Academia.eduAcademia.edu

IEEE 802.11s: The WLAN Mesh Standard

2000, IEEE Wireless Communications

ACCEPTED FROM OPEN CALL IEEE 802.11S: THE WLAN MESH STANDARD GUIDO R. HIERTZ, RWTH AACHEN UNIVERSITY DEE DENTENEER, PHILIPS RESEARCH SEBASTIAN MAX, RWTH AACHEN UNIVERSITY RAKESH TAORI, SAMSUNG ELECTRONICS CO. LTD. JAVIER CARDONA, COZYBIT INC. LARS BERLEMANN, T-MOBILE INTERNATIONAL BERNHARD WALKE, RWTH AACHEN UNIVERSITY ABSTRACT Portal A BS C Mesh STA A 6 Mesh STA W h other The authors provide insights into the latest developments in 802.11s and explain how the overall mesh concept fits into the 802 set of networking standards. 104 The wireless local area network standard IEEE 802.11 is the preferred solution for lowcost data services. Key to its success are the 2.4 and 5 GHz unlicensed bands. The transmit power limitations imposed due to regulatory requirements limit the range (coverage) that can be achieved by WLANs in these bands. However, the demand for “larger” wireless infrastructure is emerging, ranging from office/university campuses to city-wide deployments. To overcome the limitations of singlehop communication, data packets need to traverse over multiple wireless hops, and wireless mesh networks are called for. Since 2004 Task Group S has been developing an amendment to the 802.11 standard to exactly address the aforementioned need for multihop communication. Besides introducing wireless frame forwarding and routing capabilities at the MAC layer, the 802.11s amendment brings new interworking and security. In this article, we provide insights into the latest developments in 802.11s and explain how the overall mesh concept fits into the 802 set of networking standards. INTRODUCTION Wireless LANs (WLANs) are proliferating and the desire for ubiquitous wireless connectivity is driving the demand for coverage extension of today’s WLANs. However, regulatory limitations restrict the transmission power of WLAN devices. We have been here before. Bridging evolved the Ethernet (802.3) standard from a single-hop to a multihop system. With bridges, the communication between end stations is no longer limited to the same LAN. WLANs are in an early stage compared to their wired ancestors. The present 802.11 interconnections rely on wired networks to carry out bridging functions. For a number of reasons, this dependency on wired infrastructure must be eliminated. First, this dependency is costly and inflexible, as WLAN 1536-1284/10/$25.00 © 2010 IEEE coverage cannot be extended beyond the backhaul deployment. Second, centralized structures work inefficiently with new applications, such as wireless gaming, requiring peer-to-peer connectivity. Third, a fixed topology inhibits stations from choosing a better path for communication. WLANs can benefit significantly if they evolve to address these emerging needs. Wireless mesh networks (WMNs) hold the promise of a solution. However, existing WMNs rely on the IP layer to enable multihop communication and do not provide an inherently wireless solution. Since wireless links are less reliable than wired links, a multihop routing protocol operating in a wireless environment must account for the nature of the wireless links. As 802.11 does not specify the interfaces that the IP layer needs to derive link metrics from the medium access control (MAC) layer, the ad hoc routing protocols developed in the Internet Engineering Task Force’s (IETF’s) Mobile Ad Hoc Networks (MANET) group are forced to rely on indirect measurements [1] to observe the radio environment. However, the acquired link metrics are of limited accuracy [2], whereas the MAC layer has adequate knowledge of its radio neighborhood to make its measurements less outdated and more precise. Furthermore, for transparent support of important protocols like Address Resolution Protocol, Dynamic Host Configuration Protocol, Spanning Tree, and many more, a WMN must appear like traditional LAN segments that form single broadcast domains. In encapsulating layer 2 traffic, IP-based WMNs emulate LAN behavior. However, this appears to be more like an engineering patch and does not provide a long-term solution aimed at sustainable scaling of WLANs to new applications. Since MAC-based multihop solutions inherently support layer 2 traffic, they operate transparently to any higher-layer protocol. To realize the benefits a MAC-based WMN promises, an integrated mesh networking solution is under development in IEEE 802.11 Task Group S. The particular amendment of the 802.11 standard dealing with mesh support, 802.11s [3], describes a WMN concept that intro- IEEE Wireless Communications • February 2010 The 802.11s mesh appears as a single logical broadcast domain. Support for spanning tree guarantees loop-free connectivity with external networks Portals B and C blocked. 