1 Introduction to IEEE Standardization & IEEE 802.11s Hang Liu Thomson Inc, Corporate Research Lab Princetion, NJ.

Slides:



Advertisements
Similar presentations
Doc.: IEEE /024 Submission January 2001 Jim Carlo, Texas InstrumentsSlide 1 Patents and IEEE 802 Stds IEEE 802 Chair’s Viewpoint Jim Carlo General.
Advertisements

1 Introduction to IEEE Standardization Hang Liu. 2 IEEE Standard Association [1] Standards Activities Board CSMA/CD Ethernet Token Passing.
Page 1 1 May 2007 [Updated January 2012] IEEE-SA Patent Policy Introduction and guide to IEEE-SA patent policy effective 1 May 2007.
1 May 2007 Instructions for the WG Chair The IEEE-SA strongly recommends that at each WG meeting the chair or a designee: l Show slides #1 through #5 of.
Doc.: IEEE / 0893r0 Submission July 2012 Fischer, Lee, ZhuSlide 1 TGac MAC ad hoc agenda and report Date: Authors:
s Proposal - Joint SEE-Mesh/Wi-Mesh Proposal to TGs IEEE /0328r0 Feb 2006 This proposal can be obtained from
Oct07_NewJersey_AdHoc_Opening_Notes.ppt October 2007 Vivek Gupta, Chair, Slide 1 IEEE Ad Hoc New Jersey Oct Vivek.
Doc.: IEEE /0213r0 Submission January 2008 Stephen McCann, Nokia Siemens NetworksSlide 1 TGu February 2008 Ad Hoc Agenda Date: Authors:
Doc.: IEEE /0954r0 SubmissionSameer Vermani, Qualcomm MU-MIMO Ad Hoc Report July 2012 Date: Authors: Slide 1 July 2012.
Doc.: IEEE /01024r0 SubmissionBrian Hart, Cisco Systems MU-MIMO AdHoc Report Jul 2011 Date: Authors: Slide 1 Jul 2011.
Doc.: IEEE /1702r0 Meeting Report September 2006 Pat R. Calhoun, CiscoSlide 1 Report of TGv – November 2006 DATE: November 2006 Author(s) NameCompanyAddressPhone .
IEEE MEDIA INDEPENDENT HANDOVER DCN: mugm Title: Group Management TG Opening Note Date Submitted: September 18, 2012 Presented at.
Doc.: IEEE 11-04/0319r0 Submission March 2004 W. Steven Conner, Intel Corporation Slide 1 Architectural Considerations and Requirements for ESS.
1 Simple Efficient Extensible Mesh (SEE-Mesh) Proposal IEEE /0562r0 June 2005 This proposal can be obtained from
Doc.: IEEE /2090r0 Submission July 2007 Eldad Perahia (Intel)Slide 1 Coex Ad Hoc May Montreal Agenda and Report Notice: This document has been.
Doc.: IEEE / 0893r3 Submission July 2012 Fischer, Lee, ZhuSlide 1 TGac MAC ad hoc agenda and report Date: Authors:
Submission doc.: IEEE /1842r3January 2007 Azman Osman Lim, et.al.Slide 1 Date: Scalable Station Association Information Handling Notice:
Doc.: IEEE /0642r0 SubmissionBrian Hart, Cisco Systems MU-MIMO Ad Hoc Report May 2012 Date: Authors: Slide 1 May 2012.
Doc.: IEEE /2803r0 Submission November 2007 Stuart J. Kerry, NXP SemiconductorSlide 1 General Opening-Presentation Notice: This document.
Doc.: IEEE /0684r2 Submission July 18-22, 2005 TK Tan (Philips) Slide 1 WNG SC Committee Report IEEE , San Francisco, California, July 18.
Doc.: IEEE /402r0 Submission May 2005 Stefano M. FaccinSlide 1 Notice: This document has been prepared to assist IEEE It is offered as.
