• Title/Summary/Keyword: WMN

Search Result 98, Processing Time 0.036 seconds

Channel Allocation for Maximizing Available Resource In Multi Interface/Multi Channel based Wireless Mesh Network (가용 자원 활용 극대화를 위한 다중 인터페이스/다중 채널 기반 무선 메쉬 네트워크에서 채널 할당 기법)

  • Lee, Jung-Won;Yoo, Myung-Sik
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2010.05a
    • /
    • pp.202-206
    • /
    • 2010
  • 무선 메쉬 네트워크(Wireless Mesh Network, WMN)는 유비쿼터스 환경 및 무선 브로드 밴드 액세스를 제공하기 위한 차세대 핵심기술로 떠오르고 있다. 다양한 멀티미디어 서비스가 존재하는 유비쿼터스 환경에서 실시간 서비스 제공을 위해서는 네트워크 용량 증대가 요구되며, 이를 위하여 WMN에서 네트워크 용량을 증대시키기 위한 다중 인터페이스 활용 기술이 중요한 이슈로 대두되고 있다. 하지만 WMN에서 주로 사용하는 인터페이스 기술인 IEEE 802.11 표준에서는 IEEE 802.11b/g 또는 IEEE 802.11a와 같은 스펙에 따라 간섭 없이 사용할 수 있는 채널은 3개 또는 12개로 한정되어 있기 때문에 다중 인터페이스 활용을 통해 증대된 가용 자원 효율성을 극대화하기 위해서 효율적인 채널 할당 기법의 연구가 요구되며, 이에 따라 본 논문에서는 채널 그룹 설정을 통하여 간섭 발생을 최소화하며 채널스캐닝 과정을 수행하지 않고 채널 변경을 진행함으로써 채널 스캐닝 과정으로 발생하는 전송 지연을 최소화하여 네트워크 성능을 향상시킬 수 있는 채널 할당 기법을 제안한다.

  • PDF

Design of Routing Protocols for WMN: Factors and Case Study

  • Gao, Hui;Lee, Hyung-ok;Kwag, Young-wan;Nam, Ji-seung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.11a
    • /
    • pp.799-801
    • /
    • 2012
  • Wireless Mesh Network (WMN) can be defined as a communication network consisting of radio nodes organized in a mesh topology, which has been attracting much attention due to its promising technology. This paper addressed the factors on how to design routing protocols for WMN. 2 examples of designing routing metric and routing algorithm are given for case study. With consideration of those factors such as wireless broadcast advantage (WBA)/channel assignment (CA) or intra-flow/inter-flow interference high throughput is achieved.

DSDV Routing Technique Improved by Use of Residual Bandwidth and the number of Hop in Bypass Path on Wireless Mesh Network(WMN) (Wireless Mesh Network(WMN)에서 우회경로의 Hop 수와 잉여대역폭을 이용하여 개선한 DSDV Routing 기법)

  • Lee, Sang Gu;Kwon, Yong Ho;Rhee, Byung Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.11a
    • /
    • pp.511-513
    • /
    • 2011
  • 기존의 Wireless Mesh Network(WMN)에서 제안된 EFMP DSDV 기법은 우회 경로 이후의 잉여 대역폭이 좋지 않을 경우 우회하지 않았을 때보다 성능이 더 좋지 않은 경우가 발생한다. 이 같은 단점을 보완하기 위하여 본 논문에서는 우회 경로 다음 홉 간의 경로 정보인 Hop수와 잉여대역폭에 대한 정보를 획득하여 수식으로 유도된 Bypass값을 통해 각 우회경로의 비교를 제안한다.

