Date post: | 03-Apr-2018 |
Category: |
Documents |
Upload: | thiem-hoang-xuan |
View: | 231 times |
Download: | 0 times |
of 58
7/28/2019 Chap4 - Mesh Networks - Basics
1/58
Mesh Networks - Basics
7/28/2019 Chap4 - Mesh Networks - Basics
2/58
Contents
Introduction
Classification of Wireless Mesh Networks
General Problem Statement
Exploiting the Capacity of the Radio Channelby Spatial Reuse
Fairness and Congestion Avoidance
Routing
7/28/2019 Chap4 - Mesh Networks - Basics
3/58
INTRODUCTION
7/28/2019 Chap4 - Mesh Networks - Basics
4/58
Introduction
The wireless mesh network (WMN) isa communication network made up ofradio nodes in which there are at least
two pathways of communication toeach node.
In full mesh topology, each node isconnected directly to each of theothers. In partial mesh topology,
some nodes are connected to all theothers, but some are connected onlyto those other nodes with which theyexchange the most data.
7/28/2019 Chap4 - Mesh Networks - Basics
5/58
Introduction Characteristic of the WMN:
the capability to relay frames from one device toanother
7/28/2019 Chap4 - Mesh Networks - Basics
6/58
Introduction
Characteristic of the WMN: Mesh networks potentially have no hierarchy
Most of the traffic is directed and received from acentral device
No such a central device in WMN Everybody relays every others
7/28/2019 Chap4 - Mesh Networks - Basics
7/58
Introduction
Mesh supporting MAC layer needs toconsider Multi-hop path exists bet/ the nodes in the WMN
Different from the situation where a central neighbor
(AP) control all the transmissions. Routing needs to be handled by each relaydevices in the broadcast medium
Path selection: routing function in the mesh-able MAC layer Distinguished from the routing: identification
of possible hops from source to destination inthe IP layer
7/28/2019 Chap4 - Mesh Networks - Basics
8/58
Introduction
Key elements in designing a wireless meshnetwork Security: the WMN may consist of devices
mutually unknown to each other Path selection MAC adaptation
7/28/2019 Chap4 - Mesh Networks - Basics
9/58
CLASSIFICATION OF WIRELESS
MESH NETWORKS
7/28/2019 Chap4 - Mesh Networks - Basics
10/58
Classification of Wireless
Mesh Networks
WMN may operate with or without a hierarchical
structure:
Flat mesh networks
Hierarchical mesh networks
In flat hierarchy,
Any device is able to forward frames
Any device operates as a sink or source, also as a relay.
The devices needs path selection functionality and the
capability to support multi-hop traffic
7/28/2019 Chap4 - Mesh Networks - Basics
11/58
Classification of Wireless
Mesh Networks
In hierarchy mesh networks,
only mesh-able device provide the meshnetworking service to othernon-mesh-able
devices that do not have relaying capabilities Typically, mesh-able devices are APs (Access
Point)
Only mesh-able devices need extra resourcessuch as memory, computing power and multipletranceivers to be able to operate the WMN
7/28/2019 Chap4 - Mesh Networks - Basics
12/58
Classification of Wireless
Mesh Networks
With regard to the frequency channels used,WMNs with respect to the mesh function incomparison to the BSS support function may
operate in band orout of band WMNs may operate on single or multiple
frequency channels
7/28/2019 Chap4 - Mesh Networks - Basics
13/58
Classification of Wireless Mesh
Networks
7/28/2019 Chap4 - Mesh Networks - Basics
14/58
GENERAL PROBLEM STATEMENT
7/28/2019 Chap4 - Mesh Networks - Basics
15/58
General Problem
Statement
New phenomena emerging from the WMN:
Multi-hop transmission reduces the end-to-endthroughput and overall latency/delay increases
Self-interference of relayed frames andunpredictable path metrics
7/28/2019 Chap4 - Mesh Networks - Basics
16/58
General Problem
Statement Path Selection
Routing algorithm in wired networks Routing metric: hop count, link speed, cost for transiting traffic, etc.
NOTtake into account frequent change of topology and link speed
How about wireless networks?
