IEEE P802.11 Wireless Lans s5

Total Page:16

File Type:pdf, Size:1020Kb

IEEE P802.11 Wireless Lans s5

Sep 2005 doc.: IEEE 802.11-05/0588r22

IEEE P802.11 Wireless LANs

Proactive Mesh Network Framework

Date: 2005-09-12

Author(s): Name Company Address Phone email National Institute of 3-5 Hikaridai, Seika- Information and Bing Zhang cho, Soraku-gun, +81-774-98-6820 [email protected] Communications Kyoto, Japan Technology ATR Adaptive 2-2-2 Hikaridai, Seika- Oyunchimeg Communication Research cho, Soraku-gun, +81-774-95-1532 [email protected] Shagdar Laboratories Kyoto, Japan ATR Adaptive 2-2-2 Hikaridai, Seika- Suhua Tang Communication Research cho, Soraku-gun, +81-774-95-1544 [email protected] Laboratories Kyoto, Japan Oki Electric Industry Co., 2-5-7 Honmachi, Youiti Kado +81-6-6260-0700 [email protected] Ltd. Chuo-ku, Osaka, Japan Masanori Oki Electric Industry Co., 2-5-7 Honmachi, +81-6-6260-0700 [email protected] Nozaki Ltd. Chuo-ku, Osaka, Japan Abstract 0 This document describes an extensible WLAN mesh networking proposal for 802.11s. The proposal provides a framework for a WLAN mesh network with the wireless multihop communication between mesh access points, which accommodate the legacy stations associated with them. It specifies a layer-2 proactive routing protocol, which includes the topology discovery and supports the WDS unicast/multicast/broadcast. To enhance the routing protocol, the strong link is selected by using the Received Signal Strength Indicator (RSSI), and Pseudo flow-based load balancing is also performed. Moreover, the proposed scheme provides the QoS support mechanisms with the extensible IEEE802.11e, by performing a delay-based priority control, and also supports the multiple radios with the distributed channel assignment. Finally, the secure links for the mesh network are built based on an extensible 802.11i security mechanism.

Notice: This document has been prepared to assist IEEE 802.11. It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein.

Release: The contributor grants a free, irrevocable license to the IEEE to incorporate material contained in this contribution, and any modifications thereof, in the creation of an IEEE Standards publication; to copyright in the IEEE’s name any IEEE Standards publication even though it may include portions of this contribution; and at the IEEE’s sole discretion to permit others to reproduce in whole or in part the resulting IEEE Standards publication. The contributor also acknowledges and accepts that this contribution may be made public by IEEE 802.11.

Patent Policy and Procedures: The contributor is familiar with the IEEE 802 Patent Policy and Procedures , including the statement "IEEE standards may include the known use of patent(s), including patent applications, provided the IEEE receives assurance from the patent holder or applicant with respect to patents essential for compliance with both mandatory and optional portions of the standard." Early disclosure to the Working Group of patent information that might be relevant to the standard is essential to reduce the possibility for delays in the development process and increase the likelihood that the draft publication will be approved for publication. Please notify the Chair as early as possible, in written or electronic form, if patented technology (or technology under patent application) might be incorporated into a draft standard being developed within the IEEE 802.11 Working Group. If you have questions, contact the IEEE Patent Committee Administrator at .

Submission page 1 Bing Zhang, NICT et al. Sep 2005 doc.: IEEE 802.11-05/0588r22

Number Category Name Coverage Notes References (Complete /Partial/ None) FR1 TOPO_RT_FWD Mesh Topology Complete Discovery FR2 TOPO_RT_FWD Mesh Routing Complete Protocol FR3 TOPO_RT_FWD Extensible Mesh Routing Partial Architecture FR4 TOPO_RT_FWD Mesh Broadcast Complete Data Delivery FR5 TOPO_RT_FWD Mesh Unicast Complete Data Delivery FR6 TOPO_RT_FWD Support for Single and Complete Multiple Radios FR7 TOPO_RT_FWD Mesh Network Complete Size FR8 SECURITY Mesh Security Partial FR9 MEAS Radio-Aware Routing Partial Metrics FR10 SERV_CMP Backwards compatibility Complete with legacy BSS and STA FR11 SERV_CMP Use of WDS 4-Addr Frame Complete or Extension FR12 DISC_ASSOC Discovery and Association Complete with a WLAN Mesh FR13 MMAC Amendment to MAC with no Complete PHY changes required FR14 INTRWRK Compatibility with higher- Complete layer protocols

Submission page 2 Bing Zhang, NICT et al. Sep 2005 doc.: IEEE 802.11-05/0588r22

Table of Contents

1. Executive Summary...... 6 2. Definitions...... 6 3. Abbreviations and Acronyms...... 7 4. Mesh MAC Frame Formats...... 9 4.1. Mesh Data Frame Format...... 9 4.2. Mesh Management Frame...... 9 4.3. Mesh Management Frame Type and Subtype...... 9 4.4. Specific Management Frame Subtypes...... 10 4.4.1. Beacon Frame Format...... 10 4.4.2. Association Request Frame Format...... 11 4.4.3. Association Response Frame Format...... 11 4.4.4. Probe Request Frame Format...... 11 4.4.5. Probe Response Frame Format...... 11 4.4.6. Action Frame Format...... 12 5. Proactive Layer-2 Routing Protocol for Mesh Networks...... 13 5.1. WLAN Mesh Architecture...... 13 5.2. Topology Discovery...... 13 5.2.1. Hello Frame Exchange...... 13 5.2.2. MPR Selection...... 15 5.2.3. Topology Control Messages...... 16 5.2.4. Associated Station Address Table...... 17 5.3. Unicast Routing...... 18 5.4. Broadcast Routing...... 19 5.5. Multicast Routing...... 20 5.6. Routing with Different Metrics...... 21 5.6.1. Distribution of Link Metrics...... 21 5.6.2. Routing table calculation...... 21 5.6.3. Pseudo Flow-based Load Balancing...... 23 5.6.3.1. Pseudo Flow Management...... 23 5.6.3.2. Pseudo Flow Table...... 23 5.6.3.3. Extended Routing Table with the Load Related Metric...... 24 5.6.4. Selection of Strong Links...... 25 6. QoS Support for Multimedia Communications...... 27 6.1. Priority Control...... 27 6.1.1. Motivation...... 27 6.1.2. Delay-based Priority Control Schemes...... 28 6.1.3. Priority Control Scheme based on Number of Hops...... 28 6.1.4. Priority Control Scheme based on Congestion Condition at Relay MPs...... 29 6.1.5. Priority Control Scheme based on Time-stamp...... 31 6.1.6. Mesh Measurement Frame Format Details...... 32 6.2. Frame Aggregation...... 34 6.2.1. Motivation...... 34 6.2.2. Frame Aggregation Schemes...... 34 6.2.2.1. Tun(Tunneling) Aggregation Scheme...... 34 6.2.2.2. NH(Next Hop) Aggregation Scheme...... 35 6.2.2.3. MC(MultiCast) Aggregation (Optional) Scheme...... 35 6.2.3. Queuing Model...... 35 6.2.3.1. Push Model with Aggregration Delay...... 36 6.2.3.2. Pull Model for the Congested Mesh Networks...... 36 6.2.4. BEANS( Backward Explicit Aggregation Notification Scheme)...... 36 6.2.4.1. Hybrid Frame Aggregation Scheme...... 36

Submission page 3 Bing Zhang, NICT et al. Sep 2005 doc.: IEEE 802.11-05/0588r22

6.2.4.2. Frame Aggregation Procedures...... 37 7. Channel Assignment...... 39 7.1. Distributed Channel Assignment...... 39 7.1.1. Motivations...... 39 7.1.2. Multi Channel Operation in a WLAN Mesh...... 40 7.1.2.1. Basic Assumption...... 40 7.1.2.2. Determination of the Common Channel...... 41 7.1.2.3. Channel Assignment for Non-common Channels...... 42 7.1.2.4. Global CA (GCA)...... 45 7.1.2.5. Local CA (LCA)...... 47 7.1.2.6. Operation after Channel Update...... 49 7.2. Portal-Driven Channel Assignment...... 50 7.2.1 Backgrounds...... 50 7.2.2 Segmentation Strategy...... 50 7.2.2.1. Channel Assignment by Segmenting...... 51 7.2.2.2. Channel Assignment at Merger of Mesh...... 52 8. WLAN Mesh Security...... 55 8.1 Authentication of Newly Arrived MP...... 55 8.2 Link Establishment between Neighboring MPs...... 56 9. Summary...... 57 References...... 58 List of Figures

Figure 1 - Data Frame Format...... 9 Figure 2 - Mesh Control Field...... 9 Figure 3 - Management Frame Format...... 9 Figure 4 – Proposed WLAN mesh network model...... 13 Figure 5 – Transmission of Hello frame over the WLAN mesh...... 14 Figure 6 - The MAC address list of 1-hop and 2-hop neighbors for MP-A, MP-B and MP-D...... 14 Figure 7 - Transmission of MPR-adv frames to advertise the MPR set information...... 15 Figure 8 – Transmission of TC-adv frame including the links to all MPs of its MPR selector set...... 16 Figure 9 – Transmission of ASAT-adv frame...... 17 Figure 10 - Transmission of the data frame from STA-G to STA-H...... 18 Figure 11 - Transmissions of broadcast frame from STA-G...... 19 Figure 12 – Transmission of multicast frame from MAP-A...... 20 Figure 13 - Normal TC message with hop count as the metric...... 21 Figure 14 - New TC message with metric other than hop count...... 21 Figure 15 - Assignment of multiple flows to the same destination...... 23 Figure 16 - Emergent Reassignment of a flow to an alternative path...... 25 Figure 17 - Assignment of multiple flows with handling multiple channels...... 25 Figure 18 – Metric corresponding to RSSI...... 26 Figure 19 - Flow performance is highly dependant on number of hops it traverse and congestion condition at its relay MPs...... 27 Figure 20 - Priority control scheme based on number of hops (K=2)...... 29 Figure 21 - Measuring queue length of individual buffers...... 30 Figure 22 - Information exchange of queue length at each MP...... 30 Figure 23 - Initializing and updating "delay" field...... 32 Figure 24 – An Example of Frame Aggregation...... 34 Figure 25 – Tunneling Aggregation Frame Format...... 35 Figure 26 - Next Hop Aggregation Frame Format...... 35 Figure 27 - Two Queuing Models...... 36 Figure 28 – Mesh AP with Multiple Queues...... 37

Submission page 4 Bing Zhang, NICT et al. Sep 2005 doc.: IEEE 802.11-05/0588r22

Figure 29 – Example of Frame Aggregation with Flow 1...... 38 Figure 30 – Example of Frame Aggregation with Flow 2...... 38 Figure 31 – Example of Frame Aggregation with Flow 3...... 38 Figure 32 – Example of Frame Aggregation with Flow 4...... 38 Figure 33 - An example of CA...... 40 Figure 34 - From disconnected network to connected network (with GW)...... 42 Figure 35 - From disconnected network to connected network (without GW)...... 42 Figure 36 - Global CA manner and the CA result...... 44 Figure 37 - CA steps in Global CA & Local CA...... 44 Figure 38 - Global CA operation...... 46 Figure 39 - An Example of a Mesh Topology...... 51 Figure 40 - Flooding Tree from Mesh Portal...... 51 Figure 41 - Result of Channel Assingment...... 52 Figure 42 - Discretely Formed Networks of a Mesh ID...... 53 Figure 43 - Beginning of Mesh Merger...... 53 Figure 44 - Result of Mesh Merger...... 54 Figure 45 - A connection establishment for a new mesh AP...... 55 Figure 46 – The flow chart of the authenticator selection...... 56 Figure 47 - Connection reestablishment between the restored mesh portal and mesh network...... 57 List of Tables

Table 1 – Valid Type and subtype combinations...... 9 Table 2 - Valid mesh type and mesh subtype combinations...... 10 Table 3 – Beacon frame body additions...... 10 Table 4 – Association Request frame body additions...... 11 Table 5 – Association Response frame body additions...... 11 Table 6 – Probe Request frame body additions...... 11 Table 7 – Probe Response frame body additions...... 11 Table 8 – Category of action frame field...... 12 Table 9 - Examples of Pseudo Flow Table (cf. Figure 15)...... 24 Table 10 - Example of Extended Routing Table ( cf. Figure 15)...... 24 Table 11 - Example of Extended Routing Table with 2 RF Modules ( cf.Figure 17)...... 24 Table 12 - Mesh Measurement Frame Format...... 32 Table 13 - New elements in the beacon frame...... 41 Table 14 - Modified hello message...... 43 Table 15 - New frame format for CA...... 43

Submission page 5 Bing Zhang, NICT et al. Sep 2005 doc.: IEEE 802.11-05/0588r22

1 Executive Summary

This document describes a full proposal for a proactive, flexible, compatible and secure 802.11s WLAN mesh network. The proposal provides a framework for a WLAN mesh network with the wireless multihop communication between mesh access points, which accommodate the legacy stations associated with them. Here, we recommend to use a proactive routing protocol, for the reason that the mesh access points are generally considered to have the low mobility and the network scale is moderate (the maximum size is expected to be about 32), and then the problem of the overhead is not remarkable, to keep a routing before a transmission starts. The document specifies a layer-2 proactive routing with strong links and flow-based load balancing; QoS support mechanism, frame aggregation scheme especially for VoIP application, channel assignment for supporting multiple radios, and finally security system. This proposal is intended to provide a broad deployable system with diverse applications such as residential, office, campus/community/public access networks, and public safety.

