Dissertations / Theses on the topic 'Wireless mesh networks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Wireless mesh networks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Abdalla, Taha. "Scalable Wireless Mesh Networks." University of the Western Cape, 2016. http://hdl.handle.net/11394/5868.
Full textWireless Mesh Networks (WMNs) are wireless multi-hop networks built on wireless nodes that operate in an Independent Basic Set Identifier (IBSS) mode of the IEEE 208.11 wireless standard. IBSS is well known as an ad hoc mode which is found to build ad hoc wireless networks with the aid of routing protocols crafted to work in this mode. Ad hoc wireless mesh networks are always described as self-healing, self-configuring, easy to build, etc. However, these features do come at a cost because a WMN suffers performance degradation and scalability issues, which mainly come from the underlying IBSS mode that is used to form the physical network. Furthermore this is exacerbated by routing protocols in the upper layers which are intended to form a flat network architecture. Partitioning or clustering the flat network into smaller units has been proven to be a viable mechanism to counter the scalability problem in the communication network. The wired network for instance, presents a segmented, hierarchical architecture, where end user devices are organized in virtual local area networks (VLANs) using Ethernet switches and then Routers aggregate multiple VLANs. This thesis develops and evaluates a heterogeneous, clustering architecture to enhance WMN scalability and management. In the proposed architecture, the clustering is separated from the routing, where the clustering is done at the physical layer. At the routing level, each cluster is configured as a WMN using layer 2 routing for intra-cluster routing, and layer 3 routing for inter-domain routing between clusters. Prototypes for the proposed architecture have been built in a laboratory testbed. The proposed architecture reported better scalability and performance results compared to the traditional flat architecture.
GHUMMAN, SHAKEEL AHMAD. "Security in Wireless Mesh Network." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-4175.
Full textThe Master’s thesis report describes the wireless mesh networks functions,
characteristics, network management and finally different protocols with security issues and applications. Wireless Networks (WMNs) are replacing wireless Infrastructure networks in many areas because of their lower and higher flexibility. The wireless mesh networks (WMNs) provides network access for both mesh and conventional clients through mesh routers and mesh clients. Communication across the network is formed via the bridge functions. Mesh router also provides the minimal mobility and form the backbone of WMNs.
Wireless mesh network has resolved the limitation of ad hoc networks which is ultimately improves the performance of Ad hoc networks. Security is a very important issue which can be resolve through proper management of network. The improvment of 802.11i security has greatly improved the network perfomance and increase the encryption and integrity security capabilities. The key points which are being addressed in this report are security issues and threats and their counter measures. Attacks which can come on diffent layers are being discussed in this survey. Security of wireless mesh network is still under consideration. Wireless mesh network are attracting more attention due to its enhanced features.
Wireless mesh network topology technology is being discussed in this report. Then network management of WMNs is explained and in the concluding chapters security issues are discussed. Threats, attacks and challenges of WMNs are discussed in this survey.
Herms, André. "Dienstgüte in Wireless Mesh Networks." Göttingen Sierke, 2009. http://d-nb.info/997632143/04.
Full textMatos, Ricardo Jorge Magalhães de. "Context-based wireless mesh networks." Doctoral thesis, Universidade de Aveiro, 2013. http://hdl.handle.net/10773/12450.