Topology (connectivity of nodes) and link speed changes Path metrics of wired networks appear insufficient for WMNs
Path metrics for WMNs may need to consider as an addition: Packet error probability that depends on SINR
Congestion status of receiving relay node
Availability of relay node on a certain frequency channel
Bandwidth needed for transmission
7/28/2019 Chap4 - Mesh Networks - Basics
17/58
General Problem
Statement Path Selection
Path metrics for WMNs are all time variant andmay essentially change within a short duration.
This information may be available in the MAC
layer only. NOTin the routing layer. The WMN developed at the IEEE cover only
layers 1 and 2 and must provide transparency tohigher layers.
The MANET routing protocols cant be usedsince frame forwarding is performed in the IPlayer.
7/28/2019 Chap4 - Mesh Networks - Basics
18/58
General Problem
Statement - MAC
Medium Access Control (MAC) Problem in relaying in multi-hop networks cant be
solved by just applying single-hop MAC protocolmultiple times.
The WMN may be seen as A sum of a number of continuously overlapping
neighboring single-hop networks
Coordination of their channel access in an area
larger than that of a single-hop network isneeded. Hidden and exposed terminal problem To be
discussed later
7/28/2019 Chap4 - Mesh Networks - Basics
19/58
EXPLOITING THE CAPACITY OF THE
RADIO CHANNEL BY SPATIAL REUSE
7/28/2019 Chap4 - Mesh Networks - Basics
20/58
Exploiting the Capacity of theRadio Channel by Spatial Reuse
Relaying the frame in the WMN
Each relay node operates as both receiver andtransmitter
The wireless medium in the vicinity of a relay node isoccupied once for frame reception and a second timefor frame transmission.
Assuming a string topology of equidistant nodes, thespatial reusedistancecan be easily explained. See thefollowing Fig.
7/28/2019 Chap4 - Mesh Networks - Basics
21/58
Exploiting the Capacity of the RadioChannel by Spatial Reuse
Min spatial reusedistance = 3 hops
7/28/2019 Chap4 - Mesh Networks - Basics
22/58
Hidden Devices Potential Interferers
The receiving device(B) is inreception range of two otherdevices(A,C).
However, the latter ones (A,C)
are out of mutual receptionrange. Hence, transmissionsto the RX device (B) cannot bedetected by a possibleinterferer (C).
In WMNs, each device hasmore indirect than directneighbors. Therefore, hiddendevices have high potential ofinterference.
RxTx
Sensing/Rx
Hidden Devices in Wireless Networks
A
B
C
7/28/2019 Chap4 - Mesh Networks - Basics
23/58
Hidden Devices Potential Interferers
B transmits a busy toneon a different channel.Device C, which isoutside reception of the
transmitting device A,receives the busy toneand defers from channelaccess.
With busy tone, a
receiving device cansignal an ongoing framereception to itsneighborhood.
A BC
f1
f2
A
B
Busy tone
Busy Tone Concept to OvercomeHidden Device Threat
7/28/2019 Chap4 - Mesh Networks - Basics
24/58
Exposed Devices Unused
Capacity
A device is called exposed if, according to theprotocol applied, the device decides that thechannel is not available, so that it refrains fromchannel access, although its transmissionsimultaneously to another ongoing transmission
would not cause harmful interference.
TxRx
What the node C is doing:1. Perform carrier sense (CS)2. Sense busy. So, would not trxWhat if it trx? Its ok. No harm
AB CD
d d
7/28/2019 Chap4 - Mesh Networks - Basics
25/58
Exposed Devices Unused
Capacity
Since exposed devices are not harmful toothers, most wireless standards do not takeinto account
Obstacles, walls and buildings provide sufficientshadowing that may allow interference-freesimultaneous transmission in the same channel.
Detection and identification of opportunitiesfor simultaneous transmission are important forthe design of MAC protocols of dense WMNs.
7/28/2019 Chap4 - Mesh Networks - Basics
26/58
FAIRNESS AND CONGESTION
AVOIDANCE
d C
7/28/2019 Chap4 - Mesh Networks - Basics
27/58
Fairness and Congestion
Avoidance
Fairness denotes a specific means ofresource sharing Equally share the link (or bandwidth)
Different kinds of fairness IEEE 802.11 is based onframes: No matter whatsize the payload and which PHY mode is used fortrx, all frames have equal chance.
