You are on page 1of 21

Unit5

MESHNETWORKS

DEFINITION

Theterm'wirelessmeshnetworks'describeswirelessnetworksinwhich
eachnodecancommunicatedirectlywithoneormorepeernodes.

Theterm'mesh'originallyusedtosuggestthatallnodeswereconnected
toallothernodes,butmost modernmeshesconnectonlyasubsetof
nodestoeachother.

Nodesarecomprisedofmeshroutersandmeshclients.

Eachnodeoperatesnotonlyasahostbutalsoasarouter,forwarding
packetsonbehalfofothernodesthatmaynotbewithindirectwireless
transmissionrangeoftheirdestinations.

A WMN is dynamically selforganized and selfconfigured, with the
nodes in the network automatically establishing and maintaining mesh
connectivityamongthemselves.





Compiled by Vivek Parganiha Associate Professor (CSE), BITD 1

1. NECESSITYFORMESHNETWORKS

Thereisaneedofthenetworkwithfollowingfeatures

Using fewer wires means it costs less to set up a network, particularly


forlargeareasofcoverage.
Themorenodesyouinstall,thebiggerandfasteryourwirelessnetwork
becomes.
RelyonthesameWiFistandards(802.11a,bandg)alreadyinplacefor
mostwirelessnetworks.
ConvenientwhereEthernetwallconnectionsarelackingforinstance,
inoutdoorconcertvenues,warehousesortransportationsettings.
Useful for NonLineofSight (NLoS) network configurations where
wireless signals are intermittently blocked. For example, in an
amusement park a Ferris wheel occasionally blocks the signal from a
wireless access point. If there are dozens or hundreds of other nodes
around,themeshnetworkwilladjusttofindaclearsignal.
Networksof"selfconfiguring;"thenetworkautomaticallyincorporates
anewnodeintotheexistingstructurewithoutneedinganyadjustments
byanetworkadministrator.
Networks of "self healing," since the network automatically finds the
fastestandmostreliablepathstosenddata,evenifnodesareblocked
orlosetheirsignal.
A network configuration allow local networks to run faster, because
localpacketsdon'thavetotravelbacktoacentralserver.
Nodesareeasyto installand uninstall, making the network extremely
adaptableandexpandableasmoreorlesscoverageisneeded.

Compiled by Vivek Parganiha Associate Professor (CSE), BITD 2


2. ADVANTAGESOFWIRELESSMESHNETWORKS

Using fewer wires means it costs less to set up a network, particularly


forlargeareasofcoverage.
Themorenodesyouinstall,thebiggerandfasteryourwirelessnetwork
becomes.
They rely on the same WiFi standards (802.11a, b and g) already in
placeformostwirelessnetworks.
TheyareconvenientwhereEthernetwallconnectionsarelackingfor
instance, in outdoor concert venues, warehouses or transportation
settings.
They are useful for NonLineofSight (NLoS) network configurations
where wireless signals are intermittently blocked. For example, in an
amusement park a Ferris wheel occasionally blocks the signal from a
wireless access point. If there are dozens or hundreds of other nodes
around,themeshnetworkwilladjusttofindaclearsignal.
Mesh networks are "self configuring;" the network automatically
incorporatesanewnodeintotheexistingstructurewithoutneedingany
adjustmentsbyanetworkadministrator.
Meshnetworksare"selfhealing,"sincethenetworkautomaticallyfinds
the fastest and most reliable paths to send data, even if nodes are
blockedorlosetheirsignal.
Wireless mesh configurations allow local networks to run faster,
becauselocalpacketsdon'thavetotravelbacktoacentralserver.
Wireless mesh nodes are easy to install and uninstall, making the
networkextremelyadaptableandexpandableasmoreorlesscoverage
isneeded.

Compiled by Vivek Parganiha Associate Professor (CSE), BITD 3


3. CHARACTERISTICSOFWIRELESSMESHNETWORKS

MultihopWMN:
To provide greater coverage and nonlineofsight (NLOS) among
nodes,themultihopfunctionbecomesindispensable.
Supportforadhocnetworking,andcapabilityofselfforming,self
healing,andselforganization:

These properties result in enhanced network performance and
gradualgrowth.
Mobilitydependenceontypeofmeshnodes:
Minimalmobilityofmeshroutersbutmeshclientscanbe
stationaryormobilenodes.
Multipletypesofnetworkaccess:
WMNs can support backhaul access to the Internet and peerto
peercommunications.
Dependence of powerconsumption constraints on the type of
meshnodes:

Meshclientsrequirepowerefficientprotocolsincontrastto
meshrouters.
Compatibilityandinteroperabilitywithexistingwirelessnetworks:
WMNsbuiltbasedonIEEE802.11technologieshavetobe
compatible with the IEEE 802.11 standards. Additionaly, such networks
must be interoperable with other types of wireless networks, e.g.
WiMAX,ZigBeeandcellularnetworks.

