Wireless Client

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 321 Experts worldwide ranked by ideXlab platform

Guofei Gu - One of the best experts on this subject based on the ideXlab platform.

  • Active user-side evil twin access point detection using statistical techniques
    IEEE Transactions on Information Forensics and Security, 2012
    Co-Authors: Chao Yang, Yimin Song, Guofei Gu
    Abstract:

    In this paper, we consider the problem of "evil twin" attacks in Wireless local area networks (WLANs). An evil twin is essentially a rogue (phishing) Wi-Fi access point (AP) that looks like a legitimate one (with the same SSID). It is set up by an adversary, who can eavesdrop on Wireless communications of users' Internet access. Existing evil twin detection solutions are mostly for Wireless network administrators to verify whether a given AP is in an authorized list or not, instead of for a Wireless Client to detect whether a given AP is authentic or evil. Such administrator-side solutions are limited, expensive, and not available for many scenarios. Thus, a lightweight, effective, and user-side solution is highly desired. In this work, we propose a novel user-side evil twin detection technique that outperforms traditional administrator-side detection methods in several aspects. Unlike previous approaches, our technique does not need a known authorized AP/host list, thus it is suitable for users to identify and avoid evil twins. Our technique does not strictly rely on training data of target Wireless networks, nor depend on the types of Wireless networks. We propose to exploit fundamental communication structures and properties of such evil twin attacks in Wireless networks and to design new active, statistical and anomaly detection algorithms. Our preliminary evaluation in real-world widely deployed 802.11b and 802.11 g Wireless networks shows very promising results. We can identify evil twins with a very high detection rate while maintaining a very low false positive rate.

  • Who is peeping at your passwords at starbucks? - To catch an evil twin access point
    Proceedings of the International Conference on Dependable Systems and Networks, 2010
    Co-Authors: Yimin Song, Chao Yang, Guofei Gu
    Abstract:

    In this paper, we consider the problem of “evil twin” attacks in Wireless local area networks (WLANs). An evil twin is essentially a phishing (rogue) Wi-Fi access point (AP) that looks like a legitimate one (with the same SSID name). It is set up by an adversary, who can eavesdrop on Wireless communications of users' Internet access. Existing evil twin detection solutions are mostly for Wireless network administrators to verify whether a given AP is in an authorized list or not, instead of for a Wireless Client to detect whether a given AP is authentic or evil. Such administrator-side solutions are limited, expensive, and not available for many scenarios. For example, for traveling users who use Wireless networks at airports, hotels, or cafes, they need to protect themselves from evil twin attacks (instead of relying on those Wireless network providers, which typically may not provide strong security monitoring/management service). Thus, a lightweight and effective solution for these users is highly desired. In this work, we propose a novel user-side evil twin detection technique that outperforms traditional administrator-side detection methods in several aspects. Unlike previous approaches, our technique does not need a known authorized AP/host list, thus it is suitable for users to identify and avoid evil twins. Our technique does not strictly rely on training data of target Wireless networks, nor depend on the types of Wireless networks. We propose to exploit fundamental communication structures and properties of such evil twin attacks in Wireless networks and to design new active, statistical and anomaly detection algorithms. Our preliminary evaluation in real-world widely deployed 802.11b and 802.11g Wireless networks shows very promising results. We can identify evil twins with a very high detection rate while keeping a very low false positive rate.

  • Who is peeping at your passwords at Starbucks? — To catch an evil twin access point
    2010 IEEE IFIP International Conference on Dependable Systems & Networks (DSN), 2010
    Co-Authors: Yimin Song, Chao Yang, Guofei Gu
    Abstract:

    In this paper, we consider the problem of “evil twin” attacks in Wireless local area networks (WLANs). An evil twin is essentially a phishing (rogue) Wi-Fi access point (AP) that looks like a legitimate one (with the same SSID name). It is set up by an adversary, who can eavesdrop on Wireless communications of users' Internet access. Existing evil twin detection solutions are mostly for Wireless network administrators to verify whether a given AP is in an authorized list or not, instead of for a Wireless Client to detect whether a given AP is authentic or evil. Such administrator-side solutions are limited, expensive, and not available for many scenarios. For example, for traveling users who use Wireless networks at airports, hotels, or cafes, they need to protect themselves from evil twin attacks (instead of relying on those Wireless network providers, which typically may not provide strong security monitoring/management service). Thus, a lightweight and effective solution for these users is highly desired. In this work, we propose a novel user-side evil twin detection technique that outperforms traditional administrator-side detection methods in several aspects. Unlike previous approaches, our technique does not need a known authorized AP/host list, thus it is suitable for users to identify and avoid evil twins. Our technique does not strictly rely on training data of target Wireless networks, nor depend on the types of Wireless networks. We propose to exploit fundamental communication structures and properties of such evil twin attacks in Wireless networks and to design new active, statistical and anomaly detection algorithms. Our preliminary evaluation in real-world widely deployed 802.11b and 802.11g Wireless networks shows very promising results. We can identify evil twins with a very high detection rate while keeping a very low false positive rate.

Omar Nakhila - One of the best experts on this subject based on the ideXlab platform.

  • Gateway independent user-side wi-fi Evil Twin Attack detection using virtual Wireless Clients
    Computers and Security, 2018
    Co-Authors: Omar Nakhila, Erich Dondyk, Muhammad Faisal Amjad, Cliff Zou
    Abstract:

    Complimentary open Wi-Fi networks offered by most coffee shops, fast food restaurants and airports are inherently insecure. An attacker can easily deceive a Wireless Client (WC) by setting up a rogue access point (RAP) impersonating the legitimate access point (LAP), which is usually referred as Evil Twin Attack (ETA). To pass a victim's Wireless data through to the Internet, an attacker may use the same LAP's gateway, or use a different gateway, such as broadband cellular connection. Most of the existing ETA detection techniques assume that the attacker will use a specific Wireless network gateway to pass victim's Wireless data. In this paper, we present a real-time Client-side detection scheme to detect ETA regardless of the attacker's gateway selection. The proposed ETA detection system considers both ETA scenarios in parallel by creating two Virtual Wireless Clients (VWCs). The first VWC monitors multiple Wi-Fi channels in a random order looking for specific data packets sent by a server on the Internet. Meanwhile, the second VWC warns the WC when the Wireless network uses two different gateways by switching from one AP to another in the middle of a secure connection. The effectiveness of the proposed detection method has been mathematically modeled, prototyped and evaluated in real-life environment with a detection rate close to 100%.

  • MILCOM - Circumvent traffic shaping using virtual Wireless Clients in IEEE 802.11 Wireless local area network
    MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM), 2017
    Co-Authors: Omar Nakhila
    Abstract:

    Accessing the Internet through Wi-Fi networks offers an inexpensive alternative for offloading data from mobile broadband connections. Businesses such as fast food restaurants, coffee shops, hotels, and airports, provide complimentary Internet access to their customers through Wi-Fi networks. Clients can connect to the Wi-Fi hotspot using different Wireless devices. However, network administrators may apply traffic shaping to control the Wireless Client's upload and download data rates. Such limitation is used to avoid overloading the hotspot, thus providing fair bandwidth allocation. Also, it allows for the collection of money from the Client in order to have access to a faster Internet service. In this paper, we present a new technique to avoid bandwidth limitation imposed by Wi-Fi hotspots. The proposed method creates multiple virtual Wireless Clients using only one physical Wireless interface card. Each virtual Wireless Client emulates a standalone Wireless device. The combination of the individual bandwidth of each virtual Wireless Client results in an increase of the total bandwidth gained by the attacker. Our proposed technique was implemented and evaluated in a real-life environment with an increase in data rate up to 16 folds.