IEEE 802.11e is now based on The capacity (trx rate) of the WMN Transmission Opportunities (TXOP)
F i d C i
7/28/2019 Chap4 - Mesh Networks - Basics
28/58
Fairness and Congestion
Avoidance
When the number of flows is large and thecapacity is given, none of the traffic flowsmay be able to fulfill its QoS requirements. Flow Admission Control (FAC) Traffic flow prioritization
Both FAC and prioritization are needed inthe WMNs to establish fairness and support
QoS traffic flows.
F i d C i
7/28/2019 Chap4 - Mesh Networks - Basics
29/58
Fairness and Congestion
Avoidance
The capacity of a wireless mesh network isgiven by The relaying capacity of the highest loaded relay
node (bottleneck) The bottleneck is typically the portal device
connected to the Internet TCP over wireless
TCP was designed for wired communicationnetworks
Congestion avoidance algorithm operates on theassumption that frame losses are due to insufficient
capacity of congested routers High fluctuation of wireless links TCP draws thewrong conclusion and throttles down the windowsize
F i d C i
7/28/2019 Chap4 - Mesh Networks - Basics
30/58
Fairness and Congestion
Avoidance
With multiple devicesinterconnected, bottleneckdevices will result that limit thecapacity of the mesh network.
Relaying devices need to take
into account that subsequentdevices may carry traffic ofother routes, too. How?
A relaying device carries thetraffic aggregated from three
other devices. Prioritization of the forwarding
device is necessary to ensuresufficient performance.
Traffic Aggregation in WMNs
7/28/2019 Chap4 - Mesh Networks - Basics
31/58
ROUTING
7/28/2019 Chap4 - Mesh Networks - Basics
32/58
Routing Algorithms
Proactive protocols constantly maintain and detect paths
to all possible destinations. Reactive protocols save overhead and set-up paths only
when needed. Hybrid protocols combine both aspects
MANETAd-hocRouting
Protocols
7/28/2019 Chap4 - Mesh Networks - Basics
33/58
Routing Algorithms
Further classification may distinguish
between link state and distance vectorbasedalgorithms,
hierarchy of path selection entities and the usage of location information for forwarding
decisions.
7/28/2019 Chap4 - Mesh Networks - Basics
34/58
Routing Algorithms
Proactive routing protocols use periodic floodingto broadcast information
to devices about routes, known neighbors andothers.
This enables short path set-up times and ensuresthat the latest parameter values of the routingmetrics are always present in the transmit range.
Increased overhead is a drawback
Examples: DSDV, OLSR
7/28/2019 Chap4 - Mesh Networks - Basics
35/58
Routing Algorithms
Reactive routing protocols establish a route on request only, reducing path
selection overhead but introducing high delayfor the first frame to be transmitted
Path selection procedure must be executedbefore data frames can be exchanged.
Reactive routing protocols avoid maintaining
unused routes, but pay for this by a higher routediscovery and packet transmission delay.
Examples: DSR, AODV
Ad h O d d Di
7/28/2019 Chap4 - Mesh Networks - Basics
36/58
Ad-hoc On-demand Distance
Vector Routing (AODV)
AODV is a serious candidate for WMNs. Owing to its reactive nature, the protocol
avoids maintaining unused routesintroducing a higher delay than proactiveprotocols when establishing a route
The algorithm is divided into three parts: Route Discovery
Route Maintenance Local Repair
7/28/2019 Chap4 - Mesh Networks - Basics
37/58
Ad-hoc On-demand Distance Vector
Routing (AODV) Route Discovery
Route discovery:1. Checks routing table to determine whether it
has a valid route available2. If a route is known, then forwards to the next
hop, otherwise initiates a route discoveryprocess.3. Broadcasts a Route Request (RREQ) message
and floods the network (See the Fig in the next
page)
7/28/2019 Chap4 - Mesh Networks - Basics
38/58
7/28/2019 Chap4 - Mesh Networks - Basics
39/58
Ad-hoc On-demand Distance Vector
Routing (AODV) Route Discovery
RREQ contains: source IP address destination IP address a sequence number from the source device the last known sequence number from the
destination device a broadcast ID, which is incremented with each
broadcast sent by the source
: a unique identifier forthe RREQ
7/28/2019 Chap4 - Mesh Networks - Basics
40/58
Ad-hoc On-demand Distance Vector Routing(AODV) Route Discovery
After receiving the RREQ, dev D2:
Checks whether it is the dst or if its routing tablecontains a valid route to the dst.