Full textIn the modern society, new devices, applications and technologies, with sophisticated capabilities, are converging in the same network infrastructure. Users are also increasingly demanding in personal preferences and expectations, desiring Internet connectivity anytime and everywhere. These aspects have triggered many research efforts, since the current Internet is reaching a breaking point trying to provide enough flexibility for users and profits for operators, while dealing with the complex requirements raised by the recent evolution. Fully aligned with the future Internet research, many solutions have been proposed to enhance the current Internet-based architectures and protocols, in order to become context-aware, that is, to be dynamically adapted to the change of the information characterizing any network entity. In this sense, the presented Thesis proposes a new architecture that allows to create several networks with different characteristics according to their context, on the top of a single Wireless Mesh Network (WMN), which infrastructure and protocols are very flexible and self-adaptable. More specifically, this Thesis models the context of users, which can span from their security, cost and mobility preferences, devices’ capabilities or services’ quality requirements, in order to turn a WMN into a set of logical networks. Each logical network is configured to meet a set of user context needs (for instance, support of high mobility and low security). To implement this user-centric architecture, this Thesis uses the network virtualization, which has often been advocated as a mean to deploy independent network architectures and services towards the future Internet, while allowing a dynamic resource management. This way, network virtualization can allow a flexible and programmable configuration of a WMN, in order to be shared by multiple logical networks (or virtual networks - VNs). Moreover, the high level of isolation introduced by network virtualization can be used to differentiate the protocols and mechanisms of each context-aware VN. This architecture raises several challenges to control and manage the VNs on-demand, in response to user and WMN dynamics. In this context, we target the mechanisms to: (i) discover and select the VN to assign to an user; (ii) create, adapt and remove the VN topologies and routes. We also explore how the rate of variation of the user context requirements can be considered to improve the performance and reduce the complexity of the VN control and management. Finally, due to the scalability limitations of centralized control solutions, we propose a mechanism to distribute the control functionalities along the architectural entities, which can cooperate to control and manage the VNs in a distributed way.
Na sociedade actual, novos dispositivos, aplicações e tecnologias, com capacidades sofisticadas, estão a convergir na mesma infra-estrutura de rede. Os utilizadores são também cada vez mais exigentes nas suas preferências e expectativas pessoais, desejando conetividade `a Internet em qualquer hora e lugar. Estes aspectos têm desencadeado muitos esforços de investigação, dado que a Internet atual está a atingir um ponto de rutura ao tentar promover flexibilidade para os utilizadores e lucros para os operadores, enquanto lida com as exigências complexas associadas `a recente evolução. Em sintonia com a linha de investigação para a Internet do futuro, muitas soluções têm sido propostas para melhorar as arquiteturas e protocolos da Internet atual, de forma a torná-los sensíveis ao contexto, isto é, adaptá-los dinamicamente `a alteração da informação que caracteriza qualquer entidade de rede. Neste sentido, a presente Tese propõe uma nova arquitetura que permite criar várias redes com diferentes características de acordo com o contexto das mesmas, sobre uma única rede em malha sem fios (WMN), cuja infra-estructura e protocolos são muito flexíveis e auto-adaptáveis. Mais especificamente, esta Tese modela o contexto dos utilizadores, que pode abranger as suas preferências de segurança, custo e mobilidade, capacidades dos seus dispositivos ou requisitos de qualidade dos seus serviços, de forma a transformar uma WMN num conjunto de redes lógicas. Cada rede lógica ´e configurada para satisfazer um conjunto de necessidades de contexto do utilizador (como exemplo, suporte de mobilidade elevada e de baixa seguran¸ca). Para implementar esta arquitetura centrada no utilizador, esta Tese utiliza a virtualização de redes, que tem muitas vezes sido defendida como um meio para implementar arquiteturas e serviços de rede de uma forma independente, enquanto permite uma gestão dinâmica dos recursos. Desta forma, a virtualização de redes pode permitir uma configuração flexível e programável de uma WMN, a fim de ser partilhada por várias redes lógicas (ou redes virtuais - VNs). Além disso, o grau de isolamento introduzido pela virtualização de redes pode ser utilizado para diferenciar os protocolos e mecanismos de cada VN baseada em contexto. Esta arquitetura levanta vários desafios para controlar e gerir as VNs em tempo real, e em resposta `a dinâmica dos utilizadores e da WMN. Neste contexto, abordamos os mecanismos para: (i) descobrir e selecionar a VN a atribuir a um utilizador; (ii) criar, adaptar e remover as topologias e rotas das VNs. Também exploramos a possibilidade de considerar a taxa de variação dos requisitos de contexto dos utilizadores de forma a melhorar o desempenho e reduzir a complexidade do controlo e gestão das VNs. Finalmente, devido ´as limitações de escalabilidade das soluções de controlo centralizadas, propomos um mecanismo para distribuir as funcionalidades de controlo ao longo das entidades da arquitectura, que podem cooperar para controlar e gerir as VNs de uma forma distribuída.
