The IEEE 802.11s Mesh Networking Amendment Dan Harkins Guido R. Hiertz

advertisement
The IEEE 802.11s Mesh
Networking Amendment
2011-03-14 – IEEE 802 plenary meeting – Singapore
IEEE doc. 11-11-0380-00
Dan Harkins
Guido R. Hiertz
ARUBA NETWORKS
Dee Denteneer
Kazuyuki Sakoda
PHILIPS
Guenael Strutt
POWERWAVE TECHNOLOGIES
PHILIPS
SONY
Jarkko Kneckt
NOKIA
Michael Bahr
SIEMENS AG
2
Outline
Motivation
Introduction to
802.11s
Usage scenarios
802.11s architecture
The Mesh BSS
– Mesh Discovering
– Peering
– Security
Multi hopping
– Path selection
(reactive)
– Power save
– Radio resource
management
MBSS connected to
external STAs
Wrap up
Conclusion
3
Motivation for the tutorial
STA
L
STA
P
AP
STA
STA
M
M
AP
STA
STA
M
M P
STA
4
Why a tutorial?
2nd recirculation Sponsor Ballot
completed March 5 with 95%
approval rate
Timeline targets approval to
forward to ExCom by July 2011
STA
L
STA
P
AP
STA
STA
M
M
AP
STA
STA
M
M P
STA
5
Outline of the tutorial
• What’s new in 802.11s?
• Design principles
• Topologies of increasing complexity
Lightweight, low power nodes
Wireless
backhaul
Interworking
P
AP
STA
M
Mesh network
STA
L
STA
P
AP
STA
STA
M
M
AP
STA
STA
M
M P
M AP
M
STA
STA range extension
STA
L
STA
STA
STA
M
P
STA
STA
Infrastructure networks
Peer-to-peer island
6
Introduction to Mesh
STA
L
STA
P
AP
STA
STA
M
M
AP
STA
STA
M
M P
STA
7
Benefit #1: it’s wireless!
Can form larger scale wireless network
without adding wired backhaul
– Networked devices go where wires cannot
AP
M
AP
M
AP
AP
M
STA
L
STA
P
AP
STA
STA
M
M
M
AP
STA
STA
M
M P
STA
8
Benefit #2: it’s self-forming!
Network grows as devices are added
– Coverage is expanded with minimal
configuration
M
M
M
M
M
M
M
M
M
M
M
M
STA
L
STA
P
AP
STA
STA
M
M
AP
STA
STA
M
M P
STA
9
Benefit #3: it’s self-healing!
Resilient to single point of failure
– Network continues to operate during
maintenance
M
M
Out of service
M
M
M
M
M
M
M
Out of service
M
M
M
10
Benefit #4: it has no hierarchy!
Can deploy, extend, modify, and pullout the
wireless network easily with minimal
cost/overhead
Mesh stations can be client devices
– True ad hoc networking with relaxed range
restriction
– No (re-)configuration delays because there is
no need to define a master station or cluster
“Infrastructure” mesh stations can be
deployed, upgraded, replaced or removed
regardless of role
11
Usage Scenarios
STA
L
STA
P
AP
STA
STA
M
M
AP
STA
STA
M
M P
STA
12
IEEE 802.11s Mesh Usage Scenarios
1
3
5
Residential / Home
Office
Siemens-Pressebild / Siemens Press Picture
Industrial / M2M
2
4
University Campus
Community Area
Park Area
6
Smart Metering/
Smart Grid
Campus/Community/Public Access
P
AP
STA
STA
M
M
Public Safety/Emergency
STA
L
STA
AP
STA
STA
M
M P
STA
pictures (1)(2)(3)(4) IEEE doc 11-04/0662r16, (5) Siemens Press Picture, (6) IEEE doc 11-09-1313r5
13
Backhaul Mesh
wired
LAN
STA
AP
STA
STA
STA
L
P
M
M
M
AP
STA
STA
M P
STA
•Campus/
Community/Public
2
Access
3
•Office
•Industrial 5
•Smart Metering/
Smart Grid 6
14
Client Mesh
wired
LAN
STA
L
STA
P
AP
STA
STA
M
M
AP
STA
STA
M
M P
STA
•Home Networks
•Emergency/Public
Safety
•Industrial/M2M
•Smart
Metering/Smart
Grid
1
4
5
6
15
Mixed (backhaul & client) Mesh
wired
LAN
STA
L
STA
P
AP
STA
STA
M
M
AP
STA
STA
M
M P
STA
•Home
Networks
•Office
•Emergency/
Public Safety
1
3
4
16
The 802.11s architecture
Extensions required for multi-hop communications
STA
L
STA
P
AP
STA
STA
M
M
AP
STA
STA
M
M P
STA
17
What has changed on the inside?