802.3 802.11s enables mobile mesh STA Y to seamlessly establish a new mesh link to mesh STA C and release mesh links to mesh STAs A and H. Portal B Portal C Mesh STA B Mesh STA C Via portal D, 802.3 station J integrates transparently with the 802.11s J mesh. 802.3 Portal D Mesh STA Y SS B Internet router Mesh STA D Mesh STA E Portal E AP L AP M BSS L Mesh STA Y SS A A BS C B Mesh STA H Portal A Mesh STA G Mesh STA A Mesh STA K Mesh STA J AP K Mesh STA W 802.11s mesh integrates with other 802 networks (802.3, 802.16, etc.) B Mesh STA F Mesh BSS 802.16 E C BSS M D The 802.11 concept relies on a central AP that forms a basic service set (BSS). Interconnected by 802.11s, stations can transition to and from APs K, L, and M within BSSs K, L, and M, respectively. BSS K Mesh STA U Mesh STA V Due to its mesh capabilities, mesh STA U connects simultaneously to the printer (mesh STA W) and the storage device (mesh STA V), and maintains Internet connectivity via mesh STA J. However, as a non-forwarding mesh device, mesh STA U does not participate in mesh formation. Thus, it does not interconnect mesh STAs W, V, and J. 802.11s mesh link (forwarding, may be part of a mesh path, multihop) 802.11s mesh link (non-forwarding, single-hop) 802.11 link within basic service set (BSS) Link released after transitioning to new location Figure 1. 802.11s enables seamless connectivity among dissimilar 802 networks. duces routing capabilities at the MAC layer. Path selection is used to refer to MAC-addressbased routing and to differentiate it from conventional IP routing. To understand the general WLAN concept, we begin by explaining the 802.11 standard [4] briefly. Next, we provide an outline of the basic building blocks of 802.11s, extending what is explained in [5], wherein we discuss interworking, MAC, security, and path selection. Subsequently, we discuss certification activities for mesh solutions in the Wi-Fi alliance [6]. The last section is dedicated to implementations such as One Laptop Per Child (OLPC) [7] and the open80211s [8] project, which reveal the performance of the 802.11s draft and provide us with a preview of what can be expected with 802.11s-certified products. THE 802.11 NETWORK DESIGN A station, or STA, is an 802.11-standard-compliant MAC and physical layer (PHY) implementation [4] and constitutes the basic entity in an 802.11 network. The most elementary 802.11 network, called a basic service set (BSS), can be formed using two stations. If a station provides the Integration service to the other stations, this station is referred to as an access point (AP). If IEEE Wireless Communications • February 2010 an AP is present in a BSS, it is referred to as an infrastructure BSS. To join an infrastructure BSS, a station associates with the AP. Figure 1 provides an example where AP M is part of the infrastructure. AP M provides stations B and C with access to the distribution system (DS). The DS provides the services that are necessary to communicate with devices outside the station’s own BSS. Furthermore, the DS allows APs to unite multiple BSSs to form an extended service set (ESS). Within an ESS, stations can roam from one BSS to another [9]. Today Ethernet (802.3) usually provides the distribution system medium (DSM) on which the DS relies. Consequently, in practice, APs collocate with the socalled portals that provide the integration of WLANs with non-802.11 networks. The IEEE 802.11 standard itself does not provide any details about the DSM. In principle, the DSM can be wireless too. The 802.11 frame format (without the extensions highlighted in Fig. 2) provides four fields necessary for addressing over multiple intermediate devices. The source address indicates the station that generated the frame (initial hop), and the destination address indicates the intended receiver (final hop). Both addresses remain unchanged in a concatenated set of multiple wireless hops. The 105 2 octets Frame control 2 octets 6 octets Duration/ID Address 1 Receiver address 6 octets Address 2 6 octets 2 octets Address 3 Sequence control 6 octets 2 octets 4 octets 0–7955 octets 4 octets Body FCS Address 4 QoS control HT control Mesh Transmitter destination address address Mesh control 1 octet 1 octet Mesh time Mesh flags to live (TTL) 2 bits Address extension mode 4 octets Mesh sequence number 6, 12, 18, or 24 octets 0, 6, 12, or 18 octets Mesh address extension 6 bits Reserved Mesh source address Destination address Source address Figure 2. The 802.11s mesh control field is part of the frame body and provides up to two more address fields. transmitting and receiving station addresses, which denote the stations that actually forwarded the frame, change with every hop. The 802.11 frame format provides two additional bits denoted “To DS” and “From DS.” The bit combinations 10 and 01 indicate the traffic entering or leaving the DS from a BSS, respectively. For the traffic that is relayed within the DS from one AP to another, the bit combination 11 is used. 1 Interestingly, vendors often use the vernacular term wireless DS (WDS) for this configuration. THE 802.11S CONCEPT Since the current standard [4] explicitly states that it does not define the procedures necessary for WDS implementation, many 802.11 multihop implementations do not interoperate. 