Nikolaos Tsarmpopoulos, Ioannis Kalavros, S. Lalis
{"title":"A low-cost and simple-to-deploy peer-to-peer wireless network based on open source Linux routers","authors":"Nikolaos Tsarmpopoulos, Ioannis Kalavros, S. Lalis","doi":"10.1109/TRIDNT.2005.3","DOIUrl":null,"url":null,"abstract":"In this paper we present our work towards deploying a community wireless network with ad hoc communication and routing between its elements. We describe our network model and implementation of wireless routers, while motivating decisions and pointing out open issues. The main advantage of our approach is the low deployment cost and inherent flexibility in terms of adapting the network configuration with little or no human intervention, which in turn can be exploited to support the dynamic addition, removal and mobility of network elements.","PeriodicalId":299180,"journal":{"name":"First International Conference on Testbeds and Research Infrastructures for the DEvelopment of NeTworks and COMmunities","volume":"31 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"33","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"First International Conference on Testbeds and Research Infrastructures for the DEvelopment of NeTworks and COMmunities","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/TRIDNT.2005.3","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 33
Abstract
In this paper we present our work towards deploying a community wireless network with ad hoc communication and routing between its elements. We describe our network model and implementation of wireless routers, while motivating decisions and pointing out open issues. The main advantage of our approach is the low deployment cost and inherent flexibility in terms of adapting the network configuration with little or no human intervention, which in turn can be exploited to support the dynamic addition, removal and mobility of network elements.