+ All Categories
Home > Documents > WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN...

WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN...

Date post: 23-Dec-2015
Category:
Upload: allen-pope
View: 218 times
Download: 0 times
Share this document with a friend
Popular Tags:
128
WIRELESS MESH NETWORKS WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies ** TeraNovi Technologies
Transcript
Page 1: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

WIRELESS MESH NETWORKSWIRELESS MESH NETWORKS

Ian F. AKYILDIZ* and Xudong WANGIan F. AKYILDIZ* and Xudong WANG

* Georgia Institute of Technology* Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab &BWN (Broadband Wireless Networking) Lab &

** TeraNovi Technologies** TeraNovi Technologies

Page 2: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

2

10. STANDARDS10. STANDARDS

Page 3: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

3

Standards related to Standards related to WMNsWMNs

IEEE 802.11sIEEE 802.11s

IEEE 802.15.1IEEE 802.15.1

IEEE 802.15.4IEEE 802.15.4

IEEE 802.15.5IEEE 802.15.5

IEEE 802.16aIEEE 802.16a

Page 4: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

4

Standard Activities: Standard Activities: IEEE 802.11 Mesh NetworksIEEE 802.11 Mesh Networks

– Currently, IEEE 802.11 wireless networks can achieve a Currently, IEEE 802.11 wireless networks can achieve a peak rate of 11 Mbps (802.11b), 54 Mbps (802.11a/g), peak rate of 11 Mbps (802.11b), 54 Mbps (802.11a/g),

and 600 Mbps (802.11n draft)and 600 Mbps (802.11n draft)

– 802.11n is still under development for higher speed 802.11n is still under development for higher speed

– Researchers expect 802.11n to increase the speed ofResearchers expect 802.11n to increase the speed of Wi-Fi connections by 10 to 20 times. Wi-Fi connections by 10 to 20 times.

Page 5: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

5

IEEE 802.11 Mesh NetworksIEEE 802.11 Mesh Networks

– Protocols for 802.11 ad hoc mode are insufficient forProtocols for 802.11 ad hoc mode are insufficient for multi-hop and mesh networking, because of lack of multi-hop and mesh networking, because of lack of scalability in the MAC protocol, resulting in poor scalability in the MAC protocol, resulting in poor

network network performance. performance.

– A working group within IEEE 802.11, called 802.11s, A working group within IEEE 802.11, called 802.11s, has has

been formed recently to standardize Mesh Networksbeen formed recently to standardize Mesh Networks

Page 6: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

6

IEEE 802.11s:IEEE 802.11s:Mesh NetworkingMesh Networking

Started in May 2004Started in May 2004

802.11a/b/g were never intended to 802.11a/b/g were never intended to work multi-hopwork multi-hop

Target application: Target application: extended 802.11 coverageextended 802.11 coverage

Page 7: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

7

IEEE 802.11

– The infrastructure of each basic service set (BSS) The infrastructure of each basic service set (BSS) is connected via Ethernet LANsis connected via Ethernet LANs

– Such a fixed network architecture limits the Such a fixed network architecture limits the flexibility of network deployment and increases flexibility of network deployment and increases cost. cost.

– Thus, mobility of BSS and multihop networking are Thus, mobility of BSS and multihop networking are needed.needed.

Page 8: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

8

IEEE 802.11: IBSS Mode (Ad Hoc Networking)IBSS Mode (Ad Hoc Networking)

– Ad hoc networking has been specified in the Ad hoc networking has been specified in the independent independent basic service set (IBSS) mode. basic service set (IBSS) mode.

– Stations (STAs) can connect to each other without any Stations (STAs) can connect to each other without any central coordinator like access point (AP). central coordinator like access point (AP).

– Moreover, there is no access or connection to the distributed Moreover, there is no access or connection to the distributed system (DS). system (DS).

– STAs are totally self-contained as an ad hoc network.STAs are totally self-contained as an ad hoc network. – Such as an operation mode has been researched in the field Such as an operation mode has been researched in the field

of ad hoc networking. of ad hoc networking.

Page 9: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

9

IEEE 802.11: IBSS Mode

However, the IBSS mode is not enough for However, the IBSS mode is not enough for many interesting application scenarios many interesting application scenarios

where ad hoc networking is needed but where ad hoc networking is needed but Internet access and support of client nodes are Internet access and support of client nodes are also necessary also necessary

Both infrastructure mode and IBSS mode shall Both infrastructure mode and IBSS mode shall be integrated in a new type of multihop be integrated in a new type of multihop

networks.networks.

Page 10: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

10

IEEE 802.11s: Common Principles

The network usually includes three types of nodesThe network usually includes three types of nodes– MMesh routers, clients, and gateways.esh routers, clients, and gateways.

An ad hoc routing protocol is implemented in mesh An ad hoc routing protocol is implemented in mesh routers to work together withrouters to work together with 802.11 MAC. 802.11 MAC.

Certain radio aware functions may be included in Certain radio aware functions may be included in the routing protocol.the routing protocol.

X. Wang and A. Lim, X. Wang and A. Lim, “IEEE 802.11s Wireless Mesh Networks: “IEEE 802.11s Wireless Mesh Networks: FrameworkFramework

and Challenges,’’and Challenges,’’ Ad Hoc Networks Journal,Ad Hoc Networks Journal, vol. 6, no. 6, pp. 970- vol. 6, no. 6, pp. 970-984,984,

Aug. 2007.Aug. 2007.

Page 11: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

11

IEEE 802.11s:Common Principles

802.11 MAC driver is enhanced in mesh routers to 802.11 MAC driver is enhanced in mesh routers to improve multi-hop performance.improve multi-hop performance.

[[Typical examplesTypical examples]: ]: fine-tuning CSMA/CA parameters, fine-tuning CSMA/CA parameters, developing algorithmsdeveloping algorithms for multi-radio or directional for multi-radio or directional antennas, etc.antennas, etc.

Certain network configurations are needed to Certain network configurations are needed to support client access, Internet access, roaming, support client access, Internet access, roaming, and so on.and so on.

Page 12: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

12

Network Architecture of 802.11s:Meshed Wireless LANs

Basic ConceptBasic Concept– A meshed wireless LAN is formed via ESS mesh A meshed wireless LAN is formed via ESS mesh

networking. i.e., BSSs in the DS do not need to be networking. i.e., BSSs in the DS do not need to be connected by wired LANsconnected by wired LANs

– Instead, they are connected via mesh networking Instead, they are connected via mesh networking possibly with multiple hops in betweenpossibly with multiple hops in between

– Portals are needed to interconnect 802.11 wireless Portals are needed to interconnect 802.11 wireless LANs and wired LANs. LANs and wired LANs.

Page 13: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

13

Network Architecture of 802.11s:Meshed Wireless LANs

Page 14: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

14

STANDARDSSTANDARDS

IEEE 802.11s:Device Classes in a WLAN Mesh Network

Page 15: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

15

Network Architecture of 802.11s:Meshed Wireless LANs

Three new nodes in this architectureThree new nodes in this architecture – A mesh point (MP)A mesh point (MP) is an 802.11 entity that can is an 802.11 entity that can

support wireless LAN mesh services support wireless LAN mesh services

– A mesh access pointA mesh access point is an MP but can also work as is an MP but can also work as an access point an access point

Page 16: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

16

Network Architecture of 802.11s:Meshed Wireless LANs

– A mesh portalA mesh portal is a logical point where packets is a logical point where packets enter and exit the mesh network from and to enter and exit the mesh network from and to other parts of the system such as a traditional other parts of the system such as a traditional 802.11 LAN or from and to a non-802.11 network 802.11 LAN or from and to a non-802.11 network

– Mesh portal includes the functionality of MP. It Mesh portal includes the functionality of MP. It can be co-located with an 802.11 portalcan be co-located with an 802.11 portal

Page 17: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

17

IEEE 802.11s:Device Classes in a WLAN Mesh Network

Page 18: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

18

Network Architecture of 802.11s:Protocol Stacks

802.11s MAC is developed 802.11s MAC is developed based on existing 802.11 MAC based on existing 802.11 MAC for a MP (or the MP module in a for a MP (or the MP module in a MAP or mesh portal). MAP or mesh portal).

