CREW offers Open Access

CREW is in continuous Open Access phase to support your experiments free of charge!

Final public event & Globecom tutorial

CREW will present its final results at the Wireless Community event (Leuven, Belgium, 29 October 2015, more info) and organises a hands-on tutorial at Globecom (San Diego, USA, 10 December 2015, more info)

CREW PORTAL: access the CREW facilities

Interested in using the CREW facilities?
[Start here] - [Browse by name] - [Overview images] - [Advanced info] - [WTA GitHub].

Wi-Fi throughput experiments

WI-FI throughput experiment 

In the following experiment we examine WI-FI throughput performance under various interference conditions. In all experiments the throughput is logged as performance metric. 

Name

Description Files
Distributed Sensing for identify hidden terminal effect

This experiment involves two pairs of WI-FI nodes, located far away. We monitor the environment both with packet sniffing and distributed sensing via USRP sensing engine. One WI-FI group is considered system under test (SUT) while the other is considered as Interferer (INT). The transmit power of INT group is varied from 0 dBm to 20 dBm in step of 2 dBm, controlled via the benchmarking framework.

 It is seen that there is a interval where packet sniffing do not detect INT activity but distributed sensing can.

xmlfiles.tar

iriswrap.tar

hiddenterminalEd.rb

tcpdumpwrap.tar

Interference caused by overlapping WI-FI channel This experiment involves two pairs of WI-FI nodes, they operate on adjacent WI-FI channels. The amount of overlapping between the two pairs are controlled via benchmarking framework. The rarget is to find out how does WI-FI react to interference caused by WI-FI activities on the adjacent WI-FI channel

xmlfiles.tar

tcpdumpwrap.tar

tcpdumpwrap.tar

channelOverlapping.rb

Interference caused by zigbee device

This experiment involves only one pair WI-FI nodes. An narrow-band interference signal is generated by a nearby zigbee node 

jammer_mil2.tar

iperfweiED_zb.rb

tcpdumpwrap.tar