Seminar on Wireless Mesh Networking Presented By: Mankiran Kaur (96236581466) M.Tech(C.S.E)

Slides:



Advertisements
Similar presentations
CSE 6590 Department of Computer Science & Engineering York University 1 Introduction to Wireless Ad-hoc Networking 5/4/2015 2:17 PM.
Advertisements

802.11a/b/g Networks Herbert Rubens Some slides taken from UIUC Wireless Networking Group.
Network Layer Routing Issues (I). Infrastructure vs. multi-hop Infrastructure networks: Infrastructure networks: ◦ One or several Access-Points (AP) connected.
Multicasting in Mobile Ad-Hoc Networks (MANET)
Arsitektur Jaringan Terkini
CS541 Advanced Networking 1 Wireless Mesh Networks Neil Tang 1/26/2009.
A Survey on Wireless Mesh Networks Sih-Han Chen 陳思翰 Department of Computer Science and Information Engineering National Taipei University of Technology.
Mesh Networks A.k.a “ad-hoc”. Definition A local area network that employs either a full mesh topology or partial mesh topology Full mesh topology- each.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
CS541 Advanced Networking 1 Mobile Ad Hoc Networks (MANETs) Neil Tang 02/02/2009.
Security of wireless ad-hoc networks. Outline Properties of Ad-Hoc network Security Challenges MANET vs. Traditional Routing Why traditional routing protocols.
Wireless Mesh Networks
Wireless Mesh Networks The notes of this talk are excerpted from the lecture notes by Prof. Akyildiz at Georgia Institute of Technology By Cunqing Hua.
Ad Hoc Wireless Routing COS 461: Computer Networks
Network Topologies.
ENHANCING AND EVALUATION OF AD-HOC ROUTING PROTOCOLS IN VANET.
NETWORK Topologies An Introduction.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG** * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab ** TeraNovi Tachnologies.
Common Devices Used In Computer Networks
بسم الله الرحمن الرحيم. Wireless Mesh Network (WMN) Izzeldin Shibeika – April, UNCC -
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #3 Mobile Ad-Hoc Networks AODV Routing.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Mobile Adhoc Network: Routing Protocol:AODV
Routing in Ad Hoc Networks Audun Søberg Henriksen Truls Becken.
Ad-hoc On-Demand Distance Vector Routing (AODV) and simulation in network simulator.
PERFORMANCE ANALYSIS OF AODV, OLSR, DSR AND GRP ROUTING PROTOCOL OF MOBILE ADHOC NETWORK – A REVIEW IJCSMC, Vol. 2, Issue. 6, June 2013, pg.359 – 362 Suchita.
ROUTING ALGORITHMS IN AD HOC NETWORKS
Maulana Azad National Institute of Technology Bhopal (MP) AD-HOC NETWORKS Submitted By: Pradeep Ahirwar M Tech (CSE)
Wireless Mesh Network 指導教授:吳和庭教授、柯開維教授 報告:江昀庭 Source reference: Akyildiz, I.F. and Xudong Wang “A survey on wireless mesh networks” IEEE Communications.
A Survey on Wireless Mesh Networks IAN F. AKYILDIZ, GEORGIA INSTITUTE OF TECHNOLOGY XUDONG WANG, KIYON, INC. IEEE Radio Communications September 2005.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
WIRELESS AD-HOC NETWORKS Dr. Razi Iqbal Lecture 6.
AD-HOC NETWORK SUBMITTED BY:- MIHIR GARG A B.TECH(E&T)/SEC-A.
Doc.: IEEE /1047r0 Submission Month 2000August 2004 Avinash Joshi, Vann Hasty, Michael Bahr.Slide 1 Routing Protocols for MANET Avinash Joshi,
Ad Hoc Network.
An Efficient Wireless Mesh Network A New Architecture 指導教授:許子衡 教授 學生:王志嘉.
Intro DSR AODV OLSR TRBPF Comp Concl 4/12/03 Jon KolstadAndreas Lundin CS Ad-Hoc Routing in Wireless Mobile Networks DSR AODV OLSR TBRPF.
November 4, 2003Applied Research Laboratory, Washington University in St. Louis APOC 2003 Wuhan, China Cost Efficient Routing in Ad Hoc Mobile Wireless.
Overview of Wireless Networks: Cellular Mobile Ad hoc Sensor.
Wireless Mesh Networks Myungchul Kim
Intro Wireless vs. wire-based communication –Costs –Mobility Wireless multi hop networks Ad Hoc networking Agenda: –Technology background –Applications.
Mobile Ad Hoc Network (MANET)
1 Wireless Networks Lecture 31 Wireless Mesh Networks Dr. Ghalib A. Shah.
An Efficient Routing Protocol for Green Communications in Vehicular Ad-hoc Networks Jamal Toutouh, Enritue Alba GECCO’ 11, July Presented by 劉美妙.
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Wireless Mesh Networking Nathaniel Wilson 4/13/2007.
Mobile Ad Hoc Networks. What is a MANET (Mobile Ad Hoc Networks)? Formed by wireless hosts which may be mobile No pre-existing infrastructure Routes between.
Author:Zarei.M.;Faez.K. ;Nya.J.M.
IMPROVING OF WIRELESS MESH NETWORKS.
Overview of Wireless Networks:
Lecture 28 Mobile Ad hoc Network Dr. Ghalib A. Shah
Ad-hoc Networks.
Sensor Network Routing
CSE 4340/5349 Mobile Systems Engineering
Routing In Wireless Mesh Networks
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Ad Hoc and Sensor Networks
by Saltanat Mashirova & Afshin Mahini
Adhoc and Wireless Sensor Networks
Mobile ad hoc networking: imperatives and challenges
Subject Name: Computer Networks - II Subject Code: 10CS64
Xiuzhen Cheng Csci332 MAS Networks – Challenges and State-of-the-Art Research – Wireless Mesh Networks Xiuzhen Cheng
Routing in Mobile Ad-hoc Networks
Vinay Singh Graduate school of Software Dongseo University
Other Routing Protocols
Routing protocols in Mobile Ad Hoc Network
Routing in Mobile Wireless Networks Neil Tang 11/14/2008
Presentation transcript:

Seminar on Wireless Mesh Networking Presented By: Mankiran Kaur ( ) M.Tech(C.S.E)

Outline  Wireless Mesh Network  Network Architecture  Characteristics  Protocols Design  Standardization Activities 2

Wireless Mesh Networks  The term 'wireless mesh networks' describes wireless networks in which each node can communicate directly with one or more peer nodes.  The term 'mesh' originally used to suggest that all nodes were connected to all other nodes, but most modern meshes connect only a sub-set of nodes to each other.  Still, this is quite different than traditional wireless networks, which require centralized access points to mediate the wireless connection.  It is dynamically self-organized and self-configured, nodes can automatically establishing and maintaining mesh connectivity among nodes

 Nodes are comprised of mesh routers and mesh clients.  Extend the range and link robustness of existing Wi-Fi’s by allowing mesh-style multi-hopping  A user finds a nearby user and hops through it - or possibly multiple users - to get to the destination  Every user becomes a relay point or router for network traffic  Mesh networks consist of multiple wireless devices equipped with COTS a/b/g cards that work in ad-hoc fashion.  capable antennas placed on rooftops allow a large area coverage Wireless Mesh Networks

Network Architecture WMNs consist of two types of nodes: Mesh Routers and Mesh Clients Mesh router – Additional routing functions to support mesh networking. – Multiple wireless interfaces with same or different wireless access technologies. – The gateway/bridge functionalities enable the integration of WMNs with existing wireless networks(cellular, sensornet, Wi-Fi, WiMAX). Mesh Clients – Conventional nodes (e.g., desktops, laptops, PDAs, PocketPCs, phones, etc.) equipped with wireless network interface cards (NICs), and can connect directly to wireless mesh routers. – Customers without wireless NICs can access WMNs by connecting to wireless mesh routers through, e.g., Ethernet.

WMN Routers Examples of mesh routers based on different embedded systems: (a) PowerPC and (b) Advanced Risc Machines (ARM)

WMN Clients Examples of mesh clients: (a) Laptop, (b) PDA, (c) Wi-Fi IP Phone and (d) Wi-Fi RFID Reader.

WMN COMPONENTS

WMN Architecture Classifications Infrastructure Meshing Client Mesh Networking Hybrid Mesh Networking

Infrastructure Meshing Mesh routers form an mesh infrastructure among themselves. Provides backbone for clients and enables integration of WMNs with existing wireless networks and Internet through gateway/bridge functionalities. Clients connect to mesh router with wireless link or Ethernet

Client WMNs Client nodes constitute peer-to-peer network, and perform routing and configuration functionalities as well as provide end- user applications to customers, mesh routers are not required. Multi-hop routing. Client nodes have to perform additional functions such as routing and self-configuration.

Hybrid WMNs A combination of infrastructure and client meshing. Infrastructure provides connectivity to other networks such as the Internet, Wi-Fi, WiMAX, cellular, and sensor networks; Mesh clients can access the network through mesh routers as well as directly meshing with other mesh clients. The routing capabilities of clients provide better connectivity and coverage

CHARACTERISTICS Multi-hop Wireless Network Support for Ad Hoc Networking, and Capability of Self- Forming, Self-Healing, and Self-Organization Mobility Dependence on the Type of Mesh Nodes Multiple Types of Network Access Dependence of Power-Consumption Constraints on the Type of Mesh Nodes Compatibility and Interoperability with Existing Wireless Networks

WMNs vs AD HOC Networks Dedicated Routing and Configuration: In ad-hoc networks, end-user devices also perform routing and configuration functionalities for all other nodes. However, WMNs contain mesh routers for these functionalities. Hence, the load on end-user devices is significantly decreased, which provides lower energy consumption and high-end application capabilities to possibly mobile and energy constrained end-users. Moreover, the end-user requirements are limited which decreases the cost of devices that can be used in WMNs.

