Doc.: IEEE 802.11-05/0166r1 Submission March 2005 Ike Nassi & Jorjeta Jetcheva, FiretideSlide 1 The Advantages of Invisibility and Cooperation Notice:

Slides:



Advertisements
Similar presentations
Doc.: IEEE wng Submission March 2010 Broadwave Corp.Slide 1 Notice: This document has been prepared to assist IEEE It is offered.
Advertisements

Doc.: IEEE /90r0 Submission Nov., 2012 NICTSlide b NICT Proposal IEEE P Wireless RANs Date: Authors: Notice: This document.
Doc.: IEEE /0930r0 Submission July 2006 Nancy Cam-Winget, Cisco Slide 1 Editor Updates since Jacksonville Notice: This document has been prepared.
Doc.: IEEE /0094r0 Submission November 2009 Steve Shellhammer, QualcommSlide 1 Comments on PAR Notice: This document has been prepared.
Doc.: IEEE /0907r0 Submission September 2005 Peter Ecclesine, Cisco SystemsSlide 1 dot1AM management plane Notice: This document has been prepared.
Doc.: IEEE /2237r0 Submission July 2007 Emily Qi, Intel CorporationSlide 1 TGv Redline D1.0 Insert and Deletion Notice: This document has been.
Doc.: IEEE /1212r0 Submission TGT and MEF Liaison Notice: This document has been prepared to assist IEEE It is offered as a basis for.
Doc.: IEEE /0667r0 Submission July 2005 Mike Moreton, STMicroelectronicsSlide 1 Multiple Networks Notice: This document has been prepared to assist.
Doc.: IEEE /0197r0 Submission March 2005 Nancy Cam-Winget et alSlide 1 TAP & JIT Merge Process Notice: This document has been prepared to assist.
Doc.: IEEE /0460r1 Submission March 2006 Fujio Watanabe, DoCoMo USA LabsSlide 1 Japanese Emergency Call Regulation Notice: This document has been.
Doc.: IEEE /0136r0 Submission January 2007 Dave Stephenson, Cisco Systems, Inc.Slide 1 Input to Information Model Date: Notice:
Doc.: IEEE /0652r1 Submission May 2007 Emily Qi, Intel CorporationSlide 1 TGv Redline D0.12 Insert and Deletion Notice: This document has been.
[ Interim Meetings 2006] Date: Authors: July 2005
IEEE White Space Radio Contribution Title
LB73 Noise and Location Categories
LB73 Noise and Location Categories
Waveform Generator Source Code
March 2014 Election Results
TGp Closing Report Date: Authors: July 2007 Month Year
Attendance and Documentation for the March 2007 Plenary
Attendance and Documentation for the March 2007 Plenary
3GPP Extended Date: Authors: July 2005 July 2005
[ Policies and Procedure Summary]
[ Policies and Procedure Summary]
Motion to accept Draft p 2.0
TGs January Final Report
3GPP liaison report July 2006
[place presentation subject title text here]
Fast Transition Mobility (FTM) Domain
(Presentation name) For (Name of group) (Presenter’s name,title)
TGp Closing Report Date: Authors: March 2006 Month Year
On Coexistence Mechanisms
TGu-changes-from-d0-02-to-d0-03
TGp Closing Report Date: Authors: May 2007 Month Year
Contribution on Location Privacy
Self-organizing and Auto-configuring Mesh Networks
IEEE WG Opening Report – March 2007
On Coexistence Mechanisms
TGp Closing Report Date: Authors: March 2006 Month Year
Reflector Tutorial Date: Authors: July 2006 Month Year
TGv Redline D0.07 Insert and Deletion
TGv Redline D0.06 Insert and Deletion
Experimental DTV Sensor
IEEE WG Opening Report – July 2008
ADS Study Group Mid-week Report
IEEE P Wireless RANs Date:
Spectrum Sensing Tiger Team
TGu-changes-from-d0-01-to-d0-02
LB73 Noise and Location Categories
Addressing White Spaces Across all of IEEE 802
TGy draft 2.0 with changebars from draft 1.0
TGs January Final Report
TGv Redline D0.10 Insert and Deletion
WNG Closing Report, May Authors: May 2008 Date: May 2007
IEEE WG Opening Report – July 2007
WAPI Position Paper Sept 2005 Sept 2005 IEEE WG
Redline of draft P802.11w D2.2 Date: Authors:
TGp Closing Report Date: Authors: March 2007 Month Year
TGu-changes-from-d0-02-to-d0-03
[ Policies and Procedure Summary]
[ Policies and Procedure Summary]
Draft P802.11s D1.03 WordConversion
Questions to the Contention-based Protocol (CBP) Study Group
Motion to go to Letter Ballot
EC Motions – July 2005 Plenary
TGu-changes-from-d0-04-to-d0-05
TGu-changes-from-d0-03-to-d0-04
TGu Motions Date: Authors: May 2006 May 2006
WAPI Position Paper Sept 2005 Sept 2005 IEEE WG
TGp Motions Date: Authors: January 2006 Month Year
Presentation transcript:

doc.: IEEE /0166r1 Submission March 2005 Ike Nassi & Jorjeta Jetcheva, FiretideSlide 1 The Advantages of Invisibility and Cooperation Notice: This document has been prepared to assist IEEE It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein. Release: The contributor grants a free, irrevocable license to the IEEE to incorporate material contained in this contribution, and any modifications thereof, in the creation of an IEEE Standards publication; to copyright in the IEEE’s name any IEEE Standards publication even though it may include portions of this contribution; and at the IEEE’s sole discretion to permit others to reproduce in whole or in part the resulting IEEE Standards publication. The contributor also acknowledges and accepts that this contribution may be made public by IEEE Patent Policy and Procedures: The contributor is familiar with the IEEE 802 Patent Policy and Procedures, including the statement "IEEE standards may include the known use of patent(s), including patent applications, provided the IEEE receives assurance from the patent holder or applicant with respect to patents essential for compliance with both mandatory and optional portions of the standard." Early disclosure to the Working Group of patent information that might be relevant to the standard is essential to reduce the possibility for delays in the development process and increase the likelihood that the draft publication will be approved for publication. Please notify the Chair as early as possible, in written or electronic form, if patented technology (or technology under patent application) might be incorporated into a draft standard being developed within the IEEE Working Group. If you have questions, contact the IEEE Patent Committee Administrator at. Date: Authors: Name Company Address Phone Ike Nassi Jorjeta Jetcheva Firetide, Inc Lark Ave. Los Gatos, CA

doc.: IEEE /0166r1 Submission March 2005 Ike Nassi & Jorjeta Jetcheva, FiretideSlide 2 Motivation Mesh opens up interesting and challenging problems that we are only beginning to understand The standard must provide a flexible platform for –Development –Innovation –New applications Sometimes a mesh looks like a network of nodes, but sometimes a mesh looks like a single node whose internal structure is invisible (i.e., it can be recursive and atomic) Innovation can happen as a network, or as a node, or in combination thereof Mesh network cooperation with other networks is essential

doc.: IEEE /0166r1 Submission March 2005 Ike Nassi & Jorjeta Jetcheva, FiretideSlide 3 An Example Mesh Model Step 1: Power on Step 2: There is no Step 2

doc.: IEEE /0166r1 Submission March 2005 Ike Nassi & Jorjeta Jetcheva, FiretideSlide 4 The Invisible Mesh Inside: –Auto discovery –Self configuring –Self healing Outside: –Looks like a multi-protocol switch Is this a mesh, or a node, or a switch?

