Contact The DL Team Contact Us | Switch to tabbed view

top of pageABSTRACT

The IEEE 802.11 Wireless LAN standards allow multiple non-overlapping frequency channels to be used simultaneously to increase the aggregate bandwidth available to end-users. Such bandwidth aggregation capability is routinely used in infrastructure mode operation, where the traffic to and from wireless nodes is distributed among multiple interfaces of an access point or among multiple access points to balance the traffic load. However, bandwidth aggregation is rarely used in the context of multi-hop 802.11-based LANs that operate in the ad hoc mode. Most past research efforts that attempt to exploit multiple radio channels require modifications to the MAC protocol and therefore do not work with commodity 802.11 interface hardware. In this paper, we propose and evaluate one of the first multi-channel multi-hop wireless ad-hoc network architectures that can be built using standard 802.11 hardware by equipping each node with multiple network interface cards (NICs) operating on different channels. We focus our attention on wireless mesh networks that serve as the backbone for relaying end-user traffic from wireless access points to the wired network. The idea of exploiting multiple channels is particularly appealing in wireless mesh networks because of their high capacity requirements to support backbone traffic. To reap the full performance potential of this architecture, we develop a set of centralized channel assignment, bandwidth allocation, and routing algorithms for multi-channel wireless mesh networks. A detailed performance evaluation shows that with intelligent channel and bandwidth assignment, equipping every wireless mesh network node with just 2 NICs operating on different channels can increase the total network goodput by a factor of up to 8 compared with the conventional single-channel ad hoc network architecture.
Advertisements



top of pageAUTHORS



Author image not provided  Ashish Raniwala

No contact information provided yet.

Bibliometrics: publication history
Publication years1999-2010
Publication count8
Citation Count344
Available for download5
Downloads (6 Weeks)30
Downloads (12 Months)437
Downloads (cumulative)12,336
Average downloads per article2,467.20
Average citations per article43.00
View colleagues of Ashish Raniwala


Author image not provided  Kartik Gopalan

No contact information provided yet.

Bibliometrics: publication history
Publication years2001-2016
Publication count44
Citation Count466
Available for download18
Downloads (6 Weeks)68
Downloads (12 Months)1,156
Downloads (cumulative)14,810
Average downloads per article822.78
Average citations per article10.59
View colleagues of Kartik Gopalan


Author image not provided  Tzi-cker Chiueh

No contact information provided yet.

Bibliometrics: publication history
Publication years1989-2015
Publication count154
Citation Count1,036
Available for download64
Downloads (6 Weeks)121
Downloads (12 Months)1,556
Downloads (cumulative)31,545
Average downloads per article492.89
Average citations per article6.73
View colleagues of Tzi-cker Chiueh

top of pageREFERENCES

Note: OCR errors may be found in this Reference List extracted from the full text article. ACM has opted to expose the complete List rather than only correct and linked references.

1
 
2
"IEEE 802.11b Standard"; standards.ieee.org/getieee802/download/802.11b-1999.pdf
 
3
"IEEE 802.11a Standard"; standards.ieee.org/ getieee802/download/802.11a-1999.pdf
 
4
A. Muir and J. J. Garcia-Luna-Aceves; "A Channel Access Protocol for Multihop Wireless Networks with Multiple Channels"; IEEE ICC 98.
5
 
6
Wing-Chung Hung, K. L. Eddie Law, A. Leon-Garcia; "A Dynamic Multi-Channel MAC for Ad-Hoc LAN"; 21st Symp. on Comm. '02
 
7
Asis Nasipuri and Samir R. Das; "A Multichannel CSMA MAC Protocol for Mobile Multihop Networks"; Proc. of IEEE WCNC 1999.
 
8
R. Garces, J. G. L. Aceves; "Collision Avoidance and Resolution Multiple Access for Multichannel Wireless Networks,"; Infocom 2000.
 
9
J. So, N. H. Vaidya. "A Multi-Channel MAC Protocol for Ad Hoc Wireless Networks"; UIUC Tech Report, Jan 2003.
 
10
 
11
R. Chandra, C. Fetzer, K. Hogstedt; "Adaptive Topology Discovery in Hybrid Wireless Networks"; Informatics '02
 
12
 
13
 
14
 
15
E. M. Royer and C-K Toh.; "A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks"; IEEE Personal Communications, April 1999.
 
16
Mesh Networks Inc; www.meshnetworks.com
 
17
Nokia Inc.; "Nokia RoofTop Wireless Routing"; www.americasnetwork.com/americasnetwork/data/articlebrief/americasnetwork/412002/34898/article.pdf
 
18
Radiant Networks; www.radiantnetworks.com
 
19
R. Karrer, A. Sabharwal, E. Knightly; "Enabling Large-scale Wireless Broadband: A Case for TAPs"; HotNets '03
 
20
P. Bhagwaty, B. Ramanz, D. Sanghi; "Turning '03 802.11 Inside-Out"; HotNets
 
21
FireTide Inc.; www.firetide.com
 
22
Strix Networks Inc.; www.strixsystems.com
 
23
S. Lee and M. Gerla; "Split Multipath Routing with Maximally Disjoint Paths in Ad Hoc Networks"; IEEE ICC '01.
 
24
 
25
Lianfang Zhang, Zenghua Zhao, Yantai Shu, Lei Wang, and Oliver W. W. Yang; "Load Balancing of Multipath Source Routing in Ad Hoc Networks"; Proc. of IEEE ICC 2002.
 
