E S W M T: Merging Tandards For Ireless ESH Echnology
E S W M T: Merging Tandards For Ireless ESH Echnology
many wireless INTRODUCTION the way people acquire information and suc-
ceeded in creating a huge market, engineers are
A disruptive technology, wireless mesh network- now trying to weave another web, but one with-
technologies have in ing, is knocking on the doors of the communica- out threads. Although wireless mesh technology
tion industry. While this technology is not new is still in its infancy, its potential to likely trans-
part stimulated the conceptually, it was not until recently that form our world appears enormous. Some of the
development of researchers and enterprises, as well as con-
sumers, have begun to think of this technology
scenarios and applications where wireless mesh
technology is likely to provide a more versatile
wireless mesh as something over the next hill rather than pie in or affordable solution than other wired or wire-
the sky. Wireless networks have been making less technologies include, but are not limited to,
networks. The inroads into private residences, office buildings, the following:
universities, and other industrial and commercial • Extensive coverage areas, for example, offices,
driving force, venues around the globe in the past several campus networking, stadiums, or spanning a
years. This commercial success together with sprawling facility
however, comes some emerging wireless technologies, especially • Areas that are unwired, under-wired, or hard-
from the envisioned radio technologies, suggest it is now time for
wireless mesh networking to come into play.
to-wire, such as highways, conduits, golf cours-
es, or farmlands
advantages of Seeing its potential to reshape the landscape of • Emergency situations such as fire fighting, dis-
communications, major consumer-electronics aster recovery, and military operations.
wireless mesh companies as well as small startups are staking While a few companies have been rolling out
out this emerging technology and preparing for proprietary wireless mesh products for some
techniques the market to take off. time, the involvement of international standard
Both the wired Internet and the public groups, the major driving force behind various
themselves. switched telephone network (PSTN) are essen- technologies, has signaled the arrival of the wire-
tially mesh networks that have long been pre- less mesh era. As can be seen from Table 1,
sent. In stark contrast to the wired Internet and IEEE has been playing a key role in the devel-
THE MEDIUM ACCESS COORDINATION FUNCTION Mesh interworking with other 802 networks
The major components of the proposed 802.11s
Mesh
MCF are shown in Fig. 3. Built on top of the measurement
legacy physical layer specification, 802.11s shall Mesh topology Medium access
learning, routing and coordination
explicitly provide the WLAN mesh services. forwarding
These include topology learning, routing and
forwarding, medium access coordination, mesh
configuration and management, topology discov- Discovery and
ery and association, mesh measurement, inter- Mesh security association
working, and security functions [5].
For interworking of the WLAN mesh with 802.11 service
other networks, the IEEE 802.1D standard shall Mesh configuration and management
integration
be incorporated in the mesh portals (MPPs),
which define the interworking framework and
service access interface across all 802 standards. PHYs
Similarly, security architecture shall be based on
the IEEE 802.11i standard, which specifies secu-
rity features for all WLAN networks. In the fol- n Figure 3. Architecture for the 802.11s MCF sublayer.
lowing subsections, we describe only the major
services and functions germane to the mesh
capability. the 802.11-1999 specification [4], with two new
extensions for quality of service (QoS) and mesh
Mesh Topology Learning, Routing, and Forwarding — control. Upon receiving such frames, the MP
This service set focuses on the peer-to-peer dis- checks for its authenticity and its destination
covery of MPs. It enables automatic topology MAC address before forwarding. On arrival of
learning, establishes links, and eventually forms the 3-address frame in MAP from the associated
a dynamic data delivery path across the WLAN STA, the frame shall be converted to the 4-
mesh. address format and forwarded towards the desti-
Topology discovery and formation: A new nation. Similarly, forwarding of multicast and
node (a candidate MP) initially gathers informa- broadcast traffic is also supported if they are 4-
tion from neighboring MPs that belong to the address data frames from the known source. The
active WLAN mesh, by either the active scan- time-to-live subfield present in the data frame is
ning (i.e., sending probe messages) or the pas- decremented by every forwarding MP for con-
sive listening (i.e., receiving periodic beacons) trolling the broadcast traffic in the WLAN mesh.
mechanism. Based on factors such as peer capa-
bility, power saving capability, security informa- Medium Access Coordination — The medium access
tion, and link quality, two peers associate with coordination of the proposal [6, 7] is based on
each other, forming a partial or full mesh topol- the enhanced distributed channel access
ogy. (EDCA) mechanism used in 802.11e [8]. The
Path selection protocol: The MCF architec- proposed MAC mechanisms facilitate congestion
ture provides an extensible framework such that control, power saving, synchronization, and bea-
the enhanced routing protocols and metrics tai- con collision avoidance. Using the proposed
lored for particular applications can be imple- mechanisms, it shall be possible to enable multi-
mented and used as required. A layer-2 path ple channel operations in multiradio or single
selection protocol is supposed to handle unicast radio, as well as mixed, environments. The mul-
and broadcast/multicast data delivery in the tichannel MAC proposal is based on the com-
WLAN mesh. Since the network might have mon channel framework (CCF) [9], which is
both nonmobile and mobile MPs, a hybrid rout- compliant to the legacy channel access mecha-
ing protocol that includes both proactive and on- nisms. It is primarily designed for efficient use of
demand schemes is expected to be more suitable. link capacity by enabling multichannel opera-
Therefore, a hybrid scheme of using the ad hoc tions in nodes that are equipped with a single
on-demand distance vector (AODV) and the radio interface.
