Professional Documents
Culture Documents
IEEE 802.11s Tutorial: Overview of The Amendment For Wireless Local Area Networking
IEEE 802.11s Tutorial: Overview of The Amendment For Wireless Local Area Networking
11s Tutorial
November 2006
November 2006
Key Contributors
Slide 2
November 2006
Abstract
Network communications with end devices is
increasingly wireless. Many standards for wireless
networking are now taking the next step to support mesh
architectures in which data is commonly forwarded on
paths consisting of multiple wireless hops .
This tutorial will explore the 802.11s amendment being
developed to add mesh capabilities to the wireless local
area networking (WLAN) standard.
Slide 3
November 2006
Outline
Slide 4
November 2006
Part 1: Overview
W. Steven Conner, Intel Corp.
802.11s Overview
802.11s Extensible Framework
Slide 5
November 2006
Slide 6
November 2006
AP
AP
AP
STA
STA
STA
= radio link
STA
AP
BSS = Basic
Service Set
STA
STA
STA
STA
November 2006
Mesh
AP
Mesh
AP
Mesh
Point
Mesh
AP
STA
STA
Mesh
AP
STA
= mesh radio
link
STA
STA
STA
STA
STA
Slide 8
November 2006
Why Mesh?
Whats so good about Mesh?
Slide 9
November 2006
Slide 10
November 2006
802.11s Scope
802.11s WLAN Mesh Networking
Integrates mesh networking services and protocols with 802.11 at the
MAC Layer
Primary Scope:
Amendment to IEEE 802.11 to create a Wireless Distribution System with
automatic topology learning and wireless path configuration
Small/medium mesh networks (~32 forwarding nodes) can be larger
Dynamic, radio-aware path selection in the mesh, enabling data delivery
on single-hop and multi-hop paths (unicast and broadcast/multicast)
Extensible to allow support for diverse applications and future innovation
Use 802.11i security or an extension thereof
Compatible with higher layer protocols (broadcast LAN metaphor)
Slide 11
November 2006
No Redesign of
Existing PHY
(.11a/b/g/n)
Slide 12
November 2006
Slide 13
November 2006
802.11s Standardization
Progress and Status
Slide 14
November 2006
Timeline:
Call for
Proposals
1H 2005
Downselection
and mergers
2H 2005
1H 2006
2H 2006
Mandatory Proposal
Joint SEE-Mesh/Wi-Mesh
Presentations
Proposal Confirmed (Mar 06)
Slide 15
Comment
resolution
1H 2007
Sponsor
Ballot
Target
2H 2007
802.11s
ratified
1H 08
1H 2008
November 2006
Evaluation documents
Informational documents
Slide 16
November 2006
Office
Campus/Public Access
Residential
Public Safety/Military
November 2006
Slide 18
November 2006
External Network
Mesh Portal
Mesh Point
Portal
MP
MP
AP
MP
Mesh AP
Station
MP
AP
STA
STA
STA
November 2006
802.11 Stations
Mesh
Points
Mesh
Access
Points
Slide 20
Access
Points
November 2006
November 2006
Each Mesh Point may have one or more logical radio interface:
Each logical interface on one (infrequently changing) RF channel, belongs to
one Unified Channel Graph
Each Unified Channel Graph shares a channel precedence value
Channel precedence indicator used to coalesce disjoint graphs and
support channel switching for DFS
Slide 22
November 2006
Slide 23
November 2006
Mesh Identifier:
WLANMesh_Home
Mesh Profile:
6
5
4
1
X
Capabilities:
Path Selection: distance vector, link state
Metrics: airtime, latency
November 2006
Slide 25
November 2006
802.11s Security
Objectives
Scope
Role Negotiation
Authentication
Key Management
Slide 26
November 2006
MP3
MP6
MP1
MP7
MP2
MP5
MP4
Wired backhaul
Slide 27
November 2006
Rationale
Current technology is not mature enough to address all
vulnerabilities from routing and forwarding
There are still research questions
Slide 28
November 2006
Transport Security
We need
