Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2816839.2816875acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiciipConference Proceedingsconference-collections
research-article

A Load Management Algorithm For Wireless Mesh Networks

Published: 23 November 2015 Publication History

Abstract

The WMN (Wireless Mesh Network) is a new emerging technology that can render the field of industrial network more efficient and profitable. Due to its versatility that allows a flexible configuration, this kind of network is commonly considered as a very suitable architecture for mobile clients. The difference between the WMNs and other dynamic networks, such as the MANET (Mobile Ad-hoc Network), is that the Mesh network contains static wireless nodes called MR (Mesh Routers). Consequently, the presence of this infrastructure makes the WMN more suitable to provide QoS (Quality of Service). However, the guarantee of QoS in a dynamic topology is a difficult task by comparison with static networks. These difficulties are caused by the random movement of the clients, the shared nature of the wireless channel, the complexity of multi-hop communications and most importantly the management of the traffic load forwarded through the MRs. In this paper, we propose a new algorithm for load balancing in WMN that can search for alternative paths in order to deviate from the loaded MRs. The proposed algorithm can operate with different metrics at the same time and applies the Genetic Algorithm in case there is a large population of possible solutions.

References

[1]
Akshai, A., Gandhi S., Chaubey N., Shah P. and Sadhwani M. 2012. AODVSEC: A Novel Approach To Secure Ad Hoc On-Demand Distance Vector (AODV) Routing Protocol From Insider Attacks In MANETS. 2012. International Journal of Computer Networks & Communications. 4, 4 (July 2012), 191--210. DOI= 10.5121/ijcnc.2012.4412.
[2]
Bambrik, I. and Didi F. 2015. A Novel Proactive Routing Method for Mobile Ad Hoc Networks. American Journal of Applied Sciences. 12, 6 (July 2015), 382--402. DOI= 10.3844/ajassp.2015.382.402.
[3]
Carlson, E., Karl H., Wolisz A. and Prehofer C. 2006. A Distributed End-to-End Reservation Protocol for IEEE 802.11-Based Wireless Mesh Networks. Selected Areas in Communications, IEEE Journal. 24, 11 (October 2006), 2018--2027. DOI= 10.1109/JSAC.2006.881633.
[4]
Castelli, M., Manzoni L. and Vanneschi L. 2011. The effect of Selection from Old Populations in Genetic Algorithms. In Proceedings of the 13th annual conference companion on Genetic and evolutionary computation, Dublin, Ireland (July 2013), 161--162. DOI= 10.1145/2001858.2001948.
[5]
Clausen, T. and Jacquet P. 2003. Optimized Link State Routing Protocol. IETF Internet-Draft. https://www.ietf.org/rfc/rfc3626.txt.
[6]
Day, K., Touzene A., Arafeh B. and Alzeidi N. 2011. Parallel Rrouting In Mobile Ad Hoc Networks. International Journal of Computer Networks & Communications. 3, 5 (September 2011), 77--94. DOI= 10.5121/ijcnc.2011.3506.
[7]
Dorigo, M. and Gambardella L. M. 1997. Ant colony system: a cooperative learning approach to the traveling salesman problem{J}. IEEE Trans. on Evolutionary Computation. 1, 1 (April 1997), 53--66. DOI= 10.1109/4235.585892.
[8]
Douglas, S., De Couto J., Daniel A., Bicket J. and Robert M. 2003. A High-Throughput Path Metric for Multi-Hop Wireless Routing. In Proceedings of the 9th annual international conference on Mobile Computing and Networking, New York, USA (September 2003), 134--146. DOI= 10.1145/938985.939000.
[9]
Gerla, M., Pei G., Xiaoyan H. and Tsu-Wei C. 2002. Fisheye State Routing protocol for ad hoc networks. IETF Internet-Draft. http://tools.ietf.org/html/draft-ietf-manet-fsr-01.
[10]
Gopalakrishnan, S. and Ganeshkumar P. 2014. Intrusion Detection In Mobile Ad Hoc Network Using Secure Routing For Attacker Identification Protocol. American Journal of Applied Sciences. 11, 8 (August 2014), 1391--1397. DOI= 10.3844/ajassp.2014.1391.1397.
[11]
Gopalakrishnan, S. and Ganeshkumar P. 2015. Secure and Efficient Transmission in Mobile Ad hoc Network to Identify the Fake ID's Using Fake ID Detection Protocol. Journal of Computer Science. 11, 2 (February 2015), 391--399. DOI= 10.3844/jcssp.2015.391.399.
[12]
IEEE 802.11s Task Group. 2008. Draft Amendment to Standard for Information Technology Telecommunications and Information Exchange Between Systems-LAN/MAN Specific Requirements-Part 11: Wireless Medium Access Control (MAC) and Physical Layer (PHY) specifications: Amendment: ESS Mesh Networking, IEEE P802.11s/D2.02.
