Skip to main content
Advertisement
Browse Subject Areas
?

Click through the PLOS taxonomy to find articles in your field.

For more information about PLOS Subject Areas, click here.

  • Loading metrics

New Vertical Handover Method to Optimize Utilization of Wireless Local Area Network in High-Speed Environment

Abstract

In heterogeneous wireless networks, wireless local area network (WLAN) is highly preferred by mobile terminals (MTs) owing to its high transmission bandwidth and low access cost. However, in high-speed environment, handover from a cellular network to a WLAN cell will lead to a high number of handover failures and unnecessary handovers due to the WLAN coverage limitation and will become worse at high speed. A new vertical handover method is proposed to minimize the probability of handover failure and unnecessary handover while maximizing the usage of WLAN in high-speed environment. The simulation results show that the proposed method kept the probability of handover failure and unnecessary handover below 0.5% and 1%, respectively. Compared with previous studies, the proposed method reduced the number of handover failures and unnecessary handovers up to 80.0% and 97.7%, respectively, while the MT is highly mobile. Using the proposed prediction method, the MT can benefit high bandwidth and low network access cost from the WLAN with minimum interruption regardless of speed.

Introduction

Next-generation wireless networks will be driven by an all-IP-based network infrastructure that provides seamless mobility and ubiquitous access to Internet through heterogeneous wireless networks [1]. In heterogeneous wireless network, wireless local area network (WLAN) is highly preferred owing to its high capacity and low access cost [2, 3]. However, because of limited WLAN coverage, handover from a cellular network to the WLAN may lead to a high number of handover failures and unnecessary handovers when a mobile terminal (MT) is in a high-speed environment because the MT requires less time to cross the WLAN coverage when the speed increases [3, 4].

Handover failure occurs when the MT traveling time within a WLAN (TWLAN) is less than the handover latency from a cellular network to the WLAN (Ti). The MT leaves the WLAN coverage before the handover process is executed causing network connection breakdown and service interruption [35]. On the other hand, if TWLAN is equal to or less than the total time of handover to (Ti) and out of (To) the WLAN coverage (TWLAN ≤ (Ti + To)), unnecessary handover occurs [6]. In this situation, the MT does not transmit or receive any data packet via the WLAN because the MT triggers handover out of the WLAN only after completion of handover into the WLAN. Unnecessary handover is undesirable because it wastes network resources [7].

At present, WLAN application is restricted to static or pedestrian navigation environment [8]. For example, in the patient monitoring system using heterogeneous wireless networks proposed by Niyato et al. [2], WLAN was used only for communication within a building such as mall, clinic, hospital, and home. Furthermore, most of the existing handover decision-making algorithms predefined a speed threshold for the WLAN where the MT handovers to the WLAN if and only if the speed of MT is lower than the threshold to prevent unnecessary handover to the WLAN at high mobility. The network-selection algorithms presented in [912] defined the WLAN speed threshold at 5 m/s and below. In addition, the fuzzy multi-criteria-based vertical handover algorithm presented by Kaleem et al. [13] and Yew et al. [14] set the rule: “if MT velocity (v) is low, then the probability of WLAN rejection is low; else the probability of WLAN rejection is high.”

Yan et al. [6] and Hussain et al. [15] presented a traveling distance prediction-based vertical handover scheme to minimize the number of handover failures and unnecessary handovers to WLAN with assumption that MT travels in constant speed within the WLAN coverage. In these schemes, MTs have to take two received signal strength (RSS) sample points within a WLAN cell. The first RSS sample point is at the point where the MT detects a predefined RSS threshold (PIn_RSSth), and the second sample point (s, as shown in Fig 1) can be any point within the WLAN cell (after the MT enters the WLAN cell). The trigonometric function is then applied to predict the MT traveling distance within the WLAN cell. The MT triggers handover to the WLAN if and only if the estimated traveling distance within the WLAN is greater than the distance threshold (Lth). The Lth of handover failure presented by Yan et al. [6] (LthfY) and Hussain et al. [15] (LthfH) is expressed as (1) (2)

