REVISTA INGENIO
Data Loss Study in Zonal Systems and Servers in a Shopping Center Parking Lot
Estudio de Pérdida de Datos en Sistemas Zonal y Servidores de un Parqueadero en un Centro
Comercial
Holger Santillán | Universidad Politécnica Salesiana - Ecuador
Carlos Feijoo | Universidad Politécnica Salesiana - Ecuador
Anthony Alcívar | Universidad Politécnica Salesiana - Ecuador
David Cárdenas | Universidad Politécnica Salesiana - Ecuador
Peregrina Wong | Universidad Politécnica Salesiana - Ecuador
https://doi.org/10.29166/ingenio.v8i2.7301 pISSN 2588-0829
2025 Universidad Central del Ecuador eISSN 2697-3243
CC BY-NC 4.0 —Licencia Creative Commons Reconocimiento-NoComercial 4.0 Internacional ng.revista.ingenio@uce.edu.ec
      
    ,  (),  - , . -

El presente estudio analiza la pérdida de paquetes del radio enlace con las antenas PowerBeam 5AC
Gen2 a diferentes equipos Meypar de la zona punto rojo del centro comercial de la ciudad de Guaya-
quil, se busca determinar la comunicación óptima para un entorno estable de la red en los equipos. Se
utilizó un tester para medir la continuidad del cableado y se observa físicamente que las 8 hebras de
todo el cableado esta con óxido. También se utilizó el soware de Wireshark para examinar el compor-
tamiento de los paquetes hacia los equipos Meypar que son 1 emisor, 1 validador de tickets, 6 cámaras
de perimetrales, 2 cámaras de matrícula, 2 interfonias ip y 2 antenas, en total 14 escenarios, siendo 4 los
más críticos, que son las 2 cámaras de matrículas 1600 paquetes, 1 emisor 293 paquetes y 1 validador
de ticket 280 paquetes, en estos 4 equipos se registra niveles de pérdida totales de 2173 paquetes. Para
abordar el problema, se llevó a cabo un análisis exhaustivo del sistema zonal, identicando fallos críticos
en la infraestructura de TI. Se implementaron soluciones de respaldo y recuperación de datos, junto con
mejoras en la seguridad del sistema, logrando así minimizar el riesgo de pérdida de datos y asegurando
la continuidad operativa del parqueadero.

is study analyzes the packet loss in the radio link of PowerBeam 5AC Gen2 antennas connected to
various Meypar equipment in the “red dot” area of the Guayaquil shopping center. e objective is to
optimize communication and ensure a stable network environment for the equipment. A tester was used
to measure the continuity of the cabling, and oxidation was observed in all eight strands. In addition,
Wireshark soware was used to analyze packet trac on 14 devices, including 1 transmitter, 1 ticket
validator, 6 perimeter cameras, 2 license plate cameras, 2 IP intercoms and 2 antennas. Four critical
scenarios were identied: the license plate cameras (1600 packets), the transmitter (293 packets) and
the ticket validator (280 packets), registering a total of 2173 packets lost in these devices. To solve this
problem, an exhaustive analysis of the IT infrastructure was carried out, identifying critical failures and
implementing backup solutions, data recovery and system security improvements, thus minimizing the
risk of data loss and ensuring the operational continuity of the parking lot.
Recibido: 8/10/2024
Recibido tras revisión: 28/4/2025
Aceptado: 14/5/2025
Publicado: 10/7/2025
 
Packet loss, Radio link, PowerBeam 5AC
Gen2, Wireshark, IT Infrastructure.
 
Pérdida de paquetes, Radioenlace,
PowerBeam 5AC Gen2, Wireshark, In-
fraestructura de TI.
1. Introduction
Shopping malls [1], highly crowded and active places,
have prioritized safety and ecient management of their
operations. Improvements in zonal systems and servers
have optimized parking monitoring and management
[2]. Automation, vehicle control and real-time survei-
llance have signicantly increased eciency and safety.
However, this technological dependence has introduced
new vulnerabilities, such as data loss [3].
Beyond operational disruptions, the misuse of tech-
nology can compromise security and infrastructure [4].
Causes of data loss include hardware failures, human
error, cyberattacks, and adverse weather conditions. Pre-
vious incidents have demonstrated the serious conse-
quences of this loss, including chaos, nancial losses.
In order to tackle this issue eectively, it becomes ne-
cessary to explore both the root causes and the possible
impacts of data loss in zonal systems and parking servers
[5]. Gaining insight into these factors will help identify
practical solutions aimed at reducing such incidents and
improving the overall reliability of the systems involved.
158
e main objective is to assess the internal and external
factors that contribute to data loss and analyze their im-
pacts on daily operations [4], customer security, and cor-
porate reputation.
Once the problems have been identied, the study
proposes practical recommendations to reduce the fre-
quency and severity of these incidents. e aim was to
identify the enigma of the network [6], in the current
parking system, evaluate the data recovery protocols and
propose technological improvements. A framework was
developed to implement backup and recovery strategies
applicable to various operational situations of the shop-
ping center.
e approach not only mitigated the challenges as-
sociated with data mitigation [7], but also improved the
systems resilience to future incidents. To achieve these ob-
jectives, a quantitative methodology was used, which com-
bines technical analysis and procedure reviews. e rst
phase consisted of an audit of the zonal systems and ser-
vers, identifying points of vulnerability [8], and evaluating
their performance under normal and stressful conditions.