4. ARCHITECTUREOFWMNs.

Three different categories distinguish in the WMNs architecture, based
onthefunctionalityofthenodes.

Compiled by Vivek Parganiha Associate Professor (CSE), BITD 4


Infrastructure/backboneWMNs


The above figure shows an infrastructure/backbone WMN. The dashed
andsolidlinesdenotewirelessandwiredconnectionsrespectively.Asitcanbe
seeninthefigure,differentkindsofclientsconnecttothemeshroutersthat
formtheinfrastructure.Theradiotechnologyusedbythemeshroutersvaries
significantly. Furthermore, routers apply selfconfiguring, selfhealing links
amongthemselvestoformthebackbonenetwork.
They can also connect to the internet by gateway functions.
Conventional clients can connect to the mesh routers either by using the
Ethernetinterfaceorbyusingthesameradiotechnologyastherouters.
ClientWMNs


Compiled by Vivek Parganiha Associate Professor (CSE), BITD 5
Inthistypeofarchitecture,nomeshrouterexists.Instead,conventional
devicesestablishpeertopeernetworksamongthemtoconstitutetheactuall
network performing routing and configuration functions as well as providing
enduser applications to customers. There exists one single radio interface
among the devices and a packet is forwarded to its destination by hopping
throughdevices.

HybridWMNs



As the name of the architecture denotes, this is the case where the
network comprises by both infrastructure and client mesh networks. The
clients can access the network by other clients or by routers providing
improvedconnectivityandcoveragewithintheWMN.

5. 802.11sMACENHANCEMENTS

WMNMACdifferfromWirelessNetworksMACsasfollows

MACsforWMNsareconcernedwithmorethanonehopcommunication

Compiled by Vivek Parganiha Associate Professor (CSE), BITD 6


MACmustbedistributed,needstobecollaborative,andmustworkfor
multipointtomultipointcommunication.

Network selforganization is needed for better collaboration between
neighboringnodesandnodesinmultihopdistances.

MobilityaffectstheperformanceofMAC.

ImprovingExistingMACProtocols

MAC protocols are proposed for multihop WMNs by enhancing
existingMACprotocols.Forexample,inanIEEE802.11meshnetworks,
these schemes usually adjust parameters of CSMA/CA, e.g., contention
windowsize,andmodifybackoffprocedures.

However, these solutions only achieve a low endtoend
throughput,becausetheycannotsignificantlyreducetheprobabilityof
contentions among neighboring nodes. As long as contention occurs
frequently,whichevermethodistakentomodifybackofforcontention
resolution procedures, the endtoend throughput will still be
significantly reduced due to the accumulating effect on the multihop
path.

Theexisting802.11MAClayerisbeingenhancedfor

SupportingQoS:

EDCA(Enhanced Distributed Channel Access) specified in
802.11e,asthe802.11sbasicoperationmechanism
Otherfeaturesof802.11e,likeHCCA,arenotconsidered.

EDCA is a mandatory mechanism in 802.11e that is reused in
802.11stoprovideprioritizedQoSservices.

EDCA
Enhanced Distributed Channel Access is an extension of
DistributedCoordinationFunction(DCF).Thus,DCFisthebasisforEDCA.
QoSstations(QSTAs)accessthemediumusing8differentuserpriorities

Compiled by Vivek Parganiha Associate Professor (CSE), BITD 7


(UPs).ThismeansthatpacketssentbytheQSTAsareassignedapriority
value, before entering the MAC. These packets are then mapped to the
four firstinfirstout (FIFO) queues, called access categories (ACs)
implemented in EDCA. For each AC, an enhanced variant of the DCF,
namely the enhanced distributed channel access function (EDCAF),
contendsforTXOPsusingasetofEDCAparameters.
Transmission opportunity (TXOP) is defined as the interval of time
when a particular QSTA has the right to initiate transmission. Eack AC
behaves like a virtual station: it contends for medium access starting its
backoff timer after sensing the medium idle after AIFS, (AIFS being the
correspondingDIFSinDCF).TherulethatappliesisthattheACwiththe
lowestAIFShasthehigherpriority.Thedifferentparametersareusedto
givealowpriorityclassalongerwaitingtime.

