Just like Ethernet before, IEEE 802.11 is now transcending the borders of its usage from the office environment toward real-time communication on the factory floor. However, similar to Ethernet, the ...availability of synchronized clocks to coordinate and control communication and distributed real-time services is not a built-in feature in WLAN. Over the years, this has led to the design and use of a wide variety of customized protocols with varying complexity and precision, both for wired and wireless networks, in accordance with the increasingly demanding requirements from real-time applications. This survey looks into the details of synchronization over IEEE 802.11 with a particular focus on the infrastructure mode which is most relevant for industrial use cases. It highlights the different parameters which affect the performance of clock synchronization over WLAN and compares the performance of existing synchronization methods to analyze their shortcomings. Finally, it identifies new trends and directions for future research as well as features for wireless clock synchronization which will be required by the applications in the near future.
Wi-Fi has become the de facto wireless technology for achieving short- to medium-range device connectivity. While early attempts to secure this technology have been proved inadequate in several ...respects, the current more robust security amendments will inevitably get outperformed in the future, too. In any case, several security vulnerabilities have been spotted in virtually any version of the protocol rendering the integration of external protection mechanisms a necessity. In this context, the contribution of this paper is multifold. First, it gathers, categorizes, thoroughly evaluates the most popular attacks on 802.11 and analyzes their signatures. Second, it offers a publicly available dataset containing a rich blend of normal and attack traffic against 802.11 networks. A quite extensive first-hand evaluation of this dataset using several machine learning algorithms and data features is also provided. Given that to the best of our knowledge the literature lacks such a rich and well-tailored dataset, it is anticipated that the results of the work at hand will offer a solid basis for intrusion detection in the current as well as next-generation wireless networks.
In this paper, we present an experiment- and simulation-based study to evaluate the use of full duplex (FD) as a potential mode in practical IEEE 802.11 networks. To enable the study, we designed a ...20-MHz multiantenna orthogonal frequency-division-multiplexing (OFDM) FD physical layer and an FD media access control (MAC) protocol, which is backward compatible with current 802.11. Our extensive over-the-air experiments, simulations, and analysis demonstrate the following two results. First, the use of multiple antennas at the physical layer leads to a higher ergodic throughput than its hardware-equivalent multiantenna half-duplex (HD) counterparts for SNRs above the median SNR encountered in practical WiFi deployments. Second, the proposed MAC translates the physical layer rate gain into near doubling of throughput for multinode single-AP networks. The two results allow us to conclude that there are potentially significant benefits gained from including an FD mode in future WiFi standards.
Spatial Reuse (SR) has recently gained attention to maximize the performance of IEEE 802.11 Wireless Local Area Networks (WLANs). Decentralized mechanisms are expected to be key in the development of ...SR solutions for next-generation WLANs, since many deployments are characterized by being uncoordinated by nature. However, the potential of decentralized mechanisms is limited by the significant lack of knowledge with respect to the overall wireless environment. To shed some light on this subject, we show the main considerations and possibilities of applying online learning to address the SR problem in uncoordinated WLANs. In particular, we provide a solution based on Multi-Armed Bandits (MABs) whereby independent WLANs dynamically adjust their frequency channel, transmit power and sensitivity threshold. To that purpose, we provide two different strategies, which refer to selfish and environment-aware learning. While the former stands for pure individual behavior, the second one considers the performance experienced by surrounding networks, thus taking into account the impact of individual actions on the environment. Through these two strategies we delve into practical issues of applying MABs in wireless networks, such as convergence guarantees or adversarial effects. Our simulation results illustrate the potential of the proposed solutions for enabling SR in future WLANs. We show that substantial improvements on network performance can be achieved regarding throughput and fairness.
Full text
Available for:
GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
Over the last decade, railway industry has seen a huge transition from conventional railway signalling systems to modern, communication-based signalling systems. Communications-based train control ...(CBTC) is a modern communication-based system that uses radio communication to transfer timely and accurate train control information. CBTC is the choice of mass-transit railway operators today, with over a hundred systems currently installed worldwide. The safety-related, time-critical applications such as train control impose stringent reliability and availability requirements on the radio communication technology used. IEEE 802.11 Wi-Fi, despite being originally developed for stationary users within a limited area, has prevailed as the de-facto radio technology for CBTC. Unfortunately, very limited literature is publicly available on this topic due to the highly competitive nature of the railway industry. We believe that this paper fills the much-needed gap. It aims to present a comprehensive tutorial, as well as a survey of the state-of-the-art, of CBTC and the role of radio communication in it. The operation and fundamental components of a CBTC system are discussed. A summary of the evolution of the communication technologies used for modern railway signalling is presented. The benefits and drawbacks of using a radio communication technology, particularly Wi-Fi, and the challenges it introduces, are discussed. Best practices in the design of a CBTC radio network and the measures to optimize its availability are discussed, while using the currently in-progress Copenhagen S-train CBTC project as a reference. An overview of the CBTC standardization efforts, as well as the IEEE CBTC standard-frequently overlooked due to its limited scope-is included. This paper is concluded by providing a number of potential directions for future work.