802.11 STA
802.11 Mesh STA
New Mesh Functions 3
802.1X
Peering Management
Addressing
Same frame format
Addressing + Mesh Ctrl
EDCA
EDCA reusable
PHY
No H/W change
Association
SAE
1.
2.
3.
802.1X
Needed serious improvements
(IBSS replacement, safe
disassociation, instance
management etc.)
2
SAE
EDCA
MCCA
2
1
PHY
MCCA provides much-needed determinism
SAE provides much-needed 802.11-based security
New mesh functions include routing, power management, synchronization …
STA
L
STA
P
AP
STA
STA
M
M
AP
STA
STA
M
M P
STA
18
Nothing has changed from the
outside
MSDU source
MSDU destination
MSDU
MAC SAP
MPDU
Mesh
Mesh
STA 4
STA 6
Mesh
Mesh
STA 7
STA 1
Mesh
STA 5
Mesh
Mesh
Mesh
STA 2
STA 8
STA 3
Mesh
mesh BSS
(MBSS)
STA 10
Mesh
STA 9
Mesh
STA 11
Transparent forwarding to/from any 802 STA
STA
L
STA
P
AP
STA
STA
M
M
AP
STA
STA
M
M P
STA
19
The Mesh BSS
Mesh Discovery
Peering
Mesh Security
20
Mesh discovery
When a STA boots up, it first locates neighbor
mesh STAs
Reuse traditional mechanism in 802.11
– Passive scan (use beacon frames)
– Active scan (use Probe request/response)
Is there anybody out
there?
M
M
M
I am here!
M
I am here!
STA
L
STA
P
AP
STA
STA
M
M
AP
STA
STA
M
M P
STA
I am here!
M
21
Mesh discovery (cont’d)
The “Mesh profile” uniquely identifies the network
– “Mesh ID” (Information Element in mgmt. frames):
Octet string identification of the network, similar to
SSID
– Other active attribute identifiers:
the active protocol set
Mesh Profile
of STA-A
Supplemental information:
– “Connected to gate”
– “Number of mesh peerings”
STA
L
STA
P
AP
STA
STA
M
M
AP
STA
STA
M
M P
STA
Mesh Profile
of STA-B
22
Mesh Peering
A distributed, non-hierarchical, and
non-exclusive agreement to communicate
Each mesh STA manages its own peerings
with other mesh STAs
Peering Establishing Protocol
– A true peer-to-peer protocol
– Each side offers and agrees to
parameters that define the terms of the
peering and govern communication
– Two modes for secured peering (AMPE)
or unsecured peering (MPM)
STA
L
STA
P
AP
STA
STA
M
M
AP
STA
STA
M
M P
STA
23
How is peering done
Capability check via profile matching
A peering has attributes that must be
agreed upon
– Each side must make an offer of attributes to
use for a potential peering
– Each side must confirm the agreed-upon
attributes that define the peering
After each side has offered and confirmed
agreement, the peering is established
Each side can initiate a peering and both
sides can initiate the peering
simultaneously
STA
L
STA
P
AP
STA
STA
M
M
AP
STA
STA
M
M P
STA
24
How Peering is Done
Initiator
Responder
offer
offer
confirm
confirm
STA
L
STA
P
AP
STA
STA
M
M
AP
STA
STA
M
M P
STA
25
How Peering is Done
Initiator
Responder
offer
offer
confirm
confirm
STA
L
STA
P
AP
STA
STA
M
M
AP
STA
STA
M
M P
STA
26
How Peering is Done
Initiator
Initiator
offer
confirm
STA
L
STA
P
AP
STA
STA
M
M
AP
STA
STA
M
M P
STA
offer
confirm
27
Mesh Security– Simultaneous
Authentication of Equals (SAE)
Peer-to-Peer
– Non-hierarchical,
mutual authentication
Uses only a password
Resistant to attack
– Can use short, easyto-remember, weak
passwords