[13]
Johnson, D., Hu Y. and Maltz D. 2007. The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks for IPv4. IETF Internet-Draft. https://www.ietf.org/mail-archive/web/ietf-announce/current/msg03407.html.
[14]
Juan, J. G., Ruiz P. M. and Skarmeta A. F. G. 2008. A Distributed Algorithm for Gateway Load-Balancing in Wireless Mesh Networks. In Proceeding of Wireless Days 08, Dubai (November 2008), 1--5. DOI= 10.1109/WD.2008.4812861.
[15]
Kai, Y., Jian-feng M. and Miao Z. 2009. Hybrid Routing Protocol for Wireless Mesh Network. In Proceeding of the International Conference on Computational Intelligence and Security 09, Beijing (March 2009), 547--551. DOI= 10.1109/CIS.2009.48.
[16]
Kanniche, H., Louati F., Frikha M. and Kamoun F. 2011. A QoS Routing Protocol Based On Available Bandwidth Estimation For Wireless Ad Hoc Networks. International Journal of Computer Networks & Communications. 3, 1 (January 2011), 219--239. DOI= 10.5121/ijcnc.2011.3114.
[17]
Kone, V., Das S., Zhao B. Y. and Zheng H. 2007. QUORUM-Quality Of Service in Wireless Mesh Networks. Mobile Networks and Applications. 12, 6 (December 2007), 358--369. DOI= 10.1007/s11036-008-0050-8.
[18]
Liang, M. and Denko M. K. 2007. A Routing Metric for Load-Balancing in Wireless Mesh Networks. 21st International Conference on Advanced Information Networking and Applications Workshops 07, Niagara Falls, Ont (May 2007), 409--414. DOI= 10.1109/AINAW.2007.50.
[19]
Marina, M. K. and Das S. R. 2006. Ad hoc On-demand Multipath Distance Vector routing, Wireless Communications And Mobile Computing. 6, 7 (November 2006), 969--988. DOI= 10.1002/wcm.432.
[20]
Mohammad, K. J., Jamali M. A. J. and Akbarpour S. 2013. A New Unicast Routing Algorithm for Load Balancing in Multi-Gateway Wireless Mesh Networks. International Journal of Computer Networks and Communications Security. 1, 6 (November 2013), 252--256. http://www.ijcncs.org/published/volume1/issue6/p6_1-6.pdf
[21]
Perkins, C. E., Belding R. E. and Das S. R. 2003. Ad hoc On-demand Distance Vector Routing. IETF Internet-Draft. https://www.ietf.org/rfc/rfc3561.txt.
[22]
Poonkuzhali, R., Yakub S. M. and Annaji S. 2014. A Premeetive Link State Spanning Tree Source Routing Protocol For Mobile Ad Hoc Networks. Journal of Computer Science. 10, 1 (January 2014), 85--90. DOI= 10.3844/jcssp.2014.85.90.
[23]
Sen, J. 2010. A Throughput Optimizing Routing Protocol for Wirless Mesh Networks. In Proceedings of the 12th IEEE International Conference on High Performance Computing and Communications, Melbourne, VIC Australia (September 2010), 665--670. DOI= 10.1109/HPCC.2010.33.
[24]
Senthil M. T. and Eswariah K. 2013. Link Stability With Energy Aware Ad Hoc On Demand MultiPath Routing Protocol In Mobile Ad Hoc Networks. American Journal of Applied Sciences. 10, 8 (August 2013), 844--848. DOI= 10.3844/ajassp.2013.844.848.
[25]
Sidi, O. C., Hassan M. M. and Geuroui A. 2013. New Metric For HWMP Protocol. International Journal of Computer Networks & Communications. 5, 2 (March 2013), 49--58. DOI= 10.5121/ijcnc.2013.5204.
[26]
Song, L., Jie C. and Yang X. 2010. Multi-path Anycast Routing Based on Ant Colony Optimization in Multi-gateway WMN. In Proceedings of the 5th International Conference on Computer Science & Education, Hefei (August 2010), 1694--1698. DOI= 10.1109/ICCSE.2010.5593635.
[27]
Sun Microsystems. 1995. www.java.com.
[28]
Xue, Q. and Ganz A. 2002. QoS routing for Mesh-based Wireless LANs. International Journal of Wireless Information Networks. 9, 3 (July 2002), 179-190. DOI= 10.1023/A:1016085627790.

Index Terms

  1. A Load Management Algorithm For Wireless Mesh Networks

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    IPAC '15: Proceedings of the International Conference on Intelligent Information Processing, Security and Advanced Communication
    November 2015
    495 pages
    ISBN:9781450334587
    DOI:10.1145/2816839
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 23 November 2015

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Genetic Algorithm
    2. Mesh Routers
    3. QoS
    4. WMN
    5. mobile clients
    6. traffic load

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    IPAC '15

    Acceptance Rates

    Overall Acceptance Rate 87 of 367 submissions, 24%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 61
      Total Downloads
    • Downloads (Last 12 months)3
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 01 Nov 2024

    Other Metrics

    Citations

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media