Top Banner
Wireless Mesh Network 指指指指 指指指指指指 指指指指指 :、 指指 指指指 Source reference: Akyildiz, I.F. and Xudong Wang “A survey on wireless mesh networksIEEE Communications Magazine, Sep., 2005, p23- 30. 1
34

Wireless Mesh Network 指導教授:吳和庭教授、柯開維教授 報告:江昀庭 Source reference: Akyildiz, I.F. and Xudong Wang “A survey on wireless mesh networks”

Dec 31, 2015

Download

Documents

Derrick Smith
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Wireless Mesh Network 指導教授:吳和庭教授、柯開維教授 報告:江昀庭 Source reference: Akyildiz, I.F. and Xudong Wang “A survey on wireless mesh networks”

1

Wireless Mesh Network

指導教授:吳和庭教授、柯開維教授報告:江昀庭

Source reference:

Akyildiz, I.F. and Xudong Wang “A survey on wireless mesh networks” IEEE Communications Magazine, Sep., 2005, p23-30.

Page 2: Wireless Mesh Network 指導教授:吳和庭教授、柯開維教授 報告:江昀庭 Source reference: Akyildiz, I.F. and Xudong Wang “A survey on wireless mesh networks”

2

Overview• Introduction• Network Architecture • Critical Design Factors• Advances and Research Challenges

Network CapacityLayered Communication ProtocolsNetwork ManagementSecurityCross-Layer Design

• Conclusion

Page 3: Wireless Mesh Network 指導教授:吳和庭教授、柯開維教授 報告:江昀庭 Source reference: Akyildiz, I.F. and Xudong Wang “A survey on wireless mesh networks”

3

Overview Introduction• Network Architecture • Critical Design Factors• Advances and Research Challenges

Network CapacityLayered Communication ProtocolsNetwork ManagementSecurityCross-Layer Design

• Conclusion

Page 4: Wireless Mesh Network 指導教授:吳和庭教授、柯開維教授 報告:江昀庭 Source reference: Akyildiz, I.F. and Xudong Wang “A survey on wireless mesh networks”

4

Introduction• Wireless Mesh Network(WMNs)• WMNs are comprised of two types of nodes:

mesh routersmesh clients

• Wireless can access without NICs by connecting to wireless mesh router

• WMNs will be always-on-line anywhere, anytime• WMNs can use IEEE802.11 IEEE802.15 IEEE802.16

Page 5: Wireless Mesh Network 指導教授:吳和庭教授、柯開維教授 報告:江昀庭 Source reference: Akyildiz, I.F. and Xudong Wang “A survey on wireless mesh networks”

5

Overview• Introduction Network Architecture • Critical Design Factors• Advances and Research Challenges

Network CapacityLayered Communication ProtocolsNetwork ManagementSecurityCross-Layer Design

• Conclusion

Page 6: Wireless Mesh Network 指導教授:吳和庭教授、柯開維教授 報告:江昀庭 Source reference: Akyildiz, I.F. and Xudong Wang “A survey on wireless mesh networks”

6

Network Architecture

• Client meshing provides peer-to-peer networks among client devices.

• The mesh routers form a mesh of self-configuring, self-healing links among themselves.

Page 7: Wireless Mesh Network 指導教授:吳和庭教授、柯開維教授 報告:江昀庭 Source reference: Akyildiz, I.F. and Xudong Wang “A survey on wireless mesh networks”

7

Page 8: Wireless Mesh Network 指導教授:吳和庭教授、柯開維教授 報告:江昀庭 Source reference: Akyildiz, I.F. and Xudong Wang “A survey on wireless mesh networks”

8

Network Architecture• Hybrid WMNs• WMNs are multi-hop wireless networks.• Mesh clients can access the network through mesh routers

as well as directly meshing with other mesh clients• Routing capabilities of clients provide improved

connectivity and coverage inside WMNs. // !• WMNs support ad hoc networking, and have the capability

of self-forming, self-healing, and self-organization.

Page 9: Wireless Mesh Network 指導教授:吳和庭教授、柯開維教授 報告:江昀庭 Source reference: Akyildiz, I.F. and Xudong Wang “A survey on wireless mesh networks”

9

Page 10: Wireless Mesh Network 指導教授:吳和庭教授、柯開維教授 報告:江昀庭 Source reference: Akyildiz, I.F. and Xudong Wang “A survey on wireless mesh networks”

10

Overview• Introduction• Network Architecture Critical Design Factors• Advances and Research Challenges

Network CapacityLayered Communication ProtocolsNetwork ManagementSecurityCross-Layer Design

• Conclusion

Page 11: Wireless Mesh Network 指導教授:吳和庭教授、柯開維教授 報告:江昀庭 Source reference: Akyildiz, I.F. and Xudong Wang “A survey on wireless mesh networks”

11

Critical Design Factors

• Radio Techniques• Scalability• Mesh Connectivity• Broadband and QoS• Security• Ease of Use• Compatibility and Inter-operability

Page 12: Wireless Mesh Network 指導教授:吳和庭教授、柯開維教授 報告:江昀庭 Source reference: Akyildiz, I.F. and Xudong Wang “A survey on wireless mesh networks”

12

Radio Techniques

• Directional and smart antennas, multiple input multiple output (MIMO) systems, and multi-radio/multi-channel systems.