Mutually authenticate neighbor MPs
Generate and manage session keys
and broadcast keys
Data confidentiality over a link
Detect message forgeries and replays
received on a link
Slide 29
November 2006
Slide 30
November 2006
Slide 31
November 2006
Role Negotiation
AS unreachable
AS reachable
Supplicant
Authenticator
AS reachable
AS reachable
Supplicant
Authenticator
Higher MAC address
Slide 32
November 2006
Slide 33
November 2006
Authenticator
Authentication Server
Slide 34
PMK distribution
November 2006
PMK-MA-n
Supplicant n
Authenticator
Slide 35
Authentication Server
PMKs generated in
previous authentications
(based on TGr key
hierarchy)
November 2006
Slide 36
November 2006
802.11s Routing
Slide 37
November 2006
Y
3
6
5
1
X
2
Z
Slide 38
November 2006
Extensibility framework allows any path selection metric (QoS, load balancing,
power-aware, etc)
Slide 39
November 2006
S
timeo
ut
Slide 40
Root
1
2
4
3
5
November 2006
Route Request
(broadcast/unicast)
Route Reply
(unicast)
Route Error
(broadcast)
November 2006
Route Discovery
Uses Expanding Ring Search to
limit the flood of routing packets
Reverse Paths are setup by Route
Request packets broadcast (or
unicast) from Originator
Forward Paths are setup by Route
Reply packet sent from destination
node or any intermediate node with
a valid route to the destination
S
timeout
Reverse Path
Formation
Forward Path
Formation
Figure From:
C. E. Perkins and E. M. Royer., Ad-hoc On-Demand Distance Vector Routing, Proceedings of the 2nd IEEE Workshop on Mobile
Computing Systems and Applications, New Orleans, LA, February 1999, pp. 90-100.
Slide 42
November 2006
Loop Freedom
All nodes in the network own and maintain a destination sequence
number which guarantees the loop-freedom of all routes towards
that node.
Slide 43
November 2006
Registration of subtrees by
MPs facilitates outward message
routing
Slide 44
November 2006
Root
Slide 45
November 2006
Extended with:
Use of a radio aware metric in MPR selection and routing path selection
Efficient association discovery and dissemination protocol to support
802.11 stations
Slide 46
November 2006
MPR
Central Node
1-hop neighbor
2-hop or farther
neighbor
Scope 2
Scope 1
November 2006
Slide 48
November 2006
802.11s Interworking
Approach
Slide 49
November 2006
11
12
14
13
802 LAN
802 LAN
7
2
Layer-2 Mesh
Slide 50
10
November 2006
802 MAC
Bridge
Relay
802.11s
MAC
(including
L2 routing)
1
14
802 LAN
11
Broadcast
LAN
5
Unicast delivery9
Broadcast
delivery
4
Multicast7 delivery
12
13
802 LAN
10
Layer-2 Mesh
November 2006
1
14
A.2
11
6
5
A.1
B.1
Destination
inside or outside
the Mesh?
B.2
12
4
7
15
10
id
s
t
ou
ins
ide
Slide 52
Portal(s)
forward
the message
Use path
to the
destination
13
November 2006
Interworking: MP view
1. Determine if the destination is inside or outside of
the Mesh
a. Leverage layer-2 mesh path discovery
Slide 53
November 2006
Slide 54
November 2006
4~16
0-tbd
Frame
Control
Dur
Address
1
Address
2
Address
3
Seq
Control
Address 4
Qos
Control
Mesh Header
Payload
RA
TA
DA
SA
FCS
Octets: 1
12
Mesh Flags
Time To
Live
Bit 0: Address
Extension (AE)
Address 5
(6 octets)
Mesh Header
Slide 55
Address 6
(6 octets)
November 2006
6-Address Scheme
To
DS
From
DS
AE
Flag
Address 1
Address 2
Address 3
Address 4
Address 5
Address 6
RA=DA
TA=SA
BSSID
N/A
N/P*
N/P
RA=DA
TA=BSSID
SA
N/A
N/P
N/P
RA=BSSID
TA=SA
DA
N/A
N/P
N/P
RA
TA
DA
SA
N/P
N/P
RA
TA
Mesh DA
Mesh SA
DA
SA
Frame Body
FCS
When the AE flag = 0, all fields have their existing meaning, and there exist no Address 5 and
Address 6 fields this assures compatibility with existing hardware and/or firmware.