Kongara, Harish Agrawal Prathima. "Performance optimization of wireless mesh networks." Auburn, Ala, 2009. http://hdl.handle.net/10415/1620.
Full textQi, Bing Biaz Saad. "Routing metrics for multi-hop wireless MESH networks." Auburn, Ala., 2009. http://hdl.handle.net/10415/1705.
Full textDarehshoorzadeh, Amir. "Opportunistic routing in wireless mesh networks." Doctoral thesis, Universitat Politècnica de Catalunya, 2012. http://hdl.handle.net/10803/83765.
Full textJun, Jangeun. "Capacity Estimation of Wireless Mesh Networks." NCSU, 2002. http://www.lib.ncsu.edu/theses/available/etd-11062002-163505/.
Full textShah, Kartik Beard Cory. "Throughput enhancement using wireless mesh networks." Diss., UMK access, 2008.
Find full text"A thesis in electrical engineering." Typescript. Advisor: Cory C. Beard. Vita. Title from "catalog record" of the print edition Description based on contents viewed Sept. 12, 2008. Includes bibliographical references (leaf 42). Online version of the print edition.
Subramanian, Jayashree Ph D. Massachusetts Institute of Technology. "Efficient flooding for wireless mesh networks." Thesis, Massachusetts Institute of Technology, 2012. http://hdl.handle.net/1721.1/71490.
Full textCataloged from PDF version of thesis.
Includes bibliographical references (p. 113-116).
Flooding in wireless mesh networks involves distributing some data from one node to rest of the nodes in the network. This dissertation proposes UFlood, a flooding protocol for wireless mesh networks that targets large file transfers, such as software updates, where achieving high throughput (minimizing the time to complete the flood to all nodes) and low airtime (lower the time each node spends in transmitting packets, and thus lower the impact on other wireless traffic) are both important. The central challenge in good flooding performance is the choice of senders for each transmission opportunity. At each time during a flood, some parts of the network will have received more data than others. The set of best sending nodes lies along the boundaries between these regions, and evolves with time in ways that are difficult to predict. UFlood's key new idea is a distributed heuristic to dynamically choose the senders likely to lead to all nodes receiving the flooded data in the least time. The mechanism takes into account which data nearby receivers already have as well as inter-node channel quality. The mechanism includes a novel bit-rate selection algorithm that trades off the speed of high bit-rates against the larger number of nodes likely to receive low bit-rates. Unusually, UFlood uses both random network coding to increase the usefulness of each transmission and detailed feedback about what data each receiver already has; the feedback is critical in deciding which node's coded transmission will have the most benefit to receivers. The required feedback is potentially voluminous, but UFlood includes novel techniques to reduce its cost. The dissertation concludes that careful choice of senders allows UFlood to achieve 150% higher throughput than MORE, a known high-throughput flooding protocol, using 65% less time transmitting. UFlood uses 54% lower airtime than MNP, an existing flooding protocol to minimize airtime, and achieves 300% higher throughput.
by Jayashree Subramanian.
Ph.D.
Zhang, Xiaowen. "Resource Management and Optimization in Wireless Mesh Networks." FIU Digital Commons, 2009. http://digitalcommons.fiu.edu/etd/173.
Full textKripakaran, Ramakrishnan. "Effective Strategies for Mesh Router Selection in Wireless Mesh Networks." University of Cincinnati / OhioLINK, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1267460860.
Full textDamle, Ameya. "Hybrid routing with periodic mesh updates in wireless mesh networks." Ann Arbor, Mich. : ProQuest, 2006. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:1432319.
Full textTitle from PDF title page (viewed May 23, 2007). Source: Masters Abstracts International, Volume: 44-04, page: 1923. Adviser: Dinesh Rajan. Includes bibliographical references.
SANTHANAM, LAKSHMI. "Integrated Security Architecture for Wireless Mesh Networks." University of Cincinnati / OhioLINK, 2008. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1202846575.
