Home About us Contact | |||
Mesh Networks (mesh + network)
Kinds of Mesh Networks Selected AbstractsOptimizing Patching-based multicast for video-on-demand in wireless mesh networksINTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, Issue 9-10 2010Fei Xie Abstract In this work, we study the application of video-on-demand (VoD) in wireless mesh networks (WMN), a next generation edge technology to provide broadband data access in residential, business and even city-wise networks. We adopt a Patching-based multicast technique to better utilize the bandwidth resources in the mesh network. We optimize the Patching-based multicast by addressing two critical problems, namely, the Minimum Cost Multicast Tree (MCMT) problem and the Maximum Benefit Multicast Group (MBMG) problem. The MCMT problem is to find a MCMT in the network. We show that finding such a tree in the WMN can be formulated as a graph theory problem, which is to find the tree with minimum number of non-leaf nodes, and which spans all the nodes in the multicast group. We further prove the problem is NP-hard and propose a fast greedy algorithm to accommodate the real-time feature of the VoD application. We solve the MBMG problem by minimizing the communication of a Patching group in the entire network. A Markov model is proposed to capture the growth of the multicast group in the WMN. Simulation study results validate the proposed solutions of the two problems. Copyright © 2009 John Wiley & Sons, Ltd. [source] Urban mesh and ad hoc mesh networksINTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, Issue 2 2008Anders Nilsson Plymoth Mesh networking is currently gaining much attention, within both academia and industry. Mesh networking allows cheap and fast deployment of wireless services. It is regarded as a very promising solution for urban deployment scenarios as well as for temporary emergency response situations. Another related promising field is that of ad hoc wireless networking, which consists of mobile nodes that dynamically create and maintain a network without the need for any infrastructure. We propose a solution and architecture for urban mesh ad hoc networks, a network that combines mesh networking with ad hoc networks for urban environments. We present four types of ad hoc mesh and ad hoc mesh networks. The most general one consists of mesh nodes, called mesh points (MP), that act as a type of access point for user nodes (UN). The MPs have at least two interfaces: one which is used to communicate with UNs, and one which is used to maintain the mesh access network and transport data. These two interfaces can basically use any type of technology (IEEE 802.11 a/b/g, WiMax, etc.), and for capacity reasons it is generally regarded that the best solution is to let the mesh interface operate on a separate high-capacity channel or channels. An intricate part of these types of networks are routing and location services. In our solution, UN devices operate in ad hoc mode running an ad hoc routing protocol. This allows UNs that wish to communicate to connect directly in an ad hoc manner, or through an MP. An important question is therefore whether two UNs that wish to communicate should connect through the mesh or connect directly. We show that from a capacity point of view whether a UN should route its packets to the closest available MP, or through a ad hoc network, depends on the environment the network is located, the amount traffic and the type of protocols used. Since MPs need to know where to route packets within the mesh, i.e., locating the MP closest to the destination UN, each UN run a small application that registers the UN to the mesh network. In addition to the above features we have developed a new MAC that quickly queries two candidate nodes, which picks the candidate with the currently best radio conditions. This enable nodes to cope with deep dips in signal strength due to fast fading, a well-known problem in urban environments. We show that this new protocol achieves significantly lower delays. We also show that in dense urban environments performance and battery lifetime can be improved if ad hoc technologies are used. Copyright © 2007 John Wiley & Sons, Ltd. [source] Dimensioning of data networks: a flow-level perspectiveEUROPEAN TRANSACTIONS ON TELECOMMUNICATIONS, Issue 6 2009Pasi Lassila Traditional network dimensioning formulations have applied the Erlang model where the connections reserve capacity in the network. Until recently, tractable stochastic network models where the connections share the capacity in the network did not exist. The latter are becoming increasingly important as they can be applied to characterise file transfers in current data networks (e.g. IP networks). In particular, they can be utilised for dimensioning of networks with respect to the file transfer performance. To this end, we consider a model where the traffic consists of elastic flows (i.e. file transfers). Flows arrive randomly and share the network resources resulting in stochastically varying transmission rates for flows. Our contribution is to develop efficient methods for capacity planning to meet the performance requirements expressed in terms of the average transmission rate of flows on a given route, i.e. the per-flow throughput. These methods are validated using ns2 simulations. We discuss also the effects of access rate limitations and how to combine the elastic traffic requirements with those of real-time traffic. Finally, we outline how the methods can be applied in wireless mesh networks. Our results enable a simple characterisation of the order-of-magnitude of the required capacities, which can be utilised as a first step in practical network planning and dimensioning. Copyright © 2008 John Wiley & Sons, Ltd. [source] Survivable wavelength-routed optical network design using genetic algorithmsEUROPEAN TRANSACTIONS ON TELECOMMUNICATIONS, Issue 3 2008Y. S. Kavian The provision of acceptable service in the presence of failures and attacks is a major issue in the design of next generation dense wavelength division multiplexing (DWDM) networks. Survivability is provided by the establishment of spare lightpaths for each connection request to protect the working lightpaths. This paper presents a genetic algorithm (GA) solver for the