Distance-Based Channel Assignment with Channel Grouping for Multi-Channel Wireless Mesh Networks (멀티채널 무선 메쉬 네트워크에서의 채널 그룹을 이용한 거리 기반 채널 할당)

  • Kim, Sok-Hyong;Suh, Young-Joo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.12B
    • /
    • pp.1050-1057
    • /
    • 2008
  • Wireless Mesh Networks (WMNs) have recently become a hot issue to support high link capacity in wireless access networks. The IEEE 802. I 1 standard which is mainly used for the network interface technology in WMNs supports up to 3 or 12 multiple channels according to the IEEE 802.11 specification. However, two important problems must be addressed when we design a channel assigmnent algorithm: channel dependency problem and channel scanning delay. The former occurs when the dynamic channel switching of an interface leads to the channel switching of other interfaces to maintain node connectivity. The latter happens per channel switching of the interface, and affects the network performance. Therefore, in this paper, we propose the Distance-Based Channel Assigmnent (DB-CA) scheme for multi-channel WMNs to solve such problems. In DB-CA, nodes just perform channel switching without channel scanning to communicate with neighboring nodes that operate on different channels. Furthermore, DB-CA minimizes the interference of channels being used by nodes near the gateway in WMNs. Our simulation results show that DB-CA achieves improved performance in WMNs.

Resilient Packet Transmission (RPT) for the Buffer Based Routing (BBR) Protocol

  • Rathee, Geetanjali;Rakesh, Nitin
    • Journal of Information Processing Systems
    • /
    • v.12 no.1
    • /
    • pp.57-72
    • /
    • 2016
  • To provide effective communication in the wireless mesh network (WMN), several algorithms have been proposed. Since the possibilities of numerous failures always exist during communication, resiliency has been proven to be an important aspect for WMN to recover from these failures. In general, resiliency is the diligence of the reliability and availability in network. Several types of resiliency based routing algorithms have been proposed (i.e., Resilient Multicast, ROMER, etc.). Resilient Multicast establishes a two-node disjoint path and ROMER uses a credit-based approach to provide resiliency in the network. However, these proposed approaches have some disadvantages in terms of network throughput and network congestion. Previously, the buffer based routing (BBR) approach has been proposed to overcome these disadvantages. We proved earlier that BBR is more efficient in regards to w.r.t throughput, network performance, and reliability. In this paper, we consider the node/link failure issues and analogous performance of BBR. For these items we have proposed a resilient packet transmission (RPT) algorithm as a remedy for BBR during these types of failures. We also share the comparative performance analysis of previous approaches as compared to our proposed approach. Network throughput, network congestion, and resiliency against node/link failure are particular performance metrics that are examined over different sized WMNs.

Trust Based Authentication and Key Establishment for Secure Routing in WMN

  • Akilarasu, G.;Shalinie, S. Mercy
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.12
    • /
    • pp.4661-4676
    • /
    • 2014
  • In Wireless Mesh Networks (WMN), an authentication technique can be compromised due to the distributed network architecture, the broadcast nature of the wireless medium and dynamic network topology. Several vulnerabilities exist in different protocols for WMNs. Hence, in this paper, we propose trust based authentication and key establishment for secure routing in WMN. Initially, a trust model is designed based on Ant Colony Optimization (ACO) to exchange the trust information among the nodes. The routing table is utilized to select the destination nodes, for which the link information is updated and the route verification is performed. Based on the trust model, mutual authentication is applied. When a node moves from one operator to another for accessing the router, inter-authentication will be performed. When a node moves within the operator for accessing the router, then intra-authentication will be performed. During authentication, keys are established using identity based cryptography technique. By simulation results, we show that the proposed technique enhances the packet delivery ratio and resilience with reduced drop and overhead.

Trust based Secure Reliable Route Discovery in Wireless Mesh Networks

  • Navmani, TM;Yogesh, P
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.7
    • /
    • pp.3386-3411
    • /
    • 2019
  • Secured and reliable routing is a crucial factor for improving the performance of Wireless Mesh Networks (WMN) since these networks are susceptible to many types of attacks. The existing assumption about the internal nodes in wireless mesh networks is that they cooperate well during the forwarding of packets all the time. However, it is not always true due to the presence of malicious and mistrustful nodes. Hence, it is essential to establish a secure, reliable and stable route between a source node and a destination node in WMN. In this paper, a trust based secure routing algorithm is proposed for enhancing security and reliability of WMN, which contains cross layer and subject logic based reliable reputation scheme with security tag model for providing effective secured routing. This model uses only the trusted nodes with the forwarding reliability of data transmission and it isolates the malicious nodes from the providing path. Moreover, every node in this model is assigned with a security tag that is used for efficient authentication. Thus, by combining authentication, trust and subject logic, the proposed approach is capable of choosing the trusted nodes effectively to participate in forwarding the packets of trustful peer nodes successfully. The simulation results obtained from this work show that the proposed routing protocol provides optimal network performance in terms of security and packet delivery ratio.

