Wireless mesh networks

Published on Dec 1, 2008in Journal of Telemedicine and Telecare 3.05
· DOI :10.1258/jtt.2008.008003
Xinheng Wang15
Estimated H-index: 15
(Swansea University)
Abstract
Wireless telemedicine using GSM and GPRS technologies can only provide low bandwidth connections, which makes it difficult to transmit images and video. Satellite or 3G wireless transmission provides greater bandwidth, but the running costs are high. Wireless networks (WLANs) appear promising, since they can supply high bandwidth at low cost. However, the WLAN technology has limitations, such as coverage. A new wireless networking technology named the wireless mesh network (WMN) overcomes some of the limitations of the WLAN. A WMN combines the characteristics of both a WLAN and ad hoc networks, thus forming an intelligent, large scale and broadband wireless network. These features are attractive for telemedicine and telecare because of the ability to provide data, voice and video communications over a large area. One successful wireless telemedicine project which uses wireless mesh technology is the Emergency Room Link (ER-LINK) in Tucson, Arizona, USA. There are three key characteristics of a WMN: self-o...
  • References (5)
  • Citations (286)
Cite
References5
Published on Apr 1, 2006in Bt Technology Journal
H. S. Ng2
Estimated H-index: 2
,
Moh Lim Sim11
Estimated H-index: 11
+ 1 AuthorsC. C. Wong1
Estimated H-index: 1
Wireless telemedicine is a new and evolving area in telemedical and telecare systems. Healthcare personnel require realtime access to accurate patient data, including clinical histories, treatments, medication, tests, laboratory results and insurance information. With large-scale wireless networks and mobile computing solutions, such as cellular 3G, Wi-Fi mesh and WiMAX, healthcare personnal can tap into vital information anywhere and at any time within the healthcare networks. The recent introd...
69 Citations Source Cite
Published on Dec 1, 2004 in International Conference of the IEEE Engineering in Medicine and Biology Society
Yuan-Hsiang Lin5
Estimated H-index: 5
(National Taiwan University),
I-Chien Jan1
Estimated H-index: 1
(National Taiwan University)
+ 3 AuthorsG. J. Jan6
Estimated H-index: 6
This paper proposes a mobile patient monitoring system, which integrates current personal digital assistant (PDA) technology and wireless local area network (WLAN) technology. At the patient's location, a wireless PDA-based monitor is used to acquire continuously the patient's vital signs, including heart rate, three-lead electrocardiography, and SpO/sub 2/. Through the WLAN, the patient's biosignals can be transmitted in real-time to a remote central management unit, and authorized medical staf...
315 Citations Source Cite
Published on May 1, 2008
Xinheng Wang15
Estimated H-index: 15
(Swansea University),
Muddesar Iqbal4
Estimated H-index: 4
(Kingston University),
Xu Zhou3
Estimated H-index: 3
(Xidian University)
This paper presents a new wireless networking technology, wireless mesh networks (WMN), for healthcare. The WMN architecture, characteristics, advantages and its potential applications in healthcare are discussed. Furthermore, a dual-radio WMN testbed, SwanMesh, has been developed to evaluate the applications of WMN in healthcare. This paper presents the architecture, security, and management of SwanMesh. The basic network performance in terms of bandwidth and delays are also evaluated. The test...
21 Citations Source Cite
Published on Dec 1, 2003in Journal of Telemedicine and Telecare 3.05
Sun K. Yoo14
Estimated H-index: 14
(Yonsei University),
In-Cheol Park23
Estimated H-index: 23
(Yonsei University)
+ 4 AuthorsD.J. Kim16
Estimated H-index: 16
(Yonsei University)
Two different prototype mobile telemedicine systems were constructed for use in the emergency room. They could transmit physiological signals as well as video pictures and sound. One device, the mobile emergency bed (MEB), was powered by battery and had a wireless connection to the local-area network (LAN). For the other, the mobile emergency server (MES), a patient monitor, video-camera and microphone were connected by a radio-frequency link to a server. A functional evaluation and a clinical e...
7 Citations Source Cite
Published on Jan 1, 2006in Johns Hopkins Apl Technical Digest
Tia Gao12
Estimated H-index: 12
,
Logan Hauenstein3
Estimated H-index: 3
+ 4 AuthorsDavid M. White4
Estimated H-index: 4
p at a disaster scene can greatly benefit from technologies that continuously moniatients at a disaster scene can greatly benefit from technologies that continuously monitor their vital status and track their location until they are admitted to a hospital. We have designed and developed a real-time patient monitoring system that integrates vital signs sensors, location sensors, ad hoc networking, electronic patient records, and web portal technology to allow remote monitoring of patient status. ...
10 Citations
Cited By286
Published on Aug 27, 2012in World applied sciences journal
Mohammad Siraj3
Estimated H-index: 3
(Universiti Teknologi Malaysia),
Kamalrulnizam Abu Bakar16
Estimated H-index: 16
2 Abstract:In recent years, wireless mesh networks have become more popular than ever. They are now called as last mile internet connectivity. WMN has the advantage of robust fault tolerance. Even if some of the mesh nodes are incapable, there exist many other alternative nodes to serve relay. In addition, multi-hop of WMN can not only spread coverage but also save both cabling cost and human resource. A common problem in WMN is the performance degradation with multiple hops. This is due to the ...
