Academic literature on the topic 'Wireless mesh networks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Wireless mesh networks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Wireless mesh networks"
Wang, Xinheng. "Wireless mesh networks." Journal of Telemedicine and Telecare 14, no. 8 (December 2008): 401–3. http://dx.doi.org/10.1258/jtt.2008.008003.
Full textMalik, Ritu, Meenakshi Mittal, Isha Batra, and Chander Kiran. "Wireless Mesh Networks (WMN)." International Journal of Computer Applications 1, no. 23 (February 25, 2010): 68–76. http://dx.doi.org/10.5120/533-697.
Full textGlass, Steve, Marius Portmann, and Vallipuram Muthukkumarasamy. "Securing Wireless Mesh Networks." IEEE Internet Computing 12, no. 4 (July 2008): 30–36. http://dx.doi.org/10.1109/mic.2008.85.
Full textQiu, Lili, Paramvir Bahl, Ananth Rao, and Lidong Zhou. "Troubleshooting wireless mesh networks." ACM SIGCOMM Computer Communication Review 36, no. 5 (October 10, 2006): 17–28. http://dx.doi.org/10.1145/1163593.1163597.
Full textSalem, N. B., and J. P. Hubaux. "Securing wireless mesh networks." IEEE Wireless Communications 13, no. 2 (April 2006): 50–55. http://dx.doi.org/10.1109/mwc.2006.1632480.
Full textWicaksono, Arief Ikhwan, Rama Sahtyawan, and Agung Priyanto. "Komparasi Analisa Kinerja Mesh Interface Dan Bridge Interface Pada Wireless WDS Mesh Network." JISKA (Jurnal Informatika Sunan Kalijaga) 5, no. 1 (May 19, 2020): 36. http://dx.doi.org/10.14421/jiska.2020.51-05.
Full textTian, Qi Ming, and Hao Yu Meng. "Analysis and Comparison of Routing Metrics for Multi-Interface Wireless Mesh Networks." Advanced Materials Research 268-270 (July 2011): 1856–61. http://dx.doi.org/10.4028/www.scientific.net/amr.268-270.1856.
Full textAlabady, Salah A., and M. F. M. Salleh. "Overview of Wireless Mesh Networks." Journal of Communications 8, no. 9 (2013): 586–99. http://dx.doi.org/10.12720/jcm.8.9.586-599.
Full textHassan, Mahbub, Sajal Das, Prasant Mohapatra, and Charles Perkins. "Wireless Mesh Networks [Guest Editorial]." IEEE Communications Magazine 45, no. 11 (November 2007): 62–63. http://dx.doi.org/10.1109/mcom.2007.4378322.
Full textKim, Kyu-Han, and Kang G. Shin. "Self-Reconfigurable Wireless Mesh Networks." IEEE/ACM Transactions on Networking 19, no. 2 (April 2011): 393–404. http://dx.doi.org/10.1109/tnet.2010.2096431.
Full textDissertations / Theses on the topic "Wireless mesh networks"
Abdalla, Taha. "Scalable Wireless Mesh Networks." University of the Western Cape, 2016. http://hdl.handle.net/11394/5868.
Full textWireless Mesh Networks (WMNs) are wireless multi-hop networks built on wireless nodes that operate in an Independent Basic Set Identifier (IBSS) mode of the IEEE 208.11 wireless standard. IBSS is well known as an ad hoc mode which is found to build ad hoc wireless networks with the aid of routing protocols crafted to work in this mode. Ad hoc wireless mesh networks are always described as self-healing, self-configuring, easy to build, etc. However, these features do come at a cost because a WMN suffers performance degradation and scalability issues, which mainly come from the underlying IBSS mode that is used to form the physical network. Furthermore this is exacerbated by routing protocols in the upper layers which are intended to form a flat network architecture. Partitioning or clustering the flat network into smaller units has been proven to be a viable mechanism to counter the scalability problem in the communication network. The wired network for instance, presents a segmented, hierarchical architecture, where end user devices are organized in virtual local area networks (VLANs) using Ethernet switches and then Routers aggregate multiple VLANs. This thesis develops and evaluates a heterogeneous, clustering architecture to enhance WMN scalability and management. In the proposed architecture, the clustering is separated from the routing, where the clustering is done at the physical layer. At the routing level, each cluster is configured as a WMN using layer 2 routing for intra-cluster routing, and layer 3 routing for inter-domain routing between clusters. Prototypes for the proposed architecture have been built in a laboratory testbed. The proposed architecture reported better scalability and performance results compared to the traditional flat architecture.
