Presentation is loading. Please wait.

Presentation is loading. Please wait.

Proactive Mesh Networks Summary [ J : 35 Proactive Mesh]

Similar presentations


Presentation on theme: "Proactive Mesh Networks Summary [ J : 35 Proactive Mesh]"— Presentation transcript:

1 Proactive Mesh Networks Summary [ J : 35 Proactive Mesh]
July 2005 Proactive Mesh Networks Summary [ J : 35 Proactive Mesh] Date: Authors: Name Company Address Phone Bing Zhang National Institute of Information and Communications Technology 3-5 Hikaridai, Seika-cho, Soraku-gun, Kyoto, Japan Oyunchimeg Shagdar ATR Adaptive Communication Research Laboratories 2-2-2 Hikaridai, Seika-cho, Soraku-gun, Kyoto, Japan Suhua Tang Youiti Kado Oki Electric Industry Co., Ltd. 2-5-7 Honmachi, Chuo-ku, Osaka, Japan Masanori Nozaki Notice: This document has been prepared to assist IEEE It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein. Release: The contributor grants a free, irrevocable license to the IEEE to incorporate material contained in this contribution, and any modifications thereof, in the creation of an IEEE Standards publication; to copyright in the IEEE’s name any IEEE Standards publication even though it may include portions of this contribution; and at the IEEE’s sole discretion to permit others to reproduce in whole or in part the resulting IEEE Standards publication. The contributor also acknowledges and accepts that this contribution may be made public by IEEE Patent Policy and Procedures: The contributor is familiar with the IEEE 802 Patent Policy and Procedures < ieee802.org/guides/bylaws/sb-bylaws.pdf>, including the statement "IEEE standards may include the known use of patent(s), including patent applications, provided the IEEE receives assurance from the patent holder or applicant with respect to patents essential for compliance with both mandatory and optional portions of the standard." Early disclosure to the Working Group of patent information that might be relevant to the standard is essential to reduce the possibility for delays in the development process and increase the likelihood that the draft publication will be approved for publication. Please notify the Chair as early as possible, in written or electronic form, if patented technology (or technology under patent application) might be incorporated into a draft standard being developed within the IEEE Working Group. If you have questions, contact the IEEE Patent Committee Administrator at

2 July 2005 Abstract Full proposal of a proactive, flexible, compatible and secure s WLAN Mesh Network. Framework for Mesh network with the multi-hop, multi-radio communication between Mesh APs that accommodate legacy stations. Simple Mesh network between MPs also covered. Meeting the requirements of VoIP.

3 July 2005 Number Category Name Coverage (Complete /Partial/ None) FR1
TOPO_RT_FWD Mesh Topology Discovery Complete FR2 Mesh Routing Protocol FR3 Extensible Mesh Routing Architecture Partial FR4 Mesh Broadcast Data Delivery FR5 Mesh Unicast Data Delivery FR6 Support for Single and Multiple Radios FR7 Mesh Network Size FR8 SECURITY Mesh Security FR9 MEAS Radio-Aware Routing Metrics FR10 SERV_CMP Backwards compatibility with legacy BSS and STA FR11 Use of WDS 4-Addr Frame or Extension FR12 DISC_ASSOC Discovery and Association with a WLAN Mesh FR13 MMAC Amendment to MAC with no PHY changes required FR14 INTRWRK Compatibility with higher-layer protocols

4 July 2005 Architecture Framework for Mesh with the multi-hop, multi-radio communication between Mesh APs that accommodate legacy stations. ・・・ a(5.2GHz) ・・・ b/g(2.4GHz) MP Mesh AP Router Mesh AP Server Mesh Portal Legacy STA MP: Mesh Point Mesh AP Legacy STA

5 Local Topology Discovery - MPR Selection -
July 2005 Local Topology Discovery - MPR Selection - MP determines the OLSR-based MPR (Multipoint Relay) set from its 1-hop neighbors. MP advertises its MPR information in the periodic HELLO messages. 1-hop neighbor MP-A 2-hop neighbor MPR of MP-A

