IEEE 802.11s wireless mesh networks-Framework and challenges

发布时间:2021-10-14 09:13:29

Available online at www.sciencedirect.com

Ad Hoc Networks 6 (2008) 970–984 www.elsevier.com/locate/adhoc

IEEE 802.11s wireless mesh networks: Framework and challenges
Xudong Wang a,*, Azman O. Lim b
b

Kiyon, Inc., San Diego, CA 92121, United States National Institute of Information and Communication Technology, Kyoto, Japan Received 5 June 2007; accepted 11 September 2007 Available online 22 October 2007

a

Abstract Wireless mesh networking based on 802.11 wireless local area network (WLAN) has been actively explored for a few years. To improve the performance of WLAN mesh networks, a few new communication protocols have been developed in recent years. However, these solutions are usually proprietary and prevent WLAN mesh networks from interworking with each other. Thus, a standard becomes indispensable for WLAN mesh networks. To meet this need, an IEEE 802.11 task group, i.e., 802.11s, is specifying a standard for WLAN mesh networks. Although several standard drafts have been released by 802.11s, many issues still remain to be resolved. In order to understand what performance can be expected from the existing framework of 802.11s standard and what functionalities shall be added to 802.11s standard to improve performance, a detailed study on the existing 802.11s standard is given in this paper. The existing framework of 802.11s standard is ?rst presented, followed by pointing out the challenging research issues that still exist in the current 802.11 standard. The purpose of this paper is to motivate other researchers to develop new scalable protocols for 802.11 wireless mesh networks. ? 2007 Elsevier B.V. All rights reserved.
Keywords: Wireless mesh networks; IEEE 802.11s standard; Protocol; Layer-2 routing

1. Introduction In a traditional setup of 802.11 wireless LANs, basic service sets (BSSs) are connected via Ethernet LANs. Such a ?xed network architecture limits the ?exibility of network deployment and increases cost. Thus, the mobility of BSS and multihop networking are needed.
Corresponding author. Tel.: +1 425 442 5039. E-mail addresses: wxudong@ieee.org (X. Wang), aolim@ nict.go.jp (A.O. Lim).
*

Starting from the ?rst IEEE 802.11 standard, ad hoc networking has been speci?ed in the independent basic service set (IBSS) mode. In this mode, stations (STAs) can connect to each other without any central coordinator like access point (AP). Moreover, there is no access or connection to the distributed system (DS). Thus, STAs are totally self-contained as an ad hoc network. Such an operation mode has been researched in the ?eld of ad hoc networking. However, it has been realized for a long time, especially in industry, that the IBSS mode is not enough for many interesting application

1570-8705/$ - see front matter ? 2007 Elsevier B.V. All rights reserved. doi:10.1016/j.adhoc.2007.09.003

X. Wang, A.O. Lim / Ad Hoc Networks 6 (2008) 970–984

971

scenarios where ad hoc networking is needed but Internet access and support of client nodes are also necessary. Thus, both infrastructure mode and IBSS mode shall be integrated in a new type of multihop networks. To meet the above requirements, wireless mesh networking [1] is needed for 802.11 wireless networks. For years, many companies have developed their proprietary solutions to build 802.11 based wireless mesh networks (WMNs). Such solutions share the following common features:  The network usually includes three types of nodes: mesh routers, clients, and gateways.  An ad hoc routing protocol is implemented in mesh routers to work together with 802.11 MAC. Certain radio aware functions may be included in the routing protocol.  802.11 MAC driver is enhanced in mesh routers to improve multihop performance. Typical examples include ?ne-tuning CSMA/CA parameters, developing algorithms for multi-radio or directional antennas, etc.  Certain network con?gurations are needed to support client access, Internet access, roaming, and so on. In spite of the similarities, the proprietary solutions are usually not inter-operable. In order to resolve such an issue and meet the ever-increasing demands of 802.11 mesh networks, it is critical to develop a standard for 802.11 mesh networks. Before the establishment of the IEEE 802.11s task group, many companies had formed a study group to push a standard for 802.11 WMNs. At the beginning, many proposals were submitted to resolve di?erent issues involved in mesh networking. These proposals were ?nally consolidated and merged into one proposal in early 2006, which provides the basic framework for the current 802.11s standard draft. Since then the 802.11 task group has been working hard to resolve issues in the framework. Draft 1.0 of 802.11s standard released in November 2006 [2] went through a letter ballot, but it failed in this process because many issues still remain. Currently participants of 802.11s task group are working actively to resolve comments raised by 802.11 voters. Although a lot of progress has been made and a few new drafts have been released recently, there exist many issues that demand enhanced or even new solutions to 802.11s mesh networking. Otherwise, performance of 802.11s WMNs can be unsatisfactory. However,

to the best of our knowledge, there is no sign that the 802.11s task group is taking the challenge of enhancing adopted solutions or developing new solutions for 802.11s mesh networking. Without putting e?orts along this direction, it is quite possible that voters will continue to raise comments and fail the letter ballot. Consequently, the releasing date of an o?cial 802.11s standard becomes unpredictable. More importantly, even if an o?cial standard is released someday, its mediocre performance will prevent it from surviving in a competitive market with so many alternative mesh networking technologies. In this article we give a detailed analysis of 802.11s framework. Firstly, the major functionalities of 802.11s WMNs are presented. We then point out the gap between these functionalities and those required by a scalable WMN. Our aim is to provide a better understanding of the following questions for the emerging 802.11s standard: what performance can be expected from 802.11s WMNs, what problems still exist in 802.11s WMNs, and what direction can be taken to improve 802.11s mesh networking. We hope our analysis will stimulate the development of scalable mesh networking protocols that can lead to expedited standardization of 802.11s WMNs with scalable network performance.

2. Network architecture of 802.11s WMNs In order to understand the network architecture of 802.11s, we ?rst need to explain 802.11 extended service set (ESS) and its di?erence from IBSS. An 802.11 ESS consists of multiple BSSs connected through a DS and integrated with wired LANs [3]. The DS service (DSS) is provided by the DS for transporting MAC service data units (MSDUs) between APs, between APs and portals, and between stations within the same BSS that choose to involve DSS. The portal is a logical point for letting MSDUs from a non-802.11 LAN to enter the DS. The ESS appears as single BSS to the logical link control layer at any station associated with one of the BSSs. The 802.11 standard has pointed out the di?erence between IBSS and ESS. IBSS actually has one BSS and does not contain a portal or an integrated wired LANs since no physical DS is available. Thus, an IBSS cannot meet the needs of client support or Internet access, while the ESS architecture can. However, IBSS has its advantage of self-con?guration and ad hoc networking. Thus, it is a good strategy to develop schemes to combine

972

X. Wang, A.O. Lim / Ad Hoc Networks 6 (2008) 970–984
External Network

Portal MPP MP

MP

MP MP MAP MP MAP AP MP STA STA STA STA STA Mesh link BSS link MP STA AP

Fig. 1. Network architecture of 802.11s meshed wireless LANs.

