scholarly journals Application of an Queuing Model to WiMAX-Based Wireless Mesh Networks: Grid Topology Case Study

2012 ◽  
Vol 2012 ◽  
pp. 1-22
Author(s):  
Vahid Sattari Naeini ◽  
Naser Movahhedinia

Wireless mesh networking is an effective approach to reach high performance in the last mile of broadband Internet access. The mesh structure is the basic step toward providing cost-effective, dynamic, and high-bandwidth wireless connection. In this paper, WiMAX-like wireless mesh network is considered, emphasizing the grid arrangement which is the general topology described in the literature. To evaluate the performance of the conventional and proposed scheduling algorithms, each link is modeled using an M/D/1 queue and a virtual node concept is introduced to describe comparable performance metrics for the system. Performance measures of the system in addition to the simulation results are assessed in terms of the network length and the arrival rates.

Proceedings ◽  
2018 ◽  
Vol 2 (19) ◽  
pp. 1258 ◽  
Author(s):  
Khulan Batbayar ◽  
Emmanouil Dimogerontakis ◽  
Roc Meseguer ◽  
Leandro Navarro ◽  
Esunly Medina ◽  
...  

Community wireless mesh networks have emerged as cooperative initiatives to provide Internet Access in areas where traditional ISP costs are not affordable for the population. It is common in wireless mesh networks sharing several capacity limited Internet gateways to provide Internet access. As routing does not handle capacity planning, end-users have to select gateways in such a way that the overall capacity of all gateways could be used effectively. An efficient gateway selection should minimize the processing logic and measurements over the mesh network. Selecting a high performance gateway can also ensure that the overall network load is balanced. This paper presents RIMO, a standalone best-effort algorithm for client nodes to select their preferred gateway without interacting with other client nodes. RIMO-based selection matches the gateway performance of the reference brute-force and omniscient algorithms for 60% of the test duration while reducing the gateway performance measurement cost from a factor of n to 2. With a reduced overhead and high efficiency, the RIMO algorithm automates the aggregation of multiple Internet gateways in wireless mesh networks, which results in robust last mile Internet connectivity to people in vulnerable situation.


Author(s):  
Saurav Ghosh ◽  
Subir Bhadra ◽  
Indrajit Bhattacharya

Wireless Mesh Network (WMN) is an upcoming wireless network technology and is mainly used to provide broadband internet in remote locations. It is characterized by minimum fixed infrastructure requirement and is operated in an open medium, such that any user within the range covered by mesh routers may access the network. So a critical requirement for the security in WMN is the authentication of users. However, WMN is far from mature for large-scale deployment in some applications due to the lack of the satisfactory guarantees on security. A wellperformed security framework for WMN will contribute to network survivability and strongly support the network growth or reduction. A key management model to overcome the scalability issue on security aspect for large-scale deployment of WMN i.e. Worldwide WMN is proposed in this work, which aims to guarantee wellperformed key management services and protection from potential attacks. Here, we use a combination of techniques, such as zonebased topology structure, off-line CA, virtual certification authority ) etc.


Author(s):  
NIRMALA Y. BARKER ◽  
POORNIMA. B

As an emerging technology, wireless mesh networks are making significant progress in the area of wireless networks in recent years. Routing in Wireless Mesh Network (WMN) is challenging because of the unpredictable variations of the wireless environment. Traditional mechanisms have been proved that the routing performance would get deteriorated and ideal metrics must be explored. Most wireless routing protocols that are currently available are designed to use a single channel. The available network capacity can be increased by using multiple channels, but this requires the development of new protocols specifically designed for multi-channel operation. In this paper, we propose Neighbourhood load routing metric in single channel mesh networks and also present the technique to utilize multiple channels and multiple interfaces between routers for communication. The traditional routing metrics Hop Count and Weighted Cumulative Expected Transmission Time (WCETT) are used in routing. We compare performance of AODV-HOP, WCETT and NLR routing metrics in singlechannel and multichannel environment by considering throughput and end to end delay performance metrics. Our results show that NLR performs better in singlechannel environment.


2014 ◽  
Vol 13 (6) ◽  
pp. 4543-4548
Author(s):  
Preet Pavneet Kaur Sandhu ◽  
Prof. Jatinder Singh Saini

This paper is a review on QoS issue of Wireless mesh networks. QoS comes up with a great collection of networking technologies and procedures that guarantees the capability of a network to deliver with predictable consequences. WMNs have emerged as a flexible, reliable and cost effective way of providing broadband internet access over wide areas through multi hop communication. This paper has reviewed different routing protocols used in the WMNs. The overall objective of this paper is to explore the various short comings of the routing protocols of WMN.


2016 ◽  
Vol 2016 ◽  
pp. 1-19 ◽  
Author(s):  
Shaker Alanazi ◽  
Kashif Saleem ◽  
Jalal Al-Muhtadi ◽  
Abdelouahid Derhab

Wireless mesh networks (WMNs) are a promising technology that has emerged with the combination of several wireless networks. These wireless networks and devices communicate in a mesh network manner, to provide edge-to-edge, easy, and cost-effective data communication. Many current and future promising applications depend on WMN and one of the most important applications is eHealthcare, where the confidential information transfers with the help of WMN. WMN devices communicate over a wireless medium, which opens the system to a number of vulnerabilities; thus, an intruder can launch malicious activities through many types of attacks that can result in denial of service (DoS). In this paper, the available solutions to overcome these attacks are simulated and evaluated in terms of data packet delivery ratio, end-to-end delay, and network throughput and under different cases of static and mobile WMNs, which helps in providing suggestions to enhance existing protocols and mitigate the effect of DoS caused by such attacks.