802.11s not only helps interconnect BSSs wirelessly and thereby fills the WDS gap; it also enables a new type of BSS, the so-called mesh BSS (MBSS). In the following we describe the major sections of 802.11s. Its amendments to interworking, MAC, security, and path selection make the MBSS a self-contained network that enables applications beyond what a traditional single-hop WLAN supports. INTERWORKING As a family of standards, interoperability between the different networking concepts is a requirement for 802. For seamless integration, the 802.11s network appears as a single Ethernet segment to the outside (Fig. 1). The WMN implements a single broadcast domain and thus integrates seamlessly with other 802 networks. In particular, 802.11s supports transparent delivery of uni-, multi-, and broadcast frames to destinations in- and outside of the MBSS (referred to as mesh in the following). Devices that form the mesh are called mesh stations (mesh STAs). Mesh stations forward frames wirelessly but do not communicate with non-mesh stations. However, a mesh station may be collocated with other 802.11 entities. 1 The bit combination 00 is to be used within an independent BSS that does not have an AP. 106 FRAME STRUCTURE Currently, 802.11 categorizes frames as data, control, or management. Data frames carry higher-layer data. Control frames are used for acknowledgments and reservations. Devices use management frames to set up, organize, and maintain a WLAN and the local link. To provide for multihop, 802.11s extends data and management frames by an additional mesh control field, as shown in Fig. 2. The mesh control field consists of a mesh time to live (TTL) field, a mesh sequence number, a mesh flags field, and possibly a mesh address extension field. The TTL and sequence number fields are used to prevent the frames from looping forever. When mesh stations communicate over a single hop, their frames do not carry the mesh control field. The mesh flags field indicates the presence of additional MAC addresses in the mesh control field. The address extension allows for a total of six address fields in a mesh frame. This is useful when the source and destination of the frame are not part of the mesh, but are proxied by mesh stations. Figure 1 presents an example where mesh station D proxies non-mesh stations A, B, and J. Informing other mesh stations of its proxied devices, mesh station D diverts to itself all frames destined for A, B, or J. Together with the sixaddress scheme, the proxied entities can be identified as the final destination beyond the intermediate destination D. In addition, the extension to six addresses allows for proactive routing, explained later. Proactive routing divides a path into two distinct routes to simplify path selection. In Fig. 3 only mesh station C maintains paths to all mesh stations. In this case non-mesh station D’s frames enter the mesh at mesh station K, traverse to mesh station C (the first route), and from there to mesh station J (the second route). An observant reader will note from Fig. 2 that the address extension field allows for the addition of three addresses, rather than just two. The rationale for this is that standard management frames have three addresses only. Hence, in the case of multihop mesh management frames, address 4 is included in the mesh control field rather than in the standard frame header. MESH FORMATION AND MANAGEMENT Just as an AP’s beacon frame helps the stations to detect a BSS and learn about its settings, the mesh station’s beacon carries information about the mesh and helps other mesh stations detect and join the mesh. Mesh stations detect each IEEE Wireless Communications • February 2010 Mesh STA C operates as root mesh STA as it provides connection to the Internet. Portal C Mesh STA C Mesh STA B Mesh STA D Mesh STA E Mesh STA A Mesh BSS Mesh STA H Mesh STA G Mesh STA F If a mesh station holds a larger channel precedence value, it broadcasts its value and may indicate a different frequency channel. Following the highest announced precedence value, mesh stations finally coalesce on the new channel. Mesh STA K Mesh STA J Mesh STA J is the intended recipient of STA D’s frame. AP K E D STA D associates with AP K that is collocated with mesh STA K. STA D sends a frame to mesh STA J. BSS K Figure 3. The six address scheme provides support for proxied stations and tree-based path selection. other based on passive scanning (observation of beacon frames) or active scanning (probe frame transmission). The mesh-specific beacon and probe frames contain a Mesh ID (the name of a mesh), a configuration element that advertises the mesh services, and parameters supported by the transmitting mesh station. This functionality enables mesh stations to search for suitable peers (e.g., other mesh stations that use the same path selection protocol and metric). Once such a candidate peer has been identified, a mesh station uses the Mesh Peer Link Management protocol to establish a peer link with another mesh station. Even when the physical link breaks, mesh stations may keep the peer link status to allow for quick reconnection. In Fig. 1 mesh station