Proactive Mesh Networks Summary [ J : 35 Proactive Mesh]

Slides:



Advertisements
Similar presentations
Doc.: IEEE /0386r2 Submission Bing Zhang, et al. May 2005 Slide 1 Proactive Mesh Networks (ProM) Date: Authors: Notice: This document.
Advertisements

Doc.: IEEE /0386r0 Submission Bing Zhang, et al. May 2005 Slide 1 Proactive Mesh Networks (ProM) Date: Authors: Notice: This document.
June 2005 doc.: IEEE /0593r0 July 2005 Summary Presentation Proposal L:19 Siemens Proposal for WLAN Mesh Networking Date: Authors:
[ Interim Meetings 2006] Date: Authors: July 2005
TGu/TGv Joint Session Date: Authors: July 2005 July 2005
Lightweight Mesh Point – A confusing term
LB73 Noise and Location Categories
LB73 Noise and Location Categories
Waveform Generator Source Code
Scalable Station Association Information Handling
Scalable Station Association Information Handling (Summary)
Scalable Station Association Information Handling
September 2005 Performance Evaluation of the CCC MMAC Protocol for s Mesh Networks Date: Authors: Notice: This document has been prepared.
3GPP Extended Date: Authors: July 2005 July 2005
[ Policies and Procedure Summary]
3GPP liaison report May 2006 May 2006 Date: Authors:
Motion to accept Draft p 2.0
Protected SSIDs Date: Authors: March 2005 March 2005
3GPP liaison report July 2006
[place presentation subject title text here]
WAVE without beacons Date: Authors: May 2007 Month Year
Coexistence problem of s Congestion Control
On Coexistence Mechanisms
GPS Aided WLAN Network Finder
TGp Closing Report Date: Authors: May 2007 Month Year
Proactive Mesh Networks Summary [J : 35 Proactive Mesh]
Self-organizing and Auto-configuring Mesh Networks
Lightweight Mesh Point – A confusing term
On Coexistence Mechanisms
Reflector Tutorial Date: Authors: July 2006 Month Year
TGv Redline D0.07 Insert and Deletion
Coexistence problem of s Congestion Control
TGv Redline D0.06 Insert and Deletion
Interworking with Multi Portals in Wireless Mesh Network
Solution for comment 32 Date: Authors: July, 2008
802.11u Proposal Date: Authors: September, 2005 July 2005
Extensible Security and Routing Proposal
ADS Study Group Mid-week Report
Mesh Frame Formats Date: Authors: May 2007 March 2007
Protection Assurance Method
TGu-changes-from-d0-01-to-d0-02
LB73 Noise and Location Categories
May 2006 doc.: IEEE /0601r0 May 2006 Handling the Groupcast Sequence Number for Proxied Device in Multihop Mesh Date: Authors: Notice:
TGy draft 2.0 with changebars from draft 1.0
TGv Redline D0.10 Insert and Deletion
Scalable Station Association Information Handling
Suggested comment resolution on ATIM window parameter
WAPI Position Paper Sept 2005 Sept 2005 IEEE WG
Proactive Mesh Networks (ProM)
[ Policies and Procedure Summary]
Beamforming and Link Adaptation Motions
Lightweight Mesh Point – A confusing term
Path Selection and Path Switch Mechanism
Mesh Distributed Coordination Function
Proposed Changes for LB81 Comments
Motion to go to Letter Ballot
for video transmission, Status
Lightweight Mesh Point – A confusing term
Transition Nowhere Date: Authors: Sept 2005 Sept 2005
Mesh Frame Formats Date: Authors: May 2007 March 2007
TGu Motions Date: Authors: May 2006 May 2006
Mesh QoS Control Date: Authors: January 2008
Extended Channel Switch Announcements
MAC Address Spoofing in Mesh
Lightweight Mesh Point – A confusing term
WAPI Position Paper Sept 2005 Sept 2005 IEEE WG
Use of KCK for TGr Management Frame Protection
Proposal for Diagnostic Alerts
Mesh Frame Formats Date: Authors: May 2007 March 2007
WNG SC Closing Report Date: Authors: July 2006 July 2006
Presentation transcript:

Proactive Mesh Networks Summary [ J : 35 Proactive Mesh] July 2005 Proactive Mesh Networks Summary [ J : 35 Proactive Mesh] Date: 2005-07-21 Authors: Name Company Address Phone E-mail Bing Zhang National Institute of Information and Communications Technology 3-5 Hikaridai, Seika-cho, Soraku-gun, Kyoto, Japan +81-774-98-6820 zhang@nict.go.jp Oyunchimeg Shagdar ATR Adaptive Communication Research Laboratories 2-2-2 Hikaridai, Seika-cho, Soraku-gun, Kyoto, Japan +81-774-95-1501 oyunaa@atr.jp Suhua Tang +81-774-95-1544 shtang@atr.jp Youiti Kado Oki Electric Industry Co., Ltd. 2-5-7 Honmachi, Chuo-ku, Osaka, Japan +81-6-6260-0700 kado567@oki.com Masanori Nozaki nozaki765@oki.com Notice: This document has been prepared to assist IEEE 802.11. It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein. Release: The contributor grants a free, irrevocable license to the IEEE to incorporate material contained in this contribution, and any modifications thereof, in the creation of an IEEE Standards publication; to copyright in the IEEE’s name any IEEE Standards publication even though it may include portions of this contribution; and at the IEEE’s sole discretion to permit others to reproduce in whole or in part the resulting IEEE Standards publication. The contributor also acknowledges and accepts that this contribution may be made public by IEEE 802.11. Patent Policy and Procedures: The contributor is familiar with the IEEE 802 Patent Policy and Procedures <http:// ieee802.org/guides/bylaws/sb-bylaws.pdf>, including the statement "IEEE standards may include the known use of patent(s), including patent applications, provided the IEEE receives assurance from the patent holder or applicant with respect to patents essential for compliance with both mandatory and optional portions of the standard." Early disclosure to the Working Group of patent information that might be relevant to the standard is essential to reduce the possibility for delays in the development process and increase the likelihood that the draft publication will be approved for publication. Please notify the Chair <stuart.kerry@philips.com> as early as possible, in written or electronic form, if patented technology (or technology under patent application) might be incorporated into a draft standard being developed within the IEEE 802.11 Working Group. If you have questions, contact the IEEE Patent Committee Administrator at <patcom@ieee.org>.

July 2005 Abstract Full proposal of a proactive, flexible, compatible and secure 802.11s WLAN Mesh Network. Framework for Mesh network with the multi-hop, multi-radio communication between Mesh APs that accommodate legacy stations. Simple Mesh network between MPs also covered. Meeting the requirements of VoIP.

July 2005 Number Category Name Coverage (Complete /Partial/ None) FR1 TOPO_RT_FWD Mesh Topology Discovery Complete FR2 Mesh Routing Protocol FR3 Extensible Mesh Routing Architecture Partial FR4 Mesh Broadcast Data Delivery FR5 Mesh Unicast Data Delivery FR6 Support for Single and Multiple Radios FR7 Mesh Network Size FR8 SECURITY Mesh Security FR9 MEAS Radio-Aware Routing Metrics FR10 SERV_CMP Backwards compatibility with legacy BSS and STA FR11 Use of WDS 4-Addr Frame or Extension FR12 DISC_ASSOC Discovery and Association with a WLAN Mesh FR13 MMAC Amendment to MAC with no PHY changes required FR14 INTRWRK Compatibility with higher-layer protocols

July 2005 Architecture Framework for Mesh with the multi-hop, multi-radio communication between Mesh APs that accommodate legacy stations. ・・・ 802.11a(5.2GHz) ・・・ 802.11b/g(2.4GHz) MP Mesh AP Router Mesh AP Server Mesh Portal Legacy STA MP: Mesh Point Mesh AP Legacy STA