the advantages of ESS and IBSS. The solution being speci?ed by IEEE 802.11s is one of such schemes. In 802.11s, a meshed wireless LAN is formed via ESS mesh networking. In other words, BSSs in the DS do not need to be connected by wired LANs. Instead, they are connected via wireless mesh networking possibly with multiple hops in between. Portals are still needed to interconnect 802.11 wireless LANs and wired LANs. Based on such a concept, the network architecture of 802.11s is illustrated in Fig. 1. There are three new nodes in this architecture. A mesh point (MP) is an 802.11 entity that can support wireless LAN mesh services. A mesh access point (MAP) is an MP but can also work as an access point. A mesh portal (MPP) is a logical point where MSDUs enter/exit the mesh network from/to other networks such as a traditional 802.11 LAN or a non-802.11 network. An MPP includes the functionality of MP and can be co-located with an 802.11 portal. Because MPs do not have AP functionality but can work as relaying nodes, the meshed wireless LAN is not an ESS anymore. Thus, in a recent 802.11 standard meeting, suggestion of changing the project authorization request (PAR) of 802.11s was made so that the title of 802.11s will be just ‘‘Mesh Networking” rather than ‘‘ESS Mesh Networking”. The protocol stacks of these three types of nodes are illustrated in Fig. 2. The 802.11s MAC is devel-

oped based on existing 802.11 MAC, and the mesh routing protocol resides in the MAC layer. In an MPP, a layer-3 routing protocol is also needed for path selection from the mesh network to external network or vice versa. 3. Framework of 802.11s WMNs The upcoming 802.11s standard includes the following critical components:  Topology formation and discovery: This includes the speci?cations of how a mesh network is created and how other mesh nodes1 join or leave the network. Both single-channel or multi-channel operations shall be supported.  Routing in the MAC layer: Since the routing protocol is speci?ed in the MAC layer, MAC address routing is needed and shall be radio aware. In addition, support of legacy nodes needs to be speci?ed in the routing framework.  MAC: Many functionalities need to be speci?ed for the MAC protocol, including MAC enhancement, MAC layer congestion control, power management, multi-channel operation, synchronization, and so on.

1

A mesh node can be either an MP or a MAP.

X. Wang, A.O. Lim / Ad Hoc Networks 6 (2008) 970–984

973

MPP
Layer 3 Routing Bridge 802 MAC 802 PHY 802.11s MAC

MP
802.11 PHY 802.11s MAC

802.11 PHY

MP
802.11s MAC

MAP
802.11 PHY 802.11 MAC 802.11s MAC

802.11 PHY

Fig. 2. Protocol stack of 802.11s.

 Interworking: Mechanisms for interconnecting the mesh network with other wired or wireless networks shall be speci?ed.  Security: Secure links shall be maintained among mesh nodes as well as between mesh nodes and legacy nodes. To support these new functionalities, the frame format must be extended for mesh operation. This includes adding new information elements to the existing frames and also de?ning new frames. 3.1. Topology formation and discovery 1. Discovery and formation of mesh networks: When a new mesh node powers up, it may use passive or active scanning to discover a mesh network. In 802.11s, a new ID, called mesh ID, is used to identify a mesh network. The mesh ID is attached in beacon and probe response frames as a new information element for passive and active scanning, respectively.

The function of mesh ID is similar to SSID, but SSID cannot be used for identifying a mesh network. One of the reasons is that the mesh ID can prevent STAs from being associated with MPs without AP functionality. For the same reason, for a non-AP MP the beacon should not include a valid SSID or a wildcard value is used for SSID information element in the beacon. Before a new mesh node associated with a mesh network identi?ed by a mesh ID, it needs to check if its mesh pro?le matches the established mesh network. In 802.11s, each mesh device must support at least one mesh pro?le consisting of a mesh ID, a path selection protocol identi?er, and a path selection metric identi?er. If such mesh capability information in a mesh node matches that of an established mesh network, it will start association. Security procedures is also involved in this association process. If a new mesh node cannot ?nd an established mesh network, it needs to create a mesh network.

974

X. Wang, A.O. Lim / Ad Hoc Networks 6 (2008) 970–984

2. Mesh peer link establishment: Once a mesh node has joined a mesh network, it needs to establish peer links with its neighbors before it can start send packets. In 802.11s, state machines and detailed procedures have been speci?ed for setting up peer links. Once this step is completed, it is also necessary to establish a measure of link quality for each peer link. This requires a link quality measurement scheme and a procedure of propagating such information among neighbors. When it is necessary, a procedure to ensure symmetrical link quality information is needed. It should be noted that the link quality information of each peer link is also used as one of the routing metrics for the routing protocol. 3. Multi-channel topology formation: In the singlechannel mode, a mesh node selects one channel during the discovery process. In the multi-channel case, a mesh node with multiple radios needs to select a di?erent channel for each radio, while a mesh node with single-radio has to switch channels. In order to manage the topology in a multi-channel mesh network, a uni?ed channel graph (UCG) concept is adopted. In the same UCG, all mesh devices2 are interconnected using one common channel. As a result, in a single-channel mesh network, the entire network has only one UCG. For a multi-channel WMN, it may consist of multiple UCGs depending on network selforganization. To coordinate di?erent UCGs, a channel precedence value is attached in mesh channel switch announcement element for coalescing or switching channels in UCGs. In the same UCG, the channel precedence value is the same for all mesh devices, but it must be di?erent in di?erent UCGs. A simple channel uni?cation protocol and a simple channel graph switching protocol are speci?ed in the current 802.11s standard draft. However, such mechanisms are only applicable to simple scenarios where only slow channel switching is demanded. If dynamic and fast channel switching is needed, the UCG concept and its supporting procedures in the current 802.11s draft is insu?cient.

3.2. Routing in the MAC layer It is a widely accepted concept that it is bene?cial to have layer-2 routing for WMNs. However, IEEE 802.11s is probably the ?rst standard that actually speci?es routing in the MAC layer. Among many other reasons, interoperability is the most obvious motivation to do so. Previously many proprietary 802.11 mesh networks are built using di?erent routing protocols, which result in di?culty of interoperation. In 802.11s, the framework for routing is extensible. More speci?cally, di?erent routing protocols can be supported by following the same framework, but the mandatory protocol shall be implemented for interoperability. The routing mechanism in 802.11s handles packet forwarding for MPs, MAPs, and associated STAs. Unicast, multicast, and broadcast frames are all supported in the same framework. Since routing is performed in the MAC layer, packet forwarding is carried out via MAC addresses, which requires the MAC header contains at least four MAC addresses. Compared to a conventional MAC protocol, two additional MAC addresses are required for the MAC addresses of the source and the destination of an end-to-end tra?c ?ow. In a routing protocol, nodes usually need to exchange routing messages for the purpose of ?nding link status, collecting neighbor information, requesting routing path, and so on. Thus, many control messages are involved. In 802.11s, such messages are sent in various mesh action frames as information elements. Before draft 1.06 of 802.11s, one mandatory routing protocol and one optional routing protocol have been speci?ed. The mandatory routing protocol is called hybrid wireless mesh protocol (HWMP), which is a hybrid routing protocol of on-demand routing and proactive tree-based routing. The optional routing protocol is based on link state routing and is called radio aware optimized link state routing (RA-OLSR). Starting from draft 1.07, the optional routing protocol is removed from 802.11s. 1. HWMP: The network infrastructure of 802.11 WMNs tends to have minimal mobility and most of the tra?c is to/from the Internet. However, some nodes such as handset devices, laptops, etc. can be an MP but de?nitely need mobility support. In order to meet diverse requirements

A mesh device is a radio that is capable of mesh networking. For a single-radio mesh node, it is also a mesh device. A multiradio mesh node can have multiple mesh devices each working in di?erent UCGs.