Y may re-establish connection with mesh station A or H as soon as it moves in range again. Mesh stations use a single transceiver only. Accordingly, a mesh operates in a single frequency channel only. With multitransceiver devices, however, different frequency channel meshes can be unified into a single LAN. Figure 4 provides an example where five meshes operate in four different frequency channels. Mesh stations C, D, and E collocate within a device that has three independent transceivers. Incorporating an 802 bridge in the device, the collocated mesh stations interconnect and help to forward frames between their meshes. Consequently, a single WMN can be constituted. Regulatory bodies have different requirements on the frequency bands used by 802.11 IEEE Wireless Communications • February 2010 and mesh stations are required to comply with these regulatory requirements. In Europe, for example, devices must switch to a different channel (dynamic frequency selection) upon detection of a radar station in the 5 GHz band. To prevent a mesh from splitting, a channel selection protocol allows selection of the new frequency channel. In the absence of a central coordinator, a distributed algorithm is developed, based on a 31-bit random channel precedence value, for arbitration. If mesh station O in Fig. 4 detects a radar station, it is required to leave its current frequency channel and indicates the new frequency channel to mesh station N. N forwards the message, and thus, mesh stations D and T learn about the channel switch too. After a predetermined period of time, the mesh channel switch time, the mesh stations switch to the new channel. If a mesh station holds a larger channel precedence value, it broadcasts its value and may indicate a different frequency channel. Following the highest announced precedence value, mesh stations finally coalesce on the new channel. SYNCHRONIZATION AND POWER MANAGEMENT All beacon frames provide a time reference that is used for synchronization and power saving. Power-saving mesh stations are either in light- or deep-sleep mode. Being in light-sleep mode, a mesh station switches to full power whenever a neighbor or the mesh station itself is expected to transmit a beacon frame. In deep-sleep mode a 107 M P A EDCA to access the medium, and does not have priority over stations that do not support MCCA. Although this compromises efficiency, simulations reveal that high medium utilization can still be achieved with MCCA in the presence of nonMCCA devices [10]. After an MCCA transmission ends, mesh stations use EDCA for medium contention again. B O f4 f3 N C E D K f1 J CONGESTION CONTROL L F f2 G H I Figure 4. Layer 2 bridges in multi-transceiver devices may unify different frequency channel meshes into a single LAN. mesh station solely wakes up for its own beacon frame transmissions. The mesh station can be informed of buffered traffic during the awake period that follows the beacon. Synchronization enables a new kind of distributed reservation protocol, introduced in the next section. MEDIUM ACCESS CONTROL IN 802.11S For medium access, mesh stations implement the mesh coordination function (MCF). MCF consists of a mandatory and an optional scheme. For the mandatory part, MCF relies on the contention-based protocol known as Enhanced Distributed Channel Access (EDCA), which itself is an improved variant of the basic 802.11 distributed coordination function (DCF). Using DCF, a station transmits a single frame of arbitrary length. With EDCA, a station may transmit multiple frames whose total transmission duration may not exceed the so-called transmission opportunity (TXOP) limit. The intended receiver acknowledges any successful frame reception. Additionally, EDCA differentiates four traffic categories with different priorities in medium access and thereby allows for limited support of quality of service (QoS). To enhance QoS, MCF describes an optional medium access protocol called Mesh Coordinated Channel Access (MCCA). It is a distributed reservation protocol that allows mesh stations to avoid frame collisions. With MCCA, mesh stations reserve TXOPs in the future called MCCA opportunities (MCCAOPs). An MCCAOP has a precise start time and duration measured in slots of 32 μs. To negotiate an MCCAOP, a mesh station sends an MCCA setup request message to the intended receiver. Once established, the mesh stations advertise the MCCAOP via the beacon frames. Since mesh stations outside the beacon reception range could conflict with the existing MCCAOPs, mesh stations also include their neighbors’ MCCAOP reservations in the beacon frame. At the beginning of an MCCA reservation, mesh stations other than the MCCAOP owner refrain from channel access. The owner of the MCCAOP uses standard 108 Access in 802.11 relies on carrier sensing. At a mesh’s edge, mesh stations have fewer neighbors. and therefore observe an idle wireless medium more often than mesh stations located in the core of the mesh. Consequently, edge mesh stations have a higher probability to transmit. When core mesh stations congest, they