Consistent monitoring of Wi-Fi network topology

CBS | CoS | vpnshazam | Wifi | wireless
Consistent monitoring of Wi-Fi network topology

Consistent monitoring of Wi-Fi network topology

At present, all machines need to communicate with each other. For that reason, the use of the Internet
has become so fundamental for us over other technologies. However, this would never have been
possible if we did not have wireless media; that is, devices capable of linking through the air by
electromagnetic waves. Today, we’ll talk about reliable monitoring of Wi-Fi network topology.

In the area of Wi-Fi environments, it is common to refer to wireless links in terms of “short distances”
(for example, at home or in a company). From them, the devices connect to an access point, which is
responsible for providing the network service. All devices that need to connect wirelessly to the network
must use it.

One of the features that the access point has is the possibility of scanning the different Wi-Fi frequency
bands in which you can operate to discover. In the business environment, this functionality can be used
to find authorized or unauthorized access points, thus avoiding malicious or misconfigured Wi-Fi that
could harm users. Therefore, it is highly recommended to continuously monitor the access points that
are within the corresponding Wi-Fi area.

One of the fundamental problems when it comes to scanning Wi-Fi frequencies at an access point is that
it must provide an uninterrupted service to the stations. This contradicts the scanning process, since,
every time a scan is performed, devices must be inevitably interrupted in order to change the frequency
within the Wi-Fi band and discover other access points in external channels. Consequently, the end user
could perceive this service stop. It would be enough to make a video call. In fact, the interruption would
be noticeable by the user even if he used any type of application that works with the network in real
time and the packet loss is significant.

To address this problem, the access point would have to scan its entire band periodically and make a
channel change without deteriorating service quality. There are different feasible solutions in this
regard. One is to use an auxiliary radio that facilitates monitoring. Another possible alternative, that
instead of performing a full scan at a given time, is to perform a continuous scan.

CBS (Continuous Background Scanning) for VoW scanning and switching channels

The choice of a continuous scan is the result of wanting to avoid sweeping all frequencies in a single
moment of time, an action that would have a negative impact on the quality of service of the devcies.
Why? Simply, because the radio must change to all the channels of the frequency band and remain a
while listening to information frames of other access points.

In this context, the point must monitor the type of traffic carried out at all times. In most of the current
access points, the type of traffic is taken into account, with four CoS priority levels as a reference, where
VoIP and video streaming traffic are marked with the highest priority levels.

Based on this concept of “priority queues”, the access point will carry out the scan avoiding a change of
channel every time you have queued, voice or video traffic on the channel where you are using the
device.

As soon as the access point is free of this type of traffic, a change of channel takes place in a short time
in search of information messages of other access points on the external channel. Several scans of that
same channel will be carried out in short periods of time, so as to avoid deteriorating the quality of
service of the stations that are using the access point. The total listening time on a channel is the same
as without using CBS, but divided into shorter intervals that prevent the cutting of priority traffic.

Wi-Fi network topology monitoring

To obtain reliable Wi-Fi network topology monitoring with this scan model, the system relies on two
assumptions:

1. Access points periodically send AP information messages in an average interval of 100 ms.

2. The scan is performed continuously and the same external channel is scanned several times
before the end of the scan.

The configurable parameters in this scan model are the following:

 The scan time.

 The waiting time on each external channel.

 The rest time in which a channel change is not made within the interval of the scan itself.

These parameters are usually configurable and depend heavily on the number of devices and the kind of
CoS traffic to be used within the Wi-Fi network. The way to calibrate these parameters is usually to
perform the scan at the same time that VoIP traffic is being sent, and verify that there is no packet loss
and the network monitoring conforms to the real network topology.

VPNshazam is specialized in this area and in addition to providing virtual private network, we can
answer to all of your queries within a few minutes.

How to Obtain A Korean IP Address From Any Country?

Korean music and movie lovers, do you want to obtain a Korean IP? You can not access your desired Korean content (music, videos, TV programs, etc.)

How to Install VPN On Xbox One?

Installing a VPN on Xbox One saves online freedom and privacy, but it also lets you do a lot more than that.

What Is A Tunnel VPN? How Does VPN Tunnel Work?

A tunnel VPN is a secure and encrypted VPN connection. This connection is between your device and the public Internet. Your communication remains private

Tik Tok Teen Protection Guidelines for The Parents

Probably your children spend a lot of time on Tik Tok. We will explain everything to you on the Tik Tok Teen Protection Tips.

How to Access the Dark Web from Your Computer?

Do you want to know? How to access the dark web? Questions and fantasies are arising about what a human can find there on the dark web.

You can have an email account and be incognito

Nowadays, anonymity is something we all want. After creation of email there have been many reasons as to why hackers target and exploit the service in every way possible. One of the reasons being defects in the email protocols. Many phishing mails influenced by social...

Gain Anonymity of IP with Smart VPN Settings

The World Wide Web surfing has lots of benefits associated with it. But, the one thing that does not work well for it is that it is quite unsafe, especially when you use untrusted and not-secured websites. There are some non-secured network carriers, such as the...

Types of VPN Protocols

VPN is a technique which facilitates the using of any public network privately and securely on your device. This can be done by making some essential settings. It keeps the data very secure at the time of transmitting. VPNs are trusted networks from years and...

Ever wondered why ISPs limit your Bandwidth?

Bandwidth caps could be the most irritating things users face on the internet. With bandwidth caps the amount of data that needed to be transferred is controlled making your internet speed slow. ISPs controls the bandwidth using a method called packet dropping method....

Let’s take a look at some Online Privacy Myths

We share loads and loads of data daily and to maintain online privacy for these loads is definitely a tedious task. Also, with increase in cyber crimes government is trying to take away all the privacy that is left. 2018 has raised these concerns form allegations of...