We present a number of significant engineering insights on what makes a good configuration for medium- to large size wireless mesh networks (WMNs) when the objective function is to maximize the minimum throughput among all flows. For this, we first develop efficient and exact computational tools using column generation with greedy pricing that allow us to compute exact solutions for networks significantly larger than what has been possible so far. We also develop very fast approximations that compute nearly optimal solutions for even larger cases. Finally, we adapt our tools to the case of proportional fairness and show that the engineering insights are very similar.
Wireless LAN technology has often been approached cautiously in enterprise deployments, partly due to well-known and easily exploitable attacks on early 802.11 security technology and partly due to the lack of physical control of the access medium. Often the past several years, early interoperability forums, as well as the standardization of the 802.11i security amendment, have greatly improved the authentication, encryption and integrity security capabilities. This paper summarizes the technologies and challenges related to wireless mesh networks with the latest technologies in wireless LAN, WPA and 802.11i. It also contains both a study of security technologies and the threats to wireless mesh networks. The security technologies will cover current industry capabilities and 802.11s, and the overall security architecture. Enterprise deployments have finally begun to embrace wireless access networks.
Download your Reports for Wireless Mesh Networks