2 Definitions

1. WLAN Mesh – A WLAN Mesh is an IEEE 802.11-based WDS which is part of a DS, consisting of a set of two or more Mesh Points interconnected via IEEE 802.11 links and communicating via the WLAN Mesh Services. A WLAN Mesh may support zero or more entry points (Mesh Portals), automatic topology learning and dynamic path selection (including across multiple hops).

2. WLAN Mesh Services – The set of services provided by the WLAN Mesh that support the control, management, and operation of the WLAN Mesh, including the transport of MSDUs between Mesh Points within the WLAN Mesh. WLAN Mesh Services supplement DSS (Distribution System Services).

3. Mesh Point – Any IEEE 802.11 entity that contains an IEEE 802.11–conformant Medium Access Control (MAC) and Physical Layer (PHY) interface to the Wireless Medium (WM), is within a WLAN Mesh, and supports WLAN Mesh Services.

4. Mesh AP – Any Mesh Point that is also an Access Point.

5. Mesh Portal - A point at which MSDUs exit and enter a WLAN Mesh to and from other parts of a DS or to and from a non-802.11 network. A Mesh Portal can be collocated with an IEEE 802.11 portal.

6. Mesh Link - A direct IEEE 802.11 link between two Mesh Points.

7. Mesh Path - A concatenated set of connected Mesh Links from a source Mesh Point to a destination Mesh Point.

8. Mesh Path Selection – The process of selecting Mesh Paths.

9. Path Metric –Criteria used for Mesh Path Selection.

10. Mesh Topology – A graph consisting of the full set of Mesh Points and Mesh Links in a WLAN Mesh.

Submission page 6 Bing Zhang, NICT et al. Sep 2005 doc.: IEEE 802.11-05/0588r22

11. Mesh Neighbor - Any Mesh Point that is directly connected to another Mesh Point with a Mesh Link.

12. Mesh Unicast - Frame forwarding mechanism for transporting MSDUs to an individual Mesh Point within a WLAN Mesh.

13. Mesh Multicast - Frame forwarding mechanism for transporting MSDUs to a group of Mesh Points within a WLAN Mesh.

14. Mesh Broadcast - Frame forwarding mechanism for transporting MSDUs to all Mesh Points within a WLAN Mesh.

3 Abbreviations and Acronyms

Term Description AP Access Point ASAT Associated Station Address Table CA Channel Assignment CAS Channel Sequence Number CC Control Channel CI Control Interface CRC Cyclic Redundancy Check CTS Clear to Send DC Data Channel DI Data Interface EAPOL Extensible authentication protocol over LAN (aka 802.1X) ESS Extended Service Set FCS Frame Check Sequence IE Information Element LLC Logical Link Control MAC Medium Access Controller MMPDU MAC Management Protocol Data Unit MP Mesh Point MPDU MAC Protocol Data Unit MPT Mesh Portal MPR Multi Point Relay MSDU MAC Service Data Unit MT Mesh Type MST Mesh Sub Type NAV Network Allocation Vector (a MAC-level carrier-sense) PHY Physical Layer QC QoS Control QoS Quality of service RSSI Receive Signal Strength Indicator RTS Request to send RX Receiver SAP Service Access Point SN Sequence Number SSID Service Set Identifier STA Station TBC To be confirmed

Submission page 7 Bing Zhang, NICT et al. Sep 2005 doc.: IEEE 802.11-05/0588r22

TBD To be determined TGe 802.11 Task Group e - Quality of Service TTL Time to Live TX Transmitter TXOP Transmission Opportunity WDS Wireless Distribution System

Submission page 8 Bing Zhang, NICT et al. Sep 2005 doc.: IEEE 802.11-05/0588r22

4 Mesh MAC Frame Formats

4.1. Mesh Data Frame Format

The proposed data frame format for the ESS mesh is defined in Figure 1. The QC field provided by 802.11e and MC field specified by the ESS mesh is added to the regular WDS frame. The unit of the field is an octet.

2 2 6 6 6 2 6 2 3 0-2312 4 FC Du ADDR ADDR ADDR SC ADDR QC MC Frame Body FCS 1 2 3 4

Figure 1 - Data Frame Format.

The MC field is composed of TTL, SN, MT and MST, denoting the number of the maximum hops, sequence number, type and subtype of frame, respectively, shown in Figure 2. The total length of this field is 24 bits.

2 4 6 12 MT MST TTL SN Figure 2 - Mesh Control Field.

4.2. Mesh Management Frame

The management frame format for the ESS mesh is described in Figure 3. The maximum number of address is 3. Similarly to the data frame, the MC field is also added.

2 2 6 6 6 2 3 0-2312 4 FC Du ADDR ADDR ADDR SC MC Frame Body FCS 1 2 3

Figure 3 - Management Frame Format.

4.3. Mesh Management Frame Type and Subtype

By defining a reservation field prepared in the IEEE802.11 standard frame format as a reference field of the ESS mesh, we can newly design some frame types to specify the mesh networks, including mesh management, control and data frames. Table 1 shows a list of various types of mesh MAC frames discriminated by type and subtype values.

Table 1 – Valid Type and subtype combinations

type value Type description Subtype value Subtype description b3 b2 b7 b6 b5 b4 00 Management 1110 For Mesh management

Submission page 9 Bing Zhang, NICT et al. Sep 2005 doc.: IEEE 802.11-05/0588r22

01 Control 0000 For Mesh control 10 Data 1101 For Mesh data

To specify the more detailed subtypes of management frames for the ESS mesh, the MT included in the MC field shown in Figure 2, can be referred to define the detailed mesh types and subtypes. Table 2 shows a list of mesh type and subtype to define the routing-related control frame, probe frame, beacon frame, action frame, etc.

Table 2 - Valid mesh type and mesh subtype combinations

Mesh type value Type description Mesh subtype value Subtype description b3 b2 b7 b6 b5 b4 00 Management 0000 Association Request 00 Management 0001 Association Response 00 Management 0010 Probe Request 00 Management 0011 Probe Response 00 Management 0100 Beacon 00 Management 0101 Disassociation 00 Management 0110 Hello 00 Management 0111 MPR Advertisement 00 Management 1000 TC Advertisement 00 Management 1001 ASAT Advertisement 00 Management 1010 Action 00 Management 1011 – 1111 Reserve 01 Control 0000 – 1111 Reserve 10 Data 0000 WDS Unicast 10 Data 0001 WDS Broadcast 10 Data 0010 WDS Multicast 10 Data 0011 WDS Tun-Agg Unicast 10 Data 0100 WDS NH-Agg Unicast 10 Data 0101 – 1111 Reserve 11 Reserve 0000 – 1111 Reserve

4.4. Specific Management Frame Subtypes

The following subsections specify the details of management frame subtypes, which is included in the frame body of the IEEE802 standard management frame.

4.4.1. Beacon Frame Format

Table 3 – Beacon frame body additions

Information Note Mesh Capability Info Mesh capability information. E.g. Mesh Point or Mesh Access Point Mesh ID An identifier of mesh network. RF Info RF channel information. E.g. Number of RF devices, channel selection, etc Power Info Available transmission power.

Submission page 10 Bing Zhang, NICT et al. Sep 2005 doc.: IEEE 802.11-05/0588r22

E.g. Battery or fixed power supply Routing Info Routing parameters. E.g. Metric, routing protocol, etc. Multicast Info Multicast group information. E.g. MAC address of multicast group leader.

4.4.2. Association Request Frame Format

Table 4 – Association Request frame body additions

Information Note Mesh Capability Info Mesh capability information. E.g. Mesh Point or Mesh Access Point Mesh ID An identifier of mesh network. RF Info RF channel information. E.g. Number of RF devices, channel selection, etc Power Info Available transmission power. E.g. Battery or fixed power supply

4.4.3. Association Response Frame Format

Table 5 – Association Response frame body additions

Information Note Mesh Capability Info Mesh capability information. E.g. Mesh Point or Mesh Access Point Mesh ID An identifier of mesh network

4.4.4. Probe Request Frame Format

Table 6 – Probe Request frame body additions

Information Note Mesh ID An identifier of mesh network

4.4.5. Probe Response Frame Format

Table 7 – Probe Response frame body additions

Information Note Mesh Capability Info Mesh capability information. E.g. Mesh Point or Mesh Access Point Mesh ID An identifier of mesh network RF Info RF channel information. E.g. Number of RF devices, channel selection, etc Power Info Available transmission power.

Submission page 11 Bing Zhang, NICT et al. Sep 2005 doc.: IEEE 802.11-05/0588r22

E.g. Battery or fixed power supply Authentication Info Authentication method information.

4.4.6. Action Frame Format

Table 8 – Category of action frame field

Category Command Note Request Collection of statistic information. Mesh Measurement E.g. Round trip time, BER, frame loss rate, etc Report Statistic information reports. Request Request to assign channel. Channel Assignment Reply Success or Failure. Global CA Assign channels for all the links, initiated by GW. Advertisement Multicast group leader (ex. Mesh Portal) advertises the address table of multicast group member to all MPs. Join request Request to join in multicast group. Multicast Join reply OK or NG. Depart request Request to quit from multicast group. Depart reply OK or NG.

Submission page 12 Bing Zhang, NICT et al. Sep 2005 doc.: IEEE 802.11-05/0588r22

5 Proactive Layer-2 Routing Protocol for Mesh Networks

Many layer-3 routing protocols have been proposed for wireless multi-hop communications 1-2. Based on the route discovery methods, they can be mainly classified into reactive and proactive routing protocols. Because the mesh APs are generally considered to have the low mobility and the scale of mesh network is moderate (Maximum size is 32), the proactive routing is more beneficial, and its overhead is also tolerant. Here, we propose a proactive layer-2 routing protocol for mesh networks, which build a globally optimal route for each destination, and adapts to the topology variation. The features of our proposed scheme are, (a) accommodating the legacy stations associated with Mesh APs, (b) building the topology of the whole network by exchanging the neighbor information and topology control information, (c) optimizing the route with different link metrics, such as RSSI strength and load balance, (d) supporting the WDS unicast/multicast/broadcast.

5.1. WLAN Mesh Architecture

The topology for WLAN mesh network is illustrated inFigure 4. MPs in the WLAN mesh are connected based on a layer-2 proactive routing, to achieve a multi-hop communication. The interference between channels is decreased by allocating the different channels to the connections of MPs, Mesh APs and Legacy STAs. In order to alleviate the throughput degradation due to the multi-hop communication, the connections between Mesh APs can be connected with two or more channels.

Mesh AP

・・・ 802.11a(5.2GHz) E ・・・ 802.11a(5.2GHz) MP ・・・ 802.11b/g(2.4GHz) Mesh AP F

B Router Mesh AP

A D

Server Mesh Portal C Legacy Legacy H G STA Mesh AP STA Figure 4 – Proposed WLAN mesh network model.

5.2. Topology Discovery

5.2.1. Hello Frame Exchange

The Hello message is periodically exchanged over MPs for the neighborhood detection, as shown in Figure 5. The format of Hello frame is specified by the proposed mesh management format in section 3. MP-D (denoted as Mesh AP-D in Figure 4) sends the Hello frame denoted as (1) in Figure 5, by setting DA to the broadcast address (FF:FF:FF:FF:FF:FF) and SA to the MAC address of MP-D. The 1-hop neighbor information of MP-D is involved in the MAC frame body. In the case where no neighbor MP is detected, the null data is transmitted. Similarly to MP-D, MP-B and MP-A periodically broadcast the Submission page 13 Bing Zhang, NICT et al. Sep 2005 doc.: IEEE 802.11-05/0588r22

Hello frames of (2) and (3), respectively. Upon receiving the Hello frame from MP-D, MP-B adds the MAC address of MP-D to its 1-hop neighbor list. Every MP can acquire the MP information that is included in the 1-hop neighbor list of its neighbor, but not included in itself 1-hop neighbor list. Then, MP adds this information into its 2-hop neighbor list. For example, MP-D detects MP- B and C as 1-hop neighbors, and adds MP-E, A and F into 2-hop neighbors. By exchanging the Hello frames, 1-hop neighbor address list and 2-hop address list for every MP in Figure 4 can be obtained. Figure 6 shows the list of 1-hop and 2-hop neighbors for MP-A, MP-B and MP-D.