MDA
InMeshDeterministicAccess(MDA)scheme,involvingMPshave
tosupportsynchronization.MDAsetsuptimeperiods,calledMDAOPs,to
prevent MPs of initiating transmission sequences in case they interfere
with each others transmissions or receptions. MPs that set up MDAOPs
accessthemediumbyusingtheMDAaccessparametersCWMin,CWMax,
andAIFSNwithintheseperiods.
A Mesh DTIM interval comprises of MDAOPs, such an interval is set up
betweentheMDAOPownerandtheaddressingMP.AftertheMDAOPis
setup:
The MDAOP owner uses CSMA/CA and backoff to obtain a TXOP using the
MDACWmin,MDACWmax,andMDAIFSNparameters.Therangesofvaluesof
theparametersareidenticaltothoseusedinEDCA.
BoththeMDAOPownerandtheaddressedMPadvertisetheMDAOP.Except
theMDAOPowner,allotherMPsshouldnotinitiatetransmissionsduringthe
TXOPinitiatedintheMDAOP.

Compiled by Vivek Parganiha Associate Professor (CSE), BITD 8


AsenderMPhastheabilitytoestablishasetofMDAOPseachidentified
byauniqueIDcalledtheMDAOPSetID.Suchasetidhastobeuniqueforthe
sendingMP,sothattheMDAOPsetIDandthesendersMACaddressuniquely
identify an MDAOP set in the mesh. A MDAOP Set ID can also handle set up
andteardownoftheentiresetofMDAOPsinanMDAOPset.

TXOPsalsoexistinMDAbutsinceitisobtainedbyaMPinaMDAOP,it
is called MDA TXOP. Such a TXOP is required to end within the MDAOP it
originally was obtained. Neighbourhood MDAOP times for a MP are those
TXRXtimesthatareadvertisedbyneighbouringMPs,formingasetofMDAOPs
currently used in the neighbourhood. Thus, a sender cannot set up new
MDAOPs within these times. Neighbor MDAOP interfering times for a MP in
relationtoanotherMParethetimeswhentheformercannotsetupMDAOPs
withthelatter.Thus,creatingMDAOPswithinthesetimescanandwillresultin
interference.

The MDA access fraction, at a MP, is defined as the ratio of the total
durationofitsNeighbourhoodMDAOPTimes"inaMeshDTIMintervaltothe
durationoftheMeshDTIMinterval.ItexiststomakesurethatanewMDAOP
setdoesnotcausetheMAFofanotherMPtoexceedaMAFlimit.Ifthelimitis
exceeded,theMDAOPrequestshouldberefused.
AnMDAManagerexiststoallowendtoendflowsusingMDAfeatures
andisresponsiblefor
Pathcomputation.
InvokingMDAOPSetupProcedureonnodealongthepath.
TheMDAManagercanmakepathcomputationinthefollowingtwodifferent
ways:
UsingDijkstraalgorithm.
UsingFordalgorithm.

Compiled by Vivek Parganiha Associate Professor (CSE), BITD 9

Improvingthenetworkcapacity:

Theusageofmultiplechannelsandmultipleradios
Efficient handling of the two different kinds of traffic (BSS
traffic&Forwardingmeshtraffic)
Intrameshcongestioncontrol
Meshcoordinatedchannelaccess
HandlingBSSandmeshtrafficbyMeshAP

GivingprioritytomeshtrafficmaystarveSTAs

Giving priority to STAs might waste resource utilized by mesh
traffic

Advancedsolutions:separateradioformeshandBSStraffic

Intrameshcongestioncontrol

A simple hopbyhop congestion control implemented at each
MP

Localcongestionmonitoring,Congestioncontrolsignaling,Local
ratecontrol

MeshCoordinatedChannelAccess(MCCA)

Optional scheme based on the reservation of contention free
timeslots

Lowercontention(moredeterministic)mechanismforimproved
QoSforperiodicflows

Mobility is of little concern (do not support seamless


handover).
Nomechanismformultichanneloperation

Compiled by Vivek Parganiha Associate Professor (CSE), BITD 10


One proposal called CCF (Common Channel Framework) was
adopted in the early version of the draft (before draft 1.0), but
removedfromthedraft.

LimitationscausedbytheEDCA
Performancelimitationsinmultihopenvironments
EndtoendQoSlimitations

More reliable and stable metric for link quality measurement
androuting.