2

X. Wang, A.O. Lim / Ad Hoc Networks 6 (2008) 970–984

975

by making the routing protocol be e?cient for di?erent scenarios, HWMP is being speci?ed in 802.11s. In HWMP, on-demand routing protocol is adopted for mesh nodes that experience a changing environment, while proactive treebased routing protocol is an e?cient choice for mesh nodes in a ?xed network topology. In this routing protocol, the mandatory routing metric is airtime cost that measures the quality of links. The extensible framework supports other types of metrics such as QoS parameters, tra?c load, power consumption, and so on. However, in the same mesh only one metric shall be used. The on-demand routing protocol is speci?ed based on radio-metric ad hoc on-demand distance vector (AODV) routing. The basic features of AODV [5] are adopted, but extensions are made for 802.11s. The proactive tree-based routing is applied when a root node is con?gured in the mesh network. With this root, a distance vector tree can be built and maintained for other nodes, which can avoid unnecessary routing overhead for routing path discovery and recovery. It should be noted that the on-demand routing and tree-based routing can run simultaneously. Four information elements are speci?ed for HWMP: root announcement (RANN), path request (PREQ), path reply (PREP), and path error (PERR). Except for PERR, all other information elements of HWMP contain three important ?elds: destination sequence number (DSN), time-to-live (TTL), and metric. DSN and TTL can prevent the counting to in?nity problem, and the metric ?eld helps to ?nd a better routing path than just using hop count. In the on-demand routing mode, an PREQ is broadcast by a source MP with an aim to set up a path to a destination MP. When an intermediate MP receives this element, it creates/updates a path to the source if the sequence number of the PREQ is greater than the previous one or the sequence number is the same but the metric is better. If the intermediate MP has no path to the destination MP, it just forwards the PREQ element further. Otherwise, there have di?erent cases depending on two ?ags, i.e., destinationonly (DO) ?ag and reply-and-forward (RF) ?ag: 1. The DO ?ag is set to 1. This is a default case. The intermediate MP does nothing but just forwards the PREQ to the next-hop MP until the destination MP. Once the destination MP

gets this element, it sends a unicast PREP back to the source MP. All intermediate MPs create a route to the destination MP when receiving this PREP element. Thus, in this case the routing protocol just ignores the existing route from the intermediate MP to the destination MP and creates a new one. The RF ?ag has no e?ect on the routing protocol in this case. 2. Both ?ags are set to 0. In this case the intermediate MP sends a unicast PREP to the source MP and does not forward PREQ. Thus, the routing protocol uses the existing route from the intermediate MP to the destination MP. 3. The DO ?ag is set 0 but the RF ?ag is set to 1. In this case the intermediate MP sends a unicast PREP to the source MP; additionally, it needs to change the DO ?ag to 1 and then forwards the PREQ element to the destination MP. By doing so, all the subsequent intermediate MPs will not send PREP elements to the source MP. In maintenance PREQ, the DO ?ag is always set to 1, i.e., the ?rst case must be used. It should be noted that the third case exists only when the source MP has no valid route and also wants to create a new route to the destination MP. The di?erence between the second case and the third one is that the third case cannot only quickly set up a routing path via an intermediate MP but can also create a new path from the intermediate MP to the destination MP. As we can see, the above procedures are di?erent from the original AODV protocol and are designed speci?cally for HWMP. In the proactive tree-based routing mode, there are two mechanisms. One is based on proactive PREQ and the other is based on proactive RANN. In the proactive PREQ mechanism, the root node 3 periodically broadcasts an PREQ element. An MP in the network receiving the PREQ creates/updates the path to the root, records the metric and hop count to the root, updates the PREQ with such information, and then forwards PREQ. Thus, the presence of the root and the distance vector to the root can be disseminated to all MPs in the mesh. If the proactive PREP bit in the proactive PREQ element is set to 1,

The root node can be an MP, MAP, or MPP for proactive RANN, and can be either an MP or a MAP for proactive PREQ.

3

976

X. Wang, A.O. Lim / Ad Hoc Networks 6 (2008) 970–984

then the receiving MP sends a gratuitous PREP to the root so that a route from the root to this MP is established. On the other hand, if the proactive PREP bit is set to 0, the gratuitous PREP is sent only when there is data to send between the MP and the root with a bidirectional route. In the proactive RANN mechanism, the root node periodically ?ood an RANN element into the network. When an MP receives the RANN and also needs to create/refresh a route to the root, it sends a unicast PREQ to the root. When the root receives this unicast PREQ, it replies with a PREP to the MP. Thus, the unicast PREQ forms the reverse route from the root to the originating MP, while the unicast PREP creates the forward route from the originating MP to the root. 2. RA-OLSR: RA-OLSR is a proactive link state routing protocol that is developed based on OLSR [4]. However, in order to reduce ?ooding overhead, several extensions are made. Firstly, only a subset of one-hop neighbors of an MP is selected to relay control messages. Such neighbor MPs are called multipoint relays (MPRs). The MPRs are selected such that control messages relayed by them can reach all two-hop neighbors of the selecting MP. The MPR selection is performed through periodic HELLO messages between MPs. In addition, the message exchange frequency can be controlled based on ?sheye scopes as de?ned in ?sheye state routing protocol [6]. Secondly, to provide shortest routes, RAOLSR requires only partial link state information to be ?ooded. The minimum set of links consists of those between the MPRs and their selectors. Since RA-OLSR continuously maintains routes to all destinations in the network, it is specially bene?cial when source–destination pairs are very dynamic or the mesh network is large and dense. RA-OLSR is a distributed protocol, without a requirement of reliable delivery of control messages. It can also support both single-interface or multiple-interface MPs. The mechanisms for supporting non-mesh STAs are speci?ed for RA-OLSR. However, the overhead of these mechanisms are still extremely high, in particular when the number of STAs is large. 3. Support of legacy nodes: For packets transmitted between legacy nodes via a WMN, the routing protocol inside the mesh needs the source MAC

and the destination MAC addresses of a legacy node. Based on such MAC addresses, a MAC can ?nd the right legacy node for each packet. Thus, two additional MAC addresses are added into the MAC header, as speci?ed in the 6address mechanism in 802.11s. However, each MAP needs to store the MAC addresses of all legacy nodes including those associated with other MAPs. In this way, a MAP can correctly ?nd out what is the MAC address of the given destination legacy nodes. In HWMP of 802.11s, the MAC addresses of legacy nodes can be sent in proxied MAC address ?elds of PREQ, PREP, and proxy update (PU) information elements. 3.3. MAC The basic operation mechanism of 802.11s MAC is the enhanced distributed channel access (EDCA) speci?ed in 802.11e. Other features of 802.11e such as hybrid coordination function controlled channel access (HCCA) are not considered in 802.11s. In this sense, the QoS of 802.11s in its current form is still far from enough for many multimedia services. Moreover, EDCA does not work well for mesh networks, since its prioritization mechanism does not perform well in a multihop mesh environment. Nevertheless, the current 802.11s MAC protocol is built on top of EDCA with various enhancements. 1. Beaconing and synchronization: Beaconing procedures for unsynchronizing and synchronizing MPs are de?ned in 802.11s. A mechanism to avoid beacon collisions is also speci?ed in the mesh beacon collision avoidance (MBCA) mechanism. Also, an MP can be designated as a beacon broadcaster for a de?ned period of time while all other MPs defer their transmission of beacons. Based on beacon or probe response frames, synchronization is performed for MPs. In 802.11s, the synchronization is similar to the timing synchronization function (TSF) of the original 802.11 standard [7]. The di?erences are two folds. One is that the MPs are not all synchronized and their beacon intervals are not necessarily the same. The other is that not only a TSF timer but also an o?set is needed for synchronization. Whether or not an MP supports synchronization is identi?ed by synchronization capability ?eld of the WLAN mesh capability information element.