January 17, 2005Chair, IEEE Opening January 2005 Plenary Session #12 Jerry Upton- Chair Gang Wu – Procedural.
Doc.: IEEE /0174r1 Submission Hang Liu, et al. March 2005 Slide 1 A Routing Protocol for WLAN Mesh Hang Liu, Jun Li, Saurabh Mathur {hang.liu,
Doc.: IEEE /r0 Submission November 2005 Xin Yu and Hang LiuSlide 1 Implementation and Evaluation of AODV with Proactive Route Announcements.
Doc.: IEEE /0321r0 Submission March 2008 Eldad Perahia, Intel CorporationSlide 1 VHT SG March 2008 Report Date: Authors:
Doc.: IEEE /2776r1 Submission November 2007 Eldad Perahia (Intel)Slide 1 Coex Ad Hoc November Atlanta Agenda and Report Date: Authors:
Doc.: IEEE /2429r0 Submission Peter Loc, MarvellSlide 1 TGn LB97 Frame Format Ad Hoc Waikoloa, Sep 2007 Notice: This document has been.
Doc.: IEEE /0085r1 Submission June 2010 Tuncer Baykas, NICTSlide TG1 and System Design Document Notice: This document has been prepared.
Doc.: IEEE /024r1 Submission Jan 12-16, 2004 TK Tan (Philips) Slide 1 WNG SC Committee Report IEEE , Vancouver, Canada, Jan 12-16, 2004.
Doc.: IEEE /2429r1 Submission Peter Loc, MarvellSlide 1 TGn LB97 Frame Format Ad Hoc Waikoloa, Sep 2007 Notice: This document has been.
Architectural Considerations for IEEE s
Relationship between peer link and physical link
802.11s Proposal - Joint SEE-Mesh/Wi-Mesh Proposal to TGs
June 2005 doc.: IEEE /0593r0 July 2005 Summary Presentation Proposal L:19 Siemens Proposal for WLAN Mesh Networking Date: Authors:
Stephen McCann, Siemens Roke Manor
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
TGac MU-MIMO ad-hoc report Jan 10
Extensible Security and Routing Proposal
WNG Agenda, September Authors: September 2007 Date:
RFI Update Munich Meeting
Document Structure Discussion
TGn LB97 Frame Format Ad Hoc Montreal May 2007
End-to-End Aware Association in Mesh Networks: Performance Study
TGn LB97 Frame Format Ad Hoc Montreal May 2007
Instructions for the WG Chair
VHT SG November 2007 Report Date: Authors: November 2007
End-to-End Aware Association in Mesh Networks: Performance Study
Proposed Extensible Approach for WLAN Mesh Standardization
A Routing Protocol for WLAN Mesh
Remedy for beacon bloat
Relationship between peer link and physical link
VHT SG January 2008 Report Date: Authors: January 2008
TGw Chair’s Report Date: Authors: May 2007 Month Year
VHT SG September 2007 Report
Submission Title: [NOV 2007 WG Opening Plenary]
Document Structure Discussion
Agenda minutes TGn PHY ad hoc
BEAM Ad Hoc September Agenda and Report for LB97
TGn-SB0-mac-adhoc-report
TGn LB97 Frame Format Ad Hoc Montreal May 2007
Instructions for the WG Chair
Extensible Security and Routing Proposal
RFI Update Munich Meeting
RFI Update Munich Meeting
TGac MU-MIMO ad-hoc report Jan 10
BEAM Ad Hoc September Agenda and Report for LB97
Coex Ad Hoc March Orlando Agenda and Report
Document Structure Discussion
September 2006 doc.: IEEE /1351r0 September 2006
Instructions for the WG Chair
Presentation transcript:

1 Introduction to IEEE Standardization & IEEE s Hang Liu Thomson Inc, Corporate Research Lab Princetion, NJ

2 IEEE Standard Association [1] Standards Activities Board CSMA/CD Ethernet Token Passing Ring Wireless LAN Wireless Personal Area Networks Mobile Broadband Wireless Access Co-existence TAG Sponsor IEEE 802 Local and Metropolitan Area Networks (LMSC) Sponsor Resilient Packet Ring Radio Regulatory TAG Broadband Wireless Access Media Independent Handoff Higher Layer LAN Protocols Wireless Regional Area Networks Wired Wireless

3 Standardization Process Disclaimer: The flowcharts for IEEE standardization process are based on the author’s understanding, not official IEEE Policies and Procedures Incubation: Present initial Idea for a standard or improvement to a standard (e.g. IEEE WNG SC) Request to form a Study Group Form an ad-hoc group to continue to present ideas and gain interests Approved by Working Group (>=75%) & ExeCom? SG: gain support, prepare and submit a PAR to become a Task Group PAR Approved by WG (>=75%), ExeCom, NESCom? TG: Debate technology, write a draft standard Address comments & revision No Yes

4 Draft Standard Development in TG Define usage model, requirements, proposal down- selection procedure, call for proposals Proposal presentations, merge, and down-selection Call for Proposals Baseline document Each Document Passage requires 75% or greater approval Approval (>= 75%) Draft Refinement and Letter Ballot Recirculation Sponsor Ballot Yes No Refine/enhance the draft baseline and resolve the comments (features could be added/deleted/changed) Yes WG Letter Ballot Approval? ReVCom Standard Resolve comments No

5 Proposal Down-Selection Process: Example 1 1 st round proposal presentations and voting Bottom 25%? Yes No Out 2 st round proposal presentations and voting Support Votes >= 50%? No Out Confirmation vote on the final proposal as baseline draft (>=75%)? Final two or three most popular proposals come back, compete and merge Yes No 3 st round proposal presentations (normally 2 or 3 merged proposals left) Yes Most supported proposal? One winning proposal Yes No Out Baseline document

6 Proposal Down-Selection Process: Example 2 Define a baseline ToC according to requirements Present the proposal + proposed text Support Votes >= 75%? No Out Incorporate into the baseline Yes

7 Modify the Baseline Submit a comment on the baseline Present the modification + proposed text Support Votes >= 75%? No Out Incorporate the proposed change into the baseline Yes

8 Voting Rights [1], [2] 2 types of meeting sessions Plenary: 3 sessions per calendar year (March, July, November) Organized by IEEE 802 Interim: 3 sessions per calendar year (January, May, September) Organized by working group and sponsored by a host IEEE /.15/.18/.22 IEEE Voting rights can be earned by participation in 2 of the last 4 consecutive plenary sessions or 1 plenary and 1 interim. Voting rights are only granted in “Plenary Sessions”. Definition of participation Must be present in at least 75% of ALL meetings in a session

9 Maintain Voting Right [1] Loose the Voting Right by one of the following Fail to participate at least 2 out of 4 consecutive Plenary sessions Participation is to attend 75% of ALL meetings within a session May substitute one Interim session for Plenary Fail to respond and vote on 2 out of 3 mandatory WG letter ballots Fail to pay either Interim or Plenary conference fees

10 Highlights of the IEEE Patent Policy [2] [5] Participants have a duty to tell the IEEE if they know (based on personal awareness) of potentially Essential Patent Claims they or their employer own Participants are encouraged to tell the IEEE if they know of potentially Essential Patent Claims owned by others This encouragement is particularly strong as the third party may not be a participant in the standards process Working Group is required to request assurance Early assurance is encouraged Terms of assurance shall be either: Reasonable and nondiscriminatory, with or without monetary compensation; or, A statement of non-assertion of patent rights Assurances Shall be provided on the IEEE-SA Standards Board approved LOA form May optionally include not-to-exceed rates, terms, and conditions Shall not be circumvented through sale or transfer of patents Shall be brought to the attention of any future assignees or transferees Shall apply to Affiliates unless explicitly excluded Are irrevocable once submitted and accepted Shall be supplemented if Submitter becomes aware of other potential Essential Patent Claims A “Blanket Letter of Assurance” may be provided at the option of the patent holder A patent holder has no duty to perform a patent search Full policy available at