A B D (1)

(2) (2)

(3)

(1) Hello (from D) DA SA BSSID 1 HOP Neighbor FC Du MC FCS MAC:FF MAC:D MAC:D Address List

(2) Hello (from B)

DA SA BSSID 1 HOP Neighbor FC Du MC FCS MAC:FF MAC:B MAC:B Address List

(3) Hello (from A)

DA SA BSSID 1 HOP Neighbor FC Du MC FCS MAC:FF MAC:A MAC:A Address List

Figure 5 – Transmission of Hello frame over the WLAN mesh.

A B D

1HOP Neighbor 1HOP Neighbor 1HOP Neighbor

B C A D E F B C

2HOP Neighbor 2HOP Neighbor 2HOP Neighbor

D E F C A E F

Figure 6 - The MAC address list of 1-hop and 2-hop neighbors for MP-A, MP-B and MP-D.

Submission page 14 Bing Zhang, NICT et al. Sep 2005 doc.: IEEE 802.11-05/0588r22

5.2.2. MPR Selection

MP determines the OLSR (Optimized Link State Routing) based MPR (Multipoint Relay) set to retransmit all the broadcast frames. MPR can be calculated through the 1-hop neighbors, which can reach all symmetric 2-hop neighbors. For example (see Figure 4), when MP-D forwards the broadcast frames, MP-B and MP-C are candidates to flood the frames. In the case of MP-C selected as MPR set, to reach MP-A and MP-E in the 2-hop neighbor of MP-D, the hop number is 1 and 2, respectively. In the case of MP-B selected as MPP set, to reach both of MP-A and MP-E, the hop number is one. Thus, the number of retransmissions by MP-B is smaller than by MP-C, and then MP-B should be selected as MPR set of MP- D. The OLSR-based MPR also can be calculated based on the willingness of MP to do as a MPR. MPs advertise their MPR information in the periodic Hello frames denoted as MPR-adv frame in Figure 7. To do this, MP sets DA as the broadcast address, SA as itself MAC address, and involves the MPR information in the frame body of MPR-adv frame. Upon receiving this broadcast frame, neighbor MP adds the MAC address of SA in MPR-adv frame to its MPR selector set, if itself MAC address is not included in the MPR set written in the frame body. For example, upon receiving the MPR-adv frame from MP-D, MP-B adds the MAC address of MP-D to its MPR selector set if its MAC address is involved in the MPR set written in the frame body of MPR-adv. Then, MP-B retransmits the broadcast frame from MP-D to its MRP selector set.

B D

(1) MPR-adv

DA SA BSSID FC Du MC MPR Set FCS MAC:FF MAC:D MAC:D

Figure 7 - Transmission of MPR-adv frames to advertise the MPR set information.

Submission page 15 Bing Zhang, NICT et al. Sep 2005 doc.: IEEE 802.11-05/0588r22

5.2.3. Topology Control Messages

To advertise the links to all MPs of its MPR selector set, MP generates a TC (Topology Control) frame disseminated to the entire network, shown in Figure 8. For example, upon receiving the TC-adv frame from MP-D denoted as (1) in Figure 8, MP-B holds a table including the links to all MPs of its MPR selector set based on the frame body, and then forwards it by resetting TA from the MAC address of MP- D to the MP-B’s one, denoted as (2). In this way, MP can take the MPR selector set information of all MPs based on the periodic TC-adv frame transmission, to build the whole network topology. Based on the network topology information, the optimal routing to all MPs can be obtained, which is kept in the OLSR-based routing table. Note that SA in the TC-adv frame header is fixed to the address of MP-D in Figure 8, which is the originator address of MPR selector set information. When the address 3 of management is used to express the other address such as Mesh ID, shown in Figure 3, etc. the originator address for the MPR selector set information can be included in the frame body.

A B D

(1)

(2)

(1) TC-adv DA TA SA MPR FC Du MC FCS MAC:FF MAC:D MAC:D Selector Set

(2) TC-adv

DA TA SA MPR FC Du MC FCS MAC:FF MAC:B MAC:D Selector Set

Figure 8 – Transmission of TC-adv frame including the links to all MPs of its MPR selector set.

Submission page 16 Bing Zhang, NICT et al. Sep 2005 doc.: IEEE 802.11-05/0588r22

5.2.4. Associated Station Address Table

Because the routing table does not include the route information to the legacy STA associated with Mesh APs, the information which mesh AP is associated with, is needed. Here, we propose that mesh AP generates an ASAT (Associated Station Address Table) frame, which records a MAC address table of legacy STAs associated with it. Figure 9 describes the transmission of ASAT frame to advertise the ASAT information, by setting DA to the broadcast address, and TA and SA to itself MAC address. For example, upon receiving the ASAT frame from MP-D, MP-B takes the ASAT information of MP-D based on the frame body, and adds this information to its ASAT (see Figure 9). Due to MP-B selected as the MPR selector set of MP-D, it forwards the ASAT frame to the neighbors, denoted as (1). Thus, mesh AP can obtain the ASAT information of all mesh AP by flooding the ASAT frames. Based on the ASAT, the routing table can be obtained to forward the frame destinated to the STA to the associated mesh AP.

A B D

(1)

(2)

(1) ASAT-adv

DA TA SA FC Du MC ASAT FCS MAC:FF MAC:D MAC:D

(2) ASAT-adv

DA TA SA FC Du MC ASAT FCS MAC:FF MAC:B MAC:D

Figure 9 – Transmission of ASAT-adv frame

Submission page 17 Bing Zhang, NICT et al. Sep 2005 doc.: IEEE 802.11-05/0588r22

5.3. Unicast Routing

Figure 10 shows the procedures how the frame from a STA can be forwarded to another STA based on the routing and association tables kept by every MP. In (1), STA-G sends a data frame by setting DA to the MAC address of STA-H, SA to the MAC address of STA-G, BSSID to MAC address of mesh-AP-D. In (2), upon receiving the frame from STA-G, mesh-AP-D learns that STA-H is associated with mesh- AP-A from its ASAT, and then forwards this frame to mesh-AP-B based on its routing table. In (3), similarly with (2), mesh-AP-B forwards the frame to mesh-AP-A by setting RA to mesh-AP-A, TA to mesh-AP-B. In (4), mesh-AP-A detransforms the WDS frame into the frame of infra-mode, and finally sends it to STA-H.

H A B D G

(1) (2) (3) (4)

(1)

BSSID SA DA FC Du Data FCS MAC:D MAC:G MAC:H (2) WDS-uc RA TA DA SA FC Du MC Data FCS MAC:B MAC:D MAC:H MAC:G (3) WDS-uc RA TA DA SA FC Du MC Data FCS MAC:A MAC:B MAC:H MAC:G (4) DA BSSID SA FC Du Data FCS MAC:H MAC:A MAC:G

Figure 10 - Transmission of the data frame from STA-G to STA-H

Submission page 18 Bing Zhang, NICT et al. Sep 2005 doc.: IEEE 802.11-05/0588r22

5.4. Broadcast Routing

Figure 11 shows the procedures how the frame from STA-G can be broadcasted to all STAs. First, STA- G sends the frame of (1) by setting DA to the broadcast address, SA to itself MAC address and BSSID to the MAC address of mesh-AP-D. Upon receiving the frame from STA-G, mesh-AP-D then broadcasts the frame of (2) to all neighbor MPs by setting TA to the MAC address of mesh-AP-D, and the frame of (3) to all STAs associated with it, by setting BSSID to the MAC address of mesh-AP-D. Due to mesh-AP-B selected as the MPR of mesh-AP-D, it broadcasts the frame of (4) to all neighbor MPs by setting TA to the MAC address of mesh-AP-B, and the frame of (5) to all STAs associated with it, by setting BSSID to the MAC address of mesh-AP-B. Finally, mesh-AP-A broadcasts the frame of (6) to all STAs associated with it, by setting BSSID to the MAC address of mesh-AP-A.

A B D G

(1) (2) (4) (3) (5) (6)

(1)

BSSID SA DA FC Du Data FCS MAC:D MAC:G MAC:FF (2) WDS-bc DA TA SA FC Du MC Data FCS MAC:FF MAC:D MAC:G (3) DA BSSID SA FC Du Data FCS MAC:FF MAC:D MAC:G (4) WDS-bc DA TA SA FC Du MC Data FCS MAC:FF MAC:B MAC:G (5) DA BSSID SA FC Du Data FCS MAC:FF MAC:B MAC:G (6) DA BSSID SA FC Du Data FCS MAC:FF MAC:A MAC:G

Figure 11 - Transmissions of broadcast frame from STA-G.

Submission page 19 Bing Zhang, NICT et al. Sep 2005 doc.: IEEE 802.11-05/0588r22

5.5. Multicast Routing

To deliver the multicast frames, it is necessary to make a management table recording a list of the MAC address of MPs belonging to the multicast group. This management table is maintained by the multicast group leader, such as Mesh Portal, and broadcasted periodically on the whole network. Thus, the information of the multicast group can be shared by each MP in the mesh network. When MP wants to participate in the multicast group, it sends a control frame of "Join Request" to the group reader. Upon receiving the control frame of “Join Request”, the group leader determines whether the MP may participate in the group. In the case where the request for participation is not permitted for some reasons such as the restriction of the number of group member, the group leader notifies it by unicasting a control frame of “Join Reply”. In another case where the request for participation is permitted, the multicast group leader notifies to all MPs in the networks by broadcasting the control frame of “Join Reply”. MP that receives the control frame of "Join reply" updates its management table including the MAC address list of the multicast group members. Based on the management table of multicast group hold by each MP, when MP receives the multicast WDS frames, it can know whether to forward it or not. Figure 12 shows the transmission of multicast frames from MAP-A to the multicast group members MAP-B, D and G.

A B D G (1) (2) (3)

(1) WDS-mc MA Multicast address

DA TA SA FC Du MC Data FCS MAC:MA MAC:A MAC:A (2) WDS-mc

DA TA SA FC Du MC Data FCS MAC:MA MAC:B MAC:A (3) DA BSSID SA FC Du Data FCS MAC:G MAC:D MAC:A

Figure 12 – Transmission of multicast frame from MAP-A

By referring to the multicast management table, routing table and ASTA, respectively, each MP retransmits the received multicast frame if the multicast member is located in the area where it can be connected with number of hops. When MP wants to quit from the multicast group, it sends a control frame of "Depart request" to the group reader. Similarly to the participation in the multicast group, the group leader notifies the permission or no permission of secession by sending a control frame of “Depart reply”.

Submission page 20 Bing Zhang, NICT et al. Sep 2005 doc.: IEEE 802.11-05/0588r22

5.6. Routing with Different Metrics

5.6.1. Distribution of Link Metrics

By default, hop count is used as the routing metric. But hop count can not actually reflect the cost of forwarding packets. Some other metrics are necessary. In order to use link metrics other than hop count, each MP in the network has to monitor the link status and map some kinds of link quality into link metric. The link status includes traffic load over a link, the average delay of the transmission of a packet by the link, the instantaneous RSSI of the link, In general, OLSR TC message only carries the link state entry. In order to distribute the link metric together with the topology, a flag in TC message reflects what kind of link metric is being used. All the MPs must agree to use the same link metric.

Message Size Time To Live Metric type=HOPCOUNT Advertised Neighbor Main Address1 Advertised Neighbor Main Address2

Figure 13 - Normal TC message with hop count as the metric.

Message Size Time To Live Metric type Advertised Neighbor Main Address1 Metric1 Advertised Neighbor Main Address2 Metric2

Figure 14 - New TC message with metric other than hop count.

5.6.2. Routing table calculation

 Initial conditions: Topology table ttable, each topology entry, te, has three important members: te->originator, the originator of the message te->neighbor[i], the ith neighbor of the originator te->linkmetric[i], the link metric between the originator and its ith neighbor

 Procedures for calculating the routing table rtable

1 All the entries in rtable are removed.

2 Find te in ttable so that te->originator equals self address, add self address to rtable as rt with rt->metric 0, set rt->processed flag to true.

3 For each neighbor te->neighbor[i] with a flag SYM or MPR add {dst=te->neighbor[i], next= te->neighbor[i], metric=te->linkmetric[i]} to rtable set rt->interface to the interface through which te->neighbor[i] is reachable.

4 find rtm with the minimum metric among the routes with processed flag not set.

