Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Engineering

Meshscan: Performance Of Passive Handoff And Active Handoff, Yin Chen, Karol Kowalik, Mark Davis Nov 2009

Meshscan: Performance Of Passive Handoff And Active Handoff, Yin Chen, Karol Kowalik, Mark Davis

Conference papers

A core problem of fast handoff is when handoff should perform and which Mesh Node (MN) should associated with. We have developed a fast handoff management scheme called MeshScan to provide a novel use of channel scanning latency, by employing open system authentication in both Passive Handoff and Active Handoff. This scheme comprises three steps: firstly a client device takes advantage of the Wireless Mesh Network (WMN) architecture to maintain a list of active MNs. Secondly MeshScan Handoff Sensor performs handoff when it receives a disassociation management frame from the serving MN or when the measured signal strength from the …


Meshscan: Fast And Efficient Handoff In Ieee802.11 Mesh Networks, Yin Chen, Mark Davis Oct 2009

Meshscan: Fast And Efficient Handoff In Ieee802.11 Mesh Networks, Yin Chen, Mark Davis

Conference papers

Handoff delay is one of the major problems in Wireless Mesh Network (WMN) that needs to be solved in order to allow time-critical and real-time applications run continuously during handoff. We have developed a fast handoff scheme called MeshScan to provide a novel use of channel scanning latency by employing open system authentication. This scheme comprises two steps: firstly a client device takes advantage of the WMN architecture to maintain a list of active mesh nodes. Secondly when handoff is required, a client transmits Authentication Request frames to all mesh nodes (MNs) from the list instead of broadcasting Probe Request …


An Experimental Study Of The Impact Of Using Multi-Radio In Wlan Mesh Networks, Chenzhe Zhang, Karol Kowalik, Mark Davis Sep 2009

An Experimental Study Of The Impact Of Using Multi-Radio In Wlan Mesh Networks, Chenzhe Zhang, Karol Kowalik, Mark Davis

Conference papers

Next-generation wireless mobile communications will be driven by converged networks that integrate disparate technologies and services. Wireless Mesh Networks (WMNs) are expected to be one of the next generation of wireless interconnection technologies, providing flexible high bandwidth wireless backhaul over large geographical areas. While single radio mesh nodes operating on a single channel suffer from capacity constraints, equipping mesh routers with multiple radios using multiple non-overlapping channels can significantly alleviate the capacity problem and increase the aggregate bandwidth available to the network. However, it is well known that multi-radio Mesh platforms face many limitations such as interference, radiation leakage, crosstalk …


Performance Study Of A Cross-Layer Optimization To The Dsr Routing Protocol In Wireless Mesh Networks, Mustafa Ramadhan, Mark Davis Jun 2009

Performance Study Of A Cross-Layer Optimization To The Dsr Routing Protocol In Wireless Mesh Networks, Mustafa Ramadhan, Mark Davis

Conference papers

A cross-layer modification to the DSR protocol is presented in this work which is intended to enhance the global throughput performance of wireless mesh networks. This modification involves the use of an access efficiency factor (which is a measure of the local availability of bandwidth at a node) as an alternative metric to the hop-count metric in order to allow for improved routing selection. The key feature of this modified route selection procedure is that it attempts to discover paths that have a large availability of bandwidth which can support high throughputs. In this work we have employed the OPNET …


Information Hiding By Stochastic Disfusion And Its Application To Printed Document Authentication, Jonathan Blackledge, Eugene Coyle Jan 2009

Information Hiding By Stochastic Disfusion And Its Application To Printed Document Authentication, Jonathan Blackledge, Eugene Coyle

Conference papers

The use of image based information exchange has grown rapidly over the years in terms of both e-to-e image storage and transmission and in terms of maintaining paper documents in electronic form. Further, with the dramatic improvements in the quality of COTS (Commercial-O-The-Shelf) printing and scanning devices, the ability to counterfeit electronic and printed documents has become a widespread problem. Consequently, there has been an increasing demand to develop digital watermarking, information hiding and covert encryption methods which can be applied to both electronic and printed images (and documents) for the purposes of authentication, prevent unauthorized copying and, in the …