11 IEEE-SA Standards Board Bylaws on Patents in Standards [2] [5] 6.2 Policy IEEE standards may be drafted in terms that include the use of Essential Patent Claims. If the IEEE receives notice that a [Proposed] IEEE Standard may require the use of a potential Essential Patent Claim, the IEEE shall request licensing assurance, on the IEEE Standards Board approved Letter of Assurance form, from the patent holder or patent applicant. The IEEE shall request this assurance without coercion. The Submitter of the Letter of Assurance may, after Reasonable and Good Faith Inquiry, indicate it is not aware of any Patent Claims that the Submitter may own, control, or have the ability to license that might be or become Essential Patent Claims. If the patent holder or patent applicant provides an assurance, it should do so as soon as reasonably feasible in the standards development process once the PAR is approved by the IEEE-SA Standards Board. This assurance shall be provided prior to the Standards Board’s approval of the standard. This assurance shall be provided prior to a reaffirmation/stabilization if the IEEE receives notice of a potential Essential Patent Claim after the standard’s approval or a prior reaffirmation/stabilization. An asserted potential Essential Patent Claim for which an assurance cannot be obtained (e.g., a Letter of Assurance is not provided or the Letter of Assurance indicates that assurance is not being provided) shall be referred to the Patent Committee. A Letter of Assurance shall be either: a) A general disclaimer to the effect that the Submitter without conditions will not enforce any present or future Essential Patent Claims against any person or entity making, using, selling, offering to sell, importing, distributing, or implementing a compliant implementation of the standard; or b) A statement that a license for a compliant implementation of the standard will be made available to an unrestricted number of applicants on a worldwide basis without compensation or under reasonable rates, with reasonable terms and conditions that are demonstrably free of any unfair discrimination. At its sole option, the Submitter may provide with its assurance any of the following: (i) a not-to-exceed license fee or rate commitment, (ii) a sample license agreement, or (iii) one or more material licensing terms.

12 Introduction to IEEE s Mesh Networking Standard

13 IEEE s Deployment Scenarios Safety/Military Networks Campus/Public Networks Office Networks Residential Networks

14 A Network Example Internet Ethernet Mesh 2 Mesh 1 Router Mesh portal Mesh AP Mesh Point (MP) Legacy AP Layer 2 LAN segment Layer 2 LAN segment Ethernet Mesh Point (MP)

15 Mesh MAC Architecture EDCA Enhancement DCF 11a/11b/11g/11n PHY Routing Security Mesh Interworking Discovery Other MAC Mesh Topology and Discovery Security i link security enhancement Routing Hybrid Wireless Mesh Protocol Mac Enhancement EDCA-based, MDA (optional) Interworking Powersaving

16 Device Classes in a Mesh Network Mesh Point (MP) Mesh AP (MAP) Mesh Portal (MPP) Station (STA) Portal MP STA External Network MP AP MP AP STA MP STA Mesh Point Mesh Portal Mesh AP Station

17 Topology Formation MPs discover candidate neighbors using beacons and probe response frames Mesh ID, Mesh Capability Element Mesh Services are supported by new IEs (in action frames), exchanged between associated MP neighbors E.g. path selection information etc. Membership in a mesh network is determined by secure association with neighbors Simple channel unification mode follow rules to coalesce into a common, fully connected graph on one channel Advanced mode (multi-radio, multi-channel) framework for flexible channel selection algorithms beyond the standard scope

18 MP Boot Sequence Active/passive scanning to discover other MP Channel selection Begin mesh beaconing. Neighbor MP link establishment Local link state measurement Routing initialization AP initialization if mesh AP Association Request (incl. mesh IEs, e.g., RSNie) Association Response (incl. mesh IEs) Beacon (incl. mesh IEs, e.g., Hello, RSNie, …) x EAP Auth 802.1X EAP Request 802.1X EAP Response Access Request EAP Authentication Protocol Exchange Accept (Keys) 802.1x Success Pairwise Keys / Group Keys Establishment Secure Communications (encrypted) Data, Mesh management frames MP1 MP2 AS

19 Security Framework Provide link security based on i: Authenticity requires that a MP is authenticated to be true before it is allowed getting in the mesh. Confidentiality requires that no non-trusted third parties can access the messages Integrity requires that the messages can not be altered during the transit without detection. Support centralized and distributed IEEE 802.1x-based authentication and key management A mesh point performs Supplicant and Authenticator roles, and may optionally perform the role of an Authentication Server (AS).

i Basics IEEE 802.1X EAP Authentication Establishing Pairwise and Group Keys via four way handshake

