The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The wireless backbone of the WMN poses several constraints on the amount of traffic that can be transferred through the network. In this paper we present an investigation of the WMNs topology effect on the capacity of these networks. Three different topology types were considered: square, triangle, and hexagon. These topology configurations can be used as a starting point in the initial design of...
We present and compare architectures for using a fleet of high-speed Internet subscriber residential gateways to build a hotspot network for offload of cellular data-traffic. We address the central challenges of meeting the security and ease of use expectations of cellular telephony in implementation on popular smartphones and gateways. Attention is given to security shortcomings in the client software...
Is M2M hype or the future of our information society? What does it take to turn the M2M vision into reality? In this article we discuss the business motivations and technology challenges for machine-to-machine communications. We highlight key M2M application requirements and major technology gaps. We analyze the future directions of air interface technology improvements and network architectures evolution...
Fiber-wireless (FiWi) access mesh networks have been proposed as flexible and cost-effective solutions for future access networks. However, for FiWi access mesh networks to provide end-to-end QoS guarantees to its customers, efficient QoS routing schemes and scheduling policies become necessary. Here we provide a model, using repeated game theory, that creates ground for scheduling policies to be...
Rogue wireless access points (RWAPs) bypass physical endpoint security of local area networks and present significant security threats by creating network attack vectors behind firewalls, exposing confidential information, and allowing unauthorized utilization of network resources. A family of more promising methods detects RWAPs indirectly by identifying unauthorized wireless hosts through using...
In wireless multihop networks, route selection plays an important role in network performance in terms of throughput capacity, as well as, energy efficiency. In general, the route selection strategy should distribute the traffic throughout the network, in order to avoid congestion. This strategy also has the side-effect of distributing the energy consumption among all nodes, so that the energy starvation...
Wireless Mesh Network is mainly used to obtain Internet access, so most of the traffic converges to gateways. Due to the nature characteristic of WMN traffic model, gateways unavoidably become the bottleneck of the whole network. An anycast-based gateway selection model was proposed in this paper to solve the gateway selection problem. In this model, all the gateway nodes were abstracted as an anycast...
Wireless mesh networks are dynamically self-organized and self-configured, with the nodes in the network automatically establishing and maintaining mesh connectivity among them. Wireless mesh networks consist of three types of nodes: clients, routers and gateways. Wireless Mesh Network planning consists of determining the amount of routers needed to meet the demands for Internet access. It is a complicated...
This paper proposes a novel distributed Pub/Sub (publish/subscribe) system for real-time video surveillance using interconnected wireless mesh networks (WMNs) and wireless sensor networks (WSNs). The proposed system enables the users to subscribe events of interests and deliver the real-time captured video content of event to the users. In this paper, we first introduce our strategy of interconnecting...
Clustering is an effective approach to hierarchically organizing network topology and to prolong the lifetime of a wireless sensor network. Current clustering protocols usually utilize two techniques: selecting cluster heads with more residual energy and rotating cluster heads periodically to distribute the energy consumption among nodes in each cluster. Most of the researches in this field has focused...
In this paper, we study the fairness problem for downlink traffic in multi-hop wireless backhaul networks with selfish nodes, including Transit Access Points (TAPs) and the gateway. Unlike the transmission of uplink traffic in which transit packets are dropped at intermediate TAPs, almost all downlink link traffic is dropped at the gateway. Therefore, we design an incentive-based mechanism where the...
When supporting both voice and TCP in a wireless multihop network, there are two conflicting goals: to protect the VoIP traffic, and to completely utilize the remaining capacity for TCP. We investigate the interaction between these two popular categories of traffic and find that conventional solution approaches, such as enhanced TCP variants, priority queues, bandwidth limitation, and traffic shaping...
Wireless mesh networks (WMNs) have emerged as low-cost alternative for broadband access networks in metropolitan area. In this paper, we revisit power control as a network layer problem in design of WMNs. Specifically, we show that increasing power levels of nodes in WMNs actually results into throughput improvements in node-to-gateway traffic pattern. It is proven that WMNs can achieve per node throughput...
A single-channel wireless mesh backbone may suffer from capacity limitations since all the wireless routers share the same channel. A multi-channel broadband wireless mesh backbone may have different capacity. This paper addresses the problem of channel assignment with differentiated services to support the quality-of-service (QoS) in the wireless mesh backbone. We propose a novel, simple and yet...
Wireless mesh networks (WMN) provide network access for mobile users. Therefore, most traffic flows in WMNs are to and from the wired networks. Some mesh nodes, called Gateways connect directly to the wired networks, through which mesh clients can access the resources that reside on the wired networks. However, there are usually only a few of Gateways in a WMN. The packet processing ability of every...
In a wireless mesh network (WMN), mesh clients (MCs) access the Internet through the wireless backbone formed by the Internet Gateways (IGWs) and Mesh Routers (MRs). An IGW as the traffic center may easily become the congestion center in a WMN. The load balancing between IGWs will reduce the traffic congestion thereby improving the network performance and providing a better quality of service (QoS)...
We propose QoS-aware mesh deterministic access opportunities (MDAOPs) assignment algorithm for the IEEE 802.11s wireless mesh networks (WMNs). The WMNs can benefit from the mesh deterministic access (MDA) in terms of guaranteeing the QoS of the delay bounded traffic, mitigating the exposed node problem, and providing the fairness among best effort traffic flows. However, it is not considered that...
This demo aims at (i) validating the design choices we have made in conceiving and deploying the WING testbed, and (ii) showing the capability of out software toolkit to properly support heterogeneous multimedia applications. Additionally, the mesh networking toolkit's fault management features is demonstrated. We hope that our wireless mesh networking toolkit is considered by both researchers and...
The term Evil Twin refers to a type of rogue wireless access point that appears to be legitimate, but is set up for the purpose of intercepting traffic between mobile users and the Internet. This paper generalizes a known technique into a model we call ldquoend-to-middle security,rdquo which can be adopted by mobile users to protect against Evil Twin attacks. This model involves using a virtual gateway...
Recently, wireless mesh networks (WMNs) have attracted attention as a way to provide alternative Internet connectivity to rural areas or communities. In WMNs, wireless access points communicate with each other wirelessly, forming a true wireless mesh based access network of mesh relay nodes (MRNs). A major problem is, however, scalability of WMNs as well as MAC and PHY layer overhead for packet transmission...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.