cannot carry the aggregated traffic and drop frames. This is costly as the mesh frame has already traversed several hops to reach the congested mesh station. The optional 802.11s congestion control concept uses a management frame to indicate the expected duration of congestion and to request a neighbor mesh station to slow down. Since it is each mesh station’s choice to issue a congestion control frame, the notification may finally ripple back to the traffic source. SECURITY IN 802.11S With 802.11s, mesh stations perform the dictionary attack-proof Simultaneous Authentication of Equals (SAE) [11] algorithm. Besides mutual authentication, SAE provides two mesh stations with a pairwise master key (PMK) that they use to encrypt their frame. As its name indicates, SAE does not rely on a keying hierarchy like traditional 802.11 encryption [4]. Instead, it implements a distributed approach that both mesh stations may initiate simultaneously. Because of the pairwise encryption, each link is independently secured. As a consequence, 802.11s does not provide end-to-end encryption. Since broadcast traffic must reach all authenticated peers, a mesh station is required to update its broadcast traffic key with every new peering it establishes. PATH SELECTION IN 802.11S Within a mesh, all mesh stations use the same path metric and path selection protocol. For both, 802.11s defines a mandatory default scheme. Because of its extensible framework, they can be replaced by other solutions. The default metric, termed airtime metric, indicates a link’s overall cost by taking into account data rate, overhead, and frame error rate of a test frame of size 1 kbyte. The default path selection protocol, Hybrid Wireless Mesh Protocol (HWMP), combines the concurrent operation of a proactive tree-oriented approach with an ondemand distributed path selection protocol (derived from the Ad Hoc On Demand Distance Vector [AODV] protocol [1]). The proactive mode requires a mesh station to be configured as a root mesh station. In many scenarios this will be a mesh station that collocates with a portal (Fig. 3). As such, the root mesh station constantly propagates routing messages that either establish and maintain paths to all mesh stations in IEEE Wireless Communications • February 2010 the mesh, or simply enable mesh stations to initiate a path to it (red lines in Fig. 3). In the example of Fig. 3, mesh station K uses the root mesh station C to establish an initial path (dotted line) to mesh station J. Once established, mesh stations may use the AODV part of HWMP to avoid the indirection via the root mesh station. In the present example, K could discover a shorter path (links marked in grey) via G and H to forward station D’s frames to the destination mesh station J. Mesh stations also rely on AODV when a root mesh station is unavailable. When no path setup messages are propagated proactively, however, the initial path setup is delayed. To allow for even simpler configuration, vendors may opt not to implement HWMP at all. As an example, a battery-limited handheld device may refrain from frame forwarding to minimize power consumption. Accordingly, it does not propagate path information and behaves like an end station. However, the device is still able to request the frame forwarding service from neighboring mesh stations. WI-FI ALLIANCE’S MESH MARKETING TASK GROUP In October 2006 the Wi-Fi Alliance (WFA) established the Mesh Marketing Task Group, chartered to work on a Marketing Requirement Document, and the specification of a certification and test plan. To meet customers’ expectations, WFA’s mesh activities aim at compliance with the present certification programs. Accordingly, simple and secure setup of a WFA-certified mesh needs to comply with the existing WFA programs. The current Wi-Fi protected setup already enables security via a push button, secret PIN, or near-field communication, for example. To provide compatibility with existing Wi-Fi devices, WFA’s marketing program requires each mesh station to incorporate either the AP or station functionality too. While Wi-Fi mesh APs must support frame-forwarding and thereby help to increase the radio coverage, non-AP mesh stations may choose to become an end station. Whereas a non-mesh station connects to a single AP only, a mesh station may connect with multiple other mesh stations even if it does not forward traffic for others. Consequently, it provides users the advantage of access to services not reachable via the AP (mesh station U in Fig. 1). CURRENTLY DEPLOYED IMPLEMENTATIONS The OLPC project and open80211s [7] are the world’s first implementations of 802.11s. In the next two sections we briefly introduce the project goals and experiences gained from realworld setups. THE OLPC PROJECT Developed by the OLPC Foundation, the XO laptop aims to serve as a learning tool for children living in developing countries where a communication infrastructure is unlikely to exist. With WLAN embedded in the XO, the decision to implement 802.11s was self-evident. Based on IEEE Wireless Communications • February 