Mesh routing protocol of a MP Mesh routing protocol of a MP (or the MP module in a MAP or (or the MP module in a MAP or mesh) is located in the MAC mesh) is located in the MAC layer. layer.

In a mesh portal, a layer 3 In a mesh portal, a layer 3 routing protocol is also needed routing protocol is also needed for path selection from the for path selection from the mesh network to external mesh network to external network or vice versanetwork or vice versa

Page 19: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

19

Topology Formation/Discovery:Discovery and Formation of Mesh Networks

When a new mesh node powers up, it mayWhen a new mesh node powers up, it may use use passive or active scanning to discover a mesh passive or active scanning to discover a mesh network. network.

In 802.11s, a new ID, calledIn 802.11s, a new ID, called mesh ID, is used to mesh ID, is used to identify a mesh network. identify a mesh network. – The mesh ID is attached in beacons and probeThe mesh ID is attached in beacons and probe response response

frames as a new IEs for passive and active scanning, frames as a new IEs for passive and active scanning, respectively.respectively.

– One of the reasons is that a mesh ID can prevent STAs One of the reasons is that a mesh ID can prevent STAs from being associatedfrom being associated withwith MPs withoutMPs without AP functionality. AP functionality.

Page 20: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

20

Topology Formation/DiscoveryDiscovery and Formation of Mesh Networks

Before a new mesh node associated with a mesh network Before a new mesh node associated with a mesh network identified by a mesh ID, itidentified by a mesh ID, it needs to check if its mesh needs to check if its mesh profile matches the established mesh network.profile matches the established mesh network.

Each mesh device must support at least one profile consisting of a mesh ID, a path selection identifier, and a path selection metric identifier.

If such mesh capability information in a mesh node matches that in the mesh network, it will start association.

Page 21: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

21

Topology Formation/Discovery:Mesh Peer Link Establishment

Once a mesh node has joined a mesh network and beforeOnce a mesh node has joined a mesh network and before it it can start sending packets, it needs to establish peer links can start sending packets, it needs to establish peer links with its neighbors. with its neighbors.

In 802.11s, stateIn 802.11s, state machines and detailed procedures have machines and detailed procedures have been specified for setting up peer links. been specified for setting up peer links.

Once thisOnce this step is completed, it is also necessary to establish step is completed, it is also necessary to establish a measure of link quality for each peera measure of link quality for each peer link. link.

Page 22: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

22

Topology Formation/Discovery:Multi-Channel Topology Formation

SSingle-channelingle-channel mode mode – A A mesh device just selectsmesh device just selects one channel during one channel during

the discovery process. the discovery process.

MMultiulti--channel channel modemode– AA mesh node needs to select mesh node needs to select multiple channels multiple channels

forfor its multiple radios or for channel switching if its multiple radios or for channel switching if single radio is supported.single radio is supported.

Page 23: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

23

Topology Formation/Discovery:Multi-Channel Topology Formation

In order to manage the topology in a multi-channel In order to manage the topology in a multi-channel mesh network, the concept of unifiedmesh network, the concept of unified channel graph channel graph (UCG) is used(UCG) is used

– In a UCG, all devices are interconnected using the In a UCG, all devices are interconnected using the commoncommon channel. channel.

– Thus, in a single-channelThus, in a single-channel mesh network, then entire mesh network, then entire network has only one UCG. network has only one UCG.

Page 24: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

24

Topology Formation/Discovery:Multi-Channel Topology Formation

– ForFor a multi-channel mesh network, the number of a multi-channel mesh network, the number of UCGs depends on a self-organization of theUCGs depends on a self-organization of the networknetwork

– In the same UCG, the channel precedence value is In the same UCG, the channel precedence value is the same for all devicesthe same for all devices

– SuchSuch a value is different in different UCGs, and is a value is different in different UCGs, and is

used for coalesce or switching the channel inused for coalesce or switching the channel in UCGsUCGs

Page 25: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

25

Topology Formation/Discovery:Multi-Channel Topology Formation

A simple channel unification protocol and a simple channel graph switching protocol were specified in IEEE 802.11s draft.

Page 26: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

26

Topology Formation/Discovery:Multi-Channel Topology Formation

– However, such mechanisms are only applicable to simple scenarios such as slow channel switching, e.g., DFS, is only needed.

– If dynamic and fast channel switching is needed, the UCG concept and its supporting procedures in the current 802.11s draft may be too insufficient to be useful.

Page 27: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

27

Routing

Previously many proprietary 802.11 Previously many proprietary 802.11 mesh networks are built using mesh networks are built using different routingdifferent routing protocols protocols

which resulted in interoperability which resulted in interoperability problemsproblems

Page 28: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

28

Routing

In 802.11s, the framework for routing is In 802.11s, the framework for routing is extensible, extensible,

which means that different routingwhich means that different routing protocols can protocols can be be

supported by following this frameworksupported by following this framework

– BBut the mandatory protocol shall beut the mandatory protocol shall be implemented implemented in order to achieve interoperability.in order to achieve interoperability.

Page 29: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

29

Routing

Routing mechanism in 802.11s handles Routing mechanism in 802.11s handles packet forwarding forpacket forwarding for MPs, MAPs, and MPs, MAPs, and associatedassociated STAs. STAs.

Unicast, multicast, and broadcast frames are Unicast, multicast, and broadcast frames are all supported in the same framework.all supported in the same framework.

Page 30: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

30

Routing

– Since routing is performed in theSince routing is performed in the MAC layer, packet MAC layer, packet forwarding is carried out viaforwarding is carried out via MACMAC addresses, addresses,

which requires the MAC header contains at least 4 which requires the MAC header contains at least 4 MAC addresses. MAC addresses.

– Compared toCompared to the previous MAC protocol, the two the previous MAC protocol, the two additional MAC addresses are for the MAC additional MAC addresses are for the MAC addresses ofaddresses of the source and the destination of an the source and the destination of an end-to-end flow.end-to-end flow.

Page 31: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

31

Routing in Current 802.11s

One mandatory routing protocol:One mandatory routing protocol:

Hybrid Wireless MeshHybrid Wireless Mesh P Protocol (HWMP)rotocol (HWMP) (hybrid of “on demand routing” and “proactive(hybrid of “on demand routing” and “proactive tree-based tree-based

routing”) routing”)

One optional routingOne optional routing protocolprotocol

based on link state routing called based on link state routing called

““radio aware optimized link state routing (RA-radio aware optimized link state routing (RA-OLSR)”OLSR)”

Page 32: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

32

Overview of Demand Routing Overview of Demand Routing ProtocolProtocol

– In HWMP, on demand routing protocolIn HWMP, on demand routing protocol is adopted is adopted for nodes that experience a changing environmentfor nodes that experience a changing environment

while proactive tree-basedwhile proactive tree-based routing protocol is an routing protocol is an efficient choice for nodes in a fixed network efficient choice for nodes in a fixed network topology topology

– Mandatory routing metric is airtime cot which Mandatory routing metric is airtime cot which measures the quality of links. measures the quality of links.

Page 33: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

33

Overview of Demand Routing Overview of Demand Routing ProtocolProtocol

– More types of metrics such as QoS parameters, traffic More types of metrics such as QoS parameters, traffic load,load, power consumption, and so on can also be power consumption, and so on can also be consideredconsidered

– However, in the same mesh, only one metric shall be However, in the same mesh, only one metric shall be used.used.

– The on-demanding routing protocol is specified based on The on-demanding routing protocol is specified based on

radio-metric AODV. radio-metric AODV.

