Professional Documents
Culture Documents
Abstract 802.11s where the TGs define an extended service set (ESS)
of a number of devices (nodes) interconnected to each oth-
Nowdays, WLAN technology covers a wide variety of er, enabling automatic topology learning and dynamic path
devices and applications used by many users around the configuration. Mesh connectivity is established by apply-
globe. The most common standard in WLANs is the well ing multihop mesh techniques to specify a wireless dis-
known IEEE 802.11 which comprises a family of standards tribution system (WDS) building a wireless infrastructure
that each offer different kinds of characteristics. Neither the among nodes. Each node that supports mesh functionality is
infrastructure nor the ad hoc mode made it possible to cov- called a mesh point(MP) and it supports functionalities like
er the demands of usage of WLANs. Demands, like mobility, neighbor discovery, channel selection and association form-
pushed the standards over the edge and the term mesh net- ing with its neighboring MPs. The implementation is based
working was born. Devices no longer have to be in the same on top of the current PHY layer of IEEE 802.11a/b/g/n and
area where an access point is. They can gain access to ser- operates at the 2.4 - 5.0 GHz frequency bands. However,
vices by other nearby access points that denote the same the current routing and MAC techniques limit the WMN
network. Key features like QoS, power management, securi- and its capabilities. Thus, enchancements or new deployed
ty and routing implement existing, new or hybrid techniques techniques have to be implemented by a WMN perspective.
to deploy an integrated mesh network. This article makes a Such a MAC enchancement is the Mesh Determistic Ac-
presentation of the mesh concept and introduces the new cess that is an access method which allows MPs to access
member of the 802.11 family, i.e. 802.11s, and especially the channel at specific times (called MDAOPs) with lower
the concept of Mesh Deterministic Access (MDA). contention that would otherwise be possible[4].
In this type of architecture, no mesh router exists. In- • Dependence of power-consumption constraints on the
stead, conventional devices establish peer-to-peer net- type of mesh nodes: Mesh clients require power effi-
works among them to constitute the actuall network cient protocols in contrast to mesh routers.
performing routing and configuration functions as well
• Compatibility and interoperability with existing wire-
as providing end-user applications to customers. There
less networks: WMNs built based on IEEE 802.11
exists one single radio interface among the devices and
technologies have to be compatible with the IEEE
a packet is forwarded to its destination by hopping
802.11 standards. Additionaly, such networks must be
through devices.
inter-operable with other types of wireless networks,
• Hybrid WMNs e.g. WiMAX, ZigBee[7] and cellular networks.
2.3. Key Functionality In WMNs, it is distinguished two kinds of QoS issues.
Firstly, QoS has to be present both in case of access net-
The section below describes the main functions of work traffic and backbone traffic. This means that call ad-
WMNs[1]. mission control (CAC) has to be present for the first case
and a mechanism to differentiating the two types of traffic.
2.3.1. Mesh Topology Creation Secondly, a mechanism is required obove L2 to guarantee
QoS over multi-hops. The MAC layer can only guarantee a
On activation, an MP searches for potential mesh net- minimum service level for inter-MP traffic.
works present within its coverage area. When such a net- End-to-end Qos is supported by flow control which is
work is found, the MP associates with the network. If no tightly linked with CAC where the former uses flow identi-
network is found, the MP must be able to create a new one. fiers and the latter checks for service-level requirements in
There are two types of network discovery: the active and the packet headers.
passive approach. After network discovery, basic connectiv-
ity of the nodes is maintained within the network. Further- 2.3.5. Power Efficiency
more, beacon messages are send for topology maintenance.
Many devices are battery-driven and that has an effect
2.3.2. Routing on the up-time of a device. In turn, up-time depends on bat-
tery capacity and device power consumption. Power-saving
Routing is a very important feature of WMNs since it mechanisms aim to extend the up-time as much as possible.
allows communication between MPs. The IETF MANET Since a device can do many different things, there should
WG is concetrated on standarizing IP (layer 3) routing pro- also be propriate solutions for each case. Inactive devices
tocol functionality for wireless ad hoc networks. In con- could enter a sleep mode, traffic-forwarding devices could
sideration are taken two types of protocols. These are the have scheduled wake-up mechanisms and so on. Another
proactive and the reactive routing protocols. The former way of dealing with this issue is to adapt transmission pow-
type of protocols is useful in small networks and the lat- er depending on tranmission range.
ter is preferred when the network size is large. Since the Nevertheless, there is a more efficient way used in mesh
size of a mesh network can not be determined, neither type networks called power-aware routing, where network rout-
of protocol can be used. A solution to this problem is to ing paths are oprtimized for power consumption[9].
use a hybrid protocol. Mesh networks can alternatively use
adaptive routing protocols.