  • Circumvent traffic shaping using virtual Wireless Clients in IEEE 802.11 Wireless local area network
    MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM), 2017
    Co-Authors: Omar Nakhila
    Abstract:

    Accessing the Internet through Wi-Fi networks offers an inexpensive alternative for offloading data from mobile broadband connections. Businesses such as fast food restaurants, coffee shops, hotels, and airports, provide complimentary Internet access to their customers through Wi-Fi networks. Clients can connect to the Wi-Fi hotspot using different Wireless devices. However, network administrators may apply traffic shaping to control the Wireless Client's upload and download data rates. Such limitation is used to avoid overloading the hotspot, thus providing fair bandwidth allocation. Also, it allows for the collection of money from the Client in order to have access to a faster Internet service. In this paper, we present a new technique to avoid bandwidth limitation imposed by Wi-Fi hotspots. The proposed method creates multiple virtual Wireless Clients using only one physical Wireless interface card. Each virtual Wireless Client emulates a standalone Wireless device. The combination of the individual bandwidth of each virtual Wireless Client results in an increase of the total bandwidth gained by the attacker. Our proposed technique was implemented and evaluated in a real-life environment with an increase in data rate up to 16 folds.

  • MILCOM - Parallel active dictionary attack on IEEE 802.11 enterprise networks
    MILCOM 2016 - 2016 IEEE Military Communications Conference, 2016
    Co-Authors: Omar Nakhila
    Abstract:

    One of the greatest challenges facing 802.11 Wireless local area network (WLAN) is to provide equivalent security to wired local area network (LAN). Wi-Fi Protected Access II (WPA-II), also referred to as IEEE 802.11i standard, is the current security mechanism for enterprise Wireless networks. IEEE 802.11i standard depends upon IEEE 802.1X standard to authenticate and generate the main cryptographic key used to secure Wireless network traffic. In a WPA-II enterprise network, capturing Wireless frames during the authentication phase between the Access Point (AP) and an authorized Wireless Client will not compromise the security of the WLAN. However, an attacker can apply active dictionary attack by guessing the credentials used to access the Wireless network. In this case, the attacker communicates directly with the Authentication Server (AS). The main downside of this attack is the low intensity of password guessing trials that the attacker can achieve, thus security community usually does not pay attention to such an attack. In this paper, we present a new attack scheme that can increase the intensity of guessing trials against WPA-II enterprise. The new scheme is based on using one Wireless interface card to create multiple virtual Wireless Clients (VWCs), each VWC communicates with the Authentication Server as a standalone Wireless Client. We have developed a working prototype and our experiments show that the proposed scheme can improve the active dictionary guessing speed by more than 1700% compared to the traditional single Wireless Client attack.

  • Parallel active dictionary attack on IEEE 802.11 enterprise networks
    Proceedings - IEEE Military Communications Conference MILCOM, 2016
    Co-Authors: Omar Nakhila, Cliff Zou
    Abstract:

    Wi-Fi network offers an inexpensive and convenient way to access the Internet. It becomes even more important nowadays as we are moving from the traditional computer age to the current mobile devices and Internet-of-Things age. Wi-Fi Protected Access II (WPA2) - Pre-shared key (PSK) is the current security standard used to protect small 802.11 Wireless networks. Most of the available dictionary password-guessing attacks on WPA2-PSK are based on capturing the four-way handshaking frames between an authorized Wireless Client and the Access Point (AP). These attacks will fail if an attacker is unable to capture the four-way handshaking frames of a legitimate Client. An attacker also can apply an active dictionary attack by sending a pass-phrase to the AP and waiting for the response. However, this attack approach could only achieve a low attack intensity of testing a few pass-phrases per minute. In this paper, we develop a new scheme to speed up the active pass-phrase guessing trials intensity based on two novel ideas: First, the scheme mimics multiple Wi-Fi Clients connecting to the AP at the same time-each emulated Wi-Fi Client has its own spoofed MAC address; Second, each emulated Wi-Fi Client could try many pass-phrases using a single Wireless session without the need to pass the 802.11 authentication and association stages for every pass-phrase guess. We have developed a working prototype and our experiments show that the proposed scheme can improve active dictionary pass-phrase guessing speed by 100-fold compared to the traditional single Client attack.

Yimin Song - One of the best experts on this subject based on the ideXlab platform.

