring of Wi-Fi network topology

Consistent monitoring of Wi-Fi network topology

At present, all machines need to communicate with each other. For that reason, the use of the Internet
has become so fundamental for us over other technologies. However, this would never have been
possible if we did not have wireless media; that is, devices capable of linking through the air by
electromagnetic waves. Today, we’ll talk about reliable monitoring of Wi-Fi network topology.

In the area of Wi-Fi environments, it is common to refer to wireless links in terms of “short distances”
(for example, at home or in a company). From them, the devices connect to an access point, which is
responsible for providing the network service. All devices that need to connect wirelessly to the network
must use it.

One of the features that the access point has is the possibility of scanning the different Wi-Fi frequency
bands in which you can operate to discover. In the business environment, this functionality can be used
to find authorized or unauthorized access points, thus avoiding malicious or misconfigured Wi-Fi that
could harm users. Therefore, it is highly recommended to continuously monitor the access points that
are within the corresponding Wi-Fi area.

One of the fundamental problems when it comes to scanning Wi-Fi frequencies at an access point is that
it must provide an uninterrupted service to the stations. This contradicts the scanning process, since,
every time a scan is performed, devices must be inevitably interrupted in order to change the frequency
within the Wi-Fi band and discover other access points in external channels. Consequently, the end user
could perceive this service stop. It would be enough to make a video call. In fact, the interruption would
be noticeable by the user even if he used any type of application that works with the network in real
time and the packet loss is significant.

To address this problem, the access point would have to scan its entire band periodically and make a
channel change without deteriorating service quality. There are different feasible solutions in this
regard. One is to use an auxiliary radio that facilitates monitoring. Another possible alternative, that
instead of performing a full scan at a given time, is to perform a continuous scan.

CBS (Continuous Background Scanning) for VoW scanning and switching channels

The choice of a continuous scan is the result of wanting to avoid sweeping all frequencies in a single
moment of time, an action that would have a negative impact on the quality of service of the devcies.
Why? Simply, because the radio must change to all the channels of the frequency band and remain a
while listening to information frames of other access points.

In this context, the point must monitor the type of traffic carried out at all times. In most of the current
access points, the type of traffic is taken into account, with four CoS priority levels as a reference, where
VoIP and video streaming traffic are marked with the highest priority levels.

Based on this concept of “priority queues”, the access point will carry out the scan avoiding a change of
channel every time you have queued, voice or video traffic on the channel where you are using the
device.

As soon as the access point is free of this type of traffic, a change of channel takes place in a short time
in search of information messages of other access points on the external channel. Several scans of that
same channel will be carried out in short periods of time, so as to avoid deteriorating the quality of
service of the stations that are using the access point. The total listening time on a channel is the same
as without using CBS, but divided into shorter intervals that prevent the cutting of priority traffic.

Wi-Fi network topology monitoring

To obtain reliable Wi-Fi network topology monitoring with this scan model, the system relies on two
assumptions:

1. Access points periodically send AP information messages in an average interval of 100 ms.

2. The scan is performed continuously and the same external channel is scanned several times
before the end of the scan.

The configurable parameters in this scan model are the following:

 The scan time.

 The waiting time on each external channel.

 The rest time in which a channel change is not made within the interval of the scan itself.

These parameters are usually configurable and depend heavily on the number of devices and the kind of
CoS traffic to be used within the Wi-Fi network. The way to calibrate these parameters is usually to
perform the scan at the same time that VoIP traffic is being sent, and verify that there is no packet loss
and the network monitoring conforms to the real network topology.

VPNshazam is specialized in this area and in addition to providing virtual private network, we can
answer to all of your queries within a few minutes.

How to Obtain A Korean IP Address From Any Country?

Korean music and movie lovers, do you want to obtain a Korean IP? You can not access your desired Korean content (music, videos, TV programs, etc.)

How to Install VPN On Xbox One?

Installing a VPN on Xbox One saves online freedom and privacy, but it also lets you do a lot more than that.

What Is A Tunnel VPN? How Does VPN Tunnel Work?

A tunnel VPN is a secure and encrypted VPN connection. This connection is between your device and the public Internet. Your communication remains private

Tik Tok Teen Protection Guidelines for The Parents

Probably your children spend a lot of time on Tik Tok. We will explain everything to you on the Tik Tok Teen Protection Tips.

How to Access the Dark Web from Your Computer?

Do you want to know? How to access the dark web? Questions and fantasies are arising about what a human can find there on the dark web.

VPNshazam Tax Free VPN

A Virtual Private Network is a type of secure internet connection, that creates a channel between the system of the user and the server that is externally used to access the information on the internet. It ensures privacy and provide security. The Network allows the...

Turkey Lifts Restrictions on the Social Media

Turkey Lifted restrictions on the Social Media on 6th April, 2015, after the sites agreed to comply with a court order to stop propagating the images of a prosecutor that was held at the gunpoint. As for now, the ban on Facebook and Twitter has been lifted, and the...

Dynamic VPN: Utility Galore

The traditional form of business has now been replaced by the online business, thanks to the advent of Internet. And the security of data over the Internet has become quite important for any online business. Since lots of banking transactions, passwords and other...

Is Online Banking Secure?

Information pertaining to bank can be considered to be most sensitive. Financial transactions now can be handled online as you are aware but along with it comes the threats. Internet is a very scary place and to tackle hackers, cyber criminals, snoopers online...

How Can User Increase Their Online Security

Online security is the most crucial thing for the all the internet users as several types of cyber scams have been evolved which are responsible for stealing the confidential information. The people who think installation of anti-virus, firewall and anti-spyware...