• Title/Summary/Keyword: large-scale wireless mesh networks

Search Result 8, Processing Time 0.021 seconds

Male-Silkmoth-Inspired Routing Algorithm for Large-Scale Wireless Mesh Networks

  • Nugroho, Dwi Agung;Prasetiadi, Agi;Kim, Dong-Seong
    • Journal of Communications and Networks
    • /
    • v.17 no.4
    • /
    • pp.384-393
    • /
    • 2015
  • This paper proposes an insect behavior-inspired routing algorithm for large-scale wireless mesh networks. The proposed algorithm is adapted from the behavior of an insect called Bombyx mori, a male silkmoth. Its unique behavior is its flying technique to find the source of pheromones. The algorithm consists of two steps: the shortest-path algorithm and the zigzag-path algorithm. First, the shortest-path algorithm is employed to transmit data. After half of the total hops, the zigzag-path algorithm, which is based on the movement of the male B. mori, is applied. In order to adapt the biological behavior to large-scale wireless mesh networks, we use a mesh topology for implementing the algorithm. Simulation results show that the total energy used and the decision time for routing of the proposed algorithm are improved under certain conditions.

Potential-Field-Based Anycast Routing in Large-Scale Wireless Mesh Networks : A Distributed Algorithm based on Finite Difference Method (광역 무선 메쉬 네트워크에서 포텐셜 필드 기반 애니캐스트 라우팅 : 유한 차분법 응용 분산 알고리즘)

  • Jung, Sang-Su;Kserawi, Malaz;Rhee, June-Koo Kevin
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.6
    • /
    • pp.683-687
    • /
    • 2010
  • In this paper, we propose an anycast routing scheme for large-scale wireless mesh networks, which requires only one-hop local information with no flooding overhead. We develop an analytical model for anycast mesh networks based on an electrostatic theory. A finite difference method contributes to achieving gateway load balancing with constant control overheads. We verify the performance of the proposed scheme by simulations.

Multi-layer Surveillance System based on Wireless Mesh Networks (무선 메쉬 네트워크 기반의 다층구조 감시 시스템 구축)

  • Yoon, Tae-Ho;Song, Yoo-Seoung
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.7 no.5
    • /
    • pp.209-217
    • /
    • 2012
  • In the present, Wireless Sensor Network(WSN) has been used for the purpose of the military operation with surveillance systems and for collecting useful information from the natural environment. Basically, low-power, easy deployment and low cost are the most important factors to be deployed for WSNs. Lots of researches have been studied to meet those requirements, especially on the node capacity and battery lifetime improvements. Recently, the study of wireless mesh networks applied into the surveillance systems has been proceeded as a solution of easy deployment. In this paper, we proposed large-scale intelligent multi-layer surveillance systems based on QoS assuring Wireless Mesh Networks and implemented them in the real testbed environment. The proposed system explains functions and operations for each subsystem as well as S/W and H/W architectures. Experimental results are shown for the implemented subsystems and the performance is satisfactory for the surveillance system. We can identify the possibility of the implemented multi-layer surveillance system to be used in practice.

Performance analysis of large-scale MIMO system for wireless backhaul network

  • Kim, Seokki;Baek, Seungkwon
    • ETRI Journal
    • /
    • v.40 no.5
    • /
    • pp.582-591
    • /
    • 2018
  • In this paper, we present a performance analysis of large-scale multi-input multi-output (MIMO) systems for wireless backhaul networks. We focus on fully connected N nodes in a wireless meshed and multi-hop network topology. We also consider a large number of antennas at both the receiver and transmitter. We investigate the transmission schemes to support fully connected N nodes for half-duplex and full-duplex transmission, analyze the achievable ergodic sum rate among N nodes, and propose a closed-form expression of the achievable ergodic sum rate for each scheme. Furthermore, we present numerical evaluation results and compare the resuts with closed-form expressions.