Page 34: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

34

Overview of Proactive Overview of Proactive tree-based tree-based routingrouting

– AApplied when there is root node configured in thepplied when there is root node configured in the meshmesh

– With this root, a distance vector tree can be built With this root, a distance vector tree can be built

and maintained for other nodesand maintained for other nodes

– SuchSuch routing protocol can avoid unnecessary routing protocol can avoid unnecessary routing overhead for routing path discoveryrouting overhead for routing path discovery and and recoveryrecovery

Page 35: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

35

Routing:

HWMP

On-demand routing and tree-based routing can run On-demand routing and tree-based routing can run simultaneously.simultaneously.

Four control messagesFour control messages– RRoot announcement (RANN), oot announcement (RANN), – RouteRoute request (RREQ), request (RREQ), – Route reply (RREP), and Route reply (RREP), and – Route error (RERR).Route error (RERR).

Page 36: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

36

Routing:

HWMP

– Except for RERR, all controlExcept for RERR, all control messages contain three messages contain three important fields:important fields:

* Destination sequence number (DSN)* Destination sequence number (DSN) * Time-to-live* Time-to-live (TTL), and (TTL), and * Routing Metric.* Routing Metric.

– DSN and TTL can prevent the counting to infinity problem,DSN and TTL can prevent the counting to infinity problem,

– Routing metricRouting metric helps to find a better routing path than just helps to find a better routing path than just using hop countusing hop count

Page 37: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

37

Routing:

HWMP: Procedures for OProcedures for On-n-DDemand emand RRoutingouting

– A source MP broadcasts RREQ to set up aA source MP broadcasts RREQ to set up a route to a route to a destination MPdestination MP

– When an intermediateWhen an intermediate MP receives RREQ, it MP receives RREQ, it creates/updatescreates/updates a route to the source if the sequence a route to the source if the sequence number of the RREQ is greater than the previous one number of the RREQ is greater than the previous one oror the sequence number is the same but the metric is the sequence number is the same but the metric is better better

– If the intermediateIf the intermediate MP has no routeMP has no route to the destination, to the destination, it just forwards the RREQ message further. it just forwards the RREQ message further.

Page 38: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

38

Routing:

HWMP

There have differentThere have different cases depending on two flags: cases depending on two flags: destination only (DO) flag and reply and forward (RF) destination only (DO) flag and reply and forward (RF) flag. flag.

– IfIf the DO flag is set to 1the DO flag is set to 1

then the intermediate MP does nothing but just forwards then the intermediate MP does nothing but just forwards the RREQ to the next-hop MPs until the destination node. the RREQ to the next-hop MPs until the destination node.

– Once the destination node gets this message,Once the destination node gets this message, it sends a it sends a unicast RREP back to the source MP. unicast RREP back to the source MP.

– All intermediate MPs create a route to theAll intermediate MPs create a route to the destination when destination when receiving this RREP message. receiving this RREP message.

Page 39: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

39

Routing:HWMP

– If “DO flag = 0”If “DO flag = 0” and “ and “RF flag = 0”, RF flag = 0”, intermediate MP sends a unicast RREP message to intermediate MP sends a unicast RREP message to

thethe source node and does not forward RREQ. source node and does not forward RREQ.

– If “DO flag = 0” and “RF flag = 1”,If “DO flag = 0” and “RF flag = 1”, intermediate MP sends a unicast RREP message to intermediate MP sends a unicast RREP message to

the source node; additionally, itthe source node; additionally, it needs to set the RF needs to set the RF flag into 0 and then forwards the RREQ message to flag into 0 and then forwards the RREQ message to the destination node.the destination node.

Subsequent intermediate MPs will not be able to send RREP Subsequent intermediate MPs will not be able to send RREP messages to themessages to the source node. source node.

Page 40: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

40

Routing:HWMP

REMARK:REMARK:

““DO flag = 0” and “RF flag = 1”DO flag = 0” and “RF flag = 1” only when the only when the source node source node

has no valid route and wants to create a new route has no valid route and wants to create a new route to the to the

destination node. destination node.

As compared to the original AODV protocolAs compared to the original AODV protocol, t, the he above procedures have been modified for HWMP.above procedures have been modified for HWMP.

Page 41: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

41

Routing:HWMP: Procedures for Procedures for the proactive the proactive tree-based routing modetree-based routing mode

TTwo mechanismswo mechanisms: :

* Based on * Based on proactive RREQproactive RREQ

* P* Proactive RANN. roactive RANN.

Page 42: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

42

Routing:HWMP: Procedures for Procedures for the the proactive tree-based routing modeproactive tree-based routing mode

PProactive RREQ mechanismroactive RREQ mechanism– TThe roothe root MP periodically broadcasts the RREQ MP periodically broadcasts the RREQ

messages. messages.

– An MP in the mesh receivingAn MP in the mesh receiving the RREQ the RREQ

* creates/updates the path to the root, * creates/updates the path to the root,

* records the metric and hop count to the root,* records the metric and hop count to the root,

* * updates the RREQ with such information, and updates the RREQ with such information, and

* then forwards RREQ. * then forwards RREQ.

Page 43: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

43

Routing :HWMP

PProactive RANN mechanismroactive RANN mechanism– TThe root periodically floods a RANN message intohe root periodically floods a RANN message into

the network. the network.

– When an MP receives the RANN and also needs to When an MP receives the RANN and also needs to create/refresh a route tocreate/refresh a route to the root, it sends a the root, it sends a unicast RREQ message to the root. unicast RREQ message to the root.

Page 44: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

44

Routing :HWMP

– When the root receives this unicastWhen the root receives this unicast RREQ, it RREQ, it replies with a RREP to the MP. replies with a RREP to the MP.

TThe unicast RREQ forms the reverse routehe unicast RREQ forms the reverse route from from the root to the originating MP, the root to the originating MP,

while the unicast RREP creates the forward route while the unicast RREP creates the forward route fromfrom the originating MP to the root.the originating MP to the root.

Page 45: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

45

Routing:RA-OLSR

AA proactive link-state routing protocol that is developed proactive link-state routing protocol that is developed basedbased on OLSR*.on OLSR*.

* T. Clausen and P. Jacquet, “Optimized link state routing

protocol (OLSR)”, IETF RFC 3626, 2003

TTo reduce flooding overhead, severalo reduce flooding overhead, several extensions are extensions are made made

Page 46: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

46

Routing:RA-OLSR

1) O1) Only a subset of one-hop neighbors of an MP nly a subset of one-hop neighbors of an MP is is

selected to relayselected to relay control messages. control messages. –Such neighbor MPs are called multipoint relays (MPRs)Such neighbor MPs are called multipoint relays (MPRs) –MPRs areMPRs are selected such that control messages relayed by selected such that control messages relayed by them can reach all two-hop neighbors of thethem can reach all two-hop neighbors of the selecting MP. selecting MP.

–MPR selection is performed through periodic HELLO messages MPR selection is performed through periodic HELLO messages between MPs. between MPs.

Page 47: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

47

Routing:RA-OLSR

2) T2) To provide shortesto provide shortest routes, RA-OLSR routes, RA-OLSR requires requires

only partial link state information to be only partial link state information to be floodedflooded

- The minimum- The minimum set of links are the links between the set of links are the links between the MPRs MPRs

and their selectors.and their selectors.

Page 48: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

48

Routing:Support of Legacy Nodes

For packets transmitting between legacy nodes For packets transmitting between legacy nodes via the meshvia the mesh network, network,

the routing protocol inside the mesh may need the the routing protocol inside the mesh may need the source and the destination MACsource and the destination MAC addresses of a legacy addresses of a legacy node node

Thus, two additional MAC addresses are added Thus, two additional MAC addresses are added into the MACinto the MAC header header – This is the mechanism of 6-address scheme specified in 802.11sThis is the mechanism of 6-address scheme specified in 802.11s

Page 49: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

49

Routing:Support of Legacy Nodes

Other than this mechanism, the routing protocol Other than this mechanism, the routing protocol of the mesh also needs to handle legacyof the mesh also needs to handle legacy nodes. nodes. – E.g., the association of legacy nodes with a MP shall E.g., the association of legacy nodes with a MP shall

be efficiently handledbe efficiently handled such that a routing path can be such that a routing path can be found for legacy node to send packets via the mesh found for legacy node to send packets via the mesh network.network.