Slide 56
November 2006
6-Address Scheme
Address Mapping Principle
MAP
link
MPP
MP
link
link
mesh path
End-to-end 802 communication
Slide 57
STA
link
November 2006
Address 2
Address 3
Address 4
MAP1
STA1
STA3
N/A
Address 1
Address 2
Address 3
Address 4
Address 5*
Address 6*
MP2
MAP1
MPP
MAP1
STA3
STA1
Address 1
Address 2
Address 3
Address 4
Address 5
Address 6
MPP
MP2
MPP
MAP1
STA3
STA1
DA
SA
STA3
MPP**
MAP1
MP2
MPP
STA3
November 2006
Address 2
Address 3
Address 4
Address 5
Address 6
MP2
MP1
ROOT
MP1
MP4
MP1
Address 1
Address 2
Address 3
Address 4
Address 5
Address 6
Root
MP2
ROOT
MP1
MP4
MP1
Address 1
Address 2
Address 3
Address 4
MP3
ROOT
MP4
MP1
Address 1
Address 2
Address 3
Address 4
MP4
MP3
MP4
MP1
MP2
Root
MP3
MP4
Slide 59
November 2006
Slide 60
November 2006
Mobility
awareness
Client stations
Network nodes
Dynamical Radio
Environment
Set of direct = Set of indirect
Neighbors
Neighbors
Exposed & Interference
Awareness
hidden nodes
needed
Mesh AP
Station
Portal
Mobile
Station
Slide 61
November 2006
802.11s MAC
Mandatory MAC Functions
Enhanced Distributed Channel Access (EDCA)
Re-use of latest MAC enhancements from 802.11 (i.e. 802.11e)
Compatibility with legacy devices
Easy to implement, providing reasonable efficiency in simple
Mesh WLAN deployments
November 2006
AC_BK
PIFS
SIFS
AC_VO
DATA
Busy
Wireless
Medium
Contention Window
(counted in slots)
defer access
SIFS
Slide 63
ACK
November 2006
Collision due to
contention based
access
Reserved by
device A
Reserved by
device B
Slide 64
November 2006
MDAOP Protocol
Setup Request
Unicast from a transmitter to a receiver using MDAOP Setup
Request Information Element (IE)
Setup Reply
Unicast from a receiver of Setup Request IE to the sender using the
MDAOP Setup Reply IE (Accept or Reject, possibly with reasons
and alternate suggestions)
MDAOP advertisements
MDAOP and other known busy times (e.g. HCCA, Beacons, etc.)
can be broadcast using MDAOP Advertisements IEs
MDAOP teardown
Either transmitter or receiver may indicate a teardown at any time by
transmitting an MDAOP Set Teardown IE
Slide 65
November 2006
MDAOP Operation
Nodes that own an MDAOP
Access the channel using MDA parameters for CWMin, CWMax,
and AIFSN
Send traffic for one TXOP
Use the same retransmit rules as common EDCA
Relinquish any remaining MDAOP time by sending CF-End or
QoS-Poll to self with zero duration
Slide 66
November 2006
Slide 67
November 2006
CCF Protocol
Simple RTX/CTX protocol
Using RTX, the transmitter suggests a destination channel
The receiver accepts/declines the suggested channel using CTX
After a successful RTX/CTX exchange, the transmitter and
receiver switch to the destination channel
Switching is limited to channels with little activity
November 2006
CCF Operation
Slide 69
November 2006
MP Power Management
Defines mechanisms to allow MPs being awake only for the portion of
time required for actual reception
Efficient use of more data bit and EOSP
Slide 70
November 2006
DTIM Interval
ATIM
window
Beacon
Slide 71
Time
November 2006
Synchronization
Many 802.11s MAC services rely on synchronization
High performance MAC schemes
Power saving
Slide 72