2012 ◽  
Vol 3 (3) ◽  
pp. 368-374
Author(s):  
Usha Kumari ◽  
Udai Shankar

IEEE 802.16 based wireless mesh networks (WMNs) are a promising broadband access solution to support flexibility, cost effectiveness and fast deployment of the fourth generation infrastructure based wireless networks. Reducing the time for channel establishment is critical for low latency/interactive Applications. According to IEEE 802.16 MAC protocol, there are three scheduling algorithms for assigning TDMA slots to each network node: centralized and distributed the distributed is further divided into two operational modes coordinated distributed and uncoordinated distributed. In coordinated distributed scheduling algorithm, network nodes have to transmit scheduling message in order to inform other nodes about their transfer schedule. In this paper a new approach is proposed to improve coordinated distributed scheduling efficiency in IEEE 802.16 mesh mode, with respect to three parameter Throughput, Average end to end delay and Normalized Overhead. For evaluating the proposed networks efficiency, several extensive simulations are performed in various network configurations and the most important system parameters which affect the network performance are analyzed


2016 ◽  
Vol 2016 ◽  
pp. 1-16
Author(s):  
Pragasen Mudali ◽  
Matthew Olusegun Adigun

Topology Control has been shown to provide several benefits to wireless ad hoc and mesh networks. However these benefits have largely been demonstrated using simulation-based evaluations. In this paper, we demonstrate the negative impact that the PlainTC Topology Control prototype has on topology stability. This instability is found to be caused by the large number of transceiver power adjustments undertaken by the prototype. A context-based solution is offered to reduce the number of transceiver power adjustments undertaken without sacrificing the cumulative transceiver power savings and spatial reuse advantages gained from employing Topology Control in an infrastructure wireless mesh network. We propose the context-based PlainTC+ prototype and show that incorporating context information in the transceiver power adjustment process significantly reduces topology instability. In addition, improvements to network performance arising from the improved topology stability are also observed. Future plans to add real-time context-awareness to PlainTC+ will have the scheme being prototyped in a software-defined wireless mesh network test-bed being planned.


Author(s):  
Guan-Hsiung Liaw et al.

In 802.11 Wireless Mesh Network (WMN), bandwidth will be wasted much for transferring VoIP flows since each voice frame must contain relatively large amount of protocol data. “Packet Aggregation” mechanism can be applied to merge the voice data of multiple VoIP flows into one frame for transmission. It reduces the waste on bandwidth and increases the maximum number of successful VoIP calls. In addition, the mechanism “MCF controlled channel access” (MCCA) defined in 802.11 standard can be used to obtain better QoS than adopting default EDCA mechanism. In MCCA, mesh stations which wants to transfer VoIP flows can reserve time intervals of the medium for transmission and this reservation will be advertised to their neighbors. It is why MCCA causes less medium contentions than EDCA. In this paper, a mechanism to transfer VoIP flows in IEEE 802.11 WMN by MCCA with packet aggregation scheme is proposed. The effectiveness of the proposed mechanism is shown by simulation results. In addition, the problem named as Routing-Packet Aggregation / De-aggregation-Scheduling optimization problem (abbr. RPADS problem) derived from the proposed mechanism is also studied. A heuristic algorithm for RPADS problem to maximize the total number of supported calls is also proposed.


2019 ◽  
Vol 01 (02) ◽  
pp. 103-115
Author(s):  
Durai Pandian M

The spread out of wireless mesh network has made possible the extended range of communication network that are impractical due to environmental changes in a wired access point, these wireless mesh network does not require much competence to set it up as it can be set very fast at a cheap rate, and the conveyancing of messages in it happens by selecting the shortest path, these wireless mesh built-in with irrepressible and invulnerable identities come with an endurance to temporary congestion and individual node failure. This results in an architecture providing a better coverage, flaw indulgent with higher bandwidth compared to other wireless distributed systems. But faces the limitation on power conservation. The battery activated mesh nodes loses their resources on perception, processing and transmission of the data’s, though these batteries or accumulators comes with energy regaining capability still draw backs show up as their nature of energy regaining are unexposed. So the performance analysis of fly wireless network which proposes a uninterrupted wireless mesh networks aims at providing a best measure of performance that is the best quality of service on the meshwork by providing an improved energy gleaning using potency segregation (IGPS) which empowers each node to have self- contained accumulation of energy achieving heightened adaption with energy consumption kept at a minimum. The gross functioning of the proposed is examined on the bases of delay and packet loss to prove the quality of service acquired.


2013 ◽  
Vol 443 ◽  
pp. 440-445 ◽  
Author(s):  
Liang Yu Luan ◽  
Ying Fang Fu ◽  
Peng Xiao ◽  
Ling Xi Peng

In a wireless mesh network, the need for cooperation among wireless nodes to relay each others packets exposes the network to a wide range of security threats. A particularly devastating type of threats is the so-called wormhole attacks. In order to defense against the attack, a type of wormhole attack model and a watch nodes-based wormhole attack detection scheme were presented in this paper. The scheme that is based on the combination of a number of techniques, such as distributed voting, watch nodes based detection and identity-based cryptosystem. Qualitative analysis and simulation show that the wormhole attack detection scheme is more advantageous over the some of the previous schemes in terms of performance and cost.


Sign in / Sign up

Export Citation Format

Share Document