In the current draft of 802.11s, this part of In the current draft of 802.11s, this part of functionality has not been fully specifiedfunctionality has not been fully specified..

Page 50: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

50

MAC

Basic operation mechanism of 802.11s MAC is Basic operation mechanism of 802.11s MAC is

the enhanced distributed channel accessthe enhanced distributed channel access (EDCA) specified in (EDCA) specified in 802.11e. 802.11e.

Other features of 802.11e such as HCCA are not adopted intoOther features of 802.11e such as HCCA are not adopted into 802.11s.802.11s. – QoS of 802.11s in its current form is still far from QoS of 802.11s in its current form is still far from

enough for multimedia servicesenough for multimedia services

Page 51: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

51

MAC

Moreover, EDCA does not work well for mesh Moreover, EDCA does not work well for mesh networks, since its prioritizationnetworks, since its prioritization mechanism does mechanism does not perform well in a multihop mesh environment. not perform well in a multihop mesh environment.

Nevertheless,Nevertheless, the current 802.11s MAC protocol is the current 802.11s MAC protocol is built on top of EDCA with various enhancements.built on top of EDCA with various enhancements.

Page 52: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

52

MAC

Multi-Channel Operation

Multichannel operation is important to WMNs.Multichannel operation is important to WMNs.

– However,However, no mechanism has been specified in 802.11s.no mechanism has been specified in 802.11s.

– In the beginning, a proposal called In the beginning, a proposal called common channel framework common channel framework (CCF) was adopted(CCF) was adoptedinto earlier versions of the draft (before draft 1.0).into earlier versions of the draft (before draft 1.0).

– However, because of many problems thatHowever, because of many problems that were not resolved were not resolved effectively, this CCF proposal was removed from the draft effectively, this CCF proposal was removed from the draft

Page 53: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

53

MAC

Multi-Channel Operation

CCommon ommon CChannel hannel FFrameworkramework– NNodes that want to use multi-channel operation odes that want to use multi-channel operation

need to negotiate its channel inneed to negotiate its channel in the common the common channelchannel

TThe common channel is known tohe common channel is known to all nodes in all nodes in the mesh network. the mesh network.

Page 54: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

54

MAC

Multi-Channel Operation

A transmitter first sends an RTX message to request aA transmitter first sends an RTX message to request a channel. channel.

The receiver sends back a CTX to confirm the requested check. The receiver sends back a CTX to confirm the requested check.

If RTX-CTX isIf RTX-CTX is successful, then a channel is selected for these successful, then a channel is selected for these

two nodes. two nodes.

Thus, both nodes switch to theThus, both nodes switch to the selected channel and exchange selected channel and exchange

data following the data/ack procedure. data following the data/ack procedure.

Page 55: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

55

MAC

Mesh Deterministic Access

Mesh deterministic access (MDA) allows MPs to Mesh deterministic access (MDA) allows MPs to access aaccess a certain period with lower contention than certain period with lower contention than other periods without using MDA. other periods without using MDA.

– Such a period isSuch a period is called called MDA opportunity (MDAOP)MDA opportunity (MDAOP)

– Before using MDAOP to access the medium, the ownerBefore using MDAOP to access the medium, the owner of of this MDAOP, i.e., the transmitter needs to set up the this MDAOP, i.e., the transmitter needs to set up the MDAOP with its receiver.MDAOP with its receiver.

Page 56: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

56

MAC

Mesh Deterministic Access

IIn the MDA mechanism, two types of time periods are definedn the MDA mechanism, two types of time periods are defined

– RX-TX timesRX-TX times:: The neighborhood MDAOP times of an MP The neighborhood MDAOP times of an MP are the RX-TX times in which the MP and itsare the RX-TX times in which the MP and its neighbors are neighbors are either a transmitter or receiver of these MDAOPs.either a transmitter or receiver of these MDAOPs.

– NNeighboreighbor MDAOP interferingMDAOP interfering timestimes:: For a neighbor of For a neighbor of this MP, itthis MP, it also has such time periods, but to thealso has such time periods, but to the MP, these MP, these times are called neighbortimes are called neighbor MDAOP interferingMDAOP interfering times.times.

Page 57: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

57

MAC

Mesh Deterministic Access

When an intended transmitter wants to set up a When an intended transmitter wants to set up a new MDAOP to an intended receiver, it needs to new MDAOP to an intended receiver, it needs to checkcheck

* its neighbor MDAOP times, * its neighbor MDAOP times, * the TX-RX times for other frames, and * the TX-RX times for other frames, and * the* the neighbor MDAOP interfering times for the intended neighbor MDAOP interfering times for the intended

receiver. receiver.

If no overlapping occurs andIf no overlapping occurs and the MDA limit is not the MDA limit is not reached, then the transmitter sends an MDAOP reached, then the transmitter sends an MDAOP setup request to thesetup request to the receiver. receiver.

Page 58: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

58

MAC

Mesh Deterministic Access

Receiver will do the same check. Receiver will do the same check. – If the check is passed, the receiver acceptsIf the check is passed, the receiver accepts the MDAOP; the MDAOP;

OOtherwise, it rejects.therwise, it rejects.

Once the MDAOP is setup, both the transmitter and theOnce the MDAOP is setup, both the transmitter and the receiver will start to advertise their new MDAOP time inreceiver will start to advertise their new MDAOP time in the MDAOP advertisement IE. the MDAOP advertisement IE.

Both the transmitter and the receiver can initiate the Both the transmitter and the receiver can initiate the teardownteardown process to release theprocess to release the MDAOP time period. MDAOP time period. – The teardown is complete once the initiatorThe teardown is complete once the initiator is acked by the is acked by the

receiver.receiver.

Page 59: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

59

MAC

Intra-Mesh Congestion Control

An 802.11 mesh usually has multiple hops. An 802.11 mesh usually has multiple hops. – The transmissionThe transmission of one hop may impact its previous hop, of one hop may impact its previous hop,

the next hops, or any links in the neighbors.the next hops, or any links in the neighbors.– LLinks may be congested, and thus a node withinks may be congested, and thus a node with congested congested

links may receive more packets than that can be sent out.links may receive more packets than that can be sent out.

TCP can help mitigate this problem TCP can help mitigate this problem – But nBut notot effective enough in a wireless multihop effective enough in a wireless multihop

network.network.

Page 60: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

60

MAC

Intra-Mesh Congestion Control

On the other hand, contention resolution canOn the other hand, contention resolution can also also help reduce congestion. help reduce congestion. – However, in a mesh network, the contention level However, in a mesh network, the contention level

experiencedexperienced by different nodes is different, which make a by different nodes is different, which make a contention resolution protocol ineffective. contention resolution protocol ineffective.

ForFor these reasons, intra-mesh congestion control these reasons, intra-mesh congestion control is specified in 802.11s.is specified in 802.11s.– The intra-mesh congestion control is hop-by-hop scheme. The intra-mesh congestion control is hop-by-hop scheme.

Page 61: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

61

MAC

Intra-Mesh Congestion Control

Nodes in the neighbor need toNodes in the neighbor need to exchange congestion exchange congestion information and control message in order to resolve information and control message in order to resolve congestion in thecongestion in the network.network.

Thus, the scheme consists of three modules: Thus, the scheme consists of three modules:

* local congestion monitoring* local congestion monitoring * congestion* congestion control signaling, and control signaling, and * local rate control* local rate control..

Page 62: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

62

MAC

Intra-Mesh Congestion Control

In the current draft of 802.11s, some In the current draft of 802.11s, some local congestion local congestion monitoring monitoring

schemesschemes are suggested. are suggested.

– For example, congestion can be monitored by comparing For example, congestion can be monitored by comparing the transmitting rate and the receivingthe transmitting rate and the receiving rate of packets rate of packets that need to be forwarded. that need to be forwarded.

