Sie sind auf Seite 1von 15

Capacity of Hybrid Wireless Mesh

Networks with Random APs


Weihuang Fu, Member, IEEE, and Dharma P. Agrawal, Fellow, IEEE
AbstractIn conventional Wireless Mesh Networks (WMNs), multihop relays are performed in the backbone comprising of
interconnected Mesh Routers (MRs) and this causes capacity degradation. This paper proposes a hybrid WMN architecture that the
backbone is able to utilize random connections to Access Points (APs) of Wireless Local Area Network (WLAN). In such a proposed
hierarchal architecture, capacity enhancement can be achieved by letting the traffic take advantage of the wired connections through
APs. Theoretical analysis has been conducted for the asymptotic capacity of three-tier hybrid WMN, where per-MR capacity in the
backbone is first derived and per-MC capacity is then obtained. Besides related to the number of MR cells as a conventional WMN, the
analytical results reveal that the asymptotic capacity of a hybrid WMN is also strongly affected by the number of cells having AP
connections, the ratio of access link bandwidth to backbone link bandwidth, etc. Appropriate configuration of the network can drastically
improve the network capacity in our proposed network architecture. It also shows that the traffic balance among the MRs with AP
access is very important to have a tighter asymptotic capacity bound. The results and conclusions justify the perspective of having such
a hybrid WMN utilizing widely deployed WLANs.
Index TermsAccess points, asymptotic capacity, WLAN, wireless mesh networks, mesh routers

1 INTRODUCTION
W
IRELESS Mesh Network (WMN) [1] is emerging as a
promising technology in providing ubiquitous high-
speed service for Mobile Clients (MCs), also called mesh
clients. Mesh routers (MRs) play an essential role in a
WMN, which provides service for MCs on one hand;
forward data packets via wireless link to neighboring MRs
on the other hand. Interconnected MRs form the backbone
of a WMN, where several special MRs connecting to the
Internet with wired cables are called Internet Gateways
(IGWs). By taking advantage of wireless multihop forward-
ing [2], deployment of MRs poses much less constraints as
they can be deployed on electric poles or house rooftop.
Such deployment feasibility enables a WMN to provide low
cost metro-scale coverage for MCs access.
The major challenge ina WMNis the capacity degradation
problem caused by the interference on a single or multiple
routing paths during multihop transmission. Although the
network architecture of any WMNis different froman adhoc
network, the asymptotic capacity bound derived by the
analytical work in [3] is still valid for a WMN backbone. Per-
MR capacity of a randomly deployed backbone with ad hoc
routing can be given by

`
1
log `
1
_
_ _
.
where \ denotes the maximum backbone link data
transmission rate between a pair of neighboring MRs and
`
1
denotes the number of MRs. It is obvious that the size of
the network is largely constrained by requirements of per-
MR capacity. By optimizing the locations of MRs, per-MR
capacitycanbe improvedbya factor of (

log `
1
_
). Actually,
MRs need not have access to A/C power as energy can be
supplied from self-equipped solar panels. MRs can even be
dropped anywhere required. Then, per-MR asymptotic
capacity can be said to approach (
\

`
1
_
).
By deploying IGWs in the network, the whole WMN
forms multiple clusters where each cluster is led by an IGW
and constraints MRs closer to the IGW. Readers interested in
various cluster construction methods are suggested to refer
to [4]. After IGW clusters are formed, the traffic between the
MRs in different clusters, i.e., intercluster traffic, are directed
to their associated IGWs and utilize the wired connections
between the IGWs. A similar network architecture is the
hybrid ad hoc networks, where infrastructures are inter-
connected with wired cables and deliver data packets for ad
hoc clients in a single or multiple hops, as shown in Fig. 1a.
The capacity of such an ad hoc network with infrastructure
has been investigated in [5], [6], and [7]. Due to random
deployment, connectivity has a major impact on the
performance. Two geometrically closeby MCs may have a
very long routing path due to weak network connectivity.
Recent results [6] indicate that per-MC capacity under
strong connectivity can achieve (
\
/
log `
C
), where `
C
denotes
the number of MCs and \
/
denotes the total bandwidth.
Bandwidth \
/
is shared by all MCs for ad hoc connection or
the connection to infrastructure with time division multiple
access (TDMA) scheduling.
Different from an ad hoc network, a WMN is possible to
reduce the random effect and improve the network capacity
by appropriately deploying MRs. The effect of the number
of IGWs in a WMN is discussed in [8], where MCs are
connected to MRs in a single hop. When the number of
arbitrary deployed IGWs is .(

`
1
_
), the asymptotic
136 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 12, NO. 1, JANUARY 2013
. The authors are with the Department of Computer Science, University of
Cincinnati, Cincinnati, OH 45221. E-mail: {fuwg, dpa}@cs.uc.edu.
Manuscript received 23 July 2009; revised 6 May 2010; accepted 4 Nov. 2011;
published online 15 Nov. 2011.
For information on obtaining reprints of this article, please send e-mail to:
tmc@computer.org, and reference IEEECS Log Number TMC-2009-07-0299.
Digital Object Identifier no. 10.1109/TMC.2011.244.
1536-1233/13/$31.00 2013 IEEE Published by the IEEE CS, CASS, ComSoc, IES, & SPS
capacity increases with the number of IGWs, as long as data
is denominated by the intercluster traffic through the IGWs.
If the network capacity needs to fully explore IGWs,
adequate number of IGWs need to be deployed, which
poses restrictions on the deployment of MRs. When
the number of IGWs is O(

`
1
_
), MRs in a cluster with a
single IGW have to be designed to have information about
the complete network topology so as to perform routing
functions without involving the IGW. Otherwise, the
capacity is constrained by the IGWs and the capacity may
be worse than that of ad hoc routing in the backbone.
Having the whole network information at the MRs may lead
to excessive overhead and may not facilitate easy manage-
ment of the clustering approach.
It is noted that MRs, MCs, and IGWs in [8] share the same
spectrum with TDMA scheduling, which are different from
a common two-tier WMN. The role played by MR in [8] is
more like a relay that has additional forwarding function to
MC. It has been pointed out in [9] that current IEEE 802.11
MAC protocol cannot achieve a reasonable throughput as
the number of hops increases to four or higher. A two-tier
WMN illustrated in Fig. 1b employs dedicated spectrum for
the backbone and different spectrum for access link between
MR and MC. MCs can use IEEE 802.11, which has been
widely adopted for Wireless Local Area Network (WLAN)
connection. As different notations used in Fig. 1b for
backbone links and access links, MRs can have two types
of wireless interfaces and use multichannel multiradio [10],
[11] for backbone connections.
The analysis in the paper will show that the asymptotic
capacity can be further enhanced with our proposed hybrid
WMN architecture, wherein WMN is augmented by the
presence of wired Access Points (APs). WLAN technology is
popular to provide network access for clients. However,
limited coverage can only support relatively small region,
like area within a house or an office. Extending the coverage
by multiple co-deployed APs requires availability of wired
cables at the AP locations. Second, deploying multiple APs
in a large coverage area leads to serious inter-WLAN
interference and throughput degradation [2], [12]. In
addition, the Medium Access Control (MAC) layer of APs
cannot support handover for MCs. Although many APs can
be deployed, it is still not feasible to provide seamless
coverage in a city by APs without huge investment on cables
and it is not efficient for APs to provide service directly to
MCs. The use of APs in WMN needs to be explored.
In this paper, we propose to have a higher capacity
bound for a WMN with three-tier hybrid network archi-
tecture by exploring random AP connections, where MR is
allowed to connect to the APs in its coverage. The proposed
network architecture is illustrated in Fig. 2. Backbone links
use a dedicated spectrum with bandwidth \ bps. MRs and
IGWs employ multiple orthogonal channels to isolate
interference regions. Each MR is equipped with multiple
radios that are able to operate on different channels
simultaneously. While two neighboring MRs employ the
same channel, a link is formed between them and such a
link is called a backbone link. MRs also provide access to
the MCs around its neighborhood. The total data rate
available for the network access is 1 bps, with a dedicated
wireless interface for the access link. APs operate on access
link spectrum, which shares bandwidth 1 with MCs. The
impact on capacity from APs is related to the deployment.
MRs and IGWs are predeployed by Internet Service
Provider (ISP) at planned locations for constructing a
WMN backbone. In contrast, APs are randomly deployed
by users and the connection between AP and MR is
random. APs could be turned off by the users and new
APs could appear to be active. The number of APs could be
changing over time. We take the random deployment of
APs into account. As we can see from Fig. 1b, two-tier
WMN connects to the Internet through a backbone link to
IGWs. On the other hand, Fig. 2 shows three-tier WMN to
have a random connection to the Internet through access
links via APs. In a later analysis, we show that the ratio of 1
to \ has a very important effect on the network capacity,
besides the number of APs.
Random deployment, random connection, and using
access link spectrum are the special attributes of employing
unsystematic APs as an additional third tier for a WMN.
There are significant advantages of having such connec-
tions. The number of hops that traffic transfers in the
backbone is reduced by utilizing the wired connection of
APs. As a result, end-to-end delay is also decreased. The
network coverage can also be enhanced as MRs have good
outdoor coverage while APs have better indoor coverage.
Knowing that WLANs and WMNs are different networks,
our scheme provides cooperation between WMN and
WLANs by utilizing the residual capacity of WLANs.
The focus of different environment enables two types of
FU AND AGRAWAL: CAPACITY OF HYBRID WIRELESS MESH NETWORKS WITH RANDOM APS 137
Fig. 2. Proposed three-tier hybrid WMN with random AP connections.
Fig. 1. Network architecture.
networks to work together. This three-tier WMN achieves
capacity enhancement at near no additional cost as
WLANs are already deployed. It is compatible with
current wireless network technology and facilitates current
MCs to explore that.
Our main contributions are:
. Proposing a novel network architecturea hybrid
WMN, which will have a higher capacity than a
conventional WMN. Presence of APs in the deploy-
ment area of conventional WMNs is assumed and
access links for the connections to MRs are used.
Thus, from the network architecture view, existing
WMN is extended with new elementsAPs and a
newlink typeAP-MR link, and translates a two-tier
network into a three-tier network;
. Applying analytical model to the proposed network
architecture;
. Deriving an asymptotic capacity value for MRs and
MCs under various conditions; and
. Analyzing the impact of the number of MR with
randomly located AP access, ratio of backbone link
bandwidth to access link bandwidth, etc.
The rest of this paper is organized as follows: The system
model is presented in Section 2. Section 3 performs the per-
MR capacity with various traffics, and Section 4 analyzes
the per-MC capacity under grid deployed MRs and random
AP access. The effects of network elements and comparison
with other networks are discussed in Section 5. Finally, the
paper is concluded in Section 6.
2 NETWORK MODEL AND ANALYSIS
The backbone of a WMN consists of MRs and IGWs,
where the MRs and the IGWs are wireless interconnected
to each other and provide service to the MCs. Multiple
IGWs divide a WMN into several clusters such that each
one is led by an IGW. We investigate such an IGW cluster
shown in Fig. 2. MRs in the cluster is homogeneous that
have the same backbone and access link transmission
region. Due to interference among neighboring MRs, they
have to share wireless resources in the frequency domain
and/or time domain.
If an AP is present in the transmission range of an MRcell,
MR can access the AP, as shown in Fig. 2. The connection
between the MR and the AP is also an access link, which
shares bandwidth with the MCs it is serving. We call the MR
with AP connection as AP-MR and the MR without AP
connection as non-AP-MR. While we use term MR
without specifying this, and it means both kinds of MRs.
The number of AP-MRs is denoted by `