5 If (rtm == NULL) rtable is calculated, end;

6 Find in ttable the entry, te, te->originator == rtm->dst Submission page 21 Bing Zhang, NICT et al. Sep 2005 doc.: IEEE 802.11-05/0588r22

7 For each neighbor in the topology entry, te->neighbor[i] with a flag SYM or MPR newmetric = rtm->metric + te->linkmetric[i] find the route entry rt in rtable, rt->dst == te->neighbor[i] if (!rt) add {dst=te->neighbor[i], next= rtm->next, metric=newmetric} to rtable set rt->interface to the interface through which rtm->next is reachable else if (rt->metric >= newmetric) replace rt with {dst=te->neighbor[i], next= rtm->next, metric=newmetric} set rt->interface to the interface through which rtm->next is reachable

8 Set rtm->processed flag to be true.

9 Go to step 4

Submission page 22 Bing Zhang, NICT et al. Sep 2005 doc.: IEEE 802.11-05/0588r22

5.6.3. Pseudo Flow-based Load Balancing

Since every traffic flow over the WLAN Mesh tends to choose the same minimum hop route, it then results that some MPs / links are heavily loaded. Those MPs / links have a high risk to become congested, and hence the quality of the corresponding traffic is degraded. To solve this problem, dissolving the concentration by dispersing the load is needed.

5.6.3.1. Pseudo Flow Management

The load dispersing can be performed by forming multiple paths from an MP to a destination MP. However, if load is balanced by dispersing per packet toward the multiple paths irrespective of the each service traffic flow, the packet arrival in the same flow may be disordered. Thus, the mechanism of keeping the packets of the same flow in order is favourable. Though a certain traffic flow cannot be exactly discriminated with the MAC frame header, a flow can be roughly identified with a pair of “Source Address” and “Destination Address” or a pair of “Transmitter Address” and “Destination Address” in the WDS frames (see Table 9). Here, we call the flow identified with the above method as “Pseudo Flow” The Pseudo Flow is managed by assigning the Pseudo Flows to a path based on the monitor of Pseudo Flow load. Once the allocation of a Pseudo Flow to a path is finished, it is considered to be unchanged as long as the Pseudo Flow is active (i.e. packets flow through the Pseudo Flow), to keep the packet of the same flow in order. Figure 15 shows how to assign multiple flows of f2 and f3 to the same destination. The f1 and f2 already exit, and the load of f2 is heavier than f1. When a new flow of f3 comes, the same path with the flow of f2 is usually chose, when the routing metric is calculated only by hop count. In our scheme, a different path with f2 can be selected by using the load related metric.

p1 5 8 3 p1 2 1 f1 p1 f2 f3 0 7

p2 p2 p3 2 p3 6 10 9 4

Figure 15 - Assignment of multiple flows to the same destination.

5.6.3.2. Pseudo Flow Table

A Pseudo Flow is identified with a pair of “Source Address” and “Destination Address” or a pair of “Transmitter Address” and “Destination Address” in the WDS frame (see Table 9). Using such an identifier, the load of the Pseudo Flow can be monitored.

Submission page 23 Bing Zhang, NICT et al. Sep 2005 doc.: IEEE 802.11-05/0588r22

Table 9 - Examples of Pseudo Flow Table (cf. Figure 15)

Type 1 Type 2 PF Index SA DA load PF Index TA DA load

f1 8 7 3 f1 1 7 3 f2 8 10 2 f2 1 10 2 f3 9 7 3 f3 2 7 3

5.6.3.3. Extended Routing Table with the Load Related Metric

An routing table basically contains route whose metric to each “Destination Address” MP is minimum one. The load related metric can be calculated by a summation of intermediate MP’ queue lengths or that of frame numbers from the current MP to the destination MP. When a Pseudo Flow becomes active, the intermediate MP selects an optimal route to the destination MP with a minimum load related metric. When a path for the new Pseudo Flow is determined, it is locked until this Pseudo Flow comes to an end, and then the load metric in the routing table is updated (see Table 10). When a Pseudo Flow becomes inactive, it will release the assigned path.

Table 10 - Example of Extended Routing Table ( cf. Figure 15)

Path Index RA DA load metric assignment p1 3 7 9 f1 p2 4 7 13 f3 p3 4 10 12 f2

To measure the load, we can monitor the lengths of every intermediate MP’s buffer queues, or count the number of frames from the current MP to the destination MP. Main triggers to update the Extended Routing Table are the activation of a Pseudo Flow and the detection of inactivity of a Pseudo Flow. Additionally, when the resource like buffer on a certain path is seriously exhausted, it should also become a trigger. Such exhaustion occurs as a result of the increase of some Pseudo Flows’ load and it means a risk (or a fact) of congestion in the path. It should become a trigger of Emergent Reassignment. Figure 16 shows this Emergent Reassignment case where the Pseudo Flow f4 from MP-9 to MP-10 already assigned to the path of p3 from MP-0 to MP-10 through MP-4. When the Pseudo Flow f4’s traffic increases, it then results in a critical tightness of resources on the path p2 and p3. Since Pseudo Flow f3 from MP-9 to MP- 7 has an alternative path of p1 whose resource is not tight yet, the Pseudo Flow f3 can be reassigned to the path of p1 from MP-0 to MP-7 through MP-3.

When two or more RF modules are used by some MPs, for example two RF modules are used on a link between MP-0 and MP-4, pathes are identified by more indexes in addition to the channel information (see Table 11).

Table 11 - Example of Extended Routing Table with 2 RF Modules ( cf.Figure 17)

Path Index RA DA channel load metric assignment p1 3 7 0 9 f1 p2 4 7 0 6 p3 4 7 1 7 f3 p4 4 10 0 5 p5 4 10 1 7 f2

Submission page 24 Bing Zhang, NICT et al. Sep 2005 doc.: IEEE 802.11-05/0588r22

5 8 3 p2 1 p1 f1 p1 f2 f3 0 7 f4 p3 p2 p3 2 p2 6 10 9 4

Figure 16 - Emergent Reassignment of a flow to an alternative path.

p1 5 8 3 p1 1 f1 f2 f3 0 7

p3 p3 p2 p5 2 p4 6 10 9 4 p5

Figure 17 - Assignment of multiple flows with handling multiple channels.

5.6.4. Selection of Strong Links

When hop count is used as the path metric in the wireless mesh networks, the routes tend to have a short hop count and contain weak links. High PER of weak links causes retransmissions, which consume bandwidth. In addition, it takes much more time for the weak links to transmit a packet at a low communication rate. As a result, the weak links become the bottleneck of a route. This adversely affects Communications over other strong links sharing the same wireless channel. Hence, the throughput of the whole network is degraded.

When OLSR routing protocol is running, each MP periodically exchanges the hello packet. Upon receiving a hello packet, an MP knows the RSSI for the current link. If the RSSI is very weak, the weak

Submission page 25 Bing Zhang, NICT et al. Sep 2005 doc.: IEEE 802.11-05/0588r22 link is substituted by some other link. In order to select the strong links, RSSI can be divided into several non-overlapping range, each mapping to one link metric, with the big RSSI corresponding to smaller link metric, as shown in the Figure.

-60dBm -65dBm -70dBm -75dBm RSSI

Metric 1 2 3 4 5

Figure 18 – Metric corresponding to RSSI.

Submission page 26 Bing Zhang, NICT et al. Sep 2005 doc.: IEEE 802.11-05/0588r22

6 QoS Support for Multimedia Communications

6.1. Priority Control

6.1.1. Motivation

Multimedia applications require the QoS (Quality of Service) support, which is a challenging task over wireless networks. The DCF channel access scheme of the IEEE802.11 LAN standard 3 tries to provide the channel access with equal probabilities to all stations contending for the channel access in a distributed manner. However, equal access probabilities are not desirable among stations with different priority flows (traffics). Therefore, Task Group E introduces the Enhanced Distributed Channel Access (EDCA) 4, which is an extended DCF for QoS enhancement.

Although the EDCA provides differentiated service to flows with different priorities, it suffers from inability to provide fair-service to the flows that have an equal priority, especially when the network is characterized by a multi-hop wireless topology. This can be explained as follows. With the EDCA, a single MAC has multiple queues that work independently, in parallel, for different priorities. As a result, frames with a higher priority can get a higher chance in accessing to the channel compared to frames with a lower priority. On the other hand, the frames that have the equal priority are inserted to the same FIFO buffer in MPs, and thus have the equal chance on accessing to the channel. However, it does not mean that the flows with the same priority can achieve the equivalent performance. For example, if we consider delay-sensitive traffics, having the same priority in the EDCA protocol does not mean that they can obtain the equivalent delay for all traffics. This is because end-to-end delay of a frame is highly dependant on the number of hops it traverses and the congestion-condition at its relay MPs.

Here, we consider an example shown in Figure 19. Four VoIP flows exist in the nine-MP mesh topology. As the flows are in the same type of traffics, all the frames have the equal chance on accessing to the channel.

9 6 3 Flow1: VoIP, number of hops: 3, Source: MP-4, Destination: MP-9 Flow2 Flow4 Flow2: VoIP, number of hops: 1, Source: MP-5, Destination: MP-6 Flow3 8 5 2 Flow3: VoIP, number of hops: 2, Source: MP-2, Destination: MP-8 Flow1 Flow4: VoIP, number of hops: 2, Source: MP-2, Destination: MP-6

7 4 1

Figure 19 - Flow performance is highly dependant on number of hops it traverse and congestion condition at its relay MPs.

Let us compare delay characteristics of Flow1 and Flow2. Flow1 is relayed three times until it reaches its destination whereas Flow2 is relayed only once. Therefore, Flow1 may get longer end-to-end delay compared to Flow2 does. Obviously, if difference of the number of hops is very large, it may even result

Submission page 27 Bing Zhang, NICT et al. Sep 2005 doc.: IEEE 802.11-05/0588r22 to the situation that Flow1 is not be able to meet its delay requirements, but Flow2 reaches its destination with time to spare. This could be the critical QoS issue in a mesh network because of its multi-hop nature. Now, let us consider of Flow3 and Flow4. Although both flows traverse two hops, Flow3 may get a longer end-to-end delay compared to Flow 4 gets. This is because Flow3 is relayed by MP-5 which already has two more flows (Flow2, Flow1) in addition to Flow3. Therefore, compared to Flow4, frames of Flow3 would be kept longer in the MP-5’s buffer, because of its congested condition. Again, this problem could be the issue in multi-hop mesh networks.

From the examples above, it is clear that the end-to-end delay characteristic of a flow is highly dependant on the number of hops and/or the congestion condition at its relay MPs. It is obvious that these QoS issues will be left unsolved even IEEE 802.11e technique is applied to mesh networks. To extend the IEEE 802.11e EDCA techinique, we introduce several schemes to provide delay-based priority control among flows that have the same priority in the IEEE 802.11e.

6.1.2. Delay-based Priority Control Schemes

In this section, we describe three delay-based priority control schemes to enhance the IEEE 802.11e EDCA scheme for flows, that are in the same AC (access category). The first scheme is based on the number of hops; which then is the simplest among the three. Opposed to it, the second and third proposed schemes, which are based on congestion condition at relay nodes and time-stamp, respectively, require additional information exchange among nodes. Note that we here do not consider flows that are in different access categories in the EDCA. In this case, the EDCA MAC network is equivalent to the DCF MAC network where all the nodes have a single FIFO buffer on their MAC layer.

6.1.3. Priority Control Scheme based on Number of Hops

As it is mentioned earlier, larger the number of hops is longer the end-to-end delay. Therefore, we propose a scheme that enables relay MPs (including source MPs) to provide priority control among flows based on number of hops they traverse. The priority control scheme takes the following steps, shown in Figure 20.

1) An MP becomes ready to send a frame from a certain buffer.

2) The MP checks number of hops for the first K frames in the buffer, where K is an integer (K>0). Here, number of hops can be defined as the number of hops the frame traverses either a) from the node itself to the destination or b) from the source to the destination (end-to-end). Depending on which way is in use, the MP knows number of hops corresponding to a frame as follows.

a) By referring the destination address on the frame’s header, the MP gets the number of hops from itself to the destination node from the routing table.

b) By referring the addresses of the source and the destination on the frame’s header, the MP calculates the end-to-end number of hops by adding the number of hops from itself to the destination and from itself to the source.

3) The MP compares the values of number of hops for the first K frames in the buffer.

Submission page 28 Bing Zhang, NICT et al. Sep 2005 doc.: IEEE 802.11-05/0588r22

4) The node sends the frame which has the largest number of hops value.

6 3 Routing Table at MP-2 Dst Frame2: Src =MP-3, Dst = MP-4 TTL (Metric )113142 1 1 5 4 2 t 2 Frame1: Src =MP-3, Dst =MP-1 Flow2 Flow1

The number of hops for Frame 2 is larger than one of Frame 4 1 1 for both from itself to the destination and end-to-end hops ↓ Frame2 is sent first with a higher priority

Figure 20 - Priority control scheme based on number of hops (K=2).