GHUMMAN, SHAKEEL AHMAD. "Security in Wireless Mesh Network." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-4175.
Full textThe Master’s thesis report describes the wireless mesh networks functions,
characteristics, network management and finally different protocols with security issues and applications. Wireless Networks (WMNs) are replacing wireless Infrastructure networks in many areas because of their lower and higher flexibility. The wireless mesh networks (WMNs) provides network access for both mesh and conventional clients through mesh routers and mesh clients. Communication across the network is formed via the bridge functions. Mesh router also provides the minimal mobility and form the backbone of WMNs.
Wireless mesh network has resolved the limitation of ad hoc networks which is ultimately improves the performance of Ad hoc networks. Security is a very important issue which can be resolve through proper management of network. The improvment of 802.11i security has greatly improved the network perfomance and increase the encryption and integrity security capabilities. The key points which are being addressed in this report are security issues and threats and their counter measures. Attacks which can come on diffent layers are being discussed in this survey. Security of wireless mesh network is still under consideration. Wireless mesh network are attracting more attention due to its enhanced features.
Wireless mesh network topology technology is being discussed in this report. Then network management of WMNs is explained and in the concluding chapters security issues are discussed. Threats, attacks and challenges of WMNs are discussed in this survey.
Herms, André. "Dienstgüte in Wireless Mesh Networks." Göttingen Sierke, 2009. http://d-nb.info/997632143/04.
Full textMatos, Ricardo Jorge Magalhães de. "Context-based wireless mesh networks." Doctoral thesis, Universidade de Aveiro, 2013. http://hdl.handle.net/10773/12450.
Full textIn the modern society, new devices, applications and technologies, with sophisticated capabilities, are converging in the same network infrastructure. Users are also increasingly demanding in personal preferences and expectations, desiring Internet connectivity anytime and everywhere. These aspects have triggered many research efforts, since the current Internet is reaching a breaking point trying to provide enough flexibility for users and profits for operators, while dealing with the complex requirements raised by the recent evolution. Fully aligned with the future Internet research, many solutions have been proposed to enhance the current Internet-based architectures and protocols, in order to become context-aware, that is, to be dynamically adapted to the change of the information characterizing any network entity. In this sense, the presented Thesis proposes a new architecture that allows to create several networks with different characteristics according to their context, on the top of a single Wireless Mesh Network (WMN), which infrastructure and protocols are very flexible and self-adaptable. More specifically, this Thesis models the context of users, which can span from their security, cost and mobility preferences, devices’ capabilities or services’ quality requirements, in order to turn a WMN into a set of logical networks. Each logical network is configured to meet a set of user context needs (for instance, support of high mobility and low security). To implement this user-centric architecture, this Thesis uses the network virtualization, which has often been advocated as a mean to deploy independent network architectures and services towards the future Internet, while allowing a dynamic resource management. This way, network virtualization can allow a flexible and programmable configuration of a WMN, in order to be shared by multiple logical networks (or virtual networks - VNs). Moreover, the high level of isolation introduced by network virtualization can be used to differentiate the protocols and mechanisms of each context-aware VN. This architecture raises several challenges to control and manage the VNs on-demand, in response to user and WMN dynamics. In this context, we target the mechanisms to: (i) discover and select the VN to assign to an user; (ii) create, adapt and remove the VN topologies and routes. We also explore how the rate of variation of the user context requirements can be considered to improve the performance and reduce the complexity of the VN control and management. Finally, due to the scalability limitations of centralized control solutions, we propose a mechanism to distribute the control functionalities along the architectural entities, which can cooperate to control and manage the VNs in a distributed way.