X. Wang, A.O. Lim / Ad Hoc Networks 6 (2008) 970–984

977

When an MP does not need synchronization, it maintains its own TSF timer and does not update it when receiving beacons or probe responses. However, for an synchronizing MP, it needs to maintain a mesh TSF time that is common to all synchronizing MPs. The mesh TSF time is equal to the sum of the TSF timer and the o?set on the synchronizing MP. Because of using the o?set, the TSF timers of synchronized MPs can be di?erent. On the other hand, when receiving beacons or probe responses that contains the sender’s TSF timer and the o?set, an MP follows a synchronization procedure similar to that for IBSS mode of 802.11 networks. More speci?cally, the MP performs the following calculation: Calculated time stamp ? received TSF value ? received offset ? the MP’s own offset: If the calculated time stamp is later (or faster) than the MP’s local TSF value, then the TSF timer is updated with this calculated time stamp. Otherwise, this step is ignored. Optionally, the MP can update its o?set rather than the TSF timer as follows. If the sum of the received TSF value and the received o?set is larger than the sum of the MP’s TSF value and self o?set, then the self o?set is updated as follows: The MP’s new offset ? received TSF value ? received offset ? the MP’s TSF value: Otherwise, no updating is needed. It should be noted that updating TSF timer and updating o?set cannot be used at the same time. 2. Multi-channel operation: Multi-channel operation is so important to WMNs. However, no mechanism has been speci?ed in 802.11s. In the beginning, a proposal called common channel framework (CCF) was adopted into earlier versions of the draft (before draft 1.0). However, because of many problems that were not resolved e?ectively, the proposal was removed from the draft. Nevertheless we still introduce the mechanism of CCF here. In CCF, mesh nodes that want to use multi-channel operation need to negotiate its channel in a common channel. Thus, the common channel is known to all mesh nodes in the mesh network.

A transmitter ?rst sends an request to switch (RTX) message to request a channel. The receiver sends back a clear to switch (CTX) to con?rm the requested channel. If RTX–CTX is successful, then a channel is selected for these two mesh nodes. Thus, both mesh nodes switch to the selected channel and exchange data following the data/acknowledgment procedure. Once this step is done, both mesh nodes switch back to the common channel. Such a mechanism is applied to all mesh nodes that can support CCF. In the common channel, in addition to RTX–CTX messages, packets for nodes that do not support CCF can be sent. The major problems of CCF are discussed in Section 4. 3. Mesh deterministic access: The mesh deterministic access (MDA) mechanism allows MPs to access a certain period with lower contention than other periods without using MDA. Such a period is called MDA opportunity (MDAOP). Before using MDAOP to access the medium, the owner of this MDAOP, i.e., the transmitter needs to set up the MDAOP with its receiver. In a multihop network, the interference between nodes that are more than one hop away should be considered. Thus, in the MDA mechanism, two types of time periods are de?ned. The neighborhood MDAOP times of an MP are the transmitting/receiving (RX/TX) times during which the MP and its neighbors are either a transmitter or receiver of these MDAOPs. The neighborhood MDAOP times during which the MP is not a transmitter or receiver are called neighbor MDAOP interfering times. No MDAOP can be set up with this MP during such interfering times; otherwise, the MDAOP for this MP will experience interference. When a transmitter wants to set up a new MDAOP to an intended receiver, it needs to check its neighborhood MDAOP times, the TX–RX times of its frames, and the neighbor MDAOP interfering times for the intended receiver. If no overlapping occurs and the MDA limit is not reached, then the transmitter sends an MDAOP setup request to the receiver. The receiver will do the same check. If the check is passed, the receiver accepts the MDAOP; otherwise, it rejects. Once the MDAOP is setup, both the transmitter and the receiver will start to advertise their new MDAOP time in the MDAOP advertisement information element. Both the transmitter and the receiver can initiate the teardown

978

X. Wang, A.O. Lim / Ad Hoc Networks 6 (2008) 970–984

process to release the MDAOP time period. The teardown is complete once the initiator is acknowledged by the receiver. During an MDAOP period, the transmitter and the receiver follow a di?erent procedure. If this period is accessed by the transmitter, i.e., the owner of MDAOP, it attempts to use CSMA/ CA but new backo? parameters (e.g. MAD maximum contention window MDACWmax, MDA minimum contention window MDACWmin, and MDA arbitration interframe space number MDAIFSN) to set up a TXOP. However, for a non-owner of the TXOP, it has to defer its access by setting its network allocation vector (NAV) to the end of the MDOAP or using a carrier sensing scheme. 4. Intra-mesh congestion control: An 802.11 mesh usually involves multiple hops. The transmission of one hop may impact its previous hop, the next hops, or any links in the neighbors. One problem from such an interaction is that links may be congested, and thus a node with congested links may receive more packets than that can be sent out. The transport layer protocol such as TCP can help mitigate this problem, but research has shown that it is not e?ective enough in a wireless multihop network. On the other hand, contention resolution can also help reduce congestion. However, in a WMN the contention level experienced by di?erent nodes varies, which makes a contention resolution protocol ine?ective. To resolve congestion in the MAC layer, an intramesh congestion mechanism is speci?ed in 802.11s. The intra-mesh congestion control is a hop-byhop scheme. Nodes in the neighbor need to exchange congestion information and control message in order to resolve congestion in the network. Thus, the scheme consists of three modules: local congestion monitoring, congestion control signaling, and local rate control. In the current draft of 802.11s, some local congestion monitoring schemes are suggested. For example, congestion can be monitored by comparing the transmitting rate and the receiving rate of packets that need to be forwarded. Queue size can also be used to monitor congestion. Once congestion is detected, the congested node will inform its previous hop nodes by sending a unicast congestion control request message in the mesh action frame. The node that receives this message shall adjust its transmission rate accord-

