A passive protected self-healing mesh network architecture and applications

1994 ◽  
Vol 2 (1) ◽  
pp. 40-52 ◽  
Author(s):  
Tsong-Ho Wu
Author(s):  
Kun-chan Lan ◽  
Zhe Wang ◽  
Mahbub Hassan ◽  
Tim Moors ◽  
Rodney Berriman ◽  
...  

Wireless mesh networks (WMN) have attracted considerable interest in recent years as a convenient, new technology. However, the suitability of WMN for mission-critical infrastructure applications remains by and large unknown, as protocols typically employed in WMN are, for the most part, not designed for real-time communications. In this chapter, the authors describe a wireless mesh network architecture to solve the communication needs of the traffic control system in Sydney. This system, known as SCATS and used in over 100 cities around the world — from individual traffic light controllers to regional computers and the central TMC —places stringent requirements on the reliability and latency of the data exchanges. The authors discuss experience in the deployment of an initial testbed consisting of 7 mesh nodes placed at intersections with traffic lights, and share the results and insights learned from measurements and initial trials in the process.


Author(s):  
Kun-Chan Lan

Wireless mesh networks (WMN) have attracted considerable interest in recent years as a convenient, flexible and low-cost alternative to wired communication infrastructures in many contexts. However, the great majority of research on metropolitan-scale WMN has been centered around maximization of available bandwidth, suitable for non-real-time applications such as Internet access for the general public. On the other hand, the suitability of WMN for missioncritical infrastructure applications remains by and large unknown, as protocols typically employed in WMN are, for the most part, not designed for realtime communications. In this chapter, we describe a real-world testbed, which sets a goal of designing a wireless mesh network architecture to solve the communication needs of the traffic control system in Sydney, Australia. This system, known as SCATS (Sydney Coordinated Adaptive Traffic System) and used in over 100 cities around the world, connects a hierarchy of several thousand devices -- from individual traffic light controllers to regional computers and the central Traffic Management Centre (TMC) - and places stringent requirements on the reliability and latency of the data exchanges. We discuss some issues in the deployment of this testbed consisting of 7 mesh nodes placed at intersections with traffic lights, and show some results from the testbed measurements.


Author(s):  
Ching-Hung Chang ◽  
Peng-Chun Peng ◽  
Yi-Tzai Lin ◽  
Jen-Wei Sun ◽  
Hai-Han Lu

2019 ◽  
Vol 8 (2) ◽  
pp. 2666-2670

Ubiquitous of modern era which utilises Hybrid Wireless Mesh Network (HWMN) topology which gave birth to ample of modern application which demands reliability, fault tolerance and scalability. HWSN topology utilises minimum of two or multiple standard network architectural topologies, in a fashion that the resultant network architecture doesn’t depict any particular topologies like bus, star or ring but as a combination of any of those standard topologies. Prime motive of the proposed Optimised Channel Assignment Algorithm (OCSA) is which focuses on priority oriented interference minimization for all the trees which are existed, and constraint in terms of delay for evolving tree addition. Interference Aware Bandwidth Reservation (IABR) provides controllability over data flow admission for end-to-end optimal bandwidth accommodation in Multi-Radio Multi-Channel (MRMC) wireless mesh network. Proposed Priority Based Interference Aware Bandwidth Reservation (PBIABR) utilises disseminated and polynomialtime heuristic oriented assignment in channel to minimize interference in WMN with the awareness of channel priority as a primary consideration. Interference and Priority of the channel are made indirectly proportional to each other. For the channel of high priority the path which has low interference is opted. In PBIABR the whole path delay constraint of tree is sub organised into multiple node, based on delay to identify the best node which embodies minimal interference. Dominant Performance Parameters (DPP) like Throughput, Packet Size, Propagation Interval and Average Energy under HWSN Scenario. All the DPP parameters are analysed for multiple flow parameters for Interference Aware Bandwidth Reservation (IABR) and Proposed Priority Based Interference Aware Bandwidth Reservation (PBIABR) conditions. Simulation results have been captured using Network Simulator 2 tools for HWSN creation and crafted to same readings as a graph for deep analysis. The proposed simulation results for hybrid scenario highlights a considerable performance hike for the performance parameters like Throughput (bps) vs Packet size (bytes), Average Energy (joule) vs Interval (sec) and Residual Energy (joule) vs Interval (sec) under PBIABR conditions compared with IABR simulation outcome. The results have been analysed for comparative study of each parameter deeply. Inference from the comparative analysis highlights the performance parameters of PBIABR is efficient than IABR.


2019 ◽  
Vol 2019 ◽  
pp. 1-12 ◽  
Author(s):  
Jorge Navarro-Ortiz ◽  
Juan J. Ramos-Munoz ◽  
Juan M. Lopez-Soler ◽  
Cristina Cervello-Pastor ◽  
Marisa Catalan

The Internet of Things is one of the hottest topics in communications today, with current revenues of $151B, around 7 billion connected devices, and an unprecedented growth expected for next years. A massive number of sensors and actuators are expected to emerge, requiring new wireless technologies that can extend their battery life and can cover large areas. LoRaWAN is one of the most outstanding technologies which fulfill these demands, attracting the attention of both academia and industry. In this paper, the design of a LoRaWAN testbed to support critical situations, such as emergency scenarios or natural disasters, is proposed. This self-healing LoRaWAN network architecture will provide resilience when part of the equipment in the core network may become faulty. This resilience is achieved by virtualizing and properly orchestrating the different network entities. Different options have been designed and implemented as real prototypes. Based on our performance evaluation, we claim that the usage of microservice orchestration with several replicas of the LoRaWAN network entities and a load balancer produces an almost seamless recovery which makes it a proper solution to recover after a system crash caused by any catastrophic event.