A Minimum Interference Channel Assignment Algorithm for Performance Improvement of Large-Scale Wireless Mesh Networks (대규모 무선 메쉬 네트워크의 성능 향상을 위한 최소 간섭 채널 할당 알고리즘)

  • Ryu, Min-Woo;Cha, Si-Ho;Cho, Kuk-Hyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.10B
    • /
    • pp.964-972
    • /
    • 2009
  • Wireless mesh network (WMN) is emerging a future core technology to resolve many problems derived from exist wireless networks by employing multi-interface and multi-channel. Ability to utilize multiple channels in WMNs substantially increases the effective bandwidth available to wireless network nodes. However, minimum interference channel assignment algorithms are required to use the effective bandwidth in multi-channel environments. This paper proposes a cluster-based minimum interference channel assignment (MI-CA) algorithm to improve the performance of WMN. The MI-CA algorithm is consists of Inter-Cluster and Intra-Cluster Intrchannel assignment between clusters and in the internal clusters, respectively. The Inter-Cluster channel assignment assigns a barebone channel to cluster heads and border nodes based on minimum spanning tree (MST) and the Intra-Cluster channel assignment minimizes channel interference by reassigning ortasgonal channels between cluster mespann. Our simheation results show that MI-CA can improve the performance of WMNs by minimizing channel interference.

Proactive Network Optimizer for Critical Applications (크리티컬한 응용을 위한 능동형 네트워크 최적화기)

  • Park, Bongsang;Park, Pangun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.9
    • /
    • pp.1250-1256
    • /
    • 2018
  • Recently, wireless networks are becoming an important infrastructure for the critical large-scale applications such as cyber-physical systems and next generation industrial automations. However, the fundamental performance uncertainty of wireless networks may incur the serious instability problem of the overall systems. This paper proposes the proactive network optimizer to guarantee the application demands without any real-time link monitoring information of the networks. In particularly, the proposed proactive optimizer is the cross-layer approach to jointly optimize the routing path and traffic distribution in order to guarantee the performance demand within a maximum k number of link faults. Through the simulations, the proposed proactive network optimizer provides better robustness than the traditional existing reactive networks. Furthermore, the proactive network does not expose to the major weakness of the reactive networks such as the performance degradation due to the erroneous link monitoring information and the network reconfiguration cost.

INTERFERENCE CHARACTERISTICS OF CONSTRUCTION ENVIRONMENT FOR WSN APPLICATIONS

  • Sun-Chan Bae;Won-Sik Jang;Sang-Dae Park;Won-Suk Jang
    • International conference on construction engineering and project management
    • /
    • 2013.01a
    • /
    • pp.592-595
    • /
    • 2013
  • Advent of Wireless Sensor Networks (WSN) has provided potentials to a variety of construction applications. It is well appreciated that WSNs have advantages over traditional wired system, such as ease of installation and maintenance with increased cost savings and efficiencies. However, the obstruction of wireless signal from physical objects in the heterogeneous construction environment often brings challenges to WSN measurement system. This paper analyzed the obstruction characteristic of construction environment where construction materials, equipment, and built structures obstruct the wireless signal yielding negative effect of measurement system. By adopting evaluation criteria, such as packet reception rate, field experiments have been implemented to quantitatively identify the interference of wireless signal from penetration, reflection, and network traffic under the construction environment. The results show that reliable performance of wireless sensor in construction environment depends on the optimal separation distance between a receiver and a transmitter, obstruction types, obstruction thickness, and transmission interval. In addition, the methodology and experimental results of this paper could be used in the practical design of network topology when hundreds of sensor nodes form a mesh network in the large scale construction applications.

  • PDF

Identity-Based Secure Many-to-Many Multicast in Wireless Mesh Networks (무선 메쉬 네트워크에서의 아이디 기반 프록시 암호화를 이용한 안전한 다대다 멀티캐스트 기법)

  • Hur, Jun-Beom;Yoon, Hyun-Soo
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.1
    • /
    • pp.72-83
    • /
    • 2010
  • Group communication in a wireless mesh network is complicated due to dynamic intermediate mesh points, access control for communications between different administrative domains, and the absence of a centralized network controller. Especially, many-to-many multicasting in a dynamic mesh network can be modeled by a decentralized framework where several subgroup managers control their members independently and coordinate the inter-subgroup communication. In this study, we propose a topology-matching decentralized group key management scheme that allows service providers to update and deliver their group keys to valid members even if the members are located in other network domains. The group keys of multicast services are delivered in a distributed manner using the identity-based encryption scheme. Identity-based encryption facilitates the dynamic changes of the intermediate relaying nodes as well as the group members efficiently. The analysis result indicates that the proposed scheme has the advantages of low rekeying cost and storage overhead for a member and a data relaying node in many-to-many multicast environment. The proposed scheme is best suited to the settings of a large-scale dynamic mesh network where there is no central network controller and lots of service providers control the access to their group communications independently.