Wireless 802.11s Mesh Networks, A Techno Commercial Overview
Wireless 802.11s Mesh Networks, A Techno Commercial Overview
CONTENTS
CONTENTS ..................................................................................................... 2 1.0. 2.0. ABSTRACT ............................................................................................. 3 INTRODUCTION ......................................................................................... 4
2.1. Potential for 802.11s Mesh Networks.......................................................................... 4 2.2. Why Mesh ........................................................................................................... 5 2.3. Typical Use Cases ................................................................................................. 6
3.0
3.1. How Mesh Networks Work ....................................................................................... 7 3.2. Topology and Discovery.......................................................................................... 9 3.3. Mesh Security ..................................................................................................10 3.4 Routing ..........................................................................................................11 3.5 MAC Extension.......................................................................................... ........12
4.0. TECHNICAL CHALLENGES FOR WIRELESS MESH NETWORKS ............................................... 13 5.0. CALSOFT EXPERTISE ..................................................................................... 15
5.1. Technology Expertise .......................................................................................... 15 5.2. Product Engineering Services ................................................................................. 16
Calsoft | Confidential
Page 2 of 16
1.0.
Abstract
The constant search for longer range and increased scalability has stretched traditional wireless networks to the point where they cannot handle new requirements posed on the system. To compete with wired communication alternatives, wireless LAN has been evolving for a decade. To address large deployment schemes over a large dispersed geographical area, a paradigm shift in the technology was needed. Wireless Mesh networks have emerged the answer to such challenging problems for people who stretch the limits of technology in a constant endeavor to come up with game changing solutions. Although Wireless mesh networks have been around for some time, it is only recently that they have moved from the periphery to occupy center stage. In last couple of years, we have seen rapid deployment of Wireless Mesh networks in a variety of areas, including large multistory building and even whole cities. The economics of a Wireless Mesh network can be summarized by the simple fact that while traditional wireless LAN can only cover an area of up to hundreds of meters, 802.11s Wireless Mesh network can cover tens of kilometers practically, and up to hundreds of kilometers theoretically. Given its greater mobility and scalability, Wireless Mesh networks are set to grow multifold in the market. According to ABI research, the Wireless Mesh market will achieve revenues in excess of $1.2 billion in 2010 alone. The same research claims that more than one million Wireless Mesh routers will be shipped in 2010. Industry estimates put the number of Wi-Fi chipsets in the market close to 500 million. These large numbers of chipsets that are already deployed can support wireless mesh without any hardware modification. Considering these factors, Wireless Mesh network appears to be the sole evolution path and is here to stay. This is further validated by industry acceptance and support.
Calsoft | Confidential
Page 3 of 16
2.0.
Introduction
Calsoft | Confidential
Page 5 of 16
Calsoft | Confidential
Page 6 of 16
As can be seen from this diagram, the architecture requires that APs have a wired connection. This wired connection, that takes the data from a station to the outside world and vice versa, is called a distribution system (DS). So the point here is that this architecture requires a wired Distribution System. Since DS is wired, the capacity of the deployment to offer greater range is limited because at some place in the path, it needs a wire. The effective coverage area is therefore restricted to the range that a single radio (AP) can offer.
Calsoft | Confidential
Page 7 of 16
The Wireless Mesh network offers a fundamentally different concept - Wireless Distribution System (WDS). The Distribution System that was wired in the traditional wireless LAN has been replaced with a Wireless Distribution system. This means that all the APs do not require a wired connection. They can act as a wireless forwarding node. Refer the figure below. This is almost the same wireless network that has been described in the first paragraph, but it looks a little messy. Thats what a Mesh network looks like. Here the 3 APs circled in green do not have a wired connection. They are merely talking to other APs and creating wireless links, depicted as thin, green, dotted lines. The inner oval shape represents the mesh ESS. These green links can carry the data from a station to its ultimate destination by using AIR as media, by forwarding the data to the next AP wirelessly which in turn takes the data to next AP and so on. This is the same hop-by-hop forwarding concept that powers the operation of internet.
This kind of self-organizing and self-configuring mesh is the fundamental concept of mesh networks. True, that at least one AP require a wired connection if data has to travel to the outside world. But notice that the range of the wireless network has been significantly expanded and does not depend on the coverage area of a single AP. Even stations that are far away from the wired connection can access the network as green
Calsoft | Confidential
Page 8 of 16
circled APs are acting on behalf of network to create a data forwarding path for the station. This is the basic working principle of 802.11s ESS Mesh networks.
