Professional Documents
Culture Documents
MESHNETWORKS
DEFINITION
Theterm'wirelessmeshnetworks'describeswirelessnetworksinwhich
eachnodecancommunicatedirectlywithoneormorepeernodes.
Theterm'mesh'originallyusedtosuggestthatallnodeswereconnected
toallothernodes,butmost modernmeshesconnectonlyasubsetof
nodestoeachother.
Nodesarecomprisedofmeshroutersandmeshclients.
Eachnodeoperatesnotonlyasahostbutalsoasarouter,forwarding
packetsonbehalfofothernodesthatmaynotbewithindirectwireless
transmissionrangeoftheirdestinations.
A WMN is dynamically selforganized and selfconfigured, with the
nodes in the network automatically establishing and maintaining mesh
connectivityamongthemselves.
Compiled by Vivek Parganiha Associate Professor (CSE), BITD 1
1. NECESSITYFORMESHNETWORKS
Thereisaneedofthenetworkwithfollowingfeatures
MultihopWMN:
To provide greater coverage and nonlineofsight (NLOS) among
nodes,themultihopfunctionbecomesindispensable.
Supportforadhocnetworking,andcapabilityofselfforming,self
healing,andselforganization:
These properties result in enhanced network performance and
gradualgrowth.
Mobilitydependenceontypeofmeshnodes:
Minimalmobilityofmeshroutersbutmeshclientscanbe
stationaryormobilenodes.
Multipletypesofnetworkaccess:
WMNs can support backhaul access to the Internet and peerto
peercommunications.
Dependence of powerconsumption constraints on the type of
meshnodes:
Meshclientsrequirepowerefficientprotocolsincontrastto
meshrouters.
Compatibilityandinteroperabilitywithexistingwirelessnetworks:
WMNsbuiltbasedonIEEE802.11technologieshavetobe
compatible with the IEEE 802.11 standards. Additionaly, such networks
must be interoperable with other types of wireless networks, e.g.
WiMAX,ZigBeeandcellularnetworks.
4. ARCHITECTUREOFWMNs.
Three different categories distinguish in the WMNs architecture, based
onthefunctionalityofthenodes.
The above figure shows an infrastructure/backbone WMN. The dashed
andsolidlinesdenotewirelessandwiredconnectionsrespectively.Asitcanbe
seeninthefigure,differentkindsofclientsconnecttothemeshroutersthat
formtheinfrastructure.Theradiotechnologyusedbythemeshroutersvaries
significantly. Furthermore, routers apply selfconfiguring, selfhealing links
amongthemselvestoformthebackbonenetwork.
They can also connect to the internet by gateway functions.
Conventional clients can connect to the mesh routers either by using the
Ethernetinterfaceorbyusingthesameradiotechnologyastherouters.
ClientWMNs
Compiled by Vivek Parganiha Associate Professor (CSE), BITD 5
Inthistypeofarchitecture,nomeshrouterexists.Instead,conventional
devicesestablishpeertopeernetworksamongthemtoconstitutetheactuall
network performing routing and configuration functions as well as providing
enduser applications to customers. There exists one single radio interface
among the devices and a packet is forwarded to its destination by hopping
throughdevices.
HybridWMNs
As the name of the architecture denotes, this is the case where the
network comprises by both infrastructure and client mesh networks. The
clients can access the network by other clients or by routers providing
improvedconnectivityandcoveragewithintheWMN.
5. 802.11sMACENHANCEMENTS
WMNMACdifferfromWirelessNetworksMACsasfollows
MACsforWMNsareconcernedwithmorethanonehopcommunication
EDCA
Enhanced Distributed Channel Access is an extension of
DistributedCoordinationFunction(DCF).Thus,DCFisthebasisforEDCA.
QoSstations(QSTAs)accessthemediumusing8differentuserpriorities
MDA
InMeshDeterministicAccess(MDA)scheme,involvingMPshave
tosupportsynchronization.MDAsetsuptimeperiods,calledMDAOPs,to
prevent MPs of initiating transmission sequences in case they interfere
with each others transmissions or receptions. MPs that set up MDAOPs
accessthemediumbyusingtheMDAaccessparametersCWMin,CWMax,
andAIFSNwithintheseperiods.
A Mesh DTIM interval comprises of MDAOPs, such an interval is set up
betweentheMDAOPownerandtheaddressingMP.AftertheMDAOPis
setup:
The MDAOP owner uses CSMA/CA and backoff to obtain a TXOP using the
MDACWmin,MDACWmax,andMDAIFSNparameters.Therangesofvaluesof
theparametersareidenticaltothoseusedinEDCA.