ing the local rate control algorithm. The congested node also send a broadcast message neighborhood congestion announcement to all its neighbors so that neighbors also regulate their transmission rate. Congestion control signaling can be triggered periodically or non-periodically. In either case, in order to carry out local rate control, the target rate must be computed by the congested node and sent to the upstream node. The target rate is computed for each tra?c category as de?ned in 802.11e rather than one link. Such information is attached as an information element in the congestion control request message. When the upstream node receives the congestion control message, it controls its transmission rate according to the target rate to the congested node. The upstream node shall also send a congestion control response message to tell the congested node about its o?er tra?c load. The local rate control at node when receiving the neighborhood congestion announcement has not been discussed in 802.11s. Although congestion control can help improve the mesh network performance, unfortunately the critical part of this mechanism such as target rate computation and local rate control have not been clearly speci?ed yet; only simple conceptual discussions are available in the draft of 802.11s. 5. Power management: Many nodes in 802.11s mesh networks always work in an active state since they either need to be an AP or forward tra?c for other nodes. However, there are still other nodes that need to work in power save mode. Typically these nodes are the lightweight MPs or MPs that do not forward tra?c for other nodes. Of course, STAs associated with a MAP may also work in power save mode, but the mechanism for these nodes is the same as that in the original 802.11 standards and is thus out of scope of 802.11s standard. For a lightweight MP, it needs to check if its neighbors can also be in power save mode. If the answer is negative, it may choose to enter power save mode or communicate with neighbors without entering power save mode. In the former case, the MP may not be able to communicate with nodes that do not support power save mode. Thus, whether or not a lightweight MP goes into power save mode is determined by considering the tradeo? between power and communication constraints. In some cases, a lightweight MP

X. Wang, A.O. Lim / Ad Hoc Networks 6 (2008) 970–984

979

can just operate as a STA, so its power management is carried out through an AP. However, mostly the power management can be done via an announcement tra?c indication message (ATIM) based mechanism. In the ATIM-window based power management scheme, an MP works in two states: doze or wake state. The MP in power save mode needs to wake up during the ATIM window to receive or send control messages including beacons. The ATIM window repeats every one delivery tra?c indication message (DTIM) interval. DTIM is usually equal to multiple beacon intervals. An MP may also wake up in a scheduled time period negotiated with other MPs. In the power save mode, packets in an MP need to be bu?ered and wait for being sent during the wake state. To initiate the power management in a mesh network, the following procedure shall be used:  An unsynchronizing MP shall set the values of DTIM, ATIM window, beacon interval, and power management mode. such information is sent in beacon frames.  When a synchronizing MP creates a mesh or when it joins a mesh where all neighbors are unsynchronized MPs, the same operation as the previous item is needed.  When a synchronizing MP joins a mesh where there are synchronizing neighbor MPs, it needs to set the beacon interval and power management mode and update its ATIM window and DTIM interval according to the values in the received beacons of synchronizing MPs.  The ATIM window shall start from the target beacon transmission time (TBTT) within each beacon interval. It should be noted that an MP that has established peer links with other MPs cannot transition to power save mode unless 1. It can support power save mode and 2. All its neighbor MPs can send packets to MPs working in power save mode. Moreover, the MPs in power save mode shall be coordinated with the neighbor discovery mechanism and the route discovery mechanism. Otherwise, these MPs can experience low performance and degrade the performance of the entire mesh network. 3.4. Interworking The interworking between mesh networks and other LAN segments is carried out through the

bridging function in MPPs in a manner compatible with IEEE 802.1D. In order to inform MPs of its presence, an MPP needs to send an MPP announcement. The MPP announcement protocol works as follows. An MPP sends an announcement information element in management frames. When an MP gets a management frame with a valid MPP announcement element, it checks the destination sequence number in the MPP announcement element. If it is smaller than that of a previous MPP announcement element, the current MPP element shall be discarded. Otherwise, it needs to forward the MPP announcement element to other MPs after the portal propagation delay has expired and also the TTL value is still greater than zero. In addition, it needs to record the MAC address and routing metric to this MPP. When an MP has packets to send, it ?rst follows the data forwarding procedure as de?ned in the routing protocol. If an intra-mesh route to the destination MAC address cannot be found, then the MP shall forward all packets to the all active MPPs in the mesh. At an MPP, both egress and ingress messages need to be handled. An egress message is generated by an MP inside the mesh. If the MPP knows the destination node is inside the mesh, it will forward the message to the destination node. If the destination is outside mesh, it will forward the message to the external network. However, if the destination node is unknown to the MPP, the MPP shall forward the message to both the external network and the mesh network. An ingress message is a packet received by MPP from the external network. If the destination node inside mesh is known to the MPP, the messages is simply forwarded by the MPP. Otherwise, the MPP can have two options: establish a route to the destination or broadcast the message within the mesh network. Node mobility is also considered in 802.11s. There are four scenarios of node mobility. If a node moves within the mesh, then the routing protocol will take care of the mobility. If a node moves from the LAN outside the mesh to another LAN outside the mesh, no special action is needed for the mesh network, because 802.1D bridging functionality will handle this scenario [8]. In the third scenario where a node moves from inside the mesh to outside the mesh, the routing protocol needs to repair routing path after

980

X. Wang, A.O. Lim / Ad Hoc Networks 6 (2008) 970–984

detecting the route is changed. When a node moves from outside the mesh to inside the mesh, the MPP and the routing protocol cooperate to build a new routing path for the node. MPP plays a critical role in interworking. From above procedures, we know it needs to support 802.1D bridging functionality. Moreover, MPP also needs to support virtual LAN (VLAN) functionality. In other words, the VLAN tag information de?ned in IEEE 802.1Q must be carried between MPs and MPPs. 802.1Q de?nes two header formats: Ethernet-encoded formats and SNAP-encoded header [9]. If the former is considered, a change to the 802.11 MAC header is needed in order to add the VLAN tag information. The latter one does not need such a change. 3.5. Security The security speci?cation in the current 802.11s standard draft is dedicated to secure links between MPs. The security in routing or forwarding functionality in a mesh network is not speci?ed. To provide secure links, mesh security association (MSA) services are speci?ed in 802.11s. MSA inherits lots of work from 802.11i [10] and also adopts 802.1X [11] for initial authentication. MSA services extend the robust security network association (RSNA) framework of 802.11i to ?t the mesh networking environment. There are two types of MSA key holders in the network: mesh authenticator (MA) and mesh key distributor (MKD). A role negotiation protocol is available in 802.11s to determine if an MP shall be an MA, both an MA and an MKD, or neither. An MP without MA or MKD functionality shall work as a supplicant MP. Since an MA and its MKD need to be securely associated, a mesh key holder security association procedure is also speci?ed in 802.11s. When a supplicant MP wants to establish secure links with other MPs, the ?rst step is to set up a mesh key hierarchy. The mesh key hierarchy is established during the initial MSA authentication between the supplicant MP and an MKD via an MA. There are two branches in this hierarchy: a link security branch and a key distribution branch. The latter one is for generating security keys for key distribution, while the former one is for generating keys for a secure link. On the link security branch, pairwise master key (PMK) is ?rst derived for MKD based on a pre-shared key (PSK) or a master

