By Topic

2006 2nd IEEE Workshop on Wireless Mesh Networks

Date 25-28 Sept. 2006

Filter Results

Displaying Results 1 - 25 of 45
  • 2006 2nd IEEE Workshop on Wireless Mesh Networks

    Publication Year: 2006, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (59 KB)
    Freely Available from IEEE
  • 2006 2nd IEEE Workshop on Wireless Mesh Networks - WiMesh 2006

    Publication Year: 2006, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (33 KB)
    Freely Available from IEEE
  • Copyright - 2006

    Publication Year: 2006, Page(s): ii
    Request permission for commercial reuse | PDF file iconPDF (71 KB)
    Freely Available from IEEE
  • A message from the Technical Program Chairs

    Publication Year: 2006, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (74 KB) | HTML iconHTML
    Freely Available from IEEE
  • [Blank page]

    Publication Year: 2006, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (1 KB)
    Freely Available from IEEE
  • Table of contents - WiMesh Technical Program

    Publication Year: 2006, Page(s):v - vii
    Request permission for commercial reuse | PDF file iconPDF (72 KB)
    Freely Available from IEEE
  • [Blank page]

    Publication Year: 2006, Page(s): viii
    Request permission for commercial reuse | PDF file iconPDF (34 KB)
    Freely Available from IEEE
  • WiMesh 2006

    Publication Year: 2006, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (8 KB)
    Freely Available from IEEE
  • [Blank page]

    Publication Year: 2006, Page(s): 2
    Request permission for commercial reuse | PDF file iconPDF (2 KB)
    Freely Available from IEEE
  • RTSS/CTSS: mitigation of exposed terminals in static 802.11-based mesh networks

    Publication Year: 2006, Page(s):3 - 12
    Cited by:  Papers (16)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (354 KB) | HTML iconHTML

    Efficient usage of available capacity in wireless mesh networks is critical. Capacity is wasted due to the exposed terminal problem. In this paper, we propose a solution to mitigate the exposed terminal problem in static IEEE 802.11-based mesh networks, thereby improving the spatial reuse of the medium and increasing network throughput. Our solution is complementary to previously-proposed solution... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Spatial backoff contention resolution for wireless networks

    Publication Year: 2006, Page(s):13 - 22
    Cited by:  Papers (13)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (693 KB) | HTML iconHTML

    Traditional medium access control (MAC) protocols utilize temporal mechanisms such as access probability or backoff interval adaptation for contention resolution. They typically take the set of competing nodes as a given, and address the problem of adapting each node's channel access behavior to the given channel contention level. This is a temporal approach for contention resolution, which aims t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Learning contention patterns and adapting to load/topology changes in a MAC scheduling algorithm

    Publication Year: 2006, Page(s):23 - 32
    Cited by:  Papers (18)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (512 KB) | HTML iconHTML

    Aggregate traffic loads and topology in multi-hop wireless networks may vary slowly, permitting MAC protocols to 'learn' how to spatially coordinate and adapt contention patterns. Such an approach could reduce contention, leading to better throughput and energy consumption. To that end we propose a new family of distributed MAC scheduling algorithms combining synchronous two-level priority RTS/CTS... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic interference adaptation for wireless mesh networks

    Publication Year: 2006, Page(s):33 - 37
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (496 KB) | HTML iconHTML

    Most wireless meshes will have to operate within the crowded unlicensed spectrum that is also shared by numerous uncoordinated 802.11 hotspots. This creates an unpredictable and variable spectrum space that mesh networks need to co-exist within. We propose a novel method for adapting to such external interference by dynamically changing the assignment of channels to the backbone links, yet retaini... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The impact of IEEE 802.11 MAC strategies on multi-hop wireless mesh networks

    Publication Year: 2006, Page(s):38 - 47
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (488 KB) | HTML iconHTML

    This paper analyzes the impact of different MAC (medium access control) and transmission rate adaptation schemes on wireless mesh networks. The considered protocols include three different MAC protocols specified in IEEE 802.11 standards, i.e., 802.11, 802.11e, and 802.11n, and three rate adaptation schemes, i.e., ARF (automatic rate fallback), RBAR (receiver-based auto rate), and 802.11n rate ada... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simple opportunistic routing protocol for wireless mesh networks

    Publication Year: 2006, Page(s):48 - 54
    Cited by:  Papers (34)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (290 KB) | HTML iconHTML