Full textCavalcanti, de Castro Marcel. "Enhancing P2P Systems over Wireless Mesh Networks." Doctoral thesis, Karlstads universitet, Avdelningen för datavetenskap, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-8691.
Full textMunawar, Mohammad Ahmad. "Multi-interface Multi-channel wireless mesh networks." Thesis, University of Waterloo, 2004. http://hdl.handle.net/10012/875.
Full textZhang, Zhenxia. "Handoff Management Schemes in Wireless Mesh Networks." Thèse, Université d'Ottawa / University of Ottawa, 2012. http://hdl.handle.net/10393/23073.
Full textBaumann, Rainer. "Building scalable and robust wireless mesh networks." Aachen Shaker, 2007. http://e-collection.ethbib.ethz.ch/view/eth:29857?q=Baumann%20mesh.
Full textYu, Xiaobo. "Distributed resource management for wireless mesh networks." Thesis, University of Surrey, 2012. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.551148.
Full textNicholas, Paul J. "Optimal transmitter placement in wireless mesh networks." Thesis, Monterey, Calif. : Naval Postgraduate School, 2009. http://handle.dtic.mil/100.2/ADA501886.
Full textThesis Advisor(s): Alderson, David. "June 2009." Author(s) subject terms: Wireless Mesh Networks, Humanitarian Assistance, Disaster Relief, Distributed Operations, Enhanced Company Operations, Network Design, Nonlinear Programming, Terrain Integrated Rough Earth Model, TIREM, Hata COST-231, Simultaneous Routing and Resource Allocation, Dividing Rectangles, DIRECT, Access Points, Access Point Placement, C++ Description based on title screen as viewed on July 13, 2009. Includes bibliographical references (p. 119-122). Also available in print.
Wang, Peng. "Throughput optimization of urban wireless mesh networks." Access to citation, abstract and download form provided by ProQuest Information and Learning Company; downloadable PDF file, 196 p, 2009. http://proquest.umi.com/pqdweb?did=1833647421&sid=6&Fmt=2&clientId=8331&RQT=309&VName=PQD.
Full textLee, Richard Lloyd. "Feasibility of TCP for Wireless Mesh Networks." BYU ScholarsArchive, 2012. https://scholarsarchive.byu.edu/etd/2973.
Full textNawaf, Liqaa. "Optimizing infrastructure placement in Wireless Mesh Networks." Thesis, Cardiff University, 2017. http://orca.cf.ac.uk/100966/.
Full textNaghavi, Nika. "Call admission control in wireless mesh networks." Thesis, King's College London (University of London), 2017. https://kclpure.kcl.ac.uk/portal/en/theses/call-admission-control-in-wireless-mesh-networks(01d122ee-b6fe-4baa-b78c-9f5093136956).html.
Full textMynampati, Vittal Reddy, Dilip Kandula, Raghuram Garimilla, and Kalyan Srinivas. "Performance and Security of Wireless Mesh Networks." Thesis, Blekinge Tekniska Högskola, Avdelningen för telekommunikationssystem, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2901.
Full textAmusa, Ebenezer Olukayode. "An enhanced cross-layer routing protocol for wireless mesh networks based on received signal strength." Thesis, University of Bedfordshire, 2010. http://hdl.handle.net/10547/143534.
Full textZhao, Rui. "Mesh distributed coordination function for efficient wireless Mesh networks supporting QoS /." Aachen : Mainz, 2007. http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=016149899&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA.
Full textKobo, Hlabishi. "Situation-aware routing for wireless mesh networks with mobile nodes." Thesis, University of the Western Cape, 2012. http://etd.uwc.ac.za/index.php?module=etd&action=viewtitle&id=gen8Srv25Nme4_6647_1370594682.
Full textGaur, Amit. "Secured Communication in Wireless Sensor Network (WSN) and Authentic Associations in Wireless Mesh Networks." University of Cincinnati / OhioLINK, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1282053086.
Full textHällström, Magnus. "Strömmande video i trådlösa mesh nätverk : Streaming video in wireless mesh networks." Thesis, Umeå universitet, Institutionen för tillämpad fysik och elektronik, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-89016.