. The locations of
`

AP-MRs in `
1
MRs are assumed to be uniformly
distributed. APs and IGWs have wired connection to the
Internet as shown in Fig. 2. The bandwidth of wired
connection to APs and IGWs is assumed to be large enough
so as not to pose any constraint on the network capacity.
Fig. 3 shows two examples for random AP connections,
which is a portion of the network shown in Fig. 2. There are
two types of routings that can benefit from the random AP
connections. While the traffic is between two MRs, the
routing in a conventional WMN is relayed by MRs in the
backbone, denoted by the dotted line in Fig. 3a. With
the inclusion of APs, it can also select the routing path going
through the wired Internet, denoted by the dashed line in
Fig. 3a. By such an alternative routing path, the traffic at MRs
in backbone can be reduced. It also diminishes the inter-
ference in the backbone. As a result, the capacity can be
enhanced. Similarly, when the traffic is between MR and
IGW, the alternative path can go through the AP and the
wired connection to the IGW, denoted by the dashed line in
Fig. 3b. The conventional routing path, denotedby the dotted
line in the figure, could easily cause congestion at the IGW.
2.1 Hybrid WMN Architecture
The network is modeled as shown in Fig. 4, where grid
deployed MRs are indicated by blue circles, the IGW is
indicated by red rectangles, randomly distributed MCs are
indicated by green dots, and APs are indicated by dark
triangles. The three tiers of a hybrid WMN are: MCs in the
first tier (the first column in Fig. 4a) connect to the MRs in the
second tier. Each MR provides network access service for
multiple MCs. MRs in the second tier also interconnect to
each other. So, the traffic from MCs can exchange via the
connections among MRs in the second tier. There is one IGW
in the second layer to provide Internet access to MRs. The
third tier includes APs which are connected to each other by
wired connections. The connections from the MRs in the
second tier to the APs in the third tier are random, which are
denoted by dotted lines in the figure. While wireless
connections between the second tier and the third tier
available, the traffic between two MRs in the second tier
can be exchanged via the third tier. It may be noted that the
138 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 12, NO. 1, JANUARY 2013
Fig. 3. Alternate routing with random APs connections.
Fig. 4. Hierarchy and deployment.
link bandwidth between two nodes in different tiers are
distinct, where the capacity enhancement of hybrid WMN
benefits from the additional tier of alternate Internet access.
Fig. 4b shows the geographic model of our proposed
hybrid WMN. MRs are deployed in a unit square denoted
by T. The deployment of MRs follows the grid deployment
method, which divides the unit square into `
1
smaller
squares and each square is served by MR located at the
center of the square. The reason behind a grid deployment
is that the locations of MRs are preplanned and most of the
cities such as Manhattan, New York, has grid-based streets,
which naturally support the grid deployment. Without loss
of generality, `
1
is the value such that

`
1
_
is an odd
number. An IGW is deployed at the center square.
The coverage of MR i is a circle C(:
i
. i
:
) centered at
point :
i
with radius i
:
. Given a region T, MRs should satisfy
T _

i
C(:
i
. i
:
) to seamlessly cover T. To simplify the
analysis, we assume MRs only provide network access
service for MCs within the coverage closer to MRs. In other
words, MRs coverage can be approximated by a small
square illustrated in Fig. 4. The size of the small square is
1

`
1
_

1

`
1
_
. MR is able to connect with APs in its coverage
through the access link. The total number of APs in T is `

.
MR backbone transmission distance i
T
should be able to
reach closeby MR, which is slightly larger than
1

`
1
_
. It is
trivial to prove that such an MR deployment is connected
with transmission distance larger than
1

`
1
_
. To provide full
coverage to each unit square, MR n needs to provide an
access service for the small square center at :
i
with at
least side length
1

`
1
_
. Since a circle is generally used to
denote the coverage of a cell, we use a circle C(:
i
. i
:
)
containing the square to denote the coverage of MR i, where
i
:
=
1

2`
1
_
. So, the whole unit square area can be seamlessly
served by such a backbone network.
With the protocol model given in [3], any transmission
from MR i to MR , needs to be within the transmission
distance i
T
, [:
i
:
,
[ _ i
T
. To avoid the interference, other
transmitting MR / needs to satisfy [:
/
:
,
[ _ i
T
, where
is a positive constant to ensure a safe geographic gap
between two simultaneous transmissions. While WMN
backbone employs multichannel multiradio technology for
interference avoidance, the protocol does affect the trans-
mission using the same channel.
2.2 Traffic Model
First, traffic generated or terminated at MCs can be divided
into intercluster and intracluster traffic. The intercluster
traffic is from the MCs to the destination outside the cluster
or from the source outside the cluster to the MC in the
cluster. The traffic goes to the IGW and the IGW is in-charge
of aggregating intercluster traffic, routing in the wired
network, protocol conversation, etc. Without loss of
generality, we assume inter-cluster traffic is from the MCs
to the IGW. This condition also applies in the reverse
direction. While random AP access is available in a cluster,
the intercluster traffic can be relayed by the APs to the IGW
through wired connection or vice versa. We assume that the
management function is located at the IGW and the
intercluster traffic can be exchanged between the AP and
the IGW via the wired connection between them (which
may go through several routers in the wired Internet).
The other type of traffic is the intracluster traffic, which
is between two MCs in the same cluster. In a WMN, each
MR has the routing ability that can divert the intracluster
traffic. The routing list of the MRs in a cluster can be created
by the same way as in a mobile ad hoc network (MANET)
or be periodically configured by the IGW. For intracluster
traffic, there are two ways to route. The traffic can be routed
toward the cluster head (IGW) and then reroute to the
destination MR. This method is simple to implement as
each MR only needs to know the route to the IGW, and the
information of the MCs cell locations can be simply stored
at the IGW. However, since all the traffic goes to or comes
from the IGW, the capacity is seriously constrained at the
IGW. Intracluster traffic with such a routing method shows
the same traffic pattern as that of intercluster traffic. The
cluster forms a tree-like topology that is rooted at the IGW.
Network capacity with such a routing method can be easily
derived from the case of the intercluster traffic. Another
way is to route the intracluster traffic like MANET routing
in the form of a mesh topology. Each MR either has the
location information of the MCs in the cluster or is able to
inquire the information from the IGW. The data traffic does
not have to go through the IGW, so the congestion at the
IGW can be mitigated and the capacity of the cluster can
be improved. With MANET type routing among MRs, the
capacity can be improved further by balancing the traffic
among multiple routing paths between the source and the
destination MRs. We assume the MANET routing method is
used for intracluster traffic so as to have an enhanced
network capacity. The asymptotic capacity of the method
that forwards all traffic to the IGW can be also derived from
our results, which is a special case of the asymptotic
capacity with only intercluster traffic.
2.3 Capacity Definition
In the literature such as [5], [13], the network capacity
analysis is based on the per-node asymptotic capacity of
the traffic in a single-tier network. We extend this
definition to three-tier hybrid WMNs with multiple traffics
described above.
Definition 1 (Asymptotic Capacity). The asymptotic capacity
of a node, denoted by `(`
C
), is of order (q(`
C
)) bps if
deterministic constants c 0 and c
/
< are such that
lim
`
C

1[`(`
C
) = cq(`
C
)i: )co:i/|c[ = 1.
lim
`
C

inf 1[`(`
C
) = c
/
q(`
C
)i: )co:i/|c[ < 1.
Definition 2 (Per-MR Capacity `
1
). The maximum asympto-
tic capacity per MR can be achieved with different combina-
tions of possible traffic.
Definition 3 (Per-MC Capacity `
C
). The maximum asympto-
tic capacity per MC can be achieved with various combinations
of possible traffic.
3 PER-MR CAPACITY
In this section, we consider an asymptotic capacity of the
backbone. Traffic in the backbone network can be divided
FU AND AGRAWAL: CAPACITY OF HYBRID WIRELESS MESH NETWORKS WITH RANDOM APS 139
into four categories according to the types of devices
involved. The first type is the ad hoc MANET-type traffic
which exists in the backbone only among MRs. The second
one is the random intracluster AP traffic. With wireless
connection between MR and AP, intracluster traffic can
utilize the wired connection between two APs. The third is
the intercluster traffic relayed by MRs through the IGW. And
the fourth one is the random intercluster AP traffic, which
uses the wired connection between the AP and the IGW.
The main results of per-MR capacity are summarized
here. We show per-MR capacity for four different types of
traffic. Then, we determine the per-MR capacity with the
combination of the traffic patterns.
Per-MR capacity with ad hoc intracluster traffic which
does not involve AP can be expressed by
`
1
i
=
\

`
1
_
_ _
. (1)
Per-MR capacity with intracluster AP traffic is ex-
pressed by
`
1
j
=

1
`
1
_ _
. 1 = O(\).