If dst is unknown: D2 builds a new reverse route entry for src D1. Reverse route
contains:
Source IP address of the RREQ
According sequence number
Hop count towards the source D1 IP address of the neighbor dev where the RREQ was received from
Then increments the RREQ hop count and re-broadcasts theRREQ.
7/28/2019 Chap4 - Mesh Networks - Basics
41/58
Ad-hoc On-demand Distance Vector Routing(AODV) Route Discovery
After receiving the RREQ, dev D2 (cont.): If D2 is the dst or the dst is known:
D2 compares the received sequence number (A) from theRREQ and the last received one (B) stored in routing table.
If A
7/28/2019 Chap4 - Mesh Networks - Basics
42/58
Ad-hoc On-demand Distance Vector Routing(AODV) Route Discovery
Each dev receiving the RREP: Builds a forward path entry containing:
The dst. IP addess Neighbor IP address of the last RREP sender Hop count towards the dst. Each routing entry is associated with a certain lifetime (updated
each time the entry is used)
To limit overhead, an extending-ring searchmechanism is proposed:
Send repeated RREQ with an increase Time-To-Live (TTL) Advantage: avoids flooding the whole network if dst. is
near Disadvantage: delays route discovery if dst. is far away.
7/28/2019 Chap4 - Mesh Networks - Basics
43/58
Ad-hoc On-demand Distance Vector
Routing (AODV)
A route request is flooded, and establishes the reverse path Destination unicasts the route reply and establish the forward path Route breaks are repaired locally
Source
RREQDst
Source
RREP Dst
Src
Dst
Upstream Node
Downstream Node
Src
Dst
Local Repair
(a) Route Discovery Process (b) Route Repair shown for Unicasting
Ad hoc On demand Distance
7/28/2019 Chap4 - Mesh Networks - Basics
44/58
Ad-hoc On-demand Distance
Vector Routing (AODV)
Route Maintenance If the source moves during an active session, it
reinitiates the route discovery process. When either the dst. or an intermediate device moves
and the routes breaks, a Route Error (RERR) packet is
sent to the source. This RERR is sent by the device onthe source side of the break (upstream)
When the neighbors receive the RERR, they mark theaffected route entries as invalid and send RERR to allneighbors that are affected by the broken link.
The source recovers the route when it receives the RERR.
Ad hoc On demand Distance
7/28/2019 Chap4 - Mesh Networks - Basics
45/58
Ad-hoc On-demand Distance
Vector Routing (AODV)
Local Repair A method to repair broken route locally When a route breaks, the upstream device decides
either to repair the route or to send an RERR message. A device using local repair sends an RREQ searching for a
new route to the destination device. Note that therepairRREQ will not reach the source thus preventingcreation of loops.
The initiator of the local repair updates its routing entryand compares the stored hop count with the recentlyreceived one.
If the new hop count to the destination is larger than the formerhop count, the device creates an RERR message for the sourcedevice
If the repair attempt fails, an RERR is sent back to thesource.
Ad hoc On demand Distance
7/28/2019 Chap4 - Mesh Networks - Basics
46/58
Ad-hoc On-demand Distance
Vector Routing (AODV)
Based on link adaptation related informationavailable from the PHY, a device may be ableto predict from the history of MCSs used the
current link state so that a device is able torearrange a route before it breaks
Two link state prediction based routerearrangement algorithms: Early Route Rearrangement (ERRA) Early Route Update (ERU)
Common Link Layer Behavior
7/28/2019 Chap4 - Mesh Networks - Basics
47/58
Common Link Layer Behavior
(Link Adaptation)
Most wireless communication standard leave LA opento vendor-specific implementation. In general, most LA algorithms react to degrading
channel conditions by switching to a lower data rate(more robust) PHY mode.