6.1.4. Priority Control Scheme based on Congestion Condition at Relay MPs

Although the previous scheme does not require any extra information exchange among MPs, it does not consider congestion condition at relay MPs. Here, we describe another scheme based on congestion condition at relay MPs. Congestion condition at an MP is measured by the mean queue length of its buffers. The mean queue length of a buffer is measured periodically at each MP and broadcasted throughout the network. The mechanism to measure congestion condition for a buffer is as follows.

1) In every time period τ, the MP measures the average queue length of each buffer.

2) If the buffer has been empty for the time period τ, the queue length is set to zero.

In this way, each MP measures queue length for its individual buffers (see Figure 21).

Submission page 29 Bing Zhang, NICT et al. Sep 2005 doc.: IEEE 802.11-05/0588r22

Buffer1 Buffer2 Buffer3 BufferQueue length1q 2q 3q 8q 1 2 3 8

Figure 21 - Measuring queue length of individual buffers

The priority control scheme takes the following steps.

1) In order to exchange information on congestion condition at each relay MP, a “cumulative queue length” field is created on routing table at each MP.

2) After measuring queue length of each buffer, MPs create mesh measurement frames (refer to for the frame format) and broadcast them throughout the network for information exchange.

3) When a MP received queue length information from its neighbor MP, it further forwards the frame after updating the information of the congestion condition of the neighbour node.

4) By repeating the step 3) throughout the network, it enables each MP to know the congestion condition of any other MP in the network.

5) When a MP determines a route to any destination in the network, it calculates the cumulative queue length corresponding to the route (see Figure 22), by summing up all the queue lengths at each relay MPs on the path. The calcuted value is set in the “cumulative queue length” field of its routing table.

Routing Table at MP-3 Buffer Queue length Buffer Queue length Destination Next Cumulative queue 3 [Kbyte] [Kbyte] hop length 1 10 1 10 Buffer Buffer2 2 40 2 20 1 1 2 60 80 5 Buffer Queue length 4 2 80 120 t 2 [Kbyte] 5 2 60 80 1 50 2 2 10 20 2 60 Routing Table at MP-1 Destination Next Cumulative queue hop length 4 1 Buffer Queue length Buffer1 Buffer2 Buffer Queue length [Kbyte] 3 2 70 100 [Kbyte] 1 20 5 4 40 70 1 20 2 2 20 40 2 40 2 30 4 4 20 40

Figure 22 - Information exchange of queue length at each MP

Submission page 30 Bing Zhang, NICT et al. Sep 2005 doc.: IEEE 802.11-05/0588r22

Finally when an MP is ready to send a frame from a buffer, it follows the steps below.

1) Becomes ready to send a frame from a specific buffer.

2) Checks the cumulative queue length field on the routing table for the first K frames in the buffer.

3) Sends the frame which has the longest cumulative queue length.

6.1.5. Priority Control Scheme based on Time-stamp

We consider a priority control scheme based on time-stamp. End-to-end delay for a traffic is estimated by using mesh measurement frames. Transmitter MPs of the traffic perform delay-based priority control based on this measurement result. As shown in Figure 23-(a), creating a measurement frame and updating process is performed with the following steps.

1) The source MP originates a mesh measurement frame, where the command field is set to 0 (a request frame), the element field is set to 1 and the delay field is set to 0 (refer to for the frame format).

2) The source inserts the frame to its appropriate buffer.

3) When the source is ready to send the frame, it updates the field by the sojourn time of the frame in its buffer. Each relay MP of the frame updates the delay field by adding sojourn time of the frame in their buffer to the previous value of the delay field (see Figure 23).

The sojourn time of a frame at a transmitter MP is calculated as 4)-5).

4) Each transmitter MP (including the source MP) records the mesh measurement frame’s arrival time (arrival_time), when it receives the frame.

5) The “delay” field is updated at each transmitter by addition of the difference value between the current time denotes as current_time and arrival_time”, just before the frame being sent out (see Figure 23-(b)). The value calculated with “current_time-arrival_time” represents sojourn time of the frame in the buffer.

It is obvious that delay value of the frame at any transmitter indicates the time cost for the frame from the source to the transmitter. Therefore, when the previous steps have been performed until a transmitter MP, the MP would only know the delay of the frame from the source MP to itself. For delay-based priority control, the transmitter MPs may need to know the end-to-end delay of a frame. In order to enable transmitter MPs to know the end-to-end delay of the path, a report frame is created and used as follows.

6) After steps 4) and 5) have been performed at each transmitter MP, the request frame reaches its destination MP with a cumulative delay record that indicates the end-to-end delay of the path.

7) When the destination MP receives the request frame, it creates a report frame, where command field is set to 1, element field is set to 1 and the delay field is set to a copy of the delay field of the correspondent request frame. After creating the report frame, the destination MP sends the frame back to source MP of the request frame.

8) When the report frame arrives at a transmitter MP, the MP keeps a copy of the end-to-end delay value of the report frame and forwards the report frame to the source MP of the request frame.

Submission page 31 Bing Zhang, NICT et al. Sep 2005 doc.: IEEE 802.11-05/0588r22

Frame has been arrived

Record the arrival time: arrival_time = current_time Frame is ready to be sent

Is it the source No Update the “delay” field: MP? delay =+ current_time-arrival_time Yes

Initialize the delay field: delay = 0 Send the frame

Insert the frame to the appropriate buffer

0 (a) Recording arrival time when frame has been arrived

Figure 23 - Initializing and updating "delay" field.

From steps (1)-(7), any transmitter MP on a path learns (a) the end-to-end delay from the delay field of a report frame, and (b) the delay from the source MP to itself from a request frame. Therefore, delay from the MP to the destination can be calculated as the difference between the delay values (a) and (b).

Finally when an MP is ready to send a frame, it takes the following steps.

1) Ready to send a frame from a particular buffer

2) Compares delay values of the first K frames in the buffer

3) Sends the frame which has the longest delay

6.1.6. Mesh Measurement Frame Format Details

In 4 and , MPs exchange information (queue length and delay) to perform delay based priority control. For these information exchanges, action frames of mesh measurement category are used. Table 12 shows the frame body format of the mesh measurement frame (refer to subsection 4.4.6 about action frame).

Table 12 - Mesh Measurement Frame Format

Category (2 bits) Command (4 bits) TID (4 Element (2 bits) Value (4 octets) bits) 0 (Queue length 0 (Request) Queue length 0 (Mesh time) TID Measurement) 1 (Report) 1 (Time Stamp) delay

As shown in Table 12, mesh measurement action frame’s body contains category, command, TID, element, and value fields. The command field indicates whether the frame is a request or a report of the

Submission page 32 Bing Zhang, NICT et al. Sep 2005 doc.: IEEE 802.11-05/0588r22 measurement. The TID field indicates which traffic category the measurement involves. The element field indicates the measuring element (queue length, time stamp etc), and the value field contains the measured value.

Submission page 33 Bing Zhang, NICT et al. Sep 2005 doc.: IEEE 802.11-05/0588r22

6.2. Frame Aggregation

6.2.1. Motivation

When the CSMA/CA method is used, the throughput obtained by the different size of the transmitted data frame may be different. For instance, the throughput is degraded when the frame size becomes small, even though the totlal amount of transmitted data is the same. One of reasons is that the number of generated data frame increases as the frame size becomes small, which results in the overhead increasing. Another reason is that because it is needed to wait for a random backoff time for the transmition of one data frame, the entire waiting time increases as the number of frames increases, which also results in the throughput degradation, Here, we consider a VoIP(Voice over IP) application that the frame with a small size continues. Thus, the desirable throughput for the VoIP application may not be achieved due to the VoIP frames with a small size. To solve this problem, we propose a frame aggregation scheme by integrating two or more short frames into one frame on the Mesh AP. Our proposed scheme can improve the throughput by decreasing the number of transmitted data frame, which results in the reduction of the total amount of waiting time and overhead.

6.2.2. Frame Aggregation Schemes

In this subsection, we propose three frame aggregation schemes in consideration of the features of WLAN Mesh network. Figure 24 shows an example of frame aggregation based on the proposed three schemes.

STA5 STA4 MAP6 MAP5

R1 MAP1 MAP2 MAP3 MAP4 MC-Ag STA3 STA1 STA2 NH-Ag

Tun-Ag

Figure 24 – An Example of Frame Aggregation

6.2.2.1. Tun(Tunneling) Aggregation Scheme

Here,, we consider the case where STA1 and STA2 associated with the MAP4 have the same address of DA such as R1 shown in the figure. In this case, the frames from STA1 and STA2 are relaid to MAP1 that is connected to R1 Because STA1 and STA2 have no need to learn the routing information from MAP4 to MAP1, it can be considered that a tunnel path is set between MAP4 and MAP1. This aggregation scheme can be applied to aggregate the frames with the same address of tunnel path exit into one frame. Figure 25 shows an example of Tun-aggregation frame format, where the information on the number of aggregrated frames, sizes and tolerant delay is included in the AggInfo field.

Submission page 34 Bing Zhang, NICT et al. Sep 2005 doc.: IEEE 802.11-05/0588r22

Egress MAP address Ingress MAP address RA TA DA SA Frame Body DA SA Body DA SA Body FC Du SC QC MC Agg FCS MAP3 MAP4MAP1 MAP4 Info R1 STA1 Data R1 STA2 Data

Ether Frame Format

Figure 25 – Tunneling Aggregation Frame Format

6.2.2.2. NH(Next Hop) Aggregation Scheme

We here consider the case where STA4 and STA3 are associated with MAP5 and MAP3, respectively, which DA addresses are different, shown in Figure 24. In this case, two or more frames are transmitted by aggregrating these frame into one frame, when these frames traverse cross the same link between the intermediate MAPs (Next Hop MAP). The frames from STA3 and STA4 are aggregated on the link between MAP3 and MAP2. Based on the proposed scheme, the frames are aggregated on every link. Moreover, Figure 26 shows an example of NH-Aggregration frame format.

RA TA DA SA Frame Body DA SA Body DA SA Body FC Du SC QC MC Agg FCS MAP2 MAP3MAP2 MAP3 Info STA5 STA3 Data R1 STA4 Data

Figure 26 - Next Hop Aggregation Frame Format

6.2.2.3. MC(MultiCast) Aggregation (Optional) Scheme

When two or more frames are relaid to the different neighbour MAPs, these frames can be transmitted by aggregrating these frames into one frame with a local multicast address (or broadcast address). However, since the problem such as what timing the frame aggregation is executed and which MAP sends the ACK frame, is unsettled, this mechanism can be performed as an optional function.

6.2.3. Queuing Model

To perform the frame aggregation, two or more frames should temporarily be buffered in MAP. Here, we discuss two kinds of queuing model, shown as Figure 27.

Submission page 35 Bing Zhang, NICT et al. Sep 2005 doc.: IEEE 802.11-05/0588r22 r r e e i i f Push f i i s s s device s device a a l l C Queues C

Forced Delay Queues Queues Pull

a) Push Model b) Pull Model

Figure 27 - Two Queuing Models

6.2.3.1. Push Model with Aggregration Delay

When the frames to the same forwarding destination arrive during the time of "Maximum Aggregation Delay", which is set for each queue, these frames can be aggregated into one frame. In the case where the VoIP application is considered, the "Maximum Aggregation Delay" is set to be a smaller value than the arrival interval of VoIP frame. Hence, it can be prevented that two or more frames from the same STA are queued. Though this scheme can be easily deployed, it has the disadvantage that the delay for the frame waiting to be aggregrated occurs.

6.2.3.2. Pull Model for the Congested Mesh Networks

When one frame transmission is finished, the MP inquires of the queue, where the frames to the same forwarding destination are saved. If the frame remains in the queue, the frame aggregation will be performed. This scheme implies that the frame aggregration is executed only when the frame exists in the queue, that is, the congestion over the WLAN Mesh network may occurs. Hence, the average delay for the frame waiting to be aggregrated can be reduced, because the frame aggregration is not performed all the time.

6.2.4. BEANS( Backward Explicit Aggregation Notification Scheme)

6.2.4.1. Hybrid Frame Aggregation Scheme

In this subsection, we propose a hybrid frame aggregration scheme, which adaptively uses the above two queuing models. The proposed hybrid scheme can achieve an effective frame aggregation by combining with Tun-Aggregation scheme and NH-Aggregation scheme. Figure 28 shows an example of a mesh AP with multiple queues, which hold the frames from the STA and MAP. Based on this scheme, the queuing model can be switched according to the aggregation state of the frame received from the opposite direction.