\
`
1
_ _
. 1 = .(\).
_

_
(2)
From (1) and (2), the combination of two types of traffic
that maximizes the asymptotic capacity is expressed by
`
1
1
=

`
1
_
_ _
. `

= O
\

`
1
_
1
_ _
.

1
`
1
_ _
. `

= .
\

`
1
_
1
_ _
. 1 = O(\).

\
`
1
_ _
. `

= .(

`
1
_
) . 1 = .(\).
_

_
(3)
Per-MR capacity with intercluster traffic without APs is
expressed by
`
1
q
=
\
`
1
_ _
. (4)
Per-MR capacity with intercluster AP traffic is ex-
pressed by
`
1
c
=

1
`
1
_ _
. 1 = O(\).

\
`
1
_ _
. 1 = .(\).
_

_
(5)
From (4) and (5), Per-MR capacity with intercluster
traffic can be expressed by
`
1
1
=

1\
`
1
_ _
. 1 = O(\).

(`

1)\
`
1
_ _
. 1 = .(\).
_

_
(6)
Per-MR capacity with the composition of all traffic
patterns is expressed by
`
1
=

`
1
_
_ _
. `

= O
\

`
1
_
1
_ _
.

1
`
1
_ _
. `

= .
\

`
1
_
1
_ _
. 1 = O(\).

(`

1)\
`
1
_ _
. `

= .(

`
1
_
) . 1 = .(\).
_

_
(7)
3.1 Routing and Traffic Balance
To illustrate the routing and traffic balance scheme used in
analyzing a WMN backbone, we use a 2D grid-based WMN
of Fig. 5. Figure also shows the connectivity graph of the
MRs, which are denoted by dots at the intersections. The
edges between intersection points denote the communica-
tion links. Packets can transmit from one MR to the
neighboring MR in the grid, which counts as one-hop
transmission. The location of MRs in the grid can be
expressed by two integers: an integer for the r-axis and the
other one for the y-axis. For example, we have the traffic
from source `1
1
to destination `1
2
. The locations of `1
1
and `1
2
are denoted by (i. ,) and (i. i), respectively. The
minimum number of hops for the transmission is given by
/ = [ii[ [i ,[. A feasible routing path with the
minimum number of hops is illustrated by the blue color
arrows 1
1
along the grids in Fig. 5.
There are a number of paths that satisfy the shortest path
routing, which are within the rectangles formed by `1
1
and `1
2
points and are shown in Fig. 5, by the broken
rectangle
1
formed by `1
1
and `1
2
. The traffic can be
distributed and balanced on those paths and is routed by
the set of MRs at the locations within in the rectangular
area (r [i. i[, y [,. i[).
Random access to AP enables the traffic to take the
shortcut of the wired connection. There may be another
alternate routing path. For example, if `1
3
and `1
4
are
two MRs with AP access. `1
1
can transmit the packets to
`1
3
and `1
3
sends the packets to its AP(s) with the access
link. The packets then go through the wired connection(s)
between the APs, to the AP(s) at the cell of `1
4
. It is
noticeable that the number of APs at a cell may be more
than one and the traffic might be distributed to multiple
APs. After `1
4
receives the packets, it relays the packets to
destination `1
2
via the backbone. The routing path is
denoted by 1
2
and is illustrated by the red arrows, and the
wired connection is denoted by the red dashed line in Fig. 5.
Routing between non-AP-MR and AP-MR can do the
balancing between normal backbone traffic. For example,
140 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 12, NO. 1, JANUARY 2013
Fig. 5. Routing and traffic balance in a WMN backbone.
the routing paths can take the set of paths within the broken
rectangular area
2
formed by `1
1
and `1
3
, which is
illustrated by the broken rectangle between `1
1
and `1
3
in the figure. It is also applicable to `1
4
and `1
2
, as
shown by the broken rectangle
3
in Fig. 5. The traffic
balance in the wired connection depends on the configura-
tion of the wired network, assuming that the wired
connections among APs has enough bandwidth and are
able to deliver packets with relatively low latency.
Here, some useful lemmas used later are listed. Proofs of
Lemmas 1 and 2 are given in [14] and a proof of Lemma 3 is
given in [15].
Lemma 1 (Chernoff Upper Tail Bound). If is the sum of
independent indicator random variables, then
1[ _ (1 c)1[[[ _ c

c
2
1[[
2c
. c 0. (8)
Lemma 2 (Chernoff Lower Tail Bound). If is the sum of
independent indicator random variables, then
1[ _ (1 c)1[[[ _ c

c
2
1[[
2
. c (0. 1[. (9)
Lemma 3. For `
C
MCs uniformly and independently distributed
in a unit square, the critical transmission distance is
c
0

log `
C
`
C

. (10)
where c
0
is a positive constant greater than one.
3.2 Backbone Ad Hoc Routing
The backbone capacity of intracluster traffic with ad hoc
routing, i.e., MR to MR traffic, has higher asymptotic
capacity with a regular grid deployment. Proposition 1
provides the asymptotic capacity of MRs with grid deploy-
ment which follows the arbitrary network asymptotic
capacity of [3].
Proposition 1. Given a connected backbone network consisting
of `
1
grid deployed MRs, per-MR capacity with ad hoc
traffic is `
1
i
= (
\

`
1
_
).
Proof. Traffic with ad hoc routing is between a pair of MRs
in the same cluster. With a relative large `
1
, each MR
has the same probability to be a source or a destination.
Two MRs on grid (i. i) and (i. ,) can be randomly
picked as the source MR and the destination MR,
respectively. The number of hops for the routes on the
grids is at least / = [ii[ [, i[. Considering all
such possible pairs, the lower bound of the average
number of hops /
1
is computed as follows:
1[/
1
[ = 1[[ii[[ 1[[, i[[ = 21[1[[ii|i[[. (11)
1[[ii|i[ is obtained as
1[[ii|i[ =
1

`
1
_

i1
i=1
(i i)

`
1
_
i=i
(ii)
_ _
=
i
2

`
1
_
1

`
1
_ 1
_ _
i

`
1
_
1
2
.
(12)
1[i
2
[ is computed by following equation:
1[i
2
[ =
(

`
1
_
1)(2

`
1
_
1)
6
. (13)
Substituting 1[i
2
[ from (13) into (12), and then
substituting (12) into (11), we obtain the lower bound
of average number of hops
/
1
= 1[/
1
[ =
2
3

`
1
_

1

`
1
_
_ _
. (14)
Denote the upper bound for the average number of
hops by /
l
. In any feasible routing scheme illustrated
earlier, traffic can be distributed and balanced on the
routes available within the minimum rectangular area
constructed by the source and the destination MRs. One
of the attributes of such a routing scheme is that the
number of hops for different routes is the same and is
equal to the number of hops of the shortest path. So, the
upper bound of the average number of hops can be
obtained by
/
l
= O
_

`
1
_
_
. (15)
As the maximum data rate is no more than \, the
maximum throughput in the backbone is
`
1i
/`
1
_ `
1
\. (16)
Due to interference among multiple transmissions, not
all MRs could send data at the same time over the whole
frequency band. For MRs in the interference region, they
have to share the bandwidth by operating at different
frequencies and/or time slots. Given the grid topology of
a WMN backbone, the transmission is set to reach the
closest MRs that does not interfere with another second
closest MRs. We use the channel assignment for the links
between neighboring MRs in the grids so that links in the
same interference region can operate on different ortho-
gonal channels, without interfering with each other. An
interference region is formed by a circle i
2
1
centered at
the transmitting MR. Let us take i
T
=
1

`
1
_
, then i
1
=
(1)

`
1
_
.
Each MR occupies a region of
1

`
1
_

1

`
1
_
in the unit
square. So, there are at most i
2
1
`
1
MRs inthe interference
region, expressed by i
1`
_ i
2
1
`
1
=(1 )
2
. The num-
ber of links within the interference region is no more than
4i
1`
_ 4(1 )
2
. So, the number of channels required
is no more than c
1
= 4(1 )
2
for a feasible channel
assignment like [16]. With this channel assignment and
scheduling, we can have
`
1i
/`
1
_
`
1
\
2c
1
. (17)
Thus, we obtain the MR ad hoc asymptotic capacity
from (16) and (17), which is expressed by
`
1i
=
\

`
1
_
_ _
. (18)
.
FU AND AGRAWAL: CAPACITY OF HYBRID WIRELESS MESH NETWORKS WITH RANDOM APS 141
Different from the capacity analysis in a random net-
work, some factors can be identified and capacity can be
improved in a regular topology. The average number of
hops in a grid topology is tightly bounded by the optimal
routing scheme and the feasible routing scheme. The
number of MRs affected by the interference can also be
computed correctly. As a result, the backbone capacity can
be accurately evaluated taking these factors into account.
The asymptotic capacity in other regular deployment such
as hexagonal topology, triangle topology, and so on, can be
estimated with the same method used in Proposition 1.
3.3 Intracluster AP Traffic
For the intracluster traffic between two MCs in the same
cluster, it can also utilize random connections between MRs
and APs. Decreasing the number of hops for the traffic
going to the Internet reduces the load in the backbone. The
enhancement is mainly affected by the number of accessible
APs and the bandwidth of such random connections. As
described later, Propositions 2 and 3 provide per-MR
capacity under different conditions.
Lemma 4. Given a connected backbone network consisting of `
1
grid deployed MRs, per-MR capacity with intracluster AP
traffic is (
`

1
`
1
), if 1 = O(\).
Proof. When the access link data rate is 1 = O(\), the
capacity is constrained by the access links. The through-
put is no more than the total throughput of all APs and
the IGW. While each AP-MR fully utilizes access link
bandwidth, the per-MR capacity is
`
1
j
_
1`