Local Topology Discovery - MPR Selection - July 2005 Local Topology Discovery - MPR Selection - MP determines the OLSR-based MPR (Multipoint Relay) set from its 1-hop neighbors. MP advertises its MPR information in the periodic HELLO messages. 1-hop neighbor MP-A 2-hop neighbor MPR of MP-A

Topology Discovery - ASAT message & TC message - July 2005 Topology Discovery - ASAT message & TC message - ASAT (Associated Station Address Table) message records a MAC address table of associated legacy STAs. TC (Topology Control) message and ASAT message are broadcasted and shared in a segment of Mesh network. ASAT Leagacy STAs Mesh AP-A Mesh AP-C MP-B TC

Pseudo Flow Table [type 1] Pseudo Flow Table [type 2] July 2005 Enhancement Strong Link Selection with RSSI information. Filtering unstable and weak links Pseudo-Flow based Load Balancing. Utilizing 4 addresses in a WDS frame Merits Utilizing WDS header Info. A pseudo flow’s path is stable. In-order frame delivery. Demerit Cross grained. Pseudo Flow Table [type 1] 5 8 Flow Index DA SA RA f1 7 8 3 f2 9 4 3 1 f1 f1 7 Pseudo Flow Table [type 2] f2 Flow Index DA TA RA f1 7 1 3 f2 2 4 2 4 9 f2 6

Frame2 is sent first with a higher priority July 2005 Extension of IEEE802.11e Prioritizing Mechanisms based on delay estimation. TTL, congestion info or time stamp Routing Table at MP-2 6 3 Flow TTL Flow1 1 Flow2 2 Frame2: Flow2 5 2 The number of hops for Frame2 is larger than one of Frame1 for both from itself to the destination and end-to-end hops. Frame2 is sent first with a higher priority Flow2 Frame1: Flow1 Flow1 4 1

Channel Assignment for Multi-radio July 2005 Channel Assignment for Multi-radio Autonomous Channel Assignment schemes with common channel. Procedure in the link layer. MAP MAP1 MAP3 Ch-3 With two interfaces MP1 MAP5 MP2 MP Ch-1 MAP2 MAP4 With single interface Ch-2

Security Authentication of Newly Arrived MP. July 2005 Security Authentication of Newly Arrived MP. AS (Authentication Server) (1) The newly arrived MP (MP-5) receives beacon frames from neighbor MPs. (2) MP-5 associates to a MP (MP-2). - MP-2 forwards an authentication request from MP-5 to AS. - If MP-5 is accepted to be connected, AS creates a key to MP-5. MP-1 (3) Authentication Key Creation MP-2 MP-3 (1) Beacon (2) Association MP-4 Secure link between MP-5 and MP-2 is established. MP-5

Conclusion Proactive Mesh [ J : 35] provides simple Mesh Networks, and July 2005 Conclusion Proactive Mesh [ J : 35] provides simple Mesh Networks, and sufficient ones for VoIP requirements. Layer-2 proactive routing protocol Topology discovery / WDS unicast / broadcast / multicast Enhancement by Strong Link Selection with RSSI, and Pseudo-Flow based Load Balancing QoS support - delay based priority control Multi-radio support - autonomous channel assignment Security Secure link establishment over mesh networks

Related Documents [ J : 35 Proactive Mesh ] July 2005 Related Documents [ J : 35 Proactive Mesh ] 11-05-0588-01-000s-proactive-mesh-networks-framework.doc 11-05-0386-03-000s-proactive-mesh-networks-prom.ppt

Simulation Model July 2005 GW ◆ ns-2 simulator ◆ Transmission rate : 1 GW 2 3 ◆ ns-2 simulator ◆ Transmission rate : 54 Mbps ◆ Transmission range : 85 m ◆ Traffic type : Constant Bit Rate (CBR) ◆ Routing : OLSR ◆ Layer2 : IEEE802.11a ◆ Codec : G.711 ◆ Payload size : 400 Bytes ◆ Interval : 50 ms 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 Common channel 0 Data channel 1 Data channel 2 Data channel 3

July 2005 Fixed Phone Delivery ratio : 97 % Delay : 100 ms Mobile Phone 94% 150 ms Class A Class B