– Sharing a password
among mesh points
does not lessen
security
STA
L
STA
P
AP
STA
STA
M
M
AP
STA
STA
M
M P
STA
Distributed
– No centralized server
Robust security
– Misuse-resistant
A standard RSN
authentication method
for all of 802.11
– Can be as a drop-in
replacement to
WPA(2)-PSK in BSS,
IBSS, and PBSS
networks
– Fixes well-known
security problem!
28
How SAE is performed
AKM advertising support for SAE in RSN IE in beacons
and probe responses
SAE is after discovery but before peering or association
Uses 802.11 authentication frames
Simple two message exchange
– Same type of exchange used for peering
 Each side first commits to a guess of the password
 Each side then confirms its guess and verifies the peer’s guess
– Successful termination results in a PMK
– Unsuccessful termination does not leak any information
about the password
STA
L
STA
P
AP
STA
STA
M
M
AP
STA
STA
M
M P
STA
29
Establishing Secure Peerings
Discovery
– Identifies peer
SAE
– Derives shared key
AMPE
– Establish peering
Subsequent traffic
is protected
STA
L
STA
P
AP
STA
STA
M
M
AP
STA
STA
M
M P
STA
30
Mesh Peering: A Better Approach to
Peer-to-peer networking
Better than Bluetooth
– Easy-to-use, ad-hoc, auto-discovery
– Secure peering with short key
– High speed data transfer between
peers
Secure, direct, link establishment
– No pre-provisioning or “protected setup” necessary
– Link is directly established between
the peers without need for role
determination
– The right tool for the right job
STA
L
STA
P
AP
STA
STA
M
M
 No need to implement functionality of
multiple roles (e.g. STA and AP)
 Security is integrated into link
establishment
AP
STA
STA
M
M P
STA
31
Multi-hopping in the Mesh BSS
Path selection (reactive)
Power save
Radio resource management
Wireless Mesh network = multi-hop topology
≠ master-slave topology
32
Path Selection
Determines paths from source mesh STA to destination
mesh STA in an MBSS, possibly over multiple hops
Paths are stored in forwarding information
HWMP, the Hybrid Wireless Mesh Protocol, is the
mandatory default path selection protocol
Path selection extensibility framework for use of other
path selection protocols
Active path selection protocol indicated by path
selection protocol identifier in Mesh Configuration IE
HWMP can be always configured for interoperability
STA
L
STA
P
AP
STA
STA
M
M
AP
STA
STA
M
M P
STA
33
Hybrid Wireless Mesh Protocol (HWMP)
Default Routing protocol in 802.11s
Reactive path selection as basic path selection
mechanism (always available)
– path is only established if needed (on-demand)
– no path selection control traffic if no data is sent
– on-demand path discovery mechanism
– works with arbitrary path selection metrics
Proactive path selection tree to designated mesh STAs
(can be configured at root mesh STAs)
 described later
STA
L
STA
P
AP
STA
STA
M
M
AP
STA
STA
M
M P
STA
34
Path Discovery in HWMP
Path Request (PREQ)
O
A
T
B
E
C
PREQ
reverse path
PREP
forward path
STA
L
STA
P
AP
STA
STA
M
M
AP
STA
STA
M
M P
STA
D
F
O – Path Originator
T – Path Target
35
Forwarding info @ “D“ after PREQ
Destination Mesh STA Address
O