\
`
1
. (19)
While the capacity is constrained by the access link,
the backbone link bandwidth is sufficient for traffic
balance among the MRs having AP access. Without loss
of generality, we assume that the traffic are toward the
APs. For an AP-MR cell, the feasible solution can redirect
the traffic in the cell with AP access to the AP in the same
cell. The rest of the cells without AP access, routes the
traffic to the cells with AP access by considering traffic
balance among different AP-MR cells.
In the cell having AP access, the AP access link shares
the bandwidth with MCs. The aggregated traffic between
the MR and the MCs takes `
1
j
bandwidth, and the
redirection of this traffic to the AP costs additional `
1
j
bandwidth. The residual bandwidth is available for other
MRs. As we can evenly associate non-AP-MRs to each
AP-MR or the IGW, the backbone bandwidth is not a
constraint. The number of associated non-AP-MRs for
every AP-MR is no more than
`
1
`

1
`

1
1. The asymp-
totic capacity is
`
1
j
`
1
`

1
_ 12`
1
j
.
`
1
j
_
1(`

1)
`
1
2`

2
.
(20)
From (19) and (20), the asymptotic capacity of
(
1`

`
1
) holds for 1 = O(\). .
Lemma 5. Given a connected backbone network having `
1
grid deployed MRs, per-MR capacity with intracluster AP
traffic is (
`

\
`
1
), if 1 = oicqo(\) and `

= O(

`
1
_
).
Proof. While 1 = .(\), the intracluster AP throughput is
constrained by backbone links rather than access links.
The aggregated traffic at the AP-MR cell would not be
forwarded into backbone network but redirected to the
AP by the MR via the access link. The upper bound of
the capacity is
`
1
j
_
(`

1)\
`
1
`

1
. (21)
The interference at neighboring AP-MRs could de-
grade the throughout. With grid topology, each MR will
have four neighboring MRs that could interfere with it. If
AP-MR has four neighboring MRs that all have AP
accesses, the equal bandwidth shared among five MRs
will be less than
\
5
. It degrades throughput if the traffic is
relayed from peripheral AP-MRs to the middle AP-MR.
So, we do not allocate the traffic from the non-AP-MRs to
the AP-MRs that are surrounded by AP-MRs. The traffic
is only allocated and balanced among the AP-MRs
having non-AP-MRs available as neighbors. The prob-
ability that a backbone link is adjacent to two AP-MRs,
is approximated by
`
2

`
2
1
. According to the Chernoff upper
tail bound, the number of links adjacent to two AP-MRs,
denoted by i

, is bounded by
1 i

_ (1 c
2
)
`
2

`
1
_ _
_ c

c
2
2
`
2

(2c
2
)`
1
. (22)
where c
2
is a positive constant.
If `

= O(

`
1
_
), i

is bounded by (1 c
2
)
`
2

`
1
with
high probability (w.h.p.). The number of AP-MRs
surrounded with AP-MRs is less than i

. We use the
same feasible traffic distribution and balance them as
illustrated by Lemma 4 for the intracluster AP traffic. The
feasible throughput per MR is
`
1
j
_
\
c
1
_
`


(1c
2
)`
2

`
1
_
`
1
`

1
. (23)
To summarize, per-MR capacity with intracluster AP
traffic is `
1
j
=(
\`

`
1
), if 1=.(\) and `

=O(

`
1
_
). .
Lemma 6. Given a connected backbone network having `
1
grid
deployed MRs, per-MR capacity with intracluster AP traffic
is (
`

\
`
1
), if 1 = .(\) and `

= .(

`
1
_
).
Proof. The upper bound for per-MR capacity is
`
1
j
_
(`

1)\
`
1
`

1
. (24)
The probability that a backbone link is adjacent to a
non-AP-MR and an AP-MR is
2`

`
1
(1
`

`
1
).
According to the Chernoff bound, the number of such
links in the network has a lower bound of
1 i
`
_ (1 c
3
)2 `


`
2

`
1
_ _ _ _
_ c
c
2
3
(`

`
2

`
1
)
. (25)
where c
3
is a positive constant less than 1.
Since `

= .(

`
1
_
), i
`
is no less than c
4
(`


`
2

`
1
)
w.h.p., where c
4
= 2(1 c
3
). Several links may have the
142 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 12, NO. 1, JANUARY 2013
same adjacent AP-MR, but the maximum number of
links being adjacent to the same AP-MR is no more than
four. So, the number of AP-MRs has non-AP-MR in one
hop is more than
c
4
4
(`


`
2

`
1
) w.h.p. In the worst case,
we can schedule the traffic to these AP-MRs having
neighboring non-AP-MR. An AP-MR can provide at least
throughput of
\
c
1
bps. With the feasible scheduling, the
per-MR capacity is
`
1
j
_
c
4
_
`


`
2

`
1
_
\
4c
1
(`
1
`

1)
. (26)
In summary, `
1
j
= (
`

\
`
1
), if 1 = .(\) and `

=
.(

`
1
_
). .
Proposition 2 is obtained from Lemmas 4, 5, and 6.
Proposition 2. Given a connected backbone network consisting of
`
1
grid deployed MRs, per-MR capacity with intracluster AP
traffic is
`
1
j
=

1
`
1
_ _
. 1 = O(\).

\
`
1
_ _
. 1 = .(\).
_

_
(27)
3.4 Intercluster Traffic through IGW
Assuming that intercluster traffic only transmits in the
backbone toward or from the IGW, the per-MR capacity is
bounded by the bandwidth of the IGW and given by the
following proposition:
Proposition 3. Per-MR capacity of intercluster traffic without
AP connections is
`
1
q
=
\
`
1
_ _
. (28)
Proof. When the intertraffic goes through the IGW, the
capacity is constrained by the bandwidth at the IGW and
the wired connection of the IGW is assumed to have
unconstrained bandwidth. The bandwidth can be fairly
shared by all the MRs in the cluster and the per-MR
throughput is
`
1
q
_
\
`
1
1
. (29)
IGW shares the bandwidth with the neighboring MRs.
With the channel assignment, the maximum number of
required channels is no more than c
1
. The feasible IGW
throughput is no less than
4\
c
1
bps. The assigned traffic at
each MR is `
1
q
_
4\
c
1
(`
1
1)
. MR can have throughput that
is more than
4\
c
1
. Considering the relay and aggregated
traffic, the traffic at MR n follows:
`
1
q
\
i
(n) \
o
(n) _
4\
c
1
.
`
1
q
\
i
(n) = \
o
(n).
_
_
_
(30)
where \
i
(n) denotes the incoming traffic of MR n, and
\
o
(n) denotes the outgoing traffic of MR n.
Since the maximum throughput of IGW is no more
than \, per-MR capacity `
1
q
_
\
`
1
1
. From (30), we have
\
i
(n) _
2\
c
1

\
`
1
1
_
\
c
1
(`
1
1)
. (31)
while `
1
_
c
1
3
2
. According to the asymmetric structure
of the grid network, the incoming traffic at the one hop
away MR is no more than
\
c
1
(`
1
1)
. So, the MR one hop
away from the IGW can afford the assigned traffic load.
Similarly, the MRs at the two and more hops away can
support the assigned traffic loads. We have a feasible
scheduling that the per-MR capacity can achieve as
`
1
q
_
4\
c
1
(`
1
1)
. (32)
To sum up, `
1
q
= (
\
`
1
). .
As shown by the per-MR ad hoc capacity (
\

`
1
_
), the
MR will not be the bottleneck for intercluster traffic. The
traffic is only constrained by the IGW. This result is also
confirmed by the experimental result in [17].
3.5 Intercluster AP Traffic
With random access to APs, the capacity is increased by
leveraging the APs wired connections. For some gateway
functions such as authentication and authorization located
in the cluster head (IGW), AP still can forward the traffic to
the IGW by the wired connections for management purpose.
Such mechanism can effectively reduce the number of hops
and the volume of the traffic in WMN backbone.
Proposition 4. Given a connected backbone network consisting of
`
1
grid deployed MRs and `

of them have AP access, per-


MR capacity with intercluster AP traffic is
`
1
c
=

1
`
1
_ _
. 1 = O(\).

\
`
1
_ _
. 1 = .(\).
_

_
(33)
Proof. While the capacity is constrained by the access links
of the AP-MRs, we have
`
1
c
(`
1
`

1) _ `

(1`
1
c
).
`
1
c
_
1`

`
1
1
.
(34)
Otherwise, it is constrained by the backbone. The feasible
routing and scheduling can use a similar method
indicated in the proof of intracluster traffic going
through APs to reach the capacity bound. With such a
traffic balance, the traffic from or to backbone is given by
`
1
c
`
1
`

1
`

. A feasible scheduling is
`
1
c
`
1
`

1
`

2`
1
c
_ 1.
`
1
c
_
1`

`
1
`

1
.
(35)
When the capacity is constrained by the backbone,
there are two situations: `

= O(

`
1
_
) and `

=
.(

`
1
_
). When `

= O(

`
1
_
), the APs are far apart
FU AND AGRAWAL: CAPACITY OF HYBRID WIRELESS MESH NETWORKS WITH RANDOM APS 143
and do not interfere with one another w.h.p., as given by
Lemma 5. Then, the asymptotic capacity is `
1
c
= .(
`

\
`
1
).
When `

= .(

`
1
_
), some MRs having APs are
surrounded by other AP-MRs and cannot effectively
provide the traffic shortcut. However, the rest of AP-MRs
can be accessed by non-AP-MRs and the capacity can
reach (
`

\
`
1
) as proved in Lemma 6. .
4 PER-MC CAPACITY
The per-MC capacity is not only constrained by the
backbone per-MR capacity but also the access link of each
cell. The asymptotic capacity can be identified by a
combination of traffic under various cases.
The main results of per-MC capacity are summarized
here. Per-MC capacity with MR ad hoc routing is given by
`
C
i
=

`
1
1
`
C
_ _
. `
1
=O
`
C
log `
C
_ _
. 1=o
\

`
1
_
_ _
.