2010 IP 802.1 bridging 802.11 station 802.11 AP 802.11s mesh STA open80211s mac80211 Hardware driver Figure 5. The open80211s stack integrates into the Linux kernel. an early draft of 802.11s, the XO omits certain functions of 802.11s such as encryption or proactive routing. One of the challenges faced by OLPC was to ensure at all times a minimal node density, which is critical for the proper operation of a mesh network. Two design choices were made to address this issue [7]. First, the OLPC mesh does not implement any access control mechanism. Each node can receive and forward traffic from any other meshcapable node, thus avoiding a possible fragmentation of the network caused by incompatible access credentials. As there is no authentication at the mesh layer, XOs must rely on upper layers for confidentiality. Second, the mesh protocol stack is embedded in the wireless network card. With this architecture, the entire 802.11s code can operate independently of the host CPU. Thus, the XO works as a mesh station even when in power-save mode; that is, a laptop transitioning into powersave mode will not adversely affect other students who may rely on a single student’s provision of Internet connectivity. Due to its distributed nature, OLPC assumes that a root mesh station is never available. Thus, the XO would not benefit from implementing a tree structure. Consequently, the XO solely implements HWMP’s AODV part. Several presentations at road shows and live demonstrations have shown the capabilities of the present OLPC mesh implementation. To date, OLPC has shipped over 1.2 million meshcapable laptops around the globe. OPEN80211S open80211s [7] is a vendor-neutral implementation of 802.11s for the Linux operating system (Fig. 5). Since 802.11s introduces only minimal changes to the MAC layer, the 802.11s stack can be almost fully implemented in software and made to run on legacy 802.11 cards. The goal of the project is to closely track the 802.11s draft and support the interoperability of different 802.11s implementations. The availability of the source code helps to identify and resolve design problems, and resolve ambiguities in the protocol being specified. Performance measurements are routinely taken before each release. Figure 6a shows the path discovery time for different path lengths, where we measure a 12-node open80211s testbed wherein all the nodes are in radio range 109 70 5 Measured Regression Measured Average 60 Throughput (Mb/s) Discovery time (ms) 4 50 40 30 3 2 20 1 10 0 1 2 3 4 5 6 7 8 9 10 11 0 0 1 Number of hops 2 3 4 5 6 7 8 9 10 11 Number of hops Figure 6. open80211s performance measurements. of each other, and manual address filter settings enforce multihop topologies. We measure the discovery duration from the time a path setup is requested until the time the path is actually established. As expected, routes are resolved in linear time, and the variance increases with the length of the path. Figure 6b shows the average end-to-end data rate measurement results in an environment where the default 802.11 parameters are used for measurements, and where each experiment is run six times for 10 s per measurement in an uncontrolled wireless environment. As previously mentioned, non-802.11s products rely on the unspecified WDS to enable multihop networking. However, without path selection mechanisms, suboptimal path length or undesired increase in path length occurs. Figure 6 illustrates scenarios with more than four to five hops that are usually beyond the application scenario of a single-channel WMN. Note that throughput decreases rapidly with the number of hops in the fully connected topology of the experiment. Under normal conditions, the routing protocol used in 802.11s would resolve paths that are limited to one or two hops only. The open80211s stack has been part of the Linux kernel since version 2.6.26 (July 2008). CONCLUSIONS The wired Internet liberated users from dial-up connections and leased lines. By interconnecting autonomous systems, the decentralized Internet enabled new services and business. With 802.11s, a similar development has started. The classical single-hop connectivity no longer addresses the needs of an ever-growing user base, and mesh technology is the natural evolution. However, with mesh networking, 802.11 enters uncharted territories, and 802.11s does not yet define the definite solution. Further improvements are necessary to increase efficiency and enable a degree of QoS that users are willing to accept. Judging from the current status of the ongoing standardization process, it seems that the finalization of the 802.11s standard may be expected next 110 year. Remaining problem areas are congestion control, channel selection, and medium access. The congestion control mechanism requires a mesh station to specify the congestion duration to its neighbors. However, due to varying radio conditions, the link speed changes; a congested mesh station can hardly predict this. Even worse, legacy devices in overlapping BSSs cannot comply with congestion messages. As a result, neighboring