ABSTRACT
Wireless hotspots are typically implemented using 802.11 APs. Each AP typically operates on a single, administrator-configured wireless channel. Each client associates with a single AP and subsequently interacts with this AP alone, on the AP’s configured channel. As a basic design rule, APs within radio frequency (RF) range of each other are set to different ‘non-overlapping’ channels. Proper assignment of channels to APs is important so that the network can take full advantage of the total wireless bandwidth offered by the multiple channels. Channel Assignment Approaches. Most APs are initialized for their channel of operation through manual input. This is inefficient as it is based on human judgment of which channel is the best. Apart from this, some AP vendors implement a simple distributed method commonly called the least congested channel search (LCCS) algorithm [9]. In LCCS, upon initialization, the AP scans and selects the channel that offers the least amount of congestion, for example, the channel on which there was least amount of traffic belonging to other APs and clients. Since in LCCS, APs perform a scan without involving client feedback, it is possible that two APs might not detect each other and utilize the same channel. As a result, it is possible for clients to be positioned unfavorably so as to suffer considerable interference as a hidden terminal. Figure 2(a) shows this problem. It is possible to mitigate such interference through client feedback, as shown by the (centralized) CFAssign algorithm [4] shows that client feedback in finding interfering APs can mitigate this problem. In Section 6.3, we explore a variant of our channel-hopping technique that is uses such client feedback to detect and mitigate effects of such ‘hidden Aps.
TABLE OF CONTENT
TITLE PAGE
CERTIFICATION
APPROVAL
DEDICATION
ACKNOWLEDGEMENT
ABSTRACT
TABLE OF CONTENT
CHAPTER ONE
1.0 INTRODUCTION
1.1 STATEMENT OF PROBLEM
1.2 PURPOSE OF STUDY
1.3 AIMS AND OBJECTIVES
1.4 SCOPE/DELIMITATIONS
1.5 LIMITATIONS/CONSTRAINTS
1.6 DEFINITION OF TERMS
CHAPTER TWO
2.0 LITERATURE REVIEW
CHAPTER THREE
3.0 METHODS FOR FACT FINDING AND DETAILED DISCUSSIONS OF THE SYSTEM
3.1 METHODOLOGIES FOR FACT-FINDING
3.2 DISCUSSIONS
CHAPTER FOUR
4.0 FUTURES, IMPLICATIONS AND CHALLENGES OF THE SYSTEM
4.1 FUTURES
4.2 IMPLICATIONS
4.3 CHALLENGES
CHAPTER FIVE
5.0 RECOMMENDATIONS, SUMMARY AND CONCLUSION
5.1 RECOMMENDATION
5.2 SUMMARY
5.3 CONCLUSION
5.4 REFERENCES
Disclaimer: Note this academic material is intended as a guide for your academic research work. Do not copy word for word. Note: For Computer or Programming related works, some works might not contain source codes
CITE THIS WORK
(2014, 09). Distributed Channel Management System.. ProjectStoc.com. Retrieved 09, 2014, from https://projectstoc.com/read/3135/distributed-channel-management-system-210
"Distributed Channel Management System." ProjectStoc.com. 09 2014. 2014. 09 2014 <https://projectstoc.com/read/3135/distributed-channel-management-system-210>.
"Distributed Channel Management System.." ProjectStoc.com. ProjectStoc.com, 09 2014. Web. 09 2014. <https://projectstoc.com/read/3135/distributed-channel-management-system-210>.
"Distributed Channel Management System.." ProjectStoc.com. 09, 2014. Accessed 09, 2014. https://projectstoc.com/read/3135/distributed-channel-management-system-210.
- Related Works
- Design And Implementation Of Online Student Admission System
- Design And Implementation Of A Digital Library System
- Design And Implementation Of Computerized Medical Duties Scheduling System (a Case Study Of University Of Nigeria Teaching
- Find And Replace Utility
- Automated Database System For Government Establishment (a Case Study Of Phcn)
- Distributed Collaborative Key Agreement And Authentication Protocol For Dynamic Peer Group
- Design And Implementation Of Nitc Student Information System (case Study Of First Bank Training Institute Enugu)
- Addressing Principles Used In Tcp/ip Protocols
- Design And Implementation Of Prison Management System (a Case Study Prison Service Commission Enugu)
- Mesh Topology: Its Principles, Merits And Setbacks