`
1
_
\
`
C
_ _
. `
1
=O
`
C
log `
C
_ _
. 1=
\

`
1
_
_ _
.

1
log `
C
_ _
. `
1
=.
`
C
log `
C
_ _
. 1=o
\

`
1
_
_ _
.

`
1
_
log `
C
_ _
. `
1
=.
`
C
log `
C
_ _
. 1=
\

`
1
_
_ _
.
_

_
(36)
Per-MCcapacity with intracluster AP traffic is obtained as
`
C
j
=

1
`
C
_ _
. 1 = O(\).

\)
`
C
_ _
. `

= O
`
C
log `
C
_ _
. 1 = .(\).

\
log `
C
_ _
. `

= .
`
C
log `
C
_ _
. 1 = .(\).
_

_
(37)
The intracluster traffic is the combination of ad hoc MR
traffic and intracluster AP traffic. Considering reasonable
access link bandwidth 1 = (
\

`
1
_
) . 1 = O(\), per-MC
capacity with intracluster traffic can be expressed by
`
C
1
=

`
1
_
\
`
C
_ _
. `
1
= O
`
C
log `
C
_ _
. `

= O
\

`
1
_
1
_ _
.

1
`
C
_ _
. `
1
= O
`
C
log `
C
_ _
. `

= .
\

`
1
_
1
_ _
.

`
1
_
log `
C
_ _
. `
1
= .
`
C
log `
C
_ _
. `

= O
\`
C
1

`
1
_
log `
C
_ _
.

1
`
C
_ _
. `
1
= .
`
C
log `
C
_ _
. `

= .
\`
C
1

`
1
_
log `
C
_ _
.
_

_
(38)
Per-MC capacity with IGW traffic is `
C
q
= (
\
`
C
). Per-MC
capacity with intercluster AP traffic is given by
`
C
c
=

1
`
C
_ _
. 1 = O(\).

\
`
C
_ _
. `

= O
`
C
log `
C
_ _
. 1 = .(\).

\
log `
C
_ _
. `

= .
`
C
log `
C
_ _
. 1 = .(\).
_

_
(39)
Per-MC capacity with intercluster AP traffic, if 1 =
O(\), is expressed by
`
C
1
=
`

1
`
C
_ _
. (40)
Besides dominating factor of the number of `
1
and/or
`

, the ratio of 1 to \ also has a strong impact on the


selection of capacity region. As there are two spectrums in a
WMN, the network bottleneck could be either the backbone
link bandwidth or the access link bandwidth. For appro-
priate capacity region, the ratio of 1 to \ shall be
1
\
=
1

`
1
_
_ _
. O(1). (41)
Per-MC capacity within the region of (41) is expressed by
`
C
=

`
1
_
\
`
C
_ _
. `
1
= O
`
C
log `
C
_ _
. `

= O
\

`
1
_
1
_ _
.

1
`
C
_ _
. `
1
= O
`
C
log `
C
_ _
.`

= .
\

`
1
_
1
_ _
.

`
1
_
log `
C
_ _
. `
1
= .
`
C
log `
C
_ _
.`

= O
\`
C
1

`
1
_
log `
C
_ _
.

1
`
C
_ _
. `
1
= .
`
C
log `
C
_ _
.`

= .
\`
C
1

`
1
_
log `
C
_ _
.
_

_
(42)
The access link bandwidth 1 needs to be higher or equal
order of
\

`
1
_
; otherwise, the access link is the bottleneck and
strongly constraints the capacity. While 1 is the higher
order of \, \ becomes the capacity constraint. When
1 = (
\

`
1
_
) . 1 = O(\), the question about which link
serves as the capacity constraint will also depend on the
number of random APs. Equation (42) shows the capacity
region for
1
\
between (
1

`
1
_
) and O(1). While `
1
=
O(
`
C
log `
C
), the capacity can be enlarged with `

= .(
\

`
1
_
1
)
and capacity is constrained by access link bandwidth 1.
While `
1
= .(
`
C
log `
C
), the capacity can be significantly
increased with `

= .(
\`
C
1

`
1
_
log `
C
).
4.1 Per-MC Capacity with MR Ad Hoc Routing
Lemmas 7, 8, and 9 give the bounds for the number of MCs
in a cell with different orders of the number of MRs, which
lead to different per-MC asymptotic capacity in later
propositions. Lemma 10 is the critical transmission distance
for MCs in a unit square. It serves as the bound for the
distance between any two MCs in the region.
144 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 12, NO. 1, JANUARY 2013
Lemma 7. Given `
C
MCs are uniformly and independently
distributed in `
1
identical cells, we have
sup
_
i
i
C
_
_
`
C
`
1
. (43)
where i
i
C
denotes the number of MCs at cell i.
Proof. If the number of MCs in each cell is less than
`
C
`
1
, the
total number of MCs will be less than `
C
, which contra-
dicts

i
i
i
C
= `
C
. .
Lemma 8. Given `
C
MCs are uniformly and independently
distributed in `
1
identical cells, the following equation holds
w.h.p., if `
1
= O(
`
C
log `
C
):
sup
_
i
i
C
_
_ c
5
`
C
`
1
. (44)
where c
5
is a positive constant.
Proof. According to the Chernoff upper tail bound, the
number of MCs in any cell i is upper bounded by
1 i
i
C
_ c
5
`
C
`
1
_ _
_ c

(c
5
1)
2
`
C
(1c
5
)`
1
. (45)
where c
5
is a positive number. If `
1
= O(
`
C
log `
C
), the RHS of
the equation approaches zero and i
i
C
_ c
5
`
C
`
1
w.h.p. .
Lemma 9. Given `
C
MCs are uniformly and independently
distributed in `
1
identical cells, the following equation holds
w.h.p., if `
1
= .(
`
C
log `
C
):
supi
i
C
_ c
6
log `
C
. (46)
where c
6
is a positive constant.
Proof. According to the Chernoff upper tail bound, the
number of MCs in any cell i is upper bounded by
1[i
i
C
_ c
6
log `
C
[ _ c

_
c
6
`
1
log `
C
`
C
1
_
2
1
c
6
`
1
log `
C
`
C
`
C
`
1
. (47)
The RHS of equation approaches zero while `
C
goes
infinity. So, the number of MCs in a cell is no more than
c
6
log `
C
w.h.p. .
Lemma 10. There exists an MC that is selected by more than
c
7
log `
C
MCs as the destination w.h.p., where c
7
is a positive
constant.
Proof. For the MCs in the unit square, performing Voronoi
tessellation based on the location of MCs such that the
point in a cell \
i
of MC i is closer to point MC i than any
other MCs. The set of Voronoi cells is denoted by 1.
According to the critical transmission distance for random
deployment of APs, there exists such a cell \
i
1 such
that the size of \
i
area, denoted by o(\
i
), is (
log `
C
`
C
).
The method to find the destination for MC , is to drop
a randomly point and select MC that is closer to the point
than any other MCs. So, MC will take all the MCs that
drop random destination points in its Voronoi cell as its
source MCs. For cell \
i
that has size (
log `
C
`
C
), the number
of points falls in the cell follows:
1[i
o
_ c
7
log `
C
[ _ c

(
c
7
c
8
1)
2
log `
C
2
. (48)
where c
7
and c
8
are positive constants. The RHS
approaches zero while `
C
approches infinity. So, there
exist more than c
7
log `
C
MCs that will drop their
destination points in its Voronoi cell w.h.p. .
Different orders of `
1
lead to distinct asymptotic
capacity. As indicated in the Lemmas above, `
1
mainly
divides into `
1
= O(
`
C
log `
C
) and `
1
= .(
`
C
log `
C
). The per-MR
capacity with ad hoc routing in the backbone network only
involves the MRs. So, the capacity is mainly affected by `
1
.
Since the traffic is from one cell to another, the traffic of
different cells are constrained to each other. The per-MR
capacity is also considered for both uplink and downlink of
MCs in cells. Propositions 5 and 6 derive the per-MR
asymptotic capacity from the view of uplink in a cell, while
Propositions 7 and 8 analyze the per-MR asymptotic
capacity from the view of downlink in a cell.
Proposition 5. With ad hoc routing in the backbone, per-MC
capacity for uplink traffic from MCs in a cell is `
Ci
=
(
`
1
`
C
min`
1
. 1), if `
1
= O(
`
C
log `
C
).
Proof. The uplink throughput is either constrained by the
backbone per-MR capacity or the access link bandwidth,
which is expressed by
`
C
i
i
i
C
_ min`
1
i
. 1. (49)
From Lemma 7, we obtain
`
C
i
_
`
1
`
C
min`
1
i
. 1. (50)
It is easy to schedule `
C
i
i
i
C
traffic for one hop access
link from MCs to the MR, which is
`
C
i
i
i
C
_ min`
1
. 1. (51)
FromLemma 8, the traffic canbe scheduledandachieve
`
C
i
_
`
1
c
5
`
C
min`
1
. 1. (52)
Thus, `
C
i
= (
`
1
`
C
min`
1
. 1) holds, where `
1
=
O(
`
C
log `
C
). .
Proposition 6. With ad hoc routing in the backbone, per-MC
capacity for uplink traffic from MCs in a cell is `
C
i
=
(
min`
1
.1
log `
C
), where `
1
= .(
`
C
log `
C
).
Proof. There exists an MC that is selected by more than
c
7
log `
C
according to Lemma 10. So, we have
`
C
i
_
min`
1
. 1
c
7
log `
C
. (53)
According to Lemma 9, the number of MCs in a cell is
upper bounded by c
6
log `
C
. With the TDMA schedul-
ing, we have
`
C
i
_
min`
1
. 1
c
6
log `
C
_ _
. (54)
The following result is obtained from (53) and (54). .
Proposition 7. Downlink traffic of MCs at a cell is `
C
i
=
(
`
1
`
C
min`
1
. 1), if `
1
= O(
`
C
log `
C
).
Proof. The critical connection distance of MCs is o(i) =
c
0

log `
C
`
C
_
(Lemma 3). It means that MC can be found
FU AND AGRAWAL: CAPACITY OF HYBRID WIRELESS MESH NETWORKS WITH RANDOM APS 145
within a circle with radius o(i) w.h.p. For the intracluster
traffic, it is generated by randomly picking up two points
in the unit square and the nodes closest to the points are
selected as the source and the destination, respectively.
So, the MCs in the cell will be selected as the destination
nodes while random destination points fall in the
combined area of the cell and the surround region with
o(i) width. The size of such area can be computed by
1
d
~
1