routing and wavelength assignment problem with working and spare lightpaths to design survivable optical networks in the presence of a single link failure. Lightpaths are encoded into chromosomes made up of a fixed number of genes equal to the number of entries in the traffic demand matrix. Each gene represents one valid path and is thus coded as a variable length binary string. After crossover and mutation, each member of the population represents a set of valid but possibly incompatible paths and those that do not satisfy the problem constraints are discarded. The best paths are then found by use of a fitness function and these are assigned the minimum number of wavelengths according to the problem constraints. The proposed approach has been evaluated on dedicated path protection and shared path protection. Simulation results show that the GA method is efficient and able to design DWDM survivable real-world optical mesh networks. Copyright © 2007 John Wiley & Sons, Ltd. [source] Optimizing Patching-based multicast for video-on-demand in wireless mesh networksINTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, Issue 9-10 2010Fei Xie Abstract In this work, we study the application of video-on-demand (VoD) in wireless mesh networks (WMN), a next generation edge technology to provide broadband data access in residential, business and even city-wise networks. We adopt a Patching-based multicast technique to better utilize the bandwidth resources in the mesh network. We optimize the Patching-based multicast by addressing two critical problems, namely, the Minimum Cost Multicast Tree (MCMT) problem and the Maximum Benefit Multicast Group (MBMG) problem. The MCMT problem is to find a MCMT in the network. We show that finding such a tree in the WMN can be formulated as a graph theory problem, which is to find the tree with minimum number of non-leaf nodes, and which spans all the nodes in the multicast group. We further prove the problem is NP-hard and propose a fast greedy algorithm to accommodate the real-time feature of the VoD application. We solve the MBMG problem by minimizing the communication of a Patching group in the entire network. A Markov model is proposed to capture the growth of the multicast group in the WMN. Simulation study results validate the proposed solutions of the two problems. Copyright © 2009 John Wiley & Sons, Ltd. [source] Proxy-assisted P2P and multicast transmission schemes for layered-video streaming over wireless networksINTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, Issue 9-10 2010Yung-Cheng Kao Abstract This work describes the process of efficiently streaming a set of layered-videos from a remote server via proxy of the base station to multiple heterogeneous and asynchronous clients in wireless networks, such as the WiMAX network, which are devices that request different layers of the video according to their profiles. The process focuses on that the transmission cost savings for caching X layers of a video are not only from requests on X layers, but also from requests on layers that are lower than X layers. A set of proxy-assisted transmission schemes are proposed for layered-video streaming by integrating the proxy caching with reactive transmission schemes, peer-to-peer mesh networks and base station multicast capability. The optimal proxy prefix cache allocation is calculated for each transmission scheme to identify the cache layer and cache length of each video to minimize the aggregate transmission cost. Experimental results demonstrate that an adaptive proxy-assisted transmission scheme can lead to significant transmission cost savings. Copyright © 2009 John Wiley & Sons, Ltd. [source] QoS-aware fair packet scheduling in IEEE 802.16 wireless mesh networksINTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, Issue 6-7 2010Yajun Li Abstract In this paper, we address the problem of heterogeneous quality-of-service (QoS) provisioning in IEEE 802.16-based wireless mesh networks. Our objective is to provide a novel service differentiation scheme based on distributed scheduling in the IEEE 802.16-based mesh mode, thereby offering QoS guarantees. We first devise a novel scheme for the traffic class differentiation, which can be implemented at the medium access control layer. We then present a QoS-aware fair packet scheduling (QFPS) algorithm to fulfill the QoS provisioning. With QFPS, a traffic flow with urgent QoS demand is guaranteed to be given priority in wireless resource allocation over those ones with mild QoS requirements. A shorter end-to-end delay is therefore expected to be offered for the traffic flows with time-urgent requirements. Moreover, we propose a new fairness model among different traffic flows traversing the same node. All traffic flows passing through a node are served by the Deficit Round-Robin scheduling algorithm to achieve fairness within the same priority group. The experimental results of the QFPS demonstrate that various traffic flows are provided with a differentiated service that offers QoS guarantees. Copyright © 2009 John Wiley & Sons, Ltd. [source] FLSAC: A new scheme to defend against greedy behavior in wireless mesh networksINTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, Issue 10 2009Soufiene Djahel Abstract The most commonly used medium access mechanism in wireless mesh networks is based on the CSMA/CA protocol. This protocol schedules properly the access to the medium among all the competing nodes. However, in a hostile environment, such as wireless mesh networks (WMNs), selfish or greedy behaving nodes may prefer to decline the proper use of the protocol rules in order to increase their bandwidth shares at the expense of the well-behaving nodes. In this paper, we focus on such misbehavior and in particular on the adaptive greedy misbehavior of a node in the context of WMN environment. In such environment, wireless nodes compete to gain access to the medium and communicate with a mesh router (MR). In this case, a greedy node may violate the protocol rules in order to earn extra bandwidth share upon its neighbors. In order to avoid its detection, this node may adopt different techniques and switch dynamically between each of them. To counter such misbehavior, we propose to use a fuzzy logic-based detection scheme. This