Bettersolutionsforpowermanagement.

More robust approaches than its current security solution
inherited from 802.11i, in terms of routing security or endto
endsecurity.

MACImprovements

Crosslayerdesignwithadvancedphysicallayertechniques

MACsbasedonDirectionalAntennas

Eliminate exposed nodes if antenna beam is assumed to be


perfect. Due to the directional transmission, more hidden nodes are
produced. Also face other difficulties such as cost, system complexity,
andpracticalityoffaststeerabledirectionalantennas.

ProposingInnovativeMACProtocols:

Determined by their poor scalability in an ad hoc multihop


network,randomaccessprotocolssuchasCSMA/CAarenotanefficient
solution.Thus,revisitingthedesignofMACprotocolsbasedonTDMAor
CDMAisindispensable.Todate,fewTDMAorCDMAMACprotocolsare
availableforWMNs,probablybecauseoftwofactors:

The complexity and cost of developing a distributed and


cooperativeMACwithTDMAorCDMA.

Compiled by Vivek Parganiha Associate Professor (CSE), BITD 11



The compatibility of TDMA (or CDMA) MAC with existing MAC
protocols.

MACswithPowerControl

Theyreduceexposednodes,especiallyinadensenetwork,using
low transmission power, and thus, improve the spectrum spatial reuse
factor in WMNs. However, hidden nodes may become worse because
lower transmission power level reduces the possibility of detecting a
potentialinterferingnode.

For example, in IEEE 802.16, the original MAC protocol is a


centralizedTDMAscheme,butadistributedTDMAMACforIEEE802.16
meshisstillmissing.

In IEEE 802.11 WMNs, how to design a distributed TDMA MAC


protocol overlaying CSMA/CA is an interesting but a challenging
problem.

MultiChannelSingleTransceiverMAC:

If cost and compatibility are the concern, one transceiver on a


radio is a preferred hardware platform. Since only one transceiver is
available, only one channel is active at a time in each network node.
However, different nodes may operate on different channels
simultaneously.

To coordinate transmissions between network nodes under this


situation,protocolssuchasthemultichannelMACandtheseedslotted
channel hopping (SSCH) scheme are needed. SSCH is actually a virtual
MAC protocol, since it works on top of IEEE 802.11 MAC and does not
needchangesintheIEEE802.11MAC.

MultiChannelMultiTransceiverMACs

A radio includes multiple parallel RF frontend chips and


basebandprocessingmodulestosupportseveralsimultaneouschannels.

Compiled by Vivek Parganiha Associate Professor (CSE), BITD 12


On top of the physical layer, only one MAC layer module is needed to
coordinatethefunctionsofmultiplechannels.

To date, no multichannel multitransceiver MAC protocol has
beenproposedforWMNs.

MultiRadioMACs
The network node has multiple radios each with its own MAC
and physical layers. Communications in these radios are totally
independent. Thus, a virtual MAC protocol such as the multiradio
unification protocol (MUP) is required on top of MAC to coordinate
communications in all channels. In fact, one radio can have multiple
channelsinthiscase.However,forsimplicityofdesignandapplication,
asinglefixedchannelisusuallyappliedineachradio.

ScalableSingleChannelMACs:

The scalability issue in multihop ad hoc networks has not been
fully solved yet. Most of existing MAC protocols only solve partial
problems of the overall issue, but raise other problems. To make the
MACprotocolreallyscalable,newdistributedandcollaborativeschemes
must be proposed to ensure that the network performance (e.g.,
throughputandevenQoSparameterssuchasdelayanddelayjitter)will
notdegradeasthenetworksizeincreases.

ScalableMultiChannelMACs

MultichannelMACprotocolsforradioswithmultipletransceivers
have not been thoroughly explored, possibly due to the relatively high
cost of such radios. However, as the cost goes down, a multichannel
multitransceiverMACwillbearatherpromisingsolutionforWMNs.

It is obvious that a multichannel MAC protocol can achieve
higher throughput than a singlechannel MAC. However, to really
achieve spectrum efficiency and improve the perchannel throughput,
the scalable MAC protocol needs to consider the overall performance
improvementinmultiplechannels.

Compiled by Vivek Parganiha Associate Professor (CSE), BITD 13


Thus, developing a scalable multichannel MAC is a more
challengingtaskthanasinglechannelMAC.


6. IEEE802.11sARCHITECTURE

802.11sisanamendmentbeingdevelopedtotheIEEE802.11WLAN
(WirelessLocalAreaNetworks)standard.