Na sociedade actual, novos dispositivos, aplicações e tecnologias, com capacidades sofisticadas, estão a convergir na mesma infra-estrutura de rede. Os utilizadores são também cada vez mais exigentes nas suas preferências e expectativas pessoais, desejando conetividade `a Internet em qualquer hora e lugar. Estes aspectos têm desencadeado muitos esforços de investigação, dado que a Internet atual está a atingir um ponto de rutura ao tentar promover flexibilidade para os utilizadores e lucros para os operadores, enquanto lida com as exigências complexas associadas `a recente evolução. Em sintonia com a linha de investigação para a Internet do futuro, muitas soluções têm sido propostas para melhorar as arquiteturas e protocolos da Internet atual, de forma a torná-los sensíveis ao contexto, isto é, adaptá-los dinamicamente `a alteração da informação que caracteriza qualquer entidade de rede. Neste sentido, a presente Tese propõe uma nova arquitetura que permite criar várias redes com diferentes características de acordo com o contexto das mesmas, sobre uma única rede em malha sem fios (WMN), cuja infra-estructura e protocolos são muito flexíveis e auto-adaptáveis. Mais especificamente, esta Tese modela o contexto dos utilizadores, que pode abranger as suas preferências de segurança, custo e mobilidade, capacidades dos seus dispositivos ou requisitos de qualidade dos seus serviços, de forma a transformar uma WMN num conjunto de redes lógicas. Cada rede lógica ´e configurada para satisfazer um conjunto de necessidades de contexto do utilizador (como exemplo, suporte de mobilidade elevada e de baixa seguran¸ca). Para implementar esta arquitetura centrada no utilizador, esta Tese utiliza a virtualização de redes, que tem muitas vezes sido defendida como um meio para implementar arquiteturas e serviços de rede de uma forma independente, enquanto permite uma gestão dinâmica dos recursos. Desta forma, a virtualização de redes pode permitir uma configuração flexível e programável de uma WMN, a fim de ser partilhada por várias redes lógicas (ou redes virtuais - VNs). Além disso, o grau de isolamento introduzido pela virtualização de redes pode ser utilizado para diferenciar os protocolos e mecanismos de cada VN baseada em contexto. Esta arquitetura levanta vários desafios para controlar e gerir as VNs em tempo real, e em resposta `a dinâmica dos utilizadores e da WMN. Neste contexto, abordamos os mecanismos para: (i) descobrir e selecionar a VN a atribuir a um utilizador; (ii) criar, adaptar e remover as topologias e rotas das VNs. Também exploramos a possibilidade de considerar a taxa de variação dos requisitos de contexto dos utilizadores de forma a melhorar o desempenho e reduzir a complexidade do controlo e gestão das VNs. Finalmente, devido ´as limitações de escalabilidade das soluções de controlo centralizadas, propomos um mecanismo para distribuir as funcionalidades de controlo ao longo das entidades da arquitectura, que podem cooperar para controlar e gerir as VNs de uma forma distribuída.
Kongara, Harish Agrawal Prathima. "Performance optimization of wireless mesh networks." Auburn, Ala, 2009. http://hdl.handle.net/10415/1620.
Full textQi, Bing Biaz Saad. "Routing metrics for multi-hop wireless MESH networks." Auburn, Ala., 2009. http://hdl.handle.net/10415/1705.
Full textDarehshoorzadeh, Amir. "Opportunistic routing in wireless mesh networks." Doctoral thesis, Universitat Politècnica de Catalunya, 2012. http://hdl.handle.net/10803/83765.
Full textJun, Jangeun. "Capacity Estimation of Wireless Mesh Networks." NCSU, 2002. http://www.lib.ncsu.edu/theses/available/etd-11062002-163505/.
Full textShah, Kartik Beard Cory. "Throughput enhancement using wireless mesh networks." Diss., UMK access, 2008.
Find full text"A thesis in electrical engineering." Typescript. Advisor: Cory C. Beard. Vita. Title from "catalog record" of the print edition Description based on contents viewed Sept. 12, 2008. Includes bibliographical references (leaf 42). Online version of the print edition.
Subramanian, Jayashree Ph D. Massachusetts Institute of Technology. "Efficient flooding for wireless mesh networks." Thesis, Massachusetts Institute of Technology, 2012. http://hdl.handle.net/1721.1/71490.
Full textCataloged from PDF version of thesis.
Includes bibliographical references (p. 113-116).