Full textRonasi, Keivan. "Resource allocation and scheduling in wireless mesh networks." Thesis, University of British Columbia, 2012. http://hdl.handle.net/2429/42751.
Full textPries, Jan Rastin. "Performance optimization of wireless infrastructure and mesh networks." Doctoral thesis, Würzburg Inst. für Informatik, Lehrstuhl für Verteilte Systeme, 2010. http://d-nb.info/1000629171/34.
Full textPanmin, Ye, and Yong. "Distributed Cross-layer Monitoring in Wireless Mesh Networks." Thesis, Karlstad University, Karlstad University, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-4615.
Full textYe, Panming, and Yong Zhou. "Distributed Cross-layer Monitoring in Wireless Mesh Networks." Thesis, Karlstad University, Karlstad University, Karlstad University, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-4617.
Full textWireless mesh networks has rapid development over the last few years. However, due to properties such as distributed infrastructure and interference, which strongly affect the performance of wireless mesh networks, developing technology has to face the challenge of architecture and protocol design issues. Traditional layered protocols do not function efficiently in multi-hop wireless environments. To get deeper understanding on interaction of the layered protocols and optimize the performance of wireless mesh network, more recent researches are focusing on cross-layer measurement schemes and cross-layer protocol design. The goal of this project is to implement a distributed monitoring mechanism for IEEE802.11 based wireless mesh networks. This module is event-based and has modular structure that makes it flexible to be extended. This project results a novel Cross-Layer Monitoring Module, CLMM, which is a prototype that monitors each layer of the nodes locally and dynamically, calculates the average values of the metrics, compares these values with thresholds and handles the cross-layer messages of each node. The CLMM also has a routing module structure that can be extended to distribute the metrics to its neighbors.
Bayer, Nico. "Scheduling mechanisms for carrier-grade wireless mesh networks." Thesis, City University London, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.511868.
Full textWang, Xia. "A systematic security approach in wireless mesh networks." [Ames, Iowa : Iowa State University], 2009.
Find full textMashraqi, Aisha Mousa. "Throughput optimisation in multi-channel Wireless Mesh Networks." Thesis, University of Leicester, 2017. http://hdl.handle.net/2381/40810.
Full textSantos, Ricardo. "5G Backhauling with Software-defined Wireless Mesh Networks." Licentiate thesis, Karlstads universitet, Institutionen för matematik och datavetenskap (from 2013), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-69437.
Full textThe growth of mobile devices, along with their traffic demands, is expected to saturate the current mobile networks soon. To cope with such demand increase, fifth generation (5G) network architectures will need to provide multi-gigabit capacity at the access level, through the deployment of a massive amount of ultra-dense small cells (SCs). To connect the access and core networks, a robust and high capacity backhaul is required. To that end, mmWave links that operate at e.g. 60 GHz, can be used to interconnect the SCs, forming multi-hop wireless mesh topologies. In this thesis, we study the application of the Software-defined Networking (SDN) paradigm for the management of a SC wireless backhaul. Firstly, we provide an SDN-based architecture to manage SC backhaul networks, which includes an out-of-band control channel and where we consider aspects such as energy efficiency, resiliency and flexible backhaul operation. Secondly, we show the benefits of the wireless backhaul configuration using the SDN controller, which can be used to improve the wireless resource allocation and provide network resiliency. Finally, we investigate how a SC mesh backhaul can be optimally reconfigured between different topologies, while minimizing the network disruption during the reconfiguration.
Nahle, Salim. "Algorithms for capacity enhancement in wireless mesh networks." Paris 6, 2009. http://www.theses.fr/2009PA066523.
Full textFarsi, Abdelhak. "Planning and resource allocation for wireless mesh networks." Paris 13, 2012. http://scbd-sto.univ-paris13.fr/intranet/edgalilee_th_2012_farsi.pdf.