Destination HWMP Sequence Number
14
Next Hop Address
C
Precursor List
link metric (O-A) +
link metric (A-B) +
link metric (B-C) +
link metric (C-D)
Path Metric
Number of Hops
4
Lifetime of Forwarding Information
STA
L
STA
P
AP
STA
STA
M
M
AP
STA
STA
M
M P
STA
<lifetime>
36
Path Discovery in HWMP
Path Reply (PREP)
O
A
T
B
E
D
F
C
PREQ
reverse path
PREP
forward path
STA
L
STA
P
AP
STA
STA
M
M
AP
STA
STA
M
M P
STA
O – Path Originator
T – Path Target
37
Forwarding Info @ “D” after PREP
O
T
14
2011
recipient for
forwarding
C
E
PERR forwarding,
loop prevention
(E, <lifetime>)
(C, <lifetime>)
link metric (O-A) +
link metric (A-B) +
link metric (B-C) +
link metric (C-D)
link metric (T-F) +
link metric (F-E) +
link metric (E-D)
4
3
<lifetime>
<lifetime>
Destination Mesh STA Address
loop prevention
Destination HWMP Sequence Number
Next Hop Address
Precursor List
best quality path
Path Metric
Number of Hops
timeout of unused
forwarding
information
Lifetime of Forwarding Information
STA
L
STA
P
AP
STA
STA
M
M
AP
STA
STA
M
M P
STA
38
The Simplest Path Discovery
O
PREQ
PREP
T
PREP
T
… easily extensible
PREQ
O
STA
L
STA
P
AP
STA
STA
M
M
AP
STA
STA
M
M P
STA
39
Further Features of HWMP
Path repair
– If path gets disrupted,
Path Error (PERR) is
generated at link
break and propagated
towards source mesh
STA
– Source mesh STA set
ups new path to
destination mesh STA
– PERR used for
indication of different
error conditions
STA
L
STA
P
AP
STA
STA
M
M
AP
STA
STA
M
M P
STA
Non-forwarding mesh STA
– Is only mesh source or
mesh destination but
does not forward frames
for other mesh STAs
– Participates in HWMP,
but does not propagate
HWMP control messages
– Increases the risk of
disconnected MBSS
40
Frame format
So… What do we do with this forwarding information?
2 Octets
2 Octets
6 Octets
6 Octets
6 Octets
2 Octets
6 Octets
2 Octets
4 Octets
0-7955 Octets
4 Octets
Frame
Control
Duration/ID
Address 1
Address 2
Address 3
Sequence
Control
Address 4
QoS Control
HT Control
Body
FCS
Receiver
Address
Mesh
Transmitter
Destination
Address
Address
Mesh
Source
Address
Mesh
Control
6, 12, 18, or 24
Octets
1 Octet
Mesh Flags
2 Bits
Address
Extension
Mode
1 Octet
4 Octets
0, 6, 12, or 18 Octets
Mesh Time
To Live
(TTL)
Mesh
Sequence
Number
Mesh Address Extension
6 Bits
Reserved
Mesh
Source
Address
Destination
Address
Mesh Control field provides address extension (six
addresses), TTL, & Sequence Number
Mesh Control field is encrypted as part of data
STA
L
STA
P
AP
STA
STA
M
M
AP
STA
STA
M
M P
STA
Source
Address
41
Multi-hopping in the Mesh BSS
Power save in the Mesh BSS
Wireless Mesh network = multi-hop topology
≠ master-slave topology
42
Power save
Optimized power consumption for the whole
network
– Any device may operate in power save
– Power constrained devices limit forwarding and
minimize power consumption
Instant power-up
Relaxed transition to sleep
– Deep & light sleep
– Good responsiveness of the network
STA
L
STA
P
AP
STA
STA
M
M
AP
STA
STA
M
M P
STA
43
Interaction between power save
and forwarding
Frames are buffered for Power save mesh
STAs
Power saving mesh STAs can limit