– Queue size can also be used to monitorQueue size can also be used to monitor congestion. congestion.

Page 63: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

63

MAC

Intra-Mesh Congestion Control

– Once congestion is detected, the congested node will inform its Once congestion is detected, the congested node will inform its previous hop nodes by sending a previous hop nodes by sending a unicast Congestion Control unicast Congestion Control RequestRequest message in the mesh action frame message in the mesh action frame

– Node that receives message shall adjust its transmission rate Node that receives message shall adjust its transmission rate according to the locate rateaccording to the locate rate control algorithm. control algorithm.

– Congested node also sends a Congested node also sends a broadcast message Neighborhood broadcast message Neighborhood CongestionCongestion AnnouncementAnnouncement to all its neighbors so that neighbors to all its neighbors so that neighbors also regulate their transmission ratealso regulate their transmission rate

Page 64: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

64

MAC

Intra-Mesh Congestion Control

Locate rate controlLocate rate control at node has not been discussed in at node has not been discussed in 802.11s so far.802.11s so far.

Although congestion control can help improve the mesh Although congestion control can help improve the mesh network performance, unfortunatelynetwork performance, unfortunately the critical part of the critical part of this mechanism such as target rate computation and local this mechanism such as target rate computation and local raterate control algorithm have not been clearly specified yet; control algorithm have not been clearly specified yet; – OOnly simple conceptual discussions arenly simple conceptual discussions are available in the draft of available in the draft of

802.11s.802.11s.

Page 65: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

65

MAC

Power Management

Many nodes in 802.11sMany nodes in 802.11s mesh networks always work mesh networks always work in in an active statean active state since they either need to be an since they either need to be an AP or forward traffic for other nodes. AP or forward traffic for other nodes.

However, there are stillHowever, there are still other nodes that need to other nodes that need to work work in power save mode. in power save mode. – E.g., lightweightE.g., lightweight MPs or MPs that do not forward traffic MPs or MPs that do not forward traffic

for other nodes. for other nodes. – STAs associated with aSTAs associated with a MAP may also work in power MAP may also work in power

save modesave mode

Page 66: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

66

MAC

Power Management

ATIM-window based power management ATIM-window based power management schemescheme

– AAn MP works in two states:n MP works in two states: doze or wake state.doze or wake state.

– The MP in power save mode needs to wake up The MP in power save mode needs to wake up during the ATIM windowduring the ATIM window to receive or send to receive or send control messages including beacons. control messages including beacons.

Page 67: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

67

MAC

Power Management

The ATIM window repeats everyThe ATIM window repeats every one delivery traffic one delivery traffic indication message (DTIM) interval. indication message (DTIM) interval.

DTIM is usually equal to multipleDTIM is usually equal to multiple beacon intervals. beacon intervals.

An MP may also wake up in a scheduled time period An MP may also wake up in a scheduled time period negotiated negotiated

with otherwith other MPs. MPs.

In power save mode, packets in an MP need to be buffered In power save mode, packets in an MP need to be buffered and wait for being sent during the wake state.and wait for being sent during the wake state.

Page 68: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

68

MAC

Power Management

To initiate the power management in a mesh, the following To initiate the power management in a mesh, the following

procedure shall be used:procedure shall be used:

– An unsynchronizingAn unsynchronizing MP shall set the values of MP shall set the values of

* DTIM* DTIM

* ATIM* ATIM windowwindow

* beacon interval,* beacon interval, and and

* power management mode. * power management mode.

- Such information is sent in beacon frames.- Such information is sent in beacon frames.

Page 69: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

6969

Bridging functions in MPPs in a manner compatible with IEEE 802.1D.

– MPP needs to send an MPP announcement to MPP needs to send an MPP announcement to the MPs informing of its presence through IE in the MPs informing of its presence through IE in management framesmanagement frames

– On receiving a valid MPP announcement IE, MP On receiving a valid MPP announcement IE, MP checks the destination sequence number checks the destination sequence number SNSN

MAC Inter-networking

Page 70: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

7070

– If If SN <SN < than that of a previous MPP than that of a previous MPP announcement message, the current announcement message, the current message shall be discardedmessage shall be discarded

– Otherwise, it forwards the message to Otherwise, it forwards the message to

other MPs after the portal propagation other MPs after the portal propagation delay expires and also the TTL value >0delay expires and also the TTL value >0

MAC Inter-networking

Page 71: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

7171

– MAC address and routing metric for this MPP is stored by the MPMAC address and routing metric for this MPP is stored by the MP

– When an MP has packets to send, it first follows the data When an MP has packets to send, it first follows the data forwarding procedures as defined in the routing protocol forwarding procedures as defined in the routing protocol

– If an intra-mesh route to the destination MAC address If an intra-mesh route to the destination MAC address cannot be found, then the MP shall forward all packets cannot be found, then the MP shall forward all packets to the active MPPs in the meshto the active MPPs in the mesh

MAC Inter-networking

Page 72: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

7272

MPP handles both egress and ingress messages

Egress Message is handled by MPP based on knowledge of– Dest. inside mesh:Dest. inside mesh: Message forwarded to the dest. Message forwarded to the dest.

node node – Dest. outside mesh:Dest. outside mesh: Message forwarded to external Message forwarded to external

networknetwork– Dest. unknown:Dest. unknown: Message forwarded to mesh + Message forwarded to mesh +

external network external network

Ingress Message received by MPP from external network– Dest. known:Dest. known: Message forwarded to the dest. node Message forwarded to the dest. node – Dest. unknown:Dest. unknown: Establish a route to dest. Or broadcast Establish a route to dest. Or broadcast

MAC Inter-networking

Page 73: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

7373

Node mobility scenarios handled in 802.11s

Node moves from the LAN outside the mesh to another LAN outside the mesh

– No special action is needed and handled by 802.1D bridgingNo special action is needed and handled by 802.1D bridging

Node moves within the mesh network– Handled by the routing protocolHandled by the routing protocol

Node moves within the mesh network to outside the mesh– Routing protocol needs to repair path after detecting the route is Routing protocol needs to repair path after detecting the route is

changedchanged

Node moves from outside the mesh to inside the mesh– Both MPP functionality and routing protocol cooperate to build the new Both MPP functionality and routing protocol cooperate to build the new

routing pathrouting path

MAC Inter-networking

Page 74: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

7474

MPP supports 802.1D bridging and VLAN functionality

– VLAN tag information defined in IEEE 802.1Q must be VLAN tag information defined in IEEE 802.1Q must be carriedcarriedbetween MPs and MPPsbetween MPs and MPPs

– 802.1Q defines two header formats:802.1Q defines two header formats: Ethernet-encoded Ethernet-encoded formats and SNAP-encoded headerformats and SNAP-encoded header

MAC Inter-networking

Page 75: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

7575

802.11s Open Research Issues

Topology for Multi-Rate Operation and Physical Rate Control– Measurement is based on the Measurement is based on the current transmission current transmission

rate and transmission error rate (called the airtime rate and transmission error rate (called the airtime cost)cost)

– What packets can be sent and how they are sent are What packets can be sent and how they are sent are not specified, leading to measurement inaccuraciesnot specified, leading to measurement inaccuracies– Eg. frequency of measurement packets and their Eg. frequency of measurement packets and their

transmission rate impact the result of airtime costtransmission rate impact the result of airtime cost– The packet error rate due to transmission error does The packet error rate due to transmission error does

not actually reflect the link quality owing to MAC not actually reflect the link quality owing to MAC dependencydependency

Page 76: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

7676

802.11s Open Research Issues

Routing Protocol– Both HWMP and RA-OLSR has several shortcomingsBoth HWMP and RA-OLSR has several shortcomings

In HWMP, the proactive tree-based routing is totally centralized and constrained by the root node – the routing protocol still routes the packets via the the routing protocol still routes the packets via the

root even when there is a short path between two MPsroot even when there is a short path between two MPs