  • Active user-side evil twin access point detection using statistical techniques
    IEEE Transactions on Information Forensics and Security, 2012
    Co-Authors: Chao Yang, Yimin Song, Guofei Gu
    Abstract:

    In this paper, we consider the problem of "evil twin" attacks in Wireless local area networks (WLANs). An evil twin is essentially a rogue (phishing) Wi-Fi access point (AP) that looks like a legitimate one (with the same SSID). It is set up by an adversary, who can eavesdrop on Wireless communications of users' Internet access. Existing evil twin detection solutions are mostly for Wireless network administrators to verify whether a given AP is in an authorized list or not, instead of for a Wireless Client to detect whether a given AP is authentic or evil. Such administrator-side solutions are limited, expensive, and not available for many scenarios. Thus, a lightweight, effective, and user-side solution is highly desired. In this work, we propose a novel user-side evil twin detection technique that outperforms traditional administrator-side detection methods in several aspects. Unlike previous approaches, our technique does not need a known authorized AP/host list, thus it is suitable for users to identify and avoid evil twins. Our technique does not strictly rely on training data of target Wireless networks, nor depend on the types of Wireless networks. We propose to exploit fundamental communication structures and properties of such evil twin attacks in Wireless networks and to design new active, statistical and anomaly detection algorithms. Our preliminary evaluation in real-world widely deployed 802.11b and 802.11 g Wireless networks shows very promising results. We can identify evil twins with a very high detection rate while maintaining a very low false positive rate.

  • Who is peeping at your passwords at starbucks? - To catch an evil twin access point
    Proceedings of the International Conference on Dependable Systems and Networks, 2010
    Co-Authors: Yimin Song, Chao Yang, Guofei Gu
    Abstract:

    In this paper, we consider the problem of “evil twin” attacks in Wireless local area networks (WLANs). An evil twin is essentially a phishing (rogue) Wi-Fi access point (AP) that looks like a legitimate one (with the same SSID name). It is set up by an adversary, who can eavesdrop on Wireless communications of users' Internet access. Existing evil twin detection solutions are mostly for Wireless network administrators to verify whether a given AP is in an authorized list or not, instead of for a Wireless Client to detect whether a given AP is authentic or evil. Such administrator-side solutions are limited, expensive, and not available for many scenarios. For example, for traveling users who use Wireless networks at airports, hotels, or cafes, they need to protect themselves from evil twin attacks (instead of relying on those Wireless network providers, which typically may not provide strong security monitoring/management service). Thus, a lightweight and effective solution for these users is highly desired. In this work, we propose a novel user-side evil twin detection technique that outperforms traditional administrator-side detection methods in several aspects. Unlike previous approaches, our technique does not need a known authorized AP/host list, thus it is suitable for users to identify and avoid evil twins. Our technique does not strictly rely on training data of target Wireless networks, nor depend on the types of Wireless networks. We propose to exploit fundamental communication structures and properties of such evil twin attacks in Wireless networks and to design new active, statistical and anomaly detection algorithms. Our preliminary evaluation in real-world widely deployed 802.11b and 802.11g Wireless networks shows very promising results. We can identify evil twins with a very high detection rate while keeping a very low false positive rate.

  • Who is peeping at your passwords at Starbucks? — To catch an evil twin access point
    2010 IEEE IFIP International Conference on Dependable Systems & Networks (DSN), 2010
    Co-Authors: Yimin Song, Chao Yang, Guofei Gu
    Abstract:

    In this paper, we consider the problem of “evil twin” attacks in Wireless local area networks (WLANs). An evil twin is essentially a phishing (rogue) Wi-Fi access point (AP) that looks like a legitimate one (with the same SSID name). It is set up by an adversary, who can eavesdrop on Wireless communications of users' Internet access. Existing evil twin detection solutions are mostly for Wireless network administrators to verify whether a given AP is in an authorized list or not, instead of for a Wireless Client to detect whether a given AP is authentic or evil. Such administrator-side solutions are limited, expensive, and not available for many scenarios. For example, for traveling users who use Wireless networks at airports, hotels, or cafes, they need to protect themselves from evil twin attacks (instead of relying on those Wireless network providers, which typically may not provide strong security monitoring/management service). Thus, a lightweight and effective solution for these users is highly desired. In this work, we propose a novel user-side evil twin detection technique that outperforms traditional administrator-side detection methods in several aspects. Unlike previous approaches, our technique does not need a known authorized AP/host list, thus it is suitable for users to identify and avoid evil twins. Our technique does not strictly rely on training data of target Wireless networks, nor depend on the types of Wireless networks. We propose to exploit fundamental communication structures and properties of such evil twin attacks in Wireless networks and to design new active, statistical and anomaly detection algorithms. Our preliminary evaluation in real-world widely deployed 802.11b and 802.11g Wireless networks shows very promising results. We can identify evil twins with a very high detection rate while keeping a very low false positive rate.