26
S. Bak, J. A. Cobb, E. L. Leiss; "Load-Balanced Routing via Randomization"; PDCS, 1999.
 
27
K. Gopalan; "Efficient Network Resource Allocation with QoS Guarantees"; TR #133, ECSL, SUNY-SB.
 
28
 
29
V. Bahl, A. Adya, J. Padhye, A. Wolman. "Reconsidering the Wireless LAN Platform with Multiple Radios"; Workshop on Future Directions in Network Architecture '03.
 
30
P. H. Hsiao, A. Hwang, H. T. Kung, and D. Vlah; "Load-Balancing Routing for Wireless Access Networks"; Proc. of IEEE INFOCOM 2001.
 
31
I. Katzela and M. Naghshineh; "Channel assignment schemes for cellular mobile telecommunication systems: a comprehensive survey"; IEEE Personal Comm. June '96.
 
32
T. R. Jensen, B. Toft; "Graph Coloring Problems"; Wiley Interscience, New York, 1995.
33
 
34
Engim Inc; www.engim.com

top of pageCITED BY

230 Citations

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

top of pageINDEX TERMS

Index Terms are not available

top of pagePUBLICATION

Title ACM SIGMOBILE Mobile Computing and Communications Review Homepage table of contents archive
Volume 8 Issue 2, April 2004
Pages 50 - 65
Publication Date2004-04-01 (yyyy-mm-dd)
Sponsor SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing
PublisherACM New York, NY, USA
ISSN: 1559-1662 EISSN: 1931-1222 doi>10.1145/997122.997130

APPEARS IN
Applications
Networking
Hardware Design

top of pageREVIEWS


Reviews are not available for this item
Computing Reviews logo

top of pageCOMMENTS

Be the first to comment To Post a comment please sign in or create a free Web account

top of pageTable of Contents

ACM SIGMOBILE Mobile Computing and Communications Review

Volume 8 Issue 2, April 2004

Table of Contents
COLUMN: Regular features
Scanning the literature
Eyal de Lara
Pages: 1 - 2
doi>10.1145/997122.997124
Full text: PdfPdf
Health aspects of wireless communication: mobile telecommunication radiation and human brain waves
James C. Lin
Pages: 3 - 6
doi>10.1145/997122.997125
Full text: PdfPdf
FEATURE: Papers from MC2R open call
Survey on network mobility support
Eranga Perera, Vijay Sivaraman, Aruna Seneviratne
Pages: 7 - 19
doi>10.1145/997122.997127
Full text: PdfPdf

Providing unperturbed Internet connectivity to mobile hosts has been studied in the IETF for some years now, and protocols such as Mobile IP and Mobile IPv6 have been developed. We are now witnessing the emergence of mobile networks, namely a set of ...
expand
Towards integrated PSEs for wireless communications: experiences with the S4W and SitePlanner® projects
Roger R. Skidmore, Alex Verstak, Naren Ramakrishnan, Theodore S. Rappaport, Layne T. Watson, Jian He, Srinidhi Varadarajan, Clifford A. Shaffer, Jeremy Chen, Kyung Kyoon Bae, Jing Jiang, William H. Tranter
Pages: 20 - 34
doi>10.1145/997122.997128
Full text: PdfPdf

This paper describes the computational methodologies of two problem solving environments (PSEs) for wireless network design and analysis, one academic (S4W) and one commercial (SitePlanner®). The PSEs address differently common computational ...
expand
Electric-field-based routing: a reliable framework for routing in MANETs
Nam T. Nguyen, An-I Andy Wang, Peter Reiher, Geoff Kuenning
Pages: 35 - 49
doi>10.1145/997122.997129
Full text: PdfPdf

Constructing multipath routes in MANETs is important for providing reliable delivery, load balancing, and bandwidth aggregation. However, popular multipath routing approaches fail to produce spatially disjoint routes in a simple and cost-effective manner, ...
expand
Centralized channel assignment and routing algorithms for multi-channel wireless mesh networks
Ashish Raniwala, Kartik Gopalan, Tzi-cker Chiueh
Pages: 50 - 65
doi>10.1145/997122.997130
Full text: PdfPdf

The IEEE 802.11 Wireless LAN standards allow multiple non-overlapping frequency channels to be used simultaneously to increase the aggregate bandwidth available to end-users. Such bandwidth aggregation capability is routinely used in infrastructure mode ...
expand
Inquiry packet interference in bluetooth scatternets
Brian S. Peterson, Rusty O. Baldwin, Richard A. Raines
Pages: 66 - 75
doi>10.1145/997122.997131
Full text: PdfPdf

The key to successfully establishing and maintaining a Bluetooth scatternet is the inquiry procedure which discovers Bluetooth devices within range. The inquiry procedure uses a subset of the hop frequencies used by a piconet. While nodes in a scatternet ...
expand
Weaknesses in the temporal key hash of WPA
Vebjørn Moen, Håvard Raddum, Kjell J. Hole
Pages: 76 - 83
doi>10.1145/997122.997132
Full text: PdfPdf

This article describes some weaknesses in the key scheduling in Wi-Fi Protected Access (WPA) put forward to secure the IEEE standard 802.11-1999. Given a few RC4 packet keys in WPA it is possible to find the Temporal Key (TK) and the Message Integrity ...
expand

Powered by The ACM Guide to Computing Literature


The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2016 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us

Useful downloads: Adobe Reader    QuickTime    Windows Media Player    Real Player
Did you know the ACM DL App is now available?
Did you know your Organization can subscribe to the ACM Digital Library?
The ACM Guide to Computing Literature
All Tags
Export Formats
 
 
Save to Binder