The unnecessary handovers Lth presented by Yan et al. [6] (LthuY) and Hussain et al. [15] (LthuH) are expressed as (3) (4) where r is the WLAN radius, v is the measured MT’s velocity, and Pu and Pf denote the user-acceptable probability of unnecessary handover and handover failure, respectively. The results show that both the probability of handover failure and unnecessary handover are kept within the user acceptable value [6, 15]. However, the optimum time to take the second RSS sample point was not considered by the authors. We have found that the larger the time gap between the two RSS sample points is, the lower becomes the accuracy of the prediction result. The time needed by the MT to cover the two RSS sample points is expressed as , where ts is the time of the MT at the second RSS sample point s and is the time of the MT at the first sample point PIn_RSSth (Fig 1). Therefore, using the methods presented by Yan et al. [6] and Hussain et al. [15], the actual beneficial time (ATWLAN) for the MT should be (5)

In this paper, a novel vertical handover method is proposed to improve the accuracy of the traveling-time estimation and to minimize both handover failure and unnecessary handover to the WLAN when the MT is in a high-speed environment.

Proposed Vertical Handover Method

Fig 1 shows the MT travel trajectory in WLAN cell coverage. We assume that the MT crosses the WLAN cell from an entry point (Pentry) to an exit point (Pexit) (as shown in Fig 1) at irregular speed (accelerate or decelerate). The beneficial time (TWLAN) for the MT within the WLAN cell is defined as the time the MT travels from points PIn_RSSth to POut_RSSth. The MT would only be able to benefit from the connected WLAN cell if TWLAN > (Ti + To).

In Fig 1, R denotes the distance between Pexit or Pentry and the WLAN access point (AP), PRSSth is any point that falls on the predefined RSSth line, r is the distance between PRSSth and AP, and d is the MT traveling distance from Pentry to PIn_RSSth. d is expressed as (6) where td is time taken by the MT to travel from Pentry to PIn_RSSth, ve and vR denotes velocity at Pentry and PIn_RSSth respectively, which can be measured using an accelerometer or velocity estimation algorithm in [16], Δ is the minimum value of d, namely, (R-r), and dm represents the maximum d value, . The R and r values can be determined based on the RSS value measured at points Pentry () and PIn_RSSth (), respectively, using the log-distance path loss model [17], as expressed by (7). (7) where d0 is the distance between the AP and a reference point, PTX is the AP transmit power, PL0 is the power loss at the reference point, n is the path loss exponent, and ε is a zero-mean Gaussian random variable caused by shadow fading. A low-pass filter can be used to suppress the shadowing part [18]. Similarly, the r value can be calculated by replacing in (7) with .

In this paper, we assume Doppler shift problem caused by high mobility can be mitigated by using the Doppler diversity. In [19], Doppler domain multiplexing communication structure is proposed to achieve the maximum Doppler diversity in time varying fading. Furthermore, the Doppler frequency offset estimation and compensation algorithms presented in [20, 21] can be used to alleviate the Doppler effects in high-speed environment.

The RSS value is monitored by MT periodically at time interval of Tm which is given by second, where v is the measured MT’s velocity and DS is a fixed sampling distance of 1 m [22]. N number of RSS samples is collected over the time interval of ρ and the median value is selected to determine the distance between MT and AP. This is to minimize the impact of RSS fluctuation. The median method [shown in (8)] is used instead of the mean method [23] because it overcomes a sudden large increase or decrease in the RSS value caused by an unintended factor. Therefore, RSS value is given as (8)

The number of samples N is adjusted dynamically to the MT’s traveling velocity expressed as (9) where Ts is RSS sampling time (Ts = 1 ms) and ρ = K * Tm, K ∈ [0.1,0.9]. The maximum number of RSS samples is limited to 30 to avoid excessive sampling at low traveling speed. Once the d, R, and r values are obtained, angle β can be determined using the cosine law as follows: (10)

By knowing β, we can determine angle α by (11)

Then, we can calculate the traveling distance l.

(12)

From (11) (13)

Substituting (13) into (12) yields (14)

Substituting (14) into (10) yields distance l as (15)

By applying the kinematic equation, l also can be expressed as (16) where c denotes MT’s acceleration or deceleration rate. It can be determined by (17) where tR and te represent the time of the MT passes through PIn_RSSth and Pentry, respectively.

Next, we derive d from (15).

