ESS Mesh Deployment Usage Model

Slides:



Advertisements
Similar presentations
Extended Service Set (ESS) Mesh Network Daniela Maniezzo.
Advertisements

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—2-1 Extending Switched Networks with Virtual LANs Introducing VLAN Operations.
The subnet /28 has been selected to be further subnetted to support point-to-point serial links. What is the maximum number of serial links.
Auto Configuration and Mobility Options in IPv6 By: Hitu Malhotra and Sue Scheckermann.
Doc.: IEEE /1183r0 Submission September 2011 Masataka Ohta, Tokyo Institute of TechnologySlide 1 IP over Congested WLAN Date: Authors:
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Institute of Technology, Sligo Dept of Computing Semester 3, version Semester 3 Chapter 3 VLANs.
Connecting LANs, Backbone Networks, and Virtual LANs
Introducing Reliability and Load Balancing in Home Link of Mobile IPv6 based Networks Jahanzeb Faizan, Mohamed Khalil, and Hesham El-Rewini Parallel, Distributed,
Submission doc.: IEEE 11-12/0589r0 May 2012 Donald Eastlake 3rd, Huawei R&D USASlide 1 General Links Date: Authors:
Submission doc.: IEEE /1015r1 September 2015 Guido R. Hiertz et al., EricssonSlide 1 Proxy ARP in ax Date: Authors:
1/28/2010 Network Plus Network Device Review. Physical Layer Devices Repeater –Repeats all signals or bits from one port to the other –Can be used extend.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Submission doc.: IEEE 11-12/0589r1 May 2012 Donald Eastlake 3rd, Huawei R&D USASlide 1 General Links Date: Authors:
Doc.: mes Submission 7 May 2004 Tricci SoSlide 1 Need Clarification on The Definition of ESS Mesh Prepared by Tricci So.
15.1 Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
OSI Model. Switches point to point bridges two types store & forward = entire frame received the decision made, and can handle frames with errors cut-through.
Computer Networks 15-1 Chapter 15. Connecting LANs, Backbone Networks, and Virtual LANs 15.1 Connecting devices 15.2 Backbone networks 15.3 Virtual LANs.
ARMD – Next Steps Next Steps. Why a WG There is a problem People want to work to solve the problem Scope of problem is defined Work items are defined.
Chapter 3 - VLANs. VLANs Logical grouping of devices or users Configuration done at switch via software Not standardized – proprietary software from vendor.
Doc.: IEEE 11-04/0319r0 Submission March 2004 W. Steven Conner, Intel Corporation Slide 1 Architectural Considerations and Requirements for ESS.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 1 Module 10 Routing Fundamentals and Subnets.
Doc.: IEEE /0598r0 Submission May 2004 Tyan-Shu Jou, et al., Janusys NetworksSlide 1 Is Spanning Tree Protocol Right for ESS Mesh? Tyan-Shu Jou,
Doc.: IEEE /1183r1 Submission September 2011 Masataka Ohta, Tokyo Institute of TechnologySlide 1 IP over Congested WLAN Date: Authors:
Doc.: IEEE /1115r2 Submission J Chhabra, A. R. Prasad, J. Walker, H. AokiSlide s Security concepts Jasmeet Chhabra, Intel
Introduction to “Tap – Dance ”. Company Proprietary Presentation Topics  Introduction  Handover scenarios  Inter-Network Handover consequences  Common.
Presented by Edith Ngai MPhil Term 3 Presentation
Higher Layer Packet Container Proposal Presentation
Content Protection Support in
Pertemuan 23 IP Routing Protocols
Architecture and Algorithms for an IEEE 802
Considerations on WDS Addressing Tricci So 7 May 2004 Prepared by
Chapter 4 Data Link Layer Switching
doc.: IEEE /xxx Jon Edney, Nokia
ESS Mesh Network Interconnection Considerations
Is Spanning Tree Protocol Right for ESS Mesh?
Proposal for ESS Mesh Date: Authors:
WLAN Mesh in CAPWAP Architecture
Technical Requirements for IEEE ESS Mesh Networks
Content Protection Support in
Reason Why L2 Per Frame Authentication Is Required
Uplink Broadcast Service
Resolutions to orphan comments
WLAN Mesh in CAPWAP Architecture
Mesh Relevance in CAPWAP and AP Functional Descriptions
ESS Mesh Deployment Usage Model
Chapter 3 VLANs Chaffee County Academy
Usage Scenarios for ESS Mesh Network
Discussion for 11ah Functional Requirements
Network Architecture for Cyberspace
Month Year doc.: IEEE yy/xxxxr0
DLP & Security March 2003 Month 2002 doc.: IEEE /xxxr0
WLAN Architectural Considerations for IETF CAPWAP
Chapter 15. Connecting Devices
May 2004 doc.: IEEE /xxxr0 May 2004 The Nature of an ESS
WLAN Architectural Considerations for IETF CAPWAP
Possible Enhancement for Broadcast Services over WLAN
TGs Mesh Networking Proposal
Suggested Clarification of s ESS Mesh Terminology
Proposed Extensible Approach for WLAN Mesh Standardization
Supporting Authentication/Association for Large Number of Stations
Is Spanning Tree Protocol Right for ESS Mesh?
Naval Research Laboratory Dynamic Backbone Subnets
Month Year doc.: IEEE yy/xxxxr0
Potential L2 security options for UL BCS
Review of Internet Protocols Network Layer
Consideration on Multi-AP Coordination
On ESS Mesh Device Discovery
Reconciling Zero-conf with Efficiency in Enterprises
Presentation transcript:

