Wireless Mesh Networking

Wireless Mesh Networking

Wireless Mesh Networking Samir R. Das Stony Brook University, SUNY Stony Brook, New York 11747, U.S.A. [email protected] http://www.cs.sunysb.edu/~samir The Wireless Paradox 1 What is a Mesh Network? WLAN Access Points Clients Wired Backbone • “Wireless Paradox” : WLAN Access Points are typically wired. 2 What is a Mesh Network? WLAN Access Points/ Routers Clients Wired Backbone • Get rid of the wires from wireless LAN. • Access Points double as “wireless routers.” • Wireless routers form a backbone network. 3 Mesh Networking Advantage • Very low installation and maintenance cost. – No wiring! Wiring is always expensive/labor intensive, time consuming, inflexible. • Easy to provide coverage in outdoors and hard-to-wire areas. – Ubiquitous access. • Rapid deployment. • Self-healing, resilient, extensible. 4 Community Mesh Network • Grass-roots wireless network for communities. • Share Internet connections via gateway. • Peer-to-peer neighborhood applications. • Serious opportunities in developing countries, rural areas. 5 Wireless Philadelphia Wi-Fi Cluster Internet Business and/or Residential Government Facility Fiber or T-1 Leased Line Replacement Laptop User Wi-Fi Nodes WiMAX Base Station Gateway Node Gateway Node Communications Roof Top Tower VoIP Telemetry Handheld Wi-Fi Nodes [Source: City of Philadelphia, Mayor’s Office of Information Services 6 www.wirelessphiladelphia.org] 7 Metro-Scale Mesh Network Photo Credit: Mesh Dynamics [Source: http://muniwireless.com] • Covers an entire metropolitan area. 8 Public Safety [Source: www.meshdynamics.com]9 Intelligent Transportation System Real Time Information Bus Stops [Source: Intelligent Transport Systems I+ City of Portsmouth, Information IPQC Mesh Kiosk Networking Forum presentation, 2005] 10 “Broadband Divide” in Wireless Space Source: Source: Source: Source: • 13,707 unique nodes within Manhattan http://publicinternetproject.org (Fall 2002) http://publicinternetproject.org • 91% below 96th Street 11 [Acknowledgment: Victor Bahl, Microsoft Research] Addressing the Digital Divide Source: ITU Source: ITU • Internet penetration positively correlated with per capita GNP. • Need affordable and fast last mile connectivity. • Tremendous opportunities in developing 12 countries. Many Service Models • Private ISP (paid service) • City/county/municipality efforts • Grassroots community efforts • May be shared infrastructure for multiple uses – Internet access – Government, public safety, law enforcement – Education, community peer-to-peer 13 Market Opportunities Asset tracking, RFID, Hotels, malls, sensor nets, dispatch conventions Warehousing Hospitality and Industrial 25% 25% Access, campus, Healthcare mobile classroom 12% Education Hospitals, 15% Municipalities, Nursing homes Public Safety 23% Access, security, surveillance Estimated $1B market by 2009 [source: IDC, ABI] 14 Several Industry Players • Firetide • Packet Hop • Intel • SkyPilot Networks • Kiyon • Strix Systems • Locust World • Tropos Networks • Mesh Dynamics • Microsoft • Not a comprehensive list. • Motorola /Mesh • Technical details usually Networks proprietary. • Solutions typically based on • Nokia Rooftop standard 802.11, single or • Nortel Networks multiple radios, standard routing solutions. 15 Is the Current 802.11 Standard Sufficient? • Current IEEE 802.11 standard provides a 4- address frame format to exchange packets between APs. • Inter-AP communication possible – WDS (Wireless distribution system). • However, standard does not specify or define how to configure or use WDS. – Multihop forwarding/routing is now a higher layer issue. • 802.11 MAC itself not suitable for multihop. 16 IEEE 802.11s ESS Mesh Networking • Goal: Produce an amendment to the 802.11 standard to create a wireless distribution system – Support for unicast and broadcast/multicast. – Self-configuring multihop topology – Radio aware metrics; possible alternative path selection; supporting protocols based on application requirements. – Functionally equivalent to wired ESS. • Target no of packet forwarding nodes: ~32. 17 IEEE 802.11s ESS Mesh Networking • Use 802.11i security or an extension. • Use 802.11 4-address scheme or an extension. • Interface with higher layers. 18 Similar Ideas in History • Packet Radio and Mobile Ad Hoc Networks 1972: Packet Radio NETwork (PRNET) 1980s: SURvivable Adaptive Radio Network (SURAN) Early 1990s: GLObal MObile Information System (& NTDR) Research agenda mostly set by DoD. Applications mostly military. Mid 1990s: IETF MANET. Applications military/tactical, emergency response, disaster recovery, explorations, etc. Goal: standardize a set of IP-based routing protocols. • Scenarios too specific. Little commercial impact in spite of 30 years of research. 