802.11sScope

802.11sWLANMeshNetworkingIntegratesmeshnetworkingservicesand
protocolswith802.11attheMACLayer

PrimaryScope:

o AmendmenttoIEEE802.11tocreateaWirelessDistributionSystem
withautomatictopologylearningandwirelesspathconfiguration.
o Small/medium mesh networks (~32 forwarding nodes) can be
larger.
o Dynamic, radioaware path selection in the mesh, enabling data
delivery on singlehop and multihop paths (unicast and
broadcast/multicast).
o Extensible to allow support for diverse applications and future
innovation.
o Use802.11isecurityoranextensionthereof.
o Compatiblewithhigherlayerprotocols(broadcastLANmetaphor).

Thenetworkarchitectureisdepictedinthefollowingfigures.

Compiled by Vivek Parganiha Associate Professor (CSE), BITD 14






DeviceClassesinaWLANMeshNetwork

Mesh Point (MP): establishes peer links with MP neighbours, full


participantinWLANMeshservices.LightWeightMPparticipatesonlyin1hop
communicationwithimmediateneighbors(routing=NULL).

Mesh AP (MAP): functionality of a MP, collocated with AP which


providesBSSservicestosupportcommunicationwithSTAs.

Compiled by Vivek Parganiha Associate Professor (CSE), BITD 15


Mesh Portal (MPP): point at which MSDUs exit and enter a WLAN
Mesh(reliesonhigherlayerbridgingfunctions).

Station(STA):outsideoftheWLANMesh,connectedviaMeshAP.

The802.11definesanextendedserviceset(ESS),usuallyreferredtoasa
meshnetwork.EveryIEEE802.11basedentity(APorSTA)thatfullyorpartially
supportsmeshfunctionalityisreferredtoasameshpoint(MP).MinimalMP
operations include neighbour discovery, channel selection, and forming
associations with neighbours. A WDS is formed by MPs and mesh links that
connect the MPs. This way, the ESS is distinguished from the BSS, defined in
thelegacyIEEE802.11.MAPsarespecificMPsbutcanactasAPsaswell.

MPPsisanothertypeofMPsthathastheabilityofinterconnectingother
WMS with the network it belongs to. Furthermore, it can act as a
bridge/gateway of the mesh network and other networks in the DS. Such a
WMNisuniquelyidentifiedbyameshIDassignedtoeveryMPtorepresentan
ESS.

MediumAccessCoordinationFunction

Compiled by Vivek Parganiha Associate Professor (CSE), BITD 16


TheMediumCoordinationFunction(MCF)componentsareshownintheabove
figure. The sub layer is built on top of the PHY layer where no medications
havebeenmade.The802.11sMACsublayerisanamendmenttoIEEE802.11
tocreateaWDS.

ThemostimportantpartsofMFCare,
1. MeshTopologyLearning,RoutingandForwarding
FocusedonpeertopeerdiscoveryofMPs,thisserviceset(SS)enables
automatic topology learning, establishes links and forms a dynamic data
deliverypathacrossMPs.
Topology discovery and formation: A new candidate node initially gathers
information from neighbouring nodes either by active scanning (i.e. sending
probe messages) or by passive listening (i.e. by receiving periodic beacons).
Finally, two peers form a partial or a full mesh topology by associating with
eachother.
Path selection protocol: Formally, a L2 path selection protocol is used to
handleunicastandbroadcast/multicastdatadelivery.Ontheotherhand,MPs
might be mobileor nonmobileand thus a hybrid routing protocol supporting
bothproactiveandondemandschemesismoresuitableforsucha network.
Thus, the hybrid scheme uses the ad hoc ondemand vector (AODV) and the
optimized link state routing (OLSR) to reach the goal. To make the routing
protocolsmorerobustagainstlinkfailures,radioawaremetricsareproposed.
Forwardingscheme:The traffic in a WMN consists of 4address data frames.
WhenaMPreceivessuchframes,itchecksfortheframeauthenticityandthe
destination MAC address before forwarding. In the MAP arrive the 3address
framewhichisconvertedtoa4addressformatandthenitisforwardedtoits
destination. The support of forwarding multicast and broadcast traffic is also
supported.

Compiled by Vivek Parganiha Associate Professor (CSE), BITD 17


2. MediumAccessCoordination

The proposal istousethe enhanced distributed channel access (EDCA)
mechanism as medium access coordination which is the reuse of previous
MAC enhancements, i.e. 802.11e. The MAC mechanisms support congestion
control, power saving, synchronization and beacon collision avoidance. The
proposed mechanisms shall make it possible to enable multiple channel
operations in multiradio or single radio as well as mixed environments.
Furthermore,theremustbecompatibilitywithlegacydevices.

