2012 International Conference on Computer and Communication Engineering (ICCCE) 2012
DOI: 10.1109/iccce.2012.6271309
|View full text |Cite
|
Sign up to set email alerts
|

Performance study of hybrid Wireless Mesh Protocol (HWMP) for IEEE 802.11s WLAN mesh networks

Abstract: Abstract-Wireless Mesh Network (WMN) have been envisioned as an important solution to the next generation wireless networking which can be used in wireless community networks, wireless enterprise networks, transportation systems, home networking and last-mile wireless internet access. Many proprietary mesh solutions were developed by individual vendor but in order to interoperability; IEEE forms a task group called IEEE 802.11s to develop an integrated mesh networking solution. Hybrid Wireless Mesh protocol (H… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
14
0
1

Year Published

2014
2014
2020
2020

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 50 publications
(15 citation statements)
references
References 18 publications
0
14
0
1
Order By: Relevance
“…The path selection mechanism of this protocol is based on the value of ALM (Air-time Link Metric) of the path [1,3]. It is defined as follows: In ALM metric, the transmission time (Bt/r) and frame error rate (ef) of adjacent links are estimated by broadcasting extra probe packets.…”
Section: Existing Systemmentioning
confidence: 99%
“…The path selection mechanism of this protocol is based on the value of ALM (Air-time Link Metric) of the path [1,3]. It is defined as follows: In ALM metric, the transmission time (Bt/r) and frame error rate (ef) of adjacent links are estimated by broadcasting extra probe packets.…”
Section: Existing Systemmentioning
confidence: 99%
“…The compressed video is eventually transmitted using a wired or wireless medium to a receiver from which local viewing PCs are connected and the video decoded. Alternatively, the live video can be decoded remotely via the Internet 4 .…”
Section: Introductionsmentioning
confidence: 99%
“…To achieve the objective, the three types of attacks are simulated using OMNET++ on Ad hoc On-Demand Distance Vector Routing (AODV). AODV was selected because it is proposed as a possible routing protocol in IEEE 802.11s [20]. Moreover, AODV is available in many simulation tools, including OMNET++.…”
Section: Introductionmentioning
confidence: 99%