For RA-OLSR, the overhead of control messages is too highalthough Fisheye scope mechanism is adopted

Page 77: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

7777

802.11s Open Research Issues

Though both HWMP and RA-OLSR are specified as a routingmodule in the MAC layer, interactions with other MAC functionality are not considered

Supporting legacy nodes is still an on-going effort– Such a functionality is not specified in the HWMP, Such a functionality is not specified in the HWMP,

while the procedures in RA-OLSR incur high overhead while the procedures in RA-OLSR incur high overhead

No support for simultaneous use of multiple routing metrics

Page 78: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

7878

802.11s Open Research Issues

Link quality measurement– 802.11s specifies a framework in which the peer-link 802.11s specifies a framework in which the peer-link

setup takes into account the link quality measurementsetup takes into account the link quality measurement

– PHY technologies support multiple rates depending on PHY technologies support multiple rates depending on the selection of different modulation and coding the selection of different modulation and coding schemesschemes

– For such multi-rate networks, the topology is very For such multi-rate networks, the topology is very sensitive tosensitive tothe transmission rate that is being used the transmission rate that is being used

– No provision for rate-dependent topology controlNo provision for rate-dependent topology control

Page 79: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

7979

802.11s Open Research Issues

Multichannel operation– No provision for multiple channels and single No provision for multiple channels and single

radio operationradio operation

– Switching delay is considerably more than Switching delay is considerably more than packet Tx timepacket Tx time

– RTX-CTX in the common channel does not avoid RTX-CTX in the common channel does not avoid collisions from nodes of other collisions from nodes of other networks/standards in a new channelnetworks/standards in a new channel

Page 80: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

8080

802.11s Open Research Issues

QoS Provision

– The EDCA mechanism (used in 802.11s) provides soft The EDCA mechanism (used in 802.11s) provides soft QoS onlyQoS only

– This is useful for providing priority to traffic classes, This is useful for providing priority to traffic classes, rather than actual priority to nodesrather than actual priority to nodes

Page 81: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

8181

802.11s Open Research Issues

Congestion control– No effective way of congestion monitoring or co-No effective way of congestion monitoring or co-

working with the TCP control mechanismworking with the TCP control mechanism– The target rate computation method required 1- and 2- The target rate computation method required 1- and 2-

hop node information, no method it is specified to hop node information, no method it is specified to collect such infocollect such info

– Adjusting EDCA parameters cannot solve congestion Adjusting EDCA parameters cannot solve congestion problem as it is more effective for traffic prioritization problem as it is more effective for traffic prioritization rather than ensuring a certain traffic rate rather than ensuring a certain traffic rate

MDA mechanism for reducing contention may also raise interoperabiility issues

Page 82: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

8282

802.11s Open Research Issues

Incorporating multiple MPPs– In the current framework of 802.11s, single MPP is In the current framework of 802.11s, single MPP is

assumedassumed

– In large scale mesh network (enterprise network) In large scale mesh network (enterprise network) multiple MPPs are needed to provide backhaul multiple MPPs are needed to provide backhaul capacity to the Internetcapacity to the Internet

– For multiple MPPs, many functionalities such as For multiple MPPs, many functionalities such as interworking and routing protocols in the current interworking and routing protocols in the current 802.11s draft need to be modified accordingly.802.11s draft need to be modified accordingly.

Page 83: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

8383

IEEE 802.15 Mesh IEEE 802.15 Mesh NetworksNetworks

Goal: high throughput personal area networking Goal: high throughput personal area networking (PANs) (PANs)

(~10m or less) with applications in home (~10m or less) with applications in home

IEEE 802.15.3a standard is based on MultiBand IEEE 802.15.3a standard is based on MultiBand OFDM Alliance (MBOA)'s physical layer OFDM Alliance (MBOA)'s physical layer – Uses ultra wide band (UWB) to reach up to 480 MbpsUses ultra wide band (UWB) to reach up to 480 Mbps– A competing proposal of a Direct Sequence-UWB (DS-A competing proposal of a Direct Sequence-UWB (DS-

UWB) claims support for up to 1.3 GbpsUWB) claims support for up to 1.3 Gbps– WiMedia AllianceWiMedia Alliance

Page 84: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

8484

WPAN Coordinator

Coordinator

End Device

Mesh Link

Star Link

IEEE 802.15.5:IEEE 802.15.5:High Rate Mesh NetworkHigh Rate Mesh Network

Page 85: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

8585

High Rate (HR) Mesh NetworkHigh Rate (HR) Mesh Network

Types of nodes in 802.15.5 WPANs

Pan CoordinatorInitiates network formation

Motivation for 802.15.5– Both 802.15.1 scatternet and 802.15.4 are limited to Both 802.15.1 scatternet and 802.15.4 are limited to

tree topologies owing to their master-slave tree topologies owing to their master-slave architecturearchitecture

– Problems of poor network coverage, low reliability Problems of poor network coverage, low reliability

CoordinatorConnected to each other as a mesh network

End DeviceConnected to Coordinator in star topology

Page 86: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

8686

High Rate (HR) Mesh High Rate (HR) Mesh NetworkNetwork

802.15.5 Mesh based WPANs target– Extending network coverage without increasing Extending network coverage without increasing

transmit power or receive sensitivitytransmit power or receive sensitivity– Enhancing reliability via route redundancyEnhancing reliability via route redundancy– Simplifying network configurationSimplifying network configuration– Increasing device battery life with better Increasing device battery life with better

transmissions and fewer retransmissionstransmissions and fewer retransmissions

802.15.5 Mesh based WPANs have PHY/MAC and routing protocol – higher layer specifications absent in 802.15 PANs

Page 87: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

8787

High Rate (HR) Mesh High Rate (HR) Mesh NetworkNetwork

Applications

Interconnections among PCs/peripherals

Interconnections among PCs/peripherals

Multimedia Home Networkinge.g., HDTV, DVD,Interacting gaming

Standards for HR mesh networks must cover– MAC: Mobility, QoS, beacon managementMAC: Mobility, QoS, beacon management– Routing : Must balance robustness, reliability, load Routing : Must balance robustness, reliability, load

balancingbalancing– Security: Need for trusted authoritySecurity: Need for trusted authority

Page 88: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

88

802.15 MAC Management

802.15 MAC

Frame Convergence Sublayer

(FCSL) (DME)

Device Management Entity

(DME)

88

Mesh Functions mesh routing

Enhancement for mesh

Enhancement for mesh

802.15 PHY

802.15 PHY Management

PROTOCOL STACK

Page 89: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

8989

Low Rate Mesh PANs- Based on 802.15.4b-Applications include automation + control, monitoring, sensing location services, entertainment, among others. - Mainly tree-topology based

Low Rate Mesh NetworkLow Rate Mesh Network

Critical Requirements

Reliability Power Consumption Large Coverage

Page 90: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

9090

UWB-Based Mesh Wireless UWB-Based Mesh Wireless PANsPANs

WiMedia Alliance WiMedia Alliance UWB ForumUWB Forum

Physical Layer: Multi-band Physical Layer: Multi-band OFDMOFDM

Physical Layer: Direct-Physical Layer: Direct-sequence UWB (DS-UWB)sequence UWB (DS-UWB)

MAC Layer: Developed by itselfMAC Layer: Developed by itself MAC Layer: Inherited from IEEE MAC Layer: Inherited from IEEE 802.15.3 – follows piconet 802.15.3 – follows piconet topologytopology

Multiple beacons possible, Multiple beacons possible, allowing multiple “groups” of allowing multiple “groups” of nodesnodes

Each piconet has 1 superframe. Each piconet has 1 superframe. Hence, only 1 beacon sent / Hence, only 1 beacon sent / superframesuperframe

UWB-Based Wireless PANs (2 Industrial Consortiums)

WiMedia Alliance more widely accepted, and also chosen by Bluetooth SIG

Page 91: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

9191

Pros and Cons of UWB based Pros and Cons of UWB based mesh networksmesh networks

Advantages of using UWB in Mesh NetworksAdvantages of using UWB in Mesh Networks– Efficient communicationsEfficient communications– Low-power/cost requirementLow-power/cost requirement– Accurate location informationAccurate location information– High BandwidthHigh Bandwidth

* * However, these advantages have not been really However, these advantages have not been really realized yet !realized yet !