2018 ◽  
Vol 12 (2) ◽  
pp. 26-37
Author(s):  
Geetanjali Rathee ◽  
Hemraj Saini

Recently, Wireless Mesh Network is deliberated as a significant technology due to its self-healing, self-configuring and self-organizing features. The Multi-hop nature of WMN nodes has the potential to forward the data traffic to their intended destination node without the involvement of source node. One of the factors that impact the WMN performance is secure communication process. Various secure authentication mechanisms have been projected however, authentication delay and communication overheads are listed as the main security issues of these approaches. In this article, an efficient and fast authentication protocol have been proposed to reduce the response time, computation overhead during encryption/decryption process of the routing messages. Further various simulations with erratic nodes have been conducted to endorse the enhancement of proposed solution against existing protocols. Moreover, performance comparison between existing and proposed schemes have been analyzed in detail showing that proposed approach has achieved better outcome against convinced consequences.


Author(s):  
Chandra Wijaya ◽  
Adji Pratama Permana Putra

[Id]Koneksi internet yang sering terputus merupakan masalah yang sering dijumpai oleh orang-orang hampir di seluruh dunia. Apalagi dalam kehidupan sehari-hari, manusia memiliki ketergantungan yang tinggi terhadap internet. Sebuah topologi yang dinamakan mesh dapat digunakan untuk membangun sebuah jaringan. Topologi mesh memiliki dua karakteristik yaitu self-healing dan self-configuring. Kedua karakteristik tersebut dapat diterapkan dalam menangani masalah internet terputus. Kemudian, penggunaan ponsel cerdas berbasis Android kian meningkat, terutama untuk di Indonesia. Dengan berkembangnya ponsel cerdas berbasis Android yang begitu pesat, maka dibangun sebuah aplikasi pada ponsel cerdas berbasis Android untuk menangani masalah internet terputus dengan menerapkan karakteristik topologi mesh, yaitu self-healing dan self-configuring. Aplikasi dapat menampilkan informasi yang berhubungan dengan jaringan dan juga dapat berkomunikasi dengan ponsel lain yang terhubung melalui hotspot dengan menggunakan pemrograman socket. Pada penelitian ini, Aplikasi berhasil dibangun menggunakan bahasa Java untuk ponsel cerdas berbasis Android. Teknologi Wi-Fi dan hotspot digunakan untuk menghubungkan ponsel ke internet. Pengguna dapat melihat informasi Service Set Identifier (SSID) yang diurutkan berdasarkan kekuatan sinyal, dan aplikasi akan otomatis menghubungkan dengan SSID yang memiliki kekuatan paling besar. Setelah terhubung dengan internet, pengguna dapat melihat siapa saja yang terhubung dalam satu hotspot. Dan juga dapat melakukan sharing internet terhadap ponsel lain yang terhubung dalam satu jaringan.[En]Internet disconnections is a frequent problem encountered by people almost all over the world. Moreover in everyday life, people have a high dependence on the Internet. Mesh topology can be used to build a network. Mesh topology has two characteristics that is self-healing and self-configuring. Both of these characteristics can be applied in dealing with interrupted internet connection. Then, the growth of using Android-based smart phones is increasing, especially in Indonesia. With the development of Android based smartphone, we created an application on smart phone to address the issue of internet disconnection by applying the characteristics of mesh topology, which is self-healing and self-configuring. Applications can display information related to the network and can also communicate with other phones that are connected via hotspot using socket programming. In this research, application was built using Java for Android-based smartphones. Wi-Fi and Hotspot are used to connect the smartphone to the Internet. Users can see the SSID information sorted based on signal strength, and the application will automatically connect to the SSID that have highest signal strength. Once smartphone connected to the Internet, users can see who is connected in a hotspot. And also can share the internet to another phone connected in a network.Keywords :Android, Mesh Network, Wifi


Author(s):  
Ming-Tuo Zhou ◽  
Peng-Yong Kong

WiMAX based on IEEE std 802.16 is believed one of the important technologies of 4G. It aims to provide high-speed access over distance of several to tens kilometers. In IEEE std 802.16-2004, WiMAX defines an optional mesh mode, with which multi-hop, multi-route, self-organizing and self-healing communications can be achieved in metropolitan-level areas. This chapter presents medium access control (MAC) protocol of WiMAX mesh mode, on frame structure, network configuration, network entry, and scheduling algorithms. It also summaries the most recent progress on data slots resource scheduling and allocation algorithms. Finally, an application example of using WiMAX mesh network for high-speed and low-cost maritime communications is also presented in this chapter.


2018 ◽  
Vol 12 (1) ◽  
pp. 42-52 ◽  
Author(s):  
Geetanjali Rathee ◽  
Hemraj Saini

Recently, Wireless Mesh Network is deliberated as a significant technology due to its self-healing and self-organizing characteristics. In WMN, data is forwarded through multiple hops to the destination node. One of the factors that impact the network performance is the secure communication delay. An authentication technique having significant delay may enhance the possibility of several security threats. A number of authentication protocols have been proposed in the literature but if existing practices are deliberated then to optimize one of the constraint other parameters are affected radically. In this manuscript, a Diffie-Hellman elliptic curve technique is used over WMN which reduces latency and computational overhead issues. Further to prove the integrity of proposed work, the performance is measured theoretically and analyzed experimentally over ns2 simulator.


Sign in / Sign up

Export Citation Format

Share Document