`
_
1
2o(i)
_ _
2
~
1
`
1
4o
2
(i)
4o(i)

`
1
_ .
(55)
Downlink traffic satisfies `
C
i
1
d
(`
C
i
i
C
)_min`
1
. 1.
We have
`
C
i
_
min`
1
. 1
1
d
(`
C
i
i
C
)
_
min`
1
. 1
_
1
`
1
4o
2
(i)
4o(i)

`
1
_
_
`
C
(1 o(1))
_
min`
1
. 1
_
`
C
`
1

4c
2
0
log `
C

4c
0

`
C
log `
C
`
1
_
_
(1 o(1))
.
(56)
If `
1
= O(
`
C
log `
C
), we obtain
`
C
i
_ c
9
`
1
`
C
min`
1
. 1. (57)
Let i
1
denote the number of MCs selecting the MCs
in a cell as the destination. With the Chernoff upper
bound, we have
1 i
1
_
c
10
`
C
`
1
_ _
_ c

(
c
10
`
1
1
d
1)
2
1
c
10
`
1
1
d
`
C
1
d
. (58)
where c
10
1.
If `
1
= O(
`
C
log `
C
), the RHS of the equation approaches
zero, so i
1
is upper bounded by
c
10
`
C
`
1
w.h.p. With feasible
TDMA scheduling, we have
`
C
i
_
min`
1
. 1
i
1
_ _
_
`
1
min`
1
. 1
c
10
`
C
_ _
. (59)
Thus, `
C
i
= (
`
1
`
C
min`
1
. 1) holds, if `
1
= O(
`
C
log `
C
)..
Proposition 8. Downlink traffic of MCs at a cell is `
C
i
=
(
min`
1
.1
log `
C
), if `
1
= .(
`
C
log `
C
).
Proof. According to Lemma 10, the maximum per-MC
capacity is upper bounded by
`
C
i
_
min`
1
. 1
c
7
log `
C
. (60)
if `
1
= .(
`
C
log `
C
).
Also, from the Chernoff upper bound, the number of
MCs having traffic to a cell is upper bounded by
1[i
1
_ c
11
log `
C
[ _ c

_
c
11
`
C
log `
C
1
d
1
_
2
`
C
1
d
1
c
11
`
C
log `
C
1
d
. (61)
where c
11
1.
The RHS of the equation approaches zero if
`
1
= .(
`
C
log `
C
). So, i
1
is upper bounded by c
11
log `
C
w.h.p. With the feasible TDMA scheduling, we have
`
C
i
=
min`
1
. 1
i
1
_ _
_
min`
1
. 1
c
11
log `
C
_ _
. (62)
Thus, `
C
i
= (
min`
1
.1
log `
C
) holds, if `
1
= .(
`
C
log `
C
). .
Substituting ad hoc per-MR capacity by the expression
obtained from previous section, the per-MC intracluster
traffic with ad hoc backbone routing is
`
C
i
=

`
1
1
`
C
_ _
. `
1
= O
`
C
log `
C
_ _
. 1 = o
\

`
1
_
_ _
.

`
1
_
\
`
C
_ _
. `
1
= O
`
C
log `
C
_ _
. 1 =
\

`
1
_
_ _
.

1
log `
C
_ _
. `
1
= .
`
C
log `
C
_ _
. 1 = o
\

`
1
_
_ _
.

`
1
_
log `
C
_ _
. `
1
= .
`
C
log `
C
_ _
. 1 =
\

`
1
_
_ _
.
_

_
(63)
4.2 Per-MC Capacity with Intracluster AP Traffic
While utilizing a random AP connection, the ratio of the
backbone link bandwidth to the access link bandwidth is
very critical. The traffic via the APs employs the access link.
While it is not sufficient, the benefits from using the random
connections will be limited. An increase in the number of
AP-MRs can help increase the traffic through the APs. The
efficiency of implementing a large number of APs depends
very much on the strategies of traffic load balancing. Our
traffic balance is based on MCs rather than MR cells. The
traffic from the same MR cell may go to different AP-MRs
by considering the traffic load on the AP-MRs.
Proposition 9 is for 1 = O(\) case, where the backbone
link bandwidth is assumed sufficient for the traffic balance
among different AP-MRs. The per-MC capacity with 1 =
.(\) is considered in Propositions 10 and 11 for `

=
O(
`
C
log `
C
) and `

= .(
`
C
log `
C
), respectively.
Proposition 9. If 1 = O(\), per-MC capacity with intracluster
traffic having random AP access is
`
C
j
=
`

1
`
C
_ _
. (64)
Proof. Because the traffic can be evenly distributed in the
backbone for intracluster AP traffic, we analyze the
traffic from MCs to APs without any loss of generality.
The traffic of an AP from the MR includes the aggregated
traffic from MCs in the cell and the traffic from other
non-AP-MRs. Non-AP-MRs intracluster AP traffic can
146 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 12, NO. 1, JANUARY 2013
go through the backbone and arrive at the AP-MR cells.
With evenly distributed traffic, some of the number of
MCs associate their traffic to the AP-MR and the number
of the MCs associated to an AP-MR is no less than
`
C
`

1
|.
While 1 = O(\), the capacity is constrained by the
access link. The per-MC traffic in an AP-MR cell is
constrained by
`
C
j
`
C
`

1
_ _
_ 1.
`
C
j
_
`

1
`
C
_ _
1.
(65)
The feasible scheduling will have different situations
for `

and `
1
.
1. `
1
= O(
`
C
log `
C
). According to Lemma 8, the number
of MCs in a cell is upper bounded by c
5
`
C
`
1
w.h.p.
`
C
`

1
s order is no less than c
5
`
C
`
1
, which means the
MCs in an AP-MR is O(
`
C
`

1
) and the traffic can
be evenly distributed to the AP-MRs. Since
1 = O(\), the traffic is constrained by access link.
For the traffic from the AP-MR cell to the AP(s)
costs twice of the access link bandwidth. We have
`
C
j
`
C
`

1
_ _
supi
i

_ _
= 1. (66)
If `
1
= O(
`
C
log `
C
), supi
i

_ c
5
`
C
`
1
according to
Lemma 8. The per-MC traffic follows the follow-
ing bound:
`
C
j
_
(`

1)1
`
C
_
1 c
5
`

1
`
1
_
_ _
. (67)
Since `

is no more than `
1
, we have `
C
j
=
(
`

1
`
C
).
2. `
1
= .(
`
C
log `
C
) and `

= o(
`
C
log `
C
). Where i
i

is
upper bounded by c
6
log `
C
according to Lem-
ma 9. The order of
`
C
`

1
is (log `
C
), which is
higher than the upper bound of i
i

. So, the
number of cells associated to an AP-MR is more
than one w.h.p. and the traffic can be distributed
and balanced among the AP-MRs. We have the
feasible scheduling derived from (66), which is
`
C
j
_
(`

1)1
`
C
_
1 c
6
(`

1) log `
C
`
C
_
_ _
. (68)
Since `

= o(
`
C
log `
C
), we obtain `
C
j
= (
`

1
`
C
).
3. `
1
= .(
`
C
log `
C
) and `

= (
`
C
log `
C
). i
i

is upper
bounded by c
6
log `
C
according to Lemma 9. The
order of
`
C
`

1
is o(log `
C
), which is lower than i
i

.
It means that the number of MCs in a cell may be
more than the average number of MCs for an AP-
MRs. To perform the traffic balance, some of the
traffic in the AP-MRs that is over
`
C
`

1
needs to be
scheduled to other AP-MR. For the cell having
more than
`
C
`

1
MCs, i
i


`
C
`

1
go to the backbone
and rest of the traffic is served by local AP. The
per-MR capacity served by local AP is
`
C
j
_
(`

1)1
2`
C
_ _
. (69)
The traffic through the backbone follows:
`
C
j
_
\
supi
i


`
C
`

1
_ _
=
\
c
6
log `
C

`
C
`

1
_ _
. (70)
Since `

= (
`
C
log `
C
), (70) is not the constraint
and we obtain `
C
j
= (
`

1
`
C
).
With the traffic balance algorithm, we can have
`
C
j
= (
`

1
`
C
) for different situations.
In summary, the proposition holds. .
In Proposition 9, we implement the proposed traffic
balance algorithm, so it is tighter feasible scheduling bound
than previously given in the literature.
Proposition 10. If 1 = .(\) and `

= O(
`
C
log `
C
), per-MC
capacity under intracluster traffic with random AP access is
`
C
j
=
`

1
`
C
_ _
. (71)
Proof. While 1 = .(\), the capacity is constrained by the
backbone bandwidth at the AP-MR. With evenly
distributed MC traffic, the number of MCs associated
to an AP-MR is no less than
`
C
`

1
|. According to Lemma
8, supi
i

_ c
5
`
C
`
1
. The per-MC traffic has the following
upper bound:
`
C
j
_
\
`
C
`

1
supi
i

_
(`

1)\
`
C
(1 c
5
`

1
`
1
)
. (72)
where c
5
`

1
`
1
approaches zero while `
C
approaches to
infinity.
Now, we consider the feasible scheduling. With
evenly distributed traffic in the backbone, the number
of MCs associated to an AP-MR is no more than
`
C
`

1
|.
By the feasible scheduling, we have
`
C
j
_
(`

1)\
c
1
`
C
_ _
. (73)
Equations (72) and (73) yield the result. .
Proposition 11. If 1 = .(\) and `