optimized link state routing (OLSR) protocol is
proposed to support wide range of application Mesh Configuration and Management — Self-configur-
scenarios [6,7]. In addition, radio-aware metrics ing paths and links offer one of the main advan-
that reflects actual link condition are proposed, tages of mesh networks. Since their deployment
thereby making the routing protocols more can be unmanaged, autonomic management
robust against link failures. For example, an air- modules are required for their continuous oper-
time metrics [6] reflects the cost of channel, ation. Protocols for association between MPs
path, and packet error rate. Similarly, another and the nodes outside the WLAN mesh can
metric named weighted radio and load aware minimize the burden of manual configuration
(WRALA) [7] is based on the protocol overhead for the service provider.
at the MAC and PHY layers, size of the frame, Mesh management ensures the smooth oper-
bit rate, link load, and error rate. ation of the network. Since any available MP
Forwarding scheme: WLAN mesh traffic con- can route packets, a failure of a particular
sists of 4-address data frames similar to that of device is not likely to affect the network as a
ZDO public
interfaces
ZigBee device object
Application Application (ZDO)
object 240 object 1
ZDO management
APSME-
Application support sublayer (APS)
SAP
APS security APS message Reflector
management broker management
plane
Security
service
provider NLDE-SAP
Network (NWK) layer
NLME-
SAP
NWK security NWK message Routing Network
management broker management management
MLDE-SAP MLME-SAP
Medium access control (MAC) layer
PD-SAP PLME-SAP
Physical (PHY) layer
2.4 GHz radio 868/915 MHz radio
[14] I. Chakeres and L. Klein-Berndt, “AODVjr, AODV Sim- module as well as the ZigBee network ns2 simulation mod-
plified,” ACM SIGMOBILE Mobile Comp. and Commun. ule. His research interests include wireless sensor networks
Rev., July 2002, pp. 100–101. and wireless mobile ad hoc networks, medium access con-
[15] C. Perkins, E. Belding-Royer, and S. Das, “Ad Hoc on trol, wireless mesh routing, cross-layer design, embedded
Demand Distance Vector (AODV) Routing,” IETF RFC system, network security, and IPv6 technologies.
3561, July 2003.
Y OUNG -B AE K O is currently an assistant professor in the
BIOGRAPHIES School of Information and Computer Engineering at Ajou
M YUNG J ONG L EE [SM] ([email protected]) received B.S. University, Korea, leading the Ubiquitous Networked Sys-
and M.S. degrees from Seoul National University, Korea, tems (UbiNeS) Laboratory. Prior to joining Ajou University
and a Ph.D. degree in electrical engineering from Columbia in 2002, he was with the IBM T. J. Watson Research Cen-
University, New York, in 1990. He is currently a professor ter, Hawthorne, New York, as a research staff member in
with the Department of Electrical Engineering of City Uni- the Department of Ubiquitous Networking and Security. He
versity of New York and the director of the SAIT–CUNY received his Ph.D. degree in computer science from Texas
Joint Laboratory. He has been a visiting professor to Telcor- A&M University, and B.S and M.B.A. degrees from Ajou
dia and Samsung AIT. His recent research interests are on University. His research interests are in the areas of mobile
various issues of wireless sensor/ad hoc networks. He has computing and wireless networking. In particular, he is
published more than 100 journal and conference papers, actively working on mobile ad hoc networks, wireless
and holds 20 U.S. and international patents (pending mesh/sensor networks, and various ubiquitous networked
included). He is the Chair of IEEE 802.15.5 WPAN Mesh system issues. He was the recipient of a Best Paper award
Task Group and Vice Chair of ZigBee NWG. He received the from ACM Mobicom 1998. He has served on the program
CUNY Excellence Performance Award in 1999 and the Best committees of several conferences and workshops. He also
Paper Award at IEEE CCNC 2005. serves on the editorial board of ACM Mobile Computing
and Communications Review. See http://uns.ajou.ac.kr/
JIANLIANG ZHENG received his B.S. degree in applied physics ~youngko for further details.
from Harbin University of Science and Technology in China,
his M.S. degree in physics from Shanghai Jiao Tong Univer- DEEPESH M. SHRESTHA ([email protected]) received his B.E
sity in China, and his Ph.D. degree in electrical engineering in computer engineering from Kathmandu University,
from the City University of New York. He has published six Nepal, and his M.E in computer science from BITS, Pilani,
journal papers and seven conference papers. He also holds India. He is currently a Ph.D. student in the Ubiquitous
five U.S. and international patents (pending). He has been Networked System Laboratory at Ajou University, Korea.
actively participating in international standardizations, such His research interests include routing and medium access
as IEEE 802.15.5 Mesh WPAN TG and ZigBee Alliance. He control protocol design for wireless mesh and sensor net-
contributed the IEEE 802.15.4 LR-WPAN ns2 simulation works.