    Multihop wireless mesh networks are becoming a new attractive communication paradigm. Many cities and public places have deployed or are planning to deploy mesh networks to provide Internet access to residents and local businesses. Routing protocol design is critical to the performance and reliability of wireless mesh networks. Traditional routing protocols send traffic along pre-determined paths ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Interference aware routing in multi-radio wireless mesh networks

    Publication Year: 2006, Page(s):55 - 63
    Cited by:  Papers (104)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (336 KB) | HTML iconHTML

    We address the problem of interference aware routing in multi-radio infrastructure mesh networks wherein each mesh node is equipped with multiple radio interfaces and a subset of nodes serve as Internet gateways. We present a new interference aware routing metric - iAWARE that aids in finding paths that are better in terms of reduced interflow and intra-flow interference. We incorporate this metri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On multi-gateway association in wireless mesh networks

    Publication Year: 2006, Page(s):64 - 73
    Cited by:  Papers (12)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (374 KB) | HTML iconHTML

    Most traditional models of wireless mesh networks involve a mobile device connecting to the backbone through one of the available gateways in a wireless mesh network. In this paper, we present an alternate model, in which mobile devices are allowed to connect through more than one of the available gateways. We call the model multi-gateway association (MGA). We present arguments for why such a mode... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A cross-layer cross-overlay architecture for proactive adaptive processing in mesh networks

    Publication Year: 2006, Page(s):74 - 82
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (681 KB) | HTML iconHTML

    The dynamic characteristics of wireless mesh network environments make delay-sensitive multimedia applications processing in such networks a very challenging task Cross-layer optimizations are commonly designed to ensure that application requirements are met. Improved timeliness of delivery and precision of information as acquired by a decision- entity can help in effective management of resources... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hybrid sensor and mesh networks: paradigms for fair and energy efficient communication

    Publication Year: 2006, Page(s):83 - 92
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (488 KB) | HTML iconHTML

    The issues pertaining to capacity, fairness, and energy efficiency are central to all wireless networks, including wireless sensor and mesh networks. In this paper, we consider hybrid sensor and mesh networks as paradigms for fair and energy efficient communication. A hybrid network consists of sensor or mesh nodes with wireless communication capability and some infrastructure in the form of cable... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A tractable algorithm for fair and efficient uplink scheduling of multi-hop wimax mesh networks

    Publication Year: 2006, Page(s):93 - 100
    Cited by:  Papers (41)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (551 KB) | HTML iconHTML

    The IEEE 802.16 standard, also known as WiMax, provides a mechanism for deploying high-speed wireless mesh network in metropolitan areas. In this paper, we propose an algorithm for the data sub-channel allocation, i.e., transmission scheduling, of WiMax based mesh networks. The goal is to increase spatial reuse, achieve high system throughput, and provide fair access for the subscriber stations. I... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Poster sessions

    Publication Year: 2006, Page(s): 101
    Request permission for commercial reuse | PDF file iconPDF (15 KB)
    Freely Available from IEEE
  • [Blank page]

    Publication Year: 2006, Page(s): 102
    Request permission for commercial reuse | PDF file iconPDF (8 KB)
    Freely Available from IEEE
  • A first look at a cross-layer facilitating architecture for wireless sensor networks

    Publication Year: 2006, Page(s):103 - 105
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (123 KB) | HTML iconHTML

    A plethora of cross-layer schemes exists today, and these protocols often provide ingenious ways to serve dedicated applications for wireless sensor networks. However, sensor network protocols often trade compatibility with other schemes for specialization. In this paper, we describe the beginning of an ambitious project to design a new architecture that facilitates cross-layering while proving en... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fault-tolerant mobile sink in networked sensor systems

    Publication Year: 2006, Page(s):106 - 108
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (174 KB) | HTML iconHTML

    A networked sensor system (NSS) is typically comprised of tiny sensors with limited energy and storage capabilities deployed in an environment for monitoring and tracking purposes. Critical to the success of NSS is the reliable collection and dissemination of data while conserving sensors' limited resources, in particular energy. In this paper, we propose a novel scheme that aims to move the sink ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detecting wormhole attacks in wireless networks

    Publication Year: 2006, Page(s):109 - 111
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (145 KB) | HTML iconHTML

    We study and propose a novel algorithm for detecting Wormhole Attacks in wireless ad hoc and sensor networks. The algorithm uses only local connectivity information and utilizes disk packing argument to detect such attacks. The success of the detection algorithm depends on the density of nodes in the network. Preliminary simulation results indicate that for uniformly distributed UDG networks, worm... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.