18 research outputs found

    NEIGHBOURHOOD LOAD ROUTING AND MULTI-CHANNELS IN WIRELESS MESH NETWORKS

    Get PDF
    As an emerging technology, wireless mesh networks are making significant progress in the area of wireless networks in recent years. Routing in Wireless Mesh Network (WMN) is challenging because of the unpredictable variations of the wireless environment. Traditional mechanisms have been proved that the routing performance would get deteriorated and ideal metrics must be explored. Most wireless routing protocols that are currently available are designed to use a single channel. The available network capacity can be increased by using multiple channels, but this requires the development of new protocols specifically designed for multi-channel operation. In this paper, we propose Neighbourhood load routing metric in single channel mesh networks and also present the technique to utilize multiple channels and multiple interfaces between routers for communication. The traditional routing metrics Hop Count and Weighted Cumulative Expected Transmission Time (WCETT) are used in routing. We compare performance of AODV-HOP, WCETT and NLR routing metrics in singlechannel and multichannel environment by considering throughput and end to end delay performance metrics. Our results show that NLR performs better in singlechannel environment

    Minimum interference channel assignment for multicast in multi-channel multi-radio wireless mesh networks

    Get PDF
    Wireless mesh networks (WMNs) have emerged as a key technology for next-generation wireless networking. In a WMN, wireless routers provide multi-hop wireless connectivity between hosts in the network and also allow hosts to access the Internet via the gateway nodes. Wireless routers are typically equipped with multiple radios operating on different channels to increase network throughput. Multicast is a form of communication that delivers data from a source to a set of destinations simultaneously. It is used in a number of applications such as distributed games, distance education, and video conferencing. In this work, we address the channel assignment problem for multicast in multi-radio multi-channel WMNs. In a multi-radio multi-channel WMN, when two nearby nodes transmit on the same channel, they will interfere with each other and cause throughput decrease. Thus, an important goal for multicast channel assignment is to reduce the interference among the tree nodes. We have developed a Minimum Interference Channel Assignment (MICA) algorithm for multicast that accurately models the interference relationship between pairs of multicast tree nodes using the concept of interference factor and assigns channels to tree nodes to minimize interference within the multicast tree. Simulation results show that MICA achieves higher throughout and lower end-to-end packet delay compared with an existing channel assignment algorithm named MCM. In addition, MICA achieves much lower throughput variation among the destination nodes than MCM

    Maximizing multicast call acceptance rate in multi-channel multi-interface wireless mesh networks

    Get PDF
    In this paper, we consider the problem of constructing bandwidth-guaranteed multicast tree in multi-channel multi-interface wireless mesh networks. We focus on the scenario of dynamic multicast call arrival, where each call has a specific bandwidth requirement. A call is accepted if a multicast tree with sufficient bandwidth on each link can be constructed. Intuitively, if the carried load on both the most-heavily loaded channel and the most-heavily loaded node is minimized, the traffic load in the network will be balanced. If the network load is balanced, more room will be available for accommodating future calls. This would maximize the call acceptance rate in the network. With the above notion of load balancing in mind, an Integer Linear Programming (ILP) formulation is formulated for constructing bandwidth-guaranteed tree. We show that the above problem is NP-hard, and an efficient heuristic algorithm called Largest Coverage Shortest-Path First (LC-SPF) is devised. Simulation results show that LC-SPF yields comparable call acceptance rate as the ILP formulation, but with much shorter running time. © 2010 IEEE.published_or_final_versio

    Secure Multicast Routing Algorithm for Wireless Mesh Networks

    Get PDF

    The application of network coding to multicast routing in wireless networks

    Get PDF
    Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2007.Includes bibliographical references (p. 58-62).This thesis considers the application of network coding and opportunistic routing to improve the performance of multicast flows in wireless networks. Network coding allows routers to randomly mix packets before forwarding them. This randomness ensures that routers that hear the same transmission are unlikely to forward the same packets, which permits routers to exploit wireless opportunism with minimal coordination. By mixing packets, network coding is able to reduce the number of transmissions necessary to convey packets to multiple receivers, which can lead to a large increase in throughput for multicast traffic. We discuss the design of a multicast enabled variant of MORE, a network coding based protocol for file transfer in wireless mesh networks, and evaluate this extension, which we call MORE-M, in a 20-node indoor wireless testbed. We compare MORE-M to a wireless multicast protocol that takes an approach similar to that of wired multicast by using the ETX metric to build unicast routing trees. We also compare MORE-M to a multicast enabled variant of the ExOR routing protocol. Experiments show that MORE-M's gains increase with the number of destinations, and are 35-200% greater than that of ExOR. We then consider the problem of video streaming in a wireless local area network for applications such as video conferencing. A network coding based protocol that uses opportunistic receptions at clients is proposed. We evaluate the design in our testbed and demonstrate that the use of network coding and, in particular, the use of wireless opportunism increase the quality of the video stream.by Michael Jennings.S.M

    Security and Privacy Issues in Wireless Mesh Networks: A Survey

    Full text link
    This book chapter identifies various security threats in wireless mesh network (WMN). Keeping in mind the critical requirement of security and user privacy in WMNs, this chapter provides a comprehensive overview of various possible attacks on different layers of the communication protocol stack for WMNs and their corresponding defense mechanisms. First, it identifies the security vulnerabilities in the physical, link, network, transport, application layers. Furthermore, various possible attacks on the key management protocols, user authentication and access control protocols, and user privacy preservation protocols are presented. After enumerating various possible attacks, the chapter provides a detailed discussion on various existing security mechanisms and protocols to defend against and wherever possible prevent the possible attacks. Comparative analyses are also presented on the security schemes with regards to the cryptographic schemes used, key management strategies deployed, use of any trusted third party, computation and communication overhead involved etc. The chapter then presents a brief discussion on various trust management approaches for WMNs since trust and reputation-based schemes are increasingly becoming popular for enforcing security in wireless networks. A number of open problems in security and privacy issues for WMNs are subsequently discussed before the chapter is finally concluded.Comment: 62 pages, 12 figures, 6 tables. This chapter is an extension of the author's previous submission in arXiv submission: arXiv:1102.1226. There are some text overlaps with the previous submissio
    corecore