participation in forwarding:
– Mesh STA may limit the amount of peerings
– Mesh STA may operate in non-forwarding
mode
 Only create paths for own traffic
– Link metrics may account for power
constraints
STA
L
STA
P
AP
STA
STA
M
M
AP
STA
STA
M
M P
STA
44
Power save and peerings
Each mesh peering consists of two mesh
power modes:
– Local mesh power mode, a promise to the
peer
– Peer mesh power mode, a promise by the
peer
Power modes of different mesh peerings are
independent from each other
Mesh STA may operate in Doze state (radio
off) only if no peering requires operation in
Awake state (radio on)
STA
L
STA
P
AP
STA
STA
M
M
AP
STA
STA
M
M P
STA
45
Mesh power modes
Mesh STAs communicate their mesh
power mode for each link:
– Active mode
 Mesh STA available at any time
– Light sleep mode
 Monitoring peer STA beacons
 Responsible to fetch buffered data
– Deep sleep mode
 Not monitoring peer STA beacons
 Not responsible for fetching buffered data
STA
L
STA
P
AP
STA
STA
M
M
AP
STA
STA
M
M P
STA
46
Link-specific mesh power modes
Mesh power mode can be set dynamically
“per link”
Weak link
M3
M4
Active mode
M1
Light sleep mode
M2
Safe link
STA
L
STA
P
AP
STA
STA
M
M
AP
STA
STA
M
M P
STA
M5
Deep sleep mode
47
Power save details
Going to active mode is safe
– Transmissions cannot be missed, i.e. signaling
is done with group- and individually-addressed
frames
Going to power save is less safe
– Transmissions may be missed if peer is
assumed to be available, i.e. individuallyaddressed frames are used
The service periods maintain power saving
devices available during the individually
addressed data transmission
STA
L
STA
P
AP
STA
STA
M
M
AP
STA
STA
M
M P
STA
48
Multi-hopping in the Mesh BSS
Topics in radio resource management
Wireless Mesh network = multi-hop topology
≠ master-slave topology
49
Radio resource management
Main challenges:
– Hidden node problem mitigation
– Distributed management
– Minimize and localize the effect of topology dynamics
Some topics from 802.11s radio resource management
– Robust neighbor discovery
– Distributed resource reservation
– Synchronization
STA
L
STA
P
AP
STA
STA
M
M
AP
STA
STA
M
M P
STA
50
Hidden node problem
Interference
STA2
STA1
STA4
STA3
MBCA  mitigates beacon collisions in 2 hop range
MCCA  enables distributed reservation access
STA
L
STA
P
AP
STA
STA
M
M
AP
STA
STA
M
M P
STA
51
Mesh Beacon Collision Avoidance (MBCA)
Beacon protection from hidden nodes
– Passive scan, power management, and
distributed reservation (MCCA) rely on Beacon
frames
– Need to protect from the interference from
hidden nodes
– MBCA provides a tool for the mitigation
– MBCA reports on Beacon frames even beyond
the MBSS
STA
L
STA
P
AP
STA
STA
M
M
AP
STA
STA
M
M P
STA
52
Distributed resource reservation (MCCA)
MCCA (MCF coordinated channel access) enables
allocation of deterministic channel time without
central coordinator
Deterministic channel access (i.e., TDMA type of
channel assignment) is more efficient in some
cases
OK. I am receiving traffic from
I will reserve channel for mesh
STA1 from 6am to 7am in my local
time. Please confirm if it is OK.
