Download presentation
Presentation is loading. Please wait.
Published byAino Salo Modified over 6 years ago
1
Proactive Mesh Networks Summary [J : 35 Proactive Mesh]
September 2005 Proactive Mesh Networks Summary [J : 35 Proactive Mesh] Date: Authors: Name Company Address Phone Bing Zhang National Institute of Information and Communications Technology 3-5 Hikaridai, Seika-cho, Soraku-gun, Kyoto, Japan Oyunchimeg Shagdar ATR Adaptive Communication Research Laboratories 2-2-2 Hikaridai, Seika-cho, Soraku-gun, Kyoto, Japan Suhua Tang Youiti Kado Oki Electric Industry Co., Ltd. 2-5-7 Honmachi, Chuo-ku, Osaka, Japan Masanori Nozaki Notice: This document has been prepared to assist IEEE It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein. Release: The contributor grants a free, irrevocable license to the IEEE to incorporate material contained in this contribution, and any modifications thereof, in the creation of an IEEE Standards publication; to copyright in the IEEE’s name any IEEE Standards publication even though it may include portions of this contribution; and at the IEEE’s sole discretion to permit others to reproduce in whole or in part the resulting IEEE Standards publication. The contributor also acknowledges and accepts that this contribution may be made public by IEEE Patent Policy and Procedures: The contributor is familiar with the IEEE 802 Patent Policy and Procedures < ieee802.org/guides/bylaws/sb-bylaws.pdf>, including the statement "IEEE standards may include the known use of patent(s), including patent applications, provided the IEEE receives assurance from the patent holder or applicant with respect to patents essential for compliance with both mandatory and optional portions of the standard." Early disclosure to the Working Group of patent information that might be relevant to the standard is essential to reduce the possibility for delays in the development process and increase the likelihood that the draft publication will be approved for publication. Please notify the Chair as early as possible, in written or electronic form, if patented technology (or technology under patent application) might be incorporated into a draft standard being developed within the IEEE Working Group. If you have questions, contact the IEEE Patent Committee Administrator at
2
September 2005 Abstract Full proposal of a proactive, flexible, compatible and secure s WLAN Mesh Network. Framework for Mesh network with the multi-hop, multi-radio communication between Mesh APs that accommodate legacy stations. Simple Mesh network between MPs also covered. Meeting the requirements of VoIP.
3
September 2005 Number Category Name Coverage (Complete /Partial/ None)
FR1 TOPO_RT_FWD Mesh Topology Discovery Complete FR2 Mesh Routing Protocol FR3 Extensible Mesh Routing Architecture Partial FR4 Mesh Broadcast Data Delivery FR5 Mesh Unicast Data Delivery FR6 Support for Single and Multiple Radios FR7 Mesh Network Size FR8 SECURITY Mesh Security FR9 MEAS Radio-Aware Routing Metrics FR10 SERV_CMP Backwards compatibility with legacy BSS and STA FR11 Use of WDS 4-Addr Frame or Extension FR12 DISC_ASSOC Discovery and Association with a WLAN Mesh FR13 MMAC Amendment to MAC with no PHY changes required FR14 INTRWRK Compatibility with higher-layer protocols
4
September 2005 Architecture Framework for Mesh with the multi-hop, multi-radio communication between Mesh APs that accommodate legacy stations. ・・・ a(5.2GHz) ・・・ b/g(2.4GHz) MP Mesh AP Router Mesh AP Server Mesh Portal Legacy STA MP: Mesh Point Mesh AP Legacy STA
5
Topology Discovery - ASAT message & TC message -
September 2005 Topology Discovery - ASAT message & TC message - ASAT (Associated Station Address Table) message records a MAC address table of associated legacy STAs. TC (Topology Control) message and ASAT message are broadcasted and shared over a mesh network. ASAT Leagacy STAs Mesh AP-A Mesh AP-C MP-B TC
6
Metric corresponding to RSSI.
September 2005 Routing Enhancement Strong Link Selection with RSSI information. Excluding unstable and weak links Example: Metric corresponding to RSSI.
7
Routing Enhancement (cont’d)
September 2005 Routing Enhancement (cont’d) Pseudo-Flow based Load Balancing. Utilizing 4 addresses in a WDS frame A pseudo flow’s path is stable. In-order frame delivery. 5 Routing Table with Multiple Paths And Multiple Channels 8 3 p1 1 Path Index DA RA CH p1 7 3 p2 1 p3 4 p4 p2 7 2 p4 9 p3 4 6
8
Delay Based Priority Control
September 2005 Delay Based Priority Control Extension of IEEE802.11e Delay estimation by TTL, congestion info or time stamp Routing Table at MP-2 6 3 Flow TTL Flow1 1 Flow2 2 Frame2: Flow2 5 2 The number of hops for Frame2 is larger than one of Frame1 for both from itself to the destination and end-to-end hops. Frame2 is sent first with a higher priority Flow2 Frame1: Flow1 Flow1 4 1
9
Frame Aggregation Tun(Tunneling)-Aggregation Scheme
September 2005 Frame Aggregation Tun(Tunneling)-Aggregation Scheme Performing the frame aggregation with the same tunnel exit. NH(Next Hop)-Aggregation Scheme Performing the frame aggregation with the same next hop. STA5 STA4 MAP6 MAP5 R1 MAP1 MAP2 MAP3 MAP4 STA3 STA1 STA2 NH-Ag Tun-Ag
10
Distributed Channel Assignment
September 2005 Distributed Channel Assignment Common channel is statically or dynamically selected. Selecting least used channel first. Performing Channel Assignment at link layer. MAP3 MAP MAP1 Ch-3 With two interfaces MP1 MAP5 MP2 MP Ch-1 MAP2 MAP4 With single interface Ch-2
11
Portal-driven Channel Assignment
September 2005 Portal-driven Channel Assignment Channel assignment in a clustered way. Flooding tree can be made from the topology information provided by proactive routing protocol. 8 3 9 2 1 4 6 5 30 18 12 19 11 10 13 14 15 16 17 28 22 29 21 20 23 24 26 25 27 31 7 Mesh Portal
12
Security Authentication of Newly Arrived MP.
September 2005 Security Authentication of Newly Arrived MP. AS (Authentication Server) (1) The newly arrived MP (MP-5) receives beacon frames from neighbor MPs. (2) MP-5 associates to a MP (MP-2). - MP-2 forwards an authentication request from MP-5 to AS. - If MP-5 is accepted to be connected, AS creates a key to MP-5. MP-1 (3) Authentication Key Creation MP-2 MP-3 (1) Beacon (2) Association MP-4 Secure link between MP-5 and MP-2 is established. MP-5
13
September 2005 Conclusion Proactive Mesh [ J : 35] accommodates legacy stations based on a simple scheme that supports QoS and provides high capacity for VoIP. Layer-2 proactive routing protocol Topology discovery / WDS unicast / broadcast / multicast Routing enhancement QoS support Delay based priority control and frame aggregation Multi-radio support Distributed and portal-driven channel assignment schemes Secure link establishment over mesh networks
14
Related Documents [ J : 35 Proactive Mesh ]
September 2005 Related Documents [ J : 35 Proactive Mesh ] s-proactive-mesh-networks-framework.doc s-simulation-results-proactive-mesh-networks.doc s-proactive-mesh-networks-prom.ppt
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.