Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 5 of 5
Full-Text Articles in Engineering
Meshscan: Performance Of Passive Handoff And Active Handoff, Yin Chen, Karol Kowalik, Mark Davis
Meshscan: Performance Of Passive Handoff And Active Handoff, Yin Chen, Karol Kowalik, Mark Davis
Conference papers
A core problem of fast handoff is when handoff should perform and which Mesh Node (MN) should associated with. We have developed a fast handoff management scheme called MeshScan to provide a novel use of channel scanning latency, by employing open system authentication in both Passive Handoff and Active Handoff. This scheme comprises three steps: firstly a client device takes advantage of the Wireless Mesh Network (WMN) architecture to maintain a list of active MNs. Secondly MeshScan Handoff Sensor performs handoff when it receives a disassociation management frame from the serving MN or when the measured signal strength from the …
Meshscan: Fast And Efficient Handoff In Ieee802.11 Mesh Networks, Yin Chen, Mark Davis
Meshscan: Fast And Efficient Handoff In Ieee802.11 Mesh Networks, Yin Chen, Mark Davis
Conference papers
Handoff delay is one of the major problems in Wireless Mesh Network (WMN) that needs to be solved in order to allow time-critical and real-time applications run continuously during handoff. We have developed a fast handoff scheme called MeshScan to provide a novel use of channel scanning latency by employing open system authentication. This scheme comprises two steps: firstly a client device takes advantage of the WMN architecture to maintain a list of active mesh nodes. Secondly when handoff is required, a client transmits Authentication Request frames to all mesh nodes (MNs) from the list instead of broadcasting Probe Request …
An Experimental Study Of The Impact Of Using Multi-Radio In Wlan Mesh Networks, Chenzhe Zhang, Karol Kowalik, Mark Davis
An Experimental Study Of The Impact Of Using Multi-Radio In Wlan Mesh Networks, Chenzhe Zhang, Karol Kowalik, Mark Davis
Conference papers
Next-generation wireless mobile communications will be driven by converged networks that integrate disparate technologies and services. Wireless Mesh Networks (WMNs) are expected to be one of the next generation of wireless interconnection technologies, providing flexible high bandwidth wireless backhaul over large geographical areas. While single radio mesh nodes operating on a single channel suffer from capacity constraints, equipping mesh routers with multiple radios using multiple non-overlapping channels can significantly alleviate the capacity problem and increase the aggregate bandwidth available to the network. However, it is well known that multi-radio Mesh platforms face many limitations such as interference, radiation leakage, crosstalk …
Performance Study Of A Cross-Layer Optimization To The Dsr Routing Protocol In Wireless Mesh Networks, Mustafa Ramadhan, Mark Davis
Performance Study Of A Cross-Layer Optimization To The Dsr Routing Protocol In Wireless Mesh Networks, Mustafa Ramadhan, Mark Davis
Conference papers
A cross-layer modification to the DSR protocol is presented in this work which is intended to enhance the global throughput performance of wireless mesh networks. This modification involves the use of an access efficiency factor (which is a measure of the local availability of bandwidth at a node) as an alternative metric to the hop-count metric in order to allow for improved routing selection. The key feature of this modified route selection procedure is that it attempts to discover paths that have a large availability of bandwidth which can support high throughputs. In this work we have employed the OPNET …
Information Hiding By Stochastic Disfusion And Its Application To Printed Document Authentication, Jonathan Blackledge, Eugene Coyle
Information Hiding By Stochastic Disfusion And Its Application To Printed Document Authentication, Jonathan Blackledge, Eugene Coyle
Conference papers
The use of image based information exchange has grown rapidly over the years in terms of both e-to-e image storage and transmission and in terms of maintaining paper documents in electronic form. Further, with the dramatic improvements in the quality of COTS (Commercial-O-The-Shelf) printing and scanning devices, the ability to counterfeit electronic and printed documents has become a widespread problem. Consequently, there has been an increasing demand to develop digital watermarking, information hiding and covert encryption methods which can be applied to both electronic and printed images (and documents) for the purposes of authentication, prevent unauthorized copying and, in the …