Disadvantage Disadvantage – Communication range is rather shortCommunication range is rather short

Page 92: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

9292

WiMedia UWB

Standards published by the European association for standardizing information and communication systems (ECMA)

WiMedia Alliance (December 2005). - ECMA-368 is a standard on UWB MAC and physical layer technologies

- ECMA-369 is a standard for the interface between MAC and physical layers specified in ECMA-368

Page 93: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

9393

WiMedia UWB

Overview of WiMedia UWB Physical Layer (ECMA-368)

- 3.1–10.6 GHz unlicensed frequency bands- Data rates of 53.3/80/106.7/160/200/320/400/480 Mbps.- UWB spectrum is divided into 14 bands, each with b/w of 512 MHz.

Page 94: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

9494

WiMedia UWB

OFDM symbol structure- In each band there are 110 subcarriers (100 data subcarriers and 10 guard subcarriers) to transmit information and 12 pilot subcarriers for coherent detection - The data is coded by convolution codes and spread by time-frequency codes (TFC)

Page 95: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

9595

WiMedia UWB

TFC code Types: – Time-frequency interleaving (TFI) : Coded data is Time-frequency interleaving (TFI) : Coded data is

interleaved over 3 Tx bandsinterleaved over 3 Tx bands– Fixed-frequency interleaving (FFI): Coded data sent Fixed-frequency interleaving (FFI): Coded data sent

over the same bandover the same band

WiMedia UWB MAC – Superframe consists of 256 medium access slots for a Superframe consists of 256 medium access slots for a

total of 65536 total of 65536 μμss

Page 96: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

9696

WiMedia UWB Superframe structure

Beacon Period (BP)

Data Transmission Period

Reservation Period Prioritized Contention Access

Beacon Period (BP) has multiple beacon slots– BP can be further extended to support variable BP can be further extended to support variable

number of nodes in rangenumber of nodes in range

Page 97: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

9797

WiMedia UWB

Nodes periodically send BP occupancy IE (BPOIE) in each beacon– Allows nodes within two hops to uniquely occupy the Allows nodes within two hops to uniquely occupy the

beacon slotsbeacon slots– Reduces beacon collisionsReduces beacon collisions– Based on a multi-beacon BP, beacon groups can be Based on a multi-beacon BP, beacon groups can be

easily merged as an extended beacon groupeasily merged as an extended beacon group

Page 98: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

9898

WiMedia UWB

Data transmission types– prioritized contention access (PCA)prioritized contention access (PCA)– reservation via distributed reservation protocol (DRP)reservation via distributed reservation protocol (DRP)

PCA Features– Similar to IEEE 802.11e EDCASimilar to IEEE 802.11e EDCA– Used for non-real-time trafficUsed for non-real-time traffic– Any medium access slots that are not reserved by DRP Any medium access slots that are not reserved by DRP

can be used for PCAcan be used for PCA

Page 99: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

9999

WiMedia UWB Types of DRP Reservations

– Alien BP: Reserves medium access slots to protect Alien BP: Reserves medium access slots to protect alien BPsalien BPs

– Hard: Reserves medium access slots for reservation Hard: Reserves medium access slots for reservation owner and target onlyowner and target only

– Soft: Permits PCA, but reservation owner has priority Soft: Permits PCA, but reservation owner has priority accessaccess

– Private: Reservation owner and target may use by Private: Reservation owner and target may use by other access schemes that are not specified by other access schemes that are not specified by WiMedia MACWiMedia MAC

– PCA: Reserves medium access slots exclusively for PCAPCA: Reserves medium access slots exclusively for PCA

Page 100: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

100100

Open Research Issues Standards have not kept pace with technological progress

- Both IEEE 802.15.5 and WiMedia specifications of the MAC protocol for wireless mesh PANs are far from being completed

Proposed standards protocols lack thorough evaluation

- For both high/low rate wireless mesh PANs, routing protocols are alltree-based without validating their utility for mesh networks

802.15.5 will only be a recommended practice rather than a mandatory standard

- Possible interoperability issues

Page 101: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

101101

Open Research Issues For WiMedia UWB, the DRP module (handles resource allocation in a distributed network) does not consider multiple hops

For both 802.15.5 and WiMedia Alliance, there is no provision for cross-layer design between MAC and routing

Multichannel operation not yet incorporated in the standards

Page 102: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

102102

IEEE 802.15.1 BluetoothIEEE 802.15.1 Bluetooth Low data rate (<1 Mbps) PAN technologyLow data rate (<1 Mbps) PAN technology Targets wire replacementTargets wire replacement Piconets formed by master-slave(s)Piconets formed by master-slave(s) Has provisions for multi-hop scatternets Has provisions for multi-hop scatternets

with several masters and slaveswith several masters and slaves

Single SlaveSingle Slave(Point-to-point)(Point-to-point)

Multi-SlaveMulti-Slave(Point-to-multipoint)(Point-to-multipoint)

MasterMaster

SlaveSlave

Master/SlaveMaster/Slave Multi-SlaveMulti-Slave(Point-to-multipoint)(Point-to-multipoint)

Page 103: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

103

Bluetooth is not a popular wireless Bluetooth is not a popular wireless mesh network platform due to:mesh network platform due to:– Low bandwidth Low bandwidth – Limited hardware support for Limited hardware support for

scatternetsscatternets– Need for more distributed network Need for more distributed network

architecture supportarchitecture support

Open Research Issues

Page 104: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

104104

IEEE 802.15.4 ZigbeeIEEE 802.15.4 Zigbee Lower data rate PAN (250,40,20kbps)Lower data rate PAN (250,40,20kbps) Multi-months – years lifetime on small batteriesMulti-months – years lifetime on small batteries Supports star topology and peer-to-peer multihop Supports star topology and peer-to-peer multihop

mesh topology mesh topology – One coordinator responsible for setting up the One coordinator responsible for setting up the

networknetwork

Full Function DeviceFull Function Device

Reduced FunctionReduced Function DeviceDevice

Page 105: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

105105

IEEE 802.16a WiMaxIEEE 802.16a WiMax

April 2003April 2003 Enhances the original 802.16 standardEnhances the original 802.16 standard Original IEEE 802.16 specifies only point to Original IEEE 802.16 specifies only point to

multipoint functionality – great for gateway to multipoint functionality – great for gateway to internet linksinternet links

The extensions specifies user-user links using:The extensions specifies user-user links using:– either centralized schedules, or either centralized schedules, or – distributed schedules.distributed schedules.

Page 106: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

106106

IEEE 802.16a WMAN featuresIEEE 802.16a WMAN features– ““mesh mode” in addition to the mesh mode” in addition to the

point-to-multipoint (PMP) mode point-to-multipoint (PMP) mode defined in IEEE 802.16. defined in IEEE 802.16.

– Operating in the licensed and Operating in the licensed and unlicensed lower frequencies of unlicensed lower frequencies of 2–11 GHz, allowing non-line-of-2–11 GHz, allowing non-line-of-sight (NLO) communications, sight (NLO) communications, spanning up to 50 km range.spanning up to 50 km range.

– Supporting Supporting multihopmultihop communications.communications.