If the SINR of the wireless medium improves again,a higher data rate (lest robust) mode is chosen. The following LA algorithm is based on
IEEE802.11a PHY/MAC (Weiss, 2004) An enhanced version of auto rate fallback (ARF)
Quick reaction to fast channel condition changeswhile taking into account slow channel conditionchanges
Common Link Layer
7/28/2019 Chap4 - Mesh Networks - Basics
48/58
Common Link Layer
Behavior (Link Adaptation)
Common Link Layer
7/28/2019 Chap4 - Mesh Networks - Basics
49/58
Common Link Layer
Behavior (Link Adaptation)
7/28/2019 Chap4 - Mesh Networks - Basics
50/58
Link Breakage Prediction
Link quality degrades when devices depart from each other. Sequential step-down of LA may serve to hint to the
network layer that a link will break soon, triggering routeadaptation to prepare for an alternate route.
During link operation, step-up and step-down might happenmultiple times before a link will break. By summing allweights related to LA steps within a certain time period,where step-down is counted as negative, step-up aspositive, an indicator for link reliability is gained.
7/28/2019 Chap4 - Mesh Networks - Basics
51/58
Link Breakage Prediction
Actions for Expected Link
7/28/2019 Chap4 - Mesh Networks - Basics
52/58
Actions for Expected Link
Break
Assuming LA provides useful information about the linkstate, it may trigger actions such as trying to rescue a link orguaranteeing a certain required link quality by establishinga new route.
A device may distinguish 3 cases:
Outgoing link on a route is switched to lower PHY mode but theincoming links remain unchanged. The link to a next device fadesaway since it moves away
Both incoming as well as outgoing links are switched to lower PHYmode, indicating movement of the observing device itself.
Incoming link is switched to a lower PHY mode, but the outgoing
links remain unchanged. This indicates that the device at the otherend is moving away.
Early Route Rearrangement
7/28/2019 Chap4 - Mesh Networks - Basics
53/58
Early Route Rearrangement
(ERRA)
The ERRA protocol is derived from the local repairidea that is part of the AODV routing protocol.
ERRA does not wait until the link is broken but
prior to breakage rearranges the route to avoiddisruption.
ERRA proactively, by rearrangement, prepares foran alternate route to avoid interruption of service.
7/28/2019 Chap4 - Mesh Networks - Basics
54/58
Example
The initial route starts from source device 2to dst. 7, intermediate device 5 is movingaway.
Device 4 detects the movement, triggers theERRA. It locally broadcasts a route to device7 rearrangement request (ERRA_REQ).
Device 6 responds (ERRA_REP) and providesvia device 8 an alternative route
Early Route Rearrangement
7/28/2019 Chap4 - Mesh Networks - Basics
55/58
Early Route Rearrangement
(ERRA)
7/28/2019 Chap4 - Mesh Networks - Basics
56/58
Early Route Update (ERU)
Like ERRA, the ERU protocol proactivelyupdates the routing table, and takes MCSstep-down to the lowest PHY mode as a
trigger. The current stepped-down link is used to
establish alternate routes.
7/28/2019 Chap4 - Mesh Networks - Basics
57/58
Early Route Update (ERU)
Dev 5 is assumed to leave a route. Dev 4 is trigged by its LA procedure
when switching to BPSK1/2 and trxits neighborhood table(ERU_PATCH_INFO) piggy-backedto some data pkt sent to dev 5.ERU_PATCH_INFO: Breakage Hop Counter (BHC): to
count the number of hops trxted ona route, representing the size of theunstable part of the route.
Dev 5 forwards the info to dev 6that has a steady outgoing link todev 7.
Dev 6 searches but does not find anintersection between theneighborhood received and its owndev 6 and its neighbor further re-broadcast the list.
7/28/2019 Chap4 - Mesh Networks - Basics
58/58
Early Route Update (ERU)
Dev 11 has dev 8 in itsneighbor list and dev 8 isincluded in neighbor list ofdev 4 A route 6-11-8-4bypassing the weak link 4-5is found.
Dev 11 responds withERU_REP to dev 4 via dev8.
The number of broadcastscorrespond to the BHC (inexample here BHC=2),greatly reducing trafficcompared to flooding thevicinity dev 4.