2,613 research outputs found
Recommended from our members
A novel technique to enhance throughput and fairness over wireless mesh networks
This extended abstract was submitted to and published in the ReSCon '12 Book of Abstracts. The fifth SED Research Student Conference (ReSCon2012) was hosted over three days, 18-20 June 2012, in the Hamilton Centre at Brunel University
Radio Co-location Aware Channel Assignments for Interference Mitigation in Wireless Mesh Networks
Designing high performance channel assignment schemes to harness the
potential of multi-radio multi-channel deployments in wireless mesh networks
(WMNs) is an active research domain. A pragmatic channel assignment approach
strives to maximize network capacity by restraining the endemic interference
and mitigating its adverse impact on network performance. Interference
prevalent in WMNs is multi-faceted, radio co-location interference (RCI) being
a crucial aspect that is seldom addressed in research endeavors. In this
effort, we propose a set of intelligent channel assignment algorithms, which
focus primarily on alleviating the RCI. These graph theoretic schemes are
structurally inspired by the spatio-statistical characteristics of
interference. We present the theoretical design foundations for each of the
proposed algorithms, and demonstrate their potential to significantly enhance
network capacity in comparison to some well-known existing schemes. We also
demonstrate the adverse impact of radio co- location interference on the
network, and the efficacy of the proposed schemes in successfully mitigating
it. The experimental results to validate the proposed theoretical notions were
obtained by running an exhaustive set of ns-3 simulations in IEEE 802.11g/n
environments.Comment: Accepted @ ICACCI-201
Recommended from our members
Cloned Access Point Detection and Point Detection and Prevention Mechanism in IEEE 802.11 Wireless Mesh Networks
IEEE 802.11 Wireless Mesh Network (WMN) is an
emerging low cost, decentralized community-based broadband technology, which is based on self-healing and multi-hop deployment of Access Points (APs), so that to increase the coverage area with maximum freedom to end-users to join or leave the
network from anywhere anytime having low deployment and maintenance cost. Such kind of decentralized structure and multihop architecture increases its security vulnerabilities especially
against the APs. One of such possible security attack is the placement of cloned AP to create serious performance degradation in IEEE 802.11 WMN. In this paper, we discuss the different
security vulnerabilities of AP in IEEE 802.11 WMN along with possible research directions. We also propose a mutual cooperation mechanism between the multi-hop APs and serving gateway so that
to detect and prevent the possibility of cloned AP. In this way the large scale exploitation of IEEE 802.11 WMN can be eliminated
Class-Based Weighted Window for TCP Fairness in WLANs
The explosive growth of the Internet has extended to the wireless domain. The number of Internet users and mobile devices with wireless Internet access is continuously increasing. However, the network resource is essentially limited, and fair service is a key issue in bandwidth allocation. In this research, the focus is on the issue of fairness among wireless stations having different number and direction of flows for different required bandwidth to ensure that fair channel is fairly shared between wireless stations in the same class of bandwidth. It is shown that the current WLANs allocate bandwidth unfairly. It is also identified that the cause of this problem of unfairness is the TCP cumulative ACK mechanism combined with the packet dropping mechanism of AP queue and the irregular space for each wireless station in AP queue. The proposed method allocate converged bandwidth by introducing a Class-Based Weighted Window method which adjusts the TCP window size based on the current conditions of the network and according to the network’s requirements. This method works in wireless stations without requiring any modification in MAC. It can guarantee fair service in terms of throughput among wireless users whether they require the same or different bandwidth.Wireless LAN, TCP, Fairness
Recommended from our members
Cooperative smartphone relay selection based on fair power utilization for network coverage extension
This paper presents a relay selection algorithm based on fair battery power utilization for extending mobile network coverage and capacity by using a cooperative communication strategy where mobile devices can be utilized as relays. Cooperation improves the network performance for mobile terminals, either by providing access to out-of-range devices or by facilitating multi-path network access to connected devices. In this work, we assume that all mobile devices can benefit from using other mobile devices as relays and investigate the fairness of relay selection algorithms. We point out that signal strength based relay selection inevitably leads to unfair relay selection and devise a new algorithm that is based on fair utilization of power resources on mobile devices. We call this algorithm Credit based Fair Relay Selection (CF-RS) and in this paper show through simulation that the algorithm results in fair battery power utilization, while providing similar data rates compared with traditional approaches. We then extend the solution to demonstrate that adding incentives for relay operation adds clear value for mobile devices in the case they require relay service. Typically, mobile devices represent self-interested users who are reluctant to cooperate with other network users, mainly due to the cost in terms of power and network capacity. In this paper, we present an incentive based solution which provides clear mutual benefit for mobile devices and demonstrate this benefit in the simulation of symmetric and asymmetric network topologies. The CF-RS algorithm achieves the same performance in terms of achievable data rate, Jain's fairness index and utility of end devices in both symmetric and asymmetric network configurations
- …