3. IEEE 802.11s
2.3.3. Security
3.3.1. EDCA
• Path computation.
• Invoking MDAOP Setup Procedure on node along the
Figur 9. MDAOPs during DTIM. path.
A sender MP has the ability to establish a set of The MDA Manager can make path computation in the
MDAOPs each identified by a unique ID called the MDAOP following two different ways:
Set ID. Such a set id has to be unique for the sending MP,
so that the MDAOP set ID and the senders MAC address • Using Dijkstra algorithm.
uniquely identify an MDAOP set in the mesh. A MDAOP • Using Ford algorithm.
Set ID can also handle set up and teardown of the the entire
set of MDAOPs in an MDAOP set. In conclusion, the MDA does not perform well for the
TXOPs also exist in MDA but since it is obtained by a following reasons.
MP in a MDAOP, it is called MDA TXOP. Such an TX-
OP is required to end within the MDAOP it origianlly was 1. Partial overlapping of MDAOPs.
obtained. 2. Interference with other MDAOPs which are not con-
Neighborhood MDAOP times for a MP are those TX- sidered in Neighborhood Times
RX times that are advertised by neighboring MPs, forming
a set of MDAOPs currently used in the neighborhood. Thus, 3. DTIM fragmentation.
a sender cannot set up new MDAOPs within these times.
Thus, Dynamic Relocation is en enchancement to MDA
Neighbor MDAOP interfering times for a MP in relation
confronting the first two problems mentioned above.
to another MP are the times when the former cannot set up
MDAOPs with the latter. Thus, creating MDAOPs within
these times can and will result in interference. 4. Summary
The MDA access fraction, at a MP, is defined as the ratio
of the total duration of its Neighborhood MDAOP Times"in The article presented the concept of Wireless Mesh Net-
a Mesh DTIM interval to the duration of the Mesh DTIM works and referred to the different implementations of each
interval. It exists to make sure that a new MDAOP set does type. The new amandement of 802.11, i.e. 802.11s, looks
not cause the MAF of another MP to exceed a MAF lim- promising in bringing a new wave in wireless LANs. The
it. If the limit is exceeded, the MDAOP request should be area of implementations is wide and usages in the future
refused. can be meet almost everywhere. We have seen that the basis
for 802.11s in the MAC layer, EDCA, comes from its ances- Comm. Corp. IEEE 802 Plenary, DallasIEEE 802.11s
tor, i.e. 802.11e, and that the PHY layer remains untouched. Tutorial, Overview of the Amendment for Wireless
The optional mechanism MDA showed some weaknesses Local Area Mesh Networking W. Steven Conner, Intel
but the Dynamic Relocation was developed to cover some Corp. Monday, Nov 13, 2006.
of them.
[12] Saurabh Sehrawat, Revoti Prasad Bora, Dheeraj Har-
ihar, Performance Analysis of QoS supported by En-
Referenser hanced Distributed Channel Access (EDCA) mecha-
nism in IEEE 802.11e, IAENG International Journal
[1] Stefano M. Faccin, Carl Wijting, Jarkko Kneckt, Ame- of Computer Science, IJCS-33-1-6
ja Damle: Mesh WLAN Networks: Concept and Sys-
tem Design, IEEE Wireless Communications, Apr. [13] Soleri Michele, IEEE 802.11s Mesh Deterministic Ac-
2006 cess: Design and analysis, LAUREA MAGISTRALE
IN INGEGNERIA INFORMATICA ANNO ACCA-
[2] Ian F. Akyildiz, Xudong Wang, Weilin Wang: Wire- DEMICO 2006-2007
less mesh networks: a survey, Computer Networks 47
(2005), http://www.sciencedirect.com