This application snoops through the network to detect threshold degradation due to interference.
A first implementation could be based on the evaluation of measurement and performance values
More advanced implementations could take topology information into account or actively manipulate configuration parameters to increase the validity of measurements.
Description
This application snoops through the network to detect threshold degradation due to interference. A first implementation could be based on the evaluation of measurement and performance values More advanced implementations could take topology information into account or actively manipulate configuration parameters to increase the validity of measurements.
Dependencies