(18)

Instead of using the time threshold similar to what were previously presented in [6, 15], we introduce a threshold for distance d known as dth so that the MT can make handover decision by comparing the measured d value with dth directly. We can derive dth from (18) by replacing l with lth and d with dth. It is given as (19) where lth is the traveling distance threshold. From (16), lth for handover failure lthf and unnecessary handover lthu can be expressed as (20) (21)

In constant speed (c = 0), lthf = vTi and lthu = v(Ti + To) which are identical to Yan et al.’s method as shown in (1) and (3) if both Pf and Pu are equal to 0. By substituting (20) into (19) yields dth for handover failure dthf as (22)

Similarly, dth for unnecessary handover dthu can be determined by substituting (21) into (19) and it is given as (23)

The relationship between d and l is shown in Fig 2A, which shows that d inversely varies with l, indicating that the greater the traveling distance within WLAN coverage l is, the smaller is the d value. Referring to (22) and (23), both dthu and dthf are depending on the handover latency, acceleration or deceleration rate and velocity. By setting the handover latency (Ti and To) at 1 second [6, 15], the correlation of dth (dthu and dthf), c, and vR is shown in Fig 2B, where the dth value decreases when the MT’s velocity increases or speeds up. The proposed method triggers a handover to the WLAN if and only if measured d value is less than estimated dth value.

thumbnail
Fig 2.

Relationship between (A) the d value and traveling distance l and (B) dth, acceleration and velocity.

https://doi.org/10.1371/journal.pone.0165888.g002

Performance Evaluation

The scenario as shown in Fig 1 was simulated using OPNET. The WLAN cell is expected within the coverage of cellular network. We assume that the MT was connected to cellular network and seek for the availability of a WLAN. MT initiates the prediction process when the measured WLAN’s RSS value is greater than the predefined (MT reached point Pentry). In the prediction process, MT calculates the d, dthf and dthu value based on the vR, ve, tR, te, R and r values measured at point Pentry and PIn_RSSth (measured WLAN’s RSS value > RSSth). If calculated d value is less than the dth value (dthf and dthuI), MT triggers handover to WLAN cell. Otherwise, it remains connected to cellular network.

In this experiment, 10,000 random trajectories were generated for MT to cross the WLAN coverage at speeds from 11.11 to 41.66 m/s (40 to 150 km/h) in 2.22 m/s (8 km/h) increments. The simulation parameters listed in Table 1 were selected to observe the performance of the proposed method. The radius r is set as 50 m and the total handover latency for the handover into and out of the WLAN was 2 seconds as in [6, 15]. The traveling time within the WLAN coverage was nearly equal to the total handover latency when the MT velocity reached 150 km/h. As a result, unnecessary handover always occurred when the speed of the MT was higher than 150 km/h.

The experiment was simulated within two scenarios. First scenario is that the MT crosses the WLAN cell in random direction with speed remaining fixed (c = 0) within the WLAN coverage [6, 15]. The second scenario is that the MT crosses the WLAN coverage in random direction with smooth acceleration in the range of 1 m/s2 to 5 m/s2. The deceleration condition is not critical to handover failure and unnecessary handover because it offers MT longer traveling time within the WLAN coverage. Therefore, deceleration condition was not considered in this experiment.

In order to generate random trajectories within the WLAN coverage, a random AP coordinate was generated in this experiment. The x coordinate of the AP was fixed at 100, but the y coordinate (random_y) was a random value within the range of -r to r (r = 50). This is to ensure that all the trajectories are crossing the WLAN coverage. The distance of each trajectory is 200 m. The actual traveling distance within the WLAN coverage (D) is expressed as [6] (24) where h = |AP y coordinateMT y coordinate|, as shown in Fig 3. The MT x coordinate (random_x) was randomly set from 0 to 30 m (random_x ∈ [0,30]) to create a different starting point for each MT when it moves toward the WLAN coverage.

thumbnail
Fig 3. Scenario of MT traveling trajectory in the WLAN coverage.

https://doi.org/10.1371/journal.pone.0165888.g003

The handover failure and unnecessary handover occur if the actual traveling time within the WLAN coverage (TWLAN) is less than Ti and Ti+To, respectively. The actual traveling time within the WLAN coverage for first scenario (c = 0) can be determined by . In the second scenario (c = 1~5 m/s2), the actual traveling time within the WLAN coverage can be calculated by (25)

The pseudo code of determine the number of handover failures and unnecessary handovers is shown in Fig 4.

thumbnail
Fig 4. Pseudo code for determine number of handover failures and unnecessary handovers.