Hardware and soware tests [9] were performed on
the network to identify critical issues and analyze the pro-
bability of attenuation in the data. Historical failures will
be monitored and data from past incidents will be collec-
ted to identify patterns. In addition, failure and crisis si-
mulations were carried out to evaluate the resilience of
the parking system.
e analysis of data loss in zonal systems and servers
is a eld of study that has become increasingly relevant,
especially in the context of managing complex infrastruc-
tures such as parking lots in shopping malls [10]. ese
systems rely heavily on the integrity and continuous avai-
lability of data to ensure smooth and ecient operation.
e ability to prevent and mitigate data loss [11], not
only improves operational eciency, but also ensures user
security and satisfaction. To address this problem, it is es-
sential to delve into the underlying technical concepts, re-
view the related work, and apply mathematical equations
that allow modeling the risks associated with data loss and
developing strategies to counteract them.
One of the key concepts in this study is clearance at-
tenuation, which refers to the amount of power of a sig-
nal [12], which is lost when it is transmitted through the
air without physical obstacles in between. is attenuation
clearance is primarily due to the dispersion of signal ener-
gy as it expands through space, with the nal application
being a drop in signal strength as it reaches the receiver.
To calculate the percentage loss, the attenuation free spa-
ce equation is applied, as shown in equation 1:
FSPL=20log10(d)+20log10(f)+20log10(c4π) (1)
Where:
d: is the distance between the transmitter and receiver in
meters (m).
f: is the frequency of the signal in Hertz (Hz).
c: is the speed of light in a vacuum (m/s).
Simplifying the constant, the formula can also be written
as equation 2:
FSPL=20log10(d)+20log10(f)-147.55 (2)
If the distance d is in kilometers (km) and the frequency
f is in Megahertz (MHz), the adapted formula would be
equation 3:
FSPL=20log10(d)+20log10(f)+32.44 (3)
In equation 1, it is the distance in meters between the
transmitter and receiver, it is the frequency of the signal
in Hertz, and it is the speed of light in a vacuum. e im-
portance of understanding and calculating attenuation
in free space lies in its direct impact on the planning of
communication networks in open environments, such as
parking lots, where distances can be signicant and sig-
nals must be transmitted without interruptions to ensure
proper operation of the system.
Another critical concept to consider is the Fresnel
zone, an ellipsoidal region that details around the line
directly between a transmitter and a receiver. e con-
cept is fundamental as it can serve as a basis for unders-
tanding how obstructions in the Fresnel zone can lead to
signal diraction, resulting in signal loss, from there, data
loss. e Fresnel zone is crucial when it comes to envi
-
ronments such as obstacle areas such as vehicles and buil-
dings, which could hinder signal propagation, as shown
in equation 4:
(4)
Where:
Fn: is the radius of the Fresnel zone at the point under
consideration (meters).
n: is the number of the Fresnel zone (for the rst zone,
n=1).
: is the wavelength of the signal (meters).
d1: is the distance from the transmitter to the point under
consideration (meters).
d2: is the distance from the point under consideration to
the receiver (meters).
e wavelength (λ) can be calculated from the frequency
(f) of the signal using equation 5.
(5)
159
Where:
c: is the speed of light, meters/second.
f: is the frequency of the signal (Hertz).
Eective communication system design requires careful
planning, particularly with respect to the Fresnel zone
[13]. is region, which surrounds the direct line-of-si-
ght between a transmitter and a receiver, has an ellipti-
cal shape and plays a crucial role in signal propagation.
When objects intrude into this space, they can cause di-
raction and weaken the signal. By accounting for the
Fresnel zone during installation, engineers can better po-
sition antennas and related equipment to reduce interfe-
rence and maintain consistent data transmission quality.
Network security and analytics are critical areas in
data loss prevention [14], and tools such as Wireshark
and Cisco Packet Tracer are indispensable for these pur-
poses. Wireshark is a network protocol analysis tool that
allows administrators to capture and analyze data packets
in real-time [15]. eir ability to identify vulnerabilities
in network infrastructure is crucial to prevent data loss
and ensure the safe operation of systems [16].
Wireshark allows network trac to be analyzed [17],
at a very detailed level, which can help identify specic
issues such as attacks or bad behavior and address them
before they cause signicant damage to the system. Cisco
Packet Tracer also oers a simulation environment that
can be used to model and analyze the operating beha-
vior of complex networks under dierent operating con-
ditions [18]. In this way, the soware can be used as a tool
to analyze the potential fallibility of the existing network
and investigate its resilience with respect to dierent com-
binations of operating circumstances.
Simulations conducted using Cisco Packet Tracer help
identify vulnerabilities in the network infrastructure [19],
allowing engineers to develop strategies that reduce the
risk of data loss. Additionally, the ability to test dierent
network congurations enables the optimization of ne-
twork designs, ultimately enhancing both performance
and reliability.
A review of related studies shows that substantial re-
search has been carried out on network management in
similar environments [20]. ese studies have explored
various methods to tackle data loss, including simula-
tions, empirical analysis, and the application of advan-
ced technologies.