BoththeMDAOPownerandtheaddressedMPadvertisetheMDAOP.Except
theMDAOPowner,allotherMPsshouldnotinitiatetransmissionsduringthe
TXOPinitiatedintheMDAOP.
TXOPsalsoexistinMDAbutsinceitisobtainedbyaMPinaMDAOP,it
is called MDA TXOP. Such a TXOP is required to end within the MDAOP it
originally was obtained. Neighbourhood MDAOP times for a MP are those
TXRXtimesthatareadvertisedbyneighbouringMPs,formingasetofMDAOPs
currently used in the neighbourhood. Thus, a sender cannot set up new
MDAOPs within these times. Neighbor MDAOP interfering times for a MP in
relationtoanotherMParethetimeswhentheformercannotsetupMDAOPs
withthelatter.Thus,creatingMDAOPswithinthesetimescanandwillresultin
interference.
The MDA access fraction, at a MP, is defined as the ratio of the total
durationofitsNeighbourhoodMDAOPTimes"inaMeshDTIMintervaltothe
durationoftheMeshDTIMinterval.ItexiststomakesurethatanewMDAOP
setdoesnotcausetheMAFofanotherMPtoexceedaMAFlimit.Ifthelimitis
exceeded,theMDAOPrequestshouldberefused.
AnMDAManagerexiststoallowendtoendflowsusingMDAfeatures
andisresponsiblefor
Pathcomputation.
InvokingMDAOPSetupProcedureonnodealongthepath.
TheMDAManagercanmakepathcomputationinthefollowingtwodifferent
ways:
UsingDijkstraalgorithm.
UsingFordalgorithm.
Compiled by Vivek Parganiha Associate Professor (CSE), BITD 9
Improvingthenetworkcapacity:
Theusageofmultiplechannelsandmultipleradios
Efficient handling of the two different kinds of traffic (BSS
traffic&Forwardingmeshtraffic)
Intrameshcongestioncontrol
Meshcoordinatedchannelaccess
HandlingBSSandmeshtrafficbyMeshAP
GivingprioritytomeshtrafficmaystarveSTAs
Giving priority to STAs might waste resource utilized by mesh
traffic
Advancedsolutions:separateradioformeshandBSStraffic
Intrameshcongestioncontrol
A simple hopbyhop congestion control implemented at each
MP
Localcongestionmonitoring,Congestioncontrolsignaling,Local
ratecontrol
MeshCoordinatedChannelAccess(MCCA)
Optional scheme based on the reservation of contention free
timeslots
Lowercontention(moredeterministic)mechanismforimproved
QoSforperiodicflows
MACImprovements
Crosslayerdesignwithadvancedphysicallayertechniques
MACsbasedonDirectionalAntennas
ProposingInnovativeMACProtocols:
MACswithPowerControl
Theyreduceexposednodes,especiallyinadensenetwork,using
low transmission power, and thus, improve the spectrum spatial reuse
factor in WMNs. However, hidden nodes may become worse because
lower transmission power level reduces the possibility of detecting a
potentialinterferingnode.
MultiChannelSingleTransceiverMAC:
MultiChannelMultiTransceiverMACs
802.11sisanamendmentbeingdevelopedtotheIEEE802.11WLAN
(WirelessLocalAreaNetworks)standard.
802.11sScope
802.11sWLANMeshNetworkingIntegratesmeshnetworkingservicesand
protocolswith802.11attheMACLayer
PrimaryScope:
o AmendmenttoIEEE802.11tocreateaWirelessDistributionSystem
withautomatictopologylearningandwirelesspathconfiguration.
o Small/medium mesh networks (~32 forwarding nodes) can be
larger.
o Dynamic, radioaware path selection in the mesh, enabling data
delivery on singlehop and multihop paths (unicast and
broadcast/multicast).
o Extensible to allow support for diverse applications and future
innovation.
o Use802.11isecurityoranextensionthereof.
o Compatiblewithhigherlayerprotocols(broadcastLANmetaphor).
Thenetworkarchitectureisdepictedinthefollowingfigures.
DeviceClassesinaWLANMeshNetwork
Station(STA):outsideoftheWLANMesh,connectedviaMeshAP.
The802.11definesanextendedserviceset(ESS),usuallyreferredtoasa
meshnetwork.EveryIEEE802.11basedentity(APorSTA)thatfullyorpartially
supportsmeshfunctionalityisreferredtoasameshpoint(MP).MinimalMP
operations include neighbour discovery, channel selection, and forming
associations with neighbours. A WDS is formed by MPs and mesh links that
connect the MPs. This way, the ESS is distinguished from the BSS, defined in
thelegacyIEEE802.11.MAPsarespecificMPsbutcanactasAPsaswell.
