TY - CHAP A1 - Doug Kuhlman A2 - Ryan Moriarty A3 - Tony Braskich A4 - Steve Emeott A5 - Mahesh Tripunitara ED1 - Andrey V. Krendzel Y1 - 2012-08-14 PY - 2012 T1 - A Correctness Proof of a Mesh Security Architecture N2 - This book provides an in-depth look into recent advances in relation to novel design strategies and algorithms to improve performance and functionality of WMNs. Ten contributed chapters written by a group of well-known experts in wireless mesh networking are arranged in two parts. The first part of the book focuses on link scheduling schemes to select a subset of links for simultaneous transitions under interference constraints in an efficient and fair manner to guarantee a certain level of network connectivity. Besides, it describes channel assignment strategies to improve the network throughput in multi-radio multi-channel WMNs by means of an efficient channel utilization and minimization of the interference. The second part of the book addresses some important network planning issues related to efficient routing protocols in dynamic large-scale mesh environment, achievable capacity limit of a single wireless link between two multi-interface mesh nodes, the correctness of the mesh security architecture, fault-tolerant mesh network topology planning. BT - Wireless Mesh Networks SP - Ch. 8 UR - https://doi.org/10.5772/49051 DO - 10.5772/49051 SN - PB - IntechOpen CY - Rijeka Y2 - 2021-09-29 ER -