Calsoft | Confidential
Page 9 of 16
Mesh points intending to join the mesh, first need to perform member discovery. Path selection is an important criterion if a mesh is to be viable. The following important questions must be kept in mind while designing a solution. How will MPs discover a candidate neighbor? In networking, frames are used to encapsulate data with the address of the receiver and other control information. Information Elements (IE), in 802.11 frames are used to communicate with other devices. New IEs have been introduced in Beacon frame, a frame which devices use to advertise their services, and in probe response frame, a frame devices use to answer queries from other devices. These are WLAN mesh capability element and an ESS Mesh name. How will mesh services be supported? Action Frames are a special class of frames that are used to initiate certain actions even after initial communication between devices. To support mesh services, new IEs are exchanged between MPs in Action frames. How will membership be determined? Secure peer-to-peer links has to be established. MPs authenticate each other before creating a link between them. How will different mesh running different protocols interoperate? There has to be one mandatory protocol running on a single mesh. MPs will have this information in the WLAN Mesh Capability IE. A mesh that is running a protocol other than the mandatory protocol is not required to change its protocol when a new MP joins.
Calsoft | Confidential
For authentication, both parties should agree on the role that they are going to perform. An initial negotiation lets them understand if they are acting as supplicant -providing credentials or as an authenticator -verifying credentials.
3.4. Routing : 802.11s is basically meant to extend the concept of the traditional,
less used, ad-hoc network. One important difference is that data packets may now travel to their ultimate destination through intermediate MPs. 802.11s gives a distribution system to ad-hoc networks. This brings an important question to the fore, how is an optimum and minimal path selected for packets to travel to their destination. This question brings the concept of Layer 3 routing to the domain of Layer 2. Ultimately both have to address same question, hop-by-hop traveling of packets. Here are the requirements placed on routing in a mesh networks: Routing should be able to optimize unicast frame delivery between MPs and Stations and Between MPs to MPs. Devices that are part of a mesh should be able to calculate the best path to reach a particular device. In typical mesh networks, with added mobility, link state may keep changing. Devices should be able to factor this in their calculation and should converge quickly when link state changes. Additionally routing can also support broadcast and multicast frame delivery. In 802.11s there is one mandatory protocol that has to be implemented. The standard also defines an optional protocol. The important routing protocols are: Hybrid Wireless Mesh Protocol (HWMP): This is the default protocol for interoperability. This is a combination of two different protocols. Radio Metric Ad-hoc on demand distance vector (RM-AODV): RMAODV uses the basic mandatory features of RFC 3561. Its appeal lies in the fact that destination in the mesh can be discovered when demand arises. It does not require devices to maintain routes to nodes that are no longer active. This way, mobile nodes obtain new routes quickly. This addresses the problem of Route maintenance and loop avoidance clearly. Proactive tree based routing: This exploits a logical tree like structure in a mesh deployment to provide routing functions. Its main function is topology creation and topology maintenance. If a route portal is present in the mesh, its first function is to create a distance vector routing tree and then maintain it. This is most efficient for hierarchical networks or a network that can be represented in a hierarchical form. It avoids unnecessary route discover flooding.
Page 11 of 16
Calsoft | Confidential
All in all, this protocol effectively merges the flexibility offered by RM-AODV and the efficiency offered by tree-based routing. This combination makes it suitable for deployment in a large number of use cases. Apart from the mandatory metric of Air time, it also allows any other path selection metric. Radio Aware Optimized link state routing protocol (RA-OLSR): This is an optional path selection protocol in mesh networks based on RFC -3626. The primary appeal of this scheme is that it proactively maintains link state and any change in the link state is communicated to the neighboring MPs. It uses Radio aware metric in path selection.