For example, some studies have used the simulation
of the Fresnel zone and the conguration of equipment
through tools such as the AirOS applications (shown in
Figure 1) and UISP Design Center of Ubiquiti Networ-
ks, which has allowed the optimization of network in-
frastructure in high-density environments [21], such as
shopping malls [16]. ese approaches have proven to be
eective in improving network coverage and reducing the
incidence of data loss.
Figure 1
Monitoring via the AirOS web app.
Another key aspect in the management of parking in sho-
pping centers is the implementation of advanced systems
[22], such as Meypar equipment. is system is essential
for the automation and optimization of access control
and use of parking spaces. Meypar integrates with re-
al-time monitoring and management systems, enabling
more ecient and safer parking lot operation [23].
In addition, its congurability through applications
such as the User Terminal allows administrators to -
ne-tune and control the system, minimizing the risks of
operational failures and data loss [24]. e use of mathe-
matical equations is another essential component in mo-
deling data loss scenarios.
In addition to equation (1) of Loss of Clearance
(FSPL), other equations related to information theory
and the capacity of communication channels are used to
calculate the maximum amount of data that can be relia-
bly transmitted over a channel [25]. ese calculations are
critical for designing network systems that can withstand
the required data load without signicant loss.
Mathematical modeling is also applied to analyze
how dierent environmental and operational conditions
aect signal propagation and overall network performan-
ce [26]. ese models provide valuable information for
decision-making in the design and operation of parking
lot communication systems, allowing engineers to anti-
cipate potential problems and develop strategies to miti-
gate them before they occur.
e use of advanced tools such as Cisco Packet Tra-
cer and Wireshark, along with the application of robust
technical concepts and the integration of cutting-edge
technologies, has enabled researchers to develop eec-
tive solutions to mitigate the risks of data loss in critical
environments [27]. e strategies developed from these
studies not only improve operational eciency, but also
strengthen the security and resilience of systems in the
face of possible contingencies.
e evolution of technology in the management of
networks and communication systems continues to oer
new opportunities to improve the management of com-
plex infrastructures such as shopping mall parking lots.
Santillán H. et al.
160
e integration of new tools and techniques allows for
more accurate and ecient management, reducing the
risk of data loss and improving the overall experience for
users [28].
Research in this eld is essential to further advance
in the protection and optimization of these systems, en-
suring their robustness and reliability in the future [29].
It encompasses a wide range of key concepts, analytical
tools, related works, and mathematical equations, provi-
ding a solid foundation for understanding and addressing
the challenges associated with data loss in zonal systems
and servers.
e combination of advanced techniques, careful
planning, and the use of simulation tools allows network
administrators to develop safer and more ecient sys-
tems, ensuring operational continuity in critical environ-
ments such as shopping mall parking lots [30], [31].
. Method
e methodology used in this research is structured in a
mixed approach that integrates quantitative and experi-
mental methods, with the aim of achieving an exhaustive
and detailed analysis of the zonal system and the parking
servers in a shopping center. Quantitative methodology
is critical as it allows for accurate and objective numeri-
cal data to be collected that is critical for evaluating ne-
twork infrastructure performance.
Key variables measured include packet loss rate, ca-
bling stability and quality, latency, network node per-
formance, and data transmission rate across dierent
segments of the system. Obtaining this data allows for
early identication of any anomalies or ineciencies that
may be contributing to data loss, which is crucial for co-
rrective interventions before problems are amplied.
In parallel, the experimental methodology focuses on
the simulation of the system using advanced tools such as
Cisco Packet Tracer, Wireshark, and other web applica-
tions specialized in network analysis. e simulation is a
critical stage of the methodology, since it allows to virtua-
lly model the parking environment and test various ne-
twork congurations in a controlled environment.
is phase is essential to predict how the network will
behave under dierent operational scenarios, such as va-
riation in data trac density, interference in the radio fre-
quency signal, and possible failure of key equipment such
as routers and switches. rough simulation, it is possible
to experiment with dierent network conguration and
optimization strategies, making it easier to identify the
most robust and ecient solution to minimize data loss
and ensure optimal system performance.
e development of the prototype is based on a detai-
led model of the existing infrastructure of the shopping
center’s parking lot, which is used as a basis for simulation
and analysis. is prototype includes all the critical com-
ponents of the system, such as ticket dispensers, ticket
validators, license plate cameras, perimeter cameras, and
the main server, which are interconnected through a ra-
dio link.
is part of the system, oen marked as the “red dot,
is labeled a critical zone because it plays a central role in
maintaining wireless communication between key com-
ponents. Its functionality depends heavily on uninterrup-
ted data exchange to keep operations synchronized. Any
disruption in this area can compromise system perfor-
mance, potentially causing data loss or service interrup-
tions. For this reason, a detailed assessment is essential,
along with preventive actions to strengthen the reliabili-
ty of the communication link.
Figure 2.
Network diagram of the parking lot equipment.
As can be seen in Figure 2, the detail of the intercommu-
nication of the local network of the parking lot is found.