• To further improve the performance of a wireless radio, reconfigurable radios, frequency agile/cognitive radios, and even software radios, have been used for wireless communication.

Page 13: Wireless Mesh Network 指導教授:吳和庭教授、柯開維教授 報告:江昀庭 Source reference: Akyildiz, I.F. and Xudong Wang “A survey on wireless mesh networks”

13

Scalability

• Mesh = high scalability

• All protocols from the MAC layer to the application layer need to be scalable

Page 14: Wireless Mesh Network 指導教授:吳和庭教授、柯開維教授 報告:江昀庭 Source reference: Akyildiz, I.F. and Xudong Wang “A survey on wireless mesh networks”

14

Mesh Connectivity• To ensure reliable mesh connectivity, network self-

organization and topology control algorithms are needed.• Topology-aware MAC and routing protocols can significantly

improve the performance of WMNs

Broadband and QoS• Most applications of WMNs are broadband services

with heterogeneous QoS requirements

Page 15: Wireless Mesh Network 指導教授:吳和庭教授、柯開維教授 報告:江昀庭 Source reference: Akyildiz, I.F. and Xudong Wang “A survey on wireless mesh networks”

15

Security• It’s a problem and one of the future work in this paper because

most of the security solutions for ad hoc networks are still not mature enough to be implemented practically.

Ease of Use• Network management tools need to be developed to efficiently

maintain the operation, monitor the performance, and configure the parameters of WMNs.

Page 16: Wireless Mesh Network 指導教授:吳和庭教授、柯開維教授 報告:江昀庭 Source reference: Akyildiz, I.F. and Xudong Wang “A survey on wireless mesh networks”

16

Overview• Introduction• Network Architecture • Critical Design Factors Advances and Research Challenges

Network CapacityLayered Communication ProtocolsNetwork ManagementSecurityCross-Layer Design

• Conclusion

Page 17: Wireless Mesh Network 指導教授:吳和庭教授、柯開維教授 報告:江昀庭 Source reference: Akyildiz, I.F. and Xudong Wang “A survey on wireless mesh networks”

17

Network Capacity

• A node should only communicate with nearby nodes(cost)

• Throughput capacity can be increased by deploying relaying nodes.

• Nodes need to be grouped into clusters.

Page 18: Wireless Mesh Network 指導教授:吳和庭教授、柯開維教授 報告:江昀庭 Source reference: Akyildiz, I.F. and Xudong Wang “A survey on wireless mesh networks”

18

Overview• Introduction• Network Architecture • Critical Design Factors Advances and Research Challenges

Network CapacityLayered Communication ProtocolsNetwork ManagementSecurityCross-Layer Design

• Conclusion

Page 19: Wireless Mesh Network 指導教授:吳和庭教授、柯開維教授 報告:江昀庭 Source reference: Akyildiz, I.F. and Xudong Wang “A survey on wireless mesh networks”

19

Physical layer

• Advanced Physical-Layer Techniques

• Orthogonal frequency multiple access (OFDM)• Ultra-wide band (UWB) techniques

Page 20: Wireless Mesh Network 指導教授:吳和庭教授、柯開維教授 報告:江昀庭 Source reference: Akyildiz, I.F. and Xudong Wang “A survey on wireless mesh networks”

20

Mac layer• MAC for WMNs is concerned with more than one-hop

communication.• MAC is distributed, needs to be collaborative, and works for

multipoint-to-multipoint communication.• Network self-organization is needed for better collaboration

between neighboring nodes and nodes in multi-hop distances.• Mobility is low but still affects the performance of MAC.• A MAC protocol for WMNs can be designed to work on a

single channel or multiple channels simultaneously.

Page 21: Wireless Mesh Network 指導教授:吳和庭教授、柯開維教授 報告:江昀庭 Source reference: Akyildiz, I.F. and Xudong Wang “A survey on wireless mesh networks”

21

Routing layer• Many existing routing protocols use minimum hop-count as a

performance metric to select the routing path.• Scalability. Setting up or maintaining a routing path in a very

large wireless network may take a long time. Thus, it is critical to have a scalable routing protocol in WMNs.

• Robustness. To avoid service disruption, WMNs must be robust to link failures or congestion. Routing protocols also need to perform load balancing.

• Efficient Routing with Mesh Infrastructure

Page 22: Wireless Mesh Network 指導教授:吳和庭教授、柯開維教授 報告:江昀庭 Source reference: Akyildiz, I.F. and Xudong Wang “A survey on wireless mesh networks”

22

Transport layerTCP variants improve the performance of the classical

TCPs by tackling the following problems.• Non-Congestion Packet Losses.• Unknown Link Failure.• Network Asymmetry• Large RTT Variations

Page 23: Wireless Mesh Network 指導教授:吳和庭教授、柯開維教授 報告:江昀庭 Source reference: Akyildiz, I.F. and Xudong Wang “A survey on wireless mesh networks”

23

Application Layer

Numerous applications supported by WMNs can be categorized into several classes.

