A SURVEY OF ROUTING PROTOCOLS FOR WIRLESS MESH NETWORKS (WMNS)

Faculty Computer Science Year: 2012
Type of Publication: ZU Hosted Pages:
Authors:
Journal: (IJCSIS) International Journal of Computer Science and Information Security AL-AZHAR ENGINEERING TEWELFTH INTERNATIONAL CONFERENCE Volume:
Keywords : , SURVEY , ROUTING PROTOCOLS , WIRLESS MESH NETWORKS    
Abstract:
WMNs are undergoing rapid commercialization in many application scenarios such as providing internet access, extending the coverage of wireless local area networks (WLANs), community networking, building automation, high speed metropolitan area networks, and enterprise networking. WMNs are one of the few commonly implemented types of mobile ad-hoc networks (MANETs), so general MANET routing protocols can be used in WMNs. This paper surveys recent routing protocols for MANET routing protocols and discuss the new WMNs routing protocols recent used in market. Each protocol is described and discussed under the appropriate category. Moreover, the routing protocols will be compared via simulated and numerical results will be discussed. The paper concludes with open research issues in WMNs routing protocols area.
   
     
 
       

Author Related Publications

  • Nabil Ali Mohamed Lashen, "Copy-move forgery detection of duplicated objects using accurate PCET moments and morphological operators", THE IMAGING SCIENCE JOURNAL, 2018 More
  • Nabil Ali Mohamed Lashen, "Copy-for-duplication forgery detection in colour images using QPCETMs and subimage approach", IET Image processing, 2019 More
  • Nabil Ali Mohamed Lashen, "Copy-move forgery detection of duplicated objects using accurate PCET moments and morphological operators", The Imaging Science Journal, 2018 More
  • Nabil Ali Mohamed Lashen, "A Novel CAD System for Reliable Classification of Microcalcifications in Digital Mammograms", JOURNAL OF COMPUTER SCIENCE AND ENGINEERING, VOLUME 3, ISSUE 1, OCTOBER 2010, 2010 More
  • Nabil Ali Mohamed Lashen, "A comparison among Features Used in Offline Signature Verification Systems", JOURNAL OF COMPUTER SCIENCE AND ENGINEERING, VOLUME 3, ISSUE 2, OCTOBER 2010, 2010 More

Department Related Publications

  • Walid Ibrahim Ibrahim Khedr, "Enhanced inter-ASN handover authentication scheme for IEEE 802.16m network", Institution of Engineering and Technology United Kingdom, 2015 More
  • Walid Ibrahim Ibrahim Khedr, "Improved Lightweight Authentication Scheme For Ieee 802.11P Vehicle-to-Infrastructure Communications", Old City Publishing, Inc., USA, 2015 More
  • Khalied Mohamed Hosny, "Deep Learning and Optimization-Based Methods for Skin Lesions Segmentation: A Review", IEEE, 2023 More
  • Ehab Roshdy Mohamed, "Deep Learning and Optimization-Based Methods for Skin Lesions Segmentation: A Review", IEEE, 2023 More
  • Duaa Saad AbdelHamid Shora, "Deep Learning and Optimization-Based Methods for Skin Lesions Segmentation: A Review", IEEE, 2023 More
Tweet