1. Main node.
2. Server.
3. Warehouse node.
4. Iron node.
5. PowerBeam 5 AC Gen 2 transmitter antenna.
6. PowerBeam 5 AC Gen 2 Receptor Antenna.
7. Red dot node.
8. Meypar Equipment.
9. Monitoring center.
Also, as these equipment, they communicate to the
server, specically the red dot area, because they have
communication through a radio link. Before detailing the
specic phases of the methodology, it is critical to unders-
tand that this comprehensive approach is designed to ad-
dress both the identication and resolution of problems
in the parking network infrastructure.
e methodology not only focuses on data collec-
tion and simulation, but also includes practical imple-
mentation and continuous monitoring to ensure the
161
sustainability of the improvements made. is structured
process allows for a thorough evaluation of the system,
making it easier to identify critical points and implement
eective solutions to minimize data loss and optimize
overall performance. Below, we can see Figure 3 with the
6 main phases in this methodology:
Figure 3.
Phases to follow in this methodology
e main steps to be followed in this mixed methodo-
logy that integrates quantitative and experimental me-
thods begin with phase 1 initial data collection. is pro-
cess involves an exhaustive and meticulous evaluation of
the existing system, where detailed measurements were
made on the Meypar equipment of the parking lot of the
shopping center in the red dot area.
ese measurements include phase 2, verication of
the condition of structured cabling, inspection of network
equipment, and real-time monitoring of data trac, this
phase is crucial to establish a baseline against which the
results of simulations and subsequent implementations
can be compared. e data collected is used to build pha-
se 3, a virtual model of the system in Cisco Packet Tra-
cer, which simulates both normal operating conditions
and failure scenarios.
Once the virtual model is complete, it moves on to si-
mulation. During this phase, various congurations and
optimization strategies are tested to determine which ones
oer the best combination of performance and resilien-
cy. is includes simulating situations such as network
congestion, critical node drops, and radio link signal in-
terference.
e simulation allows not only to identify possible
points of failure, but also to evaluate the eectiveness of
dierent mitigation measures, such as optimizing the
network topology, improving packet routing, and im-
plementing redundancies at critical points in the system.
Each conguration is evaluated in terms of its impact on
data loss, latency, and overall system availability.
e most promising congurations are then selected
for phase 4 deployment in the controlled environment. Du-
ring this phase, pilot tests are carried out in a section of the
parking lot, which implements the selected congurations
to verify the system that works in real conditions. During
this period of time, various real-time monitoring tools are
used to monitor and collect data about the system.
is allows congurations to be adjusted and rened
as needed, ensuring that the system implemented throu-
ghout the facility performs optimally and meets the ex-
pected quality and eciency standards. e process does
not end with implementation, but extends to phase 5 of
continuous monitoring and adjustment, where the sys-
tem is monitored on a regular basis to ensure that the
implemented congurations continue to work ecient-
ly over time.
is phase includes post-implementation data collec-
tion and comparison with the initially established base-
line, allowing the actual impact of improvements to be
assessed and further adjustments made if new optimi-
zation opportunities are identied. is monitoring is
critical to ensure the sustainability of the improvements
implemented and to ensure that the system continues to
operate without signicant disruption or data loss.
Finally, phase 6 is carried out, the process of exhaus-
tive documentation where all the steps followed, the con-
gurations tested, the results obtained, and the lessons
learned are recorded. is documentation is crucial not
only to support decisions made during the project, but
also to provide a valuable reference for future research
and similar projects.
By documenting in detail each aspect of the process,
a resource is created that can be used by other engineers
and professionals in the area to replicate or adapt the so-
lutions developed to dierent contexts, thus contributing
to the advancement of knowledge in the management of
zonal systems and servers in critical environments such
as shopping centers.
. Results and discussion
3.1. RESULTS
e results obtained in the study of data loss in the zonal
system and servers of a parking lot in a shopping center
are presented in detail through various tables and analy-
ses that reect the performance of the system and the
problems detected. To quantify the signal attenuation in
the wireless link, the equations of Loss of Free Space and
Fresnel Zone were applied.
Equations (3), (4), and (5) were used to evaluate sig-
nal attenuation levels based on transmission distance and
signal frequency, as well as to assess the inuence of po-
tential environmental obstructions on propagation per-
formance. Once the corresponding data from the AirOS
web application have been acquired, which are detailed
Santillán H. et al.
162
in Figure 1, the calculation of the attenuation of the free
space will be carried out using equation 3.
FSPL=20 log10(2.4 km)+20 log10(5225 MHz)+32.44
FSPL=114.406 dB
e result of FSPL=114.406 dB represents the clearan-
ce between the PowerBean 5AC antennas. To obtain the
Fresnel zone between the antennas, the values obtained
from Figure 1 must be considered, for this I use equa-
tions 4 and 5.
e result of λ=0.057 m represents the wavelength that
was used to solve equation 4, which resulted in F_n=5.86
m of the Fresnel zone.
erefore, as shown in Figure 4, a simulation was perfor-
med in the Cisco Packet Tracer soware, where we were
able to perform several tests such as; disconnection and
connection of the wireless link, of the pcs, server and
switches, sending and receivingpackets through ping
between the pc’s and server. Based on this simulation, it
was possible to have a more referential idea of the possi-
ble problems in the attenuation of the network in the red
dot sector in the parking lot of the shopping center.
Figure 4.
Point-to-Point Wireless Link Simulation.