session key (MSK). PSK is used when 802.1X authentication is not applied; otherwise, an MSK is provided through a successful authentication between the authentication server (AS) and the supplicant MP. Based on PMK–MKD, PMK for MAs, i.e., PMK–MAs, are then derived. Key deliver and key management between the MKD and the MA are handled by mesh key and extensible authentication protocol (EAP) message transport protocol. Finally, the pairwise transient key (PTK) is derived for the supplicant MP. On the key distribution branch, a key distribution key (KDK) is ?rst derived from PSK or MSK, and then a PTK is derived for key distribution. Once the mesh key hierarchy has been established, a subsequent MSA authentication mechanism between the supplicant MP and the MA to set up secure links to other MPs. Once this step is successful, both the MA and the supplicant MP open their controlled ports so that data tra?c are allowed to exchange using the selected cipersuites. 4. Challenging issues in 802.11s WMNs Many issues still exist in the current 802.11s standard draft. Instead of discussing meticulous problems/errors, here we point out major ones that can dramatically degrade the performance of 802.11 WMNs. 4.1. Topology formation for multi-rate operation and physical rate control In order to support routing, MAC and other functionalities, the network topology needs to be maintained. 802.11s has speci?ed such a framework in which the peer-link setup takes into account the link quality measurement. However, such kind of mechanism is not ?exible for a mesh network with multi-rate operation. As of today most physical layer technologies for wireless networks including 802.11 support multiple rates depending on the selection of di?erent modulation and coding schemes. For such kind of multi-rate network, the topology is very sensitive to the transmission rate that is being used. For example, if a high rate is used, the communication range (and usually the interference range) is reduced too. Normally the physical rate on a node is controlled automatically by a rate control per packet. Mostly the control/signaling messages are sent using the lowest transmission rate to improve reliability. Thus, topology

X. Wang, A.O. Lim / Ad Hoc Networks 6 (2008) 970–984

981

being built up based on such messages is not consistent with the network topology that is seen by other packets. Such inconsistency will cause problems to any topology related protocols such as routing and MAC. Since change of rate results in di?erent communication range and interference range, it may be also bene?cial to consider tradeo? between number of hops and the physical rate. For example, in order to connect two nodes, we can use one-hop communication with a very low transmission rate. We can also use multihop communications with a very high transmission rate. The end-to-end throughput for these two cases may be di?erent, and so is the interference to other nodes. Unfortunately, the framework of topology formation in 802.11s is not ?exible to support optimization between the rate and the number of hops. 4.2. Link quality measurement and routing metrics Link quality is an important parameter for multiple modules of 802.11s, including the routing protocol. In 802.11s, the link quality measurement is based on the transmission rate and transmission error rate. However, such a scheme lacks three important mechanisms. Firstly, what packets can be sent and how to send them are not speci?ed. Without a careful design, the link quality measurement can be inaccurate. For example, the frequency of measurement packets and their transmission rate impact the result of airtime cost. Secondly, the packet error rate due to transmission error does not actually re?ect the link quality. For example, the packet error rate can be due to collisions, which is totally dynamic depending on the tra?c activities and the behavior of routing and MAC protocols. Thus, the airtime cost varies a lot from time to time, which cannot provide a good metric for link quality. Routing based on such a metric may have a stability issue. Consequently, a more reliable and stable metric for link quality measurement and routing protocol is still desired. 4.3. Routing protocol As a routing protocol, both HWMP and RAOLSR have several shortcomings. First of all, the scalability of both routing protocols is limited. In HWMP, the proactive tree-based routing is totally centralized and constrained by the root node. Even if there is a short path between two MPs, the proac-

tive routing mode still routes the packets via the root node, which results in a bottleneck at the root node and wastes precious wireless resources due to non-optimized routing path. Meanwhile, the ondemand routing mode still initiates a path discovery process to look for an optimized routing path before the packets are sent out, which results in a broadcast storm problem and wastes power resources on other MPs. Thus, the hybrid routing protocol in 802.11s still cannot support route optimization between two MPs. For RA-OLSR, the overhead of control messages is too high although ?sheye scope mechanism is adopted. Secondly, for both HWMP and RA-OLSR, although they are being speci?ed as a routing module in the MAC layer, their interactions with other MAC functionality, especially the medium access mechanism, are not considered. Thus, such a strategy actually lose one important advantage of layer-2 routing, i.e., MAC-routing cross-layer design. Radio-metric routing in HWMP or radio aware routing in RA-OLSR has considered a simple interaction between routing and MAC/ PHY layer. However, such interaction is far from enough. For example, for both mechanisms, how to use the routing metric based on airtime cost to ?nd a better routing path is not speci?ed. However, such a scheme critically determines the performance of the routing protocol. In another example, if intramesh congestion control is used, the routing protocol shall cooperate with the congestion control algorithm by a mechanism of considering the target rate; otherwise, the e?ectiveness of congestion control can be compromised. When multi-channel operation comes into picture, the cross-layer design becomes much more necessary. Thirdly, supporting legacy nodes is still an ongoing e?ort for MAPs. Since legacy nodes do not participate in the HWMP routing protocol, the legacy nodes have to be associated with MAPs in order to gain access to the Internet through the backbone of the WMN. In 802.11s, the mechanism of locating a destination MAP for a given destination legacy node is not speci?ed. In the Internet, the destination legacy node is identi?ed by its destination IP address. Even though the MAP of the source legacy node has collected MAC addresses of all legacy nodes, it needs to ?nd out which MAC address is mapped to the given IP address. Such mapping is usually done by an address resolution protocol (ARP). However, no mechanism is speci?ed in 802.11s to perform ARP in a multihop network.

982

X. Wang, A.O. Lim / Ad Hoc Networks 6 (2008) 970–984

Furthermore, in case the legacy nodes move away from the communication range of the MAP to which it is associated, it should be disassociated from the MAP and re-associated from the new MAP in range. In order to support the dynamic movement of legacy nodes, a handover function needs to be speci?ed in the current default routing protocol. On the other hand, a basic functionality of associating the legacy nodes is speci?ed in the RA-OLSR routing protocol. However, the procedures in RA-OLSR can result in a very high percentage of overhead, which also limits the scalability of the routing protocol. Additionally, the current RA-OLSR has not considered the scenario when the legacy nodes are roaming between MAPs. Lastly, in the current framework, although multiple routing metrics can be supported, only one metric is supported in the same mesh. However, in many application scenarios, di?erent tra?c types may need di?erent routing metrics. Thus, multiple metrics need to be integrated into the same mesh in order to achieve optimized performance. Obviously the current framework is not extensible to support such a feature. For RA-OLSR, it has one more shortcoming: no portal mechanism is speci?ed. Thus, if RA-OLSR is selected as a routing protocol, 802.11s WMNs cannot interwork with an outside network. 4.4. Multi-channel operation In 802.11s, for multiradio MPs, only a simple UCG mechanism is used to unify the network using di?erent channels. So far there is no MAC mechanism de?ned for multi-channel operation for single-channel radios. The original proposal of CCF has several obvious problems. CCF needs packet-level channel switching. However, since the duration of channel switching is larger than the time of sending a regular packet, the channel switching cause a huge percent of overhead. Moreover, the RTX–CTX mechanism in the common channel has no way to avoid possible collisions from non-CCF nodes in a new channel that the CCF node wants to switch to. Thus, when CCF node switches to the new channel, its performance is not guaranteed, and may cause some co-existence issues. Since RTX–CTX messages are always sent in the common channel that is shared by other non-CCF nodes, such messages can be congested and result in a slow process of