STA1
STA2
P
AP
STA
STA
M
M
AP
STA
STA
M
STA4
STA
L
STA
mesh STA4 from 7:30am to
9:30am. Please do not interfere.
M P
STA
STA3
53
Distributed resource reservation (MCCA)
After the negotiation process, orthogonal channel
time will be allocated for MCCAOP owner
DTIM Interval
(DTIM duration) / (MCCAOP
Periodicity)
Offset
t
MCCAOP
Duration
MCCAOP
of mesh STA k
STA
L
STA
P
AP
STA
STA
M
M
MCCAOP
of mesh STA n
AP
STA
STA
M
M P
STA
54
Synchronization
802.11s defines the default synchronization method
“Neighbor Offset Synchronization”
– Do not have “global timer” in the network
– Each node runs its own TSF timer and manages
the time differences between its neighbors
– Try to minimize the impact of topology changes
Time difference to
STA1: -09:15:15
STA3: +06:27:12
Time difference to
STA2: +09:15:15
STA2
Local time: 09:27:50am
STA1
Local time: 00:12:35am
STA
L
STA
P
AP
STA
STA
M
M
AP
STA
STA
M
M P
STA
Time difference to
STA2: -06:27:12
STA3
Local time: 03:55:02pm
55
MBSS with mesh gates
connected to external STAs
Proactive path selection
Mesh gate & proxy
6-address frame format
56
Proactive routing
A proactive routing functionality is necessary because
– Certain nodes are gateways to other networks and faster path
setup can be ensured
– Some nodes receive more traffic than others
Proactive routing is centered around a root node, which may (or may
not) be a mesh gate
Two methods are available:
Recall the PREQ:
•Broadcast propagation
•Unicast destination
Proactive PREQ
All reverse paths are established
with one PREQ message
– Broadcast propagation
– Broadcast destination
Forward path is established
(normally) with a PREP
– On-demand, or proactively
(configurable)
STA
L
STA
P
AP
STA
STA
M
M
AP
STA
STA
M
M P
STA
Proactive RANN
Reuses the PREQ messages
– Unicast propagation
– Unicast destination
A Root Announcement message
provides a set of candidate
paths
Reverse path is established
(normally) with a PREP
57
Forwarding
information
Proactive Path Request
Node A
C
Node C
Dest.
NH
M
Dest.
NH
M
R
R
1
R
R
1
Destination address
R
Node D
A
D
Node B
Dest.
NH
M
Dest.
NH
M
R
R
2
R
A
2
B
Next hop node
Node E
E
PREQ
Dest.
NH
M
R
D
2
reverse path
forward path is created as in reactive method
STA
L
STA
P
AP
STA
STA
M
M
AP
STA
STA
M
M P
STA
• on-demand (only when needed)
• immediately (proactive)
• configured at root mesh STA
R – Root
58
Proactive Root Annoucement
R
A
G
B
E
D
F
C
RANN
candidate path
STA
L
STA
P
AP
STA
STA
M
M
AP
STA
STA
M
M P
STA
No forwarding information
affected
R – Root
59
Unicast Path Request
T
A
O
B
E
D
F
C
PREQ
reverse path
PREP
forward path
STA
L
STA
P
AP
STA
STA
M
M
AP
STA
STA
M
O – Path Originator
T – Path Target
M P
STA
PREP method is
unchanged
60
Proxy
STAs that are outside the MBSS are reached
through a proxy Mesh STA (gate)
Proxy information is carried through PREQs
and PREPs
– The originator STA does not know whether the
target is inside or outside the MBSS until the
PREP is received
Proxy information can also be communicated
via Proxy Updates
STA
L
STA
P
AP
STA
STA
M
M
M
AP
STA
STA
M P
STA
61
Path Request with Proxy info
Node O
Dest.
Proxy
T
P
Intermediate nodes don’t
need to know about
external addresses
O
Node O
Dest.