Next, he performed an exhaustive analysis of the data
collected through the WireShark application, where the
source and destination IPs were ltered to identify the
equipment with signicant packet loss which we obser-
ve in Figure 5. is analysis is summarized in Table 1,
where it is observed that equipment such as license plate
cameras and ticket vending machines presented the hi-
ghest losses of packages.
Figure 5.
Packet ltering.
Table 1
Result of the analysis on each team
RED DOT ANALYSIS 20/2/24 12:43-15:26 02:43
TOTAL PACKETS
ANALYZED 1217331
EQUIPMENT IP PACKAGES LOST
Ticket Dispenser 15 19078 220
Interphony 25 19076 220
Registration Chamber 35 3971 1507
Rear Perimeter Acts 145 19280 2
Acti Front Perimeter 185 19296 0
Acti Perimetral Facial 215 19296 0
Ticket validator 55 19262 4
Interphony 75 19296 0
Registration Chamber 95 15540 440
Rear Perimeter Acts 135 19296 0
Acti Front Perimeter 165 19296 0
Acti Perimetral Facial 225 19298 0
Antenna Transmitter 103 9648 0
Antenna Receptor 104 9648 0
Total Lost Packages 2393
Bytes per packet 74
Bits per packet 592
163
e results show that these devices are essential for par-
king access control, pointing to the need for enhance-
ments in the existing infrastructure. Table 1 provides a
summary of the outcomes from the dierent scenarios
analyzed, detailing the total number of captured packets,
lost packets, and the packet loss rate.
Once the problem areas were identied, corrective main-
tenance was performed, which involved replacing the da-
maged UTP cabling with new cables that meet the IEEE
802.3an standards. Post-replacement results show a sig-
nicant improvement in data transmission, as shown in
Table 2.
Table 2.
Result of the analysis in each team.
RED DOT ANALYSIS 27/6/24 02:59-10:59 08:00
TOTAL PACKETS
ANALYZED 927215
EQUIPMENT IP PACKAGES LOST
Ticket Dispenser 15 24405 2
Interphony 25 24404 2
Registration Chamber 35 24413 0
Rear Perimeter Acts 145 24416 0
Acti Front Perimeter 185 24419 0
Acti Perimetral Facial 215 24417 0
Ticket validator 55 24425 0
Interphony 75 0
Registration Chamber 95 24424 1
Rear Perimeter Acts 135 24423 0
Acti Front Perimeter 165 24426 0
Acti Perimetral Facial 225 24427 0
Antenna Transmitter 103 24424 0
Antenna Receptor 104 24423 0
Total Packages Lost 5
Bytes per packet 74
Bits per packet 592
In Table 2, the number of lost packages was drastically
reduced, especially in license plate camera and ticket
dispensing devices. is loss reduction suggests that the
wiring change was eective in mitigating previously de-
tected data transmission issues.
Comparing the data from before and aer maintenan-
ce showed a signicant drop in the number of lost packets.
In particular, the camera of the IP 35 recorded a reduction
from 1507 to 0, which means a 100% improvement. ere-
fore, the initial hypothesis that worn wiring was one of the
key factors inuencing data loss was proven.
e results obtained allow us to conclude that the main-
tenance actions carried out were eective in improving the
quality of the network and the eciency in the transmis-
sion of data in the parking lot. Early identication of criti-
cal points and the implementation of appropriate corrective
solutions have proven to be essential to ensure the proper
functioning of the zonal system and servers.
In addition, as visualized in Figure 6, the reduction
in packet attenuation ensures greater reliability in ac-
cess control and monitoring systems, which is crucial for
the operability of the shopping center. In summary, the
analysis of the results reveals that, with proper mainte-
nance and the updating of critical components, it is pos-
sible to signicantly reduce failures in data transmission,
thus guaranteeing a more ecient and reliable service for
parking lot users.
Figure 6
Result bar diagram referring to table 2.
3.2. DISCUSSION
One of the main issues identied is the signicant varia-
bility in packet loss across dierent devices. Specically,
the license plate cameras showed a high rate of data loss,
with one camera (IP 35) losing 1,727 packets and ano-
ther (IP 95) losing 440 packets. is packet loss can be
attributed to various factors, such as network congestion,
equipment malfunctions, or signal interference.
In an urban and commercial environment, radio sig-
nals are frequently aected by interference from other
electronic devices, such as Wi-Fi routers, mobile pho-
nes, and other wireless systems; because of this, Rattles
reected packet numbers are common to both systems,
with consequent packet collisions and data loss. Radio
frequency interference is one of the main forms of pac-
ket loss in a high-density environment [7].
e presence of physical structures, such as walls, ve-
hicles, and other obstacles in the parking lot, can attenua-
te radio signals, resulting in packet loss. e eectiveness
of radio links depends on direct line of sight. According
to studies, physical barriers can signicantly decrease sig-
nal quality on wireless links [8].
Santillán H. et al.
164
Incorrect conguration of antenna parameters, such
as alignment, tilt angle, and transmit power, can signi-
cantly aect link quality. It highlights the importance of
proper conguration to minimize packet loss [9]. Equip-
ment performance can be aected by improper mainte-
nance or lack of maintenance.