WMNs vs AD HOC Networks Compatibility: WMNs contain many differences when compared to ad hoc networks. Ad hoc networks can be considered as a subset of WMNs. More specifically, the existing techniques developed for ad-hoc networks are already applicable to WMNs. As an example, through the use of mesh routers and routing- capable end-users, multiple ad hoc networks can be supported in WMNs, but with further integration of these networks.

Application Scenarios Broadband Home Networking Community and Neighborhood Networking Enterprising Networking Transportation Systems Health and Medical Systems Security and Surveillance Systems

Broadband Home Networking Current home network realized through IEEE WLANs – Problem  location of the access points. – Homes have many dead zones without service coverage. – Site survey are expensive and not practical – Installation of multiple access points is also expensive and not convenient. – Communications between nodes under two different access points have to go through the access hub, not an efficient solution. WMNs can resolve all these issues in home networking!!!

Community and Neighborhood Networking Community networks based on cable, DSL and last-hop wireless All traffic must flow through Internet, this significantly reduces network resource utilization. Large percentage of areas in between houses is not covered by wireless services. Gateways may not be shared and wireless services must be set up individually, network service costs may increase. Each home has single path to access Internet WMNs can mitigate these disadvantages and provide many applications such as distributed file storage, distributed file access, and video streaming.

Enterprise Networking IEEE WLANs – Isolated islands, connections among them are achieved through wired Ethernet – Adding more backhaul access modems only increases capacity locally, but does not improve robustness to link failures, network congestion and other problems of the entire enterprise network. WMNs Solutions –Multiple backhaul access modems can be shared by all nodes in the entire network –Scalable

Transportation Systems WMNs can extend access from stations and stops into buses, ferries, and trains. Convenient passenger information services, remote monitoring of in-vehicle security video, and driver communications. Two key techniques are needed – High-speed mobile backhaul from a vehicle to the Internet – Mobile mesh networks within the vehicle.

Health and Medical Systems In a hospital or medical center, monitoring and diagnosis data need to be processed and transmitted from one room to another for various purposes. Data transmission is usually broadband, since high resolution medical images and various periodical monitoring information can easily produce a constant and large volume of data. Traditional wired networks can only provide limited network access to certain fixed medical devices. Wi-Fi based networks must rely on the existence of Ethernet connections, which may cause high system cost and complexity but without the abilities to eliminate dead spots. However, these issues do not exist in WMNs.

Security Surveillance Systems As security is turning out to be a very high concern, security surveillance systems become a necessity for enterprise buildings, shopping malls, grocery stores, etc. In order to deploy such systems at locations as needed, WMNs are a much more viable solution than wired networks to connect all devices. Since still images and videos are the major traffic flowing in the network, this application demands much higher network capacity than other applications.

Routing Protocols Routing Protocols used in wireless mesh network can be classified into two main categories: – Proactive or table driven routing protocols. Destination-Sequenced Distance Vector Routing Protocol. Optimized Link State Routing. – Reactive or on-demand routing protocols Dynamic Source Routing Protocol. Ad hoc On-Demand Distance Vector Routing Protocol.

Destination-Sequenced Distance Vector DSDV is a proactive table-driven routing protocol based on the classical Bellman-Ford algorithm. A routing table is maintained in every mobile node in the network. The routing table records all of the possible destinations within the network and the number of hops to each destination. In DSDV, each route is tagged with a sequence number, indicating how old the route is.

Optimized Link State Routing OLSR is a proactive link-state routing protocol which uses Hello and Topology Control (TC) messages to discover and then disseminate link state information throughout the mobile ad-hoc network. Individual nodes use this topology information to compute next hop destinations for all nodes in the network using shortest hop forwarding paths.

Dynamic Source Routing Protocol DSR is a reactive (On demand) source routing protocol. The protocol consists of two major phases: route discovery and route maintenance. Route Discovery process is based on flooding the network with route request (RREQ) packets. Destination replies to the RREQ with a route reply (RREP) packet that is routed back to the original source.

Ad hoc On-Demand Distance Vector AODV has two important phases, route discovery and route maintenance. It combines DSR and DSDV mechanisms for routing. AODV minimizes the number of required broadcasts, making it suitable for large MANETs

Working Environment Ad-hoc Network : A ad-hoc network is a decentralized wireless network In Ad-hoc network each node participates in routing by forwarding data for other nodes, and so the determination of which nodes forward data is made dynamically based on the network connectivity.

Security WMNs lack efficient and scalable security solutions – Distributed network architecture – Vulnerability of channels and nodes in the shared wireless medium – Dynamic change of network topology. Two strategies – Embedding security mechanism into network protocols – Developing security monitoring response systems – How to design and implement a practical security system, including cross-layer secure network protocols and various intrusion detection algorithms, is a challenging research topic.

Security For a security monitoring system, a cross-layer framework also needs to be developed. However, AAA is performed through a centralized server such as RADIUS (remote authentication dial-in user service). Such a centralized scheme is not applicable in WMNs. Moreover, security key management in WMNs is much more difficult thanin wireless LANs, because there is no central authority, trusted third party or server to manage security keys. Key management in WMNs need to be performed in a distributed but secure way. Therefore, a distributed authentication and authorization scheme with secure key management needs to be proposed for WMNs.