NH
M
P
A
7
A
P
B
In the example, the reverse
path has already been
created
P
AP
STA
STA
E
D
reverse path
PREP
forward path
STA
M
M
M
F
C
PREQ
L
STA
T
AP
STA
STA
M P
STA
O – Path Originator
T – Path Target
P – Mesh Proxy
62
End to end 802 communication
SA
mesh SA
link
STA 33
Portal
Gate
Mesh
TA
mesh
link
STA 1
802.x LAN
Mesh
STA 4
RA
Mesh
mesh
link
STA 6
mesh DA
mesh
link
Mesh
DA
Gate
STA 2
mesh path
end to end 802 communication
Transmitter
Address
Mesh
STA 6
Mesh
STA 4
STA
L
STA
P
AP
STA
STA
M
M
M
AP
STA
STA
M P
STA
Mesh
Destination
Address
Mesh
STA 2
Mesh Source
Address
Mesh
STA 1
link
STA 22
infrastructure BSS
mesh BSS (MBSS)
Receiver
Address
AP
STA 17
Destination
Address
Source
Address
STA 22
STA 33
63
Wrap Up
64
û
The big
picture …
û
802.3
J
Gate C
Gatel B
Mesh STA C
Mesh STA B
802.3
Gate D
Internet
router
Mesh STA D
Mesh STA Y
Mesh STA E
SS B
Portal E
AP L
BSS
L
Mesh STA Y
SS A
A
B
Gate A
Mesh STA G
Mesh STA F
Mesh STA A
Mesh BSS
802.16
Mesh STA K
Mesh STA J
AP K
E
Mesh STA U
D
BSS K
Mesh STA W
Mesh STA V
802.11s Mesh Link (forwarding, may be part of a mesh path)
802.11s Mesh Link (non-forwarding)
P
AP
STA
STA
M
M
802.11 link within Basic Service Set (BSS)
STA
L
STA
Link released after transitioning to new location
AP
STA
STA
M
M P
STA
C
BSS
M
B
Mesh STA H
BS C
AP M
65
One broadcast domain
The 802.11s
mesh
appears as a
single,
logical
broadcast
domain
Support for
spanning
tree
guarantees
loop free
connectivity
with external
networks
û
AP
STA
STA
M
M
802.3
Mesh STA Y
SS B
Portal E
AP L
BSS
L
SS A
A
Mesh STA G
BS C
Mesh STA F
Mesh STA A
Mesh BSS
Mesh STA K
Mesh STA J
AP K
E
Mesh STA U
STA
STA
C
BSS
M
B
Gate A
802.16
AP M
B
Mesh STA H
D
BSS K
Mesh STA V
M P
Mesh STA E
Mesh STA Y
Mesh STA W
AP
Internet
router
Mesh STA D
STA
M
Mesh STA C
Gate D
STA
L
P
J
Gate C
Gatel B
Mesh STA B
–  Gates
B&C
blocked
STA
û
802.3
66
Transparent integration
Via Gate
D, 802.3
station J
integrates
transparently
with the
802.11s
mesh
û
Mesh STA C
802.3
Gate D
Mesh STA Y
SS B
BSS
L
A
Mesh STA G
BS C
STA
Mesh BSS
Mesh STA K
STA
STA
M
Mesh STA F
Mesh STA A
Mesh STA J
AP
M P
STA
C
BSS
M
B
Gate A
802.16
AP M
B
Mesh STA H
STA
M
M
Portal E
AP L
SS A
L
AP
Mesh STA E
Mesh STA Y
AP K
E
D
BSS K
Mesh STA V
STA
Internet
router
Mesh STA D
Mesh STA W
P
J
Gate C
Gatel B
Mesh STA B
Mesh STA U
STA
û
802.3
67
Works as Distribution System
Medium
The 802.11
concept relies
on a central AP
that forms a
Basic Service
Set (BSS)
