2010 IEEE Global Telecommunications Conference GLOBECOM 2010 2010
DOI: 10.1109/glocom.2010.5683887
|View full text |Cite
|
Sign up to set email alerts
|

Interference-Aware Robust Wireless Mesh Network Design

Abstract: Interference has been proven to have an effect on the performance in wireless mesh networks (WMN). Using multichannels can improve the performance of WMNs by reducing interference influence. In this paper, we study how to design a robust WMN for a set of mesh nodes, each with Q Networking Interface Cards (NICs) and pre-defined connection requests. Our scheme aims to construct an interference-aware network topology for the nodes, then set up a pair of link-disjoint paths for each request with fault-tolerant cap… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2011
2011
2017
2017

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(7 citation statements)
references
References 13 publications
0
7
0
Order By: Relevance
“…Constraint (20) imposes that each WT i should be assigned to a deployed MR/MG. Constraint (21) imposes that all the WTs' traffic serviced by an MR/ MG does not exceed the capacity of the wireless link used for the access. Constraint (22) defines the traffic balance of an MR/MG deployed at S j , the term P WT i 2V T d i x ij is the total traffic generated by the WTs assigned to the MR/MG at S j , the term P S l 2V S f lj is the total traffic received by the MR/MG at S j from neighboring MRs/MGs, P S l 2V S f jl is the total traffic transmitted by the MR/MG at S j to neighboring MRs/ MGs, and F j is the traffic transmitted to the wired network.…”
Section: The Problemmentioning
confidence: 99%
See 1 more Smart Citation
“…Constraint (20) imposes that each WT i should be assigned to a deployed MR/MG. Constraint (21) imposes that all the WTs' traffic serviced by an MR/ MG does not exceed the capacity of the wireless link used for the access. Constraint (22) defines the traffic balance of an MR/MG deployed at S j , the term P WT i 2V T d i x ij is the total traffic generated by the WTs assigned to the MR/MG at S j , the term P S l 2V S f lj is the total traffic received by the MR/MG at S j from neighboring MRs/MGs, P S l 2V S f jl is the total traffic transmitted by the MR/MG at S j to neighboring MRs/ MGs, and F j is the traffic transmitted to the wired network.…”
Section: The Problemmentioning
confidence: 99%
“…Third, this algorithm calculates the network traffic distribution matrix Tra_N with Tra_Matrix_Calc( ) and the network connectivity matrix Con_N of MRs/MGs with MR_Connectivity_Calc( ). For each MR/MG deployed at S j , its network connectivity Con j , total data traffic Tra j from WTs, the traffic balance Tra_balance j , and the traffic to the wired network Tra_to_wire j are calculated, and then the constraint violation level is calculated according to formulas (19), (21), (22), and (24). Fourth, the data traffic Link_Tra jl on each link l jl between different MRs/MGs is calculated with the subfunction Link_Tra_Calc( ), and the constraint violation level for each link is obtained with formula (23).…”
Section: If Not the Historical Position Of P I Closest To Thementioning
confidence: 99%
“…Initially wavelet neural network based traffic prediction model is built and based on this model MRA TP is designed. Farah Kandah et al [12] proposed the interference aware robust wireless mesh network design (lNARI). This approach offers an heuristic approach that looks for robust network design which satisfies request of users by providing a pair of link-disjoint paths with minimum number of free link consumptions.…”
Section: Related Workmentioning
confidence: 99%
“…Over the past decade, a number of unipath and multipath routing schemes and protocols have been proposed [7][8][9][10][11][12][13][14][15][16][17][18][19][20][21][22]. Significant body of research has used protocol model [11,17,22], physical model [17,23], or measurement-based models [9,[24][25][26][27][28][29][30][31] for interference estimation.…”
Section: Introductionmentioning
confidence: 99%
“…Significant body of research has used protocol model [11,17,22], physical model [17,23], or measurement-based models [9,[24][25][26][27][28][29][30][31] for interference estimation. However, none of these models and metrics accurately capture the impact of interference.…”
Section: Introductionmentioning
confidence: 99%