Search citation statements
Paper Sections
Citation Types
Year Published
Publication Types
Relationship
Authors
Journals
The emergence of new-generation networking technologies and the wide-spread use of computers and wireless devices are providing opportunities for a new generation of powerful network systems. Recently, many researchers proposed several channel assignment (CA) algorithms in multi-radio multi-channel assignment (MR-MCA) wireless mesh networks (WMNs) to utilize available channels set in the network topology architecture. One of the key challenges faces MR-MCA is how to reduce the interferences to ensure the maximum throughput by improving the aggregate network capacity. There are several studies that have classified these CA algorithms into several approaches. The aim of this paper is to discuss the current channel assignment approaches in MR-MCA in wireless mesh networks and highlighting the state of the art for MR-MCA, which can help researchers and developers in the field of WMNs.
The emergence of new-generation networking technologies and the wide-spread use of computers and wireless devices are providing opportunities for a new generation of powerful network systems. Recently, many researchers proposed several channel assignment (CA) algorithms in multi-radio multi-channel assignment (MR-MCA) wireless mesh networks (WMNs) to utilize available channels set in the network topology architecture. One of the key challenges faces MR-MCA is how to reduce the interferences to ensure the maximum throughput by improving the aggregate network capacity. There are several studies that have classified these CA algorithms into several approaches. The aim of this paper is to discuss the current channel assignment approaches in MR-MCA in wireless mesh networks and highlighting the state of the art for MR-MCA, which can help researchers and developers in the field of WMNs.
Wireless Mesh Networks (WMN) with multiple radios and multiple channels are expected to resolve the capacity limitation problem of simpler wireless networks. However, optimal WMN channel assignment (CA) is NP complete, and it requires an optimal mapping of available channels to interfaces mounted over mesh routers. Acceptable solutions to CA must minimize network interference and maximize available network throughput. In this paper, we propose a CA solution called as cluster-based channel assignment (CBCA). CBCA aims at minimizing co-channel interference yet retaining topology through non-default CA. Topology preservation is important because it avoids network partitions and is compatible with single-interface routers in the network. A 'non-default' CA solution is desired because it uses interfaces over different channels and reduces medium contention among neighbors. To the best of our knowledge, CBCA is a unique cluster-based CA algorithm that addresses topology preservation using a non-default channel approach. The main advantage of CBCA is it runs in a distributed manner by allowing cluster heads to perform CA independently. CBCA runs in three stages, where first the WMN nodes are partitioned into clusters. The second stage performs binding of interfaces to neighbors and third stage performs CA. The proposed algorithm improves over previous work because it retains network topology and minimizes network interference, which in turn improves available network throughput. Further, when compared with two other CBCA algorithms, CBCA provides better performance in terms of improved network interference, throughput, delay, and packet delivery ratios when tested upon network topologies with various network densities and traffic loads. Copyright 1863 of traffic follows a gateway-oriented traffic pattern. In enterprise networks, the peer-to-peer traffic pattern dominates. WMNs and CA solutions must cater to both types.A WMN has multiple frequency channels and MRs are equipped with multiple radio interfaces, and mesh clients are usually equipped with a single-radio interface [2]. Use of multiple radios and channels allows MR to transmit and receive simultaneously as well as communicate with multiple neighbors simultaneously [3]. So, WMN are often refered to as multi-radio multi-channel (MRMC) communication networks [4]. MRMC systems have better utilization of radio spectrum as compared with single-radio single-channel systems (SRSC) [5]. However, this performance improvement is possible if channel assignment (CA) provides efficient mapping between channels and available interfaces at every node (we refer to a router as either a node or a vertex and a radio link is called an edge). A CA solution must address the key issue of how to map channels to links in a way that minimizes interference and maximizes the capacity.In general, CA algorithms can be classified using several attributes such as centralized, distributed, default channel approach, non-default channel approach, varying default channel approach, topology control...
Wireless mesh network (WMN) has been deployed as a key and progressing technology all around the world to provide the end-to-end users with high quality of service. Regarding of its major design concern as network throughput, WMN has been evolved based on multi-channel multi-radio strategy to make simultaneous transmissions possible. The advent of this significant improvement has introduced other challenging issues such as channel assignment (CA). Its core strategy applied in multi-radio multi-channel WMNs to promote achievable capacity using properly mapping the available channels to the radio interfaces. Although, in recent years, there are a number of research studies on CA's improvement, there are some security drawbacks that should be addressed. Most of CA schemes assume all nodes involved in CA techniques are trustworthy. This unrealistic assumption and misbehavior of those nodes makes the network susceptible to various security attacks which lead to performance degradation. This paper presents an in-depth survey of the CA's attacks as well as detection or prevention mechanism found in the literature. The attacks are classified into two groups: attacks imposed by the malicious neighbor as well as by the assigner or the assignee. In addition, a comparative and analytical discussion is provided on current solutions and their open problems. According to conducted analysis, the current knowledge gap leading to most of these attacks is lack of accurate verification because of implicit trust in nodes in CA procedure. Although, there are some research studies proposing kinds of case-specific verification, they cannot close the gap properly, and there is a need to comprehensive approach. Finally, reviewing state-of-the-art of related works shows, there are more possible attacks such as collusion or multistage attacks that have not taken into account so far.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.