A SURVEY OF ROUTING PROTOCOLS FOR WIRLESS MESH NETWORKS (WMNS)

Faculty Computer Science Year: 2012
Type of Publication: ZU Hosted Pages:
Authors:
Journal: (IJCSIS) International Journal of Computer Science and Information Security AL-AZHAR ENGINEERING TEWELFTH INTERNATIONAL CONFERENCE Volume:
Keywords : , SURVEY , ROUTING PROTOCOLS , WIRLESS MESH NETWORKS    
Abstract:
WMNs are undergoing rapid commercialization in many application scenarios such as providing internet access, extending the coverage of wireless local area networks (WLANs), community networking, building automation, high speed metropolitan area networks, and enterprise networking. WMNs are one of the few commonly implemented types of mobile ad-hoc networks (MANETs), so general MANET routing protocols can be used in WMNs. This paper surveys recent routing protocols for MANET routing protocols and discuss the new WMNs routing protocols recent used in market. Each protocol is described and discussed under the appropriate category. Moreover, the routing protocols will be compared via simulated and numerical results will be discussed. The paper concludes with open research issues in WMNs routing protocols area.
   
     
 
       

Author Related Publications

  • Nabil Ali Mohamed Lashen, "Copy-move forgery detection of duplicated objects using accurate PCET moments and morphological operators", THE IMAGING SCIENCE JOURNAL, 2018 More
  • Nabil Ali Mohamed Lashen, "Copy-for-duplication forgery detection in colour images using QPCETMs and subimage approach", IET Image processing, 2019 More
  • Nabil Ali Mohamed Lashen, "Copy-move forgery detection of duplicated objects using accurate PCET moments and morphological operators", The Imaging Science Journal, 2018 More
  • Nabil Ali Mohamed Lashen, "A Novel CAD System for Reliable Classification of Microcalcifications in Digital Mammograms", JOURNAL OF COMPUTER SCIENCE AND ENGINEERING, VOLUME 3, ISSUE 1, OCTOBER 2010, 2010 More
  • Nabil Ali Mohamed Lashen, "A comparison among Features Used in Offline Signature Verification Systems", JOURNAL OF COMPUTER SCIENCE AND ENGINEERING, VOLUME 3, ISSUE 2, OCTOBER 2010, 2010 More

Department Related Publications

  • Walid Ibrahim Ibrahim Khedr, "Ad-hoc on Demand Authentication Chain Protocol - An Authentication Protocol for Ad-Hoc Networks", Institute for Systems and Technologies of Information, Control and Communication, 2015 More
  • Khalied Mohamed Hosny, "Robust Color Image Hashing Using Quaternion Polar Complex Exponential Transform for Image Authentication", Springer, 2018 More
  • Khalied Mohamed Hosny, "Efficient compression of volumetric medical images using Legendre moments and differential evolution", Springer, 2020 More
  • Ehab Roshdy Mohamed, "Efficient compression of volumetric medical images using Legendre moments and differential evolution", Springer, 2020 More
  • Asmaa Mohamed Khalid Mohamed Abbas, "Efficient compression of volumetric medical images using Legendre moments and differential evolution", Springer, 2020 More
Tweet