Literature Review on “ A Secure Key Management Model For Wireless Mesh Networks
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
seminar class
Active In SP

Posts: 5,361
Joined: Feb 2011
03-03-2011, 03:01 PM

Submitted By Shiv Mewada

.ppt   A Secure Key Management Model For WMNs.ppt (Size: 2.41 MB / Downloads: 112)
Literature Review on “ A Secure Key Management Model For Wireless Mesh Networks
• Wireless mesh network is an advanced form of wireless network.
• Wireless Mesh Networks (WMNs) represent a good solution to providing wireless Internet connectivity in a sizable geographic area;
• Wireless mesh networks (WMNs) are composed of two main node types, Wireless Mesh Clients (WMC) and Wireless Mesh Routers (WMR).
• The most commonly used technology in day to day life is desktops, laptops, PDA’s, Pocket PC’s, Phones etc.
• Wireless mesh networks (WMN) are multi-radio, multi-hop network with the ability of dynamically self-organized and self-configured, with the nodes in the network automatically establishing and maintaining mesh connectivity among themselves (creating, in effect, an ad-hoc network).
• Wireless mesh networks can be implemented with various wireless technologies including IEEE 802.11 (IEEE STANDERD)
• According to 802.11s standard Nodes in a mesh network can be divided into four classes, Client or Station (STA), Mesh Point (MP), Mesh Access Point (MAP) and Mesh Portal Point (MPP).
Current Wireless Systems
• Cellular phones and pagers -- provide connectivity for portable and mobile applications, both personal and business
• Global Positioning System (GPS) -- allows drivers of cars and trucks, captains of boats and ships, and pilots of aircraft to ascertain their location anywhere on earth
• Cordless computer peripherals -- the cordless mouse is a common example; keyboards and printers can also be linked to a computer via wireless
• Cordless telephone sets -- these are limited-range devices, not to be confused with cell phones
• Home-entertainment-system control boxes -- the VCR control and the TV channel control are the most common examples; some hi-fi sound systems and FM broadcast receivers also use this technology
• Remote garage-door openers -- one of the oldest wireless devices in common use by consumers; usually operates at radio frequencies
• Two-way radios -- this includes Amateur and Citizens Radio Service, as well as business, marine, and military communications
• Baby monitors -- these devices are simplified radio transmitter/receiver units with limited range
Satellite television -- allows viewers in almost any location to select from hundreds of channels
The important characteristics of a WMNs include:
• Multi-hop wireless network that:
– Extends coverage range without sacrificing channel capacity
– Improves connectivity among users without line of sight
• Support for ad hoc networking, and capability of self-forming,
self-healing, and self-organization.
• Mesh routers usually have minimal mobility, while mesh clients can be stationary or mobile nodes.
• Multiple types of network access
•wide coverage and cost reduction and
• Reliability
Wireless mesh networking has many possible applications
• Broadband home networking
• Community and neighborhood networking
• Enterprise networking
• Metropolitan area networking (MAN)
• Transportation systems (Timetable, delay info)
• Building automations
• Health and medical systems
• Security surveillance systems
• Emergency disaster system
• Industrial automation
• Office WLAN environment
The important capabilities of a mesh network include
• Self-configuring communication and routing
• • Ability to deal with hidden terminal problem
• • Installation, management, QoS and resource scheduling, security, co-existence
• • Interference management; interference-aware route construction
• – Including ad-hoc IP routing
• • Scheduling and collision detection and management

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Database management concepts seminar tips 9 3,818 23-07-2016, 02:17 PM
Last Post: Dhanabhagya
  Cut Detection in Wireless Sensor Networks pdf project girl 2 1,272 16-07-2015, 09:21 PM
Last Post: Guest
  Wireless Sensor Network Security model using Zero Knowledge Protocol seminar ideas 2 1,449 31-03-2015, 09:08 AM
Last Post: Guest
  secure atm by image processing jaseelati 0 286 10-02-2015, 01:33 PM
Last Post: jaseelati
  secure atm by image processing abstract jaseelati 0 351 23-01-2015, 03:08 PM
Last Post: jaseelati
  crime file management system er diagram jaseelati 0 441 17-01-2015, 04:35 PM
Last Post: jaseelati
  wireless video service in cdma systems wikipedia jaseelati 0 385 13-01-2015, 04:29 PM
Last Post: jaseelati
  computational intelligence in wireless sensor networks ppt jaseelati 0 368 10-01-2015, 03:10 PM
Last Post: jaseelati
  credit card fraud detection using hidden markov model project download jaseelati 0 295 10-01-2015, 01:34 PM
Last Post: jaseelati
  cyber cafe management system ppt jaseelati 0 296 07-01-2015, 01:31 PM
Last Post: jaseelati