ESS Mesh Deployment Usage Model May 2004 ESS Mesh Deployment Usage Model Ted Kuo, Tyan-Shu Jou, and Ming Sheu ted@janusysnetworks.com Janusys Networks, Inc. Date: May 11, 2004 Ted Kuo, et al., Janusys Networks

Outlines Single IP Subnet Usage Model Deployment Requirements Month 2002 doc.: IEEE 802.11-02/xxxr0 May 2004 Outlines Single IP Subnet Usage Model Deployment Requirements Architectural Considerations Next Steps Ted Kuo, et al., Janusys Networks John Doe, His Company

Single IP Subnet Usage Model May 2004 Single IP Subnet Usage Model Router DHCP Server Border MeshSW L2 SW WDS AP Mesh AP PC Mesh AP AP Mesh AP Mesh AP Mesh AP Mesh AP Mesh AP Mesh AP Mesh AP Mesh AP Mesh AP roaming Ted Kuo, et al., Janusys Networks

Deployment Requirements May 2004 Deployment Requirements Preserve today’s IP-based application usage models Transparently maintain robust L2 connectivity Multiple border nodes to wired network Possible wired clients Interop with traditional APs Both uplinks and downlinks Easy to manage Ted Kuo, et al., Janusys Networks

Architecture Considerations May 2004 Architecture Considerations Connectivity Neighboring mesh nodes discovery Dynamic Forwarding Path Calculation Maintain forward path stability for predicable path latency Dealing with RF changes effectively but should not be too sensitive Take link quality metrics into consideration in path cost calculation Reduce (src, dst) path distance within the ESS Mesh Security Mutual authentication among neighboring mesh nodes Preshare key and/or Digital Certificates Confidentiality Pair-wise encryption between neighboring mesh switches Broadcast/Multicast Handling Centralized Tunneling broadcast/multicast/unknown destination frames to a designated server Distributed Loop prevention - select broadcast/multicast forwarding neighbors Ted Kuo, et al., Janusys Networks

Architecture Considerations (Cont’d) May 2004 Architecture Considerations (Cont’d) STA Roaming Within IP subnet - station association reporting mechanism Across IP subnet - solve it at IP routers IP Operation IP address management for mesh switches Effective DHCP and ARP handling Management Management and control capability Minimize necessary configuration and management Ted Kuo, et al., Janusys Networks

May 2004 Next Steps Define sets of criteria, according to (deployment and application) usage models, for solution (protocol or mechanism) selection Feasibility/performance study on path forwarding algorithm with simulation models against reference topologies Solicit available solutions for further consideration Ted Kuo, et al., Janusys Networks