Full textLes réseaux maillés sans fils (Wireless Mesh Networks) sont apparus comme une technologie phare pour le développement des réseaux sans fils de nouvelle génération, subissant un développement rapide et inspirant un certain nombre d’applications. Dans cette thèses, on se focalise sur la planification et l’allocation de ressources dans WMN. Ce travail est divisé en trois volets. Dans le premier volet, nous traitons le problème de planification du réseau dorsal. Nous nous intéressons à la minimisation du coût d’installation, et la maximisation du débit nominal à offrir à chaque utilisateur, tout en minimisant l’interférence. Nous proposons de traiter ce problème multiobjectif en utilisant deux approches. Dans la première approche, nous définissons le problème de planification du réseau d’accès comme étant : (1) problème du positionnement de routeurs mesh et (2) problème d’affectation de canaux. Afin de résoudre le problème du positionnement des routeurs mesh, nous avons proposé deux stratégies : à savoir l’algorithme de Markov Cluster-Integer Linear Programming (MCLILP) et l’algorithme de disques couvrants. Par ailleurs, nous avons résolu le problème d’affectation de canaux par la proposition de trois algorithmes : Predefined frequency Vector Approach (PFVA), Least-Interfering Channel Search (LICS) and the TPsbased Least Interfering Channel Search (TPs-LICS). Ensuite, nous avons proposé une deuxième approche appelée Three-Phase Heuristic Algorithm for WLAN planning (TPHA). Notre deuxième approche permet d’optimiser conjointement les deux problèmes de positionnement de routeurs mesh et d’affectation de canaux. Cette nouvelle heuristique, rapide et évolutive, inspirée du domaine de la robotique, se base sur l’approche du champ de potentiel. Dans le deuxième volet, nous nous focalisons sur le problème de planification du réseau dorsal. Ce dernier, est défini comme étant : la formation de la topologie du réseau dorsal et l’affectation de sa capacité. Etant donné que la planification du réseau dorsal est un problème complexe, nous avons proposé une heuristique en deux phases. La première phase consiste en la formation de topologie en choisissant les liens qui maximisent la capacité totale du réseau dorsal. Tandis que la deuxième phase, permet le partage de la capacité du réseau dorsal entre les différents routeurs mesh selon l’équité Max-Min. Dans le troisième volet, nous nous intéressons au problème du dimensionnement (allocation de ressources) du réseau mesh à deux niveaux. Nous supposons deux technologies d’accès différentes : mode de communication non connecté et le mode connecté. Nous proposons une méthodologie de dimensionnement pour chaque mode de communication afin de satisfaire les deux objectifs de maximisation de la capacité et de la partager entre tous les routeurs mesh selon la stratégie d’équité Max-Min pondérée. Finalement, les algorithmes et modèles proposés ont été évalués en comparant leurs résultats à la solution exacte
Li, Xiaoguang. "Channel Switching Control Policy for Wireless Mesh Networks." Master's thesis, Temple University Libraries, 2012. http://cdm16002.contentdm.oclc.org/cdm/ref/collection/p245801coll10/id/164788.
Full textM.S.
Dynamic channel assignment algorithms allow wireless nodes to switch channels when their traffic loads exceed certain thresholds. These thresholds represent estimations of their throughput capacities. Unfortunately, the threshold estimation may not be accurate due to co-channel interference (CCI) and adjacent-channel interference (ACI), especially with high traffic loads in dense networks. When the link capacity is over-estimated, these channel assignment algorithms are not effective. This is because channel switch is not triggered even with overloaded data traffic and the link quality decreases significantly as the channel is overloaded. When the link capacity is under-estimated, the link is under utilized. Moreover, when link traffic load increases from time to time, channel switch occurs frequently. Such frequent channel switches increase latency and degrade throughput, and can even cause network wide channel oscillations. In this paper, we propose a novel threshold-based control system, called \emph{balanced control system} (BCS). The proposed threshold-based control policy consist of deciding, according to the real time traffic load and interference, whether to switch to another channel,{which channel should be switched to and how to perform the switch. Our control model is based on a fuzzy logic control. The threshold which assists to make the channel switch decisions, could be deduced dynamically according to the real-time traffic of each node. We also design a novel dynamic channel assignment scheme, which is used for the selection of the new channel. The channel switch scheduler is provided to perform channel-switch processing for sender and receiver over enhanced routing protocols. We implement our system in NS2, and the simulation results show that with our proposed system, the performance improves by 12.3\%-72.8\% in throughput and reduces 23.2\%-52.3\% in latency.