getting a new channel. Moreover, CCF lacks a scheme to determine channel selection. In fact the above problems can happen to any multi-channel MAC protocol if it is not carefully designed. To the best of our knowledge, the scheme of multi-channel TDMA MAC overlaying CSMA/ CA [12] is the only multi-channel MAC protocol that has avoided these problems. 4.5. Congestion control Several problems exist in the intra-mesh congestion control mechanism of 802.11s. Firstly, it does not have an e?ective mechanism for congestion monitoring. Congestion based on queue size may not work since the queue size is also impacted by higher layer protocol such as TCP. Whenever congestion happens, the congestion monitoring scheme may need to take some time to get a reliable measurement. For example, the time window shall be large enough in order to avoid false alarm. Such a time window may already cause TCP to take action and have adjusted the tra?c rate. No matter what performance TCP congestion control can be, the status of congestion may have changed, and thus congestion may not accurately captured at the MAC layer. In target rate computation, a mesh node must obtain tra?c load information from all neighbors including one-hop and two-hop ones. Otherwise, the computed target rate can be so arbitrary and degrade the performance of congestion control. However, in 802.11s standard draft no mechanism is speci?ed to exchange tra?c load related information among one-hop and two-hop neighbors. How to determine the target rate based on neighbor information is not speci?ed either. Moreover, there is no scheme speci?ed in 802.11s for the local rate control. Simply adjusting EDCA parameters cannot achieve the goal because EDCA is more e?ective for tra?c prioritization rather than ensuring a certain tra?c rate. The above problems render the current framework for congestion control useless in a multihop mesh environment. 4.6. MDA MDA aims to reduce the contention in a 802.11s mesh. However, such a mechanism can cause an interoperability issue. In the same 802.11s mesh network, if there have both non-MDA and MDA nodes, the performance of either type of nodes can be degraded. An MDA node has no way to prevent

X. Wang, A.O. Lim / Ad Hoc Networks 6 (2008) 970–984

983

a non-MDA node from accessing the MDA TXOP. On the other hand, the non-MDA node may experience di?culty in accessing the medium due to the existence of MDA TXOP. The MDA mechanism relies on timely information of neighbor MDAOP interfering times and neighborhood MDAOP times to determine an MDAOP. This means frequent message exchange is needed between MPs, which causes a large overhead. Moreover, such information can be propagated over multiple hops, but no ?ltering mechanism is speci?ed in MDA, which further increases overhead. 4.7. QoS Although 802.11s adopted the EDCA mechanism, no QoS can be guaranteed. First of all, EDCA is only a mechanism of achieving ‘‘soft” QoS, i.e., tra?c prioritization. Such a mechanism is good for tra?c classes with di?erent priorities. For the nodes with the same class of tra?c, no priority is provided. Such a problem is more severe in a multihop environment. Other mechanisms such as MDA or intra-mesh congestion control at most provide some improvement of QoS locally, because such mechanisms still contain many problems in a multihop environment as explained before. For end-to-end QoS of a tra?c ?ow, a reservation scheme is usually needed. However, no such a mechanism is speci?ed in 802.11s. 4.8. Security

802.11 standard. However, for 802.11s, since the routing functionality is speci?ed in the link layer, it becomes imperative to specify a security mechanism for routing protocols in 802.11s standard. 4.9. Mobility and fast hando? In 802.11s, non-mesh clients are supported through an MAP. For such kind of nodes, when they move within the mesh, the hando? delay can be large due to channel scanning, security, authentication, and other necessary operation procedures. On the other hand, real-time services such as voice over Internet protocol (VoIP) are killer applications of 802.11s WMNs. In order to support real-time services in 802.11s WMNs, fast hando? schemes need to be developed. A possible solution for 802.11s is to develop a fast hando? mechanism based on radio resource measurement as speci?ed in 802.11k [13]. However, for certain scenarios, MAPs or MPs can be mobile, the fast hando? issue becomes more challenging and demands more an e?cient solution. 4.10. Multiple MPPs In the current framework of 802.11s, single MPP is assumed. However, in a relatively large scale WMNs, e.g., an enterprise network, multiple MPPs are needed in order to provide enough backhaul capacity to the Internet. When multiple MPPs are available, many functionalities such as interworking and routing protocols in the current 802.11s draft need to be modi?ed accordingly. 5. Conclusion

802.11s inherits security framework from 802.11i with certain extensions. Thus, whatever security problems exist in 802.11i will also occur in 802.11s. Moreover, due to the multihop mesh network architecture, security becomes a more challenging issue. For example, in WLAN environment, it is reasonable to assume there is a trustworthy channel between AS and authenticator. However, in a mesh network, the multihop wireless link between AS and MKD or MA does not always provide a trustworthy channel between AS and MKD or MA. On the other hand, all security procedures of 802.11s only take care of the potential security attacks in network association and secure link establishment. How to make sure the routing protocol is secure is not speci?ed. Routing security is usually considered as out-of-scope work for an IEEE

The network architecture and major functionalities of the upcoming standard of 802.11s WMNs were investigated in this article. In particular, the issues that degrade the performance of 802.11s WMNs were analyzed. Although the IEEE 802.11s task group is working hard to resolve comments raised by voters, no sign is shown that the issues discussed in this article will be resolved on this task group’s agenda. We admit that a WMN built up according to the current framework of 802.11s speci?cation will probably work. However, there is no doubt that the performance of such a WMN is extremely low. To ensure scalable performance in a future 802.11s WMN, it is indispensable to develop new protocols to resolve issues pointed out in this article.

984

X. Wang, A.O. Lim / Ad Hoc Networks 6 (2008) 970–984 Xudong Wang received his B.E. degree in Electric Engineering and his Ph.D. degree in Automatic Control in 1992 and 1997, respectively, from Shanghai Jiao Tong University, Shanghai, P.R. China. In August 2003, he also received a Ph.D. degree in Electrical and Computer Engineering from Georgia Institute of Technology. Currently, he is the R&D manager at Kiyon, Inc., where he leads research and development of wireless mesh networking technologies. He was a senior network architect and researcher in the same company. He is the creator of Kiyon’s pioneering single-channel and multi-channel TDMA technologies for wireless mesh networks. His research interests also include cognitive/software radios, cross-layer design, and communication protocols for cellular networks, mobile ad hoc networks, sensor networks, and ultra-wideband networks. He holds a number of patents on wireless networking technologies and most of his inventions have been successfully transferred to products. He is an editor for Elsevier Ad Hoc Networks and was also a guest editor for several journals. He was a technical program co-chair of Wireless Internet Conference (WICON) 2007 and the demo cochair of the ACM International Symposium on Mobile Ad Hoc Networking and Computing (ACM MOBIHOC 2006). He has been a technical committee member of many international conferences and a technical reviewer for numerous international journals and conferences. He is a member of IEEE, ACM, and ACM SIGMOBILE and a voting member of IEEE 802.11 and 802.15 Standard Committees.