BSSs receive an increased share of the wireless medium, and the congested mesh station is not really helped. Finally, conditions that trigger congestion control, as well as neighbor mesh station reaction, are left unspecified. Another concern addresses the current 802.11s method for distributed frequency channel selection. Based on random values that are needed for arbitration, the propagation of a common frequency channel has limited reliability. Unfortunately, the selection scheme cannot guarantee that all mesh stations are informed. Since a mesh station switches at the latest after 255 ms, large networks are subject to partitioning when different mesh stations increase the precedence value and the message cannot propagate back to the originator in time. Finally, there remains the challenge of medium access. Currently, WLAN deployments rely on a wired backbone where APs need not be in radio range and hence do not share a frequency channel. However, to form a WMN, this changes. With the wireless medium being shared among neighbors, the environment becomes much more interference-prone. Furthermore, mesh stations have no priority over other 802.11 devices, and a mesh suffers severely from any overlapping BSS. Even if a mesh AP incorporates multiple transceivers to separate the BSS and mesh network into different frequency bands (2.4 and 5 GHz), the WMN carries the aggregation of locally generated and forwarded traffic. Accordingly, the WMN is threatened with saturation. Experiments with real 802.11s deployments substantiate these limitations of the EDCA-based medium access mechanisms when used in a WMN environment. Schemes tailored to meshspecific needs, such as the MCCA scheme, possi- IEEE Wireless Communications • February 2010 bly combined with path selection and flow control, are quite likely to bring benefits. Aided by the experiences gained in the implementation projects, IEEE 802.11s is in the process of tackling these challenges. Once overcome, mesh technology will be an inherent part of any future wireless standard. Today a novelty, users are likely to take the ability to communicate without a wired infrastructure for granted in the future: convenient deployment and spontaneous connectivity — anytime, anywhere. To provide for this, 802.11s will not remain the only mesh solution. With 802.11s, the fascinating WMN adventure has just begun. REFERENCES [1] C. Perkins, E. Belding-Royer, and S. Das, “Ad Hoc OnDemand Distance Vector (AODV) Routing,” IETF RFC 3561, Jul. 2003. [2] I. F. Akyildiz, X. Wang, and W. Wang, “Wireless Mesh Networks: A Survey,” Comp. Networks and ISDN Sys., vol. 47, no. 4, Mar. 2005. [3] “Draft Standard for Information Technology — Telecommunications and Information Exchange Between Systems — LAN/MAN Specific Requirements — Part 11: Wireless Medium Access Control (MAC) and Physical Layer (PHY) specifications: Amendment 10: Mesh Networking,” IEEE unapproved draft, IEEE P802.11s/D4.0, Dec. 2009. [4] IEEE P802.11-2007, “Information Technology — Telecommunications and Information Exchange Between Systems — Local and Metropolitan Area Networks — Specific Requirements — Part 11: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications,” JunE 2007. [5] S. M. Faccin et al., “Mesh WLAN Networks: Concept and System Design,” IEEE Wireless Commun., vol. 13, no. 2, Apr. 2006. [6] Wi-Fi Alliance, available: http://wi-fi.org/ [7] J. Cardona, “Wireless Meshing with the One Laptop Per Child,” http://www.cozybit.com/whitepapers/olpcmesh.pdf [8] open80211s, http://open80211s.org/ [9] B. Walke, S. Mangold, and L. Berlemann, IEEE 802 Wireless Systems: Protocols, Multi-Hop Mesh/Relaying, Performance and Spectrum Coexistence, Wiley, Nov. 2006. [10] Y. Chen, and S. Emeott, “MDA Simulation Study: Robustness to Non-MDA Interferers,” IEEE 802 Plenary Meeting, Submission 11-07-0356-00-000s, Orlando, FL, Mar. 2007. [11] D. Harkins, “Simultaneous Authentication of Equals: A Secure, Password-Based Key Exchange for Mesh Networks,” SENSORCOMM ’08 — 2nd InGut’l. Conf. Sensor Technologies and Apps., Aug. 2008. BIOGRAPHIES G UIDO R. H IERTZ ([email protected]) received his Dipl.-Ing. degree in electrical engineering from RWTH Aachen University, Germany. Working toward his Ph.D. in the Department of Communication Networks, he contributed to various research projects and authored several papers at IEEE conferences. He is a voting member of IEEE 802.11 and Vice Chair of IEEE 802.11s. He is a charger member of the industry forum Wi-Mesh Alliance that created the initial draft of IEEE 802.11s jointly with the industry group SEEMesh. Since 2009 he is the head of research and development in the Rental Series Department at Riedel Communications, Wuppertal, Germany. DEE DENTENEER received an M.Sc. in statistics from the University of Utrecht and a Ph.D. in applied probability (queuing analysis) from Eindhoven University ot Technology, the Netherlands. From 1984 to 1988 he worked at the Dutch Central Statistical Office, where he designed the Blaise language, a language for questionnaire description. Since 1988 he has been