Dust, moisture, and general wear and tear can damage
antennas and other components. e reliability of wire-
less systems depends on regular maintenance [11]. Detai-
led network infrastructure planning is critical to ensuring
optimal performance. e antennas should be high and
free of obstacles, ensuring a direct line of sight between
the attachment points. Using RF planning tools can help
identify optimal locations.
ey emphasize the importance of strategic location
in wireless network planning. Conduct eld studies prior
to implementation to identify potential sources of interfe-
rence and physical obstacles. ese studies allow antenna
conguration to be adjusted and network planning more
eectively. Field studies are essential for successful wire-
less network planning [12].
To reduce interference and maximize link quality,
adjust technical parameters such as frequency, transmit
power, and receiver sensitivity. ey have shown that op-
timal equipment conguration can signicantly reduce
packet loss. Implement mitigation techniques, such as
the use of band lters and the selection of less conges-
ted channels [13].
In addition, the use of antenna technology with dyna-
mic tuning capabilities can help avoid interference. Inter-
ference mitigation is crucial to improving the stability of
wireless networks. Create continuous monitoring to de-
tect and resolve issues instantly. e use of network ma
-
nagement soware can provide early warnings about link
degradation and allow for immediate corrective actions.
He notes that continuous monitoring can improve the
operational eciency of wireless networks [8]. To ensu-
re that improvements to the network have had the desi-
red eect, it is essential to reevaluate performance aer
making changes to the network. Field testing and perfor-
mance data analysis are included in this. Post-implemen-
tation re-evaluation this is important for quality control.
Consider installing a ber optic link as the primary
connection, keeping radio links as a backup solution. is
would ensure that the service would not be interrupted in
the event of radio link failures. ey suggest that a backup
infrastructure can improve the resilience of networks. Im-
plement a regular maintenance schedule for all network
components, including cleaning, inspection, and replace-
ment of worn parts.
Studies have shown that preventive maintenance can
signicantly reduce the incidence of failures and impro-
ve overall system performance [11]. Interference, phy-
sical obstacles, suboptimal congurations, and lack of
maintenance are signicant challenges that aect network
stability and reliability.
However, by implementing mitigation strategies, con-
tinuous monitoring, periodic re-evaluation, and regular
maintenance, it is possible to signicantly improve ne-
twork performance by 99.8%. ese improvements will
not only increase the eciency and reliability of the ne-
twork, but will also contribute to a better experience for
parking users and the overall safety of the environment.
. Conclusions
e operation of the radio links, which use PowerBeam
5AC Gen2 antennas, made it possible to determine that
the data loss exceeded what is allowed by the IEEE 802.3an
and 802.3af/at standards. Under critical conditions, the
number of lost packets reached 2393, which meant a sig-
nicant degradation of the transmitted packets and nega-
tively aected the continuity of transmission to and from
the most sensitive areas of the parking lot.
Aer the implementation of corrective measures, such
as the replacement of the rusty UTP cabling with new one
in accordance with IEEE standards and the optimization
of the radio link conguration, a signicant improvement
in the quality of data transmission was achieved. Speci-
cally, the number of lost packages was reduced by 99.8%,
going from 2393 to only 5 packages in the areas assessed.
is percentage improvement conrms that the degrada-
tion of the service was directly related to the conditions of
the cabling and the suboptimal conguration of the links.
Another key factor contributing to the high failure
rate in the network was the absence of a preventive and
corrective maintenance program. Implementing regular
equipment inspections and preventive maintenance every
six months has been shown to reduce the likelihood of
failure by 30% before maintenance is even required. is
approach has proven to be a crucial strategy, signicantly
reducing data loss and improving the overall performan-
ce and reliability of the parking lot facility.
4.1. RECOMMENDATIONS
Perform a full audit of existing radio links, with a focus
on optimizing conguration and replacing equipment
that exhibits an unacceptable packet loss rate. Implement
real-time monitoring tools to proactively detect and co-
rrect data loss.
Install equipment that operates on less congested
frequencies and use technologies such as MIMO (Mul-
tiple Input Multiple Output) to improve resilience to in-
terference. Additionally, replace UTP cabling with more
165
rust-resistant versions, such as high-quality coated or out-
door-certied cables.
Establish and implement a preventive maintenan-
ce plan that includes periodic inspections of all network
components, regular cleaning of connections, and perfor-
mance testing of equipment. is plan must be documen-
ted and executed by trained personnel, with status reports
aer each intervention.
Design and execute an appropriate electric landing plan,
ensuring that all critical equipment is connected to surge
protection systems. In addition, review and restructure the
physical distribution of equipment to minimize exposure to
electromagnetic interference and electrical hazards.
Implementing a hybrid connectivity infrastructure
that uses ber optic links as the primary means of data
transmission, complemented by radio links as a bac-
kup, will enhance stability and provide redundancy. is
approach ensures service continuity, even in the event of
a failure in one of the systems.
References
[1] E. Soacha, T. De Grado, R. Ruiz, Y. Alejandro, A. San-
doval, y D. Stefany, “Soware to manage and manage
the resources available in parking lots of small shop-
ping centers – system parking,” Nov. 2017. [En línea].
Disponible en: https://repositorio.ucundinamarca.edu.
co/handle/20.500.12558/1207 [Accedido el 29 de mayo
de 2024].