IEEE 802.16a WiMaxIEEE 802.16a WiMaxpoint-to-multipointpoint-to-multipoint

mesh-modemesh-mode

Page 107: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

107

WiMAX Positioning: WiMAX Positioning: Capacity and MobilityCapacity and Mobility

Wireless Technology Positioning

Systems Beyond 3G

>2010

Mobility / Range

Data rates

10 Mbps0.1

IEEE802.16d

1 100

IEEE802.16e

WLAN(IEEE 802.11x)

GSMGPRS

DECT

Bluetooth

EDGE

Fix

ed

Walk

Veh

icle

Indoor

Pedestrian

High Speed

VehicularRural

Personal Area

VehicularUrban

Fixed urban

Nomadic

WiMAX for wireless-DSL

with limited mobility

Flash-OFDM

UMTS

HSDPA

Page 108: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

108

MAP OF WIRELESS MAP OF WIRELESS SYSTEMSSYSTEMS

Page 109: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

109

More Than 250 Operator Trials and Deployments More Than 250 Operator Trials and Deployments in 65+ Countries!in 65+ Countries!

Source: Intel, the WiMAX Forum* Other names and brands may be claimed as the property of others

Page 110: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

110

WiMAX: New Broadband Last MileWiMAX: New Broadband Last Mile

  Wi-Fi Wi-Fi for the last one hundred feet (300 ft) for the last one hundred feet (300 ft)

WiMAX (Worldwide Interoperability for Microwave WiMAX (Worldwide Interoperability for Microwave Access)Access)

for the last mile (30 miles)for the last mile (30 miles)

Page 111: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

111

WiMAX ARCHITECTUREWiMAX ARCHITECTURE

  

Page 112: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

112

WiMAX ArchitectureWiMAX Architecture

1. A WiMAX Tower (similar in concept to a cell-phone tower; a single (similar in concept to a cell-phone tower; a single WiMAX tower can provide coverage to a very large WiMAX tower can provide coverage to a very large area -- as big as 3,000 square miles (~8,000 sq.km). area -- as big as 3,000 square miles (~8,000 sq.km).

2. A WiMAX Receiver The receiver and antenna could be a small box or PCMCIA card, or they could be built into a laptop the way WiFi access is today.

Page 113: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

113

WiMAX TOWERWiMAX TOWER

Page 114: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

114

WiMAX RECEIVERWiMAX RECEIVER

Page 115: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

115

Fixed WiMAXFixed WiMAX

IEEE 802.16dIEEE 802.16d 1BS – thousands of users1BS – thousands of users < 50km coverage< 50km coverage < 75Mbps< 75Mbps

Page 116: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

116

Fixed WiMAX Fixed WiMAX ArchitectureArchitecture

Page 117: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

117

Mobile WiMAXMobile WiMAX

IEEE 802.16eIEEE 802.16e 2-3km coverage (optimal)2-3km coverage (optimal) High speed hand overHigh speed hand over

(< 50ms latencies)(< 50ms latencies) Ensures performance at Ensures performance at

vehicular speeds greater vehicular speeds greater than 120km/hthan 120km/h

< 30Mbps for downlink< 30Mbps for downlink < 15Mbps for uplink< 15Mbps for uplink

Page 118: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

118

Two Forms of Wireless ServiceTwo Forms of Wireless Service

1. Non-Line-of-Sight Service:1. Non-Line-of-Sight Service:

* Lower frequency range – 2 GHz to 11 GHz * Lower frequency range – 2 GHz to 11 GHz

2. Line-of-Sight Service2. Line-of-Sight Service::

Page 119: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

119

WiMAX FactsWiMAX Facts Ideal for the "last-mile" problem that plagues many neighborhoods Ideal for the "last-mile" problem that plagues many neighborhoods

that are too remote to receive Internet access via cable or DSL.that are too remote to receive Internet access via cable or DSL.

In areas with cable or DSL access, WiMAX will provide consumers In areas with cable or DSL access, WiMAX will provide consumers

with an additional — and possibly cheaper — alternative (less than with an additional — and possibly cheaper — alternative (less than

$50).$50).

Uplink and the downlink up to 75 MbpsUplink and the downlink up to 75 Mbps

Page 120: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

120

WiMAX FactsWiMAX Facts

Up to 50 km (31 miles) Up to 50 km (31 miles)

This should not be taken to mean that users 50 km away This should not be taken to mean that users 50 km away without line of sight will always have connectivity.without line of sight will always have connectivity.

Practical limits from real world tests seem to be around 3 to 5 Practical limits from real world tests seem to be around 3 to 5

miles. miles.

If the density of users and thus the demand for bandwidth If the density of users and thus the demand for bandwidth are high, the range will be determined by the demand for BW. are high, the range will be determined by the demand for BW.

Page 121: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

121

802.16 Standards History802.16 Standards History

802.16a(Jan 2003)

• Extension for 2-11 GHz: Targeted for non-line-of-sight, Point-to-Multi-Point applications like “last mile” broadband access

802.16(Dec 2001)

• Original fixed wireless broadband air Interface for 10 – 66 GHz: Line-of-sight only, Point-to-Multi-Point applications

802.16c(2002)

802.16 AmendmentWiMAX System Profiles

10 - 66 GHz

802.16REVd (802.16-2004)

(Oct 2004)

• Adds WiMAX System Profiles and Errata for 2-11 GHz

802.16e(802.16-2005)

(Dec 2005)

• MAC/PHY Enhancements to support subscribers moving at vehicular speeds

Page 122: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

122

IEEE 802.16 SpecificationsIEEE 802.16 Specifications 802.16a802.16a

Uses the licensed frequencies from 2 to 11 GHzUses the licensed frequencies from 2 to 11 GHz

Supports Mesh networkSupports Mesh network 802.16b 802.16b

Increase spectrum to 5 and 6 GHzIncrease spectrum to 5 and 6 GHz

Provides QoS( for real time voice and video service)Provides QoS( for real time voice and video service) 802.16c 802.16c

Represents a 10 to 66GHzRepresents a 10 to 66GHz 802.16d 802.16d

Improvement and fixes for 802.16a Improvement and fixes for 802.16a 802.16e802.16e

Addresses on MobileAddresses on Mobile

Enable high-speed signal handoffs necessary for communications with Enable high-speed signal handoffs necessary for communications with users users

moving at vehicular speedsmoving at vehicular speeds

Page 123: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

123

RESEARCH CHALLENGESRESEARCH CHALLENGES

* Limited Radio Spectrum Much of the radio spectrum is already

allocated by governments or used for other purposes

by carriers.

Page 124: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

124

RESEARCH CHALLENGESRESEARCH CHALLENGES

* High Cost The cost of deploying WiMAX towers is considerably

high when the service is offered on higher radio

frequencies because the line-of-sight requirements of WiMAX necessitate the installation of additional antennas

to cover the same service area.

Page 125: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

125

RESEARCH CHALLENGESRESEARCH CHALLENGES

* Incomplete Network Architecture IEEE 802.16e standard only addresses PHY and MAC layers, leaving it to the WiMAX Forum to tackle issues such as call control, session management, security, the network architecture, roaming, etc.

Page 126: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

126126

Open Research IssuesOpen Research Issues

A group within 802.16, the Mesh Ad Hoc committee is A group within 802.16, the Mesh Ad Hoc committee is investigating ways to improve the performance of mesh investigating ways to improve the performance of mesh networking.networking.

Following issues are yet to be fully considered in specifying the Following issues are yet to be fully considered in specifying the 802.16 mesh MAC protocol802.16 mesh MAC protocol – Avoiding hidden terminal collisionsAvoiding hidden terminal collisions– Selection of linksSelection of links– SynchronizationSynchronization– Power versus data rate tradeoffsPower versus data rate tradeoffs– Greater routing-MAC interdependenceGreater routing-MAC interdependence

Page 127: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

127

IEEE 802.16jIEEE 802.16j

Mobile multihop relay (MMR) based on Mobile multihop relay (MMR) based on relaying stationsrelaying stations

A more practical multihop networking A more practical multihop networking mode than mesh modemode than mesh mode

Features Features – Improve network capacityImprove network capacity– Extend coverageExtend coverage– Support mobile stationsSupport mobile stations

Page 128: WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab & ** TeraNovi Technologies.

128

IEEE 802.16j Network IEEE 802.16j Network ArchitectureArchitecture


Recommended