Enhancing robustness of wireless mesh networks using virtual routers

Yao H. Ho*

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

A major advantage of a wireless mesh network is its self-configuring functionality. When a mesh node fails, one can simply replace it with a new mesh node. Due to unpredictable changes of environment, the connectivity WMNs and the reliability of individual mesh node decreased rapidly. The connectivity disruptions are often to introducing delay or even worse dropping messages. Ideally, a failed mesh node should be repaired or replaced immediately to maintain the connectivity of WMN. However, this might be difficult to achieve due to the environment (e.g., bridges or tunnels) and limited resources. It is desirable to have a failure-resilient wireless mesh network that can temporarily withstand one or multiple failed mesh nodes until they can be taken care of. In this paper, we proposed a hybrid mesh network, called Resilient Mesh Network (RMN), that can effectively retain the coverage and capacity of the original network until the failed mesh nodes can be repaired or replaced.

Original languageEnglish
Title of host publication2012 12th International Conference on ITS Telecommunications, ITST 2012
Pages289-294
Number of pages6
DOIs
Publication statusPublished - 2012
Event2012 12th International Conference on ITS Telecommunications, ITST 2012 - Taipei, Taiwan
Duration: 2012 Nov 52012 Nov 8

Publication series

Name2012 12th International Conference on ITS Telecommunications, ITST 2012

Other

Other2012 12th International Conference on ITS Telecommunications, ITST 2012
Country/TerritoryTaiwan
CityTaipei
Period2012/11/052012/11/08

Keywords

  • communication protocols
  • hybrid networks
  • resilient networks
  • wireless mesh networks

ASJC Scopus subject areas

  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Enhancing robustness of wireless mesh networks using virtual routers'. Together they form a unique fingerprint.

Cite this