Interconnected
by 802.11s &
802.3, stations
can transition
to and from
APs K, L & M
within BSSs K,
L & M,
respectively
STA
AP
STA
STA
M
M
M
û
802.3
J
Gate C
Gatel B
Mesh STA C
Mesh STA B
802.3
Gate D
Internet
router
Mesh STA D
Mesh STA Y
SS B
Mesh STA E
Portal E
AP L
BSS
L
Mesh STA Y
SS A
A
Mesh STA G
BS C
Mesh STA F
Mesh STA A
Mesh BSS
Mesh STA K
Mesh STA J
AP K
E
Mesh STA U
D
BSS K
Mesh STA W
Mesh STA V
AP
STA
STA
M P
STA
C
BSS
M
B
Gate A
802.16
AP M
B
Mesh STA H
STA
L
P
û
68
Mobility within the Mesh
û
802.11s
enables a
mobile Mesh
STA Y to
establish a
new mesh link
to Mesh STA C
and to release
mesh links to
Mesh STAs A
and H
û
802.3
J
Gate C
Gatel B
Mesh STA C
Mesh STA B
802.3
Gate D
Mesh STA Y
SS B
Mesh STA E
BSS
L
SS A
A
Mesh STA G
BS C
Mesh STA F
Mesh STA A
Mesh BSS
AP K
E
Mesh STA U
D
BSS K
Mesh STA W
Mesh STA V
STA
L
AP
STA
STA
M
M
AP
STA
STA
M
M P
STA
C
BSS
M
B
Gate A
802.16
AP M
B
Mesh STA H
Mesh STA K
P
Portal E
AP L
Mesh STA Y
Mesh STA J
STA
Internet
router
Mesh STA D
69
Mesh Networking
û
Owing to its
mesh
capabilities,
Mesh STA U
connects
simultaneously
to the printer
Mesh STA W,
the storage
device Mesh
STA V and
maintains
internet
connectivity via
Mesh STA J.
P
AP
STA
STA
M
M
AP
802.3
Internet
router
Mesh STA D
Mesh STA Y
SS B
Mesh STA E
Portal E
AP L
BSS
L
Mesh STA Y
SS A
A
Mesh STA G
BS C
Mesh STA F
Mesh STA A
Mesh BSS
Mesh STA K
Mesh STA J
AP K
E
Mesh STA U
D
BSS K
Mesh STA W
Mesh STA V
STA
C
BSS
M
B
Gate A
802.16
AP M
B
Mesh STA H
STA
M P
Mesh STA C
Gate D
STA
M
J
Gate C
Gatel B
Mesh STA B
STA
L
STA
û
802.3
However, as a non-forwarding
mesh device, it does not
interconnect Mesh STAs W, V and
J.
70
Transient Network
802.11s
mesh
integrates
with
other 802
networks
(802.3,
802.16
etc.)
û
Mesh STA C
802.3
Gate D
Mesh STA Y
SS B
AP
STA
STA
M
M
Portal E
AP L
BSS
L
SS A
A
Mesh STA G
BS C
Mesh STA F
Mesh STA A
Mesh BSS
Mesh STA K
Mesh STA J
AP K
E
Mesh STA U
AP
STA
M P
STA
C
BSS
M
B
Gate A
802.16
AP M
B
Mesh STA H
STA
M
Mesh STA E
Mesh STA Y
STA
L
Internet
router
Mesh STA D
D
BSS K
Mesh STA V
P
J
Gate C
Gatel B
Mesh STA B
Mesh STA W
STA
û
802.3
71
Conclusion
Transparent
integration of other
802 networks
Minimal manual
configuration
needed
No change to
802.11 hardware
– All-software
solution
STA
L
STA
P
AP
STA
STA
M
M
AP
STA
STA
M
M P
STA
Opens up new
markets
– Standardized range
extension
– Collaborative
networks
Truly ad hoc
Solves old
problems
– Peer-to-peer
– Authentication
Download