Flooding in wireless mesh networks involves distributing some data from one node to rest of the nodes in the network. This dissertation proposes UFlood, a flooding protocol for wireless mesh networks that targets large file transfers, such as software updates, where achieving high throughput (minimizing the time to complete the flood to all nodes) and low airtime (lower the time each node spends in transmitting packets, and thus lower the impact on other wireless traffic) are both important. The central challenge in good flooding performance is the choice of senders for each transmission opportunity. At each time during a flood, some parts of the network will have received more data than others. The set of best sending nodes lies along the boundaries between these regions, and evolves with time in ways that are difficult to predict. UFlood's key new idea is a distributed heuristic to dynamically choose the senders likely to lead to all nodes receiving the flooded data in the least time. The mechanism takes into account which data nearby receivers already have as well as inter-node channel quality. The mechanism includes a novel bit-rate selection algorithm that trades off the speed of high bit-rates against the larger number of nodes likely to receive low bit-rates. Unusually, UFlood uses both random network coding to increase the usefulness of each transmission and detailed feedback about what data each receiver already has; the feedback is critical in deciding which node's coded transmission will have the most benefit to receivers. The required feedback is potentially voluminous, but UFlood includes novel techniques to reduce its cost. The dissertation concludes that careful choice of senders allows UFlood to achieve 150% higher throughput than MORE, a known high-throughput flooding protocol, using 65% less time transmitting. UFlood uses 54% lower airtime than MNP, an existing flooding protocol to minimize airtime, and achieves 300% higher throughput.
by Jayashree Subramanian.
Ph.D.
Books on the topic "Wireless mesh networks"
Wireless mesh networks. Boca Raton, FL: Auerbach/ Taylor & Francis, 2004.
Find full textHossain, Ekram, and Kin Leung, eds. Wireless Mesh Networks. Boston, MA: Springer US, 2007. http://dx.doi.org/10.1007/978-0-387-68839-8.
Full textX, Wang, ed. Wireless mesh networks. Hoboken, NJ: J. Wiley & Sons, 2009.
Find full textWireless mesh networking. New York: McGraw-Hill, 2008.
Find full textMisra, Sudip. Guide to wireless mesh networks. London: Springer, 2009.
Find full textZhang, Yan. Security in wireless mesh networks. Boca Raton, FL: Auerbach Publications, 2007.
Find full textMisra, Sudip, Subhas Chandra Misra, and Isaac Woungang, eds. Guide to Wireless Mesh Networks. London: Springer London, 2009. http://dx.doi.org/10.1007/978-1-84800-909-7.
Full textHossain, Ekram, and Kin K. Leung. Wireless mesh networks: Architectures and protocols. New York: Springer, 2011.
Find full textPathak, Parth H. Designing for Network and Service Continuity in Wireless Mesh Networks. New York, NY: Springer New York, 2013.
Find full textPathak, Parth H., and Rudra Dutta. Designing for Network and Service Continuity in Wireless Mesh Networks. New York, NY: Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-4627-9.
Full textBook chapters on the topic "Wireless mesh networks"
Ishmael, Johnathan, and Nicholas Race. "Wireless Mesh Networks." In Middleware for Network Eccentric and Mobile Applications, 149–66. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-540-89707-1_7.
Full textKumar, Sumit, Garimella Rama Murthy, and Naveen Chilamkurti. "Cooperative Mesh Networks." In Next-Generation Wireless Technologies, 7–13. London: Springer London, 2013. http://dx.doi.org/10.1007/978-1-4471-5164-7_2.
Full textHiertz, Guido, Erik Weiss, and Bernhard H. Walke. "Mesh Networks - Basics." In IEEE 802 Wireless Systems, 53–76. Chichester, UK: John Wiley & Sons, Ltd, 2006. http://dx.doi.org/10.1002/9780470058800.ch4.
Full textSingh, Madhusudan. "Wireless Mesh Networks Architecture." In Node-to-Node Approaching in Wireless Mesh Connectivity, 11–14. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-0674-7_2.
Full textLee, Chung-wei. "Security in Wireless Mesh Networks." In Wireless Network Security, 229–46. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36511-9_9.
Full textCampista, Miguel Elias M., and Marcelo G. Rubinstein. "Mesh Routing." In Advanced Routing Protocols for Wireless Networks, 31–56. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2014. http://dx.doi.org/10.1002/9781118984949.ch4.
Full textRak, Jacek. "Resilience of Wireless Mesh Networks." In Computer Communications and Networks, 85–120. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-22333-9_4.