doc.: IEEE /0166r1 Submission March 2005 Ike Nassi & Jorjeta Jetcheva, FiretideSlide 5 What Defines a Wireless Mesh Backhaul A Mesh is composed of nodes, each of which is a wireless router Nodes talk wirelessly to each other, but not to clients of the backhaul Additional nodes on a network improve network performance – more aggregate bandwidth can invisibly be made available to clients without any service disruption Nodes auto-discover and self configure across the Mesh The resulting mesh may have multiple external connections Routers gave way to NAT, bridges never did; strong value in isolating address spaces from one another

doc.: IEEE /0166r1 Submission March 2005 Ike Nassi & Jorjeta Jetcheva, FiretideSlide 6 Why is Invisibility Necessary? What is the motivation for “invisibility”? –Good fences make good neighbors! –Anonymity is a powerful tool for composition Allows for seamless integration into existing infrastructures Allows for specialized meshes for different applications based on a single standard architecture Allows for future innovation

doc.: IEEE /0166r1 Submission March 2005 Ike Nassi & Jorjeta Jetcheva, FiretideSlide 7 Prototypical Campus Environments Internet Gateway Internet Gateway Internet Start with a mesh, then, Extend network coverage to off- campus sites

doc.: IEEE /0166r1 Submission March 2005 Ike Nassi & Jorjeta Jetcheva, FiretideSlide 8 Reminder: Multi-Service Broadband Connectivity Mesh beyond WiFi –High performance for voice, video and data services –Seamless Ethernet connectivity for any access point or device –Rapid network deployment with low CAPEX and OPEX –Secure and manageable video data Voice over IP

doc.: IEEE /0166r1 Submission March 2005 Ike Nassi & Jorjeta Jetcheva, FiretideSlide 9 Park Library Coffee Shop Local WISP Deploy multiple HotSpots on the same mesh network to create a unified HotZone Public Wi-Fi Access HotZones

doc.: IEEE /0166r1 Submission March 2005 Ike Nassi & Jorjeta Jetcheva, FiretideSlide 10 Reusable Temporary Networks Outdoor Access Point Internet Gateway Internet Laptop Surveillance Camera Access Point Venues include special events, conferences, construction sites, etc., Provide Internet access to site offices and trailers Mesh nodes are easy to relocate as needed

doc.: IEEE /0166r1 Submission March 2005 Ike Nassi & Jorjeta Jetcheva, FiretideSlide 11 Warehousing & Manufacturing Inventory management, RFID systems and terminals Easily reconfigure for changing warehouse layouts WI-FI COVERAGE Internet Gateway Monitoring Station Internet

doc.: IEEE /0166r1 Submission March 2005 Ike Nassi & Jorjeta Jetcheva, FiretideSlide 12 Network Management: Making The Invisible, Visible Management of mesh and individual node settings Customization of graphical display and node placement Remote management Radio power controls Diagnostic tests and tools Traffic prioritization, VLAN and security settings

doc.: IEEE /0166r1 Submission March 2005 Ike Nassi & Jorjeta Jetcheva, FiretideSlide 13 Interoperability & Cooperation The pieces must be brought together Management -Access Control -Location control -Billing -Services Service Providers -Integration of services Mobility Improvements -Roaming across networks -Secure roaming

doc.: IEEE /0166r1 Submission March 2005 Ike Nassi & Jorjeta Jetcheva, FiretideSlide 14 Mesh Portals: Key to Interoperability & Cooperation MP Mesh X MP T-1 MP WiMax

doc.: IEEE /0166r1 Submission March 2005 Ike Nassi & Jorjeta Jetcheva, FiretideSlide 15 Mesh-Wide Settings Packet Filtering For Example, security: AES WEP Encryption Examples: –All data and management traffic can be encrypted only at the portal –Packet filtering (MAC address filtering) –VLANS –QoS

doc.: IEEE /0166r1 Submission March 2005 Ike Nassi & Jorjeta Jetcheva, FiretideSlide 16 Summary There is a powerful advantage to being an “Invisible” Mesh Network – it’s not just the fence (Mesh Portals) but anonymity as well (Invisibility) Interoperability of Heterogeneous Networks is important for unified security, QoS, management, composability, evolution, etc. Portals define the boundaries of the Invisible Network and enable cooperation between networks We need to pay special attention to Mesh Portals.