19 History (contd.) • However, great strides in several fronts in ad hoc networking research – Understanding routing in dynamic networks. – Understanding MAC protocols for wireless multihop networks. 20 How Much We can Borrow from History? • A lot .. But issues are different now. – In MANET design for mobility. – In mesh network design for capacity. • Advantage: can afford more power and bigger size. 21 Research Challenges • Wireless is not like wired networks. – Wireless links interfere. – Intra-flow and inter-flow interference. • Theoretical models show significant capacity degradation because of the wireless interference. 22 This Talk • How to improve capacity using multiple channels? • How to model interference in real networks? • Focus on deployable practical approaches. 23 Single Radio Approach •• Responses: Single radio interface poses two challenges: –– Ignore Channel latency switching issue. latency Or, use (in multipleorder of ms in transmissionscommodity 802.11 per switchcards). to amortize cost. –– Use Coordination separate betweencontrol channel, sender-receiver. or tight timing synch and rendezvous, or slot assignments. 24 Channel Assignment Problem B B A C A C D D 1 channel 4 channels, 1 interface 2 interfaces • Channel assignment can control topology. • Two nodes can communicate when they have at least one interface in common channel. 25 Channel Assignment Problem B B A C A C D D 1 channel 4 channels, 1 interface 2 interfaces • Channel assignment can control topology. • Two nodes can communicate when they have at least one interface in common channel. 26 iMesh: Stony Brook’s Mesh Router Small embedded platform running Linux with 2-3 WiFi interfaces. Runs routing and mobility management software. 27 iMesh: A Multiradio, Multichannel Mesh Access Point/ Mesh router 3 radio interfaces 4 channels 28 Topology Preserving Channel Assignment • Preserve all links. • Modeled as constrained k-coloring problem. NP-Complete Problem. • Developed efficient heuristic algorithms. Algorithm can run on a central network controller. • With 4 radios per router, 75%-90% of interferences removed for a 12 channel scenario. Means 75%x12 – 90%x12 times capacity improvement over single channel. 29 iMesh: Experimental Testbed Access Point/ Mesh router Mobile station 30 Handoff and Routing on iMesh Mesh network cloud of APs • Layer 2 handoff triggers routing updates in the mesh backbone (Layer 3 handoff). • 10-20ms additional latency in Layer 3 for upto 5 hop route changes. • Fine for interactive voice and video. 31 Capacity in Presence of Interference Sender side Receiver side I Interference Interference (reduces transmission (causes collisions) opportunity) S R • Assume, sender S and Interferer I always backlogged. • Capacity of SR link = normalized transmission rate * delivery ratio * (1- Prob. of collision ). 32 Modeling Sender Side Interference Sender side I Interference (reduces transmission opportunity) S R • Carrier Sense Factor, CSF(S,I) = Normalized transmission rate of S in presence of I. • Hypothesis: The quality of I to S link is a good predictor of CSF(S,I). • Challenge: How to measure link quality? 33 Experimental Setup Measure sending Measure signal rate via snooping strength Measure Broadcast delivery ratio as fast as possible Atheros-based interface Interferer Sender Prism-based interface • Determine quality of the link from interferer to sender. 34 Experimental Setup Measure Measure CSF CSF Broadcast Broadcast as fast as as fast as possible possible Atheros-based interface Interferer Sender Prism-based • Determine Carrier Sense Factor (CSF). interface • Repeat experiments by changing positions. • Over 600 positions measured in indoor environment (robot assisted). 35 Relationship between CSF and DR with Signal Strength 1 Carrier Sense Factor 0.8 Delivery Ratio 0.6 0.4 0.2 0 -10 0 10 20 30 40 50 Average Sampled Signal Strength (ssig) in dB 36 Predict CSF with Delivery Ratio 1 Measured CSF Fitted CSF 0.8 0.6 0.4 0.2 Carrier Sense Factor Quadratic fit with R^2 = 0.75 0 0 0.2 0.4 0.6 0.8 1 Delivery Ratio 37 Recall Sender side Receiver side I Interference Interference (reduces transmission (causes collisions) opportunity) S R • Assume, sender S and Interferer I always backlogged. • Capacity of SR link = normalized transmission rate * delivery ratio * (1- Prob. of collision ). 38 Modeling Receiver-side Interference Receiver side I Interference (causes collisions) S R • No collision if signal strength from S – signal strength I > threshold (dB). • Else, Prob. of collision = delivery ratio * (CSF(I,S)+CSF(S,I)-1)/CSF(S,I) 39 Putting Both Sides Together Interferer Sender Receiver • 600 experiments with different link qualities between sender, receiver, interferer. • Both sender and interferer transmit at the max possible rate. 40 Putting Both Sides Together

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    52 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us