employed at Philips Research in Eindhoven, since 2000 as a principal research scientist. At Philips he has worked on the application of mathematics in various industrial research projects such as MPEG encoding, speech recognition, secure biometrics, and data transmission systems. He is Chair of IEEE 802.11s. His current research interest is in the performance analysis and standardization of wireless mesh networks. IEEE Wireless Communications • February 2010 SEBASTIAN MAX studied computer science at RWTH Aachen University, and received his diploma degree with distinction in 2005. Since then he has been with the Chair of Communication Networks (ComNets) at RWTH Aachen University, where he is working toward his Ph.D. He holds the Research College (Graduiertenkolleg) Software for Mobile Communication Systems scholarship of the German Research Foundation (DFG). His main research field is wireless mesh networks for city-wide Internet access. R AKESH T AORI is a principal engineer in the Digital Media and Communications R&D Centre at Samsung Electronics, Suwon, South Korea. He is currently involved in research, development, and standardization of the 4G air interface technologies pertaining to the MAC layer. He was an active contributor to the standardization of multihop relay in the IEEE 802.16 systems and is now contributing to the development of the IEEE 802.16m amendment: the advanced OFDMA air interface for the IEEE 802.16 system. Prior to joining the Samsung DMC R&D Centre, he held research positions at Samsung Research (2004–2008, South Korea), Ericsson Research (2000–2004, Sweden and the Netherlands), and Philips Research Laboratories (1992–2000, the Netherlands). Over the past 17 years he has performed research and standardization work in the area of media coding and wireless systems. In the area of media coding his primary focus was low-bit-rate parametric coding of speech and audio signals. In the area of wireless systems he has contributed to research and standardization in wireless PANs (Bluetooth and UWB) and wireless LANs (802.11s, WLAN mesh), and is currently active in the area of wireless MANs (802.16m, advanced air interface). He has contributed to several standardization organizations — MPEG, ITU-T, ETSI, Bluetooth SIG, IEEE, and the WiMAX Forum — and has served these organizations in various roles. From August 2004 to November 2005 he served as Chair of the Technical Steering Committee of the WiMedia Alliance. He obtained his B.Eng. degree in control and computer engineering and M.Phil degree in digital signal processing and communications from the University of Westminster, London, United Kingdom. Aided by the experiences gained in the implementation projects, IEEE 802.11s is in the process of tackling these challenges. Once overcome, mesh technology will be an inherent part of any future wireless standard. JAVIER CARDONA is the co-founder and CEO of cozybit Inc., an engineering consulting firm in the field of wireless communications. He was one of the implementers of the OLPC mesh stack and open802.11s. He holds an M.S. in telecommunications from Universitat Politecnica de Catalunya, Spain, and an M.Eng. in embedded systems design from Alari. LARS BERLEMANN ([email protected]) is program manager at T-Mobile International, leading the market introduction program for NGMN. He holds a Ph.D. and Diploma degree in electrical engineering from RWTH Aachen University as well as a Diploma degree in business and economics from the same university. He is author of the textbooks Cognitive Radio for Dynamic Spectrum Access (Wiley, 2009) and IEEE 802 Wireless Systems: Protocols, Multi-Hop Mesh Relaying, Performance and Spectrum Coexistence (Wiley, 2006). He has published a multitude of reviewed publications including several journal articles, and was scientific organizer of European Wireless Conference 2005 and IEEE PIMRC 2005. He has been a guest lecturer on mobile radio networks at the Technical University of Dortmund since 2007. BERNHARD WALKE is directing the ComNets Research Group at RWTH Aachen University, Germany, focusing on 4G air interface design and performance evaluation, besides developing system-level simulation tools like openWNS. He contributed, together with his Ph.D. students, revolutionary concepts that are being used in standardized mobile radio networks, such as the packet data traffic channel of GPRS operating on a GSM traffice channel; the fast radio link establishment for GPRS (later named TBF), a concept also used in UMTS; the MAC frame applied in WiMAX and 3GPP LTE systems for radio resource allocation; and the concept of fixed decode-and-forward relays used in broadband cellular radio networks like WiMAX and 3GPP LTE/LTE-A. Besides that, his group has contributed a number of improvements now implemented in IEEE 802 standards. His work is published in six textbooks and about 260 peer reviewed conference and journal papers. Prior to joining academia, he worked for 18 years in industry at EADS AG. He holds a doctorate in information engineering from the University of Stuttgart, Germany. 111