https://doi.org/10.1371/journal.pone.0165888.g004

The performance of the proposed method is compared against the existing methods from Yan et al. [6] and Hussain et al. [15]. Fig 5 shows the total number of handovers performed by the existing methods and the proposed methods for the speeds from 11.11 to 41.66 m/s. Fig 5A shows that in the first scenario, all the methods have identical number of handovers based on the handover failure thresholds (dthf, LthfY, and LthfH, respectively) defined by each method. In terms of the triggered handovers based on the unnecessary handover threshold (dthu, LthuY, and LthuH, respectively), the method of Hussain et al. has higher number of handovers than the other methods (Fig 5B). In the second scenario, the number of handovers attained by the proposed method is lower than the first scenario. This is due to the smaller dth value as the MT accelerates (shown in Fig 2B). However, the previous methods [6, 15] have same number of handovers as first scenario because these methods do not consider speed change and assumed all the MTs cross the WLAN coverage in constant speed.

thumbnail
Fig 5.

Total number of handovers to the WLAN based on (A) handover failure threshold and (B) unnecessary handover threshold.

https://doi.org/10.1371/journal.pone.0165888.g005

The number of handover failures and unnecessary handovers were determined by applying different values of (in Table 1) to the previous methods [6, 15]. The simulation results shown in Fig 6 show that the larger the value of is, the higher is the number of handover failures and unnecessary handovers when the MT traveling speed increases. However, the proposed method is not affected by the value because it completes the traveling distance prediction process when MT reaches PIn_RSSth. In contrast, the previous works initiated the prediction process after the MT reached PIn_RSSth.

thumbnail
Fig 6.

Number of (A) handover failures and (B) unnecessary handovers.

https://doi.org/10.1371/journal.pone.0165888.g006

In the second scenario (c = Random), the traveling time in WLAN coverage is always less than the time in the first scenario due to the acceleration. Therefore, the previous methods have even more handover failures and unnecessary handovers in the second scenario owing to the previous methods assuming MT remains at constant speed within WLAN coverage. Fig 6 shows the number of handover failures and unnecessary handovers obtained by the proposed method are much lower than the previous methods.

For better comparison of the performance results, we divided the number of handover failures and unnecessary handovers by the total number of handovers. Fig 7 shows that the ratio of handover failures and unnecessary handovers of the proposed methods are below 0.005 and 0.01 for both scenarios. It outperforms the previous methods that have been presented in [6, 15]. The handover failures and unnecessary handovers ratio of the proposed method rise while the MTs travel at higher speed. This is due to the fewer RSS samples collected by MT at higher speed affects the accuracy of RSS measurements and distance prediction. The summary of the performance comparison results is listed in Table 2. The results show that the proposed method has successfully reduced the probability of handover failures and unnecessary handovers to the WLAN by up to 66.7% and 96.3% in first scenario (c = 0), and 80.0% and 97.7% in second the scenario (c = 1~5 m/s2) compared with the previous methods.

thumbnail
Fig 7.

Ratio of (A) handover failures and (B) unnecessary handovers to the total number of handovers.

https://doi.org/10.1371/journal.pone.0165888.g007

Conclusion

This paper has presented a new vertical handover method to optimize the utilization of WLAN in high-speed environment. The proposed method overcomes the imperfections and limitations of previous methods. The simulation results show that the proposed method performs better than the previous methods. It keeps the probability of handover failure and unnecessary handover below 0.5% and 1% respectively. The proposed method can be applied for all handovers from macro-cell, such as Long Term Evolution (LTE), Worldwide Interoperability for Microwave Access (WiMAX) or Universal Mobile Telecommunications System (UMTS) to WLAN. With the proposed method, the user can benefit more from WLAN cells with high bandwidth and low access cost, which can improve the quality of service and the cost effectiveness.

In future, we will focus on fast and robust authentication to further improve the performance of handover from macro-cell to WLAN in high mobility scenario. An efficient authentication scheme can minimize the handover latency, packet loss and communication overhead [24]. The recent authentication schemes and protocol designs can be found in [2529].

Supporting Information

S1 Dataset. Data of simulation results.

