Fig 6 - uploaded by Vic Grout
Content may be subject to copyright.
Omni-Directional Antenna Footprint [8]  

Omni-Directional Antenna Footprint [8]  

Source publication
Conference Paper
Full-text available
The facility of having wireless access to networks and the Internet has grown significantly in recent years. The advent of Wi-Fi and Wireless Access Points (APs) allows huge degrees of flexibility and easy access to information and resources. To this effect, it is now common to find multiple access points in public areas, in the home, and in the wo...

Context in source publication

Context 1
... can be addressed through physical measures, such as careful antenna positioning, consideration of the antenna type (and importantly the footprint of the antennae), and considering dampening or blocking the signal at the extremities where practical. For example, Figures 6 and 7 compare the footprints / radiation patterns of an omni-directional and directional Wi-Fi antenna. These types of measures and considerations are still pertinent when implementing home or leisure networks, for example although network access may be required in a user's own garden, they do not necessarily want to network to 'leak' outside of those bounds if possible. ...

Similar publications

Article
Full-text available
The dedicated short-range communication/wireless access for vehicular environment together with the fourth generation-long-term evolution technologies has been widely accepted as the most promising approaches to enhance the transportation safety. As pedestrians are still protected based on the traditional honking approach, the communication-based s...

Citations

... This first study was undertaken in April of 2007. Further detail of this study can be found in a previous work [2]. The second study was undertaken some time after the first in order to strengthen the findings of the original study and to draw comparisons with the results of the first investigation. ...
... As we state in our previous work, once a number of zones have been identified it then becomes much easier to correlate particular characteristics discovered during the peace driving with other information about the region such as population, financial and social trends, for example. In particular, having an automated method of defining zones would be highly beneficial, as this eliminates the immediate need for any local knowledge of the area [2]. One method we found reasonably successful in being able to separate out larger known areas from the AP survey data was the k-means algorithm [3]. ...
Conference Paper
Full-text available
Wireless networking technologies permit a great deal of convenience for mobile users. However, as is often the case, increased levels of technological freedom means there is more potential for abuse and misuse of these services. In this work we find the uptake of wireless networking technology has risen rapidly in recent years and the perceived awareness of security issues has also been heightened. We undertake a number of practical investigations in various communities to determine exactly how many and how accessible Access Points(APs) are in the metropolitan environment. This paper presents comparisons between previous and new independent studies carried out by two research teams in different areas of England and Wales, in the United Kingdom (UK).
... As expected, the majority of networks employ the IEEE 802.11g standard (54 Mbps), and much fewer use the IEE 802.11b standard (11 Mbps). It is known, from observations of the areas surveyed, that the area incorporates residential/suburban areas as well as smaller amounts of commercial and industrial regions (Cunningham & Grout 2007). ...
Article
Full-text available
Wireless networking technologies, under the umbrella of the IEEE 802.11 suite of standards and commonly referred to as Wi-Fi, is now commonplace technology in both the home and office. In this work, we present the results of studies into wireless networking uptake and security within two town communities in the UK. Our work concentrates on the geographical positioning of wireless access points (APs) and the security measures used to protect these liberating technologies from unwanted misuse, often referred to as war driving, we employ the title peace driving, for wireless networking surveying which aims to address security issues in wi-fi networks. The results from our study show significant uptake of wireless networking in both the residential and business areas surveyed. The number of access points present in some residential areas is large, and given the relatively small distances between access points there is undoubtedly traffic which is crossing private boundaries. These findings are corroborated across both the communities which were studied. We suggest that similar sized and constituent communities are representative of others in the UK and find similar trends between the two studied as part of this work.
... Additionally, Wi-Fi Access Points are being installed in almost every conceivable location from railway stations, airports, hotels, restaurants, coffee bars to private homes. A major UK service provider (O2, 2007) boasts over 7 000 locations where Wi-Fi access is available but this is increasing every day (Cunningham and Grout, 2007). Generally the access point is installed in a building; however there are instances were they are installed in lampposts or other open air locations. ...
Article
Full-text available
With the increase in the provision of access to Wireless Local Area Networks and the abundance of user devices capable of utilising Wi-Fi, the design of the network infrastructure has introduced some significant problems. Prior to the installation of Access Points it is difficult to predict whether access can be guaranteed at specific locations. Additionally, to increase the level of security, it is often preferable, despite the use of security protocols, to ensure that the signal strength is not large enough to enable connection in areas other than those designated. By combining the theory of antennae and the measurement of the performance of devices, it is possible to predict whether access is likely and hence how secure the network design is. Additionally, the use of a simple application is proposed that enables the network designer to enter a configuration and produce an answer showing if WIFI will operate and a value to indicate the margin.