= .(
`
C
log `
C
), per-MC
capacity under intracluster traffic with random AP access is
`
C
j
=
\
log `
C
_ _
. (74)
Proof. With traffic balance function, AP-MR traffic should
be
`
C
`

1
. When `

= .(
`
C
log `
C
), we have
`
C
`

1
= O(log `
C
). (75)
According to Lemma 9, the number of MCs in a cell is
upper bounded by c
6
log `
C
. As compared with (75), we
find that the traffic balance in the backbone cannot
be performed for some cells w.h.p. From (69) and (70), we
find that the per-MC capacity is now constrained by the
backbone bandwidth.
FU AND AGRAWAL: CAPACITY OF HYBRID WIRELESS MESH NETWORKS WITH RANDOM APS 147
From Lemma 10, there exists an MC that is selected by
c
7
log `
C
MCs w.h.p. So, we have the upper bound of the
capacity as
`
C
j
_
1
c
7
log `
C
. (76)
When the upper bound of the number of MCs in a cell
is c
6
log `
C
, it does not collect the traffic from other non-
AP-MR cells because its traffic is above the average. So,
the feasible uplink per-MC capacity is
`
C
j
_
1
2c
6
log `
C
_ _
. (77)
For the downlink traffic, the analysis is similar to the
proof of Proposition 8 and we also use the upper bound
of i
1
. The difference is that the traffic is from the AP
then to the MR and does not pass through the backbone
while i
1
approaches its upper bound. We obtain
`
C
j
_
1
2i
1
_ _
_
1
2c
11
log `
C
_ _
. (78)
Thus, the proposition is satisfied. .
In general, access link bandwidth 1=(
\

`
1
_
). So, the
access link wouldnot be a bottleneck for the per-MCcapacity
in ad hoc routing. In this region, the per-MC capacity is
`
C
i
=

`
1
_
\
`
C
_ _
. `
1
= O
`
C
log `
C
_ _
. 1 =
\

`
1
_
_ _
.

`
1
_
log `
C
_ _
. `
1
= .
`
C
log `
C
_ _
. 1 =
\

`
1
_
_ _
.
_

_
(79)
Since access to APs are random, access link bandwidth is
designed according to the analysis and requirements of a
WMN, which is 1 = O(\). In this region, the per-MC
capacity with AP routing is
`
C
j
=
`

`
C
1
_ _
. 1 = O(\). (80)
4.3 Per-MC Capacity with Intercluster Traffic
Following a similar process of MR intercluster capacity, the
MC intercluster capacity can be derived as follows:
Proposition 12. Per-MC capacity with intercluster traffic
through the IGW is `
C
q
= (
\
`
C
).
Proof. The proof is similar to Proposition 4. .
Proposition 13. Per-MC capacity with intercluster AP traffic is
expressed by
`
C
c
=

1
`
C
_ _
. 1 = O(\).

\
`
C
_ _
. `

= O
`
C
log `
C
_ _
. 1 = .(\).

\
log `
C
_ _
. `

= .
`
C
log `
C
_ _
. 1 = .(\).
_

_
(81)
Proof. Due to the traffic balance and the AP routing scheme,
per-MC capacity computed for intracluster AP traffic is
applicable to intercluster AP traffic. The difference is that
intercluster AP traffic needs to consider both the capacity
constraints as the source and the destination are in the
same cluster. So, we use (70) under case 1 = .(\) to
derive `
C
c
= (
\
log `
C
). The rest procedures are similar to
Proposition 11. .
5 DISCUSSION AND IMPLICATIONS
MRs can be deployed on electric poles or on the top of house
roofs and can cover hole and/or network area extension.
The power supply for MR operations can come from the
electric poles or the solar panels. With the wireless relay and
routing function, MRs do not need wired cables except for
the IGWs. The feasibility of deployment enables WMNs to
cover any such desired area to take care of decay in the
signal strength and environmental complexity in an urban
area. Throughput of MCs can be improved by accessing
deployed MRs. MCs can have much better Signal to
Interference Noise Ratio (SINR) and higher data transmis-
sion rate by accessing nearby MRs. With preplanned and
optimized deployment, connections among MRs should
have a required data transmission rate. By controlling the
coverage of MRs, the maximum transmission between MC
and its serving MR is also determined, which affects the
quality of the signals and the service. Overall, the system
performance can be improved with specific benefits
discussed above. It is also one of the reasons that IEEE
802.16j [18], IEEE 802.16m [19], and LTE Advanced [20] have
adopted relay stations in their systems to fill the cell
coverage holes and/or enhance the cell capacity.
Grid topology provides a better coverage and an
enhanced capacity than that of a random topology. Grid
deployment discussed in [21] argues for a better coverage
than a hexagonal deployment. While MRs are deployed in
grids, it also naturally matches grid street topology like
Manhattan model. Backbone link between two neighboring
MRs can be within the line of sight and have better channel
condition. On the other hand, grid deployed MRs can
provide better access for MCs along the streets.
In our analytical work, backbone links employ different
frequency bands from that of the access links. Backbone
links among MRs may use licensed band so as to reduce any
unexpected interference and guarantee the backbone
performance. The stability and quality of backbone links
are essential for the quality of service provided to the MCs.
Most of the traffic is delivered via the backbone links. A
poor backbone link may drop traffic flows and lead to chaos
in the network. So, MRs are mostly deployed by the
network operators. They use licensed band that is protected
and seldom interfered by unlicensed band used by wireless
home phone, various monitoring system, WLANs, and so
on. Some present public places may have tens of different
systems using the same unlicensed band. If unlicensed band
is used for a backbone link, signals will largely interfere
with the transmission of a WMN backbone. In contrast, to
facilitate the access of MCs, it is very likely to use unlicensed
band and protocols for access link of MR cells. To be
compatible with many current mobile devices, contention
based protocols like IEEE802.11 are most likely to be used
for access links between MRs and MCs. Roaming MCs can
148 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 12, NO. 1, JANUARY 2013
recognize MR cells and connect to them for access. When
MC moves from a cell to a neighboring cell, the backbone
performs the handover to maintain service continuity for
the MC.
WMN is a cost efficient way to provide network access
service for a wide region. However, the capacity constraint
due to multiple hop transmission is still the drawback to
overcome before having a wider acceptance. As discussed
early, the per-MR capacity is

`
1
log `
1
_
_ _
.
By optimizing the placement, it approaches (
\

`
1
_
). Utilizing
random connection to APs can improve the capacity
significantly, especially when the number of AP-MRs is
increased. With a large number of MRs and WLAN APs that
have been deployed, the average number of such AP
connections is large. Per-MR capacity can be increased up
to
`

1\
`
1
. Because random connection is utilized only for a
single hop between MR and AP, it is still highly reliable as
compared to a pure multihop random network.
As an Internet gateway, the backbone link bandwidth \
of the IGW is constrained by the maximum throughput of
the intercluster traffic if without random AP access. It
serves as the lower bound of intercluster traffic perfor-
mance if there is no constraint on the access link bandwidth.
By adjusting the number of IGWs deployed in a region, it
controls the coverage area of every cluster led by an IGW.
While the density of MCs is given, smaller cluster coverage
area means smaller number of MCs in a cluster and more
intercluster traffic per MC can be supported. An extreme
case of increasing the number of IGWs is to form a multicell
single hop network architecture like GSM base stations.
This is not as cost-efficient because the cost to deploy such a
network is (`
1G\
).
Given a cluster with fixedcoverage, increasing the density
of MRs could improve the per-MC capacity with intracluster
traffic. Assume that the access link bandwidth is not the
bottleneck, i.e., 1 = (
\

`
1
_
). The increase in the MR density
have two different effects: when the number of MRs in a
unit square is less than a threshold of O(
`
C
log `
C
), the per-MC
capacity increases with

`
1
_
. When the number of MRs
reaches or runs over the threshold, the per-MCcapacity with
intracluster traffic starts to degrade. Thus, it is important to
consider the upper bound and choose an appropriate
number of MRs for an optimal performance.
Random access to APs has positive impact on both
intercluster traffic and intracluster traffic. With access to
APs, intracluster traffic has the routing shortcut through the
wired connection between APs. Intracluster traffic path like
MC-(-MR)
/
-MC can be changed like MC-(-MR)
i
-AP-AP-(-
MR)
,
-MC, where i, ,, and / denote the number of inter-
mediator MRs and i , < /. In that case, not only the
capacity can be improved but also the delay can be
decreased. The wired connection is assumed to have enough
throughput and the transmission delay between two APs is
less than / (i ,) hops. Per-MC capacity with intercluster
traffic is also improved with AP access. Intercluster traffic
would not be constrained by the IGW, as the traffic can go
through the APs and the wired connection of APs to other
clusters or the Internet.
It is noticeable that the wireless access between MRs and
APs use the same type of air interfaces as that between MRs
and MCs. So, it is easy for MRs to utilize the APs that are
widely deployed, without drastic changes in the network
functions. MR can take the APs as special MCs. The
difference is that the MR needs to be aware of wired
connection of APs to the Internet and redirect the traffic to
the APs or in the reverse direction. The reasons that MCs in
an AP-MR cell connect to the MRs rather than to the APs in
the cell directly, differ on the following aspects. APs usually
assume the access clients are static while MRs assume the
MCs having mobility and provide better channel estimate
for optimizing the link performance. MCs can have better
response if connected to the MR. MRs can perform access
control for QoS and security purposes. It is unconventional
to have such functions for the random access APs. In
addition, the handover for MCs can be supported by MRs.
With the information exchange in the backbone, MCs are
able to handover from the serving MR to a neighboring MR.
These functions are naturally supported by the MRs. APs
are only able to serve as tunnels for the traffic.
The number of AP-MRs has a different level of impact on
the capacity. For intracluster traffic, the capacity of
intracluster traffic increases with

`
1
_
if `
1
=O(
`
C
log `
C
).
With the random access to APs, the capacity is improved by
the number of AP-MRs. If `

= O(
\
1

`
1
_
), the capacity is
still predominated by the traffic with ad hoc routing in the
backbone. However, if `