The increasing interest in ubiquitous networking, and the tremendous popularity gained by IEEE 802.11 WLANs in recent years, is leading to very dense deployments where high levels of channel ...contention may prevent meeting the increasing user demands. To mitigate the negative effects of channel contention, the TWT mechanism included in the IEEE 802.11ax amendment can have a significant role, as it provides an extremely simple but effective mechanism to schedule transmissions in time. Moreover, in addition to reducing the contention between stations, the use of TWT may also contribute to taking full advantage of other novel mechanisms in the IEEE 802.11 universe, such as multiuser transmissions, multi-AP cooperation, spatial reuse and coexistence in high-density WLAN scenarios. Overall, we believe TWT may be a first step toward a practical collision-free and deterministic access in future WLANs.
In IEEE 802.11 WiFi-based waveforms, the receiver performs coarse time and frequency synchronization using the first field of the preamble known as the legacy short training field (L-STF). The L-STF ...occupies upto 40% of the preamble length and takes upto 32 μ s of airtime. With the goal of reducing communication overhead, we propose a modified waveform, where the preamble length is reduced by eliminating the L-STF. To decode this modified waveform, we propose a neural network (NN)-based scheme called PRONTO that performs coarse time and frequency estimations using other preamble fields, specifically the legacy long training field (L-LTF). Our contributions are threefold: (i) We present PRONTO featuring customized convolutional neural networks (CNNs) for packet detection and coarse carrier frequency offset (CFO) estimation, along with data augmentation steps for robust training. (ii) We propose a generalized decision flow that makes PRONTO compatible with legacy waveforms that include the standard L-STF. (iii) We validate the outcomes on an over-the-air WiFi dataset from a testbed of software defined radios (SDRs). Our evaluations show that PRONTO can perform packet detection with 100% accuracy, and coarse CFO estimation with errors as small as 3%. We demonstrate that PRONTO provides upto 40% preamble length reduction with no bit error rate (BER) degradation. We further show that PRONTO is able to achieve the same performance in new environments without the need to re-train the CNNs. Finally, we experimentally show the speedup achieved by PRONTO through GPU parallelization over the corresponding CPU-only implementations.
This letter presents a low-cost printed circuit board (PCB)-based dual-band antenna for future wireless local area network (WLAN) applications. The antenna is designed to fully cover both WiFi ...channels (2.4/5.2/5.8 GHz) and Wireless Gigabit Alliance (WiGig) channels (57-64 GHz). At the WiFi frequency bands, the antenna is based on a printed monopole, while at the WiGig frequency band, a wideband higher-order-mode patch antenna is adopted. A compact microstrip resonance cell (CMRC) low-pass filter is also designed to allow feeding the monopole antenna at WiFi frequency bands while isolating the monopole from the patch for WiGig operation. The design is fabricated by standard PCB and plated-through-hole technologies, and its performance is validated by measurement.
On the path to zero fatalities on the roadways, all vehicles have to periodically broadcast cooperative awareness messages (CAMs) in a timely and reliable manner, even in areas of high traffic ...density. The carrier senses multiple access with collision avoidance (CSMA/CA) scheme of IEEE 802.11, the de-facto standard for vehicular communications, is known to offer no reliability to broadcast packets that cannot be acknowledged, and to poorly perform at high network load due to collisions and interference. In this paper, an enhanced CSMA/CA protocol is analyzed for vehicular networks, which improves the CAM timeliness and reliability by leveraging full-duplex (FD) transceivers on board. FD devices can listen to the channel while transmitting, thus making collision detection viable. A FD vehicle can detect a CAM collision while sending, promptly abort the packet and retransmit it later. Results achieved through an analytical model under mathematically tractable assumptions, and through extensive system-level simulations in a complex urban environment, show the effectiveness of the protocol to cope with direct collisions, especially in high traffic areas, paving the way towards the realization of cooperative automated driving.
The Third-Generation Partnership Project (3GPP) has recently started standardizing the "licensed-assisted access using LTE" for small cells, which is referred to as dual-band femtocell (DBF) in this ...paper, which uses the Long-Term Evolution (LTE) air interface in both the licensed and unlicensed bands based on the LTE carrier aggregation feature. Alternatively, the Small Cell Forum introduced the integrated femto-WiFi (IFW) small cell, which simultaneously accesses both the licensed band (via cellular interface) and the unlicensed band (via WiFi interface). In this paper, a practical algorithm for IFW and DBF to automatically balance their traffic in licensed and unlicensed bands, based on the real-time channel, interference, and traffic conditions of both bands, is described. The algorithm considers the fact that some "smart" devices (sDevices) have both cellular and WiFi radios, while some WiFi-only devices (wDevices) may only have WiFi radio. In addition, the algorithm considers a realistic scenario where a single small-cell user may simultaneously use multiple sDevices and wDevices via either the IFW or the DBF in conjunction with a wireless local area network. The goal is to maximize the total user satisfaction/utility of the small-cell user, while keeping the interference from small cells to macrocells below predefined thresholds. The algorithm can be implemented at the radio link control or the network layer of the IFW and DBF small-cell base stations. Results demonstrate that the proposed traffic-balancing algorithm applied to either IFW or DBF significantly increases the sum utility of all macrocell and small-cell users, compared with the current practices. Finally, various implementation issues of IFW and DBF are addressed.