Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1658997.1659023acmconferencesArticle/Chapter ViewAbstractPublication PagesconextConference Proceedingsconference-collections
poster

Practical DHT-based location service for wireless mesh networks

Published: 01 December 2009 Publication History

Abstract

Mobility management in Wireless Mesh Networks (WMN) is a hot topic still lacking a final, widely accepted, and deployed solution. The major drawbacks of existing proposals is the fact that they rely on some sort of flooding-based technique and very often they need support from end-users' devices. Flooding in wireless environments leads to increased latency and broadcast storm problems, thus providing low performances. In this paper, we argue that a DHT-based approach can overcome such limitations and provide an effective solution to the mobility management problem. A preliminary evaluation of our DHT-based scheme on a real WMN test-bed shows encouraging results when compared to previous solutions.

References

[1]
Meshdvnet. http://meshdvnet.lip6.fr/.
[2]
I. F. Akyildiz, X. Wang, and W. Wang. Wireless mesh networks: a survey. Computer Networks Journal (Elsevier), 47(4):445--487, 2005.
[3]
C. Guo, H. Wu, K. Tan, Q. Zhang, J. Song, J. Zhou, C. Huitema, and W. Zhu. End-system-based mobility support in ipv6. IEEE JSAC, 23(11):2104--17, November 2005.
[4]
S.-Y. Ni, Y.-C. Tseng, Y.-S. Chen, and J.-P. Sheu. The broadcast storm problem in a mobile ad hoc network. MobiCom'99: The 5th annual ACM/IEEE international conference on Mobile computing and networking, pages 151--162, 1999.
[5]
S. Zhuang, K. Lai, I. Stoica, R. Katz, and S. Shenker. Host mobility using an internet indirection infrastructure. ACM Wireless Networks, 11(06):741--56, November 2005.
[6]
I. Stoica, R. Morris, D. Karger, M.F. Kaashoek and H. Balakrishnan. Chord: A scalable peer-to-peer lookup service for internet applications. ACM SIGCOMM 2001, August 2001.

Cited By

View all
  • (2010)Secure Mechanism for Handling Targeted Attacks in Infrastructure Based Wireless Mesh NetworksInformation Security and Assurance10.1007/978-3-642-13365-7_23(233-240)Online publication date: 2010
  • (2010)Receiver Based Traffic Control Mechanism to Protect Low Capacity Network in Infrastructure Based Wireless Mesh NetworkInformation Security and Assurance10.1007/978-3-642-13365-7_22(225-232)Online publication date: 2010

Index Terms

  1. Practical DHT-based location service for wireless mesh networks

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      Co-Next Student Workshop '09: Proceedings of the 5th international student workshop on Emerging networking experiments and technologies
      December 2009
      68 pages
      ISBN:9781605587516
      DOI:10.1145/1658997

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 01 December 2009

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. dht
      2. location service
      3. mobility management
      4. wireless mesh network

      Qualifiers

      • Poster

      Conference

      Co-NEXT '09
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 198 of 789 submissions, 25%

      Upcoming Conference

      CoNEXT '24

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)2
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 23 Sep 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2010)Secure Mechanism for Handling Targeted Attacks in Infrastructure Based Wireless Mesh NetworksInformation Security and Assurance10.1007/978-3-642-13365-7_23(233-240)Online publication date: 2010
      • (2010)Receiver Based Traffic Control Mechanism to Protect Low Capacity Network in Infrastructure Based Wireless Mesh NetworkInformation Security and Assurance10.1007/978-3-642-13365-7_22(225-232)Online publication date: 2010

      View Options

      Get Access

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media