[2] J. Santiago y C. Pullopaxi, “Implementation of a system
that guides the circulation of vehicles and the occupa-
tion of available spaces in the parking lots of the Medi-
cal Towers and Metropolitan Hospital,” Enero 2014. [En
línea]. Disponible en: http://bibdigital.epn.edu.ec/hand-
le/15000/7122 [Accedido el 29 de mayo de 2024].
[3] Y. C. Lin y Z. S. Shih, “Design and simulation of a ra-
dio spectrum monitoring system with a soware-de-
ned network,Computers & Electrical Engineering, vol.
68, pp. 271–285, May 2018, https://doi.org/10.1016/J.
COMPELECENG.2018.03.043
[4] W. Rehan, S. Fischer, O. Chughtai, M. Rehan, M. Hail, y
S. Saleem, “A novel dynamic condence interval based
secure channel prediction approach for stream-based
multichannel wireless sensor networks,Ad Hoc Ne-
tworks, vol. 108, p. 102212, Nov. 2020, https://doi.or-
g/10.1016/J.ADHOC.2020.102212
[5] W. Rehan, S. Fischer, M. Rehan, y M. H. Rehmani, “A
comprehensive survey on multichannel routing in wire-
less sensor networks,Journal of Network and Computer
Applications, vol. 95, pp. 1–25, Oct. 2017, https://doi.or-
g/10.1016/J.JNCA.2017.07.006
[6] J. Mulder et al., “26.3 An 800MS/S 10b/13b receiver for
10GBASE-T Ethernet in 28nm CMOS,” in 2015 IEEE
International Solid-State Circuits Conference - (ISSCC)
Digest of Technical Papers, 2015, pp. 1–3. doi: 10.1109/
ISSCC.2015.7063126.
[7] M. Peng y F. Qin, “Clarication of basic concepts for
electromagnetic interference shielding eectiveness,J
Appl Phys, vol. 130, no. 22, p. 225108, Dec. 2021, https://
doi.org/10.1063/5.0075019
[8] A. Colliander et al.,Spatial Downscaling of SMAP Soil
Moisture Using MODIS Land Surface Temperature and
NDVI During SMAPVEX15,IEEE Geoscience and Re-
mote Sensing Letters, vol. 14, no. 11, pp. 2107–2111,
2017, https://doi.org/10.1109/LGRS.2017.2753203
[9] B. Ojaghi, F. Adelantado, E. Kartsakli, A. Antonopoulos,
y C. Verikoukis, “Sliced-RAN: Joint Slicing and Functio-
nal Split in Future 5G Radio Access Networks,” in ICC
2019 - 2019 IEEE International Conference on Commu-
nications (ICC), 2019, pp. 1–6. https://doi.org/10.1109/
ICC.2019.8761081
[10] D. H. Cuzco Torres y S. J. Pinos Carangui, “Design of a
Smart Parking System for the Historic Center of the City
of Cuenca, Applying an LPWAN Network,” 2022. [En
línea]. Disponible en: http://dspace.ups.edu.ec/hand-
le/123456789/22405 [Accedido el 29 de mayo de 2024].
[11] S. ZOUGA, M. Benchagra, and A. Abdallah, “Backs-
tepping Control Based on the PSO Algorithm for a
ree-Phase PV System Connected to the Grid un-
der Load Variation,” in 2020 International Confe-
rence on Electrical and Information Technologies
(ICEIT), 2020, pp. 1–6. https://doi.org/10.1109/
ICEIT48248.2020.9113235
[12] F. Guo, H. Zhang, H. Ji, X. Li, y V. C. M. Leung, “An E-
cient Computation Ooading Management Scheme in
the Densely Deployed Small Cell Networks With Mo-
bile Edge Computing,IEEE/ACM Transactions on Ne-
tworking, vol. 26, no. 6, pp. 2651–2664, 2018, https://doi.
org/10.1109/TNET.2018.2873002
[13] Z. Qian, Y. Zhao, X. Liu, L. Ge, y J. Mao, “A Novel Fil-
ter in Antenna (FiA) With Compact Size and High
Performance,IEEE Trans Antennas Propag, vol. 72,
no. 7, pp. 5550–5559, 2024, https://doi.org/10.1109/
TAP.2024.3401477
[14] M. N. Al Ra, M. A. J. Mojumder, S. S. Newaz, y R.
Khan, “Study of Radio Link Losses in Dierent Me-
diums and Receiving Stations,” in 2021 IEEE 19th
Student Conference on Research and Development (SCO-
ReD), 2021, pp. 192–196. https://doi.org/10.1109/SCO-
ReD53546.2021.9652725
[15] J. Allison, “Simulation-Based Learning via Cisco Packet
Tracer to Enhance the Teaching of Computer Networ-
ks,” in Proceedings of the 27th ACM Conference on on In-
novation and Technology in Computer Science Education
Vol. 1, in ITiCSE ’22. New York, NY, USA: Association
for Computing Machinery, 2022, pp. 68–74. https://doi.
org/10.1145/3502718.3524739
[16] S. Unni, D. Raj, K. Sasidhar, y S. Rao, “Performance me-
asurement and analysis of long range Wi-Fi network for
166
over-the-sea communication,” in 2015 13th Internatio-
nal Symposium on Modeling and Optimization in Mo-
bile, Ad Hoc, and Wireless Networks (WiOpt), 2015, pp.