3.5. MAC extension: Mesh requirements like Mobility awareness and dynamic
radio environment puts a tremendous strain on basic 802.11 Medium Access Control (MAC), a low level fundamental data communication protocol. To solve the various problems pertaining to mesh, support has to be provided at the MAC level. Following are the functions that a 802.11s MAC is supposed to perform. Enhanced Distributed Channel Access (EDCA): Background EDCA mechanism is a QOS enhancement function introduced by 802.11e. It facilitates service differentiation in 802.11 networks by using four different channel Access functions executing four different back off counters. These four different back off counters, to large extent, ensure that the medium is shared based on the priority of the content thereby ensuring Quality of Service. Mesh Deterministic Access (MDA): The MAC enhancement MDA is a deterministic mechanism based on reservation. It facilitates Quality of Service (QOS) support in large scale mesh networks. It employs distributed scheduling to reduce the contention period for channel access. By operating in a synchronized manner it reduces collision. Power management: The traditional approach of power saving relies on beacon frames and on PS-Poll frames, a special class of frame to fetch data for sleeping station, to achieve power saving objectives. Though advanced PS options are being standardized, mesh reuses the same mechanism defined in BSS networks with some enhancements. Some new rules have been introduced and APSD (Automatic Power Save Delivery) is used. Congestion Control: A typical characteristic of a mesh is heterogeneous link capacities along the forwarding path as no restriction has been imposed on the link capacity. Traffic from many nodes may travel through same path, resulting in traffic aggregation. This introduces the problem of flow control in the network. As hop count increases, and if there is no congestion control mechanism, MPs that are located at the outer edge of the mesh will experience performance degradation and lower throughput. Congestion monitoring is the principle employed to handle this situation. MPs continuously monitor links and
Calsoft | Confidential Page 12 of 16
if they find a congestion they inform their neighbors. This way information about congestion is spread through out the mesh. Nodes will control the data generation rate, if this data has to travel through a congested path.
Calsoft | Confidential
Page 13 of 16
Mobility and Roaming: By definition, mesh devices can be mobile. If a mesh device situated in a data forwarding path, tries to move beyond the range of its neighbors, the link carrying the data through that path will be broken. This requires some kind of roaming support for MPs. If an MP moves beyond the range of a wireless forwarding path, other MPs should be able to sustain data flow. This requires a mesh device to inform its neighbors about its movement so they can start talking to each other or to some other device, which they can bring in the forwarding path to fill the gap caused by the moving device. The moving device may have some frames stored, that it was unable to forward. In this case, a mechanism is needed to forward these frames to its destination via a new forwarding path where the device has now moved to or through some default forwarding path. Quality of Service (QOS): In tradition wireless LAN, QOS comes into the picture between a station and an AP. So an AP has to reserve certain resources to guarantee QOS. When a station wants a certain quality such as voice, it informs the AP ahead of the actual data. If the AP can honor the request, it makes a reservation. In mesh, every forwarding node will halve the bandwidth because of half duplex communication. So QOS has to be maintained, not only between stations and an MAP but between MP and MP as well. This will require MPs to communicate with each other about the quality needs of the content before it arrives. If not properly designed, MPs can act as delay point that will destroy the concept of QOS. Fairness and uniform coverage: Devices that are lying at the outer edge of a mesh or that are located far away from a Mesh Portal can potentially be in a disadvantageous position. As every single hop reduces the bandwidth, outer devices will take longer to reach the network and will experience performance degradation as there is no differentiation between traffic from different nodes. To ensure uniform coverage in the mesh, some kind of fairness method is required. One possible approach is to compute the share of each device in the mesh capacity and then enforce it. If not properly designed, such outer devices may starve for network resources. Network Management: Network management also poses a challenge because of the mobile nature of mesh devices. Device failure can potentially go undetected because of the self-healing and self-organizing nature of the network. Mesh health has to be continuously monitored for efficient management. Another problem is to find rogue or intruder devices that can initiate Denial-of-Service (DOS) attacks making the mesh dysfunctional. These devices have to be identified in time and relevant measures have to be taken to prevent such attacks.
To address these challenges, the product team requires significant cross domain expertise, apart from superior engineering skills in architecting, developing and testing the products. Expertise in the following domains is essential:
Calsoft | Confidential Page 14 of 16
Wireless LAN (Wi-Fi): In-depth knowledge of 802.11 standards, general and complete picture of networking stack and their integration process. In-depth understanding of various 802.11 standard like 802.11 a,802.11b, 802.11g, 802.11n, 802.11h, MAC implementation and issues for these protocols. Security: Knowledge and working of various security protocols, frameworks and algorithms like WEP, WPA, 802.1x, WPA2-PSK and WPA-2 with External server. Routing and forwarding: In depth knowledge of networking and various layers, Layer 3 routing and implementations, Knowledge of networking devices like router, repeater, bridge, 802.1D etc. Innovative Solutions to Complex Engineering Problems: Expertise in proposing and implementing various components of the architecture that are not part of the standard but significantly enhance the working of the solution, like Access point load balancing, Preferred Channel selection algorithms and auto transmit power control. Expertise in off standard security paradigms like Rogue AP concept and ESS isolation. Expertise in MAC and proposed enhancements.
Overall, a technology like Wireless Mesh demands significant resources and poses significant challenges on the part of development to deliver a cost effective, scalable, secure and reliable product that can cater to the needs of the market.
Calsoft | Confidential
Page 15 of 16
Calsoft | Confidential
Page 16 of 16