scheme, dubbed FLSAC, is implemented in the MR/gateway to monitor the behavior of the attached wireless nodes and report any deviation from the proper use of the protocol. The simulation results of the proposed FLSAC scheme show robustness and its ability to detect and identify quickly any adaptive cheater. Copyright © 2009 John Wiley & Sons, Ltd. [source] Urban mesh and ad hoc mesh networksINTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, Issue 2 2008Anders Nilsson Plymoth Mesh networking is currently gaining much attention, within both academia and industry. Mesh networking allows cheap and fast deployment of wireless services. It is regarded as a very promising solution for urban deployment scenarios as well as for temporary emergency response situations. Another related promising field is that of ad hoc wireless networking, which consists of mobile nodes that dynamically create and maintain a network without the need for any infrastructure. We propose a solution and architecture for urban mesh ad hoc networks, a network that combines mesh networking with ad hoc networks for urban environments. We present four types of ad hoc mesh and ad hoc mesh networks. The most general one consists of mesh nodes, called mesh points (MP), that act as a type of access point for user nodes (UN). The MPs have at least two interfaces: one which is used to communicate with UNs, and one which is used to maintain the mesh access network and transport data. These two interfaces can basically use any type of technology (IEEE 802.11 a/b/g, WiMax, etc.), and for capacity reasons it is generally regarded that the best solution is to let the mesh interface operate on a separate high-capacity channel or channels. An intricate part of these types of networks are routing and location services. In our solution, UN devices operate in ad hoc mode running an ad hoc routing protocol. This allows UNs that wish to communicate to connect directly in an ad hoc manner, or through an MP. An important question is therefore whether two UNs that wish to communicate should connect through the mesh or connect directly. We show that from a capacity point of view whether a UN should route its packets to the closest available MP, or through a ad hoc network, depends on the environment the network is located, the amount traffic and the type of protocols used. Since MPs need to know where to route packets within the mesh, i.e., locating the MP closest to the destination UN, each UN run a small application that registers the UN to the mesh network. In addition to the above features we have developed a new MAC that quickly queries two candidate nodes, which picks the candidate with the currently best radio conditions. This enable nodes to cope with deep dips in signal strength due to fast fading, a well-known problem in urban environments. We show that this new protocol achieves significantly lower delays. We also show that in dense urban environments performance and battery lifetime can be improved if ad hoc technologies are used. Copyright © 2007 John Wiley & Sons, Ltd. [source] A novel fault management approach for DWDM optical networksINTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, Issue 5 2006W. Fawaz Connection availability is considered as a critical metric when providing differentiated services in Wavelength-Division Multiplexing mesh networks. Indeed, one of the major concerns of optical network operators is related to improving the availability of services provided to their highest-class clients. Achieving this objective is possible through managing faults using the different classical protection schemes, namely the so-called dedicated and shared protection schemes. However, the majority of the work concerning protection schemes has considered the primary connections as equally important when contending for the use of the backup resources. As a main contribution in this paper, we therefore propose an improvement of the existing protection schemes through the introduction of relative priorities among the different primary connections contending for the access to the protection path. To evaluate numerically the benefits of the service differentiation feature introduced in our proposal, we first develop a mathematical model, based on which we derive explicit expressions for the average connection availabilities that result from both the classical protection schemes and the proposed priority-aware one. Through this model, we show how the availability of the highest-class clients is improved when deploying the proposed priority-aware protection scheme. Finally, with the same objective in mind, we develop a simulation study, where a given set of connection demands with predefined availability requirements is provisioned using different protection strategies. Through this study, we show that the priority-aware protection strategy satisfies service-availability requirements in a cost-effective manner compared with the classical protection schemes.Copyright © 2006 John Wiley & Sons, Ltd. [source] A tutorial on using genetic algorithms for the design of network topologyINTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, Issue 4 2006Bassam Al-Bassam The design of network topology is an important part of network design, since network topology is directly associated with network operational behavior, capacity, reliability, and cost. This paper is a tutorial paper concerned with illustrating how the optimization capabilities of genetic algorithms can be used to design suitable network topologies considering basic topology problems. Simple genetic algorithms have been developed for the topology problem of mesh networks, considering single node and single link failure tolerance. The algorithms are based on criteria of two important measures: minimizing the length of communication links; and minimizing traffic flow through these links for given traffic loads. The first measure contributes to minimizing the cost of cabling, while the second measure contributes to minimizing the cost of link capacity. The work provides a useful approach and tools to network students and professionals concerned with the topology design of backbone networks. The developed software is made available on the Internet.,Copyright © 2006 John Wiley & Sons, Ltd. [source] |