Full textSrivathsan, S., N. Balakrishnan, and S. S. Iyengar. "Scalability in Wireless Mesh Networks." In Computer Communications and Networks, 325–47. London: Springer London, 2009. http://dx.doi.org/10.1007/978-1-84800-909-7_13.
Full textChen, Tao, Honggang Zhang, Xiaofei Zhou, Gian Mario Maggio, and Imrich Chlamtac. "CogMesh: A Cluster Based Cognitive Radio Mesh Network." In Cognitive Wireless Networks, 657–78. Dordrecht: Springer Netherlands, 2007. http://dx.doi.org/10.1007/978-1-4020-5979-7_34.
Full textManoj, B., and Ramesh Rao. "Wireless Mesh Networks." In Wireless Mesh Networking. Auerbach Publications, 2006. http://dx.doi.org/10.1201/9781420013542.ch1.
Full textConference papers on the topic "Wireless mesh networks"
"Wireless 8: Wireless mesh networks." In 2008 5th International Conference on Broadband Communications, Networks and Systems. IEEE, 2008. http://dx.doi.org/10.1109/broadnets.2008.4769147.
Full textRosenberg, Catherine, Jun Luo, and Andre Girard. "Engineering wireless mesh networks." In 2008 IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC). IEEE, 2008. http://dx.doi.org/10.1109/pimrc.2008.4699918.
Full textReichman, Arie, and Andreas Czylwik. "Broadband wireless mesh networks." In 2011 IEEE International Conference on Microwaves, Communications, Antennas and Electronic Systems (COMCAS). IEEE, 2011. http://dx.doi.org/10.1109/comcas.2011.6105909.
Full textLima, Viviane, Vitor Ruivo, and Marilia Curado. "Securing wireless mesh networks." In the 5th International Latin American Networking Conference. New York, New York, USA: ACM Press, 2009. http://dx.doi.org/10.1145/1636682.1636685.
Full textLander, R. "The World-wide wireless mesh." In IEE WiMax and Mesh Networks Forum. IEE, 2005. http://dx.doi.org/10.1049/ic:20050361.
Full textNagel, Robert. "Altruistic Traffic Limits Computation in Wireless Broadcast Networks." In 2010 Third International Conference on Advances in Mesh Networks (MESH). IEEE, 2010. http://dx.doi.org/10.1109/mesh.2010.12.
Full textSulc, Vladimir, Radek Kuchta, and Radimir Vrba. "IQMESH Implementation in IQRF Wireless Communication Platform." In 2009 Second International Conference on Advances in Mesh Networks (MESH). IEEE, 2009. http://dx.doi.org/10.1109/mesh.2009.18.
Full textMax, Sebastian, and Tinghuai Wang. "Transmit Power Control in Wireless Mesh Networks Considered Harmful." In 2009 Second International Conference on Advances in Mesh Networks (MESH). IEEE, 2009. http://dx.doi.org/10.1109/mesh.2009.20.
Full textZhang, Dong, Rick Bunt, and Nathaniel Osgood. "The Achievable Cell Capacity in Cellular Wireless Mesh Networks." In 2010 Third International Conference on Advances in Mesh Networks (MESH). IEEE, 2010. http://dx.doi.org/10.1109/mesh.2010.11.
Full textKum, Dong-Won, Jin-Su Park, You-Ze Cho, Byoung-Yoon Cheon, and Daejea Cho. "Mobility-Aware Hybrid Routing Approach for Wireless Mesh Networks." In 2010 Third International Conference on Advances in Mesh Networks (MESH). IEEE, 2010. http://dx.doi.org/10.1109/mesh.2010.18.
Full textReports on the topic "Wireless mesh networks"
Nicholas, Paul J., and David L. Alderson. Designing Interference-Robust Wireless Mesh Networks Using a Defender-Attacker-Defender Model. Fort Belvoir, VA: Defense Technical Information Center, February 2015. http://dx.doi.org/10.21236/ada613908.
Full textWu, Fan, Vijay Raman, and Nitin Vaidya. A Channel Assignment Algorithm for Opportunistic Routing in Multichannel, Multi-Radio Wireless Mesh Networks. Fort Belvoir, VA: Defense Technical Information Center, November 2010. http://dx.doi.org/10.21236/ada555031.
Full text