3 Citations Source Cite
Published on Nov 19, 2012 in Multiple Access Communications
Alexander A. Safonov8
Estimated H-index: 8
(Indian Institute of Technology Patna),
Andrey I. Lyakhov12
Estimated H-index: 12
(Indian Institute of Technology Patna)
+ 1 AuthorsOlga D. Sokolova2
Estimated H-index: 2
(ICM Partners)
We study the problem of wireless groupcast routing when multiple transmission methods are available. The paper is inspired by GroupCast with Retries (GCR) methods appeared in IEEE 802.11aa in 2012. The paper contributes with comparative analysis of GCR methods in a wireless multihop network from the groupcast routing perspective. It also addresses the issue of possible benefit for a routing protocol to account for this palette of transmission methods.
4 Citations Source Cite
Published on Dec 15, 2012 in International Conference on Information Systems Security
Rakesh Matam5
Estimated H-index: 5
(Indian Institute of Technology Patna),
T. Somanath5
Estimated H-index: 5
(Indian Institute of Technology Patna)
Wormhole attack is one of the most severe security threats on wireless mesh network. Unfortunately, most of the existing wormhole defence mechanisms are not secure against wormhole attacks while launched in participation mode. In this paper, we propose a wormhole defence mechanism (WDM), which operates in conjunction with any underlying routing protocol to detect the presence of wormhole during route discovery. The mechanism is based on the unit-disk graph model which defines necessary and suffi...
3 Citations Source Cite
Published on Sep 1, 2015in Journal of Network and Computer Applications 3.99
Apostolos Malatras9
Estimated H-index: 9
(Institute for the Protection and Security of the Citizen)
Abstract P2P overlay networks have attracted significant research interest due to their utility as virtualized abstractions of complex network infrastructures, optimized to satisfy specific criteria, e.g. minimum delay or shortest diameter. In the context of modern pervasive environments, which are characterized by complexity, heterogeneity, dynamicity, and mobility in terms of the underlying networks, the utilization of P2P overlays accordingly offers a series of advantages by countering the af...
33 Citations Source Cite
Published on Jan 1, 2015in Procedia Computer Science
Martin Roth4
Estimated H-index: 4
(Leipzig University),
Ralf Hasler1
Estimated H-index: 1
(Leipzig University)
+ 1 AuthorsBogdan Franczyk10
Estimated H-index: 10
(Leipzig University)
Abstract Driven by falling prices, continuous miniaturization and increasing functionality, low power wireless networks tap into new application areas. But an efficient utilization of embedded systems is hindered by lacks in interoperability and flexibility, because they are proprietary. In this paper, an approach for an abstraction layer in the area of embedded systems with respect to low power wireless networks is presented. This layer is used to harmonize interfaces between network-node and a...
4 Citations Source Cite
Published on May 1, 2016in Wireless Networks 1.98
Chun-Cheng Lin13
Estimated H-index: 13
(National Chiao Tung University),
Pei-Tsung Tseng1
Estimated H-index: 1
(National Chiao Tung University)
+ 1 AuthorsDer-Jiunn Deng18
Estimated H-index: 18
(National Changhua University of Education)
The problem of dynamic router node placement (dynRNP) in wireless mesh networks (WMNs) is concerned with determining a dynamic geographical placement of mesh routers to serve mobile mesh clients at different times, so that both network connectivity (i.e., the greatest topology subgraph component size) and client coverage (i.e., the number of the served mesh clients) are maximized. Mesh clients are wireless devises associated with users, and in real world, the users with same interests or some so...
5 Citations Source Cite
Published on Jul 1, 2008 in Autonomous Infrastructure, Management and Security
Sara Bury2
Estimated H-index: 2
(Lancaster University),
Nicholas J. P. Race12
Estimated H-index: 12
(Lancaster University)
Wireless Mesh Networks are an increasingly common technology providing connectivity in many communities, particularly where Internet access is unavailable or restricted via more conventional means. Their comparative ease of installation and relatively low cost makes this especially true for communities which might previously have lacked the technical knowledge or skill to attempt such an endeavour. In such a situation it is important that the operation of the network should be easily manageable;...
1 Citations Source Cite
Published on Sep 1, 2012 in Wireless Personal Multimedia Communications
Hironori Kusumoto1
Estimated H-index: 1
(Nagoya University),
Hiraku Okada16
Estimated H-index: 16
(Nagoya University)
+ 1 AuthorsMasaaki Katayama17
Estimated H-index: 17
(Nagoya University)
In this paper, we propose applying to MU-MIMO (Multi-User Multiple-Input Multiple-Output) to wireless mesh networks. If the number of packets which have the same receiving node are not enough, SU-MIMO (Single-User MIMO) cannot take an advantage of the capacity enhancement by the spatial multiplexing. By contrast, MU-MIMO is expected to enlarge the efficiency because it can simultaneously transmit packets to multiple receiving nodes. The hidden node problem is, however, an important problem in wi...
2 Citations
Published on Jan 1, 2013in arXiv: Cryptography and Security
Jaydip Sen16
Estimated H-index: 16
(Tata Consultancy Services)
This chapter presents a detailed survey on various aspects on security and privacy issues in Wireless Mesh Networks. The chapter is written both for the general readers as well as for the experts in the relevant areas. Future research issues and open problems are also mentioned so that the researchers could find appropriate directions to go ahead with their research works after reading the presented materials in this work.
19 Citations Source Cite
Published on Oct 15, 2014 in International Workshop on Combinatorial Algorithms
Tommi Larjomaa1
Estimated H-index: 1
(Aalto University),
Alexandru Popa8
Estimated H-index: 8
(Masaryk University)
In this paper we introduce and study a new problem named min-max edge q -coloring which is motivated by applications in wireless mesh networks. The input of the problem consists of an undirected graph and an integer q. The goal is to color the edges of the graph with as many colors as possible such that: (a) any vertex is incident to at most q different colors, and (b) the maximum size of a color group (i.e. set of edges identically colored) is minimized. We show the following results: 1. Min-ma...
2 Citations Source Cite