Acknowledgements The authors would like to acknowledge Bing Zhang and Youiti Kado at NICT, Japan, and Weilin Wang and Michael Nova at Kiyon, Inc., for their valuable discussions and suggestions. References
[1] I.F. Akyildiz, X. Wang, A survey on wireless mesh networks, IEEE Communications Magazine 43 (9) (2005) s23–s30. [2] IEEE 802.11s Task Group, Draft Amendment to Standard for Information Technology – Telecommunications and Information Exchange Between Systems – LAN/MAN Speci?c Requirements – Part 11: Wireless Medium Access Control (MAC) and physical layer (PHY) speci?cations: Amendment: ESS Mesh Networking, IEEE P802.11s/D1.0, November 2006. [3] IEEE 802.11 Standard Working Group, Draft Standard for Information Technology – Telecommunications and Information Exchange Between Systems – LAN/MAN Speci?c requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Speci?cations, IEEE P802.11-REVma/D9.0, January 2007. [4] T. Clausen, P. Jacquet, Optimized link state routing protocol (OLSR), IETF RFC 3626, 2003. [5] C. Perkins, E. Belding-Royer, S. Das, Ad hoc on-demand distance vector (AODV) routing, IETF RFC 3561, 2003. [6] M. Gerla, X. Hong, G. Pei, Fisheye state routing protocol (FSR) for Ad hoc networks, IETF Internet-Draft, 2002. [7] IEEE 802.11 Standard Working Group, Standard for Information Technology – Telecommunications and Information Exchange Between Systems – LAN/MAN Speci?c requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Speci?cations, ANSI/ IEEE Std 802.11, ?rst ed., 1999. [8] IEEE 802.1 Standard Working Group, IEEE standard for local and metropolitan area networks: media access control (MAC) bridges, IEEE Std 802.1D, February 2004. [9] IEEE 802.1 Standard Working Group, IEEE standard for local and metropolitan area networks: virtual bridged local area networks, IEEE Std 802.1Q, December 2005. [10] IEEE 802.11i Task Group, Draft Standard for Information Technology – Telecommunications and Information Exchange Between Systems – LAN/MAN Speci?c requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Speci?cations Amendment 6: Medium Access Control (MAC) Security Enhancements, IEEE Std 802.11i, June 2004. [11] IEEE 802.1 Standard Working Group, IEEE standard for local and metropolitan area networks: port-based network access control, IEEE Std 802.1X, November 2004. [12] X. Wang, W. Wang, M. Nova, Distributed Multi-channel Wireless Communications US Patent Pending, 2006. [13] IEEE 802.11k Task Group, Draft Standard for Information Technology – Telecommunications and Information Exchange Between Systems – LAN/MAN Speci?c requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Speci?cations Amendment: Radio Resource Measurement, IEEE P802.11k/D7.0, January 2007.

Azman-Osman Lim received the B.E. (Hons) and M.Inf. Technology degrees from Universiti Malaysia Sarawak (UNIMAS), Malaysia in 1998 and 2000, respectively. During 2001–2004, he was a recipient of the Monbukagakusho Scholarship from the Japanese Government. He received the Ph.D. degree in communications and computer engineering from Kyoto University in 2005. He was a visiting researcher at Fudan University in China for two months before he joined Knowledge Creating Communication Research Center, NICT, Kyoto, Japan in 2005. Since 2005, he is actively joining the standardization activities of IEEE 802.11s ESS Mesh Networking. He and his team members have introduced two proposals, which currently adopted in the draft of IEEE 802.11s D1.04. He also led the RAOLSR group in resolving a part of the comments. Since 2006, he is also actively joining the standardization activities of next-generation home networks from Telecommunication Technology Committee (TTC), Japan. From 2007 onward, he is one of the researchers involving energetically in new era of communication, called two-dimensional communication system. He obtained a Grant-in-Aid for Scienti?c Research from the Ministry of Education, Culture, Sports, Science and Technology (MEXT) for three years. His research interests include the congestion control and management of ATM networks, multihop wireless networks, wireless mesh networks, wireless sensor network, heterogeneous wireless network, two-dimensional communication, game theory, and capacity theory. He is a member of IEEE and IEICE.


相关文档

  • 基于IEEE 802.11的长距离无线Mesh网络
  • Performance evaluations for hybrid IEEE 802.11b and 802.11g wireless networks
  • IEEE 802.11s - Mesh Deterministic Access
  • 802_11s无线mesh网络研究进展与挑战
  • 200509_A survey on wireless mesh networks_ieee
  • IEEE 802.11S, THE WLAN MESH STANDARD
  • IEEE802.16中的无线Mesh网络研究
  • End-to-End Flow Fairness over IEEE 802.11-based Wireless Mesh Networks
  • 猜你喜欢

  • 音乐 六年级下册 第2单元 走进西藏 word高清打印版电子书电子课本
  • 股权转让协议(工商官方版)范本
  • realtek高清晰音频管理器有什么用
  • 重庆启乐体育文化传播有限公司企业信息报告-天眼查
  • 2015年护士资格考点:内科疾病分期护理每日一练(5月3日)
  • 合肥智晶光伏能源有限公司(企业信用报告)- 天眼查
  • 御博(大连)贸易有限公司企业信用报告-天眼查
  • 可采用公允价值计量的资产【会计实务经验之谈】
  • 在Ubuntu中安装Redis
  • 新语文版七年级语文下册学*课件 20珍奇的稀有动物针鼹
  • 桂林植物园的专类园建设方法和特点
  • SYB第二步-找到一个好的企业想法(大学生版)
  • 工程计算书复核问题(定)2.13
  • 喷墨式打印机常见故障及解决方法
  • 银保产品的特点专业化销售流程35页
  • 痛风的预防及饮食指导
  • 降低内核模块编译优化等级时出错
  • 煤矿火灾事故应急演练方案设计
  • 人教版九年级综合试题 数学上册《二次函数性质》期末复*专题及答案
  • 高中数学人教A版选修2-3优化课件:第一章 章末优化总结
  • 论网络文化对高校大学生思想政治教育的影响-2019年精选教育文档
  • 最新-会议策划方案 精品
  • 河南省许昌、新乡、*顶山市2016届高三第二次调研考试语文试题 Word版含答案
  • 推荐最新房地产项目年度工作计划实用范文.doc
  • 最新公司年会活动主持人串词
  • 广东省增城市日用杂品公司(企业信用报告)- 天眼查
  • =村干部村书记述职述廉报告精选多篇
  • 人教版高中政治选修3专题二第1课时《英国国王与君主立宪制》word学案
  • 人教版数学六年级下册“比和比例”教材分析
  • 绿色小清新淡雅七月你好工作总结PPT模板
  • Hbase安装详细步骤实战
  • 2016-2017年浙江省温州市高一下学期数学期末试卷及参考答案
  • 请领导吃饭怎么说合适
  • 廊坊市广阳区德隆奶牛养殖专业合作社(企业信用报告)- 天眼查
  • 园林绿化养护管理工作月历
  • 三年级作文学做饭的感悟
  • 扬州美尔家装饰工程有限公司企业信用报告-天眼查
  • Study of Microstructure and Magnetic Properties of Pr
  • 听我说,业务参数检验这样做才叫优雅!
  • 抖音直播点赞什么意思
  • 【招生简章】兰州交通大学2018年招生章程
  • 江西省新余市第一中学2016-2017学年高一下学期第二次
  • 电脑版