Temple University--Theses
Osękowska, Ewa A. "Performance Evaluation of Wireless Mesh Networks Routing Protocols." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3712.
Full textMobile number: +48 660144055
Bagale, Jiva Nath. "On the performance of emerging wireless mesh networks." Thesis, University of West London, 2015. https://repository.uwl.ac.uk/id/eprint/1279/.
Full textNawrath, Thomas. "P2P-based Mobility Management for Heterogeneous Wireless Networks and Mesh Networks." Universitätsbibliothek Chemnitz, 2006. http://nbn-resolving.de/urn:nbn:de:swb:ch1-200601065.
Full textRahat, Alma As-Aad Mohammad. "Hybrid evolutionary routing optimisation for wireless sensor mesh networks." Thesis, University of Exeter, 2015. http://hdl.handle.net/10871/21330.
Full textMeeran, Mohammad Tariq. "An analysis of voice over Internet Protocol in wireless mesh networks." Thesis, University of the Western Cape, 2012. http://etd.uwc.ac.za/index.php?module=etd&action=viewtitle&id=gen8Srv25Nme4_8735_1370594169.
Full textThis thesis presents an analysis of the impact of node mobility on the quality of service for voice over Internet Protocol in wireless mesh networks. Voice traffic was simulated on such a mesh 
network to analyze the following performance metrics: delay, jitter, packet loss and throughput. Wireless mesh networks present interesting characteristics such as multi-hop routing, node mobility, and variable coverage that can impact on quality of service. A reasonable deployment scenario for a small organizational network, for either urban or rural deployment, is considered with three wireless mesh network scenarios, each with 26 mesh nodes. In the first scenario, all mesh nodes are stationary. In the second scenario, 10 nodes are mobile and 16 nodes are stationary. 
Finally, in the third scenario, all mesh nodes are mobile. The mesh nodes are simulated to move at a walking speed of 1.3m per second. The results show that node mobility can increase packet 
loss, delay, and jitter. However, the results also show that wireless mesh networks can provide acceptable quality of service, providing that there is little or no background traffic generated by other 
applications. In particular, the results demonstrate that jitter across all scenarios remains within humanacceptable tolerances. It is therefore recommended that voice over Internet Protocol implementations on wireless mesh networks with background traffic be supported by quality of service standards
otherwise they can lead to service delivery failures. On the other hand, voice-only 
esh networks, even with mobile nodes, offer an attractive alternative voice over Internet Protocol platform.
Chan, Michael Chi Fung. "MOLE : multi-hop object location in wireless mesh networks /." View abstract or full-text, 2008. http://library.ust.hk/cgi/db/thesis.pl?CSED%202008%20CHAN.
Full textScheidemantel, Austin, Ibrahim Alnasser, Benjamin Carpenter, Paul Frost, Shivhan Nettles, and Chelsie Morales. "Situational Wireless Awareness Network." International Foundation for Telemetering, 2010. http://hdl.handle.net/10150/604295.
Full textThe purpose of this paper is to explain the process to implementing a wireless sensor network in order to improve situational awareness in a dense urban environment. Utilizing a system of wireless nodes with Global Positioning System (GPS) and heart rate sensors, a system was created that was able to give both position and general health conditions. By linking the nodes in a mesh network line of sight barriers were overcome to allow for operation even in an environment full of obstruction.
Hu, Wenjun. "A tale of two prototypes : practical network coding for wireless mesh networks." Thesis, University of Cambridge, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.604695.
Full textVan, der Merwe Zuann Stephanus. "A network traffic model for wireless mesh networks / Z.S. van der Merwe." Thesis, North-West University, 2013. http://hdl.handle.net/10394/9229.
Full textThesis (MIng (Computer and Electronic Engineering))--North-West University, Potchefstroom Campus, 2013.