A: Relationship between the d, acceleration and velocity (Fig 2A). B: Relationship between dth, acceleration and velocity (Fig 2B). C: Total number of handover to the WLAN based on the handover failure threshold (Fig 5A). D: Total number of handover to the WLAN based on the unnecessary handover threshold (Fig 5B). E: Number of handover failures (Fig 6A). F: Number of unnecessary handovers (Fig 6B). G: Ratio of handover failures to the total number of handovers (Fig 7A). H: Ratio of unnecessary handovers to the total number of handovers (Fig 7B).

https://doi.org/10.1371/journal.pone.0165888.s001

(XLSX)

Acknowledgments

This research is supported by the Ministry of Education Malaysia and Universiti Teknologi Malaysia under Grant No. Q.J130000.2745.02K17, R.J130000.7309.4B120, R.J130000.7309.4B121, R.J130000.7309.4B122, and R.J130000.7309.4B123.

Author Contributions

  1. Conceptualization: HTY MHS ES.
  2. Data curation: HTY MHS.
  3. Formal analysis: HTY MHS.
  4. Funding acquisition: MHS ES.
  5. Investigation: HTY MHS.
  6. Methodology: HTY MHS.
  7. Project administration: HTY MHS ES YWH.
  8. Resources: HTY MHS ES.
  9. Software: HTY MHS.
  10. Supervision: HTY MHS ES YWH.
  11. Validation: HTY MHS.
  12. Visualization: HTY MHS ES YWH.
  13. Writing – original draft: HTY MHS ES YWH.
  14. Writing – review & editing: HTY MHS ES YWH.