Submission page 36 Bing Zhang, NICT et al. Sep 2005 doc.: IEEE 802.11-05/0588r22

NH-Ag to NH1 Pull Model to NH2 de-aggregation aggregation from Mesh AP

Queuing with M M M ether frame no A A A to NHn Agg? C C C Aggregation with yes Next Hop MAP same NH address Push Pull to MAP1 Tun-Ag to MAP2 from STA aggregation STA associated with same MAP

Egress MAP Queuing with M M M to MAPn ether frame A A A C C C Egress MAP

Figure 28 – Mesh AP with Multiple Queues

6.2.4.2. Frame Aggregation Procedures

The procedures for the frame aggregration based on the proposed schemes are shown as follows.

1. STA1 and STA2 associated with the MAP4, establish VoIP sessions with the external terminal via gateway (R1), respectively, shown in Figure 29. Since the congestion over the mesh network does not occurs, the frame is individually transmitted to MAP1 without the frame aggregration.

2. Similarly to Step 1, STA3 and STA4 associated with MAP2 and MAP5, respectively, establish VoIP session with the external terminal, shown in Figure 30. Adding to the traffic from MAP4, the traffic between MAP1 and MAP2 will increases.

3. Here, we consider the case where the increase of traffic results in the congestion occurs on MAP1 and MAP2, shown in Figure 31. Since the frames are accumulated in the transmission queue of MAP1 and MAP2, the frame aggregration based on Pull model can be performed. As a result, the downstream frames to STA1 and STA2 are also aggregrated on MAP1. The frame aggregation is detected on MAP4, which receives the frames to STA1 and STA2.

4. When MAP4 detects the frame aggregation, it considers the congestion occurs on the relay MPs, and then changes into Push scheme from Pull scheme to perform the Tun-Aggregation, shown as Figure 32. Thus, Tun-aggregation is executed on MAP4 for the upstream frames from STA1 and STA2.

Based on the above procedures, the congestion on the relay MP is possibly detected by receiving the aggregated frames. According to the congestion state, the frame aggregation can be changed to Push model. Because the delay due to congestion occurs on the Relay MP, it should not be a problem for the delay due to the push model. On the wireless link without congestion, the frame aggregation can be actively performed. Since the proposed scheme notifies the frame aggregation to the backward channel, we call this scheme as BEANS(Backward Explicit Aggregation Notification Scheme),

Submission page 37 Bing Zhang, NICT et al. Sep 2005 doc.: IEEE 802.11-05/0588r22

MAP5 Pull R1 MAP1 MAP2 MAP3 MAP4 STA1 STA2

Figure 29 – Example of Frame Aggregation with Flow 1

STA4 MAP5 Pull Pull Pull R1 STA1 STA2 MAP1 MAP2 MAP3 MAP4

STA3

Figure 30 – Example of Frame Aggregation with Flow 2

STA4 Pull Pull MAP5 Agg detect Agg Congestion! Agg Pull R1 MAP1 MAP2 MAP3 MAP4 STA1 STA2

STA3

Figure 31 – Example of Frame Aggregation with Flow 3

STA4 Pull Pull MAP5 Push Agg Congestion! Agg Agg R1 MAP1 MAP2 MAP3 MAP4 STA1 STA2

STA3

Figure 32 – Example of Frame Aggregation with Flow 4

Submission page 38 Bing Zhang, NICT et al. Sep 2005 doc.: IEEE 802.11-05/0588r22

7 Channel Assignment

7.1. Distributed Channel Assignment

7.1.1. Motivations

If a single channel is used throughout the mesh network, the collision and co-channel interference get very serious in the presence of heavy traffic load. Though it is not realistic that all MPs are equipped with multiple interfaces for its high mobility and compactness, some of MPs, especially Mesh APs, can be designed with multiple interfaces to meet the high performance requests. When an MP is equipped with multiple interfaces, by utilizing CA, multiple channels can be used simultaneously between MPs. Since the traffic can be parallelized over all the available channels, the system performance can be largely improved.

The utilization of multiple channels can either be in the MAC layer 5-6, determining the channel for each outgoing frame by exchanging RTS/CTS, or in the above layer through CA 7-9. Since CA is performed per-frame in the MAC layer, it requires utilization of RTS/CTS for each unicast frame. After the necessary backoff, an MP transmits a RTS to the communication peer when it detects a clear channel and the NAV is not set. The peer MP responds with a CTS. In RTS/CTS, both the duration and the channel negotiation information are contained. A successful RTS/CTS dialogue allocates a data channel for the following transmission of the data frame. All the MPs maintain an NAV for each data channel. When an MP overhears either RTS or CTS, it sets the NAV for the allocated channel.

Though MAC-based CA is simple, it requires RTS/CTS for each frame, even for short frames of real time voice traffic. To transmit RTS/CTS for CA, all the MPs share a single common channel. When the network is heavily loaded, the frequent collision in the common channel degrades the system performance. It is also possible to improve the channel allocation efficiency in the MAC layer. Each time a TXOP is allocated when multiple data frames can be transmitted through a single RTS/CTS dialogue.

CA on the link layer adopts a different policy. An MP can assign a different channel for each of its links, and the combination between channel and link can last for a relatively long time due to the low mobility for the MP, like that in the cell communication. CA in such situations falls into two categories: with common channel and without common channel. Without the specialized common channel, fewer interfaces are required to use a certain number of channels, or more channels can be used with the same number of interfaces. However, both CA and routing get difficult in the absence of common channel. Though by transmitting the routing and management frames over all the channels can partially solve the problem, it requires quick channel switch capability. Sometimes new problems arise. For example, the receiver based CA [9] tries to evenly use all the channels. But the per-frame channel-switch may lead to serious hidden terminal problem because the sender may miss the RTS/CTS and interfere with its neighbor’s reception. The utilization of common channel greatly simplifies the connectivity problem and broadcast/multicast in the mesh networks. In the following CA with common channel is presented. Each MP should monitor the same common channel, over which the control messages and broadcasting messages are transmitted. By this means, each MP within the transmission range can receive the control message and the simple distributed CA protocol is enabled, which simplifies the network auto- configuration.

Our CA is a pairwise scheme. Both ends of each link always share at least one channel and the data frames are always transmitted over the assigned channel. Both the sender and the receiver keeps monitoring the channel, the hidden terminal problem and deafness problem in other schemes will not occur here.

Submission page 39 Bing Zhang, NICT et al. Sep 2005 doc.: IEEE 802.11-05/0588r22

7.1.2. Multi Channel Operation in a WLAN Mesh

7.1.1. Basic Assumption

All the MPs in the mesh network have at least one interface, and MPs may be equipped with multiple interfaces so as to distribute the traffic over all the channels and benefit from channel diversity. So there is necessity to assign channels for the links. In the mesh networks, some MPs, especially Mesh APs, seldom move, so the channel assignment can keep for a relatively long time, just like in the cell communications.

Following are the assumptions for CA of a mesh network:

1. In the Mesh Network, a channel is used as the common channel. This channel is statically configured or selected with a distributed protocol.

2. Each MP has at least one interface. Each MP should monitor the common channel with its common interface.

3. If a MP has two or more interfaces, except the common interface for the common channel, it can use other interfaces as the data interfaces to communicate over the non-common channels with its neighbors that also have two or more interfaces.

4. If an MP has two or more interfaces, the MP should distribute traffic over the non-common channels. Control messages and broadcast/ multicast traffic should be transmitted over the common channel.

5. Each MP should periodically broadcast in the beacon frame, which contains the common channel information.

Figure 33 gives an example. In Figure 33-(a), MP-1 is GW and has four interfaces. MP-2, MP-3, MP-4, MP-5, MP-6, MP-11 have two interfaces. MP-7, MP-8, MP-9, MP-10 have only one interface. Figure 33- (b) gives the result of CA, where links 3-7, 4-10, 7-8, 8-9, 9-10 must use the common channel, while links 1-2, 1-6, 1-11, 3-4, 4-5 can use extra data channels.

wireline network wireline network IF0 11 CH0 IF1 CH1 11 IF2 2 1 CH2 2 1 IF3 CH3

7 3 6 7 3 6

8 4 5 8 4 5

9 10 9 10

(a) Before CA (b) After CA Figure 33 - An example of CA.

Submission page 40 Bing Zhang, NICT et al. Sep 2005 doc.: IEEE 802.11-05/0588r22

7.1.2. Determination of the Common Channel

Some MPs may start almost at the same time and work on different common channels. So the mesh network may be disconnected. It is necessary for all the MPs to share the same common channel so as to maintain the connectivity. This is achieved by appending the common channel information in the periodical beacon frames. Table 13 - New elements in the beacon frame

CAS CAS manager ID CAS_FLAG New common channel Multi-ch capability

In generally, it is up to GW to manage the common channel. If GW does not exist, the MP with the biggest ID becomes the new manager of the common channel. Following are the procedures for the MPs to negotiate a common channel within the mesh network.

1. When the common channel is statically configured, it should be the same for all the MPs.

2. When the common channel is selected dynamically, all the MPs have to maintain the CAS in a distributed way so that all the MPs can finally use the same common channel. A flag CAS_FLAG is used together CAS.

3. When there is a GW in the mesh network, GW should manage the CAS and set GW_CAS bit in CAS_FLAG.

4. When there is no GW, or when an MP fails to detect the GW, the MP with the biggest ID in the mesh network becomes the manager of CAS, it sets TEMP_CAS bit in CAS_FLAG. GW_CAS has higher priority than TEMP_CAS. In the absence of GW, all the connected MPs adopt the same common channel.

5. Periodically each MP tries to broadcast a beacon with CAS, CAS manager ID, CAS_FLAG, New common channel and Multi-ch capability. If the MP is the manager of CAS, it increases CAS, sets CAS_FLAG, puts its ID in the CAS manager ID field, and sets the new common channel in the beacon. Otherwise, the MP copies the saved CAS, CAS manager ID, CAS_Flag and New common channel into the beacon. If the MP has multiple interfaces, it should set the Multi-ch capability field; otherwise, it should clear this field.

6. When an MP receives a beacon if GW_CAS is set, the MP is not GW, and CAS is fresh it saves CAS, CAS manager ID, CAS_FLAG and New common channel else if GW_CAS is not set but TEMP_CAS is set, the MP is neither GW nor the one owning the biggest ID, and CAS is fresh it saves CAS, CAS_FLAG, CAS manager ID, and New common channel. it copies the Multi-ch capability field to the link entry for the sender If the new common channel is different from before, the MP broadcasts a beacon over the old common channel with the new common channel information updates the common channel takes some special operations, as is described in section ??.

7. When an MP is not connected to GW, it periodically scans all the channels, either passively or actively. If it receives a beacon with GW_CAS set, it sends a beacon over the old common channel with the new common channel information; then it switches to the new common channel, and finishes some other required operations, as is described in section ??.

Submission page 41 Bing Zhang, NICT et al. Sep 2005 doc.: IEEE 802.11-05/0588r22

8. When the CAS is managed by the MP with the biggest ID, each time an MP calculates the routing table, it also checks whether the MP with the biggest ID is still-reachable. If negative, it becomes the new CAS manager when it has the new biggest ID.

9. MP ID can be the maximum MAC address of all the interfaces owned by an MP. In the mesh network, OLSR routing protocol is used. By exchanging the topology message, each MP knows the MP ID of all the MPs in the network.

10. When a new MP joins the mesh network, it passively or actively scans the channels. If it receives a beacon with GW_CAS or TEMP CAS, it switches to the new common channel, and finishes some other required operations, as is described in section ??.

wireline network

11

2 1

7 3 6

8 4 5

9 10

wireline network

11

2 1

7 3 6

8 4 5

9 10

(a) Disconnected (b) Connected

Figure 34 - From disconnected network to connected network (with GW).

Submission page 42 Bing Zhang, NICT et al. Sep 2005 doc.: IEEE 802.11-05/0588r22

11 12 2 1

7 3 6

8 4 5

9 10

11 12 2 1

7 3 6

8 4 5

9 10 (a) Disconnected (b) Connected

Figure 35 - From disconnected network to connected network (without GW).

Figure 34 and Figure 35 give the convergence of the common channels for a network with GW and a network without GW respectively. In either case, all MPs finally utilize the same common channel.

7.1.3. Channel Assignment for Non-common Channels

By the operation in section 7.1.2, all the MPs in the mesh network share the same common channels. Each MP knows whether itself is capable of multi-ch. By periodically exchanging beacons, each MP also learns whether its neighbors are capable of multiple-ch. Then all the MPs with multiple interfaces try to assign channels for the links to its neighbors that also have the multi-ch capability.

In CA, it is important that both ends of a link support the multi-ch capability. In order to balance the traffic over all channels, it is necessary to select the least used channel for the link. Following are the two key factors: By periodically exchanging the beacons, an MP knows whether its neighbors have multi-ch capability; in the neighbor entry, it records the multi-ch capability.