21 Extensible Routing Framework Layer 2 routing based on MAC addresses Extensible Routing Protocol Architecture Allow a vendor to implement any path selection protocol and/or path selection metric to meet special application requirements and optimize the performance. One routing protocol is operated in a specific mesh network In beacon and probe response messages, advertise routing capability X Capabilities: Path Selection: HWMP, Metrics: airtime, latency 8 Mesh Identifier: Mesh 1 Mesh Profile: (HWMP, airtime metric) Specify a default mandatory routing protocol: Hybrid Wireless Mesh Protocol (HWMP) Combine the flexibility of on-demand path selection with proactive topology tree building

22 On-demand Routing vs. Proactive Routing On-demand Routing: discovers and maintains routes only when they are needed. Pros: Low routing overhead Cons: Extra route discovery delay and data buffering Proactive Routing: each node maintains routes to all reachable destinations at all times, whether or not there is current need to deliver data to those destinations. Pros: Little delay Cons: High routing overhead to keep the routing information current especially when network topology changes frequently HWMP combines the advantages of on-demand and proactive routing schemes On-demand for peer-to-peer communications Proactive route establish for communications with gateway and other important nodes

23 Hybrid Wireless Mesh Protocol (HWMP) On-demand: Use route request/route reply to discover the route on-demand (reduce routing overhead) Proactive: Gateway proactively announce itself to establish route to reach it (reduce route discovery delay) Source Destination Source floods PREQ Source Destination Reply PREP Mesh gateway floods proactive PREQ or root announcement to proactively establish the routes to it MP may send a PREP or PREQ to the gateway to establish a path from the mesh gateway to the mesh point

24 Routing Metric Airtime: the amount of channel resources consumed by transmitting the frame over a particular link. O ca, O p and B t are constants r: link bit rate e pt : frame error rate ParameterValue (802.11a) Value (802.11b) Description O ca 75  s335  s Channel access overhead OpOp 110  s364  s Protocol overhead BtBt 8224 Number of bits in test frame

25 References [1] IEEE /422r7, “New Participant Orientation” [2] IEEE /0333r0 “General Opening-Presentation” [3] “IEEE Project 802 LMSC Policies and Procedures,” LMSC.pdf LMSC.pdf [4] IEEE , “IEEE Working Group Policies and Procedures” [5] IEEE Patent Policy, [6] IEEE s Mesh Networking, D1.06 [7] IEEE /0329r3, “Joint SEE-Mesh/Wi-Mesh Proposal to TGs Overview,” March 2006 [8] IEEE s Tutorial, Nov. 2006

26 Backup Slides

27 Simple Channel Unification Protocol At boot time, an MP logical radio interface shall perform passive scanning to discover neighboring MPs If an MP is unable to detect any neighbor MPs, Adopt the Mesh ID for its highest priority profile, Select a channel for operation Select an initial channel precedence value. the number of microseconds since the boot time of the mesh point plus a random value. In the event that a mesh point logical radio interface discovers a disjoint mesh, that is, the list of candidate peer Mesh Points spans more than one channel, Select the channel that is indicated by the candidate peer Mesh Point that has the numerically highest channel precedence indicator to be the unification channel If the identified unification channel is different than the current operating channel the mesh point shall execute the channel cluster switch protocol

28 Channel Switch Protocol The mesh point determines the need to switch the channel chooses a channel cluster switch wait timer sends a channel cluster switch announcement frame to each peer mesh point which contains the new candidate channel, new candidate channel precedence indicator, channel switch wait time Receive a channel cluster switch frame If new candidate channel precedence indicator > the current channel precedence value set the channel cluster switch timer and send the channel cluster switch announcement frame to each peer mesh point it is possible that more than one mesh point initiate channel switch simultaneously If a mesh point receives more than one channel cluster switch announcement frame, it only acts upon the frame if the channel precedence value is larger than the channel precedence value of a previously received channel cluster switch announcement frame. In case a newly received channel cluster announcement frame has the same channel precedence value as a previously received frame, the new frame is acted upon only if the source address is smaller than the source address from the previously received frame.

29 Mesh Formation Peer Link Setup and Maintenance A MP must select which MPs to establish peer links based on some measure of signal quality or other statistics received from candidate neighbor MPs. A MP may be configured with the maximum number of peers Local Link State Discovery and Maintenance Measure local link quality Mesh Portal Discovery Portal information and metric to portal contained in beacons

30 Basic Security Model New Mesh Point WLAN Mesh Security bubble Supplicant Authenticator