Chao Yang - One of the best experts on this subject based on the ideXlab platform.

  • Active user-side evil twin access point detection using statistical techniques
    IEEE Transactions on Information Forensics and Security, 2012
    Co-Authors: Chao Yang, Yimin Song, Guofei Gu
    Abstract:

    In this paper, we consider the problem of "evil twin" attacks in Wireless local area networks (WLANs). An evil twin is essentially a rogue (phishing) Wi-Fi access point (AP) that looks like a legitimate one (with the same SSID). It is set up by an adversary, who can eavesdrop on Wireless communications of users' Internet access. Existing evil twin detection solutions are mostly for Wireless network administrators to verify whether a given AP is in an authorized list or not, instead of for a Wireless Client to detect whether a given AP is authentic or evil. Such administrator-side solutions are limited, expensive, and not available for many scenarios. Thus, a lightweight, effective, and user-side solution is highly desired. In this work, we propose a novel user-side evil twin detection technique that outperforms traditional administrator-side detection methods in several aspects. Unlike previous approaches, our technique does not need a known authorized AP/host list, thus it is suitable for users to identify and avoid evil twins. Our technique does not strictly rely on training data of target Wireless networks, nor depend on the types of Wireless networks. We propose to exploit fundamental communication structures and properties of such evil twin attacks in Wireless networks and to design new active, statistical and anomaly detection algorithms. Our preliminary evaluation in real-world widely deployed 802.11b and 802.11 g Wireless networks shows very promising results. We can identify evil twins with a very high detection rate while maintaining a very low false positive rate.

  • Who is peeping at your passwords at starbucks? - To catch an evil twin access point
    Proceedings of the International Conference on Dependable Systems and Networks, 2010
    Co-Authors: Yimin Song, Chao Yang, Guofei Gu
    Abstract:

    In this paper, we consider the problem of “evil twin” attacks in Wireless local area networks (WLANs). An evil twin is essentially a phishing (rogue) Wi-Fi access point (AP) that looks like a legitimate one (with the same SSID name). It is set up by an adversary, who can eavesdrop on Wireless communications of users' Internet access. Existing evil twin detection solutions are mostly for Wireless network administrators to verify whether a given AP is in an authorized list or not, instead of for a Wireless Client to detect whether a given AP is authentic or evil. Such administrator-side solutions are limited, expensive, and not available for many scenarios. For example, for traveling users who use Wireless networks at airports, hotels, or cafes, they need to protect themselves from evil twin attacks (instead of relying on those Wireless network providers, which typically may not provide strong security monitoring/management service). Thus, a lightweight and effective solution for these users is highly desired. In this work, we propose a novel user-side evil twin detection technique that outperforms traditional administrator-side detection methods in several aspects. Unlike previous approaches, our technique does not need a known authorized AP/host list, thus it is suitable for users to identify and avoid evil twins. Our technique does not strictly rely on training data of target Wireless networks, nor depend on the types of Wireless networks. We propose to exploit fundamental communication structures and properties of such evil twin attacks in Wireless networks and to design new active, statistical and anomaly detection algorithms. Our preliminary evaluation in real-world widely deployed 802.11b and 802.11g Wireless networks shows very promising results. We can identify evil twins with a very high detection rate while keeping a very low false positive rate.