OptionalMACenhancementsincludeMeshDeterministicAccess(MDA)
that is a reservationbased deterministic mechanism, Common Channel
Framework (CCF) that is a multichannel operation mechanism, Intramesh
CongestionControlandpowermanagement.

3. MeshConfigurationandManagement

Since the deployment of selfconfiguring paths and links can be
unmanaged, it is required the use of autonomic management modules. The
purposeofmanagementistoensureafreeofproblemsnetworkoperation.A
meshpointthatmayfaildoesnotaffecttheoverallnetworkperformancebut
ithastobemanagedanyway.

UseCasesaredetailedbelow:
ResidentialCase: In this model, the primary purposes for the mesh network
aretocreatelowcost,easilydeployable,highperformancewirelesscoverage
throughout the digital home. The mesh network is intended to eliminate RF
deadspots and areas of lowquality coverage. High bandwidth applications
tend to be used but also simple ones, e.g. video streaming and wireless
printers.
Compiled by Vivek Parganiha Associate Professor (CSE), BITD 18
Oce Case: The objective in the office case is to create lowcost, easily
deployablewirelessnetworksthatprovidereliablecoverageandperformance.
AwirelessmeshLANbecomesusefulinareaswhereEthernetcablingdoesnot
exist or is cost prohibitive. Companies reduce their costs in association with
cable and time of installation. Furthermore, they can benefit also from
increase in employee productivity through expanded connectivity to key
networkresources.
Campus / Community / Public Access Case: Mesh networks can in this case
provideconnectivityoverlargegeographicareasinlowcost,higherbandwidth
internet access in contrast to the traditional methods and location based
servicesforinformationandsafetypurposes.
PublicSafetyCase:Accesstoemergencyandmunicipalsafetypersonnelsuch
asfire,police,andhospitalisimportantifacorrespondingincidentoccurs.The
networkcanbeusedforvideosurveillance,trackingemergencyworkerswith
biosensors,voiceanddatacommunicationbetweenemergencypersonneland
soon.
4. MeshSecurityConsiderations

Functionsinthescope
Transportlevelsecurity

Functionsoutofthescope
Internalrouting
Externalrouting
Forwarding
Currenttechnologyisnotmatureenoughtoaddressall
vulnerabilitiesfromroutingandforwarding

TransportSecurity
Preventunauthorizeddevicesfromdirectlysendingandreceivingtraffic
via the mesh. It protects unicast traffic between neighbor MPs and protects
broadcasttrafficbetweenneighborMPs.

Compiled by Vivek Parganiha Associate Professor (CSE), BITD 19


It is required to mutually authenticate neighbor MPs and to generate
and manage sessionkeys and broadcast keys. Data confidentiality over a link
needstobemaintained.Itisessentialtodetectmessageforgeriesandreplays
receivedonalink.

AuthenticationandInitialKeyManagement

Basic approach is to reuse 802.11i/802.1X facilitates implementation


andallowsotherAKMschemes.802.1Xiswidelyusedandissuitableformany
meshscenarios.Itcanbereplacedwithsmallscalealternativesifrequired.It
Providesabasisforsecurekeydistribution(PMK).Inamesh,PMKistreatedas
tokenofauthorizationforaMPtojointhemeshandauthorizedtosendand
receivemessagesto/frommeshneighbours.

5. DiscoveryandRoleNegotiation
Discovery: This service implies to discover the available mesh for
joiningandwhatAuthenticatedKeyManagement(AKM)Protocolisbeingused
andtoensuretheavailabilityofUnicastandMulticastCiphersuites.
Negotiation:Thisserviceenables parties toagree on the security roles
andsecuritypolicytousewithapeerlink,Whostheauthenticator,whosthe
supplicant?andagreeonwhichofthoseoptionsenabledtouse.
6. 802.11sInterworkingApproach

Compiled by Vivek Parganiha Associate Professor (CSE), BITD 20


Supportforconnectingan802.11smeshtoan802.1DbridgedLAN
BroadcastLAN(transparentforwarding)
Overhearingofpackets(bridgelearning)
Support for bridgetobridge communications (e.g. allowing Mesh Portal
devicestoparticipateinSTP)

Compiled by Vivek Parganiha Associate Professor (CSE), BITD 21

You might also like