Within an MP, each interface keeps monitoring the assigned channel and calculating the percentage of busy time as the channel usage. The interfaces of an MP are using different channels. So the MP learns current channel usage within its transmission area. Periodically each MP sends the modified OLSR hello message, carrying the channel usage information, as is shown in Table 14. When an MP receives channel usage information from the adjacent MPs, it also learns the usage of other channels. An MP calculates the average of the channel usage received from its neighbors and the channel usage it has detected. In this way, an MP knows all the usage of all the available channels and may determine whether a channel is over burdened and take operation to balance the usage.

Table 14 - Modified hello message

Submission page 43 Bing Zhang, NICT et al. Sep 2005 doc.: IEEE 802.11-05/0588r22

Number of Neighbors=M N_1 N_2 … N_M Number of assigned channels=N Ch_1 Ch_1 usage Ch_2 Ch_2 usage … …

The CA contains two kinds of operations: Global CA and the Local CA. Global CA is initiated by GW and performed in an expanding ring way from GW to the leaf MPs. Global CA involves the CA operation for each link. When an MP detects that a channel over a link is over burdened, it can perform Local CA for the specific link.

Distributed CA is through special CA frames. CA Request (CAReq), CA Reply (CARep) and GlobalCA. These frames are defines in the frame body of the Action frame. CAReq and CARep are used for the pairwise CA for a specific link while GlobalCA is used to control the Global CA operation in an expanding ring way. The CA control frames should be transmitted over the common channel through the common interface.

Table 15 - New frame format for CA

Type=00 Subtype=1010 Duration DA SA BSSID Sequence Frame body FCS SA: MAC address of the common interface of the initiator DA: MAC address of the common interface of the responder Frame body for CAReq: Category=CA Command=Request CA Type Desired Channel CAS Frame body for CARep Category=CA Command=Reply CA Type Desired CAS Result Option Channel

Frame body for GlobalCA Category=CA Command= GlobalCA CAS Channel numbers Available Channel 1 Channel 1 usage Available Channel 2 Channel 2 usage … …

Submission page 44 Bing Zhang, NICT et al. Sep 2005 doc.: IEEE 802.11-05/0588r22

wireline network wireline network

11 11

2 1 2 1

7 3 6 7 3 6

8 4 5 8 4 5

9 10 9 10

(a) Before Global CA (b) After Global CA

Figure 36 - Global CA manner and the CA result.

Figure 36 gives an example of Global CA operation. Figure 37 presents the detailed procedure for Global CA and Local CA. In Figure 37 (a), MP-3 assignes channels for the links to MP-7 and MP-4 respectively; then it notifies MP-4 and MP-7 to continue the CA operation. In Figure 37 (b), MP-3 only assigns channel for the link 3-7.

7 3 4 CA Request Change Channel CA Reply Change CA Request Channel Change CA Reply Channel Change Channel GlobalCA GlobalCA

3 7

CA Request Change CA Reply Channel Change Channel

(a) CA steps in Global CA (b) CA steps in Local CA

Figure 37 - CA steps in Global CA & Local CA

7.1.4. Global CA (GCA)

Submission page 45 Bing Zhang, NICT et al. Sep 2005 doc.: IEEE 802.11-05/0588r22

All MPs have already known whether itself is capable of multi-ch and whether its neighbors support multi-ch. When an MP receives a GlobalCA message from its upstream MPs, it starts its round of CA as the temporary initiator. In each round of Global CA procedure, an initiator MP assigns channels for the links to its neighbors that are capable of multi-ch.

Figure 38 gives an example of a single round of Global CA, where MP-1 is GW and has three interfaces. In the figure, MP-1 is the initiator. Of its neighbors, MP-2, 3, 5 and 6 are capable of multi-ch, while MP-4 and 7 do not support multi-ch. MP-1 has three interfaces. One is used for monitoring common channel. The other two interfaces can be assigned channels in any way. So MP-1 gradually determines which channel to be used for a link and which channel to be used for an interface. The channel selection for a link is limited both by the available channels and by the number of interfaces. In the interface table, each entry contains CAS. In the neighbor table, each entry contains CAS. The bigger CAS means freshness in CA procedure. The older CAS means that the interface/link needs CA.

Following is the channel selection procedure an initiator takes for a link in Global CA operation:

(1) Check whether there is a free data interface with older CAS than that in the GlobalCA message.

(2) If such a data interface is found, the initiator should choose for the interface a new channel in the least-used-first manner (check CA usage in Global CA).

(3) If such a data interface does not exist, that is, all the interfaces are used up, of the channels for all interfaces, including both the common interface and the data interface, a channel is selected, either randomly or in the least-used-first manner.

(4) If the selected channel is already used by an interface with a fresh CAS, use that interface for the link.

Following is the post-CA procedure

(5) If the CA for the link is really successful, the assigned channel together with CAS and CA type should be copied to the corresponding neighbor entry.

(6) The assigned channel together with CAS and CA type should be copied to the interface entry. If the new channel is different from the old one, the channel of the CARD needs update.

(7) The association between the link and the interface should be updated.

Generally an MP assigns channels for its links one by one. For each neighbor that is capable of multi-ch, the initiator first chooses a channel for the link in question according to the above rule. Then it sends a CAReq and waits for a CARep. If everything is OK, it will receive a CARep with Result=Success confirming the success of the desired CA. If the Result in CARep is Failure, MP-1 should set the common channel for the link. Some of the links may already have been assigned channels because the peer MPs are nearer to GW than the initiator. In such cases, these links need no CA operation. However, they already occupied some of the interfaces. This factor has been reflected in the channel selection rule. The responder (e.g. MP-2, 3, 5, 6 in Figure 38) may have no free interface to work on the desire channel. In such cases, the responder may suggest the initiator to use one of its currently assigned channels for the link, specifying the suggested channel in the option of CARep. When an initiator receives a CARep with an option, it starts a new CAReq/CARep dialogue with the peer MP, either with the suggested channel if it agrees with the peer MP, or with the common channel if it disagrees with the peer MP.

Submission page 46 Bing Zhang, NICT et al. Sep 2005 doc.: IEEE 802.11-05/0588r22

7 2 common channel

data channel 1

6 data channel 2 3 1 MP with multiple interfaces

5 4 MP with single interfaces

Figure 38 - Global CA operation.

Global CA procedures:

1. GW constructs a new GlobalCA message, zeros the channel usages, increases its CAS and copies the CAS into the GlobalCA message. All the MPs share a single copy of GlobalCA message. The GlobalCA message is forwarded throughout the mesh network, from GW to the leaf MPs, hop by hop; each intermediate node immediately updates the channel usages in the GlobalCA message after it finishes assigning a channel for one of its links.

2. For a temporary initiator MP (including GW),

2.1 The initiator attributes all the neighbors to the common channel group if it does not support multi-ch; otherwise, it attributes the neighbors that do not support multi-ch to the common channel group. The links belonging to the common channel group are assigned the common channel. The initiator only needs to perform the post-CA operation with common interface and common channel for each of these links.

2.2 If the initiator supports multi-ch, for each of the links to its neighbors capable of multi-ch.

2.2.1 If the neighbor entry for the responder already contains a fresh CAS no less than that in the GlobalCA message, CA for the link is already finished (CA by the upstream MPs).

2.2.2 Otherwise, the initiator selects a channel for the link according to the channel selection procedure.

2.2.3 The initiator sends a CAReq with CA Type=GCA to the responder. CAS for the CAReq is copies from the GlobalCA message. The desired channel for the link is contained in CAReq.

2.2.4 The initiator starts a timer and waits for the CARep.

2.2.5 When the initiator receives a CARep with a fresh CAS of GCA type, if the Result is Success and there is no option it performs the post-CA procedure with the assigned channel and the related interface. else if the Result is Failure, but it contains an option if the suggested channel in the option is usable

Submission page 47 Bing Zhang, NICT et al. Sep 2005 doc.: IEEE 802.11-05/0588r22

it goes to 2.2.3 and starts a new CAReq/CARep dialogue with the suggested channel. else it goes to 2.2.3 and starts a new CAReq/CARep dialogue with the common channel. else it performs post-CA procedure with the common channel& interface.

2.2.6 If the timer expires, the initiator increases the failure count. If the failure count is less than the maximum allowable failures, the initiator goes to 2.2.3; otherwise, it performs the post-CA procedure with the common interface & channel.

2.2.7 After the initiator finishes CA for a single link, it updates the channel usage in the GlobalCA message. The channel usage will affect the channel selection for the next link.

2.3 When the initiator finishes the above operation, that is, all its links have channels with a fresh CAS, it forwards GlobalCA in a unicast way to all its neighbors that CA operation has just been done to, including the neighbors capable of multi-ch and incapable of multi-ch.

3. For a temporary responder When an MP receives a CAReq with a fresh CAS of GCA type, it acts as a temporary responder.

3.1 If the requested channel in the CAReq is the common channel, the responder should send a CARep with Result=Success.

3.2 The responder then checks whether itself has multi-ch capability. If negative, it sends a CARep with Result=Failure, and the option contains the common channel.

3.3 Otherwise, the responder checks whether is has a data interface with a fresh CAS and the same data channel. If affirmative, it sends a CARep with Result=Success, containing the specified channel.

3.4 Otherwise, if the responder finds a data interface with a CAS smaller than that in CAReq. Then it sends a CARep with Result=Success, containing the specified channel.

3.5 Otherwise, it sends a CARep with Result= Failure, and the option contains the common channel. After sending a CARep with Result=Success, the responder performs the post-CA procedure for the link with the assigned channel and the related interface. When an MP receives a GlobalCA with a fresh CAS, it becomes the temporary CA initiator and starts to perform CA for all the non-assigned links.

4. When a new MP joins the mesh network, GW may initiate the Global CA operation.

7.1.5. Local CA (LCA)

GW initiates Global CA at the start, when a new MP joins the mesh network, or when it detects that the common channel is shared by an adjacent mesh network. It will affect all the links. In the contrary, local CA is to locally adjust the channel for a single link. In order to locally assign a new channel to a link, the procedures below must be followed.

Submission page 48 Bing Zhang, NICT et al. Sep 2005 doc.: IEEE 802.11-05/0588r22

1. When an MP itself is capable of multi-ch, it periodically checks the channel usage. When a channel is overused and the peer MP is also capable of multi-ch, the MP may try to adjust the data channel.

2. For the temporary initiator 2.1 Channel/link selection The initiator finds which interface is using the overused channel and how many links are sharing the channel/interface. Then one of the links using the channel is chosen for the local CA. The adjustment of data channel for a link sometimes affects other links because the related interface may have to use a channel different from before and some other links are also sharingthe interface.

2.1.1 If a free interface is available, the initiator chooses a channel/interface according to the channel selection procedure.

2.1.2 If the interface related with the link in question is only used by this link, the interface can use any new channel for the link. The initiator chooses a channel according to the channel selection procedure

2.1.3 Otherwise, if the interface related with the link is also used by some other links, the initiator checks whether the channel load can be balanced if other currently used interface/channel is used for the link. If affirmative, the initiator chooses a channel according to the channel selection procedure.

2.2 For the chosen link

2.2.1 The initiator sends a CAReq of LCA type with the desired new channel. The CAS is cleared to 0.

2.2.2 The initiator starts a timer and waits for CARep

2.2.3 When the initiator receives CARep of LCA type, if the Result is Failure, and no option, the MP should stick to the old channel.

2.2.4 Otherwise, if the Result is Success, the initiator performs post-CA procedure for the link.

2.2.5 Otherwise, if the Result is Failure and the option field contains a valid channel, and the initiator finds that some other interface is already using the channel, that interface will be used for the link. Then the initiator should go to 2.2.1, sending a new CAReq with the channel in the option.

2.2.6 Otherwise, if the link in question is the only affected link or a free interface exists, the initiator may adopt the recommended channel, and go to 2.2.1, sending a new CAReq with the channel in the option.

3. For a temporary responder

3.1 When an MP receives a CAReq message of LCA type, it acts as a responder.

3.2 If it finds that one of its interfaces happens to use the same channel as specified in the CAReq, it sends back a CARep message with the same channel to the sender, with Result=Success. Then it performs the post-CA procedure.

Submission page 49 Bing Zhang, NICT et al. Sep 2005 doc.: IEEE 802.11-05/0588r22

3.3 Otherwise, if none of its interfaces in the responder is using the specified channel, and the related interface only services a single link, the responder sends a CARep message with the same channel to the sender, with Result=Success. Then it performs the post-CA procedure.

3.4 Otherwise, if none of its interfaces in the responder is using the specified channel, and the related interface services two or more links, the responder sends a CARep with Result=Failure with the option containing the least used channel in use.

3.5 Otherwise, it sends back a CARep, with Result=Failure without option.

4. When a new MP joins the mesh network, it can establish the data channel with its neighbors by the Local CA operations.

