2016
DOI: 10.3837/tiis.2017.01.008
|View full text |Cite
|
Sign up to set email alerts
|

State-Aware Re-configuration Model for Multi-Radio Wireless Mesh Networks

Abstract: Joint channel assignment and routing is a well-known problem in multi-radio wireless mesh networks for which optimal configurations is required to optimize the overall throughput and fairness. However, other objectives need to be considered in order to provide a high quality service to network users when it deployed with high traffic dynamic. In this paper, we propose a re-configuration optimization model that optimizes the network throughput in addition to reducing the disruption to the mesh clients' traffic … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2018
2018
2019
2019

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 50 publications
0
1
0
Order By: Relevance
“…The main challenges of urban environmental monitoring are the deployment simplicity and flexibility in terms of the mesh network reconfiguration [49] as well as resistance to the "malicious" sensor connection [50]. The main problems include: (i) the difficulty of initializing a network with a large number of devices; (ii) connecting a new sensor to an existing network; (iii) network scalability; (iv) the ability to use a trusted sensor in a network location other than the legal installation place; and (v) the ability to detect a malicious device (sensor) presence.…”
Section: System Description and Problem Statementmentioning
confidence: 99%
“…The main challenges of urban environmental monitoring are the deployment simplicity and flexibility in terms of the mesh network reconfiguration [49] as well as resistance to the "malicious" sensor connection [50]. The main problems include: (i) the difficulty of initializing a network with a large number of devices; (ii) connecting a new sensor to an existing network; (iii) network scalability; (iv) the ability to use a trusted sensor in a network location other than the legal installation place; and (v) the ability to detect a malicious device (sensor) presence.…”
Section: System Description and Problem Statementmentioning
confidence: 99%