A Cluster-Based Channel Assignment Algorithm for IEEE 802.11b/g Wireless Mesh Networks (IEEE 802.11b/g 무선 메쉬 네트워크를 위한 클러스터 기반 채널 할당 알고리즘)

  • Cha, Si-Ho;Ryu, Min-Woo;Cho, Kuk-Hyun;Jo, Min-Ho
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.4
    • /
    • pp.87-93
    • /
    • 2009
  • Wireless mesh networks (WMNs) are emerging technologies that provide ubiquitous environments and wireless broadband access. The aggregate capacity of WMNs can be improved by minimizing the effect of channel interference. The IEEE 802.11b/g standard which is mainly used for the network interface technology in WMNs provides 3 multiple channels. We must consider the channel scanning delay and the channel dependency problem to effectively assign channels in like these multi-channel WMNs. This paper proposes a cluster-based channel assignment (CB-CA) algorithm for multi-channel WMNs to solve such problems. The CB-CA does not perform the channel scanning and the channel switching through assigning co-channel to the inter-cluster head (CH) links. In the CB-CA, the communication between the CH and cluster member (CM) nodes uses a channel has no effect on channels being used by the inter-CH links. Therefore, the CB-CA can minimize the interference within multi-channel environments. Our simulation results show that CB-CA can improve the performance of WMNs.

Empirical Evaluation of Wireless Mesh Networks for Construction IT in Tunnel Environments (건설-IT융합 기술을 위한 터널 환경에서 무선 메쉬 네트워크를 이용한 실험적 성능 검증)

  • Yang, Chang-Mo;Lee, Seung-Beom;Choi, Soo-Hwan;Eom, Doo-Seop
    • Journal of Information Technology Services
    • /
    • v.10 no.2
    • /
    • pp.271-279
    • /
    • 2011
  • This paper draws performance results through comparing WMNs' methods when the WMNs are used in tunnel construction sites. There are many advantages of WMNs : lower cost, easy to network maintenance, robustness and reliability within RF-ranges. As a result, using the WMNs would be suitable to employ as a network infrastructure for the construction sites. This paper evaluates the performance of WMNs which we have installed in a tunnel construction. Through the performance results, we conclude the performance of data throughputs gets lower when we perform the network in tunnel environments. We make attempts WMNs' two major methods which are SISC(Single Interface with Single Channel) and MIMC(Multi Interface with Multi Channel) to figure out which method will be better for the construction sites. Through the experiments, the WMN based on the MIMC method was comparatively suitable in network performance aspect for the tunnel Sites.

The Optimal Link Scheduling in Half-Duplex Wireless Mesh Networks Using the Constraint Programming (제약식 프로그래밍을 이용한 일방향 전송 무선 메쉬 네트워크에서의 최적 링크 스케쥴링)

  • Kim, Hak-Jin
    • Journal of Information Technology Applications and Management
    • /
    • v.23 no.2
    • /
    • pp.61-80
    • /
    • 2016
  • The wireless mesh network (WMN) is a next-generation technology for data networking that has the advantage in cost and the flexibility in its construction because of not requiring the infra-structure such as the ethernet. This paper focuses on the optimal link scheduling problem under the wireless mesh network to effectuate real-time streaming by using the constraint programming. In particular, Under the limitation of half-duplex transmission in wireless nodes, this paper proposes a solution method to minimize the makespan in scheduling packet transmission from wireless nodes to the gateway in a WMN with no packet transmission conflicts due to the half-duplex transmission. It discusses the conflicts in packet transmission and deduces the condition of feasible schedules, which defines the model for the constraint programming. Finally it comparatively shows and discusses the results using two constraint programming solvers, Gecode and the IBM ILOG CP solver.