• Internet Access

• Distributed Information Storage and Sharing

Page 24: Wireless Mesh Network 指導教授:吳和庭教授、柯開維教授 報告:江昀庭 Source reference: Akyildiz, I.F. and Xudong Wang “A survey on wireless mesh networks”

24

Overview• Introduction• Network Architecture • Critical Design Factors Advances and Research Challenges

Network CapacityLayered Communication ProtocolsNetwork ManagementSecurityCross-Layer Design

• Conclusion

Page 25: Wireless Mesh Network 指導教授:吳和庭教授、柯開維教授 報告:江昀庭 Source reference: Akyildiz, I.F. and Xudong Wang “A survey on wireless mesh networks”

25

Network Management

• Mobility Management

• Power Management

• Network Monitoring

Page 26: Wireless Mesh Network 指導教授:吳和庭教授、柯開維教授 報告:江昀庭 Source reference: Akyildiz, I.F. and Xudong Wang “A survey on wireless mesh networks”

26

Overview• Introduction• Network Architecture • Critical Design Factors Advances and Research Challenges

Network CapacityLayered Communication ProtocolsNetwork ManagementSecurityCross-Layer Design

• Conclusion

Page 27: Wireless Mesh Network 指導教授:吳和庭教授、柯開維教授 報告:江昀庭 Source reference: Akyildiz, I.F. and Xudong Wang “A survey on wireless mesh networks”

27

Security

• Two more strategies need to be considered: o Embedding security mechanisms into network protocols

such as secure routing MAC protocols o Developing security monitoring and response systems to

detect attacks.

Page 28: Wireless Mesh Network 指導教授:吳和庭教授、柯開維教授 報告:江昀庭 Source reference: Akyildiz, I.F. and Xudong Wang “A survey on wireless mesh networks”

28

Overview• Introduction• Network Architecture • Critical Design Factors Advances and Research Challenges

Network CapacityLayered Communication ProtocolsNetwork ManagementSecurityCross-Layer Design

• Conclusion

Page 29: Wireless Mesh Network 指導教授:吳和庭教授、柯開維教授 報告:江昀庭 Source reference: Akyildiz, I.F. and Xudong Wang “A survey on wireless mesh networks”

29

Cross-Layer Design

• Cross-layer design can be performed in two ways.

• The first approach is to improve the performance of a protocol layer by taking into account parameters in other protocol layers. Typically, parameters in the lower protocol layers are reported to higher layers.

• The second approach of is to merge several protocols into one component. For example, in ad hoc networks, MAC and routing protocols can be combined into one protocol in order to closely consider their interactions.

Page 30: Wireless Mesh Network 指導教授:吳和庭教授、柯開維教授 報告:江昀庭 Source reference: Akyildiz, I.F. and Xudong Wang “A survey on wireless mesh networks”

30

Overview• Introduction• Network Architecture • Critical Design Factors• Advances and Research Challenges

Network CapacityLayered Communication ProtocolsNetwork ManagementSecurityCross-Layer Design

Conclusion

Page 31: Wireless Mesh Network 指導教授:吳和庭教授、柯開維教授 報告:江昀庭 Source reference: Akyildiz, I.F. and Xudong Wang “A survey on wireless mesh networks”

31

Conclusion• Scalability. Based on existing MAC, routing, and transport

protocols, network performance is not scalable with either the number of nodes or the number of hops in the network.

• Security. WMNs are vulnerable to security attacks in various protocol layers. Current security approaches may be effective to a particular attack in a specific protocol layer.

• Self-organization and self-configuration capability is a desired feature in WMNs. It requires protocols in WMNs to be distributive and collaborative.

Page 32: Wireless Mesh Network 指導教授:吳和庭教授、柯開維教授 報告:江昀庭 Source reference: Akyildiz, I.F. and Xudong Wang “A survey on wireless mesh networks”

32

Reference[1] J. So and N. Vaidya, “Multi-Channel MAC for ad hoc Networks: Handling Multi-Channel Hidden Terminals using a Single Transceiver,” ACM Int’l. Symp. Mobile Ad Hoc Net. and Comp. (MOBIHOC), May 2004, pp. 222–33.

[2] Markus Winter and Steffen Prusseit and Gerhard P. Fettweis “Hierarchical Routing Architectures in Clustered 2D-MeshNetworks-on-Chip”

Page 33: Wireless Mesh Network 指導教授:吳和庭教授、柯開維教授 報告:江昀庭 Source reference: Akyildiz, I.F. and Xudong Wang “A survey on wireless mesh networks”

33

Q & A

Page 34: Wireless Mesh Network 指導教授:吳和庭教授、柯開維教授 報告:江昀庭 Source reference: Akyildiz, I.F. and Xudong Wang “A survey on wireless mesh networks”

34

Thanks for your listen