MPPsisanothertypeofMPsthathastheabilityofinterconnectingother
WMS with the network it belongs to. Furthermore, it can act as a
bridge/gateway of the mesh network and other networks in the DS. Such a
WMNisuniquelyidentifiedbyameshIDassignedtoeveryMPtorepresentan
ESS.
MediumAccessCoordinationFunction
ThemostimportantpartsofMFCare,
1. MeshTopologyLearning,RoutingandForwarding
FocusedonpeertopeerdiscoveryofMPs,thisserviceset(SS)enables
automatic topology learning, establishes links and forms a dynamic data
deliverypathacrossMPs.
Topology discovery and formation: A new candidate node initially gathers
information from neighbouring nodes either by active scanning (i.e. sending
probe messages) or by passive listening (i.e. by receiving periodic beacons).
Finally, two peers form a partial or a full mesh topology by associating with
eachother.
Path selection protocol: Formally, a L2 path selection protocol is used to
handleunicastandbroadcast/multicastdatadelivery.Ontheotherhand,MPs
might be mobileor nonmobileand thus a hybrid routing protocol supporting
bothproactiveandondemandschemesismoresuitableforsucha network.
Thus, the hybrid scheme uses the ad hoc ondemand vector (AODV) and the
optimized link state routing (OLSR) to reach the goal. To make the routing
protocolsmorerobustagainstlinkfailures,radioawaremetricsareproposed.
Forwardingscheme:The traffic in a WMN consists of 4address data frames.
WhenaMPreceivessuchframes,itchecksfortheframeauthenticityandthe
destination MAC address before forwarding. In the MAP arrive the 3address
framewhichisconvertedtoa4addressformatandthenitisforwardedtoits
destination. The support of forwarding multicast and broadcast traffic is also
supported.
OptionalMACenhancementsincludeMeshDeterministicAccess(MDA)
that is a reservationbased deterministic mechanism, Common Channel
Framework (CCF) that is a multichannel operation mechanism, Intramesh
CongestionControlandpowermanagement.
3. MeshConfigurationandManagement
Since the deployment of selfconfiguring paths and links can be
unmanaged, it is required the use of autonomic management modules. The
purposeofmanagementistoensureafreeofproblemsnetworkoperation.A
meshpointthatmayfaildoesnotaffecttheoverallnetworkperformancebut
ithastobemanagedanyway.
UseCasesaredetailedbelow:
ResidentialCase: In this model, the primary purposes for the mesh network
aretocreatelowcost,easilydeployable,highperformancewirelesscoverage
throughout the digital home. The mesh network is intended to eliminate RF
deadspots and areas of lowquality coverage. High bandwidth applications
tend to be used but also simple ones, e.g. video streaming and wireless
printers.
Compiled by Vivek Parganiha Associate Professor (CSE), BITD 18
Oce Case: The objective in the office case is to create lowcost, easily
deployablewirelessnetworksthatprovidereliablecoverageandperformance.
AwirelessmeshLANbecomesusefulinareaswhereEthernetcablingdoesnot
exist or is cost prohibitive. Companies reduce their costs in association with
cable and time of installation. Furthermore, they can benefit also from
increase in employee productivity through expanded connectivity to key
networkresources.
Campus / Community / Public Access Case: Mesh networks can in this case
provideconnectivityoverlargegeographicareasinlowcost,higherbandwidth
internet access in contrast to the traditional methods and location based
servicesforinformationandsafetypurposes.
PublicSafetyCase:Accesstoemergencyandmunicipalsafetypersonnelsuch
asfire,police,andhospitalisimportantifacorrespondingincidentoccurs.The
networkcanbeusedforvideosurveillance,trackingemergencyworkerswith
biosensors,voiceanddatacommunicationbetweenemergencypersonneland
soon.
4. MeshSecurityConsiderations
Functionsinthescope
Transportlevelsecurity
Functionsoutofthescope
Internalrouting
Externalrouting
Forwarding
Currenttechnologyisnotmatureenoughtoaddressall
vulnerabilitiesfromroutingandforwarding
TransportSecurity
Preventunauthorizeddevicesfromdirectlysendingandreceivingtraffic
via the mesh. It protects unicast traffic between neighbor MPs and protects
broadcasttrafficbetweenneighborMPs.
AuthenticationandInitialKeyManagement
5. DiscoveryandRoleNegotiation
Discovery: This service implies to discover the available mesh for
joiningandwhatAuthenticatedKeyManagement(AKM)Protocolisbeingused
andtoensuretheavailabilityofUnicastandMulticastCiphersuites.
Negotiation:Thisserviceenables parties toagree on the security roles
andsecuritypolicytousewithapeerlink,Whostheauthenticator,whosthe
supplicant?andagreeonwhichofthoseoptionsenabledtouse.
6. 802.11sInterworkingApproach