By Topic

Advances in Mesh Networks (MESH), 2010 Third International Conference on

Date 18-25 July 2010

Filter Results

Displaying Results 1 - 25 of 29
  • [Front cover]

    Publication Year: 2010, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (831 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2010, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (11 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2010, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (58 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (109 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010, Page(s):v - vi
    Request permission for commercial reuse | PDF file iconPDF (168 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2010, Page(s): vii
    Request permission for commercial reuse | PDF file iconPDF (54 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2010, Page(s):viii - ix
    Request permission for commercial reuse | PDF file iconPDF (87 KB)
    Freely Available from IEEE
  • list-reviewer

    Publication Year: 2010, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (62 KB)
    Freely Available from IEEE
  • The Achievable Cell Capacity in Cellular Wireless Mesh Networks

    Publication Year: 2010, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (183 KB) | HTML iconHTML

    We envision a future ubiquitous wireless access network called a cellular wireless mesh network. A cellular wireless mesh network is organized in multi-radio, multi-channel, multi-rate and multi-hop radio cells, each served by a single gateway. We propose the Maximum Channel Collision Time algorithm, which derives an expression for a conservative cell capacity. We prove that the conservative cell ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance Evaluation of AODV and OLSR-Meshed IP-Enabled IEEE802.15.4

    Publication Year: 2010, Page(s):7 - 12
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (352 KB) | HTML iconHTML

    Safety critical applications of IEEE 802.15.4 networks require autonomous network reconfiguration and dynamic meshing in case of node failures or changing environmental influences. In contrast to the classical approach of wireless sensor networks, this paper focuses on the development of enhanced network services like multimedia transmissions in a gas concentration monitoring scenario. Therefore, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experimental Procedure for the Characterization and Optimization of the Power Consumption and Reliability in ZigBee Mesh Networks

    Publication Year: 2010, Page(s):13 - 16
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (824 KB) | HTML iconHTML

    In this paper, a study of the behavior of wireless mesh networks is proposed, by considering energy consumption and reliability of the network. The real consumption with different network topologies and different data profiles will be analized. The objective of this work is to establish the framework to carry out energy optimizations in order to reduce the energy consumption without losing the rel... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Self-Organizing Mobile Mesh Networks with Peer-to-Peer Routing and Information Search Services

    Publication Year: 2010, Page(s):17 - 22
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (653 KB) | HTML iconHTML

    The work presents a decentralized protocol that allows self-organization of autonomous wireless devices in mobile mesh networks. In the resulting infrastructure the routing and information services are provided in a peer-to- peer fashion. Both services are performed through multi- hop radio transmissions among participant nodes with no fixed infrastructure required and avoiding to use broadcast of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Altruistic Traffic Limits Computation in Wireless Broadcast Networks

    Publication Year: 2010, Page(s):23 - 27
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (518 KB) | HTML iconHTML

    The statistical behavior of wireless medium access can generally be described by a function that relates the offered traffic to the collision probability and delay. Given a maximum tolerable collision probability and/or delay (quality-of-service constraints), one can derive the maximum admissible offered traffic for a given medium access strategy. In this paper, we describe both a centralized as w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simulation-Based Optimization for Wireless Mesh Network Planning

    Publication Year: 2010, Page(s):28 - 34
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (347 KB) | HTML iconHTML

    Wireless mesh networks are dynamically self-organized and self-configured, with the nodes in the network automatically establishing and maintaining mesh connectivity among them. Wireless mesh networks consist of three types of nodes: clients, routers and gateways. Wireless Mesh Network planning consists of determining the amount of routers needed to meet the demands for Internet access. It is a co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of Emergency Message Transmission Delays in Vehicular Wireless Mesh Network

    Publication Year: 2010, Page(s):35 - 40
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (893 KB) | HTML iconHTML

    Road accidents and traffic jams are the most important problems on the roads. Wireless Access in Vehicular Environments (WAVE) can be used as preemptive and informational measure. WAVE builds multi-path communication between vehicles and infrastructure nodes, where nodes share emergency and other information. In this paper we analyze the delay of emergency message transmission in multi-hop link, b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multihop Interference and Multihop Propagation of Control Signaling in IEEE 802.16d Mesh Networks

    Publication Year: 2010, Page(s):41 - 47
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (285 KB) | HTML iconHTML