References

  1. 1. Ahmed A, Boulahia LM, Gai, x ti D. Enabling Vertical Handover Decisions in Heterogeneous Wireless Networks: A State-of-the-Art and A Classification. Communications Surveys & Tutorials, IEEE. 2014;16(2):776–811.
  2. 2. Niyato D, Hossain E, Camorlinga S. Remote patient monitoring service using heterogeneous wireless access networks: architecture and optimization. Selected Areas in Communications, IEEE Journal on. 2009;27(4):412–23.
  3. 3. Kyoung Seok L, Ae-Soon P, editors. Reduction of handover failure for small cells in heterogeneous networks. Information and Communication Technology Convergence (ICTC), 2014 International Conference on; 2014 22–24 Oct. 2014. https://doi.org/10.1109/ICTC.2014.6983264
  4. 4. Jung-Min M, Jungsoo J, Sungjin L, Nigam A, Sunheui R, editors. On the trade-off between handover failure and small cell utilization in heterogeneous networks. Communication Workshop (ICCW), 2015 IEEE International Conference on; 2015 8–12 June 2015. https://doi.org/10.1109/ICCW.2015.7247521
  5. 5. Barcelo F. Performance analysis of handoff resource allocation strategies through the state-dependent rejection scheme. Wireless Communications, IEEE Transactions on. 2004;3(3):900–9.
  6. 6. Xiaohuan Y, Mani N, Sekercioglu YA. A Traveling Distance Prediction Based Method to Minimize Unnecessary Handovers from Cellular Networks to WLANs. Communications Letters, IEEE. 2008;12(1):14–6.
  7. 7. Wong KD, Cox DC. Two-state pattern-recognition handoffs for corner-turning situations. Vehicular Technology, IEEE Transactions on. 2001;50(2):354–63.
  8. 8. Song W, Zhuang W. Introduction on Cellular/WLAN Interworking. Interworking of Wireless LANs and Cellular Networks. SpringerBriefs in Computer Science: Springer New York; 2012. p. 1–10. https://doi.org/10.1007/978-1-4614-4379-7_1
  9. 9. Khan M, Han K. An Optimized Network Selection and Handover Triggering Scheme for Heterogeneous Self-Organized Wireless Networks. Mathematical Problems in Engineering. 2014;2014:11.
  10. 10. Malathy EM, Muthuswamy V. Knapsack—TOPSIS Technique for Vertical Handover in Heterogeneous Wireless Network. PLoS ONE. 2015;10(8):e0134232. pmid:26237221
  11. 11. Yew HT, Supriyanto E, Haikal Satria M, Hau YW. User-centric based vertical handover decision algorithm for telecardiology application in heterogeneous networks. Jurnal Teknologi. 2015;77(7):79–83.
  12. 12. Janevski T, Jakimoski K, editors. Mobility sensitive algorithm for vertical handovers from WiMAX to WLAN. Telecommunications Forum (TELFOR), 2012 20th; 2012 20–22 Nov. 2012. https://doi.org/10.1109/TELFOR.2012.6419155
  13. 13. Kaleem F, Mehbodniya A, Yen KK, Adachi F. A Fuzzy Preprocessing Module for Optimizing the Access Network Selection in Wireless Networks. Advances in Fuzzy Systems. 2013;2013:9.
  14. 14. Yew HT, Aditya Y, Satrial H, Supriyanto E, Hau YW. Telecardiology system for fourth generation heterogeneous wireless networks. ARPN Journal of Engineering and Applied Sciences. 2015;10(2):600–7
  15. 15. Hussain R, Malik S, Abrar S, Riaz R, Ahmed H, Khan S. Vertical Handover Necessity Estimation Based on a New Dwell Time Prediction Model for Minimizing Unnecessary Handovers to a WLAN Cell. Wireless Pers Commun. 2013;71(2):1217–30.
  16. 16. Mohanty S. VEPSD: a novel velocity estimation algorithm for next-generation wireless systems. Wireless Communications, IEEE Transactions on. 2005;4(6):2655–60.
  17. 17. Santi P. Modeling Next Generation Wireless Networks. Mobility Models for Next Generation Wireless Networks: John Wiley & Sons, Ltd; 2012. p. 19–32. https://doi.org/10.1002/9781118344774.ch2
  18. 18. Nguyen-Vuong Q-T, Agoulmine N, Ghamri-Doudane Y. A user-centric and context-aware solution to interface management and access network selection in heterogeneous wireless environments. Computer Networks. 2008;52(18):3358–72.
  19. 19. Wu J, editor Exploring Maximum Doppler Diversity by Doppler Domain Multiplexing. IEEE Globecom 2006; 2006 Nov. 27 2006-Dec. 1 2006. https://doi.org/10.1109/GLOCOM.2006.897
  20. 20. Yang Y, Fan P, Huang Y, editors. Doppler frequency offsets estimation and diversity reception scheme of high speed railway with multiple antennas on separated carriages. Wireless Communications & Signal Processing (WCSP), 2012 International Conference on; 2012 25–27 Oct. 2012. https://doi.org/10.1109/WCSP.2012.6542876
  21. 21. Feukeu EA, Djouani K, Kurien A, editors. Compensating the effect of Doppler shift in a vehicular network. AFRICON, 2013; 2013 9–12 Sept. 2013. doi: https://doi.org/10.1109/AFRCON.2013.6757685
  22. 22. Singh B. An improved handover algorithm based on signal strength plus distance for interoperability in mobile cellular networks. Wireless Pers Commun. 2007;43(3):879–87.
  23. 23. Ravi A, Peddoju S. Handoff Strategy for Improving Energy Efficiency and Cloud Service Availability for Mobile Devices. Wireless Pers Commun. 2015;81(1):101–32.
  24. 24. Zubair M, Kong X, Mahfooz S. DMAM: distributed mobility and authentication mechanism in next generation networks. Security and Communication Networks. 2015;8(5):845–63.
  25. 25. Ge M, Choo K-KR, Wu H, Yu Y. Survey on key revocation mechanisms in wireless sensor networks. Journal of Network and Computer Applications. 2016;63:24–38.
  26. 26. Nam J, Choo K-KR, Han S, Kim M, Paik J, Won D. Efficient and Anonymous Two-Factor User Authentication in Wireless Sensor Networks: Achieving User Anonymity with Lightweight Sensor Computation. PLoS ONE. 2015;10(4):e0116709. pmid:25849359
  27. 27. Bao Q, Hou M, Choo KKR, editors. A one-pass identity-based authentication and key agreement protocol for wireless roaming. 2016 Sixth International Conference on Information Science and Technology (ICIST); 2016 6–8 May 2016. https://doi.org/10.1109/ICIST.2016.7483455
  28. 28. Cao J, Li H, Ma M, Zhang Y, Lai C. A simple and robust handover authentication between HeNB and eNB in LTE networks. Computer Networks. 2012;56(8):2119–31.
  29. 29. Lai Y-M, Cheng P-J, Lee C-C, Ku C-Y. A New Ticket-Based Authentication Mechanism for Fast Handover in Mesh Network. PLoS ONE. 2016;11(5):e0155064. pmid:27171160