7.1.6. Operation after Channel Update

During CA operation, some of the interfaces may have new channels, and then the association between the interface and channel should be changed. An MP’s connection with its neighbors through one interface may get broken. By using a different interface, a new link can be established. In such case, the post-CA procedure updates the neighbor table and interface table to reflect the actual variations. The routing table also needs refreshment so that each outgoing frame carries the correct interface information, enters the correct interface queue, is transmitted over the desired channel, and is finally received by the peer MP. Only updating the routing table is not enough. Some packets may already wait in the queue with the out-of-date interface information. In the case of frequent Local CA operation, an MP may optionally update the interface information of the packets in the queue so as to reduce the packet loss.

Submission page 50 Bing Zhang, NICT et al. Sep 2005 doc.: IEEE 802.11-05/0588r22

7.2. Portal-Driven Channel Assignment

As more channels can be used in a network with less number of radio modules, the graph topology of assigned channels tends to be complex with strong constraints for channel selection. And the condition of connections between MPs changes with the fluctuation of radio environment, the movement of MPs or the status of transmission of MPs. When the change is frequent enough, the reassignment of the channels to MPs become to be critical. If the distribution of the assigned channels is oriented to be well- fragmented, on the contrary, a MP’s channel reassignment reacts on many other MPs’ and the chain reaction propagates. This propagating chain reaction makes it irreasonable to reassign channels. Also, radio interference range is enough large, then fragmentation of assigned channels is not so effective. This means “well-fragmented” is no more a good feature. Therefore, another strategy of channel assignment is needed, that is, assigning a common channel and assigning the rest of the available channels to the same number of non-fragmented segments of MPs. Communication traffic that goes out of the network passes the Mesh Portals. Then it would be good for channel assignment to start the segmentation from a Mesh Portal.

7.2.1 Backgrounds

If the radio modules one MP can handle are same with its channel number, there is only one strategy that a channel is assigned to a radio module one after another. Then every MP can handle all available channels. When the number of radio modules in one MP is smaller than one of the usable channels, an MP cannot handle all channels at one time. Each MP tries to assign some channels to connect to adjacent MPs choosing least used channels for each link to adjacent MPs, and when there remains radio modules unused, MP assign them least used channels. AS MPs’ density increases, the number of adjacent MPs increases. Then if the adjacent MPs use various channels, it tends to be unable to assign radio modules all of channels that the adjacent MPs use. It is because the radio modules tend to be less than the used channels by the adjacent MPs. Therefore it is needed that adjacent MPs use the not more number of channels than the number of radio modules each MP has. This requires segmenting the assembly of MPs. In general, a network should use as many channels as it can use for maximizing the available throughput in the Mesh. But then MPs are enough many, it is okay that one MP use only one or two channels. Each channel is used by some number of MPs and all channels are used by MPs in the network. Non- fragmented segmentation seems to prevent the channel reuse in a network, but it is not easier even for well-fragmentedly channel assigned network to reuse the channel within a network because one MP’s radio interferes at least 10 times as large area as it enable transmissions. Assupting a practical case such that the number of MPs is less than a hundred and the number of available channels less than ten, equipping two radio modules is enouth for each MP: one for transmission in a segment MP belongs and one for primary transmission like initial, instant and inter-segment transmission.

7.2.2 Segmentation Strategy

The strategy of segmenting the the assembly of MPs can be various. Some are suitable for bursty traffic like P2P within the Mesh and some are for other ones. The point is what can be assumed the most critical service traffic. Here considering the constant bit rate traffic that goes through Mesh Portals the most critical, we introduce segmenting methods Mesh Portals drive. As MPs exchange topology information proactively using a channel, reserving the channel as a common one, a Mesh Portal can resolve its multi- hopped broadcasting tree that is flooding tree. Then the Mesh Portal determines the segmentation for MPs in the Mesh.

Submission page 51 Bing Zhang, NICT et al. Sep 2005 doc.: IEEE 802.11-05/0588r22

7.2.2.1. Channel Assignment by Segmenting

See the figures.

Mesh Portal 3 22 21 24 2 1 11 23 4 25 12 13 26 27 6 5 14 7 15 28 8 16 29 9 30 17 18 10 20 31 19

Figure 39 - An Example of a Mesh Topology.

Mesh Portal

1 11 21

3 4 12 13 23 22

2 6 5 14 15 26 27 25 24

7 8 17 18 16 29 28

9 10 19 20 30

31 :Links for flooding from Mesh Portal 0 1 :Relay MP 2 :Unique MP 13 :Shiftable MP

Figure 40 - Flooding Tree from Mesh Portal.

Submission page 52 Bing Zhang, NICT et al. Sep 2005 doc.: IEEE 802.11-05/0588r22

0 3 22 21 24 2 1 11 23 4 25 12 13 26 27 6 5 14 7 15 28 8 16 29 9 30 17 18 10 20 31 19

Figure 41 - Result of Channel Assingment.

Segmenting CA procedures:

7.2.2.2. Channel Assignment at Merger of Mesh

See the figures.

Submission page 53 Bing Zhang, NICT et al. Sep 2005 doc.: IEEE 802.11-05/0588r22

Mesh Portal 22 3 21 24 2 1 11 23 4 25 12 13 26 27 6 5 Common Channel 14

7 15 28 8 16 29 Common Channel 9 18 30 17 Mesh Portal 22 10 20 21 24 19 3 1 2 11 23 4 25 12 13 26 6 5 27 14 7 15 8 16 29 28 9

Figure 42 - Discretely Formed Networks of a Mesh ID.

Mesh Portal 22 3 21 24 2 1 11 23 4 25 12 13 5 26 27 6 Common Channel 14 7 15 28 8 16 29 9 30 Previous Sub Channel 17 18 => Tune to New Common 10 20 19 Mesh Portal Channel 22 21 24 3 1 2 11 23 4 25 12 13 26 27 6 5 14 7 15 8 16 29 28 9

Figure 43 - Beginning of Mesh Merger.

Submission page 54 Bing Zhang, NICT et al. Sep 2005 doc.: IEEE 802.11-05/0588r22

Mesh Portal 22 3 21 24 2 1 11 23 4 25

12 13 26 5 27 Common Channel 6 14

7 15 28 8 16 29

9 30 Previous Common 17 18 Channel =>Set as New 10 20 19 Mesh Portal Sub Channel 22 21 24 3 1 2 11 23 4 25

12 13 5 26 27 6 14

7 15 8 16 29 28 9

Figure 44 - Result of Mesh Merger.

Merger CA procedures:

Submission page 55 Bing Zhang, NICT et al. Sep 2005 doc.: IEEE 802.11-05/0588r22

8 WLAN Mesh Security

To enhance 802.11i for mesh networks, we here propose a feasible WLAN mesh security scheme performing the authentication and key distribution for secure communications. We propose authentication and authenticator selection mechanisms for multihop mesh topology. These mechanisms establish the secure links between neighboring mesh APs. Therefore, if a problem like the key leakage occurs on the specific link, it does not influence other links by separating the corresponding Mesh AP(s). The proposed scheme can be applied to inter-mesh networks, and able to restore troubles on the Mesh Portal.

8.1 Authentication of Newly Arrived MP

The following is the procedures of connection establishment for newly arrived MP (see Figure 45).

1. The newly arrived MP (MP-5) receives beacon frames from neighbor MPs.

2. MP-5 associates to an MP (MP-2).

3. MP-2 forwards an authentication request from MP-5 to AS. If MP-5 is accepted to be connected, AS creates a key to MP-5.

The procedures above establish a secure link between the newly arrived MP and its neighbor.

AS (Authentication Server)

(3) Authentication MP-1 + Key Derivation

MP-2 MP-3 (1) Beacon

(2) Association MP-4

MP-5 (1) Beacon

Figure 45 - A connection establishment for a new mesh AP.

Submission page 56 Bing Zhang, NICT et al. Sep 2005 doc.: IEEE 802.11-05/0588r22

8.2 Link Establishment between Neighboring MPs

After connecting the newly arrived MP to its neighbor MP, it is needed to create secure connections from this MP to any other non-connected neighbor MPs. In order to obtain PTK for the pair MPs, one of them has to become an authenticator to communicate with AS. The following is the procedures of authenticator selection to establish the linkslink between unconncected MP and its neighbor MPs (see Figure 46).

1 An MP receives a beacon frame from non-connected neighbor MP

2 Authenticator selection mechanism is as follows  If one of the MPs has a route to AS but the other does not, the one which has the route becomes authenticator, and the remaining MP becomes supplicant.  If both of the MPs have routes to AS, the MPs compare hop counts to AS, and the MP that has the shorter hop count is selected as an authenticator, and the remaining MP becomes supplicant.

3 The selected authenticator sends authentication request to AS.

4 If AS permits the request, it creates a PTK for the connection.

The procedures above establish a secure link between an MP and any of its non-connected MP.

Receiving a beacon frame from non-connected neighbor MP

NO Have a route to AS ?

YES

Authenticator selection (Ex: comparing number of hops to AS)

NO Selected as authenticator?

YES

Act as authenticator Act as supplicant

Figure 46 – The flow chart of the authenticator selection.

Now, we consider the case where a Mesh Portal has got some troubles and the connection between Mesh Portal and its neighbour MP is broken. After the Mesh Portal is recovered from the troubles, it communicates with the AS and performs the authentication procedure separately from the mesh network. After being authenticated, a connection procedure between Mesh Portal and the mesh network is performed as shown in Figure 47. The authentication and creation of the secure link between the Mesh Portal and its neighbor MP follows the procedures above.

Submission page 57 Bing Zhang, NICT et al. Sep 2005 doc.: IEEE 802.11-05/0588r22

In our proposal, the secure link is established between neighboring MPs. Therefore, when any trouble occurs on the specific MP, the influence can be localized by separating the corresponding MP.

AS (Authentication Server)

(4) Authentication + Key Derivation

(2) Confirm the path to AS MP-1 (1) Beacon (2) Confirm the path to AS (3) Association

MP-2 MP-3

MP-5 MP-4

Figure 47 - Connection reestablishment between the restored mesh portal and mesh network.

9 Summary

In this document, we describe a proposal that provides a framework for the 802.11s ESS Mesh standard. The proposed scheme has the following basic properties

 A proactive layer-2 routing protocol is specified, which allows the WLAN mesh AP to accommodate the legacy STAs associated with it.  The proposed OLSR-based routing protocol is enhanced by using the RSSI information and performing the flow-based load balancing.  The proposed scheme can provide the QoS support by using the delay-based priority control mechanism, to extend the IEEE 802.11e to the WLAN mesh networks.  To support the multiple radios, a distributed channel assignment scheme with common channel is proposed, which perform the channel assignment in the link layer.  Authentication and authenticator selection mechanisms for multihop mesh network are specified. The mechanisms establish the secure links between neighboring MPs in the network.

To confirm the effectiveness of the proposal, we are currently in the process of performing simulation experiments, and doing the further improvement and refinement.

Submission page 58 Bing Zhang, NICT et al. Sep 2005 doc.: IEEE 802.11-05/0588r22

References

[1] C.E.Perkin, E. Belding-Royer and S. Das, Ad hoc on-demanc distance vector (AODV ) routing, RFC3561, July 2003.

[2] P. Jacquet, P. Muhlethaler, T. Clausen et. al., Optimized link state routing protocol for ad hoc networks, Proc. IEEE, pp.62-68, Decemeber 2001.

[3] IEEE Std 802.11®-1999 (Reaff 2003) Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications.

[4] IEEE P802.11e/D13.0, January 2005 (Draft Amendment to ANSI/IEEE Std 802.11, 1999 Edition (Reaff 2003)) Medium Access Control (MAC) Quality of Service (QoS) Enhancements.

[5] Jain, N.; Das, S.R.; Nasipuri, A., A multichannel CSMA MAC protocol with receiver-based channel selection for multihop wireless networks, ICCN 2001, pp.432 – 439, 2001.

[6] W.C.Hung, K.L.Eddie Law, and A. Leon-Garcia, A dynamic multi-channel mac for ad hoc LAN, 21st Biennial Symposium on Communications, pp. 31–35, 2002.

[7] A.Raniwala, K.Gopalan, T. Chiueh, Centralized channel assignment and routing algorithms for multi-channel wireless mesh networks, ACM Mobile Computing and Communications Review (MC2R), Vol 8, No 2, 2004.

[8] R.Draves, J.Padhye, B.Zill, Routing in multi-radio, multi-hop wireless mesh networks, MobiCom 2004, pp.114-128, 2004.

[9] Pradeep Kyasanur and Nitin H. Vaidya, Routing in Multi-Channel Multi-Interface Ad Hoc Wireless Networks, CS dept. UIUC Technical Report, December 2004.

Submission page 59 Bing Zhang, NICT et al.

Recommended publications