36–41. https://doi.org/10.1109/WIOPT.2015.7151030
[17] S. N. R. Shah, N. H. Ramli Sulong, R. Khan, M. Z.
Jumaat, y M. Shariati, “Behavior of Industrial Steel
Rack Connections,Mech Syst Signal Process, vol. 70–
71, pp. 725–740, 2016, doi: https://doi.org/10.1016/j.
ymssp.2015.08.026
[18] L. Khichadi y K. Nagamani, “Performance Evaluation of
Power over Ethernet in an Ethernet Switch,” in 2019 In-
ternational Conference on Communication and Electro-
nics Systems (ICCES), 2019, pp. 1091–1095. https://doi.
org/10.1109/ICCES45898.2019.9002072
[19] M. A. Islam, R. Irishika, K. Iokibe, y Y. Toyota, “Suppres-
sion of Mode Conversion by Improved Shielding Eect
of Ethernet Cable Connector Based on Imbalance Factor
Matching,” in 2019 International Conference on Compu-
ter, Communication, Chemical, Materials and Electro-
nic Engineering (IC4ME2), 2019, pp. 1–4. https://doi.
org/10.1109/IC4ME247184.2019.9036533
[20] H. J. Santillan Carranza, J. O. Enriquez Sandoval, y J. F.
Bonilla Castro, “Development of a Raspberry Pi-based
Wireless Educational Tool,” Rev. Ingenio, vol. 7, no. 7,
pp. 12–22, 2024. doi: 10.29166/ingenio.v7i1.5630.
[21] S. Caniggia y F. Maradei, “Filter and Grounding So-
lutions for Limiting Radiated Emission of a PCB with
an Attached UTP Cable,” IEEE Electromagn. Com-
pat. Mag., vol. 10, no. 1, pp. 33–40, 2021. doi: 10.1109/
MEMC.2021.9400990.
[22] J. B. Eom, D. S. Moon, U. C. Paek, B. H. Lee, y G. H.
Yang, “Fabrication and transmission characteristics of
couplers using photonic crystal bers,” en Optical Fiber
Communication Conference and Exhibit, 2002, 2002,
pp. 465–466. doi: 10.1109/OFC.2002.1036488.
[23] A. E. Ibhaze, A. O. Gbadebo, A. A. Amusan, y S. N. John,
“Performance Analysis of Fiber Attenuation in Passi-
ve Optical Networks,” Indones. J. Electr. Eng. Informa-
tics, vol. 11, no. 3, pp. 700–712, 2023. doi: 10.52549/ijeei.
v11i3.4919.
[24] S. Buhr, X. Xu, M. Kreißig, y F. Ellinger, “A Low Power
Fast Ethernet Physical Layer Transceiver,” in 2019 26th
IEEE International Conference on Electronics, Circuits
and Systems (ICECS), 2019, pp. 478–481. https://doi.
org/10.1109/ICECS46596.2019.8964920
[25] M. A. Ebrahimzadeh, M. Dabbaqi, y N. Nakhaie, “In-
vestigating the reduction of the error caused by the
counting of vehicle trac in city license plate reader
cameras by mathematical models (case study: Mas-
hhad city),Road, p., 2024, https://doi.org/10.22034/
road.2024.416435.2199
[26] A. U. Jibia y N. D. Robinson, “A PC-Based Multifunc-
tional Virtual Oscilloscope,” in 2019 2nd International
Conference of the IEEE Nigeria Computer Chapter (Nige-
riaComputConf), 2019, pp. 1–9. https://doi.org/10.1109/
NigeriaComputConf45974.2019.8949640
[27] S. Kakuru, “Behavior based network trac analysis tool,
in 2011 IEEE 3rd International Conference on Commu-
nication Soware and Networks, 2011, pp. 649–652. ht-
tps://doi.org/10.1109/ICCSN.2011.6014810
[28] R. Gooty, G. Modi, S. Williams, K. Kruckmeyer, V.
Salomon, y D. Boldrin, “Radiation Evaluation of the
DP83561-SP Radiation Hardened 10/100/1000 Ether-
net PHY Transceiver with SEFI Handling Sub-System.,
in IEEE Radiation Eects Data Workshop, 2022. https://
doi.org/10.1109/REDW56037.2022.9921702
[29] M. Elhamdadi y E. K. M. Moutuou, “Finitely stable rac-
ks and rack representations,Commun Algebra, vol. 46,
no. 11, pp. 4787–4802, 2018, https://doi.org/10.1080/0
0927872.2018.1455102
[30] F. Ullah et al., “Barrier Access Control Using Sensors
Platform and Vehicle License Plate Characters Re-
cognition,Sensors, vol. 19, no. 13, 2019, https://doi.
org/10.3390/s19133015
[31] H. J. Santillan Carranza, M. A. Suarez Carvajal, y D. H.
Cardenas Villacres, “Development of an IoT Tool for
Optimizing Humidity Control in Cocoa Cultivation,
Memoria Investigaciones en Ingeniería, vol. 2023, no.
2023, pp. 246–265, 2023. doi: 10.36561/ING.25.14.