scispace - formally typeset
Search or ask a question

Showing papers on "Wireless mesh network published in 1997"


BookDOI
01 Jan 1997

132 citations


Proceedings ArticleDOI
03 Nov 1997
TL;DR: It is shown that this approach can be very useful for the design and implementation of wavelength division multiplexing networks as it offers many useful advantages of the ring structure while is still able to achieve the high efficiency of network bandwidth usage due to high connectivity in the mesh topology.
Abstract: This paper introduces a new all-optical network design approach using a multiple ring concept as an alternative to the present mesh network scheme. It is shown that several different design alternatives using multiple rings exist and they can be classified into two categories according to the way in which the traffic is accommodated. The one that offers the most simple control and management has been investigated and is discussed here. It is shown that this approach can be very useful for the design and implementation of wavelength division multiplexing networks as it offers many useful advantages of the ring structure while is still able to achieve the high efficiency of network bandwidth usage due to high connectivity in the mesh topology. For example, in the sample network considered here the multiple ring scheme only requires less than 10% extra capacity in comparison to the pure mesh design.

46 citations


Journal ArticleDOI
TL;DR: The WIATM network takes advantage of the ATM-cell relay paradigm for integrated services through a radio link with quality of service (QoS) guarantee to provide wireless broadband integrated services.
Abstract: This paper presents the wireless intelligent ATM (WIATM) network, designed to provide wireless broadband integrated services. The WIATM network takes advantage of the ATM-cell relay paradigm for integrated services through a radio link with quality of service (QoS) guarantee. The design of the WIATM network architecture is an independent wireless network, which is consistent with the inherent cellular/PCS network architecture, as a wireless customer premises equipment/network (CPE/CPN) to access the ATM transport network in the B-ISDN infrastructure. An independent network architecture design separates the wireless access network from the ATM backbone network; this provides flexibility for wireless resource management with low rate source codecs with minimal tolerable QoS considered to increase the spectral efficiency, and mobility support by taking advantage of the functionalities of the IS-41 circuit-switching handoff procedures. The protocol design of the air interface is to meet the QoS requirements of wireless B-ISDN services and to be compatible with that of B-ISDN UNI. A hybrid concatenated error control scheme distributed through the protocol layers is used to target individual QoS requirements of different services. The convolutional coding and interleaving in the wireless physical layer protocol are used to guarantee QoS of voice services. A concatenated coding with additional 36 bit BCH code in the wireless ATM layer, which replaces the VCI/VPI of the ATM header field, improves the QoS up to the requirement of video services. The VCI/VPI field in WIATM is an overlapped routing information routing with the address control by radio port controller, and is thus not needed in the wireless ATM layer protocol. The retransmission scheme for data service only is added in the wireless data link layer, which is on top of wireless AAL, to meet its QoS requirement. Examples of signaling flows for call registration, call setup, and supporting handoff are shown in the design of the wireless network layer protocol. The AIN (advance intelligent network) signaling functionalities are considered for multimedia service control in the access network and interconnection to the ATM network. A parent-child creative basic call state model (BCSM) for wireless integrated services is introduced in both call origination and termination.

33 citations


Proceedings ArticleDOI
08 Jun 1997
TL;DR: Simulation experiments show that both MESH and an alternative scheme, end-to-end forward error correction, provide excellent error control with MESH incurring significantly less network overhead.
Abstract: This paper addresses support for multi-party multimedia applications delivered across datagram wide-area networks such as the Internet. Our approach is to develop a novel retransmission protocol framework, MESH, that protects delay-sensitive multicast data streams against most network errors and delay variations. The MESH approach partitions the multicast group into subgroups, elects subgroup managers called active receivers, and localizes error recovery between active receivers. Novel features of our protocol include an explicit model for delay-sensitive retransmission, run-time evaluation at an active receiver to determine its retransmission partner, and the ability to handle multiple multicast data sources without building a per-source control framework. To evaluate the performance and network costs of MESH, a wide-area network simulation of digital video distribution is constructed and studied over a range of network loss rates. Simulation experiments show that both MESH and an alternative scheme, end-to-end forward error correction, provide excellent error control with MESH incurring significantly less network overhead.

23 citations


09 Dec 1997
TL;DR: This work presents a token based mutual exclusion algorithm designed for an ad hoc distributed system that modifies a logical tree structure when link failures occur or when the token moves, thereby adapting to node mobility.
Abstract: The system considered in this paper is a mobile wireless network, commonly known as an ad hoc network. Mobile nodes in this dynamic topology function both as processors and routers to provide communication between nodes which are not within wireless transmission range. We present a token based mutual exclusion algorithm designed for an ad hoc distributed system. This mutual exclusion algorithm modifies a logical tree structure when link failures occur or when the token moves, thereby adapting to node mobility.

16 citations


Patent
08 Aug 1997
TL;DR: In this article, a handshaking procedure is used to prevent multiple nodes from being inadvertently assigned the same address, and an iterative power reduction scheme can be utilized to reduce the number of nodes in a wireless network.
Abstract: A method for installing a wireless network, which includes the steps of physically installing a plurality of nodes in respective different locations in a building, and using a wireless installation device to program a respective address into the nodes. The wireless installation device may also be used to program one or more default settings into the nodes, to verify operation of the nodes, and to dump information regarding the physical location and associated address of the nodes to a building computer. The wireless programming of the nodes is preferably accomplished using a software "handshaking" procedure which ensures that the address and default setting data is only loaded into the node currently being programmed, and not inadvertently into one or more other nearby nodes. In this connection, an iterative power reduction scheme can be utilized to prevent multiple nodes from being inadvertently assigned the same address.

3 citations