= .(
\
1

`
1
_
), the capacity is then
dominated by random access to the APs and the asymptotic
capacity becomes (
`

1
`
1
). On the other hand, if there is a
large number of MRs in the cluster that `
1
= .(
`
C
log `
C
), `

would have similar effect. If `

=.(
\`
C
1

`
1
_
log `
C
), the asymp-
totic capacity is (
`

1
`
C
). For the intercluster traffic, the
increase of MRs accessing to APs almost linearly increase
the asymptotic capacity while access link is not the
bottleneck. Under these situations, increasing cell access
link bandwidth will almost linearly increase the per-MC
capacity. This is a significant enhancement to the capacity.
In this three-tier network, backbone link bandwidth \,
and access link bandwidth 1, not only their absolute value
but also their ratio, determine the bottleneck of the network.
For the intracluster traffic, the capacity will be bounded by
the access link if 1 = o(
\

`
1
_
). Then, the per-MC capacity is
determined by the number of MCs in a cell, which leads to
the asymptotic capacity (
`
1
1
`
C
). Under this situation, the
access to APs does not have much effect on the capacity.
When 1 = (
\

`
1
_
) and `

= O(
\

`
1
_
1
), access link is no
longer the bottleneck. When `

= .(
\

`
1
_
1
), the role is
changed again and the increase for the bandwidth of access
link will increase the capacity. Thus, the access link
bandwidth should be large enough so that it would not be
the bottleneck of the network. According to the derivation in
previous sections, 1=(
\

`
1
_
) .1 =O(\). If 1=o(
\

`
1
_
), the
network capacity will be seriously constrained by
the access link bandwidth. If 1 =.(\), access link
bandwidth will be wasted if there are no enough random
APs connections. While taking 1 = (
\

`
1
_
) . 1 = O(\),
the values of `
1
, `

, \, and 1mutually affect each other for


the asymptotic per-MC capacity.
FU AND AGRAWAL: CAPACITY OF HYBRID WIRELESS MESH NETWORKS WITH RANDOM APS 149
6 CONCLUSION
In this paper, we have derived asymptotic capacity of a
hybrid WMN architecture with random connections to APs.
With this, the access link bandwidth greatly affects the
capacity, which is different from a conventional WMN. To
some extent, the ratio of access link bandwidth to backbone
link bandwidth is critical. It dominates the capacity bottle-
neck and magnifies the influence of AP-MRs. Theoretical
results showthat the capacity enhancement by accessing APs
within the coverage of MRs is significant with an increase in
the number of AP-MRs and the bandwidth ratio. The
improvement is at the very low cost by utilizing currently
available networks and it is also possible for those networks
to take advantage of a WMN. It should be noted that the
access to the APs are random, it may have negative impact on
WLANs performance when the WLANs traffics are heavy.
In the future work, we plan to consider the traffic between
MRs and WLANs so as to have a control mechanism that
takes the traffic load at the APs into account.
REFERENCES
[1] N. Nandiraju, D. Nandiraju, L. Santhanam, B. He, J. Wang, and
D.P. Agrawal, Wireless Mesh Networks: Current Challenges and
Future Directions of Web-in-the-Sky, IEEE Wireless Comm.,
vol. 14, no. 4, pp. 79-89, Aug. 2007.
[2] C. Cordeiro and D.P. Agrawal, Ad Hoc & Sensor Networks: Theory
and Applications. World Scientific, 2006.
[3] P. Gupta and P. Kumar, The Capacity of Wireless Networks,
IEEE Trans. Information Theory, vol. 46, no. 2, pp. 388-404, Mar. 2000.
[4] B. He, B. Xie, and D.P. Agrawal, Optimizing the Internet
Gateway Deployment in a Wireless Mesh Network, Proc. IEEE
Intl Conf. Mobile Adhoc and Sensor Systems (MASS), 2007.
[5] B. Liu, Z. Liu, and D. Towsley, On the Capacity of Hybrid
Wireless Networks, Proc. IEEE INFOCOM, 2003.
[6] U.C. Kozat and L. Tassulas, Throughput Capacity of Random
Ad Hoc Networks with Infrastructure Support, Proc. ACM
MobiCom, 2003.
[7] A. Zemlianov and G. Veciana, Capacity of Ad Hoc Wireless
Networks with Infrastructure Support, IEEE J. Selected Area in
Comm., vol. 23, no. 3, pp. 657-667, Mar. 2005.
[8] P. Zhou, X. Wang, and R. Rao, Asymptotic Capacity of
Infrastructure Wireless Mesh Networks, IEEE Trans. Mobile
Computing, vol. 7, no. 8, pp. 1011-1024, Aug. 2008.
[9] I.F. Akyildiz, X. Wang, and W. Wang, Wireless Mesh Networks: A
Survey, Computer Networks, vol. 47, no. 4, pp. 445-487, Mar. 2005.
[10] P. Kyasanur and N.H. Vaidya, Capacity of Multi-Channel
Wireless Networks: Impact of Number of Channels and Inter-
faces, Proc. ACM MobiCom, 2005.
[11] M. Kodialam and T. Nandagopal, Characterising the Capacity
Region in Multi-Radio Multi-Channel Wireless Mesh Networks,
Proc. ACM MobiCom, 2005.
[12] D.P. Agrawal and Q. Zeng, Introduction to Wireless and Mobile
Systems. Thomson Brooks/Cole, 2003.
[13] P. Gupta and P. Kumar, Internets in the Sky: The Capacity of
Three Dimensional Wireless Networks, Comm. in Information and
Systems, vol. 1, pp. 33-50, 2001.
[14] M. Mitzenmacher and E. Upfal, Probability and Computing:
Randomized Algorithms and Probabilistic Analysis. Cambridge Univ.,
2005.
[15] P. Santi, Topology Control in Wireless Ad Hoc and Sensor Networks.
Wiley, 2005.
[16] W. Fu, B. Xie, X. Wang, and D. Agrawal, Flow-Based Channel
Assignment in Channel Constrained Wireless Mesh Networks,
Proc. 17th Intl Conf. Computer Comm. and Networks (ICCCN), 2008.
[17] J. Jun and M.L. Sichitiu, The Nominal Capacity of Wireless Mesh
Networks, Wireless Comm., vol. 10, no. 5, pp. 8-14, Oct. 2003.
[18] IEEE 802.16 Broadband Wireless Access Working Group, Part 16: Air
Interface for Fixed and Mobile Broadband Wireless Access Systems -
Multihop Relay Specification, IEEE, 2004.
[19] IEEE 802.16 Broadband Wireless Access Working Group, The Draft
IEEE 802.16m System Description Document, IEEE, 2008.
[20] E. Dahlman, H. Ekstrom, A. Furuskar, Y. Jading, J. Karlsson, M.
Lundevall, and S. Parkvall, The 3G Long-Term Evolution-Radio
Interface Concepts and Performance Evaluation, Proc. IEEE
Vehicular Technology Conf., 2006.
[21] J. Robinson and E. Knightly, A Performance Study of Deploy-
ment Factors in Wireless Mesh Networks, Proc. IEEE INFOCOM,
2007.
Weihuang Fu received the BS degree in
communications engineering and the MS degree
in communication and information systems from
the Zhejiang University of Technology, China, in
2002 and 2005, respectively, and the PhD
degree in computer science and engineering
from the University of Cincinnati, Ohio, in 2010.
He joined Cisco Systems, Inc., in 2010. He has
been a technical program committee member of
many international conferences and a technical
reviewer of numerous international journals and conference proceedings.
His research interests include network modeling and analysis, MAC/
routing protocol for wireless multihop networks, and mobility manage-
ment. He is a member of the IEEE and the IEEE Computer Society.
Dharma P. Agrawal is the Ohio Board of
Regents distinguished professor in the School
of Computing Sciences and Informatics and the
founding director for the Center for Distributed
and Mobile Computing at the University of
Cincinnati, Ohio. He was a visiting professor of
electrical and computer engineering at the
Carnegie Mellon University on sabbatical leave
during the autumn 2006 and winter 2007
quarters. He was a faculty member at North
Carolina State University, Raleigh from 1982-1998 and at Wayne State
University, Detroit from 1977-1982. His current research interests
include energy-efficient routing and information retrieval in sensor and
mesh networks, QoS in integrated wireless networks, use of smart
multibeam directional antennas for enhanced QoS, various aspects of
sensor networks including environmental monitoring, and secured
communication in ad hoc and sensor networks. His coauthored textbook,
Introduction to Wireless and Mobile Systems, third edition published by
Cengage Corp., has been adopted throughout the world and revolutio-
nized the way the course is taught. His second coauthored textbook,
Ad Hoc and Sensor Networks, second edition, was published by World
Scientific. He has served as an editor of the IEEE Computer, the IEEE
Transactions on Computers, and the International Journal of High Speed
Computing. He is an editor for the Journal of Parallel and Distributed
Systems, International Journal on Distributed Sensor Networks, Inter-
national Journal of Ad Hoc and Ubiquitous Computing (IJAHUC),
International Journal of Ad Hoc and Sensor Wireless Networks, and
Journal of Information Assurance and Security. He has been the
program chair and general chair for numerous international conferences
and meetings. He has received numerous certificates and awards from
the IEEE Computer Society. He was awarded a Third Millennium
Medal by the IEEE for his outstanding contributions. He has also
delivered keynote speeches for five international conferences. He has
five patents and 23 patent disclosures in the area of wireless networking.
He served as a fulbright senior specialist for five years and was the
founding editor-in-chief of the Central European Journal of Computer
Science, Versita. He has graduated 62 PhD and 51 MS students and
was also named as an ISI Highly Cited Researcher in computer science.
He won the 2008 Harry Goode Memorial award from the IEEE Computer
Society and the 2011 Award for Excellence in Mentoring of Doctoral
Students, University of Cincinnati. He is a fellow of the IEEE, IEEE
Computer Society, ACM, AAAS, and WIF.
150 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 12, NO. 1, JANUARY 2013

Das könnte Ihnen auch gefallen