November 2006
Synchronization (1)
Offset: -03:20h
Local Mesh
TSF time: 18:20
11 12 1
2
10
9
3
8
4
7 6 5
Offset: +00:00h
Local Mesh
TSF time: 17:53
D must update
Offset: -03:55h
Local Mesh
TSF time: 11 12 1
2
17:53 910
3
Local offset, or
Local TSF time
11 12 1
2
10
9
3
8
4
7 6 5
Offset: -01:38h
Local Mesh
TSF time: 17:53
11 12 1
2
10
9
3
8
4
7 6 5
Slide 73
11 12 1
2
10
9
3
8
4
7 6 5
Offset: -01:47h
Local Mesh
TSF time: 16:17
7 6 5
November 2006
Synchronization (2)
Global Mesh DTIM Interval
Slide 74
Beacon
A
Beacon
C
Beacon
E
Beacon
B
Beacon
D
Beacon
E
Beacon
E
November 2006
Congestion Control
Mesh characteristics
Heterogeneous link capacities along the path of a flow
Traffic aggregation with multi-hop flows sharing intermediate links
7
6
Flow
Slide 75
November 2006
Slide 76
November 2006
Summary
Mesh Networking provides a number of benefits to
WLAN
Office
Campus/Public Access
Residential
Public Safety/Military
Slide 77
November 2006
Backup Materials
Slide 78
November 2006
Timeline:
Call for
Proposals
1H 2005
Downselection
and mergers
2H 2005
1H 2006
2H 2006
Mandatory Proposal
Joint SEE-Mesh/Wi-Mesh
Presentations
Proposal Confirmed (Mar 06)
Slide 79
Comment
resolution
1H 2007
Sponsor
Ballot
Target
2H 2007
802.11s
ratified
1H 08
1H 2008
November 2006
Slide 80
November 2006
MSDU
Source
MSDU
Dest
MAC SAP
MPDU
Mesh
Point
Mesh
Point
Mesh
Point
Mesh
Point
Mesh
Point
November 2006
Slide 82
November 2006
Airespider
ATR
BAE Systems
BelAir
Cisco Systems
ComNets
NTT DoCoMo
Firetide
Fujitsu
Hewlett Packard
Huawei
Intel
InterDigital
ITRI
Kiyon
Kyushu University
MITRE
Mitsubishi Electric
Motorola
NextHop
NICT
Nokia
Nortel
NRL
NTUST
Oki Electric
Slide 83
PacketHop
Philips
Qualcomm
Samsung
Siemens
Sony
STMicroelectronics
Swisscom
Texas Instruments
Thomson
Tropos
Wipro
November 2006
2.
3.
4.
5. A target configuration is up to
32 devices participating as AP
forwarders in the ESS Mesh.
6. The amendment shall utilize
IEEE 802.11i security
mechanisms, or an extension
thereof
7. [] in which all of the APs
are controlled by a single
logical administrative entity
for security.
8. The amendment shall allow
the use of one or more IEEE
802.11 radios on each AP in
the ESS Mesh.
Slide 84
November 2006
Slide 85
November 2006
Slide 86
November 2006
Campus / Community /
Public Access Usage Case
Seamless connectivity over large geographic areas.
Rapidly provide connectivity to locations where wired infrastructure is not
available or is cost prohibitive.
Lower cost / higher bandwidth alternative to traditional internet access
methods (dial up, cable, DSL, fiber).
Enable advanced applications/services through ubiquitous access & reliable
connectivity.
Enable location based services. Location information is particularly important
for public safety services.
University Campus
Community Area
Park Area
Slide 87
November 2006
Slide 88
November 2006
Slide 89
November 2006
X
1
1.
2.
3.
4.
6
5
3
7
10
4
8
On-demand path
Slide 90
November 2006
1.
2.
3.
4.
3
7
10
4
8
On-demand path
November 2006
Root
1.
2.
3.
4.
1
2
6
5
3
7
10
4
8
Proactive path
November 2006
4.
5.
Root
1
2
6
5
3
7
10
4
8
Proactive path
On-demand path