    As defined in the mesh mode of the IEEE 802.16d specifications, one of the functions control signaling does is scheduling of transmissions among nodes. A node wanting to transmit has to check that no other transmissions are happening around the intended receiving node; and that no receptions are happening around the transmitting node. In other words, the node wanting to transmit has to know the st... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Realistic Beamforming Model for ns-2

    Publication Year: 2010, Page(s):48 - 52
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (300 KB) | HTML iconHTML

    We present an extension to network simulator ns-2 for simulation of smart antennas with maximize gain beamforming. Unlike some of the previous work on this topic, we use a realistic beamforming model with detailed radiation patterns. Our antenna framework can be used to evaluate the characteristics of beamforming under various conditions and can be combined with any MAC protocol with smart antenna... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bayesian VoIP Quality Evaluation Using the Time Between Retried Calls

    Publication Year: 2010, Page(s):53 - 58
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (380 KB) | HTML iconHTML

    This paper presents a new method for determining the voice quality of a VoIP carrier at a given time. The current methods rely on the voice stream analysis, their main drawback being the large computational power required and the cost for licenses. The method presented in this paper analyses the time difference between successive calls from the same source number to the same destination number, an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobility-Aware Hybrid Routing Approach for Wireless Mesh Networks

    Publication Year: 2010, Page(s):59 - 62
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (240 KB) | HTML iconHTML

    Wireless mesh networks (WMNs) are attractive as a new communication paradigm. Ad hoc routing protocols for WMNs are classified into: (a) proactive, (b) reactive, and (c) hybrid approaches. In general, proactive routing is more suitable for a stationary network, while reactive routing is better for a mobile network with a high mobility. In many applications, a node in WMN is mobile but it can fluct... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Effect of RTS/CTS Frames on the Performance of Ad Hoc-Based Mobile LAN

    Publication Year: 2010, Page(s):63 - 68
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (799 KB) | HTML iconHTML

    This paper analyzes the effect of RTS (Request To Send) and CTS (Clear To Send) frames on the network performance in the ad hoc-based mobile LAN. An ad hoc-based mobile LAN with two clients and one server is simulated using OPNET simulator to analyze network load, connection congestion window size and traffic received from each client in the FTP server. We found that both the connection congestion... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of Line Graph for Link Scheduling in Wireless Networks under M-hop Interference Model

    Publication Year: 2010, Page(s):69 - 74
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (361 KB) | HTML iconHTML

    In this paper, we study the link scheduling problem in wireless networks under M-hop interference model. In wireless networks, a scheduling algorithm is required to choose a subset of links at each time slot such that the packets do not corrupt due to interference. To deal with the interference in such a radio network different models have been introduced in the literature. In M-hop interference m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computer-Supported Collaborative Work and Its Application to E-Health

    Publication Year: 2010, Page(s):75 - 80
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (427 KB) | HTML iconHTML

    Most of the articles published in the last years present the asynchronous collaborative components integrated into the E-Health complex applications. They do not refer to the synchronous collaboration among the medical staff. A possible approach is because E-Health systems are patient-centered and the physicians, nurses and paramedics have to collaborate in a transparent manner not being focused o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Algorithms for Extraction and Visualization of Metadata from Domain Name Server Records

    Publication Year: 2010, Page(s):81 - 85
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (338 KB) | HTML iconHTML

    Nowadays, security awareness is on every industry agenda. Mitigating threats and assessing risks is key to successful security posture and business continuity. Penetration tests are state-of-the-art and one of the main processes used by security professionals to discover, assess and evaluate a given infrastructure for potential security risks. On this paper we discuss Domain Name Server (DNS) info... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Approach for Scheduling in STDMA for High-Throughput Backbone Wireless Mesh Networks Operating within 60-80 GHz

    Publication Year: 2010, Page(s):86 - 91
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (372 KB) | HTML iconHTML

    This work proposes a novel approach to centralized scheduling in Spatial TDMA (STDMA) for a new class of high-throughput backbone broadband wireless mesh networks operating within 60-80 GHz. The approach is based on granted-to-requested ratio maxmin optimization criterion. During a research work, a centralized gradient algorithm for an optimal schedule construction was developed and its polynomial... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data Acquisition in Oceanographic Research Vessels

    Publication Year: 2010, Page(s):92 - 97
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (659 KB) | HTML iconHTML

    This paper describes the design and the development of a new real time data acquisition system which focuses on oceanographic research. The system has been implemented in several Spanish oceanographic platforms (vessels and land-sites) using very reliable MESH network that can still operate when one node breaks down or a connection goes bad. Service Oriented Architecture allows expandable access t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.