  • Who is peeping at your passwords at Starbucks? — To catch an evil twin access point
    2010 IEEE IFIP International Conference on Dependable Systems & Networks (DSN), 2010
    Co-Authors: Yimin Song, Chao Yang, Guofei Gu
    Abstract:

    In this paper, we consider the problem of “evil twin” attacks in Wireless local area networks (WLANs). An evil twin is essentially a phishing (rogue) Wi-Fi access point (AP) that looks like a legitimate one (with the same SSID name). It is set up by an adversary, who can eavesdrop on Wireless communications of users' Internet access. Existing evil twin detection solutions are mostly for Wireless network administrators to verify whether a given AP is in an authorized list or not, instead of for a Wireless Client to detect whether a given AP is authentic or evil. Such administrator-side solutions are limited, expensive, and not available for many scenarios. For example, for traveling users who use Wireless networks at airports, hotels, or cafes, they need to protect themselves from evil twin attacks (instead of relying on those Wireless network providers, which typically may not provide strong security monitoring/management service). Thus, a lightweight and effective solution for these users is highly desired. In this work, we propose a novel user-side evil twin detection technique that outperforms traditional administrator-side detection methods in several aspects. Unlike previous approaches, our technique does not need a known authorized AP/host list, thus it is suitable for users to identify and avoid evil twins. Our technique does not strictly rely on training data of target Wireless networks, nor depend on the types of Wireless networks. We propose to exploit fundamental communication structures and properties of such evil twin attacks in Wireless networks and to design new active, statistical and anomaly detection algorithms. Our preliminary evaluation in real-world widely deployed 802.11b and 802.11g Wireless networks shows very promising results. We can identify evil twins with a very high detection rate while keeping a very low false positive rate.

Jianping Wang - One of the best experts on this subject based on the ideXlab platform.

  • Integrated Fiber-Wireless (FiWi) Access Networks Supporting Inter-ONU Communications
    Journal of Lightwave Technology, 2010
    Co-Authors: Yan Li, Jianping Wang, Chunming Qiao, Ashwin Gumaste, Yun Xu, Yinlong Xu
    Abstract:

    Integrated fiber-Wireless (FiWi) access networks provide a powerful platform to improve the throughput of peer-to-peer communication by enabling traffic to be sent from the source Wireless Client to an ingress optical network unit (ONU), then to the egress ONU close to the destination Wireless Client, and finally delivered to the destination Wireless Client. Such Wireless-optical-Wireless communication mode introduced by FiWi access networks can reduce the interference in Wireless subnetwork, thus improving network throughput. With the support for direct inter-ONU communication in the optical subnetwork, throughput of peer-to-peer communication in a FiWi access network can be further improved. In this paper, we propose a novel hybrid wavelength division multiplexed/time division multiplexed passive optical network (WDM/TDM PON) architecture supporting direct inter-ONU communication, a corresponding decentralized dynamic bandwidth allocation (DBA) protocol for inter-ONU communication and an algorithm to dynamically select egress ONU. The complexity of the proposed architecture is analyzed and compared with other alternatives, and the efficiency of the proposed system is validated by the simulations.

  • A Study of Network Throughput Gain in Optical-Wireless (FiWi) Networks Subject to Peer-to-Peer Communications
    2009 IEEE International Conference on Communications, 2009
    Co-Authors: Zeyu Zheng, Jianping Wang, Jin Wang
    Abstract:

    Optical-Wireless (FiWi) access network is a newly emerged access network architecture which integrates passive optical networks (PONs) with Wireless mesh networks (WMNs) to provide the ubiquitous, low cost, high bandwidth last mile Internet access. Though the PON subnetwork of FiWi network can provide high bandwidth, the interference in the Wireless subnetwork still limits the throughput of FiWi network if all traffic goes online to the Internet. However, when peer-to-peer communication from one Wireless Client to another Wireless Client is introduced, the proposed integration of PONs and WMNs can significantly improve the network throughput. In traditional WMNs, peer-to-peer communication from one Wireless Client to another Wireless Client is carried in the Wireless network, which is subject to interferences in Wireless communications. In FiWi network, peer-to-peer communication can be carried through the Wireless-optical-Wireless mode in which the traffic is sent from the source Wireless Client to its nearest ONU, which is then sent to the ONU close to the destination Wireless Client through the PON subnetwork and then delivered to the destination Wireless Client. Such Wireless-optical-Wireless communication mode introduced by FiWi networks can sustain the interference in Wireless subnetwork, thus improving the network throughput. This paper aims to study the network throughput gain in FiWi network subject to peer-to-peer communications and parameters which can affect the network throughput gain. We first have a fair modeling of FiWi networks and traditional WMNs. We then present an LP based routing algorithm for FiWi networks. Extensive simulations have been carried to study the network throughput gain in FiWi networks subject to peer-to-peer communications compared with traditional WMNs. The work provides insightful observations for fully utilizing advantages brought by the integration of PONs and WMNs in FiWi networks.