6 Topology Discovery - ASAT message & TC message -
July 2005 Topology Discovery - ASAT message & TC message - ASAT (Associated Station Address Table) message records a MAC address table of associated legacy STAs. TC (Topology Control) message and ASAT message are broadcasted and shared in a segment of Mesh network. ASAT Leagacy STAs Mesh AP-A Mesh AP-C MP-B TC

7 Pseudo Flow Table [type 1] Pseudo Flow Table [type 2]
July 2005 Enhancement Strong Link Selection with RSSI information. Filtering unstable and weak links Pseudo-Flow based Load Balancing. Utilizing 4 addresses in a WDS frame Merits Utilizing WDS header Info. A pseudo flow’s path is stable. In-order frame delivery. Demerit Cross grained. Pseudo Flow Table [type 1] 5 8 Flow Index DA SA RA f1 7 8 3 f2 9 4 3 1 f1 f1 7 Pseudo Flow Table [type 2] f2 Flow Index DA TA RA f1 7 1 3 f2 2 4 2 4 9 f2 6

8 Frame2 is sent first with a higher priority
July 2005 Extension of IEEE802.11e Prioritizing Mechanisms based on delay estimation. TTL, congestion info or time stamp Routing Table at MP-2 6 3 Flow TTL Flow1 1 Flow2 2 Frame2: Flow2 5 2 The number of hops for Frame2 is larger than one of Frame1 for both from itself to the destination and end-to-end hops. Frame2 is sent first with a higher priority Flow2 Frame1: Flow1 Flow1 4 1

9 Channel Assignment for Multi-radio
July 2005 Channel Assignment for Multi-radio Autonomous Channel Assignment schemes with common channel. Procedure in the link layer. MAP MAP1 MAP3 Ch-3 With two interfaces MP1 MAP5 MP2 MP Ch-1 MAP2 MAP4 With single interface Ch-2

10 Security Authentication of Newly Arrived MP.
July 2005 Security Authentication of Newly Arrived MP. AS (Authentication Server) (1) The newly arrived MP (MP-5) receives beacon frames from neighbor MPs. (2) MP-5 associates to a MP (MP-2). - MP-2 forwards an authentication request from MP-5 to AS. - If MP-5 is accepted to be connected, AS creates a key to MP-5. MP-1 (3) Authentication Key Creation MP-2 MP-3 (1) Beacon (2) Association MP-4 Secure link between MP-5 and MP-2 is established. MP-5

11 Conclusion Proactive Mesh [ J : 35] provides simple Mesh Networks, and
July 2005 Conclusion Proactive Mesh [ J : 35] provides simple Mesh Networks, and sufficient ones for VoIP requirements. Layer-2 proactive routing protocol Topology discovery / WDS unicast / broadcast / multicast Enhancement by Strong Link Selection with RSSI, and Pseudo-Flow based Load Balancing QoS support - delay based priority control Multi-radio support - autonomous channel assignment Security Secure link establishment over mesh networks

12 Related Documents [ J : 35 Proactive Mesh ]
July 2005 Related Documents [ J : 35 Proactive Mesh ] s-proactive-mesh-networks-framework.doc s-proactive-mesh-networks-prom.ppt

13 Simulation Model July 2005 GW ◆ ns-2 simulator ◆ Transmission rate :
1 GW 2 3 ◆ ns-2 simulator ◆ Transmission rate : 54 Mbps ◆ Transmission range : 85 m ◆ Traffic type : Constant Bit Rate (CBR) ◆ Routing : OLSR ◆ Layer2 : IEEE802.11a ◆ Codec : G.711 ◆ Payload size : 400 Bytes ◆ Interval : 50 ms 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 Common channel 0 Data channel 1 Data channel 2 Data channel 3

14 July 2005 Fixed Phone Delivery ratio : 97 % Delay : 100 ms
Mobile Phone 94% 150 ms Class A Class B


Download ppt "Proactive Mesh Networks Summary [ J : 35 Proactive Mesh]"

Similar presentations


Ads by Google