Experiments of multi-channel 802.11 wireless mesh networks with TCP proxies

Adam Kohn, K. L.Eddie Law

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Citation (Scopus)

Abstract

IEEE 802.11 wireless access technology is a possible candidate for constructing wireless mesh networks. However, multi-hop 802.11 wireless networks suffer heavy co-channel interference. In this paper, the 802.11-based networks are extended to operate using multi-radio multi-channel designs to inhibit the interference effects. Using a partially overlapped channel scenario and an orthogonal channel scenario, it has been confirmed that the introduction of multiple channels is capable of improving network performance. Despite these gains, TCP performance degrades exponentially with hop counts; therefore, wireless mesh networks may further be improved by adding an n-hop proxy service. In terms of hop counts, these proxies break long connections into relatively shorter connections with tighter transport layer control. A trade-off between the number of proxies and the length of proxies has become evident through testbed evaluation. With respect to this trade-off, the queuing delays at proxies and the amount of collisions over the lossy wireless links signify the need for a suitable protocol to control the efficient usage of multiple channels and proxies.

Original languageEnglish
Title of host publication2010 25th Biennial Symposium on Communications, QBSC 2010
Pages118-121
Number of pages4
DOIs
Publication statusPublished - 2010
Externally publishedYes
Event25th Queen's Biennial Symposium on Communications, QBSC 2010 - Kingston, ON, Canada
Duration: 12 May 201014 May 2010

Publication series

Name2010 25th Biennial Symposium on Communications, QBSC 2010

Conference

Conference25th Queen's Biennial Symposium on Communications, QBSC 2010
Country/TerritoryCanada
CityKingston, ON
Period12/05/1014/05/10

Fingerprint

Dive into the research topics of 'Experiments of multi-channel 802.11 wireless mesh networks with TCP proxies'. Together they form a unique fingerprint.

Cite this