  • ICC - A Study of Network Throughput Gain in Optical-Wireless (FiWi) Networks Subject to Peer-to-Peer Communications
    2009 IEEE International Conference on Communications, 2009
    Co-Authors: Zhongming Zheng, Jianping Wang
    Abstract:

    Optical-Wireless (FiWi) access network is a newly emerged access network architecture which integrates passive optical networks (PONs) with Wireless mesh networks (WMNs) to provide the ubiquitous, low cost, high bandwidth last mile Internet access. Though the PON subnetwork of FiWi network can provide high bandwidth, the interference in the Wireless subnetwork still limits the throughput of FiWi network if all traffic goes online to the Internet. However, when peer-to-peer communication from one Wireless Client to another Wireless Client is introduced, the proposed integration of PONs and WMNs can significantly improve the network throughput. In traditional WMNs, peer-to-peer communication from one Wireless Client to another Wireless Client is carried in the Wireless network, which is subject to interferences in Wireless communications. In FiWi network, peer-to-peer communication can be carried through the Wireless-optical-Wireless mode in which the traffic is sent from the source Wireless Client to its nearest ONU, which is then sent to the ONU close to the destination Wireless Client through the PON subnetwork and then delivered to the destination Wireless Client. Such Wireless-optical-Wireless communication mode introduced by FiWi networks can sustain the interference in Wireless subnetwork, thus improving the network throughput. This paper aims to study the network throughput gain in FiWi network subject to peer-to-peer communications and parameters which can affect the network throughput gain. We first have a fair modeling of FiWi networks and traditional WMNs. We then present an LP based routing algorithm for FiWi networks. Extensive simulations have been carried to study the network throughput gain in FiWi networks subject to peer-to-peer communications compared with traditional WMNs. The work provides insightful observations for fully utilizing advantages brought by the integration of PONs and WMNs in FiWi networks.

  • ONU Placement in Fiber-Wireless (FiWi) Networks Considering Peer-to-Peer Communications
    GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference, 2009
    Co-Authors: Zeyu Zheng, Jianping Wang, Xiumin Wang
    Abstract:

    Nowadays, Fiber-Wireless (FiWi) network is proposed as a hybrid access network that integrates optical access networks (e.g., PONs) with Wireless access networks (e.g., WMNs) to provide the high bandwidth, cost-efficient and ubiquitous last mile Internet access. In FiWi networks, besides traffic from Wireless mesh Clients to the Internet, peer-to-peer communication from one Wireless Client to another Wireless Client is introduced due to the recent growth of applications such as multimedia transmissions within community areas. In FiWi networks, such peer-to-peer traffic can be carried either through the Wireless path within the Wireless mesh subnetwork or through the Wireless-optical-Wireless mode in which traffic firstly goes from the source Client to its closest ONU, and then goes to the ONU closest to the destination Client through the PON subnetwork and finally reaches the destination Client. Such Wireless-opticalWireless mode for peer-to-peer communications can alleviate interferences in the Wireless subnetwork, thus improving the network throughput. Considering such mode for peer-to-peer communications, ONUs' placement will have great impact on the achievable network throughput in FiWi networks and will be different from the placement when only traffic to the Internet is considered. In this paper, given the distribution of Wireless mesh routers, we study where to place K ONUs in FiWi networks so that the overall network throughput can be maximized when peer-to-peer communications are considered in addition to traffic destinated to the Internet. We first formulate the problem and then propose a tabu search (TS) based heuristic to solve the problem. Simulation results show that compared to the random deployment and the fixed deployment which performs well when only traffic to the Internet is considered, the tabu search heuristic has a much better performance.